nt_status 701 examples/pcap2nbench/main.cpp << NT_STATUS(j->smb_hdr.nt_status) << std::endl; nt_status 712 examples/pcap2nbench/main.cpp << NT_STATUS(j->smb_hdr.nt_status) << std::endl; nt_status 723 examples/pcap2nbench/main.cpp << NT_STATUS(j->smb_hdr.nt_status) << std::endl; nt_status 729 examples/pcap2nbench/main.cpp << NT_STATUS(j->smb_hdr.nt_status) << std::endl; nt_status 38 examples/pcap2nbench/smb.cpp memcpy(&nt_status, data + 9, 4); nt_status 61 examples/pcap2nbench/smb.cpp << "NT Status: " << rhs.nt_status << std::endl nt_status 34 examples/pcap2nbench/smb.hpp uint32_t nt_status; nt_status 108 examples/pdb/test.c NTSTATUS nt_status; nt_status 110 examples/pdb/test.c if (!NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method ))) { nt_status 111 examples/pdb/test.c return nt_status; nt_status 217 nsswitch/libwbclient/wbc_pam.c e->nt_status = resp->data.auth.nt_status; nt_status 465 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) { nt_status 519 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) { nt_status 606 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) { nt_status 835 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) { nt_status 1000 nsswitch/libwbclient/wbc_pam.c if (response.data.auth.nt_status != 0) { nt_status 397 nsswitch/libwbclient/wbclient.h uint32_t nt_status; nt_status 712 nsswitch/wbinfo.c error->nt_string, error->nt_status); nt_status 1218 nsswitch/wbinfo.c if (response.data.auth.nt_status) nt_status 1221 nsswitch/wbinfo.c response.data.auth.nt_status, nt_status 1272 nsswitch/wbinfo.c if (response.data.auth.nt_status) nt_status 1275 nsswitch/wbinfo.c response.data.auth.nt_status, nt_status 1373 nsswitch/wbinfo.c err->nt_status, nt_status 1422 nsswitch/wbinfo.c if (response.data.auth.nt_status) nt_status 1425 nsswitch/wbinfo.c response.data.auth.nt_status, nt_status 545 nsswitch/wbinfo4.c response.data.auth.nt_status); nt_status 755 nsswitch/wbinfo4.c if (response.data.auth.nt_status) nt_status 758 nsswitch/wbinfo4.c response.data.auth.nt_status, nt_status 810 nsswitch/wbinfo4.c if (response.data.auth.nt_status) nt_status 813 nsswitch/wbinfo4.c response.data.auth.nt_status, nt_status 917 nsswitch/wbinfo4.c if (response.data.auth.nt_status) nt_status 920 nsswitch/wbinfo4.c response.data.auth.nt_status, nt_status 408 nsswitch/winbind_struct_protocol.h uint32_t nt_status; nt_status 213 source3/auth/auth.c NTSTATUS nt_status = NT_STATUS_NO_SUCH_USER; nt_status 267 source3/auth/auth.c nt_status = result; nt_status 269 source3/auth/auth.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 274 source3/auth/auth.c auth_method->name, user_info->smb_name, nt_errstr(nt_status))); nt_status 279 source3/auth/auth.c if ( NT_STATUS_IS_OK(nt_status)) nt_status 287 source3/auth/auth.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 292 source3/auth/auth.c nt_status = smb_pam_accountcheck(unix_username); nt_status 295 source3/auth/auth.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 300 source3/auth/auth.c unix_username, nt_errstr(nt_status))); nt_status 304 source3/auth/auth.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 313 source3/auth/auth.c return nt_status; nt_status 320 source3/auth/auth.c nt_errstr(nt_status))); nt_status 323 source3/auth/auth.c return nt_status; nt_status 433 source3/auth/auth.c NTSTATUS nt_status; nt_status 440 source3/auth/auth.c if (!NT_STATUS_IS_OK(nt_status = make_auth_context(auth_context))) nt_status 441 source3/auth/auth.c return nt_status; nt_status 451 source3/auth/auth.c return nt_status; nt_status 461 source3/auth/auth.c NTSTATUS nt_status; nt_status 529 source3/auth/auth.c nt_status = make_auth_context_text_list(auth_context, nt_status 533 source3/auth/auth.c return nt_status; nt_status 542 source3/auth/auth.c NTSTATUS nt_status; nt_status 543 source3/auth/auth.c if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(auth_context))) { nt_status 544 source3/auth/auth.c return nt_status; nt_status 549 source3/auth/auth.c return nt_status; nt_status 41 source3/auth/auth_builtin.c NTSTATUS nt_status = NT_STATUS_NOT_IMPLEMENTED; nt_status 45 source3/auth/auth_builtin.c nt_status = make_server_info_guest(NULL, server_info); nt_status 48 source3/auth/auth_builtin.c return nt_status; nt_status 83 source3/auth/auth_builtin.c NTSTATUS nt_status; nt_status 98 source3/auth/auth_builtin.c nt_status = NT_STATUS(error_num); nt_status 100 source3/auth/auth_builtin.c return nt_status; nt_status 43 source3/auth/auth_compat.c NTSTATUS nt_status; nt_status 44 source3/auth/auth_compat.c if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&plaintext_auth_context))) { nt_status 45 source3/auth/auth_compat.c return nt_status; nt_status 57 source3/auth/auth_compat.c nt_status = plaintext_auth_context->check_ntlm_password(plaintext_auth_context, nt_status 62 source3/auth/auth_compat.c return nt_status; nt_status 73 source3/auth/auth_compat.c NTSTATUS nt_status; nt_status 81 source3/auth/auth_compat.c nt_status = negprot_global_auth_context->check_ntlm_password(negprot_global_auth_context, nt_status 85 source3/auth/auth_compat.c nt_status = check_plaintext_password(smb_name, plaintext_password, &server_info); nt_status 88 source3/auth/auth_compat.c return nt_status; nt_status 264 source3/auth/auth_domain.c NTSTATUS nt_status = NT_STATUS_NO_LOGON_SERVERS; nt_status 278 source3/auth/auth_domain.c for (i = 0; !NT_STATUS_IS_OK(nt_status) && retry && (i < 3); i++) { nt_status 279 source3/auth/auth_domain.c nt_status = connect_to_domain_password_server(&cli, nt_status 287 source3/auth/auth_domain.c if ( !NT_STATUS_IS_OK(nt_status) ) { nt_status 289 source3/auth/auth_domain.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED)) { nt_status 292 source3/auth/auth_domain.c return nt_status; nt_status 304 source3/auth/auth_domain.c nt_status = rpccli_netlogon_sam_network_logon(netlogon_pipe, nt_status 321 source3/auth/auth_domain.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 326 source3/auth/auth_domain.c nt_errstr(nt_status))); nt_status 329 source3/auth/auth_domain.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_UNSUCCESSFUL)) { nt_status 330 source3/auth/auth_domain.c nt_status = NT_STATUS_NO_LOGON_SERVERS; nt_status 333 source3/auth/auth_domain.c nt_status = make_server_info_info3(mem_ctx, nt_status 339 source3/auth/auth_domain.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 345 source3/auth/auth_domain.c nt_status = smb_pam_accountcheck((*server_info)->unix_name); nt_status 346 source3/auth/auth_domain.c if ( !NT_STATUS_IS_OK(nt_status)) { nt_status 350 source3/auth/auth_domain.c return nt_status; nt_status 364 source3/auth/auth_domain.c return nt_status; nt_status 377 source3/auth/auth_domain.c NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; nt_status 412 source3/auth/auth_domain.c nt_status = domain_client_validate(mem_ctx, nt_status 420 source3/auth/auth_domain.c return nt_status; nt_status 446 source3/auth/auth_domain.c NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; nt_status 514 source3/auth/auth_domain.c nt_status = domain_client_validate(mem_ctx, nt_status 522 source3/auth/auth_domain.c return nt_status; nt_status 87 source3/auth/auth_ntlmssp.c NTSTATUS nt_status; nt_status 101 source3/auth/auth_ntlmssp.c nt_status = make_user_info_map(&user_info, nt_status 112 source3/auth/auth_ntlmssp.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 113 source3/auth/auth_ntlmssp.c return nt_status; nt_status 116 source3/auth/auth_ntlmssp.c nt_status = auth_ntlmssp_state->auth_context->check_ntlm_password(auth_ntlmssp_state->auth_context, nt_status 123 source3/auth/auth_ntlmssp.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 124 source3/auth/auth_ntlmssp.c return nt_status; nt_status 129 source3/auth/auth_ntlmssp.c nt_status = create_local_token(auth_ntlmssp_state->server_info); nt_status 131 source3/auth/auth_ntlmssp.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 133 source3/auth/auth_ntlmssp.c nt_errstr(nt_status))); nt_status 134 source3/auth/auth_ntlmssp.c return nt_status; nt_status 151 source3/auth/auth_ntlmssp.c return nt_status; nt_status 156 source3/auth/auth_ntlmssp.c NTSTATUS nt_status; nt_status 172 source3/auth/auth_ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_server_start(&(*auth_ntlmssp_state)->ntlmssp_state))) { nt_status 173 source3/auth/auth_ntlmssp.c return nt_status; nt_status 176 source3/auth/auth_ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&(*auth_ntlmssp_state)->auth_context))) { nt_status 177 source3/auth/auth_ntlmssp.c return nt_status; nt_status 257 source3/auth/auth_sam.c NTSTATUS nt_status; nt_status 296 source3/auth/auth_sam.c nt_status = sam_password_ok(auth_context, mem_ctx, sampass, nt_status 302 source3/auth/auth_sam.c update_login_attempts_status = pdb_update_login_attempts(sampass, NT_STATUS_IS_OK(nt_status)); nt_status 304 source3/auth/auth_sam.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 305 source3/auth/auth_sam.c if (NT_STATUS_EQUAL(nt_status,NT_STATUS_WRONG_PASSWORD) && nt_status 324 source3/auth/auth_sam.c return nt_status; nt_status 341 source3/auth/auth_sam.c nt_status = sam_account_ok(mem_ctx, sampass, user_info); nt_status 343 source3/auth/auth_sam.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 347 source3/auth/auth_sam.c return nt_status; nt_status 351 source3/auth/auth_sam.c nt_status = make_server_info_sam(server_info, sampass); nt_status 354 source3/auth/auth_sam.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 355 source3/auth/auth_sam.c DEBUG(0,("check_sam_security: make_server_info_sam() failed with '%s'\n", nt_errstr(nt_status))); nt_status 358 source3/auth/auth_sam.c return nt_status; nt_status 373 source3/auth/auth_sam.c return nt_status; nt_status 281 source3/auth/auth_server.c NTSTATUS nt_status = NT_STATUS_NOT_IMPLEMENTED; nt_status 395 source3/auth/auth_server.c nt_status = cli_session_setup( nt_status 402 source3/auth/auth_server.c nt_status = cli_session_setup( nt_status 411 source3/auth/auth_server.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 413 source3/auth/auth_server.c cli->desthost, nt_errstr(nt_status))); nt_status 419 source3/auth/auth_server.c nt_status = NT_STATUS_LOGON_FAILURE; nt_status 424 source3/auth/auth_server.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 433 source3/auth/auth_server.c nt_status = smb_pam_accountcheck(pass->pw_name); nt_status 434 source3/auth/auth_server.c if ( !NT_STATUS_IS_OK(nt_status)) { nt_status 438 source3/auth/auth_server.c nt_status = make_server_info_pw(server_info, pass->pw_name, pass); nt_status 444 source3/auth/auth_server.c nt_status = NT_STATUS_NO_SUCH_USER; nt_status 452 source3/auth/auth_server.c return(nt_status); nt_status 91 source3/auth/auth_unix.c NTSTATUS nt_status; nt_status 100 source3/auth/auth_unix.c nt_status = pass_check(pass, nt_status 110 source3/auth/auth_unix.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 114 source3/auth/auth_unix.c nt_status = smb_pam_accountcheck(pass->pw_name); nt_status 115 source3/auth/auth_unix.c if ( !NT_STATUS_IS_OK(nt_status)) { nt_status 122 source3/auth/auth_unix.c nt_status = NT_STATUS_NO_SUCH_USER; nt_status 127 source3/auth/auth_unix.c return nt_status; nt_status 352 source3/auth/auth_util.c NTSTATUS nt_status; nt_status 375 source3/auth/auth_util.c nt_status = make_user_info_map( nt_status 384 source3/auth/auth_util.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 388 source3/auth/auth_util.c ret = NT_STATUS_IS_OK(nt_status) ? True : False; nt_status 480 source3/auth/auth_util.c NTSTATUS nt_status; nt_status 482 source3/auth/auth_util.c nt_status = make_user_info(user_info, nt_status 491 source3/auth/auth_util.c return NT_STATUS_IS_OK(nt_status) ? True : False; nt_status 1488 source3/auth/auth_util.c NTSTATUS nt_status; nt_status 1519 source3/auth/auth_util.c nt_status = samu_set_unix( account, passwd ); nt_status 1523 source3/auth/auth_util.c return nt_status; nt_status 1623 source3/auth/auth_util.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 1685 source3/auth/auth_util.c nt_status = fill_sam_account(mem_ctx, nt_domain, sent_nt_username, nt_status 1693 source3/auth/auth_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1699 source3/auth/auth_util.c return nt_status; nt_status 1821 source3/auth/auth_util.c nt_status = sid_array_from_info3(result, info3, nt_status 1825 source3/auth/auth_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1827 source3/auth/auth_util.c return nt_status; nt_status 1875 source3/auth/auth_util.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 1948 source3/auth/auth_util.c nt_status = fill_sam_account(result, nt_domain, sent_nt_username, nt_status 1955 source3/auth/auth_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1961 source3/auth/auth_util.c return nt_status; nt_status 53 source3/auth/auth_wbc.c NTSTATUS nt_status; nt_status 109 source3/auth/auth_wbc.c nt_status = NT_STATUS(err->nt_status); nt_status 111 source3/auth/auth_wbc.c return nt_status; nt_status 120 source3/auth/auth_wbc.c nt_status = make_server_info_wbcAuthUserInfo(mem_ctx, nt_status 125 source3/auth/auth_wbc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 126 source3/auth/auth_wbc.c return nt_status; nt_status 131 source3/auth/auth_wbc.c return nt_status; nt_status 36 source3/auth/auth_winbind.c NTSTATUS nt_status; nt_status 105 source3/auth/auth_winbind.c nt_status = NT_STATUS(err->nt_status); nt_status 107 source3/auth/auth_winbind.c return nt_status; nt_status 114 source3/auth/auth_winbind.c nt_status = make_server_info_wbcAuthUserInfo(mem_ctx, nt_status 119 source3/auth/auth_winbind.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 120 source3/auth/auth_winbind.c return nt_status; nt_status 125 source3/auth/auth_winbind.c return nt_status; nt_status 91 source3/auth/pampass.c NTSTATUS *nt_status) nt_status 93 source3/auth/pampass.c *nt_status = pam_to_nt_status(pam_error); nt_status 98 source3/auth/pampass.c if (NT_STATUS_IS_OK(*nt_status)) { nt_status 102 source3/auth/pampass.c *nt_status = NT_STATUS_LOGON_FAILURE; nt_status 516 source3/auth/pampass.c NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; nt_status 552 source3/auth/pampass.c smb_pam_nt_status_error_handler(pamh, pam_error, "Authentication Failure", 2, &nt_status); nt_status 553 source3/auth/pampass.c return nt_status; nt_status 562 source3/auth/pampass.c NTSTATUS nt_status = NT_STATUS_ACCOUNT_DISABLED; nt_status 590 source3/auth/pampass.c smb_pam_nt_status_error_handler(pamh, pam_error, "Account Check Failed", 2, &nt_status); nt_status 591 source3/auth/pampass.c return nt_status; nt_status 601 source3/auth/pampass.c NTSTATUS nt_status = NT_STATUS_NO_TOKEN; nt_status 631 source3/auth/pampass.c smb_pam_nt_status_error_handler(pamh, pam_error, "Set Credential Failure", 2, &nt_status); nt_status 632 source3/auth/pampass.c return nt_status; nt_status 778 source3/auth/pampass.c NTSTATUS nt_status = NT_STATUS_ACCOUNT_DISABLED; nt_status 793 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) nt_status 797 source3/auth/pampass.c return nt_status; nt_status 807 source3/auth/pampass.c NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; nt_status 822 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_auth(pamh, user))) { nt_status 825 source3/auth/pampass.c return nt_status; nt_status 828 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_account(pamh, user))) { nt_status 831 source3/auth/pampass.c return nt_status; nt_status 834 source3/auth/pampass.c if (!NT_STATUS_IS_OK(nt_status = smb_pam_setcred(pamh, user))) { nt_status 837 source3/auth/pampass.c return nt_status; nt_status 841 source3/auth/pampass.c return nt_status; nt_status 500 source3/auth/pass_check.c NTSTATUS nt_status; nt_status 514 source3/auth/pass_check.c if (!NT_STATUS_EQUAL(nt_status = string_combinations2(s, i + 1, fn, N - 1),NT_STATUS_WRONG_PASSWORD)) { nt_status 515 source3/auth/pass_check.c return (nt_status); nt_status 532 source3/auth/pass_check.c NTSTATUS nt_status; nt_status 534 source3/auth/pass_check.c if (!NT_STATUS_EQUAL(nt_status = string_combinations2(s, 0, fn, n), NT_STATUS_WRONG_PASSWORD)) nt_status 535 source3/auth/pass_check.c return nt_status; nt_status 656 source3/auth/pass_check.c NTSTATUS nt_status; nt_status 821 source3/auth/pass_check.c nt_status = password_check(password); nt_status 822 source3/auth/pass_check.c if NT_STATUS_IS_OK(nt_status) { nt_status 826 source3/auth/pass_check.c return (nt_status); nt_status 827 source3/auth/pass_check.c } else if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD)) { nt_status 829 source3/auth/pass_check.c return (nt_status); nt_status 833 source3/auth/pass_check.c return (nt_status); nt_status 840 source3/auth/pass_check.c return nt_status; nt_status 852 source3/auth/pass_check.c if NT_STATUS_IS_OK(nt_status = password_check(pass2)) { nt_status 855 source3/auth/pass_check.c return (nt_status); nt_status 867 source3/auth/pass_check.c if (NT_STATUS_IS_OK(nt_status = string_combinations(pass2, password_check, level))) { nt_status 870 source3/auth/pass_check.c return nt_status; nt_status 58 source3/client/smbspool.c static int get_exit_code(struct cli_state * cli, NTSTATUS nt_status); nt_status 323 source3/client/smbspool.c NTSTATUS nt_status) nt_status 342 source3/client/smbspool.c cli, NT_STATUS_V(nt_status)); nt_status 345 source3/client/smbspool.c if (!NT_STATUS_EQUAL(nt_status, auth_errors[i])) { nt_status 399 source3/client/smbspool.c NTSTATUS nt_status; nt_status 403 source3/client/smbspool.c nt_status = cli_start_connection(&cli, myname, server, NULL, port, nt_status 405 source3/client/smbspool.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 406 source3/client/smbspool.c fprintf(stderr, "ERROR: Connection failed: %s\n", nt_errstr(nt_status)); nt_status 419 source3/client/smbspool.c nt_status = cli_session_setup(cli, username, nt_status 423 source3/client/smbspool.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 424 source3/client/smbspool.c fprintf(stderr, "ERROR: Session setup failed: %s\n", nt_errstr(nt_status)); nt_status 426 source3/client/smbspool.c if (get_exit_code(cli, nt_status) == 2) { nt_status 435 source3/client/smbspool.c nt_status = cli_tcon_andx(cli, share, "?????", password, nt_status 437 source3/client/smbspool.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 439 source3/client/smbspool.c nt_errstr(nt_status)); nt_status 441 source3/client/smbspool.c if (get_exit_code(cli, nt_status) == 2) { nt_status 26 source3/include/ads.h NTSTATUS nt_status; nt_status 154 source3/include/ads.h #define ADS_ERR_OK(status) ((status.error_type == ENUM_ADS_ERROR_NT) ? NT_STATUS_IS_OK(status.err.nt_status):(status.err.rc == 0)) nt_status 100 source3/include/auth.h NTSTATUS (*nt_status_squash)(NTSTATUS nt_status); nt_status 995 source3/include/includes.h krb5_error_code nt_status_to_krb5(NTSTATUS nt_status); nt_status 582 source3/include/proto.h int nt_status_to_pam(NTSTATUS nt_status); nt_status 584 source3/include/proto.h int nt_status_to_pam(NTSTATUS nt_status); nt_status 1663 source3/include/proto.h NTSTATUS nt_status); nt_status 2826 source3/include/proto.h DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status, nt_status 2828 source3/include/proto.h bool spnego_parse_auth_response(DATA_BLOB blob, NTSTATUS nt_status, nt_status 3085 source3/include/proto.h NTSTATUS nt_status_squash(NTSTATUS nt_status); nt_status 106 source3/lib/pam_errors.c int nt_status_to_pam(NTSTATUS nt_status) nt_status 109 source3/lib/pam_errors.c if NT_STATUS_IS_OK(nt_status) return PAM_SUCCESS; nt_status 112 source3/lib/pam_errors.c if (NT_STATUS_EQUAL(nt_status,nt_status_to_pam_map[i].ntstatus)) nt_status 132 source3/lib/pam_errors.c int nt_status_to_pam(NTSTATUS nt_status) nt_status 134 source3/lib/pam_errors.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_OK)) return 0; nt_status 48 source3/libads/ads_status.c NTSTATUS nt_status) nt_status 59 source3/libads/ads_status.c ret.err.nt_status = nt_status; nt_status 73 source3/libads/ads_status.c return status.err.nt_status; nt_status 60 source3/libads/kerberos.c NTSTATUS *nt_status) nt_status 103 source3/libads/kerberos.c if (nt_status) { nt_status 104 source3/libads/kerberos.c *nt_status = parsed_edata.ntstatus; nt_status 114 source3/libads/kerberos.c NTSTATUS *nt_status) nt_status 143 source3/libads/kerberos.c ret = smb_krb5_get_ntstatus_from_krb5_error(error, nt_status); nt_status 97 source3/libads/krb5_errs.c krb5_error_code nt_status_to_krb5(NTSTATUS nt_status) nt_status 101 source3/libads/krb5_errs.c if NT_STATUS_IS_OK(nt_status) { nt_status 106 source3/libads/krb5_errs.c if (NT_STATUS_EQUAL(nt_status,nt_status_to_krb5_map[i].ntstatus)) nt_status 443 source3/libads/ldap.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 459 source3/libads/ldap.c nt_status = ads_ntstatus(ads_status); nt_status 465 source3/libads/ldap.c return nt_status; nt_status 500 source3/libads/ldap.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 522 source3/libads/ldap.c nt_status = ads_dns_query_gcs(frame, realm, sitename, nt_status 527 source3/libads/ldap.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 528 source3/libads/ldap.c ads_status = ADS_ERROR_NT(nt_status); nt_status 29 source3/libads/sasl.c NTSTATUS nt_status; nt_status 38 source3/libads/sasl.c nt_status = ntlmssp_seal_packet(ntlmssp_state, nt_status 43 source3/libads/sasl.c nt_status = ntlmssp_sign_packet(ntlmssp_state, nt_status 48 source3/libads/sasl.c status = ADS_ERROR_NT(nt_status); nt_status 68 source3/libads/sasl.c NTSTATUS nt_status; nt_status 78 source3/libads/sasl.c nt_status = ntlmssp_unseal_packet(ntlmssp_state, nt_status 83 source3/libads/sasl.c nt_status = ntlmssp_check_packet(ntlmssp_state, nt_status 88 source3/libads/sasl.c status = ADS_ERROR_NT(nt_status); nt_status 128 source3/libads/sasl.c NTSTATUS nt_status; nt_status 135 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_client_start(&ntlmssp_state))) { nt_status 136 source3/libads/sasl.c return ADS_ERROR_NT(nt_status); nt_status 140 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, ads->auth.user_name))) { nt_status 141 source3/libads/sasl.c return ADS_ERROR_NT(nt_status); nt_status 143 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, ads->auth.realm))) { nt_status 144 source3/libads/sasl.c return ADS_ERROR_NT(nt_status); nt_status 146 source3/libads/sasl.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) { nt_status 147 source3/libads/sasl.c return ADS_ERROR_NT(nt_status); nt_status 175 source3/libads/sasl.c nt_status = ntlmssp_update(ntlmssp_state, nt_status 178 source3/libads/sasl.c if ((NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) nt_status 179 source3/libads/sasl.c || NT_STATUS_IS_OK(nt_status)) nt_status 215 source3/libads/sasl.c return ADS_ERROR_NT(nt_status); nt_status 232 source3/libads/sasl.c if (!spnego_parse_auth_response(blob, nt_status, OID_NTLMSSP, nt_status 244 source3/libads/sasl.c } while (rc == LDAP_SASL_BIND_IN_PROGRESS && !NT_STATUS_IS_OK(nt_status)); nt_status 591 source3/libnet/libnet_samsync_passdb.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 621 source3/libnet/libnet_samsync_passdb.c return nt_status; nt_status 625 source3/libnet/libnet_samsync_passdb.c return nt_status; nt_status 628 source3/libnet/libnet_samsync_passdb.c return nt_status; nt_status 631 source3/libnet/libnet_samsync_passdb.c return nt_status; nt_status 634 source3/libnet/libnet_samsync_passdb.c return nt_status; nt_status 644 source3/libnet/libnet_samsync_passdb.c return nt_status; nt_status 647 source3/libnet/libnet_samsync_passdb.c return nt_status; nt_status 653 source3/libnet/libnet_samsync_passdb.c return nt_status; nt_status 658 source3/libnet/libnet_samsync_passdb.c return nt_status; nt_status 138 source3/librpc/rpc/dcerpc.c NTSTATUS nt_status; nt_status 140 source3/librpc/rpc/dcerpc.c nt_status = dcerpc_parse_binding(p, binding_string, &binding); nt_status 142 source3/librpc/rpc/dcerpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 145 source3/librpc/rpc/dcerpc.c return nt_status; nt_status 158 source3/librpc/rpc/dcerpc.c nt_status = cli_full_connection(&p->cli, global_myname(), binding->host, nt_status 167 source3/librpc/rpc/dcerpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 169 source3/librpc/rpc/dcerpc.c return nt_status; nt_status 172 source3/librpc/rpc/dcerpc.c nt_status = cli_rpc_pipe_open_noauth(p->cli, &table->syntax_id, nt_status 175 source3/librpc/rpc/dcerpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 177 source3/librpc/rpc/dcerpc.c return nt_status; nt_status 184 source3/librpc/rpc/dcerpc.c return nt_status; nt_status 733 source3/libsmb/cliconnect.c NTSTATUS nt_status; nt_status 754 source3/libsmb/cliconnect.c nt_status = cli_nt_error(cli); nt_status 759 source3/libsmb/cliconnect.c nt_status = cli_nt_error(cli); nt_status 760 source3/libsmb/cliconnect.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 761 source3/libsmb/cliconnect.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 776 source3/libsmb/cliconnect.c nt_status = NT_STATUS_ACCESS_DENIED; nt_status 790 source3/libsmb/cliconnect.c return ADS_ERROR_NT(nt_status); nt_status 803 source3/libsmb/cliconnect.c NTSTATUS nt_status; nt_status 812 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_client_start(&ntlmssp_state))) { nt_status 813 source3/libsmb/cliconnect.c return nt_status; nt_status 817 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) { nt_status 818 source3/libsmb/cliconnect.c return nt_status; nt_status 820 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, domain))) { nt_status 821 source3/libsmb/cliconnect.c return nt_status; nt_status 823 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, pass))) { nt_status 824 source3/libsmb/cliconnect.c return nt_status; nt_status 828 source3/libsmb/cliconnect.c nt_status = ntlmssp_update(ntlmssp_state, nt_status 831 source3/libsmb/cliconnect.