Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 38) sorted by relevance

12

/titanic_50/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c85 static char encrypted[128]; /* _PASSWORD_LEN in <pwd.h> on OpenBSD */ variable
298 encrypted[i++] = '$';
299 encrypted[i++] = BCRYPT_VERSION;
301 encrypted[i++] = minor;
302 encrypted[i++] = '$';
304 (void) snprintf(encrypted + i, 4, "%2.2u$", logr);
306 encode_base64((uint8_t *)encrypted + i + 3, csalt, BCRYPT_MAXSALT);
307 encode_base64((uint8_t *)encrypted + strlen(encrypted), ciphertext,
309 return (encrypted);
/titanic_50/usr/src/cmd/ssh/libssh/common/
H A Dauthfile.c72 Buffer buffer, encrypted; in key_save_private_rsa1() local
114 buffer_init(&encrypted); in key_save_private_rsa1()
118 buffer_put_char(&encrypted, authfile_id_string[i]); in key_save_private_rsa1()
119 buffer_put_char(&encrypted, 0); in key_save_private_rsa1()
122 buffer_put_char(&encrypted, cipher_num); in key_save_private_rsa1()
123 buffer_put_int(&encrypted, 0); /* For future extension */ in key_save_private_rsa1()
126 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); in key_save_private_rsa1()
127 buffer_put_bignum(&encrypted, key->rsa->n); in key_save_private_rsa1()
128 buffer_put_bignum(&encrypted, key->rsa->e); in key_save_private_rsa1()
129 buffer_put_cstring(&encrypted, comment); in key_save_private_rsa1()
[all …]
/titanic_50/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c198 free_data(&certptr->signature.encrypted); in free_decoded_cert()
1498 certptr->signature.encrypted.Data = in DerDecodeSignedCertificate()
1500 certptr->signature.encrypted.Length = size / 8; in DerDecodeSignedCertificate()
1502 certptr->signature.encrypted.Data = NULL; in DerDecodeSignedCertificate()
1503 certptr->signature.encrypted.Length = 0; in DerDecodeSignedCertificate()
1774 if (signature->encrypted.Length > 0) { in DerEncodeSignedCertificate()
1775 if (kmfber_printf(asn1, "B", signature->encrypted.Data, in DerEncodeSignedCertificate()
1776 signature->encrypted.Length * 8) == -1) { in DerEncodeSignedCertificate()
2069 csrptr->signature.encrypted.Data = (uchar_t *)signature; in DerDecodeSignedCsr()
2070 csrptr->signature.encrypted.Length = size / 8; in DerDecodeSignedCsr()
[all …]
/titanic_50/usr/src/lib/libfru/include/
H A Dlibfru.h123 unsigned encrypted : 1; member
133 unsigned encrypted : 1; member
/titanic_50/usr/src/lib/libkmf/libkmf/common/
H A Dcsrcrlop.c448 subj_csr.signature.encrypted = signature; in sign_csr()
450 subj_csr.signature.encrypted = signed_data; in sign_csr()
603 rv = DerDecodeDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr()
618 rv = DerDecodeECDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr()
632 &csrdata->signature.encrypted); in kmf_verify_csr()
/titanic_50/usr/src/cmd/vi/port/
H A Dex_temp.h135 short encrypted; /* Encrypted temp file flag */ member
H A Dexpreserve.c85 short encrypted; /* Encrypted temp file flag */ member
326 notify(H.Uid, H.Savedfile, (int) name, H.encrypted); in copyout()
H A Dexrecover.c173 if(H.encrypted) { in main()
428 fp->sf_encrypted = H.encrypted; in enter()
H A Dex_temp.c406 H.encrypted = 1; in synctmp()
408 H.encrypted = 0; in synctmp()
H A Dex.news47 2. It is now possible to recover encrypted files. The file header has
48 been changed to include an encrypted flag. Therefore, if the user
49 types "vi -r file" when "file" is encrypted, the program will
53 command line encrypted file actions
57 [editing session not encrypted]
60 [editing session not encrypted]
63 [editing session encrypted,
68 [editing session encrypted]
205 temp file and encrypted text on your screen has been fixed.
261 A bug causing writes to filters when editing encrypted files
[all …]
H A Dport.mk.37033 # chdir command.) CRYPT includes the code to edit encrypted files (the -x
H A Dport.mk.c7033 # chdir command.) CRYPT includes the code to edit encrypted files (the -x
/titanic_50/usr/src/lib/libfru/libfruraw/
H A Dfruraw.c653 if (descriptor->field.encrypted && (encrypt_func == NULL)) { in frt_for_each_packet()
692 if ((descriptor->field.encrypted) && in frt_for_each_packet()
/titanic_50/usr/src/cmd/ssh/doc/
H A DREADME.Ylonen26 transparently encrypted. RSA is used for key exchange, and a
41 o Arbitrary TCP/IP ports can be redirected through the encrypted channel
76 any file. Exchanged session keys are encrypted using both the
301 encrypted channel). This behavior can be disabled in the
326 encrypted X11 connections. I cannot think of any other easy way to
327 make X11 connections encrypted; modifying the X server, clients or
533 prefer PGP encrypted mail.
H A DOVERVIEW51 encrypted with a passphrase. The functions to read passphrases
/titanic_50/usr/src/lib/passwdutil/
H A DREADME.SunOS-aging47 Note the comma in the encrypted password field. The characters after
/titanic_50/usr/src/cmd/cmd-inet/etc/
H A Dwanboot.conf.sample48 # whether boot_file or the bootfs is to be sent encrypted/signed, or
H A Dservices226 eklogin 2105/tcp # Kerberos encrypted rlogin
/titanic_50/usr/src/lib/libfru/libfrupicl/
H A Dfrupicl.c1083 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet()
1112 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
/titanic_50/usr/src/lib/libsqlite/test/
H A Dversion.test198 } {1 {file is encrypted or is not a database}}
/titanic_50/usr/src/uts/common/io/ipw/
H A Dipw2100_impl.h374 uint8_t encrypted; member
/titanic_50/usr/src/lib/libfru/libfrupicltree/
H A Dfrupicltree.c1098 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet()
1127 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
/titanic_50/usr/src/lib/libfru/libfru/
H A Dlibfru.cc446 return (segdef.desc.field.encrypted == 1); in segment_is_encrypted()
858 if ((def->desc.field.encrypted == 1) && in fru_create_segment()
967 if ((segdef.desc.field.encrypted == 1) && in fru_get_segment_def()
/titanic_50/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkerberos.ldif342 ##### This attribute holds the principal's key (krbPrincipalKey) that is encrypted with
444 ##### This attribute holds the principal's old keys (krbPwdHistory) that is encrypted with
/titanic_50/usr/src/lib/libkmf/include/
H A Dkmftypes.h589 KMF_DATA encrypted; member

12