/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | winbindd_sid.c | 32 const char *dom_name, const char *name, 55 const char *dom_name, const char *name, 67 fstrcpy(state->response.data.name.dom_name, dom_name); 86 state->request.data.name.dom_name[sizeof(state->request.data.name.dom_name)-1]='\0'; 98 name_domain = state->request.data.name.dom_name; 54 lookupsid_recv(void *private_data, BOOL success, const char *dom_name, const char *name, enum lsa_SidType type) argument
|
H A D | idmap_nss.c | 152 const char *dom_name = NULL; local 159 ret = winbind_lookup_sid(ctx, ids[i]->sid, &dom_name, &name, &type);
|
H A D | wb_client.c | 37 BOOL winbind_lookup_name(const char *dom_name, const char *name, DOM_SID *sid, argument 52 fstrcpy(request.data.name.dom_name, dom_name); 94 *domain = talloc_strdup(mem_ctx, response.data.name.dom_name); 111 sid_string_static(sid), response.data.name.dom_name,
|
H A D | winbindd_async.c | 694 void (*cont)(void *priv, BOOL succ, const char *dom_name, 711 cont(private_data, True, response->data.name.dom_name, 718 const char *dom_name, 748 char *dom_name; local 765 if (!winbindd_lookup_name_by_sid(state->mem_ctx, &sid, &dom_name, &name, 767 TALLOC_FREE(dom_name); 772 fstrcpy(state->response.data.name.dom_name, dom_name); 776 TALLOC_FREE(dom_name); 849 name_domain = state->request.data.name.dom_name; 716 winbindd_lookupsid_async(TALLOC_CTX *mem_ctx, const DOM_SID *sid, void (*cont)(void *private_data, BOOL success, const char *dom_name, const char *name, enum lsa_SidType type), void *private_data) argument 880 winbindd_lookupname_async(TALLOC_CTX *mem_ctx, const char *dom_name, const char *name, void (*cont)(void *private_data, BOOL success, const DOM_SID *sid, enum lsa_SidType type), void *private_data) argument [all...] |
H A D | winbindd_nss.h | 282 fstring dom_name; /* lookupname */ member in struct:winbindd_request::__anon5839::__anon5845 378 fstring dom_name; /* lookupsid */ member in struct:winbindd_response::__anon5852::winbindd_name
|
H A D | winbindd_user.c | 71 static BOOL winbindd_fill_pwent(char *dom_name, char *user_name, argument 79 if (!pw || !dom_name || !user_name) 100 fill_domain_username(output_username, dom_name, user_name, True); 112 if (!fillup_pw_field(lp_template_homedir(), user_name, dom_name, 116 if (!fillup_pw_field(lp_template_shell(), user_name, dom_name,
|
H A D | winbindd_group.c | 181 static BOOL fill_grent(struct winbindd_gr *gr, const char *dom_name, argument 186 fill_domain_username( full_group_name, dom_name, gr_name, True ); 596 char *dom_name; local 604 if (!winbindd_lookup_name_by_sid(state->mem_ctx, &group_sid, &dom_name, 609 TALLOC_FREE(dom_name); 621 TALLOC_FREE(dom_name); 633 TALLOC_FREE(dom_name); 637 if (!fill_grent(&state->response.data.gr, dom_name, group_name, 644 TALLOC_FREE(dom_name); 658 TALLOC_FREE(dom_name); [all...] |
H A D | idmap_tdb.c | 56 fstring dom_name; local 67 fstrcpy(dom_name, key.dptr); 70 domain = find_domain_from_name(dom_name); 73 DEBUG(0,("Unable to find domain %s\n", dom_name ));
|
H A D | winbindd_util.c | 736 * @param dom_name On success, set to the 'domain name' corresponding to @p sid. 744 char **dom_name, 751 *dom_name = NULL; 763 result = domain->methods->sid_to_name(domain, mem_ctx, sid, dom_name, name, type); 742 winbindd_lookup_name_by_sid(TALLOC_CTX *mem_ctx, DOM_SID *sid, char **dom_name, char **name, enum lsa_SidType *type) argument
|
H A D | wbinfo.c | 632 d_printf("%s%c%s %d\n", response.data.name.dom_name, 727 parse_wbinfo_domain_user(name, request.data.name.dom_name,
|
