Home
last modified time | relevance | path

Searched refs:newpassword (Results 1 – 25 of 558) sorted by relevance

12345678910>>...23

/dports/www/mod_webauth/webauth-4.7.0/perl/t/kerberos/
H A Dchangepw.t56 my $newpassword = 'dujPifecvij3';
76 $weblogin->query->param ('new_passwd1', $newpassword);
100 ok (verify_password ($username, $newpassword),
104 $weblogin->query->param ('password', $newpassword);
119 $weblogin->query->param ('new_passwd1', $newpassword);
124 ok (verify_password ($username, $newpassword),
128 $weblogin->query->param ('password', $newpassword);
166 $weblogin->query->param ('new_passwd1', $newpassword);
192 is ($pass, $newpassword, '... and password');
199 $weblogin->query->param ('new_passwd1', $newpassword);
[all …]
/dports/net/samba412/samba-4.12.15/source3/rpc_client/
H A Dcli_samr.c37 const char *newpassword, in dcerpc_samr_chgpasswd_user() argument
53 E_md4hash(newpassword, new_nt_hash); in dcerpc_samr_chgpasswd_user()
56 E_deshash(newpassword, new_lm_hash); in dcerpc_samr_chgpasswd_user()
116 const char *newpassword, in rpccli_samr_chgpasswd_user() argument
125 newpassword, in rpccli_samr_chgpasswd_user()
141 const char *newpassword, in dcerpc_samr_chgpasswd_user2() argument
232 const char *newpassword, in rpccli_samr_chgpasswd_user2() argument
242 newpassword, in rpccli_samr_chgpasswd_user2()
344 const char *newpassword, in dcerpc_samr_chgpasswd_user3() argument
443 const char *newpassword, in rpccli_samr_chgpasswd_user3() argument
[all …]
H A Dcli_samr.h52 const char *newpassword,
59 const char *newpassword,
85 const char *newpassword,
92 const char *newpassword,
164 const char *newpassword,
173 const char *newpassword,
/dports/net/self-service-password/ltb-project-self-service-password-1.4/htdocs/
H A Dresetbytoken.php32 $newpassword = ""; variable
85 …if (isset($_POST["newpassword"]) and $_POST["newpassword"]) { $newpassword = $_POST["newpassword"]…
164 if ( $newpassword != $confirmpassword ) { $result="nomatch"; }
169 $result = check_password_strength( $newpassword, "", $pwd_policy_config, $login, $entry );
175 … $command = hook_command($prehook, $login, $newpassword, null, $prehook_password_encodebase64);
179 …$result = change_password($ldap, $userdn, $newpassword, $ad_mode, $ad_options, $samba_mode, $samba…
181 … $command = hook_command($posthook, $login, $newpassword, null, $posthook_password_encodebase64);
202 $data = array( "login" => $login, "mail" => $mail, "password" => $newpassword);
H A Dresetbyquestions.php32 $newpassword = "";
48 if (isset($_POST["newpassword"]) and $_POST["newpassword"]) { $newpassword = strval($_POST["newpass…
102 && empty($newpassword)
230 if ( $newpassword != $confirmpassword ) { $result="nomatch"; }
235 $result = check_password_strength( $newpassword, "", $pwd_policy_config, $login, $entry );
241 … $command = hook_command($prehook, $login, $newpassword, null, $prehook_password_encodebase64);
245 …$result = change_password($ldap, $userdn, $newpassword, $ad_mode, $ad_options, $samba_mode, $samba…
247 … $command = hook_command($posthook, $login, $newpassword, null, $posthook_password_encodebase64);
262 $data = array( "login" => $login, "mail" => $mail, "password" => $newpassword);
H A Dchange.php31 $newpassword = ""; variable
46 if (isset($_POST["newpassword"]) and $_POST["newpassword"]) { $newpassword = strval($_POST["newpass… variable
61 if ( $newpassword != $confirmpassword ) { $result="nomatch"; }
181 …$result = check_password_strength( $newpassword, $oldpassword, $pwd_policy_config, $login, $entry …
189 …$command = hook_command($prehook, $login, $newpassword, $oldpassword, $prehook_password_encodebase…
193 …$result = change_password($ldap, $userdn, $newpassword, $ad_mode, $ad_options, $samba_mode, $samba…
195 …$command = hook_command($posthook, $login, $newpassword, $oldpassword, $posthook_password_encodeba…
211 $data = array( "login" => $login, "mail" => $mail, "password" => $newpassword);
/dports/misc/py-pexpect/pexpect-4.8.0/examples/
H A Dpassmass.py73 def change_password(child, user, oldpassword, newpassword): argument
81 child.sendline(newpassword)
89 child.sendline(newpassword)
99 newpassword = getpass.getpass('New Password: ')
101 if newpassword != newpasswordconfirm:
111 change_password(child, user, password, newpassword)
/dports/sysutils/ansible2/ansible-2.9.27/lib/ansible/modules/network/panos/
