/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecItemPriv.h | 47 @constant kSecClassAppleSharePassword Specifies AppleShare password items. 294 bool _SecKeychainBackupSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in, CFDictionaryRef *backup_out); 295 bool _SecKeychainRestoreSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/ |
H A D | acl_prompted.h | 26 // acl_prompted - password-based validation with out-of-band prompting. 28 // This implements simple password-based subject types with out-of-band 49 const CssmData &prompt, const CssmData &password); 51 CssmManagedData &prompt, CssmManagedData &password);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecItemPriv.h | 47 @constant kSecClassAppleSharePassword Specifies AppleShare password items. 294 bool _SecKeychainBackupSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in, CFDictionaryRef *backup_out); 295 bool _SecKeychainRestoreSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecItemPriv.h | 47 @constant kSecClassAppleSharePassword Specifies AppleShare password items. 294 bool _SecKeychainBackupSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in, CFDictionaryRef *backup_out); 295 bool _SecKeychainRestoreSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecPBKDF.h | 29 /* Transformation conveninces from and to CFData where the password bytes used are the UTF-8 representation and 1000 iterations 31 This routine promises not to make any copies of the password or salt that aren't 37 If your password and or salt aren't already in CF types use the buffer versions above. 41 void SecKeyFromPassword_HMAC_sha1(CFDataRef password, CFDataRef salt, uint32_t interationCount, CFMutableDataRef derivedKey) 43 pbkdf2_hmac_sha1(CFDataGetBytePtr(password), CFDataGetLength(password), 52 CFDataRef *passwordData = CFStringCreateExternalRepresentation(NULL, password, kCFStringEncodingUTF8, 0); 60 void SecKeyFromPassphraseDataHMACSHA1(CFDataRef password, CFDataRef salt, uint32_t interationCount, CFMutableDataRef derivedKey);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Reencode/ |
H A D | doReencode | 15 set PASSWORD = password
|
/macosx-10.10/Security-57031.1.35/ntlm/ |
H A D | NtlmGenerator.h | 106 CFStringRef password, 115 CFStringRef password,
|
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | credential.h | 43 CredentialImpl(const string &username, const string &password, bool shared); 77 // The user that provided his password. 93 Credential(const string &username, const string &password, bool shared);
|
H A D | credential.cpp | 29 extern "C" int checkpw_internal( const struct passwd *pw, const char* password ); 44 CredentialImpl::CredentialImpl(const string &username, const string &password, bool shared) : mShared(shared), mRight(false), mName(username), mCreationTime(CFAbsoluteTimeGetCurrent()), mValid(false) argument 60 const char *passwd = password.c_str(); 185 Credential::Credential(const string &username, const string &password, bool shared) : RefPointer<CredentialImpl>(new CredentialImpl(username, password, shared)) argument
|
/macosx-10.10/WebCore-7600.1.25/html/ |
H A D | URLUtils.idl | 37 [TreatNullAs=NullString] attribute DOMString password;
|
/macosx-10.10/WebCore-7600.1.25/platform/network/ |
H A D | Credential.h | 56 Credential(const String& user, const String& password, CredentialPersistence); 65 const String& password() const;
|
/macosx-10.10/pam_modules-140/modules/pam_ntlm/ |
H A D | pam_ntlm.c | 51 const char *password; local 55 /* get password */ 56 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &password, NULL); 60 retval = pam_setenv(pamh, password_key, password, 1); 84 const char *user, *password; local 112 password = pam_getenv(pamh, password_key); 113 if (password == NULL) { 114 PAM_LOG("pam_sm_setcred: ntlm user %s doesn't have a password", user); 133 identity.password = (char *)password; [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_getpwent.c | 73 const char *password, /* I: plaintext password */ 109 if (strcmp(pw->pw_passwd, (const char *)crypt(password, pw->pw_passwd))) { 111 syslog(LOG_DEBUG, "DEBUG: auth_getpwent: %s: invalid password", login); 113 RETURN("NO Incorrect password"); 69 auth_getpwent( const char *login, const char *password, const char *service __attribute__((unused)), const char *realm __attribute__((unused)) ) argument
|
/macosx-10.10/security_dotmac_tp-55107.1/lib/ |
H A D | dotMacTp.h | 143 CSSM_DATA password; // UTF8 encoded password member in struct:__anon12586 204 CSSM_DATA password; // UTF8 encoded password required for all member in struct:__anon12590
|
/macosx-10.10/uucp-11/configs/ |
H A D | sys | 8 # For protection a system should force a login name and password. 12 call-password sekret
|
/macosx-10.10/vim-55/runtime/ftplugin/ |
H A D | passwd.vim | 2 " Language: passwd(5) password file
|
/macosx-10.10/Heimdal-398.1.2/appl/login/ |
H A D | login.c | 142 otp_verify(struct passwd *pwd, const char *password) argument 144 return (otp_verify_user (&otp_ctx, password)); 156 krb5_verify(struct passwd *pwd, const char *password) argument 172 password, 518 check_password(struct passwd *pwd, const char *password) argument 524 return password[0] != '\0'; 529 if(strcmp(pwd->pw_passwd, crypt(password, pwd->pw_passwd)) == 0) 532 if(krb5_verify(pwd, password) == 0) { 538 if (otp_verify (pwd, password) == 0) { 641 char password[12 local [all...] |
