username 17 examples/libsmbclient/get_auth_data_fn.h char username[256] = { '\0' };
username 25 examples/libsmbclient/get_auth_data_fn.h *username != '\0')
username 28 examples/libsmbclient/get_auth_data_fn.h strncpy(pUsername, username, maxLenUsername - 1);
username 78 examples/libsmbclient/get_auth_data_fn.h strncpy(username, pUsername, sizeof(username) - 1);
username 14 examples/libsmbclient/testbrowse2.c char *username = "guest";
username 87 examples/libsmbclient/testbrowse2.c strncpy(user, username, userlen - 1); user[userlen - 1] = 0;
username 599 examples/libsmbclient/tree.c char *workgroup, int wgmaxlen, char *username, int unmaxlen,
username 603 examples/libsmbclient/tree.c strncpy(username, "test", unmaxlen);
username 28 nsswitch/libwbclient/wbc_pam.c wbcErr wbcAuthenticateUser(const char *username,
username 36 nsswitch/libwbclient/wbc_pam.c params.account_name = username;
username 547 nsswitch/libwbclient/wbc_pam.c if (!params || !params->username) {
username 564 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.logoff.user, params->username,
username 624 nsswitch/libwbclient/wbc_pam.c wbcErr wbcLogoffUser(const char *username,
username 634 nsswitch/libwbclient/wbc_pam.c if (!username) {
username 642 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.logoff.user, username,
username 864 nsswitch/libwbclient/wbc_pam.c wbcErr wbcChangeUserPassword(const char *username,
username 873 nsswitch/libwbclient/wbc_pam.c params.account_name = username;
username 918 nsswitch/libwbclient/wbc_pam.c if (!params->username) {
username 945 nsswitch/libwbclient/wbc_pam.c params->username,
username 148 nsswitch/libwbclient/wbc_pwd.c strncpy(request.data.username, name, sizeof(request.data.username)-1);
username 581 nsswitch/libwbclient/wbc_pwd.c strncpy(request.data.username, account, sizeof(request.data.username)-1);
username 250 nsswitch/libwbclient/wbclient.h const char *username;
username 440 nsswitch/libwbclient/wbclient.h const char *username;
username 1044 nsswitch/libwbclient/wbclient.h wbcErr wbcAuthenticateUser(const char *username,
username 1087 nsswitch/libwbclient/wbclient.h wbcErr wbcLogoffUser(const char *username,
username 1111 nsswitch/libwbclient/wbclient.h wbcErr wbcChangeUserPassword(const char *username,
username 768 nsswitch/pam_winbind.c const char *username,
username 777 nsswitch/pam_winbind.c return pam_winbind_request_log(ctx, ret, username, fn);
username 793 nsswitch/pam_winbind.c return pam_winbind_request_log(ctx, ret, username, fn);
username 799 nsswitch/pam_winbind.c return pam_winbind_request_log(ctx, ret, username, fn);
username 803 nsswitch/pam_winbind.c return pam_winbind_request_log(ctx, ret, username, fn);
username 1378 nsswitch/pam_winbind.c const char *username,
username 1390 nsswitch/pam_winbind.c username);
username 1400 nsswitch/pam_winbind.c username);
username 1415 nsswitch/pam_winbind.c const char *username,
username 1426 nsswitch/pam_winbind.c username);
username 1582 nsswitch/pam_winbind.c const char *username;
username 1588 nsswitch/pam_winbind.c ret = pam_get_user(ctx->pamh, &username, NULL);
username 1589 nsswitch/pam_winbind.c if ((ret != PAM_SUCCESS) || (!username)) {
username 1594 nsswitch/pam_winbind.c pwd = getpwnam(username);
username 1766 nsswitch/pam_winbind.c logon.username = user;
username 2520 nsswitch/pam_winbind.c logoff.username = user;
username 2597 nsswitch/pam_winbind.c const char *username;
username 2616 nsswitch/pam_winbind.c retval = pam_get_user(pamh, &username, NULL);
username 2617 nsswitch/pam_winbind.c if ((retval != PAM_SUCCESS) || (!username)) {
username 2629 nsswitch/pam_winbind.c if (username[0] == '_') {
username 2630 nsswitch/pam_winbind.c uid_t id = atoi(&username[1]);
username 2641 nsswitch/pam_winbind.c if ((real_username = strdup(username)) == NULL) {
username 2808 nsswitch/pam_winbind.c const char *username;
username 2822 nsswitch/pam_winbind.c ret = pam_get_user(pamh, &username, NULL);
username 2823 nsswitch/pam_winbind.c if ((ret != PAM_SUCCESS) || (!username)) {
username 2831 nsswitch/pam_winbind.c ret = valid_user(ctx, username);
username 2840 nsswitch/pam_winbind.c username);
username 2861 nsswitch/pam_winbind.c username);
username 2869 nsswitch/pam_winbind.c "user '%s' granted access", username);
username 2877 nsswitch/pam_winbind.c "user '%s' granted access", username);
username 2884 nsswitch/pam_winbind.c ret, username);
username 1150 nsswitch/wbinfo.c const char *username)
username 1155 nsswitch/wbinfo.c prompt = talloc_asprintf(talloc_tos(), "Enter %s's ", username);
username 1178 nsswitch/wbinfo.c static bool wbinfo_auth_krb5(char *username, const char *cctype, uint32 flags)
username 1191 nsswitch/wbinfo.c p = strchr(username, '%');
username 1195 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
username 1199 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
username 1200 nsswitch/wbinfo.c password = wbinfo_prompt_pass(NULL, username);
username 1216 nsswitch/wbinfo.c username, (result == NSS_STATUS_SUCCESS) ? "succeeded" : "failed", cctype);
username 1244 nsswitch/wbinfo.c static bool wbinfo_auth(char *username)
username 1252 nsswitch/wbinfo.c if ((s = SMB_STRDUP(username)) == NULL) {
username 1261 nsswitch/wbinfo.c password = wbinfo_prompt_pass(NULL, username);
username 1287 nsswitch/wbinfo.c static bool wbinfo_auth_crap(char *username)
username 1300 nsswitch/wbinfo.c p = strchr(username, '%');
username 1306 nsswitch/wbinfo.c pass = wbinfo_prompt_pass(NULL, username);
username 1309 nsswitch/wbinfo.c parse_wbinfo_domain_user(username, name_domain, name_user);
username 1389 nsswitch/wbinfo.c static bool wbinfo_klog(char *username)
username 1401 nsswitch/wbinfo.c p = strchr(username, '%');
username 1405 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
username 1409 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
username 1507 nsswitch/wbinfo.c static bool wbinfo_set_auth_user(char *username)
username 1515 nsswitch/wbinfo.c parse_wbinfo_domain_user(username, domain, user);
username 1611 nsswitch/wbinfo.c static bool wbinfo_change_user_password(const char *username)
username 1617 nsswitch/wbinfo.c old_password = wbinfo_prompt_pass("old", username);
username 1618 nsswitch/wbinfo.c new_password = wbinfo_prompt_pass("new", username);
username 1620 nsswitch/wbinfo.c wbc_status = wbcChangeUserPassword(username, old_password, new_password);
username 1624 nsswitch/wbinfo.c d_printf("Password change for user %s %s\n", username,
username 140 nsswitch/wbinfo4.c fstrcpy(request.data.username, user);
username 258 nsswitch/wbinfo4.c fstrcpy(request.data.username, user);
username 720 nsswitch/wbinfo4.c static bool wbinfo_auth_krb5(char *username, const char *cctype, uint32_t flags)
username 732 nsswitch/wbinfo4.c p = strchr(username, '%');
username 736 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
username 740 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
username 753 nsswitch/wbinfo4.c username, (result == NSS_STATUS_SUCCESS) ? "succeeded" : "failed", cctype);
username 781 nsswitch/wbinfo4.c static bool wbinfo_auth(char *username)
username 793 nsswitch/wbinfo4.c p = strchr(username, '%');
username 797 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
username 801 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
username 821 nsswitch/wbinfo4.c static bool wbinfo_auth_crap(struct loadparm_context *lp_ctx, char *username)
username 836 nsswitch/wbinfo4.c p = strchr(username, '%');
username 843 nsswitch/wbinfo4.c parse_wbinfo_domain_user(username, name_domain, name_user);
username 367 nsswitch/winbind_nss_aix.c STRCPY_RETNULL(request.data.username, r_user);
username 443 nsswitch/winbind_nss_aix.c STRCPY_RETNULL(request.data.username, name);
username 515 nsswitch/winbind_nss_irix.c strncpy(request->data.username, key,
username 516 nsswitch/winbind_nss_irix.c sizeof(request->data.username) - 1);
username 517 nsswitch/winbind_nss_irix.c request->data.username[sizeof(request->data.username) - 1] = '\0';
username 618 nsswitch/winbind_nss_linux.c strncpy(request.data.username, name,
username 619 nsswitch/winbind_nss_linux.c sizeof(request.data.username) - 1);
username 620 nsswitch/winbind_nss_linux.c request.data.username
username 621 nsswitch/winbind_nss_linux.c [sizeof(request.data.username) - 1] = '\0';
username 1044 nsswitch/winbind_nss_linux.c strncpy(request.data.username, user,
username 1045 nsswitch/winbind_nss_linux.c sizeof(request.data.username) - 1);
username 230 nsswitch/winbind_nss_netbsd.c strncpy(request.data.username, uname,
username 231 nsswitch/winbind_nss_netbsd.c sizeof(request.data.username) - 1);
username 62 nsswitch/winbind_nss_solaris.c const char *username;
username 289 nsswitch/winbind_nss_solaris.c _nss_winbind_initgroups_dyn(gmem->username,
username 241 nsswitch/winbind_struct_protocol.h fstring username; /* getpwnam */
username 296 nsswitch/winbind_struct_protocol.h fstring username;
username 42 source3/auth/auth_sam.c const char *username = pdb_get_username(sampass);
username 47 source3/auth/auth_sam.c DEBUG(3,("Account for user '%s' has no password and null passwords are allowed.\n", username));
username 50 source3/auth/auth_sam.c DEBUG(3,("Account for user '%s' has no password and null passwords are NOT allowed.\n", username));
username 61 source3/auth/auth_sam.c username,
username 526 source3/auth/auth_util.c static char *sanitize_username(TALLOC_CTX *mem_ctx, const char *username)
username 530 source3/auth/auth_util.c alpha_strcpy(tmp, username, ". _-$", sizeof(tmp));
username 539 source3/auth/auth_util.c static bool is_our_machine_account(const char *username)
username 543 source3/auth/auth_util.c size_t ulen = strlen(username);
username 545 source3/auth/auth_util.c if (ulen == 0 || username[ulen-1] != '$') {
username 548 source3/auth/auth_util.c truncname = SMB_STRDUP(username);
username 568 source3/auth/auth_util.c const char *username = pdb_get_username(sampass);
username 575 source3/auth/auth_util.c if ( !(pwd = getpwnam_alloc(result, username)) ) {
username 598 source3/auth/auth_util.c if (IS_DC && is_our_machine_account(username)) {
username 624 source3/auth/auth_util.c username));
username 820 source3/auth/auth_util.c NTSTATUS create_token_from_username(TALLOC_CTX *mem_ctx, const char *username,
username 843 source3/auth/auth_util.c if (!lookup_name_smbconf(tmp_ctx, username, LOOKUP_NAME_ALL,
username 845 source3/auth/auth_util.c DEBUG(1, ("lookup_name_smbconf for %s failed\n", username));
username 850 source3/auth/auth_util.c DEBUG(1, ("%s is a %s, not a user\n", username,
username 873 source3/auth/auth_util.c sid_string_dbg(&user_sid), username));
username 874 source3/auth/auth_util.c DEBUGADD(1, ("Fall back to unix user %s\n", username));
username 883 source3/auth/auth_util.c username));
username 884 source3/auth/auth_util.c DEBUGADD(1, ("Fall back to unix user %s\n", username));
username 941 source3/auth/auth_util.c username, sid_string_dbg(&user_sid)));
username 951 source3/auth/auth_util.c (unsigned int)*uid, username));
username 955 source3/auth/auth_util.c if (!getgroups_unix_user(tmp_ctx, username, pass->pw_gid,
username 958 source3/auth/auth_util.c username));
username 998 source3/auth/auth_util.c username, sid_string_dbg(&user_sid)));
username 1024 source3/auth/auth_util.c *found_username = talloc_strdup(mem_ctx, username);
username 1077 source3/auth/auth_util.c bool user_in_group_sid(const char *username, const DOM_SID *group_sid)
username 1094 source3/auth/auth_util.c status = create_token_from_username(mem_ctx, username, False,
username 1099 source3/auth/auth_util.c DEBUG(10, ("could not create token for %s\n", username));
username 1110 source3/auth/auth_util.c bool user_in_group(const char *username, const char *groupname)
username 1131 source3/auth/auth_util.c return user_in_group_sid(username, &group_sid);
