| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 23-srp.cnf | 6 test-1 = 1-srp-bad-password 8 test-3 = 3-srp-auth-bad-password 36 SRPPassword = password 40 SRPPassword = password 46 [1-srp-bad-password] 47 ssl_conf = 1-srp-bad-password-ssl 49 [1-srp-bad-password-ssl] 50 server = 1-srp-bad-password-server 51 client = 1-srp-bad-password-client 53 [1-srp-bad-password-server] [all …]
|
| /freebsd/contrib/pam-krb5/tests/module/ |
| H A D | password-t.c | 59 config.password = krbconf->password; in main() 93 config.password = newpass; in main() 94 config.newpass = krbconf->password; in main() 98 config.password = krbconf->password; in main() 103 config.password = newpass; in main() 104 config.newpass = krbconf->password; in main() 111 config.password = krbconf->password; in main() 114 config.password = newpass; in main() 115 config.newpass = krbconf->password; in main() 119 config.password = krbconf->password; in main() [all …]
|
| H A D | expired-t.c | 44 config.password = krbconf->password; in main() 88 config.newpass = krbconf->password; in main() 89 config.password = newpass; in main() 94 config.newpass = krbconf->password; in main() 95 config.password = newpass; in main() 101 config.newpass = krbconf->password; in main() 102 config.password = newpass; in main() 110 config.password = krbconf->password; in main() 113 config.newpass = krbconf->password; in main() 114 config.password = newpass; in main() [all …]
|
| H A D | long-t.c | 24 char *password; in main() local 32 password = bcalloc_type(PAM_MAX_RESP_SIZE + 1, char); in main() 33 memset(password, 'a', PAM_MAX_RESP_SIZE); in main() 34 config.password = password; in main() 39 config.authtok = password; in main() 40 config.password = "testing"; in main() 44 free(password); in main()
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | salt-des.c | 54 char password[8+1]; /* crypt is limited to 8 chars anyway */ in krb5_DES_AFS3_CMU_string_to_key() local 61 password[i] = c ? c : 'X'; in krb5_DES_AFS3_CMU_string_to_key() 63 password[8] = '\0'; in krb5_DES_AFS3_CMU_string_to_key() 65 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock)); in krb5_DES_AFS3_CMU_string_to_key() 86 char password[512]; in krb5_DES_AFS3_Transarc_string_to_key() local 89 memcpy(password, pw.data, min(pw.length, sizeof(password))); in krb5_DES_AFS3_Transarc_string_to_key() 90 if(pw.length < sizeof(password)) { in krb5_DES_AFS3_Transarc_string_to_key() 91 int len = min(cell.length, sizeof(password) - pw.length); in krb5_DES_AFS3_Transarc_string_to_key() 94 memcpy(password + pw.length, cell.data, len); in krb5_DES_AFS3_Transarc_string_to_key() 96 password[i] = tolower((unsigned char)password[i]); in krb5_DES_AFS3_Transarc_string_to_key() [all …]
|
| H A D | salt-des3.c | 40 krb5_data password, in DES3_string_to_key() argument 51 len = password.length + salt.saltvalue.length; in DES3_string_to_key() 57 memcpy(str, password.data, password.length); in DES3_string_to_key() 58 memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length); in DES3_string_to_key() 105 krb5_data password, in DES3_string_to_key_derived() argument 111 size_t len = password.length + salt.saltvalue.length; in DES3_string_to_key_derived() 119 memcpy(s, password.data, password.length); in DES3_string_to_key_derived() 120 memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length); in DES3_string_to_key_derived()
|
| H A D | salt.c | 140 krb5_data password, in krb5_string_to_key_data() argument 150 ret = krb5_string_to_key_data_salt(context, enctype, password, salt, key); in krb5_string_to_key_data() 158 const char *password, in krb5_string_to_key() argument 163 pw.data = rk_UNCONST(password); in krb5_string_to_key() 164 pw.length = strlen(password); in krb5_string_to_key() 171 krb5_data password, in krb5_string_to_key_data_salt() argument 177 return krb5_string_to_key_data_salt_opaque(context, enctype, password, in krb5_string_to_key_data_salt() 190 krb5_data password, in krb5_string_to_key_data_salt_opaque() argument 206 return (*st->string_to_key)(context, enctype, password, in krb5_string_to_key_data_salt_opaque() 223 const char *password, in krb5_string_to_key_salt() argument [all …]
|
| /freebsd/crypto/krb5/src/lib/kadm5/ |
| H A D | chpass_util_strings.et | 8 "New passwords do not match - password not changed.\n" 10 error_code CHPASS_UTIL_NEW_PASSWORD_PROMPT, "New password" 11 error_code CHPASS_UTIL_NEW_PASSWORD_AGAIN_PROMPT, "New password (again)" 12 error_code CHPASS_UTIL_NO_PASSWORD_READ, "You must type a password. Passwords must be at least one … 19 "New password was found in a dictionary of possible passwords and\n\ 20 therefore may be easily guessed. Please choose another password.\n\ 21 See the kpasswd man page for help in choosing a good password." 26 "New password is too short.\n\ 27 Please choose a password which is at least %d characters long." 31 "New password does not have enough character classes.\n\ [all …]
|
