Searched refs:password (Results 301 - 325 of 458) sorted by relevance

<<111213141516171819

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dnet_ads.c47 d_printf("password <username@realm> <password> -Uadmin_username@realm%%admin_pass\n");
48 d_printf(" Change a user's password using an admin account\n");
49 d_printf(" (note: use realm in UPPERCASE, prompts if password is obmitted)\n");
51 d_printf(" Change the trust account password of this machine in the AD tree\n");
249 asprintf(&prompt,"%s's password: ", opt_user_name);
260 SAFE_FREE(ads->auth.password);
261 ads->auth.password = smb_xstrdup(opt_password);
337 ads_startup() stores the password in opt_password if it needs to so
475 /* if no password i
957 net_join_domain(TALLOC_CTX *ctx, const char *servername, struct in_addr *ip, char **domain, DOM_SID **dom_sid, const char *password) argument
1446 char *tmp_password, *password; local
[all...]
H A Dsmbcquotas.c369 pstrcpy(cmdline_auth_info.password, pass);
378 cmdline_auth_info.password, 0,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/docs/latex/wx/
H A Dftp.tex31 ftp.SetPassword("password");
260 to specify a user and a password.
267 Sets the password to be sent to the FTP server to be allowed to log in.
272 be "username@userhost.domain". This password is built by getting the current
279 to specify a user and a password.
H A Ddialup.tex92 \func{bool}{Dial}{\param{const wxString\& }{nameOfISP = wxEmptyString}, \param{const wxString\& }{username = wxEmptyString}, \param{const wxString\& }{password = wxEmptyString}, \param{bool }{async = true}}
94 Dial the given ISP, use {\it username} and {\it password} to authenticate.
102 and if no username and/or password are given, the function will try to do
H A Dprotocol.tex107 Sets the authentication password. It is mainly useful when FTP is used.
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/lib/
H A Dcommand.c436 /* Do not support password encryption */
467 vty_out (vty, "password 8 %s%s", host.password_encrypt, VTY_NEWLINE);
469 vty_out (vty, "enable password 8 %s%s", host.enable_encrypt, VTY_NEWLINE);
473 if (host.password)
474 vty_out (vty, "password %s%s", host.password, VTY_NEWLINE);
476 vty_out (vty, "enable password %s%s", host.enable, VTY_NEWLINE);
498 vty_out (vty, "service password-encryption%s", VTY_NEWLINE);
2058 /* If enable password is NULL, change to ENABLE_NODE */
2465 /* VTY interface password se
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/sound/isa/opti9xx/
H A Dmiro.c108 unsigned char password; member in struct:snd_miro
818 chip->password = 0xe3;
822 chip->password = 0xe5;
840 outb(chip->password, chip->mc_base + chip->pwd_reg);
846 outb(chip->password, chip->mc_base + chip->pwd_reg);
869 outb(chip->password, chip->mc_base + chip->pwd_reg);
875 outb(chip->password, chip->mc_base + chip->pwd_reg);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/
H A Dtorture.c26 static fstring host, workgroup, share, password, username, myname; variable
225 password, flags, Undefined, &retry);
284 size_t passlen = strlen(password);
290 password, passlen,
291 password, passlen,
1080 password, strlen(password)+1)) {
1167 status = cli_raw_tcon(cli, service, password, "?????", &max_xmit, &cnum);
1193 password, strlen(password)
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/
H A Dsess.c479 SMBNTencrypt(ses->password, ses->server->cryptKey, ntlm_session_key);
482 ntlm_session_key, ses->password);
656 /* BB calculate hash with password */
659 calc_lanman_hash(ses->password, ses->server->cryptKey,
686 SMBNTencrypt(ses->password, ses->server->cryptKey,
692 ntlm_session_key, ses->password);
720 /* LM2 password would be here if we supported it */
H A Dcifsglob.h224 char *password; member in struct:cifsSesInfo
246 char *password; /* for share-level security */ member in struct:cifsTconInfo
717 have the uid/password or Kerberos credential
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dssl_verify.c717 * user/password authentication.
941 * Functions to verify username and password
943 * Authenticate a client using username/password.
951 * Verify the user name and password using a script
975 status_printf (so, "%s", up->password);
978 msg (D_TLS_ERRORS, "TLS Auth Error: could not write username/password to file: %s",
984 "username/password to temp file");
990 setenv_str (session->opt->es, "password", up->password);