username 1317 source3/auth/auth_util.c const char *username,
username 1325 source3/auth/auth_util.c pwd = getpwnam_alloc(talloc_tos(), username);
username 1482 source3/auth/auth_util.c const char *username,
username 1493 source3/auth/auth_util.c fstrcpy( lower_username, username );
username 1537 source3/auth/auth_util.c fstring username;
username 1547 source3/auth/auth_util.c fstrcpy( username, domuser );
username 1549 source3/auth/auth_util.c p = strchr_m( username, *lp_winbind_separator() );
username 1566 source3/auth/auth_util.c domain = username;
username 1582 source3/auth/auth_util.c fstrcpy( username, strip_username );
username 1587 source3/auth/auth_util.c pw = Get_Pwnam_alloc(mem_ctx, username);
username 1596 source3/auth/auth_util.c if (username[strlen(username)-1] == '$')
username 1599 source3/auth/auth_util.c _smb_create_user(NULL, username, NULL);
username 1600 source3/auth/auth_util.c pw = Get_Pwnam_alloc(mem_ctx, username);
username 191 source3/auth/pampass.c static void pwd_sub(char *buf, const char *username, const char *oldpass, const char *newpass)
username 193 source3/auth/pampass.c fstring_sub(buf, "%u", username);
username 244 source3/client/client.c static void send_message(const char *username)
username 249 source3/client/client.c if (!cli_message_start(cli, desthost, username, &grp_id)) {
username 186 source3/client/mount.cifs.c char *username = NULL;
username 190 source3/client/mount.cifs.c username = password->pw_name;
username 192 source3/client/mount.cifs.c return username;
username 85 source3/client/smbspool.c char *username, /* Username */
username 192 source3/client/smbspool.c username = uri_unescape_alloc(tmp);
username 194 source3/client/smbspool.c if ((username = getenv("AUTH_USERNAME")) == NULL) {
username 195 source3/client/smbspool.c username = null_str;
username 262 source3/client/smbspool.c username, password, argv[2], &need_auth);
username 391 source3/client/smbspool.c const char *username,
username 419 source3/client/smbspool.c nt_status = cli_session_setup(cli, username,
username 453 source3/client/smbspool.c username,
username 476 source3/client/smbspool.c const char *username, /* I - Username */
username 498 source3/client/smbspool.c if (username && *username && !getenv("KRB5CCNAME")) {
username 499 source3/client/smbspool.c cli = smb_complete_connection(myname, server, port, username,
username 595 source3/client/tree.c char *workgroup, int wgmaxlen, char *username, int unmaxlen,
username 599 source3/client/tree.c strncpy(username, "test", unmaxlen);
username 256 source3/include/libsmb_internal.h const char * username);
username 410 source3/include/libsmbclient.h const char * workgroup, const char * username);
username 430 source3/include/libsmbclient.h const char * username);
username 122 source3/include/passdb.h const char *username; /* UNIX username string */
username 223 source3/include/passdb.h NTSTATUS (*getsampwnam)(struct pdb_methods *, struct samu *sam_acct, const char *username);
username 238 source3/include/passdb.h NTSTATUS (*delete_sam_account)(struct pdb_methods *, struct samu *username);
username 49 source3/include/popt_common.h char *username;
username 111 source3/include/proto.h NTSTATUS create_token_from_username(TALLOC_CTX *mem_ctx, const char *username,
username 116 source3/include/proto.h bool user_in_group_sid(const char *username, const DOM_SID *group_sid);
username 117 source3/include/proto.h bool user_in_group(const char *username, const char *groupname);
username 122 source3/include/proto.h const char *username,
username 307 source3/include/proto.h char *afs_createtoken_str(const char *username, const char *cell);
username 310 source3/include/proto.h char *afs_createtoken_str(const char *username, const char *cell);
username 791 source3/include/proto.h const char *username,
username 1085 source3/include/proto.h const char *username);
username 2357 source3/include/proto.h const char *username,
username 2424 source3/include/proto.h NTSTATUS cli_set_username(struct cli_state *cli, const char *username);
username 2426 source3/include/proto.h NTSTATUS cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password);
username 2589 source3/include/proto.h const char *username,
username 2615 source3/include/proto.h int cli_message_start_build(struct cli_state *cli, const char *host, const char *username);
username 2616 source3/include/proto.h bool cli_message_start(struct cli_state *cli, const char *host, const char *username,
username 2747 source3/include/proto.h uint32_t contime, const char *username,
username 3095 source3/include/proto.h const char *username,
username 3161 source3/include/proto.h bool netsamlogon_cache_store(const char *username, struct netr_SamInfo3 *info3);
username 4511 source3/include/proto.h bool pdb_set_username(struct samu *sampass, const char *username, enum pdb_value_state flag);
username 4545 source3/include/proto.h bool pdb_getsampwnam(struct samu *sam_acct, const char *username) ;
username 4707 source3/include/proto.h void secrets_fetch_ipc_userpass(char **username, char **domain, char **password);
username 5221 source3/include/proto.h const char *username,
username 5229 source3/include/proto.h const char *username,
username 5240 source3/include/proto.h const char *username,
username 5283 source3/include/proto.h const char *username,
username 5293 source3/include/proto.h const char *username,
username 5318 source3/include/proto.h const char *username,
username 5326 source3/include/proto.h const char *username,
username 5345 source3/include/proto.h const char *username,
username 5358 source3/include/proto.h const char *username,
username 5438 source3/include/proto.h const char *username,
username 5443 source3/include/proto.h const char *username,
username 5450 source3/include/proto.h const char *username,
username 6988 source3/include/proto.h int add_home_service(const char *service, const char *username, const char *homedir);
username 7011 source3/include/proto.h bool token_contains_name_in_list(const char *username,
username 7016 source3/include/proto.h bool user_ok_token(const char *username, const char *domain,
username 7018 source3/include/proto.h bool is_share_read_only_for_token(const char *username,
username 7098 source3/include/proto.h void sys_utmp_claim(const char *username, const char *hostname,
username 7101 source3/include/proto.h void sys_utmp_yield(const char *username, const char *hostname,
username 7104 source3/include/proto.h void sys_utmp_yield(const char *username, const char *hostname,
username 7107 source3/include/proto.h void sys_utmp_claim(const char *username, const char *hostname,
username 32 source3/include/session.h fstring username;
username 79 source3/lib/afs.c static bool afs_createtoken(const char *username, const char *cell,
username 111 source3/lib/afs.c strncpy(p, username, sizeof(clear_ticket)-PTR_DIFF(p,clear_ticket)-1);
username 184 source3/lib/afs.c char *afs_createtoken_str(const char *username, const char *cell)
username 190 source3/lib/afs.c if (!afs_createtoken(username, cell, &ticket, &ct))
username 294 source3/lib/afs.c char *afs_createtoken_str(const char *username, const char *cell)
username 45 source3/lib/netapi/cm.c set_cmdline_auth_info_username(auth_info, ctx->username);
username 52 source3/lib/netapi/cm.c if (ctx->username && ctx->username[0] &&
username 65 source3/lib/netapi/cm.c cli_set_username(cli_ipc, ctx->username);
username 36 source3/lib/netapi/examples/file/file_enum.c const char *username = NULL;
username 83 source3/lib/netapi/examples/file/file_enum.c username = poptGetArg(pc);
username 95 source3/lib/netapi/examples/file/file_enum.c username,
username 36 source3/lib/netapi/examples/group/group_adduser.c const char *username = NULL;
username 74 source3/lib/netapi/examples/group/group_adduser.c username = poptGetArg(pc);
username 80 source3/lib/netapi/examples/group/group_adduser.c username);
username 36 source3/lib/netapi/examples/group/group_deluser.c const char *username = NULL;
username 74 source3/lib/netapi/examples/group/group_deluser.c username = poptGetArg(pc);
username 80 source3/lib/netapi/examples/group/group_deluser.c username);
username 75 source3/lib/netapi/examples/join/getjoinableous.c ctx->username,
username 73 source3/lib/netapi/examples/join/rename_machine.c ctx->username,
username 35 source3/lib/netapi/examples/user/user_add.c const char *username = NULL;
username 70 source3/lib/netapi/examples/user/user_add.c username = poptGetArg(pc);
username 80 source3/lib/netapi/examples/user/user_add.c info1.usri1_name = username;
username 35 source3/lib/netapi/examples/user/user_chgpwd.c const char *username = NULL;
username 69 source3/lib/netapi/examples/user/user_chgpwd.c username = poptGetArg(pc);
username 86 source3/lib/netapi/examples/user/user_chgpwd.c username,
username 35 source3/lib/netapi/examples/user/user_del.c const char *username = NULL;
username 67 source3/lib/netapi/examples/user/user_del.c username = poptGetArg(pc);
username 71 source3/lib/netapi/examples/user/user_del.c status = NetUserDel(hostname, username);
username 35 source3/lib/netapi/examples/user/user_getgroups.c const char *username = NULL;
username 75 source3/lib/netapi/examples/user/user_getgroups.c username = poptGetArg(pc);
username 85 source3/lib/netapi/examples/user/user_getgroups.c username,
username 35 source3/lib/netapi/examples/user/user_getinfo.c const char *username = NULL;
username 81 source3/lib/netapi/examples/user/user_getinfo.c username = poptGetArg(pc);
username 90 source3/lib/netapi/examples/user/user_getinfo.c username,
username 35 source3/lib/netapi/examples/user/user_getlocalgroups.c const char *username = NULL;
username 75 source3/lib/netapi/examples/user/user_getlocalgroups.c username = poptGetArg(pc);
username 81 source3/lib/netapi/examples/user/user_getlocalgroups.c username,
username 35 source3/lib/netapi/examples/user/user_setgroups.c const char *username = NULL;
username 76 source3/lib/netapi/examples/user/user_setgroups.c username = poptGetArg(pc);
username 129 source3/lib/netapi/examples/user/user_setgroups.c username,
username 35 source3/lib/netapi/examples/user/user_setinfo.c const char *username = NULL;
username 95 source3/lib/netapi/examples/user/user_setinfo.c username = poptGetArg(pc);
username 192 source3/lib/netapi/examples/user/user_setinfo.c username,
username 366 source3/lib/netapi/joindomain.c } else if (ctx->username) {
username 367 source3/lib/netapi/joindomain.c ads->auth.user_name = SMB_STRDUP(ctx->username);
username 111 source3/lib/netapi/netapi.c ctx->username = talloc_strdup(frame, getenv("USER"));
username 113 source3/lib/netapi/netapi.c ctx->username = talloc_strdup(frame, "");
username 115 source3/lib/netapi/netapi.c if (!ctx->username) {
username 212 source3/lib/netapi/netapi.c const char *username)
username 214 source3/lib/netapi/netapi.c TALLOC_FREE(ctx->username);
username 215 source3/lib/netapi/netapi.c ctx->username = talloc_strdup(ctx, username ? username : "");
username 217 source3/lib/netapi/netapi.c if (!ctx->username) {
username 1268 source3/lib/netapi/netapi.h char *username;
username 1303 source3/lib/netapi/netapi.h const char *username);
username 49 source3/lib/netapi/netapi_private.h NET_API_STATUS libnetapi_get_username(struct libnetapi_ctx *ctx, char **username);
username 32 source3/lib/netapi/tests/common.h const char *username);
username 133 source3/lib/netapi/tests/netgroup.c const char *username)
username 182 source3/lib/netapi/tests/netgroup.c if (username && strcasecmp(current_name, username) == 0) {
username 203 source3/lib/netapi/tests/netgroup.c if (username && !found_user) {
username 280 source3/lib/netapi/tests/netgroup.c const char *username, *groupname, *groupname2;
username 291 source3/lib/netapi/tests/netgroup.c username = "torture_test_user";
