Searched refs:password (Results 326 - 350 of 773) sorted by relevance

<<11121314151617181920>>

/macosx-10.10/apr-32/apr-util/apr-util/test/
H A Dtesturi.c31 const char *password; member in struct:aup_test
235 " password: %s\n"
246 info->scheme, info->hostinfo, info->user, info->password,
275 ABTS_STR_EQUAL(tc, t->password, info.password);
291 ABTS_STR_EQUAL(tc, info.password, NULL);
/macosx-10.10/ntp-92/libntp/
H A Dmachines.c535 static char password[32]; local
540 for (i=0; i<sizeof(password)-1 && ((c=_getch())!='\n' && c!='\r'); i++) {
541 password[i] = (char) c;
543 password[i] = '\0';
548 return password;
/macosx-10.10/ruby-106/ruby/lib/net/http/
H A Dheader.rb419 def basic_auth(account, password)
420 @header['authorization'] = [basic_encode(account, password)]
424 def proxy_basic_auth(account, password)
425 @header['proxy-authorization'] = [basic_encode(account, password)]
428 def basic_encode(account, password)
429 'Basic ' + ["#{account}:#{password}"].pack('m').delete("\r\n")
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/dotMacTool/
H A DdotMacTool.cpp38 printf(" -Z password Specify password immediately\n");
39 printf(" -z Use default password %s\n", PWD_DEF);
328 char *password = NULL; local
389 password = optarg;
392 password = (char *)PWD_DEF;
491 if(password == NULL) {
492 const char *pwdp = getpass("Enter .mac password: ");
499 password = pwdBuf;
501 certReq.password
[all...]
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/sample/
H A Dsample-client.c268 char *password; local
275 password = getenv("SASL_SAMPLE_CLIENT_PASSWORD");
276 if (! password)
277 password = getpassphrase("Password: ");
278 if (! password)
281 len = (unsigned) strlen(password);
286 memset(password, 0, len);
291 strcpy((char *)(*psecret)->data, password);
292 memset(password, 0, len);
756 /* password */
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/sshKey/
H A DsshKey.cpp35 printf(" -p password\n");
36 printf(" -P -- no password; private keys in the clear\n");
342 const char *password, // C string
360 /* key starts with MD5(password) */
362 CC_MD5(password, strlen(password), pwdDigest);
427 char *password,
453 if(password != NULL) {
459 if(password == NULL) {
516 if(ssh1DES3Crypt(cipherSpec, false, cp, remLen, password, ptex
337 ssh1DES3Crypt( unsigned char cipher, bool doEncrypt, const unsigned char *inText, unsigned inTextLen, const char *password, unsigned char *outText, unsigned *outTextLen) argument
424 decodeSSH1RSAPrivKey( const unsigned char *key, unsigned keyLen, char *password, RSA *rsa, char **comment) argument
664 encodeSSH1RSAPrivKey( RSA *rsa, const char *password, const char *comment, unsigned char **outKey, unsigned *outKeyLen) argument
1270 char *password = NULL; local
[all...]
/macosx-10.10/apache-793/httpd/modules/aaa/
H A Dmod_auth_form.c60 const char *password; member in struct:__anon6125
97 conf->password = "httpd_password";
119 new->password = (add->password_set == 0) ? base->password : add->password;
241 static const char *set_cookie_form_password(cmd_parms * cmd, void *config, const char *password) argument
244 conf->password = password;
246 return check_string(cmd, password);
379 "The field of the login form carrying the password"),
608 get_form_auth(request_rec * r, const char *username, const char *password, const char *location, const char *method, const char *mimetype, const char *body, const char **sent_user, const char **sent_pw, const char **sent_loc, const char **sent_method, const char **sent_mimetype, apr_bucket_brigade **sent_body, auth_form_config_rec * conf) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/akadmin/
H A Dadmin.c184 CFStringRef principal = NULL, password = NULL; local
218 password = CFStringCreateWithCString(kCFAllocatorDefault, argv[1], kCFStringEncodingUTF8);
219 if (password == NULL)
228 error = HeimODSetKeys(node, record, principal, enctypes, password, flags, &cferror);
248 if (password)
249 CFRelease(password);
733 CFStringRef principal = NULL, password = NULL;
737 printf("principal: %s password: %s\n", principalstr, passwordstr);
780 errx(1, "missing principal and password arguments that is needed when adding new keys");
783 password
[all...]
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/utils/
H A Dtestsuite.c102 const char *password = "1234"; variable
1148 *tresult=(char *) password;
2734 /* Try to set password then check it */
2736 result = sasl_setpass(saslconn, username, password,
2737 (unsigned) strlen(password),
2741 fatal("Error setting password. Do we have write access to sasldb?");
2746 password, (unsigned) strlen(password));
2749 fatal("Unable to verify password we just set");
2764 _sasl_MD5Update(&ctx,password,strle
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Ddeprecated.c194 const char *password = (const char *)keyseed; variable
202 if (password == NULL) {
208 password = buf;
210 ret = krb5_string_to_key_salt (context, type, password, salt, *key);
227 const char *password,
239 password,
H A Dchangepw.c40 const char *password; member in struct:request
44 * Change password protocol defined by
45 * draft-ietf-cat-kerb-chg-password-02.txt
