Searched refs:pass (Results 76 - 100 of 276) sorted by relevance

1234567891011>>

/opensolaris-onvv-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Privilege/t/
H A DPrivilege.t22 sub pass
47 pass();
64 pass();
73 pass();
/opensolaris-onvv-gate/usr/src/cmd/agents/snmp/snmprelayd/
H A Dsh_table.h85 extern int single_table_to_subtrees(int pass,Table *tp, char* error_label);
/opensolaris-onvv-gate/usr/src/common/net/wanboot/
H A Dp12access.c24 * certs and pass them to SSL. They replace similar functions for PEM,
28 * sunw_p12_use_certfile - gets the user's cert from a pkcs12 file & pass
31 * pass it to SSL
65 * sunw_use_x509cert - pass an x509 client certificate to ssl
69 * cert - Certificate to pass in x509 format
93 * sunw_use_pkey - pass an EVP_PKEY private key to ssl
179 * pass it in to SSL.
232 * sunw_p12_use_keyfile - read a RSA private key from a pkcs12 file and pass
291 * pass the stack in to SSL.
466 * pass
474 check_password(PKCS12 *p12, char *pass) argument
[all...]
H A Dp12auxutl.c86 * pass - Pass phrase for the pkcs12 structure and private key (possibly
88 * both the private key(s) and as the pass phrase for the whole
103 sunw_PKCS12_create(const char *pass, STACK_OF(EVP_PKEY) *pkeys, argument
233 authsafe = PKCS12_pack_p7encdata(nid_cert, pass, -1,
267 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0,
346 if (PKCS12_set_mac(p12, pass, -1, NULL, 0, 2048, NULL) == 0) {
/opensolaris-onvv-gate/usr/src/common/openssl/apps/
H A Dapps.h266 const char *pass, ENGINE *e, const char *cert_descrip);
268 const char *pass, ENGINE *e, const char *key_descrip);
270 const char *pass, ENGINE *e, const char *key_descrip);
272 const char *pass, ENGINE *e, const char *cert_descrip);
H A Denc.c115 char *str=NULL, *passarg = NULL, *pass = NULL; local
168 else if (strcmp(*argv,"-pass") == 0)
278 BIO_printf(bio_err,"%-14s pass phrase source\n","-pass <arg>");
384 if(!app_passwd(bio_err, passarg, NULL, &pass, NULL)) {
388 str = pass;
636 if(pass) OPENSSL_free(pass);
/opensolaris-onvv-gate/usr/src/lib/libpp/common/
H A Dppmacref.c39 p += sfsprintf(p, MAXTOKEN, "\n#%s %s:%s %s %d", dirname(PRAGMA), pp.pass, keyname(X_MACREF), sym->name, type);
/opensolaris-onvv-gate/usr/src/lib/libsasl/include/
H A Dsasl.h343 * PASS_CREDENTIALS -- require mechanisms which pass client
344 * credentials, and allow mechanisms which can pass
630 * pass -- password to check (may not be NUL terminated)
637 const char *pass,
645 * pass -- password to store (may not be NUL terminated)
653 const char *pass,
682 #define SASL_CU_NONE 0x00 /* Not a valid flag to pass */
827 * may pass NULL to precompute for some mechanisms prior to connect
872 * NULL prompt_supp = user/pass via SASL_INTERACT only
1110 * pass
[all...]
/opensolaris-onvv-gate/usr/src/lib/libsmbfs/smb/
H A Dkeychain.c113 * pass pk here anyway just so we can use the
152 * Note: pass is a cleartext password.
158 const char *pass)
164 if (pass == NULL)
167 if ((err = ntlm_compute_lm_hash(lmhash, pass)) != 0)
169 if ((err = ntlm_compute_nt_hash(nthash, pass)) != 0)
157 smbfs_keychain_add(uid_t uid, const char *dom, const char *usr, const char *pass) argument
H A Dntlm.c78 ntlm_compute_lm_hash(uchar_t *hash, const char *pass) argument
86 ucpw = utf8_str_toupper(pass);
114 ntlm_compute_nt_hash(uchar_t *hash, const char *pass) argument
121 unipw = convert_utf8_to_leunicode(pass);
280 MD5Init(&context); /* init context for 1st pass */
283 MD5Final(digest, &context); /* finish up 1st pass */
288 MD5Init(&context); /* init context for 2nd pass */
291 MD5Final(digest, &context); /* finish up 2nd pass */
/opensolaris-onvv-gate/usr/src/cmd/format/
H A Danalyze.c126 int pass, needinit, data; local
220 for (pass = 0; pass < scan_passes || scan_loop; pass++) {
229 data = scan_patterns[pass % NPPATTERNS];
239 "\nThe last %d passes were successful, running alpha pattern pass", NPPATTERNS);
255 fmt_print("\n pass %d", pass);
258 fmt_print("\n pass %d", pass);
[all...]
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/srv/
H A Dserver_init.c111 kadm5_ret_t kadm5_init_with_password(char *client_name, char *pass, argument
119 return kadm5_init(client_name, pass, service_name, params,
135 * user. Therefore, always pass a dummy password in case this is
159 * user. Therefore, always pass a dummy password in case this is
177 kadm5_ret_t kadm5_init2(char *client_name, char *pass, argument
339 * The KADM5_API_VERSION_1 spec said "If pass (or keytab) is NULL
364 ((pass == NULL) || !(strlen(pass))) :
408 kadm5_ret_t kadm5_init(char *client_name, char *pass, argument
415 return (kadm5_init2(client_name, pass, service_nam
[all...]
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/
