Searched refs:username (Results 1 - 25 of 313) sorted by relevance

1234567891011>>

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/
H A Duams_passwd.c78 static int pwd_login(void *obj, char *username, int ulen, struct passwd **uam_pwd, argument
100 if (( pwd = uam_getname(obj, username, ulen)) == NULL ) {
104 LOG(log_info, logtype_uams, "cleartext login: %s", username);
113 LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username);
122 LOG(log_info, logtype_uams, "Password for user %s expired", username);
141 sprintf( hostname, "%s@%s", username, clientname );
143 if( uam_sia_validate_user( NULL, ac, av, hostname, username,
164 char *username; local
170 (void *) &username, &ulen) < 0)
182 memcpy(username, ibu
205 char *username; local
276 passwd_printer(char *start, char *stop, char *username, struct papfile *out) argument
[all...]
H A Duams_pam.c142 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd, argument
158 if (( pwd = uam_getname(obj, username, ulen)) == NULL ) {
162 LOG(log_info, logtype_uams, "cleartext login: %s", username);
163 PAM_username = username;
167 PAM_error = pam_start("netatalk", username, &PAM_conversation,
225 char *username; local
230 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) {
239 memcpy(username, ibuf, len );
242 username[ len ] = '\0';
246 return (login(obj, username, ule
254 char *username; local
286 pam_changepw(void *obj _U_, char *username, struct passwd *pwd _U_, char *ibuf, size_t ibuflen _U_, char *rbuf _U_, size_t *rbuflen _U_) argument
346 pam_printer(char *start, char *stop, char *username, struct papfile *out) argument
[all...]
H A Duams_guest.c51 char *guest, *username; local
61 (void *) &username, NULL) < 0)
64 strcpy(username, guest);
91 static int noauth_printer(char *start, char *stop, char *username, struct papfile *out) argument
105 * (username)
107 * Hopefully username doesn't contain a ")"
111 LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string");
117 LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string");
121 memcpy(username, p, MIN( UAM_USERNAMELEN, q - p ));
123 /* Done copying username, clea
[all...]
H A Duams_dhx_passwd.c77 static int pwd_login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument
108 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) {
112 LOG(log_info, logtype_uams, "dhx login: %s", username);
118 LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username);
215 char *username; local
221 (void *) &username, &ulen) < 0)
233 memcpy(username, ibuf, len );
236 username[ len ] = '\0';
242 return (pwd_login(obj, username, ulen, uam_pwd, ibuf, ibuflen, rbuf, rbuflen));
256 char *username; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/
H A Duams_passwd.c72 static int pwd_login(void *obj, char *username, int ulen, struct passwd **uam_pwd, argument
94 if (( pwd = uam_getname(obj, username, ulen)) == NULL ) {
98 LOG(log_info, logtype_uams, "cleartext login: %s", username);
107 LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username);
116 LOG(log_info, logtype_uams, "Password for user %s expired", username);
135 sprintf( hostname, "%s@%s", username, clientname );
137 if( uam_sia_validate_user( NULL, ac, av, hostname, username,
158 char *username; local
164 (void *) &username, &ulen) < 0)
176 memcpy(username, ibu
199 char *username; local
270 passwd_printer(char *start, char *stop, char *username, struct papfile *out) argument
[all...]
H A Duams_pam.c142 static int login(void *obj, char *username, int ulen, struct passwd **uam_pwd, argument
158 if (( pwd = uam_getname(obj, username, ulen)) == NULL ) {
162 LOG(log_info, logtype_uams, "cleartext login: %s", username);
163 PAM_username = username;
167 PAM_error = pam_start("netatalk", username, &PAM_conversation,
225 char *username; local
230 if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, (void *) &username, &ulen) < 0) {
239 memcpy(username, ibuf, len );
242 username[ len ] = '\0';
246 return (login(obj, username, ule
254 char *username; local
286 pam_changepw(void *obj _U_, char *username, struct passwd *pwd _U_, char *ibuf, size_t ibuflen _U_, char *rbuf _U_, size_t *rbuflen _U_) argument
346 pam_printer(char *start, char *stop, char *username, struct papfile *out) argument
[all...]
H A Duams_guest.c51 char *guest, *username; local
61 (void *) &username, NULL) < 0)
64 strcpy(username, guest);
91 static int noauth_printer(char *start, char *stop, char *username, struct papfile *out) argument
105 * (username)
107 * Hopefully username doesn't contain a ")"
111 LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string");
117 LOG(log_info, logtype_uams,"Bad Login NoAuthUAM: username not found in string");
121 memcpy(username, p, MIN( UAM_USERNAMELEN, q - p ));
123 /* Done copying username, clea
[all...]
H A Duams_dhx_passwd.c72 static int pwd_login(void *obj, char *username, int ulen, struct passwd **uam_pwd _U_, argument
103 if (( dhxpwd = uam_getname(obj, username, ulen)) == NULL ) {
107 LOG(log_info, logtype_uams, "dhx login: %s", username);
113 LOG(log_info, logtype_uams, "no shadow passwd entry for %s", username);
210 char *username; local
216 (void *) &username, &ulen) < 0)
228 memcpy(username, ibuf, len );
231 username[ len ] = '\0';
237 return (pwd_login(obj, username, ulen, uam_pwd, ibuf, ibuflen, rbuf, rbuflen));
251 char *username; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/libbb/
H A Dupdate_passwd.c14 int update_passwd(const char *filename, const char *username, argument
33 username = xasprintf("%s:", username);
34 user_len = strlen(username);
85 if (strncmp(username, line, user_len) == 0) {
86 /* we have a match with "username:"... */
91 fprintf(new_fp, "%s%s%s", username, new_pw, cp);
