Searched refs:hnd (Results 1 - 25 of 197) sorted by relevance

12345678

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libmsrpc/
H A Dlibmsrpc.c27 int cac_InitHandleData( CacServerHandle * hnd );
40 int cac_InitHandleMem( CacServerHandle * hnd )
42 hnd->username = SMB_MALLOC_ARRAY( char, sizeof( fstring ) );
44 if ( !hnd->username )
47 hnd->username[0] = '\0';
49 hnd->domain = SMB_MALLOC_ARRAY( char, sizeof( fstring ) );
50 if ( !hnd->domain )
53 hnd->domain[0] = '\0';
55 hnd->netbios_name = SMB_MALLOC_ARRAY( char, sizeof( fstring ) );
56 if ( !hnd
78 CacServerHandle *hnd; local
143 cac_SetAuthDataFn( CacServerHandle * hnd, smbc_get_auth_data_fn auth_fn ) argument
148 cac_SetSmbcContext( CacServerHandle * hnd, SMBCCTX * ctx ) argument
183 cac_Connect( CacServerHandle * hnd, const char *srv ) argument
[all...]
H A Dcac_samr.c33 DOM_SID *cac_get_domain_sid( CacServerHandle * hnd, TALLOC_CTX * mem_ctx,
36 int cac_SamConnect( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, argument
43 if ( !hnd )
46 if ( !hnd->_internal.ctx ) {
47 hnd->status = NT_STATUS_INVALID_HANDLE;
52 hnd->status = NT_STATUS_INVALID_PARAMETER;
56 srv = cac_GetServer( hnd );
58 hnd->status = NT_STATUS_INVALID_CONNECTION;
63 if ( !hnd->_internal.pipes[PI_SAMR] ) {
67 &hnd
114 cac_SamClose( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * sam ) argument
151 cac_get_domain_sid( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, uint32 des_access ) argument
191 cac_SamOpenDomain( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamOpenDomain *op ) argument
281 cac_SamOpenUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamOpenUser *op ) argument
361 cac_SamCreateUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamCreateUser *op ) argument
413 cac_SamDeleteUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * user_hnd ) argument
446 cac_SamEnumUsers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamEnumUsers *op ) argument
506 cac_SamGetNamesFromRids( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetNamesFromRids *op ) argument
596 cac_SamGetRidsFromNames( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetRidsFromNames *op ) argument
688 cac_SamGetGroupsForUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetGroupsForUser *op ) argument
760 cac_SamOpenGroup( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamOpenGroup *op ) argument
805 cac_SamCreateGroup( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamCreateGroup *op ) argument
852 cac_SamDeleteGroup( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * group_hnd ) argument
886 cac_SamGetGroupMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetGroupMembers *op ) argument
930 cac_SamAddGroupMember( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamAddGroupMember *op ) argument
964 cac_SamRemoveGroupMember( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamRemoveGroupMember *op ) argument
998 cac_SamClearGroupMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * group_hnd ) argument
1066 cac_SamSetGroupMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetGroupMembers *op ) argument
1112 cac_SamEnumGroups( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamEnumGroups *op ) argument
1219 cac_SamEnumAliases( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamEnumAliases *op ) argument
1328 cac_SamCreateAlias( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamCreateAlias *op ) argument
1374 cac_SamOpenAlias( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamOpenAlias *op ) argument
1419 cac_SamDeleteAlias( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * alias_hnd ) argument
1453 cac_SamAddAliasMember( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamAddAliasMember *op ) argument
1487 cac_SamRemoveAliasMember( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamRemoveAliasMember *op ) argument
1521 cac_SamGetAliasMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetAliasMembers *op ) argument
1562 cac_SamClearAliasMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * alias_hnd ) argument
1628 cac_SamSetAliasMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetAliasMembers *op ) argument
1674 cac_SamUserChangePasswd( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamUserChangePasswd *op ) argument
1730 cac_SamEnableUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * user_hnd ) argument
1792 cac_SamDisableUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * user_hnd ) argument
1852 cac_SamSetPassword( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetPassword *op ) argument
1908 cac_SamGetUserInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetUserInfo *op ) argument
1951 cac_SamSetUserInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetUserInfo *op ) argument
2020 cac_SamGetUserInfoCtr( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetUserInfoCtr *op ) argument
2059 cac_SamSetUserInfoCtr( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetUserInfoCtr *op ) argument
2104 cac_SamRenameUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamRenameUser *op ) argument
2159 cac_SamGetGroupInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetGroupInfo *op ) argument
2203 cac_SamSetGroupInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetGroupInfo *op ) argument
2245 cac_SamRenameGroup( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamRenameGroup *op ) argument
2287 cac_SamGetAliasInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetAliasInfo *op ) argument
2331 cac_SamSetAliasInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetAliasInfo *op ) argument
2373 cac_SamGetDomainInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetDomainInfo *op ) argument
2470 cac_SamGetDomainInfoCtr( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetDomainInfoCtr *op ) argument
2514 cac_SamGetDisplayInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetDisplayInfo *op ) argument
2587 cac_SamLookupDomain( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamLookupDomain *op ) argument
2631 cac_SamGetSecurityObject( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetSecurityObject *op ) argument
2672 cac_SamFlush( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamFlush *op ) argument
[all...]
