user 45 examples/VFS/skel_opaque.c static int skel_connect(vfs_handle_struct *handle, const char *service, const char *user)
user 39 examples/VFS/skel_transparent.c static int skel_connect(vfs_handle_struct *handle, const char *service, const char *user)
user 41 examples/VFS/skel_transparent.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 78 examples/libsmbclient/testbrowse2.c char *user, int userlen,
user 87 examples/libsmbclient/testbrowse2.c strncpy(user, username, userlen - 1); user[userlen - 1] = 0;
user 41 examples/libsmbclient/testsmbc.c pji->user,
user 50 examples/pdb/test.c static NTSTATUS testsam_getsampwent(struct pdb_methods *methods, struct samu *user)
user 60 examples/pdb/test.c static NTSTATUS testsam_getsampwnam (struct pdb_methods *methods, struct samu *user, const char *sname)
user 70 examples/pdb/test.c static NTSTATUS testsam_getsampwsid (struct pdb_methods *methods, struct samu *user, const DOM_SID *sid)
user 90 examples/perfcounter/perf.h unsigned long long user;
user 98 examples/perfcounter/perf_writer_cpu.c &data->cpuInfo.data[i].user,
user 112 examples/perfcounter/perf_writer_cpu.c data->PerfTime100nSec += data->cpuInfo.data[i].user +
user 156 examples/perfcounter/perf_writer_cpu.c data->cpuInfo.data[0].user,
user 992 lib/nss_wrapper/nss_wrapper.c static int nwrap_files_initgroups(const char *user, gid_t group)
user 998 lib/nss_wrapper/nss_wrapper.c _PUBLIC_ int nwrap_initgroups(const char *user, gid_t group)
user 1001 lib/nss_wrapper/nss_wrapper.c return real_initgroups(user, group);
user 1004 lib/nss_wrapper/nss_wrapper.c return nwrap_files_initgroups(user, group);
user 48 lib/nss_wrapper/nss_wrapper.h int nwrap_initgroups(const char *user, gid_t group);
user 163 librpc/gen_ndr/cli_srvsvc.c const char *user /* [in] [unique,charset(UTF16)] */,
user 175 librpc/gen_ndr/cli_srvsvc.c r.in.user = user;
user 221 librpc/gen_ndr/cli_srvsvc.c const char *user /* [in] [charset(UTF16)] */,
user 232 librpc/gen_ndr/cli_srvsvc.c r.in.user = user;
user 475 librpc/gen_ndr/cli_srvsvc.c const char *user /* [in] [unique,charset(UTF16)] */,
user 488 librpc/gen_ndr/cli_srvsvc.c r.in.user = user;
user 628 librpc/gen_ndr/cli_srvsvc.c const char *user /* [in] [unique,charset(UTF16)] */,
user 641 librpc/gen_ndr/cli_srvsvc.c r.in.user = user;
user 687 librpc/gen_ndr/cli_srvsvc.c const char *user /* [in] [unique,charset(UTF16)] */,
user 696 librpc/gen_ndr/cli_srvsvc.c r.in.user = user;
user 28 librpc/gen_ndr/cli_srvsvc.h const char *user /* [in] [unique,charset(UTF16)] */,
user 38 librpc/gen_ndr/cli_srvsvc.h const char *user /* [in] [charset(UTF16)] */,
user 74 librpc/gen_ndr/cli_srvsvc.h const char *user /* [in] [unique,charset(UTF16)] */,
user 96 librpc/gen_ndr/cli_srvsvc.h const char *user /* [in] [unique,charset(UTF16)] */,
user 106 librpc/gen_ndr/cli_srvsvc.h const char *user /* [in] [unique,charset(UTF16)] */,
user 3996 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 4094 librpc/gen_ndr/ndr_netlogon.c if (r->user) {
user 4095 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_DELTA_USER(ndr, NDR_SCALARS|NDR_BUFFERS, r->user));
user 4257 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->user);
user 4259 librpc/gen_ndr/ndr_netlogon.c r->user = NULL;
user 4438 librpc/gen_ndr/ndr_netlogon.c if (r->user) {
user 4440 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 4441 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_DELTA_USER(ndr, NDR_SCALARS|NDR_BUFFERS, r->user));
user 4613 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "user", r->user);
user 4615 librpc/gen_ndr/ndr_netlogon.c if (r->user) {
user 4616 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_DELTA_USER(ndr, "user", r->user);
user 6127 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 6187 librpc/gen_ndr/ndr_netlogon.c if (r->user) {
user 6188 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 6190 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 6191 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 6272 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->user);
user 6274 librpc/gen_ndr/ndr_netlogon.c r->user = NULL;
user 6364 librpc/gen_ndr/ndr_netlogon.c if (r->user) {
user 6366 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 6367 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user 6368 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user 6369 librpc/gen_ndr/ndr_netlogon.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user 6370 librpc/gen_ndr/ndr_netlogon.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user 6372 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user 6373 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user 6440 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "user", r->user);
user 6442 librpc/gen_ndr/ndr_netlogon.c if (r->user) {
user 6443 librpc/gen_ndr/ndr_netlogon.c ndr_print_string(ndr, "user", r->user);
user 17897 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 17910 librpc/gen_ndr/ndr_spoolss.c if (r->user) {
user 17911 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 17913 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 17914 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 17937 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_ALLOC(ndr, r->user);
user 17939 librpc/gen_ndr/ndr_spoolss.c r->user = NULL;
user 17959 librpc/gen_ndr/ndr_spoolss.c if (r->user) {
user 17961 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 17962 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user 17963 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user 17964 librpc/gen_ndr/ndr_spoolss.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user 17965 librpc/gen_ndr/ndr_spoolss.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user 17967 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user 17968 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user 17986 librpc/gen_ndr/ndr_spoolss.c ndr_print_ptr(ndr, "user", r->user);
user 17988 librpc/gen_ndr/ndr_spoolss.c if (r->user) {
user 17989 librpc/gen_ndr/ndr_spoolss.c ndr_print_string(ndr, "user", r->user);
user 18037 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 18051 librpc/gen_ndr/ndr_spoolss.c if (r->user) {
user 18052 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 18054 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 18055 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 18080 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_ALLOC(ndr, r->user);
user 18082 librpc/gen_ndr/ndr_spoolss.c r->user = NULL;
user 18103 librpc/gen_ndr/ndr_spoolss.c if (r->user) {
user 18105 librpc/gen_ndr/ndr_spoolss.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 18106 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user 18107 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user 18108 librpc/gen_ndr/ndr_spoolss.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user 18109 librpc/gen_ndr/ndr_spoolss.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user 18111 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user 18112 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user 18132 librpc/gen_ndr/ndr_spoolss.c ndr_print_ptr(ndr, "user", r->user);
user 18134 librpc/gen_ndr/ndr_spoolss.c if (r->user) {
user 18135 librpc/gen_ndr/ndr_spoolss.c ndr_print_string(ndr, "user", r->user);
user 160 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 170 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 171 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 173 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 174 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 197 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user);
user 199 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL;
user 216 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 218 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 219 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user 220 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user 221 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user 222 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user 224 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user 225 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user 243 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user);
user 245 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 246 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user);
user 1420 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 1424 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 1425 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 1427 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 1428 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 1455 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user);
user 1457 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL;
user 1467 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 1469 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 1470 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user 1471 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user 1472 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user 1473 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user 1475 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user 1476 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user 1504 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user);
user 1506 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 1507 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user);
user 1899 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 1908 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 1909 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 1911 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 1912 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 1937 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user);
user 1939 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL;
user 1955 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 1957 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 1958 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user 1959 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user 1960 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user 1961 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user 1963 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user 1964 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user 1984 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user);
user 1986 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 1987 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user);
user 2544 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 2557 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 2558 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 2560 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 2561 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 2583 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user);
user 2585 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL;
user 2605 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 2607 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 2608 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user 2609 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user 2610 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user 2611 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user 2613 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user 2614 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user 2631 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user);
user 2633 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 2634 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user);
user 2735 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 2749 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 2750 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 2752 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 2753 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 2783 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user);
user 2785 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL;
user 2811 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 2813 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 2814 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user 2815 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user 2816 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user 2817 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user 2819 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user 2820 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user 2849 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user);
user 2851 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 2852 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user);
user 2959 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 2970 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 2971 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 2973 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 2974 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 2996 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user);
user 2998 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL;
user 3016 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 3018 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 3019 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user 3020 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user 3021 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user 3022 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user 3024 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user 3025 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user 3042 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user);
user 3044 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 3045 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user);
user 3144 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->user));
user 3159 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 3160 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 3162 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->user, CH_UTF16)));
user 3163 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->user, ndr_charset_length(r->user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 3201 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->user);
user 3203 librpc/gen_ndr/ndr_srvsvc.c r->user = NULL;
user 3235 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 3237 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->user, 0);
user 3238 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->user));
user 3239 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->user));
user 3240 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->user) > ndr_get_array_size(ndr, &r->user)) {
user 3241 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->user), ndr_get_array_length(ndr, &r->user));
user 3243 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t)));
user 3244 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->user, ndr_get_array_length(ndr, &r->user), sizeof(uint16_t), CH_UTF16));
user 3285 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->user);
user 3287 librpc/gen_ndr/ndr_srvsvc.c if (r->user) {
user 3288 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->user);
user 13564 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user));
user 13565 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 13566 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user 13568 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user 13569 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 13632 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.user);
user 13634 librpc/gen_ndr/ndr_srvsvc.c r->in.user = NULL;
user 13636 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 13638 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0);
user 13639 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user));
user 13640 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user));
user 13641 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) {
user 13642 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user));
user 13644 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t)));
user 13645 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16));
user 13721 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->in.user);
user 13723 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 13724 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->in.user);
user 13777 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user 13779 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user 13780 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 13827 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user));
user 13828 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user));
user 13829 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) {
user 13830 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user));
user 13832 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t)));
user 13833 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16));
user 13869 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->in.user);
user 14440 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user));
user 14441 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 14442 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user 14444 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user 14445 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 14528 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.user);
user 14530 librpc/gen_ndr/ndr_srvsvc.c r->in.user = NULL;
user 14532 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 14534 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0);
user 14535 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user));
user 14536 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user));
user 14537 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) {
user 14538 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user));
user 14540 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t)));
user 14541 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16));
user 14623 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->in.user);
user 14625 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 14626 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->in.user);
user 14862 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user));
user 14863 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 14864 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user 14866 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user 14867 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 14950 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.user);
user 14952 librpc/gen_ndr/ndr_srvsvc.c r->in.user = NULL;
user 14954 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 14956 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0);
