/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/userquota/ |
H A D | userspace_encrypted.ksh | 22 # 'zfs userspace' and 'zfs groupspace' can be used on encrypted datasets 26 # 1. Create both un-encrypted and encrypted datasets 27 # 2. Receive un-encrypted dataset in encrypted hierarchy 28 # 3. Verify encrypted datasets support 'zfs userspace' and 'zfs groupspace' 53 log_assert "'zfs user/groupspace' should work on encrypted datasets" 61 # 1. Create both un-encrypted and encrypted datasets 68 # 2. Receive un-encrypted dataset in encrypted hierarchy 73 # 3. Verify encrypted datasets support 'zfs userspace' and 84 log_pass "'zfs user/groupspace' works on encrypted datasets"
|
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/ |
H A D | zfs_receive_to_encrypted.ksh | 25 # ZFS should receive to an encrypted child dataset. 29 # 2. Create an encrypted dataset 30 # 3. Attempt to receive a stream to an encrypted child 32 # 5. Attempt to receive an incremental stream to an encrypted child (must fail) 37 # 10. Attempt to receive a snapshot stream to an encrypted child (must fail) 44 datasetexists $TESTPOOL/encrypted && \ 45 destroy_dataset $TESTPOOL/encrypted -r 56 log_assert "ZFS should receive encrypted filesystems into child dataset" 69 log_note "Verifying ZFS will receive to an encrypted child" 78 log_note "Verifying ZFS will not receive an incremental into an encrypted" \ [all …]
|
H A D | zfs_receive_from_encrypted.ksh | 25 # ZFS should receive an unencrypted stream from an encrypted dataset 29 # 2. Create an encrypted dataset 30 # 3. Create and checksum a file on the encrypted dataset 31 # 4. Snapshot the encrypted dataset 35 # 8. Attempt to receive the snapshot into an encrypted child 52 log_assert "ZFS should receive an unencrypted stream from an encrypted dataset" 70 [[ "$crypt" == "off" ]] || log_fail "Received unencrypted stream as encrypted" 76 log_note "Verify ZFS can receive into an encrypted child" 83 log_pass "ZFS can receive an unencrypted stream from an encrypted dataset"
|
/freebsd-src/contrib/file/magic/Magdir/ |
H A D | pgp | 9 0 beshort 0xa600 PGP encrypted data 10 #!:mime application/pgp-encrypted 31 # https://reposcope.com/mimetype/application/pgp-encrypted 33 !:mime application/pgp-encrypted 58 >0 byte 0x68 Public-Key Encrypted Session Key (old) 60 >0 byte 0x6a Symmetric-Key Encrypted Session Key (old) 66 >0 byte 0x70 Symmetrically Encrypted Data (old) 75 >>1 byte&0xc0 0x40 Public-Key Encrypted Session Key 77 >>1 byte&0xc0 0xc0 Symmetric-Key Encrypted Session Key 85 >>1 byte&0xc0 0x40 Symmetrically Encrypted Dat [all...] |
H A D | gnu | 122 0 beshort 0x8502 GPG encrypted data 138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher) 139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher) 140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher) 141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher) 142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher) 143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher) 144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher) 145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher) 146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher) [all …]
|
H A D | aes | 5 # aes: magic file for AES encrypted files 7 # Summary: AES Crypt Encrypted Data File 12 >3 ubyte <3 AES encrypted data, version %u 14 !:mime application/x-aes-encrypted 16 # For Version 2 the encrypted file can have text tags
|
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/ |
H A D | send_encrypted_incremental.ksh | 28 # Incrementally receiving a snapshot to an encrypted filesystem succeeds. 31 # 1) Create a pool and an encrypted fs 33 # 3) Send the first snapshot to a second encrypted as well as an 36 # 5) Rollback the second encrypted fs to the first snapshot. 38 # second encrypted fs. 39 # 7) Incrementally send the third snapshot from the first encrypted to the 42 # encrypted fs. 47 log_assert "Incrementally receiving a snapshot to an encrypted filesystem succeeds" 93 log_pass "Incrementally receiving a snapshot to an encrypted filesystem succeeds"
|
