Simplify the signature of substitute system calls for ftruncate and
/db-4.6.21/db_archive/db_archive.c:113: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/db_archive/db_archive.c:114: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_s60/bdb_s60.mmp:89:SOURCE ..\hmac\hmac.c
/db-4.6.21/build_s60/bdb_s60.mmp:90:SOURCE ..\hmac\sha1.c
/db-4.6.21/build_s60/db.h:304: * Flags private to DB_ENV->set_encrypt.
/db-4.6.21/build_s60/db.h:306:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */
/db-4.6.21/build_s60/db.h:358:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */
/db-4.6.21/build_s60/db.h:1653: int (*get_encrypt_flags) __P((DB *, u_int32_t *));
/db-4.6.21/build_s60/db.h:1695: int (*set_encrypt) __P((DB *, const char *, u_int32_t));
/db-4.6.21/build_s60/db.h:1765:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */
/db-4.6.21/build_s60/db.h:2273: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *));
/db-4.6.21/build_s60/db.h:2384: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t));
/db-4.6.21/hash/hash_open.c:268: if (F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.6.21/hash/hash_open.c:269: meta->dbmeta.encrypt_alg =
/db-4.6.21/hash/hash_open.c:271: DB_ASSERT(dbenv, meta->dbmeta.encrypt_alg != 0);
/db-4.6.21/hash/hash_open.c:386: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP));
/db-4.6.21/java/src/com/sleepycat/util/ExceptionWrapper.java:30: * This method is intentionally defined to be the same signature as the
/db-4.6.21/java/src/com/sleepycat/db/internal/DbConstants.java:34: int DB_ENCRYPT = 0x00020000;
/db-4.6.21/java/src/com/sleepycat/db/internal/DbConstants.java:35: int DB_ENCRYPT_AES = 0x0000001;
/db-4.6.21/java/src/com/sleepycat/db/internal/Db.java:324: public int get_encrypt_flags() throws com.sleepycat.db.DatabaseException { return db_javaJNI.Db_get_encrypt_flags(swigCPtr); }
/db-4.6.21/java/src/com/sleepycat/db/internal/Db.java:408: public void set_encrypt(String passwd, int flags) throws com.sleepycat.db.DatabaseException { db_javaJNI.Db_set_encrypt(swigCPtr, passwd, flags); }
/db-4.6.21/java/src/com/sleepycat/db/internal/db_javaJNI.java:93: public final static native int Db_get_encrypt_flags(long jarg1) throws com.sleepycat.db.DatabaseException;
/db-4.6.21/java/src/com/sleepycat/db/internal/db_javaJNI.java:124: public final static native void Db_set_encrypt(long jarg1, String jarg2, int jarg3) throws com.sleepycat.db.DatabaseException;
/db-4.6.21/java/src/com/sleepycat/db/internal/db_javaJNI.java:162: public final static native int DbEnv_get_encrypt_flags(long jarg1) throws com.sleepycat.db.DatabaseException;
/db-4.6.21/java/src/com/sleepycat/db/internal/db_javaJNI.java:177: public final static native void DbEnv_set_encrypt(long jarg1, String jarg2, int jarg3) throws com.sleepycat.db.DatabaseException;
/db-4.6.21/java/src/com/sleepycat/db/internal/DbEnv.java:289: public int get_encrypt_flags() throws com.sleepycat.db.DatabaseException { return db_javaJNI.DbEnv_get_encrypt_flags(swigCPtr); }
/db-4.6.21/java/src/com/sleepycat/db/internal/DbEnv.java:323: public void set_encrypt(String passwd, int flags) throws com.sleepycat.db.DatabaseException { db_javaJNI.DbEnv_set_encrypt(swigCPtr, passwd, flags); }
/db-4.6.21/java/src/com/sleepycat/db/EnvironmentConfig.java:1246: dbenv.set_encrypt(password, DbConstants.DB_ENCRYPT_AES);
/db-4.6.21/java/src/com/sleepycat/db/EnvironmentConfig.java:1417: password = (dbenv.get_encrypt_flags() == 0) ? null : "";
/db-4.6.21/java/src/com/sleepycat/db/Environment.java:390: dbenv.fileid_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0);
/db-4.6.21/java/src/com/sleepycat/db/Environment.java:396: dbenv.lsn_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0);
/db-4.6.21/java/src/com/sleepycat/db/DatabaseConfig.java:545: dbFlags |= (password != null) ? DbConstants.DB_ENCRYPT : 0;
/db-4.6.21/java/src/com/sleepycat/db/DatabaseConfig.java:570: db.set_encrypt(password, DbConstants.DB_ENCRYPT_AES);
/db-4.6.21/java/src/com/sleepycat/db/DatabaseConfig.java:649: password = ((dbFlags & DbConstants.DB_ENCRYPT) != 0) ? "" : null;
/db-4.6.21/tcl/tcl_db_pkg.c:513: ENV_ENCRYPT_AES,
/db-4.6.21/tcl/tcl_db_pkg.c:514: ENV_ENCRYPT_ANY,
/db-4.6.21/tcl/tcl_db_pkg.c:1117: case ENV_ENCRYPT_AES:
/db-4.6.21/tcl/tcl_db_pkg.c:1127: ret = (*env)->set_encrypt(*env, passwd, DB_ENCRYPT_AES);
/db-4.6.21/tcl/tcl_db_pkg.c:1129: "set_encrypt");
/db-4.6.21/tcl/tcl_db_pkg.c:1131: case ENV_ENCRYPT_ANY:
/db-4.6.21/tcl/tcl_db_pkg.c:1141: ret = (*env)->set_encrypt(*env, passwd, 0);
/db-4.6.21/tcl/tcl_db_pkg.c:1143: "set_encrypt");
/db-4.6.21/tcl/tcl_db_pkg.c:1451: "-encrypt",
/db-4.6.21/tcl/tcl_db_pkg.c:1505: TCL_DB_ENCRYPT,
/db-4.6.21/tcl/tcl_db_pkg.c:1506: TCL_DB_ENCRYPT_AES,
/db-4.6.21/tcl/tcl_db_pkg.c:1507: TCL_DB_ENCRYPT_ANY,
/db-4.6.21/tcl/tcl_db_pkg.c:1907: case TCL_DB_ENCRYPT:
/db-4.6.21/tcl/tcl_db_pkg.c:1908: set_flags |= DB_ENCRYPT;
/db-4.6.21/tcl/tcl_db_pkg.c:1910: case TCL_DB_ENCRYPT_AES:
/db-4.6.21/tcl/tcl_db_pkg.c:1920: ret = (*dbp)->set_encrypt(*dbp, passwd, DB_ENCRYPT_AES);
/db-4.6.21/tcl/tcl_db_pkg.c:1922: "set_encrypt");
/db-4.6.21/tcl/tcl_db_pkg.c:1924: case TCL_DB_ENCRYPT_ANY:
/db-4.6.21/tcl/tcl_db_pkg.c:1934: ret = (*dbp)->set_encrypt(*dbp, passwd, 0);
/db-4.6.21/tcl/tcl_db_pkg.c:1936: "set_encrypt");
/db-4.6.21/tcl/tcl_db_pkg.c:2505: "-encrypt",
/db-4.6.21/tcl/tcl_db_pkg.c:2515: TCL_DBREM_ENCRYPT,
/db-4.6.21/tcl/tcl_db_pkg.c:2516: TCL_DBREM_ENCRYPT_AES,
/db-4.6.21/tcl/tcl_db_pkg.c:2517: TCL_DBREM_ENCRYPT_ANY,
/db-4.6.21/tcl/tcl_db_pkg.c:2567: case TCL_DBREM_ENCRYPT:
/db-4.6.21/tcl/tcl_db_pkg.c:2568: set_flags |= DB_ENCRYPT;
/db-4.6.21/tcl/tcl_db_pkg.c:2571: case TCL_DBREM_ENCRYPT_AES:
/db-4.6.21/tcl/tcl_db_pkg.c:2580: enc_flag = DB_ENCRYPT_AES;
/db-4.6.21/tcl/tcl_db_pkg.c:2582: case TCL_DBREM_ENCRYPT_ANY:
/db-4.6.21/tcl/tcl_db_pkg.c:2682: ret = dbp->set_encrypt(dbp, passwd, enc_flag);
/db-4.6.21/tcl/tcl_db_pkg.c:2684: "set_encrypt");
/db-4.6.21/tcl/tcl_db_pkg.c:2724: "-encrypt",
/db-4.6.21/tcl/tcl_db_pkg.c:2734: TCL_DBMV_ENCRYPT,
/db-4.6.21/tcl/tcl_db_pkg.c:2735: TCL_DBMV_ENCRYPT_AES,
/db-4.6.21/tcl/tcl_db_pkg.c:2736: TCL_DBMV_ENCRYPT_ANY,
/db-4.6.21/tcl/tcl_db_pkg.c:2787: case TCL_DBMV_ENCRYPT:
/db-4.6.21/tcl/tcl_db_pkg.c:2788: set_flags |= DB_ENCRYPT;
/db-4.6.21/tcl/tcl_db_pkg.c:2791: case TCL_DBMV_ENCRYPT_AES:
/db-4.6.21/tcl/tcl_db_pkg.c:2800: enc_flag = DB_ENCRYPT_AES;
/db-4.6.21/tcl/tcl_db_pkg.c:2802: case TCL_DBMV_ENCRYPT_ANY:
/db-4.6.21/tcl/tcl_db_pkg.c:2913: ret = dbp->set_encrypt(dbp, passwd, enc_flag);
/db-4.6.21/tcl/tcl_db_pkg.c:2915: "set_encrypt");
/db-4.6.21/tcl/tcl_db_pkg.c:2956: "-encrypt",
/db-4.6.21/tcl/tcl_db_pkg.c:2969: TCL_DBVRFY_ENCRYPT,
/db-4.6.21/tcl/tcl_db_pkg.c:2970: TCL_DBVRFY_ENCRYPT_AES,
/db-4.6.21/tcl/tcl_db_pkg.c:2971: TCL_DBVRFY_ENCRYPT_ANY,
/db-4.6.21/tcl/tcl_db_pkg.c:3020: case TCL_DBVRFY_ENCRYPT:
/db-4.6.21/tcl/tcl_db_pkg.c:3021: set_flags |= DB_ENCRYPT;
/db-4.6.21/tcl/tcl_db_pkg.c:3024: case TCL_DBVRFY_ENCRYPT_AES:
/db-4.6.21/tcl/tcl_db_pkg.c:3033: enc_flag = DB_ENCRYPT_AES;
/db-4.6.21/tcl/tcl_db_pkg.c:3035: case TCL_DBVRFY_ENCRYPT_ANY:
/db-4.6.21/tcl/tcl_db_pkg.c:3161: ret = dbp->set_encrypt(dbp, passwd, enc_flag);
/db-4.6.21/tcl/tcl_db_pkg.c:3163: "set_encrypt");
/db-4.6.21/tcl/tcl_env.c:104: "get_encrypt_flags",
/db-4.6.21/tcl/tcl_env.c:937: ENVREM_ENCRYPT_AES,
/db-4.6.21/tcl/tcl_env.c:938: ENVREM_ENCRYPT_ANY,
/db-4.6.21/tcl/tcl_env.c:986: case ENVREM_ENCRYPT_AES:
/db-4.6.21/tcl/tcl_env.c:995: enc_flag = DB_ENCRYPT_AES;
/db-4.6.21/tcl/tcl_env.c:997: case ENVREM_ENCRYPT_ANY:
/db-4.6.21/tcl/tcl_env.c:1111: ret = e->set_encrypt(e, passwd, enc_flag);
/db-4.6.21/tcl/tcl_env.c:1113: "set_encrypt");
/db-4.6.21/tcl/tcl_env.c:1222: "-encrypt",
/db-4.6.21/tcl/tcl_env.c:1237: Tcl_WrongNumArgs(interp, 2, objv, "?-encrypt? filename");
/db-4.6.21/tcl/tcl_env.c:1248: flags |= DB_ENCRYPT;
/db-4.6.21/tcl/tcl_env.c:1274: "-encrypt",
/db-4.6.21/tcl/tcl_env.c:1289: Tcl_WrongNumArgs(interp, 2, objv, "?-encrypt? filename");
/db-4.6.21/tcl/tcl_env.c:1301: flags |= DB_ENCRYPT;
/db-4.6.21/tcl/tcl_env.c:2246: * Implements the ENV->get_encrypt_flags command.
/db-4.6.21/tcl/tcl_env.c:2263: } encrypt_flags[] = {
/db-4.6.21/tcl/tcl_env.c:2264: { DB_ENCRYPT_AES, "-encryptaes" },
/db-4.6.21/tcl/tcl_env.c:2273: ret = dbenv->get_encrypt_flags(dbenv, &flags);
/db-4.6.21/tcl/tcl_env.c:2275: "env get_encrypt_flags")) == TCL_OK) {
/db-4.6.21/tcl/tcl_env.c:2278: for (i = 0; encrypt_flags[i].flag != 0; i++)
/db-4.6.21/tcl/tcl_env.c:2279: if (LF_ISSET(encrypt_flags[i].flag)) {
/db-4.6.21/tcl/tcl_env.c:2283: buf, encrypt_flags[i].arg, sizeof(buf));
/db-4.6.21/tcl/tcl_db.c:113: "get_encrypt_flags",
/db-4.6.21/tcl/tcl_db.c:2575: { DB_ENCRYPT, "-encrypt" },
/db-4.6.21/libdb_java/db_java_wrap.c:1092: * Note: Different versions of the JNI disagree on the signature for
/db-4.6.21/libdb_java/db_java_wrap.c:2410:SWIGINTERN u_int32_t Db_get_encrypt_flags(struct Db *self){
/db-4.6.21/libdb_java/db_java_wrap.c:2412: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret))
/db-4.6.21/libdb_java/db_java_wrap.c:2539:SWIGINTERN db_ret_t Db_set_encrypt(struct Db *self,char const *passwd,u_int32_t flags){
/db-4.6.21/libdb_java/db_java_wrap.c:2540: return self->set_encrypt(self, passwd, flags);
/db-4.6.21/libdb_java/db_java_wrap.c:2684:SWIGINTERN u_int32_t DbEnv_get_encrypt_flags(struct DbEnv *self){
/db-4.6.21/libdb_java/db_java_wrap.c:2686: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret))
/db-4.6.21/libdb_java/db_java_wrap.c:2747:SWIGINTERN db_ret_t DbEnv_set_encrypt(struct DbEnv *self,char const *passwd,u_int32_t flags){
/db-4.6.21/libdb_java/db_java_wrap.c:2748: return self->set_encrypt(self, passwd, flags);
/db-4.6.21/libdb_java/db_java_wrap.c:3797: result = (u_int32_t)Db_get_encrypt_flags(arg1);
/db-4.6.21/libdb_java/db_java_wrap.c:4701: result = (db_ret_t)Db_set_encrypt(arg1,(char const *)arg2,arg3);
/db-4.6.21/libdb_java/db_java_wrap.c:5806: result = (u_int32_t)DbEnv_get_encrypt_flags(arg1);
/db-4.6.21/libdb_java/db_java_wrap.c:6201: result = (db_ret_t)DbEnv_set_encrypt(arg1,(char const *)arg2,arg3);
/db-4.6.21/libdb_java/README:73: which includes the method signature and a call to the method.
/db-4.6.21/libdb_java/java_util.i:969: * Note: Different versions of the JNI disagree on the signature for
/db-4.6.21/libdb_java/db.i:196: u_int32_t get_encrypt_flags() {
/db-4.6.21/libdb_java/db.i:198: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret))
/db-4.6.21/libdb_java/db.i:391: db_ret_t set_encrypt(const char *passwd, u_int32_t flags) {
/db-4.6.21/libdb_java/db.i:392: return self->set_encrypt(self, passwd, flags);
/db-4.6.21/libdb_java/db.i:679: u_int32_t get_encrypt_flags() {
/db-4.6.21/libdb_java/db.i:681: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret))
/db-4.6.21/libdb_java/db.i:770: db_ret_t set_encrypt(const char *passwd, u_int32_t flags) {
/db-4.6.21/libdb_java/db.i:771: return self->set_encrypt(self, passwd, flags);
/db-4.6.21/build_windows/db_dll.dsp:527:SOURCE=..\crypto\aes_method.c
/db-4.6.21/build_windows/db_dll.dsp:539:SOURCE=..\crypto\rijndael\rijndael-alg-fst.c
/db-4.6.21/build_windows/db_dll.dsp:543:SOURCE=..\crypto\rijndael\rijndael-api-fst.c
/db-4.6.21/build_windows/db_dll.dsp:859:SOURCE=..\hmac\hmac.c
/db-4.6.21/build_windows/db_dll.dsp:863:SOURCE=..\hmac\sha1.c
/db-4.6.21/build_windows/db.h:352: * Flags private to DB_ENV->set_encrypt.
/db-4.6.21/build_windows/db.h:354:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */
/db-4.6.21/build_windows/db.h:406:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */
/db-4.6.21/build_windows/db.h:1701: int (*get_encrypt_flags) __P((DB *, u_int32_t *));
/db-4.6.21/build_windows/db.h:1743: int (*set_encrypt) __P((DB *, const char *, u_int32_t));
/db-4.6.21/build_windows/db.h:1813:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */
/db-4.6.21/build_windows/db.h:2321: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *));
/db-4.6.21/build_windows/db.h:2432: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t));
/db-4.6.21/build_windows/db_cxx.h:204: virtual int get_encrypt_flags(u_int32_t *);
/db-4.6.21/build_windows/db_cxx.h:244: virtual int set_encrypt(const char *, u_int32_t);
/db-4.6.21/build_windows/db_cxx.h:425: virtual int get_encrypt_flags(u_int32_t *);
/db-4.6.21/build_windows/db_cxx.h:429: virtual int set_encrypt(const char *, u_int32_t);
/db-4.6.21/build_windows/db_static.dsp:463:SOURCE=..\crypto\aes_method.c
/db-4.6.21/build_windows/db_static.dsp:475:SOURCE=..\crypto\rijndael\rijndael-alg-fst.c
/db-4.6.21/build_windows/db_static.dsp:479:SOURCE=..\crypto\rijndael\rijndael-api-fst.c
/db-4.6.21/build_windows/db_static.dsp:795:SOURCE=..\hmac\hmac.c
/db-4.6.21/build_windows/db_static.dsp:799:SOURCE=..\hmac\sha1.c
/db-4.6.21/build_windows/db_small.dsp:711:SOURCE=..\hmac\hmac.c
/db-4.6.21/build_windows/db_small.dsp:715:SOURCE=..\hmac\sha1.c
/db-4.6.21/examples_cxx/getting_started/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce
/db-4.6.21/examples_cxx/getting_started/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh
/db-4.6.21/examples_cxx/getting_started/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine
/db-4.6.21/dbinc/db_cxx.in:203: virtual int get_encrypt_flags(u_int32_t *);
/db-4.6.21/dbinc/db_cxx.in:243: virtual int set_encrypt(const char *, u_int32_t);
/db-4.6.21/dbinc/db_cxx.in:424: virtual int get_encrypt_flags(u_int32_t *);
/db-4.6.21/dbinc/db_cxx.in:428: virtual int set_encrypt(const char *, u_int32_t);
/db-4.6.21/dbinc/hmac.h:6: * $Id: hmac.h,v 12.6 2007/05/17 15:15:05 bostic Exp $
/db-4.6.21/dbinc/hmac.h:9:#ifndef _DB_HMAC_H_
/db-4.6.21/dbinc/hmac.h:10:#define _DB_HMAC_H_
/db-4.6.21/dbinc/hmac.h:20: * SHA1 checksumming
/db-4.6.21/dbinc/hmac.h:26:} SHA1_CTX;
/db-4.6.21/dbinc/hmac.h:29: * AES assumes the SHA1 checksumming (also called MAC)
/db-4.6.21/dbinc/hmac.h:38:#include "dbinc_auto/hmac_ext.h"
/db-4.6.21/dbinc/hmac.h:39:#endif /* !_DB_HMAC_H_ */
/db-4.6.21/dbinc/db_page.h:76: u_int8_t encrypt_alg; /* 24: Encryption algorithm. */
/db-4.6.21/dbinc/db_page.h:257: * DB_AM_ENCRYPT always implies DB_AM_CHKSUM so that must come first.
/db-4.6.21/dbinc/db_page.h:261: (F_ISSET((dbp), DB_AM_ENCRYPT) ? sizeof(PG_CRYPTO) : \
/db-4.6.21/dbinc/db_page.h:265: (F_ISSET((dbp), DB_AM_ENCRYPT) ? ((u_int8_t *)(pg) + \
/db-4.6.21/dbinc/db_page.h:270: (F_ISSET((dbp), DB_AM_ENCRYPT) ? ((u_int8_t *)(pg) + \
/db-4.6.21/dbinc/db_page.h:310: (F_ISSET((dbp), DB_AM_ENCRYPT) ? QPAGE_SEC : \
/db-4.6.21/dbinc/db.in:325: * Flags private to DB_ENV->set_encrypt.
/db-4.6.21/dbinc/db.in:327:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */
/db-4.6.21/dbinc/db.in:379:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */
/db-4.6.21/dbinc/db.in:1674: int (*get_encrypt_flags) __P((DB *, u_int32_t *));
/db-4.6.21/dbinc/db.in:1716: int (*set_encrypt) __P((DB *, const char *, u_int32_t));
/db-4.6.21/dbinc/db.in:1786:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */
/db-4.6.21/dbinc/db.in:2294: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *));
/db-4.6.21/dbinc/db.in:2405: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t));
/db-4.6.21/dbinc/crypto.h:41: int (*decrypt) __P((DB_ENV *, void *, void *, u_int8_t *, size_t));
/db-4.6.21/dbinc/crypto.h:42: int (*encrypt) __P((DB_ENV *, void *, void *, u_int8_t *, size_t));
/db-4.6.21/dbinc/crypto.h:48:#define CIPHER_AES 1 /* AES algorithm */
/db-4.6.21/dbinc/crypto.h:58:#include "crypto/rijndael/rijndael-api-fst.h"
/db-4.6.21/dbinc/crypto.h:70:#define DB_AES_KEYLEN 128 /* AES key length */
/db-4.6.21/dbinc/crypto.h:71:#define DB_AES_CHUNK 16 /* AES byte unit size */
/db-4.6.21/dbinc/crypto.h:73:typedef struct __aes_cipher {
/db-4.6.21/dbinc/crypto.h:74: keyInstance decrypt_ki; /* Decryption key instance */
/db-4.6.21/dbinc/crypto.h:75: keyInstance encrypt_ki; /* Encryption key instance */
/db-4.6.21/dbinc/crypto.h:76: u_int32_t flags; /* AES-specific flags */
/db-4.6.21/dbinc/crypto.h:77:} AES_CIPHER;
/db-4.6.21/build_brew/bdb_brew.dsp:381:SOURCE=..\hmac\hmac.c
/db-4.6.21/build_brew/bdb_brew.dsp:384:SOURCE=..\hmac\sha1.c
/db-4.6.21/build_brew/bdbread.mak:36:OBJS =bdbread.o AEEModGen.o AEEAppGen.o bt_compact.o bt_compare.o bt_conv.o bt_curadj.o bt_cursor.o bt_delete.o bt_method.o bt_open.o bt_put.o bt_rec.o bt_reclaim.o bt_recno.o bt_rsearch.o bt_search.o bt_split.o bt_stat.o btree_auto.o atol.o isalpha.o isdigit.o isprint.o isspace.o printf.o qsort.o rand.o strcasecmp.o strerror.o strncat.o strsep.o strtol.o crypto_stub.o db_byteorder.o db_err.o db_getlong.o db_idspace.o db_log2.o db_shash.o mkpath.o crdel_auto.o crdel_rec.o db.o db_am.o db_auto.o db_cam.o db_cds.o db_conv.o db_dispatch.o db_dup.o db_iface.o db_join.o db_meta.o db_method.o db_open.o db_overflow.o db_pr.o db_rec.o db_reclaim.o db_remove.o db_rename.o db_ret.o db_setid.o db_setlsn.o db_stati.o db_truncate.o db_upg.o db_vrfy_stub.o dbreg.o dbreg_auto.o dbreg_rec.o dbreg_stat.o dbreg_util.o env_alloc.o env_config.o env_failchk.o env_file.o env_method.o env_name.o env_open.o env_recover.o env_region.o env_register.o env_stat.o fileops_auto.o fop_basic.o fop_rec.o fop_util.o hash_func.o hash_stub.o hmac.o sha1.o lock_stub.o log.o log_archive.o log_compare.o log_debug.o log_get.o log_method.o log_put.o log_stat.o mp_alloc.o mp_bh.o mp_fget.o mp_fmethod.o mp_fopen.o mp_fput.o mp_fset.o mp_method.o mp_mvcc.o mp_region.o mp_register.o mp_resize.o mp_stat.o mp_sync.o mp_trickle.o mut_stub.o os_alloc.o os_clock.o os_fid.o os_flock.o os_fzero.o os_getenv.o os_map.o os_region.o os_root.o os_rpath.o os_tmpdir.o os_uid.o os_yield.o ctime.o fclose.o fgetc.o fgets.o fopen.o fwrite.o getcwd.o globals.o localtime.o os_abort.o os_abs.o os_config.o os_dir.o os_errno.o os_handle.o os_mkdir.o os_oflags.o os_open.o os_pid.o os_rename.o os_rw.o os_seek.o os_sleep.o os_stat.o os_truncate.o os_unlink.o time.o qam_stub.o rep_stub.o repmgr_stub.o txn.o txn_auto.o txn_chkpt.o txn_failchk.o txn_method.o txn_rec.o txn_recover.o txn_region.o txn_stat.o txn_util.o xa_stub.o
/db-4.6.21/build_brew/bdbread.mak:327:RULE10 = ..\hmac
/db-4.6.21/build_brew/bdbread.mak:507:hmac.o: ..\hmac\hmac.c
/db-4.6.21/build_brew/bdbread.mak:508:sha1.o: ..\hmac\sha1.c
/db-4.6.21/build_brew/db.h:315: * Flags private to DB_ENV->set_encrypt.
/db-4.6.21/build_brew/db.h:317:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */
/db-4.6.21/build_brew/db.h:369:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */
/db-4.6.21/build_brew/db.h:1664: int (*get_encrypt_flags) __P((DB *, u_int32_t *));
/db-4.6.21/build_brew/db.h:1706: int (*set_encrypt) __P((DB *, const char *, u_int32_t));
/db-4.6.21/build_brew/db.h:1776:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */
/db-4.6.21/build_brew/db.h:2284: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *));
/db-4.6.21/build_brew/db.h:2395: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t));
/db-4.6.21/crypto/aes_method.c:9: * $Id: aes_method.c,v 12.7 2007/05/17 15:14:55 bostic Exp $
/db-4.6.21/crypto/aes_method.c:16:#include "dbinc/hmac.h"
/db-4.6.21/crypto/aes_method.c:18:static void __aes_err __P((DB_ENV *, int));
/db-4.6.21/crypto/aes_method.c:19:static int __aes_derivekeys __P((DB_ENV *, DB_CIPHER *, u_int8_t *, size_t));
/db-4.6.21/crypto/aes_method.c:22: * __aes_setup --
/db-4.6.21/crypto/aes_method.c:23: * Setup AES functions.
/db-4.6.21/crypto/aes_method.c:25: * PUBLIC: int __aes_setup __P((DB_ENV *, DB_CIPHER *));
/db-4.6.21/crypto/aes_method.c:28:__aes_setup(dbenv, db_cipher)
/db-4.6.21/crypto/aes_method.c:32: AES_CIPHER *aes_cipher;
/db-4.6.21/crypto/aes_method.c:35: db_cipher->adj_size = __aes_adj_size;
/db-4.6.21/crypto/aes_method.c:36: db_cipher->close = __aes_close;
/db-4.6.21/crypto/aes_method.c:37: db_cipher->decrypt = __aes_decrypt;
/db-4.6.21/crypto/aes_method.c:38: db_cipher->encrypt = __aes_encrypt;
/db-4.6.21/crypto/aes_method.c:39: db_cipher->init = __aes_init;
/db-4.6.21/crypto/aes_method.c:40: if ((ret = __os_calloc(dbenv, 1, sizeof(AES_CIPHER), &aes_cipher)) != 0)
/db-4.6.21/crypto/aes_method.c:42: db_cipher->data = aes_cipher;
/db-4.6.21/crypto/aes_method.c:47: * __aes_adj_size --
/db-4.6.21/crypto/aes_method.c:51: * PUBLIC: u_int __aes_adj_size __P((size_t));
/db-4.6.21/crypto/aes_method.c:54:__aes_adj_size(len)
/db-4.6.21/crypto/aes_method.c:57: if (len % DB_AES_CHUNK == 0)
/db-4.6.21/crypto/aes_method.c:59: return (DB_AES_CHUNK - (u_int)(len % DB_AES_CHUNK));
/db-4.6.21/crypto/aes_method.c:63: * __aes_close --
/db-4.6.21/crypto/aes_method.c:64: * Destroy the AES encryption instantiation.
/db-4.6.21/crypto/aes_method.c:66: * PUBLIC: int __aes_close __P((DB_ENV *, void *));
/db-4.6.21/crypto/aes_method.c:69:__aes_close(dbenv, data)
/db-4.6.21/crypto/aes_method.c:78: * __aes_decrypt --
/db-4.6.21/crypto/aes_method.c:79: * Decrypt data with AES.
/db-4.6.21/crypto/aes_method.c:81: * PUBLIC: int __aes_decrypt __P((DB_ENV *, void *, void *,
/db-4.6.21/crypto/aes_method.c:85:__aes_decrypt(dbenv, aes_data, iv, cipher, cipher_len)
/db-4.6.21/crypto/aes_method.c:87: void *aes_data;
/db-4.6.21/crypto/aes_method.c:92: AES_CIPHER *aes;
/db-4.6.21/crypto/aes_method.c:96: aes = (AES_CIPHER *)aes_data;
/db-4.6.21/crypto/aes_method.c:99: if ((cipher_len % DB_AES_CHUNK) != 0)
/db-4.6.21/crypto/aes_method.c:104: if ((ret = __db_cipherInit(&c, MODE_CBC, iv)) < 0) {
/db-4.6.21/crypto/aes_method.c:105: __aes_err(dbenv, ret);
/db-4.6.21/crypto/aes_method.c:110: if ((ret = __db_blockDecrypt(&c, &aes->decrypt_ki, cipher,
/db-4.6.21/crypto/aes_method.c:112: __aes_err(dbenv, ret);
/db-4.6.21/crypto/aes_method.c:119: * __aes_encrypt --
/db-4.6.21/crypto/aes_method.c:120: * Encrypt data with AES.
/db-4.6.21/crypto/aes_method.c:122: * PUBLIC: int __aes_encrypt __P((DB_ENV *, void *, void *,
/db-4.6.21/crypto/aes_method.c:126:__aes_encrypt(dbenv, aes_data, iv, data, data_len)
/db-4.6.21/crypto/aes_method.c:128: void *aes_data;
/db-4.6.21/crypto/aes_method.c:133: AES_CIPHER *aes;
/db-4.6.21/crypto/aes_method.c:138: aes = (AES_CIPHER *)aes_data;
/db-4.6.21/crypto/aes_method.c:139: if (aes == NULL || data == NULL)
/db-4.6.21/crypto/aes_method.c:141: if ((data_len % DB_AES_CHUNK) != 0)
/db-4.6.21/crypto/aes_method.c:158: if ((ret = __db_cipherInit(&c, MODE_CBC, (char *)tmp_iv)) < 0) {
/db-4.6.21/crypto/aes_method.c:159: __aes_err(dbenv, ret);
/db-4.6.21/crypto/aes_method.c:164: if ((ret = __db_blockEncrypt(&c, &aes->encrypt_ki, data, data_len * 8,
/db-4.6.21/crypto/aes_method.c:166: __aes_err(dbenv, ret);
/db-4.6.21/crypto/aes_method.c:174: * __aes_init --
/db-4.6.21/crypto/aes_method.c:175: * Initialize the AES encryption instantiation.
/db-4.6.21/crypto/aes_method.c:177: * PUBLIC: int __aes_init __P((DB_ENV *, DB_CIPHER *));
/db-4.6.21/crypto/aes_method.c:180:__aes_init(dbenv, db_cipher)
/db-4.6.21/crypto/aes_method.c:184: return (__aes_derivekeys(dbenv, db_cipher, (u_int8_t *)dbenv->passwd,
/db-4.6.21/crypto/aes_method.c:189:__aes_derivekeys(dbenv, db_cipher, passwd, plen)
/db-4.6.21/crypto/aes_method.c:195: SHA1_CTX ctx;
/db-4.6.21/crypto/aes_method.c:196: AES_CIPHER *aes;
/db-4.6.21/crypto/aes_method.c:203: aes = (AES_CIPHER *)db_cipher->data;
/db-4.6.21/crypto/aes_method.c:212: if ((ret = __db_makeKey(&aes->encrypt_ki, DIR_ENCRYPT,
/db-4.6.21/crypto/aes_method.c:213: DB_AES_KEYLEN, (char *)temp)) != TRUE) {
/db-4.6.21/crypto/aes_method.c:214: __aes_err(dbenv, ret);
/db-4.6.21/crypto/aes_method.c:217: if ((ret = __db_makeKey(&aes->decrypt_ki, DIR_DECRYPT,
/db-4.6.21/crypto/aes_method.c:218: DB_AES_KEYLEN, (char *)temp)) != TRUE) {
/db-4.6.21/crypto/aes_method.c:219: __aes_err(dbenv, ret);
/db-4.6.21/crypto/aes_method.c:226: * __aes_err --
/db-4.6.21/crypto/aes_method.c:227: * Handle AES-specific errors. Codes and messages derived from
/db-4.6.21/crypto/aes_method.c:228: * rijndael/rijndael-api-fst.h.
/db-4.6.21/crypto/aes_method.c:231:__aes_err(dbenv, err)
/db-4.6.21/crypto/aes_method.c:239: errstr = "AES key direction is invalid";
/db-4.6.21/crypto/aes_method.c:242: errstr = "AES key material not of correct length";
/db-4.6.21/crypto/aes_method.c:245: errstr = "AES key passwd not valid";
/db-4.6.21/crypto/aes_method.c:248: errstr = "AES cipher in wrong state (not initialized)";
/db-4.6.21/crypto/aes_method.c:251: errstr = "AES bad block length";
/db-4.6.21/crypto/aes_method.c:254: errstr = "AES cipher instance is invalid";
/db-4.6.21/crypto/aes_method.c:257: errstr = "AES data contents are invalid";
/db-4.6.21/crypto/aes_method.c:260: errstr = "AES unknown error";
/db-4.6.21/crypto/aes_method.c:263: errstr = "AES error unrecognized";
/db-4.6.21/crypto/crypto.c:199: case CIPHER_AES:
/db-4.6.21/crypto/crypto.c:200: db_cipher->alg = CIPHER_AES;
/db-4.6.21/crypto/crypto.c:201: ret = __aes_setup(dbenv, db_cipher);
/db-4.6.21/crypto/crypto.c:213: * __crypto_decrypt_meta --
/db-4.6.21/crypto/crypto.c:216: * PUBLIC: int __crypto_decrypt_meta __P((DB_ENV *, DB *, u_int8_t *, int));
/db-4.6.21/crypto/crypto.c:219:__crypto_decrypt_meta(dbenv, dbp, mbuf, do_metachk)
/db-4.6.21/crypto/crypto.c:233: * If we weren't given a dbp, we just want to decrypt the page on
/db-4.6.21/crypto/crypto.c:260: * This works because we do not encrypt the page header.
/db-4.6.21/crypto/crypto.c:267: * non-zero IV (that is written after encryption) then we decrypt (or
/db-4.6.21/crypto/crypto.c:273: * algorithms we know about attempting to decrypt (and possibly
/db-4.6.21/crypto/crypto.c:280: if (meta->encrypt_alg != 0) {
/db-4.6.21/crypto/crypto.c:282: if (!F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.6.21/crypto/crypto.c:294: F_SET(dbp, DB_AM_ENCRYPT|DB_AM_CHKSUM);
/db-4.6.21/crypto/crypto.c:297: * This was checked in set_flags when DB_AM_ENCRYPT was set.
