Searched refs:password (Results 251 - 275 of 458) sorted by relevance

<<111213141516171819

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/
H A Dwsseapi.h135 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password);
136 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password);
139 int soap_wsse_verify_Password(struct soap *soap, const char *password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dntlm_auth_diagnostics.c447 char *password; local
469 if ((password = strdup_upper(opt_password)) == NULL) {
475 CH_DOS, password,
476 strlen(password)+1,
482 SAFE_FREE(password);
H A Dsmbget.c49 const char *username = NULL, *password = NULL, *workgroup = NULL; variable
100 if(!nonprompt && !password) {
106 } else if(password) strncpy(pw, password, pwlen-1);
530 {"password", 'p', POPT_ARG_STRING, &password, 'p', "Password to use" },
569 username = ""; password = "";
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/sound/isa/opti9xx/
H A Dopti92x-ad1848.c130 unsigned char password; member in struct:snd_opti9xx
233 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3;
239 chip->password = 0xe5;
252 chip->password = 0xe4;
271 outb(chip->password, chip->mc_base + chip->pwd_reg);
279 outb(chip->password, chip->mc_base + chip->pwd_reg);
294 outb(chip->password, chip->mc_base + chip->pwd_reg);
313 outb(chip->password, chip->mc_base + chip->pwd_reg);
321 outb(chip->password, chip->mc_base + chip->pwd_reg);
336 outb(chip->password, chi
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpcclient/
H A Dcmd_lsarpc.c854 static void display_trust_dom_info_4(TRUSTED_DOMAIN_INFO_PASSWORD *p, const char *password) argument
858 DATA_BLOB data = data_blob(NULL, p->password.length);
861 memcpy(data.data, p->password.data, p->password.length);
864 pwd = decrypt_trustdom_secret(password, &data);
865 pwd_old = decrypt_trustdom_secret(password, &data_old);
898 display_trust_dom_info_4(&info->password, pass);
943 display_trust_dom_info(info, info_class, cli->pwd.password);
981 display_trust_dom_info(info, info_class, cli->pwd.password);
1030 display_trust_dom_info(info, info_class, cli->pwd.password);
[all...]
H A Drpcclient.c538 cmdline_auth_info.password,
547 cmdline_auth_info.password,
777 * Get password
784 pstrcpy(cmdline_auth_info.password, pass);
798 cmdline_auth_info.password,
808 memset(cmdline_auth_info.password,'X',sizeof(cmdline_auth_info.password));
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/
H A Dconnect.c63 char *password; member in struct:smb_vol
871 vol->password = NULL;
875 since that would mean the password really
879 vol->password = NULL;
884 /* removed password length check, NTLM passwords
887 /* if comma in password, the string will be
888 prematurely null terminated. Commas in password are
894 /* NB: password legally can have multiple commas and
895 the only illegal character in a password is null */
926 vol->password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/
H A Dpdb_nds.c47 const char *password,
65 if (password != NULL)
67 utf8PwdSize = strlen(password)+1;
68 utf8PwdPtr = password;
84 if (password != NULL && password2 != NULL)
86 /* BER encode the NMAS Version, the objectDN, and the password */
89 else if (password != NULL)
91 /* BER encode the NMAS Version, the objectDN, and the password */
422 case 1: /* cleartext password */
660 Get the user's password fro
44 berEncodePasswordData( struct berval **requestBV, const char *objectDN, const char *password, const char *password2) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Dsmb_ldap.h80 const char *password; member in union:ldap_BindRequest::__anon5558
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/
H A Dads_struct.c154 SAFE_FREE((*ads)->auth.password);
H A Dkerberos_verify.c216 krb5_data password; local
237 DEBUG(1,("ads_secrets_verify_ticket: failed to fetch machine password\n"));
242 password.data = password_s;
243 password.length = strlen(password_s);
259 if (create_kerberos_key_from_string(context, host_princ, &password, key, enctypes[i])) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/librpc/gen_ndr/
H A Dsvcctl.h209 const char *password;/* [unique,charset(UTF16)] */ member in struct:svcctl_ChangeServiceConfigW::__anon5699
236 uint8_t *password;/* [unique,size_is(password_size)] */ member in struct:svcctl_CreateServiceW::__anon5701
417 const char *password;/* [unique,charset(UTF16)] */ member in struct:svcctl_ChangeServiceConfigA::__anon5723
442 const char *password;/* [unique,charset(UTF16)] */ member in struct:svcctl_CreateServiceA::__anon5725
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dsmbencrypt.c46 This implements the X/Open SMB password encryption
47 It takes a password ('unix' string), a 8 byte "crypt key"
