Searched refs:password (Results 101 - 125 of 773) sorted by relevance

1234567891011>>

/macosx-10.10/iodbc-42.5/iodbc/drvproxy/gtk/
H A Dgui.h84 GtkWidget *username, *password, *mainwnd; member in struct:TLOGIN
/macosx-10.10/security_systemkeychain-55202/src/
H A DTokenIDHelper.h45 int unlockToken(const char *password);
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/mech/
H A Dgss_acquire_cred_with_password.c38 const gss_buffer_t password,
52 password,
77 password,
36 gss_acquire_cred_with_password(OM_uint32 *minor_status, const gss_name_t desired_name, const gss_buffer_t password, OM_uint32 time_req, const gss_OID_set desired_mechs, gss_cred_usage_t cred_usage, gss_cred_id_t *output_cred_handle, gss_OID_set *actual_mechs, OM_uint32 *time_rec) argument
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dsalt-aes.c41 krb5_data password,
77 ret = PKCS5_PBKDF2_HMAC_SHA1(password.data, password.length,
39 AES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
H A Dsalt.c136 krb5_data password,
146 ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key);
154 const char *password,
159 pw.data = rk_UNCONST(password);
160 pw.length = strlen(password);
167 krb5_data password,
173 return krb5_string_to_key_data_salt_opaque(context, enctype, password,
179 * `password' (with salt `salt' and the enctype specific data string
186 krb5_data password,
201 return (*st->string_to_key)(context, enctype, password,
134 krb5_string_to_key_data(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_principal principal, krb5_keyblock *key) argument
152 krb5_string_to_key(krb5_context context, krb5_enctype enctype, const char *password, krb5_principal principal, krb5_keyblock *key) argument
165 krb5_string_to_key_data_salt(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_keyblock *key) argument
184 krb5_string_to_key_data_salt_opaque(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
216 krb5_string_to_key_salt(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_keyblock *key) argument
229 krb5_string_to_key_salt_opaque(krb5_context context, krb5_enctype enctype, const char *password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/
H A Dacl_password.cpp26 // acl_password - password-based ACL subject types
43 return false; // no password in sample
58 // the password itself is private and not exported to CSSM
74 ListElement *password; local
75 crack(list, 1, &password, CSSM_LIST_ELEMENT_DATUM);
76 return new PasswordAclSubject(alloc, password->data());
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/
H A Dacl_password.cpp26 // acl_password - password-based ACL subject types
43 return false; // no password in sample
58 // the password itself is private and not exported to CSSM
74 ListElement *password; local
75 crack(list, 1, &password, CSSM_LIST_ELEMENT_DATUM);
76 return new PasswordAclSubject(alloc, password->data());
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecPBKDF.c52 void SecKeyFromPassphraseDataHMACSHA1(CFDataRef password, CFDataRef salt, uint32_t interationCount, CFMutableDataRef derivedKey) argument
54 pbkdf2_hmac_sha1(CFDataGetBytePtr(password), CFDataGetLength(password),
H A DSecSharedCredential.c36 OSStatus SecAddSharedWebCredentialSync(CFStringRef fqdn, CFStringRef account, CFStringRef password, CFErrorRef *error);
42 CFStringRef password,
55 if (password) {
57 CFDictionaryAddValue(args, kSecSharedPassword, password);
59 CFDictionaryAddValue(args, CFSTR("spwd"), password);
92 CFStringRef password,
105 else if (password && CFGetTypeID(password) != CFStringGetTypeID()) {
106 errStr = CFSTR("non-nil password was not of type CFString");
122 __block CFStringRef passwordStr = CFRetainSafe(password);
40 SecAddSharedWebCredentialSync(CFStringRef fqdn, CFStringRef account, CFStringRef password, CFErrorRef *error) argument
90 SecAddSharedWebCredential(CFStringRef fqdn, CFStringRef account, CFStringRef password, void (^completionHandler)(CFErrorRef error)) argument
247 CFStringRef password = NULL; local
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/regressions/kc/
H A Dkc-23-item-notify.c13 static char password[] = "password"; variable
26 sizeof(password), password,
28 "add generic password, wait for callback");
/macosx-10.10/ruby-106/ruby/lib/webrick/httpauth/
H A Dbasicauth.rb27 # htpasswd.set_passwd config[:Realm], 'username', 'password'
40 # Used by UserDB to create a basic password entry
73 userid, password = basic_credentials.unpack("m*")[0].split(":", 2)
74 password ||= ""
83 if password.crypt(encpass) != encpass
84 error("%s: password unmatch.", userid)
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/sasl/
H A Dsasl.tcl246 # to the plaintext password.
