/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 23-srp.cnf | 6 test-1 = 1-srp-bad-password 8 test-3 = 3-srp-auth-bad-password 36 SRPPassword = password 40 SRPPassword = password 46 [1-srp-bad-password] 49 [1-srp-bad-password-ssl] 71 SRPPassword = password 106 SRPPassword = password 110 SRPPassword = password 116 [3-srp-auth-bad-password] [all …]
|
H A D | 23-srp.cnf.in | 24 "SRPPassword" => "password", 32 "SRPPassword" => "password", 40 name => "srp-bad-password", 46 "SRPPassword" => "password", 69 "SRPPassword" => "password", 77 "SRPPassword" => "password", 85 name => "srp-auth-bad-password", 91 "SRPPassword" => "password",
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | salt-des.c | 61 password[i] = c ? c : 'X'; in krb5_DES_AFS3_CMU_string_to_key() 63 password[8] = '\0'; in krb5_DES_AFS3_CMU_string_to_key() 86 char password[512]; in krb5_DES_AFS3_Transarc_string_to_key() local 89 memcpy(password, pw.data, min(pw.length, sizeof(password))); in krb5_DES_AFS3_Transarc_string_to_key() 90 if(pw.length < sizeof(password)) { in krb5_DES_AFS3_Transarc_string_to_key() 96 password[i] = tolower((unsigned char)password[i]); in krb5_DES_AFS3_Transarc_string_to_key() 112 memset(password, 0, sizeof(password)); in krb5_DES_AFS3_Transarc_string_to_key() 120 krb5_data password, in DES_AFS3_string_to_key() argument 126 if(password.length > 8) in DES_AFS3_string_to_key() 173 krb5_data password, in krb5_DES_string_to_key() argument [all …]
|
H A D | salt-des3.c | 40 krb5_data password, in DES3_string_to_key() argument 51 len = password.length + salt.saltvalue.length; in DES3_string_to_key() 57 memcpy(str, password.data, password.length); in DES3_string_to_key() 58 memcpy(str + password.length, salt.saltvalue.data, salt.saltvalue.length); in DES3_string_to_key() 105 krb5_data password, in DES3_string_to_key_derived() argument 111 size_t len = password.length + salt.saltvalue.length; in DES3_string_to_key_derived() 119 memcpy(s, password.data, password.length); in DES3_string_to_key_derived() 120 memcpy(s + password.length, salt.saltvalue.data, salt.saltvalue.length); in DES3_string_to_key_derived()
|
H A D | salt.c | 140 krb5_data password, in krb5_string_to_key_data() argument 158 const char *password, in krb5_string_to_key() argument 163 pw.data = rk_UNCONST(password); in krb5_string_to_key() 164 pw.length = strlen(password); in krb5_string_to_key() 171 krb5_data password, in krb5_string_to_key_data_salt() argument 190 krb5_data password, in krb5_string_to_key_data_salt_opaque() argument 223 const char *password, in krb5_string_to_key_salt() argument 228 pw.data = rk_UNCONST(password); in krb5_string_to_key_salt() 229 pw.length = strlen(password); in krb5_string_to_key_salt() 236 const char *password, in krb5_string_to_key_salt_opaque() argument [all …]
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | lock.c | 92 s = strdup(password); in hx509_lock_add_password() 96 d = realloc(lock->password.val, in hx509_lock_add_password() 97 (lock->password.len + 1) * sizeof(lock->password.val[0])); in hx509_lock_add_password() 102 lock->password.val = d; in hx509_lock_add_password() 103 lock->password.val[lock->password.len] = s; in hx509_lock_add_password() 104 lock->password.len++; in hx509_lock_add_password() 112 return &lock->password; in _hx509_lock_get_passwords() 126 free(lock->password.val[i]); in hx509_lock_reset_passwords() 127 free(lock->password.val); in hx509_lock_reset_passwords() 128 lock->password.val = NULL; in hx509_lock_reset_passwords() [all …]
|
/freebsd/contrib/pam_modules/pam_passwdqc/ |
H A D | README | 1 pam_passwdqc is a simple password strength checking module for 2 PAM-aware password changing programs, such as passwd(1). In addition 7 This module should be stacked before your usual password changing 8 module (such as pam_unix or pam_pwdb) in the password management group 9 (the "password" lines in /etc/pam.d/passwd or /etc/pam.conf). The 10 password changing module should then be told to use the provided new 11 authentication token (new password) rather than request it from the 45 password are not counted. 53 The maximum allowed password length. This can be used to prevent 60 the traditional crypt(3) password hashes. [all …]