H A Dcac_winreg.c28 int cac_RegConnect( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, argument
36 if ( !hnd )
39 if ( !hnd->_internal.ctx ) {
40 hnd->status = NT_STATUS_INVALID_HANDLE;
45 hnd->status = NT_STATUS_INVALID_PARAMETER;
49 srv = cac_GetServer( hnd );
51 hnd->status = NT_STATUS_INVALID_CONNECTION;
56 if ( !hnd->_internal.pipes[PI_WINREG] ) {
60 &( hnd->status ) ) ) ) {
64 hnd
92 cac_RegClose( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * key ) argument
127 cac_RegOpenKey( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegOpenKey *op ) argument
219 cac_RegEnumKeys( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegEnumKeys *op ) argument
333 cac_RegCreateKey( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegCreateKey *op ) argument
455 cac_RegDeleteKey( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegDeleteKey *op ) argument
520 cac_RegDeleteValue( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegDeleteValue *op ) argument
648 cac_RegQueryValue( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegQueryValue *op ) argument
701 cac_RegEnumValues( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegEnumValues *op ) argument
814 cac_RegSetValue( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegSetValue *op ) argument
871 cac_RegGetVersion( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegGetVersion *op ) argument
910 cac_RegGetKeySecurity( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegGetKeySecurity *op ) argument
959 cac_RegSetKeySecurity( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegSetKeySecurity *op ) argument
998 cac_RegSaveKey( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegSaveKey *op ) argument
1035 cac_Shutdown( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct Shutdown *op ) argument
1110 cac_AbortShutdown( CacServerHandle * hnd, TALLOC_CTX * mem_ctx ) argument
[all...]
H A Dcac_svcctl.c27 int cac_WaitForService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx,
31 int cac_SvcOpenScm( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, argument
40 if ( !hnd )
43 if ( !hnd->_internal.ctx ) {
44 hnd->status = NT_STATUS_INVALID_HANDLE;
49 hnd->status = NT_STATUS_INVALID_PARAMETER;
53 srv = cac_GetServer( hnd );
55 hnd->status = NT_STATUS_INVALID_CONNECTION;
60 if ( !hnd->_internal.pipes[PI_SVCCTL] ) {
64 &( hnd
90 cac_SvcClose( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * scm_hnd ) argument
124 cac_SvcEnumServices( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcEnumServices *op ) argument
186 cac_SvcOpenService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcOpenService *op ) argument
232 cac_SvcControlService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcControlService *op ) argument
276 cac_SvcGetStatus( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcGetStatus *op ) argument
325 cac_WaitForService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * svc_hnd, uint32 state, uint32 timeout, SERVICE_STATUS * status ) argument
361 cac_SvcStartService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcStartService *op ) argument
409 cac_SvcStopService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcStopService *op ) argument
455 cac_SvcPauseService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcPauseService *op ) argument
501 cac_SvcContinueService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcContinueService *op ) argument
547 cac_SvcGetDisplayName( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcGetDisplayName *op ) argument
592 cac_SvcGetServiceConfig( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcGetServiceConfig *op ) argument
[all...]
