| /src/crypto/openssl/crypto/pkcs12/ |
| H A D | p12_npas.c | 20 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass); 21 static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *oldpass, 24 static int newpass_bag(PKCS12_SAFEBAG *bag, const char *oldpass, 34 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) in PKCS12_newpass() argument 45 if (!PKCS12_verify_mac(p12, oldpass, -1)) { in PKCS12_newpass() 50 if (!newpass_p12(p12, oldpass, newpass)) { in PKCS12_newpass() 60 static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) in newpass_p12() argument 82 bags = PKCS12_unpack_p7encdata(p7, oldpass, -1); in newpass_p12() 92 if (!newpass_bags(bags, oldpass, newpass, in newpass_p12() 140 static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *oldpass, in newpass_bags() argument [all …]
|
| /src/lib/libypclnt/ |
| H A D | ypclnt_passwd.c | 153 yppwd.oldpass = strdup(""); in yppasswd_local() 229 if (yppwd.oldpass != NULL) { in yppasswd_local() 230 memset(yppwd.oldpass, 0, strlen(yppwd.oldpass)); in yppasswd_local() 231 free(yppwd.oldpass); in yppasswd_local() 253 (yppwd.oldpass = strdup(passwd ? passwd : "")) == NULL) { in yppasswd_remote() 308 if (yppwd.oldpass != NULL) { in yppasswd_remote() 309 memset(yppwd.oldpass, 0, strlen(yppwd.oldpass)); in yppasswd_remote() 310 free(yppwd.oldpass); in yppasswd_remote()
|
| /src/contrib/pam_modules/pam_passwdqc/ |
| H A D | passwdqc_check.c | 277 const char *newpass, const char *oldpass, struct passwd *pw) in _passwdqc_check() argument 293 if (oldpass && !strcmp(oldpass, newpass)) in _passwdqc_check() 306 if (oldpass && !strncmp(oldpass, newpass, 8)) in _passwdqc_check() 323 if (oldpass) in _passwdqc_check() 324 u_oldpass = unify(oldpass); in _passwdqc_check() 332 (oldpass && !u_oldpass) || in _passwdqc_check() 337 if (!reason && oldpass && params->similar_deny && in _passwdqc_check()
|
| H A D | pam_passwdqc.c | 320 lo_const char *user, *oldpass, *curpass; in pam_sm_chauthtok() local 371 oldpass = item; in pam_sm_chauthtok() 383 if (!oldpass) in pam_sm_chauthtok() 391 if (strcmp(crypt(oldpass, spw->sp_pwdp), in pam_sm_chauthtok() 400 if (strcmp(crypt(oldpass, pw->pw_passwd), in pam_sm_chauthtok() 423 reason = _passwdqc_check(¶ms.qc, curpass, oldpass, pw); in pam_sm_chauthtok() 511 (reason = _passwdqc_check(¶ms.qc, newpass, oldpass, pw)))) { in pam_sm_chauthtok()
|
| H A D | passwdqc.h | 21 const char *newpass, const char *oldpass, struct passwd *pw);
|
| /src/lib/librpcsvc/ |
| H A D | yp_passwd.c | 54 _yppasswd(char *oldpass, struct x_passwd *newpw) in _yppasswd() argument 62 yppasswd.oldpass = oldpass; in _yppasswd()
|
| /src/crypto/openssl/doc/man3/ |
| H A D | PKCS12_newpass.pod | 11 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass); 17 B<p12> is a pointer to a PKCS12 structure. B<oldpass> is the existing password 20 Each of B<oldpass> and B<newpass> is independently interpreted as a string in 31 string "" for B<oldpass>. Using NULL for B<oldpass> will result in a 34 If the wrong password is used for B<oldpass> then the function will fail,
|
| /src/include/rpcsvc/ |
| H A D | yppasswd.x | 59 string oldpass<>; /* unencrypted old password */ member
|
| /src/usr.sbin/rpc.yppasswdd/ |
| H A D | yppasswd_private.x | 58 string oldpass<>; /* unencrypted old password */ member
|
| H A D | yppasswdd_server.c | 558 cryptpw = crypt(argp->oldpass, yp_password.pw_passwd); in yppasswdproc_update_1_svc()
|
| /src/crypto/openssl/include/openssl/ |
| H A D | pkcs12.h | 365 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass);
|
| H A D | pkcs12.h.in | 342 int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass);
|