/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/LDAP/smbldap-tools-0.9.2/ |
H A D | smbldap-tools.spec | 31 . users can change their LDAP password from the command line
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/cacusermgr/ |
H A D | mgr_user.c | 305 case 's': /*reset password*/ 309 setpass.in.password = get_new_password(mem_ctx); 311 if(!setpass.in.password) { 317 printerr("Could not set password.", hnd->status); 320 printf("Reset password.\n");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/ |
H A D | test_util.c | 19 ZERO_STRUCTP(hnd->password); 34 strncpy(hnd->password, argv[i+1], sizeof(fstring));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/ |
H A D | soapStub.h | 86 char *password; /* optional element of type xsd:string */ member in struct:ns2__User 342 char *password; /* optional element of type xsd:string */ member in struct:ns2__Usert
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/ |
H A D | soapStub.h | 86 char *password; /* optional element of type xsd:string */ member in struct:ns2__User 342 char *password; /* optional element of type xsd:string */ member in struct:ns2__Usert
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/zlib-1.2.8/contrib/minizip/ |
H A D | zip.c | 1060 const char* password, uLong crcForCrypting, 1071 if (password != NULL) 1122 if (password != NULL) 1244 if ((err==Z_OK) && (password != NULL)) 1250 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/ 1252 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting); 1270 const char* password, uLong crcForCrypting, 1278 password, crcForCrypting, versionMadeBy, flagBase, 0); 1286 const char* password, uLong crcForCrypting) 1293 password, crcForCryptin 1055 zipOpenNewFileInZip4_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase, int zip64) argument 1265 zipOpenNewFileInZip4(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase) argument 1281 zipOpenNewFileInZip3(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting) argument 1296 zipOpenNewFileInZip3_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, int zip64) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/zlib-1.2.7/contrib/minizip/ |
H A D | zip.c | 1060 const char* password, uLong crcForCrypting, 1071 if (password != NULL) 1122 if (password != NULL) 1244 if ((err==Z_OK) && (password != NULL)) 1250 /*init_keys(password,zi->ci.keys,zi->ci.pcrc_32_tab);*/ 1252 sizeHead=crypthead(password,bufHead,RAND_HEAD_LEN,zi->ci.keys,zi->ci.pcrc_32_tab,crcForCrypting); 1270 const char* password, uLong crcForCrypting, 1278 password, crcForCrypting, versionMadeBy, flagBase, 0); 1286 const char* password, uLong crcForCrypting) 1293 password, crcForCryptin 1055 zipOpenNewFileInZip4_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase, int zip64) argument 1265 zipOpenNewFileInZip4(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, uLong versionMadeBy, uLong flagBase) argument 1281 zipOpenNewFileInZip3(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting) argument 1296 zipOpenNewFileInZip3_64(zipFile file, const char* filename, const zip_fileinfo* zipfi, const void* extrafield_local, uInt size_extrafield_local, const void* extrafield_global, uInt size_extrafield_global, const char* comment, int method, int level, int raw, int windowBits,int memLevel, int strategy, const char* password, uLong crcForCrypting, int zip64) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | ads.h | 40 char *password; member in struct:__anon5115::__anon5117
|
H A D | rap.h | 43 /* tasks and user tasks (e.g. password change) */ 442 #define RAP_UPASSWD_LEN 16 /* user password */ 443 #define RAP_SPASSWD_LEN 9 /* share password */ 503 char password[RAP_SPASSWD_LEN]; member in struct:rap_share_info_2
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | ntlmssp.c | 178 * Converts a password to the hashes on an NTLMSSP context. 181 NTSTATUS ntlmssp_set_password(NTLMSSP_STATE *ntlmssp_state, const char *password) argument 183 if (!password) { 190 E_deshash(password, lm_hash); 191 E_md4hash(password, nt_hash); 645 now set security=user, but does not check username & password*/ 647 char TmpUsr[6] = "guest";/*If all shared folders are 'All - no password', 715 now set security=user, but does not check username & password*/ 723 /*If all shared folders are 'All - no password', 813 * smb.conf file) and no NTLMv2 response was sent then the password chec [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/ |
