/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bpalogin/ |
H A D | bpalogin.conf | 8 # Your BPA password 9 password 12345
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/unit/ |
H A D | unit1304.c | 27 static char *password; variable 32 password = strdup(""); 34 if (!password || !login) { 35 Curl_safefree(password); 44 Curl_safefree(password); 57 result = Curl_parsenetrc("test.example.com", &login, &password, filename); 59 abort_unless(password != NULL, "returned NULL!"); 60 fail_unless(password[0] == 0, "password should not have been changed"); 70 result = Curl_parsenetrc("example.com", &login, &password, filenam 137 free(password); variable 152 free(password); variable 170 free(password); variable [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/printing/ |
H A D | smbprint.sysv | 34 # exported called "printer" with no password. 42 password="" 50 ) | /opt/samba/smbclient "\\\\$server\\$service" $password -N > /dev/null
|
H A D | smbprint | 16 # exported called "printer" with no password. 20 # so that the server, service, and password can be read from 47 # password="password" 52 # password="" 72 # password 80 if [ "x$password" = "x" ] ; then 81 password="-N" 170 $password \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/packaging/SGI/ |
H A D | smbprint | 40 # exported called "hplj2" with no password. 44 password="" 52 ) | /usr/samba/bin/smbclient "//$server/$service" $password -N > /dev/null
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | util.c | 3 krb5 set password implementation 27 char *password; local 32 if ((password = secrets_fetch_machine_password(lp_workgroup(), NULL, &sec_channel_type)) == NULL) { 33 DEBUG(1,("Failed to retrieve password for principal %s\n", host_principal)); 39 ret = kerberos_set_password(ads->auth.kdc_server, host_principal, password, host_principal, new_password, ads->auth.time_offset); 46 DEBUG(1,("Failed to save machine password\n")); 52 SAFE_FREE(password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | pwd_cache.c | 24 Initialises a password structure. 29 memset((char *)pwd->password , '\0', sizeof(pwd->password )); 35 Stores a cleartext password. 42 fstrcpy(pwd->password, clr); 52 Gets a cleartext password. 58 fstrcpy(clr, pwd->password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-scripts/ |
H A D | auth-pam.pl | 6 # a username/password, using the --auth-user-pass directive. 14 # given username/password authenticates using PAM. 15 # Caller should write username/password as two lines in a file 22 # access username/password file. 34 # $password to PAM when it asks for it. 43 $ans = $password if $msg =~ /[Pp]assword/; 54 # Get username/password from file 58 print "Could not open username/password file: $ARG\n"; 62 print "No username/password file specified on command line\n"; 67 $password [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bftpd-1.6.6/ |
H A D | login.h | 20 int bftpd_login(char *password); 22 int checkpass(char *password); 23 int checkpass_pwd(char *password); 24 int checkpass_pam(char *password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-plugins/simple/ |
H A D | simple.c | 27 * will examine the username/password provided by a client, 45 const char *password; member in struct:plugin_context 84 * Set the username/password we will require. 87 context->password = "bar"; 103 /* get username/password from envp string array */ 105 const char *password = get_env ("password", envp); local 107 /* check entered username/password against what we require */ 109 && password && !strcmp (password, contex [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | pass_check.c | 21 /* this module is for checking a username/password against a system 22 password database. The SMB encrypted password support is elsewhere */ 44 static BOOL afs_auth(char *user, char *password) argument 55 password, 0, /* lifetime, default */ 93 static BOOL dfs_auth(char *user, char *password) argument 112 * We only go for a DCE login context if the given password 113 * matches that stored in the local password file.. 117 if (strcmp((char *)crypt(password, this_salt), this_crypted)) 274 passwd_rec.key.tagged_union.plain = (idl_char *) password; 385 linux_bigcrypt(char *password, char *salt1, char *crypted) argument 410 osf1_bigcrypt(char *password, char *salt1) argument 493 password_check(const char *password) argument 600 pass_check(const struct passwd *pass, const char *user, const char *password, int pwlen, BOOL (*fn) (const char *, const char *), BOOL run_cracker) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-plugins/log/ |
H A D | log.c | 43 const char *password; member in struct:plugin_context 82 * Set the username/password we will require. 85 context->password = "bar"; 162 /* check entered username/password against what we require */ 165 /* get username/password from envp string array */ 167 const char *password = get_env ("password", envp); local 170 && password && !strcmp (password, context->password)) [all...] |
H A D | log_v3.c | 48 const char *password; member in struct:plugin_context 105 /* Set the username/password we will require. */ 107 context->password = "bar"; 225 /* check entered username/password against what we require */ 228 /* get username/password from envp string array */ 230 const char *password = get_env ("password", args->envp); local 233 && password && !strcmp (password, context->password)) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/confuse-2.7/examples/ |