user 14957 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user));
user 14958 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user));
user 14959 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) {
user 14960 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user));
user 14962 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t)));
user 14963 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16));
user 15045 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->in.user);
user 15047 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 15048 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->in.user);
user 15104 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->in.user));
user 15105 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 15106 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user 15108 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_charset_length(r->in.user, CH_UTF16)));
user 15109 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_push_charset(ndr, NDR_SCALARS, r->in.user, ndr_charset_length(r->in.user, CH_UTF16), sizeof(uint16_t), CH_UTF16));
user 15165 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_ALLOC(ndr, r->in.user);
user 15167 librpc/gen_ndr/ndr_srvsvc.c r->in.user = NULL;
user 15169 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 15171 librpc/gen_ndr/ndr_srvsvc.c NDR_PULL_SET_MEM_CTX(ndr, r->in.user, 0);
user 15172 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_size(ndr, &r->in.user));
user 15173 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_array_length(ndr, &r->in.user));
user 15174 librpc/gen_ndr/ndr_srvsvc.c if (ndr_get_array_length(ndr, &r->in.user) > ndr_get_array_size(ndr, &r->in.user)) {
user 15175 librpc/gen_ndr/ndr_srvsvc.c return ndr_pull_error(ndr, NDR_ERR_ARRAY_SIZE, "Bad array size %u should exceed array length %u", ndr_get_array_size(ndr, &r->in.user), ndr_get_array_length(ndr, &r->in.user));
user 15177 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_check_string_terminator(ndr, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t)));
user 15178 librpc/gen_ndr/ndr_srvsvc.c NDR_CHECK(ndr_pull_charset(ndr, NDR_SCALARS, &r->in.user, ndr_get_array_length(ndr, &r->in.user), sizeof(uint16_t), CH_UTF16));
user 15210 librpc/gen_ndr/ndr_srvsvc.c ndr_print_ptr(ndr, "user", r->in.user);
user 15212 librpc/gen_ndr/ndr_srvsvc.c if (r->in.user) {
user 15213 librpc/gen_ndr/ndr_srvsvc.c ndr_print_string(ndr, "user", r->in.user);
user 589 librpc/gen_ndr/netlogon.h struct netr_DELTA_USER *user;/* [unique,case(NETR_DELTA_USER)] */
user 716 librpc/gen_ndr/netlogon.h const char *user;/* [unique,charset(UTF16),case(NETLOGON_CONTROL_FIND_USER)] */
user 1515 librpc/gen_ndr/spoolss.h const char *user;/* [unique,charset(UTF16)] */
user 1531 librpc/gen_ndr/spoolss.h const char *user;/* [unique,charset(UTF16)] */
user 28 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 104 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 137 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 171 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 185 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 200 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 212 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 1099 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 1119 librpc/gen_ndr/srvsvc.h const char *user;/* [charset(UTF16)] */
user 1198 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 1246 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 1266 librpc/gen_ndr/srvsvc.h const char *user;/* [unique,charset(UTF16)] */
user 352 nsswitch/libwbclient/wbc_pam.c snprintf(request.data.auth.user,
user 353 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1,
user 359 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.user,
user 361 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1);
user 402 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth_crap.user,
user 404 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth_crap.user)-1);
user 564 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.logoff.user, params->username,
user 565 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.logoff.user)-1);
user 642 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.logoff.user, username,
user 643 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.logoff.user)-1);
user 705 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.chauthtok.user, params->account_name,
user 706 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.chauthtok.user) - 1);
user 777 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.chng_pswd_auth_crap.user,
user 779 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.chng_pswd_auth_crap.user) - 1);
user 944 nsswitch/libwbclient/wbc_pam.c strncpy(request.data.auth.user,
user 946 nsswitch/libwbclient/wbc_pam.c sizeof(request.data.auth.user)-1);
user 241 nsswitch/nsstest.c static int nss_initgroups(char *user, gid_t group, gid_t **groups, long int *start, long int *size)
user 250 nsswitch/nsstest.c status = _nss_initgroups(user, group, start, size, groups, 0, &nss_errno);
user 714 nsswitch/pam_winbind.c const char *user,
user 721 nsswitch/pam_winbind.c "(incorrect password or invalid membership)", user);
user 726 nsswitch/pam_winbind.c user);
user 731 nsswitch/pam_winbind.c user);
user 736 nsswitch/pam_winbind.c "required", user);
user 741 nsswitch/pam_winbind.c user);
user 750 nsswitch/pam_winbind.c "user '%s' granted access", user);
user 753 nsswitch/pam_winbind.c "user '%s' OK", user);
user 760 nsswitch/pam_winbind.c _pam_error_code_str(retval), retval, user);
user 1071 nsswitch/pam_winbind.c const char *user,
user 1127 nsswitch/pam_winbind.c const char *user,
user 1150 nsswitch/pam_winbind.c if (!winbind_name_to_sid_string(ctx, user,
user 1183 nsswitch/pam_winbind.c if (!winbind_name_to_sid_string(ctx, user, search_location,
user 1661 nsswitch/pam_winbind.c const char *user,
user 1717 nsswitch/pam_winbind.c pwd = getpwnam(user);
user 1754 nsswitch/pam_winbind.c if (!winbind_name_list_to_sid_string_list(ctx, user, member,
user 1766 nsswitch/pam_winbind.c logon.username = user;
user 1815 nsswitch/pam_winbind.c user, "wbcLogonUser");
user 1883 nsswitch/pam_winbind.c _pam_warn_logon_type(ctx, user, user_info->user_flags);
user 1886 nsswitch/pam_winbind.c _pam_warn_krb5_failure(ctx, user, user_info->user_flags);
user 1921 nsswitch/pam_winbind.c const char *user,
user 1956 nsswitch/pam_winbind.c params.account_name = user;
user 1964 nsswitch/pam_winbind.c user, "wbcChangeUserPasswordEx");
user 1968 nsswitch/pam_winbind.c "user '%s' password changed", user);
user 2051 nsswitch/pam_winbind.c const char *user)
user 2061 nsswitch/pam_winbind.c pwd = getpwnam(user);
user 2066 nsswitch/pam_winbind.c wbc_status = wbcGetpwnam(user, &wb_pwd);
user 2468 nsswitch/pam_winbind.c const char *user;
user 2488 nsswitch/pam_winbind.c retval = pam_get_user(pamh, &user, _("Username: "));
user 2495 nsswitch/pam_winbind.c if (user == NULL) {
user 2503 nsswitch/pam_winbind.c "username [%s] obtained", user);
user 2511 nsswitch/pam_winbind.c pwd = getpwnam(user);
user 2520 nsswitch/pam_winbind.c logoff.username = user;
user 2556 nsswitch/pam_winbind.c user, "wbcLogoffUser");
user 2564 nsswitch/pam_winbind.c user, wbcErrorString(wbc_status));
user 2575 nsswitch/pam_winbind.c user, "wbcLogoffUser");
user 2960 nsswitch/pam_winbind.c const char *user)
user 2986 nsswitch/pam_winbind.c pwd = getpwnam(user);
user 3008 nsswitch/pam_winbind.c const char *user;
user 3034 nsswitch/pam_winbind.c ret = pam_get_user(pamh, &user, _("Username: "));
user 3041 nsswitch/pam_winbind.c if (user == NULL) {
user 3047 nsswitch/pam_winbind.c _pam_log_debug(ctx, LOG_DEBUG, "username [%s] obtained", user);
user 3050 nsswitch/pam_winbind.c ret = valid_user(ctx, user);
user 3073 nsswitch/pam_winbind.c Announce = talloc_asprintf(ctx, "%s %s", greeting, user);
user 3097 nsswitch/pam_winbind.c ret = winbind_auth_request(ctx, user, pass_old,
user 3194 nsswitch/pam_winbind.c ret = winbind_chauthtok_request(ctx, user, pass_old,
user 3201 nsswitch/pam_winbind.c if (_pam_require_krb5_auth_after_chauthtok(ctx, user)) {
user 3221 nsswitch/pam_winbind.c ret = winbind_auth_request(ctx, user, pass_new,
user 107 nsswitch/wbinfo.c fstring user)
user 116 nsswitch/wbinfo.c fstrcpy(user, domuser);
user 120 nsswitch/wbinfo.c fstrcpy(user, domuser);
user 125 nsswitch/wbinfo.c fstrcpy(user, p+1);
user 160 nsswitch/wbinfo.c static bool wbinfo_get_userinfo(char *user)
user 165 nsswitch/wbinfo.c wbc_status = wbcGetpwnam(user, &pwd);
user 274 nsswitch/wbinfo.c static bool wbinfo_get_usergroups(const char *user)
user 283 nsswitch/wbinfo.c wbc_status = wbcGetGroups(user, &num_groups, &groups);
user 1195 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
user 1199 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
user 1405 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
user 1409 nsswitch/wbinfo.c fstrcpy(request.data.auth.user, username);
user 1511 nsswitch/wbinfo.c fstring user, domain;
user 1515 nsswitch/wbinfo.c parse_wbinfo_domain_user(username, domain, user);
user 1517 nsswitch/wbinfo.c p = strchr(user, '%');
user 1534 nsswitch/wbinfo.c if (user[0]) {
user 1536 nsswitch/wbinfo.c if (!secrets_store(SECRETS_AUTH_USER, user,
user 1537 nsswitch/wbinfo.c strlen(user) + 1)) {
user 1572 nsswitch/wbinfo.c char *user, *domain, *password;
user 1576 nsswitch/wbinfo.c secrets_fetch_ipc_userpass(&user, &domain, &password);
user 1578 nsswitch/wbinfo.c if ((!user || !*user) && (!domain || !*domain ) && (!password || !*password)){
user 1580 nsswitch/wbinfo.c SAFE_FREE(user);
user 1590 nsswitch/wbinfo.c user, password ? "%" : "", password ? password : "");
user 1592 nsswitch/wbinfo.c SAFE_FREE(user);
user 108 nsswitch/wbinfo4.c fstring user)
user 114 nsswitch/wbinfo4.c fstrcpy(user, domuser);
user 119 nsswitch/wbinfo4.c fstrcpy(user, p+1);
user 129 nsswitch/wbinfo4.c static bool wbinfo_get_userinfo(char *user)
user 140 nsswitch/wbinfo4.c fstrcpy(request.data.username, user);
user 246 nsswitch/wbinfo4.c static bool wbinfo_get_usergroups(char *user)
user 258 nsswitch/wbinfo4.c fstrcpy(request.data.username, user);
user 736 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
user 740 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
user 797 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
user 801 nsswitch/wbinfo4.c fstrcpy(request.data.auth.user, username);
user 847 nsswitch/wbinfo4.c fstrcpy(request.data.auth_crap.user, name_user);
user 343 nsswitch/winbind_nss_aix.c static char *wb_aix_getgrset(char *user)
user 352 nsswitch/winbind_nss_aix.c char *r_user = user;
user 354 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) {
user 369 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) {
user 860 nsswitch/winbind_nss_aix.c static int wb_aix_authenticate(char *user, char *pass,
user 866 nsswitch/winbind_nss_aix.c char *r_user = user;
user 868 nsswitch/winbind_nss_aix.c logit("authenticate '%s' response='%s'\n", user, pass);
user 877 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) {
user 884 nsswitch/winbind_nss_aix.c STRCPY_RET(request.data.auth.user, r_user);
user 887 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) {
user 895 nsswitch/winbind_nss_aix.c logit("auth result %d for '%s'\n", result, user);
user 909 nsswitch/winbind_nss_aix.c static int wb_aix_chpass(char *user, char *oldpass, char *newpass, char **message)
user 914 nsswitch/winbind_nss_aix.c char *r_user = user;
user 916 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) {
user 932 nsswitch/winbind_nss_aix.c STRCPY_RET(request.data.chauthtok.user, r_user);
user 936 nsswitch/winbind_nss_aix.c if (*user == WB_AIX_ENCODED) {
user 956 nsswitch/winbind_nss_aix.c static int wb_aix_passwdrestrictions(char *user, char *newpass, char *oldpass,
user 959 nsswitch/winbind_nss_aix.c logit("passwdresrictions called for '%s'\n", user);
user 964 nsswitch/winbind_nss_aix.c static int wb_aix_passwdexpired(char *user, char **message)
user 966 nsswitch/winbind_nss_aix.c logit("passwdexpired '%s'\n", user);
user 975 nsswitch/winbind_nss_aix.c static char *wb_aix_getpasswd(char *user)
user 977 nsswitch/winbind_nss_aix.c logit("getpasswd '%s'\n", user);
user 57 nsswitch/winbind_nss_linux.c NSS_STATUS _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start,
user 1023 nsswitch/winbind_nss_linux.c _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start,
user 1034 nsswitch/winbind_nss_linux.c user, group);
user 1044 nsswitch/winbind_nss_linux.c strncpy(request.data.username, user,
user 1056 nsswitch/winbind_nss_linux.c user, num_gids);
user 1070 nsswitch/winbind_nss_linux.c user, group, gid_list[i]);
user 1119 nsswitch/winbind_nss_linux.c user, nss_err_str(ret), ret);
user 63 nsswitch/winbind_nss_netbsd.c NSS_STATUS _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start,
user 84 nsswitch/winbind_nss_solaris.h NSS_STATUS _nss_winbind_initgroups_dyn(char *user, gid_t group, long int *start,
user 249 nsswitch/winbind_struct_protocol.h fstring user;
user 258 nsswitch/winbind_struct_protocol.h fstring user;
user 268 nsswitch/winbind_struct_protocol.h fstring user;
user 273 nsswitch/winbind_struct_protocol.h fstring user;
user 285 nsswitch/winbind_struct_protocol.h fstring user;
user 316 nsswitch/winbind_struct_protocol.h fstring user;
user 161 source3/auth/auth.c static bool check_domain_match(const char *user, const char *domain)
user 173 source3/auth/auth.c DEBUG(1, ("check_domain_match: Attempt to connect as user %s from domain %s denied.\n", user, domain));
user 84 source3/auth/auth_builtin.c fstring user;
user 86 source3/auth/auth_builtin.c fstrcpy(user, user_info->smb_name);
user 88 source3/auth/auth_builtin.c if (strnequal("NT_STATUS", user, strlen("NT_STATUS"))) {
user 89 source3/auth/auth_builtin.c strupper_m(user);
user 90 source3/auth/auth_builtin.c return nt_status_string_to_code(user);
user 93 source3/auth/auth_builtin.c strlower_m(user);
user 94 source3/auth/auth_builtin.c error_num = strtoul(user, NULL, 16);
user 96 source3/auth/auth_builtin.c DEBUG(5,("check_name_to_ntstatus_security: Error for user %s was %lx\n", user, error_num));
user 97 source3/auth/auth_ntlmssp.c sub_set_smb_name(auth_ntlmssp_state->ntlmssp_state->user);
user 102 source3/auth/auth_ntlmssp.c auth_ntlmssp_state->ntlmssp_state->user,
user 30 source3/auth/auth_unix.c static bool update_smbpassword_file(const char *user, const char *password)
user 40 source3/auth/auth_unix.c ret = pdb_getsampwnam(sampass, user);
user 416 source3/auth/pampass.c static struct pam_conv *smb_setup_pam_conv(smb_pam_conv_fn smb_pam_conv_fnptr, const char *user,
user 428 source3/auth/pampass.c udp->PAM_username = user;
user 462 source3/auth/pampass.c static bool smb_pam_start(pam_handle_t **pamh, const char *user, const char *rhost, struct pam_conv *pconv)
user 472 source3/auth/pampass.c DEBUG(4,("smb_pam_start: PAM: Init user: %s\n", user));
user 474 source3/auth/pampass.c pam_error = pam_start("samba", user, pconv, pamh);
user 506 source3/auth/pampass.c DEBUG(4,("smb_pam_start: PAM: Init passed for user: %s\n", user));
user 513 source3/auth/pampass.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, const char *user)
user 523 source3/auth/pampass.c DEBUG(4,("smb_pam_auth: PAM: Authenticate User: %s\n", user));
user 527 source3/auth/pampass.c DEBUG(2, ("smb_pam_auth: PAM: Authentication Error for user %s\n", user));
user 530 source3/auth/pampass.c DEBUG(2, ("smb_pam_auth: PAM: Insufficient Credentials for user %s\n", user));
user 533 source3/auth/pampass.c DEBUG(2, ("smb_pam_auth: PAM: Authentication Information Unavailable for user %s\n", user));
user 536 source3/auth/pampass.c DEBUG(2, ("smb_pam_auth: PAM: Username %s NOT known to Authentication system\n", user));
user 539 source3/auth/pampass.c DEBUG(2, ("smb_pam_auth: PAM: One or more authentication modules reports user limit for user %s exceeeded\n", user));
user 542 source3/auth/pampass.c DEBUG(0, ("smb_pam_auth: PAM: One or more PAM modules failed to load for user %s\n", user));
user 545 source3/auth/pampass.c DEBUG(4, ("smb_pam_auth: PAM: User %s Authenticated OK\n", user));
user 548 source3/auth/pampass.c DEBUG(0, ("smb_pam_auth: PAM: UNKNOWN ERROR while authenticating user %s\n", user));
user 559 source3/auth/pampass.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user)
user 564 source3/auth/pampass.c DEBUG(4,("smb_pam_account: PAM: Account Management for User: %s\n", user));
user 568 source3/auth/pampass.c DEBUG(2, ("smb_pam_account: PAM: User %s is valid but password is expired\n", user));
user 571 source3/auth/pampass.c DEBUG(2, ("smb_pam_account: PAM: User %s no longer permitted to access system\n", user));
user 574 source3/auth/pampass.c DEBUG(2, ("smb_pam_account: PAM: There was an authentication error for user %s\n", user));
user 577 source3/auth/pampass.c DEBUG(0, ("smb_pam_account: PAM: User %s is NOT permitted to access system at this time\n", user));
user 580 source3/auth/pampass.c DEBUG(0, ("smb_pam_account: PAM: User \"%s\" is NOT known to account management\n", user));
user 583 source3/auth/pampass.c DEBUG(4, ("smb_pam_account: PAM: Account OK for User: %s\n", user));
user 586 source3/auth/pampass.c DEBUG(0, ("smb_pam_account: PAM: UNKNOWN PAM ERROR (%d) during Account Management for User: %s\n", pam_error, user));
user 598 source3/auth/pampass.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user)
user 608 source3/auth/pampass.c DEBUG(4,("PAM: Account Management SetCredentials for User: %s\n", user));
user 612 source3/auth/pampass.c DEBUG(0, ("smb_pam_setcred: PAM: Credentials not found for user:%s\n", user ));
user 615 source3/auth/pampass.c DEBUG(0, ("smb_pam_setcred: PAM: Credentials for user: \"%s\" EXPIRED!\n", user ));
user 618 source3/auth/pampass.c DEBUG(0, ("smb_pam_setcred: PAM: User: \"%s\" is NOT known so can not set credentials!\n", user ));
user 621 source3/auth/pampass.c DEBUG(0, ("smb_pam_setcred: PAM: Unknown setcredentials error - unable to set credentials for %s\n", user ));
user 624 source3/auth/pampass.c DEBUG(4, ("smb_pam_setcred: PAM: SetCredentials OK for User: %s\n", user));
user 627 source3/auth/pampass.c DEBUG(0, ("smb_pam_setcred: PAM: UNKNOWN PAM ERROR (%d) during SetCredentials for User: %s\n", pam_error, user));
user 638 source3/auth/pampass.c static bool smb_internal_pam_session(pam_handle_t *pamh, const char *user, const char *tty, bool flag)
user 666 source3/auth/pampass.c static bool smb_pam_chauthtok(pam_handle_t *pamh, const char * user)
user 670 source3/auth/pampass.c DEBUG(4,("smb_pam_chauthtok: PAM: Password Change for User: %s\n", user));
user 702 source3/auth/pampass.c DEBUG(4, ("PAM: Account OK for User: %s\n", user));
user 705 source3/auth/pampass.c DEBUG(0, ("PAM: UNKNOWN PAM ERROR (%d) for User: %s\n", pam_error, user));
user 720 source3/auth/pampass.c bool smb_pam_claim_session(char *user, char *tty, char *rhost)
user 730 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, NULL, NULL)) == NULL)
user 733 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, rhost, pconv))
user 736 source3/auth/pampass.c if (!smb_internal_pam_session(pamh, user, tty, True)) {
user 748 source3/auth/pampass.c bool smb_pam_close_session(char *user, char *tty, char *rhost)
