version 1.23, 2012/11/20 19:00:52
|
version 1.26, 2013/12/20 21:13:02
|
Line 210 while ((!$got_passwd) && ($trial < $maxt
|
Line 210 while ((!$got_passwd) && ($trial < $maxt
|
foreach (split(//,$firstpass)) {if ((ord($_)<32)||(ord($_)>126)){$pbad=1;}} |
foreach (split(//,$firstpass)) {if ((ord($_)<32)||(ord($_)>126)){$pbad=1;}} |
if ($pbad) { |
if ($pbad) { |
print(&mt('Password contains invalid characters.')."\n". |
print(&mt('Password contains invalid characters.')."\n". |
&mt('Password must consist of standard ASCII characters')."\n". |
&mt('Password must consist of standard ASCII characters.')."\n". |
&mt('Please try again.')."\n"); |
&mt('Please try again.')."\n"); |
} else { |
} else { |
$secondpass = &get_password(&mt('Enter password a second time')); |
$secondpass = &get_password(&mt('Enter password a second time')); |
Line 360 if ($pbad) {
|
Line 360 if ($pbad) {
|
"\n"); |
"\n"); |
} |
} |
|
|
my $distro; |
my ($distro,$nostdin); |
if (open(PIPE,"perl distprobe|")) { |
if (open(PIPE,"perl distprobe|")) { |
$distro = <PIPE>; |
$distro = <PIPE>; |
close(PIPE); |
close(PIPE); |
} |
} |
if ($distro =~ /^ubuntu|debian/) { |
if ($distro =~ /^ubuntu|debian/) { |
|
$nostdin = 1; |
|
} elsif ($distro =~ /^suse([\d.]+)$/) { |
|
if ($1 > 12.2) { |
|
$nostdin = 1; |
|
} |
|
} |
|
if ($nostdin) { |
open(OUT,"|usermod -p `mkpasswd $passwd` $username"); |
open(OUT,"|usermod -p `mkpasswd $passwd` $username"); |
close(OUT); |
close(OUT); |
} else { |
} else { |
Line 444 use GDBM_File; # A simplistic key-value
|
Line 451 use GDBM_File; # A simplistic key-value
|
my $rolesref=&LONCAPA::locking_hash_tie("$udpath/roles.db",&GDBM_WRCREAT()); |
my $rolesref=&LONCAPA::locking_hash_tie("$udpath/roles.db",&GDBM_WRCREAT()); |
if (!$rolesref) { |
if (!$rolesref) { |
print(&mt('Error').' '. |
print(&mt('Error').' '. |
&mt('unable to tie roles db: [_1]'."$udpath/roles.db")."\n"); |
&mt('unable to tie roles db: [_1].',"$udpath/roles.db")."\n"); |
exit; |
exit; |
} |
} |
my $now = time; |
my $now = time; |