Searched refs:password (Results 276 - 300 of 314) sorted by relevance

<<111213

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/include/
H A Drap.h43 /* tasks and user tasks (e.g. password change) */
442 #define RAP_UPASSWD_LEN 16 /* user password */
443 #define RAP_SPASSWD_LEN 9 /* share password */
503 char password[RAP_SPASSWD_LEN]; member in struct:rap_share_info_2
H A Dincludes.h983 /* what is the longest significant password available on your system?
984 Knowing this speeds up password searches a lot */
1331 int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype);
1332 int create_kerberos_key_from_string_direct(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, krb5_enctype enctype);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/utils/
H A Dnet_rap.c212 memset(sinfo.password, '\0', sizeof(sinfo.password));
878 d_printf("net rap validate <username> [password]\n"\
879 "\tValidate user and password to check whether they"\
945 "net rap password <user> <oldpwo> <newpw> [misc. options] [target]\n"\
946 "\tchanges the password for the specified user at target\n");
963 /* BB Add check for password lengths? */
992 " net rap password \tto change the password of a user\n"\
998 " net rap validate \tto check whether a user and the corresponding password ar
[all...]
H A Dsmbcacls.c721 pstrcpy(cmdline_auth_info.password, pass);
730 cmdline_auth_info.password, 0,
H A Dnet_rpc.c162 * Force a change of the trust acccount password.
185 * Force a change of the trust acccount password.
208 * This uses 'machinename' as the inital password, and changes it.
210 * The password should be created with 'server manager' or equiv first.
250 * a password is 14. --jerry
323 d_printf("net rpc join -U <username>[%%password] <type>[options]\n"\
324 "\t to join a domain with admin username & password\n"\
325 "\t\t password will be prompted if needed and none is specified\n"\
341 * Main 'net_rpc_join()' (where the admain username/password is used) is
343 * Try to just change the password, bu
2481 char *password=NULL; /* don't allow a share password */ local
2650 char *password = NULL; /* don't allow a share password */ local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/libsmbclient/
H A Dtree.c594 /* Should put up a dialog box to ask the user for username and password */
599 char *password, int pwmaxlen)
603 strncpy(password, "test", pwmaxlen);
597 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/
H A Dpampass.c26 * username/password pairs, account managment, session and access control.
27 * Note: SMB password checking is done in smbpass.c
48 * and the server_login/change password functions.
106 * echo off means password.
174 * PAM password change conversation function
176 * echo off means password.
555 DEBUG(2, ("smb_pam_account: PAM: User %s is valid but password is expired\n", user));
663 DEBUG(2, ("PAM: unable to obtain the new authentication token - is password to weak?\n"));
669 DEBUG(2, ("PAM: unable to obtain the old authentication token - was the old password wrong?.\n"));
699 /* If this point is reached, the password ha
791 smb_pam_passcheck(const char * user, const char * password) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/client/
H A Dtree.c592 /* Should put up a dialog box to ask the user for username and password */
597 char *password, int pwmaxlen)
601 strncpy(password, "test", pwmaxlen);
595 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/cifs/
H A Dcifsglob.h168 * and name. We always get the password on the fly in case it
201 char * password; member in struct:cifsSesInfo
568 have the uid/password or Kerberos credential
H A Dmisc.c101 kfree(buf_to_free->password);
333 /* for userid/password/logon_domain or credential */
335 /* and see if we have a matching password for existing*/
336 /* session for that user perhas getting password by */
351 /* with userid/password pairs found on the smb session */
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/passdb/
H A Dpdb_get_set.c166 /* Return the plaintext password if known. Most of the time
990 Set the user's password history hash. historyLen is the number of
1016 Set the user's plaintext password only (base procedure, see helper
1020 BOOL pdb_set_plaintext_pw_only (SAM_ACCOUNT *sampass, const char *password, enum pdb_value_state flag) argument
1025 if (password) {
1029 sampass->private.plaintext_pw = talloc_strdup(sampass->mem_ctx, password);
1112 password change.
1151 Set the user's PLAINTEXT password. Used as an interface to the above.
1163 /* Calculate the MD4 hash (NT compatible) of the password */
1173 would reduce the effective password lengt
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/
H A Dreply.c297 pstring password; local
308 *service_buf = *password = *dev = 0;
312 pwlen = srvstr_pull_buf(inbuf, password, p, sizeof(password), STR_TERMINATE) + 1;
323 password_blob = data_blob(password, pwlen+1);
353 DATA_BLOB password; local
380 password = data_blob(smb_buf(inbuf),passlen);
382 password = data_blob(smb_buf(inbuf),passlen+1);
384 password.data[passlen]=0;
409 conn = make_connection(service,password,client_devicetyp
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpc_client/
H A Dcli_pipe.c1336 fstring password; local
1365 pwd_get_cleartext(&cli->pwd, password);
1367 password);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/apps/
H A Dapps.c438 const char *password = local
439 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
440 if (password && password[0] != '\0')
442 UI_set_result(ui, uis, password);
462 const char *password = local
463 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
464 if (password && password[0] != '\0')
500 const char *password local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/ecryptfs/
H A Decryptfs_kernel.h143 /* May be a password or a private key */
151 struct ecryptfs_password password; member in union:ecryptfs_auth_tok::__anon7360
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dwinbindd_ads.c70 /* the machine acct password might have change - fetch it every time */
71 SAFE_FREE(ads->auth.password);
72 ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dapps.c460 const char *password = local
461 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
462 if (password && password[0] != '\0')
464 UI_set_result(ui, uis, password);
484 const char *password = local
485 ((PW_CB_DATA *)UI_get0_user_data(ui))->password;
486 if (password && password[0] != '\0')
522 const char *password local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/drivers/scsi/qla4xxx/
H A Dql4_fw.h535 uint8_t password[0x20]; /* A0-BF */ member in struct:dev_db_entry
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/
H A Durldata.h310 char *password; /* TLS password (for, e.g., SRP) */ member in struct:ssl_config_data
406 bool user_passwd; /* do we use user+password for this connection? */
407 bool proxy_user_passwd; /* user+password for the proxy? */
443 bool netrc; /* name+password provided by netrc */
444 bool userpwd_in_url; /* name+password found in url */
714 #define PROTOPT_NEEDSPWD (1<<5) /* needs a password, and if none is set it
804 char *passwd; /* password string, allocated */
807 char *proxypasswd; /* proxy password string, allocated */
1137 following not keep sending user+password
[all...]
H A Dgtls.c377 data->set.ssl.password);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/config/
H A DMakefile.in687 password="$(webminpass)" \
H A DMakefile687 password="$(webminpass)" \
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/zebra/lib/
H A Dvty.c79 /* Login password check. */
313 passwd = host.password;
1608 /* Vty is not available if password isn't set. */
1609 if (host.password == NULL && host.password_encrypt == NULL)
1611 vty_out (vty, "Vty password is not set.%s", VTY_NEWLINE);
2576 "Enable password checking\n")
2586 "Enable password checking\n")
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bftpd-1.6.6/
H A Dcommands.c306 /* If all shared folders are 'All - no password',
331 control_printf (SL_SUCCESS, "331 input email as password.");
363 void command_pass(char *password) argument
385 if (bftpd_login(password)) {
1948 {"PASS", "<sp> password", command_pass, STATE_USER, 0},
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/printing/
H A Dnt_printing.c1148 /* Null password is ok - we are already an authenticated user... */
2838 SAFE_FREE(ads->auth.password);
2839 ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),
2880 SAFE_FREE(ads->auth.password);
2881 ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),

Completed in 234 milliseconds

<<111213