Searched refs:username (Results 226 - 250 of 313) sorted by relevance

1234567891011>>

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpcclient/
H A Dcmd_netlogon.c252 const char *username, *password; local
260 fprintf(stderr, "Usage: samlogon <username> <password> "
266 username = argv[1];
282 result = cli_netlogon_sam_logon(cli, mem_ctx, &ret_creds, username, password, logon_type);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/libbb/
H A Dprocps.c25 static cache_t username, groupname; variable
35 clear_cache(&username);
56 return get_cached(&username, uid, bb_getpwuid);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dclidfs.c35 static pstring username; variable
130 if (!cli_session_setup(c, username,
134 /* if a password was not supplied then try again with a null username */
135 if (password[0] || !username[0] || use_kerberos ||
309 pstrcpy( username, user->username );
H A Dclirap2.c483 fstring username; local
489 GETSTRINGF(p, username, RAP_USERNAME_LEN);
490 fn(username, state);
736 char username[RAP_USERNAME_LEN]; local
746 GETSTRINGF(p, username, RAP_USERNAME_LEN);
756 fn(username, comment, homedir, logonscript, cli);
1750 pstring wsname, username, clitype_name; local
1755 GETSTRINGP(p, username, rdata, converter);
1764 fn(wsname, username, num_conns, num_opens, num_users, sess_time,
1823 pstring wsname, username, clitype_nam local
1904 cli_NetConnectionEnum(struct cli_state *cli, const char *qualifier, void (*fn)(uint16 conid, uint16 contype, uint16 numopens, uint16 numusers, uint32 contime, const char *username, const char *netname)) argument
1945 pstring netname, username; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/torture/
H A Dmasktest.c26 static fstring username; variable
221 if (!cli_session_setup(c, username,
463 fstrcpy(username,getenv("USER"));
489 fstrcpy(username,optarg);
490 p = strchr_m(username,'%');
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/lib/
H A Dsubstitute.c474 * username. The %p (NIS server path) code is
477 * service name, not the username. */
616 const char *username,
622 a = alloc_sub_specified(input_string, username, domain, uid, gid);
630 const char *username,
650 t = realloc_string_sub(t, "%U", username);
653 t = realloc_string_sub(t, "%u", username);
673 t = realloc_string_sub(t, "%N", automount_server(username));
687 ret_string = alloc_sub_basic(username, a_string);
749 * username
614 talloc_sub_specified(TALLOC_CTX *mem_ctx, const char *input_string, const char *username, const char *domain, uid_t uid, gid_t gid) argument
629 alloc_sub_specified(const char *input_string, const char *username, const char *domain, uid_t uid, gid_t gid) argument
[all...]
H A Dusername.c43 BOOL split_domain_and_name(const char *name, char *domain, char* username) argument
52 fstrcpy(username, p+1);
56 fstrcpy(username, name);
62 DEBUG(10,("split_domain_and_name: all is fine, domain is |%s| and name is |%s|\n", domain, username));
86 Map a username from a dos name to a unix name by looking in the username
89 any incoming or new username - in order to canonicalize the name.
93 Returns True if username was changed, false otherwise.
128 DEBUG(0,("can't open username map %s. Error %s\n",mapfile, strerror(errno) ));
132 DEBUG(4,("Scanning username ma
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/
H A Dchgpasswd.c1010 const char *username = pdb_get_username(hnd); local
1015 username, http_timestring(can_change_time)));
1022 username));
1033 username, lp_min_passwd_length()));
1042 pass = Get_Pwnam(username);
1044 DEBUG(1, ("check_oem_password: Username %s does not exist in system !?!\n", username));
1074 !chgpasswd(username, pass, old_passwd, new_passwd, as_root)) {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/passdb/
H A Dpdb_get_set.c229 return (sampass->private.username);
610 BOOL pdb_set_username(SAM_ACCOUNT *sampass, const char *username, enum pdb_value_state flag) argument
615 if (username) {
616 DEBUG(10, ("pdb_set_username: setting username %s, was %s\n", username,
617 (sampass->private.username)?(sampass->private.username):"NULL"));
619 sampass->private.username = talloc_strdup(sampass->mem_ctx, username);
621 if (!sampass->private.username) {
[all...]
H A Dpdb_nds.c766 const char *username = pdb_get_username(sam_acct); local
770 success ? "Successful" : "Failed", username));
775 rc = ldapsam_search_suffix_by_name(ldap_state, username, &result, attr_list );
794 DEBUG(3, ("pdb_nds_update_login_attempts: username %s found dn '%s'\n", username, dn));
858 DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Successful for %s\n", username));
862 DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Failed for %s\n", username));
H A Dsecrets.c809 Caller to free() result in domain, username, password
811 void secrets_fetch_ipc_userpass(char **username, char **domain, char **password) argument
813 *username = secrets_fetch(SECRETS_AUTH_USER, NULL);
817 if (*username && **username) {
826 *domain, *username));
