/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/auth/ |
H A D | auth_compat.c | 41 NTSTATUS nt_status; local 42 if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&plaintext_auth_context))) { 43 return nt_status; 54 nt_status = plaintext_auth_context->check_ntlm_password(plaintext_auth_context, 59 return nt_status; 70 NTSTATUS nt_status; local 79 nt_status = negprot_global_auth_context->check_ntlm_password(negprot_global_auth_context, 83 nt_status = check_plaintext_password(smb_name, plaintext_password, &server_info); 86 return nt_status;
|
H A D | auth_rhosts.c | 165 NTSTATUS nt_status; local 167 if (!NT_STATUS_IS_OK(nt_status = 170 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_SUCH_USER)) 171 nt_status = NT_STATUS_NOT_IMPLEMENTED; 172 return nt_status; 176 nt_status = make_server_info_sam(server_info, account); 179 nt_status = NT_STATUS_NOT_IMPLEMENTED; 182 return nt_status; 208 NTSTATUS nt_status; local 213 if (!NT_STATUS_IS_OK(nt_status [all...] |
H A D | auth_ntlmssp.c | 82 NTSTATUS nt_status; local 95 nt_status = make_user_info_map(&user_info, 104 if (!NT_STATUS_IS_OK(nt_status)) { 105 return nt_status; 108 nt_status = auth_ntlmssp_state->auth_context->check_ntlm_password(auth_ntlmssp_state->auth_context, 113 if (!NT_STATUS_IS_OK(nt_status)) { 114 return nt_status; 128 return nt_status; 133 NTSTATUS nt_status; local 149 if (!NT_STATUS_IS_OK(nt_status [all...] |
H A D | auth_domain.c | 150 NTSTATUS nt_status = NT_STATUS_NO_LOGON_SERVERS; local 164 for (i = 0; !NT_STATUS_IS_OK(nt_status) && retry && (i < 3); i++) { 165 nt_status = connect_to_domain_password_server(&cli, domain, dc_name, 169 if ( !NT_STATUS_IS_OK(nt_status) ) { 171 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED)) { 174 return nt_status; 184 nt_status = cli_netlogon_sam_network_logon(cli, mem_ctx, 194 if (!NT_STATUS_IS_OK(nt_status)) { 199 nt_errstr(nt_status))); 202 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_UNSUCCESSFU 247 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local 335 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local [all...] |
H A D | auth_unix.c | 90 NTSTATUS nt_status; local 99 nt_status = pass_check(pass, 109 if (NT_STATUS_IS_OK(nt_status)) { 114 nt_status = NT_STATUS_NO_SUCH_USER; 118 return nt_status;
|
H A D | auth_builtin.c | 42 NTSTATUS nt_status = NT_STATUS_NOT_IMPLEMENTED; local 46 nt_status = make_server_info_guest(server_info); 49 return nt_status; 84 NTSTATUS nt_status; local 99 nt_status = NT_STATUS(error_num); 101 return nt_status;
|
H A D | auth.c | 210 NTSTATUS nt_status = NT_STATUS_NO_SUCH_USER; local 267 nt_status = result; 272 nt_status = NT_STATUS_OK; 284 nt_status = NT_STATUS_OK; 288 if (NT_STATUS_IS_OK(nt_status)) { 293 auth_method->name, user_info->smb_name.str, nt_errstr(nt_status))); 298 if ( NT_STATUS_IS_OK(nt_status)) 304 if (NT_STATUS_IS_OK(nt_status)) { 309 nt_status = smb_pam_accountcheck(unix_username); 312 if (NT_STATUS_IS_OK(nt_status)) { 451 NTSTATUS nt_status; local 479 NTSTATUS nt_status; local 546 NTSTATUS nt_status; local [all...] |
H A D | auth_winbind.c | 65 NTSTATUS nt_status; local 126 nt_status = NT_STATUS(response.data.auth.nt_status); 129 if (NT_STATUS_IS_OK(nt_status)) { 130 if (NT_STATUS_IS_OK(nt_status = get_info3_from_ndr(mem_ctx, &response, &info3))) { 131 nt_status = make_server_info_info3(mem_ctx, 138 } else if (NT_STATUS_IS_OK(nt_status)) { 139 nt_status = NT_STATUS_NO_LOGON_SERVERS; 143 return nt_status;
|
H A D | auth_sam.c | 234 NTSTATUS nt_status; local 246 if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam(&sampass))) { 247 return nt_status; 271 nt_status = sam_password_ok(auth_context, mem_ctx, sampass, 275 update_login_attempts_status = pdb_update_login_attempts(sampass, NT_STATUS_IS_OK(nt_status)); 277 nt_status = update_login_attempts_status; 279 if (!NT_STATUS_IS_OK(nt_status)) { 280 if (NT_STATUS_EQUAL(nt_status,NT_STATUS_WRONG_PASSWORD) && 297 return nt_status; 314 nt_status [all...] |
