Searched refs:password (Results 1 - 25 of 773) sorted by relevance

1234567891011>>

/macosx-10.10/tcl-105/tcl_ext/expect/expect/example/
H A Dautopasswd5 set password [lindex $argv 1]
8 send -- "$password\r"
10 send -- "$password\r"
/macosx-10.10/curl-83.1.2/curl/tests/unit/
H A Dunit1304.c27 static char *password; variable
32 password = strdup("");
34 if (!password || !login) {
35 Curl_safefree(password);
44 Curl_safefree(password);
57 result = Curl_parsenetrc("test.example.com", &login, &password, filename);
59 abort_unless(password != NULL, "returned NULL!");
60 fail_unless(password[0] == 0, "password should not have been changed");
70 result = Curl_parsenetrc("example.com", &login, &password, filenam
137 free(password); variable
152 free(password); variable
170 free(password); variable
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTool/
H A Dkeychain_create.c39 do_create(const char *keychain, const char *password, Boolean do_prompt) argument
44 result = SecKeychainCreate(keychain, password ? strlen(password) : 0, password, do_prompt, NULL, &keychainRef);
58 char *password = NULL, *keychain = NULL; local
63 AG: while loop calling getopt is used to extract password from cl from user
64 password is the only option to keychain_create
76 password = optarg;
114 if (!password && !do_prompt)
123 password
[all...]
H A Dkeychain_unlock.c38 do_unlock(const char *keychainName, char *password, Boolean use_password) argument
53 result = SecKeychainUnlock(keychain, password ? strlen(password) : 0, password, use_password);
70 char *password = NULL; local
80 password = optarg;
106 if (!password && use_password)
108 const char *fmt = "password to unlock %s: ";
112 password = getpass(prompt);
114 if (!password)
[all...]
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/java/javax/security/auth/callback/
H A DPasswordCallback.java7 private String password; field in class:PasswordCallback
27 return password;
30 public void setPassword(char[] password) argument
32 this.password = new String(password);
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dsample_passwd_check.c45 /* just check the length of the password, this is what the default
51 krb5_data *password)
57 if(password->length < min_length)
64 /* use cracklib to check password quality; this requires a patch for
71 krb5_data *password)
73 char *s = malloc(password->length + 1);
80 memcpy(s, password->data, password->length);
81 s[password->length] = '\0';
83 memset(s, 0, password
49 check_length(krb5_context context, krb5_principal prinipal, krb5_data *password) argument
69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument
[all...]
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/pwcheck/
H A Dpwcheck_getpwnam.c30 char *pwcheck(userid, password)
32 char *password;
44 else if (strcmp(pwd->pw_passwd, crypt(password, pwd->pw_passwd)) != 0) {
45 r = "Incorrect password";
H A Dpwcheck_getspnam.c30 char *pwcheck(userid, password)
32 char *password;
41 if (strcmp(pwd->sp_pwdp, crypt(password, pwd->sp_pwdp)) != 0) {
42 return "Incorrect password";
/macosx-10.10/OpenSSH-189/openssh/
H A Dauth2-passwd.c52 char *password, *newpass; local
58 password = packet_get_string(&len);
60 /* discard new password from packet */
68 logit("password change not supported");
69 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
71 memset(password, 0, len);
72 xfree(password);
77 "password",
/macosx-10.10/CrackLib-37765/cracklib27/cracklib/
H A Dfascist.c53 /* attempt reverse engineering of password strings */
428 GTry(rawtext, password)
430 char *password;
436 /* use destructors to turn password into rawtext */
439 len = strlen(password);
443 if (!(mp = Mangle(password, r_destructors[i])))
475 printf("%-16s = %-16s (construct %s)\n", mp, password, r_constructors[i]);
478 if (!strncmp(mp, password, len))
488 FascistGecos(password, uid)
489 char *password;
630 char *password; local
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/roken/
H A Dverify.c46 unix_verify_user(char *user, char *password) argument
53 if(strlen(pw->pw_passwd) == 0 && strlen(password) == 0)
55 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/
H A Dacl_protectedpw.cpp26 // acl_protectedpw - protected-path password-based ACL subject types.
