/macosx-10.9.5/BerkeleyDB-21/db/db/ |
H A D | db_setid.c | 61 __env_fileid_reset(env, ip, name, encrypted) 65 int encrypted; 120 /* If configured with a password, the databases are encrypted. */ 121 if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0)
|
H A D | db_setlsn.c | 59 __env_lsn_reset(env, ip, name, encrypted) 63 int encrypted; 75 /* If configured with a password, the databases are encrypted. */ 76 if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0)
|
/macosx-10.9.5/BerkeleyDB-21/db/java/src/com/sleepycat/db/ |
H A D | DatabaseConfig.java | 62 private boolean encrypted = false; field in class:DatabaseConfig
|
H A D | Environment.java | 1310 @param encrypted 1311 Whether the file contains encrypted databases. 1315 public void resetFileID(final String filename, boolean encrypted) argument 1318 dbenv.fileid_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0); 1345 @param encrypted 1346 Whether the file contains encrypted databases. 1350 public void resetLogSequenceNumber(final String filename, boolean encrypted) argument 1353 dbenv.lsn_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0);
|
/macosx-10.9.5/BerkeleyDB-21/db/test/ |
H A D | testutils.tcl | 1297 proc rpc_server_start { { encrypted 0 } { maxwait 30 } { args "" } } { 1306 if { $encrypted == 1 } { 1322 if { $encrypted == 1 } {
|
/macosx-10.9.5/CPANInternal-140/Apache-DBI-1.11/lib/Apache/ |
H A D | AuthDBI.pm | 488 #if the passwd matched (encrypted or otherwise), don't check the 569 if ($Attr->{encrypted} eq 'on') { 1278 REMOTE_PASSWORDS. Then it is compared to the password given. If the encrypted 1279 directive is set to 'on', the given password is encrypted using perl's crypt() 1280 function before comparison. If the encrypted directive is set to 'off' the 1386 Contains at least the fields with the username and the (possibly encrypted)
|
/macosx-10.9.5/CPANInternal-140/Apache-DBI/lib/Apache/ |
H A D | AuthDBI.pm | 487 #if the passwd matched (encrypted or otherwise), don't check the 568 if ($Attr->{encrypted} eq 'on') { 1277 REMOTE_PASSWORDS. Then it is compared to the password given. If the encrypted 1278 directive is set to 'on', the given password is encrypted using perl's crypt() 1279 function before comparison. If the encrypted directive is set to 'off' the 1383 Contains at least the fields with the username and the (possibly encrypted)
|
/macosx-10.9.5/CPANInternal-140/Authen-Krb5/ |
H A D | Krb5.pm | 229 encrypted data. Requires use of a replay cache.
|
/macosx-10.9.5/CPANInternal-140/IO-Socket-SSL/ |
H A D | SSL.pm | 1883 encrypted, you will be prompted to enter a password before the socket is formed 1920 If your private key is encrypted, you might not want the default password prompt from 2580 an I<encrypted digest/hash/signature>] on the certificate with the official "seal" of
|
/macosx-10.9.5/CPANInternal-140/Krb5-1.9/ |
H A D | Krb5.pm | 256 encrypted data. Requires use of a replay cache.
|
/macosx-10.9.5/CPANInternal-140/Mail-Sender-0.8.22/ |
H A D | Sender.pm | 865 If set to a true value Mail::Sender attempts to use LTS (SSL encrypted connection) whenever
868 The default value of ths option is TRUE! This means that if Mail::Server can send the data encrypted, it will.
|
/macosx-10.9.5/CPANInternal-140/Perl-Ldap/lib/Net/ |
H A D | LDAPS.pm | 44 encrypted (SSL) network connection. This mechanism is non-standard but
|
/macosx-10.9.5/CPANInternal-140/PlRPC-0.2020/lib/RPC/ |
H A D | PlServer.pm | 410 encrypted using this option.
