/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/build_farm/ |
H A D | basicsmb.fns | 139 remote_name="$1" 140 echo $prefix/bin/smbclient //$remote_name/samba -n buildclient -U$whoami%$password -c 'ls' 141 $prefix/bin/smbclient //$remote_name/samba -n buildclient -U$whoami%$password -c 'ls' 153 remote_name="$1" 154 echo $prefix/bin/smbclient //$remote_name/samba -n buildclient -U$whoami% -c 'ls' 155 $prefix/bin/smbclient //$remote_name/samba -n buildclient -U$whoami% -c 'ls' 167 remote_name="$1" 168 echo $prefix/bin/smbclient //$remote_name/samba -n buildclient -U$whoami%$password -c 'ls' 169 $prefix/bin/smbclient //$remote_name/samba -n buildclient -U$whoami%$password -c 'ls'
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/plugins/ |
H A D | passprompt.c | 61 argv[2] = remote_name;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | smb.h | 72 char remote_name[SMB_NLS_MAXNAMELEN]; member in struct:smb_nls_codepage
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/plugins/ |
H A D | passprompt.c | 61 argv[2] = remote_name;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/pppd/ |
H A D | auth.c | 245 char remote_name[MAXNAMELEN]; /* Peer's name for authentication */ variable 381 { "remotename", o_string, remote_name, 1273 can_auth = have_chap_secret((explicit_remote? remote_name: NULL), 1277 can_auth = have_srp_secret((explicit_remote? remote_name: NULL), 1290 remote_name); 1329 (hadchap = have_chap_secret(user, (explicit_remote? remote_name: 1334 (explicit_remote? remote_name: NULL), 0, NULL))) || 1335 have_srp_secret(user, (explicit_remote? remote_name: NULL), 0, NULL)); 1341 if (!(hadchap = have_chap_secret((explicit_remote? remote_name: NULL), 1347 !have_chap_secret((explicit_remote? remote_name [all...] |
H A D | chap-new.c | 333 name = remote_name; 439 if (explicit_remote || (remote_name[0] != 0 && rname[0] == 0)) 440 strlcpy(rname, remote_name, sizeof(rname));
|
H A D | eap.c | 667 esp->es_server.ea_peer = remote_name; 668 esp->es_server.ea_peerlen = strlen(remote_name); 970 esp->es_server.ea_peer != remote_name) 1435 (remote_name[0] != '\0' && vallen == len)) 1436 strlcpy(rhostname, remote_name, sizeof (rhostname)); 1508 (remote_name[0] != '\0' && vallen == 0)) { 1509 strlcpy(rhostname, remote_name, 1765 esp->es_server.ea_peer != remote_name) 1861 (remote_name[0] != '\0' && vallen == len)) 1862 strlcpy(rhostname, remote_name, sizeo [all...] |
H A D | ipcp.c | 459 if (remote_name[0] == 0) 460 strlcpy(remote_name, colon, sizeof(remote_name));
|
H A D | pppd.h | 303 extern char remote_name[MAXNAMELEN]; /* Peer's name for authentication */ 304 extern bool explicit_remote;/* remote_name specified with remotename opt */
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppd/ |
H A D | auth.c | 161 char remote_name[MAXNAMELEN]; /* Peer's name for authentication */ variable 249 { "remotename", o_string, remote_name, 834 can_auth = have_chap_secret((explicit_remote? remote_name: NULL), 847 remote_name); 876 || have_chap_secret(user, (explicit_remote? remote_name: NULL), 882 if (!have_chap_secret((explicit_remote? remote_name: NULL), 1180 logwtmp(tty, user, remote_name); /* Add wtmp login entry */ 1303 (remote_name[0]? remote_name: NULL), 1340 ret = scan_authfile(f, (explicit_remote? remote_name [all...] |
H A D | chap.c | 439 if (explicit_remote || (remote_name[0] != 0 && rhostname[0] == 0)) { 440 strlcpy(rhostname, remote_name, sizeof(rhostname)); 555 if (!get_secret(cstate->unit, (explicit_remote? remote_name: rhostname),
|
H A D | ipcp.c | 423 if (remote_name[0] == 0) 424 strlcpy(remote_name, colon, sizeof(remote_name));
|
H A D | pppd.h | 252 extern char remote_name[MAXNAMELEN]; /* Peer's name for authentication */ 253 extern bool explicit_remote;/* remote_name specified with remotename opt */
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/smbfs/ |
H A D | inode.c | 401 strlcpy(mnt->codepage.remote_name, optarg, 450 if (strcmp(mnt->codepage.remote_name, SMB_NLS_REMOTE)) 451 seq_printf(s, ",codepage=%s", mnt->codepage.remote_name); 569 strlcpy(mnt->codepage.remote_name, SMB_NLS_REMOTE,
|
H A D | proc.c | 238 if (!*cp->remote_name) 247 if (!strcmp(cp->remote_name, "unicode")) { 250 n = setcodepage(&server->remote_nls, cp->remote_name);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/client/ |
H A D | client.c | 2888 pstring remote_name; local 2891 pstrcpy(remote_name, cur_dir); 2892 pstrcat(remote_name, CLI_DIRSEP_STR); 2894 p = remote_name + strlen(remote_name); 2896 if (!next_token_nr(NULL, p, NULL, sizeof(remote_name) - strlen(remote_name))) { 2901 clean_name(remote_name); 2905 return do_get(remote_name, local_name, True); 2915 pstring remote_name; local [all...] |
H A D | smbctool.c | 2668 pstring remote_name; local 2671 pstrcpy(remote_name, cur_dir); 2672 pstrcat(remote_name, "/"); 2674 p = remote_name + strlen(remote_name); 2676 if (!next_token_nr(NULL, p, NULL, sizeof(remote_name) - strlen(remote_name))) { 2681 clean_name(remote_name); 2685 return do_get(remote_name, local_name, True); 2695 pstring remote_name; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | substitute.c | 70 * @param remote_name the name our client wants to be called by 74 void set_remote_machine_name(const char* remote_name, BOOL perm) argument 84 fstrcpy(tmp_remote_machine,remote_name);
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/pppoecd/ |
H A D | auth.c | 70 char remote_name[MAXNAMELEN]; /* Peer's name for authentication */ variable
|
H A D | pppd.h | 252 extern char remote_name[MAXNAMELEN]; /* Peer's name for authentication */ 253 extern bool explicit_remote;/* remote_name specified with remotename opt */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | cliconnect.c | 1767 fstring remote_name; local 1769 if (name_status_find("*", 0, 0, *server_ip, remote_name)) { 1770 cli = get_ipc_connect(remote_name, server_ip, user_info);
|
H A D | libsmbclient.c | 820 fstring remote_name; local 832 if (name_status_find("*", 0, 0, rem_ip, remote_name)) { 833 make_nmb_name(&called, remote_name, 0x20);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/pptpd/pptpd-1.3.4/plugins/ |
H A D | pppd.h | 290 extern char remote_name[MAXNAMELEN]; /* Peer's name for authentication */ 291 extern bool explicit_remote;/* remote_name specified with remotename opt */
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/s390/net/ |
H A D | claw.c | 242 __u8 correlator, __u8 rc , char *local_name, char *remote_name); 2342 __u8 correlator, __u8 rc, char *local_name, char *remote_name) 2367 memcpy(&p_sysval->WS_name, remote_name, 8); 2385 memcpy(&p_sysval->WS_name, remote_name, 8); 2341 claw_send_control(struct net_device *dev, __u8 type, __u8 link, __u8 correlator, __u8 rc, char *local_name, char *remote_name) argument
|