cname             247 libcli/nbt/nbtname.c 	uint8_t *cname;
cname             255 libcli/nbt/nbtname.c 	cname = talloc_array(mem_ctx, uint8_t, 33);
cname             256 libcli/nbt/nbtname.c 	if (cname == NULL) return NULL;
cname             259 libcli/nbt/nbtname.c 		cname[2*i]   = 'A' + (name[i]>>4);
cname             260 libcli/nbt/nbtname.c 		cname[1+2*i] = 'A' + (name[i]&0xF);
cname             268 libcli/nbt/nbtname.c 		cname[2*i]   = 'A' + (pad_char>>4);
cname             269 libcli/nbt/nbtname.c 		cname[1+2*i] = 'A' + (pad_char&0xF);
cname             273 libcli/nbt/nbtname.c 	cname[2*i]   = 'A' + (pad_char>>4);
cname             274 libcli/nbt/nbtname.c 	cname[1+2*i] = 'A' + (pad_char&0xF);
cname             276 libcli/nbt/nbtname.c 	cname[32] = 0;
cname             277 libcli/nbt/nbtname.c 	return cname;
cname             287 libcli/nbt/nbtname.c 	char *cname;
cname             306 libcli/nbt/nbtname.c 	cname = discard_const_p(char, s);
cname             310 libcli/nbt/nbtname.c 	if (strlen(cname) > 32) {
cname             316 libcli/nbt/nbtname.c 	ok = decompress_name(cname, &r->type);
cname             322 libcli/nbt/nbtname.c 	r->name = talloc_strdup(ndr->current_mem_ctx, cname);
cname             325 libcli/nbt/nbtname.c 	talloc_free(cname);
cname             335 libcli/nbt/nbtname.c 	uint8_t *cname, *fullname;
cname             348 libcli/nbt/nbtname.c 	cname = compress_name(ndr, (const uint8_t *)r->name, r->type);
cname             349 libcli/nbt/nbtname.c 	NDR_ERR_HAVE_NO_MEMORY(cname);
cname             352 libcli/nbt/nbtname.c 		fullname = (uint8_t *)talloc_asprintf(ndr, "%s.%s", cname, r->scope);
cname             354 libcli/nbt/nbtname.c 		talloc_free(cname);
cname             356 libcli/nbt/nbtname.c 		fullname = cname;
cname             283 source3/include/proto.h 		const char *cname,
cname             261 source3/lib/access.c 				const char *cname,
cname             266 source3/lib/access.c 	client[NAME_INDEX] = cname;
cname             320 source3/lib/access.c 		const char *cname,
cname             324 source3/lib/access.c 	char *nc_cname = smb_xstrdup(cname);
cname             867 source3/torture/torture.c 	char cname[20];
cname             880 source3/torture/torture.c 	slprintf(cname,sizeof(cname)-1, "client%d", client);
cname             897 source3/torture/torture.c 		all_string_sub(line,"client1", cname, sizeof(line));
cname             303 source3/utils/testparm.c 	const char *cname;
cname             349 source3/utils/testparm.c 	cname = poptGetArg(pc);
cname             354 source3/utils/testparm.c 	if ( cname && ! caddr ) {
cname             403 source3/utils/testparm.c 	if (!cname) {
cname             442 source3/utils/testparm.c 	if(cname && caddr){
cname             446 source3/utils/testparm.c 				if (allow_access(lp_hostsdeny(-1), lp_hostsallow(-1), cname, caddr)
cname             447 source3/utils/testparm.c 				    && allow_access(lp_hostsdeny(s), lp_hostsallow(s), cname, caddr)) {
cname             449 source3/utils/testparm.c 						   cname,caddr,lp_servicename(s));
cname             452 source3/utils/testparm.c 						   cname,caddr,lp_servicename(s));
cname              96 source4/heimdal/kdc/524.c 					     et->cname, et->crealm);
cname             670 source4/heimdal/kdc/kerberos4.c 					   et->cname,
cname            1016 source4/heimdal/kdc/kerberos5.c     if(b->cname == NULL){
cname            1021 source4/heimdal/kdc/kerberos5.c 	if (b->cname->name_type == KRB5_NT_ENTERPRISE_PRINCIPAL) {
cname            1022 source4/heimdal/kdc/kerberos5.c 	    if (b->cname->name_string.len != 1) {
cname            1026 source4/heimdal/kdc/kerberos5.c 			from, b->cname->name_string.len);
cname            1030 source4/heimdal/kdc/kerberos5.c 	    ret = krb5_parse_name(context, b->cname->name_string.val[0],
cname            1037 source4/heimdal/kdc/kerberos5.c 						      *(b->cname),
cname            1454 source4/heimdal/kdc/kerberos5.c 	_kdc_make_anonymous_principalname (&rep.cname);
cname            1456 source4/heimdal/kdc/kerberos5.c 	_krb5_principal2principalname(&rep.cname,
cname            1506 source4/heimdal/kdc/kerberos5.c     copy_PrincipalName(&rep.cname, &et.cname);
cname            1669 source4/heimdal/kdc/kerberos5.c 	canon.names.requested_name = *b->cname;
cname             743 source4/heimdal/kdc/krb5tgs.c     copy_PrincipalName(&tgt_name->name, &rep.cname);
cname             840 source4/heimdal/kdc/krb5tgs.c     et.cname = tgt_name->name;
cname            1449 source4/heimdal/kdc/krb5tgs.c 	s = &adtkt.cname;
