Searched refs:key2 (Results 1 - 25 of 137) sorted by relevance

123456

/macosx-10.9.5/CPANInternal-140/Readonly/t/
H A Ddeeph.t22 eval {Readonly::Hash %h1 => (key1 => \$m1, key2 => {x => 5, z => [1, 2, 3]})};
24 eval {Readonly::Hash1 %h2 => (key1 => \$m1, key2 => {x => 5, z => [1, 2, 3]})};
41 eval {$h1{key2}{z}[1] = 42};
43 is $h1{key2}{z}[1] => 2, 'h1 unchanged';
45 eval {$h2{key2}{z}[2] = 42};
47 is $h2{key2}{z}[2], 42, 'h2 mod successful';
H A Dreadonly.t29 eval q{Readonly \my %roh => (key1 => "value", key2 => "value2")};
32 eval q{Readonly \my %roh => (key1 => "value", "key2")};
35 eval q{Readonly \my %roh2 => (key1 => "value", key2 => "value2"); $roh2{key1}="value"};
38 eval q{Readonly \my %roh => {key1 => "value", key2 => "value2"}};
41 eval q{Readonly \my %roh2 => {key1 => "value", key2 => "value2"}; $roh2{key1}="value"};
61 eval q{Readonly my %roh => (key1 => "value", key2 => "value2")};
64 eval q{Readonly my %roh => (key1 => "value", "key2")};
67 eval q{Readonly my %roh2 => (key1 => "value", key2 => "value2"); $roh2{key1}="value"};
70 eval q{Readonly my %roh => {key1 => "value", key2 => "value2"}};
73 eval q{Readonly my %roh2 => {key1 => "value", key2
[all...]
/macosx-10.9.5/CPANInternal-140/Readonly-1.03/t/
H A Ddeeph.t22 eval {Readonly::Hash %h1 => (key1 => \$m1, key2 => {x => 5, z => [1, 2, 3]})};
24 eval {Readonly::Hash1 %h2 => (key1 => \$m1, key2 => {x => 5, z => [1, 2, 3]})};
41 eval {$h1{key2}{z}[1] = 42};
43 is $h1{key2}{z}[1] => 2, 'h1 unchanged';
45 eval {$h2{key2}{z}[2] = 42};
47 is $h2{key2}{z}[2], 42, 'h2 mod successful';
H A Dreadonly.t29 eval q{Readonly \my %roh => (key1 => "value", key2 => "value2")};
32 eval q{Readonly \my %roh => (key1 => "value", "key2")};
35 eval q{Readonly \my %roh2 => (key1 => "value", key2 => "value2"); $roh2{key1}="value"};
38 eval q{Readonly \my %roh => {key1 => "value", key2 => "value2"}};
41 eval q{Readonly \my %roh2 => {key1 => "value", key2 => "value2"}; $roh2{key1}="value"};
61 eval q{Readonly my %roh => (key1 => "value", key2 => "value2")};
64 eval q{Readonly my %roh => (key1 => "value", "key2")};
67 eval q{Readonly my %roh2 => (key1 => "value", key2 => "value2"); $roh2{key1}="value"};
70 eval q{Readonly my %roh => {key1 => "value", key2 => "value2"}};
73 eval q{Readonly my %roh2 => {key1 => "value", key2
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/otp/
H A Dotp_verify.c44 OtpKey key1, key2; local
50 memcpy (key2, key1, sizeof(key1));
51 ctx->alg->next (key2);
52 if (memcmp (ctx->key, key2, sizeof(key2)) == 0) {
H A Dotptest.c46 OtpKey key2; local
54 if (otp_parse (key2, buf, alg)) {
58 if (memcmp (key1, key2, OTPKEYSIZE) != 0) {
59 printf ("key1 != key2, ");
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/libdes/src/
H A Dstr2key.c103 /* crypto/des/str2key.c */ /* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@mincom.oz.au). * The implementation was written so as to conform with Netscapes SSL. * * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@mincom.oz.au). * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young (eay@mincom.oz.au)" * The word 'cryptographic' can be left out if the rouines from the library * being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from * the apps directory (application code) you must include an acknowledgement: * "This product includes software written by Tim Hudson (tjh@mincom.oz.au)" * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */ #include "des_locl.h" extern int des_check_key; void des_string_to_key(str, key) char *str; des_cblock (*key); { des_key_schedule ks; int i,length; register unsigned char j; memset(key,0,8); length=strlen(str); #ifdef