47 * Share the response part of the protocol with MS set password
79 passwd_data.data = rk_UNCONST(request->password);
80 passwd_data.length = strlen(request->password);
128 * Set password protocol as defined by RFC3244 --
162 chpw.newpasswd.length = strlen(request->password);
163 chpw.newpasswd.data = rk_UNCONST(request->password);
373 * change the password usin
[all...]
H A Dtest_crypto.c93 const char *password,
114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
H A Dtest_rfc3961.c93 const char *password,
114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt,
91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/
H A Dtest_ntlm.c51 *password = "digestpassword", local
120 heim_ntlm_nt_key(password, &key);
188 *password = "test1234", local
208 heim_ntlm_nt_key(password, &key);
538 const char *password = "clientPass"; local
549 heim_ntlm_nt_key(password, &pwbuf);
/macosx-10.10/OpenSSH-189/openssh/
H A Dsshconnect1.c460 char *password; local
462 debug("Doing password authentication.");
468 password = read_passphrase(prompt, 0);
470 ssh_put_password(password);
471 memset(password, 0, strlen(password));
472 xfree(password);
698 * needed (the user has no password). Otherwise the server responds
747 /* Try password authentication if the server supports it. */
752 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/Tool/
H A Dkeychain_sync.c245 CFDataRef password = CFDataCreate(NULL, (const UInt8*) password_token, strlen(password_token)); local
246 bool returned = !SOSCCSetUserCredentials(label, password, err);
248 CFRelease(password);
260 CFDataRef password = CFDataCreate(NULL, (const UInt8*) password_token, strlen(password_token)); local
261 bool returned = !SOSCCTryUserCredentials(label, password, err);
263 CFRelease(password);
413 " -P [label:]password Set password (optionally for a given label) for sync\n"
415 " -P [label:]password Set password (optionall
[all...]
/macosx-10.10/WebCore-7600.1.25/platform/network/mac/
H A DAuthenticationMac.mm255 password:coreCredential.password()
287 return Credential([macCredential user], [macCredential password], persistence);
/macosx-10.10/curl-83.1.2/curl/lib/
H A Dcurl_ntlm_core.c312 * Set up lanmanager hashed password
315 const char *password,
323 size_t len = CURLMIN(strlen(password), 14);
325 Curl_strntoupper((char *)pw, password, len);
329 * The LanManager hashed password needs to be created using the
330 * password in the network encoding not the host encoding.
337 /* Create LanManager hashed password. */
419 const char *password,
422 size_t len = strlen(password);
428 ascii_to_unicode_le(pw, password, le
314 Curl_ntlm_core_mk_lm_hash(struct SessionHandle *data, const char *password, unsigned char *lmbuffer ) argument
418 Curl_ntlm_core_mk_nt_hash(struct SessionHandle *data, const char *password, unsigned char *ntbuffer ) argument
[all...]
/macosx-10.10/ruby-106/ruby/lib/net/
H A Dtelnet.rb36 # set to your host, calling #login() with your user and password,
72 # localhost.login("username", "password") { |c| print c }
700 # Login to the host with a given username and password.
702 # The username and password can either be provided as two string
707 # host to determine when to send the username and password. If the
712 # The password can be omitted, either by only
719 # the host, including the echoed username but not the password (which
722 def login(options, password = nil) # :yield: recvdata
727 password = options["Password"]
736 if password
[all...]
/macosx-10.10/Heimdal-398.1.2/appl/test/
H A Dcommon.c44 char *password = NULL; variable
51 { "password", 'P', arg_string, &password, "password to use", "password" },
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/
H A Dgsskrb5_locl.h143 char *password; member in struct:gsskrb5_ctx
165 char *password; member in struct:gsskrb5_cred
/macosx-10.10/Heimdal-398.1.2/tests/kdc/
H A Dcheck-hdb-mitdb.in102 ${kinit} --password-file=${objdir}/foopassword foo@$R || \
/macosx-10.10/JavaScriptCore-7600.1.17/tests/mozilla/ecma_3/RegExp/
H A Dregress-85721.js80 str='<sql:connection id="conn1"> <sql:url>www.m.com</sql:url> <sql:driver>drive.class</sql:driver>\n<sql:userId>foo</sql:userId> <sql:password>goo</sql:password> </sql:connection>';
81 re = /<sql:connection id="([^\r\n]*?)">\s*<sql:url>\s*([^\r\n]*?)\s*<\/sql:url>\s*<sql:driver>\s*([^\r\n]*?)\s*<\/sql:driver>\s*(\s*<sql:userId>\s*([^\r\n]*?)\s*<\/sql:userId>\s*)?\s*(\s*<sql:password>\s*([^\r\n]*?)\s*<\/sql:password>\s*)?\s*<\/sql:connection>/;
82 expect = Array("<sql:connection id=\"conn1\"> <sql:url>www.m.com</sql:url> <sql:driver>drive.class</sql:driver>\n<sql:userId>foo</sql:userId> <sql:password>goo</sql:password> </sql:connection>","conn1","www.m.com","drive.class","<sql:userId>foo</sql:userId> ","foo","<sql:password>goo</sql:password> ","goo");
/macosx-10.10/MITKerberosShim-66/test/
H A Dtest-gss.sh16 pw_file="${tmp}/password-file"
77 ${kinit} --password-file="${pw_file}" "${user}@${realm}"
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-sql/rdbms_depend/ibmdb2/
H A Dtestdb_create.sql6 password varchar(64)

Completed in 191 milliseconds

<<11121314151617181920>>