|
/macosx-10.9.5/CPANInternal-140/PlRPC/lib/RPC/ |
H A D | PlServer.pm | 410 encrypted using this option.
|
/macosx-10.9.5/CPANInternal-140/SOAP-Lite-0.69/lib/OldDocs/SOAP/Transport/ |
H A D | HTTP.pm | 196 Those who would like to use encrypted keys may check
|
/macosx-10.9.5/CPANInternal-140/SOAP-Lite-0.69/lib/SOAP/ |
H A D | Transport.pm | 173 Those who would like to use encrypted keys may find the following thread in the SOAP::Lite newsgroup helpful:
|
/macosx-10.9.5/CPANInternal-140/SOAP-Lite_new/lib/OldDocs/SOAP/Transport/ |
H A D | HTTP.pm | 196 Those who would like to use encrypted keys may check
|
/macosx-10.9.5/Heimdal-323.92.1/lib/sqlite/ |
H A D | sqlite3.c | 4775 ** Specify the key for an encrypted database. This routine should be 4788 ** encrypted, this routine will encrypt it. If pNew==0 or nNew==0, the [all...] |
/macosx-10.9.5/MITKerberosShim-62.1/test/ |
H A D | test-gss-common.c | 189 /* Read an encrypted GSS token (length + encrypted data) off the network */ 212 int encrypted = 0; local 215 &outputBuffer, &encrypted, NULL /* qop_state */); 219 } else if (!encrypted) { 260 /* Write an encrypted GSS token (length + encrypted data) onto the network */ 275 int encrypted = 0; /* whether the mechanism was able to encrypt and integrity protect */ local 282 &inputBuffer, &encrypted, &outputBuffer); 286 } else if (!encrypted) { [all...] |
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/libraries/liblutil/ |
H A D | passwd.c | 44 #define des_failed(encrypted) 0 715 des_ecb_encrypt( des_data_block *plain, des_data_block *encrypted, argument 723 memset(encrypted, 0, sizeof(des_data_block)); 726 rv = PK11_CipherOp(ctxt[0], (unsigned char *)&encrypted[0], 731 memset(encrypted, 0, sizeof(des_data_block)); 738 des_failed(des_data_block *encrypted) argument 741 return memcmp(encrypted, zero, sizeof(zero)) == 0; 785 * * Make Cypher an irreversibly encrypted form of Clear by
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | authfile.c | 94 Buffer buffer, encrypted; local 123 * will be stored in plain text, and storing them also in encrypted 131 /* Pad the part to be encrypted until its size is a multiple of 8. */ 136 buffer_init(&encrypted); 140 buffer_put_char(&encrypted, authfile_id_string[i]); 141 buffer_put_char(&encrypted, 0); 144 buffer_put_char(&encrypted, cipher_num); 145 buffer_put_int(&encrypted, 0); /* For future extension */ 148 buffer_put_int(&encrypted, BN_num_bits(key->rsa->n)); 149 buffer_put_bignum(&encrypted, ke [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/contrib/redhat/ |
H A D | openssh.spec | 137 rsh, and to provide secure encrypted communications between two 152 the clients necessary to make encrypted connections to SSH servers.
|
/macosx-10.9.5/OpenSSH-186/openssh/contrib/suse/ |
H A D | openssh.spec | 55 rlogin and rsh, and provide secure encrypted communications between 69 rlogin and rsh, and provide secure encrypted communications between
|
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utils/ |
H A D | cuPrintCert.cpp | 1377 if(sig->encrypted.Data) { 1378 printf("Signature : %u bytes : ", (unsigned)sig->encrypted.Length); 1379 printDataAsHex(&sig->encrypted, 8);
|
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | testcms | 40 $SECURITY cms -E -r $NAME -i content -o encrypted 41 $SECURITY cms -D -i encrypted -o encrypted.out 42 $SECURITY cms -D -h 0 -n -i encrypted 43 cmp content encrypted.out
|