/dragonfly/crypto/openssh/ |
H A D | ssh-ed25519-sk.c | 45 struct sshbuf *encoded = NULL; in ssh_ed25519_sk_verify() local 117 if ((encoded = sshbuf_new()) == NULL) { in ssh_ed25519_sk_verify() 121 if (sshbuf_put(encoded, sigblob, len) != 0 || in ssh_ed25519_sk_verify() 122 sshbuf_put(encoded, apphash, sizeof(apphash)) != 0 || in ssh_ed25519_sk_verify() 123 sshbuf_put_u8(encoded, sig_flags) != 0 || in ssh_ed25519_sk_verify() 124 sshbuf_put_u32(encoded, sig_counter) != 0 || in ssh_ed25519_sk_verify() 125 sshbuf_put(encoded, msghash, sizeof(msghash)) != 0) { in ssh_ed25519_sk_verify() 131 sshbuf_dump(encoded, stderr); in ssh_ed25519_sk_verify() 133 sm = sshbuf_ptr(encoded); in ssh_ed25519_sk_verify() 134 smlen = sshbuf_len(encoded); in ssh_ed25519_sk_verify() [all …]
|
H A D | PROTOCOL.sshsig | 9 encoded blob, and a footer. 20 The base64 encoded blob SHOULD be broken up by newlines 74 This blob is encoded as a string using the RFC4253 encoding 75 rules and base64 encoded to form the middle part of the
|
H A D | sshkey.c | 3961 (encoded = sshbuf_new()) == NULL || in sshkey_private_to_blob2() 3995 (r = sshbuf_put_cstring(encoded, kdfname)) != 0 || in sshkey_private_to_blob2() 3996 (r = sshbuf_put_stringb(encoded, kdf)) != 0 || in sshkey_private_to_blob2() 4028 if ((r = sshbuf_reserve(encoded, in sshkey_private_to_blob2() 4039 (r = sshbuf_dtob64(encoded, blob, 1)) != 0 || in sshkey_private_to_blob2() 4048 sshbuf_free(encoded); in sshkey_private_to_blob2() 4068 struct sshbuf *encoded = NULL, *decoded = NULL; in private2_uudecode() local 4075 if ((encoded = sshbuf_new()) == NULL || in private2_uudecode() 4095 if ((r = sshbuf_put_u8(encoded, *cp)) != 0) in private2_uudecode() 4105 if ((r = sshbuf_put_u8(encoded, 0)) != 0) in private2_uudecode() [all …]
|
H A D | PROTOCOL.chacha20poly1305 | 56 using K_2, an IV consisting of the packet sequence number encoded as an 68 encoded as a uint64 under the usual SSH wire encoding and a zero block
|
H A D | PROTOCOL.key | 51 where each private key is encoded using the same rules as used for
|
H A D | hostfile.c | 121 char *encoded = NULL; in host_hash() local 146 xasprintf(&encoded, "%s%s%c%s", HASH_MAGIC, uu_salt, HASH_DELIM, in host_hash() 149 return (encoded); in host_hash()
|
H A D | PROTOCOL.certkeys | 162 pk is the encoded Ed25519 public key as defined by RFC8032. 189 critical options is a set of zero or more key options encoded as 217 encoded according to the rules defined for the CA's public key algorithm
|
/dragonfly/crypto/libressl/crypto/rsa/ |
H A D | rsa_sign.c | 129 const unsigned char *encoded = NULL; in RSA_sign() local 148 encoded = m; in RSA_sign() 152 encoded = tmps; in RSA_sign() 158 if ((encrypt_len = RSA_private_encrypt(encoded_len, encoded, sigret, in RSA_sign() 183 unsigned char *decrypt_buf, *encoded = NULL; in int_rsa_verify() local 246 if (!encode_pkcs1(&encoded, &encoded_len, type, m, m_len)) in int_rsa_verify() 250 timingsafe_bcmp(encoded, decrypt_buf, encoded_len) != 0) { in int_rsa_verify() 264 freezero(encoded, (size_t)encoded_len); in int_rsa_verify()
|
/dragonfly/contrib/gdb-7/gdb/ |
H A D | ada-lang.c | 1014 while (i > 0 && (encoded[i] == 'b' || encoded[i] == 'n')) in ada_remove_Xbn_suffix() 1050 encoded += 5; in ada_decode() 1055 if (encoded[0] == '_' || encoded[0] == '<') in ada_decode() 1109 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_') in ada_decode() 1158 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_' in ada_decode() 1159 && encoded [i+2] == 'B' && encoded [i+3] == '_' in ada_decode() 1186 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E' in ada_decode() 1195 && (encoded[k] == 'b' || encoded[k] == 's')) in ada_decode() 1211 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_') in ada_decode() 1225 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1])) in ada_decode() [all …]
|
H A D | ada-lang.h | 75 const char *encoded; member
