Searched refs:passwd (Results 226 - 250 of 440) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/test/
H A Dlog001.tcl13 global passwd
31 $iter $fixedlength $inmem "-encryptaes $passwd"
33 [expr $iter * 15] $fixedlength $inmem "-encryptaes $passwd"
H A Dlogtrack.tcl37 global encrypt passwd
45 append pargs " -P $passwd "
H A Drep001.tcl17 global passwd
71 append envargs " -encryptaes $passwd "
H A Drep011.tcl21 global passwd
53 append envargs " -encryptaes $passwd "
H A Drep055.tcl61 global passwd
H A Dtest107.tcl22 global passwd
46 set ddargs " -P $passwd "
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/
H A Dpppd.h298 extern char passwd[MAXSECRETLEN]; /* Password for PAP or CHAP */
301 extern bool uselogin; /* Use /etc/passwd for checking PAP */
713 extern int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
717 extern int (*pap_passwd_hook) __P((char *user, char *passwd));
724 extern int (*chap_passwd_hook) __P((char *user, char *passwd));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/pptpd/pptpd-1.3.4/plugins/
H A Dpppd.h285 extern char passwd[MAXSECRETLEN]; /* Password for PAP or CHAP */
288 extern bool uselogin; /* Use /etc/passwd for checking PAP */
680 extern int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
684 extern int (*pap_passwd_hook) __P((char *user, char *passwd));
691 extern int (*chap_passwd_hook) __P((char *user, char *passwd));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/LDAP/smbldap-tools-0.9.2/
H A DMakefile64 @cp smbldap-passwd $(DESTARCH)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/random/
H A Drndunix.c420 struct passwd *passwd; local
430 (passwd = getpwnam("nobody")) != NULL)
431 gatherer_uid = passwd->pw_uid;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/random/
H A Drndunix.c420 struct passwd *passwd; local
430 (passwd = getpwnam("nobody")) != NULL)
431 gatherer_uid = passwd->pw_uid;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/wget-1.12/src/
H A Dftp.c249 char *user, *passwd, *respline; local
273 passwd = u->passwd;
274 search_netrc (u->host, (const char **)&user, (const char **)&passwd, 1);
277 passwd = passwd ? passwd : (opt.ftp_passwd ? opt.ftp_passwd : opt.passwd);
278 if (!passwd) passwd
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/bus/
H A Dactivation-helper.c171 struct passwd *pw;
295 struct passwd *pw;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/tools/
H A Ddbus-launch-x11.c76 struct passwd *user = getpwuid (getuid());
239 struct passwd *user;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dsmbpasswd.c285 struct passwd *pwd;
483 struct passwd *pwd = NULL;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/
H A Dcifsencrypt.c40 extern void E_md4hash(const unsigned char *passwd, unsigned char *p16);
41 extern void SMBencrypt(unsigned char *passwd, const unsigned char *c8,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/
H A Dsmbspool.c404 struct passwd *pw;
485 struct passwd *pwd;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/
H A Dpdb_smbpasswd.c490 DEBUG(0, ("getsmbfilepwent: malformed password entry for user %s (passwd too short)\n",
533 DEBUG(5,("getsmbfilepwent: returning passwd entry for user %s, uid %ld\n",
672 /* Create a new smb passwd entry and set it to the given password. */
910 DEBUG(0, ("mod_smbfilepwd_entry: malformed password entry for user %s (passwd too short)\n",
928 DEBUG(0, ("mod_smbfilepwd_entry: malformed password entry for user %s (passwd too short)\n",
1063 DEBUG(0, ("mod_smbfilepwd_entry: check on passwd file %s failed.\n", pfile));
1077 DEBUG(0, ("mod_smbfilepwd_entry: write failed in passwd file %s\n", pfile));
1208 struct passwd *passwd = getpwnam_alloc(NULL, lp_guestaccount()); local
1209 if (!passwd) {
[all...]
H A Dpdb_interface.c250 struct passwd *pwd;
299 struct passwd *pwd;
775 struct passwd *pwd;
837 struct passwd *pwd;
1199 struct passwd *unix_pw;
1366 struct passwd *pwd;
1396 struct passwd *pw = getpwnam(*gr);
1468 struct passwd *pw;
1536 struct passwd *pw;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/
H A Dauth.c241 static int login(AFPObj *obj, struct passwd *pwd, void (*logout)(void), int expired)
402 int set_groups(AFPObj *obj, struct passwd *pwd)
737 struct passwd *pwd = NULL;
788 struct passwd *pwd = NULL;
915 struct passwd *pwd = NULL;
956 struct passwd *pwd;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/forked-daapd-0.19/src/
H A Dhttpd.c763 char *passwd; local
771 passwd = cfg_getstr(cfg_getsec(cfg, "general"), "admin_password");
772 if (passwd)
776 ret = httpd_basic_auth(req, "admin", passwd, PACKAGE " web interface");
1095 httpd_basic_auth(struct evhttp_request *req, char *user, char *passwd, char *realm) argument
1153 if (strcmp(passwd, authpwd) != 0)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/
H A Dsystem.c1021 struct passwd *sys_getpwent(void)
1039 * don't have root access, we need to bypass direct access to /etc/passwd
1043 static struct passwd *fake_pwd;
1046 struct passwd *sys_getpwnam(const char *name)
1060 struct passwd *sys_getpwuid(uid_t uid)
1079 struct passwd new_pwd;
1102 ADD_TO_ARRAY(NULL, struct passwd, new_pwd, &fake_pwd,
1111 struct passwd *sys_getpwnam(const char *name)
1116 struct passwd *sys_getpwuid(uid_t uid)
1265 struct passwd *pwre
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/confuse-2.7/src/
H A Dconfuse.c1127 struct passwd *passwd = 0; local
1133 passwd = getpwuid(geteuid());
1146 passwd = getpwnam(user);
1150 if(passwd)
1152 expanded = malloc(strlen(passwd->pw_dir) + strlen(file) + 1);
1153 strcpy(expanded, passwd->pw_dir);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/
H A Dsrv_srvsvc_nt.c260 pstring passwd; local
278 pstrcpy(passwd, "");
282 remark, 0, max_uses, count, path, passwd);
284 init_srv_share_info2_str(&sh2->info_2_str, net_name, remark, path, passwd);
337 pstring passwd; local
358 pstrcpy(passwd, "");
362 init_srv_share_info502(&sh502->info_502, net_name, get_share_type(snum), remark, 0, 0xffffffff, 1, path, passwd, sd, sd_size);
363 init_srv_share_info502_str(&sh502->info_502_str, net_name, remark, path, passwd, sd, sd_size);
883 struct passwd *pw = sys_getpwnam(session_list[*snum].username);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/gettext-0.17/gnulib-local/lib/libxml/
H A Dnanoftp.c125 char *passwd; /* passwd string */ member in struct:xmlNanoFTPCtxt
147 static char *proxyPasswd = NULL;/* passwd for proxy authentication */
255 * @passwd: the proxy password
265 const char *passwd, int type) {
282 if (passwd)
283 proxyPasswd = xmlMemStrdup(passwd);
344 ctxt->passwd = xmlMemStrdup(cptr+1);
794 if (ctxt->passwd == NULL)
797 snprintf(buf, sizeof(buf), "PASS %s\r\n", ctxt->passwd);
264 xmlNanoFTPProxy(const char *host, int port, const char *user, const char *passwd, int type) argument
[all...]

Completed in 325 milliseconds

1234567891011>>