Searched refs:passwd (Results 76 - 100 of 440) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/
H A Dlogintest.c12 soap->passwd = "86f7e437faa5a7fce15d1ddcb9eaeaea377667b8";
31 soap->passwd = "86f7e437faa5a7fce15d1ddcb9eaeaea377667b8";
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/libbb/
H A Dcorrect_password.c39 int correct_password(const struct passwd *pw)
H A Dsetup_environment.c33 void setup_environment(const char *shell, int loginshell, int changeenv, const struct passwd *pw)
H A Dbb_pwd.c50 struct passwd *myuser = getpwuid(uid);
81 struct passwd *myuser;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/bin/afppasswd/
H A Dafppasswd.c118 char password[PASSWDLEN + 1], *p, *passwd; local
168 passwd = getpass("Enter OLD AFP password: ");
170 if (strncmp(passwd, p, PASSWDLEN)) {
178 passwd = getpass("Enter NEW AFP password: ");
179 memcpy(password, passwd, sizeof(password));
183 if (passwd = FascistCheck(password, _PATH_CRACKLIB)) {
184 fprintf(stderr, "Error: %s\n", passwd);
191 passwd = getpass("Enter NEW AFP password again: ");
192 if (strcmp(passwd, password) == 0) {
224 struct passwd *pw
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/build_vxworks/db_recover/
H A Ddb_recover.c52 char *home, *passwd; local
62 home = passwd = NULL;
81 passwd = strdup(optarg);
83 if (passwd == NULL) {
133 if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
134 passwd, DB_ENCRYPT_AES)) != 0) {
175 if (passwd != NULL)
176 free(passwd);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/build_vxworks/db_verify/
H A Ddb_verify.c50 char *home, *passwd; local
65 home = passwd = NULL;
76 passwd = strdup(optarg);
78 if (passwd == NULL) {
135 if (passwd != NULL &&
136 (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
251 if (passwd != NULL)
252 free(passwd);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/db_recover/
H A Ddb_recover.c38 char *home, *passwd; local
48 home = passwd = NULL;
66 passwd = strdup(optarg);
68 if (passwd == NULL) {
118 if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv,
119 passwd, DB_ENCRYPT_AES)) != 0) {
160 if (passwd != NULL)
161 free(passwd);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/db_verify/
H A Ddb_verify.c36 char *home, *passwd; local
51 home = passwd = NULL;
61 passwd = strdup(optarg);
63 if (passwd == NULL) {
120 if (passwd != NULL &&
121 (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) {
236 if (passwd != NULL)
237 free(passwd);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bftpd-1.6.6/
H A Dlogin.h8 extern struct passwd userinfo;
H A Doptions.h26 struct passwd pwd;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/include/wx/protocol/
H A Dhttp.h47 virtual void SetPassword(const wxString& passwd ) { m_password = passwd; }
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/include/atalk/
H A Duam.h89 extern UAM_MODULE_EXPORT struct passwd *uam_getname (void*, char *, const int);
90 extern UAM_MODULE_EXPORT int uam_checkuser (const struct passwd *);
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppoecd/
H A Doptions.c38 char passwd[MAXSECRETLEN]; /* Password for PAP */ variable
69 static char *usage_string = "usage: %s interface -d -k [-i idle] [-u username] [-p passwd] [-a acname] [-s srvname] [-r mru] [-t mtu]\n";
99 strncpy(passwd, optarg, MAXSECRETLEN);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/packaging/LSB/
H A Dsmb.conf40 # Uncomment this if you want a guest account, you must add this to /etc/passwd
66 ; smb passwd file = /etc/samba/smbpasswd
70 # NOTE: Use these with 'encrypt passwords' and 'smb passwd file' above.
75 ; passwd program = /usr/bin/passwd %u
76 ; passwd chat = *New*UNIX*password* %n\n *ReType*new*UNIX*password* %n\n *passwd:*all*authentication*tokens*updated*successfully*
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/
H A Dauth.c112 /* Set if we got the contents of passwd[] from the pap-secrets file. */
125 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
133 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
153 bool uselogin = 0; /* Use /etc/passwd for checking PAP */
242 { "password", o_string, passwd,
315 if (override_value("passwd", option_priority, fname))
316 strlcpy(passwd, p, sizeof(passwd));
485 if (passwd[0] == 0) {
487 if (!get_pap_passwd(passwd))
912 char passwd[256], user[256]; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dsmbencrypt.c53 BOOL SMBencrypt(const char *passwd, const uchar *c8, uchar p24[24]) argument
58 ret = E_deshash(passwd, lm_hash);
65 * @param passwd password in 'unix' charset.
