/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | netlookup.c | 59 NTSTATUS nt_status; local 92 nt_status = cli_full_connection(&cs->cli, global_myname(), global_myname(), 108 if (!NT_STATUS_IS_OK(nt_status)) { 109 DEBUG(2,("create_cs: Connect failed. Error was %s\n", nt_errstr(nt_status))); 111 cs->err = nt_status; 112 *perr = nt_status; 118 &nt_status); 121 DEBUG(2,("create_cs: open LSA pipe failed. Error was %s\n", nt_errstr(nt_status))); 123 cs->err = nt_status; 124 *perr = nt_status; 156 NTSTATUS nt_status; local 195 NTSTATUS nt_status; local [all...] |
H A D | net_rpc_printer.c | 175 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 195 nt_status = cli_nt_error(cli_share_src); 207 nt_status = cli_nt_error(cli_share_src); 223 nt_status = cli_nt_error(cli_share_src); 235 nt_status = cli_nt_error(cli_share_dst); 245 nt_status = cli_nt_error(cli_share_dst); 256 nt_status = cli_nt_error(cli_share_dst); 267 nt_status = cli_nt_error(cli_share_dst); 278 nt_status = cli_nt_error(cli_share_src); 285 nt_status 327 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 505 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 560 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 607 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1031 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1081 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1146 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1272 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1364 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1511 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1687 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1907 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 2059 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local [all...] |
H A D | net.c | 169 NTSTATUS nt_status; local 178 nt_status = cli_full_connection(c, NULL, server_name, 184 if (NT_STATUS_IS_OK(nt_status)) { 185 return nt_status; 191 if (NT_STATUS_V(nt_status) == 195 if (NT_STATUS_V(nt_status) == 199 if (NT_STATUS_V(nt_status) == 203 return nt_status; 223 NTSTATUS nt_status; local 225 nt_status 267 NTSTATUS nt_status; local 310 NTSTATUS nt_status; local 464 NTSTATUS nt_status; local [all...] |
H A D | ntlm_auth_diagnostics.c | 51 NTSTATUS nt_status; local 95 nt_status = contact_winbind_auth_crap(opt_username, opt_domain, 107 if (!NT_STATUS_IS_OK(nt_status)) { 110 NT_STATUS_V(nt_status)); 175 NTSTATUS nt_status; local 194 nt_status = contact_winbind_auth_crap(opt_username, opt_domain, 206 if (!NT_STATUS_IS_OK(nt_status)) { 209 NT_STATUS_V(nt_status)); 241 NTSTATUS nt_status; local 265 nt_status 315 NTSTATUS nt_status; local 443 NTSTATUS nt_status; local [all...] |
H A D | ntlm_auth.c | 282 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { 289 response.data.auth.nt_status); 291 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { 298 response.data.auth.nt_status)); 318 NTSTATUS nt_status; local 363 if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { 364 nt_status = NT_STATUS_UNSUCCESSFUL; 368 return nt_status; 371 nt_status = (NT_STATUS(response.data.auth.nt_status)); 409 NTSTATUS nt_status; local 483 NTSTATUS nt_status; local 523 NTSTATUS nt_status; local 689 NTSTATUS nt_status; local 811 NTSTATUS nt_status; local 2107 NTSTATUS nt_status; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | change_trust_pw.c | 33 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 66 nt_status = NT_STATUS_UNSUCCESSFUL; 77 netlogon_pipe = cli_rpc_pipe_open_noauth(cli, PI_NETLOGON, &nt_status); 80 dc_name, nt_errstr(nt_status))); 86 nt_status = trust_pw_find_change_and_store_it(netlogon_pipe, cli->mem_ctx, domain); 92 if (!NT_STATUS_IS_OK(nt_status)) { 99 return nt_status;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | auth_compat.c | 44 NTSTATUS nt_status; local 45 if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&plaintext_auth_context))) { 46 return nt_status; 57 nt_status = plaintext_auth_context->check_ntlm_password(plaintext_auth_context, 62 return nt_status; 73 NTSTATUS nt_status; local 81 nt_status = negprot_global_auth_context->check_ntlm_password(negprot_global_auth_context, 85 nt_status = check_plaintext_password(smb_name, plaintext_password, &server_info); 88 return nt_status;
