Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 287) sorted by relevance

12345678910>>...12

/netbsd-src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
H A DAlert.pm16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
H A DRecord.pm109 $record->encrypted(1);
189 encrypted => 0,
288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) {
373 sub encrypted subroutine
377 $self->{encrypted} = shift;
379 return $self->{encrypted};
/netbsd-src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
H A DAlert.pm16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
H A DRecord.pm109 $record->encrypted(1);
189 encrypted => 0,
288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) {
373 sub encrypted subroutine
377 $self->{encrypted} = shift;
379 return $self->{encrypted};
/netbsd-src/lib/libcrypt/
H A Dbcrypt.c79 static char encrypted[_PASSWORD_LEN]; variable
306 encrypted[i++] = '$'; in __bcrypt()
307 encrypted[i++] = BCRYPT_VERSION; in __bcrypt()
309 encrypted[i++] = minor; in __bcrypt()
310 encrypted[i++] = '$'; in __bcrypt()
312 snprintf(encrypted + i, 4, "%2.2u$", logr); in __bcrypt()
314 encode_base64((u_int8_t *) encrypted + i + 3, csalt, BCRYPT_MAXSALT); in __bcrypt()
315 encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext, in __bcrypt()
318 return encrypted; in __bcrypt()
/netbsd-src/crypto/external/bsd/netpgp/dist/src/lib/
H A Dreader.c1416 encrypted_t *encrypted; in encrypted_data_reader() local
1420 encrypted = pgp_reader_get_arg(readinfo); in encrypted_data_reader()
1426 if (encrypted->prevplain && !readinfo->parent->reading_mpi_len) { in encrypted_data_reader()
1432 encrypted->decrypt->decrypt_resync(encrypted->decrypt); in encrypted_data_reader()
1433 encrypted->prevplain = 0; in encrypted_data_reader()
1436 encrypted->prevplain = 1; in encrypted_data_reader()
1439 if (encrypted->c) { in encrypted_data_reader()
1445 if (length < encrypted->c && in encrypted_data_reader()
1452 n = (int)MIN(length, encrypted->c); in encrypted_data_reader()
1454 encrypted->decrypted + encrypted->off, n); in encrypted_data_reader()
[all …]
H A Dwriter.c1033 pgp_crypt_t *encrypted; in pgp_push_enc_se_ip() local
1049 if ((encrypted = calloc(1, sizeof(*encrypted))) == NULL) { in pgp_push_enc_se_ip()
1054 pgp_crypt_any(encrypted, encrypted_pk_sesskey->symm_alg); in pgp_push_enc_se_ip()
1055 if ((iv = calloc(1, encrypted->blocksize)) == NULL) { in pgp_push_enc_se_ip()
1057 free(encrypted); in pgp_push_enc_se_ip()
1061 encrypted->set_iv(encrypted, iv); in pgp_push_enc_se_ip()
1062 encrypted->set_crypt_key(encrypted, &encrypted_pk_sesskey->key[0]); in pgp_push_enc_se_ip()
1063 pgp_encrypt_init(encrypted); in pgp_push_enc_se_ip()
1065 se_ip->crypt = encrypted; in pgp_push_enc_se_ip()
1420 pgp_crypt_t *encrypted; in pgp_push_stream_enc_se_ip() local
[all …]
/netbsd-src/external/bsd/file/dist/magic/magdir/
H A Dpgp9 0 beshort 0xa600 PGP encrypted data
10 #!:mime application/pgp-encrypted
31 # https://reposcope.com/mimetype/application/pgp-encrypted
33 !:mime application/pgp-encrypted
101 # - symmetric encrypted packet header
104 # 1024b RSA encrypted data
106 0 string \x84\x8c\x03 PGP RSA encrypted session key -
121 # 2048b RSA encrypted data
123 0 string \x85\x01\x0c\x03 PGP RSA encrypted session key -
138 # 3072b RSA encrypted data
[all …]
H A Dgnu122 0 beshort 0x8502 GPG encrypted data
138 >>2 leshort 0x0204 GPG symmetrically encrypted data (3DES cipher)
139 >>2 leshort 0x0304 GPG symmetrically encrypted data (CAST5 cipher)
140 >>2 leshort 0x0404 GPG symmetrically encrypted data (BLOWFISH cipher)
141 >>2 leshort 0x0704 GPG symmetrically encrypted data (AES cipher)
142 >>2 leshort 0x0804 GPG symmetrically encrypted data (AES192 cipher)
143 >>2 leshort 0x0904 GPG symmetrically encrypted data (AES256 cipher)
144 >>2 leshort 0x0a04 GPG symmetrically encrypted data (TWOFISH cipher)
145 >>2 leshort 0x0b04 GPG symmetrically encrypted data (CAMELLIA128 cipher)
146 >>2 leshort 0x0c04 GPG symmetrically encrypted data (CAMELLIA192 cipher)
[all …]
H A Daes5 # aes: magic file for AES encrypted files
12 >3 ubyte <3 AES encrypted data, version %u
14 !:mime application/x-aes-encrypted
16 # For Version 2 the encrypted file can have text tags
H A Dmcrypt10 # Note: called by TrID "mcrypt encrypted (v2.5)"
11 0 string \0m\3 mcrypt 2.5 encrypted data,
20 # Note: called by TrID "mcrypt encrypted (v2.2)"
21 0 string \0m\2 mcrypt 2.2 encrypted data,
H A Dcrypto35 0 string scrypt\0 scrypt encrypted file
43 0 string age-encryption.org/v1\n age encrypted file
49 0 string -----BEGIN\040AGE\040ENCRYPTED\040FILE----- age encrypted file, ASCII armored
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/
H A Dp12_add.c113 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata()
114 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata()
115 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata()
116 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata()
135 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, in STACK_OF()
138 p7->d.encrypted->enc_data->enc_data, 1); in STACK_OF()
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/pkcs12/
H A Dp12_add.c127 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata_ex()
128 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata_ex()
