/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/papd/ |
H A D | lp.c | 402 char *username, *afpdpid; local 413 username = auth_string; 418 if (getpwnam(username) != NULL ) { 419 LOG(log_info, logtype_papd, "CAP authenticated %s", username); 420 lp_person(username); 423 LOG(log_info, logtype_papd, "CAP error: invalid username: '%s'", username); 426 LOG(log_info, logtype_papd, "CAP error: could not read username"); 576 LOG(log_error, logtype_papd, "Error getting username (%s)", lp.lp_person);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | winbind_nss_linux.c | 461 /* Return passwd struct from username */ 485 strncpy(request.data.username, name, 486 sizeof(request.data.username) - 1); 487 request.data.username 488 [sizeof(request.data.username) - 1] = '\0'; 821 strncpy(request.data.username, user, 822 sizeof(request.data.username) - 1);
|
H A D | winbindd_cm.c | 88 Caller to free() result in domain, username, password 91 static void cm_get_ipc_userpass(char **username, char **domain, char **password) argument 93 *username = secrets_fetch(SECRETS_AUTH_USER, NULL); 97 if (*username && **username) { 106 *domain, *username)); 110 *username = smb_xstrdup(""); 329 /* Only try authenticated if we have a username */ 331 DEBUG(5, ("connecting to %s from %s with username "
|
H A D | winbindd_group.c | 1001 state->request.data.username[sizeof(state->request.data.username)-1]='\0'; 1004 state->request.data.username)); 1007 state->request.data.username))) 1010 /* Parse domain and username */ 1012 parse_domain_user(state->request.data.username, 1217 state->request.data.username))) {
|
H A D | winbindd_rpc.c | 111 fstring username, fullname; local 114 unistr2_to_ascii( username, &(&ctr.sam.info1->str[j])->uni_acct_name, sizeof(username)-1); 117 (*info)[i].acct_name = talloc_strdup(mem_ctx, username ); 361 /* Lookup user information from a rid or username. */
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | libsmbclient.c | 316 pstring username, passwd, domain; local 321 username[0] = passwd[0] = domain[0] = 0; 331 next_token(&u, username, ":", sizeof(fstring)); 338 pstrcpy(username, u); 342 if (username[0]) 343 strncpy(user, username, user_len); /* FIXME, domain */ 475 fstring username, 484 workgroup, username); 486 if (!auth_called && !srv && (!username[0] || !password[0])) { 489 username, sizeo 471 find_server(SMBCCTX *context, const char *server, const char *share, fstring workgroup, fstring username, fstring password) argument 544 smbc_server(SMBCCTX *context, const char *server, const char *share, fstring workgroup, fstring username, fstring password) argument 781 smbc_attr_server(SMBCCTX *context, const char *server, const char *share, fstring workgroup, fstring username, fstring password, POLICY_HND *pol) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/ |
H A D | volume.c | 114 #define VOLOPT_FORCEUID 19 /* force uid for username x */ 195 * $u -> username (guest is usually nobody) 323 } else if (obj->username && is_var(p, "$u")) { 327 if ( obj->options.ntseparator && (sep = strchr(obj->username, obj->options.ntseparator[0])) != NULL) 330 q = obj->username; 1266 u = obj->username; 1282 if (!pwent && obj->username) 1283 pwent = getpwnam(obj->username); 1308 (accessvol(options[VOLOPT_ALLOW].c_value, obj->username) && 1309 (accessvol(options[VOLOPT_DENY].c_value, obj->username) < [all...] |
H A D | acls.c | 1113 char *username = NULL; local 1121 EC_ZERO_LOG_ERR(getnamefromuuid(uuid, &username, &uuidtype), AFPERR_PARAM); 1198 if (username) free(username);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | pdb_smbpasswd.c | 38 const char *smb_name; /* username string */ 371 * username:uid:32hex bytes:[Account type]:LCT-12345678....other flags presently 376 * username:uid:32hex bytes:32hex bytes:[Account type]:LCT-12345678....ignored.... 679 Routine to search the smbpasswd file for an entry matching the username. 782 * username:uid:[32hex bytes]:....other flags presently 787 * username:uid:[32hex bytes]:[32hex bytes]:[attributes]:LCT-XXXXXXXX:...ignored. 1218 DEBUG(0,("build_sam_account: smbpasswd database is corrupt! username %s with uid " 1325 SAM_ACCOUNT *sam_acct, const char *username) 1332 DEBUG(10, ("getsampwnam (smbpasswd): search by name: %s\n", username)); 1344 while ( ((smb_pw=getsmbfilepwent(smbpasswd_state, fp)) != NULL)&& (!strequal(smb_pw->smb_name, username)) ) 1324 smbpasswd_getsampwnam(struct pdb_methods *my_methods, SAM_ACCOUNT *sam_acct, const char *username) argument 1482 const char *username = pdb_get_username(sampass); local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/client/ |
