| /netbsd-src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| H A D | Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
| H A D | Record.pm | 109 $record->encrypted(1); 189 encrypted => 0, 288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) { 373 sub encrypted subroutine 377 $self->{encrypted} = shift; 379 return $self->{encrypted};
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| H A D | Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
| H A D | Record.pm | 109 $record->encrypted(1); 189 encrypted => 0, 288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) { 373 sub encrypted subroutine 377 $self->{encrypted} = shift; 379 return $self->{encrypted};
|
| /netbsd-src/lib/libcrypt/ |
| H A D | bcrypt.c | 79 static char encrypted[_PASSWORD_LEN]; variable 306 encrypted[i++] = '$'; in __bcrypt() 307 encrypted[i++] = BCRYPT_VERSION; in __bcrypt() 309 encrypted[i++] = minor; in __bcrypt() 310 encrypted[i++] = '$'; in __bcrypt() 312 snprintf(encrypted + i, 4, "%2.2u$", logr); in __bcrypt() 314 encode_base64((u_int8_t *) encrypted + i + 3, csalt, BCRYPT_MAXSALT); in __bcrypt() 315 encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext, in __bcrypt() 318 return encrypted; in __bcrypt()
|
| /netbsd-src/crypto/external/bsd/netpgp/dist/src/lib/ |
| H A D | reader.c | 1416 encrypted_t *encrypted; in encrypted_data_reader() local 1420 encrypted = pgp_reader_get_arg(readinfo); in encrypted_data_reader() 1426 if (encrypted->prevplain && !readinfo->parent->reading_mpi_len) { in encrypted_data_reader() 1432 encrypted->decrypt->decrypt_resync(encrypted->decrypt); in encrypted_data_reader() 1433 encrypted->prevplain = 0; in encrypted_data_reader() 1436 encrypted->prevplain = 1; in encrypted_data_reader() 1439 if (encrypted->c) { in encrypted_data_reader() 1445 if (length < encrypted->c && in encrypted_data_reader() 1452 n = (int)MIN(length, encrypted->c); in encrypted_data_reader() 1454 encrypted->decrypted + encrypted->off, n); in encrypted_data_reader() [all …]
|
| H A D | writer.c | 1033 pgp_crypt_t *encrypted; in pgp_push_enc_se_ip() local 1049 if ((encrypted = calloc(1, sizeof(*encrypted))) == NULL) { in pgp_push_enc_se_ip() 1054 pgp_crypt_any(encrypted, encrypted_pk_sesskey->symm_alg); in pgp_push_enc_se_ip() 1055 if ((iv = calloc(1, encrypted->blocksize)) == NULL) { in pgp_push_enc_se_ip() 1057 free(encrypted); in pgp_push_enc_se_ip() 1061 encrypted->set_iv(encrypted, iv); in pgp_push_enc_se_ip() 1062 encrypted->set_crypt_key(encrypted, &encrypted_pk_sesskey->key[0]); in pgp_push_enc_se_ip() 1063 pgp_encrypt_init(encrypted); in pgp_push_enc_se_ip() 1065 se_ip->crypt = encrypted; in pgp_push_enc_se_ip() 1420 pgp_crypt_t *encrypted; in pgp_push_stream_enc_se_ip() local [all …]
|
| /netbsd-src/external/bsd/file/dist/magic/magdir/ |
| H A D | pgp | 9 0 beshort 0xa600 PGP encrypted data 10 #!:mime application/pgp-encrypted 31 # https://reposcope.com/mimetype/application/pgp-encrypted 33 !:mime application/pgp-encrypted 101 # - symmetric encrypted packet header 104 # 1024b RSA encrypted data 106 0 string \x84\x8c\x03 PGP RSA encrypted session key - 121 # 2048b RSA encrypted data 123 0 string \x85\x01\x0c\x03 PGP RSA encrypted session key - 138 # 3072b RSA encrypted data [all …]
|
| H A D | gnu | 122 0 beshort 0x8502 GPG encrypted data 138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher) 139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher) 140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher) 141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher) 142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher) 143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher) 144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher) 145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher) 146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher) [all …]
|
| H A D | aes | 5 # aes: magic file for AES encrypted files 12 >3 ubyte <3 AES encrypted data, version %u 14 !:mime application/x-aes-encrypted 16 # For Version 2 the encrypted file can have text tags
|
| H A D | mcrypt | 10 # Note: called by TrID "mcrypt encrypted (v2.5)" 11 0 string \0m\3 mcrypt 2.5 encrypted data, 20 # Note: called by TrID "mcrypt encrypted (v2.2)" 21 0 string \0m\2 mcrypt 2.2 encrypted data,
|
| H A D | crypto | 35 0 string scrypt\0 scrypt encrypted file 43 0 string age-encryption.org/v1\n age encrypted file 49 0 string -----BEGIN\040AGE\040ENCRYPTED\040FILE----- age encrypted file, ASCII armored
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
| H A D | p12_add.c | 113 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata() 114 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata() 115 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata() 116 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata() 135 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, in STACK_OF() 138 p7->d.encrypted->enc_data->enc_data, 1); in STACK_OF()
|
| /netbsd-src/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
| H A D | p12_add.c | 127 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata_ex() 128 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata_ex() 129 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata_ex() 130 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata_ex() 160 if (p7->d.encrypted == NULL) { in STACK_OF() 165 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, in STACK_OF() 168 p7->d.encrypted->enc_data->enc_data, 1, in STACK_OF()
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
| H A D | EVP_SealInit.pod | 23 encrypted using this key. 27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted 28 using one or more public keys, this allows the same encrypted data to be 30 buffers where the public key encrypted secret key will be written, each buffer 31 must contain enough room for the corresponding encrypted key: that is 33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
| H A D | EVP_SealInit.pod | 23 encrypted using this key. 27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted 28 using one or more public keys, this allows the same encrypted data to be 30 buffers where the public key encrypted secret key will be written, each buffer 31 must contain enough room for the corresponding encrypted key: that is 33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
|
| /netbsd-src/crypto/dist/ipsec-tools/src/setkey/ |
| H A D | sample-policy02.cf | 6 # connection to 9999 encrypted, reverse no encrypted. 11 # Session encrypted. Inbound policy check takes place non-strictly.
