/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/ |
H A D | Proxy.h | 55 * - RFC-1929: username/password Authentication for SOCKS V5 132 * @param password The password to authenticate to the server. 141 const wxString &password 161 //! The password to authenticate to the server.
|
H A D | Proxy.cpp | 52 const wxString &password) 61 * is username/password. If there is no username/password in 62 * CProxyData, a NULL username/password is sent. That will probably 68 m_password(password) 650 // Prepare username/password buffer 659 // Send the username/password packet 45 CProxyData( bool proxyEnable, CProxyType proxyType, const wxString &proxyHostName, unsigned short proxyPort, bool enablePassword, const wxString &userName, const wxString &password) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | apps.h | 221 const void *password; member in struct:pw_cb_data
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | libmsrpc.h | 201 /**Last password set time*/ 204 /**Time password can change*/ 207 /**Time password must change*/ 210 /**LM user password*/ 213 /**NT user password*/ 225 /**Bad password count*/ 231 /**Change password at next logon?*/ 320 /**Minimum password length*/ 323 /**How many previous passwords to remember - ie, password cannot be the same as N previous passwords*/ 332 /**How long users are locked out for too many bad password attempt 430 char *password; member in struct:_CACSERVERHANDLE 2292 char *password; member in struct:SamUserChangePasswd::__anon5218 2327 char *password; member in struct:SamSetPassword::__anon5219 [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | winbindd_ads.c | 82 /* the machine acct password might have change - fetch it every time */ 84 SAFE_FREE(ads->auth.password); 91 if ( !secrets_fetch_trusted_domain_password( domain->name, &ads->auth.password, &sid, &last_set_time ) ) { 101 ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
|
H A D | pam_winbind.c | 331 {"NT_STATUS_PWD_TOO_RECENT", "The password of this user is too recent to change"}, 332 {"NT_STATUS_PWD_HISTORY_CONFLICT", "Password is already in password history"}, 333 {"NT_STATUS_PASSWORD_EXPIRED", "Your password has expired"}, 334 {"NT_STATUS_PASSWORD_MUST_CHANGE", "You need to change your password now"}, 503 /* incorrect password */ 504 _pam_log(pamh, ctrl, LOG_WARNING, "user '%s' denied access (incorrect password or invalid membership)", user); 511 /* password expired */ 512 _pam_log(pamh, ctrl, LOG_WARNING, "user '%s' password expired", user); 515 /* new password required */ 516 _pam_log(pamh, ctrl, LOG_WARNING, "user '%s' new password require 1513 const char *password; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/ |
H A D | pdb_get_set.c | 78 change their password, and this time must be zero. jmcd 85 to indicate that the user cannot change their password. jmcd 167 /* Return the plaintext password if known. Most of the time 866 /* on keep the password if we are allowing LANMAN authentication */ 878 Set the user's password history hash. historyLen is the number of 901 Set the user's plaintext password only (base procedure, see helper 905 BOOL pdb_set_plaintext_pw_only(struct samu *sampass, const char *password, enum pdb_value_state flag) argument 907 if (password) { 911 sampass->plaintext_pw = talloc_strdup(sampass, password); 983 Set the user's PLAINTEXT password [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/ |
H A D | gskit.c | 442 const char *password) 468 if(c == CURLE_OK && password) 469 c = set_buffer(data, h, GSK_KEYRING_PW, password, FALSE); 578 * level) or by keyring file, password and certificate label. 581 * Key password (CURLOPT_KEYPASSWD) holds the keyring password. 585 * If no key password is given and the keyring is the system keyring, 439 init_environment(struct SessionHandle *data, gsk_handle *envir, const char *appid, const char *file, const char *label, const char *password) argument
|
H A D | openssl.c | 299 * Supply default password to the engine user interface conversation. 300 * The password is passed by OpenSSL engine from ENGINE_load_private_key() 305 const char *password; local 309 password = (const char*)UI_get0_user_data(ui); 310 if(NULL != password && 312 UI_set_result(ui, uis, password); 322 * Suppress interactive request for a default password if available. 360 * If password has been given, we store that in the global 370 * We set the password in the callback userdata 484 "could not parse PKCS12 file, check password, OpenSS [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/ |
H A D | mount.cifs.c | 128 struct passwd *password = getpwuid(getuid()); local 130 if (password) { 131 username = password->pw_name; 190 } else if (strncasecmp("password",line_buf+i,8) == 0) { 200 printf("mount.cifs failed: password in credentials file too long\n"); 275 printf("mount.cifs failed. %s attempting to open password file %s\n", 285 printf("mount.cifs failed. Error %s reading password file\n",strerror(errno)); 293 printf("\nWarning: null password used since cifs password file empty"); 304 printf("\nWarning: password longe [all...] |
