user 45 examples/VFS/skel_opaque.c static int skel_connect(vfs_handle_struct *handle, const char *service, const char *user) user 39 examples/VFS/skel_transparent.c static int skel_connect(vfs_handle_struct *handle, const char *service, const char *user) user 41 examples/VFS/skel_transparent.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 78 examples/libsmbclient/testbrowse2.c char *user, int userlen, user 87 examples/libsmbclient/testbrowse2.c strncpy(user, username, userlen - 1); user[userlen - 1] = 0; user 41 examples/libsmbclient/testsmbc.c pji->user, user 50 examples/pdb/test.c static NTSTATUS testsam_getsampwent(struct pdb_methods *methods, struct samu *user) user 60 examples/pdb/test.c static NTSTATUS testsam_getsampwnam (struct pdb_methods *methods, struct samu *user, const char *sname) user 70 examples/pdb/test.c static NTSTATUS testsam_getsampwsid (struct pdb_methods *methods, struct samu *user, const DOM_SID *sid) user 90 examples/perfcounter/perf.h unsigned long long user; user 98 examples/perfcounter/perf_writer_cpu.c &data->cpuInfo.data[i].user, user 112 examples/perfcounter/perf_writer_cpu.c data->PerfTime100nSec += data->cpuInfo.data[i].user + user 156 examples/perfcounter/perf_writer_cpu.c data->cpuInfo.data[0].user, user 992 lib/nss_wrapper/nss_wrapper.c static int nwrap_files_initgroups(const char *user, gid_t group) user 998 lib/nss_wrapper/nss_wrapper.c _PUBLIC_ int nwrap_initgroups(const char *user, gid_t group) user 1001 lib/nss_wrapper/nss_wrapper.c return real_initgroups(user, group); user 1004 lib/nss_wrapper/nss_wrapper.c return nwrap_files_initgroups(user, group); user 48 lib/nss_wrapper/nss_wrapper.h int nwrap_initgroups(const char *user, gid_t group); user 163 librpc/gen_ndr/cli_srvsvc.c const char *user /* [in] [unique,charset(UTF16)] */, user 175 librpc/gen_ndr/cli_srvsvc.c r.in.user = user; user 221 librpc/gen_ndr/cli_srvsvc.c const char *user /* [in] [charset(UTF16)] */, user 232 librpc/gen_ndr/cli_srvsvc.c r.in.user = user; user 475 librpc/gen_ndr/cli_srvsvc.c const char *user /* [in] [unique,charset(UTF16)] */, user 488 librpc/gen_ndr/cli_srvsvc.c r.in.user = user; user 628 librpc/gen_ndr/cli_srvsvc.c const char *user /* [in] [unique,charset(UTF16)] */, user 641 librpc/gen_ndr/cli_srvsvc.c r.in.user = user; user 687 librpc/gen_ndr/cli_srvsvc.c const char *user /* [in] [unique,charset(UTF16)] */, user 696 librpc/gen_ndr/cli_srvsvc.c r.in.user = user; user 28 librpc/gen_ndr/cli_srvsvc.h const char *user /* [in] [unique,charset(UTF16)] */, user 38 librpc/gen_ndr/cli_srvsvc.h const char *user /* [in] [charset(UTF16)] */, user 74 librpc/gen_ndr/cli_srvsvc.h const char *user /* [in] [unique,charset(UTF16)] */, user 96 librpc/gen_ndr/cli_srvsvc.h const char *user /* [in] [unique,charset(UTF16)] */, user 106 librpc/gen_ndr/cli_srvsvc.h const char *user /* [in] [unique,charset(UTF16)] */, user 3996 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 4094 librpc/gen_ndr/ndr_netlogon.c if (r->user) { user 4095 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_DELTA_USER(ndr, NDR_SCALARS|NDR_BUFFERS, r->user)); user 4257 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->user); user 4259 librpc/gen_ndr/ndr_netlogon.c r->user = NULL; user 4438 librpc/gen_ndr/ndr_netlogon.c if (r->user) { user 4440 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 4441 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_DELTA_USER(ndr, NDR_SCALARS|NDR_BUFFERS, r->user)); user 4613 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "user", r->user); user 4615 librpc/gen_ndr/ndr_netlogon.c if (r->user) { user 4616 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_DELTA_USER(ndr, "user", r->user); user 6127 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 6187 librpc/gen_ndr/ndr_netlogon.c if (r->user) { user 6188 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 6190 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 6191 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 6272 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->user); user 6274 librpc/gen_ndr/ndr_netlogon.c r->user = NULL; user 6364 librpc/gen_ndr/ndr_netlogon.c if (r->user) { user 6366 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 6367 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user)); user 6368 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user)); user 6369 librpc/gen_ndr/ndr_netlogon.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) { user 6370 librpc/gen_ndr/ndr_netlogon.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user)); user 6372 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t))); user 6373 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16)); user 6440 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "user", r->user); user 6442 librpc/gen_ndr/ndr_netlogon.c if (r->user) { user 6443 librpc/gen_ndr/ndr_netlogon.c ndr_print_string(ndr, "user", r->user); user 17897 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 17910 librpc/gen_ndr/ndr_spoolss.c if (r->user) { user 17911 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 17913 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 17914 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 17937 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_ALLOC(ndr, r->user); user 17939 librpc/gen_ndr/ndr_spoolss.c r->user = NULL; user 17959 librpc/gen_ndr/ndr_spoolss.c if (r->user) { user 17961 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 17962 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user)); user 17963 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user)); user 17964 librpc/gen_ndr/ndr_spoolss.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) { user 17965 librpc/gen_ndr/ndr_spoolss.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user)); user 17967 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t))); user 17968 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16)); user 17986 librpc/gen_ndr/ndr_spoolss.c ndr_print_ptr(ndr, "user", r->user); user 17988 librpc/gen_ndr/ndr_spoolss.c if (r->user) { user 17989 librpc/gen_ndr/ndr_spoolss.c ndr_print_string(ndr, "user", r->user); user 18037 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 18051 librpc/gen_ndr/ndr_spoolss.c if (r->user) { user 18052 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 18054 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 18055 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 18080 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_ALLOC(ndr, r->user); user 18082 librpc/gen_ndr/ndr_spoolss.c r->user = NULL; user 18103 librpc/gen_ndr/ndr_spoolss.c if (r->user) { user 18105 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 18106 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user)); user 18107 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user)); user 18108 librpc/gen_ndr/ndr_spoolss.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) { user 18109 librpc/gen_ndr/ndr_spoolss.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user)); user 18111 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t))); user 18112 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16)); user 18132 librpc/gen_ndr/ndr_spoolss.c ndr_print_ptr(ndr, "user", r->user); user 18134 librpc/gen_ndr/ndr_spoolss.c if (r->user) { user 18135 librpc/gen_ndr/ndr_spoolss.c ndr_print_string(ndr, "user", r->user); user 160 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 170 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 171 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 173 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 174 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 197 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user); user 199 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL; user 216 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 218 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 219 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user)); user 220 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user)); user 221 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) { user 222 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user)); user 224 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t))); user 225 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16)); user 243 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user); user 245 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 246 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user); user 1420 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 1424 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 1425 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 1427 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 1428 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 1455 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user); user 1457 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL; user 1467 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 1469 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 1470 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user)); user 1471 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user)); user 1472 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) { user 1473 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user)); user 1475 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t))); user 1476 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16)); user 1504 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user); user 1506 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 1507 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user); user 1899 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 1908 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 1909 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 1911 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 1912 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 1937 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user); user 1939 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL; user 1955 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 1957 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 1958 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user)); user 1959 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user)); user 1960 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) { user 1961 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user)); user 1963 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t))); user 1964 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16)); user 1984 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user); user 1986 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 1987 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user); user 2544 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 2557 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 2558 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 2560 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 2561 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 2583 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user); user 2585 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL; user 2605 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 2607 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 2608 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user)); user 2609 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user)); user 2610 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) { user 2611 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user)); user 2613 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t))); user 2614 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16)); user 2631 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user); user 2633 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 2634 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user); user 2735 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 2749 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 2750 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 2752 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 2753 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 2783 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user); user 2785 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL; user 2811 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 2813 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 2814 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user)); user 2815 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user)); user 2816 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) { user 2817 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user)); user 2819 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t))); user 2820 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16)); user 2849 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user); user 2851 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 2852 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user); user 2959 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 2970 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 2971 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 2973 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 2974 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 2996 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user); user 2998 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL; user 3016 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 3018 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 3019 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user)); user 3020 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user)); user 3021 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) { user 3022 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user)); user 3024 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t))); user 3025 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16)); user 3042 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user); user 3044 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 3045 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user); user 3144 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user)); user 3159 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 3160 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 3162 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16))); user 3163 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 3201 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user); user 3203 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL; user 3235 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 3237 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0); user 3238 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user)); user 3239 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user)); user 3240 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) { user 3241 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user)); user 3243 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t))); user 3244 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16)); user 3285 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user); user 3287 librpc/gen_ndr/ndr_srvsvc.c if (r->user) { user 3288 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user); user 13564 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user)); user 13565 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 13566 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16))); user 13568 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16))); user 13569 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 13632 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.user); user 13634 librpc/gen_ndr/ndr_srvsvc.c r->in.user = NULL; user 13636 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 13638 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0); user 13639 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user)); user 13640 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user)); user 13641 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) { user 13642 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user)); user 13644 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t))); user 13645 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16)); user 13721 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->in.user); user 13723 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 13724 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->in.user); user 13777 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16))); user 13779 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16))); user 13780 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 13827 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user)); user 13828 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user)); user 13829 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) { user 13830 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user)); user 13832 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t))); user 13833 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16)); user 13869 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->in.user); user 14440 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user)); user 14441 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 14442 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16))); user 14444 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16))); user 14445 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 14528 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.user); user 14530 librpc/gen_ndr/ndr_srvsvc.c r->in.user = NULL; user 14532 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 14534 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0); user 14535 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user)); user 14536 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user)); user 14537 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) { user 14538 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user)); user 14540 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t))); user 14541 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16)); user 14623 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->in.user); user 14625 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 14626 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->in.user); user 14862 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user)); user 14863 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 14864 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16))); user 14866 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16))); user 14867 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 14950 