/freebsd-10.0-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_md5.c | 106 if (sm->user == NULL || sm->user->password == NULL || 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 122 if (chap_md5(id, sm->user->password, sm->user->password_len,
|
H A D | eap.h | 29 u8 *password; member in struct:eap_user 31 int password_hash; /* whether password is hashed with
|
H A D | eap_server_mschapv2.c | 374 sm->user->password, 380 sm->user->password, 400 pw_hash = sm->user->password; 402 if (nt_password_hash(sm->user->password, 488 if (sm->user == NULL || sm->user->password == NULL) {
|
/freebsd-10.0-release/crypto/heimdal/appl/test/ |
H A D | common.c | 46 char *password = NULL; variable 53 { "password", 'P', arg_string, &password, "password to use", "password" },
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | test_crypto.c | 93 const char *password, 114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | string-to-key-test.c | 40 const char *password; member in struct:testcase 51 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES_CBC_MD5, 81 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES3_CBC_SHA1, 117 ret = krb5_string_to_key (context, t->enctype, t->password, 126 t->principal_name, t->password);
|
H A D | init_creds.c | 296 const char *password, 303 opt->opt_private->password = password; 294 krb5_get_init_creds_opt_set_pa_password(krb5_context context, krb5_get_init_creds_opt *opt, const char *password, krb5_s2k_proc key_proc) argument
|
H A D | aes-test.c | 55 char *password; member in struct:__anon4829 65 "password", "ATHENA.MIT.EDUraeburn", -1, 72 "password", "ATHENA.MIT.EDUraeburn", -1, 81 "password", "ATHENA.MIT.EDUraeburn", -1, 88 "password", "ATHENA.MIT.EDUraeburn", -1, 97 "password", "ATHENA.MIT.EDUraeburn", -1, 104 "password", "ATHENA.MIT.EDUraeburn", -1, 113 "password", "\x12\x34\x56\x78\x78\x56\x34\x12", 8, 120 "password", "\x12\x34\x56\x78\x78\x56\x34\x12", 8, 200 krb5_data password, opaqu local [all...] |
/freebsd-10.0-release/sys/boot/ia64/common/ |
H A D | Makefile | 37 FILES+= beastie.4th brand.4th check-password.4th color.4th delay.4th
|
/freebsd-10.0-release/usr.sbin/pw/ |
H A D | pw.h | 76 int default_password; /* Default password for new users? */ 94 int password_days; /* Days to password expiry */ 121 char *pw_pwcrypt(char *password);
|
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_subr/ |
H A D | gpg_agent.c | 26 /* This auth provider stores a plaintext password in memory managed by 27 * a running gpg-agent. In contrast to other password store providers 28 * it does not save the password to disk. 34 * The gpg-agent will let the password time out after a while, 36 * When the password has timed out it will automatically prompt the 37 * user for the password again. This is transparent to Subversion. 44 * the Subversion password if the program knows the "cache ID" Subversion 45 * uses for the password. 50 * permission if another program attempts to access the password. 52 * Therefore, while the gpg-agent is running and has the password cache 271 password_get_gpg_agent(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 410 password_set_gpg_agent(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument [all...] |
/freebsd-10.0-release/crypto/heimdal/kadmin/ |
H A D | init.c | 52 const char *password; local 56 password = pwbuf; 78 /* Create the entry with a random password */ 79 ret = kadm5_create_principal(kadm_handle, &ent, mask, password); 190 * The Windows XP (at least) password changing protocol
|
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/ |
H A D | set_keys.c | 39 * Set the keys of `ent' to the string-to-key of `password' 45 const char *password) 53 password, &keys, &num_keys); 64 "kadmin", "save-password", NULL)) 67 ent, password); 43 _kadm5_set_keys(kadm5_server_context *context, hdb_entry *ent, const char *password) argument
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth-krb5.c | 72 auth_krb5_password(Authctxt *authctxt, const char *password) argument 117 ccache, password, 1, NULL); 143 authctxt->krb5_user, (char *)password, NULL, NULL, 0, NULL, NULL); 204 debug("Kerberos password authentication failed: %s", 208 debug("Kerberos password authentication failed: %d",
|
/freebsd-10.0-release/crypto/openssh/contrib/cygwin/ |
