/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | winbind_nss_solaris.c | 61 const char *username; member in struct:nss_groupsbymem 286 _nss_winbind_initgroups_dyn(gmem->username,
|
H A D | winbind_nss_linux.c | 461 /* Return passwd struct from username */ 485 strncpy(request.data.username, name, 486 sizeof(request.data.username) - 1); 487 request.data.username 488 [sizeof(request.data.username) - 1] = '\0'; 821 strncpy(request.data.username, user, 822 sizeof(request.data.username) - 1);
|
H A D | winbindd_cm.c | 88 Caller to free() result in domain, username, password 91 static void cm_get_ipc_userpass(char **username, char **domain, char **password) argument 93 *username = secrets_fetch(SECRETS_AUTH_USER, NULL); 97 if (*username && **username) { 106 *domain, *username)); 110 *username = smb_xstrdup(""); 329 /* Only try authenticated if we have a username */ 331 DEBUG(5, ("connecting to %s from %s with username "
|
H A D | winbindd_group.c | 1001 state->request.data.username[sizeof(state->request.data.username)-1]='\0'; 1004 state->request.data.username)); 1007 state->request.data.username))) 1010 /* Parse domain and username */ 1012 parse_domain_user(state->request.data.username, 1217 state->request.data.username))) {
|
H A D | winbindd_rpc.c | 111 fstring username, fullname; local 114 unistr2_to_ascii( username, &(&ctr.sam.info1->str[j])->uni_acct_name, sizeof(username)-1); 117 (*info)[i].acct_name = talloc_strdup(mem_ctx, username ); 361 /* Lookup user information from a rid or username. */
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_client/ |
H A D | cli_netlogon.c | 531 const char *username, const char *password, 572 username, cli->clnt_name_slash, 591 username, cli->clnt_name_slash, chal, 641 const char *username, const char *domain, const char *workstation, 689 username, workstation_name_slash, (const uchar*)chal, 529 cli_netlogon_sam_logon(struct cli_state *cli, TALLOC_CTX *mem_ctx, DOM_CRED *ret_creds, const char *username, const char *password, int logon_type) argument 639 cli_netlogon_sam_network_logon(struct cli_state *cli, TALLOC_CTX *mem_ctx, DOM_CRED *ret_creds, const char *username, const char *domain, const char *workstation, const uint8 chal[8], DATA_BLOB lm_response, DATA_BLOB nt_response, NET_USER_INFO_3 *info3) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/torture/ |
H A D | locktest2.c | 26 static fstring username; variable 179 username, lp_workgroup(), password, 0, 507 fstrcpy(username,getenv("USER")); 515 fstrcpy(username,optarg); 516 p = strchr_m(username,'%');
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/ |
H A D | net_rap.c | 272 static void list_sessions_func(char *wsname, char *username, uint16 conns, argument 281 wsname, username, clitype, opens, hrs, min, sec); 284 static void display_session_func(const char *wsname, const char *username, argument 301 username, wsname, 308 const char *username, const char *netname) 878 d_printf("net rap validate <username> [password]\n"\ 306 display_conns_func(uint16 conn_id, uint16 conn_type, uint16 opens, uint16 users, uint32 conn_time, const char *username, const char *netname) argument
|
H A D | smbcquotas.c | 74 /* convert a SID to a string, either numeric or username/group */ 103 /* convert a string to a SID, either numeric or username/group */ 374 cmdline_auth_info.username, lp_workgroup(), 410 UQLIM:<username>/<softlimit>/<hardlimit> for user quotas\n\ 483 pstrcpy(username_str,cmdline_auth_info.username);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/python/ |
H A D | py_smb.c | 101 char *username, *domain, *password, *errstr; local 107 if (!py_parse_creds(creds, &username, &domain, &password, &errstr)) { 113 cli->cli, username, password, strlen(password) + 1,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/papd/ |
H A D | queries.c | 711 char username[UAM_USERNAMELEN + 1] = "\0"; local 748 if ( (papd_uam->u.uam_printer(p,stop,username,out)) == 0 ) { 749 lp_person( username ); 751 LOG(log_info, logtype_papd, "RBILogin: Logged in '%s'", username);
|
H A D | lp.c | 402 char *username, *afpdpid; local 413 username = auth_string; 418 if (getpwnam(username) != NULL ) { 419 LOG(log_info, logtype_papd, "CAP authenticated %s", username); 420 lp_person(username); 423 LOG(log_info, logtype_papd, "CAP error: invalid username: '%s'", username); 426 LOG(log_info, logtype_papd, "CAP error: could not read username"); 576 LOG(log_error, logtype_papd, "Error getting username (%s)", lp.lp_person);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/ |
H A D | queries.c | 711 char username[UAM_USERNAMELEN + 1] = "\0"; local 748 if ( (papd_uam->u.uam_printer(p,stop,username,out)) == 0 ) { 749 lp_person( username ); 751 LOG(log_info, logtype_papd, "RBILogin: Logged in '%s'", username);
|
H A D | lp.c | 402 char *username, *afpdpid; local 413 username = auth_string; 418 if (getpwnam(username) != NULL ) { 419 LOG(log_info, logtype_papd, "CAP authenticated %s", username); 420 lp_person(username); 423 LOG(log_info, logtype_papd, "CAP error: invalid username: '%s'", username); 426 LOG(log_info, logtype_papd, "CAP error: could not read username"); 576 LOG(log_error, logtype_papd, "Error getting username (%s)", lp.lp_person);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | libsmbclient.h | 223 * @param unlen The size of the username buffer in bytes 285 * @param username username used to connect 292 const char * workgroup, const char * username); 305 * @param username username to match 312 const char * username); 357 /** username used for making connections 720 * try again with an empty username and password. This
