/openbsd-current/libexec/login_radius/ |
H A D | login_radius.h | 21 char *password, char **emsg);
|
H A D | login_radius.c | 90 char *class, *service, *style, *username, *password, *emsg; local 99 password = class = service = NULL; 172 password = challenge + c + 1; 183 strcmp(service, "login") ? challenge : NULL, password, &emsg);
|
/openbsd-current/usr.bin/ssh/ |
H A D | auth2-passwd.c | 53 char *password = NULL; local 59 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 || 62 freezero(password, len); 67 logit("password change not supported"); 68 else if (mm_auth_password(ssh, password) == 1) 70 freezero(password, len);
|
H A D | auth-passwd.c | 7 * the password is valid for the user. 70 * Tries to authenticate the user using password. Returns true if 74 auth_password(struct ssh *ssh, const char *password) argument 80 if (strlen(password) > MAX_PASSWORD_LEN) 85 if (*password == '\0' && options.permit_empty_passwd == 0) 89 int ret = auth_krb5_password(authctxt, password); 95 return (sys_auth_passwd(ssh, password) && ok); 109 pwwarntime = login_getcaptime(lc, "password-warn", TWO_WEEKS, 117 "Your password will expire in %lld day%s.\n", 131 sys_auth_passwd(struct ssh *ssh, const char *password) argument [all...] |
H A D | auth-krb5.c | 67 auth_krb5_password(Authctxt *authctxt, const char *password) argument 97 ccache, password, 1, NULL); 129 debug("Kerberos password authentication failed: %s", 133 debug("Kerberos password authentication failed: %d",
|
/openbsd-current/regress/usr.sbin/bgpd/integrationtests/ |
H A D | bgpd.md5.rdomain1.conf | 8 tcp md5sig password password1
|
/openbsd-current/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/ |
H A D | Credentials.pm | 37 (Note: to permanently configure username and password run 53 $PASSWORD = $CPAN::Config->{password} || ""; 57 (Note: to permanently configure username and password run 59 o conf password your_password 69 my ($username,$password); 78 "Warning: Term::ReadKey seems not to be available, your password will be echoed to the terminal!\n" 81 $password = prompt("Password:"); 87 return ($username,$password);
|
/openbsd-current/gnu/usr.bin/cvs/src/ |
H A D | login.c | 52 /* Construct absolute pathname to user's password file. */ 62 right thing for a GUI is to just store the password in 100 * from a ~/.cvsroot password file and return a pointer to the password if the 111 * char *password as a pointer into linebuf 124 char *password = NULL; local 158 error (0, 0, "warning: skipping invalid entry in password file at line %d", 165 password = p + 1; 172 error (0, errno, "warning: unable to convert version number in password file at line %d", 179 error (0, 0, "warning: skipping entry with invalid version string in password fil 302 char *password = NULL; local [all...] |
/openbsd-current/libexec/login_ldap/ |
H A D | login_ldap.c | 68 char *class, *service, *username, *password; local 72 password = class = NULL; 136 password = getpass("Password: "); 145 * challenge can be NULL (so can password too 157 password = backbuf + 1; 158 /* skip the first string to get the password */ 159 else if ((password = strchr(backbuf, '\0')) != NULL) 160 password++; 169 if (password == NULL || password[ [all...] |
/openbsd-current/gnu/usr.bin/perl/cpan/libnet/t/ |
H A D | netrc.t | 86 login nigol "password" drowssap 88 password p2 90 default login "baz" password p2 91 default "login" baz password p3 102 # on 'foo' with login 'l2', the password is 'p2' 103 is( Net::Netrc->lookup('foo', 'l2')->{password}, 'p2', 106 # the default password is 'p3', as later declarations have priority 107 is( Net::Netrc->lookup()->{password}, 'p3', 111 is( Net::Netrc->lookup('default', 'baz')->{password}, 'p3', 120 for my $accessor (qw( login account password )) { [all...] |
/openbsd-current/etc/examples/ |
H A D | ldpd.conf | 26 password "secret"
|
H A D | login_ldap.conf | 7 bindpw=password
|
/openbsd-current/sbin/atactl/ |
H A D | atasec.h | 41 /* security password sector */ 50 u_int8_t password[32]; /* Password */ member in struct:sec_password 51 u_int16_t revision; /* Master password revision code */
|
/openbsd-current/usr.sbin/radiusctl/ |
H A D | parser.h | 51 const char *password; member in struct:parse_result
|
