summaryrefslogtreecommitdiffstats
path: root/usr.sbin/tokeninit/tokeninit.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Use the safe idiom of cleaning sensitive data from memory with explicit_bzero,mestre2017-05-031-2/+2
| | | | | | | | | instead of relying on other methods, after readpassphrase. Some programs on this diff won't benefit that much since it happens near the terminal path, but someone might copy the unsafe idiom to another program and place it where it may leak sensitive data. Discussed aeons ago with tb@, OK deraadt@ and beck@
* tokenadm(8) is already pledged, do the same for tokeninit(8).bluhm2016-03-221-2/+10
| | | | | | | | - bring comment in both programms in line - tokeninit(8) needs "tty" for readpassphrase(3) - call token_init() after pledge(2) - fix whitespace OK millert@
* hexidecimal -> hexadecimalmmcc2016-02-121-2/+2
|
* assign pointers to NULL rather than 0mmcc2015-12-221-2/+2
|
* clean up flags++ instances around getopt()deraadt2015-02-091-3/+3
| | | | ok florian
* Replace <sys/param.h> with <limits.h> and other less dirty headers wherederaadt2015-01-161-2/+3
| | | | | | | | | possible. Annotate <sys/param.h> lines with their current reasons. Switch to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc. Change MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where sensible to avoid pulling in the pollution. These are the files confirmed through binary verification. ok guenther, millert, doug (helped with the verification protocol)
* an ellipsis is not an optional argument.sobrado2008-07-091-2/+2
|
* simplify synopsis/usage() and sort options;jmc2007-03-151-2/+2
| | | | from Igor Sobrado
* unsigned to unsigned intderaadt2002-05-271-3/+3
|
* Remove \n from err/errx/warn/warnx().mpech2002-03-141-3/+3
| | | | millert@ ok
* getopt(3) returns -1 when out of args, not EOF.mpech2001-10-241-2/+2
| | | | millert@ ok
* use arc4random, clear secrets, use readpassphrase in tokeninit; ok millert@markus2000-12-201-34/+16
|
* Commands for manipulating the token database (ActivCard, CRYPTOCard, or SNK-004)millert2000-12-201-0/+238
from BSDi. Will be enabled when BSD authentication is turned on (login_token).