username 17 examples/libsmbclient/get_auth_data_fn.h char username[256] = { '\0' }; username 25 examples/libsmbclient/get_auth_data_fn.h *username != '\0') username 28 examples/libsmbclient/get_auth_data_fn.h strncpy(pUsername, username, maxLenUsername - 1); username 78 examples/libsmbclient/get_auth_data_fn.h strncpy(username, pUsername, sizeof(username) - 1); username 14 examples/libsmbclient/testbrowse2.c char *username = "guest"; username 87 examples/libsmbclient/testbrowse2.c strncpy(user, username, userlen - 1); user[userlen - 1] = 0; username 599 examples/libsmbclient/tree.c char *workgroup, int wgmaxlen, char *username, int unmaxlen, username 603 examples/libsmbclient/tree.c strncpy(username, "test", unmaxlen); username 28 nsswitch/libwbclient/wbc_pam.c wbcErr wbcAuthenticateUser(const char *username, username 36 nsswitch/libwbclient/wbc_pam.c params.account_name = username; username 547 nsswitch/libwbclient/wbc_pam.c if (!params || !params->username) { username 564 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.logoff.user, params->username, username 624 nsswitch/libwbclient/wbc_pam.c wbcErr wbcLogoffUser(const char *username, username 634 nsswitch/libwbclient/wbc_pam.c if (!username) { username 642 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.logoff.user, username, username 864 nsswitch/libwbclient/wbc_pam.c wbcErr wbcChangeUserPassword(const char *username, username 873 nsswitch/libwbclient/wbc_pam.c params.account_name = username; username 918 nsswitch/libwbclient/wbc_pam.c if (!params->username) { username 945 nsswitch/libwbclient/wbc_pam.c params->username, username 148 nsswitch/libwbclient/wbc_pwd.c strncpy(request.data.username, name, sizeof(request.data.username)-1); username 581 nsswitch/libwbclient/wbc_pwd.c strncpy(request.data.username, account, sizeof(request.data.username)-1); username 250 nsswitch/libwbclient/wbclient.h const char *username; username 440 nsswitch/libwbclient/wbclient.h const char *username; username 1044 nsswitch/libwbclient/wbclient.h wbcErr wbcAuthenticateUser(const char *username, username 1087 nsswitch/libwbclient/wbclient.h wbcErr wbcLogoffUser(const char *username, username 1111 nsswitch/libwbclient/wbclient.h wbcErr wbcChangeUserPassword(const char *username, username 768 nsswitch/pam_winbind.c const char *username, username 777 nsswitch/pam_winbind.c return pam_winbind_request_log(ctx, ret, username, fn); username 793 nsswitch/pam_winbind.c return pam_winbind_request_log(ctx, ret, username, fn); username 799 nsswitch/pam_winbind.c return pam_winbind_request_log(ctx, ret, username, fn); username 803 nsswitch/pam_winbind.c return pam_winbind_request_log(ctx, ret, username, fn); username 1378 nsswitch/pam_winbind.c const char *username, username 1390 nsswitch/pam_winbind.c username); username 1400 nsswitch/pam_winbind.c username); username 1415 nsswitch/pam_winbind.c const char *username, username 1426 nsswitch/pam_winbind.c username); username 1582 nsswitch/pam_winbind.c const char *username; username 1588 nsswitch/pam_winbind.c ret = pam_get_user(ctx->pamh, &username, NULL); username 1589 nsswitch/pam_winbind.c if ((ret != PAM_SUCCESS) || (!username)) { username 1594 nsswitch/pam_winbind.c pwd = getpwnam(username); username 1766 nsswitch/pam_winbind.c logon.username = user; username 2520 nsswitch/pam_winbind.c logoff.username = user; username 2597 nsswitch/pam_winbind.c const char *username; username 2616 nsswitch/pam_winbind.c retval = pam_get_user(pamh, &username, NULL); username 2617 nsswitch/pam_winbind.c if ((retval != PAM_SUCCESS) || (!username)) { username 2629 nsswitch/pam_winbind.c if (username[0] == '_') { username 2630 nsswitch/pam_winbind.c uid_t id = atoi(&username[1]); username 2641 nsswitch/pam_winbind.c if ((real_username = strdup(username)) == NULL) { username 2808 nsswitch/pam_winbind.c const char *username; username 2822 nsswitch/pam_winbind.c ret = pam_get_user(pamh, &username, NULL); username 2823 nsswitch/pam_winbind.c if ((ret != PAM_SUCCESS) || (!username)) { username 2831 nsswitch/pam_winbind.c ret = valid_user(ctx, username); username 2840 nsswitch/pam_winbind.c username); username 2861 nsswitch/pam_winbind.c username); username 2869 nsswitch/pam_winbind.c "user '%s' granted access", username); username 2877 nsswitch/pam_winbind.c "user '%s' granted access", username); username 2884 nsswitch/pam_winbind.c ret, username); username 1150 nsswitch/wbinfo.c const char *username) username 1155 nsswitch/wbinfo.c prompt = talloc_asprintf(talloc_tos(), "Enter %s's ", username); username 1178 nsswitch/wbinfo.c static bool wbinfo_auth_krb5(char *username, const char *cctype, uint32 flags) username 1191 nsswitch/wbinfo.c p = strchr(username, '%'); username 1195 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); username 1199 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); username 1200 nsswitch/wbinfo.c password = wbinfo_prompt_pass(NULL, username); username 1216 nsswitch/wbinfo.c username, (result == NSS_STATUS_SUCCESS) ? "succeeded" : "failed", cctype); username 1244 nsswitch/wbinfo.c static bool wbinfo_auth(char *username) username 1252 nsswitch/wbinfo.c if ((s = SMB_STRDUP(username)) == NULL) { username 1261 nsswitch/wbinfo.c password = wbinfo_prompt_pass(NULL, username); username 1287 nsswitch/wbinfo.c static bool wbinfo_auth_crap(char *username) username 1300 nsswitch/wbinfo.c p = strchr(username, '%'); username 1306 nsswitch/wbinfo.c pass = wbinfo_prompt_pass(NULL, username); username 1309 nsswitch/wbinfo.c parse_wbinfo_domain_user(username, name_domain, name_user); username 1389 nsswitch/wbinfo.c static bool wbinfo_klog(char *username) username 1401 nsswitch/wbinfo.c p = strchr(username, '%'); username 1405 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); username 1409 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username); username 1507 nsswitch/wbinfo.c static bool wbinfo_set_auth_user(char *username) username 1515 nsswitch/wbinfo.c parse_wbinfo_domain_user(username, domain, user); username 1611 nsswitch/wbinfo.c static bool wbinfo_change_user_password(const char *username) username 1617 nsswitch/wbinfo.c old_password = wbinfo_prompt_pass("old", username); username 1618 nsswitch/wbinfo.c new_password = wbinfo_prompt_pass("new", username); username 1620 nsswitch/wbinfo.c wbc_status = wbcChangeUserPassword(username, old_password, new_password); username 1624 nsswitch/wbinfo.c d_printf("Password change for user %s %s\n", username, username 140 nsswitch/wbinfo4.c fstrcpy(request.data.username, user); username 258 nsswitch/wbinfo4.c fstrcpy(request.data.username, user); username 720 nsswitch/wbinfo4.c static bool wbinfo_auth_krb5(char *username, const char *cctype, uint32_t flags) username 732 nsswitch/wbinfo4.c p = strchr(username, '%'); username 736 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); username 740 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); username 753 nsswitch/wbinfo4.c username, (result == NSS_STATUS_SUCCESS) ? "succeeded" : "failed", cctype); username 781 nsswitch/wbinfo4.c static bool wbinfo_auth(char *username) username 793 nsswitch/wbinfo4.c p = strchr(username, '%'); username 797 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); username 801 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username); username 821 nsswitch/wbinfo4.c static bool wbinfo_auth_crap(struct loadparm_context *lp_ctx, char *username) username 836 nsswitch/wbinfo4.c p = strchr(username, '%'); username 843 nsswitch/wbinfo4.c parse_wbinfo_domain_user(username, name_domain, name_user); username 367 nsswitch/winbind_nss_aix.c STRCPY_RETNULL(request.data.username, r_user); username 443 nsswitch/winbind_nss_aix.c STRCPY_RETNULL(request.data.username, name); username 515 nsswitch/winbind_nss_irix.c strncpy(request->data.username, key, username 516 nsswitch/winbind_nss_irix.c sizeof(request->data.username) - 1); username 517 nsswitch/winbind_nss_irix.c request->data.username[sizeof(request->data.username) - 1] = '\0'; username 618 nsswitch/winbind_nss_linux.c strncpy(request.data.username, name, username 619 nsswitch/winbind_nss_linux.c sizeof(request.data.username) - 1); username 620 nsswitch/winbind_nss_linux.c request.data.username username 621 nsswitch/winbind_nss_linux.c [sizeof(request.data.username) - 1] = '\0'; username 1044 nsswitch/winbind_nss_linux.c strncpy(request.data.username, user, username 1045 nsswitch/winbind_nss_linux.c sizeof(request.data.username) - 1); username 230 nsswitch/winbind_nss_netbsd.c strncpy(request.data.username, uname, username 231 nsswitch/winbind_nss_netbsd.c sizeof(request.data.username) - 1); username 62 nsswitch/winbind_nss_solaris.c const char *username; username 289 nsswitch/winbind_nss_solaris.c _nss_winbind_initgroups_dyn(gmem->username, username 241 nsswitch/winbind_struct_protocol.h fstring username; /* getpwnam */ username 296 nsswitch/winbind_struct_protocol.h fstring username; username 42 source3/auth/auth_sam.c const char *username = pdb_get_username(sampass); username 47 source3/auth/auth_sam.c DEBUG(3,("Account for user '%s' has no password and null passwords are allowed.\n", username)); username 50 source3/auth/auth_sam.c DEBUG(3,("Account for user '%s' has no password and null passwords are NOT allowed.\n", username)); username 61 source3/auth/auth_sam.c username, username 526 source3/auth/auth_util.c static char *sanitize_username(TALLOC_CTX *mem_ctx, const char *username) username 530 source3/auth/auth_util.c alpha_strcpy(tmp, username, ". _-$", sizeof(tmp)); username 539 source3/auth/auth_util.c static bool is_our_machine_account(const char *username) username 543 source3/auth/auth_util.c size_t ulen = strlen(username); username 545 source3/auth/auth_util.c if (ulen == 0 || username[ulen-1] != '$') { username 548 source3/auth/auth_util.c truncname = SMB_STRDUP(username); username 568 source3/auth/auth_util.c const char *username = pdb_get_username(sampass); username 575 source3/auth/auth_util.c if ( !(pwd = getpwnam_alloc(result, username)) ) { username 598 source3/auth/auth_util.c if (IS_DC && is_our_machine_account(username)) { username 624 source3/auth/auth_util.c username)); username 820 source3/auth/auth_util.c NTSTATUS create_token_from_username(TALLOC_CTX *mem_ctx, const char *username, username 843 source3/auth/auth_util.c if (!lookup_name_smbconf(tmp_ctx, username, LOOKUP_NAME_ALL, username 845 source3/auth/auth_util.c DEBUG(1, ("lookup_name_smbconf for %s failed\n", username)); username 850 source3/auth/auth_util.c DEBUG(1, ("%s is a %s, not a user\n", username, username 873 source3/auth/auth_util.c sid_string_dbg(&user_sid), username)); username 874 source3/auth/auth_util.c DEBUGADD(1, ("Fall back to unix user %s\n", username)); username 883 source3/auth/auth_util.c username)); username 884 source3/auth/auth_util.c DEBUGADD(1, ("Fall back to unix user %s\n", username)); username 941 source3/auth/auth_util.c username, sid_string_dbg(&user_sid))); username 951 source3/auth/auth_util.c (unsigned int)*uid, username)); username 955 source3/auth/auth_util.c if (!getgroups_unix_user(tmp_ctx, username, pass->pw_gid, username 958 source3/auth/auth_util.c username)); username 998 source3/auth/auth_util.c username, sid_string_dbg(&user_sid))); username 1024 source3/auth/auth_util.c *found_username = talloc_strdup(mem_ctx, username); username 1077 source3/auth/auth_util.c bool user_in_group_sid(const char *username, const DOM_SID *group_sid) username 1094 source3/auth/auth_util.c status = create_token_from_username(mem_ctx, username, False, username 1099 source3/auth/auth_util.c DEBUG(10, ("could not create token for %s\n", username)); username 1110 source3/auth/auth_util.c bool user_in_group(const char *username, const char *groupname) username 1131 source3/auth/auth_util.c return user_in_group_sid(username, &group_sid); username 1317 source3/auth/auth_util.c const char *username, username 1325 source3/auth/auth_util.c pwd = getpwnam_alloc(talloc_tos(), username); username 1482 source3/auth/auth_util.c const char *username, username 1493 source3/auth/auth_util.c fstrcpy( lower_username, username ); username 1537 source3/auth/auth_util.c fstring username; username 1547 source3/auth/auth_util.c fstrcpy( username, domuser ); username 1549 source3/auth/auth_util.c p = strchr_m( username, *lp_winbind_separator() ); username 1566 source3/auth/auth_util.c domain = username; username 1582 source3/auth/auth_util.c fstrcpy( username, strip_username ); username 1587 source3/auth/auth_util.c pw = Get_Pwnam_alloc(mem_ctx, username); username 1596 source3/auth/auth_util.c if (username[strlen(username)-1] == '$') username 1599 source3/auth/auth_util.c _smb_create_user(NULL, username, NULL); username 1600 source3/auth/auth_util.c pw = Get_Pwnam_alloc(mem_ctx, username); username 191 source3/auth/pampass.c static void pwd_sub(char *buf, const char *username, const char *oldpass, const char *newpass) username 193 source3/auth/pampass.c fstring_sub(buf, "%u", username); username 244 source3/client/client.c static void send_message(const char *username) username 249 source3/client/client.c if (!cli_message_start(cli, desthost, username, &grp_id)) { username 186 source3/client/mount.cifs.c char *username = NULL; username 190 source3/client/mount.cifs.c username = password->pw_name; username 192 source3/client/mount.cifs.c return username; username 85 source3/client/smbspool.c char *username, /* Username */ username 192 source3/client/smbspool.c username = uri_unescape_alloc(tmp); username 194 source3/client/smbspool.c if ((username = getenv("AUTH_USERNAME")) == NULL) { username 195 source3/client/smbspool.c username = null_str; username 262 source3/client/smbspool.c username, password, argv[2], &need_auth); username 391 source3/client/smbspool.c const char *username, username 419 source3/client/smbspool.c nt_status = cli_session_setup(cli, username, username 453 source3/client/smbspool.c username, username 476 source3/client/smbspool.c const char *username, /* I - Username */ username 498 source3/client/smbspool.c if (username && *username && !getenv("KRB5CCNAME")) { username 499 source3/client/smbspool.c cli = smb_complete_connection(myname, server, port, username, username 595 source3/client/tree.c char *workgroup, int wgmaxlen, char *username, int unmaxlen, username 599 source3/client/tree.c strncpy(username, "test", unmaxlen); username 256 source3/include/libsmb_internal.h const char * username); username 410 source3/include/libsmbclient.h const char * workgroup, const char * username); username 430 source3/include/libsmbclient.h const char * username); username 122 source3/include/passdb.h const char *username; /* UNIX username string */ username 223 source3/include/passdb.h NTSTATUS (*getsampwnam)(struct pdb_methods *, struct samu *sam_acct, const char *username); username 238 source3/include/passdb.h NTSTATUS (*delete_sam_account)(struct pdb_methods *, struct samu *username); username 49 source3/include/popt_common.h char *username; username 111 source3/include/proto.h NTSTATUS create_token_from_username(TALLOC_CTX *mem_ctx, const char *username, username 116 source3/include/proto.h bool user_in_group_sid(const char *username, const DOM_SID *group_sid); username 117 source3/include/proto.h bool user_in_group(const char *username, const char *groupname); username 122 source3/include/proto.h const char *username, username 307 source3/include/proto.h char *afs_createtoken_str(const char *username, const char *cell); username 310 source3/include/proto.h char *afs_createtoken_str(const char *username, const char *cell); username 791 source3/include/proto.h const char *username, username 1085 source3/include/proto.h const char *username); username 2357 source3/include/proto.h const char *username, username 2424 source3/include/proto.h NTSTATUS cli_set_username(struct cli_state *cli, const char *username); username 2426 source3/include/proto.h NTSTATUS cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password); username 2589 source3/include/proto.h const char *username, username 2615 source3/include/proto.h int cli_message_start_build(struct cli_state *cli, const char *host, const char *username); username 2616 source3/include/proto.h bool cli_message_start(struct cli_state *cli, const char *host, const char *username, username 2747 source3/include/proto.h uint32_t contime, const char *username, username 3095 source3/include/proto.h const char *username, username 3161 source3/include/proto.h bool netsamlogon_cache_store(const char *username, struct netr_SamInfo3 *info3); username 4511 source3/include/proto.h bool pdb_set_username(struct samu *sampass, const char *username, enum pdb_value_state flag); username 4545 source3/include/proto.h bool pdb_getsampwnam(struct samu *sam_acct, const char *username) ; username 4707 source3/include/proto.h void secrets_fetch_ipc_userpass(char **username, char **domain, char **password); username 5221 source3/include/proto.h const char *username, username 5229 source3/include/proto.h const char *username, username 5240 source3/include/proto.h const char *username, username 5283 source3/include/proto.h const char *username, username 5293 source3/include/proto.h const char *username, username 5318 source3/include/proto.h const char *username, username 5326 source3/include/proto.h const char *username, username 5345 source3/include/proto.h const char *username, username 5358 source3/include/proto.h const char *username, username 5438 source3/include/proto.h const char *username, username 5443 source3/include/proto.h const char *username, username 5450 source3/include/proto.h const char *username, username 6988 source3/include/proto.h int add_home_service(const char *service, const char *username, const char *homedir); username 7011 source3/include/proto.h bool token_contains_name_in_list(const char *username, username 7016 source3/include/proto.h bool user_ok_token(const char *username, const char *domain, username 7018 source3/include/proto.h bool is_share_read_only_for_token(const char *username, username 7098 source3/include/proto.h void sys_utmp_claim(const char *username, const char *hostname, username 7101 source3/include/proto.h void sys_utmp_yield(const char *username, const char *hostname, username 7104 source3/include/proto.h void sys_utmp_yield(const char *username, const char *hostname, username 7107 source3/include/proto.h void sys_utmp_claim(const char *username, const char *hostname, username 32 source3/include/session.h fstring username; username 79 source3/lib/afs.c static bool afs_createtoken(const char *username, const char *cell, username 111 source3/lib/afs.c strncpy(p, username, sizeof(clear_ticket)-PTR_DIFF(p,clear_ticket)-1); username 184 source3/lib/afs.c char *afs_createtoken_str(const char *username, const char *cell) username 190 source3/lib/afs.c if (!afs_createtoken(username, cell, &ticket, &ct)) username 294 source3/lib/afs.c char *afs_createtoken_str(const char *username, const char *cell) username 45 source3/lib/netapi/cm.c set_cmdline_auth_info_username(auth_info, ctx->username); username 52 source3/lib/netapi/cm.c if (ctx->username && ctx->username[0] && username 65 source3/lib/netapi/cm.c cli_set_username(cli_ipc, ctx->username); username 36 source3/lib/netapi/examples/file/file_enum.c const char *username = NULL; username 83 source3/lib/netapi/examples/file/file_enum.c username = poptGetArg(pc); username 95 source3/lib/netapi/examples/file/file_enum.c username, username 36 source3/lib/netapi/examples/group/group_adduser.c const char *username = NULL; username 74 source3/lib/netapi/examples/group/group_adduser.c username = poptGetArg(pc); username 80 source3/lib/netapi/examples/group/group_adduser.c username); username 36 source3/lib/netapi/examples/group/group_deluser.c const char *username = NULL; username 74 source3/lib/netapi/examples/group/group_deluser.c username = poptGetArg(pc); username 80 source3/lib/netapi/examples/group/group_deluser.c username); username 75 source3/lib/netapi/examples/join/getjoinableous.c ctx->username, username 73 source3/lib/netapi/examples/join/rename_machine.c ctx->username, username 35 source3/lib/netapi/examples/user/user_add.c const char *username = NULL; username 70 source3/lib/netapi/examples/user/user_add.c username = poptGetArg(pc); username 80 source3/lib/netapi/examples/user/user_add.c info1.usri1_name = username; username 35 source3/lib/netapi/examples/user/user_chgpwd.c const char *username = NULL; username 69 source3/lib/netapi/examples/user/user_chgpwd.c username = poptGetArg(pc); username 86 source3/lib/netapi/examples/user/user_chgpwd.c username, username 35 source3/lib/netapi/examples/user/user_del.c const char *username = NULL; username 67 source3/lib/netapi/examples/user/user_del.c username = poptGetArg(pc); username 71 source3/lib/netapi/examples/user/user_del.c status = NetUserDel(hostname, username); username 35 source3/lib/netapi/examples/user/user_getgroups.c const char *username = NULL; username 75 source3/lib/netapi/examples/user/user_getgroups.c username = poptGetArg(pc); username 85 source3/lib/netapi/examples/user/user_getgroups.c username, username 35 source3/lib/netapi/examples/user/user_getinfo.c const char *username = NULL; username 81 source3/lib/netapi/examples/user/user_getinfo.c username = poptGetArg(pc); username 90 source3/lib/netapi/examples/user/user_getinfo.c username, username 35 source3/lib/netapi/examples/user/user_getlocalgroups.c const char *username = NULL; username 75 source3/lib/netapi/examples/user/user_getlocalgroups.c username = poptGetArg(pc); username 81 source3/lib/netapi/examples/user/user_getlocalgroups.c username, username 35 source3/lib/netapi/examples/user/user_setgroups.c const char *username = NULL; username 76 source3/lib/netapi/examples/user/user_setgroups.c username = poptGetArg(pc); username 129 source3/lib/netapi/examples/user/user_setgroups.c username, username 35 source3/lib/netapi/examples/user/user_setinfo.c const char *username = NULL; username 95 source3/lib/netapi/examples/user/user_setinfo.c username = poptGetArg(pc); username 192 source3/lib/netapi/examples/user/user_setinfo.c username, username 366 source3/lib/netapi/joindomain.c } else if (ctx->username) { username 367 source3/lib/netapi/joindomain.c ads->auth.user_name = SMB_STRDUP(ctx->username); username 111 source3/lib/netapi/netapi.c ctx->username = talloc_strdup(frame, getenv("USER")); username 113 source3/lib/netapi/netapi.c ctx->username = talloc_strdup(frame, ""); username 115 source3/lib/netapi/netapi.c if (!ctx->username) { username 212 source3/lib/netapi/netapi.c const char *username) username 214 source3/lib/netapi/netapi.c TALLOC_FREE(ctx->username); username 215 source3/lib/netapi/netapi.c ctx->username = talloc_strdup(ctx, username ? username : ""); username 217 source3/lib/netapi/netapi.c if (!ctx->username) { username 1268 source3/lib/netapi/netapi.h char *username; username 1303 source3/lib/netapi/netapi.h const char *username); username 49 source3/lib/netapi/netapi_private.h NET_API_STATUS libnetapi_get_username(struct libnetapi_ctx *ctx, char **username); username 32 source3/lib/netapi/tests/common.h const char *username); username 133 source3/lib/netapi/tests/netgroup.c const char *username) username 182 source3/lib/netapi/tests/netgroup.c if (username && strcasecmp(current_name, username) == 0) { username 203 source3/lib/netapi/tests/netgroup.c if (username && !found_user) { username 280 source3/lib/netapi/tests/netgroup.c const char *username, *groupname, *groupname2; username 291 source3/lib/netapi/tests/netgroup.c username = "torture_test_user"; username 298 source3/lib/netapi/tests/netgroup.c NetUserDel(hostname, username); username 385 source3/lib/netapi/tests/netgroup.c status = test_netuseradd(hostname, username); username 404 source3/lib/netapi/tests/netgroup.c status = NetGroupAddUser(hostname, groupname2, username); username 414 source3/lib/netapi/tests/netgroup.c status = test_netgroupgetusers(hostname, getmem_levels[i], groupname2, username); username 423 source3/lib/netapi/tests/netgroup.c status = NetGroupDelUser(hostname, groupname2, username); username 439 source3/lib/netapi/tests/netgroup.c status = test_netgroupsetusers(hostname, groupname2, 0, 1, &username); username 447 source3/lib/netapi/tests/netgroup.c status = test_netgroupgetusers(hostname, 0, groupname2, username); username 469 source3/lib/netapi/tests/netgroup.c status = NetUserDel(hostname, username); username 32 source3/lib/netapi/tests/netuser.c const char *username) username 131 source3/lib/netapi/tests/netuser.c if (strcasecmp(current_name, username) == 0) { username 184 source3/lib/netapi/tests/netuser.c const char *username) username 193 source3/lib/netapi/tests/netuser.c u1.usri1_name = username; username 257 source3/lib/netapi/tests/netuser.c const char *username, username 275 source3/lib/netapi/tests/netuser.c username, username 341 source3/lib/netapi/tests/netuser.c const char *username, *username2; username 353 source3/lib/netapi/tests/netuser.c username = "torture_test_user"; username 357 source3/lib/netapi/tests/netuser.c NetUserDel(hostname, username); username 362 source3/lib/netapi/tests/netuser.c status = test_netuseradd(hostname, username); username 372 source3/lib/netapi/tests/netuser.c status = test_netuserenum(hostname, enum_levels[i], username); username 385 source3/lib/netapi/tests/netuser.c status = NetUserGetInfo(hostname, username, levels[i], &buffer); username 396 source3/lib/netapi/tests/netuser.c status = test_netusergetgroups(hostname, getgr_levels[i], username, NULL); username 409 source3/lib/netapi/tests/netuser.c status = NetUserSetInfo(hostname, username, 1007, (uint8_t *)&u1007, &parm_err); username 418 source3/lib/netapi/tests/netuser.c status = NetUserGetInfo(hostname, username, levels[i], &buffer); username 429 source3/lib/netapi/tests/netuser.c status = NetUserDel(hostname, username); username 437 source3/lib/netapi/tests/netuser.c status = NetUserGetInfo(hostname, username, 0, &buffer); username 453 source3/lib/netapi/tests/netuser.c NetUserDel(hostname, username); username 705 source3/lib/substitute.c const char *username, username 733 source3/lib/substitute.c tmp_ctx, a_string, "%U", username); username 737 source3/lib/substitute.c tmp_ctx, a_string, "%u", username); username 767 source3/lib/substitute.c automount_server(username)); username 782 source3/lib/substitute.c ret_string = talloc_sub_basic(mem_ctx, username, domain, a_string); username 295 source3/lib/util.c if (!auth_info->username) { username 298 source3/lib/util.c return auth_info->username; username 302 source3/lib/util.c const char *username) username 304 source3/lib/util.c TALLOC_FREE(auth_info->username); username 305 source3/lib/util.c auth_info->username = talloc_strdup(auth_info, username); username 306 source3/lib/util.c if (!auth_info->username) { username 424 source3/lib/util.c result->username = talloc_strdup( username 428 source3/lib/util.c if ((result->username == NULL) || (result->password == NULL)) { username 63 source3/libnet/libnet_samsync.h const char *username; username 31 source3/libnet/libnet_samsync_keytab.c const char *username, username 55 source3/libnet/libnet_samsync_keytab.c ads->auth.user_name = SMB_STRDUP(username); username 129 source3/libnet/libnet_samsync_keytab.c ctx->username, username 611 source3/libnet/libnet_samsync_ldif.c fstring username, logonscript, homedrive, homepath = "", homedir = ""; username 625 source3/libnet/libnet_samsync_ldif.c fstrcpy(username, r->account_name.string); username 632 source3/libnet/libnet_samsync_ldif.c accountmap->cn = talloc_strdup(mem_ctx, username); username 639 source3/libnet/libnet_samsync_ldif.c snprintf(homedir, sizeof(homedir), "/home/%s", username); username 706 source3/libnet/libnet_samsync_ldif.c fprintf(add_fd, "# %s, %s, %s\n", username, user_rdn, suffix); username 707 source3/libnet/libnet_samsync_ldif.c fprintf_attr(add_fd, "dn", "uid=%s,ou=%s,%s", username, user_rdn, username 715 source3/libnet/libnet_samsync_ldif.c fprintf_attr(add_fd, "cn", "%s", username); username 716 source3/libnet/libnet_samsync_ldif.c fprintf_attr(add_fd, "sn", "%s", username); username 717 source3/libnet/libnet_samsync_ldif.c fprintf_attr(add_fd, "uid", "%s", username); username 2292 source3/libsmb/cliconnect.c user_info->username ? user_info->username : "", username 41 source3/libsmb/clidfs.c const char *username, username 50 source3/libsmb/clidfs.c const char *username, username 56 source3/libsmb/clidfs.c username, username 103 source3/libsmb/clidfs.c const char *username; username 196 source3/libsmb/clidfs.c username = get_cmdline_auth_info_username(auth_info); username 199 source3/libsmb/clidfs.c if (!NT_STATUS_IS_OK(cli_session_setup(c, username, username 205 source3/libsmb/clidfs.c if (password[0] || !username[0] || username 221 source3/libsmb/clidfs.c status = cli_init_creds(c, username, lp_workgroup(), password); username 250 source3/libsmb/clidfs.c username, username 272 source3/libsmb/clidfs.c username, username 444 source3/libsmb/clidfs.c SAFE_FREE(cm_creds.username); username 445 source3/libsmb/clidfs.c cm_creds.username = SMB_STRDUP(get_cmdline_auth_info_username( username 993 source3/libsmb/clidfs.c const char *username, username 1032 source3/libsmb/clidfs.c username, username 425 source3/libsmb/clientgen.c NTSTATUS cli_set_username(struct cli_state *cli, const char *username) username 428 source3/libsmb/clientgen.c cli->user_name = talloc_strdup(cli, username ? username : ""); username 457 source3/libsmb/clientgen.c NTSTATUS cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password) username 459 source3/libsmb/clientgen.c NTSTATUS status = cli_set_username(cli, username); username 785 source3/libsmb/clifsinfo.c const char *username, username 808 source3/libsmb/clifsinfo.c username, username 26 source3/libsmb/climessage.c int cli_message_start_build(struct cli_state *cli, const char *host, const char *username) username 39 source3/libsmb/climessage.c p += clistr_push(cli, p, username, username 50 source3/libsmb/climessage.c bool cli_message_start(struct cli_state *cli, const char *host, const char *username, username 53 source3/libsmb/climessage.c cli_message_start_build(cli, host, username); username 682 source3/libsmb/clirap2.c char username[RAP_USERNAME_LEN]; username 690 source3/libsmb/clirap2.c username, username 694 source3/libsmb/clirap2.c if (username[0]) { username 695 source3/libsmb/clirap2.c fn(username, state); username 956 source3/libsmb/clirap2.c char username[RAP_USERNAME_LEN]; username 969 source3/libsmb/clirap2.c username, username 1000 source3/libsmb/clirap2.c if (username[0] && comment && username 1002 source3/libsmb/clirap2.c fn(username, username 1065 source3/libsmb/clirap2.c char username[RAP_USERNAME_LEN]; username 1073 source3/libsmb/clirap2.c username, username 1077 source3/libsmb/clirap2.c if (username[0]) { username 1078 source3/libsmb/clirap2.c fn(username, cli); username 2386 source3/libsmb/clirap2.c char *wsname, *username, *clitype_name; username 2398 source3/libsmb/clirap2.c &username, username 2415 source3/libsmb/clirap2.c if (wsname && username && clitype_name) { username 2416 source3/libsmb/clirap2.c fn(wsname, username, num_conns, num_opens, num_users, sess_time, username 2484 source3/libsmb/clirap2.c char *wsname, *username, *clitype_name; username 2502 source3/libsmb/clirap2.c &username, username 2519 source3/libsmb/clirap2.c if (wsname && username && clitype_name) { username 2520 source3/libsmb/clirap2.c fn(wsname, username, num_conns, num_opens, num_users, sess_time, username 2587 source3/libsmb/clirap2.c uint32_t contime, const char *username, username 2638 source3/libsmb/clirap2.c char *netname, *username; username 2649 source3/libsmb/clirap2.c &username, username 2660 source3/libsmb/clirap2.c if (username && netname) { username 2662 source3/libsmb/clirap2.c username, netname); username 35 source3/libsmb/libsmb_cache.c char *username; username 53 source3/libsmb/libsmb_cache.c const char * username) username 85 source3/libsmb/libsmb_cache.c srvcache->username = SMB_STRDUP(username); username 86 source3/libsmb/libsmb_cache.c if (!srvcache->username) { username 98 source3/libsmb/libsmb_cache.c SAFE_FREE(srvcache->username); username 125 source3/libsmb/libsmb_cache.c strcmp(user, srv->username) == 0) { username 211 source3/libsmb/libsmb_cache.c SAFE_FREE(srv->username); username 465 source3/libsmb/libsmb_dir.c u_info.username = talloc_strdup(frame,user); username 467 source3/libsmb/libsmb_dir.c if (!u_info.username || !u_info.password) { username 102 source3/libsmb/libsmb_server.c fstring username; username 107 source3/libsmb/libsmb_server.c strlcpy(username, *pp_username, sizeof(username)); username 117 source3/libsmb/libsmb_server.c username, sizeof(username), username 124 source3/libsmb/libsmb_server.c username, sizeof(username), username 133 source3/libsmb/libsmb_server.c *pp_username = talloc_strdup(ctx, username); username 179 source3/libsmb/ntlm_check.c const char *username, username 192 source3/libsmb/ntlm_check.c username)); username 198 source3/libsmb/ntlm_check.c username)); username 210 source3/libsmb/ntlm_check.c username)); username 217 source3/libsmb/ntlm_check.c username)); username 223 source3/libsmb/ntlm_check.c username)); username 231 source3/libsmb/ntlm_check.c username)); username 241 source3/libsmb/ntlm_check.c username)); username 249 source3/libsmb/ntlm_check.c username)); username 255 source3/libsmb/ntlm_check.c username)); username 272 source3/libsmb/ntlm_check.c username)); username 276 source3/libsmb/ntlm_check.c DEBUG(3, ("Plaintext authentication for user %s attempted, but neither NT nor LM passwords available\n", username)); username 283 source3/libsmb/ntlm_check.c (unsigned long)nt_response->length, username)); username 350 source3/libsmb/ntlm_check.c username)); username 355 source3/libsmb/ntlm_check.c username)); username 362 source3/libsmb/ntlm_check.c username)); username 368 source3/libsmb/ntlm_check.c (unsigned long)nt_response->length, username)); username 374 source3/libsmb/ntlm_check.c username)); username 377 source3/libsmb/ntlm_check.c username)); username 398 source3/libsmb/ntlm_check.c DEBUG(4,("ntlm_password_check: LM password check failed for user, no NT password %s\n",username)); username 464 source3/libsmb/ntlm_check.c DEBUG(3,("ntlm_password_check: LM password, NT MD4 password in LM field and LMv2 failed for user %s\n",username)); username 466 source3/libsmb/ntlm_check.c DEBUG(3,("ntlm_password_check: LM password and LMv2 failed for user %s, and NT MD4 password in LM field not permitted\n",username)); username 94 source3/libsmb/samlogon_cache.c bool netsamlogon_cache_store(const char *username, struct netr_SamInfo3 *info3) username 135 source3/libsmb/samlogon_cache.c info3->base.account_name.string = talloc_strdup(info3, username); username 166 source3/modules/vfs_smb_traffic_analyzer.c char *username = NULL; username 196 source3/modules/vfs_smb_traffic_analyzer.c username = talloc_asprintf(talloc_tos(), username 200 source3/modules/vfs_smb_traffic_analyzer.c username = talloc_asprintf(talloc_tos(), username 208 source3/modules/vfs_smb_traffic_analyzer.c username = handle->conn->server_info->sanitized_username; username 211 source3/modules/vfs_smb_traffic_analyzer.c if (!username) { username 219 source3/modules/vfs_smb_traffic_analyzer.c username, username 101 source3/passdb/passdb.c user->username = ""; username 910 source3/passdb/passdb.c char *username = NULL; username 951 source3/passdb/passdb.c &username_len, &username, /* B */ username 988 source3/passdb/passdb.c pdb_set_username(sampass, username, PDB_SET); username 998 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1007 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1016 