Searched refs:password (Results 76 - 100 of 744) sorted by relevance

1234567891011>>

/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/digest/
H A Dacquire_cred.c139 char *password; local
168 password = malloc(credential_buffer->length + 1);
169 if (password == NULL) {
173 memcpy(password, credential_buffer->value, credential_buffer->length);
174 password[credential_buffer->length] = '\0';
176 ret = krb5_store_stringz(request, password);
177 memset(password, 0, strlen(password));
178 free(password);
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/
H A Dsalt-arcfour.c43 krb5_data password,
60 for (i = 0; i < password.length; i++) {
63 p = ((const uint8_t *)password.data)[i] & 0xff;
85 krb5_data password,
97 return ARCFOUR_string_to_key_broken(context, enctype, password,
100 str = malloc(password.length + 1);
106 memcpy(str, password.data, password.length);
107 str[password.length] = '\0';
41 ARCFOUR_string_to_key_broken(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
83 ARCFOUR_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
/macosx-10.10.1/Heimdal-398.1.2/lib/ntlm/
H A Dapop.c68 heim_apop_create(const char *challenge, const char *password) argument
76 CC_MD5_Update(&ctx, password, (CC_LONG)strlen(password));
88 heim_apop_verify(const char *challenge, const char *password, const char *response) argument
93 str = heim_apop_create(challenge, password);
112 heim_cram_md5_export(const char *password, heim_CRAM_MD5_STATE *state) argument
114 size_t keylen = strlen(password);
123 CC_MD5(password, (CC_LONG)keylen, key);
126 memcpy(key, password, keylen);
227 heim_cram_md5_create(const char *challenge, const char *password) argument
247 heim_cram_md5_verify(const char *challenge, const char *password, const char *response) argument
[all...]
/macosx-10.10.1/Heimdal-398.1.2/tests/ldap/
H A Dcheck-ldap.in105 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1
106 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1
107 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1
109 ${kadmin} cpw --random-password suser@${R} > /dev/null|| exit 1
110 ${kadmin} cpw --password=foo suser@${R} || exit 1
132 ${kinit} --password-file=${objdir}/foopassword foo@$R || \
140 ${kinit} --password-file=${objdir}/foopassword '*'@$R 2>/dev/null && \
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/plugins/
H A Dlogin.c148 /* demand password */
158 sasl_secret_t *password; local
168 /* get password */
169 password =
171 if (!password) {
176 strncpy((char *) password->data, clientin, clientinlen);
177 password->data[clientinlen] = '\0';
178 password->len = clientinlen;
180 /* canonicalize username first, so that password verification is
192 (char *) password
282 sasl_secret_t *password; member in struct:client_context
[all...]
/macosx-10.10.1/Heimdal-398.1.2/kadmin/
H A Dcpw.c41 char *password; member in struct:cpw_entry_data
76 printf ("%s's password set to \"%s\"\n", princ_name, pw);
84 set_password (krb5_principal principal, char *password, int keepold) argument
89 if(password == NULL) {
101 password = pwbuf;
105 password);
132 return set_password (principal, e->password, e->keepold);
147 data.password = opt->password_string;
155 if (data.password)
162 "--random-key, --random-password,
[all...]
/macosx-10.10.1/Heimdal-398.1.2/kdc/
H A Dstring2key.c42 char *password; variable
54 { "password", 'w', arg_string, &password, "Password to use", "password" },
66 arg_printusage (args, num_args, NULL, "password");
158 password = argv[0];
159 if(password == NULL){
162 password = buf;
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
175 tokey(context, ETYPE_DES_CBC_MD5, password, sal
[all...]
/macosx-10.10.1/Heimdal-398.1.2/tests/GSSTestApp/Tests/
H A DSenTestCase+GSS.h15 - (gss_cred_id_t)STCAcquireCredential:(NSString *)name withPassword:(NSString *)password mech:(gss_OID)mech;
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_client/
H A Dkeychainacl.h56 const AutoCredentials *passwordChangeCredentials(const CssmData &password);
57 const AutoCredentials *passwordUnlockCredentials(const CssmData &password);
H A Dkeychainacl.cpp75 const AutoCredentials *KeychainAclFactory::passwordChangeCredentials(const CssmData &password) argument
78 // @@@ This leaks a ListElement(CSSM_SAMPLE_TYPE_KEYCHAIN_PROMPT) and ListElement(password)
81 new(allocator) ListElement(password));
85 const AutoCredentials *KeychainAclFactory::passwordUnlockCredentials(const CssmData &password) argument
88 // @@@ This leaks a ListElement(CSSM_SAMPLE_TYPE_KEYCHAIN_PROMPT) and ListElement(password)
91 new(allocator) ListElement(password));
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_utilities/
H A Dacl_protectedpw.h26 // acl_protectedpw - protected-path password-based ACL subject types.
28 // This implements "protected path" password-based subject types as per CSSM standard.
31 // Note: A password prompted through securityd/SecurityAgent is a "prompted password",
32 // not a "protected password". See acl_prompted.h.
51 ProtectedPasswordAclSubject(Allocator &alloc, const CssmData &password);
52 ProtectedPasswordAclSubject(Allocator &alloc, CssmManagedData &password);
H A Dacl_secret.cpp26 // acl_secret - secret-validation password ACLs framework.
39 CSSM_ACL_SUBJECT_TYPE type, const CssmData &password)
