/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/test/ |
H A D | log001.tcl | 13 global passwd 31 $iter $fixedlength $inmem "-encryptaes $passwd" 33 [expr $iter * 15] $fixedlength $inmem "-encryptaes $passwd"
|
H A D | logtrack.tcl | 37 global encrypt passwd 45 append pargs " -P $passwd "
|
H A D | rep001.tcl | 17 global passwd 71 append envargs " -encryptaes $passwd "
|
H A D | rep011.tcl | 21 global passwd 53 append envargs " -encryptaes $passwd "
|
H A D | rep055.tcl | 61 global passwd
|
H A D | test107.tcl | 22 global passwd 46 set ddargs " -P $passwd "
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/ |
H A D | pppd.h | 298 extern char passwd[MAXSECRETLEN]; /* Password for PAP or CHAP */ 301 extern bool uselogin; /* Use /etc/passwd for checking PAP */ 713 extern int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 717 extern int (*pap_passwd_hook) __P((char *user, char *passwd)); 724 extern int (*chap_passwd_hook) __P((char *user, char *passwd));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/pptpd/pptpd-1.3.4/plugins/ |
H A D | pppd.h | 285 extern char passwd[MAXSECRETLEN]; /* Password for PAP or CHAP */ 288 extern bool uselogin; /* Use /etc/passwd for checking PAP */ 680 extern int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 684 extern int (*pap_passwd_hook) __P((char *user, char *passwd)); 691 extern int (*chap_passwd_hook) __P((char *user, char *passwd));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/LDAP/smbldap-tools-0.9.2/ |
H A D | Makefile | 64 @cp smbldap-passwd $(DESTARCH)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/random/ |
H A D | rndunix.c | 420 struct passwd *passwd; local 430 (passwd = getpwnam("nobody")) != NULL) 431 gatherer_uid = passwd->pw_uid;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/random/ |
H A D | rndunix.c | 420 struct passwd *passwd; local 430 (passwd = getpwnam("nobody")) != NULL) 431 gatherer_uid = passwd->pw_uid;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/wget-1.12/src/ |
H A D | ftp.c | 249 char *user, *passwd, *respline; local 273 passwd = u->passwd; 274 search_netrc (u->host, (const char **)&user, (const char **)&passwd, 1); 277 passwd = passwd ? passwd : (opt.ftp_passwd ? opt.ftp_passwd : opt.passwd); 278 if (!passwd) passwd [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/bus/ |
H A D | activation-helper.c | 171 struct passwd *pw; 295 struct passwd *pw;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/tools/ |
H A D | dbus-launch-x11.c | 76 struct passwd *user = getpwuid (getuid()); 239 struct passwd *user;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | smbpasswd.c | 285 struct passwd *pwd; 483 struct passwd *pwd = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/ |
H A D | cifsencrypt.c | 40 extern void E_md4hash(const unsigned char *passwd, unsigned char *p16); 41 extern void SMBencrypt(unsigned char *passwd, const unsigned char *c8,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/ |
H A D | smbspool.c | 404 struct passwd *pw; 485 struct passwd *pwd;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/ |
H A D | pdb_smbpasswd.c | 490 DEBUG(0, ("getsmbfilepwent: malformed password entry for user %s (passwd too short)\n", 533 DEBUG(5,("getsmbfilepwent: returning passwd entry for user %s, uid %ld\n", 672 /* Create a new smb passwd entry and set it to the given password. */ 910 DEBUG(0, ("mod_smbfilepwd_entry: malformed password entry for user %s (passwd too short)\n", 928 DEBUG(0, ("mod_smbfilepwd_entry: malformed password entry for user %s (passwd too short)\n", 1063 DEBUG(0, ("mod_smbfilepwd_entry: check on passwd file %s failed.\n", pfile)); 1077 DEBUG(0, ("mod_smbfilepwd_entry: write failed in passwd file %s\n", pfile)); 1208 struct passwd *passwd = getpwnam_alloc(NULL, lp_guestaccount()); local 1209 if (!passwd) { [all...] |
H A D | pdb_interface.c | 250 struct passwd *pwd; 299 struct passwd *pwd; 775 struct passwd *pwd; 837 struct passwd *pwd; 1199 struct passwd *unix_pw; 1366 struct passwd *pwd; 1396 struct passwd *pw = getpwnam(*gr); 1468 struct passwd *pw; 1536 struct passwd *pw;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/ |
H A D | auth.c | 241 static int login(AFPObj *obj, struct passwd *pwd, void (*logout)(void), int expired) 402 int set_groups(AFPObj *obj, struct passwd *pwd) 737 struct passwd *pwd = NULL; 788 struct passwd *pwd = NULL; 915 struct passwd *pwd = NULL; 956 struct passwd *pwd;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/forked-daapd-0.19/src/ |
H A D | httpd.c | 763 char *passwd; local 771 passwd = cfg_getstr(cfg_getsec(cfg, "general"), "admin_password"); 772 if (passwd) 776 ret = httpd_basic_auth(req, "admin", passwd, PACKAGE " web interface"); 1095 httpd_basic_auth(struct evhttp_request *req, char *user, char *passwd, char *realm) argument 1153 if (strcmp(passwd, authpwd) != 0)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | system.c | 1021 struct passwd *sys_getpwent(void) 1039 * don't have root access, we need to bypass direct access to /etc/passwd 1043 static struct passwd *fake_pwd; 1046 struct passwd *sys_getpwnam(const char *name) 1060 struct passwd *sys_getpwuid(uid_t uid) 1079 struct passwd new_pwd; 1102 ADD_TO_ARRAY(NULL, struct passwd, new_pwd, &fake_pwd, 1111 struct passwd *sys_getpwnam(const char *name) 1116 struct passwd *sys_getpwuid(uid_t uid) 1265 struct passwd *pwre [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/confuse-2.7/src/ |
H A D | confuse.c | 1127 struct passwd *passwd = 0; local 1133 passwd = getpwuid(geteuid()); 1146 passwd = getpwnam(user); 1150 if(passwd) 1152 expanded = malloc(strlen(passwd->pw_dir) + strlen(file) + 1); 1153 strcpy(expanded, passwd->pw_dir);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/ |
H A D | srv_srvsvc_nt.c | 260 pstring passwd; local 278 pstrcpy(passwd, ""); 282 remark, 0, max_uses, count, path, passwd); 284 init_srv_share_info2_str(&sh2->info_2_str, net_name, remark, path, passwd); 337 pstring passwd; local 358 pstrcpy(passwd, ""); 362 init_srv_share_info502(&sh502->info_502, net_name, get_share_type(snum), remark, 0, 0xffffffff, 1, path, passwd, sd, sd_size); 363 init_srv_share_info502_str(&sh502->info_502_str, net_name, remark, path, passwd, sd, sd_size); 883 struct passwd *pw = sys_getpwnam(session_list[*snum].username);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/gettext-0.17/gnulib-local/lib/libxml/ |
H A D | nanoftp.c | 125 char *passwd; /* passwd string */ member in struct:xmlNanoFTPCtxt 147 static char *proxyPasswd = NULL;/* passwd for proxy authentication */ 255 * @passwd: the proxy password 265 const char *passwd, int type) { 282 if (passwd) 283 proxyPasswd = xmlMemStrdup(passwd); 344 ctxt->passwd = xmlMemStrdup(cptr+1); 794 if (ctxt->passwd == NULL) 797 snprintf(buf, sizeof(buf), "PASS %s\r\n", ctxt->passwd); 264 xmlNanoFTPProxy(const char *host, int port, const char *user, const char *passwd, int type) argument [all...] |