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1025 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1061 source3/passdb/passdb.c SAFE_FREE(username); username 1096 source3/passdb/passdb.c char *username = NULL; username 1139 source3/passdb/passdb.c &username_len, &username, /* B */ username 1179 source3/passdb/passdb.c pdb_set_username(sampass, username, PDB_SET); username 1189 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1198 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1207 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1216 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1253 source3/passdb/passdb.c SAFE_FREE(username); username 1285 source3/passdb/passdb.c char *username = NULL; username 1330 source3/passdb/passdb.c &username_len, &username, /* B */ username 1370 source3/passdb/passdb.c pdb_set_username(sampass, username, PDB_SET); username 1378 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string, username 1385 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1398 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string, username 1405 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1413 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string, username 1420 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1484 source3/passdb/passdb.c SAFE_FREE(username); username 1520 source3/passdb/passdb.c char *username = NULL; username 1565 source3/passdb/passdb.c &username_len, &username, /* B */ username 1606 source3/passdb/passdb.c pdb_set_username(sampass, username, PDB_SET); username 1614 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string, username 1621 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1634 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string, username 1641 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, username 1649 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string, username 1656 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, lp_logon_path()), username 1718 source3/passdb/passdb.c SAFE_FREE(username); username 1758 source3/passdb/passdb.c const char *username; username 1797 source3/passdb/passdb.c username = pdb_get_username(sampass); username 1798 source3/passdb/passdb.c if (username) { username 1799 source3/passdb/passdb.c username_len = strlen(username) +1; username 1926 source3/passdb/passdb.c username_len, username, /* B */ username 1970 source3/passdb/passdb.c username_len, username, /* B */ username 281 source3/passdb/pdb_get_set.c return sampass->username; username 568 source3/passdb/pdb_get_set.c bool pdb_set_username(struct samu *sampass, const char *username, enum pdb_value_state flag) username 570 source3/passdb/pdb_get_set.c if (username) { username 571 source3/passdb/pdb_get_set.c DEBUG(10, ("pdb_set_username: setting username %s, was %s\n", username, username 572 source3/passdb/pdb_get_set.c (sampass->username)?(sampass->username):"NULL")); username 574 source3/passdb/pdb_get_set.c sampass->username = talloc_strdup(sampass, username); username 576 source3/passdb/pdb_get_set.c if (!sampass->username) { username 581 source3/passdb/pdb_get_set.c sampass->username = PDB_NOT_QUITE_NULL; username 213 source3/passdb/pdb_interface.c bool pdb_getsampwnam(struct samu *sam_acct, const char *username) username 219 source3/passdb/pdb_interface.c if (!NT_STATUS_IS_OK(pdb->getsampwnam(pdb, sam_acct, username))) { username 435 source3/passdb/pdb_interface.c fstring username; username 452 source3/passdb/pdb_interface.c fstrcpy( username, pdb_get_username(sam_acct) ); username 453 source3/passdb/pdb_interface.c strlower_m( username ); username 455 source3/passdb/pdb_interface.c smb_delete_user( username ); username 1460 source3/passdb/pdb_interface.c const char *username = pdb_get_username(user); username 1466 source3/passdb/pdb_interface.c if ( !(pw = getpwnam_alloc(mem_ctx, username)) ) { username 1474 source3/passdb/pdb_interface.c if (!getgroups_unix_user(mem_ctx, username, gid, pp_gids, p_num_groups)) { username 520 source3/passdb/pdb_ldap.c char *username = NULL, username 562 source3/passdb/pdb_ldap.c if (!(username = smbldap_talloc_smallest_attribute(priv2ld(ldap_state), username 571 source3/passdb/pdb_ldap.c DEBUG(2, ("init_sam_from_ldap: Entry found for user: %s\n", username)); username 573 source3/passdb/pdb_ldap.c nt_username = talloc_strdup(ctx, username); username 583 source3/passdb/pdb_ldap.c pdb_set_username(sampass, username, PDB_SET); username 617 source3/passdb/pdb_ldap.c username)); username 737 source3/passdb/pdb_ldap.c username, username 747 source3/passdb/pdb_ldap.c talloc_sub_basic(ctx, username, domain, username 761 source3/passdb/pdb_ldap.c username, username 771 source3/passdb/pdb_ldap.c talloc_sub_basic(ctx, username, domain, username 785 source3/passdb/pdb_ldap.c username, username 795 source3/passdb/pdb_ldap.c talloc_sub_basic(ctx, username, domain, username 845 source3/passdb/pdb_ldap.c DEBUG(3, ("init_sam_from_ldap: smbldap_talloc_dn(ctx, %s) returned '%s'\n", username, user_dn)); username 866 source3/passdb/pdb_ldap.c DEBUG(0, ("init_sam_from_ldap: failed to get user_dn for '%s'\n", username)); username 950 source3/passdb/pdb_ldap.c username)); username 2088 source3/passdb/pdb_ldap.c const char *username = pdb_get_username(newpwd); username 2099 source3/passdb/pdb_ldap.c if (!username || !*username) { username 2108 source3/passdb/pdb_ldap.c rc = ldapsam_search_suffix_by_name (ldap_state, username, &result, attr_list); username 2116 source3/passdb/pdb_ldap.c username)); username 2140 source3/passdb/pdb_ldap.c escape_user = escape_ldap_string_alloc( username ); username 2232 source3/passdb/pdb_ldap.c escape_username = escape_rdn_val_string_alloc(username); username 2238 source3/passdb/pdb_ldap.c if (username[strlen(username)-1] == '$') { username 4188 source3/passdb/pdb_ldap.c static char *get_ldap_filter(TALLOC_CTX *mem_ctx, const char *username) username 4199 source3/passdb/pdb_ldap.c escaped = escape_ldap_string_alloc(username); username 4202 source3/passdb/pdb_ldap.c result = talloc_string_sub(mem_ctx, filter, "%u", username); username 4988 source3/passdb/pdb_ldap.c char *username; username 5008 source3/passdb/pdb_ldap.c username = escape_ldap_string_alloc(name); username 5010 source3/passdb/pdb_ldap.c username, LDAP_OBJ_POSIXACCOUNT); username 5011 source3/passdb/pdb_ldap.c SAFE_FREE(username); username 765 source3/passdb/pdb_nds.c const char *username = pdb_get_username(sam_acct); username 769 source3/passdb/pdb_nds.c success ? "Successful" : "Failed", username)); username 775 source3/passdb/pdb_nds.c rc = ldapsam_search_suffix_by_name(ldap_state, username, &result, attr_list ); username 796 source3/passdb/pdb_nds.c DEBUG(3, ("pdb_nds_update_login_attempts: username %s found dn '%s'\n", username, dn)); username 822 source3/passdb/pdb_nds.c DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Successful for %s\n", username)); username 825 source3/passdb/pdb_nds.c DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Failed for %s\n", username)); username 1276 source3/passdb/pdb_smbpasswd.c struct samu *sam_acct, const char *username) username 1283 source3/passdb/pdb_smbpasswd.c DEBUG(10, ("getsampwnam (smbpasswd): search by name: %s\n", username)); username 1295 source3/passdb/pdb_smbpasswd.c while ( ((smb_pw=getsmbfilepwent(smbpasswd_state, fp)) != NULL)&& (!strequal(smb_pw->smb_name, username)) ) username 1424 source3/passdb/pdb_smbpasswd.c const char *username = pdb_get_username(sampass); username 1426 source3/passdb/pdb_smbpasswd.c if (del_smbfilepwd_entry(smbpasswd_state, username)) username 101 source3/passdb/pdb_wbc_sam.c const char *username = pdb_get_username(user); username 104 source3/passdb/pdb_wbc_sam.c if (!winbind_get_groups(mem_ctx, username, &num_groups, pp_gids)) { username 1107 source3/passdb/secrets.c void secrets_fetch_ipc_userpass(char **username, char **domain, char **password) username 1109 source3/passdb/secrets.c *username = (char *)secrets_fetch(SECRETS_AUTH_USER, NULL); username 1113 source3/passdb/secrets.c if (*username && **username) { username 1122 source3/passdb/secrets.c *domain, *username)); username 1126 source3/passdb/secrets.c *username = smb_xstrdup(""); username 1409 source3/printing/print_cups.c char *username = NULL; username 1460 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &username, current_user_info.unix_name, &size)) { username 1464 source3/printing/print_cups.c NULL, username); username 1510 source3/printing/print_cups.c char *username = NULL; username 1561 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &username, current_user_info.unix_name, &size)) { username 1565 source3/printing/print_cups.c NULL, username); username 141 source3/rpc_client/cli_netlogon.c const char *username, username 225 source3/rpc_client/cli_netlogon.c username, username 266 source3/rpc_client/cli_netlogon.c username, username 315 source3/rpc_client/cli_netlogon.c const char *username, username 386 source3/rpc_client/cli_netlogon.c username, username 437 source3/rpc_client/cli_netlogon.c const char *username, username 504 source3/rpc_client/cli_netlogon.c username, username 3048 source3/rpc_client/cli_pipe.c const char *username, username 3063 source3/rpc_client/cli_pipe.c result->user_name = talloc_strdup(result, username); username 3077 source3/rpc_client/cli_pipe.c status = ntlmssp_set_username(result->a_u.ntlmssp_state, username); username 3163 source3/rpc_client/cli_pipe.c const char *username, username 3170 source3/rpc_client/cli_pipe.c if ((username != NULL) && (password != NULL)) { username 3171 source3/rpc_client/cli_pipe.c int ret = kerberos_kinit_password(username, password, 0, NULL); username 3741 source3/rpc_client/cli_pipe.c const char *username, username 3755 source3/rpc_client/cli_pipe.c result, auth_type, auth_level, domain, username, username 3773 source3/rpc_client/cli_pipe.c username )); username 3794 source3/rpc_client/cli_pipe.c const char *username, username 3804 source3/rpc_client/cli_pipe.c username, username 3819 source3/rpc_client/cli_pipe.c const char *username, username 3829 source3/rpc_client/cli_pipe.c username, username 3984 source3/rpc_client/cli_pipe.c const char *username, username 3995 source3/rpc_client/cli_pipe.c domain, username, password, &netlogon_pipe); username 4022 source3/rpc_client/cli_pipe.c const char *username, username 4032 source3/rpc_client/cli_pipe.c cli, domain, username, password, &neg_flags, &netlogon_pipe); username 4103 source3/rpc_client/cli_pipe.c const char *username, username 4118 source3/rpc_client/cli_pipe.c username, password, &auth); username 83 source3/rpc_client/cli_samr.c const char *username, username 102 source3/rpc_client/cli_samr.c init_lsa_String(&account, username); username 146 source3/rpc_client/cli_samr.c const char *username, username 162 source3/rpc_client/cli_samr.c init_lsa_String(&account, username); username 185 source3/rpc_client/cli_samr.c const char *username, username 208 source3/rpc_client/cli_samr.c init_lsa_String(&account, username); username 1522 source3/rpc_server/srv_lsa_nt.c const char *username, *domname; username 1543 source3/rpc_server/srv_lsa_nt.c &domname, &username, NULL)) { username 1547 source3/rpc_server/srv_lsa_nt.c username = p->server_info->sanitized_username; username 1555 source3/rpc_server/srv_lsa_nt.c init_lsa_String(account_name, username); username 39 source3/rpc_server/srv_srvsvc_nt.c const char *username; username 60 source3/rpc_server/srv_srvsvc_nt.c const char *username; username 71 source3/rpc_server/srv_srvsvc_nt.c username = uidtoname(prec.uid); username 73 source3/rpc_server/srv_srvsvc_nt.c if ((fenum->username != NULL) username 74 source3/rpc_server/srv_srvsvc_nt.c && !strequal(username, fenum->username)) { username 97 source3/rpc_server/srv_srvsvc_nt.c fenum->ctr3->array[i].user = username; username 108 source3/rpc_server/srv_srvsvc_nt.c const char *username, username 115 source3/rpc_server/srv_srvsvc_nt.c