/db-4.6.21/btree/bt_open.c:368: if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.6.21/btree/bt_open.c:369: meta->dbmeta.encrypt_alg = /db-4.6.21/btree/bt_open.c:371: DB_ASSERT(dbenv, meta->dbmeta.encrypt_alg != 0); /db-4.6.21/btree/bt_open.c:473: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP)); /db-4.6.21/db_printlog/db_printlog.c:153: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/db_printlog/db_printlog.c:154: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/docs/java/com/sleepycat/util/ExceptionWrapper.html:169:

This method is intentionally defined to be the same signature as the /db-4.6.21/docs/java/com/sleepycat/util/RuntimeExceptionWrapper.html:234:

This method is intentionally defined to be the same signature as the /db-4.6.21/docs/java/com/sleepycat/util/IOExceptionWrapper.html:234:

This method is intentionally defined to be the same signature as the /db-4.6.21/docs/java/com/sleepycat/db/DatabaseConfig.html:1646: Berkeley DB uses the SHA1 Secure Hash Algorithm if encryption is /db-4.6.21/docs/java/com/sleepycat/db/DatabaseConfig.html:1852: Berkeley DB uses the Rijndael/AES (also known as the Advanced /db-4.6.21/docs/java/com/sleepycat/db/EnvironmentConfig.html:2476: Berkeley DB uses the Rijndael/AES (also known as the Advanced /db-4.6.21/docs/api_c/api_core.html:41:DB->set_encryptSet the database cryptographic key /db-4.6.21/docs/api_c/api_core.html:136:DB_ENV->set_encryptSet the environment cryptographic key /db-4.6.21/docs/api_c/env_list.html:36:DB_ENV->set_encryptSet the environment cryptographic key /db-4.6.21/docs/api_c/pindex.src:48:__APIREL__/api_c/db_set_encrypt.html__OCT__DB_ENCRYPT_AES DB-__GT__set_encrypt@DB_ENCRYPT_AES /db-4.6.21/docs/api_c/pindex.src:54:__APIREL__/api_c/db_set_flags.html__OCT__DB_ENCRYPT DB-__GT__set_flags@DB_ENCRYPT /db-4.6.21/docs/api_c/pindex.src:180:__APIREL__/api_c/env_set_encrypt.html__OCT__DB_ENCRYPT_AES DB_ENV-__GT__set_encrypt@DB_ENCRYPT_AES /db-4.6.21/docs/api_c/pindex.src:565:__APIREL__/ref/env/encrypt.html__OCT__2 @encryption /db-4.6.21/docs/api_c/c_pindex.html:146:DB->set_flags  DB_ENCRYPT /db-4.6.21/docs/api_c/c_pindex.html:147:DB->set_encrypt  DB_ENCRYPT_AES /db-4.6.21/docs/api_c/c_pindex.html:148:DB_ENV->set_encrypt  DB_ENCRYPT_AES /db-4.6.21/docs/api_c/c_pindex.html:481: encryption /db-4.6.21/docs/api_c/env_lsn_reset.html:56:

DB_ENCRYPT
The file contains encrypted databases. /db-4.6.21/docs/api_c/db_set_encrypt.html:1: /db-4.6.21/docs/api_c/db_set_encrypt.html:2: /db-4.6.21/docs/api_c/db_set_encrypt.html:7:Berkeley DB: DB->set_encrypt /db-4.6.21/docs/api_c/db_set_encrypt.html:14:

DB->set_encrypt

/db-4.6.21/docs/api_c/db_set_encrypt.html:26:DB->set_encrypt(DB *db, const char *passwd, u_int32_t flags); /db-4.6.21/docs/api_c/db_set_encrypt.html:29:DB->get_encrypt_flags(DB *db, u_int32_t *flagsp); /db-4.6.21/docs/api_c/db_set_encrypt.html:32:

Description: DB->set_encrypt

/db-4.6.21/docs/api_c/db_set_encrypt.html:38:

The DB->set_encrypt method may not be called after the DB->open method is called. /db-4.6.21/docs/api_c/db_set_encrypt.html:40:

The DB->set_encrypt method /db-4.6.21/docs/api_c/db_set_encrypt.html:49:

DB_ENCRYPT_AES
Use the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs/api_c/db_set_encrypt.html:57:

The DB->set_encrypt method /db-4.6.21/docs/api_c/db_set_encrypt.html:69:

Description: DB->get_encrypt_flags

/db-4.6.21/docs/api_c/db_set_encrypt.html:70:

The DB->get_encrypt_flags method returns the encryption flags.

/db-4.6.21/docs/api_c/db_set_encrypt.html:71:

The DB->get_encrypt_flags method may be called at any time during the life of the /db-4.6.21/docs/api_c/db_set_encrypt.html:73:

The DB->get_encrypt_flags method /db-4.6.21/docs/api_c/db_set_encrypt.html:79:

flagsp
The DB->get_encrypt_flags method returns the /db-4.6.21/docs/api_c/db_list.html:43:DB->set_encryptSet the database cryptographic key /db-4.6.21/docs/api_c/env_set_encrypt.html:1: /db-4.6.21/docs/api_c/env_set_encrypt.html:6:Berkeley DB: DB_ENV->set_encrypt /db-4.6.21/docs/api_c/env_set_encrypt.html:13:

DB_ENV->set_encrypt

/db-4.6.21/docs/api_c/env_set_encrypt.html:25:DB_ENV->set_encrypt(DB_ENV *dbenv, const char *passwd, u_int32_t flags); /db-4.6.21/docs/api_c/env_set_encrypt.html:28:DB_ENV->get_encrypt_flags(DB_ENV *dbenv, u_int32_t *flagsp); /db-4.6.21/docs/api_c/env_set_encrypt.html:31:

Description: DB_ENV->set_encrypt

/db-4.6.21/docs/api_c/env_set_encrypt.html:34:

The DB_ENV->set_encrypt method configures a database environment, not only operations /db-4.6.21/docs/api_c/env_set_encrypt.html:36:

The DB_ENV->set_encrypt method may not be called after the DB_ENV->open method is /db-4.6.21/docs/api_c/env_set_encrypt.html:39:DB_ENV->open is called, the information specified to DB_ENV->set_encrypt /db-4.6.21/docs/api_c/env_set_encrypt.html:43:

The DB_ENV->set_encrypt method /db-4.6.21/docs/api_c/env_set_encrypt.html:52:

DB_ENCRYPT_AES
Use the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs/api_c/env_set_encrypt.html:60:

The DB_ENV->set_encrypt method /db-4.6.21/docs/api_c/env_set_encrypt.html:72:

Description: DB_ENV->get_encrypt_flags

/db-4.6.21/docs/api_c/env_set_encrypt.html:73:

The DB_ENV->get_encrypt_flags method returns the encryption flags.

/db-4.6.21/docs/api_c/env_set_encrypt.html:74:

The DB_ENV->get_encrypt_flags method may be called at any time during the life of the /db-4.6.21/docs/api_c/env_set_encrypt.html:76:

The DB_ENV->get_encrypt_flags method /db-4.6.21/docs/api_c/env_set_encrypt.html:82:

flagsp
The DB_ENV->get_encrypt_flags method returns the /db-4.6.21/docs/api_c/db_set_flags.html:49:filestore. Berkeley DB uses the SHA1 Secure Hash Algorithm /db-4.6.21/docs/api_c/db_set_flags.html:61:
DB_ENCRYPT
Encrypt the database using the cryptographic password specified to the /db-4.6.21/docs/api_c/db_set_flags.html:62:DB_ENV->set_encrypt or DB->set_encrypt methods. /db-4.6.21/docs/api_c/db_set_flags.html:63:

Calling DB->set_flags with the DB_ENCRYPT flag only affects the /db-4.6.21/docs/api_c/db_set_flags.html:66:

If the database already exists when DB->open is called, the DB_ENCRYPT /db-4.6.21/docs/api_c/env_fileid_reset.html:50:

DB_ENCRYPT
The file contains encrypted databases. /db-4.6.21/docs/api_cxx/api_core.html:41:Db::set_encryptSet the database cryptographic key /db-4.6.21/docs/api_cxx/api_core.html:136:DbEnv::set_encryptSet the environment cryptographic key /db-4.6.21/docs/api_cxx/cxx_pindex.html:147:Db::set_flags  DB_ENCRYPT /db-4.6.21/docs/api_cxx/cxx_pindex.html:148:Db::set_encrypt  DB_ENCRYPT_AES /db-4.6.21/docs/api_cxx/cxx_pindex.html:149:DbEnv::set_encrypt  DB_ENCRYPT_AES /db-4.6.21/docs/api_cxx/cxx_pindex.html:476: encryption /db-4.6.21/docs/api_cxx/env_list.html:36:DbEnv::set_encryptSet the environment cryptographic key /db-4.6.21/docs/api_cxx/pindex.src:49:__APIREL__/api_cxx/db_set_encrypt.html__OCT__DB_ENCRYPT_AES Db::set_encrypt@DB_ENCRYPT_AES /db-4.6.21/docs/api_cxx/pindex.src:55:__APIREL__/api_cxx/db_set_flags.html__OCT__DB_ENCRYPT Db::set_flags@DB_ENCRYPT /db-4.6.21/docs/api_cxx/pindex.src:172:__APIREL__/api_cxx/env_set_encrypt.html__OCT__DB_ENCRYPT_AES DbEnv::set_encrypt@DB_ENCRYPT_AES /db-4.6.21/docs/api_cxx/env_lsn_reset.html:57:
DB_ENCRYPT
The file contains encrypted databases. /db-4.6.21/docs/api_cxx/db_set_encrypt.html:1: /db-4.6.21/docs/api_cxx/db_set_encrypt.html:2: /db-4.6.21/docs/api_cxx/db_set_encrypt.html:7:Berkeley DB: Db::set_encrypt /db-4.6.21/docs/api_cxx/db_set_encrypt.html:14:

Db::set_encrypt

/db-4.6.21/docs/api_cxx/db_set_encrypt.html:26:Db::set_encrypt(const char *passwd, u_int32_t flags); /db-4.6.21/docs/api_cxx/db_set_encrypt.html:29:Db::get_encrypt_flags(u_int32_t *flagsp); /db-4.6.21/docs/api_cxx/db_set_encrypt.html:32:

Description: Db::set_encrypt

/db-4.6.21/docs/api_cxx/db_set_encrypt.html:38:

The Db::set_encrypt method may not be called after the Db::open method is called. /db-4.6.21/docs/api_cxx/db_set_encrypt.html:40:

The Db::set_encrypt method /db-4.6.21/docs/api_cxx/db_set_encrypt.html:50:

DB_ENCRYPT_AES
Use the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs/api_cxx/db_set_encrypt.html:58:

The Db::set_encrypt method /db-4.6.21/docs/api_cxx/db_set_encrypt.html:73:

Description: Db::get_encrypt_flags

/db-4.6.21/docs/api_cxx/db_set_encrypt.html:74:

The Db::get_encrypt_flags method returns the encryption flags.

/db-4.6.21/docs/api_cxx/db_set_encrypt.html:75:

The Db::get_encrypt_flags method may be called at any time during the life of the /db-4.6.21/docs/api_cxx/db_set_encrypt.html:77:

The Db::get_encrypt_flags method /db-4.6.21/docs/api_cxx/db_set_encrypt.html:84:

flagsp
The Db::get_encrypt_flags method returns the /db-4.6.21/docs/api_cxx/db_list.html:43:Db::set_encryptSet the database cryptographic key /db-4.6.21/docs/api_cxx/env_set_encrypt.html:1: /db-4.6.21/docs/api_cxx/env_set_encrypt.html:6:Berkeley DB: DbEnv::set_encrypt /db-4.6.21/docs/api_cxx/env_set_encrypt.html:13:

DbEnv::set_encrypt

/db-4.6.21/docs/api_cxx/env_set_encrypt.html:25:DbEnv::set_encrypt(const char *passwd, u_int32_t flags); /db-4.6.21/docs/api_cxx/env_set_encrypt.html:28:DbEnv::get_encrypt_flags(u_int32_t *flagsp); /db-4.6.21/docs/api_cxx/env_set_encrypt.html:31:

Description: DbEnv::set_encrypt

/db-4.6.21/docs/api_cxx/env_set_encrypt.html:34:

The DbEnv::set_encrypt method configures a database environment, not only operations /db-4.6.21/docs/api_cxx/env_set_encrypt.html:36:

The DbEnv::set_encrypt method may not be called after the DbEnv::open method is /db-4.6.21/docs/api_cxx/env_set_encrypt.html:39:DbEnv::open is called, the information specified to DbEnv::set_encrypt /db-4.6.21/docs/api_cxx/env_set_encrypt.html:43:

The DbEnv::set_encrypt method /db-4.6.21/docs/api_cxx/env_set_encrypt.html:53:

DB_ENCRYPT_AES
Use the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs/api_cxx/env_set_encrypt.html:61:

The DbEnv::set_encrypt method /db-4.6.21/docs/api_cxx/env_set_encrypt.html:76:

Description: DbEnv::get_encrypt_flags

/db-4.6.21/docs/api_cxx/env_set_encrypt.html:77:

The DbEnv::get_encrypt_flags method returns the encryption flags.

/db-4.6.21/docs/api_cxx/env_set_encrypt.html:78:

The DbEnv::get_encrypt_flags method may be called at any time during the life of the /db-4.6.21/docs/api_cxx/env_set_encrypt.html:80:

The DbEnv::get_encrypt_flags method /db-4.6.21/docs/api_cxx/env_set_encrypt.html:87:

flagsp
The DbEnv::get_encrypt_flags method returns the /db-4.6.21/docs/api_cxx/db_set_flags.html:49:filestore. Berkeley DB uses the SHA1 Secure Hash Algorithm /db-4.6.21/docs/api_cxx/db_set_flags.html:61:
DB_ENCRYPT
Encrypt the database using the cryptographic password specified to the /db-4.6.21/docs/api_cxx/db_set_flags.html:62:DbEnv::set_encrypt or Db::set_encrypt methods. /db-4.6.21/docs/api_cxx/db_set_flags.html:63:

Calling Db::set_flags with the DB_ENCRYPT flag only affects the /db-4.6.21/docs/api_cxx/db_set_flags.html:66:

If the database already exists when Db::open is called, the DB_ENCRYPT /db-4.6.21/docs/api_cxx/env_fileid_reset.html:51:

DB_ENCRYPT
The file contains encrypted databases. Binární soubor /home/mitr/hash/grep-many/source/db-4.6.21/docs/gsg_txn/C/BerkeleyDB-Core-C-Txn.pdf odpovídá Binární soubor /home/mitr/hash/grep-many/source/db-4.6.21/docs/gsg_txn/CXX/BerkeleyDB-Core-Cxx-Txn.pdf odpovídá /db-4.6.21/docs/gsg/C/btree.html:476: is a pointer to a function that has the following signature: /db-4.6.21/docs/gsg/CXX/btree.html:464: is a pointer to a function that has the following signature: Binární soubor /home/mitr/hash/grep-many/source/db-4.6.21/docs/gsg/CXX/BerkeleyDB-Core-Cxx-GSG.pdf odpovídá /db-4.6.21/docs/ref/upgrade.4.2/cksum.html:6:Berkeley DB Reference Guide: Release 4.2: DB_CHKSUM_SHA1 /db-4.6.21/docs/ref/upgrade.4.2/cksum.html:16:

Release 4.2: DB_CHKSUM_SHA1

/db-4.6.21/docs/ref/upgrade.4.2/cksum.html:18:from DB_CHKSUM_SHA1 to DB_CHKSUM, as Berkeley DB uses an internal /db-4.6.21/docs/ref/upgrade.4.2/cksum.html:20:the SHA1 Secure Hash Algorithm. Berkeley DB continues to use the SHA1 Secure /db-4.6.21/docs/ref/upgrade.4.2/cksum.html:22:Applications using the DB_CHKSUM_SHA1 flag should change that use to /db-4.6.21/docs/ref/upgrade.4.2/toc.html:22:
  • Release 4.2: DB_CHKSUM_SHA1 /db-4.6.21/docs/ref/refs/hash_usenix.ps:10284:4040(des-)X /db-4.6.21/docs/ref/am/ops.html:62:DB->set_encryptSet the database cryptographic key /db-4.6.21/docs/ref/distrib/layout.html:60:hmacChecksum support /db-4.6.21/docs/ref/toc.html:127:
  • Encryption /db-4.6.21/docs/ref/env/security.html:14:PrevRefNext /db-4.6.21/docs/ref/env/security.html:51: /db-4.6.21/docs/ref/env/remote.html:14:

    PrevRefNext /db-4.6.21/docs/ref/env/intro.html:70:
    DB_ENV->set_encryptSet the environment cryptographic key
    PrevRefNext /db-4.6.21/docs/ref/env/remote.html:60: /db-4.5.20/docs/api_c/api_core.html:130: /db-4.5.20/docs/api_c/env_list.html:37: /db-4.5.20/docs/api_c/c_pindex.html:137: /db-4.5.20/docs/api_c/c_pindex.html:138: /db-4.5.20/docs/api_c/c_pindex.html:139: /db-4.5.20/docs/api_c/c_pindex.html:447: /db-4.5.20/docs/api_c/env_lsn_reset.html:57:
    DB_ENCRYPT
    The file contains encrypted databases. /db-4.5.20/docs/api_c/db_set_encrypt.html:1: /db-4.5.20/docs/api_c/db_set_encrypt.html:2: /db-4.5.20/docs/api_c/db_set_encrypt.html:8:Berkeley DB: DB->set_encrypt /db-4.5.20/docs/api_c/db_set_encrypt.html:15:

    DB->set_encrypt

    /db-4.5.20/docs/api_c/db_set_encrypt.html:27:DB->set_encrypt(DB *db, const char *passwd, u_int32_t flags); /db-4.5.20/docs/api_c/db_set_encrypt.html:30:DB->get_encrypt_flags(DB *db, u_int32_t *flagsp); /db-4.5.20/docs/api_c/db_set_encrypt.html:33:

    Description: DB->set_encrypt

    /db-4.5.20/docs/api_c/db_set_encrypt.html:39:

    The DB->set_encrypt method may not be called after the DB->open method is called. /db-4.5.20/docs/api_c/db_set_encrypt.html:41:

    The DB->set_encrypt method /db-4.5.20/docs/api_c/db_set_encrypt.html:50:

    DB_ENCRYPT_AES
    Use the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.5.20/docs/api_c/db_set_encrypt.html:58:

    The DB->set_encrypt method /db-4.5.20/docs/api_c/db_set_encrypt.html:70:

    Description: DB->get_encrypt_flags

    /db-4.5.20/docs/api_c/db_set_encrypt.html:71:

    The DB->get_encrypt_flags method returns the encryption flags.

    /db-4.5.20/docs/api_c/db_set_encrypt.html:72:

    The DB->get_encrypt_flags method may be called at any time during the life of the /db-4.5.20/docs/api_c/db_set_encrypt.html:74:

    The DB->get_encrypt_flags method /db-4.5.20/docs/api_c/db_set_encrypt.html:80:

    flagsp
    The DB->get_encrypt_flags method returns the /db-4.5.20/docs/api_c/db_list.html:42:
    /db-4.5.20/docs/api_c/env_set_encrypt.html:1: /db-4.5.20/docs/api_c/env_set_encrypt.html:7:Berkeley DB: DB_ENV->set_encrypt /db-4.5.20/docs/api_c/env_set_encrypt.html:14:

    DB_ENV->set_encrypt

    /db-4.5.20/docs/api_c/env_set_encrypt.html:26:DB_ENV->set_encrypt(DB_ENV *dbenv, const char *passwd, u_int32_t flags); /db-4.5.20/docs/api_c/env_set_encrypt.html:29:DB_ENV->get_encrypt_flags(DB_ENV *dbenv, u_int32_t *flagsp); /db-4.5.20/docs/api_c/env_set_encrypt.html:32:

    Description: DB_ENV->set_encrypt

    /db-4.5.20/docs/api_c/env_set_encrypt.html:35:

    The DB_ENV->set_encrypt method configures a database environment, not only operations /db-4.5.20/docs/api_c/env_set_encrypt.html:37:

    The DB_ENV->set_encrypt method may not be called after the DB_ENV->open method is /db-4.5.20/docs/api_c/env_set_encrypt.html:40:DB_ENV->open is called, the information specified to DB_ENV->set_encrypt /db-4.5.20/docs/api_c/env_set_encrypt.html:44:

    The DB_ENV->set_encrypt method /db-4.5.20/docs/api_c/env_set_encrypt.html:53:

    DB_ENCRYPT_AES
    Use the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.5.20/docs/api_c/env_set_encrypt.html:61:

    The DB_ENV->set_encrypt method /db-4.5.20/docs/api_c/env_set_encrypt.html:73:

    Description: DB_ENV->get_encrypt_flags

    /db-4.5.20/docs/api_c/env_set_encrypt.html:74:

    The DB_ENV->get_encrypt_flags method returns the encryption flags.

    /db-4.5.20/docs/api_c/env_set_encrypt.html:75:

    The DB_ENV->get_encrypt_flags method may be called at any time during the life of the /db-4.5.20/docs/api_c/env_set_encrypt.html:77:

    The DB_ENV->get_encrypt_flags method /db-4.5.20/docs/api_c/env_set_encrypt.html:83:

    flagsp
    The DB_ENV->get_encrypt_flags method returns the /db-4.5.20/docs/api_c/db_set_flags.html:50:filestore. Berkeley DB uses the SHA1 Secure Hash Algorithm /db-4.5.20/docs/api_c/db_set_flags.html:62:
    DB_ENCRYPT
    Encrypt the database using the cryptographic password specified to the /db-4.5.20/docs/api_c/db_set_flags.html:63:DB_ENV->set_encrypt or DB->set_encrypt methods. /db-4.5.20/docs/api_c/db_set_flags.html:64:

    Calling DB->set_flags with the DB_ENCRYPT flag only affects the /db-4.5.20/docs/api_c/db_set_flags.html:67:

    If the database already exists when DB->open is called, the DB_ENCRYPT /db-4.5.20/docs/api_c/env_fileid_reset.html:51:

    DB_ENCRYPT
    The file contains encrypted databases. /db-4.5.20/docs/api_cxx/api_core.html:41:
    /db-4.5.20/docs/api_cxx/api_core.html:130: /db-4.5.20/docs/api_cxx/cxx_pindex.html:138: /db-4.5.20/docs/api_cxx/cxx_pindex.html:139: /db-4.5.20/docs/api_cxx/cxx_pindex.html:140: /db-4.5.20/docs/api_cxx/cxx_pindex.html:442: /db-4.5.20/docs/api_cxx/env_list.html:37: /db-4.5.20/docs/api_cxx/pindex.src:45:__APIREL__/api_cxx/db_set_encrypt.html__OCT__DB_ENCRYPT_AES Db::set_encrypt@DB_ENCRYPT_AES /db-4.5.20/docs/api_cxx/pindex.src:51:__APIREL__/api_cxx/db_set_flags.html__OCT__DB_ENCRYPT Db::set_flags@DB_ENCRYPT /db-4.5.20/docs/api_cxx/pindex.src:154:__APIREL__/api_cxx/env_set_encrypt.html__OCT__DB_ENCRYPT_AES DbEnv::set_encrypt@DB_ENCRYPT_AES /db-4.5.20/docs/api_cxx/env_lsn_reset.html:58:
    DB_ENCRYPT
    The file contains encrypted databases. /db-4.5.20/docs/api_cxx/db_set_encrypt.html:1: /db-4.5.20/docs/api_cxx/db_set_encrypt.html:2: /db-4.5.20/docs/api_cxx/db_set_encrypt.html:8:Berkeley DB: Db::set_encrypt /db-4.5.20/docs/api_cxx/db_set_encrypt.html:15:

    Db::set_encrypt

    /db-4.5.20/docs/api_cxx/db_set_encrypt.html:27:Db::set_encrypt(const char *passwd, u_int32_t flags); /db-4.5.20/docs/api_cxx/db_set_encrypt.html:30:Db::get_encrypt_flags(u_int32_t *flagsp); /db-4.5.20/docs/api_cxx/db_set_encrypt.html:33:

    Description: Db::set_encrypt

    /db-4.5.20/docs/api_cxx/db_set_encrypt.html:39:

    The Db::set_encrypt method may not be called after the Db::open method is called. /db-4.5.20/docs/api_cxx/db_set_encrypt.html:41:

    The Db::set_encrypt method /db-4.5.20/docs/api_cxx/db_set_encrypt.html:51:

    DB_ENCRYPT_AES
    Use the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.5.20/docs/api_cxx/db_set_encrypt.html:59:

    The Db::set_encrypt method /db-4.5.20/docs/api_cxx/db_set_encrypt.html:74:

    Description: Db::get_encrypt_flags

    /db-4.5.20/docs/api_cxx/db_set_encrypt.html:75:

    The Db::get_encrypt_flags method returns the encryption flags.

    /db-4.5.20/docs/api_cxx/db_set_encrypt.html:76:

    The Db::get_encrypt_flags method may be called at any time during the life of the /db-4.5.20/docs/api_cxx/db_set_encrypt.html:78:

    The Db::get_encrypt_flags method /db-4.5.20/docs/api_cxx/db_set_encrypt.html:85:

    flagsp
    The Db::get_encrypt_flags method returns the /db-4.5.20/docs/api_cxx/db_list.html:42:
    /db-4.5.20/docs/api_cxx/env_set_encrypt.html:1: /db-4.5.20/docs/api_cxx/env_set_encrypt.html:7:Berkeley DB: DbEnv::set_encrypt /db-4.5.20/docs/api_cxx/env_set_encrypt.html:14:

    DbEnv::set_encrypt

    /db-4.5.20/docs/api_cxx/env_set_encrypt.html:26:DbEnv::set_encrypt(const char *passwd, u_int32_t flags); /db-4.5.20/docs/api_cxx/env_set_encrypt.html:29:DbEnv::get_encrypt_flags(u_int32_t *flagsp); /db-4.5.20/docs/api_cxx/env_set_encrypt.html:32:

    Description: DbEnv::set_encrypt

    /db-4.5.20/docs/api_cxx/env_set_encrypt.html:35:

    The DbEnv::set_encrypt method configures a database environment, not only operations /db-4.5.20/docs/api_cxx/env_set_encrypt.html:37:

    The DbEnv::set_encrypt method may not be called after the DbEnv::open method is /db-4.5.20/docs/api_cxx/env_set_encrypt.html:40:DbEnv::open is called, the information specified to DbEnv::set_encrypt /db-4.5.20/docs/api_cxx/env_set_encrypt.html:44:

    The DbEnv::set_encrypt method /db-4.5.20/docs/api_cxx/env_set_encrypt.html:54:

    DB_ENCRYPT_AES
    Use the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.5.20/docs/api_cxx/env_set_encrypt.html:62:

    The DbEnv::set_encrypt method /db-4.5.20/docs/api_cxx/env_set_encrypt.html:77:

    Description: DbEnv::get_encrypt_flags

    /db-4.5.20/docs/api_cxx/env_set_encrypt.html:78:

    The DbEnv::get_encrypt_flags method returns the encryption flags.

    /db-4.5.20/docs/api_cxx/env_set_encrypt.html:79:

    The DbEnv::get_encrypt_flags method may be called at any time during the life of the /db-4.5.20/docs/api_cxx/env_set_encrypt.html:81:

    The DbEnv::get_encrypt_flags method /db-4.5.20/docs/api_cxx/env_set_encrypt.html:88:

    flagsp
    The DbEnv::get_encrypt_flags method returns the /db-4.5.20/docs/api_cxx/db_set_flags.html:50:filestore. Berkeley DB uses the SHA1 Secure Hash Algorithm /db-4.5.20/docs/api_cxx/db_set_flags.html:62:
    DB_ENCRYPT
    Encrypt the database using the cryptographic password specified to the /db-4.5.20/docs/api_cxx/db_set_flags.html:63:DbEnv::set_encrypt or Db::set_encrypt methods. /db-4.5.20/docs/api_cxx/db_set_flags.html:64:

    Calling Db::set_flags with the DB_ENCRYPT flag only affects the /db-4.5.20/docs/api_cxx/db_set_flags.html:67:

    If the database already exists when Db::open is called, the DB_ENCRYPT /db-4.5.20/docs/api_cxx/env_fileid_reset.html:52:

    DB_ENCRYPT
    The file contains encrypted databases. Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/gsg_txn/C/BerkeleyDB-Core-C-Txn.pdf odpovídá Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/gsg_txn/CXX/BerkeleyDB-Core-Cxx-Txn.pdf odpovídá Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/gsg_txn/JAVA/BerkeleyDB-Core-JAVA-Txn.pdf odpovídá Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/gsg/C/BerkeleyDB-Core-C-GSG.pdf odpovídá /db-4.5.20/docs/gsg/C/btree.html:476: is a pointer to a function that has the following signature: /db-4.5.20/docs/gsg/CXX/btree.html:464: is a pointer to a function that has the following signature: Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/gsg/CXX/BerkeleyDB-Core-Cxx-GSG.pdf odpovídá Binární soubor /home/mitr/hash/grep-many/source/db-4.5.20/docs/collections/tutorial/BerkeleyDB-Java-Collections.pdf odpovídá /db-4.5.20/docs/ref/upgrade.4.2/cksum.html:7:Berkeley DB Reference Guide: Release 4.2: DB_CHKSUM_SHA1 /db-4.5.20/docs/ref/upgrade.4.2/cksum.html:17:

    Release 4.2: DB_CHKSUM_SHA1

    /db-4.5.20/docs/ref/upgrade.4.2/cksum.html:19:from DB_CHKSUM_SHA1 to DB_CHKSUM, as Berkeley DB uses an internal /db-4.5.20/docs/ref/upgrade.4.2/cksum.html:21:the SHA1 Secure Hash Algorithm. Berkeley DB continues to use the SHA1 Secure /db-4.5.20/docs/ref/upgrade.4.2/cksum.html:23:Applications using the DB_CHKSUM_SHA1 flag should change that use to /db-4.5.20/docs/ref/upgrade.4.2/toc.html:23:
  • Release 4.2: DB_CHKSUM_SHA1 /db-4.5.20/docs/ref/refs/hash_usenix.ps:10284:4040(des-)X /db-4.5.20/docs/ref/am/ops.html:61:
  • /db-4.5.20/docs/ref/distrib/layout.html:57: /db-4.5.20/docs/ref/toc.html:127:
  • Encryption /db-4.5.20/docs/ref/env/security.html:15:

  • PrevRefNext /db-4.6.21/docs/ref/env/encrypt.html:1: /db-4.6.21/docs/ref/env/encrypt.html:18:

    Berkeley DB optionally supports encryption using the Rijndael/AES (also known /db-4.6.21/docs/ref/env/encrypt.html:23:encrypted information is additionally checksummed using the SHA1 Secure /db-4.6.21/docs/ref/env/encrypt.html:35:encryption by calling the DB_ENV->set_encrypt or /db-4.6.21/docs/ref/env/encrypt.html:36:DB->set_encrypt methods, applications must specify the /db-4.6.21/docs/ref/env/encrypt.html:37:DB_ENCRYPT flag before creating the database in order for the /db-4.6.21/docs/ref/env/encrypt.html:79:Rijndael/AES code used in Berkeley DB. /db-4.6.21/docs/ref/env/encrypt.html:80:

  • Steve Reid and James H. Brown for writing the SHA1 checksum code used /db-4.6.21/docs/ref/env/encrypt.html:84:
  • Adam Stubblefield for integrating the Rijndael/AES, SHA1 checksum and /db-4.6.21/docs/ref/rep/intro.html:68:For example, the application may choose to encrypt data, use a secure /db-4.6.21/docs/ref/upgrade.4.3/err.html:17:

    The signature of the error callback passed to the /db-4.6.21/docs/ref/changelog/4.0.14.html:237:

  • Correct the Java secondary_key_create method signature. [#4777] /db-4.6.21/docs/ref/changelog/4.1.24.html:25:
  • Berkeley DB now includes support for database encryption using the AES /db-4.6.21/docs/ref/changelog/4.2.52.html:154:
  • Rename the DB_CHKSUM_SHA1 to DB_CHKSUM as Berkeley DB only uses SHA1 /db-4.6.21/docs/ref/changelog/4.2.52.html:333:
  • Fix a bug in the C++ DbEnv::set_rep_transport signature so that the /db-4.6.21/docs/ref/changelog/4.3.29.html:74:
  • Change the signature of the error callback passed to the /db-4.6.21/docs/ref/changelog/4.3.29.html:91:
  • Simplify the signature of substitute system calls for ftruncate and /db-4.6.21/docs/api_tcl/db_rename.html:23: [-encrypt] /db-4.6.21/docs/api_tcl/db_rename.html:41:
    -encrypt
    Specify the database in an environment is encrypted with the /db-4.6.21/docs/api_tcl/db_rename.html:44:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs/api_tcl/db_remove.html:23: [-encrypt] /db-4.6.21/docs/api_tcl/db_remove.html:40:
    -encrypt
    Specify the database in an environment is encrypted with the /db-4.6.21/docs/api_tcl/db_remove.html:43:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs/api_tcl/db_open.html:30: [-encrypt] /db-4.6.21/docs/api_tcl/db_open.html:118:
    -encrypt
    Specify the database in an environment should be encrypted with the /db-4.6.21/docs/api_tcl/db_open.html:121:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs/api_tcl/env_open.html:76:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/qam/qam_open.c:144: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP)); /db-4.6.21/qam/qam_open.c:249: if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.6.21/qam/qam_open.c:250: meta->dbmeta.encrypt_alg = /db-4.6.21/qam/qam_open.c:252: DB_ASSERT(dbenv, meta->dbmeta.encrypt_alg != 0); /db-4.6.21/qam/qam_open.c:334: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP)); /db-4.6.21/build_wince/db_small.vcp:487:SOURCE=..\hmac\hmac.c /db-4.6.21/build_wince/db_small.vcp:491:SOURCE=..\hmac\sha1.c /db-4.6.21/build_wince/db_static.vcp:275:SOURCE=..\crypto\aes_method.c /db-4.6.21/build_wince/db_static.vcp:287:SOURCE=..\crypto\rijndael\rijndael-alg-fst.c /db-4.6.21/build_wince/db_static.vcp:291:SOURCE=..\crypto\rijndael\rijndael-api-fst.c /db-4.6.21/build_wince/db_static.vcp:559:SOURCE=..\hmac\hmac.c /db-4.6.21/build_wince/db_static.vcp:563:SOURCE=..\hmac\sha1.c /db-4.6.21/build_wince/db_static.vcproj:1600: RelativePath="..\crypto\aes_method.c" /db-4.6.21/build_wince/db_static.vcproj:1720: RelativePath="..\crypto\rijndael\rijndael-alg-fst.c" /db-4.6.21/build_wince/db_static.vcproj:1760: RelativePath="..\crypto\rijndael\rijndael-api-fst.c" /db-4.6.21/build_wince/db_static.vcproj:4440: RelativePath="..\hmac\hmac.c" /db-4.6.21/build_wince/db_static.vcproj:4480: RelativePath="..\hmac\sha1.c" /db-4.6.21/build_wince/db.h:352: * Flags private to DB_ENV->set_encrypt. /db-4.6.21/build_wince/db.h:354:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */ /db-4.6.21/build_wince/db.h:406:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */ /db-4.6.21/build_wince/db.h:1701: int (*get_encrypt_flags) __P((DB *, u_int32_t *)); /db-4.6.21/build_wince/db.h:1743: int (*set_encrypt) __P((DB *, const char *, u_int32_t)); /db-4.6.21/build_wince/db.h:1813:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */ /db-4.6.21/build_wince/db.h:2321: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *)); /db-4.6.21/build_wince/db.h:2432: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t)); /db-4.6.21/build_wince/db_small.vcproj:3720: RelativePath="..\hmac\hmac.c" /db-4.6.21/build_wince/db_small.vcproj:3760: RelativePath="..\hmac\sha1.c" /db-4.6.21/docs_src/tcl/db_rename.so:8: m4_tcl_arg([-encrypt]) /db-4.6.21/docs_src/tcl/db_rename.so:33:m4_tag([-encrypt], [dnl /db-4.6.21/docs_src/tcl/db_rename.so:39:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs_src/tcl/db_open.so:15: m4_tcl_arg([-encrypt]) /db-4.6.21/docs_src/tcl/db_open.so:111:m4_tag([-encrypt], [dnl /db-4.6.21/docs_src/tcl/db_open.so:117:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs_src/tcl/env_open.so:54:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs_src/tcl/db_remove.so:8: m4_tcl_arg([-encrypt]) /db-4.6.21/docs_src/tcl/db_remove.so:32:m4_tag([-encrypt], [dnl /db-4.6.21/docs_src/tcl/db_remove.so:38:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs_src/spell.ok:6:AES /db-4.6.21/docs_src/spell.ok:254:Rijndael /db-4.6.21/docs_src/spell.ok:256:SHA /db-4.6.21/docs_src/m4/m4.links:102:$1, dbenv_get_encrypt_flags, _m4_ref(DB_ENV-__GT__get_encrypt_flags, DbEnv, get_encrypt_flags, env_set_encrypt), /db-4.6.21/docs_src/m4/m4.links:139:$1, dbenv_set_encrypt, _m4_ref(DB_ENV-__GT__set_encrypt, DbEnv, set_encrypt, env_set_encrypt), /db-4.6.21/docs_src/m4/m4.links:193:$1, dbh_get_encrypt_flags, _m4_ref(DB-__GT__get_encrypt_flags, Db, get_encrypt_flags, db_set_encrypt), /db-4.6.21/docs_src/m4/m4.links:215:$1, dbh_is_encrypted, _m4_ref(NOAPI, Db, is_encrypted, db_set_encrypt), /db-4.6.21/docs_src/m4/m4.links:230:$1, dbh_set_encrypt, _m4_ref(DB-__GT__set_encrypt, Db, set_encrypt, db_set_encrypt), /db-4.6.21/docs_src/m4/m4.links:564:$1, DB_ENCRYPT, [_m4_nref($1, $1, db_set_flags)], /db-4.6.21/docs_src/m4/m4.links:565:$1, DB_ENCRYPT_AES, [_m4_nref($1, $1, env_set_encrypt)], /db-4.6.21/docs_src/env/env_set_encrypt.so:1:m4_comment([$Id: env_set_encrypt.so,v 10.23 2004/09/28 15:04:20 bostic Exp $]) /db-4.6.21/docs_src/env/env_set_encrypt.so:3:ifdef([M4INTERFACE],, [define(M4INTERFACE, dbenv_set_encrypt)]) /db-4.6.21/docs_src/env/env_set_encrypt.so:5: dbenv_set_encrypt, dbenv_get_encrypt_flags, dbh_get_encrypt_flags)) /db-4.6.21/docs_src/env/env_set_encrypt.so:10:ifelse(M4INTERFACE, dbenv_set_encrypt, [dnl /db-4.6.21/docs_src/env/env_set_encrypt.so:11:m4_pf_header(m4_ref(dbenv_set_encrypt), /db-4.6.21/docs_src/env/env_set_encrypt.so:14:DB_ENV-__GT__set_encrypt(DB_ENV *dbenv, const char *passwd, u_int32_t flags); /db-4.6.21/docs_src/env/env_set_encrypt.so:17:DB_ENV-__GT__get_encrypt_flags(DB_ENV *dbenv, u_int32_t *flagsp); /db-4.6.21/docs_src/env/env_set_encrypt.so:21:DbEnv::set_encrypt(const char *passwd, u_int32_t flags); /db-4.6.21/docs_src/env/env_set_encrypt.so:24:DbEnv::get_encrypt_flags(u_int32_t *flagsp); /db-4.6.21/docs_src/env/env_set_encrypt.so:26:m4_pf_header(m4_ref(dbh_set_encrypt), /db-4.6.21/docs_src/env/env_set_encrypt.so:29:DB-__GT__set_encrypt(DB *db, const char *passwd, u_int32_t flags); /db-4.6.21/docs_src/env/env_set_encrypt.so:32:DB-__GT__get_encrypt_flags(DB *db, u_int32_t *flagsp); /db-4.6.21/docs_src/env/env_set_encrypt.so:36:Db::set_encrypt(const char *passwd, u_int32_t flags); /db-4.6.21/docs_src/env/env_set_encrypt.so:39:Db::get_encrypt_flags(u_int32_t *flagsp); /db-4.6.21/docs_src/env/env_set_encrypt.so:46:ifelse(M4INTERFACE, dbenv_set_encrypt, [dnl /db-4.6.21/docs_src/env/env_set_encrypt.so:47:m4_scope_env(dbenv_set_encrypt) /db-4.6.21/docs_src/env/env_set_encrypt.so:48:m4_when_envopen(dbenv_set_encrypt, error) /db-4.6.21/docs_src/env/env_set_encrypt.so:49:m4_return(dbenv_set_encrypt, std) /db-4.6.21/docs_src/env/env_set_encrypt.so:55:m4_when_dbopen(dbh_set_encrypt) /db-4.6.21/docs_src/env/env_set_encrypt.so:56:m4_return(dbh_set_encrypt, std) /db-4.6.21/docs_src/env/env_set_encrypt.so:64:m4_tag(m4_idef(DB_ENCRYPT_AES), [dnl /db-4.6.21/docs_src/env/env_set_encrypt.so:65:Use the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.6.21/docs_src/env/env_set_encrypt.so:77:m4_ref(ifelse(M4INTERFACE, dbenv_set_encrypt, [dbenv_open], [dbh_open])) /db-4.6.21/docs_src/env/env_set_encrypt.so:83:ifelse(M4INTERFACE, dbenv_set_encrypt, [m4_seealso(DbEnv)], [m4_seealso(Db)]) /db-4.6.21/docs_src/env/Makefile:19: env_set_encrypt.html \ /db-4.6.21/docs_src/env/env_lsn_reset.so:49:m4_tag(DB_ENCRYPT, [dnl /db-4.6.21/docs_src/env/env_fileid_reset.so:41:m4_tag(DB_ENCRYPT, [dnl /db-4.6.21/docs_src/env/api_core.so:32:m4_comment([Db::set_encrypt])m4_table_element(m4_ref(dbh_set_encrypt), Set the database cryptographic key) /db-4.6.21/docs_src/env/api_core.so:127:m4_comment([DbEnv::set_encrypt])m4_table_element(m4_ref(dbenv_set_encrypt), Set the environment cryptographic key) /db-4.6.21/docs_src/env/m4.methods:28:m4_comment([DbEnv::set_encrypt])m4_table_element(m4_ref(dbenv_set_encrypt), Set the environment cryptographic key) /db-4.6.21/docs_src/db/db_set_flags.so:5: DB_ENCRYPT, DB_INORDER, DB_RECNUM, DB_REVSPLITOFF, DB_RENUMBER, /db-4.6.21/docs_src/db/db_set_flags.so:87:filestore. m4_db uses the SHA1 Secure Hash Algorithm /db-4.6.21/docs_src/db/db_set_flags.so:96:m4_tag(m4_idef(DB_ENCRYPT), [dnl /db-4.6.21/docs_src/db/db_set_flags.so:97:Encrypt the database using the cryptographic password specified to the /db-4.6.21/docs_src/db/db_set_flags.so:98:m4_ref(dbenv_set_encrypt) or m4_refT(dbh_set_encrypt)s. /db-4.6.21/docs_src/db/db_set_flags.so:99:m4_scope_dbh_flags(DB_ENCRYPT) /db-4.6.21/docs_src/db/db_set_flags.so:100:m4_db_flag_open(DB_ENCRYPT, error) /db-4.6.21/docs_src/db/Makefile:29: db_set_encrypt.html \ /db-4.6.21/docs_src/db/db_set_encrypt.so:1:m4_comment([$Id: db_set_encrypt.so,v 10.3 2002/08/18 21:15:54 bostic Exp $]) /db-4.6.21/docs_src/db/db_set_encrypt.so:3:define(M4INTERFACE, dbh_set_encrypt) /db-4.6.21/docs_src/db/db_set_encrypt.so:4:include(env/env_set_encrypt.so) /db-4.6.21/docs_src/db/m4.methods:35:m4_comment([Db::set_encrypt])m4_table_element(m4_ref(dbh_set_encrypt), Set the database cryptographic key) /db-4.6.21/docs_src/ref/upgrade.4.2/toc.so:11:m4_nlistns([m4_link(cksum, [Release 4.2: DB_CHKSUM_SHA1])]) /db-4.6.21/docs_src/ref/upgrade.4.2/cksum.so:4: Release 4.2: DB_CHKSUM_SHA1,, /db-4.6.21/docs_src/ref/upgrade.4.2/cksum.so:9:from DB_CHKSUM_SHA1 to m4_ref(DB_CHKSUM), as m4_db uses an internal /db-4.6.21/docs_src/ref/upgrade.4.2/cksum.so:11:the SHA1 Secure Hash Algorithm. m4_db continues to use the SHA1 Secure /db-4.6.21/docs_src/ref/upgrade.4.2/cksum.so:13:Applications using the DB_CHKSUM_SHA1 flag should change that use to /db-4.6.21/docs_src/ref/refs/hash_usenix.ps:10284:4040(des-)X /db-4.6.21/docs_src/ref/spell.ok:12:AES /db-4.6.21/docs_src/ref/spell.ok:409:Rijndael /db-4.6.21/docs_src/ref/spell.ok:419:SHA /db-4.6.21/docs_src/ref/spell.ok:881:hmac /db-4.6.21/docs_src/ref/distrib/layout.so:49:m4_table_element(hmac, Checksum support) /db-4.6.21/docs_src/ref/toc.html:127:
  • Encryption /db-4.6.21/docs_src/ref/env/remote.so:5: [remote @filesystems, NFS problems], env/encrypt, env/faq) /db-4.6.21/docs_src/ref/env/Makefile:3:BUILD= create.html db_config.html encrypt.html error.html faq.html \ /db-4.6.21/docs_src/ref/env/encrypt.so:1:m4_comment([$Id: encrypt.so,v 11.13 2007/03/27 14:20:56 sue Exp $]) /db-4.6.21/docs_src/ref/env/encrypt.so:6:m4_db optionally supports encryption using the Rijndael/AES (also known /db-4.6.21/docs_src/ref/env/encrypt.so:11:encrypted information is additionally checksummed using the SHA1 Secure /db-4.6.21/docs_src/ref/env/encrypt.so:28:encryption by calling the m4_ref(dbenv_set_encrypt) or /db-4.6.21/docs_src/ref/env/encrypt.so:29:m4_refT(dbh_set_encrypt)s, applications must specify the /db-4.6.21/docs_src/ref/env/encrypt.so:30:m4_ref(DB_ENCRYPT) flag before creating the database in order for the /db-4.6.21/docs_src/ref/env/encrypt.so:85:Rijndael/AES code used in m4_db.]) /db-4.6.21/docs_src/ref/env/encrypt.so:87:Steve Reid and James H. Brown for writing the SHA1 checksum code used /db-4.6.21/docs_src/ref/env/encrypt.so:93:Adam Stubblefield for integrating the Rijndael/AES, SHA1 checksum and /db-4.6.21/docs_src/ref/env/security.so:3:m4_ref_title(Environment, Security, @security, env/region, env/encrypt) /db-4.6.21/docs_src/ref/rep/intro.so:70:For example, the application may choose to encrypt data, use a secure /db-4.6.21/docs_src/ref/upgrade.4.3/err.so:8:The signature of the error callback passed to the /db-4.6.21/docs_src/ref/changelog/4.0.14.html:237:
  • Correct the Java secondary_key_create method signature. [#4777] /db-4.6.21/docs_src/ref/changelog/4.1.24.html:25:
  • Berkeley DB now includes support for database encryption using the AES /db-4.6.21/docs_src/ref/changelog/4.2.52.html:154:
  • Rename the DB_CHKSUM_SHA1 to DB_CHKSUM as Berkeley DB only uses SHA1 /db-4.6.21/docs_src/ref/changelog/4.2.52.html:333:
  • Fix a bug in the C++ DbEnv::set_rep_transport signature so that the /db-4.6.21/docs_src/ref/changelog/4.3.29.html:74:
  • Change the signature of the error callback passed to the /db-4.6.21/docs_src/ref/changelog/4.3.29.html:91:
  • Simplify the signature of substitute system calls for ftruncate and /db-4.6.21/db_archive/db_archive.c:113: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/db_archive/db_archive.c:114: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_s60/bdb_s60.mmp:89:SOURCE ..\hmac\hmac.c /db-4.6.21/build_s60/bdb_s60.mmp:90:SOURCE ..\hmac\sha1.c /db-4.6.21/build_s60/db.h:304: * Flags private to DB_ENV->set_encrypt. /db-4.6.21/build_s60/db.h:306:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */ /db-4.6.21/build_s60/db.h:358:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */ /db-4.6.21/build_s60/db.h:1653: int (*get_encrypt_flags) __P((DB *, u_int32_t *)); /db-4.6.21/build_s60/db.h:1695: int (*set_encrypt) __P((DB *, const char *, u_int32_t)); /db-4.6.21/build_s60/db.h:1765:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */ /db-4.6.21/build_s60/db.h:2273: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *)); /db-4.6.21/build_s60/db.h:2384: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t)); /db-4.6.21/hash/hash_open.c:268: if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.6.21/hash/hash_open.c:269: meta->dbmeta.encrypt_alg = /db-4.6.21/hash/hash_open.c:271: DB_ASSERT(dbenv, meta->dbmeta.encrypt_alg != 0); /db-4.6.21/hash/hash_open.c:386: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP)); /db-4.6.21/java/src/com/sleepycat/util/ExceptionWrapper.java:30: *

