bin/pax/file_subs.c
354
int pass = 0;
bin/pax/file_subs.c
463
if (++pass <= 1)
bin/rm/rm.c
328
if (!pass(fd, sbp->st_size, buf, bsize))
bin/rm/rm.c
59
int pass(int, off_t, char *, size_t);
games/hack/hack.shk.c
450
int pass, tmp;
games/hack/hack.shk.c
540
for(pass = 0; pass <= 1; pass++) {
games/hack/hack.shk.c
544
if(!pass && !bp->useup) {
games/sail/lo_main.c
58
struct passwd *pass;
games/sail/lo_main.c
78
if (longfmt && (pass = getpwuid(log.l_uid)) != NULL)
games/sail/lo_main.c
80
log.l_name, pass->pw_name);
lib/libc/crypt/bcrypt.c
206
bcrypt_newhash(const char *pass, int log_rounds, char *hash, size_t hashlen)
lib/libc/crypt/bcrypt.c
213
if (bcrypt_hashpass(pass, salt, hash, hashlen) != 0)
lib/libc/crypt/bcrypt.c
222
bcrypt_checkpass(const char *pass, const char *goodhash)
lib/libc/crypt/bcrypt.c
226
if (bcrypt_hashpass(pass, goodhash, hash, sizeof(hash)) != 0)
lib/libc/crypt/bcrypt.c
388
bcrypt(const char *pass, const char *salt)
lib/libc/crypt/bcrypt.c
392
if (bcrypt_hashpass(pass, salt, gencrypted, sizeof(gencrypted)) != 0)
lib/libc/crypt/cryptutil.c
25
crypt_checkpass(const char *pass, const char *goodhash)
lib/libc/crypt/cryptutil.c
35
if (strlen(goodhash) == 0 && strlen(pass) == 0)
lib/libc/crypt/cryptutil.c
39
if (bcrypt_checkpass(pass, goodhash))
lib/libc/crypt/cryptutil.c
46
bcrypt_newhash(pass, 8, dummy, sizeof(dummy));
lib/libc/crypt/cryptutil.c
54
crypt_newhash(const char *pass, const char *pref, char *hash, size_t hashlen)
lib/libc/crypt/cryptutil.c
92
rv = bcrypt_newhash(pass, rounds, hash, hashlen);
lib/libcrypto/cms/cms.h
203
int CMS_decrypt_set1_password(CMS_ContentInfo *cms, unsigned char *pass,
lib/libcrypto/cms/cms.h
233
int CMS_RecipientInfo_set0_password(CMS_RecipientInfo *ri, unsigned char *pass,
lib/libcrypto/cms/cms.h
237
int wrap_nid, int pbe_nid, unsigned char *pass, ssize_t passlen,
lib/libcrypto/cms/cms_asn1.c
943
freezero(pwri->pass, pwri->passlen);
lib/libcrypto/cms/cms_local.h
273
unsigned char *pass;
lib/libcrypto/cms/cms_pwri.c
202
CMS_RecipientInfo_set0_password(ri, pass, passlen);
lib/libcrypto/cms/cms_pwri.c
346
if (!pwri->pass) {
lib/libcrypto/cms/cms_pwri.c
392
if (!EVP_PBE_CipherInit(algtmp->algorithm, (char *)pwri->pass,
lib/libcrypto/cms/cms_pwri.c
72
CMS_RecipientInfo_set0_password(CMS_RecipientInfo *ri, unsigned char *pass,
lib/libcrypto/cms/cms_pwri.c
83
pwri->pass = pass;
lib/libcrypto/cms/cms_pwri.c
84
if (pass && passlen < 0)
lib/libcrypto/cms/cms_pwri.c
85
passlen = strlen((char *)pass);
lib/libcrypto/cms/cms_pwri.c
94
int pbe_nid, unsigned char *pass, ssize_t passlen,
lib/libcrypto/cms/cms_smime.c
812
CMS_decrypt_set1_password(CMS_ContentInfo *cms, unsigned char *pass,
lib/libcrypto/cms/cms_smime.c
824
CMS_RecipientInfo_set0_password(ri, pass, passlen);
lib/libcrypto/evp/evp.h
311
typedef int EVP_PBE_KEYGEN(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
lib/libcrypto/evp/evp.h
834
int PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen,
lib/libcrypto/evp/evp.h
837
int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt,
lib/libcrypto/evp/evp_local.h
359
int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
lib/libcrypto/evp/evp_pbe.c
181
EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen,
lib/libcrypto/evp/evp_pbe.c
207
if (pass == NULL)
lib/libcrypto/evp/evp_pbe.c
210
passlen = strlen(pass);
lib/libcrypto/evp/evp_pbe.c
225
if (!cfg->keygen(ctx, pass, passlen, param, cipher, md, en_de)) {
lib/libcrypto/evp/evp_pbe.c
234
PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen,
lib/libcrypto/evp/evp_pbe.c
275
if (!pass)
lib/libcrypto/evp/evp_pbe.c
278
passlen = strlen(pass);
lib/libcrypto/evp/evp_pbe.c
285
if (!EVP_DigestUpdate(md_ctx, pass, passlen))
lib/libcrypto/evp/evp_pbe.c
330
PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt,
lib/libcrypto/evp/evp_pbe.c
345
if (!pass)
lib/libcrypto/evp/evp_pbe.c
348
passlen = strlen(pass);
lib/libcrypto/evp/evp_pbe.c
349
if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL)) {
lib/libcrypto/evp/evp_pbe.c
404
PKCS5_PBKDF2_HMAC_SHA1(const char *pass, int passlen, const unsigned char *salt,
lib/libcrypto/evp/evp_pbe.c
407
return PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter,
lib/libcrypto/evp/evp_pbe.c
419
PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
lib/libcrypto/evp/evp_pbe.c
463
ret = PKCS5_v2_PBKDF2_keyivgen(ctx, pass, passlen,
lib/libcrypto/evp/evp_pbe.c
506
PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
lib/libcrypto/evp/evp_pbe.c
579
if (!PKCS5_PBKDF2_HMAC(pass, passlen, salt, saltlen, iter, prfmd,
lib/libcrypto/evp/evp_pbe.c
599
PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
lib/libcrypto/evp/evp_pbe.c
630
if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_KEY_ID,
lib/libcrypto/evp/evp_pbe.c
636
if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_IV_ID,
lib/libcrypto/evp/evp_pbe.c
76
