• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/

Lines Matching defs:domain

44  * Many of the RPC functions need the domain sid.  This function gets
196 * @param domain_sid The domain sid aquired from the remote server
236 * Join a domain, the old way.
245 * @param domain_sid The domain sid aquired from the remote server
305 printf("Joined domain %s.\n",opt_target_workgroup);
309 DEBUG(0, ("error storing domain sid for %s\n", opt_target_workgroup));
317 * Join a domain, the old way.
335 * Join a domain, the old way. This function exists to allow
351 d_fprintf(stderr, "Failed to join domain\n");
367 "\t to join a domain with admin username & password\n"\
411 * display info about a rpc domain
416 * @param domain_sid The domain sid acquired from the remote server
449 /* Get domain policy handle */
454 d_fprintf(stderr, "Could not open domain: %s\n", nt_errstr(result));
467 d_printf("Num domain groups: %u\n", ctr.info.inf2.num_domain_grps);
491 * Fetch domain SID into the local secrets.tdb
496 * @param domain_sid The domain sid acquired from the remote server
521 DEBUG(0,("Can't store domain SID\n"));
562 * @param domain_sid The domain sid acquired from the remote server
602 /* Get domain policy handle */
611 /* Create domain user */
709 * @param domain_sid The domain sid acquired from the remote server
735 /* Get sam policy and domain handles */
801 * @param domain_sid The domain sid acquired from the remote server
852 /* Get domain policy handle */
873 /* Open domain user */
950 * @param domain_sid The domain sid acquired from the remote server
993 /* Get sam policy and domain handles */
1082 * @param domain_sid The domain sid acquired from the remote server
1119 /* Get domain policy handle */
1194 * @param domain_sid The domain sid acquired from the remote server
1226 /* Get domain policy handle */
1235 /* Query domain users */
1360 d_fprintf(stderr, "%s is not in our domain\n", argv[0]);
1657 "List the domain groups a user is member of" },
1691 * @param domain_sid The domain sid acquired from the remote server
1906 /* Get domain policy handle */
1963 /* Get domain policy handle */
2091 /* Get domain policy handle */
2159 /* Get domain policy handle */
2270 /* Get domain policy handle */
2335 /* Get domain policy handle */
2423 * @param domain_sid The domain sid acquired from the remote server
2474 /* Get domain policy handle */
2483 /* Query domain groups */
2523 /* query domain aliases */
2808 /* Get domain policy handle */
2905 /* Get domain policy handle */
2923 d_fprintf(stderr, "Can only rename domain groups\n");
3000 * @param domain_sid The domain sid acquired from the remote server
3057 * @param domain_sid The domain sid acquired from the remote server
3083 * @param domain_sid The domain sid acquired from the remote server
3275 * @param domain_sid The domain sid acquired from the remote server
3367 * @param domain_sid The domain sid acquired from the remote server
3651 * @param domain_sid The domain sid acquired from the remote server
3789 * @param domain_sid The domain sid acquired from the remote server
3981 * For a specific domain on the server, fetch all the aliases
3995 /* Get domain policy handle */
4244 * server directly. These are the user and domain group sids. All of these can
4259 static BOOL get_user_sids(const char *domain, const char *user, NT_USER_TOKEN *token)
4271 domain, *lp_winbind_separator(), user);
4278 fstrcpy(request.data.name.dom_name, domain);
4357 d_fprintf(stderr, "winbind use default domain = yes set, "
4395 fstring domain, user;
4405 fstrcpy(domain, opt_target_workgroup);
4409 fstrcpy(domain, name);
4410 strupper_m(domain);
4414 get_user_sids(domain, user, &(result[i].token));
4599 * @param domain_sid The domain sid acquired from the remote server
4895 * @param domain_sid The domain sid acquired from the remote server
4962 * @param domain_sid The domain sid acquired from the remote server
5064 * @param domain_sid The domain sid aquired from the remote server
5101 * @param domain_sid The domain sid aquired from the remote server
5164 * @param domain_sid The domain sid aquired from the remote server
5212 * @param domain_sid The domain sid aquired from the remote server
5316 * @param domain_sid The domain sid acquired from the server
5346 * Make valid trusting domain account (ie. uppercased and with '$' appended)
5362 /* Get domain policy handle */
5370 /* Create trusting domain's account */
5427 * Create interdomain trust account for a remote domain.
