Searched refs:final (Results 1 - 25 of 344) sorted by relevance

1234567891011>>

/macosx-10.9.5/WebCore-7537.78.1/Modules/speech/
H A DSpeechRecognitionResult.cpp38 PassRefPtr<SpeechRecognitionResult> SpeechRecognitionResult::create(const Vector<RefPtr<SpeechRecognitionAlternative> >& alternatives, bool final) argument
40 return adoptRef(new SpeechRecognitionResult(alternatives, final));
51 SpeechRecognitionResult::SpeechRecognitionResult(const Vector<RefPtr<SpeechRecognitionAlternative> >& alternatives, bool final) argument
53 , m_final(final)
H A DSpeechRecognitionResult.h40 static PassRefPtr<SpeechRecognitionResult> create(const Vector<RefPtr<SpeechRecognitionAlternative> >&, bool final);
47 SpeechRecognitionResult(const Vector<RefPtr<SpeechRecognitionAlternative> >&, bool final);
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dmd5crypt.c55 unsigned char final[16]; local
96 MD5_Final(final, &ctx1);
99 MD5_Update(&ctx, final, pl > 16 ? 16 : pl);
102 memset(final, '\0', sizeof final);
107 MD5_Update(&ctx, final + j, 1);
114 MD5_Final(final, &ctx);
126 MD5_Update(&ctx1, final, 16);
135 MD5_Update(&ctx1, final, 16);
139 MD5_Final(final,
[all...]
/macosx-10.9.5/tcl-102/tcl_ext/tclx/tclx/tests/
H A Dtryeval.test63 global final
64 set final "finally-2.1"
67 global final
68 concat $result $final
88 global final
89 set final "finally-2.3"
93 global final
94 concat $result $final
105 global final
106 set final "finall
[all...]
/macosx-10.9.5/vim-53/src/
H A Dversion.h27 /* Used by MacOS port should be one of: development, alpha, beta, final */
28 #define VIM_VERSION_RELEASE final
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/lib/
H A Drc2Context.h45 bool final);
51 bool final);
H A Drc5Context.h44 bool final);
50 bool final);
H A DMacContext.h54 void final(CssmData &out);
57 void final(const CssmData &in);
59 size_t outputSize(bool final, size_t inSize);
86 void final(CssmData &out);
89 void final(const CssmData &in);
91 size_t outputSize(bool final, size_t inSize);
H A DRSA_asymmetric.h57 bool final);
63 bool final);
66 bool final, // ignored
H A DSignatureContext.h24 * and one RawSigner. Sign and Verify "updates" go to the DigestObject. The "final"
25 * operation consists of obtaining the final digest from the DigestObject and
63 void final(CssmData &out);
66 void final(const CssmData &in);
68 size_t outputSize(bool final, size_t inSize);
H A DascContext.h32 void final(
38 bool final = false,
48 * For first implementation, we have to cope with the fact that the final
51 * the final call. Hopefull we'll have time to fix deComcryptData() so this
H A DbfContext.h55 bool final);
61 bool final);
H A DcastContext.h66 bool final);
72 bool final);
H A Drc4Context.h45 void final(
51 bool final = false,
H A DdesContext.h52 bool final);
58 bool final);
83 bool final);
89 bool final);
H A DFEEAsymmetricContext.h59 bool final);
65 bool final);
74 bool final = false,
110 bool final);
116 bool final);
/macosx-10.9.5/cxxfilt-11/cxxfilt/binutils/
H A Dbudemang.c75 char *final; local
84 final = xmalloc (pre_len + len + suf_len);
86 memcpy (final, pre, pre_len);
87 memcpy (final + pre_len, res, len);
88 memcpy (final + pre_len + len, suf, suf_len);
90 res = final;
/macosx-10.9.5/vim-53/runtime/keymap/
H A Dhebrew_iso-8859-8.vim18 i <char-239> " � - final nun
21 l <char-234> " � - final kaf
24 o <char-237> " � - final mem
37 . <char-245> " � - final tsadi
38 ; <char-243> " � - final pe
H A Dhebrewp_iso-8859-8.vim10 K <char-234> " final kaf
11 M <char-237> " final mem
12 N <char-239> " final nun
13 P <char-243> " final pe
15 X <char-245> " final tsadi
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/md5crypt/
H A Dmd5cryptc.tcl61 unsigned char final[16];
96 MD5Final(final,&ctx1);
100 MD5Update(&ctx,final,pl>16 ? 16 : pl);
104 memset(final,0,sizeof final);
109 MD5Update(&ctx, final, 1);
118 MD5Final(final,&ctx);
130 MD5Update(&ctx1,final,16);
139 MD5Update(&ctx1,final,16);
142 MD5Final(final,
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_cspdl/lib/
H A DSSContext.h48 // mOutBuf provides a holding tank for implied final() operations
50 // is understood to only occur just prior to the final() call. To avoid
52 // SSContext actually perform the final() operation at this time,
53 // storing the result in mOutBuf. At final(), mOutBuf() is just copied
59 // final().