int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
lib/libcrypto/evp/evp_pbe.c
78
int PKCS5_v2_PBKDF2_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
lib/libcrypto/evp/evp_pbe.c
80
int PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
lib/libcrypto/evp/evp_pbe.c
83
int PKCS5_v2_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen,
lib/libcrypto/pem/pvkfmt.c
711
unsigned int saltlen, const unsigned char *pass, int passlen)
lib/libcrypto/pem/pvkfmt.c
719
!EVP_DigestUpdate(&mctx, pass, passlen) ||
lib/libcrypto/pkcs12/p12_add.c
141
PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
lib/libcrypto/pkcs12/p12_add.c
172
pbe, &PKCS12_SAFEBAGS_it, pass, passlen, bags, 1))) {
lib/libcrypto/pkcs12/p12_add.c
185
PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen)
lib/libcrypto/pkcs12/p12_add.c
196
pass, passlen, content->enc_data, 1);
lib/libcrypto/pkcs12/p12_add.c
201
PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen)
lib/libcrypto/pkcs12/p12_add.c
203
return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
lib/libcrypto/pkcs12/p12_crt.c
122
if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass))
lib/libcrypto/pkcs12/p12_crt.c
129
bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
lib/libcrypto/pkcs12/p12_crt.c
156
!PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL))
lib/libcrypto/pkcs12/p12_crt.c
211
int iter, int nid_key, const char *pass)
lib/libcrypto/pkcs12/p12_crt.c
222
bag = PKCS12_SAFEBAG_create_pkcs8_encrypt(nid_key, pass, -1,
lib/libcrypto/pkcs12/p12_crt.c
251
int nid_safe, int iter, const char *pass)
lib/libcrypto/pkcs12/p12_crt.c
270
p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0,
lib/libcrypto/pkcs12/p12_crt.c
73
PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert,
lib/libcrypto/pkcs12/p12_decr.c
126
const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf)
lib/libcrypto/pkcs12/p12_decr.c
138
if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length,
lib/libcrypto/pkcs12/p12_decr.c
159
const char *pass, int passlen,
lib/libcrypto/pkcs12/p12_decr.c
175
if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data,
lib/libcrypto/pkcs12/p12_decr.c
72
PKCS12_pbe_crypt(const X509_ALGOR *algor, const char *pass, int passlen,
lib/libcrypto/pkcs12/p12_decr.c
82
if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen,
lib/libcrypto/pkcs12/p12_key.c
143
*p++ = pass[i % passlen];
lib/libcrypto/pkcs12/p12_key.c
75
PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
lib/libcrypto/pkcs12/p12_key.c
83
if (!pass) {
lib/libcrypto/pkcs12/p12_key.c
86
} else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) {
lib/libcrypto/pkcs12/p12_key.c
99
PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt,
lib/libcrypto/pkcs12/p12_kiss.c
108
if (pass == NULL || *pass == '\0') {
lib/libcrypto/pkcs12/p12_kiss.c
110
pass = NULL;
lib/libcrypto/pkcs12/p12_kiss.c
112
pass = "";
lib/libcrypto/pkcs12/p12_kiss.c
117
} else if (!PKCS12_verify_mac(p12, pass, -1)) {
lib/libcrypto/pkcs12/p12_kiss.c
128
if (!parse_pk12(p12, pass, -1, pkey, ocerts)) {
lib/libcrypto/pkcs12/p12_kiss.c
176
parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey,
lib/libcrypto/pkcs12/p12_kiss.c
192
bags = PKCS12_unpack_p7encdata(p7, pass, passlen);
lib/libcrypto/pkcs12/p12_kiss.c
199
if (!parse_bags(bags, pass, passlen, pkey, ocerts)) {
lib/libcrypto/pkcs12/p12_kiss.c
211
parse_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, int passlen,
lib/libcrypto/pkcs12/p12_kiss.c
217
if (!parse_bag(sk_PKCS12_SAFEBAG_value(bags, i), pass, passlen,
lib/libcrypto/pkcs12/p12_kiss.c
225
parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey,
lib/libcrypto/pkcs12/p12_kiss.c
257
if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
lib/libcrypto/pkcs12/p12_kiss.c
296
return parse_bags(bag->value.safes, pass, passlen,
lib/libcrypto/pkcs12/p12_kiss.c
68
static int parse_pk12( PKCS12 *p12, const char *pass, int passlen,
lib/libcrypto/pkcs12/p12_kiss.c
71
static int parse_bags( STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass,
lib/libcrypto/pkcs12/p12_kiss.c
74
static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen,
lib/libcrypto/pkcs12/p12_kiss.c
84
PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
lib/libcrypto/pkcs12/p12_mutl.c
113
PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
lib/libcrypto/pkcs12/p12_mutl.c
153
if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
lib/libcrypto/pkcs12/p12_mutl.c
179
PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen)
lib/libcrypto/pkcs12/p12_mutl.c
188
if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) {
lib/libcrypto/pkcs12/p12_mutl.c
202
PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt,
lib/libcrypto/pkcs12/p12_mutl.c
215
if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) {
lib/libcrypto/pkcs12/p12_p8d.c
67
PKCS8_decrypt(const X509_SIG *p8, const char *pass, int passlen)