OLD_STR_TO_KEY for (i=0; i<length; i++) (*key)[i%8]^=(str[i]<<1); #else /* MIT COMPATIBLE */ for (i=0; i<length; i++) { j=str[i]; if ((i%16) < 8) (*key)[i%8]^=(j<<1); else { /* Reverse the bit order 05/05/92 eay */ j=((j<<4)&0xf0)|((j>>4)&0x0f); j=((j<<2)&0xcc)|((j>>2)&0x33); j=((j<<1)&0xaa)|((j>>1)&0x55); (*key)[7-(i%8)]^=j; } } #endif des_set_odd_parity((des_cblock *)key); i=des_check_key; des_check_key=0; des_set_key((des_cblock *)key,ks); des_check_key=i; des_cbc_cksum((des_cblock *)str,(des_cblock *)key,(long)length,ks, (des_cblock *)key); memset(ks,0,sizeof(ks)); des_set_odd_parity((des_cblock *)key); } void des_string_to_2keys(str, key1, key2) char *str; des_cblock (*key1); des_cblock (*key2); { des_key_schedule ks; int i,length; register unsigned char j; memset(key1,0,8); memset(key2,0,8); length=strlen(str); #ifdef OLD_STR_TO_KEY if (length <= 8) { for (i=0; i<length; i++) { (*key2)[i]=(*key1)[i]=(str[i]<<1); } } else { for (i=0; i<length; i++) { if ((i/8)&1) (*key2)[i%8]^=(str[i]<<1); else (*key1)[i%8]^=(str[i]<<1); } } #else /* MIT COMPATIBLE */ for (i=0; i<length; i++) { j=str[i]; if ((i%32) < 16) { if ((i%16) < 8) (*key1)[i%8]^=(j<<1); else (*key2)[i%8]^=(j<<1); } else { j=((j<<4)&0xf0)|((j>>4)&0x0f); j=((j<<2)&0xcc)|((j>>2)&0x33); j=((j<<1)&0xaa)|((j>>1)&0x55); if ((i%16) < 8) (*key1)[7-(i%8)]^=j; else (*key2)[7-(i%8)]^=j; } } if (length <= 8) memcpy(key2,key1,8); #endif des_set_odd_parity((des_cblock *)key1); des_set_odd_parity((des_cblock *)key2); i=des_check_key; des_check_key=0; des_set_key((des_cblock *)key1,ks); des_cbc_cksum((des_cblock *)str,(des_cblock *)key1,(long)length,ks, (des_cblock *)key1); des_set_key((des_cblock *)key2,k
[all...]
/macosx-10.9.5/xnu-2422.115.4/libsyscall/mach/servers/
H A Dkey_defs.h66 #define KEY_EQUAL(key1, key2) \
67 ((key1.key_longs[0] == key2.key_longs[0]) \
68 && (key1.key_longs[1] == key2.key_longs[1]) \
69 && (key1.key_longs[2] == key2.key_longs[2]) \
70 && (key1.key_longs[3] == key2.key_longs[3]))
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/gost/ns1/
H A Dsign.sh29 key2=`$KEYGEN -q -r $RANDFILE -a ECCGOST -n zone -f KSK $zone`
30 $DSFROMKEY -a gost $key2.key > dsset-gost
32 cat $infile $key1.key $key2.key > $zonefile
/macosx-10.9.5/ICU-511.35/icuSources/common/
H A Duelement.h72 * @param key2 The string for comparison
73 * @return true if key1 and key2 are equal, return false otherwise.
76 uhash_compareUnicodeString(const UElement key1, const UElement key2);
83 * @param key2 The string for comparison
84 * @return true if key1 and key2 are equal, return false otherwise.
87 uhash_compareCaselessUnicodeString(const UElement key1, const UElement key2);
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dns64/ns1/
H A Dsign.sh29 key2=`$KEYGEN -q -r $RANDFILE -fk $zone`
31 cat $infile $key1.key $key2.key > $zonefile
/macosx-10.9.5/curl-78.94.1/curl/packages/vms/
H A Dconfig_h.com208 $ key2 = f$element(1," ",line_in)
210 $ if key2 .nes. " " .and. key2 .nes. "" then goto rtldef_loop1
230 $ key2 = f$element(1," ",line_in)
232 $ if key2 .nes. " " .and. key2 .nes. "" then goto stardef_loop1
277 $ key2 = f$element(1," ",xline)
278 $ key2a = f$element(0,"_",key2)
279 $ key2b = f$element(1,"_",key2)
280 $ key2_len = f$length(key2)
[all...]
/macosx-10.9.5/ruby-104/ruby/test/openssl/
H A Dtest_pkey_dsa.rb10 key2 = OpenSSL::PKey::DSA.new(key.to_der)
11 assert(key2.private?)
173 key2 = OpenSSL::PKey.read(der)
174 assert(key2.private?)
175 assert_equal(der, key2.to_der)
182 key2 = OpenSSL::PKey.read(pem)
183 assert(key2.private?)
184 assert_equal(pem, key2.to_pem)
191 key2 = OpenSSL::PKey.read(der)
192 assert(!key2
[all...]
