/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap_ms.h | 103 u_char *rchallenge, char *username,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | passdb.h | 160 const char * username; /* UNIX username string */ member in struct:sam_passwd::user_data 162 const char * nt_username; /* Windows username string */ 260 NTSTATUS (*pdb_getsampwnam)(struct pdb_context *, SAM_ACCOUNT *sam_acct, const char *username); 268 NTSTATUS (*pdb_delete_sam_account)(struct pdb_context *, SAM_ACCOUNT *username); 299 const char *username, 366 NTSTATUS (*getsampwnam)(struct pdb_methods *, SAM_ACCOUNT *sam_acct, const char *username); 374 NTSTATUS (*delete_sam_account)(struct pdb_methods *, SAM_ACCOUNT *username); 405 const char *username,
|
H A D | authdata.h | 35 uint16 *username; /* might not be null terminated, so not UNISTR */ member in struct:unknown_type_10
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/auth/ |
H A D | auth_util.c | 63 void auth_add_user_script(const char *domain, const char *username) argument 72 smb_create_user(domain, username, NULL); 80 if ( !winbind_create_user(username, NULL) ) { 690 static NTSTATUS get_user_groups(const char *username, uid_t uid, gid_t gid, argument 699 if (strchr(username, *lp_winbind_separator()) == NULL) { 703 result = pdb_enum_group_memberships(username, gid, groups, 711 n_unix_groups = winbind_getgroups( username, unix_groups ); 714 username, n_unix_groups == -1 ? "FAIL" : "SUCCESS")); 989 const char *username, 998 fstrcpy( lower_username, username ); 987 fill_sam_account(TALLOC_CTX *mem_ctx, const char *domain, const char *username, char **found_username, uid_t *uid, gid_t *gid, SAM_ACCOUNT **sam_account) argument 1041 fstring username; local [all...] |
H A D | auth_sam.c | 43 const char *username = pdb_get_username(sampass); local 48 DEBUG(3,("Account for user '%s' has no password and null passwords are allowed.\n", username)); 51 DEBUG(3,("Account for user '%s' has no password and null passwords are NOT allowed.\n", username)); 62 username, 221 check if a username/password is OK assuming the password is a 24 byte
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/ |
H A D | auth.c | 648 if ( 0 == (strcasecmp(obj->username, obj->options.guest)) ) { 865 char *username; local 917 username = ibuf; 980 i = afp_uam->u.uam_login.login_ext(obj, username, &pwd, ibuf, ibuflen, rbuf, rbuflen); 1013 LOG(log_note, logtype_afpd, "AFP logout by %s", obj->username); 1030 char username[MACFILELEN + 1], *start = ibuf; local 1056 if ( len > sizeof(username) - 1) { 1059 memcpy(username, ibuf, len); 1060 username[ len ] = '\0'; 1065 /* AFP > 3.0 doesn't pass the username, AP [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbwrapper/ |
H A D | smbw.c | 401 /* Return a username and password given a server and share name */ 404 char **username, char **password) 408 *username = smbw_getshared("USER"); 409 if (!*username) *username = getenv("USER"); 410 if (!*username) *username = "guest"; 436 char *username; local 448 get_auth_data_fn(server, share, &workgroup, &username, &password); 455 strcmp(username, sr 403 get_envvar_auth_data(char *server, char *share, char **workgroup, char **username, char **password) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/ |
H A D | uams_dhx2_pam.c | 175 LOG(log_info, logtype_uams, "PAM DHX2: username failure -- %s", 311 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 315 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) { 316 LOG(log_info, logtype_uams, "DHX2: unknown username"); 320 PAM_username = username; 321 LOG(log_info, logtype_uams, "DHX2 login: %s", username); 332 char *username; local 338 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) { 351 memcpy(username, ibuf, len ); 353 username[ le 366 char *username; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/uams_krb4/ |
H A D | uams_krb4.c | 128 char *username; local 137 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0) 186 strncpy( username, ad.pname, ulen ); 264 char *p, *username, *servername; local 273 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0) 341 if (( pwd = uam_getname( obj, username, strlen(username) ) ) == NULL ) { 382 strncpy(username, ad.pname, ulen); 576 char *p, *q, *username, servername; local 581 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_dhx2_pam.c | 175 LOG(log_info, logtype_uams, "PAM DHX2: username failure -- %s", 311 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 315 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) { 316 LOG(log_info, logtype_uams, "DHX2: unknown username"); 320 PAM_username = username; 321 LOG(log_info, logtype_uams, "DHX2 login: %s", username); 332 char *username; local 338 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) { 351 memcpy(username, ibuf, len ); 353 username[ le 366 char *username; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/uams_krb4/ |
H A D | uams_krb4.c | 128 char *username; local 137 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0) 186 strncpy( username, ad.pname, ulen ); 264 char *p, *username, *servername; local 273 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0) 341 if (( pwd = uam_getname( obj, username, strlen(username) ) ) == NULL ) { 382 strncpy(username, ad.pname, ulen); 576 char *p, *q, *username, servername; local 581 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | wb_client.c | 274 fstrcpy(request.data.username, user); 296 username case. */ 425 fstrcpy( request.data.acct_mgt.username, name ); 495 fstrcpy( request.data.acct_mgt.username, user ); 527 fstrcpy( request.data.acct_mgt.username, user ); 557 fstrcpy( request.data.acct_mgt.username, user ); 587 fstrcpy( request.data.acct_mgt.username, user );
