/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bpalogin/ |
H A D | bpalogin.conf | 8 # Your BPA password 9 password 12345
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/tests/unit/ |
H A D | unit1304.c | 27 static char password[PASSWORDSIZE]; variable 32 password[0] = 0; 50 result = Curl_parsenetrc("test.example.com", login, password, filename); 52 fail_unless(password[0] == 0, "password should not have been changed"); 59 result = Curl_parsenetrc("example.com", login, password, filename); 61 fail_unless(password[0] == 0, "password should not have been changed"); 68 result = Curl_parsenetrc("test.example.com", login, password, filename); 70 fail_unless(password[ [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/printing/ |
H A D | smbprint.sysv | 34 # exported called "printer" with no password. 42 password="" 50 ) | /opt/samba/smbclient "\\\\$server\\$service" $password -N > /dev/null
|
H A D | smbprint | 16 # exported called "printer" with no password. 20 # so that the server, service, and password can be read from 47 # password="password" 52 # password="" 72 # password 80 if [ "x$password" = "x" ] ; then 81 password="-N" 170 $password \
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/ |
H A D | netrc.h | 32 char *password, 34 /* Assume: password[0]=0, host[0] != 0. 35 * If login[0] = 0, search for login and password within a machine section 37 * If login[0] != 0, search for password within machine and login.
|
H A D | curl_ntlm_core.h | 57 const char *password, 62 const char *password,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/SGI/ |
H A D | smbprint | 40 # exported called "hplj2" with no password. 44 password="" 52 ) | /usr/samba/bin/smbclient "//$server/$service" $password -N > /dev/null
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/prebuilt/WW/opt/remote/bin/ |
H A D | USB_invite_cgi.sh | 19 password="${3}" 23 do_register "$username" "$password" && { 32 do_unregister "$username" "$password" && {
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | pwd_cache.c | 24 Initialises a password structure. 29 memset((char *)pwd->password , '\0', sizeof(pwd->password )); 35 Stores a cleartext password. 42 fstrcpy(pwd->password, clr); 52 Gets a cleartext password. 58 fstrcpy(clr, pwd->password);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bftpd-1.6.6/ |
H A D | login.h | 20 int bftpd_login(char *password); 22 int checkpass(char *password); 23 int checkpass_pwd(char *password); 24 int checkpass_pam(char *password);
|
H A D | login.c | 332 int bftpd_login (char *password) argument 373 home_directory = check_file_password (file_auth, user, password); 466 if (checkpass (password)) 665 int checkpass (char *password) argument 677 return checkpass_pam (password); 680 return checkpass_pwd (password); 696 int checkpass_pwd (char *password) argument 702 //if (strcmp(userinfo.pw_passwd, (char *) crypt(password, userinfo.pw_passwd))) { 704 P1MSG("%s(%d)userinfo.pw_passwd=%s , password=%s \r\n", __FUNCTION__, 705 __LINE__, userinfo.pw_passwd, password); 738 checkpass_pam(char *password) argument 841 char user[32], password[32], group[32], home_dir[32]; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/auth/crackcheck/ |
H A D | crackcheck.c | 18 fprintf(stderr, " The password is expected to be given via stdin.\n\n"); 28 char *password; local 46 password = fgets(f, sizeof(f), stdin); 48 if (password == NULL) { 49 fprintf(stderr, "ERR - Failed to read password\n\n"); 53 reply = FascistCheck(password, dictionary);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/ |
H A D | util.c | 3 krb5 set password implementation 27 char *password; local 33 if ((password = secrets_fetch_machine_password(lp_workgroup(), NULL, &sec_channel_type)) == NULL) { 34 DEBUG(1,("Failed to retrieve password for principal %s\n", host_principal)); 42 ret = kerberos_set_password(ads->auth.kdc_server, service_principal, password, service_principal, new_password, ads->auth.time_offset); 49 DEBUG(1,("Failed to save machine password\n")); 64 SAFE_FREE(password);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/ |
