/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/ |
H A D | logintest.c | 12 soap->passwd = "86f7e437faa5a7fce15d1ddcb9eaeaea377667b8"; 31 soap->passwd = "86f7e437faa5a7fce15d1ddcb9eaeaea377667b8";
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/libbb/ |
H A D | correct_password.c | 39 int correct_password(const struct passwd *pw)
|
H A D | setup_environment.c | 33 void setup_environment(const char *shell, int loginshell, int changeenv, const struct passwd *pw)
|
H A D | bb_pwd.c | 50 struct passwd *myuser = getpwuid(uid); 81 struct passwd *myuser;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/bin/afppasswd/ |
H A D | afppasswd.c | 118 char password[PASSWDLEN + 1], *p, *passwd; local 168 passwd = getpass("Enter OLD AFP password: "); 170 if (strncmp(passwd, p, PASSWDLEN)) { 178 passwd = getpass("Enter NEW AFP password: "); 179 memcpy(password, passwd, sizeof(password)); 183 if (passwd = FascistCheck(password, _PATH_CRACKLIB)) { 184 fprintf(stderr, "Error: %s\n", passwd); 191 passwd = getpass("Enter NEW AFP password again: "); 192 if (strcmp(passwd, password) == 0) { 224 struct passwd *pw [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/build_vxworks/db_recover/ |
H A D | db_recover.c | 52 char *home, *passwd; local 62 home = passwd = NULL; 81 passwd = strdup(optarg); 83 if (passwd == NULL) { 133 if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, 134 passwd, DB_ENCRYPT_AES)) != 0) { 175 if (passwd != NULL) 176 free(passwd);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/build_vxworks/db_verify/ |
H A D | db_verify.c | 50 char *home, *passwd; local 65 home = passwd = NULL; 76 passwd = strdup(optarg); 78 if (passwd == NULL) { 135 if (passwd != NULL && 136 (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { 251 if (passwd != NULL) 252 free(passwd);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/db_recover/ |
H A D | db_recover.c | 38 char *home, *passwd; local 48 home = passwd = NULL; 66 passwd = strdup(optarg); 68 if (passwd == NULL) { 118 if (passwd != NULL && (ret = dbenv->set_encrypt(dbenv, 119 passwd, DB_ENCRYPT_AES)) != 0) { 160 if (passwd != NULL) 161 free(passwd);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/db_verify/ |
H A D | db_verify.c | 36 char *home, *passwd; local 51 home = passwd = NULL; 61 passwd = strdup(optarg); 63 if (passwd == NULL) { 120 if (passwd != NULL && 121 (ret = dbenv->set_encrypt(dbenv, passwd, DB_ENCRYPT_AES)) != 0) { 236 if (passwd != NULL) 237 free(passwd);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bftpd-1.6.6/ |
H A D | login.h | 8 extern struct passwd userinfo;
|
H A D | options.h | 26 struct passwd pwd;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/include/wx/protocol/ |
H A D | http.h | 47 virtual void SetPassword(const wxString& passwd ) { m_password = passwd; }
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/include/atalk/ |
H A D | uam.h | 89 extern UAM_MODULE_EXPORT struct passwd *uam_getname (void*, char *, const int); 90 extern UAM_MODULE_EXPORT int uam_checkuser (const struct passwd *);
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppoecd/ |
H A D | options.c | 38 char passwd[MAXSECRETLEN]; /* Password for PAP */ variable 69 static char *usage_string = "usage: %s interface -d -k [-i idle] [-u username] [-p passwd] [-a acname] [-s srvname] [-r mru] [-t mtu]\n"; 99 strncpy(passwd, optarg, MAXSECRETLEN);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/packaging/LSB/ |
H A D | smb.conf | 40 # Uncomment this if you want a guest account, you must add this to /etc/passwd 66 ; smb passwd file = /etc/samba/smbpasswd 70 # NOTE: Use these with 'encrypt passwords' and 'smb passwd file' above. 75 ; passwd program = /usr/bin/passwd %u 76 ; passwd chat = *New*UNIX*password* %n\n *ReType*new*UNIX*password* %n\n *passwd:*all*authentication*tokens*updated*successfully*
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/ |
