| /dflybsd-src/lib/libcrypt/ |
| H A D | crypt-blowfish.c | 80 static char encrypted[_PASSWORD_LEN]; variable 276 encrypted[i++] = '$'; in crypt_blowfish() 277 encrypted[i++] = BCRYPT_VERSION; in crypt_blowfish() 279 encrypted[i++] = minor; in crypt_blowfish() 280 encrypted[i++] = '$'; in crypt_blowfish() 282 snprintf(encrypted + i, 4, "%2.2u$", logr); in crypt_blowfish() 284 encode_base64((u_int8_t *) encrypted + i + 3, csalt, BCRYPT_MAXSALT); in crypt_blowfish() 285 encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext, in crypt_blowfish() 287 return encrypted; in crypt_blowfish()
|
| /dflybsd-src/contrib/file/magic/Magdir/ |
| H A D | pgp | 9 0 beshort 0xa600 PGP encrypted data 10 #!:mime application/pgp-encrypted 31 # https://reposcope.com/mimetype/application/pgp-encrypted 33 !:mime application/pgp-encrypted 101 # - symmetric encrypted packet header 104 # 1024b RSA encrypted data 106 0 string \x84\x8c\x03 PGP RSA encrypted session key - 121 # 2048b RSA encrypted data 123 0 string \x85\x01\x0c\x03 PGP RSA encrypted session key - 138 # 3072b RSA encrypted data [all …]
|
| H A D | gnu | 122 0 beshort 0x8502 GPG encrypted data 138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher) 139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher) 140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher) 141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher) 142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher) 143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher) 144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher) 145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher) 146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher) [all …]
|
| H A D | aes | 5 # aes: magic file for AES encrypted files 12 >3 ubyte <3 AES encrypted data, version %u 14 !:mime application/x-aes-encrypted 16 # For Version 2 the encrypted file can have text tags
|
| H A D | mcrypt | 10 # Note: called by TrID "mcrypt encrypted (v2.5)" 11 0 string \0m\3 mcrypt 2.5 encrypted data, 20 # Note: called by TrID "mcrypt encrypted (v2.2)" 21 0 string \0m\2 mcrypt 2.2 encrypted data,
|
| H A D | news | 11 0 belong 0x137A2951 encrypted scalable OpenFont binary
|
| H A D | clarion | 13 >2 leshort &0x0004 \b, encrypted
|
| H A D | editors | 15 0 string VimCrypt~ Vim encrypted file data
|
| H A D | virtual | 251 >>36 belong 1 \b, AES-encrypted 267 >>32 belong 1 \b, AES-encrypted 282 >>32 belong 1 \b, AES-encrypted
|
| H A D | palm | 71 >>(78.L+0x0C) beshort >0 \b, encrypted (type %d)
|
| /dflybsd-src/crypto/libressl/crypto/pkcs12/ |
| H A D | p12_add.c | 162 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata() 163 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata() 164 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata() 165 if (!(p7->d.encrypted->enc_data->enc_data = PKCS12_item_i2d_encrypt( in PKCS12_pack_p7encdata() 183 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, in STACK_OF() 185 p7->d.encrypted->enc_data->enc_data, 1); in STACK_OF()
|
| /dflybsd-src/usr.sbin/installer/libinstaller/ |
| H A D | diskutil.c | 513 long capacity, int encrypted) in subpartition_new_hammer() argument 534 sp->encrypted = encrypted; in subpartition_new_hammer() 576 long capacity, int encrypted) in subpartition_new_hammer2() argument 597 sp->encrypted = encrypted; in subpartition_new_hammer2() 645 int encrypted, int softupdates, long fsize, long bsize, int tmpfsbacked) in subpartition_new_ufs() argument 672 sp->encrypted = encrypted; in subpartition_new_ufs() 912 sp->encrypted = 0; in subpartition_clr_encrypted() 918 return(sp->encrypted); in subpartition_is_encrypted()
|
| H A D | diskutil.h | 105 int encrypted; member
|
| /dflybsd-src/crypto/openssh/ |
