Searched refs:password (Results 201 - 225 of 744) sorted by relevance

1234567891011>>

/macosx-10.10.1/ruby-106/ruby/ext/dl/win32/lib/win32/
H A Dsspi.rb136 attr_accessor :user, :domain, :password
138 def initialize(user = nil, domain = nil, password = nil)
141 @password = password
148 @password, @password ? @password.length : 0,
/macosx-10.10.1/Heimdal-398.1.2/tests/kdc/
H A Dcheck-fast.in115 ${kinit} --password-file=${testdir}/foopassword foo@$R || \
126 ${akinit} --password-file=${testdir}/foopassword ${server}@${R} >/dev/null|| { exit 1; }
136 --password-file=${testdir}/foopassword foo@$R || \
147 --password-file=${testdir}/foopassword newname@$R || \
169 --password-file=${testdir}/foopassword foo@$R || \
191 password foo\n
H A Dcheck-kadmin.in109 ${kinit} --password-file=${objdir}/foopassword \
125 ${kinit} --password-file=${objdir}/foopassword \
138 ${kinit} --password-file=${objdir}/foopassword \
151 ${kinit} --password-file=${objdir}/foopassword \
164 ${kinit} --password-file=${objdir}/foopassword \
177 ${kinit} --password-file=${objdir}/foopassword \
190 ${kinit} --password-file=${objdir}/foopassword \
203 ${kinit} --password-file=${objdir}/foopassword \
H A Dcheck-uu.in104 ${kinit1} --password-file=${objdir}/foopassword user1@$R || \
108 ${kinit2} --password-file=${objdir}/foopassword user2@$R || \
/macosx-10.10.1/ksh-23/ksh/src/cmd/INIT/
H A Dhurl.sh47 [a:authorize?The url authorization user name and password, separated
48 by \b:\b (one colon character.)]:[user::password]
177 read password
181 authorize=$user:$password
192 elif wget ${authorize:+--http-user="${authorize%:*}"} ${password:+--http-passwd="${password##*:}"} -nv -O - $url 2>/dev/null
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/CyrusSasl/
H A DGenericClient.java95 private String password; field in class:GenericClient
123 pc = new PasswordCallback("Please enter your password", false);
149 this.password = new String(pc.getPassword());
166 return password;
/macosx-10.10.1/system_cmds-643.1.1/login.tproj/
H A Dklogin.c81 * 1 if Kerberos failed (try local password in login)
84 klogin(pw, instance, localhost, password)
86 char *instance, *localhost, *password;
102 * for a password. If that's ok, log the user in
132 realm, INITIAL_TICKET, realm, DEFAULT_TKT_LIFE, password);
/macosx-10.10.1/emacs-93/emacs/lisp/gnus/
H A Dmail-source.el120 (const :format "" :value :password)
145 (const password)
174 (const :format "" :value :password)
228 (const :format "" :value :password)
352 (:password)
353 (:authentication password))
365 (:password)
376 (:password)
378 (:authentication password)))
391 (defvar mail-source-password
[all...]
/macosx-10.10.1/CPANInternal-159.1/Log-Log4perl-1.40/lib/Log/Log4perl/JavaMap/
H A DJDBCAppender.pm10 my $pwd = $data->{password}{value} ||
11 die "'password' not supplied for appender '$appender_name', required for a '$data->{value}'\n";
51 password => $pwd,
74 password
83 password
/macosx-10.10.1/CommonCrypto-60061/include/
H A DCommonKeyDerivation.h66 @abstract Derive a key from a text password/passphrase
69 @param password The text password used as input to the derivation
75 @param passwordLen The length of the text password in bytes.
95 @result kCCParamError can result from bad values for the password, salt,
102 CCKeyDerivationPBKDF( CCPBKDFAlgorithm algorithm, const char *password, size_t passwordLen,
118 @param passwordLen The length of the text password in bytes.
/macosx-10.10.1/Heimdal-398.1.2/tests/GSSTestApp/GSSTestAppOSX/
H A DAppDelegate.h23 @property (assign) IBOutlet NSSecureTextField *password; variable
/macosx-10.10.1/Security-57031.1.35/SecurityTool/
H A DcreateFVMaster.c96 sec_error("You must supply a non-empty password");
669 char *password = NULL; local
677 AG: while loop calling getopt is used to extract password from cl from user
678 password is the only option to keychain_create
690 password = optarg;
724 if (!password && !do_prompt)
733 password = getpass("password for new keychain: ");
734 if (!password)
740 firstpass = malloc(strlen(password)
[all...]
/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/API/gtk/
H A DWebKitCredential.h57 const gchar *password,
/macosx-10.10.1/apache-793/httpd/include/
H A Dmod_auth.h81 /* Given a username and password, expected to return AUTH_GRANTED