H A D | ssh-host-config | 422 local password 461 password="${csih_PRIVILEGED_PASSWORD}" 462 if [ -z "${password}" ] 464 csih_get_value "Please enter the password for user '${run_service_as}':" "-s" 465 password="${csih_value}" 470 # $password is empty, or $run_service_as is some privileged user and 471 # (hopefully) $password contains the correct password. So, from here 472 # out, we use '-z "${password}"' to discriminate the two cases. 480 if [ -z "${password}" ] [all...] |
/freebsd-10.0-release/contrib/serf/auth/ |
H A D | auth_digest.c | 101 const char *password, 110 MD5 hash of the combined user name, authentication realm and password */ 114 password); 236 char *username, *password; local 239 username & password. */ 305 &username, &password, 333 digest_info->ha1 = build_digest_ha1(username, password, digest_info->realm, 100 build_digest_ha1(const char *username, const char *password, const char *realm_name, apr_pool_t *pool) argument
|
/freebsd-10.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_sake.c | 71 const u8 *identity, *password; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 99 password + EAP_SAKE_ROOT_SECRET_LEN,
|
H A D | eap_ikev2.c | 61 const u8 *identity, *password; local 87 password = eap_get_config_password(sm, &password_len); 88 if (password) { 92 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
H A D | eap_psk.c | 35 const u8 *identity, *password; local 38 password = eap_get_config_password(sm, &password_len); 39 if (!password || password_len != 16) { 48 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
|
H A D | eap_pwd.c | 25 u8 *password; member in struct:eap_pwd_data 82 const u8 *identity, *password; local 85 password = eap_get_config_password(sm, &password_len); 86 if (password == NULL) { 87 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); 118 if ((data->password = os_malloc(password_len)) == NULL) { 125 os_memcpy(data->password, password, password_len); 151 os_free(data->password); 235 data->password, dat [all...] |
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cyrus_auth.c | 288 /* A baton type used by the SASL username and password callbacks. */ 295 password, but we must fetch both of them at the same time. So we cache 299 const char *password; member in struct:cred_baton 315 and BATON->password to the new username and password and return TRUE, 341 baton->password = ((svn_auth_cred_simple_t *)creds)->password; 366 /* The password callback. Implements the sasl_getsecret_t interface. */ 372 if (baton->password || get_credentials(baton)) 375 size_t len = strlen(baton->password); [all...] |
H A D | ra_svn.h | 154 const char *user, const char *password,
|
/freebsd-10.0-release/crypto/heimdal/kuser/ |
H A D | kdigest.c | 228 const char *password) 238 EVP_DigestUpdate(ctx, password, strlen(password)); 273 const char *password) 293 len = strlen(password); 295 EVP_DigestUpdate(hctx, &password[i], 1); 296 EVP_DigestUpdate(hctx, &password[len], 1); 368 errx(1, "password missing"); 226 client_chap(const void *server_nonce, size_t snoncelen, unsigned char server_identifier, const char *password) argument 270 client_mschapv2(const void *server_nonce, size_t snoncelen, const void *client_nonce, size_t cnoncelen, const char *username, const char *password) argument
|
/freebsd-10.0-release/contrib/tnftp/src/ |
H A D | cmds.c | 1484 char *password; local 1494 UPRINTF("usage: %s username [password [account]]\n", 1502 password = getpass("Password: "); 1503 if (password == NULL) 1504 password = emptypass; 1506 password = argv[2]; 1508 n = command("PASS %s", password); 1509 memset(password, 0, strlen(password)); 1514 password [all...] |
/freebsd-10.0-release/crypto/heimdal/appl/gssmask/ |
H A D | gssmaestro.c | 108 const char *password, 115 putstring(client, password); 754 char *password; local 779 password = strchr(user, ':'); 780 if (password == NULL) 781 errx(1, "password missing from %s", user); 782 *password++ = 0; 816 val = acquire_cred(clients[i], user, password, 1, &hCred); 844 val = acquire_cred(c, user, password, 1, &hCred); 901 val = acquire_cred(client, user, password, 106 acquire_cred(struct client *client, const char *username, const char *password, int32_t flags, int32_t *hCred) argument [all...] |