/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/userquota/ |
H A D | userspace_encrypted.ksh | 23 # 'zfs userspace' and 'zfs groupspace' can be used on encrypted datasets 27 # 1. Create both un-encrypted and encrypted datasets 28 # 2. Receive un-encrypted dataset in encrypted hierarchy 29 # 3. Verify encrypted datasets support 'zfs userspace' and 'zfs groupspace' 54 log_assert "'zfs user/groupspace' should work on encrypted datasets" 62 # 1. Create both un-encrypted and encrypted datasets 69 # 2. Receive un-encrypted dataset in encrypted hierarchy 74 # 3. Verify encrypted datasets support 'zfs userspace' and 85 log_pass "'zfs user/groupspace' works on encrypted datasets"
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/ |
H A D | zfs_receive_to_encrypted.ksh | 26 # ZFS should receive to an encrypted child dataset. 30 # 2. Create an encrypted dataset 31 # 3. Attempt to receive a stream to an encrypted child 33 # 5. Attempt to receive an incremental stream to an encrypted child (must fail) 38 # 10. Attempt to receive a snapshot stream to an encrypted child (must fail) 45 datasetexists $TESTPOOL/encrypted && \ 46 destroy_dataset $TESTPOOL/encrypted -r 57 log_assert "ZFS should receive encrypted filesystems into child dataset" 70 log_note "Verifying ZFS will receive to an encrypted child" 79 log_note "Verifying ZFS will not receive an incremental into an encrypted" \ [all …]
|
H A D | zfs_receive_from_encrypted.ksh | 26 # ZFS should receive an unencrypted stream from an encrypted dataset 30 # 2. Create an encrypted dataset 31 # 3. Create and checksum a file on the encrypted dataset 32 # 4. Snapshot the encrypted dataset 36 # 8. Attempt to receive the snapshot into an encrypted child 53 log_assert "ZFS should receive an unencrypted stream from an encrypted dataset" 71 [[ "$crypt" == "off" ]] || log_fail "Received unencrypted stream as encrypted" 77 log_note "Verify ZFS can receive into an encrypted child" 84 log_pass "ZFS can receive an unencrypted stream from an encrypted dataset"
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | pgp | 9 0 beshort 0xa600 PGP encrypted data 10 #!:mime application/pgp-encrypted 31 # https://reposcope.com/mimetype/application/pgp-encrypted 33 !:mime application/pgp-encrypted 58 >0 byte 0x68 Public-Key Encrypted Session Key (old) 60 >0 byte 0x6a Symmetric-Key Encrypted Session Key (old) 66 >0 byte 0x70 Symmetrically Encrypted Data (old) 75 >>1 byte&0xc0 0x40 Public-Key Encrypted Session Key 77 >>1 byte&0xc0 0xc0 Symmetric-Key Encrypted Session Key 85 >>1 byte&0xc0 0x40 Symmetrically Encrypted Data [all …]
|
H A D | gnu | 122 0 beshort 0x8502 GPG encrypted data 138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher) 139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher) 140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher) 141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher) 142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher) 143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher) 144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher) 145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher) 146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher) [all …]
|
H A D | aes | 5 # aes: magic file for AES encrypted files 7 # Summary: AES Crypt Encrypted Data File 12 >3 ubyte <3 AES encrypted data, version %u 14 !:mime application/x-aes-encrypted 16 # For Version 2 the encrypted file can have text tags
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/ |
H A D | send_encrypted_incremental.ksh | 29 # Incrementally receiving a snapshot to an encrypted filesystem succeeds. 32 # 1) Create a pool and an encrypted fs 34 # 3) Send the first snapshot to a second encrypted as well as an 37 # 5) Rollback the second encrypted fs to the first snapshot. 39 # second encrypted fs. 40 # 7) Incrementally send the third snapshot from the first encrypted to the 43 # encrypted fs. 48 log_assert "Incrementally receiving a snapshot to an encrypted filesystem succeeds" 94 log_pass "Incrementally receiving a snapshot to an encrypted filesystem succeeds"
|
