client 627 librpc/gen_ndr/cli_srvsvc.c const char *client /* [in] [unique,charset(UTF16)] */, client 640 librpc/gen_ndr/cli_srvsvc.c r.in.client = client; client 686 librpc/gen_ndr/cli_srvsvc.c const char *client /* [in] [unique,charset(UTF16)] */, client 695 librpc/gen_ndr/cli_srvsvc.c r.in.client = client; client 95 librpc/gen_ndr/cli_srvsvc.h const char *client /* [in] [unique,charset(UTF16)] */, client 105 librpc/gen_ndr/cli_srvsvc.h const char *client /* [in] [unique,charset(UTF16)] */, client 17896 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client)); client 17904 librpc/gen_ndr/ndr_spoolss.c if (r->client) { client 17905 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 17907 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 17908 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16)); client 17931 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_ALLOC(ndr, r->client); client 17933 librpc/gen_ndr/ndr_spoolss.c r->client = NULL; client 17947 librpc/gen_ndr/ndr_spoolss.c if (r->client) { client 17949 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0); client 17950 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client)); client 17951 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client)); client 17952 librpc/gen_ndr/ndr_spoolss.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) { client 17953 librpc/gen_ndr/ndr_spoolss.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client)); client 17955 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t))); client 17956 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16)); client 17980 librpc/gen_ndr/ndr_spoolss.c ndr_print_ptr(ndr, "client", r->client); client 17982 librpc/gen_ndr/ndr_spoolss.c if (r->client) { client 17983 librpc/gen_ndr/ndr_spoolss.c ndr_print_string(ndr, "client", r->client); client 18036 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client)); client 18045 librpc/gen_ndr/ndr_spoolss.c if (r->client) { client 18046 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 18048 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 18049 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16)); client 18074 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_ALLOC(ndr, r->client); client 18076 librpc/gen_ndr/ndr_spoolss.c r->client = NULL; client 18091 librpc/gen_ndr/ndr_spoolss.c if (r->client) { client 18093 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0); client 18094 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client)); client 18095 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client)); client 18096 librpc/gen_ndr/ndr_spoolss.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) { client 18097 librpc/gen_ndr/ndr_spoolss.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client)); client 18099 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t))); client 18100 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16)); client 18126 librpc/gen_ndr/ndr_spoolss.c ndr_print_ptr(ndr, "client", r->client); client 18128 librpc/gen_ndr/ndr_spoolss.c if (r->client) { client 18129 librpc/gen_ndr/ndr_spoolss.c ndr_print_string(ndr, "client", r->client); client 2397 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client)); client 2400 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 2401 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 2403 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 2404 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16)); client 2418 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->client); client 2420 librpc/gen_ndr/ndr_srvsvc.c r->client = NULL; client 2424 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 2426 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0); client 2427 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client)); client 2428 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client)); client 2429 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) { client 2430 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client)); client 2432 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t))); client 2433 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16)); client 2444 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->client); client 2446 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 2447 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->client); client 2543 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client)); client 2551 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 2552 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 2554 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 2555 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16)); client 2577 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->client); client 2579 librpc/gen_ndr/ndr_srvsvc.c r->client = NULL; client 2593 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 2595 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0); client 2596 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client)); client 2597 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client)); client 2598 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) { client 2599 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client)); client 2601 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t))); client 2602 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16)); client 2625 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->client); client 2627 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 2628 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->client); client 2734 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client)); client 2743 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 2744 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 2746 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 2747 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16)); client 2777 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->client); client 2779 librpc/gen_ndr/ndr_srvsvc.c r->client = NULL; client 2799 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 2801 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0); client 2802 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client)); client 2803 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client)); client 2804 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) { client 2805 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client)); client 2807 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t))); client 2808 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16)); client 2843 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->client); client 2845 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 2846 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->client); client 2958 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client)); client 2964 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 2965 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 2967 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 2968 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16)); client 