Searched refs:username (Results 126 - 150 of 313) sorted by relevance

1234567891011>>

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/write/
H A Dwrite_8.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dwrite_9.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/python/
H A Dpy_winbind.c391 char *username, *password; local
393 if (!PyArg_ParseTuple(args, "ss", &username, &password))
399 fstrcpy(request.data.auth.user, username);
416 {"username", "password", "use_lm_hash", "use_nt_hash", NULL };
419 char *username, *password; local
423 args, kw, "ss|ii", kwlist, &username, &password,
430 if (push_utf8_fstring(request.data.auth_crap.user, username) == -1) {
465 {"username", "password", "use_lm_hash", "use_nt_hash", NULL };
468 char *username, *password;
472 args, kw, "ss|ii", kwlist, &username,
526 char *username; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/
H A Duams_dhx_pam.c119 LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: username failure -- %s",
322 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument
326 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) {
327 LOG(log_info, logtype_uams, "uams_dhx_pam.c: unknown username [%s]", username);
331 PAM_username = username;
332 LOG(log_info, logtype_uams, "dhx login: %s", username);
343 char *username; local
349 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) {
362 memcpy(username, ibu
377 char *username; local
566 pam_changepw(void *obj, char *username, struct passwd *pwd _U_, char *ibuf, size_t ibuflen, char *rbuf, size_t *rbuflen) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/passdb/
H A Dpdb_sql.c29 #define CONFIG_USERNAME_DEFAULT "username"
207 field_string = config_value_read(data, "username column",
229 config_value_read(data, "username column",
233 config_value_read(data, "nt username column",
287 config_value_read(data, "username column",
407 config_value_write(location, "username column",
422 "nt username column",
524 username_column = config_value_read(data, "username column", CONFIG_USERNAME_DEFAULT);
527 DEBUG(0,("Please specify both a valid 'user sid column' and a valid 'username column' in smb.conf\n"));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/
H A Dsession.c121 fstrcpy(sessionid.username, vuser->user.unix_name);
132 if (!smb_pam_claim_session(sessionid.username, sessionid.id_str, sessionid.hostname)) {
134 sessionid.username, sessionid.id_str));
149 sys_utmp_claim(sessionid.username, sessionid.hostname,
191 sys_utmp_yield(sessionid.username, sessionid.hostname,
196 smb_pam_close_session(sessionid.username, sessionid.id_str, sessionid.hostname);
230 current->username, current->remote_machine));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/bftpd-1.6.6/
H A Dbftpdutmp.c97 int bftpdutmp_usercount(char *username) argument
107 bftpd_log("bu_name=%s; username=%s, bu_type=%i\n", tmp.bu_name, username, tmp.bu_type);
109 if (tmp.bu_type && ( !strcmp(tmp.bu_name, username) || !strcmp(username, "*")))
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/
H A Duams_dhx_pam.c119 LOG(log_info, logtype_uams, "uams_dhx_pam.c :PAM: username failure -- %s",
322 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument
326 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) {
327 LOG(log_info, logtype_uams, "uams_dhx_pam.c: unknown username");
331 PAM_username = username;
332 LOG(log_info, logtype_uams, "dhx login: %s", username);
343 char *username; local
349 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) {
362 memcpy(username, ibuf, len );
364 username[ le
377 char *username; local
566 pam_changepw(void *obj, char *username, struct passwd *pwd _U_, char *ibuf, size_t ibuflen, char *rbuf, size_t *rbuflen) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dclimessage.c29 int cli_message_start_build(struct cli_state *cli, char *host, char *username) argument
42 p += clistr_push(cli, p, username, -1, STR_ASCII|STR_TERMINATE);
51 BOOL cli_message_start(struct cli_state *cli, char *host, char *username, argument
54 cli_message_start_build(cli, host, username);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/
H A Duam.c224 static char username[256]; local
258 CH_UCS2, name, -1, username, sizeof(username))))
267 pwent->pw_gecos, -1, user, sizeof(username))) )
270 pwent->pw_name, -1, pwname, sizeof(username))) )
277 if ( (namelen == gecoslen && strncasecmp_w((ucs2_t*)user, (ucs2_t*)username, len) == 0) ||
278 ( namelen == pwnamelen && strncasecmp_w ( (ucs2_t*) pwname, (ucs2_t*) username, len) == 0)) {
362 *buf = obj->username;
364 *len = sizeof(obj->username) - 1;
526 char *hostname, char *username, cha
525 uam_sia_validate_user(sia_collect_func_t * collect, int argc, char **argv, char *hostname, char *username, char *tty, int colinput, char *gssapi, char *passphrase) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/
H A Duam.c224 static char username[256]; local
260 CH_UCS2, name, -1, username, sizeof(username))))
269 pwent->pw_gecos, -1, user, sizeof(username));
271 pwent->pw_name, -1, pwname, sizeof(username));
279 if ( (namelen == gecoslen && strncasecmp_w((ucs2_t*)user, (ucs2_t*)username, len) == 0) ||
280 ( namelen == pwnamelen && strncasecmp_w ( (ucs2_t*) pwname, (ucs2_t*) username, len) == 0)) {
364 *buf = obj->username;
366 *len = sizeof(obj->username) - 1;
531 char *hostname, char *username, cha
530 uam_sia_validate_user(sia_collect_func_t * collect, int argc, char **argv, char *hostname, char *username, char *tty, int colinput, char *gssapi, char *passphrase) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbwrapper/
H A Dsmbsh.in13 echo username?
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/stf/
H A Dstf.py13 # Format is a list of server:domain\username%password separated
26 username = m.group(4)
33 "administrator": {"username": username,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/fstat/
H A Dfstat_6.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/list_print_jobs/
H A Dlist_print_jobs_1.c25 char *username, int unmaxlen, char *password, int pwmaxlen)
30 strncpy(username, g_username, unmaxlen - 1);
24 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlist_print_jobs_2.c24 char *username, int unmaxlen, char *password, int pwmaxlen)
29 strncpy(username, g_username, unmaxlen - 1);
23 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlist_print_jobs_3.c22 char *username, int unmaxlen, char *password, int pwmaxlen)
27 strncpy(username, g_username, unmaxlen - 1);
21 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlist_print_jobs_4.c22 char *username, int unmaxlen, char *password, int pwmaxlen)
27 strncpy(username, g_username, unmaxlen - 1);
21 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlist_print_jobs_5.c24 char *username, int unmaxlen, char *password, int pwmaxlen)
29 strncpy(username, g_username, unmaxlen - 1);
23 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlist_print_jobs_6.c23 char *username, int unmaxlen, char *password, int pwmaxlen)
28 strncpy(username, g_username, unmaxlen - 1);
22 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlist_print_jobs_7.c22 char *username, int unmaxlen, char *password, int pwmaxlen)
27 strncpy(username, g_username, unmaxlen - 1);
21 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/lseek/
H A Dlseek_3.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlseek_4.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlseek_5.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
H A Dlseek_6.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument

Completed in 191 milliseconds

1234567891011>>