/macosx-10.10/iodbc-42.5/iodbc/drvproxy/gtk/ |
H A D | gui.h | 84 GtkWidget *username, *password, *mainwnd; member in struct:TLOGIN
|
/macosx-10.10/security_systemkeychain-55202/src/ |
H A D | TokenIDHelper.h | 45 int unlockToken(const char *password);
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/mech/ |
H A D | gss_acquire_cred_with_password.c | 38 const gss_buffer_t password, 52 password, 77 password, 36 gss_acquire_cred_with_password(OM_uint32 *minor_status, const gss_name_t desired_name, const gss_buffer_t password, OM_uint32 time_req, const gss_OID_set desired_mechs, gss_cred_usage_t cred_usage, gss_cred_id_t *output_cred_handle, gss_OID_set *actual_mechs, OM_uint32 *time_rec) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | salt-aes.c | 41 krb5_data password, 77 ret = PKCS5_PBKDF2_HMAC_SHA1(password.data, password.length, 39 AES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
|
H A D | salt.c | 136 krb5_data password, 146 ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); 154 const char *password, 159 pw.data = rk_UNCONST(password); 160 pw.length = strlen(password); 167 krb5_data password, 173 return krb5_string_to_key_data_salt_opaque(context, enctype, password, 179 * `password' (with salt `salt' and the enctype specific data string 186 krb5_data password, 201 return (*st->string_to_key)(context, enctype, password, 134 krb5_string_to_key_data(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_principal principal, krb5_keyblock *key) argument 152 krb5_string_to_key(krb5_context context, krb5_enctype enctype, const char *password, krb5_principal principal, krb5_keyblock *key) argument 165 krb5_string_to_key_data_salt(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_keyblock *key) argument 184 krb5_string_to_key_data_salt_opaque(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 216 krb5_string_to_key_salt(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_keyblock *key) argument 229 krb5_string_to_key_salt_opaque(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/ |
H A D | acl_password.cpp | 26 // acl_password - password-based ACL subject types 43 return false; // no password in sample 58 // the password itself is private and not exported to CSSM 74 ListElement *password; local 75 crack(list, 1, &password, CSSM_LIST_ELEMENT_DATUM); 76 return new PasswordAclSubject(alloc, password->data());
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/ |
H A D | acl_password.cpp | 26 // acl_password - password-based ACL subject types 43 return false; // no password in sample 58 // the password itself is private and not exported to CSSM 74 ListElement *password; local 75 crack(list, 1, &password, CSSM_LIST_ELEMENT_DATUM); 76 return new PasswordAclSubject(alloc, password->data());
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecPBKDF.c | 52 void SecKeyFromPassphraseDataHMACSHA1(CFDataRef password, CFDataRef salt, uint32_t interationCount, CFMutableDataRef derivedKey) argument 54 pbkdf2_hmac_sha1(CFDataGetBytePtr(password), CFDataGetLength(password),
|
H A D | SecSharedCredential.c | 36 OSStatus SecAddSharedWebCredentialSync(CFStringRef fqdn, CFStringRef account, CFStringRef password, CFErrorRef *error); 42 CFStringRef password, 55 if (password) { 57 CFDictionaryAddValue(args, kSecSharedPassword, password); 59 CFDictionaryAddValue(args, CFSTR("spwd"), password); 92 CFStringRef password, 105 else if (password && CFGetTypeID(password) != CFStringGetTypeID()) { 106 errStr = CFSTR("non-nil password was not of type CFString"); 122 __block CFStringRef passwordStr = CFRetainSafe(password); 40 SecAddSharedWebCredentialSync(CFStringRef fqdn, CFStringRef account, CFStringRef password, CFErrorRef *error) argument 90 SecAddSharedWebCredential(CFStringRef fqdn, CFStringRef account, CFStringRef password, void (^completionHandler)(CFErrorRef error)) argument 247 CFStringRef password = NULL; local [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/regressions/kc/ |
H A D | kc-23-item-notify.c | 13 static char password[] = "password"; variable 26 sizeof(password), password, 28 "add generic password, wait for callback");
|
/macosx-10.10/ruby-106/ruby/lib/webrick/httpauth/ |
