/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/test/jdk/sun/security/pkcs/pkcs8/ |
H A D | PKCS8Test.java | 216 PKCS8Key decodedKey = PKCS8Key.parse(new DerValue(encodedKey)); in main() local 218 String alg = decodedKey.getAlgorithm(); in main() 219 AlgorithmId algId = decodedKey.getAlgorithmId(); in main() 230 decodedKey.encode(derOutput); in main() 236 dumpByteArray("byte[] encoding: ", decodedKey.getEncoded()); in main() 237 if (!Arrays.equals(decodedKey.getEncoded(), expectedBytes)) { in main() 239 new String(decodedKey.getEncoded())); in main() 242 if (!FORMAT.equals(decodedKey.getFormat())) { in main() 243 raiseException(FORMAT, decodedKey.getFormat()); in main()
|
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/test/jdk/sun/security/pkcs/pkcs8/ |
H A D | PKCS8Test.java | 216 PKCS8Key decodedKey = PKCS8Key.parse(new DerValue(encodedKey)); in main() local 218 String alg = decodedKey.getAlgorithm(); in main() 219 AlgorithmId algId = decodedKey.getAlgorithmId(); in main() 230 decodedKey.encode(derOutput); in main() 236 dumpByteArray("byte[] encoding: ", decodedKey.getEncoded()); in main() 237 if (!Arrays.equals(decodedKey.getEncoded(), expectedBytes)) { in main() 239 new String(decodedKey.getEncoded())); in main() 242 if (!FORMAT.equals(decodedKey.getFormat())) { in main() 243 raiseException(FORMAT, decodedKey.getFormat()); in main()
|
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/test/jdk/sun/security/pkcs/pkcs8/ |
H A D | PKCS8Test.java | 216 PKCS8Key decodedKey = PKCS8Key.parse(new DerValue(encodedKey)); in main() local 218 String alg = decodedKey.getAlgorithm(); in main() 219 AlgorithmId algId = decodedKey.getAlgorithmId(); in main() 230 decodedKey.encode(derOutput); in main() 236 dumpByteArray("byte[] encoding: ", decodedKey.getEncoded()); in main() 237 if (!Arrays.equals(decodedKey.getEncoded(), expectedBytes)) { in main() 239 new String(decodedKey.getEncoded())); in main() 242 if (!FORMAT.equals(decodedKey.getFormat())) { in main() 243 raiseException(FORMAT, decodedKey.getFormat()); in main()
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/test/jdk/sun/security/pkcs/pkcs8/ |
H A D | PKCS8Test.java | 216 PKCS8Key decodedKey = PKCS8Key.parse(new DerValue(encodedKey)); in main() local 218 String alg = decodedKey.getAlgorithm(); in main() 219 AlgorithmId algId = decodedKey.getAlgorithmId(); in main() 230 decodedKey.encode(derOutput); in main() 236 dumpByteArray("byte[] encoding: ", decodedKey.getEncoded()); in main() 237 if (!Arrays.equals(decodedKey.getEncoded(), expectedBytes)) { in main() 239 new String(decodedKey.getEncoded())); in main() 242 if (!FORMAT.equals(decodedKey.getFormat())) { in main() 243 raiseException(FORMAT, decodedKey.getFormat()); in main()
|
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/test/jdk/sun/security/pkcs/pkcs8/ |
H A D | PKCS8Test.java | 216 PKCS8Key decodedKey = PKCS8Key.parse(new DerValue(encodedKey)); in main() local 218 String alg = decodedKey.getAlgorithm(); in main() 219 AlgorithmId algId = decodedKey.getAlgorithmId(); in main() 230 decodedKey.encode(derOutput); in main() 236 dumpByteArray("byte[] encoding: ", decodedKey.getEncoded()); in main() 237 if (!Arrays.equals(decodedKey.getEncoded(), expectedBytes)) { in main() 239 new String(decodedKey.getEncoded())); in main() 242 if (!FORMAT.equals(decodedKey.getFormat())) { in main() 243 raiseException(FORMAT, decodedKey.getFormat()); in main()
|
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/test/sun/security/pkcs/pkcs8/ |
H A D | PKCS8Test.java | 212 PKCS8Key decodedKey = PKCS8Key.parse(new DerValue(encodedKey)); in main() local 214 String alg = decodedKey.getAlgorithm(); in main() 215 AlgorithmId algId = decodedKey.getAlgorithmId(); in main() 226 decodedKey.encode(derOutput); in main() 232 dumpByteArray("byte[] encoding: ", decodedKey.getEncoded()); in main() 233 if (!Arrays.equals(decodedKey.getEncoded(), expectedBytes)) { in main() 235 new String(decodedKey.getEncoded())); in main() 238 if (!FORMAT.equals(decodedKey.getFormat())) { in main() 239 raiseException(FORMAT, decodedKey.getFormat()); in main()