H A D | send_encrypted_props.ksh | 29 # 1. Create a few unencrypted and encrypted test datasets with some data 86 # Embedded data is incompatible with encrypted datasets, so we cannot 88 log_note "Must not be able to receive an embedded stream as encrypted" 136 # Test that we can override sharesmb property for encrypted raw stream. 137 log_note "Must be able to override sharesmb property for encrypted raw stream" 179 # settings, receiving it as an encrypted child. 180 log_note "Must be able to receive stream with props to encrypted child" 193 # settings, receiving all datasets as encrypted children. 194 log_note "Must be able to receive recursive stream to encrypted child" 207 # encryption settings, receiving all datasets as encrypted childre [all...] |
H A D | send_raw_ashift.ksh | 25 # Verify encrypted raw sending to pools with greater ashift succeeds. 29 # encrypted filesystem. 33 # 4) Repeat the test for a non-encrypted filesystem using raw send 161 # Create encrypted fs 166 # Run xattr tests for encrypted fs 169 # Calculate the expected recursive checksum for source encrypted fs 172 # Mount target encrypted fs 185 # Run xattr tests for non-encrypted fs 188 # Calculate the expected recursive checksum for source non-encrypted fs
|
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_clone/ |
H A D | zfs_clone_encrypted.ksh | 26 # 'zfs clone' should create encrypted clones of encrypted datasets 29 # 1. Create an encrypted dataset 34 # 6. Attempt to clone the snapshot as a child of an encrypted dataset 53 log_assert "'zfs clone' should create encrypted clones of encrypted datasets" 83 log_pass "'zfs clone' creates encrypted clones of encrypted datasets"
|
/freebsd-src/lib/geom/eli/ |
H A D | geli.8 | 208 Allows the encrypted Master Key to be backed up and restored, 222 Allows suspending and resuming encrypted devices. 230 Initialize providers which need to be encrypted. 267 This makes it possible to use an encrypted root partition. 290 When entering the passphrase to boot from this encrypted root filesystem, echo 307 Enable booting from this encrypted root filesystem. 310 from the encrypted partition. 366 By default, if the underlying provider grows, the encrypted provider will 370 size, attaching encrypted provider will no longer be possible as the metadata 402 The encrypted Master Keys are loaded from the metadata and decrypted [all …]
|
/freebsd-src/sbin/dumpon/ |
H A D | dumpon.8 | 111 Configure encrypted kernel dumps. 120 The encrypted dump contents consist of a standard dump header, the 121 pubkey-encrypted symmetric key contents, and the symmetric key encrypted core 132 Select the symmetric algorithm used for encrypted kernel crash dump. 260 to configure encrypted kernel crash dumps: 264 It is recommended to test if the kernel saves encrypted crash dumps using the 388 Support for encrypted kernel core dumps and netdump was added in 399 To configure encrypted kernel core dumps, the running kernel must have been 432 The current encrypted kernel core dump scheme does not provide integrity nor 434 That is, the recipient of an encrypted kernel core dump cannot know if they [all …]
|
/freebsd-src/crypto/openssl/util/perl/TLSProxy/ |
H A D | Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_rename/ |
H A D | zfs_rename_to_encrypted.ksh | 27 # of an encrypted dataset 30 # 1. Create an encrypted dataset 31 # 2. Rename the default dataset to a child of the encrypted dataset 45 "child of an encrypted dataset" 53 "of an encrypted dataset"
|
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_scrub/ |
H A D | zpool_scrub_encrypted_unloaded.ksh | 25 # Scrubs must work on an encrypted dataset with an unloaded key. 28 # 1. Create an encrypted dataset 30 # 3. Unmount the encrypted dataset and unload its key 46 log_assert "Scrubs must work on an encrypted dataset with an unloaded key" 67 log_pass "Scrubs work on an encrypted dataset with an unloaded key"
|
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_split/ |
H A D | zpool_split_encryption.ksh | 22 # 'zpool split' should be able to split encrypted pools 25 # 1. Create an encrypted pool 38 log_assert "'zpool split' should be able to split encrypted pools" 46 # 1. Create an encrypted pool 59 log_pass "'zpool split' can split encrypted pools"
|
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/l2arc/ |
H A D | persist_l2arc_002_pos.ksh | 27 # Persistent L2ARC with an encrypted ZFS file system succeeds 31 # 2. Create a an encrypted ZFS file system. 32 # 3. Create a random file in the encrypted file system and random 38 # 6. Mount the encrypted ZFS file system. 57 log_assert "Persistent L2ARC with an encrypted ZFS file system succeeds." 116 log_pass "Persistent L2ARC with an encrypted ZFS file system succeeds."