username 298 source3/lib/netapi/tests/netgroup.c NetUserDel(hostname, username);
username 385 source3/lib/netapi/tests/netgroup.c status = test_netuseradd(hostname, username);
username 404 source3/lib/netapi/tests/netgroup.c status = NetGroupAddUser(hostname, groupname2, username);
username 414 source3/lib/netapi/tests/netgroup.c status = test_netgroupgetusers(hostname, getmem_levels[i], groupname2, username);
username 423 source3/lib/netapi/tests/netgroup.c status = NetGroupDelUser(hostname, groupname2, username);
username 439 source3/lib/netapi/tests/netgroup.c status = test_netgroupsetusers(hostname, groupname2, 0, 1, &username);
username 447 source3/lib/netapi/tests/netgroup.c status = test_netgroupgetusers(hostname, 0, groupname2, username);
username 469 source3/lib/netapi/tests/netgroup.c status = NetUserDel(hostname, username);
username 32 source3/lib/netapi/tests/netuser.c const char *username)
username 131 source3/lib/netapi/tests/netuser.c if (strcasecmp(current_name, username) == 0) {
username 184 source3/lib/netapi/tests/netuser.c const char *username)
username 193 source3/lib/netapi/tests/netuser.c u1.usri1_name = username;
username 257 source3/lib/netapi/tests/netuser.c const char *username,
username 275 source3/lib/netapi/tests/netuser.c username,
username 341 source3/lib/netapi/tests/netuser.c const char *username, *username2;
username 353 source3/lib/netapi/tests/netuser.c username = "torture_test_user";
username 357 source3/lib/netapi/tests/netuser.c NetUserDel(hostname, username);
username 362 source3/lib/netapi/tests/netuser.c status = test_netuseradd(hostname, username);
username 372 source3/lib/netapi/tests/netuser.c status = test_netuserenum(hostname, enum_levels[i], username);
username 385 source3/lib/netapi/tests/netuser.c status = NetUserGetInfo(hostname, username, levels[i], &buffer);
username 396 source3/lib/netapi/tests/netuser.c status = test_netusergetgroups(hostname, getgr_levels[i], username, NULL);
username 409 source3/lib/netapi/tests/netuser.c status = NetUserSetInfo(hostname, username, 1007, (uint8_t *)&u1007, &parm_err);
username 418 source3/lib/netapi/tests/netuser.c status = NetUserGetInfo(hostname, username, levels[i], &buffer);
username 429 source3/lib/netapi/tests/netuser.c status = NetUserDel(hostname, username);
username 437 source3/lib/netapi/tests/netuser.c status = NetUserGetInfo(hostname, username, 0, &buffer);
username 453 source3/lib/netapi/tests/netuser.c NetUserDel(hostname, username);
username 705 source3/lib/substitute.c const char *username,
username 733 source3/lib/substitute.c tmp_ctx, a_string, "%U", username);
username 737 source3/lib/substitute.c tmp_ctx, a_string, "%u", username);
username 767 source3/lib/substitute.c automount_server(username));
username 782 source3/lib/substitute.c ret_string = talloc_sub_basic(mem_ctx, username, domain, a_string);
username 295 source3/lib/util.c if (!auth_info->username) {
username 298 source3/lib/util.c return auth_info->username;
username 302 source3/lib/util.c const char *username)
username 304 source3/lib/util.c TALLOC_FREE(auth_info->username);
username 305 source3/lib/util.c auth_info->username = talloc_strdup(auth_info, username);
username 306 source3/lib/util.c if (!auth_info->username) {
username 424 source3/lib/util.c result->username = talloc_strdup(
username 428 source3/lib/util.c if ((result->username == NULL) || (result->password == NULL)) {
username 63 source3/libnet/libnet_samsync.h const char *username;
username 31 source3/libnet/libnet_samsync_keytab.c const char *username,
username 55 source3/libnet/libnet_samsync_keytab.c ads->auth.user_name = SMB_STRDUP(username);
username 129 source3/libnet/libnet_samsync_keytab.c ctx->username,
username 611 source3/libnet/libnet_samsync_ldif.c fstring username, logonscript, homedrive, homepath = "", homedir = "";
username 625 source3/libnet/libnet_samsync_ldif.c fstrcpy(username, r->account_name.string);
username 632 source3/libnet/libnet_samsync_ldif.c accountmap->cn = talloc_strdup(mem_ctx, username);
username 639 source3/libnet/libnet_samsync_ldif.c snprintf(homedir, sizeof(homedir), "/home/%s", username);
username 706 source3/libnet/libnet_samsync_ldif.c fprintf(add_fd, "# %s, %s, %s\n", username, user_rdn, suffix);
username 707 source3/libnet/libnet_samsync_ldif.c fprintf_attr(add_fd, "dn", "uid=%s,ou=%s,%s", username, user_rdn,
username 715 source3/libnet/libnet_samsync_ldif.c fprintf_attr(add_fd, "cn", "%s", username);
username 716 source3/libnet/libnet_samsync_ldif.c fprintf_attr(add_fd, "sn", "%s", username);
username 717 source3/libnet/libnet_samsync_ldif.c fprintf_attr(add_fd, "uid", "%s", username);
username 2292 source3/libsmb/cliconnect.c user_info->username ? user_info->username : "",
username 41 source3/libsmb/clidfs.c const char *username,
username 50 source3/libsmb/clidfs.c const char *username,
username 56 source3/libsmb/clidfs.c username,
username 103 source3/libsmb/clidfs.c const char *username;
username 196 source3/libsmb/clidfs.c username = get_cmdline_auth_info_username(auth_info);
username 199 source3/libsmb/clidfs.c if (!NT_STATUS_IS_OK(cli_session_setup(c, username,
username 205 source3/libsmb/clidfs.c if (password[0] || !username[0] ||
username 221 source3/libsmb/clidfs.c status = cli_init_creds(c, username, lp_workgroup(), password);
username 250 source3/libsmb/clidfs.c username,
username 272 source3/libsmb/clidfs.c username,
username 444 source3/libsmb/clidfs.c SAFE_FREE(cm_creds.username);
username 445 source3/libsmb/clidfs.c cm_creds.username = SMB_STRDUP(get_cmdline_auth_info_username(
username 993 source3/libsmb/clidfs.c const char *username,
username 1032 source3/libsmb/clidfs.c username,
username 425 source3/libsmb/clientgen.c NTSTATUS cli_set_username(struct cli_state *cli, const char *username)
username 428 source3/libsmb/clientgen.c cli->user_name = talloc_strdup(cli, username ? username : "");
username 457 source3/libsmb/clientgen.c NTSTATUS cli_init_creds(struct cli_state *cli, const char *username, const char *domain, const char *password)
username 459 source3/libsmb/clientgen.c NTSTATUS status = cli_set_username(cli, username);
username 785 source3/libsmb/clifsinfo.c const char *username,
username 808 source3/libsmb/clifsinfo.c username,
username 26 source3/libsmb/climessage.c int cli_message_start_build(struct cli_state *cli, const char *host, const char *username)
username 39 source3/libsmb/climessage.c p += clistr_push(cli, p, username,
username 50 source3/libsmb/climessage.c bool cli_message_start(struct cli_state *cli, const char *host, const char *username,
username 53 source3/libsmb/climessage.c cli_message_start_build(cli, host, username);
username 682 source3/libsmb/clirap2.c char username[RAP_USERNAME_LEN];
username 690 source3/libsmb/clirap2.c username,
username 694 source3/libsmb/clirap2.c if (username[0]) {
username 695 source3/libsmb/clirap2.c fn(username, state);
username 956 source3/libsmb/clirap2.c char username[RAP_USERNAME_LEN];
username 969 source3/libsmb/clirap2.c username,
username 1000 source3/libsmb/clirap2.c if (username[0] && comment &&
username 1002 source3/libsmb/clirap2.c fn(username,
username 1065 source3/libsmb/clirap2.c char username[RAP_USERNAME_LEN];
username 1073 source3/libsmb/clirap2.c username,
username 1077 source3/libsmb/clirap2.c if (username[0]) {
username 1078 source3/libsmb/clirap2.c fn(username, cli);
username 2386 source3/libsmb/clirap2.c char *wsname, *username, *clitype_name;
username 2398 source3/libsmb/clirap2.c &username,
username 2415 source3/libsmb/clirap2.c if (wsname && username && clitype_name) {
username 2416 source3/libsmb/clirap2.c fn(wsname, username, num_conns, num_opens, num_users, sess_time,
username 2484 source3/libsmb/clirap2.c char *wsname, *username, *clitype_name;
username 2502 source3/libsmb/clirap2.c &username,
username 2519 source3/libsmb/clirap2.c if (wsname && username && clitype_name) {
username 2520 source3/libsmb/clirap2.c fn(wsname, username, num_conns, num_opens, num_users, sess_time,
username 2587 source3/libsmb/clirap2.c uint32_t contime, const char *username,
username 2638 source3/libsmb/clirap2.c char *netname, *username;
username 2649 source3/libsmb/clirap2.c &username,
username 2660 source3/libsmb/clirap2.c if (username && netname) {
username 2662 source3/libsmb/clirap2.c username, netname);
username 35 source3/libsmb/libsmb_cache.c char *username;
username 53 source3/libsmb/libsmb_cache.c const char * username)
username 85 source3/libsmb/libsmb_cache.c srvcache->username = SMB_STRDUP(username);
username 86 source3/libsmb/libsmb_cache.c if (!srvcache->username) {
username 98 source3/libsmb/libsmb_cache.c SAFE_FREE(srvcache->username);
username 125 source3/libsmb/libsmb_cache.c strcmp(user, srv->username) == 0) {
username 211 source3/libsmb/libsmb_cache.c SAFE_FREE(srv->username);
username 465 source3/libsmb/libsmb_dir.c u_info.username = talloc_strdup(frame,user);
username 467 source3/libsmb/libsmb_dir.c if (!u_info.username || !u_info.password) {
username 102 source3/libsmb/libsmb_server.c fstring username;
username 107 source3/libsmb/libsmb_server.c strlcpy(username, *pp_username, sizeof(username));
username 117 source3/libsmb/libsmb_server.c username, sizeof(username),
username 124 source3/libsmb/libsmb_server.c username, sizeof(username),
username 133 source3/libsmb/libsmb_server.c *pp_username = talloc_strdup(ctx, username);
username 179 source3/libsmb/ntlm_check.c const char *username,
username 192 source3/libsmb/ntlm_check.c username));
username 198 source3/libsmb/ntlm_check.c username));
username 210 source3/libsmb/ntlm_check.c username));
username 217 source3/libsmb/ntlm_check.c username));
username 223 source3/libsmb/ntlm_check.c username));
username 231 source3/libsmb/ntlm_check.c username));
username 241 source3/libsmb/ntlm_check.c username));
username 249 source3/libsmb/ntlm_check.c username));
username 255 source3/libsmb/ntlm_check.c username));
username 272 source3/libsmb/ntlm_check.c username));
username 276 source3/libsmb/ntlm_check.c DEBUG(3, ("Plaintext authentication for user %s attempted, but neither NT nor LM passwords available\n", username));
username 283 source3/libsmb/ntlm_check.c (unsigned long)nt_response->length, username));
username 350 source3/libsmb/ntlm_check.c username));
username 355 source3/libsmb/ntlm_check.c username));
username 362 source3/libsmb/ntlm_check.c username));
username 368 source3/libsmb/ntlm_check.c (unsigned long)nt_response->length, username));
username 374 source3/libsmb/ntlm_check.c username));
username 377 source3/libsmb/ntlm_check.c username));
username 398 source3/libsmb/ntlm_check.c DEBUG(4,("ntlm_password_check: LM password check failed for user, no NT password %s\n",username));
username 464 source3/libsmb/ntlm_check.c DEBUG(3,("ntlm_password_check: LM password, NT MD4 password in LM field and LMv2 failed for user %s\n",username));
username 466 source3/libsmb/ntlm_check.c DEBUG(3,("ntlm_password_check: LM password and LMv2 failed for user %s, and NT MD4 password in LM field not permitted\n",username));
username 94 source3/libsmb/samlogon_cache.c bool netsamlogon_cache_store(const char *username, struct netr_SamInfo3 *info3)
username 135 source3/libsmb/samlogon_cache.c info3->base.account_name.string = talloc_strdup(info3, username);
username 166 source3/modules/vfs_smb_traffic_analyzer.c char *username = NULL;
username 196 source3/modules/vfs_smb_traffic_analyzer.c username = talloc_asprintf(talloc_tos(),
username 200 source3/modules/vfs_smb_traffic_analyzer.c username = talloc_asprintf(talloc_tos(),
username 208 source3/modules/vfs_smb_traffic_analyzer.c username = handle->conn->server_info->sanitized_username;
username 211 source3/modules/vfs_smb_traffic_analyzer.c if (!username) {
username 219 source3/modules/vfs_smb_traffic_analyzer.c username,
