Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 56) sorted by relevance

123

/dflybsd-src/lib/libcrypt/
H A Dcrypt-blowfish.c80 static char encrypted[_PASSWORD_LEN]; variable
276 encrypted[i++] = '$'; in crypt_blowfish()
277 encrypted[i++] = BCRYPT_VERSION; in crypt_blowfish()
279 encrypted[i++] = minor; in crypt_blowfish()
280 encrypted[i++] = '$'; in crypt_blowfish()
282 snprintf(encrypted + i, 4, "%2.2u$", logr); in crypt_blowfish()
284 encode_base64((u_int8_t *) encrypted + i + 3, csalt, BCRYPT_MAXSALT); in crypt_blowfish()
285 encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext, in crypt_blowfish()
287 return encrypted; in crypt_blowfish()
/dflybsd-src/contrib/file/magic/Magdir/
H A Dpgp9 0 beshort 0xa600 PGP encrypted data
10 #!:mime application/pgp-encrypted
31 # https://reposcope.com/mimetype/application/pgp-encrypted
33 !:mime application/pgp-encrypted
101 # - symmetric encrypted packet header
104 # 1024b RSA encrypted data
106 0 string \x84\x8c\x03 PGP RSA encrypted session key -
121 # 2048b RSA encrypted data
123 0 string \x85\x01\x0c\x03 PGP RSA encrypted session key -
138 # 3072b RSA encrypted data
[all …]
H A Dgnu122 0 beshort 0x8502 GPG encrypted data
138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher)
139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher)
140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher)
141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher)
142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher)
143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher)
144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher)
145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher)
146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher)
[all …]
H A Daes5 # aes: magic file for AES encrypted files
12 >3 ubyte <3 AES encrypted data, version %u
14 !:mime application/x-aes-encrypted
16 # For Version 2 the encrypted file can have text tags
H A Dmcrypt10 # Note: called by TrID "mcrypt encrypted (v2.5)"
11 0 string \0m\3 mcrypt 2.5 encrypted data,
20 # Note: called by TrID "mcrypt encrypted (v2.2)"
21 0 string \0m\2 mcrypt 2.2 encrypted data,
H A Dnews11 0 belong 0x137A2951 encrypted scalable OpenFont binary
H A Dclarion13 >2 leshort &0x0004 \b, encrypted
H A Deditors15 0 string VimCrypt~ Vim encrypted file data
H A Dvirtual251 >>36 belong 1 \b, AES-encrypted
267 >>32 belong 1 \b, AES-encrypted
282 >>32 belong 1 \b, AES-encrypted
H A Dpalm71 >>(78.L+0x0C) beshort >0 \b, encrypted (type %d)
/dflybsd-src/crypto/libressl/crypto/pkcs12/
H A Dp12_add.c162 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata()
163 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata()
164 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata()
165 if (!(p7->d.encrypted->enc_data->enc_data = PKCS12_item_i2d_encrypt( in PKCS12_pack_p7encdata()
183 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, in STACK_OF()
185 p7->d.encrypted->enc_data->enc_data, 1); in STACK_OF()
/dflybsd-src/usr.sbin/installer/libinstaller/
H A Ddiskutil.c513 long capacity, int encrypted) in subpartition_new_hammer() argument
534 sp->encrypted = encrypted; in subpartition_new_hammer()
576 long capacity, int encrypted) in subpartition_new_hammer2() argument
597 sp->encrypted = encrypted; in subpartition_new_hammer2()
645 int encrypted, int softupdates, long fsize, long bsize, int tmpfsbacked) in subpartition_new_ufs() argument
672 sp->encrypted = encrypted; in subpartition_new_ufs()
912 sp->encrypted = 0; in subpartition_clr_encrypted()
918 return(sp->encrypted); in subpartition_is_encrypted()
H A Ddiskutil.h105 int encrypted; member
