/macosx-10.10.1/curl-83.1.2/curl/lib/ |
H A D | hash.c | 315 char *key1 = (char *)k1; local 319 *key1 == *key2 && 320 memcmp(key1, key2, key1_len) == 0) {
|
/macosx-10.10.1/BerkeleyDB-21/db/perl/DB_File/ |
H A D | DB_File.xs | 542 btree_compare(DB * db, const DBT *key1, const DBT *key2) 544 btree_compare(db, key1, key2) 546 const DBT * key1 ; 553 btree_compare(const DBT *key1, const DBT *key2) 555 btree_compare(key1, key2) 556 const DBT * key1 ; 578 data1 = (char *) key1->data ; 586 if (key1->size == 0) 601 PUSHs(sv_2mortal(newSVpvn((const char*)data1,key1->size))); 628 btree_prefix(DB * db, const DBT *key1, cons [all...] |
/macosx-10.10.1/OpenSSL098-52/src/test/ |
H A D | igetest.c | 123 const unsigned char key1[32]; member in struct:bi_ige_test 135 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, /* key1 */ 158 0x64, 0x28, 0x0f, 0x23, 0xad, 0x74, 0xac, 0x37 }, /* key1 */ 246 AES_KEY key1; local 254 AES_set_encrypt_key(v->key1, 8*v->keysize, &key1); 259 AES_set_decrypt_key(v->key1, 8*v->keysize, &key1); 263 AES_bi_ige_encrypt(v->in, buf, v->length, &key1, &key2, v->iv, 269 hexdump(stdout, "key 1", v->key1, sizeo [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_filedb/ |
H A D | DbIndex.cpp | 43 const ReadSection *key1, *key2; local 48 key1 = &mKey.mKeyData; 51 key1 = &rs1; 67 auto_ptr<DbValue> value1(metaAttribute.createValue(*key1, valueOffset1));
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_filedb/lib/ |
H A D | DbIndex.cpp | 43 const ReadSection *key1, *key2; local 48 key1 = &mKey.mKeyData; 51 key1 = &rs1; 67 auto_ptr<DbValue> value1(metaAttribute.createValue(*key1, valueOffset1));
|
/macosx-10.10.1/libresolv-57/ |
H A D | dst.h | 88 int dst_compare_keys(const DST_KEY *key1, const DST_KEY *key2);
|
H A D | dst_internal.h | 96 int (*compare)(const DST_KEY *key1, const DST_KEY *key2);
|
/macosx-10.10.1/pyobjc-45/pyobjc/pyobjc-core-2.5.1/PyObjCTest/ |
H A D | test_convenience.py | 73 o._.key1 = 1 76 self.assertEqual(o, {'key1': 1, 'key2': 2 })
|
/macosx-10.10.1/BerkeleyDB-21/db/test/ |
H A D | sdb010.tcl | 73 set key1 1 86 error_check_good dbput [eval {$db put} $txn {$key1 $data1}] 0
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/des/ |
H A D | des.h | 228 void DES_string_to_2keys(const char *str,DES_cblock *key1,DES_cblock *key2); 236 int DES_read_2passwords(DES_cblock *key1, DES_cblock *key2, const char *prompt,
|
/macosx-10.10.1/OpenSSL098-52/src/include/openssl/ |
H A D | des.h | 228 void DES_string_to_2keys(const char *str,DES_cblock *key1,DES_cblock *key2); 236 int DES_read_2passwords(DES_cblock *key1, DES_cblock *key2, const char *prompt,
|
/macosx-10.10.1/apache-793/httpd/modules/aaa/ |
H A D | mod_authz_dbm.c | 96 static apr_status_t get_dbm_grp(request_rec *r, char *key1, char *key2, argument 111 /* Try key2 only if key1 failed */ 112 if (!(val = get_dbm_entry_as_str(r->pool, f, key1))) {
|
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/ |
H A D | dst_internal.h | 175 isc_boolean_t (*compare)(const dst_key_t *key1, const dst_key_t *key2); 176 isc_boolean_t (*paramcompare)(const dst_key_t *key1,
|
H A D | hmac_link.c | 130 hmacmd5_compare(const dst_key_t *key1, const dst_key_t *key2) { argument 133 hkey1 = key1->keydata.hmacmd5; 406 hmacsha1_compare(const dst_key_t *key1, const dst_key_t *key2) { argument 409 hkey1 = key1->keydata.hmacsha1; 682 hmacsha224_compare(const dst_key_t *key1, const dst_key_t *key2) { argument 685 hkey1 = key1->keydata.hmacsha224; 960 hmacsha256_compare(const dst_key_t *key1, const dst_key_t *key2) { argument 963 hkey1 = key1->keydata.hmacsha256; 1238 hmacsha384_compare(const dst_key_t *key1, const dst_key_t *key2) { argument 1241 hkey1 = key1 1516 hmacsha512_compare(const dst_key_t *key1, const dst_key_t *key2) argument [all...] |