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.user); user 14952 librpc/gen_ndr/ndr_srvsvc.c r->in.user = NULL; user 14954 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 14956 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0); user 14957 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user)); user 14958 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user)); user 14959 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) { user 14960 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user)); user 14962 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t))); user 14963 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16)); user 15045 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->in.user); user 15047 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 15048 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->in.user); user 15104 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user)); user 15105 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 15106 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16))); user 15108 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16))); user 15109 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16)); user 15165 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.user); user 15167 librpc/gen_ndr/ndr_srvsvc.c r->in.user = NULL; user 15169 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 15171 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0); user 15172 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user)); user 15173 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user)); user 15174 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) { user 15175 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user)); user 15177 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t))); user 15178 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16)); user 15210 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->in.user); user 15212 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) { user 15213 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->in.user); user 589 librpc/gen_ndr/netlogon.h struct netr_DELTA_USER *user;/* [unique,case(NETR_DELTA_USER)] */ user 716 librpc/gen_ndr/netlogon.h const char *user;/* [unique,charset(UTF16),case(NETLOGON_CONTROL_FIND_USER)] */ user 1515 librpc/gen_ndr/spoolss.h const char *user;/* [unique,charset(UTF16)] */ user 1531 librpc/gen_ndr/spoolss.h const char *user;/* [unique,charset(UTF16)] */ user 28 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 104 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 137 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 171 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 185 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 200 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 212 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 1099 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 1119 librpc/gen_ndr/srvsvc.h const char *user;/* [charset(UTF16)] */ user 1198 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 1246 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 1266 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */ user 352 nsswitch/libwbclient/wbc_pam.c snprintf(request.data.auth.user, user 353 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1, user 359 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.user, user 361 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1); user 402 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth_crap.user, user 404 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth_crap.user)-1); user 564 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.logoff.user, params->username, user 565 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.logoff.user)-1); user 642 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.logoff.user, username, user 643 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.logoff.user)-1); user 705 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.chauthtok.user, params->account_name, user 706 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.chauthtok.user) - 1); user 777 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.chng_pswd_auth_crap.user, user 779 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.chng_pswd_auth_crap.user) - 1); user 944 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.user, user 946 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1); user 241 nsswitch/nsstest.c static int nss_initgroups(char *user, gid_t group, gid_t **groups, long int *start, long int *size) user 250 nsswitch/nsstest.c status = _nss_initgroups(user, group, start, size, groups, 0, &nss_errno); user 714 nsswitch/pam_winbind.c const char *user, user 721 nsswitch/pam_winbind.c "(incorrect password or invalid membership)", user); user 726 nsswitch/pam_winbind.c user); user 731 nsswitch/pam_winbind.c user); user 736 nsswitch/pam_winbind.c "required", user); user 741 nsswitch/pam_winbind.c user); user 750 nsswitch/pam_winbind.c "user '%s' granted access", user); user 753 nsswitch/pam_winbind.c "user '%s' OK", user); user 760 nsswitch/pam_winbind.c _pam_error_code_str(retval), retval, user); user 1071 nsswitch/pam_winbind.c const char *user, user 1127 nsswitch/pam_winbind.c const char *user, user 1150 nsswitch/pam_winbind.c if (!winbind_name_to_sid_string(ctx, user, user 1183 nsswitch/pam_winbind.c if (!winbind_name_to_sid_string(ctx, user, search_location, user 1661 nsswitch/pam_winbind.c const char *user, user 1717 nsswitch/pam_winbind.c pwd = getpwnam(user); user 1754 nsswitch/pam_winbind.c if (!winbind_name_list_to_sid_string_list(ctx, user, member, user 1766 nsswitch/pam_winbind.c logon.username = user; user 1815 nsswitch/pam_winbind.c user, "wbcLogonUser"); user 1883 nsswitch/pam_winbind.c _pam_warn_logon_type(ctx, user, user_info->user_flags); user 1886 nsswitch/pam_winbind.c _pam_warn_krb5_failure(ctx, user, user_info->user_flags); user 1921 nsswitch/pam_winbind.c const char *user, user 1956 nsswitch/pam_winbind.c params.account_name = user; user 1964 nsswitch/pam_winbind.c user, "wbcChangeUserPasswordEx"); user 1968 nsswitch/pam_winbind.c "user '%s' password changed", user); user 2051 nsswitch/pam_winbind.c const char *user) user 2061 nsswitch/pam_winbind.c pwd = getpwnam(user); user 2066 nsswitch/pam_winbind.c wbc_status = wbcGetpwnam(user, &wb_pwd); user 2468 nsswitch/pam_winbind.c const char *user; user 2488 nsswitch/pam_winbind.c retval = pam_get_user(pamh, &user, _("Username: ")); user 2495 nsswitch/pam_winbind.c if (user == NULL) { user 2503 nsswitch/pam_winbind.c "username [%s] obtained", user); user 2511 nsswitch/pam_winbind.c pwd = getpwnam(user); user 2520 nsswitch/pam_winbind.c logoff.username = user; user 2556 nsswitch/pam_winbind.c user, "wbcLogoffUser"); user 2564 nsswitch/pam_winbind.c user, wbcErrorString(wbc_status)); user 2575 nsswitch/pam_winbind.c user, "wbcLogoffUser"); user 2960 nsswitch/pam_winbind.c const char *user) user 2986 nsswitch/pam_winbind.c pwd = getpwnam(user); user 3008 nsswitch/pam_winbind.c const char *user; user 3034 nsswitch/pam_winbind.c ret = pam_get_user(pamh, &user, _("Username: ")); user 3041 nsswitch/pam_winbind.c if (user == NULL) { user 3047 nsswitch/pam_winbind.c _pam_log_debug(ctx, LOG_DEBUG, "username [%s] obtained", user); user 3050 nsswitch/pam_winbind.c ret = valid_user(ctx, user); user 3073 nsswitch/pam_winbind.c Announce = talloc_asprintf(ctx, "%s %s", greeting, user); user 3097 nsswitch/pam_winbind.c ret = winbind_auth_request(ctx, user, pass_old, user 3194 nsswitch/pam_winbind.c ret = winbind_chauthtok_request(ctx, user, pass_old, user 3201 nsswitch/pam_winbind.c if (_pam_require_krb5_auth_after_chauthtok(ctx, user)) { user 3221 nsswitch/pam_winbind.c ret = winbind_auth_request(ctx, user, pass_new, user 107 nsswitch/wbinfo.c fstring user) user 116 nsswitch/wbinfo.c fstrcpy(user, domuser); user 120 nsswitch/wbinfo.c fstrcpy(user, domuser); user 125 nsswitch/wbinfo.c fstrcpy(user, p+1); user 160 nsswitch/wbinfo.c static bool wbinfo_get_userinfo(char *user) user 165 nsswitch/wbinfo.c wbc_status = wbcGetpwnam(user, &pwd); user 274 nsswitch/wbinfo.c static bool wbinfo_get_usergroups(const char *user) user 283 nsswitch/wbinfo.c wbc_status = wbcGetGroups(user, &num_groups, &groups); user 1195 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); user 1199 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); user 1405 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); user 1409 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); user 1511 nsswitch/wbinfo.c fstring user, domain; user 1515 nsswitch/wbinfo.c parse_wbinfo_domain_user(username, domain, user); user 1517 nsswitch/wbinfo.c p = strchr(user, '%'); user 1534 nsswitch/wbinfo.c if (user[0]) { user 1536 nsswitch/wbinfo.c if (!secrets_store(SECRETS_AUTH_USER, user, user 1537 nsswitch/wbinfo.c strlen(user) + 1)) { user 1572 nsswitch/wbinfo.c char *user, *domain, *password; user 1576 nsswitch/wbinfo.c secrets_fetch_ipc_userpass(&user, &domain, &password); user 1578 nsswitch/wbinfo.c if ((!user || !*user) && (!domain || !*domain ) && (!password || !*password)){ user 1580 nsswitch/wbinfo.c SAFE_FREE(user); user 1590 nsswitch/wbinfo.c user, password ? "%" : "", password ? password : ""); user 1592 nsswitch/wbinfo.c SAFE_FREE(user); user 108 nsswitch/wbinfo4.c fstring user) user 114 nsswitch/wbinfo4.c fstrcpy(user, domuser); user 119 nsswitch/wbinfo4.c fstrcpy(user, p+1); user 129 nsswitch/wbinfo4.c static bool wbinfo_get_userinfo(char *user) user 140 nsswitch/wbinfo4.c fstrcpy(request.data.username, user); user 246 nsswitch/wbinfo4.c static bool wbinfo_get_usergroups(char *user) user 258 nsswitch/wbinfo4.c fstrcpy(request.data.username, user); user 736 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); user 740 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); user 797 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); user 801 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); user 847 nsswitch/wbinfo4.c fstrcpy(request.data.auth_crap.user, name_user); user 343 nsswitch/winbind_nss_aix.c static char *wb_aix_getgrset(char *user) user 352 nsswitch/winbind_nss_aix.c char *r_user = user; user 354 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) { user 369 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) { user 860 nsswitch/winbind_nss_aix.c static int wb_aix_authenticate(char *user, char *pass, user 866 nsswitch/winbind_nss_aix.c char *r_user = user; user 868 nsswitch/winbind_nss_aix.c logit("authenticate '%s' response='%s'\n", user, pass); user 877 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) { user 884 nsswitch/winbind_nss_aix.c STRCPY_RET(request.data.auth.user, r_user); user 887 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) { user 895 nsswitch/winbind_nss_aix.c logit("auth result %d for '%s'\n", result, user); user 909 nsswitch/winbind_nss_aix.c static int wb_aix_chpass(char *user, char *oldpass, char *newpass, char **message) user 914 nsswitch/winbind_nss_aix.c char *r_user = user; user 916 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) { user 932 nsswitch/winbind_nss_aix.c STRCPY_RET(request.data.chauthtok.user, r_user); user 936 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) { user 956 nsswitch/winbind_nss_aix.c static int wb_aix_passwdrestrictions(char *user, char *newpass, char *oldpass, user 959 nsswitch/winbind_nss_aix.c logit("passwdresrictions called for '%s'\n", user); user 964 nsswitch/winbind_nss_aix.c static int wb_aix_passwdexpired(char *user, char **message) user 966 nsswitch/winbind_nss_aix.c logit("passwdexpired '%s'\n", user); user 975 nsswitch/winbind_nss_aix.c static char *wb_aix_getpasswd(char *user) user 977 nsswitch/winbind_nss_aix.c logit("getpasswd '%s'\n", user); user 57 nsswitch/winbind_nss_linux.c NSS_STATUS _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start, user 1023 nsswitch/winbind_nss_linux.c _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start, user 1034 nsswitch/winbind_nss_linux.c user, group); user 1044 nsswitch/winbind_nss_linux.c strncpy(request.data.username, user, user 1056 nsswitch/winbind_nss_linux.c user, num_gids); user 1070 nsswitch/winbind_nss_linux.c user, group, gid_list[i]); user 1119 nsswitch/winbind_nss_linux.c user, nss_err_str(ret), ret); user 63 nsswitch/winbind_nss_netbsd.c NSS_STATUS _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start, user 84 nsswitch/winbind_nss_solaris.h NSS_STATUS _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start, user 249 nsswitch/winbind_struct_protocol.h fstring user; user 258 nsswitch/winbind_struct_protocol.h fstring user; user 268 nsswitch/winbind_struct_protocol.h fstring user; user 273 nsswitch/winbind_struct_protocol.h fstring user; user 285 nsswitch/winbind_struct_protocol.h fstring user; user 316 nsswitch/winbind_struct_protocol.h fstring user; user 161 source3/auth/auth.c static bool check_domain_match(const char *user, const char *domain) user 173 source3/auth/auth.c DEBUG(1, ("check_domain_match: Attempt to connect as user %s from domain %s denied.\n", user, domain)); user 84 source3/auth/auth_builtin.c fstring user; user 86 source3/auth/auth_builtin.c fstrcpy(user, user_info->smb_name); user 88 source3/auth/auth_builtin.c if (strnequal("NT_STATUS", user, strlen("NT_STATUS"))) { user 89 source3/auth/auth_builtin.c strupper_m(user); user 90 source3/auth/auth_builtin.c return nt_status_string_to_code(user); user 93 source3/auth/auth_builtin.c strlower_m(user); user 94 source3/auth/auth_builtin.c error_num = strtoul(user, NULL, 16); user 96 source3/auth/auth_builtin.c DEBUG(5,("check_name_to_ntstatus_security: Error for user %s was %lx\n", user, error_num)); user 97 source3/auth/auth_ntlmssp.c sub_set_smb_name(auth_ntlmssp_state->ntlmssp_state->user); user 102 source3/auth/auth_ntlmssp.c auth_ntlmssp_state->ntlmssp_state->user, user 30 source3/auth/auth_unix.c static bool update_smbpassword_file(const char *user, const char *password) user 40 source3/auth/auth_unix.c ret = pdb_getsampwnam(sampass, user); user 416 source3/auth/pampass.c static struct pam_conv *smb_setup_pam_conv(smb_pam_conv_fn smb_pam_conv_fnptr, const char *user, user 428 source3/auth/pampass.c udp->PAM_username = user; user 462 source3/auth/pampass.c static bool smb_pam_start(pam_handle_t **pamh, const char *user, const char *rhost, struct pam_conv *pconv) user 472 source3/auth/pampass.c DEBUG(4,("smb_pam_start: PAM: Init user: %s\n", user)); user 474 source3/auth/pampass.c pam_error = pam_start("samba", user, pconv, pamh); user 506 source3/auth/pampass.c DEBUG(4,("smb_pam_start: PAM: Init passed for user: %s\n", user)); user 513 source3/auth/pampass.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, const char *user) user 523 source3/auth/pampass.c DEBUG(4,("smb_pam_auth: PAM: Authenticate User: %s\n", user)); user 527 source3/auth/pampass.c DEBUG(2, ("smb_pam_auth: PAM: Authentication Error for user %s\n", user)); user 530 source3/auth/pampass.c DEBUG(2, ("smb_pam_auth: PAM: Insufficient Credentials for user %s\n", user)); user 533 source3/auth/pampass.c DEBUG(2, ("smb_pam_auth: PAM: Authentication Information Unavailable for user %s\n", user)); user 536 source3/auth/pampass.c DEBUG(2, ("smb_pam_auth: PAM: Username %s NOT known to Authentication system\n", user)); user 539 source3/auth/pampass.c DEBUG(2, ("smb_pam_auth: PAM: One or more authentication modules reports user limit for user %s exceeeded\n", user)); user 542 source3/auth/pampass.c DEBUG(0, ("smb_pam_auth: PAM: One or more PAM modules failed to load for user %s\n", user)); user 545 source3/auth/pampass.c DEBUG(4, ("smb_pam_auth: PAM: User %s Authenticated OK\n", user)); user 548 source3/auth/pampass.c DEBUG(0, ("smb_pam_auth: PAM: UNKNOWN ERROR while authenticating user %s\n", user)); user 559 source3/auth/pampass.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user) user 564 source3/auth/pampass.c DEBUG(4,("smb_pam_account: PAM: Account Management for User: %s\n", user)); user 568 source3/auth/pampass.c DEBUG(2, ("smb_pam_account: PAM: User %s is valid but password is expired\n", user)); user 571 source3/auth/pampass.c DEBUG(2, ("smb_pam_account: PAM: User %s no longer permitted to access system\n", user)); user 574 source3/auth/pampass.c DEBUG(2, ("smb_pam_account: PAM: There was an authentication error for user %s\n", user)); user 577 source3/auth/pampass.c DEBUG(0, ("smb_pam_account: PAM: User %s is NOT permitted to access system at this time\n", user)); user 580 source3/auth/pampass.c DEBUG(0, ("smb_pam_account: PAM: User \"%s\" is NOT known to account management\n", user)); user 583 source3/auth/pampass.c DEBUG(4, ("smb_pam_account: PAM: Account OK for User: %s\n", user)); user 586 source3/auth/pampass.c DEBUG(0, ("smb_pam_account: PAM: UNKNOWN PAM ERROR (%d) during Account Management for User: %s\n", pam_error, user)); user 598 source3/auth/pampass.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user) user 608 source3/auth/pampass.c DEBUG(4,("PAM: Account Management SetCredentials for User: %s\n", user)); user 612 source3/auth/pampass.c DEBUG(0, ("smb_pam_setcred: PAM: Credentials not found for user:%s\n", user )); user 615 source3/auth/pampass.c DEBUG(0, ("smb_pam_setcred: PAM: Credentials for user: \"%s\" EXPIRED!\n", user )); user 618 source3/auth/pampass.c DEBUG(0, ("smb_pam_setcred: PAM: User: \"%s\" is NOT known so can not set credentials!\n", user )); user 621 source3/auth/pampass.c DEBUG(0, ("smb_pam_setcred: PAM: Unknown setcredentials error - unable to set credentials for %s\n", user )); user 624 source3/auth/pampass.c DEBUG(4, ("smb_pam_setcred: PAM: SetCredentials OK for User: %s\n", user)); user 627 source3/auth/pampass.c DEBUG(0, ("smb_pam_setcred: PAM: UNKNOWN PAM ERROR (%d) during SetCredentials for User: %s\n", pam_error, user)); user 638 source3/auth/pampass.c static bool smb_internal_pam_session(pam_handle_t *pamh, const char *user, const char *tty, bool flag) user 666 source3/auth/pampass.c static bool smb_pam_chauthtok(pam_handle_t *pamh, const char * user) user 670 source3/auth/pampass.c DEBUG(4,("smb_pam_chauthtok: PAM: Password Change for User: %s\n", user)); user 702 source3/auth/pampass.c DEBUG(4, ("PAM: Account OK for User: %s\n", user)); user 705 source3/auth/pampass.c DEBUG(0, ("PAM: UNKNOWN PAM ERROR (%d) for User: %s\n", pam_error, user)); user 720 source3/auth/pampass.c bool smb_pam_claim_session(char *user, char *tty, char *rhost) user 730 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, NULL, NULL)) == NULL) user 733 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, rhost, pconv)) user 736 source3/auth/pampass.c if (!smb_internal_pam_session(pamh, user, tty, True)) { user 748 source3/auth/pampass.c bool smb_pam_close_session(char *user, char *tty, char *rhost) user 758 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, NULL, NULL)) == NULL) user 761 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, rhost, pconv)) user 764 source3/auth/pampass.c if (!smb_internal_pam_session(pamh, user, tty, False)) { user 776 source3/auth/pampass.c NTSTATUS smb_pam_accountcheck(const char * user) user 787 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, NULL, NULL)) == NULL) user 790 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, NULL, pconv)) user 793 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) user 794 source3/auth/pampass.c DEBUG(0, ("smb_pam_accountcheck: PAM: Account Validation Failed - Rejecting User %s!