Home
last modified time | relevance | path

Searched full:encoded (Results 1 – 25 of 2097) sorted by relevance

12345678910>>...84

/src/contrib/file/magic/Magdir/
H A Dder3 # der: file(1) magic for DER encoded files
30 >>&0 der int1=00 DER Encoded Certificate request
37 >&0 der int3=010001 DER Encoded Key Pair, 512 bits
42 >&0 der int3=010001 DER Encoded Key Pair, 1024 bits
47 >&0 der int3=010001 DER Encoded Key Pair, 2048 bits
52 >&0 der int3=010001 DER Encoded Key Pair, 4096 bits
57 >&0 der int3=010001 DER Encoded Key Pair, 8192 bits
62 >&0 der int3=010001 DER Encoded Key Pair, 16k bits
67 >&0 der int3=010001 DER Encoded Key Pair, 32k bits
72 >>&0 der int2=0dfa DER Encoded Certificate, 512 bits
[all …]
/src/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/
H A Dargon2.h198 * Hashes a password with Argon2i, producing an encoded hash
207 * @param encoded Buffer where to write the encoded hash
208 * @param encodedlen Size of the buffer (thus max size of the encoded hash)
216 char *encoded, const size_t encodedlen);
219 * Hashes a password with Argon2id, producing an encoded hash
228 * @param encoded Buffer where to write the encoded hash
229 * @param encodedlen Size of the buffer (thus max size of the encoded hash)
237 char *encoded, const size_t encodedlen);
281 void *hash, const size_t hashlen, char *encoded,
285 * Verifies a password against an encoded string
[all …]
H A Dargon2.c89 const size_t hashlen, char *encoded, const size_t encodedlen, in argon2_hash() argument
143 if (encoded && encodedlen) { in argon2_hash()
144 if (encode_string(encoded, encodedlen, &context, type) != ARGON2_OK) { in argon2_hash()
146 sodium_memzero(encoded, encodedlen); in argon2_hash()
162 const size_t saltlen, const size_t hashlen, char *encoded, in argon2i_hash_encoded() argument
166 NULL, hashlen, encoded, encodedlen, Argon2_i); in argon2i_hash_encoded()
183 const size_t saltlen, const size_t hashlen, char *encoded, in argon2id_hash_encoded() argument
187 NULL, hashlen, encoded, encodedlen, Argon2_id); in argon2id_hash_encoded()
201 argon2_verify(const char *encoded, const void *pwd, const size_t pwdlen, in argon2_verify() argument
218 encoded_len = strlen(encoded); in argon2_verify()
[all …]
/src/crypto/openssl/doc/man7/
H A Dpassphrase-encoding.pod22 This means that for an object that was encrypted using a pass phrase encoded in
23 ISO-8859-1, that object needs to be decrypted using a pass phrase encoded in
30 The standard stipulates that the pass phrase shall be encoded as an ASN.1
32 encoded in big endian (UCS-2 BE).
40 Treats the received pass phrase as UTF-8 encoded and tries to re-encode it to
47 Assumes that the pass phrase is encoded in ASCII or ISO-8859-1 and
64 A pass phrase encoded in ISO-8859-2 could very well have a sequence such as
67 be misinterpreted as the perfectly valid UTF-8 encoded code point U+00EF (LATIN
76 On the same accord, anything encoded in UTF-8 that was given to OpenSSL older
83 This API stipulates that pass phrases should be UTF-8 encoded, and that any
[all …]
/src/sys/contrib/device-tree/Bindings/soundwire/
H A Dqcom,sdw.txt18 Value type: <prop-encoded-array>
24 Value type: <prop-encoded-array>
46 Value type: <prop-encoded-array>
66 Value type: <prop-encoded-array>
75 Value type: <prop-encoded-array>
84 Value type: <prop-encoded-array>
94 Value type: <prop-encoded-array>
102 Value type: <prop-encoded-array>
113 Value type: <prop-encoded-array>
123 Value type: <prop-encoded-array>
[all …]
/src/contrib/llvm-project/clang/include/clang/Serialization/
H A DSourceLocationEncoding.h72 /// similar. Each element can be delta-encoded against the last nonzero element.