    This method is intentionally defined to be the same signature as the /db-4.6.21/java/src/com/sleepycat/db/internal/DbConstants.java:34: int DB_ENCRYPT = 0x00020000; /db-4.6.21/java/src/com/sleepycat/db/internal/DbConstants.java:35: int DB_ENCRYPT_AES = 0x0000001; /db-4.6.21/java/src/com/sleepycat/db/internal/Db.java:324: public int get_encrypt_flags() throws com.sleepycat.db.DatabaseException { return db_javaJNI.Db_get_encrypt_flags(swigCPtr); } /db-4.6.21/java/src/com/sleepycat/db/internal/Db.java:408: public void set_encrypt(String passwd, int flags) throws com.sleepycat.db.DatabaseException { db_javaJNI.Db_set_encrypt(swigCPtr, passwd, flags); } /db-4.6.21/java/src/com/sleepycat/db/internal/db_javaJNI.java:93: public final static native int Db_get_encrypt_flags(long jarg1) throws com.sleepycat.db.DatabaseException; /db-4.6.21/java/src/com/sleepycat/db/internal/db_javaJNI.java:124: public final static native void Db_set_encrypt(long jarg1, String jarg2, int jarg3) throws com.sleepycat.db.DatabaseException; /db-4.6.21/java/src/com/sleepycat/db/internal/db_javaJNI.java:162: public final static native int DbEnv_get_encrypt_flags(long jarg1) throws com.sleepycat.db.DatabaseException; /db-4.6.21/java/src/com/sleepycat/db/internal/db_javaJNI.java:177: public final static native void DbEnv_set_encrypt(long jarg1, String jarg2, int jarg3) throws com.sleepycat.db.DatabaseException; /db-4.6.21/java/src/com/sleepycat/db/internal/DbEnv.java:289: public int get_encrypt_flags() throws com.sleepycat.db.DatabaseException { return db_javaJNI.DbEnv_get_encrypt_flags(swigCPtr); } /db-4.6.21/java/src/com/sleepycat/db/internal/DbEnv.java:323: public void set_encrypt(String passwd, int flags) throws com.sleepycat.db.DatabaseException { db_javaJNI.DbEnv_set_encrypt(swigCPtr, passwd, flags); } /db-4.6.21/java/src/com/sleepycat/db/EnvironmentConfig.java:1246: dbenv.set_encrypt(password, DbConstants.DB_ENCRYPT_AES); /db-4.6.21/java/src/com/sleepycat/db/EnvironmentConfig.java:1417: password = (dbenv.get_encrypt_flags() == 0) ? null : ""; /db-4.6.21/java/src/com/sleepycat/db/Environment.java:390: dbenv.fileid_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0); /db-4.6.21/java/src/com/sleepycat/db/Environment.java:396: dbenv.lsn_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0); /db-4.6.21/java/src/com/sleepycat/db/DatabaseConfig.java:545: dbFlags |= (password != null) ? DbConstants.DB_ENCRYPT : 0; /db-4.6.21/java/src/com/sleepycat/db/DatabaseConfig.java:570: db.set_encrypt(password, DbConstants.DB_ENCRYPT_AES); /db-4.6.21/java/src/com/sleepycat/db/DatabaseConfig.java:649: password = ((dbFlags & DbConstants.DB_ENCRYPT) != 0) ? "" : null; /db-4.6.21/tcl/tcl_db_pkg.c:513: ENV_ENCRYPT_AES, /db-4.6.21/tcl/tcl_db_pkg.c:514: ENV_ENCRYPT_ANY, /db-4.6.21/tcl/tcl_db_pkg.c:1117: case ENV_ENCRYPT_AES: /db-4.6.21/tcl/tcl_db_pkg.c:1127: ret = (*env)->set_encrypt(*env, passwd, DB_ENCRYPT_AES); /db-4.6.21/tcl/tcl_db_pkg.c:1129: "set_encrypt"); /db-4.6.21/tcl/tcl_db_pkg.c:1131: case ENV_ENCRYPT_ANY: /db-4.6.21/tcl/tcl_db_pkg.c:1141: ret = (*env)->set_encrypt(*env, passwd, 0); /db-4.6.21/tcl/tcl_db_pkg.c:1143: "set_encrypt"); /db-4.6.21/tcl/tcl_db_pkg.c:1451: "-encrypt", /db-4.6.21/tcl/tcl_db_pkg.c:1505: TCL_DB_ENCRYPT, /db-4.6.21/tcl/tcl_db_pkg.c:1506: TCL_DB_ENCRYPT_AES, /db-4.6.21/tcl/tcl_db_pkg.c:1507: TCL_DB_ENCRYPT_ANY, /db-4.6.21/tcl/tcl_db_pkg.c:1907: case TCL_DB_ENCRYPT: /db-4.6.21/tcl/tcl_db_pkg.c:1908: set_flags |= DB_ENCRYPT; /db-4.6.21/tcl/tcl_db_pkg.c:1910: case TCL_DB_ENCRYPT_AES: /db-4.6.21/tcl/tcl_db_pkg.c:1920: ret = (*dbp)->set_encrypt(*dbp, passwd, DB_ENCRYPT_AES); /db-4.6.21/tcl/tcl_db_pkg.c:1922: "set_encrypt"); /db-4.6.21/tcl/tcl_db_pkg.c:1924: case TCL_DB_ENCRYPT_ANY: /db-4.6.21/tcl/tcl_db_pkg.c:1934: ret = (*dbp)->set_encrypt(*dbp, passwd, 0); /db-4.6.21/tcl/tcl_db_pkg.c:1936: "set_encrypt"); /db-4.6.21/tcl/tcl_db_pkg.c:2505: "-encrypt", /db-4.6.21/tcl/tcl_db_pkg.c:2515: TCL_DBREM_ENCRYPT, /db-4.6.21/tcl/tcl_db_pkg.c:2516: TCL_DBREM_ENCRYPT_AES, /db-4.6.21/tcl/tcl_db_pkg.c:2517: TCL_DBREM_ENCRYPT_ANY, /db-4.6.21/tcl/tcl_db_pkg.c:2567: case TCL_DBREM_ENCRYPT: /db-4.6.21/tcl/tcl_db_pkg.c:2568: set_flags |= DB_ENCRYPT; /db-4.6.21/tcl/tcl_db_pkg.c:2571: case TCL_DBREM_ENCRYPT_AES: /db-4.6.21/tcl/tcl_db_pkg.c:2580: enc_flag = DB_ENCRYPT_AES; /db-4.6.21/tcl/tcl_db_pkg.c:2582: case TCL_DBREM_ENCRYPT_ANY: /db-4.6.21/tcl/tcl_db_pkg.c:2682: ret = dbp->set_encrypt(dbp, passwd, enc_flag); /db-4.6.21/tcl/tcl_db_pkg.c:2684: "set_encrypt"); /db-4.6.21/tcl/tcl_db_pkg.c:2724: "-encrypt", /db-4.6.21/tcl/tcl_db_pkg.c:2734: TCL_DBMV_ENCRYPT, /db-4.6.21/tcl/tcl_db_pkg.c:2735: TCL_DBMV_ENCRYPT_AES, /db-4.6.21/tcl/tcl_db_pkg.c:2736: TCL_DBMV_ENCRYPT_ANY, /db-4.6.21/tcl/tcl_db_pkg.c:2787: case TCL_DBMV_ENCRYPT: /db-4.6.21/tcl/tcl_db_pkg.c:2788: set_flags |= DB_ENCRYPT; /db-4.6.21/tcl/tcl_db_pkg.c:2791: case TCL_DBMV_ENCRYPT_AES: /db-4.6.21/tcl/tcl_db_pkg.c:2800: enc_flag = DB_ENCRYPT_AES; /db-4.6.21/tcl/tcl_db_pkg.c:2802: case TCL_DBMV_ENCRYPT_ANY: /db-4.6.21/tcl/tcl_db_pkg.c:2913: ret = dbp->set_encrypt(dbp, passwd, enc_flag); /db-4.6.21/tcl/tcl_db_pkg.c:2915: "set_encrypt"); /db-4.6.21/tcl/tcl_db_pkg.c:2956: "-encrypt", /db-4.6.21/tcl/tcl_db_pkg.c:2969: TCL_DBVRFY_ENCRYPT, /db-4.6.21/tcl/tcl_db_pkg.c:2970: TCL_DBVRFY_ENCRYPT_AES, /db-4.6.21/tcl/tcl_db_pkg.c:2971: TCL_DBVRFY_ENCRYPT_ANY, /db-4.6.21/tcl/tcl_db_pkg.c:3020: case TCL_DBVRFY_ENCRYPT: /db-4.6.21/tcl/tcl_db_pkg.c:3021: set_flags |= DB_ENCRYPT; /db-4.6.21/tcl/tcl_db_pkg.c:3024: case TCL_DBVRFY_ENCRYPT_AES: /db-4.6.21/tcl/tcl_db_pkg.c:3033: enc_flag = DB_ENCRYPT_AES; /db-4.6.21/tcl/tcl_db_pkg.c:3035: case TCL_DBVRFY_ENCRYPT_ANY: /db-4.6.21/tcl/tcl_db_pkg.c:3161: ret = dbp->set_encrypt(dbp, passwd, enc_flag); /db-4.6.21/tcl/tcl_db_pkg.c:3163: "set_encrypt"); /db-4.6.21/tcl/tcl_env.c:104: "get_encrypt_flags", /db-4.6.21/tcl/tcl_env.c:937: ENVREM_ENCRYPT_AES, /db-4.6.21/tcl/tcl_env.c:938: ENVREM_ENCRYPT_ANY, /db-4.6.21/tcl/tcl_env.c:986: case ENVREM_ENCRYPT_AES: /db-4.6.21/tcl/tcl_env.c:995: enc_flag = DB_ENCRYPT_AES; /db-4.6.21/tcl/tcl_env.c:997: case ENVREM_ENCRYPT_ANY: /db-4.6.21/tcl/tcl_env.c:1111: ret = e->set_encrypt(e, passwd, enc_flag); /db-4.6.21/tcl/tcl_env.c:1113: "set_encrypt"); /db-4.6.21/tcl/tcl_env.c:1222: "-encrypt", /db-4.6.21/tcl/tcl_env.c:1237: Tcl_WrongNumArgs(interp, 2, objv, "?-encrypt? filename"); /db-4.6.21/tcl/tcl_env.c:1248: flags |= DB_ENCRYPT; /db-4.6.21/tcl/tcl_env.c:1274: "-encrypt", /db-4.6.21/tcl/tcl_env.c:1289: Tcl_WrongNumArgs(interp, 2, objv, "?-encrypt? filename"); /db-4.6.21/tcl/tcl_env.c:1301: flags |= DB_ENCRYPT; /db-4.6.21/tcl/tcl_env.c:2246: * Implements the ENV->get_encrypt_flags command. /db-4.6.21/tcl/tcl_env.c:2263: } encrypt_flags[] = { /db-4.6.21/tcl/tcl_env.c:2264: { DB_ENCRYPT_AES, "-encryptaes" }, /db-4.6.21/tcl/tcl_env.c:2273: ret = dbenv->get_encrypt_flags(dbenv, &flags); /db-4.6.21/tcl/tcl_env.c:2275: "env get_encrypt_flags")) == TCL_OK) { /db-4.6.21/tcl/tcl_env.c:2278: for (i = 0; encrypt_flags[i].flag != 0; i++) /db-4.6.21/tcl/tcl_env.c:2279: if (LF_ISSET(encrypt_flags[i].flag)) { /db-4.6.21/tcl/tcl_env.c:2283: buf, encrypt_flags[i].arg, sizeof(buf)); /db-4.6.21/tcl/tcl_db.c:113: "get_encrypt_flags", /db-4.6.21/tcl/tcl_db.c:2575: { DB_ENCRYPT, "-encrypt" }, /db-4.6.21/libdb_java/db_java_wrap.c:1092: * Note: Different versions of the JNI disagree on the signature for /db-4.6.21/libdb_java/db_java_wrap.c:2410:SWIGINTERN u_int32_t Db_get_encrypt_flags(struct Db *self){ /db-4.6.21/libdb_java/db_java_wrap.c:2412: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret)) /db-4.6.21/libdb_java/db_java_wrap.c:2539:SWIGINTERN db_ret_t Db_set_encrypt(struct Db *self,char const *passwd,u_int32_t flags){ /db-4.6.21/libdb_java/db_java_wrap.c:2540: return self->set_encrypt(self, passwd, flags); /db-4.6.21/libdb_java/db_java_wrap.c:2684:SWIGINTERN u_int32_t DbEnv_get_encrypt_flags(struct DbEnv *self){ /db-4.6.21/libdb_java/db_java_wrap.c:2686: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret)) /db-4.6.21/libdb_java/db_java_wrap.c:2747:SWIGINTERN db_ret_t DbEnv_set_encrypt(struct DbEnv *self,char const *passwd,u_int32_t flags){ /db-4.6.21/libdb_java/db_java_wrap.c:2748: return self->set_encrypt(self, passwd, flags); /db-4.6.21/libdb_java/db_java_wrap.c:3797: result = (u_int32_t)Db_get_encrypt_flags(arg1); /db-4.6.21/libdb_java/db_java_wrap.c:4701: result = (db_ret_t)Db_set_encrypt(arg1,(char const *)arg2,arg3); /db-4.6.21/libdb_java/db_java_wrap.c:5806: result = (u_int32_t)DbEnv_get_encrypt_flags(arg1); /db-4.6.21/libdb_java/db_java_wrap.c:6201: result = (db_ret_t)DbEnv_set_encrypt(arg1,(char const *)arg2,arg3); /db-4.6.21/libdb_java/README:73: which includes the method signature and a call to the method. /db-4.6.21/libdb_java/java_util.i:969: * Note: Different versions of the JNI disagree on the signature for /db-4.6.21/libdb_java/db.i:196: u_int32_t get_encrypt_flags() { /db-4.6.21/libdb_java/db.i:198: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret)) /db-4.6.21/libdb_java/db.i:391: db_ret_t set_encrypt(const char *passwd, u_int32_t flags) { /db-4.6.21/libdb_java/db.i:392: return self->set_encrypt(self, passwd, flags); /db-4.6.21/libdb_java/db.i:679: u_int32_t get_encrypt_flags() { /db-4.6.21/libdb_java/db.i:681: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret)) /db-4.6.21/libdb_java/db.i:770: db_ret_t set_encrypt(const char *passwd, u_int32_t flags) { /db-4.6.21/libdb_java/db.i:771: return self->set_encrypt(self, passwd, flags); /db-4.6.21/build_windows/db_dll.dsp:527:SOURCE=..\crypto\aes_method.c /db-4.6.21/build_windows/db_dll.dsp:539:SOURCE=..\crypto\rijndael\rijndael-alg-fst.c /db-4.6.21/build_windows/db_dll.dsp:543:SOURCE=..\crypto\rijndael\rijndael-api-fst.c /db-4.6.21/build_windows/db_dll.dsp:859:SOURCE=..\hmac\hmac.c /db-4.6.21/build_windows/db_dll.dsp:863:SOURCE=..\hmac\sha1.c /db-4.6.21/build_windows/db.h:352: * Flags private to DB_ENV->set_encrypt. /db-4.6.21/build_windows/db.h:354:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */ /db-4.6.21/build_windows/db.h:406:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */ /db-4.6.21/build_windows/db.h:1701: int (*get_encrypt_flags) __P((DB *, u_int32_t *)); /db-4.6.21/build_windows/db.h:1743: int (*set_encrypt) __P((DB *, const char *, u_int32_t)); /db-4.6.21/build_windows/db.h:1813:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */ /db-4.6.21/build_windows/db.h:2321: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *)); /db-4.6.21/build_windows/db.h:2432: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t)); /db-4.6.21/build_windows/db_cxx.h:204: virtual int get_encrypt_flags(u_int32_t *); /db-4.6.21/build_windows/db_cxx.h:244: virtual int set_encrypt(const char *, u_int32_t); /db-4.6.21/build_windows/db_cxx.h:425: virtual int get_encrypt_flags(u_int32_t *); /db-4.6.21/build_windows/db_cxx.h:429: virtual int set_encrypt(const char *, u_int32_t); /db-4.6.21/build_windows/db_static.dsp:463:SOURCE=..\crypto\aes_method.c /db-4.6.21/build_windows/db_static.dsp:475:SOURCE=..\crypto\rijndael\rijndael-alg-fst.c /db-4.6.21/build_windows/db_static.dsp:479:SOURCE=..\crypto\rijndael\rijndael-api-fst.c /db-4.6.21/build_windows/db_static.dsp:795:SOURCE=..\hmac\hmac.c /db-4.6.21/build_windows/db_static.dsp:799:SOURCE=..\hmac\sha1.c /db-4.6.21/build_windows/db_small.dsp:711:SOURCE=..\hmac\hmac.c /db-4.6.21/build_windows/db_small.dsp:715:SOURCE=..\hmac\sha1.c /db-4.6.21/examples_cxx/getting_started/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce /db-4.6.21/examples_cxx/getting_started/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh /db-4.6.21/examples_cxx/getting_started/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine /db-4.6.21/dbinc/db_cxx.in:203: virtual int get_encrypt_flags(u_int32_t *); /db-4.6.21/dbinc/db_cxx.in:243: virtual int set_encrypt(const char *, u_int32_t); /db-4.6.21/dbinc/db_cxx.in:424: virtual int get_encrypt_flags(u_int32_t *); /db-4.6.21/dbinc/db_cxx.in:428: virtual int set_encrypt(const char *, u_int32_t); /db-4.6.21/dbinc/hmac.h:6: * $Id: hmac.h,v 12.6 2007/05/17 15:15:05 bostic Exp $ /db-4.6.21/dbinc/hmac.h:9:#ifndef _DB_HMAC_H_ /db-4.6.21/dbinc/hmac.h:10:#define _DB_HMAC_H_ /db-4.6.21/dbinc/hmac.h:20: * SHA1 checksumming /db-4.6.21/dbinc/hmac.h:26:} SHA1_CTX; /db-4.6.21/dbinc/hmac.h:29: * AES assumes the SHA1 checksumming (also called MAC) /db-4.6.21/dbinc/hmac.h:38:#include "dbinc_auto/hmac_ext.h" /db-4.6.21/dbinc/hmac.h:39:#endif /* !_DB_HMAC_H_ */ /db-4.6.21/dbinc/db_page.h:76: u_int8_t encrypt_alg; /* 24: Encryption algorithm. */ /db-4.6.21/dbinc/db_page.h:257: * DB_AM_ENCRYPT always implies DB_AM_CHKSUM so that must come first. /db-4.6.21/dbinc/db_page.h:261: (F_ISSET((dbp), DB_AM_ENCRYPT) ? sizeof(PG_CRYPTO) : \ /db-4.6.21/dbinc/db_page.h:265: (F_ISSET((dbp), DB_AM_ENCRYPT) ? ((u_int8_t *)(pg) + \ /db-4.6.21/dbinc/db_page.h:270: (F_ISSET((dbp), DB_AM_ENCRYPT) ? ((u_int8_t *)(pg) + \ /db-4.6.21/dbinc/db_page.h:310: (F_ISSET((dbp), DB_AM_ENCRYPT) ? QPAGE_SEC : \ /db-4.6.21/dbinc/db.in:325: * Flags private to DB_ENV->set_encrypt. /db-4.6.21/dbinc/db.in:327:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */ /db-4.6.21/dbinc/db.in:379:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */ /db-4.6.21/dbinc/db.in:1674: int (*get_encrypt_flags) __P((DB *, u_int32_t *)); /db-4.6.21/dbinc/db.in:1716: int (*set_encrypt) __P((DB *, const char *, u_int32_t)); /db-4.6.21/dbinc/db.in:1786:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */ /db-4.6.21/dbinc/db.in:2294: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *)); /db-4.6.21/dbinc/db.in:2405: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t)); /db-4.6.21/dbinc/crypto.h:41: int (*decrypt) __P((DB_ENV *, void *, void *, u_int8_t *, size_t)); /db-4.6.21/dbinc/crypto.h:42: int (*encrypt) __P((DB_ENV *, void *, void *, u_int8_t *, size_t)); /db-4.6.21/dbinc/crypto.h:48:#define CIPHER_AES 1 /* AES algorithm */ /db-4.6.21/dbinc/crypto.h:58:#include "crypto/rijndael/rijndael-api-fst.h" /db-4.6.21/dbinc/crypto.h:70:#define DB_AES_KEYLEN 128 /* AES key length */ /db-4.6.21/dbinc/crypto.h:71:#define DB_AES_CHUNK 16 /* AES byte unit size */ /db-4.6.21/dbinc/crypto.h:73:typedef struct __aes_cipher { /db-4.6.21/dbinc/crypto.h:74: keyInstance decrypt_ki; /* Decryption key instance */ /db-4.6.21/dbinc/crypto.h:75: keyInstance encrypt_ki; /* Encryption key instance */ /db-4.6.21/dbinc/crypto.h:76: u_int32_t flags; /* AES-specific flags */ /db-4.6.21/dbinc/crypto.h:77:} AES_CIPHER; /db-4.6.21/build_brew/bdb_brew.dsp:381:SOURCE=..\hmac\hmac.c /db-4.6.21/build_brew/bdb_brew.dsp:384:SOURCE=..\hmac\sha1.c /db-4.6.21/build_brew/bdbread.mak:36:OBJS =bdbread.o AEEModGen.o AEEAppGen.o bt_compact.o bt_compare.o bt_conv.o bt_curadj.o bt_cursor.o bt_delete.o bt_method.o bt_open.o bt_put.o bt_rec.o bt_reclaim.o bt_recno.o bt_rsearch.o bt_search.o bt_split.o bt_stat.o btree_auto.o atol.o isalpha.o isdigit.o isprint.o isspace.o printf.o qsort.o rand.o strcasecmp.o strerror.o strncat.o strsep.o strtol.o crypto_stub.o db_byteorder.o db_err.o db_getlong.o db_idspace.o db_log2.o db_shash.o mkpath.o crdel_auto.o crdel_rec.o db.o db_am.o db_auto.o db_cam.o db_cds.o db_conv.o db_dispatch.o db_dup.o db_iface.o db_join.o db_meta.o db_method.o db_open.o db_overflow.o db_pr.o db_rec.o db_reclaim.o db_remove.o db_rename.o db_ret.o db_setid.o db_setlsn.o db_stati.o db_truncate.o db_upg.o db_vrfy_stub.o dbreg.o dbreg_auto.o dbreg_rec.o dbreg_stat.o dbreg_util.o env_alloc.o env_config.o env_failchk.o env_file.o env_method.o env_name.o env_open.o env_recover.o env_region.o env_register.o env_stat.o fileops_auto.o fop_basic.o fop_rec.o fop_util.o hash_func.o hash_stub.o hmac.o sha1.o lock_stub.o log.o log_archive.o log_compare.o log_debug.o log_get.o log_method.o log_put.o log_stat.o mp_alloc.o mp_bh.o mp_fget.o mp_fmethod.o mp_fopen.o mp_fput.o mp_fset.o mp_method.o mp_mvcc.o mp_region.o mp_register.o mp_resize.o mp_stat.o mp_sync.o mp_trickle.o mut_stub.o os_alloc.o os_clock.o os_fid.o os_flock.o os_fzero.o os_getenv.o os_map.o os_region.o os_root.o os_rpath.o os_tmpdir.o os_uid.o os_yield.o ctime.o fclose.o fgetc.o fgets.o fopen.o fwrite.o getcwd.o globals.o localtime.o os_abort.o os_abs.o os_config.o os_dir.o os_errno.o os_handle.o os_mkdir.o os_oflags.o os_open.o os_pid.o os_rename.o os_rw.o os_seek.o os_sleep.o os_stat.o os_truncate.o os_unlink.o time.o qam_stub.o rep_stub.o repmgr_stub.o txn.o txn_auto.o txn_chkpt.o txn_failchk.o txn_method.o txn_rec.o txn_recover.o txn_region.o txn_stat.o txn_util.o xa_stub.o /db-4.6.21/build_brew/bdbread.mak:327:RULE10 = ..\hmac /db-4.6.21/build_brew/bdbread.mak:507:hmac.o: ..\hmac\hmac.c /db-4.6.21/build_brew/bdbread.mak:508:sha1.o: ..\hmac\sha1.c /db-4.6.21/build_brew/db.h:315: * Flags private to DB_ENV->set_encrypt. /db-4.6.21/build_brew/db.h:317:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */ /db-4.6.21/build_brew/db.h:369:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */ /db-4.6.21/build_brew/db.h:1664: int (*get_encrypt_flags) __P((DB *, u_int32_t *)); /db-4.6.21/build_brew/db.h:1706: int (*set_encrypt) __P((DB *, const char *, u_int32_t)); /db-4.6.21/build_brew/db.h:1776:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */ /db-4.6.21/build_brew/db.h:2284: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *)); /db-4.6.21/build_brew/db.h:2395: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t)); /db-4.6.21/crypto/aes_method.c:9: * $Id: aes_method.c,v 12.7 2007/05/17 15:14:55 bostic Exp $ /db-4.6.21/crypto/aes_method.c:16:#include "dbinc/hmac.h" /db-4.6.21/crypto/aes_method.c:18:static void __aes_err __P((DB_ENV *, int)); /db-4.6.21/crypto/aes_method.c:19:static int __aes_derivekeys __P((DB_ENV *, DB_CIPHER *, u_int8_t *, size_t)); /db-4.6.21/crypto/aes_method.c:22: * __aes_setup -- /db-4.6.21/crypto/aes_method.c:23: * Setup AES functions. /db-4.6.21/crypto/aes_method.c:25: * PUBLIC: int __aes_setup __P((DB_ENV *, DB_CIPHER *)); /db-4.6.21/crypto/aes_method.c:28:__aes_setup(dbenv, db_cipher) /db-4.6.21/crypto/aes_method.c:32: AES_CIPHER *aes_cipher; /db-4.6.21/crypto/aes_method.c:35: db_cipher->adj_size = __aes_adj_size; /db-4.6.21/crypto/aes_method.c:36: db_cipher->close = __aes_close; /db-4.6.21/crypto/aes_method.c:37: db_cipher->decrypt = __aes_decrypt; /db-4.6.21/crypto/aes_method.c:38: db_cipher->encrypt = __aes_encrypt; /db-4.6.21/crypto/aes_method.c:39: db_cipher->init = __aes_init; /db-4.6.21/crypto/aes_method.c:40: if ((ret = __os_calloc(dbenv, 1, sizeof(AES_CIPHER), &aes_cipher)) != 0) /db-4.6.21/crypto/aes_method.c:42: db_cipher->data = aes_cipher; /db-4.6.21/crypto/aes_method.c:47: * __aes_adj_size -- /db-4.6.21/crypto/aes_method.c:51: * PUBLIC: u_int __aes_adj_size __P((size_t)); /db-4.6.21/crypto/aes_method.c:54:__aes_adj_size(len) /db-4.6.21/crypto/aes_method.c:57: if (len % DB_AES_CHUNK == 0) /db-4.6.21/crypto/aes_method.c:59: return (DB_AES_CHUNK - (u_int)(len % DB_AES_CHUNK)); /db-4.6.21/crypto/aes_method.c:63: * __aes_close -- /db-4.6.21/crypto/aes_method.c:64: * Destroy the AES encryption instantiation. /db-4.6.21/crypto/aes_method.c:66: * PUBLIC: int __aes_close __P((DB_ENV *, void *)); /db-4.6.21/crypto/aes_method.c:69:__aes_close(dbenv, data) /db-4.6.21/crypto/aes_method.c:78: * __aes_decrypt -- /db-4.6.21/crypto/aes_method.c:79: * Decrypt data with AES. /db-4.6.21/crypto/aes_method.c:81: * PUBLIC: int __aes_decrypt __P((DB_ENV *, void *, void *, /db-4.6.21/crypto/aes_method.c:85:__aes_decrypt(dbenv, aes_data, iv, cipher, cipher_len) /db-4.6.21/crypto/aes_method.c:87: void *aes_data; /db-4.6.21/crypto/aes_method.c:92: AES_CIPHER *aes; /db-4.6.21/crypto/aes_method.c:96: aes = (AES_CIPHER *)aes_data; /db-4.6.21/crypto/aes_method.c:99: if ((cipher_len % DB_AES_CHUNK) != 0) /db-4.6.21/crypto/aes_method.c:104: if ((ret = __db_cipherInit(&c, MODE_CBC, iv)) < 0) { /db-4.6.21/crypto/aes_method.c:105: __aes_err(dbenv, ret); /db-4.6.21/crypto/aes_method.c:110: if ((ret = __db_blockDecrypt(&c, &aes->decrypt_ki, cipher, /db-4.6.21/crypto/aes_method.c:112: __aes_err(dbenv, ret); /db-4.6.21/crypto/aes_method.c:119: * __aes_encrypt -- /db-4.6.21/crypto/aes_method.c:120: * Encrypt data with AES. /db-4.6.21/crypto/aes_method.c:122: * PUBLIC: int __aes_encrypt __P((DB_ENV *, void *, void *, /db-4.6.21/crypto/aes_method.c:126:__aes_encrypt(dbenv, aes_data, iv, data, data_len) /db-4.6.21/crypto/aes_method.c:128: void *aes_data; /db-4.6.21/crypto/aes_method.c:133: AES_CIPHER *aes; /db-4.6.21/crypto/aes_method.c:138: aes = (AES_CIPHER *)aes_data; /db-4.6.21/crypto/aes_method.c:139: if (aes == NULL || data == NULL) /db-4.6.21/crypto/aes_method.c:141: if ((data_len % DB_AES_CHUNK) != 0) /db-4.6.21/crypto/aes_method.c:158: if ((ret = __db_cipherInit(&c, MODE_CBC, (char *)tmp_iv)) < 0) { /db-4.6.21/crypto/aes_method.c:159: __aes_err(dbenv, ret); /db-4.6.21/crypto/aes_method.c:164: if ((ret = __db_blockEncrypt(&c, &aes->encrypt_ki, data, data_len * 8, /db-4.6.21/crypto/aes_method.c:166: __aes_err(dbenv, ret); /db-4.6.21/crypto/aes_method.c:174: * __aes_init -- /db-4.6.21/crypto/aes_method.c:175: * Initialize the AES encryption instantiation. /db-4.6.21/crypto/aes_method.c:177: * PUBLIC: int __aes_init __P((DB_ENV *, DB_CIPHER *)); /db-4.6.21/crypto/aes_method.c:180:__aes_init(dbenv, db_cipher) /db-4.6.21/crypto/aes_method.c:184: return (__aes_derivekeys(dbenv, db_cipher, (u_int8_t *)dbenv->passwd, /db-4.6.21/crypto/aes_method.c:189:__aes_derivekeys(dbenv, db_cipher, passwd, plen) /db-4.6.21/crypto/aes_method.c:195: SHA1_CTX ctx; /db-4.6.21/crypto/aes_method.c:196: AES_CIPHER *aes; /db-4.6.21/crypto/aes_method.c:203: aes = (AES_CIPHER *)db_cipher->data; /db-4.6.21/crypto/aes_method.c:212: if ((ret = __db_makeKey(&aes->encrypt_ki, DIR_ENCRYPT, /db-4.6.21/crypto/aes_method.c:213: DB_AES_KEYLEN, (char *)temp)) != TRUE) { /db-4.6.21/crypto/aes_method.c:214: __aes_err(dbenv, ret); /db-4.6.21/crypto/aes_method.c:217: if ((ret = __db_makeKey(&aes->decrypt_ki, DIR_DECRYPT, /db-4.6.21/crypto/aes_method.c:218: DB_AES_KEYLEN, (char *)temp)) != TRUE) { /db-4.6.21/crypto/aes_method.c:219: __aes_err(dbenv, ret); /db-4.6.21/crypto/aes_method.c:226: * __aes_err -- /db-4.6.21/crypto/aes_method.c:227: * Handle AES-specific errors. Codes and messages derived from /db-4.6.21/crypto/aes_method.c:228: * rijndael/rijndael-api-fst.h. /db-4.6.21/crypto/aes_method.c:231:__aes_err(dbenv, err) /db-4.6.21/crypto/aes_method.c:239: errstr = "AES key direction is invalid"; /db-4.6.21/crypto/aes_method.c:242: errstr = "AES key material not of correct length"; /db-4.6.21/crypto/aes_method.c:245: errstr = "AES key passwd not valid"; /db-4.6.21/crypto/aes_method.c:248: errstr = "AES cipher in wrong state (not initialized)"; /db-4.6.21/crypto/aes_method.c:251: errstr = "AES bad block length"; /db-4.6.21/crypto/aes_method.c:254: errstr = "AES cipher instance is invalid"; /db-4.6.21/crypto/aes_method.c:257: errstr = "AES data contents are invalid"; /db-4.6.21/crypto/aes_method.c:260: errstr = "AES unknown error"; /db-4.6.21/crypto/aes_method.c:263: errstr = "AES error unrecognized"; /db-4.6.21/crypto/crypto.c:199: case CIPHER_AES: /db-4.6.21/crypto/crypto.c:200: db_cipher->alg = CIPHER_AES; /db-4.6.21/crypto/crypto.c:201: ret = __aes_setup(dbenv, db_cipher); /db-4.6.21/crypto/crypto.c:213: * __crypto_decrypt_meta -- /db-4.6.21/crypto/crypto.c:216: * PUBLIC: int __crypto_decrypt_meta __P((DB_ENV *, DB *, u_int8_t *, int)); /db-4.6.21/crypto/crypto.c:219:__crypto_decrypt_meta(dbenv, dbp, mbuf, do_metachk) /db-4.6.21/crypto/crypto.c:233: * If we weren't given a dbp, we just want to decrypt the page on /db-4.6.21/crypto/crypto.c:260: * This works because we do not encrypt the page header. /db-4.6.21/crypto/crypto.c:267: * non-zero IV (that is written after encryption) then we decrypt (or /db-4.6.21/crypto/crypto.c:273: * algorithms we know about attempting to decrypt (and possibly /db-4.6.21/crypto/crypto.c:280: if (meta->encrypt_alg != 0) { /db-4.6.21/crypto/crypto.c:282: if (!F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.6.21/crypto/crypto.c:294: F_SET(dbp, DB_AM_ENCRYPT|DB_AM_CHKSUM); /db-4.6.21/crypto/crypto.c:297: * This was checked in set_flags when DB_AM_ENCRYPT was set. /db-4.6.21/crypto/crypto.c:302: meta->encrypt_alg != db_cipher->alg) { /db-4.6.21/crypto/crypto.c:310: * For ALL pages, we do not encrypt the beginning of the page /db-4.6.21/crypto/crypto.c:321: if (do_metachk && (ret = db_cipher->decrypt(dbenv, /db-4.6.21/crypto/crypto.c:342: ret = __crypto_algsetup(dbenv, db_cipher, meta->encrypt_alg, 1); /db-4.6.21/crypto/crypto.c:344: } else if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.6.21/crypto/crypto.c:395: return (__env_set_encrypt(dbenv_dest, sh_passwd, DB_ENCRYPT_AES)); /db-4.6.21/crypto/mersenne/mt19937db.c:8:#include "dbinc/hmac.h" /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:2: * rijndael-api-fst.c /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:6: * Optimised ANSI C code for the Rijndael cipher (now AES) /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:42:#include "crypto/rijndael/rijndael-alg-fst.h" /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:43:#include "crypto/rijndael/rijndael-api-fst.h" /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:63: if ((direction == DIR_ENCRYPT) || (direction == DIR_DECRYPT)) { /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:79: if (direction == DIR_ENCRYPT) { /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:99: if ((mode == MODE_ECB) || (mode == MODE_CBC) || (mode == MODE_CFB1)) { /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:130: key->direction == DIR_DECRYPT) { /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:148: case MODE_CBC: /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:188: * Encrypt data partitioned in octets, using RFC 2040-like padding. /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:216: key->direction == DIR_DECRYPT) { /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:239: case MODE_CBC: /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:290: (cipher->mode != MODE_CFB1 && key->direction == DIR_ENCRYPT)) { /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:308: case MODE_CBC: /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:367: key->direction == DIR_ENCRYPT) { /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:401: case MODE_CBC: /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:475: case DIR_ENCRYPT: /db-4.6.21/crypto/rijndael/rijndael-api-fst.c:479: case DIR_DECRYPT: /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:2: * $Id: rijndael-api-fst.h,v 12.0 2004/11/17 03:43:17 bostic Exp $ /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:5: * rijndael-api-fst.h /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:9: * Optimised ANSI C code for the Rijndael cipher (now AES) /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:41:#ifndef __RIJNDAEL_API_FST_H /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:42:#define __RIJNDAEL_API_FST_H /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:44:#include "crypto/rijndael/rijndael-alg-fst.h" /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:47:#define DIR_ENCRYPT 0 /* Are we encrpyting? */ /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:48:#define DIR_DECRYPT 1 /* Are we decrpyting? */ /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:50:#define MODE_CBC 2 /* Are we ciphering in CBC mode? */ /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:87: u_int8_t mode; /* MODE_ECB, MODE_CBC, or MODE_CFB1 */ /db-4.6.21/crypto/rijndael/rijndael-api-fst.h:91:#endif /* __RIJNDAEL_API_FST_H */ /db-4.6.21/crypto/rijndael/rijndael-alg-fst.c:2: * rijndael-alg-fst.c /db-4.6.21/crypto/rijndael/rijndael-alg-fst.c:6: * Optimised ANSI C code for the Rijndael cipher (now AES) /db-4.6.21/crypto/rijndael/rijndael-alg-fst.c:31:#include "crypto/rijndael/rijndael-alg-fst.h" /db-4.6.21/crypto/rijndael/rijndael-alg-fst.c:712: 0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */ /db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:2: * $Id: rijndael-alg-fst.h,v 12.1 2006/09/08 20:32:03 bostic Exp $ /db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:5: * rijndael-alg-fst.h /db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:9: * Optimised ANSI C code for the Rijndael cipher (now AES) /db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:29:#ifndef __RIJNDAEL_ALG_FST_H /db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:30:#define __RIJNDAEL_ALG_FST_H /db-4.6.21/crypto/rijndael/rijndael-alg-fst.h:40:#endif /* __RIJNDAEL_ALG_FST_H */ /db-4.6.21/crypto/crypto.html:59:a single environment method: DBENV->set_encrypt().  /db-4.6.21/crypto/crypto.html:61:by adding a new database method: DB->set_encrypt(). /db-4.6.21/crypto/crypto.html:62:

