/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/write/ |
H A D | write_11.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_12.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_13.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/Micromax/Linux/shell/ |
H A D | dial_on | 9 PASSWORD=$4 # The password for this account 64 /usr/local/lcDial/sbin/pppd linkname LcPhone $AUTHENTICATION lock crtscts modem $DEVICE 115200 $USEPEERDNS noauth noipdefault defaultroute name "$ACCOUNT" password "$PASSWORD" connect $DIALER_SCRIPT disconnect $CLOSE_SCRIPT
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | auth_unix.c | 27 * update the encrypted smbpasswd file from the plaintext username and password 31 static BOOL update_smbpassword_file(const char *user, const char *password) argument 52 * users password from a login. 59 if (!pdb_set_plaintext_passwd (sampass, password)) { 80 /** Check a plaintext username/password 82 * Cannot deal with an encrupted password in any manner whatsoever, 83 * unless the account has a null password. 99 /** @todo This call assumes a ASCII password, no charset transformation is
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/mtools-4.0.10/ |
H A D | missFuncs.c | 362 static char password[129]; local 366 fgets(password, 128, stdin); 367 l = strlen(password); 368 if(l && password[l-1] == '\n') 369 password[l-1] = '\0'; 370 return password;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bpalogin/ |
H A D | unixmain.c | 208 strcpy(s.password,""); 240 strcpy(s.password, optarg); 337 printf("password = %s\n",s.password); 350 if(!strcmp(s.password,"")) 412 strcpy(s->password,buf); 414 /* strcpy(s->password, "bpa-passwd"); */ /* Foxconn removed, Jared Hsu, 2006/02/23 */ 417 debug(2,"parse password : %s\n",s->password); 472 printf(" -p password Passwor [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/ |
H A D | httpauth.c | 131 const char *password, const char *uri, 159 update_md5_strings(md5ctx, username, ":", state->realm, ":", password, NULL); 255 char *username = av_strdup(auth), *password; local 260 if ((password = strchr(username, ':'))) { 261 *password++ = 0; 262 authstr = make_digest_auth(state, username, password, path, method); 130 make_digest_auth(HTTPAuthState *state, const char *username, const char *password, const char *uri, const char *method) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/bin/afppasswd/ |
H A D | afppasswd.c | 5 * format of the password file: 7 * password last login date failed usage count 98 /* decrypt the password */ 118 char password[PASSWDLEN + 1], *p, *passwd; local 144 fprintf(stderr, "Your password is disabled. Please see your administrator.\n"); 166 /* need to verify against old password */ 168 passwd = getpass("Enter OLD AFP password: "); 171 fprintf(stderr, "afppasswd: invalid password.\n"); 177 /* new password */ 178 passwd = getpass("Enter NEW AFP password [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/ |
H A D | masktest.c | 23 static fstring password; variable 219 fstrcpy(password, pass); 224 password, strlen(password), 225 password, strlen(password), 246 password, strlen(password)+1)) { 492 fstrcpy(password, p+1);
|
H A D | locktest.c | 23 static fstring password[2]; variable 216 fstrcpy(password[0], pass); 217 fstrcpy(password[1], pass); 222 fstrcpy(password[1], password[0]); 227 password[snum], 228 strlen(password[snum]), 229 password[snum], 230 strlen(password[snum]), 251 password[snu [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/plugins/auth-pam/ |
H A D | auth-pam.c | 85 * "PASSWORD" -- substitute client-specified password 102 * Used to pass the username/password 109 char password[128]; member in struct:user_pass 474 /* get username/password from envp string array */ 476 const char *password = get_env ("password", envp); local 479 if (username && strlen (username) > 0 && password) 483 || send_string (context->foreground_fd, password) == -1 600 aresp[i].resp = searchandreplace(match_value, "PASSWORD", up->password); 621 aresp[i].resp = strdup (up->password); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libmsrpc/ |
H A D | libmsrpc.c | 61 hnd->password = SMB_MALLOC_ARRAY( char, sizeof( fstring ) ); 62 if ( !hnd->password ) 65 hnd->password[0] = '\0'; 171 hnd->domain, hnd->username, hnd->password, 243 SAFE_FREE( hnd->password );
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | wsse2api.h | 128 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password); 129 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password); 132 int soap_wsse_verify_Password(struct soap *soap, const char *password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | wsse2api.h | 128 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password); 129 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password); 132 int soap_wsse_verify_Password(struct soap *soap, const char *password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/ |
H A D | httpauth.c | 138 const char *password, const char *uri, 166 update_md5_strings(md5ctx, username, ":", state->realm, ":", password, NULL); 278 char *username = ff_urldecode(auth), *password; local 283 if ((password = strchr(username, ':'))) { 284 *password++ = 0; 285 authstr = make_digest_auth(state, username, password, path, method); 137 make_digest_auth(HTTPAuthState *state, const char *username, const char *password, const char *uri, const char *method) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/ |
H A D | cifsencrypt.c | 213 const char *password) 219 E_md4hash(password, temp_key); 227 void calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, argument 234 if (password) 235 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); 260 /* clear password before we return/free memory */ 280 /* calculate md4 hash of password */ 281 E_md4hash(ses->password, nt_hash); 212 cifs_calculate_mac_key(struct mac_key *key, const char *rn, const char *password) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | password.c | 621 static char *validate_group(char *group, DATA_BLOB password,int snum) argument 630 password_ok(user,password)) { 688 password_ok(name,password)) { 708 Check for authority to login to a service with a given username/password. 712 BOOL authorise_login(int snum, fstring user, DATA_BLOB password, argument 719 "user=%s pass=%s\n", user,password.data)); 725 1) login as the given user with given password 727 password 728 3) login as a session list username with the given password 729 4) login as a previously validated user/password pai [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/getdents/ |
H A D | getdents_3.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | getdents_4.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | getdents_5.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/lseekdir/ |
H A D | lseekdir_5.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | lseekdir_6.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/readdir/ |
H A D | readdir_1.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | readdir_5.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|