Searched refs:password (Results 226 - 250 of 458) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/wget-1.12/src/
H A Dhttp-ntlm.c227 mkhash(const char *password,
244 int len = strlen(password);
253 pw[i] = c_toupper (password[i]);
259 /* create LanManager hashed password */
277 /* create NT hashed password */
280 len = strlen(password);
283 pw[2*i] = password[i];
225 mkhash(const char *password, unsigned char *nonce, unsigned char *lmresp , unsigned char *ntresp ) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/
H A Dkrb5_setpw.c3 krb5 set password implementation
56 /* This implements kerberos password change protocol as specified in
57 * kerb-chg-password-02.txt and kerberos-set-passwd-02.txt
61 static DATA_BLOB encode_krb5_setpw(const char *principal, const char *password) argument
98 asn1_write_OctetString(&req, password, strlen(password));
388 DEBUG(1, ("Error changing password: %s (%d)\n", errstr, res_code));
693 char *chpw_princ = NULL, *password; local
715 /* We have to obtain an INITIAL changepw ticket for changing password */
718 password
775 ads_set_machine_password(ADS_STRUCT *ads, const char *machine_account, const char *password) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dsrp.c210 char password[1024]; local
216 cb_tmp.password = passin;
218 if (password_callback(password, 1024, 0, &cb_tmp) > 0) {
222 BIO_printf(bio, "Pass %s\n", password);
226 SRP_create_verifier(user, password, &srp_usersalt, &verifier, N,
242 char password[1024]; local
247 cb_tmp.password = passout;
249 if (password_callback(password, 1024, 1, &cb_tmp) > 0) {
255 SRP_create_verifier(user, password, &salt, srp_verifier, N,
647 "Verifying password fo
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dsrp.c210 char password[1024]; local
216 cb_tmp.password = passin;
218 if (password_callback(password, 1024, 0, &cb_tmp) > 0) {
222 BIO_printf(bio, "Pass %s\n", password);
226 SRP_create_verifier(user, password, &srp_usersalt, &verifier, N,
242 char password[1024]; local
247 cb_tmp.password = passout;
249 if (password_callback(password, 1024, 1, &cb_tmp) > 0) {
255 SRP_create_verifier(user, password, &salt, srp_verifier, N,
647 "Verifying password fo
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/
H A Dpy_smb.c101 char *username, *domain, *password, *errstr; local
107 if (!py_parse_creds(creds, &username, &domain, &password, &errstr)) {
113 cli->cli, username, password, strlen(password) + 1,
114 password, strlen(password) + 1, domain);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Dcurl_ntlm_core.c312 * Set up lanmanager hashed password
315 const char *password,
323 size_t len = CURLMIN(strlen(password), 14);
325 Curl_strntoupper((char *)pw, password, len);
329 * The LanManager hashed password needs to be created using the
330 * password in the network encoding not the host encoding.
337 /* Create LanManager hashed password. */
415 const char *password,
418 size_t len = strlen(password);
424 ascii_to_unicode_le(pw, password, le
314 Curl_ntlm_core_mk_lm_hash(struct SessionHandle *data, const char *password, unsigned char *lmbuffer ) argument
414 Curl_ntlm_core_mk_nt_hash(struct SessionHandle *data, const char *password, unsigned char *ntbuffer ) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/
H A Dkeystore.c622 "password tokens\n", __func__);
627 (u8 *)s->auth_tok->token.password.session_key_encryption_key,
628 s->auth_tok->token.password.session_key_encryption_key_bytes);
648 s->auth_tok->token.password.session_key_encryption_key_bytes);
727 s->auth_tok->token.password.session_key_encryption_key,
731 "rc = [%d]. s->auth_tok->token.password.session_key_"
735 s->auth_tok->token.password.session_key_encryption_key,
926 "password tokens\n", __func__);
931 s->auth_tok->token.password.session_key_encryption_key,
935 "rc = [%d]. s->auth_tok->token.password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/
H A Drpc-server.c66 char * password; member in struct:tr_rpc_server
621 || !tr_ssha1_matches( server->password,
851 const char * password )
853 tr_free( server->password );
854 if( *password != '{' )
855 server->password = tr_ssha1( password );
857 server->password = strdup( password );
858 dbgmsg( "setting our Password to [%s]", server->password );
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-plugins/defer/
