/dports/net/samba412/samba-4.12.15/source3/rpc_client/ |
H A D | cli_samr.c | 38 const char *oldpassword, in dcerpc_samr_chgpasswd_user() argument 52 E_md4hash(oldpassword, old_nt_hash); in dcerpc_samr_chgpasswd_user() 55 E_deshash(oldpassword, old_lm_hash); in dcerpc_samr_chgpasswd_user() 117 const char *oldpassword) in rpccli_samr_chgpasswd_user() argument 126 oldpassword, in rpccli_samr_chgpasswd_user() 142 const char *oldpassword, in dcerpc_samr_chgpasswd_user2() argument 233 const char *oldpassword) in rpccli_samr_chgpasswd_user2() argument 243 oldpassword, in rpccli_samr_chgpasswd_user2() 345 const char *oldpassword, in dcerpc_samr_chgpasswd_user3() argument 444 const char *oldpassword, in rpccli_samr_chgpasswd_user3() argument [all …]
|
H A D | cli_samr.h | 53 const char *oldpassword, 60 const char *oldpassword); 86 const char *oldpassword, 93 const char *oldpassword); 165 const char *oldpassword, 174 const char *oldpassword,
|
/dports/net/nss-pam-ldapd/nss-pam-ldapd-0.9.11/nslcd/ |
H A D | pam.c | 749 oldpassword = NULL; in try_pwmod() 780 char oldpassword[BUFLEN_PASSWORD]; in nslcd_pam_pwmod() local 793 READ_STRING(fp, oldpassword); in nslcd_pam_pwmod() 812 memset(oldpassword, 0, sizeof(oldpassword)); in nslcd_pam_pwmod() 824 memset(oldpassword, 0, sizeof(oldpassword)); in nslcd_pam_pwmod() 833 if ((*oldpassword == '\0') && (calleruid == 0) && in nslcd_pam_pwmod() 839 memset(oldpassword, 0, sizeof(oldpassword)); in nslcd_pam_pwmod() 843 strcpy(oldpassword, nslcd_cfg->rootpwmodpw); in nslcd_pam_pwmod() 857 memset(oldpassword, 0, sizeof(oldpassword)); in nslcd_pam_pwmod() 874 memset(oldpassword, 0, sizeof(oldpassword)); in nslcd_pam_pwmod() [all …]
|
/dports/net/nss-pam-ldapd-sasl/nss-pam-ldapd-0.9.11/nslcd/ |
H A D | pam.c | 749 oldpassword = NULL; in try_pwmod() 780 char oldpassword[BUFLEN_PASSWORD]; in nslcd_pam_pwmod() local 793 READ_STRING(fp, oldpassword); in nslcd_pam_pwmod() 812 memset(oldpassword, 0, sizeof(oldpassword)); in nslcd_pam_pwmod() 824 memset(oldpassword, 0, sizeof(oldpassword)); in nslcd_pam_pwmod() 833 if ((*oldpassword == '\0') && (calleruid == 0) && in nslcd_pam_pwmod() 839 memset(oldpassword, 0, sizeof(oldpassword)); in nslcd_pam_pwmod() 843 strcpy(oldpassword, nslcd_cfg->rootpwmodpw); in nslcd_pam_pwmod() 857 memset(oldpassword, 0, sizeof(oldpassword)); in nslcd_pam_pwmod() 874 memset(oldpassword, 0, sizeof(oldpassword)); in nslcd_pam_pwmod() [all …]
|
/dports/comms/deforaos-phone/Phone-0.5.1/src/plugins/ |
H A D | password.c | 34 GtkWidget * oldpassword; member 169 password->oldpassword = gtk_entry_new(); in _password_settings() 170 gtk_entry_set_visibility(GTK_ENTRY(password->oldpassword), FALSE); in _password_settings() 171 gtk_box_pack_start(GTK_BOX(hbox), password->oldpassword, TRUE, TRUE, 0); in _password_settings() 236 gtk_entry_set_text(GTK_ENTRY(password->oldpassword), ""); in _on_settings_cancel() 255 char const * oldpassword; in _on_settings_ok() local 262 oldpassword = gtk_entry_get_text(GTK_ENTRY(password->oldpassword)); in _on_settings_ok() 275 request.password_set.oldpassword = oldpassword; in _on_settings_ok()
|
/dports/net/self-service-password/ltb-project-self-service-password-1.4/htdocs/ |
H A D | change.php | 32 $oldpassword = ""; variable 48 if (isset($_POST["oldpassword"]) and $_POST["oldpassword"]) { $oldpassword = strval($_POST["oldpass… variable 143 $bind = ldap_bind($ldap, $userdn, $oldpassword); 181 …$result = check_password_strength( $newpassword, $oldpassword, $pwd_policy_config, $login, $entry … 189 …$command = hook_command($prehook, $login, $newpassword, $oldpassword, $prehook_password_encodebase… 193 …options, $shadow_options, $hash, $hash_options, $who_change_password, $oldpassword, $ldap_use_exop… 195 …$command = hook_command($posthook, $login, $newpassword, $oldpassword, $posthook_password_encodeba…
