user               45 examples/VFS/skel_opaque.c static int skel_connect(vfs_handle_struct *handle,  const char *service, const char *user)    
user               39 examples/VFS/skel_transparent.c static int skel_connect(vfs_handle_struct *handle,  const char *service, const char *user)    
user               41 examples/VFS/skel_transparent.c 	return SMB_VFS_NEXT_CONNECT(handle, service, user);
user               78 examples/libsmbclient/testbrowse2.c 		char            *user,   int userlen,
user               87 examples/libsmbclient/testbrowse2.c     strncpy(user, username, userlen - 1); user[userlen - 1] = 0;
user               41 examples/libsmbclient/testsmbc.c           pji->user,
user               50 examples/pdb/test.c static NTSTATUS testsam_getsampwent(struct pdb_methods *methods, struct samu *user)
user               60 examples/pdb/test.c static NTSTATUS testsam_getsampwnam (struct pdb_methods *methods, struct samu *user, const char *sname)
user               70 examples/pdb/test.c static NTSTATUS testsam_getsampwsid (struct pdb_methods *methods, struct samu *user, const DOM_SID *sid)
user               90 examples/perfcounter/perf.h     unsigned long long user;
user               98 examples/perfcounter/perf_writer_cpu.c 		     &data->cpuInfo.data[i].user,
user              112 examples/perfcounter/perf_writer_cpu.c 	data->PerfTime100nSec += data->cpuInfo.data[i].user +
user              156 examples/perfcounter/perf_writer_cpu.c 			data->cpuInfo.data[0].user,
user              992 lib/nss_wrapper/nss_wrapper.c static int nwrap_files_initgroups(const char *user, gid_t group)
user              998 lib/nss_wrapper/nss_wrapper.c _PUBLIC_ int nwrap_initgroups(const char *user, gid_t group)
user             1001 lib/nss_wrapper/nss_wrapper.c 		return real_initgroups(user, group);
user             1004 lib/nss_wrapper/nss_wrapper.c 	return nwrap_files_initgroups(user, group);
user               48 lib/nss_wrapper/nss_wrapper.h int nwrap_initgroups(const char *user, gid_t group);
user              163 librpc/gen_ndr/cli_srvsvc.c 				       const char *user /* [in] [unique,charset(UTF16)] */,
user              175 librpc/gen_ndr/cli_srvsvc.c 	r.in.user = user;
user              221 librpc/gen_ndr/cli_srvsvc.c 					  const char *user /* [in] [charset(UTF16)] */,
user              232 librpc/gen_ndr/cli_srvsvc.c 	r.in.user = user;
user              475 librpc/gen_ndr/cli_srvsvc.c 				   const char *user /* [in] [unique,charset(UTF16)] */,
user              488 librpc/gen_ndr/cli_srvsvc.c 	r.in.user = user;
user              628 librpc/gen_ndr/cli_srvsvc.c 				   const char *user /* [in] [unique,charset(UTF16)] */,
user              641 librpc/gen_ndr/cli_srvsvc.c 	r.in.user = user;
user              687 librpc/gen_ndr/cli_srvsvc.c 				  const char *user /* [in] [unique,charset(UTF16)] */,
user              696 librpc/gen_ndr/cli_srvsvc.c 	r.in.user = user;
user               28 librpc/gen_ndr/cli_srvsvc.h 				       const char *user /* [in] [unique,charset(UTF16)] */,
user               38 librpc/gen_ndr/cli_srvsvc.h 					  const char *user /* [in] [charset(UTF16)] */,
user               74 librpc/gen_ndr/cli_srvsvc.h 				   const char *user /* [in] [unique,charset(UTF16)] */,
user               96 librpc/gen_ndr/cli_srvsvc.h 				   const char *user /* [in] [unique,charset(UTF16)] */,
user              106 librpc/gen_ndr/cli_srvsvc.h 				  const char *user /* [in] [unique,charset(UTF16)] */,
user             3996 librpc/gen_ndr/ndr_netlogon.c 				NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user             4094 librpc/gen_ndr/ndr_netlogon.c 				if (r->user) {
user             4095 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_push_netr_DELTA_USER(ndr, NDR_SCALARS|NDR_BUFFERS, r->user));
user             4257 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_ALLOC(ndr, r->user);
user             4259 librpc/gen_ndr/ndr_netlogon.c 					r->user = NULL;
user             4438 librpc/gen_ndr/ndr_netlogon.c 				if (r->user) {
user             4440 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user             4441 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_pull_netr_DELTA_USER(ndr, NDR_SCALARS|NDR_BUFFERS, r->user));
user             4613 librpc/gen_ndr/ndr_netlogon.c 			ndr_print_ptr(ndr, "user", r->user);
user             4615 librpc/gen_ndr/ndr_netlogon.c 			if (r->user) {
user             4616 librpc/gen_ndr/ndr_netlogon.c 				ndr_print_netr_DELTA_USER(ndr, "user", r->user);
user             6127 librpc/gen_ndr/ndr_netlogon.c 				NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user             6187 librpc/gen_ndr/ndr_netlogon.c 				if (r->user) {
user             6188 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             6190 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             6191 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             6272 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_ALLOC(ndr, r->user);
user             6274 librpc/gen_ndr/ndr_netlogon.c 					r->user = NULL;
user             6364 librpc/gen_ndr/ndr_netlogon.c 				if (r->user) {
user             6366 librpc/gen_ndr/ndr_netlogon.c 					NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user             6367 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user             6368 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user             6369 librpc/gen_ndr/ndr_netlogon.c 					if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user             6370 librpc/gen_ndr/ndr_netlogon.c 						return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user             6372 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user             6373 librpc/gen_ndr/ndr_netlogon.c 					NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user             6440 librpc/gen_ndr/ndr_netlogon.c 			ndr_print_ptr(ndr, "user", r->user);
user             6442 librpc/gen_ndr/ndr_netlogon.c 			if (r->user) {
user             6443 librpc/gen_ndr/ndr_netlogon.c 				ndr_print_string(ndr, "user", r->user);
user             17897 librpc/gen_ndr/ndr_spoolss.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user             17910 librpc/gen_ndr/ndr_spoolss.c 		if (r->user) {
user             17911 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             17913 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             17914 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             17937 librpc/gen_ndr/ndr_spoolss.c 			NDR_PULL_ALLOC(ndr, r->user);
user             17939 librpc/gen_ndr/ndr_spoolss.c 			r->user = NULL;
user             17959 librpc/gen_ndr/ndr_spoolss.c 		if (r->user) {
user             17961 librpc/gen_ndr/ndr_spoolss.c 			NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user             17962 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user             17963 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user             17964 librpc/gen_ndr/ndr_spoolss.c 			if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user             17965 librpc/gen_ndr/ndr_spoolss.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user             17967 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user             17968 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user             17986 librpc/gen_ndr/ndr_spoolss.c 	ndr_print_ptr(ndr, "user", r->user);
user             17988 librpc/gen_ndr/ndr_spoolss.c 	if (r->user) {
user             17989 librpc/gen_ndr/ndr_spoolss.c 		ndr_print_string(ndr, "user", r->user);
user             18037 librpc/gen_ndr/ndr_spoolss.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user             18051 librpc/gen_ndr/ndr_spoolss.c 		if (r->user) {
user             18052 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             18054 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             18055 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             18080 librpc/gen_ndr/ndr_spoolss.c 			NDR_PULL_ALLOC(ndr, r->user);
user             18082 librpc/gen_ndr/ndr_spoolss.c 			r->user = NULL;
user             18103 librpc/gen_ndr/ndr_spoolss.c 		if (r->user) {
user             18105 librpc/gen_ndr/ndr_spoolss.c 			NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user             18106 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user             18107 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user             18108 librpc/gen_ndr/ndr_spoolss.c 			if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user             18109 librpc/gen_ndr/ndr_spoolss.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user             18111 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user             18112 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user             18132 librpc/gen_ndr/ndr_spoolss.c 	ndr_print_ptr(ndr, "user", r->user);
user             18134 librpc/gen_ndr/ndr_spoolss.c 	if (r->user) {
user             18135 librpc/gen_ndr/ndr_spoolss.c 		ndr_print_string(ndr, "user", r->user);
user              160 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user              170 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user              171 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user              173 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user              174 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user              197 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->user);
user              199 librpc/gen_ndr/ndr_srvsvc.c 			r->user = NULL;
user              216 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user              218 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user              219 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user              220 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user              221 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user              222 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user              224 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user              225 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user              243 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "user", r->user);
user              245 librpc/gen_ndr/ndr_srvsvc.c 	if (r->user) {
user              246 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "user", r->user);
user             1420 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user             1424 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             1425 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             1427 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             1428 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             1455 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->user);
user             1457 librpc/gen_ndr/ndr_srvsvc.c 			r->user = NULL;
user             1467 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             1469 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user             1470 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user             1471 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user             1472 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user             1473 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user             1475 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user             1476 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user             1504 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "user", r->user);
user             1506 librpc/gen_ndr/ndr_srvsvc.c 	if (r->user) {
user             1507 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "user", r->user);
user             1899 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user             1908 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             1909 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             1911 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             1912 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             1937 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->user);
user             1939 librpc/gen_ndr/ndr_srvsvc.c 			r->user = NULL;
user             1955 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             1957 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user             1958 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user             1959 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user             1960 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user             1961 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user             1963 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user             1964 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user             1984 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "user", r->user);
user             1986 librpc/gen_ndr/ndr_srvsvc.c 	if (r->user) {
user             1987 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "user", r->user);
user             2544 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user             2557 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             2558 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             2560 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             2561 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             2583 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->user);
user             2585 librpc/gen_ndr/ndr_srvsvc.c 			r->user = NULL;
user             2605 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             2607 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user             2608 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user             2609 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user             2610 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user             2611 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user             2613 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user             2614 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user             2631 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "user", r->user);
user             2633 librpc/gen_ndr/ndr_srvsvc.c 	if (r->user) {
user             2634 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "user", r->user);
user             2735 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user             2749 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             2750 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             2752 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             2753 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             2783 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->user);
user             2785 librpc/gen_ndr/ndr_srvsvc.c 			r->user = NULL;
user             2811 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             2813 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user             2814 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user             2815 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user             2816 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user             2817 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user             2819 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user             2820 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user             2849 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "user", r->user);
user             2851 librpc/gen_ndr/ndr_srvsvc.c 	if (r->user) {
user             2852 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "user", r->user);
user             2959 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user             2970 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             2971 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             2973 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             2974 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             2996 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->user);
user             2998 librpc/gen_ndr/ndr_srvsvc.c 			r->user = NULL;
user             3016 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             3018 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user             3019 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user             3020 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user             3021 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user             3022 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user             3024 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user             3025 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user             3042 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "user", r->user);
user             3044 librpc/gen_ndr/ndr_srvsvc.c 	if (r->user) {
user             3045 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "user", r->user);
user             3144 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user             3159 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             3160 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             3162 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user             3163 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             3201 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->user);
user             3203 librpc/gen_ndr/ndr_srvsvc.c 			r->user = NULL;
user             3235 librpc/gen_ndr/ndr_srvsvc.c 		if (r->user) {
user             3237 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user             3238 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user             3239 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user             3240 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user             3241 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user             3243 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user             3244 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user             3285 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "user", r->user);
user             3287 librpc/gen_ndr/ndr_srvsvc.c 	if (r->user) {
user             3288 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "user", r->user);
user             13564 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user));
user             13565 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             13566 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user             13568 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user             13569 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             13632 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->in.user);
user             13634 librpc/gen_ndr/ndr_srvsvc.c 			r->in.user = NULL;
user             13636 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             13638 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0);
user             13639 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user));
user             13640 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user));
user             13641 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) {
user             13642 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user));
user             13644 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t)));
user             13645 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16));
user             13721 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_ptr(ndr, "user", r->in.user);
user             13723 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             13724 librpc/gen_ndr/ndr_srvsvc.c 			ndr_print_string(ndr, "user", r->in.user);
user             13777 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user             13779 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user             13780 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             13827 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user));
user             13828 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user));
user             13829 librpc/gen_ndr/ndr_srvsvc.c 		if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) {
user             13830 librpc/gen_ndr/ndr_srvsvc.c 			return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user));
user             13832 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t)));
user             13833 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16));
user             13869 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "user", r->in.user);
user             14440 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user));
user             14441 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             14442 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user             14444 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user             14445 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             14528 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->in.user);
user             14530 librpc/gen_ndr/ndr_srvsvc.c 			r->in.user = NULL;
user             14532 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             14534 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0);
user             14535 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user));
user             14536 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user));
user             14537 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) {
user             14538 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user));
user             14540 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t)));
user             14541 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16));
user             14623 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_ptr(ndr, "user", r->in.user);
user             14625 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             14626 librpc/gen_ndr/ndr_srvsvc.c 			ndr_print_string(ndr, "user", r->in.user);
user             14862 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user));
user             14863 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             14864 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user             14866 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user             14867 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             14950 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->in.user);
user             14952 librpc/gen_ndr/ndr_srvsvc.c 			r->in.user = NULL;
user             14954 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             14956 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0);
user             14957 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user));
user             14958 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user));
