/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | chpass_c.c | 42 const char *password, 64 krb5_store_string(sp, password); 39 kadm5_c_chpass_principal(void *server_handle, krb5_principal princ, int keepold, const char *password, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple) argument
|
/macosx-10.10/KerberosHelper-151/CFNetwork/ |
H A D | NSURLConnection.m | 34 static NSString *password; 146 if (password) 147 CFDictionaryAddValue(info, kNAHPassword, password); 228 password = [NSString stringWithCString:optarg encoding:NSUTF8StringEncoding];
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-bdb/ |
H A D | bind.c | 36 AttributeDescription *password = slap_schema.si_ad_userPassword; local 55 * since the others, in case of password checking failure 141 a = attr_find( e->e_attrs, password );
|
/macosx-10.10/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecItemServer.h | 52 CF_RETURNS_RETAINED CFDictionaryRef _SecServerBackupSyncable(CFDictionaryRef backup, CFDataRef keybag, CFDataRef password, CFErrorRef *error); 54 bool _SecServerRestoreSyncable(CFDictionaryRef backup, CFDataRef keybag, CFDataRef password, CFErrorRef *error);
|
H A D | SecKeybagSupport.h | 92 bool ks_open_keybag(CFDataRef keybag, CFDataRef password, keybag_handle_t *handle, CFErrorRef *error);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/newCmsTool/blobs/ |
H A D | cmsEcdsaHandsoff | 13 # % kcImport user3.p12 -z password -f pkcs12 -n -k ecdsaCmsKeychain.keychain 32 set CMS_KEYCHAIN_PASSWORD=password
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/rootStoreTool/ |
H A D | buildSysAnchors | 22 security create-keychain -p password "$ROOT_KC_PATH" || exit(1)
|
/macosx-10.10/eap8021x-198/ |
H A D | eapolcfg_auth.defs | 67 password : OOBData;
|
/macosx-10.10/ruby-106/ruby/lib/rubygems/ |
H A D | gemcutter_utilities.rb | 45 password = ask_for_password "Password: " 50 request.basic_auth email, password
|
/macosx-10.10/ruby-106/ruby/lib/uri/ |
H A D | ftp.rb | 48 def self.new2(user, password, host, port, path, 62 [user, password], 87 # uri = URI::FTP.build(['user:password', 'ftp.example.com', nil, 89 # puts uri.to_s -> ftp://user:password@ftp.example.com/%2Fpath/file.zip;type=a
|
/macosx-10.10/ruby-106/ruby/test/rexml/ |
H A D | test_stream.rb | 14 data = %Q{<session1 user="han" password="rootWeiler" />\n<session2 user="han" password="rootWeiler" />}
|
/macosx-10.10/ruby-106/ruby/test/xmlrpc/ |
H A D | test_webrick_server.rb | 74 @s.password = 'admin' 80 @s.password = 'guest'
|
/macosx-10.10/vim-55/runtime/syntax/ |
H A D | esmtprc.vim | 15 :syntax keyword esmtprcOptions hostname username password starttls certificate_passphrase preconnect identity mda
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecKeychain.cpp | 106 SecKeychainCreate(const char *pathName, UInt32 passwordLength, const void *password, argument 120 KCThrowParamErrIf_(!password); 121 keychain->create(passwordLength, password); 183 SecKeychainUnlock(SecKeychainRef keychainRef, UInt32 passwordLength, const void *password, Boolean usePassword) argument 190 keychain->unlock(CssmData(const_cast<void *>(password), passwordLength)); 221 OSStatus SecKeychainResetLogin(UInt32 passwordLength, const void* password, Boolean resetSearchList) argument 241 SecurityServer::ClientSession().resetKeyStorePassphrase(password ? CssmData(const_cast<void *>(password), passwordLength) : CssmData()); 243 if (password) 249 globals().storageManager.login((UInt32)userName.length(), userName.c_str(), passwordLength, password); 829 SecKeychainLogin(UInt32 nameLength, const void* name, UInt32 passwordLength, const void* password) argument 1158 SecKeychainGetMasterKey(SecKeychainRef userKeychainRef, CFDataRef *masterKey, CFStringRef password) argument 1200 SecKeychainStoreUnlockKey(SecKeychainRef userKeychainRef, SecKeychainRef systemKeychainRef, CFStringRef username, CFStringRef password) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecKeychain.cpp | 106 SecKeychainCreate(const char *pathName, UInt32 passwordLength, const void *password, argument 120 KCThrowParamErrIf_(!password); 121 keychain->create(passwordLength, password); 183 SecKeychainUnlock(SecKeychainRef keychainRef, UInt32 passwordLength, const void *password, Boolean usePassword) argument 190 keychain->unlock(CssmData(const_cast<void *>(password), passwordLength)); 221 OSStatus SecKeychainResetLogin(UInt32 passwordLength, const void* password, Boolean resetSearchList) argument 241 SecurityServer::ClientSession().resetKeyStorePassphrase(password ? CssmData(const_cast<void *>(password), passwordLength) : CssmData()); 243 if (password) 249 globals().storageManager.login((UInt32)userName.length(), userName.c_str(), passwordLength, password); 829 SecKeychainLogin(UInt32 nameLength, const void* name, UInt32 passwordLength, const void* password) argument 1158 SecKeychainGetMasterKey(SecKeychainRef userKeychainRef, CFDataRef *masterKey, CFStringRef password) argument 1200 SecKeychainStoreUnlockKey(SecKeychainRef userKeychainRef, SecKeychainRef systemKeychainRef, CFStringRef username, CFStringRef password) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecKeychain.cpp | 106 SecKeychainCreate(const char *pathName, UInt32 passwordLength, const void *password, argument 120 KCThrowParamErrIf_(!password); 