74 virtual size_t outputSize(bool final, size_t inSize);
78 virtual void final(CssmData &out);
81 virtual void final(const CssmData &in);
87 /* stash the context's key for final sign/verify */
105 virtual size_t outputSize(bool final, size_
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_sd_cspdl/lib/
H A DSDContext.h54 // mOutBuf provides a holding tank for implied final() operations
56 // is understood to only occur just prior to the final() call. To avoid
58 // SDContext actually perform the final() operation at this time,
59 // storing the result in mOutBuf. At final(), mOutBuf() is just copied
65 // final().
80 virtual size_t outputSize(bool final, size_t inSize);
84 virtual void final(CssmData &out);
87 virtual void final(const CssmData &in);
93 /* stash the context's key for final sign/verify */
111 virtual size_t outputSize(bool final, size_
[all...]
/macosx-10.9.5/ruby-104/ruby/test/openssl/
H A Dtest_cipher.rb42 s1 = @c1.update(@data) + @c1.final
43 s2 = @c2.update(@data) + @c2.final
48 assert_equal(@data, @c1.update(s1)+@c1.final, "decrypt")
49 assert_equal(@data, @c2.update(s2)+@c2.final, "decrypt")
66 s1 = @c1.update(@data) + @c1.final
67 s2 = tmpc.update(@data) + tmpc.final
75 s1 = @c1.update(@data) + @c1.final
77 s2 = @c1.update(@data) + @c1.final
88 assert_raise(RuntimeError) {OpenSSL::Cipher.allocate.final}
96 c = cipher.update('hello,world') + cipher.final
[all...]
/macosx-10.9.5/pdisk-9/
H A Dutil.c136 enum {development = 0x20, alpha = 0x40, beta = 0x60, final = 0x80, /* or */ release = 0x80}; enumerator in enum:__anon11716
142 case final: stage = 'f'; break;
147 if (kVersionStage == final) {
155 if (kVersionStage == final) {
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/libdes/src/
H A Dfcrypt.c156 /* crypto/des/fcrypt.c */ /* Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@mincom.oz.au). * The implementation was written so as to conform with Netscapes SSL. * * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code. The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@mincom.oz.au). * * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young (eay@mincom.oz.au)" * The word 'cryptographic' can be left out if the rouines from the library * being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from * the apps directory (application code) you must include an acknowledgement: * "This product includes software written by Tim Hudson (tjh@mincom.oz.au)" * * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */ #include <stdio.h> /* Eric Young. * This version of crypt has been developed from my MIT compatable * DES library. * The library is available at pub/Crypto/DES at ftp.psy.uq.oz.au * eay@mincom.oz.au or eay@psych.psy.uq.oz.au */ /* Modification by Jens Kupferschmidt (Cu) * I have included directive PARA for shared memory computers. * I have included a directive LONGCRYPT to using this routine to cipher * passwords with more then 8 bytes like HP-UX 10.x it used. The MAXPLEN * definition is the maximum of lenght of password and can changed. I have * defined 24. */ #define FCRYPT_MOD(R,u,t,E0,E1,tmp) \ u=R>>16; \ t=R^u; \ u=t&E0; t=t&E1; \ tmp=(u<<16); u^=R^s[S ]; u^=tmp; \ tmp=(t<<16); t^=R^s[S+1]; t^=tmp #define DES_FCRYPT #include "des_locl.h" #undef