Home
last modified time | relevance | path

Searched refs:encrypted (Results 1 – 25 of 37) sorted by relevance

12

/f-stack/app/nginx-1.16.1/src/core/
H A Dngx_crypt.c17 u_char **encrypted);
19 u_char **encrypted);
21 u_char **encrypted);
23 u_char **encrypted);
47 return ngx_libc_crypt(pool, key, salt, encrypted); in ngx_crypt()
132 if (*encrypted == NULL) { in ngx_crypt_apr1()
176 if (*encrypted == NULL) { in ngx_crypt_plain()
226 *encrypted = ngx_pnalloc(pool, len); in ngx_crypt_ssha()
227 if (*encrypted == NULL) { in ngx_crypt_ssha()
258 *encrypted = ngx_pnalloc(pool, len); in ngx_crypt_sha()
[all …]
H A Dngx_crypt.h17 u_char **encrypted);
/f-stack/app/nginx-1.16.1/src/os/unix/
H A Dngx_user.c17 ngx_libc_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, u_char **encrypted) in ngx_libc_crypt() argument
30 *encrypted = ngx_pnalloc(pool, len); in ngx_libc_crypt()
31 if (*encrypted == NULL) { in ngx_libc_crypt()
35 ngx_memcpy(*encrypted, value, len); in ngx_libc_crypt()
47 ngx_libc_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, u_char **encrypted) in ngx_libc_crypt() argument
58 *encrypted = ngx_pnalloc(pool, len); in ngx_libc_crypt()
59 if (*encrypted == NULL) { in ngx_libc_crypt()
63 ngx_memcpy(*encrypted, value, len); in ngx_libc_crypt()
H A Dngx_user.h21 u_char **encrypted);
/f-stack/app/nginx-1.16.1/src/http/modules/
H A Dngx_http_auth_basic_module.c281 u_char *encrypted; in ngx_http_auth_basic_crypt_handler() local
284 &encrypted); in ngx_http_auth_basic_crypt_handler()
294 if (ngx_strcmp(encrypted, passwd->data) == 0) { in ngx_http_auth_basic_crypt_handler()
299 "encrypted: \"%s\"", encrypted); in ngx_http_auth_basic_crypt_handler()
/f-stack/dpdk/doc/guides/cryptodevs/
H A Doverview.rst46 - "Digest encrypted" feature flag means PMD support hash-cipher cases,
47 where generated digest is appended to and encrypted with the data.
/f-stack/freebsd/contrib/openzfs/tests/zfs-tests/tests/functional/compression/
H A Dl2arc_encrypted_no_compressed_arc.ksh32 export DIRECTORY=/$TESTPOOL-l2arc/encrypted
H A Dl2arc_encrypted.ksh32 export DIRECTORY=/$TESTPOOL-l2arc/encrypted
/f-stack/freebsd/contrib/device-tree/src/arm/
H A Dberlin2cd-google-chromecast.dts27 * because the (signed and encrypted) bootloader that shipped
/f-stack/freebsd/contrib/device-tree/src/powerpc/fsl/
H A Dc293pcie.dts101 /* 1MB for blob encrypted key */
103 label = "NOR blob encrypted key";
/f-stack/dpdk/doc/guides/cryptodevs/features/
H A Dqat.ini16 Digest encrypted = Y
H A Ddefault.ini28 Digest encrypted =
/f-stack/freebsd/contrib/device-tree/Bindings/soc/mediatek/
H A Dpwrap.txt8 optionally be encrypted. Also a non standard Dual IO SPI mode can be
/f-stack/freebsd/contrib/openzfs/module/zcommon/
H A Dzfs_prop.c931 zfs_prop_valid_keylocation(const char *str, boolean_t encrypted) in zfs_prop_valid_keylocation() argument
934 return (!encrypted); in zfs_prop_valid_keylocation()
/f-stack/freebsd/contrib/openzfs/contrib/initramfs/
H A DREADME.initramfs.markdown74 ### Unlocking a ZFS encrypted root over SSH
/f-stack/dpdk/doc/guides/prog_guide/
H A Drte_security.rst54 contains the decrypted data where the encrypted data was when the packet
62 be passed as encrypted packets. It is the responsibility of application to
63 process such encrypted packets using other crypto driver instance.
67 encrypted by the software. The driver will accordingly configure the
/f-stack/freebsd/contrib/openzfs/module/zfs/
H A Ddmu_recv.c351 boolean_t encrypted = ds->ds_dir->dd_crypto_obj != 0; in recv_begin_check_existing_impl() local
401 if (!encrypted && raw) in recv_begin_check_existing_impl()
405 if (encrypted && embed) in recv_begin_check_existing_impl()
473 if ((!encrypted && raw) || encrypted) in recv_begin_check_existing_impl()
3171 boolean_t encrypted = drc->drc_ds->ds_dir->dd_crypto_obj != 0; in dmu_recv_end_sync() local
3308 if (!drc->drc_raw && encrypted) { in dmu_recv_end_sync()
H A Darc.c2026 boolean_t encrypted = (flags & ARC_FILL_ENCRYPTED) != 0; in arc_buf_fill() local
2033 IMPLY(encrypted, HDR_ENCRYPTED(hdr)); in arc_buf_fill()
2034 IMPLY(encrypted, ARC_BUF_ENCRYPTED(buf)); in arc_buf_fill()
2035 IMPLY(encrypted, ARC_BUF_COMPRESSED(buf)); in arc_buf_fill()
2036 IMPLY(encrypted, !ARC_BUF_SHARED(buf)); in arc_buf_fill()
2043 if (encrypted) { in arc_buf_fill()
2085 ASSERT(!encrypted); in arc_buf_fill()
2795 IMPLY(encrypted, compressed); in arc_buf_alloc_impl()
2822 if (encrypted) { in arc_buf_alloc_impl()
2833 ASSERT0(encrypted); in arc_buf_alloc_impl()
[all …]
/f-stack/freebsd/contrib/openzfs/include/sys/
H A Ddmu.h116 #define DMU_OT(byteswap, metadata, encrypted) \ argument
119 ((encrypted) ? DMU_OT_ENCRYPTED : 0) | \
/f-stack/dpdk/doc/guides/contributing/
H A Dvulnerability.rst38 Instead, send GPG-encrypted emails
115 using GPG encrypted email
/f-stack/dpdk/doc/guides/rel_notes/
H A Drelease_20_02.rst186 * **Added handling of mixed algorithms in encrypted digest requests in QAT PMD.**
188 Added handling of mixed algorithms in encrypted digest hash-cipher
/f-stack/freebsd/contrib/device-tree/Bindings/fpga/
H A Dfpga-region.txt189 - encrypted-fpga-config : boolean, set if the bitstream is encrypted
/f-stack/freebsd/arm64/conf/
H A DGENERIC97 options EKCD # Support for encrypted kernel dumps
/f-stack/freebsd/contrib/openzfs/lib/libzfs/
H A Dlibzfs_sendrecv.c4385 boolean_t encrypted; in zfs_receive_one() local
4461 encrypted = zfs_prop_get_int(zhp, ZFS_PROP_ENCRYPTION) != in zfs_receive_one()
4463 if (!stream_wantsnewfs && !encrypted && raw) { in zfs_receive_one()
4473 ((raw && !encrypted) || encrypted)) { in zfs_receive_one()
/f-stack/freebsd/i386/conf/
H A DGENERIC91 options EKCD # Support for encrypted kernel dumps

12