Searched refs:password (Results 26 - 50 of 187) sorted by relevance

12345678

/freebsd-9.3-release/crypto/openssh/contrib/aix/
H A Dpam.conf15 sshd password required /usr/lib/security/pam_aix
16 OTHER password required /usr/lib/security/pam_aix
/freebsd-9.3-release/usr.sbin/bsdconfig/password/
H A Dpassword36 f_include $BSDCFG_SHARE/password/password.subr
38 BSDCFG_LIBE="/usr/libexec/bsdconfig" APP_DIR="040.password"
73 # Prompt the user to input a new password (and change it if they don't cancel)
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dms_funcs.h20 const u8 *password, size_t password_len,
27 int generate_authenticator_response(const u8 *password, size_t password_len,
37 int nt_challenge_response(const u8 *challenge, const u8 *password,
42 int nt_password_hash(const u8 *password, size_t password_len,
51 const u8 *password, size_t password_len,
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf11 # NOTE! This file may contain password information and should probably be made
22 # wpa_cli or wpa_gui, or a password is changed). This is required for
389 # password: Password string for EAP. This field can include either the
390 # plaintext password (using ASCII or hex string) or a NtPasswordHash
391 # (16-byte MD4 hash of password) in hash:<32 hex digits> format.
392 # NtPasswordHash can only be used when the password is for MSCHAPv2 or
601 private_key_passwd="password"
612 password="foobar"
627 password="foobar"
640 password
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/hdb/
H A Dext.c279 if (db->hdb_master_key_set && ext->data.u.password.mkvno) {
282 key = _hdb_find_master_key(ext->data.u.password.mkvno,
287 *ext->data.u.password.mkvno);
292 ext->data.u.password.password.data,
293 ext->data.u.password.password.length,
296 ret = der_copy_octet_string(&ext->data.u.password.password, &pw);
305 krb5_set_error_string(context, "password malformate
[all...]
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap_gtc.c56 const u8 *pos, *password, *identity; local
83 password = eap_get_config_otp(sm, &password_len);
84 if (password)
87 password = eap_get_config_password(sm, &password_len);
91 if (password == NULL) {
119 wpabuf_put_data(resp, password, password_len);
125 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
H A Deap_md5.c40 const u8 *pos, *challenge, *password; local
44 password = eap_get_config_password(sm, &password_len);
45 if (password == NULL) {
95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
H A Dmschapv2.h25 const u8 *password, size_t password_len,
H A Deap_leap.c70 const u8 *pos, *challenge, *identity, *password; local
78 password = eap_get_config_password2(sm, &password_len, &pwhash);
79 if (identity == NULL || password == NULL)
124 challenge_response(challenge, password, rpos);
126 nt_challenge_response(challenge, password, password_len, rpos);
193 const u8 *pos, *password; local
201 password = eap_get_config_password2(sm, &password_len, &pwhash);
202 if (password == NULL)
236 if (hash_nt_password_hash(password, pw_hash_hash)) {
241 if (nt_password_hash(password, password_le
281 const u8 *password; local
339 const u8 *addr[5], *password; local
[all...]
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dstring2key.c44 char *password; variable
54 { "password", 'w', arg_string, &password, "Password to use", "password" },
66 arg_printusage (args, num_args, NULL, "password");
175 password = argv[0];
176 if(password == NULL){
179 password = buf;
185 tokey(context, etype, password, salt, "Kerberos 5 (%s)");
192 tokey(context, ETYPE_DES_CBC_MD5, password, sal
[all...]
/freebsd-9.3-release/etc/pam.d/
H A Dother24 # password
25 password required pam_permit.so
H A Dsshd24 # password
25 #password sufficient pam_krb5.so no_warn try_first_pass
26 password required pam_unix.so no_warn try_first_pass
H A Dsystem23 # password
24 #password sufficient pam_krb5.so no_warn try_first_pass
25 password required pam_unix.so no_warn try_first_pass
H A Dconvert.pl52 next unless m/^(\#*)(\w+)\s+(auth|account|session|password)\s+(\S.*)$/;
76 foreach $type (qw(auth account session password)) {
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/
H A Dcommon_glue.c43 const char *password)
45 return __CALL(chpass_principal, (server_handle, princ, password));
62 const char *password)
64 return __CALL(create_principal, (server_handle, princ, mask, password));
41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
59 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument
