Searched refs:password (Results 1 - 25 of 222) sorted by relevance

123456789

/freebsd-10.0-release/etc/pam.d/
H A Dpasswd9 # password
10 #password requisite pam_passwdqc.so enforce=users
11 password required pam_unix.so no_warn try_first_pass nullok
H A Dlogin19 # password
20 password include system
H A Drsh17 # password
18 password required pam_deny.so
H A Dxdm21 # password
22 password required pam_deny.so
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/
H A Dsample_passwd_check.c45 /* just check the length of the password, this is what the default
51 krb5_data *password)
57 if(password->length < min_length)
64 /* use cracklib to check password quality; this requires a patch for
71 krb5_data *password)
73 char *s = malloc(password->length + 1);
80 memcpy(s, password->data, password->length);
81 s[password->length] = '\0';
83 memset(s, 0, password
49 check_length(krb5_context context, krb5_principal prinipal, krb5_data *password) argument
69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument
[all...]
H A Dtest_pw_quality.c42 static char *password; variable
46 { "password", 0, arg_string, &password },
72 if (password == NULL)
73 krb5_errx(context, 1, "no password given");
79 pw_data.data = password;
80 pw_data.length = strlen(password);
H A Dclient_glue.c40 const char *password,
48 password,
59 const char *password,
68 password,
39 kadm5_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
57 kadm5_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
H A Dkadm5-pwcheck.h49 * function, the lib/caller will providing it for the password quality
56 krb5_data *password,
H A Dserver_glue.c40 const char *password,
48 password,
59 const char *password,
68 password,
39 kadm5_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
57 kadm5_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
/freebsd-10.0-release/usr.sbin/bsdconfig/password/share/
H A DMakefile5 FILESDIR= ${SHAREDIR}/bsdconfig/password
6 FILES= password.subr
/freebsd-10.0-release/contrib/wpa/hostapd/
H A Dnt_password_hash.c2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
/freebsd-10.0-release/crypto/openssh/
H A Dauth2-passwd.c52 char *password, *newpass; local
58 password = packet_get_string(&len);
60 /* discard new password from packet */
68 logit("password change not supported");
69 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
71 memset(password, 0, len);
72 free(password);
77 "password",
H A Dauth-passwd.c7 * the password is valid for the user.
77 * Tries to authenticate the user using password. Returns true if
81 auth_password(Authctxt *authctxt, const char *password) argument
93 if (*password == '\0' && options.permit_empty_passwd == 0)
98 int ret = auth_krb5_password(authctxt, password);
106 HANDLE hToken = cygwin_logon_user(pw, password);
116 return (sshpam_auth_passwd(authctxt, password) && ok);
125 result = sys_auth_passwd(authctxt, password);
144 pwwarntime = login_getcaptime(lc, "password-warn", TWO_WEEKS,
153 "Your password wil
167 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
192 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/roken/
H A Dverify.c46 unix_verify_user(char *user, char *password) argument
53 if(strlen(pw->pw_passwd) == 0 && strlen(password) == 0)
55 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/examples/
H A Dieee8021x.conf11 password="password"
/freebsd-10.0-release/usr.sbin/bsdconfig/password/
H A DMakefile7 FILESDIR= ${LIBEXECDIR}/bsdconfig/040.password
11 SCRIPTS= password
/freebsd-10.0-release/contrib/apr/passwd/
H A Dapr_getpass.c17 /* apr_password_get.c: abstraction to provide for obtaining a password from the
93 static char password[MAX_STRING_LEN]; local
96 fgets((char *) &password, sizeof(password), stdin);
98 return (char *) &password;
107 static char password[MAX_STRING_LEN]; local
118 while ((password[n] = getchar()) != '\n') {
119 if (n < sizeof(password) - 1 && password[n] >= ' ' && password[
[all...]
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Deap_otp.c33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
H A Dmschapv2.c37 const u8 *password, size_t password_len,
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65 password, password_len);
68 password, nt_response) ||
70 password, peer_challenge, auth_challenge,
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_has
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dsalt-des.c40 /* This defines the Andrew string_to_key function. It accepts a password
43 * service password database.
54 char password[8+1]; /* crypt is limited to 8 chars anyway */ local
61 password[i] = c ? c : 'X';
63 password[8] = '\0';
65 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock));
86 char password[512]; local
89 memcpy(password, pw.data, min(pw.length, sizeof(password)));
90 if(pw.length < sizeof(password)) {
118 DES_AFS3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
171 krb5_DES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/hx509/
H A Dlock.c43 struct _hx509_password password; member in struct:hx509_lock_data
87 hx509_lock_add_password(hx509_lock lock, const char *password) argument
92 s = strdup(password);
96 d = realloc(lock->password.val,
97 (lock->password.len + 1) * sizeof(lock->password.val[0]));
102 lock->password.val = d;
103 lock->password.val[lock->password.len] = s;
104 lock->password
[all...]
/freebsd-10.0-release/usr.sbin/bsdconfig/password/include/
H A DMakefile5 FILESDIR= ${LIBEXECDIR}/bsdconfig/040.password/include
/freebsd-10.0-release/crypto/openssh/openbsd-compat/
H A Dxcrypt.c66 xcrypt(const char *password, const char *salt) argument
72 crypted = md5_crypt(password, salt);
74 crypted = crypt(password, salt);
77 crypted = bigcrypt(password, salt);
79 crypted = crypt(password, salt);
81 crypted = bigcrypt(password, salt);
83 crypted = crypt(password, salt);
90 * Handle shadowed password systems in a cleaner way for portable
H A Dport-uw.c53 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
59 /* Just use the supplied fake password if authctxt is invalid */
62 /* Check for users with no password. */
63 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0)
66 /* Encrypt the candidate password using the proper salt. */
75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
80 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
108 * fgetpwent() only reads from password file, so we know for certain
/freebsd-10.0-release/crypto/heimdal/kadmin/
H A Dcpw.c40 char *password; member in struct:cpw_entry_data
74 printf ("%s's password set to \"%s\"\n", princ_name, pw);
82 set_password (krb5_principal principal, char *password) argument
87 if(password == NULL) {
99 password = pwbuf;
102 ret = kadm5_chpass_principal(kadm_handle, principal, password);
129 return set_password (principal, e->password);
143 data.password = opt->password_string;
151 if (data.password)
158 "--random-key, --random-password,
[all...]

Completed in 208 milliseconds

123456789