Searched refs:pass (Results 1 - 25 of 107) sorted by relevance

12345

/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pkcs12/
H A Dp12_p8d.c63 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen) argument
65 return PKCS12_item_decrypt_d2i(p8->algor, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass,
H A Dp12_kiss.c65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
68 static int parse_bags( STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass,
71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen,
80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
106 if(!pass || !*pass) {
107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL;
108 else if(PKCS12_verify_mac(p12, "", 0)) pass = "";
113 } else if (!PKCS12_verify_mac(p12, pass, -1)) {
127 if (!parse_pk12 (p12, pass,
179 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument
224 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument
[all...]
H A Dpkcs12.h178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen);
179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
182 const char *pass, int passlen,
185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen);
209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf);
215 const char *pass, int passlen,
218 int PKCS12_key_gen_asc(const char *pass, in
254 int key_nid, char *pass); variable
256 int safe_nid, int iter, char *pass); variable
[all...]
H A Dp12_decr.c71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, argument
81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen,
114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf)
121 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length,
151 const char *pass, int passlen,
166 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data,
113 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument
150 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
H A Dp12_p8e.c64 const char *pass, int passlen,
86 pass, passlen, p8inf, 1);
63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
H A Dp12_crpt.c69 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_mutl.c67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
109 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) argument
117 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) {
128 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, argument
140 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) {
H A Dp12_add.c104 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, argument
125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
168 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument
200 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen,
209 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen)
214 pass, passlen,
218 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, argument
221 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
H A Dp12_crt.c79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
130 if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass))
138 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
170 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL))
229 int nid_key, char *pass)
242 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8);
266 int nid_safe, int iter, char *pass)
287 p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0,
H A Dp12_key.c77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument
85 if(!pass) {
88 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) {
103 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument
119 if (!pass) {
130 h__dump(pass, passlen);
153 for (i = 0; i < Plen; i++) *p++ = pass[i % passlen];
/barrelfish-2018-10-04/lib/acpica/tests/aslts/bin/bugstate/
H A Dbdemossum30 local pass=0 fail=0 blck=0 skip=0
44 SUMMARY[$prev_num]="$prev_num:$2:$fail:$blck:$pass:$skip"
55 SUMMARY[$prev_num]="$prev_num:$2:$fail:$blck:$pass:$skip"
56 pass=0
65 pass=$[ $pass + 1 ]
75 SUMMARY[$prev_num]="$prev_num:$2:$fail:$blck:$pass:$skip"
/barrelfish-2018-10-04/usr/skb/testapps/
H A Daesevpexample.c27 char *pass = "password"; local
42 PKCS5_PBKDF2_HMAC_SHA1(pass, strlen(pass), salt, strlen(salt), ic, 128, key_material);
43 printf("PKCS5_PBKDF2_HMAC_SHA1(\"%s\", \"%s\", %d)=\n", pass, salt, ic);
H A Dapps.h247 const char *pass, ENGINE *e, const char *cert_descrip);
249 const char *pass, ENGINE *e, const char *key_descrip);
251 const char *pass, ENGINE *e, const char *key_descrip);
253 const char *pass, ENGINE *e, const char *cert_descrip);
255 const char *pass, ENGINE *e, const char *cert_descrip);
/barrelfish-2018-10-04/lib/libc/string/
H A Dwcscoll.c47 int direc, pass; local
65 * safely. You absolutely have to run this pass by pass,
69 * during the primary pass anyway.
71 * Note that we do one final extra pass at the end to pick
74 for (pass = 0; pass <= table->info->directive_count; pass++) {
82 /* special pass for UNDEFINED */
83 if (pass
[all...]
/barrelfish-2018-10-04/include/openssl/
H A Dpkcs12.h178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen);
179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass,
182 const char *pass, int passlen,
185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen);
209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf);
215 const char *pass, int passlen,
218 int PKCS12_key_gen_asc(const char *pass, in
254 int key_nid, char *pass); variable
256 int safe_nid, int iter, char *pass); variable
[all...]
/barrelfish-2018-10-04/lib/libc/locale/
H A Dcollate.c209 substsearch(struct xlocale_collate *table, const wchar_t key, int pass) argument
212 int n = table->info->subst_count[pass];
217 if (pass >= table->info->directive_count)
223 p = table->subst_table[pass] + (key & ~COLLATE_SUBST_PRIORITY);
296 * If this is the "last" pass for the UNDEFINED, then
398 int pass; local
406 for (pass = 0; pass <= ndir; pass++) {
410 if (pass !
518 xfrm(struct xlocale_collate *table, unsigned char *p, int pri, int pass) argument
543 int pass; local
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/
H A Dp5_crpt2.c79 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, argument
96 if(!pass)
99 passlen = strlen(pass);
113 HMAC_Init_ex(&hctx, pass, passlen, digest, NULL);
120 HMAC(digest, pass, passlen,
132 h__dump (pass, passlen);
142 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument
146 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(),
167 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
278 if(!PKCS5_PBKDF2_HMAC(pass, passle
[all...]
H A Dp5_crpt.c72 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument
104 if(!pass) passlen = 0;
105 else if(passlen == -1) passlen = strlen(pass);
109 EVP_DigestUpdate(&ctx, pass, passlen);
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/
H A Dpkcs8.c86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local
214 BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
217 BIO_printf(bio_err, "-passout arg output file pass phrase source\n");
306 p8pass = pass;
307 if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
369 p8pass = pass;
370 EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
H A Dapps.h247 const char *pass, ENGINE *e, const char *cert_descrip);
249 const char *pass, ENGINE *e, const char *key_descrip);
251 const char *pass, ENGINE *e, const char *key_descrip);
253 const char *pass, ENGINE *e, const char *cert_descrip);
255 const char *pass, ENGINE *e, const char *cert_descrip);
H A Dgenpkey.c87 char *pass = NULL; local
115 else if (!strcmp(*args,"-pass"))
203 BIO_printf(bio_err, "-pass arg output file pass phrase source\n");
218 if (!app_passwd(bio_err, passarg, NULL, &pass, NULL))
270 NULL, pass);
309 if (pass)
310 OPENSSL_free(pass);
H A Dpkcs12.c83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass);
84 int dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass,
86 int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass, int passlen, int options, char *pempass);
106 char pass[50], macpass[50]; local
326 BIO_printf (bio_err, "-passin p input file pass phrase source\n");
327 BIO_printf (bio_err, "-passout p output file pass phrase source\n");
362 cpass = pass;
571 EVP_read_pw_string(pass, sizeof pass, "Enter Export Password:", 1))
576 if (!twopass) BUF_strlcpy(macpass, pass, sizeo
697 dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass) argument
739 dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass, int passlen, int options, char *pempass) argument
753 dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bag, char *pass, int passlen, int options, char *pempass) argument
[all...]
/barrelfish-2018-10-04/usr/tests/msun/
H A Dfenv_test.c350 int except, i, pass, raise, status; local
366 for (pass = 0; pass < 2; pass++) {
391 switch (pass) {
430 int except, i, pass, status, raise; local
435 for (pass = 0; pass < 2; pass++) {
453 * the child until the second pass, s
[all...]
/barrelfish-2018-10-04/lib/bulk_transfer/backends/sm/
H A Dpending_msg.h60 struct pending_pass pass; member in union:pending_msg_data
/barrelfish-2018-10-04/usr/tests/nkm/
H A Dinvalid_mappings.c48 static int pass = 0, fail = 0; variable
53 pass++;
166 printf("All tests executed: %d PASSED, %d FAILED\n", pass, fail);

Completed in 110 milliseconds

12345