2990 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->client); client 2992 librpc/gen_ndr/ndr_srvsvc.c r->client = NULL; client 3004 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 3006 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0); client 3007 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client)); client 3008 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client)); client 3009 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) { client 3010 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client)); client 3012 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t))); client 3013 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16)); client 3036 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->client); client 3038 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 3039 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->client); client 3143 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client)); client 3153 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 3154 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 3156 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16))); client 3157 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16)); client 3195 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->client); client 3197 librpc/gen_ndr/ndr_srvsvc.c r->client = NULL; client 3223 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 3225 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0); client 3226 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client)); client 3227 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client)); client 3228 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) { client 3229 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client)); client 3231 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t))); client 3232 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16)); client 3279 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->client); client 3281 librpc/gen_ndr/ndr_srvsvc.c if (r->client) { client 3282 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->client); client 14855 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.client)); client 14856 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) { client 14857 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16))); client 14859 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16))); client 14860 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.client, ndr_charset_length(r->in.client, CH_UTF16), sizeof(uint16_t), CH_UTF16)); client 14932 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.client); client 14934 librpc/gen_ndr/ndr_srvsvc.c r->in.client = NULL; client 14936 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) { client 14938 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.client, 0); client 14939 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.client)); client 14940 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.client)); client 14941 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.client) > ndr_get_array_size(ndr, &r->in.client)) { client 14942 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.client), ndr_get_array_length(ndr, &r->in.client)); client 14944 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t))); client 14945 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.client, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t), CH_UTF16)); client 15039 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->in.client); client 15041 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) { client 15042 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->in.client); client 15097 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.client)); client 15098 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) { client 15099 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16))); client 15101 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16))); client 15102 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.client, ndr_charset_length(r->in.client, CH_UTF16), sizeof(uint16_t), CH_UTF16)); client 15147 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.client); client 15149 librpc/gen_ndr/ndr_srvsvc.c r->in.client = NULL; client 15151 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) { client 15153 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.client, 0); client 15154 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.client)); client 15155 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.client)); client 15156 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.client) > ndr_get_array_size(ndr, &r->in.client)) { client 15157 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.client), ndr_get_array_length(ndr, &r->in.client)); client 15159 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t))); client 15160 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.client, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t), CH_UTF16)); client 15204 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->in.client); client 15206 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) { client 15207 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->in.client); client 1514 librpc/gen_ndr/spoolss.h const char *client;/* [unique,charset(UTF16)] */ client 1530 librpc/gen_ndr/spoolss.h const char *client;/* [unique,charset(UTF16)] */ client 161 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */ client 170 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */ client 184 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */ client 199 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */ client 211 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */ client 1245 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */ client 1265 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */ client 61 source3/include/ctdbd_conn.h const struct sockaddr_storage *client, client 452 source3/include/nt_printing.h } client; client 1386 source3/include/proto.h bool send_keepalive(int client); client 180 source3/lib/access.c const char **client = (const char **)item; client 187 source3/lib/access.c if (string_match(tok, client[ADDR_INDEX])) { client 191 source3/lib/access.c if (strnequal(client[ADDR_INDEX],"::ffff:",7) && client 199 source3/lib/access.c if (string_match(tok, (client[ADDR_INDEX])+7)) { client 204 source3/lib/access.c if (client[NAME_INDEX][0] != 0) { client 205 source3/lib/access.c if (string_match(tok, client[NAME_INDEX])) { client 264 source3/lib/access.c const char *client[2]; client 266 source3/lib/access.c client[NAME_INDEX] = cname; client 267 source3/lib/access.c client[ADDR_INDEX] = caddr; client 276 source3/lib/access.c list_match(deny_list,client,client_match) && client 278 source3/lib/access.c !list_match(allow_list,client, client_match))) { client 293 source3/lib/access.c return(list_match(allow_list,client,client_match)); client 299 source3/lib/access.c return(!list_match(deny_list,client,client_match)); client 304 source3/lib/access.c if (list_match(allow_list,(const char *)client,client_match)) { client 