user 758 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, NULL, NULL)) == NULL)
user 761 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, rhost, pconv))
user 764 source3/auth/pampass.c if (!smb_internal_pam_session(pamh, user, tty, False)) {
user 776 source3/auth/pampass.c NTSTATUS smb_pam_accountcheck(const char * user)
user 787 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, NULL, NULL)) == NULL)
user 790 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, NULL, pconv))
user 793 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user)))
user 794 source3/auth/pampass.c DEBUG(0, ("smb_pam_accountcheck: PAM: Account Validation Failed - Rejecting User %s!\n", user));
user 804 source3/auth/pampass.c NTSTATUS smb_pam_passcheck(const char * user, const char * password)
user 816 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_conv, user, password, NULL)) == NULL)
user 819 source3/auth/pampass.c if (!smb_pam_start(&pamh, user, NULL, pconv))
user 822 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_auth(pamh, user))) {
user 823 source3/auth/pampass.c DEBUG(0, ("smb_pam_passcheck: PAM: smb_pam_auth failed - Rejecting User %s !\n", user));
user 828 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) {
user 829 source3/auth/pampass.c DEBUG(0, ("smb_pam_passcheck: PAM: smb_pam_account failed - Rejecting User %s !\n", user));
user 834 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_setcred(pamh, user))) {
user 835 source3/auth/pampass.c DEBUG(0, ("smb_pam_passcheck: PAM: smb_pam_setcred failed - Rejecting User %s !\n", user));
user 848 source3/auth/pampass.c bool smb_pam_passchange(const char * user, const char * oldpassword, const char * newpassword)
user 854 source3/auth/pampass.c if ((pconv = smb_setup_pam_conv(smb_pam_passchange_conv, user, oldpassword, newpassword)) == NULL)
user 857 source3/auth/pampass.c if(!smb_pam_start(&pamh, user, NULL, pconv))
user 860 source3/auth/pampass.c if (!smb_pam_chauthtok(pamh, user)) {
user 861 source3/auth/pampass.c DEBUG(0, ("smb_pam_passchange: PAM: Password Change Failed for user %s!\n", user));
user 872 source3/auth/pampass.c NTSTATUS smb_pam_accountcheck(const char * user)
user 878 source3/auth/pampass.c bool smb_pam_claim_session(char *user, char *tty, char *rhost)
user 94 source3/auth/pass_check.c static bool afs_auth(char *user, char *password)
user 103 source3/auth/pass_check.c (KA_USERAUTH_VERSION + KA_USERAUTH_DOSETPAG, user, (char *)0, /* instance */
user 113 source3/auth/pass_check.c ("AFS authentication for \"%s\" failed (%s)\n", user, reason));
user 143 source3/auth/pass_check.c static bool dfs_auth(char *user, char *password)
user 259 source3/auth/pass_check.c if (sec_login_setup_identity((unsigned char *)user,
user 265 source3/auth/pass_check.c user, dce_errstr));
user 302 source3/auth/pass_check.c if (sec_login_setup_identity((unsigned char *)user,
user 308 source3/auth/pass_check.c user, dce_errstr));
user 334 source3/auth/pass_check.c user, dce_errstr));
user 357 source3/auth/pass_check.c user, dce_errstr));
user 373 source3/auth/pass_check.c user, sys_getpid()));
user 650 source3/auth/pass_check.c NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password,
user 659 source3/auth/pass_check.c DEBUG(100, ("checking user=[%s] pass=[%s]\n", user, password));
user 675 source3/auth/pass_check.c if (set_this_user(user) == NULL) {
user 679 source3/auth/pass_check.c DEBUG(4, ("pass_check: Checking (PAM) password for user %s (l=%d)\n", user, pwlen));
user 683 source3/auth/pass_check.c DEBUG(4, ("pass_check: Checking password for user %s (l=%d)\n", user, pwlen));
user 686 source3/auth/pass_check.c DEBUG(3, ("Couldn't find user %s\n", user));
user 759 source3/auth/pass_check.c user));
user 760 source3/auth/pass_check.c mypasswd = getprpwnam(user);
user 771 source3/auth/pass_check.c user));
user 824 source3/auth/pass_check.c fn(user, password);
user 854 source3/auth/pass_check.c fn(user, pass2);
user 869 source3/auth/pass_check.c fn(user, pass2);
user 2252 source3/client/client.c char *user = NULL;
user 2260 source3/client/client.c if (!next_token_talloc(ctx, &cmd_ptr,&user,NULL)) {
user 2271 source3/client/client.c user,
user 386 source3/client/mount.cifs.c char user[32];
user 397 source3/client/mount.cifs.c snprintf(user,sizeof(user),"%u",getuid());
user 594 source3/client/mount.cifs.c snprintf(user, sizeof(user), "%u", pw->pw_uid);
user 596 source3/client/mount.cifs.c strlcpy(user,value,sizeof(user));
user 727 source3/client/mount.cifs.c word_len = strlen(user);
user 739 source3/client/mount.cifs.c snprintf(out + out_len, word_len + 5, "uid=%s", user);
user 46 source3/include/ads_protos.h const char *user);
user 44 source3/include/client.h fstring user;
user 263 source3/include/libsmb_internal.h const char * user);
user 225 source3/include/libsmbclient.h char user[128];
user 490 source3/include/libsmbclient.h smbc_setUser(SMBCCTX *c, char * user);
user 2681 source3/include/libsmbclient.h const char *user,
user 2696 source3/include/libsmbclient.h const char *user,
user 2746 source3/include/libsmbclient.h char * user DEPRECATED_SMBC_INTERFACE;
user 451 source3/include/nt_printing.h fstring user;
user 87 source3/include/ntlmssp.h char *user;
user 279 source3/include/passdb.h struct samu *user,
user 285 source3/include/passdb.h struct samu *user);
user 41 source3/include/printing.h fstring user; /* the user who started the job */
user 159 source3/include/proto.h bool smb_pam_claim_session(char *user, char *tty, char *rhost);
user 160 source3/include/proto.h bool smb_pam_close_session(char *user, char *tty, char *rhost);
user 161 source3/include/proto.h NTSTATUS smb_pam_accountcheck(const char * user);
user 162 source3/include/proto.h NTSTATUS smb_pam_passcheck(const char * user, const char * password);
user 163 source3/include/proto.h bool smb_pam_passchange(const char * user, const char * oldpassword, const char * newpassword);
user 164 source3/include/proto.h NTSTATUS smb_pam_accountcheck(const char * user);
user 165 source3/include/proto.h bool smb_pam_claim_session(char *user, char *tty, char *rhost);
user 171 source3/include/proto.h NTSTATUS pass_check(const struct passwd *pass, const char *user, const char *password,
user 796 source3/include/proto.h const char *servicename, const char *user,
user 800 source3/include/proto.h void standard_sub_advanced(const char *servicename, const char *user,
user 994 source3/include/proto.h bool getgroups_unix_user(TALLOC_CTX *mem_ctx, const char *user,
user 1065 source3/include/proto.h char *get_user_home_dir(TALLOC_CTX *mem_ctx, const char *user);
user 1066 source3/include/proto.h struct passwd *Get_Pwnam_alloc(TALLOC_CTX *mem_ctx, const char *user);
user 1212 source3/include/proto.h char **user);
user 1931 source3/include/proto.h ADS_STATUS ads_add_user_acct(ADS_STRUCT *ads, const char *user,
user 2289 source3/include/proto.h ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user,
user 2294 source3/include/proto.h const char *user,
user 2334 source3/include/proto.h const char *user, const char *domain,
user 2584 source3/include/proto.h const char *user,
user 2656 source3/include/proto.h bool cli_NetWkstaUserLogon(struct cli_state *cli,char *user, char *workstation);
user 2661 source3/include/proto.h bool cli_oem_change_password(struct cli_state *cli, const char *user, const char *new_password,
user 2720 source3/include/proto.h int cli_NetFileEnum(struct cli_state *cli, const char * user,
user 2732 source3/include/proto.h bool cli_NetWkstaUserLogoff(struct cli_state *cli, const char *user, const char *workstation);
user 3105 source3/include/proto.h NTSTATUS ntlmssp_set_username(NTLMSSP_STATE *ntlmssp_state, const char *user) ;
user 3253 source3/include/proto.h bool SMBNTLMv2encrypt_hash(const char *user, const char *domain, const uchar nt_hash[16],
user 3258 source3/include/proto.h bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password,
user 4247 source3/include/proto.h const char *user, const char *pszHomedir);
user 4410 source3/include/proto.h NTSTATUS samu_set_unix(struct samu *user, const struct passwd *pwd);
user 4411 source3/include/proto.h NTSTATUS samu_alloc_rid_unix(struct samu *user, const struct passwd *pwd);
user 4546 source3/include/proto.h bool guest_user_info( struct samu *user );
user 4571 source3/include/proto.h NTSTATUS pdb_enum_group_memberships(TALLOC_CTX *mem_ctx, struct samu *user,
user 4574 source3/include/proto.h NTSTATUS pdb_set_unix_primary_group(TALLOC_CTX *mem_ctx, struct samu *user);
user 4634 source3/include/proto.h const char *user,
user 6178 source3/include/proto.h bool check_lanman_password(char *user, uchar * pass1,
user 6181 source3/include/proto.h NTSTATUS pass_oem_change(char *user,
user 6475 source3/include/proto.h bool map_username(fstring user);
user 6725 source3/include/proto.h void add_session_user(const char *user);
user 6728 source3/include/proto.h bool user_in_netgroup(const char *user, const char *ngname);
user 6729 source3/include/proto.h bool user_in_list(const char *user,const char **list);
user 6730 source3/include/proto.h bool authorise_login(int snum, fstring user, DATA_BLOB password,
user 41 source3/include/smb_perfcount.h const char *user, const char *domain);
user 207 source3/include/smbldap.h const char *user,
user 304 source3/include/vfs.h int (*connect_fn)(struct vfs_handle_struct *handle, const char *service, const char *user);
user 30 source3/include/vfs_macros.h #define SMB_VFS_CONNECT(conn, service, user) ((conn)->vfs.ops.connect_fn((conn)->vfs.handles.connect_hnd, (service), (user)))
user 164 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_CONNECT(conn, service, user) ((conn)->vfs_opaque.ops.connect_fn((conn)->vfs_opaque.handles.connect_hnd, (service), (user)))
user 298 source3/include/vfs_macros.h #define SMB_VFS_NEXT_CONNECT(handle, service, user) ((handle)->vfs_next.ops.connect_fn((handle)->vfs_next.handles.connect_hnd, (service), (user)))
user 318 source3/lib/ldb/nssldb/ldb-grp.c NSS_STATUS _nss_ldb_initgroups_dyn(const char *user, gid_t group, long int *start, long int *size, gid_t **groups, long int limit, int *errnop)
user 341 source3/lib/ldb/nssldb/ldb-grp.c _LDB_NSS_PWNAM_FILTER, user);
user 40 source3/lib/netapi/examples/user/user_dispinfo.c struct NET_DISPLAY_USER *user;
user 79 source3/lib/netapi/examples/user/user_dispinfo.c user = (struct NET_DISPLAY_USER *)buffer;
user 82 source3/lib/netapi/examples/user/user_dispinfo.c user->usri1_name);
user 83 source3/lib/netapi/examples/user/user_dispinfo.c user++;
user 91 source3/lib/netapi/file.c i3.fi3_username = talloc_strdup(mem_ctx, info->info3->user);
user 42 source3/lib/netapi/tests/netdisplay.c struct NET_DISPLAY_USER *user;
user 59 source3/lib/netapi/tests/netdisplay.c user = (struct NET_DISPLAY_USER *)buffer;
user 75 source3/lib/netapi/tests/netdisplay.c current_name = user->usri1_name;
user 93 source3/lib/netapi/tests/netdisplay.c user++;
user 1330 source3/lib/netapi/user.c struct NET_DISPLAY_USER *user = NULL;
user 1333 source3/lib/netapi/user.c user = TALLOC_ZERO_ARRAY(mem_ctx,
user 1336 source3/lib/netapi/user.c W_ERROR_HAVE_NO_MEMORY(user);
user 1339 source3/lib/netapi/user.c user[i].usri1_name = talloc_strdup(mem_ctx,
user 1341 source3/lib/netapi/user.c user[i].usri1_comment = talloc_strdup(mem_ctx,
user 1343 source3/lib/netapi/user.c user[i].usri1_flags =
user 1345 source3/lib/netapi/user.c user[i].usri1_full_name = talloc_strdup(mem_ctx,
user 1347 source3/lib/netapi/user.c user[i].usri1_user_id =
user 1349 source3/lib/netapi/user.c user[i].usri1_next_index =
user 1352 source3/lib/netapi/user.c if (!user[i].usri1_name) {
user 1357 source3/lib/netapi/user.c *buffer = talloc_memdup(mem_ctx, user,
user 792 source3/lib/substitute.c static char *alloc_sub_advanced(const char *servicename, const char *user,
user 812 source3/lib/substitute.c a_string = realloc_string_sub(a_string, "%N", automount_server(user));
user 816 source3/lib/substitute.c if ((h = get_user_home_dir(talloc_tos(), user)))
user 831 source3/lib/substitute.c a_string = realloc_string_sub(a_string, "%u", user);
user 867 source3/lib/substitute.c const char *servicename, const char *user,
user 874 source3/lib/substitute.c if (!(a = alloc_sub_advanced(servicename, user, connectpath, gid,
user 884 source3/lib/substitute.c void standard_sub_advanced(const char *servicename, const char *user,
user 891 source3/lib/substitute.c s = alloc_sub_advanced(servicename, user, connectpath,
user 40 source3/lib/system_smbd.c static int getgrouplist_internals(const char *user, gid_t gid, gid_t *groups,
user 71 source3/lib/system_smbd.c if (initgroups(user, gid) != 0) {
user 117 source3/lib/system_smbd.c static int sys_getgrouplist(const char *user, gid_t gid, gid_t *groups, int *grpcnt)
user 122 source3/lib/system_smbd.c DEBUG(10,("sys_getgrouplist: user [%s]\n", user));
user 131 source3/lib/system_smbd.c retval = getgrouplist(user, gid, groups, grpcnt);
user 134 source3/lib/system_smbd.c retval = getgrouplist_internals(user, gid, groups, grpcnt);
user 146 source3/lib/system_smbd.c bool getgroups_unix_user(TALLOC_CTX *mem_ctx, const char *user,
user 162 source3/lib/system_smbd.c if (sys_getgrouplist(user, primary_gid, temp_groups, &max_grp) == -1) {
user 168 source3/lib/system_smbd.c if (sys_getgrouplist(user, primary_gid,
user 35 source3/lib/username.c char *get_user_home_dir(TALLOC_CTX *mem_ctx, const char *user)
user 42 source3/lib/username.c pass = Get_Pwnam_alloc(mem_ctx, user);
user 64 source3/lib/username.c const char *user, char *user2)
user 71 source3/lib/username.c if (!user || !(*user))
user 83 source3/lib/username.c if(strcmp(user, user2) != 0) {
user 85 source3/lib/username.c user));
user 86 source3/lib/username.c ret = getpwnam_alloc(mem_ctx, user);
user 93 source3/lib/username.c if(strcmp(user, user2) != 0) {
user 110 source3/lib/username.c "did":"didn't", user));
user 121 source3/lib/username.c struct passwd *Get_Pwnam_alloc(TALLOC_CTX *mem_ctx, const char *user)
user 126 source3/lib/username.c if ( *user == '\0' ) {
user 131 source3/lib/username.c fstrcpy(user2, user);
user 133 source3/lib/username.c DEBUG(5,("Finding user %s\n", user));
user 135 source3/lib/username.c ret = Get_Pwnam_internals(mem_ctx, user, user2);
user 2944 source3/lib/util.c char **user)
user 2953 source3/lib/util.c *user = talloc_strdup(mem_ctx, p+1);
user 2956 source3/lib/util.c *user = talloc_strdup(mem_ctx, full_name);
user 28 source3/libads/ldap_user.c const char *user)
user 33 source3/libads/ldap_user.c char *escaped_user = escape_ldap_string_alloc(user);
user 48 source3/libads/ldap_user.c ADS_STATUS ads_add_user_acct(ADS_STRUCT *ads, const char *user,
user 60 source3/libads/ldap_user.c else name = user;
user 67 source3/libads/ldap_user.c if (!(upn = talloc_asprintf(ctx, "%s@%s", user, ads->config.realm)))
user 84 source3/libads/ldap_user.c ads_mod_str(ctx, &mods, "sAMAccountName", user);
user 648 source3/libnet/libnet_join.c const char *user,
user 667 source3/libnet/libnet_join.c user,
user 41 source3/libnet/libnet_samsync.c struct netr_DELTA_USER *user = delta->delta_union.user;
user 51 source3/libnet/libnet_samsync.c if (user->lm_password_present) {
user 52 source3/libnet/libnet_samsync.c if (memcmp(user->lmpassword.hash, zero_buf, 16) != 0) {
user 53 source3/libnet/libnet_samsync.c sam_pwd_hash(rid, user->lmpassword.hash, lm_hash.hash, 0);
user 57 source3/libnet/libnet_samsync.c user->lmpassword = lm_hash;
user 60 source3/libnet/libnet_samsync.c if (user->nt_password_present) {
user 61 source3/libnet/libnet_samsync.c if (memcmp(user->ntpassword.hash, zero_buf, 16) != 0) {
user 62 source3/libnet/libnet_samsync.c sam_pwd_hash(rid, user->ntpassword.hash, nt_hash.hash, 0);
user 66 source3/libnet/libnet_samsync.c user->ntpassword = nt_hash;
user 69 source3/libnet/libnet_samsync.c if (user->user_private_info.SensitiveData) {
user 73 source3/libnet/libnet_samsync.c data.data = user->user_private_info.SensitiveData;
user 74 source3/libnet/libnet_samsync.c data.length = user->user_private_info.DataLength;
user 76 source3/libnet/libnet_samsync.c user->user_private_info.SensitiveData = data.data;
user 77 source3/libnet/libnet_samsync.c user->user_private_info.DataLength = data.length;
user 98 source3/libnet/libnet_samsync.c user->lmpassword = lm_hash;
user 99 source3/libnet/libnet_samsync.c user->lm_password_present = true;
user 110 source3/libnet/libnet_samsync.c user->ntpassword = nt_hash;
user 111 source3/libnet/libnet_samsync.c user->nt_password_present = true;
user 185 source3/libnet/libnet_samsync_display.c display_account_info(id.rid, u.user);
user 192 source3/libnet/libnet_samsync_keytab.c r->delta_enum[i].delta_union.user,
user 1114 source3/libnet/libnet_samsync_ldif.c u.user,
user 677 source3/libnet/libnet_samsync_passdb.c r->delta_union.user);
user 58 source3/libsmb/cliconnect.c const char *user,
user 115 source3/libsmb/cliconnect.c p += clistr_push(cli, p, user, -1, STR_TERMINATE|STR_UPPER);
user 133 source3/libsmb/cliconnect.c status = cli_set_username(cli, user);
user 294 source3/libsmb/cliconnect.c const char *user, const char *pass,
user 336 source3/libsmb/cliconnect.c p += clistr_push(cli, p, user, -1, STR_TERMINATE); /* username */
user 360 source3/libsmb/cliconnect.c status = cli_set_username(cli, user);
user 381 source3/libsmb/cliconnect.c static NTSTATUS cli_session_setup_nt1(struct cli_state *cli, const char *user,
user 408 source3/libsmb/cliconnect.c if (!SMBNTLMv2encrypt(user, workgroup, pass, &server_chal,
user 482 source3/libsmb/cliconnect.c p += clistr_push(cli, p, user, -1, STR_TERMINATE);
user 533 source3/libsmb/cliconnect.c result = cli_set_username(cli, user);
user 799 source3/libsmb/cliconnect.c static NTSTATUS cli_session_setup_ntlmssp(struct cli_state *cli, const char *user,
user 817 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) {
user 927 source3/libsmb/cliconnect.c ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user,
user 976 source3/libsmb/cliconnect.c status = cli_set_username(cli, user);
user 992 source3/libsmb/cliconnect.c ret = kerberos_kinit_password(user, pass, 0 /* no time correction for now */, NULL);
user 1068 source3/libsmb/cliconnect.c account = talloc_strdup(talloc_tos(), user);
user 1076 source3/libsmb/cliconnect.c if ((p = strchr_m(user, '@')) != NULL) {
user 1077 source3/libsmb/cliconnect.c account[PTR_DIFF(p,user)] = '\0';
user 1090 source3/libsmb/cliconnect.c const char *user,
user 1098 source3/libsmb/cliconnect.c if (user) {
user 1099 source3/libsmb/cliconnect.c fstrcpy(user2, user);
user 1112 source3/libsmb/cliconnect.c user = p+1;
user 1140 source3/libsmb/cliconnect.c return cli_session_setup_lanman2(cli, user, pass, passlen,
user 1147 source3/libsmb/cliconnect.c if (!user || !*user)
user 1155 source3/libsmb/cliconnect.c return cli_session_setup_plaintext(cli, user, "", workgroup);
user 1166 source3/libsmb/cliconnect.c return cli_session_setup_plaintext(cli, user, pass, workgroup);
user 1172 source3/libsmb/cliconnect.c ADS_STATUS status = cli_session_setup_spnego(cli, user, pass,
user 1182 source3/libsmb/cliconnect.c status = cli_session_setup_nt1(cli, user, pass, passlen,
user 2102 source3/libsmb/cliconnect.c const char *user, const char *domain,
