Searched refs:password (Results 26 - 50 of 243) sorted by relevance

12345678910

/freebsd-13-stable/crypto/heimdal/lib/krb5/
H A Dsalt-des3.c40 krb5_data password,
51 len = password.length + salt.saltvalue.length;
57 memcpy(str, password.data, password.length);
58 memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length);
105 krb5_data password,
111 size_t len = password.length + salt.saltvalue.length;
119 memcpy(s, password.data, password.length);
120 memcpy(s + password
38 DES3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
103 DES3_string_to_key_derived(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
[all...]
H A Dsalt-aes.c41 krb5_data password,
77 ret = PKCS5_PBKDF2_HMAC_SHA1(password.data, password.length,
39 AES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
H A Dsalt-arcfour.c39 krb5_data password,
58 ret = wind_utf8ucs2_length(password.data, &len);
73 ret = wind_utf8ucs2(password.data, s, &len);
37 ARCFOUR_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
H A Dsalt.c136 krb5_data password,
146 ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key);
154 const char *password,
159 pw.data = rk_UNCONST(password);
160 pw.length = strlen(password);
167 krb5_data password,
173 return krb5_string_to_key_data_salt_opaque(context, enctype, password,
179 * `password' (with salt `salt' and the enctype specific data string
186 krb5_data password,
201 return (*st->string_to_key)(context, enctype, password,
134 krb5_string_to_key_data(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_principal principal, krb5_keyblock *key) argument
152 krb5_string_to_key(krb5_context context, krb5_enctype enctype, const char *password, krb5_principal principal, krb5_keyblock *key) argument
165 krb5_string_to_key_data_salt(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_keyblock *key) argument
184 krb5_string_to_key_data_salt_opaque(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
216 krb5_string_to_key_salt(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_keyblock *key) argument
229 krb5_string_to_key_salt_opaque(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
[all...]
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
31 int nt_challenge_response(const u8 *challenge, const u8 *password,
38 int nt_password_hash(const u8 *password, size_t password_len,
47 const u8 *password, size_t password_len,
/freebsd-13-stable/contrib/wpa/src/eap_peer/
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
H A Deap_md5.c34 const u8 *pos, *challenge, *password; local
38 password = eap_get_config_password(sm, &password_len);
39 if (password == NULL) {
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
H A Dmschapv2.h19 const u8 *password, size_t password_len,
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
73 password = eap_get_config_password2(sm, &password_len, &pwhash);
74 if (identity == NULL || password == NULL)
118 if ((pwhash && challenge_response(challenge, password, rpos)) ||
120 nt_challenge_response(challenge, password, password_len, rpos))) {
192 const u8 *pos, *password; local
200 password = eap_get_config_password2(sm, &password_len, &pwhash);
201 if (password == NULL)
235 if (hash_nt_password_hash(password, pw_hash_hash)) {
240 if (nt_password_hash(password, password_le
283 const u8 *password; local
341 const u8 *addr[5], *password; local
[all...]
/freebsd-13-stable/crypto/heimdal/kdc/
H A Dstring2key.c42 char *password; variable
54 { "password", 'w', arg_string, &password, "Password to use", "password" },
66 arg_printusage (args, num_args, NULL, "password");
158 password = argv[0];
159 if(password == NULL){
162 password = buf;
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
175 tokey(context, ETYPE_DES_CBC_MD5, password, sal
[all...]
/freebsd-13-stable/stand/lua/
H A DMakefile12 password.lua.8 \
29 password.lua \
H A Dpassword.lua35 local password = {}
37 local INCORRECT_PASSWORD = "loader: incorrect password"
38 -- Asterisks as a password mask
50 function password.read(prompt_length)
56 -- Reset cursor to just after the password prompt
89 function password.check()
108 local read_pwd = password.read(#prompt)
127 compare("Bootlock password:", boot_pwd)
135 local pwd = loader.getenv("password")
139 -- prompt for a password
[all...]
/freebsd-13-stable/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf11 # NOTE! This file may contain password information and should probably be made
22 # wpa_cli or wpa_gui, or a password is changed). This is required for
285 # NFC password token for WPS
286 # These parameters can be used to configure a fixed NFC password token for the
289 # that includes the matching NFC password token (e.g., written based on the
340 #ext_password_backend=test:pw1=password|pw2=testing
545 # password: Password for Interworking network selection
700 # password="password"
713 # password
[all...]
/freebsd-13-stable/crypto/heimdal/lib/kadm5/
H A Dcommon_glue.c43 const char *password)
45 return __CALL(chpass_principal, (server_handle, princ, password));
62 const char *password)
64 return __CALL(create_principal, (server_handle, princ, mask, password));
41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
59 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument
H A Dchpass_s.c41 const char *password,
63 &ent, password, cond);
74 ret = _kadm5_set_keys(context, &ent.entry, password);
128 * change the password of `princ' to `password' if it's not already that.
134 const char *password)
136 return change (server_handle, princ, password, 1);
