| /f-stack/app/nginx-1.16.1/src/core/ |
| H A D | ngx_crypt.c | 17 u_char **encrypted); 19 u_char **encrypted); 21 u_char **encrypted); 23 u_char **encrypted); 47 return ngx_libc_crypt(pool, key, salt, encrypted); in ngx_crypt() 132 if (*encrypted == NULL) { in ngx_crypt_apr1() 176 if (*encrypted == NULL) { in ngx_crypt_plain() 226 *encrypted = ngx_pnalloc(pool, len); in ngx_crypt_ssha() 227 if (*encrypted == NULL) { in ngx_crypt_ssha() 258 *encrypted = ngx_pnalloc(pool, len); in ngx_crypt_sha() [all …]
|
| H A D | ngx_crypt.h | 17 u_char **encrypted);
|
| /f-stack/app/nginx-1.16.1/src/os/unix/ |
| H A D | ngx_user.c | 17 ngx_libc_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, u_char **encrypted) in ngx_libc_crypt() argument 30 *encrypted = ngx_pnalloc(pool, len); in ngx_libc_crypt() 31 if (*encrypted == NULL) { in ngx_libc_crypt() 35 ngx_memcpy(*encrypted, value, len); in ngx_libc_crypt() 47 ngx_libc_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, u_char **encrypted) in ngx_libc_crypt() argument 58 *encrypted = ngx_pnalloc(pool, len); in ngx_libc_crypt() 59 if (*encrypted == NULL) { in ngx_libc_crypt() 63 ngx_memcpy(*encrypted, value, len); in ngx_libc_crypt()
|
| H A D | ngx_user.h | 21 u_char **encrypted);
|
| /f-stack/app/nginx-1.16.1/src/http/modules/ |
| H A D | ngx_http_auth_basic_module.c | 281 u_char *encrypted; in ngx_http_auth_basic_crypt_handler() local 284 &encrypted); in ngx_http_auth_basic_crypt_handler() 294 if (ngx_strcmp(encrypted, passwd->data) == 0) { in ngx_http_auth_basic_crypt_handler() 299 "encrypted: \"%s\"", encrypted); in ngx_http_auth_basic_crypt_handler()
|
| /f-stack/dpdk/doc/guides/cryptodevs/ |
| H A D | overview.rst | 46 - "Digest encrypted" feature flag means PMD support hash-cipher cases, 47 where generated digest is appended to and encrypted with the data.
|
| /f-stack/freebsd/contrib/openzfs/tests/zfs-tests/tests/functional/compression/ |
| H A D | l2arc_encrypted_no_compressed_arc.ksh | 32 export DIRECTORY=/$TESTPOOL-l2arc/encrypted
|
| H A D | l2arc_encrypted.ksh | 32 export DIRECTORY=/$TESTPOOL-l2arc/encrypted
|
| /f-stack/freebsd/contrib/device-tree/src/arm/ |
| H A D | berlin2cd-google-chromecast.dts | 27 * because the (signed and encrypted) bootloader that shipped
|
| /f-stack/freebsd/contrib/device-tree/src/powerpc/fsl/ |
| H A D | c293pcie.dts | 101 /* 1MB for blob encrypted key */ 103 label = "NOR blob encrypted key";
|
| /f-stack/dpdk/doc/guides/cryptodevs/features/ |
| H A D | qat.ini | 16 Digest encrypted = Y
|
| H A D | default.ini | 28 Digest encrypted =
|
| /f-stack/freebsd/contrib/device-tree/Bindings/soc/mediatek/ |
| H A D | pwrap.txt | 8 optionally be encrypted. Also a non standard Dual IO SPI mode can be
|
| /f-stack/freebsd/contrib/openzfs/module/zcommon/ |
| H A D | zfs_prop.c | 931 zfs_prop_valid_keylocation(const char *str, boolean_t encrypted) in zfs_prop_valid_keylocation() argument 934 return (!encrypted); in zfs_prop_valid_keylocation()