| /freebsd/crypto/heimdal/lib/hx509/ |
| H A D | lock.c | 43 struct _hx509_password password; member 87 hx509_lock_add_password(hx509_lock lock, const char *password) in hx509_lock_add_password() argument 92 s = strdup(password); in hx509_lock_add_password() 96 d = realloc(lock->password.val, in hx509_lock_add_password() 97 (lock->password.len + 1) * sizeof(lock->password.val[0])); in hx509_lock_add_password() 102 lock->password.val = d; in hx509_lock_add_password() 103 lock->password.val[lock->password.len] = s; in hx509_lock_add_password() 104 lock->password.len++; in hx509_lock_add_password() 112 return &lock->password; in _hx509_lock_get_passwords() 125 for (i = 0; i < lock->password.len; i++) in hx509_lock_reset_passwords() [all …]
|
| /freebsd/contrib/pam_modules/pam_passwdqc/ |
| H A D | README | 1 pam_passwdqc is a simple password strength checking module for 2 PAM-aware password changing programs, such as passwd(1). In addition 7 This module should be stacked before your usual password changing 8 module (such as pam_unix or pam_pwdb) in the password management group 9 (the "password" lines in /etc/pam.d/passwd or /etc/pam.conf). The 10 password changing module should then be told to use the provided new 11 authentication token (new password) rather than request it from the 13 password changing module lacks the "use_authtok" option or its prompts 15 for the old password as well, with "ask_oldauthtok". In that case the 16 option to use with the password changing module is "use_first_pass". [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_default_passwd_cb.pod | 27 SSL_CTX_set_default_passwd_cb() sets the default password callback called 31 which will be provided to the password callback on invocation. 33 SSL_CTX_get_default_passwd_cb() returns a function pointer to the password 45 The password callback, which must be provided by the application, hands back the 46 password to be used during decryption. 48 is provided. The function must store the password into the provided buffer 49 B<buf> which is of size B<size>. The actual length of the password must 57 When loading or storing private keys, a password might be supplied to 58 protect the private key. The way this password can be supplied may depend 60 to have the callback handle the password dialog interactively. If several [all …]
|
| /freebsd/crypto/heimdal/lib/kadm5/ |
| H A D | sample_passwd_check.c | 51 krb5_data *password) in check_length() argument 57 if(password->length < min_length) in check_length() 71 krb5_data *password) in check_cracklib() argument 73 char *s = malloc(password->length + 1); in check_cracklib() 80 memcpy(s, password->data, password->length); in check_cracklib() 81 s[password->length] = '\0'; in check_cracklib() 83 memset(s, 0, password->length); in check_cracklib()
|
| /freebsd/crypto/openssh/ |
| H A D | auth-passwd.c | 77 auth_password(struct ssh *ssh, const char *password) in auth_password() argument 86 if (strlen(password) > MAX_PASSWORD_LEN) in auth_password() 93 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password() 98 int ret = auth_krb5_password(authctxt, password); in auth_password() 106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password() 116 return (sshpam_auth_passwd(authctxt, password) && ok); in auth_password() 125 result = sys_auth_passwd(ssh, password); in auth_password() 167 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument 174 (char *)password); in sys_auth_passwd() 192 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument [all …]
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-passphrase-options.pod | 16 Several OpenSSL commands accept password arguments, typically using B<-passin> 18 the password to be obtained from a variety of sources. Both of these 20 password argument is given and a password is required then the user is 35 =item B<pass:>I<password> 37 The actual password is I<password>. Since the password is visible 43 Obtain the password from the environment variable I<var>. Since 49 Reads the password from the specified file I<pathname>, which can be a regular 54 arguments, the first line will be used for the input password, and the next 55 line will be used for the output password. 59 Reads the password from the file descriptor I<number>. This can be useful for [all …]
|
| H A D | openssl-passwd.pod.in | 6 openssl-passwd - compute password hashes 26 [I<password>] 30 This command computes the hash of a password typed at 31 run-time or the hash of each password in a list. The password list is 45 Use the MD5 based BSD password algorithm B<1> (default). 65 When reading a password from the terminal, this implies B<-noverify>. 77 Don't verify when reading a password from the terminal. 85 In the output list, prepend the cleartext password and a TAB character 86 to each password hash. 100 % openssl passwd -1 -salt xxxxxxxx password [all …]
|
| /freebsd/contrib/wpa/src/eap_peer/ |
