Searched refs:password (Results 101 - 125 of 222) sorted by relevance

123456789

/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Deap_server_md5.c106 if (sm->user == NULL || sm->user->password == NULL ||
108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
122 if (chap_md5(id, sm->user->password, sm->user->password_len,
H A Deap.h29 u8 *password; member in struct:eap_user
31 int password_hash; /* whether password is hashed with
H A Deap_server_mschapv2.c374 sm->user->password,
380 sm->user->password,
400 pw_hash = sm->user->password;
402 if (nt_password_hash(sm->user->password,
488 if (sm->user == NULL || sm->user->password == NULL) {
/freebsd-10.0-release/crypto/heimdal/appl/test/
H A Dcommon.c46 char *password = NULL; variable
53 { "password", 'P', arg_string, &password, "password to use", "password" },
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dtest_crypto.c93 const char *password,
114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dstring-to-key-test.c40 const char *password; member in struct:testcase
51 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES_CBC_MD5,
81 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES3_CBC_SHA1,
117 ret = krb5_string_to_key (context, t->enctype, t->password,
126 t->principal_name, t->password);
H A Dinit_creds.c296 const char *password,
303 opt->opt_private->password = password;
294 krb5_get_init_creds_opt_set_pa_password(krb5_context context, krb5_get_init_creds_opt *opt, const char *password, krb5_s2k_proc key_proc) argument
H A Daes-test.c55 char *password; member in struct:__anon4829
65 "password", "ATHENA.MIT.EDUraeburn", -1,
72 "password", "ATHENA.MIT.EDUraeburn", -1,
81 "password", "ATHENA.MIT.EDUraeburn", -1,
88 "password", "ATHENA.MIT.EDUraeburn", -1,
97 "password", "ATHENA.MIT.EDUraeburn", -1,
104 "password", "ATHENA.MIT.EDUraeburn", -1,
113 "password", "\x12\x34\x56\x78\x78\x56\x34\x12", 8,
120 "password", "\x12\x34\x56\x78\x78\x56\x34\x12", 8,
200 krb5_data password, opaqu local
[all...]
/freebsd-10.0-release/sys/boot/ia64/common/
H A DMakefile37 FILES+= beastie.4th brand.4th check-password.4th color.4th delay.4th
/freebsd-10.0-release/usr.sbin/pw/
H A Dpw.h76 int default_password; /* Default password for new users? */
94 int password_days; /* Days to password expiry */
121 char *pw_pwcrypt(char *password);
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_subr/
H A Dgpg_agent.c26 /* This auth provider stores a plaintext password in memory managed by
27 * a running gpg-agent. In contrast to other password store providers
28 * it does not save the password to disk.
34 * The gpg-agent will let the password time out after a while,
36 * When the password has timed out it will automatically prompt the
37 * user for the password again. This is transparent to Subversion.
44 * the Subversion password if the program knows the "cache ID" Subversion
45 * uses for the password.
50 * permission if another program attempts to access the password.
52 * Therefore, while the gpg-agent is running and has the password cache
271 password_get_gpg_agent(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
410 password_set_gpg_agent(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
[all...]
/freebsd-10.0-release/crypto/heimdal/kadmin/
H A Dinit.c52 const char *password; local
56 password = pwbuf;
78 /* Create the entry with a random password */
79 ret = kadm5_create_principal(kadm_handle, &ent, mask, password);
190 * The Windows XP (at least) password changing protocol
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/
H A Dset_keys.c39 * Set the keys of `ent' to the string-to-key of `password'
45 const char *password)
53 password, &keys, &num_keys);
64 "kadmin", "save-password", NULL))
67 ent, password);
43 _kadm5_set_keys(kadm5_server_context *context, hdb_entry *ent, const char *password) argument
/freebsd-10.0-release/crypto/openssh/
H A Dauth-krb5.c72 auth_krb5_password(Authctxt *authctxt, const char *password) argument
117 ccache, password, 1, NULL);
143 authctxt->krb5_user, (char *)password, NULL, NULL, 0, NULL, NULL);
204 debug("Kerberos password authentication failed: %s",
208 debug("Kerberos password authentication failed: %d",
/freebsd-10.0-release/crypto/openssh/contrib/cygwin/