H A Dcac_lsarpc.c25 int cac_LsaOpenPolicy( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, argument
32 if ( !hnd )
35 if ( !hnd->_internal.ctx ) {
36 hnd->status = NT_STATUS_INVALID_HANDLE;
41 hnd->status = NT_STATUS_INVALID_PARAMETER;
47 srv = cac_GetServer( hnd );
49 hnd->status = NT_STATUS_INVALID_CONNECTION;
54 if ( !hnd->_internal.pipes[PI_LSARPC] ) {
57 &hnd->status );
60 hnd
119 cac_LsaClosePolicy( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * pol ) argument
152 cac_LsaGetNamesFromSids( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaGetNamesFromSids *op ) argument
292 cac_LsaGetSidsFromNames( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaGetSidsFromNames *op ) argument
436 cac_LsaFetchSid( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaFetchSid *op ) argument
529 cac_LsaQueryInfoPolicy( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaQueryInfoPolicy *op ) argument
579 cac_LsaEnumSids( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaEnumSids *op ) argument
623 cac_LsaEnumAccountRights( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaEnumAccountRights *op ) argument
687 cac_LsaEnumTrustedDomains( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaEnumTrustedDomains *op ) argument
732 cac_LsaOpenTrustedDomain( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaOpenTrustedDomain *op ) argument
779 cac_LsaQueryTrustedDomainInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaQueryTrustedDomainInfo *op ) argument
839 cac_LsaEnumPrivileges( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaEnumPrivileges *op ) argument
888 cac_LsaOpenAccount( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaOpenAccount *op ) argument
961 cac_LsaAddPrivileges( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaAddPrivileges *op ) argument
1023 cac_LsaRemovePrivileges( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaRemovePrivileges *op ) argument
1085 cac_LsaClearPrivileges( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaClearPrivileges *op ) argument
1145 cac_LsaSetPrivileges( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaAddPrivileges *op ) argument
1216 cac_LsaGetSecurityObject( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaGetSecurityObject *op ) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/lsa/
H A Dlsapol.c6 void fill_conn_info(CacServerHandle *hnd) { argument
24 hnd->domain = SMB_STRDUP(domain);
25 hnd->username = SMB_STRDUP(username);
26 hnd->password = SMB_STRDUP(password);
27 hnd->server = SMB_STRDUP(server);
31 CacServerHandle *hnd = NULL; local
38 hnd = cac_NewServerHandle(False);
41 cac_SetAuthDataFn(hnd, cac_GetAuthDataFn);
43 hnd->debug = 0;
45 fill_conn_info(hnd);
[all...]
H A Dlsaenumprivs.c9 CacServerHandle *hnd = NULL; local
17 hnd = cac_NewServerHandle(True);
20 fscanf(stdin, "%s", hnd->server);
24 if(!cac_Connect(hnd, NULL)) {
25 fprintf(stderr, "Could not connect to server.\n Error: %s\n errno %s\n", nt_errstr(hnd->status), strerror(errno));
26 cac_FreeHandle(hnd);
39 if(!cac_LsaOpenPolicy(hnd, mem_ctx, &lop)) {
40 fprintf(stderr, "Could not open policy handle.\n Error: %s\n", nt_errstr(hnd->status));
41 cac_FreeHandle(hnd);
55 while(cac_LsaEnumPrivileges(hnd, mem_ct
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/reg/
H A Dregkey.c6 CacServerHandle *hnd = NULL; local
13 hnd = cac_NewServerHandle(False);
16 hnd->username = SMB_MALLOC_ARRAY(char, sizeof(fstring));
17 hnd->domain = SMB_MALLOC_ARRAY(char, sizeof(fstring));
18 hnd->netbios_name = SMB_MALLOC_ARRAY(char, sizeof(fstring));
19 hnd->password = SMB_MALLOC_ARRAY(char, sizeof(fstring));
21 hnd->server = SMB_MALLOC_ARRAY(char, sizeof(fstring));
24 fscanf(stdin, "%s", hnd->server);
29 if(!cac_Connect(hnd, NULL)) {
30 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd
[all...]
H A Dshutdown.c8 CacServerHandle *hnd = NULL; local
15 hnd = cac_NewServerHandle(True);
17 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn);
19 cac_parse_cmd_line(argc, argv, hnd);
21 hnd->_internal.srv_level = SRV_WIN_NT4;
23 if(!cac_Connect(hnd, NULL)) {
24 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status));
49 if(!cac_Shutdown(hnd, mem_ctx, &s)) {
50 fprintf(stderr, "could not shut down server: error %s\n", nt_errstr(hnd
[all...]