H A D | ftp.conf | 10 password = ${ANONPASS:-secret}
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/lsa/ |
H A D | lsapol.c | 1 /* simple test code, opens and closes an LSA policy handle using libmsrpc, careful.. there's no password input masking*/ 9 pstring password; local 18 fprintf(stdout, "Enter password (no input masking): "); 19 fscanf(stdin, "%s", password); 26 hnd->password = SMB_STRDUP(password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/auth/crackcheck/ |
H A D | crackcheck.c | 20 fprintf(stderr, "The password is read via stdin.\n\n"); 27 * check password for complexity like MS Windows NT 88 char *password; local 114 password = fgets(f, sizeof(f), stdin); 116 if (password == NULL) { 117 fprintf(stderr, "ERR - Failed to read password\n\n"); 122 ret = complexity(password); 132 reply = FascistCheck(password, dictionary);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/lseek/ |
H A D | lseek_2.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | curl_ntlm_core.h | 57 const char *password, 66 const char *password,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/packaging/RHEL/setup/ |
H A D | smbprint | 15 # exported called "printer" with no password. 19 # so that the server, service, and password can be read from 36 # password="password" 42 # password="" 57 # password 80 #echo $share $password $translate $x_command > /tmp/smbprint.log 82 cat | /usr/bin/smbclient "$share" "$password" -E ${hostip:+-I} \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/script/ |
H A D | smbtar | 25 # you're doing, but beware: better not store a plain text password! 28 password="" 53 -p <password> Specify PC Password $password 124 password="$OPTARG" 156 # echo "password is $password" # passwords should never be sent to screen 163 eval $SMBCLIENT "'\\\\$server\\$service'" "'$password'" -U "'$username'" \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/script/tests/ |
H A D | test_smbtorture_s3.sh | 14 password="$3" 44 testit "$name" $VALGRIND $BINDIR/smbtorture $ADDARGS $unc -U"$username"%"$password" $t || failed=`expr $failed + 1`
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/ |
H A D | smbspool.c | 67 *password; /* Password */ local 107 fputs(" smb://[username:password@][workgroup/]server[:port]/printer\n", stderr); 165 * Extract password as needed... 170 password = uri_unescape_alloc(tmp2); 172 password = null_str; 179 password = null_str; 197 * Convert to smb://[username:password@]workgroup/server/printer... 245 if ((cli = smb_connect(workgroup, server, port, printer, username, password, argv[2])) == NULL) 377 const char *password, 393 /* We pretty much guarentee password mus 373 smb_complete_connection(const char *myname, const char *server, int port, const char *username, const char *password, const char *workgroup, const char *share, int flags) argument 475 smb_connect(const char *workgroup, const char *server, const int port, const char *share, const char *username, const char *password, const char *jobusername) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | pwdbased.h | 12 //! abstract base class for password based key derivation function 18 //! derive key from password 21 virtual unsigned int DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds=0) const =0; 32 unsigned int DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds=0) const; 42 unsigned int DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds=0) const; 56 unsigned int PKCS5_PBKDF1<T>::DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const argument 65 hash.Update(password, passwordLen); 85 unsigned int PKCS5_PBKDF2_HMAC<T>::DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const argument 93 HMAC<T> hmac(password, passwordLen); 145 unsigned int DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_ 149 DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/ |
H A D | rpctorture.c | 42 static pstring password; /* local copy only, if one is entered */ variable 115 if (password[0] != 0) 152 slprintf(cmd, sizeof(cmd)-1, "%s %s", cli->user_name, password); 193 fprintf(out_hnd, "Usage: %s service <password> [-d debuglevel] [-l log] ", 301 password[0] = 0; 338 pstrcpy(password,argv[1]); 388 pstrcpy(password,lp+1); 390 memset(strchr_m(optarg,'%')+1,'X',strlen(password)); 516 /* set the password cache info */ 519 if (password[ [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/ |
H A D | py_common.c | 122 only have the keys "username", "domain" and "password". Return 124 password are set to pointers to their values from the dicationary. 129 char **password, char **errstr) 135 *password = ""; 146 password_obj = PyDict_GetItemString(creds, "password"); 159 *errstr = SMB_STRDUP("no password field in credential"); 176 *errstr = SMB_STRDUP("password field is not string type"); 187 strcmp(PyString_AsString(key), "password") != 0) { 199 *password = PyString_AsString(password_obj); 215 char *username, *password, *domai local 128 py_parse_creds(PyObject *creds, char **username, char **domain, char **password, char **errstr) argument [all...] |