| /illumos-gate/usr/src/lib/libc/port/gen/ |
| H A D | abort.c | 40 static int pass = 0; /* counts how many times abort has been called */ variable 70 if (++pass == 1)
|
| /illumos-gate/usr/src/lib/libpp/common/ |
| H A D | pppragma.c | 31 pppragma(char* directive, char* pass, char* name, char* value, int newline) argument 41 if (pass) 48 ppprintf("%s:", pass); 60 if (sep || pass)
|
| /illumos-gate/usr/src/cmd/cmd-inet/usr.bin/talk/ |
| H A D | get_names.c | 91 struct passwd *pass = getpwuid(getuid()); local 92 if (pass != NULL) 93 my_name = pass->pw_name;
|
| /illumos-gate/usr/src/cmd/avs/dsstat/ |
| H A D | multi_stats.c | 50 int pass; local 53 for (pass = 0; ; pass++) { /* CSTYLED */ 54 if (iterations != -1 && pass >= iterations) 62 if (error == EAGAIN && pass == 0)
|
| /illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
| H A D | pbkdf2.c | 53 const krb5_data *pass, const krb5_data *salt) 109 params.pPassword = (CK_UTF8CHAR_PTR)pass->data; 111 passlen = (CK_ULONG)pass->length; 48 krb5int_pbkdf2_hmac_sha1( krb5_context context, const krb5_data *out, unsigned long count, krb5_enctype enctype, const krb5_data *pass, const krb5_data *salt) argument
|
| /illumos-gate/usr/src/lib/libbc/libc/net/ |
| H A D | rexec.c | 48 char *pass, 64 _ruserpass(hp->h_name, &name, &pass); 121 (void) write(s, pass, strlen(pass) + 1); 44 rexec( char **ahost, unsigned short rport, char *name, char *pass, char *cmd, int *fd2p) argument
|
| /illumos-gate/usr/src/common/net/wanboot/ |
| H A D | p12auxutl.c | 86 * pass - Pass phrase for the pkcs12 structure and private key (possibly 88 * both the private key(s) and as the pass phrase for the whole 103 sunw_PKCS12_create(const char *pass, STACK_OF(EVP_PKEY) *pkeys, argument 233 authsafe = PKCS12_pack_p7encdata(nid_cert, pass, -1, 267 bag = PKCS12_MAKE_SHKEYBAG(nid_key, pass, -1, NULL, 0, 346 if (PKCS12_set_mac(p12, pass, -1, NULL, 0, 2048, NULL) == 0) {
|
| H A D | p12access.c | 24 * certs and pass them to SSL. They replace similar functions for PEM, 28 * sunw_p12_use_certfile - gets the user's cert from a pkcs12 file & pass 31 * pass it to SSL 65 * sunw_use_x509cert - pass an x509 client certificate to ssl 69 * cert - Certificate to pass in x509 format 93 * sunw_use_pkey - pass an EVP_PKEY private key to ssl 179 * pass it in to SSL. 232 * sunw_p12_use_keyfile - read a RSA private key from a pkcs12 file and pass 291 * pass the stack in to SSL. 466 * pass 474 check_password(PKCS12 *p12, char *pass) argument [all...] |
| H A D | p12auxpars.c | 150 static int sunw_PKCS12_contents(PKCS12 *p12, const char *pass, 163 * pass - Pass phrase for the private key (possibly empty) or NULL if 208 sunw_PKCS12_parse(PKCS12 *p12, const char *pass, int matchty, char *keyid, argument 249 if (pass == NULL || *pass == '\0') { 251 pass = NULL; 253 pass = ""; 259 } else if (PKCS12_verify_mac(p12, pass, -1) == 0) { 264 retval = parse_pkcs12(p12, pass, matchty, keyid, keyid_len, 292 * pass 319 parse_pkcs12(PKCS12 *p12, const char *pass, int matchty, char *keyid, int kstr_len, char *name_str, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 498 sunw_PKCS12_contents(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs) argument 553 parse_outer(PKCS12 *p12, const char *pass, STACK_OF(EVP_PKEY) *kl, STACK_OF(X509) *cl) argument 642 parse_one_bag(PKCS12_SAFEBAG *bag, const char *pass, STACK_OF(EVP_PKEY) *kl, STACK_OF(X509) *cl) argument [all...] |
