vuser            6998 source3/include/proto.h bool session_claim(user_struct *vuser);
vuser            6999 source3/include/proto.h void session_yield(user_struct *vuser);
vuser            3468 source3/smbd/lanman.c 	user_struct *vuser = get_valid_user_struct(vuid);
vuser            3469 source3/smbd/lanman.c 	if(vuser != NULL) {
vuser            3471 source3/smbd/lanman.c 			 (int)vuser->server_info->utok.uid,
vuser            3472 source3/smbd/lanman.c 			 vuser->server_info->unix_name));
vuser            3545 source3/smbd/lanman.c 		strlcpy(p2,((vuser != NULL)
vuser            3546 source3/smbd/lanman.c 			    ? pdb_get_fullname(vuser->server_info->sam_account)
vuser            3556 source3/smbd/lanman.c 		if (vuser != NULL) {
vuser            3558 source3/smbd/lanman.c 				vuser->server_info->sam_account);
vuser            3616 source3/smbd/lanman.c 		strlcpy(p2, vuser ? pdb_get_homedir(
vuser            3617 source3/smbd/lanman.c 				vuser->server_info->sam_account) : "",
vuser            3627 source3/smbd/lanman.c 		strlcpy(p2, vuser ? pdb_get_logon_script(
vuser            3628 source3/smbd/lanman.c 				vuser->server_info->sam_account) : "",
vuser            3637 source3/smbd/lanman.c 			strlcpy(p2,((vuser != NULL)
vuser            3638 source3/smbd/lanman.c 				    ? pdb_get_fullname(vuser->server_info->sam_account)
vuser            3719 source3/smbd/lanman.c 	user_struct *vuser = get_valid_user_struct(vuid);
vuser            3725 source3/smbd/lanman.c 	if(vuser != NULL) {
vuser            3727 source3/smbd/lanman.c 			 (int)vuser->server_info->utok.uid,
vuser            3728 source3/smbd/lanman.c 			 vuser->server_info->unix_name));
vuser            3785 source3/smbd/lanman.c 		PACKS(&desc,"z", vuser ? pdb_get_logon_script(
vuser            3786 source3/smbd/lanman.c 			      vuser->server_info->sam_account) : ""); /* script path */
vuser              95 source3/smbd/password.c 	user_struct *vuser = NULL;
vuser              97 source3/smbd/password.c 	vuser = get_valid_user_struct_internal(vuid,
vuser              99 source3/smbd/password.c 	if (vuser == NULL) {
vuser             103 source3/smbd/password.c 	session_yield(vuser);
vuser             105 source3/smbd/password.c 	if (vuser->auth_ntlmssp_state) {
vuser             106 source3/smbd/password.c 		auth_ntlmssp_end(&vuser->auth_ntlmssp_state);
vuser             109 source3/smbd/password.c 	DLIST_REMOVE(validated_users, vuser);
vuser             115 source3/smbd/password.c 	TALLOC_FREE(vuser);
vuser             146 source3/smbd/password.c 	user_struct *vuser;
vuser             159 source3/smbd/password.c 	if((vuser = talloc_zero(NULL, user_struct)) == NULL) {
vuser             174 source3/smbd/password.c 	vuser->vuid = next_vuid;
vuser             184 source3/smbd/password.c 	DLIST_ADD(validated_users, vuser);
vuser             185 source3/smbd/password.c 	return vuser->vuid;
vuser             243 source3/smbd/password.c 	user_struct *vuser;
vuser             245 source3/smbd/password.c 	vuser = get_partial_auth_user_struct(vuid);
vuser             246 source3/smbd/password.c 	if (!vuser) {
vuser             251 source3/smbd/password.c 	vuser->server_info = talloc_move(vuser, &server_info);
vuser             256 source3/smbd/password.c 	vuser->server_info->sanitized_username = talloc_strdup(
vuser             257 source3/smbd/password.c 		vuser->server_info, tmp);
vuser             260 source3/smbd/password.c 		  (unsigned int)vuser->server_info->utok.uid,
vuser             261 source3/smbd/password.c 		  (unsigned int)vuser->server_info->utok.gid,
vuser             262 source3/smbd/password.c 		  vuser->server_info->unix_name,
vuser             263 source3/smbd/password.c 		  vuser->server_info->sanitized_username,
vuser             264 source3/smbd/password.c 		  pdb_get_domain(vuser->server_info->sam_account),
vuser             265 source3/smbd/password.c 		  vuser->server_info->guest ));
vuser             268 source3/smbd/password.c 		  "Real name: %s\n", vuser->server_info->unix_name,
vuser             269 source3/smbd/password.c 		  pdb_get_fullname(vuser->server_info->sam_account)));
vuser             271 source3/smbd/password.c 	if (!vuser->server_info->ptok) {
vuser             278 source3/smbd/password.c 		"and will be vuid %u\n", (int)vuser->server_info->utok.uid,
vuser             279 source3/smbd/password.c 		 vuser->server_info->unix_name, vuser->vuid));
vuser             281 source3/smbd/password.c 	if (!session_claim(vuser)) {
vuser             284 source3/smbd/password.c 			vuser->vuid));
vuser             294 source3/smbd/password.c 	vuser->homes_snum = -1;
vuser             296 source3/smbd/password.c 	if (!vuser->server_info->guest) {
vuser             297 source3/smbd/password.c 		vuser->homes_snum = register_homes_share(
vuser             298 source3/smbd/password.c 			vuser->server_info->unix_name);
vuser             301 source3/smbd/password.c 	if (srv_is_signing_negotiated() && !vuser->server_info->guest &&