H A Dadmin.h386 kadm5_ret_t kadm5_init(char *client_name, char *pass,
398 char *pass,
441 long mask, char *pass);
447 char *pass);
467 char *pass);
473 char *pass);
701 ovsec_kadm_ret_t ovsec_kadm_init(char *client_name, char *pass,
708 char *pass,
727 long mask, char *pass);
740 char *pass);
[all...]
/opensolaris-onvv-gate/usr/src/uts/common/inet/ipf/
H A Dip_frag.c299 static ipfr_t *ipfr_newfrag(fin, pass, table)
301 u_32_t pass;
314 if (pass & FR_FRSTRICT)
374 fra->ipfr_pass = pass;
389 int fr_newfrag(fin, pass)
390 u_32_t pass;
400 fra = ipfr_newfrag(fin, pass, ifs->ifs_ipfr_heads);
423 int fr_nat_newfrag(fin, pass, nat)
425 u_32_t pass;
435 fra = ipfr_newfrag(fin, pass, if
668 u_32_t pass, oflx; local
[all...]
/opensolaris-onvv-gate/usr/src/cmd/filesync/
H A DREADME171 pass I (evaluate)
179 the main trick in this pass is that there may be
186 all restrictions and ignores take effect during this pass.
188 pass II (analyze)
191 gained during pass I, figure out what might conceivably
192 have changed and queue it for pass III. This pass doesn't
194 merely identifies candidates for pass III. This pass
195 ignores any nodes that were not evaluated during pass
[all...]
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/clnt/
H A Dclient_init.c81 char *pass,
106 kadm5_ret_t kadm5_init_with_password(char *client_name, char *pass, argument
114 return _kadm5_init_any(client_name, INIT_PASS, pass, NULL,
119 kadm5_ret_t kadm5_init(char *client_name, char *pass, argument
127 return _kadm5_init_any(client_name, INIT_PASS, pass, NULL,
578 char *pass,
718 * client_name, using password pass (which could be NULL), and
870 &creds, creds.client, pass, NULL,
876 if (!(pass && (code = krb5_kt_resolve(handle->context,
877 pass,
576 _kadm5_init_any(char *client_name, enum init_type init_type, char *pass, krb5_ccache ccache_in, char *service_name, kadm5_config_params *params_in, krb5_ui_4 struct_version, krb5_ui_4 api_version, char **db_args, void **server_handle) argument
[all...]
/opensolaris-onvv-gate/usr/src/lib/libpkg/common/
H A Dp12lib.c227 * pass - Pass phrase for the private key (possibly empty) or NULL if
272 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid,
313 if (pass == NULL || *pass == '\0') {
315 pass = NULL;
317 pass = "";
323 } else if (PKCS12_verify_mac(p12, pass, -1) == 0) {
328 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len,
367 * pass - Pass phrase for the private key or NULL if there is none.
437 * pass
451 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument
633 sunw_PKCS12_create(const char *pass, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) argument
1533 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
1703 parse_outer(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) *kl, STACK_OF(X509) *cl) argument
1792 parse_one_bag(PKCS12_SAFEBAG *bag, const char *pass, STACK_OF(EVP_PKEY) *kl, STACK_OF(X509) *cl) argument
[all...]
/opensolaris-onvv-gate/usr/src/cmd/lvm/metassist/common/
H A Dvolume_devconfig.h689 * Set the resync pass for mirror
694 * @param pass
695 * the value to set as the resync pass for mirror
704 extern int devconfig_set_mirror_pass(devconfig_t *mirror, uint16_t pass);
707 * Get resync pass for mirror
712 * @param pass
713 * RETURN: resync pass for mirror
722 extern int devconfig_get_mirror_pass(devconfig_t *mirror, uint16_t *pass);
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/t/op/
H A Dinc.t10 my ($pass, $wrong, $err) = @_;
11 if ($pass) {
H A Dref.t301 # reference to the constant string "pass" is in $a. The hack that made
307 my $expect = "pass\n";
309 prog => $lexical . 'BEGIN {$a = \q{pass}}; $a = $$a; print $a');
H A Dtiehandle.t24 ::pass();
178 ::pass();
183 ::pass();
217 # warnings should pass to the PRINT method of tied STDERR
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/t/io/
H A Dfs.t197 pass('atime');
198 pass('mtime');
208 pass("atime - accounted for possible NFS/glibc2.2 bug on linux");
209 pass("mtime - accounted for possible NFS/glibc2.2 bug on linux");
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/utils/
H A Dlibnetcfg.PL540 user/pass => external user & password
546 PASS pass
551 PASS pass
557 PASS pass
563 PASS pass
566 PASS pass@fwpass
571 PASS pass
574 PASS pass
/opensolaris-onvv-gate/usr/src/lib/efcode/engine/
H A Ddebug.c1160 int i, n, pass; local
1178 for (pass = 0; pass < 2; pass++) {
1181 if (pass) {
1221 if (pass)
1227 if (pass) {
1238 if (pass)
1244 if (pass)
1249 if (pass)
[all...]
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/
H A Din.rexecd.c159 static char pass[16]; variable
270 getstr(pass, sizeof (pass), "password");
554 if (pass[0] != '\0') {
555 r->resp = strdup(pass);

Completed in 218 milliseconds

1234567891011>>