H A D | auth_util.c | 94 NTSTATUS nt_status; local 95 if (!NT_STATUS_IS_OK(nt_status = pdb_init_sam(account))) { 96 return nt_status; 109 if (!NT_STATUS_IS_OK(nt_status = pdb_fill_sam_pw(*account, pass))) { 110 return nt_status; 263 NTSTATUS nt_status; local 267 nt_status = make_user_info_map(user_info, 275 ret = NT_STATUS_IS_OK(nt_status) ? True : False; 344 NTSTATUS nt_status; local 363 nt_status 461 NTSTATUS nt_status; local 522 NTSTATUS nt_status = NT_STATUS_OK; local 782 NTSTATUS nt_status; local 830 NTSTATUS nt_status; local 876 NTSTATUS nt_status; local 907 NTSTATUS nt_status; local 1125 NTSTATUS nt_status = NT_STATUS_OK; local [all...] |
H A D | auth_server.c | 229 NTSTATUS nt_status = NT_STATUS_NOT_IMPLEMENTED; local 240 return nt_status; 352 nt_status = cli_nt_error(cli); 354 nt_status = NT_STATUS_OK; 365 nt_status = cli_nt_error(cli); 367 nt_status = NT_STATUS_OK; 374 nt_status = NT_STATUS_LOGON_FAILURE; 379 if (NT_STATUS_IS_OK(nt_status)) { 386 nt_status = make_server_info_pw(server_info, pass->pw_name, pass); 390 nt_status [all...] |
H A D | pass_check.c | 444 NTSTATUS nt_status; local 458 if (!NT_STATUS_EQUAL(nt_status = string_combinations2(s, i + 1, fn, N - 1),NT_STATUS_WRONG_PASSWORD)) { 459 return (nt_status); 476 NTSTATUS nt_status; local 478 if (!NT_STATUS_EQUAL(nt_status = string_combinations2(s, 0, fn, n), NT_STATUS_WRONG_PASSWORD)) 479 return nt_status; 600 NTSTATUS nt_status; local 733 nt_status = password_check(password); 734 if NT_STATUS_IS_OK(nt_status) { 738 return (nt_status); [all...] |
H A D | pampass.c | 87 NTSTATUS *nt_status) 89 *nt_status = pam_to_nt_status(pam_error); 94 if (NT_STATUS_IS_OK(*nt_status)) { 98 *nt_status = NT_STATUS_LOGON_FAILURE; 503 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local 539 smb_pam_nt_status_error_handler(pamh, pam_error, "Authentication Failure", 2, &nt_status); 540 return nt_status; 549 NTSTATUS nt_status = NT_STATUS_ACCOUNT_DISABLED; local 577 smb_pam_nt_status_error_handler(pamh, pam_error, "Account Check Failed", 2, &nt_status); 578 return nt_status; 85 smb_pam_nt_status_error_handler(pam_handle_t *pamh, int pam_error, const char *msg, int dbglvl, NTSTATUS *nt_status) argument 588 NTSTATUS nt_status = NT_STATUS_NO_TOKEN; local 765 NTSTATUS nt_status = NT_STATUS_ACCOUNT_DISABLED; local 794 NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | change_trust_pw.c | 33 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 65 nt_status = NT_STATUS_UNSUCCESSFUL; 80 nt_status = NT_STATUS_UNSUCCESSFUL; 84 nt_status = trust_pw_find_change_and_store_it(cli, cli->mem_ctx, domain); 91 if (!NT_STATUS_IS_OK(nt_status)) { 98 return nt_status;
|
H A D | sesssetup.c | 83 DATA_BLOB blob, NTSTATUS nt_status) 89 nt_status = nt_status_squash(nt_status); 90 SIVAL(outbuf, smb_rcls, NT_STATUS_V(nt_status)); 115 NTSTATUS nt_status; local 122 if (!NT_STATUS_IS_OK(nt_status = make_auth_context_fixed(&auth_context, chal))) { 123 return nt_status; 131 nt_status = auth_context->check_ntlm_password(auth_context, user_info, server_info); 134 return nt_status; 345 DATA_BLOB *ntlmssp_blob, NTSTATUS nt_status, 82 reply_sesssetup_blob(connection_struct *conn, char *outbuf, DATA_BLOB blob, NTSTATUS nt_status) argument 343 reply_spnego_ntlmssp(connection_struct *conn, char *inbuf, char *outbuf, AUTH_NTLMSSP_STATE **auth_ntlmssp_state, DATA_BLOB *ntlmssp_blob, NTSTATUS nt_status, BOOL wrap) argument 437 NTSTATUS nt_status; local 509 NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER; local 619 NTSTATUS nt_status; local 691 NTSTATUS nt_status; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/utils/ |