H A D | openssldh_link.c | 103 openssldh_compare(const dst_key_t *key1, const dst_key_t *key2) { argument 107 dh1 = key1->keydata.dh; 132 openssldh_paramcompare(const dst_key_t *key1, const dst_key_t *key2) { argument 136 dh1 = key1->keydata.dh;
|
H A D | gssapi_link.c | 255 gssapi_compare(const dst_key_t *key1, const dst_key_t *key2) { argument 256 gss_ctx_id_t gsskey1 = key1->keydata.gssctx;
|
/macosx-10.10.1/diskdev_cmds-576/vsdbutil.tproj/ |
H A D | vsdbutil_main.c | 698 static int CompareVSDBKeys(struct VSDBKey *key1, struct VSDBKey *key2); 1152 static int CompareVSDBKeys(struct VSDBKey *key1, struct VSDBKey *key2) { argument 1156 strncpy(id, key1->uuid, sizeof(key1->uuid)); 1157 id[sizeof(key1->uuid)] = (char)0; 1161 fprintf(stderr, "%s (%d.)...\n", id, sizeof(key1->uuid)); 1164 return memcmp(key1->uuid, key2->uuid, sizeof(key1->uuid));
|
/macosx-10.10.1/dtrace-147/tools/ctfconvert/ |
H A D | hash.c | 142 hash_remove_cb(void *key1, void *key2, hash_t *hash) argument 144 return (hash->h_cmp(key1, key2));
|
/macosx-10.10.1/ksh-23/ksh/src/cmd/ksh93/sh/ |
H A D | env.c | 61 static int compare(Dt_t *dt, Void_t* key1, Void_t* key2, Dtdisc_t* disc) argument 64 const unsigned char *s1=(unsigned const char*)key1;
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/signerAndSubjTp/ |
H A D | signerAndSubjTp.cpp | 88 static CSSM_BOOL compareKeyData(const CSSM_KEY *key1, const CSSM_KEY *key2); 890 static CSSM_BOOL compareKeyData(const CSSM_KEY *key1, const CSSM_KEY *key2) argument 892 if(key1->KeyData.Length != key2->KeyData.Length) { 895 if(memcmp(key1->KeyData.Data, 897 key1->KeyData.Length)) {
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecKey.c | 210 SecKeyRef key1 = (SecKeyRef)cf1; local 212 if (key1 == key2) 214 if (!key2 || key1->key_class != key2->key_class) 216 if (key1->key_class->extraBytes) 217 return !memcmp(key1->key, key2->key, key1->key_class->extraBytes); 221 d1 = SecKeyCopyAttributeDictionary(key1);
|
/macosx-10.10.1/ICU-531.30/icuSources/test/intltest/ |
H A D | regcoll.cpp | 1227 uint8_t key1[100], key2[100]; local 1230 len1 = calcKeyIncremental(coll, text1[i], -1, key1, sizeof(key1), status); 1241 if (len1 == len2 && uprv_memcmp(key1, key2, len1) == 0) { 1242 errln(UnicodeString("Failed: Identical key\n") + " text1: " + text1[i] + "\n" + " text2: " + text2[i] + "\n" + " key : " + TestUtility::hex(key1, len1)); 1244 logln(UnicodeString("Keys produced -\n") + " text1: " + text1[i] + "\n" + " key1 : " + TestUtility::hex(key1, len1) + "\n" + " text2: " + text2[i] + "\n" + " key2 : " 1283 CollationKey key1, key2; local 1294 col->getCollationKey(str1, len, key1, status); 1297 UCollationResult cmpKey = key1 [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cryptkit/ |
H A D | feePublicKey.h | 240 int feePubKeyIsEqual(feePubKey key1,
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cryptkit/lib/ |
H A D | feePublicKey.h | 240 int feePubKeyIsEqual(feePubKey key1,
|
/macosx-10.10.1/WTF-7600.1.24/wtf/ |
H A D | HashFunctions.h | 90 inline unsigned pairIntHash(unsigned key1, unsigned key2) argument 96 uint64_t product = longRandom * (shortRandom1 * key1 + shortRandom2 * key2);
|