H A Dregsetval.c7 CacServerHandle *hnd = NULL; local
14 hnd = cac_NewServerHandle(True);
16 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn);
18 cac_parse_cmd_line(argc, argv, hnd);
20 if(!cac_Connect(hnd, NULL)) {
21 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status));
34 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) {
35 fprintf(stderr, "Could not open key %s. Error %s\n", rok.in.name, nt_errstr(hnd->status));
46 if(!cac_RegSetValue(hnd, mem_ct
[all...]
H A Dsecurity.c7 CacServerHandle *hnd = NULL; local
14 hnd = cac_NewServerHandle(True);
16 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn);
18 cac_parse_cmd_line(argc, argv, hnd);
20 if(!cac_Connect(hnd, NULL)) {
21 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status));
34 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) {
35 fprintf(stderr, "Could not open key %s. Error %s\n", rok.in.name, nt_errstr(hnd->status));
45 if(!cac_RegGetKeySecurity(hnd, mem_ct
[all...]
H A Dregkeycreate.c8 CacServerHandle *hnd = NULL; local
17 hnd = cac_NewServerHandle(True);
20 fscanf(stdin, "%s", hnd->server);
28 if(!cac_Connect(hnd, NULL)) {
29 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd->status), strerror(errno));
30 cac_FreeHandle(hnd);
43 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) {
44 fprintf(stderr, "Could not open key %s\n Error: %s\n", rok.in.name, nt_errstr(hnd->status));
58 if(!cac_RegCreateKey(hnd, mem_ctx, &rck)) {
59 fprintf(stderr, "Could not create key. Error %s\n", nt_errstr(hnd
[all...]
H A Dregopen.c6 CacServerHandle *hnd = NULL; local
18 hnd = cac_NewServerHandle(True);
23 fscanf(stdin, "%s", hnd->server);
25 if(!cac_Connect(hnd, NULL)) {
26 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd->status), strerror(errno));
27 cac_FreeHandle(hnd);
41 if(!cac_RegConnect(hnd, mem_ctx, &rc)) {
42 fprintf(stderr, " Could not connect to registry. %s\n", nt_errstr(hnd->status));
55 if(!cac_RegClose(hnd, mem_ctx, keys[i])) {
56 fprintf(stderr, " Could not close handle. %s\n", nt_errstr(hnd
[all...]
H A Dregopenkey.c6 CacServerHandle *hnd = NULL; local
16 hnd = cac_NewServerHandle(True);
19 fscanf(stdin, "%s", hnd->server);
35 if(!cac_Connect(hnd, NULL)) {
36 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd->status), strerror(errno));
37 cac_FreeHandle(hnd);
51 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) {
52 fprintf(stderr, "Could not open key %s\n Error: %s\n", rok.in.name, nt_errstr(hnd->status));
58 if(!cac_RegClose(hnd, mem_ctx, rok.out.key)) {
59 fprintf(stderr, "Could not close handle %s\n", nt_errstr(hnd
[all...]
H A Dregkeyenum.c8 CacServerHandle *hnd = NULL; local
21 hnd = cac_NewServerHandle(True);
24 fscanf(stdin, "%s", hnd->server);
43 if(!cac_Connect(hnd, NULL)) {
44 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd->status), strerror(errno));
45 cac_FreeHandle(hnd);
59 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) {
60 fprintf(stderr, "Could not open key %s\n Error: %s\n", rok.in.name, nt_errstr(hnd->status));
73 while(cac_RegEnumKeys(hnd, mem_ctx, &ek)) {
81 if(CAC_OP_FAILED(hnd
[all...]
H A Dregqueryval.c9 CacServerHandle *hnd = NULL; local
18 hnd = cac_NewServerHandle(True);
20 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn);
22 cac_parse_cmd_line(argc, argv, hnd);
30 if(!cac_Connect(hnd, NULL)) {
31 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd->status), strerror(errno));
32 cac_FreeHandle(hnd);
45 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) {
46 fprintf(stderr, "Could not open key %s\n Error: %s\n", rok.in.name, nt_errstr(hnd->status));
57 if(!cac_RegQueryValue(hnd, mem_ct
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/sam/
H A Ddisable.c6 CacServerHandle *hnd = NULL; local
15 hnd = cac_NewServerHandle(True);
17 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn);
19 cac_parse_cmd_line(argc, argv, hnd);
21 if(!cac_Connect(hnd, NULL)) {
22 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status));
31 if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) {
32 fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status));
44 if(!cac_SamOpenUser(hnd, mem_ct
[all...]