fenum.username = username; username 146 source3/rpc_server/srv_srvsvc_nt.c const char *username; username 154 source3/rpc_server/srv_srvsvc_nt.c username = uidtoname(e->uid); username 156 source3/rpc_server/srv_srvsvc_nt.c if ((fenum->username != NULL) username 157 source3/rpc_server/srv_srvsvc_nt.c && !strequal(username, fenum->username)) { username 200 source3/rpc_server/srv_srvsvc_nt.c fenum->ctr3->array[i].user = username; username 209 source3/rpc_server/srv_srvsvc_nt.c const char *username, username 216 source3/rpc_server/srv_srvsvc_nt.c f_enum_cnt.username = username; username 858 source3/rpc_server/srv_srvsvc_nt.c struct passwd *pw = sys_getpwnam(session_list[resume_handle].username); username 863 source3/rpc_server/srv_srvsvc_nt.c session_list[resume_handle].username)); username 869 source3/rpc_server/srv_srvsvc_nt.c guest = strequal( session_list[resume_handle].username, lp_guestaccount() ); username 878 source3/rpc_server/srv_srvsvc_nt.c ctr1->array[num_entries].user = session_list[resume_handle].username; username 1247 source3/rpc_server/srv_srvsvc_nt.c const char *username; username 1252 source3/rpc_server/srv_srvsvc_nt.c username = r->in.user; username 1277 source3/rpc_server/srv_srvsvc_nt.c if ((strequal(session_list[snum].username, username) || username[0] == '\0' ) && username 692 source3/rpcclient/cmd_netlogon.c const char *username, *password; username 705 source3/rpcclient/cmd_netlogon.c username = argv[1]; username 722 source3/rpcclient/cmd_netlogon.c result = rpccli_netlogon_sam_logon(cli, mem_ctx, logon_param, lp_workgroup(), username, password, workstation, logon_type); username 1088 source3/smbd/chgpasswd.c const char *username = pdb_get_username(hnd); username 1097 source3/smbd/chgpasswd.c DEBUG(1, ("user %s does not have permissions to change password\n", username)); username 1111 source3/smbd/chgpasswd.c username)); username 1123 source3/smbd/chgpasswd.c "wait until %s\n", username, username 1133 source3/smbd/chgpasswd.c username)); username 1149 source3/smbd/chgpasswd.c pass = Get_Pwnam_alloc(talloc_tos(), username); username 1151 source3/smbd/chgpasswd.c DEBUG(1, ("change_oem_password: Username %s does not exist in system !?!\n", username)); username 1185 source3/smbd/chgpasswd.c !chgpasswd(username, pass, old_passwd, new_passwd, as_root)) { username 4520 source3/smbd/lanman.c PACKS(&desc, "z", session_list[i].username); username 188 source3/smbd/password.c static int register_homes_share(const char *username) username 193 source3/smbd/password.c result = lp_servicenumber(username); username 196 source3/smbd/password.c "user '%s'; path = '%s'\n", username, username 201 source3/smbd/password.c pwd = getpwnam_alloc(talloc_tos(), username); username 205 source3/smbd/password.c username)); username 211 source3/smbd/password.c "'%s'\n", username, pwd->pw_dir)); username 213 source3/smbd/password.c result = add_home_service(username, username, pwd->pw_dir); username 262 source3/smbd/service.c int add_home_service(const char *service, const char *username, const char *homedir) username 291 source3/smbd/service.c if (!lp_add_home(service, iHomeService, username, homedir)) { username 474 source3/smbd/service.c int snum, const char *username, username 535 source3/smbd/service.c if (user_in_group_sid(username, &group_sid)) { username 539 source3/smbd/service.c groupname, username)); username 543 source3/smbd/service.c username, groupname )); username 169 source3/smbd/session.c fstrcpy(sessionid.username, vuser->server_info->unix_name); username 180 source3/smbd/session.c if (!smb_pam_claim_session(sessionid.username, sessionid.id_str, username 183 source3/smbd/session.c sessionid.username, sessionid.id_str)); username 203 source3/smbd/session.c sys_utmp_claim(sessionid.username, sessionid.hostname, username 245 source3/smbd/session.c sys_utmp_yield(sessionid.username, sessionid.hostname, username 250 source3/smbd/session.c smb_pam_close_session(sessionid.username, sessionid.id_str, username 306 source3/smbd/session.c current->username, current->remote_machine)); username 66 source3/smbd/share_access.c const char *username, username 76 source3/smbd/share_access.c if (username != NULL) { username 77 source3/smbd/share_access.c name = talloc_sub_basic(mem_ctx, username, domain, name); username 131 source3/smbd/share_access.c if (user_in_netgroup(username, name)) { username 152 source3/smbd/share_access.c bool token_contains_name_in_list(const char *username, username 169 source3/smbd/share_access.c if (token_contains_name(mem_ctx, username, domain, sharename, username 194 source3/smbd/share_access.c bool user_ok_token(const char *username, const char *domain, username 198 source3/smbd/share_access.c if (token_contains_name_in_list(username, domain, username 202 source3/smbd/share_access.c DEBUG(10, ("User %s in 'invalid users'\n", username)); username 208 source3/smbd/share_access.c if (!token_contains_name_in_list(username, domain, username 212 source3/smbd/share_access.c username)); username 228 source3/smbd/share_access.c DEBUG(10, ("%s != 'username'\n", username)); username 234 source3/smbd/share_access.c lp_servicename(snum), username)); username 253 source3/smbd/share_access.c bool is_share_read_only_for_token(const char *username, username 262 source3/smbd/share_access.c if (token_contains_name_in_list(username, domain, username 270 source3/smbd/share_access.c if (token_contains_name_in_list(username, domain, username 279 source3/smbd/share_access.c result ? "read-only" : "read-write", username)); username 115 source3/smbd/utmp.c void sys_utmp_claim(const char *username, const char *hostname, username 120 source3/smbd/utmp.c void sys_utmp_yield(const char *username, const char *hostname, username 497 source3/smbd/utmp.c const char *username, const char *hostname, username 510 source3/smbd/utmp.c utmp_strcpy(u->ut_user, username, sizeof(u->ut_user)); username 512 source3/smbd/utmp.c utmp_strcpy(u->ut_name, username, sizeof(u->ut_name)); username 585 source3/smbd/utmp.c void sys_utmp_yield(const char *username, const char *hostname, username 602 source3/smbd/utmp.c if (!sys_utmp_fill(&u, username, hostname, ip_addr_str, id_str, id_num)) username 612 source3/smbd/utmp.c void sys_utmp_claim(const char *username, const char *hostname, username 624 source3/smbd/utmp.c if (!sys_utmp_fill(&u, username, hostname, ip_addr_str, id_str, id_num)) username 23 source3/torture/locktest.c static fstring username[2]; username 233 source3/torture/locktest.c fstrcpy(username[1], username[0]); username 236 source3/torture/locktest.c if (!NT_STATUS_IS_OK(cli_session_setup(c, username[snum], username 627 source3/torture/locktest.c fstrcpy(username[0],getenv("USER")); username 628 source3/torture/locktest.c fstrcpy(username[1],getenv("USER")); username 649 source3/torture/locktest.c fstrcpy(username[got_pass],optarg); username 650 source3/torture/locktest.c p = strchr_m(username[got_pass],'%'); username 23 source3/torture/locktest2.c static fstring username; username 186 source3/torture/locktest2.c username, lp_workgroup(), password, 0, username 512 source3/torture/locktest2.c fstrcpy(username,getenv("USER")); username 520 source3/torture/locktest2.c fstrcpy(username,optarg); username 521 source3/torture/locktest2.c p = strchr_m(username,'%'); username 23 source3/torture/masktest.c static fstring username; username 230 source3/torture/masktest.c if (!NT_STATUS_IS_OK(cli_session_setup(c, username, username 492 source3/torture/masktest.c fstrcpy(username,getenv("USER")); username 518 source3/torture/masktest.c fstrcpy(username,optarg); username 519 source3/torture/masktest.c p = strchr_m(username,'%'); username 343 source3/torture/pdbtest.c if (NT_STATUS_IS_ERR(pdb->getsampwnam(pdb, in, out->username))) { username 345 source3/torture/pdbtest.c out->username); username 26 source3/torture/torture.c static fstring host, workgroup, share, password, username, myname; username 137 source3/torture/torture.c username, username 280 source3/torture/torture.c username, workgroup, username 341 source3/torture/torture.c ret = NT_STATUS_IS_OK(cli_session_setup(cli, username, username 1306 source3/torture/torture.c username, workgroup, username 4996 source3/torture/torture.c c, username, username 6176 source3/torture/torture.c if (*username == 0 && getenv("LOGNAME")) { username 6177 source3/torture/torture.c fstrcpy(username,getenv("LOGNAME")); username 6236 source3/torture/torture.c fstrcpy(username,optarg); username 6237 source3/torture/torture.c p = strchr_m(username,'%'); username 6272 source3/torture/torture.c host, share, username, myname); username 345 source3/utils/net_rap.c static void list_sessions_func(char *wsname, char *username, uint16 conns, username 354 source3/utils/net_rap.c wsname, username, clitype, opens, hrs, min, sec); username 357 source3/utils/net_rap.c static void display_session_func(const char *wsname, const char *username, username 374 source3/utils/net_rap.c username, wsname, username 381 source3/utils/net_rap.c const char *username, const char *netname) username 1132 source3/utils/net_rpc.c const char *username; username 1150 source3/utils/net_rpc.c username = talloc_strdup(mem_ctx, info->info21.account_name.string); username 1160 source3/utils/net_rpc.c d_printf("%s's %s: [%s]\n", username, ctx->thiscmd, oldval); username 1182 source3/utils/net_rpc.c d_printf("Set %s's %s from [%s] to [%s]\n", username, username 1217 source3/utils/net_rpc.c const char *username; username 1241 source3/utils/net_rpc.c username = talloc_strdup(mem_ctx, info->info21.account_name.string); username 1251 source3/utils/net_rpc.c d_printf("%s's %s flag: %s\n", username, ctx->thiscmd, oldval); username 1266 source3/utils/net_rpc.c d_printf("Set %s's %s flag from [%s] to [%s]\n", username, username 4757 source3/utils/net_rpc.c const char *username=NULL; username 4769 source3/utils/net_rpc.c username = smb_xstrdup(argv[0]); username 4774 source3/utils/net_rpc.c username, username 678 source3/utils/net_rpc_printer.c const char *username, username 689 source3/utils/net_rpc_printer.c pipe_hnd->srv_name_slash, username, printername2, access_required)); username 700 source3/utils/net_rpc_printer.c printername2, pipe_hnd->srv_name_slash, username); username 382 source3/utils/net_rpc_samsync.c ctx->username = c->opt_user_name; username 209 source3/utils/net_util.c static char *get_user_and_realm(const char *username) username 213 source3/utils/net_util.c if (!username) { username 216 source3/utils/net_util.c if (strchr_m(username, '@')) { username 217 source3/utils/net_util.c user_and_realm = SMB_STRDUP(username); username 219 source3/utils/net_util.c if (asprintf(&user_and_realm, "%s@%s", username, lp_realm()) == -1) { username 336 source3/utils/ntlm_auth.c NTSTATUS contact_winbind_auth_crap(const char *username, username 367 source3/utils/ntlm_auth.c fstrcpy(request.data.auth_crap.user, username); username 443 source3/utils/ntlm_auth.c static NTSTATUS contact_winbind_change_pswd_auth_crap(const char *username, username 466 source3/utils/ntlm_auth.c if(username != NULL) username 467 source3/utils/ntlm_auth.c fstrcpy(request.data.chng_pswd_auth_crap.user, username); username 1747 source3/utils/ntlm_auth.c static char *username; username 1754 source3/utils/ntlm_auth.c if (!full_username && !username) { username 1759 source3/utils/ntlm_auth.c if (asprintf(&full_username, "%s%c%s", domain, winbind_separator(), username) == -1) { username 1779 source3/utils/ntlm_auth.c if (full_username && !username) { username 1787 source3/utils/ntlm_auth.c SAFE_FREE(username); username 1789 source3/utils/ntlm_auth.c username = smb_xstrdup(fstr_user); username 1804 source3/utils/ntlm_auth.c contact_winbind_auth_crap(username, username 1852 source3/utils/ntlm_auth.c SAFE_FREE(username); username 1920 source3/utils/ntlm_auth.c username = smb_xstrdup(parameter); username 1941 source3/utils/ntlm_auth.c static char *username = NULL; username 1998 source3/utils/ntlm_auth.c