Searched refs:password (Results 1 - 25 of 458) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bpalogin/
H A Dbpalogin.conf8 # Your BPA password
9 password 12345
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/unit/
H A Dunit1304.c27 static char *password; variable
32 password = strdup("");
34 if (!password || !login) {
35 Curl_safefree(password);
44 Curl_safefree(password);
57 result = Curl_parsenetrc("test.example.com", &login, &password, filename);
59 abort_unless(password != NULL, "returned NULL!");
60 fail_unless(password[0] == 0, "password should not have been changed");
70 result = Curl_parsenetrc("example.com", &login, &password, filenam
137 free(password); variable
152 free(password); variable
170 free(password); variable
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/printing/
H A Dsmbprint.sysv34 # exported called "printer" with no password.
42 password=""
50 ) | /opt/samba/smbclient "\\\\$server\\$service" $password -N > /dev/null
H A Dsmbprint16 # exported called "printer" with no password.
20 # so that the server, service, and password can be read from
47 # password="password"
52 # password=""
72 # password
80 if [ "x$password" = "x" ] ; then
81 password="-N"
170 $password \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/packaging/SGI/
H A Dsmbprint40 # exported called "hplj2" with no password.
44 password=""
52 ) | /usr/samba/bin/smbclient "//$server/$service" $password -N > /dev/null
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/
H A Dutil.c3 krb5 set password implementation
27 char *password; local
32 if ((password = secrets_fetch_machine_password(lp_workgroup(), NULL, &sec_channel_type)) == NULL) {
33 DEBUG(1,("Failed to retrieve password for principal %s\n", host_principal));
39 ret = kerberos_set_password(ads->auth.kdc_server, host_principal, password, host_principal, new_password, ads->auth.time_offset);
46 DEBUG(1,("Failed to save machine password\n"));
52 SAFE_FREE(password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dpwd_cache.c24 Initialises a password structure.
29 memset((char *)pwd->password , '\0', sizeof(pwd->password ));
35 Stores a cleartext password.
42 fstrcpy(pwd->password, clr);
52 Gets a cleartext password.
58 fstrcpy(clr, pwd->password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-scripts/
H A Dauth-pam.pl6 # a username/password, using the --auth-user-pass directive.
14 # given username/password authenticates using PAM.
15 # Caller should write username/password as two lines in a file
22 # access username/password file.
34 # $password to PAM when it asks for it.
43 $ans = $password if $msg =~ /[Pp]assword/;
54 # Get username/password from file
58 print "Could not open username/password file: $ARG\n";
62 print "No username/password file specified on command line\n";
67 $password
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bftpd-1.6.6/
H A Dlogin.h20 int bftpd_login(char *password);
22 int checkpass(char *password);
23 int checkpass_pwd(char *password);
24 int checkpass_pam(char *password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-plugins/simple/
H A Dsimple.c27 * will examine the username/password provided by a client,
45 const char *password; member in struct:plugin_context
84 * Set the username/password we will require.
87 context->password = "bar";
103 /* get username/password from envp string array */
105 const char *password = get_env ("password", envp); local
107 /* check entered username/password against what we require */
109 && password && !strcmp (password, contex
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/
H A Dpass_check.c21 /* this module is for checking a username/password against a system
22 password database. The SMB encrypted password support is elsewhere */
44 static BOOL afs_auth(char *user, char *password) argument
55 password, 0, /* lifetime, default */
93 static BOOL dfs_auth(char *user, char *password) argument
112 * We only go for a DCE login context if the given password
113 * matches that stored in the local password file..
117 if (strcmp((char *)crypt(password, this_salt), this_crypted))
274 passwd_rec.key.tagged_union.plain = (idl_char *) password;
385 linux_bigcrypt(char *password, char *salt1, char *crypted) argument
410 osf1_bigcrypt(char *password, char *salt1) argument
493 password_check(const char *password) argument
600 pass_check(const struct passwd *pass, const char *user, const char *password, int pwlen, BOOL (*fn) (const char *, const char *), BOOL run_cracker) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-plugins/log/
H A Dlog.c43 const char *password; member in struct:plugin_context
82 * Set the username/password we will require.
85 context->password = "bar";
162 /* check entered username/password against what we require */
165 /* get username/password from envp string array */
167 const char *password = get_env ("password", envp); local
170 && password && !strcmp (password, context->password))
[all...]
