Home
last modified time | relevance | path

Searched refs:username (Results 1 – 25 of 82) sorted by relevance

1234

/reactos/modules/rostests/winetests/credui/
H A Dcredui.c41 WCHAR username[256]; in test_CredUIPromptForCredentials() local
58 username[0] = '\0'; in test_CredUIPromptForCredentials()
61 ARRAY_SIZE(username), in test_CredUIPromptForCredentials()
67 ARRAY_SIZE(username), in test_CredUIPromptForCredentials()
73 ARRAY_SIZE(username), in test_CredUIPromptForCredentials()
101 username, ARRAY_SIZE(username), in test_CredUIPromptForCredentials()
113 username, ARRAY_SIZE(username), in test_CredUIPromptForCredentials()
127 username, ARRAY_SIZE(username), in test_CredUIPromptForCredentials()
136 username, ARRAY_SIZE(username), in test_CredUIPromptForCredentials()
158 const WCHAR *username, *domain, *creds; in test_SspiPromptForCredentials() local
[all …]
/reactos/drivers/network/tcpip/lwip/src/apps/snmp/
H A Dsnmp_snmpv2_usm.c82 char username[32]; variable
145 memset(username, 0, sizeof(username)); in usmusertable_get_instance()
146 snmp_oid_to_name(username, &row_oid[name_start], name_len); in usmusertable_get_instance()
147 if (snmpv3_get_user(username, NULL, NULL, NULL, NULL) != ERR_OK) { in usmusertable_get_instance()
152 cell_instance->reference.ptr = username; in usmusertable_get_instance()
255 snmpv3_get_username(username, i); in usmusertable_get_next_instance()
257 test_oid[1 + eid_len] = strlen(username); in usmusertable_get_next_instance()
258 snmp_name_to_oid(username, &test_oid[2 + eid_len], strlen(username)); in usmusertable_get_next_instance()
268 memset(username, 0, sizeof(username)); in usmusertable_get_next_instance()
270 cell_instance->reference.ptr = username; in usmusertable_get_next_instance()
[all …]
/reactos/modules/rostests/winetests/secur32/
H A Dsecur32.c280 static const WCHAR username[] = {'u','s','e','r','n','a','m','e',0}; in test_SspiEncodeStringsAsAuthIdentity() local
314 status = pSspiEncodeStringsAsAuthIdentity( username, NULL, password, &id ); in test_SspiEncodeStringsAsAuthIdentity()
320 status = pSspiEncodeStringsAsAuthIdentity( username, NULL, NULL, &id ); in test_SspiEncodeStringsAsAuthIdentity()
333 ok( !lstrcmpW( username, username_ptr ), "wrong username\n" ); in test_SspiEncodeStringsAsAuthIdentity()
345 status = pSspiEncodeStringsAsAuthIdentity( username, NULL, password, &id ); in test_SspiEncodeStringsAsAuthIdentity()
353 ok( !lstrcmpW( username, username_ptr ), "wrong username\n" ); in test_SspiEncodeStringsAsAuthIdentity()
374 const WCHAR *target, *username; in test_SspiPrepareForCredWrite() local
394 ok( !lstrcmpW( username, targetW ), "got %s\n", wine_dbgstr_w(username) ); in test_SspiPrepareForCredWrite()
398 pSspiLocalFree( (void *)username ); in test_SspiPrepareForCredWrite()
406 ok( !lstrcmpW( username, targetW ), "got %s\n", wine_dbgstr_w(username) ); in test_SspiPrepareForCredWrite()
[all …]
/reactos/modules/rostests/winetests/advapi32/
H A Dcred.c391 USERNAME_TARGET_CREDENTIAL_INFO username; in test_CredMarshalCredentialA() local
505 username.UserName = NULL; in test_CredMarshalCredentialA()
514 username.UserName = emptyW; in test_CredMarshalCredentialA()
523 username.UserName = tW; in test_CredMarshalCredentialA()
531 username.UserName = teW; in test_CredMarshalCredentialA()
539 username.UserName = tesW; in test_CredMarshalCredentialA()
547 username.UserName = testW; in test_CredMarshalCredentialA()
555 username.UserName = test1W; in test_CredMarshalCredentialA()
575 USERNAME_TARGET_CREDENTIAL_INFO *username; in test_CredUnmarshalCredentialA() local
684 username = p; in test_CredUnmarshalCredentialA()
[all …]
/reactos/dll/win32/wininet/
H A Ddialogs.c170 static BOOL WININET_SetAuthorization( http_request_t *request, LPWSTR username, in WININET_SetAuthorization() argument
