Searched refs:nt_status (Results 1 - 25 of 69) sorted by relevance

123

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dnetlookup.c59 NTSTATUS nt_status; local
92 nt_status = cli_full_connection(&cs->cli, global_myname(), global_myname(),
108 if (!NT_STATUS_IS_OK(nt_status)) {
109 DEBUG(2,("create_cs: Connect failed. Error was %s\n", nt_errstr(nt_status)));
111 cs->err = nt_status;
112 *perr = nt_status;
118 &nt_status);
121 DEBUG(2,("create_cs: open LSA pipe failed. Error was %s\n", nt_errstr(nt_status)));
123 cs->err = nt_status;
124 *perr = nt_status;
156 NTSTATUS nt_status; local
195 NTSTATUS nt_status; local
[all...]
H A Dnet_rpc_printer.c175 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
195 nt_status = cli_nt_error(cli_share_src);
207 nt_status = cli_nt_error(cli_share_src);
223 nt_status = cli_nt_error(cli_share_src);
235 nt_status = cli_nt_error(cli_share_dst);
245 nt_status = cli_nt_error(cli_share_dst);
256 nt_status = cli_nt_error(cli_share_dst);
267 nt_status = cli_nt_error(cli_share_dst);
278 nt_status = cli_nt_error(cli_share_src);
285 nt_status
327 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
505 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
560 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
607 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1031 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1081 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1146 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1272 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1364 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1511 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1687 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
1907 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
2059 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
[all...]
H A Dnet.c169 NTSTATUS nt_status; local
178 nt_status = cli_full_connection(c, NULL, server_name,
184 if (NT_STATUS_IS_OK(nt_status)) {
185 return nt_status;
191 if (NT_STATUS_V(nt_status) ==
195 if (NT_STATUS_V(nt_status) ==
199 if (NT_STATUS_V(nt_status) ==
203 return nt_status;
223 NTSTATUS nt_status; local
225 nt_status
267 NTSTATUS nt_status; local
310 NTSTATUS nt_status; local
464 NTSTATUS nt_status; local
[all...]
H A Dntlm_auth_diagnostics.c51 NTSTATUS nt_status; local
95 nt_status = contact_winbind_auth_crap(opt_username, opt_domain,
107 if (!NT_STATUS_IS_OK(nt_status)) {
110 NT_STATUS_V(nt_status));
175 NTSTATUS nt_status; local
194 nt_status = contact_winbind_auth_crap(opt_username, opt_domain,
206 if (!NT_STATUS_IS_OK(nt_status)) {
209 NT_STATUS_V(nt_status));
241 NTSTATUS nt_status; local
265 nt_status
315 NTSTATUS nt_status; local
443 NTSTATUS nt_status; local
[all...]
H A Dntlm_auth.c282 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
289 response.data.auth.nt_status);
291 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
298 response.data.auth.nt_status));
318 NTSTATUS nt_status; local
363 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
364 nt_status = NT_STATUS_UNSUCCESSFUL;
368 return nt_status;
371 nt_status = (NT_STATUS(response.data.auth.nt_status));
409 NTSTATUS nt_status; local
483 NTSTATUS nt_status; local
523 NTSTATUS nt_status; local
689 NTSTATUS nt_status; local
811 NTSTATUS nt_status; local
2107 NTSTATUS nt_status; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Dchange_trust_pw.c33 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local
66 nt_status = NT_STATUS_UNSUCCESSFUL;
77 netlogon_pipe = cli_rpc_pipe_open_noauth(cli, PI_NETLOGON, &nt_status);
80 dc_name, nt_errstr(nt_status)));
86 nt_status = trust_pw_find_change_and_store_it(netlogon_pipe, cli->mem_ctx, domain);
92 if (!NT_STATUS_IS_OK(nt_status)) {
99 return nt_status;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/
H A Dauth_compat.c44 NTSTATUS nt_status; local
45 if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&plaintext_auth_context))) {
46 return nt_status;
57 nt_status = plaintext_auth_context->check_ntlm_password(plaintext_auth_context,
62 return nt_status;
73 NTSTATUS nt_status; local
81 nt_status = negprot_global_auth_context->check_ntlm_password(negprot_global_auth_context,
85 nt_status = check_plaintext_password(smb_name, plaintext_password, &server_info);
88 return nt_status;
H A Dauth_ntlmssp.c86 NTSTATUS nt_status; local
100 nt_status = make_user_info_map(&user_info,
111 if (!NT_STATUS_IS_OK(nt_status)) {
112 return nt_status;
115 nt_status = auth_ntlmssp_state->auth_context->check_ntlm_password(auth_ntlmssp_state->auth_context,
122 if (!NT_STATUS_IS_OK(nt_status)) {
123 return nt_status;
128 nt_status = create_local_token(auth_ntlmssp_state->server_info);
130 if (!NT_STATUS_IS_OK(nt_status)) {
132 return nt_status;
154 NTSTATUS nt_status; local
[all...]
