/freebsd-current/contrib/blocklist/etc/ |
H A D | npf.conf | 10 pass final all 14 pass final all
|
/freebsd-current/contrib/kyua/integration/helpers/ |
H A D | simple_all_pass.cpp | 34 ATF_TEST_CASE_WITHOUT_HEAD(pass); variable 35 ATF_TEST_CASE_BODY(pass) 37 std::cout << "This is the stdout of pass\n"; 38 std::cerr << "This is the stderr of pass\n"; 53 ATF_ADD_TEST_CASE(tcs, pass);
|
H A D | simple_some_fail.cpp | 43 ATF_TEST_CASE_WITHOUT_HEAD(pass); variable 44 ATF_TEST_CASE_BODY(pass) 52 ATF_ADD_TEST_CASE(tcs, pass);
|
H A D | bogus_test_cases.cpp | 53 ATF_TEST_CASE_WITHOUT_HEAD(pass); variable 54 ATF_TEST_CASE_BODY(pass) 63 ATF_ADD_TEST_CASE(tcs, pass);
|
H A D | expect_some_fail.cpp | 61 ATF_TEST_CASE_WITHOUT_HEAD(pass); variable 62 ATF_TEST_CASE_BODY(pass) 91 ATF_ADD_TEST_CASE(tcs, pass);
|
/freebsd-current/usr.sbin/pw/tests/ |
H A D | crypt.c | 33 char *salt, *pass, *hash; local 38 pass = argv[2]; 40 hash = crypt(pass, salt);
|
/freebsd-current/crypto/openssl/crypto/pkcs12/ |
H A D | p12_p8d.c | 14 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt_ex(const X509_SIG *p8, const char *pass, argument 23 ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), pass, 27 PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(const X509_SIG *p8, const char *pass, argument 30 return PKCS8_decrypt_ex(p8, pass, passlen, NULL, NULL);
|
H A D | p12_key.c | 19 int PKCS12_key_gen_asc_ex(const char *pass, int passlen, unsigned char *salt, argument 28 if (pass == NULL) { 31 } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { 41 int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, 49 int PKCS12_key_gen_utf8_ex(const char *pass, int passlen, unsigned char *salt, argument 58 if (pass == NULL) { 61 } else if (!OPENSSL_utf82uni(pass, passlen, &unipass, &uniplen)) { 71 int PKCS12_key_gen_utf8(const char *pass, int passlen, unsigned char *salt, argument 75 return PKCS12_key_gen_utf8_ex(pass, passle 79 PKCS12_key_gen_uni_ex(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type, OSSL_LIB_CTX *libctx, const char *propq) argument 133 PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, int saltlen, int id, int iter, int n, unsigned char *out, const EVP_MD *md_type) argument [all...] |
H A D | p12_kiss.c | 17 static int parse_pk12(PKCS12 *p12, const char *pass, int passlen, 20 static int parse_bags(const STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, 23 static int parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, 33 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 60 if (pass == NULL || *pass == '\0') { 63 pass = NULL; 65 pass = ""; 70 } else if (!PKCS12_verify_mac(p12, pass, -1)) { 82 if (!parse_pk12(p12, pass, 136 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument 184 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts) argument [all...] |
H A D | p12_p8e.c | 17 const char *pass, int passlen, 51 p8 = PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, libctx, propq); 61 const char *pass, int passlen, 65 return PKCS8_encrypt_ex(pbe_nid, cipher, pass, passlen, salt, saltlen, iter, 69 X509_SIG *PKCS8_set0_pbe_ex(const char *pass, int passlen, argument 78 pass, passlen, p8inf, 1, ctx, propq); 97 X509_SIG *PKCS8_set0_pbe(const char *pass, int passlen, argument 100 return PKCS8_set0_pbe_ex(pass, passlen, p8inf, pbe, NULL, NULL); 16 PKCS8_encrypt_ex(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf, OSSL_LIB_CTX *libctx, const char *propq) argument 60 PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8inf) argument
|
/freebsd-current/share/examples/tests/tests/tap/ |
H A D | printf_test.c | 71 pass(void) function 99 pass(); 103 pass(); 118 pass(); 123 pass(); 140 pass(); 148 pass(); 155 pass();
|
/freebsd-current/crypto/openssl/test/ |
