Lines Matching defs:domain

31  * - If you want to work with a domain, use the SAM handle.
32 * to obtain a domain handle.
33 * - Use domain handles to obtain user handles etc.
272 * This is a request to map a domain name to a domain SID. We can map
273 * the primary domain name, our local domain name (hostname) and the
274 * builtin domain names to the appropriate SID. Anything else will be
344 * queries about two domains: the local domain, synonymous with the
345 * local hostname, and the BUILTIN domain. So we return these two
386 * This is a request to open a domain within the local SAM database.
388 * We return a handle to be used to access objects within this domain.
395 smb_domain_t domain;
403 if (!smb_domain_lookup_sid((smb_sid_t *)param->sid, &domain)) {
409 if ((domain.di_type != SMB_DOMAIN_BUILTIN) &&
410 (domain.di_type != SMB_DOMAIN_LOCAL)) {
416 id = samr_hdalloc(mxa, SAMR_KEY_DOMAIN, domain.di_type, 0,
432 * The caller should pass a domain handle.
436 * number of users, groups, and aliases in a domain.
447 char *domain;
471 domain = "BUILTIN";
479 domain = hostname;
518 (void) NDR_MSTRING(mxa, domain,
519 (ndr_mstring_t *)&(info->ru.info2.domain));
552 * Looks up the given name in the specified domain which could
553 * be either the built-in or local domain.
637 * This is a request to open a user within a specified domain in the
638 * local SAM database. The caller must supply a valid domain handle,
639 * obtained via a successful domain open request. The user is
674 * Request to delete a user within a specified domain in the local
896 * This is a request to open a group within the specified domain in the
897 * local SAM database. The caller must supply a valid domain handle,
898 * obtained via a successful domain open request. The group is
1197 * Request for the domain password policy information.
1366 * Added template that returns information for a domain group as None.
1422 * for that alias. The alias domain sid should match with
1423 * the passed domain handle.
1917 * Queries the access control on a server, domain, user, group, or alias object.
1919 * associate a security descriptor with a server, domain, user, group or a alias