H A D | basicauth.rb | 27 # htpasswd.set_passwd config[:Realm], 'username', 'password' 40 # Used by UserDB to create a basic password entry 73 userid, password = basic_credentials.unpack("m*")[0].split(":", 2) 74 password ||= "" 83 if password.crypt(encpass) != encpass 84 error("%s: password unmatch.", userid)
|
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/sasl/ |
H A D | sasl.tcl | 246 # to the plaintext password. 258 set password [eval $ctx(callback) [list $context password]] 260 set reply [hmac_hex $password $challenge] 280 set pass [eval $ctx(callback) [list $context password $user $ctx(realm)]] 304 # authentication ID and password are all transmitted in plain 313 set password [eval $ctx(callback) [list $context password]] 314 set ctx(response) "$authzid\x00$username\x00$password" 326 set check [eval $ctx(callback) [list $context password [all...] |
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | mschap.c | 43 password_to_unicode(const uint8_t * password, uint32_t password_len, argument 53 unicode_password[i * 2] = password[i]; 59 NTPasswordHash(const uint8_t * password, uint32_t password_len, argument 62 CC_MD4(password, password_len, hash); 67 NTPasswordHashHash(const uint8_t * password, uint32_t password_len, argument 72 NTPasswordHash(password, password_len, hash); 79 const uint8_t * password, uint32_t password_len, 84 NTPasswordHash(password, password_len, hash); 91 const uint8_t * password, 97 NTPasswordHashHash(password, password_le 78 NTChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument 90 NTMPPEChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_CHALLENGE_SIZE]) argument 162 GenerateAuthResponse(uint8_t * password, uint32_t password_len, const uint8_t nt_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, uint8_t auth_response[MSCHAP2_AUTH_RESPONSE_SIZE]) argument 219 NTSessionKey16(const uint8_t * password, uint32_t password_len, const uint8_t client_challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t server_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t server_challenge[MSCHAP_NT_CHALLENGE_SIZE], uint8_t key[NT_SESSION_KEY_SIZE]) argument 256 MSChap(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument 269 MSChap_MPPE(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument 282 MSChap2(const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument 300 MSChap2AuthResponseValid(const uint8_t * password, uint32_t password_len, const uint8_t nt_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, const uint8_t response[MSCHAP2_AUTH_RESPONSE_SIZE]) argument 347 EncryptPwBlockWithPasswordHash(const uint8_t * password, uint32_t password_len, const uint8_t pw_hash[NT_PASSWORD_HASH_SIZE], NTPasswordBlockRef pwblock) argument 524 MSChap2_MPPEGetMasterKey(const uint8_t * password, uint32_t password_len, const uint8_t NTResponse[MSCHAP_NT_RESPONSE_SIZE], uint8_t MasterKey[NT_MASTER_KEY_SIZE]) argument 594 const char * password = "clientPass"; variable [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_httpform.c | 220 * with the actual username and password. 233 const char *password, 254 password = url_escape(password); 255 if (!password) { 266 memset(password, 0, strlen(password)); 267 free(password); 274 plen = strlen(password); 317 memcpy(buf_ptr, password, ple 226 create_post_data( const char *formdata, const char *user, const char *password, const char *realm ) argument 492 auth_httpform( const char *user, const char *password, const char *service, const char *realm ) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/tests/apple/ |
H A D | check-apple-ad.in | 60 dsconfigad -add $R -force -user bind -password apple || { echo "join failed" ; exit 1; } 128 echo "test change password" 131 ${kinit} --password-file=${testdir}/foopassword da3admin@ADS.APPLE.COM || exit 1 135 echo "Changing password using admin" 137 expect New password 139 expect New password 152 echo "Changing password using regular account" 155 password ${oldpw}\n 156 expect New password 158 expect New password [all...] |
/macosx-10.10/Heimdal-398.1.2/tests/kdc/ |
H A D | check-referral.in | 119 ${kinit} --password-file=${objdir}/foopassword bar@${R} || \ 127 ${kinit} --password-file=${objdir}/foopassword 'baz\@realm.foo@'${R} || \ 139 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \ 148 --password-file=${objdir}/foopassword foo@${R} || \ 157 --password-file=${objdir}/foopassword foo@${R} || \ 167 --password-file=${objdir}/foopassword alias2@${R}@${R} || \ 175 ${kinit} --password-file=${objdir}/foopassword \ 182 --password-file=${objdir}/foopassword \ 193 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \ 204 ${kinit} --password [all...] |
