Searched refs:username (Results 201 - 225 of 305) sorted by relevance

1234567891011>>

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dwb_client.c274 fstrcpy(request.data.username, user);
296 username case. */
425 fstrcpy( request.data.acct_mgt.username, name );
495 fstrcpy( request.data.acct_mgt.username, user );
527 fstrcpy( request.data.acct_mgt.username, user );
557 fstrcpy( request.data.acct_mgt.username, user );
587 fstrcpy( request.data.acct_mgt.username, user );
H A Dwinbindd_nss.h163 fstring username; /* getpwnam */ member in union:winbindd_request::__anon1729
198 fstring username; member in struct:winbindd_request::__anon1729::__anon1734
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/torture/
H A Dlocktest.c26 static fstring username[2]; variable
204 fstrcpy(username[1], username[0]);
207 if (!cli_session_setup(c, username[snum],
595 fstrcpy(username[0],getenv("USER"));
596 fstrcpy(username[1],getenv("USER"));
617 fstrcpy(username[got_pass],optarg);
618 p = strchr_m(username[got_pass],'%');
H A Dmasktest.c26 static fstring username; variable
221 if (!cli_session_setup(c, username,
463 fstrcpy(username,getenv("USER"));
489 fstrcpy(username,optarg);
490 p = strchr_m(username,'%');
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bpalogin/
H A Dbpalogin.c48 s->debug(1,"username = %s\n",s->username);
55 if(!strcmp(s->username,""))
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/lib/
H A Dsystem_smbd.c193 const char *username,
201 if (!getgroups_user(username, primary_gid, gids, num_groups)) {
192 pdb_default_enum_group_memberships(struct pdb_methods *methods, const char *username, gid_t primary_gid, DOM_SID **sids, gid_t **gids, int *num_groups) argument
H A Dsubstitute.c474 * username. The %p (NIS server path) code is
477 * service name, not the username. */
616 const char *username,
622 a = alloc_sub_specified(input_string, username, domain, uid, gid);
630 const char *username,
650 t = realloc_string_sub(t, "%U", username);
653 t = realloc_string_sub(t, "%u", username);
673 t = realloc_string_sub(t, "%N", automount_server(username));
687 ret_string = alloc_sub_basic(username, a_string);
749 * username
614 talloc_sub_specified(TALLOC_CTX *mem_ctx, const char *input_string, const char *username, const char *domain, uid_t uid, gid_t gid) argument
629 alloc_sub_specified(const char *input_string, const char *username, const char *domain, uid_t uid, gid_t gid) argument
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/
H A Dsamlogon_cache.c109 username should be in UTF-8 format
112 BOOL netsamlogon_cache_store(TALLOC_CTX *mem_ctx, const char * username, NET_USER_INFO_3 *user) argument
135 /* only Samba fills in the username, not sure why NT doesn't */
139 init_unistr2( &user->uni_user_name, username, UNI_STR_TERMINATE );
H A Dclidfs.c35 static pstring username; variable
130 if (!cli_session_setup(c, username,
134 /* if a password was not supplied then try again with a null username */
135 if (password[0] || !username[0] || use_kerberos ||
309 pstrcpy( username, user->username );
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/drivers/s390/net/
H A Dnetiucv.c961 PRINT_WARN("%s: Cannot connect without username\n", netdev->name);
1382 char username[9]; local
1388 PRINT_WARN("netiucv: username too long (%d)!\n", (int) count);
1390 "%d is length of username\n", (int) count);
1397 username[i]= toupper(*p);
1404 PRINT_WARN("netiucv: Invalid char %c in username!\n", *p);
1406 "username: invalid character %c\n", *p);
1410 username[i++] = ' ';
1411 username[8] = '\0';
1413 if (memcmp(username, pri
1794 netiucv_new_connection(struct net_device *dev, char *username) argument
1913 netiucv_init_netdevice(char *username) argument
1951 char username[9]; local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/tests/
H A Dsshserver.pl89 my $username = $ENV{USER}; # default user
109 $username = $ARGV[1];
195 # Validate username
197 if(!$username) {
200 elsif($username eq 'root') {
477 push @cfgarr, "DenyUsers !$username";
478 push @cfgarr, "AllowUsers $username";
831 push @cfgarr, "User $username";
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/Fedora/
H A Dsmb.conf62 ; username level = 8
81 ; username map = /etc/samba/smbusers
130 # run a specific logon batch file per username
134 # %L substitutes for this servers netbios name, %U is username
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/LSB/
H A Dsmb.conf60 ; username level = 8
79 ; username map = /etc/samba/smbusers
132 # run a specific logon batch file per username