H A Dauth_domain.c193 NTSTATUS nt_status = NT_STATUS_NO_LOGON_SERVERS; local
207 for (i = 0; !NT_STATUS_IS_OK(nt_status) && retry && (i < 3); i++) {
208 nt_status = connect_to_domain_password_server(&cli,
216 if ( !NT_STATUS_IS_OK(nt_status) ) {
218 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED)) {
221 return nt_status;
235 nt_status = rpccli_netlogon_sam_network_logon(netlogon_pipe,
252 if (!NT_STATUS_IS_OK(nt_status)) {
257 nt_errstr(nt_status)));
260 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_UNSUCCESSFU
306 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local
375 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local
[all...]
H A Dauth_unix.c92 NTSTATUS nt_status; local
101 nt_status = pass_check(pass,
111 if (NT_STATUS_IS_OK(nt_status)) {
115 nt_status = smb_pam_accountcheck(pass->pw_name);
116 if ( !NT_STATUS_IS_OK(nt_status)) {
123 nt_status = NT_STATUS_NO_SUCH_USER;
127 return nt_status;
H A Dauth.c212 NTSTATUS nt_status = NT_STATUS_NO_SUCH_USER; local
269 nt_status = result;
274 nt_status = NT_STATUS_OK;
286 nt_status = NT_STATUS_OK;
290 if (NT_STATUS_IS_OK(nt_status)) {
295 auth_method->name, user_info->smb_name, nt_errstr(nt_status)));
300 if ( NT_STATUS_IS_OK(nt_status))
308 if (NT_STATUS_IS_OK(nt_status)) {
313 nt_status = smb_pam_accountcheck(unix_username);
316 if (NT_STATUS_IS_OK(nt_status)) {
457 NTSTATUS nt_status; local
485 NTSTATUS nt_status; local
552 NTSTATUS nt_status; local
[all...]
H A Dauth_builtin.c42 NTSTATUS nt_status = NT_STATUS_NOT_IMPLEMENTED; local
46 nt_status = make_server_info_guest(server_info);
49 return nt_status;
84 NTSTATUS nt_status; local
99 nt_status = NT_STATUS(error_num);
101 return nt_status;
H A Dauth_winbind.c65 NTSTATUS nt_status; local
127 nt_status = NT_STATUS(response.data.auth.nt_status);
130 if (NT_STATUS_IS_OK(nt_status)) {
131 if (NT_STATUS_IS_OK(nt_status = get_info3_from_ndr(mem_ctx, &response, &info3))) {
132 nt_status = make_server_info_info3(mem_ctx,
137 if (NT_STATUS_IS_OK(nt_status)) {
141 } else if (NT_STATUS_IS_OK(nt_status)) {
142 nt_status = NT_STATUS_NO_LOGON_SERVERS;
146 return nt_status;
[all...]
H A Dauth_server.c230 NTSTATUS nt_status = NT_STATUS_NOT_IMPLEMENTED; local
339 nt_status = cli_session_setup(
346 nt_status = cli_session_setup(
355 if (!NT_STATUS_IS_OK(nt_status)) {
357 cli->desthost, nt_errstr(nt_status)));
363 nt_status = NT_STATUS_LOGON_FAILURE;
368 if (NT_STATUS_IS_OK(nt_status)) {
377 nt_status = smb_pam_accountcheck(pass->pw_name);
378 if ( !NT_STATUS_IS_OK(nt_status)) {
382 nt_status
[all...]
H A Dauth_sam.c256 NTSTATUS nt_status; local
295 nt_status = sam_password_ok(auth_context, mem_ctx, sampass,
299 update_login_attempts_status = pdb_update_login_attempts(sampass, NT_STATUS_IS_OK(nt_status));
301 nt_status = update_login_attempts_status;
303 if (!NT_STATUS_IS_OK(nt_status)) {
304 if (NT_STATUS_EQUAL(nt_status,NT_STATUS_WRONG_PASSWORD) &&
321 return nt_status;
338 nt_status = sam_account_ok(mem_ctx, sampass, user_info);
340 if (!NT_STATUS_IS_OK(nt_status)) {
344 return nt_status;
[all...]