127 UIntTy decodeRaw(EncodedTy Encoded) { in decodeRaw() argument
128 if (Encoded == 0) in decodeRaw()
131 return SourceLocationEncoding::decodeRaw(Prev = Encoded); in decodeRaw()
132 return SourceLocationEncoding::decodeRaw(Prev += zagZig(Encoded - 1)); in decodeRaw()
136 SourceLocation decode(EncodedTy Encoded) { in decode() argument
137 return SourceLocation::getFromRawEncoding(decodeRaw(Encoded)); in decode()
178 RawLocEncoding Encoded = encodeRaw(Loc.getRawEncoding()); in encode() local
182 Encoded |= (RawLocEncoding)BaseModuleFileIndex << 32; in encode()
183 return Encoded; in encode()
[all …]
/src/secure/lib/libcrypto/man/man7/
H A Dpassphrase-encoding.780 This means that for an object that was encrypted using a pass phrase encoded in
81 ISO\-8859\-1, that object needs to be decrypted using a pass phrase encoded in
87 The standard stipulates that the pass phrase shall be encoded as an ASN.1
89 encoded in big endian (UCS\-2 BE).
93 Treats the received pass phrase as UTF\-8 encoded and tries to re\-encode it to
98 Assumes that the pass phrase is encoded in ASCII or ISO\-8859\-1 and
113 A pass phrase encoded in ISO\-8859\-2 could very well have a sequence such as
116 be misinterpreted as the perfectly valid UTF\-8 encoded code point U+00EF (LATIN
127 On the same accord, anything encoded in UTF\-8 that was given to OpenSSL older
133 This API stipulates that pass phrases should be UTF\-8 encoded, and that any
[all …]
/src/secure/lib/libcrypto/man/man3/
H A DEVP_PKEY_set1_encoded_public_key.3104 The format for the encoded public key will depend on the algorithm in use. For
105 DH it should be encoded as a positive integer in big\-endian form. For EC is
107 Curve Cryptography") standard. For \fBX25519\fR and \fBX448\fR it should be encoded
110 format defined in \fBFIPS 203\fR (the 12\-bit per\-coefficient encoded public \fIt\fR
113 The key to be updated is supplied in \fBpkey\fR. The buffer containing the encoded
117 the encoded public key is returned to the application. The key containing the
118 public key data is supplied in \fBpkey\fR. A buffer containing the encoded key will
119 be allocated and stored in \fB*ppub\fR. The length of the encoded public key is
135 \&\fBEVP_PKEY_get1_encoded_public_key()\fR returns the length of the encoded key or 0 for failure.
163 .SS "Get an encoded public key to send to a peer"
[all …]
H A Dd2i_RSAPrivateKey.3184 \&\fBd2i_\fR\f(BITYPE\fR\fBPrivateKey\fR() and derivates thereof decode DER encoded
187 \&\fBd2i_\fR\f(BITYPE\fR\fBPublicKey\fR() and derivates thereof decode DER encoded
190 \&\fBd2i_\fR\f(BITYPE\fR\fBparams\fR() and derivates thereof decode DER encoded \fR\f(BITYPE\fR\fB\…
193 \&\fBd2i_\fR\f(BITYPE\fR\fB_PUBKEY\fR() and derivates thereof decode DER encoded \fR\f(BITYPE\fR\fB…
197 \&\fR\f(BITYPE\fR\fB\fR data into a type specific DER encoded structure.
200 \&\fR\f(BITYPE\fR\fB\fR data into a type specific DER encoded structure.
203 parameters data into a type specific DER encoded structure.
206 \&\fR\f(BITYPE\fR\fB\fR data into a DER encoded \fBSubjectPublicKeyInfo\fR structure.