48 and puts 24 bytes of encrypted password into p24
50 Returns False if password must have been truncated to create LM hash
64 * Creates the MD4 Hash of the users password in NT UNICODE.
65 * @param passwd password in 'unix' charset.
66 * @param p16 return password hashed with md4, caller allocated 16 byte buffer
104 * Creates the DES forward-only Hash of the users password in DOS ASCII charset
105 * @param passwd password in 'unix' charset.
106 * @param p16 return password hashe
474 SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, const DATA_BLOB *server_chal, const DATA_BLOB *names_blob, DATA_BLOB *lm_response, DATA_BLOB *nt_response, DATA_BLOB *user_session_key) argument
494 encode_pw_buffer(uint8 buffer[516], const char *password, int string_flags) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/
H A Dupap.c63 { "hide-password", o_bool, &hide_password,
65 { "show-password", o_bool, &hide_password,
66 "Show password string in debug log messages", OPT_PRIOSUB | 0 },
149 upap_authwithpeer(unit, user, password)
151 char *user, *password;
155 /* Save the username and password we're given */
158 u->us_passwd = password;
159 u->us_passwdlen = strlen(password);
423 * Check the username and password given.
654 printer(arg, " password
[all...]
H A Dsrp-entry.c186 (char *)pwval.pebuf.password.data, pwval.pebuf.password.len),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/windll/guisfx/
H A Dsfxwiz.c67 int WINAPI password(LPSTR p, int n, LPCSTR m, LPCSTR name);
367 //#define PK_MEM2 5 /* insufficient memory (password failure) */
379 //#define IZ_BADPWD 82 /* no files found: all had bad password */
381 /* return codes of password fetches (negative = user abort; positive = error) */
382 //#define IZ_PW_ENTERED 0 /* got some password string; use/try it */
383 //#define IZ_PW_CANCEL -1 /* no password available (for this entry) */
384 //#define IZ_PW_CANCELALL -2 /* no password, skip any further pwd. request */
419 wsprintf(szMessage, "%s", "No files found: Bad password");
453 int WINAPI password(LPSTR p, int n, LPCSTR m, LPCSTR name) function
549 lpUserFunctions->password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/windll/
H A Dstructs.h97 DLLPASSWORD *password; member in struct:__anon7528
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zip30/
H A Dapi.h154 DLLPASSWORD *password; member in struct:__anon7686
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/
H A Dupap.c40 { "hide-password", o_bool, &hide_password,
42 { "show-password", o_bool, &hide_password,
43 "Show password string in debug log messages", OPT_PRIOSUB | 0 },
126 upap_authwithpeer(unit, user, password)
128 char *user, *password;
132 /* Save the username and password we're given */
135 u->us_passwd = password;
136 u->us_passwdlen = strlen(password);
399 * Check the username and password given.
612 printer(arg, " password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dmisc.c1033 * Get and store a username/password
1054 * Get username/password from management interface?
1074 msg (M_FATAL, "ERROR: could not read %s username/password/ok/string from management interface", prefix);
1088 if (!get_console_input (BSTR (&user_prompt), true, up->password, USER_PASS_LEN))
1091 if (!strlen (up->password))
1092 strcpy (up->password, "ok");
1096 * Get username/password from standard input?
1109 buf_set_write (&packed_resp, (uint8_t*)up->password, USER_PASS_LEN);
1138 if (!get_console_input (BSTR (&pass_prompt), false, up->password, USER_PASS_LEN))
1139 msg (M_FATAL, "ERROR: could not not read %s password fro
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/tests/fate/
H A Dlossless-audio.mak20 fate-lossless-tta-encrypted: CMD = crc -password ffmpeg -i $(TARGET_SAMPLES)/lossless-audio/encrypted.tta
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/zlib-1.2.8/contrib/minizip/
H A Dunzip.h338 const char* password));
341 password is a crypting password
362 const char* password));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/
H A DLeafNets.h129 /// Element password of type xs:string.
130 char* password ; ///< Nullable pointer. member in struct:ns2__User
364 /// Element password of type xs:string.
365 char* password ; ///< Nullable pointer. member in struct:ns2__Usert
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/platforms/MacOSX/cocoa-mule/
H A DEC.h138 + (id)loginPacket:(NSString *) password withSalt:(uint64_t) salt;
210 - (void)sendLogin:(NSString *) password;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libsmbclient/
H A Dtestbrowse2.c15 char *password = ""; variable
88 strncpy(passwd, password, passwdlen - 1); passwd[passwdlen - 1] = 0;

Completed in 195 milliseconds

<<111213141516171819