user 2125 source3/libsmb/cliconnect.c nt_status = cli_session_setup(cli, user, password, pw_len, password,
user 2158 source3/libsmb/cliconnect.c nt_status = cli_init_creds(cli, user, domain, password);
user 536 source3/libsmb/clifsinfo.c const char *user,
user 557 source3/libsmb/clifsinfo.c if (!NT_STATUS_IS_OK(status = ntlmssp_set_username(es->s.ntlmssp_state, user))) {
user 97 source3/libsmb/cliprint.c fstrcpy(job.user,
user 51 source3/libsmb/clirap.c bool cli_NetWkstaUserLogon(struct cli_state *cli,char *user, char *workstation)
user 71 source3/libsmb/clirap.c strlcpy(p,user,sizeof(param)-PTR_DIFF(p,param));
user 427 source3/libsmb/clirap.c bool cli_oem_change_password(struct cli_state *cli, const char *user, const char *new_password,
user 441 source3/libsmb/clirap.c if (strlen(user) >= sizeof(fstring)-1) {
user 442 source3/libsmb/clirap.c DEBUG(0,("cli_oem_change_password: user name %s is too long.\n", user));
user 452 source3/libsmb/clirap.c strlcpy(p,user, sizeof(param)-PTR_DIFF(p,param));
user 490 source3/libsmb/clirap.c user ));
user 498 source3/libsmb/clirap.c user ));
user 1243 source3/libsmb/clirap2.c int cli_NetFileEnum(struct cli_state *cli, const char * user,
user 1269 source3/libsmb/clirap2.c PUTSTRING(p, user, RAP_USERNAME_LEN);
user 1844 source3/libsmb/clirap2.c bool cli_NetWkstaUserLogoff(struct cli_state *cli, const char *user, const char *workstation)
user 1868 source3/libsmb/clirap2.c strlcpy(upperbuf, user, sizeof(upperbuf));
user 116 source3/libsmb/libsmb_cache.c const char * user)
user 125 source3/libsmb/libsmb_cache.c strcmp(user, srv->username) == 0) {
user 429 source3/libsmb/libsmb_context.c char *user = NULL;
user 538 source3/libsmb/libsmb_context.c user = getenv("USER");
user 540 source3/libsmb/libsmb_context.c if (!user) {
user 541 source3/libsmb/libsmb_context.c user = SMB_STRDUP("guest");
user 543 source3/libsmb/libsmb_context.c user = SMB_STRDUP(user);
user 546 source3/libsmb/libsmb_context.c if (!user) {
user 551 source3/libsmb/libsmb_context.c smbc_setUser(context, user);
user 639 source3/libsmb/libsmb_context.c const char *user,
user 649 source3/libsmb/libsmb_context.c const char *user,
user 665 source3/libsmb/libsmb_context.c if (! user) {
user 666 source3/libsmb/libsmb_context.c user = smbc_getUser(context);
user 692 source3/libsmb/libsmb_context.c set_cmdline_auth_info_username(auth_info, user);
user 358 source3/libsmb/libsmb_dir.c char *user = NULL;
user 392 source3/libsmb/libsmb_dir.c &user,
user 413 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) {
user 414 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context));
user 415 source3/libsmb/libsmb_dir.c if (!user) {
user 465 source3/libsmb/libsmb_dir.c u_info.username = talloc_strdup(frame,user);
user 555 source3/libsmb/libsmb_dir.c &workgroup, &user, &password);
user 610 source3/libsmb/libsmb_dir.c &workgroup, &user, &password);
user 660 source3/libsmb/libsmb_dir.c &user, &password);
user 696 source3/libsmb/libsmb_dir.c &user, &password);
user 756 source3/libsmb/libsmb_dir.c &workgroup, &user, &password);
user 1122 source3/libsmb/libsmb_dir.c char *user = NULL;
user 1151 source3/libsmb/libsmb_dir.c &user,
user 1159 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) {
user 1160 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context));
user 1161 source3/libsmb/libsmb_dir.c if (!user) {
user 1169 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password);
user 1230 source3/libsmb/libsmb_dir.c char *user = NULL;
user 1259 source3/libsmb/libsmb_dir.c &user,
user 1267 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) {
user 1268 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context));
user 1269 source3/libsmb/libsmb_dir.c if (!user) {
user 1277 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password);
user 1514 source3/libsmb/libsmb_dir.c char *user = NULL;
user 1545 source3/libsmb/libsmb_dir.c &user,
user 1553 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) {
user 1554 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context));
user 1555 source3/libsmb/libsmb_dir.c if (!user) {
user 1563 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password);
user 1605 source3/libsmb/libsmb_dir.c char *user = NULL;
user 1661 source3/libsmb/libsmb_dir.c &user,
user 1669 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) {
user 1670 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context));
user 1671 source3/libsmb/libsmb_dir.c if (!user) {
user 1679 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password);
user 1706 source3/libsmb/libsmb_dir.c char *user = NULL;
user 1737 source3/libsmb/libsmb_dir.c &user,
user 1745 source3/libsmb/libsmb_dir.c if (!user || user[0] == (char)0) {
user 1746 source3/libsmb/libsmb_dir.c user = talloc_strdup(frame, smbc_getUser(context));
user 1747 source3/libsmb/libsmb_dir.c if (!user) {
user 1755 source3/libsmb/libsmb_dir.c server, share, &workgroup, &user, &password);
user 42 source3/libsmb/libsmb_file.c char *user = NULL;
user 76 source3/libsmb/libsmb_file.c &user,
user 84 source3/libsmb/libsmb_file.c if (!user || user[0] == (char)0) {
user 85 source3/libsmb/libsmb_file.c user = talloc_strdup(frame, smbc_getUser(context));
user 86 source3/libsmb/libsmb_file.c if (!user) {
user 94 source3/libsmb/libsmb_file.c server, share, &workgroup, &user, &password);
user 238 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
user 291 source3/libsmb/libsmb_file.c &user,
user 341 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
user 382 source3/libsmb/libsmb_file.c &user,
user 426 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
user 459 source3/libsmb/libsmb_file.c &user,
user 710 source3/libsmb/libsmb_file.c char *server = NULL, *share = NULL, *user = NULL, *password = NULL;
user 757 source3/libsmb/libsmb_file.c &user,
user 816 source3/libsmb/libsmb_file.c char *user = NULL;
user 850 source3/libsmb/libsmb_file.c &user,
user 40 source3/libsmb/libsmb_printjob.c char *user = NULL;
user 67 source3/libsmb/libsmb_printjob.c &user,
user 188 source3/libsmb/libsmb_printjob.c char *user = NULL;
user 216 source3/libsmb/libsmb_printjob.c &user,
user 224 source3/libsmb/libsmb_printjob.c if (!user || user[0] == (char)0) {
user 225 source3/libsmb/libsmb_printjob.c user = talloc_strdup(frame, smbc_getUser(context));
user 226 source3/libsmb/libsmb_printjob.c if (!user) {
user 234 source3/libsmb/libsmb_printjob.c server, share, &workgroup, &user, &password);
user 265 source3/libsmb/libsmb_printjob.c char *user = NULL;
user 294 source3/libsmb/libsmb_printjob.c &user,
user 302 source3/libsmb/libsmb_printjob.c if (!user || user[0] == (char)0) {
user 303 source3/libsmb/libsmb_printjob.c user = talloc_strdup(frame, smbc_getUser(context));
user 304 source3/libsmb/libsmb_printjob.c if (!user) {
user 312 source3/libsmb/libsmb_printjob.c server, share, &workgroup, &user, &password);
user 63 source3/libsmb/libsmb_setget.c return c->user;
user 68 source3/libsmb/libsmb_setget.c smbc_setUser(SMBCCTX *c, char * user)
user 70 source3/libsmb/libsmb_setget.c c->user = user;
user 117 source3/libsmb/libsmb_stat.c char *user = NULL;
user 151 source3/libsmb/libsmb_stat.c &user,
user 159 source3/libsmb/libsmb_stat.c if (!user || user[0] == (char)0) {
user 160 source3/libsmb/libsmb_stat.c user = talloc_strdup(frame, smbc_getUser(context));
user 161 source3/libsmb/libsmb_stat.c if (!user) {
user 169 source3/libsmb/libsmb_stat.c server, share, &workgroup, &user, &password);
user 217 source3/libsmb/libsmb_stat.c char *user = NULL;
user 251 source3/libsmb/libsmb_stat.c &user,
user 1712 source3/libsmb/libsmb_xattr.c char *user = NULL;
user 1748 source3/libsmb/libsmb_xattr.c &user,
user 1756 source3/libsmb/libsmb_xattr.c if (!user || user[0] == (char)0) {
user 1757 source3/libsmb/libsmb_xattr.c user = talloc_strdup(frame, smbc_getUser(context));
user 1758 source3/libsmb/libsmb_xattr.c if (!user) {
user 1766 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password);
user 1774 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password);
user 2008 source3/libsmb/libsmb_xattr.c char *user = NULL;
user 2042 source3/libsmb/libsmb_xattr.c &user,
user 2050 source3/libsmb/libsmb_xattr.c if (!user || user[0] == (char)0) {
user 2051 source3/libsmb/libsmb_xattr.c user = talloc_strdup(frame, smbc_getUser(context));
user 2052 source3/libsmb/libsmb_xattr.c if (!user) {
user 2060 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password);
user 2068 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password);
user 2150 source3/libsmb/libsmb_xattr.c char *user = NULL;
user 2178 source3/libsmb/libsmb_xattr.c &user,
user 2186 source3/libsmb/libsmb_xattr.c if (!user || user[0] == (char)0) {
user 2187 source3/libsmb/libsmb_xattr.c user = talloc_strdup(frame, smbc_getUser(context));
user 2188 source3/libsmb/libsmb_xattr.c if (!user) {
user 2196 source3/libsmb/libsmb_xattr.c server, share, &workgroup, &user, &password);
user 2204 source3/libsmb/libsmb_xattr.c &workgroup, &user, &password);
user 87 source3/libsmb/ntlm_check.c const char *user, const char *domain,
user 127 source3/libsmb/ntlm_check.c if (!ntv2_owf_gen(part_passwd, user, domain, upper_case_domain, kr)) {
user 147 source3/libsmb/ntlmssp.c NTSTATUS ntlmssp_set_username(NTLMSSP_STATE *ntlmssp_state, const char *user)
user 149 source3/libsmb/ntlmssp.c ntlmssp_state->user = talloc_strdup(ntlmssp_state, user ? user : "" );
user 150 source3/libsmb/ntlmssp.c if (!ntlmssp_state->user) {
user 647 source3/libsmb/ntlmssp.c char *user = NULL;
user 666 source3/libsmb/ntlmssp.c ntlmssp_state->user = NULL;
user 677 source3/libsmb/ntlmssp.c &user,
user 682 source3/libsmb/ntlmssp.c SAFE_FREE(user);
user 701 source3/libsmb/ntlmssp.c &user,
user 706 source3/libsmb/ntlmssp.c SAFE_FREE(user);
user 718 source3/libsmb/ntlmssp.c SAFE_FREE(user);
user 724 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) {
user 726 source3/libsmb/ntlmssp.c SAFE_FREE(user);
user 734 source3/libsmb/ntlmssp.c SAFE_FREE(user);
user 741 source3/libsmb/ntlmssp.c SAFE_FREE(user);
user 745 source3/libsmb/ntlmssp.c ntlmssp_state->user, ntlmssp_state->domain, ntlmssp_state->workstation, (unsigned long)ntlmssp_state->lm_resp.length, (unsigned long)ntlmssp_state->nt_resp.length));
user 1092 source3/libsmb/ntlmssp.c if (!SMBNTLMv2encrypt_hash(ntlmssp_state->user,
user 1186 source3/libsmb/ntlmssp.c ntlmssp_state->user,
user 34 source3/libsmb/passchange.c char *user, *domain, *p;
user 39 source3/libsmb/passchange.c user = talloc_strdup(talloc_tos(), user_name);
user 40 source3/libsmb/passchange.c SMB_ASSERT(user != NULL);
user 45 source3/libsmb/passchange.c if ((p = strchr_m(user,'\\')) || (p = strchr_m(user,'/')) ||
user 46 source3/libsmb/passchange.c (p = strchr_m(user,*lp_winbind_separator()))) {
user 48 source3/libsmb/passchange.c domain = user;
user 49 source3/libsmb/passchange.c user = p+1;
user 156 source3/libsmb/passchange.c result = cli_init_creds(cli, user, domain, old_passwd);
user 181 source3/libsmb/passchange.c domain, user,
user 237 source3/libsmb/samlogon_cache.c TALLOC_FREE( user );
user 167 source3/libsmb/smbencrypt.c smb_ucs2_t *user;
user 175 source3/libsmb/smbencrypt.c if (!push_ucs2_allocate(&user, user_in, &user_byte_len)) {
user 184 source3/libsmb/smbencrypt.c SAFE_FREE(user);
user 188 source3/libsmb/smbencrypt.c strupper_w(user);
user 201 source3/libsmb/smbencrypt.c hmac_md5_update((const unsigned char *)user, user_byte_len, &ctx);
user 207 source3/libsmb/smbencrypt.c dump_data(100, (uint8 *)user, user_byte_len);
user 213 source3/libsmb/smbencrypt.c SAFE_FREE(user);
user 435 source3/libsmb/smbencrypt.c bool SMBNTLMv2encrypt_hash(const char *user, const char *domain, const uchar nt_hash[16],
user 447 source3/libsmb/smbencrypt.c if (!ntv2_owf_gen(nt_hash, user, domain, False, ntlm_v2_hash)) {
user 474 source3/libsmb/smbencrypt.c bool SMBNTLMv2encrypt(const char *user, const char *domain, const char *password,
user 483 source3/libsmb/smbencrypt.c return SMBNTLMv2encrypt_hash(user, domain, nt_hash,
user 286 source3/modules/perfcount_onefs.c uid_t uid, const char *user,
user 29 source3/modules/perfcount_test.c char *user;
user 109 source3/modules/perfcount_test.c DEBUG(lvl,("user - %s\n", id->user));
user 355 source3/modules/perfcount_test.c uid_t uid, const char *user,
user 823 source3/modules/vfs_acl_tdb.c const char *user)
user 828 source3/modules/vfs_acl_tdb.c res = SMB_VFS_NEXT_CONNECT(handle, service, user);
user 142 source3/modules/vfs_afsacl.c const char *user, *domain;
user 145 source3/modules/vfs_afsacl.c &domain, &user, &type);
user 1054 source3/modules/vfs_afsacl.c const char *user)
user 1063 source3/modules/vfs_afsacl.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 31 source3/modules/vfs_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user);
user 126 source3/modules/vfs_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user)
user 133 source3/modules/vfs_audit.c svc, user);
user 135 source3/modules/vfs_audit.c result = SMB_VFS_NEXT_CONNECT(handle, svc, user);
user 90 source3/modules/vfs_cacheprime.c const char * user)
user 98 source3/modules/vfs_cacheprime.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 121 source3/modules/vfs_cacheprime.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 162 source3/modules/vfs_commit.c const char * user)
user 165 source3/modules/vfs_commit.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 32 source3/modules/vfs_default.c static int vfswrap_connect(vfs_handle_struct *handle, const char *service, const char *user)
user 34 source3/modules/vfs_extd_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user);
user 129 source3/modules/vfs_extd_audit.c static int audit_connect(vfs_handle_struct *handle, const char *svc, const char *user)
user 138 source3/modules/vfs_extd_audit.c svc, user);
user 141 source3/modules/vfs_extd_audit.c svc, user));
user 143 source3/modules/vfs_extd_audit.c result = SMB_VFS_NEXT_CONNECT(handle, svc, user);
user 180 source3/modules/vfs_fileid.c const char *service, const char *user)
user 217 source3/modules/vfs_fileid.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 75 source3/modules/vfs_full_audit.c const char *svc, const char *user);
user 944 source3/modules/vfs_full_audit.c const char *svc, const char *user)
user 974 source3/modules/vfs_full_audit.c result = SMB_VFS_NEXT_CONNECT(handle, svc, user);
user 29 source3/modules/vfs_onefs.c const char *user)
user 39 source3/modules/vfs_onefs.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 102 source3/modules/vfs_prealloc.c const char * user)
user 107 source3/modules/vfs_prealloc.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 128 source3/modules/vfs_readahead.c const char *user)
user 155 source3/modules/vfs_readahead.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 58 source3/modules/vfs_readonly.c const char *user)
user 88 source3/modules/vfs_readonly.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 34 source3/modules/vfs_recycle.c static int recycle_connect(vfs_handle_struct *handle, const char *service, const char *user);
user 50 source3/modules/vfs_recycle.c static int recycle_connect(vfs_handle_struct *handle, const char *service, const char *user)
user 53 source3/modules/vfs_recycle.c service,user));
user 55 source3/modules/vfs_recycle.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 268 source3/modules/vfs_smb_traffic_analyzer.c const char *user)
user 328 source3/modules/vfs_smb_traffic_analyzer.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 89 source3/modules/vfs_tsmsm.c const char *user) {
user 137 source3/modules/vfs_tsmsm.c return SMB_VFS_NEXT_CONNECT(handle, service, user);
user 740 source3/modules/vfs_xattr_tdb.c const char *user)
user 746 source3/modules/vfs_xattr_tdb.c res = SMB_VFS_NEXT_CONNECT(handle, service, user);
user 124 source3/nmbd/nmbd_processlogon.c char *user = skip_string(buf,len,machine);
user 126 source3/nmbd/nmbd_processlogon.c if (!user || PTR_DIFF(user, buf) >= len) {
user 130 source3/nmbd/nmbd_processlogon.c getdc = skip_string(buf,len,user);
user 147 source3/nmbd/nmbd_processlogon.c pull_ascii_fstring(user_str, user);
user 123 source3/pam_smbpass/general.h char *user; /* user that's failed to be authenticated */
user 48 source3/pam_smbpass/pam_smb_passwd.c int smb_update_db( pam_handle_t *pamh, int ctrl, const char *user, const char *pass_new )
user 54 source3/pam_smbpass/pam_smb_passwd.c retval = NT_STATUS_IS_OK(local_password_change(user, LOCAL_SET_PASSWORD, pass_new,
user 103 source3/pam_smbpass/pam_smb_passwd.c const char *user;
user 118 source3/pam_smbpass/pam_smb_passwd.c retval = pam_get_user( pamh, &user, "Username: " );
user 126 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "username [%s] obtained", user);
user 150 source3/pam_smbpass/pam_smb_passwd.c if (!pdb_getsampwnam(sampass,user)) {
user 151 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ALERT, "Failed to find entry for user %s.", user);
user 156 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_DEBUG, "Located account for %s", user);
user 180 source3/pam_smbpass/pam_smb_passwd.c Announce = SMB_MALLOC_ARRAY(char, sizeof(greeting)+strlen(user));
user 188 source3/pam_smbpass/pam_smb_passwd.c strncpy( Announce+sizeof(greeting)-1, user, strlen(user)+1 );
user 304 source3/pam_smbpass/pam_smb_passwd.c retval = smb_update_db(pamh, ctrl, user, pass_new);
user 314 source3/pam_smbpass/pam_smb_passwd.c user, uidtoname(getuid()), getuid());
user 317 source3/pam_smbpass/pam_smb_passwd.c user, uid, uidtoname(getuid()), getuid());
user 320 source3/pam_smbpass/pam_smb_passwd.c _log_err(pamh, LOG_ERR, "password change failed for user %s", user);
user 328 source3/pam_smbpass/support.c , failure->user, failure->id );
user 339 source3/pam_smbpass/support.c _pam_delete( failure->user ); /* tidy up */
user 443 source3/pam_smbpass/support.c newauth->user = smbpXstrDup( pamh, name );
user 6098 source3/param/loadparm.c const char *user, const char *pszHomedir)
user 6102 source3/param/loadparm.c if (pszHomename == NULL || user == NULL || pszHomedir == NULL ||
user 6119 source3/param/loadparm.c if (asprintf(&comment, "Home directory of %s", user) < 0) {
user 6134 source3/param/loadparm.c user, ServicePtrs[i]->szPath ));
user 51 source3/passdb/passdb.c static int samu_destroy(struct samu *user)
user 53 source3/passdb/passdb.c data_blob_clear_free( &user->lm_pw );
user 54 source3/passdb/passdb.c data_blob_clear_free( &user->nt_pw );
user 56 source3/passdb/passdb.c if ( user->plaintext_pw )
user 57 source3/passdb/passdb.c memset( user->plaintext_pw, 0x0, strlen(user->plaintext_pw) );
user 68 source3/passdb/passdb.c struct samu *user;
user 70 source3/passdb/passdb.c if ( !(user = TALLOC_ZERO_P( ctx, struct samu )) ) {
user 75 source3/passdb/passdb.c talloc_set_destructor( user, samu_destroy );
user 79 source3/passdb/passdb.c user->methods = NULL;
user 84 source3/passdb/passdb.c user->logon_time = (time_t)0;
user 85 source3/passdb/passdb.c user->pass_last_set_time = (time_t)0;
user 86 source3/passdb/passdb.c user->pass_can_change_time = (time_t)0;
user 87 source3/passdb/passdb.c user->logoff_time = get_time_t_max();
user 88 source3/passdb/passdb.c user->kickoff_time = get_time_t_max();