H A D | mount.cifs.c | 99 /* caller frees username if necessary */ 101 char *username = NULL; local 105 username = password->pw_name; 107 return username; 138 if (strncasecmp("username",line_buf+i,8) == 0) { 148 printf("mount.cifs failed due to malformed username in credentials file"); 306 to the kernel code which would think it was a real username */ 313 printf("username specified with no parameter\n"); 330 /* remove password from username */ 338 printf("username to [all...] |
H A D | tree.c | 592 /* Should put up a dialog box to ask the user for username and password */ 596 char *workgroup, int wgmaxlen, char *username, int unmaxlen, 600 strncpy(username, "test", unmaxlen); 595 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/ |
H A D | authdata.c | 62 type_10->username = PRS_ALLOC_MEM(ps, uint16, type_10->len); 63 if (!type_10->username) { 69 if (!prs_uint16s(True, "name", ps, depth, type_10->username,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/utils/ |
H A D | smbcquotas.c | 74 /* convert a SID to a string, either numeric or username/group */ 103 /* convert a string to a SID, either numeric or username/group */ 374 cmdline_auth_info.username, lp_workgroup(), 410 UQLIM:<username>/<softlimit>/<hardlimit> for user quotas\n\ 483 pstrcpy(username_str,cmdline_auth_info.username);
|
H A D | status.c | 51 const char *username = NULL; variable 596 {"user", 'u', POPT_ARG_STRING, &username, 'u', "Switch to user" }, 633 if ( username ) 634 Ucrit_addUid( nametouid(username) );
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/LDAP/smbldap-tools-0.8.7/ |
H A D | smb.conf | 6 username map = /etc/samba/smbusers
|
H A D | smbldap-useradd | 44 print "Usage: $0 [-awmugdsckABCDEFGHMNPST?] username\n"; 100 print "$0: illegal username\n"; 538 defaults to gecos or username, if gecos not set 541 defaults to username
|
H A D | smbldap_tools.pm | 293 # bool = is_samba_user($username) 821 my ($str, $username) = @_; 822 $str =~ s/%U/$username/ if ($str);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bpalogin/ |
H A D | bpalogin.h | 277 char username[MAXUSERNAME]; member in struct:session
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/ |
H A D | gtls.c | 364 infof(data, "Using TLS-SRP username: %s\n", data->set.ssl.username); 376 data->set.ssl.username, 556 && data->set.ssl.username != NULL 972 && data->set.ssl.username != NULL)
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/mtools-4.0.10/ |
H A D | floppyd.c | 801 char* username = strdup("nobody"); local 830 free(username); username = strdup(optarg); 942 initgroups(username, -1);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpcclient/ |
H A D | cmd_spoolss.c | 2102 fstring username = "", document = "", text_status = ""; local 2104 rpcstr_pull(username, job->username.buffer, 2105 sizeof(username), -1, STR_TERMINATE); 2114 username, document, text_status, job->pagesprinted, 2120 fstring username = "", document = "", text_status = ""; local 2122 rpcstr_pull(username, job->username.buffer, 2123 sizeof(username), -1, STR_TERMINATE); 2132 username, documen [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | service.c | 91 int add_home_service(const char *service, const char *username, const char *homedir) argument 102 * If this is a winbindd provided username, remove 117 if (!lp_add_home(service, iHomeService, username, homedir)) { 156 iService = add_home_service(service,service /* 'username' */, phome_dir); 339 DEBUG( 2, ( "Invalid username/password for [%s]\n", 750 share name isn't the same as unix username. 769 * as the username. */
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/libsmbclient/ |
H A D | tree.c | 594 /* Should put up a dialog box to ask the user for username and password */ 598 char *workgroup, int wgmaxlen, char *username, int unmaxlen, 602 strncpy(username, "test", unmaxlen); 597 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/ |
H A D | pampass.c | 26 * username/password pairs, account managment, session and access control. 187 static void pwd_sub(char *buf, const char *username, const char *oldpass, const char *newpass) argument 189 fstring_sub(buf, "%u", username);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/bftpd-1.6.6/ |
H A D | commands.c | 301 void command_user(char *username) argument 314 //if ( strlen(username) != 0 && strcmp(username, "admin") != 0 ) { 318 username = modified_user; 330 else if ( strlen(username) != 0 && strcmp(username, "anonymous") == 0 ) { 344 mystrncpy(user, username, sizeof(user) - 1); 1947 {"USER", "<sp> username", command_user, STATE_CONNECTED, 0},
|