Searched refs:password (Results 1 - 25 of 187) sorted by relevance

12345678

/freebsd-9.3-release/etc/pam.d/
H A Dpasswd9 # password
10 #password requisite pam_passwdqc.so enforce=users
11 password required pam_unix.so no_warn try_first_pass nullok
H A Dlogin19 # password
20 password include system
H A Drsh17 # password
18 password required pam_deny.so
H A Dxdm21 # password
22 password required pam_deny.so
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/
H A Dsample_passwd_check.c45 /* just check the length of the password, this is what the default
51 krb5_data *password)
57 if(password->length < min_length)
64 /* use cracklib to check password quality; this requires a patch for
71 krb5_data *password)
73 char *s = malloc(password->length + 1);
80 memcpy(s, password->data, password->length);
81 s[password->length] = '\0';
83 memset(s, 0, password
49 check_length(krb5_context context, krb5_principal prinipal, krb5_data *password) argument
69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument
[all...]
H A Dtest_pw_quality.c42 static char *password; variable
46 { "password", 0, arg_string, &password },
72 if (password == NULL)
73 krb5_errx(context, 1, "no password given");
79 pw_data.data = password;
80 pw_data.length = strlen(password);
H A Dclient_glue.c40 const char *password,
48 password,
59 const char *password,
68 password,
39 kadm5_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
57 kadm5_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
H A Dkadm5-pwcheck.h49 * function, the lib/caller will providing it for the password quality
56 krb5_data *password,
H A Dserver_glue.c40 const char *password,
48 password,
59 const char *password,
68 password,
39 kadm5_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
57 kadm5_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
/freebsd-9.3-release/usr.sbin/bsdconfig/password/share/
H A DMakefile5 FILESDIR= ${SHAREDIR}/bsdconfig/password
6 FILES= password.subr
/freebsd-9.3-release/contrib/wpa/hostapd/
H A Dnt_password_hash.c2 * hostapd - Plaintext password to NtPasswordHash
25 char *password, buf[64], *pos; local
28 password = argv[1];
31 printf("Failed to read password\n");
43 password = buf;
46 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
/freebsd-9.3-release/crypto/openssh/
H A Dauth2-passwd.c52 char *password, *newpass; local
58 password = packet_get_string(&len);
60 /* discard new password from packet */
68 logit("password change not supported");
69 else if (PRIVSEP(auth_password(authctxt, password)) == 1)
71 explicit_bzero(password, len);
72 free(password);
77 "password",
H A Dauth-passwd.c7 * the password is valid for the user.
77 * Tries to authenticate the user using password. Returns true if
81 auth_password(Authctxt *authctxt, const char *password) argument
93 if (*password == '\0' && options.permit_empty_passwd == 0)
98 int ret = auth_krb5_password(authctxt, password);
106 HANDLE hToken = cygwin_logon_user(pw, password);
116 return (sshpam_auth_passwd(authctxt, password) && ok);
125 result = sys_auth_passwd(authctxt, password);
144 pwwarntime = login_getcaptime(lc, "password-warn", TWO_WEEKS,
153 "Your password wil
167 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
192 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/roken/
H A Dverify.c49 unix_verify_user(char *user, char *password) argument
56 if(strlen(pw->pw_passwd) == 0 && strlen(password) == 0)
58 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/examples/
H A Dieee8021x.conf11 password="password"
/freebsd-9.3-release/usr.sbin/bsdconfig/password/
H A DMakefile7 FILESDIR= ${LIBEXECDIR}/bsdconfig/040.password
11 SCRIPTS= password
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap_otp.c39 const u8 *pos, *password; local
51 password = eap_get_config_otp(sm, &password_len);
52 if (password)
55 password = eap_get_config_password(sm, &password_len);
59 if (password == NULL) {
76 wpabuf_put_data(resp, password, password_len);
78 password, password_len);
81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
H A Dmschapv2.c43 const u8 *password, size_t password_len,
70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
71 password, password_len);
74 password, nt_response);
76 password, peer_challenge, auth_challenge,
79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
80 password, password_len);
83 password, password_len, nt_response);
84 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_has
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dlock.c44 struct _hx509_password password; member in struct:hx509_lock_data
88 hx509_lock_add_password(hx509_lock lock, const char *password) argument
93 s = strdup(password);
97 d = realloc(lock->password.val,
98 (lock->password.len + 1) * sizeof(lock->password.val[0]));
103 lock->password.val = d;
104 lock->password.val[lock->password.len] = s;
105 lock->password
[all...]
/freebsd-9.3-release/usr.sbin/bsdconfig/password/include/
H A DMakefile5 FILESDIR= ${LIBEXECDIR}/bsdconfig/040.password/include
/freebsd-9.3-release/crypto/heimdal/lib/krb5/
H A Dget_in_tkt_pw.c46 const char *password = (const char *)keyseed; local
54 if (password == NULL) {
60 password = buf;
62 ret = krb5_string_to_key_salt (context, type, password, salt, *key);
73 const char *password,
84 password,
68 krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *pre_auth_types, const char *password, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep *ret_as_reply) argument
/freebsd-9.3-release/contrib/cvs/src/
H A Dlogin.c48 /* Construct absolute pathname to user's password file. */
58 right thing for a GUI is to just store the password in
86 * from a ~/.cvsroot password file and return a pointer to the password if the
97 * char *password as a pointer into linebuf
110 char *password = NULL; local
144 error (0, 0, "warning: skipping invalid entry in password file at line %d",
151 password = p + 1;
158 error (0, errno, "warning: unable to convert version number in password file at line %d",
165 error (0, 0, "warning: skipping entry with invalid version string in password fil
290 char *password = NULL; local
583 free_cvs_password(char *password) argument
[all...]
/freebsd-9.3-release/crypto/openssh/openbsd-compat/
H A Dxcrypt.c66 xcrypt(const char *password, const char *salt) argument
72 crypted = md5_crypt(password, salt);
74 crypted = crypt(password, salt);
77 crypted = bigcrypt(password, salt);
79 crypted = crypt(password, salt);
81 crypted = bigcrypt(password, salt);
83 crypted = crypt(password, salt);
90 * Handle shadowed password systems in a cleaner way for portable
H A Dport-uw.c53 sys_auth_passwd(Authctxt *authctxt, const char *password) argument
59 /* Just use the supplied fake password if authctxt is invalid */
62 /* Check for users with no password. */
63 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0)
66 /* Encrypt the candidate password using the proper salt. */
75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
80 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
108 * fgetpwent() only reads from password file, so we know for certain
/freebsd-9.3-release/crypto/heimdal/kadmin/
H A Dcpw.c42 char *password; member in struct:cpw_entry_data
76 printf ("%s's password set to \"%s\"\n", princ_name, pw);
84 set_password (krb5_principal principal, char *password) argument
89 if(password == NULL) {
101 password = pwbuf;
104 ret = kadm5_chpass_principal(kadm_handle, principal, password);
131 return set_password (principal, e->password);
145 data.password = opt->password_string;
153 if (data.password)
160 "--random-key, --random-password,
[all...]

Completed in 231 milliseconds

12345678