/barrelfish-master/lib/openssl-1.0.0d/demos/eay/ |
H A D | Makefile | 7 #EXAMPLES=base64 conn loadrsa 8 EXAMPLES=base64 loadrsa 12 base64: base64.o 13 $(CC) -o base64 base64.o $(LIBS)
|
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | testenc | 19 echo base64 43 echo $i base64
|
/barrelfish-master/lib/openssl-1.0.0d/ms/ |
H A D | tenc.bat | 9 echo test base64 %1 %2 %3 %4 %5 %6
|
H A D | tencce.bat | 12 echo test base64 %1 %2 %3 %4 %5 %6
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | rand.c | 71 * -base64 - base64 encode output 84 int base64 = 0; local 128 else if (strcmp(argv[i], "-base64") == 0) 130 if (!base64) 131 base64 = 1; 157 if (hex && base64) 172 BIO_printf(bio_err, "-base64 - base64 encode output\n"); 204 if (base64) [all...] |
H A D | enc.c | 116 int enc=1,printkey=0,i,base64=0; local 144 if (strcmp(pname,"base64") == 0) 145 base64=1; 153 if (!do_zlib && !base64 && (cipher == NULL) 156 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 210 base64=1; 211 else if (strcmp(*argv,"-base64") == 0) 212 base64=1; 301 BIO_printf(bio_err,"%-14s base64 encode/decode, depending on encryption flag\n","-a/-base64"); [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | bio_b64.c | 89 EVP_ENCODE_CTX base64; member in struct:b64_struct 96 BIO_TYPE_BASE64,"base64 encoding", 163 EVP_DecodeInit(&(ctx->base64)); 236 * base64 encoded stuff. */ 244 k=EVP_DecodeUpdate(&(ctx->base64), 248 EVP_DecodeInit(&ctx->base64); 259 EVP_DecodeInit(&ctx->base64); 339 i=EVP_DecodeUpdate(&(ctx->base64), 389 EVP_EncodeInit(&(ctx->base64)); 459 EVP_EncodeUpdate(&(ctx->base64), [all...] |
/barrelfish-master/lib/openssl-1.0.0d/demos/ |
H A D | b64.c | 88 int enc=1,printkey=0,i,base64=0; local 102 base64=1; 171 /* It must be large enough for a base64 encoded line */ 226 if (base64)
|
/barrelfish-master/usr/pci/ |
H A D | pci.c | 679 pciaddr_t base64 = 0, origbase64 = 0; local 680 base64 = bar_value_high; 681 base64 <<= 32; 682 base64 |= (uint32_t) (bar.base << 7); 691 origbase64 + bar_mapping_size64(base64)*vfn, 692 bar_mapping_size64(base64), 698 origbase64 + bar_mapping_size64(base64)*vfn, 699 bar_mapping_size64(base64), 1462 pciaddr_t base64 = 0, origbase64 = 0; local 1463 base64 [all...] |
/barrelfish-master/kernel/arch/armv7/ |
H A D | startup_arch.c | 417 uint64_t base64= mmap->base_addr; local 420 if(base64 > (uint64_t)UINT32_MAX) { 423 else if(base64 + (length64 - 1) > (uint64_t)UINT32_MAX) { 426 length64= ((uint64_t)UINT32_MAX - base64) + 1; 429 *base= (lpaddr_t)base64;
|
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | eap.c | 336 static char base64[] = variable 358 *outp++ = base64[(bs->bs_bits >> 18) & 0x3F]; 359 *outp++ = base64[(bs->bs_bits >> 12) & 0x3F]; 360 *outp++ = base64[(bs->bs_bits >> 6) & 0x3F]; 361 *outp++ = base64[bs->bs_bits & 0x3F]; 378 *outp++ = base64[(bs->bs_bits >> 2) & 0x3F]; 379 *outp++ = base64[(bs->bs_bits << 4) & 0x3F]; 382 *outp++ = base64[(bs->bs_bits >> 10) & 0x3F]; 383 *outp++ = base64[(bs->bs_bits >> 4) & 0x3F]; 384 *outp++ = base64[(b [all...] |
/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | eap.c | 336 static char base64[] = variable 358 *outp++ = base64[(bs->bs_bits >> 18) & 0x3F]; 359 *outp++ = base64[(bs->bs_bits >> 12) & 0x3F]; 360 *outp++ = base64[(bs->bs_bits >> 6) & 0x3F]; 361 *outp++ = base64[bs->bs_bits & 0x3F]; 378 *outp++ = base64[(bs->bs_bits >> 2) & 0x3F]; 379 *outp++ = base64[(bs->bs_bits << 4) & 0x3F]; 382 *outp++ = base64[(bs->bs_bits >> 10) & 0x3F]; 383 *outp++ = base64[(bs->bs_bits >> 4) & 0x3F]; 384 *outp++ = base64[(b [all...] |
/barrelfish-master/lib/libc/net/ |
H A D | Makefile.inc | 7 SRCS+= base64.c ether_addr.c eui64.c \
|
/barrelfish-master/lib/tommath/ |
H A D | tommath.tex | 5784 map are for the common representations up to hexadecimal. After that they match the ``base64'' encoding scheme which are suitable chosen 5785 such that they are printable. While outputting as base64 may not be too helpful for human operators it does allow communication via non binary
|