/freebsd-13-stable/contrib/wpa/wpa_supplicant/ |
H A D | config.h | 110 * password - Password for Interworking network selection 112 char *password; member in struct:wpa_cred 115 * ext_password - Whether password is a name for external storage 1024 * wps_nfc_dev_pw_id - NFC Device Password ID for password token 1029 * wps_nfc_dh_pubkey - NFC DH Public Key for password token 1034 * wps_nfc_dh_privkey - NFC DH Private Key for password token 1039 * wps_nfc_dev_pw - NFC Device Password for password token 1044 * ext_password_backend - External password backend or %NULL if none 1629 * new network is added or a password is changed.
|
/freebsd-13-stable/contrib/apr/include/ |
H A D | apr_thread_proc.h | 566 * @param password User password if needed. Password is needed on WIN32 572 const char *password);
|
/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | krb5_locl.h | 232 const char *password; member in struct:_krb5_get_init_creds_opt_private
|
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | ts.c | 133 " [-queryfile file] [-passin password]", 157 char *password = NULL; local 277 !app_passwd(passin, NULL, &password, NULL)) { 278 BIO_printf(bio_err, "Error getting password.\n"); 305 password, inkey, md, signer, chain, policy, 321 OPENSSL_free(password);
|
H A D | storeutl.c | 299 pw_cb_data.password = passin;
|
/freebsd-13-stable/usr.sbin/etcupdate/tests/ |
H A D | preworld_test.sh | 116 john:<password>:1001:1001::0:0:John Baldwin:/home/john:/bin/tcsh
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 2772 const char *password, 2785 passwordlen = password ? strlen(password) : 0; 2803 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen, 2809 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen, 2940 const char *password; local 2943 password = pw->val[i]; 2945 password = ""; 2947 password = NULL; 2949 ret = (*s2k)(context, password, a 2771 PBE_string2key(hx509_context context, const char *password, const heim_octet_string *parameters, hx509_crypto *crypto, heim_octet_string *key, heim_octet_string *iv, const heim_oid *enc_oid, const EVP_MD *md) argument [all...] |
/freebsd-13-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_teap.c | 1120 u8 *pos, *end, *username, *password, *new_id; local 1158 password = pos; 1162 password, passlen); 1179 if (!sm->user || !sm->user->password || sm->user->password_hash) { 1181 "EAP-TEAP: No plaintext user password configured"); 1187 os_memcmp_const(sm->user->password, password, passlen) != 0) { 1188 wpa_printf(MSG_DEBUG, "EAP-TEAP: Invalid password"); 1193 wpa_printf(MSG_DEBUG, "EAP-TEAP: Correct password");
|
H A D | eap_server_ikev2.c | 44 sm->user->password == NULL) { 50 return sm->user->password;
|
H A D | eap_server_eke.c | 247 if (sm->user == NULL || sm->user->password == NULL) { 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 272 * temp = prf(0+, password) 498 if (sm->user->password == NULL || sm->user->password_len == 0) { 499 wpa_printf(MSG_INFO, "EAP-EKE: No password configured for peer");
|
/freebsd-13-stable/contrib/serf/buckets/ |
H A D | ssl_buckets.c | 1281 const char *password; local 1285 password = ctx->cert_pw_success; 1290 &password); 1293 if (!status && password) { 1294 i = PKCS12_parse(p12, password, pkey, cert, NULL); 1314 password);
|
/freebsd-13-stable/contrib/subversion/subversion/svnsync/ |
H A D | svnsync.c | 208 {"password", svnsync_opt_auth_password, 1, 209 N_("specify a password ARG (deprecated;\n" 211 "see --source-password and --sync-password)") }, 246 {"source-password", svnsync_opt_source_password, 1, 247 N_("connect to source repository with password ARG") }, 250 {"sync-password", svnsync_opt_sync_password, 1, 251 N_("connect to sync repository with password ARG") }, 1984 const char *password = NULL, *source_password = NULL, *sync_password = NULL; 2075 opt_err = svn_utf_cstring_to_utf8(&password, opt_ar 1977 const char *password = NULL, *source_password = NULL, *sync_password = NULL; local [all...] |
/freebsd-13-stable/contrib/subversion/subversion/libsvn_ra_serf/ |
