Searched refs:pass (Results 26 - 50 of 350) sorted by relevance

1234567891011>>

/freebsd-current/crypto/heimdal/lib/hx509/
H A Dtest_nist_pkcs12.in39 pass="--pass=PASS:password"
66 if ${hxtool} validate $pass PKCS12:$a > /dev/null; then
H A Dtest_query.in46 --pass=PASS:foobar \
52 --pass=PASS:foobar \
57 --pass=PASS:foobar \
63 --pass=PASS:foobar \
69 --pass=PASS:foobar \
90 --pass=PASS:foobar \
96 --pass=PASS:foobar \
102 --pass=PASS:foobar \
109 --pass=PASS:foobar \
/freebsd-current/contrib/llvm-project/clang/lib/ARCMigrate/
H A DTransEmptyStatementsAndDealloc.cpp151 EmptyStatementsRemover(MigrationPass &pass) : Pass(pass) { } argument
193 static void cleanupDeallocOrFinalize(MigrationPass &pass) { argument
194 ASTContext &Ctx = pass.Ctx;
195 TransformActions &TA = pass.TA;
198 Ctx.Selectors.getNullarySelector(&pass.Ctx.Idents.get("finalize"));
218 if (isBodyEmpty(DeallocM->getCompoundBody(), Ctx, pass.ARCMTMacroLocs)) {
229 if (isBodyEmpty(FinalizeM->getCompoundBody(), Ctx, pass.ARCMTMacroLocs)) {
240 void trans::removeEmptyStatementsAndDeallocFinalize(MigrationPass &pass) { argument
241 EmptyStatementsRemover(pass)
[all...]
H A DTransAPIUses.cpp38 APIChecker(MigrationPass &pass) : Pass(pass) { argument
105 void trans::checkAPIUses(MigrationPass &pass) { argument
106 APIChecker(pass).TraverseDecl(pass.Ctx.getTranslationUnitDecl());
H A DTransforms.h35 void rewriteAutoreleasePool(MigrationPass &pass);
36 void rewriteUnbridgedCasts(MigrationPass &pass);
37 void makeAssignARCSafe(MigrationPass &pass);
38 void removeRetainReleaseDeallocFinalize(MigrationPass &pass);
39 void removeZeroOutPropsInDeallocFinalize(MigrationPass &pass);
40 void rewriteUnusedInitDelegate(MigrationPass &pass);
41 void checkAPIUses(MigrationPass &pass);
43 void removeEmptyStatementsAndDeallocFinalize(MigrationPass &pass);
103 explicit MigrationContext(MigrationPass &pass) : Pass(pass) {} argument
191 BodyTransform(MigrationPass &pass) argument
[all...]
/freebsd-current/share/examples/ipfilter/rules/
H A DBASIC_1.FW41 pass in quick on lo0 all
42 pass out quick on lo0 all
60 pass in quick proto udp from any to any port = 53 keep state group 202
65 #pass in quick proto udp from any to w.x.y.z/32 port = 53 keep state group 202
66 #pass out quick on ppp0 proto udp from a.b.c.d/32 to any port = 53 keep state
70 pass in quick proto tcp from any to any port = ftp keep state group 201
71 pass in quick proto tcp from any to any port = ftp-data keep state group 201
72 pass in quick proto tcp from any port = ftp-data to any port > 1023 keep state group 101
76 pass in quick proto udp from any to any port = ntp keep state group 202
80 pass i
[all...]
/freebsd-current/lib/libc/string/
H A Dwcscoll.c46 int direc, pass; local
64 * safely. You absolutely have to run this pass by pass,
68 * during the primary pass anyway.
70 * Note that we do one final extra pass at the end to pick
73 for (pass = 0; pass <= table->info->directive_count; pass++) {
80 /* special pass for UNDEFINED */
81 if (pass
[all...]
/freebsd-current/crypto/openssl/crypto/pkcs12/
H A Dp12_crpt.c23 int PKCS12_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
51 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_KEY_ID,
60 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_IV_ID,
78 int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, argument
82 return PKCS12_PBE_keyivgen_ex(ctx, pass, passlen, param, cipher, md, en_de,
H A Dp12_mutl.c55 static int pkcs12_gen_gost_mac_key(const char *pass, int passlen, argument
66 if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter,
76 static int pkcs12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument
78 int (*pkcs12_key_gen)(const char *pass, int passlen,
139 if (!pkcs12_gen_gost_mac_key(pass, passlen, salt, saltlen, iter,
146 if (!(*pkcs12_key_gen)(pass, passlen, salt, saltlen, PKCS12_MAC_ID,
153 if (!PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, PKCS12_MAC_ID,
178 int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, argument
181 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL);
185 int PKCS12_verify_mac(PKCS12 *p12, const char *pass, in argument
209 PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type) argument
[all...]