176 p = heap_strdupW(username); in WININET_SetAuthorization()
251 WCHAR username[0x20], password[0x20]; in WININET_ProxyPasswordDialog() local
253 username[0] = 0; in WININET_ProxyPasswordDialog()
256 GetWindowTextW( hitem, username, ARRAY_SIZE( username )); in WININET_ProxyPasswordDialog()
269 WININET_SetAuthorization( params->req, username, password, TRUE ); in WININET_ProxyPasswordDialog()
326 WCHAR username[0x20], password[0x20]; in WININET_PasswordDialog() local
328 username[0] = 0; in WININET_PasswordDialog()
331 GetWindowTextW( hitem, username, ARRAY_SIZE( username )); in WININET_PasswordDialog()
346 WININET_SetAuthorization( params->req, username, password, FALSE ); in WININET_PasswordDialog()
/reactos/base/applications/mstsc/
H A Diso.c60 iso_send_connection_request(char *username, uint32 neg_proto) in iso_send_connection_request() argument
63 int length = 30 + strlen(username); in iso_send_connection_request()
81 out_uint8p(s, username, strlen(username)); in iso_send_connection_request()
203 iso_connect(char *server, char *username, char *domain, char *password, in iso_connect() argument
230 iso_send_connection_request(username, neg_proto); in iso_connect()
329 if (!cssp_connect(server, username, domain, password, s)) in iso_connect()
/reactos/dll/win32/credui/
H A Dcredui_main.c578 if ((!*username || !lstrcmpW(username, credentials[i]->UserName)) && in find_existing_credential()
584 lstrcpyW(username, credentials[i]->UserName); in find_existing_credential()
877 WCHAR username[CREDUI_MAX_USERNAME_LENGTH + 1] = {0}; in SspiPromptForCredentialsW() local
879 DWORD len_username = ARRAY_SIZE(username); in SspiPromptForCredentialsW()
909 memcpy( username, id->User, id->UserLength * sizeof(WCHAR) ); in SspiPromptForCredentialsW()
910 username[id->UserLength] = 0; in SspiPromptForCredentialsW()
923 WCHAR *ptr, *user = username, *domain = NULL; in SspiPromptForCredentialsW()
925 if ((ptr = wcschr( username, '\\' ))) in SspiPromptForCredentialsW()
931 domain = username; in SspiPromptForCredentialsW()
932 len_domain = ptr - username; in SspiPromptForCredentialsW()
[all …]
/reactos/drivers/network/tcpip/lwip/src/include/lwip/apps/
H A Dsnmpv3.h84 err_t snmpv3_get_user(const char* username, snmpv3_auth_algo_t *auth_algo, u8_t *auth_key, snmpv3_p…
86 err_t snmpv3_get_user_storagetype(const char *username, snmpv3_user_storagetype_t *storagetype);
87 err_t snmpv3_get_username(char *username, u8_t index);
/reactos/modules/rostests/winetests/jscript/
H A Dsunspider-string-validate-input.js14 username = makeName(6);
15 (k%2)?email=username+"@mac.com":email=username+"(at)mac.com";
/reactos/base/services/nfsd/
H A Didmap.c501 char username[VAL_LEN]; member
523 StringCchCopyA(dst->username, VAL_LEN, src->username); in user_cache_copy()
709 if (FAILED(StringCchCopyA(user->username, VAL_LEN, in idmap_lookup_user()
885 const char *username = (const char*)value; in username_cmp() local
886 return strcmp(entry->username, username); in username_cmp()
891 const char *username, in nfs41_idmap_name_to_ids() argument
903 dprintf(IDLVL, "--> nfs41_idmap_name_to_ids('%s')\n", username); in nfs41_idmap_name_to_ids()
905 lookup.value = username; in nfs41_idmap_name_to_ids()
911 "failed with %d\n", username, status); in nfs41_idmap_name_to_ids()
955 if (FAILED(StringCchCopyA(name, len, user.username))) { in nfs41_idmap_uid_to_name()
[all …]
H A Dnfs41_client.c369 char username[UNLEN + 1]; in nfs41_client_owner() local
372 if (!GetUserNameA(username, &len)) { in nfs41_client_owner()
400 if (!CryptHashData(hash, (const BYTE*)username, (DWORD)strlen(username), 0)) { in nfs41_client_owner()
H A Dnfs41_daemon.c64 char username[UNLEN + 1]; in map_user_to_ids() local
