Searched refs:username (Results 226 - 250 of 403) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dwinbindd_nss.h232 fstring username; /* getpwnam */ member in union:winbindd_request::__anon5839
287 fstring username; member in struct:winbindd_request::__anon5839::__anon5846
468 const char *username; /* lookup key. */ member in struct:WINBINDD_MEMORY_CREDS
482 const char *username; member in struct:WINBINDD_CCACHE_ENTRY
H A Dwinbindd_ccache_access.c43 static NTSTATUS do_ntlm_auth_with_hashes(const char *username, argument
63 status = ntlmssp_set_username(ntlmssp_state, username);
66 DEBUG(1, ("Could not set username: %s\n",
92 the client sent a different username or domain, in which case that's their
93 problem for telling us the wrong username or domain.)
162 /* Parse domain and username */
224 /* Parse domain and username */
240 DEBUG(10,("winbindd_dual_ccache_ntlm_auth: found ccache [%s]\n", entry->username));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/
H A Dpy_common.h43 BOOL py_parse_creds(PyObject *creds, char **username, char **domain,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dstatus.c49 const char *username = NULL; variable
259 {"user", 'u', POPT_ARG_STRING, &username, 'u', "Switch to user" },
301 if ( username )
302 Ucrit_addUid( nametouid(username) );
H A Dntlm_auth.c304 /* authenticate a user with an encrypted username/password */
306 NTSTATUS contact_winbind_auth_crap(const char *username, argument
337 fstrcpy(request.data.auth_crap.user, username);
401 static NTSTATUS contact_winbind_change_pswd_auth_crap(const char *username, argument
424 if(username != NULL)
425 fstrcpy(request.data.chng_pswd_auth_crap.user, username);
557 DEBUG(1, ("Need username and domain for NTLMSSP\n"));
573 DEBUG(1, ("Could not set username: %s\n",
815 x_fprintf(x_stderr, "username must be specified!\n\n");
1515 x_fprintf(x_stderr, "username mus
1653 static char *username; local
1846 static char *username = NULL; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/include/wx/
H A Ddialup.h70 // dial the given ISP, use username and password to authentificate
74 // if no username/password are given, the function will try to do without
83 const wxString& username = wxEmptyString,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/
H A Dchap_ms.h103 u_char *rchallenge, char *username,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/lsa/
H A Dear.c11 pstring username; local
18 fprintf(stdout, "Enter username: ");
19 fscanf(stdin, "%s", username);
28 hnd->username = SMB_STRDUP(username);
H A Dlsaq.c11 pstring username; local
18 fprintf(stdout, "Enter username: ");
19 fscanf(stdin, "%s", username);
28 hnd->username = SMB_STRDUP(username);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/libtransmission/
H A Drpc-server.h59 const char * username );
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/srp/
H A Dsrp_vfy.c373 * string(username):base64(v):base64(salt):int(index)
489 static SRP_user_pwd *find_user(SRP_VBASE *vb, char *username) argument
499 if (strcmp(user->id, username) == 0)
511 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username) argument
513 return find_user(vb, username);
520 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username) argument
530 if ((user = find_user(vb, username)) != NULL)
544 if (!SRP_user_pwd_set_ids(user, username, NULL))
552 EVP_DigestUpdate(&ctxt, username, strlen(username));
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/srp/
H A Dsrp_vfy.c373 * string(username):base64(v):base64(salt):int(index)
489 static SRP_user_pwd *find_user(SRP_VBASE *vb, char *username) argument
499 if (strcmp(user->id, username) == 0)
511 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username) argument
513 return find_user(vb, username);
520 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username) argument
530 if ((user = find_user(vb, username)) != NULL)
544 if (!SRP_user_pwd_set_ids(user, username, NULL))
552 EVP_DigestUpdate(&ctxt, username, strlen(username));
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/
H A Duams_dhx2_pam.c175 LOG(log_info, logtype_uams, "PAM DHX2: username failure -- %s",
311 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument
315 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) {
316 LOG(log_info, logtype_uams, "DHX2: unknown username");