\n", user)); user 804 source3/auth/pampass.c NTSTATUS smb_pam_passcheck(const char * user, const char * password) user 816 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, password, NULL)) == NULL) user 819 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, NULL, pconv)) user 822 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_auth(pamh, user))) { user 823 source3/auth/pampass.c DEBUG(0, ("smb_pam_passcheck: PAM: smb_pam_auth failed - Rejecting User %s !\n", user)); user 828 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) { user 829 source3/auth/pampass.c DEBUG(0, ("smb_pam_passcheck: PAM: smb_pam_account failed - Rejecting User %s !\n", user)); user 834 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_setcred(pamh, user))) { user 835 source3/auth/pampass.c DEBUG(0, ("smb_pam_passcheck: PAM: smb_pam_setcred failed - Rejecting User %s !\n", user)); user 848 source3/auth/pampass.c bool smb_pam_passchange(const char * user, const char * oldpassword, const char * newpassword) user 854 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_passchange_conv, user, oldpassword, newpassword)) == NULL) user 857 source3/auth/pampass.c if(!smb_pam_start(&pamh, user, NULL, pconv)) user 860 source3/auth/pampass.c if (!smb_pam_chauthtok(pamh, user)) { user 861 source3/auth/pampass.c DEBUG(0, ("smb_pam_passchange: PAM: Password Change Failed for user %s!\n", user)); user 872 source3/auth/pampass.c NTSTATUS smb_pam_accountcheck(const char * user) user 878 source3/auth/pampass.c bool smb_pam_claim_session(char *user, char *tty, char *rhost) user 94 source3/auth/pass_check.c static bool afs_auth(char *user, char *password) user 103 source3/auth/pass_check.c (KA_USERAUTH_VERSION + KA_USERAUTH_DOSETPAG, user, (char *)0, /* instance */ user 113 source3/auth/pass_check.c ("AFS authentication for \"%s\" failed (%s)\n", user, reason)); user 143 source3/auth/pass_check.c static bool dfs_auth(char *user, char *password) user 259 source3/auth/pass_check.c if (sec_login_setup_identity((unsigned char *)user, user 265 source3/auth/pass_check.c user, dce_errstr)); user 302 source3/auth/pass_check.c if (sec_login_setup_identity((unsigned char *)user, user 308 source3/auth/pass_check.c user, dce_errstr)); user 334 source3/auth/pass_check.c user, dce_errstr)); user 357 source3/auth/pass_check.c user, dce_errstr)); user 373 source3/auth/pass_check.c user, sys_getpid())); user 650 source3/auth/pass_check.c NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, user 659 source3/auth/pass_check.c DEBUG(100, ("checking user=[%s] pass=[%s]\n", user, password)); user 675 source3/auth/pass_check.c if (set_this_user(user) == NULL) { user 679 source3/auth/pass_check.c DEBUG(4, ("pass_check: Checking (PAM) password for user %s (l=%d)\n", user, pwlen)); user 683 source3/auth/pass_check.c DEBUG(4, ("pass_check: Checking password for user %s (l=%d)\n", user, pwlen)); user 686 source3/auth/pass_check.c DEBUG(3, ("Couldn't find user %s\n", user)); user 759 source3/auth/pass_check.c user)); user 760 source3/auth/pass_check.c mypasswd = getprpwnam(user); user 771 source3/auth/pass_check.c user)); user 824 source3/auth/pass_check.c fn(user, password); user 854 source3/auth/pass_check.c fn(user, pass2); user 869 source3/auth/pass_check.c fn(user, pass2); user 2252 source3/client/client.c char *user = NULL; user 2260 source3/client/client.c if (!next_token_talloc(ctx, &cmd_ptr,&user,NULL)) { user 2271 source3/client/client.c user, user 386 source3/client/mount.cifs.c char user[32]; user 397 source3/client/mount.cifs.c snprintf(user,sizeof(user),"%u",getuid()); user 594 source3/client/mount.cifs.c snprintf(user, sizeof(user), "%u", pw->pw_uid); user 596 source3/client/mount.cifs.c strlcpy(user,value,sizeof(user)); user 727 source3/client/mount.cifs.c word_len = strlen(user); user 739 source3/client/mount.cifs.c snprintf(out + out_len, word_len + 5, "uid=%s", user); user 46 source3/include/ads_protos.h const char *user); user 44 source3/include/client.h fstring user; user 263 source3/include/libsmb_internal.h const char * user); user 225 source3/include/libsmbclient.h char user[128]; user 490 source3/include/libsmbclient.h smbc_setUser(SMBCCTX *c, char * user); user 2681 source3/include/libsmbclient.h const char *user, user 2696 source3/include/libsmbclient.h const char *user, user 2746 source3/include/libsmbclient.h char * user DEPRECATED_SMBC_INTERFACE; user 451 source3/include/nt_printing.h fstring user; user 87 source3/include/ntlmssp.h char *user; user 279 source3/include/passdb.h struct samu *user, user 285 source3/include/passdb.h struct samu *user); user 41 source3/include/printing.h fstring user; /* the user who started the job */ user 159 source3/include/proto.h bool smb_pam_claim_session(char *user, char *tty, char *rhost); user 160 source3/include/proto.h bool smb_pam_close_session(char *user, char *tty, char *rhost); user 161 source3/include/proto.h NTSTATUS smb_pam_accountcheck(const char * user); user 162 source3/include/proto.h NTSTATUS smb_pam_passcheck(const char * user, const char * password); user 163 source3/include/proto.h bool smb_pam_passchange(const char * user, const char * oldpassword, const char * newpassword); user 164 source3/include/proto.h NTSTATUS smb_pam_accountcheck(const char * user); user 165 source3/include/proto.h bool smb_pam_claim_session(char *user, char *tty, char *rhost); user 171 source3/include/proto.h NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password, user 796 source3/include/proto.h const char *servicename, const char *user, user 800 source3/include/proto.h void standard_sub_advanced(const char *servicename, const char *user, user 994 source3/include/proto.h bool getgroups_unix_user(TALLOC_CTX *mem_ctx, const char *user, user 1065 source3/include/proto.h char *get_user_home_dir(TALLOC_CTX *mem_ctx, const char *user); user 1066 source3/include/proto.h struct passwd *Get_Pwnam_alloc(TALLOC_CTX *mem_ctx, const char *user); user 1212 source3/include/proto.h char **user); user 1931 source3/include/proto.h ADS_STATUS ads_add_user_acct(ADS_STRUCT *ads, const char *user, user 2289 source3/include/proto.h ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user, user 2294 source3/include/proto.h const char *user, user 2334 source3/include/proto.h const char *user, const char *domain, user 2584 source3/include/proto.h const char *user, user 2656 source3/include/proto.h bool cli_NetWkstaUserLogon(struct cli_state *cli,char *user, char *workstation); user 2661 source3/include/proto.h bool cli_oem_change_password(struct cli_state *cli, const char *user, const char *new_password, user 2720 source3/include/proto.h int cli_NetFileEnum(struct cli_state *cli, const char * user, user 2732 source3/include/proto.h bool cli_NetWkstaUserLogoff(struct cli_state *cli, const char *user, const char *workstation); user 3105 source3/include/proto.h NTSTATUS ntlmssp_set_username(NTLMSSP_STATE *ntlmssp_state, const char *user) ; user 3253 source3/include/proto.h bool SMBNTLMv2encrypt_hash(const char *user, const char *domain, const uchar nt_hash[16], user 3258 source3/include/proto.h bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, user 4247 source3/include/proto.h const char *user, const char *pszHomedir); user 4410 source3/include/proto.h NTSTATUS samu_set_unix(struct samu *user, const struct passwd *pwd); user 4411 source3/include/proto.h NTSTATUS samu_alloc_rid_unix(struct samu *user, const struct passwd *pwd); user 4546 source3/include/proto.h bool guest_user_info( struct samu *user ); user 4571 source3/include/proto.h NTSTATUS pdb_enum_group_memberships(TALLOC_CTX *mem_ctx, struct samu *user, user 4574 source3/include/proto.h NTSTATUS pdb_set_unix_primary_group(TALLOC_CTX *mem_ctx, struct samu *user); user 4634 source3/include/proto.h const char *user, user 6178 source3/include/proto.h bool check_lanman_password(char *user, uchar * pass1, user 6181 source3/include/proto.h NTSTATUS pass_oem_change(char *user, user 6475 source3/include/proto.h bool map_username(fstring user); user 6725 source3/include/proto.h void add_session_user(const char *user); user 6728 source3/include/proto.h bool user_in_netgroup(const char *user, const char *ngname); user 6729 source3/include/proto.h bool user_in_list(const char *user,const char **list); user 6730 source3/include/proto.h bool authorise_login(int snum, fstring user, DATA_BLOB password, user 41 source3/include/smb_perfcount.h const char *user, const char *domain); user 207 source3/include/smbldap.h const char *user, user 304 source3/include/vfs.h int (*connect_fn)(struct vfs_handle_struct *handle, const char *service, const char *user); user 30 source3/include/vfs_macros.h #define SMB_VFS_CONNECT(conn, service, user) ((conn)->vfs.ops.connect_fn((conn)->vfs.handles.connect_hnd, (service), (user))) user 164 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_CONNECT(conn, service, user) ((conn)->vfs_opaque.ops.connect_fn((conn)->vfs_opaque.handles.connect_hnd, (service), (user))) user 298 source3/include/vfs_macros.h #define SMB_VFS_NEXT_CONNECT(handle, service, user) ((handle)->vfs_next.ops.connect_fn((handle)->vfs_next.handles.connect_hnd, (service), (user))) user 318 source3/lib/ldb/nssldb/ldb-grp.c NSS_STATUS _nss_ldb_initgroups_dyn(const char *user, gid_t group, long int *start, long int *size, gid_t **groups, long int limit, int *errnop) user 341 source3/lib/ldb/nssldb/ldb-grp.c _LDB_NSS_PWNAM_FILTER, user); user 40 source3/lib/netapi/examples/user/user_dispinfo.c struct NET_DISPLAY_USER *user; user 79 source3/lib/netapi/examples/user/user_dispinfo.c user = (struct NET_DISPLAY_USER *)buffer; user 82 source3/lib/netapi/examples/user/user_dispinfo.c user->usri1_name); user 83 source3/lib/netapi/examples/user/user_dispinfo.c user++; user 91 source3/lib/netapi/file.c i3.fi3_username = talloc_strdup(mem_ctx, info->info3->user); user 42 source3/lib/netapi/tests/netdisplay.c struct NET_DISPLAY_USER *user; user 59 source3/lib/netapi/tests/netdisplay.c user = (struct NET_DISPLAY_USER *)buffer; user 75 source3/lib/netapi/tests/netdisplay.c current_name = user->usri1_name; user 93 source3/lib/netapi/tests/netdisplay.c user++; user 1330 source3/lib/netapi/user.c struct NET_DISPLAY_USER *user = NULL; user 1333 source3/lib/netapi/user.c user = TALLOC_ZERO_ARRAY(mem_ctx, user 1336 source3/lib/netapi/user.c W_ERROR_HAVE_NO_MEMORY(user); user 1339 source3/lib/netapi/user.c user[i].usri1_name = talloc_strdup(mem_ctx, user 1341 source3/lib/netapi/user.c user[i].usri1_comment = talloc_strdup(mem_ctx, user 1343 source3/lib/netapi/user.c user[i].usri1_flags = user 1345 source3/lib/netapi/user.c user[i].usri1_full_name = talloc_strdup(mem_ctx, user 1347 source3/lib/netapi/user.c user[i].usri1_user_id = user 1349 source3/lib/netapi/user.c user[i].usri1_next_index = user 1352 source3/lib/netapi/user.c if (!user[i].usri1_name) { user 1357 source3/lib/netapi/user.c *buffer = talloc_memdup(mem_ctx, user, user 792 source3/lib/substitute.c static char *alloc_sub_advanced(const char *servicename, const char *user, user 812 source3/lib/substitute.c a_string = realloc_string_sub(a_string, "%N", automount_server(user)); user 816 source3/lib/substitute.c if ((h = get_user_home_dir(talloc_tos(), user))) user 831 source3/lib/substitute.c a_string = realloc_string_sub(a_string, "%u", user); user 867 source3/lib/substitute.c const char *servicename, const char *user, user 874 source3/lib/substitute.c if (!(a = alloc_sub_advanced(servicename, user, connectpath, gid, user 884 source3/lib/substitute.c void standard_sub_advanced(const char *servicename, const char *user, user 891 source3/lib/substitute.c s = alloc_sub_advanced(servicename, user, connectpath, user 40 source3/lib/system_smbd.c static int getgrouplist_internals(const char *user, gid_t gid, gid_t *groups, user 71 source3/lib/system_smbd.c if (initgroups(user, gid) != 0) { user 117 source3/lib/system_smbd.c static int sys_getgrouplist(const char *user, gid_t gid, gid_t *groups, int *grpcnt) user 122 source3/lib/system_smbd.c DEBUG(10,("sys_getgrouplist: user [%s]\n", user)); user 131 source3/lib/system_smbd.c retval = getgrouplist(user, gid, groups, grpcnt); user 134 source3/lib/system_smbd.c retval = getgrouplist_internals(user, gid, groups, grpcnt); user 146 source3/lib/system_smbd.c bool getgroups_unix_user(TALLOC_CTX *mem_ctx, const char *user, user 162 source3/lib/system_smbd.c if (sys_getgrouplist(user, primary_gid, temp_groups, &max_grp) == -1) { user 168 source3/lib/system_smbd.c if (sys_getgrouplist(user, primary_gid, user 35 source3/lib/username.c char *get_user_home_dir(TALLOC_CTX *mem_ctx, const char *user) user 42 source3/lib/username.c pass = Get_Pwnam_alloc(mem_ctx, user); user 64 source3/lib/username.c const char *user, char *user2) user 71 source3/lib/username.c if (!user || !(*user)) user 83 source3/lib/username.c if(strcmp(user, user2) != 0) { user 85 source3/lib/username.c user)); user 86 source3/lib/username.c ret = getpwnam_alloc(mem_ctx, user); user 93 source3/lib/username.c if(strcmp(user, user2) != 0) { user 110 source3/lib/username.c "did":"didn't", user)); user 121 source3/lib/username.c struct passwd *Get_Pwnam_alloc(TALLOC_CTX *mem_ctx, const char *user) user 126 source3/lib/username.c if ( *user == '\0' ) { user 131 source3/lib/username.c fstrcpy(user2, user); user 133 source3/lib/username.c DEBUG(5,("Finding user %s\n", user)); user 135 source3/lib/username.c ret = Get_Pwnam_internals(mem_ctx, user, user2); user 2944 source3/lib/util.c char **user) user 2953 source3/lib/util.c *user = talloc_strdup(mem_ctx, p+1); user 2956 source3/lib/util.c *user = talloc_strdup(mem_ctx, full_name); user 28 source3/libads/ldap_user.c const char *user) user 33 source3/libads/ldap_user.c char *escaped_user = escape_ldap_string_alloc(user); user 48 source3/libads/ldap_user.c ADS_STATUS ads_add_user_acct(ADS_STRUCT *ads, const char *user, user 60 source3/libads/ldap_user.c else name = user; user 67 source3/libads/ldap_user.c if (!(upn = talloc_asprintf(ctx, "%s@%s", user, ads->config.realm))) user 84 source3/libads/ldap_user.c ads_mod_str(ctx, &mods, "sAMAccountName", user); user 648 source3/libnet/libnet_join.c const char *user, user 667 source3/libnet/libnet_join.c user, user 41 source3/libnet/libnet_samsync.c struct netr_DELTA_USER *user = delta->delta_union.user; user 51 source3/libnet/libnet_samsync.c if (user->lm_password_present) { user 52 source3/libnet/libnet_samsync.c if (memcmp(user->lmpassword.hash, zero_buf, 16) != 0) { user 53 source3/libnet/libnet_samsync.c sam_pwd_hash(rid, user->lmpassword.hash, lm_hash.hash, 0); user 57 source3/libnet/libnet_samsync.c user->lmpassword = lm_hash; user 60 source3/libnet/libnet_samsync.c if (user->nt_password_present) { user 61 source3/libnet/libnet_samsync.c if (memcmp(user->ntpassword.hash, zero_buf, 16) != 0) { user 62 source3/libnet/libnet_samsync.c sam_pwd_hash(rid, user->ntpassword.hash, nt_hash.hash, 0); user 66 source3/libnet/libnet_samsync.c user->ntpassword = nt_hash; user 69 source3/libnet/libnet_samsync.c if (user->user_private_info.SensitiveData) { user 73 source3/libnet/libnet_samsync.c data.data = user->user_private_info.SensitiveData; user 74 source3/libnet/libnet_samsync.c data.length = user->user_private_info.DataLength; user 76 source3/libnet/libnet_samsync.c user->user_private_info.SensitiveData = data.data; user 77 source3/libnet/libnet_samsync.c user->user_private_info.DataLength = data.length; user 98 source3/libnet/libnet_samsync.c user->lmpassword = lm_hash; user 99 source3/libnet/libnet_samsync.c user->lm_password_present = true; user 110 source3/libnet/libnet_samsync.c user->ntpassword = nt_hash; user 111 source3/libnet/libnet_samsync.c user->nt_password_present = true; user 185 source3/libnet/libnet_samsync_display.c display_account_info(id.rid, u.user); user 192 source3/libnet/libnet_samsync_keytab.c r->delta_enum[i].delta_union.user, user 1114 source3/libnet/libnet_samsync_ldif.c u.user, user 677 source3/libnet/libnet_samsync_passdb.c r->delta_union.user); user 58 source3/libsmb/cliconnect.c const char *user, user 115 source3/libsmb/cliconnect.c p += clistr_push(cli, p, user, -1, STR_TERMINATE|STR_UPPER); user 133 source3/libsmb/cliconnect.c status = cli_set_username(cli, user); user 294 source3/libsmb/cliconnect.c const char *user, const char *pass, user 336 source3/libsmb/cliconnect.c p += clistr_push(cli, p, user, -1, STR_TERMINATE); /* username */ user 360 source3/libsmb/cliconnect.c status = cli_set_username(cli, user); user 381 source3/libsmb/cliconnect.c static NTSTATUS cli_session_setup_nt1(struct cli_state *cli, const char *user, user 408 source3/libsmb/cliconnect.c if (!SMBNTLMv2encrypt(user, workgroup, pass, &server_chal, user 482 source3/libsmb/cliconnect.c p += clistr_push(cli, p, user, -1, STR_TERMINATE); user 533 source3/libsmb/cliconnect.c result = cli_set_username(cli, user); user 799 source3/libsmb/cliconnect.c static NTSTATUS cli_session_setup_ntlmssp(struct cli_state *cli, const char *user, user 817 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) { user 927 source3/libsmb/cliconnect.c ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user, user 976 source3/libsmb/cliconnect.c status = cli_set_username(cli, user); user 992 source3/libsmb/cliconnect.c ret = kerberos_kinit_password(user, pass, 0 /* no time correction for now */, NULL); user 1068 source3/libsmb/cliconnect.c account = talloc_strdup(talloc_tos(), user); user 1076 source3/libsmb/cliconnect.c if ((p = strchr_m(user, '@')) != NULL) { user 1077 source3/libsmb/cliconnect.c account[PTR_DIFF(p,user)] = '\0'; user 1090 source3/libsmb/cliconnect.c const char *user, user 1098 source3/libsmb/cliconnect.c if (user) { user 1099 source3/libsmb/cliconnect.c fstrcpy(user2, user); user 1112 source3/libsmb/cliconnect.c user = p+1; user 1140 source3/libsmb/cliconnect.c return cli_session_setup_lanman2(cli, user, pass, passlen, user 1147 source3/libsmb/cliconnect.c if (!user || !