nt_status         701 examples/pcap2nbench/main.cpp 		  << NT_STATUS(j->smb_hdr.nt_status) << std::endl;
nt_status         712 examples/pcap2nbench/main.cpp 		    << NT_STATUS(j->smb_hdr.nt_status) << std::endl;
nt_status         723 examples/pcap2nbench/main.cpp 		    << NT_STATUS(j->smb_hdr.nt_status) << std::endl;
nt_status         729 examples/pcap2nbench/main.cpp 		    << NT_STATUS(j->smb_hdr.nt_status) << std::endl;
nt_status          38 examples/pcap2nbench/smb.cpp   memcpy(&nt_status, data + 9, 4);
nt_status          61 examples/pcap2nbench/smb.cpp       << "NT Status: " << rhs.nt_status << std::endl
nt_status          34 examples/pcap2nbench/smb.hpp   uint32_t nt_status;
nt_status         108 examples/pdb/test.c 	NTSTATUS nt_status;
nt_status         110 examples/pdb/test.c 	if (!NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method ))) {
nt_status         111 examples/pdb/test.c 		return nt_status;
nt_status         217 nsswitch/libwbclient/wbc_pam.c 	e->nt_status = resp->data.auth.nt_status;
nt_status         465 nsswitch/libwbclient/wbc_pam.c 	if (response.data.auth.nt_status != 0) {
nt_status         519 nsswitch/libwbclient/wbc_pam.c 	if (response.data.auth.nt_status != 0) {
nt_status         606 nsswitch/libwbclient/wbc_pam.c 	if (response.data.auth.nt_status != 0) {
nt_status         835 nsswitch/libwbclient/wbc_pam.c 	if (response.data.auth.nt_status != 0) {
nt_status        1000 nsswitch/libwbclient/wbc_pam.c 	if (response.data.auth.nt_status != 0) {
nt_status         397 nsswitch/libwbclient/wbclient.h 	uint32_t nt_status;
nt_status         712 nsswitch/wbinfo.c 			  error->nt_string, error->nt_status);
nt_status        1218 nsswitch/wbinfo.c 	if (response.data.auth.nt_status)
nt_status        1221 nsswitch/wbinfo.c 			 response.data.auth.nt_status,
nt_status        1272 nsswitch/wbinfo.c 	if (response.data.auth.nt_status)
nt_status        1275 nsswitch/wbinfo.c 			 response.data.auth.nt_status,
nt_status        1373 nsswitch/wbinfo.c 			 err->nt_status,
nt_status        1422 nsswitch/wbinfo.c 	if (response.data.auth.nt_status)
nt_status        1425 nsswitch/wbinfo.c 			 response.data.auth.nt_status,
nt_status         545 nsswitch/wbinfo4.c 			 response.data.auth.nt_status);
nt_status         755 nsswitch/wbinfo4.c 	if (response.data.auth.nt_status)
nt_status         758 nsswitch/wbinfo4.c 			 response.data.auth.nt_status,
nt_status         810 nsswitch/wbinfo4.c 	if (response.data.auth.nt_status)
nt_status         813 nsswitch/wbinfo4.c 			 response.data.auth.nt_status,
nt_status         917 nsswitch/wbinfo4.c 	if (response.data.auth.nt_status)
nt_status         920 nsswitch/wbinfo4.c 			 response.data.auth.nt_status,
nt_status         408 nsswitch/winbind_struct_protocol.h 			uint32_t nt_status;
nt_status         213 source3/auth/auth.c 	NTSTATUS nt_status = NT_STATUS_NO_SUCH_USER;
nt_status         267 source3/auth/auth.c 		nt_status = result;
nt_status         269 source3/auth/auth.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         274 source3/auth/auth.c 				  auth_method->name, user_info->smb_name, nt_errstr(nt_status)));
nt_status         279 source3/auth/auth.c 		if ( NT_STATUS_IS_OK(nt_status))
nt_status         287 source3/auth/auth.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         292 source3/auth/auth.c 			nt_status = smb_pam_accountcheck(unix_username);
nt_status         295 source3/auth/auth.c 			if (NT_STATUS_IS_OK(nt_status)) {
nt_status         300 source3/auth/auth.c 					  unix_username, nt_errstr(nt_status)));
nt_status         304 source3/auth/auth.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         313 source3/auth/auth.c 		return nt_status;
nt_status         320 source3/auth/auth.c 		  nt_errstr(nt_status)));
nt_status         323 source3/auth/auth.c 	return nt_status;
nt_status         433 source3/auth/auth.c 	NTSTATUS nt_status;
nt_status         440 source3/auth/auth.c 	if (!NT_STATUS_IS_OK(nt_status = make_auth_context(auth_context)))
nt_status         441 source3/auth/auth.c 		return nt_status;
nt_status         451 source3/auth/auth.c 	return nt_status;
nt_status         461 source3/auth/auth.c 	NTSTATUS nt_status;
nt_status         529 source3/auth/auth.c 	nt_status = make_auth_context_text_list(auth_context,
nt_status         533 source3/auth/auth.c 	return nt_status;
nt_status         542 source3/auth/auth.c 	NTSTATUS nt_status;
nt_status         543 source3/auth/auth.c 	if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(auth_context))) {
nt_status         544 source3/auth/auth.c 		return nt_status;
nt_status         549 source3/auth/auth.c 	return nt_status;
nt_status          41 source3/auth/auth_builtin.c 	NTSTATUS nt_status = NT_STATUS_NOT_IMPLEMENTED;
nt_status          45 source3/auth/auth_builtin.c 		nt_status = make_server_info_guest(NULL, server_info);
nt_status          48 source3/auth/auth_builtin.c 	return nt_status;
nt_status          83 source3/auth/auth_builtin.c 	NTSTATUS nt_status;
nt_status          98 source3/auth/auth_builtin.c 	nt_status = NT_STATUS(error_num);
nt_status         100 source3/auth/auth_builtin.c 	return nt_status;
nt_status          43 source3/auth/auth_compat.c 	NTSTATUS nt_status;
nt_status          44 source3/auth/auth_compat.c 	if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&plaintext_auth_context))) {
nt_status          45 source3/auth/auth_compat.c 		return nt_status;
nt_status          57 source3/auth/auth_compat.c 	nt_status = plaintext_auth_context->check_ntlm_password(plaintext_auth_context, 
nt_status          62 source3/auth/auth_compat.c 	return nt_status;
nt_status          73 source3/auth/auth_compat.c 	NTSTATUS nt_status;
nt_status          81 source3/auth/auth_compat.c 		nt_status = negprot_global_auth_context->check_ntlm_password(negprot_global_auth_context, 
nt_status          85 source3/auth/auth_compat.c 		nt_status = check_plaintext_password(smb_name, plaintext_password, &server_info);
nt_status          88 source3/auth/auth_compat.c 	return nt_status;
nt_status         264 source3/auth/auth_domain.c 	NTSTATUS nt_status = NT_STATUS_NO_LOGON_SERVERS;
nt_status         278 source3/auth/auth_domain.c 	for (i = 0; !NT_STATUS_IS_OK(nt_status) && retry && (i < 3); i++) {
nt_status         279 source3/auth/auth_domain.c 		nt_status = connect_to_domain_password_server(&cli,
nt_status         287 source3/auth/auth_domain.c 	if ( !NT_STATUS_IS_OK(nt_status) ) {
nt_status         289 source3/auth/auth_domain.c 		if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED)) {
nt_status         292 source3/auth/auth_domain.c 		return nt_status;
nt_status         304 source3/auth/auth_domain.c 	nt_status = rpccli_netlogon_sam_network_logon(netlogon_pipe,
nt_status         321 source3/auth/auth_domain.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         326 source3/auth/auth_domain.c                          nt_errstr(nt_status)));
nt_status         329 source3/auth/auth_domain.c 		if (NT_STATUS_EQUAL(nt_status, NT_STATUS_UNSUCCESSFUL)) {
nt_status         330 source3/auth/auth_domain.c 			nt_status = NT_STATUS_NO_LOGON_SERVERS;
nt_status         333 source3/auth/auth_domain.c 		nt_status = make_server_info_info3(mem_ctx,
nt_status         339 source3/auth/auth_domain.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         345 source3/auth/auth_domain.c 				nt_status = smb_pam_accountcheck((*server_info)->unix_name);
nt_status         346 source3/auth/auth_domain.c 				if (  !NT_STATUS_IS_OK(nt_status)) {
nt_status         350 source3/auth/auth_domain.c 					return nt_status;
nt_status         364 source3/auth/auth_domain.c 	return nt_status;
nt_status         377 source3/auth/auth_domain.c 	NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE;
nt_status         412 source3/auth/auth_domain.c 	nt_status = domain_client_validate(mem_ctx,
nt_status         420 source3/auth/auth_domain.c 	return nt_status;
nt_status         446 source3/auth/auth_domain.c 	NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE;
nt_status         514 source3/auth/auth_domain.c 	nt_status = domain_client_validate(mem_ctx,
nt_status         522 source3/auth/auth_domain.c 	return nt_status;
nt_status          87 source3/auth/auth_ntlmssp.c 	NTSTATUS nt_status;
nt_status         101 source3/auth/auth_ntlmssp.c 	nt_status = make_user_info_map(&user_info, 
nt_status         112 source3/auth/auth_ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         113 source3/auth/auth_ntlmssp.c 		return nt_status;
nt_status         116 source3/auth/auth_ntlmssp.c 	nt_status = auth_ntlmssp_state->auth_context->check_ntlm_password(auth_ntlmssp_state->auth_context, 
nt_status         123 source3/auth/auth_ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         124 source3/auth/auth_ntlmssp.c 		return nt_status;
nt_status         129 source3/auth/auth_ntlmssp.c 	nt_status = create_local_token(auth_ntlmssp_state->server_info);
nt_status         131 source3/auth/auth_ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         133 source3/auth/auth_ntlmssp.c 			nt_errstr(nt_status)));
nt_status         134 source3/auth/auth_ntlmssp.c 		return nt_status;
nt_status         151 source3/auth/auth_ntlmssp.c 	return nt_status;
nt_status         156 source3/auth/auth_ntlmssp.c 	NTSTATUS nt_status;
nt_status         172 source3/auth/auth_ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_server_start(&(*auth_ntlmssp_state)->ntlmssp_state))) {
nt_status         173 source3/auth/auth_ntlmssp.c 		return nt_status;
nt_status         176 source3/auth/auth_ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&(*auth_ntlmssp_state)->auth_context))) {
nt_status         177 source3/auth/auth_ntlmssp.c 		return nt_status;
nt_status         257 source3/auth/auth_sam.c 	NTSTATUS nt_status;
nt_status         296 source3/auth/auth_sam.c 	nt_status = sam_password_ok(auth_context, mem_ctx, sampass, 
nt_status         302 source3/auth/auth_sam.c 	update_login_attempts_status = pdb_update_login_attempts(sampass, NT_STATUS_IS_OK(nt_status));
nt_status         304 source3/auth/auth_sam.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         305 source3/auth/auth_sam.c 		if (NT_STATUS_EQUAL(nt_status,NT_STATUS_WRONG_PASSWORD) && 
nt_status         324 source3/auth/auth_sam.c 		return nt_status;
nt_status         341 source3/auth/auth_sam.c 	nt_status = sam_account_ok(mem_ctx, sampass, user_info);
nt_status         343 source3/auth/auth_sam.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         347 source3/auth/auth_sam.c 		return nt_status;
nt_status         351 source3/auth/auth_sam.c 	nt_status = make_server_info_sam(server_info, sampass);
nt_status         354 source3/auth/auth_sam.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         355 source3/auth/auth_sam.c 		DEBUG(0,("check_sam_security: make_server_info_sam() failed with '%s'\n", nt_errstr(nt_status)));
nt_status         358 source3/auth/auth_sam.c 		return nt_status;
nt_status         373 source3/auth/auth_sam.c 	return nt_status;
nt_status         281 source3/auth/auth_server.c 	NTSTATUS nt_status = NT_STATUS_NOT_IMPLEMENTED;
nt_status         395 source3/auth/auth_server.c 		nt_status = cli_session_setup(
nt_status         402 source3/auth/auth_server.c 		nt_status = cli_session_setup(
nt_status         411 source3/auth/auth_server.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         413 source3/auth/auth_server.c 			 cli->desthost, nt_errstr(nt_status)));
nt_status         419 source3/auth/auth_server.c 		nt_status = NT_STATUS_LOGON_FAILURE;
nt_status         424 source3/auth/auth_server.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         433 source3/auth/auth_server.c 			nt_status = smb_pam_accountcheck(pass->pw_name);
nt_status         434 source3/auth/auth_server.c 			if (  !NT_STATUS_IS_OK(nt_status)) {
nt_status         438 source3/auth/auth_server.c 				nt_status = make_server_info_pw(server_info, pass->pw_name, pass);
nt_status         444 source3/auth/auth_server.c 			nt_status = NT_STATUS_NO_SUCH_USER;
nt_status         452 source3/auth/auth_server.c 	return(nt_status);
nt_status          91 source3/auth/auth_unix.c 	NTSTATUS nt_status;
nt_status         100 source3/auth/auth_unix.c 	nt_status = pass_check(pass,
nt_status         110 source3/auth/auth_unix.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         114 source3/auth/auth_unix.c 			nt_status = smb_pam_accountcheck(pass->pw_name);
nt_status         115 source3/auth/auth_unix.c 			if (  !NT_STATUS_IS_OK(nt_status)) {
nt_status         122 source3/auth/auth_unix.c 			nt_status = NT_STATUS_NO_SUCH_USER;
nt_status         127 source3/auth/auth_unix.c 	return nt_status;
nt_status         352 source3/auth/auth_util.c 		NTSTATUS nt_status;
nt_status         375 source3/auth/auth_util.c 		nt_status = make_user_info_map(
nt_status         384 source3/auth/auth_util.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         388 source3/auth/auth_util.c 		ret = NT_STATUS_IS_OK(nt_status) ? True : False;
nt_status         480 source3/auth/auth_util.c 	NTSTATUS nt_status;
nt_status         482 source3/auth/auth_util.c 	nt_status = make_user_info(user_info, 
nt_status         491 source3/auth/auth_util.c 	return NT_STATUS_IS_OK(nt_status) ? True : False;
nt_status        1488 source3/auth/auth_util.c 	NTSTATUS nt_status;
nt_status        1519 source3/auth/auth_util.c 	nt_status = samu_set_unix( account, passwd );
nt_status        1523 source3/auth/auth_util.c 	return nt_status;
nt_status        1623 source3/auth/auth_util.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status        1685 source3/auth/auth_util.c 	nt_status = fill_sam_account(mem_ctx, nt_domain, sent_nt_username,
nt_status        1693 source3/auth/auth_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1699 source3/auth/auth_util.c 		return nt_status;
nt_status        1821 source3/auth/auth_util.c 	nt_status = sid_array_from_info3(result, info3,
nt_status        1825 source3/auth/auth_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1827 source3/auth/auth_util.c 		return nt_status;
nt_status        1875 source3/auth/auth_util.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status        1948 source3/auth/auth_util.c 	nt_status = fill_sam_account(result, nt_domain, sent_nt_username,
nt_status        1955 source3/auth/auth_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1961 source3/auth/auth_util.c 		return nt_status;
nt_status          53 source3/auth/auth_wbc.c 	NTSTATUS nt_status;
nt_status         109 source3/auth/auth_wbc.c 		nt_status = NT_STATUS(err->nt_status);
nt_status         111 source3/auth/auth_wbc.c 		return nt_status;
nt_status         120 source3/auth/auth_wbc.c 	nt_status = make_server_info_wbcAuthUserInfo(mem_ctx,
nt_status         125 source3/auth/auth_wbc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         126 source3/auth/auth_wbc.c 		return nt_status;
nt_status         131 source3/auth/auth_wbc.c         return nt_status;
nt_status          36 source3/auth/auth_winbind.c 	NTSTATUS nt_status;
nt_status         105 source3/auth/auth_winbind.c 		nt_status = NT_STATUS(err->nt_status);
nt_status         107 source3/auth/auth_winbind.c 		return nt_status;
nt_status         114 source3/auth/auth_winbind.c 	nt_status = make_server_info_wbcAuthUserInfo(mem_ctx,
nt_status         119 source3/auth/auth_winbind.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         120 source3/auth/auth_winbind.c 		return nt_status;
nt_status         125 source3/auth/auth_winbind.c         return nt_status;
nt_status          91 source3/auth/pampass.c 					    NTSTATUS *nt_status)
nt_status          93 source3/auth/pampass.c 	*nt_status = pam_to_nt_status(pam_error);
nt_status          98 source3/auth/pampass.c 	if (NT_STATUS_IS_OK(*nt_status)) {
nt_status         102 source3/auth/pampass.c 		*nt_status = NT_STATUS_LOGON_FAILURE;
nt_status         516 source3/auth/pampass.c 	NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE;
nt_status         552 source3/auth/pampass.c 	smb_pam_nt_status_error_handler(pamh, pam_error, "Authentication Failure", 2, &nt_status);
nt_status         553 source3/auth/pampass.c 	return nt_status;
nt_status         562 source3/auth/pampass.c 	NTSTATUS nt_status = NT_STATUS_ACCOUNT_DISABLED;
nt_status         590 source3/auth/pampass.c 	smb_pam_nt_status_error_handler(pamh, pam_error, "Account Check Failed", 2, &nt_status);
nt_status         591 source3/auth/pampass.c 	return nt_status;
nt_status         601 source3/auth/pampass.c 	NTSTATUS nt_status = NT_STATUS_NO_TOKEN;
nt_status         631 source3/auth/pampass.c 	smb_pam_nt_status_error_handler(pamh, pam_error, "Set Credential Failure", 2, &nt_status);
nt_status         632 source3/auth/pampass.c 	return nt_status;
nt_status         778 source3/auth/pampass.c 	NTSTATUS nt_status = NT_STATUS_ACCOUNT_DISABLED;
nt_status         793 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user)))
nt_status         797 source3/auth/pampass.c 	return nt_status;
nt_status         807 source3/auth/pampass.c 	NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE;
nt_status         822 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_auth(pamh, user))) {
nt_status         825 source3/auth/pampass.c 		return nt_status;
nt_status         828 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) {
nt_status         831 source3/auth/pampass.c 		return nt_status;
nt_status         834 source3/auth/pampass.c 	if (!NT_STATUS_IS_OK(nt_status = smb_pam_setcred(pamh, user))) {
nt_status         837 source3/auth/pampass.c 		return nt_status;
nt_status         841 source3/auth/pampass.c 	return nt_status;
nt_status         500 source3/auth/pass_check.c 	NTSTATUS nt_status;
nt_status         514 source3/auth/pass_check.c 		if (!NT_STATUS_EQUAL(nt_status = string_combinations2(s, i + 1, fn, N - 1),NT_STATUS_WRONG_PASSWORD)) {
nt_status         515 source3/auth/pass_check.c 			return (nt_status);
nt_status         532 source3/auth/pass_check.c 	NTSTATUS nt_status;
nt_status         534 source3/auth/pass_check.c 		if (!NT_STATUS_EQUAL(nt_status = string_combinations2(s, 0, fn, n), NT_STATUS_WRONG_PASSWORD))
nt_status         535 source3/auth/pass_check.c 			return nt_status;
nt_status         656 source3/auth/pass_check.c 	NTSTATUS nt_status;
nt_status         821 source3/auth/pass_check.c 	nt_status = password_check(password);
nt_status         822 source3/auth/pass_check.c         if NT_STATUS_IS_OK(nt_status) {
nt_status         826 source3/auth/pass_check.c 		return (nt_status);
nt_status         827 source3/auth/pass_check.c 	} else if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD)) {
nt_status         829 source3/auth/pass_check.c                 return (nt_status);
nt_status         833 source3/auth/pass_check.c 		return (nt_status);
nt_status         840 source3/auth/pass_check.c 		return nt_status;
nt_status         852 source3/auth/pass_check.c 		if NT_STATUS_IS_OK(nt_status = password_check(pass2)) {
nt_status         855 source3/auth/pass_check.c 			return (nt_status);
nt_status         867 source3/auth/pass_check.c         if (NT_STATUS_IS_OK(nt_status = string_combinations(pass2, password_check, level))) {
nt_status         870 source3/auth/pass_check.c 		return nt_status;
nt_status          58 source3/client/smbspool.c static int      get_exit_code(struct cli_state * cli, NTSTATUS nt_status);
nt_status         323 source3/client/smbspool.c 	      NTSTATUS nt_status)
nt_status         342 source3/client/smbspool.c 		cli, NT_STATUS_V(nt_status));
nt_status         345 source3/client/smbspool.c 		if (!NT_STATUS_EQUAL(nt_status, auth_errors[i])) {
nt_status         399 source3/client/smbspool.c 	NTSTATUS        nt_status;
nt_status         403 source3/client/smbspool.c 	nt_status = cli_start_connection(&cli, myname, server, NULL, port,
nt_status         405 source3/client/smbspool.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         406 source3/client/smbspool.c 		fprintf(stderr, "ERROR: Connection failed: %s\n", nt_errstr(nt_status));
nt_status         419 source3/client/smbspool.c 	nt_status = cli_session_setup(cli, username,
nt_status         423 source3/client/smbspool.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         424 source3/client/smbspool.c 		fprintf(stderr, "ERROR: Session setup failed: %s\n", nt_errstr(nt_status));
nt_status         426 source3/client/smbspool.c 		if (get_exit_code(cli, nt_status) == 2) {
nt_status         435 source3/client/smbspool.c 	nt_status = cli_tcon_andx(cli, share, "?????", password,
nt_status         437 source3/client/smbspool.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         439 source3/client/smbspool.c 			nt_errstr(nt_status));
nt_status         441 source3/client/smbspool.c 		if (get_exit_code(cli, nt_status) == 2) {
nt_status          26 source3/include/ads.h 		NTSTATUS nt_status;
nt_status         154 source3/include/ads.h #define ADS_ERR_OK(status) ((status.error_type == ENUM_ADS_ERROR_NT) ? NT_STATUS_IS_OK(status.err.nt_status):(status.err.rc == 0))
nt_status         100 source3/include/auth.h 	NTSTATUS (*nt_status_squash)(NTSTATUS nt_status);
nt_status         995 source3/include/includes.h krb5_error_code nt_status_to_krb5(NTSTATUS nt_status);
nt_status         582 source3/include/proto.h int nt_status_to_pam(NTSTATUS nt_status);
nt_status         584 source3/include/proto.h int nt_status_to_pam(NTSTATUS nt_status);
nt_status        1663 source3/include/proto.h 			   NTSTATUS nt_status);
nt_status        2826 source3/include/proto.h DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status,
nt_status        2828 source3/include/proto.h bool spnego_parse_auth_response(DATA_BLOB blob, NTSTATUS nt_status,
nt_status        3085 source3/include/proto.h NTSTATUS nt_status_squash(NTSTATUS nt_status);
nt_status         106 source3/lib/pam_errors.c int nt_status_to_pam(NTSTATUS nt_status)
nt_status         109 source3/lib/pam_errors.c 	if NT_STATUS_IS_OK(nt_status) return PAM_SUCCESS;
nt_status         112 source3/lib/pam_errors.c 		if (NT_STATUS_EQUAL(nt_status,nt_status_to_pam_map[i].ntstatus))
nt_status         132 source3/lib/pam_errors.c int nt_status_to_pam(NTSTATUS nt_status)
nt_status         134 source3/lib/pam_errors.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_OK)) return 0;
nt_status          48 source3/libads/ads_status.c 			   NTSTATUS nt_status)
nt_status          59 source3/libads/ads_status.c 	ret.err.nt_status = nt_status;
nt_status          73 source3/libads/ads_status.c 		return status.err.nt_status;	
nt_status          60 source3/libads/kerberos.c 						   NTSTATUS *nt_status)
nt_status         103 source3/libads/kerberos.c 	if (nt_status) {
nt_status         104 source3/libads/kerberos.c 		*nt_status = parsed_edata.ntstatus;
nt_status         114 source3/libads/kerberos.c 								  NTSTATUS *nt_status)
nt_status         143 source3/libads/kerberos.c 	ret = smb_krb5_get_ntstatus_from_krb5_error(error, nt_status);
nt_status          97 source3/libads/krb5_errs.c  krb5_error_code nt_status_to_krb5(NTSTATUS nt_status)
nt_status         101 source3/libads/krb5_errs.c 	if NT_STATUS_IS_OK(nt_status) {
nt_status         106 source3/libads/krb5_errs.c 		if (NT_STATUS_EQUAL(nt_status,nt_status_to_krb5_map[i].ntstatus))
nt_status         443 source3/libads/ldap.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         459 source3/libads/ldap.c 	nt_status = ads_ntstatus(ads_status);
nt_status         465 source3/libads/ldap.c 	return nt_status;
nt_status         500 source3/libads/ldap.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         522 source3/libads/ldap.c 		nt_status = ads_dns_query_gcs(frame, realm, sitename,
nt_status         527 source3/libads/ldap.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         528 source3/libads/ldap.c 			ads_status = ADS_ERROR_NT(nt_status);
nt_status          29 source3/libads/sasl.c 	NTSTATUS nt_status;
nt_status          38 source3/libads/sasl.c 		nt_status = ntlmssp_seal_packet(ntlmssp_state,
nt_status          43 source3/libads/sasl.c 		nt_status = ntlmssp_sign_packet(ntlmssp_state,
nt_status          48 source3/libads/sasl.c 	status = ADS_ERROR_NT(nt_status);
nt_status          68 source3/libads/sasl.c 	NTSTATUS nt_status;
nt_status          78 source3/libads/sasl.c 		nt_status = ntlmssp_unseal_packet(ntlmssp_state,
nt_status          83 source3/libads/sasl.c 		nt_status = ntlmssp_check_packet(ntlmssp_state,
nt_status          88 source3/libads/sasl.c 	status = ADS_ERROR_NT(nt_status);
nt_status         128 source3/libads/sasl.c 	NTSTATUS nt_status;
nt_status         135 source3/libads/sasl.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_client_start(&ntlmssp_state))) {
nt_status         136 source3/libads/sasl.c 		return ADS_ERROR_NT(nt_status);
nt_status         140 source3/libads/sasl.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, ads->auth.user_name))) {
nt_status         141 source3/libads/sasl.c 		return ADS_ERROR_NT(nt_status);
nt_status         143 source3/libads/sasl.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, ads->auth.realm))) {
nt_status         144 source3/libads/sasl.c 		return ADS_ERROR_NT(nt_status);
nt_status         146 source3/libads/sasl.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) {
nt_status         147 source3/libads/sasl.c 		return ADS_ERROR_NT(nt_status);
nt_status         175 source3/libads/sasl.c 		nt_status = ntlmssp_update(ntlmssp_state, 
nt_status         178 source3/libads/sasl.c 		if ((NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) 
nt_status         179 source3/libads/sasl.c 		     || NT_STATUS_IS_OK(nt_status))
nt_status         215 source3/libads/sasl.c 			return ADS_ERROR_NT(nt_status);
nt_status         232 source3/libads/sasl.c 			if (!spnego_parse_auth_response(blob, nt_status, OID_NTLMSSP, 
nt_status         244 source3/libads/sasl.c 	} while (rc == LDAP_SASL_BIND_IN_PROGRESS && !NT_STATUS_IS_OK(nt_status));
nt_status         591 source3/libnet/libnet_samsync_passdb.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         621 source3/libnet/libnet_samsync_passdb.c 		return nt_status;
nt_status         625 source3/libnet/libnet_samsync_passdb.c 		return nt_status;
nt_status         628 source3/libnet/libnet_samsync_passdb.c 		return nt_status;
nt_status         631 source3/libnet/libnet_samsync_passdb.c 		return nt_status;
nt_status         634 source3/libnet/libnet_samsync_passdb.c 		return nt_status;
nt_status         644 source3/libnet/libnet_samsync_passdb.c 			return nt_status;
nt_status         647 source3/libnet/libnet_samsync_passdb.c 			return nt_status;
nt_status         653 source3/libnet/libnet_samsync_passdb.c 			return nt_status;
nt_status         658 source3/libnet/libnet_samsync_passdb.c 		return nt_status;
nt_status         138 source3/librpc/rpc/dcerpc.c 	NTSTATUS nt_status;
nt_status         140 source3/librpc/rpc/dcerpc.c 	nt_status = dcerpc_parse_binding(p, binding_string, &binding);
nt_status         142 source3/librpc/rpc/dcerpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status         145 source3/librpc/rpc/dcerpc.c 		return nt_status;
nt_status         158 source3/librpc/rpc/dcerpc.c 	nt_status = cli_full_connection(&p->cli, global_myname(), binding->host,
nt_status         167 source3/librpc/rpc/dcerpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status         169 source3/librpc/rpc/dcerpc.c 		return nt_status;
nt_status         172 source3/librpc/rpc/dcerpc.c 	nt_status = cli_rpc_pipe_open_noauth(p->cli, &table->syntax_id,
nt_status         175 source3/librpc/rpc/dcerpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         177 source3/librpc/rpc/dcerpc.c 		return nt_status;
nt_status         184 source3/librpc/rpc/dcerpc.c 	return nt_status;
nt_status         733 source3/libsmb/cliconnect.c 	NTSTATUS nt_status;
nt_status         754 source3/libsmb/cliconnect.c 		nt_status = cli_nt_error(cli);
nt_status         759 source3/libsmb/cliconnect.c 		nt_status = cli_nt_error(cli);
nt_status         760 source3/libsmb/cliconnect.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         761 source3/libsmb/cliconnect.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         776 source3/libsmb/cliconnect.c 			nt_status = NT_STATUS_ACCESS_DENIED;
nt_status         790 source3/libsmb/cliconnect.c 	return ADS_ERROR_NT(nt_status);
nt_status         803 source3/libsmb/cliconnect.c 	NTSTATUS nt_status;
nt_status         812 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_client_start(&ntlmssp_state))) {
nt_status         813 source3/libsmb/cliconnect.c 		return nt_status;
nt_status         817 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) {
nt_status         818 source3/libsmb/cliconnect.c 		return nt_status;
nt_status         820 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, domain))) {
nt_status         821 source3/libsmb/cliconnect.c 		return nt_status;
nt_status         823 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, pass))) {
nt_status         824 source3/libsmb/cliconnect.c 		return nt_status;
nt_status         828 source3/libsmb/cliconnect.c 		nt_status = ntlmssp_update(ntlmssp_state, 
nt_status         831 source3/libsmb/cliconnect.c 		if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) || NT_STATUS_IS_OK(nt_status)) {
nt_status         843 source3/libsmb/cliconnect.c 				nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         847 source3/libsmb/cliconnect.c 				nt_status = cli_nt_error(cli);
nt_status         848 source3/libsmb/cliconnect.c 				if (cli_is_error(cli) && NT_STATUS_IS_OK(nt_status)) {
nt_status         850 source3/libsmb/cliconnect.c 						nt_status = NT_STATUS_ACCESS_DENIED;
nt_status         852 source3/libsmb/cliconnect.c 						nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         860 source3/libsmb/cliconnect.c 			if (NT_STATUS_IS_OK(nt_status)) {
nt_status         861 source3/libsmb/cliconnect.c 				nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         864 source3/libsmb/cliconnect.c 			   NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         870 source3/libsmb/cliconnect.c 				nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         874 source3/libsmb/cliconnect.c 			if (!spnego_parse_auth_response(blob, nt_status, OID_NTLMSSP, 
nt_status         877 source3/libsmb/cliconnect.c 				if (NT_STATUS_IS_OK(nt_status) 
nt_status         878 source3/libsmb/cliconnect.c 				    || NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) 
nt_status         879 source3/libsmb/cliconnect.c 					nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         885 source3/libsmb/cliconnect.c 	} while (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED));
nt_status         889 source3/libsmb/cliconnect.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         904 source3/libsmb/cliconnect.c 				nt_status = NT_STATUS_ACCESS_DENIED;
nt_status         914 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         917 source3/libsmb/cliconnect.c 	return nt_status;
nt_status        2001 source3/libsmb/cliconnect.c 	NTSTATUS nt_status;
nt_status        2033 source3/libsmb/cliconnect.c 	nt_status = cli_connect(cli, dest_host, &ss);
nt_status        2034 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2038 source3/libsmb/cliconnect.c 			 nmb_namestr(&called), addr, nt_errstr(nt_status) ));
nt_status        2040 source3/libsmb/cliconnect.c 		return nt_status;
nt_status        2071 source3/libsmb/cliconnect.c 	nt_status = cli_negprot(cli);
nt_status        2072 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2073 source3/libsmb/cliconnect.c 		DEBUG(1, ("failed negprot: %s\n", nt_errstr(nt_status)));
nt_status        2075 source3/libsmb/cliconnect.c 		return nt_status;
nt_status        2107 source3/libsmb/cliconnect.c 	NTSTATUS nt_status;