| H A D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 65 password, password_len); in mschapv2_derive_response() 68 password, nt_response) || in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 76 password, password_len); in mschapv2_derive_response() 79 password, password_len, in mschapv2_derive_response() 81 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 96 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response() 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
| H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_request() 74 if (identity == NULL || password == NULL) in eap_leap_process_request() 118 if ((pwhash && challenge_response(challenge, password, rpos)) || in eap_leap_process_request() 120 nt_challenge_response(challenge, password, password_len, rpos))) { in eap_leap_process_request() 192 const u8 *pos, *password; in eap_leap_process_response() local 200 password = eap_get_config_password2(sm, &password_len, &pwhash); in eap_leap_process_response() 201 if (password == NULL) in eap_leap_process_response() 235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response() 240 if (nt_password_hash(password, password_len, pw_hash) || in eap_leap_process_response() [all …]
|
| H A D | eap_otp.c | 33 const u8 *pos, *password; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 46 if (password) in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 53 if (password == NULL) { in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process()
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppbe_pbkdf2.txt | 17 Password = "password" 24 Password = "password" 31 Password = "password" 38 Password = "password" 45 Password = "password" 52 Password = "password" 59 Password = "password" 66 Password = "password" 73 Password = "password" 122 Password = "password" [all …]
|
| H A D | evpkdf_pbkdf2.txt | 19 Ctrl.pass = pass:password 28 Ctrl.pass = pass:password 37 Ctrl.pass = pass:password 46 Ctrl.pass = pass:password 55 Ctrl.pass = pass:password 64 Ctrl.pass = pass:password 73 Ctrl.pass = pass:password 82 Ctrl.pass = pass:password 91 Ctrl.pass = pass:password 148 Ctrl.pass = pass:password [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | gic_pwd.c | 32 if (gp->password != NULL) in krb5_get_as_key_password() 55 if (gp->password == NULL) { in krb5_get_as_key_password() 64 gp->password = &gp->storage; in krb5_get_as_key_password() 68 if (gp->password == NULL) { in krb5_get_as_key_password() 96 gp->password = &gp->storage; in krb5_get_as_key_password() 108 ret = krb5_c_string_to_key_with_params(context, etype, gp->password, salt, in krb5_get_as_key_password() 120 const char *password) in krb5_init_creds_set_password() argument 124 s = strdup(password); in krb5_init_creds_set_password() 130 ctx->gakpw.password = &ctx->gakpw.storage; in krb5_init_creds_set_password() 177 const char *password, in krb5_get_init_creds_password() argument [all …]
|
| /freebsd/contrib/wpa/hostapd/ |
| H A D | hostapd.eap_user | 3 # Each line must contain an identity, EAP method(s), and an optional password 4 # separated with whitespace (space or tab). The identity and password must be 6 # NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password 8 # that the plaintext password does not need to be included in the user file. 20 # password option. 22 # password. 49 # plaintext password while TTLS-MSCHAP and TTLS-MSCHAPV2 can use NT password 59 "user" MD5 "password" 62 "DOMAIN\user" MSCHAPV2 "password" 63 "gtc user" GTC "password" [all …]
|
| /freebsd/contrib/pam-krb5/tests/data/scripts/password/ |
| H A D | no-banner | 1 # Test password change with no identifying banner. -*- conf -*- 11 password = banner= 18 echo_off = Current password: |%p 19 echo_off = Enter new password: |%n 20 echo_off = Retype new password: |%n 23 INFO user %u changed Kerberos password
|
| H A D | banner | 1 # Test password change with a modified banner. -*- conf -*- 11 password = banner=realm 18 echo_off = Current realm password: |%p 19 echo_off = Enter new realm password: |%n 20 echo_off = Retype new realm password: |%n 23 INFO user %u changed Kerberos password
|
| /freebsd/crypto/heimdal/lib/hdb/ |
| H A D | ext.c | 292 if (db->hdb_master_key_set && ext->data.u.password.mkvno) { in hdb_entry_get_password() 295 key = _hdb_find_master_key(ext->data.u.password.mkvno, in hdb_entry_get_password() 301 *ext->data.u.password.mkvno); in hdb_entry_get_password() 306 ext->data.u.password.password.data, in hdb_entry_get_password() 307 ext->data.u.password.password.length, in hdb_entry_get_password() 310 ret = der_copy_octet_string(&ext->data.u.password.password, &pw); in hdb_entry_get_password() 367 &ext.data.u.password.password); in hdb_entry_set_password() 371 ext.data.u.password.mkvno = in hdb_entry_set_password() 372 malloc(sizeof(*ext.data.u.password.mkvno)); in hdb_entry_set_password() 373 if (ext.data.u.password.mkvno == NULL) { in hdb_entry_set_password() [all …]
|