|
H A D | auth_ntlmssp.c | 86 NTSTATUS nt_status; local 100 nt_status = make_user_info_map(&user_info, 111 if (!NT_STATUS_IS_OK(nt_status)) { 112 return nt_status; 115 nt_status = auth_ntlmssp_state->auth_context->check_ntlm_password(auth_ntlmssp_state->auth_context, 122 if (!NT_STATUS_IS_OK(nt_status)) { 123 return nt_status; 128 nt_status = create_local_token(auth_ntlmssp_state->server_info); 130 if (!NT_STATUS_IS_OK(nt_status)) { 132 return nt_status; 154 NTSTATUS nt_status; local [all...] |
H A D | auth_domain.c | 193 NTSTATUS nt_status = NT_STATUS_NO_LOGON_SERVERS; local 207 for (i = 0; !NT_STATUS_IS_OK(nt_status) && retry && (i < 3); i++) { 208 nt_status = connect_to_domain_password_server(&cli, 216 if ( !NT_STATUS_IS_OK(nt_status) ) { 218 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED)) { 221 return nt_status; 235 nt_status = rpccli_netlogon_sam_network_logon(netlogon_pipe, 252 if (!NT_STATUS_IS_OK(nt_status)) { 257 nt_errstr(nt_status))); 260 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_UNSUCCESSFU 306 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local 375 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local [all...] |
H A D | auth_unix.c | 92 NTSTATUS nt_status; local 101 nt_status = pass_check(pass, 111 if (NT_STATUS_IS_OK(nt_status)) { 115 nt_status = smb_pam_accountcheck(pass->pw_name); 116 if ( !NT_STATUS_IS_OK(nt_status)) { 123 nt_status = NT_STATUS_NO_SUCH_USER; 127 return nt_status;
|
H A D | auth.c | 212 NTSTATUS nt_status = NT_STATUS_NO_SUCH_USER; local 269 nt_status = result; 274 nt_status = NT_STATUS_OK; 286 nt_status = NT_STATUS_OK; 290 if (NT_STATUS_IS_OK(nt_status)) { 295 auth_method->name, user_info->smb_name, nt_errstr(nt_status))); 300 if ( NT_STATUS_IS_OK(nt_status)) 308 if (NT_STATUS_IS_OK(nt_status)) { 313 nt_status = smb_pam_accountcheck(unix_username); 316 if (NT_STATUS_IS_OK(nt_status)) { 457 NTSTATUS nt_status; local 485 NTSTATUS nt_status; local 552 NTSTATUS nt_status; local [all...] |
H A D | auth_builtin.c | 42 NTSTATUS nt_status = NT_STATUS_NOT_IMPLEMENTED; local 46 nt_status = make_server_info_guest(server_info); 49 return nt_status; 84 NTSTATUS nt_status; local 99 nt_status = NT_STATUS(error_num); 101 return nt_status;
|
H A D | auth_winbind.c | 65 NTSTATUS nt_status; local 127 nt_status = NT_STATUS(response.data.auth.nt_status); 130 if (NT_STATUS_IS_OK(nt_status)) { 131 if (NT_STATUS_IS_OK(nt_status = get_info3_from_ndr(mem_ctx, &response, &info3))) { 132 nt_status = make_server_info_info3(mem_ctx, 137 if (NT_STATUS_IS_OK(nt_status)) { 141 } else if (NT_STATUS_IS_OK(nt_status)) { 142 nt_status = NT_STATUS_NO_LOGON_SERVERS; 146 return nt_status; [all...] |
H A D | auth_server.c | 230 NTSTATUS nt_status = NT_STATUS_NOT_IMPLEMENTED; local 339 nt_status = cli_session_setup( 346 nt_status = cli_session_setup( 355 if (!NT_STATUS_IS_OK(nt_status)) { 357 cli->desthost, nt_errstr(nt_status))); 363 nt_status = NT_STATUS_LOGON_FAILURE; 368 if (NT_STATUS_IS_OK(nt_status)) { 377 nt_status = smb_pam_accountcheck(pass->pw_name); 378 if ( !NT_STATUS_IS_OK(nt_status)) { 382 nt_status [all...] |
H A D | auth_sam.c | 256 NTSTATUS nt_status; local 295 nt_status = sam_password_ok(auth_context, mem_ctx, sampass, 299 update_login_attempts_status = pdb_update_login_attempts(sampass, NT_STATUS_IS_OK(nt_status)); 301 nt_status = update_login_attempts_status; 303 if (!NT_STATUS_IS_OK(nt_status)) { 304 if (NT_STATUS_EQUAL(nt_status,NT_STATUS_WRONG_PASSWORD) && 321 return nt_status; 338 nt_status = sam_account_ok(mem_ctx, sampass, user_info); 340 if (!NT_STATUS_IS_OK(nt_status)) { 344 return nt_status; [all...] |