cname            1457 source4/heimdal/kdc/krb5tgs.c     _krb5_principalname2krb5_principal(context, &cp, tgt->cname, tgt->crealm);
cname            1825 source4/heimdal/kdc/krb5tgs.c 						 adtkt.cname,
cname             301 source4/heimdal/kdc/kx509.c     char *cname = NULL;
cname             337 source4/heimdal/kdc/kx509.c     ret = krb5_unparse_name(context, cprincipal, &cname);
cname             361 source4/heimdal/kdc/kx509.c 				   cname);
cname             438 source4/heimdal/kdc/kx509.c     kdc_log(context, config, 0, "Successful Kx509 request for %s", cname);
cname             455 source4/heimdal/kdc/kx509.c     if (cname)
cname             456 source4/heimdal/kdc/kx509.c 	free(cname);
cname             127 source4/heimdal/lib/krb5/build_auth.c     copy_PrincipalName(&cred->client->name, &auth->cname);
cname             399 source4/heimdal/lib/krb5/get_in_tkt.c 					      rep->kdc_rep.cname,
cname             683 source4/heimdal/lib/krb5/get_in_tkt.c     a->req_body.cname = malloc(sizeof(*a->req_body.cname));
cname             684 source4/heimdal/lib/krb5/get_in_tkt.c     if (a->req_body.cname == NULL) {
cname             695 source4/heimdal/lib/krb5/get_in_tkt.c     ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
cname             558 source4/heimdal/lib/krb5/init_creds_pw.c     a->req_body.cname = malloc(sizeof(*a->req_body.cname));
cname             559 source4/heimdal/lib/krb5/init_creds_pw.c     if (a->req_body.cname == NULL) {
cname             571 source4/heimdal/lib/krb5/init_creds_pw.c     ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
cname              83 source4/heimdal/lib/krb5/mk_error.c 	msg.cname = &client->name;
cname             388 source4/heimdal/lib/krb5/rd_req.c 					     t->ticket.cname,
cname             406 source4/heimdal/lib/krb5/rd_req.c 					   ac->authenticator->cname,
cname             410 source4/heimdal/lib/krb5/rd_req.c 					   t->ticket.cname,
cname             188 source4/heimdal/lib/krb5/replay.c     for(i = 0; i < auth->cname.name_string.len; i++)
cname             189 source4/heimdal/lib/krb5/replay.c 	MD5_Update(&md5, auth->cname.name_string.val[i],
cname             190 source4/heimdal/lib/krb5/replay.c 		   strlen(auth->cname.name_string.val[i]));
cname              63 source4/heimdal/lib/roken/resolve.c     DECL(cname),
cname             129 source4/lib/socket/access.c 	const char *cname;
cname             149 source4/lib/socket/access.c 		if (client->cname[0] != 0)
cname             150 source4/lib/socket/access.c 			match = string_match(mem_ctx, tok, client->cname, &invalid_char);
cname             199 source4/lib/socket/access.c 				  const char *cname, const char *caddr)
cname             203 source4/lib/socket/access.c 	client.cname = cname;
cname             253 source4/lib/socket/access.c 		  const char *cname, const char *caddr)
cname             256 source4/lib/socket/access.c 	char *nc_cname = talloc_strdup(mem_ctx, cname);
cname             175 source4/lib/socket/socket.h 		  const char *cname, const char *caddr);
cname              62 source4/torture/nbench/nbench.c 	char *cname;
cname              80 source4/torture/nbench/nbench.c 	asprintf(&cname, "client%d", client+1);
cname             100 source4/torture/nbench/nbench.c 		all_string_sub(line,"client1", cname, sizeof(line));
cname              77 source4/utils/testparm.c static int do_share_checks(struct loadparm_context *lp_ctx, const char *cname, const char *caddr, bool silent_mode,
cname             125 source4/utils/testparm.c 	if (!cname) {
cname             153 source4/utils/testparm.c 	if(cname && caddr){
cname             158 source4/utils/testparm.c 				if (allow_access(NULL, lp_hostsdeny(NULL, lp_default_service(lp_ctx)), lp_hostsallow(NULL, lp_default_service(lp_ctx)), cname, caddr)
cname             159 source4/utils/testparm.c 				    && allow_access(NULL, lp_hostsdeny(service, lp_default_service(lp_ctx)), lp_hostsallow(service, lp_default_service(lp_ctx)), cname, caddr)) {
cname             161 source4/utils/testparm.c 						   cname,caddr,lp_servicename(service));
cname             164 source4/utils/testparm.c 						   cname,caddr,lp_servicename(service));
cname             185 source4/utils/testparm.c 	static const char *cname;
cname             204 source4/utils/testparm.c 		{"client-name", '\0', POPT_ARG_STRING, &cname, 0, "Client DNS name for 'hosts allow' checking (should match reverse lookup)"},
cname             226 source4/utils/testparm.c 	if ( cname && ! caddr ) {
cname             253 source4/utils/testparm.c 	ret |= do_share_checks(lp_ctx, cname, caddr, silent_mode, show_defaults, section_name, parameter_name);