client 627 librpc/gen_ndr/cli_srvsvc.c const char *client /* [in] [unique,charset(UTF16)] */,
client 640 librpc/gen_ndr/cli_srvsvc.c r.in.client = client;
client 686 librpc/gen_ndr/cli_srvsvc.c const char *client /* [in] [unique,charset(UTF16)] */,
client 695 librpc/gen_ndr/cli_srvsvc.c r.in.client = client;
client 95 librpc/gen_ndr/cli_srvsvc.h const char *client /* [in] [unique,charset(UTF16)] */,
client 105 librpc/gen_ndr/cli_srvsvc.h const char *client /* [in] [unique,charset(UTF16)] */,
client 17896 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client 17904 librpc/gen_ndr/ndr_spoolss.c if (r->client) {
client 17905 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 17907 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 17908 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client 17931 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_ALLOC(ndr, r->client);
client 17933 librpc/gen_ndr/ndr_spoolss.c r->client = NULL;
client 17947 librpc/gen_ndr/ndr_spoolss.c if (r->client) {
client 17949 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client 17950 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client 17951 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client 17952 librpc/gen_ndr/ndr_spoolss.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client 17953 librpc/gen_ndr/ndr_spoolss.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client 17955 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client 17956 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client 17980 librpc/gen_ndr/ndr_spoolss.c ndr_print_ptr(ndr, "client", r->client);
client 17982 librpc/gen_ndr/ndr_spoolss.c if (r->client) {
client 17983 librpc/gen_ndr/ndr_spoolss.c ndr_print_string(ndr, "client", r->client);
client 18036 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client 18045 librpc/gen_ndr/ndr_spoolss.c if (r->client) {
client 18046 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 18048 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 18049 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client 18074 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_ALLOC(ndr, r->client);
client 18076 librpc/gen_ndr/ndr_spoolss.c r->client = NULL;
client 18091 librpc/gen_ndr/ndr_spoolss.c if (r->client) {
client 18093 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client 18094 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client 18095 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client 18096 librpc/gen_ndr/ndr_spoolss.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client 18097 librpc/gen_ndr/ndr_spoolss.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client 18099 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client 18100 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client 18126 librpc/gen_ndr/ndr_spoolss.c ndr_print_ptr(ndr, "client", r->client);
client 18128 librpc/gen_ndr/ndr_spoolss.c if (r->client) {
client 18129 librpc/gen_ndr/ndr_spoolss.c ndr_print_string(ndr, "client", r->client);
client 2397 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client 2400 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 2401 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 2403 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 2404 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client 2418 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->client);
client 2420 librpc/gen_ndr/ndr_srvsvc.c r->client = NULL;
client 2424 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 2426 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client 2427 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client 2428 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client 2429 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client 2430 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client 2432 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client 2433 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client 2444 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->client);
client 2446 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 2447 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->client);
client 2543 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client 2551 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 2552 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 2554 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 2555 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client 2577 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->client);
client 2579 librpc/gen_ndr/ndr_srvsvc.c r->client = NULL;
client 2593 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 2595 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client 2596 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client 2597 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client 2598 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client 2599 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client 2601 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client 2602 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client 2625 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->client);
client 2627 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 2628 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->client);
client 2734 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client 2743 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 2744 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 2746 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 2747 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client 2777 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->client);
client 2779 librpc/gen_ndr/ndr_srvsvc.c r->client = NULL;
client 2799 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 2801 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client 2802 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client 2803 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client 2804 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client 2805 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client 2807 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client 2808 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client 2843 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->client);
client 2845 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 2846 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->client);
client 2958 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client 2964 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 2965 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 2967 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 2968 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client 2990 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->client);
client 2992 librpc/gen_ndr/ndr_srvsvc.c r->client = NULL;
