/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/ |
H A D | uams_passwd.c | 78 static int pwd_login(void *obj, char *username, int ulen, struct passwd **uam_pwd, argument 100 if (( pwd = uam_getname(obj, username, ulen)) == NULL ) { 104 LOG(log_info, logtype_uams, "cleartext login: %s", username); 113 LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username); 122 LOG(log_info, logtype_uams, "Password for user %s expired", username); 141 sprintf( hostname, "%s@%s", username, clientname ); 143 if( uam_sia_validate_user( NULL, ac, av, hostname, username, 164 char *username; local 170 (void *) &username, &ulen) < 0) 182 memcpy(username, ibu 205 char *username; local 276 passwd_printer(char *start, char *stop, char *username, struct papfile *out) argument [all...] |
H A D | uams_pam.c | 142 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd, argument 158 if (( pwd = uam_getname(obj, username, ulen)) == NULL ) { 162 LOG(log_info, logtype_uams, "cleartext login: %s", username); 163 PAM_username = username; 167 PAM_error = pam_start("netatalk", username, &PAM_conversation, 225 char *username; local 230 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) { 239 memcpy(username, ibuf, len ); 242 username[ len ] = '\0'; 246 return (login(obj, username, ule 254 char *username; local 286 pam_changepw(void *obj _U_, char *username, struct passwd *pwd _U_, char *ibuf, size_t ibuflen _U_, char *rbuf _U_, size_t *rbuflen _U_) argument 346 pam_printer(char *start, char *stop, char *username, struct papfile *out) argument [all...] |
H A D | uams_guest.c | 51 char *guest, *username; local 61 (void *) &username, NULL) < 0) 64 strcpy(username, guest); 91 static int noauth_printer(char *start, char *stop, char *username, struct papfile *out) argument 105 * (username) 107 * Hopefully username doesn't contain a ")" 111 LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string"); 117 LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string"); 121 memcpy(username, p, MIN( UAM_USERNAMELEN, q - p )); 123 /* Done copying username, clea [all...] |
H A D | uams_dhx_passwd.c | 77 static int pwd_login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 108 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) { 112 LOG(log_info, logtype_uams, "dhx login: %s", username); 118 LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username); 215 char *username; local 221 (void *) &username, &ulen) < 0) 233 memcpy(username, ibuf, len ); 236 username[ len ] = '\0'; 242 return (pwd_login(obj, username, ulen, uam_pwd, ibuf, ibuflen, rbuf, rbuflen)); 256 char *username; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_passwd.c | 72 static int pwd_login(void *obj, char *username, int ulen, struct passwd **uam_pwd, argument 94 if (( pwd = uam_getname(obj, username, ulen)) == NULL ) { 98 LOG(log_info, logtype_uams, "cleartext login: %s", username); 107 LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username); 116 LOG(log_info, logtype_uams, "Password for user %s expired", username); 135 sprintf( hostname, "%s@%s", username, clientname ); 137 if( uam_sia_validate_user( NULL, ac, av, hostname, username, 158 char *username; local 164 (void *) &username, &ulen) < 0) 176 memcpy(username, ibu 199 char *username; local 270 passwd_printer(char *start, char *stop, char *username, struct papfile *out) argument [all...] |
H A D | uams_pam.c | 142 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd, argument 158 if (( pwd = uam_getname(obj, username, ulen)) == NULL ) { 162 LOG(log_info, logtype_uams, "cleartext login: %s", username); 163 PAM_username = username; 167 PAM_error = pam_start("netatalk", username, &PAM_conversation, 225 char *username; local 230 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) { 239 memcpy(username, ibuf, len ); 242 username[ len ] = '\0'; 246 return (login(obj, username, ule 254 char *username; local 286 pam_changepw(void *obj _U_, char *username, struct passwd *pwd _U_, char *ibuf, size_t ibuflen _U_, char *rbuf _U_, size_t *rbuflen _U_) argument 346 pam_printer(char *start, char *stop, char *username, struct papfile *out) argument [all...] |
H A D | uams_guest.c | 51 char *guest, *username; local 61 (void *) &username, NULL) < 0) 64 strcpy(username, guest); 91 static int noauth_printer(char *start, char *stop, char *username, struct papfile *out) argument 105 * (username) 107 * Hopefully username doesn't contain a ")" 111 LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string"); 117 LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string"); 121 memcpy(username, p, MIN( UAM_USERNAMELEN, q - p )); 123 /* Done copying username, clea [all...] |
H A D | uams_dhx_passwd.c | 72 static int pwd_login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument 103 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) { 107 LOG(log_info, logtype_uams, "dhx login: %s", username); 113 LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username); 210 char *username; local 216 (void *) &username, &ulen) < 0) 228 memcpy(username, ibuf, len ); 231 username[ len ] = '\0'; 237 return (pwd_login(obj, username, ulen, uam_pwd, ibuf, ibuflen, rbuf, rbuflen)); 251 char *username; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/libbb/ |
H A D | update_passwd.c | 14 int update_passwd(const char *filename, const char *username, argument 33 username = xasprintf("%s:", username); 34 user_len = strlen(username); 85 if (strncmp(username, line, user_len) == 0) { 86 /* we have a match with "username:"... */ 91 fprintf(new_fp, "%s%s%s", username, new_pw, cp); 116 free((char*)username);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/loginutils/ |
