Searched refs:password (Results 401 - 425 of 458) sorted by relevance

<<111213141516171819

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zip30/
H A Dapi.c670 return (*lpZipUserFunctions->password)(pwbuf, size, ((modeflag == ZP_PW_VERIFY) ?
671 "Verify password: " : "Enter password: "),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dcryptlib.h1536 // interface for password authenticated key agreement protocols, not implemented yet
1628 virtual unsigned int GetPasswordVerifierLength(const byte *password, unsigned int passwordLength) const =0;
1629 virtual void GeneratePasswordVerifier(RandomNumberGenerator &rng, const byte *userId, unsigned int userIdLength, const byte *password, unsigned int passwordLength, byte *verifier) const =0;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/docs/latex/wx/
H A Dtcommdlg.tex187 This is a dialog with a password entry field. The value that the user
H A Ddb.tex332 to the datasource specified in {\it'pDbConfig'} using the userID and password
340 connection to the same datasource (using the same userID/password) has already
1036 Returns the password used to establish this connection to the datasource.
1258 \docparam{AuthStr}{The password associated with the Uid.}
1283 source name, user name (ID) and the password for the user. No database
1756 name, user ID, password and default directory path (used with dBase). Other
1767 \param{const wxString \&}{userID=""}, \param{const wxString \&}{password},
1794 \docparam{password}{{\it OPTIONAL} Password to be associated with the user
1871 Accessor function to return the password assigned for this class
1921 Accessor function to return the password assigne
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/lsync/source/
H A Ddefault-rsync.lua472 computed[ computedN ] = '--password-file=' .. crsync.password_file
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/forked-daapd-0.19/src/
H A Draop.c122 const char *password; member in struct:raop_session
915 if (!rs->password)
917 DPRINTF(E_LOG, L_RAOP, "Authentication required but no password found for device %s\n", rs->devname);
952 gcry_md_write(hd, rs->password, strlen(rs->password));
1854 rs->password = rd->password;
3715 DPRINTF(E_LOG, L_RAOP, "Bad password for device %s\n", rs->devname);
3820 DPRINTF(E_LOG, L_RAOP, "Bad password for device %s\n", rs->devname);
3866 * including the need for and/or validity of the password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/common/
H A Ddb.cpp115 const wxString &password, const wxString &defaultDir,
130 SetPassword(password);
220 void wxDbConnectInf::SetPassword(const wxString &password) argument
222 wxASSERT(password.length() < WXSIZEOF(AuthStr));
224 wxStrncpy(AuthStr, password, WXSIZEOF(AuthStr)-1);
114 wxDbConnectInf(HENV henv, const wxString &dsn, const wxString &userID, const wxString &password, const wxString &defaultDir, const wxString &fileType, const wxString &description) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dapps.c486 const char *password = local
487 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
488 if (password && password[0] != '\0') {
489 UI_set_result(ui, uis, password);
508 const char *password = local
509 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
510 if (password && password[0] != '\0')
548 const char *password local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dapps.c486 const char *password = local
487 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
488 if (password && password[0] != '\0') {
489 UI_set_result(ui, uis, password);
508 const char *password = local
509 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
510 if (password && password[0] != '\0')
548 const char *password local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bftpd-1.6.6/
H A Dcommands.c306 /* If all shared folders are 'All - no password',
343 control_printf (SL_SUCCESS, "331 input email as password.");
378 void command_pass(char *password) argument
400 if (bftpd_login(password)) {
2018 {"PASS", "<sp> password", command_pass, STATE_USER, 0},
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/lib/
H A Dvty.c79 /* Login password check. */
313 passwd = host.password;
1608 /* Vty is not available if password isn't set. */
1609 if (host.password == NULL && host.password_encrypt == NULL)
1611 vty_out (vty, "Vty password is not set.%s", VTY_NEWLINE);
2576 "Enable password checking\n")
2586 "Enable password checking\n")
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Durldata.h375 char *password; /* TLS password (for, e.g., SRP) */ member in struct:ssl_config_data
473 bool user_passwd; /* do we use user+password for this connection? */
474 bool proxy_user_passwd; /* user+password for the proxy? */
507 bool netrc; /* name+password provided by netrc */
508 bool userpwd_in_url; /* name+password found in url */
794 #define PROTOPT_NEEDSPWD (1<<5) /* needs a password, and if none is set it
888 char *passwd; /* password string, allocated */
894 char *proxypasswd; /* proxy password string, allocated */
1214 following not keep sending user+password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/
H A Dgtls.c429 data->set.ssl.password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/config/
H A DMakefile793 password="$(webminpass)" \
H A DMakefile.in793 password="$(webminpass)" \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/
H A Dtransmission.h201 #define TR_PREFS_KEY_RPC_PASSWORD "rpc-password"
489 const char * password );
494 /** @brief get the password used to restrict RPC requests.
