/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/utils/ |
H A D | ntlm_auth.c | 276 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { 283 response.data.auth.nt_status); 285 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { 292 response.data.auth.nt_status)); 312 NTSTATUS nt_status; local 355 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { 356 nt_status = NT_STATUS_UNSUCCESSFUL; 360 return nt_status; 363 nt_status = (NT_STATUS(response.data.auth.nt_status)); 395 NTSTATUS nt_status; local 435 NTSTATUS nt_status; local 538 NTSTATUS nt_status; local 619 NTSTATUS nt_status; local 1635 NTSTATUS nt_status; local [all...] |
H A D | net_rpc_samsync.c | 261 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 277 if (!NT_STATUS_IS_OK(nt_status = cli_nt_establish_netlogon(cli, sec_channel, 287 nt_status = NT_STATUS_OK; 291 return nt_status; 694 NTSTATUS nt_status; local 698 if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam_talloc(t, &member))) { 700 return nt_status; 894 NTSTATUS nt_status; 898 if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam_talloc(t, &member))) { 900 return nt_status; 985 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local [all...] |
H A D | net_rpc.c | 105 NTSTATUS nt_status; local 135 nt_status = fn(domain_sid, domain_name, cli, mem_ctx, argc, argv); 137 if (!NT_STATUS_IS_OK(nt_status)) { 138 DEBUG(1, ("rpc command function failed! (%s)\n", nt_errstr(nt_status))); 154 return (!NT_STATUS_IS_OK(nt_status)); 2645 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 2665 nt_status = connect_pipe(&cli_dst, PI_SRVSVC, &got_dst_srvsvc_pipe); 2666 if (!NT_STATUS_IS_OK(nt_status)) 2667 return nt_status; 2674 nt_status 2794 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 2923 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 4595 NTSTATUS nt_status; local 4832 NTSTATUS nt_status; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | cliconnect.c | 577 NTSTATUS nt_status; local 586 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_client_start(&ntlmssp_state))) { 587 return nt_status; 590 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) { 591 return nt_status; 593 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, domain))) { 594 return nt_status; 596 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, pass))) { 597 return nt_status; 601 nt_status 1374 NTSTATUS nt_status; local 1477 NTSTATUS nt_status; local 1639 NTSTATUS nt_status; local [all...] |
H A D | ntlmssp_sign.c | 154 NTSTATUS nt_status; local 160 nt_status = ntlmssp_make_packet_signature(ntlmssp_state, data, length, NTLMSSP_SEND, sig); 164 return nt_status; 178 NTSTATUS nt_status; local 190 nt_status = ntlmssp_make_packet_signature(ntlmssp_state, data, 193 if (!NT_STATUS_IS_OK(nt_status)) { 194 DEBUG(0, ("NTLMSSP packet check failed with %s\n", nt_errstr(nt_status))); 195 return nt_status;
|
H A D | ntlmssp.c | 498 NTSTATUS nt_status; local 606 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, domain))) { 611 return nt_status; 614 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) { 619 return nt_status; 622 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_workstation(ntlmssp_state, workstation))) { 627 return nt_status; 667 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->set_challenge(ntlmssp_state, &ntlmssp_state->chal))) { 669 return nt_status; 683 if (!NT_STATUS_IS_OK(nt_status 883 NTSTATUS nt_status; local [all...] |
H A D | clispnego.c | 451 DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status, argument 458 if (NT_STATUS_IS_OK(nt_status)) { 460 } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { 495 BOOL spnego_parse_auth_response(DATA_BLOB blob, NTSTATUS nt_status, argument 501 if (NT_STATUS_IS_OK(nt_status)) { 503 } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
|
H A D | nterr.c | 731 * @param nt_status NTSTATUS input for squashing. 732 * @return the 'squashed' nt_status 735 NTSTATUS nt_status_squash(NTSTATUS nt_status) argument 737 if NT_STATUS_IS_OK(nt_status) { 738 return nt_status; 739 } else if NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_SUCH_USER) { 743 } else if NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD) { 747 return nt_status;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/client/ |
H A D | smbspool.c | 288 NTSTATUS nt_status; local 296 nt_status = cli_full_connection(&c, myname, server, NULL, port, share, "?????", 299 if (!NT_STATUS_IS_OK(nt_status)) { 300 fprintf(stderr, "ERROR: Connection failed with error %s\n", nt_errstr(nt_status));
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/sam/ |
H A D | idmap_rid.c | 330 NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER; local 336 return nt_status; 341 return nt_status; 350 return nt_status; 361 nt_status = rid_idmap_get_domains(&num_domains, &domain_names, &domain_sids); 362 if (!NT_STATUS_IS_OK(nt_status) && 363 !NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_MORE_ENTRIES) && 364 !NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES)) { 366 return nt_status; 370 nt_status [all...] |
