trusts 1999 librpc/gen_ndr/cli_netlogon.c struct netr_DomainTrustList *trusts /* [out] [ref] */, trusts 2032 librpc/gen_ndr/cli_netlogon.c *trusts = *r.out.trusts; trusts 316 librpc/gen_ndr/cli_netlogon.h struct netr_DomainTrustList *trusts /* [out] [ref] */, trusts 7900 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->trusts)); trusts 7914 librpc/gen_ndr/ndr_netlogon.c if (r->trusts) { trusts 7917 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_DomainTrustInfo(ndr, NDR_SCALARS, &r->trusts[cntr_trusts_1])); trusts 7920 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_DomainTrustInfo(ndr, NDR_BUFFERS, &r->trusts[cntr_trusts_1])); trusts 7946 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->trusts); trusts 7948 librpc/gen_ndr/ndr_netlogon.c r->trusts = NULL; trusts 7963 librpc/gen_ndr/ndr_netlogon.c if (r->trusts) { trusts 7965 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->trusts, 0); trusts 7966 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_array_size(ndr, &r->trusts)); trusts 7967 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC_N(ndr, r->trusts, ndr_get_array_size(ndr, &r->trusts)); trusts 7969 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->trusts, 0); trusts 7971 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_DomainTrustInfo(ndr, NDR_SCALARS, &r->trusts[cntr_trusts_1])); trusts 7974 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_DomainTrustInfo(ndr, NDR_BUFFERS, &r->trusts[cntr_trusts_1])); trusts 7984 librpc/gen_ndr/ndr_netlogon.c if (r->trusts) { trusts 7985 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_check_array_size(ndr, (void*)&r->trusts, r->num_trusts)); trusts 8000 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "trusts", r->trusts); trusts 8002 librpc/gen_ndr/ndr_netlogon.c if (r->trusts) { trusts 8008 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_DomainTrustInfo(ndr, "trusts", &r->trusts[cntr_trusts_1]); trusts 14922 librpc/gen_ndr/ndr_netlogon.c if (r->out.trusts == NULL) { trusts 14925 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_netr_DomainTrustList(ndr, NDR_SCALARS|NDR_BUFFERS, r->out.trusts)); trusts 14958 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->out.trusts); trusts 14959 librpc/gen_ndr/ndr_netlogon.c ZERO_STRUCTP(r->out.trusts); trusts 14963 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_ALLOC(ndr, r->out.trusts); trusts 14966 librpc/gen_ndr/ndr_netlogon.c NDR_PULL_SET_MEM_CTX(ndr, r->out.trusts, LIBNDR_FLAG_REF_ALLOC); trusts 14967 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_netr_DomainTrustList(ndr, NDR_SCALARS|NDR_BUFFERS, r->out.trusts)); trusts 14996 librpc/gen_ndr/ndr_netlogon.c ndr_print_ptr(ndr, "trusts", r->out.trusts); trusts 14998 librpc/gen_ndr/ndr_netlogon.c ndr_print_netr_DomainTrustList(ndr, "trusts", r->out.trusts); trusts 909 librpc/gen_ndr/netlogon.h struct netr_DomainTrustInfo *trusts;/* [unique,size_is(num_trusts)] */ trusts 1653 librpc/gen_ndr/netlogon.h struct netr_DomainTrustList *trusts;/* [ref] */ trusts 3284 librpc/gen_ndr/srv_netlogon.c r->out.trusts = talloc_zero(r, struct netr_DomainTrustList); trusts 3285 librpc/gen_ndr/srv_netlogon.c if (r->out.trusts == NULL) { trusts 4424 librpc/gen_ndr/srv_netlogon.c r->out.trusts = talloc_zero(mem_ctx, struct netr_DomainTrustList); trusts 4425 librpc/gen_ndr/srv_netlogon.c if (r->out.trusts == NULL) { trusts 806 source3/rpcclient/cmd_netlogon.c struct netr_DomainTrustList trusts; trusts 825 source3/rpcclient/cmd_netlogon.c &trusts, trusts 834 source3/rpcclient/cmd_netlogon.c printf("%d domains returned\n", trusts.count); trusts 836 source3/rpcclient/cmd_netlogon.c for (i=0; i<trusts.count; i++ ) { trusts 838 source3/rpcclient/cmd_netlogon.c trusts.array[i].dns_name, trusts 839 source3/rpcclient/cmd_netlogon.c trusts.array[i].netbios_name); trusts 5964 source3/utils/net_rpc.c struct samr_SamArray *trusts = NULL; trusts 6141 source3/utils/net_rpc.c &trusts, trusts 6154 source3/utils/net_rpc.c char *str = CONST_DISCARD(char *, trusts->entries[i].name.string); trusts 1263 source3/winbindd/winbindd_ads.c struct netr_DomainTrustList trusts; trusts 1303 source3/winbindd/winbindd_ads.c &trusts, trusts 1305 source3/winbindd/winbindd_ads.c if ( NT_STATUS_IS_OK(result) && trusts.count) { trusts 1309 source3/winbindd/winbindd_ads.c if ( !(*names = TALLOC_ARRAY(mem_ctx, char *, trusts.count)) ) { trusts 1314 source3/winbindd/winbindd_ads.c if ( !(*alt_names = TALLOC_ARRAY(mem_ctx, char *, trusts.count)) ) { trusts 1319 source3/winbindd/winbindd_ads.c if ( !