/dports/www/mod_webauth/webauth-4.7.0/perl/t/kerberos/ |
H A D | changepw.t | 56 my $newpassword = 'dujPifecvij3'; 76 $weblogin->query->param ('new_passwd1', $newpassword); 100 ok (verify_password ($username, $newpassword), 104 $weblogin->query->param ('password', $newpassword); 119 $weblogin->query->param ('new_passwd1', $newpassword); 124 ok (verify_password ($username, $newpassword), 128 $weblogin->query->param ('password', $newpassword); 166 $weblogin->query->param ('new_passwd1', $newpassword); 192 is ($pass, $newpassword, '... and password'); 199 $weblogin->query->param ('new_passwd1', $newpassword); [all …]
|
/dports/net/samba412/samba-4.12.15/source3/rpc_client/ |
H A D | cli_samr.c | 37 const char *newpassword, in dcerpc_samr_chgpasswd_user() argument 53 E_md4hash(newpassword, new_nt_hash); in dcerpc_samr_chgpasswd_user() 56 E_deshash(newpassword, new_lm_hash); in dcerpc_samr_chgpasswd_user() 116 const char *newpassword, in rpccli_samr_chgpasswd_user() argument 125 newpassword, in rpccli_samr_chgpasswd_user() 141 const char *newpassword, in dcerpc_samr_chgpasswd_user2() argument 232 const char *newpassword, in rpccli_samr_chgpasswd_user2() argument 242 newpassword, in rpccli_samr_chgpasswd_user2() 344 const char *newpassword, in dcerpc_samr_chgpasswd_user3() argument 443 const char *newpassword, in rpccli_samr_chgpasswd_user3() argument [all …]
|
H A D | cli_samr.h | 52 const char *newpassword, 59 const char *newpassword, 85 const char *newpassword, 92 const char *newpassword, 164 const char *newpassword, 173 const char *newpassword,
|
/dports/net/self-service-password/ltb-project-self-service-password-1.4/htdocs/ |
H A D | resetbytoken.php | 32 $newpassword = ""; variable 85 …if (isset($_POST["newpassword"]) and $_POST["newpassword"]) { $newpassword = $_POST["newpassword"]… 164 if ( $newpassword != $confirmpassword ) { $result="nomatch"; } 169 $result = check_password_strength( $newpassword, "", $pwd_policy_config, $login, $entry ); 175 … $command = hook_command($prehook, $login, $newpassword, null, $prehook_password_encodebase64); 179 …$result = change_password($ldap, $userdn, $newpassword, $ad_mode, $ad_options, $samba_mode, $samba… 181 … $command = hook_command($posthook, $login, $newpassword, null, $posthook_password_encodebase64); 202 $data = array( "login" => $login, "mail" => $mail, "password" => $newpassword);
|
H A D | resetbyquestions.php | 32 $newpassword = ""; 48 if (isset($_POST["newpassword"]) and $_POST["newpassword"]) { $newpassword = strval($_POST["newpass… 102 && empty($newpassword) 230 if ( $newpassword != $confirmpassword ) { $result="nomatch"; } 235 $result = check_password_strength( $newpassword, "", $pwd_policy_config, $login, $entry ); 241 … $command = hook_command($prehook, $login, $newpassword, null, $prehook_password_encodebase64); 245 …$result = change_password($ldap, $userdn, $newpassword, $ad_mode, $ad_options, $samba_mode, $samba… 247 … $command = hook_command($posthook, $login, $newpassword, null, $posthook_password_encodebase64); 262 $data = array( "login" => $login, "mail" => $mail, "password" => $newpassword);
|
H A D | change.php | 31 $newpassword = ""; variable 46 if (isset($_POST["newpassword"]) and $_POST["newpassword"]) { $newpassword = strval($_POST["newpass… variable 61 if ( $newpassword != $confirmpassword ) { $result="nomatch"; } 181 …$result = check_password_strength( $newpassword, $oldpassword, $pwd_policy_config, $login, $entry … 189 …$command = hook_command($prehook, $login, $newpassword, $oldpassword, $prehook_password_encodebase… 193 …$result = change_password($ldap, $userdn, $newpassword, $ad_mode, $ad_options, $samba_mode, $samba… 195 …$command = hook_command($posthook, $login, $newpassword, $oldpassword, $posthook_password_encodeba… 211 $data = array( "login" => $login, "mail" => $mail, "password" => $newpassword);
|
/dports/misc/py-pexpect/pexpect-4.8.0/examples/ |
H A D | passmass.py | 73 def change_password(child, user, oldpassword, newpassword): argument 81 child.sendline(newpassword) 89 child.sendline(newpassword) 99 newpassword = getpass.getpass('New Password: ') 101 if newpassword != newpasswordconfirm: 111 change_password(child, user, password, newpassword)
|
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/network/panos/ |