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) || NT_STATUS_IS_OK(nt_status)) { nt_status 843 source3/libsmb/cliconnect.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 847 source3/libsmb/cliconnect.c nt_status = cli_nt_error(cli); nt_status 848 source3/libsmb/cliconnect.c if (cli_is_error(cli) && NT_STATUS_IS_OK(nt_status)) { nt_status 850 source3/libsmb/cliconnect.c nt_status = NT_STATUS_ACCESS_DENIED; nt_status 852 source3/libsmb/cliconnect.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 860 source3/libsmb/cliconnect.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 861 source3/libsmb/cliconnect.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 864 source3/libsmb/cliconnect.c NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 870 source3/libsmb/cliconnect.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 874 source3/libsmb/cliconnect.c if (!spnego_parse_auth_response(blob, nt_status, OID_NTLMSSP, nt_status 877 source3/libsmb/cliconnect.c if (NT_STATUS_IS_OK(nt_status) nt_status 878 source3/libsmb/cliconnect.c || NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) nt_status 879 source3/libsmb/cliconnect.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 885 source3/libsmb/cliconnect.c } while (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)); nt_status 889 source3/libsmb/cliconnect.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 904 source3/libsmb/cliconnect.c nt_status = NT_STATUS_ACCESS_DENIED; nt_status 914 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 917 source3/libsmb/cliconnect.c return nt_status; nt_status 2001 source3/libsmb/cliconnect.c NTSTATUS nt_status; nt_status 2033 source3/libsmb/cliconnect.c nt_status = cli_connect(cli, dest_host, &ss); nt_status 2034 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2038 source3/libsmb/cliconnect.c nmb_namestr(&called), addr, nt_errstr(nt_status) )); nt_status 2040 source3/libsmb/cliconnect.c return nt_status; nt_status 2071 source3/libsmb/cliconnect.c nt_status = cli_negprot(cli); nt_status 2072 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2073 source3/libsmb/cliconnect.c DEBUG(1, ("failed negprot: %s\n", nt_errstr(nt_status))); nt_status 2075 source3/libsmb/cliconnect.c return nt_status; nt_status 2107 source3/libsmb/cliconnect.c NTSTATUS nt_status; nt_status 2117 source3/libsmb/cliconnect.c nt_status = cli_start_connection(&cli, my_name, dest_host, nt_status 2121 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2122 source3/libsmb/cliconnect.c return nt_status; nt_status 2125 source3/libsmb/cliconnect.c nt_status = cli_session_setup(cli, user, password, pw_len, password, nt_status 2127 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2131 source3/libsmb/cliconnect.c nt_errstr(nt_status))); nt_status 2133 source3/libsmb/cliconnect.c return nt_status; nt_status 2136 source3/libsmb/cliconnect.c nt_status = cli_session_setup(cli, "", "", 0, "", 0, domain); nt_status 2137 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2139 source3/libsmb/cliconnect.c nt_errstr(nt_status))); nt_status 2141 source3/libsmb/cliconnect.c return nt_status; nt_status 2146 source3/libsmb/cliconnect.c nt_status = cli_tcon_andx(cli, service, service_type, password, nt_status 2148 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2149 source3/libsmb/cliconnect.c DEBUG(1,("failed tcon_X with %s\n", nt_errstr(nt_status))); nt_status 2151 source3/libsmb/cliconnect.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 2152 source3/libsmb/cliconnect.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 2154 source3/libsmb/cliconnect.c return nt_status; nt_status 2158 source3/libsmb/cliconnect.c nt_status = cli_init_creds(cli, user, domain, password); nt_status 2159 source3/libsmb/cliconnect.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2161 source3/libsmb/cliconnect.c return nt_status; nt_status 2284 source3/libsmb/cliconnect.c NTSTATUS nt_status; nt_status 2291 source3/libsmb/cliconnect.c nt_status = cli_full_connection(&cli, NULL, server, server_ss, 0, "IPC$", "IPC", nt_status 2298 source3/libsmb/cliconnect.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 524 source3/libsmb/clispnego.c DATA_BLOB spnego_gen_auth_response(DATA_BLOB *reply, NTSTATUS nt_status, nt_status 531 source3/libsmb/clispnego.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 533 source3/libsmb/clispnego.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 573 source3/libsmb/clispnego.c bool spnego_parse_auth_response(DATA_BLOB blob, NTSTATUS nt_status, nt_status 580 source3/libsmb/clispnego.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 582 source3/libsmb/clispnego.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 271 source3/libsmb/libsmb_dir.c NTSTATUS nt_status; nt_status 276 source3/libsmb/libsmb_dir.c nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_srvsvc.syntax_id, nt_status 278 source3/libsmb/libsmb_dir.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 290 source3/libsmb/libsmb_dir.c nt_status = rpccli_srvsvc_NetShareEnumAll(pipe_hnd, talloc_tos(), nt_status 299 source3/libsmb/libsmb_dir.c if (!NT_STATUS_IS_OK(nt_status) || !W_ERROR_IS_OK(result) || nt_status 658 source3/libsmb/libsmb_server.c NTSTATUS nt_status; nt_status 689 source3/libsmb/libsmb_server.c nt_status = cli_full_connection(&ipc_cli, nt_status 697 source3/libsmb/libsmb_server.c if (! NT_STATUS_IS_OK(nt_status)) { nt_status 699 source3/libsmb/libsmb_server.c nt_errstr(nt_status))); nt_status 739 source3/libsmb/libsmb_server.c nt_status = cli_rpc_pipe_open_noauth( nt_status 741 source3/libsmb/libsmb_server.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 755 source3/libsmb/libsmb_server.c nt_status = rpccli_lsa_open_policy( nt_status 762 source3/libsmb/libsmb_server.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 751 source3/libsmb/nterr.c NTSTATUS nt_status_squash(NTSTATUS nt_status) nt_status 753 source3/libsmb/nterr.c if NT_STATUS_IS_OK(nt_status) { nt_status 754 source3/libsmb/nterr.c return nt_status; nt_status 755 source3/libsmb/nterr.c } else if NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_SUCH_USER) { nt_status 759 source3/libsmb/nterr.c } else if NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD) { nt_status 763 source3/libsmb/nterr.c return nt_status; nt_status 637 source3/libsmb/ntlmssp.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 716 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, domain))) { nt_status 721 source3/libsmb/ntlmssp.c return nt_status; nt_status 724 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, user))) { nt_status 729 source3/libsmb/ntlmssp.c return nt_status; nt_status 732 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_workstation(ntlmssp_state, workstation))) { nt_status 737 source3/libsmb/ntlmssp.c return nt_status; nt_status 778 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->set_challenge(ntlmssp_state, &ntlmssp_state->chal))) { nt_status 780 source3/libsmb/ntlmssp.c return nt_status; nt_status 797 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_state->check_password(ntlmssp_state, nt_status 800 source3/libsmb/ntlmssp.c return nt_status; nt_status 889 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 892 source3/libsmb/ntlmssp.c nt_status = ntlmssp_sign_init(ntlmssp_state); nt_status 900 source3/libsmb/ntlmssp.c return nt_status; nt_status 1008 source3/libsmb/ntlmssp.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 1206 source3/libsmb/ntlmssp.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_sign_init(ntlmssp_state))) { nt_status 1207 source3/libsmb/ntlmssp.c DEBUG(1, ("Could not setup NTLMSSP signing/sealing system (error was: %s)\n", nt_errstr(nt_status))); nt_status 1210 source3/libsmb/ntlmssp.c return nt_status; nt_status 144 source3/libsmb/ntlmssp_sign.c NTSTATUS nt_status; nt_status 156 source3/libsmb/ntlmssp_sign.c nt_status = ntlmssp_make_packet_signature(ntlmssp_state, nt_status 161 source3/libsmb/ntlmssp_sign.c return nt_status; nt_status 176 source3/libsmb/ntlmssp_sign.c NTSTATUS nt_status; nt_status 188 source3/libsmb/ntlmssp_sign.c nt_status = ntlmssp_make_packet_signature(ntlmssp_state, nt_status 193 source3/libsmb/ntlmssp_sign.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 194 source3/libsmb/ntlmssp_sign.c DEBUG(0, ("NTLMSSP packet check failed with %s\n", nt_errstr(nt_status))); nt_status 196 source3/libsmb/ntlmssp_sign.c return nt_status; nt_status 259 source3/libsmb/ntlmssp_sign.c NTSTATUS nt_status = ntlmssp_make_packet_signature(ntlmssp_state, nt_status 263 source3/libsmb/ntlmssp_sign.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 264 source3/libsmb/ntlmssp_sign.c return nt_status; nt_status 36 source3/libsmb/trusts_util.c NTSTATUS nt_status; nt_status 48 source3/libsmb/trusts_util.c nt_status = rpccli_netlogon_set_trust_password(cli, mem_ctx, nt_status 54 source3/libsmb/trusts_util.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 62 source3/libsmb/trusts_util.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 66 source3/libsmb/trusts_util.c return nt_status; nt_status 118 source3/passdb/pdb_interface.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 156 source3/passdb/pdb_interface.c if ( !NT_STATUS_IS_OK( nt_status = entry->init(methods, module_location) ) ) { nt_status 158 source3/passdb/pdb_interface.c selected, nt_errstr(nt_status))); nt_status 160 source3/passdb/pdb_interface.c return nt_status; nt_status 167 source3/passdb/pdb_interface.c return nt_status; nt_status 6185 source3/passdb/pdb_ldap.c NTSTATUS nt_status; nt_status 6188 source3/passdb/pdb_ldap.c if (!NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method ))) { nt_status 6189 source3/passdb/pdb_ldap.c return nt_status; nt_status 6229 source3/passdb/pdb_ldap.c nt_status = smbldap_init(*pdb_method, pdb_get_event_context(), nt_status 6232 source3/passdb/pdb_ldap.c if ( !NT_STATUS_IS_OK(nt_status) ) { nt_status 6233 source3/passdb/pdb_ldap.c return nt_status; nt_status 6253 source3/passdb/pdb_ldap.c NTSTATUS nt_status; nt_status 6258 source3/passdb/pdb_ldap.c nt_status = pdb_init_ldapsam_common( pdb_method, uri ); nt_status 6262 source3/passdb/pdb_ldap.c if ( !NT_STATUS_IS_OK(nt_status) ) { nt_status 6263 source3/passdb/pdb_ldap.c return nt_status; nt_status 6282 source3/passdb/pdb_ldap.c NTSTATUS nt_status; nt_status 6295 source3/passdb/pdb_ldap.c nt_status = pdb_init_ldapsam_common(pdb_method, uri); nt_status 6300 source3/passdb/pdb_ldap.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 6301 source3/passdb/pdb_ldap.c return nt_status; nt_status 6337 source3/passdb/pdb_ldap.c nt_status = smbldap_search_domain_info(ldap_state->smbldap_state, nt_status 6341 source3/passdb/pdb_ldap.c if ( !NT_STATUS_IS_OK(nt_status) ) { nt_status 6433 source3/passdb/pdb_ldap.c NTSTATUS nt_status; nt_status 6434 source3/passdb/pdb_ldap.c if (!NT_STATUS_IS_OK(nt_status = smb_register_passdb(PASSDB_INTERFACE_VERSION, "ldapsam", pdb_init_ldapsam))) nt_status 6435 source3/passdb/pdb_ldap.c return nt_status; nt_status 6437 source3/passdb/pdb_ldap.c if (!NT_STATUS_IS_OK(nt_status = smb_register_passdb(PASSDB_INTERFACE_VERSION, "ldapsam_compat", pdb_init_ldapsam_compat))) nt_status 6438 source3/passdb/pdb_ldap.c return nt_status; nt_status 824 source3/passdb/pdb_nds.c NTSTATUS nt_status = NT_STATUS_ACCOUNT_RESTRICTION; nt_status 828 source3/passdb/pdb_nds.c nt_status = NT_STATUS_WRONG_PASSWORD; nt_status 837 source3/passdb/pdb_nds.c nt_status = NT_STATUS_ACCOUNT_DISABLED; nt_status 842 source3/passdb/pdb_nds.c return nt_status; nt_status 880 source3/passdb/pdb_nds.c NTSTATUS nt_status = pdb_init_ldapsam_compat(pdb_method, location); nt_status 886 source3/passdb/pdb_nds.c return nt_status; nt_status 896 source3/passdb/pdb_nds.c NTSTATUS nt_status = pdb_init_ldapsam(pdb_method, location); nt_status 902 source3/passdb/pdb_nds.c return nt_status; nt_status 907 source3/passdb/pdb_nds.c NTSTATUS nt_status; nt_status 908 source3/passdb/pdb_nds.c if (!NT_STATUS_IS_OK(nt_status = smb_register_passdb(PASSDB_INTERFACE_VERSION, "NDS_ldapsam", pdb_init_NDS_ldapsam))) nt_status 909 source3/passdb/pdb_nds.c return nt_status; nt_status 911 source3/passdb/pdb_nds.c if (!NT_STATUS_IS_OK(nt_status = smb_register_passdb(PASSDB_INTERFACE_VERSION, "NDS_ldapsam_compat", pdb_init_NDS_ldapsam_compat))) nt_status 912 source3/passdb/pdb_nds.c return nt_status; nt_status 1278 source3/passdb/pdb_smbpasswd.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1292 source3/passdb/pdb_smbpasswd.c return nt_status; nt_status 1303 source3/passdb/pdb_smbpasswd.c return nt_status; nt_status 1309 source3/passdb/pdb_smbpasswd.c return nt_status; nt_status 1314 source3/passdb/pdb_smbpasswd.c return nt_status; nt_status 1322 source3/passdb/pdb_smbpasswd.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1339 source3/passdb/pdb_smbpasswd.c return nt_status; nt_status 1349 source3/passdb/pdb_smbpasswd.c return nt_status; nt_status 1360 source3/passdb/pdb_smbpasswd.c return nt_status; nt_status 1366 source3/passdb/pdb_smbpasswd.c return nt_status; nt_status 1371 source3/passdb/pdb_smbpasswd.c return nt_status; nt_status 1374 source3/passdb/pdb_smbpasswd.c if (NT_STATUS_IS_OK(nt_status) && !sid_equal(pdb_get_user_sid(sam_acct), sid)) { nt_status 1668 source3/passdb/pdb_smbpasswd.c NTSTATUS nt_status; nt_status 1671 source3/passdb/pdb_smbpasswd.c if ( !NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method )) ) { nt_status 1672 source3/passdb/pdb_smbpasswd.c return nt_status; nt_status 584 source3/passdb/pdb_tdb.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 591 source3/passdb/pdb_tdb.c return nt_status; nt_status 667 source3/passdb/pdb_tdb.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 696 source3/passdb/pdb_tdb.c nt_status = dbwrap_delete_bystring(db_sam, keystr); nt_status 697 source3/passdb/pdb_tdb.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 699 source3/passdb/pdb_tdb.c "database: %s!\n", nt_errstr(nt_status))); nt_status 709 source3/passdb/pdb_tdb.c nt_status = dbwrap_delete_bystring(db_sam, keystr); nt_status 710 source3/passdb/pdb_tdb.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 712 source3/passdb/pdb_tdb.c "database: %s!\n", nt_errstr(nt_status))); nt_status 728 source3/passdb/pdb_tdb.c return nt_status; nt_status 1231 source3/passdb/pdb_tdb.c NTSTATUS nt_status; nt_status 1235 source3/passdb/pdb_tdb.c if (!NT_STATUS_IS_OK(nt_status = make_pdb_method( pdb_method ))) { nt_status 1236 source3/passdb/pdb_tdb.c return nt_status; nt_status 1440 source3/printing/nt_printing.c NTSTATUS nt_status; nt_status 1476 source3/printing/nt_printing.c nt_status = create_conn_struct(talloc_tos(), &conn, printdollar_snum, nt_status 1479 source3/printing/nt_printing.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1481 source3/printing/nt_printing.c "returned %s\n", nt_errstr(nt_status))); nt_status 1482 source3/printing/nt_printing.c *perr = ntstatus_to_werror(nt_status); nt_status 1844 source3/printing/nt_printing.c NTSTATUS nt_status; nt_status 1881 source3/printing/nt_printing.c nt_status = create_conn_struct(talloc_tos(), &conn, printdollar_snum, nt_status 1884 source3/printing/nt_printing.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1886 source3/printing/nt_printing.c "returned %s\n", nt_errstr(nt_status))); nt_status 1887 source3/printing/nt_printing.c *perr = ntstatus_to_werror(nt_status); nt_status 5121 source3/printing/nt_printing.c NTSTATUS nt_status; nt_status 5140 source3/printing/nt_printing.c nt_status = create_conn_struct(talloc_tos(), &conn, printdollar_snum, nt_status 5143 source3/printing/nt_printing.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 5145 source3/printing/nt_printing.c "returned %s\n", nt_errstr(nt_status))); nt_status 5301 source3/printing/nt_printing.c NTSTATUS nt_status; nt_status 5363 source3/printing/nt_printing.c nt_status = marshall_sec_desc_buf(mem_ctx, new_secdesc_ctr, nt_status 5365 source3/printing/nt_printing.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 5366 source3/printing/nt_printing.c status = ntstatus_to_werror(nt_status); nt_status 1537 source3/rpc_client/cli_pipe.c NTSTATUS nt_status; nt_status 1546 source3/rpc_client/cli_pipe.c nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state, nt_status 1550 source3/rpc_client/cli_pipe.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 1553 source3/rpc_client/cli_pipe.c return nt_status; nt_status 1584 source3/rpc_client/cli_pipe.c NTSTATUS nt_status; nt_status 1592 source3/rpc_client/cli_pipe.c nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state, nt_status 1596 source3/rpc_client/cli_pipe.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 1599 source3/rpc_client/cli_pipe.c return nt_status; nt_status 473 source3/rpc_server/srv_lsa_nt.c NTSTATUS nt_status; nt_status 488 source3/rpc_server/srv_lsa_nt.c nt_status = pdb_enum_trusteddoms(p->mem_ctx, &num_domains, &domains); nt_status 491 source3/rpc_server/srv_lsa_nt.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 492 source3/rpc_server/srv_lsa_nt.c return nt_status; nt_status 498 source3/rpc_server/srv_lsa_nt.c nt_status = STATUS_MORE_ENTRIES; nt_status 502 source3/rpc_server/srv_lsa_nt.c nt_status = NT_STATUS_OK; nt_status 509 source3/rpc_server/srv_lsa_nt.c nt_status = NT_STATUS_NO_MORE_ENTRIES; nt_status 529 source3/rpc_server/srv_lsa_nt.c return nt_status; nt_status 2337 source3/rpc_server/srv_samr_nt.c NTSTATUS nt_status; nt_status 2345 source3/rpc_server/srv_samr_nt.c nt_status = access_check_samr_function(acc_granted, nt_status 2349 source3/rpc_server/srv_samr_nt.c if ( !NT_STATUS_IS_OK(nt_status) ) nt_status 2350 source3/rpc_server/srv_samr_nt.c return nt_status; nt_status 2433 source3/rpc_server/srv_samr_nt.c nt_status = access_check_object(psd, p->server_info->ptok, nt_status 2437 source3/rpc_server/srv_samr_nt.c if ( !NT_STATUS_IS_OK(nt_status) ) nt_status 2438 source3/rpc_server/srv_samr_nt.c return nt_status; nt_status 3748 source3/rpc_server/srv_samr_nt.c NTSTATUS nt_status; nt_status 3768 source3/rpc_server/srv_samr_nt.c nt_status = access_check_samr_function(acc_granted, nt_status 3771 source3/rpc_server/srv_samr_nt.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 3772 source3/rpc_server/srv_samr_nt.c return nt_status; nt_status 3787 source3/rpc_server/srv_samr_nt.c nt_status = can_create(p->mem_ctx, account); nt_status 3788 source3/rpc_server/srv_samr_nt.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 3789 source3/rpc_server/srv_samr_nt.c return nt_status; nt_status 3829 source3/rpc_server/srv_samr_nt.c nt_status = pdb_create_user(p->mem_ctx, account, acb_info, nt_status 3837 source3/rpc_server/srv_samr_nt.c if ( !NT_STATUS_IS_OK(nt_status) ) nt_status 3838 source3/rpc_server/srv_samr_nt.c return nt_status; nt_status 3857 source3/rpc_server/srv_samr_nt.c nt_status = access_check_object(psd, p->server_info->ptok, nt_status 3861 source3/rpc_server/srv_samr_nt.c if ( !NT_STATUS_IS_OK(nt_status) ) { nt_status 3862 source3/rpc_server/srv_samr_nt.c return nt_status; nt_status 3957 source3/rpc_server/srv_samr_nt.c NTSTATUS nt_status; nt_status 3990 source3/rpc_server/srv_samr_nt.c nt_status = access_check_object(psd, p->server_info->ptok, nt_status 3993 source3/rpc_server/srv_samr_nt.c if ( !NT_STATUS_IS_OK(nt_status) ) nt_status 3994 source3/rpc_server/srv_samr_nt.c return nt_status; nt_status 4009 source3/rpc_server/srv_samr_nt.c return nt_status; nt_status 2055 source3/rpc_server/srv_srvsvc_nt.c NTSTATUS nt_status; nt_status 2074 source3/rpc_server/srv_srvsvc_nt.c nt_status = create_conn_struct(talloc_tos(), &conn, snum, nt_status 2077 source3/rpc_server/srv_srvsvc_nt.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2079 source3/rpc_server/srv_srvsvc_nt.c nt_errstr(nt_status))); nt_status 2080 source3/rpc_server/srv_srvsvc_nt.c werr = ntstatus_to_werror(nt_status); nt_status 2084 source3/rpc_server/srv_srvsvc_nt.c nt_status = SMB_VFS_CREATE_FILE( nt_status 2103 source3/rpc_server/srv_srvsvc_nt.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2106 source3/rpc_server/srv_srvsvc_nt.c werr = ntstatus_to_werror(nt_status); nt_status 2110 source3/rpc_server/srv_srvsvc_nt.c nt_status = SMB_VFS_FGET_NT_ACL(fsp, nt_status 2115 source3/rpc_server/srv_srvsvc_nt.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2118 source3/rpc_server/srv_srvsvc_nt.c werr = ntstatus_to_werror(nt_status); nt_status 2170 source3/rpc_server/srv_srvsvc_nt.c NTSTATUS nt_status; nt_status 2189 source3/rpc_server/srv_srvsvc_nt.c nt_status = create_conn_struct(talloc_tos(), &conn, snum, nt_status 2192 source3/rpc_server/srv_srvsvc_nt.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2194 source3/rpc_server/srv_srvsvc_nt.c nt_errstr(nt_status))); nt_status 2195 source3/rpc_server/srv_srvsvc_nt.c werr = ntstatus_to_werror(nt_status); nt_status 2199 source3/rpc_server/srv_srvsvc_nt.c nt_status = SMB_VFS_CREATE_FILE( nt_status 2218 source3/rpc_server/srv_srvsvc_nt.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2221 source3/rpc_server/srv_srvsvc_nt.c werr = ntstatus_to_werror(nt_status); nt_status 2245 source3/rpc_server/srv_srvsvc_nt.c nt_status = SMB_VFS_FSET_NT_ACL(fsp, nt_status 2249 source3/rpc_server/srv_srvsvc_nt.c if (!NT_STATUS_IS_OK(nt_status) ) { nt_status 3181 source3/rpcclient/cmd_spoolss.c NTSTATUS nt_status; nt_status 3193 source3/rpcclient/cmd_spoolss.c nt_status = cli_full_connection(&cli_server2, global_myname(), argv[2], nt_status 3202 source3/rpcclient/cmd_spoolss.c if ( !NT_STATUS_IS_OK(nt_status) ) nt_status 3205 source3/rpcclient/cmd_spoolss.c nt_status = cli_rpc_pipe_open_noauth(cli_server2, &ndr_table_spoolss.syntax_id, nt_status 3207 source3/rpcclient/cmd_spoolss.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 3209 source3/rpcclient/cmd_spoolss.c argv[2], nt_errstr(nt_status)); nt_status 765 source3/rpcclient/rpcclient.c NTSTATUS nt_status; nt_status 887 source3/rpcclient/rpcclient.c nt_status = cli_full_connection(&cli, global_myname(), server, nt_status 897 source3/rpcclient/rpcclient.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 898 source3/rpcclient/rpcclient.c DEBUG(0,("Cannot connect to server. Error was %s\n", nt_errstr(nt_status))); nt_status 904 source3/rpcclient/rpcclient.c nt_status = cli_cm_force_encryption(cli, nt_status 909 source3/rpcclient/rpcclient.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 32 source3/smbd/change_trust_pw.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 65 source3/smbd/change_trust_pw.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 76 source3/smbd/change_trust_pw.c nt_status = cli_rpc_pipe_open_noauth( nt_status 78 source3/smbd/change_trust_pw.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 80 source3/smbd/change_trust_pw.c dc_name, nt_errstr(nt_status))); nt_status 86 source3/smbd/change_trust_pw.c nt_status = trust_pw_find_change_and_store_it( nt_status 93 source3/smbd/change_trust_pw.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 100 source3/smbd/change_trust_pw.c return nt_status; nt_status 784 source3/smbd/chgpasswd.c NTSTATUS nt_status; nt_status 801 source3/smbd/chgpasswd.c nt_status = check_oem_password(user, nt_status 809 source3/smbd/chgpasswd.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 811 source3/smbd/chgpasswd.c return nt_status; nt_status 816 source3/smbd/chgpasswd.c nt_status = change_oem_password(sampass, NULL, new_passwd, True, reject_reason); nt_status 823 source3/smbd/chgpasswd.c return nt_status; nt_status 29 source3/smbd/negprot.c NTSTATUS nt_status; nt_status 39 source3/smbd/negprot.c if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&negprot_global_auth_context))) { nt_status 40 source3/smbd/negprot.c DEBUG(0, ("make_auth_context_subsystem returned %s", nt_errstr(nt_status))); nt_status 2099 source3/smbd/nttrans.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 2292 source3/smbd/nttrans.c nt_status = NT_STATUS_BUFFER_TOO_SMALL; nt_status 2356 source3/smbd/nttrans.c send_nt_replies(conn, req, nt_status, params, param_len, nt_status 517 source3/smbd/reply.c NTSTATUS nt_status; nt_status 552 source3/smbd/reply.c conn = make_connection(service,password_blob,dev,req->vuid,&nt_status); nt_status 558 source3/smbd/reply.c reply_nterror(req, nt_status); nt_status 590 source3/smbd/reply.c NTSTATUS nt_status; nt_status 678 source3/smbd/reply.c req->vuid, &nt_status); nt_status 684 source3/smbd/reply.c reply_nterror(req, nt_status); nt_status 1267 source3/smbd/reply.c NTSTATUS nt_status; nt_status 1297 source3/smbd/reply.c &nt_status, &mask_contains_wcard); nt_status 1298 source3/smbd/reply.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1299 source3/smbd/reply.c reply_nterror(req, nt_status); nt_status 1304 source3/smbd/reply.c nt_status = resolve_dfspath_wcard(ctx, conn, nt_status 1309 source3/smbd/reply.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1310 source3/smbd/reply.c if (NT_STATUS_EQUAL(nt_status,NT_STATUS_PATH_NOT_COVERED)) { nt_status 1316 source3/smbd/reply.c reply_nterror(req, nt_status); nt_status 1330 source3/smbd/reply.c nt_status = unix_convert(ctx, conn, path, True, nt_status 1332 source3/smbd/reply.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1333 source3/smbd/reply.c reply_nterror(req, nt_status); nt_status 1338 source3/smbd/reply.c nt_status = check_name(conn, directory); nt_status 1339 source3/smbd/reply.