Searched refs:pass (Results 51 - 75 of 342) sorted by relevance

1234567891011>>

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gettext-tools/examples/hello-c++-qt/po/
H A DMakefile.am16 --keyword=tr --flag=tr:1:pass-c-format --flag=tr:1:pass-qt-format \
17 --keyword=translate:2 --flag=translate:2:pass-c-format --flag=translate:2:pass-qt-format \
18 --keyword=QT_TR_NOOP --flag=QT_TR_NOOP:1:pass-c-format --flag=QT_TR_NOOP:1:pass-qt-format \
19 --keyword=QT_TRANSLATE_NOOP:2 --flag=QT_TRANSLATE_NOOP:2:pass-c-format --flag=QT_TRANSLATE_NOOP:2:pass-qt-format \
20 --keyword=_ --flag=_:1:pass-c-format --flag=_:1:pass
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs12/
H A Dp12_mutl.c67 int PKCS12_gen_mac (PKCS12 *p12, const char *pass, int passlen, argument
84 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
99 int PKCS12_verify_mac (PKCS12 *p12, const char *pass, int passlen) argument
107 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) {
118 int PKCS12_set_mac (PKCS12 *p12, const char *pass, int passlen, argument
130 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) {
H A Dp12_crpt.c87 int PKCS12_PBE_keyivgen (EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
107 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
113 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_crt.c63 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
120 authsafe = PKCS12_pack_p7encdata (nid_cert, pass, -1, NULL, 0,
135 bag = PKCS12_MAKE_SHKEYBAG (nid_key, pass, -1, NULL, 0, iter, p8);
159 if(!PKCS12_set_mac (p12, pass, -1, NULL, 0, mac_iter, NULL))
H A Dp12_key.c77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument
84 if(!pass) {
87 } else if (!asc2uni(pass, passlen, &unipass, &uniplen)) {
100 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument
115 if (!pass) {
126 h__dump(pass, passlen);
149 for (i = 0; i < Plen; i++) *p++ = pass[i % passlen];
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_mutl.c67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument
90 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
105 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) argument
113 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) {
124 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, argument
136 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) {
H A Dp12_crpt.c87 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
113 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
119 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_crt.c66 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert,
117 if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass))
126 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
159 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL))
218 int nid_key, char *pass)
231 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8);
255 int nid_safe, int iter, char *pass)
276 p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0,
H A Dp12_key.c77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument
84 if(!pass) {
87 } else if (!asc2uni(pass, passlen, &unipass, &uniplen)) {
100 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument
115 if (!pass) {
126 h__dump(pass, passlen);
149 for (i = 0; i < Plen; i++) *p++ = pass[i % passlen];
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gettext-tools/tests/
H A Dlang-perl-226 -k__ --flag=__:1:pass-perl-format --flag=__:1:pass-perl-brace-format \
27 -k__n:1,2 --flag=__n:1:pass-perl-format --flag=__n:1:pass-perl-brace-format \
28 --flag=__n:2:pass-perl-format --flag=__n:2:pass-perl-brace-format \
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/
H A Dsecrets.h69 fstring pass; /* trust relationship's password */ member in struct:trusted_dom_pass
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/contrib/pppgetpass/
H A Dpppgetpass.gtk.c23 gchar *pass; local
28 pass=gtk_entry_get_text(GTK_ENTRY(answer));
30 passlen=strlen(pass);
34 if((wrote=write(outfd, pass, passlen))!=passlen) {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/evp/
H A Dp5_crpt.c103 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument
128 if(!pass) passlen = 0;
129 else if(passlen == -1) passlen = strlen(pass);
133 EVP_DigestUpdate(&ctx, pass, passlen);
H A Dp5_crpt2.c79 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument
91 if(!pass) passlen = 0;
92 else if(passlen == -1) passlen = strlen(pass);