H A D | _panos_admpwd.py | 108 def set_panwfw_password(module, ip_address, key_filename, newpassword, username): argument 144 shell.send(newpassword + '\n') 151 shell.send(newpassword + '\n') 180 newpassword=dict(no_log=True, required=True) 192 newpassword = module.params["newpassword"] 193 if not newpassword: 198 … changed, stdout = set_panwfw_password(module, ip_address, key_filename, newpassword, username)
|
/dports/comms/deforaos-phone/Phone-0.5.1/src/plugins/ |
H A D | password.c | 35 GtkWidget * newpassword; member 187 password->newpassword = gtk_entry_new(); in _password_settings() 188 gtk_entry_set_visibility(GTK_ENTRY(password->newpassword), FALSE); in _password_settings() 189 gtk_box_pack_start(GTK_BOX(hbox), password->newpassword, TRUE, TRUE, 0); in _password_settings() 237 gtk_entry_set_text(GTK_ENTRY(password->newpassword), ""); in _on_settings_cancel() 256 char const * newpassword; in _on_settings_ok() local 263 newpassword = gtk_entry_get_text(GTK_ENTRY(password->newpassword)); in _on_settings_ok() 265 if(strcmp(newpassword, newpassword2) != 0) in _on_settings_ok() 276 request.password_set.newpassword = newpassword; in _on_settings_ok()
|
/dports/net/samba412/samba-4.12.15/testprogs/blackbox/ |
H A D | test_password_settings.sh | 123 …a_tool user password -W$DOMAIN -U$TEST_USERNAME%$TEST_PASSWORD -k no --newpassword=$TEST_PASSWORD_… 140 …a_tool user password -W$DOMAIN -U$TEST_USERNAME%$TEST_PASSWORD -k no --newpassword=$TEST_PASSWORD_… 177 …VALGRIND $PYTHON $samba_tool user setpassword $TEST_USERNAME $CONFIG --newpassword=$TEST_PASSWORD_… 186 …ser password -W$DOMAIN -U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD -k no --newpassword=$TEST_PASSWORD_… 216 …r password -W$DOMAIN "-U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD" -k no --newpassword="$TEST_PASSWORD… 222 …r password -W$DOMAIN "-U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD" -k no --newpassword="$TEST_PASSWORD… 230 …r password -W$DOMAIN "-U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD" -k no --newpassword="$TEST_PASSWORD… 236 …r password -W$DOMAIN "-U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD" -k no --newpassword="$TEST_PASSWORD… 248 …r password -W$DOMAIN "-U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD" -k no --newpassword="$TEST_PASSWORD…
|
/dports/irc/atheme-services/atheme-7.2.9/libathemecore/ |
H A D | auth.c | 29 void set_password(myuser_t *mu, const char *newpassword) in set_password() argument 31 if (mu == NULL || newpassword == NULL) in set_password() 38 mowgli_strlcpy(mu->pass, crypt_string(newpassword, gen_salt()), PASSLEN); in set_password() 43 mowgli_strlcpy(mu->pass, newpassword, PASSLEN); in set_password()
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/setup/ |
H A D | setpassword | 14 'newpassword=s', 60 if (options['newpassword'] == undefined) { 107 res[0].dn, options['newpassword']);
|
/dports/net/nss-pam-ldapd/nss-pam-ldapd-0.9.11/nslcd/ |
H A D | pam.c | 732 const char *oldpassword, const char *newpassword, in try_pwmod() argument 751 rc = myldap_passwd(session, userdn, oldpassword, newpassword); in try_pwmod() 781 char newpassword[BUFLEN_PASSWORD]; in nslcd_pam_pwmod() local 794 READ_STRING(fp, newpassword); in nslcd_pam_pwmod() 799 *oldpassword ? "***" : "", *newpassword ? "***" : ""); in nslcd_pam_pwmod() 813 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod() 825 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod() 840 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod() 858 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod() 875 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod() [all …]
|
/dports/net/nss-pam-ldapd-sasl/nss-pam-ldapd-0.9.11/nslcd/ |
H A D | pam.c | 732 const char *oldpassword, const char *newpassword, in try_pwmod() argument 751 rc = myldap_passwd(session, userdn, oldpassword, newpassword); in try_pwmod() 781 char newpassword[BUFLEN_PASSWORD]; in nslcd_pam_pwmod() local 794 READ_STRING(fp, newpassword); in nslcd_pam_pwmod() 799 *oldpassword ? "***" : "", *newpassword ? "***" : ""); in nslcd_pam_pwmod() 813 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod() 825 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod() 840 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod() 858 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod() 875 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod() [all …]
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/libnet/ |
