Searched refs:password (Results 1 - 25 of 215) sorted by relevance

123456789

/freebsd-current/usr.sbin/bsdconfig/password/share/
H A DMakefile2 FILESDIR= ${SHAREDIR}/bsdconfig/password
3 FILES= password.subr
/freebsd-current/usr.sbin/bhyve/
H A Drfb.h35 const char *password);
/freebsd-current/crypto/heimdal/lib/kadm5/
H A Dsample_passwd_check.c45 /* just check the length of the password, this is what the default
51 krb5_data *password)
57 if(password->length < min_length)
64 /* use cracklib to check password quality; this requires a patch for
71 krb5_data *password)
73 char *s = malloc(password->length + 1);
80 memcpy(s, password->data, password->length);
81 s[password->length] = '\0';
83 memset(s, 0, password
49 check_length(krb5_context context, krb5_principal prinipal, krb5_data *password) argument
69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument
[all...]
H A Dtest_pw_quality.c42 static char *password; variable
46 { "password", 0, arg_string, &password },
72 if (password == NULL)
73 krb5_errx(context, 1, "no password given");
79 pw_data.data = password;
80 pw_data.length = strlen(password);
H A Dkadm5-pwcheck.h49 * function, the lib/caller will providing it for the password quality
56 krb5_data *password,
H A Dserver_glue.c40 const char *password,
48 password,
59 const char *password,
68 password,
39 kadm5_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
57 kadm5_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
H A Dclient_glue.c40 const char *password,
48 password,
59 const char *password,
68 password,
39 kadm5_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
57 kadm5_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
/freebsd-current/usr.sbin/bsdconfig/password/
H A DMakefile4 FILESDIR= ${LIBEXECDIR}/bsdconfig/040.password
8 SCRIPTS= password
H A Dpassword35 f_include $BSDCFG_SHARE/password/password.subr
37 BSDCFG_LIBE="/usr/libexec/bsdconfig" APP_DIR="040.password"
72 # Prompt the user to input a new password (and change it if they don't cancel)
/freebsd-current/contrib/wpa/hostapd/
H A Dnt_password_hash.c2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
/freebsd-current/crypto/heimdal/lib/roken/
H A Dverify.c46 unix_verify_user(char *user, char *password) argument
53 if(strlen(pw->pw_passwd) == 0 && strlen(password) == 0)
55 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
/freebsd-current/usr.sbin/bsdconfig/password/include/
H A DMakefile2 FILESDIR= ${LIBEXECDIR}/bsdconfig/040.password/include
/freebsd-current/contrib/wpa/wpa_supplicant/examples/
H A Dieee8021x.conf11 password="password"
/freebsd-current/crypto/openssh/
H A Dauth2-passwd.c54 char *password = NULL; local
60 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 ||
63 freezero(password, len);
68 logit("password change not supported");
69 else if (PRIVSEP(auth_password(ssh, password)) == 1)
71 freezero(password, len);
76 "password",
H A Dauth-passwd.c7 * the password is valid for the user.
73 * Tries to authenticate the user using password. Returns true if
77 auth_password(struct ssh *ssh, const char *password) argument
86 if (strlen(password) > MAX_PASSWORD_LEN)
93 if (*password == '\0' && options.permit_empty_passwd == 0)
98 int ret = auth_krb5_password(authctxt, password);
106 HANDLE hToken = cygwin_logon_user(pw, password);
116 return (sshpam_auth_passwd(authctxt, password) && ok);
125 result = sys_auth_passwd(ssh, password);
144 pwwarntime = login_getcaptime(lc, "password
167 sys_auth_passwd(struct ssh *ssh, const char *password) argument
192 sys_auth_passwd(struct ssh *ssh, const char *password) argument
[all...]
/freebsd-current/contrib/wpa/src/eap_peer/
H A Deap_otp.c33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
H A Dmschapv2.c37 const u8 *password, size_t password_len,
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65 password, password_len);
68 password, nt_response) ||
70 password, peer_challenge, auth_challenge,
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_has
36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/freebsd-current/crypto/heimdal/lib/krb5/
H A Dsalt-des.c40 /* This defines the Andrew string_to_key function. It accepts a password
43 * service password database.
54 char password[8+1]; /* crypt is limited to 8 chars anyway */ local
61 password[i] = c ? c : 'X';
63 password[8] = '\0';
65 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock));
86 char password[512]; local
89 memcpy(password, pw.data, min(pw.length, sizeof(password)));
90 if(pw.length < sizeof(password)) {
118 DES_AFS3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
171 krb5_DES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument
[all...]
/freebsd-current/crypto/heimdal/lib/hx509/
H A Dlock.c43 struct _hx509_password password; member in struct:hx509_lock_data
87 hx509_lock_add_password(hx509_lock lock, const char *password) argument
92 s = strdup(password);
96 d = realloc(lock->password.val,
97 (lock->password.len + 1) * sizeof(lock->password.val[0]));
102 lock->password.val = d;
103 lock->password.val[lock->password.len] = s;
104 lock->password
[all...]
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pam/
H A Dutilities.kshlib.in37 password password "$pammodule" "$1" \
/freebsd-current/crypto/openssh/openbsd-compat/
H A Dport-uw.c53 sys_auth_passwd(struct ssh *ssh, const char *password) argument
60 /* Just use the supplied fake password if authctxt is invalid */
66 /* Check for users with no password. */
67 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0)
70 /* Encrypt the candidate password using the proper salt. */
79 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
80 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
84 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
112 * fgetpwent() only reads from password file, so we know for certain
/freebsd-current/crypto/heimdal/kadmin/
H A Dcpw.c40 char *password; member in struct:cpw_entry_data
74 printf ("%s's password set to \"%s\"\n", princ_name, pw);
82 set_password (krb5_principal principal, char *password) argument
87 if(password == NULL) {
99 password = pwbuf;
102 ret = kadm5_chpass_principal(kadm_handle, principal, password);
129 return set_password (principal, e->password);
143 data.password = opt->password_string;
151 if (data.password)
158 "--random-key, --random-password,
[all...]
/freebsd-current/crypto/openssl/test/recipes/
H A D20-test_passwd.t67 key => 'we have a short salt string but not a short password',
75 key => 'we have a short salt string but not a short password',
86 ok(compare1stline_re([qw{openssl passwd -1 password}], '^\$1\$.{8}\$.{22}\R$'),
87 'BSD style MD5 password with random salt');
88 ok(compare1stline_re([qw{openssl passwd -apr1 password}], '^\$apr1\$.{8}\$.{22}\R$'),
89 'Apache style MD5 password with random salt');
90 ok(compare1stline_re([qw{openssl passwd -5 password}], '^\$5\$.{16}\$.{43}\R$'),
91 'SHA256 password with random salt');
92 ok(compare1stline_re([qw{openssl passwd -6 password}], '^\$6\$.{16}\$.{86}\R$'),
93 'Apache SHA512 password wit
[all...]
/freebsd-current/crypto/openssh/contrib/aix/
H A Dpam.conf15 sshd password required /usr/lib/security/pam_aix
16 OTHER password required /usr/lib/security/pam_aix
/freebsd-current/crypto/openssl/apps/include/
H A Dapps_ui.h16 const void *password; member in struct:pw_cb_data

Completed in 184 milliseconds

123456789