136 # %L substitutes for this servers netbios name, %U is username
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/RedHat/
H A Dsmb.conf62 ; username level = 8
81 ; username map = /etc/samba/smbusers
130 # run a specific logon batch file per username
134 # %L substitutes for this servers netbios name, %U is username
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/
H A Dauth_sam.c43 const char *username = pdb_get_username(sampass); local
48 DEBUG(3,("Account for user '%s' has no password and null passwords are allowed.\n", username));
51 DEBUG(3,("Account for user '%s' has no password and null passwords are NOT allowed.\n", username));
62 username,
221 check if a username/password is OK assuming the password is a 24 byte
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/include/
H A Dauthdata.h35 uint16 *username; /* might not be null terminated, so not UNISTR */ member in struct:unknown_type_10
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/passdb/
H A Dpdb_ldap.c442 pstring username, local
471 username[0] = '\0';
494 if (!smbldap_get_single_pstring(ldap_state->smbldap_state->ldap_struct, entry, "uid", username)) {
499 DEBUG(2, ("init_sam_from_ldap: Entry found for user: %s\n", username));
501 pstrcpy(nt_username, username);
505 pdb_set_username(sampass, username, PDB_SET);
553 username));
635 talloc_sub_basic(sampass->mem_ctx, username, lp_logon_home()),
639 standard_sub_basic( username, tmpstring, sizeof(tmpstring) );
647 talloc_sub_basic(sampass->mem_ctx, username, lp_logon_scrip
1759 const char *username = pdb_get_username(newpwd); local
2398 ldapsam_enum_group_memberships(struct pdb_methods *methods, const char *username, gid_t primary_gid, DOM_SID **sids, gid_t **gids, int *num_groups) argument
[all...]
H A Dpdb_get_set.c229 return (sampass->private.username);
610 BOOL pdb_set_username(SAM_ACCOUNT *sampass, const char *username, enum pdb_value_state flag) argument
615 if (username) {
616 DEBUG(10, ("pdb_set_username: setting username %s, was %s\n", username,
617 (sampass->private.username)?(sampass->private.username):"NULL"));
619 sampass->private.username = talloc_strdup(sampass->mem_ctx, username);
621 if (!sampass->private.username) {
[all...]
H A Dpdb_nds.c766 const char *username = pdb_get_username(sam_acct); local
770 success ? "Successful" : "Failed", username));
775 rc = ldapsam_search_suffix_by_name(ldap_state, username, &result, attr_list );
794 DEBUG(3, ("pdb_nds_update_login_attempts: username %s found dn '%s'\n", username, dn));
858 DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Successful for %s\n", username));
862 DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Failed for %s\n", username));
H A Dsecrets.c809 Caller to free() result in domain, username, password
811 void secrets_fetch_ipc_userpass(char **username, char **domain, char **password) argument
813 *username = secrets_fetch(SECRETS_AUTH_USER, NULL);
817 if (*username && **username) {
826 *domain, *username));
830 *username = smb_xstrdup("");
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpcclient/
H A Dcmd_netlogon.c252 const char *username, *password; local
260 fprintf(stderr, "Usage: samlogon <username> <password> "
266 username = argv[1];
282 result = cli_netlogon_sam_logon(cli, mem_ctx, &ret_creds, username, password, logon_type);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/libsmbclient/
H A Dtestsmbc.c32 char *workgroup, int wgmaxlen, char *username, int unmaxlen,
47 fprintf(stdout, "Enter username: [%s] ", username);
53 if (temp[0]) strncpy(username, temp, unmaxlen - 1);
31 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/busybox-1.x/libbb/
H A Dprocps.c25 static cache_t username, groupname; variable
35 clear_cache(&username);
56 return get_cached(&username, uid, bb_getpwuid);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/wget-1.12/tests/
H A DFTPServer.pm136 if ($conn->{username} eq "anonymous") {
399 my ($conn, $cmd, $username) = @_;
401 print STDERR "username: $username\n" if $log;
402 $conn->{username} = $username;
407 if ($conn->{username} eq "anonymous") {
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/
H A Dchgpasswd.c1010 const char *username = pdb_get_username(hnd); local
1015 username, http_timestring(can_change_time)));
1022 username));
1033 username, lp_min_passwd_length()));
1042 pass = Get_Pwnam(username);
1044 DEBUG(1, ("check_oem_password: Username %s does not exist in system !?!\n", username));
1074 !chgpasswd(username, pass, old_passwd, new_passwd, as_root)) {

Completed in 284 milliseconds

1234567891011>>