/dragonfly/contrib/cvs-1.12/src/ |
H A D | login.c | 110 char *password = NULL; in password_entry_parseline() local 151 password = p + 1; in password_entry_parseline() 205 password = p + 1; in password_entry_parseline() 210 return password; in password_entry_parseline() 323 if (password != NULL) in password_entry_operation() 347 password = xstrdup (password); in password_entry_operation() 451 && (password == NULL || strcmp (password, newpassword))) in password_entry_operation() 465 if (password) in password_entry_operation() 467 free (password); in password_entry_operation() 468 password = NULL; in password_entry_operation() [all …]
|
/dragonfly/crypto/openssh/ |
H A D | auth-passwd.c | 77 auth_password(struct ssh *ssh, const char *password) in auth_password() argument 86 if (strlen(password) > MAX_PASSWORD_LEN) in auth_password() 93 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password() 98 int ret = auth_krb5_password(authctxt, password); in auth_password() 106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password() 116 return (sshpam_auth_passwd(authctxt, password) && ok); in auth_password() 125 result = sys_auth_passwd(ssh, password); in auth_password() 167 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument 174 (char *)password); in sys_auth_passwd() 192 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument [all …]
|
H A D | auth2-passwd.c | 54 char *password = NULL; in userauth_passwd() local 60 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 || in userauth_passwd() 63 freezero(password, len); in userauth_passwd() 69 else if (PRIVSEP(auth_password(ssh, password)) == 1) in userauth_passwd() 71 freezero(password, len); in userauth_passwd()
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 65 password, password_len); in mschapv2_derive_response() 68 password, nt_response) || in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 76 password, password_len); in mschapv2_derive_response() 79 password, password_len, in mschapv2_derive_response() 81 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 96 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response() 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 74 if (identity == NULL || password == NULL) in eap_leap_process_request() 192 const u8 *pos, *password; in eap_leap_process_response() local 201 if (password == NULL) in eap_leap_process_response() 235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response() 283 const u8 *password; in eap_leap_process() local 285 password = eap_get_config_password(sm, &password_len); in eap_leap_process() 286 if (password == NULL) { in eap_leap_process() 341 const u8 *addr[5], *password; in eap_leap_getKey() local 349 if (password == NULL) in eap_leap_getKey() [all …]
|
H A D | eap_otp.c | 33 const u8 *pos, *password; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 46 if (password) in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 53 if (password == NULL) { in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process()
|
H A D | eap_pwd.c | 30 u8 *password; member 95 const u8 *identity, *password; in eap_pwd_init() local 102 if (password == NULL) { in eap_pwd_init() 133 os_memcpy(data->password, password, password_len); in eap_pwd_init() 363 const u8 *password; in eap_pwd_perform_commit_exchange() local 420 password = pwhashhash; in eap_pwd_perform_commit_exchange() 456 password = salthashpwd; in eap_pwd_perform_commit_exchange() 459 password, password_len); in eap_pwd_perform_commit_exchange() 490 password = salthashpwd; in eap_pwd_perform_commit_exchange() 525 password = salthashpwd; in eap_pwd_perform_commit_exchange() [all …]
|
H A D | eap_mschapv2.c | 155 const u8 *identity, *password; in eap_mschapv2_challenge_reply() local 162 if (identity == NULL || password == NULL) in eap_mschapv2_challenge_reply() 308 config->password = os_malloc(16); in eap_mschapv2_password_changed() 310 if (config->password && in eap_mschapv2_password_changed() 313 config->password)) { in eap_mschapv2_password_changed() 314 bin_clear_free(config->password, in eap_mschapv2_password_changed() 316 config->password = NULL; in eap_mschapv2_password_changed() 322 config->password = config->new_password; in eap_mschapv2_password_changed() 519 const u8 *username, *password, *new_password; in eap_mschapv2_change_password() 555 password, cp->encr_password)) in eap_mschapv2_change_password() [all …]
|
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; in eap_gtc_process() local 77 password = eap_get_config_otp(sm, &password_len); in eap_gtc_process() 78 if (password) in eap_gtc_process() 81 password = eap_get_config_password(sm, &password_len); in eap_gtc_process() 85 if (password == NULL) { in eap_gtc_process() 113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process()
|
H A D | eap_md5.c | 34 const u8 *pos, *challenge, *password; in eap_md5_process() local 38 password = eap_get_config_password(sm, &password_len); in eap_md5_process() 39 if (password == NULL) { in eap_md5_process() 89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
|
/dragonfly/contrib/pam_passwdqc/ |
