/netbsd-current/external/gpl3/gdb.old/dist/gas/testsuite/gas/arm/ |
H A D | thumb2_ldr_immediate_highregs_armv6t2.s | 5 # These must be encoded into mov.w despite constant and register being 15 # These shall be encoded into mov.w since register cannot be encoded in 23 # These shall be encoded into movw since immediate cannot be encoded 27 # These should be encoded as ldr since mov immediate is unpredictable
|
H A D | vfp-mov-enc.s | 7 @ Check that integer-encoded floating-point bit-patterns still work
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/ |
H A D | pemtest.c | 19 const char *encoded; member in struct:__anon458 39 const char *encoded = b64_pem_data[idx].encoded; local 43 || !TEST_true(BIO_printf(b, "%s\n", encoded)) 67 const char *encoded = b64_pem_data[0].encoded; local 71 || !TEST_true(BIO_printf(b, "%c%s\n", '\t', encoded))
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/wind/ |
H A D | idn-lookup.c | 67 char encoded[1024]; local 91 ep = encoded; 98 len = sizeof(encoded) - (ep - encoded); 110 printf("Converted \"%s\" into \"%s\"\n", name, encoded); 114 ret = getaddrinfo(encoded, NULL, &hints, &ai);
|
/netbsd-current/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/ |
H A D | argon2.c | 89 const size_t hashlen, char *encoded, const size_t encodedlen, 143 if (encoded && encodedlen) { 144 if (encode_string(encoded, encodedlen, &context, type) != ARGON2_OK) { 146 sodium_memzero(encoded, encodedlen); 162 const size_t saltlen, const size_t hashlen, char *encoded, 166 NULL, hashlen, encoded, encodedlen, Argon2_i); 183 const size_t saltlen, const size_t hashlen, char *encoded, 187 NULL, hashlen, encoded, encodedlen, Argon2_id); 201 argon2_verify(const char *encoded, const void *pwd, const size_t pwdlen, argument 218 encoded_len = strlen(encoded); 86 argon2_hash(const uint32_t t_cost, const uint32_t m_cost, const uint32_t parallelism, const void *pwd, const size_t pwdlen, const void *salt, const size_t saltlen, void *hash, const size_t hashlen, char *encoded, const size_t encodedlen, argon2_type type) argument 159 argon2i_hash_encoded(const uint32_t t_cost, const uint32_t m_cost, const uint32_t parallelism, const void *pwd, const size_t pwdlen, const void *salt, const size_t saltlen, const size_t hashlen, char *encoded, const size_t encodedlen) argument 180 argon2id_hash_encoded(const uint32_t t_cost, const uint32_t m_cost, const uint32_t parallelism, const void *pwd, const size_t pwdlen, const void *salt, const size_t saltlen, const size_t hashlen, char *encoded, const size_t encodedlen) argument 268 argon2i_verify(const char *encoded, const void *pwd, const size_t pwdlen) argument 274 argon2id_verify(const char *encoded, const void *pwd, const size_t pwdlen) argument [all...] |
H A D | argon2.h | 198 * Hashes a password with Argon2i, producing an encoded hash 207 * @param encoded Buffer where to write the encoded hash 208 * @param encodedlen Size of the buffer (thus max size of the encoded hash) 216 char *encoded, const size_t encodedlen); 219 * Hashes a password with Argon2id, producing an encoded hash 228 * @param encoded Buffer where to write the encoded hash 229 * @param encodedlen Size of the buffer (thus max size of the encoded hash) 237 char *encoded, cons [all...] |
/netbsd-current/external/apache2/argon2/dist/phc-winner-argon2/src/ |
