Searched refs:password (Results 376 - 400 of 458) sorted by relevance

<<111213141516171819

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/
H A DProxy.h55 * - RFC-1929: username/password Authentication for SOCKS V5
132 * @param password The password to authenticate to the server.
141 const wxString &password
161 //! The password to authenticate to the server.
H A DProxy.cpp52 const wxString &password)
61 * is username/password. If there is no username/password in
62 * CProxyData, a NULL username/password is sent. That will probably
68 m_password(password)
650 // Prepare username/password buffer
659 // Send the username/password packet
45 CProxyData( bool proxyEnable, CProxyType proxyType, const wxString &proxyHostName, unsigned short proxyPort, bool enablePassword, const wxString &userName, const wxString &password) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dapps.h221 const void *password; member in struct:pw_cb_data
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Dlibmsrpc.h201 /**Last password set time*/
204 /**Time password can change*/
207 /**Time password must change*/
210 /**LM user password*/
213 /**NT user password*/
225 /**Bad password count*/
231 /**Change password at next logon?*/
320 /**Minimum password length*/
323 /**How many previous passwords to remember - ie, password cannot be the same as N previous passwords*/
332 /**How long users are locked out for too many bad password attempt
430 char *password; member in struct:_CACSERVERHANDLE
2292 char *password; member in struct:SamUserChangePasswd::__anon5218
2327 char *password; member in struct:SamSetPassword::__anon5219
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dwinbindd_ads.c82 /* the machine acct password might have change - fetch it every time */
84 SAFE_FREE(ads->auth.password);
91 if ( !secrets_fetch_trusted_domain_password( domain->name, &ads->auth.password, &sid, &last_set_time ) ) {
101 ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
H A Dpam_winbind.c331 {"NT_STATUS_PWD_TOO_RECENT", "The password of this user is too recent to change"},
332 {"NT_STATUS_PWD_HISTORY_CONFLICT", "Password is already in password history"},
333 {"NT_STATUS_PASSWORD_EXPIRED", "Your password has expired"},
334 {"NT_STATUS_PASSWORD_MUST_CHANGE", "You need to change your password now"},
503 /* incorrect password */
504 _pam_log(pamh, ctrl, LOG_WARNING, "user '%s' denied access (incorrect password or invalid membership)", user);
511 /* password expired */
512 _pam_log(pamh, ctrl, LOG_WARNING, "user '%s' password expired", user);
515 /* new password required */
516 _pam_log(pamh, ctrl, LOG_WARNING, "user '%s' new password require
1513 const char *password; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/
H A Dpdb_get_set.c78 change their password, and this time must be zero. jmcd
85 to indicate that the user cannot change their password. jmcd
167 /* Return the plaintext password if known. Most of the time
866 /* on keep the password if we are allowing LANMAN authentication */
878 Set the user's password history hash. historyLen is the number of
901 Set the user's plaintext password only (base procedure, see helper
905 BOOL pdb_set_plaintext_pw_only(struct samu *sampass, const char *password, enum pdb_value_state flag) argument
907 if (password) {
911 sampass->plaintext_pw = talloc_strdup(sampass, password);
983 Set the user's PLAINTEXT password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/
H A Dgskit.c442 const char *password)
468 if(c == CURLE_OK && password)
469 c = set_buffer(data, h, GSK_KEYRING_PW, password, FALSE);
578 * level) or by keyring file, password and certificate label.
581 * Key password (CURLOPT_KEYPASSWD) holds the keyring password.
585 * If no key password is given and the keyring is the system keyring,
439 init_environment(struct SessionHandle *data, gsk_handle *envir, const char *appid, const char *file, const char *label, const char *password) argument
H A Dopenssl.c299 * Supply default password to the engine user interface conversation.
300 * The password is passed by OpenSSL engine from ENGINE_load_private_key()
305 const char *password; local
309 password = (const char*)UI_get0_user_data(ui);
310 if(NULL != password &&
312 UI_set_result(ui, uis, password);
322 * Suppress interactive request for a default password if available.
360 * If password has been given, we store that in the global
370 * We set the password in the callback userdata
484 "could not parse PKCS12 file, check password, OpenSS
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/
H A Dmount.cifs.c128 struct passwd *password = getpwuid(getuid()); local
130 if (password) {
131 username = password->pw_name;
190 } else if (strncasecmp("password",line_buf+i,8) == 0) {
200 printf("mount.cifs failed: password in credentials file too long\n");
275 printf("mount.cifs failed. %s attempting to open password file %s\n",
285 printf("mount.cifs failed. Error %s reading password file\n",strerror(errno));
293 printf("\nWarning: null password used since cifs password file empty");
