Home
last modified time | relevance | path

Searched refs:password (Results 1 - 25 of 432) sorted by relevance

12345678910>>...18

/third_party/curl/tests/unit/
H A Dunit1304.c31 static char *password; variable
35 password = strdup(""); in unit_setup()
37 if(!password || !login) { in unit_setup()
38 Curl_safefree(password); in unit_setup()
47 Curl_safefree(password); in unit_stop()
57 result = Curl_parsenetrc("test.example.com", &login, &password, arg);
59 abort_unless(password != NULL, "returned NULL!");
60 fail_unless(password[0] == 0, "password should not have been changed");
70 result = Curl_parsenetrc("example.com", &login, &password, ar
141 free(password); global() variable
156 free(password); global() variable
174 free(password); global() variable
[all...]
H A Dunit1612.c44 const char password[] = "Pa55worD"; variable
51 (const unsigned char *) password, strlen(password), variable
60 (const unsigned char *) password, strlen(password), variable
/third_party/node/lib/internal/crypto/
H A Dpbkdf2.js33 function pbkdf2(password, salt, iterations, keylen, digest, callback) {
39 ({ password, salt, iterations, keylen, digest } =
40 check(password, salt, iterations, keylen, digest));
46 password,
65 function pbkdf2Sync(password, salt, iterations, keylen, digest) {
66 ({ password, salt, iterations, keylen, digest } =
67 check(password, salt, iterations, keylen, digest));
71 password,
86 function check(password, salt, iterations, keylen, digest) {
89 password
[all...]
H A Dscrypt.js41 function scrypt(password, salt, keylen, options, callback = defaults) {
47 options = check(password, salt, keylen, options);
49 ({ password, salt, keylen } = options);
54 kCryptoJobAsync, password, salt, N, r, p, maxmem, keylen);
69 function scryptSync(password, salt, keylen, options = defaults) {
70 options = check(password, salt, keylen, options);
72 ({ password, salt, keylen } = options);
74 kCryptoJobSync, password, salt, N, r, p, maxmem, keylen);
85 function check(password, salt, keylen, options) {
89 password
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Dmschapv2.c37 const u8 *password, size_t password_len, in mschapv2_derive_response()
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", in mschapv2_derive_response()
65 password, password_len); in mschapv2_derive_response()
68 password, nt_response) || in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", in mschapv2_derive_response()
76 password, password_len); in mschapv2_derive_response()
79 password, password_len, in mschapv2_derive_response()
81 generate_authenticator_response(password, password_len, in mschapv2_derive_response()
96 if (hash_nt_password_hash(password, password_hash_has in mschapv2_derive_response()
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) mschapv2_derive_response() argument
[all...]
H A Deap_otp.c33 const u8 *pos, *password; in eap_otp_process() local
45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process()
46 if (password) in eap_otp_process()
49 password = eap_get_config_password(sm, &password_len); in eap_otp_process()
53 if (password == NULL) { in eap_otp_process()
70 wpabuf_put_data(resp, password, password_len); in eap_otp_process()
72 password, password_len); in eap_otp_process()
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); in eap_otp_process()
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request()
74 if (identity == NULL || password == NULL) in eap_leap_process_request()
118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request()
120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
192 const u8 *pos, *password; in eap_leap_process_response() local
200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response()
201 if (password == NULL) in eap_leap_process_response()
235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response()
240 if (nt_password_hash(password, password_le in eap_leap_process_response()
283 const u8 *password; eap_leap_process() local
341 const u8 *addr[5], *password; eap_leap_getKey() local
[all...]
H A Deap_mschapv2.c155 const u8 *identity, *password; in eap_mschapv2_challenge_reply() local
161 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply()
162 if (identity == NULL || password == NULL) in eap_mschapv2_challenge_reply()
205 if (mschapv2_derive_response(identity, identity_len, password, in eap_mschapv2_challenge_reply()
304 bin_clear_free(config->password, config->password_len); in eap_mschapv2_password_changed()
308 config->password = os_malloc(16); in eap_mschapv2_password_changed()
310 if (config->password && in eap_mschapv2_password_changed()
313 config->password)) { in eap_mschapv2_password_changed()