H A D | cli_netlogon.c | 133 password ?).\n", cli->cli->desthost )); 278 /* Store the machine account password we're going to use. */ 813 const char *password, 850 nt_lm_owf_gen(password, nt_owf_user_pwd, lm_owf_user_pwd); 868 SMBencrypt(password, chal, local_lm_response); 869 SMBNTencrypt(password, chal, local_nt_response); 808 rpccli_netlogon_sam_logon(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 logon_parameters, const char *domain, const char *username, const char *password, const char *workstation, int logon_type) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | smbtree.c | 284 pstrcpy(cmdline_auth_info.password, pass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavformat/ |
H A D | libsmbclient.c | 41 char *password, int password_len) 38 libsmbc_get_auth_data(SMBCCTX *c, const char *server, const char *share, char *workgroup, int workgroup_len, char *username, int username_len, char *password, int password_len) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | genrsa.c | 240 BIO_printf(bio_err, "Error getting password\n"); 301 cb_data.password = passout;
|
H A D | ts.c | 147 char *password = NULL; /* Password itself. */ local 279 /* Get the password if required. */ 281 !app_passwd(bio_err, passin, NULL, &password, NULL)) { 282 BIO_printf(bio_err, "Error getting password.\n"); 319 password, inkey, signer, chain, policy, 346 "[-queryfile request.tsq] [-passin password] " 361 OPENSSL_free(password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | misc.h | 196 * Get and store a username/password 204 /* max length of username/password */ 211 char password[USER_PASS_LEN]; member in struct:user_pass 321 #define SSEC_PW_ENV 3 /* allow calling of built-in programs and user-defined scripts that may receive a password as an environmental variable */
|
H A D | ssl_openssl.c | 318 char password[256]; local 349 pem_password_callback (password, sizeof(password) - 1, 0, NULL); 350 /* Reparse the PKCS #12 file with password */ 352 if (!PKCS12_parse(p12, password, &pkey, &cert, &ca))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/msw/ |
H A D | dialup.cpp | 185 const wxString& password, 750 const wxString& password, 814 // do we have the username and password? 815 if ( !username || !password ) 822 &gotPassword // [out] did we get password? 827 wxLogError(_("Failed to connect: missing username/password.")); 835 wxStrncpy(rasDialParams.szPassword, password, PWLEN); 748 Dial(const wxString& nameOfISP, const wxString& username, const wxString& password, bool async) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bpalogin/ |
H A D | bpalogin.h | 278 char password[MAXPASSWORD]; member in struct:session
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | validat3.cpp | 612 string password, salt, derivedKey; local 613 StringSource(tuple.hexPassword, true, new HexDecoder(new StringSink(password))); 618 pbkdf.DeriveKey(derived, derived.size(), tuple.purpose, (byte *)password.data(), password.size(), (byte *)salt.data(), salt.size(), tuple.iterations); 661 // from draft-ietf-smime-password-03.txt, at http://www.imc.org/draft-ietf-smime-password
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/ |
H A D | wpa.h | 379 int PasswordHash(char *password,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/sam/ |
H A D | samuser.c | 245 case 'p': /*reset password*/ 257 pass1 = getpass("Enter new password: "); 258 pass2 = getpass("Re-enter new password: "); 263 sp.in.password = talloc_strdup(mem_ctx, pass1); 266 printf("Could not set password. Error: %s\n", nt_errstr(hnd->status));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | genrsa.c | 240 BIO_printf(bio_err, "Error getting password\n"); 301 cb_data.password = passout;
|
H A D | ts.c | 147 char *password = NULL; /* Password itself. */ local 279 /* Get the password if required. */ 281 !app_passwd(bio_err, passin, NULL, &password, NULL)) { 282 BIO_printf(bio_err, "Error getting password.\n"); 319 password, inkey, signer, chain, policy, 346 "[-queryfile request.tsq] [-passin password] " 361 OPENSSL_free(password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | apps.h | 240 const void *password; member in struct:pw_cb_data
|