Home
last modified time | relevance | path

Searched refs:passwords (Results 1 – 25 of 70) sorted by relevance

123

/freebsd/contrib/pam_modules/pam_passwdqc/
H A DREADME3 to checking regular passwords, it offers support for passphrases and
4 can provide randomly generated passwords. All features are optional
24 of passwords/passphrases. The special word "disabled" can be used to
25 disallow passwords of a given kind regardless of their length. Each
28 N0 is used for passwords consisting of characters from one character
34 N1 is used for passwords consisting of characters from two character
40 N3 and N4 are used for passwords consisting of characters from three
47 In addition to being sufficiently long, passwords are required to
54 users from setting passwords which may be too long for some system
63 hashes, or some weak passwords will pass the checks.
[all …]
H A Dpam_passwdqc.spec15 to checking regular passwords, it offers support for passphrases and
16 can provide randomly generated passwords. All features are optional
H A DPLATFORMS28 not-so-weak passwords with the obsolete "traditional" crypt(3) hashes
/freebsd/crypto/heimdal/lib/wind/
H A Drfc4013.txt29 user names and passwords for comparison. The document defines the
31 user names and passwords. This profile is intended to be used by
34 exchanging simple user names and/or passwords.
38 The use of simple user names and passwords in authentication and
43 passwords for comparison. For simplicity and implementation ease, a
44 single algorithm is defined for both user names and passwords.
63 passwords are used. This profile is not intended for use in
79 preparing strings representing simple user names and passwords.
195 Unicode strings, the number of usable names and passwords is greater
201 User names and passwords should be protected from eavesdropping.
/freebsd/contrib/smbfs/
H A Dconfig.mk.in19 # Comment this to disable support for encrypted passwords (requires
21 # passwords.
H A DINSTALL6 to use encrypted passwords you'll need an src/sys/crypto directory (sys-crypto
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-passwd.pod.in69 Read passwords from I<file>.
73 Read passwords from B<stdin>.
81 Don't output warnings when passwords given at the command line are truncated.
H A Dopenssl-passphrase-options.pod17 and B<-passout> for input and output passwords respectively. These allow
61 B<file:> applies to passwords read from file descriptors.
68 B<file:> applies to passwords read from standard input.
H A Dopenssl-pkcs12.pod.in117 Prompt for separate integrity and encryption passwords: most software
351 To discourage attacks by using large dictionaries of common passwords the
352 algorithm that derives keys from passwords can have an iteration count applied
404 Prior 1.1 release passwords containing non-ASCII characters were encoded
/freebsd/crypto/openssl/doc/man3/
H A DPKCS12_newpass.pod24 In particular, this means that passwords in the locale character set
26 use. This may include passwords from local text files, or input from
96 Unicode form internally. As a result some passwords cannot be supplied to
H A DPKCS12_parse.pod40 In particular, this means that passwords in the locale character set
42 use. This may include passwords from local text files, or input from
H A DPKCS5_PBKDF2_HMAC.pod53 of candidate passwords.
H A DEVP_BytesToKey.pod33 of candidate passwords.
/freebsd/crypto/openssl/test/
H A Dpkcs12_format_test.c302 static const char *passwords[] = { variable
410 enc.pass = passwords[z]; in test_single_key_enc_pass()
507 mac.pass = passwords[z]; in test_single_cert_mac_pass()
945 ADD_ALL_TESTS(test_single_key_enc_pass, OSSL_NELEM(passwords)); in setup_tests()
949 ADD_ALL_TESTS(test_single_cert_mac_pass, OSSL_NELEM(passwords)); in setup_tests()
/freebsd/crypto/openssh/
H A DREADME.platform8 have accounts which have passwords expired longer than the inactive time
12 Accounts in this state must have their passwords reset manually by the
14 passwords be reset before upgrading from OpenSSH <3.8.
H A DCREDITS6 Ahsan Rashid <arms@sco.com> - UnixWare long passwords
37 Dhiraj Gulati <dgulati@sco.com> - UnixWare long passwords
90 Thomas Neumann <tom@smart.ruhr.de> - Shadow passwords
H A Dsshd_config60 # Note that passwords may also be accepted via KbdInteractiveAuthentication.
/freebsd/crypto/openssl/doc/man7/
H A DEVP_KDF-PBKDF1.pod51 of candidate passwords.
H A DEVP_KDF-PKCS12KDF.pod58 of candidate passwords.
H A DEVP_KDF-PBKDF2.pod75 of candidate passwords.
H A DEVP_KDF-SCRYPT.pod15 computation. The intention of this is to render brute forcing of passwords on
/freebsd/crypto/heimdal/appl/su/
H A DChangeLog101 * su.c: add support for shadow passwords and rewrite some logic.
/freebsd/crypto/heimdal/doc/
H A Dintro.texi66 changing passwords and a simple client
/freebsd/contrib/ntp/ntpd/
H A Dinvoke-ntp.keys.texi112 programs are checked against passwords
H A Dntp.keys.def117 programs are checked against passwords

123