/dports/security/seal/SEAL-3.7.2/dotnet/tests/ |
H A D | PlaintextTests.cs | 27 Plaintext plain3 = new Plaintext(); in CreateTest() 28 plain3.Set(plain2); in CreateTest() 30 Assert.IsNotNull(plain3); in CreateTest() 31 Assert.AreEqual(10ul, plain3.Capacity); in CreateTest() 32 Assert.AreEqual(10ul, plain3.CoeffCount); in CreateTest() 79 Plaintext plain3 = new Plaintext(plain); in CopyTest() 80 Assert.AreEqual(plain3, plain); in CopyTest() 81 Assert.IsTrue(plain3.IsNTTForm); in CopyTest() 82 Assert.AreEqual(plain3.ParmsId, context.FirstParmsId); in CopyTest() 356 Plaintext plain3 = new Plaintext("0"); in HashCodeTest() [all …]
|
H A D | KeyGeneratorTests.cs | 63 Plaintext plain3 = new Plaintext(); in Create2Test() 64 decryptor2.Decrypt(cipher, plain3); in Create2Test() 66 Assert.AreNotSame(plain, plain3); in Create2Test() 67 Assert.AreEqual(plain, plain3); in Create2Test()
|
/dports/textproc/sphinxsearch/sphinx-2.2.11-release/test/test_202/ |
H A D | model.bin | 1 …plain3' in search request";i:1;a:9:{s:5:"error";s:0:"";s:7:"warning";s:0:"";s:6:"status";i:0;s:6:"…
|
/dports/textproc/libsphinxclient/sphinx-2.0.9-release/test/test_202/ |
H A D | model.bin | 1 …plain3' in search request";i:1;a:9:{s:5:"error";s:0:"";s:7:"warning";s:0:"";s:6:"status";i:0;s:6:"…
|
/dports/security/gnupg1/gnupg-1.4.23/cipher/ |
H A D | blowfish.c | 479 byte plain3[] = { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }; in selftest() local 492 encrypt_block( &c, buffer, plain3 ); in selftest() 496 if( memcmp( buffer, plain3, 8 ) ) in selftest()
|
/dports/mail/postfix-current/postfix-3.7-20211107/src/global/ |
H A D | mail_addr_find.in | 41 test external:external:external:default:plain3@3.example:plain4@4.example 48 test external:external:external:full|noext|domain:plain3@3.example:plain4@4.example
|
H A D | mail_addr_find.ref | 32 external:plain3@3.example -external-> external:plain4@4.example (null extension) 38 external:plain3@3.example -external-> external:plain4@4.example (null extension)
|
/dports/security/seal/SEAL-3.7.2/native/tests/seal/ |
H A D | evaluator.cpp | 2957 Plaintext plain3; in TEST() local 3040 Plaintext plain3; in TEST() local 3516 plain3 = "1x^2 + 1x^1 + 1"; in TEST() 3519 encryptor.encrypt(plain3, encrypted3); in TEST() 3545 plain3 = "1x^2 + 1x^1 + 1"; in TEST() 3548 encryptor.encrypt(plain3, encrypted3); in TEST() 3561 plain3 = "1"; in TEST() 3565 encryptor.encrypt(plain3, encrypted3); in TEST() 3671 plain3 = "1x^2 + 1x^1 + 1"; in TEST() 3701 plain3 = "1x^2 + 1x^1 + 1"; in TEST() [all …]
|
/dports/www/p5-HTML-Mason/HTML-Mason-1.59/t/ |
H A D | 07-interp.t | 406 <& plain3 &><& plain3 &><& plain3 &> 434 … $create_code_cache_test->('unlimited', 'plain1, plain2, plain3, plain4, plain5, plain6, plain7'); 437 $create_code_cache_test->(8, 'plain1, plain2, plain3, plain5, plain6, plain7');
|
/dports/dns/bind-tools/bind-9.16.27/lib/dns/tests/ |
H A D | name_test.c | 196 unsigned char plain3[] = "\003xxx\003bar\003foo"; in compression_test() local 213 r.base = plain3; in compression_test() 214 r.length = sizeof(plain3); in compression_test()
|
/dports/dns/bind911/bind-9.11.37/lib/dns/tests/ |
H A D | name_test.c | 198 unsigned char plain3[] = "\003xxx\003bar\003foo"; in compression_test() local 215 r.base = plain3; in compression_test() 216 r.length = sizeof(plain3); in compression_test()
|
/dports/dns/samba-nsupdate/bind-9.16.5/lib/dns/tests/ |
H A D | name_test.c | 194 unsigned char plain3[] = "\003xxx\003bar\003foo"; in compression_test() local 211 r.base = plain3; in compression_test() 212 r.length = sizeof(plain3); in compression_test()
|
/dports/dns/bind9-devel/bind9-e112afa15668bd3b1baed59df2d21e01b46da15e/lib/dns/tests/ |
H A D | name_test.c | 194 unsigned char plain3[] = "\003xxx\003bar\003foo"; in compression_test() local 211 r.base = plain3; in compression_test() 212 r.length = sizeof(plain3); in compression_test()
|
/dports/dns/bind916/bind-9.16.27/lib/dns/tests/ |
