/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | create_c.c | 42 const char *password) 63 krb5_store_string(sp, password); 39 kadm5_c_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument
|
H A D | init_c.c | 149 const char *password, 173 if(password == NULL && prompter == NULL) { 195 password, 313 const char *password, 323 /* treat empty password as NULL */ 324 if(password && *password == '\0') 325 password = NULL; 393 ret = get_new_cache(context, client, password, prompter, keytab, 553 const char *password, 147 get_new_cache(krb5_context context, krb5_principal client, const char *password, krb5_prompter_fct prompter, const char *keytab, const char *server_name, krb5_ccache *ret_cache) argument 310 _kadm5_c_get_cred_cache(krb5_context context, const char *client_name, const char *server_name, const char *password, krb5_prompter_fct prompter, const char *keytab, krb5_ccache ccache, krb5_ccache *ret_cache) argument 551 kadm5_c_init_with_context(krb5_context context, const char *client_name, const char *password, krb5_prompter_fct prompter, const char *keytab, krb5_ccache ccache, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 601 init_context(const char *client_name, const char *password, krb5_prompter_fct prompter, const char *keytab, krb5_ccache ccache, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 640 kadm5_c_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 663 kadm5_c_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument [all...] |
H A D | chpass_c.c | 41 const char *password) 61 krb5_store_string(sp, password); 39 kadm5_c_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
|
/freebsd-9.3-release/etc/pam.d/ |
H A D | telnetd | 24 # password 25 #password sufficient pam_krb5.so no_warn try_first_pass 26 password required pam_unix.so no_warn try_first_pass
|
/freebsd-9.3-release/sys/netncp/ |
H A D | ncp_mod.c | 116 li.password = li.user = NULL; 176 ncp_mod_login(struct ncp_conn *conn, char *user, int objtype, char *password, argument 186 conn->li.password = ncp_str_dup(password); 187 if (conn->li.password == NULL) { 193 ncp_str_upper(conn->li.password); 202 if (conn->li.password) { 203 free(conn->li.password, M_NCPDATA); 204 conn->li.password = NULL; 294 la.password, t 391 char *user = NULL, *password = NULL; local [all...] |
H A D | ncp_user.h | 78 char *password; member in struct:ncp_conn_login
|
/freebsd-9.3-release/usr.bin/chpass/ |
H A D | chpass.c | 84 const char *password; local 200 errx(1, "invalid format for password"); 230 password = getpass("Password: "); 231 if (strcmp(crypt(password, old_pw->pw_passwd), 235 password = ""; 249 ypclnt_passwd(ypclnt, pw, password) == -1) {
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | server.c | 50 char *password, *expression; local 121 ret = krb5_ret_string(sp, &password); 133 memset(password, 0, strlen(password)); 134 free(password); 138 mask, password); 140 memset(password, 0, strlen(password)); 141 free(password); 211 ret = krb5_ret_string(sp, &password); [all...] |
/freebsd-9.3-release/crypto/heimdal/tests/kdc/ |
H A D | check-kdc.in | 156 ${kinit} --password-file=${objdir}/foopassword foo@$R || \ 167 ${kinit} --password-file=${objdir}/foopassword \ 174 ${kinit} --enctype=$a --password-file=${objdir}/foopassword foo@$R || { ec=1 ; eval "${testfailed}"; } 183 ${kinit} --password-file=${objdir}/foopassword foo@$R || \ 195 ${kinit} --password-file=${objdir}/foopassword foo@$R || { ec=1 ; eval "${testfailed}"; } 208 ${kinit} --enctype=$a --password-file=${objdir}/foopassword foo@$R || \ 229 ${kinit} --password-file=${objdir}/foopassword remove@$R || \ 237 ${kinit} --password-file=${objdir}/foopassword remove2@$R2 || \ 248 ${kinit} --password-file=${objdir}/foopassword rename@${R} || \ 251 ${kinit} --password [all...] |
H A D | check-uu.in | 105 ${kinit1} --password-file=${objdir}/foopassword user1@$R || \ 109 ${kinit2} --password-file=${objdir}/foopassword user2@$R || \
|
/freebsd-9.3-release/crypto/heimdal/appl/login/ |
H A D | login.c | 146 otp_verify(struct passwd *pwd, const char *password) argument 148 return (otp_verify_user (&otp_ctx, password)); 160 krb5_verify(struct passwd *pwd, const char *password) argument 176 password, 315 krb4_verify(struct passwd *pwd, const char *password) argument 331 ret = krb_verify_user (pwd->pw_name, "", lrealm, (char *)password, 666 check_password(struct passwd *pwd, const char *password) argument 672 return password[0] != '\0'; 677 if(strcmp(pwd->pw_passwd, crypt(password, pwd->pw_passwd)) == 0) 680 if(krb5_verify(pwd, password) 795 char password[128]; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_mschapv2.c | 162 const u8 *identity, *password; local 168 password = eap_get_config_password2(sm, &password_len, &pwhash); 169 if (identity == NULL || password == NULL) 212 if (mschapv2_derive_response(identity, identity_len, password, 311 os_free(config->password); 313 config->password = os_malloc(16); 315 if (config->password) { 318 config->password); 322 config->password = config->new_password; 462 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: password changin 507 const u8 *username, *password, *new_password; local [all...] |
