/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | wb_client.c | 274 fstrcpy(request.data.username, user); 296 username case. */ 425 fstrcpy( request.data.acct_mgt.username, name ); 495 fstrcpy( request.data.acct_mgt.username, user ); 527 fstrcpy( request.data.acct_mgt.username, user ); 557 fstrcpy( request.data.acct_mgt.username, user ); 587 fstrcpy( request.data.acct_mgt.username, user );
|
H A D | winbindd_nss.h | 163 fstring username; /* getpwnam */ member in union:winbindd_request::__anon1729 198 fstring username; member in struct:winbindd_request::__anon1729::__anon1734
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/torture/ |
H A D | locktest.c | 26 static fstring username[2]; variable 204 fstrcpy(username[1], username[0]); 207 if (!cli_session_setup(c, username[snum], 595 fstrcpy(username[0],getenv("USER")); 596 fstrcpy(username[1],getenv("USER")); 617 fstrcpy(username[got_pass],optarg); 618 p = strchr_m(username[got_pass],'%');
|
H A D | masktest.c | 26 static fstring username; variable 221 if (!cli_session_setup(c, username, 463 fstrcpy(username,getenv("USER")); 489 fstrcpy(username,optarg); 490 p = strchr_m(username,'%');
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bpalogin/ |
H A D | bpalogin.c | 48 s->debug(1,"username = %s\n",s->username); 55 if(!strcmp(s->username,""))
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/lib/ |
H A D | system_smbd.c | 193 const char *username, 201 if (!getgroups_user(username, primary_gid, gids, num_groups)) { 192 pdb_default_enum_group_memberships(struct pdb_methods *methods, const char *username, gid_t primary_gid, DOM_SID **sids, gid_t **gids, int *num_groups) argument
|
H A D | substitute.c | 474 * username. The %p (NIS server path) code is 477 * service name, not the username. */ 616 const char *username, 622 a = alloc_sub_specified(input_string, username, domain, uid, gid); 630 const char *username, 650 t = realloc_string_sub(t, "%U", username); 653 t = realloc_string_sub(t, "%u", username); 673 t = realloc_string_sub(t, "%N", automount_server(username)); 687 ret_string = alloc_sub_basic(username, a_string); 749 * username 614 talloc_sub_specified(TALLOC_CTX *mem_ctx, const char *input_string, const char *username, const char *domain, uid_t uid, gid_t gid) argument 629 alloc_sub_specified(const char *input_string, const char *username, const char *domain, uid_t uid, gid_t gid) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | samlogon_cache.c | 109 username should be in UTF-8 format 112 BOOL netsamlogon_cache_store(TALLOC_CTX *mem_ctx, const char * username, NET_USER_INFO_3 *user) argument 135 /* only Samba fills in the username, not sure why NT doesn't */ 139 init_unistr2( &user->uni_user_name, username, UNI_STR_TERMINATE );
|
H A D | clidfs.c | 35 static pstring username; variable 130 if (!cli_session_setup(c, username, 134 /* if a password was not supplied then try again with a null username */ 135 if (password[0] || !username[0] || use_kerberos || 309 pstrcpy( username, user->username );
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/drivers/s390/net/ |
H A D | netiucv.c | 961 PRINT_WARN("%s: Cannot connect without username\n", netdev->name); 1382 char username[9]; local 1388 PRINT_WARN("netiucv: username too long (%d)!\n", (int) count); 1390 "%d is length of username\n", (int) count); 1397 username[i]= toupper(*p); 1404 PRINT_WARN("netiucv: Invalid char %c in username!\n", *p); 1406 "username: invalid character %c\n", *p); 1410 username[i++] = ' '; 1411 username[8] = '\0'; 1413 if (memcmp(username, pri 1794 netiucv_new_connection(struct net_device *dev, char *username) argument 1913 netiucv_init_netdevice(char *username) argument 1951 char username[9]; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/tests/ |
H A D | sshserver.pl | 89 my $username = $ENV{USER}; # default user 109 $username = $ARGV[1]; 195 # Validate username 197 if(!$username) { 200 elsif($username eq 'root') { 477 push @cfgarr, "DenyUsers !$username"; 478 push @cfgarr, "AllowUsers $username"; 831 push @cfgarr, "User $username";
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/Fedora/ |
H A D | smb.conf | 62 ; username level = 8 81 ; username map = /etc/samba/smbusers 130 # run a specific logon batch file per username 134 # %L substitutes for this servers netbios name, %U is username
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/LSB/ |
H A D | smb.conf | 60 ; username level = 8 79 ; username map = /etc/samba/smbusers 132 # run a specific logon batch file per username 136 # %L substitutes for this servers netbios name, %U is username
