HomeSort by: relevance | last modified time | path
    Searched refs:password (Results 1 - 25 of 359) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/share/doc/smm/17.password/
Makefile 4 ARTICLE=morris78-password
5 SRCS= password.ms
  /src/crypto/external/bsd/heimdal/dist/lib/kadm5/
sample_passwd_check.c 47 /* just check the length of the password, this is what the default
53 krb5_data *password)
59 if(password->length < min_length)
60 return "Password too short";
66 /* use cracklib to check password quality; this requires a patch for
73 krb5_data *password)
75 char *s = malloc(password->length + 1);
82 memcpy(s, password->data, password->length);
83 s[password->length] = '\0'
    [all...]
test_pw_quality.c 48 static char *password; variable
52 { "password", 0, arg_string, &password, NULL, NULL },
78 if (password == NULL)
79 krb5_errx(context, 1, "no password given");
85 pw_data.data = password;
86 pw_data.length = strlen(password);
client_glue.c 42 const char *password,
50 password,
61 const char *password,
70 password,
kadm5-pwcheck.h 51 * function, the lib/caller will providing it for the password quality
58 krb5_data *password,
server_glue.c 42 const char *password,
50 password,
61 const char *password,
70 password,
  /src/external/bsd/wpa/dist/hostapd/
nt_password_hash.c 2 * hostapd - Plaintext password to NtPasswordHash
19 char *password, buf[64], *pos; local
22 password = argv[1];
25 printf("Failed to read password\n");
37 password = buf;
40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
  /src/crypto/external/bsd/heimdal/dist/lib/roken/
verify.c 48 unix_verify_user(char *user, char *password)
55 if(strlen(pw->pw_passwd) == 0 && strlen(password) == 0)
57 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
  /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
23-srp.conf 6 test-1 = 1-srp-bad-password
8 test-3 = 3-srp-auth-bad-password
36 SRPPassword = password
40 SRPPassword = password
46 [1-srp-bad-password]
47 ssl_conf = 1-srp-bad-password-ssl
49 [1-srp-bad-password-ssl]
50 server = 1-srp-bad-password-server
51 client = 1-srp-bad-password-client
53 [1-srp-bad-password-server
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/examples/
ieee8021x.conf 11 password="password"
  /src/crypto/external/bsd/openssh/dist/
auth2-passwd.c 57 char *password = NULL; local
63 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 ||
66 freezero(password, len);
71 logit("password change not supported");
72 else if (mm_auth_password(ssh, password) == 1)
74 freezero(password, len);
auth-passwd.c 8 * Password authentication. This file contains the functions to check whether
9 * the password is valid for the user.
77 * Tries to authenticate the user using password. Returns true if
81 auth_password(struct ssh *ssh, const char *password)
87 if (strlen(password) > MAX_PASSWORD_LEN)
92 if (*password == '\0' && options.permit_empty_passwd == 0)
96 int ret = auth_krb5_password(authctxt, password);
105 return (sshpam_auth_passwd(authctxt, password) && ok);
107 return (sys_auth_passwd(ssh, password) && ok);
123 pwwarntime = login_getcaptime(lc, "password-warn", TWO_WEEKS
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
salt-des.c 42 /* This defines the Andrew string_to_key function. It accepts a password
45 * service password database.
