/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs12/ |
H A D | pkcs12.h | 180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 184 const char *pass, int passlen, 187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 217 const char *pass, int passlen, 220 int PKCS12_key_gen_asc(const char *pass, in [all...] |
H A D | p12_decr.c | 71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, argument 81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, 114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) 120 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, 150 const char *pass, int passlen, 165 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, 113 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument 149 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
|
H A D | p12_add.c | 104 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, argument 118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter, 157 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument 180 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen, 189 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) 194 pass, passlen, 198 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, argument 201 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
|
H A D | p12_p8e.c | 64 const char *pass, int passlen, 86 pass, passlen, p8inf, 1); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/ |
H A D | pkcs12.h | 180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 184 const char *pass, int passlen, 187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 217 const char *pass, int passlen, 220 int PKCS12_key_gen_asc(const char *pass, in [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | secrets.c | 283 struct machine_acct_pass *pass; local 296 if (!(pass = secrets_fetch(trust_keystr(domain), &size))) { 301 if (size != sizeof(*pass)) { 306 if (pass_last_set_time) *pass_last_set_time = pass->mod_time; 307 memcpy(ret_pwd, pass->hash, 16); 308 SAFE_FREE(pass); 323 struct trusted_dom_pass pass; local 330 ZERO_STRUCT(pass); 339 pass_len = tdb_trusted_dom_pass_unpack(pass_buf, size, &pass); 349 *pwd = SMB_STRDUP(pass 370 struct machine_acct_pass pass; local 397 struct trusted_dom_pass pass; local 427 secrets_store_machine_password(const char *pass, const char *domain, uint32 sec_channel) argument 580 struct trusted_dom_pass *pass = TALLOC_ZERO_P(ctx, struct trusted_dom_pass); local [all...] |
H A D | pdb_sql.c | 223 config_value_read(data, "pass last set time column", 225 config_value_read(data, "pass can change time column", 227 config_value_read(data, "pass must change time column", 257 config_value_read(data, "lanman pass column", 259 config_value_read(data, "nt pass column", 261 config_value_read(data, "plain pass column", 352 "pass can change time column", 360 "pass must change time column", 368 "pass last set time column", 485 "lanman pass colum [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | pkcs12.h | 180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 184 const char *pass, int passlen, 187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 217 const char *pass, int passlen, 220 int PKCS12_key_gen_asc(const char *pass, in 256 int key_nid, char *pass); variable 258 int safe_nid, int iter, char *pass); variable [all...] |
H A D | p12_decr.c | 71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, argument 81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, 114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) 121 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, 151 const char *pass, int passlen, 166 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, 113 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument 150 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
|
H A D | p12_add.c | 104 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, argument 118 PKCS8_encrypt(pbe_nid, NULL, pass, passlen, salt, saltlen, iter, 161 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument 184 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen, 193 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) 198 pass, passlen, 202 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, argument 205 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
|
H A D | p12_p8e.c | 64 const char *pass, int passlen, 86 pass, passlen, p8inf, 1); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | pkcs12.h | 180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 181 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 184 const char *pass, int passlen, 187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 211 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 217 const char *pass, int passlen, 220 int PKCS12_key_gen_asc(const char *pass, in 256 int key_nid, char *pass); variable 258 int safe_nid, int iter, char *pass); variable [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/nsswitch/ |
H A D | getgrgid.exp | 40 pass "getgrgid $gid ($group)"
|
H A D | getpwent_r.exp | 37 pass "getpwent_r"
|
H A D | groupmem_dom.exp | 32 pass "domain groups contain only domain members"
|
H A D | initgroups.exp | 33 pass $test_desc
|
H A D | login.exp | 41 pass "login $domain/$USER" 101 pass "id/wbinfo groups match"
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/server/ |
H A D | ipc.exp | 38 pass $action
|
H A D | xfer.exp | 43 pass "xfertest"
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbwrapper/ |
H A D | smbsh.in | 22 read pass 23 SMBW_PASSWORD=$pass
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/evp/ |
H A D | evp_pbe.c | 77 int EVP_PBE_CipherInit (ASN1_OBJECT *pbe_obj, const char *pass, int passlen, argument 95 if(!pass) passlen = 0; 96 else if (passlen == -1) passlen = strlen(pass); 98 i = (*pbetmp->keygen)(ctx, pass, passlen, param, pbetmp->cipher,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | evp_pbe.c | 77 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, argument 95 if(!pass) passlen = 0; 96 else if (passlen == -1) passlen = strlen(pass); 98 i = (*pbetmp->keygen)(ctx, pass, passlen, param, pbetmp->cipher,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/pam_smbpass/ |
H A D | pam_smb_auth.c | 83 /* Get a few bytes so we can pass our return value to 182 const char *pass = NULL; local 189 retval = pam_get_item( pamh, PAM_AUTHTOK, (const void **) &pass ); 195 } else if (pass == NULL) { 202 pass, err_str, 215 pass = NULL; 223 retval = local_password_change( name, LOCAL_SET_PASSWORD, pass, err_str, sizeof(err_str), 238 pass = NULL;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/ |
H A D | ntlm_auth_diagnostics.c | 50 BOOL pass = True; local 122 pass = False; 133 pass = False; 143 pass = False; 146 return pass; 174 BOOL pass = True; local 221 pass = False; 229 pass = False; 231 return pass; 240 BOOL pass local 314 BOOL pass = True; local 590 BOOL pass = True; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/LDAP/smbldap-tools-0.8.7/ |
H A D | smbldap-passwd | 126 my $pass; 131 chomp($pass=<STDIN>); 141 if ($pass ne $pass2) { 152 ($pass =~ /^(.*)$/ and $pass=$1) or 161 "-s","$pass"; 168 "-s","$pass"; 174 $hash_password = make_hash($pass,$config{hash_encrypt},$config{crypt_salt_format}); 194 my ($sambaLMPassword,$sambaNTPassword) = ntlmgen $pass; 220 $pass [all...] |