Searched refs:password (Results 51 - 75 of 187) sorted by relevance

12345678

/freebsd-9.3-release/crypto/heimdal/lib/kadm5/
H A Dcreate_c.c42 const char *password)
63 krb5_store_string(sp, password);
39 kadm5_c_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument
H A Dinit_c.c149 const char *password,
173 if(password == NULL && prompter == NULL) {
195 password,
313 const char *password,
323 /* treat empty password as NULL */
324 if(password && *password == '\0')
325 password = NULL;
393 ret = get_new_cache(context, client, password, prompter, keytab,
553 const char *password,
147 get_new_cache(krb5_context context, krb5_principal client, const char *password, krb5_prompter_fct prompter, const char *keytab, const char *server_name, krb5_ccache *ret_cache) argument
310 _kadm5_c_get_cred_cache(krb5_context context, const char *client_name, const char *server_name, const char *password, krb5_prompter_fct prompter, const char *keytab, krb5_ccache ccache, krb5_ccache *ret_cache) argument
551 kadm5_c_init_with_context(krb5_context context, const char *client_name, const char *password, krb5_prompter_fct prompter, const char *keytab, krb5_ccache ccache, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
601 init_context(const char *client_name, const char *password, krb5_prompter_fct prompter, const char *keytab, krb5_ccache ccache, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
640 kadm5_c_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
663 kadm5_c_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
[all...]
H A Dchpass_c.c41 const char *password)
61 krb5_store_string(sp, password);
39 kadm5_c_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
/freebsd-9.3-release/etc/pam.d/
H A Dtelnetd24 # password
25 #password sufficient pam_krb5.so no_warn try_first_pass
26 password required pam_unix.so no_warn try_first_pass
/freebsd-9.3-release/sys/netncp/
H A Dncp_mod.c116 li.password = li.user = NULL;
176 ncp_mod_login(struct ncp_conn *conn, char *user, int objtype, char *password, argument
186 conn->li.password = ncp_str_dup(password);
187 if (conn->li.password == NULL) {
193 ncp_str_upper(conn->li.password);
202 if (conn->li.password) {
203 free(conn->li.password, M_NCPDATA);
204 conn->li.password = NULL;
294 la.password, t
391 char *user = NULL, *password = NULL; local
[all...]
H A Dncp_user.h78 char *password; member in struct:ncp_conn_login
/freebsd-9.3-release/usr.bin/chpass/
H A Dchpass.c84 const char *password; local
200 errx(1, "invalid format for password");
230 password = getpass("Password: ");
231 if (strcmp(crypt(password, old_pw->pw_passwd),
235 password = "";
249 ypclnt_passwd(ypclnt, pw, password) == -1) {
/freebsd-9.3-release/crypto/heimdal/kadmin/
H A Dserver.c50 char *password, *expression; local
121 ret = krb5_ret_string(sp, &password);
133 memset(password, 0, strlen(password));
134 free(password);
138 mask, password);
140 memset(password, 0, strlen(password));
141 free(password);
211 ret = krb5_ret_string(sp, &password);
[all...]
/freebsd-9.3-release/crypto/heimdal/tests/kdc/
H A Dcheck-kdc.in156 ${kinit} --password-file=${objdir}/foopassword foo@$R || \
167 ${kinit} --password-file=${objdir}/foopassword \
174 ${kinit} --enctype=$a --password-file=${objdir}/foopassword foo@$R || { ec=1 ; eval "${testfailed}"; }
183 ${kinit} --password-file=${objdir}/foopassword foo@$R || \
195 ${kinit} --password-file=${objdir}/foopassword foo@$R || { ec=1 ; eval "${testfailed}"; }
208 ${kinit} --enctype=$a --password-file=${objdir}/foopassword foo@$R || \
229 ${kinit} --password-file=${objdir}/foopassword remove@$R || \
237 ${kinit} --password-file=${objdir}/foopassword remove2@$R2 || \
248 ${kinit} --password-file=${objdir}/foopassword rename@${R} || \
251 ${kinit} --password
[all...]
H A Dcheck-uu.in105 ${kinit1} --password-file=${objdir}/foopassword user1@$R || \
109 ${kinit2} --password-file=${objdir}/foopassword user2@$R || \
/freebsd-9.3-release/crypto/heimdal/appl/login/
H A Dlogin.c146 otp_verify(struct passwd *pwd, const char *password) argument
148 return (otp_verify_user (&otp_ctx, password));
160 krb5_verify(struct passwd *pwd, const char *password) argument
176 password,
315 krb4_verify(struct passwd *pwd, const char *password) argument
331 ret = krb_verify_user (pwd->pw_name, "", lrealm, (char *)password,
666 check_password(struct passwd *pwd, const char *password) argument
672 return password[0] != '\0';
677 if(strcmp(pwd->pw_passwd, crypt(password, pwd->pw_passwd)) == 0)
680 if(krb5_verify(pwd, password)
795 char password[128]; local
[all...]
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap_mschapv2.c162 const u8 *identity, *password; local
168 password = eap_get_config_password2(sm, &password_len, &pwhash);
169 if (identity == NULL || password == NULL)
212 if (mschapv2_derive_response(identity, identity_len, password,
311 os_free(config->password);
313 config->password = os_malloc(16);
315 if (config->password) {
318 config->password);
322 config->password = config->new_password;
462 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: password changin
