/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | net_rpc_printer.c | 714 fstring servername, printername2; local 716 slprintf(servername, sizeof(servername)-1, "\\\\%s", pipe_hnd->cli->desthost); 718 fstrcpy(printername2, servername); 723 servername, username, printername2, access_required)); 728 servername, username, hnd); 733 printername2, servername, username); 739 printername2, servername, dos_errstr(result)); 744 printername2, servername));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/printing/ |
H A D | nt_printing.c | 2382 * in addprinter: no servername and the printer is the name 2383 * in setprinter: servername is \\server 2393 if ( info->servername[0] != '\0' ) { 2394 trim_string(info->printername, info->servername, NULL); 2396 info->servername[0]='\0'; 2426 info->servername, 3746 static WERROR get_a_printer_2_default(NT_PRINTER_INFO_LEVEL_2 *info, const char *servername, const char* sharename) argument 3750 slprintf(info->servername, sizeof(info->servername)-1, "\\\\%s", servername); 3822 get_a_printer_2(NT_PRINTER_INFO_LEVEL_2 *info, const char *servername, const char *sharename) argument 4455 fstring servername; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/ |
H A D | py_spoolss_printers_conv.c | 26 { "server_name", PY_UNISTR, offsetof(PRINTER_INFO_0, servername) }, 83 { "server_name", PY_UNISTR, offsetof(PRINTER_INFO_2, servername) },
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/ |
H A D | cli_svcctl.c | 81 if ( !(in.servername = TALLOC_P( mem_ctx, UNISTR2 )) ) 84 init_unistr2( in.servername, server, UNI_STR_TERMINATE );
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/nfs/ |
H A D | mount_clnt.c | 159 .servername = info->hostname, 231 .servername = info->hostname,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | rpc_svcctl.h | 216 UNISTR2 *servername; member in struct:__anon5514
|
H A D | rpc_spoolss.h | 881 UNISTR servername; member in struct:printer_info_0 938 UNISTR servername; member in struct:printer_info_2 971 UNISTR servername; member in struct:printer_info_4 1008 UNISTR2 servername; member in struct:spool_q_enumprinters 1482 UNISTR2 servername; member in struct:spool_printer_info_level_2
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/contrib/shell_utils/ |
H A D | asip-status.pl | 244 my ($servername) = join("", @packet[11..(11+$servername_len-1)]); 246 print "Server name: $servername\n"; 287 if ($flags & (1<<9)) { # Supports UTF8 servername
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/sunrpc/ |
H A D | clnt.h | 110 char *servername; member in struct:rpc_create_args
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | s_server.c | 645 " -servername host - servername for HostName TLS extension\n"); 649 " -cert2 arg - certificate file to use for servername\n"); 652 " -key2 arg - Private Key file to use for servername, in cert file if\n"); 855 char *servername; member in struct:tlsextctx_st 863 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 864 if (servername && p->biodebug) 866 servername); 868 if (!p->servername) 871 if (servername) { [all...] |
H A D | s_client.c | 416 " -servername host - Set TLS extension servername in ClientHello\n"); 713 char *servername = NULL; local 1098 else if (strcmp(*argv, "-servername") == 0) { 1101 servername = *(++argv); 1360 if (servername != NULL) { 1407 if (servername != NULL) { 1408 if (!SSL_set_tlsext_host_name(con, servername)) { 1409 BIO_printf(bio_err, "Unable to set TLS servername extension.\n"); 1677 if (servername ! [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | s_server.c | 645 " -servername host - servername for HostName TLS extension\n"); 649 " -cert2 arg - certificate file to use for servername\n"); 652 " -key2 arg - Private Key file to use for servername, in cert file if\n"); 855 char *servername; member in struct:tlsextctx_st 863 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 864 if (servername && p->biodebug) 866 servername); 868 if (!p->servername) 871 if (servername) { [all...] |