| H A D | PROTOCOL.key | 6 an encrypted list of matching private keys. 19 string encrypted, padded list of private keys 54 Before the key is encrypted, a random integer is assigned
|
| H A D | sshkey-xmss.c | 893 struct sshbuf *encrypted = NULL, *encoded = NULL, *padded = NULL; in sshkey_xmss_encrypt_state() local 919 if ((encrypted = sshbuf_new()) == NULL || in sshkey_xmss_encrypt_state() 956 if ((r = sshbuf_reserve(encrypted, in sshkey_xmss_encrypt_state() 968 *retp = encrypted; in sshkey_xmss_encrypt_state() 969 encrypted = NULL; in sshkey_xmss_encrypt_state() 973 sshbuf_free(encrypted); in sshkey_xmss_encrypt_state()
|
| H A D | sshkey.c | 2760 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; in sshkey_private_to_blob2() local 2776 (encrypted = sshbuf_new()) == NULL) { in sshkey_private_to_blob2() 2820 if ((r = sshbuf_put_u32(encrypted, check)) != 0 || in sshkey_private_to_blob2() 2821 (r = sshbuf_put_u32(encrypted, check)) != 0) in sshkey_private_to_blob2() 2825 if ((r = sshkey_private_serialize_opt(prv, encrypted, in sshkey_private_to_blob2() 2827 (r = sshbuf_put_cstring(encrypted, comment)) != 0) in sshkey_private_to_blob2() 2832 while (sshbuf_len(encrypted) % blocksize) { in sshkey_private_to_blob2() 2833 if ((r = sshbuf_put_u8(encrypted, ++i & 0xff)) != 0) in sshkey_private_to_blob2() 2838 if ((r = sshbuf_put_u32(encoded, sshbuf_len(encrypted))) != 0) in sshkey_private_to_blob2() 2843 sshbuf_len(encrypted) + authlen, &cp)) != 0) in sshkey_private_to_blob2() [all …]
|
| /dflybsd-src/contrib/smbfs/ |
| H A D | config.mk.in | 19 # Comment this to disable support for encrypted passwords (requires 20 # src/sys/crypto directory). By default, NT and Win* machines use encrypted
|
| H A D | INSTALL | 6 to use encrypted passwords you'll need an src/sys/crypto directory (sys-crypto
|
| /dflybsd-src/lib/libpam/modules/pam_unix/ |
| H A D | pam_unix.c | 284 char *encrypted; in pam_sm_chauthtok() local 352 encrypted = crypt(old_pass, pwd->pw_passwd); in pam_sm_chauthtok() 356 if (encrypted == NULL || strcmp(encrypted, pwd->pw_passwd) != 0) in pam_sm_chauthtok()
|
| /dflybsd-src/contrib/lvm2/dist/udev/ |
| H A D | 12-dm-permissions.rules | 55 # Set permissions for all encrypted devices created by cryptsetup (plain devices) 58 # Set permissions for all encrypted devices created by cryptsetup (LUKS extension) 61 # Set permissions for an encrypted device created by cryptsetup and having an exact luks UUID
|
| /dflybsd-src/contrib/wpa_supplicant/src/eap_common/ |
| H A D | ikev2_common.c | 322 payloads->encrypted = pdata; in ikev2_parse_payloads() 431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument 443 if (encrypted == NULL) { in ikev2_decrypt_payload() 467 iv = encrypted; in ikev2_decrypt_payload() 469 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
|
| H A D | ikev2_common.h | 310 const u8 *encrypted; member 322 const u8 *encrypted, size_t encrypted_len,
|
| /dflybsd-src/crypto/libressl/crypto/pkcs7/ |
| H A D | pk7_lib.c | 207 if ((p7->d.encrypted = PKCS7_ENCRYPT_new()) == NULL) in PKCS7_set_type() 209 if (!ASN1_INTEGER_set(p7->d.encrypted->version, 0)) in PKCS7_set_type() 211 p7->d.encrypted->enc_data->content_type = in PKCS7_set_type()
|
| /dflybsd-src/contrib/wpa_supplicant/src/eap_server/ |
| H A D | ikev2.c | 448 const u8 *encrypted, in ikev2_process_sa_init_encr() argument 458 hdr, encrypted, encrypted_len, in ikev2_process_sa_init_encr() 495 if (pl->encrypted) { in ikev2_process_sa_init() 498 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, in ikev2_process_sa_init() 721 &data->keys, 0, hdr, pl->encrypted, in ikev2_process_sa_auth()
|
| /dflybsd-src/contrib/wpa_supplicant/src/eap_peer/ |
| H A D | eap.h | 339 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
|