/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libmsrpc/ |
H A D | libmsrpc.c | 27 int cac_InitHandleData( CacServerHandle * hnd ); 40 int cac_InitHandleMem( CacServerHandle * hnd ) 42 hnd->username = SMB_MALLOC_ARRAY( char, sizeof( fstring ) ); 44 if ( !hnd->username ) 47 hnd->username[0] = '\0'; 49 hnd->domain = SMB_MALLOC_ARRAY( char, sizeof( fstring ) ); 50 if ( !hnd->domain ) 53 hnd->domain[0] = '\0'; 55 hnd->netbios_name = SMB_MALLOC_ARRAY( char, sizeof( fstring ) ); 56 if ( !hnd 78 CacServerHandle *hnd; local 143 cac_SetAuthDataFn( CacServerHandle * hnd, smbc_get_auth_data_fn auth_fn ) argument 148 cac_SetSmbcContext( CacServerHandle * hnd, SMBCCTX * ctx ) argument 183 cac_Connect( CacServerHandle * hnd, const char *srv ) argument [all...] |
H A D | cac_samr.c | 33 DOM_SID *cac_get_domain_sid( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, 36 int cac_SamConnect( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, argument 43 if ( !hnd ) 46 if ( !hnd->_internal.ctx ) { 47 hnd->status = NT_STATUS_INVALID_HANDLE; 52 hnd->status = NT_STATUS_INVALID_PARAMETER; 56 srv = cac_GetServer( hnd ); 58 hnd->status = NT_STATUS_INVALID_CONNECTION; 63 if ( !hnd->_internal.pipes[PI_SAMR] ) { 67 &hnd 114 cac_SamClose( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * sam ) argument 151 cac_get_domain_sid( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, uint32 des_access ) argument 191 cac_SamOpenDomain( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamOpenDomain *op ) argument 281 cac_SamOpenUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamOpenUser *op ) argument 361 cac_SamCreateUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamCreateUser *op ) argument 413 cac_SamDeleteUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * user_hnd ) argument 446 cac_SamEnumUsers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamEnumUsers *op ) argument 506 cac_SamGetNamesFromRids( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetNamesFromRids *op ) argument 596 cac_SamGetRidsFromNames( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetRidsFromNames *op ) argument 688 cac_SamGetGroupsForUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetGroupsForUser *op ) argument 760 cac_SamOpenGroup( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamOpenGroup *op ) argument 805 cac_SamCreateGroup( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamCreateGroup *op ) argument 852 cac_SamDeleteGroup( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * group_hnd ) argument 886 cac_SamGetGroupMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetGroupMembers *op ) argument 930 cac_SamAddGroupMember( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamAddGroupMember *op ) argument 964 cac_SamRemoveGroupMember( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamRemoveGroupMember *op ) argument 998 cac_SamClearGroupMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * group_hnd ) argument 1066 cac_SamSetGroupMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetGroupMembers *op ) argument 1112 cac_SamEnumGroups( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamEnumGroups *op ) argument 1219 cac_SamEnumAliases( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamEnumAliases *op ) argument 1328 cac_SamCreateAlias( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamCreateAlias *op ) argument 1374 cac_SamOpenAlias( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamOpenAlias *op ) argument 1419 cac_SamDeleteAlias( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * alias_hnd ) argument 1453 cac_SamAddAliasMember( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamAddAliasMember *op ) argument 1487 cac_SamRemoveAliasMember( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamRemoveAliasMember *op ) argument 1521 cac_SamGetAliasMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetAliasMembers *op ) argument 1562 cac_SamClearAliasMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * alias_hnd ) argument 1628 cac_SamSetAliasMembers( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetAliasMembers *op ) argument 1674 cac_SamUserChangePasswd( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamUserChangePasswd *op ) argument 1730 cac_SamEnableUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * user_hnd ) argument 1792 cac_SamDisableUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * user_hnd ) argument 1852 