Searched refs:password (Results 26 - 50 of 222) sorted by relevance

123456789

/freebsd-10.0-release/crypto/openssh/contrib/aix/
H A Dpam.conf15 sshd password required /usr/lib/security/pam_aix
16 OTHER password required /usr/lib/security/pam_aix
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dsalt-des3.c40 krb5_data password,
51 len = password.length + salt.saltvalue.length;
57 memcpy(str, password.data, password.length);
58 memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length);
105 krb5_data password,
111 size_t len = password.length + salt.saltvalue.length;
119 memcpy(s, password.data, password.length);
120 memcpy(s + password
38 DES3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
103 DES3_string_to_key_derived(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
[all...]
H A Dsalt-aes.c41 krb5_data password,
77 ret = PKCS5_PBKDF2_HMAC_SHA1(password.data, password.length,
39 AES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
H A Dsalt-arcfour.c39 krb5_data password,
58 ret = wind_utf8ucs2_length(password.data, &len);
73 ret = wind_utf8ucs2(password.data, s, &len);
37 ARCFOUR_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
H A Dsalt.c136 krb5_data password,
146 ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key);
154 const char *password,
159 pw.data = rk_UNCONST(password);
160 pw.length = strlen(password);
167 krb5_data password,
173 return krb5_string_to_key_data_salt_opaque(context, enctype, password,
179 * `password' (with salt `salt' and the enctype specific data string
186 krb5_data password,
201 return (*st->string_to_key)(context, enctype, password,
134 krb5_string_to_key_data(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_principal principal, krb5_keyblock *key) argument
152 krb5_string_to_key(krb5_context context, krb5_enctype enctype, const char *password, krb5_principal principal, krb5_keyblock *key) argument
165 krb5_string_to_key_data_salt(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_keyblock *key) argument
184 krb5_string_to_key_data_salt_opaque(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
216 krb5_string_to_key_salt(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_keyblock *key) argument
229 krb5_string_to_key_salt_opaque(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
[all...]
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
31 int nt_challenge_response(const u8 *challenge, const u8 *password,
36 int nt_password_hash(const u8 *password, size_t password_len,
45 const u8 *password, size_t password_len,
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf11 # NOTE! This file may contain password information and should probably be made
22 # wpa_cli or wpa_gui, or a password is changed). This is required for
212 # NFC password token for WPS
213 # These parameters can be used to configure a fixed NFC password token for the
216 # that includes the matching NFC password token (e.g., written based on the
251 #ext_password_backend=test:pw1=password|pw2=testing
316 # password: Password for Interworking network selection
393 # password="password"
406 # password
[all...]
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
38 password = eap_get_config_password(sm, &password_len);
39 if (password == NULL) {
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
H A Dmschapv2.h19 const u8 *password, size_t password_len,
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
74 if (identity == NULL || password == NULL)
119 challenge_response(challenge, password, rpos);
121 nt_challenge_response(challenge, password, password_len, rpos);
188 const u8 *pos, *password; local
196 password = eap_get_config_password2(sm, &password_len, &pwhash);
197 if (password == NULL)
231 if (hash_nt_password_hash(password, pw_hash_hash)) {
236 if (nt_password_hash(password, password_le
276 const u8 *password; local
334 const u8 *addr[5], *password; local
[all...]
/freebsd-10.0-release/crypto/heimdal/kdc/
H A Dstring2key.c42 char *password; variable
54 { "password", 'w', arg_string, &password, "Password to use", "password" },
66 arg_printusage (args, num_args, NULL, "password");
158 password = argv[0];
159 if(password == NULL){
162 password = buf;
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
175 tokey(context, ETYPE_DES_CBC_MD5, password, sal
[all...]
/freebsd-10.0-release/etc/pam.d/
H A Dother24 # password
25 password required pam_permit.so
H A Dsshd24 # password
25 #password sufficient pam_krb5.so no_warn try_first_pass
26 password required pam_unix.so no_warn try_first_pass
H A Dsystem23 # password
24 #password sufficient pam_krb5.so no_warn try_first_pass
25 password required pam_unix.so no_warn try_first_pass
/freebsd-10.0-release/contrib/subversion/subversion/include/private/
H A Dsvn_auth_private.h40 /* If you add a password type for a provider which stores
52 the user's password. It might be obtained directly from CREDS, or