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1340 source3/smbd/reply.c reply_nterror(req, nt_status); nt_status 1364 source3/smbd/reply.c nt_status = dptr_create(conn, nt_status 1373 source3/smbd/reply.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1374 source3/smbd/reply.c reply_nterror(req, nt_status); nt_status 118 source3/smbd/sesssetup.c NTSTATUS nt_status) nt_status 120 source3/smbd/sesssetup.c if (!NT_STATUS_IS_OK(nt_status) && nt_status 121 source3/smbd/sesssetup.c !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 122 source3/smbd/sesssetup.c reply_nterror(req, nt_status_squash(nt_status)); nt_status 126 source3/smbd/sesssetup.c nt_status = nt_status_squash(nt_status); nt_status 127 source3/smbd/sesssetup.c SIVAL(req->outbuf, smb_rcls, NT_STATUS_V(nt_status)); nt_status 146 source3/smbd/sesssetup.c NTSTATUS nt_status; nt_status 153 source3/smbd/sesssetup.c if (!NT_STATUS_IS_OK(nt_status = make_auth_context_fixed(&auth_context, nt_status 155 source3/smbd/sesssetup.c return nt_status; nt_status 163 source3/smbd/sesssetup.c nt_status = auth_context->check_ntlm_password(auth_context, nt_status 168 source3/smbd/sesssetup.c return nt_status; nt_status 609 source3/smbd/sesssetup.c DATA_BLOB *ntlmssp_blob, NTSTATUS nt_status, nt_status 616 source3/smbd/sesssetup.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 619 source3/smbd/sesssetup.c nt_status = do_map_to_guest(nt_status, nt_status 629 source3/smbd/sesssetup.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 633 source3/smbd/sesssetup.c nt_status = NT_STATUS_LOGON_FAILURE; nt_status 649 source3/smbd/sesssetup.c nt_status = NT_STATUS_LOGON_FAILURE; nt_status 672 source3/smbd/sesssetup.c nt_status, OID); nt_status 677 source3/smbd/sesssetup.c reply_sesssetup_blob(req, response, nt_status); nt_status 685 source3/smbd/sesssetup.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 688 source3/smbd/sesssetup.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1394 source3/smbd/sesssetup.c NTSTATUS nt_status; nt_status 1664 source3/smbd/sesssetup.c nt_status = check_guest_password(&server_info); nt_status 1675 source3/smbd/sesssetup.c nt_status = make_user_info_for_reply_enc(&user_info, user, nt_status 1678 source3/smbd/sesssetup.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 1679 source3/smbd/sesssetup.c nt_status = negprot_global_auth_context->check_ntlm_password( nt_status 1687 source3/smbd/sesssetup.c nt_status = make_auth_context_subsystem( nt_status 1690 source3/smbd/sesssetup.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 1699 source3/smbd/sesssetup.c nt_status = NT_STATUS_NO_MEMORY; nt_status 1702 source3/smbd/sesssetup.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 1703 source3/smbd/sesssetup.c nt_status = plaintext_auth_context->check_ntlm_password( nt_status 1716 source3/smbd/sesssetup.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1717 source3/smbd/sesssetup.c nt_status = do_map_to_guest(nt_status, &server_info, nt_status 1721 source3/smbd/sesssetup.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1725 source3/smbd/sesssetup.c reply_nterror(req, nt_status_squash(nt_status)); nt_status 1739 source3/smbd/sesssetup.c nt_status = create_local_token(server_info); nt_status 1741 source3/smbd/sesssetup.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1743 source3/smbd/sesssetup.c nt_errstr(nt_status))); nt_status 1747 source3/smbd/sesssetup.c reply_nterror(req, nt_status_squash(nt_status)); nt_status 166 source3/torture/locktest2.c NTSTATUS nt_status; nt_status 185 source3/torture/locktest2.c nt_status = cli_full_connection(&c, myname, server_n, NULL, 0, share, "?????", nt_status 189 source3/torture/locktest2.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 190 source3/torture/locktest2.c DEBUG(0, ("cli_full_connection failed with error %s\n", nt_errstr(nt_status))); nt_status 4871 source3/torture/torture.c NTSTATUS nt_status; nt_status 4935 source3/torture/torture.c nt_status = NT_STATUS(IVAL(c_nt->inbuf,smb_rcls)); nt_status 4939 source3/torture/torture.c nt_status = NT_STATUS(0xc0000000); nt_status 4959 source3/torture/torture.c if (NT_STATUS_V(nt_status) != error) { nt_status 4962 source3/torture/torture.c get_nt_error_c_code(nt_status)); nt_status 1584 source3/utils/net_ads.c NTSTATUS nt_status; nt_status 1618 source3/utils/net_ads.c nt_status = cli_full_connection(&cli, global_myname(), servername, nt_status 1626 source3/utils/net_ads.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 1672 source3/utils/net_ads.c nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_spoolss.syntax_id, &pipe_hnd); nt_status 1673 source3/utils/net_ads.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 120 source3/utils/net_rpc.c NTSTATUS nt_status; nt_status 127 source3/utils/net_rpc.c nt_status = net_make_ipc_connection(c, conn_flags, &cli); nt_status 128 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 130 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 148 source3/utils/net_rpc.c nt_status = net_get_remote_domain_sid(cli, mem_ctx, &domain_sid, nt_status 150 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 159 source3/utils/net_rpc.c nt_status = cli_rpc_pipe_open_schannel( nt_status 163 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 165 source3/utils/net_rpc.c nt_errstr(nt_status) )); nt_status 170 source3/utils/net_rpc.c nt_status = cli_rpc_pipe_open_ntlmssp( nt_status 178 source3/utils/net_rpc.c nt_status = cli_rpc_pipe_open_noauth( nt_status 182 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 185 source3/utils/net_rpc.c nt_errstr(nt_status) )); nt_status 191 source3/utils/net_rpc.c nt_status = fn(c, domain_sid, domain_name, cli, pipe_hnd, mem_ctx, argc, argv); nt_status 193 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 194 source3/utils/net_rpc.c DEBUG(1, ("rpc command function failed! (%s)\n", nt_errstr(nt_status))); nt_status 3085 source3/utils/net_rpc.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 3099 source3/utils/net_rpc.c nt_status = connect_dst_pipe(c, &cli_dst, &srvsvc_pipe, nt_status 3101 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 3102 source3/utils/net_rpc.c return nt_status; nt_status 3112 source3/utils/net_rpc.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 3124 source3/utils/net_rpc.c nt_status = rpccli_srvsvc_NetShareAdd(srvsvc_pipe, mem_ctx, nt_status 3137 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status) || !W_ERROR_IS_OK(result)) { nt_status 3144 source3/utils/net_rpc.c nt_status = NT_STATUS_OK; nt_status 3151 source3/utils/net_rpc.c return nt_status; nt_status 3195 source3/utils/net_rpc.c static NTSTATUS nt_status; nt_status 3203 source3/utils/net_rpc.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 3225 source3/utils/net_rpc.c nt_status = net_copy_file(c, local_state->mem_ctx, nt_status 3239 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 3241 source3/utils/net_rpc.c dir, nt_errstr(nt_status)); nt_status 3267 source3/utils/net_rpc.c nt_status = net_copy_file(c, local_state->mem_ctx, nt_status 3281 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 3283 source3/utils/net_rpc.c filename, nt_errstr(nt_status)); nt_status 3329 source3/utils/net_rpc.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 3334 source3/utils/net_rpc.c nt_status = net_copy_fileattr(c, nt_status 3349 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 3351 source3/utils/net_rpc.c sharename, nt_errstr(nt_status)); nt_status 3384 source3/utils/net_rpc.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 3396 source3/utils/net_rpc.c nt_status = NT_STATUS_NO_MEMORY; nt_status 3443 source3/utils/net_rpc.c nt_status = connect_to_service(c, &cp_clistate.cli_share_src, nt_status 3446 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 3453 source3/utils/net_rpc.c nt_status = connect_to_service(c, &cp_clistate.cli_share_dst, nt_status 3455 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 3463 source3/utils/net_rpc.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 3469 source3/utils/net_rpc.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 3474 source3/utils/net_rpc.c nt_status = NT_STATUS_OK; nt_status 3485 source3/utils/net_rpc.c return nt_status; nt_status 3534 source3/utils/net_rpc.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 3550 source3/utils/net_rpc.c nt_status = connect_dst_pipe(c, &cli_dst, &srvsvc_pipe, nt_status 3552 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 3553 source3/utils/net_rpc.c return nt_status; nt_status 3562 source3/utils/net_rpc.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 3577 source3/utils/net_rpc.c nt_status = rpccli_srvsvc_NetShareSetInfo(srvsvc_pipe, mem_ctx, nt_status 3584 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status) || !W_ERROR_IS_OK(result)) { nt_status 3591 source3/utils/net_rpc.c nt_status = NT_STATUS_OK; nt_status 3598 source3/utils/net_rpc.c return nt_status; nt_status 5501 source3/utils/net_rpc.c NTSTATUS nt_status; nt_status 5545 source3/utils/net_rpc.c nt_status = connect_to_ipc(c, &cli, &server_ss, pdc_name); nt_status 5546 source3/utils/net_rpc.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT)) { nt_status 5550 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 5562 source3/utils/net_rpc.c nt_status = connect_to_ipc_anonymous(c, &cli, &server_ss, nt_status 5565 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 5567 source3/utils/net_rpc.c domain_name, nt_errstr(nt_status))); nt_status 5580 source3/utils/net_rpc.c nt_status = rpc_trustdom_get_pdc(c, cli, mem_ctx, domain_name); nt_status 5581 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 5591 source3/utils/net_rpc.c nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id, nt_status 5593 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 5594 source3/utils/net_rpc.c DEBUG(0, ("Could not initialise lsa pipe. Error was %s\n", nt_errstr(nt_status) )); nt_status 5600 source3/utils/net_rpc.c nt_status = rpccli_lsa_open_policy2(pipe_hnd, mem_ctx, true, KEY_QUERY_VALUE, nt_status 5602 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 5604 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 5612 source3/utils/net_rpc.c nt_status = rpccli_lsa_QueryInfoPolicy(pipe_hnd, mem_ctx, nt_status 5616 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 5618 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 5644 source3/utils/net_rpc.c nt_status = rpccli_lsa_Close(pipe_hnd, mem_ctx, &connect_hnd); nt_status 5645 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 5647 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 5739 source3/utils/net_rpc.c NTSTATUS nt_status; nt_status 5745 source3/utils/net_rpc.c nt_status = rpccli_lsa_QueryTrustedDomainInfoBySid(pipe_hnd, mem_ctx, nt_status 5750 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 5752 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 5768 source3/utils/net_rpc.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 5774 source3/utils/net_rpc.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 5788 source3/utils/net_rpc.c return nt_status; nt_status 5798 source3/utils/net_rpc.c NTSTATUS nt_status; nt_status 5838 source3/utils/net_rpc.c nt_status = net_make_ipc_connection(c, NET_FLAGS_PDC, &cli); nt_status 5839 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 5841 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 5846 source3/utils/net_rpc.c nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id, nt_status 5848 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 5850 source3/utils/net_rpc.c nt_errstr(nt_status) )); nt_status 5856 source3/utils/net_rpc.c nt_status = rpccli_lsa_open_policy2(pipe_hnd, mem_ctx, false, KEY_QUERY_VALUE, nt_status 5858 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 5860 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 5867 source3/utils/net_rpc.c nt_status = rpccli_lsa_QueryInfoPolicy(pipe_hnd, mem_ctx, nt_status 5872 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 5874 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 5890 source3/utils/net_rpc.c nt_status = rpccli_lsa_EnumTrustDom(pipe_hnd, mem_ctx, nt_status 5895 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 5897 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 5908 source3/utils/net_rpc.c nt_status = vampire_trusted_domain(pipe_hnd, mem_ctx, &connect_hnd, nt_status 5911 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 5924 source3/utils/net_rpc.c } while (NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES)); nt_status 5927 source3/utils/net_rpc.c nt_status = rpccli_lsa_Close(pipe_hnd, mem_ctx, &connect_hnd); nt_status 5928 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 5930 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 5949 source3/utils/net_rpc.c NTSTATUS nt_status; nt_status 5994 source3/utils/net_rpc.c nt_status = net_make_ipc_connection(c, NET_FLAGS_PDC, &cli); nt_status 5995 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 5997 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 6002 source3/utils/net_rpc.c nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id, nt_status 6004 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 6006 source3/utils/net_rpc.c nt_errstr(nt_status) )); nt_status 6012 source3/utils/net_rpc.c nt_status = rpccli_lsa_open_policy2(pipe_hnd, mem_ctx, false, KEY_QUERY_VALUE, nt_status 6014 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 6016 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 6023 source3/utils/net_rpc.c nt_status = rpccli_lsa_QueryInfoPolicy(pipe_hnd, mem_ctx, nt_status 6028 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 6030 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 6046 source3/utils/net_rpc.c nt_status = rpccli_lsa_EnumTrustDom(pipe_hnd, mem_ctx, nt_status 6051 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 6053 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 6070 source3/utils/net_rpc.c } while (NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES)); nt_status 6073 source3/utils/net_rpc.c nt_status = rpccli_lsa_Close(pipe_hnd, mem_ctx, &connect_hnd); nt_status 6074 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 6076 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 6093 source3/utils/net_rpc.c nt_status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr.syntax_id, nt_status 6095 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 6096 source3/utils/net_rpc.c DEBUG(0, ("Could not initialise samr pipe. Error was %s\n", nt_errstr(nt_status))); nt_status 6103 source3/utils/net_rpc.c nt_status = rpccli_samr_Connect2(pipe_hnd, mem_ctx, nt_status 6107 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 6109 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 6117 source3/utils/net_rpc.c nt_status = rpccli_samr_OpenDomain(pipe_hnd, mem_ctx, nt_status 6122 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 6124 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 6137 source3/utils/net_rpc.c nt_status = rpccli_samr_EnumDomainUsers(pipe_hnd, mem_ctx, nt_status 6144 source3/utils/net_rpc.c if (NT_STATUS_IS_ERR(nt_status)) { nt_status 6146 source3/utils/net_rpc.c nt_errstr(nt_status))); nt_status 6175 source3/utils/net_rpc.c nt_status = net_make_ipc_connection(c, nt_status 6178 source3/utils/net_rpc.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 6192 source3/utils/net_rpc.c nt_errstr(nt_status)); nt_status 6198 source3/utils/net_rpc.c } while (NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES)); nt_status 6201 source3/utils/net_rpc.c nt_status = rpccli_samr_Close(pipe_hnd, mem_ctx, &domain_hnd); nt_status 6202 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 6206 source3/utils/net_rpc.c nt_status = rpccli_samr_Close(pipe_hnd, mem_ctx, &connect_hnd); nt_status 6207 source3/utils/net_rpc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 485 source3/utils/net_rpc_join.c NTSTATUS nt_status; nt_status 495 source3/utils/net_rpc_join.c nt_status = net_rpc_join_ok(c, c->opt_target_workgroup, NULL, NULL); nt_status 496 source3/utils/net_rpc_join.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 498 source3/utils/net_rpc_join.c c->opt_target_workgroup, nt_errstr(nt_status)); nt_status 150 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 170 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_src); nt_status 182 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_src); nt_status 198 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_src); nt_status 210 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_dst); nt_status 220 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_dst); nt_status 231 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_dst); nt_status 242 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_dst); nt_status 253 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_src); nt_status 260 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_dst); nt_status 265 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 276 source3/utils/net_rpc_printer.c return nt_status; nt_status 304 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 331 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_src); nt_status 346 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_dst); nt_status 353 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_NO_MEMORY; nt_status 388 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_dst); nt_status 405 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_NO_SUCH_FILE; nt_status 420 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_src); nt_status 427 source3/utils/net_rpc_printer.c nt_status = cli_nt_error(cli_share_dst); nt_status 432 source3/utils/net_rpc_printer.c nt_status = net_copy_fileattr(c, mem_ctx, cli_share_src, cli_share_dst, nt_status 435 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 439 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 452 source3/utils/net_rpc_printer.c return nt_status; nt_status 482 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 515 source3/utils/net_rpc_printer.c nt_status = net_copy_file(c, mem_ctx, cli_share_src, cli_share_dst, nt_status 517 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 520 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 526 source3/utils/net_rpc_printer.c return nt_status; nt_status 541 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 554 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_NO_SUCH_FILE; nt_status 563 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 567 source3/utils/net_rpc_printer.c return nt_status; nt_status 591 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 595 source3/utils/net_rpc_printer.c return nt_status; nt_status 602 source3/utils/net_rpc_printer.c nt_status = net_copy_driverfile(c, mem_ctx, cli_share_src, cli_share_dst, nt_status 604 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 605 source3/utils/net_rpc_printer.c return nt_status; nt_status 607 source3/utils/net_rpc_printer.c nt_status = net_copy_driverfile(c, mem_ctx, cli_share_src, cli_share_dst, nt_status 609 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 610 source3/utils/net_rpc_printer.c return nt_status; nt_status 612 source3/utils/net_rpc_printer.c nt_status = net_copy_driverfile(c, mem_ctx, cli_share_src, cli_share_dst, nt_status 614 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 615 source3/utils/net_rpc_printer.c return nt_status; nt_status 617 source3/utils/net_rpc_printer.c nt_status = net_copy_driverfile(c, mem_ctx, cli_share_src, cli_share_dst, nt_status 619 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 620 source3/utils/net_rpc_printer.c return nt_status; nt_status 624 source3/utils/net_rpc_printer.c nt_status = net_copy_driverfile(c, mem_ctx, nt_status 627 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 628 source3/utils/net_rpc_printer.c return nt_status; nt_status 1109 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1118 source3/utils/net_rpc_printer.c return nt_status; nt_status 1161 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1177 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1197 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 1200 source3/utils/net_rpc_printer.c return nt_status; nt_status 1223 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1237 source3/utils/net_rpc_printer.c return nt_status; nt_status 1281 source3/utils/net_rpc_printer.c nt_status = rpccli_spoolss_SetPrinter(pipe_hnd, mem_ctx, nt_status 1297 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 1303 source3/utils/net_rpc_printer.c return nt_status; nt_status 1368 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1378 source3/utils/net_rpc_printer.c return nt_status; nt_status 1422 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 1428 source3/utils/net_rpc_printer.c return nt_status; nt_status 1460 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1474 source3/utils/net_rpc_printer.c nt_status = connect_dst_pipe(c, &cli_dst, &pipe_hnd_dst, nt_status 1476 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 1477 source3/utils/net_rpc_printer.c return nt_status; nt_status 1482 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1488 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 1500 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1506 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1561 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 1576 source3/utils/net_rpc_printer.c return nt_status; nt_status 1605 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1622 source3/utils/net_rpc_printer.c nt_status = connect_dst_pipe(c, &cli_dst, &pipe_hnd_dst, nt_status 1624 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 1625 source3/utils/net_rpc_printer.c return nt_status; nt_status 1629 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1635 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 1647 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1652 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1724 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 1737 source3/utils/net_rpc_printer.c return nt_status; nt_status 1766 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1785 source3/utils/net_rpc_printer.c nt_status = connect_dst_pipe(c, &cli_dst, &pipe_hnd_dst, nt_status 1787 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 1788 source3/utils/net_rpc_printer.c return nt_status; nt_status 1791 source3/utils/net_rpc_printer.c nt_status = connect_to_service(c, &cli_share_src, &cli->dest_ss, nt_status 1793 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 1800 source3/utils/net_rpc_printer.c nt_status = connect_to_service(c, &cli_share_dst, &cli_dst->dest_ss, nt_status 1802 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 1803 source3/utils/net_rpc_printer.c return nt_status; nt_status 1810 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1816 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 1829 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1835 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1874 source3/utils/net_rpc_printer.c nt_status = check_arch_dir(cli_share_dst, archi_table[i].short_archi); nt_status 1875 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 1880 source3/utils/net_rpc_printer.c nt_status = copy_print_driver_3(c, mem_ctx, cli_share_src, cli_share_dst, nt_status 1883 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 1889 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1908 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1926 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 1946 source3/utils/net_rpc_printer.c return nt_status; nt_status 1978 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1992 source3/utils/net_rpc_printer.c nt_status = connect_dst_pipe(c, &cli_dst, &pipe_hnd_dst, nt_status 1994 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 1995 source3/utils/net_rpc_printer.c return nt_status; nt_status 1999 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 2005 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 2017 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 2022 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 2088 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 2100 source3/utils/net_rpc_printer.c return nt_status; nt_status 2134 source3/utils/net_rpc_printer.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 2155 source3/utils/net_rpc_printer.c nt_status = connect_dst_pipe(c, &cli_dst, &pipe_hnd_dst, nt_status 2157 source3/utils/net_rpc_printer.