/db-4.6.21/crypto/crypto.c:302: meta->encrypt_alg != db_cipher->alg) {
/db-4.6.21/crypto/crypto.c:310: * For ALL pages, we do not encrypt the beginning of the page
/db-4.6.21/crypto/crypto.c:321: if (do_metachk && (ret = db_cipher->decrypt(dbenv,
/db-4.6.21/crypto/crypto.c:342: ret = __crypto_algsetup(dbenv, db_cipher, meta->encrypt_alg, 1);
/db-4.6.21/crypto/crypto.c:344: } else if (F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.6.21/crypto/crypto.c:395: return (__env_set_encrypt(dbenv_dest, sh_passwd, DB_ENCRYPT_AES));
/db-4.6.21/crypto/mersenne/mt19937db.c:8:#include "dbinc/hmac.h"
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:2: * rijndael-api-fst.c
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:6: * Optimised ANSI C code for the Rijndael cipher (now AES)
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:42:#include "crypto/rijndael/rijndael-alg-fst.h"
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:43:#include "crypto/rijndael/rijndael-api-fst.h"
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:63: if ((direction == DIR_ENCRYPT) || (direction == DIR_DECRYPT)) {
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:79: if (direction == DIR_ENCRYPT) {
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:99: if ((mode == MODE_ECB) || (mode == MODE_CBC) || (mode == MODE_CFB1)) {
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:130: key->direction == DIR_DECRYPT) {
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:148: case MODE_CBC:
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:188: * Encrypt data partitioned in octets, using RFC 2040-like padding.
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:216: key->direction == DIR_DECRYPT) {
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:239: case MODE_CBC:
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:290: (cipher->mode != MODE_CFB1 && key->direction == DIR_ENCRYPT)) {
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:308: case MODE_CBC:
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:367: key->direction == DIR_ENCRYPT) {
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:401: case MODE_CBC:
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:475: case DIR_ENCRYPT:
/db-4.6.21/crypto/rijndael/rijndael-api-fst.c:479: case DIR_DECRYPT:
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:2: * $Id: rijndael-api-fst.h,v 12.0 2004/11/17 03:43:17 bostic Exp $
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:5: * rijndael-api-fst.h
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:9: * Optimised ANSI C code for the Rijndael cipher (now AES)
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:41:#ifndef __RIJNDAEL_API_FST_H
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:42:#define __RIJNDAEL_API_FST_H
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:44:#include "crypto/rijndael/rijndael-alg-fst.h"
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:47:#define DIR_ENCRYPT 0 /* Are we encrpyting? */
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:48:#define DIR_DECRYPT 1 /* Are we decrpyting? */
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:50:#define MODE_CBC 2 /* Are we ciphering in CBC mode? */
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:87: u_int8_t mode; /* MODE_ECB, MODE_CBC, or MODE_CFB1 */
/db-4.6.21/crypto/rijndael/rijndael-api-fst.h:91:#endif /* __RIJNDAEL_API_FST_H */
/db-4.6.21/crypto/rijndael/rijndael-alg-fst.c:2: * rijndael-alg-fst.c
/db-4.6.21/crypto/rijndael/rijndael-alg-fst.c:6: * Optimised ANSI C code for the Rijndael cipher (now AES)
/db-4.6.21/crypto/rijndael/rijndael-alg-fst.c:31:#include "crypto/rijndael/rijndael-alg-fst.h"
/db-4.6.21/crypto/rijndael/rijndael-alg-fst.c:712: 0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
/db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:2: * $Id: rijndael-alg-fst.h,v 12.1 2006/09/08 20:32:03 bostic Exp $
/db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:5: * rijndael-alg-fst.h
/db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:9: * Optimised ANSI C code for the Rijndael cipher (now AES)
/db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:29:#ifndef __RIJNDAEL_ALG_FST_H
/db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:30:#define __RIJNDAEL_ALG_FST_H
/db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:40:#endif /* __RIJNDAEL_ALG_FST_H */
/db-4.6.21/crypto/crypto.html:59:a single environment method: DBENV->set_encrypt().
/db-4.6.21/crypto/crypto.html:61:by adding a new database method: DB->set_encrypt().
/db-4.6.21/crypto/crypto.html:62:
Both of the set_encrypt methods must be called before their respective
/db-4.6.21/crypto/crypto.html:68:
DBENV->set_encrypt(DBENV *dbenv, /* DB_ENV structure */
/db-4.6.21/crypto/crypto.html:72:DB->set_encrypt(DB *dbp, /* DB structure */
/db-4.6.21/crypto/crypto.html:76:#define DB_ENCRYPT_AES 0x00000001 /* Use the AES encryption algorithm */
/db-4.6.21/crypto/crypto.html:86:Using DB_ENCRYPT_AES automatically implies SHA1 checksumming.
/db-4.6.21/crypto/crypto.html:91:DB->set_encrypt
/db-4.6.21/crypto/crypto.html:109:our set_encrypt method to be the RPC or local version. Therefore
/db-4.6.21/crypto/crypto.html:117: int (*encrypt)__P((...)); /* Alg-specific encryption algorithm */
/db-4.6.21/crypto/crypto.html:118: int (*decrypt)__P((...)); /* Alg-specific decryption function */
/db-4.6.21/crypto/crypto.html:119: void *data; /* Pointer to alg-specific information (AES_CIPHER) */
/db-4.6.21/crypto/crypto.html:124:typedef struct __aes_cipher {
/db-4.6.21/crypto/crypto.html:125: keyInstance encrypt_ki; /* Encrypt keyInstance temp. */
/db-4.6.21/crypto/crypto.html:126: keyInstance decrypt_ki; /* Decrypt keyInstance temp. */
/db-4.6.21/crypto/crypto.html:128: u_int32_t flags; /* AES-specific flags */
/db-4.6.21/crypto/crypto.html:129:} AES_CIPHER;
/db-4.6.21/crypto/crypto.html:133:During dbenv->set_encrypt,
/db-4.6.21/crypto/crypto.html:137:other subsystems. For now, only AES ciphering functions and SHA1
/db-4.6.21/crypto/crypto.html:160:we will call __aes_init. Additionally this function will allocate
/db-4.6.21/crypto/crypto.html:164:
In the AES-specific initialization function, __aes_init,
/db-4.6.21/crypto/crypto.html:166:__aes_derivekeys in order to fill
/db-4.6.21/crypto/crypto.html:173:During db->set_encrypt,
/db-4.6.21/crypto/crypto.html:193:meta-page. In __db_pgin, we will decrypt if the page we have
/db-4.6.21/crypto/crypto.html:220:
__aes_derivekeys(DB_ENV *dbenv, /* dbenv */
/db-4.6.21/crypto/crypto.html:224: keyInstance *encrypt_key, /* Encryption key of passwd */
/db-4.6.21/crypto/crypto.html:225: keyInstance *decrypt_key); /* Decryption key of passwd */
/db-4.6.21/crypto/crypto.html:231:already be allocated. These will be stored in the AES_CIPHER structure.
/db-4.6.21/crypto/crypto.html:239:the 20-byte key set up in __aes_derivekeys. If they just want
/db-4.6.21/crypto/crypto.html:254:__aes_encrypt(DB_ENV *dbenv, /* dbenv */
/db-4.6.21/crypto/crypto.html:257: u_int8_t *data, /* Data to encrypt */
/db-4.6.21/crypto/crypto.html:258: size_t data_len); /* Length of data to encrypt - 16 byte multiple */
/db-4.6.21/crypto/crypto.html:259:This is the function to encrypt data. It will be called to encrypt
/db-4.6.21/crypto/crypto.html:261:__aes_derivekeys.
/db-4.6.21/crypto/crypto.html:264:in a pointer to the data to encrypt and its length in data_len.
/db-4.6.21/crypto/crypto.html:268:__aes_decrypt(DB_ENV *dbenv, /* dbenv */
/db-4.6.21/crypto/crypto.html:271: u_int8_t *data, /* Data to decrypt */
/db-4.6.21/crypto/crypto.html:272: size_t data_len); /* Length of data to decrypt - 16 byte multiple */
/db-4.6.21/crypto/crypto.html:273:This is the function to decrypt the data. It is exactly the same
/db-4.6.21/crypto/crypto.html:280:bytes every time we encrypt any data with the same password. For
/db-4.6.21/crypto/crypto.html:287:generator with the time (tv_sec) hashed through SHA1 when we create the
/db-4.6.21/crypto/crypto.html:300:to the MT code will come while encrypting some data in __aes_encrypt.
/db-4.6.21/crypto/crypto.html:332:We will encrypt after the method-specific function on page-out and decrypt
/db-4.6.21/crypto/crypto.html:345:our first index is based on whether we have DB_AM_CHKSUM and DB_AM_ENCRYPT
/db-4.6.21/crypto/crypto.html:349:as some space to get proper alignment to encrypt on a 16-byte boundary.
/db-4.6.21/crypto/crypto.html:368:to encrypt to all zero's. If we read a hole in a file, we do not
/db-4.6.21/crypto/crypto.html:399:to encrypt the DBT we send down. The __log_put function is
/db-4.6.21/crypto/crypto.html:405:new __log_put will encrypt if needed and then call __log_put_internal
/db-4.6.21/crypto/crypto.html:410:will need to encrypt.
/db-4.6.21/crypto/crypto.html:465:to be sent to the clients decrypted and the clients will have to encrypt
/db-4.6.21/crypto/crypto.html:469:to the client. Therefore, the client has no way to decrypt a log
/db-4.6.21/crypto/crypto.html:474:On the master side we must copy the DBT sent in. We encrypt the
/db-4.6.21/crypto/crypto.html:496:calls to the __aes_derivekeys function with the same password yields
/db-4.6.21/db_stat/db_stat.c:258: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/txn/txn.c:44:#include "dbinc/hmac.h"
/db-4.6.21/txn/txn.c:1628: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data,
/db-4.6.21/txn/txn.c:1640: (ret = db_cipher->encrypt(dbenv,
/db-4.6.21/db_checkpoint/db_checkpoint.c:134: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/db_checkpoint/db_checkpoint.c:135: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/rpc_server/c/gen_db_server.c:106:__env_get_encrypt_flags_reply *
/db-4.6.21/rpc_server/c/gen_db_server.c:107:__db_env_get_encrypt_flags_4006__SVCSUFFIX__(msg, req)
/db-4.6.21/rpc_server/c/gen_db_server.c:108: __env_get_encrypt_flags_msg *msg;
/db-4.6.21/rpc_server/c/gen_db_server.c:111: static __env_get_encrypt_flags_reply reply; /* must be static */
/db-4.6.21/rpc_server/c/gen_db_server.c:114: __env_get_encrypt_flags_proc(msg->dbenvcl_id,
/db-4.6.21/rpc_server/c/gen_db_server.c:212:__env_set_encrypt_reply *
/db-4.6.21/rpc_server/c/gen_db_server.c:213:__db_env_set_encrypt_4006__SVCSUFFIX__(msg, req)
/db-4.6.21/rpc_server/c/gen_db_server.c:214: __env_set_encrypt_msg *msg;
/db-4.6.21/rpc_server/c/gen_db_server.c:217: static __env_set_encrypt_reply reply; /* must be static */
/db-4.6.21/rpc_server/c/gen_db_server.c:220: __env_set_encrypt_proc(msg->dbenvcl_id,
/db-4.6.21/rpc_server/c/gen_db_server.c:435:__db_get_encrypt_flags_reply *
/db-4.6.21/rpc_server/c/gen_db_server.c:436:__db_db_get_encrypt_flags_4006__SVCSUFFIX__(msg, req)
/db-4.6.21/rpc_server/c/gen_db_server.c:437: __db_get_encrypt_flags_msg *msg;
/db-4.6.21/rpc_server/c/gen_db_server.c:440: static __db_get_encrypt_flags_reply reply; /* must be static */
/db-4.6.21/rpc_server/c/gen_db_server.c:443: __db_get_encrypt_flags_proc(msg->dbpcl_id,
/db-4.6.21/rpc_server/c/gen_db_server.c:792:__db_set_encrypt_reply *
/db-4.6.21/rpc_server/c/gen_db_server.c:793:__db_db_set_encrypt_4006__SVCSUFFIX__(msg, req)
/db-4.6.21/rpc_server/c/gen_db_server.c:794: __db_set_encrypt_msg *msg;
/db-4.6.21/rpc_server/c/gen_db_server.c:797: static __db_set_encrypt_reply reply; /* must be static */
/db-4.6.21/rpc_server/c/gen_db_server.c:800: __db_set_encrypt_proc(msg->dbpcl_id,
/db-4.6.21/rpc_server/c/db_server_util.c:794: (void)dbenv->set_encrypt(dbenv, hp->passwd,
/db-4.6.21/rpc_server/c/db_server_util.c:795: DB_ENCRYPT_AES);
/db-4.6.21/rpc_server/c/db_server_proc.c:216: * PUBLIC: void __env_get_encrypt_flags_proc __P((u_int,
/db-4.6.21/rpc_server/c/db_server_proc.c:217: * PUBLIC: __env_get_encrypt_flags_reply *));
/db-4.6.21/rpc_server/c/db_server_proc.c:220:__env_get_encrypt_flags_proc(dbenvcl_id, replyp)
/db-4.6.21/rpc_server/c/db_server_proc.c:222: __env_get_encrypt_flags_reply *replyp;
/db-4.6.21/rpc_server/c/db_server_proc.c:230: replyp->status = dbenv->get_encrypt_flags(dbenv, &replyp->flags);
/db-4.6.21/rpc_server/c/db_server_proc.c:234: * PUBLIC: void __env_set_encrypt_proc __P((u_int, char *, u_int32_t,
/db-4.6.21/rpc_server/c/db_server_proc.c:235: * PUBLIC: __env_set_encrypt_reply *));
/db-4.6.21/rpc_server/c/db_server_proc.c:238:__env_set_encrypt_proc(dbenvcl_id, passwd, flags, replyp)
/db-4.6.21/rpc_server/c/db_server_proc.c:242: __env_set_encrypt_reply *replyp;
/db-4.6.21/rpc_server/c/db_server_proc.c:251: ret = dbenv->set_encrypt(dbenv, passwd, flags);
/db-4.6.21/rpc_server/c/db_server_proc.c:881: * PUBLIC: void __db_get_encrypt_flags_proc __P((u_int,
/db-4.6.21/rpc_server/c/db_server_proc.c:882: * PUBLIC: __db_get_encrypt_flags_reply *));
/db-4.6.21/rpc_server/c/db_server_proc.c:885:__db_get_encrypt_flags_proc(dbpcl_id, replyp)
/db-4.6.21/rpc_server/c/db_server_proc.c:887: __db_get_encrypt_flags_reply *replyp;
/db-4.6.21/rpc_server/c/db_server_proc.c:895: replyp->status = dbp->get_encrypt_flags(dbp, &replyp->flags);
/db-4.6.21/rpc_server/c/db_server_proc.c:899: * PUBLIC: void __db_set_encrypt_proc __P((u_int, char *, u_int32_t,
/db-4.6.21/rpc_server/c/db_server_proc.c:900: * PUBLIC: __db_set_encrypt_reply *));
/db-4.6.21/rpc_server/c/db_server_proc.c:903:__db_set_encrypt_proc(dbpcl_id, passwd, flags, replyp)
/db-4.6.21/rpc_server/c/db_server_proc.c:907: __db_set_encrypt_reply *replyp;
/db-4.6.21/rpc_server/c/db_server_proc.c:916: ret = dbp->set_encrypt(dbp, passwd, flags);
/db-4.6.21/rpc_server/db_server.x:72:struct __env_get_encrypt_flags_msg {
/db-4.6.21/rpc_server/db_server.x:76:struct __env_get_encrypt_flags_reply {
/db-4.6.21/rpc_server/db_server.x:148:struct __env_set_encrypt_msg {
/db-4.6.21/rpc_server/db_server.x:154:struct __env_set_encrypt_reply {
/db-4.6.21/rpc_server/db_server.x:301:struct __db_get_encrypt_flags_msg {
/db-4.6.21/rpc_server/db_server.x:305:struct __db_get_encrypt_flags_reply {
/db-4.6.21/rpc_server/db_server.x:556:struct __db_set_encrypt_msg {
/db-4.6.21/rpc_server/db_server.x:562:struct __db_set_encrypt_reply {
/db-4.6.21/rpc_server/db_server.x:879: __env_get_encrypt_flags_reply __DB_env_get_encrypt_flags(__env_get_encrypt_flags_msg) = 7;
/db-4.6.21/rpc_server/db_server.x:886: __env_set_encrypt_reply __DB_env_set_encrypt(__env_set_encrypt_msg) = 14;
/db-4.6.21/rpc_server/db_server.x:898: __db_get_encrypt_flags_reply __DB_db_get_encrypt_flags(__db_get_encrypt_flags_msg) = 26;
/db-4.6.21/rpc_server/db_server.x:918: __db_set_encrypt_reply __DB_db_set_encrypt(__db_set_encrypt_msg) = 46;
/db-4.6.21/rpc_server/cxx/db_server_cxxutil.cpp:723: (void)dbenv->set_encrypt(hp->passwd, DB_ENCRYPT_AES);
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:185:__env_get_encrypt_flags_proc(
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:187: __env_get_encrypt_flags_reply *replyp)
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:195: replyp->status = dbenv->get_encrypt_flags(&replyp->flags);
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:199:__env_set_encrypt_proc(
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:203: __env_set_encrypt_reply *replyp)
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:212: ret = dbenv->set_encrypt(passwd, flags);
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:754:__db_get_encrypt_flags_proc(
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:756: __db_get_encrypt_flags_reply *replyp)
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:764: replyp->status = dbp->get_encrypt_flags(&replyp->flags);
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:768:__db_set_encrypt_proc(
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:772: __db_set_encrypt_reply *replyp)
/db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:781: ret = dbp->set_encrypt(passwd, flags);
/db-4.6.21/rpc_server/rpc.src:101:BEGIN env_get_encrypt_flags CODE
/db-4.6.21/rpc_server/rpc.src:227:BEGIN env_set_encrypt CODE
/db-4.6.21/rpc_server/rpc.src:357:BEGIN db_get_encrypt_flags CODE
/db-4.6.21/rpc_server/rpc.src:485:BEGIN db_set_encrypt CODE
/db-4.6.21/db_upgrade/db_upgrade.c:112: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/db_upgrade/db_upgrade.c:113: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/db_verify/db_verify.c:121: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/examples_c/getting_started/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce
/db-4.6.21/examples_c/getting_started/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh
/db-4.6.21/examples_c/getting_started/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine
/db-4.6.21/hmac/hmac.c:9: * $Id: hmac.c,v 12.11 2007/05/17 15:15:39 bostic Exp $
/db-4.6.21/hmac/hmac.c:18:#include "dbinc/hmac.h"
/db-4.6.21/hmac/hmac.c:21:#define HMAC_OUTPUT_SIZE 20
/db-4.6.21/hmac/hmac.c:22:#define HMAC_BLOCK_SIZE 64
/db-4.6.21/hmac/hmac.c:24:static void __db_hmac __P((u_int8_t *, u_int8_t *, size_t, u_int8_t *));
/db-4.6.21/hmac/hmac.c:30: * underlying SHA1 functions will properly pad the buffer if the data length
/db-4.6.21/hmac/hmac.c:37: * __db_hmac --
/db-4.6.21/hmac/hmac.c:41:__db_hmac(k, data, data_len, mac)
/db-4.6.21/hmac/hmac.c:45: SHA1_CTX ctx;
/db-4.6.21/hmac/hmac.c:46: u_int8_t key[HMAC_BLOCK_SIZE];
/db-4.6.21/hmac/hmac.c:47: u_int8_t ipad[HMAC_BLOCK_SIZE];
/db-4.6.21/hmac/hmac.c:48: u_int8_t opad[HMAC_BLOCK_SIZE];
/db-4.6.21/hmac/hmac.c:49: u_int8_t tmp[HMAC_OUTPUT_SIZE];
/db-4.6.21/hmac/hmac.c:52: memset(key, 0x00, HMAC_BLOCK_SIZE);
/db-4.6.21/hmac/hmac.c:53: memset(ipad, 0x36, HMAC_BLOCK_SIZE);
/db-4.6.21/hmac/hmac.c:54: memset(opad, 0x5C, HMAC_BLOCK_SIZE);
/db-4.6.21/hmac/hmac.c:56: memcpy(key, k, HMAC_OUTPUT_SIZE);
/db-4.6.21/hmac/hmac.c:58: for (i = 0; i < HMAC_BLOCK_SIZE; i++) {
/db-4.6.21/hmac/hmac.c:64: __db_SHA1Update(&ctx, ipad, HMAC_BLOCK_SIZE);
/db-4.6.21/hmac/hmac.c:68: __db_SHA1Update(&ctx, opad, HMAC_BLOCK_SIZE);
/db-4.6.21/hmac/hmac.c:69: __db_SHA1Update(&ctx, tmp, HMAC_OUTPUT_SIZE);
/db-4.6.21/hmac/hmac.c:76: * Create a MAC/SHA1 checksum.
/db-4.6.21/hmac/hmac.c:117: __db_hmac(mac_key, data, data_len, store);
/db-4.6.21/hmac/hmac.c:127: * Create a MAC/SHA1 key.
/db-4.6.21/hmac/hmac.c:137: SHA1_CTX ctx;
/db-4.6.21/hmac/hmac.c:159:__db_check_chksum(dbenv, hdr, db_cipher, chksum, data, data_len, is_hmac)
/db-4.6.21/hmac/hmac.c:166: int is_hmac;
/db-4.6.21/hmac/hmac.c:178: if (is_hmac == 0) {
/db-4.6.21/hmac/hmac.c:217: __db_hmac(mac_key, data, data_len, new);
/db-4.6.21/hmac/sha1.c:2: * $Id: sha1.c,v 12.4 2007/05/17 17:18:00 bostic Exp $
/db-4.6.21/hmac/sha1.c:8:#include "dbinc/hmac.h"
/db-4.6.21/hmac/sha1.c:11:SHA-1 in C
/db-4.6.21/hmac/sha1.c:22: void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned int
/db-4.6.21/hmac/sha1.c:25: void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned
/db-4.6.21/hmac/sha1.c:94:/* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
/db-4.6.21/hmac/sha1.c:102:static void __db_SHAPrintContext __P((SHA1_CTX *, char *));
/db-4.6.21/hmac/sha1.c:105: SHA1_CTX *context;
/db-4.6.21/hmac/sha1.c:191: * PUBLIC: void __db_SHA1Init __P((SHA1_CTX *));
/db-4.6.21/hmac/sha1.c:195: SHA1_CTX *context;
/db-4.6.21/hmac/sha1.c:197: /* SHA1 initialization constants */
/db-4.6.21/hmac/sha1.c:212: * PUBLIC: void __db_SHA1Update __P((SHA1_CTX *, unsigned char *,
/db-4.6.21/hmac/sha1.c:217: SHA1_CTX *context;
/db-4.6.21/hmac/sha1.c:250: * PUBLIC: void __db_SHA1Final __P((unsigned char *, SHA1_CTX *));
/db-4.6.21/hmac/sha1.c:255: SHA1_CTX *context;
/db-4.6.21/dist/Makefile.in:202: hmac@o@ hsearch@o@ log@o@ log_archive@o@ log_compare@o@ \
/db-4.6.21/dist/Makefile.in:214: sequence@o@ sha1@o@ snprintf@o@ txn@o@ txn_auto@o@ txn_chkpt@o@ \
/db-4.6.21/dist/Makefile.in:223: aes_method@o@ crypto@o@ mt19937db@o@ rijndael-alg-fst@o@ \
/db-4.6.21/dist/Makefile.in:224: rijndael-api-fst@o@
/db-4.6.21/dist/Makefile.in:1228:aes_method@o@: $(srcdir)/crypto/aes_method.c
/db-4.6.21/dist/Makefile.in:1436:hmac@o@: $(srcdir)/hmac/hmac.c
/db-4.6.21/dist/Makefile.in:1670:rijndael-alg-fst@o@: $(srcdir)/crypto/rijndael/rijndael-alg-fst.c
/db-4.6.21/dist/Makefile.in:1672:rijndael-api-fst@o@: $(srcdir)/crypto/rijndael/rijndael-api-fst.c
/db-4.6.21/dist/Makefile.in:1678:sha1@o@: $(srcdir)/hmac/sha1.c
/db-4.6.21/dist/tags:23:BAD_BLOCK_LENGTH ../crypto/rijndael/rijndael-api-fst.h 64
/db-4.6.21/dist/tags:24:BAD_CIPHER_INSTANCE ../crypto/rijndael/rijndael-api-fst.h 65
/db-4.6.21/dist/tags:25:BAD_CIPHER_MODE ../crypto/rijndael/rijndael-api-fst.h 62
/db-4.6.21/dist/tags:26:BAD_CIPHER_STATE ../crypto/rijndael/rijndael-api-fst.h 63
/db-4.6.21/dist/tags:27:BAD_DATA ../crypto/rijndael/rijndael-api-fst.h 66
/db-4.6.21/dist/tags:28:BAD_KEY_DIR ../crypto/rijndael/rijndael-api-fst.h 59
/db-4.6.21/dist/tags:29:BAD_KEY_INSTANCE ../crypto/rijndael/rijndael-api-fst.h 61
/db-4.6.21/dist/tags:30:BAD_KEY_MAT ../crypto/rijndael/rijndael-api-fst.h 60
/db-4.6.21/dist/tags:32:BAD_OTHER ../crypto/rijndael/rijndael-api-fst.h 67
/db-4.6.21/dist/tags:58:BITSPERBLOCK ../crypto/rijndael/rijndael-api-fst.h 56
/db-4.6.21/dist/tags:113:CIPHER_AES ../dbinc/crypto.h 48
/db-4.6.21/dist/tags:211:DB_AES_CHUNK ../dbinc/crypto.h 71
/db-4.6.21/dist/tags:212:DB_AES_KEYLEN ../dbinc/crypto.h 70
/db-4.6.21/dist/tags:227:DB_AM_ENCRYPT ../dbinc/db.in 1786
/db-4.6.21/dist/tags:311:DB_ENCRYPT ../dbinc/db.in 379
/db-4.6.21/dist/tags:312:DB_ENCRYPT_AES ../dbinc/db.in 327
/db-4.6.21/dist/tags:313:DB_ENC_MAGIC ../dbinc/hmac.h 32
/db-4.6.21/dist/tags:510:DB_MAC_MAGIC ../dbinc/hmac.h 31
/db-4.6.21/dist/tags:862:DIR_DECRYPT ../crypto/rijndael/rijndael-api-fst.h 48
/db-4.6.21/dist/tags:863:DIR_ENCRYPT ../crypto/rijndael/rijndael-api-fst.h 47
/db-4.6.21/dist/tags:933:DbEnv_get_encrypt_flags ../libdb_java/db_java_wrap.c /^SWIGINTERN u_int32_t DbEnv_get_encrypt_flags(struc/
/db-4.6.21/dist/tags:1020:DbEnv_set_encrypt ../libdb_java/db_java_wrap.c /^SWIGINTERN db_ret_t DbEnv_set_encrypt(struct DbEnv/
/db-4.6.21/dist/tags:1151:Db_get_encrypt_flags ../libdb_java/db_java_wrap.c /^SWIGINTERN u_int32_t Db_get_encrypt_flags(struct D/
/db-4.6.21/dist/tags:1182:Db_set_encrypt ../libdb_java/db_java_wrap.c /^SWIGINTERN db_ret_t Db_set_encrypt(struct Db *self/
/db-4.6.21/dist/tags:1261:GETU32 ../crypto/rijndael/rijndael-alg-fst.c /^#define GETU32(p) SWAP(*((u32 *)(p)))$/
/db-4.6.21/dist/tags:1292:HMAC_BLOCK_SIZE ../hmac/hmac.c 22
/db-4.6.21/dist/tags:1293:HMAC_OUTPUT_SIZE ../hmac/hmac.c 21
/db-4.6.21/dist/tags:1712:MAXKB ../crypto/rijndael/rijndael-alg-fst.h 33
/db-4.6.21/dist/tags:1713:MAXKC ../crypto/rijndael/rijndael-alg-fst.h 32
/db-4.6.21/dist/tags:1714:MAXNR ../crypto/rijndael/rijndael-alg-fst.h 34
/db-4.6.21/dist/tags:1717:MAX_IV_SIZE ../crypto/rijndael/rijndael-api-fst.h 71
/db-4.6.21/dist/tags:1718:MAX_KEY_SIZE ../crypto/rijndael/rijndael-api-fst.h 70
/db-4.6.21/dist/tags:1728:MODE_CBC ../crypto/rijndael/rijndael-api-fst.h 50
/db-4.6.21/dist/tags:1729:MODE_CFB1 ../crypto/rijndael/rijndael-api-fst.h 51
/db-4.6.21/dist/tags:1730:MODE_ECB ../crypto/rijndael/rijndael-api-fst.h 49
/db-4.6.21/dist/tags:1908:PUTU32 ../crypto/rijndael/rijndael-alg-fst.c /^#define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st/
/db-4.6.21/dist/tags:1979:R0 ../hmac/sha1.c /^#define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0/
/db-4.6.21/dist/tags:1980:R1 ../hmac/sha1.c /^#define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x/
/db-4.6.21/dist/tags:1981:R2 ../hmac/sha1.c /^#define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EB/
/db-4.6.21/dist/tags:1982:R3 ../hmac/sha1.c /^#define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i/
/db-4.6.21/dist/tags:1983:R4 ../hmac/sha1.c /^#define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1/
/db-4.6.21/dist/tags:2163:SHA1HANDSOFF ../hmac/sha1.c 79
/db-4.6.21/dist/tags:2309:SWAP ../crypto/rijndael/rijndael-alg-fst.c /^#define SWAP(x) (_lrotl(x, 8) & 0x00ff00ff | _lrot/
/db-4.6.21/dist/tags:2528:_DB_HMAC_H_ ../dbinc/hmac.h 10
/db-4.6.21/dist/tags:2590:__RIJNDAEL_ALG_FST_H ../crypto/rijndael/rijndael-alg-fst.h 30
/db-4.6.21/dist/tags:2591:__RIJNDAEL_API_FST_H ../crypto/rijndael/rijndael-api-fst.h 42
/db-4.6.21/dist/tags:2599:__aes_adj_size ../crypto/aes_method.c /^__aes_adj_size(len)$/
/db-4.6.21/dist/tags:2600:__aes_close ../crypto/aes_method.c /^__aes_close(dbenv, data)$/
/db-4.6.21/dist/tags:2601:__aes_decrypt ../crypto/aes_method.c /^__aes_decrypt(dbenv, aes_data, iv, cipher, cipher_/
/db-4.6.21/dist/tags:2602:__aes_derivekeys ../crypto/aes_method.c /^__aes_derivekeys(dbenv, db_cipher, passwd, plen)$/
/db-4.6.21/dist/tags:2603:__aes_encrypt ../crypto/aes_method.c /^__aes_encrypt(dbenv, aes_data, iv, data, data_len)/
/db-4.6.21/dist/tags:2604:__aes_err ../crypto/aes_method.c /^__aes_err(dbenv, err)$/
/db-4.6.21/dist/tags:2605:__aes_init ../crypto/aes_method.c /^__aes_init(dbenv, db_cipher)$/
/db-4.6.21/dist/tags:2606:__aes_setup ../crypto/aes_method.c /^__aes_setup(dbenv, db_cipher)$/
/db-4.6.21/dist/tags:2811:__crypto_decrypt_meta ../crypto/crypto.c /^__crypto_decrypt_meta(dbenv, dbp, mbuf, do_metachk/
/db-4.6.21/dist/tags:2818:__db_SHA1Final ../hmac/sha1.c /^__db_SHA1Final(digest, context)$/
/db-4.6.21/dist/tags:2819:__db_SHA1Init ../hmac/sha1.c /^__db_SHA1Init(context)$/
/db-4.6.21/dist/tags:2820:__db_SHA1Transform ../hmac/sha1.c /^__db_SHA1Transform(state, buffer)$/
/db-4.6.21/dist/tags:2821:__db_SHA1Update ../hmac/sha1.c /^__db_SHA1Update(context, data, len)$/
/db-4.6.21/dist/tags:2822:__db_SHAPrintContext ../hmac/sha1.c /^__db_SHAPrintContext(context, msg)$/
/db-4.6.21/dist/tags:2842:__db_blockDecrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_blockDecrypt(cipher, key, input, inputLen, ou/
/db-4.6.21/dist/tags:2843:__db_blockEncrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_blockEncrypt(cipher, key, input, inputLen, ou/
/db-4.6.21/dist/tags:2850:__db_check_chksum ../hmac/hmac.c /^__db_check_chksum(dbenv, hdr, db_cipher, chksum, d/
/db-4.6.21/dist/tags:2855:__db_chksum ../hmac/hmac.c /^__db_chksum(hdr, data, data_len, mac_key, store)$/
/db-4.6.21/dist/tags:2856:__db_cipherInit ../crypto/rijndael/rijndael-api-fst.c /^__db_cipherInit(cipher, mode, IV)$/
/db-4.6.21/dist/tags:2857:__db_cipherUpdateRounds ../crypto/rijndael/rijndael-api-fst.c /^__db_cipherUpdateRounds(cipher, key, input, inputL/
/db-4.6.21/dist/tags:2886:__db_db_get_encrypt_flags_4006__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_db_get_encrypt_flags_4006__SVCSUFFIX__(msg, r/
/db-4.6.21/dist/tags:2906:__db_db_set_encrypt_4006__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_db_set_encrypt_4006__SVCSUFFIX__(msg, req)$/
/db-4.6.21/dist/tags:2942:__db_decrypt_pg ../db/db_conv.c /^__db_decrypt_pg (dbenv, dbp, pagep)$/
/db-4.6.21/dist/tags:2947:__db_derive_mac ../hmac/hmac.c /^__db_derive_mac(passwd, plen, mac_key)$/
/db-4.6.21/dist/tags:2960:__db_encrypt_and_checksum_pg ../db/db_conv.c /^__db_encrypt_and_checksum_pg (dbenv, dbp, pagep)$/
/db-4.6.21/dist/tags:2969:__db_env_get_encrypt_flags_4006__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_env_get_encrypt_flags_4006__SVCSUFFIX__(msg, /
/db-4.6.21/dist/tags:2977:__db_env_set_encrypt_4006__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_env_set_encrypt_4006__SVCSUFFIX__(msg, req)$/
/db-4.6.21/dist/tags:3014:__db_get_encrypt_flags ../db/db_method.c /^__db_get_encrypt_flags(dbp, flagsp)$/
/db-4.6.21/dist/tags:3015:__db_get_encrypt_flags_proc ../rpc_server/c/db_server_proc.c /^__db_get_encrypt_flags_proc(dbpcl_id, replyp)$/
/db-4.6.21/dist/tags:3052:__db_hmac ../hmac/hmac.c /^__db_hmac(k, data, data_len, mac)$/
/db-4.6.21/dist/tags:3097:__db_makeKey ../crypto/rijndael/rijndael-api-fst.c /^__db_makeKey(key, direction, keyLen, keyMaterial)$/
/db-4.6.21/dist/tags:3148:__db_padDecrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_padDecrypt(cipher, key, input, inputOctets, o/
/db-4.6.21/dist/tags:3149:__db_padEncrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_padEncrypt(cipher, key, input, inputOctets, o/
/db-4.6.21/dist/tags:3253:__db_rijndaelDecrypt ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelDecrypt(rk, Nr, ct, pt)$/
/db-4.6.21/dist/tags:3254:__db_rijndaelDecryptRound ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelDecryptRound(rk, Nr, pt, ct)$/
/db-4.6.21/dist/tags:3255:__db_rijndaelEncrypt ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelEncrypt(rk, Nr, pt, ct)$/
/db-4.6.21/dist/tags:3256:__db_rijndaelEncryptRound ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelEncryptRound(rk, Nr, pt, ct)$/
/db-4.6.21/dist/tags:3257:__db_rijndaelKeySetupDec ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelKeySetupDec(rk, cipherKey, keyBits)$/
/db-4.6.21/dist/tags:3258:__db_rijndaelKeySetupEnc ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelKeySetupEnc(rk, cipherKey, keyBits)$/
/db-4.6.21/dist/tags:3286:__db_set_encrypt ../db/db_method.c /^__db_set_encrypt(dbp, passwd, flags)$/
/db-4.6.21/dist/tags:3287:__db_set_encrypt_proc ../rpc_server/c/db_server_proc.c /^__db_set_encrypt_proc(dbpcl_id, passwd, flags, rep/
/db-4.6.21/dist/tags:3482:__dbcl_db_get_encrypt_flags ../rpc_client/gen_client.c /^__dbcl_db_get_encrypt_flags(dbp, flagsp)$/
/db-4.6.21/dist/tags:3511:__dbcl_db_set_encrypt ../rpc_client/gen_client.c /^__dbcl_db_set_encrypt(dbp, passwd, flags)$/
/db-4.6.21/dist/tags:3557:__dbcl_env_get_encrypt_flags ../rpc_client/gen_client.c /^__dbcl_env_get_encrypt_flags(dbenv, flagsp)$/
/db-4.6.21/dist/tags:3567:__dbcl_env_set_encrypt ../rpc_client/gen_client.c /^__dbcl_env_set_encrypt(dbenv, passwd, flags)$/
/db-4.6.21/dist/tags:3707:__env_des_destroy ../env/env_region.c /^__env_des_destroy(dbenv, rp)$/
/db-4.6.21/dist/tags:3708:__env_des_get ../env/env_region.c /^__env_des_get(dbenv, env_infop, infop, rpp)$/
/db-4.6.21/dist/tags:3718:__env_get_encrypt_flags ../env/env_method.c /^__env_get_encrypt_flags(dbenv, flagsp)$/
/db-4.6.21/dist/tags:3719:__env_get_encrypt_flags_proc ../rpc_server/c/db_server_proc.c /^__env_get_encrypt_flags_proc(dbenvcl_id, replyp)$/
/db-4.6.21/dist/tags:3765:__env_set_encrypt ../env/env_method.c /^__env_set_encrypt(dbenv, passwd, flags)$/
/db-4.6.21/dist/tags:3766:__env_set_encrypt_proc ../rpc_server/c/db_server_proc.c /^__env_set_encrypt_proc(dbenvcl_id, passwd, flags, /
/db-4.6.21/dist/tags:4077:__log_encrypt_record ../log/log_put.c /^__log_encrypt_record(dbenv, dbt, hdr, orig)$/
/db-4.6.21/dist/tags:4879:blk ../hmac/sha1.c /^#define blk(i) (block->l[i&15] = rol(block->l[(i+1/
/db-4.6.21/dist/tags:4880:blk0 ../hmac/sha1.c /^#define blk0(i) is_bigendian ? block->l[i] : \\$/
/db-4.6.21/dist/tags:5096:rol ../hmac/sha1.c /^#define rol(value, bits) (((value) << (bits)) | ((/
/db-4.6.21/dist/tags:5231:u16 ../crypto/rijndael/rijndael-alg-fst.h 37
/db-4.6.21/dist/tags:5232:u32 ../crypto/rijndael/rijndael-alg-fst.h 38
/db-4.6.21/dist/tags:5233:u8 ../crypto/rijndael/rijndael-alg-fst.h 36
/db-4.6.21/dist/cscope.out:30683:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:31313:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:91563:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:92341:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:93213:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:94171:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:96585:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:96594:, "DB_ENV->set_encrypt");
/db-4.6.21/dist/cscope.out:99193:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:99217:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:99791:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:99800:, "DB->set_flags: DB_ENCRYPT");
/db-4.6.21/dist/cscope.out:100747:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:103997:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:106213:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:107723:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:108857:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:109659:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:122808: @../crypto/aes_method.c
