Searched refs:password (Results 76 - 100 of 187) sorted by relevance

12345678

/freebsd-9.3-release/crypto/heimdal/lib/kadm5/
H A Dinit_s.c87 const char *password,
105 const char *password,
121 password,
85 kadm5_s_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
104 kadm5_s_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
H A Dad.c482 ad_get_cred(kadm5_ad_context *context, const char *password) argument
499 password, krb5_prompter_posix,
511 const char *password)
527 password,
565 const char *password)
1248 char *password; local
1256 plen = base64_encode(p, sizeof(p), &password);
1263 free(password);
1272 password,
1292 password,
509 kadm5_ad_chpass_principal(void *server_handle, krb5_principal principal, const char *password) argument
562 kadm5_ad_create_principal(void *server_handle, kadm5_principal_ent_t entry, uint32_t mask, const char *password) argument
1356 kadm5_ad_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
1419 kadm5_ad_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
[all...]
H A Dset_keys.c39 * Set the keys of `ent' to the string-to-key of `password'
45 const char *password)
53 password, &keys, &num_keys);
64 "kadmin", "save-password", NULL))
67 ent, password);
43 _kadm5_set_keys(kadm5_server_context *context, hdb_entry *ent, const char *password) argument
/freebsd-9.3-release/crypto/heimdal/tests/kdc/
H A Dcheck-digest.in65 password=foobarbaz
85 ${kadmin} add -p $password --use-defaults ${server}@${R} || exit 1
93 echo $password > ${objdir}/foopassword
110 ${kinit} --password-file=${objdir}/foopassword ${server}@$R || exitcode=1
180 --password="$userpassword" \
248 --password="$userpassword" \
H A Dcheck-kadmin.in104 ${kinit} --password-file=${objdir}/foopassword \
120 ${kinit} --password-file=${objdir}/foopassword \
H A Dcheck-iprop.in152 ${kadmin} -l cpw --random-password user@${R} > /dev/null || exit 1
153 ${kadmin} -l cpw --random-password user@${R} > /dev/null || exit 1
192 ${kadmin} -l cpw --random-password user@${R} > /dev/null || exit 1
236 ${kadmin} -l cpw --random-password user@${R} > /dev/null || exit 1
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Deap_server_ttls.c249 u8 *password = dpos; local
252 password[password_len - 1] == '\0') {
257 password, password_len);
258 parse->user_password = password;
630 if (!sm->user || !sm->user->password || sm->user->password_hash ||
633 "password configured");
639 os_memcmp(sm->user->password, user_password, user_password_len) !=
641 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
646 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password");
656 const u8 *password,
652 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument
[all...]
H A Deap_server_md5.c111 if (sm->user == NULL || sm->user->password == NULL ||
113 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
127 chap_md5(id, sm->user->password, sm->user->password_len,
H A Deap.h37 u8 *password; member in struct:eap_user
39 int password_hash; /* whether password is hashed with
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap_config.h53 * password - Password string for EAP
55 * This field can include either the plaintext password (default
57 * presentation of the password) if flags field has
68 u8 *password; member in struct:eap_peer_config
71 * password_len - Length of password field
511 * otp - One-time-password
533 * pending_req_password - Whether there is a pending password request
551 * pending_req_new_password - Pending password update request
603 * new_password - New password for password updat
[all...]
/freebsd-9.3-release/crypto/heimdal/appl/ftp/ftpd/
H A Dextern.h121 int klogin(char *name, char *password);
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/
H A Dtest_ntlm.c53 *password = "digestpassword"; local
120 heim_ntlm_nt_key(password, &key);
180 *password = "digestpassword"; local
245 heim_ntlm_nt_key(password, &key);
/freebsd-9.3-release/crypto/heimdal/lib/ntlm/
H A Dtest_ntlm.c51 *password = "digestpassword", local
121 heim_ntlm_nt_key(password, &key);
189 *password = "test1234", local
209 heim_ntlm_nt_key(password, &key);
/freebsd-9.3-release/contrib/cvs/src/
H A Droot.c302 newroot->password = NULL;
327 if (root->password != NULL)
330 memset (root->password, 0, strlen (root->password));
331 free (root->password);
347 * :(gserver|kserver|pserver):[[user][:password]@]host[:[port]]/path
375 * [[user][:password]@]host[:[port]]
398 * "cvs -d :(gserver|kserver|pserver):[[user][:password]@]host[:[port]]/path",
472 /* split the string into [[user][:password]@]host[:[port]] & /path
481 ":(gserver|kserver|pserver):[[user][:password]
[all...]
/freebsd-9.3-release/contrib/ntp/libntp/
H A Dmachines.c518 static char password[32]; local
523 for (i=0; i<sizeof(password)-1 && ((c=_getch())!='\n' && c!='\r'); i++) {