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | sample_passwd_check.c | 51 krb5_data *password) in check_length() argument 57 if(password->length < min_length) in check_length() 71 krb5_data *password) in check_cracklib() argument 73 char *s = malloc(password->length + 1); in check_cracklib() 80 memcpy(s, password->data, password->length); in check_cracklib() 81 s[password->length] = '\0'; in check_cracklib() 83 memset(s, 0, password->length); in check_cracklib()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_default_passwd_cb.pod | 27 SSL_CTX_set_default_passwd_cb() sets the default password callback called 31 which will be provided to the password callback on invocation. 46 password to be used during decryption. 49 B<buf> which is of size B<size>. The actual length of the password must 57 When loading or storing private keys, a password might be supplied to 63 password could be stored into the userdata storage and the 64 callback only returns the password already stored. 66 When asking for the password interactively, the callback can use 68 In this case the password dialog may ask for the same password twice 82 calling function. The password is considered to be a '\0' terminated [all …]
|
/freebsd/crypto/openssh/ |
H A D | auth-passwd.c | 77 auth_password(struct ssh *ssh, const char *password) in auth_password() argument 86 if (strlen(password) > MAX_PASSWORD_LEN) in auth_password() 93 if (*password == '\0' && options.permit_empty_passwd == 0) in auth_password() 98 int ret = auth_krb5_password(authctxt, password); in auth_password() 106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password() 116 return (sshpam_auth_passwd(authctxt, password) && ok); in auth_password() 125 result = sys_auth_passwd(ssh, password); in auth_password() 167 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument 174 (char *)password); in sys_auth_passwd() 192 sys_auth_passwd(struct ssh *ssh, const char *password) in sys_auth_passwd() argument [all …]
|
H A D | auth2-passwd.c | 54 char *password = NULL; in userauth_passwd() local 60 (r = sshpkt_get_cstring(ssh, &password, &len)) != 0 || in userauth_passwd() 63 freezero(password, len); in userauth_passwd() 69 else if (PRIVSEP(auth_password(ssh, password)) == 1) in userauth_passwd() 71 freezero(password, len); in userauth_passwd()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-passphrase-options.pod | 16 Several OpenSSL commands accept password arguments, typically using B<-passin> 18 the password to be obtained from a variety of sources. Both of these 20 password argument is given and a password is required then the user is 35 =item B<pass:>I<password> 37 The actual password is I<password>. Since the password is visible 43 Obtain the password from the environment variable I<var>. Since 49 The first line of I<pathname> is the password. If the same I<pathname> 51 line will be used for the input password and the next line for the output 52 password. I<pathname> need not refer to a regular file: it could for example 57 Read the password from the file descriptor I<number>. This can be used to [all …]
|
H A D | openssl-passwd.pod.in | 6 openssl-passwd - compute password hashes 26 [I<password>] 30 This command computes the hash of a password typed at 31 run-time or the hash of each password in a list. The password list is 45 Use the MD5 based BSD password algorithm B<1> (default). 65 When reading a password from the terminal, this implies B<-noverify>. 77 Don't verify when reading a password from the terminal. 86 to each password hash. 100 % openssl passwd -1 -salt xxxxxxxx password 103 % openssl passwd -apr1 -salt xxxxxxxx password [all …]
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, in mschapv2_derive_response() argument 65 password, password_len); in mschapv2_derive_response() 68 password, nt_response) || in mschapv2_derive_response() 70 password, peer_challenge, auth_challenge, in mschapv2_derive_response() 76 password, password_len); in mschapv2_derive_response() 79 password, password_len, in mschapv2_derive_response() 81 generate_authenticator_response(password, password_len, in mschapv2_derive_response() 96 if (hash_nt_password_hash(password, password_hash_hash)) in mschapv2_derive_response() 99 if (nt_password_hash(password, password_len, password_hash) || in mschapv2_derive_response()
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 74 if (identity == NULL || password == NULL) in eap_leap_process_request() 192 const u8 *pos, *password; in eap_leap_process_response() local 201 if (password == NULL) in eap_leap_process_response() 235 if (hash_nt_password_hash(password, pw_hash_hash)) { in eap_leap_process_response() 283 const u8 *password; in eap_leap_process() local 285 password = eap_get_config_password(sm, &password_len); in eap_leap_process() 286 if (password == NULL) { in eap_leap_process() 341 const u8 *addr[5], *password; in eap_leap_getKey() local 349 if (password == NULL) in eap_leap_getKey() [all …]