/db-4.6.21/dist/cscope.out:122823: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:122869:AES_CIPHER
/db-4.6.21/dist/cscope.out:122925:AES_CIPHER
/db-4.6.21/dist/cscope.out:122965:DB_AES_CHUNK
/db-4.6.21/dist/cscope.out:122969:DB_AES_CHUNK
/db-4.6.21/dist/cscope.out:122974: % DB_AES_CHUNK));
/db-4.6.21/dist/cscope.out:123051:AES_CIPHER
/db-4.6.21/dist/cscope.out:123069:AES_CIPHER
/db-4.6.21/dist/cscope.out:123089:DB_AES_CHUNK
/db-4.6.21/dist/cscope.out:123103:MODE_CBC
/db-4.6.21/dist/cscope.out:123197:AES_CIPHER
/db-4.6.21/dist/cscope.out:123223:AES_CIPHER
/db-4.6.21/dist/cscope.out:123243:DB_AES_CHUNK
/db-4.6.21/dist/cscope.out:123271:MODE_CBC
/db-4.6.21/dist/cscope.out:123413:SHA1_CTX
/db-4.6.21/dist/cscope.out:123419:AES_CIPHER
/db-4.6.21/dist/cscope.out:123449:AES_CIPHER
/db-4.6.21/dist/cscope.out:123513:DIR_ENCRYPT
/db-4.6.21/dist/cscope.out:123517:DB_AES_KEYLEN
/db-4.6.21/dist/cscope.out:123545:DIR_DECRYPT
/db-4.6.21/dist/cscope.out:123549:DB_AES_KEYLEN
/db-4.6.21/dist/cscope.out:123604: = "AES key direction is invalid";
/db-4.6.21/dist/cscope.out:123612: = "AES key materialot of correctength";
/db-4.6.21/dist/cscope.out:123620: = "AES keyasswdot valid";
/db-4.6.21/dist/cscope.out:123628: = "AES cipher in wrong state (not initialized)";
/db-4.6.21/dist/cscope.out:123636: = "AES bad blockength";
/db-4.6.21/dist/cscope.out:123644: = "AES cipher instance is invalid";
/db-4.6.21/dist/cscope.out:123652: = "AES data contentsre invalid";
/db-4.6.21/dist/cscope.out:123660: = "AES unknownrror";
/db-4.6.21/dist/cscope.out:123664: = "AESrror unrecognized";
/db-4.6.21/dist/cscope.out:124399:CIPHER_AES
/db-4.6.21/dist/cscope.out:124407:CIPHER_AES
/db-4.6.21/dist/cscope.out:124585:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:124609:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:124771:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:124885:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:124907: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:125510: @../crypto/rijndael/rijndael-alg-fst.c
/db-4.6.21/dist/cscope.out:133130: @../crypto/rijndael/rijndael-api-fst.c
/db-4.6.21/dist/cscope.out:133203:DIR_ENCRYPT
/db-4.6.21/dist/cscope.out:133205:DIR_DECRYPT
/db-4.6.21/dist/cscope.out:133253:DIR_ENCRYPT
/db-4.6.21/dist/cscope.out:133333:MODE_CBC
/db-4.6.21/dist/cscope.out:133457:DIR_DECRYPT
/db-4.6.21/dist/cscope.out:133517:MODE_CBC
/db-4.6.21/dist/cscope.out:133785:DIR_DECRYPT
/db-4.6.21/dist/cscope.out:133893:MODE_CBC
/db-4.6.21/dist/cscope.out:134155:DIR_ENCRYPT
/db-4.6.21/dist/cscope.out:134215:MODE_CBC
/db-4.6.21/dist/cscope.out:134477:DIR_ENCRYPT
/db-4.6.21/dist/cscope.out:134601:MODE_CBC
/db-4.6.21/dist/cscope.out:134881:DIR_ENCRYPT
/db-4.6.21/dist/cscope.out:134899:DIR_DECRYPT
/db-4.6.21/dist/cscope.out:155803:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:157293:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:157369:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:157539:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:196283: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:196383:is_hmac
/db-4.6.21/dist/cscope.out:196415:is_hmac
/db-4.6.21/dist/cscope.out:196525:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:196529:is_hmac
/db-4.6.21/dist/cscope.out:196585:is_hmac
/db-4.6.21/dist/cscope.out:196609:is_hmac
/db-4.6.21/dist/cscope.out:196637:is_hmac
/db-4.6.21/dist/cscope.out:197205:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:197447:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:197659:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:209999:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:225024:, "DB->get_encrypt_flags");
/db-4.6.21/dist/cscope.out:225080:, "DB->set_encrypt");
/db-4.6.21/dist/cscope.out:225086:, "DB->set_encrypt");
/db-4.6.21/dist/cscope.out:225147:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:225417:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:225425:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:225435:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:225505:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:225685:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:226353: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:227575:is_hmac
/db-4.6.21/dist/cscope.out:227629:is_hmac
/db-4.6.21/dist/cscope.out:227689:is_hmac
/db-4.6.21/dist/cscope.out:227693:is_hmac
/db-4.6.21/dist/cscope.out:232177:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:252459:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:252509:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:252803:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:253277:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:253327:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:253443:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:254567:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:254568:, "DB_AM_ENCRYPT" },
/db-4.6.21/dist/cscope.out:257247:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:275937:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:276653:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:280530:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:281426:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:285140:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:285149:, "DB_ENV->set_encrypt");
/db-4.6.21/dist/cscope.out:287686:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:287710:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:288284:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:288293:, "DB->set_flags: DB_ENCRYPT");
/db-4.6.21/dist/cscope.out:289240:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:292428:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:294582:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:296030:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:297102:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:297842:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:299686: #CIPHER_AES
/db-4.6.21/dist/cscope.out:299750: #DB_AES_KEYLEN
/db-4.6.21/dist/cscope.out:299756: #DB_AES_CHUNK
/db-4.6.21/dist/cscope.out:300910: #DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:301072: #DB_ENCRYPT
/db-4.6.21/dist/cscope.out:306604: #DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:321966:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:321996:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:322032:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:322262:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:328267: @../dbinc/hmac.h
/db-4.6.21/dist/cscope.out:328270:_DB_HMAC_H_
/db-4.6.21/dist/cscope.out:328274: #_DB_HMAC_H_
/db-4.6.21/dist/cscope.out:328324: ~"dbc_auto/hmac_ext.h
/db-4.6.21/dist/cscope.out:360582: @../dbinc_auto/hmac_ext.h
/db-4.6.21/dist/cscope.out:360585:_hmac_ext_h_
/db-4.6.21/dist/cscope.out:360589: #_hmac_ext_h_
/db-4.6.21/dist/cscope.out:360647:SHA1_CTX
/db-4.6.21/dist/cscope.out:360655:SHA1_CTX
/db-4.6.21/dist/cscope.out:360665:SHA1_CTX
/db-4.6.21/dist/cscope.out:388001: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:390113:CIPHER_AES
/db-4.6.21/dist/cscope.out:390119:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:390190:, "DB_ENV->set_encrypt");
/db-4.6.21/dist/cscope.out:390195:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:390212:, "DB_ENV->set_encrypt", 0));
/db-4.6.21/dist/cscope.out:390226:, "Emptyassword specifiedo set_encrypt");
/db-4.6.21/dist/cscope.out:390353:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:390365:CIPHER_AES
/db-4.6.21/dist/cscope.out:400379:__v_des_deroy
/db-4.6.21/dist/cscope.out:400389:__v_des_g
/db-4.6.21/dist/cscope.out:401093: `__v_des_g
/db-4.6.21/dist/cscope.out:401521: `__v_des_g
/db-4.6.21/dist/cscope.out:403119: `__v_des_g
/db-4.6.21/dist/cscope.out:403319: `__v_des_deroy
/db-4.6.21/dist/cscope.out:403435: `__v_des_deroy
/db-4.6.21/dist/cscope.out:403469: $__v_des_g
/db-4.6.21/dist/cscope.out:403767: $__v_des_deroy
/db-4.6.21/dist/cscope.out:510907:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:511531:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:536313:ϡ_desed
/db-4.6.21/dist/cscope.out:536389:ϡ_desed
/db-4.6.21/dist/cscope.out:536401:ϡ_desed
/db-4.6.21/dist/cscope.out:536417:ϡ_desed
/db-4.6.21/dist/cscope.out:541490: @../hmac/hmac.c
/db-4.6.21/dist/cscope.out:541513: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:541521: #HMAC_OUTPUT_SIZE
/db-4.6.21/dist/cscope.out:541527: #HMAC_BLOCK_SIZE
/db-4.6.21/dist/cscope.out:541533:__db_hmac
/db-4.6.21/dist/cscope.out:541543: $__db_hmac
/db-4.6.21/dist/cscope.out:541571:SHA1_CTX
/db-4.6.21/dist/cscope.out:541581:HMAC_BLOCK_SIZE
/db-4.6.21/dist/cscope.out:541589:HMAC_BLOCK_SIZE
/db-4.6.21/dist/cscope.out:541597:HMAC_BLOCK_SIZE
/db-4.6.21/dist/cscope.out:541605:HMAC_OUTPUT_SIZE
/db-4.6.21/dist/cscope.out:541617:HMAC_BLOCK_SIZE
/db-4.6.21/dist/cscope.out:541625:HMAC_BLOCK_SIZE
/db-4.6.21/dist/cscope.out:541633:HMAC_BLOCK_SIZE
/db-4.6.21/dist/cscope.out:541643:HMAC_OUTPUT_SIZE
/db-4.6.21/dist/cscope.out:541649:HMAC_BLOCK_SIZE
/db-4.6.21/dist/cscope.out:541681:HMAC_BLOCK_SIZE
/db-4.6.21/dist/cscope.out:541715:HMAC_BLOCK_SIZE
/db-4.6.21/dist/cscope.out:541725:HMAC_OUTPUT_SIZE
/db-4.6.21/dist/cscope.out:541883: `__db_hmac
/db-4.6.21/dist/cscope.out:541951:SHA1_CTX
/db-4.6.21/dist/cscope.out:542021:is_hmac
/db-4.6.21/dist/cscope.out:542057:is_hmac
/db-4.6.21/dist/cscope.out:542089:is_hmac
/db-4.6.21/dist/cscope.out:542231: `__db_hmac
/db-4.6.21/dist/cscope.out:542294: @../hmac/sha1.c
/db-4.6.21/dist/cscope.out:542305: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:542499:SHA1_CTX
/db-4.6.21/dist/cscope.out:542511:SHA1_CTX
/db-4.6.21/dist/cscope.out:543025:SHA1_CTX
/db-4.6.21/dist/cscope.out:543081:SHA1_CTX
/db-4.6.21/dist/cscope.out:543241:SHA1_CTX
/db-4.6.21/dist/cscope.out:621135: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:623161:is_hmac
/db-4.6.21/dist/cscope.out:623273:is_hmac
/db-4.6.21/dist/cscope.out:623309:is_hmac
/db-4.6.21/dist/cscope.out:623465:is_hmac
/db-4.6.21/dist/cscope.out:623655:is_hmac
/db-4.6.21/dist/cscope.out:630065: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:631485:is_hmac
/db-4.6.21/dist/cscope.out:631525:is_hmac
/db-4.6.21/dist/cscope.out:631887:is_hmac
/db-4.6.21/dist/cscope.out:631899:is_hmac
/db-4.6.21/dist/cscope.out:632135:is_hmac
/db-4.6.21/dist/cscope.out:635885: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:739403:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:739861:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:740265:DB_AM_ENCRYPT
/db-4.6.21/dist/cscope.out:810643:desed_evt
/db-4.6.21/dist/cscope.out:810693:desed_evt
/db-4.6.21/dist/cscope.out:810715:desed_evt
/db-4.6.21/dist/cscope.out:810785:desed_evt
/db-4.6.21/dist/cscope.out:858297:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:872555:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:891407:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:891408:, "-encrypt" },
/db-4.6.21/dist/cscope.out:896153:ENV_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:896157:ENV_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:898753:ENV_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:898801:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:898817:ENV_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:900101:TCL_DB_ENCRYPT
/db-4.6.21/dist/cscope.out:900105:TCL_DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:900109:TCL_DB_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:901551:TCL_DB_ENCRYPT
/db-4.6.21/dist/cscope.out:901557:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:901561:TCL_DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:901609:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:901625:TCL_DB_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:904145:TCL_DBREM_ENCRYPT
/db-4.6.21/dist/cscope.out:904149:TCL_DBREM_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:904153:TCL_DBREM_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:904393:TCL_DBREM_ENCRYPT
/db-4.6.21/dist/cscope.out:904399:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:904407:TCL_DBREM_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:904445:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:904449:TCL_DBREM_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:905003:TCL_DBMV_ENCRYPT
/db-4.6.21/dist/cscope.out:905007:TCL_DBMV_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:905011:TCL_DBMV_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:905259:TCL_DBMV_ENCRYPT
/db-4.6.21/dist/cscope.out:905265:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:905273:TCL_DBMV_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:905311:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:905315:TCL_DBMV_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:905951:TCL_DBVRFY_ENCRYPT
/db-4.6.21/dist/cscope.out:905955:TCL_DBVRFY_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:905959:TCL_DBVRFY_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:906195:TCL_DBVRFY_ENCRYPT
/db-4.6.21/dist/cscope.out:906201:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:906209:TCL_DBVRFY_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:906247:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:906251:TCL_DBVRFY_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:917381:ENVREM_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:917385:ENVREM_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:917621:ENVREM_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:917659:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:917663:ENVREM_ENCRYPT_ANY
/db-4.6.21/dist/cscope.out:918532:, "?-encrypt? filename");
/db-4.6.21/dist/cscope.out:918579:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:918734:, "?-encrypt? filename");
/db-4.6.21/dist/cscope.out:918781:DB_ENCRYPT
/db-4.6.21/dist/cscope.out:922333:DB_ENCRYPT_AES
/db-4.6.21/dist/cscope.out:927332:("Lock upgdes",
/db-4.6.21/dist/cscope.out:927340:("Lock downgdes",
/db-4.6.21/dist/cscope.out:956095: ~"dbc/hmac.h
/db-4.6.21/dist/cscope.out:986102:../crypto/aes_method.c
/db-4.6.21/dist/cscope.out:986105:../crypto/rijndael/rijndael-alg-fst.c
/db-4.6.21/dist/cscope.out:986106:../crypto/rijndael/rijndael-api-fst.c
/db-4.6.21/dist/cscope.out:986188:../dbinc/hmac.h
/db-4.6.21/dist/cscope.out:986220:../dbinc_auto/hmac_ext.h
/db-4.6.21/dist/cscope.out:986327:../hmac/hmac.c
/db-4.6.21/dist/cscope.out:986328:../hmac/sha1.c
/db-4.6.21/dist/s_include:74:for i in db btree clib common crypto dbreg env fileops hash hmac \
/db-4.6.21/dist/brew/bdbread.mak:327:RULE10 = ..\hmac
/db-4.6.21/dist/s_tags:13: ../crypto/rijndael/*.[ch] \
/db-4.6.21/dist/s_tags:21: ../hmac/*.[ch] \
/db-4.6.21/dist/srcfiles.in:100:crypto/aes_method.c ce dynamic static vx
/db-4.6.21/dist/srcfiles.in:103:crypto/rijndael/rijndael-alg-fst.c ce dynamic static vx
/db-4.6.21/dist/srcfiles.in:104:crypto/rijndael/rijndael-api-fst.c ce dynamic static vx
/db-4.6.21/dist/srcfiles.in:260:hmac/hmac.c brew ce ce_small dynamic small static s60 vx vxsmall
/db-4.6.21/dist/srcfiles.in:261:hmac/sha1.c brew ce ce_small dynamic small static s60 vx vxsmall
/db-4.6.21/dist/aclocal/libtool.m4:5223: icc* | ecc*)
/db-4.6.21/dist/aclocal/libtool.m4:5543: ecc*,ia64* | icc*,ia64*) # Intel C compiler on ia64
/db-4.6.21/dist/s_symlink:42:build hmac/tags ../dist/tags
/db-4.6.21/dist/pubdef.in:20:DB_AM_ENCRYPT * I *
/db-4.6.21/dist/pubdef.in:88:DB_ENCRYPT D I J
/db-4.6.21/dist/pubdef.in:89:DB_ENCRYPT_AES D I J
/db-4.6.21/dist/winmsi/dbwix.m4:148:m4_define(`WIX_DB_PERSISTENT_GUID', `m4_esyscmd(echo "_WIXDB_PRODUCT @@ _WIXDB_VERSION @@ _WIXDB_CURDIR @@ _WIXDB_SUBDIR @@ _WIXDB_CURFILE" | openssl md5 | sed -e "s/^\(........\)\(....\)\(....\)\(....\)\(....\)\(............\)/\1-\2-\3-\4-\5/")')
/db-4.6.21/dist/winmsi/s_winmsi.fcn:1130: RequireFileInPath PATH "$PATH" openssl # needed for MD5 hashing
/db-4.6.21/dist/template/db_server_proc:159:/* BEGIN __env_get_encrypt_flags_proc */
/db-4.6.21/dist/template/db_server_proc:161:__env_get_encrypt_flags_proc(dbenvcl_id, replyp)
/db-4.6.21/dist/template/db_server_proc:163: __env_get_encrypt_flags_reply *replyp;
/db-4.6.21/dist/template/db_server_proc:164:/* END __env_get_encrypt_flags_proc */
/db-4.6.21/dist/template/db_server_proc:323:/* BEGIN __env_set_encrypt_proc */
/db-4.6.21/dist/template/db_server_proc:325:__env_set_encrypt_proc(dbenvcl_id, passwd, flags, replyp)
/db-4.6.21/dist/template/db_server_proc:329: __env_set_encrypt_reply *replyp;
/db-4.6.21/dist/template/db_server_proc:330:/* END __env_set_encrypt_proc */
/db-4.6.21/dist/template/db_server_proc:659:/* BEGIN __db_get_encrypt_flags_proc */
/db-4.6.21/dist/template/db_server_proc:661:__db_get_encrypt_flags_proc(dbpcl_id, replyp)
/db-4.6.21/dist/template/db_server_proc:663: __db_get_encrypt_flags_reply *replyp;
/db-4.6.21/dist/template/db_server_proc:664:/* END __db_get_encrypt_flags_proc */
/db-4.6.21/dist/template/db_server_proc:1190:/* BEGIN __db_set_encrypt_proc */
/db-4.6.21/dist/template/db_server_proc:1192:__db_set_encrypt_proc(dbpcl_id, passwd, flags, replyp)
/db-4.6.21/dist/template/db_server_proc:1196: __db_set_encrypt_reply *replyp;
/db-4.6.21/dist/template/db_server_proc:1197:/* END __db_set_encrypt_proc */
/db-4.6.21/env/env_region.c:14:static void __env_des_destroy __P((DB_ENV *, REGION *));
/db-4.6.21/env/env_region.c:15:static int __env_des_get __P((DB_ENV *, REGINFO *, REGINFO *, REGION **));
/db-4.6.21/env/env_region.c:258: if ((ret = __env_des_get(dbenv, infop, infop, &rp)) != 0 || rp == NULL)
/db-4.6.21/env/env_region.c:406: if ((ret = __env_des_get(dbenv, infop, infop, &rp)) != 0) {
/db-4.6.21/env/env_region.c:971: if ((ret = __env_des_get(dbenv, dbenv->reginfo, infop, &rp)) != 0)
/db-4.6.21/env/env_region.c:979: * __env_des_get may have created the region and reset the create
/db-4.6.21/env/env_region.c:1023: __env_des_destroy(dbenv, rp);
/db-4.6.21/env/env_region.c:1063: __env_des_destroy(dbenv, rp);
/db-4.6.21/env/env_region.c:1073: * __env_des_get --
/db-4.6.21/env/env_region.c:1078:__env_des_get(dbenv, env_infop, infop, rpp)
/db-4.6.21/env/env_region.c:1170: * __env_des_destroy --
/db-4.6.21/env/env_region.c:1174:__env_des_destroy(dbenv, rp)
/db-4.6.21/env/env_method.c:13:#include "dbinc/hmac.h"
/db-4.6.21/env/env_method.c:172: dbenv->get_encrypt_flags = __env_get_encrypt_flags;
/db-4.6.21/env/env_method.c:271: dbenv->set_encrypt = __env_set_encrypt;
/db-4.6.21/env/env_method.c:417: * __env_get_encrypt_flags --
/db-4.6.21/env/env_method.c:418: * {DB_ENV,DB}->get_encrypt_flags.
/db-4.6.21/env/env_method.c:420: * PUBLIC: int __env_get_encrypt_flags __P((DB_ENV *, u_int32_t *));
/db-4.6.21/env/env_method.c:423:__env_get_encrypt_flags(dbenv, flagsp)
/db-4.6.21/env/env_method.c:431: if (db_cipher != NULL && db_cipher->alg == CIPHER_AES)
/db-4.6.21/env/env_method.c:432: *flagsp = DB_ENCRYPT_AES;
/db-4.6.21/env/env_method.c:445: * __env_set_encrypt --
/db-4.6.21/env/env_method.c:446: * DB_ENV->set_encrypt.
/db-4.6.21/env/env_method.c:448: * PUBLIC: int __env_set_encrypt __P((DB_ENV *, const char *, u_int32_t));
/db-4.6.21/env/env_method.c:451:__env_set_encrypt(dbenv, passwd, flags)
/db-4.6.21/env/env_method.c:460: ENV_ILLEGAL_AFTER_OPEN(dbenv, "DB_ENV->set_encrypt");
/db-4.6.21/env/env_method.c:461:#define OK_CRYPTO_FLAGS (DB_ENCRYPT_AES)
/db-4.6.21/env/env_method.c:464: return (__db_ferr(dbenv, "DB_ENV->set_encrypt", 0));
/db-4.6.21/env/env_method.c:467: __db_errx(dbenv, "Empty password specified to set_encrypt");
/db-4.6.21/env/env_method.c:499: case DB_ENCRYPT_AES:
/db-4.6.21/env/env_method.c:500: if ((ret = __crypto_algsetup(dbenv, db_cipher, CIPHER_AES, 0))
/db-4.6.21/db_hotbackup/db_hotbackup.c:409: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/db_hotbackup/db_hotbackup.c:410: dbenv->err(dbenv, ret, "DB_ENV->set_encrypt");
/db-4.6.21/examples_java/src/db/GettingStarted/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce
/db-4.6.21/examples_java/src/db/GettingStarted/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh
/db-4.6.21/examples_java/src/db/GettingStarted/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine
/db-4.6.21/db_load/db_load.c:57:#define LDF_PASSWORD 0x04 /* Encrypt created databases. */
/db-4.6.21/db_load/db_load.c:216: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0);
/db-4.6.21/db_load/db_load.c:220: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0);
/db-4.6.21/db_load/db_load.c:375: /* If configured with a password, encrypt databases we create. */
/db-4.6.21/db_load/db_load.c:377: (ret = dbp->set_flags(dbp, DB_ENCRYPT)) != 0) {
/db-4.6.21/db_load/db_load.c:378: dbp->err(dbp, ret, "DB->set_flags: DB_ENCRYPT");
/db-4.6.21/db_load/db_load.c:581: if (ldg->passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/db_load/db_load.c:582: ldg->passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/db_dump/db_dump.c:170: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/db_dump/db_dump.c:171: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/db/db_stati.c:284: { DB_AM_ENCRYPT, "DB_AM_ENCRYPT" },
/db-4.6.21/db/db_iface.c:1323: F_CLR(dbp, DB_AM_CHKSUM | DB_AM_ENCRYPT);
/db-4.6.21/db/db_setlsn.c:41: if (flags != 0 && flags != DB_ENCRYPT)
/db-4.6.21/db/db_setlsn.c:51: ret = __env_lsn_reset(dbenv, name, LF_ISSET(DB_ENCRYPT) ? 1 : 0);
/db-4.6.21/db/db_setlsn.c:81: if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0)
/db-4.6.21/db/db_open.c:16:#include "dbinc/hmac.h"
/db-4.6.21/db/db_open.c:371: * checksum (and verify the checksum if necessary) and possibly decrypt it.
/db-4.6.21/db/db_open.c:385: int is_hmac, ret, swapped;
/db-4.6.21/db/db_open.c:396: is_hmac = meta->encrypt_alg == 0 ? 0 : 1;
/db-4.6.21/db/db_open.c:414: DBMETASIZE, is_hmac)) != 0) {
/db-4.6.21/db/db_open.c:415: if (is_hmac || swapped)
/db-4.6.21/db/db_open.c:428: ret = __crypto_decrypt_meta(dbenv,
/db-4.6.21/db/db_open.c:534: * checksum and decrypt. Don't distinguish between configuration and
/db-4.6.21/db/db_pr.c:109: { DB_AM_ENCRYPT, "encrypted" },
/db-4.6.21/db/db_conv.c:45:#include "dbinc/hmac.h"
/db-4.6.21/db/db_conv.c:72: int is_hmac, ret;
/db-4.6.21/db/db_conv.c:78: ret = is_hmac = 0;
/db-4.6.21/db/db_conv.c:97: if (((DBMETA *)pp)->encrypt_alg != 0 ||
/db-4.6.21/db/db_conv.c:98: F_ISSET(dbp, DB_AM_ENCRYPT))
/db-4.6.21/db/db_conv.c:99: is_hmac = 1;
/db-4.6.21/db/db_conv.c:125: * a db_cipher then we are using hmac.
/db-4.6.21/db/db_conv.c:127: is_hmac = CRYPTO_ON(dbenv) ? 1 : 0;
/db-4.6.21/db/db_conv.c:137: if (F_ISSET(dbp, DB_AM_SWAP) && is_hmac == 0)
/db-4.6.21/db/db_conv.c:140: dbenv, NULL, db_cipher, chksum, pp, sum_len, is_hmac)) {
/db-4.6.21/db/db_conv.c:155: if ((ret = __db_decrypt_pg(dbenv, dbp, pagep)) != 0)
/db-4.6.21/db/db_conv.c:248: return (__db_encrypt_and_checksum_pg(dbenv, dbp, pagep));
/db-4.6.21/db/db_conv.c:252: * __db_decrypt_pg --
/db-4.6.21/db/db_conv.c:253: * Utility function to decrypt a db page.
/db-4.6.21/db/db_conv.c:255: * PUBLIC: int __db_decrypt_pg __P((DB_ENV *, DB *, PAGE *));
/db-4.6.21/db/db_conv.c:258:__db_decrypt_pg (dbenv, dbp, pagep)
/db-4.6.21/db/db_conv.c:271: if (F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.6.21/db/db_conv.c:304: ret = db_cipher->decrypt(dbenv, db_cipher->data,
/db-4.6.21/db/db_conv.c:312: * __db_encrypt_and_checksum_pg --
/db-4.6.21/db/db_conv.c:313: * Utility function to encrypt and checksum a db page.
/db-4.6.21/db/db_conv.c:315: * PUBLIC: int __db_encrypt_and_checksum_pg
/db-4.6.21/db/db_conv.c:319:__db_encrypt_and_checksum_pg (dbenv, dbp, pagep)
/db-4.6.21/db/db_conv.c:332: if (F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.6.21/db/db_conv.c:360: if ((ret = db_cipher->encrypt(dbenv, db_cipher->data,
/db-4.6.21/db/db_conv.c:384: if (F_ISSET(dbp, DB_AM_SWAP) && !F_ISSET(dbp, DB_AM_ENCRYPT))
/db-4.6.21/db/db_method.c:44:static int __db_get_encrypt_flags __P((DB *, u_int32_t *));
/db-4.6.21/db/db_method.c:45:static int __db_set_encrypt __P((DB *, const char *, u_int32_t));
/db-4.6.21/db/db_method.c:225: dbp->get_encrypt_flags = __db_get_encrypt_flags;
/db-4.6.21/db/db_method.c:249: dbp->set_encrypt = __db_set_encrypt;
/db-4.6.21/db/db_method.c:549: * __db_get_encrypt_flags --
/db-4.6.21/db/db_method.c:552:__db_get_encrypt_flags(dbp, flagsp)
/db-4.6.21/db/db_method.c:556: DB_ILLEGAL_IN_ENV(dbp, "DB->get_encrypt_flags");
/db-4.6.21/db/db_method.c:558: return (__env_get_encrypt_flags(dbp->dbenv, flagsp));
/db-4.6.21/db/db_method.c:562: * __db_set_encrypt --
/db-4.6.21/db/db_method.c:566:__db_set_encrypt(dbp, passwd, flags)
/db-4.6.21/db/db_method.c:574: DB_ILLEGAL_IN_ENV(dbp, "DB->set_encrypt");
/db-4.6.21/db/db_method.c:575: DB_ILLEGAL_AFTER_OPEN(dbp, "DB->set_encrypt");
/db-4.6.21/db/db_method.c:577: if ((ret = __env_set_encrypt(dbp->dbenv, passwd, flags)) != 0)
/db-4.6.21/db/db_method.c:589: return (__db_set_flags(dbp, DB_ENCRYPT));
/db-4.6.21/db/db_method.c:657: if (FLD_ISSET(*inflagsp, DB_ENCRYPT)) {
/db-4.6.21/db/db_method.c:658: FLD_SET(*outflagsp, DB_AM_ENCRYPT | DB_AM_CHKSUM);
/db-4.6.21/db/db_method.c:659: FLD_CLR(*inflagsp, DB_ENCRYPT);
/db-4.6.21/db/db_method.c:682: DB_ENCRYPT,
/db-4.6.21/db/db_method.c:730: if (LF_ISSET(DB_ENCRYPT) && !CRYPTO_ON(dbenv)) {
/db-4.6.21/db/db_setid.c:42: if (flags != 0 && flags != DB_ENCRYPT)
/db-4.6.21/db/db_setid.c:52: ret = __env_fileid_reset(dbenv, name, LF_ISSET(DB_ENCRYPT) ? 1 : 0);
/db-4.6.21/db/db_setid.c:125: if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0)
/db-4.6.21/db/db_upg.c:238: * encrypt_alg flags in the metadata, then the
/db-4.6.21/db/db_upg.c:250: * Rip out metadata and encrypt_alg fields from the
/db-4.6.21/db/db_upg.c:260: memcpy(&tmpflags, &meta->encrypt_alg, sizeof(u_int8_t));
/db-4.6.21/db/db_upg.c:268: F_SET(dbp, DB_AM_ENCRYPT);
/db-4.6.21/db/db_upg.c:411: /* Always decrypt the page. */
/db-4.6.21/db/db_upg.c:412: if ((ret = __db_decrypt_pg(dbenv, dbp, page)) != 0)
/db-4.6.21/db/db_upg.c:418: if ((ret = __db_encrypt_and_checksum_pg(
/db-4.6.21/db/db.c:103: DB_AM_ENCRYPT | DB_AM_CHKSUM | DB_AM_NOT_DURABLE));
/db-4.6.21/db/db.c:541: ftype = F_ISSET(dbp, DB_AM_SWAP | DB_AM_ENCRYPT | DB_AM_CHKSUM)
/db-4.6.21/db/db.c:555: DB_AM_SWAP | DB_AM_ENCRYPT | DB_AM_CHKSUM) ?
/db-4.6.21/db/db.c:614: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP));
/db-4.6.21/log/log_put.c:13:#include "dbinc/hmac.h"
/db-4.6.21/log/log_put.c:17:static int __log_encrypt_record __P((DB_ENV *, DBT *, HDR *, u_int32_t));
/db-4.6.21/log/log_put.c:128: * DB_LOG_NOCOPY, because we know we can overwrite/encrypt the log
/db-4.6.21/log/log_put.c:144: if ((ret = __log_encrypt_record(dbenv, dbt, &hdr, udbt->size)) != 0)
/db-4.6.21/log/log_put.c:241: * now-encrypted dbt. Clients have no way to decrypt
/db-4.6.21/log/log_put.c:637: __log_encrypt_record(dbenv, &t, &hdr, (u_int32_t)tsize)) != 0)
/db-4.6.21/log/log_put.c:1478: if ((ret = __log_encrypt_record(dbenv, dbt, &hdr, rec->size)) != 0)
/db-4.6.21/log/log_put.c:1503:__log_encrypt_record(dbenv, dbt, hdr, orig)
/db-4.6.21/log/log_put.c:1516: if ((ret = db_cipher->encrypt(dbenv, db_cipher->data,
/db-4.6.21/log/log_get.c:14:#include "dbinc/hmac.h"
/db-4.6.21/log/log_get.c:381: int eof, is_hmac, need_cksum, ret;
/db-4.6.21/log/log_get.c:387: is_hmac = 0;
/db-4.6.21/log/log_get.c:498: is_hmac = 1;
/db-4.6.21/log/log_get.c:501: is_hmac = 0;
/db-4.6.21/log/log_get.c:594: hdr.chksum, rp + hdr.size, hdr.len - hdr.size, is_hmac)) != 0) {
/db-4.6.21/log/log_get.c:660: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data,
/db-4.6.21/log/log_get.c:1249: * of the file but that's hard -- we may have to decrypt it, checksum
/db-4.6.21/log/log.c:13:#include "dbinc/hmac.h"
/db-4.6.21/log/log.c:583: int is_hmac, ret;
/db-4.6.21/log/log.c:607: is_hmac = 0;
/db-4.6.21/log/log.c:613: is_hmac = 1;
/db-4.6.21/log/log.c:664: * If we are trying to decrypt an unencrypted log
/db-4.6.21/log/log.c:672: /* Check the checksum and decrypt. */
/db-4.6.21/log/log.c:675: hdr->len - hdrsize, is_hmac)) != 0) {
/db-4.6.21/log/log.c:679: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data,
/db-4.6.21/log/log.c:726: hdr->len - hdrsize, is_hmac)) != 0)) {
/db-4.6.21/build_vxworks/db_printlog/db_printlog.c:168: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/build_vxworks/db_printlog/db_printlog.c:169: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/db_archive/db_archive.c:128: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/build_vxworks/db_archive/db_archive.c:129: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1836: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1840: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1846: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1847:hmac.o
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1850: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1854: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1858: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1864: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1865:sha1.o
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1868: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:3545: $(PRJ_DIR)/../hmac/hmac.c \
/db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:3546: $(PRJ_DIR)/../hmac/sha1.c \
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:959: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:963: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:969: FILE_$(PRJ_DIR)/../crypto/aes_method.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:970:aes_method.o
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:973: FILE_$(PRJ_DIR)/../crypto/aes_method.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1013: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1017: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1023: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1024:rijndael-alg-fst.o
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1027: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1031: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1035: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1041: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1042:rijndael-api-fst.o
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1045: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2237: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2241: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2247: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2248:hmac.o
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2251: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2255: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2259: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2265: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2266:sha1.o
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2269: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:4254: $(PRJ_DIR)/../crypto/aes_method.c \
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:4257: $(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c \
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:4258: $(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c \
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:4325: $(PRJ_DIR)/../hmac/hmac.c \
/db-4.6.21/build_vxworks/BerkeleyDB22.wpj:4326: $(PRJ_DIR)/../hmac/sha1.c \
/db-4.6.21/build_vxworks/db_stat/db_stat.c:273: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/db_checkpoint/db_checkpoint.c:149: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/build_vxworks/db_checkpoint/db_checkpoint.c:150: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/db_upgrade/db_upgrade.c:127: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/build_vxworks/db_upgrade/db_upgrade.c:128: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/db_verify/db_verify.c:136: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/db.h:313: * Flags private to DB_ENV->set_encrypt.