H A D | argon2.c | 103 void *hash, const size_t hashlen, char *encoded, 165 if (encoded && encodedlen) { 166 if (encode_string(encoded, encodedlen, &context, type) != ARGON2_OK) { 168 clear_internal_memory(encoded, encodedlen); 183 char *encoded, const size_t encodedlen) { 186 NULL, hashlen, encoded, encodedlen, Argon2_i, 203 char *encoded, const size_t encodedlen) { 206 NULL, hashlen, encoded, encodedlen, Argon2_d, 223 char *encoded, const size_t encodedlen) { 226 NULL, hashlen, encoded, encodedle 100 argon2_hash(const uint32_t t_cost, const uint32_t m_cost, const uint32_t parallelism, const void *pwd, const size_t pwdlen, const void *salt, const size_t saltlen, void *hash, const size_t hashlen, char *encoded, const size_t encodedlen, argon2_type type, const uint32_t version) argument 179 argon2i_hash_encoded(const uint32_t t_cost, const uint32_t m_cost, const uint32_t parallelism, const void *pwd, const size_t pwdlen, const void *salt, const size_t saltlen, const size_t hashlen, char *encoded, const size_t encodedlen) argument 199 argon2d_hash_encoded(const uint32_t t_cost, const uint32_t m_cost, const uint32_t parallelism, const void *pwd, const size_t pwdlen, const void *salt, const size_t saltlen, const size_t hashlen, char *encoded, const size_t encodedlen) argument 219 argon2id_hash_encoded(const uint32_t t_cost, const uint32_t m_cost, const uint32_t parallelism, const void *pwd, const size_t pwdlen, const void *salt, const size_t saltlen, const size_t hashlen, char *encoded, const size_t encodedlen) argument 249 argon2_verify(const char *encoded, const void *pwd, const size_t pwdlen, argon2_type type) argument 315 argon2i_verify(const char *encoded, const void *pwd, const size_t pwdlen) argument 320 argon2d_verify(const char *encoded, const void *pwd, const size_t pwdlen) argument 325 argon2id_verify(const char *encoded, const void *pwd, const size_t pwdlen) argument [all...] |
H A D | run.c | 59 printf("\t-e\t\tOutput only encoded hash\n"); 81 Base64-encoded hash string 90 @encoded_only display only the encoded hash 101 char * encoded = NULL; local 128 encoded = malloc(encodedlen + 1); 129 if (!encoded) { 135 out, outlen, encoded, encodedlen, type, 143 puts(encoded); 150 free(encoded); 158 printf("Encoded:\t%s\n", encoded); [all...] |
H A D | test.c | 33 * encoded output matches expected 41 char encoded[ENCODED_LEN]; local 48 OUT_LEN, encoded, ENCODED_LEN, type, version); 56 assert(memcmp(encoded, mcfref, strlen(mcfref)) == 0); 59 ret = argon2_verify(encoded, pwd, strlen(pwd), type); 139 /* Handle an mismatching hash (the encoded password is "passwore") */ 219 /* Handle an mismatching hash (the encoded password is "passwore") */
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | ssh-ed25519-sk.c | 132 struct sshbuf *encoded = NULL; local 204 if ((encoded = sshbuf_new()) == NULL) { 208 if (sshbuf_put(encoded, sigblob, len) != 0 || 209 sshbuf_put(encoded, apphash, sizeof(apphash)) != 0 || 210 sshbuf_put_u8(encoded, sig_flags) != 0 || 211 sshbuf_put_u32(encoded, sig_counter) != 0 || 212 sshbuf_put(encoded, msghash, sizeof(msghash)) != 0) { 218 sshbuf_dump(encoded, stderr); 220 sm = sshbuf_ptr(encoded); 221 smlen = sshbuf_len(encoded); [all...] |
H A D | sshkey-xmss.c | 890 struct sshbuf *encrypted = NULL, *encoded = NULL, *padded = NULL; local 917 (encoded = sshbuf_new()) == NULL || 928 if ((r = sshbuf_put(encoded, XMSS_MAGIC, sizeof(XMSS_MAGIC))) != 0 || 929 (r = sshbuf_put_u32(encoded, state->idx)) != 0) 943 if ((r = sshbuf_put_u32(encoded, encrypted_len)) != 0) 945 aadlen = sshbuf_len(encoded); 948 if ((r = sshbuf_putb(encoded, padded)) != 0) 951 /* reserve space for encryption of encoded data plus auth tag */ 957 (r = cipher_crypt(ciphercontext, 0, cp, sshbuf_ptr(encoded), 969 sshbuf_free(encoded); 977 sshkey_xmss_decrypt_state(const struct sshkey *k, struct sshbuf *encoded, struct sshbuf **retp) argument [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/test/ |
H A D | pemtest.c | 19 const char *encoded; member in struct:__anon83 41 const char *encoded = b64_pem_data[idx].encoded; local 45 || !TEST_true(BIO_printf(b, "%s\n", encoded)) 69 const char *encoded = b64_pem_data[0].encoded; local 73 || !TEST_true(BIO_printf(b, "%c%s\n", '\t', encoded))
