/freebsd-10.1-release/contrib/ntp/tests/ntpd/ |
H A D | Makefile.in | 417 # pass "-e" to $(SHELL), and POSIX 2008 even requires this. Work around it 1344 pass=` grep "^$$ws*:test-result:$$ws*PASS" $$results | wc -l`; \ 1377 result_count $$1 "PASS: " $$pass "$$grn"; \
|
/freebsd-10.1-release/contrib/ntp/sntp/ |
H A D | configure | 1640 LIBS libraries to pass to the linker, e.g. -l<library> 19891 # PORTME Check for flag to pass linker flags through the system compiler. 32783 # How to pass a linker flag through the compiler. 33129 # How to pass a linker flag through the compiler.
|
/freebsd-10.1-release/contrib/ntp/ntpq/ |
H A D | ntpq.c | 1235 char * pass; local 1303 pass = getpass_keytype(info_auth_keytype); 1304 if ('\0' == pass[0]) { 1309 (u_char *)pass); 2569 const char *pass; local 2579 pass = pcmd->argval[0].string; 2581 pass = getpass_keytype(info_auth_keytype); 2582 if ('\0' == pass[0]) { 2588 (const u_char *)pass);
|
/freebsd-10.1-release/contrib/ntp/ |
H A D | configure | 1846 LIBS libraries to pass to the linker, e.g. -l<library> 12100 # PORTME Check for flag to pass linker flags through the system compiler. [all...] |
/freebsd-10.1-release/crypto/openssl/ssl/ |
H A D | ssl.h | 968 * Engine to pass requests for client certs to 1993 int SSL_set_srp_server_param_pw(SSL *s, const char *user, const char *pass,
|
H A D | tls_srp.c | 266 int SSL_set_srp_server_param_pw(SSL *s, const char *user, const char *pass, argument 283 (user, pass, &s->srp_ctx.s, &s->srp_ctx.v, GN->N, GN->g))
|
H A D | ssltest.c | 261 /* This is a context that we pass to all callbacks */ 276 /* This is a context that we pass to SRP server callbacks */ 279 char *pass; member in struct:srp_server_arg_st 290 if (SSL_set_srp_server_param_pw(s, p->expected_user, p->pass, "1024") < 0) { 657 srp_server_arg.pass = srp_client_arg.srppassin = *(++argv);
|
/freebsd-10.1-release/contrib/tzcode/zic/ |
H A D | zic.c | 1453 register int pass; local 1548 for (pass = 1; pass <= 2; ++pass) { 1559 if (pass == 1) { 1684 if (pass == 1) 1726 if (pass == 1)
|
/freebsd-10.1-release/contrib/ntp/sntp/tests/ |
H A D | Makefile.in | 417 # pass "-e" to $(SHELL), and POSIX 2008 even requires this. Work around it 1172 pass=` grep "^$$ws*:test-result:$$ws*PASS" $$results | wc -l`; \ 1205 result_count $$1 "PASS: " $$pass "$$grn"; \
|
/freebsd-10.1-release/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 880 char * pass; local 911 pass = getpass_keytype(info_auth_keytype); 912 if ('\0' == pass[0]) { 917 (u_char *)pass); 1788 char *pass; local 1798 pass = pcmd->argval[0].string; 1800 pass = getpass_keytype(info_auth_keytype); 1801 if ('\0' == *pass) { 1806 authusekey(info_auth_keyid, info_auth_keytype, (u_char *)pass);
|
/freebsd-10.1-release/contrib/ntp/tests/ntpq/ |
H A D | Makefile.in | 349 # pass "-e" to $(SHELL), and POSIX 2008 even requires this. Work around it 930 pass=` grep "^$$ws*:test-result:$$ws*PASS" $$results | wc -l`; \ 963 result_count $$1 "PASS: " $$pass "$$grn"; \
|
/freebsd-10.1-release/contrib/ntp/tests/libntp/ |
H A D | Makefile.in | 726 # pass "-e" to $(SHELL), and POSIX 2008 even requires this. Work around it 2005 pass=` grep "^$$ws*:test-result:$$ws*PASS" $$results | wc -l`; \ 2038 result_count $$1 "PASS: " $$pass "$$grn"; \
|
/freebsd-10.1-release/crypto/openssl/crypto/ts/ |
H A D | ts.h | 733 EVP_PKEY *TS_CONF_load_key(const char *file, const char *pass); 745 const char *key, const char *pass,
|
H A D | ts_conf.c | 138 EVP_PKEY *TS_CONF_load_key(const char *file, const char *pass) argument 145 pkey = PEM_read_bio_PrivateKey(key, NULL, NULL, (char *)pass); 284 const char *key, const char *pass, 295 if (!(key_obj = TS_CONF_load_key(key, pass))) 283 TS_CONF_set_signer_key(CONF *conf, const char *section, const char *key, const char *pass, TS_RESP_CTX *ctx) argument
|
/freebsd-10.1-release/crypto/openssl/crypto/pkcs12/ |