user             14959 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) {
user             14960 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user));
user             14962 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t)));
user             14963 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16));
user             15045 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_ptr(ndr, "user", r->in.user);
user             15047 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             15048 librpc/gen_ndr/ndr_srvsvc.c 			ndr_print_string(ndr, "user", r->in.user);
user             15104 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user));
user             15105 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             15106 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user             15108 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user             15109 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user             15165 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->in.user);
user             15167 librpc/gen_ndr/ndr_srvsvc.c 			r->in.user = NULL;
user             15169 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             15171 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0);
user             15172 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user));
user             15173 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user));
user             15174 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) {
user             15175 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user));
user             15177 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t)));
user             15178 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16));
user             15210 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_ptr(ndr, "user", r->in.user);
user             15212 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.user) {
user             15213 librpc/gen_ndr/ndr_srvsvc.c 			ndr_print_string(ndr, "user", r->in.user);
user              589 librpc/gen_ndr/netlogon.h 	struct netr_DELTA_USER *user;/* [unique,case(NETR_DELTA_USER)] */
user              716 librpc/gen_ndr/netlogon.h 	const char *user;/* [unique,charset(UTF16),case(NETLOGON_CONTROL_FIND_USER)] */
user             1515 librpc/gen_ndr/spoolss.h 	const char *user;/* [unique,charset(UTF16)] */
user             1531 librpc/gen_ndr/spoolss.h 	const char *user;/* [unique,charset(UTF16)] */
user               28 librpc/gen_ndr/srvsvc.h 	const char *user;/* [unique,charset(UTF16)] */
user              104 librpc/gen_ndr/srvsvc.h 	const char *user;/* [unique,charset(UTF16)] */
user              137 librpc/gen_ndr/srvsvc.h 	const char *user;/* [unique,charset(UTF16)] */
user              171 librpc/gen_ndr/srvsvc.h 	const char *user;/* [unique,charset(UTF16)] */
user              185 librpc/gen_ndr/srvsvc.h 	const char *user;/* [unique,charset(UTF16)] */
user              200 librpc/gen_ndr/srvsvc.h 	const char *user;/* [unique,charset(UTF16)] */
user              212 librpc/gen_ndr/srvsvc.h 	const char *user;/* [unique,charset(UTF16)] */
user             1099 librpc/gen_ndr/srvsvc.h 		const char *user;/* [unique,charset(UTF16)] */
user             1119 librpc/gen_ndr/srvsvc.h 		const char *user;/* [charset(UTF16)] */
user             1198 librpc/gen_ndr/srvsvc.h 		const char *user;/* [unique,charset(UTF16)] */
user             1246 librpc/gen_ndr/srvsvc.h 		const char *user;/* [unique,charset(UTF16)] */
user             1266 librpc/gen_ndr/srvsvc.h 		const char *user;/* [unique,charset(UTF16)] */
user              352 nsswitch/libwbclient/wbc_pam.c 			snprintf(request.data.auth.user,
user              353 nsswitch/libwbclient/wbc_pam.c 				 sizeof(request.data.auth.user)-1,
user              359 nsswitch/libwbclient/wbc_pam.c 			strncpy(request.data.auth.user,
user              361 nsswitch/libwbclient/wbc_pam.c 				sizeof(request.data.auth.user)-1);
user              402 nsswitch/libwbclient/wbc_pam.c 		strncpy(request.data.auth_crap.user,
user              404 nsswitch/libwbclient/wbc_pam.c 			sizeof(request.data.auth_crap.user)-1);
user              564 nsswitch/libwbclient/wbc_pam.c 	strncpy(request.data.logoff.user, params->username,
user              565 nsswitch/libwbclient/wbc_pam.c 		sizeof(request.data.logoff.user)-1);
user              642 nsswitch/libwbclient/wbc_pam.c 	strncpy(request.data.logoff.user, username,
user              643 nsswitch/libwbclient/wbc_pam.c 		sizeof(request.data.logoff.user)-1);
user              705 nsswitch/libwbclient/wbc_pam.c 		strncpy(request.data.chauthtok.user, params->account_name,
user              706 nsswitch/libwbclient/wbc_pam.c 			sizeof(request.data.chauthtok.user) - 1);
user              777 nsswitch/libwbclient/wbc_pam.c 		strncpy(request.data.chng_pswd_auth_crap.user,
user              779 nsswitch/libwbclient/wbc_pam.c 			sizeof(request.data.chng_pswd_auth_crap.user) - 1);
user              944 nsswitch/libwbclient/wbc_pam.c 	strncpy(request.data.auth.user,
user              946 nsswitch/libwbclient/wbc_pam.c 		sizeof(request.data.auth.user)-1);
user              241 nsswitch/nsstest.c static int nss_initgroups(char *user, gid_t group, gid_t **groups, long int *start, long int *size)
user              250 nsswitch/nsstest.c 	status = _nss_initgroups(user, group, start, size, groups, 0, &nss_errno);
user              714 nsswitch/pam_winbind.c 				   const char *user,
user              721 nsswitch/pam_winbind.c 			 "(incorrect password or invalid membership)", user);
user              726 nsswitch/pam_winbind.c 			 user);
user              731 nsswitch/pam_winbind.c 			 user);
user              736 nsswitch/pam_winbind.c 			 "required", user);
user              741 nsswitch/pam_winbind.c 			       user);
user              750 nsswitch/pam_winbind.c 				 "user '%s' granted access", user);
user              753 nsswitch/pam_winbind.c 				 "user '%s' OK", user);
user              760 nsswitch/pam_winbind.c 			_pam_error_code_str(retval), retval, user);
user             1071 nsswitch/pam_winbind.c 				       const char *user,
user             1127 nsswitch/pam_winbind.c 						 const char *user,
user             1150 nsswitch/pam_winbind.c 		if (!winbind_name_to_sid_string(ctx, user,
user             1183 nsswitch/pam_winbind.c 	if (!winbind_name_to_sid_string(ctx, user, search_location,
user             1661 nsswitch/pam_winbind.c 				const char *user,
user             1717 nsswitch/pam_winbind.c 		pwd = getpwnam(user);
user             1754 nsswitch/pam_winbind.c 		if (!winbind_name_list_to_sid_string_list(ctx, user, member,
user             1766 nsswitch/pam_winbind.c 	logon.username			= user;
user             1815 nsswitch/pam_winbind.c 					  user, "wbcLogonUser");
user             1883 nsswitch/pam_winbind.c 		_pam_warn_logon_type(ctx, user, user_info->user_flags);
user             1886 nsswitch/pam_winbind.c 		_pam_warn_krb5_failure(ctx, user, user_info->user_flags);
user             1921 nsswitch/pam_winbind.c 				     const char *user,
user             1956 nsswitch/pam_winbind.c 	params.account_name		= user;
user             1964 nsswitch/pam_winbind.c 					  user, "wbcChangeUserPasswordEx");
user             1968 nsswitch/pam_winbind.c 			 "user '%s' password changed", user);
user             2051 nsswitch/pam_winbind.c 		      const char *user)
user             2061 nsswitch/pam_winbind.c 	pwd = getpwnam(user);
user             2066 nsswitch/pam_winbind.c 	wbc_status = wbcGetpwnam(user, &wb_pwd);
user             2468 nsswitch/pam_winbind.c 	const char *user;
user             2488 nsswitch/pam_winbind.c 		retval = pam_get_user(pamh, &user, _("Username: "));
user             2495 nsswitch/pam_winbind.c 		if (user == NULL) {
user             2503 nsswitch/pam_winbind.c 			       "username [%s] obtained", user);
user             2511 nsswitch/pam_winbind.c 		pwd = getpwnam(user);
user             2520 nsswitch/pam_winbind.c 		logoff.username		= user;
user             2556 nsswitch/pam_winbind.c 						     user, "wbcLogoffUser");
user             2564 nsswitch/pam_winbind.c 					 user, wbcErrorString(wbc_status));
user             2575 nsswitch/pam_winbind.c 		     user, "wbcLogoffUser");
user             2960 nsswitch/pam_winbind.c 						   const char *user)
user             2986 nsswitch/pam_winbind.c 	pwd = getpwnam(user);
user             3008 nsswitch/pam_winbind.c 	const char *user;
user             3034 nsswitch/pam_winbind.c 	ret = pam_get_user(pamh, &user, _("Username: "));
user             3041 nsswitch/pam_winbind.c 	if (user == NULL) {
user             3047 nsswitch/pam_winbind.c 	_pam_log_debug(ctx, LOG_DEBUG, "username [%s] obtained", user);
user             3050 nsswitch/pam_winbind.c 	ret = valid_user(ctx, user);
user             3073 nsswitch/pam_winbind.c 		Announce = talloc_asprintf(ctx, "%s %s", greeting, user);
user             3097 nsswitch/pam_winbind.c 		ret = winbind_auth_request(ctx, user, pass_old,
user             3194 nsswitch/pam_winbind.c 		ret = winbind_chauthtok_request(ctx, user, pass_old,
user             3201 nsswitch/pam_winbind.c 		if (_pam_require_krb5_auth_after_chauthtok(ctx, user)) {
user             3221 nsswitch/pam_winbind.c 			ret = winbind_auth_request(ctx, user, pass_new,
user              107 nsswitch/wbinfo.c 				     fstring user)
user              116 nsswitch/wbinfo.c 			fstrcpy(user, domuser);
user              120 nsswitch/wbinfo.c 		fstrcpy(user, domuser);
user              125 nsswitch/wbinfo.c 	fstrcpy(user, p+1);
user              160 nsswitch/wbinfo.c static bool wbinfo_get_userinfo(char *user)
user              165 nsswitch/wbinfo.c 	wbc_status = wbcGetpwnam(user, &pwd);
user              274 nsswitch/wbinfo.c static bool wbinfo_get_usergroups(const char *user)
user              283 nsswitch/wbinfo.c 	wbc_status = wbcGetGroups(user, &num_groups, &groups);
user             1195 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.user, username);
user             1199 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.user, username);
user             1405 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.user, username);
user             1409 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.user, username);
user             1511 nsswitch/wbinfo.c 	fstring user, domain;
user             1515 nsswitch/wbinfo.c 	parse_wbinfo_domain_user(username, domain, user);
user             1517 nsswitch/wbinfo.c 	p = strchr(user, '%');
user             1534 nsswitch/wbinfo.c 	if (user[0]) {
user             1536 nsswitch/wbinfo.c 		if (!secrets_store(SECRETS_AUTH_USER, user,
user             1537 nsswitch/wbinfo.c 				   strlen(user) + 1)) {
user             1572 nsswitch/wbinfo.c 	char *user, *domain, *password;
user             1576 nsswitch/wbinfo.c 	secrets_fetch_ipc_userpass(&user, &domain, &password);
user             1578 nsswitch/wbinfo.c 	if ((!user || !*user) && (!domain || !*domain ) && (!password || !*password)){
user             1580 nsswitch/wbinfo.c 		SAFE_FREE(user);
user             1590 nsswitch/wbinfo.c 		 user, password ? "%" : "", password ? password : "");
user             1592 nsswitch/wbinfo.c 	SAFE_FREE(user);
user              108 nsswitch/wbinfo4.c 				     fstring user)
user              114 nsswitch/wbinfo4.c 		fstrcpy(user, domuser);
user              119 nsswitch/wbinfo4.c 	fstrcpy(user, p+1);
user              129 nsswitch/wbinfo4.c static bool wbinfo_get_userinfo(char *user)
user              140 nsswitch/wbinfo4.c 	fstrcpy(request.data.username, user);
user              246 nsswitch/wbinfo4.c static bool wbinfo_get_usergroups(char *user)
user              258 nsswitch/wbinfo4.c 	fstrcpy(request.data.username, user);
user              736 nsswitch/wbinfo4.c 		fstrcpy(request.data.auth.user, username);
user              740 nsswitch/wbinfo4.c 		fstrcpy(request.data.auth.user, username);
user              797 nsswitch/wbinfo4.c                 fstrcpy(request.data.auth.user, username);
user              801 nsswitch/wbinfo4.c                 fstrcpy(request.data.auth.user, username);
user              847 nsswitch/wbinfo4.c 	fstrcpy(request.data.auth_crap.user, name_user);
user              343 nsswitch/winbind_nss_aix.c static char *wb_aix_getgrset(char *user)
user              352 nsswitch/winbind_nss_aix.c 	char *r_user = user;
user              354 nsswitch/winbind_nss_aix.c 	if (*user == WB_AIX_ENCODED) {
user              369 nsswitch/winbind_nss_aix.c 	if (*user == WB_AIX_ENCODED) {
user              860 nsswitch/winbind_nss_aix.c static int wb_aix_authenticate(char *user, char *pass,
user              866 nsswitch/winbind_nss_aix.c 	char *r_user = user;
user              868 nsswitch/winbind_nss_aix.c 	logit("authenticate '%s' response='%s'\n", user, pass);
user              877 nsswitch/winbind_nss_aix.c 	if (*user == WB_AIX_ENCODED) {
user              884 nsswitch/winbind_nss_aix.c 	STRCPY_RET(request.data.auth.user, r_user);
user              887 nsswitch/winbind_nss_aix.c 	if (*user == WB_AIX_ENCODED) {
user              895 nsswitch/winbind_nss_aix.c 	logit("auth result %d for '%s'\n", result, user);
user              909 nsswitch/winbind_nss_aix.c static int wb_aix_chpass(char *user, char *oldpass, char *newpass, char **message)
user              914 nsswitch/winbind_nss_aix.c 	char *r_user = user;
user              916 nsswitch/winbind_nss_aix.c 	if (*user == WB_AIX_ENCODED) {
user              932 nsswitch/winbind_nss_aix.c 	STRCPY_RET(request.data.chauthtok.user, r_user);
user              936 nsswitch/winbind_nss_aix.c 	if (*user == WB_AIX_ENCODED) {
user              956 nsswitch/winbind_nss_aix.c static int wb_aix_passwdrestrictions(char *user, char *newpass, char *oldpass,
user              959 nsswitch/winbind_nss_aix.c 	logit("passwdresrictions called for '%s'\n", user);
user              964 nsswitch/winbind_nss_aix.c static int wb_aix_passwdexpired(char *user, char **message)
user              966 nsswitch/winbind_nss_aix.c 	logit("passwdexpired '%s'\n", user);
user              975 nsswitch/winbind_nss_aix.c static char *wb_aix_getpasswd(char *user)
user              977 nsswitch/winbind_nss_aix.c 	logit("getpasswd '%s'\n", user);
user               57 nsswitch/winbind_nss_linux.c NSS_STATUS _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start,
user             1023 nsswitch/winbind_nss_linux.c _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start,
user             1034 nsswitch/winbind_nss_linux.c 		user, group);
user             1044 nsswitch/winbind_nss_linux.c 	strncpy(request.data.username, user,
user             1056 nsswitch/winbind_nss_linux.c 				user, num_gids);
user             1070 nsswitch/winbind_nss_linux.c 					user, group, gid_list[i]);
user             1119 nsswitch/winbind_nss_linux.c 		user, nss_err_str(ret), ret);
user               63 nsswitch/winbind_nss_netbsd.c NSS_STATUS _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start,
user               84 nsswitch/winbind_nss_solaris.h NSS_STATUS _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start,
user              249 nsswitch/winbind_struct_protocol.h 			fstring user;
user              258 nsswitch/winbind_struct_protocol.h                         fstring user;
user              268 nsswitch/winbind_struct_protocol.h                     fstring user;
user              273 nsswitch/winbind_struct_protocol.h 			fstring user;
user              285 nsswitch/winbind_struct_protocol.h 			fstring user;
user              316 nsswitch/winbind_struct_protocol.h 			fstring user;
user              161 source3/auth/auth.c static bool check_domain_match(const char *user, const char *domain) 
user              173 source3/auth/auth.c 		DEBUG(1, ("check_domain_match: Attempt to connect as user %s from domain %s denied.\n", user, domain));
user               84 source3/auth/auth_builtin.c 	fstring user;
user               86 source3/auth/auth_builtin.c 	fstrcpy(user, user_info->smb_name);
user               88 source3/auth/auth_builtin.c 	if (strnequal("NT_STATUS", user, strlen("NT_STATUS"))) {
user               89 source3/auth/auth_builtin.c 		strupper_m(user);
user               90 source3/auth/auth_builtin.c 		return nt_status_string_to_code(user);
user               93 source3/auth/auth_builtin.c 	strlower_m(user);
user               94 source3/auth/auth_builtin.c 	error_num = strtoul(user, NULL, 16);
user               96 source3/auth/auth_builtin.c 	DEBUG(5,("check_name_to_ntstatus_security: Error for user %s was %lx\n", user, error_num));
user               97 source3/auth/auth_ntlmssp.c 	sub_set_smb_name(auth_ntlmssp_state->ntlmssp_state->user);
user              102 source3/auth/auth_ntlmssp.c 				       auth_ntlmssp_state->ntlmssp_state->user, 
user               30 source3/auth/auth_unix.c static bool update_smbpassword_file(const char *user, const char *password)
user               40 source3/auth/auth_unix.c 	ret = pdb_getsampwnam(sampass, user);
user              416 source3/auth/pampass.c static struct pam_conv *smb_setup_pam_conv(smb_pam_conv_fn smb_pam_conv_fnptr, const char *user,
user              428 source3/auth/pampass.c 	udp->PAM_username = user;
user              462 source3/auth/pampass.c static bool smb_pam_start(pam_handle_t **pamh, const char *user, const char *rhost, struct pam_conv *pconv)
user              472 source3/auth/pampass.c 	DEBUG(4,("smb_pam_start: PAM: Init user: %s\n", user));
user              474 source3/auth/pampass.c 	pam_error = pam_start("samba", user, pconv, pamh);
user              506 source3/auth/pampass.c 	DEBUG(4,("smb_pam_start: PAM: Init passed for user: %s\n", user));
user              513 source3/auth/pampass.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, const char *user)
user              523 source3/auth/pampass.c 	DEBUG(4,("smb_pam_auth: PAM: Authenticate User: %s\n", user));
user              527 source3/auth/pampass.c 			DEBUG(2, ("smb_pam_auth: PAM: Authentication Error for user %s\n", user));
user              530 source3/auth/pampass.c 			DEBUG(2, ("smb_pam_auth: PAM: Insufficient Credentials for user %s\n", user));
user              533 source3/auth/pampass.c 			DEBUG(2, ("smb_pam_auth: PAM: Authentication Information Unavailable for user %s\n", user));
user              536 source3/auth/pampass.c 			DEBUG(2, ("smb_pam_auth: PAM: Username %s NOT known to Authentication system\n", user));
user              539 source3/auth/pampass.c 			DEBUG(2, ("smb_pam_auth: PAM: One or more authentication modules reports user limit for user %s exceeeded\n", user));
user              542 source3/auth/pampass.c 			DEBUG(0, ("smb_pam_auth: PAM: One or more PAM modules failed to load for user %s\n", user));
user              545 source3/auth/pampass.c 			DEBUG(4, ("smb_pam_auth: PAM: User %s Authenticated OK\n", user));
user              548 source3/auth/pampass.c 			DEBUG(0, ("smb_pam_auth: PAM: UNKNOWN ERROR while authenticating user %s\n", user));
user              559 source3/auth/pampass.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user)
user              564 source3/auth/pampass.c 	DEBUG(4,("smb_pam_account: PAM: Account Management for User: %s\n", user));
user              568 source3/auth/pampass.c 			DEBUG(2, ("smb_pam_account: PAM: User %s is valid but password is expired\n", user));
user              571 source3/auth/pampass.c 			DEBUG(2, ("smb_pam_account: PAM: User %s no longer permitted to access system\n", user));
user              574 source3/auth/pampass.c 			DEBUG(2, ("smb_pam_account: PAM: There was an authentication error for user %s\n", user));
user              577 source3/auth/pampass.c 			DEBUG(0, ("smb_pam_account: PAM: User %s is NOT permitted to access system at this time\n", user));
user              580 source3/auth/pampass.c 			DEBUG(0, ("smb_pam_account: PAM: User \"%s\" is NOT known to account management\n", user));
user              583 source3/auth/pampass.c 			DEBUG(4, ("smb_pam_account: PAM: Account OK for User: %s\n", user));
user              586 source3/auth/pampass.c 			DEBUG(0, ("smb_pam_account: PAM: UNKNOWN PAM ERROR (%d) during Account Management for User: %s\n", pam_error, user));
user              598 source3/auth/pampass.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user)
user              608 source3/auth/pampass.c 	DEBUG(4,("PAM: Account Management SetCredentials for User: %s\n", user));
user              612 source3/auth/pampass.c 			DEBUG(0, ("smb_pam_setcred: PAM: Credentials not found for user:%s\n", user ));
user              615 source3/auth/pampass.c 			DEBUG(0, ("smb_pam_setcred: PAM: Credentials for user: \"%s\" EXPIRED!\n", user ));
user              618 source3/auth/pampass.c 			DEBUG(0, ("smb_pam_setcred: PAM: User: \"%s\" is NOT known so can not set credentials!\n", user ));
user              621 source3/auth/pampass.c 			DEBUG(0, ("smb_pam_setcred: PAM: Unknown setcredentials error - unable to set credentials for %s\n", user ));
user              624 source3/auth/pampass.c 			DEBUG(4, ("smb_pam_setcred: PAM: SetCredentials OK for User: %s\n", user));
user              627 source3/auth/pampass.c 			DEBUG(0, ("smb_pam_setcred: PAM: UNKNOWN PAM ERROR (%d) during SetCredentials for User: %s\n", pam_error, user));
user              638 source3/auth/pampass.c static bool smb_internal_pam_session(pam_handle_t *pamh, const char *user, const char *tty, bool flag)
user              666 source3/auth/pampass.c static bool smb_pam_chauthtok(pam_handle_t *pamh, const char * user)
user              670 source3/auth/pampass.c 	DEBUG(4,("smb_pam_chauthtok: PAM: Password Change for User: %s\n", user));
user              702 source3/auth/pampass.c 		DEBUG(4, ("PAM: Account OK for User: %s\n", user));
user              705 source3/auth/pampass.c 		DEBUG(0, ("PAM: UNKNOWN PAM ERROR (%d) for User: %s\n", pam_error, user));
user              720 source3/auth/pampass.c bool smb_pam_claim_session(char *user, char *tty, char *rhost)
user              730 source3/auth/pampass.c 	if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, NULL, NULL)) == NULL)
user              733 source3/auth/pampass.c 	if (!smb_pam_start(&pamh, user, rhost, pconv))
user              736 source3/auth/pampass.c 	if (!smb_internal_pam_session(pamh, user, tty, True)) {
user              748 source3/auth/pampass.c bool smb_pam_close_session(char *user, char *tty, char *rhost)
user              758 source3/auth/pampass.c 	if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, NULL, NULL)) == NULL)
user              761 source3/auth/pampass.c 	if (!smb_pam_start(&pamh, user, rhost, pconv))
user              764 source3/auth/pampass.c 	if (!smb_internal_pam_session(pamh, user, tty, False)) {
user              776 source3/auth/pampass.c NTSTATUS smb_pam_accountcheck(const char * user)
user              787 source3/auth/pampass.c 	if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, NULL, NULL)) == NULL)
user              790 source3/auth/pampass.c 	if (!smb_pam_start(&pamh, user, NULL, pconv))
user              793 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user)))
