HomeSort by: relevance | last modified time | path
    Searched defs:password (Results 1 - 25 of 130) sorted by relevancy

1 2 3 4 5 6

  /src/crypto/external/apache2/openssl/dist/apps/include/
apps_ui.h 15 const void *password; member in struct:pw_cb_data
  /src/crypto/external/bsd/openssh/dist/
auth2-passwd.c 57 char *password = NULL; local
63 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 ||
66 freezero(password, len);
71 logit("password change not supported");
72 else if (mm_auth_password(ssh, password) == 1)
74 freezero(password, len);
  /src/crypto/external/bsd/openssl/dist/apps/include/
apps_ui.h 16 const void *password; member in struct:pw_cb_data
  /src/external/bsd/openldap/dist/servers/slapd/back-wt/
bind.c 41 AttributeDescription *password = slap_schema.si_ad_userPassword; local
55 * since the others, in case of password checking failure
113 a = attr_find( e->e_attrs, password );
  /src/external/bsd/wpa/dist/hostapd/
nt_password_hash.c 2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
  /src/external/bsd/openldap/dist/servers/slapd/back-mdb/
bind.c 37 AttributeDescription *password = slap_schema.si_ad_userPassword; local
55 * since the others, in case of password checking failure
117 a = attr_find( e->e_attrs, password );
  /src/games/larn/
config.c 46 const char *password = "pvnert(x)"; /* the wizards password <=32 */ variable
  /src/crypto/external/apache2/openssl/dist/demos/kdf/
pbkdf2.c 23 * Hard coding a password into an application is very bad.
26 static unsigned char password[] = { variable
31 * The salt is better not being hard coded too. Each password should have a
33 * and is safe to store with an encrypted password.
87 /* Set password */
88 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password,
89 sizeof(password));
scrypt.c 23 * Hard coding a password into an application is very bad.
26 static unsigned char password[] = { variable
31 * The salt is better not being hard coded too. Each password should have a
33 * and is safe to store with an encrypted password.
89 /* Set password */
90 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password,
91 sizeof(password));
argon2.c 26 * Hard coding a password into an application is very bad.
29 static unsigned char password[] = { variable
37 * The salt is better not being hard coded too. Each password should have a
39 * and is safe to store with an encrypted password.
119 /* Set password */
120 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password, sizeof(password));
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
test_pkcs12.c 44 const char *password; member in struct:tests
109 if (t->password)
110 pwlen = strlen(t->password);
112 if (!PKCS12_key_gen(t->password, pwlen,
test_pkcs5.c 43 const char *password; member in struct:tests
52 { "password",
59 { "password",
66 { "password",
74 "password", "\x12\x34\x56\x78\x78\x56\x34\x12",
112 ret = PKCS5_PBKDF2_HMAC(t->password, strlen(t->password),
124 ret = PKCS5_PBKDF2_HMAC(t->password, strlen(t->password),
  /src/crypto/external/bsd/heimdal/dist/lib/kadm5/
test_pw_quality.c 48 static char *password; variable
52 { "password", 0, arg_string, &password, NULL, NULL },
78 if (password == NULL)
79 krb5_errx(context, 1, "no password given");
85 pw_data.data = password;
86 pw_data.length = strlen(password);
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
string-to-key-test.c 42 const char *password; member in struct:testcase
53 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES_CBC_MD5,
83 {"raeburn@ATHENA.MIT.EDU", "password", ETYPE_DES3_CBC_SHA1,
119 ret = krb5_string_to_key (context, t->enctype, t->password,
128 t->principal_name, t->password);
salt-des.c 42 /* This defines the Andrew string_to_key function. It accepts a password
45 * service password database.
56 char password[8+1]; /* crypt is limited to 8 chars anyway */ local
63 password[i] = c ? c : 'X';
65 password[8] = '\0';
67 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock));
88 char password[512]; local
91 memcpy(password, pw.data, min(pw.length, sizeof(password)));
92 if(pw.length < sizeof(password)) {
    [all...]
  /src/crypto/external/bsd/openssl/dist/demos/kdf/
pbkdf2.c 23 * Hard coding a password into an application is very bad.
26 static unsigned char password[] = { variable
31 * The salt is better not being hard coded too. Each password should have a
33 * and is safe to store with an encrypted password.
87 /* Set password */
88 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password,
89 sizeof(password));
scrypt.c 23 * Hard coding a password into an application is very bad.
26 static unsigned char password[] = { variable
31 * The salt is better not being hard coded too. Each password should have a
33 * and is safe to store with an encrypted password.
89 /* Set password */
90 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_PASSWORD, password,
91 sizeof(password));
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_md5.c 34 const u8 *pos, *challenge, *password; local
38 password = eap_get_config_password(sm, &password_len);
39 if (password == NULL) {
40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
89 if (chap_md5(id, password, password_len, challenge, challenge_len,
eap_otp.c 33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
eap_gtc.c 50 const u8 *pos, *password, *identity; local
77 password = eap_get_config_otp(sm, &password_len);
78 if (password)
81 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured");
113 wpabuf_put_data(resp, password, password_len);
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
  /src/external/bsd/wpa/dist/src/utils/
ext_password_file.c 17 * Data structure for the file-backed password backend.
20 char *path; /* path of the password file */
25 * ext_password_file_init - Initialize file-backed password backend
29 * This function initializes a new file-backed password backend. The user is
57 * ext_password_file_deinit - Deinitialize file-backed password backend
58 * @ctx: The file-backed password backend
60 * This function frees all data associated with the file-backed password
72 * ext_password_file_get - Retrieve password from the file-backed password backend
73 * @ctx: The file-backed password backen
85 struct wpabuf *password = NULL; local
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kadmin/
init.c 57 const char *password; local
61 password = pwbuf;
83 /* Create the entry with a random password */
84 ret = kadm5_create_principal(kadm_handle, &ent, mask, password);
201 * The Windows XP (at least) password changing protocol
  /src/external/bsd/openpam/dist/modules/pam_unix/
pam_unix.c 58 static char password_prompt[] = "Password:";
77 const char *crypt_password, *password; local
89 /* get password */
101 &password, NULL);
107 password = resp->resp;
123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL ||
129 free(password);
  /src/games/backgammon/backgammon/
main.c 86 static const char password[] = "losfurng"; variable
192 writel("Password:");
208 if (pbuf[i] != password[i])
  /src/crypto/external/apache2/openssl/dist/apps/lib/
apps_ui.c 36 const char *password = ((PW_CB_DATA *)UI_get0_user_data(ui))->password; local
38 if (password != NULL) {
39 UI_set_result(ui, uis, password);
54 /* Default to the empty password if we've got nothing better */
68 const char *password = ((PW_CB_DATA *)UI_get0_user_data(ui))->password; local
70 if (password != NULL)
189 buff = ui_malloc(bufsiz, "password buffer");

Completed in 38 milliseconds

1 2 3 4 5 6