/db-4.6.21/build_vxworks/db.h:315:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */
/db-4.6.21/build_vxworks/db.h:367:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */
/db-4.6.21/build_vxworks/db.h:1662: int (*get_encrypt_flags) __P((DB *, u_int32_t *));
/db-4.6.21/build_vxworks/db.h:1704: int (*set_encrypt) __P((DB *, const char *, u_int32_t));
/db-4.6.21/build_vxworks/db.h:1774:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */
/db-4.6.21/build_vxworks/db.h:2282: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *));
/db-4.6.21/build_vxworks/db.h:2393: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t));
/db-4.6.21/build_vxworks/db_hotbackup/db_hotbackup.c:424: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/db_hotbackup/db_hotbackup.c:425: dbenv->err(dbenv, ret, "DB_ENV->set_encrypt");
/db-4.6.21/build_vxworks/db_load/db_load.c:57:#define LDF_PASSWORD 0x04 /* Encrypt created databases. */
/db-4.6.21/build_vxworks/db_load/db_load.c:231: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0);
/db-4.6.21/build_vxworks/db_load/db_load.c:235: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0);
/db-4.6.21/build_vxworks/db_load/db_load.c:390: /* If configured with a password, encrypt databases we create. */
/db-4.6.21/build_vxworks/db_load/db_load.c:392: (ret = dbp->set_flags(dbp, DB_ENCRYPT)) != 0) {
/db-4.6.21/build_vxworks/db_load/db_load.c:393: dbp->err(dbp, ret, "DB->set_flags: DB_ENCRYPT");
/db-4.6.21/build_vxworks/db_load/db_load.c:596: if (ldg->passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/build_vxworks/db_load/db_load.c:597: ldg->passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/db_dump/db_dump.c:185: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/build_vxworks/db_dump/db_dump.c:186: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/db_deadlock/db_deadlock.c:163: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/build_vxworks/db_deadlock/db_deadlock.c:164: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1895: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1899: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1905: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1906:hmac.o
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1909: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1913: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1917: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1923: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1924:sha1.o
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1927: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:3604: $(PRJ_DIR)/../hmac/hmac.c \
/db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:3605: $(PRJ_DIR)/../hmac/sha1.c \
/db-4.6.21/build_vxworks/db_recover/db_recover.c:133: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/build_vxworks/db_recover/db_recover.c:134: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:900: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:904: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:910: FILE_$(PRJ_DIR)/../crypto/aes_method.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:911:aes_method.o
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:914: FILE_$(PRJ_DIR)/../crypto/aes_method.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:954: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:958: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:964: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:965:rijndael-alg-fst.o
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:968: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:972: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:976: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:982: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:983:rijndael-api-fst.o
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:986: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2178: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2182: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2188: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2189:hmac.o
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2192: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2196: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2200: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2206: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2207:sha1.o
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2210: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:4195: $(PRJ_DIR)/../crypto/aes_method.c \
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:4198: $(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c \
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:4199: $(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c \
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:4266: $(PRJ_DIR)/../hmac/hmac.c \
/db-4.6.21/build_vxworks/BerkeleyDB20.wpj:4267: $(PRJ_DIR)/../hmac/sha1.c \
/db-4.6.21/dbinc_auto/db_ext.h:116:int __db_decrypt_pg __P((DB_ENV *, DB *, PAGE *));
/db-4.6.21/dbinc_auto/db_ext.h:117:int __db_encrypt_and_checksum_pg __P((DB_ENV *, DB *, PAGE *));
/db-4.6.21/dbinc_auto/env_ext.h:26:int __env_get_encrypt_flags __P((DB_ENV *, u_int32_t *));
/db-4.6.21/dbinc_auto/env_ext.h:27:int __env_set_encrypt __P((DB_ENV *, const char *, u_int32_t));
/db-4.6.21/dbinc_auto/rpc_client_ext.h:27:int __dbcl_env_get_encrypt_flags __P((DB_ENV *, u_int32_t *));
/db-4.6.21/dbinc_auto/rpc_client_ext.h:34:int __dbcl_env_set_encrypt __P((DB_ENV *, const char *, u_int32_t));
/db-4.6.21/dbinc_auto/rpc_client_ext.h:46:int __dbcl_db_get_encrypt_flags __P((DB *, u_int32_t *));
/db-4.6.21/dbinc_auto/rpc_client_ext.h:66:int __dbcl_db_set_encrypt __P((DB *, const char *, u_int32_t));
/db-4.6.21/dbinc_auto/int_def.in:112:#define __db_decrypt_pg __db_decrypt_pg@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:113:#define __db_encrypt_and_checksum_pg __db_encrypt_and_checksum_pg@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:579:#define __aes_setup __aes_setup@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:580:#define __aes_adj_size __aes_adj_size@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:581:#define __aes_close __aes_close@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:582:#define __aes_decrypt __aes_decrypt@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:583:#define __aes_encrypt __aes_encrypt@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:584:#define __aes_init __aes_init@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:588:#define __crypto_decrypt_meta __crypto_decrypt_meta@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:655:#define __env_get_encrypt_flags __env_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:656:#define __env_set_encrypt __env_set_encrypt@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:1514:#define __dbcl_env_get_encrypt_flags __dbcl_env_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:1521:#define __dbcl_env_set_encrypt __dbcl_env_set_encrypt@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:1533:#define __dbcl_db_get_encrypt_flags __dbcl_db_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:1553:#define __dbcl_db_set_encrypt __dbcl_db_set_encrypt@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:1619:#define __env_get_encrypt_flags_proc __env_get_encrypt_flags_proc@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:1620:#define __env_set_encrypt_proc __env_set_encrypt_proc@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:1639:#define __db_get_encrypt_flags_proc __db_get_encrypt_flags_proc@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/int_def.in:1640:#define __db_set_encrypt_proc __db_set_encrypt_proc@DB_VERSION_UNIQUE_NAME@
/db-4.6.21/dbinc_auto/rpc_server_ext.h:16:void __env_get_encrypt_flags_proc __P((u_int, __env_get_encrypt_flags_reply *));
/db-4.6.21/dbinc_auto/rpc_server_ext.h:17:void __env_set_encrypt_proc __P((u_int, char *, u_int32_t, __env_set_encrypt_reply *));
/db-4.6.21/dbinc_auto/rpc_server_ext.h:36:void __db_get_encrypt_flags_proc __P((u_int, __db_get_encrypt_flags_reply *));
/db-4.6.21/dbinc_auto/rpc_server_ext.h:37:void __db_set_encrypt_proc __P((u_int, char *, u_int32_t, __db_set_encrypt_reply *));
/db-4.6.21/dbinc_auto/hmac_ext.h:2:#ifndef _hmac_ext_h_
/db-4.6.21/dbinc_auto/hmac_ext.h:3:#define _hmac_ext_h_
/db-4.6.21/dbinc_auto/hmac_ext.h:13:void __db_SHA1Init __P((SHA1_CTX *));
/db-4.6.21/dbinc_auto/hmac_ext.h:14:void __db_SHA1Update __P((SHA1_CTX *, unsigned char *, size_t));
/db-4.6.21/dbinc_auto/hmac_ext.h:15:void __db_SHA1Final __P((unsigned char *, SHA1_CTX *));
/db-4.6.21/dbinc_auto/hmac_ext.h:20:#endif /* !_hmac_ext_h_ */
/db-4.6.21/dbinc_auto/crypto_ext.h:9:int __aes_setup __P((DB_ENV *, DB_CIPHER *));
/db-4.6.21/dbinc_auto/crypto_ext.h:10:u_int __aes_adj_size __P((size_t));
/db-4.6.21/dbinc_auto/crypto_ext.h:11:int __aes_close __P((DB_ENV *, void *));
/db-4.6.21/dbinc_auto/crypto_ext.h:12:int __aes_decrypt __P((DB_ENV *, void *, void *, u_int8_t *, size_t));
/db-4.6.21/dbinc_auto/crypto_ext.h:13:int __aes_encrypt __P((DB_ENV *, void *, void *, u_int8_t *, size_t));
/db-4.6.21/dbinc_auto/crypto_ext.h:14:int __aes_init __P((DB_ENV *, DB_CIPHER *));
/db-4.6.21/dbinc_auto/crypto_ext.h:18:int __crypto_decrypt_meta __P((DB_ENV *, DB *, u_int8_t *, int));
/db-4.6.21/perl/DB_File/dbinfo:73:my ($magic, $version, $endian, $encrypt) ;
/db-4.6.21/perl/DB_File/dbinfo:80: $encrypt = "Not Supported";
/db-4.6.21/perl/DB_File/dbinfo:87: $encrypt = "Not Supported";
/db-4.6.21/perl/DB_File/dbinfo:113: { $encrypt = $info[6] ? "Enabled" : "Disabled" }
/db-4.6.21/perl/DB_File/dbinfo:115: { $encrypt = "Not Supported" }
/db-4.6.21/perl/DB_File/dbinfo:124:Encryption: $encrypt
/db-4.6.21/perl/BerkeleyDB/mkconsts:574: DB_AM_ENCRYPT => IGNORE,
/db-4.6.21/perl/BerkeleyDB/mkconsts:584: DB_CHKSUM_SHA1 => DEFINE,
/db-4.6.21/perl/BerkeleyDB/mkconsts:588: DB_ENCRYPT => DEFINE,
/db-4.6.21/perl/BerkeleyDB/mkconsts:589: DB_ENCRYPT_AES => DEFINE,
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1454: softCrash("-Encrypt needs Berkeley DB 4.x or better") ;
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1483: Status = dbp->set_encrypt(dbp, password, enc_flags);
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1484: Trace(("DB->set_encrypt passwd = %s, flags %d returned %s\n",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1914:set_encrypt(env, passwd, flags)
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1922: softCrash("$env->set_encrypt needs Berkeley DB 4.1 or better") ;
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1924: dieIfEnvOpened(env, "set_encrypt");
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1925: RETVAL = env->Env->set_encrypt(env->Env, passwd, flags);
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1984: softCrash("-Encrypt needs Berkeley DB 4.x or better") ;
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:2082: status = env->set_encrypt(env, enc_passwd, enc_flags);
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:2083: Trace(("ENV->set_encrypt passwd = %s, flags %d returned %s\n",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:66: DB_CHKSUM_SHA1
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:94: DB_ENCRYPT
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:95: DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:589: if (defined $got->{Encrypt}) {
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:590: croak("Encrypt parameter must be a hash reference")
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:591: if !ref $got->{Encrypt} || ref $got->{Encrypt} ne 'HASH' ;
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:593: my %config = %{ $got->{Encrypt} } ;
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:600: croak("Must specify Password and Flags with Encrypt parameter")
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:743: # [ -Encrypt => { Password => string, Flags => value}
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:760: Encrypt => undef,
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:866: Encrypt => undef,
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:931: Encrypt => undef,
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:990: Encrypt => undef,
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:1056: Encrypt => undef,
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:1176: Encrypt => undef,
/db-4.6.21/perl/BerkeleyDB/dbinfo:73:my ($magic, $version, $endian, $encrypt) ;
/db-4.6.21/perl/BerkeleyDB/dbinfo:80: $encrypt = "Not Supported";
/db-4.6.21/perl/BerkeleyDB/dbinfo:87: $encrypt = "Not Supported";
/db-4.6.21/perl/BerkeleyDB/dbinfo:113: { $encrypt = $info[6] ? "Enabled" : "Disabled" }
/db-4.6.21/perl/BerkeleyDB/dbinfo:115: { $encrypt = "Not Supported" }
/db-4.6.21/perl/BerkeleyDB/dbinfo:124:Encryption: $encrypt
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:165: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:203:=item -Encrypt
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:209: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES }
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:211:Valid values for the Flags are 0 or C.
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:487: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:508: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:801: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:822: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1052: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1073: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1150: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1170: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1198: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1264:=item -Encrypt
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1270: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES }
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1272:Valid values for the Flags are 0 or C.
/db-4.6.21/perl/BerkeleyDB/MANIFEST:30:t/encrypt.t
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:20: -Encrypt => {Password => "abc",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:21: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:39: -Encrypt => 1,
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:42: ok 1, $@ =~ /^Encrypt parameter must be a hash reference at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:47: -Encrypt => {},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:50: ok 2, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:55: -Encrypt => {Password => "fred"},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:58: ok 3, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:63: -Encrypt => {Flags => 1},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:66: ok 4, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:71: -Encrypt => {Fred => 1},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:79: # new BerkeleyDB::Env -Encrypt =>
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:87: -Encrypt => {Password => "abc",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:88: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:101: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:121: # once the database is created, do not need to specify DB_ENCRYPT
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:136: -Encrypt => {Password => "def",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:137: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:146: -Encrypt => 1,
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:149: ok 16, $@ =~ /^Encrypt parameter must be a hash reference at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:154: -Encrypt => {},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:157: ok 17, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:162: -Encrypt => {Password => "fred"},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:165: ok 18, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:170: -Encrypt => {Flags => 1},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:173: ok 19, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:178: -Encrypt => {Fred => 1},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:189: -Encrypt => 1,
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:192: ok 21, $@ =~ /^Encrypt parameter must be a hash reference at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:197: -Encrypt => {},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:200: ok 22, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:205: -Encrypt => {Password => "fred"},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:208: ok 23, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:213: -Encrypt => {Flags => 1},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:216: ok 24, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:221: -Encrypt => {Fred => 1},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:232: -Encrypt => 1,
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:235: ok 26, $@ =~ /^Encrypt parameter must be a hash reference at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:240: -Encrypt => {},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:243: ok 27, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:248: -Encrypt => {Password => "fred"},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:251: ok 28, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:256: -Encrypt => {Flags => 1},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:259: ok 29, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:264: -Encrypt => {Fred => 1},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:275: -Encrypt => 1,
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:278: ok 31, $@ =~ /^Encrypt parameter must be a hash reference at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:283: -Encrypt => {},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:286: ok 32, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:291: -Encrypt => {Password => "fred"},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:294: ok 33, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:299: -Encrypt => {Flags => 1},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:302: ok 34, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:307: -Encrypt => {Fred => 1},
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:316: # new BerkeleyDB::Hash -Encrypt =>
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:325: -Encrypt => {Password => "beta",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:326: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:328: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:356: -Encrypt => {Password => "def",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:357: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:359: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:365: -Encrypt => {Password => "beta",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:366: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:368: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:380: # new BerkeleyDB::Btree -Encrypt =>
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:389: -Encrypt => {Password => "beta",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:390: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:392: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:420: -Encrypt => {Password => "def",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:421: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:423: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:429: -Encrypt => {Password => "beta",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:430: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:432: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:444: # new BerkeleyDB::Queue -Encrypt =>
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:455: -Encrypt => {Password => "beta",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:456: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:458: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:489: -Encrypt => {Password => "def",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:490: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:492: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:499: -Encrypt => {Password => "beta",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:500: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:502: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:514: # new BerkeleyDB::Recno -Encrypt =>
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:523: -Encrypt => {Password => "beta",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:524: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:526: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:554: -Encrypt => {Password => "def",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:555: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:557: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:563: -Encrypt => {Password => "beta",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:564: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:566: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:578: # new BerkeleyDB::Unknown -Encrypt =>
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:587: -Encrypt => {Password => "beta",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:588: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:590: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:618: -Encrypt => {Password => "def",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:619: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:621: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:627: -Encrypt => {Password => "beta",
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:628: Flags => DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/t/encrypt.t:630: -Property => DB_ENCRYPT ;
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:165: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:203:=item -Encrypt
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:209: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES }
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:211:Valid values for the Flags are 0 or C.
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:487: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:508: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:693: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:714: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:891: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:912: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:956: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:976: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:1004: [ -Encrypt => { Password => "string",
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:1070:=item -Encrypt
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:1076: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES }
/db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:1078:Valid values for the Flags are 0 or C.
/db-4.6.21/perl/BerkeleyDB/constants.h:449: DB_CONSUME DB_CURRENT DB_DELETED DB_DUPSORT DB_ENCRYPT DB_ENV_CDB
/db-4.6.21/perl/BerkeleyDB/constants.h:456: if (memEQ(name, "DB_ENCRYPT", 10)) {
/db-4.6.21/perl/BerkeleyDB/constants.h:458:#ifdef DB_ENCRYPT
/db-4.6.21/perl/BerkeleyDB/constants.h:459: *iv_return = DB_ENCRYPT;
/db-4.6.21/perl/BerkeleyDB/constants.h:2117: DB_ARCH_REMOVE DB_AUTO_COMMIT DB_BTREEOLDVER DB_CHKSUM_SHA1 DB_EID_INVALID
/db-4.6.21/perl/BerkeleyDB/constants.h:2118: DB_ENCRYPT_AES DB_ENV_APPINIT DB_ENV_DBLOCAL DB_ENV_LOCKING DB_ENV_LOGGING
/db-4.6.21/perl/BerkeleyDB/constants.h:2488: if (memEQ(name, "DB_ENCRYPT_AES", 14)) {
/db-4.6.21/perl/BerkeleyDB/constants.h:2490:#ifdef DB_ENCRYPT_AES
/db-4.6.21/perl/BerkeleyDB/constants.h:2491: *iv_return = DB_ENCRYPT_AES;
/db-4.6.21/perl/BerkeleyDB/constants.h:2579: if (memEQ(name, "DB_CHKSUM_SHA1", 14)) {
/db-4.6.21/perl/BerkeleyDB/constants.h:2581:#ifdef DB_CHKSUM_SHA1
/db-4.6.21/perl/BerkeleyDB/constants.h:2582: *iv_return = DB_CHKSUM_SHA1;
/db-4.6.21/perl/BerkeleyDB/constants.h:5201: DB_CHKSUM_SHA1 DB_CKP_INTERNAL DB_CLIENT DB_CL_WRITER DB_COMMIT
/db-4.6.21/perl/BerkeleyDB/constants.h:5207: DB_ENCRYPT DB_ENCRYPT_AES DB_ENV_APPINIT DB_ENV_AUTO_COMMIT
/db-4.6.21/db_deadlock/db_deadlock.c:148: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/db_deadlock/db_deadlock.c:149: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/test/test115.tcl:21: global encrypt
/db-4.6.21/test/test115.tcl:193: if { $cryptenv != -1 || $encrypt != 0 } {
/db-4.6.21/test/rep001.tcl:72: append args " -encrypt "
/db-4.6.21/test/rep001.tcl:86: global encrypt
/db-4.6.21/test/rep001.tcl:210: set encrypt 1
/db-4.6.21/test/upgrade.tcl:230: global encrypt
/db-4.6.21/test/upgrade.tcl:236: set encrypt 1
/db-4.6.21/test/upgrade.tcl:243: if { $encrypt == 1 } {
/db-4.6.21/test/upgrade.tcl:363: global encrypt
/db-4.6.21/test/upgrade.tcl:434: set encrypt 0
/db-4.6.21/test/upgrade.tcl:441: global encrypt;\
/db-4.6.21/test/upgrade.tcl:442: set encrypt $encrypt;\
/db-4.6.21/test/upgrade.tcl:466: global encrypt gen_chksum;\
/db-4.6.21/test/upgrade.tcl:467: set encrypt $encrypt;\
/db-4.6.21/test/upgrade.tcl:491: set encrypt 1
/db-4.6.21/test/upgrade.tcl:497: global encrypt passwd;\
/db-4.6.21/test/upgrade.tcl:498: set encrypt $encrypt;\
/db-4.6.21/test/upgrade.tcl:528: set encrypt 0
/db-4.6.21/test/upgrade.tcl:531: global encrypt;\
/db-4.6.21/test/upgrade.tcl:532: set encrypt $encrypt;\
/db-4.6.21/test/upgrade.tcl:541: set encrypt 1
/db-4.6.21/test/upgrade.tcl:544: global encrypt;\
/db-4.6.21/test/upgrade.tcl:545: set encrypt $encrypt;\
/db-4.6.21/test/upgrade.tcl:571: global encrypt
/db-4.6.21/test/upgrade.tcl:606: if { $encrypt == 1 } {
/db-4.6.21/test/upgrade.tcl:719: global encrypt
/db-4.6.21/test/upgrade.tcl:723: if { $encrypt == 1 } {
/db-4.6.21/test/test116.tcl:55: if { [is_substr $args "-encrypt"] } {
/db-4.6.21/test/test116.tcl:58: if { [is_substr [$env get_encrypt_flags] "-encryptaes"] } {
/db-4.6.21/test/test116.tcl:60: append resetargs " -encrypt "
/db-4.6.21/test/test.tcl:32:set encrypt 0
/db-4.6.21/test/test.tcl:33:set old_encrypt 0
/db-4.6.21/test/test.tcl:1142: append largs " -encrypt "
/db-4.6.21/test/test.tcl:1201: append largs " -encrypt "
/db-4.6.21/test/test.tcl:1505: global encrypt
/db-4.6.21/test/test.tcl:1518: $encrypt == 0 } {
/db-4.6.21/test/test.tcl:1523: $encrypt == 1 } {
/db-4.6.21/test/test.tcl:1540: if { $gen_upgrade_log == 0 || $encrypt == 0 } {
/db-4.6.21/test/rep039.tcl:356: # (more-)archived logs, so we have to abuse the calling signature a bit
/db-4.6.21/test/sdb002.tcl:48: global encrypt
/db-4.6.21/test/sdb002.tcl:59: # Run convert_encrypt so that old_encrypt will be reset to
/db-4.6.21/test/sdb002.tcl:61: convert_encrypt $largs
/db-4.6.21/test/sdb002.tcl:84: global encrypt
/db-4.6.21/test/sdb002.tcl:205: if { $encrypt > 0 } {
/db-4.6.21/test/sec001.tcl:116: puts "\tSec001.f.2: Create without encryption algorithm (DB_ENCRYPT_ANY)."
/db-4.6.21/test/sec001.tcl:145: # db->set_encrypt method when we've already got a secure dbenv.
/db-4.6.21/test/sec001.tcl:163: puts "\tSec001.g.3: Open again with any encryption (DB_ENCRYPT_ANY)."
/db-4.6.21/test/rpc004.tcl:56: -mode 0644} -env $env -encrypt $testfile1]
/db-4.6.21/test/rep011.tcl:54: append args " -encrypt "
/db-4.6.21/test/rep011.tcl:68: global encrypt
/db-4.6.21/test/rep011.tcl:177: set encrypt 1
/db-4.6.21/test/rep062.tcl:72: global encrypt
/db-4.6.21/test/rep062.tcl:113: { 1 {btree ""} {btree "-encrypt"} }
/db-4.6.21/test/rep062.tcl:114: { 1 {btree "-encrypt"} {btree ""} }
/db-4.6.21/test/rep062.tcl:115: { 1 {queue ""} {queue "-encrypt"} }
/db-4.6.21/test/rep062.tcl:116: { 1 {queue "-encrypt"} {queue ""} }
/db-4.6.21/test/rep062.tcl:269: set encrypt 1
/db-4.6.21/test/test044.tcl:27: global encrypt
/db-4.6.21/test/test044.tcl:43: if { $encrypt != 0 } {
/db-4.6.21/test/test042.tcl:22: global encrypt
/db-4.6.21/test/test042.tcl:35: if { $encrypt != 0 } {
/db-4.6.21/test/env007.tcl:288: "-encryptaes" "$passwd" "-encryptaes" "get_encrypt_flags" }
/db-4.6.21/test/env007.tcl:343: [eval $env get_encrypt_flags] \
/db-4.6.21/test/env007.tcl:598: { "" "-encrypt" "" "get_flags" "-encryptaes $passwd" }
/db-4.6.21/test/scr010/spell.ok:12:AES
/db-4.6.21/test/scr010/spell.ok:120:CBC
/db-4.6.21/test/scr010/spell.ok:718:HMAC
/db-4.6.21/test/scr010/spell.ok:1329:RIJNDAEL
/db-4.6.21/test/scr010/spell.ok:1409:Rijndael
/db-4.6.21/test/scr010/spell.ok:1443:SHA
/db-4.6.21/test/scr010/spell.ok:2337:des
/db-4.6.21/test/scr010/spell.ok:2797:hmac
/db-4.6.21/test/scr010/spell.ok:3961:rijndael
/db-4.6.21/test/logtrack.tcl:37: global encrypt passwd
/db-4.6.21/test/logtrack.tcl:44: if { $encrypt > 0 } {
/db-4.6.21/test/sdb015.tcl:56: global encrypt
/db-4.6.21/test/sdb015.tcl:63: # Run convert_encrypt so that old_encrypt will be reset to
/db-4.6.21/test/sdb015.tcl:65: convert_encrypt $largs
/db-4.6.21/test/sdb015.tcl:79: global encrypt
/db-4.6.21/test/wordlist:3787:blowfish
/db-4.6.21/test/reputils.tcl:467: global encrypt
/db-4.6.21/test/reputils.tcl:473: set encrypt 1
/db-4.6.21/test/reputils.tcl:1828: global encrypt
/db-4.6.21/test/reputils.tcl:1886: if { $encrypt == 1 } {
/db-4.6.21/test/fop004.tcl:13: global encrypt
/db-4.6.21/test/fop004.tcl:32: if { $encrypt != 0 } {
/db-4.6.21/test/test061.tcl:17: global encrypt
/db-4.6.21/test/test061.tcl:210: if { $encrypt != 0 } {
/db-4.6.21/test/test045.tcl:25: global encrypt
/db-4.6.21/test/test045.tcl:37: if { $encrypt != 0 } {
/db-4.6.21/test/testutils.tcl:135: global encrypt
/db-4.6.21/test/testutils.tcl:140: if { $encrypt > 0 && $env == "NULL" } {
/db-4.6.21/test/testutils.tcl:168: global encrypt
/db-4.6.21/test/testutils.tcl:173: if { $encrypt > 0 && $env == "NULL" } {
/db-4.6.21/test/testutils.tcl:1112: global old_encrypt
/db-4.6.21/test/testutils.tcl:1164: if { $old_encrypt != 0 } {
/db-4.6.21/test/testutils.tcl:1186: $old_encrypt == 0} {
/db-4.6.21/test/testutils.tcl:1193: $old_encrypt == 1 } {
/db-4.6.21/test/testutils.tcl:1266: global old_encrypt
/db-4.6.21/test/testutils.tcl:1271: if { $old_encrypt != 0 } {
/db-4.6.21/test/testutils.tcl:1482: convert_encrypt $env_cmd
/db-4.6.21/test/testutils.tcl:1632: global encrypt
/db-4.6.21/test/testutils.tcl:1652: if { $encrypt > 0 } {
/db-4.6.21/test/testutils.tcl:2403: global encrypt
/db-4.6.21/test/testutils.tcl:2412: set newl [lreplace $largs $eindex $eend "-encrypt"]
/db-4.6.21/test/testutils.tcl:2417:proc convert_encrypt { largs } {
/db-4.6.21/test/testutils.tcl:2418: global encrypt
/db-4.6.21/test/testutils.tcl:2419: global old_encrypt
/db-4.6.21/test/testutils.tcl:2421: set old_encrypt $encrypt
/db-4.6.21/test/testutils.tcl:2422: set encrypt 0
/db-4.6.21/test/testutils.tcl:2423: if { [lsearch $largs "-encrypt*"] != -1 } {
/db-4.6.21/test/testutils.tcl:2424: set encrypt 1
/db-4.6.21/test/testutils.tcl:2446: convert_encrypt $largs
/db-4.6.21/test/testutils.tcl:2803: global encrypt
/db-4.6.21/test/testutils.tcl:2838: if { $encrypt != 0 } {
/db-4.6.21/test/testutils.tcl:2956: global encrypt
/db-4.6.21/test/testutils.tcl:2963: if { $encrypt != 0 } {
/db-4.6.21/test/testutils.tcl:3025: global encrypt
/db-4.6.21/test/testutils.tcl:3055: if { $encrypt != 0 } {
/db-4.6.21/test/rep029.tcl:83: append args " -encrypt "
/db-4.6.21/test/recd017.tcl:13: global encrypt
/db-4.6.21/test/recd017.tcl:50: convert_encrypt $env_cmd
/db-4.6.21/test/recd017.tcl:60: -env $dbenv -encrypt $opts $testfile"
/db-4.6.21/test/recd017.tcl:78: convert_encrypt $env_cmd
/db-4.6.21/test/recd017.tcl:81: -env $dbenv -encrypt $opts $testfile"
/db-4.6.21/test/recd017.tcl:87: -env $dbenv -encrypt $opts $testfile2"
/db-4.6.21/test/test070.tcl:18: global encrypt
/db-4.6.21/test/test070.tcl:31: if { $encrypt != 0 } {
/db-4.6.21/test/test037.tcl:10: global encrypt
/db-4.6.21/test/test089.tcl:14: global encrypt
/db-4.6.21/mod_db4/utils.c:51: if((semset = md4_sem_create(NUM_SEMS, start)) < 0) {
/db-4.6.21/mod_db4/utils.c:74: md4_sem_wait_for_zero(semset, OK_TO_PROCEED);
/db-4.6.21/mod_db4/utils.c:79: md4_sem_set(semset, OK_TO_PROCEED, 0);
/db-4.6.21/mod_db4/utils.c:84: md4_sem_set(semset, OK_TO_PROCEED, 1);
/db-4.6.21/mod_db4/sem_utils.h:12:extern int md4_sem_create(int semnum, unsigned short *start);
/db-4.6.21/mod_db4/sem_utils.h:13:extern void md4_sem_destroy(int semid);
/db-4.6.21/mod_db4/sem_utils.h:14:extern void md4_sem_lock(int semid, int semnum);
/db-4.6.21/mod_db4/sem_utils.h:15:extern void md4_sem_unlock(int semid, int semnum);
/db-4.6.21/mod_db4/sem_utils.h:16:extern void md4_sem_wait_for_zero(int semid, int semnum);
/db-4.6.21/mod_db4/sem_utils.h:17:extern void md4_sem_set(int semid, int semnum, int value);
/db-4.6.21/mod_db4/sem_utils.h:18:extern int md4_sem_get(int semid, int semnum);
/db-4.6.21/mod_db4/sem_utils.c:43:int md4_sem_create(int semnum, unsigned short *start)
/db-4.6.21/mod_db4/sem_utils.c:56: md4_sem_destroy(semid);
/db-4.6.21/mod_db4/sem_utils.c:62: md4_sem_destroy(semid);
/db-4.6.21/mod_db4/sem_utils.c:68:void md4_sem_destroy(int semid)
/db-4.6.21/mod_db4/sem_utils.c:75:void md4_sem_lock(int semid, int semnum)
/db-4.6.21/mod_db4/sem_utils.c:84:void md4_sem_unlock(int semid, int semnum)
/db-4.6.21/mod_db4/sem_utils.c:93:void md4_sem_wait_for_zero(int semid, int semnum)
/db-4.6.21/mod_db4/sem_utils.c:102:void md4_sem_set(int semid, int semnum, int value)
/db-4.6.21/mod_db4/sem_utils.c:109:int md4_sem_get(int semid, int semnum)
/db-4.6.21/php_db4/db4.cpp:283:ZEND_NAMED_FUNCTION(_wrap_db_env_get_encrypt_flags);
/db-4.6.21/php_db4/db4.cpp:287:ZEND_NAMED_FUNCTION(_wrap_db_env_set_encrypt);
/db-4.6.21/php_db4/db4.cpp:296: ZEND_NAMED_FE(get_encrypt, _wrap_db_env_get_encrypt_flags, NULL)
/db-4.6.21/php_db4/db4.cpp:300: ZEND_NAMED_FE(set_encrypt, _wrap_db_env_set_encrypt, NULL)
/db-4.6.21/php_db4/db4.cpp:321:ZEND_NAMED_FUNCTION(_wrap_db_get_encrypt_flags);
/db-4.6.21/php_db4/db4.cpp:326:ZEND_NAMED_FUNCTION(_wrap_db_set_encrypt);
/db-4.6.21/php_db4/db4.cpp:339: ZEND_NAMED_FE(get_encrypt_flags, _wrap_db_get_encrypt_flags, NULL)
/db-4.6.21/php_db4/db4.cpp:344: ZEND_NAMED_FE(set_encrypt, _wrap_db_set_encrypt, NULL)
/db-4.6.21/php_db4/db4.cpp:458: REGISTER_LONG_CONSTANT("DB_ENCRYPT_AES", DB_ENCRYPT_AES, CONST_CS | CONST_PERSISTENT);
/db-4.6.21/php_db4/db4.cpp:479: REGISTER_LONG_CONSTANT("DB_ENCRYPT", DB_ENCRYPT, CONST_CS | CONST_PERSISTENT);
/db-4.6.21/php_db4/db4.cpp:637: REGISTER_LONG_CONSTANT("DB_AM_ENCRYPT", DB_AM_ENCRYPT, CONST_CS | CONST_PERSISTENT);
/db-4.6.21/php_db4/db4.cpp:1394:/* {{{ proto bool DB4::set_encrypt(string $password [, long $flags])
/db-4.6.21/php_db4/db4.cpp:1396:ZEND_NAMED_FUNCTION(_wrap_db_set_encrypt)
/db-4.6.21/php_db4/db4.cpp:1408: RETURN_BOOL(db->set_encrypt(db, pass, flags)?0:1);
/db-4.6.21/php_db4/db4.cpp:1412:/* {{{ proto int DB4::get_encrypt_flags()
/db-4.6.21/php_db4/db4.cpp:1414:ZEND_NAMED_FUNCTION(_wrap_db_get_encrypt_flags)
/db-4.6.21/php_db4/db4.cpp:1420: if (db->get_encrypt_flags(db, &flags) != 0)
/db-4.6.21/php_db4/db4.cpp:2062:/* {{{ proto bool DB4Env::set_encrypt(string $password [, long $flags])
/db-4.6.21/php_db4/db4.cpp:2064:ZEND_NAMED_FUNCTION(_wrap_db_env_set_encrypt)
/db-4.6.21/php_db4/db4.cpp:2078: RETURN_BOOL(dbenv->set_encrypt(dbenv, pass, flags)?0:1);
/db-4.6.21/php_db4/db4.cpp:2082:/* {{{ proto int DB4Env::get_encrypt_flags()
/db-4.6.21/php_db4/db4.cpp:2084:ZEND_NAMED_FUNCTION(_wrap_db_env_get_encrypt_flags)
/db-4.6.21/php_db4/db4.cpp:2091: if (dbenv->get_encrypt_flags(dbenv, &flags) != 0)
/db-4.6.21/cxx/cxx_db.cpp:554:DB_METHOD(get_encrypt_flags, (u_int32_t *flagsp),
/db-4.6.21/cxx/cxx_db.cpp:556:DB_METHOD(set_encrypt, (const char *passwd, u_int32_t flags),
/db-4.6.21/cxx/cxx_env.cpp:708:DBENV_METHOD(get_encrypt_flags, (u_int32_t *flagsp),
/db-4.6.21/cxx/cxx_env.cpp:710:DBENV_METHOD(set_encrypt, (const char *passwd, u_int32_t flags),
/db-4.6.21/db_recover/db_recover.c:118: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.6.21/db_recover/db_recover.c:119: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.6.21/rpc_client/gen_client.c:315: * PUBLIC: int __dbcl_env_get_encrypt_flags __P((DB_ENV *, u_int32_t *));
/db-4.6.21/rpc_client/gen_client.c:318:__dbcl_env_get_encrypt_flags(dbenv, flagsp)
/db-4.6.21/rpc_client/gen_client.c:323: __env_get_encrypt_flags_msg msg;
/db-4.6.21/rpc_client/gen_client.c:324: __env_get_encrypt_flags_reply *replyp = NULL;
/db-4.6.21/rpc_client/gen_client.c:335: replyp = __db_env_get_encrypt_flags_4006(&msg, cl);
/db-4.6.21/rpc_client/gen_client.c:346: xdr_free((xdrproc_t)xdr___env_get_encrypt_flags_reply, (void *)replyp);
/db-4.6.21/rpc_client/gen_client.c:581: * PUBLIC: int __dbcl_env_set_encrypt __P((DB_ENV *, const char *, u_int32_t));
/db-4.6.21/rpc_client/gen_client.c:584:__dbcl_env_set_encrypt(dbenv, passwd, flags)
/db-4.6.21/rpc_client/gen_client.c:590: __env_set_encrypt_msg msg;
/db-4.6.21/rpc_client/gen_client.c:591: __env_set_encrypt_reply *replyp = NULL;
/db-4.6.21/rpc_client/gen_client.c:607: replyp = __db_env_set_encrypt_4006(&msg, cl);
/db-4.6.21/rpc_client/gen_client.c:616: xdr_free((xdrproc_t)xdr___env_set_encrypt_reply, (void *)replyp);
/db-4.6.21/rpc_client/gen_client.c:1115: * PUBLIC: int __dbcl_db_get_encrypt_flags __P((DB *, u_int32_t *));
/db-4.6.21/rpc_client/gen_client.c:1118:__dbcl_db_get_encrypt_flags(dbp, flagsp)
/db-4.6.21/rpc_client/gen_client.c:1123: __db_get_encrypt_flags_msg msg;
/db-4.6.21/rpc_client/gen_client.c:1124: __db_get_encrypt_flags_reply *replyp = NULL;
/db-4.6.21/rpc_client/gen_client.c:1140: replyp = __db_db_get_encrypt_flags_4006(&msg, cl);
/db-4.6.21/rpc_client/gen_client.c:1151: xdr_free((xdrproc_t)xdr___db_get_encrypt_flags_reply, (void *)replyp);
/db-4.6.21/rpc_client/gen_client.c:2048: * PUBLIC: int __dbcl_db_set_encrypt __P((DB *, const char *, u_int32_t));
/db-4.6.21/rpc_client/gen_client.c:2051:__dbcl_db_set_encrypt(dbp, passwd, flags)
/db-4.6.21/rpc_client/gen_client.c:2057: __db_set_encrypt_msg msg;
/db-4.6.21/rpc_client/gen_client.c:2058: __db_set_encrypt_reply *replyp = NULL;
/db-4.6.21/rpc_client/gen_client.c:2079: replyp = __db_db_set_encrypt_4006(&msg, cl);
/db-4.6.21/rpc_client/gen_client.c:2088: xdr_free((xdrproc_t)xdr___db_set_encrypt_reply, (void *)replyp);
/db-4.6.21/rpc_client/gen_client.c:3219: dbp->get_encrypt_flags = __dbcl_db_get_encrypt_flags;
/db-4.6.21/rpc_client/gen_client.c:3263: dbp->set_encrypt = __dbcl_db_set_encrypt;
/db-4.6.21/rpc_client/gen_client.c:3353: dbenv->get_encrypt_flags = __dbcl_env_get_encrypt_flags;
/db-4.6.21/rpc_client/gen_client.c:3624: dbenv->set_encrypt = __dbcl_env_set_encrypt;
/db-4.5.20/btree/bt_open.c:369: if (F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.5.20/btree/bt_open.c:370: meta->dbmeta.encrypt_alg =
/db-4.5.20/btree/bt_open.c:372: DB_ASSERT(dbenv, meta->dbmeta.encrypt_alg != 0);
/db-4.5.20/btree/bt_open.c:474: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP));
/db-4.5.20/db_printlog/db_printlog.c:154: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/db_printlog/db_printlog.c:155: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/docs/java/com/sleepycat/util/ExceptionWrapper.html:169: This method is intentionally defined to be the same signature as the
/db-4.5.20/docs/java/com/sleepycat/util/RuntimeExceptionWrapper.html:234:
This method is intentionally defined to be the same signature as the
/db-4.5.20/docs/java/com/sleepycat/util/IOExceptionWrapper.html:234:
This method is intentionally defined to be the same signature as the
/db-4.5.20/docs/java/com/sleepycat/db/DatabaseConfig.html:1614: Berkeley DB uses the SHA1 Secure Hash Algorithm if encryption is
/db-4.5.20/docs/java/com/sleepycat/db/DatabaseConfig.html:1820: Berkeley DB uses the Rijndael/AES (also known as the Advanced
/db-4.5.20/docs/java/com/sleepycat/db/EnvironmentConfig.html:2393: Berkeley DB uses the Rijndael/AES (also known as the Advanced
/db-4.5.20/docs/api_c/api_core.html:41:
DB->set_encrypt | Set the database cryptographic key |
/db-4.5.20/docs/api_c/api_core.html:130:DB_ENV->set_encrypt | Set the environment cryptographic key |
/db-4.5.20/docs/api_c/env_list.html:37:DB_ENV->set_encrypt | Set the environment cryptographic key |
/db-4.5.20/docs/api_c/c_pindex.html:137:DB->set_flags | DB_ENCRYPT |
/db-4.5.20/docs/api_c/c_pindex.html:138:DB->set_encrypt | DB_ENCRYPT_AES |
/db-4.5.20/docs/api_c/c_pindex.html:139:DB_ENV->set_encrypt | DB_ENCRYPT_AES |
/db-4.5.20/docs/api_c/c_pindex.html:447: | encryption |
/db-4.5.20/docs/api_c/env_lsn_reset.html:57:DB_ENCRYPTThe file contains encrypted databases.
