/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | winbindd_nss.h | 232 fstring username; /* getpwnam */ member in union:winbindd_request::__anon5839 287 fstring username; member in struct:winbindd_request::__anon5839::__anon5846 468 const char *username; /* lookup key. */ member in struct:WINBINDD_MEMORY_CREDS 482 const char *username; member in struct:WINBINDD_CCACHE_ENTRY
|
H A D | winbindd_ccache_access.c | 43 static NTSTATUS do_ntlm_auth_with_hashes(const char *username, argument 63 status = ntlmssp_set_username(ntlmssp_state, username); 66 DEBUG(1, ("Could not set username: %s\n", 92 the client sent a different username or domain, in which case that's their 93 problem for telling us the wrong username or domain.) 162 /* Parse domain and username */ 224 /* Parse domain and username */ 240 DEBUG(10,("winbindd_dual_ccache_ntlm_auth: found ccache [%s]\n", entry->username));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/ |
H A D | py_common.h | 43 BOOL py_parse_creds(PyObject *creds, char **username, char **domain,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | status.c | 49 const char *username = NULL; variable 259 {"user", 'u', POPT_ARG_STRING, &username, 'u', "Switch to user" }, 301 if ( username ) 302 Ucrit_addUid( nametouid(username) );
|
H A D | ntlm_auth.c | 304 /* authenticate a user with an encrypted username/password */ 306 NTSTATUS contact_winbind_auth_crap(const char *username, argument 337 fstrcpy(request.data.auth_crap.user, username); 401 static NTSTATUS contact_winbind_change_pswd_auth_crap(const char *username, argument 424 if(username != NULL) 425 fstrcpy(request.data.chng_pswd_auth_crap.user, username); 557 DEBUG(1, ("Need username and domain for NTLMSSP\n")); 573 DEBUG(1, ("Could not set username: %s\n", 815 x_fprintf(x_stderr, "username must be specified!\n\n"); 1515 x_fprintf(x_stderr, "username mus 1653 static char *username; local 1846 static char *username = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/include/wx/ |
H A D | dialup.h | 70 // dial the given ISP, use username and password to authentificate 74 // if no username/password are given, the function will try to do without 83 const wxString& username = wxEmptyString,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap_ms.h | 103 u_char *rchallenge, char *username,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/lsa/ |
H A D | ear.c | 11 pstring username; local 18 fprintf(stdout, "Enter username: "); 19 fscanf(stdin, "%s", username); 28 hnd->username = SMB_STRDUP(username);
|
H A D | lsaq.c | 11 pstring username; local 18 fprintf(stdout, "Enter username: "); 19 fscanf(stdin, "%s", username); 28 hnd->username = SMB_STRDUP(username);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/ |
H A D | rpc-server.h | 59 const char * username );
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/srp/ |
H A D | srp_vfy.c | 373 * string(username):base64(v):base64(salt):int(index) 489 static SRP_user_pwd *find_user(SRP_VBASE *vb, char *username) argument 499 if (strcmp(user->id, username) == 0) 511 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username) argument 513 return find_user(vb, username); 520 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username) argument 530 if ((user = find_user(vb, username)) != NULL) 544 if (!SRP_user_pwd_set_ids(user, username, NULL)) 552 EVP_DigestUpdate(&ctxt, username, strlen(username)); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/srp/ |
H A D | srp_vfy.c | 373 * string(username):base64(v):base64(salt):int(index) 489 static SRP_user_pwd *find_user(SRP_VBASE *vb, char *username) argument 499 if (strcmp(user->id, username) == 0) 511 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username) argument 513 return find_user(vb, username); 520 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username) argument 530 if ((user = find_user(vb, username)) != NULL) 544 if (!SRP_user_pwd_set_ids(user, username, NULL)) 552 EVP_DigestUpdate(&ctxt, username, strlen(username)); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_dhx2_pam.c | 175 LOG(log_info, logtype_uams, "PAM DHX2: username failure -- %s", 311 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 315 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) { 316 LOG(log_info, logtype_uams, "DHX2: unknown username"); 320 PAM_username = username; 321 LOG(log_info, logtype_uams, "DHX2 login: %s", username); 332 char *username; local 338 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) { 351 memcpy(username, ibuf, len ); 353 username[ le 366 char *username; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/uams_krb4/ |
