Searched refs:pass (Results 26 - 50 of 342) sorted by relevance

1234567891011>>

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs12/
H A Dpkcs12.h180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen);
181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
184 const char *pass, int passlen,
187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen);
211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf);
217 const char *pass, int passlen,
220 int PKCS12_key_gen_asc(const char *pass, in
[all...]
H A Dp12_decr.c71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, argument
81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen,
114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf)
120 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length,
150 const char *pass, int passlen,
165 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data,
113 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument
149 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
H A Dp12_add.c104 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, argument
118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter,
157 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument
180 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen,
189 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen)
194 pass, passlen,
198 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, argument
201 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
H A Dp12_p8e.c64 const char *pass, int passlen,
86 pass, passlen, p8inf, 1);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/
H A Dpkcs12.h180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen);
181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
184 const char *pass, int passlen,
187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen);
211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf);
217 const char *pass, int passlen,
220 int PKCS12_key_gen_asc(const char *pass, in
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/passdb/
H A Dsecrets.c283 struct machine_acct_pass *pass; local
296 if (!(pass = secrets_fetch(trust_keystr(domain), &size))) {
301 if (size != sizeof(*pass)) {
306 if (pass_last_set_time) *pass_last_set_time = pass->mod_time;
307 memcpy(ret_pwd, pass->hash, 16);
308 SAFE_FREE(pass);
323 struct trusted_dom_pass pass; local
330 ZERO_STRUCT(pass);
339 pass_len = tdb_trusted_dom_pass_unpack(pass_buf, size, &pass);
349 *pwd = SMB_STRDUP(pass
370 struct machine_acct_pass pass; local
397 struct trusted_dom_pass pass; local
427 secrets_store_machine_password(const char *pass, const char *domain, uint32 sec_channel) argument
580 struct trusted_dom_pass *pass = TALLOC_ZERO_P(ctx, struct trusted_dom_pass); local
[all...]
H A Dpdb_sql.c223 config_value_read(data, "pass last set time column",
225 config_value_read(data, "pass can change time column",
227 config_value_read(data, "pass must change time column",
257 config_value_read(data, "lanman pass column",
259 config_value_read(data, "nt pass column",
261 config_value_read(data, "plain pass column",
352 "pass can change time column",
360 "pass must change time column",
368 "pass last set time column",
485 "lanman pass colum
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dpkcs12.h180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen);
181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
184 const char *pass, int passlen,
187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen);
211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf);
217 const char *pass, int passlen,
220 int PKCS12_key_gen_asc(const char *pass, in
256 int key_nid, char *pass); variable
258 int safe_nid, int iter, char *pass); variable
[all...]
H A Dp12_decr.c71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, argument
81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen,
114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf)
121 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length,
151 const char *pass, int passlen,
166 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data,
113 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument
150 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
H A Dp12_add.c104 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, argument
118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter,
161 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument
184 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen,
193 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen)
198 pass, passlen,
202 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, argument
205 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
H A Dp12_p8e.c64 const char *pass, int passlen,
86 pass, passlen, p8inf, 1);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dpkcs12.h180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen);
181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
184 const char *pass, int passlen,
187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen);
211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf);
217 const char *pass, int passlen,
220 int PKCS12_key_gen_asc(const char *pass, in
256 int key_nid, char *pass); variable
258 int safe_nid, int iter, char *pass); variable
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/nsswitch/
H A Dgetgrgid.exp40 pass "getgrgid $gid ($group)"
H A Dgetpwent_r.exp37 pass "getpwent_r"
H A Dgroupmem_dom.exp32 pass "domain groups contain only domain members"
H A Dinitgroups.exp33 pass $test_desc
H A Dlogin.exp41 pass "login $domain/$USER"
101 pass "id/wbinfo groups match"
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/server/
H A Dipc.exp38 pass $action
H A Dxfer.exp43 pass "xfertest"
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbwrapper/
H A Dsmbsh.in22 read pass
23 SMBW_PASSWORD=$pass
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/evp/
H A Devp_pbe.c77 int EVP_PBE_CipherInit (ASN1_OBJECT *pbe_obj, const char *pass, int passlen, argument
95 if(!pass) passlen = 0;
96 else if (passlen == -1) passlen = strlen(pass);
98 i = (*pbetmp->keygen)(ctx, pass, passlen, param, pbetmp->cipher,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/
H A Devp_pbe.c77 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, argument
95 if(!pass) passlen = 0;
96 else if (passlen == -1) passlen = strlen(pass);
98 i = (*pbetmp->keygen)(ctx, pass, passlen, param, pbetmp->cipher,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/pam_smbpass/
H A Dpam_smb_auth.c83 /* Get a few bytes so we can pass our return value to
182 const char *pass = NULL; local
189 retval = pam_get_item( pamh, PAM_AUTHTOK, (const void **) &pass );
195 } else if (pass == NULL) {
202 pass, err_str,
215 pass = NULL;
223 retval = local_password_change( name, LOCAL_SET_PASSWORD, pass, err_str, sizeof(err_str),
238 pass = NULL;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/
H A Dntlm_auth_diagnostics.c50 BOOL pass = True; local
122 pass = False;
133 pass = False;
143 pass = False;
146 return pass;
174 BOOL pass = True; local
221 pass = False;
229 pass = False;
231 return pass;
240 BOOL pass local
314 BOOL pass = True; local
590 BOOL pass = True; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/LDAP/smbldap-tools-0.8.7/
H A Dsmbldap-passwd126 my $pass;
131 chomp($pass=<STDIN>);
141 if ($pass ne $pass2) {
152 ($pass =~ /^(.*)$/ and $pass=$1) or
161 "-s","$pass";
168 "-s","$pass";
174 $hash_password = make_hash($pass,$config{hash_encrypt},$config{crypt_salt_format});
194 my ($sambaLMPassword,$sambaNTPassword) = ntlmgen $pass;
220 $pass
[all...]

Completed in 223 milliseconds

1234567891011>>