H A D | smbctool.c | 139 strncpy(pPassword, cmdline_auth_info.password, maxLenPassword - 1); 140 strncpy(authPassword, cmdline_auth_info.password, maxLenPassword - 1); 158 pstrcpy(cmdline_auth_info.password, authPassword); 2847 d_printf("logon <username> [<password>]\n"); 3579 poptSetOtherOptionHelp(pc, "service <password>"); 3712 pstrcpy(cmdline_auth_info.password,poptGetArg(pc)); 3727 /* store the username an password for dfs support */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | manage.c | 61 /* tag for blank username/password */ 94 msg (M_CLIENT, "password type p : Enter password p for a queried OpenVPN password."); 182 if (streq (line, man->settings.up.password)) 185 msg (M_CLIENT, "SUCCESS: password is correct"); 191 msg (M_CLIENT, "ERROR: bad password"); 194 msg (M_WARN, "MAN: client connection rejected after %d failed password attempts", 625 if (strlen (man->connection.up_query.password)) 684 man_query_user_pass (man, type, string, needed, "password", ma [all...] |
H A D | ssl.c | 321 * private key is protected by a password. 329 if (!strlen (passbuf.password)) 338 /* prompt for password even if --askpass wasn't specified */ 340 strncpynt (buf, passbuf.password, size); 349 * Auth username/password handling 394 * Disable password caching 413 * Forget private key password AND auth-user-pass username/password. 1870 /* write username/password if specified */ 1880 if (!write_string (buf, auth_user_pass.password, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | net_rpc.c | 191 * Force a change of the trust acccount password. 219 * Force a change of the trust acccount password. 238 * This uses 'machinename' as the inital password, and changes it. 240 * The password should be created with 'server manager' or equiv first. 293 * a password is 14. --jerry 366 d_printf("net rpc join -U <username>[%%password] <type>[options]\n"\ 367 "\t to join a domain with admin username & password\n"\ 368 "\t\t password will be prompted if needed and none is specified\n"\ 384 * Main 'net_rpc_join()' (where the admain username/password is used) is 386 * Try to just change the password, bu 3021 char *password=NULL; /* don't allow a share password */ local 3389 char *password = NULL; /* don't allow a share password */ local [all...] |
H A D | smbcacls.c | 782 pstrcpy(cmdline_auth_info.password, pass); 791 cmdline_auth_info.password, 0,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | sasl.c | 53 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libgpo/ |
H A D | gpo_util.c | 569 ads->auth.user_name, NULL, ads->auth.password,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/ |
H A D | cifsproto.h | 369 extern void calc_lanman_hash(const char *password, const char *cryptkey,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | reply.c | 386 pstring password; local 397 *service_buf = *password = *dev = 0; 401 pwlen = srvstr_pull_buf(inbuf, password, p, sizeof(password), STR_TERMINATE) + 1; 412 password_blob = data_blob(password, pwlen+1); 443 DATA_BLOB password; local 470 password = data_blob(smb_buf(inbuf),passlen); 474 * after the password. 481 password = data_blob(smb_buf(inbuf),passlen+1); 483 password [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/librpc/gen_ndr/ |
H A D | srvsvc.h | 253 const char *password;/* [unique,charset(UTF16)] */ member in struct:srvsvc_NetShareInfo2 281 const char *password;/* [unique,charset(UTF16)] */ member in struct:srvsvc_NetShareInfo502
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/samples/console/ |
H A D | console.cpp | 2422 wxChar password[256]; local 2423 wxPrintf(_T("Password for %s: "), password); 2424 wxFgets(password, WXSIZEOF(password), stdin); 2425 password[wxStrlen(password) - 1] = '\0'; // chop off '\n' 2426 ftp.SetPassword(password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | apps.c | 460 const char *password = local 461 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; 462 if (password && password[0] != '\0') 464 UI_set_result(ui, uis, password); 484 const char *password = local 485 ((PW_CB_DATA *)UI_get0_user_data(ui))->password; 486 if (password && password[0] != '\0') 522 const char *password local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libmsrpc/ |
H A D | cac_samr.c | 1688 if ( !op || !op->in.username || !op->in.password 1722 op->in.password ); 1870 if ( !op->in.user_hnd || !op->in.password || !mem_ctx ) { 1890 encode_pw_buffer( pw, op->in.password, STR_UNICODE );
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/ |
H A D | ecryptfs_kernel.h | 144 /* May be a password or a private key */ 153 struct ecryptfs_password password; member in union:ecryptfs_auth_tok::__anon16601
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/windll/ |
H A D | windll.c | 817 * Prompt for decryption password * 825 char *pwbuf; /* buffer for password */ 826 int size; /* size of password buffer */ 835 m = "Enter password for: "; 841 return (*G.lpUserFunctions->password)((LPSTR)pwbuf, size, m, (LPCSTR)efn);
|