Searched refs:username (Results 26 - 50 of 403) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dlibsmb_cache.c40 char *username; member in struct:smbc_server_cache
54 const char * workgroup, const char * username)
86 srvcache->username = SMB_STRDUP(username);
87 if (!srvcache->username) {
99 SAFE_FREE(srvcache->username);
122 strcmp(user, srv->username) == 0) {
206 SAFE_FREE(srv->username);
52 smbc_add_cached_server(SMBCCTX * context, SMBCSRV * newsrv, const char * server, const char * share, const char * workgroup, const char * username) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/lseek/
H A Dlseek_2.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/
H A Duams_guest.c51 char *guest, *username; local
61 (void *) &username, NULL) < 0)
64 strcpy(username, guest);
91 static int noauth_printer(char *start, char *stop, char *username, struct papfile *out) argument
105 * (username)
107 * Hopefully username doesn't contain a ")"
111 LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string");
117 LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string");
121 memcpy(username, p, MIN( UAM_USERNAMELEN, q - p ));
123 /* Done copying username, clea
[all...]
H A Duams_dhx_passwd.c72 static int pwd_login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument
103 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) {
107 LOG(log_info, logtype_uams, "dhx login: %s", username);
113 LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username);
210 char *username; local
216 (void *) &username, &ulen) < 0)
228 memcpy(username, ibuf, len );
231 username[ len ] = '\0';
237 return (pwd_login(obj, username, ulen, uam_pwd, ibuf, ibuflen, rbuf, rbuflen));
251 char *username; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/script/
H A Dsmbtar29 username=$LOGNAME # Default: same user name as in *nix
60 -u <user> Specify User Name $username
133 username="$OPTARG"
163 eval $SMBCLIENT "'\\\\$server\\$service'" "'$password'" -U "'$username'" \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/script/tests/
H A Dtest_smbtorture_s3.sh13 username="$2"
44 testit "$name" $VALGRIND $BINDIR/smbtorture $ADDARGS $unc -U"$username"%"$password" $t || failed=`expr $failed + 1`
H A Dtest_posix_s3.sh13 username="$2"
75 testit "$name" $VALGRIND $SMBTORTURE4 $TORTURE4_OPTIONS $ADDARGS $unc -U"$username"%"$password" $t || failed=`expr $failed + 1`
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/
H A Dsmbspool.c68 char *username, /* Username */ local
107 fputs(" smb://[username:password@][workgroup/]server[:port]/printer\n", stderr);
160 /* username is in tmp */
174 username = uri_unescape_alloc(tmp);
178 username = null_str;
197 * Convert to smb://[username:password@]workgroup/server/printer...
245 if ((cli = smb_connect(workgroup, server, port, printer, username, password, argv[2])) == NULL)
376 const char *username,
399 if ( (username) && (*username)
373 smb_complete_connection(const char *myname, const char *server, int port, const char *username, const char *password, const char *workgroup, const char *share, int flags) argument
475 smb_connect(const char *workgroup, const char *server, const int port, const char *share, const char *username, const char *password, const char *jobusername) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dwinbindd_user.c32 const char *username,
52 username, domname,
56 username, domname,
174 char *username; member in struct:getpwsid_state
231 fstring username; local
242 fstrcpy( username, acct_name );
243 strlower_m( username );
244 s->username = talloc_strdup(s->state->mem_ctx, username);
246 ws_name_replace( s->username, WB_REPLACE_CHA
31 fillup_pw_field(const char *lp_template, const char *username, const char *domname, uid_t uid, gid_t gid, const char *in, fstring out) argument
340 fstring domname, username; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libmsrpc/
H A Dlibmsrpc.c42 hnd->username = SMB_MALLOC_ARRAY( char, sizeof( fstring ) );
44 if ( !hnd->username )
47 hnd->username[0] = '\0';
126 if ( !hnd->username ) {
127 hnd->username = SMB_STRDUP( hnd->_internal.ctx->user );
128 } else if ( hnd->username[0] == '\0' ) {
129 strncpy( hnd->username, hnd->_internal.ctx->user,
171 hnd->domain, hnd->username, hnd->password,
217 DEBUG( 3, ( "cac_Connect: Username: %s\n", hnd->username ) );
242 SAFE_FREE( hnd->username );
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dplatform.c64 platform_user_get (const char *username, struct platform_state_user *state) argument
68 if (username)
71 state->pw = getpwnam (username);
73 msg (M_ERR, "failed to find UID for user %s", username);
74 state->username = username;
77 msg (M_FATAL, "cannot get UID for user %s -- platform lacks getpwname() or setuid() system calls", username);
87 if (state->username && state->pw)
90 msg (M_ERR, "setuid('%s') failed", state->username);
91 msg (M_INFO, "UID set to %s", state->username);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/
H A Dpy_common.c122 only have the keys "username", "domain" and "password". Return
123 True for valid credentials in which case the username, domain and
128 BOOL py_parse_creds(PyObject *creds, char **username, char **domain, argument
133 *username = "";
144 username_obj = PyDict_GetItemString(creds, "username");
149 *errstr = SMB_STRDUP("no username field in credential");
166 *errstr = SMB_STRDUP("username field is not string type");
186 strcmp(PyString_AsString(key), "username") != 0 &&
197 *username = PyString_AsString(username_obj);
215 char *username, *passwor local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/mtools-4.0.10/
H A Dmisc.c38 char *username; local
50 username = getenv("LOGNAME");
51 if ( !username )
52 username = getlogin();
53 if ( username )
54 pw = getpwnam( username);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/sample/sample-plugins/log/
H A Dlog_v3.c47 const char *username; member in struct:plugin_context
