Home
last modified time | relevance | path

Searched full:encrypted (Results 1 – 25 of 967) sorted by relevance

12345678910>>...39

/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/userquota/
H A Duserspace_encrypted.ksh22 # 'zfs userspace' and 'zfs groupspace' can be used on encrypted datasets
26 # 1. Create both un-encrypted and encrypted datasets
27 # 2. Receive un-encrypted dataset in encrypted hierarchy
28 # 3. Verify encrypted datasets support 'zfs userspace' and 'zfs groupspace'
53 log_assert "'zfs user/groupspace' should work on encrypted datasets"
61 # 1. Create both un-encrypted and encrypted datasets
68 # 2. Receive un-encrypted dataset in encrypted hierarchy
73 # 3. Verify encrypted datasets support 'zfs userspace' and
84 log_pass "'zfs user/groupspace' works on encrypted datasets"
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_receive/
H A Dzfs_receive_to_encrypted.ksh25 # ZFS should receive to an encrypted child dataset.
29 # 2. Create an encrypted dataset
30 # 3. Attempt to receive a stream to an encrypted child
32 # 5. Attempt to receive an incremental stream to an encrypted child (must fail)
37 # 10. Attempt to receive a snapshot stream to an encrypted child (must fail)
44 datasetexists $TESTPOOL/encrypted && \
45 destroy_dataset $TESTPOOL/encrypted -r
56 log_assert "ZFS should receive encrypted filesystems into child dataset"
69 log_note "Verifying ZFS will receive to an encrypted child"
78 log_note "Verifying ZFS will not receive an incremental into an encrypted" \
[all …]
H A Dzfs_receive_from_encrypted.ksh25 # ZFS should receive an unencrypted stream from an encrypted dataset
29 # 2. Create an encrypted dataset
30 # 3. Create and checksum a file on the encrypted dataset
31 # 4. Snapshot the encrypted dataset
35 # 8. Attempt to receive the snapshot into an encrypted child
52 log_assert "ZFS should receive an unencrypted stream from an encrypted dataset"
70 [[ "$crypt" == "off" ]] || log_fail "Received unencrypted stream as encrypted"
76 log_note "Verify ZFS can receive into an encrypted child"
83 log_pass "ZFS can receive an unencrypted stream from an encrypted dataset"
/freebsd-src/contrib/file/magic/Magdir/
H A Dpgp9 0 beshort 0xa600 PGP encrypted data
10 #!:mime application/pgp-encrypted
31 # https://reposcope.com/mimetype/application/pgp-encrypted
33 !:mime application/pgp-encrypted
58 >0 byte 0x68 Public-Key Encrypted Session Key (old)
60 >0 byte 0x6a Symmetric-Key Encrypted Session Key (old)
66 >0 byte 0x70 Symmetrically Encrypted Data (old)
75 >>1 byte&0xc0 0x40 Public-Key Encrypted Session Key
77 >>1 byte&0xc0 0xc0 Symmetric-Key Encrypted Session Key
85 >>1 byte&0xc0 0x40 Symmetrically Encrypted Dat
[all...]
H A Dgnu122 0 beshort 0x8502 GPG encrypted data
138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher)
139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher)
140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher)
141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher)
142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher)
143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher)
144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher)
145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher)
146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher)
[all …]
H A Daes5 # aes: magic file for AES encrypted files
7 # Summary: AES Crypt Encrypted Data File
12 >3 ubyte <3 AES encrypted data, version %u
14 !:mime application/x-aes-encrypted
16 # For Version 2 the encrypted file can have text tags
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/rsend/
H A Dsend_encrypted_incremental.ksh28 # Incrementally receiving a snapshot to an encrypted filesystem succeeds.
31 # 1) Create a pool and an encrypted fs
33 # 3) Send the first snapshot to a second encrypted as well as an
36 # 5) Rollback the second encrypted fs to the first snapshot.
38 # second encrypted fs.
39 # 7) Incrementally send the third snapshot from the first encrypted to the
42 # encrypted fs.
