Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 38) sorted by relevance

12

/titanic_53/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c85 static char encrypted[128]; /* _PASSWORD_LEN in <pwd.h> on OpenBSD */ variable
298 encrypted[i++] = '$';
299 encrypted[i++] = BCRYPT_VERSION;
301 encrypted[i++] = minor;
302 encrypted[i++] = '$';
304 (void) snprintf(encrypted + i, 4, "%2.2u$", logr);
306 encode_base64((uint8_t *)encrypted + i + 3, csalt, BCRYPT_MAXSALT);
307 encode_base64((uint8_t *)encrypted + strlen(encrypted), ciphertext,
309 return (encrypted);
/titanic_53/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c198 free_data(&certptr->signature.encrypted); in free_decoded_cert()
1498 certptr->signature.encrypted.Data = in DerDecodeSignedCertificate()
1500 certptr->signature.encrypted.Length = size / 8; in DerDecodeSignedCertificate()
1502 certptr->signature.encrypted.Data = NULL; in DerDecodeSignedCertificate()
1503 certptr->signature.encrypted.Length = 0; in DerDecodeSignedCertificate()
1774 if (signature->encrypted.Length > 0) { in DerEncodeSignedCertificate()
1775 if (kmfber_printf(asn1, "B", signature->encrypted.Data, in DerEncodeSignedCertificate()
1776 signature->encrypted.Length * 8) == -1) { in DerEncodeSignedCertificate()
2069 csrptr->signature.encrypted.Data = (uchar_t *)signature; in DerDecodeSignedCsr()
2070 csrptr->signature.encrypted.Length = size / 8; in DerDecodeSignedCsr()
[all …]
/titanic_53/usr/src/lib/libfru/include/
H A Dlibfru.h123 unsigned encrypted : 1; member
133 unsigned encrypted : 1; member
/titanic_53/usr/src/lib/libkmf/libkmf/common/
H A Dcsrcrlop.c448 subj_csr.signature.encrypted = signature; in sign_csr()
450 subj_csr.signature.encrypted = signed_data; in sign_csr()
603 rv = DerDecodeDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr()
618 rv = DerDecodeECDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr()
632 &csrdata->signature.encrypted); in kmf_verify_csr()
H A Dcertop.c3117 subj_cert->signature.encrypted = signature; in sign_cert()
3132 subj_cert->signature.encrypted = signature; in sign_cert()
3134 ret = copy_data(&subj_cert->signature.encrypted, &signed_data); in sign_cert()
/titanic_53/usr/src/cmd/vi/port/
H A Dex_temp.h135 short encrypted; /* Encrypted temp file flag */ member
H A Dexpreserve.c85 short encrypted; /* Encrypted temp file flag */ member
326 notify(H.Uid, H.Savedfile, (int) name, H.encrypted); in copyout()
H A Dexrecover.c173 if(H.encrypted) { in main()
428 fp->sf_encrypted = H.encrypted; in enter()
H A Dex_temp.c406 H.encrypted = 1; in synctmp()
408 H.encrypted = 0; in synctmp()
H A Dex.news47 2. It is now possible to recover encrypted files. The file header has
48 been changed to include an encrypted flag. Therefore, if the user
49 types "vi -r file" when "file" is encrypted, the program will
53 command line encrypted file actions
57 [editing session not encrypted]
60 [editing session not encrypted]
63 [editing session encrypted,
68 [editing session encrypted]
205 temp file and encrypted text on your screen has been fixed.
261 A bug causing writes to filters when editing encrypted files
[all …]
H A Dport.mk.37033 # chdir command.) CRYPT includes the code to edit encrypted files (the -x
H A Dport.mk.c7033 # chdir command.) CRYPT includes the code to edit encrypted files (the -x
H A Dport.mk.7034 # encrypted files. Defining CRYPT drags in most of stdio (from the call
/titanic_53/usr/src/lib/libfru/libfruraw/
H A Dfruraw.c653 if (descriptor->field.encrypted && (encrypt_func == NULL)) { in frt_for_each_packet()
692 if ((descriptor->field.encrypted) && in frt_for_each_packet()
/titanic_53/usr/src/lib/passwdutil/
H A DREADME.SunOS-aging47 Note the comma in the encrypted password field. The characters after
/titanic_53/usr/src/cmd/cmd-inet/etc/
H A Dwanboot.conf.sample48 # whether boot_file or the bootfs is to be sent encrypted/signed, or
H A Dservices226 eklogin 2105/tcp # Kerberos encrypted rlogin
/titanic_53/usr/src/lib/libfru/libfrupicl/
H A Dfrupicl.c1083 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet()
1112 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
/titanic_53/usr/src/lib/libsqlite/test/
H A Dversion.test198 } {1 {file is encrypted or is not a database}}
/titanic_53/usr/src/uts/common/io/ipw/
H A Dipw2100_impl.h374 uint8_t encrypted; member
/titanic_53/usr/src/lib/libfru/libfrupicltree/
H A Dfrupicltree.c1098 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet()
1127 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
/titanic_53/usr/src/lib/libfru/libfru/
H A Dlibfru.cc446 return (segdef.desc.field.encrypted == 1); in segment_is_encrypted()
858 if ((def->desc.field.encrypted == 1) && in fru_create_segment()
967 if ((segdef.desc.field.encrypted == 1) && in fru_get_segment_def()
/titanic_53/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkerberos.ldif342 ##### This attribute holds the principal's key (krbPrincipalKey) that is encrypted with
444 ##### This attribute holds the principal's old keys (krbPwdHistory) that is encrypted with
/titanic_53/usr/src/lib/libkmf/include/
H A Dkmftypes.h589 KMF_DATA encrypted; member
/titanic_53/usr/src/uts/common/crypto/io/
H A Ddprov.c6414 size_t encrypted; in dprov_cipher_mac_task() local
6435 encrypted = cipher_data.cd_length; in dprov_cipher_mac_task()
6437 cipher_data.cd_offset += encrypted; in dprov_cipher_mac_task()
6438 cipher_data.cd_length = dual_data->dd_len1 - encrypted; in dprov_cipher_mac_task()
6463 dual_data->dd_len1 = encrypted + cipher_data.cd_length; in dprov_cipher_mac_task()
6475 size_t encrypted; in dprov_cipher_mac_task() local
6494 encrypted = cipher_data.cd_length; in dprov_cipher_mac_task()
6506 encrypted; in dprov_cipher_mac_task()
6517 dual_data->dd_len1 = encrypted; in dprov_cipher_mac_task()

12