/third_party/curl/tests/unit/ |
H A D | unit1304.c | 31 static char *password; variable 35 password = strdup(""); in unit_setup() 37 if(!password || !login) { in unit_setup() 38 Curl_safefree(password); in unit_setup() 47 Curl_safefree(password); in unit_stop() 57 result = Curl_parsenetrc("test.example.com", &login, &password, arg); 59 abort_unless(password != NULL, "returned NULL!"); 60 fail_unless(password[0] == 0, "password should not have been changed"); 70 result = Curl_parsenetrc("example.com", &login, &password, ar 141 free(password); global() variable 156 free(password); global() variable 174 free(password); global() variable [all...] |
H A D | unit1612.c | 44 const char password[] = "Pa55worD"; variable 51 (const unsigned char *) password, strlen(password), variable 60 (const unsigned char *) password, strlen(password), variable
|
/third_party/node/lib/internal/crypto/ |
H A D | pbkdf2.js | 33 function pbkdf2(password, salt, iterations, keylen, digest, callback) { 39 ({ password, salt, iterations, keylen, digest } = 40 check(password, salt, iterations, keylen, digest)); 46 password, 65 function pbkdf2Sync(password, salt, iterations, keylen, digest) { 66 ({ password, salt, iterations, keylen, digest } = 67 check(password, salt, iterations, keylen, digest)); 71 password, 86 function check(password, salt, iterations, keylen, digest) { 89 password [all...] |
H A D | scrypt.js | 41 function scrypt(password, salt, keylen, options, callback = defaults) { 47 options = check(password, salt, keylen, options); 49 ({ password, salt, keylen } = options); 54 kCryptoJobAsync, password, salt, N, r, p, maxmem, keylen); 69 function scryptSync(password, salt, keylen, options = defaults) { 70 options = check(password, salt, keylen, options); 72 ({ password, salt, keylen } = options); 74 kCryptoJobSync, password, salt, N, r, p, maxmem, keylen); 85 function check(password, salt, keylen, options) { 89 password [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", in mschapv2_derive_response() 65 password, password_len); in mschapv2_derive_response() 68 password, nt_response) || in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", in mschapv2_derive_response() 76 password, password_len); in mschapv2_derive_response() 79 password, password_len, in mschapv2_derive_response() 81 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 96 if (hash_nt_password_hash(password, password_hash_has in mschapv2_derive_response() 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) mschapv2_derive_response() argument [all...] |
H A D | eap_otp.c | 33 const u8 *pos, *password; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 46 if (password) in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 53 if (password == NULL) { in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process() 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); in eap_otp_process()
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request() 74 if (identity == NULL || password == NULL) in eap_leap_process_request() 118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request() 192 const u8 *pos, *password; in eap_leap_process_response() local 200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response() 201 if (password == NULL) in eap_leap_process_response() 235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response() 240 if (nt_password_hash(password, password_le in eap_leap_process_response() 283 const u8 *password; eap_leap_process() local 341 const u8 *addr[5], *password; eap_leap_getKey() local [all...] |
H A D | eap_mschapv2.c | 155 const u8 *identity, *password; in eap_mschapv2_challenge_reply() local 161 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply() 162 if (identity == NULL || password == NULL) in eap_mschapv2_challenge_reply() 205 if (mschapv2_derive_response(identity, identity_len, password, in eap_mschapv2_challenge_reply() 304 bin_clear_free(config->password, config->password_len); in eap_mschapv2_password_changed() 308 config->password = os_malloc(16); in eap_mschapv2_password_changed() 310 if (config->password && in eap_mschapv2_password_changed() 313 config->password)) { in eap_mschapv2_password_changed() 314 bin_clear_free(config->password, in eap_mschapv2_password_changed() 316 config->password in eap_mschapv2_password_changed() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", in mschapv2_derive_response() 65 password, password_len); in mschapv2_derive_response() 68 password, nt_response) || in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", in mschapv2_derive_response() 76 password, password_len); in mschapv2_derive_response() 79 password, password_len, in mschapv2_derive_response() 81 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 96 if (hash_nt_password_hash(password, password_hash_has in mschapv2_derive_response() 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) mschapv2_derive_response() argument [all...] |
