/freebsd-current/crypto/heimdal/lib/hx509/ |
H A D | test_nist_pkcs12.in | 39 pass="--pass=PASS:password" 66 if ${hxtool} validate $pass PKCS12:$a > /dev/null; then
|
H A D | test_query.in | 46 --pass=PASS:foobar \ 52 --pass=PASS:foobar \ 57 --pass=PASS:foobar \ 63 --pass=PASS:foobar \ 69 --pass=PASS:foobar \ 90 --pass=PASS:foobar \ 96 --pass=PASS:foobar \ 102 --pass=PASS:foobar \ 109 --pass=PASS:foobar \
|
/freebsd-current/contrib/llvm-project/clang/lib/ARCMigrate/ |
H A D | TransEmptyStatementsAndDealloc.cpp | 151 EmptyStatementsRemover(MigrationPass &pass) : Pass(pass) { } argument 193 static void cleanupDeallocOrFinalize(MigrationPass &pass) { argument 194 ASTContext &Ctx = pass.Ctx; 195 TransformActions &TA = pass.TA; 198 Ctx.Selectors.getNullarySelector(&pass.Ctx.Idents.get("finalize")); 218 if (isBodyEmpty(DeallocM->getCompoundBody(), Ctx, pass.ARCMTMacroLocs)) { 229 if (isBodyEmpty(FinalizeM->getCompoundBody(), Ctx, pass.ARCMTMacroLocs)) { 240 void trans::removeEmptyStatementsAndDeallocFinalize(MigrationPass &pass) { argument 241 EmptyStatementsRemover(pass) [all...] |
H A D | TransAPIUses.cpp | 38 APIChecker(MigrationPass &pass) : Pass(pass) { argument 105 void trans::checkAPIUses(MigrationPass &pass) { argument 106 APIChecker(pass).TraverseDecl(pass.Ctx.getTranslationUnitDecl());
|
H A D | Transforms.h | 35 void rewriteAutoreleasePool(MigrationPass &pass); 36 void rewriteUnbridgedCasts(MigrationPass &pass); 37 void makeAssignARCSafe(MigrationPass &pass); 38 void removeRetainReleaseDeallocFinalize(MigrationPass &pass); 39 void removeZeroOutPropsInDeallocFinalize(MigrationPass &pass); 40 void rewriteUnusedInitDelegate(MigrationPass &pass); 41 void checkAPIUses(MigrationPass &pass); 43 void removeEmptyStatementsAndDeallocFinalize(MigrationPass &pass); 103 explicit MigrationContext(MigrationPass &pass) : Pass(pass) {} argument 191 BodyTransform(MigrationPass &pass) argument [all...] |
/freebsd-current/share/examples/ipfilter/rules/ |
H A D | BASIC_1.FW | 41 pass in quick on lo0 all 42 pass out quick on lo0 all 60 pass in quick proto udp from any to any port = 53 keep state group 202 65 #pass in quick proto udp from any to w.x.y.z/32 port = 53 keep state group 202 66 #pass out quick on ppp0 proto udp from a.b.c.d/32 to any port = 53 keep state 70 pass in quick proto tcp from any to any port = ftp keep state group 201 71 pass in quick proto tcp from any to any port = ftp-data keep state group 201 72 pass in quick proto tcp from any port = ftp-data to any port > 1023 keep state group 101 76 pass in quick proto udp from any to any port = ntp keep state group 202 80 pass i [all...] |
/freebsd-current/lib/libc/string/ |
H A D | wcscoll.c | 46 int direc, pass; local 64 * safely. You absolutely have to run this pass by pass, 68 * during the primary pass anyway. 70 * Note that we do one final extra pass at the end to pick 73 for (pass = 0; pass <= table->info->directive_count; pass++) { 80 /* special pass for UNDEFINED */ 81 if (pass [all...] |
/freebsd-current/crypto/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 23 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID, 60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID, 78 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument 82 return PKCS12_PBE_keyivgen_ex(ctx, pass, passlen, param, cipher, md, en_de,
|
H A D | p12_mutl.c | 55 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, argument 66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, 76 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument 78 int (*pkcs12_key_gen)(const char *pass, int passlen, 139 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter, 146 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID, 153 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID, 178 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument 181 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); 185 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, in argument 209 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument [all...] |
