/macosx-10.10/tcl-105/tcl_ext/tklib/tklib/modules/ctext/ |
H A D | pkgIndex.tcl | 1 package ifneeded ctext 3.2 [list source [file join $dir ctext.tcl]]
|
H A D | ctext_scroll_test.tcl | 2 source ./ctext.tcl 5 ctext .t -xscrollcommand {.x set} -yscrollcommand {.y set} -wrap none
|
H A D | ctext_test_ws.tcl | 2 source ./ctext.tcl 3 pack [ctext {.t blah}] 5 ctext::addHighlightClass {.t blah} c blue [list bat ball boot cat hat] 6 ctext::addHighlightClass {.t blah} c2 red [list bozo bull bongo]
|
H A D | install.tcl | 10 set idir [file join $::installPath ctext] 13 file copy -force ctext.tcl $idir
|
/macosx-10.10/OpenSSL098-52/src/fips/aes/ |
H A D | fips_aesavs.c | 250 unsigned char ctext[1001][32]; local 278 memcpy(ctext[0], text, len); 289 OutputValue(t_tag[dir^1],dir ? ptext[0] : ctext[0],len,rfp, 301 ptext[j], ctext[j], len); 303 memcpy(ptext[j+1], ctext[j], len); 305 memcpy(ctext[j+1], ptext[j], len); 311 EVP_Cipher(&ctx, ctext[j], ptext[j], len); 312 memcpy(ptext[j+1], ctext[j], len); 316 EVP_Cipher(&ctx, ptext[j], ctext[j], len); 317 memcpy(ctext[ [all...] |
/macosx-10.10/OpenSSL098-52/src/test/ |
H A D | fips_aesavs.c | 250 unsigned char ctext[1001][32]; local 278 memcpy(ctext[0], text, len); 289 OutputValue(t_tag[dir^1],dir ? ptext[0] : ctext[0],len,rfp, 301 ptext[j], ctext[j], len); 303 memcpy(ptext[j+1], ctext[j], len); 305 memcpy(ctext[j+1], ptext[j], len); 311 EVP_Cipher(&ctx, ctext[j], ptext[j], len); 312 memcpy(ptext[j+1], ctext[j], len); 316 EVP_Cipher(&ctx, ptext[j], ctext[j], len); 317 memcpy(ctext[ [all...] |
H A D | rsa_test.c | 216 unsigned char ctext[256]; local 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 257 num = RSA_private_decrypt(num, ctext, ptext, key, 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 283 num = RSA_private_decrypt(num, ctext, ptext, key, 290 else if (memcmp(ctext, ctext_ex, num) == 0) 311 unsigned char saved = ctext[n]; 316 ctext[n] = b; 317 num = RSA_private_decrypt(num, ctext, ptext, key,
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/threadTest/ |
H A D | desTest.cpp | 99 CSSM_DATA *ctext) 106 unsigned remCtext = ctext->Length; 123 ctext->Data, 135 ctext->Length = actLen; 137 ctext->Data + actLen, 146 ctext->Length += actLen; 155 CSSM_DATA *ctext, 183 ctext->Data, 184 ctext->Length, 219 CSSM_DATA ctext local 94 desEncrypt( TestParams *testParams, B_KEY_OBJ desKey, uint8 *initVector, CSSM_DATA *ptext, CSSM_DATA *ctext) argument 151 desDecrypt( TestParams *testParams, B_KEY_OBJ desKey, uint8 *initVector, CSSM_DATA *ctext, CSSM_DATA *ptext) argument [all...] |
H A D | symTestThr.cpp | 31 CSSM_DATA ctext = {0, NULL}; local 105 &ctext, 119 &ctext, 138 appFreeCssmData(&ctext, CSSM_FALSE);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ssl2Padding/ |
