Home
last modified time | relevance | path

Searched refs:encoded (Results 1 – 25 of 510) sorted by relevance

12345678910>>...21

/freebsd/crypto/krb5/src/lib/krad/
H A Dt_attrset.c45 unsigned char buffer[KRAD_PACKET_SIZE_MAX], encoded[MAX_ATTRSETSIZE]; in main() local
69 encoded[len + 0] = KRAD_ATTR_USER_NAME; in main()
70 encoded[len + 1] = strlen(username) + 2; in main()
71 memcpy(encoded + len + 2, username, strlen(username)); in main()
72 len += encoded[len + 1]; in main()
75 encoded[len + 0] = KRAD_ATTR_USER_PASSWORD; in main()
76 encoded[len + 1] = sizeof(encpass) + 2; in main()
77 memcpy(encoded + len + 2, encpass, sizeof(encpass)); in main()
78 len += encoded[len + 1]; in main()
82 insist(memcmp(encoded, buffer, len) == 0); in main()
H A Dt_attr.c32 const static unsigned char encoded[] = { variable
65 in = make_data((void *)encoded, sizeof(encoded)); in main()
76 insist(len == sizeof(encoded)); in main()
77 insist(memcmp(outbuf, encoded, len) == 0); in main()
/freebsd/crypto/openssl/test/
H A Dbio_base64_test.c22 char *encoded; member
93 static int encode(unsigned const char *buf, unsigned buflen, char *encoded, in encode() argument
101 if (encoded != NULL) { in encode()
102 int elen = strlen(encoded); in encode()
104 return BIO_write(mem, encoded, elen) == elen; in encode()
151 unsigned buflen, int trunc, char *encoded, unsigned llen, in genb64()
165 || encode(buf, buflen, encoded, trunc, llen, wscnt, mem) <= 0 in genb64()
188 char *encoded = NULL; in test_bio_base64_run()
195 * Pre-encoded data always encodes NUL octets. If all we care about is the in test_bio_base64_run()
198 if (t->encoded ! in test_bio_base64_run()
152 genb64(char * prefix,char * suffix,unsigned const char * buf,unsigned buflen,int trunc,char * encoded,unsigned llen,unsigned wscnt,char ** out) genb64() argument
191 char *encoded = NULL; test_bio_base64_run() local
[all...]
H A Dpemtest.c19 const char *encoded; member
41 const char *encoded = b64_pem_data[idx].encoded; in test_b64() local
45 || !TEST_true(BIO_printf(b, "%s\n", encoded)) in test_b64()
69 const char *encoded = b64_pem_data[0].encoded; in test_invalid() local
73 || !TEST_true(BIO_printf(b, "%c%s\n", '\t', encoded)) in test_invalid()
H A Dendecode_test.c135 void **encoded, long *encoded_len, in make_key()
140 void **object, void *encoded, long encoded_len,
162 void *encoded = NULL; in test_encode_decode()
175 if (!TEST_true(encode_cb(file, line, &encoded, &encoded_len, pkey, selection, in test_encode_decode()
180 if (TEST_false(decode_cb(file, line, (void **)&pkey2, encoded, in test_encode_decode()
188 if (!TEST_true(check_cb(file, line, type, encoded, encoded_len)) in test_encode_decode()
189 || !TEST_true(decode_cb(file, line, (void **)&pkey2, encoded, encoded_len, in test_encode_decode()
195 && !TEST_true(decode_cb(file, line, (void **)&pkey3, encoded, encoded_len, in test_encode_decode()
221 && !test_cb(file, line, encoded, encoded_len, encoded2, encoded2_len)) in test_encode_decode()
227 if (encoded ! in test_encode_decode()
168 void *encoded = NULL; test_encode_decode() local
249 encode_EVP_PKEY_prov(const char * file,const int line,void ** encoded,long * encoded_len,void * object,int selection,const char * output_type,const char * output_structure,const char * pass,const char * pcipher) encode_EVP_PKEY_prov() argument
290 decode_EVP_PKEY_prov(const char * file,const int line,void ** object,void * encoded,long encoded_len,const char * input_type,const char * structure_type,const char * keytype,int selection,const char * pass) decode_EVP_PKEY_prov() argument
365 encode_EVP_PKEY_legacy_PEM(const char * file,const int line,void ** encoded,long * encoded_len,void * object,ossl_unused int selection,ossl_unused const char * output_type,ossl_unused const char * output_structure,const char * pass,const char * pcipher) encode_EVP_PKEY_legacy_PEM() argument
405 encode_EVP_PKEY_MSBLOB(const char * file,const int line,void ** encoded,long * encoded_len,void * object,int selection,ossl_unused const char * output_type,ossl_unused const char * output_structure,ossl_unused const char * pass,ossl_unused const char * pcipher) encode_EVP_PKEY_MSBLOB() argument
450 encode_EVP_PKEY_PVK(const char * file,const int line,void ** encoded,long * encoded_len,void * object,int selection,ossl_unused const char * output_type,ossl_unused const char * output_structure,const char * pass,ossl_unused const char * pcipher) encode_EVP_PKEY_PVK() argument
[all...]