/freebsd-9.3-release/contrib/openbsm/bin/auditdistd/ |
H A D | token.l | 70 password { DP; return PASSWORD; }
|
/freebsd-9.3-release/contrib/pam_modules/pam_passwdqc/ |
H A D | pam_passwdqc.spec | 3 Summary: Pluggable password "quality check". 13 pam_passwdqc is a simple password strength checking module for 14 PAM-aware password changing programs, such as passwd(1). In addition
|
/freebsd-9.3-release/crypto/heimdal/packages/debian/ |
H A D | heimdal-kdc.postinst | 57 # get password 58 db_input medium heimdal-kdc/password || true 60 db_get heimdal-kdc/password; PASSWORD="$RET" 61 db_set heimdal-kdc/password ""
|
/freebsd-9.3-release/crypto/heimdal/tests/gss/ |
H A D | check-ntlm.in | 120 ${kinit} --password-file=${objdir}/foopassword user1@${R} || exitcode=1 122 ${kinitds} --password-file=${objdir}/barpassword digestserver@${R} || exitcode=1 144 ${kinit} --password-file=${objdir}/foopassword --ntlm-domain=TEST user1@${R} || exitcode=1
|
/freebsd-9.3-release/crypto/heimdal/tests/plugin/ |
H A D | check-pac.in | 112 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \ 122 ${kinit} --request-pac --password-file=${objdir}/foopassword foo@${R} || \ 132 ${kinit} --no-request-pac --password-file=${objdir}/foopassword foo@${R} || \
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | ms_funcs.c | 56 * @password: 0-to-256-unicode-char Password (IN; ASCII) 57 * @password_len: Length of password 61 int nt_password_hash(const u8 *password, size_t password_len, argument 70 /* Convert password into unicode */ 72 buf[2 * i] = password[i]; 120 * @password: 0-to-256-unicode-char Password (IN; ASCII) 121 * @password_len: Length of password 127 const u8 *password, size_t password_len, 135 if (nt_password_hash(password, password_len, password_hash)) 228 * @password 125 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 262 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument 384 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument [all...] |
/freebsd-9.3-release/usr.bin/csup/ |
H A D | auth.c | 57 char password[256]; member in struct:srvrecord 199 lprintf(-1, "%s:%d Missing password\n", authfile, linenum); 202 error = auth_parsetoken(&line, auth->password, 203 sizeof(auth->password)); 214 memset(auth->password, 0, sizeof(auth->password)); 254 MD5_Update(&md5, auth->password, strlen(auth->password));
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 73 const void *password, 92 password, passwordlen, 155 "Failed to get password for " 156 "password protected file %s", fn); 227 const void *password; local 231 password = pw->val[i]; 232 passwordlen = strlen(password); 235 cipher, ivdata, password, passwordlen, 245 char password[128]; local 251 prompt.reply.data = password; 68 try_decrypt(hx509_context context, struct hx509_collector *collector, const AlgorithmIdentifier *alg, const EVP_CIPHER *c, const void *ivdata, const void *password, size_t passwordlen, const void *cipher, size_t len) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/appl/su/ |
H A D | su.c | 315 char password[128]; local 322 if (UI_UTIL_read_pw_string (password, sizeof (password), prompt, 0)) { 323 memset (password, 0, sizeof (password)); 328 if (strlen(password) == 0) 332 ret = krb_verify_user(name, instance, realm, password, 334 memset(password, 0, sizeof(password)); 389 snprintf(prompt, sizeof(prompt), "%s's password [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | aes-test.c | 56 char *password; member in struct:__anon4627 66 "password", "ATHENA.MIT.EDUraeburn", -1, 73 "password", "ATHENA.MIT.EDUraeburn", -1, 82 "password", "ATHENA.MIT.EDUraeburn", -1, 89 "password", "ATHENA.MIT.EDUraeburn", -1, 98 "password", "ATHENA.MIT.EDUraeburn", -1, 105 "password", "ATHENA.MIT.EDUraeburn", -1, 114 "password", "\x12\x34\x56\x78\x78\x56\x34\x12", 8, 121 "password", "\x12\x34\x56\x78\x78\x56\x34\x12", 8, 201 krb5_data password, opaqu local [all...] |
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | authsrv.c | 81 if (eap_user->password) { 82 user->password = os_malloc(eap_user->password_len); 83 if (user->password == NULL) 85 os_memcpy(user->password, eap_user->password,
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | auth1.c | 65 SSH_CMSG_AUTH_PASSWORD, "password", 118 char *password; local 122 * Read user password. It is in plain text, but was 126 password = packet_get_string(&dlen); 129 /* Try authentication with the password. */ 130 authenticated = PRIVSEP(auth_password(authctxt, password)); 132 explicit_bzero(password, dlen); 133 free(password); 245 /* If the user has no password, accept authentication immediately. */
|
/freebsd-9.3-release/usr.sbin/sysinstall/ |
H A D | ftp.c | 87 char *user, *login_name, password[80]; local 122 SAFE_STRCPY(password, variable_get(VAR_FTP_PASS)); 124 sprintf(password, "installer@%s", variable_get(VAR_HOSTNAME)); 131 sprintf(password, "%s@%s", user, variable_get(VAR_HOSTNAME)); 135 if ((OpenConn = ftpLoginAf(hostname, af, login_name, password, FtpPort, isDebug(), &code)) == NULL) {
|