495 @return the password string.
H A Dsession.c2537 const char * password )
2541 tr_rpcSetPassword( session->rpcServer, password );
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/web/javascript/jquery/
H A Djquery.form.js760 * [ { name: 'username', value: 'jresig' }, { name: 'password', value: 'secret' } ]
970 var re = /^(?:color|date|datetime|email|month|number|password|range|search|tel|text|time|url|week)$/i; // 'hidden' is not in this list
H A Djquery.form.min.js1 (function(a){function b(){if(!a.fn.ajaxSubmit.debug)return;var b="[jquery.form] "+Array.prototype.join.call(arguments,"");if(window.console&&window.console.log){window.console.log(b)}else if(window.opera&&window.opera.postError){window.opera.postError(b)}}a.fn.ajaxSubmit=function(c){function u(e){function C(c){if(o.aborted||B){return}try{z=w(n)}catch(d){b("cannot access response document: ",d);c=v}if(c===u&&o){o.abort("timeout");return}else if(c==v&&o){o.abort("server abort");return}if(!z||z.location.href==j.iframeSrc){if(!r)return}n.detachEvent?n.detachEvent("onload",C):n.removeEventListener("load",C,false);var e="success",f;try{if(r){throw"timeout"}var g=j.dataType=="xml"||z.XMLDocument||a.isXMLDoc(z);b("isXml="+g);if(!g&&window.opera&&(z.body==null||z.body.innerHTML=="")){if(--A){b("requeing onLoad callback, DOM not available");setTimeout(C,250);return}}var h=z.body?z.body:z.documentElement;o.responseText=h?h.innerHTML:null;o.responseXML=z.XMLDocument?z.XMLDocument:z;if(g)j.dataType="xml";o.getResponseHeader=function(a){var b={"content-type":j.dataType};return b[a]};if(h){o.status=Number(h.getAttribute("status"))||o.status;o.statusText=h.getAttribute("statusText")||o.statusText}var i=(j.dataType||"").toLowerCase();var l=/(json|script|text)/.test(i);if(l||j.textarea){var p=z.getElementsByTagName("textarea")[0];if(p){o.responseText=p.value;o.status=Number(p.getAttribute("status"))||o.status;o.statusText=p.getAttribute("statusText")||o.statusText}else if(l){var q=z.getElementsByTagName("pre")[0];var t=z.getElementsByTagName("body")[0];if(q){o.responseText=q.textContent?q.textContent:q.innerText}else if(t){o.responseText=t.textContent?t.textContent:t.innerText}}}else if(i=="xml"&&!o.responseXML&&o.responseText!=null){o.responseXML=D(o.responseText)}try{y=F(o,i,j)}catch(c){e="parsererror";o.error=f=c||e}}catch(c){b("error caught: ",c);e="error";o.error=f=c||e}if(o.aborted){b("upload aborted");e=null}if(o.status){e=o.status>=200&&o.status<300||o.status===304?"success":"error"}if(e==="success"){j.success&&j.success.call(j.context,y,"success",o);k&&a.event.trigger("ajaxSuccess",[o,j])}else if(e){if(f==undefined)f=o.statusText;j.error&&j.error.call(j.context,o,e,f);k&&a.event.trigger("ajaxError",[o,j,f])}k&&a.event.trigger("ajaxComplete",[o,j]);if(k&&!--a.active){a.event.trigger("ajaxStop")}j.complete&&j.complete.call(j.context,o,e);B=true;if(j.timeout)clearTimeout(s);setTimeout(function(){if(!j.iframeTarget)m.remove();o.responseXML=null},100)}function x(){function h(){try{var a=w(n).readyState;b("state = "+a);if(a.toLowerCase()=="uninitialized")setTimeout(h,50)}catch(c){b("Server abort: ",c," (",c.name,")");C(v);s&&clearTimeout(s);s=undefined}}var c=g.attr("target"),e=g.attr("action");f.setAttribute("target",l);if(!d){f.setAttribute("method","POST")}if(e!