/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | negprot.c | 33 NTSTATUS nt_status; local 44 if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&negprot_global_auth_context))) { 45 DEBUG(0, ("make_auth_context_subsystem returned %s", nt_errstr(nt_status)));
|
H A D | reply.c | 391 NTSTATUS nt_status; local 414 conn = make_connection(service,password_blob,dev,vuid,&nt_status); 420 return ERROR_NT(nt_status); 449 NTSTATUS nt_status; local 508 conn = make_connection(service,password,client_devicetype,vuid,&nt_status); 514 return ERROR_NT(nt_status); 994 NTSTATUS nt_status; local 1016 p += srvstr_get_path_wcard(inbuf, path, p, sizeof(path), 0, STR_TERMINATE, &nt_status, &mask_contains_wcard); 1017 if (!NT_STATUS_IS_OK(nt_status)) { 1019 return ERROR_NT(nt_status); [all...] |
H A D | nttrans.c | 2222 NTSTATUS nt_status; local 2245 if (!NT_STATUS_IS_OK(nt_status = set_sd( fsp, data, data_count, security_info_sent))) { 2246 return ERROR_NT(nt_status); 2520 NTSTATUS nt_status = NT_STATUS_OK; local 2700 nt_status = NT_STATUS_BUFFER_TOO_SMALL; 2761 send_nt_replies(outbuf, bufsize, nt_status, params, param_len,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | smbcquotas.c | 363 NTSTATUS nt_status; local 374 if (NT_STATUS_IS_OK(nt_status = cli_full_connection(&c, global_myname(), server, 382 DEBUG(0,("cli_full_connection failed! (%s)\n", nt_errstr(nt_status)));
|
H A D | smbcacls.c | 776 NTSTATUS nt_status; local 787 if (NT_STATUS_IS_OK(nt_status = cli_full_connection(&c, global_myname(), server, 795 DEBUG(0,("cli_full_connection failed! (%s)\n", nt_errstr(nt_status)));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpcclient/ |
H A D | rpcclient.c | 693 NTSTATUS nt_status; local 793 nt_status = cli_full_connection(&cli, global_myname(), server, 802 if (!NT_STATUS_IS_OK(nt_status)) { 803 DEBUG(0,("Cannot connect to server. Error was %s\n", nt_errstr(nt_status)));
|
H A D | cmd_spoolss.c | 2609 NTSTATUS nt_status; local 2627 nt_status = cli_full_connection(&cli_server2, global_myname(), servername2, 2636 if ( !NT_STATUS_IS_OK(nt_status) ) 2639 cli2 = cli_rpc_pipe_open_noauth(cli_server2, PI_SPOOLSS, &nt_status); 2642 servername2, nt_errstr(nt_status));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/torture/ |
H A D | locktest2.c | 161 NTSTATUS nt_status; local 180 nt_status = cli_full_connection(&c, myname, server_n, NULL, 0, share, "?????", 184 if (!NT_STATUS_IS_OK(nt_status)) { 185 DEBUG(0, ("cli_full_connection failed with error %s\n", nt_errstr(nt_status)));
|
H A D | torture.c | 4684 NTSTATUS nt_status; local 4743 nt_status = NT_STATUS(IVAL(c_nt->inbuf,smb_rcls)); 4747 nt_status = NT_STATUS(0xc0000000); 4767 if (NT_STATUS_V(nt_status) != error) { 4770 get_nt_error_c_code(nt_status));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/ |
H A D | py_winbind.c | 408 return PyInt_FromLong(response.data.auth.nt_status); 455 return PyInt_FromLong(response.data.auth.nt_status); 515 return PyInt_FromLong(response.data.auth.nt_status);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/ |
H A D | pdb_ldap.c | 5504 NTSTATUS nt_status; local 5507 if (!NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method ))) { 5508 return nt_status; 5546 nt_status = smbldap_init(*pdb_method, location, &ldap_state->smbldap_state); 5548 if ( !NT_STATUS_IS_OK(nt_status) ) { 5549 return nt_status; 5569 NTSTATUS nt_status; local 5574 nt_status = pdb_init_ldapsam_common( pdb_method, uri ); 5578 if ( !NT_STATUS_IS_OK(nt_status) ) { 5579 return nt_status; 5598 NTSTATUS nt_status; local 5745 NTSTATUS nt_status; local [all...] |
H A D | pdb_interface.c | 106 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 144 if ( !NT_STATUS_IS_OK( nt_status = entry->init(methods, module_location) ) ) { 146 selected, nt_errstr(nt_status))); 148 return nt_status; 155 return nt_status;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | winbindd_nss.h | 393 uint32 nt_status; member in struct:winbindd_response::__anon5852::auth_reply
|
H A D | winbindd_pam.c | 298 resp->data.auth.nt_status = NT_STATUS_V(result); 1567 state->response.data.auth.nt_status = NT_STATUS_V(result); 1911 state->response.data.auth.nt_status = NT_STATUS_V(result); 2084 state->response.data.auth.nt_status = NT_STATUS_V(result); 2220 state->response.data.auth.nt_status = NT_STATUS_V(result); 2369 state->response.data.auth.nt_status = NT_STATUS_V(result);
|
H A D | winbindd_misc.c | 90 state->response.data.auth.nt_status = NT_STATUS_V(result);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | libsmbclient.c | 947 NTSTATUS nt_status; local 984 nt_status = cli_full_connection(&ipc_cli, 990 if (! NT_STATUS_IS_OK(nt_status)) { 992 nt_errstr(nt_status))); 1010 &nt_status); 1025 nt_status = rpccli_lsa_open_policy( 1032 if (!NT_STATUS_IS_OK(nt_status)) { 2502 NTSTATUS nt_status; local 2505 pipe_hnd = cli_rpc_pipe_open_noauth(cli, PI_SRVSVC, &nt_status);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/ |
H A D | srv_lsa_nt.c | 632 NTSTATUS nt_status; local 642 nt_status = secrets_trusted_domains(p->mem_ctx, &num_domains, 645 if (!NT_STATUS_IS_OK(nt_status)) { 646 return nt_status;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | includes.h | 645 #include "nt_status.h" 1190 krb5_error_code nt_status_to_krb5(NTSTATUS nt_status);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/printing/ |
H A D | nt_printing.c | 1402 NTSTATUS nt_status; local 1438 conn = make_connection_with_chdir("print$", null_pw, res_type, user->vuid, &nt_status); 1443 *perr = ntstatus_to_werror(nt_status); 1740 NTSTATUS nt_status; local 1775 conn = make_connection_with_chdir("print$", null_pw, res_type, user->vuid, &nt_status); 1780 *perr = ntstatus_to_werror(nt_status); 4916 NTSTATUS nt_status; local 4934 conn = make_connection_with_chdir( "print$", null_pw, res_type, user->vuid, &nt_status );
|