/macosx-10.9.5/CommonCrypto-60049/test/CommonCrypto/ |
H A D | CommonCryptoSymOffset.c | 55 size_t moved; 63 retval = CCCrypt(kCCEncrypt, kCCAlgorithmAES128, 0, key->bytes, key->len, NULL, iLikeBigBuffs+i, ILIKEEMDISBIG-16, andICannotLie+i, ILIKEEMDISBIG, &moved); 65 retval = CCCrypt(kCCDecrypt, kCCAlgorithmAES128, 0, key->bytes, key->len, NULL, andICannotLie+i, moved, iLikeEmRoundandBig+i, ILIKEEMDISBIG, &moved); 67 if(moved != (ILIKEEMDISBIG-16)) 69 else if(memcmp(iLikeBigBuffs+i, iLikeEmRoundandBig+i, moved))
|
H A D | CommonCryptoReset.c | 35 size_t moved; 50 retval = CCCryptorUpdate(cref, plain, 16, cipher1, 16, &moved); 52 ok((retval == kCCSuccess && moved == 16), "first update"); 54 retval = CCCryptorUpdate(cref, plain, 16, cipher2, 16, &moved); 56 ok((retval == kCCSuccess && moved == 16), "second (chained) update"); 64 retval = CCCryptorUpdate(cref, plain, 16, cipher3, 16, &moved); 66 ok((retval == kCCSuccess && moved == 16), "third update - NULL Reset"); 74 retval = CCCryptorUpdate(cref, plain, 16, cipher4, 16, &moved); 76 ok((retval == kCCSuccess && moved == 16), "fourth update - zero iv Reset"); 80 retval = CCCryptorUpdate(cref, plain, 16, cipher5, 16, &moved); [all...] |
H A D | CCCryptorTestFuncs.c | 26 size_t moved; local 32 if((retval = CCCryptorUpdate(cref, dataIn, dataInLength, dataOut, dataOutAvailable, &moved)) != kCCSuccess) { 36 dataOut += moved; 37 dataOutAvailable -= moved; 38 *dataOutMoved = moved; 40 if((retval = CCCryptorFinal(cref, dataOut, dataOutAvailable, &moved)) != kCCSuccess) { 44 *dataOutMoved += moved;
|
H A D | CommonRSA.c | 25 size_t moved = keySizeBytes; 27 ok(CCRSACryptorCrypt(pubKey, clear, keySizeBytes, cipher, &moved) == 0, "RSA Raw Crypt"); 28 ok(moved == keySizeBytes, "crypted keySizeBytes"); 29 ok(CCRSACryptorCrypt(privKey, cipher, keySizeBytes, decrypted, &moved) == 0, "RSA Raw Crypt"); 30 ok(moved == keySizeBytes, "crypted keySizeBytes"); 32 ok(bcmp(clear, decrypted, moved) == 0, "Results are what we started with"); 33 return bcmp(clear, decrypted, moved);
|
H A D | CommonCryptoOutputLength.c | 25 size_t moved = 0; 29 status = CCCryptorUpdate(cryptorRef, dataIn, bufferPos, dataOut, MAXOUT, &moved);
|
/macosx-10.9.5/Chess-310.5/sjeng/ |
H A D | epd.c | 120 moved[26] = moved[33] = moved[30] = 1; 121 moved[110] = moved[114] = moved[117] = 1; 132 moved[30] = moved[33] = 0; 135 moved[30] = moved[2 [all...] |
H A D | eval.c | 538 if (!white_castled && moved[30]) 542 if (!black_castled && moved[114]) 548 if (!moved[41] && board[53] != npiece) 550 if (!moved[42] && board[54] != npiece) 552 if (!moved[101] && board[89] != npiece) 554 if (!moved[102] && board[90] != npiece) 593 if (moved[E2]) 596 if (moved[D2]) score += 25; 597 if (moved[G1]) score += 20; 598 if (moved[B [all...] |
H A D | moves.c | 42 just moved castled through check, or is in check. If the move made 566 if (from == 30 && !moved[30] && !captures && (Variant != Suicide || Giveaway == TRUE)) { 568 if (!moved[33] && board[33] == wrook) 572 if (!moved[26] && board[26] == wrook) 677 if (from == 114 && !moved[114] && !captures && (Variant != Suicide || Giveaway == TRUE)) { 679 if (!moved[117] && board[117] == brook) 683 if (!moved[110] && board[110] == brook) 1348 // moved[target] = 1; 1418 moved[target]++; 1419 moved[fro [all...] |