cac_SamSetPassword( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetPassword *op ) argument 1908 cac_SamGetUserInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetUserInfo *op ) argument 1951 cac_SamSetUserInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetUserInfo *op ) argument 2020 cac_SamGetUserInfoCtr( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetUserInfoCtr *op ) argument 2059 cac_SamSetUserInfoCtr( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetUserInfoCtr *op ) argument 2104 cac_SamRenameUser( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamRenameUser *op ) argument 2159 cac_SamGetGroupInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetGroupInfo *op ) argument 2203 cac_SamSetGroupInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetGroupInfo *op ) argument 2245 cac_SamRenameGroup( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamRenameGroup *op ) argument 2287 cac_SamGetAliasInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetAliasInfo *op ) argument 2331 cac_SamSetAliasInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamSetAliasInfo *op ) argument 2373 cac_SamGetDomainInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetDomainInfo *op ) argument 2470 cac_SamGetDomainInfoCtr( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetDomainInfoCtr *op ) argument 2514 cac_SamGetDisplayInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetDisplayInfo *op ) argument 2587 cac_SamLookupDomain( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamLookupDomain *op ) argument 2631 cac_SamGetSecurityObject( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamGetSecurityObject *op ) argument 2672 cac_SamFlush( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SamFlush *op ) argument [all...] |
H A D | cac_winreg.c | 28 int cac_RegConnect( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, argument 36 if ( !hnd ) 39 if ( !hnd->_internal.ctx ) { 40 hnd->status = NT_STATUS_INVALID_HANDLE; 45 hnd->status = NT_STATUS_INVALID_PARAMETER; 49 srv = cac_GetServer( hnd ); 51 hnd->status = NT_STATUS_INVALID_CONNECTION; 56 if ( !hnd->_internal.pipes[PI_WINREG] ) { 60 &( hnd->status ) ) ) ) { 64 hnd 92 cac_RegClose( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * key ) argument 127 cac_RegOpenKey( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegOpenKey *op ) argument 219 cac_RegEnumKeys( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegEnumKeys *op ) argument 333 cac_RegCreateKey( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegCreateKey *op ) argument 455 cac_RegDeleteKey( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegDeleteKey *op ) argument 520 cac_RegDeleteValue( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegDeleteValue *op ) argument 648 cac_RegQueryValue( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegQueryValue *op ) argument 701 cac_RegEnumValues( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegEnumValues *op ) argument 814 cac_RegSetValue( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegSetValue *op ) argument 871 cac_RegGetVersion( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegGetVersion *op ) argument 910 cac_RegGetKeySecurity( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegGetKeySecurity *op ) argument 959 cac_RegSetKeySecurity( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegSetKeySecurity *op ) argument 998 cac_RegSaveKey( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct RegSaveKey *op ) argument 1035 cac_Shutdown( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct Shutdown *op ) argument 1110 cac_AbortShutdown( CacServerHandle * hnd, TALLOC_CTX * mem_ctx ) argument [all...] |
H A D | cac_svcctl.c | 27 int cac_WaitForService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, 31 int cac_SvcOpenScm( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, argument 40 if ( !hnd ) 43 if ( !hnd->_internal.ctx ) { 44 hnd->status = NT_STATUS_INVALID_HANDLE; 49 hnd->status = NT_STATUS_INVALID_PARAMETER; 53 srv = cac_GetServer( hnd ); 55 hnd->status = NT_STATUS_INVALID_CONNECTION; 60 if ( !hnd->_internal.pipes[PI_SVCCTL] ) { 64 &( hnd 90 cac_SvcClose( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * scm_hnd ) argument 124 cac_SvcEnumServices( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcEnumServices *op ) argument 186 cac_SvcOpenService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcOpenService *op ) argument 232 