nt_status        2117 source3/libsmb/cliconnect.c 	nt_status = cli_start_connection(&cli, my_name, dest_host,
nt_status        2121 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2122 source3/libsmb/cliconnect.c 		return nt_status;
nt_status        2125 source3/libsmb/cliconnect.c 	nt_status = cli_session_setup(cli, user, password, pw_len, password,
nt_status        2127 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2131 source3/libsmb/cliconnect.c 				 nt_errstr(nt_status)));
nt_status        2133 source3/libsmb/cliconnect.c 			return nt_status;
nt_status        2136 source3/libsmb/cliconnect.c 		nt_status = cli_session_setup(cli, "", "", 0, "", 0, domain);
nt_status        2137 source3/libsmb/cliconnect.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2139 source3/libsmb/cliconnect.c 				 nt_errstr(nt_status)));
nt_status        2141 source3/libsmb/cliconnect.c 			return nt_status;
nt_status        2146 source3/libsmb/cliconnect.c 		nt_status = cli_tcon_andx(cli, service, service_type, password,
nt_status        2148 source3/libsmb/cliconnect.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2149 source3/libsmb/cliconnect.c 			DEBUG(1,("failed tcon_X with %s\n", nt_errstr(nt_status)));
nt_status        2151 source3/libsmb/cliconnect.c 			if (NT_STATUS_IS_OK(nt_status)) {
nt_status        2152 source3/libsmb/cliconnect.c 				nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        2154 source3/libsmb/cliconnect.c 			return nt_status;
nt_status        2158 source3/libsmb/cliconnect.c 	nt_status = cli_init_creds(cli, user, domain, password);
nt_status        2159 source3/libsmb/cliconnect.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2161 source3/libsmb/cliconnect.c 		return nt_status;
nt_status        2284 source3/libsmb/cliconnect.c 	NTSTATUS nt_status;
nt_status        2291 source3/libsmb/cliconnect.c 	nt_status = cli_full_connection(&cli, NULL, server, server_ss, 0, "IPC$", "IPC", 
nt_status        2298 source3/libsmb/cliconnect.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         524 source3/libsmb/clispnego.c DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status,
nt_status         531 source3/libsmb/clispnego.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         533 source3/libsmb/clispnego.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         573 source3/libsmb/clispnego.c bool spnego_parse_auth_response(DATA_BLOB blob, NTSTATUS nt_status,
nt_status         580 source3/libsmb/clispnego.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         582 source3/libsmb/clispnego.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         271 source3/libsmb/libsmb_dir.c         NTSTATUS nt_status;
nt_status         276 source3/libsmb/libsmb_dir.c         nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_srvsvc.syntax_id,
nt_status         278 source3/libsmb/libsmb_dir.c         if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         290 source3/libsmb/libsmb_dir.c 	nt_status = rpccli_srvsvc_NetShareEnumAll(pipe_hnd, talloc_tos(),
nt_status         299 source3/libsmb/libsmb_dir.c 	if (!NT_STATUS_IS_OK(nt_status) || !W_ERROR_IS_OK(result) ||
nt_status         658 source3/libsmb/libsmb_server.c         NTSTATUS nt_status;
nt_status         689 source3/libsmb/libsmb_server.c                 nt_status = cli_full_connection(&ipc_cli,
nt_status         697 source3/libsmb/libsmb_server.c                 if (! NT_STATUS_IS_OK(nt_status)) {
nt_status         699 source3/libsmb/libsmb_server.c                                  nt_errstr(nt_status)));
nt_status         739 source3/libsmb/libsmb_server.c                 nt_status = cli_rpc_pipe_open_noauth(
nt_status         741 source3/libsmb/libsmb_server.c                 if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         755 source3/libsmb/libsmb_server.c                 nt_status = rpccli_lsa_open_policy(
nt_status         762 source3/libsmb/libsmb_server.c                 if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         751 source3/libsmb/nterr.c NTSTATUS nt_status_squash(NTSTATUS nt_status)
nt_status         753 source3/libsmb/nterr.c 	if NT_STATUS_IS_OK(nt_status) {
nt_status         754 source3/libsmb/nterr.c 		return nt_status;		
nt_status         755 source3/libsmb/nterr.c 	} else if NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_SUCH_USER) {
nt_status         759 source3/libsmb/nterr.c 	} else if NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD) {
nt_status         763 source3/libsmb/nterr.c 		return nt_status;
nt_status         637 source3/libsmb/ntlmssp.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status         716 source3/libsmb/ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, domain))) {
nt_status         721 source3/libsmb/ntlmssp.c 		return nt_status;
nt_status         724 source3/libsmb/ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) {
nt_status         729 source3/libsmb/ntlmssp.c 		return nt_status;
nt_status         732 source3/libsmb/ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_workstation(ntlmssp_state, workstation))) {
nt_status         737 source3/libsmb/ntlmssp.c 		return nt_status;
nt_status         778 source3/libsmb/ntlmssp.c 			if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->set_challenge(ntlmssp_state, &ntlmssp_state->chal))) {
nt_status         780 source3/libsmb/ntlmssp.c 				return nt_status;
nt_status         797 source3/libsmb/ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->check_password(ntlmssp_state, 
nt_status         800 source3/libsmb/ntlmssp.c 		return nt_status;
nt_status         889 source3/libsmb/ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         892 source3/libsmb/ntlmssp.c 		nt_status = ntlmssp_sign_init(ntlmssp_state);
nt_status         900 source3/libsmb/ntlmssp.c 	return nt_status;
nt_status        1008 source3/libsmb/ntlmssp.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status        1206 source3/libsmb/ntlmssp.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_sign_init(ntlmssp_state))) {
nt_status        1207 source3/libsmb/ntlmssp.c 		DEBUG(1, ("Could not setup NTLMSSP signing/sealing system (error was: %s)\n", nt_errstr(nt_status)));
nt_status        1210 source3/libsmb/ntlmssp.c 	return nt_status;
nt_status         144 source3/libsmb/ntlmssp_sign.c 	NTSTATUS nt_status;
nt_status         156 source3/libsmb/ntlmssp_sign.c 	nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
nt_status         161 source3/libsmb/ntlmssp_sign.c 	return nt_status;
nt_status         176 source3/libsmb/ntlmssp_sign.c 	NTSTATUS nt_status;
nt_status         188 source3/libsmb/ntlmssp_sign.c 	nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
nt_status         193 source3/libsmb/ntlmssp_sign.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         194 source3/libsmb/ntlmssp_sign.c 		DEBUG(0, ("NTLMSSP packet check failed with %s\n", nt_errstr(nt_status)));
nt_status         196 source3/libsmb/ntlmssp_sign.c 		return nt_status;
nt_status         259 source3/libsmb/ntlmssp_sign.c 		NTSTATUS nt_status = ntlmssp_make_packet_signature(ntlmssp_state,
nt_status         263 source3/libsmb/ntlmssp_sign.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         264 source3/libsmb/ntlmssp_sign.c 			return nt_status;
nt_status          36 source3/libsmb/trusts_util.c 	NTSTATUS nt_status;
nt_status          48 source3/libsmb/trusts_util.c 	nt_status = rpccli_netlogon_set_trust_password(cli, mem_ctx,
nt_status          54 source3/libsmb/trusts_util.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status          62 source3/libsmb/trusts_util.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status          66 source3/libsmb/trusts_util.c 	return nt_status;
nt_status         118 source3/passdb/pdb_interface.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         156 source3/passdb/pdb_interface.c 	if ( !NT_STATUS_IS_OK( nt_status = entry->init(methods, module_location) ) ) {
nt_status         158 source3/passdb/pdb_interface.c 			selected, nt_errstr(nt_status)));
nt_status         160 source3/passdb/pdb_interface.c 		return nt_status;
nt_status         167 source3/passdb/pdb_interface.c 	return nt_status;
nt_status        6185 source3/passdb/pdb_ldap.c 	NTSTATUS nt_status;
nt_status        6188 source3/passdb/pdb_ldap.c 	if (!NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method ))) {
nt_status        6189 source3/passdb/pdb_ldap.c 		return nt_status;
nt_status        6229 source3/passdb/pdb_ldap.c 	nt_status = smbldap_init(*pdb_method, pdb_get_event_context(),
nt_status        6232 source3/passdb/pdb_ldap.c 	if ( !NT_STATUS_IS_OK(nt_status) ) {
nt_status        6233 source3/passdb/pdb_ldap.c 		return nt_status;
nt_status        6253 source3/passdb/pdb_ldap.c 	NTSTATUS nt_status;
nt_status        6258 source3/passdb/pdb_ldap.c 	nt_status = pdb_init_ldapsam_common( pdb_method, uri );
nt_status        6262 source3/passdb/pdb_ldap.c 	if ( !NT_STATUS_IS_OK(nt_status) ) {
nt_status        6263 source3/passdb/pdb_ldap.c 		return nt_status;
nt_status        6282 source3/passdb/pdb_ldap.c 	NTSTATUS nt_status;
nt_status        6295 source3/passdb/pdb_ldap.c 	nt_status = pdb_init_ldapsam_common(pdb_method, uri);
nt_status        6300 source3/passdb/pdb_ldap.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        6301 source3/passdb/pdb_ldap.c 		return nt_status;
nt_status        6337 source3/passdb/pdb_ldap.c 	nt_status = smbldap_search_domain_info(ldap_state->smbldap_state,
nt_status        6341 source3/passdb/pdb_ldap.c 	if ( !NT_STATUS_IS_OK(nt_status) ) {
nt_status        6433 source3/passdb/pdb_ldap.c 	NTSTATUS nt_status;
nt_status        6434 source3/passdb/pdb_ldap.c 	if (!NT_STATUS_IS_OK(nt_status = smb_register_passdb(PASSDB_INTERFACE_VERSION, "ldapsam", pdb_init_ldapsam)))
nt_status        6435 source3/passdb/pdb_ldap.c 		return nt_status;
nt_status        6437 source3/passdb/pdb_ldap.c 	if (!NT_STATUS_IS_OK(nt_status = smb_register_passdb(PASSDB_INTERFACE_VERSION, "ldapsam_compat", pdb_init_ldapsam_compat)))
nt_status        6438 source3/passdb/pdb_ldap.c 		return nt_status;
nt_status         824 source3/passdb/pdb_nds.c 				NTSTATUS nt_status = NT_STATUS_ACCOUNT_RESTRICTION;
nt_status         828 source3/passdb/pdb_nds.c 						nt_status = NT_STATUS_WRONG_PASSWORD;
nt_status         837 source3/passdb/pdb_nds.c 						nt_status = NT_STATUS_ACCOUNT_DISABLED;
nt_status         842 source3/passdb/pdb_nds.c 				return nt_status;
nt_status         880 source3/passdb/pdb_nds.c 	NTSTATUS nt_status = pdb_init_ldapsam_compat(pdb_method, location);
nt_status         886 source3/passdb/pdb_nds.c 	return nt_status;
nt_status         896 source3/passdb/pdb_nds.c 	NTSTATUS nt_status = pdb_init_ldapsam(pdb_method, location);
nt_status         902 source3/passdb/pdb_nds.c 	return nt_status;
nt_status         907 source3/passdb/pdb_nds.c 	NTSTATUS nt_status;
nt_status         908 source3/passdb/pdb_nds.c 	if (!NT_STATUS_IS_OK(nt_status = smb_register_passdb(PASSDB_INTERFACE_VERSION, "NDS_ldapsam", pdb_init_NDS_ldapsam)))
nt_status         909 source3/passdb/pdb_nds.c 		return nt_status;
nt_status         911 source3/passdb/pdb_nds.c 	if (!NT_STATUS_IS_OK(nt_status = smb_register_passdb(PASSDB_INTERFACE_VERSION, "NDS_ldapsam_compat", pdb_init_NDS_ldapsam_compat)))
nt_status         912 source3/passdb/pdb_nds.c 		return nt_status;
nt_status        1278 source3/passdb/pdb_smbpasswd.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1292 source3/passdb/pdb_smbpasswd.c 		return nt_status;
nt_status        1303 source3/passdb/pdb_smbpasswd.c 		return nt_status;
nt_status        1309 source3/passdb/pdb_smbpasswd.c 		return nt_status;
nt_status        1314 source3/passdb/pdb_smbpasswd.c 		return nt_status;
nt_status        1322 source3/passdb/pdb_smbpasswd.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1339 source3/passdb/pdb_smbpasswd.c 			return nt_status;
nt_status        1349 source3/passdb/pdb_smbpasswd.c 		return nt_status;
nt_status        1360 source3/passdb/pdb_smbpasswd.c 		return nt_status;
nt_status        1366 source3/passdb/pdb_smbpasswd.c 		return nt_status;
nt_status        1371 source3/passdb/pdb_smbpasswd.c 		return nt_status;
nt_status        1374 source3/passdb/pdb_smbpasswd.c 	if (NT_STATUS_IS_OK(nt_status) && !sid_equal(pdb_get_user_sid(sam_acct), sid)) {
nt_status        1668 source3/passdb/pdb_smbpasswd.c 	NTSTATUS nt_status;
nt_status        1671 source3/passdb/pdb_smbpasswd.c 	if ( !NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method )) ) {
nt_status        1672 source3/passdb/pdb_smbpasswd.c 		return nt_status;
nt_status         584 source3/passdb/pdb_tdb.c 	NTSTATUS                nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         591 source3/passdb/pdb_tdb.c 		return nt_status;
nt_status         667 source3/passdb/pdb_tdb.c 	NTSTATUS        nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         696 source3/passdb/pdb_tdb.c 	nt_status = dbwrap_delete_bystring(db_sam, keystr);
nt_status         697 source3/passdb/pdb_tdb.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         699 source3/passdb/pdb_tdb.c 			  "database: %s!\n", nt_errstr(nt_status)));
nt_status         709 source3/passdb/pdb_tdb.c 	nt_status = dbwrap_delete_bystring(db_sam, keystr);
nt_status         710 source3/passdb/pdb_tdb.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         712 source3/passdb/pdb_tdb.c 			  "database: %s!\n", nt_errstr(nt_status)));
nt_status         728 source3/passdb/pdb_tdb.c 	return nt_status;
nt_status        1231 source3/passdb/pdb_tdb.c 	NTSTATUS nt_status;
nt_status        1235 source3/passdb/pdb_tdb.c 	if (!NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method ))) {
nt_status        1236 source3/passdb/pdb_tdb.c 		return nt_status;
nt_status        1440 source3/printing/nt_printing.c 	NTSTATUS          nt_status;
nt_status        1476 source3/printing/nt_printing.c 	nt_status = create_conn_struct(talloc_tos(), &conn, printdollar_snum,
nt_status        1479 source3/printing/nt_printing.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1481 source3/printing/nt_printing.c 			 "returned %s\n", nt_errstr(nt_status)));
nt_status        1482 source3/printing/nt_printing.c 		*perr = ntstatus_to_werror(nt_status);
nt_status        1844 source3/printing/nt_printing.c 	NTSTATUS nt_status;
nt_status        1881 source3/printing/nt_printing.c 	nt_status = create_conn_struct(talloc_tos(), &conn, printdollar_snum,
nt_status        1884 source3/printing/nt_printing.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1886 source3/printing/nt_printing.c 			 "returned %s\n", nt_errstr(nt_status)));
nt_status        1887 source3/printing/nt_printing.c 		*perr = ntstatus_to_werror(nt_status);
nt_status        5121 source3/printing/nt_printing.c 	NTSTATUS nt_status;
nt_status        5140 source3/printing/nt_printing.c 	nt_status = create_conn_struct(talloc_tos(), &conn, printdollar_snum,
nt_status        5143 source3/printing/nt_printing.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        5145 source3/printing/nt_printing.c 			 "returned %s\n", nt_errstr(nt_status)));
nt_status        5301 source3/printing/nt_printing.c 	NTSTATUS nt_status;
nt_status        5363 source3/printing/nt_printing.c 	nt_status = marshall_sec_desc_buf(mem_ctx, new_secdesc_ctr,
nt_status        5365 source3/printing/nt_printing.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        5366 source3/printing/nt_printing.c 		status = ntstatus_to_werror(nt_status);
nt_status        1537 source3/rpc_client/cli_pipe.c 	NTSTATUS nt_status;
nt_status        1546 source3/rpc_client/cli_pipe.c 	nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state,
nt_status        1550 source3/rpc_client/cli_pipe.c 	if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status        1553 source3/rpc_client/cli_pipe.c 		return nt_status;
nt_status        1584 source3/rpc_client/cli_pipe.c 	NTSTATUS nt_status;
nt_status        1592 source3/rpc_client/cli_pipe.c 	nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state,
nt_status        1596 source3/rpc_client/cli_pipe.c 	if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status        1599 source3/rpc_client/cli_pipe.c 		return nt_status;
nt_status         473 source3/rpc_server/srv_lsa_nt.c 	NTSTATUS nt_status;
nt_status         488 source3/rpc_server/srv_lsa_nt.c 	nt_status = pdb_enum_trusteddoms(p->mem_ctx, &num_domains, &domains);
nt_status         491 source3/rpc_server/srv_lsa_nt.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         492 source3/rpc_server/srv_lsa_nt.c 		return nt_status;
nt_status         498 source3/rpc_server/srv_lsa_nt.c 		nt_status = STATUS_MORE_ENTRIES;
nt_status         502 source3/rpc_server/srv_lsa_nt.c 			nt_status = NT_STATUS_OK;
nt_status         509 source3/rpc_server/srv_lsa_nt.c 		nt_status = NT_STATUS_NO_MORE_ENTRIES;
nt_status         529 source3/rpc_server/srv_lsa_nt.c 	return nt_status;
nt_status        2337 source3/rpc_server/srv_samr_nt.c 	NTSTATUS nt_status;
nt_status        2345 source3/rpc_server/srv_samr_nt.c 	nt_status = access_check_samr_function(acc_granted,
nt_status        2349 source3/rpc_server/srv_samr_nt.c 	if ( !NT_STATUS_IS_OK(nt_status) )
nt_status        2350 source3/rpc_server/srv_samr_nt.c 		return nt_status;
nt_status        2433 source3/rpc_server/srv_samr_nt.c 	nt_status = access_check_object(psd, p->server_info->ptok,
nt_status        2437 source3/rpc_server/srv_samr_nt.c 	if ( !NT_STATUS_IS_OK(nt_status) )
nt_status        2438 source3/rpc_server/srv_samr_nt.c 		return nt_status;
nt_status        3748 source3/rpc_server/srv_samr_nt.c 	NTSTATUS nt_status;
nt_status        3768 source3/rpc_server/srv_samr_nt.c 	nt_status = access_check_samr_function(acc_granted,
nt_status        3771 source3/rpc_server/srv_samr_nt.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        3772 source3/rpc_server/srv_samr_nt.c 		return nt_status;
nt_status        3787 source3/rpc_server/srv_samr_nt.c 	nt_status = can_create(p->mem_ctx, account);
nt_status        3788 source3/rpc_server/srv_samr_nt.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        3789 source3/rpc_server/srv_samr_nt.c 		return nt_status;
nt_status        3829 source3/rpc_server/srv_samr_nt.c 	nt_status = pdb_create_user(p->mem_ctx, account, acb_info,
nt_status        3837 source3/rpc_server/srv_samr_nt.c 	if ( !NT_STATUS_IS_OK(nt_status) )
nt_status        3838 source3/rpc_server/srv_samr_nt.c 		return nt_status;
nt_status        3857 source3/rpc_server/srv_samr_nt.c 	nt_status = access_check_object(psd, p->server_info->ptok,
nt_status        3861 source3/rpc_server/srv_samr_nt.c 	if ( !NT_STATUS_IS_OK(nt_status) ) {
nt_status        3862 source3/rpc_server/srv_samr_nt.c 		return nt_status;
nt_status        3957 source3/rpc_server/srv_samr_nt.c 	NTSTATUS  nt_status;
nt_status        3990 source3/rpc_server/srv_samr_nt.c 	nt_status = access_check_object(psd, p->server_info->ptok,
nt_status        3993 source3/rpc_server/srv_samr_nt.c 	if ( !NT_STATUS_IS_OK(nt_status) )
nt_status        3994 source3/rpc_server/srv_samr_nt.c 		return nt_status;
nt_status        4009 source3/rpc_server/srv_samr_nt.c 	return nt_status;
nt_status        2055 source3/rpc_server/srv_srvsvc_nt.c 	NTSTATUS nt_status;
nt_status        2074 source3/rpc_server/srv_srvsvc_nt.c 	nt_status = create_conn_struct(talloc_tos(), &conn, snum,
nt_status        2077 source3/rpc_server/srv_srvsvc_nt.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2079 source3/rpc_server/srv_srvsvc_nt.c 			   nt_errstr(nt_status)));
nt_status        2080 source3/rpc_server/srv_srvsvc_nt.c 		werr = ntstatus_to_werror(nt_status);
nt_status        2084 source3/rpc_server/srv_srvsvc_nt.c 	nt_status = SMB_VFS_CREATE_FILE(
nt_status        2103 source3/rpc_server/srv_srvsvc_nt.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2106 source3/rpc_server/srv_srvsvc_nt.c 		werr = ntstatus_to_werror(nt_status);
nt_status        2110 source3/rpc_server/srv_srvsvc_nt.c 	nt_status = SMB_VFS_FGET_NT_ACL(fsp,
nt_status        2115 source3/rpc_server/srv_srvsvc_nt.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2118 source3/rpc_server/srv_srvsvc_nt.c 		werr = ntstatus_to_werror(nt_status);
nt_status        2170 source3/rpc_server/srv_srvsvc_nt.c 	NTSTATUS nt_status;
nt_status        2189 source3/rpc_server/srv_srvsvc_nt.c 	nt_status = create_conn_struct(talloc_tos(), &conn, snum,
nt_status        2192 source3/rpc_server/srv_srvsvc_nt.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2194 source3/rpc_server/srv_srvsvc_nt.c 			   nt_errstr(nt_status)));
nt_status        2195 source3/rpc_server/srv_srvsvc_nt.c 		werr = ntstatus_to_werror(nt_status);
nt_status        2199 source3/rpc_server/srv_srvsvc_nt.c 	nt_status = SMB_VFS_CREATE_FILE(
nt_status        2218 source3/rpc_server/srv_srvsvc_nt.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2221 source3/rpc_server/srv_srvsvc_nt.c 		werr = ntstatus_to_werror(nt_status);
nt_status        2245 source3/rpc_server/srv_srvsvc_nt.c 	nt_status = SMB_VFS_FSET_NT_ACL(fsp,
nt_status        2249 source3/rpc_server/srv_srvsvc_nt.c 	if (!NT_STATUS_IS_OK(nt_status) ) {
nt_status        3181 source3/rpcclient/cmd_spoolss.c 	NTSTATUS nt_status;
nt_status        3193 source3/rpcclient/cmd_spoolss.c 	nt_status = cli_full_connection(&cli_server2, global_myname(), argv[2],
nt_status        3202 source3/rpcclient/cmd_spoolss.c 	if ( !NT_STATUS_IS_OK(nt_status) )
nt_status        3205 source3/rpcclient/cmd_spoolss.c 	nt_status = cli_rpc_pipe_open_noauth(cli_server2, &ndr_table_spoolss.syntax_id,
nt_status        3207 source3/rpcclient/cmd_spoolss.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        3209 source3/rpcclient/cmd_spoolss.c 			argv[2], nt_errstr(nt_status));
nt_status         765 source3/rpcclient/rpcclient.c 	NTSTATUS 		nt_status;
nt_status         887 source3/rpcclient/rpcclient.c 	nt_status = cli_full_connection(&cli, global_myname(), server,
nt_status         897 source3/rpcclient/rpcclient.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         898 source3/rpcclient/rpcclient.c 		DEBUG(0,("Cannot connect to server.  Error was %s\n", nt_errstr(nt_status)));
nt_status         904 source3/rpcclient/rpcclient.c 		nt_status = cli_cm_force_encryption(cli,
nt_status         909 source3/rpcclient/rpcclient.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          32 source3/smbd/change_trust_pw.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status          65 source3/smbd/change_trust_pw.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status          76 source3/smbd/change_trust_pw.c 	nt_status = cli_rpc_pipe_open_noauth(
nt_status          78 source3/smbd/change_trust_pw.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          80 source3/smbd/change_trust_pw.c 			dc_name, nt_errstr(nt_status)));
nt_status          86 source3/smbd/change_trust_pw.c 	nt_status = trust_pw_find_change_and_store_it(
nt_status          93 source3/smbd/change_trust_pw.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         100 source3/smbd/change_trust_pw.c 	return nt_status;
nt_status         784 source3/smbd/chgpasswd.c 	NTSTATUS nt_status;
nt_status         801 source3/smbd/chgpasswd.c 	nt_status = check_oem_password(user,
nt_status         809 source3/smbd/chgpasswd.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         811 source3/smbd/chgpasswd.c 		return nt_status;
nt_status         816 source3/smbd/chgpasswd.c 	nt_status = change_oem_password(sampass, NULL, new_passwd, True, reject_reason);
nt_status         823 source3/smbd/chgpasswd.c 	return nt_status;
nt_status          29 source3/smbd/negprot.c 	NTSTATUS nt_status;
nt_status          39 source3/smbd/negprot.c 	if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&negprot_global_auth_context))) {
nt_status          40 source3/smbd/negprot.c 		DEBUG(0, ("make_auth_context_subsystem returned %s", nt_errstr(nt_status)));
nt_status        2099 source3/smbd/nttrans.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status        2292 source3/smbd/nttrans.c 				nt_status = NT_STATUS_BUFFER_TOO_SMALL;
nt_status        2356 source3/smbd/nttrans.c 	send_nt_replies(conn, req, nt_status, params, param_len,
nt_status         517 source3/smbd/reply.c 	NTSTATUS nt_status;
nt_status         552 source3/smbd/reply.c 	conn = make_connection(service,password_blob,dev,req->vuid,&nt_status);
nt_status         558 source3/smbd/reply.c 		reply_nterror(req, nt_status);
nt_status         590 source3/smbd/reply.c 	NTSTATUS nt_status;
nt_status         678 source3/smbd/reply.c 			       req->vuid, &nt_status);
nt_status         684 source3/smbd/reply.c 		reply_nterror(req, nt_status);
nt_status        1267 source3/smbd/reply.c 	NTSTATUS nt_status;
nt_status        1297 source3/smbd/reply.c 				       &nt_status, &mask_contains_wcard);
nt_status        1298 source3/smbd/reply.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1299 source3/smbd/reply.c 		reply_nterror(req, nt_status);
nt_status        1304 source3/smbd/reply.c 	nt_status = resolve_dfspath_wcard(ctx, conn,
nt_status        1309 source3/smbd/reply.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1310 source3/smbd/reply.c 		if (NT_STATUS_EQUAL(nt_status,NT_STATUS_PATH_NOT_COVERED)) {
nt_status        1316 source3/smbd/reply.c 		reply_nterror(req, nt_status);
nt_status        1330 source3/smbd/reply.c 		nt_status = unix_convert(ctx, conn, path, True,
nt_status        1332 source3/smbd/reply.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1333 source3/smbd/reply.c 			reply_nterror(req, nt_status);
nt_status        1338 source3/smbd/reply.c 		nt_status = check_name(conn, directory);
nt_status        1339 source3/smbd/reply.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1340 source3/smbd/reply.c 			reply_nterror(req, nt_status);
nt_status        1364 source3/smbd/reply.c 		nt_status = dptr_create(conn,
nt_status        1373 source3/smbd/reply.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1374 source3/smbd/reply.c 			reply_nterror(req, nt_status);
nt_status         118 source3/smbd/sesssetup.c 				 NTSTATUS nt_status)
nt_status         120 source3/smbd/sesssetup.c 	if (!NT_STATUS_IS_OK(nt_status) &&
nt_status         121 source3/smbd/sesssetup.c 	    !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         122 source3/smbd/sesssetup.c 		reply_nterror(req, nt_status_squash(nt_status));
nt_status         126 source3/smbd/sesssetup.c 	nt_status = nt_status_squash(nt_status);
nt_status         127 source3/smbd/sesssetup.c 	SIVAL(req->outbuf, smb_rcls, NT_STATUS_V(nt_status));
nt_status         146 source3/smbd/sesssetup.c 	NTSTATUS nt_status;
nt_status         153 source3/smbd/sesssetup.c 	if (!NT_STATUS_IS_OK(nt_status = make_auth_context_fixed(&auth_context,
nt_status         155 source3/smbd/sesssetup.c 		return nt_status;
nt_status         163 source3/smbd/sesssetup.c 	nt_status = auth_context->check_ntlm_password(auth_context,
nt_status         168 source3/smbd/sesssetup.c 	return nt_status;
nt_status         609 source3/smbd/sesssetup.c 				 DATA_BLOB *ntlmssp_blob, NTSTATUS nt_status,
nt_status         616 source3/smbd/sesssetup.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         619 source3/smbd/sesssetup.c 		nt_status = do_map_to_guest(nt_status,
nt_status         629 source3/smbd/sesssetup.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         633 source3/smbd/sesssetup.c 			nt_status = NT_STATUS_LOGON_FAILURE;
nt_status         649 source3/smbd/sesssetup.c 			nt_status = NT_STATUS_LOGON_FAILURE;
nt_status         672 source3/smbd/sesssetup.c 				nt_status, OID);
nt_status         677 source3/smbd/sesssetup.c 	reply_sesssetup_blob(req, response, nt_status);
nt_status         685 source3/smbd/sesssetup.c 	if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         688 source3/smbd/sesssetup.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1394 source3/smbd/sesssetup.c 	NTSTATUS nt_status;
nt_status        1664 source3/smbd/sesssetup.c 		nt_status = check_guest_password(&server_info);
nt_status        1675 source3/smbd/sesssetup.c 		nt_status = make_user_info_for_reply_enc(&user_info, user,
nt_status        1678 source3/smbd/sesssetup.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status        1679 source3/smbd/sesssetup.c 			nt_status = negprot_global_auth_context->check_ntlm_password(
nt_status        1687 source3/smbd/sesssetup.c 		nt_status = make_auth_context_subsystem(
nt_status        1690 source3/smbd/sesssetup.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status        1699 source3/smbd/sesssetup.c 				nt_status = NT_STATUS_NO_MEMORY;
nt_status        1702 source3/smbd/sesssetup.c 			if (NT_STATUS_IS_OK(nt_status)) {
nt_status        1703 source3/smbd/sesssetup.c 				nt_status = plaintext_auth_context->check_ntlm_password(
nt_status        1716 source3/smbd/sesssetup.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1717 source3/smbd/sesssetup.c 		nt_status = do_map_to_guest(nt_status, &server_info,
nt_status        1721 source3/smbd/sesssetup.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1725 source3/smbd/sesssetup.c 		reply_nterror(req, nt_status_squash(nt_status));
nt_status        1739 source3/smbd/sesssetup.c 		nt_status = create_local_token(server_info);
nt_status        1741 source3/smbd/sesssetup.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1743 source3/smbd/sesssetup.c 				   nt_errstr(nt_status)));
nt_status        1747 source3/smbd/sesssetup.c 			reply_nterror(req, nt_status_squash(nt_status));
nt_status         166 source3/torture/locktest2.c 	NTSTATUS nt_status;
nt_status         185 source3/torture/locktest2.c 	nt_status = cli_full_connection(&c, myname, server_n, NULL, 0, share, "?????", 
nt_status         189 source3/torture/locktest2.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         190 source3/torture/locktest2.c 		DEBUG(0, ("cli_full_connection failed with error %s\n", nt_errstr(nt_status)));
nt_status        4871 source3/torture/torture.c 	NTSTATUS nt_status;
nt_status        4935 source3/torture/torture.c 			nt_status = NT_STATUS(IVAL(c_nt->inbuf,smb_rcls));
nt_status        4939 source3/torture/torture.c 			nt_status = NT_STATUS(0xc0000000);
nt_status        4959 source3/torture/torture.c 		if (NT_STATUS_V(nt_status) != error) { 
nt_status        4962 source3/torture/torture.c 			       get_nt_error_c_code(nt_status));
nt_status        1584 source3/utils/net_ads.c 	NTSTATUS nt_status;
nt_status        1618 source3/utils/net_ads.c 	nt_status = cli_full_connection(&cli, global_myname(), servername,
nt_status        1626 source3/utils/net_ads.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        1672 source3/utils/net_ads.c 	nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_spoolss.syntax_id, &pipe_hnd);
nt_status        1673 source3/utils/net_ads.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         120 source3/utils/net_rpc.c 	NTSTATUS nt_status;
nt_status         127 source3/utils/net_rpc.c 		nt_status = net_make_ipc_connection(c, conn_flags, &cli);
nt_status         128 source3/utils/net_rpc.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         130 source3/utils/net_rpc.c 				  nt_errstr(nt_status)));
nt_status         148 source3/utils/net_rpc.c 	nt_status = net_get_remote_domain_sid(cli, mem_ctx, &domain_sid,
nt_status         150 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         159 source3/utils/net_rpc.c 			nt_status = cli_rpc_pipe_open_schannel(
nt_status         163 source3/utils/net_rpc.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         165 source3/utils/net_rpc.c 					nt_errstr(nt_status) ));
nt_status         170 source3/utils/net_rpc.c 				nt_status = cli_rpc_pipe_open_ntlmssp(
