Searched refs:password (Results 176 - 200 of 773) sorted by relevance

1234567891011>>

/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DSecItemPriv.h47 @constant kSecClassAppleSharePassword Specifies AppleShare password items.
294 bool _SecKeychainBackupSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in, CFDictionaryRef *backup_out);
295 bool _SecKeychainRestoreSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/
H A Dacl_prompted.h26 // acl_prompted - password-based validation with out-of-band prompting.
28 // This implements simple password-based subject types with out-of-band
49 const CssmData &prompt, const CssmData &password);
51 CssmManagedData &prompt, CssmManagedData &password);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecItemPriv.h47 @constant kSecClassAppleSharePassword Specifies AppleShare password items.
294 bool _SecKeychainBackupSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in, CFDictionaryRef *backup_out);
295 bool _SecKeychainRestoreSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecItemPriv.h47 @constant kSecClassAppleSharePassword Specifies AppleShare password items.
294 bool _SecKeychainBackupSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in, CFDictionaryRef *backup_out);
295 bool _SecKeychainRestoreSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in);
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecPBKDF.h29 /* Transformation conveninces from and to CFData where the password bytes used are the UTF-8 representation and 1000 iterations
31 This routine promises not to make any copies of the password or salt that aren't
37 If your password and or salt aren't already in CF types use the buffer versions above.
41 void SecKeyFromPassword_HMAC_sha1(CFDataRef password, CFDataRef salt, uint32_t interationCount, CFMutableDataRef derivedKey)
43 pbkdf2_hmac_sha1(CFDataGetBytePtr(password), CFDataGetLength(password),
52 CFDataRef *passwordData = CFStringCreateExternalRepresentation(NULL, password, kCFStringEncodingUTF8, 0);
60 void SecKeyFromPassphraseDataHMACSHA1(CFDataRef password, CFDataRef salt, uint32_t interationCount, CFMutableDataRef derivedKey);
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Reencode/
H A DdoReencode15 set PASSWORD = password
/macosx-10.10/Security-57031.1.35/ntlm/
H A DNtlmGenerator.h106 CFStringRef password,
115 CFStringRef password,
/macosx-10.10/Security-57031.1.35/securityd/src/
H A Dcredential.h43 CredentialImpl(const string &username, const string &password, bool shared);
77 // The user that provided his password.
93 Credential(const string &username, const string &password, bool shared);
H A Dcredential.cpp29 extern "C" int checkpw_internal( const struct passwd *pw, const char* password );
44 CredentialImpl::CredentialImpl(const string &username, const string &password, bool shared) : mShared(shared), mRight(false), mName(username), mCreationTime(CFAbsoluteTimeGetCurrent()), mValid(false) argument
60 const char *passwd = password.c_str();
185 Credential::Credential(const string &username, const string &password, bool shared) : RefPointer<CredentialImpl>(new CredentialImpl(username, password, shared)) argument
/macosx-10.10/WebCore-7600.1.25/html/
H A DURLUtils.idl37 [TreatNullAs=NullString] attribute DOMString password;
/macosx-10.10/WebCore-7600.1.25/platform/network/
H A DCredential.h56 Credential(const String& user, const String& password, CredentialPersistence);
65 const String& password() const;
/macosx-10.10/pam_modules-140/modules/pam_ntlm/
H A Dpam_ntlm.c51 const char *password; local
55 /* get password */
56 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &password, NULL);
60 retval = pam_setenv(pamh, password_key, password, 1);
84 const char *user, *password; local
112 password = pam_getenv(pamh, password_key);
113 if (password == NULL) {
114 PAM_LOG("pam_sm_setcred: ntlm user %s doesn't have a password", user);
133 identity.password = (char *)password;
[all...]
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/
H A Dauth_getpwent.c73 const char *password, /* I: plaintext password */
109 if (strcmp(pw->pw_passwd, (const char *)crypt(password, pw->pw_passwd))) {
111 syslog(LOG_DEBUG, "DEBUG: auth_getpwent: %s: invalid password", login);
113 RETURN("NO Incorrect password");
69 auth_getpwent( const char *login, const char *password, const char *service __attribute__((unused)), const char *realm __attribute__((unused)) ) argument
/macosx-10.10/security_dotmac_tp-55107.1/lib/
H A DdotMacTp.h143 CSSM_DATA password; // UTF8 encoded password member in struct:__anon12586
204 CSSM_DATA password; // UTF8 encoded password required for all member in struct:__anon12590
/macosx-10.10/uucp-11/configs/
H A Dsys8 # For protection a system should force a login name and password.
12 call-password sekret
/macosx-10.10/vim-55/runtime/ftplugin/
H A Dpasswd.vim2 " Language: passwd(5) password file
/macosx-10.10/Heimdal-398.1.2/appl/login/
H A Dlogin.c142 otp_verify(struct passwd *pwd, const char *password) argument
144 return (otp_verify_user (&otp_ctx, password));
156 krb5_verify(struct passwd *pwd, const char *password) argument
172 password,
518 check_password(struct passwd *pwd, const char *password) argument
524 return password[0] != '\0';
529 if(strcmp(pwd->pw_passwd, crypt(password, pwd->pw_passwd)) == 0)
532 if(krb5_verify(pwd, password) == 0) {
538 if (otp_verify (pwd, password) == 0) {