H A Denable.c7 CacServerHandle *hnd = NULL; local
16 hnd = cac_NewServerHandle(True);
18 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn);
20 cac_parse_cmd_line(argc, argv, hnd);
22 if(!cac_Connect(hnd, NULL)) {
23 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status));
32 if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) {
33 fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status));
45 if(!cac_SamOpenUser(hnd, mem_ct
[all...]
H A Dadduser.c6 CacServerHandle *hnd = NULL; local
17 hnd = cac_NewServerHandle(True);
19 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn);
21 cac_parse_cmd_line(argc, argv, hnd);
23 if(!cac_Connect(hnd, NULL)) {
24 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status));
33 if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) {
34 fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status));
48 if(!cac_SamCreateUser(hnd, mem_ct
[all...]
H A Ddominfo.c7 CacServerHandle *hnd = NULL; local
12 hnd = cac_NewServerHandle(True);
14 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn);
16 cac_parse_cmd_line(argc, argv, hnd);
18 if(!cac_Connect(hnd, NULL)) {
19 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status));
28 if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) {
29 fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status));
38 if(!cac_SamGetDomainInfo(hnd, mem_ct
[all...]
H A Dsamenum.c7 CacServerHandle *hnd = NULL; local
21 hnd = cac_NewServerHandle(True);
23 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn);
25 cac_parse_cmd_line(argc, argv, hnd);
27 if(!cac_Connect(hnd, NULL)) {
28 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status));
37 if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) {
38 fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status));
56 while(cac_SamEnumUsers(hnd, mem_ct
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/smbc_test/
H A Dsmbc.c9 CacServerHandle *hnd = NULL; local
26 hnd = cac_NewServerHandle(True);
28 cac_parse_cmd_line(argc, argv, hnd);
36 ctx->debug = hnd->debug;
43 cac_SetSmbcContext(hnd, ctx);
46 if(!cac_Connect(hnd, NULL)) {
52 if(!cac_LsaOpenPolicy(hnd, mem_ctx, &lop))
53 printf("Could not open LSA policy. Error: %s\n", nt_errstr(hnd->status));
59 if(!cac_RegConnect(hnd, mem_ctx, &rc))
60 printf("Could not connect to registry. Error: %s\n", nt_errstr(hnd
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/cacusermgr/
H A Dcacusermgr.c26 void create_menu(CacServerHandle *hnd, TALLOC_CTX *mem_ctx, POLICY_HND *dom_hnd) { argument
33 if(!hnd || !mem_ctx || !dom_hnd) {
63 if(!cac_SamCreateUser(hnd, mem_ctx, &cu)) {
64 printerr("Could not create user.", hnd->status);
67 user_menu(hnd, mem_ctx, dom_hnd, cu.out.user_hnd);
84 if(!cac_SamCreateGroup(hnd, mem_ctx, &cg)) {
85 printerr("Could not create group.", hnd->status);
88 group_menu(hnd, mem_ctx, dom_hnd, cg.out.group_hnd);
114 if(!cac_SamCreateUser(hnd, mem_ctx, &cu)) {
115 printerr("Could not create account.", hnd
140 main_menu(CacServerHandle *hnd, TALLOC_CTX *mem_ctx, POLICY_HND *dom_hnd) argument
293 CacServerHandle *hnd = NULL; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/examples/spoolss/
H A Dchangeid.py22 hnd = spoolss.openprinter(printer) variable
29 info = hnd.getprinter(level = 0)
34 spoolss.closeprinter(hnd)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Dcurl_threads.c85 void Curl_thread_destroy(curl_thread_t hnd) argument
87 if(hnd != curl_thread_t_null) {
88 pthread_detach(*hnd);
89 free(hnd);
93 int Curl_thread_join(curl_thread_t *hnd) argument
95 int ret = (pthread_join(**hnd, NULL) == 0);
97 free(*hnd);
98 *hnd = curl_thread_t_null;
119 void Curl_thread_destroy(curl_thread_t hnd) argument
121 CloseHandle(hnd);
124 Curl_thread_join(curl_thread_t *hnd) argument
[all...]

Completed in 175 milliseconds

12345678