Searched refs:password (Results 1 - 25 of 278) sorted by relevance

1234567891011>>

/asus-wl-520gu-7.0.1.45/src/router/bpalogin/
H A Dbpalogin.conf8 # Your BPA password
9 password yourpass
/asus-wl-520gu-7.0.1.45/src/router/samba/examples/printing/
H A Dsmbprint.sysv34 # exported called "printer" with no password.
42 password=""
50 ) | /opt/samba/smbclient "\\\\$server\\$service" $password -N > /dev/null
H A Dsmbprint16 # exported called "printer" with no password.
20 # so that the server, service, and password can be read from
47 # password="password"
52 # password=""
72 # password
80 if [ "x$password" = "x" ] ; then
81 password="-N"
138 $password \
H A Dsmbprint-new.sh16 # exported called "printer" with no password.
20 # so that the server, service, and password can be read from
47 # password="password"
52 # password=""
72 # password
80 if [ "x$password" = "x" ] ; then
81 password="-N"
138 $password \
/asus-wl-520gu-7.0.1.45/src/router/shared/bcmcrypto/
H A Dpasshash.h3 * Perform password->key hash algorithm as defined in WPA and 802.11i
22 password is an ascii string of 8 to 63 characters in length
27 int passhash(char *password, int passlen, unsigned char *ssid, int ssidlen, unsigned char *output);
/asus-wl-520gu-7.0.1.45/src/router/shared.asus/bcmcrypto/
H A Dpasshash.h3 * Perform password->key hash algorithm as defined in WPA and 802.11i
22 password is an ascii string of 8 to 63 characters in length
27 int passhash(char *password, int passlen, unsigned char *ssid, int ssidlen, unsigned char *output);
/asus-wl-520gu-7.0.1.45/src/router/samba/packaging/SGI/
H A Dsmbprint40 # exported called "hplj2" with no password.
44 password=""
52 ) | /usr/samba/bin/smbclient "//$server/$service" $password -N > /dev/null
/asus-wl-520gu-7.0.1.45/src/router/LPRng/UTILS/
H A Dncpprint18 # The username and password information are in an 'authfile'
33 # password=
48 # get username and password values
55 if [ "$password" != "" ]; then
56 usercmd="-U $username -P $password"
67 #echo $server $password $translate $x_command > /tmp/ncpprint.log
H A Dsmbprint16 # - user name and password in /var/spool/lpd/smb/auth file
18 # Variation 2: LPRng + smbclient -U username password
22 # - user name and password in /var/spool/lpd/smb/auth file
29 # - user name and password in /var/spool/lpd/smb/auth file
43 # password value. You can put these in the general.cfg file
47 # password=xxxx
48 # There are NO quotes allowed around the name and/or password
49 # files so the password value xxxx must not contain shell
71 # check for smbclientold=yes and fix up authfile/password stuff
83 #echo $share $password
[all...]
/asus-wl-520gu-7.0.1.45/src/router/infosvr/
H A Dpacket.h84 int PackGetInfoCurrentAP(char *pdubuf, char *mac, char *password);
86 int PackSetInfoCurrentAP(char *pdubuf, char *mac, char *password, PKT_GET_INFO_AP *curAP);
90 int PackGetInfoCurrentSTA(char *pdubuf, char *mac, char *password);
92 int PackGetInfoSites(char *pdubuf, char *mac, char *password);
94 int PackSetInfoCurrentSTA(char *pdubuf, char *mac, char *password, PKT_GET_INFO_STA *curSTA);
96 int PackGetInfoProfiles(char *pdubuf, char *mac, char *password, int start, int count);
98 int PackSetInfoProfiles(char *pdubuf, char *mac, char *password, PKT_GET_INFO_PROFILE *profile);
105 // check password
106 int PackCheckPassword(char *pdubuf, char *mac, char *password);
H A Dpacket.c101 DWORD PackCmdHdr(char *pdubuf, WORD cmd, char *mac, char *password) argument
111 memcpy(hdr->Password, password, 32);