105 /* Set the username/password we will require. */
106 context->username = "foo";
225 /* check entered username/password against what we require */
228 /* get username/password from envp string array */
229 const char *username = get_env ("username", args->envp); local
232 if (username && !strcmp (username, context->username)
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/smbd/
H A Dse_access_check_printer.c63 BOOL test_user(char *username, uint32 acc_desired, uint32 *acc_granted) argument
68 if (!(pw = getpwnam(username))) {
70 username);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/samples/wsse/
H A Dwssedemo.c305 { const char *username = soap_wsse_get_Username(soap); local
306 if (username)
307 fprintf(stderr, "Hello %s, want to add %g + %g = ?\n", username, a, b);
336 { const char *username = soap_wsse_get_Username(soap); local
337 if (username)
338 fprintf(stderr, "Hello %s, want to subtract %g - %g = ?\n", username, a, b);
368 { const char *username = soap_wsse_get_Username(soap); local
369 if (username)
370 fprintf(stderr, "Hello %s, want to multiply %g * %g = ?\n", username, a, b);
401 { const char *username local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/samples/wsse/
H A Dwssedemo.c305 { const char *username = soap_wsse_get_Username(soap); local
306 if (username)
307 fprintf(stderr, "Hello %s, want to add %g + %g = ?\n", username, a, b);
336 { const char *username = soap_wsse_get_Username(soap); local
337 if (username)
338 fprintf(stderr, "Hello %s, want to subtract %g - %g = ?\n", username, a, b);
368 { const char *username = soap_wsse_get_Username(soap); local
369 if (username)
370 fprintf(stderr, "Hello %s, want to multiply %g * %g = ?\n", username, a, b);
401 { const char *username local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/nsswitch/
H A Dgetent.exp51 set username [lindex $user_info 0]
53 if { [regexp {^[^/]+/} $username] } {
55 set test_desc "wbinfo -u does not contain $username"
57 if { ![regexp "$username" $wbinfo_output] } {
63 verbose "ignoring non-domain user $username"
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/radvd/
H A Dradvd.c26 "\t[-f facility] [-p pid_file] [-u username] [-t chrootdir]";
36 {"username", 1, 0, 'u'},
105 char *username = NULL; local
184 username = strdup(optarg);
212 if (!username) {
226 /* username will be switched later */
242 if (check_conffile_perm(username, conf_file) < 0) {
264 if (username) {
271 if (drop_root_privileges(username) < 0)
615 drop_root_privileges(const char *username) argument
634 check_conffile_perm(const char *username, const char *conf_file) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/src/router/radvd/
H A Dradvd.c26 "\t[-f facility] [-p pid_file] [-u username] [-t chrootdir]";
36 {"username", 1, 0, 'u'},
112 char *username = NULL; local
191 username = strdup(optarg);
219 if (!username) {
233 /* username will be switched later */
249 if (check_conffile_perm(username, conf_file) < 0) {
271 if (username) {
278 if (drop_root_privileges(username) < 0)
626 drop_root_privileges(const char *username) argument
645 check_conffile_perm(const char *username, const char *conf_file) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/dbus/
H A Ddbus-userdb-util.c126 result = _dbus_user_at_console (info->username, error);
134 * Gets user ID given username
136 * @param username the username
138 * @returns #TRUE if username existed and we got the UID
141 _dbus_get_user_id (const DBusString *username, argument
144 return _dbus_get_user_id_and_primary_group (username, uid, NULL);
183 * Gets user ID and primary group given username
185 * @param username the username
191 _dbus_get_user_id_and_primary_group(const DBusString *username, dbus_uid_t *uid_p, dbus_gid_t *gid_p) argument
438 const DBusString *username; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Dutmp.c116 void sys_utmp_claim(const char *username, const char *hostname, argument
121 void sys_utmp_yield(const char *username, const char *hostname, argument
477 const char *username, const char *hostname,
490 utmp_strcpy(u->ut_user, username, sizeof(u->ut_user));
492 utmp_strcpy(u->ut_name, username, sizeof(u->ut_name));
552 void sys_utmp_yield(const char *username, const char *hostname, argument
569 if (!sys_utmp_fill(&u, username, hostname, ipaddr, id_str, id_num)) return;
578 void sys_utmp_claim(const char *username, const char *hostname, argument
590 if (!sys_utmp_fill(&u, username, hostname, ipaddr, id_str, id_num)) return;
476 sys_utmp_fill(struct utmp *u, const char *username, const char *hostname, struct in_addr *ipaddr, const char *id_str, int id_num) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Dcurl_ntlm_wb.c115 const char *username; local
126 username = userp;
127 slash = strpbrk(username, "\\/");
129 if((domain = strdup(username)) == NULL)
131 slash = domain + (slash - username);
133 username = username + (slash - domain) + 1;
196 "--username", username,
203 "--username", usernam
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavformat/
H A Dhttpauth.c130 static char *make_digest_auth(HTTPAuthState *state, const char *username, argument
159 update_md5_strings(md5ctx, username, ":", state->realm, ":", password, NULL);
204 len = strlen(username) + strlen(state->realm) + strlen(digest->nonce) +
215 av_strlcatf(authstr, len, "username=\"%s\"", username);
255 char *username = av_strdup(auth), *password; local
257 if (!username)
260 if ((password = strchr(username, ':'))) {
262 authstr = make_digest_auth(state, username, password, path, method);
264 av_free(username);
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/libsmbclient/src/chmod/
H A Dchmod_1.c15 char *username, int unmaxlen, char *password, int pwmaxlen)
20 strncpy(username, g_username, unmaxlen - 1);
14 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument

Completed in 297 milliseconds

1234567891011>>