/dflybsd-src/crypto/openssh/
H A DPROTOCOL.key6 an encrypted list of matching private keys.
19 string encrypted, padded list of private keys
54 Before the key is encrypted, a random integer is assigned
H A Dsshkey-xmss.c893 struct sshbuf *encrypted = NULL, *encoded = NULL, *padded = NULL; in sshkey_xmss_encrypt_state() local
919 if ((encrypted = sshbuf_new()) == NULL || in sshkey_xmss_encrypt_state()
956 if ((r = sshbuf_reserve(encrypted, in sshkey_xmss_encrypt_state()
968 *retp = encrypted; in sshkey_xmss_encrypt_state()
969 encrypted = NULL; in sshkey_xmss_encrypt_state()
973 sshbuf_free(encrypted); in sshkey_xmss_encrypt_state()
H A Dsshkey.c2760 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; in sshkey_private_to_blob2() local
2776 (encrypted = sshbuf_new()) == NULL) { in sshkey_private_to_blob2()
2820 if ((r = sshbuf_put_u32(encrypted, check)) != 0 || in sshkey_private_to_blob2()
2821 (r = sshbuf_put_u32(encrypted, check)) != 0) in sshkey_private_to_blob2()
2825 if ((r = sshkey_private_serialize_opt(prv, encrypted, in sshkey_private_to_blob2()
2827 (r = sshbuf_put_cstring(encrypted, comment)) != 0) in sshkey_private_to_blob2()
2832 while (sshbuf_len(encrypted) % blocksize) { in sshkey_private_to_blob2()
2833 if ((r = sshbuf_put_u8(encrypted, ++i & 0xff)) != 0) in sshkey_private_to_blob2()
2838 if ((r = sshbuf_put_u32(encoded, sshbuf_len(encrypted))) != 0) in sshkey_private_to_blob2()
2843 sshbuf_len(encrypted) + authlen, &cp)) != 0) in sshkey_private_to_blob2()
[all …]
/dflybsd-src/contrib/smbfs/
H A Dconfig.mk.in19 # Comment this to disable support for encrypted passwords (requires
20 # src/sys/crypto directory). By default, NT and Win* machines use encrypted
H A DINSTALL6 to use encrypted passwords you'll need an src/sys/crypto directory (sys-crypto
/dflybsd-src/lib/libpam/modules/pam_unix/
H A Dpam_unix.c284 char *encrypted; in pam_sm_chauthtok() local
352 encrypted = crypt(old_pass, pwd->pw_passwd); in pam_sm_chauthtok()
356 if (encrypted == NULL || strcmp(encrypted, pwd->pw_passwd) != 0) in pam_sm_chauthtok()
/dflybsd-src/contrib/lvm2/dist/udev/
H A D12-dm-permissions.rules55 # Set permissions for all encrypted devices created by cryptsetup (plain devices)
58 # Set permissions for all encrypted devices created by cryptsetup (LUKS extension)
61 # Set permissions for an encrypted device created by cryptsetup and having an exact luks UUID
/dflybsd-src/contrib/wpa_supplicant/src/eap_common/
H A Dikev2_common.c322 payloads->encrypted = pdata; in ikev2_parse_payloads()
431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument
443 if (encrypted == NULL) { in ikev2_decrypt_payload()
467 iv = encrypted; in ikev2_decrypt_payload()
469 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
H A Dikev2_common.h310 const u8 *encrypted; member
322 const u8 *encrypted, size_t encrypted_len,
/dflybsd-src/crypto/libressl/crypto/pkcs7/
H A Dpk7_lib.c207 if ((p7->d.encrypted = PKCS7_ENCRYPT_new()) == NULL) in PKCS7_set_type()
209 if (!ASN1_INTEGER_set(p7->d.encrypted->version, 0)) in PKCS7_set_type()
211 p7->d.encrypted->enc_data->content_type = in PKCS7_set_type()
/dflybsd-src/contrib/wpa_supplicant/src/eap_server/
H A Dikev2.c448 const u8 *encrypted, in ikev2_process_sa_init_encr() argument
458 hdr, encrypted, encrypted_len, in ikev2_process_sa_init_encr()
495 if (pl->encrypted) { in ikev2_process_sa_init()
498 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, in ikev2_process_sa_init()
721 &data->keys, 0, hdr, pl->encrypted, in ikev2_process_sa_auth()
/dflybsd-src/contrib/wpa_supplicant/src/eap_peer/
H A Deap.h339 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);

123