H A Dpass_check.c450 NTSTATUS nt_status; local
464 if (!NT_STATUS_EQUAL(nt_status = string_combinations2(s, i + 1, fn, N - 1),NT_STATUS_WRONG_PASSWORD)) {
465 return (nt_status);
482 NTSTATUS nt_status; local
484 if (!NT_STATUS_EQUAL(nt_status = string_combinations2(s, 0, fn, n), NT_STATUS_WRONG_PASSWORD))
485 return nt_status;
606 NTSTATUS nt_status; local
739 nt_status = password_check(password);
740 if NT_STATUS_IS_OK(nt_status) {
744 return (nt_status);
[all...]
H A Dpampass.c87 NTSTATUS *nt_status)
89 *nt_status = pam_to_nt_status(pam_error);
94 if (NT_STATUS_IS_OK(*nt_status)) {
98 *nt_status = NT_STATUS_LOGON_FAILURE;
502 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local
538 smb_pam_nt_status_error_handler(pamh, pam_error, "Authentication Failure", 2, &nt_status);
539 return nt_status;
548 NTSTATUS nt_status = NT_STATUS_ACCOUNT_DISABLED; local
576 smb_pam_nt_status_error_handler(pamh, pam_error, "Account Check Failed", 2, &nt_status);
577 return nt_status;
85 smb_pam_nt_status_error_handler(pam_handle_t *pamh, int pam_error, const char *msg, int dbglvl, NTSTATUS *nt_status) argument
587 NTSTATUS nt_status = NT_STATUS_NO_TOKEN; local
764 NTSTATUS nt_status = NT_STATUS_ACCOUNT_DISABLED; local
793 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/
H A Dpam_errors.c103 int nt_status_to_pam(NTSTATUS nt_status) argument
106 if NT_STATUS_IS_OK(nt_status) return PAM_SUCCESS;
109 if (NT_STATUS_EQUAL(nt_status,nt_status_to_pam_map[i].ntstatus))
129 int nt_status_to_pam(NTSTATUS nt_status) argument
131 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_OK)) return 0;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/
H A Dkrb5_errs.c98 krb5_error_code nt_status_to_krb5(NTSTATUS nt_status) argument
102 if NT_STATUS_IS_OK(nt_status) {
107 if (NT_STATUS_EQUAL(nt_status,nt_status_to_krb5_map[i].ntstatus))
H A Dads_status.c49 NTSTATUS nt_status)
60 ret.err.nt_status = nt_status;
74 return status.err.nt_status;
48 ads_build_nt_error(enum ads_error_type etype, NTSTATUS nt_status) argument
H A Dsasl.c37 NTSTATUS nt_status; local
42 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_client_start(&ntlmssp_state))) {
43 return ADS_ERROR_NT(nt_status);
47 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, ads->auth.user_name))) {
48 return ADS_ERROR_NT(nt_status);
50 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, ads->auth.realm))) {
51 return ADS_ERROR_NT(nt_status);
53 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) {
54 return ADS_ERROR_NT(nt_status);
60 nt_status
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/pdb/
H A Dtest.c109 NTSTATUS nt_status; local
111 if (!NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method ))) {
112 return nt_status;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dtrusts_util.c85 NTSTATUS nt_status; local
97 nt_status = just_change_the_password(cli, mem_ctx, orig_trust_passwd_hash,
100 if (NT_STATUS_IS_OK(nt_status)) {
108 nt_status = NT_STATUS_UNSUCCESSFUL;
112 return nt_status;
H A Dntlmssp_sign.c140 NTSTATUS nt_status; local
152 nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
157 return nt_status;
172 NTSTATUS nt_status; local
184 nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
189 if (!NT_STATUS_IS_OK(nt_status)) {
190 DEBUG(0, ("NTLMSSP packet check failed with %s\n", nt_errstr(nt_status)));
192 return nt_status;
255 NTSTATUS nt_status = ntlmssp_make_packet_signature(ntlmssp_state, local
259 if (!NT_STATUS_IS_OK(nt_status)) {
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/pcap2nbench/
H A Dsmb.hpp35 uint32_t nt_status; member in struct:smb

Completed in 295 milliseconds

123