H A D | ssl2Padding.cpp | 111 CSSM_DATA *ctext) 126 ctext, 138 memmove(newCdata, ctext->Data, ctext->Length); 139 memmove(newCdata+ctext->Length, remData.Data, remData.Length); 140 CSSM_FREE(ctext->Data); 141 ctext->Data = newCdata; 143 ctext->Length = bytesMoved; 158 CSSM_DATA *ctext, 172 ctext, 105 doRsaEncrypt( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR key, CSSM_PADDING padding, CSSM_BOOL quiet, CSSM_DATA *ptext, CSSM_DATA *ctext) argument 152 doRsaDecrypt( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR key, CSSM_PADDING padding, CSSM_BOOL quiet, CSSM_RETURN expectRtn, CSSM_DATA *ctext, CSSM_DATA *rptext) argument 225 CSSM_DATA ctext = {0, NULL}; local [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/rsa/ |
H A D | rsa_test.c | 216 unsigned char ctext[256]; local 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 257 num = RSA_private_decrypt(num, ctext, ptext, key, 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 283 num = RSA_private_decrypt(num, ctext, ptext, key, 290 else if (memcmp(ctext, ctext_ex, num) == 0) 311 unsigned char saved = ctext[n]; 316 ctext[n] = b; 317 num = RSA_private_decrypt(num, ctext, ptext, key,
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/aesVect/ |
H A D | aesVect.c | 65 unsigned char ctext[MIN_AES_BLOCK_BYTES]; local 84 ctext); 87 printBigNum("CT", ctext, MIN_AES_BLOCK_BYTES); 100 unsigned char ctext[MIN_AES_BLOCK_BYTES]; local 120 ctext); 123 printBigNum("CT", ctext, MIN_AES_BLOCK_BYTES);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/wrap/ |
H A D | wrap.c | 53 CSSM_DATA ctext; local 126 ctext.Data = NULL; 127 ctext.Length = 0; 138 &ctext, 144 if(writeFile(argv[6], ctext.Data, ctext.Length)) { 168 ctext.Length, argv[6]); 217 ctext.Data = textFileData; 218 ctext.Length = textFileLen; 230 &ctext, [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/asymPerform/ |
H A D | asymPerform.c | 47 CSSM_DATA_PTR ctext; // ditto local 124 /* malloc encLoops ptext and ctext structs and the data they contain */ 126 ctext = (CSSM_DATA_PTR)CSSM_MALLOC(encLoops * sizeof(CSSM_DATA)); 129 memset(ctext, 0, encLoops * sizeof(CSSM_DATA)); 137 appSetupCssmData(&ctext[i], ctextSize); 189 &ctext[i], 193 ctext[i].Length = processed; 236 &ctext[i], 256 appFreeCssmData(&ctext[i], CSSM_FALSE); 260 CSSM_FREE(ctext); [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/cryptTool/ |
H A D | runCrypt | 12 set CIPHERTEXT_FILE=ctext
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/performRaw/ |
H A D | performRaw.cpp | 53 CSSM_DATA *ctext) 80 ctext, 1, &moved, &remData); 104 const CSSM_DATA *ctext, // pre-allocd 131 crtn = CSSM_DecryptData(ccHand, ctext, 1, 283 CSSM_DATA ctext; local 287 appSetupCssmData(&ctext, bufSize); 308 blockSizeBytes, encrAlg, mode, &ptext, &ctext); 320 blockSizeBytes, encrAlg, mode, &ctext, &rptext); 44 doEncrypt( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR symKey, CSSM_BOOL resetContext, unsigned iterations, uint8 blockSizeBytes, CSSM_ALGORITHMS encrAlg, CSSM_ENCRYPT_MODE encrMode, const CSSM_DATA *ptext, CSSM_DATA *ctext) argument 96 doDecrypt( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR symKey, CSSM_BOOL resetContext, unsigned iterations, uint8 blockSizeBytes, CSSM_ALGORITHMS encrAlg, CSSM_ENCRYPT_MODE encrMode, const CSSM_DATA *ctext, CSSM_DATA *rptext) argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/symTest/ |
