client            627 librpc/gen_ndr/cli_srvsvc.c 				   const char *client /* [in] [unique,charset(UTF16)] */,
client            640 librpc/gen_ndr/cli_srvsvc.c 	r.in.client = client;
client            686 librpc/gen_ndr/cli_srvsvc.c 				  const char *client /* [in] [unique,charset(UTF16)] */,
client            695 librpc/gen_ndr/cli_srvsvc.c 	r.in.client = client;
client             95 librpc/gen_ndr/cli_srvsvc.h 				   const char *client /* [in] [unique,charset(UTF16)] */,
client            105 librpc/gen_ndr/cli_srvsvc.h 				  const char *client /* [in] [unique,charset(UTF16)] */,
client           17896 librpc/gen_ndr/ndr_spoolss.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client           17904 librpc/gen_ndr/ndr_spoolss.c 		if (r->client) {
client           17905 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           17907 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           17908 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client           17931 librpc/gen_ndr/ndr_spoolss.c 			NDR_PULL_ALLOC(ndr, r->client);
client           17933 librpc/gen_ndr/ndr_spoolss.c 			r->client = NULL;
client           17947 librpc/gen_ndr/ndr_spoolss.c 		if (r->client) {
client           17949 librpc/gen_ndr/ndr_spoolss.c 			NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client           17950 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client           17951 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client           17952 librpc/gen_ndr/ndr_spoolss.c 			if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client           17953 librpc/gen_ndr/ndr_spoolss.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client           17955 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client           17956 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client           17980 librpc/gen_ndr/ndr_spoolss.c 	ndr_print_ptr(ndr, "client", r->client);
client           17982 librpc/gen_ndr/ndr_spoolss.c 	if (r->client) {
client           17983 librpc/gen_ndr/ndr_spoolss.c 		ndr_print_string(ndr, "client", r->client);
client           18036 librpc/gen_ndr/ndr_spoolss.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client           18045 librpc/gen_ndr/ndr_spoolss.c 		if (r->client) {
client           18046 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           18048 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           18049 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client           18074 librpc/gen_ndr/ndr_spoolss.c 			NDR_PULL_ALLOC(ndr, r->client);
client           18076 librpc/gen_ndr/ndr_spoolss.c 			r->client = NULL;
client           18091 librpc/gen_ndr/ndr_spoolss.c 		if (r->client) {
client           18093 librpc/gen_ndr/ndr_spoolss.c 			NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client           18094 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client           18095 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client           18096 librpc/gen_ndr/ndr_spoolss.c 			if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client           18097 librpc/gen_ndr/ndr_spoolss.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client           18099 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client           18100 librpc/gen_ndr/ndr_spoolss.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client           18126 librpc/gen_ndr/ndr_spoolss.c 	ndr_print_ptr(ndr, "client", r->client);
client           18128 librpc/gen_ndr/ndr_spoolss.c 	if (r->client) {
client           18129 librpc/gen_ndr/ndr_spoolss.c 		ndr_print_string(ndr, "client", r->client);
client           2397 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client           2400 librpc/gen_ndr/ndr_srvsvc.c 		if (r->client) {
client           2401 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           2403 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           2404 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client           2418 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->client);
client           2420 librpc/gen_ndr/ndr_srvsvc.c 			r->client = NULL;
client           2424 librpc/gen_ndr/ndr_srvsvc.c 		if (r->client) {
client           2426 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client           2427 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client           2428 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client           2429 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client           2430 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client           2432 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client           2433 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client           2444 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "client", r->client);
client           2446 librpc/gen_ndr/ndr_srvsvc.c 	if (r->client) {
client           2447 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "client", r->client);
client           2543 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client           2551 librpc/gen_ndr/ndr_srvsvc.c 		if (r->client) {
client           2552 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           2554 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           2555 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client           2577 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->client);
client           2579 librpc/gen_ndr/ndr_srvsvc.c 			r->client = NULL;
client           2593 librpc/gen_ndr/ndr_srvsvc.c 		if (r->client) {
client           2595 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client           2596 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client           2597 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client           2598 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client           2599 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client           2601 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client           2602 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client           2625 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "client", r->client);
client           2627 librpc/gen_ndr/ndr_srvsvc.c 	if (r->client) {
client           2628 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "client", r->client);
client           2734 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client           2743 librpc/gen_ndr/ndr_srvsvc.c 		if (r->client) {
client           2744 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           2746 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           2747 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client           2777 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->client);
client           2779 librpc/gen_ndr/ndr_srvsvc.c 			r->client = NULL;
client           2799 librpc/gen_ndr/ndr_srvsvc.c 		if (r->client) {
client           2801 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client           2802 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client           2803 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client           2804 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client           2805 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client           2807 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client           2808 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client           2843 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "client", r->client);
client           2845 librpc/gen_ndr/ndr_srvsvc.c 	if (r->client) {
client           2846 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "client", r->client);
client           2958 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client           2964 librpc/gen_ndr/ndr_srvsvc.c 		if (r->client) {
client           2965 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           2967 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           2968 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client           2990 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->client);
client           2992 librpc/gen_ndr/ndr_srvsvc.c 			r->client = NULL;
client           3004 librpc/gen_ndr/ndr_srvsvc.c 		if (r->client) {
