/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/wget-1.12/src/ |
H A D | http-ntlm.c | 227 mkhash(const char *password, 244 int len = strlen(password); 253 pw[i] = c_toupper (password[i]); 259 /* create LanManager hashed password */ 277 /* create NT hashed password */ 280 len = strlen(password); 283 pw[2*i] = password[i]; 225 mkhash(const char *password, unsigned char *nonce, unsigned char *lmresp , unsigned char *ntresp ) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | krb5_setpw.c | 3 krb5 set password implementation 56 /* This implements kerberos password change protocol as specified in 57 * kerb-chg-password-02.txt and kerberos-set-passwd-02.txt 61 static DATA_BLOB encode_krb5_setpw(const char *principal, const char *password) argument 98 asn1_write_OctetString(&req, password, strlen(password)); 388 DEBUG(1, ("Error changing password: %s (%d)\n", errstr, res_code)); 693 char *chpw_princ = NULL, *password; local 715 /* We have to obtain an INITIAL changepw ticket for changing password */ 718 password 775 ads_set_machine_password(ADS_STRUCT *ads, const char *machine_account, const char *password) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | srp.c | 210 char password[1024]; local 216 cb_tmp.password = passin; 218 if (password_callback(password, 1024, 0, &cb_tmp) > 0) { 222 BIO_printf(bio, "Pass %s\n", password); 226 SRP_create_verifier(user, password, &srp_usersalt, &verifier, N, 242 char password[1024]; local 247 cb_tmp.password = passout; 249 if (password_callback(password, 1024, 1, &cb_tmp) > 0) { 255 SRP_create_verifier(user, password, &salt, srp_verifier, N, 647 "Verifying password fo [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | srp.c | 210 char password[1024]; local 216 cb_tmp.password = passin; 218 if (password_callback(password, 1024, 0, &cb_tmp) > 0) { 222 BIO_printf(bio, "Pass %s\n", password); 226 SRP_create_verifier(user, password, &srp_usersalt, &verifier, N, 242 char password[1024]; local 247 cb_tmp.password = passout; 249 if (password_callback(password, 1024, 1, &cb_tmp) > 0) { 255 SRP_create_verifier(user, password, &salt, srp_verifier, N, 647 "Verifying password fo [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/ |
H A D | py_smb.c | 101 char *username, *domain, *password, *errstr; local 107 if (!py_parse_creds(creds, &username, &domain, &password, &errstr)) { 113 cli->cli, username, password, strlen(password) + 1, 114 password, strlen(password) + 1, domain);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | curl_ntlm_core.c | 312 * Set up lanmanager hashed password 315 const char *password, 323 size_t len = CURLMIN(strlen(password), 14); 325 Curl_strntoupper((char *)pw, password, len); 329 * The LanManager hashed password needs to be created using the 330 * password in the network encoding not the host encoding. 337 /* Create LanManager hashed password. */ 415 const char *password, 418 size_t len = strlen(password); 424 ascii_to_unicode_le(pw, password, le 314 Curl_ntlm_core_mk_lm_hash(struct SessionHandle *data, const char *password, unsigned char *lmbuffer ) argument 414 Curl_ntlm_core_mk_nt_hash(struct SessionHandle *data, const char *password, unsigned char *ntbuffer ) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/ |
H A D | keystore.c | 622 "password tokens\n", __func__); 627 (u8 *)s->auth_tok->token.password.session_key_encryption_key, 628 s->auth_tok->token.password.session_key_encryption_key_bytes); 648 s->auth_tok->token.password.session_key_encryption_key_bytes); 727 s->auth_tok->token.password.session_key_encryption_key, 731 "rc = [%d]. s->auth_tok->token.password.session_key_" 735 s->auth_tok->token.password.session_key_encryption_key, 926 "password tokens\n", __func__); 931 s->auth_tok->token.password.session_key_encryption_key, 935 "rc = [%d]. s->auth_tok->token.password [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/ |
H A D | rpc-server.c | 66 char * password; member in struct:tr_rpc_server 621 || !tr_ssha1_matches( server->password, 851 const char * password ) 853 tr_free( server->password ); 854 if( *password != '{' ) 855 server->password = tr_ssha1( password ); 857 server->password = strdup( password ); 858 dbgmsg( "setting our Password to [%s]", server->password ); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-plugins/defer/ |
