/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gettext-tools/examples/hello-c++-qt/po/ |
H A D | Makefile.am | 16 --keyword=tr --flag=tr:1:pass-c-format --flag=tr:1:pass-qt-format \ 17 --keyword=translate:2 --flag=translate:2:pass-c-format --flag=translate:2:pass-qt-format \ 18 --keyword=QT_TR_NOOP --flag=QT_TR_NOOP:1:pass-c-format --flag=QT_TR_NOOP:1:pass-qt-format \ 19 --keyword=QT_TRANSLATE_NOOP:2 --flag=QT_TRANSLATE_NOOP:2:pass-c-format --flag=QT_TRANSLATE_NOOP:2:pass-qt-format \ 20 --keyword=_ --flag=_:1:pass-c-format --flag=_:1:pass [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 67 int PKCS12_gen_mac (PKCS12 *p12, const char *pass, int passlen, argument 84 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 99 int PKCS12_verify_mac (PKCS12 *p12, const char *pass, int passlen) argument 107 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) { 118 int PKCS12_set_mac (PKCS12 *p12, const char *pass, int passlen, argument 130 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) {
|
H A D | p12_crpt.c | 87 int PKCS12_PBE_keyivgen (EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 107 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 113 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
H A D | p12_crt.c | 63 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 120 authsafe = PKCS12_pack_p7encdata (nid_cert, pass, -1, NULL, 0, 135 bag = PKCS12_MAKE_SHKEYBAG (nid_key, pass, -1, NULL, 0, iter, p8); 159 if(!PKCS12_set_mac (p12, pass, -1, NULL, 0, mac_iter, NULL))
|
H A D | p12_key.c | 77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument 84 if(!pass) { 87 } else if (!asc2uni(pass, passlen, &unipass, &uniplen)) { 100 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument 115 if (!pass) { 126 h__dump(pass, passlen); 149 for (i = 0; i < Plen; i++) *p++ = pass[i % passlen];
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_mutl.c | 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument 90 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 105 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) argument 113 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) { 124 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, argument 136 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) {
|
H A D | p12_crpt.c | 87 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 113 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 119 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
H A D | p12_crt.c | 66 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, 117 if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass)) 126 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 159 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 218 int nid_key, char *pass) 231 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8); 255 int nid_safe, int iter, char *pass) 276 p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0,
|
H A D | p12_key.c | 77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument 84 if(!pass) { 87 } else if (!asc2uni(pass, passlen, &unipass, &uniplen)) { 100 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument 115 if (!pass) { 126 h__dump(pass, passlen); 149 for (i = 0; i < Plen; i++) *p++ = pass[i % passlen];
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gettext-tools/tests/ |
H A D | lang-perl-2 | 26 -k__ --flag=__:1:pass-perl-format --flag=__:1:pass-perl-brace-format \ 27 -k__n:1,2 --flag=__n:1:pass-perl-format --flag=__n:1:pass-perl-brace-format \ 28 --flag=__n:2:pass-perl-format --flag=__n:2:pass-perl-brace-format \
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | secrets.h | 69 fstring pass; /* trust relationship's password */ member in struct:trusted_dom_pass
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/contrib/pppgetpass/ |
H A D | pppgetpass.gtk.c | 23 gchar *pass; local 28 pass=gtk_entry_get_text(GTK_ENTRY(answer)); 30 passlen=strlen(pass); 34 if((wrote=write(outfd, pass, passlen))!=passlen) {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/evp/ |
H A D | p5_crpt.c | 103 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument 128 if(!pass) passlen = 0; 129 else if(passlen == -1) passlen = strlen(pass); 133 EVP_DigestUpdate(&ctx, pass, passlen);
|