lib/libcrypto/pkcs12/p12_p8d.c
70
&PKCS8_PRIV_KEY_INFO_it, pass, passlen, p8->digest, 1);
lib/libcrypto/pkcs12/p12_p8e.c
68
PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass,
lib/libcrypto/pkcs12/p12_p8e.c
92
&PKCS8_PRIV_KEY_INFO_it, pass, passlen, p8inf, 1);
lib/libcrypto/pkcs12/p12_sbag.c
215
PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen,
lib/libcrypto/pkcs12/p12_sbag.c
225
if ((p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen,
lib/libcrypto/pkcs12/pkcs12.h
170
PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(const X509_SIG *p8, const char *pass,
lib/libcrypto/pkcs12/pkcs12.h
173
const char *pass, int passlen);
lib/libcrypto/pkcs12/pkcs12.h
175
const char *pass, int passlen, unsigned char *salt, int saltlen, int iter,
lib/libcrypto/pkcs12/pkcs12.h
179
STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass,
lib/libcrypto/pkcs12/pkcs12.h
185
int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt,
lib/libcrypto/pkcs12/pkcs12.h
188
int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen);
lib/libcrypto/pkcs12/pkcs12.h
189
int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen,
lib/libcrypto/pkcs12/pkcs12.h
210
int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,
lib/libcrypto/pkcs12/pkcs12.h
212
PKCS12 *PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey,
lib/libcrypto/pkcs12/pkcs12_local.h
119
const char *pass, int passlen, unsigned char *salt, int saltlen, int iter,
lib/libcrypto/pkcs12/pkcs12_local.h
124
int key_usage, int iter, int key_nid, const char *pass);
lib/libcrypto/pkcs12/pkcs12_local.h
126
int safe_nid, int iter, const char *pass);
lib/libcrypto/pkcs12/pkcs12_local.h
138
int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen,
lib/libcrypto/pkcs12/pkcs12_local.h
147
const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf);
lib/libcrypto/pkcs12/pkcs12_local.h
149
const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf);
lib/libcrypto/pkcs12/pkcs12_local.h
153
int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt,
lib/libcrypto/pkcs12/pkcs12_local.h
159
PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
lib/libcrypto/pkcs12/pkcs12_local.h
162
unsigned char *PKCS12_pbe_crypt(const X509_ALGOR *algor, const char *pass,
lib/libcrypto/ts/ts.h
541
EVP_PKEY *TS_CONF_load_key(const char *file, const char *pass);
lib/libcrypto/ts/ts.h
550
const char *key, const char *pass, TS_RESP_CTX *ctx);
lib/libcrypto/ts/ts_conf.c
148
TS_CONF_load_key(const char *file, const char *pass)
lib/libcrypto/ts/ts_conf.c
155
pkey = PEM_read_bio_PrivateKey(key, NULL, NULL, (char *) pass);
lib/libcrypto/ts/ts_conf.c
264
const char *pass, TS_RESP_CTX *ctx)
lib/libcrypto/ts/ts_conf.c
275
if (!(key_obj = TS_CONF_load_key(key, pass)))
lib/libcurses/tinfo/alloc_ttype.c
533
int pass;
lib/libcurses/tinfo/alloc_ttype.c
557
for (pass = 0; pass < 2; ++pass) {
lib/libcurses/tinfo/alloc_ttype.c
560
if (pass) {
lib/libcurses/tinfo/alloc_ttype.c
570
if (pass) {
lib/libcurses/tinfo/alloc_ttype.c
579
if (pass) {
lib/libcurses/tinfo/alloc_ttype.c
639
for (pass = 0; pass < 2; ++pass) {
lib/libcurses/tinfo/alloc_ttype.c
646
if (pass) {
lib/libcurses/tinfo/alloc_ttype.c
658
if (pass) {
lib/libcurses/tinfo/alloc_ttype.c
667
if (pass) {
lib/libedit/filecomplete.c
101
tempsz = strlen(pass->pw_dir) + 1 + strlen(txt) + 1;
lib/libedit/filecomplete.c
105
(void)snprintf(temp, tempsz, "%s/%s", pass->pw_dir, txt);
lib/libedit/filecomplete.c
65
struct passwd pwres, *pass;
lib/libedit/filecomplete.c
87
if (getpwuid_r(getuid(), &pwres, pwbuf, sizeof(pwbuf), &pass) != 0)
lib/libedit/filecomplete.c
88
pass = NULL;
lib/libedit/filecomplete.c
90
if (getpwnam_r(temp, &pwres, pwbuf, sizeof(pwbuf), &pass) != 0)
lib/libedit/filecomplete.c
91
pass = NULL;
lib/libedit/filecomplete.c
94
if (pass == NULL)
lib/libform/frm_driver.c
4942
int pass;
lib/libform/frm_driver.c
4949
for (pass = 0; pass < 2; ++pass)
lib/libform/frm_driver.c
4975
if (pass)
lib/libform/frm_driver.c
4984
if (pass)
lib/libform/frm_driver.c
4993
if (!pass)
lib/libutil/bcrypt_pbkdf.c
122
SHA512Update(&ctx, pass, passlen);
lib/libutil/bcrypt_pbkdf.c
98
bcrypt_pbkdf(const char *pass, size_t passlen, const uint8_t *salt, size_t saltlen,
lib/libutil/pkcs5_pbkdf2.c
100
hmac_sha1(asalt, salt_len + 4, pass, pass_len, d1);
lib/libutil/pkcs5_pbkdf2.c
104
hmac_sha1(d1, sizeof(d1), pass, pass_len, d2);
lib/libutil/pkcs5_pbkdf2.c
77
pkcs5_pbkdf2(const char *pass, size_t pass_len, const uint8_t *salt,
libexec/ftpd/extern.h
76
pass(char *);
libexec/ftpd/monitor.c
285
auth = pass(pw);
libexec/ftpd/monitor.c
464
monitor_pass(char *pass)
libexec/ftpd/monitor.c
473
len = strlen(pass);
libexec/ftpd/monitor.c
476
send_data(fd_monitor, pass, len);
libexec/login_ldap/login_ldap.c
188
auth_ldap(char *user, char *class, char *pass)
libexec/login_ldap/login_ldap.c
214
if (!bind_password(&ctx, ctx.binddn, pass))
libexec/login_ldap/login_ldap.c