56 char password[8+1]; /* crypt is limited to 8 chars anyway */ local
63 password[i] = c ? c : 'X';
65 password[8] = '\0';
67 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock));
88 char password[512]; local
91 memcpy(password, pw.data, min(pw.length, sizeof(password)));
92 if(pw.length < sizeof(password)) {
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_otp.c 33 const u8 *pos, *password; local
45 password = eap_get_config_otp(sm, &password_len);
46 if (password)
49 password = eap_get_config_password(sm, &password_len);
53 if (password == NULL) {
54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
70 wpabuf_put_data(resp, password, password_len);
72 password, password_len);
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
mschapv2.c 37 const u8 *password, size_t password_len,
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65 password, password_len);
68 password, nt_response) ||
70 password, peer_challenge, auth_challenge,
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76 password, password_len);
79 password, password_len,
81 generate_authenticator_response(password, password_len,
96 if (hash_nt_password_hash(password, password_hash_hash)
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
lock.c 45 struct _hx509_password password; member in struct:hx509_lock_data
92 hx509_lock_add_password(hx509_lock lock, const char *password)
97 s = strdup(password);
101 d = realloc(lock->password.val,
102 (lock->password.len + 1) * sizeof(lock->password.val[0]));
107 lock->password.val = d;
108 lock->password.val[lock->password.len] = s;
109 lock->password.len++
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/
evpkdf_pvkkdf.txt 19 Ctrl.pass = pass:password
26 Ctrl.pass = pass:password
33 Ctrl.pass = pass:password
  /src/external/gpl2/xcvs/dist/src/
login.c 52 /* Construct absolute pathname to user's password file. */
62 right thing for a GUI is to just store the password in
90 * from a ~/.cvsroot password file and return a pointer to the password if the
101 * char *password as a pointer into linebuf
112 char *password = NULL; local
146 error (0, 0, "warning: skipping invalid entry in password file at line %d",
153 password = p + 1;
160 error (0, errno, "warning: unable to convert version number in password file at line %d",
167 error (0, 0, "warning: skipping entry with invalid version string in password file at line %d"
288 char *password = NULL; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/
20-test_passwd.t 39 key => 'we have a short salt string but not a short password',
67 key => 'we have a short salt string but not a short password',
82 ok(compare1stline_re([qw{openssl passwd password}], '^.{13}\R$'),
83 'crypt password with random salt') if !disabled("des");
84 ok(compare1stline_re([qw{openssl passwd -1 password}], '^\$1\$.{8}\$.{22}\R$'),
85 'BSD style MD5 password with random salt');
86 ok(compare1stline_re([qw{openssl passwd -apr1 password}], '^\$apr1\$.{8}\$.{22}\R$'),
87 'Apache style MD5 password with random salt');
88 ok(compare1stline_re([qw{openssl passwd -5 password}], '^\$5\$.{16}\$.{43}\R$'),
89 'SHA256 password with random salt')
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
test_pkcs5.c 43 const char *password; member in struct:tests
52 { "password",
59 { "password",
66 { "password",
74 "password", "\x12\x34\x56\x78\x78\x56\x34\x12",
112 ret = PKCS5_PBKDF2_HMAC(t->password, strlen(t->password),
124 ret = PKCS5_PBKDF2_HMAC(t->password, strlen(t->password),
test_pkcs12.c 44 const char *password; member in struct:tests
109 if (t->password)
110 pwlen = strlen(t->password);
112 if (!PKCS12_key_gen(t->password, pwlen,
  /src/crypto/external/apache2/openssl/dist/test/recipes/
20-test_passwd.t 67 key => 'we have a short salt string but not a short password',
75 key => 'we have a short salt string but not a short password',
86 ok(compare1stline_re([qw{openssl passwd -1 password}], '^\$1\$.{8}\$.{22}\R$'),
87 'BSD style MD5 password with random salt');
88 ok(compare1stline_re([qw{openssl passwd -apr1 password}], '^\$apr1\$.{8}\$.{22}\R$'),
89 'Apache style MD5 password with random salt');
90 ok(compare1stline_re([qw{openssl passwd -5 password}], '^\$5\$.{16}\$.{43}\R$'),
91 'SHA256 password with random salt');
92 ok(compare1stline_re([qw{openssl passwd -6 password}], '^\$6\$.{16}\$.{86}\R$'),
93 'Apache SHA512 password with random salt')
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/recipes/
20-test_passwd.t 67 key => 'we have a short salt string but not a short password',
75 key => 'we have a short salt string but not a short password',
86 ok(compare1stline_re([qw{openssl passwd -1 password}], '^\$1\$.{8}\$.{22}\R$'),
87 'BSD style MD5 password with random salt');
88 ok(compare1stline_re([qw{openssl passwd -apr1 password}], '^\$apr1\$.{8}\$.{22}\R$'),
89 'Apache style MD5 password with random salt');
90 ok(compare1stline_re([qw{openssl passwd -5 password}], '^\$5\$.{16}\$.{43}\R$'),
91 'SHA256 password with random salt');
92 ok(compare1stline_re([qw{openssl passwd -6 password}], '^\$6\$.{16}\$.{86}\R$'),
93 'Apache SHA512 password with random salt')
    [all...]
  /src/games/larn/
config.c 46 const char *password = "pvnert(x)"; /* the wizards password <=32 */ variable
  /src/crypto/external/apache2/openssl/dist/apps/include/
apps_ui.h 15 const void *password; member in struct:pw_cb_data

Completed in 52 milliseconds

1 2 3 4 5 6 7 8 91011>>