1007 setenv_del (session->opt->es, "password");
[all...]
H A Dpkcs11.c206 return strcmp (token_resp.password, "ok") == 0;
245 strncpynt (pin, token_pass.password, pin_max);
664 id_resp.password
754 msg (M_FATAL, "Cannot read password from stdin");
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/samples/widgets/
H A Dtextctrl.cpp107 bool password; member in struct:ControlValues
119 false, // not password
611 m_chkPassword->SetValue(DEFAULTS.password);
875 // can't put multiline control in password mode
885 (m_chkPassword->GetValue() != DEFAULTS.password) ||
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/LDAP/smbldap-tools-0.9.2/
H A Dsmbldap_tools.pm281 # bind to a directory with dn and password
299 password => "$config{masterPw}"
307 # bind to a directory with dn and password
338 password => "$config{masterPw}"
477 # try to bind with user dn and password to validate current password
507 my $mesg= $userLdap->bind (dn => $dn, password => $pass );
543 # bind to a directory with dn and password
621 # bind to a directory with dn and password
636 # bind to a directory with dn and password
[all...]
H A Dsmbldap-usermod60 print " -A can change password ? 0 if no, 1 if yes\n";
61 print " -B must change password ? 0 if no, 1 if yes\n";
350 # To force a user to change his password:
592 can change password ? 0 if no, 1 if yes
595 must change password ? 0 if no, 1 if yes
625 End by invoking smbldap-passwd to change the user password (both unix and samba passwords)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/forked-daapd-0.19/src/
H A Dmain.c221 char *password; local
252 password = cfg_getstr(lib, "password");
253 snprintf(txtrecord[7], 128, "Password=%s", (password) ? "true" : "false");
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dclikrb5.c187 krb5_data *password,
201 ret = krb5_string_to_key(context, &eblock, key, password, &salt);
208 krb5_data *password,
221 ret = krb5_string_to_key_salt(context, enctype, (const char *)password->data, salt, key);
231 krb5_data *password,
243 ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype);
185 create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument
206 create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument
229 create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument
H A Dclientgen.c245 void cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password) argument
249 pwd_set_cleartext(&cli->pwd, password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dwinbindd_cm.c486 Caller to free() result in domain, username, password
489 static void cm_get_ipc_userpass(char **username, char **domain, char **password) argument
493 *password = (char *)secrets_fetch(SECRETS_AUTH_PASSWORD, NULL);
500 if (!*password || !**password)
501 *password = smb_xstrdup("");
510 *password = smb_xstrdup("");
1688 * sign and sealed pipe using the machine account password by
1996 mach_pwd, /* machine password */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/zlib-1.2.3/contrib/minizip/
H A Dzip.c695 password, crcForCrypting)
710 const char* password;
720 if (password != NULL)
765 if (password != NULL)
878 if ((err==Z_OK) && (password != NULL))
884 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/
886 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/zlib-1.2.3/contrib/minizip/
H A Dzip.c695 password, crcForCrypting)
710 const char* password;
720 if (password != NULL)
765 if (password != NULL)
878 if ((err==Z_OK) && (password != NULL))
884 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/
886 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/distro/rpm/
H A Dopenvpn.spec102 %{?with_password_save:--enable-password-save} \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/unix/
H A Ddialup.cpp92 @param password unused
96 const wxString& WXUNUSED(password),
321 const wxString & WXUNUSED(password),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/config/
H A DMakefile.am138 password="$(webminpass)" \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/
H A Dwinbind.c475 * passwd -- password supplied by peer
486 char *password,
491 if (run_ntlm_auth(NULL, NULL, user, password, NULL, 0, NULL, 0, NULL, 0, NULL, msgp) == AUTHENTICATED) {
485 winbind_pap_auth(char *user, char *password, char **msgp, struct wordlist **paddrs, struct wordlist **popts) argument

Completed in 289 milliseconds

<<111213141516171819