Searched refs:password (Results 276 - 300 of 773) sorted by relevance

<<11121314151617181920>>

/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dchpass_c.c42 const char *password,
64 krb5_store_string(sp, password);
39 kadm5_c_chpass_principal(void *server_handle, krb5_principal princ, int keepold, const char *password, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple) argument
/macosx-10.10/KerberosHelper-151/CFNetwork/
H A DNSURLConnection.m34 static NSString *password;
146 if (password)
147 CFDictionaryAddValue(info, kNAHPassword, password);
228 password = [NSString stringWithCString:optarg encoding:NSUTF8StringEncoding];
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-bdb/
H A Dbind.c36 AttributeDescription *password = slap_schema.si_ad_userPassword; local
55 * since the others, in case of password checking failure
141 a = attr_find( e->e_attrs, password );
/macosx-10.10/Security-57031.1.35/Security/sec/securityd/
H A DSecItemServer.h52 CF_RETURNS_RETAINED CFDictionaryRef _SecServerBackupSyncable(CFDictionaryRef backup, CFDataRef keybag, CFDataRef password, CFErrorRef *error);
54 bool _SecServerRestoreSyncable(CFDictionaryRef backup, CFDataRef keybag, CFDataRef password, CFErrorRef *error);
H A DSecKeybagSupport.h92 bool ks_open_keybag(CFDataRef keybag, CFDataRef password, keybag_handle_t *handle, CFErrorRef *error);
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/newCmsTool/blobs/
H A DcmsEcdsaHandsoff13 # % kcImport user3.p12 -z password -f pkcs12 -n -k ecdsaCmsKeychain.keychain
32 set CMS_KEYCHAIN_PASSWORD=password
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/rootStoreTool/
H A DbuildSysAnchors22 security create-keychain -p password "$ROOT_KC_PATH" || exit(1)
/macosx-10.10/eap8021x-198/
H A Deapolcfg_auth.defs67 password : OOBData;
/macosx-10.10/ruby-106/ruby/lib/rubygems/
H A Dgemcutter_utilities.rb45 password = ask_for_password "Password: "
50 request.basic_auth email, password
/macosx-10.10/ruby-106/ruby/lib/uri/
H A Dftp.rb48 def self.new2(user, password, host, port, path,
62 [user, password],
87 # uri = URI::FTP.build(['user:password', 'ftp.example.com', nil,
89 # puts uri.to_s -> ftp://user:password@ftp.example.com/%2Fpath/file.zip;type=a
/macosx-10.10/ruby-106/ruby/test/rexml/
H A Dtest_stream.rb14 data = %Q{<session1 user="han" password="rootWeiler" />\n<session2 user="han" password="rootWeiler" />}
/macosx-10.10/ruby-106/ruby/test/xmlrpc/
H A Dtest_webrick_server.rb74 @s.password = 'admin'
80 @s.password = 'guest'
/macosx-10.10/vim-55/runtime/syntax/
H A Desmtprc.vim15 :syntax keyword esmtprcOptions hostname username password starttls certificate_passphrase preconnect identity mda
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DSecKeychain.cpp106 SecKeychainCreate(const char *pathName, UInt32 passwordLength, const void *password, argument
120 KCThrowParamErrIf_(!password);
121 keychain->create(passwordLength, password);
183 SecKeychainUnlock(SecKeychainRef keychainRef, UInt32 passwordLength, const void *password, Boolean usePassword) argument
190 keychain->unlock(CssmData(const_cast<void *>(password), passwordLength));
221 OSStatus SecKeychainResetLogin(UInt32 passwordLength, const void* password, Boolean resetSearchList) argument
241 SecurityServer::ClientSession().resetKeyStorePassphrase(password ? CssmData(const_cast<void *>(password), passwordLength) : CssmData());
243 if (password)
249 globals().storageManager.login((UInt32)userName.length(), userName.c_str(), passwordLength, password);
829 SecKeychainLogin(UInt32 nameLength, const void* name, UInt32 passwordLength, const void* password) argument
1158 SecKeychainGetMasterKey(SecKeychainRef userKeychainRef, CFDataRef *masterKey, CFStringRef password) argument
1200 SecKeychainStoreUnlockKey(SecKeychainRef userKeychainRef, SecKeychainRef systemKeychainRef, CFStringRef username, CFStringRef password) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecKeychain.cpp106 SecKeychainCreate(const char *pathName, UInt32 passwordLength, const void *password, argument
120 KCThrowParamErrIf_(!password);
121 keychain->create(passwordLength, password);
183 SecKeychainUnlock(SecKeychainRef keychainRef, UInt32 passwordLength, const void *password, Boolean usePassword) argument
190 keychain->unlock(CssmData(const_cast<void *>(password), passwordLength));
221 OSStatus SecKeychainResetLogin(UInt32 passwordLength, const void* password, Boolean resetSearchList) argument
241 SecurityServer::ClientSession().resetKeyStorePassphrase(password ? CssmData(const_cast<void *>(password), passwordLength) : CssmData());
243 if (password)
249 globals().storageManager.login((UInt32)userName.length(), userName.c_str(), passwordLength, password);
829 SecKeychainLogin(UInt32 nameLength, const void* name, UInt32 passwordLength, const void* password) argument
1158 SecKeychainGetMasterKey(SecKeychainRef userKeychainRef, CFDataRef *masterKey, CFStringRef password) argument
1200 SecKeychainStoreUnlockKey(SecKeychainRef userKeychainRef, SecKeychainRef systemKeychainRef, CFStringRef username, CFStringRef password) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecKeychain.cpp106 SecKeychainCreate(const char *pathName, UInt32 passwordLength, const void *password, argument
120 KCThrowParamErrIf_(!password);
