Searched refs:username (Results 251 - 275 of 313) sorted by relevance

<<111213

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dwinbind_nss_solaris.c61 const char *username; member in struct:nss_groupsbymem
286 _nss_winbind_initgroups_dyn(gmem->username,
H A Dwinbind_nss_linux.c461 /* Return passwd struct from username */
485 strncpy(request.data.username, name,
486 sizeof(request.data.username) - 1);
487 request.data.username
488 [sizeof(request.data.username) - 1] = '\0';
821 strncpy(request.data.username, user,
822 sizeof(request.data.username) - 1);
H A Dwinbindd_cm.c88 Caller to free() result in domain, username, password
91 static void cm_get_ipc_userpass(char **username, char **domain, char **password) argument
93 *username = secrets_fetch(SECRETS_AUTH_USER, NULL);
97 if (*username && **username) {
106 *domain, *username));
110 *username = smb_xstrdup("");
329 /* Only try authenticated if we have a username */
331 DEBUG(5, ("connecting to %s from %s with username "
H A Dwinbindd_group.c1001 state->request.data.username[sizeof(state->request.data.username)-1]='\0';
1004 state->request.data.username));
1007 state->request.data.username)))
1010 /* Parse domain and username */
1012 parse_domain_user(state->request.data.username,
1217 state->request.data.username))) {
H A Dwinbindd_rpc.c111 fstring username, fullname; local
114 unistr2_to_ascii( username, &(&ctr.sam.info1->str[j])->uni_acct_name, sizeof(username)-1);
117 (*info)[i].acct_name = talloc_strdup(mem_ctx, username );
361 /* Lookup user information from a rid or username. */
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_client/
H A Dcli_netlogon.c531 const char *username, const char *password,
572 username, cli->clnt_name_slash,
591 username, cli->clnt_name_slash, chal,
641 const char *username, const char *domain, const char *workstation,
689 username, workstation_name_slash, (const uchar*)chal,
529 cli_netlogon_sam_logon(struct cli_state *cli, TALLOC_CTX *mem_ctx, DOM_CRED *ret_creds, const char *username, const char *password, int logon_type) argument
639 cli_netlogon_sam_network_logon(struct cli_state *cli, TALLOC_CTX *mem_ctx, DOM_CRED *ret_creds, const char *username, const char *domain, const char *workstation, const uint8 chal[8], DATA_BLOB lm_response, DATA_BLOB nt_response, NET_USER_INFO_3 *info3) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/torture/
H A Dlocktest2.c26 static fstring username; variable
179 username, lp_workgroup(), password, 0,
507 fstrcpy(username,getenv("USER"));
515 fstrcpy(username,optarg);
516 p = strchr_m(username,'%');
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/
H A Dnet_rap.c272 static void list_sessions_func(char *wsname, char *username, uint16 conns, argument
281 wsname, username, clitype, opens, hrs, min, sec);
284 static void display_session_func(const char *wsname, const char *username, argument
301 username, wsname,
308 const char *username, const char *netname)
878 d_printf("net rap validate <username> [password]\n"\
306 display_conns_func(uint16 conn_id, uint16 conn_type, uint16 opens, uint16 users, uint32 conn_time, const char *username, const char *netname) argument
H A Dsmbcquotas.c74 /* convert a SID to a string, either numeric or username/group */
103 /* convert a string to a SID, either numeric or username/group */
374 cmdline_auth_info.username, lp_workgroup(),
410 UQLIM:<username>/<softlimit>/<hardlimit> for user quotas\n\
483 pstrcpy(username_str,cmdline_auth_info.username);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/python/
H A Dpy_smb.c101 char *username, *domain, *password, *errstr; local
107 if (!py_parse_creds(creds, &username, &domain, &password, &errstr)) {
113 cli->cli, username, password, strlen(password) + 1,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/papd/
H A Dqueries.c711 char username[UAM_USERNAMELEN + 1] = "\0"; local
748 if ( (papd_uam->u.uam_printer(p,stop,username,out)) == 0 ) {
749 lp_person( username );
751 LOG(log_info, logtype_papd, "RBILogin: Logged in '%s'", username);
H A Dlp.c402 char *username, *afpdpid; local
413 username = auth_string;
418 if (getpwnam(username) != NULL ) {
419 LOG(log_info, logtype_papd, "CAP authenticated %s", username);
420 lp_person(username);
423 LOG(log_info, logtype_papd, "CAP error: invalid username: '%s'", username);
426 LOG(log_info, logtype_papd, "CAP error: could not read username");
576 LOG(log_error, logtype_papd, "Error getting username (%s)", lp.lp_person);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/
H A Dqueries.c711 char username[UAM_USERNAMELEN + 1] = "\0"; local
748 if ( (papd_uam->u.uam_printer(p,stop,username,out)) == 0 ) {
749 lp_person( username );
751 LOG(log_info, logtype_papd, "RBILogin: Logged in '%s'", username);
H A Dlp.c402 char *username, *afpdpid; local
413 username = auth_string;
418 if (getpwnam(username) != NULL ) {
419 LOG(log_info, logtype_papd, "CAP authenticated %s", username);
420 lp_person(username);
423 LOG(log_info, logtype_papd, "CAP error: invalid username: '%s'", username);
426 LOG(log_info, logtype_papd, "CAP error: could not read username");
576 LOG(log_error, logtype_papd, "Error getting username (%s)", lp.lp_person);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/
H A Dlibsmbclient.h223 * @param unlen The size of the username buffer in bytes
285 * @param username username used to connect