*user) user 1155 source3/libsmb/cliconnect.c return cli_session_setup_plaintext(cli, user, "", workgroup); user 1166 source3/libsmb/cliconnect.c return cli_session_setup_plaintext(cli, user, pass, workgroup); user 1172 source3/libsmb/cliconnect.c ADS_STATUS status = cli_session_setup_spnego(cli, user, pass, user 1182 source3/libsmb/cliconnect.c status = cli_session_setup_nt1(cli, user, pass, passlen, user 2102 source3/libsmb/cliconnect.c const char *user, const char *domain, user 2125 source3/libsmb/cliconnect.c nt_status = cli_session_setup(cli, user, password, pw_len, password, user 2158 source3/libsmb/cliconnect.c nt_status = cli_init_creds(cli, user, domain, password); user 536 source3/libsmb/clifsinfo.c const char *user, user 557 source3/libsmb/clifsinfo.c if (!NT_STATUS_IS_OK(status = ntlmssp_set_username(es->s.ntlmssp_state, user))) { user 97 source3/libsmb/cliprint.c fstrcpy(job.user, user 51 source3/libsmb/clirap.c bool cli_NetWkstaUserLogon(struct cli_state *cli,char *user, char *workstation) user 71 source3/libsmb/clirap.c strlcpy(p,user,sizeof(param)-PTR_DIFF(p,param)); user 427 source3/libsmb/clirap.c bool cli_oem_change_password(struct cli_state *cli, const char *user, const char *new_password, user 441 source3/libsmb/clirap.c if (strlen(user) >= sizeof(fstring)-1) { user 442 source3/libsmb/clirap.c DEBUG(0,("cli_oem_change_password: user name %s is too long.\n", user)); user 452 source3/libsmb/clirap.c strlcpy(p,user, sizeof(param)-PTR_DIFF(p,param)); user 490 source3/libsmb/clirap.c user )); user 498 source3/libsmb/clirap.c user )); user 1243 source3/libsmb/clirap2.c int cli_NetFileEnum(struct cli_state *cli, const char * user, user 1269 source3/libsmb/clirap2.c PUTSTRING(p, user, RAP_USERNAME_LEN); user 1844 source3/libsmb/clirap2.c bool cli_NetWkstaUserLogoff(struct cli_state *cli, const char *user, const char *workstation) user 1868 source3/libsmb/clirap2.c strlcpy(upperbuf, user, sizeof(upperbuf)); user 116 source3/libsmb/libsmb_cache.c const char * user) user 125 source3/libsmb/libsmb_cache.c strcmp(user, srv->username) == 0) { user 429 source3/libsmb/libsmb_context.c char *user = NULL; user 538 source3/libsmb/libsmb_context.c user = getenv("USER"); user 540 source3/libsmb/libsmb_context.c if (!user) { user 541 source3/libsmb/libsmb_context.c user = SMB_STRDUP("guest"); user 543 source3/libsmb/libsmb_context.c user = SMB_STRDUP(user); user 546 source3/libsmb/libsmb_context.c if (!user) { user 551 source3/libsmb/libsmb_context.c smbc_setUser(context, user); user 639 source3/libsmb/libsmb_context.c const char *user, user 649 source3/libsmb/libsmb_context.c const char *user, user 665 source3/libsmb/libsmb_context.c if (! user) { user 666 source3/libsmb/libsmb_context.c user = smbc_getUser(context); user 692 source3/libsmb/libsmb_context.c set_cmdline_auth_info_username(auth_info, user); user 358 source3/libsmb/libsmb_dir.c char *user = NULL; user 392 source3/libsmb/libsmb_dir.c &user, user 413 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) { user 414 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context)); user 415 source3/libsmb/libsmb_dir.c if (!user) { user 465 source3/libsmb/libsmb_dir.c u_info.username = talloc_strdup(frame,user); user 555 source3/libsmb/libsmb_dir.c &workgroup, &user, &password); user 610 source3/libsmb/libsmb_dir.c &workgroup, &user, &password); user 660 source3/libsmb/libsmb_dir.c &user, &password); user 696 source3/libsmb/libsmb_dir.c &user, &password); user 756 source3/libsmb/libsmb_dir.c &workgroup, &user, &password); user 1122 source3/libsmb/libsmb_dir.c char *user = NULL; user 1151 source3/libsmb/libsmb_dir.c &user, user 1159 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) { user 1160 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context)); user 1161 source3/libsmb/libsmb_dir.c if (!user) { user 1169 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password); user 1230 source3/libsmb/libsmb_dir.c char *user = NULL; user 1259 source3/libsmb/libsmb_dir.c &user, user 1267 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) { user 1268 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context)); user 1269 source3/libsmb/libsmb_dir.c if (!user) { user 1277 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password); user 1514 source3/libsmb/libsmb_dir.c char *user = NULL; user 1545 source3/libsmb/libsmb_dir.c &user, user 1553 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) { user 1554 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context)); user 1555 source3/libsmb/libsmb_dir.c if (!user) { user 1563 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password); user 1605 source3/libsmb/libsmb_dir.c char *user = NULL; user 1661 source3/libsmb/libsmb_dir.c &user, user 1669 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) { user 1670 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context)); user 1671 source3/libsmb/libsmb_dir.c if (!user) { user 1679 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password); user 1706 source3/libsmb/libsmb_dir.c char *user = NULL; user 1737 source3/libsmb/libsmb_dir.c &user, user 1745 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) { user 1746 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context)); user 1747 source3/libsmb/libsmb_dir.c if (!user) { user 1755 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password); user 42 source3/libsmb/libsmb_file.c char *user = NULL; user 76 source3/libsmb/libsmb_file.c &user, user 84 source3/libsmb/libsmb_file.c if (!user || user[0] == (char)0) { user 85 source3/libsmb/libsmb_file.c user = talloc_strdup(frame, smbc_getUser(context)); user 86 source3/libsmb/libsmb_file.c if (!user) { user 94 source3/libsmb/libsmb_file.c server, share, &workgroup, &user, &password); user 238 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL; user 291 source3/libsmb/libsmb_file.c &user, user 341 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL; user 382 source3/libsmb/libsmb_file.c &user, user 426 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL; user 459 source3/libsmb/libsmb_file.c &user, user 710 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL; user 757 source3/libsmb/libsmb_file.c &user, user 816 source3/libsmb/libsmb_file.c char *user = NULL; user 850 source3/libsmb/libsmb_file.c &user, user 40 source3/libsmb/libsmb_printjob.c char *user = NULL; user 67 source3/libsmb/libsmb_printjob.c &user, user 188 source3/libsmb/libsmb_printjob.c char *user = NULL; user 216 source3/libsmb/libsmb_printjob.c &user, user 224 source3/libsmb/libsmb_printjob.c if (!user || user[0] == (char)0) { user 225 source3/libsmb/libsmb_printjob.c user = talloc_strdup(frame, smbc_getUser(context)); user 226 source3/libsmb/libsmb_printjob.c if (!user) { user 234 source3/libsmb/libsmb_printjob.c server, share, &workgroup, &user, &password); user 265 source3/libsmb/libsmb_printjob.c char *user = NULL; user 294 source3/libsmb/libsmb_printjob.c &user, user 302 source3/libsmb/libsmb_printjob.c if (!user || user[0] == (char)0) { user 303 source3/libsmb/libsmb_printjob.c user = talloc_strdup(frame, smbc_getUser(context)); user 304 source3/libsmb/libsmb_printjob.c if (!user) { user 312 source3/libsmb/libsmb_printjob.c server, share, &workgroup, &user, &password); user 63 source3/libsmb/libsmb_setget.c return c->user; user 68 source3/libsmb/libsmb_setget.c smbc_setUser(SMBCCTX *c, char * user) user 70 source3/libsmb/libsmb_setget.c c->user = user; user 117 source3/libsmb/libsmb_stat.c char *user = NULL; user 151 source3/libsmb/libsmb_stat.c &user, user 159 source3/libsmb/libsmb_stat.c if (!user || user[0] == (char)0) { user 160 source3/libsmb/libsmb_stat.c user = talloc_strdup(frame, smbc_getUser(context)); user 161 source3/libsmb/libsmb_stat.c if (!user) { user 169 source3/libsmb/libsmb_stat.c server, share, &workgroup, &user, &password); user 217 source3/libsmb/libsmb_stat.c char *user = NULL; user 251 source3/libsmb/libsmb_stat.c &user, user 1712 source3/libsmb/libsmb_xattr.c char *user = NULL; user 1748 source3/libsmb/libsmb_xattr.c &user, user 1756 source3/libsmb/libsmb_xattr.c if (!user || user[0] == (char)0) { user 1757 source3/libsmb/libsmb_xattr.c user = talloc_strdup(frame, smbc_getUser(context)); user 1758 source3/libsmb/libsmb_xattr.c if (!user) { user 1766 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password); user 1774 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password); user 2008 source3/libsmb/libsmb_xattr.c char *user = NULL; user 2042 source3/libsmb/libsmb_xattr.c &user, user 2050 source3/libsmb/libsmb_xattr.c if (!user || user[0] == (char)0) { user 2051 source3/libsmb/libsmb_xattr.c user = talloc_strdup(frame, smbc_getUser(context)); user 2052 source3/libsmb/libsmb_xattr.c if (!user) { user 2060 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password); user 2068 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password); user 2150 source3/libsmb/libsmb_xattr.c char *user = NULL; user 2178 source3/libsmb/libsmb_xattr.c &user, user 2186 source3/libsmb/libsmb_xattr.c if (!user || user[0] == (char)0) { user 2187 source3/libsmb/libsmb_xattr.c user = talloc_strdup(frame, smbc_getUser(context)); user 2188 source3/libsmb/libsmb_xattr.c if (!user) { user 2196 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password); user 2204 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password); user 87 source3/libsmb/ntlm_check.c const char *user, const char *domain, user 127 source3/libsmb/ntlm_check.c if (!ntv2_owf_gen(part_passwd, user, domain, upper_case_domain, kr)) { user 147 source3/libsmb/ntlmssp.c NTSTATUS ntlmssp_set_username(NTLMSSP_STATE *ntlmssp_state, const char *user) user 149 source3/libsmb/ntlmssp.c ntlmssp_state->user = talloc_strdup(ntlmssp_state, user ? user : "" ); user 150 source3/libsmb/ntlmssp.c if (!ntlmssp_state->user) { user 647 source3/libsmb/ntlmssp.c char *user = NULL; user 666 source3/libsmb/ntlmssp.c ntlmssp_state->user = NULL; user 677 source3/libsmb/ntlmssp.c &user, user 682 source3/libsmb/ntlmssp.c SAFE_FREE(user); user 701 source3/libsmb/ntlmssp.c &user, user 706 source3/libsmb/ntlmssp.c SAFE_FREE(user); user 718 source3/libsmb/ntlmssp.c SAFE_FREE(user); user 724 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) { user 726 source3/libsmb/ntlmssp.c SAFE_FREE(user); user 734 source3/libsmb/ntlmssp.c SAFE_FREE(user); user 741 source3/libsmb/ntlmssp.c SAFE_FREE(user); user 745 source3/libsmb/ntlmssp.c ntlmssp_state->user, ntlmssp_state->domain, ntlmssp_state->workstation, (unsigned long)ntlmssp_state->lm_resp.length, (unsigned long)ntlmssp_state->nt_resp.length)); user 1092 source3/libsmb/ntlmssp.c if (!SMBNTLMv2encrypt_hash(ntlmssp_state->user, user 1186 source3/libsmb/ntlmssp.c ntlmssp_state->user, user 34 source3/libsmb/passchange.c char *user, *domain, *p; user 39 source3/libsmb/passchange.c user = talloc_strdup(talloc_tos(), user_name); user 40 source3/libsmb/passchange.c SMB_ASSERT(user != NULL); user 45 source3/libsmb/passchange.c if ((p = strchr_m(user,'\\')) || (p = strchr_m(user,'/')) || user 46 source3/libsmb/passchange.c (p = strchr_m(user,*lp_winbind_separator()))) { user 48 source3/libsmb/passchange.c domain = user; user 49 source3/libsmb/passchange.c user = p+1; user 156 source3/libsmb/passchange.c result = cli_init_creds(cli, user, domain, old_passwd); user 181 source3/libsmb/passchange.c domain, user, user 237 source3/libsmb/samlogon_cache.c TALLOC_FREE( user ); user 167 source3/libsmb/smbencrypt.c smb_ucs2_t *user; user 175 source3/libsmb/smbencrypt.c if (!push_ucs2_allocate(&user, user_in, &user_byte_len)) { user 184 source3/libsmb/smbencrypt.c SAFE_FREE(user); user 188 source3/libsmb/smbencrypt.c strupper_w(user); user 201 source3/libsmb/smbencrypt.c hmac_md5_update((const unsigned char *)user, user_byte_len, &ctx); user 207 source3/libsmb/smbencrypt.c dump_data(100, (uint8 *)user, user_byte_len); user 213 source3/libsmb/smbencrypt.c SAFE_FREE(user); user 435 source3/libsmb/smbencrypt.c bool SMBNTLMv2encrypt_hash(const char *user, const char *domain, const uchar nt_hash[16], user 447 source3/libsmb/smbencrypt.c if (!ntv2_owf_gen(nt_hash, user, domain, False, ntlm_v2_hash)) { user 474 source3/libsmb/smbencrypt.c bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password, user 483 source3/libsmb/smbencrypt.c return SMBNTLMv2encrypt_hash(user, domain, nt_hash, user 286 source3/modules/perfcount_onefs.c uid_t uid, const char *user, user 29 source3/modules/perfcount_test.c char *user; user 109 source3/modules/perfcount_test.c DEBUG(lvl,("user - %s\n", id->user)); user 355 source3/modules/perfcount_test.c uid_t uid, const char *user, user 823 source3/modules/vfs_acl_tdb.c const char *user) user 828 source3/modules/vfs_acl_tdb.c res = SMB_VFS_NEXT_CONNECT(handle, service, user); user 142 source3/modules/vfs_afsacl.c const char *user, *domain; user 145 source3/modules/vfs_afsacl.c &domain, &user, &type); user 1054 source3/modules/vfs_afsacl.c const char *user) user 1063 source3/modules/vfs_afsacl.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 31 source3/modules/vfs_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user); user 126 source3/modules/vfs_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user) user 133 source3/modules/vfs_audit.c svc, user); user 135 source3/modules/vfs_audit.c result = SMB_VFS_NEXT_CONNECT(handle, svc, user); user 90 source3/modules/vfs_cacheprime.c const char * user) user 98 source3/modules/vfs_cacheprime.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 121 source3/modules/vfs_cacheprime.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 162 source3/modules/vfs_commit.c const char * user) user 165 source3/modules/vfs_commit.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 32 source3/modules/vfs_default.c static int vfswrap_connect(vfs_handle_struct *handle, const char *service, const char *user) user 34 source3/modules/vfs_extd_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user); user 129 source3/modules/vfs_extd_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user) user 138 source3/modules/vfs_extd_audit.c svc, user); user 141 source3/modules/vfs_extd_audit.c svc, user)); user 143 source3/modules/vfs_extd_audit.c result = SMB_VFS_NEXT_CONNECT(handle, svc, user); user 180 source3/modules/vfs_fileid.c const char *service, const char *user) user 217 source3/modules/vfs_fileid.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 75 source3/modules/vfs_full_audit.c const char *svc, const char *user); user 944 source3/modules/vfs_full_audit.c const char *svc, const char *user) user 974 source3/modules/vfs_full_audit.c result = SMB_VFS_NEXT_CONNECT(handle, svc, user); user 29 source3/modules/vfs_onefs.c const char *user) user 39 source3/modules/vfs_onefs.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 102 source3/modules/vfs_prealloc.c const char * user) user 107 source3/modules/vfs_prealloc.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 128 source3/modules/vfs_readahead.c const char *user) user 155 source3/modules/vfs_readahead.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 58 source3/modules/vfs_readonly.c const char *user) user 88 source3/modules/vfs_readonly.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 34 source3/modules/vfs_recycle.c static int recycle_connect(vfs_handle_struct *handle, const char *service, const char *user); user 50 source3/modules/vfs_recycle.c static int recycle_connect(vfs_handle_struct *handle, const char *service, const char *user) user 53 source3/modules/vfs_recycle.c service,user)); user 55 source3/modules/vfs_recycle.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 268 source3/modules/vfs_smb_traffic_analyzer.c const char *user) user 328 source3/modules/vfs_smb_traffic_analyzer.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 89 source3/modules/vfs_tsmsm.c const char *user) { user 137 source3/modules/vfs_tsmsm.c return SMB_VFS_NEXT_CONNECT(handle, service, user); user 740 source3/modules/vfs_xattr_tdb.c const char *user) user 746 source3/modules/vfs_xattr_tdb.c res = SMB_VFS_NEXT_CONNECT(handle, service, user); user 124 source3/nmbd/nmbd_processlogon.c char *user = skip_string(buf,len,machine); user 126 source3/nmbd/nmbd_processlogon.c if (!user || PTR_DIFF(user, buf) >= len) { user 130 source3/nmbd/nmbd_processlogon.c getdc = skip_string(buf,len,user); user 147 source3/nmbd/nmbd_processlogon.c pull_ascii_fstring(user_str, user); user 123 source3/pam_smbpass/general.h char *user; /* user that's failed to be authenticated */ user 48 source3/pam_smbpass/pam_smb_passwd.c int smb_update_db( pam_handle_t *pamh, int ctrl, const char *user, const char *pass_new ) user 54 source3/pam_smbpass/pam_smb_passwd.c retval = NT_STATUS_IS_OK(local_password_change(user, LOCAL_SET_PASSWORD, pass_new, user 103 source3/pam_smbpass/pam_smb_passwd.c const char *user; user 118 source3/pam_smbpass/pam_smb_passwd.c retval = pam_get_user( pamh, &user, "Username: " ); user 126 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "username [%s] obtained", user); user 150 source3/pam_smbpass/pam_smb_passwd.c if (!pdb_getsampwnam(sampass,user)) { user 151 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ALERT, "Failed to find entry for user %s.", user); user 156 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "Located account for %s", user); user 180 source3/pam_smbpass/pam_smb_passwd.c Announce = SMB_MALLOC_ARRAY(char, sizeof(greeting)+strlen(user)); user 188 source3/pam_smbpass/pam_smb_passwd.c strncpy( Announce+sizeof(greeting)-1, user, strlen(user)+1 ); user 304 source3/pam_smbpass/pam_smb_passwd.c retval = smb_update_db(pamh, ctrl, user, pass_new); user 314 source3/pam_smbpass/pam_smb_passwd.c user, uidtoname(getuid()), getuid()); user 317 source3/pam_smbpass/pam_smb_passwd.c user, uid, uidtoname(getuid()), getuid()); user 320 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ERR, "password change failed for user %s", user); user 328 source3/pam_smbpass/support.c , failure->user, failure->id ); user 339 source3/pam_smbpass/support.c _pam_delete( failure->user ); /* tidy up */ user 443 source3/pam_smbpass/support.c newauth->user = smbpXstrDup( pamh, name ); user 6098 source3/param/loadparm.c const char *user, const char *pszHomedir) user 6102 source3/param/loadparm.c if (pszHomename == NULL || user == NULL || pszHomedir == NULL || user 6119 source3/param/loadparm.c if (asprintf(&comment, "Home directory of %s", user) < 0) { user 6134 source3/param/loadparm.c user, ServicePtrs[i]->szPath )); user 51 source3/passdb/passdb.c static int samu_destroy(struct samu *user) user 53 source3/passdb/passdb.c data_blob_clear_free( &user->lm_pw ); user 54 source3/passdb/passdb.c data_blob_clear_free( &user->nt_pw ); user 56 source3/passdb/passdb.c if ( user->plaintext_pw ) user 57 source3/passdb/passdb.c memset( user->plaintext_pw, 0x0, strlen(user->plaintext_pw) ); user 68 source3/passdb/passdb.c struct samu *user; user 70 source3/passdb/passdb.c if ( !