Searched refs:pass (Results 101 - 125 of 350) sorted by relevance

1234567891011>>

/freebsd-current/crypto/openssl/crypto/asn1/
H A Dp5_scrypt.c211 int PKCS5_v2_scrypt_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, argument
268 if (EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, 0, key,
279 int PKCS5_v2_scrypt_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, argument
283 return PKCS5_v2_scrypt_keyivgen_ex(ctx, pass, passlen, param, c, md, en_de, NULL, NULL);
/freebsd-current/crypto/openssl/include/internal/
H A Dpassphrase.h105 int ossl_pw_get_passphrase(char *pass, size_t pass_size, size_t *pass_len,
/freebsd-current/crypto/openssl/include/openssl/
H A Dcore.h51 * This is used whenever we need to pass things like a table of error reason
77 * Type to pass object data in a uniform way, without exposing the object
94 * since they may be used to pass numbers larger than what is natively
210 * with data of its choice and pass that in the callback call, along
225 typedef int (OSSL_PASSPHRASE_CALLBACK)(char *pass, size_t pass_size,
H A Dsrp.h190 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt,
194 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
197 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt,
202 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt,
254 BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass,
257 BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass);
/freebsd-current/crypto/openssl/crypto/pkcs12/
H A Dp12_sbag.c202 const char *pass,
224 p8 = PKCS8_encrypt_ex(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
239 const char *pass,
245 return PKCS12_SAFEBAG_create_pkcs8_encrypt_ex(pbe_nid, pass, passlen,
201 PKCS12_SAFEBAG_create_pkcs8_encrypt_ex(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf, OSSL_LIB_CTX *ctx, const char *propq) argument
238 PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
/freebsd-current/tools/regression/posixsem/
H A Dtest.c76 pass(void) function
/freebsd-current/crypto/openssl/apps/
H A Dgenpkey.c48 {"pass", OPT_PASS, 's', "Output file pass phrase source"},
68 char *outfile = NULL, *passarg = NULL, *pass = NULL, *prog, *p; local
172 if (!app_passwd(passarg, NULL, &pass, NULL)) {
193 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0, NULL, pass);
231 OPENSSL_free(pass);
/freebsd-current/usr.bin/newgrp/
H A Dnewgrp.c153 char *ep, *pass, *cryptpw; local
179 pass = getpass("Password:");
180 if (pass == NULL)
182 cryptpw = crypt(pass, grp->gr_passwd);
/freebsd-current/tests/sys/cddl/zfs/tests/acl/nontrivial/
H A Dzfs_acl_chmod_inherit_003_pos.ksh135 # pass: to mark if the current ACE should apply to the target
142 typeset -i count=0 pass=0 passcnt=0 isinherit=0 maxnumber=4 step=0
179 pass=0
218 pass=1
230 if (( pass == 0 )) ; then
H A Dzfs_acl_chmod_inherit_002_pos.ksh134 # pass: to mark if the current ACE should apply to the target
141 typeset -i count=0 pass=0 passcnt=0 isinherit=0 maxnumber=4 step=0
178 pass=0
210 pass=1
220 if (( pass == 0 )) ; then
/freebsd-current/sys/netpfil/ipfilter/netinet/
H A Dip_frag.c357 fr_info_t *fin, u_32_t pass, ipfr_t *table[]
377 if (pass & FR_FRSTRICT) {
481 fra->ipfr_pass = pass;
499 ipf_frag_new(ipf_main_softc_t *softc, fr_info_t *fin, u_32_t pass) argument
508 fra = ipfr_frag_new(softc, softf, fin, pass, softf->ipfr_heads, &softc->ipf_frag);
510 fra = ipfr_frag_new(softc, softf, fin, pass, softf->ipfr_heads);
533 ipf_frag_natnew(ipf_main_softc_t *softc, fr_info_t *fin, u_32_t pass, argument
543 fra = ipfr_frag_new(softc, softf, fin, pass, softf->ipfr_nattab,
546 fra = ipfr_frag_new(softc, softf, fin, pass, softf->ipfr_nattab);
862 u_32_t pass; local
356 ipfr_frag_new(ipf_main_softc_t *softc, ipf_frag_softc_t *softf, fr_info_t *fin, u_32_t pass, ipfr_t *table[] , ipfrwlock_t *lock ) argument
[all...]