H A D | p12_decr.c | 20 const char *pass, int passlen, 36 if (!EVP_PBE_CipherInit_ex(algor->algorithm, pass, passlen, 116 const char *pass, int passlen, 120 return PKCS12_pbe_crypt_ex(algor, pass, passlen, in, inlen, data, datalen, 130 const char *pass, int passlen, 140 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, oct->data, oct->length, 159 const char *pass, int passlen, 162 return PKCS12_item_decrypt_d2i_ex(algor, it, pass, passlen, oct, zbuf, 173 const char *pass, int passlen, 191 if (!PKCS12_pbe_crypt_ex(algor, pass, passle 19 PKCS12_pbe_crypt_ex(const X509_ALGOR *algor, const char *pass, int passlen, const unsigned char *in, int inlen, unsigned char **data, int *datalen, int en_de, OSSL_LIB_CTX *libctx, const char *propq) argument 115 PKCS12_pbe_crypt(const X509_ALGOR *algor, const char *pass, int passlen, const unsigned char *in, int inlen, unsigned char **data, int *datalen, int en_de) argument 129 PKCS12_item_decrypt_d2i_ex(const X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf, OSSL_LIB_CTX *libctx, const char *propq) argument 158 PKCS12_item_decrypt_d2i(const X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf) argument 171 PKCS12_item_i2d_encrypt_ex(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf, OSSL_LIB_CTX *ctx, const char *propq) argument 206 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument [all...] |
H A D | p12_crt.c | 37 PKCS12 *PKCS12_create_ex(const char *pass, const char *name, EVP_PKEY *pkey, argument 94 if (bags && !PKCS12_add_safe_ex(&safes, bags, nid_cert, iter, pass, 102 bag = PKCS12_add_key_ex(&bags, pkey, keytype, iter, nid_key, pass, 135 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) 148 PKCS12 *PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, argument 152 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert, 203 int nid_key, const char *pass, 216 bag = PKCS12_SAFEBAG_create_pkcs8_encrypt_ex(nid_key, pass, -1, NULL, 0, 238 int nid_key, const char *pass) 240 return PKCS12_add_key_ex(pbags, key, key_usage, iter, nid_key, pass, [all...] |
H A D | p12_add.c | 92 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen, argument 131 PKCS12_item_i2d_encrypt_ex(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, 146 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument 150 return PKCS12_pack_p7encdata_ex(pbe_nid, pass, passlen, salt, saltlen, 154 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, 167 pass, passlen, 173 const char *pass, int passlen, 176 return PKCS8_decrypt_ex(bag->value.shkeybag, pass, passlen, ctx, propq); 180 const char *pass, int passlen) 182 return PKCS12_decrypt_skey_ex(bag, pass, passle 172 PKCS12_decrypt_skey_ex(const PKCS12_SAFEBAG *bag, const char *pass, int passlen, OSSL_LIB_CTX *ctx, const char *propq) argument 179 PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument [all...] |
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | pkcs12.h | 146 const char *pass, 152 const char *pass, 162 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(const X509_SIG *p8, const char *pass, 164 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt_ex(const X509_SIG *p8, const char *pass, 168 const char *pass, int passlen); 170 const char *pass, int passlen, 174 const char *pass, int passlen, unsigned char *salt, 177 const char *pass, int passlen, unsigned char *salt, 180 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, 182 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, in 319 int key_nid, const char *pass); variable 322 int key_nid, const char *pass, variable 328 int safe_nid, int iter, const char *pass); variable 330 int safe_nid, int iter, const char *pass, variable [all...] |
/freebsd-current/contrib/netbsd-tests/usr.bin/config/ |
H A D | t_config.sh | 130 test_case shadow_instance pass "Checks correct handling of shadowed instances" 131 test_case loop pass "Checks correct handling of loops" 132 test_case loop2 pass "Checks correct handling of devices that can be their" \ 134 test_case pseudo_parent pass "Checks correct handling of children of pseudo" \ 148 test_case undefined_opt pass \ 161 test_case select pass "Attribute selection" 180 test_case no_select pass "Attribute negation" 203 test_case devi pass "Device instance" 228 test_case min pass "Minimal config"
|
