Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 495) sorted by relevance

12345678910>>...20

/freebsd/crypto/openssl/test/ssl-tests/
H A D23-srp.cnf6 test-1 = 1-srp-bad-password
8 test-3 = 3-srp-auth-bad-password
36 SRPPassword = password
40 SRPPassword = password
46 [1-srp-bad-password]
47 ssl_conf = 1-srp-bad-password-ssl
49 [1-srp-bad-password-ssl]
50 server = 1-srp-bad-password-server
51 client = 1-srp-bad-password-client
53 [1-srp-bad-password-server]
[all …]
H A D23-srp.cnf.in24 "SRPPassword" => "password",
32 "SRPPassword" => "password",
40 name => "srp-bad-password",
46 "SRPPassword" => "password",
69 "SRPPassword" => "password",
77 "SRPPassword" => "password",
85 name => "srp-auth-bad-password",
91 "SRPPassword" => "password",
/freebsd/crypto/heimdal/lib/krb5/
H A Dsalt-des.c54 char password[8+1]; /* crypt is limited to 8 chars anyway */ in krb5_DES_AFS3_CMU_string_to_key() local
61 password[i] = c ? c : 'X'; in krb5_DES_AFS3_CMU_string_to_key()
63 password[8] = '\0'; in krb5_DES_AFS3_CMU_string_to_key()
65 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock)); in krb5_DES_AFS3_CMU_string_to_key()
86 char password[512]; in krb5_DES_AFS3_Transarc_string_to_key() local
89 memcpy(password, pw.data, min(pw.length, sizeof(password))); in krb5_DES_AFS3_Transarc_string_to_key()
90 if(pw.length < sizeof(password)) { in krb5_DES_AFS3_Transarc_string_to_key()
91 int len = min(cell.length, sizeof(password) - pw.length); in krb5_DES_AFS3_Transarc_string_to_key()
94 memcpy(password + pw.length, cell.data, len); in krb5_DES_AFS3_Transarc_string_to_key()
96 password[i] = tolower((unsigned char)password[i]); in krb5_DES_AFS3_Transarc_string_to_key()
[all …]
H A Dsalt-des3.c40 krb5_data password, in DES3_string_to_key() argument
51 len = password.length + salt.saltvalue.length; in DES3_string_to_key()
57 memcpy(str, password.data, password.length); in DES3_string_to_key()
58 memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length); in DES3_string_to_key()
105 krb5_data password, in DES3_string_to_key_derived() argument
111 size_t len = password.length + salt.saltvalue.length; in DES3_string_to_key_derived()
119 memcpy(s, password.data, password.length); in DES3_string_to_key_derived()
120 memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length); in DES3_string_to_key_derived()
H A Dsalt.c140 krb5_data password, in krb5_string_to_key_data() argument
150 ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); in krb5_string_to_key_data()
158 const char *password, in krb5_string_to_key() argument
163 pw.data = rk_UNCONST(password); in krb5_string_to_key()
164 pw.length = strlen(password); in krb5_string_to_key()
171 krb5_data password, in krb5_string_to_key_data_salt() argument
177 return krb5_string_to_key_data_salt_opaque(context, enctype, password, in krb5_string_to_key_data_salt()
190 krb5_data password, in krb5_string_to_key_data_salt_opaque() argument
206 return (*st->string_to_key)(context, enctype, password, in krb5_string_to_key_data_salt_opaque()
223 const char *password, in krb5_string_to_key_salt() argument
[all …]
/freebsd/crypto/heimdal/lib/hx509/
H A Dlock.c43 struct _hx509_password password; member
87 hx509_lock_add_password(hx509_lock lock, const char *password) in hx509_lock_add_password() argument
92 s = strdup(password); in hx509_lock_add_password()
96 d = realloc(lock->password.val, in hx509_lock_add_password()
97 (lock->password.len + 1) * sizeof(lock->password.val[0])); in hx509_lock_add_password()
102 lock->password.val = d; in hx509_lock_add_password()
103 lock->password.val[lock->password.len] = s; in hx509_lock_add_password()
104 lock->password.len++; in hx509_lock_add_password()
112 return &lock->password; in _hx509_lock_get_passwords()
125 for (i = 0; i < lock->password.len; i++) in hx509_lock_reset_passwords()
[all …]
/freebsd/contrib/pam_modules/pam_passwdqc/
H A DREADME1 pam_passwdqc is a simple password strength checking module for
2 PAM-aware password changing programs, such as passwd(1). In addition
7 This module should be stacked before your usual password changing
8 module (such as pam_unix or pam_pwdb) in the password management group
9 (the "password" lines in /etc/pam.d/passwd or /etc/pam.conf). The
10 password changing module should then be told to use the provided new
11 authentication token (new password) rather than request it from the
13 password changing module lacks the "use_authtok" option or its prompts
15 for the old password as well, with "ask_oldauthtok". In that case the
16 option to use with the password changing module is "use_first_pass".