H A Dfil.c2327 /* pass(I) - default result to return for filtering */
2340 ipf_scanlist(fr_info_t *fin, u_32_t pass) argument
2351 return (pass);
2359 return (pass);
2390 FR_VERBOSE(("%c", FR_ISSKIP(pass) ? 's' :
2391 FR_ISPASS(pass) ? 'p' :
2392 FR_ISACCOUNT(pass) ? 'A' :
2393 FR_ISAUTH(pass) ? 'a' :
2394 (pass & FR_NOMATCH) ? 'n' :'b'));
2429 f = (*fr->fr_func)(fin, &pass);
2598 u_32_t pass, rulen; local
2638 u_32_t pass; local
2768 u_32_t pass = softc->ipf_pass; local
3245 u_32_t pass; local
8199 ipf_decaps(fr_info_t *fin, u_32_t pass, int l5proto) argument
[all...]
/freebsd-current/libexec/ftpd/
H A Dextern.h48 void pass(char *);
/freebsd-current/lib/libpam/modules/pam_ksu/
H A Dpam_ksu.c118 const char *pass; local
131 pass = NULL;
132 pamret = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, prompt);
144 pass, NULL, NULL, 0, NULL, gic_opt);
/freebsd-current/crypto/openssl/external/perl/Text-Template-1.56/t/
H A Dtaint.t40 pass $@;
54 pass;
/freebsd-current/share/examples/bhyve/
H A Dvmrun.sh90 echo " -p: pass-through a host PCI device (e.g ppt0 or" \
398 eval "pass=\$pass_dev${i}"
399 bsfform="$(echo "${pass}" | grep "^[0-9]\+/[0-9]\+/[0-9]\+$")"
401 bsf="$(pciconf -l "${pass}" 2>/dev/null)"
403 errmsg "${pass} is not a host PCI device"
408 bsf="${pass}"
/freebsd-current/crypto/openssl/crypto/srp/
H A Dsrp_vfy.c608 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt, argument
622 (pass == NULL) || (salt == NULL) || (verifier == NULL))
661 if (!SRP_create_verifier_BN_ex(user, pass, &s, &v, N_bn, g_bn, libctx,
699 char *SRP_create_verifier(const char *user, const char *pass, char **salt, argument
702 return SRP_create_verifier_ex(user, pass, salt, verifier, N, g, NULL, NULL);
714 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt, argument
726 (pass == NULL) ||
742 x = SRP_Calc_x_ex(salttmp, user, pass, libctx, propq);
767 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, argument
771 return SRP_create_verifier_BN_ex(user, pass, sal
[all...]
H A Dsrp_lib.c144 BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass, argument
153 if ((s == NULL) || (user == NULL) || (pass == NULL))
169 || !EVP_DigestUpdate(ctxt, pass, strlen(pass))
191 BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass) argument
193 return SRP_Calc_x_ex(s, user, pass, NULL, NULL);
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/
H A Dargon2.c32 uint32_t pass; local
75 for (pass = 0; pass < instance.passes; pass++) {
76 fill_memory_blocks(&instance, pass);
/freebsd-current/crypto/openssl/engines/
H A De_loader_attic.c57 static char *file_get_pass(const UI_METHOD *ui_method, char *pass, argument
75 pass = NULL;
77 pass, 0, maxsize - 1) <= 0) {
79 pass = NULL;
84 pass = NULL;
88 pass = NULL;
97 return pass;
124 char *pass = file_get_pass(pass_data->ui_method, buf, num, local
128 return pass == NULL ? 0 : strlen(pass);
318 char *pass = NULL; local
444 char *pass = NULL; local
[all...]