nt_status         178 source3/utils/net_rpc.c 				nt_status = cli_rpc_pipe_open_noauth(
nt_status         182 source3/utils/net_rpc.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         185 source3/utils/net_rpc.c 					nt_errstr(nt_status) ));
nt_status         191 source3/utils/net_rpc.c 	nt_status = fn(c, domain_sid, domain_name, cli, pipe_hnd, mem_ctx, argc, argv);
nt_status         193 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         194 source3/utils/net_rpc.c 		DEBUG(1, ("rpc command function failed! (%s)\n", nt_errstr(nt_status)));
nt_status        3085 source3/utils/net_rpc.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        3099 source3/utils/net_rpc.c         nt_status = connect_dst_pipe(c, &cli_dst, &srvsvc_pipe,
nt_status        3101 source3/utils/net_rpc.c         if (!NT_STATUS_IS_OK(nt_status))
nt_status        3102 source3/utils/net_rpc.c                 return nt_status;
nt_status        3112 source3/utils/net_rpc.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        3124 source3/utils/net_rpc.c 		nt_status = rpccli_srvsvc_NetShareAdd(srvsvc_pipe, mem_ctx,
nt_status        3137 source3/utils/net_rpc.c 		if (!NT_STATUS_IS_OK(nt_status) || !W_ERROR_IS_OK(result)) {
nt_status        3144 source3/utils/net_rpc.c 	nt_status = NT_STATUS_OK;
nt_status        3151 source3/utils/net_rpc.c 	return nt_status;
nt_status        3195 source3/utils/net_rpc.c 	static NTSTATUS nt_status;
nt_status        3203 source3/utils/net_rpc.c 	nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        3225 source3/utils/net_rpc.c 			nt_status = net_copy_file(c, local_state->mem_ctx,
nt_status        3239 source3/utils/net_rpc.c 		if (!NT_STATUS_IS_OK(nt_status))
nt_status        3241 source3/utils/net_rpc.c 				dir, nt_errstr(nt_status));
nt_status        3267 source3/utils/net_rpc.c 		nt_status = net_copy_file(c, local_state->mem_ctx,
nt_status        3281 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status        3283 source3/utils/net_rpc.c 			filename, nt_errstr(nt_status));
nt_status        3329 source3/utils/net_rpc.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        3334 source3/utils/net_rpc.c 		nt_status = net_copy_fileattr(c,
nt_status        3349 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status))  {
nt_status        3351 source3/utils/net_rpc.c 			sharename, nt_errstr(nt_status));
nt_status        3384 source3/utils/net_rpc.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        3396 source3/utils/net_rpc.c 		nt_status = NT_STATUS_NO_MEMORY;
nt_status        3443 source3/utils/net_rpc.c 		nt_status = connect_to_service(c, &cp_clistate.cli_share_src,
nt_status        3446 source3/utils/net_rpc.c 		if (!NT_STATUS_IS_OK(nt_status))
nt_status        3453 source3/utils/net_rpc.c 			nt_status = connect_to_service(c, &cp_clistate.cli_share_dst,
nt_status        3455 source3/utils/net_rpc.c 			if (!NT_STATUS_IS_OK(nt_status))
nt_status        3463 source3/utils/net_rpc.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        3469 source3/utils/net_rpc.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        3474 source3/utils/net_rpc.c 	nt_status = NT_STATUS_OK;
nt_status        3485 source3/utils/net_rpc.c 	return nt_status;
nt_status        3534 source3/utils/net_rpc.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        3550 source3/utils/net_rpc.c         nt_status = connect_dst_pipe(c, &cli_dst, &srvsvc_pipe,
nt_status        3552 source3/utils/net_rpc.c         if (!NT_STATUS_IS_OK(nt_status))
nt_status        3553 source3/utils/net_rpc.c                 return nt_status;
nt_status        3562 source3/utils/net_rpc.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        3577 source3/utils/net_rpc.c 		nt_status = rpccli_srvsvc_NetShareSetInfo(srvsvc_pipe, mem_ctx,
nt_status        3584 source3/utils/net_rpc.c 		if (!NT_STATUS_IS_OK(nt_status) || !W_ERROR_IS_OK(result)) {
nt_status        3591 source3/utils/net_rpc.c 	nt_status = NT_STATUS_OK;
nt_status        3598 source3/utils/net_rpc.c 	return nt_status;
nt_status        5501 source3/utils/net_rpc.c 	NTSTATUS nt_status;
nt_status        5545 source3/utils/net_rpc.c 	nt_status = connect_to_ipc(c, &cli, &server_ss, pdc_name);
nt_status        5546 source3/utils/net_rpc.c 	if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT)) {
nt_status        5550 source3/utils/net_rpc.c 			nt_errstr(nt_status)));
nt_status        5562 source3/utils/net_rpc.c 	nt_status = connect_to_ipc_anonymous(c, &cli, &server_ss,
nt_status        5565 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        5567 source3/utils/net_rpc.c 			domain_name, nt_errstr(nt_status)));
nt_status        5580 source3/utils/net_rpc.c 	nt_status = rpc_trustdom_get_pdc(c, cli, mem_ctx, domain_name);
nt_status        5581 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        5591 source3/utils/net_rpc.c 	nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
nt_status        5593 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        5594 source3/utils/net_rpc.c 		DEBUG(0, ("Could not initialise lsa pipe. Error was %s\n", nt_errstr(nt_status) ));
nt_status        5600 source3/utils/net_rpc.c 	nt_status = rpccli_lsa_open_policy2(pipe_hnd, mem_ctx, true, KEY_QUERY_VALUE,
nt_status        5602 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        5604 source3/utils/net_rpc.c 			nt_errstr(nt_status)));
nt_status        5612 source3/utils/net_rpc.c 	nt_status = rpccli_lsa_QueryInfoPolicy(pipe_hnd, mem_ctx,
nt_status        5616 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        5618 source3/utils/net_rpc.c 			nt_errstr(nt_status)));
nt_status        5644 source3/utils/net_rpc.c 	nt_status = rpccli_lsa_Close(pipe_hnd, mem_ctx, &connect_hnd);
nt_status        5645 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        5647 source3/utils/net_rpc.c 			nt_errstr(nt_status)));
nt_status        5739 source3/utils/net_rpc.c 	NTSTATUS nt_status;
nt_status        5745 source3/utils/net_rpc.c 	nt_status = rpccli_lsa_QueryTrustedDomainInfoBySid(pipe_hnd, mem_ctx,
nt_status        5750 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        5752 source3/utils/net_rpc.c 		nt_errstr(nt_status)));
nt_status        5768 source3/utils/net_rpc.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        5774 source3/utils/net_rpc.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        5788 source3/utils/net_rpc.c 	return nt_status;
nt_status        5798 source3/utils/net_rpc.c 	NTSTATUS nt_status;
nt_status        5838 source3/utils/net_rpc.c 	nt_status = net_make_ipc_connection(c, NET_FLAGS_PDC, &cli);
nt_status        5839 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        5841 source3/utils/net_rpc.c 			  nt_errstr(nt_status)));
nt_status        5846 source3/utils/net_rpc.c 	nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
nt_status        5848 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        5850 source3/utils/net_rpc.c 			nt_errstr(nt_status) ));
nt_status        5856 source3/utils/net_rpc.c 	nt_status = rpccli_lsa_open_policy2(pipe_hnd, mem_ctx, false, KEY_QUERY_VALUE,
nt_status        5858 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        5860 source3/utils/net_rpc.c  			nt_errstr(nt_status)));
nt_status        5867 source3/utils/net_rpc.c 	nt_status = rpccli_lsa_QueryInfoPolicy(pipe_hnd, mem_ctx,
nt_status        5872 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        5874 source3/utils/net_rpc.c 			nt_errstr(nt_status)));
nt_status        5890 source3/utils/net_rpc.c 		nt_status = rpccli_lsa_EnumTrustDom(pipe_hnd, mem_ctx,
nt_status        5895 source3/utils/net_rpc.c 		if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        5897 source3/utils/net_rpc.c 				nt_errstr(nt_status)));
nt_status        5908 source3/utils/net_rpc.c 			nt_status = vampire_trusted_domain(pipe_hnd, mem_ctx, &connect_hnd, 
nt_status        5911 source3/utils/net_rpc.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        5924 source3/utils/net_rpc.c 	} while (NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES));
nt_status        5927 source3/utils/net_rpc.c 	nt_status = rpccli_lsa_Close(pipe_hnd, mem_ctx, &connect_hnd);
nt_status        5928 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        5930 source3/utils/net_rpc.c 			nt_errstr(nt_status)));
nt_status        5949 source3/utils/net_rpc.c 	NTSTATUS nt_status;
nt_status        5994 source3/utils/net_rpc.c 	nt_status = net_make_ipc_connection(c, NET_FLAGS_PDC, &cli);
nt_status        5995 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        5997 source3/utils/net_rpc.c 			  nt_errstr(nt_status)));
nt_status        6002 source3/utils/net_rpc.c 	nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
nt_status        6004 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        6006 source3/utils/net_rpc.c 			nt_errstr(nt_status) ));
nt_status        6012 source3/utils/net_rpc.c 	nt_status = rpccli_lsa_open_policy2(pipe_hnd, mem_ctx, false, KEY_QUERY_VALUE,
nt_status        6014 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        6016 source3/utils/net_rpc.c  			nt_errstr(nt_status)));
nt_status        6023 source3/utils/net_rpc.c 	nt_status = rpccli_lsa_QueryInfoPolicy(pipe_hnd, mem_ctx,
nt_status        6028 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        6030 source3/utils/net_rpc.c 			nt_errstr(nt_status)));
nt_status        6046 source3/utils/net_rpc.c 		nt_status = rpccli_lsa_EnumTrustDom(pipe_hnd, mem_ctx,
nt_status        6051 source3/utils/net_rpc.c 		if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        6053 source3/utils/net_rpc.c 				nt_errstr(nt_status)));
nt_status        6070 source3/utils/net_rpc.c 	} while (NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES));
nt_status        6073 source3/utils/net_rpc.c 	nt_status = rpccli_lsa_Close(pipe_hnd, mem_ctx, &connect_hnd);
nt_status        6074 source3/utils/net_rpc.c 	if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        6076 source3/utils/net_rpc.c 			nt_errstr(nt_status)));
nt_status        6093 source3/utils/net_rpc.c 	nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr.syntax_id,
nt_status        6095 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        6096 source3/utils/net_rpc.c 		DEBUG(0, ("Could not initialise samr pipe. Error was %s\n", nt_errstr(nt_status)));
nt_status        6103 source3/utils/net_rpc.c 	nt_status = rpccli_samr_Connect2(pipe_hnd, mem_ctx,
nt_status        6107 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        6109 source3/utils/net_rpc.c 			nt_errstr(nt_status)));
nt_status        6117 source3/utils/net_rpc.c 	nt_status = rpccli_samr_OpenDomain(pipe_hnd, mem_ctx,
nt_status        6122 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        6124 source3/utils/net_rpc.c 			nt_errstr(nt_status)));
nt_status        6137 source3/utils/net_rpc.c 		nt_status = rpccli_samr_EnumDomainUsers(pipe_hnd, mem_ctx,
nt_status        6144 source3/utils/net_rpc.c 		if (NT_STATUS_IS_ERR(nt_status)) {
nt_status        6146 source3/utils/net_rpc.c 				nt_errstr(nt_status)));
nt_status        6175 source3/utils/net_rpc.c 			nt_status = net_make_ipc_connection(c,
nt_status        6178 source3/utils/net_rpc.c 			if (NT_STATUS_IS_OK(nt_status)) {
nt_status        6192 source3/utils/net_rpc.c 					  nt_errstr(nt_status));
nt_status        6198 source3/utils/net_rpc.c 	} while (NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES));
nt_status        6201 source3/utils/net_rpc.c 	nt_status = rpccli_samr_Close(pipe_hnd, mem_ctx, &domain_hnd);
nt_status        6202 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        6206 source3/utils/net_rpc.c 	nt_status = rpccli_samr_Close(pipe_hnd, mem_ctx, &connect_hnd);
nt_status        6207 source3/utils/net_rpc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         485 source3/utils/net_rpc_join.c 	NTSTATUS nt_status;
nt_status         495 source3/utils/net_rpc_join.c 	nt_status = net_rpc_join_ok(c, c->opt_target_workgroup, NULL, NULL);
nt_status         496 source3/utils/net_rpc_join.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         498 source3/utils/net_rpc_join.c 			c->opt_target_workgroup, nt_errstr(nt_status));
nt_status         150 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         170 source3/utils/net_rpc_printer.c 		nt_status = cli_nt_error(cli_share_src);
nt_status         182 source3/utils/net_rpc_printer.c 			nt_status = cli_nt_error(cli_share_src);
nt_status         198 source3/utils/net_rpc_printer.c 			nt_status = cli_nt_error(cli_share_src);
nt_status         210 source3/utils/net_rpc_printer.c 		nt_status = cli_nt_error(cli_share_dst);
nt_status         220 source3/utils/net_rpc_printer.c 			nt_status = cli_nt_error(cli_share_dst);
nt_status         231 source3/utils/net_rpc_printer.c 			nt_status = cli_nt_error(cli_share_dst);
nt_status         242 source3/utils/net_rpc_printer.c 			nt_status = cli_nt_error(cli_share_dst);
nt_status         253 source3/utils/net_rpc_printer.c 		nt_status = cli_nt_error(cli_share_src);
nt_status         260 source3/utils/net_rpc_printer.c 		nt_status = cli_nt_error(cli_share_dst);
nt_status         265 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status         276 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status         304 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         331 source3/utils/net_rpc_printer.c 		nt_status = cli_nt_error(cli_share_src);
nt_status         346 source3/utils/net_rpc_printer.c 			nt_status = cli_nt_error(cli_share_dst);
nt_status         353 source3/utils/net_rpc_printer.c 			nt_status = NT_STATUS_NO_MEMORY;
nt_status         388 source3/utils/net_rpc_printer.c 			nt_status = cli_nt_error(cli_share_dst);
nt_status         405 source3/utils/net_rpc_printer.c 			nt_status = NT_STATUS_NO_SUCH_FILE;
nt_status         420 source3/utils/net_rpc_printer.c 		nt_status = cli_nt_error(cli_share_src);
nt_status         427 source3/utils/net_rpc_printer.c 		nt_status = cli_nt_error(cli_share_dst);
nt_status         432 source3/utils/net_rpc_printer.c 	nt_status = net_copy_fileattr(c, mem_ctx, cli_share_src, cli_share_dst,
nt_status         435 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         439 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status         452 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status         482 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         515 source3/utils/net_rpc_printer.c 	nt_status = net_copy_file(c, mem_ctx, cli_share_src, cli_share_dst,
nt_status         517 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         520 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status         526 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status         541 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         554 source3/utils/net_rpc_printer.c                 nt_status = NT_STATUS_NO_SUCH_FILE;
nt_status         563 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status         567 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status         591 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         595 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status         602 source3/utils/net_rpc_printer.c 	nt_status = net_copy_driverfile(c, mem_ctx, cli_share_src, cli_share_dst,
nt_status         604 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         605 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status         607 source3/utils/net_rpc_printer.c 	nt_status = net_copy_driverfile(c, mem_ctx, cli_share_src, cli_share_dst,
nt_status         609 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         610 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status         612 source3/utils/net_rpc_printer.c 	nt_status = net_copy_driverfile(c, mem_ctx, cli_share_src, cli_share_dst,
nt_status         614 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         615 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status         617 source3/utils/net_rpc_printer.c 	nt_status = net_copy_driverfile(c, mem_ctx, cli_share_src, cli_share_dst,
nt_status         619 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         620 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status         624 source3/utils/net_rpc_printer.c 		nt_status = net_copy_driverfile(c, mem_ctx,
nt_status         627 source3/utils/net_rpc_printer.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         628 source3/utils/net_rpc_printer.c 			return nt_status;
nt_status        1109 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1118 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status        1161 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1177 source3/utils/net_rpc_printer.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1197 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status        1200 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status        1223 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1237 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status        1281 source3/utils/net_rpc_printer.c 		nt_status = rpccli_spoolss_SetPrinter(pipe_hnd, mem_ctx,
nt_status        1297 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status        1303 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status        1368 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1378 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status        1422 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status        1428 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status        1460 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1474 source3/utils/net_rpc_printer.c 	nt_status = connect_dst_pipe(c, &cli_dst, &pipe_hnd_dst,
nt_status        1476 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status        1477 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status        1482 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1488 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_OK;
nt_status        1500 source3/utils/net_rpc_printer.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1506 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1561 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status        1576 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status        1605 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1622 source3/utils/net_rpc_printer.c 	nt_status = connect_dst_pipe(c, &cli_dst, &pipe_hnd_dst,
nt_status        1624 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status        1625 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status        1629 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1635 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_OK;
nt_status        1647 source3/utils/net_rpc_printer.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1652 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1724 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status        1737 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status        1766 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1785 source3/utils/net_rpc_printer.c 	nt_status = connect_dst_pipe(c, &cli_dst, &pipe_hnd_dst,
nt_status        1787 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status        1788 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status        1791 source3/utils/net_rpc_printer.c 	nt_status = connect_to_service(c, &cli_share_src, &cli->dest_ss,
nt_status        1793 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status        1800 source3/utils/net_rpc_printer.c 	nt_status = connect_to_service(c, &cli_share_dst, &cli_dst->dest_ss,
nt_status        1802 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status        1803 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status        1810 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1816 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_OK;
nt_status        1829 source3/utils/net_rpc_printer.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1835 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1874 source3/utils/net_rpc_printer.c 			nt_status = check_arch_dir(cli_share_dst, archi_table[i].short_archi);
nt_status        1875 source3/utils/net_rpc_printer.c 			if (!NT_STATUS_IS_OK(nt_status))
nt_status        1880 source3/utils/net_rpc_printer.c 			nt_status = copy_print_driver_3(c, mem_ctx, cli_share_src, cli_share_dst,
nt_status        1883 source3/utils/net_rpc_printer.c 			if (!NT_STATUS_IS_OK(nt_status))
nt_status        1889 source3/utils/net_rpc_printer.c 				nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1908 source3/utils/net_rpc_printer.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1926 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status        1946 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status        1978 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1992 source3/utils/net_rpc_printer.c 	nt_status = connect_dst_pipe(c, &cli_dst, &pipe_hnd_dst,
nt_status        1994 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status        1995 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status        1999 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        2005 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_OK;
nt_status        2017 source3/utils/net_rpc_printer.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        2022 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        2088 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status        2100 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status        2134 source3/utils/net_rpc_printer.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        2155 source3/utils/net_rpc_printer.c 	nt_status = connect_dst_pipe(c, &cli_dst, &pipe_hnd_dst,
nt_status        2157 source3/utils/net_rpc_printer.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status        2158 source3/utils/net_rpc_printer.c 		return nt_status;
nt_status        2162 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        2168 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_OK;
nt_status        2176 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        2194 source3/utils/net_rpc_printer.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        2199 source3/utils/net_rpc_printer.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        2260 source3/utils/net_rpc_printer.c 				nt_status = NT_STATUS_NO_MEMORY;
nt_status        2280 source3/utils/net_rpc_printer.c 		nt_status = rpccli_spoolss_EnumPrinterData(pipe_hnd, mem_ctx,
nt_status        2298 source3/utils/net_rpc_printer.c 		while (NT_STATUS_IS_OK(nt_status) && W_ERROR_IS_OK(result)) {
nt_status        2300 source3/utils/net_rpc_printer.c 			nt_status = rpccli_spoolss_EnumPrinterData(pipe_hnd, mem_ctx,
nt_status        2312 source3/utils/net_rpc_printer.c 			if (NT_STATUS_IS_OK(nt_status) && W_ERROR_IS_OK(result)) {
nt_status        2403 source3/utils/net_rpc_printer.c 							nt_status = NT_STATUS_NO_MEMORY;
nt_status        2417 source3/utils/net_rpc_printer.c 							nt_status = NT_STATUS_NO_MEMORY;
nt_status        2501 source3/utils/net_rpc_printer.c 	nt_status = NT_STATUS_OK;
nt_status        2517 source3/utils/net_rpc_printer.c 	return nt_status;
nt_status          97 source3/utils/net_util.c 	NTSTATUS nt_status;
nt_status         110 source3/utils/net_util.c 	nt_status = cli_full_connection(cli_ctx, NULL, server_name,
nt_status         115 source3/utils/net_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         120 source3/utils/net_util.c 		if (NT_STATUS_V(nt_status) ==
nt_status         124 source3/utils/net_util.c 		if (NT_STATUS_V(nt_status) ==
nt_status         128 source3/utils/net_util.c 		if (NT_STATUS_V(nt_status) ==
nt_status         131 source3/utils/net_util.c 		return nt_status;
nt_status         135 source3/utils/net_util.c 		nt_status = cli_force_encryption(*cli_ctx,
nt_status         140 source3/utils/net_util.c 		if (NT_STATUS_EQUAL(nt_status,NT_STATUS_NOT_SUPPORTED)) {
nt_status         144 source3/utils/net_util.c 		} else if (NT_STATUS_EQUAL(nt_status,NT_STATUS_UNKNOWN_REVISION)) {
nt_status         148 source3/utils/net_util.c 		} else if (NT_STATUS_EQUAL(nt_status,NT_STATUS_UNSUPPORTED_COMPRESSION)) {
nt_status         152 source3/utils/net_util.c 		} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         155 source3/utils/net_util.c 				nt_errstr(nt_status));
nt_status         158 source3/utils/net_util.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         164 source3/utils/net_util.c 	return nt_status;
nt_status         189 source3/utils/net_util.c 	NTSTATUS nt_status;
nt_status         191 source3/utils/net_util.c 	nt_status = cli_full_connection(cli_ctx, c->opt_requester_name,
nt_status         197 source3/utils/net_util.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         198 source3/utils/net_util.c 		return nt_status;
nt_status         200 source3/utils/net_util.c 		DEBUG(1,("Cannot connect to server (anonymously).  Error was %s\n", nt_errstr(nt_status)));
nt_status         201 source3/utils/net_util.c 		return nt_status;
nt_status         235 source3/utils/net_util.c 	NTSTATUS nt_status;
nt_status         249 source3/utils/net_util.c 	nt_status = cli_full_connection(cli_ctx, NULL, server_name,
nt_status         259 source3/utils/net_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         260 source3/utils/net_util.c 		DEBUG(1,("Cannot connect to server using kerberos.  Error was %s\n", nt_errstr(nt_status)));
nt_status         261 source3/utils/net_util.c 		return nt_status;
nt_status         265 source3/utils/net_util.c 		nt_status = cli_cm_force_encryption(*cli_ctx,
nt_status         270 source3/utils/net_util.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         276 source3/utils/net_util.c 	return nt_status;
nt_status         292 source3/utils/net_util.c 	NTSTATUS nt_status;
nt_status         309 source3/utils/net_util.c 	nt_status = connect_to_ipc(c, &cli_tmp, NULL, server_name);
nt_status         310 source3/utils/net_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         312 source3/utils/net_util.c 		return nt_status;
nt_status         315 source3/utils/net_util.c 	nt_status = cli_rpc_pipe_open_noauth(cli_tmp, interface,
nt_status         317 source3/utils/net_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         321 source3/utils/net_util.c 		return nt_status;
nt_status         328 source3/utils/net_util.c 	return nt_status;
nt_status         491 source3/utils/net_util.c 	NTSTATUS nt_status;
nt_status         498 source3/utils/net_util.c 			nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         507 source3/utils/net_util.c 		nt_status = connect_to_ipc_anonymous(c, &cli, &server_ss,
nt_status         510 source3/utils/net_util.c 		nt_status = connect_to_ipc(c, &cli, &server_ss,
nt_status         516 source3/utils/net_util.c 	if ( (flags & NET_FLAGS_PDC) && NT_STATUS_IS_OK(nt_status) )
nt_status         520 source3/utils/net_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         522 source3/utils/net_util.c 			  nt_errstr(nt_status));
nt_status         532 source3/utils/net_util.c 	return nt_status;
nt_status          59 source3/utils/netlookup.c 	NTSTATUS nt_status;
nt_status          97 source3/utils/netlookup.c 	nt_status = cli_full_connection(&cs->cli, global_myname(), global_myname(),
nt_status         113 source3/utils/netlookup.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         114 source3/utils/netlookup.c 		DEBUG(2,("create_cs: Connect failed. Error was %s\n", nt_errstr(nt_status)));
nt_status         116 source3/utils/netlookup.c 		cs->err = nt_status;
nt_status         117 source3/utils/netlookup.c 		*perr = nt_status;
nt_status         121 source3/utils/netlookup.c 	nt_status = cli_rpc_pipe_open_noauth(cs->cli,
nt_status         125 source3/utils/netlookup.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         126 source3/utils/netlookup.c 		DEBUG(2,("create_cs: open LSA pipe failed. Error was %s\n", nt_errstr(nt_status)));
nt_status         128 source3/utils/netlookup.c 		cs->err = nt_status;
nt_status         129 source3/utils/netlookup.c 		*perr = nt_status;
nt_status         133 source3/utils/netlookup.c 	nt_status = rpccli_lsa_open_policy(cs->lsapipe, ctx, true,
nt_status         137 source3/utils/netlookup.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         138 source3/utils/netlookup.c 		DEBUG(2,("create_cs: rpccli_lsa_open_policy failed. Error was %s\n", nt_errstr(nt_status)));
nt_status         140 source3/utils/netlookup.c 		cs->err = nt_status;
nt_status         141 source3/utils/netlookup.c 		*perr = nt_status;
nt_status         162 source3/utils/netlookup.c 	NTSTATUS nt_status;
nt_status         171 source3/utils/netlookup.c 	csp = create_cs(c, ctx, &nt_status);
nt_status         173 source3/utils/netlookup.c 		return nt_status;
nt_status         176 source3/utils/netlookup.c 	nt_status = rpccli_lsa_lookup_sids(csp->lsapipe, ctx,
nt_status         183 source3/utils/netlookup.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         184 source3/utils/netlookup.c 		return nt_status;
nt_status         202 source3/utils/netlookup.c 	NTSTATUS nt_status;
nt_status         207 source3/utils/netlookup.c 	csp = create_cs(c, ctx, &nt_status);
nt_status         209 source3/utils/netlookup.c 		return nt_status;
nt_status         212 source3/utils/netlookup.c 	nt_status = rpccli_lsa_lookup_names(csp->lsapipe, ctx,
nt_status         219 source3/utils/netlookup.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         220 source3/utils/netlookup.c 		return nt_status;
nt_status         312 source3/utils/ntlm_auth.c 		if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
nt_status         319 source3/utils/ntlm_auth.c 			 response.data.auth.nt_status);
nt_status         321 source3/utils/ntlm_auth.c 		if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
nt_status         328 source3/utils/ntlm_auth.c 			  response.data.auth.nt_status));
nt_status         348 source3/utils/ntlm_auth.c 	NTSTATUS nt_status;
nt_status         405 source3/utils/ntlm_auth.c 	if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
nt_status         406 source3/utils/ntlm_auth.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         410 source3/utils/ntlm_auth.c 		return nt_status;
nt_status         413 source3/utils/ntlm_auth.c 	nt_status = (NT_STATUS(response.data.auth.nt_status));
nt_status         414 source3/utils/ntlm_auth.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         418 source3/utils/ntlm_auth.c 		return nt_status;
nt_status         439 source3/utils/ntlm_auth.c 	return nt_status;
nt_status         451 source3/utils/ntlm_auth.c 	NTSTATUS nt_status;
nt_status         499 source3/utils/ntlm_auth.c 	if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0))
nt_status         501 source3/utils/ntlm_auth.c 		nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         505 source3/utils/ntlm_auth.c 		return nt_status;
nt_status         508 source3/utils/ntlm_auth.c 	nt_status = (NT_STATUS(response.data.auth.nt_status));
nt_status         509 source3/utils/ntlm_auth.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         514 source3/utils/ntlm_auth.c 		return nt_status;
nt_status         519 source3/utils/ntlm_auth.c     return nt_status;
nt_status         525 source3/utils/ntlm_auth.c 	NTSTATUS nt_status;
nt_status         531 source3/utils/ntlm_auth.c 	nt_status = contact_winbind_auth_crap(ntlmssp_state->user, ntlmssp_state->domain,
