/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/samples/link/ |
H A D | header.h | 12 { char *userid; member in struct:h__authentication
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/samples/link++/ |
H A D | header.h | 12 { char *userid; member in struct:h__authentication
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/samples/link/ |
H A D | header.h | 12 { char *userid; member in struct:h__authentication
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/samples/link++/ |
H A D | header.h | 12 { char *userid; member in struct:h__authentication
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/samples/router/ |
H A D | router.h | 37 char *userid; // optional HTTP Authorization userid member in struct:t__Routing
|
H A D | router.c | 165 When the routing table contains userid and passwd information, the 167 userid and passwd are provided in the client request message. It is 186 * Optional HTTP Authorization userid and passwd are checked if present 187 in the routing table. The userid and passwd may be patterns with '*' 189 the userid and passwd match. 247 /* SOAPAction/endpoint -> target endpoint [userid, passwd] */ 510 lookup(struct t__RoutingTable *route, const char *key, const char *userid, const char *passwd) argument 526 if (!route->__ptr->userid 528 || !soap_tag_cmp(userid, route->__ptr->userid) 588 server_connect(struct soap *server, const char *endpoint, const char *action, const char *userid, const char *passwd) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/samples/router/ |
H A D | router.h | 37 char *userid; // optional HTTP Authorization userid member in struct:t__Routing
|
H A D | router.c | 165 When the routing table contains userid and passwd information, the 167 userid and passwd are provided in the client request message. It is 186 * Optional HTTP Authorization userid and passwd are checked if present 187 in the routing table. The userid and passwd may be patterns with '*' 189 the userid and passwd match. 247 /* SOAPAction/endpoint -> target endpoint [userid, passwd] */ 510 lookup(struct t__RoutingTable *route, const char *key, const char *userid, const char *passwd) argument 526 if (!route->__ptr->userid 528 || !soap_tag_cmp(userid, route->__ptr->userid) 588 server_connect(struct soap *server, const char *endpoint, const char *action, const char *userid, const char *passwd) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/tipc/ |
H A D | user_reg.c | 45 * Array entry 0 is not used, so userid 0 is not valid; 160 int tipc_attach(u32 *userid, tipc_mode_event cb, void *usr_handle) argument 175 *userid = next_free_user; 194 void tipc_detach(u32 userid) argument 200 if ((userid == 0) || (userid > MAX_USERID)) 204 if ((!users) || (users[userid].next >= 0)) { 209 user_ptr = &users[userid]; 214 next_free_user = userid;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | httpda.h | 13 { struct http_da_info info; // to store userid and passwd 14 http_da_save(&soap, &info, authrealm, userid, passwd); 18 ... // userid and passwd were deallocated 19 http_da_restore(&soap, &info); // get userid and passwd after soap_end() 22 http_da_release(&soap, &info); // remove userid and passwd 31 { if (soap->userid && soap->passwd) // Basic authentication 32 { if (!strcmp(soap->userid, userid) && !strcmp(soap->passwd, passwd)) 37 else if (soap->authrealm && soap->userid) // Digest authentication 38 { passwd = ... // database lookup on userid an 151 char *userid; member in struct:http_da_info [all...] |
H A D | httpdatest.c | 131 /* save userid and passwd for basic or digest authentication */ 163 if (soap->userid && soap->passwd) /* Basic authentication: we may want to reject this since the password was send in the clear */ 164 { if (!strcmp(soap->userid, "Mufasa") 171 else if (soap->authrealm && soap->userid) 173 /* simulate database lookup on userid to find passwd */ 174 if (!strcmp(soap->authrealm, authrealm) && !strcmp(soap->userid, "Mufasa"))
|