H A D | eap_otp.c | 33 const u8 *pos, *password; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 46 if (password) in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 53 if (password == NULL) { in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process() 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); in eap_otp_process()
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request() 74 if (identity == NULL || password == NULL) in eap_leap_process_request() 118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request() 192 const u8 *pos, *password; in eap_leap_process_response() local 200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response() 201 if (password == NULL) in eap_leap_process_response() 235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response() 240 if (nt_password_hash(password, password_le in eap_leap_process_response() 283 const u8 *password; eap_leap_process() local 341 const u8 *addr[5], *password; eap_leap_getKey() local [all...] |
H A D | eap_mschapv2.c | 155 const u8 *identity, *password; in eap_mschapv2_challenge_reply() local 161 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_mschapv2_challenge_reply() 162 if (identity == NULL || password == NULL) in eap_mschapv2_challenge_reply() 205 if (mschapv2_derive_response(identity, identity_len, password, in eap_mschapv2_challenge_reply() 304 bin_clear_free(config->password, config->password_len); in eap_mschapv2_password_changed() 308 config->password = os_malloc(16); in eap_mschapv2_password_changed() 310 if (config->password && in eap_mschapv2_password_changed() 313 config->password)) { in eap_mschapv2_password_changed() 314 bin_clear_free(config->password, in eap_mschapv2_password_changed() 316 config->password in eap_mschapv2_password_changed() [all...] |
/third_party/musl/src/legacy/ |
H A D | getpass.c | 13 static char password[128]; in getpass() local 28 l = read(fd, password, sizeof password); in getpass() 30 if (l > 0 && password[l-1] == '\n' || l==sizeof password) l--; in getpass() 31 password[l] = 0; in getpass() 39 return l<0 ? 0 : password; in getpass()
|
/third_party/node/deps/npm/lib/commands/ |
H A D | profile.js | 30 'password', 178 const newpassword = await readUserInfo.password('New password: ') 179 const confirmedpassword = await readUserInfo.password(' Again: ') 189 if (prop !== 'password' && value === null) { 193 if (prop === 'password' && value !== null) { 195 'npm profile set password\n' + 204 if (prop === 'password') { 205 const current = await readUserInfo.password('Current password [all...] |
/third_party/python/Lib/ |
H A D | hashlib.py | 188 def pbkdf2_hmac(hash_name, password, salt, iterations, dklen=None): 203 if not isinstance(password, (bytes, bytearray)): 204 password = bytes(memoryview(password)) 212 if len(password) > blocksize: 213 password = new(hash_name, password).digest() 214 password = password + b'\x00' * (blocksize - len(password)) [all...] |
/third_party/node/deps/npm/node_modules/npm-profile/lib/ |
H A D | index.js | 17 .then(data => loginCouch(data.username, data.password, opts)) 30 .then(data => adduserCouch(data.username, data.email, data.password, opts)) 129 const adduserCouch = (username, email, password, opts = {}) => { 133 password: password, 141 password: 'XXXXX', 156 const loginCouch = (username, password, opts = {}) => { 160 password: password, 167 password [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; in main() local 22 password = argv[1]; in main() 25 printf("Failed to read password\n"); in main() 37 password = buf; in main() 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
H A D | nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; in main() local 22 password = argv[1]; in main() 25 printf("Failed to read password\n"); in main() 37 password = buf; in main() 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