/db-4.5.20/docs/api_c/db_set_encrypt.html:1:
/db-4.5.20/docs/api_c/db_set_encrypt.html:2:
/db-4.5.20/docs/api_c/db_set_encrypt.html:8:Berkeley DB: DB->set_encrypt
/db-4.5.20/docs/api_c/db_set_encrypt.html:15:DB->set_encrypt
/db-4.5.20/docs/api_c/db_set_encrypt.html:27:DB->set_encrypt(DB *db, const char *passwd, u_int32_t flags);
/db-4.5.20/docs/api_c/db_set_encrypt.html:30:DB->get_encrypt_flags(DB *db, u_int32_t *flagsp);
/db-4.5.20/docs/api_c/db_set_encrypt.html:33:Description: DB->set_encrypt
/db-4.5.20/docs/api_c/db_set_encrypt.html:39:The DB->set_encrypt method may not be called after the DB->open method is called.
/db-4.5.20/docs/api_c/db_set_encrypt.html:41:
The DB->set_encrypt method
/db-4.5.20/docs/api_c/db_set_encrypt.html:50:
DB_ENCRYPT_AESUse the Rijndael/AES (also known as the Advanced Encryption Standard
/db-4.5.20/docs/api_c/db_set_encrypt.html:58:The DB->set_encrypt method
/db-4.5.20/docs/api_c/db_set_encrypt.html:70:
Description: DB->get_encrypt_flags
/db-4.5.20/docs/api_c/db_set_encrypt.html:71:The DB->get_encrypt_flags method returns the encryption flags.
/db-4.5.20/docs/api_c/db_set_encrypt.html:72:The DB->get_encrypt_flags method may be called at any time during the life of the
/db-4.5.20/docs/api_c/db_set_encrypt.html:74:
The DB->get_encrypt_flags method
/db-4.5.20/docs/api_c/db_set_encrypt.html:80:
flagspThe DB->get_encrypt_flags method returns the
/db-4.5.20/docs/api_c/db_list.html:42:DB->set_encrypt | Set the database cryptographic key |
/db-4.5.20/docs/api_c/env_set_encrypt.html:1:
/db-4.5.20/docs/api_c/env_set_encrypt.html:7:Berkeley DB: DB_ENV->set_encrypt
/db-4.5.20/docs/api_c/env_set_encrypt.html:14:DB_ENV->set_encrypt
/db-4.5.20/docs/api_c/env_set_encrypt.html:26:DB_ENV->set_encrypt(DB_ENV *dbenv, const char *passwd, u_int32_t flags);
/db-4.5.20/docs/api_c/env_set_encrypt.html:29:DB_ENV->get_encrypt_flags(DB_ENV *dbenv, u_int32_t *flagsp);
/db-4.5.20/docs/api_c/env_set_encrypt.html:32:Description: DB_ENV->set_encrypt
/db-4.5.20/docs/api_c/env_set_encrypt.html:35:The DB_ENV->set_encrypt method configures a database environment, not only operations
/db-4.5.20/docs/api_c/env_set_encrypt.html:37:
The DB_ENV->set_encrypt method may not be called after the DB_ENV->open method is
/db-4.5.20/docs/api_c/env_set_encrypt.html:40:DB_ENV->open is called, the information specified to DB_ENV->set_encrypt
/db-4.5.20/docs/api_c/env_set_encrypt.html:44:
The DB_ENV->set_encrypt method
/db-4.5.20/docs/api_c/env_set_encrypt.html:53:
DB_ENCRYPT_AESUse the Rijndael/AES (also known as the Advanced Encryption Standard
/db-4.5.20/docs/api_c/env_set_encrypt.html:61:The DB_ENV->set_encrypt method
/db-4.5.20/docs/api_c/env_set_encrypt.html:73:
Description: DB_ENV->get_encrypt_flags
/db-4.5.20/docs/api_c/env_set_encrypt.html:74:The DB_ENV->get_encrypt_flags method returns the encryption flags.
/db-4.5.20/docs/api_c/env_set_encrypt.html:75:The DB_ENV->get_encrypt_flags method may be called at any time during the life of the
/db-4.5.20/docs/api_c/env_set_encrypt.html:77:
The DB_ENV->get_encrypt_flags method
/db-4.5.20/docs/api_c/env_set_encrypt.html:83:
flagspThe DB_ENV->get_encrypt_flags method returns the
/db-4.5.20/docs/api_c/db_set_flags.html:50:filestore. Berkeley DB uses the SHA1 Secure Hash Algorithm
/db-4.5.20/docs/api_c/db_set_flags.html:62:DB_ENCRYPTEncrypt the database using the cryptographic password specified to the
/db-4.5.20/docs/api_c/db_set_flags.html:63:DB_ENV->set_encrypt or DB->set_encrypt methods.
/db-4.5.20/docs/api_c/db_set_flags.html:64:Calling DB->set_flags with the DB_ENCRYPT flag only affects the
/db-4.5.20/docs/api_c/db_set_flags.html:67:
If the database already exists when DB->open is called, the DB_ENCRYPT
/db-4.5.20/docs/api_c/env_fileid_reset.html:51:
DB_ENCRYPTThe file contains encrypted databases.
/db-4.5.20/docs/api_cxx/api_core.html:41:Db::set_encrypt | Set the database cryptographic key |
/db-4.5.20/docs/api_cxx/api_core.html:130:DbEnv::set_encrypt | Set the environment cryptographic key |
/db-4.5.20/docs/api_cxx/cxx_pindex.html:138:Db::set_flags | DB_ENCRYPT |
/db-4.5.20/docs/api_cxx/cxx_pindex.html:139:Db::set_encrypt | DB_ENCRYPT_AES |
/db-4.5.20/docs/api_cxx/cxx_pindex.html:140:DbEnv::set_encrypt | DB_ENCRYPT_AES |
/db-4.5.20/docs/api_cxx/cxx_pindex.html:442: | encryption |
/db-4.5.20/docs/api_cxx/env_list.html:37:DbEnv::set_encrypt | Set the environment cryptographic key |
/db-4.5.20/docs/api_cxx/pindex.src:45:__APIREL__/api_cxx/db_set_encrypt.html__OCT__DB_ENCRYPT_AES Db::set_encrypt@DB_ENCRYPT_AES
/db-4.5.20/docs/api_cxx/pindex.src:51:__APIREL__/api_cxx/db_set_flags.html__OCT__DB_ENCRYPT Db::set_flags@DB_ENCRYPT
/db-4.5.20/docs/api_cxx/pindex.src:154:__APIREL__/api_cxx/env_set_encrypt.html__OCT__DB_ENCRYPT_AES DbEnv::set_encrypt@DB_ENCRYPT_AES
/db-4.5.20/docs/api_cxx/env_lsn_reset.html:58:DB_ENCRYPTThe file contains encrypted databases.
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:1:
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:2:
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:8:Berkeley DB: Db::set_encrypt
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:15:Db::set_encrypt
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:27:Db::set_encrypt(const char *passwd, u_int32_t flags);
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:30:Db::get_encrypt_flags(u_int32_t *flagsp);
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:33:Description: Db::set_encrypt
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:39:The Db::set_encrypt method may not be called after the Db::open method is called.
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:41:
The Db::set_encrypt method
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:51:
DB_ENCRYPT_AESUse the Rijndael/AES (also known as the Advanced Encryption Standard
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:59:The Db::set_encrypt method
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:74:
Description: Db::get_encrypt_flags
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:75:The Db::get_encrypt_flags method returns the encryption flags.
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:76:The Db::get_encrypt_flags method may be called at any time during the life of the
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:78:
The Db::get_encrypt_flags method
/db-4.5.20/docs/api_cxx/db_set_encrypt.html:85:
flagspThe Db::get_encrypt_flags method returns the
/db-4.5.20/docs/api_cxx/db_list.html:42:Db::set_encrypt | Set the database cryptographic key |
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:1:
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:7:Berkeley DB: DbEnv::set_encrypt
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:14:DbEnv::set_encrypt
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:26:DbEnv::set_encrypt(const char *passwd, u_int32_t flags);
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:29:DbEnv::get_encrypt_flags(u_int32_t *flagsp);
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:32:Description: DbEnv::set_encrypt
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:35:The DbEnv::set_encrypt method configures a database environment, not only operations
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:37:
The DbEnv::set_encrypt method may not be called after the DbEnv::open method is
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:40:DbEnv::open is called, the information specified to DbEnv::set_encrypt
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:44:
The DbEnv::set_encrypt method
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:54:
DB_ENCRYPT_AESUse the Rijndael/AES (also known as the Advanced Encryption Standard
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:62:The DbEnv::set_encrypt method
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:77:
Description: DbEnv::get_encrypt_flags
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:78:The DbEnv::get_encrypt_flags method returns the encryption flags.
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:79:The DbEnv::get_encrypt_flags method may be called at any time during the life of the
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:81:
The DbEnv::get_encrypt_flags method
/db-4.5.20/docs/api_cxx/env_set_encrypt.html:88:
flagspThe DbEnv::get_encrypt_flags method returns the
/db-4.5.20/docs/api_cxx/db_set_flags.html:50:filestore. Berkeley DB uses the SHA1 Secure Hash Algorithm
/db-4.5.20/docs/api_cxx/db_set_flags.html:62:DB_ENCRYPTEncrypt the database using the cryptographic password specified to the
/db-4.5.20/docs/api_cxx/db_set_flags.html:63:DbEnv::set_encrypt or Db::set_encrypt methods.
/db-4.5.20/docs/api_cxx/db_set_flags.html:64:Calling Db::set_flags with the DB_ENCRYPT flag only affects the
/db-4.5.20/docs/api_cxx/db_set_flags.html:67:
If the database already exists when Db::open is called, the DB_ENCRYPT
/db-4.5.20/docs/api_cxx/env_fileid_reset.html:52:
DB_ENCRYPTThe file contains encrypted databases.
Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/gsg_txn/C/BerkeleyDB-Core-C-Txn.pdf odpovídá
Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/gsg_txn/CXX/BerkeleyDB-Core-Cxx-Txn.pdf odpovídá
Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/gsg_txn/JAVA/BerkeleyDB-Core-JAVA-Txn.pdf odpovídá
Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/gsg/C/BerkeleyDB-Core-C-GSG.pdf odpovídá
/db-4.5.20/docs/gsg/C/btree.html:476: is a pointer to a function that has the following signature:
/db-4.5.20/docs/gsg/CXX/btree.html:464: is a pointer to a function that has the following signature:
Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/gsg/CXX/BerkeleyDB-Core-Cxx-GSG.pdf odpovídá
Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/collections/tutorial/BerkeleyDB-Java-Collections.pdf odpovídá
/db-4.5.20/docs/ref/upgrade.4.2/cksum.html:7:Berkeley DB Reference Guide: Release 4.2: DB_CHKSUM_SHA1
/db-4.5.20/docs/ref/upgrade.4.2/cksum.html:17:Release 4.2: DB_CHKSUM_SHA1
/db-4.5.20/docs/ref/upgrade.4.2/cksum.html:19:from DB_CHKSUM_SHA1 to DB_CHKSUM, as Berkeley DB uses an internal
/db-4.5.20/docs/ref/upgrade.4.2/cksum.html:21:the SHA1 Secure Hash Algorithm. Berkeley DB continues to use the SHA1 Secure
/db-4.5.20/docs/ref/upgrade.4.2/cksum.html:23:Applications using the DB_CHKSUM_SHA1 flag should change that use to
/db-4.5.20/docs/ref/upgrade.4.2/toc.html:23:Release 4.2: DB_CHKSUM_SHA1
/db-4.5.20/docs/ref/refs/hash_usenix.ps:10284:4040(des-)X
/db-4.5.20/docs/ref/am/ops.html:61:DB->set_encrypt | Set the database cryptographic key |
/db-4.5.20/docs/ref/distrib/layout.html:57:hmac | Checksum support |
/db-4.5.20/docs/ref/toc.html:127: Encryption
/db-4.5.20/docs/ref/env/security.html:15: 
/db-4.5.20/docs/ref/env/security.html:52:
|  
/db-4.5.20/docs/ref/env/intro.html:71: | DB_ENV->set_encrypt | Set the environment cryptographic key |
/db-4.5.20/docs/ref/env/remote.html:15: 
/db-4.5.20/docs/ref/env/remote.html:61:
|  
/db-4.5.20/docs/ref/env/encrypt.html:1:
/db-4.5.20/docs/ref/env/encrypt.html:19:Berkeley DB optionally supports encryption using the Rijndael/AES (also known
/db-4.5.20/docs/ref/env/encrypt.html:24:encrypted information is additionally checksummed using the SHA1 Secure
/db-4.5.20/docs/ref/env/encrypt.html:36:encryption by calling the DB_ENV->set_encrypt or
/db-4.5.20/docs/ref/env/encrypt.html:37:DB->set_encrypt methods, applications must specify the
/db-4.5.20/docs/ref/env/encrypt.html:38:DB_ENCRYPT flag before creating the database in order for the
/db-4.5.20/docs/ref/env/encrypt.html:80:Rijndael/AES code used in Berkeley DB.
/db-4.5.20/docs/ref/env/encrypt.html:81: Steve Reid and James H. Brown for writing the SHA1 checksum code used
/db-4.5.20/docs/ref/env/encrypt.html:85:Adam Stubblefield for integrating the Rijndael/AES, SHA1 checksum and
/db-4.5.20/docs/ref/rep/intro.html:69:For example, the application may choose to encrypt data, use a secure
/db-4.5.20/docs/ref/upgrade.4.3/err.html:18:The signature of the error callback passed to the
/db-4.5.20/docs/api_tcl/db_rename.html:24: [-encrypt]
/db-4.5.20/docs/api_tcl/db_rename.html:42: -encryptSpecify the database in an environment is encrypted with the
/db-4.5.20/docs/api_tcl/db_rename.html:45:using the Rijndael/AES (also known as the Advanced Encryption Standard
/db-4.5.20/docs/api_tcl/db_remove.html:24: [-encrypt]
/db-4.5.20/docs/api_tcl/db_remove.html:41:-encryptSpecify the database in an environment is encrypted with the
/db-4.5.20/docs/api_tcl/db_remove.html:44:using the Rijndael/AES (also known as the Advanced Encryption Standard
/db-4.5.20/docs/api_tcl/db_open.html:31: [-encrypt]
/db-4.5.20/docs/api_tcl/db_open.html:119:-encryptSpecify the database in an environment should be encrypted with the
/db-4.5.20/docs/api_tcl/db_open.html:122:using the Rijndael/AES (also known as the Advanced Encryption Standard
/db-4.5.20/docs/api_tcl/env_open.html:77:using the Rijndael/AES (also known as the Advanced Encryption Standard
/db-4.5.20/qam/qam_open.c:145: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP));
/db-4.5.20/qam/qam_open.c:250: if (F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.5.20/qam/qam_open.c:251: meta->dbmeta.encrypt_alg =
/db-4.5.20/qam/qam_open.c:253: DB_ASSERT(dbenv, meta->dbmeta.encrypt_alg != 0);
/db-4.5.20/qam/qam_open.c:334: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP));
/db-4.5.20/db_archive/db_archive.c:114: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/db_archive/db_archive.c:115: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/hash/hash_open.c:277: if (F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.5.20/hash/hash_open.c:278: meta->dbmeta.encrypt_alg =
/db-4.5.20/hash/hash_open.c:280: DB_ASSERT(dbenv, meta->dbmeta.encrypt_alg != 0);
/db-4.5.20/hash/hash_open.c:395: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP));
/db-4.5.20/java/src/com/sleepycat/util/ExceptionWrapper.java:31: * This method is intentionally defined to be the same signature as the
/db-4.5.20/java/src/com/sleepycat/db/internal/DbConstants.java:35: int DB_ENCRYPT = 0x00020000;
/db-4.5.20/java/src/com/sleepycat/db/internal/DbConstants.java:36: int DB_ENCRYPT_AES = 0x0000001;
/db-4.5.20/java/src/com/sleepycat/db/internal/Db.java:287: public int get_encrypt_flags() throws com.sleepycat.db.DatabaseException { return db_javaJNI.Db_get_encrypt_flags(swigCPtr); }
/db-4.5.20/java/src/com/sleepycat/db/internal/Db.java:363: public void set_encrypt(String passwd, int flags) throws com.sleepycat.db.DatabaseException { db_javaJNI.Db_set_encrypt(swigCPtr, passwd, flags); }
/db-4.5.20/java/src/com/sleepycat/db/internal/db_javaJNI.java:86: public final static native int Db_get_encrypt_flags(long jarg1) throws com.sleepycat.db.DatabaseException;
/db-4.5.20/java/src/com/sleepycat/db/internal/db_javaJNI.java:114: public final static native void Db_set_encrypt(long jarg1, String jarg2, int jarg3) throws com.sleepycat.db.DatabaseException;
/db-4.5.20/java/src/com/sleepycat/db/internal/db_javaJNI.java:148: public final static native int DbEnv_get_encrypt_flags(long jarg1) throws com.sleepycat.db.DatabaseException;
/db-4.5.20/java/src/com/sleepycat/db/internal/db_javaJNI.java:162: public final static native void DbEnv_set_encrypt(long jarg1, String jarg2, int jarg3) throws com.sleepycat.db.DatabaseException;
/db-4.5.20/java/src/com/sleepycat/db/internal/DbEnv.java:240: public int get_encrypt_flags() throws com.sleepycat.db.DatabaseException { return db_javaJNI.DbEnv_get_encrypt_flags(swigCPtr); }
/db-4.5.20/java/src/com/sleepycat/db/internal/DbEnv.java:272: public void set_encrypt(String passwd, int flags) throws com.sleepycat.db.DatabaseException { db_javaJNI.DbEnv_set_encrypt(swigCPtr, passwd, flags); }
/db-4.5.20/java/src/com/sleepycat/db/EnvironmentConfig.java:1138: dbenv.set_encrypt(password, DbConstants.DB_ENCRYPT_AES);
/db-4.5.20/java/src/com/sleepycat/db/EnvironmentConfig.java:1303: password = (dbenv.get_encrypt_flags() == 0) ? null : "";
/db-4.5.20/java/src/com/sleepycat/db/Environment.java:392: dbenv.fileid_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0);
/db-4.5.20/java/src/com/sleepycat/db/Environment.java:398: dbenv.lsn_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0);
/db-4.5.20/java/src/com/sleepycat/db/DatabaseConfig.java:528: dbFlags |= (password != null) ? DbConstants.DB_ENCRYPT : 0;
/db-4.5.20/java/src/com/sleepycat/db/DatabaseConfig.java:553: db.set_encrypt(password, DbConstants.DB_ENCRYPT_AES);
/db-4.5.20/java/src/com/sleepycat/db/DatabaseConfig.java:628: password = ((dbFlags & DbConstants.DB_ENCRYPT) != 0) ? "" : null;
/db-4.5.20/tcl/tcl_db_pkg.c:508: ENV_ENCRYPT_AES,
/db-4.5.20/tcl/tcl_db_pkg.c:509: ENV_ENCRYPT_ANY,
/db-4.5.20/tcl/tcl_db_pkg.c:1091: case ENV_ENCRYPT_AES:
/db-4.5.20/tcl/tcl_db_pkg.c:1101: ret = (*env)->set_encrypt(*env, passwd, DB_ENCRYPT_AES);
/db-4.5.20/tcl/tcl_db_pkg.c:1103: "set_encrypt");
/db-4.5.20/tcl/tcl_db_pkg.c:1105: case ENV_ENCRYPT_ANY:
/db-4.5.20/tcl/tcl_db_pkg.c:1115: ret = (*env)->set_encrypt(*env, passwd, 0);
/db-4.5.20/tcl/tcl_db_pkg.c:1117: "set_encrypt");
/db-4.5.20/tcl/tcl_db_pkg.c:1400: "-encrypt",
/db-4.5.20/tcl/tcl_db_pkg.c:1453: TCL_DB_ENCRYPT,
/db-4.5.20/tcl/tcl_db_pkg.c:1454: TCL_DB_ENCRYPT_AES,
/db-4.5.20/tcl/tcl_db_pkg.c:1455: TCL_DB_ENCRYPT_ANY,
/db-4.5.20/tcl/tcl_db_pkg.c:1835: case TCL_DB_ENCRYPT:
/db-4.5.20/tcl/tcl_db_pkg.c:1836: set_flags |= DB_ENCRYPT;
/db-4.5.20/tcl/tcl_db_pkg.c:1838: case TCL_DB_ENCRYPT_AES:
/db-4.5.20/tcl/tcl_db_pkg.c:1848: ret = (*dbp)->set_encrypt(*dbp, passwd, DB_ENCRYPT_AES);
/db-4.5.20/tcl/tcl_db_pkg.c:1850: "set_encrypt");
/db-4.5.20/tcl/tcl_db_pkg.c:1852: case TCL_DB_ENCRYPT_ANY:
/db-4.5.20/tcl/tcl_db_pkg.c:1862: ret = (*dbp)->set_encrypt(*dbp, passwd, 0);
/db-4.5.20/tcl/tcl_db_pkg.c:1864: "set_encrypt");
/db-4.5.20/tcl/tcl_db_pkg.c:2433: "-encrypt",
/db-4.5.20/tcl/tcl_db_pkg.c:2443: TCL_DBREM_ENCRYPT,
/db-4.5.20/tcl/tcl_db_pkg.c:2444: TCL_DBREM_ENCRYPT_AES,
/db-4.5.20/tcl/tcl_db_pkg.c:2445: TCL_DBREM_ENCRYPT_ANY,
/db-4.5.20/tcl/tcl_db_pkg.c:2495: case TCL_DBREM_ENCRYPT:
/db-4.5.20/tcl/tcl_db_pkg.c:2496: set_flags |= DB_ENCRYPT;
/db-4.5.20/tcl/tcl_db_pkg.c:2499: case TCL_DBREM_ENCRYPT_AES:
/db-4.5.20/tcl/tcl_db_pkg.c:2508: enc_flag = DB_ENCRYPT_AES;
/db-4.5.20/tcl/tcl_db_pkg.c:2510: case TCL_DBREM_ENCRYPT_ANY:
/db-4.5.20/tcl/tcl_db_pkg.c:2599: ret = dbp->set_encrypt(dbp, passwd, enc_flag);
/db-4.5.20/tcl/tcl_db_pkg.c:2601: "set_encrypt");
/db-4.5.20/tcl/tcl_db_pkg.c:2641: "-encrypt",
/db-4.5.20/tcl/tcl_db_pkg.c:2651: TCL_DBMV_ENCRYPT,
/db-4.5.20/tcl/tcl_db_pkg.c:2652: TCL_DBMV_ENCRYPT_AES,
/db-4.5.20/tcl/tcl_db_pkg.c:2653: TCL_DBMV_ENCRYPT_ANY,
/db-4.5.20/tcl/tcl_db_pkg.c:2704: case TCL_DBMV_ENCRYPT:
/db-4.5.20/tcl/tcl_db_pkg.c:2705: set_flags |= DB_ENCRYPT;
/db-4.5.20/tcl/tcl_db_pkg.c:2708: case TCL_DBMV_ENCRYPT_AES:
/db-4.5.20/tcl/tcl_db_pkg.c:2717: enc_flag = DB_ENCRYPT_AES;
/db-4.5.20/tcl/tcl_db_pkg.c:2719: case TCL_DBMV_ENCRYPT_ANY:
/db-4.5.20/tcl/tcl_db_pkg.c:2819: ret = dbp->set_encrypt(dbp, passwd, enc_flag);
/db-4.5.20/tcl/tcl_db_pkg.c:2821: "set_encrypt");
/db-4.5.20/tcl/tcl_db_pkg.c:2862: "-encrypt",
/db-4.5.20/tcl/tcl_db_pkg.c:2873: TCL_DBVRFY_ENCRYPT,
/db-4.5.20/tcl/tcl_db_pkg.c:2874: TCL_DBVRFY_ENCRYPT_AES,
/db-4.5.20/tcl/tcl_db_pkg.c:2875: TCL_DBVRFY_ENCRYPT_ANY,
/db-4.5.20/tcl/tcl_db_pkg.c:2921: case TCL_DBVRFY_ENCRYPT:
/db-4.5.20/tcl/tcl_db_pkg.c:2922: set_flags |= DB_ENCRYPT;
/db-4.5.20/tcl/tcl_db_pkg.c:2925: case TCL_DBVRFY_ENCRYPT_AES:
/db-4.5.20/tcl/tcl_db_pkg.c:2934: enc_flag = DB_ENCRYPT_AES;
/db-4.5.20/tcl/tcl_db_pkg.c:2936: case TCL_DBVRFY_ENCRYPT_ANY:
/db-4.5.20/tcl/tcl_db_pkg.c:3033: ret = dbp->set_encrypt(dbp, passwd, enc_flag);
/db-4.5.20/tcl/tcl_db_pkg.c:3035: "set_encrypt");
/db-4.5.20/tcl/tcl_env.c:102: "get_encrypt_flags",
/db-4.5.20/tcl/tcl_env.c:885: ENVREM_ENCRYPT_AES,
/db-4.5.20/tcl/tcl_env.c:886: ENVREM_ENCRYPT_ANY,
/db-4.5.20/tcl/tcl_env.c:934: case ENVREM_ENCRYPT_AES:
/db-4.5.20/tcl/tcl_env.c:943: enc_flag = DB_ENCRYPT_AES;
/db-4.5.20/tcl/tcl_env.c:945: case ENVREM_ENCRYPT_ANY:
/db-4.5.20/tcl/tcl_env.c:1059: ret = e->set_encrypt(e, passwd, enc_flag);
/db-4.5.20/tcl/tcl_env.c:1061: "set_encrypt");
/db-4.5.20/tcl/tcl_env.c:1168: "-encrypt",
/db-4.5.20/tcl/tcl_env.c:1183: Tcl_WrongNumArgs(interp, 2, objv, "?-encrypt? filename");
/db-4.5.20/tcl/tcl_env.c:1194: flags |= DB_ENCRYPT;
/db-4.5.20/tcl/tcl_env.c:1220: "-encrypt",
/db-4.5.20/tcl/tcl_env.c:1235: Tcl_WrongNumArgs(interp, 2, objv, "?-encrypt? filename");
/db-4.5.20/tcl/tcl_env.c:1247: flags |= DB_ENCRYPT;
/db-4.5.20/tcl/tcl_env.c:2148: * Implements the ENV->get_encrypt_flags command.
/db-4.5.20/tcl/tcl_env.c:2165: } encrypt_flags[] = {
/db-4.5.20/tcl/tcl_env.c:2166: { DB_ENCRYPT_AES, "-encryptaes" },
/db-4.5.20/tcl/tcl_env.c:2175: ret = dbenv->get_encrypt_flags(dbenv, &flags);
/db-4.5.20/tcl/tcl_env.c:2177: "env get_encrypt_flags")) == TCL_OK) {
/db-4.5.20/tcl/tcl_env.c:2180: for (i = 0; encrypt_flags[i].flag != 0; i++)
/db-4.5.20/tcl/tcl_env.c:2181: if (LF_ISSET(encrypt_flags[i].flag)) {
/db-4.5.20/tcl/tcl_env.c:2185: buf, encrypt_flags[i].arg, sizeof(buf));
/db-4.5.20/tcl/tcl_db.c:114: "get_encrypt_flags",
/db-4.5.20/tcl/tcl_db.c:2527: { DB_ENCRYPT, "-encrypt" },
/db-4.5.20/libdb_java/db_java_wrap.c:1030: * Note: Different versions of the JNI disagree on the signature for
/db-4.5.20/libdb_java/db_java_wrap.c:2266:SWIGINTERN u_int32_t Db_get_encrypt_flags(struct Db *self){
/db-4.5.20/libdb_java/db_java_wrap.c:2268: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret))
/db-4.5.20/libdb_java/db_java_wrap.c:2384:SWIGINTERN db_ret_t Db_set_encrypt(struct Db *self,char const *passwd,u_int32_t flags){
/db-4.5.20/libdb_java/db_java_wrap.c:2385: return self->set_encrypt(self, passwd, flags);
/db-4.5.20/libdb_java/db_java_wrap.c:2515:SWIGINTERN u_int32_t DbEnv_get_encrypt_flags(struct DbEnv *self){
/db-4.5.20/libdb_java/db_java_wrap.c:2517: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret))
/db-4.5.20/libdb_java/db_java_wrap.c:2573:SWIGINTERN db_ret_t DbEnv_set_encrypt(struct DbEnv *self,char const *passwd,u_int32_t flags){
/db-4.5.20/libdb_java/db_java_wrap.c:2574: return self->set_encrypt(self, passwd, flags);
/db-4.5.20/libdb_java/db_java_wrap.c:3589: result = (u_int32_t)Db_get_encrypt_flags(arg1);
/db-4.5.20/libdb_java/db_java_wrap.c:4430: result = (db_ret_t)Db_set_encrypt(arg1,(char const *)arg2,arg3);
/db-4.5.20/libdb_java/db_java_wrap.c:5438: result = (u_int32_t)DbEnv_get_encrypt_flags(arg1);
/db-4.5.20/libdb_java/db_java_wrap.c:5810: result = (db_ret_t)DbEnv_set_encrypt(arg1,(char const *)arg2,arg3);
/db-4.5.20/libdb_java/README:73: which includes the method signature and a call to the method.
/db-4.5.20/libdb_java/java_util.i:900: * Note: Different versions of the JNI disagree on the signature for
/db-4.5.20/libdb_java/db.i:195: u_int32_t get_encrypt_flags() {
/db-4.5.20/libdb_java/db.i:197: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret))
/db-4.5.20/libdb_java/db.i:374: db_ret_t set_encrypt(const char *passwd, u_int32_t flags) {
/db-4.5.20/libdb_java/db.i:375: return self->set_encrypt(self, passwd, flags);
/db-4.5.20/libdb_java/db.i:634: u_int32_t get_encrypt_flags() {
/db-4.5.20/libdb_java/db.i:636: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret))
/db-4.5.20/libdb_java/db.i:719: db_ret_t set_encrypt(const char *passwd, u_int32_t flags) {
/db-4.5.20/libdb_java/db.i:720: return self->set_encrypt(self, passwd, flags);
/db-4.5.20/build_windows/db_dll.dsp:412:SOURCE=..\crypto\aes_method.c
/db-4.5.20/build_windows/db_dll.dsp:424:SOURCE=..\crypto\rijndael\rijndael-alg-fst.c
/db-4.5.20/build_windows/db_dll.dsp:428:SOURCE=..\crypto\rijndael\rijndael-api-fst.c
/db-4.5.20/build_windows/db_dll.dsp:740:SOURCE=..\hmac\hmac.c
/db-4.5.20/build_windows/db_dll.dsp:744:SOURCE=..\hmac\sha1.c
/db-4.5.20/build_windows/db.h:328: * Flags private to DB_ENV->set_encrypt.