121 keychain->create(passwordLength, password); 183 SecKeychainUnlock(SecKeychainRef keychainRef, UInt32 passwordLength, const void *password, Boolean usePassword) argument 190 keychain->unlock(CssmData(const_cast<void *>(password), passwordLength)); 221 OSStatus SecKeychainResetLogin(UInt32 passwordLength, const void* password, Boolean resetSearchList) argument 241 SecurityServer::ClientSession().resetKeyStorePassphrase(password ? CssmData(const_cast<void *>(password), passwordLength) : CssmData()); 243 if (password) 249 globals().storageManager.login((UInt32)userName.length(), userName.c_str(), passwordLength, password); 829 SecKeychainLogin(UInt32 nameLength, const void* name, UInt32 passwordLength, const void* password) argument 1158 SecKeychainGetMasterKey(SecKeychainRef userKeychainRef, CFDataRef *masterKey, CFStringRef password) argument 1200 SecKeychainStoreUnlockKey(SecKeychainRef userKeychainRef, SecKeychainRef systemKeychainRef, CFStringRef username, CFStringRef password) argument [all...] |
/macosx-10.10/eap8021x-198/eapolclient.tproj/ |
H A D | Dialogue.c | 89 CFStringRef password; member in struct:CredentialsDialogue_s 99 * Override values for credentials dialogue. Used by password change 257 #define kPasswordChangeOldPasswordMissing CFSTR("You must enter your old password") 258 #define kPasswordChangeOldPasswordIncorrect CFSTR("Your old password is incorrect") 259 #define kPasswordChangeNewPasswordMissing CFSTR("Enter and retype your new password") 260 #define kPasswordChangeOldPasswordSameAsNew CFSTR("Your new password must be different than your old password") 261 #define kPasswordChangeRetypeNewPassword CFSTR("Retype your new password") 294 response.password 331 /* verify that the old and new password informatio 491 CFStringRef password; local [all...] |
/macosx-10.10/Heimdal-398.1.2/appl/ftp/ftpd/ |
H A D | extern.h | 121 int klogin(char *name, char *password);
|
/macosx-10.10/Heimdal-398.1.2/appl/test/ |
H A D | gssapi_client.c | 131 extern char *password; 169 if (password) { 172 pw.value = password; 173 pw.length = strlen(password);
|
/macosx-10.10/Heimdal-398.1.2/lib/akadmin/ |
H A D | HeimODAdmin.h | 54 #define kPrincipalFlagPasswordChangeService CFSTR("PasswordChangeService") /* allowed to be used as the password change service */ 116 /* Set password */ 118 /* if password is NULL, a random password is used */ 119 int HeimODSetKeys(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFArrayRef enctypes, CFTypeRef password, unsigned long flags, CFErrorRef *error); 123 bool HeimODSetVerifiers(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFArrayRef types, CFTypeRef password, unsigned long flags, CFErrorRef *error); 131 * Most callers should not pass in kHeimODAdminAppendKeySet when changing password for users, they should only be used for services that does key rollover and for Mac OS X Server that stores keysets for different principals in same computer record. 136 * @param password new password, can be NULL is enctypes are deleted 145 CFArrayRef HeimODModifyKeys(CFArrayRef prevKeyset, CFStringRef principal, CFArrayRef enctypes, CFTypeRef password, unsigne [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/gssapi/ |
H A D | gssapi_spi.h | 38 char *password; member in struct:gss_auth_identity
|
/macosx-10.10/MITKerberosShim-66/ |
H A D | gic.c | 176 char *password, 206 ret = heim_krb5_get_init_creds_password(HC(context), &hcreds, p->heim, password, 262 const char *password, 283 ret = heim_krb5_get_init_creds_password(HC(context), &hcreds, p->heim, password, 173 krb5_get_init_creds_password(mit_krb5_context context, mit_krb5_creds *creds, mit_krb5_principal client, char *password, mit_krb5_prompter_fct prompter, void *data, mit_krb5_deltat start_time, char *in_tkt_service, mit_krb5_get_init_creds_opt *mopt) argument 257 krb5_get_in_tkt_with_password(mit_krb5_context context, mit_krb5_flags flags, mit_krb5_address * const *addr, mit_krb5_enctype *enctype, mit_krb5_preauthtype *preauth, const char *password, mit_krb5_ccache cache, mit_krb5_creds *cred, mit_krb5_kdc_rep **rep) argument
|
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/ |
H A D | aclclient.cpp | 226 AclFactory::PassphraseUnlockCredentials::PassphraseUnlockCredentials (const CssmData& password, argument 231 new (allocator) ListElement (CssmAutoData(allocator, password).release())); 238 AclFactory::PasswordChangeCredentials::PasswordChangeCredentials (const CssmData& password, argument 243 new (allocator) ListElement (CssmAutoData(allocator, password).release()));
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | aclclient.cpp | 226 AclFactory::PassphraseUnlockCredentials::PassphraseUnlockCredentials (const CssmData& password, argument 231 new (allocator) ListElement (CssmAutoData(allocator, password).release())); 238 AclFactory::PasswordChangeCredentials::PasswordChangeCredentials (const CssmData& password, argument 243 new (allocator) ListElement (CssmAutoData(allocator, password).release()));
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | p12pbegen.c | 204 CFStringRef password = CFSTR("smeg"); 212 p12PbeGen(password, salt, 1, PBE_ID_Key, result, sizeof(result)); 222 CFStringRef password = CFSTR("queeg"); 227 p12PbeGen(password, salt, 1000, PBE_ID_Key, result, sizeof(result));
|