cac_SvcControlService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcControlService *op ) argument 276 cac_SvcGetStatus( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcGetStatus *op ) argument 325 cac_WaitForService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * svc_hnd, uint32 state, uint32 timeout, SERVICE_STATUS * status ) argument 361 cac_SvcStartService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcStartService *op ) argument 409 cac_SvcStopService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcStopService *op ) argument 455 cac_SvcPauseService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcPauseService *op ) argument 501 cac_SvcContinueService( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcContinueService *op ) argument 547 cac_SvcGetDisplayName( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcGetDisplayName *op ) argument 592 cac_SvcGetServiceConfig( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct SvcGetServiceConfig *op ) argument [all...] |
H A D | cac_lsarpc.c | 25 int cac_LsaOpenPolicy( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, argument 32 if ( !hnd ) 35 if ( !hnd->_internal.ctx ) { 36 hnd->status = NT_STATUS_INVALID_HANDLE; 41 hnd->status = NT_STATUS_INVALID_PARAMETER; 47 srv = cac_GetServer( hnd ); 49 hnd->status = NT_STATUS_INVALID_CONNECTION; 54 if ( !hnd->_internal.pipes[PI_LSARPC] ) { 57 &hnd->status ); 60 hnd 119 cac_LsaClosePolicy( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, POLICY_HND * pol ) argument 152 cac_LsaGetNamesFromSids( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaGetNamesFromSids *op ) argument 292 cac_LsaGetSidsFromNames( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaGetSidsFromNames *op ) argument 436 cac_LsaFetchSid( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaFetchSid *op ) argument 529 cac_LsaQueryInfoPolicy( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaQueryInfoPolicy *op ) argument 579 cac_LsaEnumSids( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaEnumSids *op ) argument 623 cac_LsaEnumAccountRights( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaEnumAccountRights *op ) argument 687 cac_LsaEnumTrustedDomains( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaEnumTrustedDomains *op ) argument 732 cac_LsaOpenTrustedDomain( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaOpenTrustedDomain *op ) argument 779 cac_LsaQueryTrustedDomainInfo( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaQueryTrustedDomainInfo *op ) argument 839 cac_LsaEnumPrivileges( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaEnumPrivileges *op ) argument 888 cac_LsaOpenAccount( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaOpenAccount *op ) argument 961 cac_LsaAddPrivileges( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaAddPrivileges *op ) argument 1023 cac_LsaRemovePrivileges( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaRemovePrivileges *op ) argument 1085 cac_LsaClearPrivileges( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaClearPrivileges *op ) argument 1145 cac_LsaSetPrivileges( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaAddPrivileges *op ) argument 1216 cac_LsaGetSecurityObject( CacServerHandle * hnd, TALLOC_CTX * mem_ctx, struct LsaGetSecurityObject *op ) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/lsa/ |
H A D | lsapol.c | 6 void fill_conn_info(CacServerHandle *hnd) { argument 24 hnd->domain = SMB_STRDUP(domain); 25 hnd->username = SMB_STRDUP(username); 26 hnd->password = SMB_STRDUP(password); 27 hnd->server = SMB_STRDUP(server); 31 CacServerHandle *hnd = NULL; local 38 hnd = cac_NewServerHandle(False); 41 cac_SetAuthDataFn(hnd, cac_GetAuthDataFn); 43 hnd->debug = 0; 45 fill_conn_info(hnd); [all...] |
H A D | lsaenumprivs.c | 9 CacServerHandle *hnd = NULL; local 17 hnd = cac_NewServerHandle(True); 20 fscanf(stdin, "%s", hnd->server); 24 if(!cac_Connect(hnd, NULL)) { 25 fprintf(stderr, "Could not connect to server.\n Error: %s\n errno %s\n", nt_errstr(hnd->status), strerror(errno)); 26 cac_FreeHandle(hnd); 39 if(!cac_LsaOpenPolicy(hnd, mem_ctx, &lop)) { 40 fprintf(stderr, "Could not open policy handle.\n Error: %s\n", nt_errstr(hnd->status)); 41 cac_FreeHandle(hnd); 55 while(cac_LsaEnumPrivileges(hnd, mem_ct [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/reg/ |
