Home
last modified time | relevance | path

Searched full:encrypted (Results 1 – 25 of 1134) sorted by relevance

12345678910>>...46

/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/userquota/
H A Duserspace_encrypted.ksh23 # 'zfs userspace' and 'zfs groupspace' can be used on encrypted datasets
27 # 1. Create both un-encrypted and encrypted datasets
28 # 2. Receive un-encrypted dataset in encrypted hierarchy
29 # 3. Verify encrypted datasets support 'zfs userspace' and 'zfs groupspace'
54 log_assert "'zfs user/groupspace' should work on encrypted datasets"
62 # 1. Create both un-encrypted and encrypted datasets
69 # 2. Receive un-encrypted dataset in encrypted hierarchy
74 # 3. Verify encrypted datasets support 'zfs userspace' and
85 log_pass "'zfs user/groupspace' works on encrypted datasets"
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/
H A Dzfs_receive_to_encrypted.ksh26 # ZFS should receive to an encrypted child dataset.
30 # 2. Create an encrypted dataset
31 # 3. Attempt to receive a stream to an encrypted child
33 # 5. Attempt to receive an incremental stream to an encrypted child (must fail)
38 # 10. Attempt to receive a snapshot stream to an encrypted child (must fail)
45 datasetexists $TESTPOOL/encrypted && \
46 destroy_dataset $TESTPOOL/encrypted -r
57 log_assert "ZFS should receive encrypted filesystems into child dataset"
70 log_note "Verifying ZFS will receive to an encrypted child"
79 log_note "Verifying ZFS will not receive an incremental into an encrypted" \
[all …]
H A Dzfs_receive_from_encrypted.ksh26 # ZFS should receive an unencrypted stream from an encrypted dataset
30 # 2. Create an encrypted dataset
31 # 3. Create and checksum a file on the encrypted dataset
32 # 4. Snapshot the encrypted dataset
36 # 8. Attempt to receive the snapshot into an encrypted child
53 log_assert "ZFS should receive an unencrypted stream from an encrypted dataset"
71 [[ "$crypt" == "off" ]] || log_fail "Received unencrypted stream as encrypted"
77 log_note "Verify ZFS can receive into an encrypted child"
84 log_pass "ZFS can receive an unencrypted stream from an encrypted dataset"
/freebsd/contrib/file/magic/Magdir/
H A Dpgp9 0 beshort 0xa600 PGP encrypted data
10 #!:mime application/pgp-encrypted
31 # https://reposcope.com/mimetype/application/pgp-encrypted
33 !:mime application/pgp-encrypted
58 >0 byte 0x68 Public-Key Encrypted Session Key (old)
60 >0 byte 0x6a Symmetric-Key Encrypted Session Key (old)
66 >0 byte 0x70 Symmetrically Encrypted Data (old)
75 >>1 byte&0xc0 0x40 Public-Key Encrypted Session Key
77 >>1 byte&0xc0 0xc0 Symmetric-Key Encrypted Session Key
85 >>1 byte&0xc0 0x40 Symmetrically Encrypted Data
[all …]
H A Dgnu122 0 beshort 0x8502 GPG encrypted data
138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher)
139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher)
140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher)
141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher)
142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher)
143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher)
144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher)
145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher)
146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher)
[all …]
H A Daes5 # aes: magic file for AES encrypted files
7 # Summary: AES Crypt Encrypted Data File
12 >3 ubyte <3 AES encrypted data, version %u
14 !:mime application/x-aes-encrypted
16 # For Version 2 the encrypted file can have text tags
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/
H A Dsend_encrypted_incremental.ksh29 # Incrementally receiving a snapshot to an encrypted filesystem succeeds.
32 # 1) Create a pool and an encrypted fs
34 # 3) Send the first snapshot to a second encrypted as well as an
37 # 5) Rollback the second encrypted fs to the first snapshot.
39 # second encrypted fs.
40 # 7) Incrementally send the third snapshot from the first encrypted to the
43 # encrypted fs.
48 log_assert "Incrementally receiving a snapshot to an encrypted filesystem succeeds"
94 log_pass "Incrementally receiving a snapshot to an encrypted filesystem succeeds"
H A Dsend_raw_ashift.ksh26 # Verify encrypted raw sending to pools with greater ashift succeeds.
