/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/digest/ |
H A D | acquire_cred.c | 139 char *password; local 168 password = malloc(credential_buffer->length + 1); 169 if (password == NULL) { 173 memcpy(password, credential_buffer->value, credential_buffer->length); 174 password[credential_buffer->length] = '\0'; 176 ret = krb5_store_stringz(request, password); 177 memset(password, 0, strlen(password)); 178 free(password);
|
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | salt-arcfour.c | 43 krb5_data password, 60 for (i = 0; i < password.length; i++) { 63 p = ((const uint8_t *)password.data)[i] & 0xff; 85 krb5_data password, 97 return ARCFOUR_string_to_key_broken(context, enctype, password, 100 str = malloc(password.length + 1); 106 memcpy(str, password.data, password.length); 107 str[password.length] = '\0'; 41 ARCFOUR_string_to_key_broken(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 83 ARCFOUR_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
|
/macosx-10.10.1/Heimdal-398.1.2/lib/ntlm/ |
H A D | apop.c | 68 heim_apop_create(const char *challenge, const char *password) argument 76 CC_MD5_Update(&ctx, password, (CC_LONG)strlen(password)); 88 heim_apop_verify(const char *challenge, const char *password, const char *response) argument 93 str = heim_apop_create(challenge, password); 112 heim_cram_md5_export(const char *password, heim_CRAM_MD5_STATE *state) argument 114 size_t keylen = strlen(password); 123 CC_MD5(password, (CC_LONG)keylen, key); 126 memcpy(key, password, keylen); 227 heim_cram_md5_create(const char *challenge, const char *password) argument 247 heim_cram_md5_verify(const char *challenge, const char *password, const char *response) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/tests/ldap/ |
H A D | check-ldap.in | 105 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1 106 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1 107 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1 109 ${kadmin} cpw --random-password suser@${R} > /dev/null|| exit 1 110 ${kadmin} cpw --password=foo suser@${R} || exit 1 132 ${kinit} --password-file=${objdir}/foopassword foo@$R || \ 140 ${kinit} --password-file=${objdir}/foopassword '*'@$R 2>/dev/null && \
|
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/plugins/ |
H A D | login.c | 148 /* demand password */ 158 sasl_secret_t *password; local 168 /* get password */ 169 password = 171 if (!password) { 176 strncpy((char *) password->data, clientin, clientinlen); 177 password->data[clientinlen] = '\0'; 178 password->len = clientinlen; 180 /* canonicalize username first, so that password verification is 192 (char *) password 282 sasl_secret_t *password; member in struct:client_context [all...] |
/macosx-10.10.1/Heimdal-398.1.2/kadmin/ |
H A D | cpw.c | 41 char *password; member in struct:cpw_entry_data 76 printf ("%s's password set to \"%s\"\n", princ_name, pw); 84 set_password (krb5_principal principal, char *password, int keepold) argument 89 if(password == NULL) { 101 password = pwbuf; 105 password); 132 return set_password (principal, e->password, e->keepold); 147 data.password = opt->password_string; 155 if (data.password) 162 "--random-key, --random-password, [all...] |
/macosx-10.10.1/Heimdal-398.1.2/kdc/ |
H A D | string2key.c | 42 char *password; variable 54 { "password", 'w', arg_string, &password, "Password to use", "password" }, 66 arg_printusage (args, num_args, NULL, "password"); 158 password = argv[0]; 159 if(password == NULL){ 162 password = buf; 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); 175 tokey(context, ETYPE_DES_CBC_MD5, password, sal [all...] |
/macosx-10.10.1/Heimdal-398.1.2/tests/GSSTestApp/Tests/ |
H A D | SenTestCase+GSS.h | 15 - (gss_cred_id_t)STCAcquireCredential:(NSString *)name withPassword:(NSString *)password mech:(gss_OID)mech;
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_client/ |
H A D | keychainacl.h | 56 const AutoCredentials *passwordChangeCredentials(const CssmData &password); 57 const AutoCredentials *passwordUnlockCredentials(const CssmData &password);
|
H A D | keychainacl.cpp | 75 const AutoCredentials *KeychainAclFactory::passwordChangeCredentials(const CssmData &password) argument 78 // @@@ This leaks a ListElement(CSSM_SAMPLE_TYPE_KEYCHAIN_PROMPT) and ListElement(password) 81 new(allocator) ListElement(password)); 85 const AutoCredentials *KeychainAclFactory::passwordUnlockCredentials(const CssmData &password) argument 88 // @@@ This leaks a ListElement(CSSM_SAMPLE_TYPE_KEYCHAIN_PROMPT) and ListElement(password) 91 new(allocator) ListElement(password));
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_utilities/ |
H A D | acl_protectedpw.h | 26 // acl_protectedpw - protected-path password-based ACL subject types. 28 // This implements "protected path" password-based subject types as per CSSM standard. 31 // Note: A password prompted through securityd/SecurityAgent is a "prompted password", 32 // not a "protected password". See acl_prompted.h. 51 ProtectedPasswordAclSubject(Allocator &alloc, const CssmData &password); 52 ProtectedPasswordAclSubject(Allocator &alloc, CssmManagedData &password);
|
