| /freebsd/crypto/krb5/src/lib/krad/ |
| H A D | t_attrset.c | 45 unsigned char buffer[KRAD_PACKET_SIZE_MAX], encoded[MAX_ATTRSETSIZE]; in main() local 69 encoded[len + 0] = KRAD_ATTR_USER_NAME; in main() 70 encoded[len + 1] = strlen(username) + 2; in main() 71 memcpy(encoded + len + 2, username, strlen(username)); in main() 72 len += encoded[len + 1]; in main() 75 encoded[len + 0] = KRAD_ATTR_USER_PASSWORD; in main() 76 encoded[len + 1] = sizeof(encpass) + 2; in main() 77 memcpy(encoded + len + 2, encpass, sizeof(encpass)); in main() 78 len += encoded[len + 1]; in main() 82 insist(memcmp(encoded, buffer, len) == 0); in main()
|
| H A D | t_attr.c | 32 const static unsigned char encoded[] = { variable 65 in = make_data((void *)encoded, sizeof(encoded)); in main() 76 insist(len == sizeof(encoded)); in main() 77 insist(memcmp(outbuf, encoded, len) == 0); in main()
|
| /freebsd/crypto/openssl/test/ |
| H A D | bio_base64_test.c | 22 char *encoded; member 93 static int encode(unsigned const char *buf, unsigned buflen, char *encoded, in encode() argument 101 if (encoded != NULL) { in encode() 102 int elen = strlen(encoded); in encode() 104 return BIO_write(mem, encoded, elen) == elen; in encode() 151 unsigned buflen, int trunc, char *encoded, unsigned llen, in genb64() 165 || encode(buf, buflen, encoded, trunc, llen, wscnt, mem) <= 0 in genb64() 188 char *encoded = NULL; in test_bio_base64_run() 195 * Pre-encoded data always encodes NUL octets. If all we care about is the in test_bio_base64_run() 198 if (t->encoded ! in test_bio_base64_run() 152 genb64(char * prefix,char * suffix,unsigned const char * buf,unsigned buflen,int trunc,char * encoded,unsigned llen,unsigned wscnt,char ** out) genb64() argument 191 char *encoded = NULL; test_bio_base64_run() local [all...] |
| H A D | pemtest.c | 19 const char *encoded; member 41 const char *encoded = b64_pem_data[idx].encoded; in test_b64() local 45 || !TEST_true(BIO_printf(b, "%s\n", encoded)) in test_b64() 69 const char *encoded = b64_pem_data[0].encoded; in test_invalid() local 73 || !TEST_true(BIO_printf(b, "%c%s\n", '\t', encoded)) in test_invalid()
|
| H A D | endecode_test.c | 135 void **encoded, long *encoded_len, in make_key() 140 void **object, void *encoded, long encoded_len, 162 void *encoded = NULL; in test_encode_decode() 175 if (!TEST_true(encode_cb(file, line, &encoded, &encoded_len, pkey, selection, in test_encode_decode() 180 if (TEST_false(decode_cb(file, line, (void **)&pkey2, encoded, in test_encode_decode() 188 if (!TEST_true(check_cb(file, line, type, encoded, encoded_len)) in test_encode_decode() 189 || !TEST_true(decode_cb(file, line, (void **)&pkey2, encoded, encoded_len, in test_encode_decode() 195 && !TEST_true(decode_cb(file, line, (void **)&pkey3, encoded, encoded_len, in test_encode_decode() 221 && !test_cb(file, line, encoded, encoded_len, encoded2, encoded2_len)) in test_encode_decode() 227 if (encoded ! in test_encode_decode() 168 void *encoded = NULL; test_encode_decode() local 249 encode_EVP_PKEY_prov(const char * file,const int line,void ** encoded,long * encoded_len,void * object,int selection,const char * output_type,const char * output_structure,const char * pass,const char * pcipher) encode_EVP_PKEY_prov() argument 290 decode_EVP_PKEY_prov(const char * file,const int line,void ** object,void * encoded,long encoded_len,const char * input_type,const char * structure_type,const char * keytype,int selection,const char * pass) decode_EVP_PKEY_prov() argument 365 encode_EVP_PKEY_legacy_PEM(const char * file,const int line,void ** encoded,long * encoded_len,void * object,ossl_unused int selection,ossl_unused const char * output_type,ossl_unused const char * output_structure,const char * pass,const char * pcipher) encode_EVP_PKEY_legacy_PEM() argument 405 encode_EVP_PKEY_MSBLOB(const char * file,const int line,void ** encoded,long * encoded_len,void * object,int selection,ossl_unused const char * output_type,ossl_unused const char * output_structure,ossl_unused const char * pass,ossl_unused const char * pcipher) encode_EVP_PKEY_MSBLOB() argument 450 encode_EVP_PKEY_PVK(const char * file,const int line,void ** encoded,long * encoded_len,void * object,int selection,ossl_unused const char * output_type,ossl_unused const char * output_structure,const char * pass,ossl_unused const char * pcipher) encode_EVP_PKEY_PVK() argument [all...] |