H A D | neval.c | 1180 else if (moved[30]) { 1223 else if (moved[114]) { 1259 if (!moved[41] && board[53] != npiece) 1261 if (!moved[42] && board[54] != npiece) 1263 if (!moved[101] && board[89] != npiece) 1265 if (!moved[102] && board[90] != npiece) 1463 moved yet! */ 1508 moved yet! */ 1633 if (!moved[28] || !moved[2 [all...] |
H A D | extvars.h | 28 extern int board[144], moved[144], ep_square, white_to_move, wking_loc,
|
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | crypto-aes.c | 190 size_t moved; local 202 &moved); 205 if (moved != crypto->et->blocksize) 230 size_t moved, plen = len; local 260 &moved); 262 heim_assert(moved == len, "moved == len"); 272 s = CCCryptorUpdate(c, data, len, p, plen, &moved); 274 plen -= moved; 275 p += moved; [all...] |
/macosx-10.9.5/ICU-511.35/icuSources/test/testdata/ |
H A D | tstfiles.mk | 6 # Not everything has been moved to this file yet, as this is a new facility.
|
/macosx-10.9.5/CommonCrypto-60049/lib/ |
H A D | corecryptoSymmetricBridge.c | 412 static int ccpkcs7_encrypt_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *cipherText, size_t *moved) argument 415 *moved = modeptr->mode_get_block_size(modeObj); 418 static int ccpkcs7_decrypt_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *plainText, size_t *moved) argument 420 *moved = ccpad_pkcs7_decrypt(modeObj.cbc, &ctx.cbc->cbc, (cccbc_iv*) ctx.cbc->iv, len, buff, plainText); 425 static int ccpkcs7_encrypt_ecb_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *cipherText, size_t *moved) argument 428 *moved = modeptr->mode_get_block_size(modeObj); 431 static int ccpkcs7_decrypt_ecb_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *plainText, size_t *moved) argument 433 *moved = ccpad_pkcs7_ecb_decrypt(modeObj.ecb, ctx.ecb, len, buff, plainText); 500 static int cccts1_encrypt_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *cipherText, size_t *moved) argument 503 *moved 506 cccts1_decrypt_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *plainText, size_t *moved) argument 513 cccts2_encrypt_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *cipherText, size_t *moved) argument 519 cccts2_decrypt_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *plainText, size_t *moved) argument 527 cccts3_encrypt_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *cipherText, size_t *moved) argument 533 cccts3_decrypt_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *plainText, size_t *moved) argument 598 ccnopad_encrypt_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *cipherText, size_t *moved) argument 603 ccnopad_decrypt_pad(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t len, void *plainText, size_t *moved) argument [all...] |
H A D | CommonCryptor.c | 277 static inline CCCryptorStatus ccEncryptPad(CCCryptor *cryptor, void *buf, size_t *moved) { argument 278 if(cryptor->padptr->encrypt_pad(cryptor->ctx[cryptor->op], cryptor->modeDesc, cryptor->symMode[cryptor->op], cryptor->buffptr, cryptor->bufferPos, buf, moved)) return kCCDecodeError; 282 static inline CCCryptorStatus ccDecryptPad(CCCryptor *cryptor, void *buf, size_t *moved) { argument 283 if(cryptor->padptr->decrypt_pad(cryptor->ctx[cryptor->op], cryptor->modeDesc, cryptor->symMode[cryptor->op], cryptor->buffptr, cryptor->bufferPos, buf, moved)) return kCCDecodeError; 704 size_t moved; local 712 retval = ccEncryptPad(cryptor, tmpbuf, &moved); 714 if(dataOutAvailable < moved) { 718 CC_XMEMCPY(dataOut, tmpbuf, moved); 719 if(dataOutMoved) *dataOutMoved = moved; 724 retval = ccDecryptPad(cryptor, tmpbuf, &moved); [all...] |
