Lines Matching refs:status
50 SECURITY_STATUS status,
53 if(status != SEC_E_OK &&
54 status != SEC_I_COMPLETE_AND_CONTINUE &&
55 status != SEC_I_COMPLETE_NEEDED &&
56 status != SEC_I_CONTINUE_NEEDED) {
59 Curl_sspi_strerror(status, buffer, sizeof(buffer)));
76 SECURITY_STATUS status;
142 status = s_pSecFn->AcquireCredentialsHandle(NULL,
152 if(check_sspi_err(data, status, "AcquireCredentialsHandle")) {
170 status = s_pSecFn->InitializeSecurityContext(&cred_handle,
194 if(check_sspi_err(data, status, "InitializeSecurityContext")) {
252 if(status != SEC_I_CONTINUE_NEEDED)
275 if(socksreq[1] == 255) { /* status / message type */
284 if(socksreq[1] != 1) { /* status / message type */
324 status = s_pSecFn->QueryCredentialsAttributes(&cred_handle,
328 if(check_sspi_err(data, status, "QueryCredentialAttributes")) {
396 status = s_pSecFn->QueryContextAttributes(&sspi_context,
399 if(check_sspi_err(data, status, "QueryContextAttributes")) {
432 status = s_pSecFn->EncryptMessage(&sspi_context,
436 if(check_sspi_err(data, status, "EncryptMessage")) {
520 if(socksreq[1] == 255) { /* status / message type */
527 if(socksreq[1] != 2) { /* status / message type */
562 status = s_pSecFn->DecryptMessage(&sspi_context,
567 if(check_sspi_err(data, status, "DecryptMessage")) {