Lines Matching full:status

127     DWORD status = 0;  in alloc_token_user()  local
132 if (size == 0) status = GetLastError(); in alloc_token_user()
134 if (!status) { in alloc_token_user()
136 status = GetLastError(); in alloc_token_user()
139 if (!status) { in alloc_token_user()
141 status = GetLastError(); in alloc_token_user()
144 if (status && *pptu) { in alloc_token_user()
147 return status; in alloc_token_user()
157 DWORD status = 0; in alloc_username() local
168 if ((name_len == 0) || (domain_len == 0)) status = GetLastError(); in alloc_username()
170 if (!status) { in alloc_username()
171 if (!(name = (LPSTR)malloc_alloc_p(name_len))) status = GetLastError(); in alloc_username()
174 if (!status) { in alloc_username()
175 if (!(domain = (LPSTR)malloc_alloc_p(domain_len))) status = GetLastError(); in alloc_username()
178 if (!status) { in alloc_username()
179 …if (!LookupAccountSidA(NULL, Sid, name, &name_len, domain, &domain_len, &snu)) status = GetLastErr… in alloc_username()
182 if (status) { in alloc_username()
194 if (!*pname) status = GetLastError(); in alloc_username()
198 return status; in alloc_username()
227 DWORD status = 0; in alloc_name_NT() local
247 status = SecureClient::Token(hToken); in alloc_name_NT()
249 if (!status) { in alloc_name_NT()
250 status = get_authentication_id(hToken, &auth_id); in alloc_name_NT()
253 if (!status) { in alloc_name_NT()
259 if (!status) {status = alloc_token_user(hToken, &ptu);} in alloc_name_NT()
260 if (!status) {status = alloc_username(ptu->User.Sid, &name, &domain);} in alloc_name_NT()
261 if (!status) {status = alloc_textual_sid(ptu->User.Sid, &sid);} in alloc_name_NT()
264 if (!status) { in alloc_name_NT()
270 if (!*pname) status = GetLastError(); in alloc_name_NT()
283 if (!status) { in alloc_name_NT()
299 if (status && *pname) in alloc_name_NT()
301 return status; in alloc_name_NT()
310 DWORD status = 0; in alloc_own_security_descriptor_NT() local
320 if (!status) {status = SecureClient::Token(hToken);} in alloc_own_security_descriptor_NT()
323 if (!status) {status = alloc_token_user(hToken, &ptu);} in alloc_own_security_descriptor_NT()
325 if (!status) { in alloc_own_security_descriptor_NT()
328 if (!pSid) status = GetLastError(); in alloc_own_security_descriptor_NT()
330 if (!status) { in alloc_own_security_descriptor_NT()
331 if (!CopySid(size, pSid, ptu->User.Sid)) status = GetLastError(); in alloc_own_security_descriptor_NT()
334 if (!status) { in alloc_own_security_descriptor_NT()
340 if (!pAcl) status = GetLastError(); in alloc_own_security_descriptor_NT()
343 if (!status) { in alloc_own_security_descriptor_NT()
344 if (!InitializeAcl(pAcl, size, ACL_REVISION)) status = GetLastError(); in alloc_own_security_descriptor_NT()
347 if (!status) { in alloc_own_security_descriptor_NT()
348 if (!AddAccessAllowedAce(pAcl, ACL_REVISION, GENERIC_ALL, pSid)) status = GetLastError(); in alloc_own_security_descriptor_NT()
351 if (!status) { in alloc_own_security_descriptor_NT()
353 … if (!InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION)) status = GetLastError(); in alloc_own_security_descriptor_NT()
356 if (!status) { in alloc_own_security_descriptor_NT()
357 if (!SetSecurityDescriptorDacl(&sd, TRUE, pAcl, FALSE)) status = GetLastError(); in alloc_own_security_descriptor_NT()
360 if (!status) { in alloc_own_security_descriptor_NT()
361 if (!SetSecurityDescriptorOwner(&sd, pSid, FALSE)) status = GetLastError(); in alloc_own_security_descriptor_NT()
364 if (!status) { in alloc_own_security_descriptor_NT()
365 if (!IsValidSecurityDescriptor(&sd)) status = ERROR_INVALID_PARAMETER; in alloc_own_security_descriptor_NT()
368 if (!status) { in alloc_own_security_descriptor_NT()
374 if (size == 0) status = GetLastError(); in alloc_own_security_descriptor_NT()
377 if (!status) { in alloc_own_security_descriptor_NT()
379 if (!*ppsd) status = GetLastError(); in alloc_own_security_descriptor_NT()
382 if (!status) { in alloc_own_security_descriptor_NT()
383 if (!MakeSelfRelativeSD(&sd, *ppsd, &size)) status = GetLastError(); in alloc_own_security_descriptor_NT()
390 if (status && *ppsd) free_alloc_p(ppsd); in alloc_own_security_descriptor_NT()
391 return status; in alloc_own_security_descriptor_NT()
401 DWORD status = 0; in alloc_module_file_name() local
417 while (!status && !ok) { in alloc_module_file_name()
420 status = ERROR_INVALID_DATA; in alloc_module_file_name()
426 status = ERROR_NOT_ENOUGH_MEMORY; in alloc_module_file_name()
432 status = GetLastError(); in alloc_module_file_name()
434 if (!status) { in alloc_module_file_name()
436 status = ERROR_INVALID_DATA; in alloc_module_file_name()
445 if (status && name) in alloc_module_file_name()
449 return status; in alloc_module_file_name()
458 DWORD status = alloc_module_file_name(module, pname); in alloc_module_dir_name() local
459 if (!status) { in alloc_module_dir_name()
465 status = ERROR_INVALID_DATA; in alloc_module_dir_name()
470 return status; in alloc_module_dir_name()
480 DWORD status = alloc_module_dir_name(module, pname); in alloc_module_dir_name_with_file() local
481 if (!status) { in alloc_module_dir_name_with_file()
487 status = ERROR_NOT_ENOUGH_MEMORY; in alloc_module_dir_name_with_file()
497 return status; in alloc_module_dir_name_with_file()
504 DWORD status = 0; in alloc_cmdline_2_args() local
508 status = ERROR_NOT_ENOUGH_MEMORY; in alloc_cmdline_2_args()
519 return status; in alloc_cmdline_2_args()