H A D | README | 1 pam_passwdqc is a simple password strength checking module for 2 PAM-aware password changing programs, such as passwd(1). In addition 7 This module should be stacked before your usual password changing 8 module (such as pam_unix or pam_pwdb) in the password management group 9 (the "password" lines in /etc/pam.d/passwd or /etc/pam.conf). The 10 password changing module should then be told to use the provided new 11 authentication token (new password) rather than request it from the 16 option to use with the password changing module is "use_first_pass". 53 password are not counted. 61 The maximum allowed password length. This can be used to prevent [all …]
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash() 173 const u8 *password, size_t password_len, in generate_nt_response() argument 181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response() 283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument 290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response() 306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response() argument 311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response() 432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument 440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash()
|
H A D | ms_funcs.h | 14 const u8 *password, size_t password_len, 21 int generate_authenticator_response(const u8 *password, size_t password_len, 31 int nt_challenge_response(const u8 *challenge, const u8 *password, 38 int nt_password_hash(const u8 *password, size_t password_len, 47 const u8 *password, size_t password_len,
|
/dragonfly/lib/libssh/openbsd-compat/ |
H A D | xcrypt.c | 98 xcrypt(const char *password, const char *salt) in xcrypt() argument 111 crypted = bigcrypt(password, salt); in xcrypt() 113 crypted = crypt(password, salt); in xcrypt() 115 crypted = bigcrypt(password, salt); in xcrypt() 117 crypted = crypt(password, salt); in xcrypt()
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | eap_user_db.c | 86 bin_clear_free(user->password, user->password_len); in get_user_cb() 88 user->password = (u8 *) os_strdup(argv[i]); in get_user_cb() 122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb() 123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb() 125 user->password = (u8 *) os_strdup(argv[id]); in get_wildcard_cb() 170 bin_clear_free(hapd->tmp_eap_user.password, in eap_user_sqlite_get() 215 user->identity = user->password; in eap_user_sqlite_get() 217 user->password = NULL; in eap_user_sqlite_get() 254 wsc_registrar.password = (u8 *) conf->ap_pin; in hostapd_get_eap_user()
|
/dragonfly/etc/pam.d/ |
H A D | README | 25 auth: prompt for a password to authenticate that the user is 30 password: update authentication tokens. 48 use_first_pass: try authentication using password from the 50 try_first_pass: first try authentication using password from 52 prompt for a new password. 53 use_mapped_pass: convert cleartext password to a crypto key.
|
H A D | passwd | 9 # password 10 #password requisite pam_passwdqc.so enforce=users 11 password required pam_unix.so no_warn try_first_pass nullok
|
H A D | system | 21 # password 22 #password sufficient pam_krb5.so no_warn try_first_pass 23 password required pam_unix.so no_warn try_first_pass
|
H A D | sshd | 22 # password 23 #password sufficient pam_krb5.so no_warn try_first_pass 24 password required pam_unix.so no_warn try_first_pass
|
H A D | telnetd | 22 # password 23 #password sufficient pam_krb5.so no_warn try_first_pass 24 password required pam_unix.so no_warn try_first_pass
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 260 u8 *password = dpos; in eap_ttls_avp_parse() local 268 password, password_len); in eap_ttls_avp_parse() 269 parse->user_password = password; in eap_ttls_avp_parse() 558 const u8 *password, in eap_ttls_process_phase2_chap() argument 563 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap() 602 chap_md5(password[0], sm->user->password, sm->user->password_len, in eap_ttls_process_phase2_chap() 635 if (!sm->user || !sm->user->password || in eap_ttls_process_phase2_mschap() 713 if (!sm->user || !sm->user->password || in eap_ttls_process_phase2_mschapv2() 773 sm->user->password, in eap_ttls_process_phase2_mschapv2() 778 sm->user->password, in eap_ttls_process_phase2_mschapv2() [all …]
|
/dragonfly/contrib/cryptsetup/lib/ |
H A D | setup.c | 199 char *password = NULL; in verify_other_keyslot() local 204 if(!password) in verify_other_keyslot() 218 safe_free(password); in verify_other_keyslot() 239 if(!password) in find_keyslot_by_passphrase() 245 safe_free(password); in find_keyslot_by_passphrase() 449 if (cd->password) { in key_from_terminal() 584 cd->password = password; in crypt_set_password_callback() 741 char *password=NULL; in crypt_luksFormat() local 769 if(!password) { in crypt_luksFormat() 1454 if (!password) { in crypt_keyslot_add_by_passphrase() [all …]
|
/dragonfly/usr.sbin/sshd/ |
H A D | auth-passwd-custom.c | 42 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument 55 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0) in sys_auth_passwd() 67 encrypted_password = crypt(password, salt); in sys_auth_passwd()
|
/dragonfly/usr.bin/chpass/ |
H A D | chpass.c | 70 const char *password; in main() local 217 password = getpass("Password: "); in main() 218 cryptpw = crypt(password, old_pw->pw_passwd); in main() 222 password = ""; in main() 236 ypclnt_passwd(ypclnt, pw, password) == -1) { in main()
|
/dragonfly/contrib/file/magic/Magdir/ |
H A D | cracklib | 6 0 lelong 0x70775631 Cracklib password index, little endian 10 0 belong 0x70775631 Cracklib password index, big endian 13 0 search/1 \0\0\0\0pwV1 Cracklib password index, big endian ("64-bit")
|