Searched refs:password (Results 201 - 225 of 243) sorted by relevance

12345678910

/freebsd-13-stable/contrib/wpa/wpa_supplicant/
H A Dconfig_file.c777 STR(password);
951 if (cred->password && cred->ext_password)
952 fprintf(f, "\tpassword=ext:%s\n", cred->password);
953 else if (cred->password)
954 fprintf(f, "\tpassword=\"%s\"\n", cred->password);
H A Dsme.c93 const char *password; local
110 password = ssid->sae_password;
111 if (!password)
112 password = ssid->passphrase;
113 if (!password) {
114 wpa_printf(MSG_DEBUG, "SAE: No password available");
130 (u8 *) password, os_strlen(password),
H A Dinterworking.c614 /* Only tunneled methods with username/password supported */
702 ((cred->password == NULL ||
703 cred->password[0] == '\0') &&
707 "nai-realm-find-eap: incomplete cred info: username: %s password: %s private_key: %s",
709 cred->password ? cred->password : "NULL",
716 if (cred->password && cred->password[0] &&
1050 if (wpa_config_set_quoted(ssid, "password",
1501 if (cred->password
[all...]
/freebsd-13-stable/contrib/libpcap/
H A Dpcap-rpcap.c1867 if (auth->password)
1869 str_length = strlen(auth->password);
1920 if (auth->password)
1921 rpauth->slen2 = (uint16)strlen(auth->password);
1925 if (sock_bufferize(auth->password, rpauth->slen2, sendbuf,
/freebsd-13-stable/crypto/heimdal/lib/krb5/
H A Dpkinit.c1852 char *password)
1884 if (password && password[0])
1885 hx509_lock_add_password(lock, password);
2376 char *password)
2431 password);
1844 _krb5_pk_load_id(krb5_context context, struct krb5_pk_identity **ret_id, const char *user_id, const char *anchor_id, char * const *chain_list, char * const *revoke_list, krb5_prompter_fct prompter, void *prompter_data, char *password) argument
2366 krb5_get_init_creds_opt_set_pkinit(krb5_context context, krb5_get_init_creds_opt *opt, krb5_principal principal, const char *user_id, const char *x509_anchors, char * const * pool, char * const * pki_revoke, int flags, krb5_prompter_fct prompter, void *prompter_data, char *password) argument
/freebsd-13-stable/targets/pseudo/userland/
H A DMakefile.depend474 usr.sbin/bsdconfig/password \
475 usr.sbin/bsdconfig/password/include \
476 usr.sbin/bsdconfig/password/share \
/freebsd-13-stable/libexec/ftpd/
H A Dftpcmd.y124 %type <s> pathstring pathname password username
149 | PASS SP password CRLF
793 password
1072 { "PASS", PASS, ZSTR1, 1, "[<sp> [password]]" },
/freebsd-13-stable/contrib/wpa/src/eap_peer/
H A Deap_teap.c546 const u8 *identity, *password; local
555 password = eap_get_config_password(sm, &password_len);
556 if (!identity || !password ||
559 "EAP-TEAP: No username/password suitable for Basic-Password-Auth");
571 wpabuf_put_data(resp, password, password_len);
H A Deap.c2482 * eap_sm_request_password - Request password from user (ctrl_iface)
2485 * EAP methods can call this function to request password information for the
2486 * current network. This is normally called when the password is not included
2497 * eap_sm_request_new_password - Request new password from user (ctrl_iface)
2500 * EAP methods can call this function to request new password information for
2502 * that the current password has expired and password change is required. The
2527 * eap_sm_request_otp - Request one time password from user (ctrl_iface)
2532 * EAP methods can call this function to request open time password (OTP) for
2736 if (config->password
[all...]
/freebsd-13-stable/contrib/serf/
H A Dserf.h379 char **password,
/freebsd-13-stable/contrib/libpcap/pcap/
H A Dpcap.h783 * Username/password authentication.
786 * password provided to authenticate the user on the remote machine. If the
790 * *******NOTE********: the username and password are sent over the network
804 * 'password' can be NULL pointers.
830 * \brief Zero-terminated string containing the password that has to be
836 char *password;
/freebsd-13-stable/contrib/libpcap/rpcapd/
H A Ddaemon.c51 #include <pwd.h> // for password management