user              794 source3/auth/pampass.c 		DEBUG(0, ("smb_pam_accountcheck: PAM: Account Validation Failed - Rejecting User %s!\n", user));
user              804 source3/auth/pampass.c NTSTATUS smb_pam_passcheck(const char * user, const char * password)
user              816 source3/auth/pampass.c 	if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, password, NULL)) == NULL)
user              819 source3/auth/pampass.c 	if (!smb_pam_start(&pamh, user, NULL, pconv))
user              822 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_auth(pamh, user))) {
user              823 source3/auth/pampass.c 		DEBUG(0, ("smb_pam_passcheck: PAM: smb_pam_auth failed - Rejecting User %s !\n", user));
user              828 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) {
user              829 source3/auth/pampass.c 		DEBUG(0, ("smb_pam_passcheck: PAM: smb_pam_account failed - Rejecting User %s !\n", user));
user              834 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_setcred(pamh, user))) {
user              835 source3/auth/pampass.c 		DEBUG(0, ("smb_pam_passcheck: PAM: smb_pam_setcred failed - Rejecting User %s !\n", user));
user              848 source3/auth/pampass.c bool smb_pam_passchange(const char * user, const char * oldpassword, const char * newpassword)
user              854 source3/auth/pampass.c 	if ((pconv = smb_setup_pam_conv(smb_pam_passchange_conv, user, oldpassword, newpassword)) == NULL)
user              857 source3/auth/pampass.c 	if(!smb_pam_start(&pamh, user, NULL, pconv))
user              860 source3/auth/pampass.c 	if (!smb_pam_chauthtok(pamh, user)) {
user              861 source3/auth/pampass.c 		DEBUG(0, ("smb_pam_passchange: PAM: Password Change Failed for user %s!\n", user));
user              872 source3/auth/pampass.c NTSTATUS smb_pam_accountcheck(const char * user)
user              878 source3/auth/pampass.c bool smb_pam_claim_session(char *user, char *tty, char *rhost)
user               94 source3/auth/pass_check.c static bool afs_auth(char *user, char *password)
user              103 source3/auth/pass_check.c 	    (KA_USERAUTH_VERSION + KA_USERAUTH_DOSETPAG, user, (char *)0,	/* instance */
user              113 source3/auth/pass_check.c 	      ("AFS authentication for \"%s\" failed (%s)\n", user, reason));
user              143 source3/auth/pass_check.c static bool dfs_auth(char *user, char *password)
user              259 source3/auth/pass_check.c 	if (sec_login_setup_identity((unsigned char *)user,
user              265 source3/auth/pass_check.c 			  user, dce_errstr));
user              302 source3/auth/pass_check.c 	if (sec_login_setup_identity((unsigned char *)user,
user              308 source3/auth/pass_check.c 			  user, dce_errstr));
user              334 source3/auth/pass_check.c 		       user, dce_errstr));
user              357 source3/auth/pass_check.c 		       user, dce_errstr));
user              373 source3/auth/pass_check.c 		  user, sys_getpid()));
user              650 source3/auth/pass_check.c NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, 
user              659 source3/auth/pass_check.c 	DEBUG(100, ("checking user=[%s] pass=[%s]\n", user, password));
user              675 source3/auth/pass_check.c 	if (set_this_user(user) == NULL) {
user              679 source3/auth/pass_check.c 	DEBUG(4, ("pass_check: Checking (PAM) password for user %s (l=%d)\n", user, pwlen));
user              683 source3/auth/pass_check.c 	DEBUG(4, ("pass_check: Checking password for user %s (l=%d)\n", user, pwlen));
user              686 source3/auth/pass_check.c 		DEBUG(3, ("Couldn't find user %s\n", user));
user              759 source3/auth/pass_check.c 			  user));
user              760 source3/auth/pass_check.c 		mypasswd = getprpwnam(user);
user              771 source3/auth/pass_check.c 			       user));
user              824 source3/auth/pass_check.c                         fn(user, password);
user              854 source3/auth/pass_check.c 				fn(user, pass2);
user              869 source3/auth/pass_check.c 			fn(user, pass2);
user             2252 source3/client/client.c 		char *user = NULL;
user             2260 source3/client/client.c 		if (!next_token_talloc(ctx, &cmd_ptr,&user,NULL)) {
user             2271 source3/client/client.c 							user,
user              386 source3/client/mount.cifs.c 	char user[32];
user              397 source3/client/mount.cifs.c 		snprintf(user,sizeof(user),"%u",getuid());
user              594 source3/client/mount.cifs.c 					snprintf(user, sizeof(user), "%u", pw->pw_uid);
user              596 source3/client/mount.cifs.c 					strlcpy(user,value,sizeof(user));
user              727 source3/client/mount.cifs.c 		word_len = strlen(user);
user              739 source3/client/mount.cifs.c 		snprintf(out + out_len, word_len + 5, "uid=%s", user);
user               46 source3/include/ads_protos.h 			      const char *user);
user               44 source3/include/client.h 	fstring user;
user              263 source3/include/libsmb_internal.h                        const char * user);
user              225 source3/include/libsmbclient.h 	char user[128];
user              490 source3/include/libsmbclient.h smbc_setUser(SMBCCTX *c, char * user);
user             2681 source3/include/libsmbclient.h                      const char *user,
user             2696 source3/include/libsmbclient.h 			     	   const char *user,
user             2746 source3/include/libsmbclient.h         char * user DEPRECATED_SMBC_INTERFACE;
user              451 source3/include/nt_printing.h 		fstring user;
user               87 source3/include/ntlmssp.h 	char *user;
user              279 source3/include/passdb.h 					   struct samu *user,
user              285 source3/include/passdb.h 					   struct samu *user);
user               41 source3/include/printing.h 	fstring user; /* the user who started the job */
user              159 source3/include/proto.h bool smb_pam_claim_session(char *user, char *tty, char *rhost);
user              160 source3/include/proto.h bool smb_pam_close_session(char *user, char *tty, char *rhost);
user              161 source3/include/proto.h NTSTATUS smb_pam_accountcheck(const char * user);
user              162 source3/include/proto.h NTSTATUS smb_pam_passcheck(const char * user, const char * password);
user              163 source3/include/proto.h bool smb_pam_passchange(const char * user, const char * oldpassword, const char * newpassword);
user              164 source3/include/proto.h NTSTATUS smb_pam_accountcheck(const char * user);
user              165 source3/include/proto.h bool smb_pam_claim_session(char *user, char *tty, char *rhost);
user              171 source3/include/proto.h NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, 
user              796 source3/include/proto.h 			  const char *servicename, const char *user,
user              800 source3/include/proto.h void standard_sub_advanced(const char *servicename, const char *user,
user              994 source3/include/proto.h bool getgroups_unix_user(TALLOC_CTX *mem_ctx, const char *user,
user             1065 source3/include/proto.h char *get_user_home_dir(TALLOC_CTX *mem_ctx, const char *user);
user             1066 source3/include/proto.h struct passwd *Get_Pwnam_alloc(TALLOC_CTX *mem_ctx, const char *user);
user             1212 source3/include/proto.h 		       char **user);
user             1931 source3/include/proto.h ADS_STATUS ads_add_user_acct(ADS_STRUCT *ads, const char *user, 
user             2289 source3/include/proto.h ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user, 
user             2294 source3/include/proto.h 			   const char *user,
user             2334 source3/include/proto.h 			     const char *user, const char *domain, 
user             2584 source3/include/proto.h 				const char *user,
user             2656 source3/include/proto.h bool cli_NetWkstaUserLogon(struct cli_state *cli,char *user, char *workstation);
user             2661 source3/include/proto.h bool cli_oem_change_password(struct cli_state *cli, const char *user, const char *new_password,
user             2720 source3/include/proto.h int cli_NetFileEnum(struct cli_state *cli, const char * user,
user             2732 source3/include/proto.h bool cli_NetWkstaUserLogoff(struct cli_state *cli, const char *user, const char *workstation);
user             3105 source3/include/proto.h NTSTATUS ntlmssp_set_username(NTLMSSP_STATE *ntlmssp_state, const char *user) ;
user             3253 source3/include/proto.h bool SMBNTLMv2encrypt_hash(const char *user, const char *domain, const uchar nt_hash[16], 
user             3258 source3/include/proto.h bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, 
user             4247 source3/include/proto.h 		 const char *user, const char *pszHomedir);
user             4410 source3/include/proto.h NTSTATUS samu_set_unix(struct samu *user, const struct passwd *pwd);
user             4411 source3/include/proto.h NTSTATUS samu_alloc_rid_unix(struct samu *user, const struct passwd *pwd);
user             4546 source3/include/proto.h bool guest_user_info( struct samu *user );
user             4571 source3/include/proto.h NTSTATUS pdb_enum_group_memberships(TALLOC_CTX *mem_ctx, struct samu *user,
user             4574 source3/include/proto.h NTSTATUS pdb_set_unix_primary_group(TALLOC_CTX *mem_ctx, struct samu *user);
user             4634 source3/include/proto.h 					  const char *user,
user             6178 source3/include/proto.h bool check_lanman_password(char *user, uchar * pass1,
user             6181 source3/include/proto.h NTSTATUS pass_oem_change(char *user,
user             6475 source3/include/proto.h bool map_username(fstring user);
user             6725 source3/include/proto.h void add_session_user(const char *user);
user             6728 source3/include/proto.h bool user_in_netgroup(const char *user, const char *ngname);
user             6729 source3/include/proto.h bool user_in_list(const char *user,const char **list);
user             6730 source3/include/proto.h bool authorise_login(int snum, fstring user, DATA_BLOB password,
user               41 source3/include/smb_perfcount.h 				      const char *user, const char *domain);
user              207 source3/include/smbldap.h                                   const char *user,
user              304 source3/include/vfs.h 		int (*connect_fn)(struct vfs_handle_struct *handle, const char *service, const char *user);
user               30 source3/include/vfs_macros.h #define SMB_VFS_CONNECT(conn, service, user) ((conn)->vfs.ops.connect_fn((conn)->vfs.handles.connect_hnd, (service), (user)))
user              164 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_CONNECT(conn, service, user) ((conn)->vfs_opaque.ops.connect_fn((conn)->vfs_opaque.handles.connect_hnd, (service), (user)))
user              298 source3/include/vfs_macros.h #define SMB_VFS_NEXT_CONNECT(handle, service, user) ((handle)->vfs_next.ops.connect_fn((handle)->vfs_next.handles.connect_hnd, (service), (user)))
user              318 source3/lib/ldb/nssldb/ldb-grp.c NSS_STATUS _nss_ldb_initgroups_dyn(const char *user, gid_t group, long int *start, long int *size, gid_t **groups, long int limit, int *errnop)
user              341 source3/lib/ldb/nssldb/ldb-grp.c 			 _LDB_NSS_PWNAM_FILTER, user);
user               40 source3/lib/netapi/examples/user/user_dispinfo.c 	struct NET_DISPLAY_USER *user;
user               79 source3/lib/netapi/examples/user/user_dispinfo.c 			user = (struct NET_DISPLAY_USER *)buffer;
user               82 source3/lib/netapi/examples/user/user_dispinfo.c 				       user->usri1_name);
user               83 source3/lib/netapi/examples/user/user_dispinfo.c 				user++;
user               91 source3/lib/netapi/file.c 			i3.fi3_username		= talloc_strdup(mem_ctx, info->info3->user);
user               42 source3/lib/netapi/tests/netdisplay.c 	struct NET_DISPLAY_USER *user;
user               59 source3/lib/netapi/tests/netdisplay.c 					user = (struct NET_DISPLAY_USER *)buffer;
user               75 source3/lib/netapi/tests/netdisplay.c 						current_name = 	user->usri1_name;
user               93 source3/lib/netapi/tests/netdisplay.c 						user++;
user             1330 source3/lib/netapi/user.c 	struct NET_DISPLAY_USER *user = NULL;
user             1333 source3/lib/netapi/user.c 	user = TALLOC_ZERO_ARRAY(mem_ctx,
user             1336 source3/lib/netapi/user.c 	W_ERROR_HAVE_NO_MEMORY(user);
user             1339 source3/lib/netapi/user.c 		user[i].usri1_name = talloc_strdup(mem_ctx,
user             1341 source3/lib/netapi/user.c 		user[i].usri1_comment = talloc_strdup(mem_ctx,
user             1343 source3/lib/netapi/user.c 		user[i].usri1_flags =
user             1345 source3/lib/netapi/user.c 		user[i].usri1_full_name = talloc_strdup(mem_ctx,
user             1347 source3/lib/netapi/user.c 		user[i].usri1_user_id =
user             1349 source3/lib/netapi/user.c 		user[i].usri1_next_index =
user             1352 source3/lib/netapi/user.c 		if (!user[i].usri1_name) {
user             1357 source3/lib/netapi/user.c 	*buffer = talloc_memdup(mem_ctx, user,
user              792 source3/lib/substitute.c static char *alloc_sub_advanced(const char *servicename, const char *user, 
user              812 source3/lib/substitute.c 			a_string = realloc_string_sub(a_string, "%N", automount_server(user));
user              816 source3/lib/substitute.c 			if ((h = get_user_home_dir(talloc_tos(), user)))
user              831 source3/lib/substitute.c 			a_string = realloc_string_sub(a_string, "%u", user); 
user              867 source3/lib/substitute.c 			  const char *servicename, const char *user,
user              874 source3/lib/substitute.c 	if (!(a = alloc_sub_advanced(servicename, user, connectpath, gid,
user              884 source3/lib/substitute.c void standard_sub_advanced(const char *servicename, const char *user,
user              891 source3/lib/substitute.c 	s = alloc_sub_advanced(servicename, user, connectpath,
user               40 source3/lib/system_smbd.c static int getgrouplist_internals(const char *user, gid_t gid, gid_t *groups,
user               71 source3/lib/system_smbd.c 	if (initgroups(user, gid) != 0) {
user              117 source3/lib/system_smbd.c static int sys_getgrouplist(const char *user, gid_t gid, gid_t *groups, int *grpcnt)
user              122 source3/lib/system_smbd.c 	DEBUG(10,("sys_getgrouplist: user [%s]\n", user));
user              131 source3/lib/system_smbd.c 	retval = getgrouplist(user, gid, groups, grpcnt);
user              134 source3/lib/system_smbd.c 	retval = getgrouplist_internals(user, gid, groups, grpcnt);
user              146 source3/lib/system_smbd.c bool getgroups_unix_user(TALLOC_CTX *mem_ctx, const char *user,
user              162 source3/lib/system_smbd.c 	if (sys_getgrouplist(user, primary_gid, temp_groups, &max_grp) == -1) {
user              168 source3/lib/system_smbd.c 		if (sys_getgrouplist(user, primary_gid,
user               35 source3/lib/username.c char *get_user_home_dir(TALLOC_CTX *mem_ctx, const char *user)
user               42 source3/lib/username.c 	pass = Get_Pwnam_alloc(mem_ctx, user);
user               64 source3/lib/username.c 					  const char *user, char *user2)
user               71 source3/lib/username.c 	if (!user || !(*user))
user               83 source3/lib/username.c 	if(strcmp(user, user2) != 0) {
user               85 source3/lib/username.c 			 user));
user               86 source3/lib/username.c 		ret = getpwnam_alloc(mem_ctx, user);
user               93 source3/lib/username.c 	if(strcmp(user, user2) != 0) {
user              110 source3/lib/username.c 		 "did":"didn't", user));
user              121 source3/lib/username.c struct passwd *Get_Pwnam_alloc(TALLOC_CTX *mem_ctx, const char *user)
user              126 source3/lib/username.c 	if ( *user == '\0' ) {
user              131 source3/lib/username.c 	fstrcpy(user2, user);
user              133 source3/lib/username.c 	DEBUG(5,("Finding user %s\n", user));
user              135 source3/lib/username.c 	ret = Get_Pwnam_internals(mem_ctx, user, user2);
user             2944 source3/lib/util.c 		       char **user)
user             2953 source3/lib/util.c 		*user = talloc_strdup(mem_ctx, p+1);
user             2956 source3/lib/util.c 		*user = talloc_strdup(mem_ctx, full_name);
user               28 source3/libads/ldap_user.c 			       const char *user)
user               33 source3/libads/ldap_user.c 	char *escaped_user = escape_ldap_string_alloc(user);
user               48 source3/libads/ldap_user.c ADS_STATUS ads_add_user_acct(ADS_STRUCT *ads, const char *user, 
user               60 source3/libads/ldap_user.c 	else name = user;
user               67 source3/libads/ldap_user.c 	if (!(upn = talloc_asprintf(ctx, "%s@%s", user, ads->config.realm)))
user               84 source3/libads/ldap_user.c 	ads_mod_str(ctx, &mods, "sAMAccountName", user);
user              648 source3/libnet/libnet_join.c 					   const char *user,
user              667 source3/libnet/libnet_join.c 				   user,
user               41 source3/libnet/libnet_samsync.c 	struct netr_DELTA_USER *user = delta->delta_union.user;
user               51 source3/libnet/libnet_samsync.c 	if (user->lm_password_present) {
user               52 source3/libnet/libnet_samsync.c 		if (memcmp(user->lmpassword.hash, zero_buf, 16) != 0) {
user               53 source3/libnet/libnet_samsync.c 			sam_pwd_hash(rid, user->lmpassword.hash, lm_hash.hash, 0);
user               57 source3/libnet/libnet_samsync.c 		user->lmpassword = lm_hash;
user               60 source3/libnet/libnet_samsync.c 	if (user->nt_password_present) {
user               61 source3/libnet/libnet_samsync.c 		if (memcmp(user->ntpassword.hash, zero_buf, 16) != 0) {
user               62 source3/libnet/libnet_samsync.c 			sam_pwd_hash(rid, user->ntpassword.hash, nt_hash.hash, 0);
user               66 source3/libnet/libnet_samsync.c 		user->ntpassword = nt_hash;
user               69 source3/libnet/libnet_samsync.c 	if (user->user_private_info.SensitiveData) {
user               73 source3/libnet/libnet_samsync.c 		data.data = user->user_private_info.SensitiveData;
user               74 source3/libnet/libnet_samsync.c 		data.length = user->user_private_info.DataLength;
user               76 source3/libnet/libnet_samsync.c 		user->user_private_info.SensitiveData = data.data;
user               77 source3/libnet/libnet_samsync.c 		user->user_private_info.DataLength = data.length;
user               98 source3/libnet/libnet_samsync.c 			user->lmpassword = lm_hash;
user               99 source3/libnet/libnet_samsync.c 			user->lm_password_present = true;
user              110 source3/libnet/libnet_samsync.c 			user->ntpassword = nt_hash;
user              111 source3/libnet/libnet_samsync.c 			user->nt_password_present = true;
user              185 source3/libnet/libnet_samsync_display.c 		display_account_info(id.rid, u.user);
user              192 source3/libnet/libnet_samsync_keytab.c 						r->delta_enum[i].delta_union.user,
user             1114 source3/libnet/libnet_samsync_ldif.c 						   u.user,
user              677 source3/libnet/libnet_samsync_passdb.c 					    r->delta_union.user);
user               58 source3/libsmb/cliconnect.c 					  const char *user, 
user              115 source3/libsmb/cliconnect.c 	p += clistr_push(cli, p, user, -1, STR_TERMINATE|STR_UPPER);
user              133 source3/libsmb/cliconnect.c 	status = cli_set_username(cli, user);
user              294 source3/libsmb/cliconnect.c 					    const char *user, const char *pass,
user              336 source3/libsmb/cliconnect.c 	p += clistr_push(cli, p, user, -1, STR_TERMINATE); /* username */
user              360 source3/libsmb/cliconnect.c 	status = cli_set_username(cli, user);
user              381 source3/libsmb/cliconnect.c static NTSTATUS cli_session_setup_nt1(struct cli_state *cli, const char *user, 
user              408 source3/libsmb/cliconnect.c 			if (!SMBNTLMv2encrypt(user, workgroup, pass, &server_chal, 
user              482 source3/libsmb/cliconnect.c 	p += clistr_push(cli, p, user, -1, STR_TERMINATE);
user              533 source3/libsmb/cliconnect.c 	result = cli_set_username(cli, user);
user              799 source3/libsmb/cliconnect.c static NTSTATUS cli_session_setup_ntlmssp(struct cli_state *cli, const char *user, 
user              817 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) {
user              927 source3/libsmb/cliconnect.c ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user, 
user              976 source3/libsmb/cliconnect.c 	status = cli_set_username(cli, user);
user              992 source3/libsmb/cliconnect.c 			ret = kerberos_kinit_password(user, pass, 0 /* no time correction for now */, NULL);
user             1068 source3/libsmb/cliconnect.c 	account = talloc_strdup(talloc_tos(), user);
user             1076 source3/libsmb/cliconnect.c 	if ((p = strchr_m(user, '@')) != NULL) {
user             1077 source3/libsmb/cliconnect.c 		account[PTR_DIFF(p,user)] = '\0';
user             1090 source3/libsmb/cliconnect.c 			   const char *user,
user             1098 source3/libsmb/cliconnect.c 	if (user) {
user             1099 source3/libsmb/cliconnect.c 		fstrcpy(user2, user);
user             1112 source3/libsmb/cliconnect.c 		user = p+1;
user             1140 source3/libsmb/cliconnect.c 		return cli_session_setup_lanman2(cli, user, pass, passlen,
user             1147 source3/libsmb/cliconnect.c 	if (!user || !*user)
user             1155 source3/libsmb/cliconnect.c 		return cli_session_setup_plaintext(cli, user, "", workgroup);
user             1166 source3/libsmb/cliconnect.c 		return cli_session_setup_plaintext(cli, user, pass, workgroup);
user             1172 source3/libsmb/cliconnect.c 		ADS_STATUS status = cli_session_setup_spnego(cli, user, pass,
user             1182 source3/libsmb/cliconnect.c 		status = cli_session_setup_nt1(cli, user, pass, passlen,
user             2102 source3/libsmb/cliconnect.c 			     const char *user, const char *domain, 
user             2125 source3/libsmb/cliconnect.c 	nt_status = cli_session_setup(cli, user, password, pw_len, password,
user             2158 source3/libsmb/cliconnect.c 	nt_status = cli_init_creds(cli, user, domain, password);
user              536 source3/libsmb/clifsinfo.c 				const char *user,
user              557 source3/libsmb/clifsinfo.c 	if (!NT_STATUS_IS_OK(status = ntlmssp_set_username(es->s.ntlmssp_state, user))) {
user               97 source3/libsmb/cliprint.c 				fstrcpy(job.user,
user               51 source3/libsmb/clirap.c bool cli_NetWkstaUserLogon(struct cli_state *cli,char *user, char *workstation)
user               71 source3/libsmb/clirap.c 	strlcpy(p,user,sizeof(param)-PTR_DIFF(p,param));
user              427 source3/libsmb/clirap.c bool cli_oem_change_password(struct cli_state *cli, const char *user, const char *new_password,
user              441 source3/libsmb/clirap.c 	if (strlen(user) >= sizeof(fstring)-1) {
user              442 source3/libsmb/clirap.c 		DEBUG(0,("cli_oem_change_password: user name %s is too long.\n", user));
user              452 source3/libsmb/clirap.c 	strlcpy(p,user, sizeof(param)-PTR_DIFF(p,param));
user              490 source3/libsmb/clirap.c 			user ));