client           3006 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client           3007 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client           3008 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client           3009 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client           3010 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client           3012 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client           3013 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client           3036 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "client", r->client);
client           3038 librpc/gen_ndr/ndr_srvsvc.c 	if (r->client) {
client           3039 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "client", r->client);
client           3143 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client           3153 librpc/gen_ndr/ndr_srvsvc.c 		if (r->client) {
client           3154 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           3156 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client           3157 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client           3195 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->client);
client           3197 librpc/gen_ndr/ndr_srvsvc.c 			r->client = NULL;
client           3223 librpc/gen_ndr/ndr_srvsvc.c 		if (r->client) {
client           3225 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client           3226 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client           3227 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client           3228 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client           3229 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client           3231 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client           3232 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client           3279 librpc/gen_ndr/ndr_srvsvc.c 	ndr_print_ptr(ndr, "client", r->client);
client           3281 librpc/gen_ndr/ndr_srvsvc.c 	if (r->client) {
client           3282 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_string(ndr, "client", r->client);
client           14855 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.client));
client           14856 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.client) {
client           14857 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16)));
client           14859 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16)));
client           14860 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.client, ndr_charset_length(r->in.client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client           14932 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->in.client);
client           14934 librpc/gen_ndr/ndr_srvsvc.c 			r->in.client = NULL;
client           14936 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.client) {
client           14938 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.client, 0);
client           14939 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.client));
client           14940 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.client));
client           14941 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->in.client) > ndr_get_array_size(ndr, &r->in.client)) {
client           14942 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.client), ndr_get_array_length(ndr, &r->in.client));
client           14944 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t)));
client           14945 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.client, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t), CH_UTF16));
client           15039 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_ptr(ndr, "client", r->in.client);
client           15041 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.client) {
client           15042 librpc/gen_ndr/ndr_srvsvc.c 			ndr_print_string(ndr, "client", r->in.client);
client           15097 librpc/gen_ndr/ndr_srvsvc.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.client));
client           15098 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.client) {
client           15099 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16)));
client           15101 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16)));
client           15102 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.client, ndr_charset_length(r->in.client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client           15147 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_ALLOC(ndr, r->in.client);
client           15149 librpc/gen_ndr/ndr_srvsvc.c 			r->in.client = NULL;
client           15151 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.client) {
client           15153 librpc/gen_ndr/ndr_srvsvc.c 			NDR_PULL_SET_MEM_CTX(ndr, r->in.client, 0);
client           15154 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->in.client));
client           15155 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_array_length(ndr, &r->in.client));
client           15156 librpc/gen_ndr/ndr_srvsvc.c 			if (ndr_get_array_length(ndr, &r->in.client) > ndr_get_array_size(ndr, &r->in.client)) {
client           15157 librpc/gen_ndr/ndr_srvsvc.c 				return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.client), ndr_get_array_length(ndr, &r->in.client));
client           15159 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t)));
client           15160 librpc/gen_ndr/ndr_srvsvc.c 			NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.client, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t), CH_UTF16));
client           15204 librpc/gen_ndr/ndr_srvsvc.c 		ndr_print_ptr(ndr, "client", r->in.client);
client           15206 librpc/gen_ndr/ndr_srvsvc.c 		if (r->in.client) {
client           15207 librpc/gen_ndr/ndr_srvsvc.c 			ndr_print_string(ndr, "client", r->in.client);
client           1514 librpc/gen_ndr/spoolss.h 	const char *client;/* [unique,charset(UTF16)] */
client           1530 librpc/gen_ndr/spoolss.h 	const char *client;/* [unique,charset(UTF16)] */
client            161 librpc/gen_ndr/srvsvc.h 	const char *client;/* [unique,charset(UTF16)] */
client            170 librpc/gen_ndr/srvsvc.h 	const char *client;/* [unique,charset(UTF16)] */
client            184 librpc/gen_ndr/srvsvc.h 	const char *client;/* [unique,charset(UTF16)] */
client            199 librpc/gen_ndr/srvsvc.h 	const char *client;/* [unique,charset(UTF16)] */
client            211 librpc/gen_ndr/srvsvc.h 	const char *client;/* [unique,charset(UTF16)] */
client           1245 librpc/gen_ndr/srvsvc.h 		const char *client;/* [unique,charset(UTF16)] */
client           1265 librpc/gen_ndr/srvsvc.h 		const char *client;/* [unique,charset(UTF16)] */
client             61 source3/include/ctdbd_conn.h 			    const struct sockaddr_storage *client,
client            452 source3/include/nt_printing.h 	} client;
client           1386 source3/include/proto.h bool send_keepalive(int client);
client            180 source3/lib/access.c 	const char **client = (const char **)item;
client            187 source3/lib/access.c 	if (string_match(tok, client[ADDR_INDEX])) {
client            191 source3/lib/access.c 	if (strnequal(client[ADDR_INDEX],"::ffff:",7) &&
client            199 source3/lib/access.c 		if (string_match(tok, (client[ADDR_INDEX])+7)) {
client            204 source3/lib/access.c 	if (client[NAME_INDEX][0] != 0) {
client            205 source3/lib/access.c 		if (string_match(tok, client[NAME_INDEX])) {
client            264 source3/lib/access.c 	const char *client[2];
client            266 source3/lib/access.c 	client[NAME_INDEX] = cname;
client            267 source3/lib/access.c 	client[ADDR_INDEX] = caddr;
client            276 source3/lib/access.c 			list_match(deny_list,client,client_match) &&
client            278 source3/lib/access.c 				!list_match(allow_list,client, client_match))) {
client            293 source3/lib/access.c 		return(list_match(allow_list,client,client_match));
client            299 source3/lib/access.c 		return(!list_match(deny_list,client,client_match));
client            304 source3/lib/access.c 	if (list_match(allow_list,(const char *)client,client_match)) {
client            310 source3/lib/access.c 	if (list_match(deny_list,(const char *)client,client_match)) {
client           1232 source3/lib/ctdbd_conn.c 	struct sockaddr_storage client;
client           1240 source3/lib/ctdbd_conn.c 	smbd_ctdb_canonicalize_ip(_client, &client);
