{
struct cli_pipe_auth_data *result;
+ *presult = NULL;
+
result = talloc(mem_ctx, struct cli_pipe_auth_data);
if (result == NULL) {
return NT_STATUS_NO_MEMORY;
struct cli_pipe_auth_data *result;
NTSTATUS status;
+ *presult = NULL;
+
result = talloc(mem_ctx, struct cli_pipe_auth_data);
if (result == NULL) {
return NT_STATUS_NO_MEMORY;
{
struct cli_pipe_auth_data *result;
+ *presult = NULL;
+
result = talloc(mem_ctx, struct cli_pipe_auth_data);
if (result == NULL) {
return NT_STATUS_NO_MEMORY;
#ifdef HAVE_KRB5
struct cli_pipe_auth_data *result;
+ *presult = NULL;
+
if ((username != NULL) && (password != NULL)) {
int ret = kerberos_kinit_password(username, password, 0, NULL);
if (ret != 0) {
TALLOC_FREE(result);
return NT_STATUS_NO_MEMORY;
#else
+ *presult = NULL;
return NT_STATUS_NOT_SUPPORTED;
#endif
}
NTSTATUS status;
int fd;
+ *presult = NULL;
+
result = TALLOC_ZERO_P(mem_ctx, struct rpc_pipe_client);
if (result == NULL) {
return NT_STATUS_NO_MEMORY;
NTSTATUS status;
int fd;
+ *presult = NULL;
+
result = talloc_zero(mem_ctx, struct rpc_pipe_client);
if (result == NULL) {
return NT_STATUS_NO_MEMORY;
struct rpc_pipe_client *result;
NTSTATUS status;
+ *presult = NULL;
+
/* sanity check to protect against crashes */
if ( !cli ) {
struct cli_pipe_auth_data *auth;
NTSTATUS status;
+ *presult = NULL;
+
result = talloc(mem_ctx, struct rpc_pipe_client);
if (result == NULL) {
return NT_STATUS_NO_MEMORY;
const struct ndr_syntax_id *interface,
struct rpc_pipe_client **presult)
{
+ *presult = NULL;
+
switch (transport) {
case NCACN_IP_TCP:
return rpc_pipe_open_tcp(NULL, cli->desthost, interface,
struct cli_pipe_auth_data *auth;
NTSTATUS status;
+ *presult = NULL;
+
status = cli_rpc_pipe_open(cli, transport, interface, &result);
if (!NT_STATUS_IS_OK(status)) {
return status;
const struct ndr_syntax_id *interface,
struct rpc_pipe_client **presult)
{
+ *presult = NULL;
+
return cli_rpc_pipe_open_noauth_transport(cli, NCACN_NP,
interface, presult);
}
struct cli_pipe_auth_data *auth;
NTSTATUS status;
+ *presult = NULL;
+
status = cli_rpc_pipe_open(cli, transport, interface, &result);
if (!NT_STATUS_IS_OK(status)) {
return status;
const char *password,
struct rpc_pipe_client **presult)
{
+ *presult = NULL;
+
return cli_rpc_pipe_open_ntlmssp_internal(cli,
interface,
transport,
const char *password,
struct rpc_pipe_client **presult)
{
+ *presult = NULL;
+
return cli_rpc_pipe_open_ntlmssp_internal(cli,
interface,
transport,
struct rpc_pipe_client *netlogon_pipe = NULL;
NTSTATUS status;
+ *presult = NULL;
+
status = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon.syntax_id,
&netlogon_pipe);
if (!NT_STATUS_IS_OK(status)) {
struct cli_pipe_auth_data *auth;
NTSTATUS status;
+ *presult = NULL;
+
status = cli_rpc_pipe_open(cli, transport, interface, &result);
if (!NT_STATUS_IS_OK(status)) {
return status;
struct rpc_pipe_client *netlogon_pipe = NULL;
NTSTATUS status;
+ *presult = NULL;
+
status = cli_rpc_pipe_open_spnego_ntlmssp(
cli, &ndr_table_netlogon.syntax_id, NCACN_NP,
DCERPC_AUTH_LEVEL_PRIVACY,
struct rpc_pipe_client *result = NULL;
NTSTATUS status;
+ *presult = NULL;
+
status = get_schannel_session_key_auth_ntlmssp(
cli, domain, username, password, &neg_flags, &netlogon_pipe);
if (!NT_STATUS_IS_OK(status)) {
struct cli_pipe_auth_data *auth;
NTSTATUS status;
+ *presult = NULL;
+
status = cli_rpc_pipe_open(cli, NCACN_NP, interface, &result);
if (!NT_STATUS_IS_OK(status)) {
return status;
*presult = result;
return NT_STATUS_OK;
#else
+ *presult = NULL;
DEBUG(0,("cli_rpc_pipe_open_krb5: kerberos not found at compile time.\n"));
return NT_STATUS_NOT_IMPLEMENTED;
#endif