210 Similarly, \fBi2d_RSAPrivateKey()\fR and \fBi2d_RSAPublicKey()\fR produce DER encoded
230 A caveat is that \fBi2d_PrivateKey\fR\|(3) may output a DER encoded PKCS#8
[all …]
/src/crypto/krb5/src/lib/krad/
H A Dt_attrset.c45 unsigned char buffer[KRAD_PACKET_SIZE_MAX], encoded[MAX_ATTRSETSIZE]; in main() local
69 encoded[len + 0] = KRAD_ATTR_USER_NAME; in main()
70 encoded[len + 1] = strlen(username) + 2; in main()
71 memcpy(encoded + len + 2, username, strlen(username)); in main()
72 len += encoded[len + 1]; in main()
75 encoded[len + 0] = KRAD_ATTR_USER_PASSWORD; in main()
76 encoded[len + 1] = sizeof(encpass) + 2; in main()
77 memcpy(encoded + len + 2, encpass, sizeof(encpass)); in main()
78 len += encoded[len + 1]; in main()
82 insist(memcmp(encoded, buffer, len) == 0); in main()
/src/crypto/openssl/doc/man3/
H A DEVP_PKEY_set1_encoded_public_key.pod40 The format for the encoded public key will depend on the algorithm in use. For
41 DH it should be encoded as a positive integer in big-endian form. For EC is
43 Curve Cryptography") standard. For B<X25519> and B<X448> it should be encoded
46 format defined in B<FIPS 203> (the 12-bit per-coefficient encoded public I<t>
49 The key to be updated is supplied in B<pkey>. The buffer containing the encoded
53 the encoded public key is returned to the application. The key containing the
54 public key data is supplied in B<pkey>. A buffer containing the encoded key will
55 be allocated and stored in B<*ppub>. The length of the encoded public key is
73 EVP_PKEY_get1_encoded_public_key() returns the length of the encoded key or 0 for failure.
102 =head2 Get an encoded public key to send to a peer
[all …]
H A Dd2i_RSAPrivateKey.pod130 B<d2i_I<TYPE>PrivateKey>() and derivates thereof decode DER encoded
133 B<d2i_I<TYPE>PublicKey>() and derivates thereof decode DER encoded
136 B<d2i_I<TYPE>params>() and derivates thereof decode DER encoded B<I<TYPE>>
139 B<d2i_I<TYPE>_PUBKEY>() and derivates thereof decode DER encoded B<I<TYPE>>
143 B<I<TYPE>> data into a type specific DER encoded structure.
146 B<I<TYPE>> data into a type specific DER encoded structure.
149 parameters data into a type specific DER encoded structure.
152 B<I<TYPE>> data into a DER encoded B<SubjectPublicKeyInfo> structure.
156 Similarly, i2d_RSAPrivateKey() and i2d_RSAPublicKey() produce DER encoded
181 A caveat is that L<i2d_PrivateKey(3)> may output a DER encoded PKCS#8
[all …]
/src/contrib/libfido2/man/
H A Dfido2-token.1162 is the credential's base64-encoded id.
173 holds the blob's base64-encoded 32-byte AES-256 GCM encryption key.
190 is a base64-encoded blob.
199 is the enrollment's template base64-encoded id.
215 holds the blob's base64-encoded 32-byte AES-256 GCM encryption key.
234 is a base64-encoded blob.
246 Prints the credential id (base64-encoded) and public key
247 (PEM encoded) of the resident credential specified by
255 is a base64-encoded credential id.
301 holds the blob's base64-encoded 32-byte AES-256 GCM encryption key.
[all …]
/src/crypto/openssl/test/
H A Dbio_base64_test.c22 char *encoded; member
93 static int encode(unsigned const char *buf, unsigned buflen, char *encoded, in encode() argument
101 if (encoded != NULL) { in encode()
102 int elen = strlen(encoded); in encode()
104 return BIO_write(mem, encoded, elen) == elen; in encode()
151 unsigned buflen, int trunc, char *encoded, unsigned llen, in genb64() argument
165 || encode(buf, buflen, encoded, trunc, llen, wscnt, mem) <= 0 in genb64()
188 char *encoded = NULL; in test_bio_base64_run() local
195 * Pre-encoded data always encodes NUL octets. If all we care about is the in test_bio_base64_run()
198 if (t->encoded != NULL) in test_bio_base64_run()
[all …]
/src/contrib/xz/src/liblzma/api/lzma/
H A Dvli.h8 * In the .xz format, most integers are encoded in a variable-length
15 * one encoded representation. The maximum number of bits in a VLI is 63,
40 * \brief Maximum supported encoded length of variable length integers
84 * integer has been encoded.