|
/dports/net/self-service-password/ltb-project-self-service-password-1.4/lib/ |
H A D | functions.inc.php | 276 if ( $pwd_no_reuse and $password === $oldpassword ) { $result="sameasold"; } 282 $similarities = similar_text($oldpassword, $password); 283 …$check_len = strlen($oldpassword) < strlen($password) ? strlen($oldpassword) : strlen($password… 435 $oldpassword = make_ad_password($oldpassword); 441 "values" => array($oldpassword), 457 $exop_passwd = ldap_exop_passwd($ldap, $dn, $oldpassword, $password, $ctrls); 470 $exop_passwd = ldap_exop_passwd($ldap, $dn, $oldpassword, $password); 686 if ( ! is_null($oldpassword) ) { 687 $command .= ' '.base64_encode($oldpassword); 693 if ( ! is_null($oldpassword) ) { [all …]
|
/dports/net/nss-pam-ldapd/nss-pam-ldapd-0.9.11/pam/ |
H A D | pam.c | 71 char *oldpassword; member 87 if (ctx->oldpassword) in ctx_clear() 89 memset(ctx->oldpassword, 0, strlen(ctx->oldpassword)); in ctx_clear() 90 free(ctx->oldpassword); in ctx_clear() 91 ctx->oldpassword = NULL; in ctx_clear() 507 ctx->oldpassword = strdup(passwd); in pam_sm_authenticate() 663 const char *oldpassword = NULL, *newpassword = NULL; in pam_sm_chauthtok() local 713 rc = pam_get_authtok(pamh, PAM_OLDAUTHTOK, &oldpassword, in pam_sm_chauthtok() 720 else if ((ctx->oldpassword != NULL) && (*ctx->oldpassword != '\0')) in pam_sm_chauthtok() 736 if (!cfg.nullok && ((oldpassword == NULL) || (oldpassword[0] == '\0'))) in pam_sm_chauthtok() [all …]
|
/dports/net/nss-pam-ldapd-sasl/nss-pam-ldapd-0.9.11/pam/ |
H A D | pam.c | 71 char *oldpassword; member 87 if (ctx->oldpassword) in ctx_clear() 89 memset(ctx->oldpassword, 0, strlen(ctx->oldpassword)); in ctx_clear() 90 free(ctx->oldpassword); in ctx_clear() 91 ctx->oldpassword = NULL; in ctx_clear() 507 ctx->oldpassword = strdup(passwd); in pam_sm_authenticate() 663 const char *oldpassword = NULL, *newpassword = NULL; in pam_sm_chauthtok() local 713 rc = pam_get_authtok(pamh, PAM_OLDAUTHTOK, &oldpassword, in pam_sm_chauthtok() 720 else if ((ctx->oldpassword != NULL) && (*ctx->oldpassword != '\0')) in pam_sm_chauthtok() 736 if (!cfg.nullok && ((oldpassword == NULL) || (oldpassword[0] == '\0'))) in pam_sm_chauthtok() [all …]
|
/dports/net-mgmt/ocsinventory-ocsreports/ocsinventory-ocsreports/backend/AUTH/methode/ |
H A D | local.php | 28 $oldpassword = false; variable 30 $oldpassword = true; variable 33 if ($oldpassword && $rowOp->PASSWORD_VERSION === '0') { 56 if ($oldpassword) {
|
/dports/www/horde-passwd/passwd-5.0.7/lib/ |
H A D | Basic.php | 168 if (!isset($this->_vars->oldpassword)) { 187 if ($this->_vars->newpassword0 == $this->_vars->oldpassword) { 204 …ckPasswordSimilarity($this->_vars->newpassword0, array($this->_userid, $this->_vars->oldpassword)); 222 $this->_vars->oldpassword, 233 …Horde::callHook('password_changed', array($this->_userid, $this->_vars->oldpassword, $this->_vars-…
|
/dports/sysutils/pass-update/pass-update-2.1/ |
H A D | update.bash | 126 local content oldpassword 130 oldpassword="$(echo "$content" | head -n 1)" 131 [[ -n "$INCLUDE" && ! "$oldpassword" =~ $INCLUDE ]] && continue 132 [[ -n "$EXCLUDE" && "$oldpassword" =~ $EXCLUDE ]] && continue 139 clip "$oldpassword" "$path"
|
/dports/security/libpwquality/libpwquality-1.4.4/src/ |
H A D | check.c | 685 const char *oldpassword, const char *user, void **auxerror) in pwquality_check() argument 700 if (oldpassword && *oldpassword == '\0') in pwquality_check() 701 oldpassword = NULL; in pwquality_check() 703 if (oldpassword && strcmp(oldpassword, password) == 0) { in pwquality_check() 708 oldpassword = NULL; in pwquality_check() 710 score = password_check(pwq, password, oldpassword, user, auxerror); in pwquality_check()
|