user              498 source3/libsmb/clirap.c 			user ));
user             1243 source3/libsmb/clirap2.c int cli_NetFileEnum(struct cli_state *cli, const char * user,
user             1269 source3/libsmb/clirap2.c 	PUTSTRING(p, user, RAP_USERNAME_LEN);
user             1844 source3/libsmb/clirap2.c bool cli_NetWkstaUserLogoff(struct cli_state *cli, const char *user, const char *workstation)
user             1868 source3/libsmb/clirap2.c 	strlcpy(upperbuf, user, sizeof(upperbuf));
user              116 source3/libsmb/libsmb_cache.c                        const char * user)
user              125 source3/libsmb/libsmb_cache.c 		    strcmp(user, srv->username)  == 0) {
user              429 source3/libsmb/libsmb_context.c         char *user = NULL;
user              538 source3/libsmb/libsmb_context.c                 user = getenv("USER");
user              540 source3/libsmb/libsmb_context.c                 if (!user) {
user              541 source3/libsmb/libsmb_context.c                         user = SMB_STRDUP("guest");
user              543 source3/libsmb/libsmb_context.c                         user = SMB_STRDUP(user);
user              546 source3/libsmb/libsmb_context.c                 if (!user) {
user              551 source3/libsmb/libsmb_context.c                 smbc_setUser(context, user);
user              639 source3/libsmb/libsmb_context.c 			const char *user,
user              649 source3/libsmb/libsmb_context.c 					const char *user,
user              665 source3/libsmb/libsmb_context.c 	if (! user) {
user              666 source3/libsmb/libsmb_context.c 		user = smbc_getUser(context);
user              692 source3/libsmb/libsmb_context.c         set_cmdline_auth_info_username(auth_info, user);
user              358 source3/libsmb/libsmb_dir.c         char *user = NULL;
user              392 source3/libsmb/libsmb_dir.c                             &user,
user              413 source3/libsmb/libsmb_dir.c 	if (!user || user[0] == (char)0) {
user              414 source3/libsmb/libsmb_dir.c 		user = talloc_strdup(frame, smbc_getUser(context));
user              415 source3/libsmb/libsmb_dir.c 		if (!user) {
user              465 source3/libsmb/libsmb_dir.c 		u_info.username = talloc_strdup(frame,user);
user              555 source3/libsmb/libsmb_dir.c                                           &workgroup, &user, &password);
user              610 source3/libsmb/libsmb_dir.c                                           &workgroup, &user, &password);
user              660 source3/libsmb/libsmb_dir.c                                                   &user, &password);
user              696 source3/libsmb/libsmb_dir.c                                                           &user, &password);
user              756 source3/libsmb/libsmb_dir.c                                           &workgroup, &user, &password);
user             1122 source3/libsmb/libsmb_dir.c         char *user = NULL;
user             1151 source3/libsmb/libsmb_dir.c                             &user,
user             1159 source3/libsmb/libsmb_dir.c 	if (!user || user[0] == (char)0) {
user             1160 source3/libsmb/libsmb_dir.c 		user = talloc_strdup(frame, smbc_getUser(context));
user             1161 source3/libsmb/libsmb_dir.c 		if (!user) {
user             1169 source3/libsmb/libsmb_dir.c                           server, share, &workgroup, &user, &password);
user             1230 source3/libsmb/libsmb_dir.c         char *user = NULL;
user             1259 source3/libsmb/libsmb_dir.c                             &user,
user             1267 source3/libsmb/libsmb_dir.c 	if (!user || user[0] == (char)0) {
user             1268 source3/libsmb/libsmb_dir.c 		user = talloc_strdup(frame, smbc_getUser(context));
user             1269 source3/libsmb/libsmb_dir.c 		if (!user) {
user             1277 source3/libsmb/libsmb_dir.c                           server, share, &workgroup, &user, &password);
user             1514 source3/libsmb/libsmb_dir.c         char *user = NULL;
user             1545 source3/libsmb/libsmb_dir.c                             &user,
user             1553 source3/libsmb/libsmb_dir.c 	if (!user || user[0] == (char)0) {
user             1554 source3/libsmb/libsmb_dir.c 		user = talloc_strdup(frame, smbc_getUser(context));
user             1555 source3/libsmb/libsmb_dir.c 		if (!user) {
user             1563 source3/libsmb/libsmb_dir.c                           server, share, &workgroup, &user, &password);
user             1605 source3/libsmb/libsmb_dir.c 	char *user = NULL;
user             1661 source3/libsmb/libsmb_dir.c                             &user,
user             1669 source3/libsmb/libsmb_dir.c 	if (!user || user[0] == (char)0) {
user             1670 source3/libsmb/libsmb_dir.c 		user = talloc_strdup(frame, smbc_getUser(context));
user             1671 source3/libsmb/libsmb_dir.c 		if (!user) {
user             1679 source3/libsmb/libsmb_dir.c                           server, share, &workgroup, &user, &password);
user             1706 source3/libsmb/libsmb_dir.c         char *user = NULL;
user             1737 source3/libsmb/libsmb_dir.c                             &user,
user             1745 source3/libsmb/libsmb_dir.c 	if (!user || user[0] == (char)0) {
user             1746 source3/libsmb/libsmb_dir.c 		user = talloc_strdup(frame, smbc_getUser(context));
user             1747 source3/libsmb/libsmb_dir.c 		if (!user) {
user             1755 source3/libsmb/libsmb_dir.c                           server, share, &workgroup, &user, &password);
user               42 source3/libsmb/libsmb_file.c         char *user = NULL;
user               76 source3/libsmb/libsmb_file.c                             &user,
user               84 source3/libsmb/libsmb_file.c 	if (!user || user[0] == (char)0) {
user               85 source3/libsmb/libsmb_file.c 		user = talloc_strdup(frame, smbc_getUser(context));
user               86 source3/libsmb/libsmb_file.c 		if (!user) {
user               94 source3/libsmb/libsmb_file.c                           server, share, &workgroup, &user, &password);
user              238 source3/libsmb/libsmb_file.c 	char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
user              291 source3/libsmb/libsmb_file.c                             &user,
user              341 source3/libsmb/libsmb_file.c 	char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
user              382 source3/libsmb/libsmb_file.c                             &user,
user              426 source3/libsmb/libsmb_file.c 	char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
user              459 source3/libsmb/libsmb_file.c                             &user,
user              710 source3/libsmb/libsmb_file.c 	char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
user              757 source3/libsmb/libsmb_file.c                                     &user,
user              816 source3/libsmb/libsmb_file.c 	char *user = NULL;
user              850 source3/libsmb/libsmb_file.c                             &user,
user               40 source3/libsmb/libsmb_printjob.c 	char *user = NULL;
user               67 source3/libsmb/libsmb_printjob.c                             &user,
user              188 source3/libsmb/libsmb_printjob.c 	char *user = NULL;
user              216 source3/libsmb/libsmb_printjob.c                             &user,
user              224 source3/libsmb/libsmb_printjob.c         if (!user || user[0] == (char)0) {
user              225 source3/libsmb/libsmb_printjob.c 		user = talloc_strdup(frame, smbc_getUser(context));
user              226 source3/libsmb/libsmb_printjob.c 		if (!user) {
user              234 source3/libsmb/libsmb_printjob.c                           server, share, &workgroup, &user, &password);
user              265 source3/libsmb/libsmb_printjob.c 	char *user = NULL;
user              294 source3/libsmb/libsmb_printjob.c                             &user,
user              302 source3/libsmb/libsmb_printjob.c         if (!user || user[0] == (char)0) {
user              303 source3/libsmb/libsmb_printjob.c 		user = talloc_strdup(frame, smbc_getUser(context));
user              304 source3/libsmb/libsmb_printjob.c 		if (!user) {
user              312 source3/libsmb/libsmb_printjob.c                           server, share, &workgroup, &user, &password);
user               63 source3/libsmb/libsmb_setget.c         return c->user;
user               68 source3/libsmb/libsmb_setget.c smbc_setUser(SMBCCTX *c, char * user)
user               70 source3/libsmb/libsmb_setget.c         c->user = user;
user              117 source3/libsmb/libsmb_stat.c 	char *user = NULL;
user              151 source3/libsmb/libsmb_stat.c                             &user,
user              159 source3/libsmb/libsmb_stat.c 	if (!user || user[0] == (char)0) {
user              160 source3/libsmb/libsmb_stat.c 		user = talloc_strdup(frame, smbc_getUser(context));
user              161 source3/libsmb/libsmb_stat.c 		if (!user) {
user              169 source3/libsmb/libsmb_stat.c                           server, share, &workgroup, &user, &password);
user              217 source3/libsmb/libsmb_stat.c 	char *user = NULL;
user              251 source3/libsmb/libsmb_stat.c                             &user,
user             1712 source3/libsmb/libsmb_xattr.c 	char *user = NULL;
user             1748 source3/libsmb/libsmb_xattr.c                             &user,
user             1756 source3/libsmb/libsmb_xattr.c 	if (!user || user[0] == (char)0) {
user             1757 source3/libsmb/libsmb_xattr.c 		user = talloc_strdup(frame, smbc_getUser(context));
user             1758 source3/libsmb/libsmb_xattr.c 		if (!user) {
user             1766 source3/libsmb/libsmb_xattr.c                           server, share, &workgroup, &user, &password);
user             1774 source3/libsmb/libsmb_xattr.c                                            &workgroup, &user, &password);
user             2008 source3/libsmb/libsmb_xattr.c 	char *user = NULL;
user             2042 source3/libsmb/libsmb_xattr.c                             &user,
user             2050 source3/libsmb/libsmb_xattr.c         if (!user || user[0] == (char)0) {
user             2051 source3/libsmb/libsmb_xattr.c 		user = talloc_strdup(frame, smbc_getUser(context));
user             2052 source3/libsmb/libsmb_xattr.c 		if (!user) {
user             2060 source3/libsmb/libsmb_xattr.c                           server, share, &workgroup, &user, &password);
user             2068 source3/libsmb/libsmb_xattr.c                                            &workgroup, &user, &password);
user             2150 source3/libsmb/libsmb_xattr.c 	char *user = NULL;
user             2178 source3/libsmb/libsmb_xattr.c                             &user,
user             2186 source3/libsmb/libsmb_xattr.c         if (!user || user[0] == (char)0) {
user             2187 source3/libsmb/libsmb_xattr.c 		user = talloc_strdup(frame, smbc_getUser(context));
user             2188 source3/libsmb/libsmb_xattr.c 		if (!user) {
user             2196 source3/libsmb/libsmb_xattr.c                           server, share, &workgroup, &user, &password);
user             2204 source3/libsmb/libsmb_xattr.c                                            &workgroup, &user, &password);
user               87 source3/libsmb/ntlm_check.c 				 const char *user, const char *domain,
user              127 source3/libsmb/ntlm_check.c 	if (!ntv2_owf_gen(part_passwd, user, domain, upper_case_domain, kr)) {
user              147 source3/libsmb/ntlmssp.c NTSTATUS ntlmssp_set_username(NTLMSSP_STATE *ntlmssp_state, const char *user) 
user              149 source3/libsmb/ntlmssp.c 	ntlmssp_state->user = talloc_strdup(ntlmssp_state, user ? user : "" );
user              150 source3/libsmb/ntlmssp.c 	if (!ntlmssp_state->user) {
user              647 source3/libsmb/ntlmssp.c 	char *user = NULL;
user              666 source3/libsmb/ntlmssp.c 	ntlmssp_state->user = NULL;
user              677 source3/libsmb/ntlmssp.c 			 &user, 
user              682 source3/libsmb/ntlmssp.c 		SAFE_FREE(user);
user              701 source3/libsmb/ntlmssp.c 				 &user, 
user              706 source3/libsmb/ntlmssp.c 			SAFE_FREE(user);
user              718 source3/libsmb/ntlmssp.c 		SAFE_FREE(user);
user              724 source3/libsmb/ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) {
user              726 source3/libsmb/ntlmssp.c 		SAFE_FREE(user);
user              734 source3/libsmb/ntlmssp.c 		SAFE_FREE(user);
user              741 source3/libsmb/ntlmssp.c 	SAFE_FREE(user);
user              745 source3/libsmb/ntlmssp.c 		 ntlmssp_state->user, ntlmssp_state->domain, ntlmssp_state->workstation, (unsigned long)ntlmssp_state->lm_resp.length, (unsigned long)ntlmssp_state->nt_resp.length));
user             1092 source3/libsmb/ntlmssp.c 		if (!SMBNTLMv2encrypt_hash(ntlmssp_state->user, 
user             1186 source3/libsmb/ntlmssp.c 		       ntlmssp_state->user, 
user               34 source3/libsmb/passchange.c 	char *user, *domain, *p;
user               39 source3/libsmb/passchange.c 	user = talloc_strdup(talloc_tos(), user_name);
user               40 source3/libsmb/passchange.c 	SMB_ASSERT(user != NULL);
user               45 source3/libsmb/passchange.c 	if ((p = strchr_m(user,'\\')) || (p = strchr_m(user,'/')) ||
user               46 source3/libsmb/passchange.c 	    (p = strchr_m(user,*lp_winbind_separator()))) {
user               48 source3/libsmb/passchange.c 		domain = user;
user               49 source3/libsmb/passchange.c 		user = p+1;
user              156 source3/libsmb/passchange.c 		result = cli_init_creds(cli, user, domain, old_passwd);
user              181 source3/libsmb/passchange.c 						   domain, user,
user              237 source3/libsmb/samlogon_cache.c 			TALLOC_FREE( user );
user              167 source3/libsmb/smbencrypt.c 	smb_ucs2_t *user;
user              175 source3/libsmb/smbencrypt.c 	if (!push_ucs2_allocate(&user, user_in, &user_byte_len)) {
user              184 source3/libsmb/smbencrypt.c 		SAFE_FREE(user);
user              188 source3/libsmb/smbencrypt.c 	strupper_w(user);
user              201 source3/libsmb/smbencrypt.c 	hmac_md5_update((const unsigned char *)user, user_byte_len, &ctx);
user              207 source3/libsmb/smbencrypt.c 	dump_data(100, (uint8 *)user, user_byte_len);
user              213 source3/libsmb/smbencrypt.c 	SAFE_FREE(user);
user              435 source3/libsmb/smbencrypt.c bool SMBNTLMv2encrypt_hash(const char *user, const char *domain, const uchar nt_hash[16], 
user              447 source3/libsmb/smbencrypt.c 	if (!ntv2_owf_gen(nt_hash, user, domain, False, ntlm_v2_hash)) {
user              474 source3/libsmb/smbencrypt.c bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, 
user              483 source3/libsmb/smbencrypt.c 	return SMBNTLMv2encrypt_hash(user, domain, nt_hash,
user              286 source3/modules/perfcount_onefs.c 					    uid_t uid, const char *user,
user               29 source3/modules/perfcount_test.c 	char *user;
user              109 source3/modules/perfcount_test.c 	DEBUG(lvl,("user - %s\n", id->user));
user              355 source3/modules/perfcount_test.c 					    uid_t uid, const char *user,
user              823 source3/modules/vfs_acl_tdb.c 				const char *user)
user              828 source3/modules/vfs_acl_tdb.c         res = SMB_VFS_NEXT_CONNECT(handle, service, user);
user              142 source3/modules/vfs_afsacl.c 			const char *user, *domain;
user              145 source3/modules/vfs_afsacl.c 				   &domain, &user, &type);
user             1054 source3/modules/vfs_afsacl.c 			  const char *user)
user             1063 source3/modules/vfs_afsacl.c 	return SMB_VFS_NEXT_CONNECT(handle, service, user);
user               31 source3/modules/vfs_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user);
user              126 source3/modules/vfs_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user)
user              133 source3/modules/vfs_audit.c 	       svc, user);
user              135 source3/modules/vfs_audit.c 	result = SMB_VFS_NEXT_CONNECT(handle, svc, user);
user               90 source3/modules/vfs_cacheprime.c                 const char *                user)
user               98 source3/modules/vfs_cacheprime.c                 return SMB_VFS_NEXT_CONNECT(handle, service, user);
user              121 source3/modules/vfs_cacheprime.c         return SMB_VFS_NEXT_CONNECT(handle, service, user);
user              162 source3/modules/vfs_commit.c         const char *                user)
user              165 source3/modules/vfs_commit.c         return SMB_VFS_NEXT_CONNECT(handle, service, user);
user               32 source3/modules/vfs_default.c static int vfswrap_connect(vfs_handle_struct *handle,  const char *service, const char *user)
user               34 source3/modules/vfs_extd_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user);
user              129 source3/modules/vfs_extd_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user)
user              138 source3/modules/vfs_extd_audit.c 		       svc, user);
user              141 source3/modules/vfs_extd_audit.c 	       svc, user));
user              143 source3/modules/vfs_extd_audit.c 	result = SMB_VFS_NEXT_CONNECT(handle, svc, user);
user              180 source3/modules/vfs_fileid.c 			  const char *service, const char *user)
user              217 source3/modules/vfs_fileid.c 	return SMB_VFS_NEXT_CONNECT(handle, service, user);
user               75 source3/modules/vfs_full_audit.c 			 const char *svc, const char *user);
user              944 source3/modules/vfs_full_audit.c 			 const char *svc, const char *user)
user              974 source3/modules/vfs_full_audit.c 	result = SMB_VFS_NEXT_CONNECT(handle, svc, user);
user               29 source3/modules/vfs_onefs.c 			 const char *user)
user               39 source3/modules/vfs_onefs.c 	return SMB_VFS_NEXT_CONNECT(handle, service, user);
user              102 source3/modules/vfs_prealloc.c                 const char *                user)
user              107 source3/modules/vfs_prealloc.c 	    return SMB_VFS_NEXT_CONNECT(handle, service, user);
user              128 source3/modules/vfs_readahead.c 				const char *user)
user              155 source3/modules/vfs_readahead.c 	return SMB_VFS_NEXT_CONNECT(handle, service, user);
user               58 source3/modules/vfs_readonly.c 			    const char *user)    
user               88 source3/modules/vfs_readonly.c     return SMB_VFS_NEXT_CONNECT(handle, service, user);
user               34 source3/modules/vfs_recycle.c static int recycle_connect(vfs_handle_struct *handle, const char *service, const char *user);
user               50 source3/modules/vfs_recycle.c static int recycle_connect(vfs_handle_struct *handle, const char *service, const char *user)
user               53 source3/modules/vfs_recycle.c 		service,user));
user               55 source3/modules/vfs_recycle.c 	return SMB_VFS_NEXT_CONNECT(handle, service, user);
user              268 source3/modules/vfs_smb_traffic_analyzer.c                          const char *user)
user              328 source3/modules/vfs_smb_traffic_analyzer.c 	return SMB_VFS_NEXT_CONNECT(handle, service, user);
user               89 source3/modules/vfs_tsmsm.c 			 const char *user) {
user              137 source3/modules/vfs_tsmsm.c         return SMB_VFS_NEXT_CONNECT(handle, service, user); 
user              740 source3/modules/vfs_xattr_tdb.c 			  const char *user)
user              746 source3/modules/vfs_xattr_tdb.c 	res = SMB_VFS_NEXT_CONNECT(handle, service, user);
user              124 source3/nmbd/nmbd_processlogon.c 				char *user = skip_string(buf,len,machine);
user              126 source3/nmbd/nmbd_processlogon.c 				if (!user || PTR_DIFF(user, buf) >= len) {
user              130 source3/nmbd/nmbd_processlogon.c 				getdc = skip_string(buf,len,user);
user              147 source3/nmbd/nmbd_processlogon.c 				pull_ascii_fstring(user_str, user);
user              123 source3/pam_smbpass/general.h     char *user;                 /* user that's failed to be authenticated */
user               48 source3/pam_smbpass/pam_smb_passwd.c int smb_update_db( pam_handle_t *pamh, int ctrl, const char *user,  const char *pass_new )
user               54 source3/pam_smbpass/pam_smb_passwd.c 	retval = NT_STATUS_IS_OK(local_password_change(user, LOCAL_SET_PASSWORD, pass_new,
user              103 source3/pam_smbpass/pam_smb_passwd.c     const char *user;
user              118 source3/pam_smbpass/pam_smb_passwd.c     retval = pam_get_user( pamh, &user, "Username: " );
user              126 source3/pam_smbpass/pam_smb_passwd.c         _log_err(pamh, LOG_DEBUG, "username [%s] obtained", user);
user              150 source3/pam_smbpass/pam_smb_passwd.c     if (!pdb_getsampwnam(sampass,user)) {
user              151 source3/pam_smbpass/pam_smb_passwd.c         _log_err(pamh, LOG_ALERT, "Failed to find entry for user %s.", user);
user              156 source3/pam_smbpass/pam_smb_passwd.c         _log_err(pamh, LOG_DEBUG, "Located account for %s", user);
user              180 source3/pam_smbpass/pam_smb_passwd.c             Announce = SMB_MALLOC_ARRAY(char, sizeof(greeting)+strlen(user));
user              188 source3/pam_smbpass/pam_smb_passwd.c             strncpy( Announce+sizeof(greeting)-1, user, strlen(user)+1 );
user              304 source3/pam_smbpass/pam_smb_passwd.c         retval = smb_update_db(pamh, ctrl, user, pass_new);
user              314 source3/pam_smbpass/pam_smb_passwd.c 				user, uidtoname(getuid()), getuid());
user              317 source3/pam_smbpass/pam_smb_passwd.c 				user, uid, uidtoname(getuid()), getuid());
user              320 source3/pam_smbpass/pam_smb_passwd.c 		_log_err(pamh, LOG_ERR, "password change failed for user %s", user);
user              328 source3/pam_smbpass/support.c                           , failure->user, failure->id );
user              339 source3/pam_smbpass/support.c         _pam_delete( failure->user );	/* tidy up */
user              443 source3/pam_smbpass/support.c                 newauth->user = smbpXstrDup( pamh, name );
user             6098 source3/param/loadparm.c 		 const char *user, const char *pszHomedir)
user             6102 source3/param/loadparm.c 	if (pszHomename == NULL || user == NULL || pszHomedir == NULL ||
user             6119 source3/param/loadparm.c 		if (asprintf(&comment, "Home directory of %s", user) < 0) {
user             6134 source3/param/loadparm.c 	       user, ServicePtrs[i]->szPath ));
user               51 source3/passdb/passdb.c static int samu_destroy(struct samu *user) 
user               53 source3/passdb/passdb.c 	data_blob_clear_free( &user->lm_pw );
user               54 source3/passdb/passdb.c 	data_blob_clear_free( &user->nt_pw );
user               56 source3/passdb/passdb.c 	if ( user->plaintext_pw )
user               57 source3/passdb/passdb.c 		memset( user->plaintext_pw, 0x0, strlen(user->plaintext_pw) );
user               68 source3/passdb/passdb.c 	struct samu *user;
user               70 source3/passdb/passdb.c 	if ( !(user = TALLOC_ZERO_P( ctx, struct samu )) ) {