507 const u8 *username, *password, *new_password; local
[all...]
/freebsd-9.3-release/contrib/openbsm/bin/auditdistd/
H A Dtoken.l70 password { DP; return PASSWORD; }
/freebsd-9.3-release/contrib/pam_modules/pam_passwdqc/
H A Dpam_passwdqc.spec3 Summary: Pluggable password "quality check".
13 pam_passwdqc is a simple password strength checking module for
14 PAM-aware password changing programs, such as passwd(1). In addition
/freebsd-9.3-release/crypto/heimdal/packages/debian/
H A Dheimdal-kdc.postinst57 # get password
58 db_input medium heimdal-kdc/password || true
60 db_get heimdal-kdc/password; PASSWORD="$RET"
61 db_set heimdal-kdc/password ""
/freebsd-9.3-release/crypto/heimdal/tests/gss/
H A Dcheck-ntlm.in120 ${kinit} --password-file=${objdir}/foopassword user1@${R} || exitcode=1
122 ${kinitds} --password-file=${objdir}/barpassword digestserver@${R} || exitcode=1
144 ${kinit} --password-file=${objdir}/foopassword --ntlm-domain=TEST user1@${R} || exitcode=1
/freebsd-9.3-release/crypto/heimdal/tests/plugin/
H A Dcheck-pac.in112 ${kinit} --password-file=${objdir}/foopassword foo@${R} || \
122 ${kinit} --request-pac --password-file=${objdir}/foopassword foo@${R} || \
132 ${kinit} --no-request-pac --password-file=${objdir}/foopassword foo@${R} || \
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dms_funcs.c56 * @password: 0-to-256-unicode-char Password (IN; ASCII)
57 * @password_len: Length of password
61 int nt_password_hash(const u8 *password, size_t password_len, argument
70 /* Convert password into unicode */
72 buf[2 * i] = password[i];
120 * @password: 0-to-256-unicode-char Password (IN; ASCII)
121 * @password_len: Length of password
127 const u8 *password, size_t password_len,
135 if (nt_password_hash(password, password_len, password_hash))
228 * @password
125 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
239 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
262 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
384 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument
[all...]
/freebsd-9.3-release/usr.bin/csup/
H A Dauth.c57 char password[256]; member in struct:srvrecord
199 lprintf(-1, "%s:%d Missing password\n", authfile, linenum);
202 error = auth_parsetoken(&line, auth->password,
203 sizeof(auth->password));
214 memset(auth->password, 0, sizeof(auth->password));
254 MD5_Update(&md5, auth->password, strlen(auth->password));
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dks_file.c73 const void *password,
92 password, passwordlen,
155 "Failed to get password for "
156 "password protected file %s", fn);
227 const void *password; local
231 password = pw->val[i];
232 passwordlen = strlen(password);
235 cipher, ivdata, password, passwordlen,
245 char password[128]; local
251 prompt.reply.data = password;
68 try_decrypt(hx509_context context, struct hx509_collector *collector, const AlgorithmIdentifier *alg, const EVP_CIPHER *c, const void *ivdata, const void *password, size_t passwordlen, const void *cipher, size_t len) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/appl/su/
H A Dsu.c315 char password[128]; local
322 if (UI_UTIL_read_pw_string (password, sizeof (password), prompt, 0)) {
323 memset (password, 0, sizeof (password));
328 if (strlen(password) == 0)
332 ret = krb_verify_user(name, instance, realm, password,
334 memset(password, 0, sizeof(password));
389 snprintf(prompt, sizeof(prompt), "%s's password
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Daes-test.c56 char *password; member in struct:__anon4627
66 "password", "ATHENA.MIT.EDUraeburn", -1,
73 "password", "ATHENA.MIT.EDUraeburn", -1,
82 "password", "ATHENA.MIT.EDUraeburn", -1,
89 "password", "ATHENA.MIT.EDUraeburn", -1,
98 "password", "ATHENA.MIT.EDUraeburn", -1,
105 "password", "ATHENA.MIT.EDUraeburn", -1,
114 "password", "\x12\x34\x56\x78\x78\x56\x34\x12", 8,
121 "password", "\x12\x34\x56\x78\x78\x56\x34\x12", 8,
201 krb5_data password, opaqu local
[all...]
/freebsd-9.3-release/contrib/wpa/src/ap/
H A Dauthsrv.c81 if (eap_user->password) {
82 user->password = os_malloc(eap_user->password_len);
83 if (user->password == NULL)
85 os_memcpy(user->password, eap_user->password,
/freebsd-9.3-release/crypto/openssh/
H A Dauth1.c65 SSH_CMSG_AUTH_PASSWORD, "password",
118 char *password; local
122 * Read user password. It is in plain text, but was
126 password = packet_get_string(&dlen);
129 /* Try authentication with the password. */
130 authenticated = PRIVSEP(auth_password(authctxt, password));
132 explicit_bzero(password, dlen);
133 free(password);
245 /* If the user has no password, accept authentication immediately. */
/freebsd-9.3-release/usr.sbin/sysinstall/
H A Dftp.c87 char *user, *login_name, password[80]; local
122 SAFE_STRCPY(password, variable_get(VAR_FTP_PASS));
124 sprintf(password, "installer@%s", variable_get(VAR_HOSTNAME));
131 sprintf(password, "%s@%s", user, variable_get(VAR_HOSTNAME));
135 if ((OpenConn = ftpLoginAf(hostname, af, login_name, password, FtpPort, isDebug(), &code)) == NULL) {

Completed in 393 milliseconds

12345678