82 * if we can validate this user/password combination.
85 const char *password);
88 * can find a md5 hash of 'user:realm:password'
/macosx-10.10.1/apr-32/apr-util/apr-util/include/
H A Dapr_ldap_option.h106 * void *password);
163 * @param password Optional password, can be NULL
169 const char *password; member in struct:apr_ldap_opt_tls_cert_t
H A Dapr_md5.h133 * Encode a password using an MD5 algorithm
134 * @param password The password to encode
136 * @param result The string to store the encoded password in
139 APU_DECLARE(apr_status_t) apr_md5_encode(const char *password, const char *salt,
143 * Encode a password using the bcrypt algorithm
144 * @param password The password to encode
148 * @param out The string to store the encoded password in
164 * @param passwd The password t
[all...]
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/
H A Deapgtc_plugin.c96 plugin->password, plugin->password_length);
99 memcpy(out_pkt_p->type_data, plugin->password, plugin->password_length);
152 if (plugin->password == NULL) {
178 if (plugin->password != NULL) {
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/saslauthd/
H A Dauth_shadow.c81 * Authenticate against the system shadow password database. Where
90 const char *password, /* I: plaintext password */
128 * "Magic" password field entries for SunOS/SysV
131 * inserted in front of the password will prevent the strings from matching
134 * insufficient permission to read the shadow password database
214 cpw = strdup((const char *)crypt(password, sp->sp_pwdp));
226 RETURN("NO Incorrect password");
245 /* Remaining tests are relative to the last change date for the password */
252 "DEBUG: auth_shadow: password expire
86 auth_shadow( const char *login, const char *password, const char *service __attribute__((unused)), const char *realm __attribute__((unused)) ) argument
[all...]
/macosx-10.10.1/security_dotmac_tp-55107.1/lib/
H A DdotMacXmlRpc.cpp70 CFStringRef password,
91 username, password, kCFHTTPAuthenticationSchemeDigest, FALSE);
114 CFStringRef password,
163 userName, password, response);
67 addAuthenticationToWSInvokation( WSMethodInvocationRef wsRef, CFStringRef username, CFStringRef password, CFDictionaryRef response) argument
108 performAuthenticatedXMLRPC( CFURLRef theURL, CFStringRef theMethod, CFDictionaryRef argDict, CFArrayRef argOrder, CFStringRef userName, CFStringRef password, CFDictionaryRef *resultDict, uint32_t *httpErrStatus) argument
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/modules/pop3d/
H A Dpop3d_udb.tcl127 proc ::pop3d::udb::_add {name usrName password storage} {
129 # @c password and a storage reference. The latter is stored and passed
133 # @a password: Password given to the user.
138 if {$password == {}} {return -code error "password not specified"}
143 set user($usrName) [list $password $storage]
195 # @r a 2-element list containing password and storage
256 set password [lindex $user($name) 0]
259 puts $f "\tadd [list $name] [list $password] [list $storage]"
/macosx-10.10.1/uucp-11/uucp/contrib/
H A DLogin.LAT5 # terminal server port. If no VMS password parameter supplied,
6 # skips password phase of VMS login. If LAT-password supplied,
7 # will log into LAT server using that password. NOTE: does not
8 # handle the situation where a LAT password is needed but no
9 # VMS password is needed.
12 # xchat login.LAT sysname username [ password [ LAT-password ] ]
29 ifnstr svrstart 3 # Skip server password if not given
31 # Starting point if server password supplie
[all...]
/macosx-10.10.1/zlib-55/zlib/contrib/minizip/
H A Dzip.h230 const char* password,
247 const char* password,
255 password : crypting password (NULL for no crypting)
273 const char* password,
294 const char* password,
/macosx-10.10.1/Heimdal-398.1.2/tests/apple/
H A Dcheck-apple-od.in55 password smbtest\n
66 # --client-name='smbtest@\targetname' --password='smbtest' service@host || \
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/regressions/
H A Dgencerts.sh7 openssl pkcs12 -export -passout pass:password -out identity-1.p12 -inkey privkey-1.pem -in cert-1.pem
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/importExport/
H A DsetupCommon54 # our keychain's password
56 set KEYCHAIN_PWD=password

Completed in 159 milliseconds

1234567891011>>