(user = TALLOC_ZERO_P( ctx, struct samu )) ) { user 75 source3/passdb/passdb.c talloc_set_destructor( user, samu_destroy ); user 79 source3/passdb/passdb.c user->methods = NULL; user 84 source3/passdb/passdb.c user->logon_time = (time_t)0; user 85 source3/passdb/passdb.c user->pass_last_set_time = (time_t)0; user 86 source3/passdb/passdb.c user->pass_can_change_time = (time_t)0; user 87 source3/passdb/passdb.c user->logoff_time = get_time_t_max(); user 88 source3/passdb/passdb.c user->kickoff_time = get_time_t_max(); user 89 source3/passdb/passdb.c user->pass_must_change_time = get_time_t_max(); user 90 source3/passdb/passdb.c user->fields_present = 0x00ffffff; user 91 source3/passdb/passdb.c user->logon_divs = 168; /* hours per week */ user 92 source3/passdb/passdb.c user->hours_len = 21; /* 21 times 8 bits = 168 */ user 93 source3/passdb/passdb.c memset(user->hours, 0xff, user->hours_len); /* available at all hours */ user 94 source3/passdb/passdb.c user->bad_password_count = 0; user 95 source3/passdb/passdb.c user->logon_count = 0; user 96 source3/passdb/passdb.c user->unknown_6 = 0x000004ec; /* don't know */ user 101 source3/passdb/passdb.c user->username = ""; user 102 source3/passdb/passdb.c user->domain = ""; user 103 source3/passdb/passdb.c user->nt_username = ""; user 104 source3/passdb/passdb.c user->full_name = ""; user 105 source3/passdb/passdb.c user->home_dir = ""; user 106 source3/passdb/passdb.c user->logon_script = ""; user 107 source3/passdb/passdb.c user->profile_path = ""; user 108 source3/passdb/passdb.c user->acct_desc = ""; user 109 source3/passdb/passdb.c user->workstations = ""; user 110 source3/passdb/passdb.c user->comment = ""; user 111 source3/passdb/passdb.c user->munged_dial = ""; user 113 source3/passdb/passdb.c user->plaintext_pw = NULL; user 119 source3/passdb/passdb.c user->acct_ctrl = ACB_NORMAL; user 121 source3/passdb/passdb.c return user; user 130 source3/passdb/passdb.c static NTSTATUS samu_set_unix_internal(struct samu *user, const struct passwd *pwd, bool create) user 142 source3/passdb/passdb.c pdb_set_username(user, pwd->pw_name, PDB_SET); user 143 source3/passdb/passdb.c pdb_set_fullname(user, pwd->pw_gecos, PDB_SET); user 144 source3/passdb/passdb.c pdb_set_domain (user, get_global_sam_name(), PDB_DEFAULT); user 152 source3/passdb/passdb.c pdb_set_group_sid(user, &group_sid, PDB_SET); user 157 source3/passdb/passdb.c user->unix_pw = tcopy_passwd( user, pwd ); user 162 source3/passdb/passdb.c if ( !pdb_set_user_sid_from_rid(user, DOMAIN_USER_RID_GUEST, PDB_DEFAULT)) { user 173 source3/passdb/passdb.c if (!pdb_set_acct_ctrl(user, ACB_WSTRUST, PDB_DEFAULT)) { user 182 source3/passdb/passdb.c if (!pdb_set_acct_ctrl(user, ACB_NORMAL, PDB_DEFAULT)) { user 190 source3/passdb/passdb.c pdb_set_profile_path(user, talloc_sub_specified(user, user 193 source3/passdb/passdb.c pdb_set_homedir(user, talloc_sub_specified(user, user 196 source3/passdb/passdb.c pdb_set_dir_drive(user, talloc_sub_specified(user, user 199 source3/passdb/passdb.c pdb_set_logon_script(user, talloc_sub_specified(user, user 221 source3/passdb/passdb.c if ( !pdb_set_user_sid(user, &user_sid, PDB_SET) ) { user 231 source3/passdb/passdb.c urid = algorithmic_pdb_uid_to_user_rid( user->unix_pw->pw_uid ); user 233 source3/passdb/passdb.c if ( !pdb_set_user_sid_from_rid( user, urid, PDB_SET) ) { user 244 source3/passdb/passdb.c NTSTATUS samu_set_unix(struct samu *user, const struct passwd *pwd) user 246 source3/passdb/passdb.c return samu_set_unix_internal( user, pwd, False ); user 249 source3/passdb/passdb.c NTSTATUS samu_alloc_rid_unix(struct samu *user, const struct passwd *pwd) user 251 source3/passdb/passdb.c return samu_set_unix_internal( user, pwd, True ); user 245 source3/passdb/pdb_interface.c bool guest_user_info( struct samu *user ) user 257 source3/passdb/pdb_interface.c result = samu_set_unix(user, pwd ); user 710 source3/passdb/pdb_interface.c NTSTATUS pdb_enum_group_memberships(TALLOC_CTX *mem_ctx, struct samu *user, user 716 source3/passdb/pdb_interface.c pdb, mem_ctx, user, user 740 source3/passdb/pdb_interface.c NTSTATUS pdb_set_unix_primary_group(TALLOC_CTX *mem_ctx, struct samu *user) user 743 source3/passdb/pdb_interface.c return pdb->set_unix_primary_group(pdb, mem_ctx, user); user 1133 source3/passdb/pdb_interface.c static NTSTATUS pdb_default_getsampwnam (struct pdb_methods *methods, struct samu *user, const char *sname) user 1138 source3/passdb/pdb_interface.c static NTSTATUS pdb_default_getsampwsid(struct pdb_methods *my_methods, struct samu * user, const DOM_SID *sid) user 1452 source3/passdb/pdb_interface.c struct samu *user, user 1460 source3/passdb/pdb_interface.c const char *username = pdb_get_username(user); user 333 source3/passdb/pdb_ldap.c const char *user, user 338 source3/passdb/pdb_ldap.c char *escape_user = escape_ldap_string_alloc(user); user 1494 source3/passdb/pdb_ldap.c static NTSTATUS ldapsam_getsampwnam(struct pdb_methods *my_methods, struct samu *user, const char *sname) user 1504 source3/passdb/pdb_ldap.c attr_list = get_userattr_list( user, ldap_state->schema_ver ); user 1505 source3/passdb/pdb_ldap.c append_attr(user, &attr_list, user 1508 source3/passdb/pdb_ldap.c append_attr(user, &attr_list, "uidNumber"); user 1530 source3/passdb/pdb_ldap.c if (!init_sam_from_ldap(ldap_state, user, entry)) { user 1535 source3/passdb/pdb_ldap.c pdb_set_backend_private_data(user, result, NULL, user 1537 source3/passdb/pdb_ldap.c talloc_autofree_ldapmsg(user, result); user 1596 source3/passdb/pdb_ldap.c static NTSTATUS ldapsam_getsampwsid(struct pdb_methods *my_methods, struct samu * user, const DOM_SID *sid) user 1630 source3/passdb/pdb_ldap.c if (!init_sam_from_ldap(ldap_state, user, entry)) { user 1636 source3/passdb/pdb_ldap.c pdb_set_backend_private_data(user, result, NULL, user 1638 source3/passdb/pdb_ldap.c talloc_autofree_ldapmsg(user, result); user 2806 source3/passdb/pdb_ldap.c struct samu *user, user 2828 source3/passdb/pdb_ldap.c if (pdb_get_username(user) == NULL) { user 2832 source3/passdb/pdb_ldap.c escape_name = escape_ldap_string_alloc(pdb_get_username(user)); user 2858 source3/passdb/pdb_ldap.c DEBUG(1, ("User account [%s] not found!\n", pdb_get_username(user))); user 2960 source3/passdb/pdb_ldap.c pdb_get_username(user))); user 4986 source3/passdb/pdb_ldap.c struct samu *user; user 5064 source3/passdb/pdb_ldap.c user = samu_new(tmp_ctx); user 5065 source3/passdb/pdb_ldap.c if (!user) { user 5070 source3/passdb/pdb_ldap.c if (!pdb_set_username(user, name, PDB_SET)) { user 5074 source3/passdb/pdb_ldap.c if (!pdb_set_domain(user, get_global_sam_name(), PDB_SET)) { user 5080 source3/passdb/pdb_ldap.c if (!pdb_set_acct_ctrl(user, ACB_WSTRUST, PDB_SET)) { user 5085 source3/passdb/pdb_ldap.c if (!pdb_set_acct_ctrl(user, acb_info, PDB_SET)) { user 5091 source3/passdb/pdb_ldap.c if (!pdb_set_acct_ctrl(user, ACB_NORMAL | ACB_DISABLED, PDB_SET)) { user 5097 source3/passdb/pdb_ldap.c if (!pdb_set_user_sid(user, &user_sid, PDB_SET)) { user 5102 source3/passdb/pdb_ldap.c if (!init_ldap_from_sam(ldap_state, NULL, &mods, user, element_is_set_or_changed)) { user 5197 source3/passdb/pdb_ldap.c struct samu *user, user 166 source3/passdb/pdb_smbpasswd.c static void pdb_init_smb(struct smb_passwd *user) user 168 source3/passdb/pdb_smbpasswd.c if (user == NULL) user 170 source3/passdb/pdb_smbpasswd.c ZERO_STRUCTP (user); user 172 source3/passdb/pdb_smbpasswd.c user->pass_last_set_time = (time_t)0; user 1614 source3/passdb/pdb_smbpasswd.c struct samu *user; user 1621 source3/passdb/pdb_smbpasswd.c user = samu_new(talloc_tos()); user 1622 source3/passdb/pdb_smbpasswd.c if (user == NULL) { user 1627 source3/passdb/pdb_smbpasswd.c if (!build_sam_account(smbpasswd_state, user, pwd)) { user 1634 source3/passdb/pdb_smbpasswd.c entry.acct_flags = pdb_get_acct_ctrl(user); user 1635 source3/passdb/pdb_smbpasswd.c sid_peek_rid(pdb_get_user_sid(user), &entry.rid); user 1637 source3/passdb/pdb_smbpasswd.c search_state, pdb_get_username(user)); user 1639 source3/passdb/pdb_smbpasswd.c search_state, pdb_get_fullname(user)); user 1641 source3/passdb/pdb_smbpasswd.c search_state, pdb_get_acct_desc(user)); user 1643 source3/passdb/pdb_smbpasswd.c TALLOC_FREE(user); user 65 source3/passdb/pdb_tdb.c struct samu *user; user 77 source3/passdb/pdb_tdb.c user = samu_new(talloc_tos()); user 78 source3/passdb/pdb_tdb.c if (user == NULL) { user 89 source3/passdb/pdb_tdb.c ret = init_samu_from_buffer(user, SAMU_BUFFER_V0, user 94 source3/passdb/pdb_tdb.c ret = init_samu_from_buffer(user, SAMU_BUFFER_V1, user 99 source3/passdb/pdb_tdb.c ret = init_samu_from_buffer(user, SAMU_BUFFER_V2, user 104 source3/passdb/pdb_tdb.c ret = init_samu_from_buffer(user, SAMU_BUFFER_V3, user 109 source3/passdb/pdb_tdb.c ret = init_samu_from_buffer(user, SAMU_BUFFER_V4, user 121 source3/passdb/pdb_tdb.c TALLOC_FREE(user); user 126 source3/passdb/pdb_tdb.c data.dsize = init_buffer_from_samu(&data.dptr, user, false); user 127 source3/passdb/pdb_tdb.c TALLOC_FREE(user); user 528 source3/passdb/pdb_tdb.c struct samu *user, const char *sname) user 534 source3/passdb/pdb_tdb.c if ( !user ) { user 564 source3/passdb/pdb_tdb.c if (!init_samu_from_buffer(user, SAMU_BUFFER_LATEST, data.dptr, data.dsize)) { user 582 source3/passdb/pdb_tdb.c struct samu *user, uint32 rid) user 589 source3/passdb/pdb_tdb.c if ( !user ) { user 616 source3/passdb/pdb_tdb.c return tdbsam_getsampwnam (my_methods, user, name); user 620 source3/passdb/pdb_tdb.c struct samu * user, const DOM_SID *sid) user 627 source3/passdb/pdb_tdb.c return tdbsam_getsampwrid(my_methods, user, rid); user 1139 source3/passdb/pdb_tdb.c struct samu *user = NULL; user 1144 source3/passdb/pdb_tdb.c TALLOC_FREE(user); user 1145 source3/passdb/pdb_tdb.c user = samu_new(talloc_tos()); user 1146 source3/passdb/pdb_tdb.c if (user == NULL) { user 1157 source3/passdb/pdb_tdb.c status = tdbsam_getsampwrid(state->methods, user, rid); user 1169 source3/passdb/pdb_tdb.c TALLOC_FREE(user); user 1174 source3/passdb/pdb_tdb.c ((state->acct_flags & pdb_get_acct_ctrl(user)) == 0)) { user 1178 source3/passdb/pdb_tdb.c entry->acct_flags = pdb_get_acct_ctrl(user); user 1180 source3/passdb/pdb_tdb.c entry->account_name = talloc_strdup(search, pdb_get_username(user)); user 1181 source3/passdb/pdb_tdb.c entry->fullname = talloc_strdup(search, pdb_get_fullname(user)); user 1182 source3/passdb/pdb_tdb.c entry->description = talloc_strdup(search, pdb_get_acct_desc(user)); user 1184 source3/passdb/pdb_tdb.c TALLOC_FREE(user); user 45 source3/passdb/pdb_wbc_sam.c struct samu *user, user 53 source3/passdb/pdb_wbc_sam.c memset(user, 0, sizeof(user)); user 56 source3/passdb/pdb_wbc_sam.c user->methods = methods; user 57 source3/passdb/pdb_wbc_sam.c result = samu_set_unix(user, pwd); user 62 source3/passdb/pdb_wbc_sam.c static NTSTATUS pdb_wbc_sam_getsampwnam(struct pdb_methods *methods, struct samu *user, const char *sname) user 64 source3/passdb/pdb_wbc_sam.c return _pdb_wbc_sam_getsampw(methods, user, winbind_getpwnam(sname)); user 67 source3/passdb/pdb_wbc_sam.c static NTSTATUS pdb_wbc_sam_getsampwsid(struct pdb_methods *methods, struct samu *user, const DOM_SID *sid) user 69 source3/passdb/pdb_wbc_sam.c return _pdb_wbc_sam_getsampw(methods, user, winbind_getpwsid(sid)); user 95 source3/passdb/pdb_wbc_sam.c struct samu *user, user 101 source3/passdb/pdb_wbc_sam.c const char *username = pdb_get_username(user); user 615 source3/printing/print_cups.c char *user = NULL; user 662 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &user, pjob->user, &size)) { user 667 source3/printing/print_cups.c NULL, user); user 712 source3/printing/print_cups.c char *user = NULL; user 759 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &user, pjob->user, &size)) { user 763 source3/printing/print_cups.c NULL, user); user 808 source3/printing/print_cups.c char *user = NULL; user 855 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &user, pjob->user, &size)) { user 859 source3/printing/print_cups.c NULL, user); user 910 source3/printing/print_cups.c char *user = NULL; user 966 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &user, pjob->user, &size)) { user 970 source3/printing/print_cups.c NULL, user); user 486 source3/printing/print_iprint.c NULL, pjob->user); user 584 source3/printing/print_iprint.c NULL, pjob->user); user 682 source3/printing/print_iprint.c NULL, pjob->user); user 780 source3/printing/print_iprint.c NULL, pjob->user); user 303 source3/printing/printing.c pjob->user, user 493 source3/printing/printing.c notify_job_username(sharename, jobid, new_data->user); user 555 source3/printing/printing.c pjob->user, user 697 source3/printing/printing.c fstrcpy(pj.user, old_pj ? old_pj->user : q->fs_user); user 838 source3/printing/printing.c fstrcpy(ts->queue[i].fs_user, pjob.user); user 2016 source3/printing/printing.c return strequal(pjob->user, server_info->sanitized_username); user 2472 source3/printing/printing.c fstrcpy(pjob.user, lp_printjob_username(snum)); user 2477 source3/printing/printing.c pjob.user, sizeof(pjob.user)-1); user 2479 source3/printing/printing.c pjob.user[sizeof(pjob.user)-1] = '\0'; user 2712 source3/printing/printing.c fstrcpy(queue[total_count].fs_user, pjob->user); user 49 source3/rpc_client/cli_spoolss.c level1.user = cli->auth->user_name; user 166 source3/rpc_client/cli_spoolss.c level1.user = cli->auth->user_name; user 652 source3/rpc_server/srv_pipe.c "workstation: %s\n", a->ntlmssp_state->user, user 97 source3/rpc_server/srv_srvsvc_nt.c fenum->ctr3->array[i].user = username; user 200 source3/rpc_server/srv_srvsvc_nt.c fenum->ctr3->array[i].user = username; user 878 source3/rpc_server/srv_srvsvc_nt.c ctr1->array[num_entries].user = session_list[resume_handle].username; user 993 source3/rpc_server/srv_srvsvc_nt.c ctr1->array[num_entries].user = "dummy_user"; user 1044 source3/rpc_server/srv_srvsvc_nt.c werr = net_enum_files(ctx, r->in.user, &ctr3, resume_hnd); user 1049 source3/rpc_server/srv_srvsvc_nt.c werr = net_enum_pipes(ctx, r->in.user, &ctr3, resume_hnd); user 1252 source3/rpc_server/srv_srvsvc_nt.c username = r->in.user; user 474 source3/rpcclient/cmd_netlogon.c u.user->account_name.string); user 2372 source3/rpcclient/cmd_samr.c const char *user, *oldpass, *newpass; user 2382 source3/rpcclient/cmd_samr.c user = argv[1]; user 2408 source3/rpcclient/cmd_samr.c init_lsa_String(&lsa_acct_name, user); user 2464 source3/rpcclient/cmd_samr.c const char *user, *oldpass, *newpass; user 2472 source3/rpcclient/cmd_samr.c user = argv[1]; user 2497 source3/rpcclient/cmd_samr.c result = rpccli_samr_chgpasswd_user2(cli, mem_ctx, user, newpass, oldpass); user 2521 source3/rpcclient/cmd_samr.c const char *user, *oldpass, *newpass; user 2531 source3/rpcclient/cmd_samr.c user = argv[1]; user 2557 source3/rpcclient/cmd_samr.c user, user 2607 source3/rpcclient/cmd_samr.c const char *user, *param; user 2625 source3/rpcclient/cmd_samr.c user = argv[1]; user 2762 source3/rpcclient/cmd_samr.c user_rid = strtol(user, NULL, 0); user 2778 source3/rpcclient/cmd_samr.c init_lsa_String(&lsa_acct_name, user); user 688 source3/rpcclient/cmd_srvsvc.c const char *user = NULL; user 700 source3/rpcclient/cmd_srvsvc.c user = argv[2]; user 744 source3/rpcclient/cmd_srvsvc.c user, user 50 source3/smbd/chgpasswd.c static NTSTATUS check_oem_password(const char *user, user 639 source3/smbd/chgpasswd.c bool check_lanman_password(char *user, uchar * pass1, user 655 source3/smbd/chgpasswd.c ret = pdb_getsampwnam(sampass, user); user 668 source3/smbd/chgpasswd.c DEBUG(0,("check_lanman_password: account %s disabled.\n", user)); user 775 source3/smbd/chgpasswd.c NTSTATUS pass_oem_change(char *user, user 792 source3/smbd/chgpasswd.c ret = pdb_getsampwnam(sampass, user); user 801 source3/smbd/chgpasswd.c nt_status = check_oem_password(user, user 838 source3/smbd/chgpasswd.c static NTSTATUS check_oem_password(const char *user, user 867 source3/smbd/chgpasswd.c DEBUG(2,("check_lanman_password: account %s disabled.\n", user)); user 901 source3/smbd/chgpasswd.c user)); user 906 source3/smbd/chgpasswd.c user)); user 909 source3/smbd/chgpasswd.c user)); user 914 source3/smbd/chgpasswd.c user)); user 2568 source3/smbd/lanman.c fstring user; user 2583 source3/smbd/lanman.c pull_ascii_fstring(user,p); user 2613 source3/smbd/lanman.c DEBUG(3,("Set password for <%s>\n",user)); user 2624 source3/smbd/lanman.c if (NT_STATUS_IS_OK(check_plaintext_password(user,password,&server_info))) { user 2650 source3/smbd/lanman.c if (check_lanman_password(user,(unsigned char *)pass1,(unsigned char *)pass2, &hnd)) { user 2677 source3/smbd/lanman.c fstring user; user 2725 source3/smbd/lanman.c p += pull_ascii_fstring(user,p); user 2727 source3/smbd/lanman.c DEBUG(3,("api_SamOEMChangePassword: Change password for <%s>\n",user)); user 2734 source3/smbd/lanman.c (void)map_username(user); user 2736 source3/smbd/lanman.c if (NT_STATUS_IS_OK(pass_oem_change(user, (uchar*) data, (uchar *)&data[516], NULL, NULL, NULL))) { user 3818 source3/smbd/lanman.c char *user = skip_string(param,tpscnt,str2); user 3819 source3/smbd/lanman.c char *resource = skip_string(param,tpscnt,user); user 3821 source3/smbd/lanman.c if (!str1 || !str2 || !user || !resource) { user 3828 source3/smbd/lanman.c DEBUG(3,("WAccessGetUserPerms user=%s resource=%s\n",user,resource)); user 4706 source3/smbd/lanman.c user_struct *user = get_valid_user_struct(vuid); user 4708 source3/smbd/lanman.c if (!user || user->server_info->guest) { user 71 source3/smbd/map_username.c bool map_username(fstring user) user 80 source3/smbd/map_username.c if (!