|
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zdb/ |
H A D | zdb_encrypted.ksh | 30 # 1. Create an encrypted dataset 51 log_assert "'zdb -K' should enable reading from an encrypted dataset" 56 echo 'my great encrypted text' > $file 65 log_must eval "zdb -dddd $dataset $obj | grep -q 'object encrypted'" 69 log_pass "'zdb -K' enables reading from an encrypted dataset"
|
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_diff/ |
H A D | zfs_diff_encrypted.ksh | 21 # 'zfs diff' should work with encrypted datasets 24 # 1. Create an encrypted dataset 38 log_assert "'zfs diff' should work with encrypted datasets" 41 # 1. Create an encrypted dataset 63 log_pass "'zfs diff' works with encrypted datasets"
|
/freebsd-src/crypto/heimdal/lib/krb5/ |
H A D | krb5.h | 188 /* AS-REQ PA-ENC-TIMESTAMP padata timestamp, encrypted with the 192 application session key), encrypted with the service key 195 /* AS-REP encrypted part (includes tgs session key or application 196 session key), encrypted with the client key (section 5.4.2) */ 198 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs 201 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs 208 authenticator subkey), encrypted with the tgs session key 211 /* TGS-REP encrypted part (includes application session key), 212 encrypted with the tgs session key (section 5.4.2) */ 214 /* TGS-REP encrypted part (includes application session key), [all …]
|
/freebsd-src/sys/contrib/openzfs/man/man8/ |
H A D | zfs-unload-key.8 | 182 Newly-written data will continue to be encrypted with the same master key as 219 that has an encrypted parent. 225 feature allows for the creation of encrypted filesystems and volumes. 233 encrypted). 244 Creating an encrypted dataset requires specifying the 278 Normally checksums in ZFS are 256 bits long, but for encrypted data 286 There are a few limitations on encrypted datasets. 287 Encrypted data cannot be embedded via the 290 Encrypted datasets may not have
|
H A D | zfs-change-key.8 | 182 Newly-written data will continue to be encrypted with the same master key as 219 that has an encrypted parent. 225 feature allows for the creation of encrypted filesystems and volumes. 233 encrypted). 244 Creating an encrypted dataset requires specifying the 278 Normally checksums in ZFS are 256 bits long, but for encrypted data 286 There are a few limitations on encrypted datasets. 287 Encrypted data cannot be embedded via the 290 Encrypted datasets may not have
|
H A D | zfs-load-key.8 | 182 Newly-written data will continue to be encrypted with the same master key as 219 that has an encrypted parent. 225 feature allows for the creation of encrypted filesystems and volumes. 233 encrypted). 244 Creating an encrypted dataset requires specifying the 278 Normally checksums in ZFS are 256 bits long, but for encrypted data 286 There are a few limitations on encrypted datasets. 287 Encrypted data cannot be embedded via the 290 Encrypted datasets may not have
|
/freebsd-src/usr.bin/enigma/ |
H A D | enigma.1 | 37 Since its operation is fully symmetrical, feeding the encrypted data 97 man enigma | enigma > encrypted 101 This will create an encrypted form of this man page, and store it in 103 .Pa encrypted . 105 enigma XXX < encrypted
|
/freebsd-src/crypto/openssl/doc/man3/ |
H A D | EVP_SealInit.pod | 23 encrypted using this key. 27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted 28 using one or more public keys, this allows the same encrypted data to be 30 buffers where the public key encrypted secret key will be written, each buffer 31 must contain enough room for the corresponding encrypted key: that is 33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
|