H A D | libnet_passwd.c | 74 E_md4hash(r->samr.in.newpassword, new_nt_hash); in libnet_ChangePassword_samr() 77 E_deshash(r->samr.in.newpassword, new_lm_hash); in libnet_ChangePassword_samr() 80 encode_pw_buffer(lm_pass.data, r->samr.in.newpassword, STR_UNICODE); in libnet_ChangePassword_samr() 84 encode_pw_buffer(nt_pass.data, r->samr.in.newpassword, STR_UNICODE); in libnet_ChangePassword_samr() 128 encode_pw_buffer(nt_pass.data, r->samr.in.newpassword, STR_UNICODE); in libnet_ChangePassword_samr() 169 encode_pw_buffer(lm_pass.data, r->samr.in.newpassword, STR_ASCII); in libnet_ChangePassword_samr() 263 r2.samr.in.newpassword = r->generic.in.newpassword; in libnet_ChangePassword_generic() 307 u_info.info26.pw_len = strlen(r->samr_handle.in.newpassword); in libnet_SetPassword_samr_handle_26() 411 u_info.info24.pw_len = strlen_m(r->samr_handle.in.newpassword)*2; in libnet_SetPassword_samr_handle_24() 644 r2.samr_handle.in.newpassword = r->samr.in.newpassword; in libnet_SetPassword_samr() [all …]
|
/dports/net/samba412/samba-4.12.15/python/samba/tests/ |
H A D | pam_winbind_chauthtok.py | 29 newpassword = os.environ["NEWPASSWORD"] 38 … res = pypamtest.run_pamtest(unix_username, "samba", [tc], [password, newpassword, newpassword])
|
/dports/www/moodle310/moodle/auth/none/ |
H A D | auth.php | 74 * @param string $newpassword Plaintext password 78 function user_update_password($user, $newpassword) { argument 83 return update_internal_user_password($user, $newpassword);
|
/dports/www/moodle311/moodle/auth/none/ |
H A D | auth.php | 74 * @param string $newpassword Plaintext password 78 function user_update_password($user, $newpassword) { argument 83 return update_internal_user_password($user, $newpassword);
|
/dports/www/moodle39/moodle/auth/none/ |
H A D | auth.php | 74 * @param string $newpassword Plaintext password 78 function user_update_password($user, $newpassword) { argument 83 return update_internal_user_password($user, $newpassword);
|
/dports/www/moodle310/moodle/auth/webservice/ |
H A D | auth.php | 88 * @param string $newpassword Plaintext password (with system magic quotes) 92 function user_update_password($user, $newpassword) { argument 97 return update_internal_user_password($user, $newpassword);
|
/dports/www/moodle311/moodle/auth/webservice/ |
H A D | auth.php | 88 * @param string $newpassword Plaintext password (with system magic quotes) 92 function user_update_password($user, $newpassword) { argument 97 return update_internal_user_password($user, $newpassword);
|
/dports/www/moodle39/moodle/auth/webservice/ |
H A D | auth.php | 88 * @param string $newpassword Plaintext password (with system magic quotes) 92 function user_update_password($user, $newpassword) { argument 97 return update_internal_user_password($user, $newpassword);
|
/dports/audio/ampache/ampache-php74-5.0.0/src/Module/User/ |
H A D | NewPasswordSender.php | 65 $newpassword = $this->passwordGenerator->generate(); 66 $client->update_password($newpassword); 81 $message .= sprintf(T_("The password has been set to: %s"), $newpassword);
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/bgentry/go-netrc/netrc/ |
H A D | netrc_test.go | 475 newpassword string 487 if strings.Contains(body, test.newpassword) { 488 t.Errorf("MarshalText() before UpdatePassword() contained unexpected %q", test.newpassword) 498 m = n.NewMachine(test.name, "", test.newpassword, "") 504 m.UpdatePassword(test.newpassword) 506 if m.Password != test.newpassword { 507 t.Errorf("expected new password %q, got %q", test.newpassword, m.Password) 509 if m.passtoken.value != test.newpassword { 510 t.Errorf("expected m.passtoken %q, got %q", test.newpassword, m.passtoken.value) 521 if !strings.Contains(body, test.newpassword) { [all …]
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/bgentry/go-netrc/netrc/ |
H A D | netrc_test.go | 475 newpassword string 487 if strings.Contains(body, test.newpassword) { 488 t.Errorf("MarshalText() before UpdatePassword() contained unexpected %q", test.newpassword) 498 m = n.NewMachine(test.name, "", test.newpassword, "") 504 m.UpdatePassword(test.newpassword) 506 if m.Password != test.newpassword { 507 t.Errorf("expected new password %q, got %q", test.newpassword, m.Password) 509 if m.passtoken.value != test.newpassword { 510 t.Errorf("expected m.passtoken %q, got %q", test.newpassword, m.passtoken.value) 521 if !strings.Contains(body, test.newpassword) { [all …]
|