|
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/jdk/test/sun/security/pkcs/pkcs8/ |
H A D | PKCS8Test.java | 212 PKCS8Key decodedKey = PKCS8Key.parse(new DerValue(encodedKey)); in main() local 214 String alg = decodedKey.getAlgorithm(); in main() 215 AlgorithmId algId = decodedKey.getAlgorithmId(); in main() 226 decodedKey.encode(derOutput); in main() 232 dumpByteArray("byte[] encoding: ", decodedKey.getEncoded()); in main() 233 if (!Arrays.equals(decodedKey.getEncoded(), expectedBytes)) { in main() 235 new String(decodedKey.getEncoded())); in main() 238 if (!FORMAT.equals(decodedKey.getFormat())) { in main() 239 raiseException(FORMAT, decodedKey.getFormat()); in main()
|
/dports/security/vault/vault-1.8.2/vendor/github.com/snowflakedb/gosnowflake/ |
H A D | encrypt_util.go | 59 decodedKey, _ := base64.StdEncoding.DecodeString(sfe.QueryStageMasterKey) 60 keySize := len(decodedKey) 97 if err = encryptECB(encryptedFileKey, fileKey, decodedKey); err != nil { 114 func encryptECB(encrypted []byte, fileKey []byte, decodedKey []byte) error { 115 block, _ := aes.NewCipher(decodedKey) 130 func decryptECB(decrypted []byte, keyBytes []byte, decodedKey []byte) error { 131 block, _ := aes.NewCipher(decodedKey) 177 decodedKey, _ := base64.StdEncoding.DecodeString(sfe.QueryStageMasterKey) 183 if err := decryptECB(decryptedKey, keyBytes, decodedKey); err != nil {
|
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/test/jdk/sun/security/pkcs/pkcs8/ |
H A D | PKCS8Test.java | 75 PKCS8Key decodedKey = (PKCS8Key)PKCS8Key.parseKey( in test() local 78 Assert.assertEquals(decodedKey.getAlgorithm(), ALGORITHM); in test() 79 Assert.assertEquals(decodedKey.getFormat(), FORMAT); in test() 80 Assert.assertEquals(decodedKey.getAlgorithmId().toString(), in test() 83 byte[] encodedOutput = decodedKey.getEncoded(); in test()
|
/dports/java/openjdk16/jdk16u-jdk-16.0.2-7-1/test/jdk/sun/security/pkcs/pkcs8/ |
H A D | PKCS8Test.java | 75 PKCS8Key decodedKey = (PKCS8Key)PKCS8Key.parseKey( in test() local 78 Assert.assertEquals(decodedKey.getAlgorithm(), ALGORITHM); in test() 79 Assert.assertEquals(decodedKey.getFormat(), FORMAT); in test() 80 Assert.assertEquals(decodedKey.getAlgorithmId().toString(), in test() 83 byte[] encodedOutput = decodedKey.getEncoded(); in test()
|
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/test/jdk/sun/security/pkcs/pkcs8/ |
H A D | PKCS8Test.java | 79 PKCS8Key decodedKey = (PKCS8Key)PKCS8Key.parseKey(encodedKey); in test() local 81 Assert.assertEquals(decodedKey.getAlgorithm(), ALGORITHM); in test() 82 Assert.assertEquals(decodedKey.getFormat(), FORMAT); in test() 83 Assert.assertEquals(decodedKey.getAlgorithmId().toString(), in test() 86 byte[] encodedOutput = decodedKey.getEncoded(); in test()
|
/dports/security/cryptopp/cryptopp-8.6.0/ |
H A D | fipstest.cpp | 100 std::string decodedKey, decodedSeed, decodedDeterministicTimeVector; in X917RNG_KnownAnswerTest() local 101 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in X917RNG_KnownAnswerTest() 106 …rng.Reseed((const byte *)decodedKey.data(), decodedKey.size(), (const byte *)decodedSeed.data(), (… in X917RNG_KnownAnswerTest() 138 std::string decodedKey; in SymmetricEncryptionKnownAnswerTest() local 139 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in SymmetricEncryptionKnownAnswerTest() 141 typename CIPHER::Encryption encryption((const byte *)decodedKey.data(), decodedKey.size()); in SymmetricEncryptionKnownAnswerTest() 142 typename CIPHER::Decryption decryption((const byte *)decodedKey.data(), decodedKey.size()); in SymmetricEncryptionKnownAnswerTest() 179 std::string decodedKey; in MAC_KnownAnswerTest() local 180 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in MAC_KnownAnswerTest() 182 MAC mac((const byte *)decodedKey.data(), decodedKey.size()); in MAC_KnownAnswerTest()
