| /src/share/doc/smm/17.password/ |
| Makefile | 4 ARTICLE=morris78-password 5 SRCS= password.ms
|
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| sample_passwd_check.c | 47 /* just check the length of the password, this is what the default 53 krb5_data *password) 59 if(password->length < min_length) 60 return "Password too short"; 66 /* use cracklib to check password quality; this requires a patch for 73 krb5_data *password) 75 char *s = malloc(password->length + 1); 82 memcpy(s, password->data, password->length); 83 s[password->length] = '\0' [all...] |
| test_pw_quality.c | 48 static char *password; variable 52 { "password", 0, arg_string, &password, NULL, NULL }, 78 if (password == NULL) 79 krb5_errx(context, 1, "no password given"); 85 pw_data.data = password; 86 pw_data.length = strlen(password);
|
| client_glue.c | 42 const char *password, 50 password, 61 const char *password, 70 password,
|
| kadm5-pwcheck.h | 51 * function, the lib/caller will providing it for the password quality 58 krb5_data *password,
|
| server_glue.c | 42 const char *password, 50 password, 61 const char *password, 70 password,
|
| /src/external/bsd/wpa/dist/hostapd/ |
| nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 19 char *password, buf[64], *pos; local 22 password = argv[1]; 25 printf("Failed to read password\n"); 37 password = buf; 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
| /src/crypto/external/bsd/heimdal/dist/lib/roken/ |
| verify.c | 48 unix_verify_user(char *user, char *password) 55 if(strlen(pw->pw_passwd) == 0 && strlen(password) == 0) 57 if(strcmp(crypt(password, pw->pw_passwd), pw->pw_passwd) == 0)
|
| /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| 23-srp.conf | 6 test-1 = 1-srp-bad-password 8 test-3 = 3-srp-auth-bad-password 36 SRPPassword = password 40 SRPPassword = password 46 [1-srp-bad-password] 47 ssl_conf = 1-srp-bad-password-ssl 49 [1-srp-bad-password-ssl] 50 server = 1-srp-bad-password-server 51 client = 1-srp-bad-password-client 53 [1-srp-bad-password-server [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/examples/ |
| ieee8021x.conf | 11 password="password"
|
| /src/crypto/external/bsd/openssh/dist/ |
| auth2-passwd.c | 57 char *password = NULL; local 63 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 || 66 freezero(password, len); 71 logit("password change not supported"); 72 else if (mm_auth_password(ssh, password) == 1) 74 freezero(password, len);
|
| auth-passwd.c | 8 * Password authentication. This file contains the functions to check whether 9 * the password is valid for the user. 77 * Tries to authenticate the user using password. Returns true if 81 auth_password(struct ssh *ssh, const char *password) 87 if (strlen(password) > MAX_PASSWORD_LEN) 92 if (*password == '\0' && options.permit_empty_passwd == 0) 96 int ret = auth_krb5_password(authctxt, password); 105 return (sshpam_auth_passwd(authctxt, password) && ok); 107 return (sys_auth_passwd(ssh, password) && ok); 123 pwwarntime = login_getcaptime(lc, "password-warn", TWO_WEEKS [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| salt-des.c | 42 /* This defines the Andrew string_to_key function. It accepts a password 45 * service password database. 56 char password[8+1]; /* crypt is limited to 8 chars anyway */ local 63 password[i] = c ? c : 'X'; 65 password[8] = '\0'; 67 memcpy(key, crypt(password, "p1") + 2, sizeof(DES_cblock)); 88 char password[512]; local 91 memcpy(password, pw.data, min(pw.length, sizeof(password))); 92 if(pw.length < sizeof(password)) { [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_otp.c | 33 const u8 *pos, *password; local 45 password = eap_get_config_otp(sm, &password_len); 46 if (password) 49 password = eap_get_config_password(sm, &password_len); 53 if (password == NULL) { 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 70 wpabuf_put_data(resp, password, password_len); 72 password, password_len); 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