|
| /f-stack/freebsd/contrib/openzfs/contrib/initramfs/ |
| H A D | README.initramfs.markdown | 74 ### Unlocking a ZFS encrypted root over SSH
|
| /f-stack/dpdk/doc/guides/prog_guide/ |
| H A D | rte_security.rst | 54 contains the decrypted data where the encrypted data was when the packet 62 be passed as encrypted packets. It is the responsibility of application to 63 process such encrypted packets using other crypto driver instance. 67 encrypted by the software. The driver will accordingly configure the
|
| /f-stack/freebsd/contrib/openzfs/module/zfs/ |
| H A D | dmu_recv.c | 351 boolean_t encrypted = ds->ds_dir->dd_crypto_obj != 0; in recv_begin_check_existing_impl() local 401 if (!encrypted && raw) in recv_begin_check_existing_impl() 405 if (encrypted && embed) in recv_begin_check_existing_impl() 473 if ((!encrypted && raw) || encrypted) in recv_begin_check_existing_impl() 3171 boolean_t encrypted = drc->drc_ds->ds_dir->dd_crypto_obj != 0; in dmu_recv_end_sync() local 3308 if (!drc->drc_raw && encrypted) { in dmu_recv_end_sync()
|
| H A D | arc.c | 2026 boolean_t encrypted = (flags & ARC_FILL_ENCRYPTED) != 0; in arc_buf_fill() local 2033 IMPLY(encrypted, HDR_ENCRYPTED(hdr)); in arc_buf_fill() 2034 IMPLY(encrypted, ARC_BUF_ENCRYPTED(buf)); in arc_buf_fill() 2035 IMPLY(encrypted, ARC_BUF_COMPRESSED(buf)); in arc_buf_fill() 2036 IMPLY(encrypted, !ARC_BUF_SHARED(buf)); in arc_buf_fill() 2043 if (encrypted) { in arc_buf_fill() 2085 ASSERT(!encrypted); in arc_buf_fill() 2795 IMPLY(encrypted, compressed); in arc_buf_alloc_impl() 2822 if (encrypted) { in arc_buf_alloc_impl() 2833 ASSERT0(encrypted); in arc_buf_alloc_impl() [all …]
|
| /f-stack/freebsd/contrib/openzfs/include/sys/ |
| H A D | dmu.h | 116 #define DMU_OT(byteswap, metadata, encrypted) \ argument 119 ((encrypted) ? DMU_OT_ENCRYPTED : 0) | \
|
| /f-stack/dpdk/doc/guides/contributing/ |
| H A D | vulnerability.rst | 38 Instead, send GPG-encrypted emails 115 using GPG encrypted email
|
| /f-stack/dpdk/doc/guides/rel_notes/ |
| H A D | release_20_02.rst | 186 * **Added handling of mixed algorithms in encrypted digest requests in QAT PMD.** 188 Added handling of mixed algorithms in encrypted digest hash-cipher
|
| /f-stack/freebsd/contrib/device-tree/Bindings/fpga/ |
| H A D | fpga-region.txt | 189 - encrypted-fpga-config : boolean, set if the bitstream is encrypted
|
| /f-stack/freebsd/arm64/conf/ |
| H A D | GENERIC | 97 options EKCD # Support for encrypted kernel dumps
|
| /f-stack/freebsd/contrib/openzfs/lib/libzfs/ |
| H A D | libzfs_sendrecv.c | 4385 boolean_t encrypted; in zfs_receive_one() local 4461 encrypted = zfs_prop_get_int(zhp, ZFS_PROP_ENCRYPTION) != in zfs_receive_one() 4463 if (!stream_wantsnewfs && !encrypted && raw) { in zfs_receive_one() 4473 ((raw && !encrypted) || encrypted)) { in zfs_receive_one()
|
| /f-stack/freebsd/i386/conf/ |
| H A D | GENERIC | 91 options EKCD # Support for encrypted kernel dumps
|