252
if (!bind_password(&ctx, ctx.userdn, pass)) {
libexec/login_passwd/login_passwd.c
142
pass = response + ch + 1;
libexec/login_passwd/login_passwd.c
150
pass = readpassphrase("Password:", pbuf, sizeof(pbuf),
libexec/login_passwd/login_passwd.c
152
if (pass == NULL)
libexec/login_passwd/login_passwd.c
162
rc = crypt_checkpass(pass, pwd ? pwd->pw_passwd : NULL);
libexec/login_passwd/login_passwd.c
163
explicit_bzero(pass, strlen(pass));
libexec/login_passwd/login_passwd.c
58
char response[1024], pbuf[1024], *pass = "";
libexec/spamd/gdcopy.c
38
gd->pass = ogd.pass;
libexec/spamd/grey.c
567
} else if (gd.pcount >= 0 && gd.pass <= now) {
libexec/spamd/grey.c
827
gd.pass = now + expire;
libexec/spamd/grey.c
856
gd.pass = now;
libexec/spamd/grey.h
33
int32_t pass; /* when was it whitelisted */
libexec/spamd/grey.h
41
int64_t pass; /* when was it whitelisted */
libexec/spamlogd/spamlogd.c
326
gd.pass = now;
regress/lib/libcrypto/pbkdf2/pbkdf2.c
164
r = PKCS5_PBKDF2_HMAC(test->pass, test->passlen,
regress/lib/libcrypto/pbkdf2/pbkdf2.c
193
for (n = 0; test->pass != NULL; n++, test++) {
regress/lib/libcrypto/pbkdf2/pbkdf2.c
63
const char *pass;
regress/lib/libm/fenv/fenv.c
327
int except, i, pass, raise, status;
regress/lib/libm/fenv/fenv.c
343
for (pass = 0; pass < 2; pass++) {
regress/lib/libm/fenv/fenv.c
368
switch (pass) {
regress/lib/libm/fenv/fenv.c
408
int except, i, pass, status, raise;
regress/lib/libm/fenv/fenv.c
413
for (pass = 0; pass < 2; pass++) {
regress/lib/libm/fenv/fenv.c
434
if (pass == 1)
regress/lib/libm/fenv/fenv.c
444
if (pass == 1)
regress/lib/libm/fenv/fenv.c
452
assert(pass == 0);
regress/lib/libm/msun/fenv_test.c
403
int except, pass, raise, status;
regress/lib/libm/msun/fenv_test.c
437
for (pass = 0; pass < 2; pass++) {
regress/lib/libm/msun/fenv_test.c
461
switch (pass) {
regress/lib/libm/msun/fenv_test.c
501
int except, pass, status, raise;
regress/lib/libm/msun/fenv_test.c
507
for (pass = 0; pass < 2; pass++) {
regress/lib/libm/msun/fenv_test.c
528
if (pass == 1)
regress/lib/libm/msun/fenv_test.c
539
if (pass == 1)
regress/lib/libm/msun/fenv_test.c
545
ATF_CHECK_EQ(0, pass);
regress/lib/libutil/pkcs5_pbkdf2/pkcs5_pbkdf2_test.c
133
if (pkcs5_pbkdf2(vec->pass, strlen(vec->pass),
regress/lib/libutil/pkcs5_pbkdf2/pkcs5_pbkdf2_test.c
26
const char *pass;
regress/sys/fifofs/fifotest.c
191
int fd = -1, pass, status;
regress/sys/fifofs/fifotest.c
198
for (pass = 0; pass < 16; pass++) {
regress/sys/fifofs/fifotest.c
203
if ((pass & 1) == 0) {
regress/sys/fifofs/fifotest.c
224
printf("\nTesting EOF FIFO behavior (pass %d):\n", pass);
regress/sys/fifofs/fifotest.c
234
switch (pass) {
sbin/atactl/atactl.c
1014
char *pass;
sbin/atactl/atactl.c
1028
pass = sec_getpass(pwd.ctrl & SEC_PASSWORD_MASTER, 0);
sbin/atactl/atactl.c
1029
memcpy(pwd.password, pass, strlen(pass));
sbin/atactl/atactl.c
1056
char *pass;
sbin/atactl/atactl.c
1076
pass = sec_getpass(pwd.ctrl & SEC_PASSWORD_MASTER, 0);
sbin/atactl/atactl.c
1077
memcpy(pwd.password, pass, strlen(pass));
sbin/atactl/atactl.c
1136
char *pass;
sbin/atactl/atactl.c
1150
pass = sec_getpass(pwd.ctrl & SEC_PASSWORD_MASTER, 0);
sbin/atactl/atactl.c
1151
memcpy(pwd.password, pass, strlen(pass));
sbin/atactl/atactl.c
1173
char *pass, buf[33];
sbin/atactl/atactl.c
1175
if ((pass = getpass(ident ? "Master password:" :
sbin/atactl/atactl.c
1178
if (strlen(pass) > 32)
sbin/atactl/atactl.c
1181
strlcpy(buf, pass, sizeof(buf));
sbin/atactl/atactl.c
1182
if ((pass = getpass(ident ? "Retype master password:" :
sbin/atactl/atactl.c
1185
if (strcmp(pass, buf) != 0)
sbin/atactl/atactl.c
1189
return (pass);
sbin/atactl/atactl.c
939
char *pass, inbuf[DEV_BSIZE];
sbin/atactl/atactl.c
985
pass = sec_getpass(pwd.ctrl & SEC_PASSWORD_MASTER, 1);
sbin/atactl/atactl.c
986
memcpy(pwd.password, pass, strlen(pass));
sbin/iked/ikev2.c
3815
uint8_t *pass;
sbin/iked/ikev2.c
3842
if ((pass = string2unicode(usr->usr_pass, &passlen)) == NULL)
sbin/iked/ikev2.c
3847
pass, passlen, ntresponse);
sbin/iked/ikev2.c
3853
freezero(pass, passlen);
sbin/iked/ikev2.c
3861
mschap_auth_response(pass, passlen,
sbin/iked/ikev2.c
3867
freezero(pass, passlen);
sbin/iked/ikev2.c
3870
mschap_msk(pass, passlen, ntresponse,
sbin/iked/ikev2.c
3872
freezero(pass, passlen);
sbin/iked/ikev2.c
7086
int ret, pass, passes;
sbin/iked/ikev2.c
7123
for (pass = 0; pass < passes; pass++) {
sbin/iked/parse.y
3347
create_user(const char *user, const char *pass)
sbin/iked/parse.y
3358
if (*pass == '\0' || (strlcpy(usr.usr_pass, pass,
sys/arch/alpha/pci/cia.c
269
int pass;
sys/arch/alpha/pci/cia.c
284
pass = ccp->cc_rev;
sys/arch/alpha/pci/cia.c
287
pass = ccp->cc_rev + 1;
sys/arch/alpha/pci/cia.c
291
name, pass);
sys/arch/amd64/amd64/wscons_machdep.c
183
wscn_input_init(int pass)
sys/arch/amd64/amd64/wscons_machdep.c
185
if (pass != 0) {
sys/arch/amd64/amd64/wscons_machdep.c
192