/dports/net/samba412/samba-4.12.15/python/samba/tests/ |
H A D | auth_log_pass_change.py | 102 oldpassword=USER_PASS) 129 oldpassword=USER_PASS, 161 oldpassword=USER_PASS, 194 oldpassword="badPassword",
|
/dports/devel/bugzilla44/bugzilla-4.4.13/ |
H A D | userprefs.cgi | 71 my $oldpassword = $cgi->param('old_password'); 77 && ($oldpassword ne "" || $pwd1 ne "" || $pwd2 ne "")) 82 if (bz_crypt($oldpassword, $oldcryptedpwd) ne $oldcryptedpwd) { 90 if ($oldpassword ne $pwd1) { 103 $oldpassword || ThrowUserError("old_password_required");
|
/dports/misc/py-pexpect/pexpect-4.8.0/examples/ |
H A D | passmass.py | 73 def change_password(child, user, oldpassword, newpassword): argument 79 child.sendline(oldpassword)
|
/dports/www/foswiki/Foswiki-2.1.6/lib/Foswiki/UI/ |
H A D | Passwords.pm | 249 my $oldpassword = $query->param('oldpassword'); 304 unless ( defined $oldpassword || $users->isAdmin($requestUser) ) { 315 || $users->checkPassword( $login, $oldpassword ) ) 383 unless ( $users->setPassword( $cUID, $passwordA, $oldpassword ) ) {
|
/dports/devel/bugzilla50/bugzilla-5.0.4/ |
H A D | userprefs.cgi | 76 my $oldpassword = $cgi->param('old_password'); 82 && ($oldpassword ne "" || $pwd1 ne "" || $pwd2 ne "")) 87 if (bz_crypt($oldpassword, $oldcryptedpwd) ne $oldcryptedpwd) { 95 if ($oldpassword ne $pwd1) { 108 $oldpassword || ThrowUserError("old_password_required");
|
/dports/net/nss-pam-ldapd/nss-pam-ldapd-0.9.11/pynslcd/ |
H A D | pam.py | 91 def pwmod(conn, userdn, oldpassword, newpassword): argument 97 if oldpassword: 98 conn.passwd_s(userdn, oldpassword, newpassword) 279 oldpassword=fp.read_string(),
|
/dports/net/nss-pam-ldapd-sasl/nss-pam-ldapd-0.9.11/pynslcd/ |
H A D | pam.py | 91 def pwmod(conn, userdn, oldpassword, newpassword): argument 97 if oldpassword: 98 conn.passwd_s(userdn, oldpassword, newpassword) 279 oldpassword=fp.read_string(),
|
/dports/net/self-service-password/ltb-project-self-service-password-1.4/templates/ |
H A D | change.tpl | 52 <label for="oldpassword" class="col-sm-4 control-label">{$msg_oldpassword}</label> 56 …<input type="password" autocomplete="current-password" name="oldpassword" id="oldpassword" class="…
|
/dports/net/self-service-password/ltb-project-self-service-password-1.4/scripts/ |
H A D | multi_ldap_change.php | 19 $oldpassword = ''; variable 146 …de, $samba_options, $shadow_options, $hash, $hash_options, 'manager', $oldpassword, $ldap_use_exop…
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/bgentry/go-netrc/netrc/ |
H A D | netrc_test.go | 474 oldpassword string 484 if test.exists && !strings.Contains(body, test.oldpassword) { 485 … t.Errorf("MarshalText() before UpdatePassword() did not include %q as expected", test.oldpassword) 518 if test.exists && strings.Contains(body, test.oldpassword) { 519 t.Errorf("MarshalText() after UpdatePassword() contained unexpected %q", test.oldpassword)
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/bgentry/go-netrc/netrc/ |
H A D | netrc_test.go | 474 oldpassword string 484 if test.exists && !strings.Contains(body, test.oldpassword) { 485 … t.Errorf("MarshalText() before UpdatePassword() did not include %q as expected", test.oldpassword) 518 if test.exists && strings.Contains(body, test.oldpassword) { 519 t.Errorf("MarshalText() after UpdatePassword() contained unexpected %q", test.oldpassword)
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/bgentry/go-netrc/netrc/ |
H A D | netrc_test.go | 474 oldpassword string 484 if test.exists && !strings.Contains(body, test.oldpassword) { 485 … t.Errorf("MarshalText() before UpdatePassword() did not include %q as expected", test.oldpassword) 518 if test.exists && strings.Contains(body, test.oldpassword) { 519 t.Errorf("MarshalText() after UpdatePassword() contained unexpected %q", test.oldpassword)
|