/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | salt-des3.c | 40 krb5_data password, 51 len = password.length + salt.saltvalue.length; 57 memcpy(str, password.data, password.length); 58 memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length); 105 krb5_data password, 111 size_t len = password.length + salt.saltvalue.length; 119 memcpy(s, password.data, password.length); 120 memcpy(s + password 38 DES3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 103 DES3_string_to_key_derived(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument [all...] |
H A D | salt-aes.c | 41 krb5_data password, 77 ret = PKCS5_PBKDF2_HMAC_SHA1(password.data, password.length, 39 AES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
|
H A D | salt-arcfour.c | 39 krb5_data password, 58 ret = wind_utf8ucs2_length(password.data, &len); 73 ret = wind_utf8ucs2(password.data, s, &len); 37 ARCFOUR_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
|
H A D | salt.c | 136 krb5_data password, 146 ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); 154 const char *password, 159 pw.data = rk_UNCONST(password); 160 pw.length = strlen(password); 167 krb5_data password, 173 return krb5_string_to_key_data_salt_opaque(context, enctype, password, 179 * `password' (with salt `salt' and the enctype specific data string 186 krb5_data password, 201 return (*st->string_to_key)(context, enctype, password, 134 krb5_string_to_key_data(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_principal principal, krb5_keyblock *key) argument 152 krb5_string_to_key(krb5_context context, krb5_enctype enctype, const char *password, krb5_principal principal, krb5_keyblock *key) argument 165 krb5_string_to_key_data_salt(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_keyblock *key) argument 184 krb5_string_to_key_data_salt_opaque(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 216 krb5_string_to_key_salt(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_keyblock *key) argument 229 krb5_string_to_key_salt_opaque(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument [all...] |
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 38 int nt_password_hash(const u8 *password, size_t password_len, 47 const u8 *password, size_t password_len,
|
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; local 38 password = eap_get_config_password(sm, &password_len); 39 if (password == NULL) { 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | mschapv2.h | 19 const u8 *password, size_t password_len,
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 74 if (identity == NULL || password == NULL) 118 if ((pwhash && challenge_response(challenge, password, rpos)) || 120 nt_challenge_response(challenge, password, password_len, rpos))) { 192 const u8 *pos, *password; local 200 password = eap_get_config_password2(sm, &password_len, &pwhash); 201 if (password == NULL) 235 if (hash_nt_password_hash(password, pw_hash_hash)) { 240 if (nt_password_hash(password, password_le 283 const u8 *password; local 341 const u8 *addr[5], *password; local [all...] |
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | string2key.c | 42 char *password; variable 54 { "password", 'w', arg_string, &password, "Password to use", "password" }, 66 arg_printusage (args, num_args, NULL, "password"); 158 password = argv[0]; 159 if(password == NULL){ 162 password = buf; 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); 175 tokey(context, ETYPE_DES_CBC_MD5, password, sal [all...] |
/freebsd-13-stable/stand/lua/ |
H A D | Makefile | 12 password.lua.8 \ 29 password.lua \
|
H A D | password.lua | 35 local password = {} 37 local INCORRECT_PASSWORD = "loader: incorrect password" 38 -- Asterisks as a password mask 50 function password.read(prompt_length) 56 -- Reset cursor to just after the password prompt 89 function password.check() 108 local read_pwd = password.read(#prompt) 127 compare("Bootlock password:", boot_pwd) 135 local pwd = loader.getenv("password") 139 -- prompt for a password [all...] |
/freebsd-13-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 11 # NOTE! This file may contain password information and should probably be made 22 # wpa_cli or wpa_gui, or a password is changed). This is required for 285 # NFC password token for WPS 286 # These parameters can be used to configure a fixed NFC password token for the 289 # that includes the matching NFC password token (e.g., written based on the 340 #ext_password_backend=test:pw1=password|pw2=testing 545 # password: Password for Interworking network selection 700 # password="password" 713 # password [all...] |
/freebsd-13-stable/crypto/heimdal/lib/kadm5/ |
H A D | common_glue.c | 43 const char *password) 45 return __CALL(chpass_principal, (server_handle, princ, password)); 62 const char *password) 64 return __CALL(create_principal, (server_handle, princ, mask, password)); 41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument 59 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument
|
H A D | chpass_s.c | 41 const char *password, 63 &ent, password, cond); 74 ret = _kadm5_set_keys(context, &ent.entry, password); 128 * change the password of `princ' to `password' if it's not already that. 134 const char *password) 136 return change (server_handle, princ, password, 1); 140 * change the password of `princ' to `password' 146 const char *password) 39 change(void *server_handle, krb5_principal princ, const char *password, int cond) argument 132 kadm5_s_chpass_principal_cond(void *server_handle, krb5_principal princ, const char *password) argument 144 kadm5_s_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument [all...] |