/freebsd-current/crypto/openssl/test/
H A Dacvp_test.c190 tst->pub, tst->pub_len, tst->pass)))
193 if (tst->pass) {
195 || !TEST_int_eq(EVP_PKEY_public_check(key_ctx), tst->pass))
301 tst->msg, tst->msg_len), tst->pass));
537 || !TEST_int_eq(EVP_PKEY_param_check(key_ctx), tst->pass))
653 tst->pass))
723 int enc, int pass)
732 pass ? "pass" : "fail");
745 || !TEST_int_eq(EVP_CipherUpdate(ctx, out, &len, pt, pt_len), pass))
716 aes_ccm_enc_dec(const char *alg, const unsigned char *pt, size_t pt_len, const unsigned char *key, size_t key_len, const unsigned char *iv, size_t iv_len, const unsigned char *aad, size_t aad_len, const unsigned char *ct, size_t ct_len, const unsigned char *tag, size_t tag_len, int enc, int pass) argument
782 const int pass = 1; local
803 aes_gcm_enc_dec(const char *alg, const unsigned char *pt, size_t pt_len, const unsigned char *key, size_t key_len, const unsigned char *iv, size_t iv_len, const unsigned char *aad, size_t aad_len, const unsigned char *ct, size_t ct_len, const unsigned char *tag, size_t tag_len, int enc, int pass) argument
873 int pass = 1; local
894 dh_create_pkey(EVP_PKEY **pkey, const char *group_name, const unsigned char *pub, size_t pub_len, const unsigned char *priv, size_t priv_len, BN_CTX *bn_ctx, int pass) argument
[all...]
/freebsd-current/crypto/openssl/providers/implementations/kdfs/
H A Dscrypt.c36 static int scrypt_alg(const char *pass, size_t passlen,
45 unsigned char *pass; member in struct:__anon4168
91 OPENSSL_clear_free(ctx->pass, ctx->pass_len);
160 if (ctx->pass == NULL) {
173 return scrypt_alg((char *)ctx->pass, ctx->pass_len, ctx->salt,
194 if (!scrypt_set_membuf(&ctx->pass, &ctx->pass_len, p))
410 static int scrypt_alg(const char *pass, size_t passlen, argument
452 * Yet we pass it as integer to PKCS5_PBKDF2_HMAC... [This would
498 if (ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, 1, sha256,
505 if (ossl_pkcs5_pbkdf2_hmac_ex(pass, passle
[all...]
/freebsd-current/contrib/kyua/integration/
H A Dcmd_report_test.sh178 simple_all_pass:pass
181 simple_all_pass:pass -> passed [S.UUUs]
188 --results-filter= simple_all_pass:pass
291 simple_all_pass:pass -> passed [S.UUUs]
311 simple_all_pass:pass -> passed [S.UUUs]
332 simple_all_pass:pass -> passed [S.UUUs]
/freebsd-current/usr.bin/localedef/
H A Dcollate.c82 * e) For the UNDEFINED pass (the last pass), we record the maximum
84 * the last pass can also use smaller strxfrm output when possible.
93 * The first pass, which is done at parse time, identifies elements,
100 * The second pass walks over all the items in priority order, noting
105 * The third pass walks over all the weight structures, in priority
110 * The fourth pass just writes the data out.
129 * The "pass" field is used during final resolution to aid in detection
148 int pass; member in struct:priority
281 prilist[i].pass
328 static int32_t pass = 0; local
1024 add_weight(int32_t ref, int pass) argument
1060 get_weight(int32_t ref, int pass) argument
[all...]
/freebsd-current/contrib/llvm-project/compiler-rt/lib/xray/
H A Dxray_trampoline_powerpc64_asm.S9 # If this appears to be slow, the caller needs to pass in number of generic,
150 # If this appears to be slow, the caller needs to pass in number of generic,

Completed in 443 milliseconds

1234567891011>>