H A D | s_client.c | 416 " -servername host - Set TLS extension servername in ClientHello\n"); 713 char *servername = NULL; local 1098 else if (strcmp(*argv, "-servername") == 0) { 1101 servername = *(++argv); 1360 if (servername != NULL) { 1407 if (servername != NULL) { 1408 if (!SSL_set_tlsext_host_name(con, servername)) { 1409 BIO_printf(bio_err, "Unable to set TLS servername extension.\n"); 1677 if (servername ! [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | namequery.c | 50 BOOL saf_store( const char *domain, const char *servername ) 56 if ( !domain || !servername ) { 57 DEBUG(2,("saf_store: Refusing to store empty domain or servername!\n")); 61 if ( (strlen(domain) == 0) || (strlen(servername) == 0) ) { 62 DEBUG(0,("saf_store: refusing to store 0 length domain or servername!\n")); 74 domain, servername, (unsigned int)expire )); 76 ret = gencache_set( key, servername, expire );
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_parse/ |
H A D | parse_spoolss.c | 1032 inf->servername_ptr = (info->servername.buffer!=NULL)?1:0; 1052 init_unistr2_from_unistr(&inf->servername, &info->servername); 2191 if (!smb_io_relstr("servername", buffer, depth, &info->servername)) 2317 if (!smb_io_relstr("servername", buffer, depth, &info->servername)) 2463 if (!smb_io_relstr("servername", buffer, depth, &info->servername)) 3027 size+=size_of_relative_string( &info->servername ); 3624 make_spoolss_q_enumprinters( SPOOL_Q_ENUMPRINTERS *q_u, uint32 flags, char *servername, uint32 level, RPC_BUFFER *buffer, uint32 offered ) argument 3649 make_spoolss_q_enumports(SPOOL_Q_ENUMPORTS *q_u, fstring servername, uint32 level, RPC_BUFFER *buffer, uint32 offered) argument 5502 make_spoolss_q_getprinterdriverdir(SPOOL_Q_GETPRINTERDRIVERDIR *q_u, fstring servername, fstring env_name, uint32 level, RPC_BUFFER *buffer, uint32 offered) argument [all...] |
H A D | parse_eventlog.c | 65 if ( !prs_unistr4("servername", ps, depth, &q_u->servername) )
|
H A D | parse_srv.c | 1823 if(!prs_pointer("servername", ps, depth, (void**)&q_u->servername, sizeof(UNISTR2), (PRS_POINTER_CAST)prs_io_unistr2)) 2508 if ( (q_n->servername = TALLOC_P( get_talloc_ctx(), UNISTR2 )) == NULL ) 2510 init_buf_unistr2(q_n->servername, &ptr, srv_name); 2550 if(!prs_pointer("servername", ps, depth, (void**)&q_u->servername, sizeof(UNISTR2), (PRS_POINTER_CAST)prs_io_unistr2)) 2622 if ( (q_n->servername = TALLOC_P( get_talloc_ctx(), UNISTR2 )) == NULL ) { 2625 init_unistr2(q_n->servername, server, UNI_STR_TERMINATE); 3297 if(!prs_pointer("servername", ps, depth, (void**)&q_n->servername, sizeo [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/logon/mklogon/ |
H A D | mklogon.pl | 64 's|servername=s' => \my $server, 106 my $altserver = $cfg->param("global.servername"); 377 $0 -u User -m machine -s servername -o ostype -i X.X.X.X -d MM/DD/YY
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/ |
H A D | srv_netlog_nt.c | 106 fstring servername, domain, dc_name, dc_name2; local 110 unistr2_to_ascii(servername, &q_u->uni_server_name, sizeof(servername));
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/arm-uclibc/target/www/ |
H A D | bas_pppoe.js | 87 function check_wizard_pppoe(check,servername,page) 111 for(i=0;i<servername.length;i++) 113 if(isValidChar(servername.charCodeAt(i))==false)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libaddns/ |
H A D | dns.h | 496 const char *servername,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/lockd/ |
H A D | host.c | 361 .servername = host->h_name,
|
H A D | mon.c | 75 .servername = "rpc.statd",
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/ |
H A D | rpcb_clnt.c | 183 .servername = "localhost", 234 .servername = hostname,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssltest.c | 317 const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); local 323 if (servername != NULL) { 325 !strcasecmp(servername, sn_server2)) { 818 fprintf(stderr, " -sn_client <string> - have client request this servername\n"); 819 fprintf(stderr, " -sn_server1 <string> - have server context 1 respond to this servername\n"); 820 fprintf(stderr, " -sn_server2 <string> - have server context 2 respond to this servername\n");
|