/db-4.5.20/build_windows/db.h:330:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */
/db-4.5.20/build_windows/db.h:382:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */
/db-4.5.20/build_windows/db.h:1614: int (*get_encrypt_flags) __P((DB *, u_int32_t *));
/db-4.5.20/build_windows/db.h:1654: int (*set_encrypt) __P((DB *, const char *, u_int32_t));
/db-4.5.20/build_windows/db.h:1722:#define DB_AM_ENCRYPT 0x00000400 /* Encryption */
/db-4.5.20/build_windows/db.h:2202: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *));
/db-4.5.20/build_windows/db.h:2309: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t));
/db-4.5.20/build_windows/db_cxx.h:228: virtual int get_encrypt_flags(u_int32_t *);
/db-4.5.20/build_windows/db_cxx.h:229: virtual int set_encrypt(const char *, u_int32_t);
/db-4.5.20/build_windows/db_cxx.h:414: virtual int get_encrypt_flags(u_int32_t *);
/db-4.5.20/build_windows/db_cxx.h:418: virtual int set_encrypt(const char *, u_int32_t);
/db-4.5.20/build_windows/db_static.dsp:367:SOURCE=..\crypto\aes_method.c
/db-4.5.20/build_windows/db_static.dsp:379:SOURCE=..\crypto\rijndael\rijndael-alg-fst.c
/db-4.5.20/build_windows/db_static.dsp:383:SOURCE=..\crypto\rijndael\rijndael-api-fst.c
/db-4.5.20/build_windows/db_static.dsp:695:SOURCE=..\hmac\hmac.c
/db-4.5.20/build_windows/db_static.dsp:699:SOURCE=..\hmac\sha1.c
/db-4.5.20/build_windows/db_small.dsp:607:SOURCE=..\hmac\hmac.c
/db-4.5.20/build_windows/db_small.dsp:611:SOURCE=..\hmac\sha1.c
/db-4.5.20/examples_cxx/getting_started/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce
/db-4.5.20/examples_cxx/getting_started/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh
/db-4.5.20/examples_cxx/getting_started/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine
/db-4.5.20/dbinc/db_cxx.in:227: virtual int get_encrypt_flags(u_int32_t *);
/db-4.5.20/dbinc/db_cxx.in:228: virtual int set_encrypt(const char *, u_int32_t);
/db-4.5.20/dbinc/db_cxx.in:413: virtual int get_encrypt_flags(u_int32_t *);
/db-4.5.20/dbinc/db_cxx.in:417: virtual int set_encrypt(const char *, u_int32_t);
/db-4.5.20/dbinc/hmac.h:7: * $Id: hmac.h,v 12.4 2006/08/24 14:45:29 bostic Exp $
/db-4.5.20/dbinc/hmac.h:10:#ifndef _DB_HMAC_H_
/db-4.5.20/dbinc/hmac.h:11:#define _DB_HMAC_H_
/db-4.5.20/dbinc/hmac.h:21: * SHA1 checksumming
/db-4.5.20/dbinc/hmac.h:27:} SHA1_CTX;
/db-4.5.20/dbinc/hmac.h:30: * AES assumes the SHA1 checksumming (also called MAC)
/db-4.5.20/dbinc/hmac.h:39:#include "dbinc_auto/hmac_ext.h"
/db-4.5.20/dbinc/hmac.h:40:#endif /* !_DB_HMAC_H_ */
/db-4.5.20/dbinc/db_page.h:76: u_int8_t encrypt_alg; /* 24: Encryption algorithm. */
/db-4.5.20/dbinc/db_page.h:257: * DB_AM_ENCRYPT always implies DB_AM_CHKSUM so that must come first.
/db-4.5.20/dbinc/db_page.h:261: (F_ISSET((dbp), DB_AM_ENCRYPT) ? sizeof(PG_CRYPTO) : \
/db-4.5.20/dbinc/db_page.h:265: (F_ISSET((dbp), DB_AM_ENCRYPT) ? ((u_int8_t *)(pg) + \
/db-4.5.20/dbinc/db_page.h:270: (F_ISSET((dbp), DB_AM_ENCRYPT) ? ((u_int8_t *)(pg) + \
/db-4.5.20/dbinc/db_page.h:310: (F_ISSET((dbp), DB_AM_ENCRYPT) ? QPAGE_SEC : \
/db-4.5.20/dbinc/db.in:303: * Flags private to DB_ENV->set_encrypt.
/db-4.5.20/dbinc/db.in:305:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */
/db-4.5.20/dbinc/db.in:357:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */
/db-4.5.20/dbinc/db.in:1589: int (*get_encrypt_flags) __P((DB *, u_int32_t *));
/db-4.5.20/dbinc/db.in:1629: int (*set_encrypt) __P((DB *, const char *, u_int32_t));
/db-4.5.20/dbinc/db.in:1697:#define DB_AM_ENCRYPT 0x00000400 /* Encryption */
/db-4.5.20/dbinc/db.in:2177: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *));
/db-4.5.20/dbinc/db.in:2284: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t));
/db-4.5.20/dbinc/crypto.h:42: int (*decrypt) __P((DB_ENV *, void *, void *, u_int8_t *, size_t));
/db-4.5.20/dbinc/crypto.h:43: int (*encrypt) __P((DB_ENV *, void *, void *, u_int8_t *, size_t));
/db-4.5.20/dbinc/crypto.h:49:#define CIPHER_AES 1 /* AES algorithm */
/db-4.5.20/dbinc/crypto.h:59:#include "crypto/rijndael/rijndael-api-fst.h"
/db-4.5.20/dbinc/crypto.h:71:#define DB_AES_KEYLEN 128 /* AES key length */
/db-4.5.20/dbinc/crypto.h:72:#define DB_AES_CHUNK 16 /* AES byte unit size */
/db-4.5.20/dbinc/crypto.h:74:typedef struct __aes_cipher {
/db-4.5.20/dbinc/crypto.h:75: keyInstance decrypt_ki; /* Decryption key instance */
/db-4.5.20/dbinc/crypto.h:76: keyInstance encrypt_ki; /* Encryption key instance */
/db-4.5.20/dbinc/crypto.h:77: u_int32_t flags; /* AES-specific flags */
/db-4.5.20/dbinc/crypto.h:78:} AES_CIPHER;
/db-4.5.20/crypto/aes_method.c:10: * $Id: aes_method.c,v 12.5 2006/08/24 14:45:12 bostic Exp $
/db-4.5.20/crypto/aes_method.c:17:#include "dbinc/hmac.h"
/db-4.5.20/crypto/aes_method.c:19:static void __aes_err __P((DB_ENV *, int));
/db-4.5.20/crypto/aes_method.c:20:static int __aes_derivekeys __P((DB_ENV *, DB_CIPHER *, u_int8_t *, size_t));
/db-4.5.20/crypto/aes_method.c:23: * __aes_setup --
/db-4.5.20/crypto/aes_method.c:24: * Setup AES functions.
/db-4.5.20/crypto/aes_method.c:26: * PUBLIC: int __aes_setup __P((DB_ENV *, DB_CIPHER *));
/db-4.5.20/crypto/aes_method.c:29:__aes_setup(dbenv, db_cipher)
/db-4.5.20/crypto/aes_method.c:33: AES_CIPHER *aes_cipher;
/db-4.5.20/crypto/aes_method.c:36: db_cipher->adj_size = __aes_adj_size;
/db-4.5.20/crypto/aes_method.c:37: db_cipher->close = __aes_close;
/db-4.5.20/crypto/aes_method.c:38: db_cipher->decrypt = __aes_decrypt;
/db-4.5.20/crypto/aes_method.c:39: db_cipher->encrypt = __aes_encrypt;
/db-4.5.20/crypto/aes_method.c:40: db_cipher->init = __aes_init;
/db-4.5.20/crypto/aes_method.c:41: if ((ret = __os_calloc(dbenv, 1, sizeof(AES_CIPHER), &aes_cipher)) != 0)
/db-4.5.20/crypto/aes_method.c:43: db_cipher->data = aes_cipher;
/db-4.5.20/crypto/aes_method.c:48: * __aes_adj_size --
/db-4.5.20/crypto/aes_method.c:52: * PUBLIC: u_int __aes_adj_size __P((size_t));
/db-4.5.20/crypto/aes_method.c:55:__aes_adj_size(len)
/db-4.5.20/crypto/aes_method.c:58: if (len % DB_AES_CHUNK == 0)
/db-4.5.20/crypto/aes_method.c:60: return (DB_AES_CHUNK - (u_int)(len % DB_AES_CHUNK));
/db-4.5.20/crypto/aes_method.c:64: * __aes_close --
/db-4.5.20/crypto/aes_method.c:65: * Destroy the AES encryption instantiation.
/db-4.5.20/crypto/aes_method.c:67: * PUBLIC: int __aes_close __P((DB_ENV *, void *));
/db-4.5.20/crypto/aes_method.c:70:__aes_close(dbenv, data)
/db-4.5.20/crypto/aes_method.c:79: * __aes_decrypt --
/db-4.5.20/crypto/aes_method.c:80: * Decrypt data with AES.
/db-4.5.20/crypto/aes_method.c:82: * PUBLIC: int __aes_decrypt __P((DB_ENV *, void *, void *,
/db-4.5.20/crypto/aes_method.c:86:__aes_decrypt(dbenv, aes_data, iv, cipher, cipher_len)
/db-4.5.20/crypto/aes_method.c:88: void *aes_data;
/db-4.5.20/crypto/aes_method.c:93: AES_CIPHER *aes;
/db-4.5.20/crypto/aes_method.c:97: aes = (AES_CIPHER *)aes_data;
/db-4.5.20/crypto/aes_method.c:100: if ((cipher_len % DB_AES_CHUNK) != 0)
/db-4.5.20/crypto/aes_method.c:105: if ((ret = __db_cipherInit(&c, MODE_CBC, iv)) < 0) {
/db-4.5.20/crypto/aes_method.c:106: __aes_err(dbenv, ret);
/db-4.5.20/crypto/aes_method.c:111: if ((ret = __db_blockDecrypt(&c, &aes->decrypt_ki, cipher,
/db-4.5.20/crypto/aes_method.c:113: __aes_err(dbenv, ret);
/db-4.5.20/crypto/aes_method.c:120: * __aes_encrypt --
/db-4.5.20/crypto/aes_method.c:121: * Encrypt data with AES.
/db-4.5.20/crypto/aes_method.c:123: * PUBLIC: int __aes_encrypt __P((DB_ENV *, void *, void *,
/db-4.5.20/crypto/aes_method.c:127:__aes_encrypt(dbenv, aes_data, iv, data, data_len)
/db-4.5.20/crypto/aes_method.c:129: void *aes_data;
/db-4.5.20/crypto/aes_method.c:134: AES_CIPHER *aes;
/db-4.5.20/crypto/aes_method.c:139: aes = (AES_CIPHER *)aes_data;
/db-4.5.20/crypto/aes_method.c:140: if (aes == NULL || data == NULL)
/db-4.5.20/crypto/aes_method.c:142: if ((data_len % DB_AES_CHUNK) != 0)
/db-4.5.20/crypto/aes_method.c:159: if ((ret = __db_cipherInit(&c, MODE_CBC, (char *)tmp_iv)) < 0) {
/db-4.5.20/crypto/aes_method.c:160: __aes_err(dbenv, ret);
/db-4.5.20/crypto/aes_method.c:165: if ((ret = __db_blockEncrypt(&c, &aes->encrypt_ki, data, data_len * 8,
/db-4.5.20/crypto/aes_method.c:167: __aes_err(dbenv, ret);
/db-4.5.20/crypto/aes_method.c:175: * __aes_init --
/db-4.5.20/crypto/aes_method.c:176: * Initialize the AES encryption instantiation.
/db-4.5.20/crypto/aes_method.c:178: * PUBLIC: int __aes_init __P((DB_ENV *, DB_CIPHER *));
/db-4.5.20/crypto/aes_method.c:181:__aes_init(dbenv, db_cipher)
/db-4.5.20/crypto/aes_method.c:185: return (__aes_derivekeys(dbenv, db_cipher, (u_int8_t *)dbenv->passwd,
/db-4.5.20/crypto/aes_method.c:190:__aes_derivekeys(dbenv, db_cipher, passwd, plen)
/db-4.5.20/crypto/aes_method.c:196: SHA1_CTX ctx;
/db-4.5.20/crypto/aes_method.c:197: AES_CIPHER *aes;
/db-4.5.20/crypto/aes_method.c:204: aes = (AES_CIPHER *)db_cipher->data;
/db-4.5.20/crypto/aes_method.c:213: if ((ret = __db_makeKey(&aes->encrypt_ki, DIR_ENCRYPT,
/db-4.5.20/crypto/aes_method.c:214: DB_AES_KEYLEN, (char *)temp)) != TRUE) {
/db-4.5.20/crypto/aes_method.c:215: __aes_err(dbenv, ret);
/db-4.5.20/crypto/aes_method.c:218: if ((ret = __db_makeKey(&aes->decrypt_ki, DIR_DECRYPT,
/db-4.5.20/crypto/aes_method.c:219: DB_AES_KEYLEN, (char *)temp)) != TRUE) {
/db-4.5.20/crypto/aes_method.c:220: __aes_err(dbenv, ret);
/db-4.5.20/crypto/aes_method.c:227: * __aes_err --
/db-4.5.20/crypto/aes_method.c:228: * Handle AES-specific errors. Codes and messages derived from
/db-4.5.20/crypto/aes_method.c:229: * rijndael/rijndael-api-fst.h.
/db-4.5.20/crypto/aes_method.c:232:__aes_err(dbenv, err)
/db-4.5.20/crypto/aes_method.c:240: errstr = "AES key direction is invalid";
/db-4.5.20/crypto/aes_method.c:243: errstr = "AES key material not of correct length";
/db-4.5.20/crypto/aes_method.c:246: errstr = "AES key passwd not valid";
/db-4.5.20/crypto/aes_method.c:249: errstr = "AES cipher in wrong state (not initialized)";
/db-4.5.20/crypto/aes_method.c:252: errstr = "AES bad block length";
/db-4.5.20/crypto/aes_method.c:255: errstr = "AES cipher instance is invalid";
/db-4.5.20/crypto/aes_method.c:258: errstr = "AES data contents are invalid";
/db-4.5.20/crypto/aes_method.c:261: errstr = "AES unknown error";
/db-4.5.20/crypto/aes_method.c:264: errstr = "AES error unrecognized";
/db-4.5.20/crypto/crypto.c:190: case CIPHER_AES:
/db-4.5.20/crypto/crypto.c:191: db_cipher->alg = CIPHER_AES;
/db-4.5.20/crypto/crypto.c:192: ret = __aes_setup(dbenv, db_cipher);
/db-4.5.20/crypto/crypto.c:204: * __crypto_decrypt_meta --
/db-4.5.20/crypto/crypto.c:207: * PUBLIC: int __crypto_decrypt_meta __P((DB_ENV *, DB *, u_int8_t *, int));
/db-4.5.20/crypto/crypto.c:210:__crypto_decrypt_meta(dbenv, dbp, mbuf, do_metachk)
/db-4.5.20/crypto/crypto.c:224: * If we weren't given a dbp, we just want to decrypt the page on
/db-4.5.20/crypto/crypto.c:259: * non-zero IV (that is written after encryption) then we decrypt (or
/db-4.5.20/crypto/crypto.c:265: * algorithms we know about attempting to decrypt (and possibly
/db-4.5.20/crypto/crypto.c:272: if (meta->encrypt_alg != 0) {
/db-4.5.20/crypto/crypto.c:274: if (!F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.5.20/crypto/crypto.c:286: F_SET(dbp, DB_AM_ENCRYPT|DB_AM_CHKSUM);
/db-4.5.20/crypto/crypto.c:289: * This was checked in set_flags when DB_AM_ENCRYPT was set.
/db-4.5.20/crypto/crypto.c:294: meta->encrypt_alg != db_cipher->alg) {
/db-4.5.20/crypto/crypto.c:302: * For ALL pages, we do not encrypt the beginning of the page
/db-4.5.20/crypto/crypto.c:313: if (do_metachk && (ret = db_cipher->decrypt(dbenv,
/db-4.5.20/crypto/crypto.c:334: ret = __crypto_algsetup(dbenv, db_cipher, meta->encrypt_alg, 1);
/db-4.5.20/crypto/crypto.c:336: } else if (F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.5.20/crypto/crypto.c:389: return (__env_set_encrypt(dbenv_dest, sh_passwd, DB_ENCRYPT_AES));
/db-4.5.20/crypto/mersenne/mt19937db.c:8:#include "dbinc/hmac.h"
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:2: * rijndael-api-fst.c
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:6: * Optimised ANSI C code for the Rijndael cipher (now AES)
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:42:#include "crypto/rijndael/rijndael-alg-fst.h"
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:43:#include "crypto/rijndael/rijndael-api-fst.h"
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:63: if ((direction == DIR_ENCRYPT) || (direction == DIR_DECRYPT)) {
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:79: if (direction == DIR_ENCRYPT) {
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:99: if ((mode == MODE_ECB) || (mode == MODE_CBC) || (mode == MODE_CFB1)) {
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:130: key->direction == DIR_DECRYPT) {
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:148: case MODE_CBC:
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:188: * Encrypt data partitioned in octets, using RFC 2040-like padding.
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:216: key->direction == DIR_DECRYPT) {
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:239: case MODE_CBC:
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:290: (cipher->mode != MODE_CFB1 && key->direction == DIR_ENCRYPT)) {
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:308: case MODE_CBC:
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:367: key->direction == DIR_ENCRYPT) {
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:401: case MODE_CBC:
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:475: case DIR_ENCRYPT:
/db-4.5.20/crypto/rijndael/rijndael-api-fst.c:479: case DIR_DECRYPT:
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:2: * $Id: rijndael-api-fst.h,v 12.0 2004/11/17 03:43:17 bostic Exp $
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:5: * rijndael-api-fst.h
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:9: * Optimised ANSI C code for the Rijndael cipher (now AES)
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:41:#ifndef __RIJNDAEL_API_FST_H
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:42:#define __RIJNDAEL_API_FST_H
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:44:#include "crypto/rijndael/rijndael-alg-fst.h"
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:47:#define DIR_ENCRYPT 0 /* Are we encrpyting? */
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:48:#define DIR_DECRYPT 1 /* Are we decrpyting? */
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:50:#define MODE_CBC 2 /* Are we ciphering in CBC mode? */
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:87: u_int8_t mode; /* MODE_ECB, MODE_CBC, or MODE_CFB1 */
/db-4.5.20/crypto/rijndael/rijndael-api-fst.h:91:#endif /* __RIJNDAEL_API_FST_H */
/db-4.5.20/crypto/rijndael/rijndael-alg-fst.c:2: * rijndael-alg-fst.c
/db-4.5.20/crypto/rijndael/rijndael-alg-fst.c:6: * Optimised ANSI C code for the Rijndael cipher (now AES)
/db-4.5.20/crypto/rijndael/rijndael-alg-fst.c:31:#include "crypto/rijndael/rijndael-alg-fst.h"
/db-4.5.20/crypto/rijndael/rijndael-alg-fst.c:712: 0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
/db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:2: * $Id: rijndael-alg-fst.h,v 12.1 2006/09/08 20:32:03 bostic Exp $
/db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:5: * rijndael-alg-fst.h
/db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:9: * Optimised ANSI C code for the Rijndael cipher (now AES)
/db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:29:#ifndef __RIJNDAEL_ALG_FST_H
/db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:30:#define __RIJNDAEL_ALG_FST_H
/db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:40:#endif /* __RIJNDAEL_ALG_FST_H */
/db-4.5.20/crypto/crypto.html:59:a single environment method: DBENV->set_encrypt().
/db-4.5.20/crypto/crypto.html:61:by adding a new database method: DB->set_encrypt().
/db-4.5.20/crypto/crypto.html:62: Both of the set_encrypt methods must be called before their respective
/db-4.5.20/crypto/crypto.html:68: DBENV->set_encrypt(DBENV *dbenv, /* DB_ENV structure */
/db-4.5.20/crypto/crypto.html:72:DB->set_encrypt(DB *dbp, /* DB structure */
/db-4.5.20/crypto/crypto.html:76:#define DB_ENCRYPT_AES 0x00000001 /* Use the AES encryption algorithm */
/db-4.5.20/crypto/crypto.html:86:Using DB_ENCRYPT_AES automatically implies SHA1 checksumming.
/db-4.5.20/crypto/crypto.html:91:DB->set_encrypt
/db-4.5.20/crypto/crypto.html:109:our set_encrypt method to be the RPC or local version. Therefore
/db-4.5.20/crypto/crypto.html:117: int (*encrypt)__P((...)); /* Alg-specific encryption algorithm */
/db-4.5.20/crypto/crypto.html:118: int (*decrypt)__P((...)); /* Alg-specific decryption function */
/db-4.5.20/crypto/crypto.html:119: void *data; /* Pointer to alg-specific information (AES_CIPHER) */
/db-4.5.20/crypto/crypto.html:124:typedef struct __aes_cipher {
/db-4.5.20/crypto/crypto.html:125: keyInstance encrypt_ki; /* Encrypt keyInstance temp. */
/db-4.5.20/crypto/crypto.html:126: keyInstance decrypt_ki; /* Decrypt keyInstance temp. */
/db-4.5.20/crypto/crypto.html:128: u_int32_t flags; /* AES-specific flags */
/db-4.5.20/crypto/crypto.html:129:} AES_CIPHER;
/db-4.5.20/crypto/crypto.html:133:During dbenv->set_encrypt,
/db-4.5.20/crypto/crypto.html:137:other subsystems. For now, only AES ciphering functions and SHA1
/db-4.5.20/crypto/crypto.html:160:we will call __aes_init. Additionally this function will allocate
/db-4.5.20/crypto/crypto.html:164: In the AES-specific initialization function, __aes_init,
/db-4.5.20/crypto/crypto.html:166:__aes_derivekeys in order to fill
/db-4.5.20/crypto/crypto.html:173:During db->set_encrypt,
/db-4.5.20/crypto/crypto.html:193:meta-page. In __db_pgin, we will decrypt if the page we have
/db-4.5.20/crypto/crypto.html:220: __aes_derivekeys(DB_ENV *dbenv, /* dbenv */
/db-4.5.20/crypto/crypto.html:224: keyInstance *encrypt_key, /* Encryption key of passwd */
/db-4.5.20/crypto/crypto.html:225: keyInstance *decrypt_key); /* Decryption key of passwd */
/db-4.5.20/crypto/crypto.html:231:already be allocated. These will be stored in the AES_CIPHER structure.
/db-4.5.20/crypto/crypto.html:239:the 20-byte key set up in __aes_derivekeys. If they just want
/db-4.5.20/crypto/crypto.html:254:__aes_encrypt(DB_ENV *dbenv, /* dbenv */
/db-4.5.20/crypto/crypto.html:257: u_int8_t *data, /* Data to encrypt */
/db-4.5.20/crypto/crypto.html:258: size_t data_len); /* Length of data to encrypt - 16 byte multiple */
/db-4.5.20/crypto/crypto.html:259:This is the function to encrypt data. It will be called to encrypt
/db-4.5.20/crypto/crypto.html:261:__aes_derivekeys.
/db-4.5.20/crypto/crypto.html:264:in a pointer to the data to encrypt and its length in data_len.
/db-4.5.20/crypto/crypto.html:268:__aes_decrypt(DB_ENV *dbenv, /* dbenv */
/db-4.5.20/crypto/crypto.html:271: u_int8_t *data, /* Data to decrypt */
/db-4.5.20/crypto/crypto.html:272: size_t data_len); /* Length of data to decrypt - 16 byte multiple */
/db-4.5.20/crypto/crypto.html:273:This is the function to decrypt the data. It is exactly the same
/db-4.5.20/crypto/crypto.html:280:bytes every time we encrypt any data with the same password. For
/db-4.5.20/crypto/crypto.html:287:generator with the time (tv_sec) hashed through SHA1 when we create the
/db-4.5.20/crypto/crypto.html:300:to the MT code will come while encrypting some data in __aes_encrypt.
/db-4.5.20/crypto/crypto.html:332:We will encrypt after the method-specific function on page-out and decrypt
/db-4.5.20/crypto/crypto.html:345:our first index is based on whether we have DB_AM_CHKSUM and DB_AM_ENCRYPT
/db-4.5.20/crypto/crypto.html:349:as some space to get proper alignment to encrypt on a 16-byte boundary.
/db-4.5.20/crypto/crypto.html:368:to encrypt to all zero's. If we read a hole in a file, we do not
/db-4.5.20/crypto/crypto.html:399:to encrypt the DBT we send down. The __log_put function is
/db-4.5.20/crypto/crypto.html:405:new __log_put will encrypt if needed and then call __log_put_internal
/db-4.5.20/crypto/crypto.html:410:will need to encrypt.
/db-4.5.20/crypto/crypto.html:465:to be sent to the clients decrypted and the clients will have to encrypt
/db-4.5.20/crypto/crypto.html:469:to the client. Therefore, the client has no way to decrypt a log
/db-4.5.20/crypto/crypto.html:474:On the master side we must copy the DBT sent in. We encrypt the
/db-4.5.20/crypto/crypto.html:496:calls to the __aes_derivekeys function with the same password yields
/db-4.5.20/db_stat/db_stat.c:260: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/txn/txn.c:45:#include "dbinc/hmac.h"
/db-4.5.20/txn/txn.c:1566: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data,
/db-4.5.20/txn/txn.c:1578: (ret = db_cipher->encrypt(dbenv,
/db-4.5.20/db_checkpoint/db_checkpoint.c:135: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/db_checkpoint/db_checkpoint.c:136: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/rpc_server/c/gen_db_server.c:106:__env_get_encrypt_flags_reply *
/db-4.5.20/rpc_server/c/gen_db_server.c:107:__db_env_get_encrypt_flags_4005__SVCSUFFIX__(msg, req)
/db-4.5.20/rpc_server/c/gen_db_server.c:108: __env_get_encrypt_flags_msg *msg;
/db-4.5.20/rpc_server/c/gen_db_server.c:111: static __env_get_encrypt_flags_reply reply; /* must be static */
/db-4.5.20/rpc_server/c/gen_db_server.c:114: __env_get_encrypt_flags_proc(msg->dbenvcl_id,
/db-4.5.20/rpc_server/c/gen_db_server.c:212:__env_set_encrypt_reply *
/db-4.5.20/rpc_server/c/gen_db_server.c:213:__db_env_set_encrypt_4005__SVCSUFFIX__(msg, req)
/db-4.5.20/rpc_server/c/gen_db_server.c:214: __env_set_encrypt_msg *msg;
/db-4.5.20/rpc_server/c/gen_db_server.c:217: static __env_set_encrypt_reply reply; /* must be static */
/db-4.5.20/rpc_server/c/gen_db_server.c:220: __env_set_encrypt_proc(msg->dbenvcl_id,
/db-4.5.20/rpc_server/c/gen_db_server.c:435:__db_get_encrypt_flags_reply *
/db-4.5.20/rpc_server/c/gen_db_server.c:436:__db_db_get_encrypt_flags_4005__SVCSUFFIX__(msg, req)
/db-4.5.20/rpc_server/c/gen_db_server.c:437: __db_get_encrypt_flags_msg *msg;
/db-4.5.20/rpc_server/c/gen_db_server.c:440: static __db_get_encrypt_flags_reply reply; /* must be static */
/db-4.5.20/rpc_server/c/gen_db_server.c:443: __db_get_encrypt_flags_proc(msg->dbpcl_id,
/db-4.5.20/rpc_server/c/gen_db_server.c:778:__db_set_encrypt_reply *
/db-4.5.20/rpc_server/c/gen_db_server.c:779:__db_db_set_encrypt_4005__SVCSUFFIX__(msg, req)
/db-4.5.20/rpc_server/c/gen_db_server.c:780: __db_set_encrypt_msg *msg;
/db-4.5.20/rpc_server/c/gen_db_server.c:783: static __db_set_encrypt_reply reply; /* must be static */
/db-4.5.20/rpc_server/c/gen_db_server.c:786: __db_set_encrypt_proc(msg->dbpcl_id,
/db-4.5.20/rpc_server/c/db_server_util.c:795: (void)dbenv->set_encrypt(dbenv, hp->passwd,
/db-4.5.20/rpc_server/c/db_server_util.c:796: DB_ENCRYPT_AES);
/db-4.5.20/rpc_server/c/db_server_proc.c:217: * PUBLIC: void __env_get_encrypt_flags_proc __P((u_int,
/db-4.5.20/rpc_server/c/db_server_proc.c:218: * PUBLIC: __env_get_encrypt_flags_reply *));
/db-4.5.20/rpc_server/c/db_server_proc.c:221:__env_get_encrypt_flags_proc(dbenvcl_id, replyp)
/db-4.5.20/rpc_server/c/db_server_proc.c:223: __env_get_encrypt_flags_reply *replyp;
/db-4.5.20/rpc_server/c/db_server_proc.c:231: replyp->status = dbenv->get_encrypt_flags(dbenv, &replyp->flags);
/db-4.5.20/rpc_server/c/db_server_proc.c:235: * PUBLIC: void __env_set_encrypt_proc __P((u_int, char *, u_int32_t,
/db-4.5.20/rpc_server/c/db_server_proc.c:236: * PUBLIC: __env_set_encrypt_reply *));
/db-4.5.20/rpc_server/c/db_server_proc.c:239:__env_set_encrypt_proc(dbenvcl_id, passwd, flags, replyp)
/db-4.5.20/rpc_server/c/db_server_proc.c:243: __env_set_encrypt_reply *replyp;
/db-4.5.20/rpc_server/c/db_server_proc.c:252: ret = dbenv->set_encrypt(dbenv, passwd, flags);
/db-4.5.20/rpc_server/c/db_server_proc.c:881: * PUBLIC: void __db_get_encrypt_flags_proc __P((u_int,
/db-4.5.20/rpc_server/c/db_server_proc.c:882: * PUBLIC: __db_get_encrypt_flags_reply *));
/db-4.5.20/rpc_server/c/db_server_proc.c:885:__db_get_encrypt_flags_proc(dbpcl_id, replyp)
/db-4.5.20/rpc_server/c/db_server_proc.c:887: __db_get_encrypt_flags_reply *replyp;
/db-4.5.20/rpc_server/c/db_server_proc.c:895: replyp->status = dbp->get_encrypt_flags(dbp, &replyp->flags);
/db-4.5.20/rpc_server/c/db_server_proc.c:899: * PUBLIC: void __db_set_encrypt_proc __P((u_int, char *, u_int32_t,
/db-4.5.20/rpc_server/c/db_server_proc.c:900: * PUBLIC: __db_set_encrypt_reply *));
/db-4.5.20/rpc_server/c/db_server_proc.c:903:__db_set_encrypt_proc(dbpcl_id, passwd, flags, replyp)
/db-4.5.20/rpc_server/c/db_server_proc.c:907: __db_set_encrypt_reply *replyp;
/db-4.5.20/rpc_server/c/db_server_proc.c:916: ret = dbp->set_encrypt(dbp, passwd, flags);
/db-4.5.20/rpc_server/db_server.x:72:struct __env_get_encrypt_flags_msg {
/db-4.5.20/rpc_server/db_server.x:76:struct __env_get_encrypt_flags_reply {
/db-4.5.20/rpc_server/db_server.x:148:struct __env_set_encrypt_msg {
/db-4.5.20/rpc_server/db_server.x:154:struct __env_set_encrypt_reply {
/db-4.5.20/rpc_server/db_server.x:301:struct __db_get_encrypt_flags_msg {
/db-4.5.20/rpc_server/db_server.x:305:struct __db_get_encrypt_flags_reply {
/db-4.5.20/rpc_server/db_server.x:546:struct __db_set_encrypt_msg {
/db-4.5.20/rpc_server/db_server.x:552:struct __db_set_encrypt_reply {
/db-4.5.20/rpc_server/db_server.x:839: __env_get_encrypt_flags_reply __DB_env_get_encrypt_flags(__env_get_encrypt_flags_msg) = 7;
/db-4.5.20/rpc_server/db_server.x:846: __env_set_encrypt_reply __DB_env_set_encrypt(__env_set_encrypt_msg) = 14;
/db-4.5.20/rpc_server/db_server.x:858: __db_get_encrypt_flags_reply __DB_db_get_encrypt_flags(__db_get_encrypt_flags_msg) = 26;
/db-4.5.20/rpc_server/db_server.x:877: __db_set_encrypt_reply __DB_db_set_encrypt(__db_set_encrypt_msg) = 45;
/db-4.5.20/rpc_server/cxx/db_server_cxxutil.cpp:724: (void)dbenv->set_encrypt(hp->passwd, DB_ENCRYPT_AES);
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:186:__env_get_encrypt_flags_proc(
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:188: __env_get_encrypt_flags_reply *replyp)
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:196: replyp->status = dbenv->get_encrypt_flags(&replyp->flags);
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:200:__env_set_encrypt_proc(
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:204: __env_set_encrypt_reply *replyp)
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:213: ret = dbenv->set_encrypt(passwd, flags);
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:754:__db_get_encrypt_flags_proc(
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:756: __db_get_encrypt_flags_reply *replyp)
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:764: replyp->status = dbp->get_encrypt_flags(&replyp->flags);
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:768:__db_set_encrypt_proc(
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:772: __db_set_encrypt_reply *replyp)
/db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:781: ret = dbp->set_encrypt(passwd, flags);
/db-4.5.20/rpc_server/rpc.src:101:BEGIN env_get_encrypt_flags CODE
/db-4.5.20/rpc_server/rpc.src:222:BEGIN env_set_encrypt CODE
/db-4.5.20/rpc_server/rpc.src:351:BEGIN db_get_encrypt_flags CODE
/db-4.5.20/rpc_server/rpc.src:474:BEGIN db_set_encrypt CODE
/db-4.5.20/db_upgrade/db_upgrade.c:113: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/db_upgrade/db_upgrade.c:114: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/db_verify/db_verify.c:122: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/examples_c/getting_started/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce
/db-4.5.20/examples_c/getting_started/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh
/db-4.5.20/examples_c/getting_started/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine
/db-4.5.20/hmac/hmac.c:10: * $Id: hmac.c,v 12.9 2006/09/09 14:28:23 bostic Exp $
/db-4.5.20/hmac/hmac.c:19:#include "dbinc/hmac.h"
/db-4.5.20/hmac/hmac.c:22:#define HMAC_OUTPUT_SIZE 20
/db-4.5.20/hmac/hmac.c:23:#define HMAC_BLOCK_SIZE 64
/db-4.5.20/hmac/hmac.c:25:static void __db_hmac __P((u_int8_t *, u_int8_t *, size_t, u_int8_t *));
/db-4.5.20/hmac/hmac.c:31: * underlying SHA1 functions will properly pad the buffer if the data length
/db-4.5.20/hmac/hmac.c:38: * __db_hmac --
/db-4.5.20/hmac/hmac.c:42:__db_hmac(k, data, data_len, mac)
/db-4.5.20/hmac/hmac.c:46: SHA1_CTX ctx;
/db-4.5.20/hmac/hmac.c:47: u_int8_t key[HMAC_BLOCK_SIZE];
/db-4.5.20/hmac/hmac.c:48: u_int8_t ipad[HMAC_BLOCK_SIZE];
/db-4.5.20/hmac/hmac.c:49: u_int8_t opad[HMAC_BLOCK_SIZE];
/db-4.5.20/hmac/hmac.c:50: u_int8_t tmp[HMAC_OUTPUT_SIZE];
/db-4.5.20/hmac/hmac.c:53: memset(key, 0x00, HMAC_BLOCK_SIZE);
/db-4.5.20/hmac/hmac.c:54: memset(ipad, 0x36, HMAC_BLOCK_SIZE);
/db-4.5.20/hmac/hmac.c:55: memset(opad, 0x5C, HMAC_BLOCK_SIZE);
/db-4.5.20/hmac/hmac.c:57: memcpy(key, k, HMAC_OUTPUT_SIZE);
/db-4.5.20/hmac/hmac.c:59: for (i = 0; i < HMAC_BLOCK_SIZE; i++) {
/db-4.5.20/hmac/hmac.c:65: __db_SHA1Update(&ctx, ipad, HMAC_BLOCK_SIZE);
/db-4.5.20/hmac/hmac.c:69: __db_SHA1Update(&ctx, opad, HMAC_BLOCK_SIZE);
/db-4.5.20/hmac/hmac.c:70: __db_SHA1Update(&ctx, tmp, HMAC_OUTPUT_SIZE);
/db-4.5.20/hmac/hmac.c:77: * Create a MAC/SHA1 checksum.
/db-4.5.20/hmac/hmac.c:118: __db_hmac(mac_key, data, data_len, store);
/db-4.5.20/hmac/hmac.c:128: * Create a MAC/SHA1 key.