193 int PackGetInfoCurrentAP(char *pdubuf, char *mac, char *password) argument
198 tid = PackCmdHdr(pdubuf, NET_CMD_ID_GETINFO_EX, mac, password);
226 int PackSetInfoCurrentAP(char *pdubuf, char *mac, char *password, PKT_GET_INFO_AP *curAP) argument
231 tid = PackCmdHdr(pdubuf, NET_CMD_ID_SETINFO, mac, password);
249 int PackGetInfoCurrentSTA(char *pdubuf, char *mac, char *password) argument
254 tid = PackCmdHdr(pdubuf, NET_CMD_ID_GETINFO_EX, mac, password);
281 int PackSetInfoCurrentSTA(char *pdubuf, char *mac, char *password, PKT_GET_INFO_STA *curSTA) argument
286 tid = PackCmdHdr(pdubuf, NET_CMD_ID_SETINFO, mac, password);
303 PackGetInfoSites(char *pdubuf, char *mac, char *password) argument
327 PackGetInfoProfiles(char *pdubuf, char *mac, char *password, int start, int count) argument
351 PackSetInfoProfiles(char *pdubuf, char *mac, char *password, PKT_GET_INFO_PROFILE *profile) argument
370 PackCheckPassword(char *pdubuf, char *mac, char *password) argument
392 PackSysCmd(char *pdubuf, char *mac, char *password, PKT_SYSCMD *cmd) argument
416 PackSetPubKey(char *pdubuf, char *mac, char *password, PKT_SET_INFO_GW_QUICK_KEY *key) argument
479 PackEZProbe(char *pdubuf, char *mac, char *password, char *key, int klen) argument
515 PackSetInfoGWQuick(char *pdubuf, char *mac, char *password, PKT_SET_INFO_GW_QUICK *setting, char *key, int klen) argument
[all...]
/asus-wl-520gu-7.0.1.45/src/router/samba/source/utils/
H A Dsmbauth.c51 const char * password; local
69 printf("Usage: %s <user> <password>\n", argv[0]);
70 printf("\tUse a colon (':') to indicate a null password.\n");
74 password = argv[2];
75 if (strcmp(password, ":") == 0)
76 password = NULL;
120 len = strlen(format) + max_name_len + strlen(user_name) + strlen(password) + 32;
137 smb_snprintf(cmd, len, format, inet_ntoa(pdc_addr), user_name, password);
154 procedure if the user is already in our local password file.
171 For unknown reasons, the password mus
[all...]
H A Dtdb_check_password.c2 check password in TDB file
59 authenticate(const char * username, const char * password) argument
72 Use Samba routines to LANMAN password hash from TDB file.
92 fprintf(stderr, "ERROR: Cannot get password database entry for %s.\n", username);
101 fprintf(stderr, "ERROR: Cannot get lanman password for %s.\n", username);
108 Convert lanman password hash to string.
158 pstrcat(cmd, password);
179 char * password; local
183 printf("Usage: %s <user name> <password>\n", argv[0]);
188 password
[all...]
/asus-wl-520gu-7.0.1.45/src/router/samba/source/auth/
H A Dpass_check.c21 /* this module is for checking a username/password against a system
22 password database. The SMB encrypted password support is elsewhere */
44 static BOOL afs_auth(char *user, char *password) argument
55 password, 0, /* lifetime, default */
93 static BOOL dfs_auth(char *user, char *password) argument
111 * We only go for a DCE login context if the given password
112 * matches that stored in the local password file..
116 if (strcmp((char *)crypt(password, this_salt), this_crypted))
273 passwd_rec.key.tagged_union.plain = (idl_char *) password;
379 linux_bigcrypt(char *password, char *salt1, char *crypted) argument
404 osf1_bigcrypt(char *password, char *salt1) argument
487 password_check(const char *password) argument
594 pass_check(const struct passwd *pass, const char *user, const char *password, int pwlen, BOOL (*fn) (const char *, const char *), BOOL run_cracker) argument
[all...]