|
/dports/net-p2p/qtum/qtum-mainnet-fastlane-v0.20.3/src/cryptopp/ |
H A D | fipstest.cpp | 99 std::string decodedKey, decodedSeed, decodedDeterministicTimeVector; in X917RNG_KnownAnswerTest() local 100 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in X917RNG_KnownAnswerTest() 105 …rng.Reseed((const byte *)decodedKey.data(), decodedKey.size(), (const byte *)decodedSeed.data(), (… in X917RNG_KnownAnswerTest() 137 std::string decodedKey; in SymmetricEncryptionKnownAnswerTest() local 138 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in SymmetricEncryptionKnownAnswerTest() 140 typename CIPHER::Encryption encryption((const byte *)decodedKey.data(), decodedKey.size()); in SymmetricEncryptionKnownAnswerTest() 141 typename CIPHER::Decryption decryption((const byte *)decodedKey.data(), decodedKey.size()); in SymmetricEncryptionKnownAnswerTest() 178 std::string decodedKey; in MAC_KnownAnswerTest() local 179 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in MAC_KnownAnswerTest() 181 MAC mac((const byte *)decodedKey.data(), decodedKey.size()); in MAC_KnownAnswerTest()
|
/dports/emulators/citra-qt5/citra-ac98458e0/externals/cryptopp/cryptopp/ |
H A D | fipstest.cpp | 100 std::string decodedKey, decodedSeed, decodedDeterministicTimeVector; in X917RNG_KnownAnswerTest() local 101 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in X917RNG_KnownAnswerTest() 106 …rng.Reseed((const byte *)decodedKey.data(), decodedKey.size(), (const byte *)decodedSeed.data(), (… in X917RNG_KnownAnswerTest() 138 std::string decodedKey; in SymmetricEncryptionKnownAnswerTest() local 139 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in SymmetricEncryptionKnownAnswerTest() 141 typename CIPHER::Encryption encryption((const byte *)decodedKey.data(), decodedKey.size()); in SymmetricEncryptionKnownAnswerTest() 142 typename CIPHER::Decryption decryption((const byte *)decodedKey.data(), decodedKey.size()); in SymmetricEncryptionKnownAnswerTest() 179 std::string decodedKey; in MAC_KnownAnswerTest() local 180 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in MAC_KnownAnswerTest() 182 MAC mac((const byte *)decodedKey.data(), decodedKey.size()); in MAC_KnownAnswerTest()
|
/dports/emulators/citra/citra-ac98458e0/externals/cryptopp/cryptopp/ |
H A D | fipstest.cpp | 100 std::string decodedKey, decodedSeed, decodedDeterministicTimeVector; in X917RNG_KnownAnswerTest() local 101 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in X917RNG_KnownAnswerTest() 106 …rng.Reseed((const byte *)decodedKey.data(), decodedKey.size(), (const byte *)decodedSeed.data(), (… in X917RNG_KnownAnswerTest() 138 std::string decodedKey; in SymmetricEncryptionKnownAnswerTest() local 139 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in SymmetricEncryptionKnownAnswerTest() 141 typename CIPHER::Encryption encryption((const byte *)decodedKey.data(), decodedKey.size()); in SymmetricEncryptionKnownAnswerTest() 142 typename CIPHER::Decryption decryption((const byte *)decodedKey.data(), decodedKey.size()); in SymmetricEncryptionKnownAnswerTest() 179 std::string decodedKey; in MAC_KnownAnswerTest() local 180 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in MAC_KnownAnswerTest() 182 MAC mac((const byte *)decodedKey.data(), decodedKey.size()); in MAC_KnownAnswerTest()
|
/dports/sysutils/fusefs-securefs/securefs-0.12.0/external/cryptopp/ |
