cname 247 libcli/nbt/nbtname.c uint8_t *cname;
cname 255 libcli/nbt/nbtname.c cname = talloc_array(mem_ctx, uint8_t, 33);
cname 256 libcli/nbt/nbtname.c if (cname == NULL) return NULL;
cname 259 libcli/nbt/nbtname.c cname[2*i] = 'A' + (name[i]>>4);
cname 260 libcli/nbt/nbtname.c cname[1+2*i] = 'A' + (name[i]&0xF);
cname 268 libcli/nbt/nbtname.c cname[2*i] = 'A' + (pad_char>>4);
cname 269 libcli/nbt/nbtname.c cname[1+2*i] = 'A' + (pad_char&0xF);
cname 273 libcli/nbt/nbtname.c cname[2*i] = 'A' + (pad_char>>4);
cname 274 libcli/nbt/nbtname.c cname[1+2*i] = 'A' + (pad_char&0xF);
cname 276 libcli/nbt/nbtname.c cname[32] = 0;
cname 277 libcli/nbt/nbtname.c return cname;
cname 287 libcli/nbt/nbtname.c char *cname;
cname 306 libcli/nbt/nbtname.c cname = discard_const_p(char, s);
cname 310 libcli/nbt/nbtname.c if (strlen(cname) > 32) {
cname 316 libcli/nbt/nbtname.c ok = decompress_name(cname, &r->type);
cname 322 libcli/nbt/nbtname.c r->name = talloc_strdup(ndr->current_mem_ctx, cname);
cname 325 libcli/nbt/nbtname.c talloc_free(cname);
cname 335 libcli/nbt/nbtname.c uint8_t *cname, *fullname;
cname 348 libcli/nbt/nbtname.c cname = compress_name(ndr, (const uint8_t *)r->name, r->type);
cname 349 libcli/nbt/nbtname.c NDR_ERR_HAVE_NO_MEMORY(cname);
cname 352 libcli/nbt/nbtname.c fullname = (uint8_t *)talloc_asprintf(ndr, "%s.%s", cname, r->scope);
cname 354 libcli/nbt/nbtname.c talloc_free(cname);
cname 356 libcli/nbt/nbtname.c fullname = cname;
cname 283 source3/include/proto.h const char *cname,
cname 261 source3/lib/access.c const char *cname,
cname 266 source3/lib/access.c client[NAME_INDEX] = cname;
cname 320 source3/lib/access.c const char *cname,
cname 324 source3/lib/access.c char *nc_cname = smb_xstrdup(cname);
cname 867 source3/torture/torture.c char cname[20];
cname 880 source3/torture/torture.c slprintf(cname,sizeof(cname)-1, "client%d", client);
cname 897 source3/torture/torture.c all_string_sub(line,"client1", cname, sizeof(line));
cname 303 source3/utils/testparm.c const char *cname;
cname 349 source3/utils/testparm.c cname = poptGetArg(pc);
cname 354 source3/utils/testparm.c if ( cname && ! caddr ) {
cname 403 source3/utils/testparm.c if (!cname) {
cname 442 source3/utils/testparm.c if(cname && caddr){
cname 446 source3/utils/testparm.c if (allow_access(lp_hostsdeny(-1), lp_hostsallow(-1), cname, caddr)
cname 447 source3/utils/testparm.c && allow_access(lp_hostsdeny(s), lp_hostsallow(s), cname, caddr)) {
cname 449 source3/utils/testparm.c cname,caddr,lp_servicename(s));
cname 452 source3/utils/testparm.c cname,caddr,lp_servicename(s));
cname 96 source4/heimdal/kdc/524.c et->cname, et->crealm);
cname 670 source4/heimdal/kdc/kerberos4.c et->cname,
cname 1016 source4/heimdal/kdc/kerberos5.c if(b->cname == NULL){
cname 1021 source4/heimdal/kdc/kerberos5.c if (b->cname->name_type == KRB5_NT_ENTERPRISE_PRINCIPAL) {
cname 1022 source4/heimdal/kdc/kerberos5.c if (b->cname->name_string.len != 1) {
cname 1026 source4/heimdal/kdc/kerberos5.c from, b->cname->name_string.len);
cname 1030 source4/heimdal/kdc/kerberos5.c ret = krb5_parse_name(context, b->cname->name_string.val[0],
cname 1037 source4/heimdal/kdc/kerberos5.c *(b->cname),
cname 1454 source4/heimdal/kdc/kerberos5.c _kdc_make_anonymous_principalname (&rep.cname);
cname 1456 source4/heimdal/kdc/kerberos5.c _krb5_principal2principalname(&rep.cname,
cname 1506 source4/heimdal/kdc/kerberos5.c copy_PrincipalName(&rep.cname, &et.cname);
cname 1669 source4/heimdal/kdc/kerberos5.c canon.names.requested_name = *b->cname;
cname 743 source4/heimdal/kdc/krb5tgs.c copy_PrincipalName(&tgt_name->name, &rep.cname);
cname 840 source4/heimdal/kdc/krb5tgs.c et.cname = tgt_name->name;
cname 1449 source4/heimdal/kdc/krb5tgs.c s = &adtkt.cname;
cname 1457 source4/heimdal/kdc/krb5tgs.c _krb5_principalname2krb5_principal(context, &cp, tgt->cname, tgt->crealm);
