/macosx-10.9.5/CPANInternal-140/Readonly/t/ |
H A D | deeph.t | 22 eval {Readonly::Hash %h1 => (key1 => \$m1, key2 => {x => 5, z => [1, 2, 3]})}; 24 eval {Readonly::Hash1 %h2 => (key1 => \$m1, key2 => {x => 5, z => [1, 2, 3]})}; 41 eval {$h1{key2}{z}[1] = 42}; 43 is $h1{key2}{z}[1] => 2, 'h1 unchanged'; 45 eval {$h2{key2}{z}[2] = 42}; 47 is $h2{key2}{z}[2], 42, 'h2 mod successful';
|
H A D | readonly.t | 29 eval q{Readonly \my %roh => (key1 => "value", key2 => "value2")}; 32 eval q{Readonly \my %roh => (key1 => "value", "key2")}; 35 eval q{Readonly \my %roh2 => (key1 => "value", key2 => "value2"); $roh2{key1}="value"}; 38 eval q{Readonly \my %roh => {key1 => "value", key2 => "value2"}}; 41 eval q{Readonly \my %roh2 => {key1 => "value", key2 => "value2"}; $roh2{key1}="value"}; 61 eval q{Readonly my %roh => (key1 => "value", key2 => "value2")}; 64 eval q{Readonly my %roh => (key1 => "value", "key2")}; 67 eval q{Readonly my %roh2 => (key1 => "value", key2 => "value2"); $roh2{key1}="value"}; 70 eval q{Readonly my %roh => {key1 => "value", key2 => "value2"}}; 73 eval q{Readonly my %roh2 => {key1 => "value", key2 [all...] |
/macosx-10.9.5/CPANInternal-140/Readonly-1.03/t/ |
H A D | deeph.t | 22 eval {Readonly::Hash %h1 => (key1 => \$m1, key2 => {x => 5, z => [1, 2, 3]})}; 24 eval {Readonly::Hash1 %h2 => (key1 => \$m1, key2 => {x => 5, z => [1, 2, 3]})}; 41 eval {$h1{key2}{z}[1] = 42}; 43 is $h1{key2}{z}[1] => 2, 'h1 unchanged'; 45 eval {$h2{key2}{z}[2] = 42}; 47 is $h2{key2}{z}[2], 42, 'h2 mod successful';
|
H A D | readonly.t | 29 eval q{Readonly \my %roh => (key1 => "value", key2 => "value2")}; 32 eval q{Readonly \my %roh => (key1 => "value", "key2")}; 35 eval q{Readonly \my %roh2 => (key1 => "value", key2 => "value2"); $roh2{key1}="value"}; 38 eval q{Readonly \my %roh => {key1 => "value", key2 => "value2"}}; 41 eval q{Readonly \my %roh2 => {key1 => "value", key2 => "value2"}; $roh2{key1}="value"}; 61 eval q{Readonly my %roh => (key1 => "value", key2 => "value2")}; 64 eval q{Readonly my %roh => (key1 => "value", "key2")}; 67 eval q{Readonly my %roh2 => (key1 => "value", key2 => "value2"); $roh2{key1}="value"}; 70 eval q{Readonly my %roh => {key1 => "value", key2 => "value2"}}; 73 eval q{Readonly my %roh2 => {key1 => "value", key2 [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/otp/ |
H A D | otp_verify.c | 44 OtpKey key1, key2; local 50 memcpy (key2, key1, sizeof(key1)); 51 ctx->alg->next (key2); 52 if (memcmp (ctx->key, key2, sizeof(key2)) == 0) {
|
H A D | otptest.c | 46 OtpKey key2; local 54 if (otp_parse (key2, buf, alg)) { 58 if (memcmp (key1, key2, OTPKEYSIZE) != 0) { 59 printf ("key1 != key2, ");
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/libdes/src/ |
H A D | str2key.c | 103 /* crypto/des/str2key.c */
/* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au)
* All rights reserved.
*
* This package is an SSL implementation written
* by Eric Young (eay@mincom.oz.au).
* The implementation was written so as to conform with Netscapes SSL.
*
* This library is free for commercial and non-commercial use as long as
* the following conditions are aheared to. The following conditions
* apply to all code found in this distribution, be it the RC4, RSA,
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
* included with this distribution is covered by the same copyright terms
* except that the holder is Tim Hudson (tjh@mincom.oz.au).
*
* Copyright remains Eric Young's, and as such any Copyright notices in
* the code are not to be removed.
