| /third_party/mesa3d/src/util/format/ |
| H A D | u_format.csv | 38 # - channel encoding (only meaningful for plain layout), containing for each
66 PIPE_FORMAT_NONE , plain, 1, 1, 1, u8 , , , , x001, rgb
69 PIPE_FORMAT_B8G8R8A8_UNORM , plain, 1, 1, 1, un8 , un8 , un8 , un8 , zyxw, rgb
70 PIPE_FORMAT_B8G8R8X8_UNORM , plain, 1, 1, 1, un8 , un8 , un8 , x8 , zyx1, rgb
71 PIPE_FORMAT_B8G8R8X8_SNORM , plain, 1, 1, 1, sn8 , sn8 , sn8 , x8 , zyx1, rgb
72 PIPE_FORMAT_B8G8R8X8_UINT , plain, 1, 1, 1, up8 , up8 , up8 , x8 , zyx1, rgb
73 PIPE_FORMAT_B8G8R8X8_SINT , plain, 1, 1, 1, sp8 , sp8 , sp8 , x8 , zyx1, rgb
74 PIPE_FORMAT_A8R8G8B8_UNORM , plain, 1, 1, 1, un8 , un8 , un8 , un8 , yzwx, rgb
75 PIPE_FORMAT_A8R8G8B8_SNORM , plain, 1, 1, 1, sn8 , sn8 , sn8 , sn8 , yzwx, rgb
76 PIPE_FORMAT_A8R8G8B8_SINT , plain, [all...] |
| /third_party/node/test/fixtures/wpt/fetch/data-urls/resources/ |
| H A D | data-urls.json | 3 "text/plain;charset=US-ASCII", 8 "text/plain;charset=US-ASCII", 17 "text/plain;charset=US-ASCII", 20 "text/plain;charset=US-ASCII", 23 "text/plain;charset=US-ASCII", 25 ["data:text/plain,X", 26 "text/plain", 28 ["data:text/plain ,X", 29 "text/plain", 31 ["data:text/plain [all...] |
| /third_party/node/test/fixtures/ |
| H A D | aead-vectors.js | 4 iv: '583673497131313748307652', plain: 'Hello World!', 9 iv: '583673497131313748307652', plain: 'Hello World!', 14 iv: '583673497131313748307652', plain: 'Hello World!', 19 iv: '36306950306836764a6f4561', plain: 'Hello node.js world!', 24 iv: '36306950306836764a6f4561', plain: 'Hello node.js world!', 29 iv: '0e1791e9db3bd21a9122c416', plain: 'Hello node.js world!', 41 plain: '', 50 plain: '00000000000000000000000000000000', 59 plain: 'd9313225f88406e5a55909c5aff5269a' + 74 plain [all...] |
| /third_party/pulseaudio/speex/doc/ |
| H A D | manual.lyx | 73 \begin_layout Plain Layout 165 \begin_layout Plain Layout 289 \begin_layout Plain Layout 375 \begin_layout Plain Layout 408 \begin_layout Plain Layout 418 \begin_layout Plain Layout 428 \begin_layout Plain Layout 492 \begin_layout Plain Layout 512 \begin_layout Plain Layout 528 \begin_layout Plain Layou [all...] |
| /third_party/parse5/test/data/parser-feedback/ |
| H A D | scriptdata01.test | 129 "description": "FOO<script type=\"text/plain\"></scriptx>BAR", 130 "input": "FOO<script type=\"text/plain\"></scriptx>BAR", 140 "type": "text/plain" 427 "description": "FOO<script type=\"text/plain\">'<!-- <sCrIpt>'</script>BAR", 428 "input": "FOO<script type=\"text/plain\">'<!-- <sCrIpt>'</script>BAR", 438 "type": "text/plain" 449 "description": "FOO<script type=\"text/plain\">'<!-- <sCrIpt> -'</script>BAR", 450 "input": "FOO<script type=\"text/plain\">'<!-- <sCrIpt> -'</script>BAR", 460 "type": "text/plain" 471 "description": "FOO<script type=\"text/plain\">'<! [all...] |
| /third_party/node/test/fixtures/wpt/FileAPI/blob/ |
| H A D | Blob-slice.any.js | 183 "te\x09xt/plain", 184 "te\x00xt/plain", 185 "te\x1Fxt/plain", 186 "te\x7Fxt/plain" 200 "te(xt/plain", 201 "te)xt/plain", 202 "te<xt/plain", 203 "te>xt/plain", 204 "te@xt/plain", 205 "te,xt/plain", [all...] |
| H A D | Blob-slice.html | 189 "te\x09xt/plain", 190 "te\x00xt/plain", 191 "te\x1Fxt/plain", 192 "te\x7Fxt/plain" 206 "te(xt/plain", 207 "te)xt/plain", 208 "te<xt/plain", 209 "te>xt/plain", 210 "te@xt/plain", 211 "te,xt/plain", [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| H A D | crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, in crypto_cipher_encrypt() argument 110 if (plain != crypt) in crypto_cipher_encrypt() 111 os_memcpy(crypt, plain, len); in crypto_cipher_encrypt() 122 ctx->u.aes.cbc[j] ^= plain[j]; in crypto_cipher_encrypt() 126 plain += AES_BLOCK_SIZE; in crypto_cipher_encrypt() 136 ctx->u.des3.cbc[j] ^= plain[j]; in crypto_cipher_encrypt() 140 plain += 8; in crypto_cipher_encrypt() 150 ctx->u.des3.cbc[j] ^= plain[j]; in crypto_cipher_encrypt() 154 plain += 8; in crypto_cipher_encrypt() 167 u8 *plain, size_ in crypto_cipher_decrypt() 166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) crypto_cipher_decrypt() argument [all...] |
