/opensolaris-onvv-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Privilege/t/ |
H A D | Privilege.t | 22 sub pass 47 pass(); 64 pass(); 73 pass();
|
/opensolaris-onvv-gate/usr/src/cmd/agents/snmp/snmprelayd/ |
H A D | sh_table.h | 85 extern int single_table_to_subtrees(int pass,Table *tp, char* error_label);
|
/opensolaris-onvv-gate/usr/src/common/net/wanboot/ |
H A D | p12access.c | 24 * certs and pass them to SSL. They replace similar functions for PEM, 28 * sunw_p12_use_certfile - gets the user's cert from a pkcs12 file & pass 31 * pass it to SSL 65 * sunw_use_x509cert - pass an x509 client certificate to ssl 69 * cert - Certificate to pass in x509 format 93 * sunw_use_pkey - pass an EVP_PKEY private key to ssl 179 * pass it in to SSL. 232 * sunw_p12_use_keyfile - read a RSA private key from a pkcs12 file and pass 291 * pass the stack in to SSL. 466 * pass 474 check_password(PKCS12 *p12, char *pass) argument [all...] |
H A D | p12auxutl.c | 86 * pass - Pass phrase for the pkcs12 structure and private key (possibly 88 * both the private key(s) and as the pass phrase for the whole 103 sunw_PKCS12_create(const char *pass, STACK_OF(EVP_PKEY) *pkeys, argument 233 authsafe = PKCS12_pack_p7encdata(nid_cert, pass, -1, 267 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, 346 if (PKCS12_set_mac(p12, pass, -1, NULL, 0, 2048, NULL) == 0) {
|
/opensolaris-onvv-gate/usr/src/common/openssl/apps/ |
H A D | apps.h | 266 const char *pass, ENGINE *e, const char *cert_descrip); 268 const char *pass, ENGINE *e, const char *key_descrip); 270 const char *pass, ENGINE *e, const char *key_descrip); 272 const char *pass, ENGINE *e, const char *cert_descrip);
|
H A D | enc.c | 115 char *str=NULL, *passarg = NULL, *pass = NULL; local 168 else if (strcmp(*argv,"-pass") == 0) 278 BIO_printf(bio_err,"%-14s pass phrase source\n","-pass <arg>"); 384 if(!app_passwd(bio_err, passarg, NULL, &pass, NULL)) { 388 str = pass; 636 if(pass) OPENSSL_free(pass);
|
/opensolaris-onvv-gate/usr/src/lib/libpp/common/ |
H A D | ppmacref.c | 39 p += sfsprintf(p, MAXTOKEN, "\n#%s %s:%s %s %d", dirname(PRAGMA), pp.pass, keyname(X_MACREF), sym->name, type);
|
/opensolaris-onvv-gate/usr/src/lib/libsasl/include/ |
H A D | sasl.h | 343 * PASS_CREDENTIALS -- require mechanisms which pass client 344 * credentials, and allow mechanisms which can pass 630 * pass -- password to check (may not be NUL terminated) 637 const char *pass, 645 * pass -- password to store (may not be NUL terminated) 653 const char *pass, 682 #define SASL_CU_NONE 0x00 /* Not a valid flag to pass */ 827 * may pass NULL to precompute for some mechanisms prior to connect 872 * NULL prompt_supp = user/pass via SASL_INTERACT only 1110 * pass [all...] |
/opensolaris-onvv-gate/usr/src/lib/libsmbfs/smb/ |
H A D | keychain.c | 113 * pass pk here anyway just so we can use the 152 * Note: pass is a cleartext password. 158 const char *pass) 164 if (pass == NULL) 167 if ((err = ntlm_compute_lm_hash(lmhash, pass)) != 0) 169 if ((err = ntlm_compute_nt_hash(nthash, pass)) != 0) 157 smbfs_keychain_add(uid_t uid, const char *dom, const char *usr, const char *pass) argument
|
H A D | ntlm.c | 78 ntlm_compute_lm_hash(uchar_t *hash, const char *pass) argument 86 ucpw = utf8_str_toupper(pass); 114 ntlm_compute_nt_hash(uchar_t *hash, const char *pass) argument 121 unipw = convert_utf8_to_leunicode(pass); 280 MD5Init(&context); /* init context for 1st pass */ 283 MD5Final(digest, &context); /* finish up 1st pass */ 288 MD5Init(&context); /* init context for 2nd pass */ 291 MD5Final(digest, &context); /* finish up 2nd pass */
|
/opensolaris-onvv-gate/usr/src/cmd/format/ |
H A D | analyze.c | 126 int pass, needinit, data; local 220 for (pass = 0; pass < scan_passes || scan_loop; pass++) { 229 data = scan_patterns[pass % NPPATTERNS]; 239 "\nThe last %d passes were successful, running alpha pattern pass", NPPATTERNS); 255 fmt_print("\n pass %d", pass); 258 fmt_print("\n pass %d", pass); [all...] |
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/srv/ |
H A D | server_init.c | 111 kadm5_ret_t kadm5_init_with_password(char *client_name, char *pass, argument 119 return kadm5_init(client_name, pass, service_name, params, 135 * user. Therefore, always pass a dummy password in case this is 159 * user. Therefore, always pass a dummy password in case this is 177 kadm5_ret_t kadm5_init2(char *client_name, char *pass, argument 339 * The KADM5_API_VERSION_1 spec said "If pass (or keytab) is NULL 364 ((pass == NULL) || !(strlen(pass))) : 408 kadm5_ret_t kadm5_init(char *client_name, char *pass, argument 415 return (kadm5_init2(client_name, pass, service_nam [all...] |
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/ |