524 password[i] = (char) c;
526 password[i] = '\0';
531 return password;
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dcrypto.c187 /* This defines the Andrew string_to_key function. It accepts a password
190 * service password database.
201 char password[8+1]; /* crypt is limited to 8 chars anyway */ local
208 password[i] = c ? c : 'X';
210 password[8] = '\0';
212 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock));
233 char password[512]; local
236 memcpy(password, pw.data, min(pw.length, sizeof(password)));
237 if(pw.length < sizeof(password)) {
265 DES_AFS3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
318 krb5_DES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
418 DES3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
482 DES3_string_to_key_derived(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
557 ARCFOUR_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
604 AES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
932 krb5_string_to_key_data(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_principal principal, krb5_keyblock *key) argument
950 krb5_string_to_key(krb5_context context, krb5_enctype enctype, const char *password, krb5_principal principal, krb5_keyblock *key) argument
963 krb5_string_to_key_data_salt(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_keyblock *key) argument
982 krb5_string_to_key_data_salt_opaque(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
1012 krb5_string_to_key_salt(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_keyblock *key) argument
1025 krb5_string_to_key_salt_opaque(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
[all...]
H A Dinit_creds_pw.c52 const char *password; member in struct:krb5_get_init_creds_ctx
68 krb5_data password; local
71 password.data = rk_UNCONST(keyseed);
72 password.length = strlen(keyseed);
81 ret = krb5_string_to_key_data_salt_opaque(context, type, password,
237 "Your password will expire at ",
255 "Your password/account will expire at ",
285 ctx->password = options->opt_private->password;
373 const char *password,
371 change_password(krb5_context context, krb5_principal client, const char *password, char *newpw, size_t newpw_sz, krb5_prompter_fct prompter, void *data, krb5_get_init_creds_opt *old_options) argument
1536 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *in_options) argument
[all...]
H A Dtest_crypto.c95 const char *password,
116 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
93 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dstring-to-key-test.c42 const char *password; member in struct:testcase
69 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES_CBC_MD5,
81 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES3_CBC_SHA1,
117 ret = krb5_string_to_key (context, t->enctype, t->password,
126 t->principal_name, t->password);
/freebsd-9.3-release/crypto/openssh/
H A Dsshconnect2.c354 {"password",
890 char *password; local
900 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password: ",
902 password = read_passphrase(prompt, 0);
908 packet_put_cstring(password);
909 explicit_bzero(password, strlen(password));
910 free(password);
928 char *info, *lang, *password = NULL, *retype = NULL; local
951 "Enter %.30s@%.128s's old password
[all...]
H A Dsshconnect1.c452 char *password; local
454 debug("Doing password authentication.");
460 password = read_passphrase(prompt, 0);
462 ssh_put_password(password);
463 explicit_bzero(password, strlen(password));
464 free(password);
690 * needed (the user has no password). Otherwise the server responds
739 /* Try password authentication if the server supports it. */
744 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/auth/sia/
H A Dsia.c93 e->password = malloc(SIAMXPASSWORD + 1);
94 if(e->password == NULL){
99 p->result = (unsigned char*)e->password;
190 entity->password, 1, NULL);
209 entity->password, secure, NULL);
256 if(entity->password == NULL){
283 if(entity->password == NULL || strlen(entity->password) > SIAMXPASSWORD){
284 SIA_DEBUG(("DEBUG", "entity->password is null"));
472 prompt.prompt = (unsigned char*)"Old password
[all...]
/freebsd-9.3-release/crypto/heimdal/tests/gss/
H A Dcheck-spnego.in119 ${kinit} --password-file=${objdir}/foopassword user1@${R} || exitcode=1
121 ${kinitds} --password-file=${objdir}/barpassword digestserver@${R} || exitcode=1
/freebsd-9.3-release/sys/boot/ia64/common/
H A DMakefile37 FILES+= beastie.4th brand.4th check-password.4th color.4th delay.4th
/freebsd-9.3-release/crypto/heimdal/kadmin/
H A Dinit.c52 const char *password; local
56 password = pwbuf;
78 /* Create the entry with a random password */
79 ret = kadm5_create_principal(kadm_handle, &ent, mask, password);
187 * The Windows XP (at least) password changing protocol

Completed in 197 milliseconds

12345678