/macosx-10.10/apr-32/apr-util/apr-util/test/ |
H A D | testuri.c | 31 const char *password; member in struct:aup_test 235 " password: %s\n" 246 info->scheme, info->hostinfo, info->user, info->password, 275 ABTS_STR_EQUAL(tc, t->password, info.password); 291 ABTS_STR_EQUAL(tc, info.password, NULL);
|
/macosx-10.10/ntp-92/libntp/ |
H A D | machines.c | 535 static char password[32]; local 540 for (i=0; i<sizeof(password)-1 && ((c=_getch())!='\n' && c!='\r'); i++) { 541 password[i] = (char) c; 543 password[i] = '\0'; 548 return password;
|
/macosx-10.10/ruby-106/ruby/lib/net/http/ |
H A D | header.rb | 419 def basic_auth(account, password) 420 @header['authorization'] = [basic_encode(account, password)] 424 def proxy_basic_auth(account, password) 425 @header['proxy-authorization'] = [basic_encode(account, password)] 428 def basic_encode(account, password) 429 'Basic ' + ["#{account}:#{password}"].pack('m').delete("\r\n")
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/dotMacTool/ |
H A D | dotMacTool.cpp | 38 printf(" -Z password Specify password immediately\n"); 39 printf(" -z Use default password %s\n", PWD_DEF); 328 char *password = NULL; local 389 password = optarg; 392 password = (char *)PWD_DEF; 491 if(password == NULL) { 492 const char *pwdp = getpass("Enter .mac password: "); 499 password = pwdBuf; 501 certReq.password [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/sample/ |
H A D | sample-client.c | 268 char *password; local 275 password = getenv("SASL_SAMPLE_CLIENT_PASSWORD"); 276 if (! password) 277 password = getpassphrase("Password: "); 278 if (! password) 281 len = (unsigned) strlen(password); 286 memset(password, 0, len); 291 strcpy((char *)(*psecret)->data, password); 292 memset(password, 0, len); 756 /* password */ [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/sshKey/ |
H A D | sshKey.cpp | 35 printf(" -p password\n"); 36 printf(" -P -- no password; private keys in the clear\n"); 342 const char *password, // C string 360 /* key starts with MD5(password) */ 362 CC_MD5(password, strlen(password), pwdDigest); 427 char *password, 453 if(password != NULL) { 459 if(password == NULL) { 516 if(ssh1DES3Crypt(cipherSpec, false, cp, remLen, password, ptex 337 ssh1DES3Crypt( unsigned char cipher, bool doEncrypt, const unsigned char *inText, unsigned inTextLen, const char *password, unsigned char *outText, unsigned *outTextLen) argument 424 decodeSSH1RSAPrivKey( const unsigned char *key, unsigned keyLen, char *password, RSA *rsa, char **comment) argument 664 encodeSSH1RSAPrivKey( RSA *rsa, const char *password, const char *comment, unsigned char **outKey, unsigned *outKeyLen) argument 1270 char *password = NULL; local [all...] |
/macosx-10.10/apache-793/httpd/modules/aaa/ |
H A D | mod_auth_form.c | 60 const char *password; member in struct:__anon6125 97 conf->password = "httpd_password"; 119 new->password = (add->password_set == 0) ? base->password : add->password; 241 static const char *set_cookie_form_password(cmd_parms * cmd, void *config, const char *password) argument 244 conf->password = password; 246 return check_string(cmd, password); 379 "The field of the login form carrying the password"), 608 get_form_auth(request_rec * r, const char *username, const char *password, const char *location, const char *method, const char *mimetype, const char *body, const char **sent_user, const char **sent_pw, const char **sent_loc, const char **sent_method, const char **sent_mimetype, apr_bucket_brigade **sent_body, auth_form_config_rec * conf) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/akadmin/ |
H A D | admin.c | 184 CFStringRef principal = NULL, password = NULL; local 218 password = CFStringCreateWithCString(kCFAllocatorDefault, argv[1], kCFStringEncodingUTF8); 219 if (password == NULL) 228 error = HeimODSetKeys(node, record, principal, enctypes, password, flags, &cferror); 248 if (password) 249 CFRelease(password); 733 CFStringRef principal = NULL, password = NULL; 737 printf("principal: %s password: %s\n", principalstr, passwordstr); 780 errx(1, "missing principal and password arguments that is needed when adding new keys"); 783 password [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/utils/ |
H A D | testsuite.c | 102 const char *password = "1234"; variable 1148 *tresult=(char *) password; 2734 /* Try to set password then check it */ 2736 result = sasl_setpass(saslconn, username, password, 2737 (unsigned) strlen(password), 2741 fatal("Error setting password. Do we have write access to sasldb?"); 2746 password, (unsigned) strlen(password)); 2749 fatal("Unable to verify password we just set"); 2764 _sasl_MD5Update(&ctx,password,strle [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | deprecated.c | 194 const char *password = (const char *)keyseed; variable 202 if (password == NULL) { 208 password = buf; 210 ret = krb5_string_to_key_salt (context, type, password, salt, *key); 227 const char *password, 239 password,
|