H A D | idmap_ldap.c | 728 NTSTATUS nt_status; local 736 if (!NT_STATUS_IS_OK(nt_status = 740 return nt_status; 745 nt_status = verify_idpool(); 746 if ( !NT_STATUS_IS_OK(nt_status) ) 747 return nt_status;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpc_client/ |
H A D | cli_pipe.c | 286 NTSTATUS nt_status; local 313 nt_status = ntlmssp_unseal_packet(cli->ntlmssp_pipe_state, 318 nt_status = ntlmssp_check_packet(cli->ntlmssp_pipe_state, 325 if (!NT_STATUS_IS_OK(nt_status)) { 686 NTSTATUS nt_status; local 691 nt_status = ntlmssp_update(cli->ntlmssp_pipe_state, 695 if (!NT_STATUS_EQUAL(nt_status, 698 return nt_status; 785 NTSTATUS nt_status; local 794 nt_status 918 NTSTATUS nt_status; local 1335 NTSTATUS nt_status; local [all...] |
H A D | cli_netlogon.c | 755 NTSTATUS nt_status; local 774 nt_status = NT_STATUS_UNSUCCESSFUL; 784 nt_status = NT_STATUS_UNSUCCESSFUL; 788 nt_status = r_s.status; 793 DEBUG(0,("cli_net_srv_pwset: %s\n", nt_errstr(nt_status))); 805 nt_status = NT_STATUS_UNSUCCESSFUL; 813 return nt_status;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | winbindd_passdb.c | 328 NTSTATUS nt_status; local 338 nt_status = secrets_get_trusted_domains(mem_ctx, &enum_ctx, 1, 358 } while (NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES)); 360 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_MORE_ENTRIES)) { 363 return nt_status;
|
H A D | wbinfo.c | 336 response.data.auth.nt_status); 535 if (response.data.auth.nt_status) 538 response.data.auth.nt_status, 633 if (response.data.auth.nt_status) 636 response.data.auth.nt_status, 677 if (response.data.auth.nt_status) 680 response.data.auth.nt_status,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | pdb_nds.c | 861 NTSTATUS nt_status = NT_STATUS_ACCOUNT_RESTRICTION; local 865 nt_status = NT_STATUS_WRONG_PASSWORD; 870 return nt_status; 905 NTSTATUS nt_status = pdb_init_ldapsam_compat(pdb_context, pdb_method, location); local 911 return nt_status; 921 NTSTATUS nt_status = pdb_init_ldapsam(pdb_context, pdb_method, location); local 927 return nt_status; 932 NTSTATUS nt_status; local 933 if (!NT_STATUS_IS_OK(nt_status = smb_register_passdb(PASSDB_INTERFACE_VERSION, "NDS_ldapsam", pdb_init_NDS_ldapsam))) 934 return nt_status; [all...] |
H A D | pdb_smbpasswd.c | 1285 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1296 return nt_status; 1303 return nt_status; 1327 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1341 return nt_status; 1352 return nt_status; 1361 return nt_status; 1366 return nt_status; 1374 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1391 return nt_status; 1502 NTSTATUS nt_status; local [all...] |
H A D | pdb_interface.c | 690 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 727 nt_status = entry->init(context, methods, module_location); 728 if (NT_STATUS_IS_OK(nt_status)) { 731 DEBUG(0,("pdb backend %s did not correctly init (error was %s)\n", selected, nt_errstr(nt_status))); 734 return nt_status; 806 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 809 if (!NT_STATUS_IS_OK(nt_status = make_pdb_context(context))) { 810 return nt_status; 815 return nt_status; 824 if (!NT_STATUS_IS_OK(nt_status [all...] |
H A D | pdb_mysql.c | 412 NTSTATUS nt_status; local 429 (nt_status = make_pdb_methods(pdb_context->mem_ctx, pdb_method))) { 430 return nt_status;
|
H A D | pdb_pgsql.c | 416 NTSTATUS nt_status ; local 426 (nt_status = make_pdb_methods(pdb_context->mem_ctx, pdb_method))) { 427 return nt_status;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/include/ |
H A D | ads.h | 52 NTSTATUS nt_status; member in union:__anon1593::err_state 73 #define ADS_ERR_OK(status) ((status.error_type == ENUM_ADS_ERROR_NT) ? NT_STATUS_IS_OK(status.err.nt_status):(status.err.rc == 0))
|
H A D | auth.h | 100 NTSTATUS (*nt_status_squash)(NTSTATUS nt_status);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpc_server/ |
H A D | srv_samr_nt.c | 320 NTSTATUS nt_status = NT_STATUS_OK; local 346 for (; (NT_STATUS_IS_OK(nt_status = pdb_init_sam_talloc(mem_ctx, &pwd))) 395 return nt_status; 1602 NTSTATUS nt_status; local 1612 nt_status = access_check_samr_function( acc_granted, 1615 if ( !NT_STATUS_IS_OK(nt_status) ) 1616 return nt_status; 1618 nt_status = pdb_init_sam_talloc(p->mem_ctx, &sampass); 1620 if (!NT_STATUS_IS_OK(nt_status)) 1621 return nt_status; 1674 NTSTATUS nt_status; local 1708 NTSTATUS nt_status; local 1745 NTSTATUS nt_status; local 1827 NTSTATUS nt_status; local 2232 NTSTATUS nt_status; local 2456 NTSTATUS nt_status; local 2507 NTSTATUS nt_status; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/pam_smbpass/ |
H A D | pam_smb_passwd.c | 105 NTSTATUS nt_status; local 140 if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam(&sampass))) { 142 return nt_status_to_pam(nt_status);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | chgpasswd.c | 706 NTSTATUS nt_status = check_oem_password(user, password_encrypted_with_lm_hash, local 712 if (!NT_STATUS_IS_OK(nt_status)) 713 return nt_status; 717 nt_status = change_oem_password(sampass, NULL, new_passwd, True); 724 return nt_status;
|