/dports/security/p5-Authen-Simple/Authen-Simple-0.5/lib/Authen/Simple/ |
H A D | Password.pm | 15 return 1 if $password eq $encrypted; 25 return 1 if crypt( $password, $encrypted ) eq $encrypted; 28 if ( $encrypted =~ /^\$(\w+)\$/ ) { 38 if ( length($encrypted) == 16 ) { 42 if ( length($encrypted) == 22 ) { 46 if ( length($encrypted) == 32 ) { 51 if ( length($encrypted) == 20 ) { 55 if ( length($encrypted) == 27 ) { 59 if ( length($encrypted) == 40 ) { 121 return 1 if Crypt::PasswdMD5::unix_md5_crypt( $password, $encrypted ) eq $encrypted; [all …]
|
/dports/security/seal/SEAL-3.7.2/dotnet/src/ |
H A D | Evaluator.cs | 102 Negate(encrypted, destination: encrypted); in NegateInplace() 314 Square(encrypted, destination: encrypted, pool: pool); in SquareInplace() 370 Relinearize(encrypted, relinKeys, destination: encrypted, pool: pool); in RelinearizeInplace() 463 ModSwitchToNext(encrypted, destination: encrypted, pool: pool); in ModSwitchToNextInplace() 525 ModSwitchTo(encrypted, parmsId, destination: encrypted, pool: pool); in ModSwitchToInplace() 660 RescaleToNext(encrypted, destination: encrypted, pool: pool); in RescaleToNextInplace() 686 RescaleTo(encrypted, parmsId, destination: encrypted, pool: pool); in RescaleToInplace() 861 AddPlain(encrypted, plain, destination: encrypted); in AddPlainInplace() 905 SubPlain(encrypted, plain, destination: encrypted); in SubPlainInplace() 956 MultiplyPlain(encrypted, plain, destination: encrypted, pool: pool); in MultiplyPlainInplace() [all …]
|
/dports/security/seal/SEAL-3.7.2/native/src/seal/ |
H A D | evaluator.h | 104 destination = encrypted; in negate() 281 destination = encrypted; 329 destination = encrypted; 368 mod_switch_to_next(encrypted, encrypted, std::move(pool)); 451 destination = encrypted; 526 rescale_to_next(encrypted, encrypted, std::move(pool)); 572 destination = encrypted; 651 destination = encrypted; 682 destination = encrypted; in add_plain() 712 destination = encrypted; in sub_plain() [all …]
|
H A D | evaluator.cpp | 62 if (!is_metadata_valid_for(encrypted, context_) || !is_buffer_valid(encrypted)) in negate_inplace() 74 negate_poly_coeffmod(encrypted, encrypted_size, coeff_modulus, encrypted); in negate_inplace() 599 if (!is_metadata_valid_for(encrypted, context_) || !is_buffer_valid(encrypted)) in square_inplace() 655 bfv_multiply(encrypted, encrypted, move(pool)); in bfv_square() 797 ckks_multiply(encrypted, encrypted, move(pool)); in ckks_square() 801 double new_scale = encrypted.scale() * encrypted.scale(); in ckks_square() 1069 if (!is_metadata_valid_for(encrypted, context_) || !is_buffer_valid(encrypted)) in mod_switch_to_next() 1163 if (!is_metadata_valid_for(encrypted, context_) || !is_buffer_valid(encrypted)) in rescale_to_next() 1234 mod_switch_scale_to_next(encrypted, encrypted, pool); in rescale_to_inplace() 1386 if (encrypted.is_ntt_form() && (encrypted.parms_id() != plain.parms_id())) in add_plain_inplace() [all …]
|
/dports/security/certmgr/certmgr-3.0.3/vendor/github.com/cloudflare/cfssl/cfssl-2001f384ec4f/vendor/github.com/cloudflare/redoctober/cryptor/ |