client 3004 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 3006 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client 3007 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client 3008 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client 3009 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client 3010 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client 3012 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client 3013 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client 3036 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->client);
client 3038 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 3039 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->client);
client 3143 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->client));
client 3153 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 3154 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 3156 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->client, CH_UTF16)));
client 3157 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->client, ndr_charset_length(r->client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client 3195 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->client);
client 3197 librpc/gen_ndr/ndr_srvsvc.c r->client = NULL;
client 3223 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 3225 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->client, 0);
client 3226 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->client));
client 3227 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->client));
client 3228 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->client) > ndr_get_array_size(ndr, &r->client)) {
client 3229 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->client), ndr_get_array_length(ndr, &r->client));
client 3231 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t)));
client 3232 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->client, ndr_get_array_length(ndr, &r->client), sizeof(uint16_t), CH_UTF16));
client 3279 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->client);
client 3281 librpc/gen_ndr/ndr_srvsvc.c if (r->client) {
client 3282 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->client);
client 14855 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.client));
client 14856 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) {
client 14857 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16)));
client 14859 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16)));
client 14860 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.client, ndr_charset_length(r->in.client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client 14932 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.client);
client 14934 librpc/gen_ndr/ndr_srvsvc.c r->in.client = NULL;
client 14936 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) {
client 14938 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.client, 0);
client 14939 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.client));
client 14940 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.client));
client 14941 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.client) > ndr_get_array_size(ndr, &r->in.client)) {
client 14942 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.client), ndr_get_array_length(ndr, &r->in.client));
client 14944 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t)));
client 14945 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.client, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t), CH_UTF16));
client 15039 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->in.client);
client 15041 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) {
client 15042 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->in.client);
client 15097 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.client));
client 15098 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) {
client 15099 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16)));
client 15101 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.client, CH_UTF16)));
client 15102 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.client, ndr_charset_length(r->in.client, CH_UTF16), sizeof(uint16_t), CH_UTF16));
client 15147 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.client);
client 15149 librpc/gen_ndr/ndr_srvsvc.c r->in.client = NULL;
client 15151 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) {
client 15153 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.client, 0);
client 15154 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.client));
client 15155 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.client));
client 15156 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.client) > ndr_get_array_size(ndr, &r->in.client)) {
client 15157 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.client), ndr_get_array_length(ndr, &r->in.client));
client 15159 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t)));
client 15160 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.client, ndr_get_array_length(ndr, &r->in.client), sizeof(uint16_t), CH_UTF16));
client 15204 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "client", r->in.client);
client 15206 librpc/gen_ndr/ndr_srvsvc.c if (r->in.client) {
client 15207 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "client", r->in.client);
client 1514 librpc/gen_ndr/spoolss.h const char *client;/* [unique,charset(UTF16)] */
client 1530 librpc/gen_ndr/spoolss.h const char *client;/* [unique,charset(UTF16)] */
client 161 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */
client 170 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */
client 184 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */
client 199 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */
client 211 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */
client 1245 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */
client 1265 librpc/gen_ndr/srvsvc.h const char *client;/* [unique,charset(UTF16)] */
client 61 source3/include/ctdbd_conn.h const struct sockaddr_storage *client,
client 452 source3/include/nt_printing.h } client;
client 1386 source3/include/proto.h bool send_keepalive(int client);
client 180 source3/lib/access.c const char **client = (const char **)item;
client 187 source3/lib/access.c if (string_match(tok, client[ADDR_INDEX])) {
client 191 source3/lib/access.c if (strnequal(client[ADDR_INDEX],"::ffff:",7) &&
client 199 source3/lib/access.c if (string_match(tok, (client[ADDR_INDEX])+7)) {
client 204 source3/lib/access.c if (client[NAME_INDEX][0] != 0) {
client 205 source3/lib/access.c if (string_match(tok, client[NAME_INDEX])) {
client 264 source3/lib/access.c const char *client[2];
client 266 source3/lib/access.c client[NAME_INDEX] = cname;
client 267 source3/lib/access.c client[ADDR_INDEX] = caddr;
client 276 source3/lib/access.c list_match(deny_list,client,client_match) &&
client 278 source3/lib/access.c !list_match(allow_list,client, client_match))) {
client 293 source3/lib/access.c return(list_match(allow_list,client,client_match));
client 299 source3/lib/access.c return(!list_match(deny_list,client,client_match));
client 304 source3/lib/access.c if (list_match(allow_list,(const char *)client,client_match)) {
client 310 source3/lib/access.c if (list_match(deny_list,(const char *)client,client_match)) {