client           1243 source3/lib/ctdbd_conn.c 	switch (client.ss_family) {
client           1246 source3/lib/ctdbd_conn.c 		p4.src = *(struct sockaddr_in *)&client;
client           1253 source3/lib/ctdbd_conn.c 		p.src.ip6 = *(struct sockaddr_in6 *)&client;
client            751 source3/lib/util_sock.c bool send_keepalive(int client)
client            758 source3/lib/util_sock.c 	return(write_data(client,(char *)buf,4) == 4);
client            648 source3/libads/krb5_setpw.c 	ret = krb5_cc_get_principal(context, ccache, &creds.client);
client            663 source3/libads/krb5_setpw.c 	        krb5_free_principal(context, creds.client);
client            679 source3/libads/krb5_setpw.c 	krb5_free_principal(context, creds.client);
client            474 source3/libsmb/clikrb5.c 	return tkt->enc_part2->client;
client            476 source3/libsmb/clikrb5.c 	return tkt->client;
client            684 source3/libsmb/clikrb5.c 	if ((retval = krb5_cc_get_principal(context, ccache, &creds.client))) {
client           1261 source3/libsmb/clikrb5.c 	krb5_principal client = NULL;
client           1291 source3/libsmb/clikrb5.c 		ret = smb_krb5_parse_name(context, client_string, &client);
client           1296 source3/libsmb/clikrb5.c 		ret = krb5_cc_get_principal(context, ccache, &client);
client           1304 source3/libsmb/clikrb5.c 		ret = krb5_get_renewed_creds(context, &creds, client, ccache, CONST_DISCARD(char *, service_string));
client           1315 source3/libsmb/clikrb5.c 		ret = krb5_copy_principal(context, client, &creds_in.client);
client           1327 source3/libsmb/clikrb5.c 			client_realm = krb5_princ_realm(context, creds_in.client);
client           1354 source3/libsmb/clikrb5.c 	ret = krb5_cc_initialize(context, ccache, client);
client           1374 source3/libsmb/clikrb5.c 	if (client) {
client           1375 source3/libsmb/clikrb5.c 		krb5_free_principal(context, client);
client           1862 source3/libsmb/clikrb5.c 				credsp->client, /* Client principal for the tgt [in] */
client             47 source3/rpc_client/cli_spoolss.c 	level1.client	= talloc_asprintf(mem_ctx, "\\\\%s", global_myname());
client             48 source3/rpc_client/cli_spoolss.c 	W_ERROR_HAVE_NO_MEMORY(level1.client);
client            164 source3/rpc_client/cli_spoolss.c 	level1.client		= talloc_asprintf(mem_ctx, "\\\\%s", global_myname());
client            165 source3/rpc_client/cli_spoolss.c 	W_ERROR_HAVE_NO_MEMORY(level1.client);
client            779 source3/rpc_server/srv_srvsvc_nt.c 		ctr0->array[num_entries].client =
client            877 source3/rpc_server/srv_srvsvc_nt.c 		ctr1->array[num_entries].client		= session_list[resume_handle].remote_machine;
client           1253 source3/rpc_server/srv_srvsvc_nt.c 	machine = r->in.client;
client            687 source3/rpcclient/cmd_srvsvc.c 	const char *client = NULL;
client            696 source3/rpcclient/cmd_srvsvc.c 		client = argv[1];
client            743 source3/rpcclient/cmd_srvsvc.c 					  client,
client             29 source3/smbd/avahi_register.c 	AvahiClient *client;
client             48 source3/smbd/avahi_register.c 		error = avahi_client_errno(state->client);
client            118 source3/smbd/avahi_register.c 		state->client = avahi_client_new(state->poll, AVAHI_CLIENT_NO_FAIL,
client            121 source3/smbd/avahi_register.c 		if (state->client == NULL) {
client            157 source3/smbd/avahi_register.c 	state->client = avahi_client_new(state->poll, AVAHI_CLIENT_NO_FAIL,
client            160 source3/smbd/avahi_register.c 	if (state->client == NULL) {
client           1942 source3/smbd/process.c 			       struct sockaddr_storage *client)
client           1952 source3/smbd/process.c 	length = sizeof(*client);
client           1953 source3/smbd/process.c 	if (getpeername(server_fd, (struct sockaddr *)client, &length) != 0) {
client            249 source3/smbd/sesssetup.c 	char *client, *p, *domain;
client            287 source3/smbd/sesssetup.c 				&client, &pac_data, &ap_rep,
client            348 source3/smbd/sesssetup.c 	DEBUG(3,("Ticket name is [%s]\n", client));
client            350 source3/smbd/sesssetup.c 	p = strchr_m(client, '@');
client            367 source3/smbd/sesssetup.c 			netsamlogon_cache_store( client, &logon_info->info3 );
client            372 source3/smbd/sesssetup.c 		DEBUG(3,("Ticket for foreign realm %s@%s\n", client, p+1));
client            424 source3/smbd/sesssetup.c 	fstr_sprintf(user, "%s%c%s", domain, *lp_winbind_separator(), client);
client            485 source3/smbd/sesssetup.c 		ret = make_server_info_info3(mem_ctx, client, domain,
client            555 source3/smbd/sesssetup.c 					client);
client            862 source3/torture/torture.c static bool run_netbench(int client)
client            874 source3/torture/torture.c 	nbio_id = client;
client            880 source3/torture/torture.c 	slprintf(cname,sizeof(cname)-1, "client%d", client);
client             67 source4/auth/auth.h 	} client, mapped;
client            157 source4/auth/gensec/schannel_state.c 	client_state.data = creds->client.data;
client            158 source4/auth/gensec/schannel_state.c 	client_state.length = sizeof(creds->client.data);
client            281 source4/auth/gensec/schannel_state.c 	memcpy((*creds)->client.data, val->data, 8);
client            264 source4/auth/ntlm/auth.c 		    user_info->client.domain_name, user_info->client.account_name, user_info->workstation_name));
client             38 source4/auth/ntlm/auth_anonymous.c 	if (user_info->client.account_name && *user_info->client.account_name) {
client             58 source4/auth/ntlm/auth_developer.c 	user = user_info->client.account_name;
client            205 source4/auth/ntlm/auth_sam.c 					     user_info->client.account_name, 
client            206 source4/auth/ntlm/auth_sam.c 					     user_info->client.domain_name, 
client            127 source4/auth/ntlm/auth_server.c 	cli_credentials_set_username(creds, user_info->client.account_name, CRED_SPECIFIED);
client            128 source4/auth/ntlm/auth_server.c 	cli_credentials_set_domain(creds, user_info->client.domain_name, CRED_SPECIFIED);
client            177 source4/auth/ntlm/auth_server.c 	server_info->account_name = talloc_strdup(server_info, user_info->client.account_name);
client            180 source4/auth/ntlm/auth_server.c 	server_info->domain_name = talloc_strdup(server_info, user_info->client.domain_name);
client             69 source4/auth/ntlm/auth_simple.c 	user_info->client.account_name = nt4_username;
client             71 source4/auth/ntlm/auth_simple.c 	user_info->client.domain_name = nt4_domain;
client             55 source4/auth/ntlm/auth_util.c 		user_info->client.domain_name, user_info->client.account_name, user_info->workstation_name));
client             57 source4/auth/ntlm/auth_util.c 	account_name = talloc_strdup(mem_ctx, user_info->client.account_name);
client             67 source4/auth/ntlm/auth_util.c 	if (user_info->client.domain_name && *user_info->client.domain_name) {
client             68 source4/auth/ntlm/auth_util.c 		domain = user_info->client.domain_name;
client             69 source4/auth/ntlm/auth_util.c 	} else if (strchr_m(user_info->client.account_name, '@')) {
client            152 source4/auth/ntlm/auth_util.c 							   user_info_in->client.account_name, 
client            153 source4/auth/ntlm/auth_util.c 							   user_info_in->client.domain_name, 
client            101 source4/auth/ntlm/auth_winbind.c 		       user_info->client.account_name, sizeof(fstring));
client            103 source4/auth/ntlm/auth_winbind.c 		       user_info->client.domain_name, sizeof(fstring));
client            133 source4/auth/ntlm/auth_winbind.c 								 user_info->client.account_name, 
client            140 source4/auth/ntlm/auth_winbind.c 			  user_info->client.domain_name, user_info->client.account_name));
client            145 source4/auth/ntlm/auth_winbind.c 			  user_info->client.domain_name, user_info->client.account_name));
client            178 source4/auth/ntlm/auth_winbind.c 			  user_info->client.domain_name, user_info->client.account_name));
client            227 source4/auth/ntlm/auth_winbind.c 	identity_info->domain_name.string	= user_info->client.domain_name;
client            231 source4/auth/ntlm/auth_winbind.c 	identity_info->account_name.string	= user_info->client.account_name;
client            242 source4/auth/ntlm/auth_winbind.c 						      user_info->client.account_name,