vuser             305 source3/smbd/password.c 		srv_set_signing(vuser->server_info->user_session_key, response_blob);
vuser             310 source3/smbd/password.c 		vuser->server_info->sanitized_username,
vuser             311 source3/smbd/password.c 		vuser->server_info->unix_name,
vuser             312 source3/smbd/password.c 		pdb_get_domain(vuser->server_info->sam_account));
vuser             314 source3/smbd/password.c 	return vuser->vuid;
vuser             318 source3/smbd/password.c 	if (vuser) {
vuser            1290 source3/smbd/process.c 		user_struct *vuser = NULL;
vuser            1294 source3/smbd/process.c 			vuser = get_valid_user_struct(session_tag);
vuser            1295 source3/smbd/process.c 			if (vuser) {
vuser            1297 source3/smbd/process.c 					vuser->server_info->sanitized_username,
vuser            1298 source3/smbd/process.c 					vuser->server_info->unix_name,
vuser            1299 source3/smbd/process.c 					pdb_get_domain(vuser->server_info
vuser            1922 source3/smbd/reply.c 	user_struct *vuser;
vuser            1926 source3/smbd/reply.c 	vuser = get_valid_user_struct(req->vuid);
vuser            1928 source3/smbd/reply.c 	if(vuser == NULL) {
vuser            1935 source3/smbd/reply.c 	if ((vuser != NULL) && (lp_security() != SEC_SHARE)) {
vuser             641 source3/smbd/service.c static connection_struct *make_connection_snum(int snum, user_struct *vuser,
vuser             671 source3/smbd/service.c 		conn, snum, vuser ? vuser->server_info : NULL, password,
vuser             783 source3/smbd/service.c 	conn->vuid = (vuser != NULL) ? vuser->vuid : UID_FIELD_INVALID;
vuser            1093 source3/smbd/service.c 	user_struct *vuser = NULL;
vuser            1115 source3/smbd/service.c 		vuser = get_valid_user_struct(vuid);
vuser            1116 source3/smbd/service.c 		if (!vuser) {
vuser            1136 source3/smbd/service.c 			if (vuser->homes_snum == -1) {
vuser            1146 source3/smbd/service.c 			return make_connection_snum(vuser->homes_snum,
vuser            1147 source3/smbd/service.c 						    vuser, no_pw, 
vuser            1168 source3/smbd/service.c 	} else if ((lp_security() != SEC_SHARE) && (vuser->homes_snum != -1)
vuser            1170 source3/smbd/service.c 			       lp_servicename(vuser->homes_snum))) {
vuser            1174 source3/smbd/service.c 		return make_connection_snum(vuser->homes_snum,
vuser            1175 source3/smbd/service.c 					    vuser, no_pw, 
vuser            1212 source3/smbd/service.c 	return make_connection_snum(snum, vuser,
vuser              60 source3/smbd/session.c bool session_claim(user_struct *vuser)
vuser              73 source3/smbd/session.c 	vuser->session_keystr = NULL;
vuser              77 source3/smbd/session.c 	if (vuser->server_info->guest) {
vuser             141 source3/smbd/session.c 			 procid_str_static(&pid), vuser->vuid);
vuser             153 source3/smbd/session.c 			 vuser->vuid);
vuser             169 source3/smbd/session.c 	fstrcpy(sessionid.username, vuser->server_info->unix_name);
vuser             173 source3/smbd/session.c 	sessionid.uid = vuser->server_info->utok.uid;
vuser             174 source3/smbd/session.c 	sessionid.gid = vuser->server_info->utok.gid;
vuser             208 source3/smbd/session.c 	vuser->session_keystr = talloc_strdup(vuser, keystr);
vuser             209 source3/smbd/session.c 	if (!vuser->session_keystr) {
vuser             220 source3/smbd/session.c void session_yield(user_struct *vuser)
vuser             229 source3/smbd/session.c 	if (!vuser->session_keystr) {
vuser             233 source3/smbd/session.c 	key = string_term_tdb_data(vuser->session_keystr);
vuser            1156 source3/smbd/sesssetup.c 	user_struct *vuser = NULL;
vuser            1245 source3/smbd/sesssetup.c 	vuser = get_partial_auth_user_struct(vuid);
vuser            1247 source3/smbd/sesssetup.c 	if (!vuser) {
vuser            1273 source3/smbd/sesssetup.c 				       &vuser->auth_ntlmssp_state);
vuser            1283 source3/smbd/sesssetup.c 				  &vuser->auth_ntlmssp_state);
vuser            1291 source3/smbd/sesssetup.c 		if (!vuser->auth_ntlmssp_state) {
vuser            1292 source3/smbd/sesssetup.c 			status = auth_ntlmssp_start(&vuser->auth_ntlmssp_state);
vuser            1302 source3/smbd/sesssetup.c 		status = auth_ntlmssp_update(vuser->auth_ntlmssp_state,
vuser            1308 source3/smbd/sesssetup.c 				     &vuser->auth_ntlmssp_state,
vuser             227 source3/smbd/uid.c 	user_struct *vuser = get_valid_user_struct(vuid);
vuser             253 source3/smbd/uid.c 		   (vuser != NULL) && (current_user.vuid == vuid) &&
vuser             254 source3/smbd/uid.c 		   (current_user.ut.uid == vuser->server_info->utok.uid)) {
vuser             262 source3/smbd/uid.c 	server_info = vuser ? vuser->server_info : conn->server_info;
vuser             290 source3/smbd/uid.c 	} else if (vuser) {
vuser             291 source3/smbd/uid.c 		uid = conn->admin_user ? 0 : vuser->server_info->utok.uid;