/macosx-10.10/sudo-73/src/ |
H A D | tgetpass.c | 75 char *pass; local 88 pass = NULL; 137 pass = getln(input, buf, sizeof(buf), def_pwfeedback); 141 if (neednl || pass == NULL) { 183 return pass; 193 static char buf[SUDO_PASS_MAX + 1], *pass; local 227 pass = getln(pfd[0], buf, sizeof(buf), 0); 231 if (pass == NULL) 234 return pass;
|
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/sasl/ |
H A D | sasl.tcl | 223 proc ::SASL::hmac_hex {pass data} { return [::md5::hmac $pass $data] } 224 proc ::SASL::hmac_bin {pass data} { return [binary format H* [::md5::hmac $pass $data]] } 229 proc ::SASL::hmac_hex {pass data} { return [::md5::hmac -hex -key $pass $data] } 230 proc ::SASL::hmac_bin {pass data} { return [::md5::hmac -key $pass $data] } 280 set pass [eval $ctx(callback) [list $context password $user $ctx(realm)]] 281 set check [hmac_bin $pass [all...] |
/macosx-10.10/tcl-105/tcl_ext/tkimg/tkimg/compat/libpng/ |
H A D | pngpread.c | 882 png_ptr->pass > 6) 899 png_ptr->pass > 6) 953 if (png_ptr->pass < 6) 956 png_ptr->row_buf + 1, png_ptr->pass, png_ptr->transformations); 960 switch (png_ptr->pass) 965 for (i = 0; i < 8 && png_ptr->pass == 0; i++) 968 png_read_push_finish_row(png_ptr); /* Updates png_ptr->pass */ 971 if (png_ptr->pass == 2) /* Pass 1 might be empty */ 973 for (i = 0; i < 4 && png_ptr->pass == 2; i++) 980 if (png_ptr->pass [all...] |
/macosx-10.10/dyld-353.2.1/unit-tests/test-cases/weak-library/ |
H A D | Makefile | 29 cd absent/ && ../${TESTROOT}/bin/exit-zero-pass.pl "weak-library" "weak-library" ./main 30 cd present/ && ../${TESTROOT}/bin/exit-zero-pass.pl "weak-library" "weak-library" ./main
|
/macosx-10.10/OpenSSL098-52/src/crypto/evp/ |
H A D | p5_crpt2.c | 79 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument 91 if(!pass) passlen = 0; 92 else if(passlen == -1) passlen = strlen(pass); 103 HMAC_Init_ex(&hctx, pass, passlen, EVP_sha1(), NULL); 109 HMAC(EVP_sha1(), pass, passlen, local 120 h__dump (pass, passlen); 147 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 244 PKCS5_PBKDF2_HMAC_SHA1(pass, passlen, salt, saltlen, iter, keylen, key);
|
/macosx-10.10/OpenSSL098-52/src/crypto/pkcs12/ |
H A D | p12_crt.c | 83 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 146 if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass)) 154 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 186 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 245 int nid_key, char *pass) 258 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8); 282 int nid_safe, int iter, char *pass) 307 p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0,
|
H A D | p12_key.c | 83 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument 90 if(!pass) { 93 } else if (!asc2uni(pass, passlen, &unipass, &uniplen)) { 106 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument 122 if (!pass) { 133 h__dump(pass, passlen); 154 for (i = 0; i < Plen; i++) *p++ = pass[i % passlen];
|
/macosx-10.10/cxxfilt-11/cxxfilt/binutils/testsuite/binutils-all/ |
H A D | localize-hidden-1.d | 19 #pass
|
H A D | objcopy.exp | 98 pass "objcopy ($testname)" 171 pass "objcopy -O srec" 202 pass "objcopy --set-start" 219 pass "objcopy --adjust-start" 270 pass "objcopy --adjust-vma" 300 pass "objcopy --adjust-section-vma +" 320 pass "objcopy --adjust-section-vma =" 397 pass $test 439 pass $test 480 if { $status != "pass" } { [all...] |
/macosx-10.10/emacs-93/emacs/lisp/url/ |
H A D | url-imap.el | 43 (defun url-imap-open-host (host port user pass) 48 (imap-password pass)
|
H A D | url-auth.el | 71 user pass byserv retval data) 83 pass (read-passwd "Password: ")) 89 (format "%s:%s" user pass))))) 107 pass (read-passwd "Password: ") 108 retval (base64-encode-string (format "%s:%s" user pass)) 154 user pass byserv retval data) 165 pass (read-passwd "Password: ") 172 user pass realm 192 pass (read-passwd "Password: ") 196 user pass real [all...] |
H A D | url-news.el | 41 (defun url-news-open-host (host port user pass) 45 (if (and user pass) 48 (nntp-send-command "^.*\r?\n" "AUTHINFO PASS" pass)
|
/macosx-10.10/ksh-23/ksh/src/lib/libast/astsa/ |