H A D | cryptor.go | 209 mac.Write(encrypted.IV) 210 mac.Write(encrypted.Data) 245 mac.Write(encrypted.Data) 253 return json.Unmarshal(encrypted.Data, encrypted) 308 encrypted.KeySet = append(encrypted.KeySet, MultiWrappedKey{ 328 encrypted.KeySet = append(encrypted.KeySet, out) 372 encrypted.KeySet = append(encrypted.KeySet, out) 538 encrypted.Signature = encrypted.computeHmac(hmacKey) 539 encrypted.lock(hmacKey) 555 if encrypted.Version != DEFAULT_VERSION && encrypted.Version != -1 { [all …]
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/lib/gitlab/ |
H A D | encrypted_command_base.rb | 15 encrypted = encrypted_secrets 16 return unless validate_config(encrypted) 19 encrypted.write(contents) 29 encrypted = encrypted_secrets 30 return unless validate_config(encrypted) 38 …temp_file = Tempfile.new(File.basename(encrypted.content_path), File.dirname(encrypted.content_pat… 41 encrypted.change do |contents| 62 encrypted = encrypted_secrets 63 return unless validate_config(encrypted) 70 def validate_config(encrypted) argument [all …]
|
/dports/security/seal/SEAL-3.7.2/native/tests/seal/ |
H A D | encryptor.cpp | 37 Ciphertext encrypted; in TEST() local 117 Ciphertext encrypted; in TEST() local 198 Ciphertext encrypted; in TEST() local 279 Ciphertext encrypted; in TEST() local 309 Ciphertext encrypted; in TEST() local 582 Ciphertext encrypted; in TEST() local 620 Ciphertext encrypted; in TEST() local 658 Ciphertext encrypted; in TEST() local 707 Ciphertext encrypted; in TEST() local 756 Ciphertext encrypted; in TEST() local [all …]
|
H A D | evaluator.cpp | 40 Ciphertext encrypted; in TEST() local 201 Ciphertext encrypted; in TEST() local 211 evaluator.add_inplace(encrypted, encrypted); in TEST() 1571 evaluator.multiply_inplace(encrypted, encrypted); in TEST() 2184 evaluator.multiply_inplace(encrypted, encrypted); in TEST() 2242 evaluator.multiply_inplace(encrypted, encrypted); in TEST() 2300 evaluator.multiply_inplace(encrypted, encrypted); in TEST() 3433 Ciphertext encrypted; in TEST() local 3617 Ciphertext encrypted; in TEST() local 3841 Ciphertext encrypted; in TEST() local [all …]
|
/dports/databases/p5-Rose-DB-Object/Rose-DB-Object-0.814/lib/Rose/DB/Object/MakeMethods/ |
H A D | Pg.pm | 52 return $self->{$encrypted} = shift; 77 $self->{$encrypted} = $default; 87 return $self->{$encrypted}; 93 $methods{$encrypted} = sub 104 return $self->{$encrypted} = shift; 122 $self->{$encrypted} = $default; 132 return $self->{$encrypted}; 146 my $crypted = $self->{$encrypted}; 197 $self->{$encrypted} = $default; 207 return $self->{$encrypted}; [all …]
|
/dports/www/h2o-devel/h2o-dcc7134/deps/picotls/t/ |
H A D | fusion.c | 74 uint8_t encrypted[16]; in test_ecb() local 122 …ok(ptls_aead_decrypt(aead, decrypted, encrypted, sizeof(encrypted), 0, aad, sizeof(aad)) == sizeof… in gcm_basic() 133 uint8_t encrypted[17], decrypted[1] = {0x55}; in gcm_capacity() local 135 ok(memcmp(expected, encrypted, 17) == 0); in gcm_capacity() 151 …memset(encrypted, 0xcc, sizeof(encrypted)); … in gcm_test_vectors() 189 supp->input = encrypted + 2; in gcm_test_vectors() 221 …ok(ptls_aead_decrypt(aead, decrypted, encrypted, sizeof(encrypted), 0, aad, sizeof(aad)) == sizeof… in gcm_iv96() 225 …ok(ptls_aead_decrypt(aead, decrypted, encrypted, sizeof(encrypted), 0, aad, sizeof(aad)) == SIZE_M… in gcm_iv96() 228 …ok(ptls_aead_decrypt(aead, decrypted, encrypted, sizeof(encrypted), 0, aad, sizeof(aad)) == sizeof… in gcm_iv96() 259 uint8_t encrypted[272], decrypted[256]; in test_generated() local [all …]
|
