| /src/contrib/pam-krb5/tests/module/ |
| H A D | password-t.c | 44 is_string(config->newpass, authtok, "...and it is correct"); in check_authtok() 53 char *newpass; in main() local 71 newpass = bcalloc_type(PAM_MAX_RESP_SIZE + 1, char); in main() 72 memset(newpass, 'a', PAM_MAX_RESP_SIZE); in main() 73 config.newpass = newpass; in main() 78 config.newpass = NULL; in main() 79 config.authtok = newpass; in main() 87 free(newpass); in main() 89 basprintf(&newpass, "ngh1,a%lu nn9af6%lu", (unsigned long) getpid(), in main() 91 config.newpass = newpass; in main() [all …]
|
| H A D | expired-t.c | 36 char *newpass, *date; in main() local 74 basprintf(&newpass, "ngh1,a%lu nn9af6", (unsigned long) getpid()); in main() 75 config.newpass = newpass; in main() 88 config.newpass = krbconf->password; in main() 89 config.password = newpass; in main() 94 config.newpass = krbconf->password; in main() 95 config.password = newpass; in main() 101 config.newpass = krbconf->password; in main() 102 config.password = newpass; in main() 109 config.newpass = newpass; in main() [all …]
|
| /src/contrib/pam_modules/pam_passwdqc/ |
| H A D | passwdqc_check.c | 63 static int is_simple(passwdqc_params_t *params, const char *newpass) in is_simple() argument 72 while ((c = (unsigned char)newpass[length])) { in is_simple() 85 if (!strchr(&newpass[length], c)) in is_simple() 93 c = (unsigned char)newpass[0]; in is_simple() 95 c = (unsigned char)newpass[length - 1]; in is_simple() 277 const char *newpass, const char *oldpass, struct passwd *pw) in _passwdqc_check() argument 293 if (oldpass && !strcmp(oldpass, newpass)) in _passwdqc_check() 296 length = strlen(newpass); in _passwdqc_check() 304 strncat(truncated, newpass, 8); in _passwdqc_check() 305 newpass = truncated; in _passwdqc_check() [all …]
|
| H A D | pam_passwdqc.c | 180 static int check_max(params_t *params, pam_handle_t *pamh, const char *newpass) in check_max() argument 182 if ((int)strlen(newpass) > params->qc.max) { in check_max() 321 char *newpass, *randompass; in pam_sm_chauthtok() local 493 newpass = strdup(resp->resp); in pam_sm_chauthtok() 497 if (!newpass) { in pam_sm_chauthtok() 502 if (check_max(¶ms, pamh, newpass) && enforce) { in pam_sm_chauthtok() 509 (!randompass || !strstr(newpass, randompass)) && in pam_sm_chauthtok() 511 (reason = _passwdqc_check(¶ms.qc, newpass, oldpass, pw)))) { in pam_sm_chauthtok() 527 if (strcmp(newpass, resp->resp)) { in pam_sm_chauthtok() 541 status = pam_set_item(pamh, PAM_AUTHTOK, newpass); in pam_sm_chauthtok() [all …]
|
| H A D | passwdqc.h | 21 const char *newpass, const char *oldpass, struct passwd *pw);
|
| /src/crypto/openssl/crypto/pkcs12/ |
| H A D | p12_npas.c | 20 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass); 22 const char *newpass, 25 const char *newpass, 34 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) in PKCS12_newpass() argument 50 if (!newpass_p12(p12, oldpass, newpass)) { in PKCS12_newpass() 60 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) in newpass_p12() argument 92 if (!newpass_bags(bags, oldpass, newpass, in newpass_p12() 99 p7new = PKCS12_pack_p7encdata_ex(pbe_nid, newpass, -1, NULL, in newpass_p12() 117 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) in newpass_p12() 141 const char *newpass, in newpass_bags() argument [all …]
|
| /src/crypto/krb5/src/lib/kadm5/srv/ |
| H A D | kadm5_hook.c | 145 const char *newpass) in k5_kadm5_hook_chpass() argument 149 n_ks_tuple, ks_tuple, newpass)); in k5_kadm5_hook_chpass() 157 const char *newpass) in k5_kadm5_hook_create() argument 160 stage, princ, mask, n_ks_tuple, ks_tuple, newpass)); in k5_kadm5_hook_create()
|
| /src/crypto/openssl/doc/man3/ |
| H A D | PKCS12_newpass.pod | 11 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass); 18 and B<newpass> is the new password. 20 Each of B<oldpass> and B<newpass> is independently interpreted as a string in 61 fprintf(stderr, "Usage: pkread p12file password newpass opfile\n");
|
| /src/crypto/krb5/src/plugins/kadm5_hook/test/ |
| H A D | main.c | 64 const char *newpass) in chpass() argument 78 const char *newpass) in create() argument
|
| /src/contrib/pam-krb5/tests/fakepam/ |
| H A D | config.c | 344 if (config->newpass == NULL) in expand_string() 346 length += strlen(config->newpass); in expand_string() 392 memcpy(out, config->newpass, strlen(config->newpass)); in expand_string() 393 out += strlen(config->newpass); in expand_string()
|
| H A D | script.h | 54 const char *newpass; /* Substituted for %n in prompts. */ member
|
| H A D | README | 108 newpass
|
| /src/crypto/krb5/src/lib/kadm5/ |
| H A D | server_internal.h | 234 const char *newpass); 244 const char *newpass);
|
| /src/crypto/krb5/src/include/krb5/ |
| H A D | kadm5_hook_plugin.h | 121 const char *newpass);
|
| /src/crypto/openssl/include/openssl/ |
| H A D | pkcs12.h | 365 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass);
|
| H A D | pkcs12.h.in | 342 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass);
|