Searched refs:password (Results 176 - 200 of 243) sorted by relevance

12345678910

/freebsd-13-stable/contrib/wpa/wpa_supplicant/
H A Dconfig.h110 * password - Password for Interworking network selection
112 char *password; member in struct:wpa_cred
115 * ext_password - Whether password is a name for external storage
1024 * wps_nfc_dev_pw_id - NFC Device Password ID for password token
1029 * wps_nfc_dh_pubkey - NFC DH Public Key for password token
1034 * wps_nfc_dh_privkey - NFC DH Private Key for password token
1039 * wps_nfc_dev_pw - NFC Device Password for password token
1044 * ext_password_backend - External password backend or %NULL if none
1629 * new network is added or a password is changed.
/freebsd-13-stable/contrib/apr/include/
H A Dapr_thread_proc.h566 * @param password User password if needed. Password is needed on WIN32
572 const char *password);
/freebsd-13-stable/crypto/heimdal/lib/krb5/
H A Dkrb5_locl.h232 const char *password; member in struct:_krb5_get_init_creds_opt_private
/freebsd-13-stable/crypto/openssl/apps/
H A Dts.c133 " [-queryfile file] [-passin password]",
157 char *password = NULL; local
277 !app_passwd(passin, NULL, &password, NULL)) {
278 BIO_printf(bio_err, "Error getting password.\n");
305 password, inkey, md, signer, chain, policy,
321 OPENSSL_free(password);
H A Dstoreutl.c299 pw_cb_data.password = passin;
/freebsd-13-stable/usr.sbin/etcupdate/tests/
H A Dpreworld_test.sh116 john:<password>:1001:1001::0:0:John Baldwin:/home/john:/bin/tcsh
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dcrypto.c2772 const char *password,
2785 passwordlen = password ? strlen(password) : 0;
2803 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
2809 if (!PKCS12_key_gen (password, passwordlen, salt, saltlen,
2940 const char *password; local
2943 password = pw->val[i];
2945 password = "";
2947 password = NULL;
2949 ret = (*s2k)(context, password, a
2771 PBE_string2key(hx509_context context, const char *password, const heim_octet_string *parameters, hx509_crypto *crypto, heim_octet_string *key, heim_octet_string *iv, const heim_oid *enc_oid, const EVP_MD *md) argument
[all...]
/freebsd-13-stable/contrib/wpa/src/eap_server/
H A Deap_server_teap.c1120 u8 *pos, *end, *username, *password, *new_id; local
1158 password = pos;
1162 password, passlen);
1179 if (!sm->user || !sm->user->password || sm->user->password_hash) {
1181 "EAP-TEAP: No plaintext user password configured");
1187 os_memcmp_const(sm->user->password, password, passlen) != 0) {
1188 wpa_printf(MSG_DEBUG, "EAP-TEAP: Invalid password");
1193 wpa_printf(MSG_DEBUG, "EAP-TEAP: Correct password");
H A Deap_server_ikev2.c44 sm->user->password == NULL) {
50 return sm->user->password;
H A Deap_server_eke.c247 if (sm->user == NULL || sm->user->password == NULL) {
253 if (eap_eke_derive_key(&data->sess, sm->user->password,
272 * temp = prf(0+, password)
498 if (sm->user->password == NULL || sm->user->password_len == 0) {
499 wpa_printf(MSG_INFO, "EAP-EKE: No password configured for peer");
/freebsd-13-stable/contrib/serf/buckets/
H A Dssl_buckets.c1281 const char *password; local
1285 password = ctx->cert_pw_success;
1290 &password);
1293 if (!status && password) {
1294 i = PKCS12_parse(p12, password, pkey, cert, NULL);
1314 password);
/freebsd-13-stable/contrib/subversion/subversion/svnsync/
H A Dsvnsync.c208 {"password", svnsync_opt_auth_password, 1,
209 N_("specify a password ARG (deprecated;\n"
211 "see --source-password and --sync-password)") },
246 {"source-password", svnsync_opt_source_password, 1,
247 N_("connect to source repository with password ARG") },
250 {"sync-password", svnsync_opt_sync_password, 1,
251 N_("connect to sync repository with password ARG") },
1984 const char *password = NULL, *source_password = NULL, *sync_password = NULL;
2075 opt_err = svn_utf_cstring_to_utf8(&password, opt_ar
1977 const char *password = NULL, *source_password = NULL, *sync_password = NULL; local
[all...]
/freebsd-13-stable/contrib/subversion/subversion/libsvn_ra_serf/
