/freebsd-10.0-release/crypto/openssh/contrib/aix/ |
H A D | pam.conf | 15 sshd password required /usr/lib/security/pam_aix 16 OTHER password required /usr/lib/security/pam_aix
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | salt-des3.c | 40 krb5_data password, 51 len = password.length + salt.saltvalue.length; 57 memcpy(str, password.data, password.length); 58 memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length); 105 krb5_data password, 111 size_t len = password.length + salt.saltvalue.length; 119 memcpy(s, password.data, password.length); 120 memcpy(s + password 38 DES3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 103 DES3_string_to_key_derived(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument [all...] |
H A D | salt-aes.c | 41 krb5_data password, 77 ret = PKCS5_PBKDF2_HMAC_SHA1(password.data, password.length, 39 AES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
|
H A D | salt-arcfour.c | 39 krb5_data password, 58 ret = wind_utf8ucs2_length(password.data, &len); 73 ret = wind_utf8ucs2(password.data, s, &len); 37 ARCFOUR_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
|
H A D | salt.c | 136 krb5_data password, 146 ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); 154 const char *password, 159 pw.data = rk_UNCONST(password); 160 pw.length = strlen(password); 167 krb5_data password, 173 return krb5_string_to_key_data_salt_opaque(context, enctype, password, 179 * `password' (with salt `salt' and the enctype specific data string 186 krb5_data password, 201 return (*st->string_to_key)(context, enctype, password, 134 krb5_string_to_key_data(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_principal principal, krb5_keyblock *key) argument 152 krb5_string_to_key(krb5_context context, krb5_enctype enctype, const char *password, krb5_principal principal, krb5_keyblock *key) argument 165 krb5_string_to_key_data_salt(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_keyblock *key) argument 184 krb5_string_to_key_data_salt_opaque(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 216 krb5_string_to_key_salt(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_keyblock *key) argument 229 krb5_string_to_key_salt_opaque(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument [all...] |
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 36 int nt_password_hash(const u8 *password, size_t password_len, 45 const u8 *password, size_t password_len,
|
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 11 # NOTE! This file may contain password information and should probably be made 22 # wpa_cli or wpa_gui, or a password is changed). This is required for 212 # NFC password token for WPS 213 # These parameters can be used to configure a fixed NFC password token for the 216 # that includes the matching NFC password token (e.g., written based on the 251 #ext_password_backend=test:pw1=password|pw2=testing 316 # password: Password for Interworking network selection 393 # password="password" 406 # password [all...] |
/freebsd-10.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 38 password = eap_get_config_password(sm, &password_len); 39 if (password == NULL) { 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | mschapv2.h | 19 const u8 *password, size_t password_len,
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 74 if (identity == NULL || password == NULL) 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 188 const u8 *pos, *password; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 197 if (password == NULL) 231 if (hash_nt_password_hash(password, pw_hash_hash)) { 236 if (nt_password_hash(password, password_le 276 const u8 *password; local 334 const u8 *addr[5], *password; local [all...] |
/freebsd-10.0-release/crypto/heimdal/kdc/ |
H A D | string2key.c | 42 char *password; variable 54 { "password", 'w', arg_string, &password, "Password to use", "password" }, 66 arg_printusage (args, num_args, NULL, "password"); 158 password = argv[0]; 159 if(password == NULL){ 162 password = buf; 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); 175 tokey(context, ETYPE_DES_CBC_MD5, password, sal [all...] |
/freebsd-10.0-release/etc/pam.d/ |
H A D | other | 24 # password 25 password required pam_permit.so
|
H A D | sshd | 24 # password 25 #password sufficient pam_krb5.so no_warn try_first_pass 26 password required pam_unix.so no_warn try_first_pass
|
H A D | system | 23 # password 24 #password sufficient pam_krb5.so no_warn try_first_pass 25 password required pam_unix.so no_warn try_first_pass
|
/freebsd-10.0-release/contrib/subversion/subversion/include/private/ |
