/asus-wl-520gu-7.0.1.45/src/router/bpalogin/ |
H A D | bpalogin.conf | 8 # Your BPA password 9 password yourpass
|
/asus-wl-520gu-7.0.1.45/src/router/samba/examples/printing/ |
H A D | smbprint.sysv | 34 # exported called "printer" with no password. 42 password="" 50 ) | /opt/samba/smbclient "\\\\$server\\$service" $password -N > /dev/null
|
H A D | smbprint | 16 # exported called "printer" with no password. 20 # so that the server, service, and password can be read from 47 # password="password" 52 # password="" 72 # password 80 if [ "x$password" = "x" ] ; then 81 password="-N" 138 $password \
|
H A D | smbprint-new.sh | 16 # exported called "printer" with no password. 20 # so that the server, service, and password can be read from 47 # password="password" 52 # password="" 72 # password 80 if [ "x$password" = "x" ] ; then 81 password="-N" 138 $password \
|
/asus-wl-520gu-7.0.1.45/src/router/shared/bcmcrypto/ |
H A D | passhash.h | 3 * Perform password->key hash algorithm as defined in WPA and 802.11i 22 password is an ascii string of 8 to 63 characters in length 27 int passhash(char *password, int passlen, unsigned char *ssid, int ssidlen, unsigned char *output);
|
/asus-wl-520gu-7.0.1.45/src/router/shared.asus/bcmcrypto/ |
H A D | passhash.h | 3 * Perform password->key hash algorithm as defined in WPA and 802.11i 22 password is an ascii string of 8 to 63 characters in length 27 int passhash(char *password, int passlen, unsigned char *ssid, int ssidlen, unsigned char *output);
|
/asus-wl-520gu-7.0.1.45/src/router/samba/packaging/SGI/ |
H A D | smbprint | 40 # exported called "hplj2" with no password. 44 password="" 52 ) | /usr/samba/bin/smbclient "//$server/$service" $password -N > /dev/null
|
/asus-wl-520gu-7.0.1.45/src/router/LPRng/UTILS/ |
H A D | ncpprint | 18 # The username and password information are in an 'authfile' 33 # password= 48 # get username and password values 55 if [ "$password" != "" ]; then 56 usercmd="-U $username -P $password" 67 #echo $server $password $translate $x_command > /tmp/ncpprint.log
|
H A D | smbprint | 16 # - user name and password in /var/spool/lpd/smb/auth file 18 # Variation 2: LPRng + smbclient -U username password 22 # - user name and password in /var/spool/lpd/smb/auth file 29 # - user name and password in /var/spool/lpd/smb/auth file 43 # password value. You can put these in the general.cfg file 47 # password=xxxx 48 # There are NO quotes allowed around the name and/or password 49 # files so the password value xxxx must not contain shell 71 # check for smbclientold=yes and fix up authfile/password stuff 83 #echo $share $password [all...] |
/asus-wl-520gu-7.0.1.45/src/router/infosvr/ |
H A D | packet.h | 84 int PackGetInfoCurrentAP(char *pdubuf, char *mac, char *password); 86 int PackSetInfoCurrentAP(char *pdubuf, char *mac, char *password, PKT_GET_INFO_AP *curAP); 90 int PackGetInfoCurrentSTA(char *pdubuf, char *mac, char *password); 92 int PackGetInfoSites(char *pdubuf, char *mac, char *password); 94 int PackSetInfoCurrentSTA(char *pdubuf, char *mac, char *password, PKT_GET_INFO_STA *curSTA); 96 int PackGetInfoProfiles(char *pdubuf, char *mac, char *password, int start, int count); 98 int PackSetInfoProfiles(char *pdubuf, char *mac, char *password, PKT_GET_INFO_PROFILE *profile); 105 // check password 106 int PackCheckPassword(char *pdubuf, char *mac, char *password);
|
