Searched refs:encrypted (Results 1 - 25 of 28) sorted by relevance

12

/freebsd-11-stable/secure/lib/libcrypt/
H A Dcrypt-blowfish.c78 static char encrypted[_PASSWORD_LEN]; variable
252 encrypted[i++] = '$';
253 encrypted[i++] = BCRYPT_VERSION;
255 encrypted[i++] = minr;
256 encrypted[i++] = '$';
258 snprintf(encrypted + i, 4, "%2.2u$", logr);
260 encode_base64((u_int8_t *) encrypted + i + 3, csalt, BCRYPT_MAXSALT);
261 encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext,
267 return encrypted;
[all...]
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/
H A Dp12_add.c177 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
207 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm);
208 p7->d.encrypted->enc_data->algorithm = pbe;
209 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data);
210 if (!(p7->d.encrypted->enc_data->enc_data =
229 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm,
232 p7->d.encrypted->enc_data->enc_data, 1);
H A Dp12_npas.c129 if (!alg_get(p7->d.encrypted->enc_data->algorithm,
/freebsd-11-stable/tools/regression/net80211/wep/
H A Dtest_wep.c147 const u_int8_t *encrypted; member in struct:ciphertest
222 memcpy(mtod(m, void *), t->encrypted, t->encrypted_len);
268 t->encrypted, t->encrypted_len);
270 } else if (memcmp(mtod(m, const void *), t->encrypted, m->m_pkthdr.len)) {
273 t->encrypted, t->encrypted_len);
/freebsd-11-stable/lib/libpam/modules/pam_unix/
H A Dpam_unix.c281 char *encrypted; local
349 encrypted = crypt(old_pass, pwd->pw_passwd);
353 if (strcmp(encrypted, pwd->pw_passwd) != 0)
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Dikev2_common.h310 const u8 *encrypted; member in struct:ikev2_payloads
322 const u8 *encrypted, size_t encrypted_len,
H A Dikev2_common.c322 payloads->encrypted = pdata;
431 const u8 *encrypted, size_t encrypted_len,
443 if (encrypted == NULL) {
467 iv = encrypted;
469 end = encrypted + encrypted_len;
507 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted "
428 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
/freebsd-11-stable/tools/regression/net80211/tkip/
H A Dtest_tkip.c135 const u_int8_t *encrypted; member in struct:ciphertest
272 t->encrypted, t->encrypted_len);
274 } else if (memcmp(mtod(m, const void *), t->encrypted, m->m_pkthdr.len)) {
277 t->encrypted, t->encrypted_len);
/freebsd-11-stable/crypto/openssh/
H A Dsshkey.c3051 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; local
3071 (encrypted = sshbuf_new()) == NULL) {
3111 /* set up the buffer that will be encrypted */
3115 if ((r = sshbuf_put_u32(encrypted, check)) != 0 ||
3116 (r = sshbuf_put_u32(encrypted, check)) != 0)
3120 if ((r = sshkey_private_serialize(prv, encrypted)) != 0 ||
3121 (r = sshbuf_put_cstring(encrypted, comment)) != 0)
3126 while (sshbuf_len(encrypted) % blocksize) {
3127 if ((r = sshbuf_put_u8(encrypted, ++i & 0xff)) != 0)
3132 if ((r = sshbuf_put_u32(encoded, sshbuf_len(encrypted))) !
3418 struct sshbuf *buffer = NULL, *encrypted = NULL; local
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap.h339 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
H A Dikev2.c655 &data->keys, 1, hdr, pl->encrypted,
H A Deap.c1630 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2)
1637 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument
1655 } else if (!encrypted && config->anonymous_identity) {
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/
H A Dra_svn.h92 svn_boolean_t encrypted;
91 svn_boolean_t encrypted; member in struct:svn_ra_svn_conn_st
H A Dcyrus_auth.c590 /* Baton for a SASL encrypted svn_ra_svn__stream_t. */
602 /* Functions to implement a SASL encrypted svn_ra_svn__stream_t. */
722 if (! conn->encrypted)
786 conn->encrypted = TRUE;
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Dikev2.c448 const u8 *encrypted,
458 hdr, encrypted, encrypted_len,
495 if (pl->encrypted) {
498 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted,
502 "encrypted payload");
721 &data->keys, 0, hdr, pl->encrypted,
446 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/
H A Dpk7_lib.c204 if ((p7->d.encrypted = PKCS7_ENCRYPT_new())
207 if (!ASN1_INTEGER_set(p7->d.encrypted->version, 0))
209 p7->d.encrypted->enc_data->content_type = OBJ_nid2obj(NID_pkcs7_data);
H A Dpk7_asn1.c78 ADB_ENTRY(NID_pkcs7_encrypted, ASN1_NDEF_EXP_OPT(PKCS7, d.encrypted, PKCS7_ENCRYPT, 0))
H A Dpkcs7.h196 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon6426
/freebsd-11-stable/tools/regression/net80211/ccmp/
H A Dtest_ccmp.c542 const u_int8_t *encrypted; member in struct:ciphertest
651 t->encrypted, t->encrypted_len);
653 } else if (memcmp(mtod(m, const void *), t->encrypted, t->encrypted_len)) {
657 t->encrypted, t->encrypted_len);
/freebsd-11-stable/sys/dev/ipw/
H A Dif_ipwreg.h166 uint8_t encrypted; member in struct:ipw_hdr
H A Dif_ipw.c1583 shdr->hdr.encrypted = (wh->i_fc[1] & IEEE80211_FC1_PROTECTED) ? 1 : 0;
1647 shdr->hdr.type, shdr->hdr.subtype, shdr->hdr.encrypted,
/freebsd-11-stable/crypto/openssh/contrib/suse/
H A Dopenssh.spec53 rlogin and rsh, and provide secure encrypted communications between
67 rlogin and rsh, and provide secure encrypted communications between
/freebsd-11-stable/crypto/openssl/apps/
H A Dpkcs12.c789 alg_print(bio_err, p7->d.encrypted->enc_data->algorithm);
/freebsd-11-stable/crypto/openssh/contrib/redhat/
H A Dopenssh.spec137 rsh, and to provide secure encrypted communications between two
152 the clients necessary to make encrypted connections to SSH servers.
/freebsd-11-stable/secure/lib/libcrypto/arm/
H A Dbsaes-armv7.S1523 vld1.8 {q1}, [sp,:64] @ load encrypted counter

Completed in 179 milliseconds

12