Searched refs:password (Results 1 - 25 of 314) sorted by relevance

1234567891011>>

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bpalogin/
H A Dbpalogin.conf8 # Your BPA password
9 password 12345
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/tests/unit/
H A Dunit1304.c27 static char password[PASSWORDSIZE]; variable
32 password[0] = 0;
50 result = Curl_parsenetrc("test.example.com", login, password, filename);
52 fail_unless(password[0] == 0, "password should not have been changed");
59 result = Curl_parsenetrc("example.com", login, password, filename);
61 fail_unless(password[0] == 0, "password should not have been changed");
68 result = Curl_parsenetrc("test.example.com", login, password, filename);
70 fail_unless(password[
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/printing/
H A Dsmbprint.sysv34 # exported called "printer" with no password.
42 password=""
50 ) | /opt/samba/smbclient "\\\\$server\\$service" $password -N > /dev/null
H A Dsmbprint16 # exported called "printer" with no password.
20 # so that the server, service, and password can be read from
47 # password="password"
52 # password=""
72 # password
80 if [ "x$password" = "x" ] ; then
81 password="-N"
170 $password \
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/
H A Dnetrc.h32 char *password,
34 /* Assume: password[0]=0, host[0] != 0.
35 * If login[0] = 0, search for login and password within a machine section
37 * If login[0] != 0, search for password within machine and login.
H A Dcurl_ntlm_core.h57 const char *password,
62 const char *password,
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/SGI/
H A Dsmbprint40 # exported called "hplj2" with no password.
44 password=""
52 ) | /usr/samba/bin/smbclient "//$server/$service" $password -N > /dev/null
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/prebuilt/WW/opt/remote/bin/
H A DUSB_invite_cgi.sh19 password="${3}"
23 do_register "$username" "$password" && {
32 do_unregister "$username" "$password" && {
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/
H A Dpwd_cache.c24 Initialises a password structure.
29 memset((char *)pwd->password , '\0', sizeof(pwd->password ));
35 Stores a cleartext password.
42 fstrcpy(pwd->password, clr);
52 Gets a cleartext password.
58 fstrcpy(clr, pwd->password);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bftpd-1.6.6/
H A Dlogin.h20 int bftpd_login(char *password);
22 int checkpass(char *password);
23 int checkpass_pwd(char *password);
24 int checkpass_pam(char *password);
H A Dlogin.c332 int bftpd_login (char *password) argument
373 home_directory = check_file_password (file_auth, user, password);
466 if (checkpass (password))
665 int checkpass (char *password) argument
677 return checkpass_pam (password);
680 return checkpass_pwd (password);
696 int checkpass_pwd (char *password) argument
702 //if (strcmp(userinfo.pw_passwd, (char *) crypt(password, userinfo.pw_passwd))) {
704 P1MSG("%s(%d)userinfo.pw_passwd=%s , password=%s \r\n", __FUNCTION__,
705 __LINE__, userinfo.pw_passwd, password);
738 checkpass_pam(char *password) argument
841 char user[32], password[32], group[32], home_dir[32]; local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/auth/crackcheck/
H A Dcrackcheck.c18 fprintf(stderr, " The password is expected to be given via stdin.\n\n");
28 char *password; local
46 password = fgets(f, sizeof(f), stdin);
48 if (password == NULL) {
49 fprintf(stderr, "ERR - Failed to read password\n\n");
53 reply = FascistCheck(password, dictionary);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/
H A Dutil.c3 krb5 set password implementation
27 char *password; local
33 if ((password = secrets_fetch_machine_password(lp_workgroup(), NULL, &sec_channel_type)) == NULL) {
34 DEBUG(1,("Failed to retrieve password for principal %s\n", host_principal));
42 ret = kerberos_set_password(ads->auth.kdc_server, service_principal, password, service_principal, new_password, ads->auth.time_offset);
49 DEBUG(1,("Failed to save machine password\n"));
64 SAFE_FREE(password);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/
H A Dpass_check.c21 /* this module is for checking a username/password against a system
22 password database. The SMB encrypted password support is elsewhere */
44 static BOOL afs_auth(char *user, char *password) argument
55 password, 0, /* lifetime, default */
93 static BOOL dfs_auth(char *user, char *password) argument
111 * We only go for a DCE login context if the given password