86 * \param vli Integer to be encoded
87 * \param[out] vli_pos How many VLI-encoded bytes have already been written
100 * - LZMA_OK: Integer successfully encoded.
104 * the encoded size with lzma_vli_size().
109 * - LZMA_STREAM_END: Integer successfully encoded.
160 * \param vli Integer whose encoded size is to be determined
/src/crypto/openssl/include/internal/
H A Dquic_vlint.h57 * This function writes a QUIC varable-length encoded integer to buf.
71 * This function writes a QUIC variable-length encoded integer to buf. The
73 * encoded value may take up more space than necessary.
93 * Given the first byte of an encoded QUIC variable-length integer, returns
94 * the number of bytes comprising the encoded integer, including the first
103 * Given a buffer containing an encoded QUIC variable-length integer, returns
114 * Given a buffer buf of buf_len bytes in length, attempts to decode an encoded
116 * to *v. If buf_len is inadequate, suggesting a truncated encoded integer, the
/src/cddl/contrib/opensolaris/lib/libctf/common/
H A Dctf.5437 String identifiers are always encoded as four byte unsigned integers
457 type begins with metadata encoded into a
459 This encoded information tells us three different pieces of information:
515 The following macros are useful for constructing and deconstructing the encoded
535 A label is encoded into the
549 Each label is encoded in the file format using the following eight byte
559 The name is encoded in the
566 The type identifier encoded in the member
683 For functions which have no type information available, they are encoded as
685 Functions with arguments are encoded differently.
[all …]
/src/crypto/openssl/crypto/slh_dsa/
H A Dslh_dsa.c34 * @param msg The message to sign. This may be encoded beforehand.
141 * @param msg The message to verify. This may be encoded beforehand.
214 * SLH_DSA pure signatures are encoded as M' = 00 || ctx_len || ctx || msg
225 * @param out_len The size of the returned encoded buffer.
226 * @returns A buffer containing the encoded message. If the passed in
227 * |tmp| buffer is big enough to hold the encoded message then it returns |tmp|
235 uint8_t *encoded = NULL; in msg_encode() local
250 encoded = tmp; in msg_encode()
252 encoded = OPENSSL_zalloc(encoded_len); in msg_encode()
253 if (encoded == NULL) in msg_encode()
[all …]
/src/crypto/openssh/
H A Dssh-ed25519-sk.c131 struct sshbuf *encoded = NULL; in ssh_ed25519_sk_verify() local
203 if ((encoded = sshbuf_new()) == NULL) { in ssh_ed25519_sk_verify()
207 if (sshbuf_put(encoded, sigblob, len) != 0 || in ssh_ed25519_sk_verify()
208 sshbuf_put(encoded, apphash, sizeof(apphash)) != 0 || in ssh_ed25519_sk_verify()
209 sshbuf_put_u8(encoded, sig_flags) != 0 || in ssh_ed25519_sk_verify()
210 sshbuf_put_u32(encoded, sig_counter) != 0 || in ssh_ed25519_sk_verify()
211 sshbuf_put(encoded, msghash, sizeof(msghash)) != 0) { in ssh_ed25519_sk_verify()
217 sshbuf_dump(encoded, stderr); in ssh_ed25519_sk_verify()
219 sm = sshbuf_ptr(encoded); in ssh_ed25519_sk_verify()
220 smlen = sshbuf_len(encoded); in ssh_ed25519_sk_verify()
[all …]
/src/contrib/llvm-project/llvm/lib/Target/ARM/MCTargetDesc/
H A DARMFixupKinds.h24 // LDRD/LDRH/LDRB/etc. instructions. All bits are encoded.
