Searched refs:username (Results 201 - 225 of 403) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/
H A Duams_dhx2_passwd.c261 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument
265 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) {
266 LOG(log_info, logtype_uams, "DHX2: unknown username");
270 LOG(log_info, logtype_uams, "DHX2 login: %s", username);
281 char *username; local
287 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) {
300 memcpy(username, ibuf, len );
302 username[ len ] = '\0';
307 return (login(obj, username, ulen, uam_pwd, ibuf, ibuflen, rbuf, rbuflen));
315 char *username; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/
H A Dwinbind.c241 unsigned int run_ntlm_auth(const char *username, argument
325 if (username) {
326 char *b64_username = base64_encode(username);
520 char *username; local
528 /* remove domain from "domain\username" */
529 if ((username = strrchr(user, '\\')) != NULL)
530 ++username;
532 username = user;
536 /* remove domain from "domain\username" */
576 if (run_ntlm_auth(username,
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/
H A Dafs.c76 static BOOL afs_createtoken(const char *username, const char *cell, argument
107 /* "Alice", the client username */
108 strncpy(p, username, sizeof(clear_ticket)-PTR_DIFF(p,clear_ticket)-1);
181 char *afs_createtoken_str(const char *username, const char *cell) argument
187 if (!afs_createtoken(username, cell, &ticket, &ct))
242 DEBUG(1, ("AFS username doesn't contain a @, "
277 char *afs_createtoken_str(const char *username, const char *cell) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dwbinfo.c135 fstrcpy(request.data.username, user);
196 fstrcpy(request.data.username, user);
743 static BOOL wbinfo_auth_krb5(char *username, const char *cctype, uint32 flags) argument
755 p = strchr(username, '%');
759 fstrcpy(request.data.auth.user, username);
763 fstrcpy(request.data.auth.user, username);
776 username, (result == NSS_STATUS_SUCCESS) ? "succeeded" : "failed", cctype);
804 static BOOL wbinfo_auth(char *username) argument
816 p = strchr(username, '%');
820 fstrcpy(request.data.auth.user, username);
844 wbinfo_auth_crap(char *username) argument
944 wbinfo_klog(char *username) argument
1081 wbinfo_set_auth_user(char *username) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/
H A Dauth.c635 if ( 0 == (strcasecmp(obj->username, obj->options.guest)) ) {
793 char *username; local
841 username = ibuf;
904 i = afp_uam->u.uam_login.login_ext(obj, username, &pwd, ibuf, ibuflen, rbuf, rbuflen);
937 LOG(log_note, logtype_afpd, "AFP logout by %s", obj->username);
954 char username[MACFILELEN + 1], *start = ibuf; local
980 if ( len > sizeof(username) - 1) {
983 memcpy(username, ibuf, len);
984 username[ len ] = '\0';
989 /* AFP > 3.0 doesn't pass the username, AP
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/
H A Dpdb_tdb.c84 char *username = NULL; local
125 &username_len, &username, /* B */
162 pdb_set_username(sampass, username, PDB_SET);
172 talloc_sub_basic(sampass, username, domain,
181 talloc_sub_basic(sampass, username, domain,
190 talloc_sub_basic(sampass, username, domain,
199 talloc_sub_basic(sampass, username, domain,
235 SAFE_FREE(username);
270 char *username = NULL; local
313 &username_len, &username, /*
459 char *username = NULL; local
[all...]
H A Dpassdb.c103 user->username = "";
839 char *username = NULL; local
884 &username_len, &username, /* B */
925 pdb_set_username(sampass, username, PDB_SET);
933 standard_sub_basic( username, domain, tmpstring,
940 talloc_sub_basic(sampass, username, domain,
953 standard_sub_basic( username, domain, tmpstring,
960 talloc_sub_basic(sampass, username, domain,
968 standard_sub_basic( username, domain, tmpstring,
975 talloc_sub_basic(sampass, username, domai
1077 const char *username; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/srp/
H A Dsrptest.c28 static int run_srp(const char *username, const char *client_pass, argument
51 if (!SRP_create_verifier_BN(username, server_pass, &s, &v, GN->N, GN->g)) {
95 x = SRP_Calc_x(s, username, client_pass);
H A Dsrp.h125 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username);
127 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-plugins/defer/
H A Dsimple.c166 /* get username/password from envp string array */
167 const char *username = get_env ("username", envp); local
174 np(username),
183 sscanf (username, "%d", &auth);
210 const char *cn = get_env ("username", envp);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/
H A Dsmbmount.c35 static pstring username; variable
216 if (!NT_STATUS_IS_OK(cli_session_setup(c, username,
221 null username */
222 if (password[0] || !username[0] ||
604 get username and password from a credentials file
653 else if (strwicmp("username", param) == 0) {
654 pstrcpy(username, val);
677 username=<arg> SMB username\n\
679 credentials=<filename> file with username/passwor
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/srp/
H A Dsrptest.c28 static int run_srp(const char *username, const char *client_pass, argument
51 if (!SRP_create_verifier_BN(username, server_pass, &s, &v, GN->N, GN->g)) {
95 x = SRP_Calc_x(s, username, client_pass);
H A Dsrp.h125 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username);
127 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/
H A Dpy_spoolss_jobs_conv.c28 { "user_name", PY_UNISTR, offsetof(JOB_INFO_1, username) },
44 { "user_name", PY_UNISTR, offsetof(JOB_INFO_2, username) },
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/getdents/
H A Dgetdents_3.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dgetdents_4.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dgetdents_5.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/lseekdir/
H A Dlseekdir_5.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlseekdir_6.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/readdir/
H A Dreaddir_1.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dreaddir_5.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/telldir/
H A Dtelldir_5.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/unlink_print_job/
H A Dunlink_print_job_5.c25 char *username, int unmaxlen, char *password, int pwmaxlen)
30 strncpy(username, g_username, unmaxlen - 1);
24 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/
H A Dauth_util.c1055 * Create an artificial NT token given just a username. (Initially indended
1073 NTSTATUS create_token_from_username(TALLOC_CTX *mem_ctx, const char *username, argument
1096 if (!lookup_name_smbconf(tmp_ctx, username, LOOKUP_NAME_ALL,
1098 DEBUG(1, ("lookup_name_smbconf for %s failed\n", username));
1103 DEBUG(1, ("%s is a %s, not a user\n", username,
1110 username, sid_string_static(&user_sid)));
1127 sid_string_static(&user_sid), username));
1128 DEBUGADD(1, ("Fall back to unix user %s\n", username));
1137 username));
1138 DEBUGADD(1, ("Fall back to unix user %s\n", username));
1289 user_in_group_sid(const char *username, const DOM_SID *group_sid) argument
1322 user_in_group(const char *username, const char *groupname) argument
1644 fill_sam_account(TALLOC_CTX *mem_ctx, const char *domain, const char *username, char **found_username, uid_t *uid, gid_t *gid, struct samu *account, BOOL *username_was_mapped) argument
1701 fstring username; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Dlibmsrpc_internal.h70 fstring username, fstring password,

Completed in 405 milliseconds

1234567891011>>