client 1232 source3/lib/ctdbd_conn.c struct sockaddr_storage client;
client 1240 source3/lib/ctdbd_conn.c smbd_ctdb_canonicalize_ip(_client, &client);
client 1243 source3/lib/ctdbd_conn.c switch (client.ss_family) {
client 1246 source3/lib/ctdbd_conn.c p4.src = *(struct sockaddr_in *)&client;
client 1253 source3/lib/ctdbd_conn.c p.src.ip6 = *(struct sockaddr_in6 *)&client;
client 751 source3/lib/util_sock.c bool send_keepalive(int client)
client 758 source3/lib/util_sock.c return(write_data(client,(char *)buf,4) == 4);
client 648 source3/libads/krb5_setpw.c ret = krb5_cc_get_principal(context, ccache, &creds.client);
client 663 source3/libads/krb5_setpw.c krb5_free_principal(context, creds.client);
client 679 source3/libads/krb5_setpw.c krb5_free_principal(context, creds.client);
client 474 source3/libsmb/clikrb5.c return tkt->enc_part2->client;
client 476 source3/libsmb/clikrb5.c return tkt->client;
client 684 source3/libsmb/clikrb5.c if ((retval = krb5_cc_get_principal(context, ccache, &creds.client))) {
client 1261 source3/libsmb/clikrb5.c krb5_principal client = NULL;
client 1291 source3/libsmb/clikrb5.c ret = smb_krb5_parse_name(context, client_string, &client);
client 1296 source3/libsmb/clikrb5.c ret = krb5_cc_get_principal(context, ccache, &client);
client 1304 source3/libsmb/clikrb5.c ret = krb5_get_renewed_creds(context, &creds, client, ccache, CONST_DISCARD(char *, service_string));
client 1315 source3/libsmb/clikrb5.c ret = krb5_copy_principal(context, client, &creds_in.client);
client 1327 source3/libsmb/clikrb5.c client_realm = krb5_princ_realm(context, creds_in.client);
client 1354 source3/libsmb/clikrb5.c ret = krb5_cc_initialize(context, ccache, client);
client 1374 source3/libsmb/clikrb5.c if (client) {
client 1375 source3/libsmb/clikrb5.c krb5_free_principal(context, client);
client 1862 source3/libsmb/clikrb5.c credsp->client, /* Client principal for the tgt [in] */
client 47 source3/rpc_client/cli_spoolss.c level1.client = talloc_asprintf(mem_ctx, "\\\\%s", global_myname());
client 48 source3/rpc_client/cli_spoolss.c W_ERROR_HAVE_NO_MEMORY(level1.client);
client 164 source3/rpc_client/cli_spoolss.c level1.client = talloc_asprintf(mem_ctx, "\\\\%s", global_myname());
client 165 source3/rpc_client/cli_spoolss.c W_ERROR_HAVE_NO_MEMORY(level1.client);
client 779 source3/rpc_server/srv_srvsvc_nt.c ctr0->array[num_entries].client =
client 877 source3/rpc_server/srv_srvsvc_nt.c ctr1->array[num_entries].client = session_list[resume_handle].remote_machine;
client 1253 source3/rpc_server/srv_srvsvc_nt.c machine = r->in.client;
client 687 source3/rpcclient/cmd_srvsvc.c const char *client = NULL;
client 696 source3/rpcclient/cmd_srvsvc.c client = argv[1];
client 743 source3/rpcclient/cmd_srvsvc.c client,
client 29 source3/smbd/avahi_register.c AvahiClient *client;
client 48 source3/smbd/avahi_register.c error = avahi_client_errno(state->client);
client 118 source3/smbd/avahi_register.c state->client = avahi_client_new(state->poll, AVAHI_CLIENT_NO_FAIL,
client 121 source3/smbd/avahi_register.c if (state->client == NULL) {
client 157 source3/smbd/avahi_register.c state->client = avahi_client_new(state->poll, AVAHI_CLIENT_NO_FAIL,
client 160 source3/smbd/avahi_register.c if (state->client == NULL) {
client 1942 source3/smbd/process.c struct sockaddr_storage *client)
client 1952 source3/smbd/process.c length = sizeof(*client);
client 1953 source3/smbd/process.c if (getpeername(server_fd, (struct sockaddr *)client, &length) != 0) {
client 249 source3/smbd/sesssetup.c char *client, *p, *domain;
client 287 source3/smbd/sesssetup.c &client, &pac_data, &ap_rep,
client 348 source3/smbd/sesssetup.c DEBUG(3,("Ticket name is [%s]\n", client));
client 350 source3/smbd/sesssetup.c p = strchr_m(client, '@');
client 367 source3/smbd/sesssetup.c netsamlogon_cache_store( client, &logon_info->info3 );
client 372 source3/smbd/sesssetup.c DEBUG(3,("Ticket for foreign realm %s@%s\n", client, p+1));
client 424 source3/smbd/sesssetup.c fstr_sprintf(user, "%s%c%s", domain, *lp_winbind_separator(), client);
client 485 source3/smbd/sesssetup.c ret = make_server_info_info3(mem_ctx, client, domain,
client 555 source3/smbd/sesssetup.c client);
client 862 source3/torture/torture.c static bool run_netbench(int client)
client 874 source3/torture/torture.c nbio_id = client;
client 880 source3/torture/torture.c slprintf(cname,sizeof(cname)-1, "client%d", client);
client 67 source4/auth/auth.h } client, mapped;
client 157 source4/auth/gensec/schannel_state.c client_state.data = creds->client.data;
client 158 source4/auth/gensec/schannel_state.c client_state.length = sizeof(creds->client.data);
client 281 source4/auth/gensec/schannel_state.c memcpy((*creds)->client.data, val->data, 8);
client 264 source4/auth/ntlm/auth.c user_info->client.domain_name, user_info->client.account_name, user_info->workstation_name));
client 38 source4/auth/ntlm/auth_anonymous.c if (user_info->client.account_name && *user_info->client.account_name) {
client 58 source4/auth/ntlm/auth_developer.c user = user_info->client.account_name;
client 205 source4/auth/ntlm/auth_sam.c user_info->client.account_name,
client 206 source4/auth/ntlm/auth_sam.c user_info->client.domain_name,
client 127 source4/auth/ntlm/auth_server.c cli_credentials_set_username(creds, user_info->client.account_name, CRED_SPECIFIED);
client 128 source4/auth/ntlm/auth_server.c cli_credentials_set_domain(creds, user_info->client.domain_name, CRED_SPECIFIED);
client 177 source4/auth/ntlm/auth_server.c server_info->account_name = talloc_strdup(server_info, user_info->client.account_name);
client 180 source4/auth/ntlm/auth_server.c server_info->domain_name = talloc_strdup(server_info, user_info->client.domain_name);
client 69 source4/auth/ntlm/auth_simple.c user_info->client.account_name = nt4_username;
client 71 source4/auth/ntlm/auth_simple.c user_info->client.domain_name = nt4_domain;
client 55 source4/auth/ntlm/auth_util.c user_info->client.domain_name, user_info->client.account_name, user_info->workstation_name));
client 57 source4/auth/ntlm/auth_util.c account_name = talloc_strdup(mem_ctx, user_info->client.account_name);
client 67 source4/auth/ntlm/auth_util.c if (user_info->client.domain_name && *user_info->client.domain_name) {
client 68 source4/auth/ntlm/auth_util.c domain = user_info->client.domain_name;
client 69 source4/auth/ntlm/auth_util.c } else if (strchr_m(user_info->client.account_name, '@')) {
client 152 source4/auth/ntlm/auth_util.c user_info_in->client.account_name,
client 153 source4/auth/ntlm/auth_util.c user_info_in->client.domain_name,
client 101 source4/auth/ntlm/auth_winbind.c user_info->client.account_name, sizeof(fstring));
client 103 source4/auth/ntlm/auth_winbind.c user_info->client.domain_name, sizeof(fstring));
client 133 source4/auth/ntlm/auth_winbind.c user_info->client.account_name,
client 140 source4/auth/ntlm/auth_winbind.c user_info->client.domain_name, user_info->client.account_name));
client 145 source4/auth/ntlm/auth_winbind.c user_info->client.domain_name, user_info->client.account_name));
client 178 source4/auth/ntlm/auth_winbind.c user_info->client.domain_name, user_info->client.account_name));