if (!full_username && !username) { username 2007 source3/utils/ntlm_auth.c if (full_username && !username) { username 2020 source3/utils/ntlm_auth.c SAFE_FREE(username); username 2021 source3/utils/ntlm_auth.c username = smb_xstrdup(full_username); username 2023 source3/utils/ntlm_auth.c SAFE_FREE(username); username 2025 source3/utils/ntlm_auth.c username = smb_xstrdup(fstr_user); username 2032 source3/utils/ntlm_auth.c username, domain, username 2053 source3/utils/ntlm_auth.c SAFE_FREE(username); username 2131 source3/utils/ntlm_auth.c username = smb_xstrdup(parameter); username 2133 source3/utils/ntlm_auth.c username = smb_xstrdup(parameter); username 32 source3/utils/ntlm_auth_proto.h NTSTATUS contact_winbind_auth_crap(const char *username, username 82 source3/utils/pdbedit.c const char *username) username 88 source3/utils/pdbedit.c DEBUG(3, ("export_database: username=\"%s\"\n", username ? username : "(NULL)")); username 109 source3/utils/pdbedit.c if ((username != NULL) username 110 source3/utils/pdbedit.c && (strcmp(username, userentry.account_name) != 0)) { username 143 source3/utils/pdbedit.c printf("Importing account for %s...", user->username); username 144 source3/utils/pdbedit.c status = out->getsampwnam(out, account, user->username); username 344 source3/utils/pdbedit.c static int print_user_info(const char *username, username 356 source3/utils/pdbedit.c bret = pdb_getsampwnam(sam_pwent, username); username 491 source3/utils/pdbedit.c static int set_user_info(const char *username, const char *fullname, username 513 source3/utils/pdbedit.c ret = pdb_getsampwnam(sam_pwent, username); username 582 source3/utils/pdbedit.c print_user_info(username, True, False); username 682 source3/utils/pdbedit.c static int new_user(const char *username, const char *fullname, username 719 source3/utils/pdbedit.c status = local_password_change(username, flags, pwd1, &err, &msg); username 733 source3/utils/pdbedit.c if (!pdb_getsampwnam(sam_pwent, username)) { username 734 source3/utils/pdbedit.c fprintf(stderr, "User %s not found!\n", username); username 756 source3/utils/pdbedit.c username); username 761 source3/utils/pdbedit.c print_user_info(username, True, False); username 877 source3/utils/pdbedit.c static int delete_user_entry(const char *username) username 887 source3/utils/pdbedit.c if (!pdb_getsampwnam(samaccount, username)) { username 889 source3/utils/pdbedit.c "user %s does not exist in the passdb\n", username); username 895 source3/utils/pdbedit.c fprintf (stderr, "Unable to delete user %s\n", username); username 48 source3/utils/smbget.c static const char *username = NULL, *password = NULL, *workgroup = NULL; username 92 source3/utils/smbget.c if(!nonprompt && !username) { username 99 source3/utils/smbget.c } else if(username) strncpy(un, username, unlen-1); username 573 source3/utils/smbget.c {"username", 'u', POPT_ARG_STRING, &username, 'u', "Username to use" }, username 615 source3/utils/smbget.c username = ""; password = ""; username 236 source3/utils/smbpasswd.c static NTSTATUS password_change(const char *remote_mach, char *username, username 252 source3/utils/smbpasswd.c ret = remote_password_change(remote_mach, username, username 255 source3/utils/smbpasswd.c ret = local_password_change(username, local_flags, new_pw, username 48 source3/utils/status.c const char *username = NULL; username 288 source3/utils/status.c {"user", 'u', POPT_ARG_STRING, &username, 'u', "Switch to user" }, username 356 source3/utils/status.c if ( username ) username 357 source3/utils/status.c Ucrit_addUid( nametouid(username) ); username 1024 source3/winbindd/idmap_ad.c char *username; username 1070 source3/winbindd/idmap_ad.c username = ads_pull_string(ctx->ads, mem_ctx, msg, username 1072 source3/winbindd/idmap_ad.c if (!username) { username 1078 source3/winbindd/idmap_ad.c username); username 375 source3/winbindd/winbindd.h const char *username; /* lookup key. */ username 389 source3/winbindd/winbindd.h const char *username; username 43 source3/winbindd/winbindd_ccache_access.c static NTSTATUS do_ntlm_auth_with_hashes(const char *username, username 63 source3/winbindd/winbindd_ccache_access.c status = ntlmssp_set_username(ntlmssp_state, username); username 240 source3/winbindd/winbindd_ccache_access.c DEBUG(10,("winbindd_dual_ccache_ntlm_auth: found ccache [%s]\n", entry->username)); username 552 source3/winbindd/winbindd_cm.c static void cm_get_ipc_userpass(char **username, char **domain, char **password) username 554 source3/winbindd/winbindd_cm.c *username = (char *)secrets_fetch(SECRETS_AUTH_USER, NULL); username 558 source3/winbindd/winbindd_cm.c if (*username && **username) { username 567 source3/winbindd/winbindd_cm.c *domain, *username)); username 571 source3/winbindd/winbindd_cm.c *username = smb_xstrdup(""); username 53 source3/winbindd/winbindd_cred_cache.c static struct WINBINDD_CCACHE_ENTRY *get_ccache_by_username(const char *username) username 58 source3/winbindd/winbindd_cred_cache.c if (strequal(entry->username, username)) { username 114 source3/winbindd/winbindd_cred_cache.c entry->ccname, entry->username)); username 307 source3/winbindd/winbindd_cred_cache.c entry->ccname, entry->username)); username 446 source3/winbindd/winbindd_cred_cache.c bool ccache_entry_exists(const char *username) username 448 source3/winbindd/winbindd_cred_cache.c struct WINBINDD_CCACHE_ENTRY *entry = get_ccache_by_username(username); username 456 source3/winbindd/winbindd_cred_cache.c bool ccache_entry_identical(const char *username, username 460 source3/winbindd/winbindd_cred_cache.c struct WINBINDD_CCACHE_ENTRY *entry = get_ccache_by_username(username); username 483 source3/winbindd/winbindd_cred_cache.c const char *username, username 498 source3/winbindd/winbindd_cred_cache.c if ((username == NULL && princ_name == NULL) || username 526 source3/winbindd/winbindd_cred_cache.c username)); username 532 source3/winbindd/winbindd_cred_cache.c entry = get_ccache_by_username(username); username 535 source3/winbindd/winbindd_cred_cache.c if (!ccache_entry_identical(username, uid, ccname)) { username 541 source3/winbindd/winbindd_cred_cache.c username, entry->ref_count)); username 572 source3/winbindd/winbindd_cred_cache.c ntret = remove_ccache(username); username 576 source3/winbindd/winbindd_cred_cache.c entry->username)); username 597 source3/winbindd/winbindd_cred_cache.c if (username) { username 598 source3/winbindd/winbindd_cred_cache.c entry->username = talloc_strdup(entry, username); username 599 source3/winbindd/winbindd_cred_cache.c if (!entry->username) { username 667 source3/winbindd/winbindd_cred_cache.c ccname, username)); username 682 source3/winbindd/winbindd_cred_cache.c NTSTATUS remove_ccache(const char *username) username 684 source3/winbindd/winbindd_cred_cache.c struct WINBINDD_CCACHE_ENTRY *entry = get_ccache_by_username(username); username 697 source3/winbindd/winbindd_cred_cache.c username, entry->ref_count)); username 705 source3/winbindd/winbindd_cred_cache.c username, entry->ref_count)); username 727 source3/winbindd/winbindd_cred_cache.c entry->ccname, username)); username 733 source3/winbindd/winbindd_cred_cache.c DEBUG(10,("remove_ccache: removed ccache for user %s\n", username)); username 748 source3/winbindd/winbindd_cred_cache.c struct WINBINDD_MEMORY_CREDS *find_memory_creds_by_name(const char *username) username 753 source3/winbindd/winbindd_cred_cache.c if (strequal(p->username, username)) { username 867 source3/winbindd/winbindd_cred_cache.c static NTSTATUS winbindd_add_memory_creds_internal(const char *username, username 878 source3/winbindd/winbindd_cred_cache.c memcredp = find_memory_creds_by_name(username); username 881 source3/winbindd/winbindd_cred_cache.c "invalid uid for user %s.\n", username)); username 891 source3/winbindd/winbindd_cred_cache.c (unsigned int)uid, username, username 898 source3/winbindd/winbindd_cred_cache.c username, memcredp->ref_count)); username 906 source3/winbindd/winbindd_cred_cache.c memcredp->username = talloc_strdup(memcredp, username); username 907 source3/winbindd/winbindd_cred_cache.c if (!memcredp->username) { username 923 source3/winbindd/winbindd_cred_cache.c "added entry for user %s\n", username)); username 936 source3/winbindd/winbindd_cred_cache.c NTSTATUS winbindd_add_memory_creds(const char *username, username 940 source3/winbindd/winbindd_cred_cache.c struct WINBINDD_CCACHE_ENTRY *entry = get_ccache_by_username(username); username 943 source3/winbindd/winbindd_cred_cache.c status = winbindd_add_memory_creds_internal(username, uid, pass); username 950 source3/winbindd/winbindd_cred_cache.c memcredp = find_memory_creds_by_name(username); username 963 source3/winbindd/winbindd_cred_cache.c NTSTATUS winbindd_delete_memory_creds(const char *username) username 969 source3/winbindd/winbindd_cred_cache.c memcredp = find_memory_creds_by_name(username); username 970 source3/winbindd/winbindd_cred_cache.c entry = get_ccache_by_username(username); username 974 source3/winbindd/winbindd_cred_cache.c username)); username 981 source3/winbindd/winbindd_cred_cache.c username, memcredp->ref_count)); username 992 source3/winbindd/winbindd_cred_cache.c username)); username 996 source3/winbindd/winbindd_cred_cache.c username, memcredp->ref_count)); username 1011 source3/winbindd/winbindd_cred_cache.c NTSTATUS winbindd_replace_memory_creds(const char *username, username 1016 source3/winbindd/winbindd_cred_cache.c memcredp = find_memory_creds_by_name(username); username 1019 source3/winbindd/winbindd_cred_cache.c username)); username 1024 source3/winbindd/winbindd_cred_cache.c username)); username 303 source3/winbindd/winbindd_group.c char *username = NULL; username 318 source3/winbindd/winbindd_group.c &username, username 331 source3/winbindd/winbindd_group.c username, &mapped_name); username 343 source3/winbindd/winbindd_group.c fill_domain_username(name, domainname, username, true); username 1525 source3/winbindd/winbindd_group.c char *username; username 1548 source3/winbindd/winbindd_group.c state->request.data.username username 1549 source3/winbindd/winbindd_group.c [sizeof(state->request.data.username)-1]='\0'; username 1552 source3/winbindd/winbindd_group.c state->request.data.username)); username 1566 source3/winbindd/winbindd_group.c state->request.data.username, username 1574 source3/winbindd/winbindd_group.c real_name = state->request.data.username; username 1578 source3/winbindd/winbindd_group.c &s->domname, &s->username)) { username 1591 source3/winbindd/winbindd_group.c s->username = talloc_strdup(state->mem_ctx, username 1592 source3/winbindd/winbindd_group.c state->request.data.username); username 1600 source3/winbindd/winbindd_group.c char *p = strchr(s->username, '@'); username 1618 source3/winbindd/winbindd_group.c s->username)); username 1626 source3/winbindd/winbindd_group.c s->domname, s->username, username 1195 source3/winbindd/winbindd_pam.c const char *username, username 542 source3/winbindd/winbindd_passdb.c user_info->acct_name = talloc_strdup(mem_ctx, sampass->username ? username 543 source3/winbindd/winbindd_passdb.c sampass->username : ""); username 239 source3/winbindd/winbindd_proto.h bool ccache_entry_exists(const char *username); username 240 source3/winbindd/winbindd_proto.h bool ccache_entry_identical(const char *username, username 248 source3/winbindd/winbindd_proto.h const char *username, username 255 source3/winbindd/winbindd_proto.h NTSTATUS remove_ccache(const char *username); username 256 source3/winbindd/winbindd_proto.h struct WINBINDD_MEMORY_CREDS *find_memory_creds_by_name(const char *username); username 257 source3/winbindd/winbindd_proto.h NTSTATUS winbindd_add_memory_creds(const char *username, username 260 source3/winbindd/winbindd_proto.h NTSTATUS winbindd_delete_memory_creds(const char *username); username 261 source3/winbindd/winbindd_proto.h NTSTATUS winbindd_replace_memory_creds(const char *username, username 