258 set password [eval $ctx(callback) [list $context password]]
260 set reply [hmac_hex $password $challenge]
280 set pass [eval $ctx(callback) [list $context password $user $ctx(realm)]]
304 # authentication ID and password are all transmitted in plain
313 set password [eval $ctx(callback) [list $context password]]
314 set ctx(response) "$authzid\x00$username\x00$password"
326 set check [eval $ctx(callback) [list $context password
[all...]
/macosx-10.10/eap8021x-198/EAP8021X.fproj/
H A Dmschap.c43 password_to_unicode(const uint8_t * password, uint32_t password_len, argument
53 unicode_password[i * 2] = password[i];
59 NTPasswordHash(const uint8_t * password, uint32_t password_len, argument
62 CC_MD4(password, password_len, hash);
67 NTPasswordHashHash(const uint8_t * password, uint32_t password_len, argument
72 NTPasswordHash(password, password_len, hash);
79 const uint8_t * password, uint32_t password_len,
84 NTPasswordHash(password, password_len, hash);
91 const uint8_t * password,
97 NTPasswordHashHash(password, password_le
78 NTChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument
90 NTMPPEChallengeResponse(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_CHALLENGE_SIZE]) argument
162 GenerateAuthResponse(uint8_t * password, uint32_t password_len, const uint8_t nt_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, uint8_t auth_response[MSCHAP2_AUTH_RESPONSE_SIZE]) argument
219 NTSessionKey16(const uint8_t * password, uint32_t password_len, const uint8_t client_challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t server_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t server_challenge[MSCHAP_NT_CHALLENGE_SIZE], uint8_t key[NT_SESSION_KEY_SIZE]) argument
256 MSChap(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument
269 MSChap_MPPE(const uint8_t challenge[MSCHAP_NT_CHALLENGE_SIZE], const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument
282 MSChap2(const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, const uint8_t * password, uint32_t password_len, uint8_t response[MSCHAP_NT_RESPONSE_SIZE]) argument
300 MSChap2AuthResponseValid(const uint8_t * password, uint32_t password_len, const uint8_t nt_response[MSCHAP_NT_RESPONSE_SIZE], const uint8_t peer_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t auth_challenge[MSCHAP2_CHALLENGE_SIZE], const uint8_t * username, const uint8_t response[MSCHAP2_AUTH_RESPONSE_SIZE]) argument
347 EncryptPwBlockWithPasswordHash(const uint8_t * password, uint32_t password_len, const uint8_t pw_hash[NT_PASSWORD_HASH_SIZE], NTPasswordBlockRef pwblock) argument
524 MSChap2_MPPEGetMasterKey(const uint8_t * password, uint32_t password_len, const uint8_t NTResponse[MSCHAP_NT_RESPONSE_SIZE], uint8_t MasterKey[NT_MASTER_KEY_SIZE]) argument
594 const char * password = "clientPass"; variable
[all...]
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/
H A Dauth_httpform.c220 * with the actual username and password.
233 const char *password,
254 password = url_escape(password);
255 if (!password) {
266 memset(password, 0, strlen(password));
267 free(password);
274 plen = strlen(password);
317 memcpy(buf_ptr, password, ple
226 create_post_data( const char *formdata, const char *user, const char *password, const char *realm ) argument
492 auth_httpform( const char *user, const char *password, const char *service, const char *realm ) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/tests/apple/
H A Dcheck-apple-ad.in60 dsconfigad -add $R -force -user bind -password apple || { echo "join failed" ; exit 1; }
128 echo "test change password"
131 ${kinit} --password-file=${testdir}/foopassword da3admin@ADS.APPLE.COM || exit 1
135 echo "Changing password using admin"
137 expect New password
139 expect New password
152 echo "Changing password using regular account"
155 password ${oldpw}\n
156 expect New password
158 expect New password
[all...]
/macosx-10.10/Heimdal-398.1.2/tests/kdc/
H A Dcheck-referral.in119 ${kinit} --password-file=${objdir}/foopassword bar@${R} || \
127 ${kinit} --password-file=${objdir}/foopassword 'baz\@realm.foo@'${R} || \
139 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \
148 --password-file=${objdir}/foopassword foo@${R} || \
157 --password-file=${objdir}/foopassword foo@${R} || \
167 --password-file=${objdir}/foopassword alias2@${R}@${R} || \
175 ${kinit} --password-file=${objdir}/foopassword \
182 --password-file=${objdir}/foopassword \
193 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \
204 ${kinit} --password
[all...]