| mschapv2.c | 37 const u8 *password, size_t password_len, 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 65 password, password_len); 68 password, nt_response) || 70 password, peer_challenge, auth_challenge, 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_hash) [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| lock.c | 45 struct _hx509_password password; member in struct:hx509_lock_data 92 hx509_lock_add_password(hx509_lock lock, const char *password) 97 s = strdup(password); 101 d = realloc(lock->password.val, 102 (lock->password.len + 1) * sizeof(lock->password.val[0])); 107 lock->password.val = d; 108 lock->password.val[lock->password.len] = s; 109 lock->password.len++ [all...] |
| /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/ |
| evpkdf_pvkkdf.txt | 19 Ctrl.pass = pass:password 26 Ctrl.pass = pass:password 33 Ctrl.pass = pass:password
|
| /src/external/gpl2/xcvs/dist/src/ |
| login.c | 52 /* Construct absolute pathname to user's password file. */ 62 right thing for a GUI is to just store the password in 90 * from a ~/.cvsroot password file and return a pointer to the password if the 101 * char *password as a pointer into linebuf 112 char *password = NULL; local 146 error (0, 0, "warning: skipping invalid entry in password file at line %d", 153 password = p + 1; 160 error (0, errno, "warning: unable to convert version number in password file at line %d", 167 error (0, 0, "warning: skipping entry with invalid version string in password file at line %d" 288 char *password = NULL; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 20-test_passwd.t | 39 key => 'we have a short salt string but not a short password', 67 key => 'we have a short salt string but not a short password', 82 ok(compare1stline_re([qw{openssl passwd password}], '^.{13}\R$'), 83 'crypt password with random salt') if !disabled("des"); 84 ok(compare1stline_re([qw{openssl passwd -1 password}], '^\$1\$.{8}\$.{22}\R$'), 85 'BSD style MD5 password with random salt'); 86 ok(compare1stline_re([qw{openssl passwd -apr1 password}], '^\$apr1\$.{8}\$.{22}\R$'), 87 'Apache style MD5 password with random salt'); 88 ok(compare1stline_re([qw{openssl passwd -5 password}], '^\$5\$.{16}\$.{43}\R$'), 89 'SHA256 password with random salt') [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| test_pkcs5.c | 43 const char *password; member in struct:tests 52 { "password", 59 { "password", 66 { "password", 74 "password", "\x12\x34\x56\x78\x78\x56\x34\x12", 112 ret = PKCS5_PBKDF2_HMAC(t->password, strlen(t->password), 124 ret = PKCS5_PBKDF2_HMAC(t->password, strlen(t->password),
|
| test_pkcs12.c | 44 const char *password; member in struct:tests 109 if (t->password) 110 pwlen = strlen(t->password); 112 if (!PKCS12_key_gen(t->password, pwlen,
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 20-test_passwd.t | 67 key => 'we have a short salt string but not a short password', 75 key => 'we have a short salt string but not a short password', 86 ok(compare1stline_re([qw{openssl passwd -1 password}], '^\$1\$.{8}\$.{22}\R$'), 87 'BSD style MD5 password with random salt'); 88 ok(compare1stline_re([qw{openssl passwd -apr1 password}], '^\$apr1\$.{8}\$.{22}\R$'), 89 'Apache style MD5 password with random salt'); 90 ok(compare1stline_re([qw{openssl passwd -5 password}], '^\$5\$.{16}\$.{43}\R$'), 91 'SHA256 password with random salt'); 92 ok(compare1stline_re([qw{openssl passwd -6 password}], '^\$6\$.{16}\$.{86}\R$'), 93 'Apache SHA512 password with random salt') [all...] |
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 20-test_passwd.t | 67 key => 'we have a short salt string but not a short password', 75 key => 'we have a short salt string but not a short password', 86 ok(compare1stline_re([qw{openssl passwd -1 password}], '^\$1\$.{8}\$.{22}\R$'), 87 'BSD style MD5 password with random salt'); 88 ok(compare1stline_re([qw{openssl passwd -apr1 password}], '^\$apr1\$.{8}\$.{22}\R$'), 89 'Apache style MD5 password with random salt'); 90 ok(compare1stline_re([qw{openssl passwd -5 password}], '^\$5\$.{16}\$.{43}\R$'), 91 'SHA256 password with random salt'); 92 ok(compare1stline_re([qw{openssl passwd -6 password}], '^\$6\$.{16}\$.{86}\R$'), 93 'Apache SHA512 password with random salt') [all...] |
| /src/games/larn/ |
| config.c | 46 const char *password = "pvnert(x)"; /* the wizards password <=32 */ variable
|
| /src/crypto/external/apache2/openssl/dist/apps/include/ |
| apps_ui.h | 15 const void *password; member in struct:pw_cb_data
|