310 source3/lib/access.c if (list_match(deny_list,(const char *)client,client_match)) { client 1232 source3/lib/ctdbd_conn.c struct sockaddr_storage client; client 1240 source3/lib/ctdbd_conn.c smbd_ctdb_canonicalize_ip(_client, &client); client 1243 source3/lib/ctdbd_conn.c switch (client.ss_family) { client 1246 source3/lib/ctdbd_conn.c p4.src = *(struct sockaddr_in *)&client; client 1253 source3/lib/ctdbd_conn.c p.src.ip6 = *(struct sockaddr_in6 *)&client; client 751 source3/lib/util_sock.c bool send_keepalive(int client) client 758 source3/lib/util_sock.c return(write_data(client,(char *)buf,4) == 4); client 648 source3/libads/krb5_setpw.c ret = krb5_cc_get_principal(context, ccache, &creds.client); client 663 source3/libads/krb5_setpw.c krb5_free_principal(context, creds.client); client 679 source3/libads/krb5_setpw.c krb5_free_principal(context, creds.client); client 474 source3/libsmb/clikrb5.c return tkt->enc_part2->client; client 476 source3/libsmb/clikrb5.c return tkt->client; client 684 source3/libsmb/clikrb5.c if ((retval = krb5_cc_get_principal(context, ccache, &creds.client))) { client 1261 source3/libsmb/clikrb5.c krb5_principal client = NULL; client 1291 source3/libsmb/clikrb5.c ret = smb_krb5_parse_name(context, client_string, &client); client 1296 source3/libsmb/clikrb5.c ret = krb5_cc_get_principal(context, ccache, &client); client 1304 source3/libsmb/clikrb5.c ret = krb5_get_renewed_creds(context, &creds, client, ccache, CONST_DISCARD(char *, service_string)); client 1315 source3/libsmb/clikrb5.c ret = krb5_copy_principal(context, client, &creds_in.client); client 1327 source3/libsmb/clikrb5.c client_realm = krb5_princ_realm(context, creds_in.client); client 1354 source3/libsmb/clikrb5.c ret = krb5_cc_initialize(context, ccache, client); client 1374 source3/libsmb/clikrb5.c if (client) { client 1375 source3/libsmb/clikrb5.c krb5_free_principal(context, client); client 1862 source3/libsmb/clikrb5.c credsp->client, /* Client principal for the tgt [in] */ client 47 source3/rpc_client/cli_spoolss.c level1.client = talloc_asprintf(mem_ctx, "\\\\%s", global_myname()); client 48 source3/rpc_client/cli_spoolss.c W_ERROR_HAVE_NO_MEMORY(level1.client); client 164 source3/rpc_client/cli_spoolss.c level1.client = talloc_asprintf(mem_ctx, "\\\\%s", global_myname()); client 165 source3/rpc_client/cli_spoolss.c W_ERROR_HAVE_NO_MEMORY(level1.client); client 779 source3/rpc_server/srv_srvsvc_nt.c ctr0->array[num_entries].client = client 877 source3/rpc_server/srv_srvsvc_nt.c ctr1->array[num_entries].client = session_list[resume_handle].remote_machine; client 1253 source3/rpc_server/srv_srvsvc_nt.c machine = r->in.client; client 687 source3/rpcclient/cmd_srvsvc.c const char *client = NULL; client 696 source3/rpcclient/cmd_srvsvc.c client = argv[1]; client 743 source3/rpcclient/cmd_srvsvc.c client, client 29 source3/smbd/avahi_register.c AvahiClient *client; client 48 source3/smbd/avahi_register.c error = avahi_client_errno(state->client); client 118 source3/smbd/avahi_register.c state->client = avahi_client_new(state->poll, AVAHI_CLIENT_NO_FAIL, client 121 source3/smbd/avahi_register.c if (state->client == NULL) { client 157 source3/smbd/avahi_register.c state->client = avahi_client_new(state->poll, AVAHI_CLIENT_NO_FAIL, client 160 source3/smbd/avahi_register.c if (state->client == NULL) { client 1942 source3/smbd/process.c struct sockaddr_storage *client) client 1952 source3/smbd/process.c length = sizeof(*client); client 1953 source3/smbd/process.c if (getpeername(server_fd, (struct sockaddr *)client, &length) != 0) { client 249 source3/smbd/sesssetup.c char *client, *p, *domain; client 287 source3/smbd/sesssetup.c &client, &pac_data, &ap_rep, client 348 source3/smbd/sesssetup.c DEBUG(3,("Ticket name is [%s]\n", client)); client 350 source3/smbd/sesssetup.c p = strchr_m(client, '@'); client 367 source3/smbd/sesssetup.c netsamlogon_cache_store( client, &logon_info->info3 ); client 372 source3/smbd/sesssetup.c DEBUG(3,("Ticket for foreign realm %s@%s\n", client, p+1)); client 424 source3/smbd/sesssetup.c fstr_sprintf(user, "%s%c%s", domain, *lp_winbind_separator(), client); client 485 source3/smbd/sesssetup.c ret = make_server_info_info3(mem_ctx, client, domain, client 555 source3/smbd/sesssetup.c client); client 862 source3/torture/torture.c static bool run_netbench(int client) client 874 source3/torture/torture.c nbio_id = client; client 880 source3/torture/torture.c slprintf(cname,sizeof(cname)-1, "client%d", client); client 67 source4/auth/auth.h } client, mapped; client 157 source4/auth/gensec/schannel_state.c client_state.data = creds->client.data; client 158 source4/auth/gensec/schannel_state.c client_state.length = sizeof(creds->client.data); client 281 source4/auth/gensec/schannel_state.c memcpy((*creds)->client.data, val->data, 8); client 264 source4/auth/ntlm/auth.c user_info->client.domain_name, user_info->client.account_name, user_info->workstation_name)); client 38 source4/auth/ntlm/auth_anonymous.c if (user_info->client.account_name && *user_info->client.account_name) { client 58 source4/auth/ntlm/auth_developer.c user = user_info->client.account_name; client 205 source4/auth/ntlm/auth_sam.c user_info->client.account_name, client 206 source4/auth/ntlm/auth_sam.c user_info->client.domain_name, client 127 source4/auth/ntlm/auth_server.c cli_credentials_set_username(creds, user_info->client.account_name, CRED_SPECIFIED); client 128 source4/auth/ntlm/auth_server.c cli_credentials_set_domain(creds, user_info->client.domain_name, CRED_SPECIFIED); client 177 source4/auth/ntlm/auth_server.c server_info->account_name = talloc_strdup(server_info, user_info->client.account_name); client 180 source4/auth/ntlm/auth_server.c server_info->domain_name = talloc_strdup(server_info, user_info->client.domain_name); client 69 source4/auth/ntlm/auth_simple.c user_info->client.account_name = nt4_username; client 71 source4/auth/ntlm/auth_simple.c user_info->client.domain_name = nt4_domain; client 55 source4/auth/ntlm/auth_util.c user_info->client.domain_name, user_info->client.account_name, user_info->workstation_name)); client 57 source4/auth/ntlm/auth_util.c account_name = talloc_strdup(mem_ctx, user_info->client.account_name); client 67 source4/auth/ntlm/auth_util.c if (user_info->client.domain_name && *user_info->client.domain_name) { client 68 source4/auth/ntlm/auth_util.c domain = user_info->client.domain_name; client 69 source4/auth/ntlm/auth_util.c } else if (strchr_m(user_info->client.account_name, '@')) { client 152 source4/auth/ntlm/auth_util.c user_info_in->client.account_name, client 153 source4/auth/ntlm/auth_util.c user_info_in->client.domain_name, client 101 source4/auth/ntlm/auth_winbind.c user_info->client.account_name, sizeof(fstring)); client 103 source4/auth/ntlm/auth_winbind.c user_info->client.domain_name, sizeof(fstring)); client 133 source4/auth/ntlm/auth_winbind.c user_info->client.account_name, client 140 source4/auth/ntlm/auth_winbind.c user_info->client.domain_name, user_info->client.account_name)); client 145 source4/auth/ntlm/auth_winbind.c user_info->client.domain_name, user_info->client.account_name)); client 178 