=j.url){f.setAttribute("action",j.url)}if(!j.skipEncodingOverride&&(!d||/post/i.test(d))){g.attr({encoding:"multipart/form-data",enctype:"multipart/form-data"})}if(j.timeout){s=setTimeout(function(){r=true;C(u)},j.timeout)}var i=[];try{if(j.extraData){for(var k in j.extraData){i.push(a('<input type="hidden" name="'+k+'" />').attr("value",j.extraData[k]).appendTo(f)[0])}}if(!j.iframeTarget){m.appendTo("body");n.attachEvent?n.attachEvent("onload",C):n.addEventListener("load",C,false)}setTimeout(h,15);f.submit()}finally{f.setAttribute("action",e);if(c){f.setAttribute("target",c)}else{g.removeAttr("target")}a(i).remove()}}function w(a){var b=a.contentWindow?a.contentWindow.document:a.contentDocument?a.contentDocument:a.document;return b}var f=g[0],h,i,j,k,l,m,n,o,p,q,r,s;var t=!!a.fn.prop;if(e){if(t){for(i=0;i<e.length;i++){h=a(f[e[i].name]);h.prop("disabled",false)}}else{for(i=0;i<e.length;i++){h=a(f[e[i].name]);h.removeAttr("disabled")}}}if(a(":input[name=submit],:input[id=submit]",f).length){alert('Error: Form elements must not have name or id of "submit".');return}j=a.extend(true,{},a.ajaxSettings,c);j.context=j.context||j;l="jqFormIO"+(new Date).getTime();if(j.iframeTarget){m=a(j.iframeTarget);q=m.attr("name");if(q==null)m.attr("name",l);else l=q}else{m=a('<iframe name="'+l+'" src="'+j.iframeSrc+'" />');m.css({position:"absolute",top:"-1000px",left:"-1000px"})}n=m[0];o={aborted:0,responseText:null,responseXML:null,status:0,statusText:"n/a",getAllResponseHeaders:function(){},getResponseHeader:function(){},setRequestHeader:function(){},abort:function(c){var d=c==="timeout"?"timeout":"aborted";b("aborting upload... "+d);this.aborted=1;m.attr("src",j.iframeSrc);o.error=d;j.error&&j.error.call(j.context,o,d,c);k&&a.event.trigger("ajaxError",[o,j,d]);j.complete&&j.complete.call(j.context,o,d)}};k=j.global;if(k&&!(a.active++)){a.event.trigger("ajaxStart")}if(k){a.event.trigger("ajaxSend",[o,j])}if(j.beforeSend&&j.beforeSend.call(j.context,o,j)===false){if(j.global){a.active--}return}if(o.aborted){return}p=f.clk;if(p){q=p.name;if(q&&!p.disabled){j.extraData=j.extraData||{};j.extraData[q]=p.value;if(p.type=="image"){j.extraData[q+".x"]=f.clk_x;j.extraData[q+".y"]=f.clk_y}}}var u=1;var v=2;if(j.forceSync){x()}else{setTimeout(x,10)}var y,z,A=50,B;var D=a.parseXML||function(a,b){if(window.ActiveXObject){b=new ActiveXObject("Microsoft.XMLDOM");b.async="false";b.loadXML(a)}else{b=(new DOMParser).parseFromString(a,"text/xml")}return b&&b.documentElement&&b.documentElement.nodeName!="parsererror"?b:null};var E=a.parseJSON||function(a){return window["eval"]("("+a+")")};var F=function(b,c,d){var e=b.getResponseHeader("content-type")||"",f=c==="xml"||!c&&e.indexOf("xml")>=0,g=f?b.responseXML:b.responseText;if(f&&g.documentElement.nodeName==="parsererror"){a.error&&a.error("parsererror")}if(d&&d.dataFilter){g=d.dataFilter(g,c)}if(typeof g==="string"){if(c==="json"||!c&&e.indexOf("json")>=0){g=E(g)}else if(c==="script"||!c&&e.indexOf("javascript")>=0){a.globalEval(g)}}return g}}if(!this.length){b("ajaxSubmit: skipping submit process - no element selected");return this}var d,e,f,g=this;if(typeof c=="function"){c={success:c}}d=this.attr("method");e=this.attr("action");f=typeof e==="string"?a.trim(e):"";f=f||window.location.href||"";if(f){f=(f.match(/^([^#]+)/)||[])[1]}c=a.extend(true,{url:f,success:a.ajaxSettings.success,type:d||"GET",iframeSrc:/^https/i.test(window.location.href||"")?"javascript:false":"about:blank"},c);var h={};this.trigger("form-pre-serialize",[this,c,h]);if(h.veto){b("ajaxSubmit: submit vetoed via form-pre-serialize trigger");return this}if(c.beforeSerialize&&c.beforeSerialize(this,c)===false){b("ajaxSubmit: submit aborted via beforeSerialize callback");return this}var i=c.traditional;if(i===undefined){i=a.ajaxSettings.traditional}var j,k,l,m=this.formToArray(c.semantic);if(c.data){c.extraData=c.data;j=a.param(c.data,i)}if(c.beforeSubmit&&c.beforeSubmit(m,this,c)===false){b("ajaxSubmit: submit aborted via beforeSubmit callback");return this}this.trigger("form-submit-validate",[m,this,c,h]);if(h.veto){b("ajaxSubmit: submit vetoed via form-submit-validate trigger");return this}var n=a.param(m,i);if(j)n=n?n+"&"+j:j;if(c.type.toUpperCase()=="GET"){c.url+=(c.url.indexOf("?")