| /titanic_53/usr/src/lib/crypt_modules/bsdbf/ |
| H A D | bcrypt.c | 85 static char encrypted[128]; /* _PASSWORD_LEN in <pwd.h> on OpenBSD */ variable 298 encrypted[i++] = '$'; 299 encrypted[i++] = BCRYPT_VERSION; 301 encrypted[i++] = minor; 302 encrypted[i++] = '$'; 304 (void) snprintf(encrypted + i, 4, "%2.2u$", logr); 306 encode_base64((uint8_t *)encrypted + i + 3, csalt, BCRYPT_MAXSALT); 307 encode_base64((uint8_t *)encrypted + strlen(encrypted), ciphertext, 309 return (encrypted);
|
| /titanic_53/usr/src/lib/libkmf/ber_der/common/ |
| H A D | clasn1.c | 198 free_data(&certptr->signature.encrypted); in free_decoded_cert() 1498 certptr->signature.encrypted.Data = in DerDecodeSignedCertificate() 1500 certptr->signature.encrypted.Length = size / 8; in DerDecodeSignedCertificate() 1502 certptr->signature.encrypted.Data = NULL; in DerDecodeSignedCertificate() 1503 certptr->signature.encrypted.Length = 0; in DerDecodeSignedCertificate() 1774 if (signature->encrypted.Length > 0) { in DerEncodeSignedCertificate() 1775 if (kmfber_printf(asn1, "B", signature->encrypted.Data, in DerEncodeSignedCertificate() 1776 signature->encrypted.Length * 8) == -1) { in DerEncodeSignedCertificate() 2069 csrptr->signature.encrypted.Data = (uchar_t *)signature; in DerDecodeSignedCsr() 2070 csrptr->signature.encrypted.Length = size / 8; in DerDecodeSignedCsr() [all …]
|
| /titanic_53/usr/src/lib/libfru/include/ |
| H A D | libfru.h | 123 unsigned encrypted : 1; member 133 unsigned encrypted : 1; member
|
| /titanic_53/usr/src/lib/libkmf/libkmf/common/ |
| H A D | csrcrlop.c | 448 subj_csr.signature.encrypted = signature; in sign_csr() 450 subj_csr.signature.encrypted = signed_data; in sign_csr() 603 rv = DerDecodeDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr() 618 rv = DerDecodeECDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr() 632 &csrdata->signature.encrypted); in kmf_verify_csr()
|
| H A D | certop.c | 3117 subj_cert->signature.encrypted = signature; in sign_cert() 3132 subj_cert->signature.encrypted = signature; in sign_cert() 3134 ret = copy_data(&subj_cert->signature.encrypted, &signed_data); in sign_cert()
|
| /titanic_53/usr/src/cmd/vi/port/ |
| H A D | ex_temp.h | 135 short encrypted; /* Encrypted temp file flag */ member
|
| H A D | expreserve.c | 85 short encrypted; /* Encrypted temp file flag */ member 326 notify(H.Uid, H.Savedfile, (int) name, H.encrypted); in copyout()
|
| H A D | exrecover.c | 173 if(H.encrypted) { in main() 428 fp->sf_encrypted = H.encrypted; in enter()
|
| H A D | ex_temp.c | 406 H.encrypted = 1; in synctmp() 408 H.encrypted = 0; in synctmp()
|
| H A D | ex.news | 47 2. It is now possible to recover encrypted files. The file header has 48 been changed to include an encrypted flag. Therefore, if the user 49 types "vi -r file" when "file" is encrypted, the program will 53 command line encrypted file actions 57 [editing session not encrypted] 60 [editing session not encrypted] 63 [editing session encrypted, 68 [editing session encrypted] 205 temp file and encrypted text on your screen has been fixed. 261 A bug causing writes to filters when editing encrypted files [all …]
|
| H A D | port.mk.370 | 33 # chdir command.) CRYPT includes the code to edit encrypted files (the -x
|
| H A D | port.mk.c70 | 33 # chdir command.) CRYPT includes the code to edit encrypted files (the -x
|
| H A D | port.mk.70 | 34 # encrypted files. Defining CRYPT drags in most of stdio (from the call
|
| /titanic_53/usr/src/lib/libfru/libfruraw/ |
| H A D | fruraw.c | 653 if (descriptor->field.encrypted && (encrypt_func == NULL)) { in frt_for_each_packet() 692 if ((descriptor->field.encrypted) && in frt_for_each_packet()
|
| /titanic_53/usr/src/lib/passwdutil/ |
| H A D | README.SunOS-aging | 47 Note the comma in the encrypted password field. The characters after
|
| /titanic_53/usr/src/cmd/cmd-inet/etc/ |
| H A D | wanboot.conf.sample | 48 # whether boot_file or the bootfs is to be sent encrypted/signed, or
|
| H A D | services | 226 eklogin 2105/tcp # Kerberos encrypted rlogin
|
| /titanic_53/usr/src/lib/libfru/libfrupicl/ |
| H A D | frupicl.c | 1083 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet() 1112 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
|
| /titanic_53/usr/src/lib/libsqlite/test/ |
| H A D | version.test | 198 } {1 {file is encrypted or is not a database}}
|
| /titanic_53/usr/src/uts/common/io/ipw/ |
| H A D | ipw2100_impl.h | 374 uint8_t encrypted; member
|
| /titanic_53/usr/src/lib/libfru/libfrupicltree/ |
| H A D | frupicltree.c | 1098 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet() 1127 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
|
| /titanic_53/usr/src/lib/libfru/libfru/ |
| H A D | libfru.cc | 446 return (segdef.desc.field.encrypted == 1); in segment_is_encrypted() 858 if ((def->desc.field.encrypted == 1) && in fru_create_segment() 967 if ((segdef.desc.field.encrypted == 1) && in fru_get_segment_def()
|
| /titanic_53/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
| H A D | kerberos.ldif | 342 ##### This attribute holds the principal's key (krbPrincipalKey) that is encrypted with 444 ##### This attribute holds the principal's old keys (krbPwdHistory) that is encrypted with
|
| /titanic_53/usr/src/lib/libkmf/include/ |
| H A D | kmftypes.h | 589 KMF_DATA encrypted; member
|
| /titanic_53/usr/src/uts/common/crypto/io/ |
| H A D | dprov.c | 6414 size_t encrypted; in dprov_cipher_mac_task() local 6435 encrypted = cipher_data.cd_length; in dprov_cipher_mac_task() 6437 cipher_data.cd_offset += encrypted; in dprov_cipher_mac_task() 6438 cipher_data.cd_length = dual_data->dd_len1 - encrypted; in dprov_cipher_mac_task() 6463 dual_data->dd_len1 = encrypted + cipher_data.cd_length; in dprov_cipher_mac_task() 6475 size_t encrypted; in dprov_cipher_mac_task() local 6494 encrypted = cipher_data.cd_length; in dprov_cipher_mac_task() 6506 encrypted; in dprov_cipher_mac_task() 6517 dual_data->dd_len1 = encrypted; in dprov_cipher_mac_task()
|