nt_status         540 source3/utils/ntlm_auth.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         553 source3/utils/ntlm_auth.c 		DEBUG(NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED) ? 0 : 3, 
nt_status         563 source3/utils/ntlm_auth.c 	return nt_status;
nt_status         568 source3/utils/ntlm_auth.c 	NTSTATUS nt_status;
nt_status         573 source3/utils/ntlm_auth.c 	nt_status = ntlm_password_check(ntlmssp_state,
nt_status         583 source3/utils/ntlm_auth.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         591 source3/utils/ntlm_auth.c 			  nt_errstr(nt_status)));
nt_status         594 source3/utils/ntlm_auth.c 	return nt_status;
nt_status         729 source3/utils/ntlm_auth.c 	NTSTATUS nt_status;
nt_status         807 source3/utils/ntlm_auth.c 		nt_status = ntlm_auth_start_ntlmssp_server(
nt_status         809 source3/utils/ntlm_auth.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         810 source3/utils/ntlm_auth.c 			x_fprintf(x_stdout, "BH %s\n", nt_errstr(nt_status));
nt_status         820 source3/utils/ntlm_auth.c 	nt_status = ntlmssp_update(state->ntlmssp_state, request, &reply);
nt_status         822 source3/utils/ntlm_auth.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         830 source3/utils/ntlm_auth.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED)) {
nt_status         831 source3/utils/ntlm_auth.c 		x_fprintf(x_stdout, "BH %s\n", nt_errstr(nt_status));
nt_status         832 source3/utils/ntlm_auth.c 		DEBUG(0, ("NTLMSSP BH: %s\n", nt_errstr(nt_status)));
nt_status         835 source3/utils/ntlm_auth.c 	} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         836 source3/utils/ntlm_auth.c 		x_fprintf(x_stdout, "NA %s\n", nt_errstr(nt_status));
nt_status         837 source3/utils/ntlm_auth.c 		DEBUG(10, ("NTLMSSP %s\n", nt_errstr(nt_status)));
nt_status         860 source3/utils/ntlm_auth.c 	NTSTATUS nt_status;
nt_status         909 source3/utils/ntlm_auth.c 		nt_status = do_ccache_ntlm_auth(empty_blob, empty_blob, NULL);
nt_status         910 source3/utils/ntlm_auth.c 		if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         966 source3/utils/ntlm_auth.c 		nt_status = ntlm_auth_start_ntlmssp_client(
nt_status         968 source3/utils/ntlm_auth.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         969 source3/utils/ntlm_auth.c 			x_fprintf(x_stdout, "BH %s\n", nt_errstr(nt_status));
nt_status         982 source3/utils/ntlm_auth.c 		nt_status = do_ccache_ntlm_auth(state->initial_message, request,
nt_status         985 source3/utils/ntlm_auth.c 		nt_status = ntlmssp_update(state->ntlmssp_state, request,
nt_status         989 source3/utils/ntlm_auth.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status        1002 source3/utils/ntlm_auth.c 	} else if (NT_STATUS_IS_OK(nt_status)) {
nt_status        1022 source3/utils/ntlm_auth.c 		x_fprintf(x_stdout, "BH %s\n", nt_errstr(nt_status));
nt_status        1023 source3/utils/ntlm_auth.c 		DEBUG(0, ("NTLMSSP BH: %s\n", nt_errstr(nt_status)));
nt_status        2238 source3/utils/ntlm_auth.c 	NTSTATUS nt_status;
nt_status        2257 source3/utils/ntlm_auth.c 	nt_status = contact_winbind_auth_crap(opt_username, opt_domain, 
nt_status        2267 source3/utils/ntlm_auth.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2270 source3/utils/ntlm_auth.c 			  NT_STATUS_V(nt_status));
nt_status          50 source3/utils/ntlm_auth_diagnostics.c 	NTSTATUS nt_status;
nt_status          94 source3/utils/ntlm_auth_diagnostics.c 	nt_status = contact_winbind_auth_crap(opt_username, opt_domain, 
nt_status         106 source3/utils/ntlm_auth_diagnostics.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         109 source3/utils/ntlm_auth_diagnostics.c 			 NT_STATUS_V(nt_status));
nt_status         174 source3/utils/ntlm_auth_diagnostics.c 	NTSTATUS nt_status;
nt_status         193 source3/utils/ntlm_auth_diagnostics.c 	nt_status = contact_winbind_auth_crap(opt_username, opt_domain, 
nt_status         205 source3/utils/ntlm_auth_diagnostics.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         208 source3/utils/ntlm_auth_diagnostics.c 			 NT_STATUS_V(nt_status));
nt_status         240 source3/utils/ntlm_auth_diagnostics.c 	NTSTATUS nt_status;
nt_status         264 source3/utils/ntlm_auth_diagnostics.c 	nt_status = contact_winbind_auth_crap(opt_username, opt_domain, 
nt_status         276 source3/utils/ntlm_auth_diagnostics.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         279 source3/utils/ntlm_auth_diagnostics.c 			 NT_STATUS_V(nt_status));
nt_status         314 source3/utils/ntlm_auth_diagnostics.c 	NTSTATUS nt_status;
nt_status         355 source3/utils/ntlm_auth_diagnostics.c 	nt_status = contact_winbind_auth_crap(opt_username, opt_domain, 
nt_status         368 source3/utils/ntlm_auth_diagnostics.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         371 source3/utils/ntlm_auth_diagnostics.c 			 NT_STATUS_V(nt_status));
nt_status         442 source3/utils/ntlm_auth_diagnostics.c 	NTSTATUS nt_status;
nt_status         506 source3/utils/ntlm_auth_diagnostics.c 	nt_status = contact_winbind_auth_crap(opt_username, opt_domain, 
nt_status         520 source3/utils/ntlm_auth_diagnostics.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         523 source3/utils/ntlm_auth_diagnostics.c 			 NT_STATUS_V(nt_status));
nt_status         961 source3/utils/smbcacls.c 	NTSTATUS nt_status;
nt_status         978 source3/utils/smbcacls.c 	nt_status = cli_full_connection(&c, global_myname(), server, 
nt_status         987 source3/utils/smbcacls.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         988 source3/utils/smbcacls.c 		DEBUG(0,("cli_full_connection failed! (%s)\n", nt_errstr(nt_status)));
nt_status         993 source3/utils/smbcacls.c 		nt_status = cli_cm_force_encryption(c,
nt_status         998 source3/utils/smbcacls.c                 if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         372 source3/utils/smbcquotas.c 	NTSTATUS nt_status;
nt_status         390 source3/utils/smbcquotas.c 	nt_status = cli_full_connection(&c, global_myname(), server, 
nt_status         399 source3/utils/smbcquotas.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         400 source3/utils/smbcquotas.c 		DEBUG(0,("cli_full_connection failed! (%s)\n", nt_errstr(nt_status)));
nt_status         405 source3/utils/smbcquotas.c 		nt_status = cli_cm_force_encryption(c,
nt_status         410 source3/utils/smbcquotas.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         838 source3/winbindd/idmap_ad.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         883 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_OK;
nt_status         902 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_NO_MEMORY;
nt_status         908 source3/winbindd/idmap_ad.c 		nt_status = ads_ntstatus(ads_status);
nt_status         921 source3/winbindd/idmap_ad.c 	nt_status = NT_STATUS_OK;
nt_status         928 source3/winbindd/idmap_ad.c 	return nt_status;
nt_status         944 source3/winbindd/idmap_ad.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         951 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         958 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_FILE_IS_OFFLINE;
nt_status         971 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_OBJECT_PATH_NOT_FOUND;
nt_status         981 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_NO_MEMORY;
nt_status         987 source3/winbindd/idmap_ad.c 		nt_status = ads_ntstatus(ads_status);
nt_status         997 source3/winbindd/idmap_ad.c 	nt_status = NT_STATUS_OK;
nt_status        1007 source3/winbindd/idmap_ad.c 	return nt_status;
nt_status        1023 source3/winbindd/idmap_ad.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1031 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status        1038 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_FILE_IS_OFFLINE;
nt_status        1051 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_OBJECT_PATH_NOT_FOUND;
nt_status        1060 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_NO_MEMORY;
nt_status        1066 source3/winbindd/idmap_ad.c 		nt_status = ads_ntstatus(ads_status);
nt_status        1080 source3/winbindd/idmap_ad.c 		nt_status = NT_STATUS_NO_MEMORY;
nt_status        1084 source3/winbindd/idmap_ad.c 	nt_status = NT_STATUS_OK;
nt_status        1094 source3/winbindd/idmap_ad.c 	return nt_status;
nt_status          73 source3/winbindd/idmap_adex/cell_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status          78 source3/winbindd/idmap_adex/cell_util.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status          79 source3/winbindd/idmap_adex/cell_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status          89 source3/winbindd/idmap_adex/cell_util.c 	nt_status = NT_STATUS_OK;
nt_status          92 source3/winbindd/idmap_adex/cell_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          94 source3/winbindd/idmap_adex/cell_util.c 			 nt_errstr(nt_status)));
nt_status          97 source3/winbindd/idmap_adex/cell_util.c 	return nt_status;
nt_status         103 source3/winbindd/idmap_adex/cell_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         111 source3/winbindd/idmap_adex/cell_util.c 		nt_status = NT_STATUS_NO_MEMORY;
nt_status         112 source3/winbindd/idmap_adex/cell_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         119 source3/winbindd/idmap_adex/cell_util.c 	nt_status = gc_find_forest_root(gc, cell_dns_domain(c));
nt_status         120 source3/winbindd/idmap_adex/cell_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         123 source3/winbindd/idmap_adex/cell_util.c 	BAIL_ON_PTR_ERROR(c->forest_name, nt_status);
nt_status         130 source3/winbindd/idmap_adex/cell_util.c 	return nt_status;
nt_status         140 source3/winbindd/idmap_adex/cell_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         152 source3/winbindd/idmap_adex/cell_util.c 		nt_status = NT_STATUS_NO_MEMORY;
nt_status         153 source3/winbindd/idmap_adex/cell_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         176 source3/winbindd/idmap_adex/cell_util.c 		nt_status = NT_STATUS_INSUFFICIENT_RESOURCES;
nt_status         177 source3/winbindd/idmap_adex/cell_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         181 source3/winbindd/idmap_adex/cell_util.c 	nt_status = NT_STATUS_OK;
nt_status         184 source3/winbindd/idmap_adex/cell_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         186 source3/winbindd/idmap_adex/cell_util.c 			 nt_errstr(nt_status)));
nt_status         191 source3/winbindd/idmap_adex/cell_util.c 	return nt_status;
nt_status         213 source3/winbindd/idmap_adex/cell_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         225 source3/winbindd/idmap_adex/cell_util.c 	BAIL_ON_PTR_ERROR(tmp_dn, nt_status);
nt_status         239 source3/winbindd/idmap_adex/cell_util.c 		BAIL_ON_PTR_ERROR(domain, nt_status);
nt_status         243 source3/winbindd/idmap_adex/cell_util.c 	BAIL_ON_PTR_ERROR(dns_name, nt_status);
nt_status         245 source3/winbindd/idmap_adex/cell_util.c 	nt_status = NT_STATUS_OK;
nt_status         248 source3/winbindd/idmap_adex/cell_util.c 	PRINT_NTSTATUS_ERROR(nt_status, "cell_dn_to_dns", 1);
nt_status         262 source3/winbindd/idmap_adex/cell_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         266 source3/winbindd/idmap_adex/cell_util.c 		nt_status = NT_STATUS_INVALID_USER_BUFFER;
nt_status         267 source3/winbindd/idmap_adex/cell_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         284 source3/winbindd/idmap_adex/cell_util.c 		nt_status = NT_STATUS_INVALID_ACCOUNT_NAME;
nt_status         285 source3/winbindd/idmap_adex/cell_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         288 source3/winbindd/idmap_adex/cell_util.c 	nt_status = NT_STATUS_OK;
nt_status         291 source3/winbindd/idmap_adex/cell_util.c 	return nt_status;
nt_status          49 source3/winbindd/idmap_adex/domain_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status          73 source3/winbindd/idmap_adex/domain_util.c 	BAIL_ON_PTR_ERROR(dc, nt_status);
nt_status          76 source3/winbindd/idmap_adex/domain_util.c 	BAIL_ON_PTR_ERROR(dc->dns_name, nt_status);
nt_status          80 source3/winbindd/idmap_adex/domain_util.c 	nt_status = NT_STATUS_OK;
nt_status          85 source3/winbindd/idmap_adex/domain_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          88 source3/winbindd/idmap_adex/domain_util.c 			 domain, nt_errstr(nt_status)));
nt_status          91 source3/winbindd/idmap_adex/domain_util.c 	return nt_status;
nt_status         119 source3/winbindd/idmap_adex/domain_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         130 source3/winbindd/idmap_adex/domain_util.c 	nt_status = dc_add_domain(lp_realm());
nt_status         131 source3/winbindd/idmap_adex/domain_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         134 source3/winbindd/idmap_adex/domain_util.c 		nt_status = NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
nt_status         135 source3/winbindd/idmap_adex/domain_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         146 source3/winbindd/idmap_adex/domain_util.c 			nt_status = dc_add_domain(domains[i].dns_name);
nt_status         147 source3/winbindd/idmap_adex/domain_util.c 			BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         151 source3/winbindd/idmap_adex/domain_util.c 	nt_status = NT_STATUS_OK;
nt_status         154 source3/winbindd/idmap_adex/domain_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         156 source3/winbindd/idmap_adex/domain_util.c 			 nt_errstr(nt_status)));
nt_status         161 source3/winbindd/idmap_adex/domain_util.c 	return nt_status;
nt_status         175 source3/winbindd/idmap_adex/domain_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         179 source3/winbindd/idmap_adex/domain_util.c 	nt_status = ads_ntstatus(status);
nt_status         181 source3/winbindd/idmap_adex/domain_util.c 	return nt_status;
nt_status         213 source3/winbindd/idmap_adex/domain_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         221 source3/winbindd/idmap_adex/domain_util.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         222 source3/winbindd/idmap_adex/domain_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         226 source3/winbindd/idmap_adex/domain_util.c 	BAIL_ON_PTR_ERROR(dns_domain, nt_status);
nt_status         229 source3/winbindd/idmap_adex/domain_util.c 		nt_status = NT_STATUS_TRUSTED_DOMAIN_FAILURE;
nt_status         230 source3/winbindd/idmap_adex/domain_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         239 source3/winbindd/idmap_adex/domain_util.c 		BAIL_ON_PTR_ERROR(base_dn, nt_status);
nt_status         241 source3/winbindd/idmap_adex/domain_util.c 		nt_status = cell_connect_dn(&dc->domain_cell, base_dn);
nt_status         243 source3/winbindd/idmap_adex/domain_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         245 source3/winbindd/idmap_adex/domain_util.c 		nt_status = cell_lookup_settings(dc->domain_cell);
nt_status         246 source3/winbindd/idmap_adex/domain_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         258 source3/winbindd/idmap_adex/domain_util.c 		nt_status = dc_do_search(dc, dn, LDAP_SCOPE_BASE,
nt_status         265 source3/winbindd/idmap_adex/domain_util.c 		BAIL_ON_PTR_ERROR(sid_str, nt_status);
nt_status         269 source3/winbindd/idmap_adex/domain_util.c 		BAIL_ON_PTR_ERROR(filter, nt_status);
nt_status         272 source3/winbindd/idmap_adex/domain_util.c 		BAIL_ON_PTR_ERROR(base, nt_status);
nt_status         274 source3/winbindd/idmap_adex/domain_util.c 		nt_status = dc_do_search(dc, base, LDAP_SCOPE_SUBTREE,
nt_status         277 source3/winbindd/idmap_adex/domain_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         285 source3/winbindd/idmap_adex/domain_util.c 	return nt_status;
nt_status         103 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         114 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(ads, nt_status);
nt_status         122 source3/winbindd/idmap_adex/gc_util.c 	nt_status = ads_ntstatus(ads_status);
nt_status         123 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         132 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_IO_TIMEOUT;
nt_status         133 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         137 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(gc->forest_name, nt_status);
nt_status         144 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         152 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         161 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_INVALID_SERVER_STATE;
nt_status         162 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         181 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_NO_MEMORY;
nt_status         182 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         189 source3/winbindd/idmap_adex/gc_util.c 	nt_status = gc_find_forest_root(gc, domain);
nt_status         190 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         209 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(dn, nt_status);
nt_status         213 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(gc->search_base, nt_status);
nt_status         219 source3/winbindd/idmap_adex/gc_util.c 	nt_status = cell_connect_dn(&gc->forest_cell, gc->search_base);
nt_status         220 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         224 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(gc->forest_cell, nt_status);
nt_status         246 source3/winbindd/idmap_adex/gc_util.c 		nt_status = cell_connect(gc->forest_cell);
nt_status         247 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         249 source3/winbindd/idmap_adex/gc_util.c 		nt_status = cell_lookup_settings(gc->forest_cell);
nt_status         250 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         264 source3/winbindd/idmap_adex/gc_util.c 	nt_status = NT_STATUS_OK;
nt_status         267 source3/winbindd/idmap_adex/gc_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         270 source3/winbindd/idmap_adex/gc_util.c 			 domain, nt_errstr(nt_status)));
nt_status         273 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         304 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         314 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
nt_status         315 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         321 source3/winbindd/idmap_adex/gc_util.c 	nt_status = gc_add_forest(lp_realm());
nt_status         322 source3/winbindd/idmap_adex/gc_util.c 	WARN_ON_NTSTATUS_ERROR(nt_status);
nt_status         335 source3/winbindd/idmap_adex/gc_util.c 			nt_status = gc_add_forest(domains[i].dns_name);
nt_status         336 source3/winbindd/idmap_adex/gc_util.c 			WARN_ON_NTSTATUS_ERROR(nt_status);
nt_status         363 source3/winbindd/idmap_adex/gc_util.c 			nt_status = gc_add_forest(domains[i].dns_name);
nt_status         364 source3/winbindd/idmap_adex/gc_util.c 			WARN_ON_NTSTATUS_ERROR(nt_status);
nt_status         368 source3/winbindd/idmap_adex/gc_util.c 	nt_status = NT_STATUS_OK;
nt_status         371 source3/winbindd/idmap_adex/gc_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         373 source3/winbindd/idmap_adex/gc_util.c 			 nt_errstr(nt_status)));
nt_status         378 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         387 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status         391 source3/winbindd/idmap_adex/gc_util.c 		nt_status = gc_init_list();
nt_status         392 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         398 source3/winbindd/idmap_adex/gc_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         400 source3/winbindd/idmap_adex/gc_util.c 			 nt_errstr(nt_status)));
nt_status         417 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         423 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         424 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         434 source3/winbindd/idmap_adex/gc_util.c 	nt_status = ads_ntstatus(ads_status);
nt_status         435 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         440 source3/winbindd/idmap_adex/gc_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         442 source3/winbindd/idmap_adex/gc_util.c 			 filter, nt_errstr(nt_status)));
nt_status         445 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         458 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         467 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_INVALID_DOMAIN_STATE;
nt_status         468 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         474 source3/winbindd/idmap_adex/gc_util.c 		nt_status = gc_search_forest(gc, &m, filter);
nt_status         475 source3/winbindd/idmap_adex/gc_util.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         480 source3/winbindd/idmap_adex/gc_util.c 		nt_status = add_ads_result_to_array(cell_connection(gc->forest_cell),
nt_status         483 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         495 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
nt_status         496 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         499 source3/winbindd/idmap_adex/gc_util.c 	nt_status = NT_STATUS_OK;
nt_status         502 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         517 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         519 source3/winbindd/idmap_adex/gc_util.c 	nt_status = gc_search_all_forests(filter, &ads_list,
nt_status         522 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         524 source3/winbindd/idmap_adex/gc_util.c 	nt_status = check_result_unique(ads_list[0], msg_list[0]);
nt_status         525 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         533 source3/winbindd/idmap_adex/gc_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         540 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         553 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         572 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(name_user, nt_status);
nt_status         575 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(name_filter, nt_status);
nt_status         577 source3/winbindd/idmap_adex/gc_util.c 	nt_status = gc_search_all_forests(name_filter, &ads_list,
nt_status         579 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         583 source3/winbindd/idmap_adex/gc_util.c 	nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
nt_status         596 source3/winbindd/idmap_adex/gc_util.c 			BAIL_ON_PTR_ERROR(dn, nt_status);
nt_status         600 source3/winbindd/idmap_adex/gc_util.c 			BAIL_ON_PTR_ERROR(dns_domain, nt_status);
nt_status         616 source3/winbindd/idmap_adex/gc_util.c 					nt_status = NT_STATUS_INVALID_SID;
nt_status         617 source3/winbindd/idmap_adex/gc_util.c 					BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         622 source3/winbindd/idmap_adex/gc_util.c 				nt_status = get_sid_type(ads, msg, sid_type);
nt_status         623 source3/winbindd/idmap_adex/gc_util.c 				BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         626 source3/winbindd/idmap_adex/gc_util.c 				nt_status = NT_STATUS_OK;
nt_status         641 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         652 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         663 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         664 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         670 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(dn, nt_status);
nt_status         676 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(dns_domain, nt_status);
nt_status         682 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_TRUSTED_DOMAIN_FAILURE;
nt_status         683 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         687 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(sam_name, nt_status);
nt_status         692 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_PTR_ERROR((*name), nt_status);
nt_status         695 source3/winbindd/idmap_adex/gc_util.c 	nt_status = NT_STATUS_OK;
nt_status         700 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         711 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         720 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(sid_string, nt_status);
nt_status         724 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_PTR_ERROR(filter, nt_status);
nt_status         726 source3/winbindd/idmap_adex/gc_util.c 	nt_status = gc_search_all_forests_unique(filter, &ads, &msg);
nt_status         727 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         729 source3/winbindd/idmap_adex/gc_util.c 	nt_status = get_object_account_name(ads, msg, name);
nt_status         730 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         732 source3/winbindd/idmap_adex/gc_util.c 	nt_status = get_sid_type(ads, msg, sid_type);
nt_status         733 source3/winbindd/idmap_adex/gc_util.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         739 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         751 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         757 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         758 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         771 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_PTR_ERROR(ads_tmp, nt_status);
nt_status         774 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_PTR_ERROR(msg_tmp, nt_status);
nt_status         778 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_PTR_ERROR(ads_tmp, nt_status);
nt_status         782 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_PTR_ERROR(msg_tmp, nt_status);
nt_status         793 source3/winbindd/idmap_adex/gc_util.c 	nt_status = NT_STATUS_OK;
nt_status         796 source3/winbindd/idmap_adex/gc_util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         801 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         829 source3/winbindd/idmap_adex/gc_util.c 	NTSTATUS nt_status;
nt_status         835 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
nt_status         836 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         840 source3/winbindd/idmap_adex/gc_util.c 		nt_status = NT_STATUS_DUPLICATE_NAME;
nt_status         841 source3/winbindd/idmap_adex/gc_util.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         844 source3/winbindd/idmap_adex/gc_util.c 	nt_status = NT_STATUS_OK;
nt_status         847 source3/winbindd/idmap_adex/gc_util.c 	return nt_status;
nt_status         159 source3/winbindd/idmap_adex/idmap_adex.c 	NTSTATUS nt_status;
nt_status         167 source3/winbindd/idmap_adex/idmap_adex.c 	nt_status = _idmap_adex_init(dom, NULL);
nt_status         168 source3/winbindd/idmap_adex/idmap_adex.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         169 source3/winbindd/idmap_adex/idmap_adex.c 		return nt_status;
nt_status         212 source3/winbindd/idmap_adex/idmap_adex.c 	NTSTATUS nt_status;
nt_status         220 source3/winbindd/idmap_adex/idmap_adex.c 	nt_status = _idmap_adex_init(dom, NULL);
nt_status         221 source3/winbindd/idmap_adex/idmap_adex.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         222 source3/winbindd/idmap_adex/idmap_adex.c 		return nt_status;
nt_status         324 source3/winbindd/idmap_adex/idmap_adex.c 	NTSTATUS nt_status;
nt_status         327 source3/winbindd/idmap_adex/idmap_adex.c 	nt_status = _idmap_adex_init(NULL, NULL);
nt_status         328 source3/winbindd/idmap_adex/idmap_adex.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         329 source3/winbindd/idmap_adex/idmap_adex.c 		return nt_status;
nt_status         346 source3/winbindd/idmap_adex/idmap_adex.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         349 source3/winbindd/idmap_adex/idmap_adex.c 	nt_status = _idmap_adex_init(NULL, NULL);
nt_status         350 source3/winbindd/idmap_adex/idmap_adex.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         353 source3/winbindd/idmap_adex/idmap_adex.c 		nt_status = NT_STATUS_INVALID_SERVER_STATE;
nt_status         354 source3/winbindd/idmap_adex/idmap_adex.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         357 source3/winbindd/idmap_adex/idmap_adex.c 	nt_status = cell->provider->map_to_alias(mem_ctx, e->domain,
nt_status         363 source3/winbindd/idmap_adex/idmap_adex.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         364 source3/winbindd/idmap_adex/idmap_adex.c 		nt_status = NT_STATUS_NONE_MAPPED;
nt_status         367 source3/winbindd/idmap_adex/idmap_adex.c 	return nt_status;
nt_status         377 source3/winbindd/idmap_adex/idmap_adex.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         380 source3/winbindd/idmap_adex/idmap_adex.c 	nt_status = _idmap_adex_init(NULL, NULL);
nt_status         381 source3/winbindd/idmap_adex/idmap_adex.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         384 source3/winbindd/idmap_adex/idmap_adex.c 		nt_status = NT_STATUS_INVALID_SERVER_STATE;
nt_status         385 source3/winbindd/idmap_adex/idmap_adex.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         389 source3/winbindd/idmap_adex/idmap_adex.c 	nt_status = cell->provider->map_from_alias(mem_ctx, e->domain,
nt_status         395 source3/winbindd/idmap_adex/idmap_adex.c 	if (!NT_STATUS_IS_OK(nt_status))
nt_status         396 source3/winbindd/idmap_adex/idmap_adex.c 		nt_status = NT_STATUS_NONE_MAPPED;
nt_status         399 source3/winbindd/idmap_adex/idmap_adex.c 	return nt_status;
nt_status         255 source3/winbindd/idmap_adex/likewise_cell.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         260 source3/winbindd/idmap_adex/likewise_cell.c 		nt_status = NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
nt_status         261 source3/winbindd/idmap_adex/likewise_cell.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         274 source3/winbindd/idmap_adex/likewise_cell.c 	BAIL_ON_PTR_ERROR(ads, nt_status);
nt_status         290 source3/winbindd/idmap_adex/likewise_cell.c 	    nt_status = NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND;
nt_status         291 source3/winbindd/idmap_adex/likewise_cell.c 	    BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         300 source3/winbindd/idmap_adex/likewise_cell.c 	nt_status = ads_ntstatus(ads_status);
nt_status         303 source3/winbindd/idmap_adex/likewise_cell.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         308 source3/winbindd/idmap_adex/likewise_cell.c 	return nt_status;
nt_status         316 source3/winbindd/idmap_adex/likewise_cell.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         321 source3/winbindd/idmap_adex/likewise_cell.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         322 source3/winbindd/idmap_adex/likewise_cell.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         326 source3/winbindd/idmap_adex/likewise_cell.c 		nt_status = NT_STATUS_NO_MEMORY;
nt_status         327 source3/winbindd/idmap_adex/likewise_cell.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         338 source3/winbindd/idmap_adex/likewise_cell.c 	nt_status = cell_connect(new_cell);
nt_status         339 source3/winbindd/idmap_adex/likewise_cell.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         344 source3/winbindd/idmap_adex/likewise_cell.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         346 source3/winbindd/idmap_adex/likewise_cell.c 			 dn ? dn : "NULL", nt_errstr(nt_status)));
nt_status         350 source3/winbindd/idmap_adex/likewise_cell.c 	return nt_status;
nt_status         368 source3/winbindd/idmap_adex/likewise_cell.c 	NTSTATUS nt_status;
