old_password      512 librpc/gen_ndr/lsa.h 	struct lsa_DATA_BUF *old_password;/* [unique] */
old_password     2974 librpc/gen_ndr/ndr_lsa.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->old_password));
old_password     2980 librpc/gen_ndr/ndr_lsa.c 		if (r->old_password) {
old_password     2981 librpc/gen_ndr/ndr_lsa.c 			NDR_CHECK(ndr_push_lsa_DATA_BUF(ndr, NDR_SCALARS|NDR_BUFFERS, r->old_password));
old_password     3003 librpc/gen_ndr/ndr_lsa.c 			NDR_PULL_ALLOC(ndr, r->old_password);
old_password     3005 librpc/gen_ndr/ndr_lsa.c 			r->old_password = NULL;
old_password     3015 librpc/gen_ndr/ndr_lsa.c 		if (r->old_password) {
old_password     3017 librpc/gen_ndr/ndr_lsa.c 			NDR_PULL_SET_MEM_CTX(ndr, r->old_password, 0);
old_password     3018 librpc/gen_ndr/ndr_lsa.c 			NDR_CHECK(ndr_pull_lsa_DATA_BUF(ndr, NDR_SCALARS|NDR_BUFFERS, r->old_password));
old_password     3035 librpc/gen_ndr/ndr_lsa.c 	ndr_print_ptr(ndr, "old_password", r->old_password);
old_password     3037 librpc/gen_ndr/ndr_lsa.c 	if (r->old_password) {
old_password     3038 librpc/gen_ndr/ndr_lsa.c 		ndr_print_lsa_DATA_BUF(ndr, "old_password", r->old_password);
old_password      708 nsswitch/libwbclient/wbc_pam.c 		if (params->old_password.plaintext) {
old_password      710 nsswitch/libwbclient/wbc_pam.c 				params->old_password.plaintext,
old_password      729 nsswitch/libwbclient/wbc_pam.c 		if (params->old_password.response.old_lm_hash_enc_length &&
old_password      730 nsswitch/libwbclient/wbc_pam.c 		    !params->old_password.response.old_lm_hash_enc_data) {
old_password      735 nsswitch/libwbclient/wbc_pam.c 		if (params->old_password.response.old_lm_hash_enc_length == 0 &&
old_password      736 nsswitch/libwbclient/wbc_pam.c 		    params->old_password.response.old_lm_hash_enc_data) {
old_password      741 nsswitch/libwbclient/wbc_pam.c 		if (params->old_password.response.old_nt_hash_enc_length &&
old_password      742 nsswitch/libwbclient/wbc_pam.c 		    !params->old_password.response.old_nt_hash_enc_data) {
old_password      747 nsswitch/libwbclient/wbc_pam.c 		if (params->old_password.response.old_nt_hash_enc_length == 0 &&
old_password      748 nsswitch/libwbclient/wbc_pam.c 		    params->old_password.response.old_nt_hash_enc_data) {
old_password      801 nsswitch/libwbclient/wbc_pam.c 		if (params->old_password.response.old_nt_hash_enc_data) {
old_password      803 nsswitch/libwbclient/wbc_pam.c 			       params->old_password.response.old_nt_hash_enc_data,
old_password      806 nsswitch/libwbclient/wbc_pam.c 				params->old_password.response.old_nt_hash_enc_length;
old_password      809 nsswitch/libwbclient/wbc_pam.c 		if (params->old_password.response.old_lm_hash_enc_data) {
old_password      811 nsswitch/libwbclient/wbc_pam.c 			       params->old_password.response.old_lm_hash_enc_data,
old_password      814 nsswitch/libwbclient/wbc_pam.c 				params->old_password.response.old_lm_hash_enc_length;
old_password      865 nsswitch/libwbclient/wbc_pam.c 			     const char *old_password,
old_password      875 nsswitch/libwbclient/wbc_pam.c 	params.old_password.plaintext	= old_password;
old_password      279 nsswitch/libwbclient/wbclient.h 	} old_password;
old_password     1112 nsswitch/libwbclient/wbclient.h 			     const char *old_password,
old_password     1958 nsswitch/pam_winbind.c 	params.old_password.plaintext	= oldpass;
old_password     1614 nsswitch/wbinfo.c 	char *old_password = NULL;
old_password     1617 nsswitch/wbinfo.c 	old_password = wbinfo_prompt_pass("old", username);
old_password     1620 nsswitch/wbinfo.c 	wbc_status = wbcChangeUserPassword(username, old_password, new_password);
old_password     1627 nsswitch/wbinfo.c 	SAFE_FREE(old_password);
old_password     2662 source3/include/proto.h                              const char *old_password);
old_password       36 source3/lib/netapi/examples/user/user_chgpwd.c 	const char *old_password = NULL;
old_password       75 source3/lib/netapi/examples/user/user_chgpwd.c 	old_password = poptGetArg(pc);
old_password       87 source3/lib/netapi/examples/user/user_chgpwd.c 				       old_password,
old_password      642 source3/lib/netapi/libnetapi.c 				     const char * old_password /* [in] */,
old_password      658 source3/lib/netapi/libnetapi.c 	r.in.old_password = old_password;
old_password      114 source3/lib/netapi/libnetapi.h 				     const char * old_password /* [in] */,
old_password     1670 source3/lib/netapi/netapi.h 				     const char * old_password /* [in] */,
old_password     1504 source3/librpc/gen_ndr/libnetapi.h 		const char * old_password;
old_password     6412 source3/librpc/gen_ndr/ndr_libnetapi.c 		ndr_print_string(ndr, "old_password", r->in.old_password);
old_password      428 source3/libsmb/clirap.c                              const char *old_password)
old_password      463 source3/libsmb/clirap.c 	E_deshash(old_password, old_pw_hash);
old_password      955 source3/rpcclient/cmd_lsarpc.c 	DATA_BLOB data_old = data_blob(NULL, p->old_password->length);
old_password      958 source3/rpcclient/cmd_lsarpc.c 	memcpy(data_old.data, p->old_password->data, p->old_password->length);
old_password       60 source4/auth/credentials/credentials.c 	cred->old_password = NULL;
old_password      343 source4/auth/credentials/credentials.c 	return cred->old_password;
old_password      350 source4/auth/credentials/credentials.c 	cred->old_password = talloc_strdup(cred, val);
old_password       75 source4/auth/credentials/credentials.h 	const char *old_password;
old_password      204 source4/auth/credentials/credentials_files.c 	const char *old_password;
old_password      253 source4/auth/credentials/credentials_files.c 	old_password = ldb_msg_find_attr_as_string(msgs[0], "priorSecret", NULL);
old_password       68 source4/torture/rpc/samlogon.c 	bool old_password; /* Allow an old password to be accepted or rejected without error, as well as session key bugs */
old_password      317 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
old_password      440 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
old_password      537 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
old_password      648 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
old_password      816 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
old_password     1099 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
old_password     1197 source4/torture/rpc/samlogon.c 		if (samlogon_state->old_password) {
old_password     1321 source4/torture/rpc/samlogon.c 			  NTSTATUS expected_error, bool old_password,
old_password     1355 source4/torture/rpc/samlogon.c 	samlogon_state.old_password = old_password;
old_password     1665 source4/torture/rpc/samlogon.c 			bool old_password; /* Allow an old password to be accepted or rejected without error, as well as session key bugs */
old_password     1806 source4/torture/rpc/samlogon.c 				.old_password  = true
old_password     1841 source4/torture/rpc/samlogon.c 						   usercreds[ci].old_password,
old_password     1874 source4/torture/rpc/samlogon.c 						   usercreds[0].old_password,