/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | net_ads.c | 47 d_printf("password <username@realm> <password> -Uadmin_username@realm%%admin_pass\n"); 48 d_printf(" Change a user's password using an admin account\n"); 49 d_printf(" (note: use realm in UPPERCASE, prompts if password is obmitted)\n"); 51 d_printf(" Change the trust account password of this machine in the AD tree\n"); 249 asprintf(&prompt,"%s's password: ", opt_user_name); 260 SAFE_FREE(ads->auth.password); 261 ads->auth.password = smb_xstrdup(opt_password); 337 ads_startup() stores the password in opt_password if it needs to so 475 /* if no password i 957 net_join_domain(TALLOC_CTX *ctx, const char *servername, struct in_addr *ip, char **domain, DOM_SID **dom_sid, const char *password) argument 1446 char *tmp_password, *password; local [all...] |
H A D | smbcquotas.c | 369 pstrcpy(cmdline_auth_info.password, pass); 378 cmdline_auth_info.password, 0,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/docs/latex/wx/ |
H A D | ftp.tex | 31 ftp.SetPassword("password"); 260 to specify a user and a password. 267 Sets the password to be sent to the FTP server to be allowed to log in. 272 be "username@userhost.domain". This password is built by getting the current 279 to specify a user and a password.
|
H A D | dialup.tex | 92 \func{bool}{Dial}{\param{const wxString\& }{nameOfISP = wxEmptyString}, \param{const wxString\& }{username = wxEmptyString}, \param{const wxString\& }{password = wxEmptyString}, \param{bool }{async = true}} 94 Dial the given ISP, use {\it username} and {\it password} to authenticate. 102 and if no username and/or password are given, the function will try to do
|
H A D | protocol.tex | 107 Sets the authentication password. It is mainly useful when FTP is used.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/lib/ |
H A D | command.c | 436 /* Do not support password encryption */ 467 vty_out (vty, "password 8 %s%s", host.password_encrypt, VTY_NEWLINE); 469 vty_out (vty, "enable password 8 %s%s", host.enable_encrypt, VTY_NEWLINE); 473 if (host.password) 474 vty_out (vty, "password %s%s", host.password, VTY_NEWLINE); 476 vty_out (vty, "enable password %s%s", host.enable, VTY_NEWLINE); 498 vty_out (vty, "service password-encryption%s", VTY_NEWLINE); 2058 /* If enable password is NULL, change to ENABLE_NODE */ 2465 /* VTY interface password se [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/sound/isa/opti9xx/ |
H A D | miro.c | 108 unsigned char password; member in struct:snd_miro 818 chip->password = 0xe3; 822 chip->password = 0xe5; 840 outb(chip->password, chip->mc_base + chip->pwd_reg); 846 outb(chip->password, chip->mc_base + chip->pwd_reg); 869 outb(chip->password, chip->mc_base + chip->pwd_reg); 875 outb(chip->password, chip->mc_base + chip->pwd_reg);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/ |
H A D | torture.c | 26 static fstring host, workgroup, share, password, username, myname; variable 225 password, flags, Undefined, &retry); 284 size_t passlen = strlen(password); 290 password, passlen, 291 password, passlen, 1080 password, strlen(password)+1)) { 1167 status = cli_raw_tcon(cli, service, password, "?????", &max_xmit, &cnum); 1193 password, strlen(password) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/ |
H A D | sess.c | 479 SMBNTencrypt(ses->password, ses->server->cryptKey, ntlm_session_key); 482 ntlm_session_key, ses->password); 656 /* BB calculate hash with password */ 659 calc_lanman_hash(ses->password, ses->server->cryptKey, 686 SMBNTencrypt(ses->password, ses->server->cryptKey, 692 ntlm_session_key, ses->password); 720 /* LM2 password would be here if we supported it */
|
H A D | cifsglob.h | 224 char *password; member in struct:cifsSesInfo 246 char *password; /* for share-level security */ member in struct:cifsTconInfo 717 have the uid/password or Kerberos credential
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | ssl_verify.c | 717 * user/password authentication. 941 * Functions to verify username and password 943 * Authenticate a client using username/password. 951 * Verify the user name and password using a script 975 status_printf (so, "%s", up->password); 978 msg (D_TLS_ERRORS, "TLS Auth Error: could not write username/password to file: %s", 984 "username/password to temp file"); 990 setenv_str (session->opt->es, "password", up->password); 1007 setenv_del (session->opt->es, "password"); [all...] |