H A D | acl_secret.cpp | 26 // acl_secret - secret-validation password ACLs framework. 39 CSSM_ACL_SUBJECT_TYPE type, const CssmData &password) 41 mSecret(alloc, password), mSecretValid(true), mCacheSecret(false) 45 CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &password) 47 mSecret(alloc, password), mSecretValid(true), mCacheSecret(false) 38 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, const CssmData &password) argument 44 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &password) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | keychainacl.h | 56 const AutoCredentials *passwordChangeCredentials(const CssmData &password); 57 const AutoCredentials *passwordUnlockCredentials(const CssmData &password);
|
H A D | keychainacl.cpp | 75 const AutoCredentials *KeychainAclFactory::passwordChangeCredentials(const CssmData &password) argument 78 // @@@ This leaks a ListElement(CSSM_SAMPLE_TYPE_KEYCHAIN_PROMPT) and ListElement(password) 81 new(allocator) ListElement(password)); 85 const AutoCredentials *KeychainAclFactory::passwordUnlockCredentials(const CssmData &password) argument 88 // @@@ This leaks a ListElement(CSSM_SAMPLE_TYPE_KEYCHAIN_PROMPT) and ListElement(password) 91 new(allocator) ListElement(password));
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/ |
H A D | acl_protectedpw.h | 26 // acl_protectedpw - protected-path password-based ACL subject types. 28 // This implements "protected path" password-based subject types as per CSSM standard. 31 // Note: A password prompted through securityd/SecurityAgent is a "prompted password", 32 // not a "protected password". See acl_prompted.h. 51 ProtectedPasswordAclSubject(Allocator &alloc, const CssmData &password); 52 ProtectedPasswordAclSubject(Allocator &alloc, CssmManagedData &password);
|
H A D | acl_secret.cpp | 26 // acl_secret - secret-validation password ACLs framework. 39 CSSM_ACL_SUBJECT_TYPE type, const CssmData &password) 41 mSecret(alloc, password), mSecretValid(true), mCacheSecret(false) 45 CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &password) 47 mSecret(alloc, password), mSecretValid(true), mCacheSecret(false) 38 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, const CssmData &password) argument 44 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &password) argument
|
/macosx-10.10.1/curl-83.1.2/curl/lib/ |
H A D | curl_ntlm_core.h | 57 const char *password, 66 const char *password,
|
/macosx-10.10.1/vim-55/src/proto/ |
H A D | blowfish.pro | 2 void bf_key_init __ARGS((char_u *password, char_u *salt, int salt_len));
|
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/ |
H A D | SCNetworkConfigurationInternal.c | 456 __copy_legacy_password(CFTypeRef password) argument 458 if (password == NULL) { 462 if (isA_CFData(password)) { 465 n = CFDataGetLength(password); 471 encoding = (*(CFDataGetBytePtr(password) + 1) == 0x00) ? kCFStringEncodingUTF16LE : kCFStringEncodingUTF16BE; 473 encoding = (*(CFDataGetBytePtr(password) ) == 0x00) ? kCFStringEncodingUTF16BE : kCFStringEncodingUTF16LE; 476 (const UInt8 *)CFDataGetBytePtr(password), 480 password = CFStringCreateExternalRepresentation(NULL, 486 password = NULL; 488 } else if (isA_CFString(password) 504 __extract_password(SCPreferencesRef prefs, CFDictionaryRef config, CFStringRef passwordKey, CFStringRef encryptionKey, CFStringRef encryptionKeyChainValue, CFStringRef unique_id, CFDataRef *password) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/hcrypto/ |
H A D | pkcs5.c | 53 * As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key. 55 * @param password Password. 56 * @param password_len Length of password. 69 PKCS5_PBKDF2_HMAC_SHA1(const void * password, size_t password_len, argument 75 if (CCKeyDerivationPBKDF(kCCPBKDF2, password, password_len, 120 HMAC(md, password, password_len, data, datalen, 125 HMAC(md, password, password_len, tmpcksum, checksumsize,
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecItemPriv.h | 43 @constant kSecClassAppleSharePassword Specifies AppleShare password items. 325 The password argument is optional, passing NULL implies no backup password 329 CFDataRef _SecKeychainCopyBackup(CFDataRef backupKeybag, CFDataRef password); 332 CFDataRef password); 334 OSStatus _SecKeychainBackupSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in, CFDictionaryRef *backup_out); 335 OSStatus _SecKeychainRestoreSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in);
|
/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/API/efl/ |
H A D | ewk_auth_request.h | 112 EAPI Eina_Bool ewk_auth_request_authenticate(Ewk_Auth_Request *request, const char *username, const char *password);
|
/macosx-10.10.1/iodbc-42.5/iodbc/drvproxy/gtk/ |
H A D | gui.h | 84 GtkWidget *username, *password, *mainwnd; member in struct:TLOGIN
|
/macosx-10.10.1/security_systemkeychain-55202/src/ |
H A D | TokenIDHelper.h | 45 int unlockToken(const char *password);
|
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/mech/ |
H A D | gss_acquire_cred_with_password.c | 38 const gss_buffer_t password, 52 password, 77 password, 36 gss_acquire_cred_with_password(OM_uint32 *minor_status, const gss_name_t desired_name, const gss_buffer_t password, OM_uint32 time_req, const gss_OID_set desired_mechs, gss_cred_usage_t cred_usage, gss_cred_id_t *output_cred_handle, gss_OID_set *actual_mechs, OM_uint32 *time_rec) argument
|