/db-4.5.20/hmac/hmac.c:138: SHA1_CTX ctx;
/db-4.5.20/hmac/hmac.c:160:__db_check_chksum(dbenv, hdr, db_cipher, chksum, data, data_len, is_hmac)
/db-4.5.20/hmac/hmac.c:167: int is_hmac;
/db-4.5.20/hmac/hmac.c:179: if (is_hmac == 0) {
/db-4.5.20/hmac/hmac.c:218: __db_hmac(mac_key, data, data_len, new);
/db-4.5.20/hmac/sha1.c:2: * $Id: sha1.c,v 12.2 2006/09/08 20:32:10 bostic Exp $
/db-4.5.20/hmac/sha1.c:8:#include "dbinc/hmac.h"
/db-4.5.20/hmac/sha1.c:11:SHA-1 in C
/db-4.5.20/hmac/sha1.c:22: void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned int
/db-4.5.20/hmac/sha1.c:25: void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned
/db-4.5.20/hmac/sha1.c:95:/* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
/db-4.5.20/hmac/sha1.c:104:static void __db_SHAPrintContext __P((SHA1_CTX *, char *));
/db-4.5.20/hmac/sha1.c:107: SHA1_CTX *context;
/db-4.5.20/hmac/sha1.c:194: * PUBLIC: void __db_SHA1Init __P((SHA1_CTX *));
/db-4.5.20/hmac/sha1.c:198: SHA1_CTX *context;
/db-4.5.20/hmac/sha1.c:200: /* SHA1 initialization constants */
/db-4.5.20/hmac/sha1.c:216: * PUBLIC: void __db_SHA1Update __P((SHA1_CTX *, unsigned char *,
/db-4.5.20/hmac/sha1.c:221: SHA1_CTX *context;
/db-4.5.20/hmac/sha1.c:255: * PUBLIC: void __db_SHA1Final __P((unsigned char *, SHA1_CTX *));
/db-4.5.20/hmac/sha1.c:260: SHA1_CTX *context;
/db-4.5.20/dist/Makefile.in:195: fop_rec@o@ fop_util@o@ hash_func@o@ hmac@o@ hsearch@o@ lock@o@ \
/db-4.5.20/dist/Makefile.in:210: os_yield@o@ seq_stat@o@ sequence@o@ sha1@o@ snprintf@o@ txn@o@ \
/db-4.5.20/dist/Makefile.in:220: aes_method@o@ crypto@o@ mt19937db@o@ rijndael-alg-fst@o@ \
/db-4.5.20/dist/Makefile.in:221: rijndael-api-fst@o@
/db-4.5.20/dist/Makefile.in:1207:aes_method@o@: $(srcdir)/crypto/aes_method.c
/db-4.5.20/dist/Makefile.in:1413:hmac@o@: $(srcdir)/hmac/hmac.c
/db-4.5.20/dist/Makefile.in:1633:rijndael-alg-fst@o@: $(srcdir)/crypto/rijndael/rijndael-alg-fst.c
/db-4.5.20/dist/Makefile.in:1635:rijndael-api-fst@o@: $(srcdir)/crypto/rijndael/rijndael-api-fst.c
/db-4.5.20/dist/Makefile.in:1641:sha1@o@: $(srcdir)/hmac/sha1.c
/db-4.5.20/dist/tags:13:AES_CIPHER ../dbinc/crypto.h /^} AES_CIPHER;$/
/db-4.5.20/dist/tags:26:BAD_BLOCK_LENGTH ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_BLOCK_LENGTH -6$/
/db-4.5.20/dist/tags:27:BAD_CIPHER_INSTANCE ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_CIPHER_INSTANCE -7$/
/db-4.5.20/dist/tags:28:BAD_CIPHER_MODE ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_CIPHER_MODE -4 \/* Params st/
/db-4.5.20/dist/tags:29:BAD_CIPHER_STATE ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_CIPHER_STATE -5 \/* Cipher in/
/db-4.5.20/dist/tags:30:BAD_DATA ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_DATA -8 \/* Data cont/
/db-4.5.20/dist/tags:31:BAD_KEY_DIR ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_KEY_DIR -1 \/* Key direc/
/db-4.5.20/dist/tags:32:BAD_KEY_INSTANCE ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_KEY_INSTANCE -3 \/* Key passe/
/db-4.5.20/dist/tags:33:BAD_KEY_MAT ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_KEY_MAT -2 \/* Key mater/
/db-4.5.20/dist/tags:35:BAD_OTHER ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_OTHER -9 \/* Unknown e/
/db-4.5.20/dist/tags:61:BITSPERBLOCK ../crypto/rijndael/rijndael-api-fst.h /^#define BITSPERBLOCK 128 \/* Default nu/
/db-4.5.20/dist/tags:120:CHAR64LONG16 ../hmac/sha1.c /^} CHAR64LONG16;$/
/db-4.5.20/dist/tags:126:CIPHER_AES ../dbinc/crypto.h /^#define CIPHER_AES 1 \/* AES algorithm *\/$/
/db-4.5.20/dist/tags:230:DB_AES_CHUNK ../dbinc/crypto.h /^#define DB_AES_CHUNK 16 \/* AES byte unit size *\//
/db-4.5.20/dist/tags:231:DB_AES_KEYLEN ../dbinc/crypto.h /^#define DB_AES_KEYLEN 128 \/* AES key length *\/$/
/db-4.5.20/dist/tags:246:DB_AM_ENCRYPT ../dbinc/db.in /^#define DB_AM_ENCRYPT 0x00000400 \/* Encryption */
/db-4.5.20/dist/tags:321:DB_ENCRYPT ../dbinc/db.in /^#define DB_ENCRYPT 0x00020000 \/* Btree, Has/
/db-4.5.20/dist/tags:322:DB_ENCRYPT_AES ../dbinc/db.in /^#define DB_ENCRYPT_AES 0x0000001 \/* AES, as/
/db-4.5.20/dist/tags:323:DB_ENC_MAGIC ../dbinc/hmac.h /^#define DB_ENC_MAGIC "encryption and decryption ke/
/db-4.5.20/dist/tags:511:DB_MAC_MAGIC ../dbinc/hmac.h /^#define DB_MAC_MAGIC "mac derivation key magic val/
/db-4.5.20/dist/tags:842:DIR_DECRYPT ../crypto/rijndael/rijndael-api-fst.h /^#define DIR_DECRYPT 1 \/* Are we de/
/db-4.5.20/dist/tags:843:DIR_ENCRYPT ../crypto/rijndael/rijndael-api-fst.h /^#define DIR_ENCRYPT 0 \/* Are we en/
/db-4.5.20/dist/tags:862:DbEnv_get_encrypt_flags ../libdb_java/db_java_wrap.c /^SWIGINTERN u_int32_t DbEnv_get_encrypt_flags(struc/
/db-4.5.20/dist/tags:946:DbEnv_set_encrypt ../libdb_java/db_java_wrap.c /^SWIGINTERN db_ret_t DbEnv_set_encrypt(struct DbEnv/
/db-4.5.20/dist/tags:1035:Db_get_encrypt_flags ../libdb_java/db_java_wrap.c /^SWIGINTERN u_int32_t Db_get_encrypt_flags(struct D/
/db-4.5.20/dist/tags:1064:Db_set_encrypt ../libdb_java/db_java_wrap.c /^SWIGINTERN db_ret_t Db_set_encrypt(struct Db *self/
/db-4.5.20/dist/tags:1130:GETU32 ../crypto/rijndael/rijndael-alg-fst.c /^#define GETU32(p) SWAP(*((u32 *)(p)))$/
/db-4.5.20/dist/tags:1163:HMAC_BLOCK_SIZE ../hmac/hmac.c /^#define HMAC_BLOCK_SIZE 64$/
/db-4.5.20/dist/tags:1164:HMAC_OUTPUT_SIZE ../hmac/hmac.c /^#define HMAC_OUTPUT_SIZE 20$/
/db-4.5.20/dist/tags:1348:MAXKB ../crypto/rijndael/rijndael-alg-fst.h /^#define MAXKB (256\/8)$/
/db-4.5.20/dist/tags:1349:MAXKC ../crypto/rijndael/rijndael-alg-fst.h /^#define MAXKC (256\/32)$/
/db-4.5.20/dist/tags:1350:MAXNR ../crypto/rijndael/rijndael-alg-fst.h /^#define MAXNR 14$/
/db-4.5.20/dist/tags:1352:MAX_IV_SIZE ../crypto/rijndael/rijndael-api-fst.h /^#define MAX_IV_SIZE 16 \/* # bytes ne/
/db-4.5.20/dist/tags:1353:MAX_KEY_SIZE ../crypto/rijndael/rijndael-api-fst.h /^#define MAX_KEY_SIZE 64 \/* # of ASCII/
/db-4.5.20/dist/tags:1364:MODE_CBC ../crypto/rijndael/rijndael-api-fst.h /^#define MODE_CBC 2 \/* Are we ci/
/db-4.5.20/dist/tags:1365:MODE_CFB1 ../crypto/rijndael/rijndael-api-fst.h /^#define MODE_CFB1 3 \/* Are we ci/
/db-4.5.20/dist/tags:1366:MODE_ECB ../crypto/rijndael/rijndael-api-fst.h /^#define MODE_ECB 1 \/* Are we ci/
/db-4.5.20/dist/tags:1482:OK_CRYPTO_FLAGS ../env/env_method.c /^#define OK_CRYPTO_FLAGS (DB_ENCRYPT_AES)$/
/db-4.5.20/dist/tags:1524:PUTU32 ../crypto/rijndael/rijndael-alg-fst.c /^#define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st/
/db-4.5.20/dist/tags:1601:R0 ../hmac/sha1.c /^#define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0/
/db-4.5.20/dist/tags:1602:R1 ../hmac/sha1.c /^#define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x/
/db-4.5.20/dist/tags:1603:R2 ../hmac/sha1.c /^#define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EB/
/db-4.5.20/dist/tags:1604:R3 ../hmac/sha1.c /^#define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i/
/db-4.5.20/dist/tags:1605:R4 ../hmac/sha1.c /^#define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1/
/db-4.5.20/dist/tags:1779:SHA1HANDSOFF ../hmac/sha1.c /^#define SHA1HANDSOFF$/
/db-4.5.20/dist/tags:1780:SHA1_CTX ../dbinc/hmac.h /^} SHA1_CTX;$/
/db-4.5.20/dist/tags:1924:SWAP ../crypto/rijndael/rijndael-alg-fst.c /^#define SWAP(x) (_lrotl(x, 8) & 0x00ff00ff | _lrot/
/db-4.5.20/dist/tags:2140:_DB_HMAC_H_ ../dbinc/hmac.h /^#define _DB_HMAC_H_$/
/db-4.5.20/dist/tags:2200:__RIJNDAEL_ALG_FST_H ../crypto/rijndael/rijndael-alg-fst.h /^#define __RIJNDAEL_ALG_FST_H$/
/db-4.5.20/dist/tags:2201:__RIJNDAEL_API_FST_H ../crypto/rijndael/rijndael-api-fst.h /^#define __RIJNDAEL_API_FST_H$/
/db-4.5.20/dist/tags:2209:__aes_adj_size ../crypto/aes_method.c /^__aes_adj_size(len)$/
/db-4.5.20/dist/tags:2210:__aes_close ../crypto/aes_method.c /^__aes_close(dbenv, data)$/
/db-4.5.20/dist/tags:2211:__aes_decrypt ../crypto/aes_method.c /^__aes_decrypt(dbenv, aes_data, iv, cipher, cipher_/
/db-4.5.20/dist/tags:2212:__aes_derivekeys ../crypto/aes_method.c /^__aes_derivekeys(dbenv, db_cipher, passwd, plen)$/
/db-4.5.20/dist/tags:2213:__aes_encrypt ../crypto/aes_method.c /^__aes_encrypt(dbenv, aes_data, iv, data, data_len)/
/db-4.5.20/dist/tags:2214:__aes_err ../crypto/aes_method.c /^__aes_err(dbenv, err)$/
/db-4.5.20/dist/tags:2215:__aes_init ../crypto/aes_method.c /^__aes_init(dbenv, db_cipher)$/
/db-4.5.20/dist/tags:2216:__aes_setup ../crypto/aes_method.c /^__aes_setup(dbenv, db_cipher)$/
/db-4.5.20/dist/tags:2429:__crypto_decrypt_meta ../crypto/crypto.c /^__crypto_decrypt_meta(dbenv, dbp, mbuf, do_metachk/
/db-4.5.20/dist/tags:2438:__db_SHA1Final ../hmac/sha1.c /^__db_SHA1Final(digest, context)$/
/db-4.5.20/dist/tags:2439:__db_SHA1Init ../hmac/sha1.c /^__db_SHA1Init(context)$/
/db-4.5.20/dist/tags:2440:__db_SHA1Transform ../hmac/sha1.c /^__db_SHA1Transform(state, buffer)$/
/db-4.5.20/dist/tags:2441:__db_SHA1Update ../hmac/sha1.c /^__db_SHA1Update(context, data, len)$/
/db-4.5.20/dist/tags:2442:__db_SHAPrintContext ../hmac/sha1.c /^__db_SHAPrintContext(context, msg)$/
/db-4.5.20/dist/tags:2463:__db_blockDecrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_blockDecrypt(cipher, key, input, inputLen, ou/
/db-4.5.20/dist/tags:2464:__db_blockEncrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_blockEncrypt(cipher, key, input, inputLen, ou/
/db-4.5.20/dist/tags:2499:__db_check_chksum ../hmac/hmac.c /^__db_check_chksum(dbenv, hdr, db_cipher, chksum, d/
/db-4.5.20/dist/tags:2503:__db_chksum ../hmac/hmac.c /^__db_chksum(hdr, data, data_len, mac_key, store)$/
/db-4.5.20/dist/tags:2505:__db_cipherInit ../crypto/rijndael/rijndael-api-fst.c /^__db_cipherInit(cipher, mode, IV)$/
/db-4.5.20/dist/tags:2506:__db_cipherUpdateRounds ../crypto/rijndael/rijndael-api-fst.c /^__db_cipherUpdateRounds(cipher, key, input, inputL/
/db-4.5.20/dist/tags:2535:__db_db_get_encrypt_flags_4005__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_db_get_encrypt_flags_4005__SVCSUFFIX__(msg, r/
/db-4.5.20/dist/tags:2554:__db_db_set_encrypt_4005__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_db_set_encrypt_4005__SVCSUFFIX__(msg, req)$/
/db-4.5.20/dist/tags:2594:__db_derive_mac ../hmac/hmac.c /^__db_derive_mac(passwd, plen, mac_key)$/
/db-4.5.20/dist/tags:2595:__db_des_destroy ../env/env_region.c /^__db_des_destroy(dbenv, rp)$/
/db-4.5.20/dist/tags:2596:__db_des_get ../env/env_region.c /^__db_des_get(dbenv, env_infop, infop, rpp)$/
/db-4.5.20/dist/tags:2624:__db_env_get_encrypt_flags_4005__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_env_get_encrypt_flags_4005__SVCSUFFIX__(msg, /
/db-4.5.20/dist/tags:2631:__db_env_set_encrypt_4005__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_env_set_encrypt_4005__SVCSUFFIX__(msg, req)$/
/db-4.5.20/dist/tags:2668:__db_get_encrypt_flags ../db/db_method.c /^__db_get_encrypt_flags(dbp, flagsp)$/
/db-4.5.20/dist/tags:2669:__db_get_encrypt_flags_proc ../rpc_server/c/db_server_proc.c /^__db_get_encrypt_flags_proc(dbpcl_id, replyp)$/
/db-4.5.20/dist/tags:2704:__db_hmac ../hmac/hmac.c /^__db_hmac(k, data, data_len, mac)$/
/db-4.5.20/dist/tags:2760:__db_makeKey ../crypto/rijndael/rijndael-api-fst.c /^__db_makeKey(key, direction, keyLen, keyMaterial)$/
/db-4.5.20/dist/tags:2821:__db_padDecrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_padDecrypt(cipher, key, input, inputOctets, o/
/db-4.5.20/dist/tags:2822:__db_padEncrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_padEncrypt(cipher, key, input, inputOctets, o/
/db-4.5.20/dist/tags:2936:__db_rijndaelDecrypt ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelDecrypt(rk, Nr, ct, pt)$/
/db-4.5.20/dist/tags:2937:__db_rijndaelDecryptRound ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelDecryptRound(rk, Nr, pt, ct)$/
/db-4.5.20/dist/tags:2938:__db_rijndaelEncrypt ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelEncrypt(rk, Nr, pt, ct)$/
/db-4.5.20/dist/tags:2939:__db_rijndaelEncryptRound ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelEncryptRound(rk, Nr, pt, ct)$/
/db-4.5.20/dist/tags:2940:__db_rijndaelKeySetupDec ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelKeySetupDec(rk, cipherKey, keyBits)$/
/db-4.5.20/dist/tags:2941:__db_rijndaelKeySetupEnc ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelKeySetupEnc(rk, cipherKey, keyBits)$/
/db-4.5.20/dist/tags:2972:__db_set_encrypt ../db/db_method.c /^__db_set_encrypt(dbp, passwd, flags)$/
/db-4.5.20/dist/tags:2973:__db_set_encrypt_proc ../rpc_server/c/db_server_proc.c /^__db_set_encrypt_proc(dbpcl_id, passwd, flags, rep/
/db-4.5.20/dist/tags:3150:__dbcl_db_get_encrypt_flags ../rpc_client/gen_client.c /^__dbcl_db_get_encrypt_flags(dbp, flagsp)$/
/db-4.5.20/dist/tags:3178:__dbcl_db_set_encrypt ../rpc_client/gen_client.c /^__dbcl_db_set_encrypt(dbp, passwd, flags)$/
/db-4.5.20/dist/tags:3221:__dbcl_env_get_encrypt_flags ../rpc_client/gen_client.c /^__dbcl_env_get_encrypt_flags(dbenv, flagsp)$/
/db-4.5.20/dist/tags:3231:__dbcl_env_set_encrypt ../rpc_client/gen_client.c /^__dbcl_env_set_encrypt(dbenv, passwd, flags)$/
/db-4.5.20/dist/tags:3365:__env_get_encrypt_flags ../env/env_method.c /^__env_get_encrypt_flags(dbenv, flagsp)$/
/db-4.5.20/dist/tags:3366:__env_get_encrypt_flags_proc ../rpc_server/c/db_server_proc.c /^__env_get_encrypt_flags_proc(dbenvcl_id, replyp)$/
/db-4.5.20/dist/tags:3404:__env_set_encrypt ../env/env_method.c /^__env_set_encrypt(dbenv, passwd, flags)$/
/db-4.5.20/dist/tags:3405:__env_set_encrypt_proc ../rpc_server/c/db_server_proc.c /^__env_set_encrypt_proc(dbenvcl_id, passwd, flags, /
/db-4.5.20/dist/tags:3722:__log_encrypt_record ../log/log_put.c /^__log_encrypt_record(dbenv, dbt, hdr, orig)$/
/db-4.5.20/dist/tags:4494:blk ../hmac/sha1.c /^#define blk(i) (block->l[i&15] = rol(block->l[(i+1/
/db-4.5.20/dist/tags:4495:blk0 ../hmac/sha1.c /^#define blk0(i) is_bigendian ? block->l[i] : \\$/
/db-4.5.20/dist/tags:4498:cipherInstance ../crypto/rijndael/rijndael-api-fst.h /^} cipherInstance;$/
/db-4.5.20/dist/tags:4709:keyInstance ../crypto/rijndael/rijndael-api-fst.h /^} keyInstance;$/
/db-4.5.20/dist/tags:4791:rol ../hmac/sha1.c /^#define rol(value, bits) (((value) << (bits)) | ((/
/db-4.5.20/dist/tags:4930:u16 ../crypto/rijndael/rijndael-alg-fst.h /^typedef u_int16_t u16;$/
/db-4.5.20/dist/tags:4931:u32 ../crypto/rijndael/rijndael-alg-fst.h /^typedef u_int32_t u32;$/
/db-4.5.20/dist/tags:4932:u8 ../crypto/rijndael/rijndael-alg-fst.h /^typedef u_int8_t u8;$/
/db-4.5.20/dist/s_include:74:for i in db btree clib common crypto dbreg env fileops hash hmac \
/db-4.5.20/dist/s_tags:13: ../crypto/rijndael/*.[ch] \
/db-4.5.20/dist/s_tags:21: ../hmac/*.[ch] \
/db-4.5.20/dist/srcfiles.in:100:crypto/aes_method.c dynamic static vx
/db-4.5.20/dist/srcfiles.in:103:crypto/rijndael/rijndael-alg-fst.c dynamic static vx
/db-4.5.20/dist/srcfiles.in:104:crypto/rijndael/rijndael-api-fst.c dynamic static vx
/db-4.5.20/dist/srcfiles.in:253:hmac/hmac.c dynamic small static vx vxsmall
/db-4.5.20/dist/srcfiles.in:254:hmac/sha1.c dynamic small static vx vxsmall
/db-4.5.20/dist/aclocal/libtool.ac:5223: icc* | ecc*)
/db-4.5.20/dist/aclocal/libtool.ac:5543: ecc*,ia64* | icc*,ia64*) # Intel C compiler on ia64
/db-4.5.20/dist/s_symlink:41:build hmac/tags ../dist/tags
/db-4.5.20/dist/pubdef.in:21:DB_AM_ENCRYPT * I *
/db-4.5.20/dist/pubdef.in:87:DB_ENCRYPT D I J
/db-4.5.20/dist/pubdef.in:88:DB_ENCRYPT_AES D I J
/db-4.5.20/dist/winmsi/dbwix.m4:148:m4_define(`WIX_DB_PERSISTENT_GUID', `m4_esyscmd(echo "_WIXDB_PRODUCT @@ _WIXDB_VERSION @@ _WIXDB_CURDIR @@ _WIXDB_SUBDIR @@ _WIXDB_CURFILE" | openssl md5 | sed -e "s/^\(........\)\(....\)\(....\)\(....\)\(....\)\(............\)/\1-\2-\3-\4-\5/")')
/db-4.5.20/dist/winmsi/s_winmsi.fcn:1130: RequireFileInPath PATH "$PATH" openssl # needed for MD5 hashing
/db-4.5.20/dist/template/db_server_proc:159:/* BEGIN __env_get_encrypt_flags_proc */
/db-4.5.20/dist/template/db_server_proc:161:__env_get_encrypt_flags_proc(dbenvcl_id, replyp)
/db-4.5.20/dist/template/db_server_proc:163: __env_get_encrypt_flags_reply *replyp;
/db-4.5.20/dist/template/db_server_proc:164:/* END __env_get_encrypt_flags_proc */
/db-4.5.20/dist/template/db_server_proc:323:/* BEGIN __env_set_encrypt_proc */
/db-4.5.20/dist/template/db_server_proc:325:__env_set_encrypt_proc(dbenvcl_id, passwd, flags, replyp)
/db-4.5.20/dist/template/db_server_proc:329: __env_set_encrypt_reply *replyp;
/db-4.5.20/dist/template/db_server_proc:330:/* END __env_set_encrypt_proc */
/db-4.5.20/dist/template/db_server_proc:659:/* BEGIN __db_get_encrypt_flags_proc */
/db-4.5.20/dist/template/db_server_proc:661:__db_get_encrypt_flags_proc(dbpcl_id, replyp)
/db-4.5.20/dist/template/db_server_proc:663: __db_get_encrypt_flags_reply *replyp;
/db-4.5.20/dist/template/db_server_proc:664:/* END __db_get_encrypt_flags_proc */
/db-4.5.20/dist/template/db_server_proc:1168:/* BEGIN __db_set_encrypt_proc */
/db-4.5.20/dist/template/db_server_proc:1170:__db_set_encrypt_proc(dbpcl_id, passwd, flags, replyp)
/db-4.5.20/dist/template/db_server_proc:1174: __db_set_encrypt_reply *replyp;
/db-4.5.20/dist/template/db_server_proc:1175:/* END __db_set_encrypt_proc */
/db-4.5.20/env/env_region.c:16:static void __db_des_destroy __P((DB_ENV *, REGION *));
/db-4.5.20/env/env_region.c:17:static int __db_des_get __P((DB_ENV *, REGINFO *, REGINFO *, REGION **));
/db-4.5.20/env/env_region.c:264: if ((ret = __db_des_get(dbenv, infop, infop, &rp)) != 0 || rp == NULL)
/db-4.5.20/env/env_region.c:415: if ((ret = __db_des_get(dbenv, infop, infop, &rp)) != 0) {
/db-4.5.20/env/env_region.c:918: if ((ret = __db_des_get(dbenv, dbenv->reginfo, infop, &rp)) != 0)
/db-4.5.20/env/env_region.c:926: * __db_des_get may have created the region and reset the create
/db-4.5.20/env/env_region.c:970: __db_des_destroy(dbenv, rp);
/db-4.5.20/env/env_region.c:1010: __db_des_destroy(dbenv, rp);
/db-4.5.20/env/env_region.c:1020: * __db_des_get --
/db-4.5.20/env/env_region.c:1025:__db_des_get(dbenv, env_infop, infop, rpp)
/db-4.5.20/env/env_region.c:1117: * __db_des_destroy --
/db-4.5.20/env/env_region.c:1121:__db_des_destroy(dbenv, rp)
/db-4.5.20/env/env_method.c:21:#include "dbinc/hmac.h"
/db-4.5.20/env/env_method.c:182: dbenv->get_encrypt_flags = __env_get_encrypt_flags;
/db-4.5.20/env/env_method.c:288: dbenv->set_encrypt = __env_set_encrypt;
/db-4.5.20/env/env_method.c:428: * __env_get_encrypt_flags --
/db-4.5.20/env/env_method.c:429: * {DB_ENV,DB}->get_encrypt_flags.
/db-4.5.20/env/env_method.c:431: * PUBLIC: int __env_get_encrypt_flags __P((DB_ENV *, u_int32_t *));
/db-4.5.20/env/env_method.c:434:__env_get_encrypt_flags(dbenv, flagsp)
/db-4.5.20/env/env_method.c:442: if (db_cipher != NULL && db_cipher->alg == CIPHER_AES)
/db-4.5.20/env/env_method.c:443: *flagsp = DB_ENCRYPT_AES;
/db-4.5.20/env/env_method.c:456: * __env_set_encrypt --
/db-4.5.20/env/env_method.c:457: * DB_ENV->set_encrypt.
/db-4.5.20/env/env_method.c:459: * PUBLIC: int __env_set_encrypt __P((DB_ENV *, const char *, u_int32_t));
/db-4.5.20/env/env_method.c:462:__env_set_encrypt(dbenv, passwd, flags)
/db-4.5.20/env/env_method.c:471: ENV_ILLEGAL_AFTER_OPEN(dbenv, "DB_ENV->set_encrypt");
/db-4.5.20/env/env_method.c:472:#define OK_CRYPTO_FLAGS (DB_ENCRYPT_AES)
/db-4.5.20/env/env_method.c:475: return (__db_ferr(dbenv, "DB_ENV->set_encrypt", 0));
/db-4.5.20/env/env_method.c:478: __db_errx(dbenv, "Empty password specified to set_encrypt");
/db-4.5.20/env/env_method.c:510: case DB_ENCRYPT_AES:
/db-4.5.20/env/env_method.c:511: if ((ret = __crypto_algsetup(dbenv, db_cipher, CIPHER_AES, 0))
/db-4.5.20/db_hotbackup/db_hotbackup.c:391: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/db_hotbackup/db_hotbackup.c:392: dbenv->err(dbenv, ret, "DB_ENV->set_encrypt");
/db-4.5.20/examples_java/src/db/GettingStarted/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce
/db-4.5.20/examples_java/src/db/GettingStarted/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh
/db-4.5.20/examples_java/src/db/GettingStarted/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine
/db-4.5.20/db_load/db_load.c:58:#define LDF_PASSWORD 0x04 /* Encrypt created databases. */
/db-4.5.20/db_load/db_load.c:217: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0);
/db-4.5.20/db_load/db_load.c:221: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0);
/db-4.5.20/db_load/db_load.c:376: /* If configured with a password, encrypt databases we create. */
/db-4.5.20/db_load/db_load.c:378: (ret = dbp->set_flags(dbp, DB_ENCRYPT)) != 0) {
/db-4.5.20/db_load/db_load.c:379: dbp->err(dbp, ret, "DB->set_flags: DB_ENCRYPT");
/db-4.5.20/db_load/db_load.c:582: if (ldg->passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/db_load/db_load.c:583: ldg->passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/db_dump/db_dump.c:172: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/db_dump/db_dump.c:173: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/db/db_stati.c:286: { DB_AM_ENCRYPT, "DB_AM_ENCRYPT" },
/db-4.5.20/db/db_iface.c:1270: F_CLR(dbp, DB_AM_CHKSUM | DB_AM_ENCRYPT);
/db-4.5.20/db/db_setlsn.c:42: if (flags != 0 && flags != DB_ENCRYPT)
/db-4.5.20/db/db_setlsn.c:52: ret = __env_lsn_reset(dbenv, name, LF_ISSET(DB_ENCRYPT) ? 1 : 0);
/db-4.5.20/db/db_setlsn.c:82: if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0)
/db-4.5.20/db/db_open.c:17:#include "dbinc/hmac.h"
/db-4.5.20/db/db_open.c:368: * checksum (and verify the checksum if necessary) and possibly decrypt it.
/db-4.5.20/db/db_open.c:382: int is_hmac, ret, swapped;
/db-4.5.20/db/db_open.c:393: is_hmac = meta->encrypt_alg == 0 ? 0 : 1;
/db-4.5.20/db/db_open.c:411: DBMETASIZE, is_hmac)) != 0) {
/db-4.5.20/db/db_open.c:412: if (is_hmac || swapped)
/db-4.5.20/db/db_open.c:425: ret = __crypto_decrypt_meta(dbenv, dbp, (u_int8_t *)meta, do_metachk);
/db-4.5.20/db/db_open.c:530: * checksum and decrypt. Don't distinguish between configuration and
/db-4.5.20/db/db_pr.c:111: { DB_AM_ENCRYPT, "encrypted" },
/db-4.5.20/db/db_conv.c:46:#include "dbinc/hmac.h"
/db-4.5.20/db/db_conv.c:73: int is_hmac, ret;
/db-4.5.20/db/db_conv.c:79: ret = is_hmac = 0;
/db-4.5.20/db/db_conv.c:97: if (((DBMETA *)pp)->encrypt_alg != 0 ||
/db-4.5.20/db/db_conv.c:98: F_ISSET(dbp, DB_AM_ENCRYPT))
/db-4.5.20/db/db_conv.c:99: is_hmac = 1;
/db-4.5.20/db/db_conv.c:125: * a db_cipher then we are using hmac.
/db-4.5.20/db/db_conv.c:127: is_hmac = CRYPTO_ON(dbenv) ? 1 : 0;
/db-4.5.20/db/db_conv.c:137: if (F_ISSET(dbp, DB_AM_SWAP) && is_hmac == 0)
/db-4.5.20/db/db_conv.c:140: dbenv, NULL, db_cipher, chksum, pp, sum_len, is_hmac)) {
/db-4.5.20/db/db_conv.c:155: if (F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.5.20/db/db_conv.c:187: if (pg_len != 0 && (ret = db_cipher->decrypt(dbenv,
/db-4.5.20/db/db_conv.c:278: if (F_ISSET(dbp, DB_AM_ENCRYPT)) {
/db-4.5.20/db/db_conv.c:306: if ((ret = db_cipher->encrypt(dbenv, db_cipher->data,
/db-4.5.20/db/db_conv.c:330: if (F_ISSET(dbp, DB_AM_SWAP) && !F_ISSET(dbp, DB_AM_ENCRYPT))
/db-4.5.20/db/db_method.c:44:static int __db_get_encrypt_flags __P((DB *, u_int32_t *));
/db-4.5.20/db/db_method.c:45:static int __db_set_encrypt __P((DB *, const char *, u_int32_t));
/db-4.5.20/db/db_method.c:200: dbp->get_encrypt_flags = __db_get_encrypt_flags;
/db-4.5.20/db/db_method.c:223: dbp->set_encrypt = __db_set_encrypt;
/db-4.5.20/db/db_method.c:498: * __db_get_encrypt_flags --
/db-4.5.20/db/db_method.c:501:__db_get_encrypt_flags(dbp, flagsp)
/db-4.5.20/db/db_method.c:505: DB_ILLEGAL_IN_ENV(dbp, "DB->get_encrypt_flags");
/db-4.5.20/db/db_method.c:507: return (__env_get_encrypt_flags(dbp->dbenv, flagsp));
/db-4.5.20/db/db_method.c:511: * __db_set_encrypt --
/db-4.5.20/db/db_method.c:515:__db_set_encrypt(dbp, passwd, flags)
/db-4.5.20/db/db_method.c:523: DB_ILLEGAL_IN_ENV(dbp, "DB->set_encrypt");
/db-4.5.20/db/db_method.c:524: DB_ILLEGAL_AFTER_OPEN(dbp, "DB->set_encrypt");
/db-4.5.20/db/db_method.c:526: if ((ret = __env_set_encrypt(dbp->dbenv, passwd, flags)) != 0)
/db-4.5.20/db/db_method.c:538: return (__db_set_flags(dbp, DB_ENCRYPT));
/db-4.5.20/db/db_method.c:606: if (FLD_ISSET(*inflagsp, DB_ENCRYPT)) {
/db-4.5.20/db/db_method.c:607: FLD_SET(*outflagsp, DB_AM_ENCRYPT | DB_AM_CHKSUM);
/db-4.5.20/db/db_method.c:608: FLD_CLR(*inflagsp, DB_ENCRYPT);
/db-4.5.20/db/db_method.c:631: DB_ENCRYPT,
/db-4.5.20/db/db_method.c:677: if (LF_ISSET(DB_ENCRYPT) && !CRYPTO_ON(dbenv)) {
/db-4.5.20/db/db_setid.c:43: if (flags != 0 && flags != DB_ENCRYPT)
/db-4.5.20/db/db_setid.c:53: ret = __env_fileid_reset(dbenv, name, LF_ISSET(DB_ENCRYPT) ? 1 : 0);
/db-4.5.20/db/db_setid.c:138: if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0)
/db-4.5.20/db/db.c:104: DB_AM_ENCRYPT | DB_AM_CHKSUM | DB_AM_NOT_DURABLE));
/db-4.5.20/db/db.c:534: ftype = F_ISSET(dbp, DB_AM_SWAP | DB_AM_ENCRYPT | DB_AM_CHKSUM)
/db-4.5.20/db/db.c:548: DB_AM_SWAP | DB_AM_ENCRYPT | DB_AM_CHKSUM) ?
/db-4.5.20/db/db.c:607: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP));
/db-4.5.20/log/log_put.c:14:#include "dbinc/hmac.h"
/db-4.5.20/log/log_put.c:18:static int __log_encrypt_record __P((DB_ENV *, DBT *, HDR *, u_int32_t));
/db-4.5.20/log/log_put.c:128: * DB_LOG_NOCOPY, because we know we can overwrite/encrypt the log
/db-4.5.20/log/log_put.c:144: if ((ret = __log_encrypt_record(dbenv, dbt, &hdr, udbt->size)) != 0)
/db-4.5.20/log/log_put.c:229: * now-encrypted dbt. Clients have no way to decrypt
/db-4.5.20/log/log_put.c:615: __log_encrypt_record(dbenv, &t, &hdr, (u_int32_t)tsize)) != 0)
/db-4.5.20/log/log_put.c:1451: if ((ret = __log_encrypt_record(dbenv, dbt, &hdr, rec->size)) != 0)
/db-4.5.20/log/log_put.c:1470:__log_encrypt_record(dbenv, dbt, hdr, orig)
/db-4.5.20/log/log_put.c:1483: if ((ret = db_cipher->encrypt(dbenv, db_cipher->data,
/db-4.5.20/log/log_get.c:15:#include "dbinc/hmac.h"
/db-4.5.20/log/log_get.c:382: int eof, is_hmac, need_cksum, ret;
/db-4.5.20/log/log_get.c:388: is_hmac = 0;
/db-4.5.20/log/log_get.c:499: is_hmac = 1;
/db-4.5.20/log/log_get.c:502: is_hmac = 0;
/db-4.5.20/log/log_get.c:595: hdr.chksum, rp + hdr.size, hdr.len - hdr.size, is_hmac)) != 0) {
/db-4.5.20/log/log_get.c:661: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data,
/db-4.5.20/log/log_get.c:1250: * of the file but that's hard -- we may have to decrypt it, checksum
/db-4.5.20/log/log.c:14:#include "dbinc/hmac.h"
/db-4.5.20/log/log.c:596: int is_hmac, ret;
/db-4.5.20/log/log.c:620: is_hmac = 0;
/db-4.5.20/log/log.c:626: is_hmac = 1;
/db-4.5.20/log/log.c:677: * If we are trying to decrypt an unencrypted log
/db-4.5.20/log/log.c:685: /* Check the checksum and decrypt. */
/db-4.5.20/log/log.c:688: hdr->len - hdrsize, is_hmac)) != 0) {
/db-4.5.20/log/log.c:692: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data,
/db-4.5.20/log/log.c:739: hdr->len - hdrsize, is_hmac)) != 0)) {
/db-4.5.20/build_vxworks/db_printlog/db_printlog.c:169: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/build_vxworks/db_printlog/db_printlog.c:170: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/db_archive/db_archive.c:129: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/build_vxworks/db_archive/db_archive.c:130: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1800: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1804: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1810: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1811:hmac.o
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1814: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1818: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1822: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1828: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1829:sha1.o
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1832: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:3453: $(PRJ_DIR)/../hmac/hmac.c \
/db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:3454: $(PRJ_DIR)/../hmac/sha1.c \
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:959: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:963: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:969: FILE_$(PRJ_DIR)/../crypto/aes_method.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:970:aes_method.o
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:973: FILE_$(PRJ_DIR)/../crypto/aes_method.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1013: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1017: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1023: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1024:rijndael-alg-fst.o
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1027: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1031: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1035: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1041: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1042:rijndael-api-fst.o
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1045: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2219: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2223: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2229: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2230:hmac.o
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2233: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2237: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2241: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2247: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2248:sha1.o
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2251: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:4164: $(PRJ_DIR)/../crypto/aes_method.c \
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:4167: $(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c \
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:4168: $(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c \
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:4234: $(PRJ_DIR)/../hmac/hmac.c \
/db-4.5.20/build_vxworks/BerkeleyDB22.wpj:4235: $(PRJ_DIR)/../hmac/sha1.c \
/db-4.5.20/build_vxworks/db_stat/db_stat.c:275: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/db_checkpoint/db_checkpoint.c:150: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/build_vxworks/db_checkpoint/db_checkpoint.c:151: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/db_upgrade/db_upgrade.c:128: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/build_vxworks/db_upgrade/db_upgrade.c:129: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/db_verify/db_verify.c:137: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/db.h:295: * Flags private to DB_ENV->set_encrypt.
