/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_dhx2_passwd.c | 261 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 265 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) { 266 LOG(log_info, logtype_uams, "DHX2: unknown username"); 270 LOG(log_info, logtype_uams, "DHX2 login: %s", username); 281 char *username; local 287 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) { 300 memcpy(username, ibuf, len ); 302 username[ len ] = '\0'; 307 return (login(obj, username, ulen, uam_pwd, ibuf, ibuflen, rbuf, rbuflen)); 315 char *username; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/ |
H A D | winbind.c | 241 unsigned int run_ntlm_auth(const char *username, argument 325 if (username) { 326 char *b64_username = base64_encode(username); 520 char *username; local 528 /* remove domain from "domain\username" */ 529 if ((username = strrchr(user, '\\')) != NULL) 530 ++username; 532 username = user; 536 /* remove domain from "domain\username" */ 576 if (run_ntlm_auth(username, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | afs.c | 76 static BOOL afs_createtoken(const char *username, const char *cell, argument 107 /* "Alice", the client username */ 108 strncpy(p, username, sizeof(clear_ticket)-PTR_DIFF(p,clear_ticket)-1); 181 char *afs_createtoken_str(const char *username, const char *cell) argument 187 if (!afs_createtoken(username, cell, &ticket, &ct)) 242 DEBUG(1, ("AFS username doesn't contain a @, " 277 char *afs_createtoken_str(const char *username, const char *cell) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | wbinfo.c | 135 fstrcpy(request.data.username, user); 196 fstrcpy(request.data.username, user); 743 static BOOL wbinfo_auth_krb5(char *username, const char *cctype, uint32 flags) argument 755 p = strchr(username, '%'); 759 fstrcpy(request.data.auth.user, username); 763 fstrcpy(request.data.auth.user, username); 776 username, (result == NSS_STATUS_SUCCESS) ? "succeeded" : "failed", cctype); 804 static BOOL wbinfo_auth(char *username) argument 816 p = strchr(username, '%'); 820 fstrcpy(request.data.auth.user, username); 844 wbinfo_auth_crap(char *username) argument 944 wbinfo_klog(char *username) argument 1081 wbinfo_set_auth_user(char *username) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/ |
H A D | auth.c | 635 if ( 0 == (strcasecmp(obj->username, obj->options.guest)) ) { 793 char *username; local 841 username = ibuf; 904 i = afp_uam->u.uam_login.login_ext(obj, username, &pwd, ibuf, ibuflen, rbuf, rbuflen); 937 LOG(log_note, logtype_afpd, "AFP logout by %s", obj->username); 954 char username[MACFILELEN + 1], *start = ibuf; local 980 if ( len > sizeof(username) - 1) { 983 memcpy(username, ibuf, len); 984 username[ len ] = '\0'; 989 /* AFP > 3.0 doesn't pass the username, AP [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/ |
H A D | pdb_tdb.c | 84 char *username = NULL; local 125 &username_len, &username, /* B */ 162 pdb_set_username(sampass, username, PDB_SET); 172 talloc_sub_basic(sampass, username, domain, 181 talloc_sub_basic(sampass, username, domain, 190 talloc_sub_basic(sampass, username, domain, 199 talloc_sub_basic(sampass, username, domain, 235 SAFE_FREE(username); 270 char *username = NULL; local 313 &username_len, &username, /* 459 char *username = NULL; local [all...] |
H A D | passdb.c | 103 user->username = ""; 839 char *username = NULL; local 884 &username_len, &username, /* B */ 925 pdb_set_username(sampass, username, PDB_SET); 933 standard_sub_basic( username, domain, tmpstring, 940 talloc_sub_basic(sampass, username, domain, 953 standard_sub_basic( username, domain, tmpstring, 960 talloc_sub_basic(sampass, username, domain, 968 standard_sub_basic( username, domain, tmpstring, 975 talloc_sub_basic(sampass, username, domai 1077 const char *username; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/srp/ |
H A D | srptest.c | 28 static int run_srp(const char *username, const char *client_pass, argument 51 if (!SRP_create_verifier_BN(username, server_pass, &s, &v, GN->N, GN->g)) { 95 x = SRP_Calc_x(s, username, client_pass);
|
H A D | srp.h | 125 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username); 127 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-plugins/defer/ |
H A D | simple.c | 166 /* get username/password from envp string array */ 167 const char *username = get_env ("username", envp); local 174 np(username), 183 sscanf (username, "%d", &auth); 210 const char *cn = get_env ("username", envp);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/ |
H A D | smbmount.c | 35 static pstring username; variable 216 if (!NT_STATUS_IS_OK(cli_session_setup(c, username, 221 null username */ 222 if (password[0] || !username[0] || 604 get username and password from a credentials file 653 else if (strwicmp("username", param) == 0) { 654 pstrcpy(username, val); 677 username=<arg> SMB username\n\ 679 credentials=<filename> file with username/passwor [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/srp/ |
H A D | srptest.c | 28 static int run_srp(const char *username, const char *client_pass, argument 51 if (!SRP_create_verifier_BN(username, server_pass, &s, &v, GN->N, GN->g)) { 95 x = SRP_Calc_x(s, username, client_pass);
|
H A D | srp.h | 125 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username); 127 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/ |
H A D | py_spoolss_jobs_conv.c | 28 { "user_name", PY_UNISTR, offsetof(JOB_INFO_1, username) }, 44 { "user_name", PY_UNISTR, offsetof(JOB_INFO_2, username) },
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/getdents/ |
H A D | getdents_3.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | getdents_4.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | getdents_5.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/lseekdir/ |
H A D | lseekdir_5.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | lseekdir_6.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/readdir/ |
H A D | readdir_1.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | readdir_5.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/telldir/ |
H A D | telldir_5.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/unlink_print_job/ |
H A D | unlink_print_job_5.c | 25 char *username, int unmaxlen, char *password, int pwmaxlen) 30 strncpy(username, g_username, unmaxlen - 1); 24 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | auth_util.c | 1055 * Create an artificial NT token given just a username. (Initially indended 1073 NTSTATUS create_token_from_username(TALLOC_CTX *mem_ctx, const char *username, argument 1096 if (!lookup_name_smbconf(tmp_ctx, username, LOOKUP_NAME_ALL, 1098 DEBUG(1, ("lookup_name_smbconf for %s failed\n", username)); 1103 DEBUG(1, ("%s is a %s, not a user\n", username, 1110 username, sid_string_static(&user_sid))); 1127 sid_string_static(&user_sid), username)); 1128 DEBUGADD(1, ("Fall back to unix user %s\n", username)); 1137 username)); 1138 DEBUGADD(1, ("Fall back to unix user %s\n", username)); 1289 user_in_group_sid(const char *username, const DOM_SID *group_sid) argument 1322 user_in_group(const char *username, const char *groupname) argument 1644 fill_sam_account(TALLOC_CTX *mem_ctx, const char *domain, const char *username, char **found_username, uid_t *uid, gid_t *gid, struct samu *account, BOOL *username_was_mapped) argument 1701 fstring username; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | libmsrpc_internal.h | 70 fstring username, fstring password,
|