Searched defs:new_password (Results 1 - 5 of 5) sorted by relevance
/osnet-11/usr/src/lib/krb5/kadm5/ |
H A D | chpass_util.c | 57 * new_password (input) NULL or a null terminated string with the 58 * the principal's desired new password. If new_password 63 * internally), or to the new_password argument (if 96 char *new_password; local 108 new_password = new_pw; 121 new_password = buffer; 153 *ret_pw = new_password; 165 new_password, 181 new_password);
|
/osnet-11/usr/src/lib/libntsvcs/common/ |
H A D | samlib.c | 378 * Generate an OEM password by encrypting a cleartext password 'new_password' 384 sam_oem_password(oem_password_t *oem_password, unsigned char *new_password, argument 393 length = strlen((const char *)new_password); 396 length = smb_auth_qnd_unicode(unicode_password, (char *)new_password,
|
H A D | netr_clnt.c | 778 netr_gen_password(BYTE *session_key, BYTE *old_password, BYTE *new_password) argument 782 rv = smb_auth_DES(new_password, 8, session_key, NETR_DESKEY_LEN, 787 rv = smb_auth_DES(&new_password[8], 8, &session_key[NETR_DESKEY_LEN], 1385 BYTE new_password[NETR_OWF_PASSWORD_SZ]; local 1411 netr_info->password, new_password) == SMBAUTH_FAILURE) { 1415 (void) memcpy(&arg.uas_new_password, &new_password, 1441 (void) memcpy(netr_info->password, new_password,
|
/osnet-11/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_password.c | 407 * new_password new password 426 char *new_password, 489 new_password, 422 krb5_changepw( pam_handle_t *pamh, char *princ_str, char *old_password, char *new_password, int debug) argument
|
/osnet-11/usr/src/lib/libpam/ |
H A D | pam_framework.c | 3063 char *new_password = NULL; local 3083 (void **)&new_password)) != PAM_SUCCESS) 3086 if (new_password == NULL || new_password[0] == '\0') { 3090 (void) strlcpy(*authtok, new_password, 3122 (void **)&new_password)) != PAM_SUCCESS) { 3126 if (new_password == NULL)
|
Completed in 63 milliseconds