client 227 source4/auth/ntlm/auth_winbind.c identity_info->domain_name.string = user_info->client.domain_name;
client 231 source4/auth/ntlm/auth_winbind.c identity_info->account_name.string = user_info->client.account_name;
client 242 source4/auth/ntlm/auth_winbind.c user_info->client.account_name,
client 673 source4/auth/ntlmssp/ntlmssp_server.c user_info->client.account_name = gensec_ntlmssp_state->user;
client 674 source4/auth/ntlmssp/ntlmssp_server.c user_info->client.domain_name = gensec_ntlmssp_state->domain;
client 91 source4/heimdal/kdc/524.c krb5_principal client;
client 95 source4/heimdal/kdc/524.c ret = _krb5_principalname2krb5_principal(context, &client,
client 102 source4/heimdal/kdc/524.c ret = krb5_unparse_name(context, client, &cpn);
client 104 source4/heimdal/kdc/524.c krb5_free_principal(context, client);
client 111 source4/heimdal/kdc/524.c krb5_free_principal(context, client);
client 84 source4/heimdal/kdc/digest.c hdb_entry_ex *client)
client 89 source4/heimdal/kdc/digest.c client->entry.principal));
client 104 source4/heimdal/kdc/digest.c hdb_entry_ex *client,
client 116 source4/heimdal/kdc/digest.c p = client->entry.principal;
client 221 source4/heimdal/kdc/digest.c hdb_entry_ex *client = NULL;
client 316 source4/heimdal/kdc/digest.c HDB_F_GET_CLIENT, NULL, &client);
client 321 source4/heimdal/kdc/digest.c if (client->entry.flags.allow_digest == 0) {
client 1022 source4/heimdal/kdc/digest.c get_ntlm_targetname(context, client);
client 1052 source4/heimdal/kdc/digest.c client,
client 1195 source4/heimdal/kdc/digest.c targetname = get_ntlm_targetname(context, client);
client 1443 source4/heimdal/kdc/digest.c if (client)
client 1444 source4/heimdal/kdc/digest.c _kdc_free_ent (context, client);
client 138 source4/heimdal/kdc/kerberos4.c hdb_entry_ex *client = NULL, *server = NULL;
client 197 source4/heimdal/kdc/kerberos4.c HDB_F_GET_CLIENT, &client);
client 216 source4/heimdal/kdc/kerberos4.c client, client_name,
client 227 source4/heimdal/kdc/kerberos4.c client->entry.flags.allow_kerberos4 == 0)
client 243 source4/heimdal/kdc/kerberos4.c || client->entry.flags.require_preauth
client 254 source4/heimdal/kdc/kerberos4.c ret = _kdc_get_des_key(context, client, FALSE, FALSE, &ckey);
client 271 source4/heimdal/kdc/kerberos4.c if(client->entry.max_life)
client 272 source4/heimdal/kdc/kerberos4.c max_life = min(max_life, *client->entry.max_life);
client 332 source4/heimdal/kdc/kerberos4.c client->entry.pw_end ? *client->entry.pw_end : 0,
client 333 source4/heimdal/kdc/kerberos4.c client->entry.kvno % 256,
client 468 source4/heimdal/kdc/kerberos4.c HDB_F_GET_CLIENT, &client);
client 478 source4/heimdal/kdc/kerberos4.c if (client == NULL && strcmp(ad.prealm, config->v4_realm) == 0) {
client 501 source4/heimdal/kdc/kerberos4.c client, client_name,
client 523 source4/heimdal/kdc/kerberos4.c if(client && client->entry.max_life)
client 524 source4/heimdal/kdc/kerberos4.c max_end = min(max_end, kdc_time + *client->entry.max_life);
client 634 source4/heimdal/kdc/kerberos4.c if(client)
client 635 source4/heimdal/kdc/kerberos4.c _kdc_free_ent(context, client);
client 464 source4/heimdal/kdc/kerberos5.c METHOD_DATA *md, hdb_entry *client,
client 475 source4/heimdal/kdc/kerberos5.c pa.len = client->keys.len;
client 483 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) {
client 485 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype)
client 488 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) {
client 497 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) {
client 506 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) {
client 509 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j])
client 512 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0)
client 520 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) {
client 626 source4/heimdal/kdc/kerberos5.c METHOD_DATA *md, hdb_entry *client,
client 636 source4/heimdal/kdc/kerberos5.c pa.len = client->keys.len;
client 644 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) {
client 646 source4/heimdal/kdc/kerberos5.c if (pa.val[j].etype == client->keys.val[i].key.keytype)
client 649 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j]) {
client 655 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) {
client 665 source4/heimdal/kdc/kerberos5.c for(i = 0; i < client->keys.len; i++) {
client 668 source4/heimdal/kdc/kerberos5.c if(client->keys.val[i].key.keytype == etypes[j])
client 671 source4/heimdal/kdc/kerberos5.c if (krb5_enctype_valid(context, client->keys.val[i].key.keytype) != 0)
client 676 source4/heimdal/kdc/kerberos5.c &client->keys.val[i])) != 0) {
client 780 source4/heimdal/kdc/kerberos5.c hdb_entry *client = &client_ex->entry;
client 783 source4/heimdal/kdc/kerberos5.c if (client->flags.invalid) {
client 789 source4/heimdal/kdc/kerberos5.c if(!client->flags.client){
client 795 source4/heimdal/kdc/kerberos5.c if (client->valid_start && *client->valid_start > kdc_time) {
client 797 source4/heimdal/kdc/kerberos5.c krb5_format_time(context, *client->valid_start,
client 805 source4/heimdal/kdc/kerberos5.c if (client->valid_end && *client->valid_end < kdc_time) {
client 807 source4/heimdal/kdc/kerberos5.c krb5_format_time(context, *client->valid_end,
client 815 source4/heimdal/kdc/kerberos5.c if (client->pw_end && *client->pw_end < kdc_time
client 818 source4/heimdal/kdc/kerberos5.c krb5_format_time(context, *client->pw_end,
client 976 source4/heimdal/kdc/kerberos5.c hdb_entry_ex *client = NULL, *server = NULL;
client 1054 source4/heimdal/kdc/kerberos5.c HDB_F_GET_CLIENT | flags, NULL, &client);
client 1072 source4/heimdal/kdc/kerberos5.c ret = _kdc_windc_client_access(context, client, req, &e_data);
client 1077 source4/heimdal/kdc/kerberos5.c client, client_name,
client 1123 source4/heimdal/kdc/kerberos5.c client,
client 1172 source4/heimdal/kdc/kerberos5.c ret = hdb_enctype2key(context, &client->entry,
client 1223 source4/heimdal/kdc/kerberos5.c if(hdb_next_enctype2key(context, &client->entry,
client 1301 source4/heimdal/kdc/kerberos5.c || client->entry.flags.require_preauth
client 1343 source4/heimdal/kdc/kerberos5.c &method_data, &client->entry,
client 1347 source4/heimdal/kdc/kerberos5.c &client->entry, b->etype.val, b->etype.len);
client 1372 source4/heimdal/kdc/kerberos5.c ret = _kdc_find_etype(context, client, b->etype.val, b->etype.len,
client 1452 source4/heimdal/kdc/kerberos5.c copy_Realm(&client->entry.principal->realm, &rep.crealm);
client 1457 source4/heimdal/kdc/kerberos5.c client->entry.principal);
client 1470 source4/heimdal/kdc/kerberos5.c if(client->entry.flags.forwardable && server->entry.flags.forwardable)
client 1478 source4/heimdal/kdc/kerberos5.c if(client->entry.flags.proxiable && server->entry.flags.proxiable)
client 1486 source4/heimdal/kdc/kerberos5.c if(client->entry.flags.postdate && server->entry.flags.postdate)
client 1526 source4/heimdal/kdc/kerberos5.c if(client->entry.max_life)
client 1527 source4/heimdal/kdc/kerberos5.c t = start + min(t - start, *client->entry.max_life);
client 1547 source4/heimdal/kdc/kerberos5.c if(client->entry.max_renew)
client 1548 source4/heimdal/kdc/kerberos5.c t = start + min(t - start, *client->entry.max_renew);
