/freebsd-13-stable/contrib/wpa/wpa_supplicant/ |
H A D | config_file.c | 777 STR(password); 951 if (cred->password && cred->ext_password) 952 fprintf(f, "\tpassword=ext:%s\n", cred->password); 953 else if (cred->password) 954 fprintf(f, "\tpassword=\"%s\"\n", cred->password);
|
H A D | sme.c | 93 const char *password; local 110 password = ssid->sae_password; 111 if (!password) 112 password = ssid->passphrase; 113 if (!password) { 114 wpa_printf(MSG_DEBUG, "SAE: No password available"); 130 (u8 *) password, os_strlen(password),
|
H A D | interworking.c | 614 /* Only tunneled methods with username/password supported */ 702 ((cred->password == NULL || 703 cred->password[0] == '\0') && 707 "nai-realm-find-eap: incomplete cred info: username: %s password: %s private_key: %s", 709 cred->password ? cred->password : "NULL", 716 if (cred->password && cred->password[0] && 1050 if (wpa_config_set_quoted(ssid, "password", 1501 if (cred->password [all...] |
/freebsd-13-stable/contrib/libpcap/ |
H A D | pcap-rpcap.c | 1867 if (auth->password) 1869 str_length = strlen(auth->password); 1920 if (auth->password) 1921 rpauth->slen2 = (uint16)strlen(auth->password); 1925 if (sock_bufferize(auth->password, rpauth->slen2, sendbuf,
|
/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | pkinit.c | 1852 char *password) 1884 if (password && password[0]) 1885 hx509_lock_add_password(lock, password); 2376 char *password) 2431 password); 1844 _krb5_pk_load_id(krb5_context context, struct krb5_pk_identity **ret_id, const char *user_id, const char *anchor_id, char * const *chain_list, char * const *revoke_list, krb5_prompter_fct prompter, void *prompter_data, char *password) argument 2366 krb5_get_init_creds_opt_set_pkinit(krb5_context context, krb5_get_init_creds_opt *opt, krb5_principal principal, const char *user_id, const char *x509_anchors, char * const * pool, char * const * pki_revoke, int flags, krb5_prompter_fct prompter, void *prompter_data, char *password) argument
|
/freebsd-13-stable/targets/pseudo/userland/ |
H A D | Makefile.depend | 474 usr.sbin/bsdconfig/password \ 475 usr.sbin/bsdconfig/password/include \ 476 usr.sbin/bsdconfig/password/share \
|
/freebsd-13-stable/libexec/ftpd/ |
H A D | ftpcmd.y | 124 %type <s> pathstring pathname password username 149 | PASS SP password CRLF 793 password 1072 { "PASS", PASS, ZSTR1, 1, "[<sp> [password]]" },
|
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_teap.c | 546 const u8 *identity, *password; local 555 password = eap_get_config_password(sm, &password_len); 556 if (!identity || !password || 559 "EAP-TEAP: No username/password suitable for Basic-Password-Auth"); 571 wpabuf_put_data(resp, password, password_len);
|
H A D | eap.c | 2482 * eap_sm_request_password - Request password from user (ctrl_iface) 2485 * EAP methods can call this function to request password information for the 2486 * current network. This is normally called when the password is not included 2497 * eap_sm_request_new_password - Request new password from user (ctrl_iface) 2500 * EAP methods can call this function to request new password information for 2502 * that the current password has expired and password change is required. The 2527 * eap_sm_request_otp - Request one time password from user (ctrl_iface) 2532 * EAP methods can call this function to request open time password (OTP) for 2736 if (config->password [all...] |
/freebsd-13-stable/contrib/serf/ |
H A D | serf.h | 379 char **password,
|
/freebsd-13-stable/contrib/libpcap/pcap/ |
H A D | pcap.h | 783 * Username/password authentication. 786 * password provided to authenticate the user on the remote machine. If the 790 * *******NOTE********: the username and password are sent over the network 804 * 'password' can be NULL pointers. 830 * \brief Zero-terminated string containing the password that has to be 836 char *password;
|
/freebsd-13-stable/contrib/libpcap/rpcapd/ |
