| /freebsd/contrib/pam_modules/pam_passwdqc/ |
| H A D | README | 3 to checking regular passwords, it offers support for passphrases and 4 can provide randomly generated passwords. All features are optional 24 of passwords/passphrases. The special word "disabled" can be used to 25 disallow passwords of a given kind regardless of their length. Each 28 N0 is used for passwords consisting of characters from one character 34 N1 is used for passwords consisting of characters from two character 40 N3 and N4 are used for passwords consisting of characters from three 47 In addition to being sufficiently long, passwords are required to 54 users from setting passwords which may be too long for some system 57 The value 8 is treated specially. Passwords longer than 8 characters [all …]
|
| H A D | passwdqc_check.c | 43 * with the _requested_ minimum length (so longer passwords don't have 246 * passwords (if short passwords are allowed) that are word-based, but 249 * to generate random passwords. This list is much smaller than those 250 * used for password crackers, and it doesn't contain common passwords
|
| /freebsd/lib/libpam/modules/pam_passwdqc/ |
| H A D | pam_passwdqc.8 | 52 In addition to checking regular passwords, it offers support for 53 passphrases and can provide randomly generated passwords. 83 passwords/passphrases. 87 disallow passwords of a given kind regardless of their length. 92 is used for passwords consisting of characters from one character 102 is used for passwords consisting of characters from two character 114 are used for passwords consisting of characters from three 121 In addition to being sufficiently long, passwords are required to 127 This can be used to prevent users from setting passwords which may be 131 is set to 8, passwords longer than 8 characters will not be rejected, [all …]
|
| /freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/ |
| H A D | Passwords.htm | 12 <Title>Passwords</Title> 15 <H1>About Passwords</H1> 24 <li><a href=#choose> Choosing passwords </a></li> 25 <li><a href=#maintain> Maintaining passwords</a></li> 32 <li><a href="HTML/Forget_Password.htm"> Forgotten passwords</a></li> 45 <H2><a name="choose">Choosing Passwords </a></H2> 51 <H2><a name="maintain">Maintaining Passwords</a></H2>
|
| /freebsd/crypto/heimdal/lib/wind/ |
| H A D | rfc4013.txt | 12 SASLprep: Stringprep Profile for User Names and Passwords 29 user names and passwords for comparison. The document defines the 31 user names and passwords. This profile is intended to be used by 34 exchanging simple user names and/or passwords. 38 The use of simple user names and passwords in authentication and 43 passwords for comparison. For simplicity and implementation ease, a 44 single algorithm is defined for both user names and passwords. 63 passwords are used. This profile is not intended for use in 79 preparing strings representing simple user names and passwords. 195 Unicode strings, the number of usable names and passwords is greater [all …]
|
| /freebsd/share/man/man5/ |
| H A D | passwd.5 | 165 Because this file contains the encrypted user passwords, it should 176 The field only contains encrypted passwords, and 389 password file, with passwords removed 392 password database, with passwords removed 395 password file, with passwords intact 398 password database, with passwords intact
|
| /freebsd/crypto/krb5/src/lib/kadm5/ |
| H A D | chpass_util_strings.et | 8 "New passwords do not match - password not changed.\n" 12 error_code CHPASS_UTIL_NO_PASSWORD_READ, "You must type a password. Passwords must be at least one … 19 "New password was found in a dictionary of possible passwords and\n\
|
| H A D | server_internal.h | 192 /* The dict module checks passwords against the realm's dictionary. */ 197 /* The empty module rejects empty passwords (even with no password policy). */ 202 /* The hesiod module checks passwords against GECOS fields from Hesiod passwd 208 /* The princ module checks passwords against principal components. */
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-passphrase-options.pod | 17 and B<-passout> for input and output passwords respectively. These allow 61 B<file:> applies to passwords read from file descriptors. 68 B<file:> applies to passwords read from standard input.
|
| H A D | openssl-passwd.pod.in | 69 Read passwords from I<file>. 73 Read passwords from B<stdin>. 81 Don't output warnings when passwords given at the command line are truncated.
