Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 43) sorted by relevance

12

/illumos-gate/usr/src/lib/crypt_modules/bsdbf/
H A Dbcrypt.c85 static char encrypted[128]; /* _PASSWORD_LEN in <pwd.h> on OpenBSD */ variable
298 encrypted[i++] = '$';
299 encrypted[i++] = BCRYPT_VERSION;
301 encrypted[i++] = minor;
302 encrypted[i++] = '$';
304 (void) snprintf(encrypted + i, 4, "%2.2u$", logr);
306 encode_base64((uint8_t *)encrypted + i + 3, csalt, BCRYPT_MAXSALT);
307 encode_base64((uint8_t *)encrypted + strlen(encrypted), ciphertext,
309 return (encrypted);
/illumos-gate/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c198 free_data(&certptr->signature.encrypted); in free_decoded_cert()
1498 certptr->signature.encrypted.Data = in DerDecodeSignedCertificate()
1502 certptr->signature.encrypted.Data = NULL; in DerDecodeSignedCertificate()
1503 certptr->signature.encrypted.Length = 0; in DerDecodeSignedCertificate()
1774 if (signature->encrypted.Length > 0) { in DerEncodeSignedCertificate()
1776 signature->encrypted.Length * 8) == -1) { in DerEncodeSignedCertificate()
2072 csrptr->signature.encrypted.Data = NULL; in DerDecodeSignedCsr()
2073 csrptr->signature.encrypted.Length = 0; in DerDecodeSignedCsr()
2081 if (csrptr->signature.encrypted.Data) in DerDecodeSignedCsr()
2082 free(csrptr->signature.encrypted.Data); in DerDecodeSignedCsr()
[all …]
/illumos-gate/usr/src/lib/libfru/include/
H A Dlibfru.h123 unsigned encrypted : 1; member
133 unsigned encrypted : 1; member
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dcsrcrlop.c448 subj_csr.signature.encrypted = signature; in sign_csr()
450 subj_csr.signature.encrypted = signed_data; in sign_csr()
603 rv = DerDecodeDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr()
618 rv = DerDecodeECDSASignature(&csrdata->signature.encrypted, in kmf_verify_csr()
632 &csrdata->signature.encrypted); in kmf_verify_csr()
/illumos-gate/usr/src/cmd/vi/port/
H A Dex_temp.h135 short encrypted; /* Encrypted temp file flag */ member
H A Dexpreserve.c84 short encrypted; /* Encrypted temp file flag */ member
325 notify(H.Uid, H.Savedfile, (int) name, H.encrypted); in copyout()
H A Dexrecover.c173 if(H.encrypted) { in main()
428 fp->sf_encrypted = H.encrypted; in enter()
H A Dex_temp.c406 H.encrypted = 1; in synctmp()
408 H.encrypted = 0; in synctmp()
H A Dex.news47 2. It is now possible to recover encrypted files. The file header has
48 been changed to include an encrypted flag. Therefore, if the user
49 types "vi -r file" when "file" is encrypted, the program will
53 command line encrypted file actions
57 [editing session not encrypted]
60 [editing session not encrypted]
63 [editing session encrypted,
68 [editing session encrypted]
205 temp file and encrypted text on your screen has been fixed.
261 A bug causing writes to filters when editing encrypted files
[all …]
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb2_tree_connect.c84 sr->encrypted == B_FALSE) { in smb2_tree_connect()
H A Dsmb2_dispatch.c286 sr->encrypted = B_TRUE; in smb3_decrypt_msg()
696 if (sr->encrypted && in smb2sr_work()
723 !sr->encrypted) { in smb2sr_work()
798 !sr->encrypted) { in smb2sr_work()