H A D | pkcs11.c | 206 return strcmp (token_resp.password, "ok") == 0; 245 strncpynt (pin, token_pass.password, pin_max); 664 id_resp.password 754 msg (M_FATAL, "Cannot read password from stdin");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/samples/widgets/ |
H A D | textctrl.cpp | 107 bool password; member in struct:ControlValues 119 false, // not password 611 m_chkPassword->SetValue(DEFAULTS.password); 875 // can't put multiline control in password mode 885 (m_chkPassword->GetValue() != DEFAULTS.password) ||
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/LDAP/smbldap-tools-0.9.2/ |
H A D | smbldap_tools.pm | 281 # bind to a directory with dn and password 299 password => "$config{masterPw}" 307 # bind to a directory with dn and password 338 password => "$config{masterPw}" 477 # try to bind with user dn and password to validate current password 507 my $mesg= $userLdap->bind (dn => $dn, password => $pass ); 543 # bind to a directory with dn and password 621 # bind to a directory with dn and password 636 # bind to a directory with dn and password [all...] |
H A D | smbldap-usermod | 60 print " -A can change password ? 0 if no, 1 if yes\n"; 61 print " -B must change password ? 0 if no, 1 if yes\n"; 350 # To force a user to change his password: 592 can change password ? 0 if no, 1 if yes 595 must change password ? 0 if no, 1 if yes 625 End by invoking smbldap-passwd to change the user password (both unix and samba passwords)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/forked-daapd-0.19/src/ |
H A D | main.c | 221 char *password; local 252 password = cfg_getstr(lib, "password"); 253 snprintf(txtrecord[7], 128, "Password=%s", (password) ? "true" : "false");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | clikrb5.c | 187 krb5_data *password, 201 ret = krb5_string_to_key(context, &eblock, key, password, &salt); 208 krb5_data *password, 221 ret = krb5_string_to_key_salt(context, enctype, (const char *)password->data, salt, key); 231 krb5_data *password, 243 ret = create_kerberos_key_from_string_direct(context, salt_princ ? salt_princ : host_princ, password, key, enctype); 185 create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument 206 create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument 229 create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype) argument
|
H A D | clientgen.c | 245 void cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password) argument 249 pwd_set_cleartext(&cli->pwd, password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | winbindd_cm.c | 486 Caller to free() result in domain, username, password 489 static void cm_get_ipc_userpass(char **username, char **domain, char **password) argument 493 *password = (char *)secrets_fetch(SECRETS_AUTH_PASSWORD, NULL); 500 if (!*password || !**password) 501 *password = smb_xstrdup(""); 510 *password = smb_xstrdup(""); 1688 * sign and sealed pipe using the machine account password by 1996 mach_pwd, /* machine password */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/zlib-1.2.3/contrib/minizip/ |
H A D | zip.c | 695 password, crcForCrypting) 710 const char* password; 720 if (password != NULL) 765 if (password != NULL) 878 if ((err==Z_OK) && (password != NULL)) 884 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/ 886 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/zlib-1.2.3/contrib/minizip/ |
H A D | zip.c | 695 password, crcForCrypting) 710 const char* password; 720 if (password != NULL) 765 if (password != NULL) 878 if ((err==Z_OK) && (password != NULL)) 884 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/ 886 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/distro/rpm/ |
H A D | openvpn.spec | 102 %{?with_password_save:--enable-password-save} \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/unix/ |
H A D | dialup.cpp | 92 @param password unused 96 const wxString& WXUNUSED(password), 321 const wxString & WXUNUSED(password),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/config/ |
H A D | Makefile.am | 138 password="$(webminpass)" \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/ |
H A D | winbind.c | 475 * passwd -- password supplied by peer 486 char *password, 491 if (run_ntlm_auth(NULL, NULL, user, password, NULL, 0, NULL, 0, NULL, 0, NULL, msgp) == AUTHENTICATED) { 485 winbind_pap_auth(char *user, char *password, char **msgp, struct wordlist **paddrs, struct wordlist **popts) argument
|