| /freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | util_seqnum.c | 36 unsigned char plain[8]; in kg_make_seq_num() local 38 plain[4] = direction; in kg_make_seq_num() 39 plain[5] = direction; in kg_make_seq_num() 40 plain[6] = direction; in kg_make_seq_num() 41 plain[7] = direction; in kg_make_seq_num() 45 store_32_be(seqnum, plain); in kg_make_seq_num() 48 &plain[0], 8, in kg_make_seq_num() 53 store_32_le(seqnum, plain); in kg_make_seq_num() 54 return(kg_encrypt(context, key, KG_USAGE_SEQ, cksum, plain, buf, 8)); in kg_make_seq_num() 62 unsigned char plain[8]; in kg_get_seq_num() local [all …]
|
| H A D | unwrap.c | 48 uint8_t bigend_seqnum[4], *plain = NULL; in decrypt_v1() local 54 plain = malloc(len); in decrypt_v1() 55 if (plain == NULL) in decrypt_v1() 59 ret = kg_decrypt(context, key, KG_USAGE_SEAL, NULL, in, plain, len); in decrypt_v1() 69 ret = kg_arcfour_docrypt(enc_key, 0, bigend_seqnum, 4, in, len, plain); in decrypt_v1() 74 *out = plain; in decrypt_v1() 75 plain = NULL; in decrypt_v1() 78 free(plain); in decrypt_v1() 91 const uint8_t *plain, *header, *seqbytes, *cksum; in unwrap_v1() local 134 plain = in->ptr; in unwrap_v1() [all …]
|
| H A D | k5seal.c | 82 unsigned char *plain; in make_seal_token_v1() local 167 if ((plain = (unsigned char *) xmalloc(msglen ? msglen : 1)) == NULL) { in make_seal_token_v1() 174 plain))) { in make_seal_token_v1() 175 xfree(plain); in make_seal_token_v1() 181 memcpy(plain+conflen, text->value, text->length); in make_seal_token_v1() 182 if (pad) memset(plain+conflen+text->length, pad, pad); in make_seal_token_v1() 188 xfree(plain); in make_seal_token_v1() 194 memcpy(data_ptr + 8, plain, msglen); in make_seal_token_v1() 202 xfree(plain); in make_seal_token_v1() 228 xfree (plain); in make_seal_token_v1() [all …]
|
| H A D | k5sealv3.c | 81 krb5_data plain = empty_data(); in gss_krb5int_make_seal_token_v3() local 132 err = alloc_data(&plain, message->length + 16 + ec); in gss_krb5int_make_seal_token_v3() 137 encrypt_size = krb5_encrypt_size(plain.length, key->keyblock.enctype); in gss_krb5int_make_seal_token_v3() 163 memcpy(plain.data, message->value, message->length); in gss_krb5int_make_seal_token_v3() 165 memset(plain.data + message->length, 'x', ec); in gss_krb5int_make_seal_token_v3() 166 memcpy(plain.data + message->length + ec, outbuf, 16); in gss_krb5int_make_seal_token_v3() 171 err = krb5_k_encrypt(context, key, key_usage, 0, &plain, &cipher); in gss_krb5int_make_seal_token_v3() 195 err = alloc_data(&plain, message->length + 16); in gss_krb5int_make_seal_token_v3() 233 memcpy(plain.data, message->value, message->length); in gss_krb5int_make_seal_token_v3() 234 memcpy(plain.data + message->length, outbuf, 16); in gss_krb5int_make_seal_token_v3() [all …]
|
| /freebsd/contrib/bmake/unit-tests/ |
| H A D | cond-token-plain.exp | 4 make: cond-token-plain.mk:19: Unfinished string literal """ 9 make: cond-token-plain.mk:43: Unfinished string literal ""\\" 32 make: cond-token-plain.mk:106: A bare word is treated like defined(...), and the variable 'bare' is… 34 make: cond-token-plain.mk:113: A bare word is treated like defined(...). 36 make: cond-token-plain.mk:121: ok 38 make: cond-token-plain.mk:130: Undefined variables in bare words expand to an empty string. 40 make: cond-token-plain.mk:139: Numbers can be composed from literals and expressions. 42 make: cond-token-plain.mk:144: Numbers can be composed from literals and expressions. 44 make: cond-token-plain.mk:151: Missing right-hand side of operator "==" 46 make: cond-token-plain.mk:160: Malformed conditional "== """ [all …]
|
