Searched refs:password (Results 1 - 25 of 77) sorted by relevance

1234

/openbsd-current/libexec/login_radius/
H A Dlogin_radius.h21 char *password, char **emsg);
H A Dlogin_radius.c90 char *class, *service, *style, *username, *password, *emsg; local
99 password = class = service = NULL;
172 password = challenge + c + 1;
183 strcmp(service, "login") ? challenge : NULL, password, &emsg);
/openbsd-current/usr.bin/ssh/
H A Dauth2-passwd.c53 char *password = NULL; local
59 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 ||
62 freezero(password, len);
67 logit("password change not supported");
68 else if (mm_auth_password(ssh, password) == 1)
70 freezero(password, len);
H A Dauth-passwd.c7 * the password is valid for the user.
70 * Tries to authenticate the user using password. Returns true if
74 auth_password(struct ssh *ssh, const char *password) argument
80 if (strlen(password) > MAX_PASSWORD_LEN)
85 if (*password == '\0' && options.permit_empty_passwd == 0)
89 int ret = auth_krb5_password(authctxt, password);
95 return (sys_auth_passwd(ssh, password) && ok);
109 pwwarntime = login_getcaptime(lc, "password-warn", TWO_WEEKS,
117 "Your password will expire in %lld day%s.\n",
131 sys_auth_passwd(struct ssh *ssh, const char *password) argument
[all...]
H A Dauth-krb5.c67 auth_krb5_password(Authctxt *authctxt, const char *password) argument
97 ccache, password, 1, NULL);
129 debug("Kerberos password authentication failed: %s",
133 debug("Kerberos password authentication failed: %d",
/openbsd-current/regress/usr.sbin/bgpd/integrationtests/
H A Dbgpd.md5.rdomain1.conf8 tcp md5sig password password1
/openbsd-current/gnu/usr.bin/perl/cpan/CPAN/lib/CPAN/HTTP/
H A DCredentials.pm37 (Note: to permanently configure username and password run
53 $PASSWORD = $CPAN::Config->{password} || "";
57 (Note: to permanently configure username and password run
59 o conf password your_password
69 my ($username,$password);
78 "Warning: Term::ReadKey seems not to be available, your password will be echoed to the terminal!\n"
81 $password = prompt("Password:");
87 return ($username,$password);
/openbsd-current/gnu/usr.bin/cvs/src/
H A Dlogin.c52 /* Construct absolute pathname to user's password file. */
62 right thing for a GUI is to just store the password in
100 * from a ~/.cvsroot password file and return a pointer to the password if the
111 * char *password as a pointer into linebuf
124 char *password = NULL; local
158 error (0, 0, "warning: skipping invalid entry in password file at line %d",
165 password = p + 1;
172 error (0, errno, "warning: unable to convert version number in password file at line %d",
179 error (0, 0, "warning: skipping entry with invalid version string in password fil
302 char *password = NULL; local
[all...]
/openbsd-current/libexec/login_ldap/
H A Dlogin_ldap.c68 char *class, *service, *username, *password; local
72 password = class = NULL;
136 password = getpass("Password: ");
145 * challenge can be NULL (so can password too
157 password = backbuf + 1;
158 /* skip the first string to get the password */
159 else if ((password = strchr(backbuf, '\0')) != NULL)
160 password++;
169 if (password == NULL || password[
[all...]
/openbsd-current/gnu/usr.bin/perl/cpan/libnet/t/
H A Dnetrc.t86 login nigol "password" drowssap
88 password p2
90 default login "baz" password p2
91 default "login" baz password p3
102 # on 'foo' with login 'l2', the password is 'p2'
103 is( Net::Netrc->lookup('foo', 'l2')->{password}, 'p2',
106 # the default password is 'p3', as later declarations have priority
107 is( Net::Netrc->lookup()->{password}, 'p3',
111 is( Net::Netrc->lookup('default', 'baz')->{password}, 'p3',
120 for my $accessor (qw( login account password )) {
[all...]
/openbsd-current/etc/examples/
H A Dldpd.conf26 password "secret"
H A Dlogin_ldap.conf7 bindpw=password
/openbsd-current/sbin/atactl/
H A Datasec.h41 /* security password sector */
50 u_int8_t password[32]; /* Password */ member in struct:sec_password
51 u_int16_t revision; /* Master password revision code */
/openbsd-current/usr.sbin/radiusctl/
H A Dparser.h51 const char *password; member in struct:parse_result
H A Dradiusctl.c164 if (res->password != NULL)
165 radius_put_user_password_attr(reqpkt, res->password,
177 if (res->password != NULL)
178 MD5Update(&md5ctx, res->password,