H A D | daemon.c | 51 #include <pwd.h> // for password management 55 #include <shadow.h> // for password management 122 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf); 1160 daemon_AuthUserPwd(char *username, char *password, char *errbuf) argument 1173 * which merely indicates that the user name or password is 1174 * incorrect, not whether it's the user name or the password 1177 * password that's incorrect, so it doesn't know whether to 1185 if (LogonUser(username, ".", password, LOGON32_LOGON_NETWORK, LOGON32_PROVIDER_DEFAULT, &Token) == 0) 1221 * We use the Solaris/Linux shadow password authentication if 1226 * I think these days all UN*Xes either won't return the password [all...] |
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | apps.h | 436 const void *password; member in struct:pw_cb_data
|
H A D | apps.c | 202 const char *password = local 203 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; 204 if (password && password[0] != '\0') { 205 UI_set_result(ui, uis, password); 234 const char *password = local 235 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; 236 if (password && password[0] != '\0') 323 buff = app_malloc(bufsiz, "password buffe [all...] |
/freebsd-13-stable/contrib/tcsh/ |
H A D | tc.os.c | 1590 cygwin_xcrypt(struct passwd *pw, const char *password, const char *expected_pwd) argument 1593 HANDLE token = cygwin_logon_user(pw, password);
|
/freebsd-13-stable/contrib/opie/ |
H A D | ftpcmd.y | 200 | PASS SP password CRLF 615 password: /* empty */ label 811 { "PASS", PASS, ZSTR1, 1, "<sp> password" },
|
/freebsd-13-stable/crypto/openssh/ |
H A D | monitor_wrap.c | 432 /* Do the password authentication */ 434 mm_auth_password(struct ssh *ssh, char *password) argument 446 if ((r = sshbuf_put_cstring(m, password)) != 0)
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | crypto_module_tests.c | 1081 "password", 1126 "password", 1137 "password", 1148 "password", 1160 "password", 2049 char *password = "clientPass"; local 2087 if (nt_password_hash((u8 *) password, os_strlen(password), buf) || 2095 (u8 *) password, os_strlen(password), bu [all...] |
H A D | tls_wolfssl.c | 501 static int tls_passwd_cb(char *buf, int size, int rwflag, void *password) argument 503 if (!password) 505 os_strlcpy(buf, (char *) password, size);
|
/freebsd-13-stable/sbin/camcontrol/ |
H A D | camcontrol.c | 159 u_int8_t password[32]; member in struct:ata_set_max_pwd 2461 /* pwd->password may not be null terminated */ 2462 char pass[sizeof(pwd->password)+1]; 2464 strlcpy(pass, pwd->password, sizeof(pass)); 2465 printf(" password='%s', user='%s'", 2704 printf("master password rev %04x%s\n", 2711 * Validates and copies the password in optarg to the passed buffer. 2712 * If the password in optarg is the same length as the buffer then 2722 warnx("-%c password is too long", opt); 2725 warnx("-%c password i [all...] |
/freebsd-13-stable/contrib/wpa/src/ap/ |
H A D | ieee802_1x.c | 2266 if (eap_user->password) { 2267 user->password = os_memdup(eap_user->password, 2269 if (user->password == NULL)
|
H A D | ap_config.c | 566 bin_clear_free(user->password, user->password_len); 643 str_clear_free(tmp->password);
|
/freebsd-13-stable/contrib/wpa/src/radius/ |
H A D | radius_server.c | 331 * password. The password field will be an allocated copy of the 332 * password data and RADIUS server will free it after use. 1347 if (res || !tmp.macacl || tmp.password == NULL) { 1349 bin_clear_free(tmp.password, tmp.password_len); 1354 request, tmp.password, tmp.password_len, 1358 bin_clear_free(tmp.password, tmp.password_len);
|
/freebsd-13-stable/contrib/apr/threadproc/unix/ |
H A D | proc.c | 316 const char *password)
|
/freebsd-13-stable/contrib/wpa/hs20/client/ |
H A D | oma_dm_client.c | 941 const char *username, const char *password, 959 ext_hdr, ctx->ca_fname, username, password, 938 oma_dm_send_recv(struct hs20_osu_client *ctx, const char *url, xml_node_t *syncml, const char *ext_hdr, const char *username, const char *password, const char *client_cert, const char *client_key) argument
|