/reactos/modules/rostests/winetests/credui/ |
H A D | credui.c | 41 WCHAR username[256]; in test_CredUIPromptForCredentials() local 58 username[0] = '\0'; in test_CredUIPromptForCredentials() 61 ARRAY_SIZE(username), in test_CredUIPromptForCredentials() 67 ARRAY_SIZE(username), in test_CredUIPromptForCredentials() 73 ARRAY_SIZE(username), in test_CredUIPromptForCredentials() 101 username, ARRAY_SIZE(username), in test_CredUIPromptForCredentials() 113 username, ARRAY_SIZE(username), in test_CredUIPromptForCredentials() 127 username, ARRAY_SIZE(username), in test_CredUIPromptForCredentials() 136 username, ARRAY_SIZE(username), in test_CredUIPromptForCredentials() 158 const WCHAR *username, *domain, *creds; in test_SspiPromptForCredentials() local [all …]
|
/reactos/drivers/network/tcpip/lwip/src/apps/snmp/ |
H A D | snmp_snmpv2_usm.c | 82 char username[32]; variable 145 memset(username, 0, sizeof(username)); in usmusertable_get_instance() 146 snmp_oid_to_name(username, &row_oid[name_start], name_len); in usmusertable_get_instance() 147 if (snmpv3_get_user(username, NULL, NULL, NULL, NULL) != ERR_OK) { in usmusertable_get_instance() 152 cell_instance->reference.ptr = username; in usmusertable_get_instance() 255 snmpv3_get_username(username, i); in usmusertable_get_next_instance() 257 test_oid[1 + eid_len] = strlen(username); in usmusertable_get_next_instance() 258 snmp_name_to_oid(username, &test_oid[2 + eid_len], strlen(username)); in usmusertable_get_next_instance() 268 memset(username, 0, sizeof(username)); in usmusertable_get_next_instance() 270 cell_instance->reference.ptr = username; in usmusertable_get_next_instance() [all …]
|
/reactos/modules/rostests/winetests/secur32/ |
H A D | secur32.c | 280 static const WCHAR username[] = {'u','s','e','r','n','a','m','e',0}; in test_SspiEncodeStringsAsAuthIdentity() local 314 status = pSspiEncodeStringsAsAuthIdentity( username, NULL, password, &id ); in test_SspiEncodeStringsAsAuthIdentity() 320 status = pSspiEncodeStringsAsAuthIdentity( username, NULL, NULL, &id ); in test_SspiEncodeStringsAsAuthIdentity() 333 ok( !lstrcmpW( username, username_ptr ), "wrong username\n" ); in test_SspiEncodeStringsAsAuthIdentity() 345 status = pSspiEncodeStringsAsAuthIdentity( username, NULL, password, &id ); in test_SspiEncodeStringsAsAuthIdentity() 353 ok( !lstrcmpW( username, username_ptr ), "wrong username\n" ); in test_SspiEncodeStringsAsAuthIdentity() 374 const WCHAR *target, *username; in test_SspiPrepareForCredWrite() local 394 ok( !lstrcmpW( username, targetW ), "got %s\n", wine_dbgstr_w(username) ); in test_SspiPrepareForCredWrite() 398 pSspiLocalFree( (void *)username ); in test_SspiPrepareForCredWrite() 406 ok( !lstrcmpW( username, targetW ), "got %s\n", wine_dbgstr_w(username) ); in test_SspiPrepareForCredWrite() [all …]
|
/reactos/modules/rostests/winetests/advapi32/ |
H A D | cred.c | 391 USERNAME_TARGET_CREDENTIAL_INFO username; in test_CredMarshalCredentialA() local 505 username.UserName = NULL; in test_CredMarshalCredentialA() 514 username.UserName = emptyW; in test_CredMarshalCredentialA() 523 username.UserName = tW; in test_CredMarshalCredentialA() 531 username.UserName = teW; in test_CredMarshalCredentialA() 539 username.UserName = tesW; in test_CredMarshalCredentialA() 547 username.UserName = testW; in test_CredMarshalCredentialA() 555 username.UserName = test1W; in test_CredMarshalCredentialA() 575 USERNAME_TARGET_CREDENTIAL_INFO *username; in test_CredUnmarshalCredentialA() local 684 username = p; in test_CredUnmarshalCredentialA() [all …]
|
/reactos/dll/win32/wininet/ |