H A D | ra_serf.h | 373 const char **password); 1524 svn_ra_serf__credentials_callback(char **username, char **password,
|
/freebsd-13-stable/contrib/wpa/src/ap/ |
H A D | ap_config.h | 167 u8 *password; member in struct:hostapd_eap_user 170 size_t salt_len; /* non-zero when password is salted */ 174 unsigned int password_hash:1; /* whether password is hashed with 250 char *password; member in struct:sae_password_entry
|
/freebsd-13-stable/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.c | 304 const u8 *password, size_t password_len, 313 /* temp = prf(0+, password) */ 316 password, password_len, NULL, 0, temp) < 0) 318 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: temp = prf(0+, password)", 303 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument
|
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | tls_srp.c | 174 * If the server just has the raw password, make up a verifier entry on the 419 int SSL_CTX_set_srp_password(SSL_CTX *ctx, char *password) argument 421 return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD, 0, password);
|
/freebsd-13-stable/contrib/serf/ |
H A D | serf_bucket_types.h | 516 const char **password);
|
/freebsd-13-stable/crypto/heimdal/kadmin/ |
H A D | rpc.c | 552 char *password; local 560 CHECK(ret_string_xdr(in, &password)); 569 ret = kadm5_create_principal(contextp, &ent, mask, password); 576 free(password);
|
/freebsd-13-stable/sbin/init/ |
H A D | init.c | 869 "Enter root password, or ^D to go multi-user\n"; 870 char *clear, *password; local 897 * Check the root password. 910 password = crypt(clear, pp->pw_passwd); 912 if (password != NULL && 913 strcmp(password, pp->pw_passwd) == 0)
|
/freebsd-13-stable/contrib/googletest/googlemock/scripts/ |
H A D | upload.py | 134 (email, password) tuple when called. Will be called if authentication 172 def _GetAuthToken(self, email, password): 177 password: The user's password 194 "Passwd": password, 243 1) We get a username and password from the user 260 print >>sys.stderr, "Invalid username or password." 468 """Prompts the user for a username and password.""" 472 password = getpass.getpass("Password for %s: " % email) 473 return (email, password) [all...] |
/freebsd-13-stable/contrib/googletest/googletest/scripts/ |
H A D | upload.py | 134 (email, password) tuple when called. Will be called if authentication 172 def _GetAuthToken(self, email, password): 177 password: The user's password 194 "Passwd": password, 243 1) We get a username and password from the user 260 print >>sys.stderr, "Invalid username or password." 468 """Prompts the user for a username and password.""" 472 password = getpass.getpass("Password for %s: " % email) 473 return (email, password) [all...] |
/freebsd-13-stable/crypto/openssh/ |
H A D | sshconnect.c | 1435 ssh_put_password(char *password) argument 1441 packet_put_cstring(password); 1444 size = ROUNDUP(strlen(password) + 1, 32); 1446 strlcpy(padded, password, size);
|
H A D | auth-pam.c | 268 * Some platforms, notably Solaris, do not enforce password complexity 898 * Returns a junk password of identical length to that the user supplied. 900 * vary processing time in proportion to password length. 910 fatal("%s: password length too long: %zu", __func__, l); 1139 debug("PAM: changing password"); 1226 * "Blind" conversation function for password authentication. Assumes that 1227 * echo-off prompts are for the password and stores messages for later 1288 * Attempt password authentication via PAM 1291 sshpam_auth_passwd(Authctxt *authctxt, const char *password) argument 1301 sshpam_password = password; [all...] |
/freebsd-13-stable/usr.sbin/ancontrol/ |
H A D | ancontrol.c | 1434 char *password; local 1465 password = getpass("Enter LEAP password:"); 1467 len = strlen(password); 1475 unicode_password[i * 2] = *password++;
|
/freebsd-13-stable/crypto/heimdal/appl/ftp/ftpd/ |
H A D | ftpcmd.y | 123 %type <s> pathstring pathname password username 146 | PASS SP password CRLF check_secure 719 password 934 { "PASS", PASS, ZSTR1, 1, "<sp> password" },
|