/dports/security/zeronet/ZeroNet-0.7.1/plugins/CryptMessage/Test/ |
H A D | TestCrypt.py | 22 assert ecc.decrypt(encrypted) == text_repeated 27 assert ecc.decrypt(encrypted) == b"hello" 53 assert len(encrypted) == 180 68 decrypted = ui_websocket.testAction("EciesDecrypt", [encrypted, "baad", encrypted]) 74 encrypted = ui_websocket.ws.getResult() 76 ui_websocket.actionEciesDecrypt(0, encrypted) 95 key, iv, encrypted = ui_websocket.ws.getResult() 99 assert len(encrypted) == 24 112 …ui_websocket.actionAesDecrypt(0, [[iv, encrypted], [iv, encrypted], [iv, "baad"], [iv2, encrypted2… 116 …ui_websocket.actionAesDecrypt(0, [[iv, encrypted], [iv, encrypted], [iv, "baad"], [iv2, encrypted2… [all …]
|
/dports/security/seal/SEAL-3.7.2/native/examples/ |
H A D | 3_levels.cpp | 188 Ciphertext encrypted; in example_levels() local 189 encryptor.encrypt(plain, encrypted); in example_levels() 211 evaluator.mod_switch_to_next_inplace(encrypted); in example_levels() 228 decryptor.decrypt(encrypted, plain); in example_levels() 248 encryptor.encrypt(plain, encrypted); in example_levels() 251 evaluator.square_inplace(encrypted); in example_levels() 255 evaluator.square_inplace(encrypted); in example_levels() 264 evaluator.mod_switch_to_next_inplace(encrypted); in example_levels() 275 evaluator.square_inplace(encrypted); in example_levels() 279 evaluator.mod_switch_to_next_inplace(encrypted); in example_levels() [all …]
|
/dports/emulators/yuzu/yuzu-0b47f7a46/externals/mbedtls/tests/suites/ |
H A D | test_suite_pkparse.data | 77 Parse RSA Key #20 (PKCS#8 encrypted SHA1-3DES) 85 Parse RSA Key #20.2 (PKCS#8 encrypted SHA1-3DES, no PW) 113 Parse RSA Key #23 (PKCS#8 encrypted SHA1-3DES DER) 125 Parse RSA Key #26 (PKCS#8 encrypted SHA1-2DES) 161 Parse RSA Key #29 (PKCS#8 encrypted SHA1-2DES DER) 173 Parse RSA Key #32 (PKCS#8 encrypted SHA1-RC4-128) 221 Parse RSA Key #38 (PKCS#8 encrypted v2 PBKDF2 3DES) 293 Parse RSA Key #44 (PKCS#8 encrypted v2 PBKDF2 DES) 999 Parse EC Key #3 (SEC1 PEM encrypted) 1035 Parse EC Key #6 (PKCS8 encrypted DER) [all …]
|
/dports/emulators/qemu/qemu-6.2.0/roms/skiboot/libstb/crypto/mbedtls/tests/suites/ |
H A D | test_suite_pkparse.data | 77 Parse RSA Key #20 (PKCS#8 encrypted SHA1-3DES) 85 Parse RSA Key #20.2 (PKCS#8 encrypted SHA1-3DES, no PW) 113 Parse RSA Key #23 (PKCS#8 encrypted SHA1-3DES DER) 125 Parse RSA Key #26 (PKCS#8 encrypted SHA1-2DES) 161 Parse RSA Key #29 (PKCS#8 encrypted SHA1-2DES DER) 173 Parse RSA Key #32 (PKCS#8 encrypted SHA1-RC4-128) 221 Parse RSA Key #38 (PKCS#8 encrypted v2 PBKDF2 3DES) 293 Parse RSA Key #44 (PKCS#8 encrypted v2 PBKDF2 DES) 999 Parse EC Key #3 (SEC1 PEM encrypted) 1035 Parse EC Key #6 (PKCS8 encrypted DER) [all …]
|
/dports/security/softhsm2/softhsm-2.6.1/src/lib/data_mgr/test/ |
H A D | SecureDataMgrTests.cpp | 62 ByteString encrypted; in testSecureDataManager() local 70 CPPUNIT_ASSERT(!s1.encrypt(plaintext, encrypted)); in testSecureDataManager() 71 CPPUNIT_ASSERT(!s1.decrypt(encrypted, plaintext)); in testSecureDataManager() 93 CPPUNIT_ASSERT(s1.encrypt(plaintext, encrypted)); in testSecureDataManager() 94 CPPUNIT_ASSERT(encrypted != plaintext); in testSecureDataManager() 96 CPPUNIT_ASSERT(s1.decrypt(encrypted, decrypted)); in testSecureDataManager() 109 CPPUNIT_ASSERT(!s1.encrypt(plaintext, encrypted)); in testSecureDataManager() 136 CPPUNIT_ASSERT(encrypted != encrypted2); in testSecureDataManager() 139 CPPUNIT_ASSERT(s2.decrypt(encrypted, decrypted)); in testSecureDataManager() 179 CPPUNIT_ASSERT(encrypted != encrypted2); in testSecureDataManager() [all …]