|
H A D | endecode_test.c | 131 void **encoded, long *encoded_len, 136 void **object, void *encoded, long encoded_len, 158 void *encoded = NULL; local 171 if (!TEST_true(encode_cb(file, line, &encoded, &encoded_len, pkey, selection, 176 if (TEST_false(decode_cb(file, line, (void **)&pkey2, encoded, 184 if (!TEST_true(check_cb(file, line, type, encoded, encoded_len)) 185 || !TEST_true(decode_cb(file, line, (void **)&pkey2, encoded, encoded_len, 191 && !TEST_true(decode_cb(file, line, (void **)&pkey3, encoded, encoded_len, 217 && !test_cb(file, line, encoded, encoded_len, encoded2, encoded2_len)) 223 if (encoded ! 238 encode_EVP_PKEY_prov(const char *file, const int line, void **encoded, long *encoded_len, void *object, int selection, const char *output_type, const char *output_structure, const char *pass, const char *pcipher) argument 279 decode_EVP_PKEY_prov(const char *file, const int line, void **object, void *encoded, long encoded_len, const char *input_type, const char *structure_type, const char *keytype, int selection, const char *pass) argument 354 encode_EVP_PKEY_legacy_PEM(const char *file, const int line, void **encoded, long *encoded_len, void *object, ossl_unused int selection, ossl_unused const char *output_type, ossl_unused const char *output_structure, const char *pass, const char *pcipher) argument 394 encode_EVP_PKEY_MSBLOB(const char *file, const int line, void **encoded, long *encoded_len, void *object, int selection, ossl_unused const char *output_type, ossl_unused const char *output_structure, ossl_unused const char *pass, ossl_unused const char *pcipher) argument 439 encode_EVP_PKEY_PVK(const char *file, const int line, void **encoded, long *encoded_len, void *object, int selection, ossl_unused const char *output_type, ossl_unused const char *output_structure, const char *pass, ossl_unused const char *pcipher) argument [all...] |
H A D | punycode_test.c | 20 const char *encoded; member in struct:puny_test 154 if (!TEST_true(ossl_punycode_decode(tc->encoded, strlen(tc->encoded),
|
/netbsd-current/external/gpl3/gdb.old/dist/gas/testsuite/gas/s12z/ |
H A D | ld-imm.s | 14 ;; The following two can be encoded using {CDEF}{AB}
|
/netbsd-current/external/apache2/argon2/dist/phc-winner-argon2/include/ |
H A D | argon2.h | 250 * Hashes a password with Argon2i, producing an encoded hash 259 * @param encoded Buffer where to write the encoded hash 260 * @param encodedlen Size of the buffer (thus max size of the encoded hash) 269 const size_t hashlen, char *encoded, 297 const size_t hashlen, char *encoded, 311 const size_t hashlen, char *encoded, 326 const size_t hashlen, char *encoded, 331 * Verifies a password against an encoded string 333 * @param encoded Strin [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
H A D | rsa_sign.c | 74 const unsigned char *encoded = NULL; local 80 /* Compute the encoded digest. */ 92 encoded = m; 96 encoded = tmps; 103 encrypt_len = RSA_private_encrypt(encoded_len, encoded, sigret, rsa, 129 unsigned char *decrypt_buf = NULL, *encoded = NULL; local 136 /* Recover the encoded digest. */ 214 /* Construct the encoded digest and ensure it matches. */ 215 if (!encode_pkcs1(&encoded, &encoded_len, type, m, m_len)) 219 || memcmp(encoded, decrypt_bu [all...] |
/netbsd-current/external/bsd/openldap/dist/contrib/ldapc++/src/ |
H A D | LDAPUrl.cpp | 344 std::string encoded = ""; local 349 url << "[" << this->percentEncode(m_Host, encoded) << "]"; 351 url << this->percentEncode(m_Host, encoded, PCT_ENCFLAG_SLASH); 359 encoded = ""; 361 this->percentEncode( m_DN, encoded ); 362 url << encoded; local 371 this->percentEncode( *i, encoded ); 377 url << encoded; local 392 this->percentEncode( m_Filter, encoded ); 393 url << qm << "?" << encoded; local 411 url << encoded; local [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/rsa/ |