client            673 source4/auth/ntlmssp/ntlmssp_server.c 	user_info->client.account_name = gensec_ntlmssp_state->user;
client            674 source4/auth/ntlmssp/ntlmssp_server.c 	user_info->client.domain_name = gensec_ntlmssp_state->domain;
client             91 source4/heimdal/kdc/524.c     krb5_principal client;
client             95 source4/heimdal/kdc/524.c     ret = _krb5_principalname2krb5_principal(context, &client,
client            102 source4/heimdal/kdc/524.c     ret = krb5_unparse_name(context, client, &cpn);
client            104 source4/heimdal/kdc/524.c 	krb5_free_principal(context, client);
client            111 source4/heimdal/kdc/524.c     krb5_free_principal(context, client);
client             84 source4/heimdal/kdc/digest.c 		    hdb_entry_ex *client)
client             89 source4/heimdal/kdc/digest.c 						 client->entry.principal));
client            104 source4/heimdal/kdc/digest.c 		hdb_entry_ex *client,
client            116 source4/heimdal/kdc/digest.c     p = client->entry.principal;
client            221 source4/heimdal/kdc/digest.c     hdb_entry_ex *client = NULL;
client            316 source4/heimdal/kdc/digest.c 			    HDB_F_GET_CLIENT, NULL, &client);
client            321 source4/heimdal/kdc/digest.c 	if (client->entry.flags.allow_digest == 0) {
client           1022 source4/heimdal/kdc/digest.c 	    get_ntlm_targetname(context, client);
client           1052 source4/heimdal/kdc/digest.c 			      client,
client           1195 source4/heimdal/kdc/digest.c 	    targetname = get_ntlm_targetname(context, client);
client           1443 source4/heimdal/kdc/digest.c     if (client)
client           1444 source4/heimdal/kdc/digest.c 	_kdc_free_ent (context, client);
client            138 source4/heimdal/kdc/kerberos4.c     hdb_entry_ex *client = NULL, *server = NULL;
client            197 source4/heimdal/kdc/kerberos4.c 			     HDB_F_GET_CLIENT, &client);
client            216 source4/heimdal/kdc/kerberos4.c 				client, client_name,
client            227 source4/heimdal/kdc/kerberos4.c 	    client->entry.flags.allow_kerberos4 == 0)
client            243 source4/heimdal/kdc/kerberos4.c 	    || client->entry.flags.require_preauth
client            254 source4/heimdal/kdc/kerberos4.c 	ret = _kdc_get_des_key(context, client, FALSE, FALSE, &ckey);
client            271 source4/heimdal/kdc/kerberos4.c 	if(client->entry.max_life)
client            272 source4/heimdal/kdc/kerberos4.c 	    max_life = min(max_life, *client->entry.max_life);
client            332 source4/heimdal/kdc/kerberos4.c 					  client->entry.pw_end ? *client->entry.pw_end : 0,
client            333 source4/heimdal/kdc/kerberos4.c 					  client->entry.kvno % 256,
client            468 source4/heimdal/kdc/kerberos4.c 			     HDB_F_GET_CLIENT, &client);
client            478 source4/heimdal/kdc/kerberos4.c 	if (client == NULL && strcmp(ad.prealm, config->v4_realm) == 0) {
client            501 source4/heimdal/kdc/kerberos4.c 				client, client_name,
client            523 source4/heimdal/kdc/kerberos4.c 	if(client && client->entry.max_life)
client            524 source4/heimdal/kdc/kerberos4.c 	    max_end = min(max_end, kdc_time + *client->entry.max_life);
client            634 source4/heimdal/kdc/kerberos4.c     if(client)
client            635 source4/heimdal/kdc/kerberos4.c 	_kdc_free_ent(context, client);
client            464 source4/heimdal/kdc/kerberos5.c 		  METHOD_DATA *md, hdb_entry *client,
client            475 source4/heimdal/kdc/kerberos5.c     pa.len = client->keys.len;
client            483 source4/heimdal/kdc/kerberos5.c     for(i = 0; i < client->keys.len; i++) {
client            485 source4/heimdal/kdc/kerberos5.c 	    if (pa.val[j].etype == client->keys.val[i].key.keytype)
client            488 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j]) {
client            497 source4/heimdal/kdc/kerberos5.c 						&client->keys.val[i])) != 0) {
client            506 source4/heimdal/kdc/kerberos5.c     for(i = 0; i < client->keys.len; i++) {
client            509 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j])
client            512 source4/heimdal/kdc/kerberos5.c 	if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0)
client            520 source4/heimdal/kdc/kerberos5.c 					&client->keys.val[i])) != 0) {
client            626 source4/heimdal/kdc/kerberos5.c 		   METHOD_DATA *md, hdb_entry *client,
client            636 source4/heimdal/kdc/kerberos5.c     pa.len = client->keys.len;
client            644 source4/heimdal/kdc/kerberos5.c     for(i = 0; i < client->keys.len; i++) {
client            646 source4/heimdal/kdc/kerberos5.c 	    if (pa.val[j].etype == client->keys.val[i].key.keytype)
client            649 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j]) {
client            655 source4/heimdal/kdc/kerberos5.c 						 &client->keys.val[i])) != 0) {
client            665 source4/heimdal/kdc/kerberos5.c     for(i = 0; i < client->keys.len; i++) {
client            668 source4/heimdal/kdc/kerberos5.c 	    if(client->keys.val[i].key.keytype == etypes[j])
client            671 source4/heimdal/kdc/kerberos5.c 	if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0)
client            676 source4/heimdal/kdc/kerberos5.c 					 &client->keys.val[i])) != 0) {
client            780 source4/heimdal/kdc/kerberos5.c 	hdb_entry *client = &client_ex->entry;
client            783 source4/heimdal/kdc/kerberos5.c 	if (client->flags.invalid) {
client            789 source4/heimdal/kdc/kerberos5.c 	if(!client->flags.client){
client            795 source4/heimdal/kdc/kerberos5.c 	if (client->valid_start && *client->valid_start > kdc_time) {
client            797 source4/heimdal/kdc/kerberos5.c 	    krb5_format_time(context, *client->valid_start,
client            805 source4/heimdal/kdc/kerberos5.c 	if (client->valid_end && *client->valid_end < kdc_time) {
client            807 source4/heimdal/kdc/kerberos5.c 	    krb5_format_time(context, *client->valid_end,
client            815 source4/heimdal/kdc/kerberos5.c 	if (client->pw_end && *client->pw_end < kdc_time
client            818 source4/heimdal/kdc/kerberos5.c 	    krb5_format_time(context, *client->pw_end,
client            976 source4/heimdal/kdc/kerberos5.c     hdb_entry_ex *client = NULL, *server = NULL;
client           1054 source4/heimdal/kdc/kerberos5.c 			HDB_F_GET_CLIENT | flags, NULL, &client);
client           1072 source4/heimdal/kdc/kerberos5.c     ret = _kdc_windc_client_access(context, client, req, &e_data);
client           1077 source4/heimdal/kdc/kerberos5.c 			   client, client_name,
client           1123 source4/heimdal/kdc/kerberos5.c 				       client,
client           1172 source4/heimdal/kdc/kerberos5.c 	    ret = hdb_enctype2key(context, &client->entry,
client           1223 source4/heimdal/kdc/kerberos5.c 		if(hdb_next_enctype2key(context, &client->entry,
client           1301 source4/heimdal/kdc/kerberos5.c 	      || client->entry.flags.require_preauth
client           1343 source4/heimdal/kdc/kerberos5.c 				    &method_data, &client->entry,
client           1347 source4/heimdal/kdc/kerberos5.c 				 &client->entry, b->etype.val, b->etype.len);
client           1372 source4/heimdal/kdc/kerberos5.c     ret = _kdc_find_etype(context, client, b->etype.val, b->etype.len,
client           1452 source4/heimdal/kdc/kerberos5.c     copy_Realm(&client->entry.principal->realm, &rep.crealm);
client           1457 source4/heimdal/kdc/kerberos5.c 				      client->entry.principal);
client           1470 source4/heimdal/kdc/kerberos5.c     if(client->entry.flags.forwardable && server->entry.flags.forwardable)
client           1478 source4/heimdal/kdc/kerberos5.c     if(client->entry.flags.proxiable && server->entry.flags.proxiable)
client           1486 source4/heimdal/kdc/kerberos5.c     if(client->entry.flags.postdate && server->entry.flags.postdate)
client           1526 source4/heimdal/kdc/kerberos5.c 	if(client->entry.max_life)
client           1527 source4/heimdal/kdc/kerberos5.c 	    t = start + min(t - start, *client->entry.max_life);
client           1547 source4/heimdal/kdc/kerberos5.c 	    if(client->entry.max_renew)
client           1548 source4/heimdal/kdc/kerberos5.c 		t = start + min(t - start, *client->entry.max_renew);
client           1588 source4/heimdal/kdc/kerberos5.c     if (client->entry.pw_end
