Searched refs:newpass (Results 1 - 15 of 15) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/
H A Dp12_npas.c69 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
71 char *newpass);
72 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass);
79 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument
96 if (!newpass_p12(p12, oldpass, newpass)) {
106 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument
138 if (!newpass_bags(bags, oldpass, newpass)) {
147 p7new = PKCS12_pack_p7encdata(pbe_nid, newpass, -1, NULL,
166 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen))
188 char *newpass)
200 newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument
[all...]
H A Dpkcs12.h273 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_npas.c68 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
70 char *newpass);
71 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass);
78 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument
94 if (!newpass_p12(p12, oldpass, newpass)) {
104 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument
130 if (!newpass_bags(bags, oldpass, newpass)) {
137 else p7new = PKCS12_pack_p7encdata(pbe_nid, newpass, -1, NULL,
154 if(!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) goto saferr;
174 char *newpass)
187 newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument
[all...]
H A Dpkcs12.h265 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/
H A Dp12_npas.c69 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
71 char *newpass);
72 static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass);
79 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) argument
96 if (!newpass_p12(p12, oldpass, newpass)) {
106 static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) argument
138 if (!newpass_bags(bags, oldpass, newpass)) {
147 p7new = PKCS12_pack_p7encdata(pbe_nid, newpass, -1, NULL,
166 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen))
188 char *newpass)
200 newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass) argument
[all...]
H A Dpkcs12.h273 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Dchgpasswd.c451 const char *oldpass, const char *newpass, BOOL as_root)
465 DEBUG(100, ("chgpasswd: Passwords: old=%s new=%s\n", oldpass, newpass));
471 if (strcmp(oldpass, newpass) == 0) {
490 len = strlen(newpass);
492 if (iscntrl((int)newpass[i])) {
493 DEBUG(0, ("chgpasswd: newpass contains control characters (disallowed).\n"));
506 ret = smb_pam_passchange(pass->pw_name, oldpass, newpass);
508 ret = smb_pam_passchange(name, oldpass, newpass);
554 all_string_sub(chatsequence, "%n", newpass, sizeof(pstring));
562 const char *oldpass, const char *newpass, BOO
450 chgpasswd(const char *name, const struct passwd *pass, const char *oldpass, const char *newpass, BOOL as_root) argument
561 chgpasswd(const char *name, const struct passwd *pass, const char *oldpass, const char *newpass, BOOL as_root) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/
H A Dpampass.c187 static void pwd_sub(char *buf, const char *username, const char *oldpass, const char *newpass) argument
191 all_string_sub(buf, "%n", newpass, sizeof(fstring));
406 const char *passwd, const char *newpass)
419 udp->PAM_newpassword = newpass;
405 smb_setup_pam_conv(smb_pam_conv_fn smb_pam_conv_fnptr, const char *user, const char *passwd, const char *newpass) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dwinbind_nss_aix.c908 static int wb_aix_chpass(char *user, char *oldpass, char *newpass, char **message) argument
923 logit("chpass '%s' old='%s' new='%s'\n", r_user, oldpass, newpass);
933 STRCPY_RET(request.data.chauthtok.newpass, newpass);
955 static int wb_aix_passwdrestrictions(char *user, char *newpass, char *oldpass, argument
H A Dwinbindd_nss.h261 fstring newpass; member in struct:winbindd_request::__anon5839::__anon5842
H A Dpam_winbind.c1149 const char *newpass,
1171 if (newpass != NULL) {
1172 strncpy(request.data.chauthtok.newpass, newpass,
1173 sizeof(request.data.chauthtok.newpass) - 1);
1175 request.data.chauthtok.newpass[0] = '\0';
1145 winbind_chauthtok_request(pam_handle_t * pamh, int ctrl, const char *user, const char *oldpass, const char *newpass, time_t pwd_last_set) argument
H A Dwinbindd_pam.c1969 char *newpass = NULL; local
1988 newpass = state->request.data.chauthtok.newpass;
2002 result = rpccli_samr_chgpasswd3(cli, state->mem_ctx, user, newpass, oldpass, &info, &reject);
2032 result = rpccli_samr_chgpasswd_user(cli, state->mem_ctx, user, newpass, oldpass);
2048 newpass);
2058 newpass);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpcclient/
H A Dcmd_samr.c2072 const char *user, *oldpass, *newpass; local
2076 printf("Usage: %s username oldpass newpass\n", argv[0]);
2082 newpass = argv[3];
2102 result = rpccli_samr_chgpasswd_user(cli, mem_ctx, user, newpass, oldpass);
2126 const char *user, *oldpass, *newpass; local
2132 printf("Usage: %s username oldpass newpass\n", argv[0]);
2138 newpass = argv[3];
2158 result = rpccli_samr_chgpasswd3(cli, mem_ctx, user, newpass, oldpass, &info, &reject);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dpkcs12.h265 int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_parse/
H A Dparse_samr.c5609 void init_sam_user_info24(SAM_USER_INFO_24 * usr, char newpass[516], argument
5613 memcpy(usr->pass, newpass, sizeof(usr->pass));
5706 char newpass[516])
5738 memcpy(usr->pass, newpass, sizeof(usr->pass));
5798 char newpass[516])
5832 memcpy(usr->pass, newpass, sizeof(usr->pass));
5682 init_sam_user_info23W(SAM_USER_INFO_23 * usr, NTTIME * logon_time, NTTIME * logoff_time, NTTIME * kickoff_time, NTTIME * pass_last_set_time, NTTIME * pass_can_change_time, NTTIME * pass_must_change_time, UNISTR2 *user_name, UNISTR2 *full_name, UNISTR2 *home_dir, UNISTR2 *dir_drive, UNISTR2 *log_scr, UNISTR2 *prof_path, UNISTR2 *desc, UNISTR2 *wkstas, UNISTR2 *unk_str, UNISTR2 *mung_dial, uint32 user_rid, uint32 group_rid, uint32 acb_info, uint32 fields_present, uint16 logon_divs, LOGON_HRS * hrs, uint16 bad_password_count, uint16 logon_count, char newpass[516]) argument
5784 init_sam_user_info23A(SAM_USER_INFO_23 * usr, NTTIME * logon_time, NTTIME * logoff_time, NTTIME * kickoff_time, NTTIME * pass_last_set_time, NTTIME * pass_can_change_time, NTTIME * pass_must_change_time, char *user_name, char *full_name, char *home_dir, char *dir_drive, char *log_scr, char *prof_path, const char *desc, char *wkstas, char *unk_str, char *mung_dial, uint32 user_rid, uint32 group_rid, uint32 acb_info, uint32 fields_present, uint16 logon_divs, LOGON_HRS * hrs, uint16 bad_password_count, uint16 logon_count, char newpass[516]) argument

Completed in 130 milliseconds