H A Dra_serf.h373 const char **password);
1524 svn_ra_serf__credentials_callback(char **username, char **password,
/freebsd-13-stable/contrib/wpa/src/ap/
H A Dap_config.h167 u8 *password; member in struct:hostapd_eap_user
170 size_t salt_len; /* non-zero when password is salted */
174 unsigned int password_hash:1; /* whether password is hashed with
250 char *password; member in struct:sae_password_entry
/freebsd-13-stable/contrib/wpa/src/eap_common/
H A Deap_eke_common.c304 const u8 *password, size_t password_len,
313 /* temp = prf(0+, password) */
316 password, password_len, NULL, 0, temp) < 0)
318 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: temp = prf(0+, password)",
303 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument
/freebsd-13-stable/crypto/openssl/ssl/
H A Dtls_srp.c174 * If the server just has the raw password, make up a verifier entry on the
419 int SSL_CTX_set_srp_password(SSL_CTX *ctx, char *password) argument
421 return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD, 0, password);
/freebsd-13-stable/contrib/serf/
H A Dserf_bucket_types.h516 const char **password);
/freebsd-13-stable/crypto/heimdal/kadmin/
H A Drpc.c552 char *password; local
560 CHECK(ret_string_xdr(in, &password));
569 ret = kadm5_create_principal(contextp, &ent, mask, password);
576 free(password);
/freebsd-13-stable/sbin/init/
H A Dinit.c869 "Enter root password, or ^D to go multi-user\n";
870 char *clear, *password; local
897 * Check the root password.
910 password = crypt(clear, pp->pw_passwd);
912 if (password != NULL &&
913 strcmp(password, pp->pw_passwd) == 0)
/freebsd-13-stable/contrib/googletest/googlemock/scripts/
H A Dupload.py134 (email, password) tuple when called. Will be called if authentication
172 def _GetAuthToken(self, email, password):
177 password: The user's password
194 "Passwd": password,
243 1) We get a username and password from the user
260 print >>sys.stderr, "Invalid username or password."
468 """Prompts the user for a username and password."""
472 password = getpass.getpass("Password for %s: " % email)
473 return (email, password)
[all...]
/freebsd-13-stable/contrib/googletest/googletest/scripts/
H A Dupload.py134 (email, password) tuple when called. Will be called if authentication
172 def _GetAuthToken(self, email, password):
177 password: The user's password
194 "Passwd": password,
243 1) We get a username and password from the user
260 print >>sys.stderr, "Invalid username or password."
468 """Prompts the user for a username and password."""
472 password = getpass.getpass("Password for %s: " % email)
473 return (email, password)
[all...]
/freebsd-13-stable/crypto/openssh/
H A Dsshconnect.c1435 ssh_put_password(char *password) argument
1441 packet_put_cstring(password);
1444 size = ROUNDUP(strlen(password) + 1, 32);
1446 strlcpy(padded, password, size);
H A Dauth-pam.c268 * Some platforms, notably Solaris, do not enforce password complexity
898 * Returns a junk password of identical length to that the user supplied.
900 * vary processing time in proportion to password length.
910 fatal("%s: password length too long: %zu", __func__, l);
1139 debug("PAM: changing password");
1226 * "Blind" conversation function for password authentication. Assumes that
1227 * echo-off prompts are for the password and stores messages for later
1288 * Attempt password authentication via PAM
1291 sshpam_auth_passwd(Authctxt *authctxt, const char *password) argument
1301 sshpam_password = password;
[all...]
/freebsd-13-stable/usr.sbin/ancontrol/
H A Dancontrol.c1434 char *password; local
1465 password = getpass("Enter LEAP password:");
1467 len = strlen(password);
1475 unicode_password[i * 2] = *password++;
/freebsd-13-stable/crypto/heimdal/appl/ftp/ftpd/
H A Dftpcmd.y123 %type <s> pathstring pathname password username
146 | PASS SP password CRLF check_secure
719 password
934 { "PASS", PASS, ZSTR1, 1, "<sp> password" },

Completed in 166 milliseconds

12345678910