129 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata_ex()
130 if (!(p7->d.encrypted->enc_data->enc_data = in PKCS12_pack_p7encdata_ex()
160 if (p7->d.encrypted == NULL) { in STACK_OF()
165 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, in STACK_OF()
168 p7->d.encrypted->enc_data->enc_data, 1, in STACK_OF()
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DEVP_SealInit.pod23 encrypted using this key.
27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted
28 using one or more public keys, this allows the same encrypted data to be
30 buffers where the public key encrypted secret key will be written, each buffer
31 must contain enough room for the corresponding encrypted key: that is
33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DEVP_SealInit.pod23 encrypted using this key.
27 supplied by a function such as EVP_aes_256_cbc(). The secret key is encrypted
28 using one or more public keys, this allows the same encrypted data to be
30 buffers where the public key encrypted secret key will be written, each buffer
31 must contain enough room for the corresponding encrypted key: that is
33 size of each encrypted secret key is written to the array B<ekl>. B<pubk> is
/netbsd-src/crypto/dist/ipsec-tools/src/setkey/
H A Dsample-policy02.cf6 # connection to 9999 encrypted, reverse no encrypted.
11 # Session encrypted. Inbound policy check takes place non-strictly.
/netbsd-src/crypto/external/bsd/netpgp/dist/ref/
H A Drfc1991.txt65 6.4 Conventional-key-encrypted data packets................17
67 6.5 Public-key-encrypted packets...........................18
68 6.5.1 RSA-encrypted data encryption key (DEK)................19
83 files", i.e., messages that have been encrypted and/or signed with
129 -the encrypted hash code is prepended to the message
156 transmitted with it. To protect the key, it is encrypted with the
163 -the session key is encrypted using the recipient's public key and
164 prepended to the encrypted message
180 encrypted using a conventional session key. Finally, the session key
181 is encrypted using public-key encryption and prepended to the
[all …]
/netbsd-src/crypto/dist/ipsec-tools/src/racoon/
H A Disakmp_inf.c135 int encrypted; local
139 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
143 if (encrypted) {
177 if (encrypted) {
294 msgid, encrypted);
299 msgid, encrypted);
389 isakmp_info_recv_n(iph1, notify, msgid, encrypted) in isakmp_info_recv_n() argument
393 int encrypted;
408 if (encrypted)
413 if (encrypted)
[all …]
/netbsd-src/external/mpl/bind/dist/lib/dns/include/dns/
H A Dacl.h62 bool encrypted; /* for protocols with optional encryption (e.g. HTTP) */
281 const bool encrypted, const dns_name_t *reqsigner,
295 const uint32_t transports, const bool encrypted,
63 bool encrypted; /* for protocols with optional encryption (e.g. HTTP) */ global() member
/netbsd-src/crypto/external/bsd/openssh/dist/
H A DPROTOCOL.key6 an encrypted list of matching private keys.
19 string encrypted, padded list of private keys
54 Before the key is encrypted, a random integer is assigned
/netbsd-src/external/mpl/bind/dist/lib/dns/
H A Dacl.c225 const bool encrypted, const dns_name_t *reqsigner, in dns_acl_match()
251 next->encrypted == encrypted);
751 const uint32_t transports, const bool encrypted, in dns_aclenv_set()
760 .encrypted = encrypted, in dns_aclenv_copy()
799 next->encrypted, add_negative);
255 dns_acl_match_port_transport(const isc_netaddr_t * reqaddr,const in_port_t local_port,const isc_nmsocket_type_t transport,const bool encrypted,const dns_name_t * reqsigner,const dns_acl_t * acl,dns_aclenv_t * env,int * match,const dns_aclelement_t ** matchelt) dns_acl_match_port_transport() argument
815 dns_acl_add_port_transports(dns_acl_t * acl,const in_port_t port,const uint32_t transports,const bool encrypted,const bool negative) dns_acl_add_port_transports() argument
/netbsd-src/external/mpl/bind/dist/lib/isccfg/
H A Daclconf.c696 bool encrypted = false; in cfg_acl_fromconfig2()
708 encrypted = false; in cfg_acl_fromconfig2()
713 encrypted = false; in cfg_acl_fromconfig2()
721 encrypted = false; in cfg_acl_fromconfig2()
726 encrypted = true; in cfg_acl_fromconfig2()
731 encrypted = true; in cfg_acl_fromconfig2()
736 encrypted = false; in cfg_acl_fromconfig2()
745 encrypted, false); in cfg_acl_fromconfig2()
709 bool encrypted = false; cfg_acl_fromconfig2() local
/netbsd-src/crypto/external/bsd/heimdal/dist/etc/
H A Dservices.append12 ekshell 545/tcp # Kerberos encrypted remote shell -kfall
22 eklogin 2105/tcp # Kerberos encrypted rlogin
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/
H A Dpkcs8.pod72 option is not specified. If the key is encrypted a pass phrase will be
169 not used) then the input file must be in PKCS#8 format. An encrypted
180 file in a format specified by B<-inform>. The output file will be encrypted
193 The encrypted form of a PEM encode PKCS#8 files uses the following
204 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration
205 counts are more secure that those encrypted using the traditional
209 It is possible to write out DER encoded encrypted private keys in
274 Convert a private key from any PKCS#8 encrypted format to traditional format:

12345678910>>...12