69 void E_md4hash(const char *passwd, uchar p16[16]) argument
75 push_ucs2(NULL, wpwd, (const char *)passwd, 256, STR_UNICODE|STR_NOALIGN|STR_TERMINATE);
105 * @param passwd password in 'unix' charset.
111 BOOL E_deshash(const char *passwd, uchar p16[16]) argument
118 push_ascii(dospwd, passwd, sizeof(dospwd), STR_UPPER|STR_TERMINATE);
135 * @param passwd password in 'unix' charset.
219 void SMBOWFencrypt(const uchar passwd[1 argument
230 NTLMSSPOWFencrypt(const uchar passwd[8], const uchar *ntlmchalresp, uchar p24[24]) argument
268 SMBNTencrypt(const char *passwd, uchar *c8, uchar *p24) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/
H A Dhttpda.c13 { struct http_da_info info; // to store userid and passwd
14 http_da_save(&soap, &info, authrealm, userid, passwd);
18 ... // userid and passwd were deallocated
19 http_da_restore(&soap, &info); // get userid and passwd after soap_end()
22 http_da_release(&soap, &info); // remove userid and passwd
31 { if (soap->userid && soap->passwd) // Basic authentication
32 { if (!strcmp(soap->userid, userid) && !strcmp(soap->passwd, passwd))
38 { passwd = ... // database lookup on userid and authrealm to find passwd
422 http_da_save(struct soap *soap, struct http_da_info *info, const char *realm, const char *userid, const char *passwd) argument
507 http_da_verify_post(struct soap *soap, char *passwd) argument
512 http_da_verify_get(struct soap *soap, char *passwd) argument
517 http_da_verify_method(struct soap *soap, char *method, char *passwd) argument
690 http_da_calc_HA1(struct soap *soap, void **context, char *alg, char *userid, char *realm, char *passwd, char *nonce, char *cnonce, char HA1hex[33]) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/
H A Dhttpda.c13 { struct http_da_info info; // to store userid and passwd
14 http_da_save(&soap, &info, authrealm, userid, passwd);
18 ... // userid and passwd were deallocated
19 http_da_restore(&soap, &info); // get userid and passwd after soap_end()
22 http_da_release(&soap, &info); // remove userid and passwd
31 { if (soap->userid && soap->passwd) // Basic authentication
32 { if (!strcmp(soap->userid, userid) && !strcmp(soap->passwd, passwd))
38 { passwd = ... // database lookup on userid and authrealm to find passwd
422 http_da_save(struct soap *soap, struct http_da_info *info, const char *realm, const char *userid, const char *passwd) argument
507 http_da_verify_post(struct soap *soap, char *passwd) argument
512 http_da_verify_get(struct soap *soap, char *passwd) argument
517 http_da_verify_method(struct soap *soap, char *method, char *passwd) argument
690 http_da_calc_HA1(struct soap *soap, void **context, char *alg, char *userid, char *realm, char *passwd, char *nonce, char *cnonce, char HA1hex[33]) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/nsswitch/
H A Dgetent_pwent.c29 struct passwd *pw;
H A Dinitgroups.c11 struct passwd *pw;
14 printf("FAIL: no passwd entry for %s\n", argv[1]);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/smbd/
H A Dse_access_check_allowall.c38 BOOL allowall_check(struct passwd *pw, int ngroups, gid_t *groups)
H A Dse_access_check_denyall.c38 BOOL denyall_check(struct passwd *pw, int ngroups, gid_t *groups)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/dbinc/
H A Dcrypto.h20 * structure so we can tell if users specified both passwd and alg
65 roff_t passwd; /* Offset to shared passwd */ member in struct:__cipher
66 size_t passwd_len; /* Length of passwd */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/hmac/
H A Dhmac.c132 __db_derive_mac(passwd, plen, mac_key)
133 u_int8_t *passwd;
141 __db_SHA1Update(&ctx, passwd, plen);
143 __db_SHA1Update(&ctx, passwd, plen);

Completed in 314 milliseconds

1234567891011>>