Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 198) sorted by relevance

12345678

/dragonfly/contrib/cvs-1.12/src/
H A Dlogin.c110 char *password = NULL; in password_entry_parseline() local
151 password = p + 1; in password_entry_parseline()
205 password = p + 1; in password_entry_parseline()
210 return password; in password_entry_parseline()
323 if (password != NULL) in password_entry_operation()
347 password = xstrdup (password); in password_entry_operation()
451 && (password == NULL || strcmp (password, newpassword))) in password_entry_operation()
465 if (password) in password_entry_operation()
467 free (password); in password_entry_operation()
468 password = NULL; in password_entry_operation()
[all …]
/dragonfly/crypto/openssh/
H A Dauth-passwd.c77 auth_password(struct ssh *ssh, const char *password) in auth_password() argument
86 if (strlen(password) > MAX_PASSWORD_LEN) in auth_password()
93 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password()
98 int ret = auth_krb5_password(authctxt, password); in auth_password()
106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password()
116 return (sshpam_auth_passwd(authctxt, password) && ok); in auth_password()
125 result = sys_auth_passwd(ssh, password); in auth_password()
167 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument
174 (char *)password); in sys_auth_passwd()
192 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument
[all …]
H A Dauth2-passwd.c54 char *password = NULL; in userauth_passwd() local
60 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 || in userauth_passwd()
63 freezero(password, len); in userauth_passwd()
69 else if (PRIVSEP(auth_password(ssh, password)) == 1) in userauth_passwd()
71 freezero(password, len); in userauth_passwd()
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument
65 password, password_len); in mschapv2_derive_response()
68 password, nt_response) || in mschapv2_derive_response()
70 password, peer_challenge, auth_challenge, in mschapv2_derive_response()
76 password, password_len); in mschapv2_derive_response()
79 password, password_len, in mschapv2_derive_response()
81 generate_authenticator_response(password, password_len, in mschapv2_derive_response()
96 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response()
99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
74 if (identity == NULL || password == NULL) in eap_leap_process_request()
192 const u8 *pos, *password; in eap_leap_process_response() local
201 if (password == NULL) in eap_leap_process_response()
235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response()
283 const u8 *password; in eap_leap_process() local
285 password = eap_get_config_password(sm, &password_len); in eap_leap_process()
286 if (password == NULL) { in eap_leap_process()
341 const u8 *addr[5], *password; in eap_leap_getKey() local
349 if (password == NULL) in eap_leap_getKey()
[all …]
H A Deap_otp.c33 const u8 *pos, *password; in eap_otp_process() local
45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process()
46 if (password) in eap_otp_process()
49 password = eap_get_config_password(sm, &password_len); in eap_otp_process()
53 if (password == NULL) { in eap_otp_process()
70 wpabuf_put_data(resp, password, password_len); in eap_otp_process()
72 password, password_len); in eap_otp_process()
H A Deap_pwd.c30 u8 *password; member
95 const u8 *identity, *password; in eap_pwd_init() local
102 if (password == NULL) { in eap_pwd_init()
133 os_memcpy(data->password, password, password_len); in eap_pwd_init()
363 const u8 *password; in eap_pwd_perform_commit_exchange() local
420 password = pwhashhash; in eap_pwd_perform_commit_exchange()
456 password = salthashpwd; in eap_pwd_perform_commit_exchange()
459 password, password_len); in eap_pwd_perform_commit_exchange()
490 password = salthashpwd; in eap_pwd_perform_commit_exchange()
525 password = salthashpwd; in eap_pwd_perform_commit_exchange()
[all …]
H A Deap_mschapv2.c155 const u8 *identity, *password; in eap_mschapv2_challenge_reply() local
162 if (identity == NULL || password == NULL) in eap_mschapv2_challenge_reply()
308 config->password = os_malloc(16); in eap_mschapv2_password_changed()
310 if (config->password && in eap_mschapv2_password_changed()
313 config->password)) { in eap_mschapv2_password_changed()
314 bin_clear_free(config->password, in eap_mschapv2_password_changed()
316 config->password = NULL; in eap_mschapv2_password_changed()
322 config->password = config->new_password; in eap_mschapv2_password_changed()
519 const u8 *username, *password, *new_password; in eap_mschapv2_change_password()
555 password, cp->encr_password)) in eap_mschapv2_change_password()
[all …]
H A Deap_gtc.c50 const u8 *pos, *password, *identity; in eap_gtc_process() local
77 password = eap_get_config_otp(sm, &password_len); in eap_gtc_process()
78 if (password) in eap_gtc_process()
81 password = eap_get_config_password(sm, &password_len); in eap_gtc_process()
85 if (password == NULL) { in eap_gtc_process()
113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process()
H A Deap_md5.c34 const u8 *pos, *challenge, *password; in eap_md5_process() local
38 password = eap_get_config_password(sm, &password_len); in eap_md5_process()
39 if (password == NULL) { in eap_md5_process()
89 if (chap_md5(id, password, password_len, challenge, challenge_len, in eap_md5_process()
/dragonfly/contrib/pam_passwdqc/
H A DREADME1 pam_passwdqc is a simple password strength checking module for
2 PAM-aware password changing programs, such as passwd(1). In addition
7 This module should be stacked before your usual password changing
8 module (such as pam_unix or pam_pwdb) in the password management group
9 (the "password" lines in /etc/pam.d/passwd or /etc/pam.conf). The