username 101 source3/passdb/passdb.c user->username = "";
username 910 source3/passdb/passdb.c char *username = NULL;
username 951 source3/passdb/passdb.c &username_len, &username, /* B */
username 988 source3/passdb/passdb.c pdb_set_username(sampass, username, PDB_SET);
username 998 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1007 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1016 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1025 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1061 source3/passdb/passdb.c SAFE_FREE(username);
username 1096 source3/passdb/passdb.c char *username = NULL;
username 1139 source3/passdb/passdb.c &username_len, &username, /* B */
username 1179 source3/passdb/passdb.c pdb_set_username(sampass, username, PDB_SET);
username 1189 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1198 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1207 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1216 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1253 source3/passdb/passdb.c SAFE_FREE(username);
username 1285 source3/passdb/passdb.c char *username = NULL;
username 1330 source3/passdb/passdb.c &username_len, &username, /* B */
username 1370 source3/passdb/passdb.c pdb_set_username(sampass, username, PDB_SET);
username 1378 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string,
username 1385 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1398 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string,
username 1405 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1413 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string,
username 1420 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1484 source3/passdb/passdb.c SAFE_FREE(username);
username 1520 source3/passdb/passdb.c char *username = NULL;
username 1565 source3/passdb/passdb.c &username_len, &username, /* B */
username 1606 source3/passdb/passdb.c pdb_set_username(sampass, username, PDB_SET);
username 1614 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string,
username 1621 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1634 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string,
username 1641 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain,
username 1649 source3/passdb/passdb.c standard_sub_basic( username, domain, tmp_string,
username 1656 source3/passdb/passdb.c talloc_sub_basic(sampass, username, domain, lp_logon_path()),
username 1718 source3/passdb/passdb.c SAFE_FREE(username);
username 1758 source3/passdb/passdb.c const char *username;
username 1797 source3/passdb/passdb.c username = pdb_get_username(sampass);
username 1798 source3/passdb/passdb.c if (username) {
username 1799 source3/passdb/passdb.c username_len = strlen(username) +1;
username 1926 source3/passdb/passdb.c username_len, username, /* B */
username 1970 source3/passdb/passdb.c username_len, username, /* B */
username 281 source3/passdb/pdb_get_set.c return sampass->username;
username 568 source3/passdb/pdb_get_set.c bool pdb_set_username(struct samu *sampass, const char *username, enum pdb_value_state flag)
username 570 source3/passdb/pdb_get_set.c if (username) {
username 571 source3/passdb/pdb_get_set.c DEBUG(10, ("pdb_set_username: setting username %s, was %s\n", username,
username 572 source3/passdb/pdb_get_set.c (sampass->username)?(sampass->username):"NULL"));
username 574 source3/passdb/pdb_get_set.c sampass->username = talloc_strdup(sampass, username);
username 576 source3/passdb/pdb_get_set.c if (!sampass->username) {
username 581 source3/passdb/pdb_get_set.c sampass->username = PDB_NOT_QUITE_NULL;
username 213 source3/passdb/pdb_interface.c bool pdb_getsampwnam(struct samu *sam_acct, const char *username)
username 219 source3/passdb/pdb_interface.c if (!NT_STATUS_IS_OK(pdb->getsampwnam(pdb, sam_acct, username))) {
username 435 source3/passdb/pdb_interface.c fstring username;
username 452 source3/passdb/pdb_interface.c fstrcpy( username, pdb_get_username(sam_acct) );
username 453 source3/passdb/pdb_interface.c strlower_m( username );
username 455 source3/passdb/pdb_interface.c smb_delete_user( username );
username 1460 source3/passdb/pdb_interface.c const char *username = pdb_get_username(user);
username 1466 source3/passdb/pdb_interface.c if ( !(pw = getpwnam_alloc(mem_ctx, username)) ) {
username 1474 source3/passdb/pdb_interface.c if (!getgroups_unix_user(mem_ctx, username, gid, pp_gids, p_num_groups)) {
username 520 source3/passdb/pdb_ldap.c char *username = NULL,
username 562 source3/passdb/pdb_ldap.c if (!(username = smbldap_talloc_smallest_attribute(priv2ld(ldap_state),
username 571 source3/passdb/pdb_ldap.c DEBUG(2, ("init_sam_from_ldap: Entry found for user: %s\n", username));
username 573 source3/passdb/pdb_ldap.c nt_username = talloc_strdup(ctx, username);
username 583 source3/passdb/pdb_ldap.c pdb_set_username(sampass, username, PDB_SET);
username 617 source3/passdb/pdb_ldap.c username));
username 737 source3/passdb/pdb_ldap.c username,
username 747 source3/passdb/pdb_ldap.c talloc_sub_basic(ctx, username, domain,
username 761 source3/passdb/pdb_ldap.c username,
username 771 source3/passdb/pdb_ldap.c talloc_sub_basic(ctx, username, domain,
username 785 source3/passdb/pdb_ldap.c username,
username 795 source3/passdb/pdb_ldap.c talloc_sub_basic(ctx, username, domain,
username 845 source3/passdb/pdb_ldap.c DEBUG(3, ("init_sam_from_ldap: smbldap_talloc_dn(ctx, %s) returned '%s'\n", username, user_dn));
username 866 source3/passdb/pdb_ldap.c DEBUG(0, ("init_sam_from_ldap: failed to get user_dn for '%s'\n", username));
username 950 source3/passdb/pdb_ldap.c username));
username 2088 source3/passdb/pdb_ldap.c const char *username = pdb_get_username(newpwd);
username 2099 source3/passdb/pdb_ldap.c if (!username || !*username) {
username 2108 source3/passdb/pdb_ldap.c rc = ldapsam_search_suffix_by_name (ldap_state, username, &result, attr_list);
username 2116 source3/passdb/pdb_ldap.c username));
username 2140 source3/passdb/pdb_ldap.c escape_user = escape_ldap_string_alloc( username );
username 2232 source3/passdb/pdb_ldap.c escape_username = escape_rdn_val_string_alloc(username);
username 2238 source3/passdb/pdb_ldap.c if (username[strlen(username)-1] == '$') {
username 4188 source3/passdb/pdb_ldap.c static char *get_ldap_filter(TALLOC_CTX *mem_ctx, const char *username)
username 4199 source3/passdb/pdb_ldap.c escaped = escape_ldap_string_alloc(username);
username 4202 source3/passdb/pdb_ldap.c result = talloc_string_sub(mem_ctx, filter, "%u", username);
username 4988 source3/passdb/pdb_ldap.c char *username;
username 5008 source3/passdb/pdb_ldap.c username = escape_ldap_string_alloc(name);
username 5010 source3/passdb/pdb_ldap.c username, LDAP_OBJ_POSIXACCOUNT);
username 5011 source3/passdb/pdb_ldap.c SAFE_FREE(username);
username 765 source3/passdb/pdb_nds.c const char *username = pdb_get_username(sam_acct);
username 769 source3/passdb/pdb_nds.c success ? "Successful" : "Failed", username));
username 775 source3/passdb/pdb_nds.c rc = ldapsam_search_suffix_by_name(ldap_state, username, &result, attr_list );
username 796 source3/passdb/pdb_nds.c DEBUG(3, ("pdb_nds_update_login_attempts: username %s found dn '%s'\n", username, dn));
username 822 source3/passdb/pdb_nds.c DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Successful for %s\n", username));
username 825 source3/passdb/pdb_nds.c DEBUG(5,("pdb_nds_update_login_attempts: ldap_simple_bind_s Failed for %s\n", username));
username 1276 source3/passdb/pdb_smbpasswd.c struct samu *sam_acct, const char *username)
username 1283 source3/passdb/pdb_smbpasswd.c DEBUG(10, ("getsampwnam (smbpasswd): search by name: %s\n", username));
username 1295 source3/passdb/pdb_smbpasswd.c while ( ((smb_pw=getsmbfilepwent(smbpasswd_state, fp)) != NULL)&& (!strequal(smb_pw->smb_name, username)) )
username 1424 source3/passdb/pdb_smbpasswd.c const char *username = pdb_get_username(sampass);
username 1426 source3/passdb/pdb_smbpasswd.c if (del_smbfilepwd_entry(smbpasswd_state, username))
username 101 source3/passdb/pdb_wbc_sam.c const char *username = pdb_get_username(user);
username 104 source3/passdb/pdb_wbc_sam.c if (!winbind_get_groups(mem_ctx, username, &num_groups, pp_gids)) {
username 1107 source3/passdb/secrets.c void secrets_fetch_ipc_userpass(char **username, char **domain, char **password)
username 1109 source3/passdb/secrets.c *username = (char *)secrets_fetch(SECRETS_AUTH_USER, NULL);
username 1113 source3/passdb/secrets.c if (*username && **username) {
username 1122 source3/passdb/secrets.c *domain, *username));
username 1126 source3/passdb/secrets.c *username = smb_xstrdup("");
username 1409 source3/printing/print_cups.c char *username = NULL;
username 1460 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &username, current_user_info.unix_name, &size)) {
username 1464 source3/printing/print_cups.c NULL, username);
username 1510 source3/printing/print_cups.c char *username = NULL;
username 1561 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &username, current_user_info.unix_name, &size)) {
username 1565 source3/printing/print_cups.c NULL, username);
username 141 source3/rpc_client/cli_netlogon.c const char *username,
username 225 source3/rpc_client/cli_netlogon.c username,
username 266 source3/rpc_client/cli_netlogon.c username,
username 315 source3/rpc_client/cli_netlogon.c const char *username,
username 386 source3/rpc_client/cli_netlogon.c username,
username 437 source3/rpc_client/cli_netlogon.c const char *username,
username 504 source3/rpc_client/cli_netlogon.c username,
username 3048 source3/rpc_client/cli_pipe.c const char *username,
username 3063 source3/rpc_client/cli_pipe.c result->user_name = talloc_strdup(result, username);
username 3077 source3/rpc_client/cli_pipe.c status = ntlmssp_set_username(result->a_u.ntlmssp_state, username);
username 3163 source3/rpc_client/cli_pipe.c const char *username,
username 3170 source3/rpc_client/cli_pipe.c if ((username != NULL) && (password != NULL)) {
username 3171 source3/rpc_client/cli_pipe.c int ret = kerberos_kinit_password(username, password, 0, NULL);
username 3741 source3/rpc_client/cli_pipe.c const char *username,
username 3755 source3/rpc_client/cli_pipe.c result, auth_type, auth_level, domain, username,
username 3773 source3/rpc_client/cli_pipe.c username ));
username 3794 source3/rpc_client/cli_pipe.c const char *username,
username 3804 source3/rpc_client/cli_pipe.c username,
username 3819 source3/rpc_client/cli_pipe.c const char *username,
username 3829 source3/rpc_client/cli_pipe.c username,
username 3984 source3/rpc_client/cli_pipe.c const char *username,
username 3995 source3/rpc_client/cli_pipe.c domain, username, password, &netlogon_pipe);
username 4022 source3/rpc_client/cli_pipe.c const char *username,
username 4032 source3/rpc_client/cli_pipe.c cli, domain, username, password, &neg_flags, &netlogon_pipe);
username 4103 source3/rpc_client/cli_pipe.c const char *username,
username 4118 source3/rpc_client/cli_pipe.c username, password, &auth);
username 83 source3/rpc_client/cli_samr.c const char *username,
username 102 source3/rpc_client/cli_samr.c init_lsa_String(&account, username);
username 146 source3/rpc_client/cli_samr.c const char *username,
username 162 source3/rpc_client/cli_samr.c init_lsa_String(&account, username);
username 185 source3/rpc_client/cli_samr.c const char *username,
username 208 source3/rpc_client/cli_samr.c init_lsa_String(&account, username);
username 1522 source3/rpc_server/srv_lsa_nt.c const char *username, *domname;
username 1543 source3/rpc_server/srv_lsa_nt.c &domname, &username, NULL)) {
username 1547 source3/rpc_server/srv_lsa_nt.c username = p->server_info->sanitized_username;
username 1555 source3/rpc_server/srv_lsa_nt.c init_lsa_String(account_name, username);
