| /onnv-gate/usr/src/cmd/ssh/libssh/common/ |
| H A D | uuencode.c | 44 char *encoded, *p; in uudecode() local 47 encoded = xstrdup(src); in uudecode() 49 for (p = encoded; *p == ' ' || *p == '\t'; p++) in uudecode() 55 len = __b64_pton((u_char *) encoded, target, targsize); in uudecode() 56 xfree(encoded); in uudecode()
|
| H A D | ssh-gss.c | 55 char *encoded; member 85 if ((*p)->encoded) in ssh_gssapi_mech_oids_to_kexnames() 86 xfree((*p)->encoded); in ssh_gssapi_mech_oids_to_kexnames() 115 (new_gss_enc2oid[i])->encoded = enc_name; in ssh_gssapi_mech_oids_to_kexnames() 131 buffer_append(&buf, (*p)->encoded, strlen((*p)->encoded)); in ssh_gssapi_mech_oids_to_kexnames() 160 *kexname = xstrdup((*p)->encoded); in ssh_gssapi_mech_oid_to_kexname() 184 if (strcmp(kexname, (*p)->encoded) == 0) { in ssh_gssapi_oid_of_kexname() 201 char *encoded; in ssh_gssapi_encode_oid_for_kex() local 238 encoded = xmalloc(EVP_MD_size(evp_md)*2); in ssh_gssapi_encode_oid_for_kex() 240 encoded, EVP_MD_size(evp_md) * 2); in ssh_gssapi_encode_oid_for_kex() [all …]
|
| H A D | hostfile.c | 117 static char encoded[1024]; in host_hash() local 142 snprintf(encoded, sizeof(encoded), "%s%s%c%s", HASH_MAGIC, uu_salt, in host_hash() 145 return (encoded); in host_hash()
|
| /onnv-gate/usr/src/common/crypto/modes/ |
| H A D | ccm.c | 711 encode_adata_len(ulong_t auth_data_len, uint8_t *encoded, size_t *encoded_len) in encode_adata_len() argument 723 encoded[0] = (auth_data_len & 0xff00) >> 8; in encode_adata_len() 724 encoded[1] = auth_data_len & 0xff; in encode_adata_len() 730 encoded[0] = 0xff; in encode_adata_len() 731 encoded[1] = 0xfe; in encode_adata_len() 733 lencoded_ptr = (uint32_t *)(void *)&encoded[2]; in encode_adata_len() 736 encoded[2] = (auth_data_len & 0xff000000) >> 24; in encode_adata_len() 737 encoded[3] = (auth_data_len & 0xff0000) >> 16; in encode_adata_len() 738 encoded[4] = (auth_data_len & 0xff00) >> 8; in encode_adata_len() 739 encoded[5] = auth_data_len & 0xff; in encode_adata_len() [all …]
|
| /onnv-gate/usr/src/cmd/perl/5.8.4/distrib/ext/MIME/Base64/t/ |
| H A D | base64.t | 328 my $encoded = encode_base64($plain, ''); 329 if ($encoded ne $expected) { 330 print "test $testno ($plain): expected $expected, got $encoded\n"; 333 my $decoded = decode_base64($encoded); 335 print "test $testno ($encoded): expected $plain, got $decoded\n"; 369 my($encoded, $expected) = ($$test[0], $$test[1]); 371 my $decoded = decode_base64($encoded); 373 die "test $testno ($encoded): expected $expected, got $decoded\n";
|
| H A D | quoted-print.t | 14 # plain ascii should not be encoded 18 # 8-bit chars should be encoded 22 # trailing space should be encoded 100 ($plain, $encoded) = @$_; 106 if ($x ne $encoded) { 109 print "Expected: '$encoded'\n"; 113 $x = decode_qp($encoded);
|
| /onnv-gate/usr/src/common/openssl/doc/apps/ |
| H A D | crl2pkcs7.pod | 29 This specifies the CRL input format. B<DER> format is DER encoded CRL 30 structure.B<PEM> (the default) is a base64 encoded version of 36 encoded PKCS#7 structure.B<PEM> (the default) is a base64 encoded version of 81 the certificate enrollment process. This involves sending the DER encoded output 84 The B<PEM> encoded form with the header and footer lines removed can be used to
|
| H A D | sess_id.pod | 21 The B<sess_id> process the encoded version of the SSL session structure 31 This specifies the input format. The B<DER> option uses an ASN1 DER encoded 34 format base64 encoded with additional header and footer lines. 54 plain text in addition to the encoded version. 63 this option prevents output of the encoded version of the session. 133 The PEM encoded session format uses the header and footer lines:
|
| H A D | crl.pod | 33 This specifies the input format. B<DER> format is DER encoded CRL 34 structure. B<PEM> (the default) is a base64 encoded version of 58 don't output the encoded version of the CRL. 104 Output the text form of a DER encoded certificate:
|
| H A D | pkcs7.pod | 29 This specifies the input format. B<DER> format is DER encoded PKCS#7 30 v1.5 structure.B<PEM> (the default) is a base64 encoded version of 60 don't output the encoded version of the PKCS#7 structure (or certificates
|
| H A D | dsaparam.pod | 32 This specifies the input format. The B<DER> option uses an ASN1 DER encoded 35 of the B<DER> format base64 encoded with additional header and footer lines. 56 this option inhibits the output of the encoded version of the parameters.
