/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | init_s.c | 87 const char *password, 105 const char *password, 121 password, 85 kadm5_s_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 104 kadm5_s_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
|
H A D | ad.c | 482 ad_get_cred(kadm5_ad_context *context, const char *password) argument 499 password, krb5_prompter_posix, 511 const char *password) 527 password, 565 const char *password) 1248 char *password; local 1256 plen = base64_encode(p, sizeof(p), &password); 1263 free(password); 1272 password, 1292 password, 509 kadm5_ad_chpass_principal(void *server_handle, krb5_principal principal, const char *password) argument 562 kadm5_ad_create_principal(void *server_handle, kadm5_principal_ent_t entry, uint32_t mask, const char *password) argument 1356 kadm5_ad_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 1419 kadm5_ad_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument [all...] |
H A D | set_keys.c | 39 * Set the keys of `ent' to the string-to-key of `password' 45 const char *password) 53 password, &keys, &num_keys); 64 "kadmin", "save-password", NULL)) 67 ent, password); 43 _kadm5_set_keys(kadm5_server_context *context, hdb_entry *ent, const char *password) argument
|
/freebsd-9.3-release/crypto/heimdal/tests/kdc/ |
H A D | check-digest.in | 65 password=foobarbaz 85 ${kadmin} add -p $password --use-defaults ${server}@${R} || exit 1 93 echo $password > ${objdir}/foopassword 110 ${kinit} --password-file=${objdir}/foopassword ${server}@$R || exitcode=1 180 --password="$userpassword" \ 248 --password="$userpassword" \
|
H A D | check-kadmin.in | 104 ${kinit} --password-file=${objdir}/foopassword \ 120 ${kinit} --password-file=${objdir}/foopassword \
|
H A D | check-iprop.in | 152 ${kadmin} -l cpw --random-password user@${R} > /dev/null || exit 1 153 ${kadmin} -l cpw --random-password user@${R} > /dev/null || exit 1 192 ${kadmin} -l cpw --random-password user@${R} > /dev/null || exit 1 236 ${kadmin} -l cpw --random-password user@${R} > /dev/null || exit 1
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_ttls.c | 249 u8 *password = dpos; local 252 password[password_len - 1] == '\0') { 257 password, password_len); 258 parse->user_password = password; 630 if (!sm->user || !sm->user->password || sm->user->password_hash || 633 "password configured"); 639 os_memcmp(sm->user->password, user_password, user_password_len) != 641 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); 646 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password"); 656 const u8 *password, 652 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument [all...] |
H A D | eap_server_md5.c | 111 if (sm->user == NULL || sm->user->password == NULL || 113 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 127 chap_md5(id, sm->user->password, sm->user->password_len,
|
H A D | eap.h | 37 u8 *password; member in struct:eap_user 39 int password_hash; /* whether password is hashed with
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_config.h | 53 * password - Password string for EAP 55 * This field can include either the plaintext password (default 57 * presentation of the password) if flags field has 68 u8 *password; member in struct:eap_peer_config 71 * password_len - Length of password field 511 * otp - One-time-password 533 * pending_req_password - Whether there is a pending password request 551 * pending_req_new_password - Pending password update request 603 * new_password - New password for password updat [all...] |
/freebsd-9.3-release/crypto/heimdal/appl/ftp/ftpd/ |
H A D | extern.h | 121 int klogin(char *name, char *password);
|
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/ |
H A D | test_ntlm.c | 53 *password = "digestpassword"; local 120 heim_ntlm_nt_key(password, &key); 180 *password = "digestpassword"; local 245 heim_ntlm_nt_key(password, &key);
|
/freebsd-9.3-release/crypto/heimdal/lib/ntlm/ |
H A D | test_ntlm.c | 51 *password = "digestpassword", local 121 heim_ntlm_nt_key(password, &key); 189 *password = "test1234", local 209 heim_ntlm_nt_key(password, &key);
|
/freebsd-9.3-release/contrib/cvs/src/ |
H A D | root.c | 302 newroot->password = NULL; 327 if (root->password != NULL) 330 memset (root->password, 0, strlen (root->password)); 331 free (root->password); 347 * :(gserver|kserver|pserver):[[user][:password]@]host[:[port]]/path 375 * [[user][:password]@]host[:[port]] 398 * "cvs -d :(gserver|kserver|pserver):[[user][:password]@]host[:[port]]/path", 472 /* split the string into [[user][:password]@]host[:[port]] & /path 481 ":(gserver|kserver|pserver):[[user][:password] [all...] |
/freebsd-9.3-release/contrib/ntp/libntp/ |
H A D | machines.c | 518 static char password[32]; local 523 for (i=0; i<sizeof(password)-1 && ((c=_getch())!='\n' && c!='\r'); i++) { 524 password[i] = (char) c; 526 password[i] = '\0'; 531 return password;