nt_status         373 source3/winbindd/idmap_adex/likewise_cell.c 		nt_status = cell_connect(c);
nt_status         374 source3/winbindd/idmap_adex/likewise_cell.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         375 source3/winbindd/idmap_adex/likewise_cell.c 			status = ADS_ERROR_NT(nt_status);
nt_status         427 source3/winbindd/idmap_adex/likewise_cell.c 				nt_status = cell_connect(c);
nt_status         428 source3/winbindd/idmap_adex/likewise_cell.c 				if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         429 source3/winbindd/idmap_adex/likewise_cell.c 					status = ADS_ERROR_NT(nt_status);
nt_status          56 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status;
nt_status          96 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_PTR_ERROR(oc_filter, nt_status);
nt_status          97 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_PTR_ERROR(attr_filter, nt_status);
nt_status         126 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status;
nt_status         139 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_PTR_ERROR(user_attr_filter, nt_status);
nt_status         140 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_PTR_ERROR(group_attr_filter, nt_status);
nt_status         176 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         190 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_PTR_ERROR(sid_str, nt_status);
nt_status         205 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         208 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_PTR_ERROR(filter, nt_status);
nt_status         211 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_PTR_ERROR(base, nt_status);
nt_status         216 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = ads_ntstatus(ads_status);
nt_status         217 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         223 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
nt_status         224 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         228 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_DUPLICATE_NAME;
nt_status         229 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         233 source3/winbindd/idmap_adex/provider_unified.c 	PRINT_NTSTATUS_ERROR(nt_status, "search_cell", 4);
nt_status         238 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         249 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         253 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = dc_search_domains(cell, msg, dn, sid);
nt_status         254 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         260 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
nt_status         261 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         265 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_DUPLICATE_NAME;
nt_status         266 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         270 source3/winbindd/idmap_adex/provider_unified.c 	PRINT_NTSTATUS_ERROR(nt_status, "search_domain", 4);
nt_status         273 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         283 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         295 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_OK;
nt_status         303 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_OBJECT_NAME_INVALID;
nt_status         304 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         309 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_OBJECT_PATH_NOT_FOUND;
nt_status         310 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         315 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_PTR_ERROR(dns_domain, nt_status);
nt_status         319 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_TRUSTED_DOMAIN_FAILURE;
nt_status         320 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         323 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = NT_STATUS_OK;
nt_status         329 source3/winbindd/idmap_adex/provider_unified.c 	return NT_STATUS_IS_OK(nt_status);
nt_status         345 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         354 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         355 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         361 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_NO_SUCH_FILE;
nt_status         362 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         372 source3/winbindd/idmap_adex/provider_unified.c 			BAIL_ON_PTR_ERROR(entry_dn, nt_status);
nt_status         381 source3/winbindd/idmap_adex/provider_unified.c 					nt_status = NT_STATUS_DUPLICATE_NAME;
nt_status         382 source3/winbindd/idmap_adex/provider_unified.c 					BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         388 source3/winbindd/idmap_adex/provider_unified.c 				BAIL_ON_PTR_ERROR((*dn), nt_status);
nt_status         397 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
nt_status         398 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         420 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_PTR_ERROR(keywords, nt_status);
nt_status         424 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_INTERNAL_DB_CORRUPTION;
nt_status         425 source3/winbindd/idmap_adex/provider_unified.c 			BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         429 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_INVALID_SID;
nt_status         430 source3/winbindd/idmap_adex/provider_unified.c 			BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         434 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = NT_STATUS_OK;
nt_status         437 source3/winbindd/idmap_adex/provider_unified.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         443 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         458 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         471 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_INVALID_DOMAIN_STATE;
nt_status         472 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         486 source3/winbindd/idmap_adex/provider_unified.c 			BAIL_ON_PTR_ERROR(sid_binstr, nt_status);
nt_status         501 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = gc_search_forest(gc, &m, filter);
nt_status         502 source3/winbindd/idmap_adex/provider_unified.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         507 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = add_ads_result_to_array(cell_connection(gc->forest_cell),
nt_status         510 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         517 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = check_result_unique_scoped(ads_list, msg_list, num_resp,
nt_status         519 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         521 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = search_domain(&domain_cell, &m, dn, &user_sid);
nt_status         522 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         530 source3/winbindd/idmap_adex/provider_unified.c 	PRINT_NTSTATUS_ERROR(nt_status, "search_forest", 4);
nt_status         537 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         547 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         553 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_INVALID_SERVER_STATE;
nt_status         554 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         563 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = search_forest(cell, &msg, fdata);
nt_status         565 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = search_cell(cell, &msg, fdata);
nt_status         577 source3/winbindd/idmap_adex/provider_unified.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         598 source3/winbindd/idmap_adex/provider_unified.c 	PRINT_NTSTATUS_ERROR(nt_status, "search_cell_list", 3);
nt_status         600 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         612 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         632 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_PTR_ERROR(keywords, nt_status);
nt_status         636 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_INTERNAL_DB_CORRUPTION;
nt_status         637 source3/winbindd/idmap_adex/provider_unified.c 			BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         641 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_INVALID_SID;
nt_status         642 source3/winbindd/idmap_adex/provider_unified.c 			BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         646 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = NT_STATUS_OK;
nt_status         651 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         663 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status         676 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_INTERNAL_DB_CORRUPTION;
nt_status         690 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         698 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_INTERNAL_DB_CORRUPTION;
nt_status         704 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_INTERNAL_DB_CORRUPTION;
nt_status         714 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         718 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = NT_STATUS_OK;
nt_status         723 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         735 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         747 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
nt_status         748 source3/winbindd/idmap_adex/provider_unified.c 			BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         757 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_PTR_ERROR(keywords, nt_status);
nt_status         761 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
nt_status         762 source3/winbindd/idmap_adex/provider_unified.c 			BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         767 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
nt_status         768 source3/winbindd/idmap_adex/provider_unified.c 			BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         773 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = NT_STATUS_OK;
nt_status         778 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         789 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status         802 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         803 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         807 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = get_object_uint32(c, msg, id_attr, id);
nt_status         808 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         811 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         824 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status;
nt_status         826 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = get_object_type(c, msg, type);
nt_status         827 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         829 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = get_object_id(c, msg, *type, id);
nt_status         830 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         833 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         846 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         868 source3/winbindd/idmap_adex/provider_unified.c 			nt_status = NT_STATUS_NO_MEMORY;
nt_status         869 source3/winbindd/idmap_adex/provider_unified.c 			BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         878 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND;
nt_status         879 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         882 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = NT_STATUS_OK;
nt_status         887 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         902 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status;
nt_status         904 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = get_object_string(c, msg, ctx, ADEX_ATTR_HOMEDIR, homedir);
nt_status         905 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         907 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = get_object_string(c, msg, ctx, ADEX_ATTR_SHELL, shell);
nt_status         908 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         910 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = get_object_string(c, msg, ctx, ADEX_ATTR_GECOS, gecos);
nt_status         913 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = get_object_uint32(c, msg, ADEX_ATTR_GIDNUM, p_gid);
nt_status         914 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         917 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         929 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         935 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = get_object_type(c, msg, &type);
nt_status         936 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         947 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         948 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         952 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = get_object_string(c, msg, ctx, attr, alias);
nt_status         953 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         956 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         967 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status;
nt_status         974 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = search_cell_list(&cell, &msg, &filter);
nt_status         975 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         977 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = pull_sid(cell, msg, sid);
nt_status         978 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         983 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         995 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status;
nt_status        1001 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = search_cell_list(&cell, &msg, &filter);
nt_status        1002 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1004 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = pull_id(cell, msg, id, type);
nt_status        1005 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1008 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status        1009 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1015 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status        1029 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status;
nt_status        1036 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = search_cell_list(&cell, &msg, &filter);
nt_status        1037 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1039 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = get_object_type(cell, msg, &type);
nt_status        1040 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1043 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_NO_SUCH_USER;
nt_status        1044 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1047 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = pull_nss_info(cell, msg, ctx, homedir, shell, gecos,
nt_status        1049 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1054 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status        1065 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1074 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = gc_name_to_sid(domain, name, &sid, &sid_type);
nt_status        1075 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1082 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = search_cell_list(&cell, &msg, &filter);
nt_status        1083 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1087 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = pull_alias(cell, msg, ctx, alias);
nt_status        1088 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1091 source3/winbindd/idmap_adex/provider_unified.c 	PRINT_NTSTATUS_ERROR(nt_status, "map_to_alias", 3);
nt_status        1096 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status        1110 source3/winbindd/idmap_adex/provider_unified.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1125 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = search_cell_list(&cell_alias, &msg_alias, &filter);
nt_status        1126 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1128 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = pull_sid(cell_alias, msg_alias, &sid);
nt_status        1129 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1139 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = search_cell_list(&cell_sid, &msg_sid, &filter);
nt_status        1140 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1143 source3/winbindd/idmap_adex/provider_unified.c 		nt_status = NT_STATUS_OBJECT_PATH_NOT_FOUND;
nt_status        1144 source3/winbindd/idmap_adex/provider_unified.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1149 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = gc_sid_to_name(&sid, &canonical_name, &type);
nt_status        1150 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status        1153 source3/winbindd/idmap_adex/provider_unified.c 	BAIL_ON_PTR_ERROR((*name), nt_status);
nt_status        1155 source3/winbindd/idmap_adex/provider_unified.c 	nt_status = NT_STATUS_OK;
nt_status        1158 source3/winbindd/idmap_adex/provider_unified.c 	PRINT_NTSTATUS_ERROR(nt_status, "map_from_alias", 3);
nt_status        1167 source3/winbindd/idmap_adex/provider_unified.c 	return nt_status;
nt_status         108 source3/winbindd/idmap_hash/idmap_hash.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         117 source3/winbindd/idmap_hash/idmap_hash.c 		nt_status = NT_STATUS_OK;
nt_status         122 source3/winbindd/idmap_hash/idmap_hash.c 		nt_status = NT_STATUS_TRUSTED_DOMAIN_FAILURE;
nt_status         123 source3/winbindd/idmap_hash/idmap_hash.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         129 source3/winbindd/idmap_hash/idmap_hash.c 	BAIL_ON_PTR_NT_ERROR(hashed_domains, nt_status);
nt_status         151 source3/winbindd/idmap_hash/idmap_hash.c 	return nt_status;
nt_status         160 source3/winbindd/idmap_hash/idmap_hash.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         168 source3/winbindd/idmap_hash/idmap_hash.c 	nt_status = be_init(dom, NULL);
nt_status         169 source3/winbindd/idmap_hash/idmap_hash.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         172 source3/winbindd/idmap_hash/idmap_hash.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         173 source3/winbindd/idmap_hash/idmap_hash.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         186 source3/winbindd/idmap_hash/idmap_hash.c 			nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         187 source3/winbindd/idmap_hash/idmap_hash.c 			BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         202 source3/winbindd/idmap_hash/idmap_hash.c 	return nt_status;
nt_status         211 source3/winbindd/idmap_hash/idmap_hash.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         219 source3/winbindd/idmap_hash/idmap_hash.c 	nt_status = be_init(dom, NULL);
nt_status         220 source3/winbindd/idmap_hash/idmap_hash.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         223 source3/winbindd/idmap_hash/idmap_hash.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         224 source3/winbindd/idmap_hash/idmap_hash.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         249 source3/winbindd/idmap_hash/idmap_hash.c 	return nt_status;
nt_status         284 source3/winbindd/idmap_hash/idmap_hash.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         286 source3/winbindd/idmap_hash/idmap_hash.c 	nt_status = nss_hash_init(e);
nt_status         287 source3/winbindd/idmap_hash/idmap_hash.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         290 source3/winbindd/idmap_hash/idmap_hash.c 		nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         291 source3/winbindd/idmap_hash/idmap_hash.c 		BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         295 source3/winbindd/idmap_hash/idmap_hash.c 	BAIL_ON_PTR_NT_ERROR(*homedir, nt_status);
nt_status         298 source3/winbindd/idmap_hash/idmap_hash.c 	BAIL_ON_PTR_NT_ERROR(*shell, nt_status);
nt_status         310 source3/winbindd/idmap_hash/idmap_hash.c 	return nt_status;
nt_status         321 source3/winbindd/idmap_hash/idmap_hash.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         325 source3/winbindd/idmap_hash/idmap_hash.c 	BAIL_ON_PTR_NT_ERROR(value, nt_status);
nt_status         327 source3/winbindd/idmap_hash/idmap_hash.c 	nt_status = mapfile_lookup_key(mem_ctx, value, alias);
nt_status         328 source3/winbindd/idmap_hash/idmap_hash.c 	BAIL_ON_NTSTATUS_ERROR(nt_status);
nt_status         331 source3/winbindd/idmap_hash/idmap_hash.c 	return nt_status;
nt_status        4231 source3/winbindd/winbindd_cache.c 	NTSTATUS nt_status;
nt_status        4257 source3/winbindd/winbindd_cache.c 	nt_status = nss_get_info( domain->name, user_sid, ctx, ads, msg, 
nt_status        4260 source3/winbindd/winbindd_cache.c 	DEBUG(10, ("nss_get_info returned %s\n", nt_errstr(nt_status)));
nt_status        4262 source3/winbindd/winbindd_cache.c 	if ( NT_STATUS_IS_OK(nt_status) ) {
nt_status        4268 source3/winbindd/winbindd_cache.c 		wcache_save_user_pwinfo( domain, nt_status, user_sid,
nt_status        4272 source3/winbindd/winbindd_cache.c 	if ( NT_STATUS_EQUAL( nt_status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
nt_status        4278 source3/winbindd/winbindd_cache.c 	return nt_status;	
nt_status         191 source3/winbindd/winbindd_group.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         193 source3/winbindd/winbindd_group.c 	nt_status = normalize_name_map(mem_ctx, domain, gr_name,
nt_status         197 source3/winbindd/winbindd_group.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         202 source3/winbindd/winbindd_group.c 	else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) {
nt_status         601 source3/winbindd/winbindd_group.c 		NTSTATUS nt_status;
nt_status         604 source3/winbindd/winbindd_group.c 		nt_status = expand_groups( mem_ctx, domain,
nt_status         608 source3/winbindd/winbindd_group.c 		if ( !NT_STATUS_IS_OK(nt_status) ) {
nt_status         645 source3/winbindd/winbindd_group.c 			nt_status = add_names_to_list( mem_ctx, &names,
nt_status         648 source3/winbindd/winbindd_group.c 			if ( !NT_STATUS_IS_OK(nt_status) ) {
nt_status         764 source3/winbindd/winbindd_group.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         772 source3/winbindd/winbindd_group.c 	nt_status = normalize_name_unmap(state->mem_ctx,
nt_status         777 source3/winbindd/winbindd_group.c 	if (!NT_STATUS_IS_OK(nt_status) &&
nt_status         778 source3/winbindd/winbindd_group.c 	    !NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED))
nt_status         894 source3/winbindd/winbindd_group.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         920 source3/winbindd/winbindd_group.c 	nt_status = normalize_name_unmap(s->state->mem_ctx, raw_name,
nt_status         924 source3/winbindd/winbindd_group.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         932 source3/winbindd/winbindd_group.c 	else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) {
nt_status        1545 source3/winbindd/winbindd_group.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        1565 source3/winbindd/winbindd_group.c 	nt_status = normalize_name_unmap(state->mem_ctx,
nt_status        1571 source3/winbindd/winbindd_group.c 	if (!NT_STATUS_IS_OK(nt_status) &&
nt_status        1572 source3/winbindd/winbindd_group.c 	    !NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED))
nt_status        2021 source3/winbindd/winbindd_pam.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status        2028 source3/winbindd/winbindd_pam.c 	nt_status = normalize_name_unmap(state->mem_ctx,
nt_status        2034 source3/winbindd/winbindd_pam.c 	if (NT_STATUS_IS_OK(nt_status) ||
nt_status        2035 source3/winbindd/winbindd_pam.c 	    NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED))
nt_status         663 source3/winbindd/winbindd_passdb.c 	NTSTATUS nt_status;
nt_status         677 source3/winbindd/winbindd_passdb.c 	nt_status = pdb_enum_trusteddoms(tmp_ctx, num_domains, &domains);
nt_status         678 source3/winbindd/winbindd_passdb.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         680 source3/winbindd/winbindd_passdb.c 		return nt_status;
nt_status          78 source3/winbindd/winbindd_user.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status          87 source3/winbindd/winbindd_user.c 		nt_status = NT_STATUS_NO_SUCH_DOMAIN;
nt_status         114 source3/winbindd/winbindd_user.c 	nt_status = normalize_name_map(ctx, domain, user_name, &mapped_name);
nt_status         117 source3/winbindd/winbindd_user.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         121 source3/winbindd/winbindd_user.c 	else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) {
nt_status         261 source3/winbindd/winbindd_user.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         303 source3/winbindd/winbindd_user.c 	nt_status = normalize_name_map(s->state->mem_ctx, s->domain,
nt_status         307 source3/winbindd/winbindd_user.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         312 source3/winbindd/winbindd_user.c 	else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) {
nt_status         428 source3/winbindd/winbindd_user.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         440 source3/winbindd/winbindd_user.c 	nt_status = normalize_name_unmap(state->mem_ctx, domuser,
nt_status         446 source3/winbindd/winbindd_user.c 	if (!NT_STATUS_IS_OK(nt_status) &&
nt_status         447 source3/winbindd/winbindd_user.c 	    !NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED))
nt_status        1429 source3/winbindd/winbindd_util.c 	NTSTATUS nt_status;
nt_status        1442 source3/winbindd/winbindd_util.c 	nt_status = resolve_username_to_alias(mem_ctx, domain,
nt_status        1444 source3/winbindd/winbindd_util.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status        1452 source3/winbindd/winbindd_util.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND)) {
nt_status        1456 source3/winbindd/winbindd_util.c 		return nt_status;
nt_status        1479 source3/winbindd/winbindd_util.c 	NTSTATUS nt_status;
nt_status        1498 source3/winbindd/winbindd_util.c 	nt_status = resolve_alias_to_username(mem_ctx, domain,
nt_status        1500 source3/winbindd/winbindd_util.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status        1508 source3/winbindd/winbindd_util.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND)) {
nt_status        1512 source3/winbindd/winbindd_util.c 		return nt_status;
nt_status        1691 source3/winbindd/winbindd_util.c 	resp->data.auth.nt_status = NT_STATUS_V(result);
nt_status         245 source4/auth/auth.h NTSTATUS auth_nt_status_squash(NTSTATUS nt_status);
nt_status         772 source4/auth/gensec/gensec.c 	NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         788 source4/auth/gensec/gensec.c 		nt_status = gensec_start_mech_by_ops(gensec_security, ops[i]);
nt_status         789 source4/auth/gensec/gensec.c 		if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_PARAMETER)) {
nt_status         794 source4/auth/gensec/gensec.c 	return nt_status;
nt_status         286 source4/auth/gensec/gensec.h NTSTATUS auth_nt_status_squash(NTSTATUS nt_status);
nt_status         256 source4/auth/gensec/gensec_gssapi.c 	NTSTATUS nt_status;
nt_status         262 source4/auth/gensec/gensec_gssapi.c 	nt_status = gensec_gssapi_start(gensec_security);
nt_status         263 source4/auth/gensec/gensec_gssapi.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         264 source4/auth/gensec/gensec_gssapi.c 		return nt_status;
nt_status         292 source4/auth/gensec/gensec_gssapi.c 	NTSTATUS nt_status;
nt_status         294 source4/auth/gensec/gensec_gssapi.c 	nt_status = gensec_gssapi_server_start(gensec_security);
nt_status         296 source4/auth/gensec/gensec_gssapi.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         300 source4/auth/gensec/gensec_gssapi.c 	return nt_status;
nt_status         308 source4/auth/gensec/gensec_gssapi.c 	NTSTATUS nt_status;
nt_status         329 source4/auth/gensec/gensec_gssapi.c 	nt_status = gensec_gssapi_start(gensec_security);
nt_status         330 source4/auth/gensec/gensec_gssapi.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         331 source4/auth/gensec/gensec_gssapi.c 		return nt_status;
nt_status         389 source4/auth/gensec/gensec_gssapi.c 	NTSTATUS nt_status;
nt_status         391 source4/auth/gensec/gensec_gssapi.c 	nt_status = gensec_gssapi_client_start(gensec_security);
nt_status         393 source4/auth/gensec/gensec_gssapi.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         397 source4/auth/gensec/gensec_gssapi.c 	return nt_status;
nt_status         438 source4/auth/gensec/gensec_gssapi.c 	NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE;
nt_status         558 source4/auth/gensec/gensec_gssapi.c 				return nt_status;
nt_status         564 source4/auth/gensec/gensec_gssapi.c 			return nt_status;
nt_status        1219 source4/auth/gensec/gensec_gssapi.c 	NTSTATUS nt_status;
nt_status        1258 source4/auth/gensec/gensec_gssapi.c 		nt_status = kerberos_pac_blob_to_server_info(mem_ctx, 
nt_status        1263 source4/auth/gensec/gensec_gssapi.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1265 source4/auth/gensec/gensec_gssapi.c 			return nt_status;
nt_status        1297 source4/auth/gensec/gensec_gssapi.c 			nt_status = gensec_security->auth_context->get_server_info_principal(mem_ctx, 
nt_status        1302 source4/auth/gensec/gensec_gssapi.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1304 source4/auth/gensec/gensec_gssapi.c 				return nt_status;
nt_status        1315 source4/auth/gensec/gensec_gssapi.c 	nt_status = auth_generate_session_info(mem_ctx, gensec_security->event_ctx, 
nt_status        1317 source4/auth/gensec/gensec_gssapi.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1319 source4/auth/gensec/gensec_gssapi.c 		return nt_status;
nt_status        1322 source4/auth/gensec/gensec_gssapi.c 	nt_status = gensec_gssapi_session_key(gensec_security, &session_info->session_key);
nt_status        1323 source4/auth/gensec/gensec_gssapi.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1325 source4/auth/gensec/gensec_gssapi.c 		return nt_status;
nt_status         191 source4/auth/gensec/gensec_krb5.c 	NTSTATUS nt_status;
nt_status         194 source4/auth/gensec/gensec_krb5.c 	nt_status = gensec_krb5_start(gensec_security);
nt_status         195 source4/auth/gensec/gensec_krb5.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         196 source4/auth/gensec/gensec_krb5.c 		return nt_status;
nt_status         207 source4/auth/gensec/gensec_krb5.c 	NTSTATUS nt_status = gensec_krb5_server_start(gensec_security);
nt_status         209 source4/auth/gensec/gensec_krb5.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         214 source4/auth/gensec/gensec_krb5.c 	return nt_status;
nt_status         221 source4/auth/gensec/gensec_krb5.c 	NTSTATUS nt_status;
nt_status         243 source4/auth/gensec/gensec_krb5.c 	nt_status = gensec_krb5_start(gensec_security);
nt_status         244 source4/auth/gensec/gensec_krb5.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         245 source4/auth/gensec/gensec_krb5.c 		return nt_status;
nt_status         333 source4/auth/gensec/gensec_krb5.c 	NTSTATUS nt_status = gensec_krb5_client_start(gensec_security);
nt_status         335 source4/auth/gensec/gensec_krb5.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         340 source4/auth/gensec/gensec_krb5.c 	return nt_status;
