cname 247 libcli/nbt/nbtname.c uint8_t *cname; cname 255 libcli/nbt/nbtname.c cname = talloc_array(mem_ctx, uint8_t, 33); cname 256 libcli/nbt/nbtname.c if (cname == NULL) return NULL; cname 259 libcli/nbt/nbtname.c cname[2*i] = 'A' + (name[i]>>4); cname 260 libcli/nbt/nbtname.c cname[1+2*i] = 'A' + (name[i]&0xF); cname 268 libcli/nbt/nbtname.c cname[2*i] = 'A' + (pad_char>>4); cname 269 libcli/nbt/nbtname.c cname[1+2*i] = 'A' + (pad_char&0xF); cname 273 libcli/nbt/nbtname.c cname[2*i] = 'A' + (pad_char>>4); cname 274 libcli/nbt/nbtname.c cname[1+2*i] = 'A' + (pad_char&0xF); cname 276 libcli/nbt/nbtname.c cname[32] = 0; cname 277 libcli/nbt/nbtname.c return cname; cname 287 libcli/nbt/nbtname.c char *cname; cname 306 libcli/nbt/nbtname.c cname = discard_const_p(char, s); cname 310 libcli/nbt/nbtname.c if (strlen(cname) > 32) { cname 316 libcli/nbt/nbtname.c ok = decompress_name(cname, &r->type); cname 322 libcli/nbt/nbtname.c r->name = talloc_strdup(ndr->current_mem_ctx, cname); cname 325 libcli/nbt/nbtname.c talloc_free(cname); cname 335 libcli/nbt/nbtname.c uint8_t *cname, *fullname; cname 348 libcli/nbt/nbtname.c cname = compress_name(ndr, (const uint8_t *)r->name, r->type); cname 349 libcli/nbt/nbtname.c NDR_ERR_HAVE_NO_MEMORY(cname); cname 352 libcli/nbt/nbtname.c fullname = (uint8_t *)talloc_asprintf(ndr, "%s.%s", cname, r->scope); cname 354 libcli/nbt/nbtname.c talloc_free(cname); cname 356 libcli/nbt/nbtname.c fullname = cname; cname 283 source3/include/proto.h const char *cname, cname 261 source3/lib/access.c const char *cname, cname 266 source3/lib/access.c client[NAME_INDEX] = cname; cname 320 source3/lib/access.c const char *cname, cname 324 source3/lib/access.c char *nc_cname = smb_xstrdup(cname); cname 867 source3/torture/torture.c char cname[20]; cname 880 source3/torture/torture.c slprintf(cname,sizeof(cname)-1, "client%d", client); cname 897 source3/torture/torture.c all_string_sub(line,"client1", cname, sizeof(line)); cname 303 source3/utils/testparm.c const char *cname; cname 349 source3/utils/testparm.c cname = poptGetArg(pc); cname 354 source3/utils/testparm.c if ( cname && ! caddr ) { cname 403 source3/utils/testparm.c if (!cname) { cname 442 source3/utils/testparm.c if(cname && caddr){ cname 446 source3/utils/testparm.c if (allow_access(lp_hostsdeny(-1), lp_hostsallow(-1), cname, caddr) cname 447 source3/utils/testparm.c && allow_access(lp_hostsdeny(s), lp_hostsallow(s), cname, caddr)) { cname 449 source3/utils/testparm.c cname,caddr,lp_servicename(s)); cname 452 source3/utils/testparm.c cname,caddr,lp_servicename(s)); cname 96 source4/heimdal/kdc/524.c et->cname, et->crealm); cname 670 source4/heimdal/kdc/kerberos4.c et->cname, cname 1016 source4/heimdal/kdc/kerberos5.c if(b->cname == NULL){ cname 1021 source4/heimdal/kdc/kerberos5.c if (b->cname->name_type == KRB5_NT_ENTERPRISE_PRINCIPAL) { cname 1022 source4/heimdal/kdc/kerberos5.c if (b->cname->name_string.len != 1) { cname 1026 source4/heimdal/kdc/kerberos5.c from, b->cname->name_string.len); cname 1030 source4/heimdal/kdc/kerberos5.c ret = krb5_parse_name(context, b->cname->name_string.val[0], cname 1037 source4/heimdal/kdc/kerberos5.c *(b->cname), cname 1454 source4/heimdal/kdc/kerberos5.c _kdc_make_anonymous_principalname (&rep.cname); cname 1456 source4/heimdal/kdc/kerberos5.c _krb5_principal2principalname(&rep.cname, cname 1506 source4/heimdal/kdc/kerberos5.c copy_PrincipalName(&rep.cname, &et.cname); cname 1669 source4/heimdal/kdc/kerberos5.c canon.names.requested_name = *b->cname; cname 743 source4/heimdal/kdc/krb5tgs.c copy_PrincipalName(&tgt_name->name, &rep.cname); cname 840 source4/heimdal/kdc/krb5tgs.c et.cname = tgt_name->name; cname 1449 source4/heimdal/kdc/krb5tgs.c s = &adtkt.cname; cname 1457 source4/heimdal/kdc/krb5tgs.c _krb5_principalname2krb5_principal(context, &cp, tgt->cname, tgt->crealm); cname 