Searched refs:password (Results 176 - 200 of 458) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/write/
H A Dwrite_11.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dwrite_12.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dwrite_13.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/Micromax/Linux/shell/
H A Ddial_on9 PASSWORD=$4 # The password for this account
64 /usr/local/lcDial/sbin/pppd linkname LcPhone $AUTHENTICATION lock crtscts modem $DEVICE 115200 $USEPEERDNS noauth noipdefault defaultroute name "$ACCOUNT" password "$PASSWORD" connect $DIALER_SCRIPT disconnect $CLOSE_SCRIPT
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/
H A Dauth_unix.c27 * update the encrypted smbpasswd file from the plaintext username and password
31 static BOOL update_smbpassword_file(const char *user, const char *password) argument
52 * users password from a login.
59 if (!pdb_set_plaintext_passwd (sampass, password)) {
80 /** Check a plaintext username/password
82 * Cannot deal with an encrupted password in any manner whatsoever,
83 * unless the account has a null password.
99 /** @todo This call assumes a ASCII password, no charset transformation is
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/mtools-4.0.10/
H A DmissFuncs.c362 static char password[129]; local
366 fgets(password, 128, stdin);
367 l = strlen(password);
368 if(l && password[l-1] == '\n')
369 password[l-1] = '\0';
370 return password;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bpalogin/
H A Dunixmain.c208 strcpy(s.password,"");
240 strcpy(s.password, optarg);
337 printf("password = %s\n",s.password);
350 if(!strcmp(s.password,""))
412 strcpy(s->password,buf);
414 /* strcpy(s->password, "bpa-passwd"); */ /* Foxconn removed, Jared Hsu, 2006/02/23 */
417 debug(2,"parse password : %s\n",s->password);
472 printf(" -p password Passwor
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/
H A Dhttpauth.c131 const char *password, const char *uri,
159 update_md5_strings(md5ctx, username, ":", state->realm, ":", password, NULL);
255 char *username = av_strdup(auth), *password; local
260 if ((password = strchr(username, ':'))) {
261 *password++ = 0;
262 authstr = make_digest_auth(state, username, password, path, method);
130 make_digest_auth(HTTPAuthState *state, const char *username, const char *password, const char *uri, const char *method) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/bin/afppasswd/
H A Dafppasswd.c5 * format of the password file:
7 * password last login date failed usage count
98 /* decrypt the password */
118 char password[PASSWDLEN + 1], *p, *passwd; local
144 fprintf(stderr, "Your password is disabled. Please see your administrator.\n");
166 /* need to verify against old password */
168 passwd = getpass("Enter OLD AFP password: ");
171 fprintf(stderr, "afppasswd: invalid password.\n");
177 /* new password */
178 passwd = getpass("Enter NEW AFP password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/
H A Dmasktest.c23 static fstring password; variable
219 fstrcpy(password, pass);
224 password, strlen(password),
225 password, strlen(password),
246 password, strlen(password)+1)) {
492 fstrcpy(password, p+1);
H A Dlocktest.c23 static fstring password[2]; variable
216 fstrcpy(password[0], pass);
217 fstrcpy(password[1], pass);
222 fstrcpy(password[1], password[0]);
227 password[snum],
228 strlen(password[snum]),
229 password[snum],
230 strlen(password[snum]),
251 password[snu
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/plugins/auth-pam/
H A Dauth-pam.c85 * "PASSWORD" -- substitute client-specified password
102 * Used to pass the username/password
109 char password[128]; member in struct:user_pass
474 /* get username/password from envp string array */
476 const char *password = get_env ("password", envp); local
479 if (username && strlen (username) > 0 && password)
483 || send_string (context->foreground_fd, password) == -1
600 aresp[i].resp = searchandreplace(match_value, "PASSWORD", up->password);
621 aresp[i].resp = strdup (up->password);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libmsrpc/
H A Dlibmsrpc.c61 hnd->password = SMB_MALLOC_ARRAY( char, sizeof( fstring ) );
62 if ( !hnd->password )
65 hnd->password[0] = '\0';
171 hnd->domain, hnd->username, hnd->password,
243 SAFE_FREE( hnd->password );
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/
H A Dwsse2api.h128 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password);
129 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password);
132 int soap_wsse_verify_Password(struct soap *soap, const char *password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/
H A Dwsse2api.h128 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password);
129 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password);
132 int soap_wsse_verify_Password(struct soap *soap, const char *password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/
H A Dhttpauth.c138 const char *password, const char *uri,
166 update_md5_strings(md5ctx, username, ":", state->realm, ":", password, NULL);
278 char *username = ff_urldecode(auth), *password; local
283 if ((password = strchr(username, ':'))) {
284 *password++ = 0;
285 authstr = make_digest_auth(state, username, password, path, method);
137 make_digest_auth(HTTPAuthState *state, const char *username, const char *password, const char *uri, const char *method) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/
H A Dcifsencrypt.c213 const char *password)
219 E_md4hash(password, temp_key);
227 void calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, argument
234 if (password)
235 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE);
260 /* clear password before we return/free memory */
280 /* calculate md4 hash of password */
281 E_md4hash(ses->password, nt_hash);
212 cifs_calculate_mac_key(struct mac_key *key, const char *rn, const char *password) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Dpassword.c621 static char *validate_group(char *group, DATA_BLOB password,int snum) argument
630 password_ok(user,password)) {
688 password_ok(name,password)) {
708 Check for authority to login to a service with a given username/password.
712 BOOL authorise_login(int snum, fstring user, DATA_BLOB password, argument
719 "user=%s pass=%s\n", user,password.data));
725 1) login as the given user with given password
727 password
728 3) login as a session list username with the given password
729 4) login as a previously validated user/password pai
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/getdents/
H A Dgetdents_3.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dgetdents_4.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dgetdents_5.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/lseekdir/
H A Dlseekdir_5.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlseekdir_6.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/readdir/
H A Dreaddir_1.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dreaddir_5.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument

Completed in 213 milliseconds

1234567891011>>