|
| /freebsd/lib/libpam/modules/pam_krb5/ |
| H A D | pam-krb5.8 | 99 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512 100 octets) will be rejected, since excessively long passwords can be used as 178 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512 179 octets) will be rejected, since excessively long passwords can be used as 186 change passwords in Kerberos without knowing the old password, use 396 weaker user passwords. This option uses anonymous authentication to 508 [3.9] When changing passwords, PAM first does a preliminary check through 515 modules to synchronize passwords between multiple systems when they 532 pam_cracklib if used) when synchronizing passwords between multiple 551 expired passwords. Instead, \fBpam_authenticate()\fR should return success [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | sshd_config | 60 # Note that passwords may also be accepted via KbdInteractiveAuthentication. 65 # the system's configuration, this may involve passwords, challenge-response, 66 # one-time passwords or some combination of these and other methods.
|
| H A D | README.platform | 8 have accounts which have passwords expired longer than the inactive time 12 Accounts in this state must have their passwords reset manually by the 14 passwords be reset before upgrading from OpenSSH <3.8.
|
| H A D | scp.1 | 44 will ask for passwords or passphrases if they are needed for 86 cannot ask for passwords or passphrases for both hosts. 102 Selects batch mode (prevents asking for passwords or passphrases).
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | PKCS12_newpass.pod | 24 In particular, this means that passwords in the locale character set 26 use. This may include passwords from local text files, or input from 96 Unicode form internally. As a result some passwords cannot be supplied to
|
| /freebsd/contrib/pam-krb5/docs/ |
| H A D | pam_krb5.pod | 49 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512 50 octets) will be rejected, since excessively long passwords can be used as 131 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512 132 octets) will be rejected, since excessively long passwords can be used as 139 change passwords in Kerberos without knowing the old password, use 360 weaker user passwords. This option uses anonymous authentication to 484 [3.9] When changing passwords, PAM first does a preliminary check through 491 modules to synchronize passwords between multiple systems when they 508 pam_cracklib if used) when synchronizing passwords between multiple 529 expired passwords. Instead, pam_authenticate() should return success [all …]
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-passphrase-options.1 | 74 and \fB\-passout\fR for input and output passwords respectively. These allow 111 \&\fBfile:\fR applies to passwords read from file descriptors. 117 \&\fBfile:\fR applies to passwords read from standard input.
|
| H A D | openssl-passwd.1 | 122 Read passwords from \fIfile\fR. 125 Read passwords from \fBstdin\fR. 131 Don't output warnings when passwords given at the command line are truncated.
|
| /freebsd/contrib/smbfs/ |
| H A D | config.mk.in | 19 # Comment this to disable support for encrypted passwords (requires 21 # passwords.
|
| /freebsd/crypto/krb5/src/windows/leash/htmlhelp/ |
| H A D | TOC.hhc | 96 <param name="Name" value="Passwords"> 97 <param name="Local" value="Html\Passwords.htm"> 101 <param name="Name" value="About Passwords"> 102 <param name="Local" value="Html\Passwords.htm">
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | PKCS12_newpass.3 | 83 In particular, this means that passwords in the locale character set 85 use. This may include passwords from local text files, or input from 153 Unicode form internally. As a result some passwords cannot be supplied to
|
| /freebsd/contrib/pam-krb5/ |
| H A D | NEWS | 51 Reject passwords as long or longer than PAM_MAX_RESP_SIZE (normally 52 512 octets), since extremely long passwords can be used for a denial 58 lifetime of passwords and other secrets in memory. 414 expired passwords and treats expired passwords the same as incorrect 415 passwords. 672 Add a new option to attempt change of expired passwords during 753 primarily when using the PAM stack to synchronize passwords between 772 users with expired passwords were not being prompted to change their 953 informative prompts when changing passwords. 1006 passwords. Thanks, Arne Nordmark. [all …]
|
| /freebsd/crypto/heimdal/kadmin/ |
| H A D | random_password.c | 39 should think about how secure generated passwords has to be. 45 /* If you want OTP-style passwords, define OTP_STYLE */ 96 passwords are (given that the character classes are disjoint):
|
| /freebsd/crypto/heimdal/kpasswd/ |
| H A D | kpasswd.1 | 50 is the client for changing passwords. 55 Multiple passwords for different users can be changed at the same time,
|
| /freebsd/stand/lua/ |
| H A D | password.lua.8 | 35 contains functionality for prompting for and checking passwords. 59 and prompt the user for passwords as-needed.
|