username 39 source3/rpc_server/srv_srvsvc_nt.c const char *username;
username 60 source3/rpc_server/srv_srvsvc_nt.c const char *username;
username 71 source3/rpc_server/srv_srvsvc_nt.c username = uidtoname(prec.uid);
username 73 source3/rpc_server/srv_srvsvc_nt.c if ((fenum->username != NULL)
username 74 source3/rpc_server/srv_srvsvc_nt.c && !strequal(username, fenum->username)) {
username 97 source3/rpc_server/srv_srvsvc_nt.c fenum->ctr3->array[i].user = username;
username 108 source3/rpc_server/srv_srvsvc_nt.c const char *username,
username 115 source3/rpc_server/srv_srvsvc_nt.c fenum.username = username;
username 146 source3/rpc_server/srv_srvsvc_nt.c const char *username;
username 154 source3/rpc_server/srv_srvsvc_nt.c username = uidtoname(e->uid);
username 156 source3/rpc_server/srv_srvsvc_nt.c if ((fenum->username != NULL)
username 157 source3/rpc_server/srv_srvsvc_nt.c && !strequal(username, fenum->username)) {
username 200 source3/rpc_server/srv_srvsvc_nt.c fenum->ctr3->array[i].user = username;
username 209 source3/rpc_server/srv_srvsvc_nt.c const char *username,
username 216 source3/rpc_server/srv_srvsvc_nt.c f_enum_cnt.username = username;
username 858 source3/rpc_server/srv_srvsvc_nt.c struct passwd *pw = sys_getpwnam(session_list[resume_handle].username);
username 863 source3/rpc_server/srv_srvsvc_nt.c session_list[resume_handle].username));
username 869 source3/rpc_server/srv_srvsvc_nt.c guest = strequal( session_list[resume_handle].username, lp_guestaccount() );
username 878 source3/rpc_server/srv_srvsvc_nt.c ctr1->array[num_entries].user = session_list[resume_handle].username;
username 1247 source3/rpc_server/srv_srvsvc_nt.c const char *username;
username 1252 source3/rpc_server/srv_srvsvc_nt.c username = r->in.user;
username 1277 source3/rpc_server/srv_srvsvc_nt.c if ((strequal(session_list[snum].username, username) || username[0] == '\0' ) &&
username 692 source3/rpcclient/cmd_netlogon.c const char *username, *password;
username 705 source3/rpcclient/cmd_netlogon.c username = argv[1];
username 722 source3/rpcclient/cmd_netlogon.c result = rpccli_netlogon_sam_logon(cli, mem_ctx, logon_param, lp_workgroup(), username, password, workstation, logon_type);
username 1088 source3/smbd/chgpasswd.c const char *username = pdb_get_username(hnd);
username 1097 source3/smbd/chgpasswd.c DEBUG(1, ("user %s does not have permissions to change password\n", username));
username 1111 source3/smbd/chgpasswd.c username));
username 1123 source3/smbd/chgpasswd.c "wait until %s\n", username,
username 1133 source3/smbd/chgpasswd.c username));
username 1149 source3/smbd/chgpasswd.c pass = Get_Pwnam_alloc(talloc_tos(), username);
username 1151 source3/smbd/chgpasswd.c DEBUG(1, ("change_oem_password: Username %s does not exist in system !?!\n", username));
username 1185 source3/smbd/chgpasswd.c !chgpasswd(username, pass, old_passwd, new_passwd, as_root)) {
username 4520 source3/smbd/lanman.c PACKS(&desc, "z", session_list[i].username);
username 188 source3/smbd/password.c static int register_homes_share(const char *username)
username 193 source3/smbd/password.c result = lp_servicenumber(username);
username 196 source3/smbd/password.c "user '%s'; path = '%s'\n", username,
username 201 source3/smbd/password.c pwd = getpwnam_alloc(talloc_tos(), username);
username 205 source3/smbd/password.c username));
username 211 source3/smbd/password.c "'%s'\n", username, pwd->pw_dir));
username 213 source3/smbd/password.c result = add_home_service(username, username, pwd->pw_dir);
username 262 source3/smbd/service.c int add_home_service(const char *service, const char *username, const char *homedir)
username 291 source3/smbd/service.c if (!lp_add_home(service, iHomeService, username, homedir)) {
username 474 source3/smbd/service.c int snum, const char *username,
username 535 source3/smbd/service.c if (user_in_group_sid(username, &group_sid)) {
username 539 source3/smbd/service.c groupname, username));
username 543 source3/smbd/service.c username, groupname ));
username 169 source3/smbd/session.c fstrcpy(sessionid.username, vuser->server_info->unix_name);
username 180 source3/smbd/session.c if (!smb_pam_claim_session(sessionid.username, sessionid.id_str,
username 183 source3/smbd/session.c sessionid.username, sessionid.id_str));
username 203 source3/smbd/session.c sys_utmp_claim(sessionid.username, sessionid.hostname,
username 245 source3/smbd/session.c sys_utmp_yield(sessionid.username, sessionid.hostname,
username 250 source3/smbd/session.c smb_pam_close_session(sessionid.username, sessionid.id_str,
username 306 source3/smbd/session.c current->username, current->remote_machine));
username 66 source3/smbd/share_access.c const char *username,
username 76 source3/smbd/share_access.c if (username != NULL) {
username 77 source3/smbd/share_access.c name = talloc_sub_basic(mem_ctx, username, domain, name);
username 131 source3/smbd/share_access.c if (user_in_netgroup(username, name)) {
username 152 source3/smbd/share_access.c bool token_contains_name_in_list(const char *username,
username 169 source3/smbd/share_access.c if (token_contains_name(mem_ctx, username, domain, sharename,
username 194 source3/smbd/share_access.c bool user_ok_token(const char *username, const char *domain,
username 198 source3/smbd/share_access.c if (token_contains_name_in_list(username, domain,
username 202 source3/smbd/share_access.c DEBUG(10, ("User %s in 'invalid users'\n", username));
username 208 source3/smbd/share_access.c if (!token_contains_name_in_list(username, domain,
username 212 source3/smbd/share_access.c username));
username 228 source3/smbd/share_access.c DEBUG(10, ("%s != 'username'\n", username));
username 234 source3/smbd/share_access.c lp_servicename(snum), username));
username 253 source3/smbd/share_access.c bool is_share_read_only_for_token(const char *username,
username 262 source3/smbd/share_access.c if (token_contains_name_in_list(username, domain,
username 270 source3/smbd/share_access.c if (token_contains_name_in_list(username, domain,
username 279 source3/smbd/share_access.c result ? "read-only" : "read-write", username));
username 115 source3/smbd/utmp.c void sys_utmp_claim(const char *username, const char *hostname,
username 120 source3/smbd/utmp.c void sys_utmp_yield(const char *username, const char *hostname,
username 497 source3/smbd/utmp.c const char *username, const char *hostname,
username 510 source3/smbd/utmp.c utmp_strcpy(u->ut_user, username, sizeof(u->ut_user));
username 512 source3/smbd/utmp.c utmp_strcpy(u->ut_name, username, sizeof(u->ut_name));
username 585 source3/smbd/utmp.c void sys_utmp_yield(const char *username, const char *hostname,
username 602 source3/smbd/utmp.c if (!sys_utmp_fill(&u, username, hostname, ip_addr_str, id_str, id_num))
username 612 source3/smbd/utmp.c void sys_utmp_claim(const char *username, const char *hostname,
username 624 source3/smbd/utmp.c if (!sys_utmp_fill(&u, username, hostname, ip_addr_str, id_str, id_num))
username 23 source3/torture/locktest.c static fstring username[2];
username 233 source3/torture/locktest.c fstrcpy(username[1], username[0]);
username 236 source3/torture/locktest.c if (!NT_STATUS_IS_OK(cli_session_setup(c, username[snum],
username 627 source3/torture/locktest.c fstrcpy(username[0],getenv("USER"));
username 628 source3/torture/locktest.c fstrcpy(username[1],getenv("USER"));
username 649 source3/torture/locktest.c fstrcpy(username[got_pass],optarg);
username 650 source3/torture/locktest.c p = strchr_m(username[got_pass],'%');
username 23 source3/torture/locktest2.c static fstring username;
username 186 source3/torture/locktest2.c username, lp_workgroup(), password, 0,
username 512 source3/torture/locktest2.c fstrcpy(username,getenv("USER"));
username 520 source3/torture/locktest2.c fstrcpy(username,optarg);
username 521 source3/torture/locktest2.c p = strchr_m(username,'%');
username 23 source3/torture/masktest.c static fstring username;
username 230 source3/torture/masktest.c if (!NT_STATUS_IS_OK(cli_session_setup(c, username,
username 492 source3/torture/masktest.c fstrcpy(username,getenv("USER"));
username 518 source3/torture/masktest.c fstrcpy(username,optarg);
username 519 source3/torture/masktest.c p = strchr_m(username,'%');
username 343 source3/torture/pdbtest.c if (NT_STATUS_IS_ERR(pdb->getsampwnam(pdb, in, out->username))) {
username 345 source3/torture/pdbtest.c out->username);
username 26 source3/torture/torture.c static fstring host, workgroup, share, password, username, myname;
username 137 source3/torture/torture.c username,
username 280 source3/torture/torture.c username, workgroup,
username 341 source3/torture/torture.c ret = NT_STATUS_IS_OK(cli_session_setup(cli, username,
username 1306 source3/torture/torture.c username, workgroup,
username 4996 source3/torture/torture.c c, username,
username 6176 source3/torture/torture.c if (*username == 0 && getenv("LOGNAME")) {
username 6177 source3/torture/torture.c fstrcpy(username,getenv("LOGNAME"));
username 6236 source3/torture/torture.c fstrcpy(username,optarg);
username 6237 source3/torture/torture.c p = strchr_m(username,'%');
username 6272 source3/torture/torture.c host, share, username, myname);
username 345 source3/utils/net_rap.c static void list_sessions_func(char *wsname, char *username, uint16 conns,
username 354 source3/utils/net_rap.c wsname, username, clitype, opens, hrs, min, sec);
username 357 source3/utils/net_rap.c static void display_session_func(const char *wsname, const char *username,
username 374 source3/utils/net_rap.c username, wsname,
username 381 source3/utils/net_rap.c const char *username, const char *netname)
username 1132 source3/utils/net_rpc.c const char *username;
username 1150 source3/utils/net_rpc.c username = talloc_strdup(mem_ctx, info->info21.account_name.string);
username 1160 source3/utils/net_rpc.c d_printf("%s's %s: [%s]\n", username, ctx->thiscmd, oldval);
username 1182 source3/utils/net_rpc.c d_printf("Set %s's %s from [%s] to [%s]\n", username,
username 1217 source3/utils/net_rpc.c const char *username;
username 1241 source3/utils/net_rpc.c username = talloc_strdup(mem_ctx, info->info21.account_name.string);
username 1251 source3/utils/net_rpc.c d_printf("%s's %s flag: %s\n", username, ctx->thiscmd, oldval);
username 1266 source3/utils/net_rpc.c d_printf("Set %s's %s flag from [%s] to [%s]\n", username,
username 4757 source3/utils/net_rpc.c const char *username=NULL;
username 4769 source3/utils/net_rpc.c username = smb_xstrdup(argv[0]);
username 4774 source3/utils/net_rpc.c username,
username 678 source3/utils/net_rpc_printer.c const char *username,
username 689 source3/utils/net_rpc_printer.c pipe_hnd->srv_name_slash, username, printername2, access_required));
username 700 source3/utils/net_rpc_printer.c printername2, pipe_hnd->srv_name_slash, username);
username 382 source3/utils/net_rpc_samsync.c ctx->username = c->opt_user_name;
username 209 source3/utils/net_util.c static char *get_user_and_realm(const char *username)
username 213 source3/utils/net_util.c if (!username) {
username 216 source3/utils/net_util.c if (strchr_m(username, '@')) {
username 217 source3/utils/net_util.c user_and_realm = SMB_STRDUP(username);
username 219 source3/utils/net_util.c if (asprintf(&user_and_realm, "%s@%s", username, lp_realm()) == -1) {
username 336 source3/utils/ntlm_auth.c NTSTATUS contact_winbind_auth_crap(const char *username,
username 367 source3/utils/ntlm_auth.c fstrcpy(request.data.auth_crap.user, username);
username 443 source3/utils/ntlm_auth.c static NTSTATUS contact_winbind_change_pswd_auth_crap(const char *username,
username 466 source3/utils/ntlm_auth.c if(username != NULL)
username 467 source3/utils/ntlm_auth.c fstrcpy(request.data.chng_pswd_auth_crap.user, username);
username 1747 source3/utils/ntlm_auth.c static char *username;