| /freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/ |
| H A D | argon2.c | 89 const size_t hashlen, char *encoded, const size_t encodedlen, in argon2_hash() argument 143 if (encoded && encodedlen) { in argon2_hash() 144 if (encode_string(encoded, encodedlen, &context, type) != ARGON2_OK) { in argon2_hash() 146 sodium_memzero(encoded, encodedlen); in argon2_hash() 162 const size_t saltlen, const size_t hashlen, char *encoded, in argon2i_hash_encoded() argument 166 NULL, hashlen, encoded, encodedlen, Argon2_i); in argon2i_hash_encoded() 183 const size_t saltlen, const size_t hashlen, char *encoded, in argon2id_hash_encoded() argument 187 NULL, hashlen, encoded, encodedlen, Argon2_id); in argon2id_hash_encoded() 201 argon2_verify(const char *encoded, const void *pwd, const size_t pwdlen, in argon2_verify() argument 218 encoded_len = strlen(encoded); in argon2_verify() [all …]
|
| H A D | argon2.h | 216 char *encoded, const size_t encodedlen); 237 char *encoded, const size_t encodedlen); 281 void *hash, const size_t hashlen, char *encoded, 291 int argon2i_verify(const char *encoded, const void *pwd, const size_t pwdlen); 300 int argon2id_verify(const char *encoded, const void *pwd, const size_t pwdlen); 303 int argon2_verify(const char *encoded, const void *pwd, const size_t pwdlen,
|
| /freebsd/crypto/openssh/ |
| H A D | ssh-ed25519-sk.c | 131 struct sshbuf *encoded = NULL; in ssh_ed25519_sk_verify() local 203 if ((encoded = sshbuf_new()) == NULL) { in ssh_ed25519_sk_verify() 207 if (sshbuf_put(encoded, sigblob, len) != 0 || in ssh_ed25519_sk_verify() 208 sshbuf_put(encoded, apphash, sizeof(apphash)) != 0 || in ssh_ed25519_sk_verify() 209 sshbuf_put_u8(encoded, sig_flags) != 0 || in ssh_ed25519_sk_verify() 210 sshbuf_put_u32(encoded, sig_counter) != 0 || in ssh_ed25519_sk_verify() 211 sshbuf_put(encoded, msghash, sizeof(msghash)) != 0) { in ssh_ed25519_sk_verify() 217 sshbuf_dump(encoded, stderr); in ssh_ed25519_sk_verify() 219 sm = sshbuf_ptr(encoded); in ssh_ed25519_sk_verify() 220 smlen = sshbuf_len(encoded); in ssh_ed25519_sk_verify() [all …]
|
| H A D | sshkey-xmss.c | 893 struct sshbuf *encrypted = NULL, *encoded = NULL, *padded = NULL; in sshkey_xmss_encrypt_state() local 920 (encoded = sshbuf_new()) == NULL || in sshkey_xmss_encrypt_state() 931 if ((r = sshbuf_put(encoded, XMSS_MAGIC, sizeof(XMSS_MAGIC))) != 0 || in sshkey_xmss_encrypt_state() 932 (r = sshbuf_put_u32(encoded, state->idx)) != 0) in sshkey_xmss_encrypt_state() 946 if ((r = sshbuf_put_u32(encoded, encrypted_len)) != 0) in sshkey_xmss_encrypt_state() 948 aadlen = sshbuf_len(encoded); in sshkey_xmss_encrypt_state() 951 if ((r = sshbuf_putb(encoded, padded)) != 0) in sshkey_xmss_encrypt_state() 960 (r = cipher_crypt(ciphercontext, 0, cp, sshbuf_ptr(encoded), in sshkey_xmss_encrypt_state() 972 sshbuf_free(encoded); in sshkey_xmss_encrypt_state() 980 sshkey_xmss_decrypt_state(const struct sshkey *k, struct sshbuf *encoded, in sshkey_xmss_decrypt_state() argument [all …]
|
| /freebsd/crypto/heimdal/lib/wind/ |
| H A D | idn-lookup.c | 65 char encoded[1024]; in lookup() local 89 ep = encoded; in lookup() 96 len = sizeof(encoded) - (ep - encoded); in lookup() 108 printf("Converted \"%s\" into \"%s\"\n", name, encoded); in lookup() 112 ret = getaddrinfo(encoded, NULL, &hints, &ai); in lookup()
|
| /freebsd/sys/contrib/openzfs/module/icp/algs/modes/ |
