Lines Matching defs:server

142  * will establish a connection to the server specified by
693 * a buffer containing server info in the following format:
853 /* Get the whole list of naming contexts residing on the server */
863 * If the root DSE was not found, the server does
1016 * If the root DSE was not found, the server does
1094 * from a specified server.
1097 * server - a structure describing a server to connect to and
1098 * a DUAProfile to be obtained from the server,
1100 * the server.
1111 __ns_ldap_getConnectionInfoFromDUA(const ns_dir_server_t *server,
1136 if (server == NULL) {
1157 (void) strncpy(buffer, server->server, sizeof (buffer));
1165 if (server->port > 0) {
1170 server->port);
1179 if (domainname2baseDN(server->domainName ?
1180 server->domainName : config_struct->domainName,
1185 server->domainName ?
1186 server->domainName : config_struct->domainName);
1233 server->domainName ?
1234 server->domainName :
1241 server->domainName ?
1242 server->domainName : config_struct->domainName);
1259 server->profileName ?
1260 server->profileName : "default",
1266 server->profileName ?
1267 server->profileName : "default");
1297 * set_ldap_server_type tries to determine the type of server where the
1298 * rootDSE data 'root_dse' is obtained. Currently it checks for server
1352 * This function obtains the root DSE from a specified server.
1365 * server_addr - an adress of a server to be connected to.
1374 * server_type - type of server, DSEE, AD, OpenLDAP, etc.
1423 " the %s server: %s. "
1483 /* Get root DSE from the server specified by the caller. */
1489 * Unable to get root DSE: server may be down,
1515 gettext("No root DSE data for server %s returned."),
1607 dir_server_t *server = (dir_server_t *)param;
1623 * indicate there are problems with connecting to the server.
1625 *retCode = __ns_ldap_getRootDSE(server->ip,
1638 * server.
1641 server->status = INFO_SERVER_ERROR;
1645 server->ip,
1657 server->status = INFO_SERVER_ERROR;
1661 server->ip);
1666 server->controls = (char **)calloc(CHUNK_SIZE, sizeof (char *));
1667 server->saslMech = (char **)calloc(CHUNK_SIZE, sizeof (char *));
1668 if (server->controls == NULL || server->saslMech == NULL) {
1671 if (server->controls != NULL)
1672 free(server->controls);
1673 if (server->saslMech != NULL)
1674 free(server->saslMech);
1688 ptr = (char **)realloc(server->saslMech,
1704 server->saslMech = ptr;
1706 server->saslMech[sm_counter] = strdup(val);
1707 if (server->saslMech[sm_counter] == NULL) {
1718 ptr = (char **)realloc(server->controls,
1734 server->controls = ptr;
1737 server->controls[sc_counter] = strdup(val);
1738 if (server->controls[sc_counter] == NULL) {
1755 server->controls[sc_counter] = NULL;
1756 server->saslMech[sm_counter] = NULL;
1758 server->serverType = server_type;
1760 server->status = INFO_SERVER_UP;
1884 * ignore the server and hope there will be some
2086 &sa_conf->ds_profile.server,
2191 * serverAddr is the address of a server and
2193 * NS_CACHE_NEW: get a new server address, addr is ignored.
2196 * NS_CACHE_WRITE: get a non-replica server, if possible, if not, same
2199 * NS_CACHE_ADDR_IP: return server address as is, this is default.
2200 * NS_CACHE_ADDR_HOSTNAME: return server addess as FQDN format, only
2205 * a structure of type ns_server_info_t containing the server address
2206 * or name, server controls and supported SASL mechanisms.
2224 dir_server_t *server = NULL;
2249 * Currently we have two different server lists: one is maintained
2255 * If NS_CACHE_NEW, or the server info is new,
2268 * make sure the server status stays the same
2278 * if the server has already been removed,
2296 * give this server one more chance.
2305 server = current_list->nsServers[i];
2314 * server from the list,
2315 * the server should be
2323 * to mess up the server
2344 * ldap_cachemgr checks here if the server
2345 * is not a non-replica server (a server
2358 server = current_list->nsServers[i];
2370 server = current_list->nsServers[i];
2381 if (server == NULL) {
2394 (void) mutex_lock(&server->updateStatus);
2395 server->info = INFO_STATUS_OLD;
2396 (void) mutex_unlock(&server->updateStatus);
2404 ret_code = __s_api_ip2hostname(server->ip, &ret->serverFQDN);
2412 server->ip);
2422 ret->server = strdup(server->ip);
2424 ret->controls = __s_api_cp2dArray(server->controls);
2425 ret->saslMechanisms = __s_api_cp2dArray(server->saslMech);
2426 ret->serverType = server->serverType;
2436 * during the previous receiving of the server's root DSE. If the
2437 * function is able to reach such a server and get its root DSE, it
2438 * marks the server as on-line. Otherwise, the server's status is set
2440 * For each server the function tries to connect to, it fires up