| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
| Record.pm | 154 $record->encrypted(1); 295 encrypted => 0, 339 #respond with either an encrypted or an unencrypted alert. 342 #content type. If an alert is encrypted it will have a record 401 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) { 504 sub encrypted subroutine 508 $self->{encrypted} = shift; 510 return $self->{encrypted};
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
| Record.pm | 109 $record->encrypted(1); 189 encrypted => 0, 233 #respond with either an encrypted or an unencrypted alert. 236 #content type. If an alert is encrypted it will have a record 288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) { 373 sub encrypted subroutine 377 $self->{encrypted} = shift; 379 return $self->{encrypted};
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| Alert.pm | 16 $encrypted, 22 encrypted => $encrypted, 36 sub encrypted subroutine 39 return $self->{encrypted};
|
| Record.pm | 109 $record->encrypted(1); 189 encrypted => 0, 233 #respond with either an encrypted or an unencrypted alert. 236 #content type. If an alert is encrypted it will have a record 288 if (TLSProxy::Proxy->is_tls13() && $self->encrypted) { 373 sub encrypted subroutine 377 $self->{encrypted} = shift; 379 return $self->{encrypted};
|
| /src/external/mpl/bind/dist/bin/tests/system/transport-change/ns1/ |
| named-https-proxy-encrypted.conf.j2 | 31 listen-on port @EXTRAPORT1@ proxy encrypted tls self-signed http default { 10.53.0.1; }; 32 listen-on-v6 port @EXTRAPORT1@ proxy encrypted tls self-signed http default { fd92:7065:b8e:ffff::1; };
|
| named-tls-proxy-encrypted.conf.j2 | 31 listen-on port @EXTRAPORT1@ proxy encrypted tls self-signed { 10.53.0.1; }; 32 listen-on-v6 port @EXTRAPORT1@ proxy encrypted tls self-signed { fd92:7065:b8e:ffff::1; };
|
| /src/lib/libcrypt/ |
| bcrypt.c | 76 static char encrypted[_PASSWORD_LEN]; variable 303 encrypted[i++] = '$'; 304 encrypted[i++] = BCRYPT_VERSION; 306 encrypted[i++] = minor; 307 encrypted[i++] = '$'; 309 snprintf(encrypted + i, 4, "%2.2u$", logr); 311 encode_base64((u_int8_t *) encrypted + i + 3, csalt, BCRYPT_MAXSALT); 312 encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext, 315 return encrypted; [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
| p12_add.c | 82 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 113 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 114 p7->d.encrypted->enc_data->algorithm = pbe; 115 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 116 if (!(p7->d.encrypted->enc_data->enc_data = 135 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, 138 p7->d.encrypted->enc_data->enc_data, 1);
|
| /src/external/mpl/bind/dist/bin/tests/system/checkconf/ |
| bad-proxy-encrypted-do53.conf | 15 listen-on proxy encrypted { 10.53.0.1; };
|
| bad-proxy-encrypted-doh-plain.conf | 21 listen-on port 8080 proxy encrypted tls none http local-http-server { 10.53.0.1; };
|
| good-proxy.conf | 28 listen-on port 853 proxy encrypted tls local-tls { 10.53.0.1; };
|
| /src/external/mpl/bind/dist/bin/tests/system/proxy/ns3/ |
| named.conf.j2 | 32 listen-on port @TLSPORT@ proxy encrypted tls self-signed { 10.53.0.3; }; 34 listen-on port @HTTPSPORT@ proxy encrypted tls self-signed http default { 10.53.0.3; }; 39 listen-on-v6 port @TLSPORT@ proxy encrypted tls self-signed { fd92:7065:b8e:ffff::3; }; 41 listen-on-v6 port @HTTPSPORT@ proxy encrypted tls self-signed http default { fd92:7065:b8e:ffff::3; };
|
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/ |
| p12_add.c | 92 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 129 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 130 p7->d.encrypted->enc_data->algorithm = pbe; 131 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 132 if (!(p7->d.encrypted->enc_data->enc_data = PKCS12_item_i2d_encrypt_ex(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, 161 if (p7->d.encrypted == NULL) { 166 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, 169 p7->d.encrypted->enc_data->enc_data, 1,
|