source4/auth/ntlm/auth_winbind.c user_info->client.domain_name, user_info->client.account_name)); client 227 source4/auth/ntlm/auth_winbind.c identity_info->domain_name.string = user_info->client.domain_name; client 231 source4/auth/ntlm/auth_winbind.c identity_info->account_name.string = user_info->client.account_name; client 242 source4/auth/ntlm/auth_winbind.c user_info->client.account_name, client 673 source4/auth/ntlmssp/ntlmssp_server.c user_info->client.account_name = gensec_ntlmssp_state->user; client 674 source4/auth/ntlmssp/ntlmssp_server.c user_info->client.domain_name = gensec_ntlmssp_state->domain; client 91 source4/heimdal/kdc/524.c krb5_principal client; client 95 source4/heimdal/kdc/524.c ret = _krb5_principalname2krb5_principal(context, &client, client 102 source4/heimdal/kdc/524.c ret = krb5_unparse_name(context, client, &cpn); client 104 source4/heimdal/kdc/524.c krb5_free_principal(context, client); client 111 source4/heimdal/kdc/524.c krb5_free_principal(context, client); client 84 source4/heimdal/kdc/digest.c hdb_entry_ex *client) client 89 source4/heimdal/kdc/digest.c client->entry.principal)); client 104 source4/heimdal/kdc/digest.c hdb_entry_ex *client, client 116 source4/heimdal/kdc/digest.c p = client->entry.principal; client 221 source4/heimdal/kdc/digest.c hdb_entry_ex *client = NULL; client 316 source4/heimdal/kdc/digest.c HDB_F_GET_CLIENT, NULL, &client); client 321 source4/heimdal/kdc/digest.c if (client->entry.flags.allow_digest == 0) { client 1022 source4/heimdal/kdc/digest.c get_ntlm_targetname(context, client); client 1052 source4/heimdal/kdc/digest.c client, client 1195 source4/heimdal/kdc/digest.c targetname = get_ntlm_targetname(context, client); client 1443 source4/heimdal/kdc/digest.c if (client) client 1444 source4/heimdal/kdc/digest.c _kdc_free_ent (context, client); client 138 source4/heimdal/kdc/kerberos4.c hdb_entry_ex *client = NULL, *server = NULL; client 197 source4/heimdal/kdc/kerberos4.c HDB_F_GET_CLIENT, &client); client 216 source4/heimdal/kdc/kerberos4.c client, client_name, client 227 source4/heimdal/kdc/kerberos4.c client->entry.flags.allow_kerberos4 == 0) client 243 source4/heimdal/kdc/kerberos4.c || client->entry.flags.require_preauth client 254 source4/heimdal/kdc/kerberos4.c ret = _kdc_get_des_key(context, client, FALSE, FALSE, &ckey); client 271 source4/heimdal/kdc/kerberos4.c if(client->entry.max_life) client 272 source4/heimdal/kdc/kerberos4.c max_life = min(max_life, *client->entry.max_life); client 332 source4/heimdal/kdc/kerberos4.c client->entry.pw_end ? *client->entry.pw_end : 0, client 333 source4/heimdal/kdc/kerberos4.c client->entry.kvno % 256, client 468 source4/heimdal/kdc/kerberos4.c HDB_F_GET_CLIENT, &client); client 478 source4/heimdal/kdc/kerberos4.c if (client == NULL && strcmp(ad.prealm, config->v4_realm) == 0) { client 501 source4/heimdal/kdc/kerberos4.c client, client_name, client 523 source4/heimdal/kdc/kerberos4.c if(client && client->entry.max_life) client 524 source4/heimdal/kdc/kerberos4.c max_end = min(max_end, kdc_time + *client->entry.max_life); client 634 source4/heimdal/kdc/kerberos4.c if(client) client 635 source4/heimdal/kdc/kerberos4.c _kdc_free_ent(context, client); client 464 source4/heimdal/kdc/kerberos5.c METHOD_DATA *md, hdb_entry *client, client 475 source4/heimdal/kdc/kerberos5.c pa.len = client->keys.len; client 483 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) { client 485 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype) client 488 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) { client 497 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) { client 506 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) { client 509 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) client 512 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0) client 520 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) { client 626 source4/heimdal/kdc/kerberos5.c METHOD_DATA *md, hdb_entry *client, client 636 source4/heimdal/kdc/kerberos5.c pa.len = client->keys.len; client 644 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) { client 646 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype) client 649 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) { client 655 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) { client 665 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) { client 668 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) client 671 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0) client 676 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) { client 780 source4/heimdal/kdc/kerberos5.c hdb_entry *client = &client_ex->entry; client 783 source4/heimdal/kdc/kerberos5.c if (client->flags.invalid) { client 789 source4/heimdal/kdc/kerberos5.c if(!client->flags.client){ client 795 source4/heimdal/kdc/kerberos5.c if (client->valid_start && *client->valid_start > kdc_time) { client 797 source4/heimdal/kdc/kerberos5.c krb5_format_time(context, *client->valid_start, client 805 source4/heimdal/kdc/kerberos5.c if (client->valid_end && *client->valid_end < kdc_time) { client 807 source4/heimdal/kdc/kerberos5.c krb5_format_time(context, *client->valid_end, client 815 source4/heimdal/kdc/kerberos5.c if (client->pw_end && *client->pw_end < kdc_time client 818 source4/heimdal/kdc/kerberos5.c krb5_format_time(context, *client->pw_end, client 976 source4/heimdal/kdc/kerberos5.c hdb_entry_ex *client = NULL, *server = NULL; client 1054 source4/heimdal/kdc/kerberos5.c HDB_F_GET_CLIENT | flags, NULL, &client); client 1072 source4/heimdal/kdc/kerberos5.c ret = _kdc_windc_client_access(context, client, req, &e_data); client 1077 source4/heimdal/kdc/kerberos5.c client, client_name, client 1123 source4/heimdal/kdc/kerberos5.c client, client 1172 source4/heimdal/kdc/kerberos5.c ret = hdb_enctype2key(context, &client->entry, client 1223 source4/heimdal/kdc/kerberos5.c if(hdb_next_enctype2key(context, &client->entry, client 1301 source4/heimdal/kdc/kerberos5.c || client->entry.flags.require_preauth client 1343 source4/heimdal/kdc/kerberos5.c &method_data, &client->entry, client 1347 source4/heimdal/kdc/kerberos5.c &client->entry, b->etype.val, b->etype.len); client 1372 source4/heimdal/kdc/kerberos5.c ret = _kdc_find_etype(context, client, b->etype.val, b->etype.len, client 1452 source4/heimdal/kdc/kerberos5.c copy_Realm(&client->entry.principal->realm, &rep.crealm); client 1457 source4/heimdal/kdc/kerberos5.c client->entry.principal); client 1470 source4/heimdal/kdc/kerberos5.c if(client->entry.flags.forwardable && server->entry.flags.forwardable) client 1478 source4/heimdal/kdc/kerberos5.c if(client->entry.flags.proxiable && server->entry.flags.proxiable) client 1486 source4/heimdal/kdc/kerberos5.c if(client->entry.flags.postdate && server->entry.flags.postdate) client 1526 source4/heimdal/kdc/kerberos5.c if(client->entry.max_life) client 1527 source4/heimdal/kdc/kerberos5.c t = start + min(t - start, *client->entry.max_life); client 1547 source4/heimdal/kdc/kerberos5.c if(client->entry.max_renew) client 1548 source4/heimdal/kdc/kerberos5.c t = start + min(t - start, *client->entry.max_renew); client 1588 