H A D | symTest.c | 116 CSSM_BOOL expectEqualText) // ptext size must == ctext size 119 CSSM_DATA ctext = {0, NULL}; local 220 &ctext, 231 ctext.Data = (uint8 *)appMalloc(ptext->Length, NULL); 232 if(ctext.Data == NULL) { 237 ctext.Length = ptext->Length; 240 memmove(ctext.Data, ptext->Data, ptext->Length); 241 ptextPtr = &ctext; 254 &ctext, 261 if(expectEqualText && (ptext->Length != ctext [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/symReference/ |
H A D | symReference.cpp | 128 CSSM_DATA ctext = {0, NULL}; local 180 &ctext, 188 /* write: key, IV, ptext, ctext */ 192 writeFile(ctextFile, ctext.Data, (unsigned)ctext.Length)) { 208 CSSM_FREE(ctext.Data); 226 CSSM_DATA ctext; local 257 /* read: key, IV, ptext, ctext */ 281 ctext.Data = ctextChars; 282 ctext [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/pbeTest/ |
H A D | pbeTest.c | 234 * Writer debug - assertion failure when ctext[1].Data is NULL 251 CSSM_DATA_PTR ctext, // RETURNED 261 safeCtext[0] = *ctext; 265 // printf("+++ ctext[0] = %d:0x%x; ctext[1] = %d:0x%x\n", 266 // ctext[0].Length, ctext[0].Data, 267 // ctext[1].Length, ctext[1].Data); 291 ctext, 242 encryptCom(CSSM_CSP_HANDLE cspHand, const char *testName, CSSM_DATA_PTR ptext, CSSM_KEY_PTR key, CSSM_ALGORITHMS alg, CSSM_ENCRYPT_MODE mode, CSSM_PADDING padding, CSSM_DATA_PTR iv, uint32 effectiveKeySizeInBits, CSSM_DATA_PTR ctext, CSSM_BOOL quiet) argument 329 decryptCom(CSSM_CSP_HANDLE cspHand, const char *testName, CSSM_DATA_PTR ctext, CSSM_KEY_PTR key, CSSM_ALGORITHMS alg, CSSM_ENCRYPT_MODE mode, CSSM_PADDING padding, CSSM_DATA_PTR iv, uint32 effectiveKeySizeInBits, CSSM_DATA_PTR ptext, CSSM_BOOL quiet) argument 488 CSSM_DATA ctext; local [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/plugins/ |
H A D | digestmd5.c | 3381 client_context_t *ctext = (client_context_t *) text; local 3406 switch (ctext->protection) { 3411 oparams->mech_ssf = ctext->cipher->ssf; 3413 nbits = ctext->cipher->n; 3414 text->cipher_enc = ctext->cipher->cipher_enc; 3415 text->cipher_dec = ctext->cipher->cipher_dec; 3416 text->cipher_free = ctext->cipher->cipher_free; 3417 text->cipher_init = ctext->cipher->cipher_init; 3467 ctext->algorithm, 3475 ctext 3651 parse_server_challenge(client_context_t *ctext, sasl_client_params_t *params, const char *serverin, unsigned serverinlen, char ***outrealms, int *noutrealm) argument 4059 ask_user_info(client_context_t *ctext, sasl_client_params_t *params, char **realms, int nrealm, sasl_interact_t **prompt_need, sasl_out_params_t *oparams) argument 4245 digestmd5_client_mech_step1(client_context_t *ctext, sasl_client_params_t *params, const char *serverin __attribute__((unused)), unsigned serverinlen __attribute__((unused)), sasl_interact_t **prompt_need, const char **clientout, unsigned *clientoutlen, sasl_out_params_t *oparams) argument 4321 digestmd5_client_mech_step2(client_context_t *ctext, sasl_client_params_t *params, const char *serverin, unsigned serverinlen, sasl_interact_t **prompt_need, const char **clientout, unsigned *clientoutlen, sasl_out_params_t *oparams) argument 4394 digestmd5_client_mech_step3(client_context_t *ctext, sasl_client_params_t *params, const char *serverin, unsigned serverinlen, sasl_interact_t **prompt_need __attribute__((unused)), const char **clientout __attribute__((unused)), unsigned *clientoutlen __attribute__((unused)), sasl_out_params_t *oparams) argument 4511 client_context_t *ctext = (client_context_t *) conn_context; local 4595 client_context_t *ctext = (client_context_t *) conn_context; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_cryptkit/ |