H A Dsimple.c166 /* get username/password from envp string array */
168 const char *password = get_env ("password", envp); local
175 np(password),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bpalogin/
H A Dbpalogin.c49 s->debug(1,"password = %s\n",s->password);
61 if(!strcmp(s->password,""))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/zlib-1.2.3/contrib/minizip/
H A Dunzip.h259 const char* password));
262 password is a crypting password
283 const char* password));
H A Dminizip.c138 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] file.zip [files_to_add]\n\n" \
199 const char* password=NULL; local
228 password=argv[i+1];
348 if ((password != NULL) && (err==ZIP_OK))
357 password,crcFile);
H A Dzip.h193 const char* password,
199 password : crypting password (NULL for no crypting)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/zlib-1.2.3/contrib/minizip/
H A Dunzip.h259 const char* password));
262 password is a crypting password
283 const char* password));
H A Dminizip.c138 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] file.zip [files_to_add]\n\n" \
199 const char* password=NULL; local
228 password=argv[i+1];
348 if ((password != NULL) && (err==ZIP_OK))
357 password,crcFile);
H A Dzip.h193 const char* password,
199 password : crypting password (NULL for no crypting)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/
H A Dlibssh.c66 static av_cold int libssh_authentication(LIBSSHContext *libssh, const char *user, const char *password) argument
85 priv_key = privatekey_from_file(libssh->session, libssh->priv_key, type, password);
94 } else if (ssh_userauth_autopubkey(libssh->session, password) == SSH_AUTH_SUCCESS) {
101 if (ssh_userauth_password(libssh->session, NULL, password) == SSH_AUTH_SUCCESS) {
102 av_log(libssh, AV_LOG_DEBUG, "Authentication successful with password.\n");
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/zlib-1.2.8/contrib/minizip/
H A Dminizip.c174 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \
260 const char* password=NULL; local
291 password=argv[i+1];
419 if ((password != NULL) && (err==ZIP_OK))
457 password,crcFile, zip64);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dsocks.c111 || !creds.password || (strlen(creds.password) > 255) ) {
113 "SOCKS username and/or password exceeds 255 characters. "
118 creds.username, (int) strlen(creds.password), creds.password);
261 case 2: /* login/password */
H A Dntlm.c195 char pwbuf[sizeof (p->up.password) * 2]; /* for unicode password */
222 ASSERT (strlen (p->up.password) > 0);
241 gen_md4_hash (pwbuf, unicodize (pwbuf, p->up.password) - 2, md4_hash);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/
H A Duams_passwd.c238 /* old password */
257 /* new password */
277 char password[PASSWDLEN + 1] = "\0"; local
289 * (username) (password)
308 /* Parse input for password in next () */
311 LOG(log_info, logtype_uams,"Bad Login ClearTxtUAM: password not found in string");
315 memcpy(password, p, MIN(PASSWDLEN, q - p) );
317 /* Done copying username and password, clean up */
353 LOG(log_info, logtype_uams, "Bad Login ClearTxtUAM: no password for %s",
359 if ( kcheckuser( pwd, password)
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/reg/
H A Dregkey.c19 hnd->password = SMB_MALLOC_ARRAY(char, sizeof(fstring));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/windll/
H A Duzexampl.c84 int WINAPI password(LPSTR, int, LPCSTR, LPCSTR);
154 lpUserFunctions->password = password;
463 /* Password entry routine - see password.c in the wiz directory for how
467 int WINAPI password(LPSTR p, int n, LPCSTR m, LPCSTR name) function
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/zlib-1.2.7/contrib/minizip/
H A Dminizip.c174 printf("Usage : minizip [-o] [-a] [-0 to -9] [-p password] [-j] file.zip [files_to_add]\n\n" \
260 const char* password=NULL; local
291 password=argv[i+1];
419 if ((password != NULL) && (err==ZIP_OK))
457 password,crcFile, zip64);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/
H A Dwsseapi.h135 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password);
136 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password);
139 int soap_wsse_verify_Password(struct soap *soap, const char *password);

Completed in 177 milliseconds

1234567891011>>