/freebsd-9.3-release/etc/pam.d/ |
H A D | passwd | 9 # password 10 #password requisite pam_passwdqc.so enforce=users 11 password required pam_unix.so no_warn try_first_pass nullok
|
H A D | login | 19 # password 20 password include system
|
H A D | rsh | 17 # password 18 password required pam_deny.so
|
H A D | xdm | 21 # password 22 password required pam_deny.so
|
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | sample_passwd_check.c | 45 /* just check the length of the password, this is what the default 51 krb5_data *password) 57 if(password->length < min_length) 64 /* use cracklib to check password quality; this requires a patch for 71 krb5_data *password) 73 char *s = malloc(password->length + 1); 80 memcpy(s, password->data, password->length); 81 s[password->length] = '\0'; 83 memset(s, 0, password 49 check_length(krb5_context context, krb5_principal prinipal, krb5_data *password) argument 69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument [all...] |
H A D | test_pw_quality.c | 42 static char *password; variable 46 { "password", 0, arg_string, &password }, 72 if (password == NULL) 73 krb5_errx(context, 1, "no password given"); 79 pw_data.data = password; 80 pw_data.length = strlen(password);
|
H A D | client_glue.c | 40 const char *password, 48 password, 59 const char *password, 68 password, 39 kadm5_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 57 kadm5_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
|
H A D | kadm5-pwcheck.h | 49 * function, the lib/caller will providing it for the password quality 56 krb5_data *password,
|
H A D | server_glue.c | 40 const char *password, 48 password, 59 const char *password, 68 password, 39 kadm5_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 57 kadm5_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
|
/freebsd-9.3-release/usr.sbin/bsdconfig/password/share/ |
H A D | Makefile | 5 FILESDIR= ${SHAREDIR}/bsdconfig/password 6 FILES= password.subr
|
/freebsd-9.3-release/contrib/wpa/hostapd/ |
H A D | nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 25 char *password, buf[64], *pos; local 28 password = argv[1]; 31 printf("Failed to read password\n"); 43 password = buf; 46 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | auth2-passwd.c | 52 char *password, *newpass; local 58 password = packet_get_string(&len); 60 /* discard new password from packet */ 68 logit("password change not supported"); 69 else if (PRIVSEP(auth_password(authctxt, password)) == 1) 71 explicit_bzero(password, len); 72 free(password); 77 "password",
|
H A D | auth-passwd.c | 7 * the password is valid for the user. 77 * Tries to authenticate the user using password. Returns true if 81 auth_password(Authctxt *authctxt, const char *password) argument 93 if (*password == '\0' && options.permit_empty_passwd == 0) 98 int ret = auth_krb5_password(authctxt, password); 106 HANDLE hToken = cygwin_logon_user(pw, password); 116 return (sshpam_auth_passwd(authctxt, password) && ok); 125 result = sys_auth_passwd(authctxt, password); 144 pwwarntime = login_getcaptime(lc, "password-warn", TWO_WEEKS, 153 "Your password wil 167 sys_auth_passwd(Authctxt *authctxt, const char *password) argument 192 sys_auth_passwd(Authctxt *authctxt, const char *password) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/roken/ |
H A D | verify.c | 49 unix_verify_user(char *user, char *password) argument 56 if(strlen(pw->pw_passwd) == 0 && strlen(password) == 0) 58 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
|
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 11 password="password"
|
/freebsd-9.3-release/usr.sbin/bsdconfig/password/ |
H A D | Makefile | 7 FILESDIR= ${LIBEXECDIR}/bsdconfig/040.password 11 SCRIPTS= password
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_otp.c | 39 const u8 *pos, *password; local 51 password = eap_get_config_otp(sm, &password_len); 52 if (password) 55 password = eap_get_config_password(sm, &password_len); 59 if (password == NULL) { 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len); 81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
H A D | mschapv2.c | 43 const u8 *password, size_t password_len, 70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 71 password, password_len); 74 password, nt_response); 76 password, peer_challenge, auth_challenge, 79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_has 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | lock.c | 44 struct _hx509_password password; member in struct:hx509_lock_data 88 hx509_lock_add_password(hx509_lock lock, const char *password) argument 93 s = strdup(password); 97 d = realloc(lock->password.val, 98 (lock->password.len + 1) * sizeof(lock->password.val[0])); 103 lock->password.val = d; 104 lock->password.val[lock->password.len] = s; 105 lock->password [all...] |
/freebsd-9.3-release/usr.sbin/bsdconfig/password/include/ |
H A D | Makefile | 5 FILESDIR= ${LIBEXECDIR}/bsdconfig/040.password/include
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | get_in_tkt_pw.c | 46 const char *password = (const char *)keyseed; local 54 if (password == NULL) { 60 password = buf; 62 ret = krb5_string_to_key_salt (context, type, password, salt, *key); 73 const char *password, 84 password, 68 krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *pre_auth_types, const char *password, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep *ret_as_reply) argument
|
/freebsd-9.3-release/contrib/cvs/src/ |
H A D | login.c | 48 /* Construct absolute pathname to user's password file. */ 58 right thing for a GUI is to just store the password in 86 * from a ~/.cvsroot password file and return a pointer to the password if the 97 * char *password as a pointer into linebuf 110 char *password = NULL; local 144 error (0, 0, "warning: skipping invalid entry in password file at line %d", 151 password = p + 1; 158 error (0, errno, "warning: unable to convert version number in password file at line %d", 165 error (0, 0, "warning: skipping entry with invalid version string in password fil 290 char *password = NULL; local 583 free_cvs_password(char *password) argument [all...] |
/freebsd-9.3-release/crypto/openssh/openbsd-compat/ |
H A D | xcrypt.c | 66 xcrypt(const char *password, const char *salt) argument 72 crypted = md5_crypt(password, salt); 74 crypted = crypt(password, salt); 77 crypted = bigcrypt(password, salt); 79 crypted = crypt(password, salt); 81 crypted = bigcrypt(password, salt); 83 crypted = crypt(password, salt); 90 * Handle shadowed password systems in a cleaner way for portable
|
H A D | port-uw.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *password) argument 59 /* Just use the supplied fake password if authctxt is invalid */ 62 /* Check for users with no password. */ 63 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0) 66 /* Encrypt the candidate password using the proper salt. */ 75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0) 76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0)); 80 result = (strcmp(xcrypt(password, salt), pw_password) == 0); 108 * fgetpwent() only reads from password file, so we know for certain
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | cpw.c | 42 char *password; member in struct:cpw_entry_data 76 printf ("%s's password set to \"%s\"\n", princ_name, pw); 84 set_password (krb5_principal principal, char *password) argument 89 if(password == NULL) { 101 password = pwbuf; 104 ret = kadm5_chpass_principal(kadm_handle, principal, password); 131 return set_password (principal, e->password); 145 data.password = opt->password_string; 153 if (data.password) 160 "--random-key, --random-password, [all...] |