* If this package is used in a product, Eric Young should be given attribution
* as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young (eay@mincom.oz.au)"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson (tjh@mincom.oz.au)"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
#include "des_locl.h"
extern int des_check_key;
void des_string_to_key(str, key)
char *str;
des_cblock (*key);
{
des_key_schedule ks;
int i,length;
register unsigned char j;
memset(key,0,8);
length=strlen(str);
#ifdef OLD_STR_TO_KEY
for (i=0; i<length; i++)
(*key)[i%8]^=(str[i]<<1);
#else /* MIT COMPATIBLE */
for (i=0; i<length; i++)
{
j=str[i];
if ((i%16) < 8)
(*key)[i%8]^=(j<<1);
else
{
/* Reverse the bit order 05/05/92 eay */
j=((j<<4)&0xf0)|((j>>4)&0x0f);
j=((j<<2)&0xcc)|((j>>2)&0x33);
j=((j<<1)&0xaa)|((j>>1)&0x55);
(*key)[7-(i%8)]^=j;
}
}
#endif
des_set_odd_parity((des_cblock *)key);
i=des_check_key;
des_check_key=0;
des_set_key((des_cblock *)key,ks);
des_check_key=i;
des_cbc_cksum((des_cblock *)str,(des_cblock *)key,(long)length,ks,
(des_cblock *)key);
memset(ks,0,sizeof(ks));
des_set_odd_parity((des_cblock *)key);
}
void des_string_to_2keys(str, key1, key2)
char *str;
des_cblock (*key1);
des_cblock (*key2);
{
des_key_schedule ks;
int i,length;
register unsigned char j;
memset(key1,0,8);
memset(key2,0,8);
length=strlen(str);
#ifdef OLD_STR_TO_KEY
if (length <= 8)
{
for (i=0; i<length; i++)
{
(*key2)[i]=(*key1)[i]=(str[i]<<1);
}
}
else
{
for (i=0; i<length; i++)
{
if ((i/8)&1)
(*key2)[i%8]^=(str[i]<<1);
else
(*key1)[i%8]^=(str[i]<<1);
}
}
#else /* MIT COMPATIBLE */
for (i=0; i<length; i++)
{
j=str[i];
if ((i%32) < 16)
{
if ((i%16) < 8)
(*key1)[i%8]^=(j<<1);
else
(*key2)[i%8]^=(j<<1);
}
else
{
j=((j<<4)&0xf0)|((j>>4)&0x0f);
j=((j<<2)&0xcc)|((j>>2)&0x33);
j=((j<<1)&0xaa)|((j>>1)&0x55);
if ((i%16) < 8)
(*key1)[7-(i%8)]^=j;
else
(*key2)[7-(i%8)]^=j;
}
}
if (length <= 8) memcpy(key2,key1,8);
#endif
des_set_odd_parity((des_cblock *)key1);
des_set_odd_parity((des_cblock *)key2);
i=des_check_key;
des_check_key=0;
des_set_key((des_cblock *)key1,ks);
des_cbc_cksum((des_cblock *)str,(des_cblock *)key1,(long)length,ks,
(des_cblock *)key1);
des_set_key((des_cblock *)key2,k [all...] |
/macosx-10.9.5/xnu-2422.115.4/libsyscall/mach/servers/ |
H A D | key_defs.h | 66 #define KEY_EQUAL(key1, key2) \ 67 ((key1.key_longs[0] == key2.key_longs[0]) \ 68 && (key1.key_longs[1] == key2.key_longs[1]) \ 69 && (key1.key_longs[2] == key2.key_longs[2]) \ 70 && (key1.key_longs[3] == key2.key_longs[3]))
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/gost/ns1/ |
H A D | sign.sh | 29 key2=`$KEYGEN -q -r $RANDFILE -a ECCGOST -n zone -f KSK $zone` 30 $DSFROMKEY -a gost $key2.key > dsset-gost 32 cat $infile $key1.key $key2.key > $zonefile
|
/macosx-10.9.5/ICU-511.35/icuSources/common/ |
H A D | uelement.h | 72 * @param key2 The string for comparison 73 * @return true if key1 and key2 are equal, return false otherwise. 76 uhash_compareUnicodeString(const UElement key1, const UElement key2); 83 * @param key2 The string for comparison 84 * @return true if key1 and key2 are equal, return false otherwise. 87 uhash_compareCaselessUnicodeString(const UElement key1, const UElement key2);
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dns64/ns1/ |
H A D | sign.sh | 29 key2=`$KEYGEN -q -r $RANDFILE -fk $zone` 31 cat $infile $key1.key $key2.key > $zonefile
|
/macosx-10.9.5/curl-78.94.1/curl/packages/vms/ |
H A D | config_h.com | 208 $ key2 = f$element(1," ",line_in) 210 $ if key2 .nes. " " .and. key2 .nes. "" then goto rtldef_loop1 230 $ key2 = f$element(1," ",line_in) 232 $ if key2 .nes. " " .and. key2 .nes. "" then goto stardef_loop1 277 $ key2 = f$element(1," ",xline) 278 $ key2a = f$element(0,"_",key2) 279 $ key2b = f$element(1,"_",key2) 280 $ key2_len = f$length(key2) [all...] |
/macosx-10.9.5/ruby-104/ruby/test/openssl/ |
