HomeSort by: relevance | last modified time | path
    Searched defs:encrypted (Results 1 - 25 of 26) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
Alert.pm 16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
Record.pm 154 $record->encrypted(1);
295 encrypted => 0,
339 #respond with either an encrypted or an unencrypted alert.
342 #content type. If an alert is encrypted it will have a record
401 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) {
504 sub encrypted subroutine
508 $self->{encrypted} = shift;
510 return $self->{encrypted};
  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
Alert.pm 16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
Record.pm 109 $record->encrypted(1);
189 encrypted => 0,
233 #respond with either an encrypted or an unencrypted alert.
236 #content type. If an alert is encrypted it will have a record
288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) {
373 sub encrypted subroutine
377 $self->{encrypted} = shift;
379 return $self->{encrypted};
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
Alert.pm 16 $encrypted,
22 encrypted => $encrypted,
36 sub encrypted subroutine
39 return $self->{encrypted};
Record.pm 109 $record->encrypted(1);
189 encrypted => 0,
233 #respond with either an encrypted or an unencrypted alert.
236 #content type. If an alert is encrypted it will have a record
288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) {
373 sub encrypted subroutine
377 $self->{encrypted} = shift;
379 return $self->{encrypted};
  /src/crypto/external/apache2/openssl/dist/demos/encrypt/
rsa_encrypt.c 13 * RSA encryption produces different encrypted output each time it is run,
91 * The length of the input data that can be encrypted is limited by the
124 /* Calculate the size required to hold the encrypted data */
140 fprintf(stdout, "Encrypted:\n");
217 unsigned char *encrypted = NULL, *decrypted = NULL; local
220 if (!do_encrypt(libctx, msg, msg_len, &encrypted, &encrypted_len)) {
224 if (!do_decrypt(libctx, encrypted, encrypted_len,
237 OPENSSL_free(encrypted);
  /src/lib/libcrypt/
bcrypt.c 76 static char encrypted[_PASSWORD_LEN]; variable
303 encrypted[i++] = '$';
304 encrypted[i++] = BCRYPT_VERSION;
306 encrypted[i++] = minor;
307 encrypted[i++] = '$';
309 snprintf(encrypted + i, 4, "%2.2u$", logr);
311 encode_base64((u_int8_t *) encrypted + i + 3, csalt, BCRYPT_MAXSALT);
312 encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext,
315 return encrypted;
    [all...]
  /src/crypto/external/bsd/netpgp/dist/src/lib/
create.c 859 * Encrypted Session Key Packet as defined in RFC Section 5.1
860 * "Public-Key Encrypted Session Key Packet"
1242 \brief Write Symmetrically Encrypted packet
1255 uint8_t *encrypted = (uint8_t *) NULL; local
1264 if ((encrypted = calloc(1, encrypted_sz)) == NULL) {
1270 done = (int)pgp_encrypt_se(&crypt_info, encrypted, data, (unsigned)len);
writer.c 930 * and outputs the resulting encrypted text
959 hexdump(stderr, "encrypted", encbuf, 16);
989 \brief Push Encrypted Writer onto stack (create SE packets)
1026 \brief Push Encrypted SE IP Writer onto stack
1033 pgp_crypt_t *encrypted; local
1041 /* Create and write encrypted PK session key */
1049 if ((encrypted = calloc(1, sizeof(*encrypted))) == NULL) {
1054 pgp_crypt_any(encrypted, encrypted_pk_sesskey->symm_alg);
1055 if ((iv = calloc(1, encrypted->blocksize)) == NULL)
1420 pgp_crypt_t *encrypted; local
    [all...]
reader.c 1416 encrypted_t *encrypted; local
1420 encrypted = pgp_reader_get_arg(readinfo);
1426 if (encrypted->prevplain && !readinfo->parent->reading_mpi_len) {
1432 encrypted->decrypt->decrypt_resync(encrypted->decrypt);
1433 encrypted->prevplain = 0;
1436 encrypted->prevplain = 1;
1439 if (encrypted->c) {
1445 if (length < encrypted->c &&
1452 n = (int)MIN(length, encrypted->c)
1537 encrypted_t *encrypted; local
1558 encrypted_t *encrypted; local
    [all...]
