/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/auth/ |
H A D | auth_simple.c | 32 const char *nt4_domain, in authenticate_username_pw() argument 64 user_info->client.domain_name = nt4_domain; in authenticate_username_pw() 65 user_info->mapped.domain_name = nt4_domain; in authenticate_username_pw()
|
/dports/net/samba412/samba-4.12.15/source4/auth/ntlm/ |
H A D | auth_simple.c | 55 const char *nt4_domain = NULL; 112 dn, &nt4_domain, &nt4_username); 124 user_info->mapped.domain_name = nt4_domain;
|
H A D | auth_winbind.c | 206 const char *nt4_domain = NULL; 239 nt4_domain = state->user_info_dc->info->domain_name; 242 if (lpcfg_is_mydomain(ctx->auth_ctx->lp_ctx, nt4_domain)) {
|
H A D | auth_sam.c | 649 const char *nt4_domain = NULL; in authsam_check_password_internals() local 660 &nt4_domain, &nt4_account); in authsam_check_password_internals() 666 is_my_domain = lpcfg_is_mydomain(ctx->auth_ctx->lp_ctx, nt4_domain); in authsam_check_password_internals()
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/ldap_server/ |
H A D | ldap_bind.c | 40 const char *nt4_domain, *nt4_account; in ldapsrv_BindSimple() local 48 status = crack_dn_to_nt4_name(call, req->dn, &nt4_domain, &nt4_account); in ldapsrv_BindSimple() 53 nt4_domain, nt4_account, in ldapsrv_BindSimple()
|
/dports/net/samba412/samba-4.12.15/source4/torture/rpc/ |
H A D | drsuapi_cracknames.c | 247 const char *nt4_domain; 306 nt4_domain = r.out.ctr->ctr1->array[0].result_name; 382 names[0].str = nt4_domain; 408 names[0].str = talloc_asprintf(mem_ctx, "%s%s$", nt4_domain, test_dc); 471 user_principal_name_short = talloc_asprintf(mem_ctx, "%s$@%s", test_dc, nt4_domain); 588 .expected_str = nt4_domain, 629 .expected_str = talloc_asprintf(mem_ctx, "%s%s$", nt4_domain, test_dc), 920 .expected_str = nt4_domain,
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/dsdb/samdb/ |
H A D | cracknames.c | 933 const char **nt4_domain, const char **nt4_account) in crack_dn_to_nt4_name() argument 942 *nt4_domain = ""; in crack_dn_to_nt4_name() 972 *nt4_domain = talloc_strdup(mem_ctx, info1.result_name); in crack_dn_to_nt4_name() 974 p = strchr(*nt4_domain, '\\'); in crack_dn_to_nt4_name() 984 if (!*nt4_account || !*nt4_domain) { in crack_dn_to_nt4_name()
|
/dports/net/samba412/samba-4.12.15/source4/dsdb/samdb/ |
H A D | cracknames.c | 1421 const char **nt4_domain, const char **nt4_account) in crack_name_to_nt4_name() argument 1429 *nt4_domain = ""; in crack_name_to_nt4_name() 1454 *nt4_domain = talloc_strdup(mem_ctx, info1.result_name); in crack_name_to_nt4_name() 1455 if (*nt4_domain == NULL) { in crack_name_to_nt4_name() 1459 p = strchr(*nt4_domain, '\\'); in crack_name_to_nt4_name() 1476 const char **nt4_domain, in crack_auto_name_to_nt4_name() argument 1483 *nt4_domain = ""; in crack_auto_name_to_nt4_name() 1500 return crack_name_to_nt4_name(mem_ctx, ldb, format_offered, name, nt4_domain, nt4_account); in crack_auto_name_to_nt4_name()
|
/dports/net-mgmt/wmi-client/wmi-1.3.16/Samba/source/torture/rpc/ |
H A D | drsuapi_cracknames.c | 212 const char *nt4_domain; in test_DsCrackNames() local 267 nt4_domain = r.out.ctr.ctr1->array[0].result_name; in test_DsCrackNames() 349 names[0].str = nt4_domain; in test_DsCrackNames() 378 names[0].str = talloc_asprintf(mem_ctx, "%s%s$", nt4_domain, test_dc); in test_DsCrackNames() 413 user_principal_name_short = talloc_asprintf(mem_ctx, "%s$@%s", test_dc, nt4_domain); in test_DsCrackNames() 507 .expected_str = nt4_domain, in test_DsCrackNames()
|
/dports/net/samba412/samba-4.12.15/source4/rpc_server/lsa/ |
H A D | lsa_lookup.c | 97 const char *nt4_domain = NULL; in dcesrv_lsa_lookup_name() local 103 &nt4_domain, in dcesrv_lsa_lookup_name() 111 match = strequal(nt4_domain, domain_name); in dcesrv_lsa_lookup_name()
|