/freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/ |
H A D | argon2.c | 89 const size_t hashlen, char *encoded, const size_t encodedlen, in argon2_hash() argument 143 if (encoded && encodedlen) { in argon2_hash() 144 if (encode_string(encoded, encodedlen, &context, type) != ARGON2_OK) { in argon2_hash() 146 sodium_memzero(encoded, encodedlen); in argon2_hash() 162 const size_t saltlen, const size_t hashlen, char *encoded, in argon2i_hash_encoded() argument 166 NULL, hashlen, encoded, encodedlen, Argon2_i); in argon2i_hash_encoded() 183 const size_t saltlen, const size_t hashlen, char *encoded, in argon2id_hash_encoded() argument 187 NULL, hashlen, encoded, encodedlen, Argon2_id); in argon2id_hash_encoded() 201 argon2_verify(const char *encoded, const void *pwd, const size_t pwdlen, in argon2_verify() argument 218 encoded_len = strlen(encoded); in argon2_verify() [all …]
|
H A D | argon2.h | 216 char *encoded, const size_t encodedlen); 237 char *encoded, const size_t encodedlen); 281 void *hash, const size_t hashlen, char *encoded, 291 int argon2i_verify(const char *encoded, const void *pwd, const size_t pwdlen); 300 int argon2id_verify(const char *encoded, const void *pwd, const size_t pwdlen); 303 int argon2_verify(const char *encoded, const void *pwd, const size_t pwdlen,
|
/freebsd/crypto/openssh/ |
H A D | ssh-ed25519-sk.c | 131 struct sshbuf *encoded = NULL; in ssh_ed25519_sk_verify() local 203 if ((encoded = sshbuf_new()) == NULL) { in ssh_ed25519_sk_verify() 207 if (sshbuf_put(encoded, sigblob, len) != 0 || in ssh_ed25519_sk_verify() 208 sshbuf_put(encoded, apphash, sizeof(apphash)) != 0 || in ssh_ed25519_sk_verify() 209 sshbuf_put_u8(encoded, sig_flags) != 0 || in ssh_ed25519_sk_verify() 210 sshbuf_put_u32(encoded, sig_counter) != 0 || in ssh_ed25519_sk_verify() 211 sshbuf_put(encoded, msghash, sizeof(msghash)) != 0) { in ssh_ed25519_sk_verify() 217 sshbuf_dump(encoded, stderr); in ssh_ed25519_sk_verify() 219 sm = sshbuf_ptr(encoded); in ssh_ed25519_sk_verify() 220 smlen = sshbuf_len(encoded); in ssh_ed25519_sk_verify() [all …]
|
H A D | sshkey-xmss.c | 893 struct sshbuf *encrypted = NULL, *encoded = NULL, *padded = NULL; in sshkey_xmss_encrypt_state() local 920 (encoded = sshbuf_new()) == NULL || in sshkey_xmss_encrypt_state() 931 if ((r = sshbuf_put(encoded, XMSS_MAGIC, sizeof(XMSS_MAGIC))) != 0 || in sshkey_xmss_encrypt_state() 932 (r = sshbuf_put_u32(encoded, state->idx)) != 0) in sshkey_xmss_encrypt_state() 946 if ((r = sshbuf_put_u32(encoded, encrypted_len)) != 0) in sshkey_xmss_encrypt_state() 948 aadlen = sshbuf_len(encoded); in sshkey_xmss_encrypt_state() 951 if ((r = sshbuf_putb(encoded, padded)) != 0) in sshkey_xmss_encrypt_state() 960 (r = cipher_crypt(ciphercontext, 0, cp, sshbuf_ptr(encoded), in sshkey_xmss_encrypt_state() 972 sshbuf_free(encoded); in sshkey_xmss_encrypt_state() 980 sshkey_xmss_decrypt_state(const struct sshkey *k, struct sshbuf *encoded, in sshkey_xmss_decrypt_state() argument [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | pemtest.c | 19 const char *encoded; member 41 const char *encoded = b64_pem_data[idx].encoded; in test_b64() local 45 || !TEST_true(BIO_printf(b, "%s\n", encoded)) in test_b64() 69 const char *encoded = b64_pem_data[0].encoded; in test_invalid() local 73 || !TEST_true(BIO_printf(b, "%c%s\n", '\t', encoded)) in test_invalid()
|
H A D | endecode_test.c | 131 void **encoded, long *encoded_len, 136 void **object, void *encoded, long encoded_len, 158 void *encoded = NULL; in test_encode_decode() local 171 if (!TEST_true(encode_cb(file, line, &encoded, &encoded_len, pkey, selection, in test_encode_decode() 176 if (TEST_false(decode_cb(file, line, (void **)&pkey2, encoded, in test_encode_decode() 184 if (!TEST_true(check_cb(file, line, type, encoded, encoded_len)) in test_encode_decode() 185 || !TEST_true(decode_cb(file, line, (void **)&pkey2, encoded, encoded_len, in test_encode_decode() 191 && !TEST_true(decode_cb(file, line, (void **)&pkey3, encoded, encoded_len, in test_encode_decode() 217 && !test_cb(file, line, encoded, encoded_len, encoded2, encoded2_len)) in test_encode_decode() 223 if (encoded != NULL && encoded_len != 0) in test_encode_decode() [all …]