68 if (!GetUserNameA(username, &len)) { in map_user_to_ids()
73 dprintf(1, "map_user_to_ids: mapping user %s\n", username); in map_user_to_ids()
75 if (nfs41_idmap_name_to_ids(idmapper, username, uid, gid)) { in map_user_to_ids()
/reactos/drivers/network/tcpip/lwip/src/netif/ppp/
H A Dchap_ms.c169 const u_char *rchallenge, const char *username,
535 const char *username, u_char Challenge[8]) { in ChallengeHash() argument
541 if ((user = strrchr(username, '\\')) != NULL) in ChallengeHash()
544 user = username; in ChallengeHash()
594 …tic void ChapMS2_NT(const u_char *rchallenge, const u_char PeerChallenge[16], const char *username, in ChapMS2_NT() argument
600 ChallengeHash(PeerChallenge, rchallenge, username, Challenge); in ChapMS2_NT()
644 const u_char *rchallenge, const char *username, in GenerateAuthenticatorResponse() argument
674 ChallengeHash(PeerChallenge, rchallenge, username, Challenge); in GenerateAuthenticatorResponse()
693 const u_char *rchallenge, const char *username, in GenerateAuthenticatorResponsePlain() argument
706 rchallenge, username, authResponse); in GenerateAuthenticatorResponsePlain()
/reactos/dll/win32/hlink/
H A Dextserv.c35 LPWSTR username; member
92 heap_free(This->username); in ExtServUnk_Release()
141 *pszUsername = hlink_co_strdupW(This->username); in Authenticate_Authenticate()
270 heap_free(This->username); in ExtServ_ImplSetAuthenticateData()
274 This->username = hlink_strdupW(pwzUsername); in ExtServ_ImplSetAuthenticateData()
320 ret->username = NULL; in HlinkCreateExtensionServices()
/reactos/dll/win32/netapi32/
H A Dsrvsvc.c178 _In_ LMSTR username, in NetFileEnum() argument
192 debugstr_w(servername), debugstr_w(basepath), debugstr_w(username), in NetFileEnum()
214 username, in NetFileEnum()
615 _In_opt_ LMSTR username) in NetSessionDel() argument
626 username); in NetSessionDel()
643 _In_opt_ LMSTR username, in NetSessionEnum() argument
697 username, in NetSessionEnum()
761 _In_ LMSTR username, in NetSessionGetInfo() argument
775 debugstr_w(username), level, bufptr); in NetSessionGetInfo()
780 if (UncClientName == NULL || username == NULL) in NetSessionGetInfo()
[all …]
H A Duser.c2400 LPCWSTR username, in NetUserChangePassword() argument
2479 username, in NetUserChangePassword()
2544 LPCWSTR username) in NetUserDel() argument
2559 RtlInitUnicodeString(&UserName, username); in NetUserDel()
2983 LPCWSTR username, in NetUserGetGroups() argument
3011 RtlInitUnicodeString(&UserName, username); in NetUserGetGroups()
3148 LPCWSTR username, in NetUserGetInfo() argument
3173 RtlInitUnicodeString(&UserName, username); in NetUserGetInfo()
3325 LPCWSTR username, in NetUserGetLocalGroups() argument
3959 LPCWSTR username, in NetUserSetGroups() argument
[all …]
/reactos/dll/win32/wtsapi32/
H A Dwtsapi32.c487 WCHAR* username; in WTSQuerySessionInformationW() local
493 username = heap_alloc(count * sizeof(WCHAR)); in WTSQuerySessionInformationW()
494 if (!username) in WTSQuerySessionInformationW()
500 GetUserNameW(username, &count); in WTSQuerySessionInformationW()
501 *Buffer = username; in WTSQuerySessionInformationW()
570 WCHAR *username; in WTSQuerySessionInformationW()
575 if (!(username = heap_alloc(count * sizeof(WCHAR)))) return FALSE; in WTSQuerySessionInformationW()
576 GetUserNameW(username, &count); in WTSQuerySessionInformationW()
577 *Buffer = username; in WTSQuerySessionInformationW()
/reactos/dll/directx/wine/dinput/
H A Ddevice.c656 sprintfW(keyname, subkey, username, device, guid); in del_mapping_key()
681 sprintfW(keyname, subkey, username, device, guid); in get_mapping_key()
794 WCHAR username[MAX_PATH]; in _build_action_map() local
804 GetUserNameW(username, &username_size); in _build_action_map()