if (pass == 0 &&
sys/arch/i386/i386/wscons_machdep.c
167
wscn_input_init(int pass)
sys/arch/i386/i386/wscons_machdep.c
169
if (pass != 0) {
sys/arch/i386/i386/wscons_machdep.c
176
if (pass == 0 &&
sys/dev/pci/drm/amd/display/dc/dml2/dml2_wrapper.c
255
bool pass = true;
sys/dev/pci/drm/amd/display/dc/dml2/dml2_wrapper.c
259
pass = false;
sys/dev/pci/drm/amd/display/dc/dml2/dml2_wrapper.c
262
return pass;
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
737
unsigned int pass;
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
771
for (pass = 0; pass <= 3; pass++) {
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
774
if (pass == 0)
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
777
if (pass >= 1)
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
778
eb_unbind(eb, pass >= 2);
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
780
if (pass == 2) {
sys/dev/pci/drm/i915/gem/i915_gem_execbuffer.c
790
if (pass == 3) {
sys/dev/pci/drm/i915/gt/selftest_migrate.c
850
int pass;
sys/dev/pci/drm/i915/gt/selftest_migrate.c
853
for (pass = 0; pass < ARRAY_SIZE(t); pass++) {
sys/dev/pci/drm/i915/gt/selftest_migrate.c
870
t[pass] = ktime_sub(t1, t0);
sys/dev/pci/drm/i915/gt/selftest_migrate.c
929
int pass;
sys/dev/pci/drm/i915/gt/selftest_migrate.c
932
for (pass = 0; pass < ARRAY_SIZE(t); pass++) {
sys/dev/pci/drm/i915/gt/selftest_migrate.c
953
t[pass] = ktime_sub(t1, t0);
sys/dev/pci/drm/i915/gt/selftest_rc6.c
236
int pass;
sys/dev/pci/drm/i915/gt/selftest_rc6.c
238
for (pass = 0; pass < 2; pass++) {
sys/dev/pci/drm/i915/gt/selftest_ring_submission.c
106
int pass;
sys/dev/pci/drm/i915/gt/selftest_ring_submission.c
109
for (pass = 0; pass < 2; pass++) {
sys/dev/pci/drm/i915/gt/selftest_ring_submission.c
115
pass);
sys/dev/pci/drm/i915/gt/selftest_ring_submission.c
126
pass);
sys/dev/pci/drm/i915/gt/selftest_ring_submission.c
137
pass);
sys/dev/pci/drm/i915/gt/selftest_timeline.c
228
const struct __igt_sync pass[] = {
sys/dev/pci/drm/i915/gt/selftest_timeline.c
251
for (p = pass; p->name; p++) {
sys/dev/pci/drm/i915/gt/selftest_timeline.c
269
for (p = pass; p->name; p++) {
sys/dev/pci/drm/i915/intel_uncore.c
221
unsigned int pass;
sys/dev/pci/drm/i915/intel_uncore.c
238
pass = 1;
sys/dev/pci/drm/i915/intel_uncore.c
244
udelay(10 * pass);
sys/dev/pci/drm/i915/intel_uncore.c
250
} while (!ack_detected && pass++ < 10);
sys/dev/pci/drm/i915/intel_uncore.c
257
pass);
sys/dev/pci/drm/i915/selftests/i915_syncmap.c
274
unsigned int pass, order;
sys/dev/pci/drm/i915/selftests/i915_syncmap.c
295
for (pass = 0; pass < 3; pass++) {
sys/dev/pci/drm/i915/selftests/intel_memory_region.c
1249
int pass;
sys/dev/pci/drm/i915/selftests/intel_memory_region.c
1254
for (pass = 0; pass < ARRAY_SIZE(t); pass++) {
sys/dev/pci/drm/i915/selftests/intel_memory_region.c
1262
t[pass] = ktime_sub(t1, t0);
sys/lib/libsa/bcrypt_pbkdf.c
120
SHA512Update(&ctx, pass, passlen);
sys/lib/libsa/bcrypt_pbkdf.c
96
bcrypt_pbkdf(const char *pass, size_t passlen, const uint8_t *salt, size_t saltlen,
sys/lib/libsa/pkcs5_pbkdf2.c
31
pkcs5_pbkdf2(const char *pass, size_t pass_len, const char *salt,
sys/lib/libsa/pkcs5_pbkdf2.c
54
hmac_sha1(asalt, salt_len + 4, pass, pass_len, d1);
sys/lib/libsa/pkcs5_pbkdf2.c
58
hmac_sha1(d1, sizeof(d1), pass, pass_len, d2);
usr.bin/dig/lib/dns/message.c
1534
wrong_priority(dns_rdataset_t *rds, int pass) {
usr.bin/dig/lib/dns/message.c
1556
if (pass_needed >= pass)
usr.bin/dig/lib/dns/message.c
1601
int pass;
usr.bin/dig/lib/dns/message.c
1609
pass = 3;
usr.bin/dig/lib/dns/message.c
1611
pass = 1;
usr.bin/dig/lib/dns/message.c
1642
&& wrong_priority(rdataset, pass))
usr.bin/dig/lib/dns/message.c
1690
} while (--pass != 0);
usr.bin/ftp/fetch.c
1252
char *username, *pass, *pathstart;
usr.bin/ftp/fetch.c
1277
url = username = pass = NULL;
usr.bin/ftp/fetch.c
1287
free(pass);
usr.bin/ftp/fetch.c
1288
url = username = pass = host = portnum = dir = file = NULL;
usr.bin/ftp/fetch.c
1342
pass = userend + 1;
usr.bin/ftp/fetch.c
1346
if (strchr(pass, '@') != NULL ||
usr.bin/ftp/fetch.c
1349
username = pass = NULL;
usr.bin/ftp/fetch.c
1357
username = pass = NULL;
usr.bin/ftp/fetch.c
1361
pass = urldecode(pass);
usr.bin/ftp/fetch.c
1439
username, pass ? "XXXX" : NULL, host, portnum,
usr.bin/ftp/fetch.c
1468
!ftp_login(host, username, pass)))) {
usr.bin/ftp/fetch.c
1557
free(pass);
usr.bin/ftp/util.c
216
ftp_login(const char *host, char *user, char *pass)
usr.bin/ftp/util.c
225
if (ruserpass(host, &user, &pass, &acctname) < 0) {
usr.bin/ftp/util.c
235
if ((user == NULL || pass == NULL) && anonftp) {
usr.bin/ftp/util.c
263
pass = anonpass;
usr.bin/ftp/util.c
290
if (pass == NULL)
usr.bin/ftp/util.c
291
pass = getpass("Password:");
usr.bin/ftp/util.c
292
n = command("PASS %s", pass);
usr.bin/gprof/arcs.c
114
long pass;
usr.bin/gprof/arcs.c
144
for ( pass = 1 ; ; pass++ ) {
usr.bin/gprof/arcs.c
169