116 free((char*)username);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/loginutils/
H A Dlogin.c93 static void write_utent(struct utmp *utptr, const char *username) argument
96 strncpy(utptr->ut_user, username, sizeof(utptr->ut_user));
111 #define write_utent(utptr, username) ((void)0)
229 char username[USERNAME_SIZE]; local
245 username[0] = '\0';
260 safe_strncpy(username, opt_user, sizeof(username));
263 safe_strncpy(username, argv[optind], sizeof(username));
286 /* Was breaking "login <username>" fro
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/printing/
H A Dsmbprint73 # username (optional)
84 if [ "x$username" == "x" ] ; then
85 username="$server";
174 -U $username \
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dntlm_check.c164 * @param username internal Samba username, for log messages
165 * @param client_username username the client used
179 const char *username,
191 username));
197 username));
209 username));
216 username));
222 username));
230 username));
173 ntlm_password_check(TALLOC_CTX *mem_ctx, const DATA_BLOB *challenge, const DATA_BLOB *lm_response, const DATA_BLOB *nt_response, const DATA_BLOB *lm_interactive_pwd, const DATA_BLOB *nt_interactive_pwd, const char *username, const char *client_username, const char *client_domain, const uint8 *lm_pw, const uint8 *nt_pw, DATA_BLOB *user_sess_key, DATA_BLOB *lm_sess_key) argument
[all...]
H A Dlibsmb_cache.c37 char *username; member in struct:smbc_server_cache
51 const char * workgroup, const char * username)
83 srvcache->username = SMB_STRDUP(username);
84 if (!srvcache->username) {
96 SAFE_FREE(srvcache->username);
118 strcmp(user, srv->username) == 0) {
185 SAFE_FREE(srv->username);
49 smbc_add_cached_server(SMBCCTX * context, SMBCSRV * new, const char * server, const char * share, const char * workgroup, const char * username) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/
H A Dsession.h31 fstring username; member in struct:sessionid
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/bftpd-1.6.6/
H A Dbftpdutmp.h21 int bftpdutmp_usercount(char *username);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/
H A Dntlm_auth_proto.h12 NTSTATUS contact_winbind_auth_crap(const char *username,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/
H A Duid.c22 /* functions for username and group */
102 } /* end function void set_uidgid ( username, group ) */
104 int user_to_uid ( username )
105 char *username;
110 if ( !username || strlen ( username ) < 1 ) return 0;
112 /* grab the /etc/passwd record relating to username */
113 this_passwd = getpwnam ( username );
121 } /* end function int user_to_uid ( username ) */
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/
H A Duid.c22 /* functions for username and group */
102 } /* end function void set_uidgid ( username, group ) */
104 int user_to_uid ( username )
105 char *username;
110 if ( !username || strlen ( username ) < 1 ) return 0;
112 /* grab the /etc/passwd record relating to username */
113 this_passwd = getpwnam ( username );
121 } /* end function int user_to_uid ( username ) */
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbwrapper/
H A Dsmbw.h39 char *username; member in struct:smbw_server
68 char **workgroup, char **username,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/lseek/
H A Dlseek_2.c16 char *username, int unmaxlen, char *password, int pwmaxlen)
21 strncpy(username, g_username, unmaxlen - 1);
15 auth_fn(const char *server, const char *share, char *workgroup, int wgmaxlen, char *username, int unmaxlen, char *password, int pwmaxlen) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/script/
H A Dsmbtar29 username=$LOGNAME # Default: same user name as in *nix
60 -u <user> Specify User Name $username
133 username="$OPTARG"
163 eval $SMBCLIENT "'\\\\$server\\$service'" "'$password'" -U "'$username'" \
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/client/
H A Dsmbspool.c57 const char *username, /* Username */ local
91 fputs(" smb://[username:password@][workgroup/]server[:port]/printer\n", stderr);
139 username = uri + 6;
148 if ((password = strchr_m(username, ':')) != NULL)
155 username = "";
172 * Convert to smb://[username:password@]workgroup/server/printer...
215 if ((cli = smb_connect(workgroup, server, port, printer, username, password)) == NULL)
283 const char *username, /* I - Username */
297 username, workgroup, password, 0, Undefined, NULL);
279 smb_connect(const char *workgroup, const char *server, const int port, const char *share, const char *username, const char *password) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/python/
H A Dpy_common.c120 only have the keys "username", "domain" and "password". Return
121 True for valid credentials in which case the username, domain and
126 BOOL py_parse_creds(PyObject *creds, char **username, char **domain, argument
131 *username = "";
142 username_obj = PyDict_GetItemString(creds, "username");
147 *errstr = SMB_STRDUP("no username field in credential");
164 *errstr = SMB_STRDUP("username field is not string type");
184 strcmp(PyString_AsString(key), "username") != 0 &&
195 *username = PyString_AsString(username_obj);
213 char *username, *passwor local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/mtools-4.0.10/
H A Dmisc.c38 char *username; local
50 username = getenv("LOGNAME");
51 if ( !username )
52 username = getlogin();
53 if ( username )
54 pw = getpwnam( username);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/smbd/
H A Dse_access_check_printer.c63 BOOL test_user(char *username, uint32 acc_desired, uint32 *acc_granted) argument
68 if (!(pw = getpwnam(username))) {
70 username);

Completed in 85 milliseconds

1234567891011>>