/macosx-10.10/tcl-105/tcl_ext/expect/expect/example/ |
H A D | autopasswd | 5 set password [lindex $argv 1] 8 send -- "$password\r" 10 send -- "$password\r"
|
/macosx-10.10/curl-83.1.2/curl/tests/unit/ |
H A D | unit1304.c | 27 static char *password; variable 32 password = strdup(""); 34 if (!password || !login) { 35 Curl_safefree(password); 44 Curl_safefree(password); 57 result = Curl_parsenetrc("test.example.com", &login, &password, filename); 59 abort_unless(password != NULL, "returned NULL!"); 60 fail_unless(password[0] == 0, "password should not have been changed"); 70 result = Curl_parsenetrc("example.com", &login, &password, filenam 137 free(password); variable 152 free(password); variable 170 free(password); variable [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTool/ |
H A D | keychain_create.c | 39 do_create(const char *keychain, const char *password, Boolean do_prompt) argument 44 result = SecKeychainCreate(keychain, password ? strlen(password) : 0, password, do_prompt, NULL, &keychainRef); 58 char *password = NULL, *keychain = NULL; local 63 AG: while loop calling getopt is used to extract password from cl from user 64 password is the only option to keychain_create 76 password = optarg; 114 if (!password && !do_prompt) 123 password [all...] |
H A D | keychain_unlock.c | 38 do_unlock(const char *keychainName, char *password, Boolean use_password) argument 53 result = SecKeychainUnlock(keychain, password ? strlen(password) : 0, password, use_password); 70 char *password = NULL; local 80 password = optarg; 106 if (!password && use_password) 108 const char *fmt = "password to unlock %s: "; 112 password = getpass(prompt); 114 if (!password) [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/java/javax/security/auth/callback/ |
H A D | PasswordCallback.java | 7 private String password; field in class:PasswordCallback 27 return password; 30 public void setPassword(char[] password) argument 32 this.password = new String(password);
|
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | sample_passwd_check.c | 45 /* just check the length of the password, this is what the default 51 krb5_data *password) 57 if(password->length < min_length) 64 /* use cracklib to check password quality; this requires a patch for 71 krb5_data *password) 73 char *s = malloc(password->length + 1); 80 memcpy(s, password->data, password->length); 81 s[password->length] = '\0'; 83 memset(s, 0, password 49 check_length(krb5_context context, krb5_principal prinipal, krb5_data *password) argument 69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/pwcheck/ |
H A D | pwcheck_getpwnam.c | 30 char *pwcheck(userid, password) 32 char *password; 44 else if (strcmp(pwd->pw_passwd, crypt(password, pwd->pw_passwd)) != 0) { 45 r = "Incorrect password";
|
H A D | pwcheck_getspnam.c | 30 char *pwcheck(userid, password) 32 char *password; 41 if (strcmp(pwd->sp_pwdp, crypt(password, pwd->sp_pwdp)) != 0) { 42 return "Incorrect password";
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | auth2-passwd.c | 52 char *password, *newpass; local 58 password = packet_get_string(&len); 60 /* discard new password from packet */ 68 logit("password change not supported"); 69 else if (PRIVSEP(auth_password(authctxt, password)) == 1) 71 memset(password, 0, len); 72 xfree(password); 77 "password",
|
/macosx-10.10/CrackLib-37765/cracklib27/cracklib/ |
H A D | fascist.c | 53 /* attempt reverse engineering of password strings */ 428 GTry(rawtext, password) 430 char *password; 436 /* use destructors to turn password into rawtext */ 439 len = strlen(password); 443 if (!(mp = Mangle(password, r_destructors[i]))) 475 printf("%-16s = %-16s (construct %s)\n", mp, password, r_constructors[i]); 478 if (!strncmp(mp, password, len)) 488 FascistGecos(password, uid) 489 char *password; 630 char *password; local [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/roken/ |
