/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpcclient/ |
H A D | cmd_netlogon.c | 252 const char *username, *password; local 260 fprintf(stderr, "Usage: samlogon <username> <password> " 266 username = argv[1]; 282 result = cli_netlogon_sam_logon(cli, mem_ctx, &ret_creds, username, password, logon_type);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/libbb/ |
H A D | procps.c | 25 static cache_t username, groupname; variable 35 clear_cache(&username); 56 return get_cached(&username, uid, bb_getpwuid);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | clidfs.c | 35 static pstring username; variable 130 if (!cli_session_setup(c, username, 134 /* if a password was not supplied then try again with a null username */ 135 if (password[0] || !username[0] || use_kerberos || 309 pstrcpy( username, user->username );
|
H A D | clirap2.c | 483 fstring username; local 489 GETSTRINGF(p, username, RAP_USERNAME_LEN); 490 fn(username, state); 736 char username[RAP_USERNAME_LEN]; local 746 GETSTRINGF(p, username, RAP_USERNAME_LEN); 756 fn(username, comment, homedir, logonscript, cli); 1750 pstring wsname, username, clitype_name; local 1755 GETSTRINGP(p, username, rdata, converter); 1764 fn(wsname, username, num_conns, num_opens, num_users, sess_time, 1823 pstring wsname, username, clitype_nam local 1904 cli_NetConnectionEnum(struct cli_state *cli, const char *qualifier, void (*fn)(uint16 conid, uint16 contype, uint16 numopens, uint16 numusers, uint32 contime, const char *username, const char *netname)) argument 1945 pstring netname, username; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/torture/ |
H A D | masktest.c | 26 static fstring username; variable 221 if (!cli_session_setup(c, username, 463 fstrcpy(username,getenv("USER")); 489 fstrcpy(username,optarg); 490 p = strchr_m(username,'%');
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/lib/ |
H A D | substitute.c | 474 * username. The %p (NIS server path) code is 477 * service name, not the username. */ 616 const char *username, 622 a = alloc_sub_specified(input_string, username, domain, uid, gid); 630 const char *username, 650 t = realloc_string_sub(t, "%U", username); 653 t = realloc_string_sub(t, "%u", username); 673 t = realloc_string_sub(t, "%N", automount_server(username)); 687 ret_string = alloc_sub_basic(username, a_string); 749 * username 614 talloc_sub_specified(TALLOC_CTX *mem_ctx, const char *input_string, const char *username, const char *domain, uid_t uid, gid_t gid) argument 629 alloc_sub_specified(const char *input_string, const char *username, const char *domain, uid_t uid, gid_t gid) argument [all...] |
H A D | username.c | 43 BOOL split_domain_and_name(const char *name, char *domain, char* username) argument 52 fstrcpy(username, p+1); 56 fstrcpy(username, name); 62 DEBUG(10,("split_domain_and_name: all is fine, domain is |%s| and name is |%s|\n", domain, username)); 86 Map a username from a dos name to a unix name by looking in the username 89 any incoming or new username - in order to canonicalize the name. 93 Returns True if username was changed, false otherwise. 128 DEBUG(0,("can't open username map %s. Error %s\n",mapfile, strerror(errno) )); 132 DEBUG(4,("Scanning username ma [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | chgpasswd.c | 1010 const char *username = pdb_get_username(hnd); local 1015 username, http_timestring(can_change_time))); 1022 username)); 1033 username, lp_min_passwd_length())); 1042 pass = Get_Pwnam(username); 1044 DEBUG(1, ("check_oem_password: Username %s does not exist in system !?!\n", username)); 1074 !chgpasswd(username, pass, old_passwd, new_passwd, as_root)) {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | pdb_get_set.c | 229 return (sampass->private.username); 610 BOOL pdb_set_username(SAM_ACCOUNT *sampass, const char *username, enum pdb_value_state flag) argument 615 if (username) { 616 DEBUG(10, ("pdb_set_username: setting username %s, was %s\n", username, 617 (sampass->private.username)?(sampass->private.username):"NULL")); 619 sampass->private.username = talloc_strdup(sampass->mem_ctx, username); 621 if (!sampass->private.username) { [all...] |
H A D | pdb_nds.c | 766 const char *username = pdb_get_username(sam_acct); local 770 success ? "Successful" : "Failed", username)); 775 rc = ldapsam_search_suffix_by_name(ldap_state, username, &result, attr_list ); 794 DEBUG(3, ("pdb_nds_update_login_attempts: username %s found dn '%s'\n", username, dn)); 858 DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Successful for %s\n", username)); 862 DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Failed for %s\n", username));
|
H A D | secrets.c | 809 Caller to free() result in domain, username, password 811 void secrets_fetch_ipc_userpass(char **username, char **domain, char **password) argument 813 *username = secrets_fetch(SECRETS_AUTH_USER, NULL); 817 if (*username && **username) { 826 *domain, *username)); 830 *username = smb_xstrdup("");
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/sam/ |