(*dom_sids = TALLOC_ARRAY(mem_ctx, DOM_SID, trusts.count)) ) { trusts 1328 source3/winbindd/winbindd_ads.c for (i = 0; i < trusts.count; i++) { trusts 1338 source3/winbindd/winbindd_ads.c if ( (trusts.array[i].trust_attributes == NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN) && trusts 1343 source3/winbindd/winbindd_ads.c trusts.array[i].netbios_name)); trusts 1347 source3/winbindd/winbindd_ads.c (*names)[ret_count] = CONST_DISCARD(char *, trusts.array[i].netbios_name); trusts 1348 source3/winbindd/winbindd_ads.c (*alt_names)[ret_count] = CONST_DISCARD(char *, trusts.array[i].dns_name); trusts 1349 source3/winbindd/winbindd_ads.c if (trusts.array[i].sid) { trusts 1350 source3/winbindd/winbindd_ads.c sid_copy(&(*dom_sids)[ret_count], trusts.array[i].sid); trusts 1357 source3/winbindd/winbindd_ads.c fstrcpy( d.name, trusts.array[i].netbios_name); trusts 1358 source3/winbindd/winbindd_ads.c fstrcpy( d.alt_name, trusts.array[i].dns_name); trusts 1359 source3/winbindd/winbindd_ads.c if (trusts.array[i].sid) { trusts 1360 source3/winbindd/winbindd_ads.c sid_copy( &d.sid, trusts.array[i].sid); trusts 1371 source3/winbindd/winbindd_ads.c d.domain_flags = trusts.array[i].trust_flags; trusts 1372 source3/winbindd/winbindd_ads.c d.domain_type = trusts.array[i].trust_type; trusts 1373 source3/winbindd/winbindd_ads.c d.domain_trust_attribs = trusts.array[i].trust_attributes; trusts 1386 source3/winbindd/winbindd_ads.c wcache_tdc_fetch_domain(NULL, trusts.array[i].netbios_name); trusts 1392 source3/winbindd/winbindd_ads.c d.domain_flags = trusts.array[i].trust_flags; trusts 1393 source3/winbindd/winbindd_ads.c d.domain_type = trusts.array[i].trust_type; trusts 1394 source3/winbindd/winbindd_ads.c d.domain_trust_attribs = trusts.array[i].trust_attributes; trusts 1671 source3/winbindd/winbindd_cm.c struct netr_DomainTrustList trusts; trusts 1720 source3/winbindd/winbindd_cm.c &trusts, trusts 1732 source3/winbindd/winbindd_cm.c for ( i=0; i<trusts.count; i++ ) { trusts 1733 source3/winbindd/winbindd_cm.c if ( strequal( domain->name, trusts.array[i].netbios_name) ) { trusts 1734 source3/winbindd/winbindd_cm.c domain->domain_flags = trusts.array[i].trust_flags; trusts 1735 source3/winbindd/winbindd_cm.c domain->domain_type = trusts.array[i].trust_type; trusts 1736 source3/winbindd/winbindd_cm.c domain->domain_trust_attribs = trusts.array[i].trust_attributes; trusts 1141 source4/rpc_server/netlogon/dcerpc_netlogon.c info1->trusts = talloc_array(mem_ctx, struct netr_DomainTrustInfo, trusts 1143 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_HAVE_NO_MEMORY(info1->trusts); trusts 1150 source4/rpc_server/netlogon/dcerpc_netlogon.c status = fill_domain_trust_info(mem_ctx, res2[i], NULL, &info1->trusts[i], trusts 1155 source4/rpc_server/netlogon/dcerpc_netlogon.c status = fill_domain_trust_info(mem_ctx, res1[0], ref_res[0], &info1->trusts[i], trusts 1373 source4/rpc_server/netlogon/dcerpc_netlogon.c struct netr_DomainTrustList *trusts; trusts 1411 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts = talloc(mem_ctx, struct netr_DomainTrustList); trusts 1412 source4/rpc_server/netlogon/dcerpc_netlogon.c W_ERROR_HAVE_NO_MEMORY(trusts); trusts 1414 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts->array = talloc_array(trusts, struct netr_DomainTrust, ret); trusts 1415 source4/rpc_server/netlogon/dcerpc_netlogon.c W_ERROR_HAVE_NO_MEMORY(trusts->array); trusts 1417 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts->count = 1; /* ?? */ trusts 1419 source4/rpc_server/netlogon/dcerpc_netlogon.c r->out.trusts = trusts; trusts 1423 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts->array[0].netbios_name = samdb_result_string(ref_res[0], "nETBIOSName", NULL); trusts 1424 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts->array[0].dns_name = samdb_result_string(ref_res[0], "dnsRoot", NULL); trusts 1425 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts->array[0].trust_flags = trusts 1429 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts->array[0].parent_index = 0; trusts 1430 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts->array[0].trust_type = 2; trusts 1431 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts->array[0].trust_attributes = 0; trusts 1432 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts->array[0].sid = samdb_result_dom_sid(mem_ctx, dom_res[0], "objectSid"); trusts 1433 source4/rpc_server/netlogon/dcerpc_netlogon.c trusts->array[0].guid = samdb_result_guid(dom_res[0], "objectGUID"); trusts 1791 source4/torture/rpc/netlogon.c struct netr_DomainTrustList trusts; trusts 1796 source4/torture/rpc/netlogon.c r.out.trusts = &trusts; trusts 1806 source4/torture/rpc/netlogon.c if (r.out.trusts->count) { trusts 1812 source4/torture/rpc/netlogon.c for (i=0; i<r.out.trusts->count; i++) { trusts 1816 source4/torture/rpc/netlogon.c if (r.out.trusts->array[i].trust_attributes & NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE) { trusts 1818 source4/torture/rpc/netlogon.c r.out.trusts->array[i].dns_name)) {