H A D | login.c | 93 static void write_utent(struct utmp *utptr, const char *username) argument 96 strncpy(utptr->ut_user, username, sizeof(utptr->ut_user)); 111 #define write_utent(utptr, username) ((void)0) 229 char username[USERNAME_SIZE]; local 245 username[0] = '\0'; 260 safe_strncpy(username, opt_user, sizeof(username)); 263 safe_strncpy(username, argv[optind], sizeof(username)); 286 /* Was breaking "login <username>" fro [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/printing/ |
H A D | smbprint | 73 # username (optional) 84 if [ "x$username" == "x" ] ; then 85 username="$server"; 174 -U $username \
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | ntlm_check.c | 164 * @param username internal Samba username, for log messages 165 * @param client_username username the client used 179 const char *username, 191 username)); 197 username)); 209 username)); 216 username)); 222 username)); 230 username)); 173 ntlm_password_check(TALLOC_CTX *mem_ctx, const DATA_BLOB *challenge, const DATA_BLOB *lm_response, const DATA_BLOB *nt_response, const DATA_BLOB *lm_interactive_pwd, const DATA_BLOB *nt_interactive_pwd, const char *username, const char *client_username, const char *client_domain, const uint8 *lm_pw, const uint8 *nt_pw, DATA_BLOB *user_sess_key, DATA_BLOB *lm_sess_key) argument [all...] |
H A D | libsmb_cache.c | 37 char *username; member in struct:smbc_server_cache 51 const char * workgroup, const char * username) 83 srvcache->username = SMB_STRDUP(username); 84 if (!srvcache->username) { 96 SAFE_FREE(srvcache->username); 118 strcmp(user, srv->username) == 0) { 185 SAFE_FREE(srv->username); 49 smbc_add_cached_server(SMBCCTX * context, SMBCSRV * new, const char * server, const char * share, const char * workgroup, const char * username) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | session.h | 31 fstring username; member in struct:sessionid
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/bftpd-1.6.6/ |
H A D | bftpdutmp.h | 21 int bftpdutmp_usercount(char *username);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/ |
H A D | ntlm_auth_proto.h | 12 NTSTATUS contact_winbind_auth_crap(const char *username,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/ |
H A D | uid.c | 22 /* functions for username and group */ 102 } /* end function void set_uidgid ( username, group ) */ 104 int user_to_uid ( username ) 105 char *username; 110 if ( !username || strlen ( username ) < 1 ) return 0; 112 /* grab the /etc/passwd record relating to username */ 113 this_passwd = getpwnam ( username ); 121 } /* end function int user_to_uid ( username ) */
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/ |
H A D | uid.c | 22 /* functions for username and group */ 102 } /* end function void set_uidgid ( username, group ) */ 104 int user_to_uid ( username ) 105 char *username; 110 if ( !username || strlen ( username ) < 1 ) return 0; 112 /* grab the /etc/passwd record relating to username */ 113 this_passwd = getpwnam ( username ); 121 } /* end function int user_to_uid ( username ) */
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbwrapper/ |
H A D | smbw.h | 39 char *username; member in struct:smbw_server 68 char **workgroup, char **username,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/lseek/ |
H A D | lseek_2.c | 16 char *username, int unmaxlen, char *password, int pwmaxlen) 21 strncpy(username, g_username, unmaxlen - 1); 15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/script/ |
H A D | smbtar | 29 username=$LOGNAME # Default: same user name as in *nix 60 -u <user> Specify User Name $username 133 username="$OPTARG" 163 eval $SMBCLIENT "'\\\\$server\\$service'" "'$password'" -U "'$username'" \
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/client/ |
H A D | smbspool.c | 57 const char *username, /* Username */ local 91 fputs(" smb://[username:password@][workgroup/]server[:port]/printer\n", stderr); 139 username = uri + 6; 148 if ((password = strchr_m(username, ':')) != NULL) 155 username = ""; 172 * Convert to smb://[username:password@]workgroup/server/printer... 215 if ((cli = smb_connect(workgroup, server, port, printer, username, password)) == NULL) 283 const char *username, /* I - Username */ 297 username, workgroup, password, 0, Undefined, NULL); 279 smb_connect(const char *workgroup, const char *server, const int port, const char *share, const char *username, const char *password) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/python/ |
H A D | py_common.c | 120 only have the keys "username", "domain" and "password". Return 121 True for valid credentials in which case the username, domain and 126 BOOL py_parse_creds(PyObject *creds, char **username, char **domain, argument 131 *username = ""; 142 username_obj = PyDict_GetItemString(creds, "username"); 147 *errstr = SMB_STRDUP("no username field in credential"); 164 *errstr = SMB_STRDUP("username field is not string type"); 184 strcmp(PyString_AsString(key), "username") != 0 && 195 *username = PyString_AsString(username_obj); 213 char *username, *passwor local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/mtools-4.0.10/ |
H A D | misc.c | 38 char *username; local 50 username = getenv("LOGNAME"); 51 if ( !username ) 52 username = getlogin(); 53 if ( username ) 54 pw = getpwnam( username);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/smbd/ |
H A D | se_access_check_printer.c | 63 BOOL test_user(char *username, uint32 acc_desired, uint32 *acc_granted) argument 68 if (!(pw = getpwnam(username))) { 70 username);
|