• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/

Lines Matching defs:domain

3    Authenticate against a remote domain
30 * Connect to a remote server for (inter)domain security authenticaion.
35 * @param setup_creds_as domain account to setup credentials as
36 * @param sec_chan a switch value to distinguish between domain
44 const char *domain,
96 * We now have an anonymous connection to IPC$ on the domain password server.
101 * pipe here. We do this as we may just have changed the domain
112 PIPE_AUTH_LEVEL_PRIVACY, domain, &result);
118 DEBUG(0,("connect_to_domain_password_server: unable to open the domain client session to \
132 if (!get_trust_pw(domain, machine_pwd, &sec_chan_type)) {
134 "trust account password for domain '%s'\n",
135 domain));
144 domain, /* domain */
160 DEBUG(0,("connect_to_domain_password_server: unable to open the domain client session to \
183 const char *domain,
201 * these over the secure channel to a domain controller and
209 domain,
226 saf_store( domain, cli->desthost );
240 user_info->client_domain, /* domain name */
254 "for user %s in domain %s to Domain controller %s. "
256 user_info->domain, dc_name,
266 domain,
297 Check for a valid username and password in security=domain mode.
307 const char *domain = lp_workgroup();
313 "ntdomain auth method when not a member of a domain.\n"));
323 * Check that the requested domain is not our own machine name.
328 if(strequal(get_global_sam_name(), user_info->domain)) {
329 DEBUG(3,("check_ntdomain_security: Requested domain was for this machine.\n"));
335 if ( !get_dc_name(domain, NULL, dc_name, &dc_ip) ) {
336 DEBUG(5,("check_ntdomain_security: unable to locate a DC for domain %s\n",
337 user_info->domain));
343 domain,
366 Check for a valid username and password in a trusted domain
389 * Check that the requested domain is not our own machine name or domain name.
392 if( strequal(get_global_sam_name(), user_info->domain)) {
393 DEBUG(3,("check_trustdomain_security: Requested domain [%s] was for this machine.\n",
394 user_info->domain));
398 /* No point is bothering if this is not a trusted domain.
400 The logic is that if we know nothing about the domain, that
403 if ( !is_trusted_domain( user_info->domain ) )
407 * Get the trusted account password for the trusted domain
411 if (!secrets_fetch_trusted_domain_password(user_info->domain, &trust_password,
414 "account password for domain %s\n",
415 user_info->domain));
420 DEBUG(100, ("Trust password for domain %s is %s\n", user_info->domain,
437 if ( !get_dc_name(user_info->domain, NULL, dc_name, &dc_ip) ) {
438 DEBUG(5,("check_trustdomain_security: unable to locate a DC for domain %s\n",
439 user_info->domain));
445 user_info->domain,