H A D | radiusctl.c | 164 if (res->password != NULL) 165 radius_put_user_password_attr(reqpkt, res->password, 177 if (res->password != NULL) 178 MD5Update(&md5ctx, res->password, 179 strlen(res->password)); 200 if (res->password == NULL) { 203 lpass = strlen(res->password); 205 err(1, "password too long"); 207 pass[i * 2] = res->password[i]; 265 if (res->password) [all...] |
/openbsd-current/regress/lib/libutil/bcrypt_pbkdf/ |
H A D | bcrypt_pbkdf_test.c | 27 const char *password; member in struct:test 36 { 4, 8, "password", 4, "salt", 32, 40 { 4, 8, "password", 1, "", 16, 46 /* nul bytes in password and string */ 47 { 4, 9, "password", 5, "salt", 32, 58 { 8, 8, "password", 4, "salt", 64, 65 { 42, 8, "password", 4, "salt", 16, 68 /* longer password */ 127 char *password = "password"; local [all...] |
/openbsd-current/usr.bin/passwd/ |
H A D | pwd_check.c | 67 "Please don't use an all-lower case password." 72 "Please use a more complicated password." 77 "Please use a more complicated password." 82 "Please use a more complicated password." 87 pwd_check(login_cap_t *lc, char *password) argument 99 if (min_len > 0 && strlen(password) < min_len) { 100 fprintf(stderr, "Please enter a longer password.\n"); 104 /* External password check program */ 113 /* Check password in low-privileged child */ 148 ret = regexec(&rgx, password, [all...] |
/openbsd-current/usr.sbin/ldapd/ |
H A D | auth.c | 179 const char *password) 187 if (strlcpy(auth_req.password, password, 188 sizeof(auth_req.password)) >= sizeof(auth_req.password)) 206 * Check password. Returns 1 if password matches, 2 if password matching 258 char *authzid, *authcid, *password; local 278 password 178 send_auth_request(struct request *req, const char *username, const char *password) argument 301 char *password; local [all...] |
H A D | ldapd.c | 305 ldapd_auth_classful(char *name, char *password) argument 313 return auth_userokay(name, NULL, "auth-ldap", password); 326 if (password) { 333 auth_setdata(as, password, strlen(password) + 1); 334 explicit_bzero(password, strlen(password)); 352 /* make sure name and password are null-terminated */ 354 areq->password[sizeof(areq->password) [all...] |
/openbsd-current/gnu/usr.bin/perl/cpan/libnet/lib/Net/ |
H A D | Netrc.pm | 118 elsif ($tok =~ /^(login|password|account)$/) { 186 sub password { subroutine 189 exists $me->{password} 190 ? $me->{password} 197 ($me->login, $me->password, $me->account); 214 ($login, $password, $account) = $mach->lpa; 249 default login anonymous password user@site 260 =item password string 262 Supply a password. If this token is present, the auto-login 264 requires a password a [all...] |
/openbsd-current/libexec/login_yubikey/ |
H A D | login_yubikey.c | 69 char *username, *password = NULL; local 128 if ((password = readpassphrase("Password:", pbuf, sizeof(pbuf), 150 password = response + count + 1; 160 ret = yubikey_login(username, password); 161 explicit_bzero(password, strlen(password)); 185 yubikey_login(const char *username, const char *password) argument 241 r = yubikey_parse((uint8_t *)password, (uint8_t *)key, &tok, i++); 244 syslog(LOG_INFO, "user %s failed: password too short.", 269 syslog(LOG_INFO, "user %s: could not decode password " [all...] |
/openbsd-current/usr.sbin/npppd/npppd/ |
H A D | pap.c | 72 #define DEFAULT_FAILURE_MESSAGE "Unknown username or password" 155 char name[MAX_USERNAME_LENGTH], password[MAX_PASSWORD_LENGTH]; local 219 /* retribute the password */ 226 memcpy(password, pktp1, len); 228 password[len] = '\0'; 229 pap_authenticate(_this, password); 238 pap_authenticate(pap *_this, const char *password) argument 250 pap_radius_authenticate(_this, _this->name, password); 256 pap_local_authenticate(_this, _this->name, password); 330 pap_local_authenticate(pap *_this, const char *username, const char *password) argument 384 pap_radius_authenticate(pap *_this, const char *username, const char *password) argument [all...] |
H A D | npppd_auth.h | 53 /** password */ 54 char *password; member in struct:_npppd_auth_user
|
/openbsd-current/gnu/llvm/lldb/source/Host/posix/ |
H A D | HostInfoPosix.cpp | 93 if (std::optional<PasswdEntry> password = GetPassword(uid)) 94 return password->username; 137 if (std::optional<PasswdEntry> password = GetPassword(::geteuid())) 138 return FileSpec(password->shell);
|
/openbsd-current/lib/libtls/ |
H A D | tls_util.c | 151 tls_load_file(const char *name, size_t *len, char *password) argument 169 if (password == NULL) { 189 key = PEM_read_PrivateKey(fp, NULL, tls_password_cb, password);
|