cname 1825 source4/heimdal/kdc/krb5tgs.c adtkt.cname,
cname 301 source4/heimdal/kdc/kx509.c char *cname = NULL;
cname 337 source4/heimdal/kdc/kx509.c ret = krb5_unparse_name(context, cprincipal, &cname);
cname 361 source4/heimdal/kdc/kx509.c cname);
cname 438 source4/heimdal/kdc/kx509.c kdc_log(context, config, 0, "Successful Kx509 request for %s", cname);
cname 455 source4/heimdal/kdc/kx509.c if (cname)
cname 456 source4/heimdal/kdc/kx509.c free(cname);
cname 127 source4/heimdal/lib/krb5/build_auth.c copy_PrincipalName(&cred->client->name, &auth->cname);
cname 399 source4/heimdal/lib/krb5/get_in_tkt.c rep->kdc_rep.cname,
cname 683 source4/heimdal/lib/krb5/get_in_tkt.c a->req_body.cname = malloc(sizeof(*a->req_body.cname));
cname 684 source4/heimdal/lib/krb5/get_in_tkt.c if (a->req_body.cname == NULL) {
cname 695 source4/heimdal/lib/krb5/get_in_tkt.c ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
cname 558 source4/heimdal/lib/krb5/init_creds_pw.c a->req_body.cname = malloc(sizeof(*a->req_body.cname));
cname 559 source4/heimdal/lib/krb5/init_creds_pw.c if (a->req_body.cname == NULL) {
cname 571 source4/heimdal/lib/krb5/init_creds_pw.c ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
cname 83 source4/heimdal/lib/krb5/mk_error.c msg.cname = &client->name;
cname 388 source4/heimdal/lib/krb5/rd_req.c t->ticket.cname,
cname 406 source4/heimdal/lib/krb5/rd_req.c ac->authenticator->cname,
cname 410 source4/heimdal/lib/krb5/rd_req.c t->ticket.cname,
cname 188 source4/heimdal/lib/krb5/replay.c for(i = 0; i < auth->cname.name_string.len; i++)
cname 189 source4/heimdal/lib/krb5/replay.c MD5_Update(&md5, auth->cname.name_string.val[i],
cname 190 source4/heimdal/lib/krb5/replay.c strlen(auth->cname.name_string.val[i]));
cname 63 source4/heimdal/lib/roken/resolve.c DECL(cname),
cname 129 source4/lib/socket/access.c const char *cname;
cname 149 source4/lib/socket/access.c if (client->cname[0] != 0)
cname 150 source4/lib/socket/access.c match = string_match(mem_ctx, tok, client->cname, &invalid_char);
cname 199 source4/lib/socket/access.c const char *cname, const char *caddr)
cname 203 source4/lib/socket/access.c client.cname = cname;
cname 253 source4/lib/socket/access.c const char *cname, const char *caddr)
cname 256 source4/lib/socket/access.c char *nc_cname = talloc_strdup(mem_ctx, cname);
cname 175 source4/lib/socket/socket.h const char *cname, const char *caddr);
cname 62 source4/torture/nbench/nbench.c char *cname;
cname 80 source4/torture/nbench/nbench.c asprintf(&cname, "client%d", client+1);
cname 100 source4/torture/nbench/nbench.c all_string_sub(line,"client1", cname, sizeof(line));
cname 77 source4/utils/testparm.c static int do_share_checks(struct loadparm_context *lp_ctx, const char *cname, const char *caddr, bool silent_mode,
cname 125 source4/utils/testparm.c if (!cname) {
cname 153 source4/utils/testparm.c if(cname && caddr){
cname 158 source4/utils/testparm.c if (allow_access(NULL, lp_hostsdeny(NULL, lp_default_service(lp_ctx)), lp_hostsallow(NULL, lp_default_service(lp_ctx)), cname, caddr)
cname 159 source4/utils/testparm.c && allow_access(NULL, lp_hostsdeny(service, lp_default_service(lp_ctx)), lp_hostsallow(service, lp_default_service(lp_ctx)), cname, caddr)) {
cname 161 source4/utils/testparm.c cname,caddr,lp_servicename(service));
cname 164 source4/utils/testparm.c cname,caddr,lp_servicename(service));
cname 185 source4/utils/testparm.c static const char *cname;
cname 204 source4/utils/testparm.c {"client-name", '\0', POPT_ARG_STRING, &cname, 0, "Client DNS name for 'hosts allow' checking (should match reverse lookup)"},
cname 226 source4/utils/testparm.c if ( cname && ! caddr ) {
cname 253 source4/utils/testparm.c ret |= do_share_checks(lp_ctx, cname, caddr, silent_mode, show_defaults, section_name, parameter_name);