| H A D | cond-func.mk | 88 # default function that is called when a bare word is parsed. For the plain 100 # The plain word 'defined' is interpreted as 'defined(defined)', see 106 # expect+1: A plain function name is parsed as defined(...). 107 . info A plain function name is parsed as defined(...). 114 # expect+1: A plain function name is parsed as defined(...). 115 . info A plain function name is parsed as defined(...). 120 # A plain symbol name may start with one of the function names, in this case
|
| /freebsd/contrib/unifdef/tests/ |
| H A D | recursive.experr | 24 unifdef: process line 1 PLAIN -> OUTSIDE depth 0 26 unifdef: process line 2 PLAIN -> OUTSIDE depth 0 28 unifdef: process line 3 PLAIN -> OUTSIDE depth 0 30 unifdef: process line 4 PLAIN -> OUTSIDE depth 0 32 unifdef: process line 5 PLAIN -> OUTSIDE depth 0 34 unifdef: process line 6 PLAIN -> OUTSIDE depth 0 36 unifdef: process line 7 PLAIN -> OUTSIDE depth 0 55 unifdef: process line 9 PLAIN -> PASS_MIDDLE depth 1 59 unifdef: process line 11 PLAIN -> PASS_ELSE depth 1 63 unifdef: process line 13 PLAIN -> OUTSIDE depth 0 [all …]
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, in crypto_cipher_encrypt() argument 110 if (plain != crypt) in crypto_cipher_encrypt() 111 os_memcpy(crypt, plain, len); in crypto_cipher_encrypt() 122 ctx->u.aes.cbc[j] ^= plain[j]; in crypto_cipher_encrypt() 126 plain += AES_BLOCK_SIZE; in crypto_cipher_encrypt() 136 ctx->u.des3.cbc[j] ^= plain[j]; in crypto_cipher_encrypt() 140 plain += 8; in crypto_cipher_encrypt() 150 ctx->u.des3.cbc[j] ^= plain[j]; in crypto_cipher_encrypt() 154 plain += 8; in crypto_cipher_encrypt() 167 u8 *plain, size_t len) in crypto_cipher_decrypt() argument [all …]
|
| H A D | crypto_libtomcrypt.c | 100 int aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) in aes_encrypt() argument 103 return aes_ecb_encrypt(plain, crypt, skey) == CRYPT_OK ? 0 : -1; in aes_encrypt() 129 int aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) in aes_decrypt() argument 132 return aes_ecb_encrypt(plain, (u8 *) crypt, skey) == CRYPT_OK ? 0 : -1; in aes_decrypt() 354 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, in crypto_cipher_encrypt() argument 360 if (plain != crypt) in crypto_cipher_encrypt() 361 os_memcpy(crypt, plain, len); in crypto_cipher_encrypt() 368 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); in crypto_cipher_encrypt() 379 u8 *plain, size_t len) in crypto_cipher_decrypt() argument 384 if (plain != crypt) in crypto_cipher_decrypt() [all …]
|
| H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, 24 const u8 *cipher, u8 *plain); 54 const u8 *plain, size_t plain_len, 61 u8 *plain); 66 size_t M, const u8 *plain, size_t plain_len, 71 u8 *plain);
|
| /freebsd/contrib/kyua/utils/config/ |
| H A D | exceptions.cpp | 37 /// Constructs a new error with a plain-text message. 39 /// \param message The plain-text error message. 52 /// Constructs a new error with a plain-text message. 55 /// \param format The plain-text error message. 70 /// Constructs a new error with a plain-text message. 72 /// \param message The plain-text error message. 85 /// Constructs a new error with a plain-text message. 88 /// \param message The plain-text error message. 103 /// Constructs a new error with a plain-text message. 105 /// \param message The plain-text error message. [all …]
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | ssh | 12 #!:mime text/plain 19 #!:mime text/plain 26 #!:mime text/plain 32 #!:mime text/plain 36 #!:mime text/plain 41 #!:mime text/plain 45 #!:mime text/plain 49 #!:mime text/plain 53 #!:mime text/plain 57 #!:mime text/plain [all …]
|
| /freebsd/crypto/krb5/src/lib/crypto/crypto_tests/ |