H A D | send_raw_ashift.ksh | 26 # Verify encrypted raw sending to pools with greater ashift succeeds. 30 # encrypted filesystem. 34 # 4) Repeat the test for a non-encrypted filesystem using raw send 162 # Create encrypted fs 167 # Run xattr tests for encrypted fs 170 # Calculate the expected recursive checksum for source encrypted fs 173 # Mount target encrypted fs 186 # Run xattr tests for non-encrypted fs 189 # Calculate the expected recursive checksum for source non-encrypted fs
|
H A D | send_encrypted_props.ksh | 30 # 1. Create a few unencrypted and encrypted test datasets with some data 87 # Embedded data is incompatible with encrypted datasets, so we cannot 89 log_note "Must not be able to receive an embedded stream as encrypted" 137 # Test that we can override sharesmb property for encrypted raw stream. 138 log_note "Must be able to override sharesmb property for encrypted raw stream" 180 # settings, receiving it as an encrypted child. 181 log_note "Must be able to receive stream with props to encrypted child" 194 # settings, receiving all datasets as encrypted children. 195 log_note "Must be able to receive recursive stream to encrypted child" 208 # encryption settings, receiving all datasets as encrypted children. [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_clone/ |
H A D | zfs_clone_encrypted.ksh | 27 # 'zfs clone' should create encrypted clones of encrypted datasets 30 # 1. Create an encrypted dataset 35 # 6. Attempt to clone the snapshot as a child of an encrypted dataset 54 log_assert "'zfs clone' should create encrypted clones of encrypted datasets" 84 log_pass "'zfs clone' creates encrypted clones of encrypted datasets"
|
/freebsd/lib/geom/eli/ |
H A D | geli.8 | 208 Allows the encrypted Master Key to be backed up and restored, 222 Allows suspending and resuming encrypted devices. 230 Initialize providers which need to be encrypted. 267 This makes it possible to use an encrypted root partition. 290 When entering the passphrase to boot from this encrypted root filesystem, echo 307 Enable booting from this encrypted root filesystem. 310 from the encrypted partition. 366 By default, if the underlying provider grows, the encrypted provider will 370 size, attaching encrypted provider will no longer be possible as the metadata 402 The encrypted Master Keys are loaded from the metadata and decrypted [all …]
|
/freebsd/sbin/dumpon/ |
H A D | dumpon.8 | 111 Configure encrypted kernel dumps. 120 The encrypted dump contents consist of a standard dump header, the 121 pubkey-encrypted symmetric key contents, and the symmetric key encrypted core 132 Select the symmetric algorithm used for encrypted kernel crash dump. 260 to configure encrypted kernel crash dumps: 264 It is recommended to test if the kernel saves encrypted crash dumps using the 388 Support for encrypted kernel core dumps and netdump was added in 399 To configure encrypted kernel core dumps, the running kernel must have been 432 The current encrypted kernel core dump scheme does not provide integrity nor 434 That is, the recipient of an encrypted kernel core dump cannot know if they [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zdb/ |
H A D | zdb_encrypted_raw.ksh | 27 # 'zdb -K ...' should enable reading from a raw-encrypted dataset 30 # 1. Create an encrypted dataset 53 log_assert "'zdb -K' should enable reading from a raw-encrypted dataset" 62 echo 'my great encrypted text' > "$file" 71 log_must eval "zdb -dddd $dataset $obj | grep -q 'object encrypted'" 75 log_pass "'zdb -K' enables reading from a raw-encrypted dataset"
|
H A D | zdb_encrypted.ksh | 31 # 1. Create an encrypted dataset 52 log_assert "'zdb -K' should enable reading from an encrypted dataset" 57 echo 'my great encrypted text' > $file 66 log_must eval "zdb -dddd $dataset $obj | grep -q 'object encrypted'" 70 log_pass "'zdb -K' enables reading from an encrypted dataset"
|
/freebsd/crypto/openssl/util/perl/TLSProxy/ |
H A D | Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
/freebsd/share/man/man4/ |
H A D | gbde.4 |
|
/freebsd/contrib/libarchive/libarchive/test/ |