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
| p12_add.c | 90 /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ 127 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); 128 p7->d.encrypted->enc_data->algorithm = pbe; 129 ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); 130 if (!(p7->d.encrypted->enc_data->enc_data = 160 if (p7->d.encrypted == NULL) { 165 return PKCS12_item_decrypt_d2i_ex(p7->d.encrypted->enc_data->algorithm, 168 p7->d.encrypted->enc_data->enc_data, 1,
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 70-test_tls13alerts.t | 37 # next message is encrypted 42 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unencrypted alert");
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 70-test_tls13alerts.t | 39 # next message is encrypted 44 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unecrypted alert");
|
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 70-test_tls13alerts.t | 39 # next message is encrypted 44 ok(TLSProxy::Message->fail() && !$alert->server() && !$alert->encrypted(), "Client sends an unecrypted alert");
|
| /src/external/mpl/bind/dist/bin/tests/system/proxy/ns1/ |
| named.conf.j2 | 33 listen-on port @TLSPORT@ proxy encrypted tls self-signed { 10.53.0.1; }; 35 listen-on port @HTTPSPORT@ proxy encrypted tls self-signed http default { 10.53.0.1; }; 41 listen-on-v6 port @TLSPORT@ proxy encrypted tls self-signed { fd92:7065:b8e:ffff::1; }; 43 listen-on-v6 port @HTTPSPORT@ proxy encrypted tls self-signed http default { fd92:7065:b8e:ffff::1; }; 88 zone "example-proxy-encrypted-dot" { 108 zone "example-proxy-local-encrypted-dot" {
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| reader.c | 1416 encrypted_t *encrypted; local 1420 encrypted = pgp_reader_get_arg(readinfo); 1426 if (encrypted->prevplain && !readinfo->parent->reading_mpi_len) { 1432 encrypted->decrypt->decrypt_resync(encrypted->decrypt); 1433 encrypted->prevplain = 0; 1436 encrypted->prevplain = 1; 1439 if (encrypted->c) { 1445 if (length < encrypted->c && 1452 n = (int)MIN(length, encrypted->c) 1537 encrypted_t *encrypted; local 1558 encrypted_t *encrypted; local [all...] |
| writer.c | 930 * and outputs the resulting encrypted text 959 hexdump(stderr, "encrypted", encbuf, 16); 989 \brief Push Encrypted Writer onto stack (create SE packets) 1026 \brief Push Encrypted SE IP Writer onto stack 1033 pgp_crypt_t *encrypted; local 1041 /* Create and write encrypted PK session key */ 1049 if ((encrypted = calloc(1, sizeof(*encrypted))) == NULL) { 1054 pgp_crypt_any(encrypted, encrypted_pk_sesskey->symm_alg); 1055 if ((iv = calloc(1, encrypted->blocksize)) == NULL) 1420 pgp_crypt_t *encrypted; local [all...] |
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| acl.h | 62 bool encrypted; /* for protocols with optional encryption (e.g. HTTP) */ member in struct:dns_acl_port_transports 281 const bool encrypted, const dns_name_t *reqsigner, 295 const uint32_t transports, const bool encrypted,
|
| /src/external/mpl/bind/dist/bin/tests/system/transport-change/ |
| tests.sh | 78 reconfig_server "reconfiguring the server to use TLS/DoT over encrypted PROXYv2" named-tls-proxy-encrypted.conf 79 run_dig_multitest_expect_success "$testing: a query over TLS/DoT over encrypted PROXYv2" +tls +proxy 87 reconfig_server "reconfiguring the server to use HTTPS/DoH over encrypted PROXYv2" named-https-proxy-encrypted.conf 88 run_dig_multitest_expect_success "$testing: a query over HTTPS/DoH over encrypted PROXYv2" +https +proxy
|
| /src/crypto/external/apache2/openssl/dist/demos/encrypt/ |
| rsa_encrypt.c | 13 * RSA encryption produces different encrypted output each time it is run, 91 * The length of the input data that can be encrypted is limited by the 124 /* Calculate the size required to hold the encrypted data */ 140 fprintf(stdout, "Encrypted:\n"); 217 unsigned char *encrypted = NULL, *decrypted = NULL; local 220 if (!do_encrypt(libctx, msg, msg_len, &encrypted, &encrypted_len)) { 224 if (!do_decrypt(libctx, encrypted, encrypted_len, 237 OPENSSL_free(encrypted);
|