source4/heimdal/kdc/kerberos5.c if (client->entry.pw_end client 1590 source4/heimdal/kdc/kerberos5.c || kdc_time + config->kdc_warn_pwexpire >= *client->entry.pw_end)) { client 1592 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_value = *client->entry.pw_end; client 1595 source4/heimdal/kdc/kerberos5.c if (client->entry.valid_end) { client 1597 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_value = *client->entry.valid_end; client 1606 source4/heimdal/kdc/kerberos5.c if (client->entry.valid_end || client->entry.pw_end) { client 1608 source4/heimdal/kdc/kerberos5.c if (client->entry.valid_end) { client 1609 source4/heimdal/kdc/kerberos5.c if (client->entry.pw_end) client 1610 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = min(*client->entry.valid_end, client 1611 source4/heimdal/kdc/kerberos5.c *client->entry.pw_end); client 1613 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = *client->entry.valid_end; client 1615 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = *client->entry.pw_end; client 1643 source4/heimdal/kdc/kerberos5.c ret = _kdc_pk_mk_pa_reply(context, config, pkp, client, client 1670 source4/heimdal/kdc/kerberos5.c canon.names.mapped_name = client->entry.principal->name; client 1721 source4/heimdal/kdc/kerberos5.c ret = _kdc_pac_generate(context, client, &p); client 1729 source4/heimdal/kdc/kerberos5.c client->entry.principal, client 1765 source4/heimdal/kdc/kerberos5.c &skey->key, client->entry.kvno, client 1805 source4/heimdal/kdc/kerberos5.c if(client) client 1806 source4/heimdal/kdc/kerberos5.c _kdc_free_ent(context, client); client 282 source4/heimdal/kdc/krb5tgs.c hdb_entry_ex *client, client 335 source4/heimdal/kdc/krb5tgs.c client, server, &pac); client 495 source4/heimdal/kdc/krb5tgs.c hdb_entry_ex *client, client 502 source4/heimdal/kdc/krb5tgs.c ret = hdb_entry_get_ConstrainedDelegACL(&client->entry, &acl); client 667 source4/heimdal/kdc/krb5tgs.c hdb_entry_ex *client, client 753 source4/heimdal/kdc/krb5tgs.c if(client && client->entry.max_life) client 754 source4/heimdal/kdc/krb5tgs.c life = min(life, *client->entry.max_life); client 768 source4/heimdal/kdc/krb5tgs.c if(client && client->entry.max_renew) client 769 source4/heimdal/kdc/krb5tgs.c renew = min(renew, *client->entry.max_renew); client 1375 source4/heimdal/kdc/krb5tgs.c hdb_entry_ex *server = NULL, *client = NULL; client 1538 source4/heimdal/kdc/krb5tgs.c NULL, &client); client 1642 source4/heimdal/kdc/krb5tgs.c client, server, ekey, &tkey->key, client 1671 source4/heimdal/kdc/krb5tgs.c if (client) { client 1751 source4/heimdal/kdc/krb5tgs.c if (client->entry.flags.trusted_for_delegation) { client 1767 source4/heimdal/kdc/krb5tgs.c if (client != NULL client 1791 source4/heimdal/kdc/krb5tgs.c ret = hdb_enctype2key(context, &client->entry, client 1815 source4/heimdal/kdc/krb5tgs.c ret = check_constrained_delegation(context, config, client, sp); client 1871 source4/heimdal/kdc/krb5tgs.c client, cpn, client 1943 source4/heimdal/kdc/krb5tgs.c client, client 1961 source4/heimdal/kdc/krb5tgs.c if(client) client 1962 source4/heimdal/kdc/krb5tgs.c _kdc_free_ent(context, client); client 959 source4/heimdal/kdc/pkinit.c const hdb_entry_ex *client, client 1365 source4/heimdal/kdc/pkinit.c const hdb_entry_ex *client, client 1393 source4/heimdal/kdc/pkinit.c client->entry.principal); client 1402 source4/heimdal/kdc/pkinit.c client->entry.principal); client 1410 source4/heimdal/kdc/pkinit.c ret = hdb_entry_get_pkinit_acl(&client->entry, &acl); client 1436 source4/heimdal/kdc/pkinit.c client->entry.principal, client 77 source4/heimdal/kdc/windc.c hdb_entry_ex *client, client 83 source4/heimdal/kdc/windc.c return (windcft->pac_generate)(windcctx, context, client, pac); client 89 source4/heimdal/kdc/windc.c hdb_entry_ex *client, client 98 source4/heimdal/kdc/windc.c client_principal, client, server, pac); client 103 source4/heimdal/kdc/windc.c struct hdb_entry_ex *client, client 109 source4/heimdal/kdc/windc.c return (windcft->client_access)(windcctx, context, client, req, e_data); client 197 source4/heimdal/kuser/kinit.c krb5_principal client, client 205 source4/heimdal/kuser/kinit.c client_realm = krb5_princ_realm (context, client); client 224 source4/heimdal/kuser/kinit.c krb5_principal client; client 225 source4/heimdal/kuser/kinit.c krb5_cc_get_principal(context, ccache, &client); client 227 source4/heimdal/kuser/kinit.c ret = get_server(context, client, server, &in_creds.server); client 229 source4/heimdal/kuser/kinit.c krb5_free_principal(context, client); client 232 source4/heimdal/kuser/kinit.c in_creds.client = client; client 234 source4/heimdal/kuser/kinit.c krb5_free_principal(context, client); client 271 source4/heimdal/kuser/kinit.c ret = krb5_cc_get_principal(context, cache, &in.client); client 276 source4/heimdal/kuser/kinit.c ret = get_server(context, in.client, server, &in.server); client 326 source4/heimdal/kuser/kinit.c ret = krb5_cc_initialize(context, cache, in.client); client 600 source4/heimdal/kuser/kinit.c ret = krb5_cc_initialize (context, tempccache, cred.client); client 641 source4/heimdal/kuser/kinit.c krb5_principal client, const char *server) client 649 source4/heimdal/kuser/kinit.c ret = krb5_cc_get_principal(context, cache, &in_cred.client); client 654 source4/heimdal/kuser/kinit.c ret = get_server(context, in_cred.client, server, &in_cred.server); client 656 source4/heimdal/kuser/kinit.c krb5_free_principal(context, in_cred.client); client 663 source4/heimdal/kuser/kinit.c krb5_free_principal(context, in_cred.client); client 425 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c ctx->ticket->client, client 451 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c ctx->ticket->client, client 50 source4/heimdal/lib/gssapi/krb5/acquire_cred.c in_cred.client = principal; client 193 source4/heimdal/lib/gssapi/krb5/acquire_cred.c kret = krb5_cc_initialize(context, ccache, cred.client); client 223 source4/heimdal/lib/gssapi/krb5/acquire_cred.c if (cred.client != NULL) client 200 source4/heimdal/lib/gssapi/krb5/init_sec_context.c this_cred.client = ctx->source; client 295 source4/heimdal/lib/gssapi/krb5/init_sec_context.c kret = krb5_cc_get_principal(context, ccache, &creds.client); client 301 source4/heimdal/lib/gssapi/krb5/init_sec_context.c strlen(creds.client->realm), client 302 source4/heimdal/lib/gssapi/krb5/init_sec_context.c creds.client->realm, client 304 source4/heimdal/lib/gssapi/krb5/init_sec_context.c creds.client->realm, client 333 source4/heimdal/lib/gssapi/krb5/init_sec_context.c if (creds.client) client 334 source4/heimdal/lib/gssapi/krb5/init_sec_context.c krb5_free_principal(context, creds.client); client 261 source4/heimdal/lib/hx509/cms.c CMSIdentifier *client, client 277 source4/heimdal/lib/hx509/cms.c switch (client->element) { client 279 source4/heimdal/lib/hx509/cms.c q.serial = &client->u.issuerAndSerialNumber.serialNumber; client 280 source4/heimdal/lib/hx509/cms.c q.issuer_name = &client->u.issuerAndSerialNumber.issuer; client 284 source4/heimdal/lib/hx509/cms.c q.subject_id = &client->u.subjectKeyIdentifier; client 305 source4/heimdal/lib/hx509/cms.c ret = unparse_CMSIdentifier(context, client, &str); client 