/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | wsseapi.h | 135 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password); 136 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password); 139 int soap_wsse_verify_Password(struct soap *soap, const char *password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth_diagnostics.c | 447 char *password; local 469 if ((password = strdup_upper(opt_password)) == NULL) { 475 CH_DOS, password, 476 strlen(password)+1, 482 SAFE_FREE(password);
|
H A D | smbget.c | 49 const char *username = NULL, *password = NULL, *workgroup = NULL; variable 100 if(!nonprompt && !password) { 106 } else if(password) strncpy(pw, password, pwlen-1); 530 {"password", 'p', POPT_ARG_STRING, &password, 'p', "Password to use" }, 569 username = ""; password = "";
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/sound/isa/opti9xx/ |
H A D | opti92x-ad1848.c | 130 unsigned char password; member in struct:snd_opti9xx 233 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; 239 chip->password = 0xe5; 252 chip->password = 0xe4; 271 outb(chip->password, chip->mc_base + chip->pwd_reg); 279 outb(chip->password, chip->mc_base + chip->pwd_reg); 294 outb(chip->password, chip->mc_base + chip->pwd_reg); 313 outb(chip->password, chip->mc_base + chip->pwd_reg); 321 outb(chip->password, chip->mc_base + chip->pwd_reg); 336 outb(chip->password, chi [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpcclient/ |
H A D | cmd_lsarpc.c | 854 static void display_trust_dom_info_4(TRUSTED_DOMAIN_INFO_PASSWORD *p, const char *password) argument 858 DATA_BLOB data = data_blob(NULL, p->password.length); 861 memcpy(data.data, p->password.data, p->password.length); 864 pwd = decrypt_trustdom_secret(password, &data); 865 pwd_old = decrypt_trustdom_secret(password, &data_old); 898 display_trust_dom_info_4(&info->password, pass); 943 display_trust_dom_info(info, info_class, cli->pwd.password); 981 display_trust_dom_info(info, info_class, cli->pwd.password); 1030 display_trust_dom_info(info, info_class, cli->pwd.password); [all...] |
H A D | rpcclient.c | 538 cmdline_auth_info.password, 547 cmdline_auth_info.password, 777 * Get password 784 pstrcpy(cmdline_auth_info.password, pass); 798 cmdline_auth_info.password, 808 memset(cmdline_auth_info.password,'X',sizeof(cmdline_auth_info.password));
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/ |
H A D | connect.c | 63 char *password; member in struct:smb_vol 871 vol->password = NULL; 875 since that would mean the password really 879 vol->password = NULL; 884 /* removed password length check, NTLM passwords 887 /* if comma in password, the string will be 888 prematurely null terminated. Commas in password are 894 /* NB: password legally can have multiple commas and 895 the only illegal character in a password is null */ 926 vol->password [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/ |
H A D | pdb_nds.c | 47 const char *password, 65 if (password != NULL) 67 utf8PwdSize = strlen(password)+1; 68 utf8PwdPtr = password; 84 if (password != NULL && password2 != NULL) 86 /* BER encode the NMAS Version, the objectDN, and the password */ 89 else if (password != NULL) 91 /* BER encode the NMAS Version, the objectDN, and the password */ 422 case 1: /* cleartext password */ 660 Get the user's password fro 44 berEncodePasswordData( struct berval **requestBV, const char *objectDN, const char *password, const char *password2) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | smb_ldap.h | 80 const char *password; member in union:ldap_BindRequest::__anon5558
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | ads_struct.c | 154 SAFE_FREE((*ads)->auth.password);
|
H A D | kerberos_verify.c | 216 krb5_data password; local 237 DEBUG(1,("ads_secrets_verify_ticket: failed to fetch machine password\n")); 242 password.data = password_s; 243 password.length = strlen(password_s); 259 if (create_kerberos_key_from_string(context, host_princ, &password, key, enctypes[i])) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/librpc/gen_ndr/ |
H A D | svcctl.h | 209 const char *password;/* [unique,charset(UTF16)] */ member in struct:svcctl_ChangeServiceConfigW::__anon5699 236 uint8_t *password;/* [unique,size_is(password_size)] */ member in struct:svcctl_CreateServiceW::__anon5701 417 const char *password;/* [unique,charset(UTF16)] */ member in struct:svcctl_ChangeServiceConfigA::__anon5723 442 const char *password;/* [unique,charset(UTF16)] */ member in struct:svcctl_CreateServiceA::__anon5725