112 * matches that stored in the local password file..
116 if (strcmp((char *)crypt(password, this_salt), this_crypted))
273 passwd_rec.key.tagged_union.plain = (idl_char *) password;
379 linux_bigcrypt(char *password, char *salt1, char *crypted) argument
404 osf1_bigcrypt(char *password, char *salt1) argument
487 password_check(const char *password) argument
594 pass_check(const struct passwd *pass, const char *user, const char *password, int pwlen, BOOL (*fn) (const char *, const char *), BOOL run_cracker) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/Mandrake/
H A Dsmbprint16 # exported called "printer" with no password.
20 # so that the server, service, and password can be read from
37 # password="password"
42 # password=""
63 # password
77 ) | /usr/bin/smbclient "//$server/$service" $password -U $server -N >> $logfile
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/RedHat/
H A Dsmbprint16 # exported called "printer" with no password.
20 # so that the server, service, and password can be read from
37 # password="password"
42 # password=""
63 # password
77 ) | /usr/bin/smbclient "\\\\$server\\$service" $password -U $server -N >> $logfile
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/lseek/
H A Dlseek_2.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
23 strncpy(password, g_password, pwmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/pdb/mysql/
H A Dsmb.conf10 mysql:mysql password = ambas
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/Fedora/
H A Dsmbprint15 # exported called "printer" with no password.
19 # so that the server, service, and password can be read from
36 # password="password"
42 # password=""
57 # password
80 #echo $share $password $translate $x_command > /tmp/smbprint.log
82 cat | /usr/bin/smbclient "$share" "$password" -E ${hostip:+-I} \
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/client/
H A Dsmbspool.c56 *password; /* Password */ local
91 fputs(" smb://[username:password@][workgroup/]server[:port]/printer\n", stderr);
145 * Extract password as needed...
148 if ((password = strchr_m(username, ':')) != NULL)
149 *password++ = '\0';
151 password = "";
156 password = "";
172 * Convert to smb://[username:password@]workgroup/server/printer...
215 if ((cli = smb_connect(workgroup, server, port, printer, username, password)) == NULL)
284 const char *password) /*
279 smb_connect(const char *workgroup, const char *server, const int port, const char *share, const char *username, const char *password) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/script/
H A Dsmbtar25 # you're doing, but beware: better not store a plain text password!
28 password=""
53 -p <password> Specify PC Password $password
124 password="$OPTARG"
156 # echo "password is $password" # passwords should never be sent to screen
163 eval $SMBCLIENT "'\\\\$server\\$service'" "'$password'" -U "'$username'" \
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/torture/
H A Drpctorture.c42 static pstring password; /* local copy only, if one is entered */ variable
115 if (password[0] != 0)
152 slprintf(cmd, sizeof(cmd)-1, "%s %s", cli->user_name, password);
193 fprintf(out_hnd, "Usage: %s service <password> [-d debuglevel] [-l log] ",
301 password[0] = 0;
338 pstrcpy(password,argv[1]);
388 pstrcpy(password,lp+1);
390 memset(strchr_m(optarg,'%')+1,'X',strlen(password));
516 /* set the password cache info */
519 if (password[
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/python/
H A Dpy_common.c120 only have the keys "username", "domain" and "password". Return
122 password are set to pointers to their values from the dicationary.
127 char **password, char **errstr)
133 *password = "";
144 password_obj = PyDict_GetItemString(creds, "password");
157 *errstr = SMB_STRDUP("no password field in credential");
174 *errstr = SMB_STRDUP("password field is not string type");
185 strcmp(PyString_AsString(key), "password") != 0) {
197 *password = PyString_AsString(password_obj);
213 char *username, *password, *domai local
126 py_parse_creds(PyObject *creds, char **username, char **domain, char **password, char **errstr) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/ecryptfs/
H A Ddebug.c45 ecryptfs_to_hex(salt, auth_tok->token.password.salt,
49 if (auth_tok->token.password.flags &
53 memcpy(sig, auth_tok->token.password.signature,
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/scripts/
H A Dsecure-card26 set password xxxxxxx
91 send "$password\r"

Completed in 208 milliseconds

1234567891011>>