/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/pkcs12/ |
H A D | p12_p8d.c | 63 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen) argument 65 return PKCS12_item_decrypt_d2i(p8->algor, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass,
|
H A D | p12_kiss.c | 65 static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, 68 static int parse_bags( STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, 71 static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, 80 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 106 if(!pass || !*pass) { 107 if(PKCS12_verify_mac(p12, NULL, 0)) pass = NULL; 108 else if(PKCS12_verify_mac(p12, "", 0)) pass = ""; 113 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 127 if (!parse_pk12 (p12, pass, 179 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument 224 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument [all...] |
H A D | pkcs12.h | 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 182 const char *pass, int passlen, 185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 215 const char *pass, int passlen, 218 int PKCS12_key_gen_asc(const char *pass, in 254 int key_nid, char *pass); variable 256 int safe_nid, int iter, char *pass); variable [all...] |
H A D | p12_decr.c | 71 unsigned char * PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, argument 81 if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, 114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) 121 if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, 151 const char *pass, int passlen, 166 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, 113 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument 150 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
|
H A D | p12_p8e.c | 64 const char *pass, int passlen, 86 pass, passlen, p8inf, 1); 63 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
H A D | p12_crpt.c | 69 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID, 101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
H A D | p12_mutl.c | 67 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument 94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, 109 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) argument 117 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) { 128 int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, argument 140 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) {
|
H A D | p12_add.c | 104 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, argument 125 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, 168 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument 200 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen, 209 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) 214 pass, passlen, 218 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, argument 221 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
|
H A D | p12_crt.c | 79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 130 if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass)) 138 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 170 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 229 int nid_key, char *pass) 242 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8); 266 int nid_safe, int iter, char *pass) 287 p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0,
|
H A D | p12_key.c | 77 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument 85 if(!pass) { 88 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { 103 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument 119 if (!pass) { 130 h__dump(pass, passlen); 153 for (i = 0; i < Plen; i++) *p++ = pass[i % passlen];
|
/barrelfish-2018-10-04/lib/acpica/tests/aslts/bin/bugstate/ |
H A D | bdemossum | 30 local pass=0 fail=0 blck=0 skip=0 44 SUMMARY[$prev_num]="$prev_num:$2:$fail:$blck:$pass:$skip" 55 SUMMARY[$prev_num]="$prev_num:$2:$fail:$blck:$pass:$skip" 56 pass=0 65 pass=$[ $pass + 1 ] 75 SUMMARY[$prev_num]="$prev_num:$2:$fail:$blck:$pass:$skip"
|
/barrelfish-2018-10-04/usr/skb/testapps/ |
H A D | aesevpexample.c | 27 char *pass = "password"; local 42 PKCS5_PBKDF2_HMAC_SHA1(pass, strlen(pass), salt, strlen(salt), ic, 128, key_material); 43 printf("PKCS5_PBKDF2_HMAC_SHA1(\"%s\", \"%s\", %d)=\n", pass, salt, ic);
|
H A D | apps.h | 247 const char *pass, ENGINE *e, const char *cert_descrip); 249 const char *pass, ENGINE *e, const char *key_descrip); 251 const char *pass, ENGINE *e, const char *key_descrip); 253 const char *pass, ENGINE *e, const char *cert_descrip); 255 const char *pass, ENGINE *e, const char *cert_descrip);
|
/barrelfish-2018-10-04/lib/libc/string/ |