153 source4/heimdal/lib/krb5/acache.c ret = krb5_parse_name(context, incred->client, &cred->client); client 285 source4/heimdal/lib/krb5/acache.c if (cred->client) client 286 source4/heimdal/lib/krb5/acache.c free(cred->client); client 300 source4/heimdal/lib/krb5/acache.c ret = krb5_unparse_name(context, incred->client, &cred->client); client 754 source4/heimdal/lib/krb5/acache.c char *client, *server; client 762 source4/heimdal/lib/krb5/acache.c if (cred->client) { client 763 source4/heimdal/lib/krb5/acache.c ret = krb5_unparse_name(context, cred->client, &client); client 767 source4/heimdal/lib/krb5/acache.c client = NULL; client 771 source4/heimdal/lib/krb5/acache.c free(client); client 778 source4/heimdal/lib/krb5/acache.c free(client); client 795 source4/heimdal/lib/krb5/acache.c if (client && strcmp(v5cred->client, client) != 0) client 814 source4/heimdal/lib/krb5/acache.c free(client); client 126 source4/heimdal/lib/krb5/build_auth.c copy_Realm(&cred->client->realm, &auth->crealm); client 127 source4/heimdal/lib/krb5/build_auth.c copy_PrincipalName(&cred->client->name, &auth->cname); client 1072 source4/heimdal/lib/krb5/cache.c krb5_principal client, client 1092 source4/heimdal/lib/krb5/cache.c match = krb5_principal_compare(context, principal, client); client 1107 source4/heimdal/lib/krb5/cache.c krb5_unparse_name(context, client, &str); client 1164 source4/heimdal/lib/krb5/cache.c krb5_principal client; client 1170 source4/heimdal/lib/krb5/cache.c ret = krb5_cc_get_principal(context, id, &client); client 1181 source4/heimdal/lib/krb5/cache.c krb5_principal_get_realm(context, client), client 1185 source4/heimdal/lib/krb5/cache.c krb5_free_principal(context, client); client 1188 source4/heimdal/lib/krb5/cache.c ret = krb5_copy_principal(context, client, &cred->client); client 1189 source4/heimdal/lib/krb5/cache.c krb5_free_principal(context, client); client 93 source4/heimdal/lib/krb5/changepw.c krb5_principal_compare(context, creds->client, targprinc) != TRUE) client 530 source4/heimdal/lib/krb5/changepw.c realm = creds->client->realm; client 808 source4/heimdal/lib/krb5/changepw.c ret = krb5_cc_get_principal(context, ccache, &creds.client); client 816 source4/heimdal/lib/krb5/changepw.c krb5_free_principal(context, creds.client); client 127 source4/heimdal/lib/krb5/convert_creds.c ret = krb5_524_conv_principal(context, v5_creds->client, client 183 source4/heimdal/lib/krb5/convert_creds.c ret = krb5_copy_principal (context, in_cred->client, &template.client); client 68 source4/heimdal/lib/krb5/creds.c krb5_free_principal (context, c->client); client 69 source4/heimdal/lib/krb5/creds.c c->client = NULL; client 102 source4/heimdal/lib/krb5/creds.c ret = krb5_copy_principal (context, incred->client, &c->client); client 228 source4/heimdal/lib/krb5/creds.c if (match && mcreds->client) { client 230 source4/heimdal/lib/krb5/creds.c match = krb5_principal_compare_any_realm (context, mcreds->client, client 231 source4/heimdal/lib/krb5/creds.c creds->client); client 233 source4/heimdal/lib/krb5/creds.c match = krb5_principal_compare (context, mcreds->client, client 234 source4/heimdal/lib/krb5/creds.c creds->client); client 4386 source4/heimdal/lib/krb5/crypto.c krb5_const_principal client, client 4417 source4/heimdal/lib/krb5/crypto.c ret = encode_uvinfo(context, client, &otherinfo.partyUInfo); client 4452 source4/heimdal/lib/krb5/crypto.c krb5_const_principal client, client 4498 source4/heimdal/lib/krb5/crypto.c ret = encode_otherinfo(context, ai, client, server, client 315 source4/heimdal/lib/krb5/get_cred.c ret = krb5_cc_get_principal(context, id, &tmp_cred.client); client 326 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_cred.client); client 334 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_cred.client); client 532 source4/heimdal/lib/krb5/get_cred.c in_creds->client, client 533 source4/heimdal/lib/krb5/get_cred.c &out_creds->client); client 762 source4/heimdal/lib/krb5/get_cred.c client_realm = krb5_principal_get_realm(context, in_creds->client); client 765 source4/heimdal/lib/krb5/get_cred.c ret = krb5_copy_principal(context, in_creds->client, &tmp_creds.client); client 781 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client); client 812 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client); client 816 source4/heimdal/lib/krb5/get_cred.c if(krb5_realm_compare(context, in_creds->client, in_creds->server)) client 827 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client); client 842 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client); client 853 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client); client 859 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client); client 865 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client); client 906 source4/heimdal/lib/krb5/get_cred.c client_realm = krb5_principal_get_realm(context, in_creds->client); client 1309 source4/heimdal/lib/krb5/get_cred.c ret = krb5_cc_get_principal(context, ccache, &in_creds.client); client 1319 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client); client 1348 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client); client 1355 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client); client 1363 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client); client 1368 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client); client 1390 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client); client 1408 source4/heimdal/lib/krb5/get_cred.c krb5_const_principal client, client 1419 source4/heimdal/lib/krb5/get_cred.c ret = krb5_copy_principal(context, client, &in.client); client 1426 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in.client); client 1430 source4/heimdal/lib/krb5/get_cred.c const char *realm = krb5_principal_get_realm(context, client); client 1435 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in.client); client 1455 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in.client); client 109 source4/heimdal/lib/krb5/get_for_creds.c krb5_principal client, client 137 source4/heimdal/lib/krb5/get_for_creds.c client_realm = krb5_principal_get_realm(context, client); client 140 source4/heimdal/lib/krb5/get_for_creds.c creds.client = client; client 225 source4/heimdal/lib/krb5/get_for_creds.c in_creds->client), client 370 source4/heimdal/lib/krb5/get_for_creds.c copy_Realm (&out_creds->client->realm, krb_cred_info->prealm); client 372 source4/heimdal/lib/krb5/get_for_creds.c copy_PrincipalName(&out_creds->client->name, krb_cred_info->pname); client 408 source4/heimdal/lib/krb5/get_in_tkt.c creds->client, client 416 source4/heimdal/lib/krb5/get_in_tkt.c krb5_free_principal (context, creds->client); client 417 source4/heimdal/lib/krb5/get_in_tkt.c creds->client = tmp_principal; client 444 source4/heimdal/lib/krb5/get_in_tkt.c const char *crealm = krb5_principal_get_realm(context, creds->client); client 613 source4/heimdal/lib/krb5/get_in_tkt.c krb5_principal client, client 628 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_get_pw_salt (context, client, &salt2); client 695 source4/heimdal/lib/krb5/get_in_tkt.c ret = _krb5_principal2principalname (a->req_body.cname, creds->client); client 701 source4/heimdal/lib/krb5/get_in_tkt.c ret = copy_Realm(&creds->client->realm, &a->req_body.realm); client 792 source4/heimdal/lib/krb5/get_in_tkt.c ret = add_padata(context, a->padata, creds->client, client 816 source4/heimdal/lib/krb5/get_in_tkt.c add_padata(context, a->padata, creds->client, client 823 source4/heimdal/lib/krb5/get_in_tkt.c add_padata(context, a->padata, creds->client, client 943 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp); client 1006 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_get_pw_salt (context, creds->client, &salt); client 84 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c a.principal = creds->client; client 128 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client, client 142 source4/heimdal/lib/krb5/init_creds_pw.c if (client) client 143 source4/heimdal/lib/krb5/init_creds_pw.c krb5_copy_principal(context, client, &cred->client); client 146 source4/heimdal/lib/krb5/init_creds_pw.c &cred->client); client 151 source4/heimdal/lib/krb5/init_creds_pw.c client_realm = krb5_principal_get_realm (context, cred->client); client 260 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client, client 301 source4/heimdal/lib/krb5/init_creds_pw.c ret = init_cred (context, &ctx->cred, client, start_time, client 368 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client, client 403 source4/heimdal/lib/krb5/init_creds_pw.c client, client 447 source4/heimdal/lib/krb5/init_creds_pw.c client, client 491 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client, client 501 source4/heimdal/lib/krb5/init_creds_pw.c ret = get_init_creds_common(context, client, start_time, client 512 source4/heimdal/lib/krb5/init_creds_pw.c a->principal = ctx.cred.client; client 571 source4/heimdal/lib/krb5/init_creds_pw.c ret = _krb5_principal2principalname (a->req_body.cname, creds->client); client 574 source4/heimdal/lib/krb5/init_creds_pw.c ret = copy_Realm(&creds->client->realm, &a->req_body.realm); client 699 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client, client 720 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_get_pw_salt(context, client, &salt); client 748 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client, client 770 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_get_pw_salt(context, client, &salt); client 800 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client, client 850 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client, client 863 source4/heimdal/lib/krb5/init_creds_pw.c p = (*pa_prefs[i].salt_info)(context, client, asreq, client 926 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client, client 941 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_get_pw_salt (context, client, &salt2); client 971 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client, client 980 source4/heimdal/lib/krb5/init_creds_pw.c add_enc_ts_padata(context, md, client, client 988 source4/heimdal/lib/krb5/init_creds_pw.c add_enc_ts_padata(context, md, client, client 996 source4/heimdal/lib/krb5/init_creds_pw.c add_enc_ts_padata(context, md, client, client 1006 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client, client 1024 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client, client 1108 source4/heimdal/lib/krb5/init_creds_pw.c ret = pa_data_to_md_pkinit(context, a, creds->client, ctx, *out_md); client 1118 source4/heimdal/lib/krb5/init_creds_pw.c ppaid = process_pa_info(context, creds->client, a, &paid, in_md); client 1120 source4/heimdal/lib/krb5/init_creds_pw.c pa_data_to_md_ts_enc(context, a, creds->client, ctx, ppaid, *out_md); client 1155 source4/heimdal/lib/krb5/init_creds_pw.c ppaid = process_pa_info(context, creds->client, a, &paid, client 1159 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_get_pw_salt (context, creds->client, &paid.salt); client 1197 source4/heimdal/lib/krb5/init_creds_pw.c ret = pa_data_to_key_plain(context, creds->client, ctx, client 1289 source4/heimdal/lib/krb5/init_creds_pw.c creds->client->realm, &resp); client 1396 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client, client 1411 source4/heimdal/lib/krb5/init_creds_pw.c ret = get_init_creds_common(context, client, start_time, client 1446 source4/heimdal/lib/krb5/init_creds_pw.c client, client 1464 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal_get_realm (context, ctx.cred.client), client 1484 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client, client 1497 source4/heimdal/lib/krb5/init_creds_pw.c const char *realm = krb5_principal_get_realm(context, client); client 1517 source4/heimdal/lib/krb5/init_creds_pw.c krb5_unparse_name (context, client, &p); client 1549 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_get_init_creds(context, creds, client, prompter, client 1569 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client, client 1578 source4/heimdal/lib/krb5/init_creds_pw.c ret = get_init_creds_common(context, client, start_time, client 387 source4/heimdal/lib/krb5/krb5.h krb5_principal client; client 451 source4/heimdal/lib/krb5/krb5.h krb5_principal client; client 104 source4/heimdal/lib/krb5/krb5_ccapi.h char *client; client 43 source4/heimdal/lib/krb5/mk_error.c const krb5_principal client, client 81 source4/heimdal/lib/krb5/mk_error.c if(client){ client 82 source4/heimdal/lib/krb5/mk_error.c msg.crealm = &client->realm; client 83 source4/heimdal/lib/krb5/mk_error.c msg.cname = &client->name; client 52 source4/heimdal/lib/krb5/mk_req.c ret = krb5_cc_get_principal(context, ccache, &this_cred.client); client 279 source4/heimdal/lib/krb5/rd_cred.c &creds->client, client 86 source4/heimdal/lib/krb5/rd_error.c krb5_unparse_name_fixed(context, creds->client, client 387 source4/heimdal/lib/krb5/rd_req.c &t->client, client 875 source4/heimdal/lib/krb5/rd_req.c o->ticket->client, client 783 source4/heimdal/lib/krb5/store.c ret = krb5_store_principal(sp, creds->client); client 827 source4/heimdal/lib/krb5/store.c ret = krb5_ret_principal (sp, &creds->client); client 890 source4/heimdal/lib/krb5/store.c if (creds->client) client 907 source4/heimdal/lib/krb5/store.c if (creds->client) { client 908 source4/heimdal/lib/krb5/store.c ret = krb5_store_principal(sp, creds->client); client 977 source4/heimdal/lib/krb5/store.c ret = krb5_ret_principal (sp, &creds->client); client 43 source4/heimdal/lib/krb5/ticket.c krb5_free_principal(context, ticket->client); client 68 source4/heimdal/lib/krb5/ticket.c ret = krb5_copy_principal(context, from->client, &tmp->client); client 76 source4/heimdal/lib/krb5/ticket.c krb5_free_principal(context, tmp->client); client 88 source4/heimdal/lib/krb5/ticket.c krb5_principal *client) client 90 source4/heimdal/lib/krb5/ticket.c return krb5_copy_principal(context, ticket->client, client); client 119 source4/kdc/hdb-samba4.c flags.client = 1; client 126 source4/kdc/hdb-samba4.c flags.client = 1; client 132 source4/kdc/hdb-samba4.c flags.client = 1; client 138 source4/kdc/hdb-samba4.c flags.client = 1; client 145 source4/kdc/hdb-samba4.c flags.client = 0; client 108 source4/kdc/pac-glue.c struct hdb_entry_ex *client, client 114 source4/kdc/pac-glue.c struct