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/
H A Dargon2.c89 const size_t hashlen, char *encoded, const size_t encodedlen, in argon2_hash() argument
143 if (encoded && encodedlen) { in argon2_hash()
144 if (encode_string(encoded, encodedlen, &context, type) != ARGON2_OK) { in argon2_hash()
146 sodium_memzero(encoded, encodedlen); in argon2_hash()
162 const size_t saltlen, const size_t hashlen, char *encoded, in argon2i_hash_encoded() argument
166 NULL, hashlen, encoded, encodedlen, Argon2_i); in argon2i_hash_encoded()
183 const size_t saltlen, const size_t hashlen, char *encoded, in argon2id_hash_encoded() argument
187 NULL, hashlen, encoded, encodedlen, Argon2_id); in argon2id_hash_encoded()
201 argon2_verify(const char *encoded, const void *pwd, const size_t pwdlen, in argon2_verify() argument
218 encoded_len = strlen(encoded); in argon2_verify()
[all …]
H A Dargon2.h216 char *encoded, const size_t encodedlen);
237 char *encoded, const size_t encodedlen);
281 void *hash, const size_t hashlen, char *encoded,
291 int argon2i_verify(const char *encoded, const void *pwd, const size_t pwdlen);
300 int argon2id_verify(const char *encoded, const void *pwd, const size_t pwdlen);
303 int argon2_verify(const char *encoded, const void *pwd, const size_t pwdlen,
/freebsd/crypto/openssh/
H A Dssh-ed25519-sk.c131 struct sshbuf *encoded = NULL; in ssh_ed25519_sk_verify() local
203 if ((encoded = sshbuf_new()) == NULL) { in ssh_ed25519_sk_verify()
207 if (sshbuf_put(encoded, sigblob, len) != 0 || in ssh_ed25519_sk_verify()
208 sshbuf_put(encoded, apphash, sizeof(apphash)) != 0 || in ssh_ed25519_sk_verify()
209 sshbuf_put_u8(encoded, sig_flags) != 0 || in ssh_ed25519_sk_verify()
210 sshbuf_put_u32(encoded, sig_counter) != 0 || in ssh_ed25519_sk_verify()
211 sshbuf_put(encoded, msghash, sizeof(msghash)) != 0) { in ssh_ed25519_sk_verify()
217 sshbuf_dump(encoded, stderr); in ssh_ed25519_sk_verify()
219 sm = sshbuf_ptr(encoded); in ssh_ed25519_sk_verify()
220 smlen = sshbuf_len(encoded); in ssh_ed25519_sk_verify()
[all …]
H A Dsshkey-xmss.c893 struct sshbuf *encrypted = NULL, *encoded = NULL, *padded = NULL; in sshkey_xmss_encrypt_state() local
920 (encoded = sshbuf_new()) == NULL || in sshkey_xmss_encrypt_state()
931 if ((r = sshbuf_put(encoded, XMSS_MAGIC, sizeof(XMSS_MAGIC))) != 0 || in sshkey_xmss_encrypt_state()
932 (r = sshbuf_put_u32(encoded, state->idx)) != 0) in sshkey_xmss_encrypt_state()
946 if ((r = sshbuf_put_u32(encoded, encrypted_len)) != 0) in sshkey_xmss_encrypt_state()
948 aadlen = sshbuf_len(encoded); in sshkey_xmss_encrypt_state()
951 if ((r = sshbuf_putb(encoded, padded)) != 0) in sshkey_xmss_encrypt_state()
960 (r = cipher_crypt(ciphercontext, 0, cp, sshbuf_ptr(encoded), in sshkey_xmss_encrypt_state()
972 sshbuf_free(encoded); in sshkey_xmss_encrypt_state()
980 sshkey_xmss_decrypt_state(const struct sshkey *k, struct sshbuf *encoded, in sshkey_xmss_decrypt_state() argument
[all …]
/freebsd/crypto/heimdal/lib/wind/
H A Didn-lookup.c65 char encoded[1024]; in lookup() local
89 ep = encoded; in lookup()
96 len = sizeof(encoded) - (ep - encoded); in lookup()
108 printf("Converted \"%s\" into \"%s\"\n", name, encoded); in lookup()
112 ret = getaddrinfo(encoded, NULL, &hints, &ai); in lookup()
/freebsd/sys/contrib/openzfs/module/icp/algs/modes/
H A Dccm.c704 encode_adata_len(ulong_t auth_data_len, uint8_t *encoded, size_t *encoded_len) in encode_adata_len() argument
716 encoded[0] = (auth_data_len & 0xff00) >> 8; in encode_adata_len()
717 encoded[1] = auth_data_len & 0xff; in encode_adata_len()
723 encoded[0] = 0xff; in encode_adata_len()
724 encoded[1] = 0xfe; in encode_adata_len()
726 lencoded_ptr = (uint32_t *)&encoded[2]; in encode_adata_len()
729 encoded[2] = (auth_data_len & 0xff000000) >> 24; in encode_adata_len()