/asus-wl-520gu-7.0.1.45/src/router/samba/source/libads/
H A Dutil.c3 krb5 set password implementation
28 char *password; local
34 if ((password = secrets_fetch_machine_password(lp_workgroup(), NULL, &sec_channel_type)) == NULL) {
35 DEBUG(1,("Failed to retrieve password for principal %s\n", host_principal));
44 ret = kerberos_set_password(ads->auth.kdc_server, service_principal, password, service_principal, new_password, ads->auth.time_offset);
49 DEBUG(1,("Failed to save machine password\n"));
/asus-wl-520gu-7.0.1.45/src/router/samba/packaging/Mandrake/
H A Dsmbprint16 # exported called "printer" with no password.
20 # so that the server, service, and password can be read from
37 # password="password"
42 # password=""
63 # password
77 ) | /usr/bin/smbclient "//$server/$service" $password -U $server -N >> $logfile
/asus-wl-520gu-7.0.1.45/src/router/samba/packaging/RedHat/
H A Dsmbprint16 # exported called "printer" with no password.
20 # so that the server, service, and password can be read from
37 # password="password"
42 # password=""
63 # password
77 ) | /usr/bin/smbclient "\\\\$server\\$service" $password -U $server -N >> $logfile
/asus-wl-520gu-7.0.1.45/src/router/samba/examples/pdb/mysql/
H A Dsmb.conf10 mysql:mysql password = ambas
/asus-wl-520gu-7.0.1.45/src/router/samba/packaging/Fedora/
H A Dsmbprint15 # exported called "printer" with no password.
19 # so that the server, service, and password can be read from
36 # password="password"
42 # password=""
57 # password
80 #echo $share $password $translate $x_command > /tmp/smbprint.log
82 cat | /usr/bin/smbclient "$share" "$password" -E ${hostip:+-I} \
/asus-wl-520gu-7.0.1.45/src/router/samba/source/client/
H A Dsmbspool.c55 *password; /* Password */ local
90 fputs(" smb://[username:password@][workgroup/]server/printer\n", stderr);
144 * Extract password as needed...
147 if ((password = strchr_m(username, ':')) != NULL)
148 *password++ = '\0';
150 password = "";
155 password = "";
171 * Convert to smb://[username:password@]workgroup/server/printer...
204 if ((cli = smb_connect(workgroup, server, printer, username, password)) == NULL)
272 const char *password) /*
268 smb_connect(const char *workgroup, const char *server, const char *share, const char *username, const char *password) argument
[all...]
/asus-wl-520gu-7.0.1.45/src/router/samba/source/script/
H A Dsmbtar25 # you're doing, but beware: better not store a plain text password!
28 password=""
53 -p <password> Specify PC Password $password
124 password="$OPTARG"
156 # echo "password is $password" # passwords should never be sent to screen
163 eval $SMBCLIENT "'\\\\$server\\$service'" "'$password'" -U "'$username'" \
/asus-wl-520gu-7.0.1.45/src/router/samba/testsuite/libsmbclient/src/lseek/
H A Dlseek_2.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/asus-wl-520gu-7.0.1.45/src/router/ez-ipupdate/
H A Dasus_ddns.h16 extern char password[128];
/asus-wl-520gu-7.0.1.45/src/router/samba/examples/LDAP/smbldap-tools/
H A Dsmbldap-passwd.pl3 # LDAP to unix password sync script for samba
72 print "Changing password for $user\n";
76 # prompt for current password
78 print "(current) UNIX password: ";
89 # prompt for new password
95 print "New password : ";
101 print "Retype new password : ";
166 # change unix password
174 $modify->code && warn "Unable to change password : ", $modify->error ;
186 smbldap-passwd.pl - change user password
[all...]
/asus-wl-520gu-7.0.1.45/src/router/samba/source/torture/
H A Drpctorture.c42 static pstring password; /* local copy only, if one is entered */ variable
115 if (password[0] != 0)
152 slprintf(cmd, sizeof(cmd)-1, "%s %s", cli->user_name, password);
193 fprintf(out_hnd, "Usage: %s service <password> [-d debuglevel] [-l log] ",
297 password[0] = 0;
334 pstrcpy(password,argv[1]);
384 pstrcpy(password,lp+1);
386 memset(strchr_m(optarg,'%')+1,'X',strlen(password));
512 /* set the password cache info */
515 if (password[
[all...]

Completed in 213 milliseconds

1234567891011>>