Searched refs:username (Results 201 - 225 of 313) sorted by relevance

1234567891011>>

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/
H A Dchap_ms.h103 u_char *rchallenge, char *username,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/
H A Dpassdb.h160 const char * username; /* UNIX username string */ member in struct:sam_passwd::user_data
162 const char * nt_username; /* Windows username string */
260 NTSTATUS (*pdb_getsampwnam)(struct pdb_context *, SAM_ACCOUNT *sam_acct, const char *username);
268 NTSTATUS (*pdb_delete_sam_account)(struct pdb_context *, SAM_ACCOUNT *username);
299 const char *username,
366 NTSTATUS (*getsampwnam)(struct pdb_methods *, SAM_ACCOUNT *sam_acct, const char *username);
374 NTSTATUS (*delete_sam_account)(struct pdb_methods *, SAM_ACCOUNT *username);
405 const char *username,
H A Dauthdata.h35 uint16 *username; /* might not be null terminated, so not UNISTR */ member in struct:unknown_type_10
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/auth/
H A Dauth_util.c63 void auth_add_user_script(const char *domain, const char *username) argument
72 smb_create_user(domain, username, NULL);
80 if ( !winbind_create_user(username, NULL) ) {
690 static NTSTATUS get_user_groups(const char *username, uid_t uid, gid_t gid, argument
699 if (strchr(username, *lp_winbind_separator()) == NULL) {
703 result = pdb_enum_group_memberships(username, gid, groups,
711 n_unix_groups = winbind_getgroups( username, unix_groups );
714 username, n_unix_groups == -1 ? "FAIL" : "SUCCESS"));
989 const char *username,
998 fstrcpy( lower_username, username );
987 fill_sam_account(TALLOC_CTX *mem_ctx, const char *domain, const char *username, char **found_username, uid_t *uid, gid_t *gid, SAM_ACCOUNT **sam_account) argument
1041 fstring username; local
[all...]
H A Dauth_sam.c43 const char *username = pdb_get_username(sampass); local
48 DEBUG(3,("Account for user '%s' has no password and null passwords are allowed.\n", username));
51 DEBUG(3,("Account for user '%s' has no password and null passwords are NOT allowed.\n", username));
62 username,
221 check if a username/password is OK assuming the password is a 24 byte
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/
H A Dauth.c648 if ( 0 == (strcasecmp(obj->username, obj->options.guest)) ) {
865 char *username; local
917 username = ibuf;
980 i = afp_uam->u.uam_login.login_ext(obj, username, &pwd, ibuf, ibuflen, rbuf, rbuflen);
1013 LOG(log_note, logtype_afpd, "AFP logout by %s", obj->username);
1030 char username[MACFILELEN + 1], *start = ibuf; local
1056 if ( len > sizeof(username) - 1) {
1059 memcpy(username, ibuf, len);
1060 username[ len ] = '\0';
1065 /* AFP > 3.0 doesn't pass the username, AP
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbwrapper/
H A Dsmbw.c401 /* Return a username and password given a server and share name */
404 char **username, char **password)
408 *username = smbw_getshared("USER");
409 if (!*username) *username = getenv("USER");
410 if (!*username) *username = "guest";
436 char *username; local
448 get_auth_data_fn(server, share, &workgroup, &username, &password);
455 strcmp(username, sr
403 get_envvar_auth_data(char *server, char *share, char **workgroup, char **username, char **password) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/
H A Duams_dhx2_pam.c175 LOG(log_info, logtype_uams, "PAM DHX2: username failure -- %s",
311 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument
315 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) {
316 LOG(log_info, logtype_uams, "DHX2: unknown username");
320 PAM_username = username;
321 LOG(log_info, logtype_uams, "DHX2 login: %s", username);
332 char *username; local
338 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) {
351 memcpy(username, ibuf, len );
353 username[ le
366 char *username; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/uams_krb4/
H A Duams_krb4.c128 char *username; local
137 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0)
186 strncpy( username, ad.pname, ulen );
264 char *p, *username, *servername; local
273 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0)
341 if (( pwd = uam_getname( obj, username, strlen(username) ) ) == NULL ) {
382 strncpy(username, ad.pname, ulen);
576 char *p, *q, *username, servername; local
581 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username,
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/
H A Duams_dhx2_pam.c175 LOG(log_info, logtype_uams, "PAM DHX2: username failure -- %s",
311 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument
315 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) {
316 LOG(log_info, logtype_uams, "DHX2: unknown username");
320 PAM_username = username;
321 LOG(log_info, logtype_uams, "DHX2 login: %s", username);
332 char *username; local
338 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) {
351 memcpy(username, ibuf, len );
353 username[ le
366 char *username; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/uams_krb4/
H A Duams_krb4.c128 char *username; local
137 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0)
186 strncpy( username, ad.pname, ulen );
264 char *p, *username, *servername; local
273 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0)
341 if (( pwd = uam_getname( obj, username, strlen(username) ) ) == NULL ) {
382 strncpy(username, ad.pname, ulen);
576 char *p, *q, *username, servername; local
581 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username,
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dwb_client.c274 fstrcpy(request.data.username, user);
296 username case. */
425 fstrcpy( request.data.acct_mgt.username, name );