H A D | changepw.c | 40 const char *password; member in struct:request 44 * Change password protocol defined by 45 * draft-ietf-cat-kerb-chg-password-02.txt 47 * Share the response part of the protocol with MS set password 79 passwd_data.data = rk_UNCONST(request->password); 80 passwd_data.length = strlen(request->password); 128 * Set password protocol as defined by RFC3244 -- 162 chpw.newpasswd.length = strlen(request->password); 163 chpw.newpasswd.data = rk_UNCONST(request->password); 373 * change the password usin [all...] |
H A D | test_crypto.c | 93 const char *password, 114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
H A D | test_rfc3961.c | 93 const char *password, 114 ret = krb5_string_to_key_salt_opaque(context, etype, password, salt, 91 time_s2k(krb5_context context, krb5_enctype etype, const char *password, krb5_salt salt, int iterations) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/ |
H A D | test_ntlm.c | 51 *password = "digestpassword", local 120 heim_ntlm_nt_key(password, &key); 188 *password = "test1234", local 208 heim_ntlm_nt_key(password, &key); 538 const char *password = "clientPass"; local 549 heim_ntlm_nt_key(password, &pwbuf);
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | sshconnect1.c | 460 char *password; local 462 debug("Doing password authentication."); 468 password = read_passphrase(prompt, 0); 470 ssh_put_password(password); 471 memset(password, 0, strlen(password)); 472 xfree(password); 698 * needed (the user has no password). Otherwise the server responds 747 /* Try password authentication if the server supports it. */ 752 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/Tool/ |
H A D | keychain_sync.c | 245 CFDataRef password = CFDataCreate(NULL, (const UInt8*) password_token, strlen(password_token)); local 246 bool returned = !SOSCCSetUserCredentials(label, password, err); 248 CFRelease(password); 260 CFDataRef password = CFDataCreate(NULL, (const UInt8*) password_token, strlen(password_token)); local 261 bool returned = !SOSCCTryUserCredentials(label, password, err); 263 CFRelease(password); 413 " -P [label:]password Set password (optionally for a given label) for sync\n" 415 " -P [label:]password Set password (optionall [all...] |
/macosx-10.10/WebCore-7600.1.25/platform/network/mac/ |
H A D | AuthenticationMac.mm | 255 password:coreCredential.password() 287 return Credential([macCredential user], [macCredential password], persistence);
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | curl_ntlm_core.c | 312 * Set up lanmanager hashed password 315 const char *password, 323 size_t len = CURLMIN(strlen(password), 14); 325 Curl_strntoupper((char *)pw, password, len); 329 * The LanManager hashed password needs to be created using the 330 * password in the network encoding not the host encoding. 337 /* Create LanManager hashed password. */ 419 const char *password, 422 size_t len = strlen(password); 428 ascii_to_unicode_le(pw, password, le 314 Curl_ntlm_core_mk_lm_hash(struct SessionHandle *data, const char *password, unsigned char *lmbuffer ) argument 418 Curl_ntlm_core_mk_nt_hash(struct SessionHandle *data, const char *password, unsigned char *ntbuffer ) argument [all...] |
/macosx-10.10/ruby-106/ruby/lib/net/ |
H A D | telnet.rb | 36 # set to your host, calling #login() with your user and password, 72 # localhost.login("username", "password") { |c| print c } 700 # Login to the host with a given username and password. 702 # The username and password can either be provided as two string 707 # host to determine when to send the username and password. If the 712 # The password can be omitted, either by only 719 # the host, including the echoed username but not the password (which 722 def login(options, password = nil) # :yield: recvdata 727 password = options["Password"] 736 if password [all...] |
/macosx-10.10/Heimdal-398.1.2/appl/test/ |
H A D | common.c | 44 char *password = NULL; variable 51 { "password", 'P', arg_string, &password, "password to use", "password" },
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | gsskrb5_locl.h | 143 char *password; member in struct:gsskrb5_ctx 165 char *password; member in struct:gsskrb5_cred
|
/macosx-10.10/Heimdal-398.1.2/tests/kdc/ |
H A D | check-hdb-mitdb.in | 102 ${kinit} --password-file=${objdir}/foopassword foo@$R || \
|
/macosx-10.10/JavaScriptCore-7600.1.17/tests/mozilla/ecma_3/RegExp/ |
H A D | regress-85721.js | 80 str='<sql:connection id="conn1"> <sql:url>www.m.com</sql:url> <sql:driver>drive.class</sql:driver>\n<sql:userId>foo</sql:userId> <sql:password>goo</sql:password> </sql:connection>'; 81 re = /<sql:connection id="([^\r\n]*?)">\s*<sql:url>\s*([^\r\n]*?)\s*<\/sql:url>\s*<sql:driver>\s*([^\r\n]*?)\s*<\/sql:driver>\s*(\s*<sql:userId>\s*([^\r\n]*?)\s*<\/sql:userId>\s*)?\s*(\s*<sql:password>\s*([^\r\n]*?)\s*<\/sql:password>\s*)?\s*<\/sql:connection>/; 82 expect = Array("<sql:connection id=\"conn1\"> <sql:url>www.m.com</sql:url> <sql:driver>drive.class</sql:driver>\n<sql:userId>foo</sql:userId> <sql:password>goo</sql:password> </sql:connection>","conn1","www.m.com","drive.class","<sql:userId>foo</sql:userId> ","foo","<sql:password>goo</sql:password> ","goo");
|
/macosx-10.10/MITKerberosShim-66/test/ |
H A D | test-gss.sh | 16 pw_file="${tmp}/password-file" 77 ${kinit} --password-file="${pw_file}" "${user}@${realm}"
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-sql/rdbms_depend/ibmdb2/ |
H A D | testdb_create.sql | 6 password varchar(64)
|