/macosx-10.10/postfix-255/postfix/src/xsasl/ |
H A D | xsasl_cyrus_client.c | 141 sasl_callback_t *callbacks; /* user/password lookup */ 143 char *password; member in struct:__anon11900 173 if (client->password == 0) 182 /* xsasl_cyrus_client_get_passwd - password lookup call-back routine */ 192 msg_info("%s: %s", myname, client->password); 199 if (client->password == 0) 200 msg_panic("%s: no password looked up", myname); 203 * Convert the password into a counted string. 205 len = strlen(client->password); 209 memcpy((*psecret)->data, client->password, le 425 xsasl_cyrus_client_first(XSASL_CLIENT *xp, const char *mechanism_list, const char *username, const char *password, const char **mechanism, VSTRING *init_resp) argument [all...] |
/macosx-10.10/apr-32/apr-util/apr-util/test/ |
H A D | testpass.c | 46 const char *password; member in struct:__anon6518 79 apr_assert_success(tc, "check for valid password", 80 apr_password_validate(passwords[i].password, 131 apr_assert_success(tc, "SHA1 password validated", 133 APR_ASSERT_FAILURE(tc, "wrong SHA1 password should not validate", 145 apr_assert_success(tc, "MD5 password validated", 147 APR_ASSERT_FAILURE(tc, "wrong MD5 password should not validate", 154 const char *password; member in struct:__anon6519 169 while (glibc_sha_pws[i].password) { 170 apr_assert_success(tc, "check for valid glibc crypt-sha password", [all...] |
/macosx-10.10/bash-94.1.2/bash-3.2/examples/scripts.v2/ |
H A D | frcp | 10 # 93/11/14 Use either passwd or password in .netrc, since ftp does. 16 # user and password in .netrc. If not, anonymous FTP is 138 local machine=$1 netrc=$HOME/.netrc user= password= 145 Fields["password"] = Fields["passwd"] 146 if ("login" in Fields && "password" in Fields) { 147 print Fields["login"] " " Fields["password"] 153 password=$2 155 if [ -z "$password" ]; then 161 password=$USER@$LocalMach 165 echo user $user $password [all...] |
/macosx-10.10/curl-83.1.2/curl/src/ |
H A D | tool_getpass.c | 225 char *password, /* buffer to store password in */ 226 size_t buflen) /* size of buffer to store password in */ 237 nread = read(fd, password, buflen); 239 password[--nread] = '\0'; /* zero terminate where enter is stored */ 241 password[0] = '\0'; /* got nothing */ 252 return password; /* return pointer to buffer */ 224 getpass_r(const char *prompt, char *password, size_t buflen) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | common_glue.c | 43 const char *password) 45 return kadm5_chpass_principal_3(server_handle, princ, 0, 0, NULL, password); 51 const char *password, 54 return __CALL(chpass_principal, (server_handle, princ, 0, password, 64 const char *password) 66 return __CALL(chpass_principal, (server_handle, princ, keepold, password, 95 const char *password) 97 return kadm5_create_principal_2(server_handle, princ, mask, 0, NULL, password); 106 const char *password) 108 return __CALL(create_principal, (server_handle, princ, mask, password, 41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument 49 kadm5_chpass_principal2(void *server_handle, krb5_principal princ, const char *password, krb5_enctype *enctypes) argument 59 kadm5_chpass_principal_3(void *server_handle, krb5_principal princ, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, const char *password) argument 92 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument 101 kadm5_create_principal_2(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, const char *password) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/tests/kdc/ |
H A D | check-kdc.in | 196 ${kinit} --password-file=${testdir}/foopassword foo@$R || \ 210 ${kinit} --password-file=${testdir}/foopassword foo@${R3} || \ 215 ${kinit} --password-file=${testdir}/foopassword \ 222 ${kinit} --enctype=$a --password-file=${testdir}/foopassword foo@$R || { ec=1 ; eval "${testfailed}"; } 234 password foo\n 240 ${kinit} --password-file=${testdir}/foopassword foo@$R || \ 252 ${kinit} --password-file=${testdir}/foopassword foo@$R || { ec=1 ; eval "${testfailed}"; } 268 ${kinit} --enctype=$a --password-file=${testdir}/foopassword foo@$R || \ 282 ${kinit} --password-file=${testdir}/foopassword foo@$R || { ec=1 ; eval "${testfailed}"; } 293 ${kinit} --password [all...] |
/macosx-10.10/zlib-55/zlib/contrib/minizip/ |
H A D | miniunz.c | 183 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \ 190 " -p extract crypted file using password\n\n"); 299 int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password) 303 const char* password; 357 err = unzOpenCurrentFilePassword(uf,password); 463 int do_extract(uf,opt_extract_without_path,opt_overwrite,password) 467 const char* password; 482 password) != UNZ_OK) 499 int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password) 504 const char* password; 528 const char *password=NULL; local [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hdb/ |
H A D | ext.c | 354 if (db->hdb_master_key_set && ext->data.u.password.mkvno) { 357 key = _hdb_find_master_key(ext->data.u.password.mkvno, 363 *ext->data.u.password.mkvno); 368 ext->data.u.password.password.data, 369 ext->data.u.password.password.length, 372 ret = der_copy_octet_string(&ext->data.u.password.password, &pw); 381 krb5_set_error_message(context, EINVAL, "malformed password"); [all...] |