1825 source4/heimdal/kdc/krb5tgs.c adtkt.cname, cname 301 source4/heimdal/kdc/kx509.c char *cname = NULL; cname 337 source4/heimdal/kdc/kx509.c ret = krb5_unparse_name(context, cprincipal, &cname); cname 361 source4/heimdal/kdc/kx509.c cname); cname 438 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0, "Successful Kx509 request for %s", cname); cname 455 source4/heimdal/kdc/kx509.c if (cname) cname 456 source4/heimdal/kdc/kx509.c free(cname); cname 127 source4/heimdal/lib/krb5/build_auth.c copy_PrincipalName(&cred->client->name, &auth->cname); cname 399 source4/heimdal/lib/krb5/get_in_tkt.c rep->kdc_rep.cname, cname 683 source4/heimdal/lib/krb5/get_in_tkt.c a->req_body.cname = malloc(sizeof(*a->req_body.cname)); cname 684 source4/heimdal/lib/krb5/get_in_tkt.c if (a->req_body.cname == NULL) { cname 695 source4/heimdal/lib/krb5/get_in_tkt.c ret = _krb5_principal2principalname (a->req_body.cname, creds->client); cname 558 source4/heimdal/lib/krb5/init_creds_pw.c a->req_body.cname = malloc(sizeof(*a->req_body.cname)); cname 559 source4/heimdal/lib/krb5/init_creds_pw.c if (a->req_body.cname == NULL) { cname 571 source4/heimdal/lib/krb5/init_creds_pw.c ret = _krb5_principal2principalname (a->req_body.cname, creds->client); cname 83 source4/heimdal/lib/krb5/mk_error.c msg.cname = &client->name; cname 388 source4/heimdal/lib/krb5/rd_req.c t->ticket.cname, cname 406 source4/heimdal/lib/krb5/rd_req.c ac->authenticator->cname, cname 410 source4/heimdal/lib/krb5/rd_req.c t->ticket.cname, cname 188 source4/heimdal/lib/krb5/replay.c for(i = 0; i < auth->cname.name_string.len; i++) cname 189 source4/heimdal/lib/krb5/replay.c MD5_Update(&md5, auth->cname.name_string.val[i], cname 190 source4/heimdal/lib/krb5/replay.c strlen(auth->cname.name_string.val[i])); cname 63 source4/heimdal/lib/roken/resolve.c DECL(cname), cname 129 source4/lib/socket/access.c const char *cname; cname 149 source4/lib/socket/access.c if (client->cname[0] != 0) cname 150 source4/lib/socket/access.c match = string_match(mem_ctx, tok, client->cname, &invalid_char); cname 199 source4/lib/socket/access.c const char *cname, const char *caddr) cname 203 source4/lib/socket/access.c client.cname = cname; cname 253 source4/lib/socket/access.c const char *cname, const char *caddr) cname 256 source4/lib/socket/access.c char *nc_cname = talloc_strdup(mem_ctx, cname); cname 175 source4/lib/socket/socket.h const char *cname, const char *caddr); cname 62 source4/torture/nbench/nbench.c char *cname; cname 80 source4/torture/nbench/nbench.c asprintf(&cname, "client%d", client+1); cname 100 source4/torture/nbench/nbench.c all_string_sub(line,"client1", cname, sizeof(line)); cname 77 source4/utils/testparm.c static int do_share_checks(struct loadparm_context *lp_ctx, const char *cname, const char *caddr, bool silent_mode, cname 125 source4/utils/testparm.c if (!cname) { cname 153 source4/utils/testparm.c if(cname && caddr){ cname 158 source4/utils/testparm.c if (allow_access(NULL, lp_hostsdeny(NULL, lp_default_service(lp_ctx)), lp_hostsallow(NULL, lp_default_service(lp_ctx)), cname, caddr) cname 159 source4/utils/testparm.c && allow_access(NULL, lp_hostsdeny(service, lp_default_service(lp_ctx)), lp_hostsallow(service, lp_default_service(lp_ctx)), cname, caddr)) { cname 161 source4/utils/testparm.c cname,caddr,lp_servicename(service)); cname 164 source4/utils/testparm.c cname,caddr,lp_servicename(service)); cname 185 source4/utils/testparm.c static const char *cname; cname 204 source4/utils/testparm.c {"client-name", '\0', POPT_ARG_STRING, &cname, 0, "Client DNS name for 'hosts allow' checking (should match reverse lookup)"}, cname 226 source4/utils/testparm.c if ( cname && ! caddr ) { cname 253 source4/utils/testparm.c ret |= do_share_checks(lp_ctx, cname, caddr, silent_mode, show_defaults, section_name, parameter_name);