H A D | wcscoll.c | 47 int direc, pass; local 65 * safely. You absolutely have to run this pass by pass, 69 * during the primary pass anyway. 71 * Note that we do one final extra pass at the end to pick 74 for (pass = 0; pass <= table->info->directive_count; pass++) { 82 /* special pass for UNDEFINED */ 83 if (pass [all...] |
/barrelfish-2018-10-04/include/openssl/ |
H A D | pkcs12.h | 178 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, int passlen); 179 PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, 182 const char *pass, int passlen, 185 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 191 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 194 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen); 209 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 213 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 215 const char *pass, int passlen, 218 int PKCS12_key_gen_asc(const char *pass, in 254 int key_nid, char *pass); variable 256 int safe_nid, int iter, char *pass); variable [all...] |
/barrelfish-2018-10-04/lib/libc/locale/ |
H A D | collate.c | 209 substsearch(struct xlocale_collate *table, const wchar_t key, int pass) argument 212 int n = table->info->subst_count[pass]; 217 if (pass >= table->info->directive_count) 223 p = table->subst_table[pass] + (key & ~COLLATE_SUBST_PRIORITY); 296 * If this is the "last" pass for the UNDEFINED, then 398 int pass; local 406 for (pass = 0; pass <= ndir; pass++) { 410 if (pass ! 518 xfrm(struct xlocale_collate *table, unsigned char *p, int pri, int pass) argument 543 int pass; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/evp/ |
H A D | p5_crpt2.c | 79 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, argument 96 if(!pass) 99 passlen = strlen(pass); 113 HMAC_Init_ex(&hctx, pass, passlen, digest, NULL); 120 HMAC(digest, pass, passlen, 132 h__dump (pass, passlen); 142 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument 146 return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, EVP_sha1(), 167 int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 278 if(!PKCS5_PBKDF2_HMAC(pass, passle [all...] |
H A D | p5_crpt.c | 72 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument 104 if(!pass) passlen = 0; 105 else if(passlen == -1) passlen = strlen(pass); 109 EVP_DigestUpdate(&ctx, pass, passlen);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/apps/ |
H A D | pkcs8.c | 86 char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL; local 214 BIO_printf(bio_err, "-passin arg input file pass phrase source\n"); 217 BIO_printf(bio_err, "-passout arg output file pass phrase source\n"); 306 p8pass = pass; 307 if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1)) 369 p8pass = pass; 370 EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
H A D | apps.h | 247 const char *pass, ENGINE *e, const char *cert_descrip); 249 const char *pass, ENGINE *e, const char *key_descrip); 251 const char *pass, ENGINE *e, const char *key_descrip); 253 const char *pass, ENGINE *e, const char *cert_descrip); 255 const char *pass, ENGINE *e, const char *cert_descrip);
|
H A D | genpkey.c | 87 char *pass = NULL; local 115 else if (!strcmp(*args,"-pass")) 203 BIO_printf(bio_err, "-pass arg output file pass phrase source\n"); 218 if (!app_passwd(bio_err, passarg, NULL, &pass, NULL)) 270 NULL, pass); 309 if (pass) 310 OPENSSL_free(pass);
|
H A D | pkcs12.c | 83 int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass); 84 int dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass, 86 int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass, int passlen, int options, char *pempass); 106 char pass[50], macpass[50]; local 326 BIO_printf (bio_err, "-passin p input file pass phrase source\n"); 327 BIO_printf (bio_err, "-passout p output file pass phrase source\n"); 362 cpass = pass; 571 EVP_read_pw_string(pass, sizeof pass, "Enter Export Password:", 1)) 576 if (!twopass) BUF_strlcpy(macpass, pass, sizeo 697 dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass) argument 739 dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass, int passlen, int options, char *pempass) argument 753 dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bag, char *pass, int passlen, int options, char *pempass) argument [all...] |
/barrelfish-2018-10-04/usr/tests/msun/ |
H A D | fenv_test.c | 350 int except, i, pass, raise, status; local 366 for (pass = 0; pass < 2; pass++) { 391 switch (pass) { 430 int except, i, pass, status, raise; local 435 for (pass = 0; pass < 2; pass++) { 453 * the child until the second pass, s [all...] |
/barrelfish-2018-10-04/lib/bulk_transfer/backends/sm/ |
H A D | pending_msg.h | 60 struct pending_pass pass; member in union:pending_msg_data
|
/barrelfish-2018-10-04/usr/tests/nkm/ |
H A D | invalid_mappings.c | 48 static int pass = 0, fail = 0; variable 53 pass++; 166 printf("All tests executed: %d PASSED, %d FAILED\n", pass, fail);
|