    Both of the set_encrypt methods must be called before their respective /db-4.6.21/crypto/crypto.html:68:

    DBENV->set_encrypt(DBENV *dbenv,        /* DB_ENV structure */
    /db-4.6.21/crypto/crypto.html:72:
    DB->set_encrypt(DB *dbp,             /* DB structure */
    /db-4.6.21/crypto/crypto.html:76:
    #define DB_ENCRYPT_AES  0x00000001  /* Use the AES encryption algorithm */
    /db-4.6.21/crypto/crypto.html:86:Using DB_ENCRYPT_AES automatically implies SHA1 checksumming. /db-4.6.21/crypto/crypto.html:91:DB->set_encrypt /db-4.6.21/crypto/crypto.html:109:our set_encrypt method to be the RPC or local version.  Therefore /db-4.6.21/crypto/crypto.html:117:    int      (*encrypt)__P((...)); /* Alg-specific encryption algorithm */ /db-4.6.21/crypto/crypto.html:118:    int      (*decrypt)__P((...)); /* Alg-specific decryption function */ /db-4.6.21/crypto/crypto.html:119:    void      *data;               /* Pointer to alg-specific information (AES_CIPHER) */ /db-4.6.21/crypto/crypto.html:124:typedef struct __aes_cipher { /db-4.6.21/crypto/crypto.html:125:    keyInstance    encrypt_ki;   /* Encrypt keyInstance temp. */ /db-4.6.21/crypto/crypto.html:126:    keyInstance    decrypt_ki;   /* Decrypt keyInstance temp. */ /db-4.6.21/crypto/crypto.html:128:    u_int32_t      flags;        /* AES-specific flags */ /db-4.6.21/crypto/crypto.html:129:} AES_CIPHER;
    /db-4.6.21/crypto/crypto.html:133:

    During dbenv->set_encrypt, /db-4.6.21/crypto/crypto.html:137:other subsystems.  For now, only AES ciphering functions and SHA1 /db-4.6.21/crypto/crypto.html:160:we will call __aes_init.  Additionally this function will allocate /db-4.6.21/crypto/crypto.html:164:

    In the AES-specific initialization function, __aes_init,  /db-4.6.21/crypto/crypto.html:166:__aes_derivekeys in order to fill /db-4.6.21/crypto/crypto.html:173:During db->set_encrypt, /db-4.6.21/crypto/crypto.html:193:meta-page.  In __db_pgin, we will decrypt if the page we have /db-4.6.21/crypto/crypto.html:220:

    __aes_derivekeys(DB_ENV *dbenv,           /* dbenv */
    /db-4.6.21/crypto/crypto.html:224:                 keyInstance *encrypt_key,   /* Encryption key of passwd */
    /db-4.6.21/crypto/crypto.html:225:                 keyInstance *decrypt_key);  /* Decryption key of passwd */
    /db-4.6.21/crypto/crypto.html:231:already be allocated.  These will be stored in the AES_CIPHER structure. /db-4.6.21/crypto/crypto.html:239:the 20-byte key set up in __aes_derivekeys.  If they just want /db-4.6.21/crypto/crypto.html:254:
    __aes_encrypt(DB_ENV *dbenv,        /* dbenv */
    /db-4.6.21/crypto/crypto.html:257:             u_int8_t *data,        /* Data to encrypt */
    /db-4.6.21/crypto/crypto.html:258:             size_t data_len);      /* Length of data to encrypt - 16 byte multiple */
    /db-4.6.21/crypto/crypto.html:259:This is the function to encrypt data.  It will be called to encrypt /db-4.6.21/crypto/crypto.html:261:__aes_derivekeys.  /db-4.6.21/crypto/crypto.html:264:in a pointer to the data to encrypt and its length in data_len.  /db-4.6.21/crypto/crypto.html:268:
    __aes_decrypt(DB_ENV *dbenv,    /* dbenv */
    /db-4.6.21/crypto/crypto.html:271:             u_int8_t *data,    /* Data to decrypt */
    /db-4.6.21/crypto/crypto.html:272:             size_t data_len);  /* Length of data to decrypt - 16 byte multiple */
    /db-4.6.21/crypto/crypto.html:273:This is the function to decrypt the data.  It is exactly the same /db-4.6.21/crypto/crypto.html:280:bytes every time we encrypt any data with the same password.  For /db-4.6.21/crypto/crypto.html:287:generator with the time (tv_sec) hashed through SHA1 when we create the /db-4.6.21/crypto/crypto.html:300:to the MT code will come while encrypting some data in __aes_encrypt.   /db-4.6.21/crypto/crypto.html:332:We will encrypt after the method-specific function on page-out and decrypt /db-4.6.21/crypto/crypto.html:345:our first index is based on whether we have DB_AM_CHKSUM and DB_AM_ENCRYPT /db-4.6.21/crypto/crypto.html:349:as some space to get proper alignment to encrypt on a 16-byte boundary. /db-4.6.21/crypto/crypto.html:368:to encrypt to all zero's.  If we read a hole in a file, we do not /db-4.6.21/crypto/crypto.html:399:to encrypt the DBT we send down.  The __log_put function is /db-4.6.21/crypto/crypto.html:405:new __log_put will encrypt if needed and then call __log_put_internal /db-4.6.21/crypto/crypto.html:410:will need to encrypt. /db-4.6.21/crypto/crypto.html:465:to be sent to the clients decrypted and the clients will have to encrypt /db-4.6.21/crypto/crypto.html:469:to the client.  Therefore, the client has no way to decrypt a log /db-4.6.21/crypto/crypto.html:474:

    On the master side we must copy the DBT sent in.  We encrypt the /db-4.6.21/crypto/crypto.html:496:calls to the __aes_derivekeys function with the same password yields /db-4.6.21/db_stat/db_stat.c:258: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/txn/txn.c:44:#include "dbinc/hmac.h" /db-4.6.21/txn/txn.c:1628: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data, /db-4.6.21/txn/txn.c:1640: (ret = db_cipher->encrypt(dbenv, /db-4.6.21/db_checkpoint/db_checkpoint.c:134: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/db_checkpoint/db_checkpoint.c:135: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/rpc_server/c/gen_db_server.c:106:__env_get_encrypt_flags_reply * /db-4.6.21/rpc_server/c/gen_db_server.c:107:__db_env_get_encrypt_flags_4006__SVCSUFFIX__(msg, req) /db-4.6.21/rpc_server/c/gen_db_server.c:108: __env_get_encrypt_flags_msg *msg; /db-4.6.21/rpc_server/c/gen_db_server.c:111: static __env_get_encrypt_flags_reply reply; /* must be static */ /db-4.6.21/rpc_server/c/gen_db_server.c:114: __env_get_encrypt_flags_proc(msg->dbenvcl_id, /db-4.6.21/rpc_server/c/gen_db_server.c:212:__env_set_encrypt_reply * /db-4.6.21/rpc_server/c/gen_db_server.c:213:__db_env_set_encrypt_4006__SVCSUFFIX__(msg, req) /db-4.6.21/rpc_server/c/gen_db_server.c:214: __env_set_encrypt_msg *msg; /db-4.6.21/rpc_server/c/gen_db_server.c:217: static __env_set_encrypt_reply reply; /* must be static */ /db-4.6.21/rpc_server/c/gen_db_server.c:220: __env_set_encrypt_proc(msg->dbenvcl_id, /db-4.6.21/rpc_server/c/gen_db_server.c:435:__db_get_encrypt_flags_reply * /db-4.6.21/rpc_server/c/gen_db_server.c:436:__db_db_get_encrypt_flags_4006__SVCSUFFIX__(msg, req) /db-4.6.21/rpc_server/c/gen_db_server.c:437: __db_get_encrypt_flags_msg *msg; /db-4.6.21/rpc_server/c/gen_db_server.c:440: static __db_get_encrypt_flags_reply reply; /* must be static */ /db-4.6.21/rpc_server/c/gen_db_server.c:443: __db_get_encrypt_flags_proc(msg->dbpcl_id, /db-4.6.21/rpc_server/c/gen_db_server.c:792:__db_set_encrypt_reply * /db-4.6.21/rpc_server/c/gen_db_server.c:793:__db_db_set_encrypt_4006__SVCSUFFIX__(msg, req) /db-4.6.21/rpc_server/c/gen_db_server.c:794: __db_set_encrypt_msg *msg; /db-4.6.21/rpc_server/c/gen_db_server.c:797: static __db_set_encrypt_reply reply; /* must be static */ /db-4.6.21/rpc_server/c/gen_db_server.c:800: __db_set_encrypt_proc(msg->dbpcl_id, /db-4.6.21/rpc_server/c/db_server_util.c:794: (void)dbenv->set_encrypt(dbenv, hp->passwd, /db-4.6.21/rpc_server/c/db_server_util.c:795: DB_ENCRYPT_AES); /db-4.6.21/rpc_server/c/db_server_proc.c:216: * PUBLIC: void __env_get_encrypt_flags_proc __P((u_int, /db-4.6.21/rpc_server/c/db_server_proc.c:217: * PUBLIC: __env_get_encrypt_flags_reply *)); /db-4.6.21/rpc_server/c/db_server_proc.c:220:__env_get_encrypt_flags_proc(dbenvcl_id, replyp) /db-4.6.21/rpc_server/c/db_server_proc.c:222: __env_get_encrypt_flags_reply *replyp; /db-4.6.21/rpc_server/c/db_server_proc.c:230: replyp->status = dbenv->get_encrypt_flags(dbenv, &replyp->flags); /db-4.6.21/rpc_server/c/db_server_proc.c:234: * PUBLIC: void __env_set_encrypt_proc __P((u_int, char *, u_int32_t, /db-4.6.21/rpc_server/c/db_server_proc.c:235: * PUBLIC: __env_set_encrypt_reply *)); /db-4.6.21/rpc_server/c/db_server_proc.c:238:__env_set_encrypt_proc(dbenvcl_id, passwd, flags, replyp) /db-4.6.21/rpc_server/c/db_server_proc.c:242: __env_set_encrypt_reply *replyp; /db-4.6.21/rpc_server/c/db_server_proc.c:251: ret = dbenv->set_encrypt(dbenv, passwd, flags); /db-4.6.21/rpc_server/c/db_server_proc.c:881: * PUBLIC: void __db_get_encrypt_flags_proc __P((u_int, /db-4.6.21/rpc_server/c/db_server_proc.c:882: * PUBLIC: __db_get_encrypt_flags_reply *)); /db-4.6.21/rpc_server/c/db_server_proc.c:885:__db_get_encrypt_flags_proc(dbpcl_id, replyp) /db-4.6.21/rpc_server/c/db_server_proc.c:887: __db_get_encrypt_flags_reply *replyp; /db-4.6.21/rpc_server/c/db_server_proc.c:895: replyp->status = dbp->get_encrypt_flags(dbp, &replyp->flags); /db-4.6.21/rpc_server/c/db_server_proc.c:899: * PUBLIC: void __db_set_encrypt_proc __P((u_int, char *, u_int32_t, /db-4.6.21/rpc_server/c/db_server_proc.c:900: * PUBLIC: __db_set_encrypt_reply *)); /db-4.6.21/rpc_server/c/db_server_proc.c:903:__db_set_encrypt_proc(dbpcl_id, passwd, flags, replyp) /db-4.6.21/rpc_server/c/db_server_proc.c:907: __db_set_encrypt_reply *replyp; /db-4.6.21/rpc_server/c/db_server_proc.c:916: ret = dbp->set_encrypt(dbp, passwd, flags); /db-4.6.21/rpc_server/db_server.x:72:struct __env_get_encrypt_flags_msg { /db-4.6.21/rpc_server/db_server.x:76:struct __env_get_encrypt_flags_reply { /db-4.6.21/rpc_server/db_server.x:148:struct __env_set_encrypt_msg { /db-4.6.21/rpc_server/db_server.x:154:struct __env_set_encrypt_reply { /db-4.6.21/rpc_server/db_server.x:301:struct __db_get_encrypt_flags_msg { /db-4.6.21/rpc_server/db_server.x:305:struct __db_get_encrypt_flags_reply { /db-4.6.21/rpc_server/db_server.x:556:struct __db_set_encrypt_msg { /db-4.6.21/rpc_server/db_server.x:562:struct __db_set_encrypt_reply { /db-4.6.21/rpc_server/db_server.x:879: __env_get_encrypt_flags_reply __DB_env_get_encrypt_flags(__env_get_encrypt_flags_msg) = 7; /db-4.6.21/rpc_server/db_server.x:886: __env_set_encrypt_reply __DB_env_set_encrypt(__env_set_encrypt_msg) = 14; /db-4.6.21/rpc_server/db_server.x:898: __db_get_encrypt_flags_reply __DB_db_get_encrypt_flags(__db_get_encrypt_flags_msg) = 26; /db-4.6.21/rpc_server/db_server.x:918: __db_set_encrypt_reply __DB_db_set_encrypt(__db_set_encrypt_msg) = 46; /db-4.6.21/rpc_server/cxx/db_server_cxxutil.cpp:723: (void)dbenv->set_encrypt(hp->passwd, DB_ENCRYPT_AES); /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:185:__env_get_encrypt_flags_proc( /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:187: __env_get_encrypt_flags_reply *replyp) /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:195: replyp->status = dbenv->get_encrypt_flags(&replyp->flags); /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:199:__env_set_encrypt_proc( /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:203: __env_set_encrypt_reply *replyp) /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:212: ret = dbenv->set_encrypt(passwd, flags); /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:754:__db_get_encrypt_flags_proc( /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:756: __db_get_encrypt_flags_reply *replyp) /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:764: replyp->status = dbp->get_encrypt_flags(&replyp->flags); /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:768:__db_set_encrypt_proc( /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:772: __db_set_encrypt_reply *replyp) /db-4.6.21/rpc_server/cxx/db_server_cxxproc.cpp:781: ret = dbp->set_encrypt(passwd, flags); /db-4.6.21/rpc_server/rpc.src:101:BEGIN env_get_encrypt_flags CODE /db-4.6.21/rpc_server/rpc.src:227:BEGIN env_set_encrypt CODE /db-4.6.21/rpc_server/rpc.src:357:BEGIN db_get_encrypt_flags CODE /db-4.6.21/rpc_server/rpc.src:485:BEGIN db_set_encrypt CODE /db-4.6.21/db_upgrade/db_upgrade.c:112: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/db_upgrade/db_upgrade.c:113: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/db_verify/db_verify.c:121: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/examples_c/getting_started/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce /db-4.6.21/examples_c/getting_started/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh /db-4.6.21/examples_c/getting_started/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine /db-4.6.21/hmac/hmac.c:9: * $Id: hmac.c,v 12.11 2007/05/17 15:15:39 bostic Exp $ /db-4.6.21/hmac/hmac.c:18:#include "dbinc/hmac.h" /db-4.6.21/hmac/hmac.c:21:#define HMAC_OUTPUT_SIZE 20 /db-4.6.21/hmac/hmac.c:22:#define HMAC_BLOCK_SIZE 64 /db-4.6.21/hmac/hmac.c:24:static void __db_hmac __P((u_int8_t *, u_int8_t *, size_t, u_int8_t *)); /db-4.6.21/hmac/hmac.c:30: * underlying SHA1 functions will properly pad the buffer if the data length /db-4.6.21/hmac/hmac.c:37: * __db_hmac -- /db-4.6.21/hmac/hmac.c:41:__db_hmac(k, data, data_len, mac) /db-4.6.21/hmac/hmac.c:45: SHA1_CTX ctx; /db-4.6.21/hmac/hmac.c:46: u_int8_t key[HMAC_BLOCK_SIZE]; /db-4.6.21/hmac/hmac.c:47: u_int8_t ipad[HMAC_BLOCK_SIZE]; /db-4.6.21/hmac/hmac.c:48: u_int8_t opad[HMAC_BLOCK_SIZE]; /db-4.6.21/hmac/hmac.c:49: u_int8_t tmp[HMAC_OUTPUT_SIZE]; /db-4.6.21/hmac/hmac.c:52: memset(key, 0x00, HMAC_BLOCK_SIZE); /db-4.6.21/hmac/hmac.c:53: memset(ipad, 0x36, HMAC_BLOCK_SIZE); /db-4.6.21/hmac/hmac.c:54: memset(opad, 0x5C, HMAC_BLOCK_SIZE); /db-4.6.21/hmac/hmac.c:56: memcpy(key, k, HMAC_OUTPUT_SIZE); /db-4.6.21/hmac/hmac.c:58: for (i = 0; i < HMAC_BLOCK_SIZE; i++) { /db-4.6.21/hmac/hmac.c:64: __db_SHA1Update(&ctx, ipad, HMAC_BLOCK_SIZE); /db-4.6.21/hmac/hmac.c:68: __db_SHA1Update(&ctx, opad, HMAC_BLOCK_SIZE); /db-4.6.21/hmac/hmac.c:69: __db_SHA1Update(&ctx, tmp, HMAC_OUTPUT_SIZE); /db-4.6.21/hmac/hmac.c:76: * Create a MAC/SHA1 checksum. /db-4.6.21/hmac/hmac.c:117: __db_hmac(mac_key, data, data_len, store); /db-4.6.21/hmac/hmac.c:127: * Create a MAC/SHA1 key. /db-4.6.21/hmac/hmac.c:137: SHA1_CTX ctx; /db-4.6.21/hmac/hmac.c:159:__db_check_chksum(dbenv, hdr, db_cipher, chksum, data, data_len, is_hmac) /db-4.6.21/hmac/hmac.c:166: int is_hmac; /db-4.6.21/hmac/hmac.c:178: if (is_hmac == 0) { /db-4.6.21/hmac/hmac.c:217: __db_hmac(mac_key, data, data_len, new); /db-4.6.21/hmac/sha1.c:2: * $Id: sha1.c,v 12.4 2007/05/17 17:18:00 bostic Exp $ /db-4.6.21/hmac/sha1.c:8:#include "dbinc/hmac.h" /db-4.6.21/hmac/sha1.c:11:SHA-1 in C /db-4.6.21/hmac/sha1.c:22: void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned int /db-4.6.21/hmac/sha1.c:25: void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned /db-4.6.21/hmac/sha1.c:94:/* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ /db-4.6.21/hmac/sha1.c:102:static void __db_SHAPrintContext __P((SHA1_CTX *, char *)); /db-4.6.21/hmac/sha1.c:105: SHA1_CTX *context; /db-4.6.21/hmac/sha1.c:191: * PUBLIC: void __db_SHA1Init __P((SHA1_CTX *)); /db-4.6.21/hmac/sha1.c:195: SHA1_CTX *context; /db-4.6.21/hmac/sha1.c:197: /* SHA1 initialization constants */ /db-4.6.21/hmac/sha1.c:212: * PUBLIC: void __db_SHA1Update __P((SHA1_CTX *, unsigned char *, /db-4.6.21/hmac/sha1.c:217: SHA1_CTX *context; /db-4.6.21/hmac/sha1.c:250: * PUBLIC: void __db_SHA1Final __P((unsigned char *, SHA1_CTX *)); /db-4.6.21/hmac/sha1.c:255: SHA1_CTX *context; /db-4.6.21/dist/Makefile.in:202: hmac@o@ hsearch@o@ log@o@ log_archive@o@ log_compare@o@ \ /db-4.6.21/dist/Makefile.in:214: sequence@o@ sha1@o@ snprintf@o@ txn@o@ txn_auto@o@ txn_chkpt@o@ \ /db-4.6.21/dist/Makefile.in:223: aes_method@o@ crypto@o@ mt19937db@o@ rijndael-alg-fst@o@ \ /db-4.6.21/dist/Makefile.in:224: rijndael-api-fst@o@ /db-4.6.21/dist/Makefile.in:1228:aes_method@o@: $(srcdir)/crypto/aes_method.c /db-4.6.21/dist/Makefile.in:1436:hmac@o@: $(srcdir)/hmac/hmac.c /db-4.6.21/dist/Makefile.in:1670:rijndael-alg-fst@o@: $(srcdir)/crypto/rijndael/rijndael-alg-fst.c /db-4.6.21/dist/Makefile.in:1672:rijndael-api-fst@o@: $(srcdir)/crypto/rijndael/rijndael-api-fst.c /db-4.6.21/dist/Makefile.in:1678:sha1@o@: $(srcdir)/hmac/sha1.c /db-4.6.21/dist/tags:23:BAD_BLOCK_LENGTH ../crypto/rijndael/rijndael-api-fst.h 64 /db-4.6.21/dist/tags:24:BAD_CIPHER_INSTANCE ../crypto/rijndael/rijndael-api-fst.h 65 /db-4.6.21/dist/tags:25:BAD_CIPHER_MODE ../crypto/rijndael/rijndael-api-fst.h 62 /db-4.6.21/dist/tags:26:BAD_CIPHER_STATE ../crypto/rijndael/rijndael-api-fst.h 63 /db-4.6.21/dist/tags:27:BAD_DATA ../crypto/rijndael/rijndael-api-fst.h 66 /db-4.6.21/dist/tags:28:BAD_KEY_DIR ../crypto/rijndael/rijndael-api-fst.h 59 /db-4.6.21/dist/tags:29:BAD_KEY_INSTANCE ../crypto/rijndael/rijndael-api-fst.h 61 /db-4.6.21/dist/tags:30:BAD_KEY_MAT ../crypto/rijndael/rijndael-api-fst.h 60 /db-4.6.21/dist/tags:32:BAD_OTHER ../crypto/rijndael/rijndael-api-fst.h 67 /db-4.6.21/dist/tags:58:BITSPERBLOCK ../crypto/rijndael/rijndael-api-fst.h 56 /db-4.6.21/dist/tags:113:CIPHER_AES ../dbinc/crypto.h 48 /db-4.6.21/dist/tags:211:DB_AES_CHUNK ../dbinc/crypto.h 71 /db-4.6.21/dist/tags:212:DB_AES_KEYLEN ../dbinc/crypto.h 70 /db-4.6.21/dist/tags:227:DB_AM_ENCRYPT ../dbinc/db.in 1786 /db-4.6.21/dist/tags:311:DB_ENCRYPT ../dbinc/db.in 379 /db-4.6.21/dist/tags:312:DB_ENCRYPT_AES ../dbinc/db.in 327 /db-4.6.21/dist/tags:313:DB_ENC_MAGIC ../dbinc/hmac.h 32 /db-4.6.21/dist/tags:510:DB_MAC_MAGIC ../dbinc/hmac.h 31 /db-4.6.21/dist/tags:862:DIR_DECRYPT ../crypto/rijndael/rijndael-api-fst.h 48 /db-4.6.21/dist/tags:863:DIR_ENCRYPT ../crypto/rijndael/rijndael-api-fst.h 47 /db-4.6.21/dist/tags:933:DbEnv_get_encrypt_flags ../libdb_java/db_java_wrap.c /^SWIGINTERN u_int32_t DbEnv_get_encrypt_flags(struc/ /db-4.6.21/dist/tags:1020:DbEnv_set_encrypt ../libdb_java/db_java_wrap.c /^SWIGINTERN db_ret_t DbEnv_set_encrypt(struct DbEnv/ /db-4.6.21/dist/tags:1151:Db_get_encrypt_flags ../libdb_java/db_java_wrap.c /^SWIGINTERN u_int32_t Db_get_encrypt_flags(struct D/ /db-4.6.21/dist/tags:1182:Db_set_encrypt ../libdb_java/db_java_wrap.c /^SWIGINTERN db_ret_t Db_set_encrypt(struct Db *self/ /db-4.6.21/dist/tags:1261:GETU32 ../crypto/rijndael/rijndael-alg-fst.c /^#define GETU32(p) SWAP(*((u32 *)(p)))$/ /db-4.6.21/dist/tags:1292:HMAC_BLOCK_SIZE ../hmac/hmac.c 22 /db-4.6.21/dist/tags:1293:HMAC_OUTPUT_SIZE ../hmac/hmac.c 21 /db-4.6.21/dist/tags:1712:MAXKB ../crypto/rijndael/rijndael-alg-fst.h 33 /db-4.6.21/dist/tags:1713:MAXKC ../crypto/rijndael/rijndael-alg-fst.h 32 /db-4.6.21/dist/tags:1714:MAXNR ../crypto/rijndael/rijndael-alg-fst.h 34 /db-4.6.21/dist/tags:1717:MAX_IV_SIZE ../crypto/rijndael/rijndael-api-fst.h 71 /db-4.6.21/dist/tags:1718:MAX_KEY_SIZE ../crypto/rijndael/rijndael-api-fst.h 70 /db-4.6.21/dist/tags:1728:MODE_CBC ../crypto/rijndael/rijndael-api-fst.h 50 /db-4.6.21/dist/tags:1729:MODE_CFB1 ../crypto/rijndael/rijndael-api-fst.h 51 /db-4.6.21/dist/tags:1730:MODE_ECB ../crypto/rijndael/rijndael-api-fst.h 49 /db-4.6.21/dist/tags:1908:PUTU32 ../crypto/rijndael/rijndael-alg-fst.c /^#define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st/ /db-4.6.21/dist/tags:1979:R0 ../hmac/sha1.c /^#define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0/ /db-4.6.21/dist/tags:1980:R1 ../hmac/sha1.c /^#define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x/ /db-4.6.21/dist/tags:1981:R2 ../hmac/sha1.c /^#define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EB/ /db-4.6.21/dist/tags:1982:R3 ../hmac/sha1.c /^#define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i/ /db-4.6.21/dist/tags:1983:R4 ../hmac/sha1.c /^#define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1/ /db-4.6.21/dist/tags:2163:SHA1HANDSOFF ../hmac/sha1.c 79 /db-4.6.21/dist/tags:2309:SWAP ../crypto/rijndael/rijndael-alg-fst.c /^#define SWAP(x) (_lrotl(x, 8) & 0x00ff00ff | _lrot/ /db-4.6.21/dist/tags:2528:_DB_HMAC_H_ ../dbinc/hmac.h 10 /db-4.6.21/dist/tags:2590:__RIJNDAEL_ALG_FST_H ../crypto/rijndael/rijndael-alg-fst.h 30 /db-4.6.21/dist/tags:2591:__RIJNDAEL_API_FST_H ../crypto/rijndael/rijndael-api-fst.h 42 /db-4.6.21/dist/tags:2599:__aes_adj_size ../crypto/aes_method.c /^__aes_adj_size(len)$/ /db-4.6.21/dist/tags:2600:__aes_close ../crypto/aes_method.c /^__aes_close(dbenv, data)$/ /db-4.6.21/dist/tags:2601:__aes_decrypt ../crypto/aes_method.c /^__aes_decrypt(dbenv, aes_data, iv, cipher, cipher_/ /db-4.6.21/dist/tags:2602:__aes_derivekeys ../crypto/aes_method.c /^__aes_derivekeys(dbenv, db_cipher, passwd, plen)$/ /db-4.6.21/dist/tags:2603:__aes_encrypt ../crypto/aes_method.c /^__aes_encrypt(dbenv, aes_data, iv, data, data_len)/ /db-4.6.21/dist/tags:2604:__aes_err ../crypto/aes_method.c /^__aes_err(dbenv, err)$/ /db-4.6.21/dist/tags:2605:__aes_init ../crypto/aes_method.c /^__aes_init(dbenv, db_cipher)$/ /db-4.6.21/dist/tags:2606:__aes_setup ../crypto/aes_method.c /^__aes_setup(dbenv, db_cipher)$/ /db-4.6.21/dist/tags:2811:__crypto_decrypt_meta ../crypto/crypto.c /^__crypto_decrypt_meta(dbenv, dbp, mbuf, do_metachk/ /db-4.6.21/dist/tags:2818:__db_SHA1Final ../hmac/sha1.c /^__db_SHA1Final(digest, context)$/ /db-4.6.21/dist/tags:2819:__db_SHA1Init ../hmac/sha1.c /^__db_SHA1Init(context)$/ /db-4.6.21/dist/tags:2820:__db_SHA1Transform ../hmac/sha1.c /^__db_SHA1Transform(state, buffer)$/ /db-4.6.21/dist/tags:2821:__db_SHA1Update ../hmac/sha1.c /^__db_SHA1Update(context, data, len)$/ /db-4.6.21/dist/tags:2822:__db_SHAPrintContext ../hmac/sha1.c /^__db_SHAPrintContext(context, msg)$/ /db-4.6.21/dist/tags:2842:__db_blockDecrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_blockDecrypt(cipher, key, input, inputLen, ou/ /db-4.6.21/dist/tags:2843:__db_blockEncrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_blockEncrypt(cipher, key, input, inputLen, ou/ /db-4.6.21/dist/tags:2850:__db_check_chksum ../hmac/hmac.c /^__db_check_chksum(dbenv, hdr, db_cipher, chksum, d/ /db-4.6.21/dist/tags:2855:__db_chksum ../hmac/hmac.c /^__db_chksum(hdr, data, data_len, mac_key, store)$/ /db-4.6.21/dist/tags:2856:__db_cipherInit ../crypto/rijndael/rijndael-api-fst.c /^__db_cipherInit(cipher, mode, IV)$/ /db-4.6.21/dist/tags:2857:__db_cipherUpdateRounds ../crypto/rijndael/rijndael-api-fst.c /^__db_cipherUpdateRounds(cipher, key, input, inputL/ /db-4.6.21/dist/tags:2886:__db_db_get_encrypt_flags_4006__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_db_get_encrypt_flags_4006__SVCSUFFIX__(msg, r/ /db-4.6.21/dist/tags:2906:__db_db_set_encrypt_4006__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_db_set_encrypt_4006__SVCSUFFIX__(msg, req)$/ /db-4.6.21/dist/tags:2942:__db_decrypt_pg ../db/db_conv.c /^__db_decrypt_pg (dbenv, dbp, pagep)$/ /db-4.6.21/dist/tags:2947:__db_derive_mac ../hmac/hmac.c /^__db_derive_mac(passwd, plen, mac_key)$/ /db-4.6.21/dist/tags:2960:__db_encrypt_and_checksum_pg ../db/db_conv.c /^__db_encrypt_and_checksum_pg (dbenv, dbp, pagep)$/ /db-4.6.21/dist/tags:2969:__db_env_get_encrypt_flags_4006__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_env_get_encrypt_flags_4006__SVCSUFFIX__(msg, / /db-4.6.21/dist/tags:2977:__db_env_set_encrypt_4006__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_env_set_encrypt_4006__SVCSUFFIX__(msg, req)$/ /db-4.6.21/dist/tags:3014:__db_get_encrypt_flags ../db/db_method.c /^__db_get_encrypt_flags(dbp, flagsp)$/ /db-4.6.21/dist/tags:3015:__db_get_encrypt_flags_proc ../rpc_server/c/db_server_proc.c /^__db_get_encrypt_flags_proc(dbpcl_id, replyp)$/ /db-4.6.21/dist/tags:3052:__db_hmac ../hmac/hmac.c /^__db_hmac(k, data, data_len, mac)$/ /db-4.6.21/dist/tags:3097:__db_makeKey ../crypto/rijndael/rijndael-api-fst.c /^__db_makeKey(key, direction, keyLen, keyMaterial)$/ /db-4.6.21/dist/tags:3148:__db_padDecrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_padDecrypt(cipher, key, input, inputOctets, o/ /db-4.6.21/dist/tags:3149:__db_padEncrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_padEncrypt(cipher, key, input, inputOctets, o/ /db-4.6.21/dist/tags:3253:__db_rijndaelDecrypt ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelDecrypt(rk, Nr, ct, pt)$/ /db-4.6.21/dist/tags:3254:__db_rijndaelDecryptRound ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelDecryptRound(rk, Nr, pt, ct)$/ /db-4.6.21/dist/tags:3255:__db_rijndaelEncrypt ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelEncrypt(rk, Nr, pt, ct)$/ /db-4.6.21/dist/tags:3256:__db_rijndaelEncryptRound ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelEncryptRound(rk, Nr, pt, ct)$/ /db-4.6.21/dist/tags:3257:__db_rijndaelKeySetupDec ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelKeySetupDec(rk, cipherKey, keyBits)$/ /db-4.6.21/dist/tags:3258:__db_rijndaelKeySetupEnc ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelKeySetupEnc(rk, cipherKey, keyBits)$/ /db-4.6.21/dist/tags:3286:__db_set_encrypt ../db/db_method.c /^__db_set_encrypt(dbp, passwd, flags)$/ /db-4.6.21/dist/tags:3287:__db_set_encrypt_proc ../rpc_server/c/db_server_proc.c /^__db_set_encrypt_proc(dbpcl_id, passwd, flags, rep/ /db-4.6.21/dist/tags:3482:__dbcl_db_get_encrypt_flags ../rpc_client/gen_client.c /^__dbcl_db_get_encrypt_flags(dbp, flagsp)$/ /db-4.6.21/dist/tags:3511:__dbcl_db_set_encrypt ../rpc_client/gen_client.c /^__dbcl_db_set_encrypt(dbp, passwd, flags)$/ /db-4.6.21/dist/tags:3557:__dbcl_env_get_encrypt_flags ../rpc_client/gen_client.c /^__dbcl_env_get_encrypt_flags(dbenv, flagsp)$/ /db-4.6.21/dist/tags:3567:__dbcl_env_set_encrypt ../rpc_client/gen_client.c /^__dbcl_env_set_encrypt(dbenv, passwd, flags)$/ /db-4.6.21/dist/tags:3707:__env_des_destroy ../env/env_region.c /^__env_des_destroy(dbenv, rp)$/ /db-4.6.21/dist/tags:3708:__env_des_get ../env/env_region.c /^__env_des_get(dbenv, env_infop, infop, rpp)$/ /db-4.6.21/dist/tags:3718:__env_get_encrypt_flags ../env/env_method.c /^__env_get_encrypt_flags(dbenv, flagsp)$/ /db-4.6.21/dist/tags:3719:__env_get_encrypt_flags_proc ../rpc_server/c/db_server_proc.c /^__env_get_encrypt_flags_proc(dbenvcl_id, replyp)$/ /db-4.6.21/dist/tags:3765:__env_set_encrypt ../env/env_method.c /^__env_set_encrypt(dbenv, passwd, flags)$/ /db-4.6.21/dist/tags:3766:__env_set_encrypt_proc ../rpc_server/c/db_server_proc.c /^__env_set_encrypt_proc(dbenvcl_id, passwd, flags, / /db-4.6.21/dist/tags:4077:__log_encrypt_record ../log/log_put.c /^__log_encrypt_record(dbenv, dbt, hdr, orig)$/ /db-4.6.21/dist/tags:4879:blk ../hmac/sha1.c /^#define blk(i) (block->l[i&15] = rol(block->l[(i+1/ /db-4.6.21/dist/tags:4880:blk0 ../hmac/sha1.c /^#define blk0(i) is_bigendian ? block->l[i] : \\$/ /db-4.6.21/dist/tags:5096:rol ../hmac/sha1.c /^#define rol(value, bits) (((value) << (bits)) | ((/ /db-4.6.21/dist/tags:5231:u16 ../crypto/rijndael/rijndael-alg-fst.h 37 /db-4.6.21/dist/tags:5232:u32 ../crypto/rijndael/rijndael-alg-fst.h 38 /db-4.6.21/dist/tags:5233:u8 ../crypto/rijndael/rijndael-alg-fst.h 36 /db-4.6.21/dist/cscope.out:30683:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:31313:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:91563:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:92341:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:93213:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:94171:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:96585:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:96594:, "DB_ENV->set_encrypt"); /db-4.6.21/dist/cscope.out:99193:DB_ENCRYPT /db-4.6.21/dist/cscope.out:99217:DB_ENCRYPT /db-4.6.21/dist/cscope.out:99791:DB_ENCRYPT /db-4.6.21/dist/cscope.out:99800:, "DB->set_flags: DB_ENCRYPT"); /db-4.6.21/dist/cscope.out:100747:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:103997:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:106213:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:107723:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:108857:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:109659:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:122808: @../crypto/aes_method.c /db-4.6.21/dist/cscope.out:122823: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:122869:AES_CIPHER /db-4.6.21/dist/cscope.out:122925:AES_CIPHER /db-4.6.21/dist/cscope.out:122965:DB_AES_CHUNK /db-4.6.21/dist/cscope.out:122969:DB_AES_CHUNK /db-4.6.21/dist/cscope.out:122974: % DB_AES_CHUNK)); /db-4.6.21/dist/cscope.out:123051:AES_CIPHER /db-4.6.21/dist/cscope.out:123069:AES_CIPHER /db-4.6.21/dist/cscope.out:123089:DB_AES_CHUNK /db-4.6.21/dist/cscope.out:123103:MODE_CBC /db-4.6.21/dist/cscope.out:123197:AES_CIPHER /db-4.6.21/dist/cscope.out:123223:AES_CIPHER /db-4.6.21/dist/cscope.out:123243:DB_AES_CHUNK /db-4.6.21/dist/cscope.out:123271:MODE_CBC /db-4.6.21/dist/cscope.out:123413:SHA1_CTX /db-4.6.21/dist/cscope.out:123419:AES_CIPHER /db-4.6.21/dist/cscope.out:123449:AES_CIPHER /db-4.6.21/dist/cscope.out:123513:DIR_ENCRYPT /db-4.6.21/dist/cscope.out:123517:DB_AES_KEYLEN /db-4.6.21/dist/cscope.out:123545:DIR_DECRYPT /db-4.6.21/dist/cscope.out:123549:DB_AES_KEYLEN /db-4.6.21/dist/cscope.out:123604: = "AES key direction is invalid"; /db-4.6.21/dist/cscope.out:123612: = "AES key materialot of correctength"; /db-4.6.21/dist/cscope.out:123620: = "AES keyasswdot valid"; /db-4.6.21/dist/cscope.out:123628: = "AES cipher in wrong state (not initialized)"; /db-4.6.21/dist/cscope.out:123636: = "AES bad blockength"; /db-4.6.21/dist/cscope.out:123644: = "AES cipher instance is invalid"; /db-4.6.21/dist/cscope.out:123652: = "AES data contentsre invalid"; /db-4.6.21/dist/cscope.out:123660: = "AES unknownrror"; /db-4.6.21/dist/cscope.out:123664: = "AESrror unrecognized"; /db-4.6.21/dist/cscope.out:124399:CIPHER_AES /db-4.6.21/dist/cscope.out:124407:CIPHER_AES /db-4.6.21/dist/cscope.out:124585:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:124609:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:124771:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:124885:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:124907: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:125510: @../crypto/rijndael/rijndael-alg-fst.c /db-4.6.21/dist/cscope.out:133130: @../crypto/rijndael/rijndael-api-fst.c /db-4.6.21/dist/cscope.out:133203:DIR_ENCRYPT /db-4.6.21/dist/cscope.out:133205:DIR_DECRYPT /db-4.6.21/dist/cscope.out:133253:DIR_ENCRYPT /db-4.6.21/dist/cscope.out:133333:MODE_CBC /db-4.6.21/dist/cscope.out:133457:DIR_DECRYPT /db-4.6.21/dist/cscope.out:133517:MODE_CBC /db-4.6.21/dist/cscope.out:133785:DIR_DECRYPT /db-4.6.21/dist/cscope.out:133893:MODE_CBC /db-4.6.21/dist/cscope.out:134155:DIR_ENCRYPT /db-4.6.21/dist/cscope.out:134215:MODE_CBC /db-4.6.21/dist/cscope.out:134477:DIR_ENCRYPT /db-4.6.21/dist/cscope.out:134601:MODE_CBC /db-4.6.21/dist/cscope.out:134881:DIR_ENCRYPT /db-4.6.21/dist/cscope.out:134899:DIR_DECRYPT /db-4.6.21/dist/cscope.out:155803:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:157293:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:157369:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:157539:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:196283: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:196383:is_hmac /db-4.6.21/dist/cscope.out:196415:is_hmac /db-4.6.21/dist/cscope.out:196525:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:196529:is_hmac /db-4.6.21/dist/cscope.out:196585:is_hmac /db-4.6.21/dist/cscope.out:196609:is_hmac /db-4.6.21/dist/cscope.out:196637:is_hmac /db-4.6.21/dist/cscope.out:197205:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:197447:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:197659:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:209999:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:225024:, "DB->get_encrypt_flags"); /db-4.6.21/dist/cscope.out:225080:, "DB->set_encrypt"); /db-4.6.21/dist/cscope.out:225086:, "DB->set_encrypt"); /db-4.6.21/dist/cscope.out:225147:DB_ENCRYPT /db-4.6.21/dist/cscope.out:225417:DB_ENCRYPT /db-4.6.21/dist/cscope.out:225425:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:225435:DB_ENCRYPT /db-4.6.21/dist/cscope.out:225505:DB_ENCRYPT /db-4.6.21/dist/cscope.out:225685:DB_ENCRYPT /db-4.6.21/dist/cscope.out:226353: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:227575:is_hmac /db-4.6.21/dist/cscope.out:227629:is_hmac /db-4.6.21/dist/cscope.out:227689:is_hmac /db-4.6.21/dist/cscope.out:227693:is_hmac /db-4.6.21/dist/cscope.out:232177:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:252459:DB_ENCRYPT /db-4.6.21/dist/cscope.out:252509:DB_ENCRYPT /db-4.6.21/dist/cscope.out:252803:DB_ENCRYPT /db-4.6.21/dist/cscope.out:253277:DB_ENCRYPT /db-4.6.21/dist/cscope.out:253327:DB_ENCRYPT /db-4.6.21/dist/cscope.out:253443:DB_ENCRYPT /db-4.6.21/dist/cscope.out:254567:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:254568:, "DB_AM_ENCRYPT" }, /db-4.6.21/dist/cscope.out:257247:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:275937:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:276653:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:280530:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:281426:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:285140:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:285149:, "DB_ENV->set_encrypt"); /db-4.6.21/dist/cscope.out:287686:DB_ENCRYPT /db-4.6.21/dist/cscope.out:287710:DB_ENCRYPT /db-4.6.21/dist/cscope.out:288284:DB_ENCRYPT /db-4.6.21/dist/cscope.out:288293:, "DB->set_flags: DB_ENCRYPT"); /db-4.6.21/dist/cscope.out:289240:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:292428:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:294582:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:296030:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:297102:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:297842:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:299686: #CIPHER_AES /db-4.6.21/dist/cscope.out:299750: #DB_AES_KEYLEN /db-4.6.21/dist/cscope.out:299756: #DB_AES_CHUNK /db-4.6.21/dist/cscope.out:300910: #DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:301072: #DB_ENCRYPT /db-4.6.21/dist/cscope.out:306604: #DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:321966:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:321996:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:322032:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:322262:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:328267: @../dbinc/hmac.h /db-4.6.21/dist/cscope.out:328270:_DB_HMAC_H_ /db-4.6.21/dist/cscope.out:328274: #_DB_HMAC_H_ /db-4.6.21/dist/cscope.out:328324: ~"dbc_auto/hmac_ext.h /db-4.6.21/dist/cscope.out:360582: @../dbinc_auto/hmac_ext.h /db-4.6.21/dist/cscope.out:360585:_hmac_ext_h_ /db-4.6.21/dist/cscope.out:360589: #_hmac_ext_h_ /db-4.6.21/dist/cscope.out:360647:SHA1_CTX /db-4.6.21/dist/cscope.out:360655:SHA1_CTX /db-4.6.21/dist/cscope.out:360665:SHA1_CTX /db-4.6.21/dist/cscope.out:388001: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:390113:CIPHER_AES /db-4.6.21/dist/cscope.out:390119:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:390190:, "DB_ENV->set_encrypt"); /db-4.6.21/dist/cscope.out:390195:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:390212:, "DB_ENV->set_encrypt", 0)); /db-4.6.21/dist/cscope.out:390226:, "Emptyassword specifiedo set_encrypt"); /db-4.6.21/dist/cscope.out:390353:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:390365:CIPHER_AES /db-4.6.21/dist/cscope.out:400379:__v_des_deroy /db-4.6.21/dist/cscope.out:400389:__v_des_g /db-4.6.21/dist/cscope.out:401093: `__v_des_g /db-4.6.21/dist/cscope.out:401521: `__v_des_g /db-4.6.21/dist/cscope.out:403119: `__v_des_g /db-4.6.21/dist/cscope.out:403319: `__v_des_deroy /db-4.6.21/dist/cscope.out:403435: `__v_des_deroy /db-4.6.21/dist/cscope.out:403469: $__v_des_g /db-4.6.21/dist/cscope.out:403767: $__v_des_deroy /db-4.6.21/dist/cscope.out:510907:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:511531:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:536313:ϡ_desed /db-4.6.21/dist/cscope.out:536389:ϡ_desed /db-4.6.21/dist/cscope.out:536401:ϡ_desed /db-4.6.21/dist/cscope.out:536417:ϡ_desed /db-4.6.21/dist/cscope.out:541490: @../hmac/hmac.c /db-4.6.21/dist/cscope.out:541513: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:541521: #HMAC_OUTPUT_SIZE /db-4.6.21/dist/cscope.out:541527: #HMAC_BLOCK_SIZE /db-4.6.21/dist/cscope.out:541533:__db_hmac /db-4.6.21/dist/cscope.out:541543: $__db_hmac /db-4.6.21/dist/cscope.out:541571:SHA1_CTX /db-4.6.21/dist/cscope.out:541581:HMAC_BLOCK_SIZE /db-4.6.21/dist/cscope.out:541589:HMAC_BLOCK_SIZE /db-4.6.21/dist/cscope.out:541597:HMAC_BLOCK_SIZE /db-4.6.21/dist/cscope.out:541605:HMAC_OUTPUT_SIZE /db-4.6.21/dist/cscope.out:541617:HMAC_BLOCK_SIZE /db-4.6.21/dist/cscope.out:541625:HMAC_BLOCK_SIZE /db-4.6.21/dist/cscope.out:541633:HMAC_BLOCK_SIZE /db-4.6.21/dist/cscope.out:541643:HMAC_OUTPUT_SIZE /db-4.6.21/dist/cscope.out:541649:HMAC_BLOCK_SIZE /db-4.6.21/dist/cscope.out:541681:HMAC_BLOCK_SIZE /db-4.6.21/dist/cscope.out:541715:HMAC_BLOCK_SIZE /db-4.6.21/dist/cscope.out:541725:HMAC_OUTPUT_SIZE /db-4.6.21/dist/cscope.out:541883: `__db_hmac /db-4.6.21/dist/cscope.out:541951:SHA1_CTX /db-4.6.21/dist/cscope.out:542021:is_hmac /db-4.6.21/dist/cscope.out:542057:is_hmac /db-4.6.21/dist/cscope.out:542089:is_hmac /db-4.6.21/dist/cscope.out:542231: `__db_hmac /db-4.6.21/dist/cscope.out:542294: @../hmac/sha1.c /db-4.6.21/dist/cscope.out:542305: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:542499:SHA1_CTX /db-4.6.21/dist/cscope.out:542511:SHA1_CTX /db-4.6.21/dist/cscope.out:543025:SHA1_CTX /db-4.6.21/dist/cscope.out:543081:SHA1_CTX /db-4.6.21/dist/cscope.out:543241:SHA1_CTX /db-4.6.21/dist/cscope.out:621135: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:623161:is_hmac /db-4.6.21/dist/cscope.out:623273:is_hmac /db-4.6.21/dist/cscope.out:623309:is_hmac /db-4.6.21/dist/cscope.out:623465:is_hmac /db-4.6.21/dist/cscope.out:623655:is_hmac /db-4.6.21/dist/cscope.out:630065: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:631485:is_hmac /db-4.6.21/dist/cscope.out:631525:is_hmac /db-4.6.21/dist/cscope.out:631887:is_hmac /db-4.6.21/dist/cscope.out:631899:is_hmac /db-4.6.21/dist/cscope.out:632135:is_hmac /db-4.6.21/dist/cscope.out:635885: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:739403:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:739861:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:740265:DB_AM_ENCRYPT /db-4.6.21/dist/cscope.out:810643:desed_evt /db-4.6.21/dist/cscope.out:810693:desed_evt /db-4.6.21/dist/cscope.out:810715:desed_evt /db-4.6.21/dist/cscope.out:810785:desed_evt /db-4.6.21/dist/cscope.out:858297:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:872555:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:891407:DB_ENCRYPT /db-4.6.21/dist/cscope.out:891408:, "-encrypt" }, /db-4.6.21/dist/cscope.out:896153:ENV_ENCRYPT_AES /db-4.6.21/dist/cscope.out:896157:ENV_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:898753:ENV_ENCRYPT_AES /db-4.6.21/dist/cscope.out:898801:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:898817:ENV_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:900101:TCL_DB_ENCRYPT /db-4.6.21/dist/cscope.out:900105:TCL_DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:900109:TCL_DB_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:901551:TCL_DB_ENCRYPT /db-4.6.21/dist/cscope.out:901557:DB_ENCRYPT /db-4.6.21/dist/cscope.out:901561:TCL_DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:901609:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:901625:TCL_DB_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:904145:TCL_DBREM_ENCRYPT /db-4.6.21/dist/cscope.out:904149:TCL_DBREM_ENCRYPT_AES /db-4.6.21/dist/cscope.out:904153:TCL_DBREM_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:904393:TCL_DBREM_ENCRYPT /db-4.6.21/dist/cscope.out:904399:DB_ENCRYPT /db-4.6.21/dist/cscope.out:904407:TCL_DBREM_ENCRYPT_AES /db-4.6.21/dist/cscope.out:904445:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:904449:TCL_DBREM_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:905003:TCL_DBMV_ENCRYPT /db-4.6.21/dist/cscope.out:905007:TCL_DBMV_ENCRYPT_AES /db-4.6.21/dist/cscope.out:905011:TCL_DBMV_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:905259:TCL_DBMV_ENCRYPT /db-4.6.21/dist/cscope.out:905265:DB_ENCRYPT /db-4.6.21/dist/cscope.out:905273:TCL_DBMV_ENCRYPT_AES /db-4.6.21/dist/cscope.out:905311:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:905315:TCL_DBMV_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:905951:TCL_DBVRFY_ENCRYPT /db-4.6.21/dist/cscope.out:905955:TCL_DBVRFY_ENCRYPT_AES /db-4.6.21/dist/cscope.out:905959:TCL_DBVRFY_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:906195:TCL_DBVRFY_ENCRYPT /db-4.6.21/dist/cscope.out:906201:DB_ENCRYPT /db-4.6.21/dist/cscope.out:906209:TCL_DBVRFY_ENCRYPT_AES /db-4.6.21/dist/cscope.out:906247:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:906251:TCL_DBVRFY_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:917381:ENVREM_ENCRYPT_AES /db-4.6.21/dist/cscope.out:917385:ENVREM_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:917621:ENVREM_ENCRYPT_AES /db-4.6.21/dist/cscope.out:917659:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:917663:ENVREM_ENCRYPT_ANY /db-4.6.21/dist/cscope.out:918532:, "?-encrypt? filename"); /db-4.6.21/dist/cscope.out:918579:DB_ENCRYPT /db-4.6.21/dist/cscope.out:918734:, "?-encrypt? filename"); /db-4.6.21/dist/cscope.out:918781:DB_ENCRYPT /db-4.6.21/dist/cscope.out:922333:DB_ENCRYPT_AES /db-4.6.21/dist/cscope.out:927332:("Lock upgdes", /db-4.6.21/dist/cscope.out:927340:("Lock downgdes", /db-4.6.21/dist/cscope.out:956095: ~"dbc/hmac.h /db-4.6.21/dist/cscope.out:986102:../crypto/aes_method.c /db-4.6.21/dist/cscope.out:986105:../crypto/rijndael/rijndael-alg-fst.c /db-4.6.21/dist/cscope.out:986106:../crypto/rijndael/rijndael-api-fst.c /db-4.6.21/dist/cscope.out:986188:../dbinc/hmac.h /db-4.6.21/dist/cscope.out:986220:../dbinc_auto/hmac_ext.h /db-4.6.21/dist/cscope.out:986327:../hmac/hmac.c /db-4.6.21/dist/cscope.out:986328:../hmac/sha1.c /db-4.6.21/dist/s_include:74:for i in db btree clib common crypto dbreg env fileops hash hmac \ /db-4.6.21/dist/brew/bdbread.mak:327:RULE10 = ..\hmac /db-4.6.21/dist/s_tags:13: ../crypto/rijndael/*.[ch] \ /db-4.6.21/dist/s_tags:21: ../hmac/*.[ch] \ /db-4.6.21/dist/srcfiles.in:100:crypto/aes_method.c ce dynamic static vx /db-4.6.21/dist/srcfiles.in:103:crypto/rijndael/rijndael-alg-fst.c ce dynamic static vx /db-4.6.21/dist/srcfiles.in:104:crypto/rijndael/rijndael-api-fst.c ce dynamic static vx /db-4.6.21/dist/srcfiles.in:260:hmac/hmac.c brew ce ce_small dynamic small static s60 vx vxsmall /db-4.6.21/dist/srcfiles.in:261:hmac/sha1.c brew ce ce_small dynamic small static s60 vx vxsmall /db-4.6.21/dist/aclocal/libtool.m4:5223: icc* | ecc*) /db-4.6.21/dist/aclocal/libtool.m4:5543: ecc*,ia64* | icc*,ia64*) # Intel C compiler on ia64 /db-4.6.21/dist/s_symlink:42:build hmac/tags ../dist/tags /db-4.6.21/dist/pubdef.in:20:DB_AM_ENCRYPT * I * /db-4.6.21/dist/pubdef.in:88:DB_ENCRYPT D I J /db-4.6.21/dist/pubdef.in:89:DB_ENCRYPT_AES D I J /db-4.6.21/dist/winmsi/dbwix.m4:148:m4_define(`WIX_DB_PERSISTENT_GUID', `m4_esyscmd(echo "_WIXDB_PRODUCT @@ _WIXDB_VERSION @@ _WIXDB_CURDIR @@ _WIXDB_SUBDIR @@ _WIXDB_CURFILE" | openssl md5 | sed -e "s/^\(........\)\(....\)\(....\)\(....\)\(....\)\(............\)/\1-\2-\3-\4-\5/")') /db-4.6.21/dist/winmsi/s_winmsi.fcn:1130: RequireFileInPath PATH "$PATH" openssl # needed for MD5 hashing /db-4.6.21/dist/template/db_server_proc:159:/* BEGIN __env_get_encrypt_flags_proc */ /db-4.6.21/dist/template/db_server_proc:161:__env_get_encrypt_flags_proc(dbenvcl_id, replyp) /db-4.6.21/dist/template/db_server_proc:163: __env_get_encrypt_flags_reply *replyp; /db-4.6.21/dist/template/db_server_proc:164:/* END __env_get_encrypt_flags_proc */ /db-4.6.21/dist/template/db_server_proc:323:/* BEGIN __env_set_encrypt_proc */ /db-4.6.21/dist/template/db_server_proc:325:__env_set_encrypt_proc(dbenvcl_id, passwd, flags, replyp) /db-4.6.21/dist/template/db_server_proc:329: __env_set_encrypt_reply *replyp; /db-4.6.21/dist/template/db_server_proc:330:/* END __env_set_encrypt_proc */ /db-4.6.21/dist/template/db_server_proc:659:/* BEGIN __db_get_encrypt_flags_proc */ /db-4.6.21/dist/template/db_server_proc:661:__db_get_encrypt_flags_proc(dbpcl_id, replyp) /db-4.6.21/dist/template/db_server_proc:663: __db_get_encrypt_flags_reply *replyp; /db-4.6.21/dist/template/db_server_proc:664:/* END __db_get_encrypt_flags_proc */ /db-4.6.21/dist/template/db_server_proc:1190:/* BEGIN __db_set_encrypt_proc */ /db-4.6.21/dist/template/db_server_proc:1192:__db_set_encrypt_proc(dbpcl_id, passwd, flags, replyp) /db-4.6.21/dist/template/db_server_proc:1196: __db_set_encrypt_reply *replyp; /db-4.6.21/dist/template/db_server_proc:1197:/* END __db_set_encrypt_proc */ /db-4.6.21/env/env_region.c:14:static void __env_des_destroy __P((DB_ENV *, REGION *)); /db-4.6.21/env/env_region.c:15:static int __env_des_get __P((DB_ENV *, REGINFO *, REGINFO *, REGION **)); /db-4.6.21/env/env_region.c:258: if ((ret = __env_des_get(dbenv, infop, infop, &rp)) != 0 || rp == NULL) /db-4.6.21/env/env_region.c:406: if ((ret = __env_des_get(dbenv, infop, infop, &rp)) != 0) { /db-4.6.21/env/env_region.c:971: if ((ret = __env_des_get(dbenv, dbenv->reginfo, infop, &rp)) != 0) /db-4.6.21/env/env_region.c:979: * __env_des_get may have created the region and reset the create /db-4.6.21/env/env_region.c:1023: __env_des_destroy(dbenv, rp); /db-4.6.21/env/env_region.c:1063: __env_des_destroy(dbenv, rp); /db-4.6.21/env/env_region.c:1073: * __env_des_get -- /db-4.6.21/env/env_region.c:1078:__env_des_get(dbenv, env_infop, infop, rpp) /db-4.6.21/env/env_region.c:1170: * __env_des_destroy -- /db-4.6.21/env/env_region.c:1174:__env_des_destroy(dbenv, rp) /db-4.6.21/env/env_method.c:13:#include "dbinc/hmac.h" /db-4.6.21/env/env_method.c:172: dbenv->get_encrypt_flags = __env_get_encrypt_flags; /db-4.6.21/env/env_method.c:271: dbenv->set_encrypt = __env_set_encrypt; /db-4.6.21/env/env_method.c:417: * __env_get_encrypt_flags -- /db-4.6.21/env/env_method.c:418: * {DB_ENV,DB}->get_encrypt_flags. /db-4.6.21/env/env_method.c:420: * PUBLIC: int __env_get_encrypt_flags __P((DB_ENV *, u_int32_t *)); /db-4.6.21/env/env_method.c:423:__env_get_encrypt_flags(dbenv, flagsp) /db-4.6.21/env/env_method.c:431: if (db_cipher != NULL && db_cipher->alg == CIPHER_AES) /db-4.6.21/env/env_method.c:432: *flagsp = DB_ENCRYPT_AES; /db-4.6.21/env/env_method.c:445: * __env_set_encrypt -- /db-4.6.21/env/env_method.c:446: * DB_ENV->set_encrypt. /db-4.6.21/env/env_method.c:448: * PUBLIC: int __env_set_encrypt __P((DB_ENV *, const char *, u_int32_t)); /db-4.6.21/env/env_method.c:451:__env_set_encrypt(dbenv, passwd, flags) /db-4.6.21/env/env_method.c:460: ENV_ILLEGAL_AFTER_OPEN(dbenv, "DB_ENV->set_encrypt"); /db-4.6.21/env/env_method.c:461:#define OK_CRYPTO_FLAGS (DB_ENCRYPT_AES) /db-4.6.21/env/env_method.c:464: return (__db_ferr(dbenv, "DB_ENV->set_encrypt", 0)); /db-4.6.21/env/env_method.c:467: __db_errx(dbenv, "Empty password specified to set_encrypt"); /db-4.6.21/env/env_method.c:499: case DB_ENCRYPT_AES: /db-4.6.21/env/env_method.c:500: if ((ret = __crypto_algsetup(dbenv, db_cipher, CIPHER_AES, 0)) /db-4.6.21/db_hotbackup/db_hotbackup.c:409: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/db_hotbackup/db_hotbackup.c:410: dbenv->err(dbenv, ret, "DB_ENV->set_encrypt"); /db-4.6.21/examples_java/src/db/GettingStarted/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce /db-4.6.21/examples_java/src/db/GettingStarted/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh /db-4.6.21/examples_java/src/db/GettingStarted/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine /db-4.6.21/db_load/db_load.c:57:#define LDF_PASSWORD 0x04 /* Encrypt created databases. */ /db-4.6.21/db_load/db_load.c:216: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0); /db-4.6.21/db_load/db_load.c:220: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0); /db-4.6.21/db_load/db_load.c:375: /* If configured with a password, encrypt databases we create. */ /db-4.6.21/db_load/db_load.c:377: (ret = dbp->set_flags(dbp, DB_ENCRYPT)) != 0) { /db-4.6.21/db_load/db_load.c:378: dbp->err(dbp, ret, "DB->set_flags: DB_ENCRYPT"); /db-4.6.21/db_load/db_load.c:581: if (ldg->passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/db_load/db_load.c:582: ldg->passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/db_dump/db_dump.c:170: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/db_dump/db_dump.c:171: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/db/db_stati.c:284: { DB_AM_ENCRYPT, "DB_AM_ENCRYPT" }, /db-4.6.21/db/db_iface.c:1323: F_CLR(dbp, DB_AM_CHKSUM | DB_AM_ENCRYPT); /db-4.6.21/db/db_setlsn.c:41: if (flags != 0 && flags != DB_ENCRYPT) /db-4.6.21/db/db_setlsn.c:51: ret = __env_lsn_reset(dbenv, name, LF_ISSET(DB_ENCRYPT) ? 1 : 0); /db-4.6.21/db/db_setlsn.c:81: if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0) /db-4.6.21/db/db_open.c:16:#include "dbinc/hmac.h" /db-4.6.21/db/db_open.c:371: * checksum (and verify the checksum if necessary) and possibly decrypt it. /db-4.6.21/db/db_open.c:385: int is_hmac, ret, swapped; /db-4.6.21/db/db_open.c:396: is_hmac = meta->encrypt_alg == 0 ? 0 : 1; /db-4.6.21/db/db_open.c:414: DBMETASIZE, is_hmac)) != 0) { /db-4.6.21/db/db_open.c:415: if (is_hmac || swapped) /db-4.6.21/db/db_open.c:428: ret = __crypto_decrypt_meta(dbenv, /db-4.6.21/db/db_open.c:534: * checksum and decrypt. Don't distinguish between configuration and /db-4.6.21/db/db_pr.c:109: { DB_AM_ENCRYPT, "encrypted" }, /db-4.6.21/db/db_conv.c:45:#include "dbinc/hmac.h" /db-4.6.21/db/db_conv.c:72: int is_hmac, ret; /db-4.6.21/db/db_conv.c:78: ret = is_hmac = 0; /db-4.6.21/db/db_conv.c:97: if (((DBMETA *)pp)->encrypt_alg != 0 || /db-4.6.21/db/db_conv.c:98: F_ISSET(dbp, DB_AM_ENCRYPT)) /db-4.6.21/db/db_conv.c:99: is_hmac = 1; /db-4.6.21/db/db_conv.c:125: * a db_cipher then we are using hmac. /db-4.6.21/db/db_conv.c:127: is_hmac = CRYPTO_ON(dbenv) ? 1 : 0; /db-4.6.21/db/db_conv.c:137: if (F_ISSET(dbp, DB_AM_SWAP) && is_hmac == 0) /db-4.6.21/db/db_conv.c:140: dbenv, NULL, db_cipher, chksum, pp, sum_len, is_hmac)) { /db-4.6.21/db/db_conv.c:155: if ((ret = __db_decrypt_pg(dbenv, dbp, pagep)) != 0) /db-4.6.21/db/db_conv.c:248: return (__db_encrypt_and_checksum_pg(dbenv, dbp, pagep)); /db-4.6.21/db/db_conv.c:252: * __db_decrypt_pg -- /db-4.6.21/db/db_conv.c:253: * Utility function to decrypt a db page. /db-4.6.21/db/db_conv.c:255: * PUBLIC: int __db_decrypt_pg __P((DB_ENV *, DB *, PAGE *)); /db-4.6.21/db/db_conv.c:258:__db_decrypt_pg (dbenv, dbp, pagep) /db-4.6.21/db/db_conv.c:271: if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.6.21/db/db_conv.c:304: ret = db_cipher->decrypt(dbenv, db_cipher->data, /db-4.6.21/db/db_conv.c:312: * __db_encrypt_and_checksum_pg -- /db-4.6.21/db/db_conv.c:313: * Utility function to encrypt and checksum a db page. /db-4.6.21/db/db_conv.c:315: * PUBLIC: int __db_encrypt_and_checksum_pg /db-4.6.21/db/db_conv.c:319:__db_encrypt_and_checksum_pg (dbenv, dbp, pagep) /db-4.6.21/db/db_conv.c:332: if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.6.21/db/db_conv.c:360: if ((ret = db_cipher->encrypt(dbenv, db_cipher->data, /db-4.6.21/db/db_conv.c:384: if (F_ISSET(dbp, DB_AM_SWAP) && !F_ISSET(dbp, DB_AM_ENCRYPT)) /db-4.6.21/db/db_method.c:44:static int __db_get_encrypt_flags __P((DB *, u_int32_t *)); /db-4.6.21/db/db_method.c:45:static int __db_set_encrypt __P((DB *, const char *, u_int32_t)); /db-4.6.21/db/db_method.c:225: dbp->get_encrypt_flags = __db_get_encrypt_flags; /db-4.6.21/db/db_method.c:249: dbp->set_encrypt = __db_set_encrypt; /db-4.6.21/db/db_method.c:549: * __db_get_encrypt_flags -- /db-4.6.21/db/db_method.c:552:__db_get_encrypt_flags(dbp, flagsp) /db-4.6.21/db/db_method.c:556: DB_ILLEGAL_IN_ENV(dbp, "DB->get_encrypt_flags"); /db-4.6.21/db/db_method.c:558: return (__env_get_encrypt_flags(dbp->dbenv, flagsp)); /db-4.6.21/db/db_method.c:562: * __db_set_encrypt -- /db-4.6.21/db/db_method.c:566:__db_set_encrypt(dbp, passwd, flags) /db-4.6.21/db/db_method.c:574: DB_ILLEGAL_IN_ENV(dbp, "DB->set_encrypt"); /db-4.6.21/db/db_method.c:575: DB_ILLEGAL_AFTER_OPEN(dbp, "DB->set_encrypt"); /db-4.6.21/db/db_method.c:577: if ((ret = __env_set_encrypt(dbp->dbenv, passwd, flags)) != 0) /db-4.6.21/db/db_method.c:589: return (__db_set_flags(dbp, DB_ENCRYPT)); /db-4.6.21/db/db_method.c:657: if (FLD_ISSET(*inflagsp, DB_ENCRYPT)) { /db-4.6.21/db/db_method.c:658: FLD_SET(*outflagsp, DB_AM_ENCRYPT | DB_AM_CHKSUM); /db-4.6.21/db/db_method.c:659: FLD_CLR(*inflagsp, DB_ENCRYPT); /db-4.6.21/db/db_method.c:682: DB_ENCRYPT, /db-4.6.21/db/db_method.c:730: if (LF_ISSET(DB_ENCRYPT) && !CRYPTO_ON(dbenv)) { /db-4.6.21/db/db_setid.c:42: if (flags != 0 && flags != DB_ENCRYPT) /db-4.6.21/db/db_setid.c:52: ret = __env_fileid_reset(dbenv, name, LF_ISSET(DB_ENCRYPT) ? 