username 1754 source3/utils/ntlm_auth.c if (!full_username && !username) {
username 1759 source3/utils/ntlm_auth.c if (asprintf(&full_username, "%s%c%s", domain, winbind_separator(), username) == -1) {
username 1779 source3/utils/ntlm_auth.c if (full_username && !username) {
username 1787 source3/utils/ntlm_auth.c SAFE_FREE(username);
username 1789 source3/utils/ntlm_auth.c username = smb_xstrdup(fstr_user);
username 1804 source3/utils/ntlm_auth.c contact_winbind_auth_crap(username,
username 1852 source3/utils/ntlm_auth.c SAFE_FREE(username);
username 1920 source3/utils/ntlm_auth.c username = smb_xstrdup(parameter);
username 1941 source3/utils/ntlm_auth.c static char *username = NULL;
username 1998 source3/utils/ntlm_auth.c if (!full_username && !username) {
username 2007 source3/utils/ntlm_auth.c if (full_username && !username) {
username 2020 source3/utils/ntlm_auth.c SAFE_FREE(username);
username 2021 source3/utils/ntlm_auth.c username = smb_xstrdup(full_username);
username 2023 source3/utils/ntlm_auth.c SAFE_FREE(username);
username 2025 source3/utils/ntlm_auth.c username = smb_xstrdup(fstr_user);
username 2032 source3/utils/ntlm_auth.c username, domain,
username 2053 source3/utils/ntlm_auth.c SAFE_FREE(username);
username 2131 source3/utils/ntlm_auth.c username = smb_xstrdup(parameter);
username 2133 source3/utils/ntlm_auth.c username = smb_xstrdup(parameter);
username 32 source3/utils/ntlm_auth_proto.h NTSTATUS contact_winbind_auth_crap(const char *username,
username 82 source3/utils/pdbedit.c const char *username)
username 88 source3/utils/pdbedit.c DEBUG(3, ("export_database: username=\"%s\"\n", username ? username : "(NULL)"));
username 109 source3/utils/pdbedit.c if ((username != NULL)
username 110 source3/utils/pdbedit.c && (strcmp(username, userentry.account_name) != 0)) {
username 143 source3/utils/pdbedit.c printf("Importing account for %s...", user->username);
username 144 source3/utils/pdbedit.c status = out->getsampwnam(out, account, user->username);
username 344 source3/utils/pdbedit.c static int print_user_info(const char *username,
username 356 source3/utils/pdbedit.c bret = pdb_getsampwnam(sam_pwent, username);
username 491 source3/utils/pdbedit.c static int set_user_info(const char *username, const char *fullname,
username 513 source3/utils/pdbedit.c ret = pdb_getsampwnam(sam_pwent, username);
username 582 source3/utils/pdbedit.c print_user_info(username, True, False);
username 682 source3/utils/pdbedit.c static int new_user(const char *username, const char *fullname,
username 719 source3/utils/pdbedit.c status = local_password_change(username, flags, pwd1, &err, &msg);
username 733 source3/utils/pdbedit.c if (!pdb_getsampwnam(sam_pwent, username)) {
username 734 source3/utils/pdbedit.c fprintf(stderr, "User %s not found!\n", username);
username 756 source3/utils/pdbedit.c username);
username 761 source3/utils/pdbedit.c print_user_info(username, True, False);
username 877 source3/utils/pdbedit.c static int delete_user_entry(const char *username)
username 887 source3/utils/pdbedit.c if (!pdb_getsampwnam(samaccount, username)) {
username 889 source3/utils/pdbedit.c "user %s does not exist in the passdb\n", username);
username 895 source3/utils/pdbedit.c fprintf (stderr, "Unable to delete user %s\n", username);
username 48 source3/utils/smbget.c static const char *username = NULL, *password = NULL, *workgroup = NULL;
username 92 source3/utils/smbget.c if(!nonprompt && !username) {
username 99 source3/utils/smbget.c } else if(username) strncpy(un, username, unlen-1);
username 573 source3/utils/smbget.c {"username", 'u', POPT_ARG_STRING, &username, 'u', "Username to use" },
username 615 source3/utils/smbget.c username = ""; password = "";
username 236 source3/utils/smbpasswd.c static NTSTATUS password_change(const char *remote_mach, char *username,
username 252 source3/utils/smbpasswd.c ret = remote_password_change(remote_mach, username,
username 255 source3/utils/smbpasswd.c ret = local_password_change(username, local_flags, new_pw,
username 48 source3/utils/status.c const char *username = NULL;
username 288 source3/utils/status.c {"user", 'u', POPT_ARG_STRING, &username, 'u', "Switch to user" },
username 356 source3/utils/status.c if ( username )
username 357 source3/utils/status.c Ucrit_addUid( nametouid(username) );
username 1024 source3/winbindd/idmap_ad.c char *username;
username 1070 source3/winbindd/idmap_ad.c username = ads_pull_string(ctx->ads, mem_ctx, msg,
username 1072 source3/winbindd/idmap_ad.c if (!username) {
username 1078 source3/winbindd/idmap_ad.c username);
username 375 source3/winbindd/winbindd.h const char *username; /* lookup key. */
username 389 source3/winbindd/winbindd.h const char *username;
username 43 source3/winbindd/winbindd_ccache_access.c static NTSTATUS do_ntlm_auth_with_hashes(const char *username,
username 63 source3/winbindd/winbindd_ccache_access.c status = ntlmssp_set_username(ntlmssp_state, username);
username 240 source3/winbindd/winbindd_ccache_access.c DEBUG(10,("winbindd_dual_ccache_ntlm_auth: found ccache [%s]\n", entry->username));
username 552 source3/winbindd/winbindd_cm.c static void cm_get_ipc_userpass(char **username, char **domain, char **password)
username 554 source3/winbindd/winbindd_cm.c *username = (char *)secrets_fetch(SECRETS_AUTH_USER, NULL);
username 558 source3/winbindd/winbindd_cm.c if (*username && **username) {
username 567 source3/winbindd/winbindd_cm.c *domain, *username));
username 571 source3/winbindd/winbindd_cm.c *username = smb_xstrdup("");
username 53 source3/winbindd/winbindd_cred_cache.c static struct WINBINDD_CCACHE_ENTRY *get_ccache_by_username(const char *username)
username 58 source3/winbindd/winbindd_cred_cache.c if (strequal(entry->username, username)) {
username 114 source3/winbindd/winbindd_cred_cache.c entry->ccname, entry->username));
username 307 source3/winbindd/winbindd_cred_cache.c entry->ccname, entry->username));
username 446 source3/winbindd/winbindd_cred_cache.c bool ccache_entry_exists(const char *username)
username 448 source3/winbindd/winbindd_cred_cache.c struct WINBINDD_CCACHE_ENTRY *entry = get_ccache_by_username(username);
username 456 source3/winbindd/winbindd_cred_cache.c bool ccache_entry_identical(const char *username,
username 460 source3/winbindd/winbindd_cred_cache.c struct WINBINDD_CCACHE_ENTRY *entry = get_ccache_by_username(username);
username 483 source3/winbindd/winbindd_cred_cache.c const char *username,
username 498 source3/winbindd/winbindd_cred_cache.c if ((username == NULL && princ_name == NULL) ||
username 526 source3/winbindd/winbindd_cred_cache.c username));
username 532 source3/winbindd/winbindd_cred_cache.c entry = get_ccache_by_username(username);
username 535 source3/winbindd/winbindd_cred_cache.c if (!ccache_entry_identical(username, uid, ccname)) {
username 541 source3/winbindd/winbindd_cred_cache.c username, entry->ref_count));
username 572 source3/winbindd/winbindd_cred_cache.c ntret = remove_ccache(username);
username 576 source3/winbindd/winbindd_cred_cache.c entry->username));
username 597 source3/winbindd/winbindd_cred_cache.c if (username) {
username 598 source3/winbindd/winbindd_cred_cache.c entry->username = talloc_strdup(entry, username);
username 599 source3/winbindd/winbindd_cred_cache.c if (!entry->username) {
username 667 source3/winbindd/winbindd_cred_cache.c ccname, username));
username 682 source3/winbindd/winbindd_cred_cache.c NTSTATUS remove_ccache(const char *username)
username 684 source3/winbindd/winbindd_cred_cache.c struct WINBINDD_CCACHE_ENTRY *entry = get_ccache_by_username(username);
username 697 source3/winbindd/winbindd_cred_cache.c username, entry->ref_count));
username 705 source3/winbindd/winbindd_cred_cache.c username, entry->ref_count));
username 727 source3/winbindd/winbindd_cred_cache.c entry->ccname, username));
username 733 source3/winbindd/winbindd_cred_cache.c DEBUG(10,("remove_ccache: removed ccache for user %s\n", username));
username 748 source3/winbindd/winbindd_cred_cache.c struct WINBINDD_MEMORY_CREDS *find_memory_creds_by_name(const char *username)
username 753 source3/winbindd/winbindd_cred_cache.c if (strequal(p->username, username)) {
username 867 source3/winbindd/winbindd_cred_cache.c static NTSTATUS winbindd_add_memory_creds_internal(const char *username,
username 878 source3/winbindd/winbindd_cred_cache.c memcredp = find_memory_creds_by_name(username);
username 881 source3/winbindd/winbindd_cred_cache.c "invalid uid for user %s.\n", username));
username 891 source3/winbindd/winbindd_cred_cache.c (unsigned int)uid, username,
username 898 source3/winbindd/winbindd_cred_cache.c username, memcredp->ref_count));
username 906 source3/winbindd/winbindd_cred_cache.c memcredp->username = talloc_strdup(memcredp, username);
username 907 source3/winbindd/winbindd_cred_cache.c if (!memcredp->username) {
username 923 source3/winbindd/winbindd_cred_cache.c "added entry for user %s\n", username));
username 936 source3/winbindd/winbindd_cred_cache.c NTSTATUS winbindd_add_memory_creds(const char *username,
username 940 source3/winbindd/winbindd_cred_cache.c struct WINBINDD_CCACHE_ENTRY *entry = get_ccache_by_username(username);
username 943 source3/winbindd/winbindd_cred_cache.c status = winbindd_add_memory_creds_internal(username, uid, pass);
username 950 source3/winbindd/winbindd_cred_cache.c memcredp = find_memory_creds_by_name(username);
username 963 source3/winbindd/winbindd_cred_cache.c NTSTATUS winbindd_delete_memory_creds(const char *username)
username 969 source3/winbindd/winbindd_cred_cache.c memcredp = find_memory_creds_by_name(username);
username 970 source3/winbindd/winbindd_cred_cache.c entry = get_ccache_by_username(username);
username 974 source3/winbindd/winbindd_cred_cache.c username));
username 981 source3/winbindd/winbindd_cred_cache.c username, memcredp->ref_count));
username 992 source3/winbindd/winbindd_cred_cache.c username));
username 996 source3/winbindd/winbindd_cred_cache.c username, memcredp->ref_count));
username 1011 source3/winbindd/winbindd_cred_cache.c NTSTATUS winbindd_replace_memory_creds(const char *username,
username 1016 source3/winbindd/winbindd_cred_cache.c memcredp = find_memory_creds_by_name(username);
username 1019 source3/winbindd/winbindd_cred_cache.c username));
username 1024 source3/winbindd/winbindd_cred_cache.c username));
username 303 source3/winbindd/winbindd_group.c char *username = NULL;
username 318 source3/winbindd/winbindd_group.c &username,
username 331 source3/winbindd/winbindd_group.c username, &mapped_name);
username 343 source3/winbindd/winbindd_group.c fill_domain_username(name, domainname, username, true);
username 1525 source3/winbindd/winbindd_group.c char *username;
username 1548 source3/winbindd/winbindd_group.c state->request.data.username
username 1549 source3/winbindd/winbindd_group.c [sizeof(state->request.data.username)-1]='\0';
username 1552 source3/winbindd/winbindd_group.c state->request.data.username));
username 1566 source3/winbindd/winbindd_group.c state->request.data.username,
username 1574 source3/winbindd/winbindd_group.c real_name = state->request.data.username;
username 1578 source3/winbindd/winbindd_group.c &s->domname, &s->username)) {
username 1591 source3/winbindd/winbindd_group.c s->username = talloc_strdup(state->mem_ctx,
username 1592 source3/winbindd/winbindd_group.c state->request.data.username);
username 1600 source3/winbindd/winbindd_group.c char *p = strchr(s->username, '@');
username 1618 source3/winbindd/winbindd_group.c s->username));
username 1626 source3/winbindd/winbindd_group.c s->domname, s->username,
username 1195 source3/winbindd/winbindd_pam.c const char *username,
username 542 source3/winbindd/winbindd_passdb.c user_info->acct_name = talloc_strdup(mem_ctx, sampass->username ?