34 // Construct a password ACL subject
36 ProtectedPasswordAclSubject::ProtectedPasswordAclSubject(Allocator &alloc, const CssmData &password) argument
38 allocator(alloc), mPassword(alloc, password)
41 ProtectedPasswordAclSubject::ProtectedPasswordAclSubject(Allocator &alloc, CssmManagedData &password) argument
43 allocator(alloc), mPassword(alloc, password)
56 const CssmData &password = sample[1]; local
57 return password == mPassword;
68 // the password itself is private and not exported to CSSM
78 CssmAutoData password(Allocato
81 CssmData password = CssmData::wrap(pass, 6); //@@@ get password from PP local
84 ListElement *password; local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/
H A Dacl_protectedpw.cpp26 // acl_protectedpw - protected-path password-based ACL subject types.
34 // Construct a password ACL subject
36 ProtectedPasswordAclSubject::ProtectedPasswordAclSubject(Allocator &alloc, const CssmData &password) argument
38 allocator(alloc), mPassword(alloc, password)
41 ProtectedPasswordAclSubject::ProtectedPasswordAclSubject(Allocator &alloc, CssmManagedData &password) argument
43 allocator(alloc), mPassword(alloc, password)
56 const CssmData &password = sample[1]; local
57 return password == mPassword;
68 // the password itself is private and not exported to CSSM
78 CssmAutoData password(Allocato
81 CssmData password = CssmData::wrap(pass, 6); //@@@ get password from PP local
84 ListElement *password; local
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-73-secpasswordgenerate.c14 CFStringRef password = NULL; local
29 password = SecPasswordGenerate(kSecPasswordTypePIN, &error, passwordRequirements);
30 isnt(password, NULL);
32 CFReleaseNull(password);
36 password = SecPasswordGenerate(kSecPasswordTypeiCloudRecovery, &error, passwordRequirements);
37 isnt(password, NULL);
39 CFReleaseNull(password);
45 password = SecPasswordGenerate(kSecPasswordTypeWifi, &error, passwordRequirements);
46 isnt(password, NULL);
48 CFReleaseNull(password);
[all...]
/macosx-10.10/KerberosHelper-151/Source/
H A DconfigureTestingLocalKDC25 my @password = ();
30 @password = ('-randkey');
34 @password = ('-pw', $service);
39 my @args = ('ank', @password, $principal);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_checkpw/lib/
H A Dcheckpw.c28 int checkpw_internal_pam( const char* uname, const char* password )
44 pamret = pam_set_item(pamh, PAM_AUTHTOK, password);
47 syslog(LOG_WARNING,"PAM: Unable to set password.");
64 syslog(LOG_WARNING,"PAM: Unable to authorize, password needs to be changed.");
82 int checkpw_internal( const struct passwd* pw, const char* password );
83 int checkpw_internal( const struct passwd* pw, const char* password )
85 return checkpw(pw->pw_name, password);
88 int checkpw( const char* userName, const char* password )
92 const char *thePassword = password ? password
[all...]
/macosx-10.10/tcl-105/tcl_ext/tclsoap/tclsoap/
H A Dftp.tcl39 password \
54 # password - password for server (can also be part of the URL)
63 set procvar(password) $value
120 set username {} ; set password {}
125 if {[info exists procvar(password)]} {
126 set password $procvar(password)
132 if {$URL(pwd) != {}} { set password $URL(pwd) }
134 set tok [ftp::Open $URL(host) $username $password]
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Tool/
H A Dkeychain_backup.c45 CFDataRef password=NULL; local
49 require(password = CFDataCreate(NULL, (UInt8 *)passwordString, strlen(passwordString)), out);
54 ok=_SecKeychainRestoreBackup(backup, keybag, password);
59 CFReleaseSafe(password);
69 CFDataRef password=NULL; local
73 require(password = CFDataCreate(NULL, (UInt8 *)passwordString, strlen(passwordString)), out);
76 require(backup=_SecKeychainCopyBackup(keybag, password), out);
83 CFReleaseSafe(password);
95 const char *password=NULL; local
108 password
137 const char *password=NULL; local
[all...]
