/macosx-10.10.1/ruby-106/ruby/ext/dl/win32/lib/win32/ |
H A D | sspi.rb | 136 attr_accessor :user, :domain, :password 138 def initialize(user = nil, domain = nil, password = nil) 141 @password = password 148 @password, @password ? @password.length : 0,
|
/macosx-10.10.1/Heimdal-398.1.2/tests/kdc/ |
H A D | check-fast.in | 115 ${kinit} --password-file=${testdir}/foopassword foo@$R || \ 126 ${akinit} --password-file=${testdir}/foopassword ${server}@${R} >/dev/null|| { exit 1; } 136 --password-file=${testdir}/foopassword foo@$R || \ 147 --password-file=${testdir}/foopassword newname@$R || \ 169 --password-file=${testdir}/foopassword foo@$R || \ 191 password foo\n
|
H A D | check-kadmin.in | 109 ${kinit} --password-file=${objdir}/foopassword \ 125 ${kinit} --password-file=${objdir}/foopassword \ 138 ${kinit} --password-file=${objdir}/foopassword \ 151 ${kinit} --password-file=${objdir}/foopassword \ 164 ${kinit} --password-file=${objdir}/foopassword \ 177 ${kinit} --password-file=${objdir}/foopassword \ 190 ${kinit} --password-file=${objdir}/foopassword \ 203 ${kinit} --password-file=${objdir}/foopassword \
|
H A D | check-uu.in | 104 ${kinit1} --password-file=${objdir}/foopassword user1@$R || \ 108 ${kinit2} --password-file=${objdir}/foopassword user2@$R || \
|
/macosx-10.10.1/ksh-23/ksh/src/cmd/INIT/ |
H A D | hurl.sh | 47 [a:authorize?The url authorization user name and password, separated 48 by \b:\b (one colon character.)]:[user::password] 177 read password 181 authorize=$user:$password 192 elif wget ${authorize:+--http-user="${authorize%:*}"} ${password:+--http-passwd="${password##*:}"} -nv -O - $url 2>/dev/null
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/java/CyrusSasl/ |
H A D | GenericClient.java | 95 private String password; field in class:GenericClient 123 pc = new PasswordCallback("Please enter your password", false); 149 this.password = new String(pc.getPassword()); 166 return password;
|
/macosx-10.10.1/system_cmds-643.1.1/login.tproj/ |
H A D | klogin.c | 81 * 1 if Kerberos failed (try local password in login) 84 klogin(pw, instance, localhost, password) 86 char *instance, *localhost, *password; 102 * for a password. If that's ok, log the user in 132 realm, INITIAL_TICKET, realm, DEFAULT_TKT_LIFE, password);
|
/macosx-10.10.1/emacs-93/emacs/lisp/gnus/ |
H A D | mail-source.el | 120 (const :format "" :value :password) 145 (const password) 174 (const :format "" :value :password) 228 (const :format "" :value :password) 352 (:password) 353 (:authentication password)) 365 (:password) 376 (:password) 378 (:authentication password))) 391 (defvar mail-source-password [all...] |
/macosx-10.10.1/CPANInternal-159.1/Log-Log4perl-1.40/lib/Log/Log4perl/JavaMap/ |
H A D | JDBCAppender.pm | 10 my $pwd = $data->{password}{value} || 11 die "'password' not supplied for appender '$appender_name', required for a '$data->{value}'\n"; 51 password => $pwd, 74 password 83 password
|
/macosx-10.10.1/CommonCrypto-60061/include/ |
H A D | CommonKeyDerivation.h | 66 @abstract Derive a key from a text password/passphrase 69 @param password The text password used as input to the derivation 75 @param passwordLen The length of the text password in bytes. 95 @result kCCParamError can result from bad values for the password, salt, 102 CCKeyDerivationPBKDF( CCPBKDFAlgorithm algorithm, const char *password, size_t passwordLen, 118 @param passwordLen The length of the text password in bytes.