H A D | verify.c | 46 unix_verify_user(char *user, char *password) argument 53 if(strlen(pw->pw_passwd) == 0 && strlen(password) == 0) 55 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
|
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/ |
H A D | acl_protectedpw.cpp | 26 // acl_protectedpw - protected-path password-based ACL subject types. 34 // Construct a password ACL subject 36 ProtectedPasswordAclSubject::ProtectedPasswordAclSubject(Allocator &alloc, const CssmData &password) argument 38 allocator(alloc), mPassword(alloc, password) 41 ProtectedPasswordAclSubject::ProtectedPasswordAclSubject(Allocator &alloc, CssmManagedData &password) argument 43 allocator(alloc), mPassword(alloc, password) 56 const CssmData &password = sample[1]; local 57 return password == mPassword; 68 // the password itself is private and not exported to CSSM 78 CssmAutoData password(Allocato 81 CssmData password = CssmData::wrap(pass, 6); //@@@ get password from PP local 84 ListElement *password; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/ |
H A D | acl_protectedpw.cpp | 26 // acl_protectedpw - protected-path password-based ACL subject types. 34 // Construct a password ACL subject 36 ProtectedPasswordAclSubject::ProtectedPasswordAclSubject(Allocator &alloc, const CssmData &password) argument 38 allocator(alloc), mPassword(alloc, password) 41 ProtectedPasswordAclSubject::ProtectedPasswordAclSubject(Allocator &alloc, CssmManagedData &password) argument 43 allocator(alloc), mPassword(alloc, password) 56 const CssmData &password = sample[1]; local 57 return password == mPassword; 68 // the password itself is private and not exported to CSSM 78 CssmAutoData password(Allocato 81 CssmData password = CssmData::wrap(pass, 6); //@@@ get password from PP local 84 ListElement *password; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-73-secpasswordgenerate.c | 14 CFStringRef password = NULL; local 29 password = SecPasswordGenerate(kSecPasswordTypePIN, &error, passwordRequirements); 30 isnt(password, NULL); 32 CFReleaseNull(password); 36 password = SecPasswordGenerate(kSecPasswordTypeiCloudRecovery, &error, passwordRequirements); 37 isnt(password, NULL); 39 CFReleaseNull(password); 45 password = SecPasswordGenerate(kSecPasswordTypeWifi, &error, passwordRequirements); 46 isnt(password, NULL); 48 CFReleaseNull(password); [all...] |
/macosx-10.10/KerberosHelper-151/Source/ |
H A D | configureTestingLocalKDC | 25 my @password = (); 30 @password = ('-randkey'); 34 @password = ('-pw', $service); 39 my @args = ('ank', @password, $principal);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_checkpw/lib/ |
H A D | checkpw.c | 28 int checkpw_internal_pam( const char* uname, const char* password ) 44 pamret = pam_set_item(pamh, PAM_AUTHTOK, password); 47 syslog(LOG_WARNING,"PAM: Unable to set password."); 64 syslog(LOG_WARNING,"PAM: Unable to authorize, password needs to be changed."); 82 int checkpw_internal( const struct passwd* pw, const char* password ); 83 int checkpw_internal( const struct passwd* pw, const char* password ) 85 return checkpw(pw->pw_name, password); 88 int checkpw( const char* userName, const char* password ) 92 const char *thePassword = password ? password [all...] |
/macosx-10.10/tcl-105/tcl_ext/tclsoap/tclsoap/ |
H A D | ftp.tcl | 39 password \ 54 # password - password for server (can also be part of the URL) 63 set procvar(password) $value 120 set username {} ; set password {} 125 if {[info exists procvar(password)]} { 126 set password $procvar(password) 132 if {$URL(pwd) != {}} { set password $URL(pwd) } 134 set tok [ftp::Open $URL(host) $username $password] [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Tool/ |