|
H A D | punycode_test.c | 20 const char *encoded; member 154 if (!TEST_true(ossl_punycode_decode(tc->encoded, strlen(tc->encoded), in test_punycode()
|
/freebsd/crypto/heimdal/lib/wind/ |
H A D | idn-lookup.c | 65 char encoded[1024]; in lookup() local 89 ep = encoded; in lookup() 96 len = sizeof(encoded) - (ep - encoded); in lookup() 108 printf("Converted \"%s\" into \"%s\"\n", name, encoded); in lookup() 112 ret = getaddrinfo(encoded, NULL, &hints, &ai); in lookup()
|
/freebsd/sys/contrib/openzfs/module/icp/algs/modes/ |
H A D | ccm.c | 703 encode_adata_len(ulong_t auth_data_len, uint8_t *encoded, size_t *encoded_len) in encode_adata_len() argument 715 encoded[0] = (auth_data_len & 0xff00) >> 8; in encode_adata_len() 716 encoded[1] = auth_data_len & 0xff; in encode_adata_len() 722 encoded[0] = 0xff; in encode_adata_len() 723 encoded[1] = 0xfe; in encode_adata_len() 725 lencoded_ptr = (uint32_t *)&encoded[2]; in encode_adata_len() 728 encoded[2] = (auth_data_len & 0xff000000) >> 24; in encode_adata_len() 729 encoded[3] = (auth_data_len & 0xff0000) >> 16; in encode_adata_len() 730 encoded[4] = (auth_data_len & 0xff00) >> 8; in encode_adata_len() 731 encoded[5] = auth_data_len & 0xff; in encode_adata_len() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_set1_encoded_public_key.pod | 37 The format for the encoded public key will depend on the algorithm in use. For 38 DH it should be encoded as a positive integer in big-endian form. For EC is 40 Curve Cryptography") standard. For X25519 and X448 it should be encoded in a 43 The key to be updated is supplied in B<pkey>. The buffer containing the encoded 47 the encoded public key is returned to the application. The key containing the 48 public key data is supplied in B<pkey>. A buffer containing the encoded key will 49 be allocated and stored in B<*ppub>. The length of the encoded public key is 67 EVP_PKEY_get1_encoded_public_key() returns the length of the encoded key or 0 for failure. 96 =head2 Get an encoded public key to send to a peer 110 * Send the encoded public key stored in the buffer at "pubkey" and of
|
H A D | d2i_RSAPrivateKey.pod | 130 B<d2i_I<TYPE>PrivateKey>() and derivates thereof decode DER encoded 133 B<d2i_I<TYPE>PublicKey>() and derivates thereof decode DER encoded 136 B<d2i_I<TYPE>params>() and derivates thereof decode DER encoded B<I<TYPE>> 139 B<d2i_I<TYPE>_PUBKEY>() and derivates thereof decode DER encoded B<I<TYPE>> 143 B<I<TYPE>> data into a type specific DER encoded structure. 146 B<I<TYPE>> data into a type specific DER encoded structure. 149 parameters data into a type specific DER encoded structure. 152 B<I<TYPE>> data into a DER encoded B<SubjectPublicKeyInfo> structure. 156 Similarly, i2d_RSAPrivateKey() and i2d_RSAPublicKey() produce DER encoded 181 A caveat is that L<i2d_PrivateKey(3)> may output a DER encoded PKCS#8 [all …]
|
H A D | EC_KEY_get_enc_flags.pod | 22 When reading a private key encoded without an associated public key (e.g. if 24 the missing public key automatically. Private keys encoded without parameters 33 the curve are not encoded along with the private key. If EC_PKEY_NO_PUBKEY is 34 set then the public key is not encoded along with the private key.
|
H A D | BIO_f_base64.pod | 34 used to signal that no more data is to be encoded: this is used 44 Because of the format of base64 encoding the end of the encoded 67 Read Base64 encoded data from standard input and write the decoded 90 The ambiguity of EOF in base64 encoded data can cause additional 91 data following the base64 encoded block to be misinterpreted.