292 const char * workgroup, const char * username);
305 * @param username username to match
312 const char * username);
357 /** username used for making connections
720 * try again with an empty username and password. This
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/passdb/
H A Dpdb_interface.c187 static NTSTATUS context_getsampwnam(struct pdb_context *context, SAM_ACCOUNT *sam_acct, const char *username) argument
198 if (NT_STATUS_IS_OK(ret = curmethods->getsampwnam(curmethods, sam_acct, username))) {
494 const char *username,
507 enum_group_memberships(context->pdb_methods, username,
935 BOOL pdb_getsampwnam(SAM_ACCOUNT *sam_acct, const char *username) argument
944 sam_acct, username)))
1126 NTSTATUS pdb_enum_group_memberships(const char *username, gid_t primary_gid, argument
1136 return pdb_context->pdb_enum_group_memberships(pdb_context, username,
493 context_enum_group_memberships(struct pdb_context *context, const char *username, gid_t primary_gid, DOM_SID **sids, gid_t **gids, int *num_groups) argument
H A Dpdb_smbpasswd.c38 const char *smb_name; /* username string */
371 * username:uid:32hex bytes:[Account type]:LCT-12345678....other flags presently
376 * username:uid:32hex bytes:32hex bytes:[Account type]:LCT-12345678....ignored....
679 Routine to search the smbpasswd file for an entry matching the username.
782 * username:uid:[32hex bytes]:....other flags presently
787 * username:uid:[32hex bytes]:[32hex bytes]:[attributes]:LCT-XXXXXXXX:...ignored.
1218 DEBUG(0,("build_sam_account: smbpasswd database is corrupt! username %s with uid "
1325 SAM_ACCOUNT *sam_acct, const char *username)
1332 DEBUG(10, ("getsampwnam (smbpasswd): search by name: %s\n", username));
1344 while ( ((smb_pw=getsmbfilepwent(smbpasswd_state, fp)) != NULL)&& (!strequal(smb_pw->smb_name, username)) )
1324 smbpasswd_getsampwnam(struct pdb_methods *my_methods, SAM_ACCOUNT *sam_acct, const char *username) argument
1482 const char *username = pdb_get_username(sampass); local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dlibsmbclient.c316 pstring username, passwd, domain; local
321 username[0] = passwd[0] = domain[0] = 0;
331 next_token(&u, username, ":", sizeof(fstring));
338 pstrcpy(username, u);
342 if (username[0])
343 strncpy(user, username, user_len); /* FIXME, domain */
475 fstring username,
484 workgroup, username);
486 if (!auth_called && !srv && (!username[0] || !password[0])) {
489 username, sizeo
471 find_server(SMBCCTX *context, const char *server, const char *share, fstring workgroup, fstring username, fstring password) argument
544 smbc_server(SMBCCTX *context, const char *server, const char *share, fstring workgroup, fstring username, fstring password) argument
781 smbc_attr_server(SMBCCTX *context, const char *server, const char *share, fstring workgroup, fstring username, fstring password, POLICY_HND *pol) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/
H A Dvolume.c114 #define VOLOPT_FORCEUID 19 /* force uid for username x */
195 * $u -> username (guest is usually nobody)
323 } else if (obj->username && is_var(p, "$u")) {
327 if ( obj->options.ntseparator && (sep = strchr(obj->username, obj->options.ntseparator[0])) != NULL)
330 q = obj->username;
1266 u = obj->username;
1282 if (!pwent && obj->username)
1283 pwent = getpwnam(obj->username);
1308 (accessvol(options[VOLOPT_ALLOW].c_value, obj->username) &&
1309 (accessvol(options[VOLOPT_DENY].c_value, obj->username) <
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/
H A Dvolume.c116 #define VOLOPT_FORCEUID 19 /* force uid for username x */
197 * $u -> username (guest is usually nobody)
330 } else if (obj->username && is_var(p, "$u")) {
334 if ( obj->options.ntseparator && (sep = strchr(obj->username, obj->options.ntseparator[0])) != NULL)
337 q = obj->username;
1287 u = obj->username;
1303 if (!pwent && obj->username)
1304 pwent = getpwnam(obj->username);
1329 (accessvol(options[VOLOPT_ALLOW].c_value, obj->username) &&
1330 (accessvol(options[VOLOPT_DENY].c_value, obj->username) <
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/client/
H A Dmount.cifs.c99 /* caller frees username if necessary */
101 char *username = NULL; local
105 username = password->pw_name;
107 return username;
138 if (strncasecmp("username",line_buf+i,8) == 0) {
148 printf("mount.cifs failed due to malformed username in credentials file");
306 to the kernel code which would think it was a real username */
313 printf("username specified with no parameter\n");
330 /* remove password from username */
338 printf("username to
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libads/
H A Dauthdata.c62 type_10->username = PRS_ALLOC_MEM(ps, uint16, type_10->len);
63 if (!type_10->username) {
69 if (!prs_uint16s(True, "name", ps, depth, type_10->username,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/LDAP/smbldap-tools-0.8.7/
H A Dsmb.conf6 username map = /etc/samba/smbusers
H A Dsmbldap-useradd44 print "Usage: $0 [-awmugdsckABCDEFGHMNPST?] username\n";
100 print "$0: illegal username\n";
538 defaults to gecos or username, if gecos not set
541 defaults to username
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/
H A Dgtls.c364 infof(data, "Using TLS-SRP username: %s\n", data->set.ssl.username);
376 data->set.ssl.username,
556 && data->set.ssl.username != NULL
972 && data->set.ssl.username != NULL)

Completed in 393 milliseconds

<<111213