summaryrefslogtreecommitdiffstats
path: root/libexec/login_passwd (follow)
Commit message (Expand)AuthorAgeFilesLines
* Check auth_mkvalue(3) return value for NULL (malloc failure).millert2021-01-021-3/+2
* Fix handling of passwd entries with an empty password.millert2020-05-151-4/+5
* Merge two missed fixes from login.c to login_passwd.c.millert2019-12-241-4/+5
* Replace modular version with origin BSDi version with our updates.millert2019-12-214-252/+133
* Return BI_SILENT not BI_AUTH if the challenge service is requested.millert2019-12-141-2/+2
* I am retiring my old email address; replace it with my OpenBSD one.millert2019-01-251-3/+3
* Remove the hopefully last remnants of kerberos in there: arg_login,ajacoutot2018-09-301-12/+1
* Call pledge(2) earlier before opening the auth channel and readpassphrase()reyk2018-06-133-8/+15
* Remove #ifdef PASSWD, it was always enabled and is a leftover from krb5 days.reyk2018-06-133-11/+5
* set password to return of readpassphrase(), not always the buffer.tedu2016-09-031-3/+2
* convert to use readpassphrase() instead of DEPRECATED/getpass()gsoares2016-09-032-4/+6
* krb5 bits should rest in peacegsoares2016-09-022-9/+2
* remove unneeded caststedu2016-08-161-2/+2
* Call syslog() if login_* pledge fails; OK deraadt@millert2015-11-191-3/+5
* use _shadow getpw functions. these utilities obviously deal with hashes.tedu2015-11-181-2/+2
* Don't compile pwd_gensalt, it's not needed since we use crypt_checkpass.ajacoutot2015-10-242-5/+3
* pledge "stdio rpath" is good enough for these mainline BSD auth loginderaadt2015-10-141-1/+5
* Use explicit_bzero() instead of memset() for zeroing out secrets.millert2015-10-052-4/+4
* add some missing .Cm macros and drop some redundant .Bk while hereschwarze2015-09-111-8/+8
* Replace <sys/param.h> with <limits.h> and other less dirty headers wherederaadt2015-01-162-4/+4
* use crypt_checkpass function to make things simpletedu2014-09-161-22/+7
* add a krb5-noverify option for login.conf that disables verificationdlg2012-06-012-4/+4
* improve synopsis markup of login_* utilities; use a more standardsobrado2012-02-011-4/+4
* convert to new .Dd format;jmc2007-05-311-2/+2
* a FALLTHROUGH and one size_t castderaadt2006-04-021-2/+3
* Foil potential timing attacks by using the correct password hashmillert2006-03-093-8/+17
* drop some krb4 stuffbiorn2005-04-142-8/+2
* login_passwd needs to be setuid root after all for "secure" YP maps.millert2004-05-121-3/+3
* More checking for a NULL return value from getpass(). otto@ OKmillert2004-03-102-3/+6
* spacesderaadt2003-07-291-2/+2
* Sync with share/misc/license.template and add missing DARPA creditmillert2003-06-171-8/+8
* Use an ISC-tyle license for all my code; it is simpler and more permissive.millert2003-06-031-22/+11
* login_passwd is now setgid _shadow instead of setuid root.millert2003-03-281-3/+3
* incorrect string length matching; ianm@cit.uws.edu.auderaadt2003-03-171-7/+7
* ansi; ok millert pvalchevderaadt2002-09-061-2/+1
* o) start new sentence on a new line;mpech2002-08-281-2/+2
* minor KNFderaadt2002-06-021-4/+4
* Only accept the empty string for users with no password.millert2002-03-191-10/+13
* Do not set handler for SIGINT and SIGQUIT to SIG_IGN since it preventsmillert2001-12-061-3/+1
* o) fix bogus .Xr usage;mpech2001-11-131-2/+3
* some KNFmillert2001-08-121-6/+6
* o wheel and lastchance are -v args (variable), not -s (service)millert2001-08-091-22/+25
* Remove extraneous .Pp after .Shmillert2001-07-081-2/+1
* uglyderaadt2001-06-291-10/+9
* Cleanup and unify login_passwd, login_krb4, login_krb4-or-pwd, login_krb5 andhin2001-06-264-141/+266
* Remove instance stuff now that su uses an explicit option to specifymillert2001-06-251-14/+2
* Don't do the root instance handling stuff; su no longer does it.hin2001-06-251-17/+3
* passwd login script; authenticates the user via passwd/ypmillert2000-12-123-0/+323