| H A D | t_fork.c | 62 krb5_data state_rc4, plain = string2data("plain"), decrypted; in main() local 69 t(krb5_c_random_seed(ctx, &plain)); in main() 77 prepare_enc_data(key_aes, plain.length, &out_aes); in main() 78 prepare_enc_data(key_aes, plain.length, &out_rc4); in main() 80 t(krb5_k_encrypt(ctx, key_aes, 0, NULL, &plain, &out_aes)); in main() 81 t(krb5_k_encrypt(ctx, key_rc4, 0, &state_rc4, &plain, &out_rc4)); in main() 88 t(alloc_data(&decrypted, plain.length)); in main() 90 assert(data_eq(plain, decrypted)); in main() 92 assert(data_eq(plain, decrypted)); in main() 95 t(krb5_k_encrypt(ctx, key_rc4, 0, &state_rc4, &plain, &out_rc4)); in main()
|
| H A D | camellia-test.c | 34 static char plain[16], cipher[16], zero[16]; variable 50 memcpy(cipher, plain, 16); in enc() 82 memset(plain, 0, sizeof(plain)); in vk_test_1() 83 hexdump("PT", plain, 16); in vk_test_1() 111 memset(plain, 0, sizeof(plain)); in vt_test_1() 112 set_bit(plain, i); in vt_test_1() 114 hexdump("PT", plain, 16); in vt_test_1()
|
| H A D | aes-test.c | 36 static char plain[16], cipher[16], zero[16]; variable 52 memcpy(cipher, plain, 16); in enc() 84 memset(plain, 0, sizeof(plain)); in vk_test_1() 85 hexdump("PT", plain, 16); in vk_test_1() 113 memset(plain, 0, sizeof(plain)); in vt_test_1() 114 set_bit(plain, i); in vt_test_1() 116 hexdump("PT", plain, 16); in vt_test_1()
|
| /freebsd/contrib/kyua/utils/text/ |
| H A D | exceptions.cpp | 34 /// Constructs a new error with a plain-text message. 36 /// \param message The plain-text error message. 49 /// Constructs a new error with a plain-text message. 51 /// \param message The plain-text error message. 64 /// Constructs a new error with a plain-text message. 66 /// \param message The plain-text error message. 79 /// Constructs a new error with a plain-text message. 81 /// \param message The plain-text error message.
|
| /freebsd/contrib/wpa/src/tls/ |
| H A D | pkcs1.c | 136 u8 *plain, size_t *plain_len) in pkcs1_decrypt_public_key() argument 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) in pkcs1_decrypt_public_key() 157 plain[0] != 0x00 || plain[1] != 0x01) { in pkcs1_decrypt_public_key() 160 wpa_hexdump_key(MSG_DEBUG, "Signature EB", plain, len); in pkcs1_decrypt_public_key() 164 pos = plain + 3; in pkcs1_decrypt_public_key() 166 if (plain[2] != 0xff) { in pkcs1_decrypt_public_key() 169 wpa_hexdump_key(MSG_DEBUG, "Signature EB", plain, len); in pkcs1_decrypt_public_key() 172 while (pos < plain + len && *pos == 0xff) in pkcs1_decrypt_public_key() 175 if (pos - plain - 2 < 8) { in pkcs1_decrypt_public_key() 179 wpa_hexdump_key(MSG_DEBUG, "Signature EB", plain, len); in pkcs1_decrypt_public_key() [all …]
|
| /freebsd/share/mk/ |
| H A D | plain.test.mk | 4 # Logic to build and install plain test programs. A plain test programs it not 9 .error plain.test.mk cannot be included directly. 31 TEST_INTERFACE.${_T}= plain 42 TEST_INTERFACE.${_T}= plain 52 TEST_INTERFACE.${_T}= plain 62 TEST_INTERFACE.${_T}= plain
|
| /freebsd/crypto/openssl/test/ |
| H A D | destest.c | 254 static unsigned char plain[24] = { variable 523 DES_cfb_encrypt(plain, cfb_buf1, bits, sizeof(plain), &ks, &cfb_tmp, in cfb_test() 525 if (!TEST_mem_eq(cfb_cipher, sizeof(plain), cfb_buf1, sizeof(plain))) in cfb_test() 528 DES_cfb_encrypt(cfb_buf1, cfb_buf2, bits, sizeof(plain), &ks, &cfb_tmp, in cfb_test() 530 return TEST_mem_eq(plain, sizeof(plain), cfb_buf2, sizeof(plain)); in cfb_test() 565 DES_cfb64_encrypt(plain, cfb_buf1, 12, &ks, &cfb_tmp, &n, DES_ENCRYPT); in test_des_cfb64() 566 DES_cfb64_encrypt(&plain[12], &cfb_buf1[12], sizeof(plain) - 12, &ks, in test_des_cfb64() 568 if (!TEST_mem_eq(cfb_cipher64, sizeof(plain), cfb_buf1, sizeof(plain))) in test_des_cfb64() 574 sizeof(plain) - 17, &ks, &cfb_tmp, &n, DES_DECRYPT); in test_des_cfb64() 575 if (!TEST_mem_eq(plain, sizeof(plain), cfb_buf2, sizeof(plain))) in test_des_cfb64() [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | cipher-aes.c | 76 u_char *cprev, *cnow, *plain, *ivp; in ssh_rijndael_cbc() local 89 plain = (u_char *)src; in ssh_rijndael_cbc() 91 for (i = 0; i < blocks; i++, plain+=RIJNDAEL_BLOCKSIZE, in ssh_rijndael_cbc() 94 buf[j] = plain[j] ^ cprev[j]; in ssh_rijndael_cbc() 101 plain = dest+len-RIJNDAEL_BLOCKSIZE; in ssh_rijndael_cbc() 105 plain-=RIJNDAEL_BLOCKSIZE) { in ssh_rijndael_cbc() 106 rijndael_decrypt(&c->r_ctx, cnow, plain); in ssh_rijndael_cbc() 109 plain[j] ^= ivp[j]; in ssh_rijndael_cbc()