user               75 source3/passdb/passdb.c 	talloc_set_destructor( user, samu_destroy );
user               79 source3/passdb/passdb.c 	user->methods = NULL;
user               84 source3/passdb/passdb.c 	user->logon_time            = (time_t)0;
user               85 source3/passdb/passdb.c 	user->pass_last_set_time    = (time_t)0;
user               86 source3/passdb/passdb.c 	user->pass_can_change_time  = (time_t)0;
user               87 source3/passdb/passdb.c 	user->logoff_time           = get_time_t_max();
user               88 source3/passdb/passdb.c 	user->kickoff_time          = get_time_t_max();
user               89 source3/passdb/passdb.c 	user->pass_must_change_time = get_time_t_max();
user               90 source3/passdb/passdb.c 	user->fields_present        = 0x00ffffff;
user               91 source3/passdb/passdb.c 	user->logon_divs = 168; 	/* hours per week */
user               92 source3/passdb/passdb.c 	user->hours_len = 21; 		/* 21 times 8 bits = 168 */
user               93 source3/passdb/passdb.c 	memset(user->hours, 0xff, user->hours_len); /* available at all hours */
user               94 source3/passdb/passdb.c 	user->bad_password_count = 0;
user               95 source3/passdb/passdb.c 	user->logon_count = 0;
user               96 source3/passdb/passdb.c 	user->unknown_6 = 0x000004ec; /* don't know */
user              101 source3/passdb/passdb.c 	user->username = "";
user              102 source3/passdb/passdb.c 	user->domain = "";
user              103 source3/passdb/passdb.c 	user->nt_username = "";
user              104 source3/passdb/passdb.c 	user->full_name = "";
user              105 source3/passdb/passdb.c 	user->home_dir = "";
user              106 source3/passdb/passdb.c 	user->logon_script = "";
user              107 source3/passdb/passdb.c 	user->profile_path = "";
user              108 source3/passdb/passdb.c 	user->acct_desc = "";
user              109 source3/passdb/passdb.c 	user->workstations = "";
user              110 source3/passdb/passdb.c 	user->comment = "";
user              111 source3/passdb/passdb.c 	user->munged_dial = "";
user              113 source3/passdb/passdb.c 	user->plaintext_pw = NULL;
user              119 source3/passdb/passdb.c 	user->acct_ctrl = ACB_NORMAL;
user              121 source3/passdb/passdb.c 	return user;
user              130 source3/passdb/passdb.c static NTSTATUS samu_set_unix_internal(struct samu *user, const struct passwd *pwd, bool create)
user              142 source3/passdb/passdb.c 	pdb_set_username(user, pwd->pw_name, PDB_SET);
user              143 source3/passdb/passdb.c 	pdb_set_fullname(user, pwd->pw_gecos, PDB_SET);
user              144 source3/passdb/passdb.c 	pdb_set_domain (user, get_global_sam_name(), PDB_DEFAULT);
user              152 source3/passdb/passdb.c 	pdb_set_group_sid(user, &group_sid, PDB_SET);
user              157 source3/passdb/passdb.c 	user->unix_pw = tcopy_passwd( user, pwd );
user              162 source3/passdb/passdb.c 		if ( !pdb_set_user_sid_from_rid(user, DOMAIN_USER_RID_GUEST, PDB_DEFAULT)) {
user              173 source3/passdb/passdb.c 		if (!pdb_set_acct_ctrl(user, ACB_WSTRUST, PDB_DEFAULT)) {
user              182 source3/passdb/passdb.c 		if (!pdb_set_acct_ctrl(user, ACB_NORMAL, PDB_DEFAULT)) {
user              190 source3/passdb/passdb.c 		pdb_set_profile_path(user, talloc_sub_specified(user, 
user              193 source3/passdb/passdb.c 		pdb_set_homedir(user, talloc_sub_specified(user, 
user              196 source3/passdb/passdb.c 		pdb_set_dir_drive(user, talloc_sub_specified(user, 
user              199 source3/passdb/passdb.c 		pdb_set_logon_script(user, talloc_sub_specified(user, 
user              221 source3/passdb/passdb.c 		if ( !pdb_set_user_sid(user, &user_sid, PDB_SET) ) {
user              231 source3/passdb/passdb.c 	urid = algorithmic_pdb_uid_to_user_rid( user->unix_pw->pw_uid );
user              233 source3/passdb/passdb.c 	if ( !pdb_set_user_sid_from_rid( user, urid, PDB_SET) ) {
user              244 source3/passdb/passdb.c NTSTATUS samu_set_unix(struct samu *user, const struct passwd *pwd)
user              246 source3/passdb/passdb.c 	return samu_set_unix_internal( user, pwd, False );
user              249 source3/passdb/passdb.c NTSTATUS samu_alloc_rid_unix(struct samu *user, const struct passwd *pwd)
user              251 source3/passdb/passdb.c 	return samu_set_unix_internal( user, pwd, True );
user              245 source3/passdb/pdb_interface.c bool guest_user_info( struct samu *user )
user              257 source3/passdb/pdb_interface.c 	result = samu_set_unix(user, pwd );
user              710 source3/passdb/pdb_interface.c NTSTATUS pdb_enum_group_memberships(TALLOC_CTX *mem_ctx, struct samu *user,
user              716 source3/passdb/pdb_interface.c 		pdb, mem_ctx, user,
user              740 source3/passdb/pdb_interface.c NTSTATUS pdb_set_unix_primary_group(TALLOC_CTX *mem_ctx, struct samu *user)
user              743 source3/passdb/pdb_interface.c 	return pdb->set_unix_primary_group(pdb, mem_ctx, user);
user             1133 source3/passdb/pdb_interface.c static NTSTATUS pdb_default_getsampwnam (struct pdb_methods *methods, struct samu *user, const char *sname)
user             1138 source3/passdb/pdb_interface.c static NTSTATUS pdb_default_getsampwsid(struct pdb_methods *my_methods, struct samu * user, const DOM_SID *sid)
user             1452 source3/passdb/pdb_interface.c 						   struct samu *user,
user             1460 source3/passdb/pdb_interface.c 	const char *username = pdb_get_username(user);
user              333 source3/passdb/pdb_ldap.c 					  const char *user,
user              338 source3/passdb/pdb_ldap.c 	char *escape_user = escape_ldap_string_alloc(user);
user             1494 source3/passdb/pdb_ldap.c static NTSTATUS ldapsam_getsampwnam(struct pdb_methods *my_methods, struct samu *user, const char *sname)
user             1504 source3/passdb/pdb_ldap.c 	attr_list = get_userattr_list( user, ldap_state->schema_ver );
user             1505 source3/passdb/pdb_ldap.c 	append_attr(user, &attr_list,
user             1508 source3/passdb/pdb_ldap.c 	append_attr(user, &attr_list, "uidNumber");
user             1530 source3/passdb/pdb_ldap.c 		if (!init_sam_from_ldap(ldap_state, user, entry)) {
user             1535 source3/passdb/pdb_ldap.c 		pdb_set_backend_private_data(user, result, NULL,
user             1537 source3/passdb/pdb_ldap.c 		talloc_autofree_ldapmsg(user, result);
user             1596 source3/passdb/pdb_ldap.c static NTSTATUS ldapsam_getsampwsid(struct pdb_methods *my_methods, struct samu * user, const DOM_SID *sid)
user             1630 source3/passdb/pdb_ldap.c 	if (!init_sam_from_ldap(ldap_state, user, entry)) {
user             1636 source3/passdb/pdb_ldap.c 	pdb_set_backend_private_data(user, result, NULL,
user             1638 source3/passdb/pdb_ldap.c 	talloc_autofree_ldapmsg(user, result);
user             2806 source3/passdb/pdb_ldap.c 					       struct samu *user,
user             2828 source3/passdb/pdb_ldap.c 	if (pdb_get_username(user) == NULL) {
user             2832 source3/passdb/pdb_ldap.c 	escape_name = escape_ldap_string_alloc(pdb_get_username(user));
user             2858 source3/passdb/pdb_ldap.c 		DEBUG(1, ("User account [%s] not found!\n", pdb_get_username(user)));
user             2960 source3/passdb/pdb_ldap.c 			  pdb_get_username(user)));
user             4986 source3/passdb/pdb_ldap.c 	struct samu *user;
user             5064 source3/passdb/pdb_ldap.c 	user = samu_new(tmp_ctx);
user             5065 source3/passdb/pdb_ldap.c 	if (!user) {
user             5070 source3/passdb/pdb_ldap.c 	if (!pdb_set_username(user, name, PDB_SET)) {
user             5074 source3/passdb/pdb_ldap.c 	if (!pdb_set_domain(user, get_global_sam_name(), PDB_SET)) {
user             5080 source3/passdb/pdb_ldap.c 			if (!pdb_set_acct_ctrl(user, ACB_WSTRUST, PDB_SET)) {
user             5085 source3/passdb/pdb_ldap.c 			if (!pdb_set_acct_ctrl(user, acb_info, PDB_SET)) {
user             5091 source3/passdb/pdb_ldap.c 		if (!pdb_set_acct_ctrl(user, ACB_NORMAL | ACB_DISABLED, PDB_SET)) {
user             5097 source3/passdb/pdb_ldap.c 	if (!pdb_set_user_sid(user, &user_sid, PDB_SET)) {
user             5102 source3/passdb/pdb_ldap.c 	if (!init_ldap_from_sam(ldap_state, NULL, &mods, user, element_is_set_or_changed)) {
user             5197 source3/passdb/pdb_ldap.c 					       struct samu *user,
user              166 source3/passdb/pdb_smbpasswd.c static void pdb_init_smb(struct smb_passwd *user)
user              168 source3/passdb/pdb_smbpasswd.c 	if (user == NULL) 
user              170 source3/passdb/pdb_smbpasswd.c 	ZERO_STRUCTP (user);
user              172 source3/passdb/pdb_smbpasswd.c 	user->pass_last_set_time = (time_t)0;
user             1614 source3/passdb/pdb_smbpasswd.c 		struct samu *user;
user             1621 source3/passdb/pdb_smbpasswd.c 		user = samu_new(talloc_tos());
user             1622 source3/passdb/pdb_smbpasswd.c 		if (user == NULL) {
user             1627 source3/passdb/pdb_smbpasswd.c 		if (!build_sam_account(smbpasswd_state, user, pwd)) {
user             1634 source3/passdb/pdb_smbpasswd.c 		entry.acct_flags = pdb_get_acct_ctrl(user);
user             1635 source3/passdb/pdb_smbpasswd.c 		sid_peek_rid(pdb_get_user_sid(user), &entry.rid);
user             1637 source3/passdb/pdb_smbpasswd.c 			search_state, pdb_get_username(user));
user             1639 source3/passdb/pdb_smbpasswd.c 			search_state, pdb_get_fullname(user));
user             1641 source3/passdb/pdb_smbpasswd.c 			search_state, pdb_get_acct_desc(user));
user             1643 source3/passdb/pdb_smbpasswd.c 		TALLOC_FREE(user);
user               65 source3/passdb/pdb_tdb.c 	struct samu *user;
user               77 source3/passdb/pdb_tdb.c 	user = samu_new(talloc_tos());
user               78 source3/passdb/pdb_tdb.c 	if (user == NULL) {
user               89 source3/passdb/pdb_tdb.c 		ret = init_samu_from_buffer(user, SAMU_BUFFER_V0,
user               94 source3/passdb/pdb_tdb.c 		ret = init_samu_from_buffer(user, SAMU_BUFFER_V1,
user               99 source3/passdb/pdb_tdb.c 		ret = init_samu_from_buffer(user, SAMU_BUFFER_V2,
user              104 source3/passdb/pdb_tdb.c 		ret = init_samu_from_buffer(user, SAMU_BUFFER_V3,
user              109 source3/passdb/pdb_tdb.c 		ret = init_samu_from_buffer(user, SAMU_BUFFER_V4,
user              121 source3/passdb/pdb_tdb.c 		TALLOC_FREE(user);
user              126 source3/passdb/pdb_tdb.c 	data.dsize = init_buffer_from_samu(&data.dptr, user, false);
user              127 source3/passdb/pdb_tdb.c 	TALLOC_FREE(user);
user              528 source3/passdb/pdb_tdb.c 				    struct samu *user, const char *sname)
user              534 source3/passdb/pdb_tdb.c 	if ( !user ) {
user              564 source3/passdb/pdb_tdb.c 	if (!init_samu_from_buffer(user, SAMU_BUFFER_LATEST, data.dptr, data.dsize)) {
user              582 source3/passdb/pdb_tdb.c 				    struct samu *user, uint32 rid)
user              589 source3/passdb/pdb_tdb.c 	if ( !user ) {
user              616 source3/passdb/pdb_tdb.c 	return tdbsam_getsampwnam (my_methods, user, name);
user              620 source3/passdb/pdb_tdb.c 				   struct samu * user, const DOM_SID *sid)
user              627 source3/passdb/pdb_tdb.c 	return tdbsam_getsampwrid(my_methods, user, rid);
user             1139 source3/passdb/pdb_tdb.c 	struct samu *user = NULL;
user             1144 source3/passdb/pdb_tdb.c 	TALLOC_FREE(user);
user             1145 source3/passdb/pdb_tdb.c 	user = samu_new(talloc_tos());
user             1146 source3/passdb/pdb_tdb.c 	if (user == NULL) {
user             1157 source3/passdb/pdb_tdb.c 	status = tdbsam_getsampwrid(state->methods, user, rid);
user             1169 source3/passdb/pdb_tdb.c 		TALLOC_FREE(user);
user             1174 source3/passdb/pdb_tdb.c 	    ((state->acct_flags & pdb_get_acct_ctrl(user)) == 0)) {
user             1178 source3/passdb/pdb_tdb.c 	entry->acct_flags = pdb_get_acct_ctrl(user);
user             1180 source3/passdb/pdb_tdb.c 	entry->account_name = talloc_strdup(search, pdb_get_username(user));
user             1181 source3/passdb/pdb_tdb.c 	entry->fullname = talloc_strdup(search, pdb_get_fullname(user));
user             1182 source3/passdb/pdb_tdb.c 	entry->description = talloc_strdup(search, pdb_get_acct_desc(user));
user             1184 source3/passdb/pdb_tdb.c 	TALLOC_FREE(user);
user               45 source3/passdb/pdb_wbc_sam.c 				       struct samu *user,
user               53 source3/passdb/pdb_wbc_sam.c 	memset(user, 0, sizeof(user));
user               56 source3/passdb/pdb_wbc_sam.c 	user->methods = methods;
user               57 source3/passdb/pdb_wbc_sam.c 	result = samu_set_unix(user, pwd);
user               62 source3/passdb/pdb_wbc_sam.c static NTSTATUS pdb_wbc_sam_getsampwnam(struct pdb_methods *methods, struct samu *user, const char *sname)
user               64 source3/passdb/pdb_wbc_sam.c 	return _pdb_wbc_sam_getsampw(methods, user, winbind_getpwnam(sname));
user               67 source3/passdb/pdb_wbc_sam.c static NTSTATUS pdb_wbc_sam_getsampwsid(struct pdb_methods *methods, struct samu *user, const DOM_SID *sid)
user               69 source3/passdb/pdb_wbc_sam.c 	return _pdb_wbc_sam_getsampw(methods, user, winbind_getpwsid(sid));
user               95 source3/passdb/pdb_wbc_sam.c 						   struct samu *user,
user              101 source3/passdb/pdb_wbc_sam.c 	const char *username = pdb_get_username(user);
user              615 source3/printing/print_cups.c 	char *user = NULL;
user              662 source3/printing/print_cups.c 	if (!push_utf8_talloc(frame, &user, pjob->user, &size)) {
user              667 source3/printing/print_cups.c         	     NULL, user);
user              712 source3/printing/print_cups.c 	char *user = NULL;
user              759 source3/printing/print_cups.c 	if (!push_utf8_talloc(frame, &user, pjob->user, &size)) {
user              763 source3/printing/print_cups.c         	     NULL, user);
user              808 source3/printing/print_cups.c 	char *user = NULL;
user              855 source3/printing/print_cups.c 	if (!push_utf8_talloc(frame, &user, pjob->user, &size)) {
user              859 source3/printing/print_cups.c         	     NULL, user);
user              910 source3/printing/print_cups.c 	char *user = NULL;
user              966 source3/printing/print_cups.c 	if (!push_utf8_talloc(frame, &user, pjob->user, &size)) {
user              970 source3/printing/print_cups.c         	     NULL, user);
user              486 source3/printing/print_iprint.c 	             NULL, pjob->user);
user              584 source3/printing/print_iprint.c 	             NULL, pjob->user);
user              682 source3/printing/print_iprint.c 	             NULL, pjob->user);
user              780 source3/printing/print_iprint.c 	             NULL, pjob->user);
user              303 source3/printing/printing.c 				pjob->user,
user              493 source3/printing/printing.c 		notify_job_username(sharename, jobid, new_data->user);
user              555 source3/printing/printing.c 				pjob->user,
user              697 source3/printing/printing.c 	fstrcpy(pj.user, old_pj ? old_pj->user : q->fs_user);
user              838 source3/printing/printing.c 	fstrcpy(ts->queue[i].fs_user, pjob.user);
user             2016 source3/printing/printing.c 	return strequal(pjob->user, server_info->sanitized_username);
user             2472 source3/printing/printing.c 	fstrcpy(pjob.user, lp_printjob_username(snum));
user             2477 source3/printing/printing.c 			      pjob.user, sizeof(pjob.user)-1);
user             2479 source3/printing/printing.c 	pjob.user[sizeof(pjob.user)-1] = '\0';
user             2712 source3/printing/printing.c 		fstrcpy(queue[total_count].fs_user, pjob->user);
user               49 source3/rpc_client/cli_spoolss.c 	level1.user	= cli->auth->user_name;
user              166 source3/rpc_client/cli_spoolss.c 	level1.user		= cli->auth->user_name;
user              652 source3/rpc_server/srv_pipe.c 		  "workstation: %s\n", a->ntlmssp_state->user,
user               97 source3/rpc_server/srv_srvsvc_nt.c 	fenum->ctr3->array[i].user		= username;
user              200 source3/rpc_server/srv_srvsvc_nt.c 	fenum->ctr3->array[i].user		= username;
user              878 source3/rpc_server/srv_srvsvc_nt.c 		ctr1->array[num_entries].user		= session_list[resume_handle].username;
user              993 source3/rpc_server/srv_srvsvc_nt.c 		ctr1->array[num_entries].user		= "dummy_user";
user             1044 source3/rpc_server/srv_srvsvc_nt.c 	werr = net_enum_files(ctx, r->in.user, &ctr3, resume_hnd);
user             1049 source3/rpc_server/srv_srvsvc_nt.c 	werr = net_enum_pipes(ctx, r->in.user, &ctr3, resume_hnd);
user             1252 source3/rpc_server/srv_srvsvc_nt.c 	username = r->in.user;
user              474 source3/rpcclient/cmd_netlogon.c 				u.user->account_name.string);
user             2372 source3/rpcclient/cmd_samr.c 	const char *user, *oldpass, *newpass;
user             2382 source3/rpcclient/cmd_samr.c 	user = argv[1];
user             2408 source3/rpcclient/cmd_samr.c 	init_lsa_String(&lsa_acct_name, user);
user             2464 source3/rpcclient/cmd_samr.c 	const char *user, *oldpass, *newpass;
user             2472 source3/rpcclient/cmd_samr.c 	user = argv[1];
user             2497 source3/rpcclient/cmd_samr.c 	result = rpccli_samr_chgpasswd_user2(cli, mem_ctx, user, newpass, oldpass);
user             2521 source3/rpcclient/cmd_samr.c 	const char *user, *oldpass, *newpass;
user             2531 source3/rpcclient/cmd_samr.c 	user = argv[1];
user             2557 source3/rpcclient/cmd_samr.c 					     user,
user             2607 source3/rpcclient/cmd_samr.c 	const char *user, *param;
user             2625 source3/rpcclient/cmd_samr.c 	user = argv[1];
user             2762 source3/rpcclient/cmd_samr.c 	user_rid = strtol(user, NULL, 0);
user             2778 source3/rpcclient/cmd_samr.c 		init_lsa_String(&lsa_acct_name, user);
user              688 source3/rpcclient/cmd_srvsvc.c 	const char *user = NULL;
user              700 source3/rpcclient/cmd_srvsvc.c 		user = argv[2];
user              744 source3/rpcclient/cmd_srvsvc.c 					  user,
user               50 source3/smbd/chgpasswd.c static NTSTATUS check_oem_password(const char *user,
user              639 source3/smbd/chgpasswd.c bool check_lanman_password(char *user, uchar * pass1,
user              655 source3/smbd/chgpasswd.c 	ret = pdb_getsampwnam(sampass, user);
user              668 source3/smbd/chgpasswd.c 		DEBUG(0,("check_lanman_password: account %s disabled.\n", user));
user              775 source3/smbd/chgpasswd.c NTSTATUS pass_oem_change(char *user,
user              792 source3/smbd/chgpasswd.c 	ret = pdb_getsampwnam(sampass, user);
user              801 source3/smbd/chgpasswd.c 	nt_status = check_oem_password(user,
user              838 source3/smbd/chgpasswd.c static NTSTATUS check_oem_password(const char *user,
user              867 source3/smbd/chgpasswd.c 		DEBUG(2,("check_lanman_password: account %s disabled.\n", user));
user              901 source3/smbd/chgpasswd.c 			  user));
user              906 source3/smbd/chgpasswd.c 				  user));
user              909 source3/smbd/chgpasswd.c 				  user));
user              914 source3/smbd/chgpasswd.c 			  user));
user             2568 source3/smbd/lanman.c 	fstring user;
user             2583 source3/smbd/lanman.c 	pull_ascii_fstring(user,p);
user             2613 source3/smbd/lanman.c 	DEBUG(3,("Set password for <%s>\n",user));
user             2624 source3/smbd/lanman.c 		if (NT_STATUS_IS_OK(check_plaintext_password(user,password,&server_info))) {
user             2650 source3/smbd/lanman.c 		if (check_lanman_password(user,(unsigned char *)pass1,(unsigned char *)pass2, &hnd)) {
user             2677 source3/smbd/lanman.c 	fstring user;
user             2725 source3/smbd/lanman.c 	p += pull_ascii_fstring(user,p);
user             2727 source3/smbd/lanman.c 	DEBUG(3,("api_SamOEMChangePassword: Change password for <%s>\n",user));
user             2734 source3/smbd/lanman.c 	(void)map_username(user);
user             2736 source3/smbd/lanman.c 	if (NT_STATUS_IS_OK(pass_oem_change(user, (uchar*) data, (uchar *)&data[516], NULL, NULL, NULL))) {
user             3818 source3/smbd/lanman.c 	char *user = skip_string(param,tpscnt,str2);
user             3819 source3/smbd/lanman.c 	char *resource = skip_string(param,tpscnt,user);
user             3821 source3/smbd/lanman.c 	if (!str1 || !str2 || !user || !resource) {
user             3828 source3/smbd/lanman.c 	DEBUG(3,("WAccessGetUserPerms user=%s resource=%s\n",user,resource));
user             4706 source3/smbd/lanman.c 		user_struct *user = get_valid_user_struct(vuid);
user             4708 source3/smbd/lanman.c 		if (!user || user->server_info->guest) {
user               71 source3/smbd/map_username.c bool map_username(fstring user)
user               80 source3/smbd/map_username.c 	if (!*user)
user               83 source3/smbd/map_username.c 	if (strequal(user,get_last_to()))
user               86 source3/smbd/map_username.c 	if (strequal(user,get_last_from())) {
user               87 source3/smbd/map_username.c 		DEBUG(3,("Mapped user %s to %s\n",user,get_last_to()));
user               88 source3/smbd/map_username.c 		fstrcpy(user,get_last_to());
user              102 source3/smbd/map_username.c 					user);
user              125 source3/smbd/map_username.c 			DEBUG(3,("Mapped user %s to %s\n", user, qlines[0] ));
user              126 source3/smbd/map_username.c 			fstrcpy( user, qlines[0] );
user              187 source3/smbd/map_username.c 		    user_in_list(user, (const char **)dosuserlist)) {
user              188 source3/smbd/map_username.c 			DEBUG(3,("Mapped user %s to %s\n",user,unixname));
user              191 source3/smbd/map_username.c 			set_last_from_to(user, unixname);
user              192 source3/smbd/map_username.c 			fstrcpy( user, unixname );
user              211 source3/smbd/map_username.c 	set_last_from_to(user, user);
user              328 source3/smbd/password.c void add_session_user(const char *user)
user              333 source3/smbd/password.c 	pw = Get_Pwnam_alloc(talloc_tos(), user);
user              393 source3/smbd/password.c bool user_in_netgroup(const char *user, const char *ngname)
user              407 source3/smbd/password.c 		user, my_yp_domain?my_yp_domain:"(ANY)", ngname));
user              409 source3/smbd/password.c 	if (innetgr(ngname, NULL, user, my_yp_domain)) {
user              419 source3/smbd/password.c 		fstrcpy(lowercase_user, user);
user              439 source3/smbd/password.c bool user_in_list(const char *user,const char **list)
user              444 source3/smbd/password.c 	DEBUG(10,("user_in_list: checking user %s in list\n", user));
user              449 source3/smbd/password.c 			  user, *list));
user              454 source3/smbd/password.c 		if (strequal(user, *list))
user              467 source3/smbd/password.c 			if(user_in_netgroup(user, *list +1))
user              469 source3/smbd/password.c 			if(user_in_group(user, *list +1))
user              477 source3/smbd/password.c 				if(user_in_group(user, *list +2))