|
/dports/security/seal/SEAL-3.7.2/native/src/seal/c/ |
H A D | evaluator.h | 20 SEAL_C_FUNC Evaluator_Negate(void *thisptr, void *encrypted, void *destination); 26 SEAL_C_FUNC Evaluator_AddPlain(void *thisptr, void *encrypted, void *plain, void *destination); 30 SEAL_C_FUNC Evaluator_SubPlain(void *thisptr, void *encrypted, void *plain, void *destination); 39 SEAL_C_FUNC Evaluator_Square(void *thisptr, void *encrypted, void *destination, void *pool); 43 SEAL_C_FUNC Evaluator_ModSwitchToNext1(void *thisptr, void *encrypted, void *destination, void *poo… 51 SEAL_C_FUNC Evaluator_RescaleToNext(void *thisptr, void *encrypted, void *destination, void *pool); 56 …void *thisptr, void *encrypted, uint64_t exponent, void *relin_keys, void *destination, void *pool… 61 SEAL_C_FUNC Evaluator_TransformToNTT2(void *thisptr, void *encrypted, void *destination_ntt); 69 void *thisptr, void *encrypted, int steps, void *galoisKeys, void *destination, void *pool); 74 void *thisptr, void *encrypted, int steps, void *galois_keys, void *destination, void *pool); [all …]
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_cbc_unittest.cc | 123 sizeof(encrypted), kInput, input_len); in TEST_P() 161 encrypted, encrypted_len); in TEST_P() 174 uint8_t encrypted[sizeof(kInput) + 64]; in TEST_P() local 202 encrypted, block_size()); in TEST_P() 255 uint8_t encrypted[sizeof(kInput)]; in TEST_F() local 370 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 403 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 436 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 469 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 502 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local [all …]
|
/dports/security/ca_root_nss/nss-3.71/nss/gtests/pk11_gtest/ |
H A D | pk11_cbc_unittest.cc | 123 sizeof(encrypted), kInput, input_len); in TEST_P() 161 encrypted, encrypted_len); in TEST_P() 174 uint8_t encrypted[sizeof(kInput) + 64]; in TEST_P() local 202 encrypted, block_size()); in TEST_P() 255 uint8_t encrypted[sizeof(kInput)]; in TEST_F() local 370 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 403 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 436 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 469 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 502 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local [all …]
|
/dports/www/firefox/firefox-99.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_cbc_unittest.cc | 123 sizeof(encrypted), kInput, input_len); in TEST_P() 161 encrypted, encrypted_len); in TEST_P() 174 uint8_t encrypted[sizeof(kInput) + 64]; in TEST_P() local 202 encrypted, block_size()); in TEST_P() 255 uint8_t encrypted[sizeof(kInput)]; in TEST_F() local 370 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 403 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 436 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 469 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 502 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local [all …]
|
/dports/security/nss/nss-3.76.1/nss/gtests/pk11_gtest/ |