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 2158 source3/utils/net_rpc_printer.c return nt_status; nt_status 2162 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 2168 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 2176 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 2194 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 2199 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 2260 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_NO_MEMORY; nt_status 2280 source3/utils/net_rpc_printer.c nt_status = rpccli_spoolss_EnumPrinterData(pipe_hnd, mem_ctx, nt_status 2298 source3/utils/net_rpc_printer.c while (NT_STATUS_IS_OK(nt_status) && W_ERROR_IS_OK(result)) { nt_status 2300 source3/utils/net_rpc_printer.c nt_status = rpccli_spoolss_EnumPrinterData(pipe_hnd, mem_ctx, nt_status 2312 source3/utils/net_rpc_printer.c if (NT_STATUS_IS_OK(nt_status) && W_ERROR_IS_OK(result)) { nt_status 2403 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_NO_MEMORY; nt_status 2417 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_NO_MEMORY; nt_status 2501 source3/utils/net_rpc_printer.c nt_status = NT_STATUS_OK; nt_status 2517 source3/utils/net_rpc_printer.c return nt_status; nt_status 97 source3/utils/net_util.c NTSTATUS nt_status; nt_status 110 source3/utils/net_util.c nt_status = cli_full_connection(cli_ctx, NULL, server_name, nt_status 115 source3/utils/net_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 120 source3/utils/net_util.c if (NT_STATUS_V(nt_status) == nt_status 124 source3/utils/net_util.c if (NT_STATUS_V(nt_status) == nt_status 128 source3/utils/net_util.c if (NT_STATUS_V(nt_status) == nt_status 131 source3/utils/net_util.c return nt_status; nt_status 135 source3/utils/net_util.c nt_status = cli_force_encryption(*cli_ctx, nt_status 140 source3/utils/net_util.c if (NT_STATUS_EQUAL(nt_status,NT_STATUS_NOT_SUPPORTED)) { nt_status 144 source3/utils/net_util.c } else if (NT_STATUS_EQUAL(nt_status,NT_STATUS_UNKNOWN_REVISION)) { nt_status 148 source3/utils/net_util.c } else if (NT_STATUS_EQUAL(nt_status,NT_STATUS_UNSUPPORTED_COMPRESSION)) { nt_status 152 source3/utils/net_util.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 155 source3/utils/net_util.c nt_errstr(nt_status)); nt_status 158 source3/utils/net_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 164 source3/utils/net_util.c return nt_status; nt_status 189 source3/utils/net_util.c NTSTATUS nt_status; nt_status 191 source3/utils/net_util.c nt_status = cli_full_connection(cli_ctx, c->opt_requester_name, nt_status 197 source3/utils/net_util.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 198 source3/utils/net_util.c return nt_status; nt_status 200 source3/utils/net_util.c DEBUG(1,("Cannot connect to server (anonymously). Error was %s\n", nt_errstr(nt_status))); nt_status 201 source3/utils/net_util.c return nt_status; nt_status 235 source3/utils/net_util.c NTSTATUS nt_status; nt_status 249 source3/utils/net_util.c nt_status = cli_full_connection(cli_ctx, NULL, server_name, nt_status 259 source3/utils/net_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 260 source3/utils/net_util.c DEBUG(1,("Cannot connect to server using kerberos. Error was %s\n", nt_errstr(nt_status))); nt_status 261 source3/utils/net_util.c return nt_status; nt_status 265 source3/utils/net_util.c nt_status = cli_cm_force_encryption(*cli_ctx, nt_status 270 source3/utils/net_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 276 source3/utils/net_util.c return nt_status; nt_status 292 source3/utils/net_util.c NTSTATUS nt_status; nt_status 309 source3/utils/net_util.c nt_status = connect_to_ipc(c, &cli_tmp, NULL, server_name); nt_status 310 source3/utils/net_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 312 source3/utils/net_util.c return nt_status; nt_status 315 source3/utils/net_util.c nt_status = cli_rpc_pipe_open_noauth(cli_tmp, interface, nt_status 317 source3/utils/net_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 321 source3/utils/net_util.c return nt_status; nt_status 328 source3/utils/net_util.c return nt_status; nt_status 491 source3/utils/net_util.c NTSTATUS nt_status; nt_status 498 source3/utils/net_util.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 507 source3/utils/net_util.c nt_status = connect_to_ipc_anonymous(c, &cli, &server_ss, nt_status 510 source3/utils/net_util.c nt_status = connect_to_ipc(c, &cli, &server_ss, nt_status 516 source3/utils/net_util.c if ( (flags & NET_FLAGS_PDC) && NT_STATUS_IS_OK(nt_status) ) nt_status 520 source3/utils/net_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 522 source3/utils/net_util.c nt_errstr(nt_status)); nt_status 532 source3/utils/net_util.c return nt_status; nt_status 59 source3/utils/netlookup.c NTSTATUS nt_status; nt_status 97 source3/utils/netlookup.c nt_status = cli_full_connection(&cs->cli, global_myname(), global_myname(), nt_status 113 source3/utils/netlookup.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 114 source3/utils/netlookup.c DEBUG(2,("create_cs: Connect failed. Error was %s\n", nt_errstr(nt_status))); nt_status 116 source3/utils/netlookup.c cs->err = nt_status; nt_status 117 source3/utils/netlookup.c *perr = nt_status; nt_status 121 source3/utils/netlookup.c nt_status = cli_rpc_pipe_open_noauth(cs->cli, nt_status 125 source3/utils/netlookup.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 126 source3/utils/netlookup.c DEBUG(2,("create_cs: open LSA pipe failed. Error was %s\n", nt_errstr(nt_status))); nt_status 128 source3/utils/netlookup.c cs->err = nt_status; nt_status 129 source3/utils/netlookup.c *perr = nt_status; nt_status 133 source3/utils/netlookup.c nt_status = rpccli_lsa_open_policy(cs->lsapipe, ctx, true, nt_status 137 source3/utils/netlookup.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 138 source3/utils/netlookup.c DEBUG(2,("create_cs: rpccli_lsa_open_policy failed. Error was %s\n", nt_errstr(nt_status))); nt_status 140 source3/utils/netlookup.c cs->err = nt_status; nt_status 141 source3/utils/netlookup.c *perr = nt_status; nt_status 162 source3/utils/netlookup.c NTSTATUS nt_status; nt_status 171 source3/utils/netlookup.c csp = create_cs(c, ctx, &nt_status); nt_status 173 source3/utils/netlookup.c return nt_status; nt_status 176 source3/utils/netlookup.c nt_status = rpccli_lsa_lookup_sids(csp->lsapipe, ctx, nt_status 183 source3/utils/netlookup.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 184 source3/utils/netlookup.c return nt_status; nt_status 202 source3/utils/netlookup.c NTSTATUS nt_status; nt_status 207 source3/utils/netlookup.c csp = create_cs(c, ctx, &nt_status); nt_status 209 source3/utils/netlookup.c return nt_status; nt_status 212 source3/utils/netlookup.c nt_status = rpccli_lsa_lookup_names(csp->lsapipe, ctx, nt_status 219 source3/utils/netlookup.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 220 source3/utils/netlookup.c return nt_status; nt_status 312 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { nt_status 319 source3/utils/ntlm_auth.c response.data.auth.nt_status); nt_status 321 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { nt_status 328 source3/utils/ntlm_auth.c response.data.auth.nt_status)); nt_status 348 source3/utils/ntlm_auth.c NTSTATUS nt_status; nt_status 405 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { nt_status 406 source3/utils/ntlm_auth.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 410 source3/utils/ntlm_auth.c return nt_status; nt_status 413 source3/utils/ntlm_auth.c nt_status = (NT_STATUS(response.data.auth.nt_status)); nt_status 414 source3/utils/ntlm_auth.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 418 source3/utils/ntlm_auth.c return nt_status; nt_status 439 source3/utils/ntlm_auth.c return nt_status; nt_status 451 source3/utils/ntlm_auth.c NTSTATUS nt_status; nt_status 499 source3/utils/ntlm_auth.c if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) nt_status 501 source3/utils/ntlm_auth.c nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 505 source3/utils/ntlm_auth.c return nt_status; nt_status 508 source3/utils/ntlm_auth.c nt_status = (NT_STATUS(response.data.auth.nt_status)); nt_status 509 source3/utils/ntlm_auth.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 514 source3/utils/ntlm_auth.c return nt_status; nt_status 519 source3/utils/ntlm_auth.c return nt_status; nt_status 525 source3/utils/ntlm_auth.c NTSTATUS nt_status; nt_status 531 source3/utils/ntlm_auth.c nt_status = contact_winbind_auth_crap(ntlmssp_state->user, ntlmssp_state->domain, nt_status 540 source3/utils/ntlm_auth.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 553 source3/utils/ntlm_auth.c DEBUG(NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED) ? 0 : 3, nt_status 563 source3/utils/ntlm_auth.c return nt_status; nt_status 568 source3/utils/ntlm_auth.c NTSTATUS nt_status; nt_status 573 source3/utils/ntlm_auth.c nt_status = ntlm_password_check(ntlmssp_state, nt_status 583 source3/utils/ntlm_auth.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 591 source3/utils/ntlm_auth.c nt_errstr(nt_status))); nt_status 594 source3/utils/ntlm_auth.c return nt_status; nt_status 729 source3/utils/ntlm_auth.c NTSTATUS nt_status; nt_status 807 source3/utils/ntlm_auth.c nt_status = ntlm_auth_start_ntlmssp_server( nt_status 809 source3/utils/ntlm_auth.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 810 source3/utils/ntlm_auth.c x_fprintf(x_stdout, "BH %s\n", nt_errstr(nt_status)); nt_status 820 source3/utils/ntlm_auth.c nt_status = ntlmssp_update(state->ntlmssp_state, request, &reply); nt_status 822 source3/utils/ntlm_auth.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 830 source3/utils/ntlm_auth.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED)) { nt_status 831 source3/utils/ntlm_auth.c x_fprintf(x_stdout, "BH %s\n", nt_errstr(nt_status)); nt_status 832 source3/utils/ntlm_auth.c DEBUG(0, ("NTLMSSP BH: %s\n", nt_errstr(nt_status))); nt_status 835 source3/utils/ntlm_auth.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 836 source3/utils/ntlm_auth.c x_fprintf(x_stdout, "NA %s\n", nt_errstr(nt_status)); nt_status 837 source3/utils/ntlm_auth.c DEBUG(10, ("NTLMSSP %s\n", nt_errstr(nt_status))); nt_status 860 source3/utils/ntlm_auth.c NTSTATUS nt_status; nt_status 909 source3/utils/ntlm_auth.c nt_status = do_ccache_ntlm_auth(empty_blob, empty_blob, NULL); nt_status 910 source3/utils/ntlm_auth.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 966 source3/utils/ntlm_auth.c nt_status = ntlm_auth_start_ntlmssp_client( nt_status 968 source3/utils/ntlm_auth.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 969 source3/utils/ntlm_auth.c x_fprintf(x_stdout, "BH %s\n", nt_errstr(nt_status)); nt_status 982 source3/utils/ntlm_auth.c nt_status = do_ccache_ntlm_auth(state->initial_message, request, nt_status 985 source3/utils/ntlm_auth.c nt_status = ntlmssp_update(state->ntlmssp_state, request, nt_status 989 source3/utils/ntlm_auth.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 1002 source3/utils/ntlm_auth.c } else if (NT_STATUS_IS_OK(nt_status)) { nt_status 1022 source3/utils/ntlm_auth.c x_fprintf(x_stdout, "BH %s\n", nt_errstr(nt_status)); nt_status 1023 source3/utils/ntlm_auth.c DEBUG(0, ("NTLMSSP BH: %s\n", nt_errstr(nt_status))); nt_status 2238 source3/utils/ntlm_auth.c NTSTATUS nt_status; nt_status 2257 source3/utils/ntlm_auth.c nt_status = contact_winbind_auth_crap(opt_username, opt_domain, nt_status 2267 source3/utils/ntlm_auth.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2270 source3/utils/ntlm_auth.c NT_STATUS_V(nt_status)); nt_status 50 source3/utils/ntlm_auth_diagnostics.c NTSTATUS nt_status; nt_status 94 source3/utils/ntlm_auth_diagnostics.c nt_status = contact_winbind_auth_crap(opt_username, opt_domain, nt_status 106 source3/utils/ntlm_auth_diagnostics.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 109 source3/utils/ntlm_auth_diagnostics.c NT_STATUS_V(nt_status)); nt_status 174 source3/utils/ntlm_auth_diagnostics.c NTSTATUS nt_status; nt_status 193 source3/utils/ntlm_auth_diagnostics.c nt_status = contact_winbind_auth_crap(opt_username, opt_domain, nt_status 205 source3/utils/ntlm_auth_diagnostics.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 208 source3/utils/ntlm_auth_diagnostics.c NT_STATUS_V(nt_status)); nt_status 240 source3/utils/ntlm_auth_diagnostics.c NTSTATUS nt_status; nt_status 264 source3/utils/ntlm_auth_diagnostics.c nt_status = contact_winbind_auth_crap(opt_username, opt_domain, nt_status 276 source3/utils/ntlm_auth_diagnostics.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 279 source3/utils/ntlm_auth_diagnostics.c NT_STATUS_V(nt_status)); nt_status 314 source3/utils/ntlm_auth_diagnostics.c NTSTATUS nt_status; nt_status 355 source3/utils/ntlm_auth_diagnostics.c nt_status = contact_winbind_auth_crap(opt_username, opt_domain, nt_status 368 source3/utils/ntlm_auth_diagnostics.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 371 source3/utils/ntlm_auth_diagnostics.c NT_STATUS_V(nt_status)); nt_status 442 source3/utils/ntlm_auth_diagnostics.c NTSTATUS nt_status; nt_status 506 source3/utils/ntlm_auth_diagnostics.c nt_status = contact_winbind_auth_crap(opt_username, opt_domain, nt_status 520 source3/utils/ntlm_auth_diagnostics.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 523 source3/utils/ntlm_auth_diagnostics.c NT_STATUS_V(nt_status)); nt_status 961 source3/utils/smbcacls.c NTSTATUS nt_status; nt_status 978 source3/utils/smbcacls.c nt_status = cli_full_connection(&c, global_myname(), server, nt_status 987 source3/utils/smbcacls.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 988 source3/utils/smbcacls.c DEBUG(0,("cli_full_connection failed! (%s)\n", nt_errstr(nt_status))); nt_status 993 source3/utils/smbcacls.c nt_status = cli_cm_force_encryption(c, nt_status 998 source3/utils/smbcacls.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 372 source3/utils/smbcquotas.c NTSTATUS nt_status; nt_status 390 source3/utils/smbcquotas.c nt_status = cli_full_connection(&c, global_myname(), server, nt_status 399 source3/utils/smbcquotas.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 400 source3/utils/smbcquotas.c DEBUG(0,("cli_full_connection failed! (%s)\n", nt_errstr(nt_status))); nt_status 405 source3/utils/smbcquotas.c nt_status = cli_cm_force_encryption(c, nt_status 410 source3/utils/smbcquotas.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 838 source3/winbindd/idmap_ad.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 883 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_OK; nt_status 902 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_NO_MEMORY; nt_status 908 source3/winbindd/idmap_ad.c nt_status = ads_ntstatus(ads_status); nt_status 921 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_OK; nt_status 928 source3/winbindd/idmap_ad.c return nt_status; nt_status 944 source3/winbindd/idmap_ad.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 951 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 958 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_FILE_IS_OFFLINE; nt_status 971 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_OBJECT_PATH_NOT_FOUND; nt_status 981 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_NO_MEMORY; nt_status 987 source3/winbindd/idmap_ad.c nt_status = ads_ntstatus(ads_status); nt_status 997 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_OK; nt_status 1007 source3/winbindd/idmap_ad.c return nt_status; nt_status 1023 source3/winbindd/idmap_ad.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1031 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 1038 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_FILE_IS_OFFLINE; nt_status 1051 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_OBJECT_PATH_NOT_FOUND; nt_status 1060 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_NO_MEMORY; nt_status 1066 source3/winbindd/idmap_ad.c nt_status = ads_ntstatus(ads_status); nt_status 1080 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_NO_MEMORY; nt_status 1084 source3/winbindd/idmap_ad.c nt_status = NT_STATUS_OK; nt_status 1094 source3/winbindd/idmap_ad.c return nt_status; nt_status 73 source3/winbindd/idmap_adex/cell_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 78 source3/winbindd/idmap_adex/cell_util.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 79 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 89 source3/winbindd/idmap_adex/cell_util.c nt_status = NT_STATUS_OK; nt_status 92 source3/winbindd/idmap_adex/cell_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 94 source3/winbindd/idmap_adex/cell_util.c nt_errstr(nt_status))); nt_status 97 source3/winbindd/idmap_adex/cell_util.c return nt_status; nt_status 103 source3/winbindd/idmap_adex/cell_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 111 source3/winbindd/idmap_adex/cell_util.c nt_status = NT_STATUS_NO_MEMORY; nt_status 112 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 119 source3/winbindd/idmap_adex/cell_util.c nt_status = gc_find_forest_root(gc, cell_dns_domain(c)); nt_status 120 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 123 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_PTR_ERROR(c->forest_name, nt_status); nt_status 130 source3/winbindd/idmap_adex/cell_util.c return nt_status; nt_status 140 source3/winbindd/idmap_adex/cell_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 152 source3/winbindd/idmap_adex/cell_util.c nt_status = NT_STATUS_NO_MEMORY; nt_status 153 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 176 source3/winbindd/idmap_adex/cell_util.c nt_status = NT_STATUS_INSUFFICIENT_RESOURCES; nt_status 177 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 181 source3/winbindd/idmap_adex/cell_util.c nt_status = NT_STATUS_OK; nt_status 184 source3/winbindd/idmap_adex/cell_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 186 source3/winbindd/idmap_adex/cell_util.c nt_errstr(nt_status))); nt_status 191 source3/winbindd/idmap_adex/cell_util.c return nt_status; nt_status 213 source3/winbindd/idmap_adex/cell_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 225 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_PTR_ERROR(tmp_dn, nt_status); nt_status 239 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_PTR_ERROR(domain, nt_status); nt_status 243 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_PTR_ERROR(dns_name, nt_status); nt_status 245 source3/winbindd/idmap_adex/cell_util.c nt_status = NT_STATUS_OK; nt_status 248 source3/winbindd/idmap_adex/cell_util.c PRINT_NTSTATUS_ERROR(nt_status, "cell_dn_to_dns", 1); nt_status 262 source3/winbindd/idmap_adex/cell_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 266 source3/winbindd/idmap_adex/cell_util.c nt_status = NT_STATUS_INVALID_USER_BUFFER; nt_status 267 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 284 source3/winbindd/idmap_adex/cell_util.c nt_status = NT_STATUS_INVALID_ACCOUNT_NAME; nt_status 285 source3/winbindd/idmap_adex/cell_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 288 source3/winbindd/idmap_adex/cell_util.c nt_status = NT_STATUS_OK; nt_status 291 source3/winbindd/idmap_adex/cell_util.c return nt_status; nt_status 49 source3/winbindd/idmap_adex/domain_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 73 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_PTR_ERROR(dc, nt_status); nt_status 76 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_PTR_ERROR(dc->dns_name, nt_status); nt_status 80 source3/winbindd/idmap_adex/domain_util.c nt_status = NT_STATUS_OK; nt_status 85 source3/winbindd/idmap_adex/domain_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 88 source3/winbindd/idmap_adex/domain_util.c domain, nt_errstr(nt_status))); nt_status 91 source3/winbindd/idmap_adex/domain_util.c return nt_status; nt_status 119 source3/winbindd/idmap_adex/domain_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 130 source3/winbindd/idmap_adex/domain_util.c nt_status = dc_add_domain(lp_realm()); nt_status 131 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 134 source3/winbindd/idmap_adex/domain_util.c nt_status = NT_STATUS_CANT_ACCESS_DOMAIN_INFO; nt_status 135 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 146 source3/winbindd/idmap_adex/domain_util.c nt_status = dc_add_domain(domains[i].dns_name); nt_status 147 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 151 source3/winbindd/idmap_adex/domain_util.c nt_status = NT_STATUS_OK; nt_status 154 source3/winbindd/idmap_adex/domain_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 156 source3/winbindd/idmap_adex/domain_util.c nt_errstr(nt_status))); nt_status 161 source3/winbindd/idmap_adex/domain_util.c return nt_status; nt_status 175 source3/winbindd/idmap_adex/domain_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 179 source3/winbindd/idmap_adex/domain_util.c nt_status = ads_ntstatus(status); nt_status 181 source3/winbindd/idmap_adex/domain_util.c return nt_status; nt_status 213 source3/winbindd/idmap_adex/domain_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 221 source3/winbindd/idmap_adex/domain_util.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 222 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 226 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_PTR_ERROR(dns_domain, nt_status); nt_status 229 source3/winbindd/idmap_adex/domain_util.c nt_status = NT_STATUS_TRUSTED_DOMAIN_FAILURE; nt_status 230 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 239 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_PTR_ERROR(base_dn, nt_status); nt_status 241 source3/winbindd/idmap_adex/domain_util.c nt_status = cell_connect_dn(&dc->domain_cell, base_dn); nt_status 243 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 245 source3/winbindd/idmap_adex/domain_util.c nt_status = cell_lookup_settings(dc->domain_cell); nt_status 246 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 258 source3/winbindd/idmap_adex/domain_util.c nt_status = dc_do_search(dc, dn, LDAP_SCOPE_BASE, nt_status 265 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_PTR_ERROR(sid_str, nt_status); nt_status 269 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_PTR_ERROR(filter, nt_status); nt_status 272 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_PTR_ERROR(base, nt_status); nt_status 274 source3/winbindd/idmap_adex/domain_util.c nt_status = dc_do_search(dc, base, LDAP_SCOPE_SUBTREE, nt_status 277 source3/winbindd/idmap_adex/domain_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 285 source3/winbindd/idmap_adex/domain_util.c return nt_status; nt_status 103 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 114 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(ads, nt_status); nt_status 122 source3/winbindd/idmap_adex/gc_util.c nt_status = ads_ntstatus(ads_status); nt_status 123 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 132 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_IO_TIMEOUT; nt_status 133 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 137 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(gc->forest_name, nt_status); nt_status 144 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 152 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 161 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_INVALID_SERVER_STATE; nt_status 162 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 181 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_NO_MEMORY; nt_status 182 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 189 source3/winbindd/idmap_adex/gc_util.c nt_status = gc_find_forest_root(gc, domain); nt_status 190 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 209 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(dn, nt_status); nt_status 213 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(gc->search_base, nt_status); nt_status 219 source3/winbindd/idmap_adex/gc_util.c nt_status = cell_connect_dn(&gc->forest_cell, gc->search_base); nt_status 220 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 224 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(gc->forest_cell, nt_status); nt_status 246 source3/winbindd/idmap_adex/gc_util.c nt_status = cell_connect(gc->forest_cell); nt_status 247 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 249 source3/winbindd/idmap_adex/gc_util.c nt_status = cell_lookup_settings(gc->forest_cell); nt_status 250 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 264 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_OK; nt_status 267 source3/winbindd/idmap_adex/gc_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 270 source3/winbindd/idmap_adex/gc_util.c domain, nt_errstr(nt_status))); nt_status 273 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 304 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 314 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_CANT_ACCESS_DOMAIN_INFO; nt_status 315 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 321 source3/winbindd/idmap_adex/gc_util.c nt_status = gc_add_forest(lp_realm()); nt_status 322 source3/winbindd/idmap_adex/gc_util.c WARN_ON_NTSTATUS_ERROR(nt_status); nt_status 335 source3/winbindd/idmap_adex/gc_util.c nt_status = gc_add_forest(domains[i].dns_name); nt_status 336 source3/winbindd/idmap_adex/gc_util.c WARN_ON_NTSTATUS_ERROR(nt_status); nt_status 363 source3/winbindd/idmap_adex/gc_util.c nt_status = gc_add_forest(domains[i].dns_name); nt_status 364 source3/winbindd/idmap_adex/gc_util.c WARN_ON_NTSTATUS_ERROR(nt_status); nt_status 368 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_OK; nt_status 371 source3/winbindd/idmap_adex/gc_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 373 source3/winbindd/idmap_adex/gc_util.c nt_errstr(nt_status))); nt_status 378 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 387 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 391 source3/winbindd/idmap_adex/gc_util.c nt_status = gc_init_list(); nt_status 392 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 398 source3/winbindd/idmap_adex/gc_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 400 source3/winbindd/idmap_adex/gc_util.c nt_errstr(nt_status))); nt_status 417 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 423 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 424 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 434 source3/winbindd/idmap_adex/gc_util.c nt_status = ads_ntstatus(ads_status); nt_status 435 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 440 source3/winbindd/idmap_adex/gc_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 442 source3/winbindd/idmap_adex/gc_util.c