H A D | pkcs12.h | 180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass, 183 const char *pass, int passlen); 185 const char *pass, int passlen, unsigned char *salt, 187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, 193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, 196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, 213 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, 218 const char *pass, int passlen, 222 const char *pass, int passlen, 225 int PKCS12_key_gen_asc(const char *pass, in 264 int key_nid, char *pass); variable 266 int safe_nid, int iter, char *pass); variable [all...] |
H A D | p12_add.c | 105 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, argument 127 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter, 170 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument 202 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, 211 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, 218 pass, passlen, 223 const char *pass, int passlen) 225 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); 222 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument
|
H A D | p12_crpt.c | 70 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 99 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_KEY_ID, 105 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_IV_ID,
|
H A D | p12_crt.c | 80 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument 137 if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass)) 144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 176 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 235 int nid_key, char *pass) 247 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8); 270 int nid_safe, int iter, char *pass) 293 p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0, iter, bags);
|
H A D | p12_kiss.c | 66 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 69 static int parse_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, 72 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 82 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 109 if (!pass || !*pass) { 111 pass = NULL; 113 pass = ""; 118 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 131 if (!parse_pk12(p12, pass, 180 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument 226 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument [all...] |
H A D | p12_key.c | 80 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument 88 if (!pass) { 91 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { 106 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument 122 if (!pass) { 133 h__dump(pass, passlen); 161 *p++ = pass[i % passlen];
|
/freebsd-10.1-release/crypto/openssl/crypto/pem/ |
H A D | pvkfmt.c | 660 const unsigned char *pass, int passlen) 667 || !EVP_DigestUpdate(&mctx, pass, passlen) 658 derive_pvk_key(unsigned char *key, const unsigned char *salt, unsigned int saltlen, const unsigned char *pass, int passlen) argument
|
/freebsd-10.1-release/crypto/openssl/crypto/stack/ |
H A D | safestack.h | 204 # define SKM_PKCS12_decrypt_d2i(type, algor, d2i_func, free_func, pass, passlen, oct, seq) \ 208 pass, passlen, oct, seq) 2308 # define PKCS12_decrypt_d2i_PKCS12_SAFEBAG(algor, d2i_func, free_func, pass, passlen, oct, seq) \ 2309 SKM_PKCS12_decrypt_d2i(PKCS12_SAFEBAG, (algor), (d2i_func), (free_func), (pass), (passlen), (oct), (seq)) 2310 # define PKCS12_decrypt_d2i_PKCS7(algor, d2i_func, free_func, pass, passlen, oct, seq) \ 2311 SKM_PKCS12_decrypt_d2i(PKCS7, (algor), (d2i_func), (free_func), (pass), (passlen), (oct), (seq))
|
/freebsd-10.1-release/crypto/openssl/crypto/srp/ |
H A D | srp_vfy.c | 567 char *SRP_create_verifier(const char *user, const char *pass, char **salt, argument 579 (pass == NULL) || (salt == NULL) || (verifier == NULL)) 610 if (!SRP_create_verifier_BN(user, pass, &s, &v, N_bn, g_bn)) 643 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, argument 652 (pass == NULL) || 667 x = SRP_Calc_x(*salt, user, pass);
|
H A D | srp_lib.c | 211 BIGNUM *SRP_Calc_x(BIGNUM *s, const char *user, const char *pass) argument 217 if ((s == NULL) || (user == NULL) || (pass == NULL)) 227 EVP_DigestUpdate(&ctxt, pass, strlen(pass));
|
H A D | srp.h | 129 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 131 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, 166 BIGNUM *SRP_Calc_x(BIGNUM *s, const char *user, const char *pass);
|