H A D | check-kpasswdd.in | 127 ${kinit} --password-file=${testdir}/foopassword foo@$R || \ 141 echo "Changing password" 144 password foo\n 145 expect New password 147 expect New password 161 ${kinit} --password-file=${testdir}/barpassword foo@$R || \ 176 password foo\n 177 expect New password 179 expect New password 191 ${kinit} --password [all...] |
/macosx-10.10/MITKerberosShim-66/test/ |
H A D | test-kll2.c | 51 char *password; local 58 password = strdup(argv[2]); 72 ret = KLAcquireNewInitialTicketsWithPassword(princ, NULL, password, NULL); 101 ret = KLAcquireNewInitialTicketsWithPassword(princ, options, password, NULL); 151 ret = KLDisposeString(password);
|
/macosx-10.10/OpenPAM-20/openpam/modules/pam_unix/ |
H A D | pam_unix.c | 77 char *crypt_password, *password; local 89 /* get password */ 101 (const char **)&password, NULL); 107 password = resp->resp; 123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL || 129 free(password);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/ |
H A D | si-33-keychain-backup.c | 36 static CFDataRef create_keybag(keybag_handle_t bag_type, CFDataRef password) argument 69 CFDataRef keybag = NULL, password = NULL; local 71 keybag = create_keybag(kAppleKeyStoreAsymmetricBackupBag, password); 76 ok_status(SecItemAdd(query, NULL), "add internet password"); 83 ok_status(_SecKeychainBackupSyncable(keybag, password, NULL, &backup), "export items"); 89 ok_status(_SecKeychainRestoreSyncable(keybag, password, backup), "import items");
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/efl/ |
H A D | ewk_auth_request.cpp | 112 bool EwkAuthRequest::authenticate(const char* username, const char* password) argument 119 WKRetainPtr<WKStringRef> wkPassword(AdoptWK, WKStringCreateWithUTF8CString(password)); 146 Eina_Bool ewk_auth_request_authenticate(Ewk_Auth_Request* request, const char* username, const char* password) argument 150 EINA_SAFETY_ON_NULL_RETURN_VAL(password, false); 152 return impl->authenticate(username, password);
|
/macosx-10.10/ruby-106/ruby/lib/net/ |
H A D | pop.rb | 186 # 'Your account', 'Your password') do |pop| 246 # Net::POP3.start(address, port, account, password) do |pop| 263 account = nil, password = nil, 265 start(address, port, account, password, isapop) {|pop| 284 account = nil, password = nil, 286 start(address, port, account, password, isapop) {|pop| 306 account = nil, password = nil, 308 new(address, port, isapop).auth_only account, password 314 def auth_only(account, password) 316 start(account, password) { [all...] |
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/examples/sasl/ |
H A D | saslclient.tcl | 18 array set user {username "" password ""} 27 set user(password) $env(http_proxy_pass) 41 # password users authentication token 56 password { 57 return $user(password) 201 if {$passwd ne {}} {set user(password) $passwd}
|
/macosx-10.10/postfix-255/postfix/src/smtp/ |
H A D | smtp_sasl_auth_cache.c | 39 /* entry exists for the given host, username and password. 152 * cache value contains a time stamp, a hashed password, and the server 155 * password has changed. 168 /* smtp_sasl_auth_cache_make_pass - hash the auth failure cache password */ 170 static char *smtp_sasl_auth_cache_make_pass(const char *password) argument 174 base64_encode(buf, (const char *) SHA1((const unsigned char *) password, 175 strlen(password), 0), 182 static char *smtp_sasl_auth_cache_make_value(const char *password, argument 190 pwd_hash = smtp_sasl_auth_cache_make_pass(password); 200 const char *password) 198 smtp_sasl_auth_cache_valid_value(SMTP_SASL_AUTH_CACHE *auth_cache, const char *entry, const char *password) argument [all...] |
/macosx-10.10/tcl-105/tcl_ext/expect/expect/example/ |
H A D | tkpasswd | 82 entry .password -textvar password -relief sunken -width 1 83 focus .password 84 bind .password <Return> password_set 88 pack .prompt .password -in .password_frame -fill x -padx 2 -pady 2 110 Enter password or press ^G to generate a random password.\ 112 Press return to set the password.\ 113 If the dictionary is enabled and the password is in it,\ 114 the password i [all...] |