103 HMAC_Init_ex(&hctx, pass, passlen, EVP_sha1(), NULL);
109 HMAC(EVP_sha1(), pass, passlen, local
120 h__dump (pass, passlen);
147 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
232 PKCS5_PBKDF2_HMAC_SHA1(pass, passlen, salt, saltlen, iter, keylen, key);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/
H A Dp5_crpt.c103 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument
134 if(!pass) passlen = 0;
135 else if(passlen == -1) passlen = strlen(pass);
139 EVP_DigestUpdate(&ctx, pass, passlen);
H A Dp5_crpt2.c79 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument
91 if(!pass) passlen = 0;
92 else if(passlen == -1) passlen = strlen(pass);
103 HMAC_Init_ex(&hctx, pass, passlen, EVP_sha1(), NULL);
109 HMAC(EVP_sha1(), pass, passlen, local
120 h__dump (pass, passlen);
147 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
244 PKCS5_PBKDF2_HMAC_SHA1(pass, passlen, salt, saltlen, iter, keylen, key);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/
H A Dchgpasswd.c122 static int dochild(int master, const char *slavedev, const struct passwd *pass, argument
130 if (pass == NULL)
137 gid = pass->pw_gid;
138 uid = pass->pw_uid;
331 static BOOL chat_with_program(char *passwordprogram, const struct passwd *pass, argument
340 if (pass == NULL) {
347 DEBUG(3, ("chat_with_program: Cannot Allocate pty for password change: %s\n", pass->pw_name));
359 DEBUG(3, ("chat_with_program: Cannot fork() child for password change: %s\n", pass->pw_name));
368 DEBUG(3, ("chat_with_program: Child failed to change password: %s\n", pass->pw_name));
424 DEBUG(3, ("chat_with_program: Dochild for user %s (uid=%d,gid=%d) (as_root = %s)\n", pass
445 chgpasswd(const char *name, const struct passwd *pass, const char *oldpass, const char *newpass, BOOL as_root) argument
556 chgpasswd(const char *name, const struct passwd *pass, const char *oldpass, const char *newpass, BOOL as_root) argument
1009 struct passwd *pass = NULL; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/sam/
H A Didmap_util.c230 struct passwd *pass; local
242 pass = getpwnam_alloc(guest_account);
243 if (!pass) {
248 id.uid = pass->pw_uid;
255 passwd_free(&pass);
261 id.gid = pass->pw_gid;
267 passwd_free(&pass);
271 passwd_free(&pass);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/nsswitch/
H A Dgetpwuid.exp50 pass $test_desc
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/server/
H A Dmasktest.exp52 pass "masktest $testname"
H A Drename.exp51 pass $testname
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/web/
H A Dcgi.c320 struct passwd *pass = NULL; local
349 pass = getpwnam_alloc(user);
355 if NT_STATUS_IS_OK(pass_check(pass, user, user_pass,
358 if (pass) {
363 if ( initgroups(pass->pw_name, pass->pw_gid) != 0 )
366 become_user_permanently(pass->pw_uid, pass->pw_gid);
370 passwd_free(&pass);
380 passwd_free(&pass);
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/tdb/
H A Dtdbutil.c652 * @param pass pointer to trusted domain password to be packed
656 size_t tdb_trusted_dom_pass_pack(char* pack_buf, int bufsize, TRUSTED_DOM_PASS* pass) argument
660 if (!pack_buf || !pass) return -1;
663 len += tdb_pack(pack_buf + len, bufsize - len, "d", pass->uni_name_len);
666 len += tdb_pack(pack_buf + len, bufsize - len, "w", pass->uni_name[idx]);
668 len += tdb_pack(pack_buf + len, bufsize - len, "dPd", pass->pass_len,
669 pass->pass, pass->mod_time);
672 len += tdb_sid_pack(pack_buf + len, bufsize - len, &pass
687 tdb_trusted_dom_pass_unpack(char* pack_buf, int bufsize, TRUSTED_DOM_PASS* pass) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/
H A Dpkcs8.c86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local
213 BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
216 BIO_printf(bio_err, "-passout arg output file pass phrase source\n");
314 p8pass = pass;
315 if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
395 p8pass = pass;
396 EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dpkcs8.c86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local
213 BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
216 BIO_printf(bio_err, "-passout arg output file pass phrase source\n");
314 p8pass = pass;
315 if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
395 p8pass = pass;
396 EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);

Completed in 206 milliseconds

1234567891011>>