730 encoded[3] = (auth_data_len & 0xff0000) >> 16; in encode_adata_len()
731 encoded[4] = (auth_data_len & 0xff00) >> 8; in encode_adata_len()
732 encoded[5] = auth_data_len & 0xff; in encode_adata_len()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_set1_encoded_public_key.pod40 The format for the encoded public key will depend on the algorithm in use. For
41 DH it should be encoded as a positive integer in big-endian form. For EC is
43 Curve Cryptography") standard. For B<X25519> and B<X448> it should be encoded
46 format defined in B<FIPS 203> (the 12-bit per-coefficient encoded public I<t>
49 The key to be updated is supplied in B<pkey>. The buffer containing the encoded
53 the encoded public key is returned to the application. The key containing the
54 public key data is supplied in B<pkey>. A buffer containing the encoded key will
55 be allocated and stored in B<*ppub>. The length of the encoded public key is
73 EVP_PKEY_get1_encoded_public_key() returns the length of the encoded key or 0 for failure.
102 =head2 Get an encoded public key to send to a peer
[all …]
H A Dd2i_RSAPrivateKey.pod130 B<d2i_I<TYPE>PrivateKey>() and derivates thereof decode DER encoded
133 B<d2i_I<TYPE>PublicKey>() and derivates thereof decode DER encoded
136 B<d2i_I<TYPE>params>() and derivates thereof decode DER encoded B<I<TYPE>>
139 B<d2i_I<TYPE>_PUBKEY>() and derivates thereof decode DER encoded B<I<TYPE>>
143 B<I<TYPE>> data into a type specific DER encoded structure.
146 B<I<TYPE>> data into a type specific DER encoded structure.
149 parameters data into a type specific DER encoded structure.
152 B<I<TYPE>> data into a DER encoded B<SubjectPublicKeyInfo> structure.
156 Similarly, i2d_RSAPrivateKey() and i2d_RSAPublicKey() produce DER encoded
181 A caveat is that L<i2d_PrivateKey(3)> may output a DER encoded PKCS#8
[all …]
/freebsd/sys/contrib/device-tree/Bindings/soundwire/
H A Dqcom,sdw.txt18 Value type: <prop-encoded-array>
24 Value type: <prop-encoded-array>
46 Value type: <prop-encoded-array>
66 Value type: <prop-encoded-array>
75 Value type: <prop-encoded-array>
84 Value type: <prop-encoded-array>
94 Value type: <prop-encoded-array>
102 Value type: <prop-encoded-array>
113 Value type: <prop-encoded-array>
123 Value type: <prop-encoded-array>
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dpassphrase-encoding.pod22 This means that for an object that was encrypted using a pass phrase encoded in
23 ISO-8859-1, that object needs to be decrypted using a pass phrase encoded in
30 The standard stipulates that the pass phrase shall be encoded as an ASN.1
32 encoded in big endian (UCS-2 BE).
40 Treats the received pass phrase as UTF-8 encoded and tries to re-encode it to
47 Assumes that the pass phrase is encoded in ASCII or ISO-8859-1 and
64 A pass phrase encoded in ISO-8859-2 could very well have a sequence such as
67 be misinterpreted as the perfectly valid UTF-8 encoded code point U+00EF (LATIN
76 On the same accord, anything encoded in UTF-8 that was given to OpenSSL older
83 This API stipulates that pass phrases should be UTF-8 encoded, and that any
[all …]
/freebsd/crypto/openssl/crypto/slh_dsa/
H A Dslh_dsa.c34 * @param msg The message to sign. This may be encoded beforehand.
141 * @param msg The message to verify. This may be encoded beforehand.
214 * SLH_DSA pure signatures are encoded as M' = 00 || ctx_len || ctx || msg
225 * @param out_len The size of the returned encoded buffer.
226 * @returns A buffer containing the encoded message. If the passed in
227 * |tmp| buffer is big enough to hold the encoded message then it returns |tmp|
235 uint8_t *encoded = NULL; in msg_encode() local
250 encoded = tmp; in msg_encode()
252 encoded = OPENSSL_zalloc(encoded_len); in msg_encode()
253 if (encoded in msg_encode()
[all...]