H A D | optlib.h | 68 Optpass_t pass; member in struct:Optcache_s 79 Optpass_t pass[8]; /* optjoin() list */ member in struct:Optstate_s 88 int join; /* optjoin() pass # */
|
/macosx-10.10/ksh-23/ksh/src/lib/libast/misc/ |
H A D | optlib.h | 74 Optpass_t pass; member in struct:Optcache_s 85 Optpass_t pass[8]; /* optjoin() list */ member in struct:Optstate_s 94 int join; /* optjoin() pass # */
|
/macosx-10.10/ruby-106/ruby/ext/openssl/ |
H A D | ossl_pkcs12.c | 53 * PKCS12.create(pass, name, key, cert [, ca, [, key_pbe [, cert_pbe [, key_iter [, mac_iter [, keytype]]]]]]) 56 * * +pass+ - string 76 VALUE pass, name, pkey, cert, ca, key_nid, cert_nid, key_iter, mac_iter, keytype; local 85 rb_scan_args(argc, argv, "46", &pass, &name, &pkey, &cert, &ca, &key_nid, &cert_nid, &key_iter, &mac_iter, &keytype); 86 passphrase = NIL_P(pass) ? NULL : StringValuePtr(pass); 124 * PKCS12.new(str, pass) -> pkcs12 128 * * +pass+ - string 134 VALUE arg, pass, pkey, cert, ca; local 142 if(rb_scan_args(argc, argv, "02", &arg, &pass) [all...] |
/macosx-10.10/ruby-106/ruby/lib/rdoc/generator/template/json_index/js/ |
H A D | searcher.js | 19 var state = { from: 0, pass: 0, limit: MAX_RESULTS, n: suid++}; property in class:find.state 32 var hasMore = (state.limit > 0 && state.pass < 4); 189 while (state.pass < 4 && state.limit > 0 && togo > 0) { 190 if (state.pass == 0) { 193 } else if (state.pass == 1) { 196 } else if (state.pass == 2) { 199 } else if (state.pass == 3) { 213 state.pass++;
|
/macosx-10.10/sudo-73/src/auth/ |
H A D | securid.c | 93 securid_verify(pw, pass, auth) 95 char *pass;
|
H A D | pam.c | 315 char *pass; local 354 pass = tgetpass(prompt, def_passwd_timeout * 60, flags); 355 if (pass == NULL) { 359 pass = ""; 364 pr->resp = estrdup(pass); 365 zero_bytes(pass, strlen(pass));
|
H A D | rfc1938.c | 130 rfc1938_verify(pw, pass, auth) 132 char *pass; 136 if (rfc1938verify((struct RFC1938 *) auth->data, pass) == 0)
|
/macosx-10.10/tcl-105/tcl_ext/tls/tls/tests/oldTests/ |
H A D | tlsHttp.tcl | 24 set pass sensus 26 set auth [Base64_Encode "${user}:$pass"]
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | ssh-add.c | 92 static char *pass = NULL; variable 96 if (pass) { 97 memset(pass, 0, strlen(pass)); 98 xfree(pass); 99 pass = NULL; 226 if (private == NULL && pass != NULL) { 227 private = key_parse_private(&keyblob, filename, pass, NULL); 229 store_in_keychain(filename, pass); 237 pass [all...] |
/macosx-10.10/lukemftp-14/tnftp/src/ |
H A D | fetch.c | 158 char user[BUFSIZ], *pass; local 208 pass = (char *)gpass; 210 pass = getpass("Password: "); 211 if (pass == NULL) { 217 clen = strlen(user) + strlen(pass) + 2; /* user + ":" + pass + "\0" */ 221 (void)strlcat(clear, pass, clen); 223 memset(pass, 0, strlen(pass)); 300 * user, pass an 327 parse_url(const char *url, const char *desc, url_t *type, char **user, char **pass, char **host, char **port, in_port_t *portnum, char **path) argument 505 char *user, *pass, *host, *port, *path; local 1333 char *host, *path, *dir, *file, *user, *pass; local [all...] |
/macosx-10.10/OpenSSL098-52/src/apps/ |
H A D | pkcs8.c | 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local 213 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 216 BIO_printf(bio_err, "-passout arg output file pass phrase source\n"); 314 p8pass = pass; 315 if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1)) 395 p8pass = pass; 396 EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
/macosx-10.10/cups-408/cups/cups/ |
H A D | testfile.c | 258 pass, /* Current pass */ local 273 for (status = 0, pass = 0; pass < 4; pass ++) 279 printf("\ncupsFileOpen(append %d): ", pass); 294 expected = 256 * (ssize_t)sizeof(buffer) * pass; 351 printf("\ncupsFileOpen(read %d): ", pass); 368 for (num_records = (pass + 1) * 256, count = (pass [all...] |
/macosx-10.10/emacs-93/emacs/lispref/ |
H A D | tindex.pl | 38 The script performs two passes. In the first pass, Texinfo files from 40 recorded. In a second pass, Texinfo files in the current directory 42 the first pass are removed. Old file contents are saved in files
|