H A D | keychain_backup.c | 45 CFDataRef password=NULL; local 49 require(password = CFDataCreate(NULL, (UInt8 *)passwordString, strlen(passwordString)), out); 54 ok=_SecKeychainRestoreBackup(backup, keybag, password); 59 CFReleaseSafe(password); 69 CFDataRef password=NULL; local 73 require(password = CFDataCreate(NULL, (UInt8 *)passwordString, strlen(passwordString)), out); 76 require(backup=_SecKeychainCopyBackup(keybag, password), out); 83 CFReleaseSafe(password); 95 const char *password=NULL; local 108 password 137 const char *password=NULL; local [all...] |
/macosx-10.10/apr-32/apr/apr/passwd/ |
H A D | apr_getpass.c | 17 /* apr_password_get.c: abstraction to provide for obtaining a password from the 93 static char password[MAX_STRING_LEN]; local 96 fgets((char *) &password, sizeof(password), stdin); 98 return (char *) &password; 107 static char password[MAX_STRING_LEN]; local 118 while ((password[n] = getchar()) != '\n') { 119 if (n < sizeof(password) - 1 && password[n] >= ' ' && password[ [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/ |
H A D | heim-auth.h | 18 heim_apop_create(const char *challenge, const char *password); 21 heim_apop_verify(const char *challenge, const char *password, const char *response); 35 heim_cram_md5_create(const char *challenge, const char *password); 38 heim_cram_md5_verify(const char *challenge, const char *password, const char *response); 41 heim_cram_md5_export(const char *password, heim_CRAM_MD5_STATE *state); 65 * heim_digest_set_key(d, "password", "sommar17"); 110 heim_digest_set_user_password(heim_digest_t context, const char *password); 128 heim_digest_userhash(const char *user, const char *realm, const char *password);
|
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | xcrypt.c | 61 xcrypt(const char *password, const char *salt) argument 67 crypted = md5_crypt(password, salt); 69 crypted = crypt(password, salt); 72 crypted = bigcrypt(password, salt); 74 crypted = crypt(password, salt); 76 crypted = bigcrypt(password, salt); 78 crypted = crypt(password, salt); 85 * Handle shadowed password systems in a cleaner way for portable
|
/macosx-10.10/Security-57031.1.35/SecurityTests/regressions/kc/ |
H A D | kc-21-item-use-callback.c | 13 static char password[] = "password"; variable 36 is(length, sizeof(password), "<rdar://problem/3867900> " 40 ok(!memcmp(password, data, length), "password data matches."); 43 if (length != sizeof(password) || memcmp(password, data, length)) 45 fprintf(stderr, "password '%.*s' not same as '%.*s'\n", 46 (int)sizeof(password), password, [all...] |
/macosx-10.10/Heimdal-398.1.2/kuser/ |
H A D | kcminit.c | 90 char password[512] = { 0 } ; local 152 if (length < sizeof(password) - 1) { 153 memcpy(password, buffer, length); 154 password[length] = '\0'; 162 if (password[0] == 0) { 169 if (UI_UTIL_read_pw_string(password, sizeof(password)-1, prompt, 0)){ 170 memset(password, 0, sizeof(password)); 177 ret = _krb5_kcm_get_initial_ticket(context, id, client, server, password); [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | salt-des.c | 45 /* This defines the Andrew string_to_key function. It accepts a password 48 * service password database. 59 char password[8+1]; /* crypt is limited to 8 chars anyway */ local 66 password[i] = c ? c : 'X'; 68 password[8] = '\0'; 70 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock)); 91 char password[512]; local 94 memcpy(password, pw.data, min(pw.length, sizeof(password))); 95 if(pw.length < sizeof(password)) { 119 DES_AFS3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 176 krb5_DES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_sia.c | 58 const char *password, /* I: plaintext password */ 68 rc = sia_validate_user(0, g_argc, g_argv, 0, login, 0, 0, 0, password); 86 const char *password __attribute__((unused)), 54 auth_sia( const char *login, const char *password, const char *service __attribute__((unused)), const char *realm __attribute__((unused)) ) argument
|