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 187 /* This defines the Andrew string_to_key function. It accepts a password 190 * service password database. 201 char password[8+1]; /* crypt is limited to 8 chars anyway */ local 208 password[i] = c ? c : 'X'; 210 password[8] = '\0'; 212 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock)); 233 char password[512]; local 236 memcpy(password, pw.data, min(pw.length, sizeof(password))); 237 if(pw.length < sizeof(password)) { 265 DES_AFS3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 318 krb5_DES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 418 DES3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 482 DES3_string_to_key_derived(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 557 ARCFOUR_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 604 AES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 932 krb5_string_to_key_data(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_principal principal, krb5_keyblock *key) argument 950 krb5_string_to_key(krb5_context context, krb5_enctype enctype, const char *password, krb5_principal principal, krb5_keyblock *key) argument 963 krb5_string_to_key_data_salt(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_keyblock *key) argument 982 krb5_string_to_key_data_salt_opaque(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 1012 krb5_string_to_key_salt(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_keyblock *key) argument 1025 krb5_string_to_key_salt_opaque(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument [all...] |
H A D | init_creds_pw.c | 52 const char *password; member in struct:krb5_get_init_creds_ctx 68 krb5_data password; local 71 password.data = rk_UNCONST(keyseed); 72 password.length = strlen(keyseed); 81 ret = krb5_string_to_key_data_salt_opaque(context, type, password, 237 "Your password will expire at ", 255 "Your password/account will expire at ", 285 ctx->password = options->opt_private->password; 373 const char *password, 371 change_password(krb5_context context, krb5_principal client, const char *password, char *newpw, size_t newpw_sz, krb5_prompter_fct prompter, void *data, krb5_get_init_creds_opt *old_options) argument 1536 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *in_options) argument [all...] |
H A D | test_crypto.c | 95 const char *password, 116 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 93 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | string-to-key-test.c | 42 const char *password; member in struct:testcase 69 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES_CBC_MD5, 81 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES3_CBC_SHA1, 117 ret = krb5_string_to_key (context, t->enctype, t->password, 126 t->principal_name, t->password);
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | sshconnect2.c | 354 {"password", 890 char *password; local 900 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password: ", 902 password = read_passphrase(prompt, 0); 908 packet_put_cstring(password); 909 explicit_bzero(password, strlen(password)); 910 free(password); 928 char *info, *lang, *password = NULL, *retype = NULL; local 951 "Enter %.30s@%.128s's old password [all...] |
H A D | sshconnect1.c | 452 char *password; local 454 debug("Doing password authentication."); 460 password = read_passphrase(prompt, 0); 462 ssh_put_password(password); 463 explicit_bzero(password, strlen(password)); 464 free(password); 690 * needed (the user has no password). Otherwise the server responds 739 /* Try password authentication if the server supports it. */ 744 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/auth/sia/ |
H A D | sia.c | 93 e->password = malloc(SIAMXPASSWORD + 1); 94 if(e->password == NULL){ 99 p->result = (unsigned char*)e->password; 190 entity->password, 1, NULL); 209 entity->password, secure, NULL); 256 if(entity->password == NULL){ 283 if(entity->password == NULL || strlen(entity->password) > SIAMXPASSWORD){ 284 SIA_DEBUG(("DEBUG", "entity->password is null")); 472 prompt.prompt = (unsigned char*)"Old password [all...] |
/freebsd-9.3-release/crypto/heimdal/tests/gss/ |
H A D | check-spnego.in | 119 ${kinit} --password-file=${objdir}/foopassword user1@${R} || exitcode=1 121 ${kinitds} --password-file=${objdir}/barpassword digestserver@${R} || exitcode=1
|
/freebsd-9.3-release/sys/boot/ia64/common/ |
H A D | Makefile | 37 FILES+= beastie.4th brand.4th check-password.4th color.4th delay.4th
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | init.c | 52 const char *password; local 56 password = pwbuf; 78 /* Create the entry with a random password */ 79 ret = kadm5_create_principal(kadm_handle, &ent, mask, password); 187 * The Windows XP (at least) password changing protocol
|