nt_status         380 source4/auth/gensec/gensec_krb5.c 	NTSTATUS nt_status;
nt_status         396 source4/auth/gensec/gensec_krb5.c 		nt_status = NT_STATUS_MORE_PROCESSING_REQUIRED;
nt_status         397 source4/auth/gensec/gensec_krb5.c 		return nt_status;
nt_status         427 source4/auth/gensec/gensec_krb5.c 			nt_status = NT_STATUS_ACCESS_DENIED;
nt_status         430 source4/auth/gensec/gensec_krb5.c 			nt_status = NT_STATUS_OK;
nt_status         436 source4/auth/gensec/gensec_krb5.c 		return nt_status;
nt_status         554 source4/auth/gensec/gensec_krb5.c 	NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
nt_status         613 source4/auth/gensec/gensec_krb5.c 			nt_status = gensec_security->auth_context->get_server_info_principal(mem_ctx, 
nt_status         617 source4/auth/gensec/gensec_krb5.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         619 source4/auth/gensec/gensec_krb5.c 				return nt_status;
nt_status         630 source4/auth/gensec/gensec_krb5.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         632 source4/auth/gensec/gensec_krb5.c 			return nt_status;
nt_status         647 source4/auth/gensec/gensec_krb5.c 		nt_status = kerberos_pac_logon_info(gensec_krb5_state, 
nt_status         656 source4/auth/gensec/gensec_krb5.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         658 source4/auth/gensec/gensec_krb5.c 			return nt_status;
nt_status         662 source4/auth/gensec/gensec_krb5.c 		nt_status = make_server_info_netlogon_validation(mem_ctx, 
nt_status         666 source4/auth/gensec/gensec_krb5.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         668 source4/auth/gensec/gensec_krb5.c 			return nt_status;
nt_status         673 source4/auth/gensec/gensec_krb5.c 	nt_status = auth_generate_session_info(mem_ctx, gensec_security->event_ctx, gensec_security->settings->lp_ctx, server_info, &session_info);
nt_status         675 source4/auth/gensec/gensec_krb5.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         677 source4/auth/gensec/gensec_krb5.c 		return nt_status;
nt_status         680 source4/auth/gensec/gensec_krb5.c 	nt_status = gensec_krb5_session_key(gensec_security, &session_info->session_key);
nt_status         682 source4/auth/gensec/gensec_krb5.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         684 source4/auth/gensec/gensec_krb5.c 		return nt_status;
nt_status         193 source4/auth/gensec/schannel_state.c 	NTSTATUS nt_status;
nt_status         207 source4/auth/gensec/schannel_state.c 	nt_status = schannel_store_session_key_ldb(mem_ctx, ldb, creds);
nt_status         209 source4/auth/gensec/schannel_state.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         223 source4/auth/gensec/schannel_state.c 	return nt_status;
nt_status         336 source4/auth/gensec/schannel_state.c 	NTSTATUS nt_status;
nt_status         344 source4/auth/gensec/schannel_state.c 	nt_status = schannel_fetch_session_key_ldb(mem_ctx, ldb,
nt_status         348 source4/auth/gensec/schannel_state.c 	return nt_status;
nt_status          70 source4/auth/gensec/socket.c 		NTSTATUS nt_status;
nt_status          76 source4/auth/gensec/socket.c 		nt_status = gensec_wrap(gensec_security, 
nt_status          79 source4/auth/gensec/socket.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          81 source4/auth/gensec/socket.c 			return nt_status;
nt_status         110 source4/auth/gensec/socket.c 		NTSTATUS nt_status;
nt_status         128 source4/auth/gensec/socket.c 		nt_status = gensec_unwrap(gensec_security, 
nt_status         131 source4/auth/gensec/socket.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         132 source4/auth/gensec/socket.c 			return nt_status;
nt_status         136 source4/auth/gensec/socket.c 		return nt_status;
nt_status         294 source4/auth/gensec/socket.c 	NTSTATUS nt_status;
nt_status         302 source4/auth/gensec/socket.c 	nt_status = gensec_unwrap_packets(gensec_socket->gensec_security, 
nt_status         306 source4/auth/gensec/socket.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         308 source4/auth/gensec/socket.c 		return nt_status;
nt_status         347 source4/auth/gensec/socket.c 	NTSTATUS nt_status;
nt_status         379 source4/auth/gensec/socket.c 	nt_status = gensec_wrap_packets(gensec_socket->gensec_security, 
nt_status         383 source4/auth/gensec/socket.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         385 source4/auth/gensec/socket.c 		return nt_status;
nt_status         391 source4/auth/gensec/socket.c 	nt_status = packet_send_callback(gensec_socket->packet, 
nt_status         423 source4/auth/gensec/socket.c 	NTSTATUS nt_status;
nt_status         425 source4/auth/gensec/socket.c 	nt_status = socket_create_with_ops(mem_ctx, &gensec_socket_ops, &new_sock, 
nt_status         427 source4/auth/gensec/socket.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         429 source4/auth/gensec/socket.c 		return nt_status;
nt_status         338 source4/auth/gensec/spnego.c 		NTSTATUS nt_status;
nt_status         362 source4/auth/gensec/spnego.c 		nt_status = all_ops[i]->magic(gensec_security, &in);
nt_status         363 source4/auth/gensec/spnego.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         369 source4/auth/gensec/spnego.c 		nt_status = gensec_subcontext_start(spnego_state, 
nt_status         373 source4/auth/gensec/spnego.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         374 source4/auth/gensec/spnego.c 			return nt_status;
nt_status         377 source4/auth/gensec/spnego.c 		nt_status = gensec_start_mech_by_ops(spnego_state->sub_sec_security,
nt_status         379 source4/auth/gensec/spnego.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         380 source4/auth/gensec/spnego.c 			return nt_status;
nt_status         382 source4/auth/gensec/spnego.c 		nt_status = gensec_update(spnego_state->sub_sec_security,
nt_status         384 source4/auth/gensec/spnego.c 		return nt_status;
nt_status         403 source4/auth/gensec/spnego.c 	NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         425 source4/auth/gensec/spnego.c 				nt_status = gensec_subcontext_start(spnego_state,
nt_status         428 source4/auth/gensec/spnego.c 				if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         429 source4/auth/gensec/spnego.c 					return nt_status;
nt_status         432 source4/auth/gensec/spnego.c 				nt_status = gensec_start_mech_by_ops(spnego_state->sub_sec_security,
nt_status         434 source4/auth/gensec/spnego.c 				if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         440 source4/auth/gensec/spnego.c 				nt_status = gensec_update(spnego_state->sub_sec_security,
nt_status         444 source4/auth/gensec/spnego.c 				if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_PARAMETER) || 
nt_status         445 source4/auth/gensec/spnego.c 				    NT_STATUS_EQUAL(nt_status, NT_STATUS_CANT_ACCESS_DOMAIN_INFO)) {
nt_status         449 source4/auth/gensec/spnego.c 						  spnego_state->sub_sec_security->ops->name, nt_errstr(nt_status)));
nt_status         467 source4/auth/gensec/spnego.c 			nt_status = gensec_subcontext_start(spnego_state,
nt_status         470 source4/auth/gensec/spnego.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         471 source4/auth/gensec/spnego.c 				return nt_status;
nt_status         474 source4/auth/gensec/spnego.c 			nt_status = gensec_start_mech_by_ops(spnego_state->sub_sec_security,
nt_status         476 source4/auth/gensec/spnego.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         485 source4/auth/gensec/spnego.c 			nt_status = gensec_update(spnego_state->sub_sec_security,
nt_status         496 source4/auth/gensec/spnego.c 				if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_PARAMETER) || 
nt_status         497 source4/auth/gensec/spnego.c 				    NT_STATUS_EQUAL(nt_status, NT_STATUS_CANT_ACCESS_DOMAIN_INFO)) {
nt_status         501 source4/auth/gensec/spnego.c 						  spnego_state->sub_sec_security->ops->name, nt_errstr(nt_status)));
nt_status         520 source4/auth/gensec/spnego.c 		if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_PARAMETER)) {
nt_status         522 source4/auth/gensec/spnego.c 			nt_status = NT_STATUS_MORE_PROCESSING_REQUIRED;
nt_status         525 source4/auth/gensec/spnego.c 		if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_PARAMETER) 
nt_status         526 source4/auth/gensec/spnego.c 		    && !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) 
nt_status         527 source4/auth/gensec/spnego.c 		    && !NT_STATUS_IS_OK(nt_status)) {
nt_status         529 source4/auth/gensec/spnego.c 				  spnego_state->sub_sec_security->ops->name, nt_errstr(nt_status)));
nt_status         537 source4/auth/gensec/spnego.c 			return nt_status;
nt_status         541 source4/auth/gensec/spnego.c 		return nt_status; /* OK, INVALID_PARAMETER ore MORE PROCESSING */
nt_status         550 source4/auth/gensec/spnego.c 	return nt_status;
nt_status         563 source4/auth/gensec/spnego.c 	NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         582 source4/auth/gensec/spnego.c 		nt_status = gensec_subcontext_start(spnego_state,
nt_status         585 source4/auth/gensec/spnego.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         586 source4/auth/gensec/spnego.c 			return nt_status;
nt_status         589 source4/auth/gensec/spnego.c 		nt_status = gensec_start_mech_by_ops(spnego_state->sub_sec_security,
nt_status         591 source4/auth/gensec/spnego.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         599 source4/auth/gensec/spnego.c 			nt_status = gensec_update(spnego_state->sub_sec_security,
nt_status         604 source4/auth/gensec/spnego.c 			if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) 
nt_status         605 source4/auth/gensec/spnego.c 			    && !NT_STATUS_IS_OK(nt_status)) {
nt_status         607 source4/auth/gensec/spnego.c 					  spnego_state->sub_sec_security->ops->name, nt_errstr(nt_status)));
nt_status         657 source4/auth/gensec/spnego.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         666 source4/auth/gensec/spnego.c 	DEBUG(1, ("Failed to setup SPNEGO negTokenInit request: %s\n", nt_errstr(nt_status)));
nt_status         679 source4/auth/gensec/spnego.c 						  NTSTATUS nt_status,
nt_status         693 source4/auth/gensec/spnego.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {	
nt_status         697 source4/auth/gensec/spnego.c 	} else if (NT_STATUS_IS_OK(nt_status)) {
nt_status         706 source4/auth/gensec/spnego.c 		DEBUG(2, ("SPNEGO login failed: %s\n", nt_errstr(nt_status)));
nt_status         717 source4/auth/gensec/spnego.c 	return nt_status;
nt_status         747 source4/auth/gensec/spnego.c 		NTSTATUS nt_status;
nt_status         766 source4/auth/gensec/spnego.c 			nt_status = gensec_spnego_parse_negTokenInit(gensec_security,
nt_status         773 source4/auth/gensec/spnego.c 			nt_status = gensec_spnego_server_negTokenTarg(gensec_security,
nt_status         776 source4/auth/gensec/spnego.c 								      nt_status,
nt_status         783 source4/auth/gensec/spnego.c 			return nt_status;
nt_status         785 source4/auth/gensec/spnego.c 			nt_status = gensec_spnego_create_negTokenInit(gensec_security, spnego_state, 
nt_status         789 source4/auth/gensec/spnego.c 			return nt_status;
nt_status         798 source4/auth/gensec/spnego.c 		NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status         802 source4/auth/gensec/spnego.c 			nt_status = gensec_spnego_create_negTokenInit(gensec_security, spnego_state, 
nt_status         806 source4/auth/gensec/spnego.c 			return nt_status;
nt_status         831 source4/auth/gensec/spnego.c 		nt_status = gensec_spnego_parse_negTokenInit(gensec_security,
nt_status         838 source4/auth/gensec/spnego.c 		if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) && !NT_STATUS_IS_OK(nt_status)) {
nt_status         840 source4/auth/gensec/spnego.c 			return nt_status;
nt_status         860 source4/auth/gensec/spnego.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         869 source4/auth/gensec/spnego.c 		NTSTATUS nt_status;
nt_status         899 source4/auth/gensec/spnego.c 		nt_status = gensec_update(spnego_state->sub_sec_security,
nt_status         903 source4/auth/gensec/spnego.c 		if (NT_STATUS_IS_OK(nt_status) && spnego.negTokenTarg.mechListMIC.length > 0) {
nt_status         905 source4/auth/gensec/spnego.c 			nt_status = gensec_check_packet(spnego_state->sub_sec_security,
nt_status         912 source4/auth/gensec/spnego.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         914 source4/auth/gensec/spnego.c 					nt_errstr(nt_status)));
nt_status         917 source4/auth/gensec/spnego.c 		if (NT_STATUS_IS_OK(nt_status) && new_spnego) {
nt_status         918 source4/auth/gensec/spnego.c 			nt_status = gensec_sign_packet(spnego_state->sub_sec_security,
nt_status         925 source4/auth/gensec/spnego.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         927 source4/auth/gensec/spnego.c 					nt_errstr(nt_status)));
nt_status         931 source4/auth/gensec/spnego.c 		nt_status = gensec_spnego_server_negTokenTarg(gensec_security,
nt_status         934 source4/auth/gensec/spnego.c 							      nt_status,
nt_status         941 source4/auth/gensec/spnego.c 		return nt_status;
nt_status         945 source4/auth/gensec/spnego.c 		NTSTATUS nt_status;
nt_status         981 source4/auth/gensec/spnego.c 			nt_status = gensec_subcontext_start(spnego_state,
nt_status         984 source4/auth/gensec/spnego.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         986 source4/auth/gensec/spnego.c 				return nt_status;
nt_status         989 source4/auth/gensec/spnego.c 			nt_status = gensec_start_mech_by_oid(spnego_state->sub_sec_security,
nt_status         991 source4/auth/gensec/spnego.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         993 source4/auth/gensec/spnego.c 				return nt_status;
nt_status         996 source4/auth/gensec/spnego.c 			nt_status = gensec_update(spnego_state->sub_sec_security,
nt_status        1004 source4/auth/gensec/spnego.c 				nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status        1007 source4/auth/gensec/spnego.c 				nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status        1009 source4/auth/gensec/spnego.c 				nt_status = NT_STATUS_OK;
nt_status        1011 source4/auth/gensec/spnego.c 			if (NT_STATUS_IS_OK(nt_status) && spnego.negTokenTarg.mechListMIC.length > 0) {
nt_status        1012 source4/auth/gensec/spnego.c 				nt_status = gensec_check_packet(spnego_state->sub_sec_security,
nt_status        1019 source4/auth/gensec/spnego.c 				if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1021 source4/auth/gensec/spnego.c 						nt_errstr(nt_status)));
nt_status        1027 source4/auth/gensec/spnego.c 			nt_status = gensec_update(spnego_state->sub_sec_security,
nt_status        1032 source4/auth/gensec/spnego.c 			if (NT_STATUS_IS_OK(nt_status)) {
nt_status        1036 source4/auth/gensec/spnego.c 			if (NT_STATUS_IS_OK(nt_status) && new_spnego) {
nt_status        1037 source4/auth/gensec/spnego.c 				nt_status = gensec_sign_packet(spnego_state->sub_sec_security,
nt_status        1044 source4/auth/gensec/spnego.c 				if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1046 source4/auth/gensec/spnego.c 						nt_errstr(nt_status)));
nt_status        1049 source4/auth/gensec/spnego.c 			if (NT_STATUS_IS_OK(nt_status)) {
nt_status        1056 source4/auth/gensec/spnego.c 		if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)
nt_status        1057 source4/auth/gensec/spnego.c 			&& !NT_STATUS_IS_OK(nt_status)) {
nt_status        1060 source4/auth/gensec/spnego.c 				  nt_errstr(nt_status)));
nt_status        1061 source4/auth/gensec/spnego.c 			return nt_status;
nt_status        1078 source4/auth/gensec/spnego.c 			nt_status = NT_STATUS_MORE_PROCESSING_REQUIRED;
nt_status        1087 source4/auth/gensec/spnego.c 				nt_status = NT_STATUS_INVALID_PARAMETER;
nt_status        1093 source4/auth/gensec/spnego.c 		return nt_status;
nt_status         353 source4/auth/kerberos/kerberos_pac.c 	NTSTATUS nt_status;
nt_status         356 source4/auth/kerberos/kerberos_pac.c 	nt_status = kerberos_decode_pac(mem_ctx, 
nt_status         366 source4/auth/kerberos/kerberos_pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         367 source4/auth/kerberos/kerberos_pac.c 		return nt_status;
nt_status         436 source4/auth/kerberos/kerberos_pac.c 	NTSTATUS nt_status;
nt_status         496 source4/auth/kerberos/kerberos_pac.c 		nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         497 source4/auth/kerberos/kerberos_pac.c 		DEBUG(1, ("PAC (presig) push failed: %s\n", nt_errstr(nt_status)));
nt_status         521 source4/auth/kerberos/kerberos_pac.c 		nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         522 source4/auth/kerberos/kerberos_pac.c 		DEBUG(1, ("PAC (final) push failed: %s\n", nt_errstr(nt_status)));
nt_status         543 source4/auth/kerberos/kerberos_pac.c 	NTSTATUS nt_status;
nt_status         623 source4/auth/kerberos/kerberos_pac.c 	nt_status = auth_convert_server_info_saminfo3(LOGON_INFO, server_info, &sam3);
nt_status         624 source4/auth/kerberos/kerberos_pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         625 source4/auth/kerberos/kerberos_pac.c 		DEBUG(1, ("Getting Samba info failed: %s\n", nt_errstr(nt_status)));
nt_status         663 source4/auth/kerberos/kerberos_pac.c 	NTSTATUS nt_status;
nt_status         693 source4/auth/kerberos/kerberos_pac.c 		nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         694 source4/auth/kerberos/kerberos_pac.c 		DEBUG(0,("can't parse the PAC LOGON_INFO: %s\n", nt_errstr(nt_status)));
nt_status         701 source4/auth/kerberos/kerberos_pac.c 	nt_status = make_server_info_netlogon_validation(mem_ctx,
nt_status         705 source4/auth/kerberos/kerberos_pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         723 source4/auth/kerberos/kerberos_pac.c 		nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         725 source4/auth/kerberos/kerberos_pac.c 			nt_errstr(nt_status)));
nt_status         742 source4/auth/kerberos/kerberos_pac.c 		nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         744 source4/auth/kerberos/kerberos_pac.c 			nt_errstr(nt_status)));
nt_status          56 source4/auth/ntlm/auth.c 	NTSTATUS nt_status;
nt_status          69 source4/auth/ntlm/auth.c 		nt_status = method->ops->get_challenge(method, auth_ctx, &challenge);
nt_status          70 source4/auth/ntlm/auth.c 		if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOT_IMPLEMENTED)) {
nt_status          74 source4/auth/ntlm/auth.c 		NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         115 source4/auth/ntlm/auth.c 	NTSTATUS nt_status;
nt_status         123 source4/auth/ntlm/auth.c 		nt_status = method->ops->get_server_info_principal(mem_ctx, auth_ctx, principal, server_info);
nt_status         124 source4/auth/ntlm/auth.c 		if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOT_IMPLEMENTED)) {
nt_status         128 source4/auth/ntlm/auth.c 		NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         257 source4/auth/ntlm/auth.c 	NTSTATUS nt_status;
nt_status         277 source4/auth/ntlm/auth.c 		nt_status = map_user_info(req, lp_workgroup(auth_ctx->lp_ctx), user_info, &user_info_tmp);
nt_status         278 source4/auth/ntlm/auth.c 		if (!NT_STATUS_IS_OK(nt_status)) goto failed;
nt_status         286 source4/auth/ntlm/auth.c 	nt_status = auth_get_challenge(auth_ctx, &challenge);
nt_status         287 source4/auth/ntlm/auth.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         289 source4/auth/ntlm/auth.c 			(unsigned)auth_ctx->challenge.data.length, auth_ctx->challenge.set_by, nt_errstr(nt_status)));
nt_status         301 source4/auth/ntlm/auth.c 	nt_status = NT_STATUS_NO_SUCH_USER; /* If all the modules say 'not for me', then this is reasonable */
nt_status         313 source4/auth/ntlm/auth.c 		nt_status = result;
nt_status         316 source4/auth/ntlm/auth.c 		if (!NT_STATUS_IS_OK(nt_status)) break;
nt_status         322 source4/auth/ntlm/auth.c 			nt_status = NT_STATUS_NO_MEMORY;
nt_status         329 source4/auth/ntlm/auth.c 	req->status = nt_status;
nt_status          53 source4/auth/ntlm/auth_developer.c 	NTSTATUS nt_status;
nt_status          61 source4/auth/ntlm/auth_developer.c 		nt_status = nt_status_string_to_code(user);
nt_status          65 source4/auth/ntlm/auth_developer.c 		nt_status = NT_STATUS(error_num);
nt_status          67 source4/auth/ntlm/auth_developer.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         130 source4/auth/ntlm/auth_developer.c 	return nt_status;
nt_status         233 source4/auth/ntlm/auth_sam.c 	NTSTATUS nt_status;
nt_status         252 source4/auth/ntlm/auth_sam.c 	nt_status = samdb_result_passwords(mem_ctx, auth_context->lp_ctx, msgs[0], &lm_pwd, &nt_pwd);
nt_status         253 source4/auth/ntlm/auth_sam.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         255 source4/auth/ntlm/auth_sam.c 	nt_status = authsam_password_ok(auth_context, mem_ctx, 
nt_status         258 source4/auth/ntlm/auth_sam.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         260 source4/auth/ntlm/auth_sam.c 	nt_status = authsam_account_ok(mem_ctx, sam_ctx, 
nt_status         268 source4/auth/ntlm/auth_sam.c 	return nt_status;
nt_status         279 source4/auth/ntlm/auth_sam.c 	NTSTATUS nt_status;
nt_status         303 source4/auth/ntlm/auth_sam.c 	nt_status = authsam_search_account(tmp_ctx, sam_ctx, account_name, domain, &msgs, &domain_ref_msgs);
nt_status         304 source4/auth/ntlm/auth_sam.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         306 source4/auth/ntlm/auth_sam.c 		return nt_status;
nt_status         309 source4/auth/ntlm/auth_sam.c 	nt_status = authsam_authenticate(ctx->auth_ctx, tmp_ctx, sam_ctx, msgs, domain_ref_msgs, user_info,
nt_status         311 source4/auth/ntlm/auth_sam.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         313 source4/auth/ntlm/auth_sam.c 		return nt_status;
nt_status         316 source4/auth/ntlm/auth_sam.c 	nt_status = authsam_make_server_info(tmp_ctx, sam_ctx, lp_netbios_name(ctx->auth_ctx->lp_ctx), 
nt_status         320 source4/auth/ntlm/auth_sam.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         322 source4/auth/ntlm/auth_sam.c 		return nt_status;
nt_status         429 source4/auth/ntlm/auth_sam.c 	NTSTATUS nt_status;
nt_status         449 source4/auth/ntlm/auth_sam.c 	nt_status = sam_get_results_principal(sam_ctx, tmp_ctx, principal, 
nt_status         451 source4/auth/ntlm/auth_sam.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         452 source4/auth/ntlm/auth_sam.c 		return nt_status;
nt_status         455 source4/auth/ntlm/auth_sam.c 	nt_status = authsam_make_server_info(tmp_ctx, sam_ctx, 
nt_status         460 source4/auth/ntlm/auth_sam.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         464 source4/auth/ntlm/auth_sam.c 	return nt_status;
nt_status         116 source4/auth/ntlm/auth_server.c 	NTSTATUS nt_status;
nt_status         153 source4/auth/ntlm/auth_server.c 	nt_status = smb_composite_sesssetup(session, &session_setup);
nt_status         155 source4/auth/ntlm/auth_server.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         156 source4/auth/ntlm/auth_server.c 		return nt_status;
nt_status         213 source4/auth/ntlm/auth_server.c 	return nt_status;
nt_status          46 source4/auth/ntlm/auth_simple.c 	NTSTATUS nt_status;
nt_status          53 source4/auth/ntlm/auth_simple.c 	nt_status = auth_context_create(tmp_ctx, 
nt_status          57 source4/auth/ntlm/auth_simple.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          59 source4/auth/ntlm/auth_simple.c 		return nt_status;
nt_status          86 source4/auth/ntlm/auth_simple.c 	nt_status = auth_check_password(auth_context, tmp_ctx, user_info, &server_info);
nt_status          87 source4/auth/ntlm/auth_simple.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          89 source4/auth/ntlm/auth_simple.c 		return nt_status;
nt_status          93 source4/auth/ntlm/auth_simple.c 		nt_status = auth_generate_session_info(tmp_ctx, ev, lp_ctx, server_info, session_info);
nt_status          95 source4/auth/ntlm/auth_simple.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         101 source4/auth/ntlm/auth_simple.c 	return nt_status;
nt_status         250 source4/auth/ntlm/auth_unix.c 		NTSTATUS nt_status;
nt_status         254 source4/auth/ntlm/auth_unix.c 		nt_status = pam_to_nt_status(pam_error);
nt_status         263 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         270 source4/auth/ntlm/auth_unix.c 		NTSTATUS nt_status;
nt_status         274 source4/auth/ntlm/auth_unix.c 		nt_status = pam_to_nt_status(pam_error);
nt_status         283 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         438 source4/auth/ntlm/auth_unix.c 	NTSTATUS nt_status;
nt_status         461 source4/auth/ntlm/auth_unix.c 	nt_status = smb_pam_start(&pamh, user_info->mapped.account_name, user_info->remote_host ? user_info->remote_host->addr : NULL, pamconv);
nt_status         462 source4/auth/ntlm/auth_unix.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         463 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         466 source4/auth/ntlm/auth_unix.c 	nt_status = smb_pam_auth(pamh, lp_null_passwords(lp_ctx), user_info->mapped.account_name);
nt_status         467 source4/auth/ntlm/auth_unix.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         469 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         474 source4/auth/ntlm/auth_unix.c 		nt_status = smb_pam_account(pamh, user_info->mapped.account_name);
nt_status         475 source4/auth/ntlm/auth_unix.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         477 source4/auth/ntlm/auth_unix.c 			return nt_status;
nt_status         480 source4/auth/ntlm/auth_unix.c 		nt_status = smb_pam_setcred(pamh, user_info->mapped.account_name);
nt_status         481 source4/auth/ntlm/auth_unix.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         483 source4/auth/ntlm/auth_unix.c 			return nt_status;
nt_status         489 source4/auth/ntlm/auth_unix.c 	nt_status = talloc_getpwnam(ctx, user_info->mapped.account_name, pws);
nt_status         490 source4/auth/ntlm/auth_unix.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         491 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         605 source4/auth/ntlm/auth_unix.c 	NTSTATUS nt_status;
nt_status         613 source4/auth/ntlm/auth_unix.c 	nt_status = talloc_getpwnam(ctx, username, &pws);
nt_status         614 source4/auth/ntlm/auth_unix.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         615 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         721 source4/auth/ntlm/auth_unix.c 	nt_status = password_check(username, password, crypted, salt);
nt_status         722 source4/auth/ntlm/auth_unix.c         if (NT_STATUS_IS_OK(nt_status)) {
nt_status         724 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         726 source4/auth/ntlm/auth_unix.c 	else if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD)) {
nt_status         728 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         732 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         739 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         750 source4/auth/ntlm/auth_unix.c 		nt_status = password_check(username, pwcopy, crypted, salt);
nt_status         751 source4/auth/ntlm/auth_unix.c 		if NT_STATUS_IS_OK(nt_status) {
nt_status         753 source4/auth/ntlm/auth_unix.c 			return nt_status;
nt_status         766 source4/auth/ntlm/auth_unix.c         if (NT_STATUS_IS_OK(nt_status = string_combinations(pwcopy, password_check, level))) {
nt_status         768 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         797 source4/auth/ntlm/auth_unix.c 	NTSTATUS nt_status;
nt_status         809 source4/auth/ntlm/auth_unix.c 	nt_status = check_unix_password(check_ctx, ctx->auth_ctx->lp_ctx, user_info, &pwd);
nt_status         810 source4/auth/ntlm/auth_unix.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         812 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         815 source4/auth/ntlm/auth_unix.c 	nt_status = authunix_make_server_info(mem_ctx, lp_netbios_name(ctx->auth_ctx->lp_ctx),
nt_status         817 source4/auth/ntlm/auth_unix.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         819 source4/auth/ntlm/auth_unix.c 		return nt_status;
nt_status         110 source4/auth/ntlm/auth_util.c 	NTSTATUS nt_status;
nt_status         118 source4/auth/ntlm/auth_util.c 			nt_status = encrypt_user_info(mem_ctx, auth_context, 
nt_status         121 source4/auth/ntlm/auth_util.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         122 source4/auth/ntlm/auth_util.c 				return nt_status;
nt_status         141 source4/auth/ntlm/auth_util.c 			nt_status = auth_get_challenge(auth_context, &challenge);
nt_status         142 source4/auth/ntlm/auth_util.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         143 source4/auth/ntlm/auth_util.c 				return nt_status;
nt_status         250 source4/auth/ntlm/auth_util.c _PUBLIC_ NTSTATUS auth_nt_status_squash(NTSTATUS nt_status)
nt_status         252 source4/auth/ntlm/auth_util.c 	if NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_SUCH_USER) {
nt_status         255 source4/auth/ntlm/auth_util.c 	} else if NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD) {
nt_status         260 source4/auth/ntlm/auth_util.c 	return nt_status;
nt_status          81 source4/auth/ntlm/auth_winbind.c 	NTSTATUS nt_status;
nt_status          86 source4/auth/ntlm/auth_winbind.c 	nt_status = encrypt_user_info(mem_ctx, ctx->auth_ctx, 
nt_status          89 source4/auth/ntlm/auth_winbind.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          90 source4/auth/ntlm/auth_winbind.c 		return nt_status;
nt_status         121 source4/auth/ntlm/auth_winbind.c 	nt_status = NT_STATUS(response.data.auth.nt_status);
nt_status         122 source4/auth/ntlm/auth_winbind.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         127 source4/auth/ntlm/auth_winbind.c 		nt_status = get_info3_from_ndr(mem_ctx, lp_iconv_convenience(ctx->auth_ctx->lp_ctx), &response, &info3);
nt_status         129 source4/auth/ntlm/auth_winbind.c 		NT_STATUS_NOT_OK_RETURN(nt_status); 
nt_status         132 source4/auth/ntlm/auth_winbind.c 		nt_status = make_server_info_netlogon_validation(mem_ctx, 
nt_status         136 source4/auth/ntlm/auth_winbind.c 		return nt_status;
nt_status         142 source4/auth/ntlm/auth_winbind.c 	} else if (NT_STATUS_IS_OK(nt_status)) {
nt_status         149 source4/auth/ntlm/auth_winbind.c         return nt_status;
nt_status          93 source4/auth/ntlm/pam_errors.c int nt_status_to_pam(NTSTATUS nt_status)
nt_status          96 source4/auth/ntlm/pam_errors.c 	if NT_STATUS_IS_OK(nt_status) return PAM_SUCCESS;
nt_status          99 source4/auth/ntlm/pam_errors.c 		if (NT_STATUS_EQUAL(nt_status,nt_status_to_pam_map[i].ntstatus))
nt_status         119 source4/auth/ntlm/pam_errors.c int nt_status_to_pam(NTSTATUS nt_status)
nt_status         121 source4/auth/ntlm/pam_errors.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_OK)) return 0;
nt_status          31 source4/auth/ntlm/pam_errors.h int nt_status_to_pam(NTSTATUS nt_status);
nt_status         115 source4/auth/ntlmssp/ntlmssp_client.c 	NTSTATUS nt_status;
nt_status         199 source4/auth/ntlmssp/ntlmssp_client.c 	nt_status = cli_credentials_get_ntlm_response(gensec_security->credentials, mem_ctx, 
