/freebsd-10.0-release/contrib/apr/threadproc/unix/ |
H A D | proc.c | 316 const char *password)
|
/freebsd-10.0-release/contrib/openbsm/etc/ |
H A D | audit_event | 638 6501:AUE_DARWIN_modify_password:modify password:ad 660 45014:AUE_modify_password:modify password:ad
|
/freebsd-10.0-release/contrib/wpa/src/ap/ |
H A D | ap_config.c | 371 os_free(user->password);
|
H A D | hostapd.c | 279 os_free(hapd->tmp_eap_user.password);
|
/freebsd-10.0-release/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 578 - mention that challengereponse supports PAM, so disabling password doesn't 599 three password attempts as it is) 682 - Disable the built-in MD5 password support. We're using PAM. 685 will try it when the server disallows password authentication.
|
/freebsd-10.0-release/sys/sys/ |
H A D | ata.h | 195 /*092*/ u_int16_t master_passwd_revision; /* password revision code */ 405 #define ATA_SECURITY_SET_PASSWORD 0xf1 /* set drive password */ 410 #define ATA_SECURITY_DISABLE_PASSWORD 0xf6 /* disable drive password */ 565 u_int8_t password[32]; member in struct:ata_security_password
|
/freebsd-10.0-release/contrib/serf/ |
H A D | outgoing.c | 944 char **password, 982 status = (*ctx->cred_cb)(username, password, 942 serf__provide_credentials(serf_context_t *ctx, char **username, char **password, serf_request_t *request, void *baton, int code, const char *authn_type, const char *realm, apr_pool_t *pool) argument
|
/freebsd-10.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 161 if (conf->password) { 168 "password"); 171 pos = (const char *) conf->password;
|
/freebsd-10.0-release/contrib/wpa/src/eap_server/ |
H A D | eap_server.c | 91 * is found. sm->user can be used to get user information (e.g., password). 1217 os_free(user->password); 1218 user->password = NULL;
|
/freebsd-10.0-release/crypto/heimdal/lib/ntlm/ |
H A D | ntlm.c | 1040 * Calculate the NTLM key, the password is assumed to be in UTF8. 1042 * @param password password to calcute the key for. 1052 heim_ntlm_nt_key(const char *password, struct ntlm_buf *key) argument 1063 ret = ascii2ucs2le(password, 0, &buf);
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | monitor_wrap.c | 341 /* Do the password authentication */ 343 mm_auth_password(Authctxt *authctxt, char *password) argument 351 buffer_put_cstring(&m, password);
|
H A D | configure | 1436 --without-shadow Disable shadow password support 16714 # Whether to disable shadow password support 18844 echo " MD5 password support: $MD5_MSG" 18878 echo "for sshd, otherwise password authentication may fail. "
|
/freebsd-10.0-release/usr.sbin/pw/ |
H A D | pw_user.c | 75 * -p date password expiry date 83 * -h fd password filehandle 84 * -H fd encrypted password filehandle 90 * -p period default password change period 96 * -w method default password method 353 * a "*LOCKED*" prefix from in front of the password to 356 * password authentication (not ssh, kerberos or any 357 * other method that does not use the UNIX password) but 675 errx(EX_DATAERR, "empty password read on file descriptor %d", fd); 862 * Now, let's fill the bitmap from the password fil 1058 pw_pwcrypt(char *password) argument [all...] |
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 1694 static int tls_passwd_cb(char *buf, int size, int rwflag, void *password) argument 1696 if (password == NULL) { 1699 os_strlcpy(buf, (char *) password, size);
|
/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | apps.c | 493 const char *password = local 494 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; 495 if (password && password[0] != '\0') 497 UI_set_result(ui, uis, password); 517 const char *password = local 518 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; 519 if (password && password[0] != '\0') 555 const char *password local [all...] |
H A D | s_client.c | 329 BIO_printf(bio_err," -srppass arg - password for 'user'\n"); 498 cb_tmp.password = (char *)srp_arg->srppassin; 1049 BIO_printf(bio_err, "Error getting password\n"); 1109 BIO_printf(bio_err, "Error getting password\n");
|
/freebsd-10.0-release/tools/regression/iscsi/ |
H A D | iscsi-test.sh | 290 check iscsiadm --mode node --targetname "$TARGET2" -p "$TARGETIP:3260" --op=update --name node.session.auth.password --value="$SECRET"
|
/freebsd-10.0-release/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 132 "specify a password to use for authenticated requests"}, 189 char password[9]; variable 966 "Invalid password\n");
|
/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | ssl.h | 862 /* Default password callback. */ 865 /* Default password callback user data. */ 1846 int SSL_CTX_set_srp_password(SSL_CTX *ctx,char *password);
|
/freebsd-10.0-release/etc/ |
H A D | services | 1072 password-chg 586/tcp 1073 password-chg 586/udp
|
/freebsd-10.0-release/contrib/lukemftpd/src/ |
H A D | ftpd.c | 898 "Guest login ok, type your name as password."); 1302 /* "ftp" is the only account allowed with no password */ 1391 /* password ok; check if anything else prevents login */ 1615 /* store guest password reply into pw_passwd */ 2536 reply(0, "Waiting for password"); 3630 * Determine if `password' is valid for user given in `pw'. 3631 * Returns 2 if password expired, 1 if otherwise failed, 0 if ok 3634 checkpassword(const struct passwd *pwent, const char *password) argument 3644 orig = pwent->pw_passwd; /* save existing password */ 3651 new = crypt(password, ori [all...] |
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.c | 3586 os_free(eap->password); 3587 eap->password = (u8 *) os_strdup(value);
|