H A D_panos_admpwd.py108 def set_panwfw_password(module, ip_address, key_filename, newpassword, username): argument
144 shell.send(newpassword + '\n')
151 shell.send(newpassword + '\n')
180 newpassword=dict(no_log=True, required=True)
192 newpassword = module.params["newpassword"]
193 if not newpassword:
198 … changed, stdout = set_panwfw_password(module, ip_address, key_filename, newpassword, username)
/dports/comms/deforaos-phone/Phone-0.5.1/src/plugins/
H A Dpassword.c35 GtkWidget * newpassword; member
187 password->newpassword = gtk_entry_new(); in _password_settings()
188 gtk_entry_set_visibility(GTK_ENTRY(password->newpassword), FALSE); in _password_settings()
189 gtk_box_pack_start(GTK_BOX(hbox), password->newpassword, TRUE, TRUE, 0); in _password_settings()
237 gtk_entry_set_text(GTK_ENTRY(password->newpassword), ""); in _on_settings_cancel()
256 char const * newpassword; in _on_settings_ok() local
263 newpassword = gtk_entry_get_text(GTK_ENTRY(password->newpassword)); in _on_settings_ok()
265 if(strcmp(newpassword, newpassword2) != 0) in _on_settings_ok()
276 request.password_set.newpassword = newpassword; in _on_settings_ok()
/dports/net/samba412/samba-4.12.15/testprogs/blackbox/
H A Dtest_password_settings.sh123 …a_tool user password -W$DOMAIN -U$TEST_USERNAME%$TEST_PASSWORD -k no --newpassword=$TEST_PASSWORD_…
140 …a_tool user password -W$DOMAIN -U$TEST_USERNAME%$TEST_PASSWORD -k no --newpassword=$TEST_PASSWORD_…
177 …VALGRIND $PYTHON $samba_tool user setpassword $TEST_USERNAME $CONFIG --newpassword=$TEST_PASSWORD_…
186 …ser password -W$DOMAIN -U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD -k no --newpassword=$TEST_PASSWORD_…
216 …r password -W$DOMAIN "-U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD" -k no --newpassword="$TEST_PASSWORD…
222 …r password -W$DOMAIN "-U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD" -k no --newpassword="$TEST_PASSWORD…
230 …r password -W$DOMAIN "-U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD" -k no --newpassword="$TEST_PASSWORD…
236 …r password -W$DOMAIN "-U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD" -k no --newpassword="$TEST_PASSWORD…
248 …r password -W$DOMAIN "-U$DOMAIN/$TEST_USERNAME%$TEST_PASSWORD" -k no --newpassword="$TEST_PASSWORD…
/dports/irc/atheme-services/atheme-7.2.9/libathemecore/
H A Dauth.c29 void set_password(myuser_t *mu, const char *newpassword) in set_password() argument
31 if (mu == NULL || newpassword == NULL) in set_password()
38 mowgli_strlcpy(mu->pass, crypt_string(newpassword, gen_salt()), PASSLEN); in set_password()
43 mowgli_strlcpy(mu->pass, newpassword, PASSLEN); in set_password()
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/setup/
H A Dsetpassword14 'newpassword=s',
60 if (options['newpassword'] == undefined) {
107 res[0].dn, options['newpassword']);
/dports/net/nss-pam-ldapd/nss-pam-ldapd-0.9.11/nslcd/
H A Dpam.c732 const char *oldpassword, const char *newpassword, in try_pwmod() argument
751 rc = myldap_passwd(session, userdn, oldpassword, newpassword); in try_pwmod()
781 char newpassword[BUFLEN_PASSWORD]; in nslcd_pam_pwmod() local
794 READ_STRING(fp, newpassword); in nslcd_pam_pwmod()
799 *oldpassword ? "***" : "", *newpassword ? "***" : ""); in nslcd_pam_pwmod()
813 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod()
825 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod()
840 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod()
858 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod()
875 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod()
[all …]
/dports/net/nss-pam-ldapd-sasl/nss-pam-ldapd-0.9.11/nslcd/
H A Dpam.c732 const char *oldpassword, const char *newpassword, in try_pwmod() argument
751 rc = myldap_passwd(session, userdn, oldpassword, newpassword); in try_pwmod()
781 char newpassword[BUFLEN_PASSWORD]; in nslcd_pam_pwmod() local
794 READ_STRING(fp, newpassword); in nslcd_pam_pwmod()
799 *oldpassword ? "***" : "", *newpassword ? "***" : ""); in nslcd_pam_pwmod()
813 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod()
825 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod()
840 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod()
858 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod()
875 memset(newpassword, 0, sizeof(newpassword)); in nslcd_pam_pwmod()
[all …]
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/libnet/