username 543 source3/winbindd/winbindd_passdb.c sampass->username : "");
username 239 source3/winbindd/winbindd_proto.h bool ccache_entry_exists(const char *username);
username 240 source3/winbindd/winbindd_proto.h bool ccache_entry_identical(const char *username,
username 248 source3/winbindd/winbindd_proto.h const char *username,
username 255 source3/winbindd/winbindd_proto.h NTSTATUS remove_ccache(const char *username);
username 256 source3/winbindd/winbindd_proto.h struct WINBINDD_MEMORY_CREDS *find_memory_creds_by_name(const char *username);
username 257 source3/winbindd/winbindd_proto.h NTSTATUS winbindd_add_memory_creds(const char *username,
username 260 source3/winbindd/winbindd_proto.h NTSTATUS winbindd_delete_memory_creds(const char *username);
username 261 source3/winbindd/winbindd_proto.h NTSTATUS winbindd_replace_memory_creds(const char *username,
username 31 source3/winbindd/winbindd_user.c const char *username,
username 51 source3/winbindd/winbindd_user.c username, domname,
username 55 source3/winbindd/winbindd_user.c username, domname,
username 199 source3/winbindd/winbindd_user.c char *username;
username 257 source3/winbindd/winbindd_user.c fstring username;
username 271 source3/winbindd/winbindd_user.c fstrcpy( username, acct_name );
username 297 source3/winbindd/winbindd_user.c fstrcpy( username, user_name );
username 300 source3/winbindd/winbindd_user.c strlower_m( username );
username 301 source3/winbindd/winbindd_user.c s->username = talloc_strdup(s->state->mem_ctx, username);
username 304 source3/winbindd/winbindd_user.c s->username, &mapped_name);
username 308 source3/winbindd/winbindd_user.c s->username = mapped_name;
username 313 source3/winbindd/winbindd_user.c s->username = mapped_name;
username 339 source3/winbindd/winbindd_user.c s->domain->name, s->username));
username 366 source3/winbindd/winbindd_user.c s->domain->name, s->username));
username 381 source3/winbindd/winbindd_user.c fstrcpy( output_username, s->username );
username 384 source3/winbindd/winbindd_user.c s->username, True);
username 390 source3/winbindd/winbindd_user.c if (!fillup_pw_field(lp_template_homedir(), s->username,
username 397 source3/winbindd/winbindd_user.c if (!fillup_pw_field(lp_template_shell(), s->username,
username 424 source3/winbindd/winbindd_user.c fstring domname, username;
username 430 source3/winbindd/winbindd_user.c domuser = state->request.data.username;
username 431 source3/winbindd/winbindd_user.c dusize = sizeof(state->request.data.username);
username 452 source3/winbindd/winbindd_user.c if (!parse_domain_user(mapped_user, domname, username)) {
username 476 source3/winbindd/winbindd_user.c domname, username));
username 483 source3/winbindd/winbindd_user.c winbindd_lookupname_async(state->mem_ctx, domname, username,
username 493 source3/winbindd/winbindd_user.c fstring domname, username;
username 494 source3/winbindd/winbindd_user.c char *domuser = state->request.data.username;
username 508 source3/winbindd/winbindd_user.c if (parse_domain_user(domuser, domname, username)) {
username 128 source4/auth/credentials/credentials.c cred->username = cred->username_cb(cred);
username 134 source4/auth/credentials/credentials.c return cred->username;
username 141 source4/auth/credentials/credentials.c cred->username = talloc_strdup(cred, val);
username 588 source4/auth/credentials/credentials.c const char *username;
username 594 source4/auth/credentials/credentials.c cli_credentials_get_ntlm_username_domain(credentials, mem_ctx, &username, &domain);
username 597 source4/auth/credentials/credentials.c domain, username);
username 600 source4/auth/credentials/credentials.c username);
username 723 source4/auth/credentials/credentials.c const char *username;
username 730 source4/auth/credentials/credentials.c username = cli_credentials_get_username(cred);
username 735 source4/auth/credentials/credentials.c if (!username[0]) {
username 73 source4/auth/credentials/credentials.h const char *username;
username 148 source4/auth/credentials/credentials.h const char **username,
username 31 source4/auth/credentials/credentials_ntlm.c const char **username,
username 36 source4/auth/credentials/credentials_ntlm.c *username = cli_credentials_get_principal(cred, mem_ctx);
username 39 source4/auth/credentials/credentials_ntlm.c *username = cli_credentials_get_username(cred);
username 58 source4/auth/gensec/cyrus_sasl.c const char *username = cli_credentials_get_username(gensec_get_credentials(gensec_security));
username 63 source4/auth/gensec/cyrus_sasl.c *result = username;
username 101 source4/auth/ntlm/auth_unix.c static NTSTATUS talloc_getpwnam(TALLOC_CTX *ctx, const char *username, struct passwd **pws)
username 111 source4/auth/ntlm/auth_unix.c from = getpwnam(username);
username 502 source4/auth/ntlm/auth_unix.c static NTSTATUS password_check(const char *username, const char *password,
username 508 source4/auth/ntlm/auth_unix.c if (afs_auth(username, password))
username 513 source4/auth/ntlm/auth_unix.c if (dfs_auth(username, password))
username 599 source4/auth/ntlm/auth_unix.c char *username;
username 610 source4/auth/ntlm/auth_unix.c username = talloc_strdup(ctx, user_info->mapped.account_name);
username 613 source4/auth/ntlm/auth_unix.c nt_status = talloc_getpwnam(ctx, username, &pws);
username 678 source4/auth/ntlm/auth_unix.c DEBUG(5,("Checking password for user %s in OSF1_ENH_SEC\n", username));
username 679 source4/auth/ntlm/auth_unix.c mypasswd = getprpwnam(username);
username 681 source4/auth/ntlm/auth_unix.c username = talloc_strdup(ctx, mypasswd->ufld.fd_name);
username 682 source4/auth/ntlm/auth_unix.c NT_STATUS_HAVE_NO_MEMORY(username);
username 686 source4/auth/ntlm/auth_unix.c DEBUG(5,("OSF1_ENH_SEC: No entry for user %s in protected database !\n", username));
username 710 source4/auth/ntlm/auth_unix.c DEBUG(2, ("Disallowing %s with null password\n", username));
username 714 source4/auth/ntlm/auth_unix.c DEBUG(3, ("Allowing access to %s with null password\n", username));
username 721 source4/auth/ntlm/auth_unix.c nt_status = password_check(username, password, crypted, salt);
username 750 source4/auth/ntlm/auth_unix.c nt_status = password_check(username, pwcopy, crypted, salt);
username 225 source4/auth/ntlm/ntlm_check.c const char *username,
username 231 source4/auth/ntlm/ntlm_check.c username));
username 239 source4/auth/ntlm/ntlm_check.c username));
username 246 source4/auth/ntlm/ntlm_check.c username));
username 249 source4/auth/ntlm/ntlm_check.c if (strchr_m(username, '@')) {
username 257 source4/auth/ntlm/ntlm_check.c username));
username 261 source4/auth/ntlm/ntlm_check.c if (strchr_m(username, '@')) {
username 291 source4/auth/ntlm/ntlm_check.c const char *username,
username 304 source4/auth/ntlm/ntlm_check.c username));
username 320 source4/auth/ntlm/ntlm_check.c username));
username 339 source4/auth/ntlm/ntlm_check.c username,
username 345 source4/auth/ntlm/ntlm_check.c (unsigned long)nt_response->length, username));
username 417 source4/auth/ntlm/ntlm_check.c username));
username 422 source4/auth/ntlm/ntlm_check.c username));
username 429 source4/auth/ntlm/ntlm_check.c username));
username 435 source4/auth/ntlm/ntlm_check.c (unsigned long)nt_response->length, username));
username 441 source4/auth/ntlm/ntlm_check.c username));
username 444 source4/auth/ntlm/ntlm_check.c username));
username 445 source4/auth/ntlm/ntlm_check.c } else if (strchr_m(username, '@')) {
username 447 source4/auth/ntlm/ntlm_check.c username));
username 470 source4/auth/ntlm/ntlm_check.c DEBUG(4,("ntlm_password_check: LM password check failed for user, no NT password %s\n",username));
username 592 source4/auth/ntlm/ntlm_check.c DEBUG(3,("ntlm_password_check: LM password, NT MD4 password in LM field and LMv2 failed for user %s\n",username));
username 594 source4/auth/ntlm/ntlm_check.c DEBUG(3,("ntlm_password_check: LM password and LMv2 failed for user %s, and NT MD4 password in LM field not permitted\n",username));
username 598 source4/auth/ntlm/ntlm_check.c if (strchr_m(username, '@')) {
username 42 source4/auth/ntlm/ntlm_check.h const char *username,
username 70 source4/auth/ntlm/ntlm_check.h const char *username,
username 46 source4/client/mount.cifs.c char *username = NULL;
username 50 source4/client/mount.cifs.c username = password->pw_name;
username 52 source4/client/mount.cifs.c return username;
username 33 source4/client/smbmount.c static pstring username;
username 214 source4/client/smbmount.c if (!smbcli_session_setup(c, username,
username 220 source4/client/smbmount.c if (password[0] || !username[0] ||
username 658 source4/client/smbmount.c pstrcpy(username, val);
username 769 source4/client/smbmount.c pstrcpy(username,opteq+1);
username 770 source4/client/smbmount.c if ((lp=strchr_m(username,'%'))) {
username 776 source4/client/smbmount.c if ((lp=strchr_m(username,'/'))) {
username 887 source4/client/smbmount.c pstrcpy(username,getenv("USER"));
username 889 source4/client/smbmount.c if ((p=strchr_m(username,'%'))) {
username 895 source4/client/smbmount.c strupper(username);
username 908 source4/client/smbmount.c if (*username == 0 && getenv("LOGNAME")) {
username 909 source4/client/smbmount.c pstrcpy(username,getenv("LOGNAME"));
username 594 source4/client/tree.c char *workgroup, int wgmaxlen, char *username, int unmaxlen,
username 598 source4/client/tree.c strncpy(username, "test", unmaxlen);
username 70 source4/dsdb/samdb/ldb_modules/proxy.c const char *olddn, *newdn, *url, *username, *password, *oldstr, *newstr;
username 92 source4/dsdb/samdb/ldb_modules/proxy.c username = ldb_msg_find_attr_as_string(res->msgs[0], "username", NULL);
username 97 source4/dsdb/samdb/ldb_modules/proxy.c if (url == NULL || olddn == NULL || newdn == NULL || username == NULL || password == NULL) {
username 139 source4/dsdb/samdb/ldb_modules/proxy.c cli_credentials_set_username(creds, username, CRED_SPECIFIED);
username 166 source4/heimdal/kdc/digest.c const char *username,
username 175 source4/heimdal/kdc/digest.c ret = krb5_parse_name(context, username, &clientprincipal);
username 634 source4/heimdal/kdc/digest.c ireq.u.digestRequest.username,
username 661 source4/heimdal/kdc/digest.c ireq.u.digestRequest.username);
username 686 source4/heimdal/kdc/digest.c ireq.u.digestRequest.username,
username 692 source4/heimdal/kdc/digest.c MD5_Update(&ctx, ireq.u.digestRequest.username,
username 693 source4/heimdal/kdc/digest.c strlen(ireq.u.digestRequest.username));
username 779 source4/heimdal/kdc/digest.c ireq.u.digestRequest.username);
username 787 source4/heimdal/kdc/digest.c const char *username;
username 811 source4/heimdal/kdc/digest.c username = strchr(ireq.u.digestRequest.username, '\\');
username 812 source4/heimdal/kdc/digest.c if (username == NULL)
username 813 source4/heimdal/kdc/digest.c username = ireq.u.digestRequest.username;
username 815 source4/heimdal/kdc/digest.c username++;
username 843 source4/heimdal/kdc/digest.c SHA1_Update(&ctx, username, strlen(username));
username 847 source4/heimdal/kdc/digest.c ret = krb5_parse_name(context, username, &clientprincipal);
username 857 source4/heimdal/kdc/digest.c username);
username 866 source4/heimdal/kdc/digest.c username);
username 894 source4/heimdal/kdc/digest.c ireq.u.digestRequest.username);
username 978 source4/heimdal/kdc/digest.c ireq.u.digestRequest.type, ireq.u.digestRequest.username);
username 1121 source4/heimdal/kdc/digest.c ireq.u.ntlmRequest.username,
username 1131 source4/heimdal/kdc/digest.c ireq.u.ntlmRequest.username);
username 1207 source4/heimdal/kdc/digest.c ireq.u.ntlmRequest.username,
username 1334 source4/heimdal/kdc/digest.c version, ireq.u.ntlmRequest.username);
username 113 source4/heimdal/lib/ntlm/heimntlm.h char *username; /**< */
username 690 source4/heimdal/lib/ntlm/ntlm.c if (data->username)
username 691 source4/heimdal/lib/ntlm/ntlm.c free(data->username);
username 711 source4/heimdal/lib/ntlm/ntlm.c struct sec_buffer lm, ntlm, target, username, sessionkey, ws;
username 730 source4/heimdal/lib/ntlm/ntlm.c CHECK(ret_sec_buffer(in, &username), 0);
username 745 source4/heimdal/lib/ntlm/ntlm.c CHECK(ret_string(in, ucs2, &username, &type3->username), 0);
username 774 source4/heimdal/lib/ntlm/ntlm.c struct sec_buffer lm, ntlm, target, username, sessionkey, ws;
username 783 source4/heimdal/lib/ntlm/ntlm.c memset(&username, 0, sizeof(username));