H A D | uitest.c | 36 char pass[16]; local 48 pass, 0, sizeof(pass) - 1) <= 0) 61 if (TEST_str_eq(pass, defpass)) 78 char pass[16]; local 82 if (TEST_int_gt(password_callback(pass, sizeof(pass), 0, &cb_data), 0) 83 && TEST_str_eq(pass, cb_data.password))
|
/freebsd-current/contrib/bearssl/src/int/ |
H A D | i15_decmod.c | 32 * Two-pass algorithm: in the first pass, we determine whether the 33 * value fits; in the second pass, we do the actual write. 35 * During the first pass, 'r' contains the comparison result so 45 * During the second pass, 'r' is either 0xFFFFFFFF (value fits) 56 int pass; local 67 for (pass = 0; pass < 2; pass ++) { 92 if (pass) { [all...] |
H A D | i31_decmod.c | 32 * Two-pass algorithm: in the first pass, we determine whether the 33 * value fits; in the second pass, we do the actual write. 35 * During the first pass, 'r' contains the comparison result so 45 * During the second pass, 'r' is either 0xFFFFFFFF (value fits) 56 int pass; local 67 for (pass = 0; pass < 2; pass ++) { 92 if (pass) { [all...] |
/freebsd-current/contrib/dialog/ |
H A D | argv.c | 36 int pass; local 60 for (pass = 0; pass < 2; ++pass) { 72 if (pass) { 80 if (pass) { 96 if (pass) { 109 if (pass) { 115 if (pass) { 122 if (pass) { [all...] |
/freebsd-current/contrib/llvm-project/clang/lib/ARCMigrate/ |
H A D | TransUnusedInitDelegate.cpp | 40 UnusedInitRewriter(MigrationPass &pass) argument 41 : Body(nullptr), Pass(pass) { } 74 void trans::rewriteUnusedInitDelegate(MigrationPass &pass) { argument 75 BodyTransform<UnusedInitRewriter> trans(pass); 76 trans.TraverseDecl(pass.Ctx.getTranslationUnitDecl());
|
H A D | TransARCAssign.cpp | 39 ARCAssignChecker(MigrationPass &pass) : Pass(pass) { } argument 74 void trans::makeAssignARCSafe(MigrationPass &pass) { argument 75 ARCAssignChecker assignCheck(pass); 76 assignCheck.TraverseDecl(pass.Ctx.getTranslationUnitDecl());
|
/freebsd-current/contrib/ncurses/include/ |
H A D | MKkey_defs.sh | 47 trap 'rm -f $data pass[1234]_$$' EXIT INT QUIT TERM HUP 80 for pass in 1 2 3 4 83 output=pass${pass}_$$ 113 pass='$pass'; 132 if (pass == 1 || pass == 2) 136 if (pass == 3) 142 if (pass [all...] |
/freebsd-current/libexec/rc/ |
H A D | rc.firewall | 84 ${fwcmd} add 100 pass all from any to any via lo0 102 ${fwcmd} add pass ipv6-icmp from :: to ff02::/16 104 ${fwcmd} add pass ipv6-icmp from fe80::/10 to fe80::/10 105 ${fwcmd} add pass ipv6-icmp from fe80::/10 to ff02::/16 108 ${fwcmd} add pass ipv6-icmp from any to any icmp6types 1 111 ${fwcmd} add pass ipv6-icmp from any to any icmp6types 2,135,136 191 # ${fwcmd} add 65000 pass all from any to any 198 ${fwcmd} add 65000 pass all from any to any 216 ${fwcmd} add pass all from ${net} to 255.255.255.255 219 ${fwcmd} add pass al [all...] |
/freebsd-current/crypto/heimdal/kadmin/ |
H A D | random_password.c | 65 char *pass; 66 generate_password(&pass, 3, 70 strlcpy(pw, pass, len); 71 memset(pass, 0, strlen(pass)); 72 free(pass);
|
/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | pbe_scrypt.c | 37 int EVP_PBE_scrypt_ex(const char *pass, size_t passlen, argument 55 if (pass == NULL) { 56 pass = empty; 74 (unsigned char *)pass, 90 int EVP_PBE_scrypt(const char *pass, size_t passlen, argument 95 return EVP_PBE_scrypt_ex(pass, passlen, salt, saltlen, N, r, p, maxmem,
|
/freebsd-current/crypto/openssh/regress/ |
H A D | sftp-batch.sh | 10 cat << EOF > ${BATCH}.pass.1 17 cat << EOF > ${BATCH}.pass.2 38 ${SFTP} -b ${BATCH}.pass.1 -D ${SFTPSERVER} >/dev/null 2>&1 \ 46 ${SFTP} -b ${BATCH}.pass.2 -D ${SFTPSERVER} >/dev/null 2>&1 \
|
/freebsd-current/sbin/natd/samples/ |
H A D | natd.test | 11 ipfw add pass ip from any to any
|
/freebsd-current/contrib/bmake/unit-tests/ |
H A D | dep-colon-bug-cross-file.exp | 3 : pass 1
|
/freebsd-current/crypto/openssh/ |
H A D | auth-sia.c | 53 sys_auth_passwd(struct ssh *ssh, const char *pass) argument 62 if (!authctxt->user || pass == NULL || pass[0] == '\0') 69 if ((ret = sia_ses_authent(NULL, pass, ent)) != SIASUCCESS) {
|