27 // where the lower 2 bits are not encoded (so it's encoded as an 8-bit
34 // where bit 0 not encoded (so it's encoded as an 8-bit immediate).
42 // are not encoded (so it's encoded as an 8-bit immediate).
/src/contrib/llvm-project/llvm/lib/Target/AMDGPU/Utils/
H A DAMDGPUBaseInfo.h346 // Represents a field in an encoded value.
360 static ValueType decode(uint64_t Encoded) { return Encoded; } in decode()
363 // Represents a single bit in an encoded value.
373 static std::tuple<typename Fields::ValueType...> decode(uint64_t Encoded) { in decode()
374 return {Fields::decode((Encoded >> Fields::Offset) & in decode()
1006 Waitcnt decodeWaitcnt(const IsaVersion &Version, unsigned Encoded);
1008 /// \returns \p Waitcnt with encoded \p Vmcnt for given isa \p Version.
1012 /// \returns \p Waitcnt with encoded \p Expcnt for given isa \p Version.
1016 /// \returns \p Waitcnt with encoded \p Lgkmcnt for given isa \p Version.
1024 /// \details \p Vmcnt, \p Expcnt and \p Lgkmcnt are encoded as follows:
[all …]
/src/share/man/man5/
H A Dar.591 epoch, encoded as a decimal number.
93 (6 bytes) The uid associated with the archive member, encoded as a
96 (6 bytes) The gid associated with the archive member, encoded as a
99 (8 bytes) The file mode for the archive member, encoded as an octal
103 bytes of the archive member, encoded as a decimal number.
105 holds the size in bytes of the archive member, encoded as a decimal
114 archive member and its file name, encoded as a decimal number.
259 descriptors encoded as a C
285 containing the size in bytes of the string table, encoded as a C
/src/sys/contrib/openzfs/module/icp/algs/modes/
H A Dccm.c704 encode_adata_len(ulong_t auth_data_len, uint8_t *encoded, size_t *encoded_len) in encode_adata_len() argument
716 encoded[0] = (auth_data_len & 0xff00) >> 8; in encode_adata_len()
717 encoded[1] = auth_data_len & 0xff; in encode_adata_len()
723 encoded[0] = 0xff; in encode_adata_len()
724 encoded[1] = 0xfe; in encode_adata_len()
726 lencoded_ptr = (uint32_t *)&encoded[2]; in encode_adata_len()
729 encoded[2] = (auth_data_len & 0xff000000) >> 24; in encode_adata_len()
730 encoded[3] = (auth_data_len & 0xff0000) >> 16; in encode_adata_len()
731 encoded[4] = (auth_data_len & 0xff00) >> 8; in encode_adata_len()
732 encoded[5] = auth_data_len & 0xff; in encode_adata_len()
[all …]
/src/crypto/openssl/crypto/rsa/
H A Drsa_sign.c67 * initialized array containing the DER encoded DigestInfo for the specified
70 * |n| is last byte in the encoded OID for the digest.
292 const unsigned char *encoded = NULL; in RSA_sign() local
299 /* Compute the encoded digest. */ in RSA_sign()
311 encoded = m; in RSA_sign()
315 encoded = tmps; in RSA_sign()
322 encrypt_len = RSA_private_encrypt((int)encoded_len, encoded, sigret, rsa, in RSA_sign()
350 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local
357 /* Recover the encoded digest. */ in ossl_rsa_verify()
435 /* Construct the encoded digest and ensure it matches. */ in ossl_rsa_verify()
[all …]
/src/sys/contrib/device-tree/Bindings/powerpc/fsl/
H A Dpamu.txt13 - ranges : <prop-encoded-array>
20 - interrupts : <prop-encoded-array>
31 - reg : <prop-encoded-array>
51 - reg : <prop-encoded-array>
58 : <prop-encoded-array>
64 : <prop-encoded-array>
83 - fsl,liodn-reg : <prop-encoded-array>

12345678910>>...84