|
/third_party/curl/lib/ |
H A D | netrc.c | 43 /* Get user and password from .netrc when given a machine name */ 67 char *password = *passwordp; in parsenetrc() local 74 char state_password = 0; /* Found a password keyword */ in parsenetrc() 156 if((login && *login) && (password && *password)) { in parsenetrc() 173 'password'. */ in parsenetrc() 218 && (!password || Curl_timestrcmp(password, tok))) { in parsenetrc() 220 free(password); in parsenetrc() 223 password in parsenetrc() [all...] |
/third_party/backends/sanei/ |
H A D | sanei_auth.c | 118 const char *password, in check_passwd() 129 strstr (randomstring, "$MD5$") + 5, password); in check_passwd() 152 return (strcmp (upassword, password) == 0); in check_passwd() 168 char password[SANE_MAX_PASSWORD_LEN]; in sanei_authorize() local 234 memset (password, 0, SANE_MAX_PASSWORD_LEN); in sanei_authorize() 236 (*authorize) (md5resource, username, password); in sanei_authorize() 264 if (check_passwd (password, linep, md5resource, username)) in sanei_authorize() 117 check_passwd(const char *upassword, const char *password, const char *randomstring, const char *username) check_passwd() argument
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | srp.c | 126 char password[1025]; in srp_verify_user() local 133 cb_tmp.password = passin; in srp_verify_user() 135 len = password_callback(password, sizeof(password)-1, 0, &cb_tmp); in srp_verify_user() 137 password[len] = 0; in srp_verify_user() 143 BIO_printf(bio_err, "Pass %s\n", password); in srp_verify_user() 146 if ((gNid = SRP_create_verifier(user, password, &srp_usersalt, in srp_verify_user() 154 OPENSSL_cleanse(password, len); in srp_verify_user() 163 char password[1025]; in srp_create_user() local 169 cb_tmp.password in srp_create_user() [all...] |
/third_party/openssl/apps/ |
H A D | srp.c | 126 char password[1025]; in srp_verify_user() local 133 cb_tmp.password = passin; in srp_verify_user() 135 len = password_callback(password, sizeof(password)-1, 0, &cb_tmp); in srp_verify_user() 137 password[len] = 0; in srp_verify_user() 143 BIO_printf(bio_err, "Pass %s\n", password); in srp_verify_user() 146 if ((gNid = SRP_create_verifier(user, password, &srp_usersalt, in srp_verify_user() 154 OPENSSL_cleanse(password, len); in srp_verify_user() 163 char password[1025]; in srp_create_user() local 169 cb_tmp.password in srp_create_user() [all...] |
/third_party/libwebsockets/lib/roles/mqtt/client/ |
H A D | client-mqtt-handshake.c | 54 * username and password and their length fields if in lws_mqtt_client_send_connect() 61 len += (unsigned int)(c->password ? c->password->len : 0) + 2u; in lws_mqtt_client_send_connect() 86 * Username & password. in lws_mqtt_client_send_connect() 131 * password strings. in lws_mqtt_client_send_connect() 144 if (lws_mqtt_str_is_not_empty(c->password)) { in lws_mqtt_client_send_connect() 145 lws_ser_wu16be(p, c->password->len); in lws_mqtt_client_send_connect() 147 memcpy(p, c->password->buf, in lws_mqtt_client_send_connect() 148 c->password->len); in lws_mqtt_client_send_connect() 149 p += c->password in lws_mqtt_client_send_connect() [all...] |
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | apps_ui.c | 37 const char *password = in ui_read() local 38 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_read() 40 if (password != NULL) { in ui_read() 41 UI_set_result(ui, uis, password); in ui_read() 57 /* Default to the empty password if we've got nothing better */ in ui_read() 72 const char *password = in ui_write() local 73 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_write() 75 if (password != NULL) in ui_write() 196 buff = ui_malloc(bufsiz, "password buffer"); in password_callback()
|
/third_party/openssl/apps/lib/ |
H A D | apps_ui.c | 37 const char *password = in ui_read() local 38 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_read() 40 if (password != NULL) { in ui_read() 41 UI_set_result(ui, uis, password); in ui_read() 57 /* Default to the empty password if we've got nothing better */ in ui_read() 72 const char *password = in ui_write() local 73 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; in ui_write() 75 if (password != NULL) in ui_write() 196 buff = ui_malloc(bufsiz, "password buffer"); in password_callback()
|