username 811 source4/heimdal/lib/ntlm/ntlm.c username.offset = target.offset + target.allocated;
username 812 source4/heimdal/lib/ntlm/ntlm.c username.length = len_string(ucs2, type3->username);
username 813 source4/heimdal/lib/ntlm/ntlm.c username.allocated = username.length;
username 815 source4/heimdal/lib/ntlm/ntlm.c ws.offset = username.offset + username.allocated;
username 835 source4/heimdal/lib/ntlm/ntlm.c CHECK(store_sec_buffer(out, &username), 0);
username 850 source4/heimdal/lib/ntlm/ntlm.c CHECK(put_string(out, ucs2, type3->username), 0);
username 1049 source4/heimdal/lib/ntlm/ntlm.c const char *username,
username 1061 source4/heimdal/lib/ntlm/ntlm.c ascii2ucs2le(username, 1, &buf);
username 1118 source4/heimdal/lib/ntlm/ntlm.c const char *username,
username 1141 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_ntlmv2_key(key, len, username, target, ntlmv2);
username 1221 source4/heimdal/lib/ntlm/ntlm.c const char *username,
username 1251 source4/heimdal/lib/ntlm/ntlm.c heim_ntlm_ntlmv2_key(key, len, username, target, ntlmv2);
username 30 source4/libcli/climessage.c bool smbcli_message_start(struct smbcli_tree *tree, const char *host, const char *username,
username 36 source4/libcli/climessage.c smbcli_req_append_string(req, username, STR_TERMINATE);
username 53 source4/libnet/libnet_samdump.c const char *username = user->account_name.string;
username 64 source4/libnet/libnet_samdump.c printf("%s:%d:%s:%s:%s:LCT-%08X\n", username,
username 38 source4/libnet/libnet_samdump_keytab.c const char *username = user->account_name.string;
username 52 source4/libnet/libnet_samdump_keytab.c cli_credentials_set_username(credentials, username, CRED_SPECIFIED);
username 51 source4/libnet/libnet_samsync.c const char *username = user->account_name.string;
username 77 source4/libnet/libnet_samsync.c *error_string = talloc_asprintf(mem_ctx, "Failed to parse Sensitive Data for %s:", username);
username 87 source4/libnet/libnet_user.c s->user_add.in.username = r->in.user_name;
username 122 source4/libnet/libnet_user.c s->user_add.in.username = s->r.in.user_name;
username 256 source4/libnet/libnet_user.c s->user_del.in.username = r->in.user_name;
username 291 source4/libnet/libnet_user.c s->user_del.in.username = s->r.in.user_name;
username 422 source4/libnet/libnet_user.c s->user_info.in.username = r->in.user_name;
username 455 source4/libnet/libnet_user.c s->user_info.in.username = s->r.in.user_name;
username 482 source4/libnet/libnet_user.c s->user_mod.in.username = s->r.in.user_name;
username 1129 source4/libnet/libnet_user.c s->users[i].username = talloc_strdup(c, entry->name.string);
username 1130 source4/libnet/libnet_user.c if (composite_nomem(s->users[i].username, c)) return;
username 151 source4/libnet/libnet_user.h const char *username;
username 304 source4/libnet/userinfo.c s->lookup.in.names[0].string = talloc_strdup(s, io->in.username);
username 30 source4/libnet/userinfo.h const char *username;
username 126 source4/libnet/userman.c s->createuser.in.account_name->string = talloc_strdup(c, io->in.username);
username 392 source4/libnet/userman.c s->lookupname.in.names->string = io->in.username;
username 840 source4/libnet/userman.c s->lookupname.in.names->string = io->in.username;
username 30 source4/libnet/userman.h const char *username;
username 41 source4/libnet/userman.h const char *username;
username 68 source4/libnet/userman.h const char *username;
username 250 source4/rpc_server/lsa/lsa_lookup.c const char *username;
username 261 source4/rpc_server/lsa/lsa_lookup.c username = p + 1;
username 263 source4/rpc_server/lsa/lsa_lookup.c status = crack_name_to_nt4_name(mem_ctx, ev_ctx, lp_ctx, DRSUAPI_DS_NAME_FORMAT_USER_PRINCIPAL, name, &domain, &username);
username 270 source4/rpc_server/lsa/lsa_lookup.c username = name;
username 275 source4/rpc_server/lsa/lsa_lookup.c status = lookup_well_known_names(mem_ctx, NULL, username, authority_name, sid, rtype);
username 280 source4/rpc_server/lsa/lsa_lookup.c if (strcasecmp_m(username, NAME_NT_AUTHORITY) == 0) {
username 286 source4/rpc_server/lsa/lsa_lookup.c if (strcasecmp_m(username, NAME_BUILTIN) == 0) {
username 292 source4/rpc_server/lsa/lsa_lookup.c if (strcasecmp_m(username, state->domain_dns) == 0) {
username 298 source4/rpc_server/lsa/lsa_lookup.c if (strcasecmp_m(username, state->domain_name) == 0) {
username 306 source4/rpc_server/lsa/lsa_lookup.c name = talloc_asprintf(mem_ctx, "%s\\%s", NAME_NT_AUTHORITY, username);
username 316 source4/rpc_server/lsa/lsa_lookup.c name = talloc_asprintf(mem_ctx, "%s\\%s", NAME_BUILTIN, username);
username 326 source4/rpc_server/lsa/lsa_lookup.c name = talloc_asprintf(mem_ctx, "%s\\%s", state->domain_name, username);
username 337 source4/rpc_server/lsa/lsa_lookup.c if (!*username) {
username 345 source4/rpc_server/lsa/lsa_lookup.c return lookup_well_known_names(mem_ctx, domain, username, authority_name,
username 371 source4/rpc_server/lsa/lsa_lookup.c if (!*username) {
username 379 source4/rpc_server/lsa/lsa_lookup.c ldb_binary_encode_string(mem_ctx, username));
username 223 source4/torture/gentest.c servers[i].credentials->username, j);
username 34 source4/torture/libnet/libnet_user.c struct policy_handle *domain_handle, const char *username)
username 45 source4/torture/libnet/libnet_user.c names[0].string = username;
username 53 source4/torture/libnet/libnet_user.c printf("user account lookup '%s'\n", username);
username 187 source4/torture/libnet/libnet_user.c struct lsa_String username;
username 192 source4/torture/libnet/libnet_user.c username.string = user;
username 195 source4/torture/libnet/libnet_user.c r1.in.account_name = &username;
username 200 source4/torture/libnet/libnet_user.c printf("creating user '%s'\n", username.string);
username 227 source4/torture/libnet/libnet_user.c printf("closing user '%s'\n", username.string);
username 713 source4/torture/libnet/libnet_user.c req.out.users[i].username, req.out.users[i].sid);
username 59 source4/torture/libnet/userinfo.c user.in.username = TEST_USERNAME;
username 108 source4/torture/libnet/userinfo.c user.in.username = TEST_USERNAME;
username 40 source4/torture/libnet/userman.c user.in.username = name;
username 55 source4/torture/libnet/userman.c struct policy_handle *handle, const char* username)
username 62 source4/torture/libnet/userman.c user.in.username = username;
username 85 source4/torture/libnet/userman.c struct libnet_rpc_usermod *mod, char **username)
username 103 source4/torture/libnet/userman.c mod->in.username = talloc_strdup(mem_ctx, *username);
username 125 source4/torture/libnet/userman.c *username = talloc_strdup(mem_ctx, mod->in.change.account_name);
username 216 source4/torture/libnet/userman.c struct policy_handle *handle, const char *username)
username 222 source4/torture/libnet/userman.c user.in.username = username;
username 271 source4/torture/libnet/userman.c const char *username)
username 280 source4/torture/libnet/userman.c info.in.username = username;
username 134 source4/torture/libnet/utils.c struct lsa_String username;
username 138 source4/torture/libnet/utils.c username.string = name;
username 141 source4/torture/libnet/utils.c r.in.account_name = &username;
username 25 source4/torture/locktest2.c static fstring username;
username 176 source4/torture/locktest2.c username, lp_workgroup(), password, ev,
username 519 source4/torture/locktest2.c username = talloc_strdup(mem_ctx, getenv("USER"));
username 527 source4/torture/locktest2.c username = talloc_strdup(mem_ctx, optarg);
username 528 source4/torture/locktest2.c p = strchr_m(username,'%');
username 354 source4/torture/rpc/samba3rpc.c const char *username,
username 472 source4/torture/rpc/samba3rpc.c user_name.string = username;
username 537 source4/torture/rpc/samba3rpc.c const char *username, const char *password,
username 555 source4/torture/rpc/samba3rpc.c username, domain_name, &samr_pipe, &wks_handle,
username 652 source4/torture/rpc/samba3rpc.c const char *username)
username 669 source4/torture/rpc/samba3rpc.c username, &dom_name, &samr_pipe,
username 1659 source4/torture/rpc/samlogon.c const char *username;
username 1670 source4/torture/rpc/samlogon.c .username = cli_credentials_get_username(cmdline_credentials),
username 1679 source4/torture/rpc/samlogon.c .username = cli_credentials_get_username(cmdline_credentials),
username 1688 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx,
username 1701 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx,
username 1714 source4/torture/rpc/samlogon.c .username = cli_credentials_get_username(machine_credentials),
username 1723 source4/torture/rpc/samlogon.c .username = cli_credentials_get_username(machine_credentials),
username 1732 source4/torture/rpc/samlogon.c .username = cli_credentials_get_username(machine_credentials),
username 1741 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx,
username 1754 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx,
username 1767 source4/torture/rpc/samlogon.c .username = TEST_USER_NAME,
username 1776 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx,
username 1788 source4/torture/rpc/samlogon.c .username = talloc_asprintf(mem_ctx,
username 1801 source4/torture/rpc/samlogon.c .username = TEST_USER_NAME,
username 1811 source4/torture/rpc/samlogon.c .username = TEST_USER_NAME_WRONG_WKS,
username 1826 source4/torture/rpc/samlogon.c usercreds[ci].username,
username 1837 source4/torture/rpc/samlogon.c usercreds[ci].username,
username 1859 source4/torture/rpc/samlogon.c usercreds[0].username,
username 1870 source4/torture/rpc/samlogon.c usercreds[0].username,
username 438 source4/torture/rpc/samsync.c const char *username = user->account_name.string;
username 593 source4/torture/rpc/samsync.c printf("Failed to parse Sensitive Data for %s:\n", username);
username 603 source4/torture/rpc/samsync.c DEBUG(100,("ACCOUNT [%s\\%-25s] NTHASH %s\n", samsync_state->domain_name[0], username, data_blob_hex_string(mem_ctx, &nt_hash_blob)));
username 607 source4/torture/rpc/samsync.c DEBUG(100,("ACCOUNT [%s\\%-25s] LMHASH %s\n", samsync_state->domain_name[0], username, data_blob_hex_string(mem_ctx, &lm_hash_blob)));
username 612 source4/torture/rpc/samsync.c username,
username 719 source4/torture/rpc/samsync.c domain, username, nt_errstr(nt_status));
username 1162 source4/torture/rpc/samsync.c const char *domain, *username;
username 1298 source4/torture/rpc/samsync.c username = talloc_asprintf(trustdom_ctx, "%s$", domain);
username 1307 source4/torture/rpc/samsync.c printf("Checking password for %s\\%s\n", t->name, username);
username 1310 source4/torture/rpc/samsync.c username,
username 1331 source4/torture/rpc/samsync.c username,
username 109 source4/torture/rpc/testjoin.c const char *username,
username 204 source4/torture/rpc/testjoin.c printf("Creating account %s\n", username);
username 207 source4/torture/rpc/testjoin.c name.string = username;
username 185 source4/utils/ntlm_auth.c const char *username,
username 222 source4/utils/ntlm_auth.c username,
username 223 source4/utils/ntlm_auth.c username,
username 232 source4/utils/ntlm_auth.c username);
username 236 source4/utils/ntlm_auth.c domain, username, workstation,
username 742 source4/utils/ntlm_auth.c static char *username;
username 749 source4/utils/ntlm_auth.c if (!full_username && !username) {
username 754 source4/utils/ntlm_auth.c if (asprintf(&full_username, "%s%c%s", domain, *lp_winbind_separator(lp_ctx), username) == -1) {
username 774 source4/utils/ntlm_auth.c if (full_username && !username) {
username 775 source4/utils/ntlm_auth.c SAFE_FREE(username);
username 777 source4/utils/ntlm_auth.c if (!parse_ntlm_auth_domain_user(full_username, &username,
username 797 source4/utils/ntlm_auth.c username,
username 847 source4/utils/ntlm_auth.c SAFE_FREE(username);
username 915 source4/utils/ntlm_auth.c username = smb_xstrdup(parameter);
username 73 source4/winbind/wb_cmd_getpwent.c char *username = talloc_strdup(state,
username 74 source4/winbind/wb_cmd_getpwent.c pwent->user_list->out.users[idx].username);
username 77 source4/winbind/wb_cmd_getpwent.c ctx = wb_cmd_getpwnam_send(state, service, username);
username 145 source4/winbind/wb_cmd_list_users.c DEBUG(5, ("Appending user '%s'\n", user_list->out.users[i].username));
username 147 source4/winbind/wb_cmd_list_users.c user_list->out.users[i].username);
username 788 source4/winbind/wb_samba3_cmd.c s3call->request.data.username);