/dflybsd-src/crypto/openssh/ |
H A D | PROTOCOL.chacha20poly1305 | 2 encryption cipher supported by OpenSSH. 17 authenticated encryption mode. The construction used is based on that 19 data passed to the MAC and in the addition of encryption of the packet 25 The chacha20-poly1305@openssh.com offers both encryption and 60 for encryption of the packet payload. 87 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
|
H A D | PROTOCOL.key | 65 5. No encryption
|
/dflybsd-src/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all …]
|
H A D | README | 220 hardware. It still uses RC4 for the encryption like WEP, but with 232 Handshake) for generating and exchanging data encryption keys between 248 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 281 - wpa_supplicant configures encryption keys for unicast and broadcast
|
/dflybsd-src/bin/ed/ |
H A D | POSIX | 29 encryption. The `x' command prompts the user to enter a key used for 31 is entered as the key, then encryption is disabled. Otherwise, a key 33 effect until encryption is disabled. For more information on the 34 encryption algorithm, see the bdes(1) man page. Encryption/decryption
|
H A D | README | 12 DES - to add encryption support (requires crypt(3))
|
/dflybsd-src/crypto/libressl/crypto/evp/ |
H A D | p5_crpt2.c | 200 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); in PKCS5_v2_PBE_keyivgen() 210 if (EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { in PKCS5_v2_PBE_keyivgen()
|
/dflybsd-src/contrib/file/magic/Magdir/ |
H A D | bsi | 1 # Chiasmus is an encryption standard developed by the German Federal
|
H A D | ssh | 33 # next line says "Encryption: " plus an encryption type like aes256-cbc or none
|
H A D | android | 61 # The 4th line is encryption "none" or "AES-256" 64 # look for backup content after line with encryption info
|
H A D | pci_ids | 100 >>0 ubyte 0x10 encryption controller
|
H A D | gnu | 135 # Symmetric encryption
|
H A D | windows | 573 # bCryptMethod: 0~No encryption 1~encryption with permutation 2~encryption with cyclic 16~encryptio…
|
/dflybsd-src/contrib/libarchive/libarchive/ |
H A D | archive_entry.c | 210 entry2->encryption = entry->encryption; in archive_entry_clone() 791 return ((entry->encryption & AE_ENCRYPTION_DATA) == AE_ENCRYPTION_DATA); in archive_entry_is_data_encrypted() 797 return ((entry->encryption & AE_ENCRYPTION_METADATA) == AE_ENCRYPTION_METADATA); in archive_entry_is_metadata_encrypted() 803 return (entry->encryption & (AE_ENCRYPTION_DATA|AE_ENCRYPTION_METADATA)); in archive_entry_is_encrypted() 1384 entry->encryption |= AE_ENCRYPTION_DATA; in archive_entry_set_is_data_encrypted() 1386 entry->encryption &= ~AE_ENCRYPTION_DATA; in archive_entry_set_is_data_encrypted() 1394 entry->encryption |= AE_ENCRYPTION_METADATA; in archive_entry_set_is_metadata_encrypted() 1396 entry->encryption &= ~AE_ENCRYPTION_METADATA; in archive_entry_set_is_metadata_encrypted()
|
H A D | archive_entry_private.h | 169 char encryption; member
|
H A D | archive_write_set_format_zip.c | 85 enum encryption { enum 133 enum encryption entry_encryption; 162 enum encryption encryption_type; 200 static int is_winzip_aes_encryption_supported(int encryption); 1670 is_winzip_aes_encryption_supported(int encryption) in is_winzip_aes_encryption_supported() argument 1679 if (encryption == ENCRYPTION_WINZIP_AES128) { in is_winzip_aes_encryption_supported()
|
/dflybsd-src/crypto/libressl/crypto/asn1/ |
H A D | p5_pbev2.c | 78 .offset = offsetof(PBE2PARAM, encryption), 207 scheme = pbe2->encryption; in PKCS5_pbe2_set_iv()
|
/dflybsd-src/lib/libdmsg/ |
H A D | TODO | 4 #1 The encryption is really just a place-holder. link_verifier is meant
|
/dflybsd-src/contrib/smbfs/ |
H A D | INSTALL | 7 cvsup collection) because encryption process involves DES algorithm.
|
/dflybsd-src/contrib/zlib-1.2/ |
H A D | FAQ | 316 zlib doesn't support encryption. The original PKZIP encryption is very 318 encryption, use GnuPG, http://www.gnupg.org/ , which already includes zlib 319 compression. For PKZIP compatible "encryption", look at
|
/dflybsd-src/etc/ |
H A D | protocols | 110 # 99 # any private encryption scheme
|
/dflybsd-src/usr.bin/telnet/ |
H A D | README | 44 telnet, The code (without encryption) is available via anonymous ftp 51 In addition, the version with the encryption code is available via 125 The encryption code is removed from the public distributions. 126 Domestic 4.4 BSD distributions contain the encryption code.
|
/dflybsd-src/contrib/cryptsetup/po/ |
H A D | cryptsetup.pot | 721 msgid "The hash used to create the encryption key from the passphrase" 737 msgid "The size of the encryption key"
|
/dflybsd-src/bin/cpdup/ |
H A D | BACKUPS | 333 be worthwhile to use a faster encryption algorithm, for example: 339 might want to disable encryption altogether:
|
/dflybsd-src/usr.sbin/ppp/ |
H A D | ppp.8.m4 | 386 can only get encryption keys from CHAP 81 authentication. 1568 To enable MPPE encryption, add the following lines to 2738 uses a simple DES encryption mechanism and is the least secure of the 4115 An encryption device or Secure ID card is usually 5028 This option selects the encryption parameters used when negotiation 5036 will agree to whatever the peer requests (including no encryption 5052 encryption dictionary is re-initialised with every packet according to 5053 an encryption key that is changed with every packet. 5055 the encryption dictionary is re-initialised every 256 packets or after 5319 will insist that MPPE encryption is used (even if no [all …]
|