1 : 0); /db-4.6.21/db/db_setid.c:125: if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0) /db-4.6.21/db/db_upg.c:238: * encrypt_alg flags in the metadata, then the /db-4.6.21/db/db_upg.c:250: * Rip out metadata and encrypt_alg fields from the /db-4.6.21/db/db_upg.c:260: memcpy(&tmpflags, &meta->encrypt_alg, sizeof(u_int8_t)); /db-4.6.21/db/db_upg.c:268: F_SET(dbp, DB_AM_ENCRYPT); /db-4.6.21/db/db_upg.c:411: /* Always decrypt the page. */ /db-4.6.21/db/db_upg.c:412: if ((ret = __db_decrypt_pg(dbenv, dbp, page)) != 0) /db-4.6.21/db/db_upg.c:418: if ((ret = __db_encrypt_and_checksum_pg( /db-4.6.21/db/db.c:103: DB_AM_ENCRYPT | DB_AM_CHKSUM | DB_AM_NOT_DURABLE)); /db-4.6.21/db/db.c:541: ftype = F_ISSET(dbp, DB_AM_SWAP | DB_AM_ENCRYPT | DB_AM_CHKSUM) /db-4.6.21/db/db.c:555: DB_AM_SWAP | DB_AM_ENCRYPT | DB_AM_CHKSUM) ? /db-4.6.21/db/db.c:614: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP)); /db-4.6.21/log/log_put.c:13:#include "dbinc/hmac.h" /db-4.6.21/log/log_put.c:17:static int __log_encrypt_record __P((DB_ENV *, DBT *, HDR *, u_int32_t)); /db-4.6.21/log/log_put.c:128: * DB_LOG_NOCOPY, because we know we can overwrite/encrypt the log /db-4.6.21/log/log_put.c:144: if ((ret = __log_encrypt_record(dbenv, dbt, &hdr, udbt->size)) != 0) /db-4.6.21/log/log_put.c:241: * now-encrypted dbt. Clients have no way to decrypt /db-4.6.21/log/log_put.c:637: __log_encrypt_record(dbenv, &t, &hdr, (u_int32_t)tsize)) != 0) /db-4.6.21/log/log_put.c:1478: if ((ret = __log_encrypt_record(dbenv, dbt, &hdr, rec->size)) != 0) /db-4.6.21/log/log_put.c:1503:__log_encrypt_record(dbenv, dbt, hdr, orig) /db-4.6.21/log/log_put.c:1516: if ((ret = db_cipher->encrypt(dbenv, db_cipher->data, /db-4.6.21/log/log_get.c:14:#include "dbinc/hmac.h" /db-4.6.21/log/log_get.c:381: int eof, is_hmac, need_cksum, ret; /db-4.6.21/log/log_get.c:387: is_hmac = 0; /db-4.6.21/log/log_get.c:498: is_hmac = 1; /db-4.6.21/log/log_get.c:501: is_hmac = 0; /db-4.6.21/log/log_get.c:594: hdr.chksum, rp + hdr.size, hdr.len - hdr.size, is_hmac)) != 0) { /db-4.6.21/log/log_get.c:660: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data, /db-4.6.21/log/log_get.c:1249: * of the file but that's hard -- we may have to decrypt it, checksum /db-4.6.21/log/log.c:13:#include "dbinc/hmac.h" /db-4.6.21/log/log.c:583: int is_hmac, ret; /db-4.6.21/log/log.c:607: is_hmac = 0; /db-4.6.21/log/log.c:613: is_hmac = 1; /db-4.6.21/log/log.c:664: * If we are trying to decrypt an unencrypted log /db-4.6.21/log/log.c:672: /* Check the checksum and decrypt. */ /db-4.6.21/log/log.c:675: hdr->len - hdrsize, is_hmac)) != 0) { /db-4.6.21/log/log.c:679: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data, /db-4.6.21/log/log.c:726: hdr->len - hdrsize, is_hmac)) != 0)) { /db-4.6.21/build_vxworks/db_printlog/db_printlog.c:168: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/build_vxworks/db_printlog/db_printlog.c:169: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/db_archive/db_archive.c:128: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/build_vxworks/db_archive/db_archive.c:129: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1836: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1840: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1846: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1847:hmac.o /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1850: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1854: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1858: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1864: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1865:sha1.o /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:1868: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:3545: $(PRJ_DIR)/../hmac/hmac.c \ /db-4.6.21/build_vxworks/BerkeleyDB20small.wpj:3546: $(PRJ_DIR)/../hmac/sha1.c \ /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:959: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:963: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:969: FILE_$(PRJ_DIR)/../crypto/aes_method.c_objects /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:970:aes_method.o /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:973: FILE_$(PRJ_DIR)/../crypto/aes_method.c_tool /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1013: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1017: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1023: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_objects /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1024:rijndael-alg-fst.o /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1027: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_tool /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1031: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1035: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1041: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_objects /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1042:rijndael-api-fst.o /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:1045: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_tool /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2237: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2241: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2247: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2248:hmac.o /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2251: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2255: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2259: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2265: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2266:sha1.o /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:2269: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:4254: $(PRJ_DIR)/../crypto/aes_method.c \ /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:4257: $(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c \ /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:4258: $(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c \ /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:4325: $(PRJ_DIR)/../hmac/hmac.c \ /db-4.6.21/build_vxworks/BerkeleyDB22.wpj:4326: $(PRJ_DIR)/../hmac/sha1.c \ /db-4.6.21/build_vxworks/db_stat/db_stat.c:273: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/db_checkpoint/db_checkpoint.c:149: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/build_vxworks/db_checkpoint/db_checkpoint.c:150: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/db_upgrade/db_upgrade.c:127: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/build_vxworks/db_upgrade/db_upgrade.c:128: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/db_verify/db_verify.c:136: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/db.h:313: * Flags private to DB_ENV->set_encrypt. /db-4.6.21/build_vxworks/db.h:315:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */ /db-4.6.21/build_vxworks/db.h:367:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */ /db-4.6.21/build_vxworks/db.h:1662: int (*get_encrypt_flags) __P((DB *, u_int32_t *)); /db-4.6.21/build_vxworks/db.h:1704: int (*set_encrypt) __P((DB *, const char *, u_int32_t)); /db-4.6.21/build_vxworks/db.h:1774:#define DB_AM_ENCRYPT 0x00000200 /* Encryption */ /db-4.6.21/build_vxworks/db.h:2282: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *)); /db-4.6.21/build_vxworks/db.h:2393: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t)); /db-4.6.21/build_vxworks/db_hotbackup/db_hotbackup.c:424: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/db_hotbackup/db_hotbackup.c:425: dbenv->err(dbenv, ret, "DB_ENV->set_encrypt"); /db-4.6.21/build_vxworks/db_load/db_load.c:57:#define LDF_PASSWORD 0x04 /* Encrypt created databases. */ /db-4.6.21/build_vxworks/db_load/db_load.c:231: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0); /db-4.6.21/build_vxworks/db_load/db_load.c:235: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0); /db-4.6.21/build_vxworks/db_load/db_load.c:390: /* If configured with a password, encrypt databases we create. */ /db-4.6.21/build_vxworks/db_load/db_load.c:392: (ret = dbp->set_flags(dbp, DB_ENCRYPT)) != 0) { /db-4.6.21/build_vxworks/db_load/db_load.c:393: dbp->err(dbp, ret, "DB->set_flags: DB_ENCRYPT"); /db-4.6.21/build_vxworks/db_load/db_load.c:596: if (ldg->passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/build_vxworks/db_load/db_load.c:597: ldg->passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/db_dump/db_dump.c:185: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/build_vxworks/db_dump/db_dump.c:186: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/db_deadlock/db_deadlock.c:163: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/build_vxworks/db_deadlock/db_deadlock.c:164: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1895: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1899: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1905: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1906:hmac.o /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1909: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1913: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1917: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1923: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1924:sha1.o /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:1927: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:3604: $(PRJ_DIR)/../hmac/hmac.c \ /db-4.6.21/build_vxworks/BerkeleyDB22small.wpj:3605: $(PRJ_DIR)/../hmac/sha1.c \ /db-4.6.21/build_vxworks/db_recover/db_recover.c:133: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/build_vxworks/db_recover/db_recover.c:134: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:900: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:904: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:910: FILE_$(PRJ_DIR)/../crypto/aes_method.c_objects /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:911:aes_method.o /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:914: FILE_$(PRJ_DIR)/../crypto/aes_method.c_tool /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:954: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:958: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:964: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_objects /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:965:rijndael-alg-fst.o /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:968: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_tool /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:972: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:976: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:982: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_objects /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:983:rijndael-api-fst.o /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:986: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_tool /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2178: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2182: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2188: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2189:hmac.o /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2192: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2196: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2200: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2206: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2207:sha1.o /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:2210: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:4195: $(PRJ_DIR)/../crypto/aes_method.c \ /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:4198: $(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c \ /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:4199: $(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c \ /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:4266: $(PRJ_DIR)/../hmac/hmac.c \ /db-4.6.21/build_vxworks/BerkeleyDB20.wpj:4267: $(PRJ_DIR)/../hmac/sha1.c \ /db-4.6.21/dbinc_auto/db_ext.h:116:int __db_decrypt_pg __P((DB_ENV *, DB *, PAGE *)); /db-4.6.21/dbinc_auto/db_ext.h:117:int __db_encrypt_and_checksum_pg __P((DB_ENV *, DB *, PAGE *)); /db-4.6.21/dbinc_auto/env_ext.h:26:int __env_get_encrypt_flags __P((DB_ENV *, u_int32_t *)); /db-4.6.21/dbinc_auto/env_ext.h:27:int __env_set_encrypt __P((DB_ENV *, const char *, u_int32_t)); /db-4.6.21/dbinc_auto/rpc_client_ext.h:27:int __dbcl_env_get_encrypt_flags __P((DB_ENV *, u_int32_t *)); /db-4.6.21/dbinc_auto/rpc_client_ext.h:34:int __dbcl_env_set_encrypt __P((DB_ENV *, const char *, u_int32_t)); /db-4.6.21/dbinc_auto/rpc_client_ext.h:46:int __dbcl_db_get_encrypt_flags __P((DB *, u_int32_t *)); /db-4.6.21/dbinc_auto/rpc_client_ext.h:66:int __dbcl_db_set_encrypt __P((DB *, const char *, u_int32_t)); /db-4.6.21/dbinc_auto/int_def.in:112:#define __db_decrypt_pg __db_decrypt_pg@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:113:#define __db_encrypt_and_checksum_pg __db_encrypt_and_checksum_pg@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:579:#define __aes_setup __aes_setup@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:580:#define __aes_adj_size __aes_adj_size@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:581:#define __aes_close __aes_close@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:582:#define __aes_decrypt __aes_decrypt@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:583:#define __aes_encrypt __aes_encrypt@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:584:#define __aes_init __aes_init@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:588:#define __crypto_decrypt_meta __crypto_decrypt_meta@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:655:#define __env_get_encrypt_flags __env_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:656:#define __env_set_encrypt __env_set_encrypt@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:1514:#define __dbcl_env_get_encrypt_flags __dbcl_env_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:1521:#define __dbcl_env_set_encrypt __dbcl_env_set_encrypt@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:1533:#define __dbcl_db_get_encrypt_flags __dbcl_db_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:1553:#define __dbcl_db_set_encrypt __dbcl_db_set_encrypt@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:1619:#define __env_get_encrypt_flags_proc __env_get_encrypt_flags_proc@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:1620:#define __env_set_encrypt_proc __env_set_encrypt_proc@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:1639:#define __db_get_encrypt_flags_proc __db_get_encrypt_flags_proc@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/int_def.in:1640:#define __db_set_encrypt_proc __db_set_encrypt_proc@DB_VERSION_UNIQUE_NAME@ /db-4.6.21/dbinc_auto/rpc_server_ext.h:16:void __env_get_encrypt_flags_proc __P((u_int, __env_get_encrypt_flags_reply *)); /db-4.6.21/dbinc_auto/rpc_server_ext.h:17:void __env_set_encrypt_proc __P((u_int, char *, u_int32_t, __env_set_encrypt_reply *)); /db-4.6.21/dbinc_auto/rpc_server_ext.h:36:void __db_get_encrypt_flags_proc __P((u_int, __db_get_encrypt_flags_reply *)); /db-4.6.21/dbinc_auto/rpc_server_ext.h:37:void __db_set_encrypt_proc __P((u_int, char *, u_int32_t, __db_set_encrypt_reply *)); /db-4.6.21/dbinc_auto/hmac_ext.h:2:#ifndef _hmac_ext_h_ /db-4.6.21/dbinc_auto/hmac_ext.h:3:#define _hmac_ext_h_ /db-4.6.21/dbinc_auto/hmac_ext.h:13:void __db_SHA1Init __P((SHA1_CTX *)); /db-4.6.21/dbinc_auto/hmac_ext.h:14:void __db_SHA1Update __P((SHA1_CTX *, unsigned char *, size_t)); /db-4.6.21/dbinc_auto/hmac_ext.h:15:void __db_SHA1Final __P((unsigned char *, SHA1_CTX *)); /db-4.6.21/dbinc_auto/hmac_ext.h:20:#endif /* !_hmac_ext_h_ */ /db-4.6.21/dbinc_auto/crypto_ext.h:9:int __aes_setup __P((DB_ENV *, DB_CIPHER *)); /db-4.6.21/dbinc_auto/crypto_ext.h:10:u_int __aes_adj_size __P((size_t)); /db-4.6.21/dbinc_auto/crypto_ext.h:11:int __aes_close __P((DB_ENV *, void *)); /db-4.6.21/dbinc_auto/crypto_ext.h:12:int __aes_decrypt __P((DB_ENV *, void *, void *, u_int8_t *, size_t)); /db-4.6.21/dbinc_auto/crypto_ext.h:13:int __aes_encrypt __P((DB_ENV *, void *, void *, u_int8_t *, size_t)); /db-4.6.21/dbinc_auto/crypto_ext.h:14:int __aes_init __P((DB_ENV *, DB_CIPHER *)); /db-4.6.21/dbinc_auto/crypto_ext.h:18:int __crypto_decrypt_meta __P((DB_ENV *, DB *, u_int8_t *, int)); /db-4.6.21/perl/DB_File/dbinfo:73:my ($magic, $version, $endian, $encrypt) ; /db-4.6.21/perl/DB_File/dbinfo:80: $encrypt = "Not Supported"; /db-4.6.21/perl/DB_File/dbinfo:87: $encrypt = "Not Supported"; /db-4.6.21/perl/DB_File/dbinfo:113: { $encrypt = $info[6] ? "Enabled" : "Disabled" } /db-4.6.21/perl/DB_File/dbinfo:115: { $encrypt = "Not Supported" } /db-4.6.21/perl/DB_File/dbinfo:124:Encryption: $encrypt /db-4.6.21/perl/BerkeleyDB/mkconsts:574: DB_AM_ENCRYPT => IGNORE, /db-4.6.21/perl/BerkeleyDB/mkconsts:584: DB_CHKSUM_SHA1 => DEFINE, /db-4.6.21/perl/BerkeleyDB/mkconsts:588: DB_ENCRYPT => DEFINE, /db-4.6.21/perl/BerkeleyDB/mkconsts:589: DB_ENCRYPT_AES => DEFINE, /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1454: softCrash("-Encrypt needs Berkeley DB 4.x or better") ; /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1483: Status = dbp->set_encrypt(dbp, password, enc_flags); /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1484: Trace(("DB->set_encrypt passwd = %s, flags %d returned %s\n", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1914:set_encrypt(env, passwd, flags) /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1922: softCrash("$env->set_encrypt needs Berkeley DB 4.1 or better") ; /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1924: dieIfEnvOpened(env, "set_encrypt"); /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1925: RETVAL = env->Env->set_encrypt(env->Env, passwd, flags); /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:1984: softCrash("-Encrypt needs Berkeley DB 4.x or better") ; /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:2082: status = env->set_encrypt(env, enc_passwd, enc_flags); /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.xs:2083: Trace(("ENV->set_encrypt passwd = %s, flags %d returned %s\n", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:66: DB_CHKSUM_SHA1 /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:94: DB_ENCRYPT /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:95: DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:589: if (defined $got->{Encrypt}) { /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:590: croak("Encrypt parameter must be a hash reference") /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:591: if !ref $got->{Encrypt} || ref $got->{Encrypt} ne 'HASH' ; /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:593: my %config = %{ $got->{Encrypt} } ; /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:600: croak("Must specify Password and Flags with Encrypt parameter") /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:743: # [ -Encrypt => { Password => string, Flags => value} /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:760: Encrypt => undef, /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:866: Encrypt => undef, /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:931: Encrypt => undef, /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:990: Encrypt => undef, /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:1056: Encrypt => undef, /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pm:1176: Encrypt => undef, /db-4.6.21/perl/BerkeleyDB/dbinfo:73:my ($magic, $version, $endian, $encrypt) ; /db-4.6.21/perl/BerkeleyDB/dbinfo:80: $encrypt = "Not Supported"; /db-4.6.21/perl/BerkeleyDB/dbinfo:87: $encrypt = "Not Supported"; /db-4.6.21/perl/BerkeleyDB/dbinfo:113: { $encrypt = $info[6] ? "Enabled" : "Disabled" } /db-4.6.21/perl/BerkeleyDB/dbinfo:115: { $encrypt = "Not Supported" } /db-4.6.21/perl/BerkeleyDB/dbinfo:124:Encryption: $encrypt /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:165: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:203:=item -Encrypt /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:209: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES } /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:211:Valid values for the Flags are 0 or C. /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:487: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:508: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:801: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:822: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1052: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1073: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1150: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1170: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1198: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1264:=item -Encrypt /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1270: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES } /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod:1272:Valid values for the Flags are 0 or C. /db-4.6.21/perl/BerkeleyDB/MANIFEST:30:t/encrypt.t /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:20: -Encrypt => {Password => "abc", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:21: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:39: -Encrypt => 1, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:42: ok 1, $@ =~ /^Encrypt parameter must be a hash reference at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:47: -Encrypt => {}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:50: ok 2, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:55: -Encrypt => {Password => "fred"}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:58: ok 3, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:63: -Encrypt => {Flags => 1}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:66: ok 4, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:71: -Encrypt => {Fred => 1}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:79: # new BerkeleyDB::Env -Encrypt => /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:87: -Encrypt => {Password => "abc", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:88: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:101: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:121: # once the database is created, do not need to specify DB_ENCRYPT /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:136: -Encrypt => {Password => "def", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:137: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:146: -Encrypt => 1, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:149: ok 16, $@ =~ /^Encrypt parameter must be a hash reference at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:154: -Encrypt => {}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:157: ok 17, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:162: -Encrypt => {Password => "fred"}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:165: ok 18, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:170: -Encrypt => {Flags => 1}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:173: ok 19, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:178: -Encrypt => {Fred => 1}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:189: -Encrypt => 1, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:192: ok 21, $@ =~ /^Encrypt parameter must be a hash reference at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:197: -Encrypt => {}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:200: ok 22, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:205: -Encrypt => {Password => "fred"}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:208: ok 23, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:213: -Encrypt => {Flags => 1}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:216: ok 24, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:221: -Encrypt => {Fred => 1}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:232: -Encrypt => 1, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:235: ok 26, $@ =~ /^Encrypt parameter must be a hash reference at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:240: -Encrypt => {}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:243: ok 27, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:248: -Encrypt => {Password => "fred"}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:251: ok 28, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:256: -Encrypt => {Flags => 1}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:259: ok 29, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:264: -Encrypt => {Fred => 1}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:275: -Encrypt => 1, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:278: ok 31, $@ =~ /^Encrypt parameter must be a hash reference at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:283: -Encrypt => {}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:286: ok 32, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:291: -Encrypt => {Password => "fred"}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:294: ok 33, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:299: -Encrypt => {Flags => 1}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:302: ok 34, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:307: -Encrypt => {Fred => 1}, /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:316: # new BerkeleyDB::Hash -Encrypt => /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:325: -Encrypt => {Password => "beta", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:326: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:328: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:356: -Encrypt => {Password => "def", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:357: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:359: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:365: -Encrypt => {Password => "beta", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:366: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:368: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:380: # new BerkeleyDB::Btree -Encrypt => /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:389: -Encrypt => {Password => "beta", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:390: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:392: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:420: -Encrypt => {Password => "def", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:421: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:423: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:429: -Encrypt => {Password => "beta", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:430: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:432: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:444: # new BerkeleyDB::Queue -Encrypt => /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:455: -Encrypt => {Password => "beta", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:456: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:458: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:489: -Encrypt => {Password => "def", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:490: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:492: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:499: -Encrypt => {Password => "beta", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:500: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:502: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:514: # new BerkeleyDB::Recno -Encrypt => /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:523: -Encrypt => {Password => "beta", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:524: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:526: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:554: -Encrypt => {Password => "def", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:555: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:557: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:563: -Encrypt => {Password => "beta", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:564: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:566: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:578: # new BerkeleyDB::Unknown -Encrypt => /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:587: -Encrypt => {Password => "beta", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:588: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:590: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:618: -Encrypt => {Password => "def", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:619: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:621: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:627: -Encrypt => {Password => "beta", /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:628: Flags => DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/t/encrypt.t:630: -Property => DB_ENCRYPT ; /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:165: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:203:=item -Encrypt /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:209: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES } /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:211:Valid values for the Flags are 0 or C. /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:487: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:508: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:693: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:714: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:891: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:912: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:956: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:976: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:1004: [ -Encrypt => { Password => "string", /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:1070:=item -Encrypt /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:1076: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES } /db-4.6.21/perl/BerkeleyDB/BerkeleyDB.pod.P:1078:Valid values for the Flags are 0 or C. /db-4.6.21/perl/BerkeleyDB/constants.h:449: DB_CONSUME DB_CURRENT DB_DELETED DB_DUPSORT DB_ENCRYPT DB_ENV_CDB /db-4.6.21/perl/BerkeleyDB/constants.h:456: if (memEQ(name, "DB_ENCRYPT", 10)) { /db-4.6.21/perl/BerkeleyDB/constants.h:458:#ifdef DB_ENCRYPT /db-4.6.21/perl/BerkeleyDB/constants.h:459: *iv_return = DB_ENCRYPT; /db-4.6.21/perl/BerkeleyDB/constants.h:2117: DB_ARCH_REMOVE DB_AUTO_COMMIT DB_BTREEOLDVER DB_CHKSUM_SHA1 DB_EID_INVALID /db-4.6.21/perl/BerkeleyDB/constants.h:2118: DB_ENCRYPT_AES DB_ENV_APPINIT DB_ENV_DBLOCAL DB_ENV_LOCKING DB_ENV_LOGGING /db-4.6.21/perl/BerkeleyDB/constants.h:2488: if (memEQ(name, "DB_ENCRYPT_AES", 14)) { /db-4.6.21/perl/BerkeleyDB/constants.h:2490:#ifdef DB_ENCRYPT_AES /db-4.6.21/perl/BerkeleyDB/constants.h:2491: *iv_return = DB_ENCRYPT_AES; /db-4.6.21/perl/BerkeleyDB/constants.h:2579: if (memEQ(name, "DB_CHKSUM_SHA1", 14)) { /db-4.6.21/perl/BerkeleyDB/constants.h:2581:#ifdef DB_CHKSUM_SHA1 /db-4.6.21/perl/BerkeleyDB/constants.h:2582: *iv_return = DB_CHKSUM_SHA1; /db-4.6.21/perl/BerkeleyDB/constants.h:5201: DB_CHKSUM_SHA1 DB_CKP_INTERNAL DB_CLIENT DB_CL_WRITER DB_COMMIT /db-4.6.21/perl/BerkeleyDB/constants.h:5207: DB_ENCRYPT DB_ENCRYPT_AES DB_ENV_APPINIT DB_ENV_AUTO_COMMIT /db-4.6.21/db_deadlock/db_deadlock.c:148: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/db_deadlock/db_deadlock.c:149: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/test/test115.tcl:21: global encrypt /db-4.6.21/test/test115.tcl:193: if { $cryptenv != -1 || $encrypt != 0 } { /db-4.6.21/test/rep001.tcl:72: append args " -encrypt " /db-4.6.21/test/rep001.tcl:86: global encrypt /db-4.6.21/test/rep001.tcl:210: set encrypt 1 /db-4.6.21/test/upgrade.tcl:230: global encrypt /db-4.6.21/test/upgrade.tcl:236: set encrypt 1 /db-4.6.21/test/upgrade.tcl:243: if { $encrypt == 1 } { /db-4.6.21/test/upgrade.tcl:363: global encrypt /db-4.6.21/test/upgrade.tcl:434: set encrypt 0 /db-4.6.21/test/upgrade.tcl:441: global encrypt;\ /db-4.6.21/test/upgrade.tcl:442: set encrypt $encrypt;\ /db-4.6.21/test/upgrade.tcl:466: global encrypt gen_chksum;\ /db-4.6.21/test/upgrade.tcl:467: set encrypt $encrypt;\ /db-4.6.21/test/upgrade.tcl:491: set encrypt 1 /db-4.6.21/test/upgrade.tcl:497: global encrypt passwd;\ /db-4.6.21/test/upgrade.tcl:498: set encrypt $encrypt;\ /db-4.6.21/test/upgrade.tcl:528: set encrypt 0 /db-4.6.21/test/upgrade.tcl:531: global encrypt;\ /db-4.6.21/test/upgrade.tcl:532: set encrypt $encrypt;\ /db-4.6.21/test/upgrade.tcl:541: set encrypt 1 /db-4.6.21/test/upgrade.tcl:544: global encrypt;\ /db-4.6.21/test/upgrade.tcl:545: set encrypt $encrypt;\ /db-4.6.21/test/upgrade.tcl:571: global encrypt /db-4.6.21/test/upgrade.tcl:606: if { $encrypt == 1 } { /db-4.6.21/test/upgrade.tcl:719: global encrypt /db-4.6.21/test/upgrade.tcl:723: if { $encrypt == 1 } { /db-4.6.21/test/test116.tcl:55: if { [is_substr $args "-encrypt"] } { /db-4.6.21/test/test116.tcl:58: if { [is_substr [$env get_encrypt_flags] "-encryptaes"] } { /db-4.6.21/test/test116.tcl:60: append resetargs " -encrypt " /db-4.6.21/test/test.tcl:32:set encrypt 0 /db-4.6.21/test/test.tcl:33:set old_encrypt 0 /db-4.6.21/test/test.tcl:1142: append largs " -encrypt " /db-4.6.21/test/test.tcl:1201: append largs " -encrypt " /db-4.6.21/test/test.tcl:1505: global encrypt /db-4.6.21/test/test.tcl:1518: $encrypt == 0 } { /db-4.6.21/test/test.tcl:1523: $encrypt == 1 } { /db-4.6.21/test/test.tcl:1540: if { $gen_upgrade_log == 0 || $encrypt == 0 } { /db-4.6.21/test/rep039.tcl:356: # (more-)archived logs, so we have to abuse the calling signature a bit /db-4.6.21/test/sdb002.tcl:48: global encrypt /db-4.6.21/test/sdb002.tcl:59: # Run convert_encrypt so that old_encrypt will be reset to /db-4.6.21/test/sdb002.tcl:61: convert_encrypt $largs /db-4.6.21/test/sdb002.tcl:84: global encrypt /db-4.6.21/test/sdb002.tcl:205: if { $encrypt > 0 } { /db-4.6.21/test/sec001.tcl:116: puts "\tSec001.f.2: Create without encryption algorithm (DB_ENCRYPT_ANY)." /db-4.6.21/test/sec001.tcl:145: # db->set_encrypt method when we've already got a secure dbenv. /db-4.6.21/test/sec001.tcl:163: puts "\tSec001.g.3: Open again with any encryption (DB_ENCRYPT_ANY)." /db-4.6.21/test/rpc004.tcl:56: -mode 0644} -env $env -encrypt $testfile1] /db-4.6.21/test/rep011.tcl:54: append args " -encrypt " /db-4.6.21/test/rep011.tcl:68: global encrypt /db-4.6.21/test/rep011.tcl:177: set encrypt 1 /db-4.6.21/test/rep062.tcl:72: global encrypt /db-4.6.21/test/rep062.tcl:113: { 1 {btree ""} {btree "-encrypt"} } /db-4.6.21/test/rep062.tcl:114: { 1 {btree "-encrypt"} {btree ""} } /db-4.6.21/test/rep062.tcl:115: { 1 {queue ""} {queue "-encrypt"} } /db-4.6.21/test/rep062.tcl:116: { 1 {queue "-encrypt"} {queue ""} } /db-4.6.21/test/rep062.tcl:269: set encrypt 1 /db-4.6.21/test/test044.tcl:27: global encrypt /db-4.6.21/test/test044.tcl:43: if { $encrypt != 0 } { /db-4.6.21/test/test042.tcl:22: global encrypt /db-4.6.21/test/test042.tcl:35: if { $encrypt != 0 } { /db-4.6.21/test/env007.tcl:288: "-encryptaes" "$passwd" "-encryptaes" "get_encrypt_flags" } /db-4.6.21/test/env007.tcl:343: [eval $env get_encrypt_flags] \ /db-4.6.21/test/env007.tcl:598: { "" "-encrypt" "" "get_flags" "-encryptaes $passwd" } /db-4.6.21/test/scr010/spell.ok:12:AES /db-4.6.21/test/scr010/spell.ok:120:CBC /db-4.6.21/test/scr010/spell.ok:718:HMAC /db-4.6.21/test/scr010/spell.ok:1329:RIJNDAEL /db-4.6.21/test/scr010/spell.ok:1409:Rijndael /db-4.6.21/test/scr010/spell.ok:1443:SHA /db-4.6.21/test/scr010/spell.ok:2337:des /db-4.6.21/test/scr010/spell.ok:2797:hmac /db-4.6.21/test/scr010/spell.ok:3961:rijndael /db-4.6.21/test/logtrack.tcl:37: global encrypt passwd /db-4.6.21/test/logtrack.tcl:44: if { $encrypt > 0 } { /db-4.6.21/test/sdb015.tcl:56: global encrypt /db-4.6.21/test/sdb015.tcl:63: # Run convert_encrypt so that old_encrypt will be reset to /db-4.6.21/test/sdb015.tcl:65: convert_encrypt $largs /db-4.6.21/test/sdb015.tcl:79: global encrypt /db-4.6.21/test/wordlist:3787:blowfish /db-4.6.21/test/reputils.tcl:467: global encrypt /db-4.6.21/test/reputils.tcl:473: set encrypt 1 /db-4.6.21/test/reputils.tcl:1828: global encrypt /db-4.6.21/test/reputils.tcl:1886: if { $encrypt == 1 } { /db-4.6.21/test/fop004.tcl:13: global encrypt /db-4.6.21/test/fop004.tcl:32: if { $encrypt != 0 } { /db-4.6.21/test/test061.tcl:17: global encrypt /db-4.6.21/test/test061.tcl:210: if { $encrypt != 0 } { /db-4.6.21/test/test045.tcl:25: global encrypt /db-4.6.21/test/test045.tcl:37: if { $encrypt != 0 } { /db-4.6.21/test/testutils.tcl:135: global encrypt /db-4.6.21/test/testutils.tcl:140: if { $encrypt > 0 && $env == "NULL" } { /db-4.6.21/test/testutils.tcl:168: global encrypt /db-4.6.21/test/testutils.tcl:173: if { $encrypt > 0 && $env == "NULL" } { /db-4.6.21/test/testutils.tcl:1112: global old_encrypt /db-4.6.21/test/testutils.tcl:1164: if { $old_encrypt != 0 } { /db-4.6.21/test/testutils.tcl:1186: $old_encrypt == 0} { /db-4.6.21/test/testutils.tcl:1193: $old_encrypt == 1 } { /db-4.6.21/test/testutils.tcl:1266: global old_encrypt /db-4.6.21/test/testutils.tcl:1271: if { $old_encrypt != 0 } { /db-4.6.21/test/testutils.tcl:1482: convert_encrypt $env_cmd /db-4.6.21/test/testutils.tcl:1632: global encrypt /db-4.6.21/test/testutils.tcl:1652: if { $encrypt > 0 } { /db-4.6.21/test/testutils.tcl:2403: global encrypt /db-4.6.21/test/testutils.tcl:2412: set newl [lreplace $largs $eindex $eend "-encrypt"] /db-4.6.21/test/testutils.tcl:2417:proc convert_encrypt { largs } { /db-4.6.21/test/testutils.tcl:2418: global encrypt /db-4.6.21/test/testutils.tcl:2419: global old_encrypt /db-4.6.21/test/testutils.tcl:2421: set old_encrypt $encrypt /db-4.6.21/test/testutils.tcl:2422: set encrypt 0 /db-4.6.21/test/testutils.tcl:2423: if { [lsearch $largs "-encrypt*"] != -1 } { /db-4.6.21/test/testutils.tcl:2424: set encrypt 1 /db-4.6.21/test/testutils.tcl:2446: convert_encrypt $largs /db-4.6.21/test/testutils.tcl:2803: global encrypt /db-4.6.21/test/testutils.tcl:2838: if { $encrypt != 0 } { /db-4.6.21/test/testutils.tcl:2956: global encrypt /db-4.6.21/test/testutils.tcl:2963: if { $encrypt != 0 } { /db-4.6.21/test/testutils.tcl:3025: global encrypt /db-4.6.21/test/testutils.tcl:3055: if { $encrypt != 0 } { /db-4.6.21/test/rep029.tcl:83: append args " -encrypt " /db-4.6.21/test/recd017.tcl:13: global encrypt /db-4.6.21/test/recd017.tcl:50: convert_encrypt $env_cmd /db-4.6.21/test/recd017.tcl:60: -env $dbenv -encrypt $opts $testfile" /db-4.6.21/test/recd017.tcl:78: convert_encrypt $env_cmd /db-4.6.21/test/recd017.tcl:81: -env $dbenv -encrypt $opts $testfile" /db-4.6.21/test/recd017.tcl:87: -env $dbenv -encrypt $opts $testfile2" /db-4.6.21/test/test070.tcl:18: global encrypt /db-4.6.21/test/test070.tcl:31: if { $encrypt != 0 } { /db-4.6.21/test/test037.tcl:10: global encrypt /db-4.6.21/test/test089.tcl:14: global encrypt /db-4.6.21/mod_db4/utils.c:51: if((semset = md4_sem_create(NUM_SEMS, start)) < 0) { /db-4.6.21/mod_db4/utils.c:74: md4_sem_wait_for_zero(semset, OK_TO_PROCEED); /db-4.6.21/mod_db4/utils.c:79: md4_sem_set(semset, OK_TO_PROCEED, 0); /db-4.6.21/mod_db4/utils.c:84: md4_sem_set(semset, OK_TO_PROCEED, 1); /db-4.6.21/mod_db4/sem_utils.h:12:extern int md4_sem_create(int semnum, unsigned short *start); /db-4.6.21/mod_db4/sem_utils.h:13:extern void md4_sem_destroy(int semid); /db-4.6.21/mod_db4/sem_utils.h:14:extern void md4_sem_lock(int semid, int semnum); /db-4.6.21/mod_db4/sem_utils.h:15:extern void md4_sem_unlock(int semid, int semnum); /db-4.6.21/mod_db4/sem_utils.h:16:extern void md4_sem_wait_for_zero(int semid, int semnum); /db-4.6.21/mod_db4/sem_utils.h:17:extern void md4_sem_set(int semid, int semnum, int value); /db-4.6.21/mod_db4/sem_utils.h:18:extern int md4_sem_get(int semid, int semnum); /db-4.6.21/mod_db4/sem_utils.c:43:int md4_sem_create(int semnum, unsigned short *start) /db-4.6.21/mod_db4/sem_utils.c:56: md4_sem_destroy(semid); /db-4.6.21/mod_db4/sem_utils.c:62: md4_sem_destroy(semid); /db-4.6.21/mod_db4/sem_utils.c:68:void md4_sem_destroy(int semid) /db-4.6.21/mod_db4/sem_utils.c:75:void md4_sem_lock(int semid, int semnum) /db-4.6.21/mod_db4/sem_utils.c:84:void md4_sem_unlock(int semid, int semnum) /db-4.6.21/mod_db4/sem_utils.c:93:void md4_sem_wait_for_zero(int semid, int semnum) /db-4.6.21/mod_db4/sem_utils.c:102:void md4_sem_set(int semid, int semnum, int value) /db-4.6.21/mod_db4/sem_utils.c:109:int md4_sem_get(int semid, int semnum) /db-4.6.21/php_db4/db4.cpp:283:ZEND_NAMED_FUNCTION(_wrap_db_env_get_encrypt_flags); /db-4.6.21/php_db4/db4.cpp:287:ZEND_NAMED_FUNCTION(_wrap_db_env_set_encrypt); /db-4.6.21/php_db4/db4.cpp:296: ZEND_NAMED_FE(get_encrypt, _wrap_db_env_get_encrypt_flags, NULL) /db-4.6.21/php_db4/db4.cpp:300: ZEND_NAMED_FE(set_encrypt, _wrap_db_env_set_encrypt, NULL) /db-4.6.21/php_db4/db4.cpp:321:ZEND_NAMED_FUNCTION(_wrap_db_get_encrypt_flags); /db-4.6.21/php_db4/db4.cpp:326:ZEND_NAMED_FUNCTION(_wrap_db_set_encrypt); /db-4.6.21/php_db4/db4.cpp:339: ZEND_NAMED_FE(get_encrypt_flags, _wrap_db_get_encrypt_flags, NULL) /db-4.6.21/php_db4/db4.cpp:344: ZEND_NAMED_FE(set_encrypt, _wrap_db_set_encrypt, NULL) /db-4.6.21/php_db4/db4.cpp:458: REGISTER_LONG_CONSTANT("DB_ENCRYPT_AES", DB_ENCRYPT_AES, CONST_CS | CONST_PERSISTENT); /db-4.6.21/php_db4/db4.cpp:479: REGISTER_LONG_CONSTANT("DB_ENCRYPT", DB_ENCRYPT, CONST_CS | CONST_PERSISTENT); /db-4.6.21/php_db4/db4.cpp:637: REGISTER_LONG_CONSTANT("DB_AM_ENCRYPT", DB_AM_ENCRYPT, CONST_CS | CONST_PERSISTENT); /db-4.6.21/php_db4/db4.cpp:1394:/* {{{ proto bool DB4::set_encrypt(string $password [, long $flags]) /db-4.6.21/php_db4/db4.cpp:1396:ZEND_NAMED_FUNCTION(_wrap_db_set_encrypt) /db-4.6.21/php_db4/db4.cpp:1408: RETURN_BOOL(db->set_encrypt(db, pass, flags)?0:1); /db-4.6.21/php_db4/db4.cpp:1412:/* {{{ proto int DB4::get_encrypt_flags() /db-4.6.21/php_db4/db4.cpp:1414:ZEND_NAMED_FUNCTION(_wrap_db_get_encrypt_flags) /db-4.6.21/php_db4/db4.cpp:1420: if (db->get_encrypt_flags(db, &flags) != 0) /db-4.6.21/php_db4/db4.cpp:2062:/* {{{ proto bool DB4Env::set_encrypt(string $password [, long $flags]) /db-4.6.21/php_db4/db4.cpp:2064:ZEND_NAMED_FUNCTION(_wrap_db_env_set_encrypt) /db-4.6.21/php_db4/db4.cpp:2078: RETURN_BOOL(dbenv->set_encrypt(dbenv, pass, flags)?0:1); /db-4.6.21/php_db4/db4.cpp:2082:/* {{{ proto int DB4Env::get_encrypt_flags() /db-4.6.21/php_db4/db4.cpp:2084:ZEND_NAMED_FUNCTION(_wrap_db_env_get_encrypt_flags) /db-4.6.21/php_db4/db4.cpp:2091: if (dbenv->get_encrypt_flags(dbenv, &flags) != 0) /db-4.6.21/cxx/cxx_db.cpp:554:DB_METHOD(get_encrypt_flags, (u_int32_t *flagsp), /db-4.6.21/cxx/cxx_db.cpp:556:DB_METHOD(set_encrypt, (const char *passwd, u_int32_t flags), /db-4.6.21/cxx/cxx_env.cpp:708:DBENV_METHOD(get_encrypt_flags, (u_int32_t *flagsp), /db-4.6.21/cxx/cxx_env.cpp:710:DBENV_METHOD(set_encrypt, (const char *passwd, u_int32_t flags), /db-4.6.21/db_recover/db_recover.c:118: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.6.21/db_recover/db_recover.c:119: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.6.21/rpc_client/gen_client.c:315: * PUBLIC: int __dbcl_env_get_encrypt_flags __P((DB_ENV *, u_int32_t *)); /db-4.6.21/rpc_client/gen_client.c:318:__dbcl_env_get_encrypt_flags(dbenv, flagsp) /db-4.6.21/rpc_client/gen_client.c:323: __env_get_encrypt_flags_msg msg; /db-4.6.21/rpc_client/gen_client.c:324: __env_get_encrypt_flags_reply *replyp = NULL; /db-4.6.21/rpc_client/gen_client.c:335: replyp = __db_env_get_encrypt_flags_4006(&msg, cl); /db-4.6.21/rpc_client/gen_client.c:346: xdr_free((xdrproc_t)xdr___env_get_encrypt_flags_reply, (void *)replyp); /db-4.6.21/rpc_client/gen_client.c:581: * PUBLIC: int __dbcl_env_set_encrypt __P((DB_ENV *, const char *, u_int32_t)); /db-4.6.21/rpc_client/gen_client.c:584:__dbcl_env_set_encrypt(dbenv, passwd, flags) /db-4.6.21/rpc_client/gen_client.c:590: __env_set_encrypt_msg msg; /db-4.6.21/rpc_client/gen_client.c:591: __env_set_encrypt_reply *replyp = NULL; /db-4.6.21/rpc_client/gen_client.c:607: replyp = __db_env_set_encrypt_4006(&msg, cl); /db-4.6.21/rpc_client/gen_client.c:616: xdr_free((xdrproc_t)xdr___env_set_encrypt_reply, (void *)replyp); /db-4.6.21/rpc_client/gen_client.c:1115: * PUBLIC: int __dbcl_db_get_encrypt_flags __P((DB *, u_int32_t *)); /db-4.6.21/rpc_client/gen_client.c:1118:__dbcl_db_get_encrypt_flags(dbp, flagsp) /db-4.6.21/rpc_client/gen_client.c:1123: __db_get_encrypt_flags_msg msg; /db-4.6.21/rpc_client/gen_client.c:1124: __db_get_encrypt_flags_reply *replyp = NULL; /db-4.6.21/rpc_client/gen_client.c:1140: replyp = __db_db_get_encrypt_flags_4006(&msg, cl); /db-4.6.21/rpc_client/gen_client.c:1151: xdr_free((xdrproc_t)xdr___db_get_encrypt_flags_reply, (void *)replyp); /db-4.6.21/rpc_client/gen_client.c:2048: * PUBLIC: int __dbcl_db_set_encrypt __P((DB *, const char *, u_int32_t)); /db-4.6.21/rpc_client/gen_client.c:2051:__dbcl_db_set_encrypt(dbp, passwd, flags) /db-4.6.21/rpc_client/gen_client.c:2057: __db_set_encrypt_msg msg; /db-4.6.21/rpc_client/gen_client.c:2058: __db_set_encrypt_reply *replyp = NULL; /db-4.6.21/rpc_client/gen_client.c:2079: replyp = __db_db_set_encrypt_4006(&msg, cl); /db-4.6.21/rpc_client/gen_client.c:2088: xdr_free((xdrproc_t)xdr___db_set_encrypt_reply, (void *)replyp); /db-4.6.21/rpc_client/gen_client.c:3219: dbp->get_encrypt_flags = __dbcl_db_get_encrypt_flags; /db-4.6.21/rpc_client/gen_client.c:3263: dbp->set_encrypt = __dbcl_db_set_encrypt; /db-4.6.21/rpc_client/gen_client.c:3353: dbenv->get_encrypt_flags = __dbcl_env_get_encrypt_flags; /db-4.6.21/rpc_client/gen_client.c:3624: dbenv->set_encrypt = __dbcl_env_set_encrypt; /db-4.5.20/btree/bt_open.c:369: if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.5.20/btree/bt_open.c:370: meta->dbmeta.encrypt_alg = /db-4.5.20/btree/bt_open.c:372: DB_ASSERT(dbenv, meta->dbmeta.encrypt_alg != 0); /db-4.5.20/btree/bt_open.c:474: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP)); /db-4.5.20/db_printlog/db_printlog.c:154: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/db_printlog/db_printlog.c:155: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/docs/java/com/sleepycat/util/ExceptionWrapper.html:169:

    This method is intentionally defined to be the same signature as the /db-4.5.20/docs/java/com/sleepycat/util/RuntimeExceptionWrapper.html:234:

    This method is intentionally defined to be the same signature as the /db-4.5.20/docs/java/com/sleepycat/util/IOExceptionWrapper.html:234:

    This method is intentionally defined to be the same signature as the /db-4.5.20/docs/java/com/sleepycat/db/DatabaseConfig.html:1614: Berkeley DB uses the SHA1 Secure Hash Algorithm if encryption is /db-4.5.20/docs/java/com/sleepycat/db/DatabaseConfig.html:1820: Berkeley DB uses the Rijndael/AES (also known as the Advanced /db-4.5.20/docs/java/com/sleepycat/db/EnvironmentConfig.html:2393: Berkeley DB uses the Rijndael/AES (also known as the Advanced /db-4.5.20/docs/api_c/api_core.html:41:

  • DB->set_encryptSet the database cryptographic key
    DB_ENV->set_encryptSet the environment cryptographic key
    DB_ENV->set_encryptSet the environment cryptographic key
    DB->set_flags  DB_ENCRYPT
    DB->set_encrypt  DB_ENCRYPT_AES
    DB_ENV->set_encrypt  DB_ENCRYPT_AES
     encryption
    DB->set_encryptSet the database cryptographic key
    Db::set_encryptSet the database cryptographic key
    DbEnv::set_encryptSet the environment cryptographic key
    Db::set_flags  DB_ENCRYPT
    Db::set_encrypt  DB_ENCRYPT_AES
    DbEnv::set_encrypt  DB_ENCRYPT_AES
     encryption
    DbEnv::set_encryptSet the environment cryptographic key
    Db::set_encryptSet the database cryptographic key
    DB->set_encryptSet the database cryptographic key
    hmacChecksum support
    PrevRefNext /db-4.5.20/docs/ref/env/security.html:52: /db-4.5.20/docs/ref/env/remote.html:15:

    PrevRefNext /db-4.5.20/docs/ref/env/intro.html:71:
    DB_ENV->set_encryptSet the environment cryptographic key
    PrevRefNext /db-4.5.20/docs/ref/env/remote.html:61:

    PrevRefNext /db-4.5.20/docs/ref/env/encrypt.html:1: /db-4.5.20/docs/ref/env/encrypt.html:19:

    Berkeley DB optionally supports encryption using the Rijndael/AES (also known /db-4.5.20/docs/ref/env/encrypt.html:24:encrypted information is additionally checksummed using the SHA1 Secure /db-4.5.20/docs/ref/env/encrypt.html:36:encryption by calling the DB_ENV->set_encrypt or /db-4.5.20/docs/ref/env/encrypt.html:37:DB->set_encrypt methods, applications must specify the /db-4.5.20/docs/ref/env/encrypt.html:38:DB_ENCRYPT flag before creating the database in order for the /db-4.5.20/docs/ref/env/encrypt.html:80:Rijndael/AES code used in Berkeley DB. /db-4.5.20/docs/ref/env/encrypt.html:81:

  • Steve Reid and James H. Brown for writing the SHA1 checksum code used /db-4.5.20/docs/ref/env/encrypt.html:85:
  • Adam Stubblefield for integrating the Rijndael/AES, SHA1 checksum and /db-4.5.20/docs/ref/rep/intro.html:69:For example, the application may choose to encrypt data, use a secure /db-4.5.20/docs/ref/upgrade.4.3/err.html:18:

    The signature of the error callback passed to the /db-4.5.20/docs/api_tcl/db_rename.html:24: [-encrypt] /db-4.5.20/docs/api_tcl/db_rename.html:42:

    -encrypt
    Specify the database in an environment is encrypted with the /db-4.5.20/docs/api_tcl/db_rename.html:45:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.5.20/docs/api_tcl/db_remove.html:24: [-encrypt] /db-4.5.20/docs/api_tcl/db_remove.html:41:
    -encrypt
    Specify the database in an environment is encrypted with the /db-4.5.20/docs/api_tcl/db_remove.html:44:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.5.20/docs/api_tcl/db_open.html:31: [-encrypt] /db-4.5.20/docs/api_tcl/db_open.html:119:
    -encrypt
    Specify the database in an environment should be encrypted with the /db-4.5.20/docs/api_tcl/db_open.html:122:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.5.20/docs/api_tcl/env_open.html:77:using the Rijndael/AES (also known as the Advanced Encryption Standard /db-4.5.20/qam/qam_open.c:145: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP)); /db-4.5.20/qam/qam_open.c:250: if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.5.20/qam/qam_open.c:251: meta->dbmeta.encrypt_alg = /db-4.5.20/qam/qam_open.c:253: DB_ASSERT(dbenv, meta->dbmeta.encrypt_alg != 0); /db-4.5.20/qam/qam_open.c:334: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP)); /db-4.5.20/db_archive/db_archive.c:114: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/db_archive/db_archive.c:115: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/hash/hash_open.c:277: if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.5.20/hash/hash_open.c:278: meta->dbmeta.encrypt_alg = /db-4.5.20/hash/hash_open.c:280: DB_ASSERT(dbenv, meta->dbmeta.encrypt_alg != 0); /db-4.5.20/hash/hash_open.c:395: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP)); /db-4.5.20/java/src/com/sleepycat/util/ExceptionWrapper.java:31: *