31 source3/winbindd/winbindd_user.c const char *username, username 51 source3/winbindd/winbindd_user.c username, domname, username 55 source3/winbindd/winbindd_user.c username, domname, username 199 source3/winbindd/winbindd_user.c char *username; username 257 source3/winbindd/winbindd_user.c fstring username; username 271 source3/winbindd/winbindd_user.c fstrcpy( username, acct_name ); username 297 source3/winbindd/winbindd_user.c fstrcpy( username, user_name ); username 300 source3/winbindd/winbindd_user.c strlower_m( username ); username 301 source3/winbindd/winbindd_user.c s->username = talloc_strdup(s->state->mem_ctx, username); username 304 source3/winbindd/winbindd_user.c s->username, &mapped_name); username 308 source3/winbindd/winbindd_user.c s->username = mapped_name; username 313 source3/winbindd/winbindd_user.c s->username = mapped_name; username 339 source3/winbindd/winbindd_user.c s->domain->name, s->username)); username 366 source3/winbindd/winbindd_user.c s->domain->name, s->username)); username 381 source3/winbindd/winbindd_user.c fstrcpy( output_username, s->username ); username 384 source3/winbindd/winbindd_user.c s->username, True); username 390 source3/winbindd/winbindd_user.c if (!fillup_pw_field(lp_template_homedir(), s->username, username 397 source3/winbindd/winbindd_user.c if (!fillup_pw_field(lp_template_shell(), s->username, username 424 source3/winbindd/winbindd_user.c fstring domname, username; username 430 source3/winbindd/winbindd_user.c domuser = state->request.data.username; username 431 source3/winbindd/winbindd_user.c dusize = sizeof(state->request.data.username); username 452 source3/winbindd/winbindd_user.c if (!parse_domain_user(mapped_user, domname, username)) { username 476 source3/winbindd/winbindd_user.c domname, username)); username 483 source3/winbindd/winbindd_user.c winbindd_lookupname_async(state->mem_ctx, domname, username, username 493 source3/winbindd/winbindd_user.c fstring domname, username; username 494 source3/winbindd/winbindd_user.c char *domuser = state->request.data.username; username 508 source3/winbindd/winbindd_user.c if (parse_domain_user(domuser, domname, username)) { username 128 source4/auth/credentials/credentials.c cred->username = cred->username_cb(cred); username 134 source4/auth/credentials/credentials.c return cred->username; username 141 source4/auth/credentials/credentials.c cred->username = talloc_strdup(cred, val); username 588 source4/auth/credentials/credentials.c const char *username; username 594 source4/auth/credentials/credentials.c cli_credentials_get_ntlm_username_domain(credentials, mem_ctx, &username, &domain); username 597 source4/auth/credentials/credentials.c domain, username); username 600 source4/auth/credentials/credentials.c username); username 723 source4/auth/credentials/credentials.c const char *username; username 730 source4/auth/credentials/credentials.c username = cli_credentials_get_username(cred); username 735 source4/auth/credentials/credentials.c if (!username[0]) { username 73 source4/auth/credentials/credentials.h const char *username; username 148 source4/auth/credentials/credentials.h const char **username, username 31 source4/auth/credentials/credentials_ntlm.c const char **username, username 36 source4/auth/credentials/credentials_ntlm.c *username = cli_credentials_get_principal(cred, mem_ctx); username 39 source4/auth/credentials/credentials_ntlm.c *username = cli_credentials_get_username(cred); username 58 source4/auth/gensec/cyrus_sasl.c const char *username = cli_credentials_get_username(gensec_get_credentials(gensec_security)); username 63 source4/auth/gensec/cyrus_sasl.c *result = username; username 101 source4/auth/ntlm/auth_unix.c static NTSTATUS talloc_getpwnam(TALLOC_CTX *ctx, const char *username, struct passwd **pws) username 111 source4/auth/ntlm/auth_unix.c from = getpwnam(username); username 502 source4/auth/ntlm/auth_unix.c static NTSTATUS password_check(const char *username, const char *password, username 508 source4/auth/ntlm/auth_unix.c if (afs_auth(username, password)) username 513 source4/auth/ntlm/auth_unix.c if (dfs_auth(username, password)) username 599 source4/auth/ntlm/auth_unix.c char *username; username 610 source4/auth/ntlm/auth_unix.c username = talloc_strdup(ctx, user_info->mapped.account_name); username 613 source4/auth/ntlm/auth_unix.c nt_status = talloc_getpwnam(ctx, username, &pws); username 678 source4/auth/ntlm/auth_unix.c DEBUG(5,("Checking password for user %s in OSF1_ENH_SEC\n", username)); username 679 source4/auth/ntlm/auth_unix.c mypasswd = getprpwnam(username); username 681 source4/auth/ntlm/auth_unix.c username = talloc_strdup(ctx, mypasswd->ufld.fd_name); username 682 source4/auth/ntlm/auth_unix.c NT_STATUS_HAVE_NO_MEMORY(username); username 686 source4/auth/ntlm/auth_unix.c DEBUG(5,("OSF1_ENH_SEC: No entry for user %s in protected database !\n", username)); username 710 source4/auth/ntlm/auth_unix.c DEBUG(2, ("Disallowing %s with null password\n", username)); username 714 source4/auth/ntlm/auth_unix.c DEBUG(3, ("Allowing access to %s with null password\n", username)); username 721 source4/auth/ntlm/auth_unix.c nt_status = password_check(username, password, crypted, salt); username 750 source4/auth/ntlm/auth_unix.c nt_status = password_check(username, pwcopy, crypted, salt); username 225 source4/auth/ntlm/ntlm_check.c const char *username, username 231 source4/auth/ntlm/ntlm_check.c username)); username 239 source4/auth/ntlm/ntlm_check.c username)); username 246 source4/auth/ntlm/ntlm_check.c username)); username 249 source4/auth/ntlm/ntlm_check.c if (strchr_m(username, '@')) { username 257 source4/auth/ntlm/ntlm_check.c username)); username 261 source4/auth/ntlm/ntlm_check.c if (strchr_m(username, '@')) { username 291 source4/auth/ntlm/ntlm_check.c const char *username, username 304 source4/auth/ntlm/ntlm_check.c username)); username 320 source4/auth/ntlm/ntlm_check.c username)); username 339 source4/auth/ntlm/ntlm_check.c username, username 345 source4/auth/ntlm/ntlm_check.c (unsigned long)nt_response->length, username)); username 417 source4/auth/ntlm/ntlm_check.c username)); username 422 source4/auth/ntlm/ntlm_check.c username)); username 429 source4/auth/ntlm/ntlm_check.c username)); username 435 source4/auth/ntlm/ntlm_check.c (unsigned long)nt_response->length, username)); username 441 source4/auth/ntlm/ntlm_check.c username)); username 444 source4/auth/ntlm/ntlm_check.c username)); username 445 source4/auth/ntlm/ntlm_check.c } else if (strchr_m(username, '@')) { username 447 source4/auth/ntlm/ntlm_check.c username)); username 470 source4/auth/ntlm/ntlm_check.c DEBUG(4,("ntlm_password_check: LM password check failed for user, no NT password %s\n",username)); username 592 source4/auth/ntlm/ntlm_check.c DEBUG(3,("ntlm_password_check: LM password, NT MD4 password in LM field and LMv2 failed for user %s\n",username)); username 594 source4/auth/ntlm/ntlm_check.c DEBUG(3,("ntlm_password_check: LM password and LMv2 failed for user %s, and NT MD4 password in LM field not permitted\n",username)); username 598 source4/auth/ntlm/ntlm_check.c if (strchr_m(username, '@')) { username 42 source4/auth/ntlm/ntlm_check.h const char *username, username 70 source4/auth/ntlm/ntlm_check.h const char *username, username 46 source4/client/mount.cifs.c char *username = NULL; username 50 source4/client/mount.cifs.c username = password->pw_name; username 52 source4/client/mount.cifs.c return username; username 33 source4/client/smbmount.c static pstring username; username 214 source4/client/smbmount.c if (!smbcli_session_setup(c, username, username 220 source4/client/smbmount.c if (password[0] || !username[0] || username 658 source4/client/smbmount.c pstrcpy(username, val); username 769 source4/client/smbmount.c pstrcpy(username,opteq+1); username 770 source4/client/smbmount.c if ((lp=strchr_m(username,'%'))) { username 776 source4/client/smbmount.c if ((lp=strchr_m(username,'/'))) { username 887 source4/client/smbmount.c pstrcpy(username,getenv("USER")); username 889 source4/client/smbmount.c if ((p=strchr_m(username,'%'))) { username 895 source4/client/smbmount.c strupper(username); username 908 source4/client/smbmount.c if (*username == 0 && getenv("LOGNAME")) { username 909 source4/client/smbmount.c pstrcpy(username,getenv("LOGNAME")); username 594 source4/client/tree.c char *workgroup, int wgmaxlen, char *username, int unmaxlen, username 598 source4/client/tree.c strncpy(username, "test", unmaxlen); username 70 source4/dsdb/samdb/ldb_modules/proxy.c const char *olddn, *newdn, *url, *username, *password, *oldstr, *newstr; username 92 source4/dsdb/samdb/ldb_modules/proxy.c username = ldb_msg_find_attr_as_string(res->msgs[0], "username", NULL); username 97 source4/dsdb/samdb/ldb_modules/proxy.c if (url == NULL || olddn == NULL || newdn == NULL || username == NULL || password == NULL) { username 139 source4/dsdb/samdb/ldb_modules/proxy.c cli_credentials_set_username(creds, username, CRED_SPECIFIED); username 166 source4/heimdal/kdc/digest.c const char *username, username 175 source4/heimdal/kdc/digest.c ret = krb5_parse_name(context, username, &clientprincipal); username 634 source4/heimdal/kdc/digest.c ireq.u.digestRequest.username, username 661 source4/heimdal/kdc/digest.c ireq.u.digestRequest.username); username 686 source4/heimdal/kdc/digest.c ireq.u.digestRequest.username, username 692 source4/heimdal/kdc/digest.c MD5_Update(&ctx, ireq.u.digestRequest.username, username 693 source4/heimdal/kdc/digest.c strlen(ireq.u.digestRequest.username)); username 779 source4/heimdal/kdc/digest.c ireq.u.digestRequest.username); username 787 source4/heimdal/kdc/digest.c const char *username; username 811 source4/heimdal/kdc/digest.c username = strchr(ireq.u.digestRequest.username, '\\'); username 812 source4/heimdal/kdc/digest.c if (username == NULL) username 813 source4/heimdal/kdc/digest.c username = ireq.u.digestRequest.username; username 815 source4/heimdal/kdc/digest.c username++; username 843 source4/heimdal/kdc/digest.c SHA1_Update(&ctx, username, strlen(username)); username 847 source4/heimdal/kdc/digest.c ret = krb5_parse_name(context, username, &clientprincipal); username 857 source4/heimdal/kdc/digest.c username); username 866 source4/heimdal/kdc/digest.c username); username 894 source4/heimdal/kdc/digest.c ireq.u.digestRequest.username); username 978 source4/heimdal/kdc/digest.c ireq.u.digestRequest.type, ireq.u.digestRequest.username); username 1121 source4/heimdal/kdc/digest.c ireq.u.ntlmRequest.username, username 1131 source4/heimdal/kdc/digest.c ireq.u.ntlmRequest.username); username 1207 source4/heimdal/kdc/digest.c ireq.u.ntlmRequest.username, username 1334 source4/heimdal/kdc/digest.c version, ireq.u.ntlmRequest.username); username 113 source4/heimdal/lib/ntlm/heimntlm.h char *username; /**< */ username 690 source4/heimdal/lib/ntlm/ntlm.c if (data->username) username 691 source4/heimdal/lib/ntlm/ntlm.c free(data->username); username 711 source4/heimdal/lib/ntlm/ntlm.c struct sec_buffer lm, ntlm, target, username, sessionkey, ws; username 730 source4/heimdal/lib/ntlm/ntlm.c CHECK(ret_sec_buffer(in, &username), 0); username 745 source4/heimdal/lib/ntlm/ntlm.c CHECK(ret_string(in, ucs2, &username, &type3->username), 0); username 774 source4/heimdal/lib/ntlm/ntlm.c struct sec_buffer lm, ntlm, target, username, sessionkey, ws; username 783 source4/heimdal/lib/ntlm/ntlm.c memset(&username, 0, sizeof(username)); username 811 source4/heimdal/lib/ntlm/ntlm.c username.offset = target.offset + target.allocated; username 812 source4/heimdal/lib/ntlm/ntlm.c username.length = len_string(ucs2, type3->username); username 813 source4/heimdal/lib/ntlm/ntlm.c username.allocated = username.length; username 815 source4/heimdal/lib/ntlm/ntlm.c ws.offset = username.offset + username.allocated; username 835 source4/heimdal/lib/ntlm/ntlm.c CHECK(store_sec_buffer(out, &username), 0); username 