/titanic_50/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 85 static char encrypted[128]; /* _PASSWORD_LEN in <pwd.h> on OpenBSD */ variable 298 encrypted[i++] = '$'; 299 encrypted[i++] = BCRYPT_VERSION; 301 encrypted[i++] = minor; 302 encrypted[i++] = '$'; 304 (void) snprintf(encrypted + i, 4, "%2.2u$", logr); 306 encode_base64((uint8_t *)encrypted + i + 3, csalt, BCRYPT_MAXSALT); 307 encode_base64((uint8_t *)encrypted + strlen(encrypted), ciphertext, 309 return (encrypted);
|
/titanic_50/usr/src/cmd/ssh/libssh/common/ |
H A D | authfile.c | 72 Buffer buffer, encrypted; in key_save_private_rsa1() local 114 buffer_init(&encrypted); in key_save_private_rsa1() 118 buffer_put_char(&encrypted, authfile_id_string[i]); in key_save_private_rsa1() 119 buffer_put_char(&encrypted, 0); in key_save_private_rsa1() 122 buffer_put_char(&encrypted, cipher_num); in key_save_private_rsa1() 123 buffer_put_int(&encrypted, 0); /* For future extension */ in key_save_private_rsa1() 126 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); in key_save_private_rsa1() 127 buffer_put_bignum(&encrypted, key->rsa->n); in key_save_private_rsa1() 128 buffer_put_bignum(&encrypted, key->rsa->e); in key_save_private_rsa1() 129 buffer_put_cstring(&encrypted, comment); in key_save_private_rsa1() [all …]
|
/titanic_50/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 198 free_data(&certptr->signature.encrypted); in free_decoded_cert() 1498 certptr->signature.encrypted.Data = in DerDecodeSignedCertificate() 1500 certptr->signature.encrypted.Length = size / 8; in DerDecodeSignedCertificate() 1502 certptr->signature.encrypted.Data = NULL; in DerDecodeSignedCertificate() 1503 certptr->signature.encrypted.Length = 0; in DerDecodeSignedCertificate() 1774 if (signature->encrypted.Length > 0) { in DerEncodeSignedCertificate() 1775 if (kmfber_printf(asn1, "B", signature->encrypted.Data, in DerEncodeSignedCertificate() 1776 signature->encrypted.Length * 8) == -1) { in DerEncodeSignedCertificate() 2069 csrptr->signature.encrypted.Data = (uchar_t *)signature; in DerDecodeSignedCsr() 2070 csrptr->signature.encrypted.Length = size / 8; in DerDecodeSignedCsr() [all …]
|
/titanic_50/usr/src/lib/libfru/include/ |
H A D | libfru.h | 123 unsigned encrypted : 1; member 133 unsigned encrypted : 1; member
|
/titanic_50/usr/src/lib/libkmf/libkmf/common/ |
H A D | csrcrlop.c | 448 subj_csr.signature.encrypted = signature; in sign_csr() 450 subj_csr.signature.encrypted = signed_data; in sign_csr() 603 rv = DerDecodeDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr() 618 rv = DerDecodeECDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr() 632 &csrdata->signature.encrypted); in kmf_verify_csr()
|
/titanic_50/usr/src/cmd/vi/port/ |
H A D | ex_temp.h | 135 short encrypted; /* Encrypted temp file flag */ member
|
H A D | expreserve.c | 85 short encrypted; /* Encrypted temp file flag */ member 326 notify(H.Uid, H.Savedfile, (int) name, H.encrypted); in copyout()
|
H A D | exrecover.c | 173 if(H.encrypted) { in main() 428 fp->sf_encrypted = H.encrypted; in enter()
|
H A D | ex_temp.c | 406 H.encrypted = 1; in synctmp() 408 H.encrypted = 0; in synctmp()
|
H A D | ex.news | 47 2. It is now possible to recover encrypted files. The file header has 48 been changed to include an encrypted flag. Therefore, if the user 49 types "vi -r file" when "file" is encrypted, the program will 53 command line encrypted file actions 57 [editing session not encrypted] 60 [editing session not encrypted] 63 [editing session encrypted, 68 [editing session encrypted] 205 temp file and encrypted text on your screen has been fixed. 261 A bug causing writes to filters when editing encrypted files [all …]
|
H A D | port.mk.370 | 33 # chdir command.) CRYPT includes the code to edit encrypted files (the -x
|
H A D | port.mk.c70 | 33 # chdir command.) CRYPT includes the code to edit encrypted files (the -x
|
/titanic_50/usr/src/lib/libfru/libfruraw/ |
H A D | fruraw.c | 653 if (descriptor->field.encrypted && (encrypt_func == NULL)) { in frt_for_each_packet() 692 if ((descriptor->field.encrypted) && in frt_for_each_packet()
|
/titanic_50/usr/src/cmd/ssh/doc/ |
H A D | README.Ylonen | 26 transparently encrypted. RSA is used for key exchange, and a 41 o Arbitrary TCP/IP ports can be redirected through the encrypted channel 76 any file. Exchanged session keys are encrypted using both the 301 encrypted channel). This behavior can be disabled in the 326 encrypted X11 connections. I cannot think of any other easy way to 327 make X11 connections encrypted; modifying the X server, clients or 533 prefer PGP encrypted mail.
|
H A D | OVERVIEW | 51 encrypted with a passphrase. The functions to read passphrases
|
/titanic_50/usr/src/lib/passwdutil/ |
H A D | README.SunOS-aging | 47 Note the comma in the encrypted password field. The characters after
|
/titanic_50/usr/src/cmd/cmd-inet/etc/ |
H A D | wanboot.conf.sample | 48 # whether boot_file or the bootfs is to be sent encrypted/signed, or
|
H A D | services | 226 eklogin 2105/tcp # Kerberos encrypted rlogin
|
/titanic_50/usr/src/lib/libfru/libfrupicl/ |
H A D | frupicl.c | 1083 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet() 1112 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
|
/titanic_50/usr/src/lib/libsqlite/test/ |
H A D | version.test | 198 } {1 {file is encrypted or is not a database}}
|
/titanic_50/usr/src/uts/common/io/ipw/ |
H A D | ipw2100_impl.h | 374 uint8_t encrypted; member
|
/titanic_50/usr/src/lib/libfru/libfrupicltree/ |
H A D | frupicltree.c | 1098 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet() 1127 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
|
/titanic_50/usr/src/lib/libfru/libfru/ |
H A D | libfru.cc | 446 return (segdef.desc.field.encrypted == 1); in segment_is_encrypted() 858 if ((def->desc.field.encrypted == 1) && in fru_create_segment() 967 if ((segdef.desc.field.encrypted == 1) && in fru_get_segment_def()
|
/titanic_50/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kerberos.ldif | 342 ##### This attribute holds the principal's key (krbPrincipalKey) that is encrypted with 444 ##### This attribute holds the principal's old keys (krbPwdHistory) that is encrypted with
|
/titanic_50/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 589 KMF_DATA encrypted; member
|