user              479 source3/smbd/password.c 				if(user_in_netgroup(user, *list +2))
user              488 source3/smbd/password.c 				if(user_in_group(user, *list +1))
user              498 source3/smbd/password.c 				if(user_in_netgroup(user, *list +2))
user              500 source3/smbd/password.c 				if(user_in_group(user, *list +2))
user              506 source3/smbd/password.c 				if(user_in_netgroup(user, *list +1))
user              520 source3/smbd/password.c static bool user_ok(const char *user, int snum)
user              537 source3/smbd/password.c 				ret = !user_in_list(user,
user              553 source3/smbd/password.c 				ret = user_in_list(user, (const char **)valid);
user              565 source3/smbd/password.c 			ret = user_in_list(user, (const char **)user_list);
user              581 source3/smbd/password.c 		char *host, *user, *domain;
user              583 source3/smbd/password.c 		while (getnetgrent(&host, &user, &domain)) {
user              584 source3/smbd/password.c 			if (user) {
user              585 source3/smbd/password.c 				if (user_ok(user, snum) && 
user              586 source3/smbd/password.c 				    password_ok(user,password)) {
user              588 source3/smbd/password.c 					return(user);
user              675 source3/smbd/password.c bool authorise_login(int snum, fstring user, DATA_BLOB password,
user              682 source3/smbd/password.c 		   "user=%s pass=%s\n", user,password.data));
user              725 source3/smbd/password.c 				fstrcpy(user,user2);
user              728 source3/smbd/password.c 					 "password ok\n", user));
user              762 source3/smbd/password.c 					fstrcpy(user,auser);
user              765 source3/smbd/password.c 						 "password ok (%s)\n", user));
user              773 source3/smbd/password.c 					fstrcpy(user,user2);
user              777 source3/smbd/password.c 						 user));
user              792 source3/smbd/password.c 			fstrcpy(user,guestname);
user              795 source3/smbd/password.c 				 "and guest ok (%s)\n",	user));
user              804 source3/smbd/password.c 	if (ok && !user_ok(user, snum)) {
user              805 source3/smbd/password.c 		DEBUG(0,("authorise_login: rejected invalid user %s\n",user));
user             3670 source3/smbd/posix_acls.c 	uid_t user = (uid_t)-1;
user             3718 source3/smbd/posix_acls.c 	status = unpack_nt_owners( SNUM(conn), &user, &grp, security_info_sent, psd);
user             3729 source3/smbd/posix_acls.c 	if (((user != (uid_t)-1) && (sbuf.st_uid != user)) || (( grp != (gid_t)-1) && (sbuf.st_gid != grp))) {
user             3732 source3/smbd/posix_acls.c 				fsp->fsp_name, (unsigned int)user, (unsigned int)grp ));
user             3734 source3/smbd/posix_acls.c 		if(try_chown( fsp->conn, fsp->fsp_name, user, grp) == -1) {
user             3736 source3/smbd/posix_acls.c 				fsp->fsp_name, (unsigned int)user, (unsigned int)grp, strerror(errno) ));
user              357 source3/smbd/quotas.c 	if (!request.user) {
user              611 source3/smbd/service.c                 fstring user;
user              621 source3/smbd/service.c                 if (!authorise_login(snum,user,password,&guest)) {
user              627 source3/smbd/service.c 		return make_serverinfo_from_username(mem_ctx, user, guest,
user               36 source3/smbd/sesssetup.c 				const char *user, const char *domain)
user               42 source3/smbd/sesssetup.c 				 user, domain));
user               50 source3/smbd/sesssetup.c 				user));
user              252 source3/smbd/sesssetup.c 	fstring user;
user              424 source3/smbd/sesssetup.c 	fstr_sprintf(user, "%s%c%s", domain, *lp_winbind_separator(), client);
user              428 source3/smbd/sesssetup.c 	username_was_mapped = map_username( user );
user              430 source3/smbd/sesssetup.c 	pw = smb_getpwnam( mem_ctx, user, real_username, True );
user              456 source3/smbd/sesssetup.c 			fstrcpy(user,lp_guestaccount());
user              457 source3/smbd/sesssetup.c 			pw = smb_getpwnam( mem_ctx, user, real_username, True );
user              464 source3/smbd/sesssetup.c 				user));
user              621 source3/smbd/sesssetup.c 			    (*auth_ntlmssp_state)->ntlmssp_state->user,
user              647 source3/smbd/sesssetup.c 				(*auth_ntlmssp_state)->ntlmssp_state->user) !=
user             1384 source3/smbd/sesssetup.c 	const char *user;
user             1456 source3/smbd/sesssetup.c 		user = tmp ? tmp : "";
user             1575 source3/smbd/sesssetup.c 		user = tmp ? tmp : "";
user             1623 source3/smbd/sesssetup.c 				domain, user, get_remote_machine_name()));
user             1625 source3/smbd/sesssetup.c 	if (*user) {
user             1639 source3/smbd/sesssetup.c 		fstrcpy(sub_user, user);
user             1659 source3/smbd/sesssetup.c 		user = "";
user             1662 source3/smbd/sesssetup.c 	if (!*user) {
user             1675 source3/smbd/sesssetup.c 		nt_status = make_user_info_for_reply_enc(&user_info, user,
user             1697 source3/smbd/sesssetup.c 						      user, domain, chal,
user             1718 source3/smbd/sesssetup.c 				user, domain);
user              538 source3/torture/cmd_vfs.c 	const char *user;
user              556 source3/torture/cmd_vfs.c 	if (pwd != NULL) user = pwd->pw_name;
user              557 source3/torture/cmd_vfs.c 	else user = null_string;
user              582 source3/torture/cmd_vfs.c 	printf(" Uid: %5lu/%.16s Gid: %5lu/%.16s\n", (unsigned long)st.st_uid, user, 
user              595 source3/torture/cmd_vfs.c 	const char *user;
user              623 source3/torture/cmd_vfs.c 	if (pwd != NULL) user = pwd->pw_name;
user              624 source3/torture/cmd_vfs.c 	else user = null_string;
user              648 source3/torture/cmd_vfs.c 	printf(" Uid: %5lu/%.16s Gid: %5lu/%.16s\n", (unsigned long)st.st_uid, user, 
user              660 source3/torture/cmd_vfs.c 	const char *user;
user              677 source3/torture/cmd_vfs.c 	if (pwd != NULL) user = pwd->pw_name;
user              678 source3/torture/cmd_vfs.c 	else user = null_string;
user              702 source3/torture/cmd_vfs.c 	printf(" Uid: %5lu/%.16s Gid: %5lu/%.16s\n", (unsigned long)st.st_uid, user, 
user              314 source3/torture/nsstest.c static int nss_initgroups(char *user, gid_t group, gid_t **groups, long int *start, long int *size)
user              326 source3/torture/nsstest.c 	status = _nss_initgroups(user, group, start, size, groups, 0, &nss_errno);
user             4873 source3/torture/torture.c 	fstring user;
user             4922 source3/torture/torture.c 		fstr_sprintf(user, "%X", error);
user             4924 source3/torture/torture.c 		if (NT_STATUS_IS_OK(cli_session_setup(c_nt, user, 
user             4942 source3/torture/torture.c 		if (NT_STATUS_IS_OK(cli_session_setup(c_dos, user, 
user             5019 source3/torture/torture.c static bool subst_test(const char *str, const char *user, const char *domain,
user             5025 source3/torture/torture.c 	subst = talloc_sub_specified(talloc_tos(), str, user, domain, uid, gid);
user             5029 source3/torture/torture.c 		       "[%s]\n", str, user, domain, (int)uid, (int)gid, subst,
user             1815 source3/utils/net_ads.c 	const char *user;
user             1836 source3/utils/net_ads.c 	user = argv[0];
user             1837 source3/utils/net_ads.c 	if (!strchr_m(user, '@')) {
user             1841 source3/utils/net_ads.c 		user = chr;
user             1871 source3/utils/net_ads.c 		if (asprintf(&prompt, "Enter new password for %s:", user) == -1) {
user             1879 source3/utils/net_ads.c 				auth_password, user, new_password, ads->auth.time_offset);
user             1886 source3/utils/net_ads.c 	d_printf("Password change for %s completed.\n", user);
user              478 source3/utils/net_proto.h const char *net_prompt_pass(struct net_context *c, const char *user);
user             4031 source3/utils/net_rpc.c static bool get_user_sids(const char *domain, const char *user, NT_USER_TOKEN *token)
user             4044 source3/utils/net_rpc.c 		     domain, *lp_winbind_separator(), user);
user             4048 source3/utils/net_rpc.c 	wbc_status = wbcLookupName(domain, user, &wsid, &type);
user             4156 source3/utils/net_rpc.c 		fstring domain, user;
user             4167 source3/utils/net_rpc.c 			fstrcpy(user, users[i]);
user             4172 source3/utils/net_rpc.c 			fstrcpy(user, p);
user             4175 source3/utils/net_rpc.c 		get_user_sids(domain, user, &(result[i].token));
user              538 source3/utils/net_util.c const char *net_prompt_pass(struct net_context *c, const char *user)
user              555 source3/utils/net_util.c 	if (asprintf(&prompt, "Enter %s's password:", user) == -1) {
user              225 source3/utils/ntlm_auth.c 				     fstring user)
user              234 source3/utils/ntlm_auth.c 	fstrcpy(user, p+1);
user              283 source3/utils/ntlm_auth.c static bool check_plaintext_auth(const char *user, const char *pass,
user              299 source3/utils/ntlm_auth.c 	fstrcpy(request.data.auth.user, user);
user              367 source3/utils/ntlm_auth.c         fstrcpy(request.data.auth_crap.user, username);
user              467 source3/utils/ntlm_auth.c 		fstrcpy(request.data.chng_pswd_auth_crap.user, username);
user              531 source3/utils/ntlm_auth.c 	nt_status = contact_winbind_auth_crap(ntlmssp_state->user, ntlmssp_state->domain,
user              555 source3/utils/ntlm_auth.c 		       ntlmssp_state->domain, ntlmssp_state->user, 
user              578 source3/utils/ntlm_auth.c 					ntlmssp_state->user, 
user              579 source3/utils/ntlm_auth.c 					ntlmssp_state->user, 
user              587 source3/utils/ntlm_auth.c 							      ntlmssp_state->user);
user              590 source3/utils/ntlm_auth.c 			  ntlmssp_state->domain, ntlmssp_state->user, ntlmssp_state->workstation, 
user              685 source3/utils/ntlm_auth.c 	fstr_sprintf(wb_request.data.ccache_ntlm_auth.user,
user             1035 source3/utils/ntlm_auth.c 	char *user, *pass;	
user             1036 source3/utils/ntlm_auth.c 	user=buf;
user             1048 source3/utils/ntlm_auth.c 		rfc1738_unescape(user);
user             1052 source3/utils/ntlm_auth.c 	if (check_plaintext_auth(user, pass, False)) {
user             1126 source3/utils/ntlm_auth.c 	char *user = NULL;
user             1272 source3/utils/ntlm_auth.c 				user = SMB_STRDUP(principal);
user             1310 source3/utils/ntlm_auth.c 			user = SMB_STRDUP(ntlmssp_state->user);
user             1321 source3/utils/ntlm_auth.c 		reply_argument = talloc_asprintf(ctx, "%s\\%s", domain, user);
user             1339 source3/utils/ntlm_auth.c 	SAFE_FREE(user);
user             1519 source3/utils/ntlm_auth.c 		char *user = NULL;
user             1530 source3/utils/ntlm_auth.c 		user = talloc_asprintf(talloc_tos(), "%s@%s", opt_username, opt_domain);
user             1531 source3/utils/ntlm_auth.c 		if (!user) {
user             1535 source3/utils/ntlm_auth.c 		if ((retval = kerberos_kinit_password(user, opt_password, 0, NULL))) {
user             2491 source3/utils/ntlm_auth.c 		fstring user;
user             2493 source3/utils/ntlm_auth.c 		fstr_sprintf(user, "%s%c%s", opt_domain, winbind_separator(), opt_username);
user             2494 source3/utils/ntlm_auth.c 		if (!check_plaintext_auth(user, opt_password, True)) {
user              103 source3/utils/pdbedit.c 		struct samu *user;
user              117 source3/utils/pdbedit.c 		user = samu_new(talloc_tos());
user              118 source3/utils/pdbedit.c 		if (user == NULL) {
user              125 source3/utils/pdbedit.c 		status = in->getsampwsid(in, user, &user_sid);
user              130 source3/utils/pdbedit.c 			TALLOC_FREE(user);
user              138 source3/utils/pdbedit.c 			TALLOC_FREE( user );
user              143 source3/utils/pdbedit.c 		printf("Importing account for %s...", user->username);
user              144 source3/utils/pdbedit.c 		status = out->getsampwnam(out, account, user->username);
user              147 source3/utils/pdbedit.c 			status = out->update_sam_account( out, user );
user              149 source3/utils/pdbedit.c 			status = out->add_sam_account(out, user);
user              159 source3/utils/pdbedit.c 		TALLOC_FREE( user );
user              306 source3/web/cgi.c 	const char *user = getenv("REMOTE_USER");
user              311 source3/web/cgi.c 	if (!user) {
user              317 source3/web/cgi.c 	pwd = getpwnam_alloc(talloc_autofree_context(), user);
user              319 source3/web/cgi.c 		printf("%sCannot find user %s<br>%s\n", head, user, tail);
user              327 source3/web/cgi.c 		       head, user, (int)geteuid(), (int)getuid(), tail);
user              340 source3/web/cgi.c 	fstring user, user_pass;
user              360 source3/web/cgi.c 		       user, sizeof(user), True);
user              370 source3/web/cgi.c 	pass = getpwnam_alloc(talloc_autofree_context(), user);
user              376 source3/web/cgi.c 	if NT_STATUS_IS_OK(pass_check(pass, user, user_pass, 
user              390 source3/web/cgi.c 			C_user = SMB_STRDUP(user);
user              465 source3/winbindd/winbindd_ads.c 	struct netr_SamInfo3 *user = NULL;
user              475 source3/winbindd/winbindd_ads.c 	if ( (user = netsamlogon_cache_get( mem_ctx, sid )) != NULL ) 
user              481 source3/winbindd/winbindd_ads.c 		sid_compose(&info->user_sid, &domain->sid, user->base.rid);
user              482 source3/winbindd/winbindd_ads.c 		sid_compose(&info->group_sid, &domain->sid, user->base.primary_gid);
user              484 source3/winbindd/winbindd_ads.c 		info->acct_name = talloc_strdup(mem_ctx, user->base.account_name.string);
user              485 source3/winbindd/winbindd_ads.c 		info->full_name = talloc_strdup(mem_ctx, user->base.full_name.string);
user              491 source3/winbindd/winbindd_ads.c 		TALLOC_FREE(user);
user              156 source3/winbindd/winbindd_ccache_access.c 	state->request.data.ccache_ntlm_auth.user[
user              157 source3/winbindd/winbindd_ccache_access.c 			sizeof(state->request.data.ccache_ntlm_auth.user)-1]='\0';
user              160 source3/winbindd/winbindd_ccache_access.c 		state->request.data.ccache_ntlm_auth.user));
user              164 source3/winbindd/winbindd_ccache_access.c 	if (!canonicalize_username(state->request.data.ccache_ntlm_auth.user,
user              167 source3/winbindd/winbindd_ccache_access.c 			state->request.data.ccache_ntlm_auth.user));
user              199 source3/winbindd/winbindd_ccache_access.c 	state->request.data.ccache_ntlm_auth.user[
user              200 source3/winbindd/winbindd_ccache_access.c 		sizeof(state->request.data.ccache_ntlm_auth.user)-1]='\0';
user              204 source3/winbindd/winbindd_ccache_access.c 		state->request.data.ccache_ntlm_auth.user));
user              225 source3/winbindd/winbindd_ccache_access.c 	if (!parse_domain_user(state->request.data.ccache_ntlm_auth.user, name_domain, name_user)) {
user              228 source3/winbindd/winbindd_ccache_access.c 			state->request.data.ccache_ntlm_auth.user));
user              232 source3/winbindd/winbindd_ccache_access.c 	entry = find_memory_creds_by_name(state->request.data.ccache_ntlm_auth.user);
user              236 source3/winbindd/winbindd_ccache_access.c 			state->request.data.ccache_ntlm_auth.user));
user               57 source3/winbindd/winbindd_creds.c 			      const char *user, 
user               78 source3/winbindd/winbindd_creds.c 	} else if (user != NULL) {
user               86 source3/winbindd/winbindd_creds.c 					user,
user              128 source3/winbindd/winbindd_creds.c 	if (info3 != NULL && user != NULL) {
user              129 source3/winbindd/winbindd_creds.c 		if (!netsamlogon_cache_store(user, info3)) {
user              139 source3/winbindd/winbindd_creds.c 				        const char *user,
user              143 source3/winbindd/winbindd_creds.c 	return winbindd_store_creds(domain, mem_ctx, user, pass, info3, NULL);
user              156 source3/winbindd/winbindd_creds.c 				       const char *user,
user              159 source3/winbindd/winbindd_creds.c 	return winbindd_store_creds(domain, mem_ctx, user, pass, NULL, NULL);
user               31 source3/winbindd/winbindd_group.c static void add_member(const char *domain, const char *user,
user               37 source3/winbindd/winbindd_group.c 		fill_domain_username(name, domain, user, True);
user               39 source3/winbindd/winbindd_group.c 		fstrcpy(name, user);
user              609 source3/winbindd/winbindd_pam.c 	parse_domain_user(state->request.data.auth.user, name_domain, name_user);
user              668 source3/winbindd/winbindd_pam.c 					    state->request.data.auth.user,
user              709 source3/winbindd/winbindd_pam.c 	if (!NT_STATUS_IS_OK(remove_ccache(state->request.data.auth.user))) {
user              712 source3/winbindd/winbindd_pam.c 			state->request.data.auth.user));
user              819 source3/winbindd/winbindd_pam.c 	state->request.data.auth.user
user              820 source3/winbindd/winbindd_pam.c 		[sizeof(state->request.data.auth.user)-1]='\0';
user              827 source3/winbindd/winbindd_pam.c 		  state->request.data.auth.user));
user              837 source3/winbindd/winbindd_pam.c 					       state->request.data.auth.user,
user              847 source3/winbindd/winbindd_pam.c 		fstrcpy(mapped_user, state->request.data.auth.user);
user              868 source3/winbindd/winbindd_pam.c 		  state->request.data.auth.user,
user              901 source3/winbindd/winbindd_pam.c 	parse_domain_user(state->request.data.auth.user, name_domain, name_user);
user             1047 source3/winbindd/winbindd_pam.c 							    state->request.data.auth.user,
user             1072 source3/winbindd/winbindd_pam.c 							state->request.data.auth.user,
user             1120 source3/winbindd/winbindd_pam.c 						state->request.data.auth.user,
user             1144 source3/winbindd/winbindd_pam.c 	parse_domain_user(state->request.data.auth.user, name_domain, name_user);
user             1151 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.user, name_domain, name_user, name_domain));
user             1166 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.user, name_domain, name_user, name_domain));
user             1227 source3/winbindd/winbindd_pam.c 	parse_domain_user(state->request.data.auth.user, name_domain, name_user);
user             1291 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.user, name_domain, name_user, name_domain));
user             1471 source3/winbindd/winbindd_pam.c 	state->request.data.auth.user[sizeof(state->request.data.auth.user)-1]='\0';
user             1477 source3/winbindd/winbindd_pam.c 		  state->request.data.auth.user));
user             1487 source3/winbindd/winbindd_pam.c 					       state->request.data.auth.user,
user             1496 source3/winbindd/winbindd_pam.c 		mapped_user = state->request.data.auth.user;
user             1501 source3/winbindd/winbindd_pam.c 	if ( mapped_user != state->request.data.auth.user ) {
user             1503 source3/winbindd/winbindd_pam.c 		safe_strcpy( state->request.data.auth.user, domain_user,
user             1504 source3/winbindd/winbindd_pam.c 			     sizeof(state->request.data.auth.user)-1 );
user             1652 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.user,
user             1665 source3/winbindd/winbindd_pam.c 			result = winbindd_add_memory_creds(state->request.data.auth.user,
user             1677 source3/winbindd/winbindd_pam.c 						      state->request.data.auth.user,
user             1683 source3/winbindd/winbindd_pam.c 					winbindd_delete_memory_creds(state->request.data.auth.user);
user             1728 source3/winbindd/winbindd_pam.c 	      state->request.data.auth.user,
user             1771 source3/winbindd/winbindd_pam.c 	state->request.data.auth_crap.user
user             1772 source3/winbindd/winbindd_pam.c 		[sizeof(state->request.data.auth_crap.user)-1]=0;
user             1779 source3/winbindd/winbindd_pam.c 		  state->request.data.auth_crap.user));
user             1801 source3/winbindd/winbindd_pam.c 		  state->request.data.auth_crap.user,
user             1828 source3/winbindd/winbindd_pam.c 	state->request.data.auth_crap.user[sizeof(state->request.data.auth_crap.user)-1]=0;
user             1836 source3/winbindd/winbindd_pam.c 	name_user = state->request.data.auth_crap.user;
user             1888 source3/winbindd/winbindd_pam.c 				  state->request.data.auth_crap.user, name_domain, name_user, name_domain));
user             1979 source3/winbindd/winbindd_pam.c 				  state->request.data.auth_crap.user,
user             2018 source3/winbindd/winbindd_pam.c 	fstring domain, user;
user             2024 source3/winbindd/winbindd_pam.c 		state->request.data.chauthtok.user));
user             2029 source3/winbindd/winbindd_pam.c 					 state->request.data.chauthtok.user,
user             2037 source3/winbindd/winbindd_pam.c 		fstrcpy(state->request.data.chauthtok.user, mapped_user);
user             2044 source3/winbindd/winbindd_pam.c 	if (!canonicalize_username(state->request.data.chauthtok.user, domain, user)) {
user             2048 source3/winbindd/winbindd_pam.c 			  state->request.data.auth.user,
user             2059 source3/winbindd/winbindd_pam.c 			  state->request.data.chauthtok.user, domain, user, domain));
user             2078 source3/winbindd/winbindd_pam.c 	fstring domain, user;
user             2081 source3/winbindd/winbindd_pam.c 		  state->request.data.auth.user));
user             2083 source3/winbindd/winbindd_pam.c 	if (!parse_domain_user(state->request.data.chauthtok.user, domain, user)) {
user             2105 source3/winbindd/winbindd_pam.c 					     user,
user             2137 source3/winbindd/winbindd_pam.c 		result = rpccli_samr_chgpasswd_user2(cli, state->mem_ctx, user, newpass, oldpass);
user             2152 source3/winbindd/winbindd_pam.c 		result = winbindd_replace_memory_creds(state->request.data.chauthtok.user,
user             2172 source3/winbindd/winbindd_pam.c 							 state->mem_ctx, user,
user             2215 source3/winbindd/winbindd_pam.c 	       user,
user             2225 source3/winbindd/winbindd_pam.c 	fstring name_domain, user;
user             2230 source3/winbindd/winbindd_pam.c 		state->request.data.logoff.user));
user             2233 source3/winbindd/winbindd_pam.c 	state->request.data.logoff.user
user             2234 source3/winbindd/winbindd_pam.c 		[sizeof(state->request.data.logoff.user)-1]='\0';
user             2243 source3/winbindd/winbindd_pam.c 	if (!canonicalize_username(state->request.data.logoff.user, name_domain, user)) {
user             2280 source3/winbindd/winbindd_pam.c 		  state->request.data.logoff.user,
user             2293 source3/winbindd/winbindd_pam.c 		state->request.data.logoff.user));
user             2315 source3/winbindd/winbindd_pam.c 	if (!ccache_entry_exists(state->request.data.logoff.user)) {
user             2321 source3/winbindd/winbindd_pam.c 	if (!ccache_entry_identical(state->request.data.logoff.user,