850 source4/heimdal/lib/ntlm/ntlm.c CHECK(put_string(out, ucs2, type3->username), 0); username 1049 source4/heimdal/lib/ntlm/ntlm.c const char *username, username 1061 source4/heimdal/lib/ntlm/ntlm.c ascii2ucs2le(username, 1, &buf); username 1118 source4/heimdal/lib/ntlm/ntlm.c const char *username, username 1141 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_ntlmv2_key(key, len, username, target, ntlmv2); username 1221 source4/heimdal/lib/ntlm/ntlm.c const char *username, username 1251 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_ntlmv2_key(key, len, username, target, ntlmv2); username 30 source4/libcli/climessage.c bool smbcli_message_start(struct smbcli_tree *tree, const char *host, const char *username, username 36 source4/libcli/climessage.c smbcli_req_append_string(req, username, STR_TERMINATE); username 53 source4/libnet/libnet_samdump.c const char *username = user->account_name.string; username 64 source4/libnet/libnet_samdump.c printf("%s:%d:%s:%s:%s:LCT-%08X\n", username, username 38 source4/libnet/libnet_samdump_keytab.c const char *username = user->account_name.string; username 52 source4/libnet/libnet_samdump_keytab.c cli_credentials_set_username(credentials, username, CRED_SPECIFIED); username 51 source4/libnet/libnet_samsync.c const char *username = user->account_name.string; username 77 source4/libnet/libnet_samsync.c *error_string = talloc_asprintf(mem_ctx, "Failed to parse Sensitive Data for %s:", username); username 87 source4/libnet/libnet_user.c s->user_add.in.username = r->in.user_name; username 122 source4/libnet/libnet_user.c s->user_add.in.username = s->r.in.user_name; username 256 source4/libnet/libnet_user.c s->user_del.in.username = r->in.user_name; username 291 source4/libnet/libnet_user.c s->user_del.in.username = s->r.in.user_name; username 422 source4/libnet/libnet_user.c s->user_info.in.username = r->in.user_name; username 455 source4/libnet/libnet_user.c s->user_info.in.username = s->r.in.user_name; username 482 source4/libnet/libnet_user.c s->user_mod.in.username = s->r.in.user_name; username 1129 source4/libnet/libnet_user.c s->users[i].username = talloc_strdup(c, entry->name.string); username 1130 source4/libnet/libnet_user.c if (composite_nomem(s->users[i].username, c)) return; username 151 source4/libnet/libnet_user.h const char *username; username 304 source4/libnet/userinfo.c s->lookup.in.names[0].string = talloc_strdup(s, io->in.username); username 30 source4/libnet/userinfo.h const char *username; username 126 source4/libnet/userman.c s->createuser.in.account_name->string = talloc_strdup(c, io->in.username); username 392 source4/libnet/userman.c s->lookupname.in.names->string = io->in.username; username 840 source4/libnet/userman.c s->lookupname.in.names->string = io->in.username; username 30 source4/libnet/userman.h const char *username; username 41 source4/libnet/userman.h const char *username; username 68 source4/libnet/userman.h const char *username; username 250 source4/rpc_server/lsa/lsa_lookup.c const char *username; username 261 source4/rpc_server/lsa/lsa_lookup.c username = p + 1; username 263 source4/rpc_server/lsa/lsa_lookup.c status = crack_name_to_nt4_name(mem_ctx, ev_ctx, lp_ctx, DRSUAPI_DS_NAME_FORMAT_USER_PRINCIPAL, name, &domain, &username); username 270 source4/rpc_server/lsa/lsa_lookup.c username = name; username 275 source4/rpc_server/lsa/lsa_lookup.c status = lookup_well_known_names(mem_ctx, NULL, username, authority_name, sid, rtype); username 280 source4/rpc_server/lsa/lsa_lookup.c if (strcasecmp_m(username, NAME_NT_AUTHORITY) == 0) { username 286 source4/rpc_server/lsa/lsa_lookup.c if (strcasecmp_m(username, NAME_BUILTIN) == 0) { username 292 source4/rpc_server/lsa/lsa_lookup.c if (strcasecmp_m(username, state->domain_dns) == 0) { username 298 source4/rpc_server/lsa/lsa_lookup.c if (strcasecmp_m(username, state->domain_name) == 0) { username 306 source4/rpc_server/lsa/lsa_lookup.c name = talloc_asprintf(mem_ctx, "%s\\%s", NAME_NT_AUTHORITY, username); username 316 source4/rpc_server/lsa/lsa_lookup.c name = talloc_asprintf(mem_ctx, "%s\\%s", NAME_BUILTIN, username); username 326 source4/rpc_server/lsa/lsa_lookup.c name = talloc_asprintf(mem_ctx, "%s\\%s", state->domain_name, username); username 337 source4/rpc_server/lsa/lsa_lookup.c if (!*username) { username 345 source4/rpc_server/lsa/lsa_lookup.c return lookup_well_known_names(mem_ctx, domain, username, authority_name, username 371 source4/rpc_server/lsa/lsa_lookup.c if (!*username) { username 379 source4/rpc_server/lsa/lsa_lookup.c ldb_binary_encode_string(mem_ctx, username)); username 223 source4/torture/gentest.c servers[i].credentials->username, j); username 34 source4/torture/libnet/libnet_user.c struct policy_handle *domain_handle, const char *username) username 45 source4/torture/libnet/libnet_user.c names[0].string = username; username 53 source4/torture/libnet/libnet_user.c printf("user account lookup '%s'\n", username); username 187 source4/torture/libnet/libnet_user.c struct lsa_String username; username 192 source4/torture/libnet/libnet_user.c username.string = user; username 195 source4/torture/libnet/libnet_user.c r1.in.account_name = &username; username 200 source4/torture/libnet/libnet_user.c printf("creating user '%s'\n", username.string); username 227 source4/torture/libnet/libnet_user.c printf("closing user '%s'\n", username.string); username 713 source4/torture/libnet/libnet_user.c req.out.users[i].username, req.out.users[i].sid); username 59 source4/torture/libnet/userinfo.c user.in.username = TEST_USERNAME; username 108 source4/torture/libnet/userinfo.c user.in.username = TEST_USERNAME; username 40 source4/torture/libnet/userman.c user.in.username = name; username 55 source4/torture/libnet/userman.c struct policy_handle *handle, const char* username) username 62 source4/torture/libnet/userman.c user.in.username = username; username 85 source4/torture/libnet/userman.c struct libnet_rpc_usermod *mod, char **username) username 103 source4/torture/libnet/userman.c mod->in.username = talloc_strdup(mem_ctx, *username); username 125 source4/torture/libnet/userman.c *username = talloc_strdup(mem_ctx, mod->in.change.account_name); username 216 source4/torture/libnet/userman.c struct policy_handle *handle, const char *username) username 222 source4/torture/libnet/userman.c user.in.username = username; username 271 source4/torture/libnet/userman.c const char *username) username 280 source4/torture/libnet/userman.c info.in.username = username; username 134 source4/torture/libnet/utils.c struct lsa_String username; username 138 source4/torture/libnet/utils.c username.string = name; username 141 source4/torture/libnet/utils.c r.in.account_name = &username; username 25 source4/torture/locktest2.c static fstring username; username 176 source4/torture/locktest2.c username, lp_workgroup(), password, ev, username 519 source4/torture/locktest2.c username = talloc_strdup(mem_ctx, getenv("USER")); username 527 source4/torture/locktest2.c username = talloc_strdup(mem_ctx, optarg); username 528 source4/torture/locktest2.c p = strchr_m(username,'%'); username 354 source4/torture/rpc/samba3rpc.c const char *username, username 472 source4/torture/rpc/samba3rpc.c user_name.string = username; username 537 source4/torture/rpc/samba3rpc.c const char *username, const char *password, username 555 source4/torture/rpc/samba3rpc.c username, domain_name, &samr_pipe, &wks_handle, username 652 source4/torture/rpc/samba3rpc.c const char *username) username 669 source4/torture/rpc/samba3rpc.c username, &dom_name, &samr_pipe, username 1659 source4/torture/rpc/samlogon.c const char *username; username 1670 source4/torture/rpc/samlogon.c .username = cli_credentials_get_username(cmdline_credentials), username 1679 source4/torture/rpc/samlogon.c .username = cli_credentials_get_username(cmdline_credentials), username 1688 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx, username 1701 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx, username 1714 source4/torture/rpc/samlogon.c .username = cli_credentials_get_username(machine_credentials), username 1723 source4/torture/rpc/samlogon.c .username = cli_credentials_get_username(machine_credentials), username 1732 source4/torture/rpc/samlogon.c .username = cli_credentials_get_username(machine_credentials), username 1741 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx, username 1754 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx, username 1767 source4/torture/rpc/samlogon.c .username = TEST_USER_NAME, username 1776 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx, username 1788 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx, username 1801 source4/torture/rpc/samlogon.c .username = TEST_USER_NAME, username 1811 source4/torture/rpc/samlogon.c .username = TEST_USER_NAME_WRONG_WKS, username 1826 source4/torture/rpc/samlogon.c usercreds[ci].username, username 1837 source4/torture/rpc/samlogon.c usercreds[ci].username, username 1859 source4/torture/rpc/samlogon.c usercreds[0].username, username 1870 source4/torture/rpc/samlogon.c usercreds[0].username, username 438 source4/torture/rpc/samsync.c const char *username = user->account_name.string; username 593 source4/torture/rpc/samsync.c printf("Failed to parse Sensitive Data for %s:\n", username); username 603 source4/torture/rpc/samsync.c DEBUG(100,("ACCOUNT [%s\\%-25s] NTHASH %s\n", samsync_state->domain_name[0], username, data_blob_hex_string(mem_ctx, &nt_hash_blob))); username 607 source4/torture/rpc/samsync.c DEBUG(100,("ACCOUNT [%s\\%-25s] LMHASH %s\n", samsync_state->domain_name[0], username, data_blob_hex_string(mem_ctx, &lm_hash_blob))); username 612 source4/torture/rpc/samsync.c username, username 719 source4/torture/rpc/samsync.c domain, username, nt_errstr(nt_status)); username 1162 source4/torture/rpc/samsync.c const char *domain, *username; username 1298 source4/torture/rpc/samsync.c username = talloc_asprintf(trustdom_ctx, "%s$", domain); username 1307 source4/torture/rpc/samsync.c printf("Checking password for %s\\%s\n", t->name, username); username 1310 source4/torture/rpc/samsync.c username, username 1331 source4/torture/rpc/samsync.c username, username 109 source4/torture/rpc/testjoin.c const char *username, username 204 source4/torture/rpc/testjoin.c printf("Creating account %s\n", username); username 207 source4/torture/rpc/testjoin.c name.string = username; username 185 source4/utils/ntlm_auth.c const char *username, username 222 source4/utils/ntlm_auth.c username, username 223 source4/utils/ntlm_auth.c username, username 232 source4/utils/ntlm_auth.c username); username 236 source4/utils/ntlm_auth.c domain, username, workstation, username 742 source4/utils/ntlm_auth.c static char *username; username 749 source4/utils/ntlm_auth.c if (!full_username && !username) { username 754 source4/utils/ntlm_auth.c if (asprintf(&full_username, "%s%c%s", domain, *lp_winbind_separator(lp_ctx), username) == -1) { username 774 source4/utils/ntlm_auth.c if (full_username && !username) { username 775 source4/utils/ntlm_auth.c SAFE_FREE(username); username 777 source4/utils/ntlm_auth.c if (!parse_ntlm_auth_domain_user(full_username, &username, username 797 source4/utils/ntlm_auth.c username, username 847 source4/utils/ntlm_auth.c SAFE_FREE(username); username 915 source4/utils/ntlm_auth.c username = smb_xstrdup(parameter); username 73 source4/winbind/wb_cmd_getpwent.c char *username = talloc_strdup(state, username 74 source4/winbind/wb_cmd_getpwent.c pwent->user_list->out.users[idx].username); username 77 source4/winbind/wb_cmd_getpwent.c ctx = wb_cmd_getpwnam_send(state, service, username); username 145 source4/winbind/wb_cmd_list_users.c DEBUG(5, ("Appending user '%s'\n", user_list->out.users[i].username)); username 147 source4/winbind/wb_cmd_list_users.c user_list->out.users[i].username); username 788 source4/winbind/wb_samba3_cmd.c s3call->request.data.username);