H A D | admin.h | 386 kadm5_ret_t kadm5_init(char *client_name, char *pass, 398 char *pass, 441 long mask, char *pass); 447 char *pass); 467 char *pass); 473 char *pass); 701 ovsec_kadm_ret_t ovsec_kadm_init(char *client_name, char *pass, 708 char *pass, 727 long mask, char *pass); 740 char *pass); [all...] |
/opensolaris-onvv-gate/usr/src/uts/common/inet/ipf/ |
H A D | ip_frag.c | 299 static ipfr_t *ipfr_newfrag(fin, pass, table) 301 u_32_t pass; 314 if (pass & FR_FRSTRICT) 374 fra->ipfr_pass = pass; 389 int fr_newfrag(fin, pass) 390 u_32_t pass; 400 fra = ipfr_newfrag(fin, pass, ifs->ifs_ipfr_heads); 423 int fr_nat_newfrag(fin, pass, nat) 425 u_32_t pass; 435 fra = ipfr_newfrag(fin, pass, if 668 u_32_t pass, oflx; local [all...] |
/opensolaris-onvv-gate/usr/src/cmd/filesync/ |
H A D | README | 171 pass I (evaluate) 179 the main trick in this pass is that there may be 186 all restrictions and ignores take effect during this pass. 188 pass II (analyze) 191 gained during pass I, figure out what might conceivably 192 have changed and queue it for pass III. This pass doesn't 194 merely identifies candidates for pass III. This pass 195 ignores any nodes that were not evaluated during pass [all...] |
/opensolaris-onvv-gate/usr/src/lib/krb5/kadm5/clnt/ |
H A D | client_init.c | 81 char *pass, 106 kadm5_ret_t kadm5_init_with_password(char *client_name, char *pass, argument 114 return _kadm5_init_any(client_name, INIT_PASS, pass, NULL, 119 kadm5_ret_t kadm5_init(char *client_name, char *pass, argument 127 return _kadm5_init_any(client_name, INIT_PASS, pass, NULL, 578 char *pass, 718 * client_name, using password pass (which could be NULL), and 870 &creds, creds.client, pass, NULL, 876 if (!(pass && (code = krb5_kt_resolve(handle->context, 877 pass, 576 _kadm5_init_any(char *client_name, enum init_type init_type, char *pass, krb5_ccache ccache_in, char *service_name, kadm5_config_params *params_in, krb5_ui_4 struct_version, krb5_ui_4 api_version, char **db_args, void **server_handle) argument [all...] |
/opensolaris-onvv-gate/usr/src/lib/libpkg/common/ |
H A D | p12lib.c | 227 * pass - Pass phrase for the private key (possibly empty) or NULL if 272 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, 313 if (pass == NULL || *pass == '\0') { 315 pass = NULL; 317 pass = ""; 323 } else if (PKCS12_verify_mac(p12, pass, -1) == 0) { 328 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len, 367 * pass - Pass phrase for the private key or NULL if there is none. 437 * pass 451 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument 633 sunw_PKCS12_create(const char *pass, STACK_OF(EVP_PKEY) *pkeys, STACK_OF(X509) *certs, STACK_OF(X509) *cacerts) argument 1533 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 1703 parse_outer(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) *kl, STACK_OF(X509) *cl) argument 1792 parse_one_bag(PKCS12_SAFEBAG *bag, const char *pass, STACK_OF(EVP_PKEY) *kl, STACK_OF(X509) *cl) argument [all...] |
/opensolaris-onvv-gate/usr/src/cmd/lvm/metassist/common/ |
H A D | volume_devconfig.h | 689 * Set the resync pass for mirror 694 * @param pass 695 * the value to set as the resync pass for mirror 704 extern int devconfig_set_mirror_pass(devconfig_t *mirror, uint16_t pass); 707 * Get resync pass for mirror 712 * @param pass 713 * RETURN: resync pass for mirror 722 extern int devconfig_get_mirror_pass(devconfig_t *mirror, uint16_t *pass);
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/t/op/ |
H A D | inc.t | 10 my ($pass, $wrong, $err) = @_; 11 if ($pass) {
|
H A D | ref.t | 301 # reference to the constant string "pass" is in $a. The hack that made 307 my $expect = "pass\n"; 309 prog => $lexical . 'BEGIN {$a = \q{pass}}; $a = $$a; print $a');
|
H A D | tiehandle.t | 24 ::pass(); 178 ::pass(); 183 ::pass(); 217 # warnings should pass to the PRINT method of tied STDERR
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/t/io/ |
H A D | fs.t | 197 pass('atime'); 198 pass('mtime'); 208 pass("atime - accounted for possible NFS/glibc2.2 bug on linux"); 209 pass("mtime - accounted for possible NFS/glibc2.2 bug on linux");
|
/opensolaris-onvv-gate/usr/src/cmd/perl/5.8.4/distrib/utils/ |
H A D | libnetcfg.PL | 540 user/pass => external user & password 546 PASS pass 551 PASS pass 557 PASS pass 563 PASS pass 566 PASS pass@fwpass 571 PASS pass 574 PASS pass
|
/opensolaris-onvv-gate/usr/src/lib/efcode/engine/ |
H A D | debug.c | 1160 int i, n, pass; local 1178 for (pass = 0; pass < 2; pass++) { 1181 if (pass) { 1221 if (pass) 1227 if (pass) { 1238 if (pass) 1244 if (pass) 1249 if (pass) [all...] |
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.rexecd.c | 159 static char pass[16]; variable 270 getstr(pass, sizeof (pass), "password"); 554 if (pass[0] != '\0') { 555 r->resp = strdup(pass);
|