>=0?"&":"?")+n;c.data=null}else{c.data=n}var o=[];if(c.resetForm){o.push(function(){g.resetForm()})}if(c.clearForm){o.push(function(){g.clearForm(c.includeHidden)})}if(!c.dataType&&c.target){var p=c.success||function(){};o.push(function(b){var d=c.replaceTarget?"replaceWith":"html";a(c.target)[d](b).each(p,arguments)})}else if(c.success){o.push(c.success)}c.success=function(a,b,d){var e=c.context||c;for(var f=0,h=o.length;f<h;f++){o[f].apply(e,[a,b,d||g,g])}};var q=a("input:file",this).length>0;var r="multipart/form-data";var s=g.attr("enctype")==r||g.attr("encoding")==r;if(c.iframe!==false&&(q||c.iframe||s)){if(c.closeKeepAlive){a.get(c.closeKeepAlive,function(){u(m)})}else{u(m)}}else{if(a.browser.msie&&d=="get"&&typeof c.type==="undefined"){var t=g[0].getAttribute("method");if(typeof t==="string")c.type=t}a.ajax(c)}this.trigger("form-submit-notify",[this,c]);return this};a.fn.ajaxForm=function(c){if(this.length===0){var d={s:this.selector,c:this.context};if(!a.isReady&&d.s){b("DOM not ready, queuing ajaxForm");a(function(){a(d.s,d.c).ajaxForm(c)});return this}b("terminating; zero elements found by selector"+(a.isReady?"":" (DOM not ready)"));return this}return this.ajaxFormUnbind().bind("submit.form-plugin",function(b){if(!b.isDefaultPrevented()){b.preventDefault();a(this).ajaxSubmit(c)}}).bind("click.form-plugin",function(b){var c=b.target;var d=a(c);if(!d.is(":submit,input:image")){var e=d.closest(":submit");if(e.length==0){return}c=e[0]}var f=this;f.clk=c;if(c.type=="image"){if(b.offsetX!=undefined){f.clk_x=b.offsetX;f.clk_y=b.offsetY}else if(typeof a.fn.offset=="function"){var g=d.offset();f.clk_x=b.pageX-g.left;f.clk_y=b.pageY-g.top}else{f.clk_x=b.pageX-c.offsetLeft;f.clk_y=b.pageY-c.offsetTop}}setTimeout(function(){f.clk=f.clk_x=f.clk_y=null},100)})};a.fn.ajaxFormUnbind=function(){return this.unbind("submit.form-plugin click.form-plugin")};a.fn.formToArray=function(b){var c=[];if(this.length===0){return c}var d=this[0];var e=b?d.getElementsByTagName("*"):d.elements;if(!e){return c}var f,g,h,i,j,k,l;for(f=0,k=e.length;f<k;f++){j=e[f];h=j.name;if(!h){continue}if(b&&d.clk&&j.type=="image"){if(!j.disabled&&d.clk==j){c.push({name:h,value:a(j).val()});c.push({name:h+".x",value:d.clk_x},{name:h+".y",value:d.clk_y})}continue}i=a.fieldValue(j,true);if(i&&i.constructor==Array){for(g=0,l=i.length;g<l;g++){c.push({name:h,value:i[g]})}}else if(i!==null&&typeof i!="undefined"){c.push({name:h,value:i})}}if(!b&&d.clk){var m=a(d.clk),n=m[0];h=n.name;if(h&&!n.disabled&&n.type=="image"){c.push({name:h,value:m.val()});c.push({name:h+".x",value:d.clk_x},{name:h+".y",value:d.clk_y})}}return c};a.fn.formSerialize=function(b){return a.param(this.formToArray(b))};a.fn.fieldSerialize=function(b){var c=[];this.each(function(){var d=this.name;if(!d){return}var e=a.fieldValue(this,b);if(e&&e.constructor==Array){for(var f=0,g=e.length;f<g;f++){c.push({name:d,value:e[f]})}}else if(e!==null&&typeof e!