47 log_assert "Incrementally receiving a snapshot to an encrypted filesystem succeeds"
93 log_pass "Incrementally receiving a snapshot to an encrypted filesystem succeeds"
H A Dsend_encrypted_props.ksh29 # 1. Create a few unencrypted and encrypted test datasets with some data
86 # Embedded data is incompatible with encrypted datasets, so we cannot
88 log_note "Must not be able to receive an embedded stream as encrypted"
136 # Test that we can override sharesmb property for encrypted raw stream.
137 log_note "Must be able to override sharesmb property for encrypted raw stream"
179 # settings, receiving it as an encrypted child.
180 log_note "Must be able to receive stream with props to encrypted child"
193 # settings, receiving all datasets as encrypted children.
194 log_note "Must be able to receive recursive stream to encrypted child"
207 # encryption settings, receiving all datasets as encrypted childre
[all...]
H A Dsend_raw_ashift.ksh25 # Verify encrypted raw sending to pools with greater ashift succeeds.
29 # encrypted filesystem.
33 # 4) Repeat the test for a non-encrypted filesystem using raw send
161 # Create encrypted fs
166 # Run xattr tests for encrypted fs
169 # Calculate the expected recursive checksum for source encrypted fs
172 # Mount target encrypted fs
185 # Run xattr tests for non-encrypted fs
188 # Calculate the expected recursive checksum for source non-encrypted fs
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_clone/
H A Dzfs_clone_encrypted.ksh26 # 'zfs clone' should create encrypted clones of encrypted datasets
29 # 1. Create an encrypted dataset
34 # 6. Attempt to clone the snapshot as a child of an encrypted dataset
53 log_assert "'zfs clone' should create encrypted clones of encrypted datasets"
83 log_pass "'zfs clone' creates encrypted clones of encrypted datasets"
/freebsd-src/lib/geom/eli/
H A Dgeli.8208 Allows the encrypted Master Key to be backed up and restored,
222 Allows suspending and resuming encrypted devices.
230 Initialize providers which need to be encrypted.
267 This makes it possible to use an encrypted root partition.
290 When entering the passphrase to boot from this encrypted root filesystem, echo
307 Enable booting from this encrypted root filesystem.
310 from the encrypted partition.
366 By default, if the underlying provider grows, the encrypted provider will
370 size, attaching encrypted provider will no longer be possible as the metadata
402 The encrypted Master Keys are loaded from the metadata and decrypted
[all …]
/freebsd-src/sbin/dumpon/
H A Ddumpon.8111 Configure encrypted kernel dumps.
120 The encrypted dump contents consist of a standard dump header, the
121 pubkey-encrypted symmetric key contents, and the symmetric key encrypted core
132 Select the symmetric algorithm used for encrypted kernel crash dump.
260 to configure encrypted kernel crash dumps:
264 It is recommended to test if the kernel saves encrypted crash dumps using the
388 Support for encrypted kernel core dumps and netdump was added in
399 To configure encrypted kernel core dumps, the running kernel must have been
432 The current encrypted kernel core dump scheme does not provide integrity nor
434 That is, the recipient of an encrypted kernel core dump cannot know if they
[all …]
/freebsd-src/crypto/openssl/util/perl/TLSProxy/
H A DAlert.pm16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_rename/
H A Dzfs_rename_to_encrypted.ksh27 # of an encrypted dataset
30 # 1. Create an encrypted dataset
31 # 2. Rename the default dataset to a child of the encrypted dataset
45 "child of an encrypted dataset"
53 "of an encrypted dataset"
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_scrub/
H A Dzpool_scrub_encrypted_unloaded.ksh25 # Scrubs must work on an encrypted dataset with an unloaded key.
28 # 1. Create an encrypted dataset
30 # 3. Unmount the encrypted dataset and unload its key
46 log_assert "Scrubs must work on an encrypted dataset with an unloaded key"
67 log_pass "Scrubs work on an encrypted dataset with an unloaded key"
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_split/
H A Dzpool_split_encryption.ksh22 # 'zpool split' should be able to split encrypted pools
25 # 1. Create an encrypted pool
38 log_assert "'zpool split' should be able to split encrypted pools"
46 # 1. Create an encrypted pool
59 log_pass "'zpool split' can split encrypted pools"
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/l2arc/
H A Dpersist_l2arc_002_pos.ksh27 # Persistent L2ARC with an encrypted ZFS file system succeeds
31 # 2. Create a an encrypted ZFS file system.
