/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_npas.c | 69 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 71 char *newpass); 72 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 79 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument 96 if (!newpass_p12(p12, oldpass, newpass)) { 106 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument 138 if (!newpass_bags(bags, oldpass, newpass)) { 147 p7new = PKCS12_pack_p7encdata(pbe_nid, newpass, -1, NULL, 166 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) 188 char *newpass) 200 newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument [all...] |
H A D | pkcs12.h | 273 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_npas.c | 68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 70 char *newpass); 71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument 94 if (!newpass_p12(p12, oldpass, newpass)) { 104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument 130 if (!newpass_bags(bags, oldpass, newpass)) { 137 else p7new = PKCS12_pack_p7encdata(pbe_nid, newpass, -1, NULL, 154 if(!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) goto saferr; 174 char *newpass) 187 newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument [all...] |
H A D | pkcs12.h | 265 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_npas.c | 69 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); 71 char *newpass); 72 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); 79 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument 96 if (!newpass_p12(p12, oldpass, newpass)) { 106 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument 138 if (!newpass_bags(bags, oldpass, newpass)) { 147 p7new = PKCS12_pack_p7encdata(pbe_nid, newpass, -1, NULL, 166 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) 188 char *newpass) 200 newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument [all...] |
H A D | pkcs12.h | 273 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | chgpasswd.c | 451 const char *oldpass, const char *newpass, BOOL as_root) 465 DEBUG(100, ("chgpasswd: Passwords: old=%s new=%s\n", oldpass, newpass)); 471 if (strcmp(oldpass, newpass) == 0) { 490 len = strlen(newpass); 492 if (iscntrl((int)newpass[i])) { 493 DEBUG(0, ("chgpasswd: newpass contains control characters (disallowed).\n")); 506 ret = smb_pam_passchange(pass->pw_name, oldpass, newpass); 508 ret = smb_pam_passchange(name, oldpass, newpass); 554 all_string_sub(chatsequence, "%n", newpass, sizeof(pstring)); 562 const char *oldpass, const char *newpass, BOO 450 chgpasswd(const char *name, const struct passwd *pass, const char *oldpass, const char *newpass, BOOL as_root) argument 561 chgpasswd(const char *name, const struct passwd *pass, const char *oldpass, const char *newpass, BOOL as_root) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | pampass.c | 187 static void pwd_sub(char *buf, const char *username, const char *oldpass, const char *newpass) argument 191 all_string_sub(buf, "%n", newpass, sizeof(fstring)); 406 const char *passwd, const char *newpass) 419 udp->PAM_newpassword = newpass; 405 smb_setup_pam_conv(smb_pam_conv_fn smb_pam_conv_fnptr, const char *user, const char *passwd, const char *newpass) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | winbind_nss_aix.c | 908 static int wb_aix_chpass(char *user, char *oldpass, char *newpass, char **message) argument 923 logit("chpass '%s' old='%s' new='%s'\n", r_user, oldpass, newpass); 933 STRCPY_RET(request.data.chauthtok.newpass, newpass); 955 static int wb_aix_passwdrestrictions(char *user, char *newpass, char *oldpass, argument
|
H A D | winbindd_nss.h | 261 fstring newpass; member in struct:winbindd_request::__anon5839::__anon5842
|
H A D | pam_winbind.c | 1149 const char *newpass, 1171 if (newpass != NULL) { 1172 strncpy(request.data.chauthtok.newpass, newpass, 1173 sizeof(request.data.chauthtok.newpass) - 1); 1175 request.data.chauthtok.newpass[0] = '\0'; 1145 winbind_chauthtok_request(pam_handle_t * pamh, int ctrl, const char *user, const char *oldpass, const char *newpass, time_t pwd_last_set) argument
|
H A D | winbindd_pam.c | 1969 char *newpass = NULL; local 1988 newpass = state->request.data.chauthtok.newpass; 2002 result = rpccli_samr_chgpasswd3(cli, state->mem_ctx, user, newpass, oldpass, &info, &reject); 2032 result = rpccli_samr_chgpasswd_user(cli, state->mem_ctx, user, newpass, oldpass); 2048 newpass); 2058 newpass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpcclient/ |
H A D | cmd_samr.c | 2072 const char *user, *oldpass, *newpass; local 2076 printf("Usage: %s username oldpass newpass\n", argv[0]); 2082 newpass = argv[3]; 2102 result = rpccli_samr_chgpasswd_user(cli, mem_ctx, user, newpass, oldpass); 2126 const char *user, *oldpass, *newpass; local 2132 printf("Usage: %s username oldpass newpass\n", argv[0]); 2138 newpass = argv[3]; 2158 result = rpccli_samr_chgpasswd3(cli, mem_ctx, user, newpass, oldpass, &info, &reject);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | pkcs12.h | 265 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_parse/ |
H A D | parse_samr.c | 5609 void init_sam_user_info24(SAM_USER_INFO_24 * usr, char newpass[516], argument 5613 memcpy(usr->pass, newpass, sizeof(usr->pass)); 5706 char newpass[516]) 5738 memcpy(usr->pass, newpass, sizeof(usr->pass)); 5798 char newpass[516]) 5832 memcpy(usr->pass, newpass, sizeof(usr->pass)); 5682 init_sam_user_info23W(SAM_USER_INFO_23 * usr, NTTIME * logon_time, NTTIME * logoff_time, NTTIME * kickoff_time, NTTIME * pass_last_set_time, NTTIME * pass_can_change_time, NTTIME * pass_must_change_time, UNISTR2 *user_name, UNISTR2 *full_name, UNISTR2 *home_dir, UNISTR2 *dir_drive, UNISTR2 *log_scr, UNISTR2 *prof_path, UNISTR2 *desc, UNISTR2 *wkstas, UNISTR2 *unk_str, UNISTR2 *mung_dial, uint32 user_rid, uint32 group_rid, uint32 acb_info, uint32 fields_present, uint16 logon_divs, LOGON_HRS * hrs, uint16 bad_password_count, uint16 logon_count, char newpass[516]) argument 5784 init_sam_user_info23A(SAM_USER_INFO_23 * usr, NTTIME * logon_time, NTTIME * logoff_time, NTTIME * kickoff_time, NTTIME * pass_last_set_time, NTTIME * pass_can_change_time, NTTIME * pass_must_change_time, char *user_name, char *full_name, char *home_dir, char *dir_drive, char *log_scr, char *prof_path, const char *desc, char *wkstas, char *unk_str, char *mung_dial, uint32 user_rid, uint32 group_rid, uint32 acb_info, uint32 fields_present, uint16 logon_divs, LOGON_HRS * hrs, uint16 bad_password_count, uint16 logon_count, char newpass[516]) argument
|