314 bin_clear_free(config->password, in eap_mschapv2_password_changed()
316 config->password in eap_mschapv2_password_changed()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Dmschapv2.c37 const u8 *password, size_t password_len, in mschapv2_derive_response()
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", in mschapv2_derive_response()
65 password, password_len); in mschapv2_derive_response()
68 password, nt_response) || in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", in mschapv2_derive_response()
76 password, password_len); in mschapv2_derive_response()
79 password, password_len, in mschapv2_derive_response()
81 generate_authenticator_response(password, password_len, in mschapv2_derive_response()
96 if (hash_nt_password_hash(password, password_hash_has in mschapv2_derive_response()
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) mschapv2_derive_response() argument
[all...]
H A Deap_otp.c33 const u8 *pos, *password; in eap_otp_process() local
45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process()
46 if (password) in eap_otp_process()
49 password = eap_get_config_password(sm, &password_len); in eap_otp_process()
53 if (password == NULL) { in eap_otp_process()
70 wpabuf_put_data(resp, password, password_len); in eap_otp_process()
72 password, password_len); in eap_otp_process()
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); in eap_otp_process()
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request()
74 if (identity == NULL || password == NULL) in eap_leap_process_request()
118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request()
120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
192 const u8 *pos, *password; in eap_leap_process_response() local
200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response()
201 if (password == NULL) in eap_leap_process_response()
235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response()
240 if (nt_password_hash(password, password_le in eap_leap_process_response()
283 const u8 *password; eap_leap_process() local
341 const u8 *addr[5], *password; eap_leap_getKey() local
[all...]
H A Deap_mschapv2.c155 const u8 *identity, *password; in eap_mschapv2_challenge_reply() local
161 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply()
162 if (identity == NULL || password == NULL) in eap_mschapv2_challenge_reply()
205 if (mschapv2_derive_response(identity, identity_len, password, in eap_mschapv2_challenge_reply()
304 bin_clear_free(config->password, config->password_len); in eap_mschapv2_password_changed()
308 config->password = os_malloc(16); in eap_mschapv2_password_changed()
310 if (config->password && in eap_mschapv2_password_changed()
313 config->password)) { in eap_mschapv2_password_changed()
314 bin_clear_free(config->password, in eap_mschapv2_password_changed()
316 config->password in eap_mschapv2_password_changed()
[all...]
/third_party/musl/src/legacy/
H A Dgetpass.c13 static char password[128]; in getpass() local
28 l = read(fd, password, sizeof password); in getpass()
30 if (l > 0 && password[l-1] == '\n' || l==sizeof password) l--; in getpass()
31 password[l] = 0; in getpass()
39 return l<0 ? 0 : password; in getpass()
/third_party/node/deps/npm/lib/commands/
H A Dprofile.js30 'password',
178 const newpassword = await readUserInfo.password('New password: ')
179 const confirmedpassword = await readUserInfo.password(' Again: ')
189 if (prop !== 'password' && value === null) {
193 if (prop === 'password' && value !== null) {
195 'npm profile set password\n' +
204 if (prop === 'password') {
205 const current = await readUserInfo.password('Current password
[all...]
/third_party/python/Lib/
H A Dhashlib.py188 def pbkdf2_hmac(hash_name, password, salt, iterations, dklen=None):
203 if not isinstance(password, (bytes, bytearray)):
204 password = bytes(memoryview(password))
212 if len(password) > blocksize:
213 password = new(hash_name, password).digest()
214 password = password + b'\x00' * (blocksize - len(password))
[all...]
/third_party/node/deps/npm/node_modules/npm-profile/lib/
H A Dindex.js17 .then(data => loginCouch(data.username, data.password, opts))
30 .then(data => adduserCouch(data.username, data.email, data.password, opts))
129 const adduserCouch = (username, email, password, opts = {}) => {
133 password: password,
141 password: 'XXXXX',
156 const loginCouch = (username, password, opts = {}) => {
160 password: password,
167 password
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
H A Dnt_password_hash.c2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; in main() local
22 password = argv[1]; in main()