30 # encrypted filesystem.
34 # 4) Repeat the test for a non-encrypted filesystem using raw send
162 # Create encrypted fs
167 # Run xattr tests for encrypted fs
170 # Calculate the expected recursive checksum for source encrypted fs
173 # Mount target encrypted fs
186 # Run xattr tests for non-encrypted fs
189 # Calculate the expected recursive checksum for source non-encrypted fs
H A Dsend_encrypted_props.ksh30 # 1. Create a few unencrypted and encrypted test datasets with some data
87 # Embedded data is incompatible with encrypted datasets, so we cannot
89 log_note "Must not be able to receive an embedded stream as encrypted"
137 # Test that we can override sharesmb property for encrypted raw stream.
138 log_note "Must be able to override sharesmb property for encrypted raw stream"
180 # settings, receiving it as an encrypted child.
181 log_note "Must be able to receive stream with props to encrypted child"
194 # settings, receiving all datasets as encrypted children.
195 log_note "Must be able to receive recursive stream to encrypted child"
208 # encryption settings, receiving all datasets as encrypted children.
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_clone/
H A Dzfs_clone_encrypted.ksh27 # 'zfs clone' should create encrypted clones of encrypted datasets
30 # 1. Create an encrypted dataset
35 # 6. Attempt to clone the snapshot as a child of an encrypted dataset
54 log_assert "'zfs clone' should create encrypted clones of encrypted datasets"
84 log_pass "'zfs clone' creates encrypted clones of encrypted datasets"
/freebsd/lib/geom/eli/
H A Dgeli.8208 Allows the encrypted Master Key to be backed up and restored,
222 Allows suspending and resuming encrypted devices.
230 Initialize providers which need to be encrypted.
267 This makes it possible to use an encrypted root partition.
290 When entering the passphrase to boot from this encrypted root filesystem, echo
307 Enable booting from this encrypted root filesystem.
310 from the encrypted partition.
366 By default, if the underlying provider grows, the encrypted provider will
370 size, attaching encrypted provider will no longer be possible as the metadata
402 The encrypted Master Keys are loaded from the metadata and decrypted
[all …]
/freebsd/sbin/dumpon/
H A Ddumpon.8111 Configure encrypted kernel dumps.
120 The encrypted dump contents consist of a standard dump header, the
121 pubkey-encrypted symmetric key contents, and the symmetric key encrypted core
132 Select the symmetric algorithm used for encrypted kernel crash dump.
260 to configure encrypted kernel crash dumps:
264 It is recommended to test if the kernel saves encrypted crash dumps using the
388 Support for encrypted kernel core dumps and netdump was added in
399 To configure encrypted kernel core dumps, the running kernel must have been
432 The current encrypted kernel core dump scheme does not provide integrity nor
434 That is, the recipient of an encrypted kernel core dump cannot know if they
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zdb/
H A Dzdb_encrypted_raw.ksh27 # 'zdb -K ...' should enable reading from a raw-encrypted dataset
30 # 1. Create an encrypted dataset
53 log_assert "'zdb -K' should enable reading from a raw-encrypted dataset"
62 echo 'my great encrypted text' > "$file"
71 log_must eval "zdb -dddd $dataset $obj | grep -q 'object encrypted'"
75 log_pass "'zdb -K' enables reading from a raw-encrypted dataset"
H A Dzdb_encrypted.ksh31 # 1. Create an encrypted dataset
52 log_assert "'zdb -K' should enable reading from an encrypted dataset"
57 echo 'my great encrypted text' > $file
66 log_must eval "zdb -dddd $dataset $obj | grep -q 'object encrypted'"
70 log_pass "'zdb -K' enables reading from an encrypted dataset"
/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DAlert.pm16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
/freebsd/share/man/man4/
H A Dgbde.4
/freebsd/contrib/libarchive/libarchive/test/
H A Dtest_read_format_rar_encryption.c30 …lid archives or archives or archives where filenames are encrypted, all four files are encrypted w…
31 …d". For non-solid archives without filename encryption, a.txt and c.txt are not encrypted, b.txt is
32 * encrypted with the password "password", and d.txt is encrypted with the password "password2".