H A Dcheck-kpasswdd.in127 ${kinit} --password-file=${testdir}/foopassword foo@$R || \
141 echo "Changing password"
144 password foo\n
145 expect New password
147 expect New password
161 ${kinit} --password-file=${testdir}/barpassword foo@$R || \
176 password foo\n
177 expect New password
179 expect New password
191 ${kinit} --password
[all...]
/macosx-10.10/MITKerberosShim-66/test/
H A Dtest-kll2.c51 char *password; local
58 password = strdup(argv[2]);
72 ret = KLAcquireNewInitialTicketsWithPassword(princ, NULL, password, NULL);
101 ret = KLAcquireNewInitialTicketsWithPassword(princ, options, password, NULL);
151 ret = KLDisposeString(password);
/macosx-10.10/OpenPAM-20/openpam/modules/pam_unix/
H A Dpam_unix.c77 char *crypt_password, *password; local
89 /* get password */
101 (const char **)&password, NULL);
107 password = resp->resp;
123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL ||
129 free(password);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/
H A Dsi-33-keychain-backup.c36 static CFDataRef create_keybag(keybag_handle_t bag_type, CFDataRef password) argument
69 CFDataRef keybag = NULL, password = NULL; local
71 keybag = create_keybag(kAppleKeyStoreAsymmetricBackupBag, password);
76 ok_status(SecItemAdd(query, NULL), "add internet password");
83 ok_status(_SecKeychainBackupSyncable(keybag, password, NULL, &backup), "export items");
89 ok_status(_SecKeychainRestoreSyncable(keybag, password, backup), "import items");
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/efl/
H A Dewk_auth_request.cpp112 bool EwkAuthRequest::authenticate(const char* username, const char* password) argument
119 WKRetainPtr<WKStringRef> wkPassword(AdoptWK, WKStringCreateWithUTF8CString(password));
146 Eina_Bool ewk_auth_request_authenticate(Ewk_Auth_Request* request, const char* username, const char* password) argument
150 EINA_SAFETY_ON_NULL_RETURN_VAL(password, false);
152 return impl->authenticate(username, password);
/macosx-10.10/ruby-106/ruby/lib/net/
H A Dpop.rb186 # 'Your account', 'Your password') do |pop|
246 # Net::POP3.start(address, port, account, password) do |pop|
263 account = nil, password = nil,
265 start(address, port, account, password, isapop) {|pop|
284 account = nil, password = nil,
286 start(address, port, account, password, isapop) {|pop|
306 account = nil, password = nil,
308 new(address, port, isapop).auth_only account, password
314 def auth_only(account, password)
316 start(account, password) {
[all...]
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/examples/sasl/
H A Dsaslclient.tcl18 array set user {username "" password ""}
27 set user(password) $env(http_proxy_pass)
41 # password users authentication token
56 password {
57 return $user(password)
201 if {$passwd ne {}} {set user(password) $passwd}
/macosx-10.10/postfix-255/postfix/src/smtp/
H A Dsmtp_sasl_auth_cache.c39 /* entry exists for the given host, username and password.
152 * cache value contains a time stamp, a hashed password, and the server
155 * password has changed.
168 /* smtp_sasl_auth_cache_make_pass - hash the auth failure cache password */
170 static char *smtp_sasl_auth_cache_make_pass(const char *password) argument
174 base64_encode(buf, (const char *) SHA1((const unsigned char *) password,
175 strlen(password), 0),
182 static char *smtp_sasl_auth_cache_make_value(const char *password, argument
190 pwd_hash = smtp_sasl_auth_cache_make_pass(password);
200 const char *password)
198 smtp_sasl_auth_cache_valid_value(SMTP_SASL_AUTH_CACHE *auth_cache, const char *entry, const char *password) argument
[all...]
/macosx-10.10/tcl-105/tcl_ext/expect/expect/example/
H A Dtkpasswd82 entry .password -textvar password -relief sunken -width 1
83 focus .password
84 bind .password <Return> password_set
88 pack .prompt .password -in .password_frame -fill x -padx 2 -pady 2
110 Enter password or press ^G to generate a random password.\
112 Press return to set the password.\
113 If the dictionary is enabled and the password is in it,\
114 the password i
[all...]

Completed in 367 milliseconds

1234567891011>>