| /illumos-gate/usr/src/lib/libsmbfs/smb/ |
| H A D | keychain.c | 114 * pass pk here anyway just so we can use the 153 * Note: pass is a cleartext password. 159 const char *pass) 165 if (pass == NULL) 168 if ((err = ntlm_compute_lm_hash(lmhash, pass)) != 0) 170 if ((err = ntlm_compute_nt_hash(nthash, pass)) != 0) 158 smbfs_keychain_add(uid_t uid, const char *dom, const char *usr, const char *pass) argument
|
| /illumos-gate/usr/src/lib/libsocket/inet/ |
| H A D | rexec.c | 64 const char *pass, const char *cmd, int *fd2p) 66 return (rexec_af(ahost, rport, name, pass, cmd, fd2p, AF_INET)); 70 const char *pass, const char *cmd, int *fd2p, int af) 103 _ruserpass(res->ai_canonname, (char **)&name, (char **)&pass); 165 (void) write(s, pass, strlen(pass) + 1); 63 rexec(char **ahost, unsigned short rport, const char *name, const char *pass, const char *cmd, int *fd2p) argument 69 rexec_af(char **ahost, unsigned short rport, const char *name, const char *pass, const char *cmd, int *fd2p, int af) argument
|
| /illumos-gate/usr/src/lib/libc/port/locale/ |
| H A D | wcscoll.c | 43 int direc, pass; local 58 * safely. You absolutely have to run this pass by pass, 62 * during the primary pass anyway. 64 * Note that we do one final extra pass at the end to pick 67 for (pass = 0; pass <= lcc->lc_directive_count; pass++) { 74 /* special pass for UNDEFINED */ 75 if (pass [all...] |
| /illumos-gate/usr/src/cmd/fs.d/smbclnt/smbutil/ |
| H A D | login.c | 118 char *dom, *usr, *pass; local 171 pass = getpassphrase(prompt); 173 err = smbfs_keychain_add((uid_t)-1, dom, usr, pass);
|
| /illumos-gate/usr/src/lib/scsi/libsmp/common/ |
| H A D | smp_plugin.c | 210 smp_plugin_loadone(smp_target_t *tp, const char *path, uint32_t pass) argument 242 pp->sp_priority |= (uint64_t)pass << 32;
|
| /illumos-gate/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
| H A D | generic_key.c | 57 setseed(unsigned char *pass) argument 67 rseed ^= (rseed << 8) | pass[i]; 107 char *pass /* password to seed with for private key */) 121 setseed((u_char *)pass); 139 seed = random() ^ pass[i % 8];
|
| /illumos-gate/usr/src/lib/krb5/kadm5/srv/ |
| H A D | server_init.c | 111 kadm5_ret_t kadm5_init_with_password(char *client_name, char *pass, argument 119 return kadm5_init(client_name, pass, service_name, params, 135 * user. Therefore, always pass a dummy password in case this is 159 * user. Therefore, always pass a dummy password in case this is 177 kadm5_ret_t kadm5_init2(char *client_name, char *pass, argument 339 * The KADM5_API_VERSION_1 spec said "If pass (or keytab) is NULL 364 ((pass == NULL) || !(strlen(pass))) : 408 kadm5_ret_t kadm5_init(char *client_name, char *pass, argument 415 return (kadm5_init2(client_name, pass, service_nam [all...] |
