| /src/crypto/external/apache2/openssl/dist/apps/include/ |
| apps_ui.h | 15 const void *password; member in struct:pw_cb_data
|
| /src/crypto/external/bsd/openssh/dist/ |
| auth2-passwd.c | 57 char *password = NULL; local 63 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 || 66 freezero(password, len); 71 logit("password change not supported"); 72 else if (mm_auth_password(ssh, password) == 1) 74 freezero(password, len);
|
| /src/crypto/external/bsd/openssl/dist/apps/include/ |
| apps_ui.h | 16 const void *password; member in struct:pw_cb_data
|
| /src/external/bsd/openldap/dist/servers/slapd/back-wt/ |
| bind.c | 41 AttributeDescription *password = slap_schema.si_ad_userPassword; local 55 * since the others, in case of password checking failure 113 a = attr_find( e->e_attrs, password );
|
| /src/external/bsd/wpa/dist/hostapd/ |
| nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
| /src/external/bsd/openldap/dist/servers/slapd/back-mdb/ |
| bind.c | 37 AttributeDescription *password = slap_schema.si_ad_userPassword; local 55 * since the others, in case of password checking failure 117 a = attr_find( e->e_attrs, password );
|
| /src/games/larn/ |
| config.c | 46 const char *password = "pvnert(x)"; /* the wizards password <=32 */ variable
|
| /src/crypto/external/apache2/openssl/dist/demos/kdf/ |
| pbkdf2.c | 23 * Hard coding a password into an application is very bad. 26 static unsigned char password[] = { variable 31 * The salt is better not being hard coded too. Each password should have a 33 * and is safe to store with an encrypted password. 87 /* Set password */ 88 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, 89 sizeof(password));
|
| scrypt.c | 23 * Hard coding a password into an application is very bad. 26 static unsigned char password[] = { variable 31 * The salt is better not being hard coded too. Each password should have a 33 * and is safe to store with an encrypted password. 89 /* Set password */ 90 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, 91 sizeof(password));
|
| argon2.c | 26 * Hard coding a password into an application is very bad. 29 static unsigned char password[] = { variable 37 * The salt is better not being hard coded too. Each password should have a 39 * and is safe to store with an encrypted password. 119 /* Set password */ 120 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, sizeof(password));
|
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| test_pkcs12.c | 44 const char *password; member in struct:tests 109 if (t->password) 110 pwlen = strlen(t->password); 112 if (!PKCS12_key_gen(t->password, pwlen,
|
| test_pkcs5.c | 43 const char *password; member in struct:tests 52 { "password", 59 { "password", 66 { "password", 74 "password", "\x12\x34\x56\x78\x78\x56\x34\x12", 112 ret = PKCS5_PBKDF2_HMAC(t->password, strlen(t->password), 124 ret = PKCS5_PBKDF2_HMAC(t->password, strlen(t->password),
|
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| test_pw_quality.c | 48 static char *password; variable 52 { "password", 0, arg_string, &password, NULL, NULL }, 78 if (password == NULL) 79 krb5_errx(context, 1, "no password given"); 85 pw_data.data = password; 86 pw_data.length = strlen(password);
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| string-to-key-test.c | 42 const char *password; member in struct:testcase 53 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES_CBC_MD5, 83 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES3_CBC_SHA1, 119 ret = krb5_string_to_key (context, t->enctype, t->password, 128 t->principal_name, t->password);
|
| salt-des.c | 42 /* This defines the Andrew string_to_key function. It accepts a password 45 * service password database. 56 char password[8+1]; /* crypt is limited to 8 chars anyway */ local 63 password[i] = c ? c : 'X'; 65 password[8] = '\0'; 67 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock)); 88 char password[512]; local 91 memcpy(password, pw.data, min(pw.length, sizeof(password))); 92 if(pw.length < sizeof(password)) { [all...] |
| /src/crypto/external/bsd/openssl/dist/demos/kdf/ |
| pbkdf2.c | 23 * Hard coding a password into an application is very bad. 26 static unsigned char password[] = { variable 31 * The salt is better not being hard coded too. Each password should have a 33 * and is safe to store with an encrypted password. 87 /* Set password */ 88 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, 89 sizeof(password));
|
| scrypt.c | 23 * Hard coding a password into an application is very bad. 26 static unsigned char password[] = { variable 31 * The salt is better not being hard coded too. Each password should have a 33 * and is safe to store with an encrypted password. 89 /* Set password */ 90 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, 91 sizeof(password));
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_md5.c | 34 const u8 *pos, *challenge, *password; local 38 password = eap_get_config_password(sm, &password_len); 39 if (password == NULL) { 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
| eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
| eap_gtc.c | 50 const u8 *pos, *password, *identity; local 77 password = eap_get_config_otp(sm, &password_len); 78 if (password) 81 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured"); 113 wpabuf_put_data(resp, password, password_len); 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
| /src/external/bsd/wpa/dist/src/utils/ |
| ext_password_file.c | 17 * Data structure for the file-backed password backend. 20 char *path; /* path of the password file */ 25 * ext_password_file_init - Initialize file-backed password backend 29 * This function initializes a new file-backed password backend. The user is 57 * ext_password_file_deinit - Deinitialize file-backed password backend 58 * @ctx: The file-backed password backend 60 * This function frees all data associated with the file-backed password 72 * ext_password_file_get - Retrieve password from the file-backed password backend 73 * @ctx: The file-backed password backen 85 struct wpabuf *password = NULL; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| init.c | 57 const char *password; local 61 password = pwbuf; 83 /* Create the entry with a random password */ 84 ret = kadm5_create_principal(kadm_handle, &ent, mask, password); 201 * The Windows XP (at least) password changing protocol
|
| /src/external/bsd/openpam/dist/modules/pam_unix/ |
| pam_unix.c | 58 static char password_prompt[] = "Password:"; 77 const char *crypt_password, *password; local 89 /* get password */ 101 &password, NULL); 107 password = resp->resp; 123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL || 129 free(password);
|
| /src/games/backgammon/backgammon/ |
| main.c | 86 static const char password[] = "losfurng"; variable 192 writel("Password:"); 208 if (pbuf[i] != password[i])
|
| /src/crypto/external/apache2/openssl/dist/apps/lib/ |
| apps_ui.c | 36 const char *password = ((PW_CB_DATA *)UI_get0_user_data(ui))->password; local 38 if (password != NULL) { 39 UI_set_result(ui, uis, password); 54 /* Default to the empty password if we've got nothing better */ 68 const char *password = ((PW_CB_DATA *)UI_get0_user_data(ui))->password; local 70 if (password != NULL) 189 buff = ui_malloc(bufsiz, "password buffer");
|