Searched refs:nt_status (Results 26 - 50 of 72) sorted by relevance

123

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/utils/
H A Dntlm_auth.c276 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
283 response.data.auth.nt_status);
285 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
292 response.data.auth.nt_status));
312 NTSTATUS nt_status; local
355 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
356 nt_status = NT_STATUS_UNSUCCESSFUL;
360 return nt_status;
363 nt_status = (NT_STATUS(response.data.auth.nt_status));
395 NTSTATUS nt_status; local
435 NTSTATUS nt_status; local
538 NTSTATUS nt_status; local
619 NTSTATUS nt_status; local
1635 NTSTATUS nt_status; local
[all...]
H A Dnet_rpc_samsync.c261 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
277 if (!NT_STATUS_IS_OK(nt_status = cli_nt_establish_netlogon(cli, sec_channel,
287 nt_status = NT_STATUS_OK;
291 return nt_status;
694 NTSTATUS nt_status; local
698 if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam_talloc(t, &member))) {
700 return nt_status;
894 NTSTATUS nt_status;
898 if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam_talloc(t, &member))) {
900 return nt_status;
985 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
[all...]
H A Dnet_rpc.c105 NTSTATUS nt_status; local
135 nt_status = fn(domain_sid, domain_name, cli, mem_ctx, argc, argv);
137 if (!NT_STATUS_IS_OK(nt_status)) {
138 DEBUG(1, ("rpc command function failed! (%s)\n", nt_errstr(nt_status)));
154 return (!NT_STATUS_IS_OK(nt_status));
2645 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
2665 nt_status = connect_pipe(&cli_dst, PI_SRVSVC, &got_dst_srvsvc_pipe);
2666 if (!NT_STATUS_IS_OK(nt_status))
2667 return nt_status;
2674 nt_status
2794 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
2923 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
4595 NTSTATUS nt_status; local
4832 NTSTATUS nt_status; local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/
H A Dcliconnect.c577 NTSTATUS nt_status; local
586 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_client_start(&ntlmssp_state))) {
587 return nt_status;
590 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) {
591 return nt_status;
593 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, domain))) {
594 return nt_status;
596 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, pass))) {
597 return nt_status;
601 nt_status
1374 NTSTATUS nt_status; local
1477 NTSTATUS nt_status; local
1639 NTSTATUS nt_status; local
[all...]
H A Dntlmssp_sign.c154 NTSTATUS nt_status; local
160 nt_status = ntlmssp_make_packet_signature(ntlmssp_state, data, length, NTLMSSP_SEND, sig);
164 return nt_status;
178 NTSTATUS nt_status; local
190 nt_status = ntlmssp_make_packet_signature(ntlmssp_state, data,
193 if (!NT_STATUS_IS_OK(nt_status)) {
194 DEBUG(0, ("NTLMSSP packet check failed with %s\n", nt_errstr(nt_status)));
195 return nt_status;
H A Dntlmssp.c498 NTSTATUS nt_status; local
606 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, domain))) {
611 return nt_status;
614 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) {
619 return nt_status;
622 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_workstation(ntlmssp_state, workstation))) {
627 return nt_status;
667 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->set_challenge(ntlmssp_state, &ntlmssp_state->chal))) {
669 return nt_status;
683 if (!NT_STATUS_IS_OK(nt_status
883 NTSTATUS nt_status; local
[all...]
H A Dclispnego.c451 DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status, argument
458 if (NT_STATUS_IS_OK(nt_status)) {
460 } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
495 BOOL spnego_parse_auth_response(DATA_BLOB blob, NTSTATUS nt_status, argument
501 if (NT_STATUS_IS_OK(nt_status)) {
503 } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
H A Dnterr.c731 * @param nt_status NTSTATUS input for squashing.
732 * @return the 'squashed' nt_status
735 NTSTATUS nt_status_squash(NTSTATUS nt_status) argument
737 if NT_STATUS_IS_OK(nt_status) {
738 return nt_status;
739 } else if NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_SUCH_USER) {
743 } else if NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD) {
747 return nt_status;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/client/
H A Dsmbspool.c288 NTSTATUS nt_status; local
296 nt_status = cli_full_connection(&c, myname, server, NULL, port, share, "?????",
299 if (!NT_STATUS_IS_OK(nt_status)) {
300 fprintf(stderr, "ERROR: Connection failed with error %s\n", nt_errstr(nt_status));
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/sam/
H A Didmap_rid.c330 NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER; local
336 return nt_status;
341 return nt_status;
350 return nt_status;
361 nt_status = rid_idmap_get_domains(&num_domains, &domain_names, &domain_sids);
362 if (!NT_STATUS_IS_OK(nt_status) &&
363 !NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_MORE_ENTRIES) &&
364 !NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES)) {
366 return nt_status;
370 nt_status