H A Dp12_decr.c20 const char *pass, int passlen,
36 if (!EVP_PBE_CipherInit_ex(algor->algorithm, pass, passlen,
116 const char *pass, int passlen,
120 return PKCS12_pbe_crypt_ex(algor, pass, passlen, in, inlen, data, datalen,
130 const char *pass, int passlen,
140 if (!PKCS12_pbe_crypt_ex(algor, pass, passlen, oct->data, oct->length,
159 const char *pass, int passlen,
162 return PKCS12_item_decrypt_d2i_ex(algor, it, pass, passlen, oct, zbuf,
173 const char *pass, int passlen,
191 if (!PKCS12_pbe_crypt_ex(algor, pass, passle
19 PKCS12_pbe_crypt_ex(const X509_ALGOR *algor, const char *pass, int passlen, const unsigned char *in, int inlen, unsigned char **data, int *datalen, int en_de, OSSL_LIB_CTX *libctx, const char *propq) argument
115 PKCS12_pbe_crypt(const X509_ALGOR *algor, const char *pass, int passlen, const unsigned char *in, int inlen, unsigned char **data, int *datalen, int en_de) argument
129 PKCS12_item_decrypt_d2i_ex(const X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf, OSSL_LIB_CTX *libctx, const char *propq) argument
158 PKCS12_item_decrypt_d2i(const X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf) argument
171 PKCS12_item_i2d_encrypt_ex(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf, OSSL_LIB_CTX *ctx, const char *propq) argument
206 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
[all...]
H A Dp12_crt.c37 PKCS12 *PKCS12_create_ex(const char *pass, const char *name, EVP_PKEY *pkey, argument
94 if (bags && !PKCS12_add_safe_ex(&safes, bags, nid_cert, iter, pass,
102 bag = PKCS12_add_key_ex(&bags, pkey, keytype, iter, nid_key, pass,
135 !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL))
148 PKCS12 *PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, argument
152 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert,
203 int nid_key, const char *pass,
216 bag = PKCS12_SAFEBAG_create_pkcs8_encrypt_ex(nid_key, pass, -1, NULL, 0,
238 int nid_key, const char *pass)
240 return PKCS12_add_key_ex(pbags, key, key_usage, iter, nid_key, pass,
[all...]
H A Dp12_add.c92 PKCS7 *PKCS12_pack_p7encdata_ex(int pbe_nid, const char *pass, int passlen, argument
131 PKCS12_item_i2d_encrypt_ex(pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass,
146 PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, argument
150 return PKCS12_pack_p7encdata_ex(pbe_nid, pass, passlen, salt, saltlen,
154 STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass,
167 pass, passlen,
173 const char *pass, int passlen,
176 return PKCS8_decrypt_ex(bag->value.shkeybag, pass, passlen, ctx, propq);
180 const char *pass, int passlen)
182 return PKCS12_decrypt_skey_ex(bag, pass, passle
172 PKCS12_decrypt_skey_ex(const PKCS12_SAFEBAG *bag, const char *pass, int passlen, OSSL_LIB_CTX *ctx, const char *propq) argument
179 PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen) argument
[all...]
/freebsd-current/crypto/openssl/include/openssl/
H A Dpkcs12.h146 const char *pass,
152 const char *pass,
162 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(const X509_SIG *p8, const char *pass,
164 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt_ex(const X509_SIG *p8, const char *pass,
168 const char *pass, int passlen);
170 const char *pass, int passlen,
174 const char *pass, int passlen, unsigned char *salt,
177 const char *pass, int passlen, unsigned char *salt,
180 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen,
182 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, in
319 int key_nid, const char *pass); variable
322 int key_nid, const char *pass, variable
328 int safe_nid, int iter, const char *pass); variable
330 int safe_nid, int iter, const char *pass, variable
[all...]
/freebsd-current/contrib/netbsd-tests/usr.bin/config/
H A Dt_config.sh130 test_case shadow_instance pass "Checks correct handling of shadowed instances"
131 test_case loop pass "Checks correct handling of loops"
132 test_case loop2 pass "Checks correct handling of devices that can be their" \
134 test_case pseudo_parent pass "Checks correct handling of children of pseudo" \
148 test_case undefined_opt pass \
161 test_case select pass "Attribute selection"
180 test_case no_select pass "Attribute negation"
203 test_case devi pass "Device instance"
228 test_case min pass "Minimal config"
/freebsd-current/crypto/openssl/crypto/evp/
H A Dp5_crpt2.c22 int ossl_pkcs5_pbkdf2_hmac_ex(const char *pass, int passlen, argument
35 if (pass == NULL) {
36 pass = empty;
39 passlen = strlen(pass);
52 (char *)pass, (size_t)passlen);
68 0, passlen, pass, passlen);
83 int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, argument
87 return ossl_pkcs5_pbkdf2_hmac_ex(pass, passlen, salt, saltlen, iter, digest,
92 int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, argument
100 r = ossl_pkcs5_pbkdf2_hmac_ex(pass, passle
112 PKCS5_v2_PBE_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de, OSSL_LIB_CTX *libctx, const char *propq) argument
173 PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de) argument
180 PKCS5_v2_PBKDF2_keyivgen_ex(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de, OSSL_LIB_CTX *libctx, const char *propq) argument
265 PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *c, const EVP_MD *md, int en_de) argument
[all...]
