Home
last modified time | relevance | path

Searched refs:encoded (Results 1 – 25 of 90) sorted by relevance

1234

/dragonfly/crypto/openssh/
H A Dssh-ed25519-sk.c45 struct sshbuf *encoded = NULL; in ssh_ed25519_sk_verify() local
117 if ((encoded = sshbuf_new()) == NULL) { in ssh_ed25519_sk_verify()
121 if (sshbuf_put(encoded, sigblob, len) != 0 || in ssh_ed25519_sk_verify()
122 sshbuf_put(encoded, apphash, sizeof(apphash)) != 0 || in ssh_ed25519_sk_verify()
123 sshbuf_put_u8(encoded, sig_flags) != 0 || in ssh_ed25519_sk_verify()
124 sshbuf_put_u32(encoded, sig_counter) != 0 || in ssh_ed25519_sk_verify()
125 sshbuf_put(encoded, msghash, sizeof(msghash)) != 0) { in ssh_ed25519_sk_verify()
131 sshbuf_dump(encoded, stderr); in ssh_ed25519_sk_verify()
133 sm = sshbuf_ptr(encoded); in ssh_ed25519_sk_verify()
134 smlen = sshbuf_len(encoded); in ssh_ed25519_sk_verify()
[all …]
H A DPROTOCOL.sshsig9 encoded blob, and a footer.
20 The base64 encoded blob SHOULD be broken up by newlines
74 This blob is encoded as a string using the RFC4253 encoding
75 rules and base64 encoded to form the middle part of the
H A Dsshkey.c3961 (encoded = sshbuf_new()) == NULL || in sshkey_private_to_blob2()
3995 (r = sshbuf_put_cstring(encoded, kdfname)) != 0 || in sshkey_private_to_blob2()
3996 (r = sshbuf_put_stringb(encoded, kdf)) != 0 || in sshkey_private_to_blob2()
4028 if ((r = sshbuf_reserve(encoded, in sshkey_private_to_blob2()
4039 (r = sshbuf_dtob64(encoded, blob, 1)) != 0 || in sshkey_private_to_blob2()
4048 sshbuf_free(encoded); in sshkey_private_to_blob2()
4068 struct sshbuf *encoded = NULL, *decoded = NULL; in private2_uudecode() local
4075 if ((encoded = sshbuf_new()) == NULL || in private2_uudecode()
4095 if ((r = sshbuf_put_u8(encoded, *cp)) != 0) in private2_uudecode()
4105 if ((r = sshbuf_put_u8(encoded, 0)) != 0) in private2_uudecode()
[all …]
H A DPROTOCOL.chacha20poly130556 using K_2, an IV consisting of the packet sequence number encoded as an
68 encoded as a uint64 under the usual SSH wire encoding and a zero block
H A DPROTOCOL.key51 where each private key is encoded using the same rules as used for
H A Dhostfile.c121 char *encoded = NULL; in host_hash() local
146 xasprintf(&encoded, "%s%s%c%s", HASH_MAGIC, uu_salt, HASH_DELIM, in host_hash()
149 return (encoded); in host_hash()
H A DPROTOCOL.certkeys162 pk is the encoded Ed25519 public key as defined by RFC8032.
189 critical options is a set of zero or more key options encoded as
217 encoded according to the rules defined for the CA's public key algorithm
/dragonfly/crypto/libressl/crypto/rsa/
H A Drsa_sign.c129 const unsigned char *encoded = NULL; in RSA_sign() local
148 encoded = m; in RSA_sign()
152 encoded = tmps; in RSA_sign()
158 if ((encrypt_len = RSA_private_encrypt(encoded_len, encoded, sigret, in RSA_sign()
183 unsigned char *decrypt_buf, *encoded = NULL; in int_rsa_verify() local
246 if (!encode_pkcs1(&encoded, &encoded_len, type, m, m_len)) in int_rsa_verify()
250 timingsafe_bcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify()
264 freezero(encoded, (size_t)encoded_len); in int_rsa_verify()
/dragonfly/contrib/gdb-7/gdb/
H A Dada-lang.c1014 while (i > 0 && (encoded[i] == 'b' || encoded[i] == 'n')) in ada_remove_Xbn_suffix()
1050 encoded += 5; in ada_decode()
1055 if (encoded[0] == '_' || encoded[0] == '<') in ada_decode()
1109 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_') in ada_decode()
1158 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_' in ada_decode()
1159 && encoded [i+2] == 'B' && encoded [i+3] == '_' in ada_decode()
1186 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E' in ada_decode()
1195 && (encoded[k] == 'b' || encoded[k] == 's')) in ada_decode()
1211 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_') in ada_decode()
1225 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1])) in ada_decode()
