/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_npas.c | 69 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 70 static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, char *oldpass, 72 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 79 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument 91 if (!PKCS12_verify_mac(p12, oldpass, -1)) { 96 if (!newpass_p12(p12, oldpass, newpass)) { 106 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument 126 bags = PKCS12_unpack_p7encdata(p7, oldpass, -1); 138 if (!newpass_bags(bags, oldpass, newpass)) { 187 static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, char *oldpass, 200 newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument [all...] |
H A D | pkcs12.h | 273 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_npas.c | 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 69 static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, char *oldpass, 71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument 89 if (!PKCS12_verify_mac(p12, oldpass, -1)) { 94 if (!newpass_p12(p12, oldpass, newpass)) { 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument 122 bags = PKCS12_unpack_p7encdata(p7, oldpass, -1); 130 if (!newpass_bags(bags, oldpass, newpass)) { 173 static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, char *oldpass, 187 newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument [all...] |
H A D | pkcs12.h | 265 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_npas.c | 69 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 70 static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, char *oldpass, 72 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 79 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument 91 if (!PKCS12_verify_mac(p12, oldpass, -1)) { 96 if (!newpass_p12(p12, oldpass, newpass)) { 106 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument 126 bags = PKCS12_unpack_p7encdata(p7, oldpass, -1); 138 if (!newpass_bags(bags, oldpass, newpass)) { 187 static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, char *oldpass, 200 newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument [all...] |
H A D | pkcs12.h | 273 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/LDAP/smbldap-tools-0.9.2/ |
H A D | smbldap-passwd | 51 my $oldpass= undef; 93 if (!defined($oldpass)) { 97 chomp($oldpass=<STDIN>); 102 $config{masterPw}="$oldpass"; 105 if (!is_user_valid($user, $dn, $oldpass)) { 201 $config{masterPw}="$oldpass"; 234 $oldpass
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | chgpasswd.c | 451 const char *oldpass, const char *newpass, BOOL as_root) 458 if (!oldpass) { 459 oldpass = ""; 465 DEBUG(100, ("chgpasswd: Passwords: old=%s new=%s\n", oldpass, newpass)); 471 if (strcmp(oldpass, newpass) == 0) { 482 len = strlen(oldpass); 484 if (iscntrl((int)oldpass[i])) { 485 DEBUG(0, ("chgpasswd: oldpass contains control characters (disallowed).\n")); 506 ret = smb_pam_passchange(pass->pw_name, oldpass, newpass); 508 ret = smb_pam_passchange(name, oldpass, newpas 450 chgpasswd(const char *name, const struct passwd *pass, const char *oldpass, const char *newpass, BOOL as_root) argument 561 chgpasswd(const char *name, const struct passwd *pass, const char *oldpass, const char *newpass, BOOL as_root) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | winbind_nss_aix.c | 908 static int wb_aix_chpass(char *user, char *oldpass, char *newpass, char **message) argument 923 logit("chpass '%s' old='%s' new='%s'\n", r_user, oldpass, newpass); 932 STRCPY_RET(request.data.chauthtok.oldpass, oldpass); 955 static int wb_aix_passwdrestrictions(char *user, char *newpass, char *oldpass, argument
|
H A D | winbindd_nss.h | 260 fstring oldpass; member in struct:winbindd_request::__anon5839::__anon5842
|
H A D | pam_winbind.c | 1148 const char *oldpass, 1164 if (oldpass != NULL) { 1165 strncpy(request.data.chauthtok.oldpass, oldpass, 1166 sizeof(request.data.chauthtok.oldpass) - 1); 1168 request.data.chauthtok.oldpass[0] = '\0'; 1145 winbind_chauthtok_request(pam_handle_t * pamh, int ctrl, const char *user, const char *oldpass, const char *newpass, time_t pwd_last_set) argument
|
H A D | winbindd_pam.c | 1968 char *oldpass; local 1987 oldpass = state->request.data.chauthtok.oldpass; 2002 result = rpccli_samr_chgpasswd3(cli, state->mem_ctx, user, newpass, oldpass, &info, &reject); 2032 result = rpccli_samr_chgpasswd_user(cli, state->mem_ctx, user, newpass, oldpass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpcclient/ |
H A D | cmd_samr.c | 2072 const char *user, *oldpass, *newpass; local 2076 printf("Usage: %s username oldpass newpass\n", argv[0]); 2081 oldpass = argv[2]; 2102 result = rpccli_samr_chgpasswd_user(cli, mem_ctx, user, newpass, oldpass); 2126 const char *user, *oldpass, *newpass; local 2132 printf("Usage: %s username oldpass newpass\n", argv[0]); 2137 oldpass = argv[2]; 2158 result = rpccli_samr_chgpasswd3(cli, mem_ctx, user, newpass, oldpass, &info, &reject);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | pampass.c | 187 static void pwd_sub(char *buf, const char *username, const char *oldpass, const char *newpass) argument 190 all_string_sub(buf, "%o", oldpass, sizeof(fstring));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | pkcs12.h | 265 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
|