H A D | name_test.c | 196 unsigned char plain3[] = "\003xxx\003bar\003foo"; in compression_test() local 213 r.base = plain3; in compression_test() 214 r.length = sizeof(plain3); in compression_test()
|
/dports/security/libgcrypt/libgcrypt-1.9.4/cipher/ |
H A D | blowfish.c | 908 static const byte plain3[] = in selftest() local 927 encrypt_block( (void *) &c, buffer, plain3 ); in selftest() 931 if( memcmp( buffer, plain3, 8 ) ) in selftest()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/libgcrypt/cipher/ |
H A D | blowfish.c | 908 static const byte plain3[] = in selftest() local 927 encrypt_block( (void *) &c, buffer, plain3 ); in selftest() 931 if( memcmp( buffer, plain3, 8 ) ) in selftest()
|
/dports/devel/atlas-devel/Atlas-C++-0.6.4/protocol/spec/ |
H A D | agrilan_map.def | 175 id:"plain3" 463 contains:["hilly1", "hilly2", "hilly3", "plain1", "plain2", "plain3", "plain4", "murray_r1"]
|
/dports/devel/mercurial/mercurial-6.0/tests/ |
H A D | test-commit-interactive.t | 1695 $ hg mv plain plain3 1696 $ echo somechange >> plain3 1701 diff --git a/plain b/plain3 1703 rename to plain3 1705 examine changes to 'plain' and 'plain3'? 1713 record this change to 'plain3'? 1755 $ hg status -A plain3 1756 C plain3
|
/dports/devel/cjose/cjose-0.6.1/test/ |
H A D | check_jwe.c | 744 uint8_t *plain3 = cjose_jwe_decrypt(jwe, jwk, &plain3_len, &err); in START_TEST() local 745 ck_assert_msg(NULL == plain3, "cjose_jwe_get_plaintext succeeded for tampered ciphertext"); in START_TEST()
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/test/ |
H A D | test.c | 6739 WOLFSSL_SMALL_STACK_STATIC const byte plain3[] = in aesofb_test() local 6819 ret = EVP_test(EVP_aes_192_ofb(), key3, iv3, plain3, sizeof(plain3), in aesofb_test() 6837 ret = wc_AesOfbEncrypt(enc, cipher, plain3, AES_BLOCK_SIZE); in aesofb_test() 6849 if (XMEMCMP(plain, plain3, AES_BLOCK_SIZE)) in aesofb_test()
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/test/ |
H A D | test.c | 6739 WOLFSSL_SMALL_STACK_STATIC const byte plain3[] = in aesofb_test() local 6819 ret = EVP_test(EVP_aes_192_ofb(), key3, iv3, plain3, sizeof(plain3), in aesofb_test() 6837 ret = wc_AesOfbEncrypt(enc, cipher, plain3, AES_BLOCK_SIZE); in aesofb_test() 6849 if (XMEMCMP(plain, plain3, AES_BLOCK_SIZE)) in aesofb_test()
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/test/ |
H A D | test.c | 6739 WOLFSSL_SMALL_STACK_STATIC const byte plain3[] = in aesofb_test() local 6819 ret = EVP_test(EVP_aes_192_ofb(), key3, iv3, plain3, sizeof(plain3), in aesofb_test() 6837 ret = wc_AesOfbEncrypt(enc, cipher, plain3, AES_BLOCK_SIZE); in aesofb_test() 6849 if (XMEMCMP(plain, plain3, AES_BLOCK_SIZE)) in aesofb_test()
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/test/ |
H A D | test.c | 6739 WOLFSSL_SMALL_STACK_STATIC const byte plain3[] = in aesofb_test() local 6819 ret = EVP_test(EVP_aes_192_ofb(), key3, iv3, plain3, sizeof(plain3), in aesofb_test() 6837 ret = wc_AesOfbEncrypt(enc, cipher, plain3, AES_BLOCK_SIZE); in aesofb_test() 6849 if (XMEMCMP(plain, plain3, AES_BLOCK_SIZE)) in aesofb_test()
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/test/ |
H A D | test.c | 6739 WOLFSSL_SMALL_STACK_STATIC const byte plain3[] = in aesofb_test() local 6819 ret = EVP_test(EVP_aes_192_ofb(), key3, iv3, plain3, sizeof(plain3), in aesofb_test() 6837 ret = wc_AesOfbEncrypt(enc, cipher, plain3, AES_BLOCK_SIZE); in aesofb_test() 6849 if (XMEMCMP(plain, plain3, AES_BLOCK_SIZE)) in aesofb_test()
|
/dports/security/wolfssl/wolfssl-5.1.0/tests/ |
H A D | api.c | 4023 const unsigned char plain3[] = in test_wolfSSL_EVP_DecodeUpdate() local 4038 AssertIntEQ(outl,sizeof(plain3)-1); /* 31 chars should be output */ in test_wolfSSL_EVP_DecodeUpdate() 4040 AssertIntEQ(XSTRNCMP( (const char*)plain3,(const char*)decOutBuff, in test_wolfSSL_EVP_DecodeUpdate() 4041 sizeof(plain3) -1 ),0); in test_wolfSSL_EVP_DecodeUpdate()
|