H A D | auth.c | 112 /* Set if we got the contents of passwd[] from the pap-secrets file. */ 125 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 133 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL; 153 bool uselogin = 0; /* Use /etc/passwd for checking PAP */ 242 { "password", o_string, passwd, 315 if (override_value("passwd", option_priority, fname)) 316 strlcpy(passwd, p, sizeof(passwd)); 485 if (passwd[0] == 0) { 487 if (!get_pap_passwd(passwd)) 912 char passwd[256], user[256]; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | smbencrypt.c | 53 BOOL SMBencrypt(const char *passwd, const uchar *c8, uchar p24[24]) argument 58 ret = E_deshash(passwd, lm_hash); 65 * @param passwd password in 'unix' charset. 69 void E_md4hash(const char *passwd, uchar p16[16]) argument 75 push_ucs2(NULL, wpwd, (const char *)passwd, 256, STR_UNICODE|STR_NOALIGN|STR_TERMINATE); 105 * @param passwd password in 'unix' charset. 111 BOOL E_deshash(const char *passwd, uchar p16[16]) argument 118 push_ascii(dospwd, passwd, sizeof(dospwd), STR_UPPER|STR_TERMINATE); 135 * @param passwd password in 'unix' charset. 219 void SMBOWFencrypt(const uchar passwd[1 argument 230 NTLMSSPOWFencrypt(const uchar passwd[8], const uchar *ntlmchalresp, uchar p24[24]) argument 268 SMBNTencrypt(const char *passwd, uchar *c8, uchar *p24) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | httpda.c | 13 { struct http_da_info info; // to store userid and passwd 14 http_da_save(&soap, &info, authrealm, userid, passwd); 18 ... // userid and passwd were deallocated 19 http_da_restore(&soap, &info); // get userid and passwd after soap_end() 22 http_da_release(&soap, &info); // remove userid and passwd 31 { if (soap->userid && soap->passwd) // Basic authentication 32 { if (!strcmp(soap->userid, userid) && !strcmp(soap->passwd, passwd)) 38 { passwd = ... // database lookup on userid and authrealm to find passwd 422 http_da_save(struct soap *soap, struct http_da_info *info, const char *realm, const char *userid, const char *passwd) argument 507 http_da_verify_post(struct soap *soap, char *passwd) argument 512 http_da_verify_get(struct soap *soap, char *passwd) argument 517 http_da_verify_method(struct soap *soap, char *method, char *passwd) argument 690 http_da_calc_HA1(struct soap *soap, void **context, char *alg, char *userid, char *realm, char *passwd, char *nonce, char *cnonce, char HA1hex[33]) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | httpda.c | 13 { struct http_da_info info; // to store userid and passwd 14 http_da_save(&soap, &info, authrealm, userid, passwd); 18 ... // userid and passwd were deallocated 19 http_da_restore(&soap, &info); // get userid and passwd after soap_end() 22 http_da_release(&soap, &info); // remove userid and passwd 31 { if (soap->userid && soap->passwd) // Basic authentication 32 { if (!strcmp(soap->userid, userid) && !strcmp(soap->passwd, passwd)) 38 { passwd = ... // database lookup on userid and authrealm to find passwd 422 http_da_save(struct soap *soap, struct http_da_info *info, const char *realm, const char *userid, const char *passwd) argument 507 http_da_verify_post(struct soap *soap, char *passwd) argument 512 http_da_verify_get(struct soap *soap, char *passwd) argument 517 http_da_verify_method(struct soap *soap, char *method, char *passwd) argument 690 http_da_calc_HA1(struct soap *soap, void **context, char *alg, char *userid, char *realm, char *passwd, char *nonce, char *cnonce, char HA1hex[33]) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/nsswitch/ |
H A D | getent_pwent.c | 29 struct passwd *pw;
|
H A D | initgroups.c | 11 struct passwd *pw; 14 printf("FAIL: no passwd entry for %s\n", argv[1]);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/smbd/ |
H A D | se_access_check_allowall.c | 38 BOOL allowall_check(struct passwd *pw, int ngroups, gid_t *groups)
|
H A D | se_access_check_denyall.c | 38 BOOL denyall_check(struct passwd *pw, int ngroups, gid_t *groups)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/dbinc/ |
H A D | crypto.h | 20 * structure so we can tell if users specified both passwd and alg 65 roff_t passwd; /* Offset to shared passwd */ member in struct:__cipher 66 size_t passwd_len; /* Length of passwd */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/hmac/ |
H A D | hmac.c | 132 __db_derive_mac(passwd, plen, mac_key) 133 u_int8_t *passwd; 141 __db_SHA1Update(&ctx, passwd, plen); 143 __db_SHA1Update(&ctx, passwd, plen);
|