H A D | pk11_cbc_unittest.cc | 123 sizeof(encrypted), kInput, input_len); in TEST_P() 161 encrypted, encrypted_len); in TEST_P() 174 uint8_t encrypted[sizeof(kInput) + 64]; in TEST_P() local 202 encrypted, block_size()); in TEST_P() 255 uint8_t encrypted[sizeof(kInput)]; in TEST_F() local 370 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 403 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 436 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 469 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 502 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_cbc_unittest.cc | 123 sizeof(encrypted), kInput, input_len); in TEST_P() 161 encrypted, encrypted_len); in TEST_P() 174 uint8_t encrypted[sizeof(kInput) + 64]; in TEST_P() local 202 encrypted, block_size()); in TEST_P() 255 uint8_t encrypted[sizeof(kInput)]; in TEST_F() local 370 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 403 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 436 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 469 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 502 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local [all …]
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_cbc_unittest.cc | 123 sizeof(encrypted), kInput, input_len); in TEST_P() 161 encrypted, encrypted_len); in TEST_P() 174 uint8_t encrypted[sizeof(kInput) + 64]; in TEST_P() local 202 encrypted, block_size()); in TEST_P() 255 uint8_t encrypted[sizeof(kInput)]; in TEST_F() local 370 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 403 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 436 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 469 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local 502 std::vector<uint8_t> encrypted(input.size()); in TEST_P() local [all …]
|
/dports/security/modsecurity3-nginx/nginx-1.20.0/src/core/ |
H A D | ngx_crypt.c | 17 u_char **encrypted); 19 u_char **encrypted); 21 u_char **encrypted); 23 u_char **encrypted); 47 return ngx_libc_crypt(pool, key, salt, encrypted); in ngx_crypt() 132 if (*encrypted == NULL) { in ngx_crypt_apr1() 176 if (*encrypted == NULL) { in ngx_crypt_plain() 226 *encrypted = ngx_pnalloc(pool, len); in ngx_crypt_ssha() 227 if (*encrypted == NULL) { in ngx_crypt_ssha() 258 *encrypted = ngx_pnalloc(pool, len); in ngx_crypt_sha() [all …]
|
/dports/www/nginx-lite/nginx-1.20.2/src/core/ |
H A D | ngx_crypt.c | 17 u_char **encrypted); 19 u_char **encrypted); 21 u_char **encrypted); 23 u_char **encrypted); 47 return ngx_libc_crypt(pool, key, salt, encrypted); in ngx_crypt() 132 if (*encrypted == NULL) { in ngx_crypt_apr1() 176 if (*encrypted == NULL) { in ngx_crypt_plain() 226 *encrypted = ngx_pnalloc(pool, len); in ngx_crypt_ssha() 227 if (*encrypted == NULL) { in ngx_crypt_ssha() 258 *encrypted = ngx_pnalloc(pool, len); in ngx_crypt_sha() [all …]
|
/dports/www/nginx-full/nginx-1.20.2/src/core/ |
H A D | ngx_crypt.c | 17 u_char **encrypted); 19 u_char **encrypted); 21 u_char **encrypted); 23 u_char **encrypted); 47 return ngx_libc_crypt(pool, key, salt, encrypted); in ngx_crypt() 132 if (*encrypted == NULL) { in ngx_crypt_apr1() 176 if (*encrypted == NULL) { in ngx_crypt_plain() 226 *encrypted = ngx_pnalloc(pool, len); in ngx_crypt_ssha() 227 if (*encrypted == NULL) { in ngx_crypt_ssha() 258 *encrypted = ngx_pnalloc(pool, len); in ngx_crypt_sha() [all …]
|