user 89 source3/passdb/passdb.c user->pass_must_change_time = get_time_t_max();
user 90 source3/passdb/passdb.c user->fields_present = 0x00ffffff;
user 91 source3/passdb/passdb.c user->logon_divs = 168; /* hours per week */
user 92 source3/passdb/passdb.c user->hours_len = 21; /* 21 times 8 bits = 168 */
user 93 source3/passdb/passdb.c memset(user->hours, 0xff, user->hours_len); /* available at all hours */
user 94 source3/passdb/passdb.c user->bad_password_count = 0;
user 95 source3/passdb/passdb.c user->logon_count = 0;
user 96 source3/passdb/passdb.c user->unknown_6 = 0x000004ec; /* don't know */
user 101 source3/passdb/passdb.c user->username = "";
user 102 source3/passdb/passdb.c user->domain = "";
user 103 source3/passdb/passdb.c user->nt_username = "";
user 104 source3/passdb/passdb.c user->full_name = "";
user 105 source3/passdb/passdb.c user->home_dir = "";
user 106 source3/passdb/passdb.c user->logon_script = "";
user 107 source3/passdb/passdb.c user->profile_path = "";
user 108 source3/passdb/passdb.c user->acct_desc = "";
user 109 source3/passdb/passdb.c user->workstations = "";
user 110 source3/passdb/passdb.c user->comment = "";
user 111 source3/passdb/passdb.c user->munged_dial = "";
user 113 source3/passdb/passdb.c user->plaintext_pw = NULL;
user 119 source3/passdb/passdb.c user->acct_ctrl = ACB_NORMAL;
user 121 source3/passdb/passdb.c return user;
user 130 source3/passdb/passdb.c static NTSTATUS samu_set_unix_internal(struct samu *user, const struct passwd *pwd, bool create)
user 142 source3/passdb/passdb.c pdb_set_username(user, pwd->pw_name, PDB_SET);
user 143 source3/passdb/passdb.c pdb_set_fullname(user, pwd->pw_gecos, PDB_SET);
user 144 source3/passdb/passdb.c pdb_set_domain (user, get_global_sam_name(), PDB_DEFAULT);
user 152 source3/passdb/passdb.c pdb_set_group_sid(user, &group_sid, PDB_SET);
user 157 source3/passdb/passdb.c user->unix_pw = tcopy_passwd( user, pwd );
user 162 source3/passdb/passdb.c if ( !pdb_set_user_sid_from_rid(user, DOMAIN_USER_RID_GUEST, PDB_DEFAULT)) {
user 173 source3/passdb/passdb.c if (!pdb_set_acct_ctrl(user, ACB_WSTRUST, PDB_DEFAULT)) {
user 182 source3/passdb/passdb.c if (!pdb_set_acct_ctrl(user, ACB_NORMAL, PDB_DEFAULT)) {
user 190 source3/passdb/passdb.c pdb_set_profile_path(user, talloc_sub_specified(user,
user 193 source3/passdb/passdb.c pdb_set_homedir(user, talloc_sub_specified(user,
user 196 source3/passdb/passdb.c pdb_set_dir_drive(user, talloc_sub_specified(user,
user 199 source3/passdb/passdb.c pdb_set_logon_script(user, talloc_sub_specified(user,
user 221 source3/passdb/passdb.c if ( !pdb_set_user_sid(user, &user_sid, PDB_SET) ) {
user 231 source3/passdb/passdb.c urid = algorithmic_pdb_uid_to_user_rid( user->unix_pw->pw_uid );
user 233 source3/passdb/passdb.c if ( !pdb_set_user_sid_from_rid( user, urid, PDB_SET) ) {
user 244 source3/passdb/passdb.c NTSTATUS samu_set_unix(struct samu *user, const struct passwd *pwd)
user 246 source3/passdb/passdb.c return samu_set_unix_internal( user, pwd, False );
user 249 source3/passdb/passdb.c NTSTATUS samu_alloc_rid_unix(struct samu *user, const struct passwd *pwd)
user 251 source3/passdb/passdb.c return samu_set_unix_internal( user, pwd, True );
user 245 source3/passdb/pdb_interface.c bool guest_user_info( struct samu *user )
user 257 source3/passdb/pdb_interface.c result = samu_set_unix(user, pwd );
user 710 source3/passdb/pdb_interface.c NTSTATUS pdb_enum_group_memberships(TALLOC_CTX *mem_ctx, struct samu *user,
user 716 source3/passdb/pdb_interface.c pdb, mem_ctx, user,
user 740 source3/passdb/pdb_interface.c NTSTATUS pdb_set_unix_primary_group(TALLOC_CTX *mem_ctx, struct samu *user)
user 743 source3/passdb/pdb_interface.c return pdb->set_unix_primary_group(pdb, mem_ctx, user);
user 1133 source3/passdb/pdb_interface.c static NTSTATUS pdb_default_getsampwnam (struct pdb_methods *methods, struct samu *user, const char *sname)
user 1138 source3/passdb/pdb_interface.c static NTSTATUS pdb_default_getsampwsid(struct pdb_methods *my_methods, struct samu * user, const DOM_SID *sid)
user 1452 source3/passdb/pdb_interface.c struct samu *user,
user 1460 source3/passdb/pdb_interface.c const char *username = pdb_get_username(user);
user 333 source3/passdb/pdb_ldap.c const char *user,
user 338 source3/passdb/pdb_ldap.c char *escape_user = escape_ldap_string_alloc(user);
user 1494 source3/passdb/pdb_ldap.c static NTSTATUS ldapsam_getsampwnam(struct pdb_methods *my_methods, struct samu *user, const char *sname)
user 1504 source3/passdb/pdb_ldap.c attr_list = get_userattr_list( user, ldap_state->schema_ver );
user 1505 source3/passdb/pdb_ldap.c append_attr(user, &attr_list,
user 1508 source3/passdb/pdb_ldap.c append_attr(user, &attr_list, "uidNumber");
user 1530 source3/passdb/pdb_ldap.c if (!init_sam_from_ldap(ldap_state, user, entry)) {
user 1535 source3/passdb/pdb_ldap.c pdb_set_backend_private_data(user, result, NULL,
user 1537 source3/passdb/pdb_ldap.c talloc_autofree_ldapmsg(user, result);
user 1596 source3/passdb/pdb_ldap.c static NTSTATUS ldapsam_getsampwsid(struct pdb_methods *my_methods, struct samu * user, const DOM_SID *sid)
user 1630 source3/passdb/pdb_ldap.c if (!init_sam_from_ldap(ldap_state, user, entry)) {
user 1636 source3/passdb/pdb_ldap.c pdb_set_backend_private_data(user, result, NULL,
user 1638 source3/passdb/pdb_ldap.c talloc_autofree_ldapmsg(user, result);
user 2806 source3/passdb/pdb_ldap.c struct samu *user,
user 2828 source3/passdb/pdb_ldap.c if (pdb_get_username(user) == NULL) {
user 2832 source3/passdb/pdb_ldap.c escape_name = escape_ldap_string_alloc(pdb_get_username(user));
user 2858 source3/passdb/pdb_ldap.c DEBUG(1, ("User account [%s] not found!\n", pdb_get_username(user)));
user 2960 source3/passdb/pdb_ldap.c pdb_get_username(user)));
user 4986 source3/passdb/pdb_ldap.c struct samu *user;
user 5064 source3/passdb/pdb_ldap.c user = samu_new(tmp_ctx);
user 5065 source3/passdb/pdb_ldap.c if (!user) {
user 5070 source3/passdb/pdb_ldap.c if (!pdb_set_username(user, name, PDB_SET)) {
user 5074 source3/passdb/pdb_ldap.c if (!pdb_set_domain(user, get_global_sam_name(), PDB_SET)) {
user 5080 source3/passdb/pdb_ldap.c if (!pdb_set_acct_ctrl(user, ACB_WSTRUST, PDB_SET)) {
user 5085 source3/passdb/pdb_ldap.c if (!pdb_set_acct_ctrl(user, acb_info, PDB_SET)) {
user 5091 source3/passdb/pdb_ldap.c if (!pdb_set_acct_ctrl(user, ACB_NORMAL | ACB_DISABLED, PDB_SET)) {
user 5097 source3/passdb/pdb_ldap.c if (!pdb_set_user_sid(user, &user_sid, PDB_SET)) {
user 5102 source3/passdb/pdb_ldap.c if (!init_ldap_from_sam(ldap_state, NULL, &mods, user, element_is_set_or_changed)) {
user 5197 source3/passdb/pdb_ldap.c struct samu *user,
user 166 source3/passdb/pdb_smbpasswd.c static void pdb_init_smb(struct smb_passwd *user)
user 168 source3/passdb/pdb_smbpasswd.c if (user == NULL)
user 170 source3/passdb/pdb_smbpasswd.c ZERO_STRUCTP (user);
user 172 source3/passdb/pdb_smbpasswd.c user->pass_last_set_time = (time_t)0;
user 1614 source3/passdb/pdb_smbpasswd.c struct samu *user;
user 1621 source3/passdb/pdb_smbpasswd.c user = samu_new(talloc_tos());
user 1622 source3/passdb/pdb_smbpasswd.c if (user == NULL) {
user 1627 source3/passdb/pdb_smbpasswd.c if (!build_sam_account(smbpasswd_state, user, pwd)) {
user 1634 source3/passdb/pdb_smbpasswd.c entry.acct_flags = pdb_get_acct_ctrl(user);
user 1635 source3/passdb/pdb_smbpasswd.c sid_peek_rid(pdb_get_user_sid(user), &entry.rid);
user 1637 source3/passdb/pdb_smbpasswd.c search_state, pdb_get_username(user));
user 1639 source3/passdb/pdb_smbpasswd.c search_state, pdb_get_fullname(user));
user 1641 source3/passdb/pdb_smbpasswd.c search_state, pdb_get_acct_desc(user));
user 1643 source3/passdb/pdb_smbpasswd.c TALLOC_FREE(user);
user 65 source3/passdb/pdb_tdb.c struct samu *user;
user 77 source3/passdb/pdb_tdb.c user = samu_new(talloc_tos());
user 78 source3/passdb/pdb_tdb.c if (user == NULL) {
user 89 source3/passdb/pdb_tdb.c ret = init_samu_from_buffer(user, SAMU_BUFFER_V0,
user 94 source3/passdb/pdb_tdb.c ret = init_samu_from_buffer(user, SAMU_BUFFER_V1,
user 99 source3/passdb/pdb_tdb.c ret = init_samu_from_buffer(user, SAMU_BUFFER_V2,
user 104 source3/passdb/pdb_tdb.c ret = init_samu_from_buffer(user, SAMU_BUFFER_V3,
user 109 source3/passdb/pdb_tdb.c ret = init_samu_from_buffer(user, SAMU_BUFFER_V4,
user 121 source3/passdb/pdb_tdb.c TALLOC_FREE(user);
user 126 source3/passdb/pdb_tdb.c data.dsize = init_buffer_from_samu(&data.dptr, user, false);
user 127 source3/passdb/pdb_tdb.c TALLOC_FREE(user);
user 528 source3/passdb/pdb_tdb.c struct samu *user, const char *sname)
user 534 source3/passdb/pdb_tdb.c if ( !user ) {
user 564 source3/passdb/pdb_tdb.c if (!init_samu_from_buffer(user, SAMU_BUFFER_LATEST, data.dptr, data.dsize)) {
user 582 source3/passdb/pdb_tdb.c struct samu *user, uint32 rid)
user 589 source3/passdb/pdb_tdb.c if ( !user ) {
user 616 source3/passdb/pdb_tdb.c return tdbsam_getsampwnam (my_methods, user, name);
user 620 source3/passdb/pdb_tdb.c struct samu * user, const DOM_SID *sid)
user 627 source3/passdb/pdb_tdb.c return tdbsam_getsampwrid(my_methods, user, rid);
user 1139 source3/passdb/pdb_tdb.c struct samu *user = NULL;
user 1144 source3/passdb/pdb_tdb.c TALLOC_FREE(user);
user 1145 source3/passdb/pdb_tdb.c user = samu_new(talloc_tos());
user 1146 source3/passdb/pdb_tdb.c if (user == NULL) {
user 1157 source3/passdb/pdb_tdb.c status = tdbsam_getsampwrid(state->methods, user, rid);
user 1169 source3/passdb/pdb_tdb.c TALLOC_FREE(user);
user 1174 source3/passdb/pdb_tdb.c ((state->acct_flags & pdb_get_acct_ctrl(user)) == 0)) {
user 1178 source3/passdb/pdb_tdb.c entry->acct_flags = pdb_get_acct_ctrl(user);
user 1180 source3/passdb/pdb_tdb.c entry->account_name = talloc_strdup(search, pdb_get_username(user));
user 1181 source3/passdb/pdb_tdb.c entry->fullname = talloc_strdup(search, pdb_get_fullname(user));
user 1182 source3/passdb/pdb_tdb.c entry->description = talloc_strdup(search, pdb_get_acct_desc(user));
user 1184 source3/passdb/pdb_tdb.c TALLOC_FREE(user);
user 45 source3/passdb/pdb_wbc_sam.c struct samu *user,
user 53 source3/passdb/pdb_wbc_sam.c memset(user, 0, sizeof(user));
user 56 source3/passdb/pdb_wbc_sam.c user->methods = methods;
user 57 source3/passdb/pdb_wbc_sam.c result = samu_set_unix(user, pwd);
user 62 source3/passdb/pdb_wbc_sam.c static NTSTATUS pdb_wbc_sam_getsampwnam(struct pdb_methods *methods, struct samu *user, const char *sname)
user 64 source3/passdb/pdb_wbc_sam.c return _pdb_wbc_sam_getsampw(methods, user, winbind_getpwnam(sname));
user 67 source3/passdb/pdb_wbc_sam.c static NTSTATUS pdb_wbc_sam_getsampwsid(struct pdb_methods *methods, struct samu *user, const DOM_SID *sid)
user 69 source3/passdb/pdb_wbc_sam.c return _pdb_wbc_sam_getsampw(methods, user, winbind_getpwsid(sid));
user 95 source3/passdb/pdb_wbc_sam.c struct samu *user,
user 101 source3/passdb/pdb_wbc_sam.c const char *username = pdb_get_username(user);
user 615 source3/printing/print_cups.c char *user = NULL;
user 662 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &user, pjob->user, &size)) {
user 667 source3/printing/print_cups.c NULL, user);
user 712 source3/printing/print_cups.c char *user = NULL;
user 759 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &user, pjob->user, &size)) {
user 763 source3/printing/print_cups.c NULL, user);
user 808 source3/printing/print_cups.c char *user = NULL;
user 855 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &user, pjob->user, &size)) {
user 859 source3/printing/print_cups.c NULL, user);
user 910 source3/printing/print_cups.c char *user = NULL;
user 966 source3/printing/print_cups.c if (!push_utf8_talloc(frame, &user, pjob->user, &size)) {
user 970 source3/printing/print_cups.c NULL, user);
user 486 source3/printing/print_iprint.c NULL, pjob->user);
user 584 source3/printing/print_iprint.c NULL, pjob->user);
user 682 source3/printing/print_iprint.c NULL, pjob->user);
user 780 source3/printing/print_iprint.c NULL, pjob->user);
user 303 source3/printing/printing.c pjob->user,
user 493 source3/printing/printing.c notify_job_username(sharename, jobid, new_data->user);
user 555 source3/printing/printing.c pjob->user,
user 697 source3/printing/printing.c fstrcpy(pj.user, old_pj ? old_pj->user : q->fs_user);
user 838 source3/printing/printing.c fstrcpy(ts->queue[i].fs_user, pjob.user);
user 2016 source3/printing/printing.c return strequal(pjob->user, server_info->sanitized_username);
user 2472 source3/printing/printing.c fstrcpy(pjob.user, lp_printjob_username(snum));
user 2477 source3/printing/printing.c pjob.user, sizeof(pjob.user)-1);
user 2479 source3/printing/printing.c pjob.user[sizeof(pjob.user)-1] = '\0';
user 2712 source3/printing/printing.c fstrcpy(queue[total_count].fs_user, pjob->user);
user 49 source3/rpc_client/cli_spoolss.c level1.user = cli->auth->user_name;
user 166 source3/rpc_client/cli_spoolss.c level1.user = cli->auth->user_name;
user 652 source3/rpc_server/srv_pipe.c "workstation: %s\n", a->ntlmssp_state->user,
user 97 source3/rpc_server/srv_srvsvc_nt.c fenum->ctr3->array[i].user = username;
user 200 source3/rpc_server/srv_srvsvc_nt.c fenum->ctr3->array[i].user = username;
user 878 source3/rpc_server/srv_srvsvc_nt.c ctr1->array[num_entries].user = session_list[resume_handle].username;
user 993 source3/rpc_server/srv_srvsvc_nt.c ctr1->array[num_entries].user = "dummy_user";
user 1044 source3/rpc_server/srv_srvsvc_nt.c werr = net_enum_files(ctx, r->in.user, &ctr3, resume_hnd);
user 1049 source3/rpc_server/srv_srvsvc_nt.c werr = net_enum_pipes(ctx, r->in.user, &ctr3, resume_hnd);
user 1252 source3/rpc_server/srv_srvsvc_nt.c username = r->in.user;
user 474 source3/rpcclient/cmd_netlogon.c u.user->account_name.string);
user 2372 source3/rpcclient/cmd_samr.c const char *user, *oldpass, *newpass;
user 2382 source3/rpcclient/cmd_samr.c user = argv[1];
user 2408 source3/rpcclient/cmd_samr.c init_lsa_String(&lsa_acct_name, user);
user 2464 source3/rpcclient/cmd_samr.c const char *user, *oldpass, *newpass;
user 2472 source3/rpcclient/cmd_samr.c user = argv[1];
user 2497 source3/rpcclient/cmd_samr.c result = rpccli_samr_chgpasswd_user2(cli, mem_ctx, user, newpass, oldpass);
user 2521 source3/rpcclient/cmd_samr.c const char *user, *oldpass, *newpass;
user 2531 source3/rpcclient/cmd_samr.c user = argv[1];
user 2557 source3/rpcclient/cmd_samr.c user,
user 2607 source3/rpcclient/cmd_samr.c const char *user, *param;
user 2625 source3/rpcclient/cmd_samr.c user = argv[1];
user 2762 source3/rpcclient/cmd_samr.c user_rid = strtol(user, NULL, 0);
user 2778 source3/rpcclient/cmd_samr.c init_lsa_String(&lsa_acct_name, user);
user 688 source3/rpcclient/cmd_srvsvc.c const char *user = NULL;
user 700 source3/rpcclient/cmd_srvsvc.c user = argv[2];
user 744 source3/rpcclient/cmd_srvsvc.c user,
user 50 source3/smbd/chgpasswd.c static NTSTATUS check_oem_password(const char *user,
user 639 source3/smbd/chgpasswd.c bool check_lanman_password(char *user, uchar * pass1,
user 655 source3/smbd/chgpasswd.c ret = pdb_getsampwnam(sampass, user);
user 668 source3/smbd/chgpasswd.c DEBUG(0,("check_lanman_password: account %s disabled.\n", user));
user 775 source3/smbd/chgpasswd.c NTSTATUS pass_oem_change(char *user,
user 792 source3/smbd/chgpasswd.c ret = pdb_getsampwnam(sampass, user);
user 801 source3/smbd/chgpasswd.c nt_status = check_oem_password(user,
user 838 source3/smbd/chgpasswd.c static NTSTATUS check_oem_password(const char *user,
user 867 source3/smbd/chgpasswd.c DEBUG(2,("check_lanman_password: account %s disabled.\n", user));
user 901 source3/smbd/chgpasswd.c user));
user 906 source3/smbd/chgpasswd.c user));
user 909 source3/smbd/chgpasswd.c user));
user 914 source3/smbd/chgpasswd.c user));
user 2568 source3/smbd/lanman.c fstring user;
user 2583 source3/smbd/lanman.c pull_ascii_fstring(user,p);
user 2613 source3/smbd/lanman.c DEBUG(3,("Set password for <%s>\n",user));
user 2624 source3/smbd/lanman.c if (NT_STATUS_IS_OK(check_plaintext_password(user,password,&server_info))) {
user 2650 source3/smbd/lanman.c if (check_lanman_password(user,(unsigned char *)pass1,(unsigned char *)pass2, &hnd)) {
user 2677 source3/smbd/lanman.c fstring user;
user 2725 source3/smbd/lanman.c p += pull_ascii_fstring(user,p);
user 2727 source3/smbd/lanman.c DEBUG(3,("api_SamOEMChangePassword: Change password for <%s>\n",user));
user 2734 source3/smbd/lanman.c (void)map_username(user);
user 2736 source3/smbd/lanman.c if (NT_STATUS_IS_OK(pass_oem_change(user, (uchar*) data, (uchar *)&data[516], NULL, NULL, NULL))) {
user 3818 source3/smbd/lanman.c char *user = skip_string(param,tpscnt,str2);
user 3819 source3/smbd/lanman.c char *resource = skip_string(param,tpscnt,user);
user 3821 source3/smbd/lanman.c if (!str1 || !str2 || !user || !resource) {
user 3828 source3/smbd/lanman.c DEBUG(3,("WAccessGetUserPerms user=%s resource=%s\n",user,resource));
user 4706 source3/smbd/lanman.c user_struct *user = get_valid_user_struct(vuid);
user 4708 source3/smbd/lanman.c if (!user || user->server_info->guest) {
user 71 source3/smbd/map_username.c bool map_username(fstring user)
user 80 source3/smbd/map_username.c if (!*user)
user 83 source3/smbd/map_username.c if (strequal(user,get_last_to()))
user 86 source3/smbd/map_username.c if (strequal(user,get_last_from())) {
user 87 source3/smbd/map_username.c DEBUG(3,("Mapped user %s to %s\n",user,get_last_to()));
user 88 source3/smbd/map_username.c fstrcpy(user,get_last_to());
user 102 source3/smbd/map_username.c user);
user 125 source3/smbd/map_username.c DEBUG(3,("Mapped user %s to %s\n", user, qlines[0] ));
user 126 source3/smbd/map_username.c fstrcpy( user, qlines[0] );
user 187 source3/smbd/map_username.c user_in_list(user, (const char **)dosuserlist)) {
user 188 source3/smbd/map_username.c DEBUG(3,("Mapped user %s to %s\n",user,unixname));
user 191 source3/smbd/map_username.c set_last_from_to(user, unixname);
user 192 source3/smbd/map_username.c fstrcpy( user, unixname );
user 211 source3/smbd/map_username.c set_last_from_to(user, user);
user 328 source3/smbd/password.c void add_session_user(const char *user)
user 333 source3/smbd/password.c pw = Get_Pwnam_alloc(talloc_tos(), user);
user 393 source3/smbd/password.c bool user_in_netgroup(const char *user, const char *ngname)
user 407 source3/smbd/password.c user, my_yp_domain?my_yp_domain:"(ANY)", ngname));
user 409 source3/smbd/password.c if (innetgr(ngname, NULL, user, my_yp_domain)) {
user 419 source3/smbd/password.c fstrcpy(lowercase_user, user);
user 439 source3/smbd/password.c bool user_in_list(const char *user,const char **list)
user 444 source3/smbd/password.c DEBUG(10,("user_in_list: checking user %s in list\n", user));
user 449 source3/smbd/password.c user, *list));
user 454 source3/smbd/password.c if (strequal(user, *list))
user 467 source3/smbd/password.c if(user_in_netgroup(user, *list +1))
user 469 source3/smbd/password.c if(user_in_group(user, *list +1))
user 477 source3/smbd/password.c if(user_in_group(user, *list +2))
user 479 source3/smbd/password.c if(user_in_netgroup(user, *list +2))
user 488 source3/smbd/password.c if(user_in_group(user, *list +1))
user 498 source3/smbd/password.c if(user_in_netgroup(user, *list +2))
user 500 source3/smbd/password.c if(user_in_group(user, *list +2))