41 mSecret(alloc, password), mSecretValid(true), mCacheSecret(false)
45 CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &password)
47 mSecret(alloc, password), mSecretValid(true), mCacheSecret(false)
38 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, const CssmData &password) argument
44 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &password) argument
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/
H A Dkeychainacl.h56 const AutoCredentials *passwordChangeCredentials(const CssmData &password);
57 const AutoCredentials *passwordUnlockCredentials(const CssmData &password);
H A Dkeychainacl.cpp75 const AutoCredentials *KeychainAclFactory::passwordChangeCredentials(const CssmData &password) argument
78 // @@@ This leaks a ListElement(CSSM_SAMPLE_TYPE_KEYCHAIN_PROMPT) and ListElement(password)
81 new(allocator) ListElement(password));
85 const AutoCredentials *KeychainAclFactory::passwordUnlockCredentials(const CssmData &password) argument
88 // @@@ This leaks a ListElement(CSSM_SAMPLE_TYPE_KEYCHAIN_PROMPT) and ListElement(password)
91 new(allocator) ListElement(password));
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/
H A Dacl_protectedpw.h26 // acl_protectedpw - protected-path password-based ACL subject types.
28 // This implements "protected path" password-based subject types as per CSSM standard.
31 // Note: A password prompted through securityd/SecurityAgent is a "prompted password",
32 // not a "protected password". See acl_prompted.h.
51 ProtectedPasswordAclSubject(Allocator &alloc, const CssmData &password);
52 ProtectedPasswordAclSubject(Allocator &alloc, CssmManagedData &password);
H A Dacl_secret.cpp26 // acl_secret - secret-validation password ACLs framework.
39 CSSM_ACL_SUBJECT_TYPE type, const CssmData &password)
41 mSecret(alloc, password), mSecretValid(true), mCacheSecret(false)
45 CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &password)
47 mSecret(alloc, password), mSecretValid(true), mCacheSecret(false)
38 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, const CssmData &password) argument
44 SecretAclSubject(Allocator &alloc, CSSM_ACL_SUBJECT_TYPE type, CssmManagedData &password) argument
/macosx-10.10.1/curl-83.1.2/curl/lib/
H A Dcurl_ntlm_core.h57 const char *password,
66 const char *password,
/macosx-10.10.1/vim-55/src/proto/
H A Dblowfish.pro2 void bf_key_init __ARGS((char_u *password, char_u *salt, int salt_len));
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/
H A DSCNetworkConfigurationInternal.c456 __copy_legacy_password(CFTypeRef password) argument
458 if (password == NULL) {
462 if (isA_CFData(password)) {
465 n = CFDataGetLength(password);
471 encoding = (*(CFDataGetBytePtr(password) + 1) == 0x00) ? kCFStringEncodingUTF16LE : kCFStringEncodingUTF16BE;
473 encoding = (*(CFDataGetBytePtr(password) ) == 0x00) ? kCFStringEncodingUTF16BE : kCFStringEncodingUTF16LE;
476 (const UInt8 *)CFDataGetBytePtr(password),
480 password = CFStringCreateExternalRepresentation(NULL,
486 password = NULL;
488 } else if (isA_CFString(password)
504 __extract_password(SCPreferencesRef prefs, CFDictionaryRef config, CFStringRef passwordKey, CFStringRef encryptionKey, CFStringRef encryptionKeyChainValue, CFStringRef unique_id, CFDataRef *password) argument
[all...]
/macosx-10.10.1/Heimdal-398.1.2/lib/hcrypto/
H A Dpkcs5.c53 * As descriped in PKCS5, convert a password, salt, and iteration counter into a crypto key.
55 * @param password Password.
56 * @param password_len Length of password.
69 PKCS5_PBKDF2_HMAC_SHA1(const void * password, size_t password_len, argument
75 if (CCKeyDerivationPBKDF(kCCPBKDF2, password, password_len,
120 HMAC(md, password, password_len, data, datalen,
125 HMAC(md, password, password_len, tmpcksum, checksumsize,
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/
H A DSecItemPriv.h43 @constant kSecClassAppleSharePassword Specifies AppleShare password items.
325 The password argument is optional, passing NULL implies no backup password
329 CFDataRef _SecKeychainCopyBackup(CFDataRef backupKeybag, CFDataRef password);
332 CFDataRef password);
334 OSStatus _SecKeychainBackupSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in, CFDictionaryRef *backup_out);
335 OSStatus _SecKeychainRestoreSyncable(CFDataRef keybag, CFDataRef password, CFDictionaryRef backup_in);
/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/API/efl/
H A Dewk_auth_request.h112 EAPI Eina_Bool ewk_auth_request_authenticate(Ewk_Auth_Request *request, const char *username, const char *password);
/macosx-10.10.1/iodbc-42.5/iodbc/drvproxy/gtk/
H A Dgui.h84 GtkWidget *username, *password, *mainwnd; member in struct:TLOGIN
/macosx-10.10.1/security_systemkeychain-55202/src/
H A DTokenIDHelper.h45 int unlockToken(const char *password);
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/mech/
H A Dgss_acquire_cred_with_password.c38 const gss_buffer_t password,
52 password,
77 password,
36 gss_acquire_cred_with_password(OM_uint32 *minor_status, const gss_name_t desired_name, const gss_buffer_t password, OM_uint32 time_req, const gss_OID_set desired_mechs, gss_cred_usage_t cred_usage, gss_cred_id_t *output_cred_handle, gss_OID_set *actual_mechs, OM_uint32 *time_rec) argument

Completed in 293 milliseconds

1234567891011>>