121 keychain->create(passwordLength, password);
183 SecKeychainUnlock(SecKeychainRef keychainRef, UInt32 passwordLength, const void *password, Boolean usePassword) argument
190 keychain->unlock(CssmData(const_cast<void *>(password), passwordLength));
221 OSStatus SecKeychainResetLogin(UInt32 passwordLength, const void* password, Boolean resetSearchList) argument
241 SecurityServer::ClientSession().resetKeyStorePassphrase(password ? CssmData(const_cast<void *>(password), passwordLength) : CssmData());
243 if (password)
249 globals().storageManager.login((UInt32)userName.length(), userName.c_str(), passwordLength, password);
829 SecKeychainLogin(UInt32 nameLength, const void* name, UInt32 passwordLength, const void* password) argument
1158 SecKeychainGetMasterKey(SecKeychainRef userKeychainRef, CFDataRef *masterKey, CFStringRef password) argument
1200 SecKeychainStoreUnlockKey(SecKeychainRef userKeychainRef, SecKeychainRef systemKeychainRef, CFStringRef username, CFStringRef password) argument
[all...]
/macosx-10.10/eap8021x-198/eapolclient.tproj/
H A DDialogue.c89 CFStringRef password; member in struct:CredentialsDialogue_s
99 * Override values for credentials dialogue. Used by password change
257 #define kPasswordChangeOldPasswordMissing CFSTR("You must enter your old password")
258 #define kPasswordChangeOldPasswordIncorrect CFSTR("Your old password is incorrect")
259 #define kPasswordChangeNewPasswordMissing CFSTR("Enter and retype your new password")
260 #define kPasswordChangeOldPasswordSameAsNew CFSTR("Your new password must be different than your old password")
261 #define kPasswordChangeRetypeNewPassword CFSTR("Retype your new password")
294 response.password
331 /* verify that the old and new password informatio
491 CFStringRef password; local
[all...]
/macosx-10.10/Heimdal-398.1.2/appl/ftp/ftpd/
H A Dextern.h121 int klogin(char *name, char *password);
/macosx-10.10/Heimdal-398.1.2/appl/test/
H A Dgssapi_client.c131 extern char *password;
169 if (password) {
172 pw.value = password;
173 pw.length = strlen(password);
/macosx-10.10/Heimdal-398.1.2/lib/akadmin/
H A DHeimODAdmin.h54 #define kPrincipalFlagPasswordChangeService CFSTR("PasswordChangeService") /* allowed to be used as the password change service */
116 /* Set password */
118 /* if password is NULL, a random password is used */
119 int HeimODSetKeys(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFArrayRef enctypes, CFTypeRef password, unsigned long flags, CFErrorRef *error);
123 bool HeimODSetVerifiers(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFArrayRef types, CFTypeRef password, unsigned long flags, CFErrorRef *error);
131 * Most callers should not pass in kHeimODAdminAppendKeySet when changing password for users, they should only be used for services that does key rollover and for Mac OS X Server that stores keysets for different principals in same computer record.
136 * @param password new password, can be NULL is enctypes are deleted
145 CFArrayRef HeimODModifyKeys(CFArrayRef prevKeyset, CFStringRef principal, CFArrayRef enctypes, CFTypeRef password, unsigne
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/gssapi/
H A Dgssapi_spi.h38 char *password; member in struct:gss_auth_identity
/macosx-10.10/MITKerberosShim-66/
H A Dgic.c176 char *password,
206 ret = heim_krb5_get_init_creds_password(HC(context), &hcreds, p->heim, password,
262 const char *password,
283 ret = heim_krb5_get_init_creds_password(HC(context), &hcreds, p->heim, password,
173 krb5_get_init_creds_password(mit_krb5_context context, mit_krb5_creds *creds, mit_krb5_principal client, char *password, mit_krb5_prompter_fct prompter, void *data, mit_krb5_deltat start_time, char *in_tkt_service, mit_krb5_get_init_creds_opt *mopt) argument
257 krb5_get_in_tkt_with_password(mit_krb5_context context, mit_krb5_flags flags, mit_krb5_address * const *addr, mit_krb5_enctype *enctype, mit_krb5_preauthtype *preauth, const char *password, mit_krb5_ccache cache, mit_krb5_creds *cred, mit_krb5_kdc_rep **rep) argument
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/
H A Daclclient.cpp226 AclFactory::PassphraseUnlockCredentials::PassphraseUnlockCredentials (const CssmData& password, argument
231 new (allocator) ListElement (CssmAutoData(allocator, password).release()));
238 AclFactory::PasswordChangeCredentials::PasswordChangeCredentials (const CssmData& password, argument
243 new (allocator) ListElement (CssmAutoData(allocator, password).release()));
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/
H A Daclclient.cpp226 AclFactory::PassphraseUnlockCredentials::PassphraseUnlockCredentials (const CssmData& password, argument
231 new (allocator) ListElement (CssmAutoData(allocator, password).release()));
238 AclFactory::PasswordChangeCredentials::PasswordChangeCredentials (const CssmData& password, argument
243 new (allocator) ListElement (CssmAutoData(allocator, password).release()));
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A Dp12pbegen.c204 CFStringRef password = CFSTR("smeg");
212 p12PbeGen(password, salt, 1, PBE_ID_Key, result, sizeof(result));
222 CFStringRef password = CFSTR("queeg");
227 p12PbeGen(password, salt, 1000, PBE_ID_Key, result, sizeof(result));

Completed in 214 milliseconds

<<11121314151617181920>>