H A D | simple.c | 166 /* get username/password from envp string array */ 168 const char *password = get_env ("password", envp); local 175 np(password),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bpalogin/ |
H A D | bpalogin.c | 49 s->debug(1,"password = %s\n",s->password); 61 if(!strcmp(s->password,""))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/zlib-1.2.3/contrib/minizip/ |
H A D | unzip.h | 259 const char* password)); 262 password is a crypting password 283 const char* password));
|
H A D | minizip.c | 138 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] file.zip [files_to_add]\n\n" \ 199 const char* password=NULL; local 228 password=argv[i+1]; 348 if ((password != NULL) && (err==ZIP_OK)) 357 password,crcFile);
|
H A D | zip.h | 193 const char* password, 199 password : crypting password (NULL for no crypting)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/zlib-1.2.3/contrib/minizip/ |
H A D | unzip.h | 259 const char* password)); 262 password is a crypting password 283 const char* password));
|
H A D | minizip.c | 138 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] file.zip [files_to_add]\n\n" \ 199 const char* password=NULL; local 228 password=argv[i+1]; 348 if ((password != NULL) && (err==ZIP_OK)) 357 password,crcFile);
|
H A D | zip.h | 193 const char* password, 199 password : crypting password (NULL for no crypting)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/ |
H A D | libssh.c | 66 static av_cold int libssh_authentication(LIBSSHContext *libssh, const char *user, const char *password) argument 85 priv_key = privatekey_from_file(libssh->session, libssh->priv_key, type, password); 94 } else if (ssh_userauth_autopubkey(libssh->session, password) == SSH_AUTH_SUCCESS) { 101 if (ssh_userauth_password(libssh->session, NULL, password) == SSH_AUTH_SUCCESS) { 102 av_log(libssh, AV_LOG_DEBUG, "Authentication successful with password.\n");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/zlib-1.2.8/contrib/minizip/ |
H A D | minizip.c | 174 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \ 260 const char* password=NULL; local 291 password=argv[i+1]; 419 if ((password != NULL) && (err==ZIP_OK)) 457 password,crcFile, zip64);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | socks.c | 111 || !creds.password || (strlen(creds.password) > 255) ) { 113 "SOCKS username and/or password exceeds 255 characters. " 118 creds.username, (int) strlen(creds.password), creds.password); 261 case 2: /* login/password */
|
H A D | ntlm.c | 195 char pwbuf[sizeof (p->up.password) * 2]; /* for unicode password */ 222 ASSERT (strlen (p->up.password) > 0); 241 gen_md4_hash (pwbuf, unicodize (pwbuf, p->up.password) - 2, md4_hash);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_passwd.c | 238 /* old password */ 257 /* new password */ 277 char password[PASSWDLEN + 1] = "\0"; local 289 * (username) (password) 308 /* Parse input for password in next () */ 311 LOG(log_info, logtype_uams,"Bad Login ClearTxtUAM: password not found in string"); 315 memcpy(password, p, MIN(PASSWDLEN, q - p) ); 317 /* Done copying username and password, clean up */ 353 LOG(log_info, logtype_uams, "Bad Login ClearTxtUAM: no password for %s", 359 if ( kcheckuser( pwd, password) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/reg/ |
H A D | regkey.c | 19 hnd->password = SMB_MALLOC_ARRAY(char, sizeof(fstring));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/windll/ |
H A D | uzexampl.c | 84 int WINAPI password(LPSTR, int, LPCSTR, LPCSTR); 154 lpUserFunctions->password = password; 463 /* Password entry routine - see password.c in the wiz directory for how 467 int WINAPI password(LPSTR p, int n, LPCSTR m, LPCSTR name) function
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/zlib-1.2.7/contrib/minizip/ |
H A D | minizip.c | 174 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \ 260 const char* password=NULL; local 291 password=argv[i+1]; 419 if ((password != NULL) && (err==ZIP_OK)) 457 password,crcFile, zip64);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | wsseapi.h | 135 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password); 136 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password); 139 int soap_wsse_verify_Password(struct soap *soap, const char *password);
|