10 password changing module should then be told to use the provided new
11 authentication token (new password) rather than request it from the
16 option to use with the password changing module is "use_first_pass".
53 password are not counted.
61 The maximum allowed password length. This can be used to prevent
[all …]
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dms_funcs.c109 int nt_password_hash(const u8 *password, size_t password_len, in nt_password_hash() argument
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) in nt_password_hash()
173 const u8 *password, size_t password_len, in generate_nt_response() argument
181 nt_password_hash(password, password_len, password_hash) || in generate_nt_response()
283 int generate_authenticator_response(const u8 *password, size_t password_len, in generate_authenticator_response() argument
290 if (nt_password_hash(password, password_len, password_hash)) in generate_authenticator_response()
306 int nt_challenge_response(const u8 *challenge, const u8 *password, in nt_challenge_response() argument
311 if (nt_password_hash(password, password_len, password_hash) || in nt_challenge_response()
432 const u8 *password, size_t password_len, in encrypt_pw_block_with_password_hash() argument
440 if (utf8_to_ucs2(password, password_len, pw_block, 512, &ucs2_len) < 0 in encrypt_pw_block_with_password_hash()
H A Dms_funcs.h14 const u8 *password, size_t password_len,
21 int generate_authenticator_response(const u8 *password, size_t password_len,
31 int nt_challenge_response(const u8 *challenge, const u8 *password,
38 int nt_password_hash(const u8 *password, size_t password_len,
47 const u8 *password, size_t password_len,
/dragonfly/lib/libssh/openbsd-compat/
H A Dxcrypt.c98 xcrypt(const char *password, const char *salt) in xcrypt() argument
111 crypted = bigcrypt(password, salt); in xcrypt()
113 crypted = crypt(password, salt); in xcrypt()
115 crypted = bigcrypt(password, salt); in xcrypt()
117 crypted = crypt(password, salt); in xcrypt()
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Deap_user_db.c86 bin_clear_free(user->password, user->password_len); in get_user_cb()
88 user->password = (u8 *) os_strdup(argv[i]); in get_user_cb()
122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb()
123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb()
125 user->password = (u8 *) os_strdup(argv[id]); in get_wildcard_cb()
170 bin_clear_free(hapd->tmp_eap_user.password, in eap_user_sqlite_get()
215 user->identity = user->password; in eap_user_sqlite_get()
217 user->password = NULL; in eap_user_sqlite_get()
254 wsc_registrar.password = (u8 *) conf->ap_pin; in hostapd_get_eap_user()
/dragonfly/etc/pam.d/
H A DREADME25 auth: prompt for a password to authenticate that the user is
30 password: update authentication tokens.
48 use_first_pass: try authentication using password from the
50 try_first_pass: first try authentication using password from
52 prompt for a new password.
53 use_mapped_pass: convert cleartext password to a crypto key.
H A Dpasswd9 # password
10 #password requisite pam_passwdqc.so enforce=users
11 password required pam_unix.so no_warn try_first_pass nullok
H A Dsystem21 # password
22 #password sufficient pam_krb5.so no_warn try_first_pass
23 password required pam_unix.so no_warn try_first_pass
H A Dsshd22 # password
23 #password sufficient pam_krb5.so no_warn try_first_pass
24 password required pam_unix.so no_warn try_first_pass
H A Dtelnetd22 # password
23 #password sufficient pam_krb5.so no_warn try_first_pass
24 password required pam_unix.so no_warn try_first_pass
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c260 u8 *password = dpos; in eap_ttls_avp_parse() local
268 password, password_len); in eap_ttls_avp_parse()
269 parse->user_password = password; in eap_ttls_avp_parse()
558 const u8 *password, in eap_ttls_process_phase2_chap() argument
563 if (challenge == NULL || password == NULL || in eap_ttls_process_phase2_chap()
602 chap_md5(password[0], sm->user->password, sm->user->password_len, in eap_ttls_process_phase2_chap()
635 if (!sm->user || !sm->user->password || in eap_ttls_process_phase2_mschap()
713 if (!sm->user || !sm->user->password || in eap_ttls_process_phase2_mschapv2()
773 sm->user->password, in eap_ttls_process_phase2_mschapv2()
778 sm->user->password, in eap_ttls_process_phase2_mschapv2()
[all …]
/dragonfly/contrib/cryptsetup/lib/
H A Dsetup.c199 char *password = NULL; in verify_other_keyslot() local
204 if(!password) in verify_other_keyslot()
218 safe_free(password); in verify_other_keyslot()
239 if(!password) in find_keyslot_by_passphrase()
245 safe_free(password); in find_keyslot_by_passphrase()
449 if (cd->password) { in key_from_terminal()
584 cd->password = password; in crypt_set_password_callback()
741 char *password=NULL; in crypt_luksFormat() local
769 if(!password) { in crypt_luksFormat()
1454 if (!password) { in crypt_keyslot_add_by_passphrase()
[all …]
/dragonfly/usr.sbin/sshd/
H A Dauth-passwd-custom.c42 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument
55 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0) in sys_auth_passwd()
67 encrypted_password = crypt(password, salt); in sys_auth_passwd()
/dragonfly/usr.bin/chpass/
H A Dchpass.c70 const char *password; in main() local
217 password = getpass("Password: "); in main()
218 cryptpw = crypt(password, old_pw->pw_passwd); in main()
222 password = ""; in main()
236 ypclnt_passwd(ypclnt, pw, password) == -1) { in main()
/dragonfly/contrib/file/magic/Magdir/
H A Dcracklib6 0 lelong 0x70775631 Cracklib password index, little endian
10 0 belong 0x70775631 Cracklib password index, big endian
13 0 search/1 \0\0\0\0pwV1 Cracklib password index, big endian ("64-bit")

12345678