client           1590 source4/heimdal/kdc/kerberos5.c 	    || kdc_time + config->kdc_warn_pwexpire >= *client->entry.pw_end)) {
client           1592 source4/heimdal/kdc/kerberos5.c 	ek.last_req.val[ek.last_req.len].lr_value = *client->entry.pw_end;
client           1595 source4/heimdal/kdc/kerberos5.c     if (client->entry.valid_end) {
client           1597 source4/heimdal/kdc/kerberos5.c 	ek.last_req.val[ek.last_req.len].lr_value = *client->entry.valid_end;
client           1606 source4/heimdal/kdc/kerberos5.c     if (client->entry.valid_end || client->entry.pw_end) {
client           1608 source4/heimdal/kdc/kerberos5.c 	if (client->entry.valid_end) {
client           1609 source4/heimdal/kdc/kerberos5.c 	    if (client->entry.pw_end)
client           1610 source4/heimdal/kdc/kerberos5.c 		*ek.key_expiration = min(*client->entry.valid_end,
client           1611 source4/heimdal/kdc/kerberos5.c 					 *client->entry.pw_end);
client           1613 source4/heimdal/kdc/kerberos5.c 		*ek.key_expiration = *client->entry.valid_end;
client           1615 source4/heimdal/kdc/kerberos5.c 	    *ek.key_expiration = *client->entry.pw_end;
client           1643 source4/heimdal/kdc/kerberos5.c 	ret = _kdc_pk_mk_pa_reply(context, config, pkp, client,
client           1670 source4/heimdal/kdc/kerberos5.c 	canon.names.mapped_name = client->entry.principal->name;
client           1721 source4/heimdal/kdc/kerberos5.c 	ret = _kdc_pac_generate(context, client, &p);
client           1729 source4/heimdal/kdc/kerberos5.c 				 client->entry.principal,
client           1765 source4/heimdal/kdc/kerberos5.c 			    &skey->key, client->entry.kvno,
client           1805 source4/heimdal/kdc/kerberos5.c     if(client)
client           1806 source4/heimdal/kdc/kerberos5.c 	_kdc_free_ent(context, client);
client            282 source4/heimdal/kdc/krb5tgs.c 	  hdb_entry_ex *client,
client            335 source4/heimdal/kdc/krb5tgs.c 				      client, server, &pac);
client            495 source4/heimdal/kdc/krb5tgs.c 			     hdb_entry_ex *client,
client            502 source4/heimdal/kdc/krb5tgs.c     ret = hdb_entry_get_ConstrainedDelegACL(&client->entry, &acl);
client            667 source4/heimdal/kdc/krb5tgs.c 	       hdb_entry_ex *client,
client            753 source4/heimdal/kdc/krb5tgs.c 	if(client && client->entry.max_life)
client            754 source4/heimdal/kdc/krb5tgs.c 	    life = min(life, *client->entry.max_life);
client            768 source4/heimdal/kdc/krb5tgs.c 	if(client && client->entry.max_renew)
client            769 source4/heimdal/kdc/krb5tgs.c 	    renew = min(renew, *client->entry.max_renew);
client           1375 source4/heimdal/kdc/krb5tgs.c     hdb_entry_ex *server = NULL, *client = NULL;
client           1538 source4/heimdal/kdc/krb5tgs.c 			NULL, &client);
client           1642 source4/heimdal/kdc/krb5tgs.c 		    client, server, ekey, &tkey->key,
client           1671 source4/heimdal/kdc/krb5tgs.c     if (client) {
client           1751 source4/heimdal/kdc/krb5tgs.c 	    if (client->entry.flags.trusted_for_delegation) {
client           1767 source4/heimdal/kdc/krb5tgs.c     if (client != NULL
client           1791 source4/heimdal/kdc/krb5tgs.c 	ret = hdb_enctype2key(context, &client->entry,
client           1815 source4/heimdal/kdc/krb5tgs.c 	ret = check_constrained_delegation(context, config, client, sp);
client           1871 source4/heimdal/kdc/krb5tgs.c 			   client, cpn,
client           1943 source4/heimdal/kdc/krb5tgs.c 			 client,
client           1961 source4/heimdal/kdc/krb5tgs.c     if(client)
client           1962 source4/heimdal/kdc/krb5tgs.c 	_kdc_free_ent(context, client);
client            959 source4/heimdal/kdc/pkinit.c 		    const hdb_entry_ex *client,
client           1365 source4/heimdal/kdc/pkinit.c 		     const hdb_entry_ex *client,
client           1393 source4/heimdal/kdc/pkinit.c 			    client->entry.principal);
client           1402 source4/heimdal/kdc/pkinit.c 			       client->entry.principal);
client           1410 source4/heimdal/kdc/pkinit.c     ret = hdb_entry_get_pkinit_acl(&client->entry, &acl);
client           1436 source4/heimdal/kdc/pkinit.c 				   client->entry.principal,
client             77 source4/heimdal/kdc/windc.c 		  hdb_entry_ex *client,
client             83 source4/heimdal/kdc/windc.c     return (windcft->pac_generate)(windcctx, context, client, pac);
client             89 source4/heimdal/kdc/windc.c 		hdb_entry_ex *client,
client             98 source4/heimdal/kdc/windc.c 				 client_principal, client, server, pac);
client            103 source4/heimdal/kdc/windc.c 			 struct hdb_entry_ex *client,
client            109 source4/heimdal/kdc/windc.c     return (windcft->client_access)(windcctx, context, client, req, e_data);
client            197 source4/heimdal/kuser/kinit.c 	   krb5_principal client,
client            205 source4/heimdal/kuser/kinit.c     client_realm = krb5_princ_realm (context, client);
client            224 source4/heimdal/kuser/kinit.c 	krb5_principal client;
client            225 source4/heimdal/kuser/kinit.c 	krb5_cc_get_principal(context, ccache, &client);
client            227 source4/heimdal/kuser/kinit.c 	ret = get_server(context, client, server, &in_creds.server);
client            229 source4/heimdal/kuser/kinit.c 	    krb5_free_principal(context, client);
client            232 source4/heimdal/kuser/kinit.c 	in_creds.client = client;
client            234 source4/heimdal/kuser/kinit.c 	krb5_free_principal(context, client);
client            271 source4/heimdal/kuser/kinit.c     ret = krb5_cc_get_principal(context, cache, &in.client);
client            276 source4/heimdal/kuser/kinit.c     ret = get_server(context, in.client, server, &in.server);
client            326 source4/heimdal/kuser/kinit.c     ret = krb5_cc_initialize(context, cache, in.client);
client            600 source4/heimdal/kuser/kinit.c     ret = krb5_cc_initialize (context, tempccache, cred.client);
client            641 source4/heimdal/kuser/kinit.c 		krb5_principal client, const char *server)
client            649 source4/heimdal/kuser/kinit.c     ret = krb5_cc_get_principal(context, cache, &in_cred.client);
client            654 source4/heimdal/kuser/kinit.c     ret = get_server(context, in_cred.client, server, &in_cred.server);
client            656 source4/heimdal/kuser/kinit.c 	krb5_free_principal(context, in_cred.client);
client            663 source4/heimdal/kuser/kinit.c     krb5_free_principal(context, in_cred.client);
client            425 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c 			       ctx->ticket->client,
client            451 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c 				    ctx->ticket->client,
client             50 source4/heimdal/lib/gssapi/krb5/acquire_cred.c     in_cred.client = principal;
client            193 source4/heimdal/lib/gssapi/krb5/acquire_cred.c 	kret = krb5_cc_initialize(context, ccache, cred.client);
client            223 source4/heimdal/lib/gssapi/krb5/acquire_cred.c     if (cred.client != NULL)
client            200 source4/heimdal/lib/gssapi/krb5/init_sec_context.c     this_cred.client = ctx->source;
client            295 source4/heimdal/lib/gssapi/krb5/init_sec_context.c     kret = krb5_cc_get_principal(context, ccache, &creds.client);
client            301 source4/heimdal/lib/gssapi/krb5/init_sec_context.c 				strlen(creds.client->realm),
client            302 source4/heimdal/lib/gssapi/krb5/init_sec_context.c 				creds.client->realm,
client            304 source4/heimdal/lib/gssapi/krb5/init_sec_context.c 				creds.client->realm,
client            333 source4/heimdal/lib/gssapi/krb5/init_sec_context.c     if (creds.client)
client            334 source4/heimdal/lib/gssapi/krb5/init_sec_context.c 	krb5_free_principal(context, creds.client);
client            261 source4/heimdal/lib/hx509/cms.c 		   CMSIdentifier *client,
client            277 source4/heimdal/lib/hx509/cms.c     switch (client->element) {
client            279 source4/heimdal/lib/hx509/cms.c 	q.serial = &client->u.issuerAndSerialNumber.serialNumber;
client            280 source4/heimdal/lib/hx509/cms.c 	q.issuer_name = &client->u.issuerAndSerialNumber.issuer;
client            284 source4/heimdal/lib/hx509/cms.c 	q.subject_id = &client->u.subjectKeyIdentifier;
client            305 source4/heimdal/lib/hx509/cms.c 	ret = unparse_CMSIdentifier(context, client, &str);
client            153 source4/heimdal/lib/krb5/acache.c     ret = krb5_parse_name(context, incred->client, &cred->client);