| H A D | crypto_libtomcrypt.c | 100 int aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) in aes_encrypt() argument 103 return aes_ecb_encrypt(plain, crypt, skey) == CRYPT_OK ? 0 : -1; in aes_encrypt() 129 int aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) in aes_decrypt() argument 132 return aes_ecb_encrypt(plain, (u8 *) crypt, skey) == CRYPT_OK ? 0 : -1; in aes_decrypt() 354 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, in crypto_cipher_encrypt() argument 360 if (plain != crypt) in crypto_cipher_encrypt() 361 os_memcpy(crypt, plain, len); in crypto_cipher_encrypt() 368 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); in crypto_cipher_encrypt() 379 u8 *plain, size_t len) in crypto_cipher_decrypt() 384 if (plain ! in crypto_cipher_decrypt() 378 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) crypto_cipher_decrypt() argument 615 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) crypto_public_key_decrypt_pkcs1() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| H A D | crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, in crypto_cipher_encrypt() argument 110 if (plain != crypt) in crypto_cipher_encrypt() 111 os_memcpy(crypt, plain, len); in crypto_cipher_encrypt() 122 ctx->u.aes.cbc[j] ^= plain[j]; in crypto_cipher_encrypt() 126 plain += AES_BLOCK_SIZE; in crypto_cipher_encrypt() 136 ctx->u.des3.cbc[j] ^= plain[j]; in crypto_cipher_encrypt() 140 plain += 8; in crypto_cipher_encrypt() 150 ctx->u.des3.cbc[j] ^= plain[j]; in crypto_cipher_encrypt() 154 plain += 8; in crypto_cipher_encrypt() 167 u8 *plain, size_ in crypto_cipher_decrypt() 166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) crypto_cipher_decrypt() argument [all...] |
| H A D | crypto_libtomcrypt.c | 100 int aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) in aes_encrypt() argument 103 return aes_ecb_encrypt(plain, crypt, skey) == CRYPT_OK ? 0 : -1; in aes_encrypt() 129 int aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) in aes_decrypt() argument 132 return aes_ecb_encrypt(plain, (u8 *) crypt, skey) == CRYPT_OK ? 0 : -1; in aes_decrypt() 354 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, in crypto_cipher_encrypt() argument 360 if (plain != crypt) in crypto_cipher_encrypt() 361 os_memcpy(crypt, plain, len); in crypto_cipher_encrypt() 368 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); in crypto_cipher_encrypt() 379 u8 *plain, size_t len) in crypto_cipher_decrypt() 384 if (plain ! in crypto_cipher_decrypt() 378 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) crypto_cipher_decrypt() argument 615 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) crypto_public_key_decrypt_pkcs1() argument [all...] |
| /base/security/device_auth/frameworks/deviceauth_lite/source/auth_info/ |
| H A D | remove_auth_info_client.c | 76 struct uint8_buff plain = { NULL, 0, 0 }; in build_remove_request_data() local 98 plain.val = tmp; in build_remove_request_data() 99 plain.length = strlen((const char *)tmp); in build_remove_request_data() 100 plain.size = plain.length + 1; in build_remove_request_data() 111 &plain, "hichain_remove_info_request", &payload); in build_remove_request_data() 125 struct uint8_buff plain = { 0, 0, 0 }; in parse_remove_response_data() local 127 &receive->cipher, "hichain_remove_info_response", &plain); in parse_remove_response_data() 129 (void)memset_s(plain.val, plain in parse_remove_response_data() [all...] |
