/freebsd-current/crypto/openssh/openbsd-compat/ |
H A D | bcrypt_pbkdf.c | 114 bcrypt_pbkdf(const char *pass, size_t passlen, const uint8_t *salt, size_t saltlen, argument 140 crypto_hash_sha512(sha2pass, pass, passlen);
|
/freebsd-current/contrib/libedit/ |
H A D | readline.c | 1887 struct passwd *pass = NULL; local 1900 getpwent_r(&pwres, pwbuf, sizeof(pwbuf), &pass) == 0 && pass != NULL 1902 (pass = getpwent()) != NULL 1904 && text[0] == pass->pw_name[0] 1905 && strcmp(text, pass->pw_name) == 0) 1908 if (pass == NULL) { 1912 return strdup(pass->pw_name);
|
/freebsd-current/contrib/arm-optimized-routines/string/test/ |
H A D | strcmp.c | 125 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 126 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | stpcpy.c | 118 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 119 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | strchrnul.c | 120 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 121 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | memcmp.c | 119 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 120 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | strncmp.c | 132 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 133 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | strcpy.c | 116 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 117 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | memset.c | 126 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 127 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
/freebsd-current/contrib/llvm-project/lld/ELF/ |
H A D | Relocations.h | 156 bool createThunks(uint32_t pass, ArrayRef<OutputSection *> outputSections); 202 uint32_t pass = 0; member in class:lld::elf::ThunkCreator
|
/freebsd-current/contrib/atf/atf-c++/ |
H A D | tests.hpp | 106 static void pass(void) ATF_DEFS_ATTRIBUTE_NORETURN;
|
/freebsd-current/lib/libpam/modules/pam_ssh/ |
H A D | pam_ssh.c | 162 int nkeys, nullok, pam_err, pass; local 180 pass = (pam_get_item(pamh, PAM_AUTHTOK, &item) == PAM_SUCCESS && 211 if (nkeys == 0 && pass == 1 && 214 pass = 0;
|
/freebsd-current/contrib/kyua/integration/ |
H A D | cmd_report_junit_test.sh | 91 <testcase classname="simple_all_pass" name="pass" time="S.UUU"> 92 <system-out>This is the stdout of pass 120 This is the stderr of pass 205 <testcase classname="simple_all_pass" name="pass" time="S.UUU"> 206 <system-out>This is the stdout of pass 234 This is the stderr of pass
|
/freebsd-current/crypto/openssl/test/helpers/ |
H A D | pkcs12.h | 38 const char *pass; member in struct:pkcs12_enc
|
/freebsd-current/lib/libcompat/4.3/ |
H A D | rexec.c | 290 rexec(char **ahost, int rport, char *name, char *pass, char *cmd, int *fd2p) argument 305 ruserpass(hp->h_name, &name, &pass, &acct); 363 (void) write(s, pass, strlen(pass) + 1);
|
/freebsd-current/contrib/llvm-project/clang/include/clang/ARCMigrate/ |
H A D | ARCMT.h | 91 typedef void (*TransformFn)(MigrationPass &pass);
|
/freebsd-current/crypto/openssh/ |
H A D | readpass.c | 55 char *pass; local 108 pass = xstrdup(buf); 110 return pass; 114 #define RP_ASK_PERMISSION 0x8000 /* pass hint to askpass for confirm UI */
|
H A D | ssh-add.c | 107 static char *pass = NULL; variable 111 if (pass) { 112 freezero(pass, strlen(pass)); 113 pass = NULL; 295 if (private == NULL && pass != NULL) { 296 if ((r = sshkey_parse_private_fileblob(keyblob, pass, &private, 309 pass = read_passphrase(msg, RP_ALLOW_STDIN); 310 if (strcmp(pass, "") == 0) 312 if ((r = sshkey_parse_private_fileblob(keyblob, pass, [all...] |
/freebsd-current/tests/sys/cddl/zfs/tests/acl/nontrivial/ |
H A D | zfs_acl_chmod_aclmode_001_pos.ksh | 237 # pass: to mark if the current ACE should apply to the target 242 typeset -i count=0 pass=0 passcnt=0 step=0 253 pass=0 358 if (( pass == 0 )) ; then
|
/freebsd-current/crypto/openssl/test/recipes/ |
H A D | 20-test_kdf.t | 28 { cmd => [qw{openssl kdf -keylen 25 -digest SHA256 -kdfopt pass:passwordPASSWORDpassword -kdfopt salt:saltSALTsaltSALTsaltSALTsaltSALTsalt -kdfopt iter:4096 PBKDF2}], 54 { cmd => [qw{openssl kdf -keylen 25 -kdfopt digest:SHA256 -kdfopt pass:passwordPASSWORDpassword -kdfopt salt:saltSALTsaltSALTsaltSALTsaltSALTsalt -kdfopt iter:4096 PBKDF2}], 80 { cmd => [qw{openssl kdf -keylen 64 -kdfopt pass:password -kdfopt salt:NaCl -kdfopt n:1024 -kdfopt r:8 -kdfopt p:16 -kdfopt maxmem_bytes:10485760 id-scrypt}],
|
/freebsd-current/contrib/llvm-project/clang/lib/ARCMigrate/ |
H A D | TransRetainReleaseDealloc.cpp | 45 RetainReleaseDeallocRemover(MigrationPass &pass) argument 46 : Body(nullptr), Pass(pass) { 456 void trans::removeRetainReleaseDeallocFinalize(MigrationPass &pass) { argument 457 BodyTransform<RetainReleaseDeallocRemover> trans(pass); 458 trans.TraverseDecl(pass.Ctx.getTranslationUnitDecl());
|
H A D | TransUnbridgedCasts.cpp | 68 UnbridgedCastRewriter(MigrationPass &pass) argument 69 : Pass(pass), ParentD(nullptr), Body(nullptr) { 463 void trans::rewriteUnbridgedCasts(MigrationPass &pass) { argument 464 BodyTransform<UnbridgedCastRewriter> trans(pass); 465 trans.TraverseDecl(pass.Ctx.getTranslationUnitDecl());
|
/freebsd-current/tools/regression/net80211/wep/ |
H A D | test_wep.c | 299 int i, pass, total; local 315 pass = 0; 320 pass += runtest(&vap, &weptests[i]); 322 printf("%u of %u 802.11i WEP test vectors passed\n", pass, total); 327 return (pass == total ? 0 : -1);
|
/freebsd-current/contrib/dialog/ |
H A D | editbox.c | 74 unsigned n, pass; local 91 for (pass = 0; pass < 2; ++pass) { 96 if (first && pass) { 103 if (pass) 107 if (pass) {
|
/freebsd-current/crypto/openssl/crypto/store/ |
H A D | store_result.c | 545 char *pass = NULL; local 558 pass = NULL; 560 pass = ""; 562 static char prompt_info[] = "PKCS12 import pass phrase"; 577 pass = tpass; 582 pass[tpass_len] = '\0'; 583 if (!PKCS12_verify_mac(p12, pass, tpass_len)) { 592 if (PKCS12_parse(p12, pass, &pkey, &cert, &chain)) {
|