320 PAM_username = username;
321 LOG(log_info, logtype_uams, "DHX2 login: %s", username);
332 char *username; local
338 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) {
351 memcpy(username, ibuf, len );
353 username[ le
366 char *username; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/uams_krb4/
H A Duams_krb4.c128 char *username; local
137 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0)
186 strncpy( username, ad.pname, ulen );
264 char *p, *username, *servername; local
273 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0)
341 if (( pwd = uam_getname( obj, username, strlen(username) ) ) == NULL ) {
382 strncpy(username, ad.pname, ulen);
576 char *p, *q, *username, servername; local
581 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username,
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/
H A Dprint_cups.c329 int cups_print_job ( char * name, char *filename, char *job, char *username, char * cupsoptions ) argument
342 if ( username != NULL )
345 num_options = cupsAddOption("job-originating-user-name", username, num_options, &options);
346 num_options = cupsAddOption("originating-user-name", username, num_options, &options);
347 cupsSetUser ( username );
360 LOG(log_error, logtype_papd, "Unable to print job '%s' (%s) to printer '%s' for user '%s' - CUPS error : '%s'", job, filepath, name, username, ippErrorString(cupsLastError()));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dsamlogon_cache.c105 username should be in UTF-8 format
108 BOOL netsamlogon_cache_store( const char *username, NET_USER_INFO_3 *user ) argument
132 /* only Samba fills in the username, not sure why NT doesn't */
136 init_unistr2( &user->uni_user_name, username, UNI_STR_TERMINATE );
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/
H A Dlocktest.c24 static fstring username[2]; variable
223 fstrcpy(username[1], username[0]);
226 if (!NT_STATUS_IS_OK(cli_session_setup(c, username[snum],
616 fstrcpy(username[0],getenv("USER"));
617 fstrcpy(username[1],getenv("USER"));
638 fstrcpy(username[got_pass],optarg);
639 p = strchr_m(username[got_pass],'%');
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bpalogin/
H A Dbpalogin.c48 s->debug(1,"username = %s\n",s->username);
55 if(!strcmp(s->username,""))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/
H A Dwsse2api.h128 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password);
129 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/
H A Dwsse2api.h128 int soap_wsse_add_UsernameTokenText(struct soap *soap, const char *id, const char *username, const char *password);
129 int soap_wsse_add_UsernameTokenDigest(struct soap *soap, const char *id, const char *username, const char *password);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dsocks.c110 if( !creds.username || (strlen(creds.username) > 255)
113 "SOCKS username and/or password exceeds 255 characters. "
117 openvpn_snprintf (to_send, sizeof (to_send), "\x01%c%s%c%s", (int) strlen(creds.username),
118 creds.username, (int) strlen(creds.password), creds.password);
264 msg(D_LINK_ERRORS, "socks_handshake: server asked for username/login auth but we were "
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/
H A Dsshserver.pl89 my $username = $ENV{USER}; # default user
109 $username = $ARGV[1];
195 # Validate username
197 if(!$username) {
200 elsif($username eq 'root') {
477 push @cfgarr, "DenyUsers !$username";
478 push @cfgarr, "AllowUsers $username";
831 push @cfgarr, "User $username";
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/reg/
H A Dregkey.c16 hnd->username = SMB_MALLOC_ARRAY(char, sizeof(fstring));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/packaging/LSB/
H A Dsmb.conf60 ; username level = 8
79 ; username map = /etc/samba/smbusers
132 # run a specific logon batch file per username
136 # %L substitutes for this servers netbios name, %U is username
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/
H A Dauth_sam.c43 const char *username = pdb_get_username(sampass); local
48 DEBUG(3,("Account for user '%s' has no password and null passwords are allowed.\n", username));
51 DEBUG(3,("Account for user '%s' has no password and null passwords are NOT allowed.\n", username));
62 username,
243 check if a username/password is OK assuming the password is a 24 byte

Completed in 659 milliseconds

1234567891011>>