hdb_ldb_private *p = talloc_get_type(client->ctx, struct hdb_ldb_private); client 152 source4/kdc/pac-glue.c struct hdb_entry_ex *client, client 134 source4/lib/socket/access.c static bool client_match(TALLOC_CTX *mem_ctx, const char *tok, struct client_addr *client) client 144 source4/lib/socket/access.c if ((match = string_match(mem_ctx, tok, client->caddr, &invalid_char)) == 0) { client 149 source4/lib/socket/access.c if (client->cname[0] != 0) client 150 source4/lib/socket/access.c match = string_match(mem_ctx, tok, client->cname, &invalid_char); client 161 source4/lib/socket/access.c static bool list_match(TALLOC_CTX *mem_ctx, const char **list, struct client_addr *client) client 178 source4/lib/socket/access.c if ((match = client_match(mem_ctx, *list, client))) /* true or FAIL */ client 188 source4/lib/socket/access.c if (client_match(mem_ctx, *list, client)) /* Exception Found */ client 201 source4/lib/socket/access.c struct client_addr client; client 203 source4/lib/socket/access.c client.cname = cname; client 204 source4/lib/socket/access.c client.caddr = caddr; client 213 source4/lib/socket/access.c list_match(mem_ctx, deny_list, &client) && client 215 source4/lib/socket/access.c !list_match(mem_ctx, allow_list, &client))) { client 230 source4/lib/socket/access.c return list_match(mem_ctx, allow_list, &client); client 235 source4/lib/socket/access.c return !list_match(mem_ctx, deny_list, &client); client 239 source4/lib/socket/access.c if (list_match(mem_ctx, allow_list, &client)) client 244 source4/lib/socket/access.c if (list_match(mem_ctx, deny_list, &client)) client 52 source4/libcli/auth/credentials.c des_crypt112(creds->client.data, client_challenge->data, creds->session_key, 1); client 55 source4/libcli/auth/credentials.c creds->seed = creds->client; client 85 source4/libcli/auth/credentials.c creds->client = *client_challenge; client 88 source4/libcli/auth/credentials.c des_crypt112(creds->client.data, client_challenge->data, creds->session_key, 1); client 91 source4/libcli/auth/credentials.c creds->seed = creds->client; client 111 source4/libcli/auth/credentials.c des_crypt112(creds->client.data, time_cred.data, creds->session_key, 1); client 114 source4/libcli/auth/credentials.c IVAL(creds->client.data, 0), IVAL(creds->client.data, 4))); client 213 source4/libcli/auth/credentials.c dump_data_pw("Credential ", creds->client.data, 8); client 215 source4/libcli/auth/credentials.c *initial_credential = creds->client; client 231 source4/libcli/auth/credentials.c next->cred = creds->client; client 284 source4/libcli/auth/credentials.c if (memcmp(received_credentials->data, creds->client.data, 8) != 0) { client 286 source4/libcli/auth/credentials.c dump_data_pw("client creds", creds->client.data, 8); client 29 source4/libcli/auth/credentials.h struct netr_Credential client; client 215 source4/ntvfs/ntvfs.h } client; client 694 source4/ntvfs/ntvfs_interface.c ntvfs->client.get_peer_addr = my_addr; client 695 source4/ntvfs/ntvfs_interface.c ntvfs->client.get_my_addr = peer_addr; client 696 source4/ntvfs/ntvfs_interface.c ntvfs->client.private_data = private_data; client 702 source4/ntvfs/ntvfs_interface.c if (!ntvfs->ctx->client.get_my_addr) { client 706 source4/ntvfs/ntvfs_interface.c return ntvfs->ctx->client.get_my_addr(ntvfs->ctx->client.private_data, mem_ctx); client 711 source4/ntvfs/ntvfs_interface.c if (!ntvfs->ctx->client.get_peer_addr) { client 715 source4/ntvfs/ntvfs_interface.c return ntvfs->ctx->client.get_peer_addr(ntvfs->ctx->client.private_data, mem_ctx); client 531 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.account_name = r->in.logon->password->identity_info.account_name.string; client 532 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.domain_name = r->in.logon->password->identity_info.domain_name.string; client 561 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.account_name = r->in.logon->network->identity_info.account_name.string; client 562 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.domain_name = r->in.logon->network->identity_info.domain_name.string; client 137 source4/smb_server/smb/sesssetup.c user_info->client.account_name = sess->old.in.user; client 138 source4/smb_server/smb/sesssetup.c user_info->client.domain_name = sess->old.in.domain; client 263 source4/smb_server/smb/sesssetup.c user_info->client.account_name = sess->nt1.in.user; client 264 source4/smb_server/smb/sesssetup.c user_info->client.domain_name = sess->nt1.in.domain; client 1725 source4/torture/basic/denytest.c struct smbcli_state *cli1, struct smbcli_state *cli2, int client) client 1758 source4/torture/basic/denytest.c fname = talloc_asprintf(cli1, "\\ntdeny_%d.dll", client); client 1893 source4/torture/basic/denytest.c struct smbcli_state *cli, int client) client 1897 source4/torture/basic/denytest.c srandom(torture_seed + client); client 1899 source4/torture/basic/denytest.c torture_comment(tctx, "starting ntdenytest1 client %d\n", client); client 1901 source4/torture/basic/denytest.c return torture_ntdenytest(tctx, cli, cli, client); client 40 source4/torture/nbench/nbench.c for (n=0;n<=nb_max_retries && !op;n++) do_reconnect(&cli, tctx, client) client 42 source4/torture/nbench/nbench.c static void do_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client) client 45 source4/torture/nbench/nbench.c printf("[%d] Reconnecting client %d\n", nbench_line_count, client); client 47 source4/torture/nbench/nbench.c if (nb_reconnect(cli, tctx, client)) { client 48 source4/torture/nbench/nbench.c printf("[%d] Reconnected client %d\n", nbench_line_count, client); client 52 source4/torture/nbench/nbench.c printf("[%d] Failed to reconnect client %d\n", nbench_line_count, client); client 57 source4/torture/nbench/nbench.c static bool run_netbench(struct torture_context *tctx, struct smbcli_state *cli, int client) client 68 source4/torture/nbench/nbench.c if (target_rate != 0 && client == 0) { client 72 source4/torture/nbench/nbench.c nb_setup(cli, client); client 80 source4/torture/nbench/nbench.c asprintf(&cname, "client%d", client+1); client 139 source4/torture/nbench/nbench.c DEBUG(9,("run_netbench(%d): %s %s\n", client, params[0], params[1])); client 160 source4/torture/nbench/nbio.c bool nb_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client) client 162 source4/torture/nbench/nbio.c children[client].connected = false; client 168 source4/torture/nbench/nbio.c if (!torture_open_connection(cli, tctx, client)) { client 174 source4/torture/nbench/nbio.c nb_setup(*cli, client); client 177 source4/torture/nbench/nbio.c printf("nb_reconnect: failed to reopen files in client %d\n", client); client 60 source4/torture/raw/offline.c int client; client 417 source4/torture/raw/offline.c state[i].client = i; client 428 source4/torture/raw/offline.c state[i].client = i; client 2790 source4/torture/rpc/samba3rpc.c userlevel1.client = talloc_asprintf( client 1753 source4/torture/rpc/spoolss.c userlevel1.client = "hello"; client 63 source4/torture/rpc/spoolss_win.c ul_1.client = "\\clientname"; client 88 source4/torture/rpc/spoolss_win.c ul_1.client = "\\clientname"; client 407 source4/torture/rpc/srvsvc.c r.in.client = NULL;