Lines Matching refs:domain
124 * ADS disabled, or no domain name specified.
174 for (i = 0; pgcfg->domains_in_forest[i].domain[0] != '\0';
177 pgcfg->domains_in_forest[i].domain,
208 for (j = 0; trustfor[i].domains_in_forest[j].domain[0] != '\0';
214 domain_in_forest->domain,
238 * NEEDSWORK: This should load entries for domain servers for all known
239 * domains - the joined domain, other domains in the forest, and trusted
241 * than the DCs for the joined domain.
257 * ADS disabled, or no domain name specified.
295 * NEEDSWORK: All we need here is to add the domain and SID for
302 for (; dif->domain[0] != '\0'; dif++) {
303 if (domain_eq(pgcfg->domain_name, dif->domain)) {
305 dif->domain, dif->sid) != 0)
366 idmapdlog(LOG_DEBUG, "No domain controllers known");
385 pgcfg->domains_in_forest[0].domain[0] == '\0') {
389 for (i = 0; pgcfg->domains_in_forest[i].domain[0] != '\0'; i++)
392 pgcfg->domains_in_forest[i].domain);
395 pgcfg->trusted_domains[0].domain[0] == '\0') {
398 for (i = 0; pgcfg->trusted_domains[i].domain[0] != '\0'; i++)
399 idmapdlog(LOG_DEBUG, "trusted domain = %s",
400 pgcfg->trusted_domains[i].domain);
411 for (j = 0; tf->domains_in_forest[j].domain[0] != '\0'; j++) {
414 "trusted forest %s domain=%s",
416 tf->domains_in_forest[j].domain);