H A D | p5_crpt2.c | 79 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument 91 if(!pass) passlen = 0; 92 else if(passlen == -1) passlen = strlen(pass); 103 HMAC_Init_ex(&hctx, pass, passlen, EVP_sha1(), NULL); 109 HMAC(EVP_sha1(), pass, passlen, local 120 h__dump (pass, passlen); 147 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 232 PKCS5_PBKDF2_HMAC_SHA1(pass, passlen, salt, saltlen, iter, keylen, key);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | p5_crpt.c | 103 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument 134 if(!pass) passlen = 0; 135 else if(passlen == -1) passlen = strlen(pass); 139 EVP_DigestUpdate(&ctx, pass, passlen);
|
H A D | p5_crpt2.c | 79 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument 91 if(!pass) passlen = 0; 92 else if(passlen == -1) passlen = strlen(pass); 103 HMAC_Init_ex(&hctx, pass, passlen, EVP_sha1(), NULL); 109 HMAC(EVP_sha1(), pass, passlen, local 120 h__dump (pass, passlen); 147 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 244 PKCS5_PBKDF2_HMAC_SHA1(pass, passlen, salt, saltlen, iter, keylen, key);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | chgpasswd.c | 122 static int dochild(int master, const char *slavedev, const struct passwd *pass, argument 130 if (pass == NULL) 137 gid = pass->pw_gid; 138 uid = pass->pw_uid; 331 static BOOL chat_with_program(char *passwordprogram, const struct passwd *pass, argument 340 if (pass == NULL) { 347 DEBUG(3, ("chat_with_program: Cannot Allocate pty for password change: %s\n", pass->pw_name)); 359 DEBUG(3, ("chat_with_program: Cannot fork() child for password change: %s\n", pass->pw_name)); 368 DEBUG(3, ("chat_with_program: Child failed to change password: %s\n", pass->pw_name)); 424 DEBUG(3, ("chat_with_program: Dochild for user %s (uid=%d,gid=%d) (as_root = %s)\n", pass 445 chgpasswd(const char *name, const struct passwd *pass, const char *oldpass, const char *newpass, BOOL as_root) argument 556 chgpasswd(const char *name, const struct passwd *pass, const char *oldpass, const char *newpass, BOOL as_root) argument 1009 struct passwd *pass = NULL; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/sam/ |
H A D | idmap_util.c | 230 struct passwd *pass; local 242 pass = getpwnam_alloc(guest_account); 243 if (!pass) { 248 id.uid = pass->pw_uid; 255 passwd_free(&pass); 261 id.gid = pass->pw_gid; 267 passwd_free(&pass); 271 passwd_free(&pass);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/nsswitch/ |
H A D | getpwuid.exp | 50 pass $test_desc
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/server/ |
H A D | masktest.exp | 52 pass "masktest $testname"
|
H A D | rename.exp | 51 pass $testname
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/web/ |
H A D | cgi.c | 320 struct passwd *pass = NULL; local 349 pass = getpwnam_alloc(user); 355 if NT_STATUS_IS_OK(pass_check(pass, user, user_pass, 358 if (pass) { 363 if ( initgroups(pass->pw_name, pass->pw_gid) != 0 ) 366 become_user_permanently(pass->pw_uid, pass->pw_gid); 370 passwd_free(&pass); 380 passwd_free(&pass); [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/tdb/ |
H A D | tdbutil.c | 652 * @param pass pointer to trusted domain password to be packed 656 size_t tdb_trusted_dom_pass_pack(char* pack_buf, int bufsize, TRUSTED_DOM_PASS* pass) argument 660 if (!pack_buf || !pass) return -1; 663 len += tdb_pack(pack_buf + len, bufsize - len, "d", pass->uni_name_len); 666 len += tdb_pack(pack_buf + len, bufsize - len, "w", pass->uni_name[idx]); 668 len += tdb_pack(pack_buf + len, bufsize - len, "dPd", pass->pass_len, 669 pass->pass, pass->mod_time); 672 len += tdb_sid_pack(pack_buf + len, bufsize - len, &pass 687 tdb_trusted_dom_pass_unpack(char* pack_buf, int bufsize, TRUSTED_DOM_PASS* pass) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/ |
H A D | pkcs8.c | 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local 213 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 216 BIO_printf(bio_err, "-passout arg output file pass phrase source\n"); 314 p8pass = pass; 315 if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1)) 395 p8pass = pass; 396 EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | pkcs8.c | 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local 213 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 216 BIO_printf(bio_err, "-passout arg output file pass phrase source\n"); 314 p8pass = pass; 315 if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1)) 395 p8pass = pass; 396 EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|