H A D | test_read_format_rar_encryption.c | 30 …lid archives or archives or archives where filenames are encrypted, all four files are encrypted w… 31 …d". For non-solid archives without filename encryption, a.txt and c.txt are not encrypted, b.txt is 32 * encrypted with the password "password", and d.txt is encrypted with the password "password2". 44 …/* We should only ever fail to read the header when filenames are encrypted. Otherwise we're faili… in test_encrypted_rar_archive() 48 /* We should only ever fail to read the data for "a.txt" and "c.txt" if they are encrypted */ in test_encrypted_rar_archive() 49 /* NOTE: We'll never attempt this when filenames are encrypted, so we only check for solid here */ in test_encrypted_rar_archive() 70 * are encrypted */ in test_encrypted_rar_archive()
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_rename/ |
H A D | zfs_rename_to_encrypted.ksh | 28 # of an encrypted dataset 31 # 1. Create an encrypted dataset 32 # 2. Rename the default dataset to a child of the encrypted dataset 46 "child of an encrypted dataset" 54 "of an encrypted dataset"
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | krb5.h | 188 /* AS-REQ PA-ENC-TIMESTAMP padata timestamp, encrypted with the 192 application session key), encrypted with the service key 195 /* AS-REP encrypted part (includes tgs session key or application 196 session key), encrypted with the client key (section 5.4.2) */ 198 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs 201 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs 208 authenticator subkey), encrypted with the tgs session key 211 /* TGS-REP encrypted part (includes application session key), 212 encrypted with the tgs session key (section 5.4.2) */ 214 /* TGS-REP encrypted part (includes application session key), [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/l2arc/ |
H A D | persist_l2arc_002_pos.ksh | 28 # Persistent L2ARC with an encrypted ZFS file system succeeds 32 # 2. Create a an encrypted ZFS file system. 33 # 3. Create a random file in the encrypted file system and random 39 # 6. Mount the encrypted ZFS file system. 58 log_assert "Persistent L2ARC with an encrypted ZFS file system succeeds." 117 log_pass "Persistent L2ARC with an encrypted ZFS file system succeeds."
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_split/ |
H A D | zpool_split_encryption.ksh | 23 # 'zpool split' should be able to split encrypted pools 26 # 1. Create an encrypted pool 39 log_assert "'zpool split' should be able to split encrypted pools" 47 # 1. Create an encrypted pool 60 log_pass "'zpool split' can split encrypted pools"
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_scrub/ |
H A D | zpool_scrub_encrypted_unloaded.ksh | 26 # Scrubs must work on an encrypted dataset with an unloaded key. 29 # 1. Create an encrypted dataset 31 # 3. Unmount the encrypted dataset and unload its key 47 log_assert "Scrubs must work on an encrypted dataset with an unloaded key" 68 log_pass "Scrubs work on an encrypted dataset with an unloaded key"
|
/freebsd/sys/contrib/openzfs/man/man8/ |
H A D | zfs-unload-key.8 | 183 Newly-written data will continue to be encrypted with the same master key as 220 that has an encrypted parent. 226 feature allows for the creation of encrypted filesystems and volumes. 234 encrypted). 245 Creating an encrypted dataset requires specifying the 279 Normally checksums in ZFS are 256 bits long, but for encrypted data 287 There are a few limitations on encrypted datasets. 288 Encrypted data cannot be embedded via the 291 Encrypted datasets may not have
|
H A D | zfs-change-key.8 | 183 Newly-written data will continue to be encrypted with the same master key as 220 that has an encrypted parent. 226 feature allows for the creation of encrypted filesystems and volumes. 234 encrypted). 245 Creating an encrypted dataset requires specifying the 279 Normally checksums in ZFS are 256 bits long, but for encrypted data 287 There are a few limitations on encrypted datasets. 288 Encrypted data cannot be embedded via the 291 Encrypted datasets may not have
|
H A D | zfs-load-key.8 | 183 Newly-written data will continue to be encrypted with the same master key as 220 that has an encrypted parent. 226 feature allows for the creation of encrypted filesystems and volumes. 234 encrypted). 245 Creating an encrypted dataset requires specifying the 279 Normally checksums in ZFS are 256 bits long, but for encrypted data 287 There are a few limitations on encrypted datasets. 288 Encrypted data cannot be embedded via the 291 Encrypted datasets may not have
|