H A D | regkey.c | 6 CacServerHandle *hnd = NULL; local 13 hnd = cac_NewServerHandle(False); 16 hnd->username = SMB_MALLOC_ARRAY(char, sizeof(fstring)); 17 hnd->domain = SMB_MALLOC_ARRAY(char, sizeof(fstring)); 18 hnd->netbios_name = SMB_MALLOC_ARRAY(char, sizeof(fstring)); 19 hnd->password = SMB_MALLOC_ARRAY(char, sizeof(fstring)); 21 hnd->server = SMB_MALLOC_ARRAY(char, sizeof(fstring)); 24 fscanf(stdin, "%s", hnd->server); 29 if(!cac_Connect(hnd, NULL)) { 30 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd [all...] |
H A D | shutdown.c | 8 CacServerHandle *hnd = NULL; local 15 hnd = cac_NewServerHandle(True); 17 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn); 19 cac_parse_cmd_line(argc, argv, hnd); 21 hnd->_internal.srv_level = SRV_WIN_NT4; 23 if(!cac_Connect(hnd, NULL)) { 24 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status)); 49 if(!cac_Shutdown(hnd, mem_ctx, &s)) { 50 fprintf(stderr, "could not shut down server: error %s\n", nt_errstr(hnd [all...] |
H A D | regsetval.c | 7 CacServerHandle *hnd = NULL; local 14 hnd = cac_NewServerHandle(True); 16 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn); 18 cac_parse_cmd_line(argc, argv, hnd); 20 if(!cac_Connect(hnd, NULL)) { 21 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status)); 34 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) { 35 fprintf(stderr, "Could not open key %s. Error %s\n", rok.in.name, nt_errstr(hnd->status)); 46 if(!cac_RegSetValue(hnd, mem_ct [all...] |
H A D | security.c | 7 CacServerHandle *hnd = NULL; local 14 hnd = cac_NewServerHandle(True); 16 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn); 18 cac_parse_cmd_line(argc, argv, hnd); 20 if(!cac_Connect(hnd, NULL)) { 21 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status)); 34 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) { 35 fprintf(stderr, "Could not open key %s. Error %s\n", rok.in.name, nt_errstr(hnd->status)); 45 if(!cac_RegGetKeySecurity(hnd, mem_ct [all...] |
H A D | regkeycreate.c | 8 CacServerHandle *hnd = NULL; local 17 hnd = cac_NewServerHandle(True); 20 fscanf(stdin, "%s", hnd->server); 28 if(!cac_Connect(hnd, NULL)) { 29 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd->status), strerror(errno)); 30 cac_FreeHandle(hnd); 43 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) { 44 fprintf(stderr, "Could not open key %s\n Error: %s\n", rok.in.name, nt_errstr(hnd->status)); 58 if(!cac_RegCreateKey(hnd, mem_ctx, &rck)) { 59 fprintf(stderr, "Could not create key. Error %s\n", nt_errstr(hnd [all...] |
H A D | regopen.c | 6 CacServerHandle *hnd = NULL; local 18 hnd = cac_NewServerHandle(True); 23 fscanf(stdin, "%s", hnd->server); 25 if(!cac_Connect(hnd, NULL)) { 26 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd->status), strerror(errno)); 27 cac_FreeHandle(hnd); 41 if(!cac_RegConnect(hnd, mem_ctx, &rc)) { 42 fprintf(stderr, " Could not connect to registry. %s\n", nt_errstr(hnd->status)); 55 if(!cac_RegClose(hnd, mem_ctx, keys[i])) { 56 fprintf(stderr, " Could not close handle. %s\n", nt_errstr(hnd [all...] |
H A D | regopenkey.c | 6 CacServerHandle *hnd = NULL; local 16 hnd = cac_NewServerHandle(True); 19 fscanf(stdin, "%s", hnd->server); 35 if(!cac_Connect(hnd, NULL)) { 36 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd->status), strerror(errno)); 37 cac_FreeHandle(hnd); 51 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) { 52 fprintf(stderr, "Could not open key %s\n Error: %s\n", rok.in.name, nt_errstr(hnd->status)); 58 if(!cac_RegClose(hnd, mem_ctx, rok.out.key)) { 59 fprintf(stderr, "Could not close handle %s\n", nt_errstr(hnd [all...] |
H A D | regkeyenum.c | 8 CacServerHandle *hnd = NULL; local 21 hnd = cac_NewServerHandle(True); 24 fscanf(stdin, "%s", hnd->server); 43 if(!cac_Connect(hnd, NULL)) { 44 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd->status), strerror(errno)); 45 cac_FreeHandle(hnd); 59 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) { 60 fprintf(stderr, "Could not open key %s\n Error: %s\n", rok.in.name, nt_errstr(hnd->status)); 73 while(cac_RegEnumKeys(hnd, mem_ctx, &ek)) { 81 if(CAC_OP_FAILED(hnd [all...] |
H A D | regqueryval.c | 9 CacServerHandle *hnd = NULL; local 18 hnd = cac_NewServerHandle(True); 20 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn); 22 cac_parse_cmd_line(argc, argv, hnd); 30 if(!cac_Connect(hnd, NULL)) { 31 fprintf(stderr, "Could not connect to server.\n Error: %s.\n errno: %s\n", nt_errstr(hnd->status), strerror(errno)); 32 cac_FreeHandle(hnd); 45 if(!cac_RegOpenKey(hnd, mem_ctx, &rok)) { 46 fprintf(stderr, "Could not open key %s\n Error: %s\n", rok.in.name, nt_errstr(hnd->status)); 57 if(!cac_RegQueryValue(hnd, mem_ct [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/sam/ |