printf("[doarcs] pass %ld, cycle(s) %d\n" , pass , ncycle );
usr.bin/gprof/arcs.c
172
if ( pass == 1 ) {
usr.bin/gprof/arcs.c
189
if ( pass > 1 ) {
usr.bin/htpasswd/htpasswd.c
103
if (strlcpy(pass, tok, sizeof(pass)) >= sizeof(pass))
usr.bin/htpasswd/htpasswd.c
125
if (!readpassphrase("Password: ", pass, sizeof(pass),
usr.bin/htpasswd/htpasswd.c
130
explicit_bzero(pass, sizeof(pass));
usr.bin/htpasswd/htpasswd.c
133
if (strcmp(pass, pass2) != 0) {
usr.bin/htpasswd/htpasswd.c
134
explicit_bzero(pass, sizeof(pass));
usr.bin/htpasswd/htpasswd.c
142
if (crypt_newhash(pass, "bcrypt,a", hash, sizeof(hash)) != 0)
usr.bin/htpasswd/htpasswd.c
144
explicit_bzero(pass, sizeof(pass));
usr.bin/htpasswd/htpasswd.c
51
char hash[_PASSWORD_LEN], pass[1024], pass2[1024];
usr.bin/openssl/apps.c
475
const char *pass;
usr.bin/openssl/apps.c
487
pass = "";
usr.bin/openssl/apps.c
504
pass = tpass;
usr.bin/openssl/apps.c
506
ret = PKCS12_parse(p12, pass, pkey, cert, ca);
usr.bin/openssl/apps.c
514
load_cert(BIO *err, const char *file, int format, const char *pass,
usr.bin/openssl/apps.c
561
const char *pass, const char *key_descrip)
usr.bin/openssl/apps.c
567
cb_data.password = pass;
usr.bin/openssl/apps.c
620
const char *pass, const char *key_descrip)
usr.bin/openssl/apps.c
626
cb_data.password = pass;
usr.bin/openssl/apps.c
690
load_certs_crls(BIO *err, const char *file, int format, const char *pass,
usr.bin/openssl/apps.c
701
cb_data.password = pass;
usr.bin/openssl/apps.c
773
load_certs(BIO *err, const char *file, int format, const char *pass,
usr.bin/openssl/apps.c
778
if (!load_certs_crls(err, file, format, pass, desc, &certs, NULL))
usr.bin/openssl/apps.c
784
load_crls(BIO *err, const char *file, int format, const char *pass,
usr.bin/openssl/apps.c
789
if (!load_certs_crls(err, file, format, pass, desc, NULL, &crls))
usr.bin/openssl/apps.h
172
const char *pass, const char *cert_descrip);
usr.bin/openssl/apps.h
174
const char *pass, const char *key_descrip);
usr.bin/openssl/apps.h
176
const char *pass, const char *key_descrip);
usr.bin/openssl/apps.h
178
const char *pass, const char *cert_descrip);
usr.bin/openssl/apps.h
180
const char *pass, const char *cert_descrip);
usr.bin/openssl/enc.c
333
char *strbuf = NULL, *pass = NULL;
usr.bin/openssl/enc.c
482
if (!app_passwd(bio_err, cfg.passarg, NULL, &pass, NULL)) {
usr.bin/openssl/enc.c
486
cfg.keystr = pass;
usr.bin/openssl/enc.c
745
free(pass);
usr.bin/openssl/genpkey.c
224
char *pass = NULL;
usr.bin/openssl/genpkey.c
246
if (!app_passwd(bio_err, cfg.passarg, NULL, &pass, NULL)) {
usr.bin/openssl/genpkey.c
282
NULL, 0, NULL, pass);
usr.bin/openssl/genpkey.c
312
free(pass);
usr.bin/openssl/pkcs12.c
520
char pass[50], macpass[50];
usr.bin/openssl/pkcs12.c
564
cpass = pass;
usr.bin/openssl/pkcs12.c
724
EVP_read_pw_string(pass, sizeof pass,
usr.bin/openssl/pkcs12.c
730
strlcpy(macpass, pass, sizeof macpass);
usr.bin/openssl/pkcs12.c
769
if (!cfg.noprompt && EVP_read_pw_string(pass, sizeof pass,
usr.bin/openssl/pkcs12.c
776
strlcpy(macpass, pass, sizeof macpass);
usr.bin/openssl/pkcs12.c
818
dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options,
usr.bin/openssl/pkcs12.c
83
static int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen,
usr.bin/openssl/pkcs12.c
842
bags = PKCS12_unpack_p7encdata(p7, pass, passlen);
usr.bin/openssl/pkcs12.c
847
if (!dump_certs_pkeys_bags(out, bags, pass, passlen,
usr.bin/openssl/pkcs12.c
86
char *pass, int passlen, int options, char *pempass);
usr.bin/openssl/pkcs12.c
864
char *pass, int passlen, int options, char *pempass)
usr.bin/openssl/pkcs12.c
87
static int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass,
usr.bin/openssl/pkcs12.c
871
pass, passlen,
usr.bin/openssl/pkcs12.c
879
dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bag, char *pass, int passlen,
usr.bin/openssl/pkcs12.c
926
if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL)
usr.bin/openssl/pkcs12.c
965
pass, passlen, options, pempass);
usr.bin/openssl/pkcs8.c
202
char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
usr.bin/openssl/pkcs8.c
273
p8pass = pass;
usr.bin/openssl/pkcs8.c
274
if (EVP_read_pw_string(pass, sizeof pass,
usr.bin/openssl/pkcs8.c
327
p8pass = pass;
usr.bin/openssl/pkcs8.c
328
EVP_read_pw_string(pass, sizeof pass,
usr.bin/openssl/s_client.c
1644
free(pass);
usr.bin/openssl/s_client.c
873
char *pass = NULL;
usr.bin/openssl/s_client.c
936
if (!app_passwd(bio_err, cfg.passarg, NULL, &pass, NULL)) {
usr.bin/openssl/s_client.c
947
cfg.key_format, 0, pass,
usr.bin/openssl/s_server.c
1015
char *pass = NULL;
usr.bin/openssl/s_server.c
1059
cfg.dpassarg, &pass, &dpass)) {
usr.bin/openssl/s_server.c
1070
cfg.key_format, 0, pass,
usr.bin/openssl/s_server.c
1086
cfg.key_format, 0, pass,
usr.bin/openssl/s_server.c
1422
free(pass);
usr.bin/signify/signify.c
257
char pass[1024];
usr.bin/signify/signify.c
268
