/freebsd/contrib/pam_modules/pam_passwdqc/ |
H A D | README | 3 to checking regular passwords, it offers support for passphrases and 4 can provide randomly generated passwords. All features are optional 24 of passwords/passphrases. The special word "disabled" can be used to 25 disallow passwords of a given kind regardless of their length. Each 28 N0 is used for passwords consisting of characters from one character 34 N1 is used for passwords consisting of characters from two character 40 N3 and N4 are used for passwords consisting of characters from three 47 In addition to being sufficiently long, passwords are required to 54 users from setting passwords which may be too long for some system 63 hashes, or some weak passwords will pass the checks. [all …]
|
H A D | pam_passwdqc.spec | 15 to checking regular passwords, it offers support for passphrases and 16 can provide randomly generated passwords. All features are optional
|
H A D | PLATFORMS | 28 not-so-weak passwords with the obsolete "traditional" crypt(3) hashes
|
/freebsd/crypto/heimdal/lib/wind/ |
H A D | rfc4013.txt | 29 user names and passwords for comparison. The document defines the 31 user names and passwords. This profile is intended to be used by 34 exchanging simple user names and/or passwords. 38 The use of simple user names and passwords in authentication and 43 passwords for comparison. For simplicity and implementation ease, a 44 single algorithm is defined for both user names and passwords. 63 passwords are used. This profile is not intended for use in 79 preparing strings representing simple user names and passwords. 195 Unicode strings, the number of usable names and passwords is greater 201 User names and passwords should be protected from eavesdropping.
|
/freebsd/contrib/smbfs/ |
H A D | config.mk.in | 19 # Comment this to disable support for encrypted passwords (requires 21 # passwords.
|
H A D | INSTALL | 6 to use encrypted passwords you'll need an src/sys/crypto directory (sys-crypto
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-passwd.pod.in | 69 Read passwords from I<file>. 73 Read passwords from B<stdin>. 81 Don't output warnings when passwords given at the command line are truncated.
|
H A D | openssl-passphrase-options.pod | 17 and B<-passout> for input and output passwords respectively. These allow 61 B<file:> applies to passwords read from file descriptors. 68 B<file:> applies to passwords read from standard input.
|
H A D | openssl-pkcs12.pod.in | 117 Prompt for separate integrity and encryption passwords: most software 351 To discourage attacks by using large dictionaries of common passwords the 352 algorithm that derives keys from passwords can have an iteration count applied 404 Prior 1.1 release passwords containing non-ASCII characters were encoded
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | PKCS12_newpass.pod | 24 In particular, this means that passwords in the locale character set 26 use. This may include passwords from local text files, or input from 96 Unicode form internally. As a result some passwords cannot be supplied to
|
H A D | PKCS12_parse.pod | 40 In particular, this means that passwords in the locale character set 42 use. This may include passwords from local text files, or input from
|
H A D | PKCS5_PBKDF2_HMAC.pod | 53 of candidate passwords.
|
H A D | EVP_BytesToKey.pod | 33 of candidate passwords.
|
/freebsd/crypto/openssl/test/ |
H A D | pkcs12_format_test.c | 302 static const char *passwords[] = { variable 410 enc.pass = passwords[z]; in test_single_key_enc_pass() 507 mac.pass = passwords[z]; in test_single_cert_mac_pass() 945 ADD_ALL_TESTS(test_single_key_enc_pass, OSSL_NELEM(passwords)); in setup_tests() 949 ADD_ALL_TESTS(test_single_cert_mac_pass, OSSL_NELEM(passwords)); in setup_tests()
|
/freebsd/crypto/openssh/ |
H A D | README.platform | 8 have accounts which have passwords expired longer than the inactive time 12 Accounts in this state must have their passwords reset manually by the 14 passwords be reset before upgrading from OpenSSH <3.8.
|
H A D | CREDITS | 6 Ahsan Rashid <arms@sco.com> - UnixWare long passwords 37 Dhiraj Gulati <dgulati@sco.com> - UnixWare long passwords 90 Thomas Neumann <tom@smart.ruhr.de> - Shadow passwords
|
H A D | sshd_config | 60 # Note that passwords may also be accepted via KbdInteractiveAuthentication.
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_KDF-PBKDF1.pod | 51 of candidate passwords.
|
H A D | EVP_KDF-PKCS12KDF.pod | 58 of candidate passwords.
|
H A D | EVP_KDF-PBKDF2.pod | 75 of candidate passwords.
|
H A D | EVP_KDF-SCRYPT.pod | 15 computation. The intention of this is to render brute forcing of passwords on
|
/freebsd/crypto/heimdal/appl/su/ |
H A D | ChangeLog | 101 * su.c: add support for shadow passwords and rewrite some logic.
|
/freebsd/crypto/heimdal/doc/ |
H A D | intro.texi | 66 changing passwords and a simple client
|
/freebsd/contrib/ntp/ntpd/ |
H A D | invoke-ntp.keys.texi | 112 programs are checked against passwords
|
H A D | ntp.keys.def | 117 programs are checked against passwords
|