  /src/external/mpl/bind/dist/lib/dns/include/dns/
acl.h 62 bool encrypted; /* for protocols with optional encryption (e.g. HTTP) */ member in struct:dns_acl_port_transports
281 const bool encrypted, const dns_name_t *reqsigner,
295 const uint32_t transports, const bool encrypted,
  /src/external/mpl/bind/dist/lib/isccfg/
aclconf.c 694 bool encrypted = false; local
706 encrypted = false;
711 encrypted = false;
719 encrypted = false;
724 encrypted = true;
729 encrypted = true;
734 encrypted = false;
743 encrypted, false);
  /src/crypto/dist/ipsec-tools/src/racoon/
isakmp_inf.c 134 int encrypted;
138 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E);
142 if (encrypted) {
176 if (encrypted) {
260 /* make sure the packet was encrypted after the beginning of phase 1. */
272 "%s message must be encrypted\n",
293 msgid, encrypted);
298 msgid, encrypted);
387 uint32_t msgid, int encrypted)
402 if (encrypted)
133 int encrypted; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/include/openssl/
pkcs7.h 140 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon2162
  /src/common/dist/zlib/contrib/minizip/
unzip.c 180 int encrypted; member in struct:__anon41
659 us.encrypted = 0;
1485 s->encrypted = 0;
1505 s->encrypted=1;
1611 if(s->encrypted)
  /src/external/gpl3/binutils/dist/zlib/contrib/minizip/
unzip.c 180 int encrypted; member in struct:__anon10971
659 us.encrypted = 0;
1485 s->encrypted = 0;
1505 s->encrypted=1;
1611 if(s->encrypted)
  /src/external/gpl3/binutils.old/dist/zlib/contrib/minizip/
unzip.c 185 int encrypted; member in struct:__anon12418
752 us.encrypted = 0;
1613 s->encrypted = 0;
1633 s->encrypted=1;
1744 if(s->encrypted)
  /src/external/gpl3/gdb.old/dist/zlib/contrib/minizip/
unzip.c 185 int encrypted; member in struct:__anon22721
752 us.encrypted = 0;
1613 s->encrypted = 0;
1633 s->encrypted=1;
1744 if(s->encrypted)
  /src/external/gpl3/gdb/dist/zlib/contrib/minizip/
unzip.c 180 int encrypted; member in struct:__anon2107
659 us.encrypted = 0;
1485 s->encrypted = 0;
1505 s->encrypted=1;
1611 if(s->encrypted)
  /src/sys/dev/pci/
if_ipwreg.h 160 u_int8_t encrypted; member in struct:ipw_hdr
  /src/external/bsd/wpa/dist/src/ap/
sta_info.h 70 enum frame_encryption encrypted; member in struct:pending_eapol_rx
  /src/external/bsd/wpa/dist/src/drivers/
driver_nl80211_event.c 3673 enum frame_encryption encrypted; local
3683 encrypted = nla_get_flag(tb[NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT]) ?
3701 encrypted, link_id);
  /src/external/bsd/wpa/dist/src/eap_common/
ikev2_common.h 310 const u8 *encrypted; member in struct:ikev2_payloads
322 const u8 *encrypted, size_t encrypted_len,
  /src/crypto/external/bsd/openssh/dist/
sshkey.c 1666 fprintf(stderr, "%s: encrypted\n", __func__);
1785 fprintf(stderr, "%s: encrypted\n", __func__);
2792 struct sshbuf *encoded = NULL, *encrypted = NULL, *kdf = NULL; local
2808 (encrypted = sshbuf_new()) == NULL) {
2848 /* set up the buffer that will be encrypted */
2852 if ((r = sshbuf_put_u32(encrypted, check)) != 0 ||
2853 (r = sshbuf_put_u32(encrypted, check)) != 0)
2857 if ((r = sshkey_private_serialize(prv, encrypted)) != 0 ||
2858 (r = sshbuf_put_cstring(encrypted, comment)) != 0)
2863 while (sshbuf_len(encrypted) % blocksize)
    [all...]

Completed in 82 milliseconds

1 2