[all...]
H A Didmap_ldap.c728 NTSTATUS nt_status; local
736 if (!NT_STATUS_IS_OK(nt_status =
740 return nt_status;
745 nt_status = verify_idpool();
746 if ( !NT_STATUS_IS_OK(nt_status) )
747 return nt_status;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpc_client/
H A Dcli_pipe.c286 NTSTATUS nt_status; local
313 nt_status = ntlmssp_unseal_packet(cli->ntlmssp_pipe_state,
318 nt_status = ntlmssp_check_packet(cli->ntlmssp_pipe_state,
325 if (!NT_STATUS_IS_OK(nt_status)) {
686 NTSTATUS nt_status; local
691 nt_status = ntlmssp_update(cli->ntlmssp_pipe_state,
695 if (!NT_STATUS_EQUAL(nt_status,
698 return nt_status;
785 NTSTATUS nt_status; local
794 nt_status
918 NTSTATUS nt_status; local
1335 NTSTATUS nt_status; local
[all...]
H A Dcli_netlogon.c755 NTSTATUS nt_status; local
774 nt_status = NT_STATUS_UNSUCCESSFUL;
784 nt_status = NT_STATUS_UNSUCCESSFUL;
788 nt_status = r_s.status;
793 DEBUG(0,("cli_net_srv_pwset: %s\n", nt_errstr(nt_status)));
805 nt_status = NT_STATUS_UNSUCCESSFUL;
813 return nt_status;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dwinbindd_passdb.c328 NTSTATUS nt_status; local
338 nt_status = secrets_get_trusted_domains(mem_ctx, &enum_ctx, 1,
358 } while (NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES));
360 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_MORE_ENTRIES)) {
363 return nt_status;
H A Dwbinfo.c336 response.data.auth.nt_status);
535 if (response.data.auth.nt_status)
538 response.data.auth.nt_status,
633 if (response.data.auth.nt_status)
636 response.data.auth.nt_status,
677 if (response.data.auth.nt_status)
680 response.data.auth.nt_status,
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/passdb/
H A Dpdb_nds.c861 NTSTATUS nt_status = NT_STATUS_ACCOUNT_RESTRICTION; local
865 nt_status = NT_STATUS_WRONG_PASSWORD;
870 return nt_status;
905 NTSTATUS nt_status = pdb_init_ldapsam_compat(pdb_context, pdb_method, location); local
911 return nt_status;
921 NTSTATUS nt_status = pdb_init_ldapsam(pdb_context, pdb_method, location); local
927 return nt_status;
932 NTSTATUS nt_status; local
933 if (!NT_STATUS_IS_OK(nt_status = smb_register_passdb(PASSDB_INTERFACE_VERSION, "NDS_ldapsam", pdb_init_NDS_ldapsam)))
934 return nt_status;
[all...]
H A Dpdb_smbpasswd.c1285 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1296 return nt_status;
1303 return nt_status;
1327 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1341 return nt_status;
1352 return nt_status;
1361 return nt_status;
1366 return nt_status;
1374 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1391 return nt_status;
1502 NTSTATUS nt_status; local
[all...]
H A Dpdb_interface.c690 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
727 nt_status = entry->init(context, methods, module_location);
728 if (NT_STATUS_IS_OK(nt_status)) {
731 DEBUG(0,("pdb backend %s did not correctly init (error was %s)\n", selected, nt_errstr(nt_status)));
734 return nt_status;
806 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
809 if (!NT_STATUS_IS_OK(nt_status = make_pdb_context(context))) {
810 return nt_status;
815 return nt_status;
824 if (!NT_STATUS_IS_OK(nt_status
[all...]
H A Dpdb_mysql.c412 NTSTATUS nt_status; local
429 (nt_status = make_pdb_methods(pdb_context->mem_ctx, pdb_method))) {
430 return nt_status;
H A Dpdb_pgsql.c416 NTSTATUS nt_status ; local
426 (nt_status = make_pdb_methods(pdb_context->mem_ctx, pdb_method))) {
427 return nt_status;
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/include/
H A Dads.h52 NTSTATUS nt_status; member in union:__anon1593::err_state
73 #define ADS_ERR_OK(status) ((status.error_type == ENUM_ADS_ERROR_NT) ? NT_STATUS_IS_OK(status.err.nt_status):(status.err.rc == 0))
H A Dauth.h100 NTSTATUS (*nt_status_squash)(NTSTATUS nt_status);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/rpc_server/
H A Dsrv_samr_nt.c320 NTSTATUS nt_status = NT_STATUS_OK; local
346 for (; (NT_STATUS_IS_OK(nt_status = pdb_init_sam_talloc(mem_ctx, &pwd)))
395 return nt_status;
1602 NTSTATUS nt_status; local
1612 nt_status = access_check_samr_function( acc_granted,
1615 if ( !NT_STATUS_IS_OK(nt_status) )
1616 return nt_status;
1618 nt_status = pdb_init_sam_talloc(p->mem_ctx, &sampass);
1620 if (!NT_STATUS_IS_OK(nt_status))
1621 return nt_status;
1674 NTSTATUS nt_status; local
1708 NTSTATUS nt_status; local
1745 NTSTATUS nt_status; local
1827 NTSTATUS nt_status; local
2232 NTSTATUS nt_status; local
2456 NTSTATUS nt_status; local
2507 NTSTATUS nt_status; local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/pam_smbpass/
H A Dpam_smb_passwd.c105 NTSTATUS nt_status; local
140 if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam(&sampass))) {
142 return nt_status_to_pam(nt_status);
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/
H A Dchgpasswd.c706 NTSTATUS nt_status = check_oem_password(user, password_encrypted_with_lm_hash, local
712 if (!NT_STATUS_IS_OK(nt_status))
713 return nt_status;
717 nt_status = change_oem_password(sampass, NULL, new_passwd, True);
724 return nt_status;

Completed in 275 milliseconds

123