H A Dp5_crpt.c26 int PKCS5_PBE_keyivgen_ex(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument
75 if (pass == NULL)
78 passlen = strlen(pass);
90 (char *)pass, (size_t)passlen);
113 int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, argument
117 return PKCS5_PBE_keyivgen_ex(cctx, pass, passlen, param, cipher, md, en_de,
/freebsd-current/tools/regression/netinet6/inet6_rth/
H A Dtest_subr.c123 int pass; local
131 pass = 0;
135 pass = (got == expected) ? 1 : 0;
138 pass = (got > expected) ? 1 : 0;
141 pass = (got < expected) ? 1 : 0;
144 if (pass != 0) {
/freebsd-current/share/examples/hast/
H A Ducarp.sh36 pass="password"
70 ucarp -i ${ifnet} -s ${srcip} -v ${vhid} -a ${addr} -p ${pass} -u "${upscript}" -d "${downscript}"
/freebsd-current/tools/regression/posixsem/
H A Dtest.h52 void pass(void);
H A Dposixsem.c134 pass();
153 pass();
172 pass();
193 pass();
212 pass();
231 pass();
418 pass();
441 pass();
458 pass();
482 pass();
[all...]
/freebsd-current/usr.bin/newkey/
H A Dgeneric.c54 getseed(char *seed, int seedsize, unsigned char *pass) argument
59 seed[i] = (arc4random() & 0xff) ^ pass[i % 8];
67 genkeys(char *public, char *secret, char *pass) argument
84 getseed((char *)seed, sizeof (seed), (u_char *)pass);
/freebsd-current/contrib/bmake/unit-tests/
H A Ddep-colon-bug-cross-file.mk7 # In pass 1, there is a dependency group at the bottom of the file.
12 # After the file has been parsed completely, it is parsed again in pass 2.
13 # In this pass, another command is added to the "current dependency group",
14 # which was still the one from pass 1, which means it was possible to later
32 : pass 2
42 : pass 1
/freebsd-current/lib/libc/locale/
H A Dcollate.c235 substsearch(struct xlocale_collate *table, const wchar_t key, int pass) argument
238 int n = table->info->subst_count[pass];
243 if (pass >= table->info->directive_count)
249 p = table->subst_table[pass] + (key & ~COLLATE_SUBST_PRIORITY);
323 * If this is the "last" pass for the UNDEFINED, then
425 int pass; local
433 for (pass = 0; pass <= ndir; pass++) {
437 if (pass !
545 xfrm(struct xlocale_collate *table, unsigned char *p, int pri, int pass) argument
570 int pass; local
[all...]
/freebsd-current/crypto/openssl/crypto/
H A Dpassphrase.c116 * 4. It reports back the length of the prompted pass phrase.
118 static int do_ui_passphrase(char *pass, size_t pass_size, size_t *pass_len, argument
127 if (!ossl_assert(pass != NULL && pass_size != 0 && pass_len != NULL)) {
144 prompt = UI_construct_prompt(ui, "pass phrase", prompt_info);
196 memcpy(pass, ipass, *pass_len);
210 int ossl_pw_get_passphrase(char *pass, size_t pass_size, size_t *pass_len, argument
236 memcpy(pass, source, source_len);
247 ret = cb(pass, pass_size, pass_len, params, cbarg);
286 ret = do_ui_passphrase(pass, pass_size, pass_len, prompt_info, verify,
301 OPENSSL_cleanse(pass, *pass_le
341 ossl_pw_passphrase_callback_enc(char *pass, size_t pass_size, size_t *pass_len, const OSSL_PARAM params[], void *arg) argument
348 ossl_pw_passphrase_callback_dec(char *pass, size_t pass_size, size_t *pass_len, const OSSL_PARAM params[], void *arg) argument
[all...]
/freebsd-current/contrib/libedit/
H A Dfilecomplete.c71 struct passwd *pass; local
95 &pass) != 0)
96 pass = NULL;
98 pass = getpwuid_r(getuid(), &pwres, pwbuf, sizeof(pwbuf));
100 pass = getpwuid(getuid());
104 if (getpwnam_r(temp, &pwres, pwbuf, sizeof(pwbuf), &pass) != 0)
105 pass = NULL;
107 pass = getpwnam_r(temp, &pwres, pwbuf, sizeof(pwbuf));
109 pass = getpwnam(temp);
113 if (pass
[all...]

Completed in 295 milliseconds

1234567891011>>