/freebsd-13-stable/usr.sbin/bsdconfig/ |
H A D | Makefile | 14 password \
|
/freebsd-13-stable/crypto/heimdal/lib/gssapi/mech/ |
H A D | gss_acquire_cred_with_password.c | 38 const gss_buffer_t password, 52 password, 77 password, 36 gss_acquire_cred_with_password(OM_uint32 *minor_status, const gss_name_t desired_name, const gss_buffer_t password, OM_uint32 time_req, const gss_OID_set desired_mechs, gss_cred_usage_t cred_usage, gss_cred_id_t *output_cred_handle, gss_OID_set *actual_mechs, OM_uint32 *time_rec) argument
|
/freebsd-13-stable/contrib/apr-util/test/ |
H A D | testpass.c | 45 const char *password; member in struct:__anon143 78 apr_assert_success(tc, "check for valid password", 79 apr_password_validate(passwords[i].password, 130 apr_assert_success(tc, "SHA1 password validated", 132 APR_ASSERT_FAILURE(tc, "wrong SHA1 password should not validate", 144 apr_assert_success(tc, "MD5 password validated", 146 APR_ASSERT_FAILURE(tc, "wrong MD5 password should not validate", 153 const char *password; member in struct:__anon144 168 while (glibc_sha_pws[i].password) { 169 apr_assert_success(tc, "check for valid glibc crypt-sha password", [all...] |
/freebsd-13-stable/contrib/openpam/modules/pam_unix/ |
H A D | pam_unix.c | 77 const char *crypt_password, *password; local 89 /* get password */ 101 &password, NULL); 107 password = resp->resp; 123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL || 129 free(password);
|
/freebsd-13-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | macos_keychain.c | 69 the password in the OS X KeyChain. */ 75 const char *password, 98 username, (int) strlen(password), 99 password, NULL); 104 (int) strlen(password), 105 password); 118 the password from the OS X KeyChain. */ 121 const char **password, 150 *password = apr_pstrmemdup(pool, data, length); 200 /* Get cached encrypted credentials from the ssl client cert password 70 keychain_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 119 keychain_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument [all...] |
H A D | simple_providers.c | 66 the plaintext password from CREDS. */ 69 const char **password, 87 *password = str->data; 96 the plaintext password in CREDS. */ 102 const char *password, 108 svn_string_create(password, pool)); 150 const char *password = svn_hash_gets(parameters, 156 const char *default_password = NULL; /* Default password from cache. */ 182 /* The password type in the auth data must match the 183 mangler's type, otherwise the password mus 65 svn_auth__simple_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 95 svn_auth__simple_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 147 const char *password = svn_hash_gets(parameters, local [all...] |
/freebsd-13-stable/crypto/heimdal/lib/hdb/ |
H A D | ext.c | 292 if (db->hdb_master_key_set && ext->data.u.password.mkvno) { 295 key = _hdb_find_master_key(ext->data.u.password.mkvno, 301 *ext->data.u.password.mkvno); 306 ext->data.u.password.password.data, 307 ext->data.u.password.password.length, 310 ret = der_copy_octet_string(&ext->data.u.password.password, &pw); 319 krb5_set_error_message(context, EINVAL, "malformed password"); [all...] |
/freebsd-13-stable/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | cram.c | 84 const char *password) 87 apr_size_t len = strlen(password), i; 90 /* Munge the password into a 64-byte secret. */ 93 memcpy(secret, password, len); 95 apr_md5(secret, password, len); 143 const char *challenge, *sep, *password; 171 /* Verify the digest against the password in pwfile. */ 172 svn_config_get(pwdb, &password, SVN_CONFIG_SECTION_USERS, *user, NULL); 173 if (!password) 175 compute_digest(sdigest, challenge, password); 82 compute_digest(unsigned char *digest, const char *challenge, const char *password) argument 142 const char *challenge, *sep, *password; local 182 svn_ra_svn__cram_client(svn_ra_svn_conn_t *conn, apr_pool_t *pool, const char *user, const char *password, const char **message) argument [all...] |
/freebsd-13-stable/crypto/heimdal/kadmin/ |
H A D | ank.c | 70 char *password, 120 password = pwbuf; 123 password = pwbuf; 124 } else if(password == NULL) { 135 krb5_set_error_message(context, ret, "failed to verify password"); 138 password = pwbuf; 141 ret = kadm5_create_principal(kadm_handle, &princ, mask, password); 181 printf ("added %s with password \"%s\"\n", princ_name, password); 189 if (password ! 66 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, char *password, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument [all...] |
/freebsd-13-stable/contrib/subversion/subversion/include/private/ |
H A D | svn_auth_private.h | 58 /* If you add a password type for a provider which stores 70 the user's password. It might be obtained directly from CREDS, or 74 retrieval process. Set *DONE to TRUE if a password was stored 79 const char **password, 91 password was store, to FALSE otherwise. POOL is used for any necessary 98 const char *password, 106 used to obtain the password value. Allocate *CREDENTIALS from 144 the plaintext password from CREDS when USERNAME matches the stored 148 const char **password, 157 the plaintext password i [all...] |