Searched refs:pass (Results 1 - 25 of 311) sorted by last modified time

1234567891011>>

/freebsd-10.1-release/contrib/ntp/tests/ntpd/
H A DMakefile.in417 # pass "-e" to $(SHELL), and POSIX 2008 even requires this. Work around it
1344 pass=` grep "^$$ws*:test-result:$$ws*PASS" $$results | wc -l`; \
1377 result_count $$1 "PASS: " $$pass "$$grn"; \
/freebsd-10.1-release/contrib/ntp/sntp/
H A Dconfigure1640 LIBS libraries to pass to the linker, e.g. -l<library>
19891 # PORTME Check for flag to pass linker flags through the system compiler.
32783 # How to pass a linker flag through the compiler.
33129 # How to pass a linker flag through the compiler.
/freebsd-10.1-release/contrib/ntp/ntpq/
H A Dntpq.c1235 char * pass; local
1303 pass = getpass_keytype(info_auth_keytype);
1304 if ('\0' == pass[0]) {
1309 (u_char *)pass);
2569 const char *pass; local
2579 pass = pcmd->argval[0].string;
2581 pass = getpass_keytype(info_auth_keytype);
2582 if ('\0' == pass[0]) {
2588 (const u_char *)pass);
/freebsd-10.1-release/contrib/ntp/
H A Dconfigure1846 LIBS libraries to pass to the linker, e.g. -l<library>
12100 # PORTME Check for flag to pass linker flags through the system compiler.
[all...]
/freebsd-10.1-release/crypto/openssl/ssl/
H A Dssl.h968 * Engine to pass requests for client certs to
1993 int SSL_set_srp_server_param_pw(SSL *s, const char *user, const char *pass,
H A Dtls_srp.c266 int SSL_set_srp_server_param_pw(SSL *s, const char *user, const char *pass, argument
283 (user, pass, &s->srp_ctx.s, &s->srp_ctx.v, GN->N, GN->g))
H A Dssltest.c261 /* This is a context that we pass to all callbacks */
276 /* This is a context that we pass to SRP server callbacks */
279 char *pass; member in struct:srp_server_arg_st
290 if (SSL_set_srp_server_param_pw(s, p->expected_user, p->pass, "1024") < 0) {
657 srp_server_arg.pass = srp_client_arg.srppassin = *(++argv);
/freebsd-10.1-release/contrib/tzcode/zic/
H A Dzic.c1453 register int pass; local
1548 for (pass = 1; pass <= 2; ++pass) {
1559 if (pass == 1) {
1684 if (pass == 1)
1726 if (pass == 1)
/freebsd-10.1-release/contrib/ntp/sntp/tests/
H A DMakefile.in417 # pass "-e" to $(SHELL), and POSIX 2008 even requires this. Work around it
1172 pass=` grep "^$$ws*:test-result:$$ws*PASS" $$results | wc -l`; \
1205 result_count $$1 "PASS: " $$pass "$$grn"; \
/freebsd-10.1-release/contrib/ntp/ntpdc/
H A Dntpdc.c880 char * pass; local
911 pass = getpass_keytype(info_auth_keytype);
912 if ('\0' == pass[0]) {
917 (u_char *)pass);
1788 char *pass; local
1798 pass = pcmd->argval[0].string;
1800 pass = getpass_keytype(info_auth_keytype);
1801 if ('\0' == *pass) {
1806 authusekey(info_auth_keyid, info_auth_keytype, (u_char *)pass);
/freebsd-10.1-release/contrib/ntp/tests/ntpq/
H A DMakefile.in349 # pass "-e" to $(SHELL), and POSIX 2008 even requires this. Work around it
930 pass=` grep "^$$ws*:test-result:$$ws*PASS" $$results | wc -l`; \
963 result_count $$1 "PASS: " $$pass "$$grn"; \
/freebsd-10.1-release/contrib/ntp/tests/libntp/
H A DMakefile.in726 # pass "-e" to $(SHELL), and POSIX 2008 even requires this. Work around it
2005 pass=` grep "^$$ws*:test-result:$$ws*PASS" $$results | wc -l`; \
2038 result_count $$1 "PASS: " $$pass "$$grn"; \
/freebsd-10.1-release/crypto/openssl/crypto/ts/
H A Dts.h733 EVP_PKEY *TS_CONF_load_key(const char *file, const char *pass);
745 const char *key, const char *pass,
H A Dts_conf.c138 EVP_PKEY *TS_CONF_load_key(const char *file, const char *pass) argument
145 pkey = PEM_read_bio_PrivateKey(key, NULL, NULL, (char *)pass);
284 const char *key, const char *pass,
295 if (!(key_obj = TS_CONF_load_key(key, pass)))
283 TS_CONF_set_signer_key(CONF *conf, const char *section, const char *key, const char *pass, TS_RESP_CTX *ctx) argument
/freebsd-10.1-release/crypto/openssl/crypto/pkcs12/
H A Dpkcs12.h180 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(X509_SIG *p8, const char *pass,
183 const char *pass, int passlen);
185 const char *pass, int passlen, unsigned char *salt,
187 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass,
193 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
