/asus-wl-520gu-7.0.1.45/src/router/LPRng/src/include/ |
H A D | user_auth.h | 19 struct security; 23 struct security *security, struct line_list *info ); 29 struct security *security, struct line_list *info ); 34 struct security *security, struct line_list *info ); 39 struct security *security, struct line_list *info ); 46 struct security *securit 66 struct security { struct [all...] |
H A D | sendauth.h | 18 struct security *security, struct line_list *info ); 19 struct security *Fix_send_auth( char *name, struct line_list *info,
|
H A D | krb5_auth.h | 25 struct security *security, struct line_list *info ); 32 struct security *security, char *tempfile ); 35 struct security *security, struct line_list *info );
|
H A D | lpd_secure.h | 19 struct security *Fix_receive_auth( char *name, struct line_list *info );
|
H A D | ssl_auth.h | 41 struct security *security, struct line_list *info ); 47 struct security *security, char *tempfile );
|
/asus-wl-520gu-7.0.1.45/src/router/LPRng/src/common/ |
H A D | sendreq.c | 80 struct security *security = 0; local 92 security = Fix_send_auth(0,&info, 0, errormsg, sizeof(errormsg) ); 95 DEBUG1("Send_request: security %s", security?security->name:0 ); 96 if( security ){ 97 DEBUG1("Send_request: security name '%s', tag '%s'", 98 security->name, security [all...] |
H A D | sendauth.c | 82 struct security *security, struct line_list *info ) 104 if( safestrcmp(security->config_tag, "kerberos") ){ 206 status = security->client_send( sock, transfer_timeout, tempfile, 207 error, errlen, security, info ); 250 * struct security *Fix_send_auth( char *name, struct line_list *info 257 struct security *Fix_send_auth( char *name, struct line_list *info, 260 struct security *security = 0; local 272 for( security 80 Send_auth_transfer( int *sock, int transfer_timeout, struct job *job, struct job *logjob, char *error, int errlen, char *cmd, struct security *security, struct line_list *info ) argument [all...] |
H A D | lpd_secure.c | 46 * process. See README.security for details. 67 struct security *security = 0; local 166 if( !(security = Fix_receive_auth(authtype, &info)) ){ 173 if( !security->server_receive ){ 217 status = security->server_receive( sock, 222 security, tempfile ); 385 struct security *Fix_receive_auth( char *name, struct line_list *info ) 387 struct security *s;
|
H A D | sendjob.c | 85 struct security *security = 0; local 106 security = Fix_send_auth(0,&info,job, error, sizeof(error) ); 114 if( final_filter && (security || Send_block_format_DYN) ){ 183 if( security && security->client_connect ){ 184 status = security->client_connect( job, &sock, 187 security, &info ); 190 if( security && security [all...] |
H A D | user_auth.c | 60 * The authtype is used to look up the security information. This 111 struct security *security, struct line_list *info ) 138 struct security *security ) 191 struct security *security, struct line_list *info ) 260 struct security *security, char *tempfile ) 506 struct security *securit 108 Test_connect( struct job *job, int *sock, int transfer_timeout, char *errmsg, int errlen, struct security *security, struct line_list *info ) argument 187 Test_send( int *sock, int transfer_timeout, char *tempfile, char *errmsg, int errlen, struct security *security, struct line_list *info ) argument 255 Test_receive( int *sock, char *user, char *jobsize, int from_server, char *authtype, struct line_list *info, char *errmsg, int errlen, struct line_list *header_info, struct security *security, char *tempfile ) argument 504 md5_send( int *sock, int transfer_timeout, char *tempfile, char *errmsg, int errlen, struct security *security, struct line_list *info ) argument 743 md5_receive( int *sock, char *user, char *jobsize, int from_server, char *authtype, struct line_list *info, char *errmsg, int errlen, struct line_list *header_info, struct security *security, char *tempfile ) argument 1418 Pgp_send( int *sock, int transfer_timeout, char *tempfile, char *error, int errlen, struct security *security, struct line_list *info ) argument 1574 Pgp_receive( int *sock, char *user, char *jobsize, int from_server, char *authtype, struct line_list *info, char *errmsg, int errlen, struct line_list *header_info, struct security *security, char *tempfile ) argument [all...] |
/asus-wl-520gu-7.0.1.45/src/router/iproute2/reference/linux/ |
H A D | ipsec.h | 52 (skb->security & RCV_AUTH)) && 54 (skb->security & RCV_CRYPT));
|
/asus-wl-520gu-7.0.1.45/src/linux/linux/include/linux/ |
H A D | ipsec.h | 52 (skb->security & RCV_AUTH)) && 54 (skb->security & RCV_CRYPT));
|
/asus-wl-520gu-7.0.1.45/src/router/samba/examples/pdb/mysql/ |
H A D | smb.conf | 4 security = domain
|
/asus-wl-520gu-7.0.1.45/src/router/samba/source/nsswitch/ |
H A D | pam_winbind.h | 32 #include <security/pam_appl.h> 41 #include <security/pam_modules.h> 45 #include <security/_pam_macros.h> 47 /* Define required macros from (Linux PAM 0.68) security/_pam_macros.h */
|
/asus-wl-520gu-7.0.1.45/src/linux/linux/net/khttpd/ |
H A D | Makefile | 13 obj-y := main.o accept.o datasending.o logging.o misc.o rfc.o rfc_time.o security.o \
|
/asus-wl-520gu-7.0.1.45/src/router/samba/source/pam_smbpass/ |
H A D | general.h | 3 #include <security/pam_appl.h> 6 #include <security/pam_modules.h>
|
H A D | pam_smb_acct.c | 26 #include <security/pam_appl.h> 30 #include <security/pam_modules.h>
|
H A D | pam_smb_auth.c | 27 #include <security/pam_appl.h> 31 #include <security/pam_modules.h>
|
H A D | pam_smb_passwd.c | 32 #include <security/pam_appl.h> 35 #include <security/pam_modules.h>
|
/asus-wl-520gu-7.0.1.45/src/router/samba/examples/appliance/ |
H A D | Makefile | 43 rm -f /lib/libnss_winbind.so.2 /lib/security/pam_winbind.so; \ 45 cp nsswitch/pam_winbind.so /lib/security/)
|
/asus-wl-520gu-7.0.1.45/src/router/samba/source/lib/ |
H A D | pam_errors.c | 24 #include <security/pam_appl.h>
|
/asus-wl-520gu-7.0.1.45/src/router/samba/packaging/Fedora/ |
H A D | samba.spec | 163 mkdir -p $RPM_BUILD_ROOT/%{_lib}/security 164 mv source/bin/pam_smbpass.so $RPM_BUILD_ROOT/%{_lib}/security/pam_smbpass.so 167 mkdir -p $RPM_BUILD_ROOT/%{_lib}/security 168 install -m 755 source/nsswitch/pam_winbind.so $RPM_BUILD_ROOT/%{_lib}/security/pam_winbind.so 259 %attr(755,root,root) /%{_lib}/security/pam_smbpass.so 343 /%{_lib}/security/pam_winbind.so
|
/asus-wl-520gu-7.0.1.45/src/router/samba/examples/tridge/ |
H A D | smb.conf | 4 security = user
|
/asus-wl-520gu-7.0.1.45/src/router/samba/packaging/Debian/debian/ |
H A D | smb.conf | 72 # "security = user" is always a good idea. This will require a Unix account 76 ; security = user 177 # File creation mask is set to 0700 for security reasons. If you want to 181 # Directory creation mask is set to 0700 for security reasons. If you want to
|
H A D | rules | 127 $(DESTDIR)/lib/security $(DESTDIR)/sbin \ 149 $(DESTDIR)/lib/security/ 156 # We'll move it here to $(DESTDIR)/lib/security/ and then 159 install -m 0644 source/bin/pam_smbpass.so $(DESTDIR)/lib/security/ 286 # has security implications because these programs haven't had 287 # a thorough security audit. smbmount _does not_ have to have 288 # the setuid bit set. In fact, it is a security hole.
|