830 *username = smb_xstrdup("");
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/sam/
H A Didmap_rid.c150 const char *username = NULL; local
194 username = secrets_fetch(SECRETS_AUTH_USER, NULL);
198 if (username) {
206 DEBUG(3, ("rid_idmap_get_domains: IPC$ connections done by user %s\\%s\n", domain, username));
211 username = "";
221 username,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/
H A Dsmbget.c43 const char *username = NULL, *password = NULL, *workgroup = NULL; variable
87 if(!nonprompt && !username) {
92 } else if(username) strncpy(un, username, unlen-1);
520 {"username", 'u', POPT_ARG_STRING, &username, 'u', "Username to use" },
557 username = ""; password = "";
H A Dsmbpasswd.c47 printf(" smbpasswd [options] [username]\n");
58 printf(" -U USER remote username\n");
269 static BOOL password_change(const char *remote_mach, char *username, argument
282 ret = remote_password_change(remote_mach, username,
289 ret = local_password_change(username, local_flags, new_pw,
365 fprintf(stderr,"You must specify a username\n");
389 * Now ensure the username ends in '$' for
409 /* prepare uppercased and '$' terminated username */
H A Dntlm_auth.c298 /* authenticate a user with an encrypted username/password */
300 NTSTATUS contact_winbind_auth_crap(const char *username, argument
329 fstrcpy(request.data.auth_crap.user, username);
468 DEBUG(1, ("Need username and domain for NTLMSSP\n"));
484 DEBUG(1, ("Could not set username: %s\n",
1391 static char *username; local
1398 if (!full_username && !username) {
1399 x_fprintf(x_stdout, "Error: No username supplied!\n");
1403 if (asprintf(&full_username, "%s%c%s", domain, winbind_separator(), username) == -1) {
1423 if (full_username && !username) {
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dwinbind_nss_irix.c397 strncpy(request->data.username, key,
398 sizeof(request->data.username) - 1);
399 request->data.username[sizeof(request->data.username) - 1] = '\0';
H A Dwinbindd_user.c109 /* Return a password structure from a username. */
123 state->request.data.username[sizeof(state->request.data.username)-1]='\0';
126 state->request.data.username));
128 /* Parse domain and username */
130 parse_domain_user(state->request.data.username,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gettext-tools/src/
H A Dmsginit.c971 const char *username; local
975 username = getenv ("USER");
976 if (username != NULL)
979 userpasswd = getpwnam (username);
983 error (EXIT_FAILURE, errno, "getpwnam(\"%s\")", username);
987 username = getlogin ();
988 if (username != NULL)
991 userpasswd = getpwnam (username);
995 error (EXIT_FAILURE, errno, "getpwnam(\"%s\")", username);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/
H A Dchap_ms.c470 char *username, u_char Challenge[8])
477 /* remove domain from "domain\username" */
478 if ((user = strrchr(username, '\\')) != NULL)
481 user = username;
547 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, argument
554 ChallengeHash(PeerChallenge, rchallenge, username, Challenge);
590 u_char *rchallenge, char *username,
619 ChallengeHash(PeerChallenge, rchallenge, username, Challenge);
637 u_char *rchallenge, char *username,
651 rchallenge, username, authRespons
469 ChallengeHash(u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char Challenge[8]) argument
588 GenerateAuthenticatorResponse(u_char PasswordHashHash[MD4_SIGNATURE_SIZE], u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
634 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/cnid_dbd/
H A Dcnid_metad.c68 /* functions for username and group */
303 static uid_t user_to_uid (char *username) argument
308 if ( !username || strlen ( username ) < 1 ) return 0;
310 /* grab the /etc/passwd record relating to username */
311 this_passwd = getpwnam ( username );
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/include/atalk/
H A Dglobals.h111 char username[MAXUSERLEN]; member in struct:_AFPObj
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/cnid_dbd/
H A Dcnid_metad.c69 /* functions for username and group */
308 static uid_t user_to_uid (char *username) argument
313 if ( !username || strlen ( username ) < 1 ) return 0;
315 /* grab the /etc/passwd record relating to username */
316 this_passwd = getpwnam ( username );
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/include/atalk/
H A Dglobals.h116 char username[MAXUSERLEN]; member in struct:_AFPObj
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/security/selinux/include/
H A Dsecurity.h73 int security_get_user_sids(u32 callsid, char *username,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/packaging/Mandrake/
H A Dsmb.conf93 # username level = 8
119 ; username map = /etc/samba/smbusers
138 # name and username, defaults to "\"
147 # %D expanding to their domain name and %U expanding to their username:
203 # run a specific logon batch file per username
207 # %L substitutes for this servers netbios name, %u is username

Completed in 417 milliseconds

1234567891011>>