filter, nt_errstr(nt_status))); nt_status 445 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 458 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 467 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_INVALID_DOMAIN_STATE; nt_status 468 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 474 source3/winbindd/idmap_adex/gc_util.c nt_status = gc_search_forest(gc, &m, filter); nt_status 475 source3/winbindd/idmap_adex/gc_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 480 source3/winbindd/idmap_adex/gc_util.c nt_status = add_ads_result_to_array(cell_connection(gc->forest_cell), nt_status 483 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 495 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND; nt_status 496 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 499 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_OK; nt_status 502 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 517 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 519 source3/winbindd/idmap_adex/gc_util.c nt_status = gc_search_all_forests(filter, &ads_list, nt_status 522 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 524 source3/winbindd/idmap_adex/gc_util.c nt_status = check_result_unique(ads_list[0], msg_list[0]); nt_status 525 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 533 source3/winbindd/idmap_adex/gc_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 540 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 553 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 572 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(name_user, nt_status); nt_status 575 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(name_filter, nt_status); nt_status 577 source3/winbindd/idmap_adex/gc_util.c nt_status = gc_search_all_forests(name_filter, &ads_list, nt_status 579 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 583 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND; nt_status 596 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(dn, nt_status); nt_status 600 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(dns_domain, nt_status); nt_status 616 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_INVALID_SID; nt_status 617 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 622 source3/winbindd/idmap_adex/gc_util.c nt_status = get_sid_type(ads, msg, sid_type); nt_status 623 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 626 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_OK; nt_status 641 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 652 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 663 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 664 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 670 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(dn, nt_status); nt_status 676 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(dns_domain, nt_status); nt_status 682 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_TRUSTED_DOMAIN_FAILURE; nt_status 683 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 687 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(sam_name, nt_status); nt_status 692 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR((*name), nt_status); nt_status 695 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_OK; nt_status 700 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 711 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 720 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(sid_string, nt_status); nt_status 724 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(filter, nt_status); nt_status 726 source3/winbindd/idmap_adex/gc_util.c nt_status = gc_search_all_forests_unique(filter, &ads, &msg); nt_status 727 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 729 source3/winbindd/idmap_adex/gc_util.c nt_status = get_object_account_name(ads, msg, name); nt_status 730 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 732 source3/winbindd/idmap_adex/gc_util.c nt_status = get_sid_type(ads, msg, sid_type); nt_status 733 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 739 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 751 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 757 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 758 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 771 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(ads_tmp, nt_status); nt_status 774 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(msg_tmp, nt_status); nt_status 778 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(ads_tmp, nt_status); nt_status 782 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_PTR_ERROR(msg_tmp, nt_status); nt_status 793 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_OK; nt_status 796 source3/winbindd/idmap_adex/gc_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 801 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 829 source3/winbindd/idmap_adex/gc_util.c NTSTATUS nt_status; nt_status 835 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND; nt_status 836 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 840 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_DUPLICATE_NAME; nt_status 841 source3/winbindd/idmap_adex/gc_util.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 844 source3/winbindd/idmap_adex/gc_util.c nt_status = NT_STATUS_OK; nt_status 847 source3/winbindd/idmap_adex/gc_util.c return nt_status; nt_status 159 source3/winbindd/idmap_adex/idmap_adex.c NTSTATUS nt_status; nt_status 167 source3/winbindd/idmap_adex/idmap_adex.c nt_status = _idmap_adex_init(dom, NULL); nt_status 168 source3/winbindd/idmap_adex/idmap_adex.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 169 source3/winbindd/idmap_adex/idmap_adex.c return nt_status; nt_status 212 source3/winbindd/idmap_adex/idmap_adex.c NTSTATUS nt_status; nt_status 220 source3/winbindd/idmap_adex/idmap_adex.c nt_status = _idmap_adex_init(dom, NULL); nt_status 221 source3/winbindd/idmap_adex/idmap_adex.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 222 source3/winbindd/idmap_adex/idmap_adex.c return nt_status; nt_status 324 source3/winbindd/idmap_adex/idmap_adex.c NTSTATUS nt_status; nt_status 327 source3/winbindd/idmap_adex/idmap_adex.c nt_status = _idmap_adex_init(NULL, NULL); nt_status 328 source3/winbindd/idmap_adex/idmap_adex.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 329 source3/winbindd/idmap_adex/idmap_adex.c return nt_status; nt_status 346 source3/winbindd/idmap_adex/idmap_adex.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 349 source3/winbindd/idmap_adex/idmap_adex.c nt_status = _idmap_adex_init(NULL, NULL); nt_status 350 source3/winbindd/idmap_adex/idmap_adex.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 353 source3/winbindd/idmap_adex/idmap_adex.c nt_status = NT_STATUS_INVALID_SERVER_STATE; nt_status 354 source3/winbindd/idmap_adex/idmap_adex.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 357 source3/winbindd/idmap_adex/idmap_adex.c nt_status = cell->provider->map_to_alias(mem_ctx, e->domain, nt_status 363 source3/winbindd/idmap_adex/idmap_adex.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 364 source3/winbindd/idmap_adex/idmap_adex.c nt_status = NT_STATUS_NONE_MAPPED; nt_status 367 source3/winbindd/idmap_adex/idmap_adex.c return nt_status; nt_status 377 source3/winbindd/idmap_adex/idmap_adex.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 380 source3/winbindd/idmap_adex/idmap_adex.c nt_status = _idmap_adex_init(NULL, NULL); nt_status 381 source3/winbindd/idmap_adex/idmap_adex.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 384 source3/winbindd/idmap_adex/idmap_adex.c nt_status = NT_STATUS_INVALID_SERVER_STATE; nt_status 385 source3/winbindd/idmap_adex/idmap_adex.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 389 source3/winbindd/idmap_adex/idmap_adex.c nt_status = cell->provider->map_from_alias(mem_ctx, e->domain, nt_status 395 source3/winbindd/idmap_adex/idmap_adex.c if (!NT_STATUS_IS_OK(nt_status)) nt_status 396 source3/winbindd/idmap_adex/idmap_adex.c nt_status = NT_STATUS_NONE_MAPPED; nt_status 399 source3/winbindd/idmap_adex/idmap_adex.c return nt_status; nt_status 255 source3/winbindd/idmap_adex/likewise_cell.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 260 source3/winbindd/idmap_adex/likewise_cell.c nt_status = NT_STATUS_CANT_ACCESS_DOMAIN_INFO; nt_status 261 source3/winbindd/idmap_adex/likewise_cell.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 274 source3/winbindd/idmap_adex/likewise_cell.c BAIL_ON_PTR_ERROR(ads, nt_status); nt_status 290 source3/winbindd/idmap_adex/likewise_cell.c nt_status = NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND; nt_status 291 source3/winbindd/idmap_adex/likewise_cell.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 300 source3/winbindd/idmap_adex/likewise_cell.c nt_status = ads_ntstatus(ads_status); nt_status 303 source3/winbindd/idmap_adex/likewise_cell.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 308 source3/winbindd/idmap_adex/likewise_cell.c return nt_status; nt_status 316 source3/winbindd/idmap_adex/likewise_cell.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 321 source3/winbindd/idmap_adex/likewise_cell.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 322 source3/winbindd/idmap_adex/likewise_cell.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 326 source3/winbindd/idmap_adex/likewise_cell.c nt_status = NT_STATUS_NO_MEMORY; nt_status 327 source3/winbindd/idmap_adex/likewise_cell.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 338 source3/winbindd/idmap_adex/likewise_cell.c nt_status = cell_connect(new_cell); nt_status 339 source3/winbindd/idmap_adex/likewise_cell.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 344 source3/winbindd/idmap_adex/likewise_cell.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 346 source3/winbindd/idmap_adex/likewise_cell.c dn ? dn : "NULL", nt_errstr(nt_status))); nt_status 350 source3/winbindd/idmap_adex/likewise_cell.c return nt_status; nt_status 368 source3/winbindd/idmap_adex/likewise_cell.c NTSTATUS nt_status; nt_status 373 source3/winbindd/idmap_adex/likewise_cell.c nt_status = cell_connect(c); nt_status 374 source3/winbindd/idmap_adex/likewise_cell.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 375 source3/winbindd/idmap_adex/likewise_cell.c status = ADS_ERROR_NT(nt_status); nt_status 427 source3/winbindd/idmap_adex/likewise_cell.c nt_status = cell_connect(c); nt_status 428 source3/winbindd/idmap_adex/likewise_cell.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 429 source3/winbindd/idmap_adex/likewise_cell.c status = ADS_ERROR_NT(nt_status); nt_status 56 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status; nt_status 96 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(oc_filter, nt_status); nt_status 97 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(attr_filter, nt_status); nt_status 126 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status; nt_status 139 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(user_attr_filter, nt_status); nt_status 140 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(group_attr_filter, nt_status); nt_status 176 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 190 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(sid_str, nt_status); nt_status 205 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 208 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(filter, nt_status); nt_status 211 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(base, nt_status); nt_status 216 source3/winbindd/idmap_adex/provider_unified.c nt_status = ads_ntstatus(ads_status); nt_status 217 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 223 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND; nt_status 224 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 228 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_DUPLICATE_NAME; nt_status 229 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 233 source3/winbindd/idmap_adex/provider_unified.c PRINT_NTSTATUS_ERROR(nt_status, "search_cell", 4); nt_status 238 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 249 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 253 source3/winbindd/idmap_adex/provider_unified.c nt_status = dc_search_domains(cell, msg, dn, sid); nt_status 254 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 260 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND; nt_status 261 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 265 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_DUPLICATE_NAME; nt_status 266 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 270 source3/winbindd/idmap_adex/provider_unified.c PRINT_NTSTATUS_ERROR(nt_status, "search_domain", 4); nt_status 273 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 283 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 295 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OK; nt_status 303 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OBJECT_NAME_INVALID; nt_status 304 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 309 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OBJECT_PATH_NOT_FOUND; nt_status 310 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 315 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(dns_domain, nt_status); nt_status 319 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_TRUSTED_DOMAIN_FAILURE; nt_status 320 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 323 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OK; nt_status 329 source3/winbindd/idmap_adex/provider_unified.c return NT_STATUS_IS_OK(nt_status); nt_status 345 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 354 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 355 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 361 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_NO_SUCH_FILE; nt_status 362 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 372 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(entry_dn, nt_status); nt_status 381 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_DUPLICATE_NAME; nt_status 382 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 388 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR((*dn), nt_status); nt_status 397 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND; nt_status 398 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 420 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(keywords, nt_status); nt_status 424 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INTERNAL_DB_CORRUPTION; nt_status 425 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 429 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_SID; nt_status 430 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 434 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OK; nt_status 437 source3/winbindd/idmap_adex/provider_unified.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 443 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 458 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 471 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_DOMAIN_STATE; nt_status 472 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 486 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(sid_binstr, nt_status); nt_status 501 source3/winbindd/idmap_adex/provider_unified.c nt_status = gc_search_forest(gc, &m, filter); nt_status 502 source3/winbindd/idmap_adex/provider_unified.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 507 source3/winbindd/idmap_adex/provider_unified.c nt_status = add_ads_result_to_array(cell_connection(gc->forest_cell), nt_status 510 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 517 source3/winbindd/idmap_adex/provider_unified.c nt_status = check_result_unique_scoped(ads_list, msg_list, num_resp, nt_status 519 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 521 source3/winbindd/idmap_adex/provider_unified.c nt_status = search_domain(&domain_cell, &m, dn, &user_sid); nt_status 522 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 530 source3/winbindd/idmap_adex/provider_unified.c PRINT_NTSTATUS_ERROR(nt_status, "search_forest", 4); nt_status 537 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 547 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 553 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_SERVER_STATE; nt_status 554 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 563 source3/winbindd/idmap_adex/provider_unified.c nt_status = search_forest(cell, &msg, fdata); nt_status 565 source3/winbindd/idmap_adex/provider_unified.c nt_status = search_cell(cell, &msg, fdata); nt_status 577 source3/winbindd/idmap_adex/provider_unified.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 598 source3/winbindd/idmap_adex/provider_unified.c PRINT_NTSTATUS_ERROR(nt_status, "search_cell_list", 3); nt_status 600 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 612 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 632 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(keywords, nt_status); nt_status 636 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INTERNAL_DB_CORRUPTION; nt_status 637 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 641 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_SID; nt_status 642 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 646 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OK; nt_status 651 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 663 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 676 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INTERNAL_DB_CORRUPTION; nt_status 690 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 698 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INTERNAL_DB_CORRUPTION; nt_status 704 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INTERNAL_DB_CORRUPTION; nt_status 714 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 718 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OK; nt_status 723 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 735 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 747 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND; nt_status 748 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 757 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR(keywords, nt_status); nt_status 761 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND; nt_status 762 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 767 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND; nt_status 768 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 773 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OK; nt_status 778 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 789 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 802 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 803 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 807 source3/winbindd/idmap_adex/provider_unified.c nt_status = get_object_uint32(c, msg, id_attr, id); nt_status 808 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 811 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 824 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status; nt_status 826 source3/winbindd/idmap_adex/provider_unified.c nt_status = get_object_type(c, msg, type); nt_status 827 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 829 source3/winbindd/idmap_adex/provider_unified.c nt_status = get_object_id(c, msg, *type, id); nt_status 830 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 833 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 846 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 868 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_NO_MEMORY; nt_status 869 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 878 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OBJECT_NAME_NOT_FOUND; nt_status 879 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 882 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OK; nt_status 887 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 902 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status; nt_status 904 source3/winbindd/idmap_adex/provider_unified.c nt_status = get_object_string(c, msg, ctx, ADEX_ATTR_HOMEDIR, homedir); nt_status 905 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 907 source3/winbindd/idmap_adex/provider_unified.c nt_status = get_object_string(c, msg, ctx, ADEX_ATTR_SHELL, shell); nt_status 908 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 910 source3/winbindd/idmap_adex/provider_unified.c nt_status = get_object_string(c, msg, ctx, ADEX_ATTR_GECOS, gecos); nt_status 913 source3/winbindd/idmap_adex/provider_unified.c nt_status = get_object_uint32(c, msg, ADEX_ATTR_GIDNUM, p_gid); nt_status 914 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 917 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 929 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 935 source3/winbindd/idmap_adex/provider_unified.c nt_status = get_object_type(c, msg, &type); nt_status 936 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 947 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 948 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 952 source3/winbindd/idmap_adex/provider_unified.c nt_status = get_object_string(c, msg, ctx, attr, alias); nt_status 953 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 956 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 967 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status; nt_status 974 source3/winbindd/idmap_adex/provider_unified.c nt_status = search_cell_list(&cell, &msg, &filter); nt_status 975 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 977 source3/winbindd/idmap_adex/provider_unified.c nt_status = pull_sid(cell, msg, sid); nt_status 978 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 983 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 995 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status; nt_status 1001 source3/winbindd/idmap_adex/provider_unified.c nt_status = search_cell_list(&cell, &msg, &filter); nt_status 1002 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1004 source3/winbindd/idmap_adex/provider_unified.c nt_status = pull_id(cell, msg, id, type); nt_status 1005 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1008 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 1009 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1015 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 1029 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status; nt_status 1036 source3/winbindd/idmap_adex/provider_unified.c nt_status = search_cell_list(&cell, &msg, &filter); nt_status 1037 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1039 source3/winbindd/idmap_adex/provider_unified.c nt_status = get_object_type(cell, msg, &type); nt_status 1040 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1043 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_NO_SUCH_USER; nt_status 1044 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1047 source3/winbindd/idmap_adex/provider_unified.c nt_status = pull_nss_info(cell, msg, ctx, homedir, shell, gecos, nt_status 1049 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1054 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 1065 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1074 source3/winbindd/idmap_adex/provider_unified.c nt_status = gc_name_to_sid(domain, name, &sid, &sid_type); nt_status 1075 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1082 source3/winbindd/idmap_adex/provider_unified.c nt_status = search_cell_list(&cell, &msg, &filter); nt_status 1083 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1087 source3/winbindd/idmap_adex/provider_unified.c nt_status = pull_alias(cell, msg, ctx, alias); nt_status 1088 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1091 source3/winbindd/idmap_adex/provider_unified.c PRINT_NTSTATUS_ERROR(nt_status, "map_to_alias", 3); nt_status 1096 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 1110 source3/winbindd/idmap_adex/provider_unified.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1125 source3/winbindd/idmap_adex/provider_unified.c nt_status = search_cell_list(&cell_alias, &msg_alias, &filter); nt_status 1126 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1128 source3/winbindd/idmap_adex/provider_unified.c nt_status = pull_sid(cell_alias, msg_alias, &sid); nt_status 1129 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1139 source3/winbindd/idmap_adex/provider_unified.c nt_status = search_cell_list(&cell_sid, &msg_sid, &filter); nt_status 1140 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1143 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OBJECT_PATH_NOT_FOUND; nt_status 1144 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1149 source3/winbindd/idmap_adex/provider_unified.c nt_status = gc_sid_to_name(&sid, &canonical_name, &type); nt_status 1150 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 1153 source3/winbindd/idmap_adex/provider_unified.c BAIL_ON_PTR_ERROR((*name), nt_status); nt_status 1155 source3/winbindd/idmap_adex/provider_unified.c nt_status = NT_STATUS_OK; nt_status 1158 source3/winbindd/idmap_adex/provider_unified.c PRINT_NTSTATUS_ERROR(nt_status, "map_from_alias", 3); nt_status 1167 source3/winbindd/idmap_adex/provider_unified.c return nt_status; nt_status 108 source3/winbindd/idmap_hash/idmap_hash.