H A Dlog_v3.c48 const char *password; member in struct:plugin_context
105 /* Set the username/password we will require. */
107 context->password = "bar";
225 /* check entered username/password against what we require */
228 /* get username/password from envp string array */
230 const char *password = get_env ("password", args->envp); local
233 && password && !strcmp (password, context->password))
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/confuse-2.7/examples/
H A Dftp.conf10 password = ${ANONPASS:-secret}
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/lsa/
H A Dlsapol.c1 /* simple test code, opens and closes an LSA policy handle using libmsrpc, careful.. there's no password input masking*/
9 pstring password; local
18 fprintf(stdout, "Enter password (no input masking): ");
19 fscanf(stdin, "%s", password);
26 hnd->password = SMB_STRDUP(password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/auth/crackcheck/
H A Dcrackcheck.c20 fprintf(stderr, "The password is read via stdin.\n\n");
27 * check password for complexity like MS Windows NT
88 char *password; local
114 password = fgets(f, sizeof(f), stdin);
116 if (password == NULL) {
117 fprintf(stderr, "ERR - Failed to read password\n\n");
122 ret = complexity(password);
132 reply = FascistCheck(password, dictionary);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/lseek/
H A Dlseek_2.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Dcurl_ntlm_core.h57 const char *password,
66 const char *password,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/packaging/RHEL/setup/
H A Dsmbprint15 # exported called "printer" with no password.
19 # so that the server, service, and password can be read from
36 # password="password"
42 # password=""
57 # password
80 #echo $share $password $translate $x_command > /tmp/smbprint.log
82 cat | /usr/bin/smbclient "$share" "$password" -E ${hostip:+-I} \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/script/
H A Dsmbtar25 # you're doing, but beware: better not store a plain text password!
28 password=""
53 -p <password> Specify PC Password $password
124 password="$OPTARG"
156 # echo "password is $password" # passwords should never be sent to screen
163 eval $SMBCLIENT "'\\\\$server\\$service'" "'$password'" -U "'$username'" \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/script/tests/
H A Dtest_smbtorture_s3.sh14 password="$3"
44 testit "$name" $VALGRIND $BINDIR/smbtorture $ADDARGS $unc -U"$username"%"$password" $t || failed=`expr $failed + 1`
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/
H A Dsmbspool.c67 *password; /* Password */ local
107 fputs(" smb://[username:password@][workgroup/]server[:port]/printer\n", stderr);
165 * Extract password as needed...
170 password = uri_unescape_alloc(tmp2);
172 password = null_str;
179 password = null_str;
197 * Convert to smb://[username:password@]workgroup/server/printer...
245 if ((cli = smb_connect(workgroup, server, port, printer, username, password, argv[2])) == NULL)
377 const char *password,
393 /* We pretty much guarentee password mus
373 smb_complete_connection(const char *myname, const char *server, int port, const char *username, const char *password, const char *workgroup, const char *share, int flags) argument
475 smb_connect(const char *workgroup, const char *server, const int port, const char *share, const char *username, const char *password, const char *jobusername) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dpwdbased.h12 //! abstract base class for password based key derivation function
18 //! derive key from password
21 virtual unsigned int DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds=0) const =0;
32 unsigned int DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds=0) const;
42 unsigned int DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds=0) const;
56 unsigned int PKCS5_PBKDF1<T>::DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const argument
65 hash.Update(password, passwordLen);
85 unsigned int PKCS5_PBKDF2_HMAC<T>::DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const argument
93 HMAC<T> hmac(password, passwordLen);
145 unsigned int DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_
149 DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/
H A Drpctorture.c42 static pstring password; /* local copy only, if one is entered */ variable
115 if (password[0] != 0)
152 slprintf(cmd, sizeof(cmd)-1, "%s %s", cli->user_name, password);
193 fprintf(out_hnd, "Usage: %s service <password> [-d debuglevel] [-l log] ",
301 password[0] = 0;
338 pstrcpy(password,argv[1]);
388 pstrcpy(password,lp+1);
390 memset(strchr_m(optarg,'%')+1,'X',strlen(password));
516 /* set the password cache info */
519 if (password[
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/
H A Dpy_common.c122 only have the keys "username", "domain" and "password". Return
124 password are set to pointers to their values from the dicationary.
129 char **password, char **errstr)
135 *password = "";
146 password_obj = PyDict_GetItemString(creds, "password");
159 *errstr = SMB_STRDUP("no password field in credential");
176 *errstr = SMB_STRDUP("password field is not string type");
187 strcmp(PyString_AsString(key), "password") != 0) {
199 *password = PyString_AsString(password_obj);
215 char *username, *password, *domai local
128 py_parse_creds(PyObject *creds, char **username, char **domain, char **password, char **errstr) argument
[all...]

Completed in 499 milliseconds

1234567891011>>