user 506 source3/smbd/password.c if(user_in_netgroup(user, *list +1))
user 520 source3/smbd/password.c static bool user_ok(const char *user, int snum)
user 537 source3/smbd/password.c ret = !user_in_list(user,
user 553 source3/smbd/password.c ret = user_in_list(user, (const char **)valid);
user 565 source3/smbd/password.c ret = user_in_list(user, (const char **)user_list);
user 581 source3/smbd/password.c char *host, *user, *domain;
user 583 source3/smbd/password.c while (getnetgrent(&host, &user, &domain)) {
user 584 source3/smbd/password.c if (user) {
user 585 source3/smbd/password.c if (user_ok(user, snum) &&
user 586 source3/smbd/password.c password_ok(user,password)) {
user 588 source3/smbd/password.c return(user);
user 675 source3/smbd/password.c bool authorise_login(int snum, fstring user, DATA_BLOB password,
user 682 source3/smbd/password.c "user=%s pass=%s\n", user,password.data));
user 725 source3/smbd/password.c fstrcpy(user,user2);
user 728 source3/smbd/password.c "password ok\n", user));
user 762 source3/smbd/password.c fstrcpy(user,auser);
user 765 source3/smbd/password.c "password ok (%s)\n", user));
user 773 source3/smbd/password.c fstrcpy(user,user2);
user 777 source3/smbd/password.c user));
user 792 source3/smbd/password.c fstrcpy(user,guestname);
user 795 source3/smbd/password.c "and guest ok (%s)\n", user));
user 804 source3/smbd/password.c if (ok && !user_ok(user, snum)) {
user 805 source3/smbd/password.c DEBUG(0,("authorise_login: rejected invalid user %s\n",user));
user 3670 source3/smbd/posix_acls.c uid_t user = (uid_t)-1;
user 3718 source3/smbd/posix_acls.c status = unpack_nt_owners( SNUM(conn), &user, &grp, security_info_sent, psd);
user 3729 source3/smbd/posix_acls.c if (((user != (uid_t)-1) && (sbuf.st_uid != user)) || (( grp != (gid_t)-1) && (sbuf.st_gid != grp))) {
user 3732 source3/smbd/posix_acls.c fsp->fsp_name, (unsigned int)user, (unsigned int)grp ));
user 3734 source3/smbd/posix_acls.c if(try_chown( fsp->conn, fsp->fsp_name, user, grp) == -1) {
user 3736 source3/smbd/posix_acls.c fsp->fsp_name, (unsigned int)user, (unsigned int)grp, strerror(errno) ));
user 357 source3/smbd/quotas.c if (!request.user) {
user 611 source3/smbd/service.c fstring user;
user 621 source3/smbd/service.c if (!authorise_login(snum,user,password,&guest)) {
user 627 source3/smbd/service.c return make_serverinfo_from_username(mem_ctx, user, guest,
user 36 source3/smbd/sesssetup.c const char *user, const char *domain)
user 42 source3/smbd/sesssetup.c user, domain));
user 50 source3/smbd/sesssetup.c user));
user 252 source3/smbd/sesssetup.c fstring user;
user 424 source3/smbd/sesssetup.c fstr_sprintf(user, "%s%c%s", domain, *lp_winbind_separator(), client);
user 428 source3/smbd/sesssetup.c username_was_mapped = map_username( user );
user 430 source3/smbd/sesssetup.c pw = smb_getpwnam( mem_ctx, user, real_username, True );
user 456 source3/smbd/sesssetup.c fstrcpy(user,lp_guestaccount());
user 457 source3/smbd/sesssetup.c pw = smb_getpwnam( mem_ctx, user, real_username, True );
user 464 source3/smbd/sesssetup.c user));
user 621 source3/smbd/sesssetup.c (*auth_ntlmssp_state)->ntlmssp_state->user,
user 647 source3/smbd/sesssetup.c (*auth_ntlmssp_state)->ntlmssp_state->user) !=
user 1384 source3/smbd/sesssetup.c const char *user;
user 1456 source3/smbd/sesssetup.c user = tmp ? tmp : "";
user 1575 source3/smbd/sesssetup.c user = tmp ? tmp : "";
user 1623 source3/smbd/sesssetup.c domain, user, get_remote_machine_name()));
user 1625 source3/smbd/sesssetup.c if (*user) {
user 1639 source3/smbd/sesssetup.c fstrcpy(sub_user, user);
user 1659 source3/smbd/sesssetup.c user = "";
user 1662 source3/smbd/sesssetup.c if (!*user) {
user 1675 source3/smbd/sesssetup.c nt_status = make_user_info_for_reply_enc(&user_info, user,
user 1697 source3/smbd/sesssetup.c user, domain, chal,
user 1718 source3/smbd/sesssetup.c user, domain);
user 538 source3/torture/cmd_vfs.c const char *user;
user 556 source3/torture/cmd_vfs.c if (pwd != NULL) user = pwd->pw_name;
user 557 source3/torture/cmd_vfs.c else user = null_string;
user 582 source3/torture/cmd_vfs.c printf(" Uid: %5lu/%.16s Gid: %5lu/%.16s\n", (unsigned long)st.st_uid, user,
user 595 source3/torture/cmd_vfs.c const char *user;
user 623 source3/torture/cmd_vfs.c if (pwd != NULL) user = pwd->pw_name;
user 624 source3/torture/cmd_vfs.c else user = null_string;
user 648 source3/torture/cmd_vfs.c printf(" Uid: %5lu/%.16s Gid: %5lu/%.16s\n", (unsigned long)st.st_uid, user,
user 660 source3/torture/cmd_vfs.c const char *user;
user 677 source3/torture/cmd_vfs.c if (pwd != NULL) user = pwd->pw_name;
user 678 source3/torture/cmd_vfs.c else user = null_string;
user 702 source3/torture/cmd_vfs.c printf(" Uid: %5lu/%.16s Gid: %5lu/%.16s\n", (unsigned long)st.st_uid, user,
user 314 source3/torture/nsstest.c static int nss_initgroups(char *user, gid_t group, gid_t **groups, long int *start, long int *size)
user 326 source3/torture/nsstest.c status = _nss_initgroups(user, group, start, size, groups, 0, &nss_errno);
user 4873 source3/torture/torture.c fstring user;
user 4922 source3/torture/torture.c fstr_sprintf(user, "%X", error);
user 4924 source3/torture/torture.c if (NT_STATUS_IS_OK(cli_session_setup(c_nt, user,
user 4942 source3/torture/torture.c if (NT_STATUS_IS_OK(cli_session_setup(c_dos, user,
user 5019 source3/torture/torture.c static bool subst_test(const char *str, const char *user, const char *domain,
user 5025 source3/torture/torture.c subst = talloc_sub_specified(talloc_tos(), str, user, domain, uid, gid);
user 5029 source3/torture/torture.c "[%s]\n", str, user, domain, (int)uid, (int)gid, subst,
user 1815 source3/utils/net_ads.c const char *user;
user 1836 source3/utils/net_ads.c user = argv[0];
user 1837 source3/utils/net_ads.c if (!strchr_m(user, '@')) {
user 1841 source3/utils/net_ads.c user = chr;
user 1871 source3/utils/net_ads.c if (asprintf(&prompt, "Enter new password for %s:", user) == -1) {
user 1879 source3/utils/net_ads.c auth_password, user, new_password, ads->auth.time_offset);
user 1886 source3/utils/net_ads.c d_printf("Password change for %s completed.\n", user);
user 478 source3/utils/net_proto.h const char *net_prompt_pass(struct net_context *c, const char *user);
user 4031 source3/utils/net_rpc.c static bool get_user_sids(const char *domain, const char *user, NT_USER_TOKEN *token)
user 4044 source3/utils/net_rpc.c domain, *lp_winbind_separator(), user);
user 4048 source3/utils/net_rpc.c wbc_status = wbcLookupName(domain, user, &wsid, &type);
user 4156 source3/utils/net_rpc.c fstring domain, user;
user 4167 source3/utils/net_rpc.c fstrcpy(user, users[i]);
user 4172 source3/utils/net_rpc.c fstrcpy(user, p);
user 4175 source3/utils/net_rpc.c get_user_sids(domain, user, &(result[i].token));
user 538 source3/utils/net_util.c const char *net_prompt_pass(struct net_context *c, const char *user)
user 555 source3/utils/net_util.c if (asprintf(&prompt, "Enter %s's password:", user) == -1) {
user 225 source3/utils/ntlm_auth.c fstring user)
user 234 source3/utils/ntlm_auth.c fstrcpy(user, p+1);
user 283 source3/utils/ntlm_auth.c static bool check_plaintext_auth(const char *user, const char *pass,
user 299 source3/utils/ntlm_auth.c fstrcpy(request.data.auth.user, user);
user 367 source3/utils/ntlm_auth.c fstrcpy(request.data.auth_crap.user, username);
user 467 source3/utils/ntlm_auth.c fstrcpy(request.data.chng_pswd_auth_crap.user, username);
user 531 source3/utils/ntlm_auth.c nt_status = contact_winbind_auth_crap(ntlmssp_state->user, ntlmssp_state->domain,
user 555 source3/utils/ntlm_auth.c ntlmssp_state->domain, ntlmssp_state->user,
user 578 source3/utils/ntlm_auth.c ntlmssp_state->user,
user 579 source3/utils/ntlm_auth.c ntlmssp_state->user,
user 587 source3/utils/ntlm_auth.c ntlmssp_state->user);
user 590 source3/utils/ntlm_auth.c ntlmssp_state->domain, ntlmssp_state->user, ntlmssp_state->workstation,
user 685 source3/utils/ntlm_auth.c fstr_sprintf(wb_request.data.ccache_ntlm_auth.user,
user 1035 source3/utils/ntlm_auth.c char *user, *pass;
user 1036 source3/utils/ntlm_auth.c user=buf;
user 1048 source3/utils/ntlm_auth.c rfc1738_unescape(user);
user 1052 source3/utils/ntlm_auth.c if (check_plaintext_auth(user, pass, False)) {
user 1126 source3/utils/ntlm_auth.c char *user = NULL;
user 1272 source3/utils/ntlm_auth.c user = SMB_STRDUP(principal);
user 1310 source3/utils/ntlm_auth.c user = SMB_STRDUP(ntlmssp_state->user);
user 1321 source3/utils/ntlm_auth.c reply_argument = talloc_asprintf(ctx, "%s\\%s", domain, user);
user 1339 source3/utils/ntlm_auth.c SAFE_FREE(user);
user 1519 source3/utils/ntlm_auth.c char *user = NULL;
user 1530 source3/utils/ntlm_auth.c user = talloc_asprintf(talloc_tos(), "%s@%s", opt_username, opt_domain);
user 1531 source3/utils/ntlm_auth.c if (!user) {
user 1535 source3/utils/ntlm_auth.c if ((retval = kerberos_kinit_password(user, opt_password, 0, NULL))) {
user 2491 source3/utils/ntlm_auth.c fstring user;
user 2493 source3/utils/ntlm_auth.c fstr_sprintf(user, "%s%c%s", opt_domain, winbind_separator(), opt_username);
user 2494 source3/utils/ntlm_auth.c if (!check_plaintext_auth(user, opt_password, True)) {
user 103 source3/utils/pdbedit.c struct samu *user;
user 117 source3/utils/pdbedit.c user = samu_new(talloc_tos());
user 118 source3/utils/pdbedit.c if (user == NULL) {
user 125 source3/utils/pdbedit.c status = in->getsampwsid(in, user, &user_sid);
user 130 source3/utils/pdbedit.c TALLOC_FREE(user);
user 138 source3/utils/pdbedit.c TALLOC_FREE( user );
user 143 source3/utils/pdbedit.c printf("Importing account for %s...", user->username);
user 144 source3/utils/pdbedit.c status = out->getsampwnam(out, account, user->username);
user 147 source3/utils/pdbedit.c status = out->update_sam_account( out, user );
user 149 source3/utils/pdbedit.c status = out->add_sam_account(out, user);
user 159 source3/utils/pdbedit.c TALLOC_FREE( user );
user 306 source3/web/cgi.c const char *user = getenv("REMOTE_USER");
user 311 source3/web/cgi.c if (!user) {
user 317 source3/web/cgi.c pwd = getpwnam_alloc(talloc_autofree_context(), user);
user 319 source3/web/cgi.c printf("%sCannot find user %s<br>%s\n", head, user, tail);
user 327 source3/web/cgi.c head, user, (int)geteuid(), (int)getuid(), tail);
user 340 source3/web/cgi.c fstring user, user_pass;
user 360 source3/web/cgi.c user, sizeof(user), True);
user 370 source3/web/cgi.c pass = getpwnam_alloc(talloc_autofree_context(), user);
user 376 source3/web/cgi.c if NT_STATUS_IS_OK(pass_check(pass, user, user_pass,
user 390 source3/web/cgi.c C_user = SMB_STRDUP(user);
user 465 source3/winbindd/winbindd_ads.c struct netr_SamInfo3 *user = NULL;
user 475 source3/winbindd/winbindd_ads.c if ( (user = netsamlogon_cache_get( mem_ctx, sid )) != NULL )
user 481 source3/winbindd/winbindd_ads.c sid_compose(&info->user_sid, &domain->sid, user->base.rid);
user 482 source3/winbindd/winbindd_ads.c sid_compose(&info->group_sid, &domain->sid, user->base.primary_gid);
user 484 source3/winbindd/winbindd_ads.c info->acct_name = talloc_strdup(mem_ctx, user->base.account_name.string);
user 485 source3/winbindd/winbindd_ads.c info->full_name = talloc_strdup(mem_ctx, user->base.full_name.string);
user 491 source3/winbindd/winbindd_ads.c TALLOC_FREE(user);
user 156 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user[
user 157 source3/winbindd/winbindd_ccache_access.c sizeof(state->request.data.ccache_ntlm_auth.user)-1]='\0';
user 160 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user));
user 164 source3/winbindd/winbindd_ccache_access.c if (!canonicalize_username(state->request.data.ccache_ntlm_auth.user,
user 167 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user));
user 199 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user[
user 200 source3/winbindd/winbindd_ccache_access.c sizeof(state->request.data.ccache_ntlm_auth.user)-1]='\0';
user 204 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user));
user 225 source3/winbindd/winbindd_ccache_access.c if (!parse_domain_user(state->request.data.ccache_ntlm_auth.user, name_domain, name_user)) {
user 228 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user));
user 232 source3/winbindd/winbindd_ccache_access.c entry = find_memory_creds_by_name(state->request.data.ccache_ntlm_auth.user);
user 236 source3/winbindd/winbindd_ccache_access.c state->request.data.ccache_ntlm_auth.user));
user 57 source3/winbindd/winbindd_creds.c const char *user,
user 78 source3/winbindd/winbindd_creds.c } else if (user != NULL) {
user 86 source3/winbindd/winbindd_creds.c user,
user 128 source3/winbindd/winbindd_creds.c if (info3 != NULL && user != NULL) {
user 129 source3/winbindd/winbindd_creds.c if (!netsamlogon_cache_store(user, info3)) {
user 139 source3/winbindd/winbindd_creds.c const char *user,
user 143 source3/winbindd/winbindd_creds.c return winbindd_store_creds(domain, mem_ctx, user, pass, info3, NULL);
user 156 source3/winbindd/winbindd_creds.c const char *user,
user 159 source3/winbindd/winbindd_creds.c return winbindd_store_creds(domain, mem_ctx, user, pass, NULL, NULL);
user 31 source3/winbindd/winbindd_group.c static void add_member(const char *domain, const char *user,
user 37 source3/winbindd/winbindd_group.c fill_domain_username(name, domain, user, True);
user 39 source3/winbindd/winbindd_group.c fstrcpy(name, user);
user 609 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user);
user 668 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 709 source3/winbindd/winbindd_pam.c if (!NT_STATUS_IS_OK(remove_ccache(state->request.data.auth.user))) {
user 712 source3/winbindd/winbindd_pam.c state->request.data.auth.user));
user 819 source3/winbindd/winbindd_pam.c state->request.data.auth.user
user 820 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.auth.user)-1]='\0';
user 827 source3/winbindd/winbindd_pam.c state->request.data.auth.user));
user 837 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 847 source3/winbindd/winbindd_pam.c fstrcpy(mapped_user, state->request.data.auth.user);
user 868 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 901 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user);
user 1047 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 1072 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 1120 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 1144 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user);
user 1151 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain));
user 1166 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain));
user 1227 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.auth.user, name_domain, name_user);
user 1291 source3/winbindd/winbindd_pam.c state->request.data.auth.user, name_domain, name_user, name_domain));
user 1471 source3/winbindd/winbindd_pam.c state->request.data.auth.user[sizeof(state->request.data.auth.user)-1]='\0';
user 1477 source3/winbindd/winbindd_pam.c state->request.data.auth.user));
user 1487 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 1496 source3/winbindd/winbindd_pam.c mapped_user = state->request.data.auth.user;
user 1501 source3/winbindd/winbindd_pam.c if ( mapped_user != state->request.data.auth.user ) {
user 1503 source3/winbindd/winbindd_pam.c safe_strcpy( state->request.data.auth.user, domain_user,
user 1504 source3/winbindd/winbindd_pam.c sizeof(state->request.data.auth.user)-1 );
user 1652 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 1665 source3/winbindd/winbindd_pam.c result = winbindd_add_memory_creds(state->request.data.auth.user,
user 1677 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 1683 source3/winbindd/winbindd_pam.c winbindd_delete_memory_creds(state->request.data.auth.user);
user 1728 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 1771 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user
user 1772 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.auth_crap.user)-1]=0;
user 1779 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user));
user 1801 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user,
user 1828 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user[sizeof(state->request.data.auth_crap.user)-1]=0;
user 1836 source3/winbindd/winbindd_pam.c name_user = state->request.data.auth_crap.user;
user 1888 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user, name_domain, name_user, name_domain));
user 1979 source3/winbindd/winbindd_pam.c state->request.data.auth_crap.user,
user 2018 source3/winbindd/winbindd_pam.c fstring domain, user;
user 2024 source3/winbindd/winbindd_pam.c state->request.data.chauthtok.user));
user 2029 source3/winbindd/winbindd_pam.c state->request.data.chauthtok.user,
user 2037 source3/winbindd/winbindd_pam.c fstrcpy(state->request.data.chauthtok.user, mapped_user);
user 2044 source3/winbindd/winbindd_pam.c if (!canonicalize_username(state->request.data.chauthtok.user, domain, user)) {
user 2048 source3/winbindd/winbindd_pam.c state->request.data.auth.user,
user 2059 source3/winbindd/winbindd_pam.c state->request.data.chauthtok.user, domain, user, domain));
user 2078 source3/winbindd/winbindd_pam.c fstring domain, user;
user 2081 source3/winbindd/winbindd_pam.c state->request.data.auth.user));
user 2083 source3/winbindd/winbindd_pam.c if (!parse_domain_user(state->request.data.chauthtok.user, domain, user)) {
user 2105 source3/winbindd/winbindd_pam.c user,
user 2137 source3/winbindd/winbindd_pam.c result = rpccli_samr_chgpasswd_user2(cli, state->mem_ctx, user, newpass, oldpass);
user 2152 source3/winbindd/winbindd_pam.c result = winbindd_replace_memory_creds(state->request.data.chauthtok.user,
user 2172 source3/winbindd/winbindd_pam.c state->mem_ctx, user,
user 2215 source3/winbindd/winbindd_pam.c user,
user 2225 source3/winbindd/winbindd_pam.c fstring name_domain, user;
user 2230 source3/winbindd/winbindd_pam.c state->request.data.logoff.user));
user 2233 source3/winbindd/winbindd_pam.c state->request.data.logoff.user
user 2234 source3/winbindd/winbindd_pam.c [sizeof(state->request.data.logoff.user)-1]='\0';
user 2243 source3/winbindd/winbindd_pam.c if (!canonicalize_username(state->request.data.logoff.user, name_domain, user)) {
user 2280 source3/winbindd/winbindd_pam.c state->request.data.logoff.user,
user 2293 source3/winbindd/winbindd_pam.c state->request.data.logoff.user));
user 2315 source3/winbindd/winbindd_pam.c if (!ccache_entry_exists(state->request.data.logoff.user)) {
user 2321 source3/winbindd/winbindd_pam.c if (!ccache_entry_identical(state->request.data.logoff.user,
user 2328 source3/winbindd/winbindd_pam.c result = remove_ccache(state->request.data.logoff.user);
user 2341 source3/winbindd/winbindd_pam.c winbindd_delete_memory_creds(state->request.data.logoff.user);
user 2356 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user[
user 2357 source3/winbindd/winbindd_pam.c sizeof(state->request.data.chng_pswd_auth_crap.user)-1]=0;
user 2364 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user));
user 2385 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user,
user 2399 source3/winbindd/winbindd_pam.c fstring domain,user;
user 2405 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user[
user 2406 source3/winbindd/winbindd_pam.c sizeof(state->request.data.chng_pswd_auth_crap.user)-1]=0;