|
H A D | eap_otp.c | 33 const u8 *pos, *password; in eap_otp_process() local 45 password = eap_get_config_otp(sm, &password_len); in eap_otp_process() 46 if (password) in eap_otp_process() 49 password = eap_get_config_password(sm, &password_len); in eap_otp_process() 53 if (password == NULL) { in eap_otp_process() 70 wpabuf_put_data(resp, password, password_len); in eap_otp_process() 72 password, password_len); in eap_otp_process()
|
/freebsd/crypto/heimdal/lib/hdb/ |
H A D | ext.c | 301 *ext->data.u.password.mkvno); in hdb_entry_get_password() 306 ext->data.u.password.password.data, in hdb_entry_get_password() 307 ext->data.u.password.password.length, in hdb_entry_get_password() 310 ret = der_copy_octet_string(&ext->data.u.password.password, &pw); in hdb_entry_get_password() 367 &ext.data.u.password.password); in hdb_entry_set_password() 371 ext.data.u.password.mkvno = in hdb_entry_set_password() 372 malloc(sizeof(*ext.data.u.password.mkvno)); in hdb_entry_set_password() 373 if (ext.data.u.password.mkvno == NULL) { in hdb_entry_set_password() 378 *ext.data.u.password.mkvno = _hdb_mkey_version(key); in hdb_entry_set_password() 381 ext.data.u.password.mkvno = NULL; in hdb_entry_set_password() [all …]
|
/freebsd/contrib/wpa/hostapd/ |
H A D | hostapd.eap_user | 20 # password option. 22 # password. 49 # plaintext password while TTLS-MSCHAP and TTLS-MSCHAPV2 can use NT password 59 "user" MD5 "password" 62 "DOMAIN\user" MSCHAPV2 "password" 63 "gtc user" GTC "password" 86 "t-md5" MD5 "password" [2] 87 "DOMAIN\t-mschapv2" MSCHAPV2 "password" [2] 88 "t-gtc" GTC "password" [2] 89 "not anonymous" MSCHAPV2 "password" [2] [all …]
|
H A D | nt_password_hash.c | 19 char *password, buf[64], *pos; in main() local 22 password = argv[1]; in main() 37 password = buf; in main() 40 if (nt_password_hash((u8 *) password, strlen(password), password_hash)) in main()
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 1740 password="foobar" 1755 password="foobar" 1768 password="foobar" 1827 password=06b4be19da289f475aa46a33cb793029 1854 password="foobar" 1863 password="foobar" 1873 password="password" 1884 password="password" 1974 password="foobar" 2010 password="foobar" [all …]
|
/freebsd/crypto/heimdal/kadmin/ |
H A D | cpw.c | 40 char *password; member 82 set_password (krb5_principal principal, char *password) in set_password() argument 87 if(password == NULL) { in set_password() 99 password = pwbuf; in set_password() 102 ret = kadm5_chpass_principal(kadm_handle, principal, password); in set_password() 129 return set_password (principal, e->password); in do_cpw_entry() 143 data.password = opt->password_string; in cpw_entry() 151 if (data.password) in cpw_entry()
|
H A D | ank.c | 70 char *password, in add_one_principal() argument 120 password = pwbuf; in add_one_principal() 123 password = pwbuf; in add_one_principal() 124 } else if(password == NULL) { in add_one_principal() 138 password = pwbuf; in add_one_principal() 141 ret = kadm5_create_principal(kadm_handle, &princ, mask, password); in add_one_principal() 181 printf ("added %s with password \"%s\"\n", princ_name, password); in add_one_principal() 189 if (password != NULL) in add_one_principal() 190 memset (password, 0, strlen(password)); in add_one_principal()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | string2key.c | 42 char *password; variable 54 { "password", 'w', arg_string, &password, "Password to use", "password" }, 158 password = argv[0]; in main() 159 if(password == NULL){ in main() 162 password = buf; in main() 168 tokey(context, etype, password, salt, "Kerberos 5 (%s)"); in main() 175 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "Kerberos 4"); in main() 181 tokey(context, ETYPE_DES_CBC_MD5, password, salt, "AFS"); in main()
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppbe_pbkdf2.txt | 17 Password = "password" 24 Password = "password" 31 Password = "password" 38 Password = "password" 45 Password = "password" 52 Password = "password" 59 Password = "password" 66 Password = "password" 73 Password = "password"
|
/freebsd/usr.sbin/bsdconfig/share/ |
H A D | mustberoot.subr | 161 local password nfailures=0 retval 164 password=$( $DIALOG \ 178 f_die $retval "$password" 184 password=$( $DIALOG \ 202 $password 205 unset password # scrub memory 309 --password --2inputsbox "$msg" \ 325 local user password 327 password="${user_pass#*/}" 360 $password [all …]
|