H A D | httpda.c | 13 { struct http_da_info info; // to store userid and passwd 14 http_da_save(&soap, &info, authrealm, userid, passwd); 18 ... // userid and passwd were deallocated 19 http_da_restore(&soap, &info); // get userid and passwd after soap_end() 22 http_da_release(&soap, &info); // remove userid and passwd 31 { if (soap->userid && soap->passwd) // Basic authentication 32 { if (!strcmp(soap->userid, userid) && !strcmp(soap->passwd, passwd)) 37 else if (soap->authrealm && soap->userid) // Digest authentication 38 { passwd = ... // database lookup on userid an 422 http_da_save(struct soap *soap, struct http_da_info *info, const char *realm, const char *userid, const char *passwd) argument 690 http_da_calc_HA1(struct soap *soap, void **context, char *alg, char *userid, char *realm, char *passwd, char *nonce, char *cnonce, char HA1hex[33]) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | httpda.h | 13 { struct http_da_info info; // to store userid and passwd 14 http_da_save(&soap, &info, authrealm, userid, passwd); 18 ... // userid and passwd were deallocated 19 http_da_restore(&soap, &info); // get userid and passwd after soap_end() 22 http_da_release(&soap, &info); // remove userid and passwd 31 { if (soap->userid && soap->passwd) // Basic authentication 32 { if (!strcmp(soap->userid, userid) && !strcmp(soap->passwd, passwd)) 37 else if (soap->authrealm && soap->userid) // Digest authentication 38 { passwd = ... // database lookup on userid an 151 char *userid; member in struct:http_da_info [all...] |
H A D | httpdatest.c | 131 /* save userid and passwd for basic or digest authentication */ 163 if (soap->userid && soap->passwd) /* Basic authentication: we may want to reject this since the password was send in the clear */ 164 { if (!strcmp(soap->userid, "Mufasa") 171 else if (soap->authrealm && soap->userid) 173 /* simulate database lookup on userid to find passwd */ 174 if (!strcmp(soap->authrealm, authrealm) && !strcmp(soap->userid, "Mufasa"))
|
H A D | httpda.c | 13 { struct http_da_info info; // to store userid and passwd 14 http_da_save(&soap, &info, authrealm, userid, passwd); 18 ... // userid and passwd were deallocated 19 http_da_restore(&soap, &info); // get userid and passwd after soap_end() 22 http_da_release(&soap, &info); // remove userid and passwd 31 { if (soap->userid && soap->passwd) // Basic authentication 32 { if (!strcmp(soap->userid, userid) && !strcmp(soap->passwd, passwd)) 37 else if (soap->authrealm && soap->userid) // Digest authentication 38 { passwd = ... // database lookup on userid an 422 http_da_save(struct soap *soap, struct http_da_info *info, const char *realm, const char *userid, const char *passwd) argument 690 http_da_calc_HA1(struct soap *soap, void **context, char *alg, char *userid, char *realm, char *passwd, char *nonce, char *cnonce, char HA1hex[33]) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/ |
H A D | logintest.c | 11 soap->userid = "u1"; 30 soap->userid = "u1";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/ |
H A D | logintest.c | 11 soap->userid = "u1"; 30 soap->userid = "u1";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/ |
H A D | logintest.c | 11 soap->userid = "u1"; 30 soap->userid = "u1";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/ |
H A D | logintest.c | 11 soap->userid = "u1"; 30 soap->userid = "u1";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/uddi2/ |
H A D | example3.cpp | 39 const char *userid = "..."; // user ID to access UDDI server variable 55 uddi2__get_USCOREauthToken get_authToken(soap, userid, passwd);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/uddi2/ |
H A D | example3.cpp | 39 const char *userid = "..."; // user ID to access UDDI server variable 55 uddi2__get_USCOREauthToken get_authToken(soap, userid, passwd);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/hypfs/ |
H A D | hypfs_vm.c | 50 char userid[NAME_LEN]; member in struct:diag2fc_parm_list 63 memcpy(parm_list.userid, query, NAME_LEN); 64 ASCEBC(parm_list.userid, NAME_LEN);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/s390/net/ |
H A D | netiucv.c | 228 char userid[9]; member in struct:iucv_connection 574 if (strncmp(ipvmid, conn->userid, 8)) 890 netdev->name, conn->userid); 900 rc = iucv_path_connect(conn->path, &netiucv_handler, conn->userid, 911 netiucv_printname(conn->userid)); 917 " guest %s\n", netiucv_printname(conn->userid)); 930 netiucv_printname(conn->userid)); 989 netdev->name, conn->userid); 1093 " successfully to %s\n", privptr->conn->userid); 1455 return sprintf(buf, "%s\n", netiucv_printname(priv->conn->userid)); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/lzo-2.06/autoconf/ |
H A D | shtool | 754 userid='' 756 userid="`(id -u) 2>/dev/null`" 757 if [ ".$userid" = . ]; then 758 userid="`(id -u ${username}) 2>/dev/null`" 759 if [ ".$userid" = . ]; then 762 userid=`echo $str | sed -e 's/^uid[ ]*=[ ]*//' -e 's/(.*$//'` 764 if [ ".$userid" = . ]; then 765 userid=`(getent passwd ${username}) 2>/dev/null | \ 767 if [ ".$userid" = . ]; then 768 userid [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/iucv/ |
H A D | iucv.h | 265 * @userid: 8-byte user identification 277 u8 userid[8], u8 system[8], u8 userdata[16],
|