*user) user 83 source3/smbd/map_username.c if (strequal(user,get_last_to())) user 86 source3/smbd/map_username.c if (strequal(user,get_last_from())) { user 87 source3/smbd/map_username.c DEBUG(3,("Mapped user %s to %s\n",user,get_last_to())); user 88 source3/smbd/map_username.c fstrcpy(user,get_last_to()); user 102 source3/smbd/map_username.c user); user 125 source3/smbd/map_username.c DEBUG(3,("Mapped user %s to %s\n", user, qlines[0] )); user 126 source3/smbd/map_username.c fstrcpy( user, qlines[0] ); user 187 source3/smbd/map_username.c user_in_list(user, (const char **)dosuserlist)) { user 188 source3/smbd/map_username.c DEBUG(3,("Mapped user %s to %s\n",user,unixname)); user 191 source3/smbd/map_username.c set_last_from_to(user, unixname); user 192 source3/smbd/map_username.c fstrcpy( user, unixname ); user 211 source3/smbd/map_username.c set_last_from_to(user, user); user 328 source3/smbd/password.c void add_session_user(const char *user) user 333 source3/smbd/password.c pw = Get_Pwnam_alloc(talloc_tos(), user); user 393 source3/smbd/password.c bool user_in_netgroup(const char *user, const char *ngname) user 407 source3/smbd/password.c user, my_yp_domain?my_yp_domain:"(ANY)", ngname)); user 409 source3/smbd/password.c if (innetgr(ngname, NULL, user, my_yp_domain)) { user 419 source3/smbd/password.c fstrcpy(lowercase_user, user); user 439 source3/smbd/password.c bool user_in_list(const char *user,const char **list) user 444 source3/smbd/password.c DEBUG(10,("user_in_list: checking user %s in list\n", user)); user 449 source3/smbd/password.c user, *list)); user 454 source3/smbd/password.c if (strequal(user, *list)) user 467 source3/smbd/password.c if(user_in_netgroup(user, *list +1)) user 469 source3/smbd/password.c if(user_in_group(user, *list +1)) user 477 source3/smbd/password.c if(user_in_group(user, *list +2)) user 479 source3/smbd/password.c if(user_in_netgroup(user, *list +2)) user 488 source3/smbd/password.c if(user_in_group(user, *list +1)) user 498 source3/smbd/password.c if(user_in_netgroup(user, *list +2)) user 500 source3/smbd/password.c if(user_in_group(user, *list +2)) user 506 source3/smbd/password.c if(user_in_netgroup(user, *list +1)) user 520 source3/smbd/password.c static bool user_ok(const char *user, int snum) user 537 source3/smbd/password.c ret = !user_in_list(user, user 553 source3/smbd/password.c ret = user_in_list(user, (const char **)valid); user 565 source3/smbd/password.c ret = user_in_list(user, (const char **)user_list); user 581 source3/smbd/password.c char *host, *user, *domain; user 583 source3/smbd/password.c while (getnetgrent(&host, &user, &domain)) { user 584 source3/smbd/password.c if (user) { user 585 source3/smbd/password.c if (user_ok(user, snum) && user 586 source3/smbd/password.c password_ok(user,password)) { user 588 source3/smbd/password.c return(user); user 675 source3/smbd/password.c bool authorise_login(int snum, fstring user, DATA_BLOB password, user 682 source3/smbd/password.c "user=%s pass=%s\n", user,password.data)); user 725 source3/smbd/password.c fstrcpy(user,user2); user 728 source3/smbd/password.c "password ok\n", user)); user 762 source3/smbd/password.c fstrcpy(user,auser); user 765 source3/smbd/password.c "password ok (%s)\n", user)); user 773 source3/smbd/password.c fstrcpy(user,user2); user 777 source3/smbd/password.c user)); user 792 source3/smbd/password.c fstrcpy(user,guestname); user 795 source3/smbd/password.c "and guest ok (%s)\n", user)); user 804 source3/smbd/password.c if (ok && !user_ok(user, snum)) { user 805 source3/smbd/password.c DEBUG(0,("authorise_login: rejected invalid user %s\n",user)); user 3670 source3/smbd/posix_acls.c uid_t user = (uid_t)-1; user 3718 source3/smbd/posix_acls.c status = unpack_nt_owners( SNUM(conn), &user, &grp, security_info_sent, psd); user 3729 source3/smbd/posix_acls.c if (((user != (uid_t)-1) && (sbuf.st_uid != user)) || (( grp != (gid_t)-1) && (sbuf.st_gid != grp))) { user 3732 source3/smbd/posix_acls.c fsp->fsp_name, (unsigned int)user, (unsigned int)grp )); user 3734 source3/smbd/posix_acls.c if(try_chown( fsp->conn, fsp->fsp_name, user, grp) == -1) { user 3736 source3/smbd/posix_acls.c fsp->fsp_name, (unsigned int)user, (unsigned int)grp, strerror(errno) )); user 357 source3/smbd/quotas.c if (!request.user) { user 611 source3/smbd/service.c fstring user; user 621 source3/smbd/service.c if (!authorise_login(snum,user,password,&guest)) { user 627 source3/smbd/service.c return make_serverinfo_from_username(mem_ctx, user, guest, user 36 source3/smbd/sesssetup.c const char *user, const char *domain) user 42 source3/smbd/sesssetup.c user, domain)); user 50 source3/smbd/sesssetup.c user)); user 252 source3/smbd/sesssetup.c fstring user; user 424 source3/smbd/sesssetup.c fstr_sprintf(user, "%s%c%s", domain, *lp_winbind_separator(), client); user 428 source3/smbd/sesssetup.c username_was_mapped = map_username( user ); user 430 source3/smbd/sesssetup.c pw = smb_getpwnam( mem_ctx, user, real_username, True ); user 456 source3/smbd/sesssetup.c fstrcpy(user,lp_guestaccount()); user 457 source3/smbd/sesssetup.c pw = smb_getpwnam( mem_ctx, user, real_username, True ); user 464 source3/smbd/sesssetup.c user)); user 621 source3/smbd/sesssetup.c (*auth_ntlmssp_state)->ntlmssp_state->user, user 647 source3/smbd/sesssetup.c (*auth_ntlmssp_state)->ntlmssp_state->user) != user 1384 source3/smbd/sesssetup.c const char *user; user 1456 source3/smbd/sesssetup.c user = tmp ? tmp : ""; user 1575 source3/smbd/sesssetup.c user = tmp ? tmp : ""; user 1623 source3/smbd/sesssetup.c domain, user, get_remote_machine_name())); user 1625 source3/smbd/sesssetup.c if (*user) { user 1639 source3/smbd/sesssetup.c fstrcpy(sub_user, user); user 1659 source3/smbd/sesssetup.c user = ""; user 1662 source3/smbd/sesssetup.c if (!*user) { user 1675 source3/smbd/sesssetup.c nt_status = make_user_info_for_reply_enc(&user_info, user, user 1697 source3/smbd/sesssetup.c user, domain, chal, user 1718 source3/smbd/sesssetup.c user, domain); user 538 source3/torture/cmd_vfs.c const char *user; user 556 source3/torture/cmd_vfs.c if (pwd != NULL) user = pwd->pw_name; user 557 source3/torture/cmd_vfs.c else user = null_string; user 582 source3/torture/cmd_vfs.c printf(" Uid: %5lu/%.16s Gid: %5lu/%.16s\n", (unsigned long)st.st_uid, user, user 595 source3/torture/cmd_vfs.c const char *user; user 623 source3/torture/cmd_vfs.c if (pwd != NULL) user = pwd->pw_name; user 624 source3/torture/cmd_vfs.c else user = null_string; user 648 source3/torture/cmd_vfs.c printf(" Uid: %5lu/%.16s Gid: %5lu/%.16s\n", (unsigned long)st.st_uid, user, user 660 source3/torture/cmd_vfs.c const char *user; user 677 source3/torture/cmd_vfs.c if (pwd != NULL) user = pwd->pw_name; user 678 source3/torture/cmd_vfs.c else user = null_string; user 702 source3/torture/cmd_vfs.c printf(" Uid: %5lu/%.16s Gid: %5lu/%.16s\n", (unsigned long)st.st_uid, user, user 314 source3/torture/nsstest.c static int nss_initgroups(char *user, gid_t group, gid_t **groups, long int *start, long int *size) user 326 source3/torture/nsstest.c status = _nss_initgroups(user, group, start, size, groups, 0, &nss_errno); user 4873 source3/torture/torture.c fstring user; user 4922 source3/torture/torture.c fstr_sprintf(user, "%X", error); user 4924 source3/torture/torture.c if (NT_STATUS_IS_OK(cli_session_setup(c_nt, user, user 4942 source3/torture/torture.c if (NT_STATUS_IS_OK(cli_session_setup(c_dos, user, user 5019 source3/torture/torture.c static bool subst_test(const char *str, const char *user, const char *domain, user 5025 source3/torture/torture.c subst = talloc_sub_specified(talloc_tos(), str, user, domain, uid, gid); user 5029 source3/torture/torture.c "[%s]\n", str, user, domain, (int)uid, (int)gid, subst, user 1815 source3/utils/net_ads.c const char *user; user 1836 source3/utils/net_ads.c user = argv[0]; user 1837 source3/utils/net_ads.c if (!strchr_m(user, '@')) { user 1841 source3/utils/net_ads.c user = chr; user 1871 source3/utils/net_ads.c if (asprintf(&prompt, "Enter new password for %s:", user) == -1) { user 1879 source3/utils/net_ads.c auth_password, user, new_password, ads->auth.time_offset); user 1886 source3/utils/net_ads.c d_printf("Password change for %s completed.\n", user); user 478 source3/utils/net_proto.h const char *net_prompt_pass(struct net_context *c, const char *user); user 4031 source3/utils/net_rpc.c static bool get_user_sids(const char *domain, const char *user, NT_USER_TOKEN *token) user 4044 source3/utils/net_rpc.c domain, *lp_winbind_separator(), user); user 4048 source3/utils/net_rpc.c wbc_status = wbcLookupName(domain, user, &wsid, &type); user 4156 source3/utils/net_rpc.c fstring domain, user; user 4167 source3/utils/net_rpc.c fstrcpy(user, users[i]); user 4172 source3/utils/net_rpc.c fstrcpy(user, p); user 4175 source3/utils/net_rpc.c get_user_sids(domain, user, &(result[i].token)); user 538 source3/utils/net_util.c const char *net_prompt_pass(struct net_context *c, const char *user) user 555 source3/utils/net_util.c if (asprintf(&prompt, "Enter %s's password:", user) == -1) { user 225 source3/utils/ntlm_auth.c fstring user) user 234 source3/utils/ntlm_auth.c fstrcpy(user, p+1); user 283 source3/utils/ntlm_auth.c static bool check_plaintext_auth(const char *user, const char *pass, user 299 source3/utils/ntlm_auth.c fstrcpy(request.data.auth.user, user); user 367 source3/utils/ntlm_auth.c fstrcpy(request.data.auth_crap.user, username); user 467 source3/utils/ntlm_auth.c fstrcpy(request.data.chng_pswd_auth_crap.user, username); user 531 source3/utils/ntlm_auth.c nt_status = contact_winbind_auth_crap(ntlmssp_state->user, ntlmssp_state->domain, user 555 source3/utils/ntlm_auth.c ntlmssp_state->domain, ntlmssp_state->user, user 578 source3/utils/ntlm_auth.c ntlmssp_state->user, user 579 source3/utils/ntlm_auth.c ntlmssp_state->user, user 587 source3/utils/ntlm_auth.c ntlmssp_state->user); user 590 source3/utils/ntlm_auth.c ntlmssp_state->domain, ntlmssp_state->user, ntlmssp_state->workstation, user 685 source3/utils/ntlm_auth.c fstr_sprintf(wb_request.data.ccache_ntlm_auth.user, user 1035 source3/utils/ntlm_auth.c char *user, *pass; user 1036 source3/utils/ntlm_auth.c user=buf; user 1048 source3/utils/ntlm_auth.c rfc1738_unescape(user); user 1052 source3/utils/ntlm_auth.c if (check_plaintext_auth(user, pass, False)) { user 1126 source3/utils/ntlm_auth.c char *user = NULL; user 1272 source3/utils/ntlm_auth.c user = SMB_STRDUP(principal); user 1310 source3/utils/ntlm_auth.c user = SMB_STRDUP(ntlmssp_state->user); user 1321 source3/utils/ntlm_auth.c reply_argument = talloc_asprintf(ctx, "%s\\%s", domain, user); user 1339 source3/utils/ntlm_auth.c SAFE_FREE(user); user 1519 source3/utils/ntlm_auth.c char *user = NULL; user 1530 source3/utils/ntlm_auth.c user = talloc_asprintf(talloc_tos(), "%s@%s", opt_username, opt_domain); user 1531 source3/utils/ntlm_auth.c if (!user) { user 1535 source3/utils/ntlm_auth.c if ((retval = kerberos_kinit_password(user, opt_password, 0, NULL))) { user 2491 source3/utils/ntlm_auth.c fstring user; user 2493 source3/utils/ntlm_auth.c fstr_sprintf(user, "%s%c%s", opt_domain, winbind_separator(), opt_username); user 2494 source3/utils/ntlm_auth.c if (!check_plaintext_auth(user, opt_password, True)) { user 103 source3/utils/pdbedit.c struct samu *user; user 117 source3/utils/pdbedit.c user = samu_new(talloc_tos()); user 118 source3/utils/pdbedit.c if (user == NULL) { user 125 source3/utils/pdbedit.c status = in->getsampwsid(in, user, &user_sid); user 130 source3/utils/pdbedit.c TALLOC_FREE(user); user 138 source3/utils/pdbedit.c TALLOC_FREE( user ); user 143 source3/utils/pdbedit.c printf("Importing account for %s...", user->username); user 144 source3/utils/pdbedit.c status = out->getsampwnam(out, account, user->username); user 147 source3/utils/pdbedit.c status = out->update_sam_account( out, user ); user 149 source3/utils/pdbedit.c status = out->add_sam_account(out, user); user 159 source3/utils/pdbedit.c TALLOC_FREE( user ); user 306 source3/web/cgi.c const char *user = getenv("REMOTE_USER"); user 311 source3/web/cgi.c if (!user) { user 317 source3/web/cgi.c pwd = getpwnam_alloc(talloc_autofree_context(), user); user 319 source3/web/cgi.c printf("%sCannot find user %s<br>%s\n", head, user, tail); user 327 source3/web/cgi.c head, user, (int)geteuid(), (int)getuid(), tail); user 340 source3/web/cgi.c fstring user, user_pass; user 360 source3/web/cgi.c user, sizeof(user), True); user 370 source3/web/cgi.c pass = getpwnam_alloc(talloc_autofree_context(), user); user 376 source3/web/cgi.c if NT_STATUS_IS_OK(pass_check(pass, user, user_pass, user 390 source3/web/cgi.c C_user = SMB_STRDUP(user); user 465 source3/winbindd/winbindd_ads.c struct netr_SamInfo3 *user = NULL; user 475 source3/winbindd/winbindd_ads.c if ( (user = netsamlogon_cache_get( mem_ctx, sid )) != NULL ) user 481 source3/winbindd/winbindd_ads.c sid_compose(&info->user_sid, &domain->sid, user->base.rid); user 482 source3/winbindd/winbindd_ads.c sid_compose(&info->group_sid, &domain->sid, user->base.primary_gid); user 484 source3/winbindd/winbindd_ads.c info->acct_name = talloc_strdup(mem_ctx, user->base.account_name.string); user 485 source3/winbindd/winbindd_ads.c info->full_name = talloc_strdup(mem_ctx, user->base.full_name.string); user 491 source3/winbindd/winbindd_ads.c TALLOC_FREE(user); user 156 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user[ user 157 source3/winbindd/winbindd_ccache_access.c sizeof(state->request.data.ccache_ntlm_auth.user)-1]='\0'; user 160 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user)); user 164 source3/winbindd/winbindd_ccache_access.c if (!canonicalize_username(state->request.data.ccache_ntlm_auth.user, user 167 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user)); user 199 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user[ user 200 source3/winbindd/winbindd_ccache_access.c sizeof(state->request.data.ccache_ntlm_auth.user)-1]='\0'; user 204 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user)); user 225 source3/winbindd/winbindd_ccache_access.c if (!parse_domain_user(state->request.data.ccache_ntlm_auth.user, name_domain, name_user)) { user 228 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user)); user 232 source3/winbindd/winbindd_ccache_access.c entry = find_memory_creds_by_name(state->request.data.ccache_ntlm_auth.user); user 236 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user)); user 57 source3/winbindd/winbindd_creds.c const char *user, user 78 source3/winbindd/winbindd_creds.c } else if (user != NULL) { user 86 source3/winbindd/winbindd_creds.c user, user 128 source3/winbindd/winbindd_creds.c if (info3 != NULL && user != NULL) { user 129 source3/winbindd/winbindd_creds.c if (!netsamlogon_cache_store(user, info3)) { user 139 source3/winbindd/winbindd_creds.c const char *user, user 143 source3/winbindd/winbindd_creds.c return winbindd_store_creds(domain, mem_ctx, user, pass, info3, NULL); user 156 source3/winbindd/winbindd_creds.c const char *user, user 159 source3/winbindd/winbindd_creds.c return winbindd_store_creds(domain, mem_ctx, user, pass, NULL, NULL); user 31 source3/winbindd/winbindd_group.c static void add_member(const char *domain, const char *user, user 37 source3/winbindd/winbindd_group.c fill_domain_username(name, domain, user, True); user 39 source3/winbindd/winbindd_group.c fstrcpy(name, user); user 609 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user); user 668 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 709 source3/winbindd/winbindd_pam.c if (!NT_STATUS_IS_OK(remove_ccache(state->request.data.auth.user))) { user 712 source3/winbindd/winbindd_pam.c state->request.data.auth.user)); user 819 source3/winbindd/winbindd_pam.c state->request.data.auth.user user 820 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.auth.user)-1]='\0'; user 827 source3/winbindd/winbindd_pam.c state->request.data.auth.user)); user 837 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 847 source3/winbindd/winbindd_pam.c fstrcpy(mapped_user, state->request.data.auth.user); user 868 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 901 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user); user 1047 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 1072 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 1120 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 1144 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user); user 1151 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain)); user 1166 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain)); user 1227 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user); user 1291 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain)); user 1471 source3/winbindd/winbindd_pam.c state->request.data.auth.user[sizeof(state->request.data.auth.user)-1]='\0'; user 1477 source3/winbindd/winbindd_pam.c state->request.data.auth.user)); user 1487 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 1496 source3/winbindd/winbindd_pam.c mapped_user = state->request.data.auth.user; user 1501 source3/winbindd/winbindd_pam.c if ( mapped_user != state->request.data.auth.user ) { user 1503 source3/winbindd/winbindd_pam.c safe_strcpy( state->request.data.auth.user, domain_user, user 1504 source3/winbindd/winbindd_pam.c sizeof(state->request.data.auth.user)-1 ); user 1652 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 1665 source3/winbindd/winbindd_pam.c result = winbindd_add_memory_creds(state->request.data.auth.user, user 1677 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 1683 source3/winbindd/winbindd_pam.c winbindd_delete_memory_creds(state->request.data.auth.user); user 1728 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 1771 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user user 1772 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.auth_crap.user)-1]=0; user 1779 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user)); user 1801 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user, user 1828 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user[sizeof(state->request.data.auth_crap.user)-1]=0; user 1836 source3/winbindd/winbindd_pam.c name_user = state->request.data.auth_crap.user; user 1888 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user, name_domain, name_user, name_domain)); user 1979 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user, user 2018 source3/winbindd/winbindd_pam.c fstring domain, user; user 2024 source3/winbindd/winbindd_pam.c state->request.data.chauthtok.user)); user 2029 source3/winbindd/winbindd_pam.c state->request.data.chauthtok.user, user 2037 source3/winbindd/winbindd_pam.c fstrcpy(state->request.data.chauthtok.user, mapped_user); user 2044 source3/winbindd/winbindd_pam.c if (!canonicalize_username(state->request.data.chauthtok.user, domain, user)) { user 2048 source3/winbindd/winbindd_pam.c state->request.data.auth.user, user 2059 source3/winbindd/winbindd_pam.c state->request.data.chauthtok.user, domain, user, domain)); user 2078 source3/winbindd/winbindd_pam.c fstring domain, user; user 2081 source3/winbindd/winbindd_pam.c state->request.data.auth.user)); user 2083 source3/winbindd/winbindd_pam.c if (!parse_domain_user(state->request.data.chauthtok.user, domain, user)) { user 2105 source3/winbindd/winbindd_pam.c user, user 2137 source3/winbindd/winbindd_pam.c result = rpccli_samr_chgpasswd_user2(cli, state->mem_ctx, user, newpass, oldpass); user 2152 source3/winbindd/winbindd_pam.c result = winbindd_replace_memory_creds(state->request.data.chauthtok.user, user 2172 source3/winbindd/winbindd_pam.c state->mem_ctx, user, user 2215 source3/winbindd/winbindd_pam.c user, user 2225 source3/winbindd/winbindd_pam.c fstring name_domain, user; user 2230 source3/winbindd/winbindd_pam.c state->request.data.logoff.user)); user 2233 source3/winbindd/winbindd_pam.c state->request.data.logoff.user user 2234 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.logoff.user)-1]='\0'; user 2243 source3/winbindd/winbindd_pam.c if (!canonicalize_username(state->request.data.logoff.user, name_domain, user)) { user 2280 source3/winbindd/winbindd_pam.c state->request.data.logoff.user, user 2293 source3/winbindd/winbindd_pam.c state->request.data.logoff.user)); user 2315 source3/winbindd/winbindd_pam.c if (!ccache_entry_exists(state->request.data.logoff.user)) { user 2321 source3/winbindd/winbindd_pam.c if (!ccache_entry_identical(state->request.data.logoff.user, user 2328 source3/winbindd/winbindd_pam.c result = remove_ccache(state->request.data.logoff.user); user 2341 source3/winbindd/winbindd_pam.c winbindd_delete_memory_creds(state->request.data.logoff.user); user 2356 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user[ user 2357 source3/winbindd/winbindd_pam.c sizeof(state->request.data.chng_pswd_auth_crap.user)-1]=0; user 2364 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user)); user 2385 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user, user 2399 source3/winbindd/winbindd_pam.c fstring domain,user; user 2405 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user[ user 2406 source3/winbindd/winbindd_pam.c sizeof(state->request.data.chng_pswd_auth_crap.user)-1]=0; user 2410 source3/winbindd/winbindd_pam.c *user = 0; user 2415 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user)); user 2427 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.chng_pswd_auth_crap.user, user 2428 source3/winbindd/winbindd_pam.c domain, user); user 2433 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user)); user 2443 source3/winbindd/winbindd_pam.c if(!