H A D | dialogs.c | 170 static BOOL WININET_SetAuthorization( http_request_t *request, LPWSTR username, in WININET_SetAuthorization() argument 176 p = heap_strdupW(username); in WININET_SetAuthorization() 251 WCHAR username[0x20], password[0x20]; in WININET_ProxyPasswordDialog() local 253 username[0] = 0; in WININET_ProxyPasswordDialog() 256 GetWindowTextW( hitem, username, ARRAY_SIZE( username )); in WININET_ProxyPasswordDialog() 269 WININET_SetAuthorization( params->req, username, password, TRUE ); in WININET_ProxyPasswordDialog() 326 WCHAR username[0x20], password[0x20]; in WININET_PasswordDialog() local 328 username[0] = 0; in WININET_PasswordDialog() 331 GetWindowTextW( hitem, username, ARRAY_SIZE( username )); in WININET_PasswordDialog() 346 WININET_SetAuthorization( params->req, username, password, FALSE ); in WININET_PasswordDialog()
|
/reactos/base/applications/mstsc/ |
H A D | iso.c | 60 iso_send_connection_request(char *username, uint32 neg_proto) in iso_send_connection_request() argument 63 int length = 30 + strlen(username); in iso_send_connection_request() 81 out_uint8p(s, username, strlen(username)); in iso_send_connection_request() 203 iso_connect(char *server, char *username, char *domain, char *password, in iso_connect() argument 230 iso_send_connection_request(username, neg_proto); in iso_connect() 329 if (!cssp_connect(server, username, domain, password, s)) in iso_connect()
|
/reactos/dll/win32/credui/ |
H A D | credui_main.c | 578 if ((!*username || !lstrcmpW(username, credentials[i]->UserName)) && in find_existing_credential() 584 lstrcpyW(username, credentials[i]->UserName); in find_existing_credential() 877 WCHAR username[CREDUI_MAX_USERNAME_LENGTH + 1] = {0}; in SspiPromptForCredentialsW() local 879 DWORD len_username = ARRAY_SIZE(username); in SspiPromptForCredentialsW() 909 memcpy( username, id->User, id->UserLength * sizeof(WCHAR) ); in SspiPromptForCredentialsW() 910 username[id->UserLength] = 0; in SspiPromptForCredentialsW() 923 WCHAR *ptr, *user = username, *domain = NULL; in SspiPromptForCredentialsW() 925 if ((ptr = wcschr( username, '\\' ))) in SspiPromptForCredentialsW() 931 domain = username; in SspiPromptForCredentialsW() 932 len_domain = ptr - username; in SspiPromptForCredentialsW() [all …]
|
/reactos/drivers/network/tcpip/lwip/src/include/lwip/apps/ |
H A D | snmpv3.h | 84 err_t snmpv3_get_user(const char* username, snmpv3_auth_algo_t *auth_algo, u8_t *auth_key, snmpv3_p… 86 err_t snmpv3_get_user_storagetype(const char *username, snmpv3_user_storagetype_t *storagetype); 87 err_t snmpv3_get_username(char *username, u8_t index);
|
/reactos/modules/rostests/winetests/jscript/ |
H A D | sunspider-string-validate-input.js | 14 username = makeName(6); 15 (k%2)?email=username+"@mac.com":email=username+"(at)mac.com";
|
/reactos/base/services/nfsd/ |
H A D | idmap.c | 501 char username[VAL_LEN]; member 523 StringCchCopyA(dst->username, VAL_LEN, src->username); in user_cache_copy() 709 if (FAILED(StringCchCopyA(user->username, VAL_LEN, in idmap_lookup_user() 885 const char *username = (const char*)value; in username_cmp() local 886 return strcmp(entry->username, username); in username_cmp() 891 const char *username, in nfs41_idmap_name_to_ids() argument 903 dprintf(IDLVL, "--> nfs41_idmap_name_to_ids('%s')\n", username); in nfs41_idmap_name_to_ids() 905 lookup.value = username; in nfs41_idmap_name_to_ids() 911 "failed with %d\n", username, status); in nfs41_idmap_name_to_ids() 955 if (FAILED(StringCchCopyA(name, len, user.username))) { in nfs41_idmap_uid_to_name() [all …]
|
H A D | nfs41_client.c | 369 char username[UNLEN + 1]; in nfs41_client_owner() local 372 if (!GetUserNameA(username, &len)) { in nfs41_client_owner() 400 if (!CryptHashData(hash, (const BYTE*)username, (DWORD)strlen(username), 0)) { in nfs41_client_owner()
|
