Lines Matching refs:server

68  * Wrapper round samr_connect to ensure that we connect using the server
70 * supply a server name and a domain name.
78 samr_open(char *server, char *domain, char *username, DWORD access_mask,
84 if (server == NULL || domain == NULL) {
87 server = di.d_dci.dc_name;
94 status = samr_connect(server, domain, username, access_mask,
104 * Connect to the SAMR service on the specified server (domain controller).
112 * Try the calls from most recent to oldest until the server responds with
117 samr_connect(char *server, char *domain, char *username, DWORD access_mask,
130 status = ndr_rpc_bind(samr_handle, server, domain, username, "SAMR");
135 status = (*samr_connop[i])(server, domain, username,
149 * Connect to the SAM on a Windows NT 4.0 server (domain controller).
158 samr_connect2(char *server, char *domain, char *username, DWORD access_mask,
170 len = strlen(server) + 4;
172 (void) snprintf((char *)arg.servername, len, "\\\\%s", server);
198 samr_connect4(char *server, char *domain, char *username, DWORD access_mask,
210 len = strlen(server) + 4;
212 (void) snprintf((char *)arg.servername, len, "\\\\%s", server);
236 * XP, the server should be the fully qualified DNS domain name with
245 samr_connect5(char *server, char *domain, char *username, DWORD access_mask,
257 len = strlen(server) + 4;
259 (void) snprintf((char *)arg.servername, len, "\\\\%s", server);
495 * call is successful, the server will return the RID for the user and
602 * Get the list of local domains supported by a server.
968 char *server,
982 /* Need server name with slashes */
983 len = 2 + strlen(server) + 1;
987 (void) snprintf(slashserver, len, "\\\\%s", server);