H A D | winbind_nss_linux.c | 1144 strlen(response.data.name.dom_name) + 1154 response.data.name.dom_name,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/ |
H A D | srv_lsa_nt.c | 65 static void init_dom_query_3(DOM_QUERY_3 *d_q, const char *dom_name, DOM_SID *dom_sid) argument 67 d_q->buffer_dom_name = (dom_name != NULL) ? 1 : 0; /* domain buffer pointer */ 72 init_unistr2(&d_q->uni_domain_name, dom_name, UNI_BROKEN_NON_NULL); 100 static void init_dom_query_5(DOM_QUERY_5 *d_q, const char *dom_name, DOM_SID *dom_sid) argument 102 init_dom_query_3(d_q, dom_name, dom_sid); 109 static int init_dom_ref(DOM_R_REF *ref, const char *dom_name, DOM_SID *dom_sid) argument 113 if (dom_name != NULL) { 134 init_unistr2(&ref->ref_dom[num].uni_dom_name, dom_name, UNI_FLAGS_NONE); 1641 if (!lookup_sid(&handle->sid, dom_name, name, &type))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/ |
H A D | py_winbind.c | 62 fstrcpy(request.data.name.dom_name, name); 65 fstrcpy(request.data.name.dom_name, lp_workgroup()); 103 asprintf(&name, "%s%s%s", response.data.name.dom_name,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libmsrpc/ |
H A D | cac_lsarpc.c | 466 char *dom_name = NULL; local 472 &dom_name, &local_sid ); 486 op->out.local_sid->domain = dom_name; 496 char *dom_name; local 502 &dom_name, 520 op->out.domain_sid->domain = dom_name;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/modules/ |
H A D | vfs_afsacl.c | 719 const char *dom_name, *name; local 758 &dom_name, &name, &name_type)) { 769 dom_name, lp_winbind_separator(),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpcclient/ |
H A D | cmd_lsarpc.c | 120 fstring dom_name, dns_dom_name, forest_name; local 122 unistr2_to_ascii(dom_name, &d.uni_nb_dom_name, d.hdr_nb_dom_name.uni_max_len); 126 d_printf("Domain NetBios Name: %s\n", dom_name);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | auth_util.c | 2183 BOOL is_trusted_domain(const char* dom_name) argument 2198 "[%s]\n", dom_name )); 2199 ret = secrets_fetch_trusted_domain_password(dom_name, NULL, 2210 result = wb_is_trusted_domain(dom_name); 2232 if ( trustdom_cache_fetch(dom_name, &trustdom_sid) ) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/ |
H A D | cli_lsarpc.c | 244 fstring name, dom_name; local 252 dom_name, &ref.ref_dom[dom_idx].uni_dom_name); 257 (*domains)[i] = talloc_strdup(mem_ctx, dom_name);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 233 request.data.name.dom_name,
|
H A D | net_rpc.c | 4278 fstrcpy(request.data.name.dom_name, domain);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_parse/ |
H A D | parse_lsa.c | 1648 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */ 1769 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */ 1922 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */ 2051 if(!smb_io_unistr2("dom_name", &q_r->uni_name[i], q_r->hdr_name[i].buffer, ps, depth)) /* names to be looked up */ 3772 const char *dom_name) 3777 init_lsa_string(&q->domain_name, dom_name ); 3770 init_q_query_trusted_domain_info_by_name(LSA_Q_QUERY_TRUSTED_DOMAIN_INFO_BY_NAME *q, POLICY_HND *hnd, uint16 info_class, const char *dom_name) argument
|
H A D | parse_net.c | 574 uint32 num_doms, const char *dom_name) 589 fstrcpy(domain_name, dom_name); 573 init_r_trust_dom(NET_R_TRUST_DOM_LIST *r_t, uint32 num_doms, const char *dom_name) argument
|
H A D | parse_samr.c | 92 POLICY_HND *pol, char *dom_name) 98 init_unistr2(&q_u->uni_domain, dom_name, UNI_FLAGS_NONE); 91 init_samr_q_lookup_domain(SAMR_Q_LOOKUP_DOMAIN * q_u, POLICY_HND *pol, char *dom_name) argument
|