| H A D | ccm.c | 704 encode_adata_len(ulong_t auth_data_len, uint8_t *encoded, size_t *encoded_len) in encode_adata_len() argument 716 encoded[0] = (auth_data_len & 0xff00) >> 8; in encode_adata_len() 717 encoded[1] = auth_data_len & 0xff; in encode_adata_len() 723 encoded[0] = 0xff; in encode_adata_len() 724 encoded[1] = 0xfe; in encode_adata_len() 726 lencoded_ptr = (uint32_t *)&encoded[2]; in encode_adata_len() 729 encoded[2] = (auth_data_len & 0xff000000) >> 24; in encode_adata_len() 730 encoded[3] = (auth_data_len & 0xff0000) >> 16; in encode_adata_len() 731 encoded[4] = (auth_data_len & 0xff00) >> 8; in encode_adata_len() 732 encoded[5] = auth_data_len & 0xff; in encode_adata_len() [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_set1_encoded_public_key.pod | 40 The format for the encoded public key will depend on the algorithm in use. For 41 DH it should be encoded as a positive integer in big-endian form. For EC is 43 Curve Cryptography") standard. For B<X25519> and B<X448> it should be encoded 46 format defined in B<FIPS 203> (the 12-bit per-coefficient encoded public I<t> 49 The key to be updated is supplied in B<pkey>. The buffer containing the encoded 53 the encoded public key is returned to the application. The key containing the 54 public key data is supplied in B<pkey>. A buffer containing the encoded key will 55 be allocated and stored in B<*ppub>. The length of the encoded public key is 73 EVP_PKEY_get1_encoded_public_key() returns the length of the encoded key or 0 for failure. 102 =head2 Get an encoded public key to send to a peer [all …]
|
| H A D | d2i_RSAPrivateKey.pod | 130 B<d2i_I<TYPE>PrivateKey>() and derivates thereof decode DER encoded 133 B<d2i_I<TYPE>PublicKey>() and derivates thereof decode DER encoded 136 B<d2i_I<TYPE>params>() and derivates thereof decode DER encoded B<I<TYPE>> 139 B<d2i_I<TYPE>_PUBKEY>() and derivates thereof decode DER encoded B<I<TYPE>> 143 B<I<TYPE>> data into a type specific DER encoded structure. 146 B<I<TYPE>> data into a type specific DER encoded structure. 149 parameters data into a type specific DER encoded structure. 152 B<I<TYPE>> data into a DER encoded B<SubjectPublicKeyInfo> structure. 156 Similarly, i2d_RSAPrivateKey() and i2d_RSAPublicKey() produce DER encoded 181 A caveat is that L<i2d_PrivateKey(3)> may output a DER encoded PKCS#8 [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/soundwire/ |
| H A D | qcom,sdw.txt | 18 Value type: <prop-encoded-array> 24 Value type: <prop-encoded-array> 46 Value type: <prop-encoded-array> 66 Value type: <prop-encoded-array> 75 Value type: <prop-encoded-array> 84 Value type: <prop-encoded-array> 94 Value type: <prop-encoded-array> 102 Value type: <prop-encoded-array> 113 Value type: <prop-encoded-array> 123 Value type: <prop-encoded-array> [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | passphrase-encoding.pod | 22 This means that for an object that was encrypted using a pass phrase encoded in 23 ISO-8859-1, that object needs to be decrypted using a pass phrase encoded in 30 The standard stipulates that the pass phrase shall be encoded as an ASN.1 32 encoded in big endian (UCS-2 BE). 40 Treats the received pass phrase as UTF-8 encoded and tries to re-encode it to 47 Assumes that the pass phrase is encoded in ASCII or ISO-8859-1 and 64 A pass phrase encoded in ISO-8859-2 could very well have a sequence such as 67 be misinterpreted as the perfectly valid UTF-8 encoded code point U+00EF (LATIN 76 On the same accord, anything encoded in UTF-8 that was given to OpenSSL older 83 This API stipulates that pass phrases should be UTF-8 encoded, and that any [all …]
|
| /freebsd/crypto/openssl/crypto/slh_dsa/ |
| H A D | slh_dsa.c | 34 * @param msg The message to sign. This may be encoded beforehand. 141 * @param msg The message to verify. This may be encoded beforehand. 214 * SLH_DSA pure signatures are encoded as M' = 00 || ctx_len || ctx || msg 225 * @param out_len The size of the returned encoded buffer. 226 * @returns A buffer containing the encoded message. If the passed in 227 * |tmp| buffer is big enough to hold the encoded message then it returns |tmp| 235 uint8_t *encoded = NULL; in msg_encode() local 250 encoded = tmp; in msg_encode() 252 encoded = OPENSSL_zalloc(encoded_len); in msg_encode() 253 if (encoded in msg_encode() [all...] |