client            285 source4/heimdal/lib/krb5/acache.c     if (cred->client)
client            286 source4/heimdal/lib/krb5/acache.c 	free(cred->client);
client            300 source4/heimdal/lib/krb5/acache.c     ret = krb5_unparse_name(context, incred->client, &cred->client);
client            754 source4/heimdal/lib/krb5/acache.c     char *client, *server;
client            762 source4/heimdal/lib/krb5/acache.c     if (cred->client) {
client            763 source4/heimdal/lib/krb5/acache.c 	ret = krb5_unparse_name(context, cred->client, &client);
client            767 source4/heimdal/lib/krb5/acache.c 	client = NULL;
client            771 source4/heimdal/lib/krb5/acache.c 	free(client);
client            778 source4/heimdal/lib/krb5/acache.c 	free(client);
client            795 source4/heimdal/lib/krb5/acache.c 	if (client && strcmp(v5cred->client, client) != 0)
client            814 source4/heimdal/lib/krb5/acache.c     free(client);
client            126 source4/heimdal/lib/krb5/build_auth.c     copy_Realm(&cred->client->realm, &auth->crealm);
client            127 source4/heimdal/lib/krb5/build_auth.c     copy_PrincipalName(&cred->client->name, &auth->cname);
client           1072 source4/heimdal/lib/krb5/cache.c 		     krb5_principal client,
client           1092 source4/heimdal/lib/krb5/cache.c 	    match = krb5_principal_compare(context, principal, client);
client           1107 source4/heimdal/lib/krb5/cache.c 	krb5_unparse_name(context, client, &str);
client           1164 source4/heimdal/lib/krb5/cache.c     krb5_principal client;
client           1170 source4/heimdal/lib/krb5/cache.c     ret = krb5_cc_get_principal(context, id, &client);
client           1181 source4/heimdal/lib/krb5/cache.c 			      krb5_principal_get_realm(context, client),
client           1185 source4/heimdal/lib/krb5/cache.c 	krb5_free_principal(context, client);
client           1188 source4/heimdal/lib/krb5/cache.c     ret = krb5_copy_principal(context, client, &cred->client);
client           1189 source4/heimdal/lib/krb5/cache.c     krb5_free_principal(context, client);
client             93 source4/heimdal/lib/krb5/changepw.c 	krb5_principal_compare(context, creds->client, targprinc) != TRUE)
client            530 source4/heimdal/lib/krb5/changepw.c 	realm = creds->client->realm;
client            808 source4/heimdal/lib/krb5/changepw.c     ret = krb5_cc_get_principal(context, ccache, &creds.client);
client            816 source4/heimdal/lib/krb5/changepw.c     krb5_free_principal(context, creds.client);
client            127 source4/heimdal/lib/krb5/convert_creds.c 	ret = krb5_524_conv_principal(context, v5_creds->client,
client            183 source4/heimdal/lib/krb5/convert_creds.c 	ret = krb5_copy_principal (context, in_cred->client, &template.client);
client             68 source4/heimdal/lib/krb5/creds.c     krb5_free_principal (context, c->client);
client             69 source4/heimdal/lib/krb5/creds.c     c->client = NULL;
client            102 source4/heimdal/lib/krb5/creds.c     ret = krb5_copy_principal (context, incred->client, &c->client);
client            228 source4/heimdal/lib/krb5/creds.c     if (match && mcreds->client) {
client            230 source4/heimdal/lib/krb5/creds.c 	    match = krb5_principal_compare_any_realm (context, mcreds->client,
client            231 source4/heimdal/lib/krb5/creds.c 						      creds->client);
client            233 source4/heimdal/lib/krb5/creds.c 	    match = krb5_principal_compare (context, mcreds->client,
client            234 source4/heimdal/lib/krb5/creds.c 					    creds->client);
client           4386 source4/heimdal/lib/krb5/crypto.c 		 krb5_const_principal client,
client           4417 source4/heimdal/lib/krb5/crypto.c     ret = encode_uvinfo(context, client, &otherinfo.partyUInfo);
client           4452 source4/heimdal/lib/krb5/crypto.c 	     krb5_const_principal client,
client           4498 source4/heimdal/lib/krb5/crypto.c     ret = encode_otherinfo(context, ai, client, server,
client            315 source4/heimdal/lib/krb5/get_cred.c     ret = krb5_cc_get_principal(context, id, &tmp_cred.client);
client            326 source4/heimdal/lib/krb5/get_cred.c 	krb5_free_principal(context, tmp_cred.client);
client            334 source4/heimdal/lib/krb5/get_cred.c     krb5_free_principal(context, tmp_cred.client);
client            532 source4/heimdal/lib/krb5/get_cred.c 				  in_creds->client,
client            533 source4/heimdal/lib/krb5/get_cred.c 				  &out_creds->client);
client            762 source4/heimdal/lib/krb5/get_cred.c     client_realm = krb5_principal_get_realm(context, in_creds->client);
client            765 source4/heimdal/lib/krb5/get_cred.c     ret = krb5_copy_principal(context, in_creds->client, &tmp_creds.client);
client            781 source4/heimdal/lib/krb5/get_cred.c 	krb5_free_principal(context, tmp_creds.client);
client            812 source4/heimdal/lib/krb5/get_cred.c 	    krb5_free_principal(context, tmp_creds.client);
client            816 source4/heimdal/lib/krb5/get_cred.c     if(krb5_realm_compare(context, in_creds->client, in_creds->server))
client            827 source4/heimdal/lib/krb5/get_cred.c 	    krb5_free_principal(context, tmp_creds.client);
client            842 source4/heimdal/lib/krb5/get_cred.c 	    krb5_free_principal(context, tmp_creds.client);
client            853 source4/heimdal/lib/krb5/get_cred.c 	    krb5_free_principal(context, tmp_creds.client);
client            859 source4/heimdal/lib/krb5/get_cred.c 	    krb5_free_principal(context, tmp_creds.client);
client            865 source4/heimdal/lib/krb5/get_cred.c     krb5_free_principal(context, tmp_creds.client);
client            906 source4/heimdal/lib/krb5/get_cred.c     client_realm = krb5_principal_get_realm(context, in_creds->client);
client           1309 source4/heimdal/lib/krb5/get_cred.c     ret = krb5_cc_get_principal(context, ccache, &in_creds.client);
client           1319 source4/heimdal/lib/krb5/get_cred.c 	krb5_free_principal(context, in_creds.client);
client           1348 source4/heimdal/lib/krb5/get_cred.c 	    krb5_free_principal(context, in_creds.client);
client           1355 source4/heimdal/lib/krb5/get_cred.c 	    krb5_free_principal(context, in_creds.client);
client           1363 source4/heimdal/lib/krb5/get_cred.c 	krb5_free_principal(context, in_creds.client);
client           1368 source4/heimdal/lib/krb5/get_cred.c 	krb5_free_principal(context, in_creds.client);
client           1390 source4/heimdal/lib/krb5/get_cred.c     krb5_free_principal(context, in_creds.client);
client           1408 source4/heimdal/lib/krb5/get_cred.c 		       krb5_const_principal client,
client           1419 source4/heimdal/lib/krb5/get_cred.c     ret = krb5_copy_principal(context, client, &in.client);
client           1426 source4/heimdal/lib/krb5/get_cred.c 	    krb5_free_principal(context, in.client);
client           1430 source4/heimdal/lib/krb5/get_cred.c 	const char *realm = krb5_principal_get_realm(context, client);
client           1435 source4/heimdal/lib/krb5/get_cred.c 	    krb5_free_principal(context, in.client);
client           1455 source4/heimdal/lib/krb5/get_cred.c     krb5_free_principal(context, in.client);
client            109 source4/heimdal/lib/krb5/get_for_creds.c 		    krb5_principal	client,
client            137 source4/heimdal/lib/krb5/get_for_creds.c     client_realm = krb5_principal_get_realm(context, client);
client            140 source4/heimdal/lib/krb5/get_for_creds.c     creds.client = client;
client            225 source4/heimdal/lib/krb5/get_for_creds.c 							 in_creds->client),
client            370 source4/heimdal/lib/krb5/get_for_creds.c     copy_Realm (&out_creds->client->realm, krb_cred_info->prealm);
client            372 source4/heimdal/lib/krb5/get_for_creds.c     copy_PrincipalName(&out_creds->client->name, krb_cred_info->pname);
client            408 source4/heimdal/lib/krb5/get_in_tkt.c 				    creds->client,
client            416 source4/heimdal/lib/krb5/get_in_tkt.c     krb5_free_principal (context, creds->client);
client            417 source4/heimdal/lib/krb5/get_in_tkt.c     creds->client = tmp_principal;
client            444 source4/heimdal/lib/krb5/get_in_tkt.c 	const char *crealm = krb5_principal_get_realm(context, creds->client);
client            613 source4/heimdal/lib/krb5/get_in_tkt.c 	   krb5_principal client,