|
/macosx-10.10.1/Heimdal-398.1.2/tests/GSSTestApp/GSSTestAppOSX/ |
H A D | AppDelegate.h | 23 @property (assign) IBOutlet NSSecureTextField *password; variable
|
/macosx-10.10.1/Security-57031.1.35/SecurityTool/ |
H A D | createFVMaster.c | 96 sec_error("You must supply a non-empty password"); 669 char *password = NULL; local 677 AG: while loop calling getopt is used to extract password from cl from user 678 password is the only option to keychain_create 690 password = optarg; 724 if (!password && !do_prompt) 733 password = getpass("password for new keychain: "); 734 if (!password) 740 firstpass = malloc(strlen(password) [all...] |
/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/API/gtk/ |
H A D | WebKitCredential.h | 57 const gchar *password,
|
/macosx-10.10.1/apache-793/httpd/include/ |
H A D | mod_auth.h | 81 /* Given a username and password, expected to return AUTH_GRANTED 82 * if we can validate this user/password combination. 85 const char *password); 88 * can find a md5 hash of 'user:realm:password'
|
/macosx-10.10.1/apr-32/apr-util/apr-util/include/ |
H A D | apr_ldap_option.h | 106 * void *password); 163 * @param password Optional password, can be NULL 169 const char *password; member in struct:apr_ldap_opt_tls_cert_t
|
H A D | apr_md5.h | 133 * Encode a password using an MD5 algorithm 134 * @param password The password to encode 136 * @param result The string to store the encoded password in 139 APU_DECLARE(apr_status_t) apr_md5_encode(const char *password, const char *salt, 143 * Encode a password using the bcrypt algorithm 144 * @param password The password to encode 148 * @param out The string to store the encoded password in 164 * @param passwd The password t [all...] |
/macosx-10.10.1/eap8021x-198/EAP8021X.fproj/ |
H A D | eapgtc_plugin.c | 96 plugin->password, plugin->password_length); 99 memcpy(out_pkt_p->type_data, plugin->password, plugin->password_length); 152 if (plugin->password == NULL) { 178 if (plugin->password != NULL) {
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_shadow.c | 81 * Authenticate against the system shadow password database. Where 90 const char *password, /* I: plaintext password */ 128 * "Magic" password field entries for SunOS/SysV 131 * inserted in front of the password will prevent the strings from matching 134 * insufficient permission to read the shadow password database 214 cpw = strdup((const char *)crypt(password, sp->sp_pwdp)); 226 RETURN("NO Incorrect password"); 245 /* Remaining tests are relative to the last change date for the password */ 252 "DEBUG: auth_shadow: password expire 86 auth_shadow( const char *login, const char *password, const char *service __attribute__((unused)), const char *realm __attribute__((unused)) ) argument [all...] |
/macosx-10.10.1/security_dotmac_tp-55107.1/lib/ |
H A D | dotMacXmlRpc.cpp | 70 CFStringRef password, 91 username, password, kCFHTTPAuthenticationSchemeDigest, FALSE); 114 CFStringRef password, 163 userName, password, response); 67 addAuthenticationToWSInvokation( WSMethodInvocationRef wsRef, CFStringRef username, CFStringRef password, CFDictionaryRef response) argument 108 performAuthenticatedXMLRPC( CFURLRef theURL, CFStringRef theMethod, CFDictionaryRef argDict, CFArrayRef argOrder, CFStringRef userName, CFStringRef password, CFDictionaryRef *resultDict, uint32_t *httpErrStatus) argument
|
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/modules/pop3d/ |
H A D | pop3d_udb.tcl | 127 proc ::pop3d::udb::_add {name usrName password storage} { 129 # @c password and a storage reference. The latter is stored and passed 133 # @a password: Password given to the user. 138 if {$password == {}} {return -code error "password not specified"} 143 set user($usrName) [list $password $storage] 195 # @r a 2-element list containing password and storage 256 set password [lindex $user($name) 0] 259 puts $f "\tadd [list $name] [list $password] [list $storage]"
|
/macosx-10.10.1/uucp-11/uucp/contrib/ |
H A D | Login.LAT | 5 # terminal server port. If no VMS password parameter supplied, 6 # skips password phase of VMS login. If LAT-password supplied, 7 # will log into LAT server using that password. NOTE: does not 8 # handle the situation where a LAT password is needed but no 9 # VMS password is needed. 12 # xchat login.LAT sysname username [ password [ LAT-password ] ] 29 ifnstr svrstart 3 # Skip server password if not given 31 # Starting point if server password supplie [all...] |
/macosx-10.10.1/zlib-55/zlib/contrib/minizip/ |
H A D | zip.h | 230 const char* password, 247 const char* password, 255 password : crypting password (NULL for no crypting) 273 const char* password, 294 const char* password,
|
/macosx-10.10.1/Heimdal-398.1.2/tests/apple/ |
H A D | check-apple-od.in | 55 password smbtest\n 66 # --client-name='smbtest@\targetname' --password='smbtest' service@host || \
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | gencerts.sh | 7 openssl pkcs12 -export -passout pass:password -out identity-1.p12 -inkey privkey-1.pem -in cert-1.pem
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/importExport/ |
H A D | setupCommon | 54 # our keychain's password 56 set KEYCHAIN_PWD=password
|