Home
last modified time | relevance | path

Searched full:passwords (Results 1 – 25 of 306) sorted by relevance

12345678910>>...13

/freebsd/contrib/pam_modules/pam_passwdqc/
H A DREADME3 to checking regular passwords, it offers support for passphrases and
4 can provide randomly generated passwords. All features are optional
24 of passwords/passphrases. The special word "disabled" can be used to
25 disallow passwords of a given kind regardless of their length. Each
28 N0 is used for passwords consisting of characters from one character
34 N1 is used for passwords consisting of characters from two character
40 N3 and N4 are used for passwords consisting of characters from three
47 In addition to being sufficiently long, passwords are required to
54 users from setting passwords which may be too long for some system
57 The value 8 is treated specially. Passwords longer than 8 characters
[all …]
H A Dpasswdqc_check.c43 * with the _requested_ minimum length (so longer passwords don't have
246 * passwords (if short passwords are allowed) that are word-based, but
249 * to generate random passwords. This list is much smaller than those
250 * used for password crackers, and it doesn't contain common passwords
/freebsd/lib/libpam/modules/pam_passwdqc/
H A Dpam_passwdqc.852 In addition to checking regular passwords, it offers support for
53 passphrases and can provide randomly generated passwords.
83 passwords/passphrases.
87 disallow passwords of a given kind regardless of their length.
92 is used for passwords consisting of characters from one character
102 is used for passwords consisting of characters from two character
114 are used for passwords consisting of characters from three
121 In addition to being sufficiently long, passwords are required to
127 This can be used to prevent users from setting passwords which may be
131 is set to 8, passwords longer than 8 characters will not be rejected,
[all …]
/freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/
H A DPasswords.htm12 <Title>Passwords</Title>
15 <H1>About Passwords</H1>
24 <li><a href=#choose> Choosing passwords </a></li>
25 <li><a href=#maintain> Maintaining passwords</a></li>
32 <li><a href="HTML/Forget_Password.htm"> Forgotten passwords</a></li>
45 <H2><a name="choose">Choosing Passwords </a></H2>
51 <H2><a name="maintain">Maintaining Passwords</a></H2>
/freebsd/crypto/heimdal/lib/wind/
H A Drfc4013.txt12 SASLprep: Stringprep Profile for User Names and Passwords
29 user names and passwords for comparison. The document defines the
31 user names and passwords. This profile is intended to be used by
34 exchanging simple user names and/or passwords.
38 The use of simple user names and passwords in authentication and
43 passwords for comparison. For simplicity and implementation ease, a
44 single algorithm is defined for both user names and passwords.
63 passwords are used. This profile is not intended for use in
79 preparing strings representing simple user names and passwords.
195 Unicode strings, the number of usable names and passwords is greater
[all …]
/freebsd/share/man/man5/
H A Dpasswd.5165 Because this file contains the encrypted user passwords, it should
176 The field only contains encrypted passwords, and
389 password file, with passwords removed
392 password database, with passwords removed
395 password file, with passwords intact
398 password database, with passwords intact
/freebsd/crypto/krb5/src/lib/kadm5/
H A Dchpass_util_strings.et8 "New passwords do not match - password not changed.\n"
12 error_code CHPASS_UTIL_NO_PASSWORD_READ, "You must type a password. Passwords must be at least one …
19 "New password was found in a dictionary of possible passwords and\n\
H A Dserver_internal.h192 /* The dict module checks passwords against the realm's dictionary. */
197 /* The empty module rejects empty passwords (even with no password policy). */
202 /* The hesiod module checks passwords against GECOS fields from Hesiod passwd
208 /* The princ module checks passwords against principal components. */
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-passphrase-options.pod17 and B<-passout> for input and output passwords respectively. These allow
61 B<file:> applies to passwords read from file descriptors.
68 B<file:> applies to passwords read from standard input.
H A Dopenssl-passwd.pod.in69 Read passwords from I<file>.
73 Read passwords from B<stdin>.
81 Don't output warnings when passwords given at the command line are truncated.
/freebsd/lib/libpam/modules/pam_krb5/
H A Dpam-krb5.899 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512
100 octets) will be rejected, since excessively long passwords can be used as
