nt4_domain 269 source4/auth/auth.h const char *nt4_domain, nt4_domain 38 source4/auth/ntlm/auth_simple.c const char *nt4_domain, nt4_domain 71 source4/auth/ntlm/auth_simple.c user_info->client.domain_name = nt4_domain; nt4_domain 72 source4/auth/ntlm/auth_simple.c user_info->mapped.domain_name = nt4_domain; nt4_domain 1239 source4/dsdb/samdb/cracknames.c const char **nt4_domain, const char **nt4_account) nt4_domain 1248 source4/dsdb/samdb/cracknames.c *nt4_domain = ""; nt4_domain 1278 source4/dsdb/samdb/cracknames.c *nt4_domain = talloc_strdup(mem_ctx, info1.result_name); nt4_domain 1280 source4/dsdb/samdb/cracknames.c p = strchr(*nt4_domain, '\\'); nt4_domain 1290 source4/dsdb/samdb/cracknames.c if (!*nt4_account || !*nt4_domain) { nt4_domain 1301 source4/dsdb/samdb/cracknames.c const char **nt4_domain, nt4_domain 1308 source4/dsdb/samdb/cracknames.c *nt4_domain = ""; nt4_domain 1325 source4/dsdb/samdb/cracknames.c return crack_name_to_nt4_name(mem_ctx, ev_ctx, lp_ctx, format_offered, name, nt4_domain, nt4_account); nt4_domain 39 source4/ldap_server/ldap_bind.c const char *nt4_domain, *nt4_account; nt4_domain 47 source4/ldap_server/ldap_bind.c status = crack_auto_name_to_nt4_name(call, call->conn->connection->event.ctx, call->conn->lp_ctx, req->dn, &nt4_domain, &nt4_account); nt4_domain 53 source4/ldap_server/ldap_bind.c nt4_domain, nt4_account, nt4_domain 227 source4/torture/rpc/drsuapi_cracknames.c const char *nt4_domain; nt4_domain 287 source4/torture/rpc/drsuapi_cracknames.c nt4_domain = r.out.ctr->ctr1->array[0].result_name; nt4_domain 369 source4/torture/rpc/drsuapi_cracknames.c names[0].str = nt4_domain; nt4_domain 398 source4/torture/rpc/drsuapi_cracknames.c names[0].str = talloc_asprintf(mem_ctx, "%s%s$", nt4_domain, test_dc); nt4_domain 465 source4/torture/rpc/drsuapi_cracknames.c user_principal_name_short = talloc_asprintf(mem_ctx, "%s$@%s", test_dc, nt4_domain); nt4_domain 582 source4/torture/rpc/drsuapi_cracknames.c .expected_str = nt4_domain, nt4_domain 623 source4/torture/rpc/drsuapi_cracknames.c .expected_str = talloc_asprintf(mem_ctx, "%s%s$", nt4_domain, test_dc), nt4_domain 914 source4/torture/rpc/drsuapi_cracknames.c .expected_str = nt4_domain,