H A D | net_rpc_printer.c | 303 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 324 nt_status = cli_nt_error(cli_share_src); 336 nt_status = cli_nt_error(cli_share_src); 352 nt_status = cli_nt_error(cli_share_src); 364 nt_status = cli_nt_error(cli_share_dst); 374 nt_status = cli_nt_error(cli_share_dst); 385 nt_status = cli_nt_error(cli_share_dst); 396 nt_status = cli_nt_error(cli_share_dst); 407 nt_status = cli_nt_error(cli_share_src); 414 nt_status 456 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 633 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 689 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 737 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1198 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1244 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1307 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1416 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1503 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1649 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 1823 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 2034 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 2193 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local [all...] |
H A D | ntlm_auth_diagnostics.c | 51 NTSTATUS nt_status; local 95 nt_status = contact_winbind_auth_crap(opt_username, opt_domain, 107 if (!NT_STATUS_IS_OK(nt_status)) { 110 NT_STATUS_V(nt_status)); 175 NTSTATUS nt_status; local 194 nt_status = contact_winbind_auth_crap(opt_username, opt_domain, 206 if (!NT_STATUS_IS_OK(nt_status)) { 209 NT_STATUS_V(nt_status)); 241 NTSTATUS nt_status; local 265 nt_status 315 NTSTATUS nt_status; local 443 NTSTATUS nt_status; local [all...] |
H A D | net.c | 142 NTSTATUS nt_status; local 151 nt_status = cli_full_connection(c, NULL, server_name, 157 if (NT_STATUS_IS_OK(nt_status)) { 158 return nt_status; 164 if (NT_STATUS_V(nt_status) == 168 if (NT_STATUS_V(nt_status) == 172 if (NT_STATUS_V(nt_status) == 176 return nt_status; 196 NTSTATUS nt_status; local 198 nt_status 223 NTSTATUS nt_status; local 359 NTSTATUS nt_status; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/lib/ |
H A D | pam_errors.c | 95 int nt_status_to_pam(NTSTATUS nt_status) argument 98 if NT_STATUS_IS_OK(nt_status) return PAM_SUCCESS; 101 if (NT_STATUS_EQUAL(nt_status,nt_status_to_pam_map[i].ntstatus)) 121 int nt_status_to_pam(NTSTATUS nt_status) argument 123 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_OK)) return 0;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | trusts_util.c | 70 NTSTATUS nt_status; local 78 nt_status = just_change_the_password(cli, mem_ctx, orig_trust_passwd_hash, 81 if (NT_STATUS_IS_OK(nt_status)) { 89 nt_status = NT_STATUS_UNSUCCESSFUL; 93 return nt_status;
|
H A D | conncache.c | 40 NTSTATUS nt_status; member in struct:failed_connection_cache 85 result = fcc->nt_status; 128 fcc->nt_status = result;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/examples/pdb/ |
H A D | test.c | 109 NTSTATUS nt_status; local 111 if (!NT_STATUS_IS_OK(nt_status = make_pdb_methods(pdb_context->mem_ctx, pdb_method))) { 112 return nt_status;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | pdb_guest.c | 129 NTSTATUS nt_status; local 136 if (!NT_STATUS_IS_OK(nt_status = make_pdb_methods(pdb_context->mem_ctx, pdb_method))) { 137 return nt_status;
|
H A D | pdb_tdb.c | 341 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 348 return nt_status; 354 return nt_status; 359 return nt_status; 374 return nt_status; 393 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 402 return nt_status; 431 nt_status = NT_STATUS_NO_SUCH_USER; 432 return nt_status; 435 return nt_status; 469 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 524 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; local 722 NTSTATUS nt_status; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/libads/ |
H A D | ads_status.c | 49 NTSTATUS nt_status) 60 ret.err.nt_status = nt_status; 73 return status.err.nt_status; 48 ads_build_nt_error(enum ads_error_type etype, NTSTATUS nt_status) argument
|