if (!readpassphrase("passphrase: ", pass, sizeof(pass), rppflags))
usr.bin/signify/signify.c
270
if (strlen(pass) == 0)
usr.bin/signify/signify.c
277
if (!errstr && strcmp(pass, pass2) != 0)
usr.bin/signify/signify.c
281
if (!errstr && bcrypt_pbkdf(pass, strlen(pass), salt, saltlen, key,
usr.bin/signify/signify.c
284
explicit_bzero(pass, sizeof(pass));
usr.bin/skey/skey.c
121
if (!pass && (readpassphrase("Enter secret passphrase: ", passwd,
usr.bin/skey/skey.c
41
int n, i, cnt = 1, pass = 0, hexmode = 0;
usr.bin/skey/skey.c
74
pass = 1;
usr.bin/ssh/readpass.c
104
pass = xstrdup(buf);
usr.bin/ssh/readpass.c
106
return pass;
usr.bin/ssh/readpass.c
51
char *pass;
usr.bin/ssh/ssh-add.c
100
freezero(pass, strlen(pass));
usr.bin/ssh/ssh-add.c
101
pass = NULL;
usr.bin/ssh/ssh-add.c
315
if (private == NULL && pass != NULL) {
usr.bin/ssh/ssh-add.c
316
if ((r = sshkey_parse_private_fileblob(keyblob, pass, &private,
usr.bin/ssh/ssh-add.c
329
pass = read_passphrase(msg, RP_ALLOW_STDIN);
usr.bin/ssh/ssh-add.c
330
if (strcmp(pass, "") == 0)
usr.bin/ssh/ssh-add.c
332
if ((r = sshkey_parse_private_fileblob(keyblob, pass,
usr.bin/ssh/ssh-add.c
601
pass = read_passphrase("Enter PIN for authenticator: ", RP_ALLOW_STDIN);
usr.bin/ssh/ssh-add.c
602
if ((r = sshsk_load_resident(skprovider, NULL, pass, 0,
usr.bin/ssh/ssh-add.c
95
static char *pass = NULL;
usr.bin/ssh/ssh-add.c
99
if (pass) {
usr.bin/ssh/ssh-keygen.c
285
char *prompt, *pass;
usr.bin/ssh/ssh-keygen.c
296
pass = xstrdup(identity_passphrase);
usr.bin/ssh/ssh-keygen.c
299
pass = read_passphrase(prompt, RP_ALLOW_STDIN);
usr.bin/ssh/ssh-keygen.c
302
r = sshkey_load_private(filename, pass, &prv, commentp);
usr.bin/ssh/ssh-keygen.c
303
freezero(pass, strlen(pass));
usr.bin/ssh/ssh-keygen.c
3094
char *fp, *pin = NULL, *pass = NULL, *path, *pubpath;
usr.bin/ssh/ssh-keygen.c
3143
if (pass == NULL)
usr.bin/ssh/ssh-keygen.c
3144
pass = private_key_passphrase(path);
usr.bin/ssh/ssh-keygen.c
3145
if ((r = sshkey_save_private(key, path, pass,
usr.bin/ssh/ssh-keygen.c
3173
if (pass != NULL)
usr.bin/ssh/ssh-keygen.c
3174
freezero(pass, strlen(pass));
usr.bin/tic/dump_entry.c
532
int pass;
usr.bin/tic/dump_entry.c
534
for (pass = 0; pass < 2; ++pass) {
usr.bin/tic/dump_entry.c
537
if (pass) {
usr.bin/tic/dump_entry.c
544
if (pass) {
usr.bin/tic/dump_entry.c
551
if (pass) {
usr.bin/tic/tic.c
497
unsigned pass, n, nn;
usr.bin/tic/tic.c
505
for (pass = 1; pass <= 2; pass++) {
usr.bin/tic/tic.c
516
if (pass == 1) {
usr.bin/tic/tic.c
524
for (pass = 1; pass <= 2; pass++) {
usr.bin/tic/tic.c
528
if (pass == 1) {
usr.bin/tic/tic.c
540
if (pass == 1) {
usr.sbin/httpd/server_http.c
134
char *line = NULL, *user = NULL, *pass = NULL;
usr.sbin/httpd/server_http.c
166
pass = strchr(line, ':');
usr.sbin/httpd/server_http.c
168
if (pass == NULL) {
usr.sbin/httpd/server_http.c
173
*pass++ = '\0';
usr.sbin/httpd/server_http.c
180
if (crypt_checkpass(clt_pass, pass) == 0) {
usr.sbin/ikectl/ikeca.c
1102
ca_setup(char *caname, int create, int quiet, char *pass)
usr.sbin/ikectl/ikeca.c
1140
ca_newpass(path, pass);
usr.sbin/ikectl/ikeca.c
425
char *pass;
usr.sbin/ikectl/ikeca.c
429
pass = password;
usr.sbin/ikectl/ikeca.c
433
pass = getpass("CA passphrase:");
usr.sbin/ikectl/ikeca.c
434
if (pass == NULL || *pass == '\0')
usr.sbin/ikectl/ikeca.c
437
strlcpy(prev, pass, sizeof(prev));
usr.sbin/ikectl/ikeca.c
438
pass = getpass("Retype CA passphrase:");
usr.sbin/ikectl/ikeca.c
439
if (pass == NULL || strcmp(prev, pass) != 0)
usr.sbin/ikectl/ikeca.c
447
fprintf(f, "%s\n%s\n", pass, pass);
usr.sbin/ikectl/ikeca.c
717
char *pass;
usr.sbin/ikectl/ikeca.c
746
pass = password;
usr.sbin/ikectl/ikeca.c
748
pass = getpass("Export passphrase:");
usr.sbin/ikectl/ikeca.c
749
if (pass == NULL || *pass == '\0')
usr.sbin/ikectl/ikeca.c
752
strlcpy(prev, pass, sizeof(prev));
usr.sbin/ikectl/ikeca.c
753
pass = getpass("Retype export passphrase:");
usr.sbin/ikectl/ikeca.c
754
if (pass == NULL || strcmp(prev, pass) != 0)
usr.sbin/ikectl/ikeca.c
774
len = snprintf(passenv, sizeof(passenv), "EXPASS=%s", pass);
usr.sbin/ikectl/ikectl.c
115
ca_export(ca, NULL, res->peer, res->pass);
usr.sbin/ikectl/ikectl.c
130
ca_export(ca, res->host, res->peer, res->pass);
usr.sbin/ikectl/ikectl.c
90
res->quiet, res->pass);
usr.sbin/ikectl/parser.c
353
res.pass = strdup(word);
usr.sbin/ikectl/parser.h
69
char *pass;
usr.sbin/npppd/npppd/pap.c
390
u_char ra[16], digest[16], pass[128];
usr.sbin/npppd/npppd/pap.c
427
memset(pass, 0, sizeof(pass)); /* null padding */
usr.sbin/npppd/npppd/pap.c
428
passlen = MINIMUM(strlen(password), sizeof(pass));
usr.sbin/npppd/npppd/pap.c
429
memcpy(pass, password, passlen);
usr.sbin/npppd/npppd/pap.c
441
pass[i] ^= digest[i];
usr.sbin/npppd/npppd/pap.c
446
MD5Update(&md5ctx, &pass[i - 16], 16);
usr.sbin/npppd/npppd/pap.c
450
pass[i] ^= digest[j];
usr.sbin/npppd/npppd/pap.c
453
