/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/write/ |
H A D | write_8.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | write_9.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/python/ |
H A D | py_winbind.c | 391 char *username, *password; local 393 if (!PyArg_ParseTuple(args, "ss", &username, &password)) 399 fstrcpy(request.data.auth.user, username); 416 {"username", "password", "use_lm_hash", "use_nt_hash", NULL }; 419 char *username, *password; local 423 args, kw, "ss|ii", kwlist, &username, &password, 430 if (push_utf8_fstring(request.data.auth_crap.user, username) == -1) { 465 {"username", "password", "use_lm_hash", "use_nt_hash", NULL }; 468 char *username, *password; 472 args, kw, "ss|ii", kwlist, &username, 526 char *username; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_dhx_pam.c | 119 LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: username failure -- %s", 322 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 326 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) { 327 LOG(log_info, logtype_uams, "uams_dhx_pam.c: unknown username [%s]", username); 331 PAM_username = username; 332 LOG(log_info, logtype_uams, "dhx login: %s", username); 343 char *username; local 349 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) { 362 memcpy(username, ibu 377 char *username; local 566 pam_changepw(void *obj, char *username, struct passwd *pwd _U_, char *ibuf, size_t ibuflen, char *rbuf, size_t *rbuflen) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | pdb_sql.c | 29 #define CONFIG_USERNAME_DEFAULT "username" 207 field_string = config_value_read(data, "username column", 229 config_value_read(data, "username column", 233 config_value_read(data, "nt username column", 287 config_value_read(data, "username column", 407 config_value_write(location, "username column", 422 "nt username column", 524 username_column = config_value_read(data, "username column", CONFIG_USERNAME_DEFAULT); 527 DEBUG(0,("Please specify both a valid 'user sid column' and a valid 'username column' in smb.conf\n"));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | session.c | 121 fstrcpy(sessionid.username, vuser->user.unix_name); 132 if (!smb_pam_claim_session(sessionid.username, sessionid.id_str, sessionid.hostname)) { 134 sessionid.username, sessionid.id_str)); 149 sys_utmp_claim(sessionid.username, sessionid.hostname, 191 sys_utmp_yield(sessionid.username, sessionid.hostname, 196 smb_pam_close_session(sessionid.username, sessionid.id_str, sessionid.hostname); 230 current->username, current->remote_machine));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/bftpd-1.6.6/ |
H A D | bftpdutmp.c | 97 int bftpdutmp_usercount(char *username) argument 107 bftpd_log("bu_name=%s; username=%s, bu_type=%i\n", tmp.bu_name, username, tmp.bu_type); 109 if (tmp.bu_type && ( !strcmp(tmp.bu_name, username) || !strcmp(username, "*")))
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/ |
H A D | uams_dhx_pam.c | 119 LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: username failure -- %s", 322 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 326 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) { 327 LOG(log_info, logtype_uams, "uams_dhx_pam.c: unknown username"); 331 PAM_username = username; 332 LOG(log_info, logtype_uams, "dhx login: %s", username); 343 char *username; local 349 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) { 362 memcpy(username, ibuf, len ); 364 username[ le 377 char *username; local 566 pam_changepw(void *obj, char *username, struct passwd *pwd _U_, char *ibuf, size_t ibuflen, char *rbuf, size_t *rbuflen) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | climessage.c | 29 int cli_message_start_build(struct cli_state *cli, char *host, char *username) argument 42 p += clistr_push(cli, p, username, -1, STR_ASCII|STR_TERMINATE); 51 BOOL cli_message_start(struct cli_state *cli, char *host, char *username, argument 54 cli_message_start_build(cli, host, username);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/ |
H A D | uam.c | 224 static char username[256]; local 258 CH_UCS2, name, -1, username, sizeof(username)))) 267 pwent->pw_gecos, -1, user, sizeof(username))) ) 270 pwent->pw_name, -1, pwname, sizeof(username))) ) 277 if ( (namelen == gecoslen && strncasecmp_w((ucs2_t*)user, (ucs2_t*)username, len) == 0) || 278 ( namelen == pwnamelen && strncasecmp_w ( (ucs2_t*) pwname, (ucs2_t*) username, len) == 0)) { 362 *buf = obj->username; 364 *len = sizeof(obj->username) - 1; 526 char *hostname, char *username, cha 525 uam_sia_validate_user(sia_collect_func_t * collect, int argc, char **argv, char *hostname, char *username, char *tty, int colinput, char *gssapi, char *passphrase) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/ |
H A D | uam.c | 224 static char username[256]; local 260 CH_UCS2, name, -1, username, sizeof(username)))) 269 pwent->pw_gecos, -1, user, sizeof(username)); 271 pwent->pw_name, -1, pwname, sizeof(username)); 279 if ( (namelen == gecoslen && strncasecmp_w((ucs2_t*)user, (ucs2_t*)username, len) == 0) || 280 ( namelen == pwnamelen && strncasecmp_w ( (ucs2_t*) pwname, (ucs2_t*) username, len) == 0)) { 364 *buf = obj->username; 366 *len = sizeof(obj->username) - 1; 531 char *hostname, char *username, cha 530 uam_sia_validate_user(sia_collect_func_t * collect, int argc, char **argv, char *hostname, char *username, char *tty, int colinput, char *gssapi, char *passphrase) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbwrapper/ |
H A D | smbsh.in | 13 echo username?
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/stf/ |
H A D | stf.py | 13 # Format is a list of server:domain\username%password separated 26 username = m.group(4) 33 "administrator": {"username": username,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/fstat/ |
H A D | fstat_6.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/list_print_jobs/ |
H A D | list_print_jobs_1.c | 25 char *username, int unmaxlen, char *password, int pwmaxlen) 30 strncpy(username, g_username, unmaxlen - 1); 24 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | list_print_jobs_2.c | 24 char *username, int unmaxlen, char *password, int pwmaxlen) 29 strncpy(username, g_username, unmaxlen - 1); 23 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | list_print_jobs_3.c | 22 char *username, int unmaxlen, char *password, int pwmaxlen) 27 strncpy(username, g_username, unmaxlen - 1); 21 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | list_print_jobs_4.c | 22 char *username, int unmaxlen, char *password, int pwmaxlen) 27 strncpy(username, g_username, unmaxlen - 1); 21 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | list_print_jobs_5.c | 24 char *username, int unmaxlen, char *password, int pwmaxlen) 29 strncpy(username, g_username, unmaxlen - 1); 23 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | list_print_jobs_6.c | 23 char *username, int unmaxlen, char *password, int pwmaxlen) 28 strncpy(username, g_username, unmaxlen - 1); 22 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | list_print_jobs_7.c | 22 char *username, int unmaxlen, char *password, int pwmaxlen) 27 strncpy(username, g_username, unmaxlen - 1); 21 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/lseek/ |
H A D | lseek_3.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | lseek_4.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | lseek_5.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
H A D | lseek_6.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|