55 #include <shadow.h> // for password management
122 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf);
1160 daemon_AuthUserPwd(char *username, char *password, char *errbuf) argument
1173 * which merely indicates that the user name or password is
1174 * incorrect, not whether it's the user name or the password
1177 * password that's incorrect, so it doesn't know whether to
1185 if (LogonUser(username, ".", password, LOGON32_LOGON_NETWORK, LOGON32_PROVIDER_DEFAULT, &Token) == 0)
1221 * We use the Solaris/Linux shadow password authentication if
1226 * I think these days all UN*Xes either won't return the password
[all...]
/freebsd-13-stable/crypto/openssl/apps/
H A Dapps.h436 const void *password; member in struct:pw_cb_data
H A Dapps.c202 const char *password = local
203 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
204 if (password && password[0] != '\0') {
205 UI_set_result(ui, uis, password);
234 const char *password = local
235 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
236 if (password && password[0] != '\0')
323 buff = app_malloc(bufsiz, "password buffe
[all...]
/freebsd-13-stable/contrib/tcsh/
H A Dtc.os.c1590 cygwin_xcrypt(struct passwd *pw, const char *password, const char *expected_pwd) argument
1593 HANDLE token = cygwin_logon_user(pw, password);
/freebsd-13-stable/contrib/opie/
H A Dftpcmd.y200 | PASS SP password CRLF
615 password: /* empty */ label
811 { "PASS", PASS, ZSTR1, 1, "<sp> password" },
/freebsd-13-stable/crypto/openssh/
H A Dmonitor_wrap.c432 /* Do the password authentication */
434 mm_auth_password(struct ssh *ssh, char *password) argument
446 if ((r = sshbuf_put_cstring(m, password)) != 0)
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dcrypto_module_tests.c1081 "password",
1126 "password",
1137 "password",
1148 "password",
1160 "password",
2049 char *password = "clientPass"; local
2087 if (nt_password_hash((u8 *) password, os_strlen(password), buf) ||
2095 (u8 *) password, os_strlen(password), bu
[all...]
H A Dtls_wolfssl.c501 static int tls_passwd_cb(char *buf, int size, int rwflag, void *password) argument
503 if (!password)
505 os_strlcpy(buf, (char *) password, size);
/freebsd-13-stable/sbin/camcontrol/
H A Dcamcontrol.c159 u_int8_t password[32]; member in struct:ata_set_max_pwd
2461 /* pwd->password may not be null terminated */
2462 char pass[sizeof(pwd->password)+1];
2464 strlcpy(pass, pwd->password, sizeof(pass));
2465 printf(" password='%s', user='%s'",
2704 printf("master password rev %04x%s\n",
2711 * Validates and copies the password in optarg to the passed buffer.
2712 * If the password in optarg is the same length as the buffer then
2722 warnx("-%c password is too long", opt);
2725 warnx("-%c password i
[all...]
/freebsd-13-stable/contrib/wpa/src/ap/
H A Dieee802_1x.c2266 if (eap_user->password) {
2267 user->password = os_memdup(eap_user->password,
2269 if (user->password == NULL)
H A Dap_config.c566 bin_clear_free(user->password, user->password_len);
643 str_clear_free(tmp->password);
/freebsd-13-stable/contrib/wpa/src/radius/
H A Dradius_server.c331 * password. The password field will be an allocated copy of the
332 * password data and RADIUS server will free it after use.
1347 if (res || !tmp.macacl || tmp.password == NULL) {
1349 bin_clear_free(tmp.password, tmp.password_len);
1354 request, tmp.password, tmp.password_len,
1358 bin_clear_free(tmp.password, tmp.password_len);
/freebsd-13-stable/contrib/apr/threadproc/unix/
H A Dproc.c316 const char *password)
/freebsd-13-stable/contrib/wpa/hs20/client/
H A Doma_dm_client.c941 const char *username, const char *password,
959 ext_hdr, ctx->ca_fname, username, password,
938 oma_dm_send_recv(struct hs20_osu_client *ctx, const char *url, xml_node_t *syncml, const char *ext_hdr, const char *username, const char *password, const char *client_cert, const char *client_key) argument

Completed in 220 milliseconds

12345678910