H A D | pass_check.c | 450 NTSTATUS nt_status; local 464 if (!NT_STATUS_EQUAL(nt_status = string_combinations2(s, i + 1, fn, N - 1),NT_STATUS_WRONG_PASSWORD)) { 465 return (nt_status); 482 NTSTATUS nt_status; local 484 if (!NT_STATUS_EQUAL(nt_status = string_combinations2(s, 0, fn, n), NT_STATUS_WRONG_PASSWORD)) 485 return nt_status; 606 NTSTATUS nt_status; local 739 nt_status = password_check(password); 740 if NT_STATUS_IS_OK(nt_status) { 744 return (nt_status); [all...] |
H A D | pampass.c | 87 NTSTATUS *nt_status) 89 *nt_status = pam_to_nt_status(pam_error); 94 if (NT_STATUS_IS_OK(*nt_status)) { 98 *nt_status = NT_STATUS_LOGON_FAILURE; 502 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local 538 smb_pam_nt_status_error_handler(pamh, pam_error, "Authentication Failure", 2, &nt_status); 539 return nt_status; 548 NTSTATUS nt_status = NT_STATUS_ACCOUNT_DISABLED; local 576 smb_pam_nt_status_error_handler(pamh, pam_error, "Account Check Failed", 2, &nt_status); 577 return nt_status; 85 smb_pam_nt_status_error_handler(pam_handle_t *pamh, int pam_error, const char *msg, int dbglvl, NTSTATUS *nt_status) argument 587 NTSTATUS nt_status = NT_STATUS_NO_TOKEN; local 764 NTSTATUS nt_status = NT_STATUS_ACCOUNT_DISABLED; local 793 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | pam_errors.c | 103 int nt_status_to_pam(NTSTATUS nt_status) argument 106 if NT_STATUS_IS_OK(nt_status) return PAM_SUCCESS; 109 if (NT_STATUS_EQUAL(nt_status,nt_status_to_pam_map[i].ntstatus)) 129 int nt_status_to_pam(NTSTATUS nt_status) argument 131 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_OK)) return 0;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | krb5_errs.c | 98 krb5_error_code nt_status_to_krb5(NTSTATUS nt_status) argument 102 if NT_STATUS_IS_OK(nt_status) { 107 if (NT_STATUS_EQUAL(nt_status,nt_status_to_krb5_map[i].ntstatus))
|
H A D | ads_status.c | 49 NTSTATUS nt_status) 60 ret.err.nt_status = nt_status; 74 return status.err.nt_status; 48 ads_build_nt_error(enum ads_error_type etype, NTSTATUS nt_status) argument
|
H A D | sasl.c | 37 NTSTATUS nt_status; local 42 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_client_start(&ntlmssp_state))) { 43 return ADS_ERROR_NT(nt_status); 47 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, ads->auth.user_name))) { 48 return ADS_ERROR_NT(nt_status); 50 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, ads->auth.realm))) { 51 return ADS_ERROR_NT(nt_status); 53 if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) { 54 return ADS_ERROR_NT(nt_status); 60 nt_status [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/pdb/ |
H A D | test.c | 109 NTSTATUS nt_status; local 111 if (!NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method ))) { 112 return nt_status;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | trusts_util.c | 85 NTSTATUS nt_status; local 97 nt_status = just_change_the_password(cli, mem_ctx, orig_trust_passwd_hash, 100 if (NT_STATUS_IS_OK(nt_status)) { 108 nt_status = NT_STATUS_UNSUCCESSFUL; 112 return nt_status;
|
H A D | ntlmssp_sign.c | 140 NTSTATUS nt_status; local 152 nt_status = ntlmssp_make_packet_signature(ntlmssp_state, 157 return nt_status; 172 NTSTATUS nt_status; local 184 nt_status = ntlmssp_make_packet_signature(ntlmssp_state, 189 if (!NT_STATUS_IS_OK(nt_status)) { 190 DEBUG(0, ("NTLMSSP packet check failed with %s\n", nt_errstr(nt_status))); 192 return nt_status; 255 NTSTATUS nt_status = ntlmssp_make_packet_signature(ntlmssp_state, local 259 if (!NT_STATUS_IS_OK(nt_status)) { [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/pcap2nbench/ |
H A D | smb.hpp | 35 uint32_t nt_status; member in struct:smb
|