179 strlen(res->password));
200 if (res->password == NULL) {
203 lpass = strlen(res->password);
205 err(1, "password too long");
207 pass[i * 2] = res->password[i];
265 if (res->password)
[all...]
/openbsd-current/regress/lib/libutil/bcrypt_pbkdf/
H A Dbcrypt_pbkdf_test.c27 const char *password; member in struct:test
36 { 4, 8, "password", 4, "salt", 32,
40 { 4, 8, "password", 1, "", 16,
46 /* nul bytes in password and string */
47 { 4, 9, "password", 5, "salt", 32,
58 { 8, 8, "password", 4, "salt", 64,
65 { 42, 8, "password", 4, "salt", 16,
68 /* longer password */
127 char *password = "password"; local
[all...]
/openbsd-current/usr.bin/passwd/
H A Dpwd_check.c67 "Please don't use an all-lower case password."
72 "Please use a more complicated password."
77 "Please use a more complicated password."
82 "Please use a more complicated password."
87 pwd_check(login_cap_t *lc, char *password) argument
99 if (min_len > 0 && strlen(password) < min_len) {
100 fprintf(stderr, "Please enter a longer password.\n");
104 /* External password check program */
113 /* Check password in low-privileged child */
148 ret = regexec(&rgx, password,
[all...]
/openbsd-current/usr.sbin/ldapd/
H A Dauth.c179 const char *password)
187 if (strlcpy(auth_req.password, password,
188 sizeof(auth_req.password)) >= sizeof(auth_req.password))
206 * Check password. Returns 1 if password matches, 2 if password matching
258 char *authzid, *authcid, *password; local
278 password
178 send_auth_request(struct request *req, const char *username, const char *password) argument
301 char *password; local
[all...]
H A Dldapd.c305 ldapd_auth_classful(char *name, char *password) argument
313 return auth_userokay(name, NULL, "auth-ldap", password);
326 if (password) {
333 auth_setdata(as, password, strlen(password) + 1);
334 explicit_bzero(password, strlen(password));
352 /* make sure name and password are null-terminated */
354 areq->password[sizeof(areq->password)
[all...]
/openbsd-current/gnu/usr.bin/perl/cpan/libnet/lib/Net/
H A DNetrc.pm118 elsif ($tok =~ /^(login|password|account)$/) {
186 sub password { subroutine
189 exists $me->{password}
190 ? $me->{password}
197 ($me->login, $me->password, $me->account);
214 ($login, $password, $account) = $mach->lpa;
249 default login anonymous password user@site
260 =item password string
262 Supply a password. If this token is present, the auto-login
264 requires a password a
[all...]
/openbsd-current/libexec/login_yubikey/
H A Dlogin_yubikey.c69 char *username, *password = NULL; local
128 if ((password = readpassphrase("Password:", pbuf, sizeof(pbuf),
150 password = response + count + 1;
160 ret = yubikey_login(username, password);
161 explicit_bzero(password, strlen(password));
185 yubikey_login(const char *username, const char *password) argument
241 r = yubikey_parse((uint8_t *)password, (uint8_t *)key, &tok, i++);
244 syslog(LOG_INFO, "user %s failed: password too short.",
269 syslog(LOG_INFO, "user %s: could not decode password "
[all...]
/openbsd-current/usr.sbin/npppd/npppd/
H A Dpap.c72 #define DEFAULT_FAILURE_MESSAGE "Unknown username or password"
155 char name[MAX_USERNAME_LENGTH], password[MAX_PASSWORD_LENGTH]; local
219 /* retribute the password */
226 memcpy(password, pktp1, len);
228 password[len] = '\0';
229 pap_authenticate(_this, password);
238 pap_authenticate(pap *_this, const char *password) argument
250 pap_radius_authenticate(_this, _this->name, password);
256 pap_local_authenticate(_this, _this->name, password);
330 pap_local_authenticate(pap *_this, const char *username, const char *password) argument
384 pap_radius_authenticate(pap *_this, const char *username, const char *password) argument
[all...]
H A Dnpppd_auth.h53 /** password */
54 char *password; member in struct:_npppd_auth_user
/openbsd-current/gnu/llvm/lldb/source/Host/posix/
H A DHostInfoPosix.cpp93 if (std::optional<PasswdEntry> password = GetPassword(uid))
94 return password->username;
137 if (std::optional<PasswdEntry> password = GetPassword(::geteuid()))
138 return FileSpec(password->shell);
/openbsd-current/lib/libtls/
H A Dtls_util.c151 tls_load_file(const char *name, size_t *len, char *password) argument
169 if (password == NULL) {
189 key = PEM_read_PrivateKey(fp, NULL, tls_password_cb, password);

Completed in 410 milliseconds

1234