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 117 source3/winbindd/idmap_hash/idmap_hash.c nt_status = NT_STATUS_OK; nt_status 122 source3/winbindd/idmap_hash/idmap_hash.c nt_status = NT_STATUS_TRUSTED_DOMAIN_FAILURE; nt_status 123 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 129 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_PTR_NT_ERROR(hashed_domains, nt_status); nt_status 151 source3/winbindd/idmap_hash/idmap_hash.c return nt_status; nt_status 160 source3/winbindd/idmap_hash/idmap_hash.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 168 source3/winbindd/idmap_hash/idmap_hash.c nt_status = be_init(dom, NULL); nt_status 169 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 172 source3/winbindd/idmap_hash/idmap_hash.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 173 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 186 source3/winbindd/idmap_hash/idmap_hash.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 187 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 202 source3/winbindd/idmap_hash/idmap_hash.c return nt_status; nt_status 211 source3/winbindd/idmap_hash/idmap_hash.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 219 source3/winbindd/idmap_hash/idmap_hash.c nt_status = be_init(dom, NULL); nt_status 220 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 223 source3/winbindd/idmap_hash/idmap_hash.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 224 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 249 source3/winbindd/idmap_hash/idmap_hash.c return nt_status; nt_status 284 source3/winbindd/idmap_hash/idmap_hash.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 286 source3/winbindd/idmap_hash/idmap_hash.c nt_status = nss_hash_init(e); nt_status 287 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 290 source3/winbindd/idmap_hash/idmap_hash.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 291 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 295 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_PTR_NT_ERROR(*homedir, nt_status); nt_status 298 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_PTR_NT_ERROR(*shell, nt_status); nt_status 310 source3/winbindd/idmap_hash/idmap_hash.c return nt_status; nt_status 321 source3/winbindd/idmap_hash/idmap_hash.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 325 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_PTR_NT_ERROR(value, nt_status); nt_status 327 source3/winbindd/idmap_hash/idmap_hash.c nt_status = mapfile_lookup_key(mem_ctx, value, alias); nt_status 328 source3/winbindd/idmap_hash/idmap_hash.c BAIL_ON_NTSTATUS_ERROR(nt_status); nt_status 331 source3/winbindd/idmap_hash/idmap_hash.c return nt_status; nt_status 4231 source3/winbindd/winbindd_cache.c NTSTATUS nt_status; nt_status 4257 source3/winbindd/winbindd_cache.c nt_status = nss_get_info( domain->name, user_sid, ctx, ads, msg, nt_status 4260 source3/winbindd/winbindd_cache.c DEBUG(10, ("nss_get_info returned %s\n", nt_errstr(nt_status))); nt_status 4262 source3/winbindd/winbindd_cache.c if ( NT_STATUS_IS_OK(nt_status) ) { nt_status 4268 source3/winbindd/winbindd_cache.c wcache_save_user_pwinfo( domain, nt_status, user_sid, nt_status 4272 source3/winbindd/winbindd_cache.c if ( NT_STATUS_EQUAL( nt_status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) { nt_status 4278 source3/winbindd/winbindd_cache.c return nt_status; nt_status 191 source3/winbindd/winbindd_group.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 193 source3/winbindd/winbindd_group.c nt_status = normalize_name_map(mem_ctx, domain, gr_name, nt_status 197 source3/winbindd/winbindd_group.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 202 source3/winbindd/winbindd_group.c else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) { nt_status 601 source3/winbindd/winbindd_group.c NTSTATUS nt_status; nt_status 604 source3/winbindd/winbindd_group.c nt_status = expand_groups( mem_ctx, domain, nt_status 608 source3/winbindd/winbindd_group.c if ( !NT_STATUS_IS_OK(nt_status) ) { nt_status 645 source3/winbindd/winbindd_group.c nt_status = add_names_to_list( mem_ctx, &names, nt_status 648 source3/winbindd/winbindd_group.c if ( !NT_STATUS_IS_OK(nt_status) ) { nt_status 764 source3/winbindd/winbindd_group.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 772 source3/winbindd/winbindd_group.c nt_status = normalize_name_unmap(state->mem_ctx, nt_status 777 source3/winbindd/winbindd_group.c if (!NT_STATUS_IS_OK(nt_status) && nt_status 778 source3/winbindd/winbindd_group.c !NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) nt_status 894 source3/winbindd/winbindd_group.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 920 source3/winbindd/winbindd_group.c nt_status = normalize_name_unmap(s->state->mem_ctx, raw_name, nt_status 924 source3/winbindd/winbindd_group.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 932 source3/winbindd/winbindd_group.c else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) { nt_status 1545 source3/winbindd/winbindd_group.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 1565 source3/winbindd/winbindd_group.c nt_status = normalize_name_unmap(state->mem_ctx, nt_status 1571 source3/winbindd/winbindd_group.c if (!NT_STATUS_IS_OK(nt_status) && nt_status 1572 source3/winbindd/winbindd_group.c !NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) nt_status 2021 source3/winbindd/winbindd_pam.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 2028 source3/winbindd/winbindd_pam.c nt_status = normalize_name_unmap(state->mem_ctx, nt_status 2034 source3/winbindd/winbindd_pam.c if (NT_STATUS_IS_OK(nt_status) || nt_status 2035 source3/winbindd/winbindd_pam.c NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) nt_status 663 source3/winbindd/winbindd_passdb.c NTSTATUS nt_status; nt_status 677 source3/winbindd/winbindd_passdb.c nt_status = pdb_enum_trusteddoms(tmp_ctx, num_domains, &domains); nt_status 678 source3/winbindd/winbindd_passdb.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 680 source3/winbindd/winbindd_passdb.c return nt_status; nt_status 78 source3/winbindd/winbindd_user.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 87 source3/winbindd/winbindd_user.c nt_status = NT_STATUS_NO_SUCH_DOMAIN; nt_status 114 source3/winbindd/winbindd_user.c nt_status = normalize_name_map(ctx, domain, user_name, &mapped_name); nt_status 117 source3/winbindd/winbindd_user.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 121 source3/winbindd/winbindd_user.c else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) { nt_status 261 source3/winbindd/winbindd_user.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 303 source3/winbindd/winbindd_user.c nt_status = normalize_name_map(s->state->mem_ctx, s->domain, nt_status 307 source3/winbindd/winbindd_user.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 312 source3/winbindd/winbindd_user.c else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) { nt_status 428 source3/winbindd/winbindd_user.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 440 source3/winbindd/winbindd_user.c nt_status = normalize_name_unmap(state->mem_ctx, domuser, nt_status 446 source3/winbindd/winbindd_user.c if (!NT_STATUS_IS_OK(nt_status) && nt_status 447 source3/winbindd/winbindd_user.c !NT_STATUS_EQUAL(nt_status, NT_STATUS_FILE_RENAMED)) nt_status 1429 source3/winbindd/winbindd_util.c NTSTATUS nt_status; nt_status 1442 source3/winbindd/winbindd_util.c nt_status = resolve_username_to_alias(mem_ctx, domain, nt_status 1444 source3/winbindd/winbindd_util.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 1452 source3/winbindd/winbindd_util.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND)) { nt_status 1456 source3/winbindd/winbindd_util.c return nt_status; nt_status 1479 source3/winbindd/winbindd_util.c NTSTATUS nt_status; nt_status 1498 source3/winbindd/winbindd_util.c nt_status = resolve_alias_to_username(mem_ctx, domain, nt_status 1500 source3/winbindd/winbindd_util.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 1508 source3/winbindd/winbindd_util.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND)) { nt_status 1512 source3/winbindd/winbindd_util.c return nt_status; nt_status 1691 source3/winbindd/winbindd_util.c resp->data.auth.nt_status = NT_STATUS_V(result); nt_status 245 source4/auth/auth.h NTSTATUS auth_nt_status_squash(NTSTATUS nt_status); nt_status 772 source4/auth/gensec/gensec.c NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 788 source4/auth/gensec/gensec.c nt_status = gensec_start_mech_by_ops(gensec_security, ops[i]); nt_status 789 source4/auth/gensec/gensec.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_PARAMETER)) { nt_status 794 source4/auth/gensec/gensec.c return nt_status; nt_status 286 source4/auth/gensec/gensec.h NTSTATUS auth_nt_status_squash(NTSTATUS nt_status); nt_status 256 source4/auth/gensec/gensec_gssapi.c NTSTATUS nt_status; nt_status 262 source4/auth/gensec/gensec_gssapi.c nt_status = gensec_gssapi_start(gensec_security); nt_status 263 source4/auth/gensec/gensec_gssapi.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 264 source4/auth/gensec/gensec_gssapi.c return nt_status; nt_status 292 source4/auth/gensec/gensec_gssapi.c NTSTATUS nt_status; nt_status 294 source4/auth/gensec/gensec_gssapi.c nt_status = gensec_gssapi_server_start(gensec_security); nt_status 296 source4/auth/gensec/gensec_gssapi.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 300 source4/auth/gensec/gensec_gssapi.c return nt_status; nt_status 308 source4/auth/gensec/gensec_gssapi.c NTSTATUS nt_status; nt_status 329 source4/auth/gensec/gensec_gssapi.c nt_status = gensec_gssapi_start(gensec_security); nt_status 330 source4/auth/gensec/gensec_gssapi.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 331 source4/auth/gensec/gensec_gssapi.c return nt_status; nt_status 389 source4/auth/gensec/gensec_gssapi.c NTSTATUS nt_status; nt_status 391 source4/auth/gensec/gensec_gssapi.c nt_status = gensec_gssapi_client_start(gensec_security); nt_status 393 source4/auth/gensec/gensec_gssapi.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 397 source4/auth/gensec/gensec_gssapi.c return nt_status; nt_status 438 source4/auth/gensec/gensec_gssapi.c NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE; nt_status 558 source4/auth/gensec/gensec_gssapi.c return nt_status; nt_status 564 source4/auth/gensec/gensec_gssapi.c return nt_status; nt_status 1219 source4/auth/gensec/gensec_gssapi.c NTSTATUS nt_status; nt_status 1258 source4/auth/gensec/gensec_gssapi.c nt_status = kerberos_pac_blob_to_server_info(mem_ctx, nt_status 1263 source4/auth/gensec/gensec_gssapi.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1265 source4/auth/gensec/gensec_gssapi.c return nt_status; nt_status 1297 source4/auth/gensec/gensec_gssapi.c nt_status = gensec_security->auth_context->get_server_info_principal(mem_ctx, nt_status 1302 source4/auth/gensec/gensec_gssapi.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1304 source4/auth/gensec/gensec_gssapi.c return nt_status; nt_status 1315 source4/auth/gensec/gensec_gssapi.c nt_status = auth_generate_session_info(mem_ctx, gensec_security->event_ctx, nt_status 1317 source4/auth/gensec/gensec_gssapi.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1319 source4/auth/gensec/gensec_gssapi.c return nt_status; nt_status 1322 source4/auth/gensec/gensec_gssapi.c nt_status = gensec_gssapi_session_key(gensec_security, &session_info->session_key); nt_status 1323 source4/auth/gensec/gensec_gssapi.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1325 source4/auth/gensec/gensec_gssapi.c return nt_status; nt_status 191 source4/auth/gensec/gensec_krb5.c NTSTATUS nt_status; nt_status 194 source4/auth/gensec/gensec_krb5.c nt_status = gensec_krb5_start(gensec_security); nt_status 195 source4/auth/gensec/gensec_krb5.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 196 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 207 source4/auth/gensec/gensec_krb5.c NTSTATUS nt_status = gensec_krb5_server_start(gensec_security); nt_status 209 source4/auth/gensec/gensec_krb5.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 214 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 221 source4/auth/gensec/gensec_krb5.c NTSTATUS nt_status; nt_status 243 source4/auth/gensec/gensec_krb5.c nt_status = gensec_krb5_start(gensec_security); nt_status 244 source4/auth/gensec/gensec_krb5.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 245 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 333 source4/auth/gensec/gensec_krb5.c NTSTATUS nt_status = gensec_krb5_client_start(gensec_security); nt_status 335 source4/auth/gensec/gensec_krb5.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 340 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 380 source4/auth/gensec/gensec_krb5.c NTSTATUS nt_status; nt_status 396 source4/auth/gensec/gensec_krb5.c nt_status = NT_STATUS_MORE_PROCESSING_REQUIRED; nt_status 397 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 427 source4/auth/gensec/gensec_krb5.c nt_status = NT_STATUS_ACCESS_DENIED; nt_status 430 source4/auth/gensec/gensec_krb5.c nt_status = NT_STATUS_OK; nt_status 436 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 554 source4/auth/gensec/gensec_krb5.c NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; nt_status 613 source4/auth/gensec/gensec_krb5.c nt_status = gensec_security->auth_context->get_server_info_principal(mem_ctx, nt_status 617 source4/auth/gensec/gensec_krb5.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 619 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 630 source4/auth/gensec/gensec_krb5.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 632 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 647 source4/auth/gensec/gensec_krb5.c nt_status = kerberos_pac_logon_info(gensec_krb5_state, nt_status 656 source4/auth/gensec/gensec_krb5.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 658 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 662 source4/auth/gensec/gensec_krb5.c nt_status = make_server_info_netlogon_validation(mem_ctx, nt_status 666 source4/auth/gensec/gensec_krb5.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 668 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 673 source4/auth/gensec/gensec_krb5.c nt_status = auth_generate_session_info(mem_ctx, gensec_security->event_ctx, gensec_security->settings->lp_ctx, server_info, &session_info); nt_status 675 source4/auth/gensec/gensec_krb5.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 677 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 680 source4/auth/gensec/gensec_krb5.c nt_status = gensec_krb5_session_key(gensec_security, &session_info->session_key); nt_status 682 source4/auth/gensec/gensec_krb5.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 684 source4/auth/gensec/gensec_krb5.c return nt_status; nt_status 193 source4/auth/gensec/schannel_state.c NTSTATUS nt_status; nt_status 207 source4/auth/gensec/schannel_state.c nt_status = schannel_store_session_key_ldb(mem_ctx, ldb, creds); nt_status 209 source4/auth/gensec/schannel_state.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 223 source4/auth/gensec/schannel_state.c return nt_status; nt_status 336 source4/auth/gensec/schannel_state.c NTSTATUS nt_status; nt_status 344 source4/auth/gensec/schannel_state.c nt_status = schannel_fetch_session_key_ldb(mem_ctx, ldb, nt_status 348 source4/auth/gensec/schannel_state.c return nt_status; nt_status 70 source4/auth/gensec/socket.c NTSTATUS nt_status; nt_status 76 source4/auth/gensec/socket.c nt_status = gensec_wrap(gensec_security, nt_status 79 source4/auth/gensec/socket.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 81 source4/auth/gensec/socket.c return nt_status; nt_status 110 source4/auth/gensec/socket.c NTSTATUS nt_status; nt_status 128 source4/auth/gensec/socket.c nt_status = gensec_unwrap(gensec_security, nt_status 131 source4/auth/gensec/socket.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 132 source4/auth/gensec/socket.c return nt_status; nt_status 136 source4/auth/gensec/socket.c return nt_status; nt_status 294 source4/auth/gensec/socket.c NTSTATUS nt_status; nt_status 302 source4/auth/gensec/socket.c nt_status = gensec_unwrap_packets(gensec_socket->gensec_security, nt_status 306 source4/auth/gensec/socket.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 308 source4/auth/gensec/socket.c return nt_status; nt_status 347 source4/auth/gensec/socket.c NTSTATUS nt_status; nt_status 379 source4/auth/gensec/socket.c nt_status = gensec_wrap_packets(gensec_socket->gensec_security, nt_status 383 source4/auth/gensec/socket.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 385 source4/auth/gensec/socket.c return nt_status; nt_status 391 source4/auth/gensec/socket.c nt_status = packet_send_callback(gensec_socket->packet, nt_status 423 source4/auth/gensec/socket.c NTSTATUS nt_status; nt_status 425 source4/auth/gensec/socket.c nt_status = socket_create_with_ops(mem_ctx, &gensec_socket_ops, &new_sock, nt_status 427 source4/auth/gensec/socket.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 429 source4/auth/gensec/socket.c return nt_status; nt_status 338 source4/auth/gensec/spnego.c NTSTATUS nt_status; nt_status 362 source4/auth/gensec/spnego.c nt_status = all_ops[i]->magic(gensec_security, &in); nt_status 363 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 369 source4/auth/gensec/spnego.c nt_status = gensec_subcontext_start(spnego_state, nt_status 373 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 374 source4/auth/gensec/spnego.c return nt_status; nt_status 377 source4/auth/gensec/spnego.c nt_status = gensec_start_mech_by_ops(spnego_state->sub_sec_security, nt_status 379 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 380 source4/auth/gensec/spnego.c return nt_status; nt_status 382 source4/auth/gensec/spnego.c nt_status = gensec_update(spnego_state->sub_sec_security, nt_status 384 source4/auth/gensec/spnego.c return nt_status; nt_status 403 source4/auth/gensec/spnego.c NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 425 source4/auth/gensec/spnego.c nt_status = gensec_subcontext_start(spnego_state, nt_status 428 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 429 source4/auth/gensec/spnego.c return nt_status; nt_status 432 source4/auth/gensec/spnego.c nt_status = gensec_start_mech_by_ops(spnego_state->sub_sec_security, nt_status 434 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 440 source4/auth/gensec/spnego.c nt_status = gensec_update(spnego_state->sub_sec_security, nt_status 444 source4/auth/gensec/spnego.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_PARAMETER) || nt_status 445 source4/auth/gensec/spnego.c NT_STATUS_EQUAL(nt_status, NT_STATUS_CANT_ACCESS_DOMAIN_INFO)) { nt_status 449 source4/auth/gensec/spnego.c spnego_state->sub_sec_security->ops->name, nt_errstr(nt_status))); nt_status 467 source4/auth/gensec/spnego.c nt_status = gensec_subcontext_start(spnego_state, nt_status 470 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 471 source4/auth/gensec/spnego.c return nt_status; nt_status 474 source4/auth/gensec/spnego.c nt_status = gensec_start_mech_by_ops(spnego_state->sub_sec_security, nt_status 476 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 485 source4/auth/gensec/spnego.c nt_status = gensec_update(spnego_state->sub_sec_security, nt_status 496 source4/auth/gensec/spnego.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_PARAMETER) || nt_status 497 source4/auth/gensec/spnego.c NT_STATUS_EQUAL(nt_status, NT_STATUS_CANT_ACCESS_DOMAIN_INFO)) { nt_status 501 source4/auth/gensec/spnego.c spnego_state->sub_sec_security->ops->name, nt_errstr(nt_status))); nt_status 520 source4/auth/gensec/spnego.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_PARAMETER)) { nt_status 522 source4/auth/gensec/spnego.c nt_status = NT_STATUS_MORE_PROCESSING_REQUIRED; nt_status 525 source4/auth/gensec/spnego.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_PARAMETER) nt_status 526 source4/auth/gensec/spnego.c && !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) nt_status 527 source4/auth/gensec/spnego.c && !NT_STATUS_IS_OK(nt_status)) { nt_status 529 source4/auth/gensec/spnego.c spnego_state->sub_sec_security->ops->name, nt_errstr(nt_status))); nt_status 537 source4/auth/gensec/spnego.c return nt_status; nt_status 541 source4/auth/gensec/spnego.c return nt_status; /* OK, INVALID_PARAMETER ore MORE PROCESSING */ nt_status 550 source4/auth/gensec/spnego.c return nt_status; nt_status 563 source4/auth/gensec/spnego.c NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 582 source4/auth/gensec/spnego.c nt_status = gensec_subcontext_start(spnego_state, nt_status 585 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 586 source4/auth/gensec/spnego.c return nt_status; nt_status 589 source4/auth/gensec/spnego.c nt_status = gensec_start_mech_by_ops(spnego_state->sub_sec_security, nt_status 591 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 599 source4/auth/gensec/spnego.c nt_status = gensec_update(spnego_state->sub_sec_security, nt_status 604 source4/auth/gensec/spnego.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) nt_status 605 source4/auth/gensec/spnego.c && !NT_STATUS_IS_OK(nt_status)) { nt_status 607 source4/auth/gensec/spnego.c spnego_state->sub_sec_security->ops->name, nt_errstr(nt_status))); nt_status 657 source4/auth/gensec/spnego.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 666 source4/auth/gensec/spnego.c DEBUG(1, ("Failed to setup SPNEGO negTokenInit request: %s\n", nt_errstr(nt_status))); nt_status 679 source4/auth/gensec/spnego.c NTSTATUS nt_status, nt_status 693 source4/auth/gensec/spnego.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 697 source4/auth/gensec/spnego.c } else if (NT_STATUS_IS_OK(nt_status)) { nt_status 706 source4/auth/gensec/spnego.c DEBUG(2, ("SPNEGO login failed: %s\n", nt_errstr(nt_status))); nt_status 717 source4/auth/gensec/spnego.c return nt_status; nt_status 747 source4/auth/gensec/spnego.c NTSTATUS nt_status; nt_status 766 source4/auth/gensec/spnego.c nt_status = gensec_spnego_parse_negTokenInit(gensec_security, nt_status 773 source4/auth/gensec/spnego.c nt_status = gensec_spnego_server_negTokenTarg(gensec_security, nt_status 776 source4/auth/gensec/spnego.c nt_status, nt_status 783 source4/auth/gensec/spnego.c return nt_status; nt_status 785 source4/auth/gensec/spnego.c nt_status = gensec_spnego_create_negTokenInit(gensec_security, spnego_state, nt_status 789 source4/auth/gensec/spnego.c return nt_status; nt_status 798 source4/auth/gensec/spnego.c NTSTATUS nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 802 source4/auth/gensec/spnego.c nt_status = gensec_spnego_create_negTokenInit(gensec_security, spnego_state, nt_status 806 source4/auth/gensec/spnego.c return nt_status; nt_status 831 source4/auth/gensec/spnego.c nt_status = gensec_spnego_parse_negTokenInit(gensec_security, nt_status 838 source4/auth/gensec/spnego.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) && !NT_STATUS_IS_OK(nt_status)) { nt_status 840 source4/auth/gensec/spnego.c return nt_status; nt_status 860 source4/auth/gensec/spnego.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 869 source4/auth/gensec/spnego.c NTSTATUS nt_status; nt_status 899 source4/auth/gensec/spnego.c nt_status = gensec_update(spnego_state->sub_sec_security, nt_status 903 source4/auth/gensec/spnego.c if (NT_STATUS_IS_OK(nt_status) && spnego.negTokenTarg.mechListMIC.length > 0) { nt_status 905 source4/auth/gensec/spnego.c nt_status = gensec_check_packet(spnego_state->sub_sec_security, nt_status 912 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 914 source4/auth/gensec/spnego.c nt_errstr(nt_status))); nt_status 917 source4/auth/gensec/spnego.c if (NT_STATUS_IS_OK(nt_status) && new_spnego) { nt_status 918 source4/auth/gensec/spnego.c nt_status = gensec_sign_packet(spnego_state->sub_sec_security, nt_status 925 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 927 source4/auth/gensec/spnego.c nt_errstr(nt_status))); nt_status 931 source4/auth/gensec/spnego.c nt_status = gensec_spnego_server_negTokenTarg(gensec_security, nt_status 934 source4/auth/gensec/spnego.c nt_status, nt_status 941 source4/auth/gensec/spnego.c return nt_status; nt_status 945 source4/auth/gensec/spnego.c NTSTATUS nt_status; nt_status 981 source4/auth/gensec/spnego.c nt_status = gensec_subcontext_start(spnego_state, nt_status 984 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 986 source4/auth/gensec/spnego.c return nt_status; nt_status 989 source4/auth/gensec/spnego.c nt_status = gensec_start_mech_by_oid(spnego_state->sub_sec_security, nt_status 991 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 993 source4/auth/gensec/spnego.c return nt_status; nt_status 996 source4/auth/gensec/spnego.c nt_status = gensec_update(spnego_state->sub_sec_security, nt_status 1004 source4/auth/gensec/spnego.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 1007 source4/auth/gensec/spnego.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 1009 source4/auth/gensec/spnego.c nt_status = NT_STATUS_OK; nt_status 1011 source4/auth/gensec/spnego.c if (NT_STATUS_IS_OK(nt_status) && spnego.negTokenTarg.mechListMIC.length > 0) { nt_status 1012 source4/auth/gensec/spnego.c nt_status = gensec_check_packet(spnego_state->sub_sec_security, nt_status 1019 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1021 source4/auth/gensec/spnego.c nt_errstr(nt_status))); nt_status 1027 source4/auth/gensec/spnego.c nt_status = gensec_update(spnego_state->sub_sec_security, nt_status 1032 source4/auth/gensec/spnego.