/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_sign.c67 * initialized array containing the DER encoded DigestInfo for the specified
70 * |n| is last byte in the encoded OID for the digest.
292 const unsigned char *encoded = NULL; in RSA_sign()
299 /* Compute the encoded digest. */ in RSA_sign()
311 encoded = m; in RSA_sign()
315 encoded = tmps; in RSA_sign()
322 encrypt_len = RSA_private_encrypt((int)encoded_len, encoded, sigret, rsa, in RSA_sign()
350 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify()
357 /* Recover the encoded digest. */ in ossl_rsa_verify()
435 /* Construct the encoded diges in ossl_rsa_verify()
293 const unsigned char *encoded = NULL; RSA_sign() local
351 unsigned char *decrypt_buf = NULL, *encoded = NULL; ossl_rsa_verify() local
[all...]
/freebsd/crypto/krb5/src/kdc/
H A Dndr.c42 uint8_t *encoded; member
122 encoded_out->encoded = b.data; in enc_wchar_pointer()
277 k5_buf_add_len(&b, pt_encoded.encoded, pt_encoded.bytes_len); in ndr_enc_delegation_info()
293 k5_buf_add_len(&b, tss_encoded[i].encoded, tss_encoded[i].bytes_len); in ndr_enc_delegation_info()
312 free(pt_encoded.encoded); in ndr_enc_delegation_info()
314 free(tss_encoded[i].encoded); in ndr_enc_delegation_info()
/freebsd/contrib/libder/libder/
H A Dlibder_private.h137 uint8_t encoded = type->tag_class << 6; in libder_type_simple() local
141 encoded |= BER_TYPE_CONSTRUCTED_MASK; in libder_type_simple()
143 encoded |= type->tag_short; in libder_type_simple()
144 return (encoded); in libder_type_simple()
/freebsd/crypto/openssl/ssl/quic/
H A Dquic_cfq.c18 unsigned char *encoded; member
38 return ex->encoded; in ossl_quic_cfq_item_get_encoded()
183 item->free_cb(item->encoded, item->encoded_len, item->free_cb_arg); in clear_item()
186 item->encoded = NULL; in clear_item()
236 const unsigned char *encoded, in ossl_quic_cfq_add_frame()
249 item->encoded = (unsigned char *)encoded; in ossl_quic_cfq_add_frame()
235 ossl_quic_cfq_add_frame(QUIC_CFQ * cfq,uint32_t priority,uint32_t pn_space,uint64_t frame_type,uint32_t flags,const unsigned char * encoded,size_t encoded_len,cfq_free_cb * free_cb,void * free_cb_arg) ossl_quic_cfq_add_frame() argument
/freebsd/crypto/openssl/crypto/ml_dsa/
H A Dml_dsa_sign.c307 * ML_DSA pure signatures are encoded as M' = 00 || ctx_len || ctx || msg
320 * @param out_len The size of the returned encoded buffer.
321 * @returns A buffer containing the encoded message. If the passed in
322 * |tmp| buffer is big enough to hold the encoded message then it returns |tmp|
330 uint8_t *encoded = NULL; in msg_encode()
345 encoded = tmp; in msg_encode()
347 encoded = OPENSSL_malloc(encoded_len); in msg_encode()
348 if (encoded == NULL) in msg_encode()
351 encoded[0] = 0; in msg_encode()
352 encoded[ in msg_encode()
334 uint8_t *encoded = NULL; msg_encode() local
[all...]
/freebsd/sys/contrib/device-tree/Bindings/phy/
H A Dqcom,usb-8x16-phy.txt10 Value type: <prop-encoded-array>
15 Value type: <prop-encoded-array>
42 Value type: <prop-encoded-array>
52 Value type: <prop-encoded-array>
/freebsd/sys/contrib/device-tree/Bindings/i2c/
H A Di2c-qcom-cci.txt17 Value type: <prop-encoded-array>
23 Value type: <prop-encoded-array>
30 Value type: <prop-encoded-array>
41 Value type: <prop-encoded-array>
/freebsd/sys/contrib/device-tree/Bindings/powerpc/fsl/
H A Dpamu.txt13 - ranges : <prop-encoded-array>
20 - interrupts : <prop-encoded-array>
31 - reg : <prop-encoded-array>
51 - reg : <prop-encoded-array>
58 : <prop-encoded-array>
64 : <prop-encoded-array>
83 - fsl,liodn-reg : <prop-encoded-array>
/freebsd/sys/contrib/device-tree/Bindings/media/
H A Dqcom,camss.txt14 Value type: <prop-encoded-array>
36 Value type: <prop-encoded-array>
54 Value type: <prop-encoded-array>
60 Value type: <prop-encoded-array>
115 Value type: <prop-encoded-array>
141 Value type: <prop-encoded-array>

12345678910>>...21