Searched refs:password (Results 201 - 222 of 222) sorted by relevance

123456789

/freebsd-10.0-release/contrib/apr/threadproc/unix/
H A Dproc.c316 const char *password)
/freebsd-10.0-release/contrib/openbsm/etc/
H A Daudit_event638 6501:AUE_DARWIN_modify_password:modify password:ad
660 45014:AUE_modify_password:modify password:ad
/freebsd-10.0-release/contrib/wpa/src/ap/
H A Dap_config.c371 os_free(user->password);
H A Dhostapd.c279 os_free(hapd->tmp_eap_user.password);
/freebsd-10.0-release/crypto/openssh/contrib/redhat/
H A Dopenssh.spec578 - mention that challengereponse supports PAM, so disabling password doesn't
599 three password attempts as it is)
682 - Disable the built-in MD5 password support. We're using PAM.
685 will try it when the server disallows password authentication.
/freebsd-10.0-release/sys/sys/
H A Data.h195 /*092*/ u_int16_t master_passwd_revision; /* password revision code */
405 #define ATA_SECURITY_SET_PASSWORD 0xf1 /* set drive password */
410 #define ATA_SECURITY_DISABLE_PASSWORD 0xf6 /* disable drive password */
565 u_int8_t password[32]; member in struct:ata_security_password
/freebsd-10.0-release/contrib/serf/
H A Doutgoing.c944 char **password,
982 status = (*ctx->cred_cb)(username, password,
942 serf__provide_credentials(serf_context_t *ctx, char **username, char **password, serf_request_t *request, void *baton, int code, const char *authn_type, const char *realm, apr_pool_t *pool) argument
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Deap_aka.c161 if (conf->password) {
168 "password");
171 pos = (const char *) conf->password;
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Deap_server.c91 * is found. sm->user can be used to get user information (e.g., password).
1217 os_free(user->password);
1218 user->password = NULL;
/freebsd-10.0-release/crypto/heimdal/lib/ntlm/
H A Dntlm.c1040 * Calculate the NTLM key, the password is assumed to be in UTF8.
1042 * @param password password to calcute the key for.
1052 heim_ntlm_nt_key(const char *password, struct ntlm_buf *key) argument
1063 ret = ascii2ucs2le(password, 0, &buf);
/freebsd-10.0-release/crypto/openssh/
H A Dmonitor_wrap.c341 /* Do the password authentication */
343 mm_auth_password(Authctxt *authctxt, char *password) argument
351 buffer_put_cstring(&m, password);
H A Dconfigure1436 --without-shadow Disable shadow password support
16714 # Whether to disable shadow password support
18844 echo " MD5 password support: $MD5_MSG"
18878 echo "for sshd, otherwise password authentication may fail. "
/freebsd-10.0-release/usr.sbin/pw/
H A Dpw_user.c75 * -p date password expiry date
83 * -h fd password filehandle
84 * -H fd encrypted password filehandle
90 * -p period default password change period
96 * -w method default password method
353 * a "*LOCKED*" prefix from in front of the password to
356 * password authentication (not ssh, kerberos or any
357 * other method that does not use the UNIX password) but
675 errx(EX_DATAERR, "empty password read on file descriptor %d", fd);
862 * Now, let's fill the bitmap from the password fil
1058 pw_pwcrypt(char *password) argument
[all...]
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dtls_openssl.c1694 static int tls_passwd_cb(char *buf, int size, int rwflag, void *password) argument
1696 if (password == NULL) {
1699 os_strlcpy(buf, (char *) password, size);
/freebsd-10.0-release/crypto/openssl/apps/
H A Dapps.c493 const char *password = local
494 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
495 if (password && password[0] != '\0')
497 UI_set_result(ui, uis, password);
517 const char *password = local
518 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
519 if (password && password[0] != '\0')
555 const char *password local
[all...]
H A Ds_client.c329 BIO_printf(bio_err," -srppass arg - password for 'user'\n");
498 cb_tmp.password = (char *)srp_arg->srppassin;
1049 BIO_printf(bio_err, "Error getting password\n");
1109 BIO_printf(bio_err, "Error getting password\n");
/freebsd-10.0-release/tools/regression/iscsi/
H A Discsi-test.sh290 check iscsiadm --mode node --targetname "$TARGET2" -p "$TARGETIP:3260" --op=update --name node.session.auth.password --value="$SECRET"
/freebsd-10.0-release/contrib/ntp/ntpdc/
H A Dntpdc.c132 "specify a password to use for authenticated requests"},
189 char password[9]; variable
966 "Invalid password\n");
/freebsd-10.0-release/crypto/openssl/ssl/
H A Dssl.h862 /* Default password callback. */
865 /* Default password callback user data. */
1846 int SSL_CTX_set_srp_password(SSL_CTX *ctx,char *password);
/freebsd-10.0-release/etc/
H A Dservices1072 password-chg 586/tcp
1073 password-chg 586/udp
/freebsd-10.0-release/contrib/lukemftpd/src/
H A Dftpd.c898 "Guest login ok, type your name as password.");
1302 /* "ftp" is the only account allowed with no password */
1391 /* password ok; check if anything else prevents login */
1615 /* store guest password reply into pw_passwd */
2536 reply(0, "Waiting for password");
3630 * Determine if `password' is valid for user given in `pw'.
3631 * Returns 2 if password expired, 1 if otherwise failed, 0 if ok
3634 checkpassword(const struct passwd *pwent, const char *password) argument
3644 orig = pwent->pw_passwd; /* save existing password */
3651 new = crypt(password, ori
[all...]
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.c3586 os_free(eap->password);
3587 eap->password = (u8 *) os_strdup(value);

Completed in 310 milliseconds

123456789