if (radius_put_raw_attr(radpkt, RADIUS_TYPE_USER_PASSWORD, pass,
usr.sbin/pppd/pppd.h
314
int set_filters(struct bpf_program *pass, struct bpf_program *active);
usr.sbin/pppd/sys-bsd.c
844
set_filters(struct bpf_program *pass, struct bpf_program *active)
usr.sbin/pppd/sys-bsd.c
848
if (pass->bf_len > 0) {
usr.sbin/pppd/sys-bsd.c
849
if (ioctl(ppp_fd, PPPIOCSPASS, pass) == -1) {
usr.sbin/radiusctl/radiusctl.c
330
u_char pass[256], chal[16];
usr.sbin/radiusctl/radiusctl.c
344
if (lpass * 2 >= sizeof(pass))
usr.sbin/radiusctl/radiusctl.c
347
pass[i * 2] = res->password[i];
usr.sbin/radiusctl/radiusctl.c
348
pass[i * 2 + 1] = 0;
usr.sbin/radiusctl/radiusctl.c
359
(char *)res->username, strlen(res->username), pass,
usr.sbin/radiusctl/radiusctl.c
366
explicit_bzero(pass, sizeof(pass));
usr.sbin/radiusd/radiusd.c
1740
if (radius_get_user_password_attr(q->req, userpass.pass,
usr.sbin/radiusd/radiusd.c
1741
sizeof(userpass.pass), radius_query_client_secret(q)) == 0)
usr.sbin/radiusd/radiusd.c
1763
char pass[256];
usr.sbin/radiusd/radiusd.c
1772
if (radius_get_user_password_attr(radpkt, pass, sizeof(pass),
usr.sbin/radiusd/radiusd.c
1776
pass, strlen(pass));
usr.sbin/radiusd/radiusd.h
83
char pass[256];
usr.sbin/radiusd/radiusd_bsdauth.c
134
char *user, *pass;
usr.sbin/radiusd/radiusd_bsdauth.c
157
pass = user + args->userlen;
usr.sbin/radiusd/radiusd_bsdauth.c
158
pass[args->passlen - 1] = '\0';
usr.sbin/radiusd/radiusd_bsdauth.c
160
if (auth_userokay(user, NULL, NULL, pass))
usr.sbin/radiusd/radiusd_bsdauth.c
162
explicit_bzero(pass, args->passlen);
usr.sbin/radiusd/radiusd_bsdauth.c
331
const char *pass)
usr.sbin/radiusd/radiusd_bsdauth.c
346
if (pass == NULL)
usr.sbin/radiusd/radiusd_bsdauth.c
347
pass = "";
usr.sbin/radiusd/radiusd_bsdauth.c
350
usercheck.passlen = strlen(pass) + 1;
usr.sbin/radiusd/radiusd_bsdauth.c
355
iov[2].iov_base = (char *)pass;
usr.sbin/radiusd/radiusd_file.c
406
char pass[256];
usr.sbin/radiusd/radiusd_file.c
409
if (radius_get_string_attr(radpkt, RADIUS_TYPE_USER_PASSWORD, pass,
usr.sbin/radiusd/radiusd_file.c
410
sizeof(pass)) != 0) {
usr.sbin/radiusd/radiusd_file.c
414
ret = strcmp(ent->password, pass);
usr.sbin/radiusd/radiusd_file.c
478
char *pass = NULL;
usr.sbin/radiusd/radiusd_file.c
516
if ((pass = calloc(1, lpass * 2)) == NULL) {
usr.sbin/radiusd/radiusd_file.c
521
pass[i * 2] = ent->password[i];
usr.sbin/radiusd/radiusd_file.c
522
pass[i * 2 + 1] = '\0';
usr.sbin/radiusd/radiusd_file.c
527
username, strlen(username), pass, lpass * 2, ntresponse);
usr.sbin/radiusd/radiusd_file.c
551
mschap_auth_response(pass, lpass * 2, ntresponse, chall,
usr.sbin/radiusd/radiusd_file.c
560
mschap_ntpassword_hash(pass, lpass * 2, pwhash);
usr.sbin/radiusd/radiusd_file.c
589
if (pass != NULL)
usr.sbin/radiusd/radiusd_file.c
590
explicit_bzero(pass, lpass * 2);
usr.sbin/radiusd/radiusd_file.c
591
free(pass);
usr.sbin/radiusd/radiusd_module.c
466
(userpass->has_pass)? userpass->pass : NULL);
usr.sbin/radiusd/radiusd_module.h
35
const char *pass);
usr.sbin/relayd/ssl.c
50
ssl_load_key(struct relayd *env, const char *name, off_t *len, char *pass)
usr.sbin/relayd/ssl.c
64
key = PEM_read_PrivateKey(fp, NULL, ssl_password_cb, pass);
usr.sbin/smtpd/smtp_session.c
1918
char buf[1024], *user, *pass;
usr.sbin/smtpd/smtp_session.c
1952
pass = memchr(user, '\0', len - (user - buf));
usr.sbin/smtpd/smtp_session.c
1953
if (pass == NULL || pass >= buf + len - 1)
usr.sbin/smtpd/smtp_session.c
1955
pass++; /* skip NUL */
usr.sbin/smtpd/smtp_session.c
1956
if (pass[strcspn(pass, "\r\n")] != '\0')
usr.sbin/smtpd/smtp_session.c
1963
m_add_string(p_lka, pass);
usr.sbin/smtpd/smtpd.c
2135
char pass[LINE_MAX];
usr.sbin/smtpd/smtpd.c
2139
(void)strlcpy(pass, password, sizeof(pass));
usr.sbin/smtpd/smtpd.c
2141
ret = auth_userokay(user, NULL, "auth-smtp", pass);
usr.sbin/smtpd/ssl.c
101
len = strlen(pass);
usr.sbin/smtpd/ssl.c
102
if (strlcpy(buf, pass, size) >= (size_t)size)
usr.sbin/smtpd/ssl.c
107
explicit_bzero(pass, len);
usr.sbin/smtpd/ssl.c
112
ssl_load_key(const char *name, off_t *len, char *pass, mode_t perm, const char *pkiname)
usr.sbin/smtpd/ssl.c
196
char pass[1024];
usr.sbin/smtpd/ssl.c
198
p->pki_key = ssl_load_key(pathname, &p->pki_key_len, pass, 0740, pkiname);
usr.sbin/smtpd/ssl.c
96
char *pass;
usr.sbin/smtpd/ssl.c
98
pass = getpass((const char *)u);
usr.sbin/smtpd/ssl.c
99
if (pass == NULL)
usr.sbin/spamdb/spamdb.c
114
gd.pass = now;
usr.sbin/spamdb/spamdb.c
155
gd.pass = now;
usr.sbin/spamdb/spamdb.c
216
(long long)gd.first, (long long)gd.pass,
usr.sbin/spamdb/spamdb.c
243
(long long)gd.pass, (long long)gd.expire,
usr.sbin/spamdb/spamdb.c
251
(long long)gd.pass, (long long)gd.expire,
usr.sbin/zic/zic.c
1336
int pass;
usr.sbin/zic/zic.c
1428
for (pass = 1; pass <= 2; ++pass) {
usr.sbin/zic/zic.c
1439
if (pass == 1) {
usr.sbin/zic/zic.c
1563
if (pass == 1)
usr.sbin/zic/zic.c
1602
if (pass == 1)