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | pdb_interface.c | 187 static NTSTATUS context_getsampwnam(struct pdb_context *context, SAM_ACCOUNT *sam_acct, const char *username) argument 198 if (NT_STATUS_IS_OK(ret = curmethods->getsampwnam(curmethods, sam_acct, username))) { 494 const char *username, 507 enum_group_memberships(context->pdb_methods, username, 935 BOOL pdb_getsampwnam(SAM_ACCOUNT *sam_acct, const char *username) argument 944 sam_acct, username))) 1126 NTSTATUS pdb_enum_group_memberships(const char *username, gid_t primary_gid, argument 1136 return pdb_context->pdb_enum_group_memberships(pdb_context, username, 493 context_enum_group_memberships(struct pdb_context *context, const char *username, gid_t primary_gid, DOM_SID **sids, gid_t **gids, int *num_groups) argument
|
H A D | pdb_smbpasswd.c | 38 const char *smb_name; /* username string */ 371 * username:uid:32hex bytes:[Account type]:LCT-12345678....other flags presently 376 * username:uid:32hex bytes:32hex bytes:[Account type]:LCT-12345678....ignored.... 679 Routine to search the smbpasswd file for an entry matching the username. 782 * username:uid:[32hex bytes]:....other flags presently 787 * username:uid:[32hex bytes]:[32hex bytes]:[attributes]:LCT-XXXXXXXX:...ignored. 1218 DEBUG(0,("build_sam_account: smbpasswd database is corrupt! username %s with uid " 1325 SAM_ACCOUNT *sam_acct, const char *username) 1332 DEBUG(10, ("getsampwnam (smbpasswd): search by name: %s\n", username)); 1344 while ( ((smb_pw=getsmbfilepwent(smbpasswd_state, fp)) != NULL)&& (!strequal(smb_pw->smb_name, username)) ) 1324 smbpasswd_getsampwnam(struct pdb_methods *my_methods, SAM_ACCOUNT *sam_acct, const char *username) argument 1482 const char *username = pdb_get_username(sampass); local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | libsmbclient.c | 316 pstring username, passwd, domain; local 321 username[0] = passwd[0] = domain[0] = 0; 331 next_token(&u, username, ":", sizeof(fstring)); 338 pstrcpy(username, u); 342 if (username[0]) 343 strncpy(user, username, user_len); /* FIXME, domain */ 475 fstring username, 484 workgroup, username); 486 if (!auth_called && !srv && (!username[0] || !password[0])) { 489 username, sizeo 471 find_server(SMBCCTX *context, const char *server, const char *share, fstring workgroup, fstring username, fstring password) argument 544 smbc_server(SMBCCTX *context, const char *server, const char *share, fstring workgroup, fstring username, fstring password) argument 781 smbc_attr_server(SMBCCTX *context, const char *server, const char *share, fstring workgroup, fstring username, fstring password, POLICY_HND *pol) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/ |
H A D | volume.c | 114 #define VOLOPT_FORCEUID 19 /* force uid for username x */ 195 * $u -> username (guest is usually nobody) 323 } else if (obj->username && is_var(p, "$u")) { 327 if ( obj->options.ntseparator && (sep = strchr(obj->username, obj->options.ntseparator[0])) != NULL) 330 q = obj->username; 1266 u = obj->username; 1282 if (!pwent && obj->username) 1283 pwent = getpwnam(obj->username); 1308 (accessvol(options[VOLOPT_ALLOW].c_value, obj->username) && 1309 (accessvol(options[VOLOPT_DENY].c_value, obj->username) < [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/ |
H A D | volume.c | 116 #define VOLOPT_FORCEUID 19 /* force uid for username x */ 197 * $u -> username (guest is usually nobody) 330 } else if (obj->username && is_var(p, "$u")) { 334 if ( obj->options.ntseparator && (sep = strchr(obj->username, obj->options.ntseparator[0])) != NULL) 337 q = obj->username; 1287 u = obj->username; 1303 if (!pwent && obj->username) 1304 pwent = getpwnam(obj->username); 1329 (accessvol(options[VOLOPT_ALLOW].c_value, obj->username) && 1330 (accessvol(options[VOLOPT_DENY].c_value, obj->username) < [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/client/ |
H A D | mount.cifs.c | 99 /* caller frees username if necessary */ 101 char *username = NULL; local 105 username = password->pw_name; 107 return username; 138 if (strncasecmp("username",line_buf+i,8) == 0) { 148 printf("mount.cifs failed due to malformed username in credentials file"); 306 to the kernel code which would think it was a real username */ 313 printf("username specified with no parameter\n"); 330 /* remove password from username */ 338 printf("username to [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libads/ |
H A D | authdata.c | 62 type_10->username = PRS_ALLOC_MEM(ps, uint16, type_10->len); 63 if (!type_10->username) { 69 if (!prs_uint16s(True, "name", ps, depth, type_10->username,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/LDAP/smbldap-tools-0.8.7/ |
H A D | smb.conf | 6 username map = /etc/samba/smbusers
|
H A D | smbldap-useradd | 44 print "Usage: $0 [-awmugdsckABCDEFGHMNPST?] username\n"; 100 print "$0: illegal username\n"; 538 defaults to gecos or username, if gecos not set 541 defaults to username
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | gtls.c | 364 infof(data, "Using TLS-SRP username: %s\n", data->set.ssl.username); 376 data->set.ssl.username, 556 && data->set.ssl.username != NULL 972 && data->set.ssl.username != NULL)
|