nt_status         204 source4/auth/ntlmssp/ntlmssp_client.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         205 source4/auth/ntlmssp/ntlmssp_client.c 		return nt_status;
nt_status         286 source4/auth/ntlmssp/ntlmssp_client.c 		nt_status = ntlmssp_sign_init(gensec_ntlmssp_state);
nt_status         287 source4/auth/ntlmssp/ntlmssp_client.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         289 source4/auth/ntlmssp/ntlmssp_client.c 				  nt_errstr(nt_status)));
nt_status         291 source4/auth/ntlmssp/ntlmssp_client.c 			return nt_status;
nt_status         302 source4/auth/ntlmssp/ntlmssp_client.c 	NTSTATUS nt_status;
nt_status         304 source4/auth/ntlmssp/ntlmssp_client.c 	nt_status = gensec_ntlmssp_start(gensec_security);
nt_status         305 source4/auth/ntlmssp/ntlmssp_client.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         255 source4/auth/ntlmssp/ntlmssp_server.c 	NTSTATUS nt_status;
nt_status         329 source4/auth/ntlmssp/ntlmssp_server.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(gensec_ntlmssp_state, domain))) {
nt_status         332 source4/auth/ntlmssp/ntlmssp_server.c 		return nt_status;
nt_status         335 source4/auth/ntlmssp/ntlmssp_server.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(gensec_ntlmssp_state, user))) {
nt_status         338 source4/auth/ntlmssp/ntlmssp_server.c 		return nt_status;
nt_status         341 source4/auth/ntlmssp/ntlmssp_server.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_workstation(gensec_ntlmssp_state, workstation))) {
nt_status         344 source4/auth/ntlmssp/ntlmssp_server.c 		return nt_status;
nt_status         382 source4/auth/ntlmssp/ntlmssp_server.c 			if (!NT_STATUS_IS_OK(nt_status = 
nt_status         387 source4/auth/ntlmssp/ntlmssp_server.c 				return nt_status;
nt_status         410 source4/auth/ntlmssp/ntlmssp_server.c 	NTSTATUS nt_status;
nt_status         521 source4/auth/ntlmssp/ntlmssp_server.c 		nt_status = ntlmssp_sign_init(gensec_ntlmssp_state);
nt_status         523 source4/auth/ntlmssp/ntlmssp_server.c 		nt_status = NT_STATUS_OK;
nt_status         538 source4/auth/ntlmssp/ntlmssp_server.c 	return nt_status;
nt_status         559 source4/auth/ntlmssp/ntlmssp_server.c 	NTSTATUS nt_status;
nt_status         569 source4/auth/ntlmssp/ntlmssp_server.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_server_preauth(gensec_ntlmssp_state, in))) {
nt_status         571 source4/auth/ntlmssp/ntlmssp_server.c 		return nt_status;
nt_status         583 source4/auth/ntlmssp/ntlmssp_server.c 	if (!NT_STATUS_IS_OK(nt_status = gensec_ntlmssp_state->check_password(gensec_ntlmssp_state, mem_ctx,
nt_status         586 source4/auth/ntlmssp/ntlmssp_server.c 		return nt_status;
nt_status         591 source4/auth/ntlmssp/ntlmssp_server.c 		nt_status = ntlmssp_server_postauth(gensec_security, &user_session_key, &lm_session_key);
nt_status         593 source4/auth/ntlmssp/ntlmssp_server.c 		return nt_status;
nt_status         637 source4/auth/ntlmssp/ntlmssp_server.c 	NTSTATUS nt_status;
nt_status         647 source4/auth/ntlmssp/ntlmssp_server.c 	nt_status = gensec_ntlmssp_state->auth_context->set_challenge(auth_context, 
nt_status         651 source4/auth/ntlmssp/ntlmssp_server.c 	return nt_status;
nt_status         664 source4/auth/ntlmssp/ntlmssp_server.c 	NTSTATUS nt_status;
nt_status         684 source4/auth/ntlmssp/ntlmssp_server.c 	nt_status = gensec_ntlmssp_state->auth_context->check_password(gensec_ntlmssp_state->auth_context, 
nt_status         689 source4/auth/ntlmssp/ntlmssp_server.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         711 source4/auth/ntlmssp/ntlmssp_server.c 	return nt_status;
nt_status         727 source4/auth/ntlmssp/ntlmssp_server.c 	NTSTATUS nt_status;
nt_status         730 source4/auth/ntlmssp/ntlmssp_server.c 	nt_status = auth_generate_session_info(gensec_ntlmssp_state, gensec_security->event_ctx, gensec_security->settings->lp_ctx, gensec_ntlmssp_state->server_info, session_info);
nt_status         731 source4/auth/ntlmssp/ntlmssp_server.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         746 source4/auth/ntlmssp/ntlmssp_server.c 	NTSTATUS nt_status;
nt_status         749 source4/auth/ntlmssp/ntlmssp_server.c 	nt_status = gensec_ntlmssp_start(gensec_security);
nt_status         750 source4/auth/ntlmssp/ntlmssp_server.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         163 source4/auth/ntlmssp/ntlmssp_sign.c 	NTSTATUS nt_status;
nt_status         170 source4/auth/ntlmssp/ntlmssp_sign.c 	nt_status = ntlmssp_make_packet_signature(gensec_ntlmssp_state, sig_mem_ctx, 
nt_status         175 source4/auth/ntlmssp/ntlmssp_sign.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         176 source4/auth/ntlmssp/ntlmssp_sign.c 		DEBUG(0, ("NTLMSSP packet check failed with %s\n", nt_errstr(nt_status)));
nt_status         177 source4/auth/ntlmssp/ntlmssp_sign.c 		return nt_status;
nt_status         225 source4/auth/ntlmssp/ntlmssp_sign.c 	NTSTATUS nt_status;
nt_status         237 source4/auth/ntlmssp/ntlmssp_sign.c 		nt_status = ntlmssp_make_packet_signature(gensec_ntlmssp_state, sig_mem_ctx, 
nt_status         263 source4/auth/ntlmssp/ntlmssp_sign.c 		nt_status = NT_STATUS_OK;
nt_status         269 source4/auth/ntlmssp/ntlmssp_sign.c 	return nt_status;
nt_status         457 source4/auth/ntlmssp/ntlmssp_sign.c 	NTSTATUS nt_status;
nt_status         467 source4/auth/ntlmssp/ntlmssp_sign.c 	        nt_status = gensec_ntlmssp_seal_packet(gensec_security, sig_mem_ctx, 
nt_status         474 source4/auth/ntlmssp/ntlmssp_sign.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         477 source4/auth/ntlmssp/ntlmssp_sign.c 		return nt_status;
nt_status         487 source4/auth/ntlmssp/ntlmssp_sign.c 	        nt_status = gensec_ntlmssp_sign_packet(gensec_security, sig_mem_ctx, 
nt_status         494 source4/auth/ntlmssp/ntlmssp_sign.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         497 source4/auth/ntlmssp/ntlmssp_sign.c 		return nt_status;
nt_status         395 source4/auth/sam.c 	NTSTATUS nt_status;
nt_status         404 source4/auth/sam.c 	nt_status = crack_user_principal_name(sam_ctx, tmp_ctx, principal, &user_dn, &domain_dn);
nt_status         405 source4/auth/sam.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         407 source4/auth/sam.c 		return nt_status;
nt_status          38 source4/auth/samba_server_gensec.c 	NTSTATUS nt_status;
nt_status          42 source4/auth/samba_server_gensec.c 	nt_status = auth_context_create(mem_ctx, 
nt_status          48 source4/auth/samba_server_gensec.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          49 source4/auth/samba_server_gensec.c 		DEBUG(1, ("Failed to start auth server code: %s\n", nt_errstr(nt_status)));
nt_status          50 source4/auth/samba_server_gensec.c 		return nt_status;
nt_status          53 source4/auth/samba_server_gensec.c 	nt_status = gensec_server_start(mem_ctx, 
nt_status          58 source4/auth/samba_server_gensec.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          60 source4/auth/samba_server_gensec.c 		DEBUG(1, ("Failed to start GENSEC server code: %s\n", nt_errstr(nt_status)));
nt_status          61 source4/auth/samba_server_gensec.c 		return nt_status;
nt_status          72 source4/auth/samba_server_gensec.c 	return nt_status;
nt_status          37 source4/auth/session.c 	NTSTATUS nt_status;
nt_status          39 source4/auth/session.c 	nt_status = auth_anonymous_session_info(mem_ctx, event_ctx, lp_ctx, &session_info);
nt_status          40 source4/auth/session.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          51 source4/auth/session.c 	NTSTATUS nt_status;
nt_status          56 source4/auth/session.c 	nt_status = auth_anonymous_server_info(mem_ctx,
nt_status          59 source4/auth/session.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          61 source4/auth/session.c 		return nt_status;
nt_status          65 source4/auth/session.c 	nt_status = auth_generate_session_info(parent_ctx, event_ctx, lp_ctx, server_info, &session_info);
nt_status          68 source4/auth/session.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         162 source4/auth/session.c 	NTSTATUS nt_status;
nt_status         173 source4/auth/session.c 	nt_status = security_token_create(session_info,
nt_status         182 source4/auth/session.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         122 source4/auth/system_session.c 	NTSTATUS nt_status;
nt_status         133 source4/auth/system_session.c 	nt_status = create_token(session_info,
nt_status         140 source4/auth/system_session.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         156 source4/auth/system_session.c 	NTSTATUS nt_status;
nt_status         158 source4/auth/system_session.c 	nt_status = auth_system_session_info(mem_ctx,
nt_status         161 source4/auth/system_session.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         172 source4/auth/system_session.c 	NTSTATUS nt_status;
nt_status         177 source4/auth/system_session.c 	nt_status = auth_system_server_info(mem_ctx, lp_netbios_name(lp_ctx),
nt_status         179 source4/auth/system_session.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         181 source4/auth/system_session.c 		return nt_status;
nt_status         185 source4/auth/system_session.c 	nt_status = generate_session_info(parent_ctx, server_info, &session_info);
nt_status         188 source4/auth/system_session.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         212 source4/auth/system_session.c 	NTSTATUS nt_status;
nt_status         214 source4/auth/system_session.c 	nt_status = _auth_system_session_info(mem_ctx, lp_ctx, false, &session_info);
nt_status         215 source4/auth/system_session.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1826 source4/dsdb/common/util.c 	NTSTATUS nt_status;
nt_status        1859 source4/dsdb/common/util.c 	nt_status = samdb_set_password(ctx, mem_ctx,
nt_status        1865 source4/dsdb/common/util.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1867 source4/dsdb/common/util.c 		return nt_status;
nt_status         119 source4/dsdb/repl/drepl_partitions.c 		NTSTATUS nt_status;
nt_status         130 source4/dsdb/repl/drepl_partitions.c 		nt_status = dcerpc_parse_binding(conn, binding_str, &conn->binding);
nt_status         132 source4/dsdb/repl/drepl_partitions.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         133 source4/dsdb/repl/drepl_partitions.c 			return ntstatus_to_werror(nt_status);
nt_status         162 source4/dsdb/repl/drepl_partitions.c 		NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         163 source4/dsdb/repl/drepl_partitions.c 		return ntstatus_to_werror(nt_status);
nt_status         228 source4/dsdb/repl/drepl_partitions.c 			NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         229 source4/dsdb/repl/drepl_partitions.c 			return ntstatus_to_werror(nt_status);
nt_status         198 source4/dsdb/repl/replicated_objects.c 	NTSTATUS nt_status;
nt_status         331 source4/dsdb/repl/replicated_objects.c 		nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         332 source4/dsdb/repl/replicated_objects.c 		return ntstatus_to_werror(nt_status);
nt_status         502 source4/dsdb/samdb/cracknames.c 		NTSTATUS nt_status;
nt_status         505 source4/dsdb/samdb/cracknames.c 		nt_status = GUID_from_string(name, &guid);
nt_status         506 source4/dsdb/samdb/cracknames.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         651 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 		NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         652 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 		return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status));
nt_status         777 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 			NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         778 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 			return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status));
nt_status         862 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 		NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         863 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 		return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status));
nt_status        1085 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 			NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status        1086 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 			return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status));
nt_status        1212 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 		NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status        1213 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 		return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status));
nt_status        1249 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 				NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status        1250 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 				return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status));
nt_status        1301 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 		NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status        1302 source4/dsdb/samdb/ldb_modules/repl_meta_data.c 		return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status));
nt_status         105 source4/dsdb/schema/schema_init.c 		NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         107 source4/dsdb/schema/schema_init.c 		return ntstatus_to_werror(nt_status);
nt_status         198 source4/dsdb/schema/schema_init.c 		NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         199 source4/dsdb/schema/schema_init.c 		return ntstatus_to_werror(nt_status);
nt_status        1061 source4/kdc/hdb-samba4.c 	NTSTATUS nt_status;
nt_status        1073 source4/kdc/hdb-samba4.c 	nt_status = sam_get_results_principal((struct ldb_context *)db->hdb_db,
nt_status        1077 source4/kdc/hdb-samba4.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_SUCH_USER)) {
nt_status        1079 source4/kdc/hdb-samba4.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_MEMORY)) {
nt_status        1081 source4/kdc/hdb-samba4.c 	} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1222 source4/kdc/hdb-samba4.c 		NTSTATUS nt_status;
nt_status        1236 source4/kdc/hdb-samba4.c 		nt_status = crack_service_principal_name((struct ldb_context *)db->hdb_db,
nt_status        1241 source4/kdc/hdb-samba4.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1492 source4/kdc/hdb-samba4.c 	NTSTATUS nt_status;
nt_status        1503 source4/kdc/hdb-samba4.c 	nt_status = auth_system_session_info(*db, lp_ctx, &session_info);
nt_status        1504 source4/kdc/hdb-samba4.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1505 source4/kdc/hdb-samba4.c 		return nt_status;
nt_status        1549 source4/kdc/hdb-samba4.c 	NTSTATUS nt_status;
nt_status        1551 source4/kdc/hdb-samba4.c 	nt_status = kdc_hdb_samba4_create(kdc_mem_ctx, kdc_ev_ctx, kdc_lp_ctx,
nt_status        1554 source4/kdc/hdb-samba4.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         442 source4/kdc/kpasswdd.c 	NTSTATUS nt_status;
nt_status         492 source4/kdc/kpasswdd.c 	nt_status = cli_credentials_set_stored_principal(server_credentials, kdc->task->event_ctx, kdc->task->lp_ctx, "kadmin/changepw");
nt_status         493 source4/kdc/kpasswdd.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         498 source4/kdc/kpasswdd.c 								       nt_errstr(nt_status)),
nt_status         512 source4/kdc/kpasswdd.c 	nt_status = samba_server_gensec_start(tmp_ctx, kdc->task->event_ctx, 
nt_status         518 source4/kdc/kpasswdd.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         525 source4/kdc/kpasswdd.c 	nt_status = gensec_set_peer_addr(gensec_security, peer_addr);
nt_status         526 source4/kdc/kpasswdd.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         530 source4/kdc/kpasswdd.c 	nt_status = gensec_set_my_addr(gensec_security, my_addr);
nt_status         531 source4/kdc/kpasswdd.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         539 source4/kdc/kpasswdd.c 	nt_status = gensec_start_mech_by_name(gensec_security, "krb5");
nt_status         540 source4/kdc/kpasswdd.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         546 source4/kdc/kpasswdd.c 	nt_status = gensec_update(gensec_security, tmp_ctx, ap_req, &ap_rep);
nt_status         547 source4/kdc/kpasswdd.c 	if (!NT_STATUS_IS_OK(nt_status) && !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         553 source4/kdc/kpasswdd.c 								       nt_errstr(nt_status)),
nt_status         564 source4/kdc/kpasswdd.c 	nt_status = gensec_unwrap(gensec_security, tmp_ctx, &krb_priv_req, &kpasswd_req);
nt_status         565 source4/kdc/kpasswdd.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         570 source4/kdc/kpasswdd.c 								       nt_errstr(nt_status)),
nt_status         592 source4/kdc/kpasswdd.c 	nt_status = gensec_wrap(gensec_security, tmp_ctx, 
nt_status         594 source4/kdc/kpasswdd.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         599 source4/kdc/kpasswdd.c 								       nt_errstr(nt_status)),
nt_status          56 source4/kdc/pac-glue.c 	NTSTATUS nt_status;
nt_status          63 source4/kdc/pac-glue.c 	nt_status = auth_convert_server_info_saminfo3(mem_ctx, server_info, &info3);
nt_status          64 source4/kdc/pac-glue.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          65 source4/kdc/pac-glue.c 		DEBUG(1, ("Getting Samba info failed: %s\n", nt_errstr(nt_status)));
nt_status          80 source4/kdc/pac-glue.c 		nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status          81 source4/kdc/pac-glue.c 		DEBUG(1, ("PAC (presig) push failed: %s\n", nt_errstr(nt_status)));
nt_status         112 source4/kdc/pac-glue.c 	NTSTATUS nt_status;
nt_status         129 source4/kdc/pac-glue.c 	nt_status = authsam_make_server_info(mem_ctx, p->samdb,
nt_status         136 source4/kdc/pac-glue.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         138 source4/kdc/pac-glue.c 			  nt_errstr(nt_status)));
nt_status         195 source4/kdc/pac-glue.c 				       NTSTATUS nt_status)
nt_status         214 source4/kdc/pac-glue.c 	SIVAL(pa.padata_value.data, 0, NT_STATUS_V(nt_status));
nt_status         237 source4/kdc/pac-glue.c 	NTSTATUS nt_status;
nt_status         274 source4/kdc/pac-glue.c 	nt_status = authsam_account_ok(tmp_ctx, 
nt_status         283 source4/kdc/pac-glue.c 	if (NT_STATUS_IS_OK(nt_status))
nt_status         286 source4/kdc/pac-glue.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_MUST_CHANGE))
nt_status         288 source4/kdc/pac-glue.c 	else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_EXPIRED))
nt_status         290 source4/kdc/pac-glue.c 	else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_EXPIRED))
nt_status         292 source4/kdc/pac-glue.c 	else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_DISABLED))
nt_status         294 source4/kdc/pac-glue.c 	else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_LOGON_HOURS))
nt_status         296 source4/kdc/pac-glue.c 	else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_LOCKED_OUT))
nt_status         298 source4/kdc/pac-glue.c 	else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_WORKSTATION))
nt_status         303 source4/kdc/pac-glue.c 	samba_kdc_build_edata_reply(tmp_ctx, e_data, nt_status);
nt_status         470 source4/lib/tls/tls.c 	NTSTATUS nt_status;
nt_status         472 source4/lib/tls/tls.c 	nt_status = socket_create_with_ops(socket_ctx, &tls_socket_ops, &new_sock, 
nt_status         475 source4/lib/tls/tls.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         552 source4/lib/tls/tls.c 	NTSTATUS nt_status;
nt_status         554 source4/lib/tls/tls.c 	nt_status = socket_create_with_ops(socket_ctx, &tls_socket_ops, &new_sock, 
nt_status         557 source4/lib/tls/tls.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          33 source4/libcli/raw/clierror.c 		return nt_errstr(tree->session->transport->error.e.nt_status);
nt_status          53 source4/libcli/raw/clierror.c 		return tree->session->transport->error.e.nt_status;
nt_status         456 source4/libcli/raw/clitransport.c 			transport->error.e.nt_status = NT_STATUS_OK;
nt_status         458 source4/libcli/raw/clitransport.c 			transport->error.e.nt_status = NT_STATUS_DOS(eclass, code);
nt_status         461 source4/libcli/raw/clitransport.c 		transport->error.e.nt_status = NT_STATUS(IVAL(req->in.hdr, HDR_RCLS));
nt_status         464 source4/libcli/raw/clitransport.c 	req->status = transport->error.e.nt_status;
nt_status         139 source4/libcli/raw/libcliraw.h 			NTSTATUS nt_status;
nt_status          88 source4/libcli/smb_composite/sesssetup.c 	NTSTATUS session_key_err, nt_status;
nt_status         118 source4/libcli/smb_composite/sesssetup.c 				nt_status = session_setup_old(c, session, 
nt_status         121 source4/libcli/smb_composite/sesssetup.c 				if (NT_STATUS_IS_OK(nt_status)) {
nt_status         123 source4/libcli/smb_composite/sesssetup.c 					c->status = nt_status;
nt_status         137 source4/libcli/smb_composite/sesssetup.c 				nt_status = session_setup_nt1(c, session, 
nt_status         140 source4/libcli/smb_composite/sesssetup.c 				if (NT_STATUS_IS_OK(nt_status)) {
nt_status         142 source4/libcli/smb_composite/sesssetup.c 					c->status = nt_status;
nt_status         156 source4/libcli/smb_composite/sesssetup.c 				nt_status = session_setup_spnego(c, session, 
nt_status         159 source4/libcli/smb_composite/sesssetup.c 				if (NT_STATUS_IS_OK(nt_status)) {
nt_status         161 source4/libcli/smb_composite/sesssetup.c 					c->status = nt_status;
nt_status         261 source4/libcli/smb_composite/sesssetup.c 	NTSTATUS nt_status = NT_STATUS_INTERNAL_ERROR;
nt_status         292 source4/libcli/smb_composite/sesssetup.c 		nt_status = cli_credentials_get_ntlm_response(io->in.credentials, state, 
nt_status         299 source4/libcli/smb_composite/sesssetup.c 		NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         314 source4/libcli/smb_composite/sesssetup.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         334 source4/libcli/smb_composite/sesssetup.c 	NTSTATUS nt_status;
nt_status         360 source4/libcli/smb_composite/sesssetup.c 		nt_status = cli_credentials_get_ntlm_response(io->in.credentials, state, 
nt_status         367 source4/libcli/smb_composite/sesssetup.c 		NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status        2460 source4/libnet/libnet_become_dc.c 	NTSTATUS nt_status;
nt_status        2538 source4/libnet/libnet_become_dc.c 	nt_status = partition->store_chunk(s->callbacks.private_data, &s->_sc);
nt_status        2539 source4/libnet/libnet_become_dc.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2540 source4/libnet/libnet_become_dc.c 		return ntstatus_to_werror(nt_status);
nt_status         112 source4/libnet/libnet_samdump.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status         121 source4/libnet/libnet_samdump.c 			nt_status = vampire_samdump_handle_user(mem_ctx, 
nt_status         128 source4/libnet/libnet_samdump.c 		nt_status = vampire_samdump_handle_secret(mem_ctx,
nt_status         135 source4/libnet/libnet_samdump.c 		nt_status = vampire_samdump_handle_trusted_domain(mem_ctx,
nt_status         144 source4/libnet/libnet_samdump.c 	return nt_status;
nt_status         150 source4/libnet/libnet_samdump.c 	NTSTATUS nt_status;
nt_status         171 source4/libnet/libnet_samdump.c 	nt_status                      = libnet_SamSync_netlogon(ctx, samdump_state, &r2);
nt_status         175 source4/libnet/libnet_samdump.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         177 source4/libnet/libnet_samdump.c 		return nt_status;
nt_status         203 source4/libnet/libnet_samdump.c 	return nt_status;
nt_status          83 source4/libnet/libnet_samdump_keytab.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status          91 source4/libnet/libnet_samdump_keytab.c 			nt_status = samdump_keytab_handle_user(mem_ctx, 
nt_status         103 source4/libnet/libnet_samdump_keytab.c 	return nt_status;
nt_status         108 source4/libnet/libnet_samdump_keytab.c 	NTSTATUS nt_status;
nt_status         123 source4/libnet/libnet_samdump_keytab.c 	nt_status                      = libnet_SamSync_netlogon(ctx, mem_ctx, &r2);
nt_status         127 source4/libnet/libnet_samdump_keytab.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         128 source4/libnet/libnet_samdump_keytab.c 		return nt_status;
nt_status         131 source4/libnet/libnet_samdump_keytab.c 	return nt_status;
nt_status         138 source4/libnet/libnet_samsync.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status         143 source4/libnet/libnet_samsync.c 		nt_status = fix_user(mem_ctx, 
nt_status         153 source4/libnet/libnet_samsync.c 		nt_status = fix_secret(mem_ctx, 
nt_status         163 source4/libnet/libnet_samsync.c 	return nt_status;
nt_status         168 source4/libnet/libnet_samsync.c 	NTSTATUS nt_status, dbsync_nt_status;
nt_status         191 source4/libnet/libnet_samsync.c 		nt_status = cli_credentials_set_machine_account(machine_account, ctx->lp_ctx);
nt_status         192 source4/libnet/libnet_samsync.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         195 source4/libnet/libnet_samsync.c 			return nt_status;
nt_status         244 source4/libnet/libnet_samsync.c 	nt_status = libnet_RpcConnect(machine_net_ctx, samsync_ctx, c);
nt_status         245 source4/libnet/libnet_samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         256 source4/libnet/libnet_samsync.c 		return nt_status;
nt_status         263 source4/libnet/libnet_samsync.c 	nt_status = dcerpc_secondary_connection(c->out.dcerpc_pipe, &p,
nt_status         266 source4/libnet/libnet_samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         269 source4/libnet/libnet_samsync.c 						      dcerpc_server_name(p), nt_errstr(nt_status));
nt_status         271 source4/libnet/libnet_samsync.c 		return nt_status;
nt_status         274 source4/libnet/libnet_samsync.c 	nt_status = dcerpc_bind_auth_schannel(samsync_ctx, p, &ndr_table_netlogon,
nt_status         277 source4/libnet/libnet_samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         280 source4/libnet/libnet_samsync.c 						      dcerpc_server_name(p), nt_errstr(nt_status));
nt_status         282 source4/libnet/libnet_samsync.c 		return nt_status;
nt_status         289 source4/libnet/libnet_samsync.c 		return nt_status;
nt_status         304 source4/libnet/libnet_samsync.c 		nt_status = r->in.init_fn(samsync_ctx, 
nt_status         308 source4/libnet/libnet_samsync.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         311 source4/libnet/libnet_samsync.c 			return nt_status;
nt_status         317 source4/libnet/libnet_samsync.c 	nt_status = dcerpc_schannel_creds(p->conn->security_state.generic_state, samsync_ctx, &creds);
nt_status         318 source4/libnet/libnet_samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         321 source4/libnet/libnet_samsync.c 		return nt_status;
nt_status         353 source4/libnet/libnet_samsync.c 				r->out.error_string = talloc_asprintf(mem_ctx, "DatabaseSync failed - %s", nt_errstr(nt_status));
nt_status         355 source4/libnet/libnet_samsync.c 				return nt_status;
nt_status         372 source4/libnet/libnet_samsync.c 				nt_status = fix_delta(delta_ctx, 
nt_status         378 source4/libnet/libnet_samsync.c 				if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         381 source4/libnet/libnet_samsync.c 					return nt_status;
nt_status         387 source4/libnet/libnet_samsync.c 				nt_status = r->in.delta_fn(delta_ctx, 
nt_status         392 source4/libnet/libnet_samsync.c 				if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         395 source4/libnet/libnet_samsync.c 					return nt_status;
nt_status         403 source4/libnet/libnet_samsync.c 			r->out.error_string = talloc_asprintf(mem_ctx, "libnet_SamSync_netlogon failed: unexpected inconsistancy. Should not get error %s here", nt_errstr(nt_status));
nt_status         407 source4/libnet/libnet_samsync.c 		nt_status = NT_STATUS_OK;
nt_status         410 source4/libnet/libnet_samsync.c 	return nt_status;
nt_status         913 source4/libnet/libnet_samsync_ldb.c 			NTSTATUS nt_status;
nt_status         914 source4/libnet/libnet_samsync_ldb.c 			nt_status = samsync_ldb_add_foreignSecurityPrincipal(mem_ctx, state,
nt_status         918 source4/libnet/libnet_samsync_ldb.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         919 source4/libnet/libnet_samsync_ldb.c 				return nt_status;
nt_status         971 source4/libnet/libnet_samsync_ldb.c 		NTSTATUS nt_status;
nt_status         972 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_add_foreignSecurityPrincipal(mem_ctx, state,
nt_status         977 source4/libnet/libnet_samsync_ldb.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         978 source4/libnet/libnet_samsync_ldb.c 			return nt_status;
nt_status        1060 source4/libnet/libnet_samsync_ldb.c 	NTSTATUS nt_status = NT_STATUS_OK;
nt_status        1067 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_handle_domain(mem_ctx, 
nt_status        1076 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_handle_user(mem_ctx, 
nt_status        1085 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_delete_user(mem_ctx, 
nt_status        1094 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_handle_group(mem_ctx, 
nt_status        1103 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_delete_group(mem_ctx, 
nt_status        1112 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_handle_group_member(mem_ctx, 
nt_status        1121 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_handle_alias(mem_ctx, 
nt_status        1130 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_delete_alias(mem_ctx, 
nt_status        1139 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_handle_alias_member(mem_ctx, 
nt_status        1148 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_handle_account(mem_ctx, 
nt_status        1157 source4/libnet/libnet_samsync_ldb.c 		nt_status = samsync_ldb_delete_account(mem_ctx, 
nt_status        1168 source4/libnet/libnet_samsync_ldb.c 	if (!NT_STATUS_IS_OK(nt_status) && !*error_string) {
nt_status        1169 source4/libnet/libnet_samsync_ldb.c 		*error_string = talloc_asprintf(mem_ctx, "Failed to handle samsync delta: %s", nt_errstr(nt_status));
nt_status        1171 source4/libnet/libnet_samsync_ldb.c 	return nt_status;
nt_status        1218 source4/libnet/libnet_samsync_ldb.c 	NTSTATUS nt_status;
nt_status        1241 source4/libnet/libnet_samsync_ldb.c 	nt_status              = libnet_SamSync_netlogon(ctx, state, &r2);
nt_status        1245 source4/libnet/libnet_samsync_ldb.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1247 source4/libnet/libnet_samsync_ldb.c 		return nt_status;
nt_status        1250 source4/libnet/libnet_samsync_ldb.c 	return nt_status;
nt_status         679 source4/rpc_server/lsa/dcesrv_lsa.c 	NTSTATUS nt_status;
nt_status         687 source4/rpc_server/lsa/dcesrv_lsa.c 	nt_status = dcesrv_fetch_session_key(dce_call->conn, &session_key);
nt_status         688 source4/rpc_server/lsa/dcesrv_lsa.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         689 source4/rpc_server/lsa/dcesrv_lsa.c 		return nt_status;
nt_status        1612 source4/rpc_server/lsa/dcesrv_lsa.c 	NTSTATUS nt_status;
nt_status        1639 source4/rpc_server/lsa/dcesrv_lsa.c 		nt_status = fill_trust_domain_ex(mem_ctx, domains[i], &entries[i]);
nt_status        1640 source4/rpc_server/lsa/dcesrv_lsa.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1641 source4/rpc_server/lsa/dcesrv_lsa.c 			return nt_status;