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_sign.c | 67 * initialized array containing the DER encoded DigestInfo for the specified 70 * |n| is last byte in the encoded OID for the digest. 292 const unsigned char *encoded = NULL; in RSA_sign() 299 /* Compute the encoded digest. */ in RSA_sign() 311 encoded = m; in RSA_sign() 315 encoded = tmps; in RSA_sign() 322 encrypt_len = RSA_private_encrypt((int)encoded_len, encoded, sigret, rsa, in RSA_sign() 350 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() 357 /* Recover the encoded digest. */ in ossl_rsa_verify() 435 /* Construct the encoded diges in ossl_rsa_verify() 293 const unsigned char *encoded = NULL; RSA_sign() local 351 unsigned char *decrypt_buf = NULL, *encoded = NULL; ossl_rsa_verify() local [all...] |
| /freebsd/crypto/krb5/src/kdc/ |
| H A D | ndr.c | 42 uint8_t *encoded; member 122 encoded_out->encoded = b.data; in enc_wchar_pointer() 277 k5_buf_add_len(&b, pt_encoded.encoded, pt_encoded.bytes_len); in ndr_enc_delegation_info() 293 k5_buf_add_len(&b, tss_encoded[i].encoded, tss_encoded[i].bytes_len); in ndr_enc_delegation_info() 312 free(pt_encoded.encoded); in ndr_enc_delegation_info() 314 free(tss_encoded[i].encoded); in ndr_enc_delegation_info()
|
| /freebsd/contrib/libder/libder/ |
| H A D | libder_private.h | 137 uint8_t encoded = type->tag_class << 6; in libder_type_simple() local 141 encoded |= BER_TYPE_CONSTRUCTED_MASK; in libder_type_simple() 143 encoded |= type->tag_short; in libder_type_simple() 144 return (encoded); in libder_type_simple()
|
| /freebsd/crypto/openssl/ssl/quic/ |
| H A D | quic_cfq.c | 18 unsigned char *encoded; member 38 return ex->encoded; in ossl_quic_cfq_item_get_encoded() 183 item->free_cb(item->encoded, item->encoded_len, item->free_cb_arg); in clear_item() 186 item->encoded = NULL; in clear_item() 236 const unsigned char *encoded, in ossl_quic_cfq_add_frame() 249 item->encoded = (unsigned char *)encoded; in ossl_quic_cfq_add_frame() 235 ossl_quic_cfq_add_frame(QUIC_CFQ * cfq,uint32_t priority,uint32_t pn_space,uint64_t frame_type,uint32_t flags,const unsigned char * encoded,size_t encoded_len,cfq_free_cb * free_cb,void * free_cb_arg) ossl_quic_cfq_add_frame() argument
|
| /freebsd/crypto/openssl/crypto/ml_dsa/ |
| H A D | ml_dsa_sign.c | 307 * ML_DSA pure signatures are encoded as M' = 00 || ctx_len || ctx || msg 320 * @param out_len The size of the returned encoded buffer. 321 * @returns A buffer containing the encoded message. If the passed in 322 * |tmp| buffer is big enough to hold the encoded message then it returns |tmp| 330 uint8_t *encoded = NULL; in msg_encode() 345 encoded = tmp; in msg_encode() 347 encoded = OPENSSL_malloc(encoded_len); in msg_encode() 348 if (encoded == NULL) in msg_encode() 351 encoded[0] = 0; in msg_encode() 352 encoded[ in msg_encode() 334 uint8_t *encoded = NULL; msg_encode() local [all...] |
| /freebsd/sys/contrib/device-tree/Bindings/phy/ |
| H A D | qcom,usb-8x16-phy.txt | 10 Value type: <prop-encoded-array> 15 Value type: <prop-encoded-array> 42 Value type: <prop-encoded-array> 52 Value type: <prop-encoded-array>
|
| /freebsd/sys/contrib/device-tree/Bindings/i2c/ |
| H A D | i2c-qcom-cci.txt | 17 Value type: <prop-encoded-array> 23 Value type: <prop-encoded-array> 30 Value type: <prop-encoded-array> 41 Value type: <prop-encoded-array>
|
| /freebsd/sys/contrib/device-tree/Bindings/powerpc/fsl/ |
| H A D | pamu.txt | 13 - ranges : <prop-encoded-array> 20 - interrupts : <prop-encoded-array> 31 - reg : <prop-encoded-array> 51 - reg : <prop-encoded-array> 58 : <prop-encoded-array> 64 : <prop-encoded-array> 83 - fsl,liodn-reg : <prop-encoded-array>
|
| /freebsd/sys/contrib/device-tree/Bindings/media/ |
| H A D | qcom,camss.txt | 14 Value type: <prop-encoded-array> 36 Value type: <prop-encoded-array> 54 Value type: <prop-encoded-array> 60 Value type: <prop-encoded-array> 115 Value type: <prop-encoded-array> 141 Value type: <prop-encoded-array>
|