H A D | fipstest.cpp | 100 std::string decodedKey, decodedSeed, decodedDeterministicTimeVector; in X917RNG_KnownAnswerTest() local 101 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in X917RNG_KnownAnswerTest() 106 …rng.Reseed((const byte *)decodedKey.data(), decodedKey.size(), (const byte *)decodedSeed.data(), (… in X917RNG_KnownAnswerTest() 138 std::string decodedKey; in SymmetricEncryptionKnownAnswerTest() local 139 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in SymmetricEncryptionKnownAnswerTest() 141 typename CIPHER::Encryption encryption((const byte *)decodedKey.data(), decodedKey.size()); in SymmetricEncryptionKnownAnswerTest() 142 typename CIPHER::Decryption decryption((const byte *)decodedKey.data(), decodedKey.size()); in SymmetricEncryptionKnownAnswerTest() 179 std::string decodedKey; in MAC_KnownAnswerTest() local 180 StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); in MAC_KnownAnswerTest() 182 MAC mac((const byte *)decodedKey.data(), decodedKey.size()); in MAC_KnownAnswerTest()
|
/dports/www/ilias/ILIAS-5.4.25/libs/composer/vendor/guzzlehttp/psr7/src/ |
H A D | Uri.php | 309 $decodedKey = rawurldecode($key); 310 $result = array_filter(explode('&', $current), function ($part) use ($decodedKey) { 311 return rawurldecode(explode('=', $part)[0]) !== $decodedKey; 339 $decodedKey = rawurldecode($key); 340 $result = array_filter(explode('&', $current), function ($part) use ($decodedKey) { 341 return rawurldecode(explode('=', $part)[0]) !== $decodedKey;
|
/dports/www/thirtybees/thirtybees-1.1.0/modules/tbupdater/classes/GuzzleHttp/Psr7/ |
H A D | Uri.php | 320 $decodedKey = rawurldecode($key); 321 $result = array_filter(explode('&', $current), function ($part) use ($decodedKey) { 322 return rawurldecode(explode('=', $part)[0]) !== $decodedKey; 350 $decodedKey = rawurldecode($key); 351 $result = array_filter(explode('&', $current), function ($part) use ($decodedKey) { 352 return rawurldecode(explode('=', $part)[0]) !== $decodedKey;
|
/dports/www/pomerium/pomerium-0.8.3/internal/cryptutil/ |
H A D | certificates.go | 20 decodedKey, err := base64.StdEncoding.DecodeString(key) 22 return nil, fmt.Errorf("failed to decode certificate key %v: %w", decodedKey, err) 24 x509, err := tls.X509KeyPair(decodedCert, decodedKey)
|
/dports/sysutils/kubectl/kubernetes-1.22.2/cmd/kubeadm/app/phases/copycerts/ |
H A D | copycerts_test.go | 53 decodedKey, err := hex.DecodeString(key) 69 secretData, err := getDataFromDisk(cfg, decodedKey) 80 decryptedData, err := cryptoutil.DecryptBytes(data, decodedKey) 267 decodedKey, err := hex.DecodeString(secretKey) 271 secretData, err := getDataFromDisk(cfg, decodedKey)
|
H A D | copycerts.go | 92 decodedKey, err := hex.DecodeString(key) 101 secretData, err := getDataFromDisk(cfg, decodedKey) 223 decodedKey, err := hex.DecodeString(key) 233 secretData, err := getDataFromSecret(secret, decodedKey)
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/grpc-ecosystem/go-grpc-middleware/tracing/opentracing/ |
H A D | metadata.go | 34 if decodedKey, decodedVal, err := metadata.DecodeKeyValue(k, v); err == nil { 35 if err = callback(decodedKey, decodedVal); err != nil {
|
/dports/devel/etcd33/etcd-3.3.23/vendor/github.com/grpc-ecosystem/go-grpc-middleware/go-grpc-middleware-1.0.0/tracing/opentracing/ |
H A D | metadata.go | 35 if decodedKey, decodedVal, err := metadata.DecodeKeyValue(k, v); err == nil { 36 if err = callback(decodedKey, decodedVal); err != nil {
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/grpc-ecosystem/go-grpc-middleware/tracing/opentracing/ |
H A D | metadata.go | 35 if decodedKey, decodedVal, err := metadata.DecodeKeyValue(k, v); err == nil { 36 if err = callback(decodedKey, decodedVal); err != nil {
|
/dports/math/vtk6/VTK-6.2.0/ThirdParty/Twisted/twisted/conch/ssh/ |
H A D | keys.py | 259 decodedKey = berDecoder.decode(keyData)[0] 264 if len(decodedKey) == 2: # alternate RSA key 265 decodedKey = decodedKey[0] 266 if len(decodedKey) < 6: 269 n, e, d, p, q = [long(value) for value in decodedKey[1:6]] 274 p, q, g, y, x = [long(value) for value in decodedKey[1: 6]] 275 if len(decodedKey) < 6:
|