*user) { user 2444 source3/winbindd/winbindd_pam.c fstrcpy(user, state->request.data.chng_pswd_auth_crap.user); user 2448 source3/winbindd/winbindd_pam.c (unsigned long)state->pid, domain, user)); user 2485 source3/winbindd/winbindd_pam.c cli, state->mem_ctx, user, new_nt_password, old_nt_hash_enc, user 2494 source3/winbindd/winbindd_pam.c domain, user, user 263 source3/winbindd/winbindd_passdb.c struct samu *user; user 265 source3/winbindd/winbindd_passdb.c if ( (user = samu_new(mem_ctx)) == NULL ) { user 269 source3/winbindd/winbindd_passdb.c if ( !pdb_getsampwsid( user, user_sid ) ) { user 270 source3/winbindd/winbindd_passdb.c TALLOC_FREE( user ); user 274 source3/winbindd/winbindd_passdb.c result = pdb_enum_group_memberships( mem_ctx, user, &groups, &gids, &ngroups ); user 276 source3/winbindd/winbindd_passdb.c TALLOC_FREE( user ); user 274 source3/winbindd/winbindd_proto.h const char *user, user 280 source3/winbindd/winbindd_proto.h const char *user, user 289 source3/winbindd/winbindd_proto.h const char *user, user 558 source3/winbindd/winbindd_proto.h bool parse_domain_user(const char *domuser, fstring domain, fstring user); user 560 source3/winbindd/winbindd_proto.h char **domain, char **user); user 562 source3/winbindd/winbindd_proto.h bool canonicalize_username(fstring username_inout, fstring domain, fstring user); user 563 source3/winbindd/winbindd_proto.h void fill_domain_username(fstring name, const char *domain, const char *user, bool can_assume); user 566 source3/winbindd/winbindd_proto.h const char *user, user 455 source3/winbindd/winbindd_rpc.c struct netr_SamInfo3 *user; user 469 source3/winbindd/winbindd_rpc.c if ( (user = netsamlogon_cache_get( mem_ctx, user_sid )) != NULL ) user 475 source3/winbindd/winbindd_rpc.c sid_compose(&user_info->user_sid, &domain->sid, user->base.rid); user 477 source3/winbindd/winbindd_rpc.c user->base.primary_gid); user 480 source3/winbindd/winbindd_rpc.c user->base.account_name.string); user 482 source3/winbindd/winbindd_rpc.c user->base.full_name.string); user 484 source3/winbindd/winbindd_rpc.c TALLOC_FREE(user); user 1137 source3/winbindd/winbindd_util.c bool parse_domain_user(const char *domuser, fstring domain, fstring user) user 1142 source3/winbindd/winbindd_util.c fstrcpy(user, domuser); user 1148 source3/winbindd/winbindd_util.c user[PTR_DIFF(p, domuser)] = 0; user 1153 source3/winbindd/winbindd_util.c fstrcpy(user, p+1); user 1164 source3/winbindd/winbindd_util.c char **domain, char **user) user 1171 source3/winbindd/winbindd_util.c *user = talloc_strdup(mem_ctx, fstr_user); user 1172 source3/winbindd/winbindd_util.c return ((*domain != NULL) && (*user != NULL)); user 1179 source3/winbindd/winbindd_util.c char *p, *user; user 1181 source3/winbindd/winbindd_util.c user = domuser; user 1192 source3/winbindd/winbindd_util.c user = p; user 1197 source3/winbindd/winbindd_util.c safe_strcpy((char *)buf, user, *len); user 1209 source3/winbindd/winbindd_util.c bool canonicalize_username(fstring username_inout, fstring domain, fstring user) user 1211 source3/winbindd/winbindd_util.c if (!parse_domain_user(username_inout, domain, user)) { user 1216 source3/winbindd/winbindd_util.c user); user 1234 source3/winbindd/winbindd_util.c void fill_domain_username(fstring name, const char *domain, const char *user, bool can_assume) user 1238 source3/winbindd/winbindd_util.c fstrcpy(tmp_user, user); user 1256 source3/winbindd/winbindd_util.c const char *user, user 1261 source3/winbindd/winbindd_util.c tmp_user = talloc_strdup(mem_ctx, user); user 49 source4/auth/credentials/credentials_ntlm.c const char *user, *domain; user 71 source4/auth/credentials/credentials_ntlm.c cli_credentials_get_ntlm_username_domain(cred, mem_ctx, &user, &domain); user 114 source4/auth/credentials/credentials_ntlm.c user, user 56 source4/auth/ntlm/auth_developer.c const char *user; user 58 source4/auth/ntlm/auth_developer.c user = user_info->client.account_name; user 60 source4/auth/ntlm/auth_developer.c if (strncasecmp("NT_STATUS", user, strlen("NT_STATUS")) == 0) { user 61 source4/auth/ntlm/auth_developer.c nt_status = nt_status_string_to_code(user); user 63 source4/auth/ntlm/auth_developer.c error_num = strtoul(user, NULL, 16); user 64 source4/auth/ntlm/auth_developer.c DEBUG(5,("name_to_ntstatus_check_password: Error for user %s was 0x%08X\n", user, error_num)); user 93 source4/auth/ntlm/auth_developer.c server_info->account_name = talloc_asprintf(server_info, "NAME TO NTSTATUS %s ANONYMOUS LOGON", user); user 99 source4/auth/ntlm/auth_developer.c server_info->full_name = talloc_asprintf(server_info, "NAME TO NTSTATUS %s Anonymous Logon", user); user 313 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, bool allow_null_passwords, const char *user) user 322 source4/auth/ntlm/auth_unix.c DEBUG(4,("smb_pam_auth: PAM: Authenticate User: %s\n", user)); user 327 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_auth: PAM: Authentication Error for user %s\n", user)); user 330 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_auth: PAM: Insufficient Credentials for user %s\n", user)); user 333 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_auth: PAM: Authentication Information Unavailable for user %s\n", user)); user 336 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_auth: PAM: Username %s NOT known to Authentication system\n", user)); user 339 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_auth: PAM: One or more authentication modules reports user limit for user %s exceeeded\n", user)); user 342 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_auth: PAM: One or more PAM modules failed to load for user %s\n", user)); user 345 source4/auth/ntlm/auth_unix.c DEBUG(4, ("smb_pam_auth: PAM: User %s Authenticated OK\n", user)); user 348 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_auth: PAM: UNKNOWN ERROR while authenticating user %s\n", user)); user 358 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user) user 362 source4/auth/ntlm/auth_unix.c DEBUG(4,("smb_pam_account: PAM: Account Management for User: %s\n", user)); user 367 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_account: PAM: User %s is valid but password is expired\n", user)); user 370 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_account: PAM: User %s no longer permitted to access system\n", user)); user 373 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_account: PAM: There was an authentication error for user %s\n", user)); user 376 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_account: PAM: User %s is NOT permitted to access system at this time\n", user)); user 379 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_account: PAM: User \"%s\" is NOT known to account management\n", user)); user 382 source4/auth/ntlm/auth_unix.c DEBUG(4, ("smb_pam_account: PAM: Account OK for User: %s\n", user)); user 385 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_account: PAM: UNKNOWN PAM ERROR (%d) during Account Management for User: %s\n", pam_error, user)); user 396 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user) user 405 source4/auth/ntlm/auth_unix.c DEBUG(4,("PAM: Account Management SetCredentials for User: %s\n", user)); user 410 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_setcred: PAM: Credentials not found for user:%s\n", user )); user 413 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_setcred: PAM: Credentials for user: \"%s\" EXPIRED!\n", user )); user 416 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_setcred: PAM: User: \"%s\" is NOT known so can not set credentials!\n", user )); user 419 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_setcred: PAM: Unknown setcredentials error - unable to set credentials for %s\n", user )); user 422 source4/auth/ntlm/auth_unix.c DEBUG(4, ("smb_pam_setcred: PAM: SetCredentials OK for User: %s\n", user)); user 425 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_setcred: PAM: UNKNOWN PAM ERROR (%d) during SetCredentials for User: %s\n", pam_error, user)); user 100 source4/auth/ntlm/auth_winbind.c safe_strcpy(request.data.auth_crap.user, user 90 source4/auth/ntlm/ntlm_check.c const char *user, const char *domain, user 126 source4/auth/ntlm/ntlm_check.c if (!ntv2_owf_gen(part_passwd, user, domain, upper_case_domain, kr)) { user 164 source4/auth/ntlm/ntlm_check.c const char *user, const char *domain, user 196 source4/auth/ntlm/ntlm_check.c if (!ntv2_owf_gen(part_passwd, user, domain, upper_case_domain, kr)) { user 95 source4/auth/ntlmssp/ntlmssp.h char *user; user 117 source4/auth/ntlmssp/ntlmssp_client.c const char *user, *domain; user 184 source4/auth/ntlmssp/ntlmssp_client.c &user, &domain); user 264 source4/auth/ntlmssp/ntlmssp_client.c user, user 42 source4/auth/ntlmssp/ntlmssp_server.c static NTSTATUS ntlmssp_set_username(struct gensec_ntlmssp_state *gensec_ntlmssp_state, const char *user) user 44 source4/auth/ntlmssp/ntlmssp_server.c if (!user) { user 49 source4/auth/ntlmssp/ntlmssp_server.c gensec_ntlmssp_state->user = talloc_strdup(gensec_ntlmssp_state, user); user 50 source4/auth/ntlmssp/ntlmssp_server.c if (!gensec_ntlmssp_state->user) { user 261 source4/auth/ntlmssp/ntlmssp_server.c char *user = NULL; user 279 source4/auth/ntlmssp/ntlmssp_server.c gensec_ntlmssp_state->user = NULL; user 291 source4/auth/ntlmssp/ntlmssp_server.c &user, user 317 source4/auth/ntlmssp/ntlmssp_server.c &user, user 335 source4/auth/ntlmssp/ntlmssp_server.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(gensec_ntlmssp_state, user))) { user 348 source4/auth/ntlmssp/ntlmssp_server.c gensec_ntlmssp_state->user, gensec_ntlmssp_state->domain, gensec_ntlmssp_state->workstation, (unsigned long)gensec_ntlmssp_state->lm_resp.length, (unsigned long)gensec_ntlmssp_state->nt_resp.length)); user 673 source4/auth/ntlmssp/ntlmssp_server.c user_info->client.account_name = gensec_ntlmssp_state->user; user 48 source4/cldap_server/netlogon.c const char *user, user 244 source4/cldap_server/netlogon.c if (!user) { user 245 source4/cldap_server/netlogon.c user = ""; user 251 source4/cldap_server/netlogon.c if (user[0]) { \ user 265 source4/cldap_server/netlogon.c ldb_binary_encode_string(mem_ctx, user), user 269 source4/cldap_server/netlogon.c user, acct_control, ldb_dn_get_linearized(dom_res->msgs[0]->dn), user 345 source4/cldap_server/netlogon.c netlogon->data.nt5_ex.user_name = user; user 370 source4/cldap_server/netlogon.c netlogon->data.nt5.user_name = user; user 391 source4/cldap_server/netlogon.c netlogon->data.nt4.user_name = user; user 414 source4/cldap_server/netlogon.c const char *user = NULL; user 455 source4/cldap_server/netlogon.c user = talloc_strndup(tmp_ctx, user 478 source4/cldap_server/netlogon.c domain, host, user, version, domain_guid)); user 481 source4/cldap_server/netlogon.c user, acct_control, src->addr, user 677 source4/dsdb/samdb/ldb_modules/password_hash.c DATA_BLOB *user; user 763 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName, user 767 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l, user 771 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u, user 775 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName, user 779 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName, user 783 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u, user 787 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l, user 794 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName, user 798 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l, user 802 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u, user 806 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName, user 810 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName, user 814 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u, user 818 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l, user 825 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName, user 832 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName_l, user 835 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName_u, user 841 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName, user 845 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l, user 849 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u, user 859 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName, user 863 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l, user 867 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u, user 872 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName, user 876 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName_l, user 880 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName_u, user 885 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName, user 890 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l, user 895 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u, user 971 source4/dsdb/samdb/ldb_modules/password_hash.c MD5Update(&md5, wdigest[i].user->data, wdigest[i].user->length); user 171 source4/heimdal/kdc/digest.c hdb_entry_ex *user; user 180 source4/heimdal/kdc/digest.c HDB_F_GET_CLIENT, &db, &user); user 185 source4/heimdal/kdc/digest.c ret = hdb_entry_get_password(context, db, &user->entry, password); user 191 source4/heimdal/kdc/digest.c memset(user, 0, sizeof(*user)); user 193 source4/heimdal/kdc/digest.c _kdc_free_ent (context, user); user 220 source4/heimdal/kdc/digest.c hdb_entry_ex *server = NULL, *user = NULL; user 852 source4/heimdal/kdc/digest.c HDB_F_GET_CLIENT, NULL, &user); user 861 source4/heimdal/kdc/digest.c ret = hdb_enctype2key(context, &user->entry, user 1127 source4/heimdal/kdc/digest.c HDB_F_GET_CLIENT, NULL, &user); user 1176 source4/heimdal/kdc/digest.c ret = hdb_enctype2key(context, &user->entry, user 1439 source4/heimdal/kdc/digest.c if (user) user 1440 source4/heimdal/kdc/digest.c _kdc_free_ent (context, user); user 45 source4/heimdal/lib/krb5/get_default_principal.c const char *user = getenv("USER"); user 46 source4/heimdal/lib/krb5/get_default_principal.c if(user == NULL) user 47 source4/heimdal/lib/krb5/get_default_principal.c user = getenv("LOGNAME"); user 48 source4/heimdal/lib/krb5/get_default_principal.c if(user == NULL) user 49 source4/heimdal/lib/krb5/get_default_principal.c user = getenv("USERNAME"); user 50 source4/heimdal/lib/krb5/get_default_principal.c return user; user 64 source4/heimdal/lib/krb5/get_default_principal.c const char *user; user 71 source4/heimdal/lib/krb5/get_default_principal.c user = getlogin(); user 72 source4/heimdal/lib/krb5/get_default_principal.c if(user == NULL) user 73 source4/heimdal/lib/krb5/get_default_principal.c user = get_env_user(); user 74 source4/heimdal/lib/krb5/get_default_principal.c if(user != NULL && strcmp(user, "root") != 0) user 75 source4/heimdal/lib/krb5/get_default_principal.c ret = krb5_make_principal(context, princ, NULL, user, "root", NULL); user 81 source4/heimdal/lib/krb5/get_default_principal.c user = pw->pw_name; user 83 source4/heimdal/lib/krb5/get_default_principal.c user = get_env_user(); user 84 source4/heimdal/lib/krb5/get_default_principal.c if(user == NULL) user 85 source4/heimdal/lib/krb5/get_default_principal.c user = getlogin(); user 87 source4/heimdal/lib/krb5/get_default_principal.c if(user == NULL) { user 93 source4/heimdal/lib/krb5/get_default_principal.c ret = krb5_make_principal(context, princ, NULL, user, NULL); user 343 source4/lib/ldb/nssldb/ldb-grp.c NSS_STATUS _nss_ldb_initgroups_dyn(const char *user, gid_t group, long int *start, long int *size, gid_t **groups, long int limit, int *errnop) user 363 source4/lib/ldb/nssldb/ldb-grp.c filter = talloc_asprintf(mem_res, _LDB_NSS_PWNAM_FILTER, user); user 2575 source4/lib/wmi/wmi_wrap.c WERROR WBEM_ConnectServer(struct com_context *ctx, const char *server, const char *nspace, const char *user, const char *password, user 120 source4/libcli/auth/smbencrypt.c smb_ucs2_t *user; user 155 source4/libcli/auth/smbencrypt.c ret = push_ucs2_talloc(mem_ctx, &user, user_in, &user_byte_len ); user 177 source4/libcli/auth/smbencrypt.c hmac_md5_update((const void *)user, user_byte_len, &ctx); user 183 source4/libcli/auth/smbencrypt.c dump_data(100, (const void *)user, user_byte_len); user 400 source4/libcli/auth/smbencrypt.c const char *user, const char *domain, const uint8_t nt_hash[16], user 412 source4/libcli/auth/smbencrypt.c if (!ntv2_owf_gen(nt_hash, user, domain, true, ntlm_v2_hash)) { user 447 source4/libcli/auth/smbencrypt.c const char *user, const char *domain, user 458 source4/libcli/auth/smbencrypt.c user, domain, nt_hash, server_chal, names_blob, user 536 source4/libcli/cldap/cldap.c if (io->in.user) { user 537 source4/libcli/cldap/cldap.c filter = talloc_asprintf_append_buffer(filter, "(User=%s)", io->in.user); user 159 source4/libcli/cldap/cldap.h const char *user; user 100 source4/libcli/raw/clisession.c smbcli_req_append_string(req, parms->old.in.user, STR_TERMINATE); user 120 source4/libcli/raw/clisession.c smbcli_req_append_string(req, parms->nt1.in.user, STR_TERMINATE); user 315 source4/libcli/raw/interfaces.h const char *user; user 341 source4/libcli/raw/interfaces.h const char *user; user 2106 source4/libcli/raw/interfaces.h char *user; user 287 source4/libcli/smb_composite/sesssetup.c &state->setup.nt1.in.user, user 356 source4/libcli/smb_composite/sesssetup.c &state->setup.old.in.user, user 745 source4/libnet/libnet_become_dc.c s->cldap.io.in.user = NULL; user 52 source4/libnet/libnet_samdump.c struct netr_DELTA_USER *user = delta->delta_union.user; user 53 source4/libnet/libnet_samdump.c const char *username = user->account_name.string; user 58 source4/libnet/libnet_samdump.c user->lm_password_present ? &user->lmpassword : NULL, user 59 source4/libnet/libnet_samdump.c user->acct_flags); user 61 source4/libnet/libnet_samdump.c user->nt_password_present ? &user->ntpassword : NULL, user 62 source4/libnet/libnet_samdump.c user->acct_flags); user 66 source4/libnet/libnet_samdump.c smbpasswd_encode_acb_info(mem_ctx, user->acct_flags), user 67 source4/libnet/libnet_samdump.c (unsigned int)nt_time_to_unix(user->last_password_change)); user 37 source4/libnet/libnet_samdump_keytab.c struct netr_DELTA_USER *user = delta->delta_union.user; user 38 source4/libnet/libnet_samdump_keytab.c const char *username = user->account_name.string; user 42 source4/libnet/libnet_samdump_keytab.c if (!user->nt_password_present) { user 57 source4/libnet/libnet_samdump_keytab.c cli_credentials_set_nt_hash(credentials, &user->ntpassword, CRED_SPECIFIED); user 48 source4/libnet/libnet_samsync.c struct netr_DELTA_USER *user = delta->delta_union.user; user 51 source4/libnet/libnet_samsync.c const char *username = user->account_name.string; user 54 source4/libnet/libnet_samsync.c