|
| H A D | asn1parse.pod | 34 encoded. 42 output file to place the DER encoded data into. If this 74 generate encoded data based on B<string>, B<file> or both using 76 is obtained from the default section using the name B<asn1>. The encoded
|
| H A D | ecparam.pod | 37 This specifies the input format. The B<DER> option uses an ASN.1 DER encoded 39 format: it consists of the B<DER> format base64 encoded with additional 60 This option inhibits the output of the encoded version of the parameters. 97 This specifies how the elliptic curve parameters are encoded.
|
| H A D | dhparam.pod | 34 This specifies the input format. The B<DER> option uses an ASN1 DER encoded 36 default format: it consists of the B<DER> format base64 encoded with 89 this option inhibits the output of the encoded version of the parameters.
|
| H A D | ec.pod | 43 an ASN.1 DER encoded SEC1 private key. When used with a public key it 46 encoded with additional header and footer lines. In the case of a private key 94 this option prevents output of the encoded version of the key. 123 This specifies how the elliptic curve parameters are encoded.
|
| H A D | rsa.pod | 43 This specifies the input format. The B<DER> option uses an ASN1 DER encoded 46 encoded with additional header and footer lines. On input PKCS#8 format private 96 plain text in addition to the encoded version. 100 this option prevents output of the encoded version of the key.
|
| /onnv-gate/usr/src/common/openssl/doc/crypto/ |
| H A D | BIO_f_base64.pod | 23 used to signal that no more data is to be encoded: this is used 32 Because of the format of base64 encoding the end of the encoded 55 Read Base64 encoded data from standard input and write the decoded 73 The ambiguity of EOF in base64 encoded data can cause additional 74 data following the base64 encoded block to be misinterpreted.
|
| H A D | d2i_DSAPublicKey.pod | 59 The data encoded by the private key functions is unencrypted and therefore 65 The B<DSAPublicKey> functions use an non standard format the actual data encoded 67 If B<write_params> is zero then only the B<pub_key> field is encoded as an 69 B<p>, B<q>, B<g> and B<pub_key> respectively fields are encoded.
|
| H A D | ecdsa.pod | 67 B<sig> and writes the encoded signature to B<*pp> (note: if B<pp> 69 the DER encoded signature). B<i2d_ECDSA_SIG> returns the length 70 of the DER encoded signature (or 0 on error). 72 d2i_ECDSA_SIG() decodes a DER encoded ECDSA signature and returns 74 B<*sig> points to the buffer containing the DER encoded signature 77 ECDSA_size() returns the maximum length of a DER encoded 91 pre-computed values B<kinv> and B<rp>. The DER encoded signatures is
|
| H A D | d2i_X509.pod | 36 If B<out> is not B<NULL> is writes the DER encoded data to the buffer 39 returns the length of the encoded data. 42 allocated for a buffer and the encoded data written to it. In this 72 The encoded data is in binary form and may contain embedded zeroes. 75 of the encoded structure. 82 usage of ASN1 functions: after one structure is encoded or decoded 204 then the encoded structure may contain invalid data or omit the 216 successfully encoded or a negative value if an error occurs. The error code
|
| H A D | pem.pod | 184 this sense PEM format is simply base64 encoded data surrounded 216 structure. The public key is encoded as a SubjectPublicKeyInfo 224 RSA structure. The public key is encoded using a PKCS#1 RSAPublicKey 228 an RSA structure. However the public key is encoded using a 237 a DSA structure. The public key is encoded using a 242 structure. The parameters are encoded using a foobar structure. 245 structure. The parameters are encoded using a PKCS#3 DHparameter 444 ...base64 encoded data... 449 byte B<salt> encoded as a set of hexadecimal digits. 451 After this is the base64 encoded encrypted data.
|
| /onnv-gate/usr/src/cmd/perl/5.8.4/distrib/lib/PerlIO/via/t/ |
| H A D | QuotedPrint.t | 28 my $encoded = <<EOD; 34 # Create the encoded test-file 49 is( $encoded,readline( $test ), 'check encoded content' );
|
| /onnv-gate/usr/src/cmd/cmd-inet/usr.lib/in.dhcpd/ |
| H A D | dhcpd.h | 52 typedef struct encoded { struct 57 struct encoded *prev; /* previous in list */ argument 58 struct encoded *next; /* next in list */ argument
|
| /onnv-gate/usr/src/cmd/ssh/ssh-keygen/ |
| H A D | ssh-keygen.c | 337 char encoded[8096]; in do_convert_from_ssh2() local 353 encoded[0] = '\0'; in do_convert_from_ssh2() 372 strlcat(encoded, line, sizeof(encoded)); in do_convert_from_ssh2() 374 len = strlen(encoded); in do_convert_from_ssh2() 376 (encoded[len-1] == '=') && in do_convert_from_ssh2() 377 (encoded[len-2] == '=') && in do_convert_from_ssh2() 378 (encoded[len-3] == '=')) in do_convert_from_ssh2() 379 encoded[len-3] = '\0'; in do_convert_from_ssh2() 380 blen = uudecode(encoded, blob, sizeof(blob)); in do_convert_from_ssh2()
|
| /onnv-gate/usr/src/lib/print/libpapi-ipp/common/ |
| H A D | ipp-support.c | 423 char encoded[BUFSIZ]; in setAuthString() local 457 httpEncode64(encoded, plain); in setAuthString() 459 "Basic %s", encoded); in setAuthString() 482 md5_calc(encoded, line, strlen(line)); in setAuthString() 487 encoded); in setAuthString()
|