H A D | feeDES.c | 448 const unsigned char *ctext; local 466 ctext = cipherText; 484 ctext, 513 ctext += DES_BLOCK_SIZE_BYTES;
|
H A D | feeFEEDExp.c | 548 unsigned char *ctext; // per block local 566 ctext = (unsigned char*) fmalloc(feeFEEDExpCipherBufSize(feed)); 586 ctext, 599 bcopy(ctext, ctextPtr, ctextLen); 614 ffree(ctext); 628 printf("ptext %d exp ctext %d actual ctext %d\n", 645 const unsigned char *ctext; local 670 ctext = cipherText; 685 ctext, [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cryptkit/lib/ |
H A D | feeDES.c | 448 const unsigned char *ctext; local 466 ctext = cipherText; 484 ctext, 513 ctext += DES_BLOCK_SIZE_BYTES;
|
H A D | feeFEEDExp.c | 548 unsigned char *ctext; // per block local 566 ctext = (unsigned char*) fmalloc(feeFEEDExpCipherBufSize(feed)); 586 ctext, 599 bcopy(ctext, ctextPtr, ctextLen); 614 ffree(ctext); 628 printf("ptext %d exp ctext %d actual ctext %d\n", 645 const unsigned char *ctext; local 670 ctext = cipherText; 685 ctext, [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/utilLib/ |
H A D | cspwrap.c | 1238 CSSM_DATA_PTR ctext, // RETURNED 1239 CSSM_BOOL mallocCtext) // if true, and ctext empty, malloc 1263 if(mallocCtext && (ctext->Length == 0)) { 1282 ctext->Data = (uint8 *) 1284 if(ctext->Data == NULL) { 1289 ctext->Length = origCtextLen = querySize.SizeOutputBlock; 1290 memset(ctext->Data, 0, ctext->Length); 1294 origCtextLen = ctext->Length; 1299 ctext, 1228 cspEncrypt(CSSM_CSP_HANDLE cspHand, uint32 algorithm, uint32 mode, CSSM_PADDING padding, const CSSM_KEY *key, const CSSM_KEY *pubKey, uint32 effectiveKeySizeInBits, uint32 rounds, const CSSM_DATA *iv, const CSSM_DATA *ptext, CSSM_DATA_PTR ctext, CSSM_BOOL mallocCtext) argument 1358 cspStagedEncrypt(CSSM_CSP_HANDLE cspHand, uint32 algorithm, uint32 mode, CSSM_PADDING padding, const CSSM_KEY *key, const CSSM_KEY *pubKey, uint32 effectiveKeySizeInBits, uint32 cipherBlockSize, uint32 rounds, const CSSM_DATA *iv, const CSSM_DATA *ptext, CSSM_DATA_PTR ctext, CSSM_BOOL multiUpdates) argument 1542 cspDecrypt(CSSM_CSP_HANDLE cspHand, uint32 algorithm, uint32 mode, CSSM_PADDING padding, const CSSM_KEY *key, const CSSM_KEY *pubKey, uint32 effectiveKeySizeInBits, uint32 rounds, const CSSM_DATA *iv, const CSSM_DATA *ctext, CSSM_DATA_PTR ptext, CSSM_BOOL mallocPtext) argument 1668 cspStagedDecrypt(CSSM_CSP_HANDLE cspHand, uint32 algorithm, uint32 mode, CSSM_PADDING padding, const CSSM_KEY *key, const CSSM_KEY *pubKey, uint32 effectiveKeySizeInBits, uint32 cipherBlockSize, uint32 rounds, const CSSM_DATA *iv, const CSSM_DATA *ctext, CSSM_DATA_PTR ptext, CSSM_BOOL multiUpdates) argument [all...] |