32 # 3. Create a random file in the encrypted file system and random
38 # 6. Mount the encrypted ZFS file system.
57 log_assert "Persistent L2ARC with an encrypted ZFS file system succeeds."
116 log_pass "Persistent L2ARC with an encrypted ZFS file system succeeds."
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zdb/
H A Dzdb_encrypted.ksh30 # 1. Create an encrypted dataset
51 log_assert "'zdb -K' should enable reading from an encrypted dataset"
56 echo 'my great encrypted text' > $file
65 log_must eval "zdb -dddd $dataset $obj | grep -q 'object encrypted'"
69 log_pass "'zdb -K' enables reading from an encrypted dataset"
/freebsd-src/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_diff/
H A Dzfs_diff_encrypted.ksh21 # 'zfs diff' should work with encrypted datasets
24 # 1. Create an encrypted dataset
38 log_assert "'zfs diff' should work with encrypted datasets"
41 # 1. Create an encrypted dataset
63 log_pass "'zfs diff' works with encrypted datasets"
/freebsd-src/crypto/heimdal/lib/krb5/
H A Dkrb5.h188 /* AS-REQ PA-ENC-TIMESTAMP padata timestamp, encrypted with the
192 application session key), encrypted with the service key
195 /* AS-REP encrypted part (includes tgs session key or application
196 session key), encrypted with the client key (section 5.4.2) */
198 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
201 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
208 authenticator subkey), encrypted with the tgs session key
211 /* TGS-REP encrypted part (includes application session key),
212 encrypted with the tgs session key (section 5.4.2) */
214 /* TGS-REP encrypted part (includes application session key),
[all …]
/freebsd-src/sys/contrib/openzfs/man/man8/
H A Dzfs-unload-key.8182 Newly-written data will continue to be encrypted with the same master key as
219 that has an encrypted parent.
225 feature allows for the creation of encrypted filesystems and volumes.
233 encrypted).
244 Creating an encrypted dataset requires specifying the
278 Normally checksums in ZFS are 256 bits long, but for encrypted data
286 There are a few limitations on encrypted datasets.
287 Encrypted data cannot be embedded via the
290 Encrypted datasets may not have
H A Dzfs-change-key.8182 Newly-written data will continue to be encrypted with the same master key as
219 that has an encrypted parent.
225 feature allows for the creation of encrypted filesystems and volumes.
233 encrypted).
244 Creating an encrypted dataset requires specifying the
278 Normally checksums in ZFS are 256 bits long, but for encrypted data
286 There are a few limitations on encrypted datasets.
287 Encrypted data cannot be embedded via the
290 Encrypted datasets may not have
H A Dzfs-load-key.8182 Newly-written data will continue to be encrypted with the same master key as
219 that has an encrypted parent.
225 feature allows for the creation of encrypted filesystems and volumes.
233 encrypted).
244 Creating an encrypted dataset requires specifying the
278 Normally checksums in ZFS are 256 bits long, but for encrypted data
286 There are a few limitations on encrypted datasets.
287 Encrypted data cannot be embedded via the
290 Encrypted datasets may not have
/freebsd-src/usr.bin/enigma/
H A Denigma.137 Since its operation is fully symmetrical, feeding the encrypted data
97 man enigma | enigma > encrypted
101 This will create an encrypted form of this man page, and store it in
103 .Pa encrypted .
105 enigma XXX < encrypted
/freebsd-src/crypto/openssl/doc/man3/
H A DEVP_SealInit.pod23 encrypted using this key.
27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted
28 using one or more public keys, this allows the same encrypted data to be
30 buffers where the public key encrypted secret key will be written, each buffer
31 must contain enough room for the corresponding encrypted key: that is
33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is

12345678910>>...39