/db-4.5.20/build_vxworks/db.h:297:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */
/db-4.5.20/build_vxworks/db.h:349:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */
/db-4.5.20/build_vxworks/db.h:1581: int (*get_encrypt_flags) __P((DB *, u_int32_t *));
/db-4.5.20/build_vxworks/db.h:1621: int (*set_encrypt) __P((DB *, const char *, u_int32_t));
/db-4.5.20/build_vxworks/db.h:1689:#define DB_AM_ENCRYPT 0x00000400 /* Encryption */
/db-4.5.20/build_vxworks/db.h:2169: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *));
/db-4.5.20/build_vxworks/db.h:2276: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t));
/db-4.5.20/build_vxworks/db_hotbackup/db_hotbackup.c:406: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/db_hotbackup/db_hotbackup.c:407: dbenv->err(dbenv, ret, "DB_ENV->set_encrypt");
/db-4.5.20/build_vxworks/db_load/db_load.c:58:#define LDF_PASSWORD 0x04 /* Encrypt created databases. */
/db-4.5.20/build_vxworks/db_load/db_load.c:232: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0);
/db-4.5.20/build_vxworks/db_load/db_load.c:236: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0);
/db-4.5.20/build_vxworks/db_load/db_load.c:391: /* If configured with a password, encrypt databases we create. */
/db-4.5.20/build_vxworks/db_load/db_load.c:393: (ret = dbp->set_flags(dbp, DB_ENCRYPT)) != 0) {
/db-4.5.20/build_vxworks/db_load/db_load.c:394: dbp->err(dbp, ret, "DB->set_flags: DB_ENCRYPT");
/db-4.5.20/build_vxworks/db_load/db_load.c:597: if (ldg->passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/build_vxworks/db_load/db_load.c:598: ldg->passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/db_dump/db_dump.c:187: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/build_vxworks/db_dump/db_dump.c:188: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/db_deadlock/db_deadlock.c:164: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/build_vxworks/db_deadlock/db_deadlock.c:165: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1859: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1863: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1869: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1870:hmac.o
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1873: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1877: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1881: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1887: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1888:sha1.o
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1891: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:3512: $(PRJ_DIR)/../hmac/hmac.c \
/db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:3513: $(PRJ_DIR)/../hmac/sha1.c \
/db-4.5.20/build_vxworks/db_recover/db_recover.c:127: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/build_vxworks/db_recover/db_recover.c:128: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:900: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:904: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:910: FILE_$(PRJ_DIR)/../crypto/aes_method.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:911:aes_method.o
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:914: FILE_$(PRJ_DIR)/../crypto/aes_method.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:954: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:958: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:964: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:965:rijndael-alg-fst.o
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:968: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:972: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:976: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:982: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:983:rijndael-api-fst.o
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:986: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2160: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2164: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2170: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2171:hmac.o
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2174: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2178: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2182: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2188: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2189:sha1.o
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2192: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:4105: $(PRJ_DIR)/../crypto/aes_method.c \
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:4108: $(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c \
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:4109: $(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c \
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:4175: $(PRJ_DIR)/../hmac/hmac.c \
/db-4.5.20/build_vxworks/BerkeleyDB20.wpj:4176: $(PRJ_DIR)/../hmac/sha1.c \
/db-4.5.20/dbinc_auto/env_ext.h:26:int __env_get_encrypt_flags __P((DB_ENV *, u_int32_t *));
/db-4.5.20/dbinc_auto/env_ext.h:27:int __env_set_encrypt __P((DB_ENV *, const char *, u_int32_t));
/db-4.5.20/dbinc_auto/rpc_client_ext.h:27:int __dbcl_env_get_encrypt_flags __P((DB_ENV *, u_int32_t *));
/db-4.5.20/dbinc_auto/rpc_client_ext.h:34:int __dbcl_env_set_encrypt __P((DB_ENV *, const char *, u_int32_t));
/db-4.5.20/dbinc_auto/rpc_client_ext.h:46:int __dbcl_db_get_encrypt_flags __P((DB *, u_int32_t *));
/db-4.5.20/dbinc_auto/rpc_client_ext.h:65:int __dbcl_db_set_encrypt __P((DB *, const char *, u_int32_t));
/db-4.5.20/dbinc_auto/int_def.in:570:#define __aes_setup __aes_setup@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:571:#define __aes_adj_size __aes_adj_size@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:572:#define __aes_close __aes_close@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:573:#define __aes_decrypt __aes_decrypt@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:574:#define __aes_encrypt __aes_encrypt@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:575:#define __aes_init __aes_init@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:579:#define __crypto_decrypt_meta __crypto_decrypt_meta@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:641:#define __env_get_encrypt_flags __env_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:642:#define __env_set_encrypt __env_set_encrypt@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:1375:#define __dbcl_env_get_encrypt_flags __dbcl_env_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:1382:#define __dbcl_env_set_encrypt __dbcl_env_set_encrypt@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:1394:#define __dbcl_db_get_encrypt_flags __dbcl_db_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:1413:#define __dbcl_db_set_encrypt __dbcl_db_set_encrypt@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:1476:#define __env_get_encrypt_flags_proc __env_get_encrypt_flags_proc@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:1477:#define __env_set_encrypt_proc __env_set_encrypt_proc@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:1496:#define __db_get_encrypt_flags_proc __db_get_encrypt_flags_proc@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/int_def.in:1497:#define __db_set_encrypt_proc __db_set_encrypt_proc@DB_VERSION_UNIQUE_NAME@
/db-4.5.20/dbinc_auto/rpc_server_ext.h:16:void __env_get_encrypt_flags_proc __P((u_int, __env_get_encrypt_flags_reply *));
/db-4.5.20/dbinc_auto/rpc_server_ext.h:17:void __env_set_encrypt_proc __P((u_int, char *, u_int32_t, __env_set_encrypt_reply *));
/db-4.5.20/dbinc_auto/rpc_server_ext.h:36:void __db_get_encrypt_flags_proc __P((u_int, __db_get_encrypt_flags_reply *));
/db-4.5.20/dbinc_auto/rpc_server_ext.h:37:void __db_set_encrypt_proc __P((u_int, char *, u_int32_t, __db_set_encrypt_reply *));
/db-4.5.20/dbinc_auto/hmac_ext.h:2:#ifndef _hmac_ext_h_
/db-4.5.20/dbinc_auto/hmac_ext.h:3:#define _hmac_ext_h_
/db-4.5.20/dbinc_auto/hmac_ext.h:13:void __db_SHA1Init __P((SHA1_CTX *));
/db-4.5.20/dbinc_auto/hmac_ext.h:14:void __db_SHA1Update __P((SHA1_CTX *, unsigned char *, size_t));
/db-4.5.20/dbinc_auto/hmac_ext.h:15:void __db_SHA1Final __P((unsigned char *, SHA1_CTX *));
/db-4.5.20/dbinc_auto/hmac_ext.h:20:#endif /* !_hmac_ext_h_ */
/db-4.5.20/dbinc_auto/crypto_ext.h:9:int __aes_setup __P((DB_ENV *, DB_CIPHER *));
/db-4.5.20/dbinc_auto/crypto_ext.h:10:u_int __aes_adj_size __P((size_t));
/db-4.5.20/dbinc_auto/crypto_ext.h:11:int __aes_close __P((DB_ENV *, void *));
/db-4.5.20/dbinc_auto/crypto_ext.h:12:int __aes_decrypt __P((DB_ENV *, void *, void *, u_int8_t *, size_t));
/db-4.5.20/dbinc_auto/crypto_ext.h:13:int __aes_encrypt __P((DB_ENV *, void *, void *, u_int8_t *, size_t));
/db-4.5.20/dbinc_auto/crypto_ext.h:14:int __aes_init __P((DB_ENV *, DB_CIPHER *));
/db-4.5.20/dbinc_auto/crypto_ext.h:18:int __crypto_decrypt_meta __P((DB_ENV *, DB *, u_int8_t *, int));
/db-4.5.20/perl/DB_File/dbinfo:73:my ($magic, $version, $endian, $encrypt) ;
/db-4.5.20/perl/DB_File/dbinfo:80: $encrypt = "Not Supported";
/db-4.5.20/perl/DB_File/dbinfo:87: $encrypt = "Not Supported";
/db-4.5.20/perl/DB_File/dbinfo:113: { $encrypt = $info[6] ? "Enabled" : "Disabled" }
/db-4.5.20/perl/DB_File/dbinfo:115: { $encrypt = "Not Supported" }
/db-4.5.20/perl/DB_File/dbinfo:124:Encryption: $encrypt
/db-4.5.20/perl/BerkeleyDB/mkconsts:574: DB_AM_ENCRYPT => IGNORE,
/db-4.5.20/perl/BerkeleyDB/mkconsts:584: DB_CHKSUM_SHA1 => DEFINE,
/db-4.5.20/perl/BerkeleyDB/mkconsts:588: DB_ENCRYPT => DEFINE,
/db-4.5.20/perl/BerkeleyDB/mkconsts:589: DB_ENCRYPT_AES => DEFINE,
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1394: softCrash("-Encrypt needs Berkeley DB 4.x or better") ;
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1418: Status = dbp->set_encrypt(dbp, password, enc_flags);
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1419: Trace(("DB->set_encrypt passwd = %s, flags %d returned %s\n",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1830:set_encrypt(env, passwd, flags)
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1836: softCrash("$env->set_encrypt needs Berkeley DB 4.1 or better") ;
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1838: dieIfEnvOpened(env, "set_encrypt");
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1839: RETVAL = env->Env->set_encrypt(env->Env, passwd, flags);
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1896: softCrash("-Encrypt needs Berkeley DB 4.x or better") ;
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1994: status = env->set_encrypt(env, enc_passwd, enc_flags);
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1995: Trace(("ENV->set_encrypt passwd = %s, flags %d returned %s\n",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:66: DB_CHKSUM_SHA1
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:92: DB_ENCRYPT
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:93: DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:531: if (defined $got->{Encrypt}) {
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:532: croak("Encrypt parameter must be a hash reference")
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:533: if !ref $got->{Encrypt} || ref $got->{Encrypt} ne 'HASH' ;
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:535: my %config = %{ $got->{Encrypt} } ;
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:542: croak("Must specify Password and Flags with Encrypt parameter")
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:685: # [ -Encrypt => { Password => string, Flags => value}
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:702: Encrypt => undef,
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:808: Encrypt => undef,
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:873: Encrypt => undef,
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:932: Encrypt => undef,
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:998: Encrypt => undef,
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:1118: Encrypt => undef,
/db-4.5.20/perl/BerkeleyDB/dbinfo:73:my ($magic, $version, $endian, $encrypt) ;
/db-4.5.20/perl/BerkeleyDB/dbinfo:80: $encrypt = "Not Supported";
/db-4.5.20/perl/BerkeleyDB/dbinfo:87: $encrypt = "Not Supported";
/db-4.5.20/perl/BerkeleyDB/dbinfo:113: { $encrypt = $info[6] ? "Enabled" : "Disabled" }
/db-4.5.20/perl/BerkeleyDB/dbinfo:115: { $encrypt = "Not Supported" }
/db-4.5.20/perl/BerkeleyDB/dbinfo:124:Encryption: $encrypt
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:165: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:203:=item -Encrypt
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:209: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES }
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:211:Valid values for the Flags are 0 or C.
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:487: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:508: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:801: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:822: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1052: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1073: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1150: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1170: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1198: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1264:=item -Encrypt
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1270: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES }
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1272:Valid values for the Flags are 0 or C.
/db-4.5.20/perl/BerkeleyDB/MANIFEST:29:t/encrypt.t
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:20: -Encrypt => {Password => "abc",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:21: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:39: -Encrypt => 1,
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:42: ok 1, $@ =~ /^Encrypt parameter must be a hash reference at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:47: -Encrypt => {},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:50: ok 2, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:55: -Encrypt => {Password => "fred"},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:58: ok 3, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:63: -Encrypt => {Flags => 1},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:66: ok 4, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:71: -Encrypt => {Fred => 1},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:79: # new BerkeleyDB::Env -Encrypt =>
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:87: -Encrypt => {Password => "abc",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:88: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:101: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:121: # once the database is created, do not need to specify DB_ENCRYPT
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:136: -Encrypt => {Password => "def",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:137: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:146: -Encrypt => 1,
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:149: ok 16, $@ =~ /^Encrypt parameter must be a hash reference at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:154: -Encrypt => {},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:157: ok 17, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:162: -Encrypt => {Password => "fred"},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:165: ok 18, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:170: -Encrypt => {Flags => 1},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:173: ok 19, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:178: -Encrypt => {Fred => 1},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:189: -Encrypt => 1,
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:192: ok 21, $@ =~ /^Encrypt parameter must be a hash reference at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:197: -Encrypt => {},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:200: ok 22, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:205: -Encrypt => {Password => "fred"},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:208: ok 23, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:213: -Encrypt => {Flags => 1},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:216: ok 24, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:221: -Encrypt => {Fred => 1},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:232: -Encrypt => 1,
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:235: ok 26, $@ =~ /^Encrypt parameter must be a hash reference at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:240: -Encrypt => {},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:243: ok 27, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:248: -Encrypt => {Password => "fred"},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:251: ok 28, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:256: -Encrypt => {Flags => 1},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:259: ok 29, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:264: -Encrypt => {Fred => 1},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:275: -Encrypt => 1,
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:278: ok 31, $@ =~ /^Encrypt parameter must be a hash reference at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:283: -Encrypt => {},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:286: ok 32, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:291: -Encrypt => {Password => "fred"},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:294: ok 33, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:299: -Encrypt => {Flags => 1},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:302: ok 34, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:307: -Encrypt => {Fred => 1},
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:316: # new BerkeleyDB::Hash -Encrypt =>
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:325: -Encrypt => {Password => "beta",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:326: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:328: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:356: -Encrypt => {Password => "def",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:357: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:359: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:365: -Encrypt => {Password => "beta",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:366: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:368: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:380: # new BerkeleyDB::Btree -Encrypt =>
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:389: -Encrypt => {Password => "beta",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:390: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:392: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:420: -Encrypt => {Password => "def",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:421: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:423: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:429: -Encrypt => {Password => "beta",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:430: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:432: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:444: # new BerkeleyDB::Queue -Encrypt =>
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:455: -Encrypt => {Password => "beta",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:456: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:458: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:489: -Encrypt => {Password => "def",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:490: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:492: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:499: -Encrypt => {Password => "beta",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:500: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:502: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:514: # new BerkeleyDB::Recno -Encrypt =>
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:523: -Encrypt => {Password => "beta",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:524: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:526: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:554: -Encrypt => {Password => "def",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:555: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:557: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:563: -Encrypt => {Password => "beta",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:564: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:566: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:578: # new BerkeleyDB::Unknown -Encrypt =>
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:587: -Encrypt => {Password => "beta",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:588: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:590: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:618: -Encrypt => {Password => "def",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:619: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:621: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:627: -Encrypt => {Password => "beta",
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:628: Flags => DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/t/encrypt.t:630: -Property => DB_ENCRYPT ;
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:165: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:203:=item -Encrypt
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:209: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES }
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:211:Valid values for the Flags are 0 or C.
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:487: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:508: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:693: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:714: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:891: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:912: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:956: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:976: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:1004: [ -Encrypt => { Password => "string",
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:1070:=item -Encrypt
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:1076: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES }
/db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:1078:Valid values for the Flags are 0 or C.
/db-4.5.20/perl/BerkeleyDB/constants.h:449: DB_CONSUME DB_CURRENT DB_DELETED DB_DUPSORT DB_ENCRYPT DB_ENV_CDB
/db-4.5.20/perl/BerkeleyDB/constants.h:456: if (memEQ(name, "DB_ENCRYPT", 10)) {
/db-4.5.20/perl/BerkeleyDB/constants.h:458:#ifdef DB_ENCRYPT
/db-4.5.20/perl/BerkeleyDB/constants.h:459: *iv_return = DB_ENCRYPT;
/db-4.5.20/perl/BerkeleyDB/constants.h:2076: DB_ARCH_REMOVE DB_AUTO_COMMIT DB_BTREEOLDVER DB_CHKSUM_SHA1 DB_EID_INVALID
/db-4.5.20/perl/BerkeleyDB/constants.h:2077: DB_ENCRYPT_AES DB_ENV_APPINIT DB_ENV_DBLOCAL DB_ENV_LOCKING DB_ENV_LOGGING
/db-4.5.20/perl/BerkeleyDB/constants.h:2438: if (memEQ(name, "DB_ENCRYPT_AES", 14)) {
/db-4.5.20/perl/BerkeleyDB/constants.h:2440:#ifdef DB_ENCRYPT_AES
/db-4.5.20/perl/BerkeleyDB/constants.h:2441: *iv_return = DB_ENCRYPT_AES;
/db-4.5.20/perl/BerkeleyDB/constants.h:2529: if (memEQ(name, "DB_CHKSUM_SHA1", 14)) {
/db-4.5.20/perl/BerkeleyDB/constants.h:2531:#ifdef DB_CHKSUM_SHA1
/db-4.5.20/perl/BerkeleyDB/constants.h:2532: *iv_return = DB_CHKSUM_SHA1;
/db-4.5.20/perl/BerkeleyDB/constants.h:4573: DB_CHKSUM_SHA1 DB_CLIENT DB_CL_WRITER DB_COMMIT DB_COMPACT_FLAGS
/db-4.5.20/perl/BerkeleyDB/constants.h:4578: DB_EID_BROADCAST DB_EID_INVALID DB_ENCRYPT DB_ENCRYPT_AES
/db-4.5.20/db_deadlock/db_deadlock.c:149: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/db_deadlock/db_deadlock.c:150: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/test/test115.tcl:22: global encrypt
/db-4.5.20/test/test115.tcl:202: if { $cryptenv != -1 || $encrypt != 0 } {
/db-4.5.20/test/rep001.tcl:73: append args " -encrypt "
/db-4.5.20/test/rep001.tcl:87: global encrypt
/db-4.5.20/test/rep001.tcl:210: set encrypt 1
/db-4.5.20/test/upgrade.tcl:231: global encrypt
/db-4.5.20/test/upgrade.tcl:237: set encrypt 1
/db-4.5.20/test/upgrade.tcl:243: if { $encrypt == 1 } {
/db-4.5.20/test/upgrade.tcl:361: global encrypt
/db-4.5.20/test/upgrade.tcl:432: set encrypt 0
/db-4.5.20/test/upgrade.tcl:439: global encrypt;\
/db-4.5.20/test/upgrade.tcl:440: set encrypt $encrypt;\
/db-4.5.20/test/upgrade.tcl:464: global encrypt gen_chksum;\
/db-4.5.20/test/upgrade.tcl:465: set encrypt $encrypt;\
/db-4.5.20/test/upgrade.tcl:489: set encrypt 1
/db-4.5.20/test/upgrade.tcl:495: global encrypt passwd;\
/db-4.5.20/test/upgrade.tcl:496: set encrypt $encrypt;\
/db-4.5.20/test/upgrade.tcl:526: set encrypt 0
/db-4.5.20/test/upgrade.tcl:529: global encrypt;\
/db-4.5.20/test/upgrade.tcl:530: set encrypt $encrypt;\
/db-4.5.20/test/upgrade.tcl:539: set encrypt 1
/db-4.5.20/test/upgrade.tcl:542: global encrypt;\
/db-4.5.20/test/upgrade.tcl:543: set encrypt $encrypt;\
/db-4.5.20/test/upgrade.tcl:569: global encrypt
/db-4.5.20/test/upgrade.tcl:604: if { $encrypt == 1 } {
/db-4.5.20/test/upgrade.tcl:717: global encrypt
/db-4.5.20/test/upgrade.tcl:721: if { $encrypt == 1 } {
/db-4.5.20/test/test116.tcl:55: if { [is_substr $args "-encrypt"] } {
/db-4.5.20/test/test116.tcl:58: if { [is_substr [$env get_encrypt_flags] "-encryptaes"] } {
/db-4.5.20/test/test116.tcl:60: append resetargs " -encrypt "
/db-4.5.20/test/test.tcl:33:set encrypt 0
/db-4.5.20/test/test.tcl:34:set old_encrypt 0
/db-4.5.20/test/test.tcl:1131: append largs " -encrypt "
/db-4.5.20/test/test.tcl:1190: append largs " -encrypt "
/db-4.5.20/test/test.tcl:1494: global encrypt
/db-4.5.20/test/test.tcl:1507: $encrypt == 0 } {
/db-4.5.20/test/test.tcl:1512: $encrypt == 1 } {
/db-4.5.20/test/test.tcl:1529: if { $gen_upgrade_log == 0 || $encrypt == 0 } {
/db-4.5.20/test/sdb002.tcl:49: global encrypt
/db-4.5.20/test/sdb002.tcl:60: # Run convert_encrypt so that old_encrypt will be reset to
/db-4.5.20/test/sdb002.tcl:62: convert_encrypt $largs
/db-4.5.20/test/sdb002.tcl:85: global encrypt
/db-4.5.20/test/sdb002.tcl:206: if { $encrypt > 0 } {
/db-4.5.20/test/sec001.tcl:117: puts "\tSec001.f.2: Create without encryption algorithm (DB_ENCRYPT_ANY)."
/db-4.5.20/test/sec001.tcl:146: # db->set_encrypt method when we've already got a secure dbenv.
/db-4.5.20/test/sec001.tcl:164: puts "\tSec001.g.3: Open again with any encryption (DB_ENCRYPT_ANY)."
/db-4.5.20/test/rpc004.tcl:57: -mode 0644} -env $env -encrypt $testfile1]
/db-4.5.20/test/rep011.tcl:55: append args " -encrypt "
/db-4.5.20/test/rep011.tcl:69: global encrypt
/db-4.5.20/test/rep011.tcl:174: set encrypt 1
/db-4.5.20/test/rep062.tcl:72: global encrypt
/db-4.5.20/test/rep062.tcl:111: { 1 {btree ""} {btree "-encrypt"} }
/db-4.5.20/test/rep062.tcl:112: { 1 {btree "-encrypt"} {btree ""} }
/db-4.5.20/test/rep062.tcl:113: { 1 {queue ""} {queue "-encrypt"} }
/db-4.5.20/test/rep062.tcl:114: { 1 {queue "-encrypt"} {queue ""} }
/db-4.5.20/test/rep062.tcl:270: set encrypt 1
/db-4.5.20/test/test044.tcl:28: global encrypt
/db-4.5.20/test/test044.tcl:44: if { $encrypt != 0 } {
/db-4.5.20/test/test042.tcl:23: global encrypt
/db-4.5.20/test/test042.tcl:36: if { $encrypt != 0 } {
/db-4.5.20/test/env007.tcl:287: "-encryptaes" "$passwd" "-encryptaes" "get_encrypt_flags" }
/db-4.5.20/test/env007.tcl:342: [eval $env get_encrypt_flags] \
/db-4.5.20/test/env007.tcl:597: { "" "-encrypt" "" "get_flags" "-encryptaes $passwd" }
/db-4.5.20/test/scr010/spell.ok:9:AES
/db-4.5.20/test/scr010/spell.ok:107:CBC
/db-4.5.20/test/scr010/spell.ok:673:HMAC
/db-4.5.20/test/scr010/spell.ok:1257:RIJNDAEL
/db-4.5.20/test/scr010/spell.ok:1328:Rijndael
/db-4.5.20/test/scr010/spell.ok:1359:SHA
/db-4.5.20/test/scr010/spell.ok:2196:des
/db-4.5.20/test/scr010/spell.ok:2631:hmac
/db-4.5.20/test/scr010/spell.ok:3732:rijndael
/db-4.5.20/test/logtrack.tcl:38: global encrypt passwd
/db-4.5.20/test/logtrack.tcl:45: if { $encrypt > 0 } {
/db-4.5.20/test/sdb015.tcl:57: global encrypt
/db-4.5.20/test/sdb015.tcl:64: # Run convert_encrypt so that old_encrypt will be reset to
/db-4.5.20/test/sdb015.tcl:66: convert_encrypt $largs
/db-4.5.20/test/sdb015.tcl:80: global encrypt
/db-4.5.20/test/wordlist:3787:blowfish
/db-4.5.20/test/reputils.tcl:431: global encrypt
/db-4.5.20/test/reputils.tcl:437: set encrypt 1
/db-4.5.20/test/reputils.tcl:1821: global encrypt
/db-4.5.20/test/reputils.tcl:1865: if { $encrypt == 1 } {
/db-4.5.20/test/fop004.tcl:14: global encrypt
/db-4.5.20/test/fop004.tcl:33: if { $encrypt != 0 } {
/db-4.5.20/test/test061.tcl:18: global encrypt
/db-4.5.20/test/test061.tcl:211: if { $encrypt != 0 } {
/db-4.5.20/test/test045.tcl:26: global encrypt
/db-4.5.20/test/test045.tcl:38: if { $encrypt != 0 } {
/db-4.5.20/test/testutils.tcl:136: global encrypt
/db-4.5.20/test/testutils.tcl:141: if { $encrypt > 0 && $env == "NULL" } {
/db-4.5.20/test/testutils.tcl:169: global encrypt
/db-4.5.20/test/testutils.tcl:174: if { $encrypt > 0 && $env == "NULL" } {
/db-4.5.20/test/testutils.tcl:1123: global old_encrypt
/db-4.5.20/test/testutils.tcl:1175: if { $old_encrypt != 0 } {
/db-4.5.20/test/testutils.tcl:1197: $old_encrypt == 0} {
/db-4.5.20/test/testutils.tcl:1204: $old_encrypt == 1 } {
/db-4.5.20/test/testutils.tcl:1277: global old_encrypt
/db-4.5.20/test/testutils.tcl:1282: if { $old_encrypt != 0 } {
/db-4.5.20/test/testutils.tcl:1490: convert_encrypt $env_cmd
/db-4.5.20/test/testutils.tcl:1640: global encrypt
/db-4.5.20/test/testutils.tcl:1660: if { $encrypt > 0 } {
/db-4.5.20/test/testutils.tcl:2411: global encrypt
/db-4.5.20/test/testutils.tcl:2420: set newl [lreplace $largs $eindex $eend "-encrypt"]
/db-4.5.20/test/testutils.tcl:2425:proc convert_encrypt { largs } {
/db-4.5.20/test/testutils.tcl:2426: global encrypt
/db-4.5.20/test/testutils.tcl:2427: global old_encrypt
/db-4.5.20/test/testutils.tcl:2429: set old_encrypt $encrypt
/db-4.5.20/test/testutils.tcl:2430: set encrypt 0
/db-4.5.20/test/testutils.tcl:2431: if { [lsearch $largs "-encrypt*"] != -1 } {
/db-4.5.20/test/testutils.tcl:2432: set encrypt 1
/db-4.5.20/test/testutils.tcl:2454: convert_encrypt $largs
/db-4.5.20/test/testutils.tcl:2811: global encrypt
/db-4.5.20/test/testutils.tcl:2846: if { $encrypt != 0 } {
/db-4.5.20/test/testutils.tcl:2958: global encrypt
/db-4.5.20/test/testutils.tcl:2965: if { $encrypt != 0 } {
/db-4.5.20/test/testutils.tcl:3027: global encrypt
/db-4.5.20/test/testutils.tcl:3057: if { $encrypt != 0 } {
/db-4.5.20/test/rep029.tcl:84: append args " -encrypt "
/db-4.5.20/test/recd017.tcl:14: global encrypt
/db-4.5.20/test/recd017.tcl:51: convert_encrypt $env_cmd
/db-4.5.20/test/recd017.tcl:61: -env $dbenv -encrypt $opts $testfile"
/db-4.5.20/test/recd017.tcl:79: convert_encrypt $env_cmd
/db-4.5.20/test/recd017.tcl:82: -env $dbenv -encrypt $opts $testfile"
/db-4.5.20/test/recd017.tcl:88: -env $dbenv -encrypt $opts $testfile2"
/db-4.5.20/test/test070.tcl:19: global encrypt
/db-4.5.20/test/test070.tcl:32: if { $encrypt != 0 } {
/db-4.5.20/test/test037.tcl:11: global encrypt
/db-4.5.20/test/test089.tcl:15: global encrypt
/db-4.5.20/mod_db4/utils.c:52: if((semset = md4_sem_create(NUM_SEMS, start)) < 0) {
/db-4.5.20/mod_db4/utils.c:75: md4_sem_wait_for_zero(semset, OK_TO_PROCEED);
/db-4.5.20/mod_db4/utils.c:80: md4_sem_set(semset, OK_TO_PROCEED, 0);
/db-4.5.20/mod_db4/utils.c:85: md4_sem_set(semset, OK_TO_PROCEED, 1);
/db-4.5.20/mod_db4/sem_utils.h:13:extern int md4_sem_create(int semnum, unsigned short *start);
/db-4.5.20/mod_db4/sem_utils.h:14:extern void md4_sem_destroy(int semid);
/db-4.5.20/mod_db4/sem_utils.h:15:extern void md4_sem_lock(int semid, int semnum);
/db-4.5.20/mod_db4/sem_utils.h:16:extern void md4_sem_unlock(int semid, int semnum);
/db-4.5.20/mod_db4/sem_utils.h:17:extern void md4_sem_wait_for_zero(int semid, int semnum);
/db-4.5.20/mod_db4/sem_utils.h:18:extern void md4_sem_set(int semid, int semnum, int value);
/db-4.5.20/mod_db4/sem_utils.h:19:extern int md4_sem_get(int semid, int semnum);
/db-4.5.20/mod_db4/sem_utils.c:44:int md4_sem_create(int semnum, unsigned short *start)
/db-4.5.20/mod_db4/sem_utils.c:57: md4_sem_destroy(semid);
/db-4.5.20/mod_db4/sem_utils.c:63: md4_sem_destroy(semid);
/db-4.5.20/mod_db4/sem_utils.c:69:void md4_sem_destroy(int semid)
/db-4.5.20/mod_db4/sem_utils.c:76:void md4_sem_lock(int semid, int semnum)
/db-4.5.20/mod_db4/sem_utils.c:85:void md4_sem_unlock(int semid, int semnum)
/db-4.5.20/mod_db4/sem_utils.c:94:void md4_sem_wait_for_zero(int semid, int semnum)
/db-4.5.20/mod_db4/sem_utils.c:103:void md4_sem_set(int semid, int semnum, int value)
/db-4.5.20/mod_db4/sem_utils.c:110:int md4_sem_get(int semid, int semnum)
/db-4.5.20/php_db4/db4.cpp:453: REGISTER_LONG_CONSTANT("DB_ENCRYPT_AES", DB_ENCRYPT_AES, CONST_CS | CONST_PERSISTENT);
/db-4.5.20/php_db4/db4.cpp:474: REGISTER_LONG_CONSTANT("DB_ENCRYPT", DB_ENCRYPT, CONST_CS | CONST_PERSISTENT);
/db-4.5.20/php_db4/db4.cpp:633: REGISTER_LONG_CONSTANT("DB_AM_ENCRYPT", DB_AM_ENCRYPT, CONST_CS | CONST_PERSISTENT);
/db-4.5.20/cxx/cxx_db.cpp:543:DB_METHOD(get_encrypt_flags, (u_int32_t *flagsp),
/db-4.5.20/cxx/cxx_db.cpp:545:DB_METHOD(set_encrypt, (const char *passwd, u_int32_t flags),
/db-4.5.20/cxx/cxx_env.cpp:708:DBENV_METHOD(get_encrypt_flags, (u_int32_t *flagsp),
/db-4.5.20/cxx/cxx_env.cpp:710:DBENV_METHOD(set_encrypt, (const char *passwd, u_int32_t flags),
/db-4.5.20/db_recover/db_recover.c:112: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
/db-4.5.20/db_recover/db_recover.c:113: passwd, DB_ENCRYPT_AES)) != 0) {
/db-4.5.20/rpc_client/gen_client.c:315: * PUBLIC: int __dbcl_env_get_encrypt_flags __P((DB_ENV *, u_int32_t *));
/db-4.5.20/rpc_client/gen_client.c:318:__dbcl_env_get_encrypt_flags(dbenv, flagsp)
/db-4.5.20/rpc_client/gen_client.c:323: __env_get_encrypt_flags_msg msg;
/db-4.5.20/rpc_client/gen_client.c:324: __env_get_encrypt_flags_reply *replyp = NULL;
/db-4.5.20/rpc_client/gen_client.c:335: replyp = __db_env_get_encrypt_flags_4005(&msg, cl);
/db-4.5.20/rpc_client/gen_client.c:346: xdr_free((xdrproc_t)xdr___env_get_encrypt_flags_reply, (void *)replyp);
/db-4.5.20/rpc_client/gen_client.c:581: * PUBLIC: int __dbcl_env_set_encrypt __P((DB_ENV *, const char *, u_int32_t));
/db-4.5.20/rpc_client/gen_client.c:584:__dbcl_env_set_encrypt(dbenv, passwd, flags)
/db-4.5.20/rpc_client/gen_client.c:590: __env_set_encrypt_msg msg;
/db-4.5.20/rpc_client/gen_client.c:591: __env_set_encrypt_reply *replyp = NULL;
/db-4.5.20/rpc_client/gen_client.c:607: replyp = __db_env_set_encrypt_4005(&msg, cl);
/db-4.5.20/rpc_client/gen_client.c:616: xdr_free((xdrproc_t)xdr___env_set_encrypt_reply, (void *)replyp);
/db-4.5.20/rpc_client/gen_client.c:1115: * PUBLIC: int __dbcl_db_get_encrypt_flags __P((DB *, u_int32_t *));
/db-4.5.20/rpc_client/gen_client.c:1118:__dbcl_db_get_encrypt_flags(dbp, flagsp)
/db-4.5.20/rpc_client/gen_client.c:1123: __db_get_encrypt_flags_msg msg;
/db-4.5.20/rpc_client/gen_client.c:1124: __db_get_encrypt_flags_reply *replyp = NULL;
/db-4.5.20/rpc_client/gen_client.c:1140: replyp = __db_db_get_encrypt_flags_4005(&msg, cl);
/db-4.5.20/rpc_client/gen_client.c:1151: xdr_free((xdrproc_t)xdr___db_get_encrypt_flags_reply, (void *)replyp);
/db-4.5.20/rpc_client/gen_client.c:2007: * PUBLIC: int __dbcl_db_set_encrypt __P((DB *, const char *, u_int32_t));
/db-4.5.20/rpc_client/gen_client.c:2010:__dbcl_db_set_encrypt(dbp, passwd, flags)
/db-4.5.20/rpc_client/gen_client.c:2016: __db_set_encrypt_msg msg;
/db-4.5.20/rpc_client/gen_client.c:2017: __db_set_encrypt_reply *replyp = NULL;
/db-4.5.20/rpc_client/gen_client.c:2038: replyp = __db_db_set_encrypt_4005(&msg, cl);
/db-4.5.20/rpc_client/gen_client.c:2047: xdr_free((xdrproc_t)xdr___db_set_encrypt_reply, (void *)replyp);
/db-4.5.20/rpc_client/gen_client.c:3057: dbp->get_encrypt_flags = __dbcl_db_get_encrypt_flags;
/db-4.5.20/rpc_client/gen_client.c:3100: dbp->set_encrypt = __dbcl_db_set_encrypt;
/db-4.5.20/rpc_client/gen_client.c:3181: dbenv->get_encrypt_flags = __dbcl_env_get_encrypt_flags;
/db-4.5.20/rpc_client/gen_client.c:3437: dbenv->set_encrypt = __dbcl_env_set_encrypt;
|
|
|