H A D | nfs41_daemon.c | 64 char username[UNLEN + 1]; in map_user_to_ids() local 68 if (!GetUserNameA(username, &len)) { in map_user_to_ids() 73 dprintf(1, "map_user_to_ids: mapping user %s\n", username); in map_user_to_ids() 75 if (nfs41_idmap_name_to_ids(idmapper, username, uid, gid)) { in map_user_to_ids()
|
/reactos/drivers/network/tcpip/lwip/src/netif/ppp/ |
H A D | chap_ms.c | 169 const u_char *rchallenge, const char *username, 535 const char *username, u_char Challenge[8]) { in ChallengeHash() argument 541 if ((user = strrchr(username, '\\')) != NULL) in ChallengeHash() 544 user = username; in ChallengeHash() 594 …tic void ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, in ChapMS2_NT() argument 600 ChallengeHash(PeerChallenge, rchallenge, username, Challenge); in ChapMS2_NT() 644 const u_char *rchallenge, const char *username, in GenerateAuthenticatorResponse() argument 674 ChallengeHash(PeerChallenge, rchallenge, username, Challenge); in GenerateAuthenticatorResponse() 693 const u_char *rchallenge, const char *username, in GenerateAuthenticatorResponsePlain() argument 706 rchallenge, username, authResponse); in GenerateAuthenticatorResponsePlain()
|
/reactos/dll/win32/hlink/ |
H A D | extserv.c | 35 LPWSTR username; member 92 heap_free(This->username); in ExtServUnk_Release() 141 *pszUsername = hlink_co_strdupW(This->username); in Authenticate_Authenticate() 270 heap_free(This->username); in ExtServ_ImplSetAuthenticateData() 274 This->username = hlink_strdupW(pwzUsername); in ExtServ_ImplSetAuthenticateData() 320 ret->username = NULL; in HlinkCreateExtensionServices()
|
/reactos/dll/win32/netapi32/ |
H A D | srvsvc.c | 178 _In_ LMSTR username, in NetFileEnum() argument 192 debugstr_w(servername), debugstr_w(basepath), debugstr_w(username), in NetFileEnum() 214 username, in NetFileEnum() 615 _In_opt_ LMSTR username) in NetSessionDel() argument 626 username); in NetSessionDel() 643 _In_opt_ LMSTR username, in NetSessionEnum() argument 697 username, in NetSessionEnum() 761 _In_ LMSTR username, in NetSessionGetInfo() argument 775 debugstr_w(username), level, bufptr); in NetSessionGetInfo() 780 if (UncClientName == NULL || username == NULL) in NetSessionGetInfo() [all …]
|
H A D | user.c | 2400 LPCWSTR username, in NetUserChangePassword() argument 2479 username, in NetUserChangePassword() 2544 LPCWSTR username) in NetUserDel() argument 2559 RtlInitUnicodeString(&UserName, username); in NetUserDel() 2983 LPCWSTR username, in NetUserGetGroups() argument 3011 RtlInitUnicodeString(&UserName, username); in NetUserGetGroups() 3148 LPCWSTR username, in NetUserGetInfo() argument 3173 RtlInitUnicodeString(&UserName, username); in NetUserGetInfo() 3325 LPCWSTR username, in NetUserGetLocalGroups() argument 3959 LPCWSTR username, in NetUserSetGroups() argument [all …]
|
/reactos/dll/win32/wtsapi32/ |
H A D | wtsapi32.c | 487 WCHAR* username; in WTSQuerySessionInformationW() local 493 username = heap_alloc(count * sizeof(WCHAR)); in WTSQuerySessionInformationW() 494 if (!username) in WTSQuerySessionInformationW() 500 GetUserNameW(username, &count); in WTSQuerySessionInformationW() 501 *Buffer = username; in WTSQuerySessionInformationW() 570 WCHAR *username; in WTSQuerySessionInformationW() 575 if (!(username = heap_alloc(count * sizeof(WCHAR)))) return FALSE; in WTSQuerySessionInformationW() 576 GetUserNameW(username, &count); in WTSQuerySessionInformationW() 577 *Buffer = username; in WTSQuerySessionInformationW()
|
/reactos/dll/directx/wine/dinput/ |
