/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/unlink/ |
H A D | unlink_11.c | 15 char *username, int unmaxlen, char *password, int pwmaxlen) 20 strncpy(username, g_username, unmaxlen - 1); 14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_12.c | 15 char *username, int unmaxlen, char *password, int pwmaxlen) 20 strncpy(username, g_username, unmaxlen - 1); 14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_2.c | 15 char *username, int unmaxlen, char *password, int pwmaxlen) 20 strncpy(username, g_username, unmaxlen - 1); 14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_3.c | 15 char *username, int unmaxlen, char *password, int pwmaxlen) 20 strncpy(username, g_username, unmaxlen - 1); 14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_4.c | 15 char *username, int unmaxlen, char *password, int pwmaxlen) 20 strncpy(username, g_username, unmaxlen - 1); 14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_5.c | 15 char *username, int unmaxlen, char *password, int pwmaxlen) 20 strncpy(username, g_username, unmaxlen - 1); 14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_6.c | 15 char *username, int unmaxlen, char *password, int pwmaxlen) 20 strncpy(username, g_username, unmaxlen - 1); 14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_7.c | 15 char *username, int unmaxlen, char *password, int pwmaxlen) 20 strncpy(username, g_username, unmaxlen - 1); 14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_8.c | 15 char *username, int unmaxlen, char *password, int pwmaxlen) 20 strncpy(username, g_username, unmaxlen - 1); 14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_9.c | 15 char *username, int unmaxlen, char *password, int pwmaxlen) 20 strncpy(username, g_username, unmaxlen - 1); 14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/write/ |
H A D | write_1.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_10.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_2.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_3.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_4.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_5.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_6.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_7.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_8.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_9.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | platform.h | 58 const char *username; member in struct:platform_state_user 76 bool platform_user_get (const char *username, struct platform_state_user *state);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/dbus/ |
H A D | dbus-auth-script.c | 506 /* Replace USERID_HEX with our username in hex */ 513 DBusString username; local 515 if (!_dbus_string_init (&username)) 522 if (!_dbus_append_user_from_current_process (&username)) 525 _dbus_string_free (&username); 532 if (!_dbus_string_hex_encode (&username, 0, 536 _dbus_string_free (&username); 541 _dbus_string_free (&username); 546 DBusString username; local 548 if (!_dbus_string_init (&username)) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/plugins/auth-pam/ |
H A D | auth-pam.c | 84 * "USERNAME" -- substitute client-supplied username 102 * Used to pass the username/password 108 char username[128]; member in struct:user_pass 474 /* get username/password from envp string array */ 475 const char *username = get_env ("username", envp); local 479 if (username && strlen (username) > 0 && password) 482 || send_string (context->foreground_fd, username) == -1 598 aresp[i].resp = searchandreplace(match_value, "USERNAME", up->username); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_dhx_pam.c | 119 LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: username failure -- %s", 322 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 326 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) { 327 LOG(log_info, logtype_uams, "uams_dhx_pam.c: unknown username [%s]", username); 331 PAM_username = username; 332 LOG(log_info, logtype_uams, "dhx login: %s", username); 343 char *username; local 349 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) { 362 memcpy(username, ibu 377 char *username; local 566 pam_changepw(void *obj, char *username, struct passwd *pwd _U_, char *ibuf, size_t ibuflen, char *rbuf, size_t *rbuflen) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | session.c | 129 fstrcpy(sessionid.username, vuser->user.unix_name); 141 if (!smb_pam_claim_session(sessionid.username, sessionid.id_str, sessionid.hostname)) { 143 sessionid.username, sessionid.id_str)); 158 sys_utmp_claim(sessionid.username, sessionid.hostname, 203 sys_utmp_yield(sessionid.username, sessionid.hostname, 208 smb_pam_close_session(sessionid.username, sessionid.id_str, sessionid.hostname); 254 current->username, current->remote_machine));
|