Searched refs:opiepasswd (Results 1 - 6 of 6) sorted by relevance

/freebsd-10.2-release/usr.bin/opiepasswd/
H A DMakefile1 # $FreeBSD: releng/10.2/usr.bin/opiepasswd/Makefile 201386 2010-01-02 10:27:05Z ed $
5 PROG= opiepasswd
/freebsd-10.2-release/contrib/opie/
H A DMakefile.in155 server: libopie/libopie.a libmissing/libmissing.a opietest-passed opielogin opiesu opiepasswd opieinfo opieftpd opieserv
161 @cp opiepasswd opieinfo $(LOCALBIN)
163 @$(CHOWN) $(OWNER) $(LOCALBIN)/opiepasswd $(LOCALBIN)/opieinfo
164 @chgrp $(GROUP) $(LOCALBIN)/opiepasswd $(LOCALBIN)/opieinfo
167 @chmod 4511 $(LOCALBIN)/opiepasswd
249 @echo "REMEMBER to run opiepasswd on your users immediately."
258 @-for i in opiekey opiepasswd opieinfo; do rm $(LOCALBIN)/$$i; done
281 -rm -f *.o opiekey opiegen opielogin opiepasswd opiesu opieftpd
310 opiepasswd: opiepasswd
[all...]
H A Dopiepasswd.c0 /* opiepasswd.c: Add/change an OTP password in the key database.
24 strikes on prompts. Use opiepasswd()'s new calling
31 Use opiepasswd() to update key file. Error if we can't
47 $FreeBSD: releng/10.2/contrib/opie/opiepasswd.c 156997 2006-03-22 16:00:42Z cperciva $
257 fprintf(stderr, "opiepasswd: bogus challenge\n");
273 fprintf(stderr, "opiepasswd: opieverify() returned %d\n", i);
293 fprintf(stderr, "opiepasswd: bogus challenge\n");
324 if (!(rval = opiepasswd(&opie, force, pp->pw_name, n, seed, tmp)))
341 fprintf(stderr, "Then run opiepasswd without the -c parameter.\n");
410 if (opiepasswd(
[all...]
H A Dopie.h22 opiepasswd(). Added __opieparsechallenge() prototype.
135 int opiepasswd __P((struct opie *, int, char *, int, char *, char *));
/freebsd-10.2-release/contrib/opie/libopie/
H A Dpasswd.c1 /* passwd.c: The opiepasswd() library function.
26 int opiepasswd FUNCTION((old, flags, principal, n, seed, ks), struct opie *old AND int flags AND char *principal AND int n AND char *seed AND char *ks) function
/freebsd-10.2-release/usr.bin/
H A DMakefile119 opiepasswd \

Completed in 116 milliseconds