H A D | device.c | 656 sprintfW(keyname, subkey, username, device, guid); in del_mapping_key() 681 sprintfW(keyname, subkey, username, device, guid); in get_mapping_key() 794 WCHAR username[MAX_PATH]; in _build_action_map() local 804 GetUserNameW(username, &username_size); in _build_action_map() 806 lstrcpynW(username, lpszUserName, MAX_PATH); in _build_action_map() 874 WCHAR username[MAX_PATH]; in _set_action_map() local 1001 GetUserNameW(username, &username_size); in _set_action_map() 1003 lstrcpynW(username, lpszUserName, MAX_PATH); in _set_action_map() 1016 save_mapping_settings(iface, lpdiaf, username); in _set_action_map() 1419 if (*device_player->username) in IDirectInputDevice2WImpl_GetProperty() [all …]
|
H A D | dinput_private.h | 64 WCHAR username[MAX_PATH]; member 83 extern WCHAR* get_mapping_path(const WCHAR *device, const WCHAR *username) DECLSPEC_HIDDEN;
|
H A D | config.c | 502 WCHAR *username = NULL; in _configure_devices() local 512 username = heap_alloc(size * sizeof(WCHAR) ); in _configure_devices() 513 GetUserNameW(username, &size); in _configure_devices() 516 data.usernames[0] = username; in _configure_devices() 540 heap_free(username); in _configure_devices()
|
/reactos/dll/win32/winhttp/ |
H A D | url.c | 183 struct url_component scheme, username, password, hostname, path, extra; in WinHttpCrackUrl() local 245 username.str = &uc->lpszUserName; in WinHttpCrackUrl() 246 username.len = &uc->dwUserNameLength; in WinHttpCrackUrl() 256 if ((err = set_component( &username, p, r - p, flags, &overflow ))) goto exit; in WinHttpCrackUrl() 262 if ((err = set_component( &username, p, q - p, flags, &overflow ))) goto exit; in WinHttpCrackUrl() 269 if ((err = set_component( &username, NULL, 0, flags, &overflow ))) goto exit; in WinHttpCrackUrl()
|
H A D | request.c | 1183 username = request->creds[TARGET_SERVER][scheme].username; in do_authorization() 1189 username = request->connect->username; in do_authorization() 1201 username = request->creds[TARGET_PROXY][scheme].username; in do_authorization() 1226 … userlen = WideCharToMultiByte( CP_UTF8, 0, username, strlenW( username ), NULL, 0, NULL, NULL ); in do_authorization() 1259 domain = (WCHAR *)username; in do_authorization() 1265 user = (WCHAR *)username; in do_authorization() 2413 if (!username) request->creds[TARGET_SERVER][scheme].username = NULL; in set_credentials() 2414 … else if (!(request->creds[TARGET_SERVER][scheme].username = strdupW( username ))) return FALSE; in set_credentials() 2424 if (!username) request->creds[TARGET_PROXY][scheme].username = NULL; in set_credentials() 2425 … else if (!(request->creds[TARGET_PROXY][scheme].username = strdupW( username ))) return FALSE; in set_credentials() [all …]
|
/reactos/drivers/network/tcpip/lwip/src/apps/smtp/ |
H A D | smtp.c | 152 #define SMTP_USERNAME(session) (session)->username 265 char *username; member 402 smtp_set_auth(const char* username, const char* pass) in smtp_set_auth() argument 410 if (username != NULL) { in smtp_set_auth() 411 uname_len = strlen(username); in smtp_set_auth() 431 if (username != NULL) { in smtp_set_auth() 433 strcpy(smtp_username, username); in smtp_set_auth() 525 s->username = s->auth_plain; in smtp_send_mail_alloced() 528 s->username += smtp_username - smtp_auth_plain; in smtp_send_mail_alloced()
|
/reactos/sdk/include/reactos/mc/ |
H A D | net_msg.mc | 1102 groupname username [...] {/ADD | /DELETE} [/DOMAIN] 1117 groupname username [...] {/ADD | /DELETE} [/DOMAIN] 1122 groupname username [...] {/ADD | /DELETE} [/DOMAIN] 1127 groupname username [...] {/ADD | /DELETE} [/DOMAIN] 1132 groupname username [...] {/ADD | /DELETE} [/DOMAIN] 2872 NET USER [username [password | *] [options]] [/DOMAIN] 2873 username {password | *} /ADD [options] [/DOMAIN] 2874 username [/DELETE] [/DOMAIN] 2902 NET USER [username [password | *] [options]] [/DOMAIN] 2903 username {password | *} /ADD [options] [/DOMAIN] [all …]
|
/reactos/dll/win32/wininet/lang/ |
H A D | wininet_En.rc | 46 LTEXT "Please enter your username and password:", -1, 6, 6, 210, 15 66 LTEXT "Please enter your username and password:", -1, 6, 6, 210, 15
|