/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/aMule/ |
H A D | remote.conf | 5 Password=5f4dcc3b5aa765d61d8327deb882cf99
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/arm-uclibc/target/etc/aMule/ |
H A D | remote.conf | 5 Password=5f4dcc3b5aa765d61d8327deb882cf99
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/perl/BerkeleyDB/t/ |
H A D | encrypt.t | 20 -Encrypt => {Password => "abc", 50 ok 2, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; 55 -Encrypt => {Password => "fred"}, 58 ok 3, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; 66 ok 4, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; 87 -Encrypt => {Password => "abc", 136 -Encrypt => {Password => "def", 157 ok 17, $@ =~ /^Must specify Password and Flags with Encrypt parameter at/; 162 -Encrypt => {Password => "fred"}, 165 ok 18, $@ =~ /^Must specify Password an [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/demos/dbbrowse/ |
H A D | browsedb.h | 48 wxString ODBCSource, UserName, Password; member in class:BrowserDB
|
H A D | browsedb.cpp | 80 Password = wxEmptyString; // password database username 124 p_Dlg->s_Password = Password; 134 Password = p_Dlg->s_Password; 143 DbConnectInf.SetPassword(Password); // password database username 145 // wxLogMessage(">>>%s<<<>>>%s<<<",UserName.c_str(),Password.c_str());
|
H A D | doc.cpp | 203 (db_Br+i)->Password = (p_DSN+i)->Pas;
|
H A D | pgmctrl.cpp | 120 popupMenu1->Append(PGMCTRL_ODBC_USER, _("Set Username and Password")); 281 (pDoc->db_Br+i)->Password = (pDoc->p_DSN+i)->Pas;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/import/ |
H A D | wsse.h | 114 struct _wsse__Password* Password; member in struct:_wsse__UsernameToken 185 /// Element "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd":Password of complexType "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd":PasswordString.
|
H A D | wsse2.h | 115 struct _wsse2__Password* Password; member in struct:_wsse2__UsernameToken 186 /// Element "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd":Password of complexType "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd":PasswordString.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/import/ |
H A D | wsse.h | 114 struct _wsse__Password* Password; member in struct:_wsse__UsernameToken 185 /// Element "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd":Password of complexType "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd":PasswordString.
|
H A D | wsse2.h | 115 struct _wsse2__Password* Password; member in struct:_wsse2__UsernameToken 186 /// Element "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd":Password of complexType "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd":PasswordString.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/qt/ |
H A D | session-dialog.cc | 105 le->setEchoMode( QLineEdit::Password );
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | wsse2api.c | 232 Password digest authentication prevents message replay attacks. The wsse plugin 963 /* allocate and populate the Password */ 965 { security->UsernameToken->Password = (_wsse2__Password*)soap_malloc(soap, sizeof(_wsse2__Password)); 966 soap_default__wsse2__Password(soap, security->UsernameToken->Password); 967 security->UsernameToken->Password->Type = (char*)wsse_PasswordTextURI; 968 security->UsernameToken->Password->__item = soap_strdup(soap, password); 1007 security->UsernameToken->Password->Type = (char*)wsse_PasswordDigestURI; 1071 /* if we have a UsernameToken with a Password, check it */ 1072 if (token && token->Password) 1074 if (token->Password [all...] |
H A D | wsseapi.c | 231 Password digest authentication prevents message replay attacks. The wsse plugin 1028 /* allocate and populate the Password */ 1030 { security->UsernameToken->Password = (_wsse__Password*)soap_malloc(soap, sizeof(_wsse__Password)); 1031 soap_default__wsse__Password(soap, security->UsernameToken->Password); 1032 security->UsernameToken->Password->Type = (char*)wsse_PasswordTextURI; 1033 security->UsernameToken->Password->__item = soap_strdup(soap, password); 1072 security->UsernameToken->Password->Type = (char*)wsse_PasswordDigestURI; 1136 /* if we have a UsernameToken with a Password, check it */ 1137 if (token && token->Password) 1139 if (token->Password [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | wsse2api.c | 232 Password digest authentication prevents message replay attacks. The wsse plugin 963 /* allocate and populate the Password */ 965 { security->UsernameToken->Password = (_wsse2__Password*)soap_malloc(soap, sizeof(_wsse2__Password)); 966 soap_default__wsse2__Password(soap, security->UsernameToken->Password); 967 security->UsernameToken->Password->Type = (char*)wsse_PasswordTextURI; 968 security->UsernameToken->Password->__item = soap_strdup(soap, password); 1007 security->UsernameToken->Password->Type = (char*)wsse_PasswordDigestURI; 1071 /* if we have a UsernameToken with a Password, check it */ 1072 if (token && token->Password) 1074 if (token->Password [all...] |
H A D | wsseapi.c | 231 Password digest authentication prevents message replay attacks. The wsse plugin 1028 /* allocate and populate the Password */ 1030 { security->UsernameToken->Password = (_wsse__Password*)soap_malloc(soap, sizeof(_wsse__Password)); 1031 soap_default__wsse__Password(soap, security->UsernameToken->Password); 1032 security->UsernameToken->Password->Type = (char*)wsse_PasswordTextURI; 1033 security->UsernameToken->Password->__item = soap_strdup(soap, password); 1072 security->UsernameToken->Password->Type = (char*)wsse_PasswordDigestURI; 1136 /* if we have a UsernameToken with a Password, check it */ 1137 if (token && token->Password) 1139 if (token->Password [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/LDAP/smbldap-tools-0.9.2/ |
H A D | smbldap-passwd | 346 Password Changes 358 Password will prompt again and compare the second entry against the first. Both entries are require to match in order for the password to be changed.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zip30/windll/VBz64/ |
H A D | VBZipBas.bas | 192 ZDLLPASSWORD As Long ' Callback ZIP32z64.DLL Password Function 343 '-- Callback For ZIP32z64.DLL - DLL Password Function 358 '-- User Entered A Password So Proccess It 369 '-- If There Is A Password Have The User Enter It! 376 szpassword = InputBox("Please Enter The Password!", prompt) 379 '-- The User Did Not Enter A Password So Exit The Function 445 Optional ByVal Encrypt As Boolean = False, Optional ByVal Password As String = "", _ 550 EncryptionPassword = Password
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/isdn/hardware/eicon/ |
H A D | kst_ifc.h | 82 char Password[DIVA_TRACE_FAX_PRMS_LEN]; member in struct:_diva_trace_fax_state
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | curl_ntlm_msgs.c | 356 Curl_safefree(ntlm->identity.Password); 492 ntlm->identity.Password = dup_passwd.tbyte_ptr;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/perl/BerkeleyDB/ |
H A D | BerkeleyDB.pm | 626 Password => undef, 630 croak("Must specify Password and Flags with Encrypt parameter") 631 if ! (defined $p->{Password} && defined $p->{Flags}); 633 $got->{"Enc_Passwd"} = $p->{Password}; 773 # [ -Encrypt => { Password => string, Flags => value}
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/Micromax/Linux/driver/ndis/src/ |
H A D | qmi_header.h | 502 char Password[WWAN_STRING_LEN];
member in struct:__anon28
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/samples/db/ |
H A D | dbtest.h | 145 wxChar Password[SQL_MAX_AUTHSTR_LEN+1]; member in struct:Cparameters
|
H A D | dbtest.cpp | 671 params.Password[0] = 0; 691 params.Password, params.DirPath); 710 DbConnectInf->SetPassword(params.Password); 767 wxFgets(buffer, sizeof(params.Password), paramFile); 769 wxStrcpy(params.Password,buffer); 796 wxFputs(wxGetApp().params.Password, paramFile); 2167 pParamPasswordMsg = new wxStaticText(this, PARAMETER_DIALOG_PASSWORD_MSG, wxT("Password:"), wxPoint(156, 193), wxDefaultSize, 0, wxT("ParamPasswordMsg")); 2269 pParamPasswordTxt->SetValue(wxGetApp().params.Password); 2304 if (tStr.Length() > ((int)(sizeof(wxGetApp().params.Password) / sizeof(wxChar))-1)) 2307 errmsg.Printf(wxT("Password i [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/windll/csharp/ |
H A D | Unzip.cs | 201 public UZDLLPasswordCallback UZDLLPASSWORD; //Password function callback 230 public string Password property in class:CSharpInfoZip_UnZipSample.Unzip 405 //Callback For UNZIP32.DLL - Password Function 521 + bufsize.ToString() + "!", "Password Error",
|