806 lstrcpynW(username, lpszUserName, MAX_PATH); in _build_action_map()
874 WCHAR username[MAX_PATH]; in _set_action_map() local
1001 GetUserNameW(username, &username_size); in _set_action_map()
1003 lstrcpynW(username, lpszUserName, MAX_PATH); in _set_action_map()
1016 save_mapping_settings(iface, lpdiaf, username); in _set_action_map()
1419 if (*device_player->username) in IDirectInputDevice2WImpl_GetProperty()
[all …]
H A Ddinput_private.h64 WCHAR username[MAX_PATH]; member
83 extern WCHAR* get_mapping_path(const WCHAR *device, const WCHAR *username) DECLSPEC_HIDDEN;
H A Dconfig.c502 WCHAR *username = NULL; in _configure_devices() local
512 username = heap_alloc(size * sizeof(WCHAR) ); in _configure_devices()
513 GetUserNameW(username, &size); in _configure_devices()
516 data.usernames[0] = username; in _configure_devices()
540 heap_free(username); in _configure_devices()
/reactos/dll/win32/winhttp/
H A Durl.c183 struct url_component scheme, username, password, hostname, path, extra; in WinHttpCrackUrl() local
245 username.str = &uc->lpszUserName; in WinHttpCrackUrl()
246 username.len = &uc->dwUserNameLength; in WinHttpCrackUrl()
256 if ((err = set_component( &username, p, r - p, flags, &overflow ))) goto exit; in WinHttpCrackUrl()
262 if ((err = set_component( &username, p, q - p, flags, &overflow ))) goto exit; in WinHttpCrackUrl()
269 if ((err = set_component( &username, NULL, 0, flags, &overflow ))) goto exit; in WinHttpCrackUrl()
H A Drequest.c1183 username = request->creds[TARGET_SERVER][scheme].username; in do_authorization()
1189 username = request->connect->username; in do_authorization()
1201 username = request->creds[TARGET_PROXY][scheme].username; in do_authorization()
1226 … userlen = WideCharToMultiByte( CP_UTF8, 0, username, strlenW( username ), NULL, 0, NULL, NULL ); in do_authorization()
1259 domain = (WCHAR *)username; in do_authorization()
1265 user = (WCHAR *)username; in do_authorization()
2413 if (!username) request->creds[TARGET_SERVER][scheme].username = NULL; in set_credentials()
2414 … else if (!(request->creds[TARGET_SERVER][scheme].username = strdupW( username ))) return FALSE; in set_credentials()
2424 if (!username) request->creds[TARGET_PROXY][scheme].username = NULL; in set_credentials()
2425 … else if (!(request->creds[TARGET_PROXY][scheme].username = strdupW( username ))) return FALSE; in set_credentials()
[all …]
/reactos/drivers/network/tcpip/lwip/src/apps/smtp/
H A Dsmtp.c152 #define SMTP_USERNAME(session) (session)->username
265 char *username; member
402 smtp_set_auth(const char* username, const char* pass) in smtp_set_auth() argument
410 if (username != NULL) { in smtp_set_auth()
411 uname_len = strlen(username); in smtp_set_auth()
431 if (username != NULL) { in smtp_set_auth()
433 strcpy(smtp_username, username); in smtp_set_auth()
525 s->username = s->auth_plain; in smtp_send_mail_alloced()
528 s->username += smtp_username - smtp_auth_plain; in smtp_send_mail_alloced()
/reactos/sdk/include/reactos/mc/
H A Dnet_msg.mc1102 groupname username [...] {/ADD | /DELETE} [/DOMAIN]
1117 groupname username [...] {/ADD | /DELETE} [/DOMAIN]
1122 groupname username [...] {/ADD | /DELETE} [/DOMAIN]
1127 groupname username [...] {/ADD | /DELETE} [/DOMAIN]
1132 groupname username [...] {/ADD | /DELETE} [/DOMAIN]
2872 NET USER [username [password | *] [options]] [/DOMAIN]
2873 username {password | *} /ADD [options] [/DOMAIN]
2874 username [/DELETE] [/DOMAIN]
2902 NET USER [username [password | *] [options]] [/DOMAIN]
2903 username {password | *} /ADD [options] [/DOMAIN]
[all …]
/reactos/dll/win32/wininet/lang/
H A Dwininet_En.rc46 LTEXT "Please enter your username and password:", -1, 6, 6, 210, 15
66 LTEXT "Please enter your username and password:", -1, 6, 6, 210, 15

1234