client            628 source4/heimdal/lib/krb5/get_in_tkt.c 	ret = krb5_get_pw_salt (context, client, &salt2);
client            695 source4/heimdal/lib/krb5/get_in_tkt.c     ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
client            701 source4/heimdal/lib/krb5/get_in_tkt.c     ret = copy_Realm(&creds->client->realm, &a->req_body.realm);
client            792 source4/heimdal/lib/krb5/get_in_tkt.c 		    ret = add_padata(context, a->padata, creds->client,
client            816 source4/heimdal/lib/krb5/get_in_tkt.c 	add_padata(context, a->padata, creds->client,
client            823 source4/heimdal/lib/krb5/get_in_tkt.c 	add_padata(context, a->padata, creds->client,
client            943 source4/heimdal/lib/krb5/get_in_tkt.c 	ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp);
client           1006 source4/heimdal/lib/krb5/get_in_tkt.c 	ret = krb5_get_pw_salt (context, creds->client, &salt);
client             84 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c     a.principal = creds->client;
client            128 source4/heimdal/lib/krb5/init_creds_pw.c 	   krb5_principal client,
client            142 source4/heimdal/lib/krb5/init_creds_pw.c     if (client)
client            143 source4/heimdal/lib/krb5/init_creds_pw.c 	krb5_copy_principal(context, client, &cred->client);
client            146 source4/heimdal/lib/krb5/init_creds_pw.c 					  &cred->client);
client            151 source4/heimdal/lib/krb5/init_creds_pw.c     client_realm = krb5_principal_get_realm (context, cred->client);
client            260 source4/heimdal/lib/krb5/init_creds_pw.c 		      krb5_principal client,
client            301 source4/heimdal/lib/krb5/init_creds_pw.c     ret = init_cred (context, &ctx->cred, client, start_time,
client            368 source4/heimdal/lib/krb5/init_creds_pw.c 		 krb5_principal client,
client            403 source4/heimdal/lib/krb5/init_creds_pw.c 					client,
client            447 source4/heimdal/lib/krb5/init_creds_pw.c 			     client,
client            491 source4/heimdal/lib/krb5/init_creds_pw.c 			   krb5_principal client,
client            501 source4/heimdal/lib/krb5/init_creds_pw.c     ret = get_init_creds_common(context, client, start_time,
client            512 source4/heimdal/lib/krb5/init_creds_pw.c     a->principal = ctx.cred.client;
client            571 source4/heimdal/lib/krb5/init_creds_pw.c     ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
client            574 source4/heimdal/lib/krb5/init_creds_pw.c     ret = copy_Realm(&creds->client->realm, &a->req_body.realm);
client            699 source4/heimdal/lib/krb5/init_creds_pw.c 	       const krb5_principal client,
client            720 source4/heimdal/lib/krb5/init_creds_pw.c 		    ret = krb5_get_pw_salt(context, client, &salt);
client            748 source4/heimdal/lib/krb5/init_creds_pw.c 	      const krb5_principal client,
client            770 source4/heimdal/lib/krb5/init_creds_pw.c 		    ret = krb5_get_pw_salt(context, client, &salt);
client            800 source4/heimdal/lib/krb5/init_creds_pw.c 		   const krb5_principal client,
client            850 source4/heimdal/lib/krb5/init_creds_pw.c 		const krb5_principal client,
client            863 source4/heimdal/lib/krb5/init_creds_pw.c 	p = (*pa_prefs[i].salt_info)(context, client, asreq,
client            926 source4/heimdal/lib/krb5/init_creds_pw.c 		  krb5_principal client,
client            941 source4/heimdal/lib/krb5/init_creds_pw.c 	ret = krb5_get_pw_salt (context, client, &salt2);
client            971 source4/heimdal/lib/krb5/init_creds_pw.c 		     const krb5_principal client,
client            980 source4/heimdal/lib/krb5/init_creds_pw.c 	add_enc_ts_padata(context, md, client,
client            988 source4/heimdal/lib/krb5/init_creds_pw.c 	add_enc_ts_padata(context, md, client,
client            996 source4/heimdal/lib/krb5/init_creds_pw.c 	add_enc_ts_padata(context, md, client,
client           1006 source4/heimdal/lib/krb5/init_creds_pw.c 		     const krb5_principal client,
client           1024 source4/heimdal/lib/krb5/init_creds_pw.c 		     const krb5_principal client,
client           1108 source4/heimdal/lib/krb5/init_creds_pw.c 	ret = pa_data_to_md_pkinit(context, a, creds->client, ctx, *out_md);
client           1118 source4/heimdal/lib/krb5/init_creds_pw.c 	ppaid = process_pa_info(context, creds->client, a, &paid, in_md);
client           1120 source4/heimdal/lib/krb5/init_creds_pw.c 	pa_data_to_md_ts_enc(context, a, creds->client, ctx, ppaid, *out_md);
client           1155 source4/heimdal/lib/krb5/init_creds_pw.c 	ppaid = process_pa_info(context, creds->client, a, &paid,
client           1159 source4/heimdal/lib/krb5/init_creds_pw.c 	ret = krb5_get_pw_salt (context, creds->client, &paid.salt);
client           1197 source4/heimdal/lib/krb5/init_creds_pw.c 	ret = pa_data_to_key_plain(context, creds->client, ctx,
client           1289 source4/heimdal/lib/krb5/init_creds_pw.c 				   creds->client->realm, &resp);
client           1396 source4/heimdal/lib/krb5/init_creds_pw.c 		    krb5_principal client,
client           1411 source4/heimdal/lib/krb5/init_creds_pw.c     ret = get_init_creds_common(context, client, start_time,
client           1446 source4/heimdal/lib/krb5/init_creds_pw.c 				   client,
client           1464 source4/heimdal/lib/krb5/init_creds_pw.c 		      krb5_principal_get_realm (context, ctx.cred.client),
client           1484 source4/heimdal/lib/krb5/init_creds_pw.c 			     krb5_principal client,
client           1497 source4/heimdal/lib/krb5/init_creds_pw.c 	const char *realm = krb5_principal_get_realm(context, client);
client           1517 source4/heimdal/lib/krb5/init_creds_pw.c 	krb5_unparse_name (context, client, &p);
client           1549 source4/heimdal/lib/krb5/init_creds_pw.c     ret = krb5_get_init_creds(context, creds, client, prompter,
client           1569 source4/heimdal/lib/krb5/init_creds_pw.c 			     krb5_principal client,
client           1578 source4/heimdal/lib/krb5/init_creds_pw.c     ret = get_init_creds_common(context, client, start_time,
client            387 source4/heimdal/lib/krb5/krb5.h     krb5_principal client;
client            451 source4/heimdal/lib/krb5/krb5.h     krb5_principal client;
client            104 source4/heimdal/lib/krb5/krb5_ccapi.h     char *client;
client             43 source4/heimdal/lib/krb5/mk_error.c 	      const krb5_principal client,
client             81 source4/heimdal/lib/krb5/mk_error.c     if(client){
client             82 source4/heimdal/lib/krb5/mk_error.c 	msg.crealm = &client->realm;
client             83 source4/heimdal/lib/krb5/mk_error.c 	msg.cname = &client->name;
client             52 source4/heimdal/lib/krb5/mk_req.c     ret = krb5_cc_get_principal(context, ccache, &this_cred.client);
client            279 source4/heimdal/lib/krb5/rd_cred.c 						&creds->client,
client             86 source4/heimdal/lib/krb5/rd_error.c 	    krb5_unparse_name_fixed(context, creds->client,
client            387 source4/heimdal/lib/krb5/rd_req.c 					     &t->client,
client            875 source4/heimdal/lib/krb5/rd_req.c 				  o->ticket->client,
client            783 source4/heimdal/lib/krb5/store.c     ret = krb5_store_principal(sp, creds->client);
client            827 source4/heimdal/lib/krb5/store.c     ret = krb5_ret_principal (sp,  &creds->client);
client            890 source4/heimdal/lib/krb5/store.c     if (creds->client)
client            907 source4/heimdal/lib/krb5/store.c     if (creds->client) {
client            908 source4/heimdal/lib/krb5/store.c 	ret = krb5_store_principal(sp, creds->client);
client            977 source4/heimdal/lib/krb5/store.c 	ret = krb5_ret_principal (sp,  &creds->client);
client             43 source4/heimdal/lib/krb5/ticket.c     krb5_free_principal(context, ticket->client);
client             68 source4/heimdal/lib/krb5/ticket.c     ret = krb5_copy_principal(context, from->client, &tmp->client);
client             76 source4/heimdal/lib/krb5/ticket.c 	krb5_free_principal(context, tmp->client);
client             88 source4/heimdal/lib/krb5/ticket.c 		       krb5_principal *client)
client             90 source4/heimdal/lib/krb5/ticket.c     return krb5_copy_principal(context, ticket->client, client);
client            119 source4/kdc/hdb-samba4.c 			flags.client = 1;
client            126 source4/kdc/hdb-samba4.c 			flags.client = 1;
client            132 source4/kdc/hdb-samba4.c 			flags.client = 1;