178 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512
179 octets) will be rejected, since excessively long passwords can be used as
186 change passwords in Kerberos without knowing the old password, use
396 weaker user passwords. This option uses anonymous authentication to
508 [3.9] When changing passwords, PAM first does a preliminary check through
515 modules to synchronize passwords between multiple systems when they
532 pam_cracklib if used) when synchronizing passwords between multiple
551 expired passwords. Instead, \fBpam_authenticate()\fR should return success
[all …]
/freebsd/crypto/openssh/
H A Dsshd_config60 # Note that passwords may also be accepted via KbdInteractiveAuthentication.
65 # the system's configuration, this may involve passwords, challenge-response,
66 # one-time passwords or some combination of these and other methods.
H A DREADME.platform8 have accounts which have passwords expired longer than the inactive time
12 Accounts in this state must have their passwords reset manually by the
14 passwords be reset before upgrading from OpenSSH <3.8.
H A Dscp.144 will ask for passwords or passphrases if they are needed for
86 cannot ask for passwords or passphrases for both hosts.
102 Selects batch mode (prevents asking for passwords or passphrases).
/freebsd/crypto/openssl/doc/man3/
H A DPKCS12_newpass.pod24 In particular, this means that passwords in the locale character set
26 use. This may include passwords from local text files, or input from
96 Unicode form internally. As a result some passwords cannot be supplied to
/freebsd/contrib/pam-krb5/docs/
H A Dpam_krb5.pod49 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512
50 octets) will be rejected, since excessively long passwords can be used as
131 Passwords as long or longer than PAM_MAX_RESP_SIZE octets (normally 512
132 octets) will be rejected, since excessively long passwords can be used as
139 change passwords in Kerberos without knowing the old password, use
360 weaker user passwords. This option uses anonymous authentication to
484 [3.9] When changing passwords, PAM first does a preliminary check through
491 modules to synchronize passwords between multiple systems when they
508 pam_cracklib if used) when synchronizing passwords between multiple
529 expired passwords. Instead, pam_authenticate() should return success
[all …]
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-passphrase-options.174 and \fB\-passout\fR for input and output passwords respectively. These allow
111 \&\fBfile:\fR applies to passwords read from file descriptors.
117 \&\fBfile:\fR applies to passwords read from standard input.
H A Dopenssl-passwd.1122 Read passwords from \fIfile\fR.
125 Read passwords from \fBstdin\fR.
131 Don't output warnings when passwords given at the command line are truncated.
/freebsd/contrib/smbfs/
H A Dconfig.mk.in19 # Comment this to disable support for encrypted passwords (requires
21 # passwords.
/freebsd/crypto/krb5/src/windows/leash/htmlhelp/
H A DTOC.hhc96 <param name="Name" value="Passwords">
97 <param name="Local" value="Html\Passwords.htm">
101 <param name="Name" value="About Passwords">
102 <param name="Local" value="Html\Passwords.htm">
/freebsd/secure/lib/libcrypto/man/man3/
H A DPKCS12_newpass.383 In particular, this means that passwords in the locale character set
85 use. This may include passwords from local text files, or input from
153 Unicode form internally. As a result some passwords cannot be supplied to
/freebsd/contrib/pam-krb5/
H A DNEWS51 Reject passwords as long or longer than PAM_MAX_RESP_SIZE (normally
52 512 octets), since extremely long passwords can be used for a denial
58 lifetime of passwords and other secrets in memory.
414 expired passwords and treats expired passwords the same as incorrect
415 passwords.
672 Add a new option to attempt change of expired passwords during
753 primarily when using the PAM stack to synchronize passwords between
772 users with expired passwords were not being prompted to change their
953 informative prompts when changing passwords.
1006 passwords. Thanks, Arne Nordmark.
[all …]
/freebsd/crypto/heimdal/kadmin/
H A Drandom_password.c39 should think about how secure generated passwords has to be.
45 /* If you want OTP-style passwords, define OTP_STYLE */
96 passwords are (given that the character classes are disjoint):
/freebsd/crypto/heimdal/kpasswd/
H A Dkpasswd.150 is the client for changing passwords.
55 Multiple passwords for different users can be changed at the same time,
/freebsd/stand/lua/
H A Dpassword.lua.835 contains functionality for prompting for and checking passwords.
59 and prompt the user for passwords as-needed.

12345678910>>...13