H A Dtest_ns_spki.rb19 key2 = OpenSSL::TestUtils::TEST_KEY_RSA2048
26 assert(!spki.verify(key2.public_key))
/macosx-10.9.5/RubyCocoa-80/RubyCocoa/tests/
H A Dtc_kvc_kvo.rb37 kvc_array_accessor :key1, :key2
42 @key1 = @key2 = []
63 kvc_accessor :key1, :key2 # 1st
64 kvc_accessor :key1, :key2 # 2nd
97 [:key1, :key2].each do |key|
128 [:key1, :key2].each do |key|
/macosx-10.9.5/tcl-102/tcl_ext/tclx/tclx/tests/
H A Dbsearch.test49 set key2 [format "KeyX:%04d" $cnt]
57 bsearch $testFH $key2 {} BsearchTestCmp
66 list [bsearch $testFH $key2 rec BsearchTestCmp] $rec
/macosx-10.9.5/BerkeleyDB-21/db/test/
H A Drpc006.tcl53 set key2 "key2"
60 set res [catch {$db put -txn $txn2 $key2 $data2} ret]
66 set res [catch {$db put -txn $txn2 $key2 $data2} ret]
/macosx-10.9.5/xnu-2422.115.4/libkern/crypto/
H A Dcorecrypto_aesxts.c44 const uint8_t *key2, int tweaklen __unused, // both keys are the same size for xts
64 enc->init(enc, xts->enc, keylen, key1, key2);
65 dec->init(dec, xts->dec, keylen, key1, key2);
41 xts_start(uint32_t cipher __unused, const uint8_t *IV __unused, const uint8_t *key1, int keylen, const uint8_t *key2, int tweaklen __unused, uint32_t num_rounds __unused, uint32_t options __unused, symmetric_xts *xts) argument
/macosx-10.9.5/xnu-2422.115.4/libkern/kxld/
H A Dkxld_dict.h58 typedef u_int (*kxld_dict_cmp)(const void *key1, const void *key2);
150 u_int kxld_dict_string_cmp(const void *key1, const void *key2)
152 u_int kxld_dict_uint32_cmp(const void *key1, const void *key2)
154 u_int kxld_dict_kxldaddr_cmp(const void *key1, const void *key2)
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/
H A Dfast.c41 krb5_keyblock *key2,
54 ret = krb5_crypto_init(context, key2, 0, &crypto2);
38 _krb5_fast_cf2(krb5_context context, krb5_keyblock *key1, const char *pepper1, krb5_keyblock *key2, const char *pepper2, krb5_keyblock *armorkey, krb5_crypto *armor_crypto) argument
/macosx-10.9.5/CommonCrypto-60049/lib/
H A DCommonCMAC.c61 static void ccGenAESSubKey(const struct ccmode_ecb *aesmode, ccecb_ctx *ctx, void *key1, void *key2) argument
79 leftshift_onebit(key1, key2);
82 xor_128(tmp,const_Rb, key2);
/macosx-10.9.5/objc4-551.1/runtime/
H A Dmaptable.mm65 static INLINE int isEqual(NXMapTable *table, const void *key1, const void *key2) {
66 return (key1 == key2) ? 1 : (table->prototype->isEqual)(table, key1, key2);
402 static int _mapPtrIsEqual(NXMapTable *table, const void *key1, const void *key2) {
403 return key1 == key2;
406 static int _mapStrIsEqual(NXMapTable *table, const void *key1, const void *key2) {
407 if (key1 == key2) return YES;
408 if (! key1) return ! strlen ((char *) key2);
409 if (! key2) return ! strlen ((char *) key1);
410 if (((char *) key1)[0] != ((char *) key2)[
[all...]
/macosx-10.9.5/xnu-2422.115.4/libkern/libkern/crypto/
H A Daesxts.h59 const uint8_t *key2, int tweaklen, // both keys are the same size for xts
/macosx-10.9.5/BerkeleyDB-21/db/java/src/com/sleepycat/util/keyrange/
H A DKeyRange.java188 public int compare(DatabaseEntry key1, DatabaseEntry key2) { argument
191 return comparator.compare(getByteArray(key1), getByteArray(key2));
195 key2.getData(), key2.getOffset(), key2.getSize());
/macosx-10.9.5/ICU-511.35/icuSources/test/intltest/
H A Duvectest.cpp70 UVectorTest_compareInt32(UElement key1, UElement key2) { argument
71 if (key1.integer > key2.integer) {
74 else if (key1.integer < key2.integer) {
82 UVectorTest_compareCstrings(const UElement key1, const UElement key2) { argument
83 return !strcmp((const char *)key1.pointer, (const char *)key2.pointer);
164 static UBool U_CALLCONV neverTRUE(const UElement /*key1*/, const UElement /*key2*/) {

Completed in 291 milliseconds

123456