client 1588 source4/heimdal/kdc/kerberos5.c if (client->entry.pw_end
client 1590 source4/heimdal/kdc/kerberos5.c || kdc_time + config->kdc_warn_pwexpire >= *client->entry.pw_end)) {
client 1592 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_value = *client->entry.pw_end;
client 1595 source4/heimdal/kdc/kerberos5.c if (client->entry.valid_end) {
client 1597 source4/heimdal/kdc/kerberos5.c ek.last_req.val[ek.last_req.len].lr_value = *client->entry.valid_end;
client 1606 source4/heimdal/kdc/kerberos5.c if (client->entry.valid_end || client->entry.pw_end) {
client 1608 source4/heimdal/kdc/kerberos5.c if (client->entry.valid_end) {
client 1609 source4/heimdal/kdc/kerberos5.c if (client->entry.pw_end)
client 1610 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = min(*client->entry.valid_end,
client 1611 source4/heimdal/kdc/kerberos5.c *client->entry.pw_end);
client 1613 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = *client->entry.valid_end;
client 1615 source4/heimdal/kdc/kerberos5.c *ek.key_expiration = *client->entry.pw_end;
client 1643 source4/heimdal/kdc/kerberos5.c ret = _kdc_pk_mk_pa_reply(context, config, pkp, client,
client 1670 source4/heimdal/kdc/kerberos5.c canon.names.mapped_name = client->entry.principal->name;
client 1721 source4/heimdal/kdc/kerberos5.c ret = _kdc_pac_generate(context, client, &p);
client 1729 source4/heimdal/kdc/kerberos5.c client->entry.principal,
client 1765 source4/heimdal/kdc/kerberos5.c &skey->key, client->entry.kvno,
client 1805 source4/heimdal/kdc/kerberos5.c if(client)
client 1806 source4/heimdal/kdc/kerberos5.c _kdc_free_ent(context, client);
client 282 source4/heimdal/kdc/krb5tgs.c hdb_entry_ex *client,
client 335 source4/heimdal/kdc/krb5tgs.c client, server, &pac);
client 495 source4/heimdal/kdc/krb5tgs.c hdb_entry_ex *client,
client 502 source4/heimdal/kdc/krb5tgs.c ret = hdb_entry_get_ConstrainedDelegACL(&client->entry, &acl);
client 667 source4/heimdal/kdc/krb5tgs.c hdb_entry_ex *client,
client 753 source4/heimdal/kdc/krb5tgs.c if(client && client->entry.max_life)
client 754 source4/heimdal/kdc/krb5tgs.c life = min(life, *client->entry.max_life);
client 768 source4/heimdal/kdc/krb5tgs.c if(client && client->entry.max_renew)
client 769 source4/heimdal/kdc/krb5tgs.c renew = min(renew, *client->entry.max_renew);
client 1375 source4/heimdal/kdc/krb5tgs.c hdb_entry_ex *server = NULL, *client = NULL;
client 1538 source4/heimdal/kdc/krb5tgs.c NULL, &client);
client 1642 source4/heimdal/kdc/krb5tgs.c client, server, ekey, &tkey->key,
client 1671 source4/heimdal/kdc/krb5tgs.c if (client) {
client 1751 source4/heimdal/kdc/krb5tgs.c if (client->entry.flags.trusted_for_delegation) {
client 1767 source4/heimdal/kdc/krb5tgs.c if (client != NULL
client 1791 source4/heimdal/kdc/krb5tgs.c ret = hdb_enctype2key(context, &client->entry,
client 1815 source4/heimdal/kdc/krb5tgs.c ret = check_constrained_delegation(context, config, client, sp);
client 1871 source4/heimdal/kdc/krb5tgs.c client, cpn,
client 1943 source4/heimdal/kdc/krb5tgs.c client,
client 1961 source4/heimdal/kdc/krb5tgs.c if(client)
client 1962 source4/heimdal/kdc/krb5tgs.c _kdc_free_ent(context, client);
client 959 source4/heimdal/kdc/pkinit.c const hdb_entry_ex *client,
client 1365 source4/heimdal/kdc/pkinit.c const hdb_entry_ex *client,
client 1393 source4/heimdal/kdc/pkinit.c client->entry.principal);
client 1402 source4/heimdal/kdc/pkinit.c client->entry.principal);
client 1410 source4/heimdal/kdc/pkinit.c ret = hdb_entry_get_pkinit_acl(&client->entry, &acl);
client 1436 source4/heimdal/kdc/pkinit.c client->entry.principal,
client 77 source4/heimdal/kdc/windc.c hdb_entry_ex *client,
client 83 source4/heimdal/kdc/windc.c return (windcft->pac_generate)(windcctx, context, client, pac);
client 89 source4/heimdal/kdc/windc.c hdb_entry_ex *client,
client 98 source4/heimdal/kdc/windc.c client_principal, client, server, pac);
client 103 source4/heimdal/kdc/windc.c struct hdb_entry_ex *client,
client 109 source4/heimdal/kdc/windc.c return (windcft->client_access)(windcctx, context, client, req, e_data);
client 197 source4/heimdal/kuser/kinit.c krb5_principal client,
client 205 source4/heimdal/kuser/kinit.c client_realm = krb5_princ_realm (context, client);
client 224 source4/heimdal/kuser/kinit.c krb5_principal client;
client 225 source4/heimdal/kuser/kinit.c krb5_cc_get_principal(context, ccache, &client);
client 227 source4/heimdal/kuser/kinit.c ret = get_server(context, client, server, &in_creds.server);
client 229 source4/heimdal/kuser/kinit.c krb5_free_principal(context, client);
client 232 source4/heimdal/kuser/kinit.c in_creds.client = client;
client 234 source4/heimdal/kuser/kinit.c krb5_free_principal(context, client);
client 271 source4/heimdal/kuser/kinit.c ret = krb5_cc_get_principal(context, cache, &in.client);
client 276 source4/heimdal/kuser/kinit.c ret = get_server(context, in.client, server, &in.server);
client 326 source4/heimdal/kuser/kinit.c ret = krb5_cc_initialize(context, cache, in.client);
client 600 source4/heimdal/kuser/kinit.c ret = krb5_cc_initialize (context, tempccache, cred.client);
client 641 source4/heimdal/kuser/kinit.c krb5_principal client, const char *server)
client 649 source4/heimdal/kuser/kinit.c ret = krb5_cc_get_principal(context, cache, &in_cred.client);
client 654 source4/heimdal/kuser/kinit.c ret = get_server(context, in_cred.client, server, &in_cred.server);
client 656 source4/heimdal/kuser/kinit.c krb5_free_principal(context, in_cred.client);
client 663 source4/heimdal/kuser/kinit.c krb5_free_principal(context, in_cred.client);
client 425 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c ctx->ticket->client,
client 451 source4/heimdal/lib/gssapi/krb5/accept_sec_context.c ctx->ticket->client,
client 50 source4/heimdal/lib/gssapi/krb5/acquire_cred.c in_cred.client = principal;
client 193 source4/heimdal/lib/gssapi/krb5/acquire_cred.c kret = krb5_cc_initialize(context, ccache, cred.client);
client 223 source4/heimdal/lib/gssapi/krb5/acquire_cred.c if (cred.client != NULL)
client 200 source4/heimdal/lib/gssapi/krb5/init_sec_context.c this_cred.client = ctx->source;
client 295 source4/heimdal/lib/gssapi/krb5/init_sec_context.c kret = krb5_cc_get_principal(context, ccache, &creds.client);
client 301 source4/heimdal/lib/gssapi/krb5/init_sec_context.c strlen(creds.client->realm),
client 302 source4/heimdal/lib/gssapi/krb5/init_sec_context.c creds.client->realm,
client 304 source4/heimdal/lib/gssapi/krb5/init_sec_context.c creds.client->realm,
client 333 source4/heimdal/lib/gssapi/krb5/init_sec_context.c if (creds.client)
client 334 source4/heimdal/lib/gssapi/krb5/init_sec_context.c krb5_free_principal(context, creds.client);
client 261 source4/heimdal/lib/hx509/cms.c CMSIdentifier *client,
client 277 source4/heimdal/lib/hx509/cms.c switch (client->element) {
client 279 source4/heimdal/lib/hx509/cms.c q.serial = &client->u.issuerAndSerialNumber.serialNumber;
client 280 source4/heimdal/lib/hx509/cms.c q.issuer_name = &client->u.issuerAndSerialNumber.issuer;
client 284 source4/heimdal/lib/hx509/cms.c q.subject_id = &client->u.subjectKeyIdentifier;
client 305 source4/heimdal/lib/hx509/cms.c ret = unparse_CMSIdentifier(context, client, &str);