H A D | corecryptoSymmetricBridge.h | 211 typedef int (*cc_encrypt_pad_p)(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t startpoint, void *cipherText, size_t *moved); 212 typedef int (*cc_decrypt_pad_p)(modeCtx ctx, const cc2CCModeDescriptor *modeptr, const corecryptoMode modeObj, void *buff, size_t startpoint, void *plainText, size_t *moved);
|
/macosx-10.9.5/libauto-185.5/auto_tester/ |
H A D | compaction.m | 29 @property(readonly) BOOL moved; 39 - (BOOL)moved { 145 // now wait for a compaction to finish, and verify that the object moved. 148 if (movable.moved && (movable.hash == hashValue))
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/lib/ |
H A D | opensshWrap.cpp | 95 int moved = BN_bn2bin(bn, outBytes); local 96 if(moved != numBytes) { 221 size_t moved = 0; local 228 outText, inTextLen, &moved); 238 outText, moved, 239 outText, inTextLen, &moved); 248 outText, moved, 249 outText, inTextLen, &moved); 255 *outTextLen = (unsigned)moved;
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | evp-cc.c | 76 size_t moved; local 80 ret = CCCryptorUpdate(cc->href, in, size, out, size, &moved); 84 if (moved != size) 98 size_t moved; local 108 ctx->iv, ctx->cipher->iv_len, &moved); 112 if (moved != ctx->cipher->iv_len)
|
/macosx-10.9.5/Security-55471.14.18/include/security_cryptkit/ |
H A D | feePublicKey.c | 822 unsigned moved; // total digested local 877 moved = 0; 880 toMove = passwdLen - moved; 887 moved += toMove; 896 moved = 0; 898 for(moved=0; moved<privLen; ) { 899 if((moved + digestLen) > privLen) { 900 toMove = privLen - moved; 908 moved [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_cryptkit/lib/ |
H A D | feePublicKey.c | 822 unsigned moved; // total digested local 877 moved = 0; 880 toMove = passwdLen - moved; 887 moved += toMove; 896 moved = 0; 898 for(moved=0; moved<privLen; ) { 899 if((moved + digestLen) > privLen) { 900 toMove = privLen - moved; 908 moved [all...] |
/macosx-10.9.5/CPANInternal-140/DBIx-Class/lib/DBIx/Class/ |
H A D | StartupCheck.pm | 18 more comprehensive check has been moved into the test suite in
|
/macosx-10.9.5/Libc-997.90.3/db/hash/FreeBSD/ |
H A D | hash_page.c | 189 u_int16_t copyto, diff, off, moved; local 207 moved = 0; 212 (int)copyto, (int)moved); 238 moved += 2; 245 ino[0] -= moved; 281 int moved) /* Number of pairs moved to new page. */ 327 ino[0] -= (moved + 2); 339 moved = 0; 276 ugly_split(HTAB *hashp, u_int32_t obucket, BUFHEAD *old_bufp, BUFHEAD *new_bufp, int copyto, int moved) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | sslTransport.c | 47 size_t moved, 50 sslLogRecordIo("===%s: req %4lu moved %4lu status %d", 51 op, req, moved, (int)stat); 54 #define sslIoTrace(op, req, moved, stat) 44 sslIoTrace( const char *op, size_t req, size_t moved, OSStatus stat) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | sslTransport.c | 47 size_t moved, 50 sslLogRecordIo("===%s: req %4lu moved %4lu status %d", 51 op, req, moved, (int)stat); 54 #define sslIoTrace(op, req, moved, stat) 44 sslIoTrace( const char *op, size_t req, size_t moved, OSStatus stat) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | sslTransport.c | 47 size_t moved, 50 sslLogRecordIo("===%s: req %4lu moved %4lu status %d", 51 op, req, moved, (int)stat); 54 #define sslIoTrace(op, req, moved, stat) 44 sslIoTrace( const char *op, size_t req, size_t moved, OSStatus stat) argument
|