/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 22 int ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, argument 35 if (pass == NULL) { 36 pass = empty; 39 passlen = strlen(pass); 52 (char *)pass, (size_t)passlen); 68 0, passlen, pass, passlen); 83 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, argument 87 return ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, digest, 92 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument 100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passle 112 PKCS5_v2_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de, OSSL_LIB_CTX *libctx, const char *propq) argument 173 PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de) argument 180 PKCS5_v2_PBKDF2_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de, OSSL_LIB_CTX *libctx, const char *propq) argument 265 PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de) argument [all...] |
H A D | p5_crpt.c | 26 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument 75 if (pass == NULL) 78 passlen = strlen(pass); 90 (char *)pass, (size_t)passlen); 113 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument 117 return PKCS5_PBE_keyivgen_ex(cctx, pass, passlen, param, cipher, md, en_de,
|
/freebsd-current/tools/regression/netinet6/inet6_rth/ |
H A D | test_subr.c | 123 int pass; local 131 pass = 0; 135 pass = (got == expected) ? 1 : 0; 138 pass = (got > expected) ? 1 : 0; 141 pass = (got < expected) ? 1 : 0; 144 if (pass != 0) {
|
/freebsd-current/share/examples/hast/ |
H A D | ucarp.sh | 36 pass="password" 70 ucarp -i ${ifnet} -s ${srcip} -v ${vhid} -a ${addr} -p ${pass} -u "${upscript}" -d "${downscript}"
|
/freebsd-current/tools/regression/posixsem/ |
H A D | test.h | 52 void pass(void);
|
H A D | posixsem.c | 134 pass(); 153 pass(); 172 pass(); 193 pass(); 212 pass(); 231 pass(); 418 pass(); 441 pass(); 458 pass(); 482 pass(); [all...] |
/freebsd-current/usr.bin/newkey/ |
H A D | generic.c | 54 getseed(char *seed, int seedsize, unsigned char *pass) argument 59 seed[i] = (arc4random() & 0xff) ^ pass[i % 8]; 67 genkeys(char *public, char *secret, char *pass) argument 84 getseed((char *)seed, sizeof (seed), (u_char *)pass);
|
/freebsd-current/contrib/bmake/unit-tests/ |
H A D | dep-colon-bug-cross-file.mk | 7 # In pass 1, there is a dependency group at the bottom of the file. 12 # After the file has been parsed completely, it is parsed again in pass 2. 13 # In this pass, another command is added to the "current dependency group", 14 # which was still the one from pass 1, which means it was possible to later 32 : pass 2 42 : pass 1
|
/freebsd-current/lib/libc/locale/ |
H A D | collate.c | 235 substsearch(struct xlocale_collate *table, const wchar_t key, int pass) argument 238 int n = table->info->subst_count[pass]; 243 if (pass >= table->info->directive_count) 249 p = table->subst_table[pass] + (key & ~COLLATE_SUBST_PRIORITY); 323 * If this is the "last" pass for the UNDEFINED, then 425 int pass; local 433 for (pass = 0; pass <= ndir; pass++) { 437 if (pass ! 545 xfrm(struct xlocale_collate *table, unsigned char *p, int pri, int pass) argument 570 int pass; local [all...] |
/freebsd-current/crypto/openssl/crypto/ |
H A D | passphrase.c | 116 * 4. It reports back the length of the prompted pass phrase. 118 static int do_ui_passphrase(char *pass, size_t pass_size, size_t *pass_len, argument 127 if (!ossl_assert(pass != NULL && pass_size != 0 && pass_len != NULL)) { 144 prompt = UI_construct_prompt(ui, "pass phrase", prompt_info); 196 memcpy(pass, ipass, *pass_len); 210 int ossl_pw_get_passphrase(char *pass, size_t pass_size, size_t *pass_len, argument 236 memcpy(pass, source, source_len); 247 ret = cb(pass, pass_size, pass_len, params, cbarg); 286 ret = do_ui_passphrase(pass, pass_size, pass_len, prompt_info, verify, 301 OPENSSL_cleanse(pass, *pass_le 341 ossl_pw_passphrase_callback_enc(char *pass, size_t pass_size, size_t *pass_len, const OSSL_PARAM params[], void *arg) argument 348 ossl_pw_passphrase_callback_dec(char *pass, size_t pass_size, size_t *pass_len, const OSSL_PARAM params[], void *arg) argument [all...] |
/freebsd-current/contrib/libedit/ |
H A D | filecomplete.c | 71 struct passwd *pass; local 95 &pass) != 0) 96 pass = NULL; 98 pass = getpwuid_r(getuid(), &pwres, pwbuf, sizeof(pwbuf)); 100 pass = getpwuid(getuid()); 104 if (getpwnam_r(temp, &pwres, pwbuf, sizeof(pwbuf), &pass) != 0) 105 pass = NULL; 107 pass = getpwnam_r(temp, &pwres, pwbuf, sizeof(pwbuf)); 109 pass = getpwnam(temp); 113 if (pass [all...] |