56 retrieval process. Set *DONE to TRUE if a password was stored
61 const char **password,
73 password was store, to FALSE otherwise. POOL is used for any necessary
80 const char *password,
88 used to obtain the password value. Allocate *CREDENTIALS from
126 the plaintext password from CREDS when USERNAME matches the stored
130 const char **password,
139 the plaintext password i
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/
H A Dcommon_glue.c43 const char *password)
45 return __CALL(chpass_principal, (server_handle, princ, password));
62 const char *password)
64 return __CALL(create_principal, (server_handle, princ, mask, password));
41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
59 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument
H A Dchpass_s.c41 const char *password,
63 &ent, password, cond);
74 ret = _kadm5_set_keys(context, &ent.entry, password);
128 * change the password of `princ' to `password' if it's not already that.
134 const char *password)
136 return change (server_handle, princ, password, 1);
140 * change the password of `princ' to `password'
146 const char *password)
39 change(void *server_handle, krb5_principal princ, const char *password, int cond) argument
132 kadm5_s_chpass_principal_cond(void *server_handle, krb5_principal princ, const char *password) argument
144 kadm5_s_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
[all...]
/freebsd-10.0-release/usr.sbin/bsdconfig/password/
H A Dpassword36 f_include $BSDCFG_SHARE/password/password.subr
38 BSDCFG_LIBE="/usr/libexec/bsdconfig" APP_DIR="040.password"
73 # Prompt the user to input a new password (and change it if they don't cancel)
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/mech/
H A Dgss_acquire_cred_with_password.c38 const gss_buffer_t password,
52 password,
77 password,
36 gss_acquire_cred_with_password(OM_uint32 *minor_status, const gss_name_t desired_name, const gss_buffer_t password, OM_uint32 time_req, const gss_OID_set desired_mechs, gss_cred_usage_t cred_usage, gss_cred_id_t *output_cred_handle, gss_OID_set *actual_mechs, OM_uint32 *time_rec) argument
/freebsd-10.0-release/contrib/openpam/modules/pam_unix/
H A Dpam_unix.c77 char *crypt_password, *password; local
89 /* get password */
101 (const char **)&password, NULL);
107 password = resp->resp;
123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL ||
129 free(password);
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_subr/
H A Dmacos_keychain.c68 the password in the OS X KeyChain. */
74 const char *password,
97 username, (int) strlen(password),
98 password, NULL);
103 (int) strlen(password),
104 password);
117 the password from the OS X KeyChain. */
120 const char **password,
149 *password = apr_pstrmemdup(pool, data, length);
199 /* Get cached encrypted credentials from the ssl client cert password
69 keychain_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
118 keychain_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
[all...]
H A Dsimple_providers.c55 #define AUTHN_PASSWORD_KEY "password"
72 the plaintext password from CREDS. */
75 const char **password,
93 *password = str->data;
102 the plaintext password in CREDS. */
108 const char *password,
113 svn_hash_sets(creds, AUTHN_PASSWORD_KEY, svn_string_create(password, pool));
155 const char *password = svn_hash_gets(parameters,
161 const char *default_password = NULL; /* Default password from cache. */
187 /* The password typ
71 svn_auth__simple_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
101 svn_auth__simple_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
152 const char *password = svn_hash_gets(parameters, local
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/hdb/
H A Dext.c292 if (db->hdb_master_key_set && ext->data.u.password.mkvno) {
295 key = _hdb_find_master_key(ext->data.u.password.mkvno,
301 *ext->data.u.password.mkvno);
306 ext->data.u.password.password.data,
307 ext->data.u.password.password.length,
310 ret = der_copy_octet_string(&ext->data.u.password.password, &pw);
319 krb5_set_error_message(context, EINVAL, "malformed password");
[all...]
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_svn/
H A Dcram.c84 const char *password)
87 apr_size_t len = strlen(password), i;
90 /* Munge the password into a 64-byte secret. */
93 memcpy(secret, password, len);
95 apr_md5(secret, password, len);
143 const char *challenge, *sep, *password;
171 /* Verify the digest against the password in pwfile. */
172 svn_config_get(pwdb, &password, SVN_CONFIG_SECTION_USERS, *user, NULL);
173 if (!password)
175 compute_digest(sdigest, challenge, password);
82 compute_digest(unsigned char *digest, const char *challenge, const char *password) argument
142 const char *challenge, *sep, *password; local
182 svn_ra_svn__cram_client(svn_ra_svn_conn_t *conn, apr_pool_t *pool, const char *user, const char *password, const char **message) argument
[all...]

Completed in 172 milliseconds

123456789