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_default_passwd_cb.pod27 SSL_CTX_set_default_passwd_cb() sets the default password callback called
31 which will be provided to the password callback on invocation.
33 SSL_CTX_get_default_passwd_cb() returns a function pointer to the password
45 The password callback, which must be provided by the application, hands back the
46 password to be used during decryption.
48 is provided. The function must store the password into the provided buffer
49 B<buf> which is of size B<size>. The actual length of the password must
57 When loading or storing private keys, a password might be supplied to
58 protect the private key. The way this password can be supplied may depend
60 to have the callback handle the password dialog interactively. If several
[all …]
/freebsd/crypto/heimdal/lib/kadm5/
H A Dsample_passwd_check.c51 krb5_data *password) in check_length() argument
57 if(password->length < min_length) in check_length()
71 krb5_data *password) in check_cracklib() argument
73 char *s = malloc(password->length + 1); in check_cracklib()
80 memcpy(s, password->data, password->length); in check_cracklib()
81 s[password->length] = '\0'; in check_cracklib()
83 memset(s, 0, password->length); in check_cracklib()
/freebsd/crypto/openssh/
H A Dauth-passwd.c77 auth_password(struct ssh *ssh, const char *password) in auth_password() argument
86 if (strlen(password) > MAX_PASSWORD_LEN) in auth_password()
93 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password()
98 int ret = auth_krb5_password(authctxt, password); in auth_password()
106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password()
116 return (sshpam_auth_passwd(authctxt, password) && ok); in auth_password()
125 result = sys_auth_passwd(ssh, password); in auth_password()
167 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument
174 (char *)password); in sys_auth_passwd()
192 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument
[all …]
H A Dauth2-passwd.c54 char *password = NULL; in userauth_passwd() local
60 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 || in userauth_passwd()
63 freezero(password, len); in userauth_passwd()
69 else if (PRIVSEP(auth_password(ssh, password)) == 1) in userauth_passwd()
71 freezero(password, len); in userauth_passwd()
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-passphrase-options.pod16 Several OpenSSL commands accept password arguments, typically using B<-passin>
18 the password to be obtained from a variety of sources. Both of these
20 password argument is given and a password is required then the user is
35 =item B<pass:>I<password>
37 The actual password is I<password>. Since the password is visible
43 Obtain the password from the environment variable I<var>. Since
49 Reads the password from the specified file I<pathname>, which can be a regular
54 arguments, the first line will be used for the input password, and the next
55 line will be used for the output password.
59 Reads the password from the file descriptor I<number>. This can be useful for
[all …]
H A Dopenssl-passwd.pod.in6 openssl-passwd - compute password hashes
26 [I<password>]
30 This command computes the hash of a password typed at
31 run-time or the hash of each password in a list. The password list is
45 Use the MD5 based BSD password algorithm B<1> (default).
65 When reading a password from the terminal, this implies B<-noverify>.
77 Don't verify when reading a password from the terminal.
85 In the output list, prepend the cleartext password and a TAB character
86 to each password hash.