|
H A D | winbindd_nss.h | 163 fstring username; /* getpwnam */ member in union:winbindd_request::__anon1703 198 fstring username; member in struct:winbindd_request::__anon1703::__anon1708
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/papd/ |
H A D | print_cups.c | 329 int cups_print_job ( char * name, char *filename, char *job, char *username, char * cupsoptions ) argument 342 if ( username != NULL ) 345 num_options = cupsAddOption("job-originating-user-name", username, num_options, &options); 346 num_options = cupsAddOption("originating-user-name", username, num_options, &options); 347 cupsSetUser ( username ); 360 LOG(log_error, logtype_papd, "Unable to print job '%s' (%s) to printer '%s' for user '%s' - CUPS error : '%s'", job, filepath, name, username, ippErrorString(cupsLastError()));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/ |
H A D | print_cups.c | 329 int cups_print_job ( char * name, char *filename, char *job, char *username, char * cupsoptions ) argument 342 if ( username != NULL ) 345 num_options = cupsAddOption("job-originating-user-name", username, num_options, &options); 346 num_options = cupsAddOption("originating-user-name", username, num_options, &options); 347 cupsSetUser ( username ); 360 LOG(log_error, logtype_papd, "Unable to print job '%s' (%s) to printer '%s' for user '%s' - CUPS error : '%s'", job, filepath, name, username, ippErrorString(cupsLastError()));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/lib/ |
H A D | system_smbd.c | 193 const char *username, 201 if (!getgroups_user(username, primary_gid, gids, num_groups)) { 192 pdb_default_enum_group_memberships(struct pdb_methods *methods, const char *username, gid_t primary_gid, DOM_SID **sids, gid_t **gids, int *num_groups) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | samlogon_cache.c | 109 username should be in UTF-8 format 112 BOOL netsamlogon_cache_store(TALLOC_CTX *mem_ctx, const char * username, NET_USER_INFO_3 *user) argument 135 /* only Samba fills in the username, not sure why NT doesn't */ 139 init_unistr2( &user->uni_user_name, username, UNI_STR_TERMINATE );
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/torture/ |
H A D | locktest.c | 26 static fstring username[2]; variable 204 fstrcpy(username[1], username[0]); 207 if (!cli_session_setup(c, username[snum], 595 fstrcpy(username[0],getenv("USER")); 596 fstrcpy(username[1],getenv("USER")); 617 fstrcpy(username[got_pass],optarg); 618 p = strchr_m(username[got_pass],'%');
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/net/ |
H A D | netiucv.c | 961 PRINT_WARN("%s: Cannot connect without username\n", netdev->name); 1382 char username[9]; local 1388 PRINT_WARN("netiucv: username too long (%d)!\n", (int) count); 1390 "%d is length of username\n", (int) count); 1397 username[i]= toupper(*p); 1404 PRINT_WARN("netiucv: Invalid char %c in username!\n", *p); 1406 "username: invalid character %c\n", *p); 1410 username[i++] = ' '; 1411 username[8] = '\0'; 1413 if (memcmp(username, pri 1794 netiucv_new_connection(struct net_device *dev, char *username) argument 1913 netiucv_init_netdevice(char *username) argument 1951 char username[9]; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/packaging/Fedora/ |
H A D | smb.conf | 62 ; username level = 8 81 ; username map = /etc/samba/smbusers 130 # run a specific logon batch file per username 134 # %L substitutes for this servers netbios name, %U is username
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/packaging/LSB/ |
H A D | smb.conf | 60 ; username level = 8 79 ; username map = /etc/samba/smbusers 132 # run a specific logon batch file per username 136 # %L substitutes for this servers netbios name, %U is username
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/packaging/RedHat/ |
H A D | smb.conf | 62 ; username level = 8 81 ; username map = /etc/samba/smbusers 130 # run a specific logon batch file per username 134 # %L substitutes for this servers netbios name, %U is username
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/tests/ |
H A D | sshserver.pl | 89 my $username = $ENV{USER}; # default user 109 $username = $ARGV[1]; 195 # Validate username 197 if(!$username) { 200 elsif($username eq 'root') { 477 push @cfgarr, "DenyUsers !$username"; 478 push @cfgarr, "AllowUsers $username"; 831 push @cfgarr, "User $username";
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | pdb_ldap.c | 442 pstring username, local 471 username[0] = '\0'; 494 if (!smbldap_get_single_pstring(ldap_state->smbldap_state->ldap_struct, entry, "uid", username)) { 499 DEBUG(2, ("init_sam_from_ldap: Entry found for user: %s\n", username)); 501 pstrcpy(nt_username, username); 505 pdb_set_username(sampass, username, PDB_SET); 553 username)); 635 talloc_sub_basic(sampass->mem_ctx, username, lp_logon_home()), 639 standard_sub_basic( username, tmpstring, sizeof(tmpstring) ); 647 talloc_sub_basic(sampass->mem_ctx, username, lp_logon_scrip 1759 const char *username = pdb_get_username(newpwd); local 2398 ldapsam_enum_group_memberships(struct pdb_methods *methods, const char *username, gid_t primary_gid, DOM_SID **sids, gid_t **gids, int *num_groups) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/libsmbclient/ |
H A D | testsmbc.c | 32 char *workgroup, int wgmaxlen, char *username, int unmaxlen, 47 fprintf(stdout, "Enter username: [%s] ", username); 53 if (temp[0]) strncpy(username, temp, unmaxlen - 1); 31 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|