|
/freebsd/sys/contrib/device-tree/Bindings/soundwire/ |
H A D | qcom,sdw.txt | 18 Value type: <prop-encoded-array> 24 Value type: <prop-encoded-array> 46 Value type: <prop-encoded-array> 66 Value type: <prop-encoded-array> 75 Value type: <prop-encoded-array> 84 Value type: <prop-encoded-array> 94 Value type: <prop-encoded-array> 102 Value type: <prop-encoded-array> 113 Value type: <prop-encoded-array> 123 Value type: <prop-encoded-array> [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 22 This means that for an object that was encrypted using a pass phrase encoded in 23 ISO-8859-1, that object needs to be decrypted using a pass phrase encoded in 30 The standard stipulates that the pass phrase shall be encoded as an ASN.1 32 encoded in big endian (UCS-2 BE). 40 Treats the received pass phrase as UTF-8 encoded and tries to re-encode it to 47 Assumes that the pass phrase is encoded in ASCII or ISO-8859-1 and 64 A pass phrase encoded in ISO-8859-2 could very well have a sequence such as 67 be misinterpreted as the perfectly valid UTF-8 encoded code point U+00EF (LATIN 76 On the same accord, anything encoded in UTF-8 that was given to OpenSSL older 83 This API stipulates that pass phrases should be UTF-8 encoded, and that any [all …]
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 279 const unsigned char *encoded = NULL; in RSA_sign() local 298 encoded = m; in RSA_sign() 302 encoded = tmps; in RSA_sign() 309 encrypt_len = RSA_private_encrypt((int)encoded_len, encoded, sigret, rsa, in RSA_sign() 337 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local 425 if (!encode_pkcs1(&encoded, &encoded_len, type, m, m_len)) in ossl_rsa_verify() 429 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in ossl_rsa_verify() 444 OPENSSL_clear_free(encoded, encoded_len); in ossl_rsa_verify()
|
/freebsd/contrib/libder/libder/ |
H A D | libder_private.h | 137 uint8_t encoded = type->tag_class << 6; in libder_type_simple() local 141 encoded |= BER_TYPE_CONSTRUCTED_MASK; in libder_type_simple() 143 encoded |= type->tag_short; in libder_type_simple() 144 return (encoded); in libder_type_simple()
|
/freebsd/sys/contrib/device-tree/Bindings/phy/ |
H A D | qcom,usb-8x16-phy.txt | 10 Value type: <prop-encoded-array> 15 Value type: <prop-encoded-array> 42 Value type: <prop-encoded-array> 52 Value type: <prop-encoded-array>
|
H A D | qcom,usb-hsic-phy.txt | 21 Value type: <prop-encoded-array> 37 Value type: <prop-encoded-array> 43 Value type: <prop-encoded-array>
|
/freebsd/sys/contrib/device-tree/Bindings/i2c/ |
H A D | i2c-qcom-cci.txt | 17 Value type: <prop-encoded-array> 23 Value type: <prop-encoded-array> 30 Value type: <prop-encoded-array> 41 Value type: <prop-encoded-array>
|
/freebsd/sys/contrib/device-tree/Bindings/powerpc/fsl/ |
H A D | pamu.txt | 13 - ranges : <prop-encoded-array> 20 - interrupts : <prop-encoded-array> 31 - reg : <prop-encoded-array> 51 - reg : <prop-encoded-array> 58 : <prop-encoded-array> 64 : <prop-encoded-array> 83 - fsl,liodn-reg : <prop-encoded-array>
|
H A D | dcsr.txt | 42 Value type: <prop-encoded-array> 89 Value type: <prop-encoded-array> 118 Value type: <prop-encoded-array> 155 Value type: <prop-encoded-array> 180 Value type: <prop-encoded-array> 217 Value type: <prop-encoded-array> 245 Value type: <prop-encoded-array> 276 Value type: <prop-encoded-array> 305 Value type: <prop-encoded-array> 335 Value type: <prop-encoded [all...] |
/freebsd/sys/contrib/device-tree/Bindings/media/ |
H A D | qcom,camss.txt | 14 Value type: <prop-encoded-array> 36 Value type: <prop-encoded-array> 54 Value type: <prop-encoded-array> 60 Value type: <prop-encoded-array> 115 Value type: <prop-encoded-array> 141 Value type: <prop-encoded-array>
|
/freebsd/sys/contrib/device-tree/Bindings/mfd/ |
H A D | qcom-pm8xxx.txt | 28 Value type: <prop-encoded-array> 40 encoded as follows: 70 Value type: <prop-encoded-array> 75 Value type: <prop-encoded-array>
|
/freebsd/sys/contrib/device-tree/Bindings/soc/qcom/ |
H A D | qcom,smem.txt | 14 Value type: <prop-encoded-array> 19 Value type: <prop-encoded-array> 24 Value type: <prop-encoded-array>
|