Home
last modified time | relevance | path

Searched refs:passwords (Results 1 – 25 of 97) sorted by relevance

1234

/freebsd/contrib/pam_modules/pam_passwdqc/
H A DREADME3 to checking regular passwords, it offers support for passphrases and
4 can provide randomly generated passwords. All features are optional
24 of passwords/passphrases. The special word "disabled" can be used to
25 disallow passwords of a given kind regardless of their length. Each
28 N0 is used for passwords consisting of characters from one character
34 N1 is used for passwords consisting of characters from two character
40 N3 and N4 are used for passwords consisting of characters from three
47 In addition to being sufficiently long, passwords are required to
54 users from setting passwords which may be too long for some system
63 hashes, or some weak passwords will pass the checks.
[all …]
H A Dpam_passwdqc.spec15 to checking regular passwords, it offers support for passphrases and
16 can provide randomly generated passwords. All features are optional
/freebsd/crypto/heimdal/lib/wind/
H A Drfc4013.txt29 user names and passwords for comparison. The document defines the
31 user names and passwords. This profile is intended to be used by
34 exchanging simple user names and/or passwords.
38 The use of simple user names and passwords in authentication and
43 passwords for comparison. For simplicity and implementation ease, a
44 single algorithm is defined for both user names and passwords.
63 passwords are used. This profile is not intended for use in
79 preparing strings representing simple user names and passwords.
195 Unicode strings, the number of usable names and passwords is greater
201 User names and passwords should be protected from eavesdropping.
/freebsd/contrib/smbfs/
H A Dconfig.mk.in19 # Comment this to disable support for encrypted passwords (requires
21 # passwords.
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-passwd.pod.in69 Read passwords from I<file>.
73 Read passwords from B<stdin>.
81 Don't output warnings when passwords given at the command line are truncated.
H A Dopenssl-passphrase-options.pod17 and B<-passout> for input and output passwords respectively. These allow
61 B<file:> applies to passwords read from file descriptors.
68 B<file:> applies to passwords read from standard input.
/freebsd/crypto/openssh/
H A Dsshd_config60 # Note that passwords may also be accepted via KbdInteractiveAuthentication.
65 # the system's configuration, this may involve passwords, challenge-response,
66 # one-time passwords or some combination of these and other methods.
H A DREADME.platform8 have accounts which have passwords expired longer than the inactive time
12 Accounts in this state must have their passwords reset manually by the
14 passwords be reset before upgrading from OpenSSH <3.8.
H A DCREDITS6 Ahsan Rashid <arms@sco.com> - UnixWare long passwords
37 Dhiraj Gulati <dgulati@sco.com> - UnixWare long passwords
90 Thomas Neumann <tom@smart.ruhr.de> - Shadow passwords
/freebsd/crypto/openssl/doc/man3/
H A DPKCS12_newpass.pod24 In particular, this means that passwords in the locale character set
26 use. This may include passwords from local text files, or input from
96 Unicode form internally. As a result some passwords cannot be supplied to
H A DPKCS12_parse.pod40 In particular, this means that passwords in the locale character set
42 use. This may include passwords from local text files, or input from
/freebsd/crypto/krb5/src/lib/kadm5/
H A Dchpass_util_strings.et8 "New passwords do not match - password not changed.\n"
19 "New password was found in a dictionary of possible passwords and\n\
/freebsd/crypto/openssl/test/
H A Dpkcs12_format_test.c309 static const char *passwords[] = { variable
417 enc.pass = passwords[z]; in test_single_key_enc_pass()
514 mac.pass = passwords[z]; in test_single_cert_mac_pass()
1031 ADD_ALL_TESTS(test_single_key_enc_pass, OSSL_NELEM(passwords)); in setup_tests()
1035 ADD_ALL_TESTS(test_single_cert_mac_pass, OSSL_NELEM(passwords)); in setup_tests()
/freebsd/contrib/pam-krb5/tests/data/scripts/expired/
H A Dfail1 # Test default handling of expired passwords. -*- conf -*-
H A Dbasic-mit-silent1 # Test default handling of expired passwords with silent. -*- conf -*-
H A Dbasic-heimdal-silent1 # Test default handling of expired passwords with silent. -*- conf -*-
H A Dbasic-heimdal-flag-silent1 # Test default handling of expired passwords with PAM_SILENT. -*- conf -*-
H A Dbasic-mit1 # Test default handling of expired passwords. -*- conf -*-
H A Dbasic-mit-flag-silent1 # Test default handling of expired passwords with PAM_SILENT. -*- conf -*-
H A Dfail-debug1 # Test default handling of expired passwords. -*- conf -*-
H A Dbasic-heimdal-old1 # Test default handling of expired passwords. -*- conf -*-
H A Dbasic-heimdal1 # Test default handling of expired passwords. -*- conf -*-
H A Ddefer-mit1 # Test deferring handling of expired passwords. -*- conf -*-
H A Dbasic-mit-debug1 # Test default handling of expired passwords. -*- conf -*-
H A Dbasic-heimdal-old-debug1 # Test default handling of expired passwords. -*- conf -*-

1234