25 printf("Failed to read password\n"); in main()
37 password = buf; in main()
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
H A Dnt_password_hash.c2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; in main() local
22 password = argv[1]; in main()
25 printf("Failed to read password\n"); in main()
37 password = buf; in main()
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
/third_party/curl/lib/
H A Dnetrc.c43 /* Get user and password from .netrc when given a machine name */
67 char *password = *passwordp; in parsenetrc() local
74 char state_password = 0; /* Found a password keyword */ in parsenetrc()
156 if((login && *login) && (password && *password)) { in parsenetrc()
173 'password'. */ in parsenetrc()
218 && (!password || Curl_timestrcmp(password, tok))) { in parsenetrc()
220 free(password); in parsenetrc()
223 password in parsenetrc()
[all...]
/third_party/backends/sanei/
H A Dsanei_auth.c118 const char *password, in check_passwd()
129 strstr (randomstring, "$MD5$") + 5, password); in check_passwd()
152 return (strcmp (upassword, password) == 0); in check_passwd()
168 char password[SANE_MAX_PASSWORD_LEN]; in sanei_authorize() local
234 memset (password, 0, SANE_MAX_PASSWORD_LEN); in sanei_authorize()
236 (*authorize) (md5resource, username, password); in sanei_authorize()
264 if (check_passwd (password, linep, md5resource, username)) in sanei_authorize()
117 check_passwd(const char *upassword, const char *password, const char *randomstring, const char *username) check_passwd() argument
/third_party/node/deps/openssl/openssl/apps/
H A Dsrp.c126 char password[1025]; in srp_verify_user() local
133 cb_tmp.password = passin; in srp_verify_user()
135 len = password_callback(password, sizeof(password)-1, 0, &cb_tmp); in srp_verify_user()
137 password[len] = 0; in srp_verify_user()
143 BIO_printf(bio_err, "Pass %s\n", password); in srp_verify_user()
146 if ((gNid = SRP_create_verifier(user, password, &srp_usersalt, in srp_verify_user()
154 OPENSSL_cleanse(password, len); in srp_verify_user()
163 char password[1025]; in srp_create_user() local
169 cb_tmp.password in srp_create_user()
[all...]
/third_party/openssl/apps/
H A Dsrp.c126 char password[1025]; in srp_verify_user() local
133 cb_tmp.password = passin; in srp_verify_user()
135 len = password_callback(password, sizeof(password)-1, 0, &cb_tmp); in srp_verify_user()
137 password[len] = 0; in srp_verify_user()
143 BIO_printf(bio_err, "Pass %s\n", password); in srp_verify_user()
146 if ((gNid = SRP_create_verifier(user, password, &srp_usersalt, in srp_verify_user()
154 OPENSSL_cleanse(password, len); in srp_verify_user()
163 char password[1025]; in srp_create_user() local
169 cb_tmp.password in srp_create_user()
[all...]
/third_party/libwebsockets/lib/roles/mqtt/client/
H A Dclient-mqtt-handshake.c54 * username and password and their length fields if in lws_mqtt_client_send_connect()
61 len += (unsigned int)(c->password ? c->password->len : 0) + 2u; in lws_mqtt_client_send_connect()
86 * Username & password. in lws_mqtt_client_send_connect()
131 * password strings. in lws_mqtt_client_send_connect()
144 if (lws_mqtt_str_is_not_empty(c->password)) { in lws_mqtt_client_send_connect()
145 lws_ser_wu16be(p, c->password->len); in lws_mqtt_client_send_connect()
147 memcpy(p, c->password->buf, in lws_mqtt_client_send_connect()
148 c->password->len); in lws_mqtt_client_send_connect()
149 p += c->password in lws_mqtt_client_send_connect()
[all...]
/third_party/node/deps/openssl/openssl/apps/lib/
H A Dapps_ui.c37 const char *password = in ui_read() local
38 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_read()
40 if (password != NULL) { in ui_read()
41 UI_set_result(ui, uis, password); in ui_read()
57 /* Default to the empty password if we've got nothing better */ in ui_read()
72 const char *password = in ui_write() local
73 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_write()
75 if (password != NULL) in ui_write()
196 buff = ui_malloc(bufsiz, "password buffer"); in password_callback()
/third_party/openssl/apps/lib/
H A Dapps_ui.c37 const char *password = in ui_read() local
38 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_read()
40 if (password != NULL) { in ui_read()
41 UI_set_result(ui, uis, password); in ui_read()
57 /* Default to the empty password if we've got nothing better */ in ui_read()
72 const char *password = in ui_write() local
73 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_write()
75 if (password != NULL) in ui_write()
196 buff = ui_malloc(bufsiz, "password buffer"); in password_callback()

Completed in 10 milliseconds

12345678910>>...18