100 % openssl passwd -1 -salt xxxxxxxx password
[all …]
/freebsd/contrib/wpa/src/eap_peer/
H A Dmschapv2.c37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument
65 password, password_len); in mschapv2_derive_response()
68 password, nt_response) || in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
76 password, password_len); in mschapv2_derive_response()
79 password, password_len, in mschapv2_derive_response()
81 generate_authenticator_response(password, password_len, in mschapv2_derive_response()
96 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response()
99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request()
74 if (identity == NULL || password == NULL) in eap_leap_process_request()
118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request()
120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request()
192 const u8 *pos, *password; in eap_leap_process_response() local
200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response()
201 if (password == NULL) in eap_leap_process_response()
235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response()
240 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response()
[all …]
H A Deap_otp.c33 const u8 *pos, *password; in eap_otp_process() local
45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process()
46 if (password) in eap_otp_process()
49 password = eap_get_config_password(sm, &password_len); in eap_otp_process()
53 if (password == NULL) { in eap_otp_process()
70 wpabuf_put_data(resp, password, password_len); in eap_otp_process()
72 password, password_len); in eap_otp_process()
/freebsd/crypto/heimdal/lib/hdb/
H A Dext.c292 if (db->hdb_master_key_set && ext->data.u.password.mkvno) { in hdb_entry_get_password()
295 key = _hdb_find_master_key(ext->data.u.password.mkvno, in hdb_entry_get_password()
301 *ext->data.u.password.mkvno); in hdb_entry_get_password()
306 ext->data.u.password.password.data, in hdb_entry_get_password()
307 ext->data.u.password.password.length, in hdb_entry_get_password()
310 ret = der_copy_octet_string(&ext->data.u.password.password, &pw); in hdb_entry_get_password()
367 &ext.data.u.password.password); in hdb_entry_set_password()
371 ext.data.u.password.mkvno = in hdb_entry_set_password()
372 malloc(sizeof(*ext.data.u.password.mkvno)); in hdb_entry_set_password()
373 if (ext.data.u.password.mkvno == NULL) { in hdb_entry_set_password()
[all …]
/freebsd/contrib/wpa/hostapd/
H A Dhostapd.eap_user3 # Each line must contain an identity, EAP method(s), and an optional password
4 # separated with whitespace (space or tab). The identity and password must be
6 # NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password
8 # that the plaintext password does not need to be included in the user file.
20 # password option.
22 # password.
49 # plaintext password while TTLS-MSCHAP and TTLS-MSCHAPV2 can use NT password
59 "user" MD5 "password"
62 "DOMAIN\user" MSCHAPV2 "password"
63 "gtc user" GTC "password"
[all …]
H A Dnt_password_hash.c19 char *password, buf[64], *pos; in main() local
22 password = argv[1]; in main()
37 password = buf; in main()
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
/freebsd/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf1829 password="foobar"
1844 password="foobar"
1857 password="foobar"
1916 password=06b4be19da289f475aa46a33cb793029
1943 password="foobar"
1952 password="foobar"
1962 password="password"
1973 password="password"
2063 password="foobar"
2099 password="foobar"
[all …]
/freebsd/crypto/heimdal/kadmin/
H A Dcpw.c40 char *password; member
82 set_password (krb5_principal principal, char *password) in set_password() argument
87 if(password == NULL) { in set_password()
99 password = pwbuf; in set_password()
102 ret = kadm5_chpass_principal(kadm_handle, principal, password); in set_password()
129 return set_password (principal, e->password); in do_cpw_entry()
143 data.password = opt->password_string; in cpw_entry()
151 if (data.password) in cpw_entry()
H A Dank.c70 char *password, in add_one_principal() argument
120 password = pwbuf; in add_one_principal()
123 password = pwbuf; in add_one_principal()
124 } else if(password == NULL) { in add_one_principal()
138 password = pwbuf; in add_one_principal()
141 ret = kadm5_create_principal(kadm_handle, &princ, mask, password); in add_one_principal()
181 printf ("added %s with password \"%s\"\n", princ_name, password); in add_one_principal()
189 if (password != NULL) in add_one_principal()
190 memset (password, 0, strlen(password)); in add_one_principal()
/freebsd/usr.sbin/bsdconfig/share/
H A Dmustberoot.subr43 # Number of tries a user gets to enter his/her password before we log the
54 # allowed because no password is required to become `root' when already `root'
55 # and therefore, any value entered as password will work.
62 # otherwise a non-existent user is treated like an invalid password.
142 # Check sudo(8) access before prompting for password.
147 # sudo(8) access denied. Prompt for their password.
161 local password nfailures=0 retval
164 password=$( $DIALOG \
170 --password --inputbox "$prompt" \
178 f_die $retval "$password"
[all …]
/freebsd/crypto/heimdal/kdc/
H A Dstring2key.c42 char *password; variable
54 { "password", 'w', arg_string, &password, "Password to use", "password" },
158 password = argv[0]; in main()
159 if(password == NULL){ in main()
162 password = buf; in main()
168 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); in main()
175 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "Kerberos 4"); in main()
181 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "AFS"); in main()
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppbe_pbkdf2.txt17 Password = "password"
24 Password = "password"
31 Password = "password"
38 Password = "password"
45 Password = "password"
52 Password = "password"
59 Password = "password"
66 Password = "password"
73 Password = "password"

12345678910>>...20