/freebsd-11.0-release/secure/lib/libcrypt/ |
H A D | crypt-blowfish.c | 78 static char encrypted[_PASSWORD_LEN]; variable 252 encrypted[i++] = '$'; 253 encrypted[i++] = BCRYPT_VERSION; 255 encrypted[i++] = minr; 256 encrypted[i++] = '$'; 258 snprintf(encrypted + i, 4, "%2.2u$", logr); 260 encode_base64((u_int8_t *) encrypted + i + 3, csalt, BCRYPT_MAXSALT); 261 encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext, 267 return encrypted; [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_add.c | 177 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 207 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 208 p7->d.encrypted->enc_data->algorithm = pbe; 209 M_ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 210 if (!(p7->d.encrypted->enc_data->enc_data = 229 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, 232 p7->d.encrypted->enc_data->enc_data, 1);
|
H A D | p12_npas.c | 129 if (!alg_get(p7->d.encrypted->enc_data->algorithm,
|
/freebsd-11.0-release/tools/regression/net80211/wep/ |
H A D | test_wep.c | 147 const u_int8_t *encrypted; member in struct:ciphertest 222 memcpy(mtod(m, void *), t->encrypted, t->encrypted_len); 268 t->encrypted, t->encrypted_len); 270 } else if (memcmp(mtod(m, const void *), t->encrypted, m->m_pkthdr.len)) { 273 t->encrypted, t->encrypted_len);
|
/freebsd-11.0-release/lib/libpam/modules/pam_unix/ |
H A D | pam_unix.c | 276 char *encrypted; local 344 encrypted = crypt(old_pass, pwd->pw_passwd); 348 if (strcmp(encrypted, pwd->pw_passwd) != 0)
|
/freebsd-11.0-release/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | ra_svn.h | 92 svn_boolean_t encrypted; 91 svn_boolean_t encrypted; member in struct:svn_ra_svn_conn_st
|
H A D | cyrus_auth.c | 590 /* Baton for a SASL encrypted svn_ra_svn__stream_t. */ 602 /* Functions to implement a SASL encrypted svn_ra_svn__stream_t. */ 722 if (! conn->encrypted) 785 conn->encrypted = TRUE;
|
H A D | marshal.c | 101 conn->encrypted = FALSE;
|
/freebsd-11.0-release/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.h | 310 const u8 *encrypted; member in struct:ikev2_payloads 322 const u8 *encrypted, size_t encrypted_len,
|
H A D | ikev2_common.c | 323 payloads->encrypted = pdata; 432 const u8 *encrypted, size_t encrypted_len, 444 if (encrypted == NULL) { 468 iv = encrypted; 470 end = encrypted + encrypted_len; 508 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " 429 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
/freebsd-11.0-release/crypto/openssh/ |
H A D | sshkey.c | 3032 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; local 3054 (encrypted = sshbuf_new()) == NULL) { 3094 /* set up the buffer that will be encrypted */ 3098 if ((r = sshbuf_put_u32(encrypted, check)) != 0 || 3099 (r = sshbuf_put_u32(encrypted, check)) != 0) 3103 if ((r = sshkey_private_serialize(prv, encrypted)) != 0 || 3104 (r = sshbuf_put_cstring(encrypted, comment)) != 0) 3109 while (sshbuf_len(encrypted) % blocksize) { 3110 if ((r = sshbuf_put_u8(encrypted, ++i & 0xff)) != 0) 3115 if ((r = sshbuf_put_u32(encoded, sshbuf_len(encrypted))) ! 3402 struct sshbuf *buffer = NULL, *encrypted = NULL; local [all...] |
/freebsd-11.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap.h | 318 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted);
|
H A D | ikev2.c | 656 &data->keys, 1, hdr, pl->encrypted,
|
H A D | eap.c | 1419 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2) 1426 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument 1444 } else if (!encrypted && config->anonymous_identity) {
|
/freebsd-11.0-release/tools/regression/net80211/tkip/ |
H A D | test_tkip.c | 135 const u_int8_t *encrypted; member in struct:ciphertest 272 t->encrypted, t->encrypted_len); 274 } else if (memcmp(mtod(m, const void *), t->encrypted, m->m_pkthdr.len)) { 277 t->encrypted, t->encrypted_len);
|
/freebsd-11.0-release/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 448 const u8 *encrypted, 458 hdr, encrypted, encrypted_len, 495 if (pl->encrypted) { 498 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, 502 "encrypted payload"); 722 &data->keys, 0, hdr, pl->encrypted, 446 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
|
/freebsd-11.0-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_lib.c | 205 if ((p7->d.encrypted = PKCS7_ENCRYPT_new()) 208 if (!ASN1_INTEGER_set(p7->d.encrypted->version, 0)) 210 p7->d.encrypted->enc_data->content_type = OBJ_nid2obj(NID_pkcs7_data);
|
H A D | pk7_asn1.c | 78 ADB_ENTRY(NID_pkcs7_encrypted, ASN1_NDEF_EXP_OPT(PKCS7, d.encrypted, PKCS7_ENCRYPT, 0))
|
H A D | pkcs7.h | 196 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon6420
|
/freebsd-11.0-release/tools/regression/net80211/ccmp/ |
H A D | test_ccmp.c | 542 const u_int8_t *encrypted; member in struct:ciphertest 651 t->encrypted, t->encrypted_len); 653 } else if (memcmp(mtod(m, const void *), t->encrypted, t->encrypted_len)) { 657 t->encrypted, t->encrypted_len);
|
/freebsd-11.0-release/sys/dev/ipw/ |
H A D | if_ipwreg.h | 166 uint8_t encrypted; member in struct:ipw_hdr
|
H A D | if_ipw.c | 1586 shdr->hdr.encrypted = (wh->i_fc[1] & IEEE80211_FC1_PROTECTED) ? 1 : 0; 1650 shdr->hdr.type, shdr->hdr.subtype, shdr->hdr.encrypted,
|
/freebsd-11.0-release/crypto/openssh/contrib/suse/ |
H A D | openssh.spec | 53 rlogin and rsh, and provide secure encrypted communications between 67 rlogin and rsh, and provide secure encrypted communications between
|
/freebsd-11.0-release/crypto/openssl/apps/ |
H A D | pkcs12.c | 789 alg_print(bio_err, p7->d.encrypted->enc_data->algorithm);
|
/freebsd-11.0-release/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 137 rsh, and to provide secure encrypted communications between two 152 the clients necessary to make encrypted connections to SSH servers.
|