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 1036 source4/auth/gensec/spnego.c if (NT_STATUS_IS_OK(nt_status) && new_spnego) { nt_status 1037 source4/auth/gensec/spnego.c nt_status = gensec_sign_packet(spnego_state->sub_sec_security, nt_status 1044 source4/auth/gensec/spnego.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1046 source4/auth/gensec/spnego.c nt_errstr(nt_status))); nt_status 1049 source4/auth/gensec/spnego.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 1056 source4/auth/gensec/spnego.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED) nt_status 1057 source4/auth/gensec/spnego.c && !NT_STATUS_IS_OK(nt_status)) { nt_status 1060 source4/auth/gensec/spnego.c nt_errstr(nt_status))); nt_status 1061 source4/auth/gensec/spnego.c return nt_status; nt_status 1078 source4/auth/gensec/spnego.c nt_status = NT_STATUS_MORE_PROCESSING_REQUIRED; nt_status 1087 source4/auth/gensec/spnego.c nt_status = NT_STATUS_INVALID_PARAMETER; nt_status 1093 source4/auth/gensec/spnego.c return nt_status; nt_status 353 source4/auth/kerberos/kerberos_pac.c NTSTATUS nt_status; nt_status 356 source4/auth/kerberos/kerberos_pac.c nt_status = kerberos_decode_pac(mem_ctx, nt_status 366 source4/auth/kerberos/kerberos_pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 367 source4/auth/kerberos/kerberos_pac.c return nt_status; nt_status 436 source4/auth/kerberos/kerberos_pac.c NTSTATUS nt_status; nt_status 496 source4/auth/kerberos/kerberos_pac.c nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 497 source4/auth/kerberos/kerberos_pac.c DEBUG(1, ("PAC (presig) push failed: %s\n", nt_errstr(nt_status))); nt_status 521 source4/auth/kerberos/kerberos_pac.c nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 522 source4/auth/kerberos/kerberos_pac.c DEBUG(1, ("PAC (final) push failed: %s\n", nt_errstr(nt_status))); nt_status 543 source4/auth/kerberos/kerberos_pac.c NTSTATUS nt_status; nt_status 623 source4/auth/kerberos/kerberos_pac.c nt_status = auth_convert_server_info_saminfo3(LOGON_INFO, server_info, &sam3); nt_status 624 source4/auth/kerberos/kerberos_pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 625 source4/auth/kerberos/kerberos_pac.c DEBUG(1, ("Getting Samba info failed: %s\n", nt_errstr(nt_status))); nt_status 663 source4/auth/kerberos/kerberos_pac.c NTSTATUS nt_status; nt_status 693 source4/auth/kerberos/kerberos_pac.c nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 694 source4/auth/kerberos/kerberos_pac.c DEBUG(0,("can't parse the PAC LOGON_INFO: %s\n", nt_errstr(nt_status))); nt_status 701 source4/auth/kerberos/kerberos_pac.c nt_status = make_server_info_netlogon_validation(mem_ctx, nt_status 705 source4/auth/kerberos/kerberos_pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 723 source4/auth/kerberos/kerberos_pac.c nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 725 source4/auth/kerberos/kerberos_pac.c nt_errstr(nt_status))); nt_status 742 source4/auth/kerberos/kerberos_pac.c nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 744 source4/auth/kerberos/kerberos_pac.c nt_errstr(nt_status))); nt_status 56 source4/auth/ntlm/auth.c NTSTATUS nt_status; nt_status 69 source4/auth/ntlm/auth.c nt_status = method->ops->get_challenge(method, auth_ctx, &challenge); nt_status 70 source4/auth/ntlm/auth.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOT_IMPLEMENTED)) { nt_status 74 source4/auth/ntlm/auth.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 115 source4/auth/ntlm/auth.c NTSTATUS nt_status; nt_status 123 source4/auth/ntlm/auth.c nt_status = method->ops->get_server_info_principal(mem_ctx, auth_ctx, principal, server_info); nt_status 124 source4/auth/ntlm/auth.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOT_IMPLEMENTED)) { nt_status 128 source4/auth/ntlm/auth.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 257 source4/auth/ntlm/auth.c NTSTATUS nt_status; nt_status 277 source4/auth/ntlm/auth.c nt_status = map_user_info(req, lp_workgroup(auth_ctx->lp_ctx), user_info, &user_info_tmp); nt_status 278 source4/auth/ntlm/auth.c if (!NT_STATUS_IS_OK(nt_status)) goto failed; nt_status 286 source4/auth/ntlm/auth.c nt_status = auth_get_challenge(auth_ctx, &challenge); nt_status 287 source4/auth/ntlm/auth.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 289 source4/auth/ntlm/auth.c (unsigned)auth_ctx->challenge.data.length, auth_ctx->challenge.set_by, nt_errstr(nt_status))); nt_status 301 source4/auth/ntlm/auth.c nt_status = NT_STATUS_NO_SUCH_USER; /* If all the modules say 'not for me', then this is reasonable */ nt_status 313 source4/auth/ntlm/auth.c nt_status = result; nt_status 316 source4/auth/ntlm/auth.c if (!NT_STATUS_IS_OK(nt_status)) break; nt_status 322 source4/auth/ntlm/auth.c nt_status = NT_STATUS_NO_MEMORY; nt_status 329 source4/auth/ntlm/auth.c req->status = nt_status; nt_status 53 source4/auth/ntlm/auth_developer.c NTSTATUS nt_status; nt_status 61 source4/auth/ntlm/auth_developer.c nt_status = nt_status_string_to_code(user); nt_status 65 source4/auth/ntlm/auth_developer.c nt_status = NT_STATUS(error_num); nt_status 67 source4/auth/ntlm/auth_developer.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 130 source4/auth/ntlm/auth_developer.c return nt_status; nt_status 233 source4/auth/ntlm/auth_sam.c NTSTATUS nt_status; nt_status 252 source4/auth/ntlm/auth_sam.c nt_status = samdb_result_passwords(mem_ctx, auth_context->lp_ctx, msgs[0], &lm_pwd, &nt_pwd); nt_status 253 source4/auth/ntlm/auth_sam.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 255 source4/auth/ntlm/auth_sam.c nt_status = authsam_password_ok(auth_context, mem_ctx, nt_status 258 source4/auth/ntlm/auth_sam.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 260 source4/auth/ntlm/auth_sam.c nt_status = authsam_account_ok(mem_ctx, sam_ctx, nt_status 268 source4/auth/ntlm/auth_sam.c return nt_status; nt_status 279 source4/auth/ntlm/auth_sam.c NTSTATUS nt_status; nt_status 303 source4/auth/ntlm/auth_sam.c nt_status = authsam_search_account(tmp_ctx, sam_ctx, account_name, domain, &msgs, &domain_ref_msgs); nt_status 304 source4/auth/ntlm/auth_sam.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 306 source4/auth/ntlm/auth_sam.c return nt_status; nt_status 309 source4/auth/ntlm/auth_sam.c nt_status = authsam_authenticate(ctx->auth_ctx, tmp_ctx, sam_ctx, msgs, domain_ref_msgs, user_info, nt_status 311 source4/auth/ntlm/auth_sam.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 313 source4/auth/ntlm/auth_sam.c return nt_status; nt_status 316 source4/auth/ntlm/auth_sam.c nt_status = authsam_make_server_info(tmp_ctx, sam_ctx, lp_netbios_name(ctx->auth_ctx->lp_ctx), nt_status 320 source4/auth/ntlm/auth_sam.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 322 source4/auth/ntlm/auth_sam.c return nt_status; nt_status 429 source4/auth/ntlm/auth_sam.c NTSTATUS nt_status; nt_status 449 source4/auth/ntlm/auth_sam.c nt_status = sam_get_results_principal(sam_ctx, tmp_ctx, principal, nt_status 451 source4/auth/ntlm/auth_sam.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 452 source4/auth/ntlm/auth_sam.c return nt_status; nt_status 455 source4/auth/ntlm/auth_sam.c nt_status = authsam_make_server_info(tmp_ctx, sam_ctx, nt_status 460 source4/auth/ntlm/auth_sam.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 464 source4/auth/ntlm/auth_sam.c return nt_status; nt_status 116 source4/auth/ntlm/auth_server.c NTSTATUS nt_status; nt_status 153 source4/auth/ntlm/auth_server.c nt_status = smb_composite_sesssetup(session, &session_setup); nt_status 155 source4/auth/ntlm/auth_server.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 156 source4/auth/ntlm/auth_server.c return nt_status; nt_status 213 source4/auth/ntlm/auth_server.c return nt_status; nt_status 46 source4/auth/ntlm/auth_simple.c NTSTATUS nt_status; nt_status 53 source4/auth/ntlm/auth_simple.c nt_status = auth_context_create(tmp_ctx, nt_status 57 source4/auth/ntlm/auth_simple.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 59 source4/auth/ntlm/auth_simple.c return nt_status; nt_status 86 source4/auth/ntlm/auth_simple.c nt_status = auth_check_password(auth_context, tmp_ctx, user_info, &server_info); nt_status 87 source4/auth/ntlm/auth_simple.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 89 source4/auth/ntlm/auth_simple.c return nt_status; nt_status 93 source4/auth/ntlm/auth_simple.c nt_status = auth_generate_session_info(tmp_ctx, ev, lp_ctx, server_info, session_info); nt_status 95 source4/auth/ntlm/auth_simple.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 101 source4/auth/ntlm/auth_simple.c return nt_status; nt_status 250 source4/auth/ntlm/auth_unix.c NTSTATUS nt_status; nt_status 254 source4/auth/ntlm/auth_unix.c nt_status = pam_to_nt_status(pam_error); nt_status 263 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 270 source4/auth/ntlm/auth_unix.c NTSTATUS nt_status; nt_status 274 source4/auth/ntlm/auth_unix.c nt_status = pam_to_nt_status(pam_error); nt_status 283 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 438 source4/auth/ntlm/auth_unix.c NTSTATUS nt_status; nt_status 461 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_start(&pamh, user_info->mapped.account_name, user_info->remote_host ? user_info->remote_host->addr : NULL, pamconv); nt_status 462 source4/auth/ntlm/auth_unix.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 463 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 466 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_auth(pamh, lp_null_passwords(lp_ctx), user_info->mapped.account_name); nt_status 467 source4/auth/ntlm/auth_unix.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 469 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 474 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_account(pamh, user_info->mapped.account_name); nt_status 475 source4/auth/ntlm/auth_unix.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 477 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 480 source4/auth/ntlm/auth_unix.c nt_status = smb_pam_setcred(pamh, user_info->mapped.account_name); nt_status 481 source4/auth/ntlm/auth_unix.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 483 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 489 source4/auth/ntlm/auth_unix.c nt_status = talloc_getpwnam(ctx, user_info->mapped.account_name, pws); nt_status 490 source4/auth/ntlm/auth_unix.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 491 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 605 source4/auth/ntlm/auth_unix.c NTSTATUS nt_status; nt_status 613 source4/auth/ntlm/auth_unix.c nt_status = talloc_getpwnam(ctx, username, &pws); nt_status 614 source4/auth/ntlm/auth_unix.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 615 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 721 source4/auth/ntlm/auth_unix.c nt_status = password_check(username, password, crypted, salt); nt_status 722 source4/auth/ntlm/auth_unix.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 724 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 726 source4/auth/ntlm/auth_unix.c else if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD)) { nt_status 728 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 732 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 739 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 750 source4/auth/ntlm/auth_unix.c nt_status = password_check(username, pwcopy, crypted, salt); nt_status 751 source4/auth/ntlm/auth_unix.c if NT_STATUS_IS_OK(nt_status) { nt_status 753 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 766 source4/auth/ntlm/auth_unix.c if (NT_STATUS_IS_OK(nt_status = string_combinations(pwcopy, password_check, level))) { nt_status 768 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 797 source4/auth/ntlm/auth_unix.c NTSTATUS nt_status; nt_status 809 source4/auth/ntlm/auth_unix.c nt_status = check_unix_password(check_ctx, ctx->auth_ctx->lp_ctx, user_info, &pwd); nt_status 810 source4/auth/ntlm/auth_unix.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 812 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 815 source4/auth/ntlm/auth_unix.c nt_status = authunix_make_server_info(mem_ctx, lp_netbios_name(ctx->auth_ctx->lp_ctx), nt_status 817 source4/auth/ntlm/auth_unix.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 819 source4/auth/ntlm/auth_unix.c return nt_status; nt_status 110 source4/auth/ntlm/auth_util.c NTSTATUS nt_status; nt_status 118 source4/auth/ntlm/auth_util.c nt_status = encrypt_user_info(mem_ctx, auth_context, nt_status 121 source4/auth/ntlm/auth_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 122 source4/auth/ntlm/auth_util.c return nt_status; nt_status 141 source4/auth/ntlm/auth_util.c nt_status = auth_get_challenge(auth_context, &challenge); nt_status 142 source4/auth/ntlm/auth_util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 143 source4/auth/ntlm/auth_util.c return nt_status; nt_status 250 source4/auth/ntlm/auth_util.c _PUBLIC_ NTSTATUS auth_nt_status_squash(NTSTATUS nt_status) nt_status 252 source4/auth/ntlm/auth_util.c if NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_SUCH_USER) { nt_status 255 source4/auth/ntlm/auth_util.c } else if NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD) { nt_status 260 source4/auth/ntlm/auth_util.c return nt_status; nt_status 81 source4/auth/ntlm/auth_winbind.c NTSTATUS nt_status; nt_status 86 source4/auth/ntlm/auth_winbind.c nt_status = encrypt_user_info(mem_ctx, ctx->auth_ctx, nt_status 89 source4/auth/ntlm/auth_winbind.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 90 source4/auth/ntlm/auth_winbind.c return nt_status; nt_status 121 source4/auth/ntlm/auth_winbind.c nt_status = NT_STATUS(response.data.auth.nt_status); nt_status 122 source4/auth/ntlm/auth_winbind.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 127 source4/auth/ntlm/auth_winbind.c nt_status = get_info3_from_ndr(mem_ctx, lp_iconv_convenience(ctx->auth_ctx->lp_ctx), &response, &info3); nt_status 129 source4/auth/ntlm/auth_winbind.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 132 source4/auth/ntlm/auth_winbind.c nt_status = make_server_info_netlogon_validation(mem_ctx, nt_status 136 source4/auth/ntlm/auth_winbind.c return nt_status; nt_status 142 source4/auth/ntlm/auth_winbind.c } else if (NT_STATUS_IS_OK(nt_status)) { nt_status 149 source4/auth/ntlm/auth_winbind.c return nt_status; nt_status 93 source4/auth/ntlm/pam_errors.c int nt_status_to_pam(NTSTATUS nt_status) nt_status 96 source4/auth/ntlm/pam_errors.c if NT_STATUS_IS_OK(nt_status) return PAM_SUCCESS; nt_status 99 source4/auth/ntlm/pam_errors.c if (NT_STATUS_EQUAL(nt_status,nt_status_to_pam_map[i].ntstatus)) nt_status 119 source4/auth/ntlm/pam_errors.c int nt_status_to_pam(NTSTATUS nt_status) nt_status 121 source4/auth/ntlm/pam_errors.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_OK)) return 0; nt_status 31 source4/auth/ntlm/pam_errors.h int nt_status_to_pam(NTSTATUS nt_status); nt_status 115 source4/auth/ntlmssp/ntlmssp_client.c NTSTATUS nt_status; nt_status 199 source4/auth/ntlmssp/ntlmssp_client.c nt_status = cli_credentials_get_ntlm_response(gensec_security->credentials, mem_ctx, nt_status 204 source4/auth/ntlmssp/ntlmssp_client.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 205 source4/auth/ntlmssp/ntlmssp_client.c return nt_status; nt_status 286 source4/auth/ntlmssp/ntlmssp_client.c nt_status = ntlmssp_sign_init(gensec_ntlmssp_state); nt_status 287 source4/auth/ntlmssp/ntlmssp_client.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 289 source4/auth/ntlmssp/ntlmssp_client.c nt_errstr(nt_status))); nt_status 291 source4/auth/ntlmssp/ntlmssp_client.c return nt_status; nt_status 302 source4/auth/ntlmssp/ntlmssp_client.c NTSTATUS nt_status; nt_status 304 source4/auth/ntlmssp/ntlmssp_client.c nt_status = gensec_ntlmssp_start(gensec_security); nt_status 305 source4/auth/ntlmssp/ntlmssp_client.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 255 source4/auth/ntlmssp/ntlmssp_server.c NTSTATUS nt_status; nt_status 329 source4/auth/ntlmssp/ntlmssp_server.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(gensec_ntlmssp_state, domain))) { nt_status 332 source4/auth/ntlmssp/ntlmssp_server.c return nt_status; nt_status 335 source4/auth/ntlmssp/ntlmssp_server.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(gensec_ntlmssp_state, user))) { nt_status 338 source4/auth/ntlmssp/ntlmssp_server.c return nt_status; nt_status 341 source4/auth/ntlmssp/ntlmssp_server.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_workstation(gensec_ntlmssp_state, workstation))) { nt_status 344 source4/auth/ntlmssp/ntlmssp_server.c return nt_status; nt_status 382 source4/auth/ntlmssp/ntlmssp_server.c if (!NT_STATUS_IS_OK(nt_status = nt_status 387 source4/auth/ntlmssp/ntlmssp_server.c return nt_status; nt_status 410 source4/auth/ntlmssp/ntlmssp_server.c NTSTATUS nt_status; nt_status 521 source4/auth/ntlmssp/ntlmssp_server.c nt_status = ntlmssp_sign_init(gensec_ntlmssp_state); nt_status 523 source4/auth/ntlmssp/ntlmssp_server.c nt_status = NT_STATUS_OK; nt_status 538 source4/auth/ntlmssp/ntlmssp_server.c return nt_status; nt_status 559 source4/auth/ntlmssp/ntlmssp_server.c NTSTATUS nt_status; nt_status 569 source4/auth/ntlmssp/ntlmssp_server.c if (!NT_STATUS_IS_OK(nt_status = ntlmssp_server_preauth(gensec_ntlmssp_state, in))) { nt_status 571 source4/auth/ntlmssp/ntlmssp_server.c return nt_status; nt_status 583 source4/auth/ntlmssp/ntlmssp_server.c if (!NT_STATUS_IS_OK(nt_status = gensec_ntlmssp_state->check_password(gensec_ntlmssp_state, mem_ctx, nt_status 586 source4/auth/ntlmssp/ntlmssp_server.c return nt_status; nt_status 591 source4/auth/ntlmssp/ntlmssp_server.c nt_status = ntlmssp_server_postauth(gensec_security, &user_session_key, &lm_session_key); nt_status 593 source4/auth/ntlmssp/ntlmssp_server.c return nt_status; nt_status 637 source4/auth/ntlmssp/ntlmssp_server.c NTSTATUS nt_status; nt_status 647 source4/auth/ntlmssp/ntlmssp_server.c nt_status = gensec_ntlmssp_state->auth_context->set_challenge(auth_context, nt_status 651 source4/auth/ntlmssp/ntlmssp_server.c return nt_status; nt_status 664 source4/auth/ntlmssp/ntlmssp_server.c NTSTATUS nt_status; nt_status 684 source4/auth/ntlmssp/ntlmssp_server.c nt_status = gensec_ntlmssp_state->auth_context->check_password(gensec_ntlmssp_state->auth_context, nt_status 689 source4/auth/ntlmssp/ntlmssp_server.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 711 source4/auth/ntlmssp/ntlmssp_server.c return nt_status; nt_status 727 source4/auth/ntlmssp/ntlmssp_server.c NTSTATUS nt_status; nt_status 730 source4/auth/ntlmssp/ntlmssp_server.c nt_status = auth_generate_session_info(gensec_ntlmssp_state, gensec_security->event_ctx, gensec_security->settings->lp_ctx, gensec_ntlmssp_state->server_info, session_info); nt_status 731 source4/auth/ntlmssp/ntlmssp_server.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 746 source4/auth/ntlmssp/ntlmssp_server.c NTSTATUS nt_status; nt_status 749 source4/auth/ntlmssp/ntlmssp_server.c nt_status = gensec_ntlmssp_start(gensec_security); nt_status 750 source4/auth/ntlmssp/ntlmssp_server.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 163 source4/auth/ntlmssp/ntlmssp_sign.c NTSTATUS nt_status; nt_status 170 source4/auth/ntlmssp/ntlmssp_sign.c nt_status = ntlmssp_make_packet_signature(gensec_ntlmssp_state, sig_mem_ctx, nt_status 175 source4/auth/ntlmssp/ntlmssp_sign.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 176 source4/auth/ntlmssp/ntlmssp_sign.c DEBUG(0, ("NTLMSSP packet check failed with %s\n", nt_errstr(nt_status))); nt_status 177 source4/auth/ntlmssp/ntlmssp_sign.c return nt_status; nt_status 225 source4/auth/ntlmssp/ntlmssp_sign.c NTSTATUS nt_status; nt_status 237 source4/auth/ntlmssp/ntlmssp_sign.c nt_status = ntlmssp_make_packet_signature(gensec_ntlmssp_state, sig_mem_ctx, nt_status 263 source4/auth/ntlmssp/ntlmssp_sign.c nt_status = NT_STATUS_OK; nt_status 269 source4/auth/ntlmssp/ntlmssp_sign.c return nt_status; nt_status 457 source4/auth/ntlmssp/ntlmssp_sign.c NTSTATUS nt_status; nt_status 467 source4/auth/ntlmssp/ntlmssp_sign.c nt_status = gensec_ntlmssp_seal_packet(gensec_security, sig_mem_ctx, nt_status 474 source4/auth/ntlmssp/ntlmssp_sign.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 477 source4/auth/ntlmssp/ntlmssp_sign.c return nt_status; nt_status 487 source4/auth/ntlmssp/ntlmssp_sign.c nt_status = gensec_ntlmssp_sign_packet(gensec_security, sig_mem_ctx, nt_status 494 source4/auth/ntlmssp/ntlmssp_sign.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 497 source4/auth/ntlmssp/ntlmssp_sign.c return nt_status; nt_status 395 source4/auth/sam.c NTSTATUS nt_status; nt_status 404 source4/auth/sam.c nt_status = crack_user_principal_name(sam_ctx, tmp_ctx, principal, &user_dn, &domain_dn); nt_status 405 source4/auth/sam.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 407 source4/auth/sam.c return nt_status; nt_status 38 source4/auth/samba_server_gensec.c NTSTATUS nt_status; nt_status 42 source4/auth/samba_server_gensec.c nt_status = auth_context_create(mem_ctx, nt_status 48 source4/auth/samba_server_gensec.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 49 source4/auth/samba_server_gensec.c DEBUG(1, ("Failed to start auth server code: %s\n", nt_errstr(nt_status))); nt_status 50 source4/auth/samba_server_gensec.c return nt_status; nt_status 53 source4/auth/samba_server_gensec.c nt_status = gensec_server_start(mem_ctx, nt_status 58 source4/auth/samba_server_gensec.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 60 source4/auth/samba_server_gensec.c DEBUG(1, ("Failed to start GENSEC server code: %s\n", nt_errstr(nt_status))); nt_status 61 source4/auth/samba_server_gensec.c return nt_status; nt_status 72 source4/auth/samba_server_gensec.c return nt_status; nt_status 37 source4/auth/session.c NTSTATUS nt_status; nt_status 39 source4/auth/session.c nt_status = auth_anonymous_session_info(mem_ctx, event_ctx, lp_ctx, &session_info); nt_status 40 source4/auth/session.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 51 source4/auth/session.c NTSTATUS nt_status; nt_status 56 source4/auth/session.c nt_status = auth_anonymous_server_info(mem_ctx, nt_status 59 source4/auth/session.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 61 source4/auth/session.c return nt_status; nt_status 65 source4/auth/session.c nt_status = auth_generate_session_info(parent_ctx, event_ctx, lp_ctx, server_info, &session_info); nt_status 68 source4/auth/session.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 162 source4/auth/session.c NTSTATUS nt_status; nt_status 173 source4/auth/session.c nt_status = security_token_create(session_info, nt_status 182 source4/auth/session.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 122 source4/auth/system_session.c NTSTATUS nt_status; nt_status 133 source4/auth/system_session.c nt_status = create_token(session_info, nt_status 140 source4/auth/system_session.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 156 source4/auth/system_session.c NTSTATUS nt_status; nt_status 158 source4/auth/system_session.c nt_status = auth_system_session_info(mem_ctx, nt_status 161 source4/auth/system_session.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 172 source4/auth/system_session.c NTSTATUS nt_status; nt_status 177 source4/auth/system_session.c nt_status = auth_system_server_info(mem_ctx, lp_netbios_name(lp_ctx), nt_status 179 source4/auth/system_session.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 181 source4/auth/system_session.c return nt_status; nt_status 185 source4/auth/system_session.c nt_status = generate_session_info(parent_ctx, server_info, &session_info); nt_status 188 source4/auth/system_session.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 212 source4/auth/system_session.c NTSTATUS nt_status; nt_status 214 source4/auth/system_session.c nt_status = _auth_system_session_info(mem_ctx, lp_ctx, false, &session_info); nt_status 215 source4/auth/system_session.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1826 source4/dsdb/common/util.c NTSTATUS nt_status; nt_status 1859 source4/dsdb/common/util.c nt_status = samdb_set_password(ctx, mem_ctx, nt_status 1865 source4/dsdb/common/util.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1867 source4/dsdb/common/util.c return nt_status; nt_status 119 source4/dsdb/repl/drepl_partitions.c NTSTATUS nt_status; nt_status 130 source4/dsdb/repl/drepl_partitions.c nt_status = dcerpc_parse_binding(conn, binding_str, &conn->binding); nt_status 132 source4/dsdb/repl/drepl_partitions.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 133 source4/dsdb/repl/drepl_partitions.c return ntstatus_to_werror(nt_status); nt_status 162 source4/dsdb/repl/drepl_partitions.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 163 source4/dsdb/repl/drepl_partitions.c return ntstatus_to_werror(nt_status); nt_status 228 source4/dsdb/repl/drepl_partitions.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 229 source4/dsdb/repl/drepl_partitions.c return ntstatus_to_werror(nt_status); nt_status 198 source4/dsdb/repl/replicated_objects.c NTSTATUS nt_status; nt_status 331 source4/dsdb/repl/replicated_objects.c nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 332 source4/dsdb/repl/replicated_objects.c return ntstatus_to_werror(nt_status); nt_status 502 source4/dsdb/samdb/cracknames.c NTSTATUS nt_status; nt_status 505 source4/dsdb/samdb/cracknames.c nt_status = GUID_from_string(name, &guid); nt_status 506 source4/dsdb/samdb/cracknames.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 651 source4/dsdb/samdb/ldb_modules/repl_meta_data.