user 2410 source3/winbindd/winbindd_pam.c *user = 0;
user 2415 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user));
user 2427 source3/winbindd/winbindd_pam.c parse_domain_user(state->request.data.chng_pswd_auth_crap.user,
user 2428 source3/winbindd/winbindd_pam.c domain, user);
user 2433 source3/winbindd/winbindd_pam.c state->request.data.chng_pswd_auth_crap.user));
user 2443 source3/winbindd/winbindd_pam.c if(!*user) {
user 2444 source3/winbindd/winbindd_pam.c fstrcpy(user, state->request.data.chng_pswd_auth_crap.user);
user 2448 source3/winbindd/winbindd_pam.c (unsigned long)state->pid, domain, user));
user 2485 source3/winbindd/winbindd_pam.c cli, state->mem_ctx, user, new_nt_password, old_nt_hash_enc,
user 2494 source3/winbindd/winbindd_pam.c domain, user,
user 263 source3/winbindd/winbindd_passdb.c struct samu *user;
user 265 source3/winbindd/winbindd_passdb.c if ( (user = samu_new(mem_ctx)) == NULL ) {
user 269 source3/winbindd/winbindd_passdb.c if ( !pdb_getsampwsid( user, user_sid ) ) {
user 270 source3/winbindd/winbindd_passdb.c TALLOC_FREE( user );
user 274 source3/winbindd/winbindd_passdb.c result = pdb_enum_group_memberships( mem_ctx, user, &groups, &gids, &ngroups );
user 276 source3/winbindd/winbindd_passdb.c TALLOC_FREE( user );
user 274 source3/winbindd/winbindd_proto.h const char *user,
user 280 source3/winbindd/winbindd_proto.h const char *user,
user 289 source3/winbindd/winbindd_proto.h const char *user,
user 558 source3/winbindd/winbindd_proto.h bool parse_domain_user(const char *domuser, fstring domain, fstring user);
user 560 source3/winbindd/winbindd_proto.h char **domain, char **user);
user 562 source3/winbindd/winbindd_proto.h bool canonicalize_username(fstring username_inout, fstring domain, fstring user);
user 563 source3/winbindd/winbindd_proto.h void fill_domain_username(fstring name, const char *domain, const char *user, bool can_assume);
user 566 source3/winbindd/winbindd_proto.h const char *user,
user 455 source3/winbindd/winbindd_rpc.c struct netr_SamInfo3 *user;
user 469 source3/winbindd/winbindd_rpc.c if ( (user = netsamlogon_cache_get( mem_ctx, user_sid )) != NULL )
user 475 source3/winbindd/winbindd_rpc.c sid_compose(&user_info->user_sid, &domain->sid, user->base.rid);
user 477 source3/winbindd/winbindd_rpc.c user->base.primary_gid);
user 480 source3/winbindd/winbindd_rpc.c user->base.account_name.string);
user 482 source3/winbindd/winbindd_rpc.c user->base.full_name.string);
user 484 source3/winbindd/winbindd_rpc.c TALLOC_FREE(user);
user 1137 source3/winbindd/winbindd_util.c bool parse_domain_user(const char *domuser, fstring domain, fstring user)
user 1142 source3/winbindd/winbindd_util.c fstrcpy(user, domuser);
user 1148 source3/winbindd/winbindd_util.c user[PTR_DIFF(p, domuser)] = 0;
user 1153 source3/winbindd/winbindd_util.c fstrcpy(user, p+1);
user 1164 source3/winbindd/winbindd_util.c char **domain, char **user)
user 1171 source3/winbindd/winbindd_util.c *user = talloc_strdup(mem_ctx, fstr_user);
user 1172 source3/winbindd/winbindd_util.c return ((*domain != NULL) && (*user != NULL));
user 1179 source3/winbindd/winbindd_util.c char *p, *user;
user 1181 source3/winbindd/winbindd_util.c user = domuser;
user 1192 source3/winbindd/winbindd_util.c user = p;
user 1197 source3/winbindd/winbindd_util.c safe_strcpy((char *)buf, user, *len);
user 1209 source3/winbindd/winbindd_util.c bool canonicalize_username(fstring username_inout, fstring domain, fstring user)
user 1211 source3/winbindd/winbindd_util.c if (!parse_domain_user(username_inout, domain, user)) {
user 1216 source3/winbindd/winbindd_util.c user);
user 1234 source3/winbindd/winbindd_util.c void fill_domain_username(fstring name, const char *domain, const char *user, bool can_assume)
user 1238 source3/winbindd/winbindd_util.c fstrcpy(tmp_user, user);
user 1256 source3/winbindd/winbindd_util.c const char *user,
user 1261 source3/winbindd/winbindd_util.c tmp_user = talloc_strdup(mem_ctx, user);
user 49 source4/auth/credentials/credentials_ntlm.c const char *user, *domain;
user 71 source4/auth/credentials/credentials_ntlm.c cli_credentials_get_ntlm_username_domain(cred, mem_ctx, &user, &domain);
user 114 source4/auth/credentials/credentials_ntlm.c user,
user 56 source4/auth/ntlm/auth_developer.c const char *user;
user 58 source4/auth/ntlm/auth_developer.c user = user_info->client.account_name;
user 60 source4/auth/ntlm/auth_developer.c if (strncasecmp("NT_STATUS", user, strlen("NT_STATUS")) == 0) {
user 61 source4/auth/ntlm/auth_developer.c nt_status = nt_status_string_to_code(user);
user 63 source4/auth/ntlm/auth_developer.c error_num = strtoul(user, NULL, 16);
user 64 source4/auth/ntlm/auth_developer.c DEBUG(5,("name_to_ntstatus_check_password: Error for user %s was 0x%08X\n", user, error_num));
user 93 source4/auth/ntlm/auth_developer.c server_info->account_name = talloc_asprintf(server_info, "NAME TO NTSTATUS %s ANONYMOUS LOGON", user);
user 99 source4/auth/ntlm/auth_developer.c server_info->full_name = talloc_asprintf(server_info, "NAME TO NTSTATUS %s Anonymous Logon", user);
user 313 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_auth(pam_handle_t *pamh, bool allow_null_passwords, const char *user)
user 322 source4/auth/ntlm/auth_unix.c DEBUG(4,("smb_pam_auth: PAM: Authenticate User: %s\n", user));
user 327 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_auth: PAM: Authentication Error for user %s\n", user));
user 330 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_auth: PAM: Insufficient Credentials for user %s\n", user));
user 333 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_auth: PAM: Authentication Information Unavailable for user %s\n", user));
user 336 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_auth: PAM: Username %s NOT known to Authentication system\n", user));
user 339 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_auth: PAM: One or more authentication modules reports user limit for user %s exceeeded\n", user));
user 342 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_auth: PAM: One or more PAM modules failed to load for user %s\n", user));
user 345 source4/auth/ntlm/auth_unix.c DEBUG(4, ("smb_pam_auth: PAM: User %s Authenticated OK\n", user));
user 348 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_auth: PAM: UNKNOWN ERROR while authenticating user %s\n", user));
user 358 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_account(pam_handle_t *pamh, const char * user)
user 362 source4/auth/ntlm/auth_unix.c DEBUG(4,("smb_pam_account: PAM: Account Management for User: %s\n", user));
user 367 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_account: PAM: User %s is valid but password is expired\n", user));
user 370 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_account: PAM: User %s no longer permitted to access system\n", user));
user 373 source4/auth/ntlm/auth_unix.c DEBUG(2, ("smb_pam_account: PAM: There was an authentication error for user %s\n", user));
user 376 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_account: PAM: User %s is NOT permitted to access system at this time\n", user));
user 379 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_account: PAM: User \"%s\" is NOT known to account management\n", user));
user 382 source4/auth/ntlm/auth_unix.c DEBUG(4, ("smb_pam_account: PAM: Account OK for User: %s\n", user));
user 385 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_account: PAM: UNKNOWN PAM ERROR (%d) during Account Management for User: %s\n", pam_error, user));
user 396 source4/auth/ntlm/auth_unix.c static NTSTATUS smb_pam_setcred(pam_handle_t *pamh, const char * user)
user 405 source4/auth/ntlm/auth_unix.c DEBUG(4,("PAM: Account Management SetCredentials for User: %s\n", user));
user 410 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_setcred: PAM: Credentials not found for user:%s\n", user ));
user 413 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_setcred: PAM: Credentials for user: \"%s\" EXPIRED!\n", user ));
user 416 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_setcred: PAM: User: \"%s\" is NOT known so can not set credentials!\n", user ));
user 419 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_setcred: PAM: Unknown setcredentials error - unable to set credentials for %s\n", user ));
user 422 source4/auth/ntlm/auth_unix.c DEBUG(4, ("smb_pam_setcred: PAM: SetCredentials OK for User: %s\n", user));
user 425 source4/auth/ntlm/auth_unix.c DEBUG(0, ("smb_pam_setcred: PAM: UNKNOWN PAM ERROR (%d) during SetCredentials for User: %s\n", pam_error, user));
user 100 source4/auth/ntlm/auth_winbind.c safe_strcpy(request.data.auth_crap.user,
user 90 source4/auth/ntlm/ntlm_check.c const char *user, const char *domain,
user 126 source4/auth/ntlm/ntlm_check.c if (!ntv2_owf_gen(part_passwd, user, domain, upper_case_domain, kr)) {
user 164 source4/auth/ntlm/ntlm_check.c const char *user, const char *domain,
user 196 source4/auth/ntlm/ntlm_check.c if (!ntv2_owf_gen(part_passwd, user, domain, upper_case_domain, kr)) {
user 95 source4/auth/ntlmssp/ntlmssp.h char *user;
user 117 source4/auth/ntlmssp/ntlmssp_client.c const char *user, *domain;
user 184 source4/auth/ntlmssp/ntlmssp_client.c &user, &domain);
user 264 source4/auth/ntlmssp/ntlmssp_client.c user,
user 42 source4/auth/ntlmssp/ntlmssp_server.c static NTSTATUS ntlmssp_set_username(struct gensec_ntlmssp_state *gensec_ntlmssp_state, const char *user)
user 44 source4/auth/ntlmssp/ntlmssp_server.c if (!user) {
user 49 source4/auth/ntlmssp/ntlmssp_server.c gensec_ntlmssp_state->user = talloc_strdup(gensec_ntlmssp_state, user);
user 50 source4/auth/ntlmssp/ntlmssp_server.c if (!gensec_ntlmssp_state->user) {
user 261 source4/auth/ntlmssp/ntlmssp_server.c char *user = NULL;
user 279 source4/auth/ntlmssp/ntlmssp_server.c gensec_ntlmssp_state->user = NULL;
user 291 source4/auth/ntlmssp/ntlmssp_server.c &user,
user 317 source4/auth/ntlmssp/ntlmssp_server.c &user,
user 335 source4/auth/ntlmssp/ntlmssp_server.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(gensec_ntlmssp_state, user))) {
user 348 source4/auth/ntlmssp/ntlmssp_server.c gensec_ntlmssp_state->user, gensec_ntlmssp_state->domain, gensec_ntlmssp_state->workstation, (unsigned long)gensec_ntlmssp_state->lm_resp.length, (unsigned long)gensec_ntlmssp_state->nt_resp.length));
user 673 source4/auth/ntlmssp/ntlmssp_server.c user_info->client.account_name = gensec_ntlmssp_state->user;
user 48 source4/cldap_server/netlogon.c const char *user,
user 244 source4/cldap_server/netlogon.c if (!user) {
user 245 source4/cldap_server/netlogon.c user = "";
user 251 source4/cldap_server/netlogon.c if (user[0]) { \
user 265 source4/cldap_server/netlogon.c ldb_binary_encode_string(mem_ctx, user),
user 269 source4/cldap_server/netlogon.c user, acct_control, ldb_dn_get_linearized(dom_res->msgs[0]->dn),
user 345 source4/cldap_server/netlogon.c netlogon->data.nt5_ex.user_name = user;
user 370 source4/cldap_server/netlogon.c netlogon->data.nt5.user_name = user;
user 391 source4/cldap_server/netlogon.c netlogon->data.nt4.user_name = user;
user 414 source4/cldap_server/netlogon.c const char *user = NULL;
user 455 source4/cldap_server/netlogon.c user = talloc_strndup(tmp_ctx,
user 478 source4/cldap_server/netlogon.c domain, host, user, version, domain_guid));
user 481 source4/cldap_server/netlogon.c user, acct_control, src->addr,
user 677 source4/dsdb/samdb/ldb_modules/password_hash.c DATA_BLOB *user;
user 763 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName,
user 767 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l,
user 771 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u,
user 775 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName,
user 779 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName,
user 783 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u,
user 787 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l,
user 794 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName,
user 798 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l,
user 802 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u,
user 806 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName,
user 810 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName,
user 814 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u,
user 818 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l,
user 825 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName,
user 832 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName_l,
user 835 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName_u,
user 841 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName,
user 845 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l,
user 849 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u,
user 859 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName,
user 863 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l,
user 867 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u,
user 872 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName,
user 876 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName_l,
user 880 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &userPrincipalName_u,
user 885 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName,
user 890 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_l,
user 895 source4/dsdb/samdb/ldb_modules/password_hash.c .user = &sAMAccountName_u,
user 971 source4/dsdb/samdb/ldb_modules/password_hash.c MD5Update(&md5, wdigest[i].user->data, wdigest[i].user->length);
user 171 source4/heimdal/kdc/digest.c hdb_entry_ex *user;
user 180 source4/heimdal/kdc/digest.c HDB_F_GET_CLIENT, &db, &user);
user 185 source4/heimdal/kdc/digest.c ret = hdb_entry_get_password(context, db, &user->entry, password);
user 191 source4/heimdal/kdc/digest.c memset(user, 0, sizeof(*user));
user 193 source4/heimdal/kdc/digest.c _kdc_free_ent (context, user);
user 220 source4/heimdal/kdc/digest.c hdb_entry_ex *server = NULL, *user = NULL;
user 852 source4/heimdal/kdc/digest.c HDB_F_GET_CLIENT, NULL, &user);
user 861 source4/heimdal/kdc/digest.c ret = hdb_enctype2key(context, &user->entry,
user 1127 source4/heimdal/kdc/digest.c HDB_F_GET_CLIENT, NULL, &user);
user 1176 source4/heimdal/kdc/digest.c ret = hdb_enctype2key(context, &user->entry,
user 1439 source4/heimdal/kdc/digest.c if (user)
user 1440 source4/heimdal/kdc/digest.c _kdc_free_ent (context, user);
user 45 source4/heimdal/lib/krb5/get_default_principal.c const char *user = getenv("USER");
user 46 source4/heimdal/lib/krb5/get_default_principal.c if(user == NULL)
user 47 source4/heimdal/lib/krb5/get_default_principal.c user = getenv("LOGNAME");
user 48 source4/heimdal/lib/krb5/get_default_principal.c if(user == NULL)
user 49 source4/heimdal/lib/krb5/get_default_principal.c user = getenv("USERNAME");
user 50 source4/heimdal/lib/krb5/get_default_principal.c return user;
user 64 source4/heimdal/lib/krb5/get_default_principal.c const char *user;
user 71 source4/heimdal/lib/krb5/get_default_principal.c user = getlogin();
user 72 source4/heimdal/lib/krb5/get_default_principal.c if(user == NULL)
user 73 source4/heimdal/lib/krb5/get_default_principal.c user = get_env_user();
user 74 source4/heimdal/lib/krb5/get_default_principal.c if(user != NULL && strcmp(user, "root") != 0)
user 75 source4/heimdal/lib/krb5/get_default_principal.c ret = krb5_make_principal(context, princ, NULL, user, "root", NULL);
user 81 source4/heimdal/lib/krb5/get_default_principal.c user = pw->pw_name;
user 83 source4/heimdal/lib/krb5/get_default_principal.c user = get_env_user();
user 84 source4/heimdal/lib/krb5/get_default_principal.c if(user == NULL)
user 85 source4/heimdal/lib/krb5/get_default_principal.c user = getlogin();
user 87 source4/heimdal/lib/krb5/get_default_principal.c if(user == NULL) {
user 93 source4/heimdal/lib/krb5/get_default_principal.c ret = krb5_make_principal(context, princ, NULL, user, NULL);
user 343 source4/lib/ldb/nssldb/ldb-grp.c NSS_STATUS _nss_ldb_initgroups_dyn(const char *user, gid_t group, long int *start, long int *size, gid_t **groups, long int limit, int *errnop)
user 363 source4/lib/ldb/nssldb/ldb-grp.c filter = talloc_asprintf(mem_res, _LDB_NSS_PWNAM_FILTER, user);
user 2575 source4/lib/wmi/wmi_wrap.c WERROR WBEM_ConnectServer(struct com_context *ctx, const char *server, const char *nspace, const char *user, const char *password,
user 120 source4/libcli/auth/smbencrypt.c smb_ucs2_t *user;
user 155 source4/libcli/auth/smbencrypt.c ret = push_ucs2_talloc(mem_ctx, &user, user_in, &user_byte_len );
user 177 source4/libcli/auth/smbencrypt.c hmac_md5_update((const void *)user, user_byte_len, &ctx);
user 183 source4/libcli/auth/smbencrypt.c dump_data(100, (const void *)user, user_byte_len);
user 400 source4/libcli/auth/smbencrypt.c const char *user, const char *domain, const uint8_t nt_hash[16],
user 412 source4/libcli/auth/smbencrypt.c if (!ntv2_owf_gen(nt_hash, user, domain, true, ntlm_v2_hash)) {
user 447 source4/libcli/auth/smbencrypt.c const char *user, const char *domain,
user 458 source4/libcli/auth/smbencrypt.c user, domain, nt_hash, server_chal, names_blob,
user 536 source4/libcli/cldap/cldap.c if (io->in.user) {
user 537 source4/libcli/cldap/cldap.c filter = talloc_asprintf_append_buffer(filter, "(User=%s)", io->in.user);
user 159 source4/libcli/cldap/cldap.h const char *user;
user 100 source4/libcli/raw/clisession.c smbcli_req_append_string(req, parms->old.in.user, STR_TERMINATE);
user 120 source4/libcli/raw/clisession.c smbcli_req_append_string(req, parms->nt1.in.user, STR_TERMINATE);
user 315 source4/libcli/raw/interfaces.h const char *user;
user 341 source4/libcli/raw/interfaces.h const char *user;
user 2106 source4/libcli/raw/interfaces.h char *user;
user 287 source4/libcli/smb_composite/sesssetup.c &state->setup.nt1.in.user,
user 356 source4/libcli/smb_composite/sesssetup.c &state->setup.old.in.user,
user 745 source4/libnet/libnet_become_dc.c s->cldap.io.in.user = NULL;
user 52 source4/libnet/libnet_samdump.c struct netr_DELTA_USER *user = delta->delta_union.user;
user 53 source4/libnet/libnet_samdump.c const char *username = user->account_name.string;
user 58 source4/libnet/libnet_samdump.c user->lm_password_present ? &user->lmpassword : NULL,
user 59 source4/libnet/libnet_samdump.c user->acct_flags);
user 61 source4/libnet/libnet_samdump.c user->nt_password_present ? &user->ntpassword : NULL,
user 62 source4/libnet/libnet_samdump.c user->acct_flags);
user 66 source4/libnet/libnet_samdump.c smbpasswd_encode_acb_info(mem_ctx, user->acct_flags),
user 67 source4/libnet/libnet_samdump.c (unsigned int)nt_time_to_unix(user->last_password_change));
user 37 source4/libnet/libnet_samdump_keytab.c struct netr_DELTA_USER *user = delta->delta_union.user;
user 38 source4/libnet/libnet_samdump_keytab.c const char *username = user->account_name.string;
user 42 source4/libnet/libnet_samdump_keytab.c if (!user->nt_password_present) {
user 57 source4/libnet/libnet_samdump_keytab.c cli_credentials_set_nt_hash(credentials, &user->ntpassword, CRED_SPECIFIED);
user 48 source4/libnet/libnet_samsync.c struct netr_DELTA_USER *user = delta->delta_union.user;