H A D | test_pkey_dsa.rb | 10 key2 = OpenSSL::PKey::DSA.new(key.to_der) 11 assert(key2.private?) 173 key2 = OpenSSL::PKey.read(der) 174 assert(key2.private?) 175 assert_equal(der, key2.to_der) 182 key2 = OpenSSL::PKey.read(pem) 183 assert(key2.private?) 184 assert_equal(pem, key2.to_pem) 191 key2 = OpenSSL::PKey.read(der) 192 assert(!key2 [all...] |
H A D | test_ns_spki.rb | 19 key2 = OpenSSL::TestUtils::TEST_KEY_RSA2048 26 assert(!spki.verify(key2.public_key))
|
/macosx-10.9.5/RubyCocoa-80/RubyCocoa/tests/ |
H A D | tc_kvc_kvo.rb | 37 kvc_array_accessor :key1, :key2 42 @key1 = @key2 = [] 63 kvc_accessor :key1, :key2 # 1st 64 kvc_accessor :key1, :key2 # 2nd 97 [:key1, :key2].each do |key| 128 [:key1, :key2].each do |key|
|
/macosx-10.9.5/tcl-102/tcl_ext/tclx/tclx/tests/ |
H A D | bsearch.test | 49 set key2 [format "KeyX:%04d" $cnt] 57 bsearch $testFH $key2 {} BsearchTestCmp 66 list [bsearch $testFH $key2 rec BsearchTestCmp] $rec
|
/macosx-10.9.5/BerkeleyDB-21/db/test/ |
H A D | rpc006.tcl | 53 set key2 "key2" 60 set res [catch {$db put -txn $txn2 $key2 $data2} ret] 66 set res [catch {$db put -txn $txn2 $key2 $data2} ret]
|
/macosx-10.9.5/xnu-2422.115.4/libkern/crypto/ |
H A D | corecrypto_aesxts.c | 44 const uint8_t *key2, int tweaklen __unused, // both keys are the same size for xts 64 enc->init(enc, xts->enc, keylen, key1, key2); 65 dec->init(dec, xts->dec, keylen, key1, key2); 41 xts_start(uint32_t cipher __unused, const uint8_t *IV __unused, const uint8_t *key1, int keylen, const uint8_t *key2, int tweaklen __unused, uint32_t num_rounds __unused, uint32_t options __unused, symmetric_xts *xts) argument
|
/macosx-10.9.5/xnu-2422.115.4/libkern/kxld/ |
H A D | kxld_dict.h | 58 typedef u_int (*kxld_dict_cmp)(const void *key1, const void *key2); 150 u_int kxld_dict_string_cmp(const void *key1, const void *key2) 152 u_int kxld_dict_uint32_cmp(const void *key1, const void *key2) 154 u_int kxld_dict_kxldaddr_cmp(const void *key1, const void *key2)
|
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | fast.c | 41 krb5_keyblock *key2, 54 ret = krb5_crypto_init(context, key2, 0, &crypto2); 38 _krb5_fast_cf2(krb5_context context, krb5_keyblock *key1, const char *pepper1, krb5_keyblock *key2, const char *pepper2, krb5_keyblock *armorkey, krb5_crypto *armor_crypto) argument
|
/macosx-10.9.5/CommonCrypto-60049/lib/ |
H A D | CommonCMAC.c | 61 static void ccGenAESSubKey(const struct ccmode_ecb *aesmode, ccecb_ctx *ctx, void *key1, void *key2) argument 79 leftshift_onebit(key1, key2); 82 xor_128(tmp,const_Rb, key2);
|
/macosx-10.9.5/objc4-551.1/runtime/ |
H A D | maptable.mm | 65 static INLINE int isEqual(NXMapTable *table, const void *key1, const void *key2) { 66 return (key1 == key2) ? 1 : (table->prototype->isEqual)(table, key1, key2); 402 static int _mapPtrIsEqual(NXMapTable *table, const void *key1, const void *key2) { 403 return key1 == key2; 406 static int _mapStrIsEqual(NXMapTable *table, const void *key1, const void *key2) { 407 if (key1 == key2) return YES; 408 if (! key1) return ! strlen ((char *) key2); 409 if (! key2) return ! strlen ((char *) key1); 410 if (((char *) key1)[0] != ((char *) key2)[ [all...] |
/macosx-10.9.5/xnu-2422.115.4/libkern/libkern/crypto/ |
H A D | aesxts.h | 59 const uint8_t *key2, int tweaklen, // both keys are the same size for xts
|
/macosx-10.9.5/BerkeleyDB-21/db/java/src/com/sleepycat/util/keyrange/ |
H A D | KeyRange.java | 188 public int compare(DatabaseEntry key1, DatabaseEntry key2) { argument 191 return comparator.compare(getByteArray(key1), getByteArray(key2)); 195 key2.getData(), key2.getOffset(), key2.getSize());
|
/macosx-10.9.5/ICU-511.35/icuSources/test/intltest/ |
H A D | uvectest.cpp | 70 UVectorTest_compareInt32(UElement key1, UElement key2) { argument 71 if (key1.integer > key2.integer) { 74 else if (key1.integer < key2.integer) { 82 UVectorTest_compareCstrings(const UElement key1, const UElement key2) { argument 83 return !strcmp((const char *)key1.pointer, (const char *)key2.pointer); 164 static UBool U_CALLCONV neverTRUE(const UElement /*key1*/, const UElement /*key2*/) {
|