848 !sr->encrypted && sr->uid_user != NULL && in smb2sr_work()
/illumos-gate/usr/src/common/zfs/
H A Dzfs_prop.c750 zfs_prop_valid_keylocation(const char *str, boolean_t encrypted) in zfs_prop_valid_keylocation() argument
753 return (!encrypted); in zfs_prop_valid_keylocation()
/illumos-gate/usr/src/lib/libfru/libfruraw/
H A Dfruraw.c656 if (descriptor->field.encrypted && (encrypt_func == NULL)) { in frt_for_each_packet()
689 if ((descriptor->field.encrypted) && in frt_for_each_packet()
/illumos-gate/usr/src/uts/common/fs/zfs/
H A Ddmu_recv.c86 boolean_t encrypted = ds->ds_dir->dd_crypto_obj != 0; in recv_begin_check_existing_impl() local
123 if (!encrypted && raw) in recv_begin_check_existing_impl()
127 if (encrypted && embed) in recv_begin_check_existing_impl()
175 if ((!encrypted && raw) || encrypted) in recv_begin_check_existing_impl()
2719 boolean_t encrypted = drc->drc_ds->ds_dir->dd_crypto_obj != 0; in dmu_recv_end_sync() local
2846 if (!drc->drc_raw && encrypted) { in dmu_recv_end_sync()
H A Darc.c1860 boolean_t encrypted = (flags & ARC_FILL_ENCRYPTED) != 0; in arc_buf_fill() local
1867 IMPLY(encrypted, HDR_ENCRYPTED(hdr)); in arc_buf_fill()
1868 IMPLY(encrypted, ARC_BUF_ENCRYPTED(buf)); in arc_buf_fill()
1869 IMPLY(encrypted, ARC_BUF_COMPRESSED(buf)); in arc_buf_fill()
1870 IMPLY(encrypted, !ARC_BUF_SHARED(buf)); in arc_buf_fill()
1877 if (encrypted) { in arc_buf_fill()
1919 ASSERT(!encrypted); in arc_buf_fill()
2550 IMPLY(encrypted, compressed); in arc_buf_alloc_impl()
2571 if (encrypted) { in arc_buf_alloc_impl()
2582 ASSERT0(encrypted); in arc_buf_alloc_impl()
[all …]
/illumos-gate/usr/src/lib/passwdutil/
H A DREADME.SunOS-aging47 Note the comma in the encrypted password field. The characters after
/illumos-gate/usr/src/lib/libfru/libfrupicl/
H A Dfrupicl.c1081 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet()
1110 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
/illumos-gate/usr/src/uts/common/fs/zfs/sys/
H A Ddmu.h119 #define DMU_OT(byteswap, metadata, encrypted) \ argument
122 ((encrypted) ? DMU_OT_ENCRYPTED : 0) | \
/illumos-gate/usr/src/lib/libfru/libfrupicltree/
H A Dfrupicltree.c1096 if (descriptor.field.encrypted && (encrypt_func == NULL)) in fpt_for_each_packet()
1125 if ((descriptor.field.encrypted) && in fpt_for_each_packet()
/illumos-gate/usr/src/uts/common/io/ipw/
H A Dipw2100_impl.h374 uint8_t encrypted; member
/illumos-gate/usr/src/lib/libsqlite/test/
H A Dversion.test196 } {1 {file is encrypted or is not a database}}
/illumos-gate/usr/src/lib/libfru/libfru/
H A Dlibfru.cc444 return (segdef.desc.field.encrypted == 1); in segment_is_encrypted()
856 if ((def->desc.field.encrypted == 1) && in fru_create_segment()
965 if ((segdef.desc.field.encrypted == 1) && in fru_get_segment_def()
/illumos-gate/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkerberos.ldif342 ##### This attribute holds the principal's key (krbPrincipalKey) that is encrypted with
444 ##### This attribute holds the principal's old keys (krbPwdHistory) that is encrypted with
/illumos-gate/usr/src/cmd/cmd-inet/etc/
H A Dservices227 eklogin 2105/tcp # Kerberos encrypted rlogin
/illumos-gate/usr/src/lib/libkmf/include/
H A Dkmftypes.h589 KMF_DATA encrypted; member

12