495 fstrcpy( request.data.acct_mgt.username, user );
527 fstrcpy( request.data.acct_mgt.username, user );
557 fstrcpy( request.data.acct_mgt.username, user );
587 fstrcpy( request.data.acct_mgt.username, user );
H A Dwinbindd_nss.h163 fstring username; /* getpwnam */ member in union:winbindd_request::__anon1703
198 fstring username; member in struct:winbindd_request::__anon1703::__anon1708
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/papd/
H A Dprint_cups.c329 int cups_print_job ( char * name, char *filename, char *job, char *username, char * cupsoptions ) argument
342 if ( username != NULL )
345 num_options = cupsAddOption("job-originating-user-name", username, num_options, &options);
346 num_options = cupsAddOption("originating-user-name", username, num_options, &options);
347 cupsSetUser ( username );
360 LOG(log_error, logtype_papd, "Unable to print job '%s' (%s) to printer '%s' for user '%s' - CUPS error : '%s'", job, filepath, name, username, ippErrorString(cupsLastError()));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/
H A Dprint_cups.c329 int cups_print_job ( char * name, char *filename, char *job, char *username, char * cupsoptions ) argument
342 if ( username != NULL )
345 num_options = cupsAddOption("job-originating-user-name", username, num_options, &options);
346 num_options = cupsAddOption("originating-user-name", username, num_options, &options);
347 cupsSetUser ( username );
360 LOG(log_error, logtype_papd, "Unable to print job '%s' (%s) to printer '%s' for user '%s' - CUPS error : '%s'", job, filepath, name, username, ippErrorString(cupsLastError()));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/lib/
H A Dsystem_smbd.c193 const char *username,
201 if (!getgroups_user(username, primary_gid, gids, num_groups)) {
192 pdb_default_enum_group_memberships(struct pdb_methods *methods, const char *username, gid_t primary_gid, DOM_SID **sids, gid_t **gids, int *num_groups) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dsamlogon_cache.c109 username should be in UTF-8 format
112 BOOL netsamlogon_cache_store(TALLOC_CTX *mem_ctx, const char * username, NET_USER_INFO_3 *user) argument
135 /* only Samba fills in the username, not sure why NT doesn't */
139 init_unistr2( &user->uni_user_name, username, UNI_STR_TERMINATE );
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/torture/
H A Dlocktest.c26 static fstring username[2]; variable
204 fstrcpy(username[1], username[0]);
207 if (!cli_session_setup(c, username[snum],
595 fstrcpy(username[0],getenv("USER"));
596 fstrcpy(username[1],getenv("USER"));
617 fstrcpy(username[got_pass],optarg);
618 p = strchr_m(username[got_pass],'%');
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/net/
H A Dnetiucv.c961 PRINT_WARN("%s: Cannot connect without username\n", netdev->name);
1382 char username[9]; local
1388 PRINT_WARN("netiucv: username too long (%d)!\n", (int) count);
1390 "%d is length of username\n", (int) count);
1397 username[i]= toupper(*p);
1404 PRINT_WARN("netiucv: Invalid char %c in username!\n", *p);
1406 "username: invalid character %c\n", *p);
1410 username[i++] = ' ';
1411 username[8] = '\0';
1413 if (memcmp(username, pri
1794 netiucv_new_connection(struct net_device *dev, char *username) argument
1913 netiucv_init_netdevice(char *username) argument
1951 char username[9]; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/packaging/Fedora/
H A Dsmb.conf62 ; username level = 8
81 ; username map = /etc/samba/smbusers
130 # run a specific logon batch file per username
134 # %L substitutes for this servers netbios name, %U is username
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/packaging/LSB/
H A Dsmb.conf60 ; username level = 8
79 ; username map = /etc/samba/smbusers
132 # run a specific logon batch file per username
136 # %L substitutes for this servers netbios name, %U is username
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/packaging/RedHat/
H A Dsmb.conf62 ; username level = 8
81 ; username map = /etc/samba/smbusers
130 # run a specific logon batch file per username
134 # %L substitutes for this servers netbios name, %U is username
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/tests/
H A Dsshserver.pl89 my $username = $ENV{USER}; # default user
109 $username = $ARGV[1];
195 # Validate username
197 if(!$username) {
200 elsif($username eq 'root') {
477 push @cfgarr, "DenyUsers !$username";
478 push @cfgarr, "AllowUsers $username";
831 push @cfgarr, "User $username";
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/passdb/
H A Dpdb_ldap.c442 pstring username, local
471 username[0] = '\0';
494 if (!smbldap_get_single_pstring(ldap_state->smbldap_state->ldap_struct, entry, "uid", username)) {
499 DEBUG(2, ("init_sam_from_ldap: Entry found for user: %s\n", username));
501 pstrcpy(nt_username, username);
505 pdb_set_username(sampass, username, PDB_SET);
553 username));
635 talloc_sub_basic(sampass->mem_ctx, username, lp_logon_home()),
639 standard_sub_basic( username, tmpstring, sizeof(tmpstring) );
647 talloc_sub_basic(sampass->mem_ctx, username, lp_logon_scrip
1759 const char *username = pdb_get_username(newpwd); local
2398 ldapsam_enum_group_memberships(struct pdb_methods *methods, const char *username, gid_t primary_gid, DOM_SID **sids, gid_t **gids, int *num_groups) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/libsmbclient/
H A Dtestsmbc.c32 char *workgroup, int wgmaxlen, char *username, int unmaxlen,
47 fprintf(stdout, "Enter username: [%s] ", username);
53 if (temp[0]) strncpy(username, temp, unmaxlen - 1);
31 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument

Completed in 360 milliseconds

1234567891011>>