196 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass,
213 unsigned char *PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass,
218 const char *pass, int passlen,
222 const char *pass, int passlen,
225 int PKCS12_key_gen_asc(const char *pass, in
264 int key_nid, char *pass); variable
266 int safe_nid, int iter, char *pass); variable
[all...]
H A Dp12_add.c105 PKCS12_SAFEBAG *PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, argument
127 PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
170 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument
202 PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass,
211 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass,
218 pass, passlen,
223 const char *pass, int passlen)
225 return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
222 PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument
H A Dp12_crpt.c70 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
99 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_KEY_ID,
105 if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_IV_ID,
H A Dp12_crt.c80 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
137 if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass))
144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
176 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL))
235 int nid_key, char *pass)
247 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, iter, p8);
270 int nid_safe, int iter, char *pass)
293 p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0, iter, bags);
H A Dp12_kiss.c66 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen,
69 static int parse_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass,
72 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen,
82 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
109 if (!pass || !*pass) {
111 pass = NULL;
113 pass = "";
118 } else if (!PKCS12_verify_mac(p12, pass, -1)) {
131 if (!parse_pk12(p12, pass,
180 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument
226 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument
[all...]
H A Dp12_key.c80 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument
88 if (!pass) {
91 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) {
106 int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, argument
122 if (!pass) {
133 h__dump(pass, passlen);
161 *p++ = pass[i % passlen];
/freebsd-10.1-release/crypto/openssl/crypto/pem/
H A Dpvkfmt.c660 const unsigned char *pass, int passlen)
667 || !EVP_DigestUpdate(&mctx, pass, passlen)
658 derive_pvk_key(unsigned char *key, const unsigned char *salt, unsigned int saltlen, const unsigned char *pass, int passlen) argument
/freebsd-10.1-release/crypto/openssl/crypto/stack/
H A Dsafestack.h204 # define SKM_PKCS12_decrypt_d2i(type, algor, d2i_func, free_func, pass, passlen, oct, seq) \
208 pass, passlen, oct, seq)
2308 # define PKCS12_decrypt_d2i_PKCS12_SAFEBAG(algor, d2i_func, free_func, pass, passlen, oct, seq) \
2309 SKM_PKCS12_decrypt_d2i(PKCS12_SAFEBAG, (algor), (d2i_func), (free_func), (pass), (passlen), (oct), (seq))
2310 # define PKCS12_decrypt_d2i_PKCS7(algor, d2i_func, free_func, pass, passlen, oct, seq) \
2311 SKM_PKCS12_decrypt_d2i(PKCS7, (algor), (d2i_func), (free_func), (pass), (passlen), (oct), (seq))
/freebsd-10.1-release/crypto/openssl/crypto/srp/
H A Dsrp_vfy.c567 char *SRP_create_verifier(const char *user, const char *pass, char **salt, argument
579 (pass == NULL) || (salt == NULL) || (verifier == NULL))
610 if (!SRP_create_verifier_BN(user, pass, &s, &v, N_bn, g_bn))
643 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, argument
652 (pass == NULL) ||
667 x = SRP_Calc_x(*salt, user, pass);
H A Dsrp_lib.c211 BIGNUM *SRP_Calc_x(BIGNUM *s, const char *user, const char *pass) argument
217 if ((s == NULL) || (user == NULL) || (pass == NULL))
227 EVP_DigestUpdate(&ctxt, pass, strlen(pass));
H A Dsrp.h129 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
131 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt,
166 BIGNUM *SRP_Calc_x(BIGNUM *s, const char *user, const char *pass);

Completed in 527 milliseconds

1234567891011>>