    This method is intentionally defined to be the same signature as the /db-4.5.20/java/src/com/sleepycat/db/internal/DbConstants.java:35: int DB_ENCRYPT = 0x00020000; /db-4.5.20/java/src/com/sleepycat/db/internal/DbConstants.java:36: int DB_ENCRYPT_AES = 0x0000001; /db-4.5.20/java/src/com/sleepycat/db/internal/Db.java:287: public int get_encrypt_flags() throws com.sleepycat.db.DatabaseException { return db_javaJNI.Db_get_encrypt_flags(swigCPtr); } /db-4.5.20/java/src/com/sleepycat/db/internal/Db.java:363: public void set_encrypt(String passwd, int flags) throws com.sleepycat.db.DatabaseException { db_javaJNI.Db_set_encrypt(swigCPtr, passwd, flags); } /db-4.5.20/java/src/com/sleepycat/db/internal/db_javaJNI.java:86: public final static native int Db_get_encrypt_flags(long jarg1) throws com.sleepycat.db.DatabaseException; /db-4.5.20/java/src/com/sleepycat/db/internal/db_javaJNI.java:114: public final static native void Db_set_encrypt(long jarg1, String jarg2, int jarg3) throws com.sleepycat.db.DatabaseException; /db-4.5.20/java/src/com/sleepycat/db/internal/db_javaJNI.java:148: public final static native int DbEnv_get_encrypt_flags(long jarg1) throws com.sleepycat.db.DatabaseException; /db-4.5.20/java/src/com/sleepycat/db/internal/db_javaJNI.java:162: public final static native void DbEnv_set_encrypt(long jarg1, String jarg2, int jarg3) throws com.sleepycat.db.DatabaseException; /db-4.5.20/java/src/com/sleepycat/db/internal/DbEnv.java:240: public int get_encrypt_flags() throws com.sleepycat.db.DatabaseException { return db_javaJNI.DbEnv_get_encrypt_flags(swigCPtr); } /db-4.5.20/java/src/com/sleepycat/db/internal/DbEnv.java:272: public void set_encrypt(String passwd, int flags) throws com.sleepycat.db.DatabaseException { db_javaJNI.DbEnv_set_encrypt(swigCPtr, passwd, flags); } /db-4.5.20/java/src/com/sleepycat/db/EnvironmentConfig.java:1138: dbenv.set_encrypt(password, DbConstants.DB_ENCRYPT_AES); /db-4.5.20/java/src/com/sleepycat/db/EnvironmentConfig.java:1303: password = (dbenv.get_encrypt_flags() == 0) ? null : ""; /db-4.5.20/java/src/com/sleepycat/db/Environment.java:392: dbenv.fileid_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0); /db-4.5.20/java/src/com/sleepycat/db/Environment.java:398: dbenv.lsn_reset(filename, encrypted ? DbConstants.DB_ENCRYPT : 0); /db-4.5.20/java/src/com/sleepycat/db/DatabaseConfig.java:528: dbFlags |= (password != null) ? DbConstants.DB_ENCRYPT : 0; /db-4.5.20/java/src/com/sleepycat/db/DatabaseConfig.java:553: db.set_encrypt(password, DbConstants.DB_ENCRYPT_AES); /db-4.5.20/java/src/com/sleepycat/db/DatabaseConfig.java:628: password = ((dbFlags & DbConstants.DB_ENCRYPT) != 0) ? "" : null; /db-4.5.20/tcl/tcl_db_pkg.c:508: ENV_ENCRYPT_AES, /db-4.5.20/tcl/tcl_db_pkg.c:509: ENV_ENCRYPT_ANY, /db-4.5.20/tcl/tcl_db_pkg.c:1091: case ENV_ENCRYPT_AES: /db-4.5.20/tcl/tcl_db_pkg.c:1101: ret = (*env)->set_encrypt(*env, passwd, DB_ENCRYPT_AES); /db-4.5.20/tcl/tcl_db_pkg.c:1103: "set_encrypt"); /db-4.5.20/tcl/tcl_db_pkg.c:1105: case ENV_ENCRYPT_ANY: /db-4.5.20/tcl/tcl_db_pkg.c:1115: ret = (*env)->set_encrypt(*env, passwd, 0); /db-4.5.20/tcl/tcl_db_pkg.c:1117: "set_encrypt"); /db-4.5.20/tcl/tcl_db_pkg.c:1400: "-encrypt", /db-4.5.20/tcl/tcl_db_pkg.c:1453: TCL_DB_ENCRYPT, /db-4.5.20/tcl/tcl_db_pkg.c:1454: TCL_DB_ENCRYPT_AES, /db-4.5.20/tcl/tcl_db_pkg.c:1455: TCL_DB_ENCRYPT_ANY, /db-4.5.20/tcl/tcl_db_pkg.c:1835: case TCL_DB_ENCRYPT: /db-4.5.20/tcl/tcl_db_pkg.c:1836: set_flags |= DB_ENCRYPT; /db-4.5.20/tcl/tcl_db_pkg.c:1838: case TCL_DB_ENCRYPT_AES: /db-4.5.20/tcl/tcl_db_pkg.c:1848: ret = (*dbp)->set_encrypt(*dbp, passwd, DB_ENCRYPT_AES); /db-4.5.20/tcl/tcl_db_pkg.c:1850: "set_encrypt"); /db-4.5.20/tcl/tcl_db_pkg.c:1852: case TCL_DB_ENCRYPT_ANY: /db-4.5.20/tcl/tcl_db_pkg.c:1862: ret = (*dbp)->set_encrypt(*dbp, passwd, 0); /db-4.5.20/tcl/tcl_db_pkg.c:1864: "set_encrypt"); /db-4.5.20/tcl/tcl_db_pkg.c:2433: "-encrypt", /db-4.5.20/tcl/tcl_db_pkg.c:2443: TCL_DBREM_ENCRYPT, /db-4.5.20/tcl/tcl_db_pkg.c:2444: TCL_DBREM_ENCRYPT_AES, /db-4.5.20/tcl/tcl_db_pkg.c:2445: TCL_DBREM_ENCRYPT_ANY, /db-4.5.20/tcl/tcl_db_pkg.c:2495: case TCL_DBREM_ENCRYPT: /db-4.5.20/tcl/tcl_db_pkg.c:2496: set_flags |= DB_ENCRYPT; /db-4.5.20/tcl/tcl_db_pkg.c:2499: case TCL_DBREM_ENCRYPT_AES: /db-4.5.20/tcl/tcl_db_pkg.c:2508: enc_flag = DB_ENCRYPT_AES; /db-4.5.20/tcl/tcl_db_pkg.c:2510: case TCL_DBREM_ENCRYPT_ANY: /db-4.5.20/tcl/tcl_db_pkg.c:2599: ret = dbp->set_encrypt(dbp, passwd, enc_flag); /db-4.5.20/tcl/tcl_db_pkg.c:2601: "set_encrypt"); /db-4.5.20/tcl/tcl_db_pkg.c:2641: "-encrypt", /db-4.5.20/tcl/tcl_db_pkg.c:2651: TCL_DBMV_ENCRYPT, /db-4.5.20/tcl/tcl_db_pkg.c:2652: TCL_DBMV_ENCRYPT_AES, /db-4.5.20/tcl/tcl_db_pkg.c:2653: TCL_DBMV_ENCRYPT_ANY, /db-4.5.20/tcl/tcl_db_pkg.c:2704: case TCL_DBMV_ENCRYPT: /db-4.5.20/tcl/tcl_db_pkg.c:2705: set_flags |= DB_ENCRYPT; /db-4.5.20/tcl/tcl_db_pkg.c:2708: case TCL_DBMV_ENCRYPT_AES: /db-4.5.20/tcl/tcl_db_pkg.c:2717: enc_flag = DB_ENCRYPT_AES; /db-4.5.20/tcl/tcl_db_pkg.c:2719: case TCL_DBMV_ENCRYPT_ANY: /db-4.5.20/tcl/tcl_db_pkg.c:2819: ret = dbp->set_encrypt(dbp, passwd, enc_flag); /db-4.5.20/tcl/tcl_db_pkg.c:2821: "set_encrypt"); /db-4.5.20/tcl/tcl_db_pkg.c:2862: "-encrypt", /db-4.5.20/tcl/tcl_db_pkg.c:2873: TCL_DBVRFY_ENCRYPT, /db-4.5.20/tcl/tcl_db_pkg.c:2874: TCL_DBVRFY_ENCRYPT_AES, /db-4.5.20/tcl/tcl_db_pkg.c:2875: TCL_DBVRFY_ENCRYPT_ANY, /db-4.5.20/tcl/tcl_db_pkg.c:2921: case TCL_DBVRFY_ENCRYPT: /db-4.5.20/tcl/tcl_db_pkg.c:2922: set_flags |= DB_ENCRYPT; /db-4.5.20/tcl/tcl_db_pkg.c:2925: case TCL_DBVRFY_ENCRYPT_AES: /db-4.5.20/tcl/tcl_db_pkg.c:2934: enc_flag = DB_ENCRYPT_AES; /db-4.5.20/tcl/tcl_db_pkg.c:2936: case TCL_DBVRFY_ENCRYPT_ANY: /db-4.5.20/tcl/tcl_db_pkg.c:3033: ret = dbp->set_encrypt(dbp, passwd, enc_flag); /db-4.5.20/tcl/tcl_db_pkg.c:3035: "set_encrypt"); /db-4.5.20/tcl/tcl_env.c:102: "get_encrypt_flags", /db-4.5.20/tcl/tcl_env.c:885: ENVREM_ENCRYPT_AES, /db-4.5.20/tcl/tcl_env.c:886: ENVREM_ENCRYPT_ANY, /db-4.5.20/tcl/tcl_env.c:934: case ENVREM_ENCRYPT_AES: /db-4.5.20/tcl/tcl_env.c:943: enc_flag = DB_ENCRYPT_AES; /db-4.5.20/tcl/tcl_env.c:945: case ENVREM_ENCRYPT_ANY: /db-4.5.20/tcl/tcl_env.c:1059: ret = e->set_encrypt(e, passwd, enc_flag); /db-4.5.20/tcl/tcl_env.c:1061: "set_encrypt"); /db-4.5.20/tcl/tcl_env.c:1168: "-encrypt", /db-4.5.20/tcl/tcl_env.c:1183: Tcl_WrongNumArgs(interp, 2, objv, "?-encrypt? filename"); /db-4.5.20/tcl/tcl_env.c:1194: flags |= DB_ENCRYPT; /db-4.5.20/tcl/tcl_env.c:1220: "-encrypt", /db-4.5.20/tcl/tcl_env.c:1235: Tcl_WrongNumArgs(interp, 2, objv, "?-encrypt? filename"); /db-4.5.20/tcl/tcl_env.c:1247: flags |= DB_ENCRYPT; /db-4.5.20/tcl/tcl_env.c:2148: * Implements the ENV->get_encrypt_flags command. /db-4.5.20/tcl/tcl_env.c:2165: } encrypt_flags[] = { /db-4.5.20/tcl/tcl_env.c:2166: { DB_ENCRYPT_AES, "-encryptaes" }, /db-4.5.20/tcl/tcl_env.c:2175: ret = dbenv->get_encrypt_flags(dbenv, &flags); /db-4.5.20/tcl/tcl_env.c:2177: "env get_encrypt_flags")) == TCL_OK) { /db-4.5.20/tcl/tcl_env.c:2180: for (i = 0; encrypt_flags[i].flag != 0; i++) /db-4.5.20/tcl/tcl_env.c:2181: if (LF_ISSET(encrypt_flags[i].flag)) { /db-4.5.20/tcl/tcl_env.c:2185: buf, encrypt_flags[i].arg, sizeof(buf)); /db-4.5.20/tcl/tcl_db.c:114: "get_encrypt_flags", /db-4.5.20/tcl/tcl_db.c:2527: { DB_ENCRYPT, "-encrypt" }, /db-4.5.20/libdb_java/db_java_wrap.c:1030: * Note: Different versions of the JNI disagree on the signature for /db-4.5.20/libdb_java/db_java_wrap.c:2266:SWIGINTERN u_int32_t Db_get_encrypt_flags(struct Db *self){ /db-4.5.20/libdb_java/db_java_wrap.c:2268: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret)) /db-4.5.20/libdb_java/db_java_wrap.c:2384:SWIGINTERN db_ret_t Db_set_encrypt(struct Db *self,char const *passwd,u_int32_t flags){ /db-4.5.20/libdb_java/db_java_wrap.c:2385: return self->set_encrypt(self, passwd, flags); /db-4.5.20/libdb_java/db_java_wrap.c:2515:SWIGINTERN u_int32_t DbEnv_get_encrypt_flags(struct DbEnv *self){ /db-4.5.20/libdb_java/db_java_wrap.c:2517: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret)) /db-4.5.20/libdb_java/db_java_wrap.c:2573:SWIGINTERN db_ret_t DbEnv_set_encrypt(struct DbEnv *self,char const *passwd,u_int32_t flags){ /db-4.5.20/libdb_java/db_java_wrap.c:2574: return self->set_encrypt(self, passwd, flags); /db-4.5.20/libdb_java/db_java_wrap.c:3589: result = (u_int32_t)Db_get_encrypt_flags(arg1); /db-4.5.20/libdb_java/db_java_wrap.c:4430: result = (db_ret_t)Db_set_encrypt(arg1,(char const *)arg2,arg3); /db-4.5.20/libdb_java/db_java_wrap.c:5438: result = (u_int32_t)DbEnv_get_encrypt_flags(arg1); /db-4.5.20/libdb_java/db_java_wrap.c:5810: result = (db_ret_t)DbEnv_set_encrypt(arg1,(char const *)arg2,arg3); /db-4.5.20/libdb_java/README:73: which includes the method signature and a call to the method. /db-4.5.20/libdb_java/java_util.i:900: * Note: Different versions of the JNI disagree on the signature for /db-4.5.20/libdb_java/db.i:195: u_int32_t get_encrypt_flags() { /db-4.5.20/libdb_java/db.i:197: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret)) /db-4.5.20/libdb_java/db.i:374: db_ret_t set_encrypt(const char *passwd, u_int32_t flags) { /db-4.5.20/libdb_java/db.i:375: return self->set_encrypt(self, passwd, flags); /db-4.5.20/libdb_java/db.i:634: u_int32_t get_encrypt_flags() { /db-4.5.20/libdb_java/db.i:636: CRYPTO_ONLY(errno = self->get_encrypt_flags(self, &ret)) /db-4.5.20/libdb_java/db.i:719: db_ret_t set_encrypt(const char *passwd, u_int32_t flags) { /db-4.5.20/libdb_java/db.i:720: return self->set_encrypt(self, passwd, flags); /db-4.5.20/build_windows/db_dll.dsp:412:SOURCE=..\crypto\aes_method.c /db-4.5.20/build_windows/db_dll.dsp:424:SOURCE=..\crypto\rijndael\rijndael-alg-fst.c /db-4.5.20/build_windows/db_dll.dsp:428:SOURCE=..\crypto\rijndael\rijndael-api-fst.c /db-4.5.20/build_windows/db_dll.dsp:740:SOURCE=..\hmac\hmac.c /db-4.5.20/build_windows/db_dll.dsp:744:SOURCE=..\hmac\sha1.c /db-4.5.20/build_windows/db.h:328: * Flags private to DB_ENV->set_encrypt. /db-4.5.20/build_windows/db.h:330:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */ /db-4.5.20/build_windows/db.h:382:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */ /db-4.5.20/build_windows/db.h:1614: int (*get_encrypt_flags) __P((DB *, u_int32_t *)); /db-4.5.20/build_windows/db.h:1654: int (*set_encrypt) __P((DB *, const char *, u_int32_t)); /db-4.5.20/build_windows/db.h:1722:#define DB_AM_ENCRYPT 0x00000400 /* Encryption */ /db-4.5.20/build_windows/db.h:2202: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *)); /db-4.5.20/build_windows/db.h:2309: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t)); /db-4.5.20/build_windows/db_cxx.h:228: virtual int get_encrypt_flags(u_int32_t *); /db-4.5.20/build_windows/db_cxx.h:229: virtual int set_encrypt(const char *, u_int32_t); /db-4.5.20/build_windows/db_cxx.h:414: virtual int get_encrypt_flags(u_int32_t *); /db-4.5.20/build_windows/db_cxx.h:418: virtual int set_encrypt(const char *, u_int32_t); /db-4.5.20/build_windows/db_static.dsp:367:SOURCE=..\crypto\aes_method.c /db-4.5.20/build_windows/db_static.dsp:379:SOURCE=..\crypto\rijndael\rijndael-alg-fst.c /db-4.5.20/build_windows/db_static.dsp:383:SOURCE=..\crypto\rijndael\rijndael-api-fst.c /db-4.5.20/build_windows/db_static.dsp:695:SOURCE=..\hmac\hmac.c /db-4.5.20/build_windows/db_static.dsp:699:SOURCE=..\hmac\sha1.c /db-4.5.20/build_windows/db_small.dsp:607:SOURCE=..\hmac\hmac.c /db-4.5.20/build_windows/db_small.dsp:611:SOURCE=..\hmac\sha1.c /db-4.5.20/examples_cxx/getting_started/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce /db-4.5.20/examples_cxx/getting_started/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh /db-4.5.20/examples_cxx/getting_started/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine /db-4.5.20/dbinc/db_cxx.in:227: virtual int get_encrypt_flags(u_int32_t *); /db-4.5.20/dbinc/db_cxx.in:228: virtual int set_encrypt(const char *, u_int32_t); /db-4.5.20/dbinc/db_cxx.in:413: virtual int get_encrypt_flags(u_int32_t *); /db-4.5.20/dbinc/db_cxx.in:417: virtual int set_encrypt(const char *, u_int32_t); /db-4.5.20/dbinc/hmac.h:7: * $Id: hmac.h,v 12.4 2006/08/24 14:45:29 bostic Exp $ /db-4.5.20/dbinc/hmac.h:10:#ifndef _DB_HMAC_H_ /db-4.5.20/dbinc/hmac.h:11:#define _DB_HMAC_H_ /db-4.5.20/dbinc/hmac.h:21: * SHA1 checksumming /db-4.5.20/dbinc/hmac.h:27:} SHA1_CTX; /db-4.5.20/dbinc/hmac.h:30: * AES assumes the SHA1 checksumming (also called MAC) /db-4.5.20/dbinc/hmac.h:39:#include "dbinc_auto/hmac_ext.h" /db-4.5.20/dbinc/hmac.h:40:#endif /* !_DB_HMAC_H_ */ /db-4.5.20/dbinc/db_page.h:76: u_int8_t encrypt_alg; /* 24: Encryption algorithm. */ /db-4.5.20/dbinc/db_page.h:257: * DB_AM_ENCRYPT always implies DB_AM_CHKSUM so that must come first. /db-4.5.20/dbinc/db_page.h:261: (F_ISSET((dbp), DB_AM_ENCRYPT) ? sizeof(PG_CRYPTO) : \ /db-4.5.20/dbinc/db_page.h:265: (F_ISSET((dbp), DB_AM_ENCRYPT) ? ((u_int8_t *)(pg) + \ /db-4.5.20/dbinc/db_page.h:270: (F_ISSET((dbp), DB_AM_ENCRYPT) ? ((u_int8_t *)(pg) + \ /db-4.5.20/dbinc/db_page.h:310: (F_ISSET((dbp), DB_AM_ENCRYPT) ? QPAGE_SEC : \ /db-4.5.20/dbinc/db.in:303: * Flags private to DB_ENV->set_encrypt. /db-4.5.20/dbinc/db.in:305:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */ /db-4.5.20/dbinc/db.in:357:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */ /db-4.5.20/dbinc/db.in:1589: int (*get_encrypt_flags) __P((DB *, u_int32_t *)); /db-4.5.20/dbinc/db.in:1629: int (*set_encrypt) __P((DB *, const char *, u_int32_t)); /db-4.5.20/dbinc/db.in:1697:#define DB_AM_ENCRYPT 0x00000400 /* Encryption */ /db-4.5.20/dbinc/db.in:2177: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *)); /db-4.5.20/dbinc/db.in:2284: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t)); /db-4.5.20/dbinc/crypto.h:42: int (*decrypt) __P((DB_ENV *, void *, void *, u_int8_t *, size_t)); /db-4.5.20/dbinc/crypto.h:43: int (*encrypt) __P((DB_ENV *, void *, void *, u_int8_t *, size_t)); /db-4.5.20/dbinc/crypto.h:49:#define CIPHER_AES 1 /* AES algorithm */ /db-4.5.20/dbinc/crypto.h:59:#include "crypto/rijndael/rijndael-api-fst.h" /db-4.5.20/dbinc/crypto.h:71:#define DB_AES_KEYLEN 128 /* AES key length */ /db-4.5.20/dbinc/crypto.h:72:#define DB_AES_CHUNK 16 /* AES byte unit size */ /db-4.5.20/dbinc/crypto.h:74:typedef struct __aes_cipher { /db-4.5.20/dbinc/crypto.h:75: keyInstance decrypt_ki; /* Decryption key instance */ /db-4.5.20/dbinc/crypto.h:76: keyInstance encrypt_ki; /* Encryption key instance */ /db-4.5.20/dbinc/crypto.h:77: u_int32_t flags; /* AES-specific flags */ /db-4.5.20/dbinc/crypto.h:78:} AES_CIPHER; /db-4.5.20/crypto/aes_method.c:10: * $Id: aes_method.c,v 12.5 2006/08/24 14:45:12 bostic Exp $ /db-4.5.20/crypto/aes_method.c:17:#include "dbinc/hmac.h" /db-4.5.20/crypto/aes_method.c:19:static void __aes_err __P((DB_ENV *, int)); /db-4.5.20/crypto/aes_method.c:20:static int __aes_derivekeys __P((DB_ENV *, DB_CIPHER *, u_int8_t *, size_t)); /db-4.5.20/crypto/aes_method.c:23: * __aes_setup -- /db-4.5.20/crypto/aes_method.c:24: * Setup AES functions. /db-4.5.20/crypto/aes_method.c:26: * PUBLIC: int __aes_setup __P((DB_ENV *, DB_CIPHER *)); /db-4.5.20/crypto/aes_method.c:29:__aes_setup(dbenv, db_cipher) /db-4.5.20/crypto/aes_method.c:33: AES_CIPHER *aes_cipher; /db-4.5.20/crypto/aes_method.c:36: db_cipher->adj_size = __aes_adj_size; /db-4.5.20/crypto/aes_method.c:37: db_cipher->close = __aes_close; /db-4.5.20/crypto/aes_method.c:38: db_cipher->decrypt = __aes_decrypt; /db-4.5.20/crypto/aes_method.c:39: db_cipher->encrypt = __aes_encrypt; /db-4.5.20/crypto/aes_method.c:40: db_cipher->init = __aes_init; /db-4.5.20/crypto/aes_method.c:41: if ((ret = __os_calloc(dbenv, 1, sizeof(AES_CIPHER), &aes_cipher)) != 0) /db-4.5.20/crypto/aes_method.c:43: db_cipher->data = aes_cipher; /db-4.5.20/crypto/aes_method.c:48: * __aes_adj_size -- /db-4.5.20/crypto/aes_method.c:52: * PUBLIC: u_int __aes_adj_size __P((size_t)); /db-4.5.20/crypto/aes_method.c:55:__aes_adj_size(len) /db-4.5.20/crypto/aes_method.c:58: if (len % DB_AES_CHUNK == 0) /db-4.5.20/crypto/aes_method.c:60: return (DB_AES_CHUNK - (u_int)(len % DB_AES_CHUNK)); /db-4.5.20/crypto/aes_method.c:64: * __aes_close -- /db-4.5.20/crypto/aes_method.c:65: * Destroy the AES encryption instantiation. /db-4.5.20/crypto/aes_method.c:67: * PUBLIC: int __aes_close __P((DB_ENV *, void *)); /db-4.5.20/crypto/aes_method.c:70:__aes_close(dbenv, data) /db-4.5.20/crypto/aes_method.c:79: * __aes_decrypt -- /db-4.5.20/crypto/aes_method.c:80: * Decrypt data with AES. /db-4.5.20/crypto/aes_method.c:82: * PUBLIC: int __aes_decrypt __P((DB_ENV *, void *, void *, /db-4.5.20/crypto/aes_method.c:86:__aes_decrypt(dbenv, aes_data, iv, cipher, cipher_len) /db-4.5.20/crypto/aes_method.c:88: void *aes_data; /db-4.5.20/crypto/aes_method.c:93: AES_CIPHER *aes; /db-4.5.20/crypto/aes_method.c:97: aes = (AES_CIPHER *)aes_data; /db-4.5.20/crypto/aes_method.c:100: if ((cipher_len % DB_AES_CHUNK) != 0) /db-4.5.20/crypto/aes_method.c:105: if ((ret = __db_cipherInit(&c, MODE_CBC, iv)) < 0) { /db-4.5.20/crypto/aes_method.c:106: __aes_err(dbenv, ret); /db-4.5.20/crypto/aes_method.c:111: if ((ret = __db_blockDecrypt(&c, &aes->decrypt_ki, cipher, /db-4.5.20/crypto/aes_method.c:113: __aes_err(dbenv, ret); /db-4.5.20/crypto/aes_method.c:120: * __aes_encrypt -- /db-4.5.20/crypto/aes_method.c:121: * Encrypt data with AES. /db-4.5.20/crypto/aes_method.c:123: * PUBLIC: int __aes_encrypt __P((DB_ENV *, void *, void *, /db-4.5.20/crypto/aes_method.c:127:__aes_encrypt(dbenv, aes_data, iv, data, data_len) /db-4.5.20/crypto/aes_method.c:129: void *aes_data; /db-4.5.20/crypto/aes_method.c:134: AES_CIPHER *aes; /db-4.5.20/crypto/aes_method.c:139: aes = (AES_CIPHER *)aes_data; /db-4.5.20/crypto/aes_method.c:140: if (aes == NULL || data == NULL) /db-4.5.20/crypto/aes_method.c:142: if ((data_len % DB_AES_CHUNK) != 0) /db-4.5.20/crypto/aes_method.c:159: if ((ret = __db_cipherInit(&c, MODE_CBC, (char *)tmp_iv)) < 0) { /db-4.5.20/crypto/aes_method.c:160: __aes_err(dbenv, ret); /db-4.5.20/crypto/aes_method.c:165: if ((ret = __db_blockEncrypt(&c, &aes->encrypt_ki, data, data_len * 8, /db-4.5.20/crypto/aes_method.c:167: __aes_err(dbenv, ret); /db-4.5.20/crypto/aes_method.c:175: * __aes_init -- /db-4.5.20/crypto/aes_method.c:176: * Initialize the AES encryption instantiation. /db-4.5.20/crypto/aes_method.c:178: * PUBLIC: int __aes_init __P((DB_ENV *, DB_CIPHER *)); /db-4.5.20/crypto/aes_method.c:181:__aes_init(dbenv, db_cipher) /db-4.5.20/crypto/aes_method.c:185: return (__aes_derivekeys(dbenv, db_cipher, (u_int8_t *)dbenv->passwd, /db-4.5.20/crypto/aes_method.c:190:__aes_derivekeys(dbenv, db_cipher, passwd, plen) /db-4.5.20/crypto/aes_method.c:196: SHA1_CTX ctx; /db-4.5.20/crypto/aes_method.c:197: AES_CIPHER *aes; /db-4.5.20/crypto/aes_method.c:204: aes = (AES_CIPHER *)db_cipher->data; /db-4.5.20/crypto/aes_method.c:213: if ((ret = __db_makeKey(&aes->encrypt_ki, DIR_ENCRYPT, /db-4.5.20/crypto/aes_method.c:214: DB_AES_KEYLEN, (char *)temp)) != TRUE) { /db-4.5.20/crypto/aes_method.c:215: __aes_err(dbenv, ret); /db-4.5.20/crypto/aes_method.c:218: if ((ret = __db_makeKey(&aes->decrypt_ki, DIR_DECRYPT, /db-4.5.20/crypto/aes_method.c:219: DB_AES_KEYLEN, (char *)temp)) != TRUE) { /db-4.5.20/crypto/aes_method.c:220: __aes_err(dbenv, ret); /db-4.5.20/crypto/aes_method.c:227: * __aes_err -- /db-4.5.20/crypto/aes_method.c:228: * Handle AES-specific errors. Codes and messages derived from /db-4.5.20/crypto/aes_method.c:229: * rijndael/rijndael-api-fst.h. /db-4.5.20/crypto/aes_method.c:232:__aes_err(dbenv, err) /db-4.5.20/crypto/aes_method.c:240: errstr = "AES key direction is invalid"; /db-4.5.20/crypto/aes_method.c:243: errstr = "AES key material not of correct length"; /db-4.5.20/crypto/aes_method.c:246: errstr = "AES key passwd not valid"; /db-4.5.20/crypto/aes_method.c:249: errstr = "AES cipher in wrong state (not initialized)"; /db-4.5.20/crypto/aes_method.c:252: errstr = "AES bad block length"; /db-4.5.20/crypto/aes_method.c:255: errstr = "AES cipher instance is invalid"; /db-4.5.20/crypto/aes_method.c:258: errstr = "AES data contents are invalid"; /db-4.5.20/crypto/aes_method.c:261: errstr = "AES unknown error"; /db-4.5.20/crypto/aes_method.c:264: errstr = "AES error unrecognized"; /db-4.5.20/crypto/crypto.c:190: case CIPHER_AES: /db-4.5.20/crypto/crypto.c:191: db_cipher->alg = CIPHER_AES; /db-4.5.20/crypto/crypto.c:192: ret = __aes_setup(dbenv, db_cipher); /db-4.5.20/crypto/crypto.c:204: * __crypto_decrypt_meta -- /db-4.5.20/crypto/crypto.c:207: * PUBLIC: int __crypto_decrypt_meta __P((DB_ENV *, DB *, u_int8_t *, int)); /db-4.5.20/crypto/crypto.c:210:__crypto_decrypt_meta(dbenv, dbp, mbuf, do_metachk) /db-4.5.20/crypto/crypto.c:224: * If we weren't given a dbp, we just want to decrypt the page on /db-4.5.20/crypto/crypto.c:259: * non-zero IV (that is written after encryption) then we decrypt (or /db-4.5.20/crypto/crypto.c:265: * algorithms we know about attempting to decrypt (and possibly /db-4.5.20/crypto/crypto.c:272: if (meta->encrypt_alg != 0) { /db-4.5.20/crypto/crypto.c:274: if (!F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.5.20/crypto/crypto.c:286: F_SET(dbp, DB_AM_ENCRYPT|DB_AM_CHKSUM); /db-4.5.20/crypto/crypto.c:289: * This was checked in set_flags when DB_AM_ENCRYPT was set. /db-4.5.20/crypto/crypto.c:294: meta->encrypt_alg != db_cipher->alg) { /db-4.5.20/crypto/crypto.c:302: * For ALL pages, we do not encrypt the beginning of the page /db-4.5.20/crypto/crypto.c:313: if (do_metachk && (ret = db_cipher->decrypt(dbenv, /db-4.5.20/crypto/crypto.c:334: ret = __crypto_algsetup(dbenv, db_cipher, meta->encrypt_alg, 1); /db-4.5.20/crypto/crypto.c:336: } else if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.5.20/crypto/crypto.c:389: return (__env_set_encrypt(dbenv_dest, sh_passwd, DB_ENCRYPT_AES)); /db-4.5.20/crypto/mersenne/mt19937db.c:8:#include "dbinc/hmac.h" /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:2: * rijndael-api-fst.c /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:6: * Optimised ANSI C code for the Rijndael cipher (now AES) /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:42:#include "crypto/rijndael/rijndael-alg-fst.h" /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:43:#include "crypto/rijndael/rijndael-api-fst.h" /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:63: if ((direction == DIR_ENCRYPT) || (direction == DIR_DECRYPT)) { /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:79: if (direction == DIR_ENCRYPT) { /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:99: if ((mode == MODE_ECB) || (mode == MODE_CBC) || (mode == MODE_CFB1)) { /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:130: key->direction == DIR_DECRYPT) { /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:148: case MODE_CBC: /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:188: * Encrypt data partitioned in octets, using RFC 2040-like padding. /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:216: key->direction == DIR_DECRYPT) { /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:239: case MODE_CBC: /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:290: (cipher->mode != MODE_CFB1 && key->direction == DIR_ENCRYPT)) { /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:308: case MODE_CBC: /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:367: key->direction == DIR_ENCRYPT) { /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:401: case MODE_CBC: /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:475: case DIR_ENCRYPT: /db-4.5.20/crypto/rijndael/rijndael-api-fst.c:479: case DIR_DECRYPT: /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:2: * $Id: rijndael-api-fst.h,v 12.0 2004/11/17 03:43:17 bostic Exp $ /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:5: * rijndael-api-fst.h /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:9: * Optimised ANSI C code for the Rijndael cipher (now AES) /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:41:#ifndef __RIJNDAEL_API_FST_H /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:42:#define __RIJNDAEL_API_FST_H /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:44:#include "crypto/rijndael/rijndael-alg-fst.h" /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:47:#define DIR_ENCRYPT 0 /* Are we encrpyting? */ /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:48:#define DIR_DECRYPT 1 /* Are we decrpyting? */ /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:50:#define MODE_CBC 2 /* Are we ciphering in CBC mode? */ /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:87: u_int8_t mode; /* MODE_ECB, MODE_CBC, or MODE_CFB1 */ /db-4.5.20/crypto/rijndael/rijndael-api-fst.h:91:#endif /* __RIJNDAEL_API_FST_H */ /db-4.5.20/crypto/rijndael/rijndael-alg-fst.c:2: * rijndael-alg-fst.c /db-4.5.20/crypto/rijndael/rijndael-alg-fst.c:6: * Optimised ANSI C code for the Rijndael cipher (now AES) /db-4.5.20/crypto/rijndael/rijndael-alg-fst.c:31:#include "crypto/rijndael/rijndael-alg-fst.h" /db-4.5.20/crypto/rijndael/rijndael-alg-fst.c:712: 0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */ /db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:2: * $Id: rijndael-alg-fst.h,v 12.1 2006/09/08 20:32:03 bostic Exp $ /db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:5: * rijndael-alg-fst.h /db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:9: * Optimised ANSI C code for the Rijndael cipher (now AES) /db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:29:#ifndef __RIJNDAEL_ALG_FST_H /db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:30:#define __RIJNDAEL_ALG_FST_H /db-4.5.20/crypto/rijndael/rijndael-alg-fst.h:40:#endif /* __RIJNDAEL_ALG_FST_H */ /db-4.5.20/crypto/crypto.html:59:a single environment method: DBENV->set_encrypt().  /db-4.5.20/crypto/crypto.html:61:by adding a new database method: DB->set_encrypt(). /db-4.5.20/crypto/crypto.html:62:

    Both of the set_encrypt methods must be called before their respective /db-4.5.20/crypto/crypto.html:68:

    DBENV->set_encrypt(DBENV *dbenv,        /* DB_ENV structure */
    /db-4.5.20/crypto/crypto.html:72:
    DB->set_encrypt(DB *dbp,             /* DB structure */
    /db-4.5.20/crypto/crypto.html:76:
    #define DB_ENCRYPT_AES  0x00000001  /* Use the AES encryption algorithm */
    /db-4.5.20/crypto/crypto.html:86:Using DB_ENCRYPT_AES automatically implies SHA1 checksumming. /db-4.5.20/crypto/crypto.html:91:DB->set_encrypt /db-4.5.20/crypto/crypto.html:109:our set_encrypt method to be the RPC or local version.  Therefore /db-4.5.20/crypto/crypto.html:117:    int      (*encrypt)__P((...)); /* Alg-specific encryption algorithm */ /db-4.5.20/crypto/crypto.html:118:    int      (*decrypt)__P((...)); /* Alg-specific decryption function */ /db-4.5.20/crypto/crypto.html:119:    void      *data;               /* Pointer to alg-specific information (AES_CIPHER) */ /db-4.5.20/crypto/crypto.html:124:typedef struct __aes_cipher { /db-4.5.20/crypto/crypto.html:125:    keyInstance    encrypt_ki;   /* Encrypt keyInstance temp. */ /db-4.5.20/crypto/crypto.html:126:    keyInstance    decrypt_ki;   /* Decrypt keyInstance temp. */ /db-4.5.20/crypto/crypto.html:128:    u_int32_t      flags;        /* AES-specific flags */ /db-4.5.20/crypto/crypto.html:129:} AES_CIPHER;
    /db-4.5.20/crypto/crypto.html:133:

    During dbenv->set_encrypt, /db-4.5.20/crypto/crypto.html:137:other subsystems.  For now, only AES ciphering functions and SHA1 /db-4.5.20/crypto/crypto.html:160:we will call __aes_init.  Additionally this function will allocate /db-4.5.20/crypto/crypto.html:164:

    In the AES-specific initialization function, __aes_init,  /db-4.5.20/crypto/crypto.html:166:__aes_derivekeys in order to fill /db-4.5.20/crypto/crypto.html:173:During db->set_encrypt, /db-4.5.20/crypto/crypto.html:193:meta-page.  In __db_pgin, we will decrypt if the page we have /db-4.5.20/crypto/crypto.html:220:

    __aes_derivekeys(DB_ENV *dbenv,           /* dbenv */
    /db-4.5.20/crypto/crypto.html:224:                 keyInstance *encrypt_key,   /* Encryption key of passwd */
    /db-4.5.20/crypto/crypto.html:225:                 keyInstance *decrypt_key);  /* Decryption key of passwd */
    /db-4.5.20/crypto/crypto.html:231:already be allocated.  These will be stored in the AES_CIPHER structure. /db-4.5.20/crypto/crypto.html:239:the 20-byte key set up in __aes_derivekeys.  If they just want /db-4.5.20/crypto/crypto.html:254:
    __aes_encrypt(DB_ENV *dbenv,        /* dbenv */
    /db-4.5.20/crypto/crypto.html:257:             u_int8_t *data,        /* Data to encrypt */
    /db-4.5.20/crypto/crypto.html:258:             size_t data_len);      /* Length of data to encrypt - 16 byte multiple */
    /db-4.5.20/crypto/crypto.html:259:This is the function to encrypt data.  It will be called to encrypt /db-4.5.20/crypto/crypto.html:261:__aes_derivekeys.  /db-4.5.20/crypto/crypto.html:264:in a pointer to the data to encrypt and its length in data_len.  /db-4.5.20/crypto/crypto.html:268:
    __aes_decrypt(DB_ENV *dbenv,    /* dbenv */
    /db-4.5.20/crypto/crypto.html:271:             u_int8_t *data,    /* Data to decrypt */
    /db-4.5.20/crypto/crypto.html:272:             size_t data_len);  /* Length of data to decrypt - 16 byte multiple */
    /db-4.5.20/crypto/crypto.html:273:This is the function to decrypt the data.  It is exactly the same /db-4.5.20/crypto/crypto.html:280:bytes every time we encrypt any data with the same password.  For /db-4.5.20/crypto/crypto.html:287:generator with the time (tv_sec) hashed through SHA1 when we create the /db-4.5.20/crypto/crypto.html:300:to the MT code will come while encrypting some data in __aes_encrypt.   /db-4.5.20/crypto/crypto.html:332:We will encrypt after the method-specific function on page-out and decrypt /db-4.5.20/crypto/crypto.html:345:our first index is based on whether we have DB_AM_CHKSUM and DB_AM_ENCRYPT /db-4.5.20/crypto/crypto.html:349:as some space to get proper alignment to encrypt on a 16-byte boundary. /db-4.5.20/crypto/crypto.html:368:to encrypt to all zero's.  If we read a hole in a file, we do not /db-4.5.20/crypto/crypto.html:399:to encrypt the DBT we send down.  The __log_put function is /db-4.5.20/crypto/crypto.html:405:new __log_put will encrypt if needed and then call __log_put_internal /db-4.5.20/crypto/crypto.html:410:will need to encrypt. /db-4.5.20/crypto/crypto.html:465:to be sent to the clients decrypted and the clients will have to encrypt /db-4.5.20/crypto/crypto.html:469:to the client.  Therefore, the client has no way to decrypt a log /db-4.5.20/crypto/crypto.html:474:

    On the master side we must copy the DBT sent in.  We encrypt the /db-4.5.20/crypto/crypto.html:496:calls to the __aes_derivekeys function with the same password yields /db-4.5.20/db_stat/db_stat.c:260: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/txn/txn.c:45:#include "dbinc/hmac.h" /db-4.5.20/txn/txn.c:1566: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data, /db-4.5.20/txn/txn.c:1578: (ret = db_cipher->encrypt(dbenv, /db-4.5.20/db_checkpoint/db_checkpoint.c:135: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/db_checkpoint/db_checkpoint.c:136: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/rpc_server/c/gen_db_server.c:106:__env_get_encrypt_flags_reply * /db-4.5.20/rpc_server/c/gen_db_server.c:107:__db_env_get_encrypt_flags_4005__SVCSUFFIX__(msg, req) /db-4.5.20/rpc_server/c/gen_db_server.c:108: __env_get_encrypt_flags_msg *msg; /db-4.5.20/rpc_server/c/gen_db_server.c:111: static __env_get_encrypt_flags_reply reply; /* must be static */ /db-4.5.20/rpc_server/c/gen_db_server.c:114: __env_get_encrypt_flags_proc(msg->dbenvcl_id, /db-4.5.20/rpc_server/c/gen_db_server.c:212:__env_set_encrypt_reply * /db-4.5.20/rpc_server/c/gen_db_server.c:213:__db_env_set_encrypt_4005__SVCSUFFIX__(msg, req) /db-4.5.20/rpc_server/c/gen_db_server.c:214: __env_set_encrypt_msg *msg; /db-4.5.20/rpc_server/c/gen_db_server.c:217: static __env_set_encrypt_reply reply; /* must be static */ /db-4.5.20/rpc_server/c/gen_db_server.c:220: __env_set_encrypt_proc(msg->dbenvcl_id, /db-4.5.20/rpc_server/c/gen_db_server.c:435:__db_get_encrypt_flags_reply * /db-4.5.20/rpc_server/c/gen_db_server.c:436:__db_db_get_encrypt_flags_4005__SVCSUFFIX__(msg, req) /db-4.5.20/rpc_server/c/gen_db_server.c:437: __db_get_encrypt_flags_msg *msg; /db-4.5.20/rpc_server/c/gen_db_server.c:440: static __db_get_encrypt_flags_reply reply; /* must be static */ /db-4.5.20/rpc_server/c/gen_db_server.c:443: __db_get_encrypt_flags_proc(msg->dbpcl_id, /db-4.5.20/rpc_server/c/gen_db_server.c:778:__db_set_encrypt_reply * /db-4.5.20/rpc_server/c/gen_db_server.c:779:__db_db_set_encrypt_4005__SVCSUFFIX__(msg, req) /db-4.5.20/rpc_server/c/gen_db_server.c:780: __db_set_encrypt_msg *msg; /db-4.5.20/rpc_server/c/gen_db_server.c:783: static __db_set_encrypt_reply reply; /* must be static */ /db-4.5.20/rpc_server/c/gen_db_server.c:786: __db_set_encrypt_proc(msg->dbpcl_id, /db-4.5.20/rpc_server/c/db_server_util.c:795: (void)dbenv->set_encrypt(dbenv, hp->passwd, /db-4.5.20/rpc_server/c/db_server_util.c:796: DB_ENCRYPT_AES); /db-4.5.20/rpc_server/c/db_server_proc.c:217: * PUBLIC: void __env_get_encrypt_flags_proc __P((u_int, /db-4.5.20/rpc_server/c/db_server_proc.c:218: * PUBLIC: __env_get_encrypt_flags_reply *)); /db-4.5.20/rpc_server/c/db_server_proc.c:221:__env_get_encrypt_flags_proc(dbenvcl_id, replyp) /db-4.5.20/rpc_server/c/db_server_proc.c:223: __env_get_encrypt_flags_reply *replyp; /db-4.5.20/rpc_server/c/db_server_proc.c:231: replyp->status = dbenv->get_encrypt_flags(dbenv, &replyp->flags); /db-4.5.20/rpc_server/c/db_server_proc.c:235: * PUBLIC: void __env_set_encrypt_proc __P((u_int, char *, u_int32_t, /db-4.5.20/rpc_server/c/db_server_proc.c:236: * PUBLIC: __env_set_encrypt_reply *)); /db-4.5.20/rpc_server/c/db_server_proc.c:239:__env_set_encrypt_proc(dbenvcl_id, passwd, flags, replyp) /db-4.5.20/rpc_server/c/db_server_proc.c:243: __env_set_encrypt_reply *replyp; /db-4.5.20/rpc_server/c/db_server_proc.c:252: ret = dbenv->set_encrypt(dbenv, passwd, flags); /db-4.5.20/rpc_server/c/db_server_proc.c:881: * PUBLIC: void __db_get_encrypt_flags_proc __P((u_int, /db-4.5.20/rpc_server/c/db_server_proc.c:882: * PUBLIC: __db_get_encrypt_flags_reply *)); /db-4.5.20/rpc_server/c/db_server_proc.c:885:__db_get_encrypt_flags_proc(dbpcl_id, replyp) /db-4.5.20/rpc_server/c/db_server_proc.c:887: __db_get_encrypt_flags_reply *replyp; /db-4.5.20/rpc_server/c/db_server_proc.c:895: replyp->status = dbp->get_encrypt_flags(dbp, &replyp->flags); /db-4.5.20/rpc_server/c/db_server_proc.c:899: * PUBLIC: void __db_set_encrypt_proc __P((u_int, char *, u_int32_t, /db-4.5.20/rpc_server/c/db_server_proc.c:900: * PUBLIC: __db_set_encrypt_reply *)); /db-4.5.20/rpc_server/c/db_server_proc.c:903:__db_set_encrypt_proc(dbpcl_id, passwd, flags, replyp) /db-4.5.20/rpc_server/c/db_server_proc.c:907: __db_set_encrypt_reply *replyp; /db-4.5.20/rpc_server/c/db_server_proc.c:916: ret = dbp->set_encrypt(dbp, passwd, flags); /db-4.5.20/rpc_server/db_server.x:72:struct __env_get_encrypt_flags_msg { /db-4.5.20/rpc_server/db_server.x:76:struct __env_get_encrypt_flags_reply { /db-4.5.20/rpc_server/db_server.x:148:struct __env_set_encrypt_msg { /db-4.5.20/rpc_server/db_server.x:154:struct __env_set_encrypt_reply { /db-4.5.20/rpc_server/db_server.x:301:struct __db_get_encrypt_flags_msg { /db-4.5.20/rpc_server/db_server.x:305:struct __db_get_encrypt_flags_reply { /db-4.5.20/rpc_server/db_server.x:546:struct __db_set_encrypt_msg { /db-4.5.20/rpc_server/db_server.x:552:struct __db_set_encrypt_reply { /db-4.5.20/rpc_server/db_server.x:839: __env_get_encrypt_flags_reply __DB_env_get_encrypt_flags(__env_get_encrypt_flags_msg) = 7; /db-4.5.20/rpc_server/db_server.x:846: __env_set_encrypt_reply __DB_env_set_encrypt(__env_set_encrypt_msg) = 14; /db-4.5.20/rpc_server/db_server.x:858: __db_get_encrypt_flags_reply __DB_db_get_encrypt_flags(__db_get_encrypt_flags_msg) = 26; /db-4.5.20/rpc_server/db_server.x:877: __db_set_encrypt_reply __DB_db_set_encrypt(__db_set_encrypt_msg) = 45; /db-4.5.20/rpc_server/cxx/db_server_cxxutil.cpp:724: (void)dbenv->set_encrypt(hp->passwd, DB_ENCRYPT_AES); /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:186:__env_get_encrypt_flags_proc( /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:188: __env_get_encrypt_flags_reply *replyp) /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:196: replyp->status = dbenv->get_encrypt_flags(&replyp->flags); /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:200:__env_set_encrypt_proc( /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:204: __env_set_encrypt_reply *replyp) /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:213: ret = dbenv->set_encrypt(passwd, flags); /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:754:__db_get_encrypt_flags_proc( /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:756: __db_get_encrypt_flags_reply *replyp) /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:764: replyp->status = dbp->get_encrypt_flags(&replyp->flags); /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:768:__db_set_encrypt_proc( /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:772: __db_set_encrypt_reply *replyp) /db-4.5.20/rpc_server/cxx/db_server_cxxproc.cpp:781: ret = dbp->set_encrypt(passwd, flags); /db-4.5.20/rpc_server/rpc.src:101:BEGIN env_get_encrypt_flags CODE /db-4.5.20/rpc_server/rpc.src:222:BEGIN env_set_encrypt CODE /db-4.5.20/rpc_server/rpc.src:351:BEGIN db_get_encrypt_flags CODE /db-4.5.20/rpc_server/rpc.src:474:BEGIN db_set_encrypt CODE /db-4.5.20/db_upgrade/db_upgrade.c:113: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/db_upgrade/db_upgrade.c:114: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/db_verify/db_verify.c:122: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/examples_c/getting_started/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce /db-4.5.20/examples_c/getting_started/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh /db-4.5.20/examples_c/getting_started/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine /db-4.5.20/hmac/hmac.c:10: * $Id: hmac.c,v 12.9 2006/09/09 14:28:23 bostic Exp $ /db-4.5.20/hmac/hmac.c:19:#include "dbinc/hmac.h" /db-4.5.20/hmac/hmac.c:22:#define HMAC_OUTPUT_SIZE 20 /db-4.5.20/hmac/hmac.c:23:#define HMAC_BLOCK_SIZE 64 /db-4.5.20/hmac/hmac.c:25:static void __db_hmac __P((u_int8_t *, u_int8_t *, size_t, u_int8_t *)); /db-4.5.20/hmac/hmac.c:31: * underlying SHA1 functions will properly pad the buffer if the data length /db-4.5.20/hmac/hmac.c:38: * __db_hmac -- /db-4.5.20/hmac/hmac.c:42:__db_hmac(k, data, data_len, mac) /db-4.5.20/hmac/hmac.c:46: SHA1_CTX ctx; /db-4.5.20/hmac/hmac.c:47: u_int8_t key[HMAC_BLOCK_SIZE]; /db-4.5.20/hmac/hmac.c:48: u_int8_t ipad[HMAC_BLOCK_SIZE]; /db-4.5.20/hmac/hmac.c:49: u_int8_t opad[HMAC_BLOCK_SIZE]; /db-4.5.20/hmac/hmac.c:50: u_int8_t tmp[HMAC_OUTPUT_SIZE]; /db-4.5.20/hmac/hmac.c:53: memset(key, 0x00, HMAC_BLOCK_SIZE); /db-4.5.20/hmac/hmac.c:54: memset(ipad, 0x36, HMAC_BLOCK_SIZE); /db-4.5.20/hmac/hmac.c:55: memset(opad, 0x5C, HMAC_BLOCK_SIZE); /db-4.5.20/hmac/hmac.c:57: memcpy(key, k, HMAC_OUTPUT_SIZE); /db-4.5.20/hmac/hmac.c:59: for (i = 0; i < HMAC_BLOCK_SIZE; i++) { /db-4.5.20/hmac/hmac.c:65: __db_SHA1Update(&ctx, ipad, HMAC_BLOCK_SIZE); /db-4.5.20/hmac/hmac.c:69: __db_SHA1Update(&ctx, opad, HMAC_BLOCK_SIZE); /db-4.5.20/hmac/hmac.c:70: __db_SHA1Update(&ctx, tmp, HMAC_OUTPUT_SIZE); /db-4.5.20/hmac/hmac.c:77: * Create a MAC/SHA1 checksum. /db-4.5.20/hmac/hmac.c:118: __db_hmac(mac_key, data, data_len, store); /db-4.5.20/hmac/hmac.c:128: * Create a MAC/SHA1 key. /db-4.5.20/hmac/hmac.c:138: SHA1_CTX ctx; /db-4.5.20/hmac/hmac.c:160:__db_check_chksum(dbenv, hdr, db_cipher, chksum, data, data_len, is_hmac) /db-4.5.20/hmac/hmac.c:167: int is_hmac; /db-4.5.20/hmac/hmac.c:179: if (is_hmac == 0) { /db-4.5.20/hmac/hmac.c:218: __db_hmac(mac_key, data, data_len, new); /db-4.5.20/hmac/sha1.c:2: * $Id: sha1.c,v 12.2 2006/09/08 20:32:10 bostic Exp $ /db-4.5.20/hmac/sha1.c:8:#include "dbinc/hmac.h" /db-4.5.20/hmac/sha1.c:11:SHA-1 in C /db-4.5.20/hmac/sha1.c:22: void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned int /db-4.5.20/hmac/sha1.c:25: void SHA1Update(SHA1_CTX* context, unsigned char* data, unsigned /db-4.5.20/hmac/sha1.c:95:/* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ /db-4.5.20/hmac/sha1.c:104:static void __db_SHAPrintContext __P((SHA1_CTX *, char *)); /db-4.5.20/hmac/sha1.c:107: SHA1_CTX *context; /db-4.5.20/hmac/sha1.c:194: * PUBLIC: void __db_SHA1Init __P((SHA1_CTX *)); /db-4.5.20/hmac/sha1.c:198: SHA1_CTX *context; /db-4.5.20/hmac/sha1.c:200: /* SHA1 initialization constants */ /db-4.5.20/hmac/sha1.c:216: * PUBLIC: void __db_SHA1Update __P((SHA1_CTX *, unsigned char *, /db-4.5.20/hmac/sha1.c:221: SHA1_CTX *context; /db-4.5.20/hmac/sha1.c:255: * PUBLIC: void __db_SHA1Final __P((unsigned char *, SHA1_CTX *)); /db-4.5.20/hmac/sha1.c:260: SHA1_CTX *context; /db-4.5.20/dist/Makefile.in:195: fop_rec@o@ fop_util@o@ hash_func@o@ hmac@o@ hsearch@o@ lock@o@ \ /db-4.5.20/dist/Makefile.in:210: os_yield@o@ seq_stat@o@ sequence@o@ sha1@o@ snprintf@o@ txn@o@ \ /db-4.5.20/dist/Makefile.in:220: aes_method@o@ crypto@o@ mt19937db@o@ rijndael-alg-fst@o@ \ /db-4.5.20/dist/Makefile.in:221: rijndael-api-fst@o@ /db-4.5.20/dist/Makefile.in:1207:aes_method@o@: $(srcdir)/crypto/aes_method.c /db-4.5.20/dist/Makefile.in:1413:hmac@o@: $(srcdir)/hmac/hmac.c /db-4.5.20/dist/Makefile.in:1633:rijndael-alg-fst@o@: $(srcdir)/crypto/rijndael/rijndael-alg-fst.c /db-4.5.20/dist/Makefile.in:1635:rijndael-api-fst@o@: $(srcdir)/crypto/rijndael/rijndael-api-fst.c /db-4.5.20/dist/Makefile.in:1641:sha1@o@: $(srcdir)/hmac/sha1.c /db-4.5.20/dist/tags:13:AES_CIPHER ../dbinc/crypto.h /^} AES_CIPHER;$/ /db-4.5.20/dist/tags:26:BAD_BLOCK_LENGTH ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_BLOCK_LENGTH -6$/ /db-4.5.20/dist/tags:27:BAD_CIPHER_INSTANCE ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_CIPHER_INSTANCE -7$/ /db-4.5.20/dist/tags:28:BAD_CIPHER_MODE ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_CIPHER_MODE -4 \/* Params st/ /db-4.5.20/dist/tags:29:BAD_CIPHER_STATE ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_CIPHER_STATE -5 \/* Cipher in/ /db-4.5.20/dist/tags:30:BAD_DATA ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_DATA -8 \/* Data cont/ /db-4.5.20/dist/tags:31:BAD_KEY_DIR ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_KEY_DIR -1 \/* Key direc/ /db-4.5.20/dist/tags:32:BAD_KEY_INSTANCE ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_KEY_INSTANCE -3 \/* Key passe/ /db-4.5.20/dist/tags:33:BAD_KEY_MAT ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_KEY_MAT -2 \/* Key mater/ /db-4.5.20/dist/tags:35:BAD_OTHER ../crypto/rijndael/rijndael-api-fst.h /^#define BAD_OTHER -9 \/* Unknown e/ /db-4.5.20/dist/tags:61:BITSPERBLOCK ../crypto/rijndael/rijndael-api-fst.h /^#define BITSPERBLOCK 128 \/* Default nu/ /db-4.5.20/dist/tags:120:CHAR64LONG16 ../hmac/sha1.c /^} CHAR64LONG16;$/ /db-4.5.20/dist/tags:126:CIPHER_AES ../dbinc/crypto.h /^#define CIPHER_AES 1 \/* AES algorithm *\/$/ /db-4.5.20/dist/tags:230:DB_AES_CHUNK ../dbinc/crypto.h /^#define DB_AES_CHUNK 16 \/* AES byte unit size *\// /db-4.5.20/dist/tags:231:DB_AES_KEYLEN ../dbinc/crypto.h /^#define DB_AES_KEYLEN 128 \/* AES key length *\/$/ /db-4.5.20/dist/tags:246:DB_AM_ENCRYPT ../dbinc/db.in /^#define DB_AM_ENCRYPT 0x00000400 \/* Encryption */ /db-4.5.20/dist/tags:321:DB_ENCRYPT ../dbinc/db.in /^#define DB_ENCRYPT 0x00020000 \/* Btree, Has/ /db-4.5.20/dist/tags:322:DB_ENCRYPT_AES ../dbinc/db.in /^#define DB_ENCRYPT_AES 0x0000001 \/* AES, as/ /db-4.5.20/dist/tags:323:DB_ENC_MAGIC ../dbinc/hmac.h /^#define DB_ENC_MAGIC "encryption and decryption ke/ /db-4.5.20/dist/tags:511:DB_MAC_MAGIC ../dbinc/hmac.h /^#define DB_MAC_MAGIC "mac derivation key magic val/ /db-4.5.20/dist/tags:842:DIR_DECRYPT ../crypto/rijndael/rijndael-api-fst.h /^#define DIR_DECRYPT 1 \/* Are we de/ /db-4.5.20/dist/tags:843:DIR_ENCRYPT ../crypto/rijndael/rijndael-api-fst.h /^#define DIR_ENCRYPT 0 \/* Are we en/ /db-4.5.20/dist/tags:862:DbEnv_get_encrypt_flags ../libdb_java/db_java_wrap.c /^SWIGINTERN u_int32_t DbEnv_get_encrypt_flags(struc/ /db-4.5.20/dist/tags:946:DbEnv_set_encrypt ../libdb_java/db_java_wrap.c /^SWIGINTERN db_ret_t DbEnv_set_encrypt(struct DbEnv/ /db-4.5.20/dist/tags:1035:Db_get_encrypt_flags ../libdb_java/db_java_wrap.c /^SWIGINTERN u_int32_t Db_get_encrypt_flags(struct D/ /db-4.5.20/dist/tags:1064:Db_set_encrypt ../libdb_java/db_java_wrap.c /^SWIGINTERN db_ret_t Db_set_encrypt(struct Db *self/ /db-4.5.20/dist/tags:1130:GETU32 ../crypto/rijndael/rijndael-alg-fst.c /^#define GETU32(p) SWAP(*((u32 *)(p)))$/ /db-4.5.20/dist/tags:1163:HMAC_BLOCK_SIZE ../hmac/hmac.c /^#define HMAC_BLOCK_SIZE 64$/ /db-4.5.20/dist/tags:1164:HMAC_OUTPUT_SIZE ../hmac/hmac.c /^#define HMAC_OUTPUT_SIZE 20$/ /db-4.5.20/dist/tags:1348:MAXKB ../crypto/rijndael/rijndael-alg-fst.h /^#define MAXKB (256\/8)$/ /db-4.5.20/dist/tags:1349:MAXKC ../crypto/rijndael/rijndael-alg-fst.h /^#define MAXKC (256\/32)$/ /db-4.5.20/dist/tags:1350:MAXNR ../crypto/rijndael/rijndael-alg-fst.h /^#define MAXNR 14$/ /db-4.5.20/dist/tags:1352:MAX_IV_SIZE ../crypto/rijndael/rijndael-api-fst.h /^#define MAX_IV_SIZE 16 \/* # bytes ne/ /db-4.5.20/dist/tags:1353:MAX_KEY_SIZE ../crypto/rijndael/rijndael-api-fst.h /^#define MAX_KEY_SIZE 64 \/* # of ASCII/ /db-4.5.20/dist/tags:1364:MODE_CBC ../crypto/rijndael/rijndael-api-fst.h /^#define MODE_CBC 2 \/* Are we ci/ /db-4.5.20/dist/tags:1365:MODE_CFB1 ../crypto/rijndael/rijndael-api-fst.h /^#define MODE_CFB1 3 \/* Are we ci/ /db-4.5.20/dist/tags:1366:MODE_ECB ../crypto/rijndael/rijndael-api-fst.h /^#define MODE_ECB 1 \/* Are we ci/ /db-4.5.20/dist/tags:1482:OK_CRYPTO_FLAGS ../env/env_method.c /^#define OK_CRYPTO_FLAGS (DB_ENCRYPT_AES)$/ /db-4.5.20/dist/tags:1524:PUTU32 ../crypto/rijndael/rijndael-alg-fst.c /^#define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st/ /db-4.5.20/dist/tags:1601:R0 ../hmac/sha1.c /^#define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0/ /db-4.5.20/dist/tags:1602:R1 ../hmac/sha1.c /^#define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x/ /db-4.5.20/dist/tags:1603:R2 ../hmac/sha1.c /^#define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EB/ /db-4.5.20/dist/tags:1604:R3 ../hmac/sha1.c /^#define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i/ /db-4.5.20/dist/tags:1605:R4 ../hmac/sha1.c /^#define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1/ /db-4.5.20/dist/tags:1779:SHA1HANDSOFF ../hmac/sha1.c /^#define SHA1HANDSOFF$/ /db-4.5.20/dist/tags:1780:SHA1_CTX ../dbinc/hmac.h /^} SHA1_CTX;$/ /db-4.5.20/dist/tags:1924:SWAP ../crypto/rijndael/rijndael-alg-fst.c /^#define SWAP(x) (_lrotl(x, 8) & 0x00ff00ff | _lrot/ /db-4.5.20/dist/tags:2140:_DB_HMAC_H_ ../dbinc/hmac.h /^#define _DB_HMAC_H_$/ /db-4.5.20/dist/tags:2200:__RIJNDAEL_ALG_FST_H ../crypto/rijndael/rijndael-alg-fst.h /^#define __RIJNDAEL_ALG_FST_H$/ /db-4.5.20/dist/tags:2201:__RIJNDAEL_API_FST_H ../crypto/rijndael/rijndael-api-fst.h /^#define __RIJNDAEL_API_FST_H$/ /db-4.5.20/dist/tags:2209:__aes_adj_size ../crypto/aes_method.c /^__aes_adj_size(len)$/ /db-4.5.20/dist/tags:2210:__aes_close ../crypto/aes_method.c /^__aes_close(dbenv, data)$/ /db-4.5.20/dist/tags:2211:__aes_decrypt ../crypto/aes_method.c /^__aes_decrypt(dbenv, aes_data, iv, cipher, cipher_/ /db-4.5.20/dist/tags:2212:__aes_derivekeys ../crypto/aes_method.c /^__aes_derivekeys(dbenv, db_cipher, passwd, plen)$/ /db-4.5.20/dist/tags:2213:__aes_encrypt ../crypto/aes_method.c /^__aes_encrypt(dbenv, aes_data, iv, data, data_len)/ /db-4.5.20/dist/tags:2214:__aes_err ../crypto/aes_method.c /^__aes_err(dbenv, err)$/ /db-4.5.20/dist/tags:2215:__aes_init ../crypto/aes_method.c /^__aes_init(dbenv, db_cipher)$/ /db-4.5.20/dist/tags:2216:__aes_setup ../crypto/aes_method.c /^__aes_setup(dbenv, db_cipher)$/ /db-4.5.20/dist/tags:2429:__crypto_decrypt_meta ../crypto/crypto.c /^__crypto_decrypt_meta(dbenv, dbp, mbuf, do_metachk/ /db-4.5.20/dist/tags:2438:__db_SHA1Final ../hmac/sha1.c /^__db_SHA1Final(digest, context)$/ /db-4.5.20/dist/tags:2439:__db_SHA1Init ../hmac/sha1.c /^__db_SHA1Init(context)$/ /db-4.5.20/dist/tags:2440:__db_SHA1Transform ../hmac/sha1.c /^__db_SHA1Transform(state, buffer)$/ /db-4.5.20/dist/tags:2441:__db_SHA1Update ../hmac/sha1.c /^__db_SHA1Update(context, data, len)$/ /db-4.5.20/dist/tags:2442:__db_SHAPrintContext ../hmac/sha1.c /^__db_SHAPrintContext(context, msg)$/ /db-4.5.20/dist/tags:2463:__db_blockDecrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_blockDecrypt(cipher, key, input, inputLen, ou/ /db-4.5.20/dist/tags:2464:__db_blockEncrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_blockEncrypt(cipher, key, input, inputLen, ou/ /db-4.5.20/dist/tags:2499:__db_check_chksum ../hmac/hmac.c /^__db_check_chksum(dbenv, hdr, db_cipher, chksum, d/ /db-4.5.20/dist/tags:2503:__db_chksum ../hmac/hmac.c /^__db_chksum(hdr, data, data_len, mac_key, store)$/ /db-4.5.20/dist/tags:2505:__db_cipherInit ../crypto/rijndael/rijndael-api-fst.c /^__db_cipherInit(cipher, mode, IV)$/ /db-4.5.20/dist/tags:2506:__db_cipherUpdateRounds ../crypto/rijndael/rijndael-api-fst.c /^__db_cipherUpdateRounds(cipher, key, input, inputL/ /db-4.5.20/dist/tags:2535:__db_db_get_encrypt_flags_4005__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_db_get_encrypt_flags_4005__SVCSUFFIX__(msg, r/ /db-4.5.20/dist/tags:2554:__db_db_set_encrypt_4005__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_db_set_encrypt_4005__SVCSUFFIX__(msg, req)$/ /db-4.5.20/dist/tags:2594:__db_derive_mac ../hmac/hmac.c /^__db_derive_mac(passwd, plen, mac_key)$/ /db-4.5.20/dist/tags:2595:__db_des_destroy ../env/env_region.c /^__db_des_destroy(dbenv, rp)$/ /db-4.5.20/dist/tags:2596:__db_des_get ../env/env_region.c /^__db_des_get(dbenv, env_infop, infop, rpp)$/ /db-4.5.20/dist/tags:2624:__db_env_get_encrypt_flags_4005__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_env_get_encrypt_flags_4005__SVCSUFFIX__(msg, / /db-4.5.20/dist/tags:2631:__db_env_set_encrypt_4005__SVCSUFFIX__ ../rpc_server/c/gen_db_server.c /^__db_env_set_encrypt_4005__SVCSUFFIX__(msg, req)$/ /db-4.5.20/dist/tags:2668:__db_get_encrypt_flags ../db/db_method.c /^__db_get_encrypt_flags(dbp, flagsp)$/ /db-4.5.20/dist/tags:2669:__db_get_encrypt_flags_proc ../rpc_server/c/db_server_proc.c /^__db_get_encrypt_flags_proc(dbpcl_id, replyp)$/ /db-4.5.20/dist/tags:2704:__db_hmac ../hmac/hmac.c /^__db_hmac(k, data, data_len, mac)$/ /db-4.5.20/dist/tags:2760:__db_makeKey ../crypto/rijndael/rijndael-api-fst.c /^__db_makeKey(key, direction, keyLen, keyMaterial)$/ /db-4.5.20/dist/tags:2821:__db_padDecrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_padDecrypt(cipher, key, input, inputOctets, o/ /db-4.5.20/dist/tags:2822:__db_padEncrypt ../crypto/rijndael/rijndael-api-fst.c /^__db_padEncrypt(cipher, key, input, inputOctets, o/ /db-4.5.20/dist/tags:2936:__db_rijndaelDecrypt ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelDecrypt(rk, Nr, ct, pt)$/ /db-4.5.20/dist/tags:2937:__db_rijndaelDecryptRound ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelDecryptRound(rk, Nr, pt, ct)$/ /db-4.5.20/dist/tags:2938:__db_rijndaelEncrypt ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelEncrypt(rk, Nr, pt, ct)$/ /db-4.5.20/dist/tags:2939:__db_rijndaelEncryptRound ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelEncryptRound(rk, Nr, pt, ct)$/ /db-4.5.20/dist/tags:2940:__db_rijndaelKeySetupDec ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelKeySetupDec(rk, cipherKey, keyBits)$/ /db-4.5.20/dist/tags:2941:__db_rijndaelKeySetupEnc ../crypto/rijndael/rijndael-alg-fst.c /^__db_rijndaelKeySetupEnc(rk, cipherKey, keyBits)$/ /db-4.5.20/dist/tags:2972:__db_set_encrypt ../db/db_method.c /^__db_set_encrypt(dbp, passwd, flags)$/ /db-4.5.20/dist/tags:2973:__db_set_encrypt_proc ../rpc_server/c/db_server_proc.c /^__db_set_encrypt_proc(dbpcl_id, passwd, flags, rep/ /db-4.5.20/dist/tags:3150:__dbcl_db_get_encrypt_flags ../rpc_client/gen_client.c /^__dbcl_db_get_encrypt_flags(dbp, flagsp)$/ /db-4.5.20/dist/tags:3178:__dbcl_db_set_encrypt ../rpc_client/gen_client.c /^__dbcl_db_set_encrypt(dbp, passwd, flags)$/ /db-4.5.20/dist/tags:3221:__dbcl_env_get_encrypt_flags ../rpc_client/gen_client.c /^__dbcl_env_get_encrypt_flags(dbenv, flagsp)$/ /db-4.5.20/dist/tags:3231:__dbcl_env_set_encrypt ../rpc_client/gen_client.c /^__dbcl_env_set_encrypt(dbenv, passwd, flags)$/ /db-4.5.20/dist/tags:3365:__env_get_encrypt_flags ../env/env_method.c /^__env_get_encrypt_flags(dbenv, flagsp)$/ /db-4.5.20/dist/tags:3366:__env_get_encrypt_flags_proc ../rpc_server/c/db_server_proc.c /^__env_get_encrypt_flags_proc(dbenvcl_id, replyp)$/ /db-4.5.20/dist/tags:3404:__env_set_encrypt ../env/env_method.c /^__env_set_encrypt(dbenv, passwd, flags)$/ /db-4.5.20/dist/tags:3405:__env_set_encrypt_proc ../rpc_server/c/db_server_proc.c /^__env_set_encrypt_proc(dbenvcl_id, passwd, flags, / /db-4.5.20/dist/tags:3722:__log_encrypt_record ../log/log_put.c /^__log_encrypt_record(dbenv, dbt, hdr, orig)$/ /db-4.5.20/dist/tags:4494:blk ../hmac/sha1.c /^#define blk(i) (block->l[i&15] = rol(block->l[(i+1/ /db-4.5.20/dist/tags:4495:blk0 ../hmac/sha1.c /^#define blk0(i) is_bigendian ? block->l[i] : \\$/ /db-4.5.20/dist/tags:4498:cipherInstance ../crypto/rijndael/rijndael-api-fst.h /^} cipherInstance;$/ /db-4.5.20/dist/tags:4709:keyInstance ../crypto/rijndael/rijndael-api-fst.h /^} keyInstance;$/ /db-4.5.20/dist/tags:4791:rol ../hmac/sha1.c /^#define rol(value, bits) (((value) << (bits)) | ((/ /db-4.5.20/dist/tags:4930:u16 ../crypto/rijndael/rijndael-alg-fst.h /^typedef u_int16_t u16;$/ /db-4.5.20/dist/tags:4931:u32 ../crypto/rijndael/rijndael-alg-fst.h /^typedef u_int32_t u32;$/ /db-4.5.20/dist/tags:4932:u8 ../crypto/rijndael/rijndael-alg-fst.h /^typedef u_int8_t u8;$/ /db-4.5.20/dist/s_include:74:for i in db btree clib common crypto dbreg env fileops hash hmac \ /db-4.5.20/dist/s_tags:13: ../crypto/rijndael/*.[ch] \ /db-4.5.20/dist/s_tags:21: ../hmac/*.[ch] \ /db-4.5.20/dist/srcfiles.in:100:crypto/aes_method.c dynamic static vx /db-4.5.20/dist/srcfiles.in:103:crypto/rijndael/rijndael-alg-fst.c dynamic static vx /db-4.5.20/dist/srcfiles.in:104:crypto/rijndael/rijndael-api-fst.c dynamic static vx /db-4.5.20/dist/srcfiles.in:253:hmac/hmac.c dynamic small static vx vxsmall /db-4.5.20/dist/srcfiles.in:254:hmac/sha1.c dynamic small static vx vxsmall /db-4.5.20/dist/aclocal/libtool.ac:5223: icc* | ecc*) /db-4.5.20/dist/aclocal/libtool.ac:5543: ecc*,ia64* | icc*,ia64*) # Intel C compiler on ia64 /db-4.5.20/dist/s_symlink:41:build hmac/tags ../dist/tags /db-4.5.20/dist/pubdef.in:21:DB_AM_ENCRYPT * I * /db-4.5.20/dist/pubdef.in:87:DB_ENCRYPT D I J /db-4.5.20/dist/pubdef.in:88:DB_ENCRYPT_AES D I J /db-4.5.20/dist/winmsi/dbwix.m4:148:m4_define(`WIX_DB_PERSISTENT_GUID', `m4_esyscmd(echo "_WIXDB_PRODUCT @@ _WIXDB_VERSION @@ _WIXDB_CURDIR @@ _WIXDB_SUBDIR @@ _WIXDB_CURFILE" | openssl md5 | sed -e "s/^\(........\)\(....\)\(....\)\(....\)\(....\)\(............\)/\1-\2-\3-\4-\5/")') /db-4.5.20/dist/winmsi/s_winmsi.fcn:1130: RequireFileInPath PATH "$PATH" openssl # needed for MD5 hashing /db-4.5.20/dist/template/db_server_proc:159:/* BEGIN __env_get_encrypt_flags_proc */ /db-4.5.20/dist/template/db_server_proc:161:__env_get_encrypt_flags_proc(dbenvcl_id, replyp) /db-4.5.20/dist/template/db_server_proc:163: __env_get_encrypt_flags_reply *replyp; /db-4.5.20/dist/template/db_server_proc:164:/* END __env_get_encrypt_flags_proc */ /db-4.5.20/dist/template/db_server_proc:323:/* BEGIN __env_set_encrypt_proc */ /db-4.5.20/dist/template/db_server_proc:325:__env_set_encrypt_proc(dbenvcl_id, passwd, flags, replyp) /db-4.5.20/dist/template/db_server_proc:329: __env_set_encrypt_reply *replyp; /db-4.5.20/dist/template/db_server_proc:330:/* END __env_set_encrypt_proc */ /db-4.5.20/dist/template/db_server_proc:659:/* BEGIN __db_get_encrypt_flags_proc */ /db-4.5.20/dist/template/db_server_proc:661:__db_get_encrypt_flags_proc(dbpcl_id, replyp) /db-4.5.20/dist/template/db_server_proc:663: __db_get_encrypt_flags_reply *replyp; /db-4.5.20/dist/template/db_server_proc:664:/* END __db_get_encrypt_flags_proc */ /db-4.5.20/dist/template/db_server_proc:1168:/* BEGIN __db_set_encrypt_proc */ /db-4.5.20/dist/template/db_server_proc:1170:__db_set_encrypt_proc(dbpcl_id, passwd, flags, replyp) /db-4.5.20/dist/template/db_server_proc:1174: __db_set_encrypt_reply *replyp; /db-4.5.20/dist/template/db_server_proc:1175:/* END __db_set_encrypt_proc */ /db-4.5.20/env/env_region.c:16:static void __db_des_destroy __P((DB_ENV *, REGION *)); /db-4.5.20/env/env_region.c:17:static int __db_des_get __P((DB_ENV *, REGINFO *, REGINFO *, REGION **)); /db-4.5.20/env/env_region.c:264: if ((ret = __db_des_get(dbenv, infop, infop, &rp)) != 0 || rp == NULL) /db-4.5.20/env/env_region.c:415: if ((ret = __db_des_get(dbenv, infop, infop, &rp)) != 0) { /db-4.5.20/env/env_region.c:918: if ((ret = __db_des_get(dbenv, dbenv->reginfo, infop, &rp)) != 0) /db-4.5.20/env/env_region.c:926: * __db_des_get may have created the region and reset the create /db-4.5.20/env/env_region.c:970: __db_des_destroy(dbenv, rp); /db-4.5.20/env/env_region.c:1010: __db_des_destroy(dbenv, rp); /db-4.5.20/env/env_region.c:1020: * __db_des_get -- /db-4.5.20/env/env_region.c:1025:__db_des_get(dbenv, env_infop, infop, rpp) /db-4.5.20/env/env_region.c:1117: * __db_des_destroy -- /db-4.5.20/env/env_region.c:1121:__db_des_destroy(dbenv, rp) /db-4.5.20/env/env_method.c:21:#include "dbinc/hmac.h" /db-4.5.20/env/env_method.c:182: dbenv->get_encrypt_flags = __env_get_encrypt_flags; /db-4.5.20/env/env_method.c:288: dbenv->set_encrypt = __env_set_encrypt; /db-4.5.20/env/env_method.c:428: * __env_get_encrypt_flags -- /db-4.5.20/env/env_method.c:429: * {DB_ENV,DB}->get_encrypt_flags. /db-4.5.20/env/env_method.c:431: * PUBLIC: int __env_get_encrypt_flags __P((DB_ENV *, u_int32_t *)); /db-4.5.20/env/env_method.c:434:__env_get_encrypt_flags(dbenv, flagsp) /db-4.5.20/env/env_method.c:442: if (db_cipher != NULL && db_cipher->alg == CIPHER_AES) /db-4.5.20/env/env_method.c:443: *flagsp = DB_ENCRYPT_AES; /db-4.5.20/env/env_method.c:456: * __env_set_encrypt -- /db-4.5.20/env/env_method.c:457: * DB_ENV->set_encrypt. /db-4.5.20/env/env_method.c:459: * PUBLIC: int __env_set_encrypt __P((DB_ENV *, const char *, u_int32_t)); /db-4.5.20/env/env_method.c:462:__env_set_encrypt(dbenv, passwd, flags) /db-4.5.20/env/env_method.c:471: ENV_ILLEGAL_AFTER_OPEN(dbenv, "DB_ENV->set_encrypt"); /db-4.5.20/env/env_method.c:472:#define OK_CRYPTO_FLAGS (DB_ENCRYPT_AES) /db-4.5.20/env/env_method.c:475: return (__db_ferr(dbenv, "DB_ENV->set_encrypt", 0)); /db-4.5.20/env/env_method.c:478: __db_errx(dbenv, "Empty password specified to set_encrypt"); /db-4.5.20/env/env_method.c:510: case DB_ENCRYPT_AES: /db-4.5.20/env/env_method.c:511: if ((ret = __crypto_algsetup(dbenv, db_cipher, CIPHER_AES, 0)) /db-4.5.20/db_hotbackup/db_hotbackup.c:391: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/db_hotbackup/db_hotbackup.c:392: dbenv->err(dbenv, ret, "DB_ENV->set_encrypt"); /db-4.5.20/examples_java/src/db/GettingStarted/inventory.txt:271:Tea#TeafruiL0357s#1.11#516#fruits#TriCounty Produce /db-4.5.20/examples_java/src/db/GettingStarted/inventory.txt:272:Tea#TeafruiD5soTf#1.13#970#fruits#Simply Fresh /db-4.5.20/examples_java/src/db/GettingStarted/inventory.txt:273:Tea#TeafruiOWq4oO#1.19#357#fruits#Off the Vine /db-4.5.20/db_load/db_load.c:58:#define LDF_PASSWORD 0x04 /* Encrypt created databases. */ /db-4.5.20/db_load/db_load.c:217: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0); /db-4.5.20/db_load/db_load.c:221: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0); /db-4.5.20/db_load/db_load.c:376: /* If configured with a password, encrypt databases we create. */ /db-4.5.20/db_load/db_load.c:378: (ret = dbp->set_flags(dbp, DB_ENCRYPT)) != 0) { /db-4.5.20/db_load/db_load.c:379: dbp->err(dbp, ret, "DB->set_flags: DB_ENCRYPT"); /db-4.5.20/db_load/db_load.c:582: if (ldg->passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/db_load/db_load.c:583: ldg->passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/db_dump/db_dump.c:172: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/db_dump/db_dump.c:173: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/db/db_stati.c:286: { DB_AM_ENCRYPT, "DB_AM_ENCRYPT" }, /db-4.5.20/db/db_iface.c:1270: F_CLR(dbp, DB_AM_CHKSUM | DB_AM_ENCRYPT); /db-4.5.20/db/db_setlsn.c:42: if (flags != 0 && flags != DB_ENCRYPT) /db-4.5.20/db/db_setlsn.c:52: ret = __env_lsn_reset(dbenv, name, LF_ISSET(DB_ENCRYPT) ? 1 : 0); /db-4.5.20/db/db_setlsn.c:82: if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0) /db-4.5.20/db/db_open.c:17:#include "dbinc/hmac.h" /db-4.5.20/db/db_open.c:368: * checksum (and verify the checksum if necessary) and possibly decrypt it. /db-4.5.20/db/db_open.c:382: int is_hmac, ret, swapped; /db-4.5.20/db/db_open.c:393: is_hmac = meta->encrypt_alg == 0 ? 0 : 1; /db-4.5.20/db/db_open.c:411: DBMETASIZE, is_hmac)) != 0) { /db-4.5.20/db/db_open.c:412: if (is_hmac || swapped) /db-4.5.20/db/db_open.c:425: ret = __crypto_decrypt_meta(dbenv, dbp, (u_int8_t *)meta, do_metachk); /db-4.5.20/db/db_open.c:530: * checksum and decrypt. Don't distinguish between configuration and /db-4.5.20/db/db_pr.c:111: { DB_AM_ENCRYPT, "encrypted" }, /db-4.5.20/db/db_conv.c:46:#include "dbinc/hmac.h" /db-4.5.20/db/db_conv.c:73: int is_hmac, ret; /db-4.5.20/db/db_conv.c:79: ret = is_hmac = 0; /db-4.5.20/db/db_conv.c:97: if (((DBMETA *)pp)->encrypt_alg != 0 || /db-4.5.20/db/db_conv.c:98: F_ISSET(dbp, DB_AM_ENCRYPT)) /db-4.5.20/db/db_conv.c:99: is_hmac = 1; /db-4.5.20/db/db_conv.c:125: * a db_cipher then we are using hmac. /db-4.5.20/db/db_conv.c:127: is_hmac = CRYPTO_ON(dbenv) ? 1 : 0; /db-4.5.20/db/db_conv.c:137: if (F_ISSET(dbp, DB_AM_SWAP) && is_hmac == 0) /db-4.5.20/db/db_conv.c:140: dbenv, NULL, db_cipher, chksum, pp, sum_len, is_hmac)) { /db-4.5.20/db/db_conv.c:155: if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.5.20/db/db_conv.c:187: if (pg_len != 0 && (ret = db_cipher->decrypt(dbenv, /db-4.5.20/db/db_conv.c:278: if (F_ISSET(dbp, DB_AM_ENCRYPT)) { /db-4.5.20/db/db_conv.c:306: if ((ret = db_cipher->encrypt(dbenv, db_cipher->data, /db-4.5.20/db/db_conv.c:330: if (F_ISSET(dbp, DB_AM_SWAP) && !F_ISSET(dbp, DB_AM_ENCRYPT)) /db-4.5.20/db/db_method.c:44:static int __db_get_encrypt_flags __P((DB *, u_int32_t *)); /db-4.5.20/db/db_method.c:45:static int __db_set_encrypt __P((DB *, const char *, u_int32_t)); /db-4.5.20/db/db_method.c:200: dbp->get_encrypt_flags = __db_get_encrypt_flags; /db-4.5.20/db/db_method.c:223: dbp->set_encrypt = __db_set_encrypt; /db-4.5.20/db/db_method.c:498: * __db_get_encrypt_flags -- /db-4.5.20/db/db_method.c:501:__db_get_encrypt_flags(dbp, flagsp) /db-4.5.20/db/db_method.c:505: DB_ILLEGAL_IN_ENV(dbp, "DB->get_encrypt_flags"); /db-4.5.20/db/db_method.c:507: return (__env_get_encrypt_flags(dbp->dbenv, flagsp)); /db-4.5.20/db/db_method.c:511: * __db_set_encrypt -- /db-4.5.20/db/db_method.c:515:__db_set_encrypt(dbp, passwd, flags) /db-4.5.20/db/db_method.c:523: DB_ILLEGAL_IN_ENV(dbp, "DB->set_encrypt"); /db-4.5.20/db/db_method.c:524: DB_ILLEGAL_AFTER_OPEN(dbp, "DB->set_encrypt"); /db-4.5.20/db/db_method.c:526: if ((ret = __env_set_encrypt(dbp->dbenv, passwd, flags)) != 0) /db-4.5.20/db/db_method.c:538: return (__db_set_flags(dbp, DB_ENCRYPT)); /db-4.5.20/db/db_method.c:606: if (FLD_ISSET(*inflagsp, DB_ENCRYPT)) { /db-4.5.20/db/db_method.c:607: FLD_SET(*outflagsp, DB_AM_ENCRYPT | DB_AM_CHKSUM); /db-4.5.20/db/db_method.c:608: FLD_CLR(*inflagsp, DB_ENCRYPT); /db-4.5.20/db/db_method.c:631: DB_ENCRYPT, /db-4.5.20/db/db_method.c:677: if (LF_ISSET(DB_ENCRYPT) && !CRYPTO_ON(dbenv)) { /db-4.5.20/db/db_setid.c:43: if (flags != 0 && flags != DB_ENCRYPT) /db-4.5.20/db/db_setid.c:53: ret = __env_fileid_reset(dbenv, name, LF_ISSET(DB_ENCRYPT) ? 1 : 0); /db-4.5.20/db/db_setid.c:138: if (encrypted && (ret = __db_set_flags(dbp, DB_ENCRYPT)) != 0) /db-4.5.20/db/db.c:104: DB_AM_ENCRYPT | DB_AM_CHKSUM | DB_AM_NOT_DURABLE)); /db-4.5.20/db/db.c:534: ftype = F_ISSET(dbp, DB_AM_SWAP | DB_AM_ENCRYPT | DB_AM_CHKSUM) /db-4.5.20/db/db.c:548: DB_AM_SWAP | DB_AM_ENCRYPT | DB_AM_CHKSUM) ? /db-4.5.20/db/db.c:607: F_ISSET(dbp, (DB_AM_CHKSUM | DB_AM_ENCRYPT | DB_AM_SWAP)); /db-4.5.20/log/log_put.c:14:#include "dbinc/hmac.h" /db-4.5.20/log/log_put.c:18:static int __log_encrypt_record __P((DB_ENV *, DBT *, HDR *, u_int32_t)); /db-4.5.20/log/log_put.c:128: * DB_LOG_NOCOPY, because we know we can overwrite/encrypt the log /db-4.5.20/log/log_put.c:144: if ((ret = __log_encrypt_record(dbenv, dbt, &hdr, udbt->size)) != 0) /db-4.5.20/log/log_put.c:229: * now-encrypted dbt. Clients have no way to decrypt /db-4.5.20/log/log_put.c:615: __log_encrypt_record(dbenv, &t, &hdr, (u_int32_t)tsize)) != 0) /db-4.5.20/log/log_put.c:1451: if ((ret = __log_encrypt_record(dbenv, dbt, &hdr, rec->size)) != 0) /db-4.5.20/log/log_put.c:1470:__log_encrypt_record(dbenv, dbt, hdr, orig) /db-4.5.20/log/log_put.c:1483: if ((ret = db_cipher->encrypt(dbenv, db_cipher->data, /db-4.5.20/log/log_get.c:15:#include "dbinc/hmac.h" /db-4.5.20/log/log_get.c:382: int eof, is_hmac, need_cksum, ret; /db-4.5.20/log/log_get.c:388: is_hmac = 0; /db-4.5.20/log/log_get.c:499: is_hmac = 1; /db-4.5.20/log/log_get.c:502: is_hmac = 0; /db-4.5.20/log/log_get.c:595: hdr.chksum, rp + hdr.size, hdr.len - hdr.size, is_hmac)) != 0) { /db-4.5.20/log/log_get.c:661: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data, /db-4.5.20/log/log_get.c:1250: * of the file but that's hard -- we may have to decrypt it, checksum /db-4.5.20/log/log.c:14:#include "dbinc/hmac.h" /db-4.5.20/log/log.c:596: int is_hmac, ret; /db-4.5.20/log/log.c:620: is_hmac = 0; /db-4.5.20/log/log.c:626: is_hmac = 1; /db-4.5.20/log/log.c:677: * If we are trying to decrypt an unencrypted log /db-4.5.20/log/log.c:685: /* Check the checksum and decrypt. */ /db-4.5.20/log/log.c:688: hdr->len - hdrsize, is_hmac)) != 0) { /db-4.5.20/log/log.c:692: if ((ret = db_cipher->decrypt(dbenv, db_cipher->data, /db-4.5.20/log/log.c:739: hdr->len - hdrsize, is_hmac)) != 0)) { /db-4.5.20/build_vxworks/db_printlog/db_printlog.c:169: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/build_vxworks/db_printlog/db_printlog.c:170: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/db_archive/db_archive.c:129: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/build_vxworks/db_archive/db_archive.c:130: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1800: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1804: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1810: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1811:hmac.o /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1814: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1818: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1822: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1828: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1829:sha1.o /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:1832: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:3453: $(PRJ_DIR)/../hmac/hmac.c \ /db-4.5.20/build_vxworks/BerkeleyDB20small.wpj:3454: $(PRJ_DIR)/../hmac/sha1.c \ /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:959: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:963: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:969: FILE_$(PRJ_DIR)/../crypto/aes_method.c_objects /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:970:aes_method.o /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:973: FILE_$(PRJ_DIR)/../crypto/aes_method.c_tool /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1013: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1017: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1023: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_objects /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1024:rijndael-alg-fst.o /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1027: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_tool /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1031: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1035: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1041: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_objects /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1042:rijndael-api-fst.o /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:1045: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_tool /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2219: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2223: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2229: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2230:hmac.o /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2233: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2237: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2241: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2247: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2248:sha1.o /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:2251: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:4164: $(PRJ_DIR)/../crypto/aes_method.c \ /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:4167: $(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c \ /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:4168: $(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c \ /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:4234: $(PRJ_DIR)/../hmac/hmac.c \ /db-4.5.20/build_vxworks/BerkeleyDB22.wpj:4235: $(PRJ_DIR)/../hmac/sha1.c \ /db-4.5.20/build_vxworks/db_stat/db_stat.c:275: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/db_checkpoint/db_checkpoint.c:150: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/build_vxworks/db_checkpoint/db_checkpoint.c:151: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/db_upgrade/db_upgrade.c:128: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/build_vxworks/db_upgrade/db_upgrade.c:129: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/db_verify/db_verify.c:137: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/db.h:295: * Flags private to DB_ENV->set_encrypt. /db-4.5.20/build_vxworks/db.h:297:#define DB_ENCRYPT_AES 0x0000001 /* AES, assumes SHA1 checksum */ /db-4.5.20/build_vxworks/db.h:349:#define DB_ENCRYPT 0x00020000 /* Btree, Hash: duplicate keys. */ /db-4.5.20/build_vxworks/db.h:1581: int (*get_encrypt_flags) __P((DB *, u_int32_t *)); /db-4.5.20/build_vxworks/db.h:1621: int (*set_encrypt) __P((DB *, const char *, u_int32_t)); /db-4.5.20/build_vxworks/db.h:1689:#define DB_AM_ENCRYPT 0x00000400 /* Encryption */ /db-4.5.20/build_vxworks/db.h:2169: int (*get_encrypt_flags) __P((DB_ENV *, u_int32_t *)); /db-4.5.20/build_vxworks/db.h:2276: int (*set_encrypt) __P((DB_ENV *, const char *, u_int32_t)); /db-4.5.20/build_vxworks/db_hotbackup/db_hotbackup.c:406: (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/db_hotbackup/db_hotbackup.c:407: dbenv->err(dbenv, ret, "DB_ENV->set_encrypt"); /db-4.5.20/build_vxworks/db_load/db_load.c:58:#define LDF_PASSWORD 0x04 /* Encrypt created databases. */ /db-4.5.20/build_vxworks/db_load/db_load.c:232: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0); /db-4.5.20/build_vxworks/db_load/db_load.c:236: dbenv, argv[0], ldf & LDF_PASSWORD ? DB_ENCRYPT : 0); /db-4.5.20/build_vxworks/db_load/db_load.c:391: /* If configured with a password, encrypt databases we create. */ /db-4.5.20/build_vxworks/db_load/db_load.c:393: (ret = dbp->set_flags(dbp, DB_ENCRYPT)) != 0) { /db-4.5.20/build_vxworks/db_load/db_load.c:394: dbp->err(dbp, ret, "DB->set_flags: DB_ENCRYPT"); /db-4.5.20/build_vxworks/db_load/db_load.c:597: if (ldg->passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/build_vxworks/db_load/db_load.c:598: ldg->passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/db_dump/db_dump.c:187: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/build_vxworks/db_dump/db_dump.c:188: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/db_deadlock/db_deadlock.c:164: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/build_vxworks/db_deadlock/db_deadlock.c:165: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1859: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1863: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1869: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1870:hmac.o /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1873: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1877: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1881: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1887: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1888:sha1.o /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:1891: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:3512: $(PRJ_DIR)/../hmac/hmac.c \ /db-4.5.20/build_vxworks/BerkeleyDB22small.wpj:3513: $(PRJ_DIR)/../hmac/sha1.c \ /db-4.5.20/build_vxworks/db_recover/db_recover.c:127: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/build_vxworks/db_recover/db_recover.c:128: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:900: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:904: FILE_$(PRJ_DIR)/../crypto/aes_method.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:910: FILE_$(PRJ_DIR)/../crypto/aes_method.c_objects /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:911:aes_method.o /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:914: FILE_$(PRJ_DIR)/../crypto/aes_method.c_tool /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:954: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:958: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:964: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_objects /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:965:rijndael-alg-fst.o /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:968: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c_tool /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:972: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:976: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:982: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_objects /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:983:rijndael-api-fst.o /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:986: FILE_$(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c_tool /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2160: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2164: FILE_$(PRJ_DIR)/../hmac/hmac.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2170: FILE_$(PRJ_DIR)/../hmac/hmac.c_objects /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2171:hmac.o /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2174: FILE_$(PRJ_DIR)/../hmac/hmac.c_tool /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2178: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependDone /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2182: FILE_$(PRJ_DIR)/../hmac/sha1.c_dependencies /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2188: FILE_$(PRJ_DIR)/../hmac/sha1.c_objects /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2189:sha1.o /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:2192: FILE_$(PRJ_DIR)/../hmac/sha1.c_tool /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:4105: $(PRJ_DIR)/../crypto/aes_method.c \ /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:4108: $(PRJ_DIR)/../crypto/rijndael/rijndael-alg-fst.c \ /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:4109: $(PRJ_DIR)/../crypto/rijndael/rijndael-api-fst.c \ /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:4175: $(PRJ_DIR)/../hmac/hmac.c \ /db-4.5.20/build_vxworks/BerkeleyDB20.wpj:4176: $(PRJ_DIR)/../hmac/sha1.c \ /db-4.5.20/dbinc_auto/env_ext.h:26:int __env_get_encrypt_flags __P((DB_ENV *, u_int32_t *)); /db-4.5.20/dbinc_auto/env_ext.h:27:int __env_set_encrypt __P((DB_ENV *, const char *, u_int32_t)); /db-4.5.20/dbinc_auto/rpc_client_ext.h:27:int __dbcl_env_get_encrypt_flags __P((DB_ENV *, u_int32_t *)); /db-4.5.20/dbinc_auto/rpc_client_ext.h:34:int __dbcl_env_set_encrypt __P((DB_ENV *, const char *, u_int32_t)); /db-4.5.20/dbinc_auto/rpc_client_ext.h:46:int __dbcl_db_get_encrypt_flags __P((DB *, u_int32_t *)); /db-4.5.20/dbinc_auto/rpc_client_ext.h:65:int __dbcl_db_set_encrypt __P((DB *, const char *, u_int32_t)); /db-4.5.20/dbinc_auto/int_def.in:570:#define __aes_setup __aes_setup@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:571:#define __aes_adj_size __aes_adj_size@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:572:#define __aes_close __aes_close@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:573:#define __aes_decrypt __aes_decrypt@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:574:#define __aes_encrypt __aes_encrypt@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:575:#define __aes_init __aes_init@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:579:#define __crypto_decrypt_meta __crypto_decrypt_meta@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:641:#define __env_get_encrypt_flags __env_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:642:#define __env_set_encrypt __env_set_encrypt@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:1375:#define __dbcl_env_get_encrypt_flags __dbcl_env_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:1382:#define __dbcl_env_set_encrypt __dbcl_env_set_encrypt@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:1394:#define __dbcl_db_get_encrypt_flags __dbcl_db_get_encrypt_flags@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:1413:#define __dbcl_db_set_encrypt __dbcl_db_set_encrypt@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:1476:#define __env_get_encrypt_flags_proc __env_get_encrypt_flags_proc@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:1477:#define __env_set_encrypt_proc __env_set_encrypt_proc@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:1496:#define __db_get_encrypt_flags_proc __db_get_encrypt_flags_proc@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/int_def.in:1497:#define __db_set_encrypt_proc __db_set_encrypt_proc@DB_VERSION_UNIQUE_NAME@ /db-4.5.20/dbinc_auto/rpc_server_ext.h:16:void __env_get_encrypt_flags_proc __P((u_int, __env_get_encrypt_flags_reply *)); /db-4.5.20/dbinc_auto/rpc_server_ext.h:17:void __env_set_encrypt_proc __P((u_int, char *, u_int32_t, __env_set_encrypt_reply *)); /db-4.5.20/dbinc_auto/rpc_server_ext.h:36:void __db_get_encrypt_flags_proc __P((u_int, __db_get_encrypt_flags_reply *)); /db-4.5.20/dbinc_auto/rpc_server_ext.h:37:void __db_set_encrypt_proc __P((u_int, char *, u_int32_t, __db_set_encrypt_reply *)); /db-4.5.20/dbinc_auto/hmac_ext.h:2:#ifndef _hmac_ext_h_ /db-4.5.20/dbinc_auto/hmac_ext.h:3:#define _hmac_ext_h_ /db-4.5.20/dbinc_auto/hmac_ext.h:13:void __db_SHA1Init __P((SHA1_CTX *)); /db-4.5.20/dbinc_auto/hmac_ext.h:14:void __db_SHA1Update __P((SHA1_CTX *, unsigned char *, size_t)); /db-4.5.20/dbinc_auto/hmac_ext.h:15:void __db_SHA1Final __P((unsigned char *, SHA1_CTX *)); /db-4.5.20/dbinc_auto/hmac_ext.h:20:#endif /* !_hmac_ext_h_ */ /db-4.5.20/dbinc_auto/crypto_ext.h:9:int __aes_setup __P((DB_ENV *, DB_CIPHER *)); /db-4.5.20/dbinc_auto/crypto_ext.h:10:u_int __aes_adj_size __P((size_t)); /db-4.5.20/dbinc_auto/crypto_ext.h:11:int __aes_close __P((DB_ENV *, void *)); /db-4.5.20/dbinc_auto/crypto_ext.h:12:int __aes_decrypt __P((DB_ENV *, void *, void *, u_int8_t *, size_t)); /db-4.5.20/dbinc_auto/crypto_ext.h:13:int __aes_encrypt __P((DB_ENV *, void *, void *, u_int8_t *, size_t)); /db-4.5.20/dbinc_auto/crypto_ext.h:14:int __aes_init __P((DB_ENV *, DB_CIPHER *)); /db-4.5.20/dbinc_auto/crypto_ext.h:18:int __crypto_decrypt_meta __P((DB_ENV *, DB *, u_int8_t *, int)); /db-4.5.20/perl/DB_File/dbinfo:73:my ($magic, $version, $endian, $encrypt) ; /db-4.5.20/perl/DB_File/dbinfo:80: $encrypt = "Not Supported"; /db-4.5.20/perl/DB_File/dbinfo:87: $encrypt = "Not Supported"; /db-4.5.20/perl/DB_File/dbinfo:113: { $encrypt = $info[6] ? "Enabled" : "Disabled" } /db-4.5.20/perl/DB_File/dbinfo:115: { $encrypt = "Not Supported" } /db-4.5.20/perl/DB_File/dbinfo:124:Encryption: $encrypt /db-4.5.20/perl/BerkeleyDB/mkconsts:574: DB_AM_ENCRYPT => IGNORE, /db-4.5.20/perl/BerkeleyDB/mkconsts:584: DB_CHKSUM_SHA1 => DEFINE, /db-4.5.20/perl/BerkeleyDB/mkconsts:588: DB_ENCRYPT => DEFINE, /db-4.5.20/perl/BerkeleyDB/mkconsts:589: DB_ENCRYPT_AES => DEFINE, /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1394: softCrash("-Encrypt needs Berkeley DB 4.x or better") ; /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1418: Status = dbp->set_encrypt(dbp, password, enc_flags); /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1419: Trace(("DB->set_encrypt passwd = %s, flags %d returned %s\n", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1830:set_encrypt(env, passwd, flags) /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1836: softCrash("$env->set_encrypt needs Berkeley DB 4.1 or better") ; /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1838: dieIfEnvOpened(env, "set_encrypt"); /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1839: RETVAL = env->Env->set_encrypt(env->Env, passwd, flags); /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1896: softCrash("-Encrypt needs Berkeley DB 4.x or better") ; /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1994: status = env->set_encrypt(env, enc_passwd, enc_flags); /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.xs:1995: Trace(("ENV->set_encrypt passwd = %s, flags %d returned %s\n", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:66: DB_CHKSUM_SHA1 /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:92: DB_ENCRYPT /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:93: DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:531: if (defined $got->{Encrypt}) { /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:532: croak("Encrypt parameter must be a hash reference") /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:533: if !ref $got->{Encrypt} || ref $got->{Encrypt} ne 'HASH' ; /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:535: my %config = %{ $got->{Encrypt} } ; /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:542: croak("Must specify Password and Flags with Encrypt parameter") /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:685: # [ -Encrypt => { Password => string, Flags => value} /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:702: Encrypt => undef, /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:808: Encrypt => undef, /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:873: Encrypt => undef, /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:932: Encrypt => undef, /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:998: Encrypt => undef, /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pm:1118: Encrypt => undef, /db-4.5.20/perl/BerkeleyDB/dbinfo:73:my ($magic, $version, $endian, $encrypt) ; /db-4.5.20/perl/BerkeleyDB/dbinfo:80: $encrypt = "Not Supported"; /db-4.5.20/perl/BerkeleyDB/dbinfo:87: $encrypt = "Not Supported"; /db-4.5.20/perl/BerkeleyDB/dbinfo:113: { $encrypt = $info[6] ? "Enabled" : "Disabled" } /db-4.5.20/perl/BerkeleyDB/dbinfo:115: { $encrypt = "Not Supported" } /db-4.5.20/perl/BerkeleyDB/dbinfo:124:Encryption: $encrypt /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:165: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:203:=item -Encrypt /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:209: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES } /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:211:Valid values for the Flags are 0 or C. /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:487: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:508: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:801: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:822: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1052: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1073: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1150: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1170: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1198: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1264:=item -Encrypt /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1270: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES } /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod:1272:Valid values for the Flags are 0 or C. /db-4.5.20/perl/BerkeleyDB/MANIFEST:29:t/encrypt.t /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:20: -Encrypt => {Password => "abc", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:21: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:39: -Encrypt => 1, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:42: ok 1, $@ =~ /^Encrypt parameter must be a hash reference at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:47: -Encrypt => {}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:50: ok 2, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:55: -Encrypt => {Password => "fred"}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:58: ok 3, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:63: -Encrypt => {Flags => 1}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:66: ok 4, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:71: -Encrypt => {Fred => 1}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:79: # new BerkeleyDB::Env -Encrypt => /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:87: -Encrypt => {Password => "abc", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:88: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:101: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:121: # once the database is created, do not need to specify DB_ENCRYPT /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:136: -Encrypt => {Password => "def", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:137: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:146: -Encrypt => 1, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:149: ok 16, $@ =~ /^Encrypt parameter must be a hash reference at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:154: -Encrypt => {}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:157: ok 17, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:162: -Encrypt => {Password => "fred"}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:165: ok 18, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:170: -Encrypt => {Flags => 1}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:173: ok 19, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:178: -Encrypt => {Fred => 1}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:189: -Encrypt => 1, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:192: ok 21, $@ =~ /^Encrypt parameter must be a hash reference at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:197: -Encrypt => {}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:200: ok 22, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:205: -Encrypt => {Password => "fred"}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:208: ok 23, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:213: -Encrypt => {Flags => 1}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:216: ok 24, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:221: -Encrypt => {Fred => 1}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:232: -Encrypt => 1, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:235: ok 26, $@ =~ /^Encrypt parameter must be a hash reference at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:240: -Encrypt => {}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:243: ok 27, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:248: -Encrypt => {Password => "fred"}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:251: ok 28, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:256: -Encrypt => {Flags => 1}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:259: ok 29, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:264: -Encrypt => {Fred => 1}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:275: -Encrypt => 1, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:278: ok 31, $@ =~ /^Encrypt parameter must be a hash reference at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:283: -Encrypt => {}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:286: ok 32, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:291: -Encrypt => {Password => "fred"}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:294: ok 33, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:299: -Encrypt => {Flags => 1}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:302: ok 34, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:307: -Encrypt => {Fred => 1}, /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:316: # new BerkeleyDB::Hash -Encrypt => /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:325: -Encrypt => {Password => "beta", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:326: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:328: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:356: -Encrypt => {Password => "def", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:357: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:359: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:365: -Encrypt => {Password => "beta", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:366: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:368: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:380: # new BerkeleyDB::Btree -Encrypt => /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:389: -Encrypt => {Password => "beta", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:390: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:392: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:420: -Encrypt => {Password => "def", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:421: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:423: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:429: -Encrypt => {Password => "beta", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:430: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:432: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:444: # new BerkeleyDB::Queue -Encrypt => /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:455: -Encrypt => {Password => "beta", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:456: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:458: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:489: -Encrypt => {Password => "def", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:490: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:492: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:499: -Encrypt => {Password => "beta", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:500: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:502: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:514: # new BerkeleyDB::Recno -Encrypt => /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:523: -Encrypt => {Password => "beta", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:524: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:526: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:554: -Encrypt => {Password => "def", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:555: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:557: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:563: -Encrypt => {Password => "beta", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:564: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:566: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:578: # new BerkeleyDB::Unknown -Encrypt => /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:587: -Encrypt => {Password => "beta", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:588: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:590: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:618: -Encrypt => {Password => "def", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:619: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:621: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:627: -Encrypt => {Password => "beta", /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:628: Flags => DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/t/encrypt.t:630: -Property => DB_ENCRYPT ; /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:165: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:203:=item -Encrypt /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:209: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES } /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:211:Valid values for the Flags are 0 or C. /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:487: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:508: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:693: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:714: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:891: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:912: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:956: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:976: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:1004: [ -Encrypt => { Password => "string", /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:1070:=item -Encrypt /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:1076: -Encrypt => { -Password => "abc", Flags => DB_ENCRYPT_AES } /db-4.5.20/perl/BerkeleyDB/BerkeleyDB.pod.P:1078:Valid values for the Flags are 0 or C. /db-4.5.20/perl/BerkeleyDB/constants.h:449: DB_CONSUME DB_CURRENT DB_DELETED DB_DUPSORT DB_ENCRYPT DB_ENV_CDB /db-4.5.20/perl/BerkeleyDB/constants.h:456: if (memEQ(name, "DB_ENCRYPT", 10)) { /db-4.5.20/perl/BerkeleyDB/constants.h:458:#ifdef DB_ENCRYPT /db-4.5.20/perl/BerkeleyDB/constants.h:459: *iv_return = DB_ENCRYPT; /db-4.5.20/perl/BerkeleyDB/constants.h:2076: DB_ARCH_REMOVE DB_AUTO_COMMIT DB_BTREEOLDVER DB_CHKSUM_SHA1 DB_EID_INVALID /db-4.5.20/perl/BerkeleyDB/constants.h:2077: DB_ENCRYPT_AES DB_ENV_APPINIT DB_ENV_DBLOCAL DB_ENV_LOCKING DB_ENV_LOGGING /db-4.5.20/perl/BerkeleyDB/constants.h:2438: if (memEQ(name, "DB_ENCRYPT_AES", 14)) { /db-4.5.20/perl/BerkeleyDB/constants.h:2440:#ifdef DB_ENCRYPT_AES /db-4.5.20/perl/BerkeleyDB/constants.h:2441: *iv_return = DB_ENCRYPT_AES; /db-4.5.20/perl/BerkeleyDB/constants.h:2529: if (memEQ(name, "DB_CHKSUM_SHA1", 14)) { /db-4.5.20/perl/BerkeleyDB/constants.h:2531:#ifdef DB_CHKSUM_SHA1 /db-4.5.20/perl/BerkeleyDB/constants.h:2532: *iv_return = DB_CHKSUM_SHA1; /db-4.5.20/perl/BerkeleyDB/constants.h:4573: DB_CHKSUM_SHA1 DB_CLIENT DB_CL_WRITER DB_COMMIT DB_COMPACT_FLAGS /db-4.5.20/perl/BerkeleyDB/constants.h:4578: DB_EID_BROADCAST DB_EID_INVALID DB_ENCRYPT DB_ENCRYPT_AES /db-4.5.20/db_deadlock/db_deadlock.c:149: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/db_deadlock/db_deadlock.c:150: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/test/test115.tcl:22: global encrypt /db-4.5.20/test/test115.tcl:202: if { $cryptenv != -1 || $encrypt != 0 } { /db-4.5.20/test/rep001.tcl:73: append args " -encrypt " /db-4.5.20/test/rep001.tcl:87: global encrypt /db-4.5.20/test/rep001.tcl:210: set encrypt 1 /db-4.5.20/test/upgrade.tcl:231: global encrypt /db-4.5.20/test/upgrade.tcl:237: set encrypt 1 /db-4.5.20/test/upgrade.tcl:243: if { $encrypt == 1 } { /db-4.5.20/test/upgrade.tcl:361: global encrypt /db-4.5.20/test/upgrade.tcl:432: set encrypt 0 /db-4.5.20/test/upgrade.tcl:439: global encrypt;\ /db-4.5.20/test/upgrade.tcl:440: set encrypt $encrypt;\ /db-4.5.20/test/upgrade.tcl:464: global encrypt gen_chksum;\ /db-4.5.20/test/upgrade.tcl:465: set encrypt $encrypt;\ /db-4.5.20/test/upgrade.tcl:489: set encrypt 1 /db-4.5.20/test/upgrade.tcl:495: global encrypt passwd;\ /db-4.5.20/test/upgrade.tcl:496: set encrypt $encrypt;\ /db-4.5.20/test/upgrade.tcl:526: set encrypt 0 /db-4.5.20/test/upgrade.tcl:529: global encrypt;\ /db-4.5.20/test/upgrade.tcl:530: set encrypt $encrypt;\ /db-4.5.20/test/upgrade.tcl:539: set encrypt 1 /db-4.5.20/test/upgrade.tcl:542: global encrypt;\ /db-4.5.20/test/upgrade.tcl:543: set encrypt $encrypt;\ /db-4.5.20/test/upgrade.tcl:569: global encrypt /db-4.5.20/test/upgrade.tcl:604: if { $encrypt == 1 } { /db-4.5.20/test/upgrade.tcl:717: global encrypt /db-4.5.20/test/upgrade.tcl:721: if { $encrypt == 1 } { /db-4.5.20/test/test116.tcl:55: if { [is_substr $args "-encrypt"] } { /db-4.5.20/test/test116.tcl:58: if { [is_substr [$env get_encrypt_flags] "-encryptaes"] } { /db-4.5.20/test/test116.tcl:60: append resetargs " -encrypt " /db-4.5.20/test/test.tcl:33:set encrypt 0 /db-4.5.20/test/test.tcl:34:set old_encrypt 0 /db-4.5.20/test/test.tcl:1131: append largs " -encrypt " /db-4.5.20/test/test.tcl:1190: append largs " -encrypt " /db-4.5.20/test/test.tcl:1494: global encrypt /db-4.5.20/test/test.tcl:1507: $encrypt == 0 } { /db-4.5.20/test/test.tcl:1512: $encrypt == 1 } { /db-4.5.20/test/test.tcl:1529: if { $gen_upgrade_log == 0 || $encrypt == 0 } { /db-4.5.20/test/sdb002.tcl:49: global encrypt /db-4.5.20/test/sdb002.tcl:60: # Run convert_encrypt so that old_encrypt will be reset to /db-4.5.20/test/sdb002.tcl:62: convert_encrypt $largs /db-4.5.20/test/sdb002.tcl:85: global encrypt /db-4.5.20/test/sdb002.tcl:206: if { $encrypt > 0 } { /db-4.5.20/test/sec001.tcl:117: puts "\tSec001.f.2: Create without encryption algorithm (DB_ENCRYPT_ANY)." /db-4.5.20/test/sec001.tcl:146: # db->set_encrypt method when we've already got a secure dbenv. /db-4.5.20/test/sec001.tcl:164: puts "\tSec001.g.3: Open again with any encryption (DB_ENCRYPT_ANY)." /db-4.5.20/test/rpc004.tcl:57: -mode 0644} -env $env -encrypt $testfile1] /db-4.5.20/test/rep011.tcl:55: append args " -encrypt " /db-4.5.20/test/rep011.tcl:69: global encrypt /db-4.5.20/test/rep011.tcl:174: set encrypt 1 /db-4.5.20/test/rep062.tcl:72: global encrypt /db-4.5.20/test/rep062.tcl:111: { 1 {btree ""} {btree "-encrypt"} } /db-4.5.20/test/rep062.tcl:112: { 1 {btree "-encrypt"} {btree ""} } /db-4.5.20/test/rep062.tcl:113: { 1 {queue ""} {queue "-encrypt"} } /db-4.5.20/test/rep062.tcl:114: { 1 {queue "-encrypt"} {queue ""} } /db-4.5.20/test/rep062.tcl:270: set encrypt 1 /db-4.5.20/test/test044.tcl:28: global encrypt /db-4.5.20/test/test044.tcl:44: if { $encrypt != 0 } { /db-4.5.20/test/test042.tcl:23: global encrypt /db-4.5.20/test/test042.tcl:36: if { $encrypt != 0 } { /db-4.5.20/test/env007.tcl:287: "-encryptaes" "$passwd" "-encryptaes" "get_encrypt_flags" } /db-4.5.20/test/env007.tcl:342: [eval $env get_encrypt_flags] \ /db-4.5.20/test/env007.tcl:597: { "" "-encrypt" "" "get_flags" "-encryptaes $passwd" } /db-4.5.20/test/scr010/spell.ok:9:AES /db-4.5.20/test/scr010/spell.ok:107:CBC /db-4.5.20/test/scr010/spell.ok:673:HMAC /db-4.5.20/test/scr010/spell.ok:1257:RIJNDAEL /db-4.5.20/test/scr010/spell.ok:1328:Rijndael /db-4.5.20/test/scr010/spell.ok:1359:SHA /db-4.5.20/test/scr010/spell.ok:2196:des /db-4.5.20/test/scr010/spell.ok:2631:hmac /db-4.5.20/test/scr010/spell.ok:3732:rijndael /db-4.5.20/test/logtrack.tcl:38: global encrypt passwd /db-4.5.20/test/logtrack.tcl:45: if { $encrypt > 0 } { /db-4.5.20/test/sdb015.tcl:57: global encrypt /db-4.5.20/test/sdb015.tcl:64: # Run convert_encrypt so that old_encrypt will be reset to /db-4.5.20/test/sdb015.tcl:66: convert_encrypt $largs /db-4.5.20/test/sdb015.tcl:80: global encrypt /db-4.5.20/test/wordlist:3787:blowfish /db-4.5.20/test/reputils.tcl:431: global encrypt /db-4.5.20/test/reputils.tcl:437: set encrypt 1 /db-4.5.20/test/reputils.tcl:1821: global encrypt /db-4.5.20/test/reputils.tcl:1865: if { $encrypt == 1 } { /db-4.5.20/test/fop004.tcl:14: global encrypt /db-4.5.20/test/fop004.tcl:33: if { $encrypt != 0 } { /db-4.5.20/test/test061.tcl:18: global encrypt /db-4.5.20/test/test061.tcl:211: if { $encrypt != 0 } { /db-4.5.20/test/test045.tcl:26: global encrypt /db-4.5.20/test/test045.tcl:38: if { $encrypt != 0 } { /db-4.5.20/test/testutils.tcl:136: global encrypt /db-4.5.20/test/testutils.tcl:141: if { $encrypt > 0 && $env == "NULL" } { /db-4.5.20/test/testutils.tcl:169: global encrypt /db-4.5.20/test/testutils.tcl:174: if { $encrypt > 0 && $env == "NULL" } { /db-4.5.20/test/testutils.tcl:1123: global old_encrypt /db-4.5.20/test/testutils.tcl:1175: if { $old_encrypt != 0 } { /db-4.5.20/test/testutils.tcl:1197: $old_encrypt == 0} { /db-4.5.20/test/testutils.tcl:1204: $old_encrypt == 1 } { /db-4.5.20/test/testutils.tcl:1277: global old_encrypt /db-4.5.20/test/testutils.tcl:1282: if { $old_encrypt != 0 } { /db-4.5.20/test/testutils.tcl:1490: convert_encrypt $env_cmd /db-4.5.20/test/testutils.tcl:1640: global encrypt /db-4.5.20/test/testutils.tcl:1660: if { $encrypt > 0 } { /db-4.5.20/test/testutils.tcl:2411: global encrypt /db-4.5.20/test/testutils.tcl:2420: set newl [lreplace $largs $eindex $eend "-encrypt"] /db-4.5.20/test/testutils.tcl:2425:proc convert_encrypt { largs } { /db-4.5.20/test/testutils.tcl:2426: global encrypt /db-4.5.20/test/testutils.tcl:2427: global old_encrypt /db-4.5.20/test/testutils.tcl:2429: set old_encrypt $encrypt /db-4.5.20/test/testutils.tcl:2430: set encrypt 0 /db-4.5.20/test/testutils.tcl:2431: if { [lsearch $largs "-encrypt*"] != -1 } { /db-4.5.20/test/testutils.tcl:2432: set encrypt 1 /db-4.5.20/test/testutils.tcl:2454: convert_encrypt $largs /db-4.5.20/test/testutils.tcl:2811: global encrypt /db-4.5.20/test/testutils.tcl:2846: if { $encrypt != 0 } { /db-4.5.20/test/testutils.tcl:2958: global encrypt /db-4.5.20/test/testutils.tcl:2965: if { $encrypt != 0 } { /db-4.5.20/test/testutils.tcl:3027: global encrypt /db-4.5.20/test/testutils.tcl:3057: if { $encrypt != 0 } { /db-4.5.20/test/rep029.tcl:84: append args " -encrypt " /db-4.5.20/test/recd017.tcl:14: global encrypt /db-4.5.20/test/recd017.tcl:51: convert_encrypt $env_cmd /db-4.5.20/test/recd017.tcl:61: -env $dbenv -encrypt $opts $testfile" /db-4.5.20/test/recd017.tcl:79: convert_encrypt $env_cmd /db-4.5.20/test/recd017.tcl:82: -env $dbenv -encrypt $opts $testfile" /db-4.5.20/test/recd017.tcl:88: -env $dbenv -encrypt $opts $testfile2" /db-4.5.20/test/test070.tcl:19: global encrypt /db-4.5.20/test/test070.tcl:32: if { $encrypt != 0 } { /db-4.5.20/test/test037.tcl:11: global encrypt /db-4.5.20/test/test089.tcl:15: global encrypt /db-4.5.20/mod_db4/utils.c:52: if((semset = md4_sem_create(NUM_SEMS, start)) < 0) { /db-4.5.20/mod_db4/utils.c:75: md4_sem_wait_for_zero(semset, OK_TO_PROCEED); /db-4.5.20/mod_db4/utils.c:80: md4_sem_set(semset, OK_TO_PROCEED, 0); /db-4.5.20/mod_db4/utils.c:85: md4_sem_set(semset, OK_TO_PROCEED, 1); /db-4.5.20/mod_db4/sem_utils.h:13:extern int md4_sem_create(int semnum, unsigned short *start); /db-4.5.20/mod_db4/sem_utils.h:14:extern void md4_sem_destroy(int semid); /db-4.5.20/mod_db4/sem_utils.h:15:extern void md4_sem_lock(int semid, int semnum); /db-4.5.20/mod_db4/sem_utils.h:16:extern void md4_sem_unlock(int semid, int semnum); /db-4.5.20/mod_db4/sem_utils.h:17:extern void md4_sem_wait_for_zero(int semid, int semnum); /db-4.5.20/mod_db4/sem_utils.h:18:extern void md4_sem_set(int semid, int semnum, int value); /db-4.5.20/mod_db4/sem_utils.h:19:extern int md4_sem_get(int semid, int semnum); /db-4.5.20/mod_db4/sem_utils.c:44:int md4_sem_create(int semnum, unsigned short *start) /db-4.5.20/mod_db4/sem_utils.c:57: md4_sem_destroy(semid); /db-4.5.20/mod_db4/sem_utils.c:63: md4_sem_destroy(semid); /db-4.5.20/mod_db4/sem_utils.c:69:void md4_sem_destroy(int semid) /db-4.5.20/mod_db4/sem_utils.c:76:void md4_sem_lock(int semid, int semnum) /db-4.5.20/mod_db4/sem_utils.c:85:void md4_sem_unlock(int semid, int semnum) /db-4.5.20/mod_db4/sem_utils.c:94:void md4_sem_wait_for_zero(int semid, int semnum) /db-4.5.20/mod_db4/sem_utils.c:103:void md4_sem_set(int semid, int semnum, int value) /db-4.5.20/mod_db4/sem_utils.c:110:int md4_sem_get(int semid, int semnum) /db-4.5.20/php_db4/db4.cpp:453: REGISTER_LONG_CONSTANT("DB_ENCRYPT_AES", DB_ENCRYPT_AES, CONST_CS | CONST_PERSISTENT); /db-4.5.20/php_db4/db4.cpp:474: REGISTER_LONG_CONSTANT("DB_ENCRYPT", DB_ENCRYPT, CONST_CS | CONST_PERSISTENT); /db-4.5.20/php_db4/db4.cpp:633: REGISTER_LONG_CONSTANT("DB_AM_ENCRYPT", DB_AM_ENCRYPT, CONST_CS | CONST_PERSISTENT); /db-4.5.20/cxx/cxx_db.cpp:543:DB_METHOD(get_encrypt_flags, (u_int32_t *flagsp), /db-4.5.20/cxx/cxx_db.cpp:545:DB_METHOD(set_encrypt, (const char *passwd, u_int32_t flags), /db-4.5.20/cxx/cxx_env.cpp:708:DBENV_METHOD(get_encrypt_flags, (u_int32_t *flagsp), /db-4.5.20/cxx/cxx_env.cpp:710:DBENV_METHOD(set_encrypt, (const char *passwd, u_int32_t flags), /db-4.5.20/db_recover/db_recover.c:112: if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, /db-4.5.20/db_recover/db_recover.c:113: passwd, DB_ENCRYPT_AES)) != 0) { /db-4.5.20/rpc_client/gen_client.c:315: * PUBLIC: int __dbcl_env_get_encrypt_flags __P((DB_ENV *, u_int32_t *)); /db-4.5.20/rpc_client/gen_client.c:318:__dbcl_env_get_encrypt_flags(dbenv, flagsp) /db-4.5.20/rpc_client/gen_client.c:323: __env_get_encrypt_flags_msg msg; /db-4.5.20/rpc_client/gen_client.c:324: __env_get_encrypt_flags_reply *replyp = NULL; /db-4.5.20/rpc_client/gen_client.c:335: replyp = __db_env_get_encrypt_flags_4005(&msg, cl); /db-4.5.20/rpc_client/gen_client.c:346: xdr_free((xdrproc_t)xdr___env_get_encrypt_flags_reply, (void *)replyp); /db-4.5.20/rpc_client/gen_client.c:581: * PUBLIC: int __dbcl_env_set_encrypt __P((DB_ENV *, const char *, u_int32_t)); /db-4.5.20/rpc_client/gen_client.c:584:__dbcl_env_set_encrypt(dbenv, passwd, flags) /db-4.5.20/rpc_client/gen_client.c:590: __env_set_encrypt_msg msg; /db-4.5.20/rpc_client/gen_client.c:591: __env_set_encrypt_reply *replyp = NULL; /db-4.5.20/rpc_client/gen_client.c:607: replyp = __db_env_set_encrypt_4005(&msg, cl); /db-4.5.20/rpc_client/gen_client.c:616: xdr_free((xdrproc_t)xdr___env_set_encrypt_reply, (void *)replyp); /db-4.5.20/rpc_client/gen_client.c:1115: * PUBLIC: int __dbcl_db_get_encrypt_flags __P((DB *, u_int32_t *)); /db-4.5.20/rpc_client/gen_client.c:1118:__dbcl_db_get_encrypt_flags(dbp, flagsp) /db-4.5.20/rpc_client/gen_client.c:1123: __db_get_encrypt_flags_msg msg; /db-4.5.20/rpc_client/gen_client.c:1124: __db_get_encrypt_flags_reply *replyp = NULL; /db-4.5.20/rpc_client/gen_client.c:1140: replyp = __db_db_get_encrypt_flags_4005(&msg, cl); /db-4.5.20/rpc_client/gen_client.c:1151: xdr_free((xdrproc_t)xdr___db_get_encrypt_flags_reply, (void *)replyp); /db-4.5.20/rpc_client/gen_client.c:2007: * PUBLIC: int __dbcl_db_set_encrypt __P((DB *, const char *, u_int32_t)); /db-4.5.20/rpc_client/gen_client.c:2010:__dbcl_db_set_encrypt(dbp, passwd, flags) /db-4.5.20/rpc_client/gen_client.c:2016: __db_set_encrypt_msg msg; /db-4.5.20/rpc_client/gen_client.c:2017: __db_set_encrypt_reply *replyp = NULL; /db-4.5.20/rpc_client/gen_client.c:2038: replyp = __db_db_set_encrypt_4005(&msg, cl); /db-4.5.20/rpc_client/gen_client.c:2047: xdr_free((xdrproc_t)xdr___db_set_encrypt_reply, (void *)replyp); /db-4.5.20/rpc_client/gen_client.c:3057: dbp->get_encrypt_flags = __dbcl_db_get_encrypt_flags; /db-4.5.20/rpc_client/gen_client.c:3100: dbp->set_encrypt = __dbcl_db_set_encrypt; /db-4.5.20/rpc_client/gen_client.c:3181: dbenv->get_encrypt_flags = __dbcl_env_get_encrypt_flags; /db-4.5.20/rpc_client/gen_client.c:3437: dbenv->set_encrypt = __dbcl_env_set_encrypt;