/freebsd-9.3-release/crypto/openssh/contrib/aix/ |
H A D | pam.conf | 15 sshd password required /usr/lib/security/pam_aix 16 OTHER password required /usr/lib/security/pam_aix
|
/freebsd-9.3-release/usr.sbin/bsdconfig/password/ |
H A D | password | 36 f_include $BSDCFG_SHARE/password/password.subr 38 BSDCFG_LIBE="/usr/libexec/bsdconfig" APP_DIR="040.password" 73 # Prompt the user to input a new password (and change it if they don't cancel)
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 20 const u8 *password, size_t password_len, 27 int generate_authenticator_response(const u8 *password, size_t password_len, 37 int nt_challenge_response(const u8 *challenge, const u8 *password, 42 int nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 11 # NOTE! This file may contain password information and should probably be made 22 # wpa_cli or wpa_gui, or a password is changed). This is required for 389 # password: Password string for EAP. This field can include either the 390 # plaintext password (using ASCII or hex string) or a NtPasswordHash 391 # (16-byte MD4 hash of password) in hash:<32 hex digits> format. 392 # NtPasswordHash can only be used when the password is for MSCHAPv2 or 601 private_key_passwd="password" 612 password="foobar" 627 password="foobar" 640 password [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hdb/ |
H A D | ext.c | 279 if (db->hdb_master_key_set && ext->data.u.password.mkvno) { 282 key = _hdb_find_master_key(ext->data.u.password.mkvno, 287 *ext->data.u.password.mkvno); 292 ext->data.u.password.password.data, 293 ext->data.u.password.password.length, 296 ret = der_copy_octet_string(&ext->data.u.password.password, &pw); 305 krb5_set_error_string(context, "password malformate [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_gtc.c | 56 const u8 *pos, *password, *identity; local 83 password = eap_get_config_otp(sm, &password_len); 84 if (password) 87 password = eap_get_config_password(sm, &password_len); 91 if (password == NULL) { 119 wpabuf_put_data(resp, password, password_len); 125 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
H A D | eap_md5.c | 40 const u8 *pos, *challenge, *password; local 44 password = eap_get_config_password(sm, &password_len); 45 if (password == NULL) { 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
H A D | mschapv2.h | 25 const u8 *password, size_t password_len,
|
H A D | eap_leap.c | 70 const u8 *pos, *challenge, *identity, *password; local 78 password = eap_get_config_password2(sm, &password_len, &pwhash); 79 if (identity == NULL || password == NULL) 124 challenge_response(challenge, password, rpos); 126 nt_challenge_response(challenge, password, password_len, rpos); 193 const u8 *pos, *password; local 201 password = eap_get_config_password2(sm, &password_len, &pwhash); 202 if (password == NULL) 236 if (hash_nt_password_hash(password, pw_hash_hash)) { 241 if (nt_password_hash(password, password_le 281 const u8 *password; local 339 const u8 *addr[5], *password; local [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | string2key.c | 44 char *password; variable 54 { "password", 'w', arg_string, &password, "Password to use", "password" }, 66 arg_printusage (args, num_args, NULL, "password"); 175 password = argv[0]; 176 if(password == NULL){ 179 password = buf; 185 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); 192 tokey(context, ETYPE_DES_CBC_MD5, password, sal [all...] |
/freebsd-9.3-release/etc/pam.d/ |
H A D | other | 24 # password 25 password required pam_permit.so
|
H A D | sshd | 24 # password 25 #password sufficient pam_krb5.so no_warn try_first_pass 26 password required pam_unix.so no_warn try_first_pass
|
H A D | system | 23 # password 24 #password sufficient pam_krb5.so no_warn try_first_pass 25 password required pam_unix.so no_warn try_first_pass
|
H A D | convert.pl | 52 next unless m/^(\#*)(\w+)\s+(auth|account|session|password)\s+(\S.*)$/; 76 foreach $type (qw(auth account session password)) {
|
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | common_glue.c | 43 const char *password) 45 return __CALL(chpass_principal, (server_handle, princ, password)); 62 const char *password) 64 return __CALL(create_principal, (server_handle, princ, mask, password)); 41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument 59 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument
|