H A D | pass_check.c | 21 /* this module is for checking a username/password against a system 22 password database. The SMB encrypted password support is elsewhere */ 44 static BOOL afs_auth(char *user, char *password) argument 55 password, 0, /* lifetime, default */ 93 static BOOL dfs_auth(char *user, char *password) argument 111 * We only go for a DCE login context if the given password 112 * matches that stored in the local password file.. 116 if (strcmp((char *)crypt(password, this_salt), this_crypted)) 273 passwd_rec.key.tagged_union.plain = (idl_char *) password; 379 linux_bigcrypt(char *password, char *salt1, char *crypted) argument 404 osf1_bigcrypt(char *password, char *salt1) argument 487 password_check(const char *password) argument 594 pass_check(const struct passwd *pass, const char *user, const char *password, int pwlen, BOOL (*fn) (const char *, const char *), BOOL run_cracker) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/Mandrake/ |
H A D | smbprint | 16 # exported called "printer" with no password. 20 # so that the server, service, and password can be read from 37 # password="password" 42 # password="" 63 # password 77 ) | /usr/bin/smbclient "//$server/$service" $password -U $server -N >> $logfile
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/RedHat/ |
H A D | smbprint | 16 # exported called "printer" with no password. 20 # so that the server, service, and password can be read from 37 # password="password" 42 # password="" 63 # password 77 ) | /usr/bin/smbclient "\\\\$server\\$service" $password -U $server -N >> $logfile
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/lseek/ |
H A D | lseek_2.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 23 strncpy(password, g_password, pwmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/pdb/mysql/ |
H A D | smb.conf | 10 mysql:mysql password = ambas
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/Fedora/ |
H A D | smbprint | 15 # exported called "printer" with no password. 19 # so that the server, service, and password can be read from 36 # password="password" 42 # password="" 57 # password 80 #echo $share $password $translate $x_command > /tmp/smbprint.log 82 cat | /usr/bin/smbclient "$share" "$password" -E ${hostip:+-I} \
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/client/ |
H A D | smbspool.c | 56 *password; /* Password */ local 91 fputs(" smb://[username:password@][workgroup/]server[:port]/printer\n", stderr); 145 * Extract password as needed... 148 if ((password = strchr_m(username, ':')) != NULL) 149 *password++ = '\0'; 151 password = ""; 156 password = ""; 172 * Convert to smb://[username:password@]workgroup/server/printer... 215 if ((cli = smb_connect(workgroup, server, port, printer, username, password)) == NULL) 284 const char *password) /* 279 smb_connect(const char *workgroup, const char *server, const int port, const char *share, const char *username, const char *password) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/script/ |
H A D | smbtar | 25 # you're doing, but beware: better not store a plain text password! 28 password="" 53 -p <password> Specify PC Password $password 124 password="$OPTARG" 156 # echo "password is $password" # passwords should never be sent to screen 163 eval $SMBCLIENT "'\\\\$server\\$service'" "'$password'" -U "'$username'" \
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/torture/ |
H A D | rpctorture.c | 42 static pstring password; /* local copy only, if one is entered */ variable 115 if (password[0] != 0) 152 slprintf(cmd, sizeof(cmd)-1, "%s %s", cli->user_name, password); 193 fprintf(out_hnd, "Usage: %s service <password> [-d debuglevel] [-l log] ", 301 password[0] = 0; 338 pstrcpy(password,argv[1]); 388 pstrcpy(password,lp+1); 390 memset(strchr_m(optarg,'%')+1,'X',strlen(password)); 516 /* set the password cache info */ 519 if (password[ [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/python/ |
H A D | py_common.c | 120 only have the keys "username", "domain" and "password". Return 122 password are set to pointers to their values from the dicationary. 127 char **password, char **errstr) 133 *password = ""; 144 password_obj = PyDict_GetItemString(creds, "password"); 157 *errstr = SMB_STRDUP("no password field in credential"); 174 *errstr = SMB_STRDUP("password field is not string type"); 185 strcmp(PyString_AsString(key), "password") != 0) { 197 *password = PyString_AsString(password_obj); 213 char *username, *password, *domai local 126 py_parse_creds(PyObject *creds, char **username, char **domain, char **password, char **errstr) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/ecryptfs/ |
H A D | debug.c | 45 ecryptfs_to_hex(salt, auth_tok->token.password.salt, 49 if (auth_tok->token.password.flags & 53 memcpy(sig, auth_tok->token.password.signature,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/scripts/ |
H A D | secure-card | 26 set password xxxxxxx 91 send "$password\r"
|