140 * change the password of `princ' to `password'
146 const char *password)
39 change(void *server_handle, krb5_principal princ, const char *password, int cond) argument
132 kadm5_s_chpass_principal_cond(void *server_handle, krb5_principal princ, const char *password) argument
144 kadm5_s_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
[all...]
/freebsd-13-stable/usr.sbin/bsdconfig/
H A DMakefile14 password \
/freebsd-13-stable/crypto/heimdal/lib/gssapi/mech/
H A Dgss_acquire_cred_with_password.c38 const gss_buffer_t password,
52 password,
77 password,
36 gss_acquire_cred_with_password(OM_uint32 *minor_status, const gss_name_t desired_name, const gss_buffer_t password, OM_uint32 time_req, const gss_OID_set desired_mechs, gss_cred_usage_t cred_usage, gss_cred_id_t *output_cred_handle, gss_OID_set *actual_mechs, OM_uint32 *time_rec) argument
/freebsd-13-stable/contrib/apr-util/test/
H A Dtestpass.c45 const char *password; member in struct:__anon143
78 apr_assert_success(tc, "check for valid password",
79 apr_password_validate(passwords[i].password,
130 apr_assert_success(tc, "SHA1 password validated",
132 APR_ASSERT_FAILURE(tc, "wrong SHA1 password should not validate",
144 apr_assert_success(tc, "MD5 password validated",
146 APR_ASSERT_FAILURE(tc, "wrong MD5 password should not validate",
153 const char *password; member in struct:__anon144
168 while (glibc_sha_pws[i].password) {
169 apr_assert_success(tc, "check for valid glibc crypt-sha password",
[all...]
/freebsd-13-stable/contrib/openpam/modules/pam_unix/
H A Dpam_unix.c77 const char *crypt_password, *password; local
89 /* get password */
101 &password, NULL);
107 password = resp->resp;
123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL ||
129 free(password);
/freebsd-13-stable/contrib/subversion/subversion/libsvn_subr/
H A Dmacos_keychain.c69 the password in the OS X KeyChain. */
75 const char *password,
98 username, (int) strlen(password),
99 password, NULL);
104 (int) strlen(password),
105 password);
118 the password from the OS X KeyChain. */
121 const char **password,
150 *password = apr_pstrmemdup(pool, data, length);
200 /* Get cached encrypted credentials from the ssl client cert password
70 keychain_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
119 keychain_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
[all...]
H A Dsimple_providers.c66 the plaintext password from CREDS. */
69 const char **password,
87 *password = str->data;
96 the plaintext password in CREDS. */
102 const char *password,
108 svn_string_create(password, pool));
150 const char *password = svn_hash_gets(parameters,
156 const char *default_password = NULL; /* Default password from cache. */
182 /* The password type in the auth data must match the
183 mangler's type, otherwise the password mus
65 svn_auth__simple_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
95 svn_auth__simple_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
147 const char *password = svn_hash_gets(parameters, local
[all...]
/freebsd-13-stable/crypto/heimdal/lib/hdb/
H A Dext.c292 if (db->hdb_master_key_set && ext->data.u.password.mkvno) {
295 key = _hdb_find_master_key(ext->data.u.password.mkvno,
301 *ext->data.u.password.mkvno);
306 ext->data.u.password.password.data,
307 ext->data.u.password.password.length,
310 ret = der_copy_octet_string(&ext->data.u.password.password, &pw);
319 krb5_set_error_message(context, EINVAL, "malformed password");
[all...]
/freebsd-13-stable/contrib/subversion/subversion/libsvn_ra_svn/
H A Dcram.c84 const char *password)
87 apr_size_t len = strlen(password), i;
90 /* Munge the password into a 64-byte secret. */
93 memcpy(secret, password, len);
95 apr_md5(secret, password, len);
143 const char *challenge, *sep, *password;
171 /* Verify the digest against the password in pwfile. */
172 svn_config_get(pwdb, &password, SVN_CONFIG_SECTION_USERS, *user, NULL);
173 if (!password)
175 compute_digest(sdigest, challenge, password);
82 compute_digest(unsigned char *digest, const char *challenge, const char *password) argument
142 const char *challenge, *sep, *password; local
182 svn_ra_svn__cram_client(svn_ra_svn_conn_t *conn, apr_pool_t *pool, const char *user, const char *password, const char **message) argument
[all...]
/freebsd-13-stable/crypto/heimdal/kadmin/
H A Dank.c70 char *password,
120 password = pwbuf;
123 password = pwbuf;
124 } else if(password == NULL) {
135 krb5_set_error_message(context, ret, "failed to verify password");
138 password = pwbuf;
141 ret = kadm5_create_principal(kadm_handle, &princ, mask, password);
181 printf ("added %s with password \"%s\"\n", princ_name, password);
189 if (password !
66 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, char *password, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument
[all...]
/freebsd-13-stable/contrib/subversion/subversion/include/private/
H A Dsvn_auth_private.h58 /* If you add a password type for a provider which stores
70 the user's password. It might be obtained directly from CREDS, or
74 retrieval process. Set *DONE to TRUE if a password was stored
79 const char **password,
91 password was store, to FALSE otherwise. POOL is used for any necessary
98 const char *password,
106 used to obtain the password value. Allocate *CREDENTIALS from
144 the plaintext password from CREDS when USERNAME matches the stored
148 const char **password,
157 the plaintext password i
[all...]

Completed in 167 milliseconds

12345678910