| /illumos-gate/usr/src/lib/lvm/libmeta/common/ |
| H A D | meta_mirror_resync.c | 45 mm_pass_num_t pass; /* pass number */ member in struct:mm_unit_list 135 * setup_units: build lists of units for each pass 167 lp->pass = mirrorp->pass_num; 168 if ((lp->pass < 0) || (lp->pass > MD_PASS_MAX)) 169 lp->pass = MD_PASS_MAX; 172 lp->next = mirrors[lp->pass]; 173 mirrors[lp->pass] = lp; 192 mm_pass_num_t pass, max_pas local 346 mm_pass_num_t pass, max_pass; local 529 mm_pass_num_t pass; local [all...] |
| /illumos-gate/usr/src/lib/scsi/libses/common/ |
| H A D | ses_plugin.c | 223 ses_plugin_loadone(ses_target_t *tp, const char *path, uint32_t pass) argument 255 sp->sp_priority |= (uint64_t)pass << 32;
|
| /illumos-gate/usr/src/lib/gss_mechs/mech_krb5/support/ |
| H A D | threads.c | 183 int i, pass, none_found; local 194 pass = 0; 196 while (pass < 4 && !none_found) {
|
| /illumos-gate/usr/src/lib/libnsl/key/ |
| H A D | gen_dhkeys.c | 65 getseed(seed, seedsize, pass) 68 unsigned char *pass; 77 rseed ^= (rseed << 8) | pass[i]; 82 seed[i] = (random() & 0xff) ^ pass[i % 8]; 112 __gen_dhkeys(public, secret, pass) 115 char *pass; 137 getseed((char *)seed, (int)sizeof (seed), (uchar_t *)pass); 172 char *pass) /* in */ 176 if (! pkey || ! skey || ! pass) 180 __gen_dhkeys(pkey, skey, pass); 168 __gen_dhkeys_g(char *pkey, char *skey, keylen_t keylen, algtype_t algtype, char *pass) argument [all...] |
| /illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/p12split/ |
| H A D | p12split.c | 486 get_ifile(char *name, char *pass, EVP_PKEY **tmp_k, X509 **tmp_c, argument 512 ret = sunw_PKCS12_parse(p12, pass, matchty, k_matchval, k_len,
|
| /illumos-gate/usr/src/cmd/format/ |
| H A D | analyze.c | 126 int pass, needinit, data; local 220 for (pass = 0; pass < scan_passes || scan_loop; pass++) { 229 data = scan_patterns[pass % NPPATTERNS]; 239 "\nThe last %d passes were successful, running alpha pattern pass", NPPATTERNS); 255 fmt_print("\n pass %d", pass); 258 fmt_print("\n pass %d", pass); [all...] |
| /illumos-gate/usr/src/cmd/keyserv/ |
| H A D | keylogin.c | 227 oldkeylogin(char *fullname, char *pass) argument 232 if (getsecretkey(fullname, secret, pass) == 0) { 329 char *pass; local 351 if (!(pass = getpass("Password:"))) 359 (void) oldkeylogin(fullname, pass); 372 8) * 2) + 1, pass) == 0) { 406 exit(oldkeylogin(fullname, pass));
|
| H A D | newkey.c | 91 char *pass, *target_host = NULL, local 205 pass = get_password(uid, target_host, username); 207 if (pass == NULL) 210 (void) strlcpy(short_pass, pass, sizeof (short_pass)); 337 *pass = NULL; local 374 pass = getpassphrase(prompt); 375 if (pass && strlen(pass) == 0) { 380 strcpy(password, pass); 388 pass [all...] |
| /illumos-gate/usr/src/tools/lintdump/ |
| H A D | lintdump.c | 157 uint_t pass; local 168 for (pass = 1; pass <= 4; pass++) { 169 if ((justpass < 0 || justpass == pass) && pass < 4) { 170 infohdr("SECTION", "PASS%u: %lu bytes\n", pass, 171 psizes[pass]); 174 (void) fseek(fp, psizes[pass], SEEK_CUR); 197 if (line.decflag & LND) /* end-of-pass marke [all...] |