H A D | uams_krb4.c | 128 char *username; local 137 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0) 186 strncpy( username, ad.pname, ulen ); 264 char *p, *username, *servername; local 273 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0) 341 if (( pwd = uam_getname( obj, username, strlen(username) ) ) == NULL ) { 382 strncpy(username, ad.pname, ulen); 576 char *p, *q, *username, servername; local 581 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/ |
H A D | print_cups.c | 329 int cups_print_job ( char * name, char *filename, char *job, char *username, char * cupsoptions ) argument 342 if ( username != NULL ) 345 num_options = cupsAddOption("job-originating-user-name", username, num_options, &options); 346 num_options = cupsAddOption("originating-user-name", username, num_options, &options); 347 cupsSetUser ( username ); 360 LOG(log_error, logtype_papd, "Unable to print job '%s' (%s) to printer '%s' for user '%s' - CUPS error : '%s'", job, filepath, name, username, ippErrorString(cupsLastError()));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | samlogon_cache.c | 105 username should be in UTF-8 format 108 BOOL netsamlogon_cache_store( const char *username, NET_USER_INFO_3 *user ) argument 132 /* only Samba fills in the username, not sure why NT doesn't */ 136 init_unistr2( &user->uni_user_name, username, UNI_STR_TERMINATE );
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/ |
H A D | locktest.c | 24 static fstring username[2]; variable 223 fstrcpy(username[1], username[0]); 226 if (!NT_STATUS_IS_OK(cli_session_setup(c, username[snum], 616 fstrcpy(username[0],getenv("USER")); 617 fstrcpy(username[1],getenv("USER")); 638 fstrcpy(username[got_pass],optarg); 639 p = strchr_m(username[got_pass],'%');
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bpalogin/ |
H A D | bpalogin.c | 48 s->debug(1,"username = %s\n",s->username); 55 if(!strcmp(s->username,""))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | wsse2api.h | 128 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password); 129 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | wsse2api.h | 128 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password); 129 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | socks.c | 110 if( !creds.username || (strlen(creds.username) > 255) 113 "SOCKS username and/or password exceeds 255 characters. " 117 openvpn_snprintf (to_send, sizeof (to_send), "\x01%c%s%c%s", (int) strlen(creds.username), 118 creds.username, (int) strlen(creds.password), creds.password); 264 msg(D_LINK_ERRORS, "socks_handshake: server asked for username/login auth but we were "
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/ |
H A D | sshserver.pl | 89 my $username = $ENV{USER}; # default user 109 $username = $ARGV[1]; 195 # Validate username 197 if(!$username) { 200 elsif($username eq 'root') { 477 push @cfgarr, "DenyUsers !$username"; 478 push @cfgarr, "AllowUsers $username"; 831 push @cfgarr, "User $username";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/reg/ |
H A D | regkey.c | 16 hnd->username = SMB_MALLOC_ARRAY(char, sizeof(fstring));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/packaging/LSB/ |
H A D | smb.conf | 60 ; username level = 8 79 ; username map = /etc/samba/smbusers 132 # run a specific logon batch file per username 136 # %L substitutes for this servers netbios name, %U is username
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | auth_sam.c | 43 const char *username = pdb_get_username(sampass); local 48 DEBUG(3,("Account for user '%s' has no password and null passwords are allowed.\n", username)); 51 DEBUG(3,("Account for user '%s' has no password and null passwords are NOT allowed.\n", username)); 62 username, 243 check if a username/password is OK assuming the password is a 24 byte
|