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | smbencrypt.c | 46 This implements the X/Open SMB password encryption 47 It takes a password ('unix' string), a 8 byte "crypt key" 48 and puts 24 bytes of encrypted password into p24 50 Returns False if password must have been truncated to create LM hash 64 * Creates the MD4 Hash of the users password in NT UNICODE. 65 * @param passwd password in 'unix' charset. 66 * @param p16 return password hashed with md4, caller allocated 16 byte buffer 104 * Creates the DES forward-only Hash of the users password in DOS ASCII charset 105 * @param passwd password in 'unix' charset. 106 * @param p16 return password hashe 474 SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, const DATA_BLOB *server_chal, const DATA_BLOB *names_blob, DATA_BLOB *lm_response, DATA_BLOB *nt_response, DATA_BLOB *user_session_key) argument 494 encode_pw_buffer(uint8 buffer[516], const char *password, int string_flags) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/ |
H A D | upap.c | 63 { "hide-password", o_bool, &hide_password, 65 { "show-password", o_bool, &hide_password, 66 "Show password string in debug log messages", OPT_PRIOSUB | 0 }, 149 upap_authwithpeer(unit, user, password) 151 char *user, *password; 155 /* Save the username and password we're given */ 158 u->us_passwd = password; 159 u->us_passwdlen = strlen(password); 423 * Check the username and password given. 654 printer(arg, " password [all...] |
H A D | srp-entry.c | 186 (char *)pwval.pebuf.password.data, pwval.pebuf.password.len),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/windll/guisfx/ |
H A D | sfxwiz.c | 67 int WINAPI password(LPSTR p, int n, LPCSTR m, LPCSTR name); 367 //#define PK_MEM2 5 /* insufficient memory (password failure) */ 379 //#define IZ_BADPWD 82 /* no files found: all had bad password */ 381 /* return codes of password fetches (negative = user abort; positive = error) */ 382 //#define IZ_PW_ENTERED 0 /* got some password string; use/try it */ 383 //#define IZ_PW_CANCEL -1 /* no password available (for this entry) */ 384 //#define IZ_PW_CANCELALL -2 /* no password, skip any further pwd. request */ 419 wsprintf(szMessage, "%s", "No files found: Bad password"); 453 int WINAPI password(LPSTR p, int n, LPCSTR m, LPCSTR name) function 549 lpUserFunctions->password [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/windll/ |
H A D | structs.h | 97 DLLPASSWORD *password; member in struct:__anon7528
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zip30/ |
H A D | api.h | 154 DLLPASSWORD *password; member in struct:__anon7686
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/ |
H A D | upap.c | 40 { "hide-password", o_bool, &hide_password, 42 { "show-password", o_bool, &hide_password, 43 "Show password string in debug log messages", OPT_PRIOSUB | 0 }, 126 upap_authwithpeer(unit, user, password) 128 char *user, *password; 132 /* Save the username and password we're given */ 135 u->us_passwd = password; 136 u->us_passwdlen = strlen(password); 399 * Check the username and password given. 612 printer(arg, " password [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | misc.c | 1033 * Get and store a username/password 1054 * Get username/password from management interface? 1074 msg (M_FATAL, "ERROR: could not read %s username/password/ok/string from management interface", prefix); 1088 if (!get_console_input (BSTR (&user_prompt), true, up->password, USER_PASS_LEN)) 1091 if (!strlen (up->password)) 1092 strcpy (up->password, "ok"); 1096 * Get username/password from standard input? 1109 buf_set_write (&packed_resp, (uint8_t*)up->password, USER_PASS_LEN); 1138 if (!get_console_input (BSTR (&pass_prompt), false, up->password, USER_PASS_LEN)) 1139 msg (M_FATAL, "ERROR: could not not read %s password fro [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/tests/fate/ |
H A D | lossless-audio.mak | 20 fate-lossless-tta-encrypted: CMD = crc -password ffmpeg -i $(TARGET_SAMPLES)/lossless-audio/encrypted.tta
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/zlib-1.2.8/contrib/minizip/ |
H A D | unzip.h | 338 const char* password)); 341 password is a crypting password 362 const char* password));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/ |
H A D | LeafNets.h | 129 /// Element password of type xs:string. 130 char* password ; ///< Nullable pointer. member in struct:ns2__User 364 /// Element password of type xs:string. 365 char* password ; ///< Nullable pointer. member in struct:ns2__Usert
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/platforms/MacOSX/cocoa-mule/ |
H A D | EC.h | 138 + (id)loginPacket:(NSString *) password withSalt:(uint64_t) salt; 210 - (void)sendLogin:(NSString *) password;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libsmbclient/ |
H A D | testbrowse2.c | 15 char *password = ""; variable 88 strncpy(passwd, password, passwdlen - 1); passwd[passwdlen - 1] = 0;
|