H A Dchpass_s.c41 const char *password,
66 ret = _kadm5_set_keys(context, &ent.entry, password);
116 * change the password of `princ' to `password' if it's not already that.
122 const char *password)
124 return change (server_handle, princ, password, 1);
128 * change the password of `princ' to `password'
134 const char *password)
136 return change (server_handle, princ, password,
39 change(void *server_handle, krb5_principal princ, const char *password, int cond) argument
120 kadm5_s_chpass_principal_cond(void *server_handle, krb5_principal princ, const char *password) argument
132 kadm5_s_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/tests/ldap/
H A Dcheck-ldap.in102 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1
103 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1
104 ${kadmin} cpw --random-password bar@${R} > /dev/null || exit 1
106 ${kadmin} cpw --random-password suser@${R} > /dev/null|| exit 1
107 ${kadmin} cpw --password=foo suser@${R} || exit 1
129 ${kinit} --password-file=${objdir}/foopassword foo@$R || \
/freebsd-9.3-release/contrib/openpam/modules/pam_unix/
H A Dpam_unix.c77 char *crypt_password, *password; local
89 /* get password */
101 (const char **)&password, NULL);
107 password = resp->resp;
123 (crypt_password = crypt(password, pwd->pw_passwd)) == NULL ||
129 free(password);
/freebsd-9.3-release/crypto/heimdal/kadmin/
H A Dank.c72 char *password,
122 password = pwbuf;
125 password = pwbuf;
126 } else if(password == NULL) {
136 krb5_set_error_string(context, "failed to verify password");
140 password = pwbuf;
143 ret = kadm5_create_principal(kadm_handle, &princ, mask, password);
183 printf ("added %s with password \"%s\"\n", princ_name, password);
191 if (password !
68 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, char *password, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/tests/kdc/
H A Dcheck-referral.in118 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \
127 --password-file=${objdir}/foopassword foo@${R} || \
136 --password-file=${objdir}/foopassword foo@${R} || \
146 --password-file=${objdir}/foopassword alias2@${R}@${R} || \
154 ${kinit} --password-file=${objdir}/foopassword \
161 --password-file=${objdir}/foopassword \
172 #${kinit} --password-file=${objdir}/foopassword foo@${R} || \
184 #${kinit} --password-file=${objdir}/foopassword foo@${R} || \
/freebsd-9.3-release/contrib/cvs/src/
H A Droot.h38 char *password; /* The password or NULL if method == local. */ member in struct:cvsroot_s
/freebsd-9.3-release/usr.sbin/bsdconfig/
H A DMakefile13 password \
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dverify_user.c86 * Verify user `principal' with `password'.
152 const char *password,
169 password,
188 const char *password,
211 ret = verify_user_opt_int(context, principal, password, opt);
217 ret = verify_user_opt_int(context, principal, password, opt);
227 const char *password,
239 return krb5_verify_user_opt(context, principal, password, &opt);
251 const char *password,
264 return krb5_verify_user_opt(context, principal, password,
150 verify_user_opt_int(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *vopt) argument
186 krb5_verify_user_opt(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *opt) argument
224 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument
248 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument
[all...]
/freebsd-9.3-release/lib/libncp/
H A Dncpl_conn.c100 ncp_error("password too long", 0);
103 if (li->password) {
104 bzero(li->password, strlen(li->password));
105 free(li->password);
108 li->password = strdup(passwd);
109 if (li->password == NULL)
112 li->password = NULL;
128 li->password = NULL;
154 if (li->password)
416 ncp_login(int connHandle, const char *user, int objtype, const char *password) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/auth/afskauthlib/
H A Dverify.c117 char *password,
150 password,
222 char *password,
231 ret = krb_verify_user (pwd->pw_name, "", lrealm, password,
249 char *password,
265 ret = unix_verify_user (name, password);
268 ret = verify_krb5(pwd, password, exp, quiet);
272 ret = verify_krb4(pwd, password, exp, quiet);
116 verify_krb5(struct passwd *pwd, char *password, int32_t *exp, int quiet) argument
221 verify_krb4(struct passwd *pwd, char *password, int32_t *exp, int quiet) argument
248 afs_verify(char *name, char *password, int32_t *exp, int quiet) argument

Completed in 137 milliseconds

12345678