| H A D | exchange_auth_info_client.c | 99 struct uint8_buff plain = { 0, 0, 0 }; in parse_exchange_response_data() local 100 int32_t ret = decrypt_payload((struct var_buffer *)key, &receive->cipher, HICHAIN_EXCHANGE_RESPONSE, &plain); in parse_exchange_response_data() 107 ret = get_field_from_request_payload(&plain, &sign_result, &cache->auth_id, &cache->ltpk); in parse_exchange_response_data() 110 (void)memset_s(plain.val, plain.size, 0, plain.size); in parse_exchange_response_data() 111 FREE(plain.val); in parse_exchange_response_data() 114 struct uint8_buff *auth_info = &plain; in parse_exchange_response_data() 116 (void)memset_s(plain.val, plain in parse_exchange_response_data() 153 struct uint8_buff plain; build_exchange_request() local [all...] |
| H A D | auth_info.c | 75 int32_t encrypt_payload(const struct var_buffer *key, const struct uint8_buff *plain, in encrypt_payload() argument 84 int32_t ret = aes_gcm_encrypt((struct var_buffer *)key, plain, &aes_aad, payload); in encrypt_payload() 94 const char *aad, struct uint8_buff *plain) in decrypt_payload() 96 plain->val = (uint8_t *)MALLOC(HC_AUTH_DECRYPT_LEN); in decrypt_payload() 97 if (plain->val == NULL) { in decrypt_payload() 101 plain->size = HC_AUTH_DECRYPT_LEN; in decrypt_payload() 102 plain->length = 0; in decrypt_payload() 103 (void)memset_s(plain->val, plain->size, 0, plain in decrypt_payload() 93 decrypt_payload(const struct var_buffer *key, const struct uint8_buff *payload, const char *aad, struct uint8_buff *plain) decrypt_payload() argument [all...] |
| H A D | remove_auth_info.c | 78 struct uint8_buff plain = { 0, 0, 0 }; in parse_remove_request_data() local 80 HICHAIN_REMOVE_INFO_REQUEST, &plain); in parse_remove_request_data() 85 ret = get_field_from_request_payload(&plain, &cache->user_type, &cache->auth_id); in parse_remove_request_data() 86 (void)memset_s(plain.val, plain.size, 0, plain.size); in parse_remove_request_data() 87 FREE(plain.val); in parse_remove_request_data() 88 plain.val = NULL; in parse_remove_request_data() 101 struct uint8_buff plain = { in build_remove_response_data() local 108 int32_t ret = encrypt_payload((const struct var_buffer *)key, &plain, in build_remove_response_data() [all...] |
| /third_party/python/Lib/test/test_email/ |
| H A D | test_headerregistry.py | 266 'text/plain; charset=us-ascii (Plain text)', 267 'text/plain', 269 'plain', 272 'text/plain; charset="us-ascii"'), 275 'text/plain; charset=us-ascii', 276 'text/plain', 278 'plain', 281 'text/plain; charset="us-ascii"'), 284 'text/plain; charse [all...] |
| H A D | test_message.py | 29 Content-Type: text/plain; charset="utf-8" 43 # The first argument is a triple (related, html, plain) of indices into the 95 Content-Type: text/plain 118 Content-Type: text/plain 140 Content-Type: text/plain 163 Content-Type: text/plain 186 Content-Type: text/plain 267 Content-Type: text/plain 322 Content-Type: text/plain 381 Content-Type: text/plain [all...] |
| H A D | torture_test.py | 62 text/plain 65 text/plain 76 text/plain 86 text/plain 88 text/plain 91 text/plain 103 text/plain 106 text/plain
|
| /third_party/node/test/parallel/ |
