/freebsd-13-stable/usr.sbin/bsdconfig/password/share/ |
H A D | Makefile | 3 FILESDIR= ${SHAREDIR}/bsdconfig/password 4 FILES= password.subr
|
/freebsd-13-stable/usr.sbin/bhyve/ |
H A D | rfb.h | 36 int rfb_init(char *hostname, int port, int wait, char *password);
|
/freebsd-13-stable/crypto/heimdal/lib/kadm5/ |
H A D | sample_passwd_check.c | 45 /* just check the length of the password, this is what the default 51 krb5_data *password) 57 if(password->length < min_length) 64 /* use cracklib to check password quality; this requires a patch for 71 krb5_data *password) 73 char *s = malloc(password->length + 1); 80 memcpy(s, password->data, password->length); 81 s[password->length] = '\0'; 83 memset(s, 0, password 49 check_length(krb5_context context, krb5_principal prinipal, krb5_data *password) argument 69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument [all...] |
H A D | test_pw_quality.c | 42 static char *password; variable 46 { "password", 0, arg_string, &password }, 72 if (password == NULL) 73 krb5_errx(context, 1, "no password given"); 79 pw_data.data = password; 80 pw_data.length = strlen(password);
|
H A D | client_glue.c | 40 const char *password, 48 password, 59 const char *password, 68 password, 39 kadm5_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 57 kadm5_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
|
H A D | kadm5-pwcheck.h | 49 * function, the lib/caller will providing it for the password quality 56 krb5_data *password,
|
H A D | server_glue.c | 40 const char *password, 48 password, 59 const char *password, 68 password, 39 kadm5_init_with_password(const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 57 kadm5_init_with_password_ctx(krb5_context context, const char *client_name, const char *password, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
|
/freebsd-13-stable/usr.sbin/bsdconfig/password/ |
H A D | Makefile | 5 FILESDIR= ${LIBEXECDIR}/bsdconfig/040.password 9 SCRIPTS= password
|
H A D | password | 36 f_include $BSDCFG_SHARE/password/password.subr 38 BSDCFG_LIBE="/usr/libexec/bsdconfig" APP_DIR="040.password" 73 # Prompt the user to input a new password (and change it if they don't cancel)
|
/freebsd-13-stable/contrib/wpa/hostapd/ |
H A D | nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/freebsd-13-stable/crypto/heimdal/lib/roken/ |
H A D | verify.c | 46 unix_verify_user(char *user, char *password) argument 53 if(strlen(pw->pw_passwd) == 0 && strlen(password) == 0) 55 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
|
/freebsd-13-stable/usr.sbin/bsdconfig/password/include/ |
H A D | Makefile | 3 FILESDIR= ${LIBEXECDIR}/bsdconfig/040.password/include
|
/freebsd-13-stable/contrib/wpa/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 11 password="password"
|
/freebsd-13-stable/crypto/openssh/ |
H A D | auth2-passwd.c | 52 char *password; local 58 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 || 64 logit("password change not supported"); 65 else if (PRIVSEP(auth_password(ssh, password)) == 1) 67 explicit_bzero(password, len); 68 free(password); 73 "password",
|
H A D | auth-passwd.c | 7 * the password is valid for the user. 73 * Tries to authenticate the user using password. Returns true if 77 auth_password(struct ssh *ssh, const char *password) argument 86 if (strlen(password) > MAX_PASSWORD_LEN) 93 if (*password == '\0' && options.permit_empty_passwd == 0) 98 int ret = auth_krb5_password(authctxt, password); 106 HANDLE hToken = cygwin_logon_user(pw, password); 116 return (sshpam_auth_passwd(authctxt, password) && ok); 125 result = sys_auth_passwd(ssh, password); 144 pwwarntime = login_getcaptime(lc, "password 167 sys_auth_passwd(struct ssh *ssh, const char *password) argument 192 sys_auth_passwd(struct ssh *ssh, const char *password) argument [all...] |
/freebsd-13-stable/contrib/apr/passwd/ |
H A D | apr_getpass.c | 17 /* apr_password_get.c: abstraction to provide for obtaining a password from the 96 static char password[MAX_STRING_LEN]; local 99 fgets((char *) &password, sizeof(password), stdin); 101 return (char *) &password; 119 static char password[128]; 135 password[--n] = '\0'; 143 password[--n] = '\0'; 160 else if ((n < sizeof(password) - 1) && !apr_iscntrl(ch)) { 161 password[ 180 static char password[MAX_STRING_LEN]; local [all...] |
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 65 password, password_len); 68 password, nt_response) || 70 password, peer_challenge, auth_challenge, 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_has 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument [all...] |
/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | salt-des.c | 40 /* This defines the Andrew string_to_key function. It accepts a password 43 * service password database. 54 char password[8+1]; /* crypt is limited to 8 chars anyway */ local 61 password[i] = c ? c : 'X'; 63 password[8] = '\0'; 65 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock)); 86 char password[512]; local 89 memcpy(password, pw.data, min(pw.length, sizeof(password))); 90 if(pw.length < sizeof(password)) { 118 DES_AFS3_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument 171 krb5_DES_string_to_key(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_salt salt, krb5_data opaque, krb5_keyblock *key) argument [all...] |
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | lock.c | 43 struct _hx509_password password; member in struct:hx509_lock_data 87 hx509_lock_add_password(hx509_lock lock, const char *password) argument 92 s = strdup(password); 96 d = realloc(lock->password.val, 97 (lock->password.len + 1) * sizeof(lock->password.val[0])); 102 lock->password.val = d; 103 lock->password.val[lock->password.len] = s; 104 lock->password [all...] |
/freebsd-13-stable/crypto/openssh/openbsd-compat/ |
H A D | port-uw.c | 53 sys_auth_passwd(struct ssh *ssh, const char *password) argument 60 /* Just use the supplied fake password if authctxt is invalid */ 66 /* Check for users with no password. */ 67 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0) 70 /* Encrypt the candidate password using the proper salt. */ 79 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0) 80 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0)); 84 result = (strcmp(xcrypt(password, salt), pw_password) == 0); 112 * fgetpwent() only reads from password file, so we know for certain
|
H A D | xcrypt.c | 67 * Pick an appropriate password encryption type and salt for the running 100 xcrypt(const char *password, const char *salt) argument 105 * If we don't have a salt we are encrypting a fake password for 113 crypted = md5_crypt(password, salt); 115 crypted = crypt(password, salt); 118 crypted = bigcrypt(password, salt); 120 crypted = crypt(password, salt); 122 crypted = bigcrypt(password, salt); 124 crypted = crypt(password, salt); 131 * Handle shadowed password system [all...] |
/freebsd-13-stable/crypto/heimdal/kadmin/ |
H A D | cpw.c | 40 char *password; member in struct:cpw_entry_data 74 printf ("%s's password set to \"%s\"\n", princ_name, pw); 82 set_password (krb5_principal principal, char *password) argument 87 if(password == NULL) { 99 password = pwbuf; 102 ret = kadm5_chpass_principal(kadm_handle, principal, password); 129 return set_password (principal, e->password); 143 data.password = opt->password_string; 151 if (data.password) 158 "--random-key, --random-password, [all...] |
/freebsd-13-stable/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pam/ |
H A D | utilities.kshlib | 32 for i in password auth session; do
|
/freebsd-13-stable/crypto/openssh/contrib/aix/ |
H A D | pam.conf | 15 sshd password required /usr/lib/security/pam_aix 16 OTHER password required /usr/lib/security/pam_aix
|