[all …]
H A Dada-lang.h75 const char *encoded; member
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A Dconfig_file.c299 unsigned char *encoded = NULL, *nencoded; in wpa_config_read_blob() local
317 os_free(encoded); in wpa_config_read_blob()
320 encoded = nencoded; in wpa_config_read_blob()
321 os_memcpy(encoded + encoded_len, pos, len); in wpa_config_read_blob()
325 if (!end || !encoded) { in wpa_config_read_blob()
328 os_free(encoded); in wpa_config_read_blob()
334 os_free(encoded); in wpa_config_read_blob()
339 os_free(encoded); in wpa_config_read_blob()
1084 unsigned char *encoded; in wpa_config_write_blob() local
1087 if (encoded == NULL) in wpa_config_write_blob()
[all …]
H A DREADME-P2P103 Timeout - Optional ASCII base-10-encoded u16. If missing, request will not
324 auto accept - Mandatory ASCII hex-encoded boolean (0 == no auto-accept,
327 Advertisement ID - Mandatory non-zero ASCII hex-encoded u32
329 State - Mandatory ASCII hex-encoded u8 (0 -- Svc not available,
331 Config Methods - Mandatory ASCII hex-encoded u16 (bitmask of WSC config
357 Advertisement ID - Mandatory non-zero ASCII hex-encoded u32
359 State - Mandatory ASCII hex-encoded u8 (can be used to indicate svc
463 Transaction ID - Mandatory non-zero ASCII hex-encoded u8 for GAS
803 adv_id - always ASCII hex-encoded u32
822 adv_id - always ascii hex-encoded u32
[all …]
H A Deapol_test.c442 unsigned char *encoded; in eapol_test_write_cert() local
444 encoded = base64_encode(wpabuf_head(cert), wpabuf_len(cert), NULL); in eapol_test_write_cert()
445 if (encoded == NULL) in eapol_test_write_cert()
448 "-----END CERTIFICATE-----\n\n", subject, encoded); in eapol_test_write_cert()
449 os_free(encoded); in eapol_test_write_cert()
/dragonfly/contrib/file/magic/Magdir/
H A Ddolby36 >>6 byte&0x18 = 0x08 not Dolby Surround encoded
37 >>6 byte&0x18 = 0x10 Dolby Surround encoded
H A Dmime4 # mime: file(1) magic for MIME encoded files
H A Dssl20 0 string U2FsdGVkX1 openssl enc'd data with salted password, base64 encoded
H A Dpdf10 >8 search/512 /Filter/FlateDecode/ (zip deflate encoded)
H A Duuencode4 # uuencode: file(1) magic for ASCII-encoded files
H A Dsmile29 >3 byte&0x04 0x00 binary encoded,
H A Dsereal32 0 string/b \=\xC3\xB3rl Sereal data packet, UTF-8 encoded
H A Dber27 # Sender long tag #TAP 3.x (BER encoded)
/dragonfly/lib/libcam/
H A Dscsi_cmdparse.c545 int encoded = 0; in do_encode() local
554 encoded++; in do_encode()
650 return encoded; in do_encode()
/dragonfly/contrib/wpa_supplicant/src/wps/
H A Dwps_er.c900 unsigned char *encoded; in wps_er_soap_hdr() local
905 encoded = base64_encode(wpabuf_head(msg), wpabuf_len(msg), in wps_er_soap_hdr()
907 if (encoded == NULL) in wps_er_soap_hdr()
910 encoded = NULL; in wps_er_soap_hdr()
916 os_free(encoded); in wps_er_soap_hdr()
940 if (encoded) { in wps_er_soap_hdr()
942 arg_name, (char *) encoded, arg_name); in wps_er_soap_hdr()
943 os_free(encoded); in wps_er_soap_hdr()
/dragonfly/contrib/gcc-4.7/gcc/doc/
H A Dobjc.texi294 The types are encoded in the following way:
364 The non-atomic types are encoded as follows:
441 The type specifiers are encoded just before the type. Unlike types
442 however, the type specifiers are only encoded when they appear in method
472 encoded as @code{^ri}. @code{int* const}, instead, is a @code{const}
473 pointer to an @code{int}, and so is encoded as @code{r^i}.
476 versus @code{char * const}. Because @code{char *} is encoded as
482 encode @code{char *const}. @code{char *const} would simply be encoded
508 32-bit longs are encoded as 'l' or 'L', but not always. For typedefs,
513 @code{enum}s are always encoded as 'i' (int) even if they are actually
[all …]
/dragonfly/sys/dev/disk/dm/doc/
H A Dproposal-dm.txt75 /* list of parts that still need copied etc.; run length encoded? */

1234