user             2328 source3/winbindd/winbindd_pam.c 	result = remove_ccache(state->request.data.logoff.user);
user             2341 source3/winbindd/winbindd_pam.c 	winbindd_delete_memory_creds(state->request.data.logoff.user);
user             2356 source3/winbindd/winbindd_pam.c 	state->request.data.chng_pswd_auth_crap.user[
user             2357 source3/winbindd/winbindd_pam.c 		sizeof(state->request.data.chng_pswd_auth_crap.user)-1]=0;
user             2364 source3/winbindd/winbindd_pam.c 		  state->request.data.chng_pswd_auth_crap.user));
user             2385 source3/winbindd/winbindd_pam.c 		  state->request.data.chng_pswd_auth_crap.user,
user             2399 source3/winbindd/winbindd_pam.c 	fstring  domain,user;
user             2405 source3/winbindd/winbindd_pam.c 	state->request.data.chng_pswd_auth_crap.user[
user             2406 source3/winbindd/winbindd_pam.c 		sizeof(state->request.data.chng_pswd_auth_crap.user)-1]=0;
user             2410 source3/winbindd/winbindd_pam.c 	*user = 0;
user             2415 source3/winbindd/winbindd_pam.c 		  state->request.data.chng_pswd_auth_crap.user));
user             2427 source3/winbindd/winbindd_pam.c 		parse_domain_user(state->request.data.chng_pswd_auth_crap.user,
user             2428 source3/winbindd/winbindd_pam.c 				  domain, user);
user             2433 source3/winbindd/winbindd_pam.c 				 state->request.data.chng_pswd_auth_crap.user));
user             2443 source3/winbindd/winbindd_pam.c 	if(!*user) {
user             2444 source3/winbindd/winbindd_pam.c 		fstrcpy(user, state->request.data.chng_pswd_auth_crap.user);
user             2448 source3/winbindd/winbindd_pam.c 		  (unsigned long)state->pid, domain, user));
user             2485 source3/winbindd/winbindd_pam.c 		cli, state->mem_ctx, user, new_nt_password, old_nt_hash_enc,
user             2494 source3/winbindd/winbindd_pam.c 	       domain, user,
user              263 source3/winbindd/winbindd_passdb.c 	struct samu *user;
user              265 source3/winbindd/winbindd_passdb.c 	if ( (user = samu_new(mem_ctx)) == NULL ) {
user              269 source3/winbindd/winbindd_passdb.c 	if ( !pdb_getsampwsid( user, user_sid ) ) {
user              270 source3/winbindd/winbindd_passdb.c 		TALLOC_FREE( user );
user              274 source3/winbindd/winbindd_passdb.c 	result = pdb_enum_group_memberships( mem_ctx, user, &groups, &gids, &ngroups );
user              276 source3/winbindd/winbindd_passdb.c 	TALLOC_FREE( user );
user              274 source3/winbindd/winbindd_proto.h 			      const char *user, 
user              280 source3/winbindd/winbindd_proto.h 				        const char *user,
user              289 source3/winbindd/winbindd_proto.h 				       const char *user,
user              558 source3/winbindd/winbindd_proto.h bool parse_domain_user(const char *domuser, fstring domain, fstring user);
user              560 source3/winbindd/winbindd_proto.h 			      char **domain, char **user);
user              562 source3/winbindd/winbindd_proto.h bool canonicalize_username(fstring username_inout, fstring domain, fstring user);
user              563 source3/winbindd/winbindd_proto.h void fill_domain_username(fstring name, const char *domain, const char *user, bool can_assume);
user              566 source3/winbindd/winbindd_proto.h 				  const char *user,
user              455 source3/winbindd/winbindd_rpc.c 	struct netr_SamInfo3 *user;
user              469 source3/winbindd/winbindd_rpc.c 	if ( (user = netsamlogon_cache_get( mem_ctx, user_sid )) != NULL ) 
user              475 source3/winbindd/winbindd_rpc.c 		sid_compose(&user_info->user_sid, &domain->sid, user->base.rid);
user              477 source3/winbindd/winbindd_rpc.c 			    user->base.primary_gid);
user              480 source3/winbindd/winbindd_rpc.c 						     user->base.account_name.string);
user              482 source3/winbindd/winbindd_rpc.c 						     user->base.full_name.string);
user              484 source3/winbindd/winbindd_rpc.c 		TALLOC_FREE(user);
user             1137 source3/winbindd/winbindd_util.c bool parse_domain_user(const char *domuser, fstring domain, fstring user)
user             1142 source3/winbindd/winbindd_util.c 		fstrcpy(user, domuser);
user             1148 source3/winbindd/winbindd_util.c 			user[PTR_DIFF(p, domuser)] = 0;
user             1153 source3/winbindd/winbindd_util.c 		fstrcpy(user, p+1);
user             1164 source3/winbindd/winbindd_util.c 			      char **domain, char **user)
user             1171 source3/winbindd/winbindd_util.c 	*user = talloc_strdup(mem_ctx, fstr_user);
user             1172 source3/winbindd/winbindd_util.c 	return ((*domain != NULL) && (*user != NULL));
user             1179 source3/winbindd/winbindd_util.c 	char *p, *user;
user             1181 source3/winbindd/winbindd_util.c 	user = domuser;
user             1192 source3/winbindd/winbindd_util.c 			user = p;
user             1197 source3/winbindd/winbindd_util.c 	safe_strcpy((char *)buf, user, *len);
user             1209 source3/winbindd/winbindd_util.c bool canonicalize_username(fstring username_inout, fstring domain, fstring user)
user             1211 source3/winbindd/winbindd_util.c 	if (!parse_domain_user(username_inout, domain, user)) {
user             1216 source3/winbindd/winbindd_util.c 		 user);
user             1234 source3/winbindd/winbindd_util.c void fill_domain_username(fstring name, const char *domain, const char *user, bool can_assume)
user             1238 source3/winbindd/winbindd_util.c 	fstrcpy(tmp_user, user);
user             1256 source3/winbindd/winbindd_util.c 				  const char *user,
user             1261 source3/winbindd/winbindd_util.c 	tmp_user = talloc_strdup(mem_ctx, user);
user               49 source4/auth/credentials/credentials_ntlm.c 	const char *user, *domain;
user               71 source4/auth/credentials/credentials_ntlm.c 	cli_credentials_get_ntlm_username_domain(cred, mem_ctx, &user, &domain);
user              114 source4/auth/credentials/credentials_ntlm.c 					   user, 
user               56 source4/auth/ntlm/auth_developer.c 	const char *user;
user               58 source4/auth/ntlm/auth_developer.c 	user = user_info->client.account_name;
user               60 source4/auth/ntlm/auth_developer.c 	if (strncasecmp("NT_STATUS", user, strlen("NT_STATUS")) == 0) {
user               61 source4/auth/ntlm/auth_developer.c 		nt_status = nt_status_string_to_code(user);
user               63 source4/auth/ntlm/auth_developer.c 		error_num = strtoul(user, NULL, 16);
user               64 source4/auth/ntlm/auth_developer.c 		DEBUG(5,("name_to_ntstatus_check_password: Error for user %s was 0x%08X\n", user, error_num));
user               93 source4/auth/ntlm/auth_developer.c 	server_info->account_name = talloc_asprintf(server_info, "NAME TO NTSTATUS %s ANONYMOUS LOGON", user);
user               99 source4/auth/ntlm/auth_developer.c 	server_info->full_name = talloc_asprintf(server_info, "NAME TO NTSTATUS %s Anonymous Logon", user);
user              313 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, bool allow_null_passwords, const char *user)
user              322 source4/auth/ntlm/auth_unix.c 	DEBUG(4,("smb_pam_auth: PAM: Authenticate User: %s\n", user));
user              327 source4/auth/ntlm/auth_unix.c 			DEBUG(2, ("smb_pam_auth: PAM: Authentication Error for user %s\n", user));
user              330 source4/auth/ntlm/auth_unix.c 			DEBUG(2, ("smb_pam_auth: PAM: Insufficient Credentials for user %s\n", user));
user              333 source4/auth/ntlm/auth_unix.c 			DEBUG(2, ("smb_pam_auth: PAM: Authentication Information Unavailable for user %s\n", user));
user              336 source4/auth/ntlm/auth_unix.c 			DEBUG(2, ("smb_pam_auth: PAM: Username %s NOT known to Authentication system\n", user));
user              339 source4/auth/ntlm/auth_unix.c 			DEBUG(2, ("smb_pam_auth: PAM: One or more authentication modules reports user limit for user %s exceeeded\n", user));
user              342 source4/auth/ntlm/auth_unix.c 			DEBUG(0, ("smb_pam_auth: PAM: One or more PAM modules failed to load for user %s\n", user));
user              345 source4/auth/ntlm/auth_unix.c 			DEBUG(4, ("smb_pam_auth: PAM: User %s Authenticated OK\n", user));
user              348 source4/auth/ntlm/auth_unix.c 			DEBUG(0, ("smb_pam_auth: PAM: UNKNOWN ERROR while authenticating user %s\n", user));
user              358 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user)
user              362 source4/auth/ntlm/auth_unix.c 	DEBUG(4,("smb_pam_account: PAM: Account Management for User: %s\n", user));
user              367 source4/auth/ntlm/auth_unix.c 			DEBUG(2, ("smb_pam_account: PAM: User %s is valid but password is expired\n", user));
user              370 source4/auth/ntlm/auth_unix.c 			DEBUG(2, ("smb_pam_account: PAM: User %s no longer permitted to access system\n", user));
user              373 source4/auth/ntlm/auth_unix.c 			DEBUG(2, ("smb_pam_account: PAM: There was an authentication error for user %s\n", user));
user              376 source4/auth/ntlm/auth_unix.c 			DEBUG(0, ("smb_pam_account: PAM: User %s is NOT permitted to access system at this time\n", user));
user              379 source4/auth/ntlm/auth_unix.c 			DEBUG(0, ("smb_pam_account: PAM: User \"%s\" is NOT known to account management\n", user));
user              382 source4/auth/ntlm/auth_unix.c 			DEBUG(4, ("smb_pam_account: PAM: Account OK for User: %s\n", user));
user              385 source4/auth/ntlm/auth_unix.c 			DEBUG(0, ("smb_pam_account: PAM: UNKNOWN PAM ERROR (%d) during Account Management for User: %s\n", pam_error, user));
user              396 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user)
user              405 source4/auth/ntlm/auth_unix.c 	DEBUG(4,("PAM: Account Management SetCredentials for User: %s\n", user));
user              410 source4/auth/ntlm/auth_unix.c 			DEBUG(0, ("smb_pam_setcred: PAM: Credentials not found for user:%s\n", user ));
user              413 source4/auth/ntlm/auth_unix.c 			DEBUG(0, ("smb_pam_setcred: PAM: Credentials for user: \"%s\" EXPIRED!\n", user ));
user              416 source4/auth/ntlm/auth_unix.c 			DEBUG(0, ("smb_pam_setcred: PAM: User: \"%s\" is NOT known so can not set credentials!\n", user ));
user              419 source4/auth/ntlm/auth_unix.c 			DEBUG(0, ("smb_pam_setcred: PAM: Unknown setcredentials error - unable to set credentials for %s\n", user ));
user              422 source4/auth/ntlm/auth_unix.c 			DEBUG(4, ("smb_pam_setcred: PAM: SetCredentials OK for User: %s\n", user));
user              425 source4/auth/ntlm/auth_unix.c 			DEBUG(0, ("smb_pam_setcred: PAM: UNKNOWN PAM ERROR (%d) during SetCredentials for User: %s\n", pam_error, user));
user              100 source4/auth/ntlm/auth_winbind.c 	safe_strcpy(request.data.auth_crap.user,
user               90 source4/auth/ntlm/ntlm_check.c 				 const char *user, const char *domain,
user              126 source4/auth/ntlm/ntlm_check.c 	if (!ntv2_owf_gen(part_passwd, user, domain, upper_case_domain, kr)) {
user              164 source4/auth/ntlm/ntlm_check.c 				const char *user, const char *domain,
user              196 source4/auth/ntlm/ntlm_check.c 	if (!ntv2_owf_gen(part_passwd, user, domain, upper_case_domain, kr)) {
user               95 source4/auth/ntlmssp/ntlmssp.h 	char *user;
user              117 source4/auth/ntlmssp/ntlmssp_client.c 	const char *user, *domain;
user              184 source4/auth/ntlmssp/ntlmssp_client.c 						 &user, &domain);
user              264 source4/auth/ntlmssp/ntlmssp_client.c 		       user, 
user               42 source4/auth/ntlmssp/ntlmssp_server.c static NTSTATUS ntlmssp_set_username(struct gensec_ntlmssp_state *gensec_ntlmssp_state, const char *user) 
user               44 source4/auth/ntlmssp/ntlmssp_server.c 	if (!user) {
user               49 source4/auth/ntlmssp/ntlmssp_server.c 	gensec_ntlmssp_state->user = talloc_strdup(gensec_ntlmssp_state, user);
user               50 source4/auth/ntlmssp/ntlmssp_server.c 	if (!gensec_ntlmssp_state->user) {
user              261 source4/auth/ntlmssp/ntlmssp_server.c 	char *user = NULL;
user              279 source4/auth/ntlmssp/ntlmssp_server.c 	gensec_ntlmssp_state->user = NULL;
user              291 source4/auth/ntlmssp/ntlmssp_server.c 			 &user, 
user              317 source4/auth/ntlmssp/ntlmssp_server.c 				 &user, 
user              335 source4/auth/ntlmssp/ntlmssp_server.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(gensec_ntlmssp_state, user))) {
user              348 source4/auth/ntlmssp/ntlmssp_server.c 		 gensec_ntlmssp_state->user, gensec_ntlmssp_state->domain, gensec_ntlmssp_state->workstation, (unsigned long)gensec_ntlmssp_state->lm_resp.length, (unsigned long)gensec_ntlmssp_state->nt_resp.length));
user              673 source4/auth/ntlmssp/ntlmssp_server.c 	user_info->client.account_name = gensec_ntlmssp_state->user;
user               48 source4/cldap_server/netlogon.c 					 const char *user,
user              244 source4/cldap_server/netlogon.c 	if (!user) {
user              245 source4/cldap_server/netlogon.c 		user = "";
user              251 source4/cldap_server/netlogon.c 	if (user[0]) {							\
user              265 source4/cldap_server/netlogon.c 					 ldb_binary_encode_string(mem_ctx, user),
user              269 source4/cldap_server/netlogon.c 				 user, acct_control, ldb_dn_get_linearized(dom_res->msgs[0]->dn),
user              345 source4/cldap_server/netlogon.c 		netlogon->data.nt5_ex.user_name    = user;
user              370 source4/cldap_server/netlogon.c 		netlogon->data.nt5.user_name    = user;
user              391 source4/cldap_server/netlogon.c 		netlogon->data.nt4.user_name   = user;
user              414 source4/cldap_server/netlogon.c 	const char *user = NULL;
user              455 source4/cldap_server/netlogon.c 			user = talloc_strndup(tmp_ctx, 
user              478 source4/cldap_server/netlogon.c 		 domain, host, user, version, domain_guid));
user              481 source4/cldap_server/netlogon.c 						 user, acct_control, src->addr, 
user              677 source4/dsdb/samdb/ldb_modules/password_hash.c 		DATA_BLOB *user;
user              763 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName,
user              767 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName_l,
user              771 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName_u,
user              775 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName,
user              779 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName,
user              783 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName_u,
user              787 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName_l,
user              794 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName,
user              798 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName_l,
user              802 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName_u,
user              806 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName,
user              810 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName,
user              814 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName_u,
user              818 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName_l,
user              825 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &userPrincipalName,
user              832 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &userPrincipalName_l,
user              835 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &userPrincipalName_u,
user              841 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName,
user              845 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName_l,
user              849 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &sAMAccountName_u,
user              859 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user 	= &sAMAccountName,
user              863 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user 	= &sAMAccountName_l,
user              867 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user 	= &sAMAccountName_u,
user              872 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &userPrincipalName,
user              876 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &userPrincipalName_l,
user              880 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user	= &userPrincipalName_u,
user              885 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user 	= &sAMAccountName,
user              890 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user 	= &sAMAccountName_l,
user              895 source4/dsdb/samdb/ldb_modules/password_hash.c 		.user 	= &sAMAccountName_u,
user              971 source4/dsdb/samdb/ldb_modules/password_hash.c 		MD5Update(&md5, wdigest[i].user->data, wdigest[i].user->length);
user              171 source4/heimdal/kdc/digest.c     hdb_entry_ex *user;
user              180 source4/heimdal/kdc/digest.c 			HDB_F_GET_CLIENT, &db, &user);
user              185 source4/heimdal/kdc/digest.c     ret = hdb_entry_get_password(context, db, &user->entry, password);
user              191 source4/heimdal/kdc/digest.c 	memset(user, 0, sizeof(*user));
user              193 source4/heimdal/kdc/digest.c     _kdc_free_ent (context, user);
user              220 source4/heimdal/kdc/digest.c     hdb_entry_ex *server = NULL, *user = NULL;
user              852 source4/heimdal/kdc/digest.c 				HDB_F_GET_CLIENT, NULL, &user);
user              861 source4/heimdal/kdc/digest.c 	    ret = hdb_enctype2key(context, &user->entry,
user             1127 source4/heimdal/kdc/digest.c 			    HDB_F_GET_CLIENT, NULL, &user);
user             1176 source4/heimdal/kdc/digest.c 	ret = hdb_enctype2key(context, &user->entry,
user             1439 source4/heimdal/kdc/digest.c     if (user)
user             1440 source4/heimdal/kdc/digest.c 	_kdc_free_ent (context, user);
user               45 source4/heimdal/lib/krb5/get_default_principal.c     const char *user = getenv("USER");
user               46 source4/heimdal/lib/krb5/get_default_principal.c     if(user == NULL)
user               47 source4/heimdal/lib/krb5/get_default_principal.c 	user = getenv("LOGNAME");
user               48 source4/heimdal/lib/krb5/get_default_principal.c     if(user == NULL)
user               49 source4/heimdal/lib/krb5/get_default_principal.c 	user = getenv("USERNAME");
user               50 source4/heimdal/lib/krb5/get_default_principal.c     return user;
user               64 source4/heimdal/lib/krb5/get_default_principal.c     const char *user;
user               71 source4/heimdal/lib/krb5/get_default_principal.c 	user = getlogin();
user               72 source4/heimdal/lib/krb5/get_default_principal.c 	if(user == NULL)
user               73 source4/heimdal/lib/krb5/get_default_principal.c 	    user = get_env_user();
user               74 source4/heimdal/lib/krb5/get_default_principal.c 	if(user != NULL && strcmp(user, "root") != 0)
user               75 source4/heimdal/lib/krb5/get_default_principal.c 	    ret = krb5_make_principal(context, princ, NULL, user, "root", NULL);
user               81 source4/heimdal/lib/krb5/get_default_principal.c 	    user = pw->pw_name;
user               83 source4/heimdal/lib/krb5/get_default_principal.c 	    user = get_env_user();
user               84 source4/heimdal/lib/krb5/get_default_principal.c 	    if(user == NULL)
user               85 source4/heimdal/lib/krb5/get_default_principal.c 		user = getlogin();
user               87 source4/heimdal/lib/krb5/get_default_principal.c 	if(user == NULL) {
user               93 source4/heimdal/lib/krb5/get_default_principal.c 	ret = krb5_make_principal(context, princ, NULL, user, NULL);
user              343 source4/lib/ldb/nssldb/ldb-grp.c NSS_STATUS _nss_ldb_initgroups_dyn(const char *user, gid_t group, long int *start, long int *size, gid_t **groups, long int limit, int *errnop)
user              363 source4/lib/ldb/nssldb/ldb-grp.c 	filter = talloc_asprintf(mem_res, _LDB_NSS_PWNAM_FILTER, user);
user             2575 source4/lib/wmi/wmi_wrap.c WERROR WBEM_ConnectServer(struct com_context *ctx, const char *server, const char *nspace, const char *user, const char *password, 
user              120 source4/libcli/auth/smbencrypt.c 	smb_ucs2_t *user;
user              155 source4/libcli/auth/smbencrypt.c 	ret = push_ucs2_talloc(mem_ctx, &user, user_in, &user_byte_len );
user              177 source4/libcli/auth/smbencrypt.c 	hmac_md5_update((const void *)user, user_byte_len, &ctx);
user              183 source4/libcli/auth/smbencrypt.c 	dump_data(100, (const void *)user, user_byte_len);
user              400 source4/libcli/auth/smbencrypt.c 			   const char *user, const char *domain, const uint8_t nt_hash[16],
user              412 source4/libcli/auth/smbencrypt.c 	if (!ntv2_owf_gen(nt_hash, user, domain, true, ntlm_v2_hash)) {
user              447 source4/libcli/auth/smbencrypt.c 		      const char *user, const char *domain, 
user              458 source4/libcli/auth/smbencrypt.c 				     user, domain, nt_hash, server_chal, names_blob,
user              536 source4/libcli/cldap/cldap.c 	if (io->in.user) {
user              537 source4/libcli/cldap/cldap.c 		filter = talloc_asprintf_append_buffer(filter, "(User=%s)", io->in.user);
user              159 source4/libcli/cldap/cldap.h 		const char *user;
user              100 source4/libcli/raw/clisession.c 		smbcli_req_append_string(req, parms->old.in.user, STR_TERMINATE);
user              120 source4/libcli/raw/clisession.c 		smbcli_req_append_string(req, parms->nt1.in.user, STR_TERMINATE);
user              315 source4/libcli/raw/interfaces.h 			const char *user;
user              341 source4/libcli/raw/interfaces.h 			const char *user;
user             2106 source4/libcli/raw/interfaces.h 				char *user;
user              287 source4/libcli/smb_composite/sesssetup.c 						 &state->setup.nt1.in.user,
user              356 source4/libcli/smb_composite/sesssetup.c 						 &state->setup.old.in.user,
user              745 source4/libnet/libnet_become_dc.c 	s->cldap.io.in.user		= NULL;
user               52 source4/libnet/libnet_samdump.c 	struct netr_DELTA_USER *user = delta->delta_union.user;
user               53 source4/libnet/libnet_samdump.c 	const char *username = user->account_name.string;
user               58 source4/libnet/libnet_samdump.c 					      user->lm_password_present ? &user->lmpassword : NULL, 
user               59 source4/libnet/libnet_samdump.c 					      user->acct_flags);
user               61 source4/libnet/libnet_samdump.c 					      user->nt_password_present ? &user->ntpassword : NULL, 
user               62 source4/libnet/libnet_samdump.c 					      user->acct_flags);
user               66 source4/libnet/libnet_samdump.c 	       smbpasswd_encode_acb_info(mem_ctx, user->acct_flags),
user               67 source4/libnet/libnet_samdump.c 	       (unsigned int)nt_time_to_unix(user->last_password_change));
user               37 source4/libnet/libnet_samdump_keytab.c 	struct netr_DELTA_USER *user = delta->delta_union.user;
user               38 source4/libnet/libnet_samdump_keytab.c 	const char *username = user->account_name.string;