H A Dlibnet_passwd.c74 E_md4hash(r->samr.in.newpassword, new_nt_hash); in libnet_ChangePassword_samr()
77 E_deshash(r->samr.in.newpassword, new_lm_hash); in libnet_ChangePassword_samr()
80 encode_pw_buffer(lm_pass.data, r->samr.in.newpassword, STR_UNICODE); in libnet_ChangePassword_samr()
84 encode_pw_buffer(nt_pass.data, r->samr.in.newpassword, STR_UNICODE); in libnet_ChangePassword_samr()
128 encode_pw_buffer(nt_pass.data, r->samr.in.newpassword, STR_UNICODE); in libnet_ChangePassword_samr()
169 encode_pw_buffer(lm_pass.data, r->samr.in.newpassword, STR_ASCII); in libnet_ChangePassword_samr()
263 r2.samr.in.newpassword = r->generic.in.newpassword; in libnet_ChangePassword_generic()
307 u_info.info26.pw_len = strlen(r->samr_handle.in.newpassword); in libnet_SetPassword_samr_handle_26()
411 u_info.info24.pw_len = strlen_m(r->samr_handle.in.newpassword)*2; in libnet_SetPassword_samr_handle_24()
644 r2.samr_handle.in.newpassword = r->samr.in.newpassword; in libnet_SetPassword_samr()
[all …]
/dports/net/samba412/samba-4.12.15/python/samba/tests/
H A Dpam_winbind_chauthtok.py29 newpassword = os.environ["NEWPASSWORD"]
38 … res = pypamtest.run_pamtest(unix_username, "samba", [tc], [password, newpassword, newpassword])
/dports/www/moodle310/moodle/auth/none/
H A Dauth.php74 * @param string $newpassword Plaintext password
78 function user_update_password($user, $newpassword) { argument
83 return update_internal_user_password($user, $newpassword);
/dports/www/moodle311/moodle/auth/none/
H A Dauth.php74 * @param string $newpassword Plaintext password
78 function user_update_password($user, $newpassword) { argument
83 return update_internal_user_password($user, $newpassword);
/dports/www/moodle39/moodle/auth/none/
H A Dauth.php74 * @param string $newpassword Plaintext password
78 function user_update_password($user, $newpassword) { argument
83 return update_internal_user_password($user, $newpassword);
/dports/www/moodle310/moodle/auth/webservice/
H A Dauth.php88 * @param string $newpassword Plaintext password (with system magic quotes)
92 function user_update_password($user, $newpassword) { argument
97 return update_internal_user_password($user, $newpassword);
/dports/www/moodle311/moodle/auth/webservice/
H A Dauth.php88 * @param string $newpassword Plaintext password (with system magic quotes)
92 function user_update_password($user, $newpassword) { argument
97 return update_internal_user_password($user, $newpassword);
/dports/www/moodle39/moodle/auth/webservice/
H A Dauth.php88 * @param string $newpassword Plaintext password (with system magic quotes)
92 function user_update_password($user, $newpassword) { argument
97 return update_internal_user_password($user, $newpassword);
/dports/audio/ampache/ampache-php74-5.0.0/src/Module/User/
H A DNewPasswordSender.php65 $newpassword = $this->passwordGenerator->generate();
66 $client->update_password($newpassword);
81 $message .= sprintf(T_("The password has been set to: %s"), $newpassword);
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/bgentry/go-netrc/netrc/
H A Dnetrc_test.go475 newpassword string
487 if strings.Contains(body, test.newpassword) {
488 t.Errorf("MarshalText() before UpdatePassword() contained unexpected %q", test.newpassword)
498 m = n.NewMachine(test.name, "", test.newpassword, "")
504 m.UpdatePassword(test.newpassword)
506 if m.Password != test.newpassword {
507 t.Errorf("expected new password %q, got %q", test.newpassword, m.Password)
509 if m.passtoken.value != test.newpassword {
510 t.Errorf("expected m.passtoken %q, got %q", test.newpassword, m.passtoken.value)
521 if !strings.Contains(body, test.newpassword) {
[all …]
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/bgentry/go-netrc/netrc/
H A Dnetrc_test.go475 newpassword string
487 if strings.Contains(body, test.newpassword) {
488 t.Errorf("MarshalText() before UpdatePassword() contained unexpected %q", test.newpassword)
498 m = n.NewMachine(test.name, "", test.newpassword, "")
504 m.UpdatePassword(test.newpassword)
506 if m.Password != test.newpassword {
507 t.Errorf("expected new password %q, got %q", test.newpassword, m.Password)
509 if m.passtoken.value != test.newpassword {
510 t.Errorf("expected m.passtoken %q, got %q", test.newpassword, m.passtoken.value)
521 if !strings.Contains(body, test.newpassword) {
[all …]

12345678910>>...23