44 …/* We should only ever fail to read the header when filenames are encrypted. Otherwise we're faili… in test_encrypted_rar_archive()
48 /* We should only ever fail to read the data for "a.txt" and "c.txt" if they are encrypted */ in test_encrypted_rar_archive()
49 /* NOTE: We'll never attempt this when filenames are encrypted, so we only check for solid here */ in test_encrypted_rar_archive()
70 * are encrypted */ in test_encrypted_rar_archive()
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_rename/
H A Dzfs_rename_to_encrypted.ksh28 # of an encrypted dataset
31 # 1. Create an encrypted dataset
32 # 2. Rename the default dataset to a child of the encrypted dataset
46 "child of an encrypted dataset"
54 "of an encrypted dataset"
/freebsd/crypto/heimdal/lib/krb5/
H A Dkrb5.h188 /* AS-REQ PA-ENC-TIMESTAMP padata timestamp, encrypted with the
192 application session key), encrypted with the service key
195 /* AS-REP encrypted part (includes tgs session key or application
196 session key), encrypted with the client key (section 5.4.2) */
198 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
201 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
208 authenticator subkey), encrypted with the tgs session key
211 /* TGS-REP encrypted part (includes application session key),
212 encrypted with the tgs session key (section 5.4.2) */
214 /* TGS-REP encrypted part (includes application session key),
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/l2arc/
H A Dpersist_l2arc_002_pos.ksh28 # Persistent L2ARC with an encrypted ZFS file system succeeds
32 # 2. Create a an encrypted ZFS file system.
33 # 3. Create a random file in the encrypted file system and random
39 # 6. Mount the encrypted ZFS file system.
58 log_assert "Persistent L2ARC with an encrypted ZFS file system succeeds."
117 log_pass "Persistent L2ARC with an encrypted ZFS file system succeeds."
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_split/
H A Dzpool_split_encryption.ksh23 # 'zpool split' should be able to split encrypted pools
26 # 1. Create an encrypted pool
39 log_assert "'zpool split' should be able to split encrypted pools"
47 # 1. Create an encrypted pool
60 log_pass "'zpool split' can split encrypted pools"
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_scrub/
H A Dzpool_scrub_encrypted_unloaded.ksh26 # Scrubs must work on an encrypted dataset with an unloaded key.
29 # 1. Create an encrypted dataset
31 # 3. Unmount the encrypted dataset and unload its key
47 log_assert "Scrubs must work on an encrypted dataset with an unloaded key"
68 log_pass "Scrubs work on an encrypted dataset with an unloaded key"
/freebsd/sys/contrib/openzfs/man/man8/
H A Dzfs-unload-key.8183 Newly-written data will continue to be encrypted with the same master key as
220 that has an encrypted parent.
226 feature allows for the creation of encrypted filesystems and volumes.
234 encrypted).
245 Creating an encrypted dataset requires specifying the
279 Normally checksums in ZFS are 256 bits long, but for encrypted data
287 There are a few limitations on encrypted datasets.
288 Encrypted data cannot be embedded via the
291 Encrypted datasets may not have
H A Dzfs-change-key.8183 Newly-written data will continue to be encrypted with the same master key as
220 that has an encrypted parent.
226 feature allows for the creation of encrypted filesystems and volumes.
234 encrypted).
245 Creating an encrypted dataset requires specifying the
279 Normally checksums in ZFS are 256 bits long, but for encrypted data
287 There are a few limitations on encrypted datasets.
288 Encrypted data cannot be embedded via the
291 Encrypted datasets may not have
H A Dzfs-load-key.8183 Newly-written data will continue to be encrypted with the same master key as
220 that has an encrypted parent.
226 feature allows for the creation of encrypted filesystems and volumes.
234 encrypted).
245 Creating an encrypted dataset requires specifying the
279 Normally checksums in ZFS are 256 bits long, but for encrypted data
287 There are a few limitations on encrypted datasets.
288 Encrypted data cannot be embedded via the
291 Encrypted datasets may not have

12345678910>>...46