| H A D | test-crypto-authenticated-stream.js | 49 const plain = new stream.PassThrough(); 52 plain.pipe(c).pipe(crypt); 53 plain.end(expected); 61 const plain = new Sink(); 62 crypt.pipe(d).pipe(plain); 66 plain.on('close', common.mustCall(() => { 67 const actual = Buffer.concat(plain.chunks); 84 const plain = fs.createReadStream(filename('a')); 86 plain.pipe(c).pipe(crypt); 107 const plain [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | pkcs1.c | 136 u8 *plain, size_t *plain_len) in pkcs1_decrypt_public_key() 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) in pkcs1_decrypt_public_key() 157 plain[0] != 0x00 || plain[1] != 0x01) { in pkcs1_decrypt_public_key() 160 wpa_hexdump_key(MSG_DEBUG, "Signature EB", plain, len); in pkcs1_decrypt_public_key() 164 pos = plain + 3; in pkcs1_decrypt_public_key() 166 if (plain[2] != 0xff) { in pkcs1_decrypt_public_key() 169 wpa_hexdump_key(MSG_DEBUG, "Signature EB", plain, len); in pkcs1_decrypt_public_key() 172 while (pos < plain + len && *pos == 0xff) in pkcs1_decrypt_public_key() 175 if (pos - plain in pkcs1_decrypt_public_key() 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) pkcs1_decrypt_public_key() argument [all...] |
| /third_party/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/format/ |
| H A D | RelativeDateTimeFormatterTest.java | 411 {Direction.PLAIN, AbsoluteUnit.DAY, "day"}, in TestRelativeDateWithoutQuantity() 412 {Direction.PLAIN, AbsoluteUnit.WEEK, "week"}, in TestRelativeDateWithoutQuantity() 413 {Direction.PLAIN, AbsoluteUnit.MONTH, "month"}, in TestRelativeDateWithoutQuantity() 414 {Direction.PLAIN, AbsoluteUnit.QUARTER, "quarter"}, in TestRelativeDateWithoutQuantity() 415 {Direction.PLAIN, AbsoluteUnit.YEAR, "year"}, in TestRelativeDateWithoutQuantity() 416 {Direction.PLAIN, AbsoluteUnit.MONDAY, "Monday"}, in TestRelativeDateWithoutQuantity() 417 {Direction.PLAIN, AbsoluteUnit.TUESDAY, "Tuesday"}, in TestRelativeDateWithoutQuantity() 418 {Direction.PLAIN, AbsoluteUnit.WEDNESDAY, "Wednesday"}, in TestRelativeDateWithoutQuantity() 419 {Direction.PLAIN, AbsoluteUnit.THURSDAY, "Thursday"}, in TestRelativeDateWithoutQuantity() 420 {Direction.PLAIN, AbsoluteUni in TestRelativeDateWithoutQuantity() [all...] |
| /third_party/openssl/test/ |
| H A D | destest.c | 247 static unsigned char plain[24] = { variable 513 DES_cfb_encrypt(plain, cfb_buf1, bits, sizeof(plain), &ks, &cfb_tmp, in cfb_test() 515 if (!TEST_mem_eq(cfb_cipher, sizeof(plain), cfb_buf1, sizeof(plain))) in cfb_test() 518 DES_cfb_encrypt(cfb_buf1, cfb_buf2, bits, sizeof(plain), &ks, &cfb_tmp, in cfb_test() 520 return TEST_mem_eq(plain, sizeof(plain), cfb_buf2, sizeof(plain)); in cfb_test() 555 DES_cfb64_encrypt(plain, cfb_buf in test_des_cfb64() [all...] |
| /third_party/node/test/es-module/ |
| H A D | test-esm-invalid-data-urls.js | 6 await assert.rejects(import('data:text/plain,export default0'), { 9 'Unknown module format: text/plain for URL data:text/plain,' + 12 await assert.rejects(import('data:text/plain;base64,'), { 15 'Unknown module format: text/plain for URL data:text/plain;base64,',
|
| /third_party/PyYAML/examples/pygments-lexer/ |
| H A D | yaml.py | 144 """Process indentation spaces in a plain scalar.""" 240 # a plain scalar 242 something(Literal.Scalar.Plain), 243 'plain-scalar-in-block-context'), 294 # a plain scalar 296 something(Literal.Scalar.Plain), 297 'plain-scalar-in-flow-context'), 379 # the beginning of a new line while scanning a plain scalar 380 'plain-scalar-in-block-context-new-line': [ 391 # a plain scala [all...] |
| /third_party/python/Doc/library/ |
| H A D | email.iterators.rst | 62 text/plain 63 text/plain 66 text/plain 68 text/plain 70 text/plain 72 text/plain 74 text/plain 75 text/plain
|