client 153 source4/heimdal/lib/krb5/acache.c ret = krb5_parse_name(context, incred->client, &cred->client);
client 285 source4/heimdal/lib/krb5/acache.c if (cred->client)
client 286 source4/heimdal/lib/krb5/acache.c free(cred->client);
client 300 source4/heimdal/lib/krb5/acache.c ret = krb5_unparse_name(context, incred->client, &cred->client);
client 754 source4/heimdal/lib/krb5/acache.c char *client, *server;
client 762 source4/heimdal/lib/krb5/acache.c if (cred->client) {
client 763 source4/heimdal/lib/krb5/acache.c ret = krb5_unparse_name(context, cred->client, &client);
client 767 source4/heimdal/lib/krb5/acache.c client = NULL;
client 771 source4/heimdal/lib/krb5/acache.c free(client);
client 778 source4/heimdal/lib/krb5/acache.c free(client);
client 795 source4/heimdal/lib/krb5/acache.c if (client && strcmp(v5cred->client, client) != 0)
client 814 source4/heimdal/lib/krb5/acache.c free(client);
client 126 source4/heimdal/lib/krb5/build_auth.c copy_Realm(&cred->client->realm, &auth->crealm);
client 127 source4/heimdal/lib/krb5/build_auth.c copy_PrincipalName(&cred->client->name, &auth->cname);
client 1072 source4/heimdal/lib/krb5/cache.c krb5_principal client,
client 1092 source4/heimdal/lib/krb5/cache.c match = krb5_principal_compare(context, principal, client);
client 1107 source4/heimdal/lib/krb5/cache.c krb5_unparse_name(context, client, &str);
client 1164 source4/heimdal/lib/krb5/cache.c krb5_principal client;
client 1170 source4/heimdal/lib/krb5/cache.c ret = krb5_cc_get_principal(context, id, &client);
client 1181 source4/heimdal/lib/krb5/cache.c krb5_principal_get_realm(context, client),
client 1185 source4/heimdal/lib/krb5/cache.c krb5_free_principal(context, client);
client 1188 source4/heimdal/lib/krb5/cache.c ret = krb5_copy_principal(context, client, &cred->client);
client 1189 source4/heimdal/lib/krb5/cache.c krb5_free_principal(context, client);
client 93 source4/heimdal/lib/krb5/changepw.c krb5_principal_compare(context, creds->client, targprinc) != TRUE)
client 530 source4/heimdal/lib/krb5/changepw.c realm = creds->client->realm;
client 808 source4/heimdal/lib/krb5/changepw.c ret = krb5_cc_get_principal(context, ccache, &creds.client);
client 816 source4/heimdal/lib/krb5/changepw.c krb5_free_principal(context, creds.client);
client 127 source4/heimdal/lib/krb5/convert_creds.c ret = krb5_524_conv_principal(context, v5_creds->client,
client 183 source4/heimdal/lib/krb5/convert_creds.c ret = krb5_copy_principal (context, in_cred->client, &template.client);
client 68 source4/heimdal/lib/krb5/creds.c krb5_free_principal (context, c->client);
client 69 source4/heimdal/lib/krb5/creds.c c->client = NULL;
client 102 source4/heimdal/lib/krb5/creds.c ret = krb5_copy_principal (context, incred->client, &c->client);
client 228 source4/heimdal/lib/krb5/creds.c if (match && mcreds->client) {
client 230 source4/heimdal/lib/krb5/creds.c match = krb5_principal_compare_any_realm (context, mcreds->client,
client 231 source4/heimdal/lib/krb5/creds.c creds->client);
client 233 source4/heimdal/lib/krb5/creds.c match = krb5_principal_compare (context, mcreds->client,
client 234 source4/heimdal/lib/krb5/creds.c creds->client);
client 4386 source4/heimdal/lib/krb5/crypto.c krb5_const_principal client,
client 4417 source4/heimdal/lib/krb5/crypto.c ret = encode_uvinfo(context, client, &otherinfo.partyUInfo);
client 4452 source4/heimdal/lib/krb5/crypto.c krb5_const_principal client,
client 4498 source4/heimdal/lib/krb5/crypto.c ret = encode_otherinfo(context, ai, client, server,
client 315 source4/heimdal/lib/krb5/get_cred.c ret = krb5_cc_get_principal(context, id, &tmp_cred.client);
client 326 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_cred.client);
client 334 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_cred.client);
client 532 source4/heimdal/lib/krb5/get_cred.c in_creds->client,
client 533 source4/heimdal/lib/krb5/get_cred.c &out_creds->client);
client 762 source4/heimdal/lib/krb5/get_cred.c client_realm = krb5_principal_get_realm(context, in_creds->client);
client 765 source4/heimdal/lib/krb5/get_cred.c ret = krb5_copy_principal(context, in_creds->client, &tmp_creds.client);
client 781 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client);
client 812 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client);
client 816 source4/heimdal/lib/krb5/get_cred.c if(krb5_realm_compare(context, in_creds->client, in_creds->server))
client 827 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client);
client 842 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client);
client 853 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client);
client 859 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client);
client 865 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, tmp_creds.client);
client 906 source4/heimdal/lib/krb5/get_cred.c client_realm = krb5_principal_get_realm(context, in_creds->client);
client 1309 source4/heimdal/lib/krb5/get_cred.c ret = krb5_cc_get_principal(context, ccache, &in_creds.client);
client 1319 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client);
client 1348 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client);
client 1355 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client);
client 1363 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client);
client 1368 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client);
client 1390 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in_creds.client);
client 1408 source4/heimdal/lib/krb5/get_cred.c krb5_const_principal client,
client 1419 source4/heimdal/lib/krb5/get_cred.c ret = krb5_copy_principal(context, client, &in.client);
client 1426 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in.client);
client 1430 source4/heimdal/lib/krb5/get_cred.c const char *realm = krb5_principal_get_realm(context, client);
client 1435 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in.client);
client 1455 source4/heimdal/lib/krb5/get_cred.c krb5_free_principal(context, in.client);
client 109 source4/heimdal/lib/krb5/get_for_creds.c krb5_principal client,
client 137 source4/heimdal/lib/krb5/get_for_creds.c client_realm = krb5_principal_get_realm(context, client);
client 140 source4/heimdal/lib/krb5/get_for_creds.c creds.client = client;
client 225 source4/heimdal/lib/krb5/get_for_creds.c in_creds->client),
client 370 source4/heimdal/lib/krb5/get_for_creds.c copy_Realm (&out_creds->client->realm, krb_cred_info->prealm);
client 372 source4/heimdal/lib/krb5/get_for_creds.c copy_PrincipalName(&out_creds->client->name, krb_cred_info->pname);
client 408 source4/heimdal/lib/krb5/get_in_tkt.c creds->client,
client 416 source4/heimdal/lib/krb5/get_in_tkt.c krb5_free_principal (context, creds->client);
client 417 source4/heimdal/lib/krb5/get_in_tkt.c creds->client = tmp_principal;
client 444 source4/heimdal/lib/krb5/get_in_tkt.c const char *crealm = krb5_principal_get_realm(context, creds->client);
client 613 source4/heimdal/lib/krb5/get_in_tkt.c krb5_principal client,
client 628 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_get_pw_salt (context, client, &salt2);