/macosx-10.10/apr-32/apr/apr/passwd/
H A Dapr_getpass.c17 /* apr_password_get.c: abstraction to provide for obtaining a password from the
93 static char password[MAX_STRING_LEN]; local
96 fgets((char *) &password, sizeof(password), stdin);
98 return (char *) &password;
107 static char password[MAX_STRING_LEN]; local
118 while ((password[n] = getchar()) != '\n') {
119 if (n < sizeof(password) - 1 && password[n] >= ' ' && password[
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/ntlm/
H A Dheim-auth.h18 heim_apop_create(const char *challenge, const char *password);
21 heim_apop_verify(const char *challenge, const char *password, const char *response);
35 heim_cram_md5_create(const char *challenge, const char *password);
38 heim_cram_md5_verify(const char *challenge, const char *password, const char *response);
41 heim_cram_md5_export(const char *password, heim_CRAM_MD5_STATE *state);
65 * heim_digest_set_key(d, "password", "sommar17");
110 heim_digest_set_user_password(heim_digest_t context, const char *password);
128 heim_digest_userhash(const char *user, const char *realm, const char *password);
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/
H A Dxcrypt.c61 xcrypt(const char *password, const char *salt) argument
67 crypted = md5_crypt(password, salt);
69 crypted = crypt(password, salt);
72 crypted = bigcrypt(password, salt);
74 crypted = crypt(password, salt);
76 crypted = bigcrypt(password, salt);
78 crypted = crypt(password, salt);
85 * Handle shadowed password systems in a cleaner way for portable
/macosx-10.10/Security-57031.1.35/SecurityTests/regressions/kc/
H A Dkc-21-item-use-callback.c13 static char password[] = "password"; variable
36 is(length, sizeof(password), "<rdar://problem/3867900> "
40 ok(!memcmp(password, data, length), "password data matches.");
43 if (length != sizeof(password) || memcmp(password, data, length))
45 fprintf(stderr, "password '%.*s' not same as '%.*s'\n",
46 (int)sizeof(password), password,
[all...]
/macosx-10.10/Heimdal-398.1.2/kuser/
H A Dkcminit.c90 char password[512] = { 0 } ; local
152 if (length < sizeof(password) - 1) {
153 memcpy(password, buffer, length);
154 password[length] = '\0';
162 if (password[0] == 0) {
169 if (UI_UTIL_read_pw_string(password, sizeof(password)-1, prompt, 0)){
170 memset(password, 0, sizeof(password));
177 ret = _krb5_kcm_get_initial_ticket(context, id, client, server, password);
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dsalt-des.c45 /* This defines the Andrew string_to_key function. It accepts a password
48 * service password database.
59 char password[8+1]; /* crypt is limited to 8 chars anyway */ local
66 password[i] = c ? c : 'X';
68 password[8] = '\0';
70 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock));
91 char password[512]; local
94 memcpy(password, pw.data, min(pw.length, sizeof(password)));
95 if(pw.length < sizeof(password)) {
119 DES_AFS3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
176 krb5_DES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
[all...]
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/
H A Dauth_sia.c58 const char *password, /* I: plaintext password */
68 rc = sia_validate_user(0, g_argc, g_argv, 0, login, 0, 0, 0, password);
86 const char *password __attribute__((unused)),
54 auth_sia( const char *login, const char *password, const char *service __attribute__((unused)), const char *realm __attribute__((unused)) ) argument

Completed in 288 milliseconds

1234567891011>>