H A D | idmap_rid.c | 150 const char *username = NULL; local 194 username = secrets_fetch(SECRETS_AUTH_USER, NULL); 198 if (username) { 206 DEBUG(3, ("rid_idmap_get_domains: IPC$ connections done by user %s\\%s\n", domain, username)); 211 username = ""; 221 username,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/ |
H A D | smbget.c | 43 const char *username = NULL, *password = NULL, *workgroup = NULL; variable 87 if(!nonprompt && !username) { 92 } else if(username) strncpy(un, username, unlen-1); 520 {"username", 'u', POPT_ARG_STRING, &username, 'u', "Username to use" }, 557 username = ""; password = "";
|
H A D | smbpasswd.c | 47 printf(" smbpasswd [options] [username]\n"); 58 printf(" -U USER remote username\n"); 269 static BOOL password_change(const char *remote_mach, char *username, argument 282 ret = remote_password_change(remote_mach, username, 289 ret = local_password_change(username, local_flags, new_pw, 365 fprintf(stderr,"You must specify a username\n"); 389 * Now ensure the username ends in '$' for 409 /* prepare uppercased and '$' terminated username */
|
H A D | ntlm_auth.c | 298 /* authenticate a user with an encrypted username/password */ 300 NTSTATUS contact_winbind_auth_crap(const char *username, argument 329 fstrcpy(request.data.auth_crap.user, username); 468 DEBUG(1, ("Need username and domain for NTLMSSP\n")); 484 DEBUG(1, ("Could not set username: %s\n", 1391 static char *username; local 1398 if (!full_username && !username) { 1399 x_fprintf(x_stdout, "Error: No username supplied!\n"); 1403 if (asprintf(&full_username, "%s%c%s", domain, winbind_separator(), username) == -1) { 1423 if (full_username && !username) { [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | winbind_nss_irix.c | 397 strncpy(request->data.username, key, 398 sizeof(request->data.username) - 1); 399 request->data.username[sizeof(request->data.username) - 1] = '\0';
|
H A D | winbindd_user.c | 109 /* Return a password structure from a username. */ 123 state->request.data.username[sizeof(state->request.data.username)-1]='\0'; 126 state->request.data.username)); 128 /* Parse domain and username */ 130 parse_domain_user(state->request.data.username,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gettext-tools/src/ |
H A D | msginit.c | 971 const char *username; local 975 username = getenv ("USER"); 976 if (username != NULL) 979 userpasswd = getpwnam (username); 983 error (EXIT_FAILURE, errno, "getpwnam(\"%s\")", username); 987 username = getlogin (); 988 if (username != NULL) 991 userpasswd = getpwnam (username); 995 error (EXIT_FAILURE, errno, "getpwnam(\"%s\")", username);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap_ms.c | 470 char *username, u_char Challenge[8]) 477 /* remove domain from "domain\username" */ 478 if ((user = strrchr(username, '\\')) != NULL) 481 user = username; 547 ChapMS2_NT(u_char *rchallenge, u_char PeerChallenge[16], char *username, argument 554 ChallengeHash(PeerChallenge, rchallenge, username, Challenge); 590 u_char *rchallenge, char *username, 619 ChallengeHash(PeerChallenge, rchallenge, username, Challenge); 637 u_char *rchallenge, char *username, 651 rchallenge, username, authRespons 469 ChallengeHash(u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char Challenge[8]) argument 588 GenerateAuthenticatorResponse(u_char PasswordHashHash[MD4_SIGNATURE_SIZE], u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument 634 GenerateAuthenticatorResponsePlain(char *secret, int secret_len, u_char NTResponse[24], u_char PeerChallenge[16], u_char *rchallenge, char *username, u_char authResponse[MS_AUTH_RESPONSE_LENGTH+1]) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/cnid_dbd/ |
H A D | cnid_metad.c | 68 /* functions for username and group */ 303 static uid_t user_to_uid (char *username) argument 308 if ( !username || strlen ( username ) < 1 ) return 0; 310 /* grab the /etc/passwd record relating to username */ 311 this_passwd = getpwnam ( username );
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/include/atalk/ |
H A D | globals.h | 111 char username[MAXUSERLEN]; member in struct:_AFPObj
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/cnid_dbd/ |
H A D | cnid_metad.c | 69 /* functions for username and group */ 308 static uid_t user_to_uid (char *username) argument 313 if ( !username || strlen ( username ) < 1 ) return 0; 315 /* grab the /etc/passwd record relating to username */ 316 this_passwd = getpwnam ( username );
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/include/atalk/ |
H A D | globals.h | 116 char username[MAXUSERLEN]; member in struct:_AFPObj
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/security/selinux/include/ |
H A D | security.h | 73 int security_get_user_sids(u32 callsid, char *username,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/packaging/Mandrake/ |
H A D | smb.conf | 93 # username level = 8 119 ; username map = /etc/samba/smbusers 138 # name and username, defaults to "\" 147 # %D expanding to their domain name and %U expanding to their username: 203 # run a specific logon batch file per username 207 # %L substitutes for this servers netbios name, %u is username
|