="undefined"){c.push({name:this.name,value:e})}});return a.param(c)};a.fn.fieldValue=function(b){for(var c=[],d=0,e=this.length;d<e;d++){var f=this[d];var g=a.fieldValue(f,b);if(g===null||typeof g=="undefined"||g.constructor==Array&&!g.length){continue}g.constructor==Array?a.merge(c,g):c.push(g)}return c};a.fieldValue=function(b,c){var d=b.name,e=b.type,f=b.tagName.toLowerCase();if(c===undefined){c=true}if(c&&(!d||b.disabled||e=="reset"||e=="button"||(e=="checkbox"||e=="radio")&&!b.checked||(e=="submit"||e=="image")&&b.form&&b.form.clk!=b||f=="select"&&b.selectedIndex==-1)){return null}if(f=="select"){var g=b.selectedIndex;if(g<0){return null}var h=[],i=b.options;var j=e=="select-one";var k=j?g+1:i.length;for(var l=j?g:0;l<k;l++){var m=i[l];if(m.selected){var n=m.value;if(!n){n=m.attributes&&m.attributes["value"]&&!m.attributes["value"].specified?m.text:m.value}if(j){return n}h.push(n)}}return h}return a(b).val()};a.fn.clearForm=function(b){return this.each(function(){a("input,select,textarea",this).clearFields(b)})};a.fn.clearFields=a.fn.clearInputs=function(a){var b=/^(?:color|date|datetime|email|month|number|password|range|search|tel|text|time|url|week)$/i;return this.each(function(){var c=this.type,d=this.tagName (…)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/perl/BerkeleyDB/
H A DBerkeleyDB.xs1437 char * password,
1467 if (password)
1495 if (password)
1497 Status = dbp->set_encrypt(dbp, password, enc_flags);
1499 password, enc_flags,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/
H A Dscsi_transport_iscsi.c1791 iscsi_session_attr(password, ISCSI_PARAM_PASSWORD, 1);
2065 SETUP_SESSION_RD_ATTR(password, ISCSI_USERNAME);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/
H A Deap.c547 tpw.pebuf.password.len = t_fromb64((char *)tpw.pwbuf,
549 tpw.pebuf.password.data = tpw.pwbuf;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/
H A Dclient.c3122 d_printf("logon <username> [<password>]\n");
3900 poptSetOtherOptionHelp(pc, "service <password>");
3921 /* if the service has already been retrieved then check if we have also a password */
3923 pstrcpy(cmdline_auth_info.password, poptGetArg(pc));
4008 /* if the service has already been retrieved then check if we have also a password */
4010 pstrcpy(cmdline_auth_info.password, poptGetArg(pc));
4074 /* store the username an password for dfs support */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Dsmb.h265 #define ACB_PWNOTREQ 0x00000004 /* 1 = User password not required */
272 #define ACB_PWNOEXP 0x00000200 /* 1 = User password does not expire */
276 #define ACB_ENC_TXT_PWD_ALLOWED 0x00000800 /* 1 = Text password encryped */
742 fstring full_name; /* to store full name (such as "Joe Bloggs") from gecos field of password file */
1789 fstring password; member in struct:pwd_info
1840 * Size of new password account encoding string. This is enough space to
1849 password to be rejected or allowed in as guest? WinNT rejects them
1850 but it can be a pain as it means "net view" needs to use a password
1854 "NEVER_MAP_TO_GUEST" means session setups with an invalid password
1857 "MAP_TO_GUEST_ON_BAD_USER" means session setups with an invalid password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/printing/
H A Dnt_printing.c1434 /* Null password is ok - we are already an authenticated user... */
3226 SAFE_FREE(ads->auth.password);
3227 ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),
3268 SAFE_FREE(ads->auth.password);
3269 ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),

Completed in 314 milliseconds

<<111213141516171819