client 695 source4/heimdal/lib/krb5/get_in_tkt.c ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
client 701 source4/heimdal/lib/krb5/get_in_tkt.c ret = copy_Realm(&creds->client->realm, &a->req_body.realm);
client 792 source4/heimdal/lib/krb5/get_in_tkt.c ret = add_padata(context, a->padata, creds->client,
client 816 source4/heimdal/lib/krb5/get_in_tkt.c add_padata(context, a->padata, creds->client,
client 823 source4/heimdal/lib/krb5/get_in_tkt.c add_padata(context, a->padata, creds->client,
client 943 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp);
client 1006 source4/heimdal/lib/krb5/get_in_tkt.c ret = krb5_get_pw_salt (context, creds->client, &salt);
client 84 source4/heimdal/lib/krb5/get_in_tkt_with_keytab.c a.principal = creds->client;
client 128 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client,
client 142 source4/heimdal/lib/krb5/init_creds_pw.c if (client)
client 143 source4/heimdal/lib/krb5/init_creds_pw.c krb5_copy_principal(context, client, &cred->client);
client 146 source4/heimdal/lib/krb5/init_creds_pw.c &cred->client);
client 151 source4/heimdal/lib/krb5/init_creds_pw.c client_realm = krb5_principal_get_realm (context, cred->client);
client 260 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client,
client 301 source4/heimdal/lib/krb5/init_creds_pw.c ret = init_cred (context, &ctx->cred, client, start_time,
client 368 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client,
client 403 source4/heimdal/lib/krb5/init_creds_pw.c client,
client 447 source4/heimdal/lib/krb5/init_creds_pw.c client,
client 491 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client,
client 501 source4/heimdal/lib/krb5/init_creds_pw.c ret = get_init_creds_common(context, client, start_time,
client 512 source4/heimdal/lib/krb5/init_creds_pw.c a->principal = ctx.cred.client;
client 571 source4/heimdal/lib/krb5/init_creds_pw.c ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
client 574 source4/heimdal/lib/krb5/init_creds_pw.c ret = copy_Realm(&creds->client->realm, &a->req_body.realm);
client 699 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client,
client 720 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_get_pw_salt(context, client, &salt);
client 748 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client,
client 770 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_get_pw_salt(context, client, &salt);
client 800 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client,
client 850 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client,
client 863 source4/heimdal/lib/krb5/init_creds_pw.c p = (*pa_prefs[i].salt_info)(context, client, asreq,
client 926 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client,
client 941 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_get_pw_salt (context, client, &salt2);
client 971 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client,
client 980 source4/heimdal/lib/krb5/init_creds_pw.c add_enc_ts_padata(context, md, client,
client 988 source4/heimdal/lib/krb5/init_creds_pw.c add_enc_ts_padata(context, md, client,
client 996 source4/heimdal/lib/krb5/init_creds_pw.c add_enc_ts_padata(context, md, client,
client 1006 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client,
client 1024 source4/heimdal/lib/krb5/init_creds_pw.c const krb5_principal client,
client 1108 source4/heimdal/lib/krb5/init_creds_pw.c ret = pa_data_to_md_pkinit(context, a, creds->client, ctx, *out_md);
client 1118 source4/heimdal/lib/krb5/init_creds_pw.c ppaid = process_pa_info(context, creds->client, a, &paid, in_md);
client 1120 source4/heimdal/lib/krb5/init_creds_pw.c pa_data_to_md_ts_enc(context, a, creds->client, ctx, ppaid, *out_md);
client 1155 source4/heimdal/lib/krb5/init_creds_pw.c ppaid = process_pa_info(context, creds->client, a, &paid,
client 1159 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_get_pw_salt (context, creds->client, &paid.salt);
client 1197 source4/heimdal/lib/krb5/init_creds_pw.c ret = pa_data_to_key_plain(context, creds->client, ctx,
client 1289 source4/heimdal/lib/krb5/init_creds_pw.c creds->client->realm, &resp);
client 1396 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client,
client 1411 source4/heimdal/lib/krb5/init_creds_pw.c ret = get_init_creds_common(context, client, start_time,
client 1446 source4/heimdal/lib/krb5/init_creds_pw.c client,
client 1464 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal_get_realm (context, ctx.cred.client),
client 1484 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client,
client 1497 source4/heimdal/lib/krb5/init_creds_pw.c const char *realm = krb5_principal_get_realm(context, client);
client 1517 source4/heimdal/lib/krb5/init_creds_pw.c krb5_unparse_name (context, client, &p);
client 1549 source4/heimdal/lib/krb5/init_creds_pw.c ret = krb5_get_init_creds(context, creds, client, prompter,
client 1569 source4/heimdal/lib/krb5/init_creds_pw.c krb5_principal client,
client 1578 source4/heimdal/lib/krb5/init_creds_pw.c ret = get_init_creds_common(context, client, start_time,
client 387 source4/heimdal/lib/krb5/krb5.h krb5_principal client;
client 451 source4/heimdal/lib/krb5/krb5.h krb5_principal client;
client 104 source4/heimdal/lib/krb5/krb5_ccapi.h char *client;
client 43 source4/heimdal/lib/krb5/mk_error.c const krb5_principal client,
client 81 source4/heimdal/lib/krb5/mk_error.c if(client){
client 82 source4/heimdal/lib/krb5/mk_error.c msg.crealm = &client->realm;
client 83 source4/heimdal/lib/krb5/mk_error.c msg.cname = &client->name;
client 52 source4/heimdal/lib/krb5/mk_req.c ret = krb5_cc_get_principal(context, ccache, &this_cred.client);
client 279 source4/heimdal/lib/krb5/rd_cred.c &creds->client,
client 86 source4/heimdal/lib/krb5/rd_error.c krb5_unparse_name_fixed(context, creds->client,
client 387 source4/heimdal/lib/krb5/rd_req.c &t->client,
client 875 source4/heimdal/lib/krb5/rd_req.c o->ticket->client,
client 783 source4/heimdal/lib/krb5/store.c ret = krb5_store_principal(sp, creds->client);
client 827 source4/heimdal/lib/krb5/store.c ret = krb5_ret_principal (sp, &creds->client);
client 890 source4/heimdal/lib/krb5/store.c if (creds->client)
client 907 source4/heimdal/lib/krb5/store.c if (creds->client) {
client 908 source4/heimdal/lib/krb5/store.c ret = krb5_store_principal(sp, creds->client);
client 977 source4/heimdal/lib/krb5/store.c ret = krb5_ret_principal (sp, &creds->client);
client 43 source4/heimdal/lib/krb5/ticket.c krb5_free_principal(context, ticket->client);
client 68 source4/heimdal/lib/krb5/ticket.c ret = krb5_copy_principal(context, from->client, &tmp->client);
client 76 source4/heimdal/lib/krb5/ticket.c krb5_free_principal(context, tmp->client);
client 88 source4/heimdal/lib/krb5/ticket.c krb5_principal *client)
client 90 source4/heimdal/lib/krb5/ticket.c return krb5_copy_principal(context, ticket->client, client);
client 119 source4/kdc/hdb-samba4.c flags.client = 1;
client 126 source4/kdc/hdb-samba4.c flags.client = 1;
client 132 source4/kdc/hdb-samba4.c flags.client = 1;
client 138 source4/kdc/hdb-samba4.c flags.client = 1;
client 145 source4/kdc/hdb-samba4.c flags.client = 0;
client 108 source4/kdc/pac-glue.c struct hdb_entry_ex *client,
client 114 source4/kdc/pac-glue.c struct hdb_ldb_private *p = talloc_get_type(client->ctx, struct hdb_ldb_private);