DES_FCRYPT #undef PERM_OP #define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\ (b)^=(t),\ (a)^=((t)<<(n))) #undef HPERM_OP #define HPERM_OP(a,t,n,m) ((t)=((((a)<<(16-(n)))^(a))&(m)),\ (a)=(a)^(t)^(t>>(16-(n))))\ #ifdef PARA #define STATIC #else #define STATIC static #endif /* It is really only FreeBSD that still suffers from MD5 based crypts */ #ifdef __FreeBSD__ #define MD5_CRYPT_SUPPORT 1 #endif #if MD5_CRYPT_SUPPORT /* * ---------------------------------------------------------------------------- * "THE BEER-WARE LICENSE" (Revision 42): * <phk@login.dknet.dk> wrote this file. As long as you retain this notice you * can do whatever you want with this stuff. If we meet some day, and you think * this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp * ---------------------------------------------------------------------------- */ #ifdef HAVE_CONFIG_H #include <config.h> #endif #include <md5.h> static unsigned char itoa64[] = /* 0 ... 63 => ascii - 64 */ "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; static void to64(s, v, n) char *s; unsigned long v; int n; { while (--n >= 0) { *s++ = itoa64[v&0x3f]; v >>= 6; } } /* * UNIX password * * Use MD5 for what it is best at... */ static char * crypt_md5(pw, salt) register const char *pw; register const char *salt; { static char *magic = "$1$"; /* * This string is magic for * this algorithm. Having * it this way, we can get * get better later on */ static char passwd[120], *p; static const char *sp,*ep; unsigned char final[16]; int sl,pl,i,j; MD5_CTX ctx,ctx1; unsigned long l; /* Refine the Salt first */ sp = salt; /* If it starts with the magic string, then skip that */ if(!strncmp(sp,magic,strlen(magic))) sp += strlen(magic); /* It stops at the first '$', max 8 chars */ for(ep=sp;*ep && *ep != '$' && ep < (sp+8);ep++) continue; /* get the length of the true salt */ sl = ep - sp; MD5Init(&ctx); /* The password first, since that is what is most unknown */ MD5Update(&ctx,pw,strlen(pw)); /* Then our magic string */ MD5Update(&ctx,magic,strlen(magic)); /* Then the raw salt */ MD5Update(&ctx,sp,sl); /* Then just as many characters of the MD5(pw,salt,pw) */ MD5Init(&ctx1); MD5Update(&ctx1,pw,strlen(pw)); MD5Update(&ctx1,sp,sl); MD5Update(&ctx1,pw,strlen(pw)); MD5Final(final,&ctx1); for(pl = strlen(pw); pl > 0; pl -= 16) MD5Update(&ctx,final,pl>16 ? 16 : pl); /* Don't leave anything around in vm they could use. */ memset(final,0,sizeof final); /* Then something really weird... */ for (j=0,i = strlen(pw); i ; i >>= 1) if(i&1) MD5Update(&ctx, final+j, 1); else MD5Update(&ctx, pw+j, 1); /* Now make the output string */ snprintf (passwd, sizeof(passwd), "%s%.*s$", magic, sl, sp); MD5Final(final,&ctx); /* * and now, just to make sure things don't run too fast * On a 60 Mhz Pentium this takes 34 msec, so you would * need 30 seconds to build a 1000 entry dictionary... */ for(i=0;i<1000;i++) { MD5Init(&ctx1); if(i & 1) MD5Update(&ctx1,pw,strlen(pw)); else MD5Update(&ctx1,final,16); if(i % 3) MD5Update(&ctx1,sp,sl); if(i % 7) MD5Update(&ctx1,pw,strlen(pw)); if(i & 1) MD5Update(&ctx1,final,16); else MD5Update(&ctx1,pw,strlen(pw)); MD5Final(final,
1 /* crypto/des/fcrypt.c */ local
[all...]

Completed in 326 milliseconds

1234567891011>>