H A Dssh-host-config422 local password
461 password="${csih_PRIVILEGED_PASSWORD}"
462 if [ -z "${password}" ]
464 csih_get_value "Please enter the password for user '${run_service_as}':" "-s"
465 password="${csih_value}"
470 # $password is empty, or $run_service_as is some privileged user and
471 # (hopefully) $password contains the correct password. So, from here
472 # out, we use '-z "${password}"' to discriminate the two cases.
480 if [ -z "${password}" ]
[all...]
/freebsd-10.0-release/contrib/serf/auth/
H A Dauth_digest.c101 const char *password,
110 MD5 hash of the combined user name, authentication realm and password */
114 password);
236 char *username, *password; local
239 username & password. */
305 &username, &password,
333 digest_info->ha1 = build_digest_ha1(username, password, digest_info->realm,
100 build_digest_ha1(const char *username, const char *password, const char *realm_name, apr_pool_t *pool) argument
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Deap_sake.c71 const u8 *identity, *password; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
99 password + EAP_SAKE_ROOT_SECRET_LEN,
H A Deap_ikev2.c61 const u8 *identity, *password; local
87 password = eap_get_config_password(sm, &password_len);
88 if (password) {
92 os_memcpy(data->ikev2.shared_secret, password, password_len);
H A Deap_psk.c35 const u8 *identity, *password; local
38 password = eap_get_config_password(sm, &password_len);
39 if (!password || password_len != 16) {
48 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
H A Deap_pwd.c25 u8 *password; member in struct:eap_pwd_data
82 const u8 *identity, *password; local
85 password = eap_get_config_password(sm, &password_len);
86 if (password == NULL) {
87 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!");
118 if ((data->password = os_malloc(password_len)) == NULL) {
125 os_memcpy(data->password, password, password_len);
151 os_free(data->password);
235 data->password, dat
[all...]
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_svn/
H A Dcyrus_auth.c288 /* A baton type used by the SASL username and password callbacks. */
295 password, but we must fetch both of them at the same time. So we cache
299 const char *password; member in struct:cred_baton
315 and BATON->password to the new username and password and return TRUE,
341 baton->password = ((svn_auth_cred_simple_t *)creds)->password;
366 /* The password callback. Implements the sasl_getsecret_t interface. */
372 if (baton->password || get_credentials(baton))
375 size_t len = strlen(baton->password);
[all...]
H A Dra_svn.h154 const char *user, const char *password,
/freebsd-10.0-release/crypto/heimdal/kuser/
H A Dkdigest.c228 const char *password)
238 EVP_DigestUpdate(ctx, password, strlen(password));
273 const char *password)
293 len = strlen(password);
295 EVP_DigestUpdate(hctx, &password[i], 1);
296 EVP_DigestUpdate(hctx, &password[len], 1);
368 errx(1, "password missing");
226 client_chap(const void *server_nonce, size_t snoncelen, unsigned char server_identifier, const char *password) argument
270 client_mschapv2(const void *server_nonce, size_t snoncelen, const void *client_nonce, size_t cnoncelen, const char *username, const char *password) argument
/freebsd-10.0-release/contrib/tnftp/src/
H A Dcmds.c1484 char *password; local
1494 UPRINTF("usage: %s username [password [account]]\n",
1502 password = getpass("Password: ");
1503 if (password == NULL)
1504 password = emptypass;
1506 password = argv[2];
1508 n = command("PASS %s", password);
1509 memset(password, 0, strlen(password));
1514 password
[all...]
/freebsd-10.0-release/crypto/heimdal/appl/gssmask/
H A Dgssmaestro.c108 const char *password,
115 putstring(client, password);
754 char *password; local
779 password = strchr(user, ':');
780 if (password == NULL)
781 errx(1, "password missing from %s", user);
782 *password++ = 0;
816 val = acquire_cred(clients[i], user, password, 1, &hCred);
844 val = acquire_cred(c, user, password, 1, &hCred);
901 val = acquire_cred(client, user, password,
106 acquire_cred(struct client *client, const char *username, const char *password, int32_t flags, int32_t *hCred) argument
[all...]

Completed in 158 milliseconds

123456789