H A D | rsa_sign.c | 64 * initialized array containing the DER encoded DigestInfo for the specified 67 * |n| is last byte in the encoded OID for the digest. 279 const unsigned char *encoded = NULL; local 286 /* Compute the encoded digest. */ 298 encoded = m; 302 encoded = tmps; 309 encrypt_len = RSA_private_encrypt((int)encoded_len, encoded, sigret, rsa, 337 unsigned char *decrypt_buf = NULL, *encoded = NULL; local 344 /* Recover the encoded digest. */ 424 /* Construct the encoded diges [all...] |
/netbsd-current/external/gpl3/gdb.old/dist/sim/common/ |
H A D | hw-device.h | 291 /* Address/size specs for devices are encoded following a convention 331 const char *encoded, 334 #define hw_unit_decode(bus, encoded, unit) \ 335 ((bus)->to_unit_decode (bus, encoded, unit)) 343 char *encoded, 346 #define hw_unit_encode(bus, unit, encoded, sizeof_encoded) \ 347 ((bus)->to_unit_encode (bus, unit, encoded, sizeof_encoded))
|
/netbsd-current/external/gpl3/gdb/dist/sim/common/ |
H A D | hw-device.h | 294 /* Address/size specs for devices are encoded following a convention 334 const char *encoded, 337 #define hw_unit_decode(bus, encoded, unit) \ 338 ((bus)->to_unit_decode (bus, encoded, unit)) 346 char *encoded, 349 #define hw_unit_encode(bus, unit, encoded, sizeof_encoded) \ 350 ((bus)->to_unit_encode (bus, unit, encoded, sizeof_encoded))
|
/netbsd-current/external/gpl3/gdb.old/dist/gas/testsuite/gas/msp430/ |
H A D | errata_fixes.s | 4 # CPU4: PUSH #4/#8 has to be encoded using the long form
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/libmj/ |
H A D | mj.c | 47 strnsave(const char *s, int n, int encoded) argument 57 switch (encoded) { 241 * optionally keep encoded quotes and null bytes 244 mj_snprint(char *buf, size_t size, mj_t *atom, int encoded) argument 263 switch (encoded) { 307 cc += mj_snprint(&buf[cc], size - cc, &atom->value.v[i], encoded); 316 cc += mj_snprint(&buf[cc], size - cc, &atom->value.v[i], encoded); 318 cc += mj_snprint(&buf[cc], size - cc, &atom->value.v[i + 1], encoded); 330 mj_asprint(char **buf, mj_t *atom, int encoded) argument 338 return mj_snprint(*buf, size, atom, encoded); [all...] |
/netbsd-current/external/gpl3/gcc/dist/libphobos/src/std/ |
H A D | base64.d | 21 * const(char)[] encoded = Base64.encode(data); 22 * assert(encoded == "FPucA9l+"); 38 * foreach (encoded; Base64.encoder(f.byChunk(57))) 40 * mime64.put(encoded); 70 const(char)[] encoded = Base64.encode(data); 71 assert(encoded == "FPucA9l+"); 174 * Calculates the length needed to store the encoded string corresponding 197 // Allocate a buffer large enough to hold the encoded string. 215 * buffer = The `char[]` buffer to store the encoded result. 218 * The slice of $(D_PARAM buffer) that contains the encoded strin [all...] |
/netbsd-current/external/gpl3/gdb/dist/gdb/ |
H A D | ada-lang.c | 447 /* If the decoded name starts with '<', it means that the encoded 841 /* Table of Ada operators and their GNAT-encoded names. Last entry is pair 930 /* The "encoded" form of DECODED, according to GNAT conventions. If 961 mapping->encoded != NULL 964 if (mapping->encoded == NULL) 971 encoding_buffer.append (mapping->encoded); 1153 /* The "encoded" form of DECODED, according to GNAT conventions. If 1186 ada_remove_trailing_digits (const char *encoded, int *len) 1188 if (*len > 1 && isdigit (encoded[*len - 1])) 1192 while (i > 0 && isdigit (encoded[ 1182 ada_remove_trailing_digits(const char *encoded, int *len) argument 1205 ada_remove_po_subprogram_suffix(const char *encoded, int *len) argument 1228 remove_compiler_suffix(const char *encoded, int *len) argument 1310 ada_decode(const char *encoded, bool wrap, bool operators) argument [all...] |