client            138 source4/kdc/hdb-samba4.c 			flags.client = 1;
client            145 source4/kdc/hdb-samba4.c 		flags.client = 0;
client            108 source4/kdc/pac-glue.c 				  struct hdb_entry_ex *client,
client            114 source4/kdc/pac-glue.c 	struct hdb_ldb_private *p = talloc_get_type(client->ctx, struct hdb_ldb_private);
client            152 source4/kdc/pac-glue.c 				struct hdb_entry_ex *client,  
client            134 source4/lib/socket/access.c static bool client_match(TALLOC_CTX *mem_ctx, const char *tok, struct client_addr *client)
client            144 source4/lib/socket/access.c 	if ((match = string_match(mem_ctx, tok, client->caddr, &invalid_char)) == 0) {
client            149 source4/lib/socket/access.c 		if (client->cname[0] != 0)
client            150 source4/lib/socket/access.c 			match = string_match(mem_ctx, tok, client->cname, &invalid_char);
client            161 source4/lib/socket/access.c static bool list_match(TALLOC_CTX *mem_ctx, const char **list, struct client_addr *client)
client            178 source4/lib/socket/access.c 		if ((match = client_match(mem_ctx, *list, client)))	/* true or FAIL */
client            188 source4/lib/socket/access.c 			if (client_match(mem_ctx, *list, client)) /* Exception Found */
client            201 source4/lib/socket/access.c 	struct client_addr client;
client            203 source4/lib/socket/access.c 	client.cname = cname;
client            204 source4/lib/socket/access.c 	client.caddr = caddr;
client            213 source4/lib/socket/access.c 			list_match(mem_ctx, deny_list, &client) &&
client            215 source4/lib/socket/access.c 				!list_match(mem_ctx, allow_list, &client))) {
client            230 source4/lib/socket/access.c 		return list_match(mem_ctx, allow_list, &client);
client            235 source4/lib/socket/access.c 		return !list_match(mem_ctx, deny_list, &client);
client            239 source4/lib/socket/access.c 	if (list_match(mem_ctx, allow_list, &client))
client            244 source4/lib/socket/access.c 	if (list_match(mem_ctx, deny_list, &client))
client             52 source4/libcli/auth/credentials.c 	des_crypt112(creds->client.data, client_challenge->data, creds->session_key, 1);
client             55 source4/libcli/auth/credentials.c 	creds->seed = creds->client;
client             85 source4/libcli/auth/credentials.c 	creds->client = *client_challenge;
client             88 source4/libcli/auth/credentials.c 	des_crypt112(creds->client.data, client_challenge->data, creds->session_key, 1);
client             91 source4/libcli/auth/credentials.c 	creds->seed = creds->client;
client            111 source4/libcli/auth/credentials.c 	des_crypt112(creds->client.data, time_cred.data, creds->session_key, 1);
client            114 source4/libcli/auth/credentials.c 		 IVAL(creds->client.data, 0), IVAL(creds->client.data, 4)));
client            213 source4/libcli/auth/credentials.c 	dump_data_pw("Credential ", creds->client.data, 8);
client            215 source4/libcli/auth/credentials.c 	*initial_credential = creds->client;
client            231 source4/libcli/auth/credentials.c 	next->cred = creds->client;
client            284 source4/libcli/auth/credentials.c 	if (memcmp(received_credentials->data, creds->client.data, 8) != 0) {
client            286 source4/libcli/auth/credentials.c 		dump_data_pw("client creds", creds->client.data, 8);
client             29 source4/libcli/auth/credentials.h 	struct netr_Credential client;
client            215 source4/ntvfs/ntvfs.h 	} client;
client            694 source4/ntvfs/ntvfs_interface.c 	ntvfs->client.get_peer_addr	= my_addr;
client            695 source4/ntvfs/ntvfs_interface.c 	ntvfs->client.get_my_addr	= peer_addr;
client            696 source4/ntvfs/ntvfs_interface.c 	ntvfs->client.private_data	= private_data;
client            702 source4/ntvfs/ntvfs_interface.c 	if (!ntvfs->ctx->client.get_my_addr) {
client            706 source4/ntvfs/ntvfs_interface.c 	return ntvfs->ctx->client.get_my_addr(ntvfs->ctx->client.private_data, mem_ctx);
client            711 source4/ntvfs/ntvfs_interface.c 	if (!ntvfs->ctx->client.get_peer_addr) {
client            715 source4/ntvfs/ntvfs_interface.c 	return ntvfs->ctx->client.get_peer_addr(ntvfs->ctx->client.private_data, mem_ctx);
client            531 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->client.account_name = r->in.logon->password->identity_info.account_name.string;
client            532 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->client.domain_name = r->in.logon->password->identity_info.domain_name.string;
client            561 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->client.account_name = r->in.logon->network->identity_info.account_name.string;
client            562 source4/rpc_server/netlogon/dcerpc_netlogon.c 		user_info->client.domain_name = r->in.logon->network->identity_info.domain_name.string;
client            137 source4/smb_server/smb/sesssetup.c 	user_info->client.account_name = sess->old.in.user;
client            138 source4/smb_server/smb/sesssetup.c 	user_info->client.domain_name = sess->old.in.domain;
client            263 source4/smb_server/smb/sesssetup.c 	user_info->client.account_name = sess->nt1.in.user;
client            264 source4/smb_server/smb/sesssetup.c 	user_info->client.domain_name = sess->nt1.in.domain;
client           1725 source4/torture/basic/denytest.c 							   struct smbcli_state *cli1, struct smbcli_state *cli2, int client)
client           1758 source4/torture/basic/denytest.c 	fname = talloc_asprintf(cli1, "\\ntdeny_%d.dll", client);
client           1893 source4/torture/basic/denytest.c 			 struct smbcli_state *cli, int client)
client           1897 source4/torture/basic/denytest.c 	srandom(torture_seed + client);
client           1899 source4/torture/basic/denytest.c 	torture_comment(tctx, "starting ntdenytest1 client %d\n", client);
client           1901 source4/torture/basic/denytest.c 	return torture_ntdenytest(tctx, cli, cli, client);
client             40 source4/torture/nbench/nbench.c 	for (n=0;n<=nb_max_retries && !op;n++) do_reconnect(&cli, tctx, client)
client             42 source4/torture/nbench/nbench.c static void do_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client)
client             45 source4/torture/nbench/nbench.c 	printf("[%d] Reconnecting client %d\n", nbench_line_count, client);
client             47 source4/torture/nbench/nbench.c 		if (nb_reconnect(cli, tctx, client)) {
client             48 source4/torture/nbench/nbench.c 			printf("[%d] Reconnected client %d\n", nbench_line_count, client);
client             52 source4/torture/nbench/nbench.c 	printf("[%d] Failed to reconnect client %d\n", nbench_line_count, client);
client             57 source4/torture/nbench/nbench.c static bool run_netbench(struct torture_context *tctx, struct smbcli_state *cli, int client)
client             68 source4/torture/nbench/nbench.c 	if (target_rate != 0 && client == 0) {
client             72 source4/torture/nbench/nbench.c 	nb_setup(cli, client);
client             80 source4/torture/nbench/nbench.c 	asprintf(&cname, "client%d", client+1);
client            139 source4/torture/nbench/nbench.c 		DEBUG(9,("run_netbench(%d): %s %s\n", client, params[0], params[1]));
client            160 source4/torture/nbench/nbio.c bool nb_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client)
client            162 source4/torture/nbench/nbio.c 	children[client].connected = false;
client            168 source4/torture/nbench/nbio.c 	if (!torture_open_connection(cli, tctx, client)) {
client            174 source4/torture/nbench/nbio.c 	nb_setup(*cli, client);
client            177 source4/torture/nbench/nbio.c 		printf("nb_reconnect: failed to reopen files in client %d\n", client);
client             60 source4/torture/raw/offline.c 	int client;
client            417 source4/torture/raw/offline.c 		state[i].client = i;
client            428 source4/torture/raw/offline.c 		state[i].client = i;
client           2790 source4/torture/rpc/samba3rpc.c 	userlevel1.client = talloc_asprintf(
client           1753 source4/torture/rpc/spoolss.c 	userlevel1.client = "hello";
client             63 source4/torture/rpc/spoolss_win.c 	ul_1.client			= "\\clientname";
client             88 source4/torture/rpc/spoolss_win.c 	ul_1.client			= "\\clientname";
client            407 source4/torture/rpc/srvsvc.c 	r.in.client = NULL;