H A D | packet.c | 101 DWORD PackCmdHdr(char *pdubuf, WORD cmd, char *mac, char *password) argument 111 memcpy(hdr->Password, password, 32); 193 int PackGetInfoCurrentAP(char *pdubuf, char *mac, char *password) argument 198 tid = PackCmdHdr(pdubuf, NET_CMD_ID_GETINFO_EX, mac, password); 226 int PackSetInfoCurrentAP(char *pdubuf, char *mac, char *password, PKT_GET_INFO_AP *curAP) argument 231 tid = PackCmdHdr(pdubuf, NET_CMD_ID_SETINFO, mac, password); 249 int PackGetInfoCurrentSTA(char *pdubuf, char *mac, char *password) argument 254 tid = PackCmdHdr(pdubuf, NET_CMD_ID_GETINFO_EX, mac, password); 281 int PackSetInfoCurrentSTA(char *pdubuf, char *mac, char *password, PKT_GET_INFO_STA *curSTA) argument 286 tid = PackCmdHdr(pdubuf, NET_CMD_ID_SETINFO, mac, password); 303 PackGetInfoSites(char *pdubuf, char *mac, char *password) argument 327 PackGetInfoProfiles(char *pdubuf, char *mac, char *password, int start, int count) argument 351 PackSetInfoProfiles(char *pdubuf, char *mac, char *password, PKT_GET_INFO_PROFILE *profile) argument 370 PackCheckPassword(char *pdubuf, char *mac, char *password) argument 392 PackSysCmd(char *pdubuf, char *mac, char *password, PKT_SYSCMD *cmd) argument 416 PackSetPubKey(char *pdubuf, char *mac, char *password, PKT_SET_INFO_GW_QUICK_KEY *key) argument 479 PackEZProbe(char *pdubuf, char *mac, char *password, char *key, int klen) argument 515 PackSetInfoGWQuick(char *pdubuf, char *mac, char *password, PKT_SET_INFO_GW_QUICK *setting, char *key, int klen) argument [all...] |
/asus-wl-520gu-7.0.1.45/src/router/samba/source/utils/ |
H A D | smbauth.c | 51 const char * password; local 69 printf("Usage: %s <user> <password>\n", argv[0]); 70 printf("\tUse a colon (':') to indicate a null password.\n"); 74 password = argv[2]; 75 if (strcmp(password, ":") == 0) 76 password = NULL; 120 len = strlen(format) + max_name_len + strlen(user_name) + strlen(password) + 32; 137 smb_snprintf(cmd, len, format, inet_ntoa(pdc_addr), user_name, password); 154 procedure if the user is already in our local password file. 171 For unknown reasons, the password mus [all...] |
H A D | tdb_check_password.c | 2 check password in TDB file 59 authenticate(const char * username, const char * password) argument 72 Use Samba routines to LANMAN password hash from TDB file. 92 fprintf(stderr, "ERROR: Cannot get password database entry for %s.\n", username); 101 fprintf(stderr, "ERROR: Cannot get lanman password for %s.\n", username); 108 Convert lanman password hash to string. 158 pstrcat(cmd, password); 179 char * password; local 183 printf("Usage: %s <user name> <password>\n", argv[0]); 188 password [all...] |
/asus-wl-520gu-7.0.1.45/src/router/samba/source/auth/ |
H A D | pass_check.c | 21 /* this module is for checking a username/password against a system 22 password database. The SMB encrypted password support is elsewhere */ 44 static BOOL afs_auth(char *user, char *password) argument 55 password, 0, /* lifetime, default */ 93 static BOOL dfs_auth(char *user, char *password) argument 111 * We only go for a DCE login context if the given password 112 * matches that stored in the local password file.. 116 if (strcmp((char *)crypt(password, this_salt), this_crypted)) 273 passwd_rec.key.tagged_union.plain = (idl_char *) password; 379 linux_bigcrypt(char *password, char *salt1, char *crypted) argument 404 osf1_bigcrypt(char *password, char *salt1) argument 487 password_check(const char *password) argument 594 pass_check(const struct passwd *pass, const char *user, const char *password, int pwlen, BOOL (*fn) (const char *, const char *), BOOL run_cracker) argument [all...] |
/asus-wl-520gu-7.0.1.45/src/router/samba/source/libads/ |
H A D | util.c | 3 krb5 set password implementation 28 char *password; local 34 if ((password = secrets_fetch_machine_password(lp_workgroup(), NULL, &sec_channel_type)) == NULL) { 35 DEBUG(1,("Failed to retrieve password for principal %s\n", host_principal)); 44 ret = kerberos_set_password(ads->auth.kdc_server, service_principal, password, service_principal, new_password, ads->auth.time_offset); 49 DEBUG(1,("Failed to save machine password\n"));