user               42 source4/libnet/libnet_samdump_keytab.c 	if (!user->nt_password_present) {
user               57 source4/libnet/libnet_samdump_keytab.c 	cli_credentials_set_nt_hash(credentials, &user->ntpassword, CRED_SPECIFIED);
user               48 source4/libnet/libnet_samsync.c 	struct netr_DELTA_USER *user = delta->delta_union.user;
user               51 source4/libnet/libnet_samsync.c 	const char *username = user->account_name.string;
user               54 source4/libnet/libnet_samsync.c 		if (user->lm_password_present) {
user               55 source4/libnet/libnet_samsync.c 			sam_rid_crypt(rid, user->lmpassword.hash, lm_hash.hash, 0);
user               56 source4/libnet/libnet_samsync.c 			user->lmpassword = lm_hash;
user               59 source4/libnet/libnet_samsync.c 		if (user->nt_password_present) {
user               60 source4/libnet/libnet_samsync.c 			sam_rid_crypt(rid, user->ntpassword.hash, nt_hash.hash, 0);
user               61 source4/libnet/libnet_samsync.c 			user->ntpassword = nt_hash;
user               65 source4/libnet/libnet_samsync.c 	if (user->user_private_info.SensitiveData) {
user               69 source4/libnet/libnet_samsync.c 		data.data = user->user_private_info.SensitiveData;
user               70 source4/libnet/libnet_samsync.c 		data.length = user->user_private_info.DataLength;
user               72 source4/libnet/libnet_samsync.c 		user->user_private_info.SensitiveData = data.data;
user               73 source4/libnet/libnet_samsync.c 		user->user_private_info.DataLength = data.length;
user               85 source4/libnet/libnet_samsync.c 				user->lmpassword = lm_hash;
user               87 source4/libnet/libnet_samsync.c 				user->lmpassword = keys.keys.keys2.lmpassword.pwd;
user               89 source4/libnet/libnet_samsync.c 			user->lm_password_present = true;
user               94 source4/libnet/libnet_samsync.c 				user->ntpassword = nt_hash;
user               96 source4/libnet/libnet_samsync.c 				user->ntpassword = keys.keys.keys2.ntpassword.pwd;
user               98 source4/libnet/libnet_samsync.c 			user->nt_password_present = true;
user              242 source4/libnet/libnet_samsync_ldb.c 	struct netr_DELTA_USER *user = delta->delta_union.user;
user              318 source4/libnet/libnet_samsync_ldb.c 	cn_name   = talloc_strdup(mem_ctx, user->account_name.string);
user              323 source4/libnet/libnet_samsync_ldb.c 		if (user->field) {					\
user              325 source4/libnet/libnet_samsync_ldb.c 					       attrib, user->field);	\
user              350 source4/libnet/libnet_samsync_ldb.c 	if (samdb_msg_add_logon_hours(state->sam_ldb, mem_ctx, msg, "logonHours", &user->logon_hours) != 0) { 
user              361 source4/libnet/libnet_samsync_ldb.c 				     "userAccountControl", user->acct_flags) != 0) { 
user              371 source4/libnet/libnet_samsync_ldb.c 	if (user->lm_password_present) {
user              373 source4/libnet/libnet_samsync_ldb.c 				   "dBCSPwd", &user->lmpassword);
user              378 source4/libnet/libnet_samsync_ldb.c 	if (user->nt_password_present) {
user              380 source4/libnet/libnet_samsync_ldb.c 				   "unicodePwd", &user->ntpassword);
user              388 source4/libnet/libnet_samsync_ldb.c 	if (samdb_msg_add_parameters(state->sam_ldb, mem_ctx, msg, "userParameters", &user->parameters) != 0) {
user              409 source4/libnet/libnet_samsync_ldb.c 	acb = user->acct_flags;
user              264 source4/libnet/libnet_unbecome_dc.c 	s->cldap.io.in.user		= NULL;
user              500 source4/libnet/libnet_user.c 	struct samr_UserInfo21 *user;
user              506 source4/libnet/libnet_user.c 	user = &info->out.info.info21;
user              510 source4/libnet/libnet_user.c 	SET_FIELD_LSA_STRING(r->in, user, mod, account_name, USERMOD_FIELD_ACCOUNT_NAME);
user              513 source4/libnet/libnet_user.c 	SET_FIELD_LSA_STRING(r->in, user, mod, full_name, USERMOD_FIELD_FULL_NAME);
user              516 source4/libnet/libnet_user.c 	SET_FIELD_LSA_STRING(r->in, user, mod, description, USERMOD_FIELD_DESCRIPTION);
user              519 source4/libnet/libnet_user.c 	SET_FIELD_LSA_STRING(r->in, user, mod, comment, USERMOD_FIELD_COMMENT);
user              522 source4/libnet/libnet_user.c 	SET_FIELD_LSA_STRING(r->in, user, mod, home_directory, USERMOD_FIELD_HOME_DIRECTORY);
user              525 source4/libnet/libnet_user.c 	SET_FIELD_LSA_STRING(r->in, user, mod, home_drive, USERMOD_FIELD_HOME_DRIVE);
user              528 source4/libnet/libnet_user.c 	SET_FIELD_LSA_STRING(r->in, user, mod, logon_script, USERMOD_FIELD_LOGON_SCRIPT);
user              531 source4/libnet/libnet_user.c 	SET_FIELD_LSA_STRING(r->in, user, mod, profile_path, USERMOD_FIELD_PROFILE_PATH);
user              534 source4/libnet/libnet_user.c 	SET_FIELD_NTTIME(r->in, user, mod, acct_expiry, USERMOD_FIELD_ACCT_EXPIRY);
user              537 source4/libnet/libnet_user.c 	SET_FIELD_ACCT_FLAGS(r->in, user, mod, acct_flags, USERMOD_FIELD_ACCT_FLAGS);
user              143 source4/ntvfs/cifs/vfs_cifs.c 	const char *host, *user, *pass, *domain, *remote_share;
user              156 source4/ntvfs/cifs/vfs_cifs.c 	user = share_string_option(scfg, CIFS_USER, NULL);
user              178 source4/ntvfs/cifs/vfs_cifs.c 	if (user && pass) {
user              185 source4/ntvfs/cifs/vfs_cifs.c 		cli_credentials_set_username(credentials, user, CRED_SPECIFIED);
user              161 source4/ntvfs/smb2/vfs_smb2.c 	const char *host, *user, *pass, *domain, *remote_share;
user              174 source4/ntvfs/smb2/vfs_smb2.c 	user = share_string_option(scfg, SMB2_USER, NULL);
user              196 source4/ntvfs/smb2/vfs_smb2.c 	if (user && pass) {
user              203 source4/ntvfs/smb2/vfs_smb2.c 		cli_credentials_set_username(credentials, user, CRED_SPECIFIED);
user             1086 source4/param/loadparm.c 		 const char *user, const char *pszHomedir)
user             1103 source4/param/loadparm.c 		service->comment = talloc_asprintf(service, "Home directory of %s", user);
user             1109 source4/param/loadparm.c 		  pszHomename, user, service->szPath));
user              231 source4/param/param.h 		 const char *user, const char *pszHomedir);
user               44 source4/rpc_server/remote/dcesrv_remote.c 	const char *user, *pass, *domain;
user               63 source4/rpc_server/remote/dcesrv_remote.c 	user = lp_parm_string(dce_call->conn->dce_ctx->lp_ctx, NULL, "dcerpc_remote", "user");
user               73 source4/rpc_server/remote/dcesrv_remote.c 	if (user && pass) {
user               80 source4/rpc_server/remote/dcesrv_remote.c 		cli_credentials_set_username(credentials, user, CRED_SPECIFIED);
user             1379 source4/smb_server/smb/reply.c 		req_push_str(req, req->out.ptr+12, lpq->retq.out.queue[i].user, 16, STR_ASCII);
user             1892 source4/smb_server/smb/reply.c 	p += req_pull_string(&req->in.bufinfo, &io->old.in.user,   p, -1, STR_TERMINATE);
user             1942 source4/smb_server/smb/reply.c 	p += req_pull_string(&req->in.bufinfo, &io->nt1.in.user,   p, -1, STR_TERMINATE);
user              137 source4/smb_server/smb/sesssetup.c 	user_info->client.account_name = sess->old.in.user;
user              228 source4/smb_server/smb/sesssetup.c 		if (sess->nt1.in.user && *sess->nt1.in.user) {
user              263 source4/smb_server/smb/sesssetup.c 	user_info->client.account_name = sess->nt1.in.user;
user               67 source4/torture/ldap/cldap.c 	search.in.user         = "Administrator";
user               94 source4/torture/ldap/cldap.c 	search.in.user = NULL;
user              102 source4/torture/ldap/cldap.c 	search.in.user = "Administrator";
user              106 source4/torture/ldap/cldap.c 	CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user);
user              115 source4/torture/ldap/cldap.c 	search.in.user = NULL;
user              123 source4/torture/ldap/cldap.c 	search.in.user = "Administrator";
user              127 source4/torture/ldap/cldap.c 	CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user);
user              142 source4/torture/ldap/cldap.c 	search.in.user        = NULL;
user              165 source4/torture/ldap/cldap.c 	search.in.user = "Administrator";
user              173 source4/torture/ldap/cldap.c 	search.in.user = NULL;
user              183 source4/torture/ldap/cldap.c 	search.in.user = "Administrator";
user              187 source4/torture/ldap/cldap.c 	CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user);
user              190 source4/torture/ldap/cldap.c 	search.in.user = "___no_such_user___";
user              193 source4/torture/ldap/cldap.c 	CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user);
user              183 source4/torture/libnet/libnet_user.c  			    struct policy_handle *handle, const char* user)
user              192 source4/torture/libnet/libnet_user.c 	username.string = user;
user              207 source4/torture/libnet/libnet_user.c 			printf("User (%s) already exists - attempting to delete and recreate account again\n", user);
user               39 source4/torture/libnet/userinfo.c 	struct libnet_rpc_userinfo user;
user               44 source4/torture/libnet/userinfo.c 	user.in.domain_handle = *domain_handle;
user               45 source4/torture/libnet/userinfo.c 	user.in.sid           = dom_sid_string(mem_ctx, user_sid);
user               46 source4/torture/libnet/userinfo.c 	user.in.level         = level;       /* this should be extended */
user               49 source4/torture/libnet/userinfo.c 	status = libnet_rpc_userinfo(p, mem_ctx, &user);
user               55 source4/torture/libnet/userinfo.c 	ZERO_STRUCT(user);
user               57 source4/torture/libnet/userinfo.c 	user.in.domain_handle = *domain_handle;
user               58 source4/torture/libnet/userinfo.c 	user.in.sid           = NULL;
user               59 source4/torture/libnet/userinfo.c 	user.in.username      = TEST_USERNAME;
user               60 source4/torture/libnet/userinfo.c 	user.in.level         = level;
user               63 source4/torture/libnet/userinfo.c 	status = libnet_rpc_userinfo(p, mem_ctx, &user);
user               81 source4/torture/libnet/userinfo.c 	struct libnet_rpc_userinfo user;
user               86 source4/torture/libnet/userinfo.c 	user.in.domain_handle = *domain_handle;
user               87 source4/torture/libnet/userinfo.c 	user.in.sid           = dom_sid_string(mem_ctx, user_sid);
user               88 source4/torture/libnet/userinfo.c 	user.in.level         = level;       /* this should be extended */
user               92 source4/torture/libnet/userinfo.c 	c = libnet_rpc_userinfo_send(p, &user, msg_handler);
user               98 source4/torture/libnet/userinfo.c 	status = libnet_rpc_userinfo_recv(c, mem_ctx, &user);
user              104 source4/torture/libnet/userinfo.c 	ZERO_STRUCT(user);
user              106 source4/torture/libnet/userinfo.c 	user.in.domain_handle = *domain_handle;
user              107 source4/torture/libnet/userinfo.c 	user.in.sid           = NULL;
user              108 source4/torture/libnet/userinfo.c 	user.in.username      = TEST_USERNAME;
user              109 source4/torture/libnet/userinfo.c 	user.in.level         = level;
user              113 source4/torture/libnet/userinfo.c 	c = libnet_rpc_userinfo_send(p, &user, msg_handler);
user              119 source4/torture/libnet/userinfo.c 	status = libnet_rpc_userinfo_recv(c, mem_ctx, &user);
user               37 source4/torture/libnet/userman.c 	struct libnet_rpc_useradd user;
user               39 source4/torture/libnet/userman.c 	user.in.domain_handle = *domain_handle;
user               40 source4/torture/libnet/userman.c 	user.in.username      = name;
user               44 source4/torture/libnet/userman.c 	status = libnet_rpc_useradd(p, mem_ctx, &user);
user               59 source4/torture/libnet/userman.c 	struct libnet_rpc_useradd user;
user               61 source4/torture/libnet/userman.c 	user.in.domain_handle = *handle;
user               62 source4/torture/libnet/userman.c 	user.in.username      = username;
user               66 source4/torture/libnet/userman.c 	c = libnet_rpc_useradd_send(p, &user, msg_handler);
user               72 source4/torture/libnet/userman.c 	status = libnet_rpc_useradd_recv(c, mem_ctx, &user);
user              219 source4/torture/libnet/userman.c 	struct libnet_rpc_userdel user;
user              221 source4/torture/libnet/userman.c 	user.in.domain_handle = *handle;
user              222 source4/torture/libnet/userman.c 	user.in.username = username;
user              224 source4/torture/libnet/userman.c 	status = libnet_rpc_userdel(p, mem_ctx, &user);
user             2792 source4/torture/rpc/samba3rpc.c 	userlevel1.user = cli_credentials_get_username(cmdline_credentials);
user             5195 source4/torture/rpc/samr.c #define STRING_EQUAL_QUERY(s1, s2, user)					\
user             5200 source4/torture/rpc/samr.c 			       #s1, user.string,  s1.string, s2.string, __location__);   \
user             5203 source4/torture/rpc/samr.c #define INT_EQUAL_QUERY(s1, s2, user)		\
user             5206 source4/torture/rpc/samr.c 			       #s1, user.string, (unsigned long long)s1, (unsigned long long)s2, __location__); \
user              431 source4/torture/rpc/samsync.c 	struct netr_DELTA_USER *user = delta->delta_union.user;
user              438 source4/torture/rpc/samsync.c 	const char *username = user->account_name.string;
user              470 source4/torture/rpc/samsync.c 	TEST_SEC_DESC_EQUAL(user->sdbuf, samr, &user_handle);
user              504 source4/torture/rpc/samsync.c 	TEST_STRING_EQUAL(info->info21.account_name, user->account_name);
user              505 source4/torture/rpc/samsync.c 	TEST_STRING_EQUAL(info->info21.full_name, user->full_name);
user              506 source4/torture/rpc/samsync.c 	TEST_INT_EQUAL(info->info21.rid, user->rid);
user              507 source4/torture/rpc/samsync.c 	TEST_INT_EQUAL(info->info21.primary_gid, user->primary_gid);
user              508 source4/torture/rpc/samsync.c 	TEST_STRING_EQUAL(info->info21.home_directory, user->home_directory);
user              509 source4/torture/rpc/samsync.c 	TEST_STRING_EQUAL(info->info21.home_drive, user->home_drive);
user              510 source4/torture/rpc/samsync.c 	TEST_STRING_EQUAL(info->info21.logon_script, user->logon_script);
user              511 source4/torture/rpc/samsync.c 	TEST_STRING_EQUAL(info->info21.description, user->description);
user              512 source4/torture/rpc/samsync.c 	TEST_STRING_EQUAL(info->info21.workstations, user->workstations);
user              514 source4/torture/rpc/samsync.c 	TEST_TIME_EQUAL(info->info21.last_logon, user->last_logon);
user              515 source4/torture/rpc/samsync.c 	TEST_TIME_EQUAL(info->info21.last_logoff, user->last_logoff);
user              519 source4/torture/rpc/samsync.c 		       user->logon_hours.units_per_week);
user              521 source4/torture/rpc/samsync.c 		if (memcmp(info->info21.logon_hours.bits, user->logon_hours.bits,
user              529 source4/torture/rpc/samsync.c 		       user->bad_password_count);
user              531 source4/torture/rpc/samsync.c 		       user->logon_count);
user              534 source4/torture/rpc/samsync.c 		       user->last_password_change);
user              536 source4/torture/rpc/samsync.c 		       user->acct_expiry);
user              538 source4/torture/rpc/samsync.c 	TEST_INT_EQUAL((info->info21.acct_flags & ~ACB_PW_EXPIRED), user->acct_flags);
user              539 source4/torture/rpc/samsync.c 	if (user->acct_flags & ACB_PWNOEXP) {
user              554 source4/torture/rpc/samsync.c 	TEST_INT_EQUAL(info->info21.nt_password_set, user->nt_password_present);
user              555 source4/torture/rpc/samsync.c 	TEST_INT_EQUAL(info->info21.lm_password_set, user->lm_password_present);
user              556 source4/torture/rpc/samsync.c 	TEST_INT_EQUAL(info->info21.password_expired, user->password_expired);
user              558 source4/torture/rpc/samsync.c 	TEST_STRING_EQUAL(info->info21.comment, user->comment);
user              559 source4/torture/rpc/samsync.c 	TEST_BINARY_STRING_EQUAL(info->info21.parameters, user->parameters);
user              561 source4/torture/rpc/samsync.c 	TEST_INT_EQUAL(info->info21.country_code, user->country_code);
user              562 source4/torture/rpc/samsync.c 	TEST_INT_EQUAL(info->info21.code_page, user->code_page);
user              564 source4/torture/rpc/samsync.c 	TEST_STRING_EQUAL(info->info21.profile_path, user->profile_path);
user              566 source4/torture/rpc/samsync.c 	if (user->lm_password_present) {
user              567 source4/torture/rpc/samsync.c 		sam_rid_crypt(rid, user->lmpassword.hash, lm_hash.hash, 0);
user              570 source4/torture/rpc/samsync.c 	if (user->nt_password_present) {
user              571 source4/torture/rpc/samsync.c 		sam_rid_crypt(rid, user->ntpassword.hash, nt_hash.hash, 0);
user              575 source4/torture/rpc/samsync.c 	if (user->user_private_info.SensitiveData) {
user              579 source4/torture/rpc/samsync.c 		data.data = user->user_private_info.SensitiveData;
user              580 source4/torture/rpc/samsync.c 		data.length = user->user_private_info.DataLength;
user              619 source4/torture/rpc/samsync.c 		if (user->acct_flags & ACB_DISABLED) {
user              623 source4/torture/rpc/samsync.c 		if (user->acct_flags & ACB_WSTRUST) {
user              627 source4/torture/rpc/samsync.c 		if (user->acct_flags & ACB_SVRTRUST) {
user              631 source4/torture/rpc/samsync.c 		if (user->acct_flags & ACB_DOMTRUST) {
user              635 source4/torture/rpc/samsync.c 		if (user->acct_flags & ACB_DOMTRUST) {
user              639 source4/torture/rpc/samsync.c 		if (user->acct_flags & ACB_AUTOLOCK) {
user              654 source4/torture/rpc/samsync.c 		TEST_INT_EQUAL(user->rid, info3->base.rid);
user              655 source4/torture/rpc/samsync.c 		TEST_INT_EQUAL(user->primary_gid, info3->base.primary_gid);
user              658 source4/torture/rpc/samsync.c 			TEST_INT_EQUAL(user->acct_flags, info3->base.acct_flags);
user              662 source4/torture/rpc/samsync.c 			TEST_STRING_EQUAL(user->account_name, info3->base.account_name);
user              666 source4/torture/rpc/samsync.c 			TEST_STRING_EQUAL(user->full_name, info3->base.full_name);
user              668 source4/torture/rpc/samsync.c 		TEST_STRING_EQUAL(user->logon_script, info3->base.logon_script);
user              669 source4/torture/rpc/samsync.c 		TEST_STRING_EQUAL(user->profile_path, info3->base.profile_path);
user              670 source4/torture/rpc/samsync.c 		TEST_STRING_EQUAL(user->home_directory, info3->base.home_directory);
user              671 source4/torture/rpc/samsync.c 		TEST_STRING_EQUAL(user->home_drive, info3->base.home_drive);
user              672 source4/torture/rpc/samsync.c 		TEST_STRING_EQUAL(user->logon_script, info3->base.logon_script);
user              675 source4/torture/rpc/samsync.c 		TEST_TIME_EQUAL(user->last_logon, info3->base.last_logon);
user              676 source4/torture/rpc/samsync.c 		TEST_TIME_EQUAL(user->acct_expiry, info3->base.acct_expiry);
user              677 source4/torture/rpc/samsync.c 		TEST_TIME_EQUAL(user->last_password_change, info3->base.last_password_change);
user              686 source4/torture/rpc/samsync.c 		if (!((user->last_logoff == 0) 
user              688 source4/torture/rpc/samsync.c 			TEST_TIME_EQUAL(user->last_logoff, info3->base.last_logoff);
user             1754 source4/torture/rpc/spoolss.c 	userlevel1.user = "spottyfoot!";
user               64 source4/torture/rpc/spoolss_win.c 	ul_1.user			= "username";
user               89 source4/torture/rpc/spoolss_win.c 	ul_1.user			= "username";
user              156 source4/torture/rpc/srvsvc.c 	r.in.user = talloc_asprintf(tctx,"Administrator");
user              241 source4/torture/rpc/srvsvc.c 	r.in.user = talloc_asprintf(tctx,"%s","Administrator");
user              355 source4/torture/rpc/srvsvc.c 	r.in.user = NULL;
user              408 source4/torture/rpc/srvsvc.c 	r.in.user = NULL;
user              217 source4/torture/rpc/wkssvc.c 	const char *user = cli_credentials_get_username(creds);
user              231 source4/torture/rpc/wkssvc.c 		{ user, 0, WERR_INVALID_PARAM },
user              232 source4/torture/rpc/wkssvc.c 		{ user, 1, WERR_INVALID_PARAM },
user              233 source4/torture/rpc/wkssvc.c 		{ user, 1101, WERR_INVALID_PARAM },
user             1099 source4/torture/rpc/wkssvc.c 	const char *user = cli_credentials_get_username(creds);
user             1104 source4/torture/rpc/wkssvc.c 					user);
user             1127 source4/torture/rpc/wkssvc.c 	const char *user = cli_credentials_get_username(creds);
user             1132 source4/torture/rpc/wkssvc.c 					user);
user              861 source4/torture/winbind/struct_based.c 			      fstring user)
user              870 source4/torture/winbind/struct_based.c 			fstrcpy(user, domuser);
user              874 source4/torture/winbind/struct_based.c 		fstrcpy(user, domuser);
user              880 source4/torture/winbind/struct_based.c 	fstrcpy(user, p+1);
user              130 source4/utils/ntlm_auth.c 										char **user, char winbind_separator)
user              139 source4/utils/ntlm_auth.c 	*user = smb_xstrdup(p+1);
user              176 source4/utils/ntlm_auth.c static bool check_plaintext_auth(const char *user, const char *pass, 
user              254 source4/utils/ntlm_auth.c 	char *user, *pass;	
user              255 source4/utils/ntlm_auth.c 	user=buf;
user              267 source4/utils/ntlm_auth.c 		rfc1738_unescape(user);
user              271 source4/utils/ntlm_auth.c 	if (check_plaintext_auth(user, pass, false)) {
user             1162 source4/utils/ntlm_auth.c 		char *user;
user             1164 source4/utils/ntlm_auth.c 		asprintf(&user, "%s%c%s", opt_domain, *lp_winbind_separator(cmdline_lp_ctx), opt_username);
user             1165 source4/utils/ntlm_auth.c 		if (!check_plaintext_auth(user, opt_password, true)) {
user               64 source4/winbind/wb_pam_auth.c 						    const char *user,
user               91 source4/winbind/wb_pam_auth.c 	ninfo->identity_info.account_name.string =  talloc_strdup(state, user);
user              221 source4/winbind/wb_pam_auth.c 	const char *user, *domain;
user              240 source4/winbind/wb_pam_auth.c 						 &user, &domain);
user              259 source4/winbind/wb_pam_auth.c 					 domain, user, workstation,
user              509 source4/winbind/wb_samba3_cmd.c 		s3call->request.data.auth_crap.user,
user              576 source4/winbind/wb_samba3_cmd.c 	char *user, *domain;
user              579 source4/winbind/wb_samba3_cmd.c 				 s3call->request.data.auth.user,
user              580 source4/winbind/wb_samba3_cmd.c 				 &domain, &user)) {
user              590 source4/winbind/wb_samba3_cmd.c 	cli_credentials_set_username(credentials, user, CRED_SPECIFIED);
user               32 source4/winbind/wb_utils.c 				 char **domain, char **user)
user               44 source4/winbind/wb_utils.c 	*user = talloc_strdup(mem_ctx, domuser);
user               46 source4/winbind/wb_utils.c 	return ((*domain != NULL) && (*user != NULL));