5441 d_printf("Usage: net rpc trustdom add <domain>\n");
5452 * @param domain_sid The domain sid acquired from the server
5484 * Make valid trusting domain account (ie. uppercased and with '$' appended)
5506 /* Get domain policy handle */
5530 /* append the rid to the domain sid */
5564 * Delete interdomain trust account for a remote domain.
5578 d_printf("Usage: net rpc trustdom del <domain>\n");
5585 * Establish trust relationship to a trusting domain.
5610 * Connect to \\server\ipc$ as 'our domain' account with password
5621 /* account name used at first is our domain's name with '$' */
5627 * hence it should be set to remote domain name instead of ours
5635 /* find the domain controller */
5637 DEBUG(0, ("Couldn't find domain controller for domain %s\n", domain_name));
5645 /* Is it trusting domain account for sure ? */
5646 DEBUG(0, ("Couldn't verify trusting domain account. Error was %s\n",
5662 DEBUG(0, ("Couldn't connect to domain %s controller. Error was %s.\n",
5672 DEBUG(0, ("NetServerEnum2 error: Couldn't find primary domain controller\
5673 for domain %s\n", domain_name));
5679 "domain %s", domain_name))) {
5730 DEBUG(0, ("Storing password for trusted domain failed.\n"));
5753 d_printf("Trust to domain %s established\n", domain_name);
5758 * Revoke trust relationship to the remote domain
5772 /* generate upper cased domain name */
5778 DEBUG(0, ("Failed to revoke relationship to the trusted domain %s\n",
5797 d_printf(" net rpc trustdom add \t\t add trusting domain's account\n");
5798 d_printf(" net rpc trustdom del \t\t delete trusting domain's account\n");
5799 d_printf(" net rpc trustdom establish \t establish relationship to trusted domain\n");
5800 d_printf(" net rpc trustdom revoke \t abandon relationship to trusted domain\n");
5851 DEBUG(0,("Could not query trusted domain info. Error was %s\n",
5872 DEBUG(0, ("Storing password for trusted domain failed.\n"));
5878 DEBUG(100,("sucessfully vampired trusted domain [%s], sid: [%s], password: [%s]\n",
5915 * set domain and pdc name to local samba server (default)
5930 DEBUG(0, ("Couldn't connect to domain controller\n"));
5954 /* query info level 5 to obtain sid of a domain being queried */
6058 * set domain and pdc name to local samba server (default)
6073 DEBUG(0, ("Couldn't connect to domain controller\n"));
6097 /* query info level 5 to obtain sid of a domain being queried */
6182 /* SamrOpenDomain - we have to open domain policy handle in order to be
6188 DEBUG(0, ("Couldn't open domain object. Error was %s\n",
6217 * get each single domain's sid (do we _really_ need this ?):
6218 * 1) connect to domain's pdc
6219 * 2) query the pdc for domain's sid
6232 /* set opt_* variables to remote domain */
6239 /* connect to remote domain controller */
6242 /* query for domain's sid */
6244 d_fprintf(stderr, "couldn't get domain's sid\n");
6249 d_fprintf(stderr, "domain controller is not responding\n");
6257 /* close opened samr and domain policy handles */
6260 DEBUG(0, ("Couldn't properly close domain policy handle for domain %s\n", domain_name));
6265 DEBUG(0, ("Couldn't properly close samr policy handle for domain %s\n", domain_name));
6712 d_printf(" net rpc info \t\t\tshow basic info about a domain \n");
6713 d_printf(" net rpc join \t\t\tto join a domain \n");
6714 d_printf(" net rpc oldjoin \t\t\tto join a domain created in server manager\n");
6723 d_printf(" net rpc getsid \t\tfetch the domain sid into the local secrets.tdb\n");
6726 d_printf(" net rpc trustdom \t\tto create trusting domain's account or establish trust\n");