H A D | disable.c | 6 CacServerHandle *hnd = NULL; local 15 hnd = cac_NewServerHandle(True); 17 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn); 19 cac_parse_cmd_line(argc, argv, hnd); 21 if(!cac_Connect(hnd, NULL)) { 22 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status)); 31 if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) { 32 fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status)); 44 if(!cac_SamOpenUser(hnd, mem_ct [all...] |
H A D | enable.c | 7 CacServerHandle *hnd = NULL; local 16 hnd = cac_NewServerHandle(True); 18 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn); 20 cac_parse_cmd_line(argc, argv, hnd); 22 if(!cac_Connect(hnd, NULL)) { 23 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status)); 32 if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) { 33 fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status)); 45 if(!cac_SamOpenUser(hnd, mem_ct [all...] |
H A D | adduser.c | 6 CacServerHandle *hnd = NULL; local 17 hnd = cac_NewServerHandle(True); 19 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn); 21 cac_parse_cmd_line(argc, argv, hnd); 23 if(!cac_Connect(hnd, NULL)) { 24 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status)); 33 if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) { 34 fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status)); 48 if(!cac_SamCreateUser(hnd, mem_ct [all...] |
H A D | dominfo.c | 7 CacServerHandle *hnd = NULL; local 12 hnd = cac_NewServerHandle(True); 14 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn); 16 cac_parse_cmd_line(argc, argv, hnd); 18 if(!cac_Connect(hnd, NULL)) { 19 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status)); 28 if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) { 29 fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status)); 38 if(!cac_SamGetDomainInfo(hnd, mem_ct [all...] |
H A D | samenum.c | 7 CacServerHandle *hnd = NULL; local 21 hnd = cac_NewServerHandle(True); 23 cac_SetAuthDataFn(hnd, cactest_GetAuthDataFn); 25 cac_parse_cmd_line(argc, argv, hnd); 27 if(!cac_Connect(hnd, NULL)) { 28 fprintf(stderr, "Could not connect to server %s. Error: %s\n", hnd->server, nt_errstr(hnd->status)); 37 if(!cac_SamOpenDomain(hnd, mem_ctx, &sod)) { 38 fprintf(stderr, "Could not open domain. Error: %s\n", nt_errstr(hnd->status)); 56 while(cac_SamEnumUsers(hnd, mem_ct [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/smbc_test/ |
H A D | smbc.c | 9 CacServerHandle *hnd = NULL; local 26 hnd = cac_NewServerHandle(True); 28 cac_parse_cmd_line(argc, argv, hnd); 36 ctx->debug = hnd->debug; 43 cac_SetSmbcContext(hnd, ctx); 46 if(!cac_Connect(hnd, NULL)) { 52 if(!cac_LsaOpenPolicy(hnd, mem_ctx, &lop)) 53 printf("Could not open LSA policy. Error: %s\n", nt_errstr(hnd->status)); 59 if(!cac_RegConnect(hnd, mem_ctx, &rc)) 60 printf("Could not connect to registry. Error: %s\n", nt_errstr(hnd [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/cacusermgr/ |
H A D | cacusermgr.c | 26 void create_menu(CacServerHandle *hnd, TALLOC_CTX *mem_ctx, POLICY_HND *dom_hnd) { argument 33 if(!hnd || !mem_ctx || !dom_hnd) { 63 if(!cac_SamCreateUser(hnd, mem_ctx, &cu)) { 64 printerr("Could not create user.", hnd->status); 67 user_menu(hnd, mem_ctx, dom_hnd, cu.out.user_hnd); 84 if(!cac_SamCreateGroup(hnd, mem_ctx, &cg)) { 85 printerr("Could not create group.", hnd->status); 88 group_menu(hnd, mem_ctx, dom_hnd, cg.out.group_hnd); 114 if(!cac_SamCreateUser(hnd, mem_ctx, &cu)) { 115 printerr("Could not create account.", hnd 140 main_menu(CacServerHandle *hnd, TALLOC_CTX *mem_ctx, POLICY_HND *dom_hnd) argument 293 CacServerHandle *hnd = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/examples/spoolss/ |
H A D | changeid.py | 22 hnd = spoolss.openprinter(printer) variable 29 info = hnd.getprinter(level = 0) 34 spoolss.closeprinter(hnd)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | curl_threads.c | 85 void Curl_thread_destroy(curl_thread_t hnd) argument 87 if(hnd != curl_thread_t_null) { 88 pthread_detach(*hnd); 89 free(hnd); 93 int Curl_thread_join(curl_thread_t *hnd) argument 95 int ret = (pthread_join(**hnd, NULL) == 0); 97 free(*hnd); 98 *hnd = curl_thread_t_null; 119 void Curl_thread_destroy(curl_thread_t hnd) argument 121 CloseHandle(hnd); 124 Curl_thread_join(curl_thread_t *hnd) argument [all...] |