|
| /freebsd/sys/contrib/zlib/doc/ |
| H A D | txtvsbin.txt | 1 A Fast Method for Identifying Plain Text Files 9 to find out whether the format of that file is plain text. Although 18 labeled as plain text, otherwise it is labeled as binary. A prominent 26 amounts of textual characters are misidentified as plain text. 50 plain text; otherwise, it is categorized as binary. (The boundary case, 86 There is an extra category of plain text files that are "polluted" with 92 large chunks of textual data. Furthermore, "polluted" plain text should 99 and applications. We tried plain text files, system logs, source code,
|
| /freebsd/crypto/krb5/src/lib/kdb/ |
| H A D | decrypt_key.c | 66 krb5_data plain = empty_data(); in krb5_dbe_def_decrypt_key_data() local 87 ret = alloc_data(&plain, kd->key_data_length[0] - 2); in krb5_dbe_def_decrypt_key_data() 91 ret = krb5_c_decrypt(context, mkey, 0, 0, &cipher, &plain); in krb5_dbe_def_decrypt_key_data() 97 if ((unsigned int)keylen > plain.length) { in krb5_dbe_def_decrypt_key_data() 106 kb.contents = (uint8_t *)plain.data; in krb5_dbe_def_decrypt_key_data() 107 plain = empty_data(); in krb5_dbe_def_decrypt_key_data() 133 zapfree(plain.data, plain.length); in krb5_dbe_def_decrypt_key_data()
|
| /freebsd/tools/lua/ |
| H A D | template.lua | 157 return function(view, plain) 158 if plain == true then return view end 165 return plain == false and assert(read_file(path)) or read_file(path) or view 326 function template.precompile(view, path, strip, plain) 327 local chunk = dump(template.compile(view, nil, plain), strip ~= false) 344 function template.compile(view, cache_key, plain) 345 assert(view, "view was not provided for template.compile(view, cache_key, plain)") 347 return load_chunk(template.parse(view, plain)), false 352 local func = load_chunk(template.parse(view, plain)) 365 function template.parse(view, plain) [all …]
|
| /freebsd/contrib/netbsd-tests/lib/libdes/ |
| H A D | t_des.c | 291 static unsigned char plain[24] = variable 391 des_cfb_encrypt(plain, cfb_buf1, bits, sizeof(plain), ks, &cfb_tmp, in cfb_test() 393 if (memcmp(cfb_cipher, cfb_buf1, sizeof(plain)) != 0) in cfb_test() 396 des_cfb_encrypt(cfb_buf1, cfb_buf2, bits, sizeof(plain), ks, &cfb_tmp, in cfb_test() 398 if (memcmp(plain, cfb_buf2, sizeof(plain)) != 0) in cfb_test() 413 des_cfb64_encrypt(plain, cfb_buf1, 12, ks, &cfb_tmp, &n, DES_ENCRYPT); in cfb64_test() 414 des_cfb64_encrypt(&(plain[12]), &(cfb_buf1[12]), sizeof(plain) - 12, ks, in cfb64_test() 416 if (memcmp(cfb_cipher, cfb_buf1, sizeof(plain)) != 0) in cfb64_test() 422 sizeof(plain) - 17, ks, &cfb_tmp, &n, DES_DECRYPT); in cfb64_test() 423 if (memcmp(plain, cfb_buf2, sizeof(plain)) != 0) in cfb64_test() [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | rd_cred.c | 40 * assumed to be unencrypted plain text (RFC 6448). 47 krb5_data plain = empty_data(); in decrypt_encpart() local 55 ret = alloc_data(&plain, ctext->ciphertext.length); in decrypt_encpart() 60 KRB5_KEYUSAGE_KRB_CRED_ENCPART, 0, ctext, &plain); in decrypt_encpart() 65 KRB5_KEYUSAGE_KRB_CRED_ENCPART, 0, ctext, &plain); in decrypt_encpart() 69 ret = decode_krb5_enc_cred_part(&plain, encpart_out); in decrypt_encpart() 70 zapfree(plain.data, plain.length); in decrypt_encpart()
|