| /openbsd-src/lib/libcrypto/pkcs12/ |
| H A D | p12_add.c | 168 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata() 169 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata() 170 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); in PKCS12_pack_p7encdata() 171 if (!(p7->d.encrypted->enc_data->enc_data = PKCS12_item_i2d_encrypt( in PKCS12_pack_p7encdata() 191 if (p7->d.encrypted == NULL) in STACK_OF() 193 if ((content = p7->d.encrypted->enc_data) == NULL) in STACK_OF()
|
| /openbsd-src/regress/lib/libradius/ |
| H A D | test25.c | 12 uint8_t encrypted[] = { in test25() local 31 …CHECK(radius_decrypt_mppe_key_attr(plain, &plen, encrypted, sizeof(encrypted), ra, "hogehogefugafu… in test25()
|
| /openbsd-src/usr.sbin/npppd/npppd/ |
| H A D | chap_ms.c | 346 mschap_radiuskey(u_int8_t *plain, const u_int8_t *encrypted, in mschap_radiuskey() argument 357 EVP_DigestUpdate(ctx, encrypted, 2); in mschap_radiuskey() 361 p[i] = b[i] ^ encrypted[i+2]; in mschap_radiuskey() 366 EVP_DigestUpdate(ctx, encrypted + 2, mdlen); in mschap_radiuskey() 371 p[i+16] = b[i] ^ encrypted[i+18]; in mschap_radiuskey()
|
| /openbsd-src/usr.sbin/radiusd/ |
| H A D | chap_ms.c | 346 mschap_radiuskey(u_int8_t *plain, const u_int8_t *encrypted, in mschap_radiuskey() argument 357 EVP_DigestUpdate(ctx, encrypted, 2); in mschap_radiuskey() 361 p[i] = b[i] ^ encrypted[i+2]; in mschap_radiuskey() 366 EVP_DigestUpdate(ctx, encrypted + 2, mdlen); in mschap_radiuskey() 371 p[i+16] = b[i] ^ encrypted[i+18]; in mschap_radiuskey()
|
| /openbsd-src/usr.bin/ssh/ |
| H A D | PROTOCOL.key | 6 an encrypted list of matching private keys. 19 string encrypted, padded list of private keys 54 Before the key is encrypted, a random integer is assigned
|
| H A D | sshkey-xmss.c | 887 struct sshbuf *encrypted = NULL, *encoded = NULL, *padded = NULL; in sshkey_xmss_encrypt_state() local 913 if ((encrypted = sshbuf_new()) == NULL || in sshkey_xmss_encrypt_state() 950 if ((r = sshbuf_reserve(encrypted, in sshkey_xmss_encrypt_state() 962 *retp = encrypted; in sshkey_xmss_encrypt_state() 963 encrypted = NULL; in sshkey_xmss_encrypt_state() 967 sshbuf_free(encrypted); in sshkey_xmss_encrypt_state()
|
| H A D | sshkey.c | 1673 fprintf(stderr, "%s: encrypted\n", __func__); in sshkey_unshield_private() 1792 fprintf(stderr, "%s: encrypted\n", __func__); in cert_parse() 2812 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; in sshkey_private_to_blob2() 2828 (encrypted = sshbuf_new()) == NULL) { in sshkey_private_to_blob2() 2868 /* set up the buffer that will be encrypted */ in private2_uudecode() 2872 if ((r = sshbuf_put_u32(encrypted, check)) != 0 || in private2_uudecode() 2873 (r = sshbuf_put_u32(encrypted, check)) != 0) in private2_uudecode() 2877 if ((r = sshkey_private_serialize_opt(prv, encrypted, in private2_uudecode() 2879 (r = sshbuf_put_cstring(encrypted, comment)) != 0) in private2_uudecode() 2884 while (sshbuf_len(encrypted) in private2_uudecode() 2727 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; sshkey_private_to_blob2() local [all...] |
| /openbsd-src/lib/libc/crypt/ |
| H A D | bcrypt.c | 92 bcrypt_hashpass(const char *key, const char *salt, char *encrypted, in bcrypt_hashpass() argument 188 snprintf(encrypted, 8, "$2%c$%2.2u$", minor, logr); in bcrypt_hashpass() 189 encode_base64(encrypted + 7, csalt, BCRYPT_MAXSALT); in bcrypt_hashpass() 190 encode_base64(encrypted + 7 + 22, ciphertext, 4 * BCRYPT_WORDS - 1); in bcrypt_hashpass()
|
| /openbsd-src/usr.bin/file/magdir/ |
| H A D | mcrypt | 6 0 string \0m\3 mcrypt 2.5 encrypted data, 11 0 string \0m\2 mcrypt 2.2 encrypted data,
|
| H A D | pgp | 13 0 beshort 0xa600 PGP encrypted data 14 #!:mime application/pgp-encrypted
|
| H A D | luks | 8 0 string LUKS\xba\xbe LUKS encrypted file,
|
| H A D | news | 11 0 belong 0x137A2951 encrypted scalable OpenFont binary
|
| H A D | editors | 14 0 string VimCrypt~ Vim encrypted file data
|
| H A D | clarion | 13 >2 leshort &0x0004 \b, encrypted
|
| H A D | gnu | 23 0 beshort 0x8502 GPG encrypted data
|
| H A D | fonts | 48 4098 string DOSFONT DOSFONT2 encrypted font data
|
| /openbsd-src/lib/libssl/test/ |
| H A D | times | 17 the data is being encrypted, decrypted, encrypted and then decrypted again. 21 of bytes encrypted/decrypted/MACed. The first time value is how many seconds
|
| /openbsd-src/usr.sbin/tcpdump/ |
| H A D | print-ike.c | 186 int encrypted; in ike_print() local 189 encrypted = 0; in ike_print() 214 encrypted = 1; in ike_print() 240 if (encrypted) { in ike_print()
|
| /openbsd-src/lib/libcrypto/pkcs7/ |
| H A D | pk7_lib.c | 215 if ((p7->d.encrypted = PKCS7_ENCRYPT_new()) == NULL) in PKCS7_set_type() 217 if (!ASN1_INTEGER_set(p7->d.encrypted->version, 0)) in PKCS7_set_type() 219 p7->d.encrypted->enc_data->content_type = in PKCS7_set_type()
|
| /openbsd-src/usr.sbin/unbound/ |
| H A D | SECURITY.md | 27 encrypted message to our Security Entry Point.
|
| /openbsd-src/usr.sbin/nsd/ |
| H A D | SECURITY.md | 27 encrypted message to our Security Entry Point.
|
| /openbsd-src/regress/sys/netinet/ipsec/ |
| H A D | README | 15 The netstat -s counters are checked to ensure that encrypted packets
|
| /openbsd-src/sbin/isakmpd/ |
| H A D | QUESTIONS | 31 last encrypted block of the last message we sent. The SSH testing site uses
|
| /openbsd-src/gnu/usr.sbin/mkhybrid/src/ |
| H A D | magic | 54 >3 byte &0x20 encrypted,
|
| /openbsd-src/sys/dev/pci/ |
| H A D | if_ipwreg.h | 147 uint8_t encrypted; member
|