nt_status        2577 source4/rpc_server/lsa/dcesrv_lsa.c 	NTSTATUS nt_status;
nt_status        2602 source4/rpc_server/lsa/dcesrv_lsa.c 	nt_status = dcesrv_fetch_session_key(dce_call->conn, &session_key);
nt_status        2603 source4/rpc_server/lsa/dcesrv_lsa.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        2604 source4/rpc_server/lsa/dcesrv_lsa.c 		return nt_status;
nt_status          88 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NTSTATUS nt_status;
nt_status         265 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = schannel_store_session_key(mem_ctx, dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx, creds);
nt_status         267 source4/rpc_server/netlogon/dcerpc_netlogon.c 	return nt_status;
nt_status         335 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NTSTATUS nt_status;
nt_status         354 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = schannel_fetch_session_key_ldb(ldb, ldb, computer_name, 
nt_status         357 source4/rpc_server/netlogon/dcerpc_netlogon.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         358 source4/rpc_server/netlogon/dcerpc_netlogon.c 		nt_status = creds_server_step_check(creds, 
nt_status         362 source4/rpc_server/netlogon/dcerpc_netlogon.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         363 source4/rpc_server/netlogon/dcerpc_netlogon.c 		nt_status = schannel_store_session_key_ldb(ldb, ldb, creds);
nt_status         366 source4/rpc_server/netlogon/dcerpc_netlogon.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         376 source4/rpc_server/netlogon/dcerpc_netlogon.c 	return nt_status;
nt_status         389 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NTSTATUS nt_status;
nt_status         391 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = dcesrv_netr_creds_server_step_check(dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx,
nt_status         395 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         405 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = samdb_set_password_sid(sam_ctx, mem_ctx, 
nt_status         411 source4/rpc_server/netlogon/dcerpc_netlogon.c 	return nt_status;
nt_status         423 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NTSTATUS nt_status;
nt_status         428 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = dcesrv_netr_creds_server_step_check(dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx,
nt_status         432 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         449 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = samdb_set_password_sid(sam_ctx, mem_ctx,
nt_status         455 source4/rpc_server/netlogon/dcerpc_netlogon.c 	return nt_status;
nt_status         492 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NTSTATUS nt_status;
nt_status         524 source4/rpc_server/netlogon/dcerpc_netlogon.c 		nt_status = auth_context_create(mem_ctx, 
nt_status         528 source4/rpc_server/netlogon/dcerpc_netlogon.c 		NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         551 source4/rpc_server/netlogon/dcerpc_netlogon.c 		nt_status = auth_context_create(mem_ctx, 
nt_status         555 source4/rpc_server/netlogon/dcerpc_netlogon.c 		NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         557 source4/rpc_server/netlogon/dcerpc_netlogon.c 		nt_status = auth_context_set_challenge(auth_context, r->in.logon->network->challenge, "netr_LogonSamLogonWithFlags");
nt_status         558 source4/rpc_server/netlogon/dcerpc_netlogon.c 		NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         622 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = auth_check_password(auth_context, mem_ctx, user_info, &server_info);
nt_status         623 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         625 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = auth_convert_server_info_sambaseinfo(mem_ctx, server_info, &sam);
nt_status         626 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         695 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NTSTATUS nt_status;
nt_status         697 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = schannel_fetch_session_key(mem_ctx, dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx, r->in.computer_name, lp_workgroup(dce_call->conn->dce_ctx->lp_ctx), &creds);
nt_status         698 source4/rpc_server/netlogon/dcerpc_netlogon.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         699 source4/rpc_server/netlogon/dcerpc_netlogon.c 		return nt_status;
nt_status         716 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NTSTATUS nt_status;
nt_status         725 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = dcesrv_netr_creds_server_step_check(dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx,
nt_status         729 source4/rpc_server/netlogon/dcerpc_netlogon.c 	NT_STATUS_NOT_OK_RETURN(nt_status);
nt_status         743 source4/rpc_server/netlogon/dcerpc_netlogon.c 	nt_status = dcesrv_netr_LogonSamLogon_base(dce_call, mem_ctx, &r2, creds);
nt_status         747 source4/rpc_server/netlogon/dcerpc_netlogon.c 	return nt_status;
nt_status         551 source4/rpc_server/samr/samr_password.c 	NTSTATUS nt_status;
nt_status         555 source4/rpc_server/samr/samr_password.c 	nt_status = dcesrv_fetch_session_key(dce_call->conn, &session_key);
nt_status         556 source4/rpc_server/samr/samr_password.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         557 source4/rpc_server/samr/samr_password.c 		return nt_status;
nt_status         590 source4/rpc_server/samr/samr_password.c 	NTSTATUS nt_status;
nt_status         596 source4/rpc_server/samr/samr_password.c 	nt_status = dcesrv_fetch_session_key(dce_call->conn, &session_key);
nt_status         597 source4/rpc_server/samr/samr_password.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         598 source4/rpc_server/samr/samr_password.c 		return nt_status;
nt_status        2085 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 	NTSTATUS nt_status;
nt_status        2087 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 	nt_status = srvsvc_create_ntvfs_context(dce_call, mem_ctx, r->in.share, &ntvfs_ctx);
nt_status        2088 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 	if (!NT_STATUS_IS_OK(nt_status)) return ntstatus_to_werror(nt_status);
nt_status        2107 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 	nt_status = ntvfs_qpathinfo(ntvfs_req, io);
nt_status        2108 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 	if (!NT_STATUS_IS_OK(nt_status)) return ntstatus_to_werror(nt_status);
nt_status        2126 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 	NTSTATUS nt_status;
nt_status        2128 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 	nt_status = srvsvc_create_ntvfs_context(dce_call, mem_ctx, r->in.share, &ntvfs_ctx);
nt_status        2129 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 	if (!NT_STATUS_IS_OK(nt_status)) return ntstatus_to_werror(nt_status);
nt_status        2146 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 	nt_status = ntvfs_setpathinfo(ntvfs_req, io);
nt_status        2147 source4/rpc_server/srvsvc/dcesrv_srvsvc.c 	if (!NT_STATUS_IS_OK(nt_status)) return ntstatus_to_werror(nt_status);
nt_status          36 source4/smb_server/smb/negprot.c 	NTSTATUS nt_status;
nt_status          47 source4/smb_server/smb/negprot.c 	nt_status = auth_context_create(smb_conn, 
nt_status          52 source4/smb_server/smb/negprot.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          53 source4/smb_server/smb/negprot.c 		DEBUG(0, ("auth_context_create() returned %s", nt_errstr(nt_status)));
nt_status          54 source4/smb_server/smb/negprot.c 		return nt_status;
nt_status          57 source4/smb_server/smb/negprot.c 	nt_status = auth_get_challenge(smb_conn->negotiate.auth_context, &challenge);
nt_status          58 source4/smb_server/smb/negprot.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          59 source4/smb_server/smb/negprot.c 		DEBUG(0, ("auth_get_challenge() returned %s", nt_errstr(nt_status)));
nt_status          60 source4/smb_server/smb/negprot.c 		return nt_status;
nt_status         159 source4/smb_server/smb/negprot.c 		NTSTATUS nt_status;
nt_status         163 source4/smb_server/smb/negprot.c 		nt_status = get_challenge(req->smb_conn, req->out.data);
nt_status         164 source4/smb_server/smb/negprot.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         352 source4/smb_server/smb/negprot.c 		NTSTATUS nt_status;
nt_status         362 source4/smb_server/smb/negprot.c 		nt_status = cli_credentials_set_machine_account(server_credentials, req->smb_conn->lp_ctx);
nt_status         363 source4/smb_server/smb/negprot.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         364 source4/smb_server/smb/negprot.c 			DEBUG(10, ("Failed to obtain server credentials, perhaps a standalone server?: %s\n", nt_errstr(nt_status)));
nt_status         369 source4/smb_server/smb/negprot.c 		nt_status = samba_server_gensec_start(req,
nt_status         377 source4/smb_server/smb/negprot.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         378 source4/smb_server/smb/negprot.c 			DEBUG(0, ("Failed to start GENSEC: %s\n", nt_errstr(nt_status)));
nt_status         394 source4/smb_server/smb/negprot.c 		nt_status = gensec_start_mech_by_oid(gensec_security, oid);
nt_status         396 source4/smb_server/smb/negprot.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         398 source4/smb_server/smb/negprot.c 			nt_status = gensec_update(gensec_security, req, null_data_blob, &blob);
nt_status         400 source4/smb_server/smb/negprot.c 			if (!NT_STATUS_IS_OK(nt_status) && !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         401 source4/smb_server/smb/negprot.c 				DEBUG(1, ("Failed to get SPNEGO to give us the first token: %s\n", nt_errstr(nt_status)));
nt_status         405 source4/smb_server/smb/negprot.c 		if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         408 source4/smb_server/smb/negprot.c 			DEBUG(5, ("Failed to start SPNEGO, falling back to NTLMSSP only: %s\n", nt_errstr(nt_status)));
nt_status         410 source4/smb_server/smb/negprot.c 			nt_status = gensec_start_mech_by_oid(gensec_security, oid);
nt_status         412 source4/smb_server/smb/negprot.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         413 source4/smb_server/smb/negprot.c 				DEBUG(0, ("Failed to start SPNEGO as well as NTLMSSP fallback: %s\n", nt_errstr(nt_status)));
nt_status          41 source4/smb_server/smb2/negprot.c 	NTSTATUS nt_status;
nt_status          51 source4/smb_server/smb2/negprot.c 	nt_status = cli_credentials_set_machine_account(server_credentials, req->smb_conn->lp_ctx);
nt_status          52 source4/smb_server/smb2/negprot.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          53 source4/smb_server/smb2/negprot.c 		DEBUG(10, ("Failed to obtain server credentials, perhaps a standalone server?: %s\n", nt_errstr(nt_status)));
nt_status          60 source4/smb_server/smb2/negprot.c 	nt_status = samba_server_gensec_start(req,
nt_status          67 source4/smb_server/smb2/negprot.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          68 source4/smb_server/smb2/negprot.c 		DEBUG(0, ("Failed to start GENSEC: %s\n", nt_errstr(nt_status)));
nt_status          70 source4/smb_server/smb2/negprot.c 		return nt_status;
nt_status          77 source4/smb_server/smb2/negprot.c 	nt_status = gensec_start_mech_by_oid(gensec_security, GENSEC_OID_SPNEGO);
nt_status          78 source4/smb_server/smb2/negprot.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status          79 source4/smb_server/smb2/negprot.c 		DEBUG(0, ("Failed to start SPNEGO: %s\n", nt_errstr(nt_status)));
nt_status          81 source4/smb_server/smb2/negprot.c 		return nt_status;
nt_status          84 source4/smb_server/smb2/negprot.c 	nt_status = gensec_update(gensec_security, req, null_data_blob, &blob);
nt_status          85 source4/smb_server/smb2/negprot.c 	if (!NT_STATUS_IS_OK(nt_status) && !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status          86 source4/smb_server/smb2/negprot.c 		DEBUG(0, ("Failed to get SPNEGO to give us the first token: %s\n", nt_errstr(nt_status)));
nt_status          88 source4/smb_server/smb2/negprot.c 		return nt_status;
nt_status          35 source4/torture/auth/pac.c 	NTSTATUS nt_status;
nt_status          93 source4/torture/auth/pac.c 	nt_status = auth_anonymous_server_info(mem_ctx, lp_netbios_name(tctx->lp_ctx), &server_info);
nt_status          95 source4/torture/auth/pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         143 source4/torture/auth/pac.c 	nt_status = kerberos_decode_pac(mem_ctx, 
nt_status         153 source4/torture/auth/pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         163 source4/torture/auth/pac.c 						   nt_errstr(nt_status)));
nt_status         167 source4/torture/auth/pac.c 	nt_status = kerberos_pac_blob_to_server_info(mem_ctx, 
nt_status         191 source4/torture/auth/pac.c 	nt_status = kerberos_pac_logon_info(mem_ctx, 
nt_status         202 source4/torture/auth/pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         213 source4/torture/auth/pac.c 					     nt_errstr(nt_status)));
nt_status         225 source4/torture/auth/pac.c 	nt_status = make_server_info_netlogon_validation(mem_ctx,
nt_status         229 source4/torture/auth/pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         233 source4/torture/auth/pac.c 					     nt_errstr(nt_status)));
nt_status         297 source4/torture/auth/pac.c 	NTSTATUS nt_status;
nt_status         411 source4/torture/auth/pac.c 	nt_status = kerberos_decode_pac(mem_ctx, 
nt_status         419 source4/torture/auth/pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         428 source4/torture/auth/pac.c 						   nt_errstr(nt_status)));
nt_status         432 source4/torture/auth/pac.c 	nt_status = kerberos_pac_blob_to_server_info(mem_ctx, 
nt_status         438 source4/torture/auth/pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         447 source4/torture/auth/pac.c 						   nt_errstr(nt_status)));
nt_status         470 source4/torture/auth/pac.c 	nt_status = kerberos_pac_logon_info(mem_ctx, 
nt_status         479 source4/torture/auth/pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         489 source4/torture/auth/pac.c 					     nt_errstr(nt_status)));
nt_status         493 source4/torture/auth/pac.c 	nt_status = make_server_info_netlogon_validation(mem_ctx,
nt_status         497 source4/torture/auth/pac.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         507 source4/torture/auth/pac.c 					     nt_errstr(nt_status)));
nt_status         616 source4/torture/auth/pac.c 		nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         617 source4/torture/auth/pac.c 		torture_assert_ntstatus_ok(tctx, nt_status, "can't parse the PAC");
nt_status         638 source4/torture/auth/pac.c 		nt_status = ndr_map_error2ntstatus(ndr_err);
nt_status         639 source4/torture/auth/pac.c 		torture_assert_ntstatus_ok(tctx, nt_status, "can't parse the PAC");
nt_status         661 source4/torture/auth/pac.c 	nt_status = kerberos_decode_pac(mem_ctx, 
nt_status         670 source4/torture/auth/pac.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         699 source4/torture/auth/pac.c 	nt_status = kerberos_decode_pac(mem_ctx, 
nt_status         708 source4/torture/auth/pac.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         719 source4/torture/auth/pac.c 	nt_status = kerberos_decode_pac(mem_ctx, 
nt_status         728 source4/torture/auth/pac.c 	if (NT_STATUS_IS_OK(nt_status)) {
nt_status         739 source4/torture/basic/base.c 	if (!NT_STATUS_EQUAL(cli->transport->error.e.nt_status, 
nt_status         741 source4/torture/basic/base.c 	    !NT_STATUS_EQUAL(cli->transport->error.e.nt_status, 
nt_status         105 source4/torture/basic/delete.c 	torture_assert_ntstatus_equal(tctx, _cli->tree->session->transport->error.e.nt_status, _expected, \
nt_status         155 source4/torture/locktest2.c 	NTSTATUS nt_status;
nt_status         174 source4/torture/locktest2.c 	nt_status = smbcli_full_connection(NULL, 
nt_status         178 source4/torture/locktest2.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         179 source4/torture/locktest2.c 		DEBUG(0, ("smbcli_full_connection failed with error %s\n", nt_errstr(nt_status)));
nt_status         274 source4/torture/rpc/samlogon.c 	NTSTATUS nt_status;
nt_status         299 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
nt_status         311 source4/torture/rpc/samlogon.c 	if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) {
nt_status         321 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) {
nt_status         323 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
nt_status         325 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
nt_status         327 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
nt_status         329 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         406 source4/torture/rpc/samlogon.c 	NTSTATUS nt_status;
nt_status         428 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
nt_status         438 source4/torture/rpc/samlogon.c 	if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) {
nt_status         444 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
nt_status         446 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
nt_status         448 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
nt_status         450 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         502 source4/torture/rpc/samlogon.c 	NTSTATUS nt_status;
nt_status         525 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
nt_status         535 source4/torture/rpc/samlogon.c 	if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) {
nt_status         541 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
nt_status         543 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
nt_status         545 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
nt_status         547 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         551 source4/torture/rpc/samlogon.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         593 source4/torture/rpc/samlogon.c 	NTSTATUS nt_status;
nt_status         632 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
nt_status         646 source4/torture/rpc/samlogon.c 	if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) {
nt_status         652 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) {
nt_status         654 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
nt_status         656 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
nt_status         658 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
nt_status         660 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         741 source4/torture/rpc/samlogon.c 	NTSTATUS nt_status;
nt_status         800 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
nt_status         814 source4/torture/rpc/samlogon.c 	if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) {
nt_status         820 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) {
nt_status         822 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
nt_status         824 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
nt_status         826 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
nt_status         828 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1046 source4/torture/rpc/samlogon.c 	NTSTATUS nt_status;
nt_status        1087 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
nt_status        1097 source4/torture/rpc/samlogon.c 	if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) {
nt_status        1103 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
nt_status        1105 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
nt_status        1107 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
nt_status        1109 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        1148 source4/torture/rpc/samlogon.c 	NTSTATUS nt_status;
nt_status        1185 source4/torture/rpc/samlogon.c 	nt_status = check_samlogon(samlogon_state,
nt_status        1195 source4/torture/rpc/samlogon.c 	if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) {
nt_status        1205 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) {
nt_status        1207 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) {
nt_status        1209 source4/torture/rpc/samlogon.c 		asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status));
nt_status        1211 source4/torture/rpc/samlogon.c 	} else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) {
nt_status        1213 source4/torture/rpc/samlogon.c 	} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status        4365 source4/torture/rpc/samr.c 		NTSTATUS nt_status;
nt_status        4424 source4/torture/rpc/samr.c 		if (!NT_STATUS_EQUAL(status, account_types[i].nt_status)) {
nt_status        4426 source4/torture/rpc/samr.c 			       nt_errstr(status), nt_errstr(account_types[i].nt_status));
nt_status         161 source4/torture/rpc/samsync.c 	NTSTATUS nt_status;
nt_status         168 source4/torture/rpc/samsync.c 	nt_status = dcerpc_samr_LookupDomain(samsync_state->p_samr, mem_ctx, &l);
nt_status         169 source4/torture/rpc/samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         170 source4/torture/rpc/samsync.c 		printf("LookupDomain failed - %s\n", nt_errstr(nt_status));
nt_status         183 source4/torture/rpc/samsync.c 	nt_status = dcerpc_samr_OpenDomain(samsync_state->p_samr, mem_ctx, &o);
nt_status         184 source4/torture/rpc/samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         185 source4/torture/rpc/samsync.c 		printf("OpenDomain failed - %s\n", nt_errstr(nt_status));
nt_status         312 source4/torture/rpc/samsync.c 	NTSTATUS nt_status;
nt_status         363 source4/torture/rpc/samsync.c 		nt_status = dcerpc_samr_QueryDomainInfo(samsync_state->p_samr, mem_ctx, &q[levels[i]]);
nt_status         365 source4/torture/rpc/samsync.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         367 source4/torture/rpc/samsync.c 			       q[levels[i]].in.level, nt_errstr(nt_status));
nt_status         439 source4/torture/rpc/samsync.c 	NTSTATUS nt_status;
nt_status         460 source4/torture/rpc/samsync.c 	nt_status = dcerpc_samr_OpenUser(samsync_state->p_samr, mem_ctx, &r);
nt_status         461 source4/torture/rpc/samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         462 source4/torture/rpc/samsync.c 		printf("OpenUser(%u) failed - %s\n", rid, nt_errstr(nt_status));
nt_status         472 source4/torture/rpc/samsync.c 	nt_status = dcerpc_samr_QueryUserInfo(samsync_state->p_samr, mem_ctx, &q);
nt_status         473 source4/torture/rpc/samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         475 source4/torture/rpc/samsync.c 		       q.in.level, nt_errstr(nt_status));
nt_status         482 source4/torture/rpc/samsync.c 	nt_status = dcerpc_samr_GetGroupsForUser(samsync_state->p_samr, mem_ctx, &getgroups);
nt_status         483 source4/torture/rpc/samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         485 source4/torture/rpc/samsync.c 		       nt_errstr(nt_status));
nt_status         491 source4/torture/rpc/samsync.c 		       nt_errstr(nt_status));
nt_status         498 source4/torture/rpc/samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         500 source4/torture/rpc/samsync.c 		       q.in.level, nt_errstr(nt_status));
nt_status         610 source4/torture/rpc/samsync.c 	nt_status = test_SamLogon(samsync_state->p_netlogon_wksta, mem_ctx, samsync_state->creds_netlogon_wksta, 
nt_status         618 source4/torture/rpc/samsync.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_DISABLED)) {
nt_status         622 source4/torture/rpc/samsync.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT)) {
nt_status         626 source4/torture/rpc/samsync.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_SERVER_TRUST_ACCOUNT)) {
nt_status         630 source4/torture/rpc/samsync.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT)) {
nt_status         634 source4/torture/rpc/samsync.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT)) {
nt_status         638 source4/torture/rpc/samsync.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_LOCKED_OUT)) {
nt_status         642 source4/torture/rpc/samsync.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_EXPIRED)) {
nt_status         646 source4/torture/rpc/samsync.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD)) {
nt_status         650 source4/torture/rpc/samsync.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_MUST_CHANGE)) {
nt_status         653 source4/torture/rpc/samsync.c 	} else if (NT_STATUS_IS_OK(nt_status)) {
nt_status         719 source4/torture/rpc/samsync.c 		       domain, username, nt_errstr(nt_status));
nt_status         730 source4/torture/rpc/samsync.c 	NTSTATUS nt_status;
nt_status         748 source4/torture/rpc/samsync.c 	nt_status = dcerpc_samr_OpenAlias(samsync_state->p_samr, mem_ctx, &r);
nt_status         749 source4/torture/rpc/samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         750 source4/torture/rpc/samsync.c 		printf("OpenUser(%u) failed - %s\n", rid, nt_errstr(nt_status));
nt_status         760 source4/torture/rpc/samsync.c 	nt_status = dcerpc_samr_QueryAliasInfo(samsync_state->p_samr, mem_ctx, &q);
nt_status         765 source4/torture/rpc/samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         767 source4/torture/rpc/samsync.c 		       q.in.level, nt_errstr(nt_status));
nt_status         781 source4/torture/rpc/samsync.c 	NTSTATUS nt_status;
nt_status         799 source4/torture/rpc/samsync.c 	nt_status = dcerpc_samr_OpenGroup(samsync_state->p_samr, mem_ctx, &r);
nt_status         800 source4/torture/rpc/samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         801 source4/torture/rpc/samsync.c 		printf("OpenUser(%u) failed - %s\n", rid, nt_errstr(nt_status));
nt_status         811 source4/torture/rpc/samsync.c 	nt_status = dcerpc_samr_QueryGroupInfo(samsync_state->p_samr, mem_ctx, &q);
nt_status         816 source4/torture/rpc/samsync.c 	if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         818 source4/torture/rpc/samsync.c 		       q.in.level, nt_errstr(nt_status));
nt_status        1303 source4/torture/rpc/samsync.c 				NTSTATUS nt_status;
nt_status        1308 source4/torture/rpc/samsync.c 				nt_status = test_SamLogon(samsync_state->p_netlogon_wksta, trustdom_ctx, samsync_state->creds_netlogon_wksta, 
nt_status        1315 source4/torture/rpc/samsync.c 				if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_LOGON_SERVERS)) {
nt_status        1317 source4/torture/rpc/samsync.c 					       t->name, nt_errstr(nt_status));
nt_status        1321 source4/torture/rpc/samsync.c 				if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT)) {
nt_status        1323 source4/torture/rpc/samsync.c 					       t->name, nt_errstr(nt_status));
nt_status        1329 source4/torture/rpc/samsync.c 				nt_status = test_SamLogon(samsync_state->p_netlogon_wksta, trustdom_ctx, samsync_state->creds_netlogon_wksta, 
nt_status        1337 source4/torture/rpc/samsync.c 				if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD)) {
nt_status        1339 source4/torture/rpc/samsync.c 					       t->name, nt_errstr(nt_status));
nt_status         235 source4/torture/winbind/struct_based.c 				nt_errstr(NT_STATUS(rep.data.auth.nt_status)),
nt_status         243 source4/torture/winbind/struct_based.c 				   NT_STATUS(rep.data.auth.nt_status),
nt_status         197 source4/utils/ntlm_auth.c 	NTSTATUS nt_status;
nt_status         202 source4/utils/ntlm_auth.c 		nt_status = NT_STATUS_NO_MEMORY;
nt_status         214 source4/utils/ntlm_auth.c 		nt_status = ntlm_password_check(mem_ctx, 
nt_status         227 source4/utils/ntlm_auth.c 		if (NT_STATUS_IS_OK(nt_status)) {
nt_status         237 source4/utils/ntlm_auth.c 				  nt_errstr(nt_status)));
nt_status         242 source4/utils/ntlm_auth.c 		*error_string = strdup(nt_errstr(nt_status));
nt_status         244 source4/utils/ntlm_auth.c 	return nt_status;
nt_status         398 source4/utils/ntlm_auth.c 	NTSTATUS nt_status;
nt_status         476 source4/utils/ntlm_auth.c 			nt_status = gensec_client_start(NULL, &state->gensec_state, ev, 
nt_status         478 source4/utils/ntlm_auth.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         494 source4/utils/ntlm_auth.c 			nt_status = auth_context_create_methods(mem_ctx, 
nt_status         501 source4/utils/ntlm_auth.c 			if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         549 source4/utils/ntlm_auth.c 			nt_status = gensec_start_mech_by_oid(state->gensec_state, GENSEC_OID_SPNEGO);
nt_status         560 source4/utils/ntlm_auth.c 			nt_status = gensec_start_mech_by_oid(state->gensec_state, GENSEC_OID_NTLMSSP);
nt_status         566 source4/utils/ntlm_auth.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         567 source4/utils/ntlm_auth.c 			DEBUG(1, ("GENSEC mech failed to start: %s\n", nt_errstr(nt_status)));
nt_status         596 source4/utils/ntlm_auth.c 		nt_status = gensec_session_info(state->gensec_state, &session_info); 
nt_status         597 source4/utils/ntlm_auth.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         598 source4/utils/ntlm_auth.c 			DEBUG(1, ("gensec_session_info failed: %s\n", nt_errstr(nt_status)));
nt_status         599 source4/utils/ntlm_auth.c 			mux_printf(mux_id, "BH %s\n", nt_errstr(nt_status));
nt_status         625 source4/utils/ntlm_auth.c 		nt_status = gensec_session_key(state->gensec_state, &session_key);
nt_status         626 source4/utils/ntlm_auth.c 		if(!NT_STATUS_IS_OK(nt_status)) {
nt_status         627 source4/utils/ntlm_auth.c 			DEBUG(1, ("gensec_session_key failed: %s\n", nt_errstr(nt_status)));
nt_status         653 source4/utils/ntlm_auth.c 	nt_status = gensec_update(state->gensec_state, mem_ctx, in, &out);
nt_status         656 source4/utils/ntlm_auth.c 	nt_status = auth_nt_status_squash(nt_status);
nt_status         664 source4/utils/ntlm_auth.c 	if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
nt_status         677 source4/utils/ntlm_auth.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED)) {
nt_status         679 source4/utils/ntlm_auth.c 		reply_arg = nt_errstr(nt_status);
nt_status         680 source4/utils/ntlm_auth.c 		DEBUG(1, ("GENSEC login failed: %s\n", nt_errstr(nt_status)));
nt_status         681 source4/utils/ntlm_auth.c 	} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_UNSUCCESSFUL)) {
nt_status         683 source4/utils/ntlm_auth.c 		reply_arg = nt_errstr(nt_status);
nt_status         684 source4/utils/ntlm_auth.c 		DEBUG(1, ("GENSEC login failed: %s\n", nt_errstr(nt_status)));
nt_status         685 source4/utils/ntlm_auth.c 	} else if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         687 source4/utils/ntlm_auth.c 		reply_arg = nt_errstr(nt_status);
nt_status         688 source4/utils/ntlm_auth.c 		DEBUG(1, ("GENSEC login failed: %s\n", nt_errstr(nt_status)));
nt_status         692 source4/utils/ntlm_auth.c 		nt_status = gensec_session_info(state->gensec_state, &session_info);
nt_status         693 source4/utils/ntlm_auth.c 		if (!NT_STATUS_IS_OK(nt_status)) {
nt_status         695 source4/utils/ntlm_auth.c 			reply_arg = nt_errstr(nt_status);
nt_status         696 source4/utils/ntlm_auth.c 			DEBUG(1, ("GENSEC failed to retreive the session info: %s\n", nt_errstr(nt_status)));
nt_status          57 source4/winbind/wb_samba3_cmd.c 	resp->data.auth.nt_status = NT_STATUS_V(status);