|
/asus-wl-520gu-7.0.1.45/src/router/samba/packaging/Mandrake/ |
H A D | smbprint | 16 # exported called "printer" with no password. 20 # so that the server, service, and password can be read from 37 # password="password" 42 # password="" 63 # password 77 ) | /usr/bin/smbclient "//$server/$service" $password -U $server -N >> $logfile
|
/asus-wl-520gu-7.0.1.45/src/router/samba/packaging/RedHat/ |
H A D | smbprint | 16 # exported called "printer" with no password. 20 # so that the server, service, and password can be read from 37 # password="password" 42 # password="" 63 # password 77 ) | /usr/bin/smbclient "\\\\$server\\$service" $password -U $server -N >> $logfile
|
/asus-wl-520gu-7.0.1.45/src/router/samba/examples/pdb/mysql/ |
H A D | smb.conf | 10 mysql:mysql password = ambas
|
/asus-wl-520gu-7.0.1.45/src/router/samba/packaging/Fedora/ |
H A D | smbprint | 15 # exported called "printer" with no password. 19 # so that the server, service, and password can be read from 36 # password="password" 42 # password="" 57 # password 80 #echo $share $password $translate $x_command > /tmp/smbprint.log 82 cat | /usr/bin/smbclient "$share" "$password" -E ${hostip:+-I} \
|
/asus-wl-520gu-7.0.1.45/src/router/samba/source/client/ |
H A D | smbspool.c | 55 *password; /* Password */ local 90 fputs(" smb://[username:password@][workgroup/]server/printer\n", stderr); 144 * Extract password as needed... 147 if ((password = strchr_m(username, ':')) != NULL) 148 *password++ = '\0'; 150 password = ""; 155 password = ""; 171 * Convert to smb://[username:password@]workgroup/server/printer... 204 if ((cli = smb_connect(workgroup, server, printer, username, password)) == NULL) 272 const char *password) /* 268 smb_connect(const char *workgroup, const char *server, const char *share, const char *username, const char *password) argument [all...] |
/asus-wl-520gu-7.0.1.45/src/router/samba/source/script/ |
H A D | smbtar | 25 # you're doing, but beware: better not store a plain text password! 28 password="" 53 -p <password> Specify PC Password $password 124 password="$OPTARG" 156 # echo "password is $password" # passwords should never be sent to screen 163 eval $SMBCLIENT "'\\\\$server\\$service'" "'$password'" -U "'$username'" \
|
/asus-wl-520gu-7.0.1.45/src/router/samba/testsuite/libsmbclient/src/lseek/ |
H A D | lseek_2.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/asus-wl-520gu-7.0.1.45/src/router/ez-ipupdate/ |
H A D | asus_ddns.h | 16 extern char password[128];
|
/asus-wl-520gu-7.0.1.45/src/router/samba/examples/LDAP/smbldap-tools/ |
H A D | smbldap-passwd.pl | 3 # LDAP to unix password sync script for samba 72 print "Changing password for $user\n"; 76 # prompt for current password 78 print "(current) UNIX password: "; 89 # prompt for new password 95 print "New password : "; 101 print "Retype new password : "; 166 # change unix password 174 $modify->code && warn "Unable to change password : ", $modify->error ; 186 smbldap-passwd.pl - change user password [all...] |
/asus-wl-520gu-7.0.1.45/src/router/samba/source/torture/ |
H A D | rpctorture.c | 42 static pstring password; /* local copy only, if one is entered */ variable 115 if (password[0] != 0) 152 slprintf(cmd, sizeof(cmd)-1, "%s %s", cli->user_name, password); 193 fprintf(out_hnd, "Usage: %s service <password> [-d debuglevel] [-l log] ", 297 password[0] = 0; 334 pstrcpy(password,argv[1]); 384 pstrcpy(password,lp+1); 386 memset(strchr_m(optarg,'%')+1,'X',strlen(password)); 512 /* set the password cache info */ 515 if (password[ [all...] |