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | config_file.c | 299 unsigned char *encoded = NULL, *nencoded; in wpa_config_read_blob() local 317 os_free(encoded); in wpa_config_read_blob() 320 encoded = nencoded; in wpa_config_read_blob() 321 os_memcpy(encoded + encoded_len, pos, len); in wpa_config_read_blob() 325 if (!end || !encoded) { in wpa_config_read_blob() 328 os_free(encoded); in wpa_config_read_blob() 334 os_free(encoded); in wpa_config_read_blob() 339 os_free(encoded); in wpa_config_read_blob() 1084 unsigned char *encoded; in wpa_config_write_blob() local 1087 if (encoded == NULL) in wpa_config_write_blob() [all …]
|
H A D | README-P2P | 103 Timeout - Optional ASCII base-10-encoded u16. If missing, request will not 324 auto accept - Mandatory ASCII hex-encoded boolean (0 == no auto-accept, 327 Advertisement ID - Mandatory non-zero ASCII hex-encoded u32 329 State - Mandatory ASCII hex-encoded u8 (0 -- Svc not available, 331 Config Methods - Mandatory ASCII hex-encoded u16 (bitmask of WSC config 357 Advertisement ID - Mandatory non-zero ASCII hex-encoded u32 359 State - Mandatory ASCII hex-encoded u8 (can be used to indicate svc 463 Transaction ID - Mandatory non-zero ASCII hex-encoded u8 for GAS 803 adv_id - always ASCII hex-encoded u32 822 adv_id - always ascii hex-encoded u32 [all …]
|
H A D | eapol_test.c | 442 unsigned char *encoded; in eapol_test_write_cert() local 444 encoded = base64_encode(wpabuf_head(cert), wpabuf_len(cert), NULL); in eapol_test_write_cert() 445 if (encoded == NULL) in eapol_test_write_cert() 448 "-----END CERTIFICATE-----\n\n", subject, encoded); in eapol_test_write_cert() 449 os_free(encoded); in eapol_test_write_cert()
|
/dragonfly/contrib/file/magic/Magdir/ |
H A D | dolby | 36 >>6 byte&0x18 = 0x08 not Dolby Surround encoded 37 >>6 byte&0x18 = 0x10 Dolby Surround encoded
|
H A D | mime | 4 # mime: file(1) magic for MIME encoded files
|
H A D | ssl | 20 0 string U2FsdGVkX1 openssl enc'd data with salted password, base64 encoded
|
H A D | pdf | 10 >8 search/512 /Filter/FlateDecode/ (zip deflate encoded)
|
H A D | uuencode | 4 # uuencode: file(1) magic for ASCII-encoded files
|
H A D | smile | 29 >3 byte&0x04 0x00 binary encoded,
|
H A D | sereal | 32 0 string/b \=\xC3\xB3rl Sereal data packet, UTF-8 encoded
|
H A D | ber | 27 # Sender long tag #TAP 3.x (BER encoded)
|
/dragonfly/lib/libcam/ |
H A D | scsi_cmdparse.c | 545 int encoded = 0; in do_encode() local 554 encoded++; in do_encode() 650 return encoded; in do_encode()
|
/dragonfly/contrib/wpa_supplicant/src/wps/ |
H A D | wps_er.c | 900 unsigned char *encoded; in wps_er_soap_hdr() local 905 encoded = base64_encode(wpabuf_head(msg), wpabuf_len(msg), in wps_er_soap_hdr() 907 if (encoded == NULL) in wps_er_soap_hdr() 910 encoded = NULL; in wps_er_soap_hdr() 916 os_free(encoded); in wps_er_soap_hdr() 940 if (encoded) { in wps_er_soap_hdr() 942 arg_name, (char *) encoded, arg_name); in wps_er_soap_hdr() 943 os_free(encoded); in wps_er_soap_hdr()
|
/dragonfly/contrib/gcc-4.7/gcc/doc/ |
H A D | objc.texi | 294 The types are encoded in the following way: 364 The non-atomic types are encoded as follows: 441 The type specifiers are encoded just before the type. Unlike types 442 however, the type specifiers are only encoded when they appear in method 472 encoded as @code{^ri}. @code{int* const}, instead, is a @code{const} 473 pointer to an @code{int}, and so is encoded as @code{r^i}. 476 versus @code{char * const}. Because @code{char *} is encoded as 482 encode @code{char *const}. @code{char *const} would simply be encoded 508 32-bit longs are encoded as 'l' or 'L', but not always. For typedefs, 513 @code{enum}s are always encoded as 'i' (int) even if they are actually [all …]
|
/dragonfly/sys/dev/disk/dm/doc/ |
H A D | proposal-dm.txt | 75 /* list of parts that still need copied etc.; run length encoded? */
|