/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/read/ |
H A D | read_12.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | read_13.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | read_2.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | read_3.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | read_4.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | read_5.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | read_6.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/readdir/ |
H A D | readdir_2.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/stat/ |
H A D | stat_6.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/telldir/ |
H A D | telldir_1.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | telldir_2.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/unlink_print_job/ |
H A D | unlink_print_job_1.c | 22 char *username, int unmaxlen, char *password, int pwmaxlen) 27 strncpy(username, g_username, unmaxlen - 1); 21 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_print_job_2.c | 22 char *username, int unmaxlen, char *password, int pwmaxlen) 27 strncpy(username, g_username, unmaxlen - 1); 21 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_print_job_3.c | 22 char *username, int unmaxlen, char *password, int pwmaxlen) 27 strncpy(username, g_username, unmaxlen - 1); 21 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | unlink_print_job_4.c | 22 char *username, int unmaxlen, char *password, int pwmaxlen) 27 strncpy(username, g_username, unmaxlen - 1); 21 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/write/ |
H A D | write_11.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_12.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_13.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bpalogin/ |
H A D | unixmain.c | 207 strcpy(s.username,""); 237 strcpy(s.username, optarg); 336 printf("username = %s\n",s.username); 345 if(!strcmp(s.username,"")) 401 strcpy(s->username,buf); 403 /* strcpy(s->username, "bpa-user"); */ /* Foxconn removed, Jared Hsu, 2006/02/23 */ 406 debug(2,"parse username : %s\n",s->username); 471 printf(" -u username Usernam [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/ |
H A D | uams_gss.c | 219 /* get the username */ 220 static int get_client_username(char *username, int ulen, gss_name_t *client_name) argument 228 * To extract the unix username, use gss_display_name on client_name. 230 * The username returned contains the realm and possibly an instance. 231 * We only want the username for afpd, so we have to strip those from 232 * the username before copying it to afpd's buffer. 253 /* check if this username fits into afpd's username buffer */ 256 /* The username is too long for afpd's buffer, bail out */ 258 "get_client_username: username ` 385 do_gss_auth(void *obj, char *ibuf, int ticket_len, char *rbuf, int *rbuflen, char *username, int ulen, struct session_info *sinfo ) argument 479 char *username; local [all...] |
H A D | uams_randnum.c | 133 * username:password:last login date:failedcount 302 static int rand_login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 312 if (( randpwd = uam_getname(obj, username, ulen)) == NULL ) 315 LOG(log_info, logtype_uams, "randnum/rand2num login: %s", username); 437 static int randnum_changepw(void *obj, const char *username _U_, 498 char *username; local 504 (void *) &username, &ulen) < 0) 516 memcpy(username, ibuf, len ); 519 username[ len ] = '\0'; 525 return (rand_login(obj, username, ule 533 char *username; local [all...] |
H A D | uams_dhx2_passwd.c | 266 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 270 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) { 271 LOG(log_info, logtype_uams, "DHX2: unknown username"); 275 LOG(log_info, logtype_uams, "DHX2 login: %s", username); 286 char *username; local 292 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) { 305 memcpy(username, ibuf, len ); 307 username[ len ] = '\0'; 312 return (login(obj, username, ulen, uam_pwd, ibuf, ibuflen, rbuf, rbuflen)); 320 char *username; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | wbinfo.c | 124 fstrcpy(request.data.username, user); 506 static BOOL wbinfo_auth(char *username) argument 518 p = strchr(username, '%'); 522 fstrcpy(request.data.auth.user, username); 526 fstrcpy(request.data.auth.user, username); 546 static BOOL wbinfo_auth_crap(char *username) argument 561 p = strchr(username, '%'); 568 parse_wbinfo_domain_user(username, name_domain, name_user); 644 static BOOL wbinfo_klog(char *username) argument 656 p = strchr(username, ' 704 wbinfo_create_user(char *username) argument 730 wbinfo_delete_user(char *username) argument 950 wbinfo_set_auth_user(char *username) argument [all...] |
H A D | pam_winbind.c | 452 const char *username; local 461 /* Get the username */ 462 retval = pam_get_user(pamh, &username, NULL); 463 if ((retval != PAM_SUCCESS) || (!username)) { 465 _pam_log(LOG_DEBUG,"can not get the username"); 484 username, password); 486 _pam_log(LOG_INFO, "Verify user `%s'", username); 508 /* Now use the username to look up password */ 509 return winbind_auth_request(username, password, member, ctrl); 527 const char *username; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/plugins/ |
H A D | winbind.c | 241 unsigned int run_ntlm_auth(const char *username, argument 325 if (username) { 326 char *b64_username = base64_encode(username); 520 char *username; local 528 /* remove domain from "domain\username" */ 529 if ((username = strrchr(user, '\\')) != NULL) 530 ++username; 532 username = user; 536 /* remove domain from "domain\username" */ 576 if (run_ntlm_auth(username, [all...] |