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/packaging/RedHat/ |
H A D | smb.conf | 62 ; username level = 8 81 ; username map = /etc/samba/smbusers 130 # run a specific logon batch file per username 134 # %L substitutes for this servers netbios name, %U is username
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/ |
H A D | auth_sam.c | 43 const char *username = pdb_get_username(sampass); local 48 DEBUG(3,("Account for user '%s' has no password and null passwords are allowed.\n", username)); 51 DEBUG(3,("Account for user '%s' has no password and null passwords are NOT allowed.\n", username)); 62 username, 221 check if a username/password is OK assuming the password is a 24 byte
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/include/ |
H A D | authdata.h | 35 uint16 *username; /* might not be null terminated, so not UNISTR */ member in struct:unknown_type_10
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | pdb_ldap.c | 442 pstring username, local 471 username[0] = '\0'; 494 if (!smbldap_get_single_pstring(ldap_state->smbldap_state->ldap_struct, entry, "uid", username)) { 499 DEBUG(2, ("init_sam_from_ldap: Entry found for user: %s\n", username)); 501 pstrcpy(nt_username, username); 505 pdb_set_username(sampass, username, PDB_SET); 553 username)); 635 talloc_sub_basic(sampass->mem_ctx, username, lp_logon_home()), 639 standard_sub_basic( username, tmpstring, sizeof(tmpstring) ); 647 talloc_sub_basic(sampass->mem_ctx, username, lp_logon_scrip 1759 const char *username = pdb_get_username(newpwd); local 2398 ldapsam_enum_group_memberships(struct pdb_methods *methods, const char *username, gid_t primary_gid, DOM_SID **sids, gid_t **gids, int *num_groups) argument [all...] |
H A D | pdb_get_set.c | 229 return (sampass->private.username); 610 BOOL pdb_set_username(SAM_ACCOUNT *sampass, const char *username, enum pdb_value_state flag) argument 615 if (username) { 616 DEBUG(10, ("pdb_set_username: setting username %s, was %s\n", username, 617 (sampass->private.username)?(sampass->private.username):"NULL")); 619 sampass->private.username = talloc_strdup(sampass->mem_ctx, username); 621 if (!sampass->private.username) { [all...] |
H A D | pdb_nds.c | 766 const char *username = pdb_get_username(sam_acct); local 770 success ? "Successful" : "Failed", username)); 775 rc = ldapsam_search_suffix_by_name(ldap_state, username, &result, attr_list ); 794 DEBUG(3, ("pdb_nds_update_login_attempts: username %s found dn '%s'\n", username, dn)); 858 DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Successful for %s\n", username)); 862 DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Failed for %s\n", username));
|
H A D | secrets.c | 809 Caller to free() result in domain, username, password 811 void secrets_fetch_ipc_userpass(char **username, char **domain, char **password) argument 813 *username = secrets_fetch(SECRETS_AUTH_USER, NULL); 817 if (*username && **username) { 826 *domain, *username)); 830 *username = smb_xstrdup("");
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpcclient/ |
H A D | cmd_netlogon.c | 252 const char *username, *password; local 260 fprintf(stderr, "Usage: samlogon <username> <password> " 266 username = argv[1]; 282 result = cli_netlogon_sam_logon(cli, mem_ctx, &ret_creds, username, password, logon_type);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/libsmbclient/ |
H A D | testsmbc.c | 32 char *workgroup, int wgmaxlen, char *username, int unmaxlen, 47 fprintf(stdout, "Enter username: [%s] ", username); 53 if (temp[0]) strncpy(username, temp, unmaxlen - 1); 31 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/busybox-1.x/libbb/ |
H A D | procps.c | 25 static cache_t username, groupname; variable 35 clear_cache(&username); 56 return get_cached(&username, uid, bb_getpwuid);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/wget-1.12/tests/ |
H A D | FTPServer.pm | 136 if ($conn->{username} eq "anonymous") { 399 my ($conn, $cmd, $username) = @_; 401 print STDERR "username: $username\n" if $log; 402 $conn->{username} = $username; 407 if ($conn->{username} eq "anonymous") {
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | chgpasswd.c | 1010 const char *username = pdb_get_username(hnd); local 1015 username, http_timestring(can_change_time))); 1022 username)); 1033 username, lp_min_passwd_length())); 1042 pass = Get_Pwnam(username); 1044 DEBUG(1, ("check_oem_password: Username %s does not exist in system !?!\n", username)); 1074 !chgpasswd(username, pass, old_passwd, new_passwd, as_root)) {
|