H A D | chpass_s.c | 41 const char *password, 66 ret = _kadm5_set_keys(context, &ent.entry, password); 116 * change the password of `princ' to `password' if it's not already that. 122 const char *password) 124 return change (server_handle, princ, password, 1); 128 * change the password of `princ' to `password' 134 const char *password) 136 return change (server_handle, princ, password, 39 change(void *server_handle, krb5_principal princ, const char *password, int cond) argument 120 kadm5_s_chpass_principal_cond(void *server_handle, krb5_principal princ, const char *password) argument 132 kadm5_s_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/tests/ldap/ |
H A D | check-ldap.in | 102 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1 103 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1 104 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1 106 ${kadmin} cpw --random-password suser@${R} > /dev/null|| exit 1 107 ${kadmin} cpw --password=foo suser@${R} || exit 1 129 ${kinit} --password-file=${objdir}/foopassword foo@$R || \
|
/freebsd-9.3-release/contrib/openpam/modules/pam_unix/ |
H A D | pam_unix.c | 77 char *crypt_password, *password; local 89 /* get password */ 101 (const char **)&password, NULL); 107 password = resp->resp; 123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL || 129 free(password);
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | ank.c | 72 char *password, 122 password = pwbuf; 125 password = pwbuf; 126 } else if(password == NULL) { 136 krb5_set_error_string(context, "failed to verify password"); 140 password = pwbuf; 143 ret = kadm5_create_principal(kadm_handle, &princ, mask, password); 183 printf ("added %s with password \"%s\"\n", princ_name, password); 191 if (password ! 68 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, char *password, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/tests/kdc/ |
H A D | check-referral.in | 118 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \ 127 --password-file=${objdir}/foopassword foo@${R} || \ 136 --password-file=${objdir}/foopassword foo@${R} || \ 146 --password-file=${objdir}/foopassword alias2@${R}@${R} || \ 154 ${kinit} --password-file=${objdir}/foopassword \ 161 --password-file=${objdir}/foopassword \ 172 #${kinit} --password-file=${objdir}/foopassword foo@${R} || \ 184 #${kinit} --password-file=${objdir}/foopassword foo@${R} || \
|
/freebsd-9.3-release/contrib/cvs/src/ |
H A D | root.h | 38 char *password; /* The password or NULL if method == local. */ member in struct:cvsroot_s
|
/freebsd-9.3-release/usr.sbin/bsdconfig/ |
H A D | Makefile | 13 password \
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | verify_user.c | 86 * Verify user `principal' with `password'. 152 const char *password, 169 password, 188 const char *password, 211 ret = verify_user_opt_int(context, principal, password, opt); 217 ret = verify_user_opt_int(context, principal, password, opt); 227 const char *password, 239 return krb5_verify_user_opt(context, principal, password, &opt); 251 const char *password, 264 return krb5_verify_user_opt(context, principal, password, 150 verify_user_opt_int(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *vopt) argument 186 krb5_verify_user_opt(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *opt) argument 224 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument 248 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument [all...] |
/freebsd-9.3-release/lib/libncp/ |
H A D | ncpl_conn.c | 100 ncp_error("password too long", 0); 103 if (li->password) { 104 bzero(li->password, strlen(li->password)); 105 free(li->password); 108 li->password = strdup(passwd); 109 if (li->password == NULL) 112 li->password = NULL; 128 li->password = NULL; 154 if (li->password) 416 ncp_login(int connHandle, const char *user, int objtype, const char *password) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/auth/afskauthlib/ |
H A D | verify.c | 117 char *password, 150 password, 222 char *password, 231 ret = krb_verify_user (pwd->pw_name, "", lrealm, password, 249 char *password, 265 ret = unix_verify_user (name, password); 268 ret = verify_krb5(pwd, password, exp, quiet); 272 ret = verify_krb4(pwd, password, exp, quiet); 116 verify_krb5(struct passwd *pwd, char *password, int32_t *exp, int quiet) argument 221 verify_krb4(struct passwd *pwd, char *password, int32_t *exp, int quiet) argument 248 afs_verify(char *name, char *password, int32_t *exp, int quiet) argument
|