user 51 source4/libnet/libnet_samsync.c const char *username = user->account_name.string;
user 54 source4/libnet/libnet_samsync.c if (user->lm_password_present) {
user 55 source4/libnet/libnet_samsync.c sam_rid_crypt(rid, user->lmpassword.hash, lm_hash.hash, 0);
user 56 source4/libnet/libnet_samsync.c user->lmpassword = lm_hash;
user 59 source4/libnet/libnet_samsync.c if (user->nt_password_present) {
user 60 source4/libnet/libnet_samsync.c sam_rid_crypt(rid, user->ntpassword.hash, nt_hash.hash, 0);
user 61 source4/libnet/libnet_samsync.c user->ntpassword = nt_hash;
user 65 source4/libnet/libnet_samsync.c if (user->user_private_info.SensitiveData) {
user 69 source4/libnet/libnet_samsync.c data.data = user->user_private_info.SensitiveData;
user 70 source4/libnet/libnet_samsync.c data.length = user->user_private_info.DataLength;
user 72 source4/libnet/libnet_samsync.c user->user_private_info.SensitiveData = data.data;
user 73 source4/libnet/libnet_samsync.c user->user_private_info.DataLength = data.length;
user 85 source4/libnet/libnet_samsync.c user->lmpassword = lm_hash;
user 87 source4/libnet/libnet_samsync.c user->lmpassword = keys.keys.keys2.lmpassword.pwd;
user 89 source4/libnet/libnet_samsync.c user->lm_password_present = true;
user 94 source4/libnet/libnet_samsync.c user->ntpassword = nt_hash;
user 96 source4/libnet/libnet_samsync.c user->ntpassword = keys.keys.keys2.ntpassword.pwd;
user 98 source4/libnet/libnet_samsync.c user->nt_password_present = true;
user 242 source4/libnet/libnet_samsync_ldb.c struct netr_DELTA_USER *user = delta->delta_union.user;
user 318 source4/libnet/libnet_samsync_ldb.c cn_name = talloc_strdup(mem_ctx, user->account_name.string);
user 323 source4/libnet/libnet_samsync_ldb.c if (user->field) { \
user 325 source4/libnet/libnet_samsync_ldb.c attrib, user->field); \
user 350 source4/libnet/libnet_samsync_ldb.c if (samdb_msg_add_logon_hours(state->sam_ldb, mem_ctx, msg, "logonHours", &user->logon_hours) != 0) {
user 361 source4/libnet/libnet_samsync_ldb.c "userAccountControl", user->acct_flags) != 0) {
user 371 source4/libnet/libnet_samsync_ldb.c if (user->lm_password_present) {
user 373 source4/libnet/libnet_samsync_ldb.c "dBCSPwd", &user->lmpassword);
user 378 source4/libnet/libnet_samsync_ldb.c if (user->nt_password_present) {
user 380 source4/libnet/libnet_samsync_ldb.c "unicodePwd", &user->ntpassword);
user 388 source4/libnet/libnet_samsync_ldb.c if (samdb_msg_add_parameters(state->sam_ldb, mem_ctx, msg, "userParameters", &user->parameters) != 0) {
user 409 source4/libnet/libnet_samsync_ldb.c acb = user->acct_flags;
user 264 source4/libnet/libnet_unbecome_dc.c s->cldap.io.in.user = NULL;
user 500 source4/libnet/libnet_user.c struct samr_UserInfo21 *user;
user 506 source4/libnet/libnet_user.c user = &info->out.info.info21;
user 510 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, account_name, USERMOD_FIELD_ACCOUNT_NAME);
user 513 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, full_name, USERMOD_FIELD_FULL_NAME);
user 516 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, description, USERMOD_FIELD_DESCRIPTION);
user 519 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, comment, USERMOD_FIELD_COMMENT);
user 522 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, home_directory, USERMOD_FIELD_HOME_DIRECTORY);
user 525 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, home_drive, USERMOD_FIELD_HOME_DRIVE);
user 528 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, logon_script, USERMOD_FIELD_LOGON_SCRIPT);
user 531 source4/libnet/libnet_user.c SET_FIELD_LSA_STRING(r->in, user, mod, profile_path, USERMOD_FIELD_PROFILE_PATH);
user 534 source4/libnet/libnet_user.c SET_FIELD_NTTIME(r->in, user, mod, acct_expiry, USERMOD_FIELD_ACCT_EXPIRY);
user 537 source4/libnet/libnet_user.c SET_FIELD_ACCT_FLAGS(r->in, user, mod, acct_flags, USERMOD_FIELD_ACCT_FLAGS);
user 143 source4/ntvfs/cifs/vfs_cifs.c const char *host, *user, *pass, *domain, *remote_share;
user 156 source4/ntvfs/cifs/vfs_cifs.c user = share_string_option(scfg, CIFS_USER, NULL);
user 178 source4/ntvfs/cifs/vfs_cifs.c if (user && pass) {
user 185 source4/ntvfs/cifs/vfs_cifs.c cli_credentials_set_username(credentials, user, CRED_SPECIFIED);
user 161 source4/ntvfs/smb2/vfs_smb2.c const char *host, *user, *pass, *domain, *remote_share;
user 174 source4/ntvfs/smb2/vfs_smb2.c user = share_string_option(scfg, SMB2_USER, NULL);
user 196 source4/ntvfs/smb2/vfs_smb2.c if (user && pass) {
user 203 source4/ntvfs/smb2/vfs_smb2.c cli_credentials_set_username(credentials, user, CRED_SPECIFIED);
user 1086 source4/param/loadparm.c const char *user, const char *pszHomedir)
user 1103 source4/param/loadparm.c service->comment = talloc_asprintf(service, "Home directory of %s", user);
user 1109 source4/param/loadparm.c pszHomename, user, service->szPath));
user 231 source4/param/param.h const char *user, const char *pszHomedir);
user 44 source4/rpc_server/remote/dcesrv_remote.c const char *user, *pass, *domain;
user 63 source4/rpc_server/remote/dcesrv_remote.c user = lp_parm_string(dce_call->conn->dce_ctx->lp_ctx, NULL, "dcerpc_remote", "user");
user 73 source4/rpc_server/remote/dcesrv_remote.c if (user && pass) {
user 80 source4/rpc_server/remote/dcesrv_remote.c cli_credentials_set_username(credentials, user, CRED_SPECIFIED);
user 1379 source4/smb_server/smb/reply.c req_push_str(req, req->out.ptr+12, lpq->retq.out.queue[i].user, 16, STR_ASCII);
user 1892 source4/smb_server/smb/reply.c p += req_pull_string(&req->in.bufinfo, &io->old.in.user, p, -1, STR_TERMINATE);
user 1942 source4/smb_server/smb/reply.c p += req_pull_string(&req->in.bufinfo, &io->nt1.in.user, p, -1, STR_TERMINATE);
user 137 source4/smb_server/smb/sesssetup.c user_info->client.account_name = sess->old.in.user;
user 228 source4/smb_server/smb/sesssetup.c if (sess->nt1.in.user && *sess->nt1.in.user) {
user 263 source4/smb_server/smb/sesssetup.c user_info->client.account_name = sess->nt1.in.user;
user 67 source4/torture/ldap/cldap.c search.in.user = "Administrator";
user 94 source4/torture/ldap/cldap.c search.in.user = NULL;
user 102 source4/torture/ldap/cldap.c search.in.user = "Administrator";
user 106 source4/torture/ldap/cldap.c CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user);
user 115 source4/torture/ldap/cldap.c search.in.user = NULL;
user 123 source4/torture/ldap/cldap.c search.in.user = "Administrator";
user 127 source4/torture/ldap/cldap.c CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user);
user 142 source4/torture/ldap/cldap.c search.in.user = NULL;
user 165 source4/torture/ldap/cldap.c search.in.user = "Administrator";
user 173 source4/torture/ldap/cldap.c search.in.user = NULL;
user 183 source4/torture/ldap/cldap.c search.in.user = "Administrator";
user 187 source4/torture/ldap/cldap.c CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user);
user 190 source4/torture/ldap/cldap.c search.in.user = "___no_such_user___";
user 193 source4/torture/ldap/cldap.c CHECK_STRING(search.out.netlogon.data.nt5_ex.user_name, search.in.user);
user 183 source4/torture/libnet/libnet_user.c struct policy_handle *handle, const char* user)
user 192 source4/torture/libnet/libnet_user.c username.string = user;
user 207 source4/torture/libnet/libnet_user.c printf("User (%s) already exists - attempting to delete and recreate account again\n", user);
user 39 source4/torture/libnet/userinfo.c struct libnet_rpc_userinfo user;
user 44 source4/torture/libnet/userinfo.c user.in.domain_handle = *domain_handle;
user 45 source4/torture/libnet/userinfo.c user.in.sid = dom_sid_string(mem_ctx, user_sid);
user 46 source4/torture/libnet/userinfo.c user.in.level = level; /* this should be extended */
user 49 source4/torture/libnet/userinfo.c status = libnet_rpc_userinfo(p, mem_ctx, &user);
user 55 source4/torture/libnet/userinfo.c ZERO_STRUCT(user);
user 57 source4/torture/libnet/userinfo.c user.in.domain_handle = *domain_handle;
user 58 source4/torture/libnet/userinfo.c user.in.sid = NULL;
user 59 source4/torture/libnet/userinfo.c user.in.username = TEST_USERNAME;
user 60 source4/torture/libnet/userinfo.c user.in.level = level;
user 63 source4/torture/libnet/userinfo.c status = libnet_rpc_userinfo(p, mem_ctx, &user);
user 81 source4/torture/libnet/userinfo.c struct libnet_rpc_userinfo user;
user 86 source4/torture/libnet/userinfo.c user.in.domain_handle = *domain_handle;
user 87 source4/torture/libnet/userinfo.c user.in.sid = dom_sid_string(mem_ctx, user_sid);
user 88 source4/torture/libnet/userinfo.c user.in.level = level; /* this should be extended */
user 92 source4/torture/libnet/userinfo.c c = libnet_rpc_userinfo_send(p, &user, msg_handler);
user 98 source4/torture/libnet/userinfo.c status = libnet_rpc_userinfo_recv(c, mem_ctx, &user);
user 104 source4/torture/libnet/userinfo.c ZERO_STRUCT(user);
user 106 source4/torture/libnet/userinfo.c user.in.domain_handle = *domain_handle;
user 107 source4/torture/libnet/userinfo.c user.in.sid = NULL;
user 108 source4/torture/libnet/userinfo.c user.in.username = TEST_USERNAME;
user 109 source4/torture/libnet/userinfo.c user.in.level = level;
user 113 source4/torture/libnet/userinfo.c c = libnet_rpc_userinfo_send(p, &user, msg_handler);
user 119 source4/torture/libnet/userinfo.c status = libnet_rpc_userinfo_recv(c, mem_ctx, &user);
user 37 source4/torture/libnet/userman.c struct libnet_rpc_useradd user;
user 39 source4/torture/libnet/userman.c user.in.domain_handle = *domain_handle;
user 40 source4/torture/libnet/userman.c user.in.username = name;
user 44 source4/torture/libnet/userman.c status = libnet_rpc_useradd(p, mem_ctx, &user);
user 59 source4/torture/libnet/userman.c struct libnet_rpc_useradd user;
user 61 source4/torture/libnet/userman.c user.in.domain_handle = *handle;
user 62 source4/torture/libnet/userman.c user.in.username = username;
user 66 source4/torture/libnet/userman.c c = libnet_rpc_useradd_send(p, &user, msg_handler);
user 72 source4/torture/libnet/userman.c status = libnet_rpc_useradd_recv(c, mem_ctx, &user);
user 219 source4/torture/libnet/userman.c struct libnet_rpc_userdel user;
user 221 source4/torture/libnet/userman.c user.in.domain_handle = *handle;
user 222 source4/torture/libnet/userman.c user.in.username = username;
user 224 source4/torture/libnet/userman.c status = libnet_rpc_userdel(p, mem_ctx, &user);
user 2792 source4/torture/rpc/samba3rpc.c userlevel1.user = cli_credentials_get_username(cmdline_credentials);
user 5195 source4/torture/rpc/samr.c #define STRING_EQUAL_QUERY(s1, s2, user) \
user 5200 source4/torture/rpc/samr.c #s1, user.string, s1.string, s2.string, __location__); \
user 5203 source4/torture/rpc/samr.c #define INT_EQUAL_QUERY(s1, s2, user) \
user 5206 source4/torture/rpc/samr.c #s1, user.string, (unsigned long long)s1, (unsigned long long)s2, __location__); \
user 431 source4/torture/rpc/samsync.c struct netr_DELTA_USER *user = delta->delta_union.user;
user 438 source4/torture/rpc/samsync.c const char *username = user->account_name.string;
user 470 source4/torture/rpc/samsync.c TEST_SEC_DESC_EQUAL(user->sdbuf, samr, &user_handle);
user 504 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.account_name, user->account_name);
user 505 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.full_name, user->full_name);
user 506 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.rid, user->rid);
user 507 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.primary_gid, user->primary_gid);
user 508 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.home_directory, user->home_directory);
user 509 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.home_drive, user->home_drive);
user 510 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.logon_script, user->logon_script);
user 511 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.description, user->description);
user 512 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.workstations, user->workstations);
user 514 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(info->info21.last_logon, user->last_logon);
user 515 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(info->info21.last_logoff, user->last_logoff);
user 519 source4/torture/rpc/samsync.c user->logon_hours.units_per_week);
user 521 source4/torture/rpc/samsync.c if (memcmp(info->info21.logon_hours.bits, user->logon_hours.bits,
user 529 source4/torture/rpc/samsync.c user->bad_password_count);
user 531 source4/torture/rpc/samsync.c user->logon_count);
user 534 source4/torture/rpc/samsync.c user->last_password_change);
user 536 source4/torture/rpc/samsync.c user->acct_expiry);
user 538 source4/torture/rpc/samsync.c TEST_INT_EQUAL((info->info21.acct_flags & ~ACB_PW_EXPIRED), user->acct_flags);
user 539 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_PWNOEXP) {
user 554 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.nt_password_set, user->nt_password_present);
user 555 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.lm_password_set, user->lm_password_present);
user 556 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.password_expired, user->password_expired);
user 558 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.comment, user->comment);
user 559 source4/torture/rpc/samsync.c TEST_BINARY_STRING_EQUAL(info->info21.parameters, user->parameters);
user 561 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.country_code, user->country_code);
user 562 source4/torture/rpc/samsync.c TEST_INT_EQUAL(info->info21.code_page, user->code_page);
user 564 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(info->info21.profile_path, user->profile_path);
user 566 source4/torture/rpc/samsync.c if (user->lm_password_present) {
user 567 source4/torture/rpc/samsync.c sam_rid_crypt(rid, user->lmpassword.hash, lm_hash.hash, 0);
user 570 source4/torture/rpc/samsync.c if (user->nt_password_present) {
user 571 source4/torture/rpc/samsync.c sam_rid_crypt(rid, user->ntpassword.hash, nt_hash.hash, 0);
user 575 source4/torture/rpc/samsync.c if (user->user_private_info.SensitiveData) {
user 579 source4/torture/rpc/samsync.c data.data = user->user_private_info.SensitiveData;
user 580 source4/torture/rpc/samsync.c data.length = user->user_private_info.DataLength;
user 619 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_DISABLED) {
user 623 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_WSTRUST) {
user 627 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_SVRTRUST) {
user 631 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_DOMTRUST) {
user 635 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_DOMTRUST) {
user 639 source4/torture/rpc/samsync.c if (user->acct_flags & ACB_AUTOLOCK) {
user 654 source4/torture/rpc/samsync.c TEST_INT_EQUAL(user->rid, info3->base.rid);
user 655 source4/torture/rpc/samsync.c TEST_INT_EQUAL(user->primary_gid, info3->base.primary_gid);
user 658 source4/torture/rpc/samsync.c TEST_INT_EQUAL(user->acct_flags, info3->base.acct_flags);
user 662 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->account_name, info3->base.account_name);
user 666 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->full_name, info3->base.full_name);
user 668 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->logon_script, info3->base.logon_script);
user 669 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->profile_path, info3->base.profile_path);
user 670 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->home_directory, info3->base.home_directory);
user 671 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->home_drive, info3->base.home_drive);
user 672 source4/torture/rpc/samsync.c TEST_STRING_EQUAL(user->logon_script, info3->base.logon_script);
user 675 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(user->last_logon, info3->base.last_logon);
user 676 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(user->acct_expiry, info3->base.acct_expiry);
user 677 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(user->last_password_change, info3->base.last_password_change);
user 686 source4/torture/rpc/samsync.c if (!((user->last_logoff == 0)
user 688 source4/torture/rpc/samsync.c TEST_TIME_EQUAL(user->last_logoff, info3->base.last_logoff);
user 1754 source4/torture/rpc/spoolss.c userlevel1.user = "spottyfoot!";
user 64 source4/torture/rpc/spoolss_win.c ul_1.user = "username";
user 89 source4/torture/rpc/spoolss_win.c ul_1.user = "username";
user 156 source4/torture/rpc/srvsvc.c r.in.user = talloc_asprintf(tctx,"Administrator");
user 241 source4/torture/rpc/srvsvc.c r.in.user = talloc_asprintf(tctx,"%s","Administrator");
user 355 source4/torture/rpc/srvsvc.c r.in.user = NULL;
user 408 source4/torture/rpc/srvsvc.c r.in.user = NULL;
user 217 source4/torture/rpc/wkssvc.c const char *user = cli_credentials_get_username(creds);
user 231 source4/torture/rpc/wkssvc.c { user, 0, WERR_INVALID_PARAM },
user 232 source4/torture/rpc/wkssvc.c { user, 1, WERR_INVALID_PARAM },
user 233 source4/torture/rpc/wkssvc.c { user, 1101, WERR_INVALID_PARAM },
user 1099 source4/torture/rpc/wkssvc.c const char *user = cli_credentials_get_username(creds);
user 1104 source4/torture/rpc/wkssvc.c user);
user 1127 source4/torture/rpc/wkssvc.c const char *user = cli_credentials_get_username(creds);
user 1132 source4/torture/rpc/wkssvc.c user);
user 861 source4/torture/winbind/struct_based.c fstring user)
user 870 source4/torture/winbind/struct_based.c fstrcpy(user, domuser);
user 874 source4/torture/winbind/struct_based.c fstrcpy(user, domuser);
user 880 source4/torture/winbind/struct_based.c fstrcpy(user, p+1);
user 130 source4/utils/ntlm_auth.c char **user, char winbind_separator)
user 139 source4/utils/ntlm_auth.c *user = smb_xstrdup(p+1);
user 176 source4/utils/ntlm_auth.c static bool check_plaintext_auth(const char *user, const char *pass,
user 254 source4/utils/ntlm_auth.c char *user, *pass;
user 255 source4/utils/ntlm_auth.c user=buf;
user 267 source4/utils/ntlm_auth.c rfc1738_unescape(user);
user 271 source4/utils/ntlm_auth.c if (check_plaintext_auth(user, pass, false)) {
user 1162 source4/utils/ntlm_auth.c char *user;
user 1164 source4/utils/ntlm_auth.c asprintf(&user, "%s%c%s", opt_domain, *lp_winbind_separator(cmdline_lp_ctx), opt_username);
user 1165 source4/utils/ntlm_auth.c if (!check_plaintext_auth(user, opt_password, true)) {
user 64 source4/winbind/wb_pam_auth.c const char *user,
user 91 source4/winbind/wb_pam_auth.c ninfo->identity_info.account_name.string = talloc_strdup(state, user);
user 221 source4/winbind/wb_pam_auth.c const char *user, *domain;
user 240 source4/winbind/wb_pam_auth.c &user, &domain);
user 259 source4/winbind/wb_pam_auth.c domain, user, workstation,
user 509 source4/winbind/wb_samba3_cmd.c s3call->request.data.auth_crap.user,
user 576 source4/winbind/wb_samba3_cmd.c char *user, *domain;
user 579 source4/winbind/wb_samba3_cmd.c s3call->request.data.auth.user,
user 580 source4/winbind/wb_samba3_cmd.c &domain, &user)) {
user 590 source4/winbind/wb_samba3_cmd.c cli_credentials_set_username(credentials, user, CRED_SPECIFIED);
user 32 source4/winbind/wb_utils.c char **domain, char **user)
user 44 source4/winbind/wb_utils.c *user = talloc_strdup(mem_ctx, domuser);
user 46 source4/winbind/wb_utils.c return ((*domain != NULL) && (*user != NULL));