|
| /netbsd-src/crypto/external/bsd/netpgp/dist/ref/ |
| H A D | rfc1991.txt | 65 6.4 Conventional-key-encrypted data packets................17 67 6.5 Public-key-encrypted packets...........................18 68 6.5.1 RSA-encrypted data encryption key (DEK)................19 83 files", i.e., messages that have been encrypted and/or signed with 129 -the encrypted hash code is prepended to the message 156 transmitted with it. To protect the key, it is encrypted with the 163 -the session key is encrypted using the recipient's public key and 164 prepended to the encrypted message 180 encrypted using a conventional session key. Finally, the session key 181 is encrypted using public-key encryption and prepended to the [all …]
|
| /netbsd-src/crypto/dist/ipsec-tools/src/racoon/ |
| H A D | isakmp_inf.c | 135 int encrypted; local 139 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 143 if (encrypted) { 177 if (encrypted) { 294 msgid, encrypted); 299 msgid, encrypted); 389 isakmp_info_recv_n(iph1, notify, msgid, encrypted) in isakmp_info_recv_n() argument 393 int encrypted; 408 if (encrypted) 413 if (encrypted) [all …]
|
| /netbsd-src/external/mpl/bind/dist/lib/dns/include/dns/ |
| H A D | acl.h | 62 bool encrypted; /* for protocols with optional encryption (e.g. HTTP) */ 281 const bool encrypted, const dns_name_t *reqsigner, 295 const uint32_t transports, const bool encrypted, 63 bool encrypted; /* for protocols with optional encryption (e.g. HTTP) */ global() member
|
| /netbsd-src/crypto/external/bsd/openssh/dist/ |
| H A D | PROTOCOL.key | 6 an encrypted list of matching private keys. 19 string encrypted, padded list of private keys 54 Before the key is encrypted, a random integer is assigned
|
| /netbsd-src/external/mpl/bind/dist/lib/dns/ |
| H A D | acl.c | 225 const bool encrypted, const dns_name_t *reqsigner, in dns_acl_match() 251 next->encrypted == encrypted); 751 const uint32_t transports, const bool encrypted, in dns_aclenv_set() 760 .encrypted = encrypted, in dns_aclenv_copy() 799 next->encrypted, add_negative); 255 dns_acl_match_port_transport(const isc_netaddr_t * reqaddr,const in_port_t local_port,const isc_nmsocket_type_t transport,const bool encrypted,const dns_name_t * reqsigner,const dns_acl_t * acl,dns_aclenv_t * env,int * match,const dns_aclelement_t ** matchelt) dns_acl_match_port_transport() argument 815 dns_acl_add_port_transports(dns_acl_t * acl,const in_port_t port,const uint32_t transports,const bool encrypted,const bool negative) dns_acl_add_port_transports() argument
|
| /netbsd-src/external/mpl/bind/dist/lib/isccfg/ |
| H A D | aclconf.c | 696 bool encrypted = false; in cfg_acl_fromconfig2() 708 encrypted = false; in cfg_acl_fromconfig2() 713 encrypted = false; in cfg_acl_fromconfig2() 721 encrypted = false; in cfg_acl_fromconfig2() 726 encrypted = true; in cfg_acl_fromconfig2() 731 encrypted = true; in cfg_acl_fromconfig2() 736 encrypted = false; in cfg_acl_fromconfig2() 745 encrypted, false); in cfg_acl_fromconfig2() 709 bool encrypted = false; cfg_acl_fromconfig2() local
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/etc/ |
| H A D | services.append | 12 ekshell 545/tcp # Kerberos encrypted remote shell -kfall 22 eklogin 2105/tcp # Kerberos encrypted rlogin
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/ |
| H A D | pkcs8.pod | 72 option is not specified. If the key is encrypted a pass phrase will be 169 not used) then the input file must be in PKCS#8 format. An encrypted 180 file in a format specified by B<-inform>. The output file will be encrypted 193 The encrypted form of a PEM encode PKCS#8 files uses the following 204 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration 205 counts are more secure that those encrypted using the traditional 209 It is possible to write out DER encoded encrypted private keys in 274 Convert a private key from any PKCS#8 encrypted format to traditional format:
|