H A D | svn_auth_private.h | 40 /* If you add a password type for a provider which stores 52 the user's password. It might be obtained directly from CREDS, or 56 retrieval process. Set *DONE to TRUE if a password was stored 61 const char **password, 73 password was store, to FALSE otherwise. POOL is used for any necessary 80 const char *password, 88 used to obtain the password value. Allocate *CREDENTIALS from 126 the plaintext password from CREDS when USERNAME matches the stored 130 const char **password, 139 the plaintext password i [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/ |
H A D | common_glue.c | 43 const char *password) 45 return __CALL(chpass_principal, (server_handle, princ, password)); 62 const char *password) 64 return __CALL(create_principal, (server_handle, princ, mask, password)); 41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument 59 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument
|
H A D | chpass_s.c | 41 const char *password, 63 &ent, password, cond); 74 ret = _kadm5_set_keys(context, &ent.entry, password); 128 * change the password of `princ' to `password' if it's not already that. 134 const char *password) 136 return change (server_handle, princ, password, 1); 140 * change the password of `princ' to `password' 146 const char *password) 39 change(void *server_handle, krb5_principal princ, const char *password, int cond) argument 132 kadm5_s_chpass_principal_cond(void *server_handle, krb5_principal princ, const char *password) argument 144 kadm5_s_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument [all...] |
/freebsd-10.0-release/usr.sbin/bsdconfig/password/ |
H A D | password | 36 f_include $BSDCFG_SHARE/password/password.subr 38 BSDCFG_LIBE="/usr/libexec/bsdconfig" APP_DIR="040.password" 73 # Prompt the user to input a new password (and change it if they don't cancel)
|
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/mech/ |
H A D | gss_acquire_cred_with_password.c | 38 const gss_buffer_t password, 52 password, 77 password, 36 gss_acquire_cred_with_password(OM_uint32 *minor_status, const gss_name_t desired_name, const gss_buffer_t password, OM_uint32 time_req, const gss_OID_set desired_mechs, gss_cred_usage_t cred_usage, gss_cred_id_t *output_cred_handle, gss_OID_set *actual_mechs, OM_uint32 *time_rec) argument
|
/freebsd-10.0-release/contrib/openpam/modules/pam_unix/ |
H A D | pam_unix.c | 77 char *crypt_password, *password; local 89 /* get password */ 101 (const char **)&password, NULL); 107 password = resp->resp; 123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL || 129 free(password);
|
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_subr/ |
H A D | macos_keychain.c | 68 the password in the OS X KeyChain. */ 74 const char *password, 97 username, (int) strlen(password), 98 password, NULL); 103 (int) strlen(password), 104 password); 117 the password from the OS X KeyChain. */ 120 const char **password, 149 *password = apr_pstrmemdup(pool, data, length); 199 /* Get cached encrypted credentials from the ssl client cert password 69 keychain_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 118 keychain_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument [all...] |
H A D | simple_providers.c | 55 #define AUTHN_PASSWORD_KEY "password" 72 the plaintext password from CREDS. */ 75 const char **password, 93 *password = str->data; 102 the plaintext password in CREDS. */ 108 const char *password, 113 svn_hash_sets(creds, AUTHN_PASSWORD_KEY, svn_string_create(password, pool)); 155 const char *password = svn_hash_gets(parameters, 161 const char *default_password = NULL; /* Default password from cache. */ 187 /* The password typ 71 svn_auth__simple_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 101 svn_auth__simple_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 152 const char *password = svn_hash_gets(parameters, local [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/hdb/ |
H A D | ext.c | 292 if (db->hdb_master_key_set && ext->data.u.password.mkvno) { 295 key = _hdb_find_master_key(ext->data.u.password.mkvno, 301 *ext->data.u.password.mkvno); 306 ext->data.u.password.password.data, 307 ext->data.u.password.password.length, 310 ret = der_copy_octet_string(&ext->data.u.password.password, &pw); 319 krb5_set_error_message(context, EINVAL, "malformed password"); [all...] |
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cram.c | 84 const char *password) 87 apr_size_t len = strlen(password), i; 90 /* Munge the password into a 64-byte secret. */ 93 memcpy(secret, password, len); 95 apr_md5(secret, password, len); 143 const char *challenge, *sep, *password; 171 /* Verify the digest against the password in pwfile. */ 172 svn_config_get(pwdb, &password, SVN_CONFIG_SECTION_USERS, *user, NULL); 173 if (!password) 175 compute_digest(sdigest, challenge, password); 82 compute_digest(unsigned char *digest, const char *challenge, const char *password) argument 142 const char *challenge, *sep, *password; local 182 svn_ra_svn__cram_client(svn_ra_svn_conn_t *conn, apr_pool_t *pool, const char *user, const char *password, const char **message) argument [all...] |