if (user->lm_password_present) { user 55 source4/libnet/libnet_samsync.c sam_rid_crypt(rid, user->lmpassword.hash, lm_hash.hash, 0); user 56 source4/libnet/libnet_samsync.c user->lmpassword = lm_hash; user 59 source4/libnet/libnet_samsync.c if (user->nt_password_present) { user 60 source4/libnet/libnet_samsync.c sam_rid_crypt(rid, user->ntpassword.hash, nt_hash.hash, 0); user 61 source4/libnet/libnet_samsync.c user->ntpassword = nt_hash; user 65 source4/libnet/libnet_samsync.c if (user->user_private_info.SensitiveData) { user 69 source4/libnet/libnet_samsync.c data.data = user->user_private_info.SensitiveData; user 70 source4/libnet/libnet_samsync.c data.length = user->user_private_info.DataLength; user 72 source4/libnet/libnet_samsync.c user->user_private_info.SensitiveData = data.data; user 73 source4/libnet/libnet_samsync.c user->user_private_info.DataLength = data.length; user 85 source4/libnet/libnet_samsync.c user->lmpassword = lm_hash; user 87 source4/libnet/libnet_samsync.c user->lmpassword = keys.keys.keys2.lmpassword.pwd; user 89 source4/libnet/libnet_samsync.c user->lm_password_present = true; user 94 source4/libnet/libnet_samsync.c user->ntpassword = nt_hash; user 96 source4/libnet/libnet_samsync.c user->ntpassword = keys.keys.keys2.ntpassword.pwd; user 98 source4/libnet/libnet_samsync.c user->nt_password_present = true; user 242 source4/libnet/libnet_samsync_ldb.c struct netr_DELTA_USER *user = delta->delta_union.user; user 318 source4/libnet/libnet_samsync_ldb.c cn_name = talloc_strdup(mem_ctx, user->account_name.string); user 323 source4/libnet/libnet_samsync_ldb.c if (user->field) { \ user 325 source4/libnet/libnet_samsync_ldb.c attrib, user->field); \ user 350 source4/libnet/libnet_samsync_ldb.c if (samdb_msg_add_logon_hours(state->sam_ldb, mem_ctx, msg, "logonHours", &user->logon_hours) != 0) { user 361 source4/libnet/libnet_samsync_ldb.c "userAccountControl", user->acct_flags) != 0) { user 371 source4/libnet/libnet_samsync_ldb.c if (user->lm_password_present) { user 373 source4/libnet/libnet_samsync_ldb.c "dBCSPwd", &user->lmpassword); user 378 source4/libnet/libnet_samsync_ldb.c if (user->nt_password_present) { user 380 source4/libnet/libnet_samsync_ldb.c "unicodePwd", &user->ntpassword); user 388 source4/libnet/libnet_samsync_ldb.c if (samdb_msg_add_parameters(state->sam_ldb, mem_ctx, msg, "userParameters", &user->parameters) != 0) { user 409 source4/libnet/libnet_samsync_ldb.c acb = user->acct_flags; user 264 source4/libnet/libnet_unbecome_dc.c s->cldap.io.in.user = NULL; user 500 source4/libnet/libnet_user.c struct samr_UserInfo21 *user; user 506 source4/libnet/libnet_user.c user = &info->out.info.info21; user 510 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, account_name, USERMOD_FIELD_ACCOUNT_NAME); user 513 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, full_name, USERMOD_FIELD_FULL_NAME); user 516 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, description, USERMOD_FIELD_DESCRIPTION); user 519 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, comment, USERMOD_FIELD_COMMENT); user 522 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, home_directory, USERMOD_FIELD_HOME_DIRECTORY); user 525 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, home_drive, USERMOD_FIELD_HOME_DRIVE); user 528 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, logon_script, USERMOD_FIELD_LOGON_SCRIPT); user 531 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, profile_path, USERMOD_FIELD_PROFILE_PATH); user 534 source4/libnet/libnet_user.c SET_FIELD_NTTIME(r->in, user, mod, acct_expiry, USERMOD_FIELD_ACCT_EXPIRY); user 537 source4/libnet/libnet_user.c SET_FIELD_ACCT_FLAGS(r->in, user, mod, acct_flags, USERMOD_FIELD_ACCT_FLAGS); user 143 source4/ntvfs/cifs/vfs_cifs.c const char *host, *user, *pass, *domain, *remote_share; user 156 source4/ntvfs/cifs/vfs_cifs.c user = share_string_option(scfg, CIFS_USER, NULL); user 178 source4/ntvfs/cifs/vfs_cifs.c if (user && pass) { user 185 source4/ntvfs/cifs/vfs_cifs.c cli_credentials_set_username(credentials, user, CRED_SPECIFIED); user 161 source4/ntvfs/smb2/vfs_smb2.c const char *host, *user, *pass, *domain, *remote_share; user 174 source4/ntvfs/smb2/vfs_smb2.c user = share_string_option(scfg, SMB2_USER, NULL); user 196 source4/ntvfs/smb2/vfs_smb2.c if (user && pass) { user 203 source4/ntvfs/smb2/vfs_smb2.c cli_credentials_set_username(credentials, user, CRED_SPECIFIED); user 1086 source4/param/loadparm.c const char *user, const char *pszHomedir) user 1103 source4/param/loadparm.c service->comment = talloc_asprintf(service, "Home directory of %s", user); user 1109 source4/param/loadparm.c pszHomename, user, service->szPath)); user 231 source4/param/param.h const char *user, const char *pszHomedir); user 44 source4/rpc_server/remote/dcesrv_remote.c const char *user, *pass, *domain; user 63 source4/rpc_server/remote/dcesrv_remote.c user = lp_parm_string(dce_call->conn->dce_ctx->lp_ctx, NULL, "dcerpc_remote", "user"); user 73 source4/rpc_server/remote/dcesrv_remote.c if (user && pass) { user 80 source4/rpc_server/remote/dcesrv_remote.c cli_credentials_set_username(credentials, user, CRED_SPECIFIED); user 1379 source4/smb_server/smb/reply.c req_push_str(req, req->out.ptr+12, lpq->retq.out.queue[i].user, 16, STR_ASCII); user 1892 source4/smb_server/smb/reply.c p += req_pull_string(&req->in.bufinfo, &io->old.in.user, p, -1, STR_TERMINATE); user 1942 source4/smb_server/smb/reply.c p += req_pull_string(&req->in.bufinfo, &io->nt1.in.user, p, -1, STR_TERMINATE); user 137 source4/smb_server/smb/sesssetup.c user_info->client.account_name = sess->old.in.user; user 228 source4/smb_server/smb/sesssetup.c if (sess->nt1.in.user && *sess->nt1.in.user) { user 263 source4/smb_server/smb/sesssetup.c user_info->client.account_name = sess->nt1.in.user; user 67 source4/torture/ldap/cldap.c search.in.user = "Administrator"; user 94 source4/torture/ldap/cldap.c search.in.user = NULL; user 102 source4/torture/ldap/cldap.c search.in.user = "Administrator"; user 106 source4/torture/ldap/cldap.c CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user); user 115 source4/torture/ldap/cldap.c search.in.user = NULL; user 123 source4/torture/ldap/cldap.c search.in.user = "Administrator"; user 127 source4/torture/ldap/cldap.c CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user); user 142 source4/torture/ldap/cldap.c search.in.user = NULL; user 165 source4/torture/ldap/cldap.c search.in.user = "Administrator"; user 173 source4/torture/ldap/cldap.c search.in.user = NULL; user 183 source4/torture/ldap/cldap.c search.in.user = "Administrator"; user 187 source4/torture/ldap/cldap.c CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user); user 190 source4/torture/ldap/cldap.c search.in.user = "___no_such_user___"; user 193 source4/torture/ldap/cldap.c CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user); user 183 source4/torture/libnet/libnet_user.c struct policy_handle *handle, const char* user) user 192 source4/torture/libnet/libnet_user.c username.string = user; user 207 source4/torture/libnet/libnet_user.c printf("User (%s) already exists - attempting to delete and recreate account again\n", user); user 39 source4/torture/libnet/userinfo.c struct libnet_rpc_userinfo user; user 44 source4/torture/libnet/userinfo.c user.in.domain_handle = *domain_handle; user 45 source4/torture/libnet/userinfo.c user.in.sid = dom_sid_string(mem_ctx, user_sid); user 46 source4/torture/libnet/userinfo.c user.in.level = level; /* this should be extended */ user 49 source4/torture/libnet/userinfo.c status = libnet_rpc_userinfo(p, mem_ctx, &user); user 55 source4/torture/libnet/userinfo.c ZERO_STRUCT(user); user 57 source4/torture/libnet/userinfo.c user.in.domain_handle = *domain_handle; user 58 source4/torture/libnet/userinfo.c user.in.sid = NULL; user 59 source4/torture/libnet/userinfo.c user.in.username = TEST_USERNAME; user 60 source4/torture/libnet/userinfo.c user.in.level = level; user 63 source4/torture/libnet/userinfo.c status = libnet_rpc_userinfo(p, mem_ctx, &user); user 81 source4/torture/libnet/userinfo.c struct libnet_rpc_userinfo user; user 86 source4/torture/libnet/userinfo.c user.in.domain_handle = *domain_handle; user 87 source4/torture/libnet/userinfo.c user.in.sid = dom_sid_string(mem_ctx, user_sid); user 88 source4/torture/libnet/userinfo.c user.in.level = level; /* this should be extended */ user 92 source4/torture/libnet/userinfo.c c = libnet_rpc_userinfo_send(p, &user, msg_handler); user 98 source4/torture/libnet/userinfo.c status = libnet_rpc_userinfo_recv(c, mem_ctx, &user); user 104 source4/torture/libnet/userinfo.c ZERO_STRUCT(user); user 106 source4/torture/libnet/userinfo.c user.in.domain_handle = *domain_handle; user 107 source4/torture/libnet/userinfo.c user.in.sid = NULL; user 108 source4/torture/libnet/userinfo.c user.in.username = TEST_USERNAME; user 109 source4/torture/libnet/userinfo.c user.in.level = level; user 113 source4/torture/libnet/userinfo.c c = libnet_rpc_userinfo_send(p, &user, msg_handler); user 119 source4/torture/libnet/userinfo.c status = libnet_rpc_userinfo_recv(c, mem_ctx, &user); user 37 source4/torture/libnet/userman.c struct libnet_rpc_useradd user; user 39 source4/torture/libnet/userman.c user.in.domain_handle = *domain_handle; user 40 source4/torture/libnet/userman.c user.in.username = name; user 44 source4/torture/libnet/userman.c status = libnet_rpc_useradd(p, mem_ctx, &user); user 59 source4/torture/libnet/userman.c struct libnet_rpc_useradd user; user 61 source4/torture/libnet/userman.c user.in.domain_handle = *handle; user 62 source4/torture/libnet/userman.c user.in.username = username; user 66 source4/torture/libnet/userman.c c = libnet_rpc_useradd_send(p, &user, msg_handler); user 72 source4/torture/libnet/userman.c status = libnet_rpc_useradd_recv(c, mem_ctx, &user); user 219 source4/torture/libnet/userman.c struct libnet_rpc_userdel user; user 221 source4/torture/libnet/userman.c user.in.domain_handle = *handle; user 222 source4/torture/libnet/userman.c user.in.username = username; user 224 source4/torture/libnet/userman.c status = libnet_rpc_userdel(p, mem_ctx, &user); user 2792 source4/torture/rpc/samba3rpc.c userlevel1.user = cli_credentials_get_username(cmdline_credentials); user 5195 source4/torture/rpc/samr.c #define STRING_EQUAL_QUERY(s1, s2, user) \ user 5200 source4/torture/rpc/samr.c #s1, user.string, s1.string, s2.string, __location__); \ user 5203 source4/torture/rpc/samr.c #define INT_EQUAL_QUERY(s1, s2, user) \ user 5206 source4/torture/rpc/samr.c #s1, user.string, (unsigned long long)s1, (unsigned long long)s2, __location__); \ user 431 source4/torture/rpc/samsync.c struct netr_DELTA_USER *user = delta->delta_union.user; user 438 source4/torture/rpc/samsync.c const char *username = user->account_name.string; user 470 source4/torture/rpc/samsync.c TEST_SEC_DESC_EQUAL(user->sdbuf, samr, &user_handle); user 504 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.account_name, user->account_name); user 505 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.full_name, user->full_name); user 506 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.rid, user->rid); user 507 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.primary_gid, user->primary_gid); user 508 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.home_directory, user->home_directory); user 509 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.home_drive, user->home_drive); user 510 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.logon_script, user->logon_script); user 511 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.description, user->description); user 512 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.workstations, user->workstations); user 514 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(info->info21.last_logon, user->last_logon); user 515 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(info->info21.last_logoff, user->last_logoff); user 519 source4/torture/rpc/samsync.c user->logon_hours.units_per_week); user 521 source4/torture/rpc/samsync.c if (memcmp(info->info21.logon_hours.bits, user->logon_hours.bits, user 529 source4/torture/rpc/samsync.c user->bad_password_count); user 531 source4/torture/rpc/samsync.c user->logon_count); user 534 source4/torture/rpc/samsync.c user->last_password_change); user 536 source4/torture/rpc/samsync.c user->acct_expiry); user 538 source4/torture/rpc/samsync.c TEST_INT_EQUAL((info->info21.acct_flags & ~ACB_PW_EXPIRED), user->acct_flags); user 539 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_PWNOEXP) { user 554 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.nt_password_set, user->nt_password_present); user 555 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.lm_password_set, user->lm_password_present); user 556 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.password_expired, user->password_expired); user 558 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.comment, user->comment); user 559 source4/torture/rpc/samsync.c TEST_BINARY_STRING_EQUAL(info->info21.parameters, user->parameters); user 561 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.country_code, user->country_code); user 562 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.code_page, user->code_page); user 564 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.profile_path, user->profile_path); user 566 source4/torture/rpc/samsync.c if (user->lm_password_present) { user 567 source4/torture/rpc/samsync.c sam_rid_crypt(rid, user->lmpassword.hash, lm_hash.hash, 0); user 570 source4/torture/rpc/samsync.c if (user->nt_password_present) { user 571 source4/torture/rpc/samsync.c sam_rid_crypt(rid, user->ntpassword.hash, nt_hash.hash, 0); user 575 source4/torture/rpc/samsync.c if (user->user_private_info.SensitiveData) { user 579 source4/torture/rpc/samsync.c data.data = user->user_private_info.SensitiveData; user 580 source4/torture/rpc/samsync.c data.length = user->user_private_info.DataLength; user 619 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_DISABLED) { user 623 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_WSTRUST) { user 627 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_SVRTRUST) { user 631 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_DOMTRUST) { user 635 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_DOMTRUST) { user 639 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_AUTOLOCK) { user 654 source4/torture/rpc/samsync.c TEST_INT_EQUAL(user->rid, info3->base.rid); user 655 source4/torture/rpc/samsync.c TEST_INT_EQUAL(user->primary_gid, info3->base.primary_gid); user 658 source4/torture/rpc/samsync.c TEST_INT_EQUAL(user->acct_flags, info3->base.acct_flags); user 662 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->account_name, info3->base.account_name); user 666 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->full_name, info3->base.full_name); user 668 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->logon_script, info3->base.logon_script); user 669 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->profile_path, info3->base.profile_path); user 670 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->home_directory, info3->base.home_directory); user 671 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->home_drive, info3->base.home_drive); user 672 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->logon_script, info3->base.logon_script); user 675 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(user->last_logon, info3->base.last_logon); user 676 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(user->acct_expiry, info3->base.acct_expiry); user 677 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(user->last_password_change, info3->base.last_password_change); user 686 source4/torture/rpc/samsync.c if (!((user->last_logoff == 0) user 688 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(user->last_logoff, info3->base.last_logoff); user 1754 source4/torture/rpc/spoolss.c userlevel1.user = "spottyfoot!"; user 64 source4/torture/rpc/spoolss_win.c ul_1.user = "username"; user 89 source4/torture/rpc/spoolss_win.c ul_1.user = "username"; user 156 source4/torture/rpc/srvsvc.c r.in.user = talloc_asprintf(tctx,"Administrator"); user 241 source4/torture/rpc/srvsvc.c r.in.user = talloc_asprintf(tctx,"%s","Administrator"); user 355 source4/torture/rpc/srvsvc.c r.in.user = NULL; user 408 source4/torture/rpc/srvsvc.c r.in.user = NULL; user 217 source4/torture/rpc/wkssvc.c const char *user = cli_credentials_get_username(creds); user 231 source4/torture/rpc/wkssvc.c { user, 0, WERR_INVALID_PARAM }, user 232 source4/torture/rpc/wkssvc.c { user, 1, WERR_INVALID_PARAM }, user 233 source4/torture/rpc/wkssvc.c { user, 1101, WERR_INVALID_PARAM }, user 1099 source4/torture/rpc/wkssvc.c const char *user = cli_credentials_get_username(creds); user 1104 source4/torture/rpc/wkssvc.c user); user 1127 source4/torture/rpc/wkssvc.c const char *user = cli_credentials_get_username(creds); user 1132 source4/torture/rpc/wkssvc.c user); user 861 source4/torture/winbind/struct_based.c fstring user) user 870 source4/torture/winbind/struct_based.c fstrcpy(user, domuser); user 874 source4/torture/winbind/struct_based.c fstrcpy(user, domuser); user 880 source4/torture/winbind/struct_based.c fstrcpy(user, p+1); user 130 source4/utils/ntlm_auth.c char **user, char winbind_separator) user 139 source4/utils/ntlm_auth.c *user = smb_xstrdup(p+1); user 176 source4/utils/ntlm_auth.c static bool check_plaintext_auth(const char *user, const char *pass, user 254 source4/utils/ntlm_auth.c char *user, *pass; user 255 source4/utils/ntlm_auth.c user=buf; user 267 source4/utils/ntlm_auth.c rfc1738_unescape(user); user 271 source4/utils/ntlm_auth.c if (check_plaintext_auth(user, pass, false)) { user 1162 source4/utils/ntlm_auth.c char *user; user 1164 source4/utils/ntlm_auth.c asprintf(&user, "%s%c%s", opt_domain, *lp_winbind_separator(cmdline_lp_ctx), opt_username); user 1165 source4/utils/ntlm_auth.c if (!check_plaintext_auth(user, opt_password, true)) { user 64 source4/winbind/wb_pam_auth.c const char *user, user 91 source4/winbind/wb_pam_auth.c ninfo->identity_info.account_name.string = talloc_strdup(state, user); user 221 source4/winbind/wb_pam_auth.c const char *user, *domain; user 240 source4/winbind/wb_pam_auth.c &user, &domain); user 259 source4/winbind/wb_pam_auth.c domain, user, workstation, user 509 source4/winbind/wb_samba3_cmd.c s3call->request.data.auth_crap.user, user 576 source4/winbind/wb_samba3_cmd.c char *user, *domain; user 579 source4/winbind/wb_samba3_cmd.c s3call->request.data.auth.user, user 580 source4/winbind/wb_samba3_cmd.c &domain, &user)) { user 590 source4/winbind/wb_samba3_cmd.c cli_credentials_set_username(credentials, user, CRED_SPECIFIED); user 32 source4/winbind/wb_utils.c char **domain, char **user) user 44 source4/winbind/wb_utils.c *user = talloc_strdup(mem_ctx, domuser); user 46 source4/winbind/wb_utils.c return ((*domain != NULL) && (*user != NULL));