client 152 source4/kdc/pac-glue.c struct hdb_entry_ex *client,
client 134 source4/lib/socket/access.c static bool client_match(TALLOC_CTX *mem_ctx, const char *tok, struct client_addr *client)
client 144 source4/lib/socket/access.c if ((match = string_match(mem_ctx, tok, client->caddr, &invalid_char)) == 0) {
client 149 source4/lib/socket/access.c if (client->cname[0] != 0)
client 150 source4/lib/socket/access.c match = string_match(mem_ctx, tok, client->cname, &invalid_char);
client 161 source4/lib/socket/access.c static bool list_match(TALLOC_CTX *mem_ctx, const char **list, struct client_addr *client)
client 178 source4/lib/socket/access.c if ((match = client_match(mem_ctx, *list, client))) /* true or FAIL */
client 188 source4/lib/socket/access.c if (client_match(mem_ctx, *list, client)) /* Exception Found */
client 201 source4/lib/socket/access.c struct client_addr client;
client 203 source4/lib/socket/access.c client.cname = cname;
client 204 source4/lib/socket/access.c client.caddr = caddr;
client 213 source4/lib/socket/access.c list_match(mem_ctx, deny_list, &client) &&
client 215 source4/lib/socket/access.c !list_match(mem_ctx, allow_list, &client))) {
client 230 source4/lib/socket/access.c return list_match(mem_ctx, allow_list, &client);
client 235 source4/lib/socket/access.c return !list_match(mem_ctx, deny_list, &client);
client 239 source4/lib/socket/access.c if (list_match(mem_ctx, allow_list, &client))
client 244 source4/lib/socket/access.c if (list_match(mem_ctx, deny_list, &client))
client 52 source4/libcli/auth/credentials.c des_crypt112(creds->client.data, client_challenge->data, creds->session_key, 1);
client 55 source4/libcli/auth/credentials.c creds->seed = creds->client;
client 85 source4/libcli/auth/credentials.c creds->client = *client_challenge;
client 88 source4/libcli/auth/credentials.c des_crypt112(creds->client.data, client_challenge->data, creds->session_key, 1);
client 91 source4/libcli/auth/credentials.c creds->seed = creds->client;
client 111 source4/libcli/auth/credentials.c des_crypt112(creds->client.data, time_cred.data, creds->session_key, 1);
client 114 source4/libcli/auth/credentials.c IVAL(creds->client.data, 0), IVAL(creds->client.data, 4)));
client 213 source4/libcli/auth/credentials.c dump_data_pw("Credential ", creds->client.data, 8);
client 215 source4/libcli/auth/credentials.c *initial_credential = creds->client;
client 231 source4/libcli/auth/credentials.c next->cred = creds->client;
client 284 source4/libcli/auth/credentials.c if (memcmp(received_credentials->data, creds->client.data, 8) != 0) {
client 286 source4/libcli/auth/credentials.c dump_data_pw("client creds", creds->client.data, 8);
client 29 source4/libcli/auth/credentials.h struct netr_Credential client;
client 215 source4/ntvfs/ntvfs.h } client;
client 694 source4/ntvfs/ntvfs_interface.c ntvfs->client.get_peer_addr = my_addr;
client 695 source4/ntvfs/ntvfs_interface.c ntvfs->client.get_my_addr = peer_addr;
client 696 source4/ntvfs/ntvfs_interface.c ntvfs->client.private_data = private_data;
client 702 source4/ntvfs/ntvfs_interface.c if (!ntvfs->ctx->client.get_my_addr) {
client 706 source4/ntvfs/ntvfs_interface.c return ntvfs->ctx->client.get_my_addr(ntvfs->ctx->client.private_data, mem_ctx);
client 711 source4/ntvfs/ntvfs_interface.c if (!ntvfs->ctx->client.get_peer_addr) {
client 715 source4/ntvfs/ntvfs_interface.c return ntvfs->ctx->client.get_peer_addr(ntvfs->ctx->client.private_data, mem_ctx);
client 531 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.account_name = r->in.logon->password->identity_info.account_name.string;
client 532 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.domain_name = r->in.logon->password->identity_info.domain_name.string;
client 561 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.account_name = r->in.logon->network->identity_info.account_name.string;
client 562 source4/rpc_server/netlogon/dcerpc_netlogon.c user_info->client.domain_name = r->in.logon->network->identity_info.domain_name.string;
client 137 source4/smb_server/smb/sesssetup.c user_info->client.account_name = sess->old.in.user;
client 138 source4/smb_server/smb/sesssetup.c user_info->client.domain_name = sess->old.in.domain;
client 263 source4/smb_server/smb/sesssetup.c user_info->client.account_name = sess->nt1.in.user;
client 264 source4/smb_server/smb/sesssetup.c user_info->client.domain_name = sess->nt1.in.domain;
client 1725 source4/torture/basic/denytest.c struct smbcli_state *cli1, struct smbcli_state *cli2, int client)
client 1758 source4/torture/basic/denytest.c fname = talloc_asprintf(cli1, "\\ntdeny_%d.dll", client);
client 1893 source4/torture/basic/denytest.c struct smbcli_state *cli, int client)
client 1897 source4/torture/basic/denytest.c srandom(torture_seed + client);
client 1899 source4/torture/basic/denytest.c torture_comment(tctx, "starting ntdenytest1 client %d\n", client);
client 1901 source4/torture/basic/denytest.c return torture_ntdenytest(tctx, cli, cli, client);
client 40 source4/torture/nbench/nbench.c for (n=0;n<=nb_max_retries && !op;n++) do_reconnect(&cli, tctx, client)
client 42 source4/torture/nbench/nbench.c static void do_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client)
client 45 source4/torture/nbench/nbench.c printf("[%d] Reconnecting client %d\n", nbench_line_count, client);
client 47 source4/torture/nbench/nbench.c if (nb_reconnect(cli, tctx, client)) {
client 48 source4/torture/nbench/nbench.c printf("[%d] Reconnected client %d\n", nbench_line_count, client);
client 52 source4/torture/nbench/nbench.c printf("[%d] Failed to reconnect client %d\n", nbench_line_count, client);
client 57 source4/torture/nbench/nbench.c static bool run_netbench(struct torture_context *tctx, struct smbcli_state *cli, int client)
client 68 source4/torture/nbench/nbench.c if (target_rate != 0 && client == 0) {
client 72 source4/torture/nbench/nbench.c nb_setup(cli, client);
client 80 source4/torture/nbench/nbench.c asprintf(&cname, "client%d", client+1);
client 139 source4/torture/nbench/nbench.c DEBUG(9,("run_netbench(%d): %s %s\n", client, params[0], params[1]));
client 160 source4/torture/nbench/nbio.c bool nb_reconnect(struct smbcli_state **cli, struct torture_context *tctx, int client)
client 162 source4/torture/nbench/nbio.c children[client].connected = false;
client 168 source4/torture/nbench/nbio.c if (!torture_open_connection(cli, tctx, client)) {
client 174 source4/torture/nbench/nbio.c nb_setup(*cli, client);
client 177 source4/torture/nbench/nbio.c printf("nb_reconnect: failed to reopen files in client %d\n", client);
client 60 source4/torture/raw/offline.c int client;
client 417 source4/torture/raw/offline.c state[i].client = i;
client 428 source4/torture/raw/offline.c state[i].client = i;
client 2790 source4/torture/rpc/samba3rpc.c userlevel1.client = talloc_asprintf(
client 1753 source4/torture/rpc/spoolss.c userlevel1.client = "hello";
client 63 source4/torture/rpc/spoolss_win.c ul_1.client = "\\clientname";
client 88 source4/torture/rpc/spoolss_win.c ul_1.client = "\\clientname";
client 407 source4/torture/rpc/srvsvc.c r.in.client = NULL;