641 char password[12 local
[all...]
/macosx-10.10/postfix-255/postfix/src/xsasl/
H A Dxsasl_cyrus_client.c141 sasl_callback_t *callbacks; /* user/password lookup */
143 char *password; member in struct:__anon11900
173 if (client->password == 0)
182 /* xsasl_cyrus_client_get_passwd - password lookup call-back routine */
192 msg_info("%s: %s", myname, client->password);
199 if (client->password == 0)
200 msg_panic("%s: no password looked up", myname);
203 * Convert the password into a counted string.
205 len = strlen(client->password);
209 memcpy((*psecret)->data, client->password, le
425 xsasl_cyrus_client_first(XSASL_CLIENT *xp, const char *mechanism_list, const char *username, const char *password, const char **mechanism, VSTRING *init_resp) argument
[all...]
/macosx-10.10/apr-32/apr-util/apr-util/test/
H A Dtestpass.c46 const char *password; member in struct:__anon6518
79 apr_assert_success(tc, "check for valid password",
80 apr_password_validate(passwords[i].password,
131 apr_assert_success(tc, "SHA1 password validated",
133 APR_ASSERT_FAILURE(tc, "wrong SHA1 password should not validate",
145 apr_assert_success(tc, "MD5 password validated",
147 APR_ASSERT_FAILURE(tc, "wrong MD5 password should not validate",
154 const char *password; member in struct:__anon6519
169 while (glibc_sha_pws[i].password) {
170 apr_assert_success(tc, "check for valid glibc crypt-sha password",
[all...]
/macosx-10.10/bash-94.1.2/bash-3.2/examples/scripts.v2/
H A Dfrcp10 # 93/11/14 Use either passwd or password in .netrc, since ftp does.
16 # user and password in .netrc. If not, anonymous FTP is
138 local machine=$1 netrc=$HOME/.netrc user= password=
145 Fields["password"] = Fields["passwd"]
146 if ("login" in Fields && "password" in Fields) {
147 print Fields["login"] " " Fields["password"]
153 password=$2
155 if [ -z "$password" ]; then
161 password=$USER@$LocalMach
165 echo user $user $password
[all...]
/macosx-10.10/curl-83.1.2/curl/src/
H A Dtool_getpass.c225 char *password, /* buffer to store password in */
226 size_t buflen) /* size of buffer to store password in */
237 nread = read(fd, password, buflen);
239 password[--nread] = '\0'; /* zero terminate where enter is stored */
241 password[0] = '\0'; /* got nothing */
252 return password; /* return pointer to buffer */
224 getpass_r(const char *prompt, char *password, size_t buflen) argument
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dcommon_glue.c43 const char *password)
45 return kadm5_chpass_principal_3(server_handle, princ, 0, 0, NULL, password);
51 const char *password,
54 return __CALL(chpass_principal, (server_handle, princ, 0, password,
64 const char *password)
66 return __CALL(chpass_principal, (server_handle, princ, keepold, password,
95 const char *password)
97 return kadm5_create_principal_2(server_handle, princ, mask, 0, NULL, password);
106 const char *password)
108 return __CALL(create_principal, (server_handle, princ, mask, password,
41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
49 kadm5_chpass_principal2(void *server_handle, krb5_principal princ, const char *password, krb5_enctype *enctypes) argument
59 kadm5_chpass_principal_3(void *server_handle, krb5_principal princ, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, const char *password) argument
92 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument
101 kadm5_create_principal_2(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, const char *password) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/tests/kdc/
H A Dcheck-kdc.in196 ${kinit} --password-file=${testdir}/foopassword foo@$R || \
210 ${kinit} --password-file=${testdir}/foopassword foo@${R3} || \
215 ${kinit} --password-file=${testdir}/foopassword \
222 ${kinit} --enctype=$a --password-file=${testdir}/foopassword foo@$R || { ec=1 ; eval "${testfailed}"; }
234 password foo\n
240 ${kinit} --password-file=${testdir}/foopassword foo@$R || \
252 ${kinit} --password-file=${testdir}/foopassword foo@$R || { ec=1 ; eval "${testfailed}"; }
268 ${kinit} --enctype=$a --password-file=${testdir}/foopassword foo@$R || \
282 ${kinit} --password-file=${testdir}/foopassword foo@$R || { ec=1 ; eval "${testfailed}"; }
293 ${kinit} --password
[all...]
/macosx-10.10/zlib-55/zlib/contrib/minizip/
H A Dminiunz.c183 printf("Usage : miniunz [-e] [-x] [-v] [-l] [-o] [-p password] file.zip [file_to_extr.] [-d extractdir]\n\n" \
190 " -p extract crypted file using password\n\n");
299 int do_extract_currentfile(uf,popt_extract_without_path,popt_overwrite,password)
303 const char* password;
357 err = unzOpenCurrentFilePassword(uf,password);
463 int do_extract(uf,opt_extract_without_path,opt_overwrite,password)
467 const char* password;
482 password) != UNZ_OK)
499 int do_extract_onefile(uf,filename,opt_extract_without_path,opt_overwrite,password)
504 const char* password;
528 const char *password=NULL; local
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hdb/
H A Dext.c354 if (db->hdb_master_key_set && ext->data.u.password.mkvno) {
357 key = _hdb_find_master_key(ext->data.u.password.mkvno,
363 *ext->data.u.password.mkvno);
368 ext->data.u.password.password.data,
369 ext->data.u.password.password.length,
372 ret = der_copy_octet_string(&ext->data.u.password.password, &pw);
381 krb5_set_error_message(context, EINVAL, "malformed password");
[all...]

Completed in 315 milliseconds

1234567891011>>