/freebsd/crypto/openssl/test/recipes/ |
H A D | 15-test_mp_rsa.t | 45 my $cleartext = data_file("plain_text"); 70 '-encrypt', '-in', $cleartext, 85 '-encrypt', '-in', $cleartext, 94 '-encrypt', '-in', $cleartext, 112 open(my $fh, "<", $cleartext) or return 0;
|
/freebsd/tools/tools/crypto/ |
H A D | cryptotest.c | 250 char *cleartext, *ciphertext, *originaltext, *key; in runtest() local 311 cleartext = originaltext+size; in runtest() 312 ciphertext = cleartext+size; in runtest() 314 cleartext[i] = rdigit(); in runtest() 315 memcpy(originaltext, cleartext, size); in runtest() 328 hexdump(cleartext, MIN(size, CHUNK)); in runtest() 338 cop.src = cleartext; in runtest() 349 if (verify && bcmp(ciphertext, cleartext, size) == 0) { in runtest() 354 memset(cleartext, 'x', MIN(size, CHUNK)); in runtest() 360 cop.dst = cleartext; in runtest() [all …]
|
H A D | cryptocheck.c | 793 char *buffer, *cleartext, *ciphertext; in run_cipher_test() local 825 cleartext = alloc_buffer(size); in run_cipher_test() 830 if (!openssl_cipher(alg, cipher, key, iv, cleartext, ciphertext, size, in run_cipher_test() 833 if (size > 0 && memcmp(cleartext, ciphertext, size) == 0) { in run_cipher_test() 840 if (memcmp(cleartext, buffer, size) != 0) { in run_cipher_test() 843 hexdump(cleartext, size, NULL, 0); in run_cipher_test() 853 if (!ocf_cipher(&ses, alg, iv, cleartext, buffer, size, COP_ENCRYPT)) in run_cipher_test() 867 if (memcmp(cleartext, buffer, size) != 0) { in run_cipher_test() 870 hexdump(cleartext, size, NULL, 0); in run_cipher_test() 885 free(cleartext); in run_cipher_test() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | modes_internal_test.c | 194 unsigned char cleartext[64], ciphertext[64], vector[64]; in execute_cts128() local 212 size = fixture->decrypt_block(ciphertext, cleartext, len, in execute_cts128() 216 || !TEST_mem_eq(cleartext, len, test_input, len) in execute_cts128() 232 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len, in execute_cts128() 236 || !TEST_mem_eq(cleartext, len, test_input, len) in execute_cts128()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SMIME_write_CMS.pod | 26 If B<CMS_DETACHED> is set then cleartext signing will be used, this option only 37 If cleartext signing is being used and B<CMS_STREAM> not set then the data must
|
H A D | SMIME_write_PKCS7.pod | 26 If B<PKCS7_DETACHED> is set then cleartext signing will be used, 38 If cleartext signing is being used and B<PKCS7_STREAM> not set then
|
H A D | SMIME_write_ASN1.pod | 43 If B<CMS_DETACHED> is set then cleartext signing will be used, this option only 54 If cleartext signing is being used and B<CMS_STREAM> not set then the data must
|
H A D | SMIME_read_PKCS7.pod | 20 If cleartext signing is used then the content is saved in
|
H A D | SMIME_read_ASN1.pod | 34 If cleartext signing is used then the content is saved in a memory bio which is
|
H A D | SMIME_read_CMS.pod | 21 If cleartext signing is used then the content is saved in a memory bio which is
|
H A D | DES_random_key.pod | 146 (cleartext) is encrypted in to the I<output> (ciphertext) using the 149 ciphertext) is decrypted into the I<output> (now cleartext). Input 165 routine cipher-block-chain encrypts the cleartext data pointed to by
|
H A D | SSL_CTX_dane_enable.pod | 333 even cleartext. 342 application must avoid cleartext, but cannot authenticate the peer,
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 1698 const heim_octet_string *cleartext, in _hx509_public_encrypt() argument 1733 ret = RSA_public_encrypt(cleartext->length, in _hx509_public_encrypt() 1734 (unsigned char *)cleartext->data, in _hx509_public_encrypt() 1764 heim_octet_string *cleartext) in hx509_private_key_private_decrypt() argument 1768 cleartext->data = NULL; in hx509_private_key_private_decrypt() 1769 cleartext->length = 0; in hx509_private_key_private_decrypt() 1777 cleartext->length = RSA_size(p->private_key.rsa); in hx509_private_key_private_decrypt() 1778 cleartext->data = malloc(cleartext->length); in hx509_private_key_private_decrypt() 1779 if (cleartext->data == NULL) { in hx509_private_key_private_decrypt() 1784 cleartext->data, in hx509_private_key_private_decrypt() [all …]
|
H A D | cert.c | 1603 heim_octet_string *cleartext) in _hx509_cert_private_decrypt() argument 1605 cleartext->data = NULL; in _hx509_cert_private_decrypt() 1606 cleartext->length = 0; in _hx509_cert_private_decrypt() 1618 cleartext); in _hx509_cert_private_decrypt() 1623 const heim_octet_string *cleartext, in hx509_cert_public_encrypt() argument 1629 cleartext, p->data, in hx509_cert_public_encrypt()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-passwd.pod.in | 85 In the output list, prepend the cleartext password and a TAB character 90 When the B<-table> option is used, reverse the order of cleartext and hash.
|
H A D | openssl-smime.pod.in | 213 do not support S/MIME. Without this option cleartext signing with 364 Create a cleartext signed message:
|
H A D | openssl-cms.pod.in | 465 do not support S/MIME. Without this option cleartext signing with 772 Create a cleartext signed message:
|
/freebsd/share/dict/ |
H A D | freebsd | 226 cleartext
|
/freebsd/lib/libpam/pam.d/ |
H A D | README | 53 use_mapped_pass: convert cleartext password to a crypto key.
|
/freebsd/contrib/ntp/ntpsnmpd/ |
H A D | ntpv4-mib.mib | 705 cleartext event message."
|
/freebsd/crypto/openssl/crypto/objects/ |
H A D | objects.txt | 1257 setAttr-IssCap-T2 2 : setAttr-T2cleartxt : cleartext track 2
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.2005 | 712 * lib/krb5/test_crypto.c (time_encryption): free cleartext buffer
|
/freebsd/crypto/openssl/ |
H A D | CHANGES.md | 11597 cleartext signing (multipart/signed type) is effectively streaming
|