304 printf("\nWarning: password longe
[all...]
H A Dsmbctool.c139 strncpy(pPassword, cmdline_auth_info.password, maxLenPassword - 1);
140 strncpy(authPassword, cmdline_auth_info.password, maxLenPassword - 1);
158 pstrcpy(cmdline_auth_info.password, authPassword);
2847 d_printf("logon <username> [<password>]\n");
3579 poptSetOtherOptionHelp(pc, "service <password>");
3712 pstrcpy(cmdline_auth_info.password,poptGetArg(pc));
3727 /* store the username an password for dfs support */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dmanage.c61 /* tag for blank username/password */
94 msg (M_CLIENT, "password type p : Enter password p for a queried OpenVPN password.");
182 if (streq (line, man->settings.up.password))
185 msg (M_CLIENT, "SUCCESS: password is correct");
191 msg (M_CLIENT, "ERROR: bad password");
194 msg (M_WARN, "MAN: client connection rejected after %d failed password attempts",
625 if (strlen (man->connection.up_query.password))
684 man_query_user_pass (man, type, string, needed, "password", ma
[all...]
H A Dssl.c321 * private key is protected by a password.
329 if (!strlen (passbuf.password))
338 /* prompt for password even if --askpass wasn't specified */
340 strncpynt (buf, passbuf.password, size);
349 * Auth username/password handling
394 * Disable password caching
413 * Forget private key password AND auth-user-pass username/password.
1870 /* write username/password if specified */
1880 if (!write_string (buf, auth_user_pass.password,
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dnet_rpc.c191 * Force a change of the trust acccount password.
219 * Force a change of the trust acccount password.
238 * This uses 'machinename' as the inital password, and changes it.
240 * The password should be created with 'server manager' or equiv first.
293 * a password is 14. --jerry
366 d_printf("net rpc join -U <username>[%%password] <type>[options]\n"\
367 "\t to join a domain with admin username & password\n"\
368 "\t\t password will be prompted if needed and none is specified\n"\
384 * Main 'net_rpc_join()' (where the admain username/password is used) is
386 * Try to just change the password, bu
3021 char *password=NULL; /* don't allow a share password */ local
3389 char *password = NULL; /* don't allow a share password */ local
[all...]
H A Dsmbcacls.c782 pstrcpy(cmdline_auth_info.password, pass);
791 cmdline_auth_info.password, 0,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/
H A Dsasl.c53 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libgpo/
H A Dgpo_util.c569 ads->auth.user_name, NULL, ads->auth.password,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/
H A Dcifsproto.h369 extern void calc_lanman_hash(const char *password, const char *cryptkey,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Dreply.c386 pstring password; local
397 *service_buf = *password = *dev = 0;
401 pwlen = srvstr_pull_buf(inbuf, password, p, sizeof(password), STR_TERMINATE) + 1;
412 password_blob = data_blob(password, pwlen+1);
443 DATA_BLOB password; local
470 password = data_blob(smb_buf(inbuf),passlen);
474 * after the password.
481 password = data_blob(smb_buf(inbuf),passlen+1);
483 password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/librpc/gen_ndr/
H A Dsrvsvc.h253 const char *password;/* [unique,charset(UTF16)] */ member in struct:srvsvc_NetShareInfo2
281 const char *password;/* [unique,charset(UTF16)] */ member in struct:srvsvc_NetShareInfo502
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/samples/console/
H A Dconsole.cpp2422 wxChar password[256]; local
2423 wxPrintf(_T("Password for %s: "), password);
2424 wxFgets(password, WXSIZEOF(password), stdin);
2425 password[wxStrlen(password) - 1] = '\0'; // chop off '\n'
2426 ftp.SetPassword(password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dapps.c460 const char *password = local
461 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
462 if (password && password[0] != '\0')
464 UI_set_result(ui, uis, password);
484 const char *password = local
485 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
486 if (password && password[0] != '\0')
522 const char *password local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libmsrpc/
H A Dcac_samr.c1688 if ( !op || !op->in.username || !op->in.password
1722 op->in.password );
1870 if ( !op->in.user_hnd || !op->in.password || !mem_ctx ) {
1890 encode_pw_buffer( pw, op->in.password, STR_UNICODE );
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/
H A Decryptfs_kernel.h144 /* May be a password or a private key */
153 struct ecryptfs_password password; member in union:ecryptfs_auth_tok::__anon16601
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/windll/
H A Dwindll.c817 * Prompt for decryption password *
825 char *pwbuf; /* buffer for password */
826 int size; /* size of password buffer */
835 m = "Enter password for: ";
841 return (*G.lpUserFunctions->password)((LPSTR)pwbuf, size, m, (LPCSTR)efn);

Completed in 297 milliseconds

<<111213141516171819