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 652 source4/dsdb/samdb/ldb_modules/repl_meta_data.c return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status)); nt_status 777 source4/dsdb/samdb/ldb_modules/repl_meta_data.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 778 source4/dsdb/samdb/ldb_modules/repl_meta_data.c return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status)); nt_status 862 source4/dsdb/samdb/ldb_modules/repl_meta_data.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 863 source4/dsdb/samdb/ldb_modules/repl_meta_data.c return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status)); nt_status 1085 source4/dsdb/samdb/ldb_modules/repl_meta_data.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 1086 source4/dsdb/samdb/ldb_modules/repl_meta_data.c return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status)); nt_status 1212 source4/dsdb/samdb/ldb_modules/repl_meta_data.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 1213 source4/dsdb/samdb/ldb_modules/repl_meta_data.c return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status)); nt_status 1249 source4/dsdb/samdb/ldb_modules/repl_meta_data.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 1250 source4/dsdb/samdb/ldb_modules/repl_meta_data.c return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status)); nt_status 1301 source4/dsdb/samdb/ldb_modules/repl_meta_data.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 1302 source4/dsdb/samdb/ldb_modules/repl_meta_data.c return replmd_replicated_request_werror(ar, ntstatus_to_werror(nt_status)); nt_status 105 source4/dsdb/schema/schema_init.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 107 source4/dsdb/schema/schema_init.c return ntstatus_to_werror(nt_status); nt_status 198 source4/dsdb/schema/schema_init.c NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 199 source4/dsdb/schema/schema_init.c return ntstatus_to_werror(nt_status); nt_status 1061 source4/kdc/hdb-samba4.c NTSTATUS nt_status; nt_status 1073 source4/kdc/hdb-samba4.c nt_status = sam_get_results_principal((struct ldb_context *)db->hdb_db, nt_status 1077 source4/kdc/hdb-samba4.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_SUCH_USER)) { nt_status 1079 source4/kdc/hdb-samba4.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_MEMORY)) { nt_status 1081 source4/kdc/hdb-samba4.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1222 source4/kdc/hdb-samba4.c NTSTATUS nt_status; nt_status 1236 source4/kdc/hdb-samba4.c nt_status = crack_service_principal_name((struct ldb_context *)db->hdb_db, nt_status 1241 source4/kdc/hdb-samba4.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1492 source4/kdc/hdb-samba4.c NTSTATUS nt_status; nt_status 1503 source4/kdc/hdb-samba4.c nt_status = auth_system_session_info(*db, lp_ctx, &session_info); nt_status 1504 source4/kdc/hdb-samba4.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1505 source4/kdc/hdb-samba4.c return nt_status; nt_status 1549 source4/kdc/hdb-samba4.c NTSTATUS nt_status; nt_status 1551 source4/kdc/hdb-samba4.c nt_status = kdc_hdb_samba4_create(kdc_mem_ctx, kdc_ev_ctx, kdc_lp_ctx, nt_status 1554 source4/kdc/hdb-samba4.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 442 source4/kdc/kpasswdd.c NTSTATUS nt_status; nt_status 492 source4/kdc/kpasswdd.c nt_status = cli_credentials_set_stored_principal(server_credentials, kdc->task->event_ctx, kdc->task->lp_ctx, "kadmin/changepw"); nt_status 493 source4/kdc/kpasswdd.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 498 source4/kdc/kpasswdd.c nt_errstr(nt_status)), nt_status 512 source4/kdc/kpasswdd.c nt_status = samba_server_gensec_start(tmp_ctx, kdc->task->event_ctx, nt_status 518 source4/kdc/kpasswdd.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 525 source4/kdc/kpasswdd.c nt_status = gensec_set_peer_addr(gensec_security, peer_addr); nt_status 526 source4/kdc/kpasswdd.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 530 source4/kdc/kpasswdd.c nt_status = gensec_set_my_addr(gensec_security, my_addr); nt_status 531 source4/kdc/kpasswdd.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 539 source4/kdc/kpasswdd.c nt_status = gensec_start_mech_by_name(gensec_security, "krb5"); nt_status 540 source4/kdc/kpasswdd.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 546 source4/kdc/kpasswdd.c nt_status = gensec_update(gensec_security, tmp_ctx, ap_req, &ap_rep); nt_status 547 source4/kdc/kpasswdd.c if (!NT_STATUS_IS_OK(nt_status) && !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 553 source4/kdc/kpasswdd.c nt_errstr(nt_status)), nt_status 564 source4/kdc/kpasswdd.c nt_status = gensec_unwrap(gensec_security, tmp_ctx, &krb_priv_req, &kpasswd_req); nt_status 565 source4/kdc/kpasswdd.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 570 source4/kdc/kpasswdd.c nt_errstr(nt_status)), nt_status 592 source4/kdc/kpasswdd.c nt_status = gensec_wrap(gensec_security, tmp_ctx, nt_status 594 source4/kdc/kpasswdd.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 599 source4/kdc/kpasswdd.c nt_errstr(nt_status)), nt_status 56 source4/kdc/pac-glue.c NTSTATUS nt_status; nt_status 63 source4/kdc/pac-glue.c nt_status = auth_convert_server_info_saminfo3(mem_ctx, server_info, &info3); nt_status 64 source4/kdc/pac-glue.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 65 source4/kdc/pac-glue.c DEBUG(1, ("Getting Samba info failed: %s\n", nt_errstr(nt_status))); nt_status 80 source4/kdc/pac-glue.c nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 81 source4/kdc/pac-glue.c DEBUG(1, ("PAC (presig) push failed: %s\n", nt_errstr(nt_status))); nt_status 112 source4/kdc/pac-glue.c NTSTATUS nt_status; nt_status 129 source4/kdc/pac-glue.c nt_status = authsam_make_server_info(mem_ctx, p->samdb, nt_status 136 source4/kdc/pac-glue.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 138 source4/kdc/pac-glue.c nt_errstr(nt_status))); nt_status 195 source4/kdc/pac-glue.c NTSTATUS nt_status) nt_status 214 source4/kdc/pac-glue.c SIVAL(pa.padata_value.data, 0, NT_STATUS_V(nt_status)); nt_status 237 source4/kdc/pac-glue.c NTSTATUS nt_status; nt_status 274 source4/kdc/pac-glue.c nt_status = authsam_account_ok(tmp_ctx, nt_status 283 source4/kdc/pac-glue.c if (NT_STATUS_IS_OK(nt_status)) nt_status 286 source4/kdc/pac-glue.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_MUST_CHANGE)) nt_status 288 source4/kdc/pac-glue.c else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_EXPIRED)) nt_status 290 source4/kdc/pac-glue.c else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_EXPIRED)) nt_status 292 source4/kdc/pac-glue.c else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_DISABLED)) nt_status 294 source4/kdc/pac-glue.c else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_LOGON_HOURS)) nt_status 296 source4/kdc/pac-glue.c else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_LOCKED_OUT)) nt_status 298 source4/kdc/pac-glue.c else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_WORKSTATION)) nt_status 303 source4/kdc/pac-glue.c samba_kdc_build_edata_reply(tmp_ctx, e_data, nt_status); nt_status 470 source4/lib/tls/tls.c NTSTATUS nt_status; nt_status 472 source4/lib/tls/tls.c nt_status = socket_create_with_ops(socket_ctx, &tls_socket_ops, &new_sock, nt_status 475 source4/lib/tls/tls.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 552 source4/lib/tls/tls.c NTSTATUS nt_status; nt_status 554 source4/lib/tls/tls.c nt_status = socket_create_with_ops(socket_ctx, &tls_socket_ops, &new_sock, nt_status 557 source4/lib/tls/tls.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 33 source4/libcli/raw/clierror.c return nt_errstr(tree->session->transport->error.e.nt_status); nt_status 53 source4/libcli/raw/clierror.c return tree->session->transport->error.e.nt_status; nt_status 456 source4/libcli/raw/clitransport.c transport->error.e.nt_status = NT_STATUS_OK; nt_status 458 source4/libcli/raw/clitransport.c transport->error.e.nt_status = NT_STATUS_DOS(eclass, code); nt_status 461 source4/libcli/raw/clitransport.c transport->error.e.nt_status = NT_STATUS(IVAL(req->in.hdr, HDR_RCLS)); nt_status 464 source4/libcli/raw/clitransport.c req->status = transport->error.e.nt_status; nt_status 139 source4/libcli/raw/libcliraw.h NTSTATUS nt_status; nt_status 88 source4/libcli/smb_composite/sesssetup.c NTSTATUS session_key_err, nt_status; nt_status 118 source4/libcli/smb_composite/sesssetup.c nt_status = session_setup_old(c, session, nt_status 121 source4/libcli/smb_composite/sesssetup.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 123 source4/libcli/smb_composite/sesssetup.c c->status = nt_status; nt_status 137 source4/libcli/smb_composite/sesssetup.c nt_status = session_setup_nt1(c, session, nt_status 140 source4/libcli/smb_composite/sesssetup.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 142 source4/libcli/smb_composite/sesssetup.c c->status = nt_status; nt_status 156 source4/libcli/smb_composite/sesssetup.c nt_status = session_setup_spnego(c, session, nt_status 159 source4/libcli/smb_composite/sesssetup.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 161 source4/libcli/smb_composite/sesssetup.c c->status = nt_status; nt_status 261 source4/libcli/smb_composite/sesssetup.c NTSTATUS nt_status = NT_STATUS_INTERNAL_ERROR; nt_status 292 source4/libcli/smb_composite/sesssetup.c nt_status = cli_credentials_get_ntlm_response(io->in.credentials, state, nt_status 299 source4/libcli/smb_composite/sesssetup.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 314 source4/libcli/smb_composite/sesssetup.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 334 source4/libcli/smb_composite/sesssetup.c NTSTATUS nt_status; nt_status 360 source4/libcli/smb_composite/sesssetup.c nt_status = cli_credentials_get_ntlm_response(io->in.credentials, state, nt_status 367 source4/libcli/smb_composite/sesssetup.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 2460 source4/libnet/libnet_become_dc.c NTSTATUS nt_status; nt_status 2538 source4/libnet/libnet_become_dc.c nt_status = partition->store_chunk(s->callbacks.private_data, &s->_sc); nt_status 2539 source4/libnet/libnet_become_dc.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2540 source4/libnet/libnet_become_dc.c return ntstatus_to_werror(nt_status); nt_status 112 source4/libnet/libnet_samdump.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 121 source4/libnet/libnet_samdump.c nt_status = vampire_samdump_handle_user(mem_ctx, nt_status 128 source4/libnet/libnet_samdump.c nt_status = vampire_samdump_handle_secret(mem_ctx, nt_status 135 source4/libnet/libnet_samdump.c nt_status = vampire_samdump_handle_trusted_domain(mem_ctx, nt_status 144 source4/libnet/libnet_samdump.c return nt_status; nt_status 150 source4/libnet/libnet_samdump.c NTSTATUS nt_status; nt_status 171 source4/libnet/libnet_samdump.c nt_status = libnet_SamSync_netlogon(ctx, samdump_state, &r2); nt_status 175 source4/libnet/libnet_samdump.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 177 source4/libnet/libnet_samdump.c return nt_status; nt_status 203 source4/libnet/libnet_samdump.c return nt_status; nt_status 83 source4/libnet/libnet_samdump_keytab.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 91 source4/libnet/libnet_samdump_keytab.c nt_status = samdump_keytab_handle_user(mem_ctx, nt_status 103 source4/libnet/libnet_samdump_keytab.c return nt_status; nt_status 108 source4/libnet/libnet_samdump_keytab.c NTSTATUS nt_status; nt_status 123 source4/libnet/libnet_samdump_keytab.c nt_status = libnet_SamSync_netlogon(ctx, mem_ctx, &r2); nt_status 127 source4/libnet/libnet_samdump_keytab.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 128 source4/libnet/libnet_samdump_keytab.c return nt_status; nt_status 131 source4/libnet/libnet_samdump_keytab.c return nt_status; nt_status 138 source4/libnet/libnet_samsync.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 143 source4/libnet/libnet_samsync.c nt_status = fix_user(mem_ctx, nt_status 153 source4/libnet/libnet_samsync.c nt_status = fix_secret(mem_ctx, nt_status 163 source4/libnet/libnet_samsync.c return nt_status; nt_status 168 source4/libnet/libnet_samsync.c NTSTATUS nt_status, dbsync_nt_status; nt_status 191 source4/libnet/libnet_samsync.c nt_status = cli_credentials_set_machine_account(machine_account, ctx->lp_ctx); nt_status 192 source4/libnet/libnet_samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 195 source4/libnet/libnet_samsync.c return nt_status; nt_status 244 source4/libnet/libnet_samsync.c nt_status = libnet_RpcConnect(machine_net_ctx, samsync_ctx, c); nt_status 245 source4/libnet/libnet_samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 256 source4/libnet/libnet_samsync.c return nt_status; nt_status 263 source4/libnet/libnet_samsync.c nt_status = dcerpc_secondary_connection(c->out.dcerpc_pipe, &p, nt_status 266 source4/libnet/libnet_samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 269 source4/libnet/libnet_samsync.c dcerpc_server_name(p), nt_errstr(nt_status)); nt_status 271 source4/libnet/libnet_samsync.c return nt_status; nt_status 274 source4/libnet/libnet_samsync.c nt_status = dcerpc_bind_auth_schannel(samsync_ctx, p, &ndr_table_netlogon, nt_status 277 source4/libnet/libnet_samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 280 source4/libnet/libnet_samsync.c dcerpc_server_name(p), nt_errstr(nt_status)); nt_status 282 source4/libnet/libnet_samsync.c return nt_status; nt_status 289 source4/libnet/libnet_samsync.c return nt_status; nt_status 304 source4/libnet/libnet_samsync.c nt_status = r->in.init_fn(samsync_ctx, nt_status 308 source4/libnet/libnet_samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 311 source4/libnet/libnet_samsync.c return nt_status; nt_status 317 source4/libnet/libnet_samsync.c nt_status = dcerpc_schannel_creds(p->conn->security_state.generic_state, samsync_ctx, &creds); nt_status 318 source4/libnet/libnet_samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 321 source4/libnet/libnet_samsync.c return nt_status; nt_status 353 source4/libnet/libnet_samsync.c r->out.error_string = talloc_asprintf(mem_ctx, "DatabaseSync failed - %s", nt_errstr(nt_status)); nt_status 355 source4/libnet/libnet_samsync.c return nt_status; nt_status 372 source4/libnet/libnet_samsync.c nt_status = fix_delta(delta_ctx, nt_status 378 source4/libnet/libnet_samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 381 source4/libnet/libnet_samsync.c return nt_status; nt_status 387 source4/libnet/libnet_samsync.c nt_status = r->in.delta_fn(delta_ctx, nt_status 392 source4/libnet/libnet_samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 395 source4/libnet/libnet_samsync.c return nt_status; nt_status 403 source4/libnet/libnet_samsync.c r->out.error_string = talloc_asprintf(mem_ctx, "libnet_SamSync_netlogon failed: unexpected inconsistancy. Should not get error %s here", nt_errstr(nt_status)); nt_status 407 source4/libnet/libnet_samsync.c nt_status = NT_STATUS_OK; nt_status 410 source4/libnet/libnet_samsync.c return nt_status; nt_status 913 source4/libnet/libnet_samsync_ldb.c NTSTATUS nt_status; nt_status 914 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_add_foreignSecurityPrincipal(mem_ctx, state, nt_status 918 source4/libnet/libnet_samsync_ldb.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 919 source4/libnet/libnet_samsync_ldb.c return nt_status; nt_status 971 source4/libnet/libnet_samsync_ldb.c NTSTATUS nt_status; nt_status 972 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_add_foreignSecurityPrincipal(mem_ctx, state, nt_status 977 source4/libnet/libnet_samsync_ldb.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 978 source4/libnet/libnet_samsync_ldb.c return nt_status; nt_status 1060 source4/libnet/libnet_samsync_ldb.c NTSTATUS nt_status = NT_STATUS_OK; nt_status 1067 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_handle_domain(mem_ctx, nt_status 1076 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_handle_user(mem_ctx, nt_status 1085 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_delete_user(mem_ctx, nt_status 1094 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_handle_group(mem_ctx, nt_status 1103 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_delete_group(mem_ctx, nt_status 1112 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_handle_group_member(mem_ctx, nt_status 1121 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_handle_alias(mem_ctx, nt_status 1130 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_delete_alias(mem_ctx, nt_status 1139 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_handle_alias_member(mem_ctx, nt_status 1148 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_handle_account(mem_ctx, nt_status 1157 source4/libnet/libnet_samsync_ldb.c nt_status = samsync_ldb_delete_account(mem_ctx, nt_status 1168 source4/libnet/libnet_samsync_ldb.c if (!NT_STATUS_IS_OK(nt_status) && !*error_string) { nt_status 1169 source4/libnet/libnet_samsync_ldb.c *error_string = talloc_asprintf(mem_ctx, "Failed to handle samsync delta: %s", nt_errstr(nt_status)); nt_status 1171 source4/libnet/libnet_samsync_ldb.c return nt_status; nt_status 1218 source4/libnet/libnet_samsync_ldb.c NTSTATUS nt_status; nt_status 1241 source4/libnet/libnet_samsync_ldb.c nt_status = libnet_SamSync_netlogon(ctx, state, &r2); nt_status 1245 source4/libnet/libnet_samsync_ldb.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1247 source4/libnet/libnet_samsync_ldb.c return nt_status; nt_status 1250 source4/libnet/libnet_samsync_ldb.c return nt_status; nt_status 679 source4/rpc_server/lsa/dcesrv_lsa.c NTSTATUS nt_status; nt_status 687 source4/rpc_server/lsa/dcesrv_lsa.c nt_status = dcesrv_fetch_session_key(dce_call->conn, &session_key); nt_status 688 source4/rpc_server/lsa/dcesrv_lsa.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 689 source4/rpc_server/lsa/dcesrv_lsa.c return nt_status; nt_status 1612 source4/rpc_server/lsa/dcesrv_lsa.c NTSTATUS nt_status; nt_status 1639 source4/rpc_server/lsa/dcesrv_lsa.c nt_status = fill_trust_domain_ex(mem_ctx, domains[i], &entries[i]); nt_status 1640 source4/rpc_server/lsa/dcesrv_lsa.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1641 source4/rpc_server/lsa/dcesrv_lsa.c return nt_status; nt_status 2577 source4/rpc_server/lsa/dcesrv_lsa.c NTSTATUS nt_status; nt_status 2602 source4/rpc_server/lsa/dcesrv_lsa.c nt_status = dcesrv_fetch_session_key(dce_call->conn, &session_key); nt_status 2603 source4/rpc_server/lsa/dcesrv_lsa.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 2604 source4/rpc_server/lsa/dcesrv_lsa.c return nt_status; nt_status 88 source4/rpc_server/netlogon/dcerpc_netlogon.c NTSTATUS nt_status; nt_status 265 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = schannel_store_session_key(mem_ctx, dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx, creds); nt_status 267 source4/rpc_server/netlogon/dcerpc_netlogon.c return nt_status; nt_status 335 source4/rpc_server/netlogon/dcerpc_netlogon.c NTSTATUS nt_status; nt_status 354 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = schannel_fetch_session_key_ldb(ldb, ldb, computer_name, nt_status 357 source4/rpc_server/netlogon/dcerpc_netlogon.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 358 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = creds_server_step_check(creds, nt_status 362 source4/rpc_server/netlogon/dcerpc_netlogon.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 363 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = schannel_store_session_key_ldb(ldb, ldb, creds); nt_status 366 source4/rpc_server/netlogon/dcerpc_netlogon.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 376 source4/rpc_server/netlogon/dcerpc_netlogon.c return nt_status; nt_status 389 source4/rpc_server/netlogon/dcerpc_netlogon.c NTSTATUS nt_status; nt_status 391 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = dcesrv_netr_creds_server_step_check(dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx, nt_status 395 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 405 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = samdb_set_password_sid(sam_ctx, mem_ctx, nt_status 411 source4/rpc_server/netlogon/dcerpc_netlogon.c return nt_status; nt_status 423 source4/rpc_server/netlogon/dcerpc_netlogon.c NTSTATUS nt_status; nt_status 428 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = dcesrv_netr_creds_server_step_check(dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx, nt_status 432 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 449 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = samdb_set_password_sid(sam_ctx, mem_ctx, nt_status 455 source4/rpc_server/netlogon/dcerpc_netlogon.c return nt_status; nt_status 492 source4/rpc_server/netlogon/dcerpc_netlogon.c NTSTATUS nt_status; nt_status 524 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = auth_context_create(mem_ctx, nt_status 528 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 551 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = auth_context_create(mem_ctx, nt_status 555 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 557 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = auth_context_set_challenge(auth_context, r->in.logon->network->challenge, "netr_LogonSamLogonWithFlags"); nt_status 558 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 622 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = auth_check_password(auth_context, mem_ctx, user_info, &server_info); nt_status 623 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 625 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = auth_convert_server_info_sambaseinfo(mem_ctx, server_info, &sam); nt_status 626 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 695 source4/rpc_server/netlogon/dcerpc_netlogon.c NTSTATUS nt_status; nt_status 697 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = schannel_fetch_session_key(mem_ctx, dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx, r->in.computer_name, lp_workgroup(dce_call->conn->dce_ctx->lp_ctx), &creds); nt_status 698 source4/rpc_server/netlogon/dcerpc_netlogon.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 699 source4/rpc_server/netlogon/dcerpc_netlogon.c return nt_status; nt_status 716 source4/rpc_server/netlogon/dcerpc_netlogon.c NTSTATUS nt_status; nt_status 725 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = dcesrv_netr_creds_server_step_check(dce_call->event_ctx, dce_call->conn->dce_ctx->lp_ctx, nt_status 729 source4/rpc_server/netlogon/dcerpc_netlogon.c NT_STATUS_NOT_OK_RETURN(nt_status); nt_status 743 source4/rpc_server/netlogon/dcerpc_netlogon.c nt_status = dcesrv_netr_LogonSamLogon_base(dce_call, mem_ctx, &r2, creds); nt_status 747 source4/rpc_server/netlogon/dcerpc_netlogon.c return nt_status; nt_status 551 source4/rpc_server/samr/samr_password.c NTSTATUS nt_status; nt_status 555 source4/rpc_server/samr/samr_password.c nt_status = dcesrv_fetch_session_key(dce_call->conn, &session_key); nt_status 556 source4/rpc_server/samr/samr_password.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 557 source4/rpc_server/samr/samr_password.c return nt_status; nt_status 590 source4/rpc_server/samr/samr_password.c NTSTATUS nt_status; nt_status 596 source4/rpc_server/samr/samr_password.c nt_status = dcesrv_fetch_session_key(dce_call->conn, &session_key); nt_status 597 source4/rpc_server/samr/samr_password.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 598 source4/rpc_server/samr/samr_password.c return nt_status; nt_status 2085 source4/rpc_server/srvsvc/dcesrv_srvsvc.c NTSTATUS nt_status; nt_status 2087 source4/rpc_server/srvsvc/dcesrv_srvsvc.c nt_status = srvsvc_create_ntvfs_context(dce_call, mem_ctx, r->in.share, &ntvfs_ctx); nt_status 2088 source4/rpc_server/srvsvc/dcesrv_srvsvc.c if (!NT_STATUS_IS_OK(nt_status)) return ntstatus_to_werror(nt_status); nt_status 2107 source4/rpc_server/srvsvc/dcesrv_srvsvc.c nt_status = ntvfs_qpathinfo(ntvfs_req, io); nt_status 2108 source4/rpc_server/srvsvc/dcesrv_srvsvc.c if (!NT_STATUS_IS_OK(nt_status)) return ntstatus_to_werror(nt_status); nt_status 2126 source4/rpc_server/srvsvc/dcesrv_srvsvc.c NTSTATUS nt_status; nt_status 2128 source4/rpc_server/srvsvc/dcesrv_srvsvc.c nt_status = srvsvc_create_ntvfs_context(dce_call, mem_ctx, r->in.share, &ntvfs_ctx); nt_status 2129 source4/rpc_server/srvsvc/dcesrv_srvsvc.c if (!NT_STATUS_IS_OK(nt_status)) return ntstatus_to_werror(nt_status); nt_status 2146 source4/rpc_server/srvsvc/dcesrv_srvsvc.c nt_status = ntvfs_setpathinfo(ntvfs_req, io); nt_status 2147 source4/rpc_server/srvsvc/dcesrv_srvsvc.c if (!NT_STATUS_IS_OK(nt_status)) return ntstatus_to_werror(nt_status); nt_status 36 source4/smb_server/smb/negprot.c NTSTATUS nt_status; nt_status 47 source4/smb_server/smb/negprot.c nt_status = auth_context_create(smb_conn, nt_status 52 source4/smb_server/smb/negprot.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 53 source4/smb_server/smb/negprot.c DEBUG(0, ("auth_context_create() returned %s", nt_errstr(nt_status))); nt_status 54 source4/smb_server/smb/negprot.c return nt_status; nt_status 57 source4/smb_server/smb/negprot.c nt_status = auth_get_challenge(smb_conn->negotiate.auth_context, &challenge); nt_status 58 source4/smb_server/smb/negprot.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 59 source4/smb_server/smb/negprot.c DEBUG(0, ("auth_get_challenge() returned %s", nt_errstr(nt_status))); nt_status 60 source4/smb_server/smb/negprot.c return nt_status; nt_status 159 source4/smb_server/smb/negprot.c NTSTATUS nt_status; nt_status 163 source4/smb_server/smb/negprot.c nt_status = get_challenge(req->smb_conn, req->out.data); nt_status 164 source4/smb_server/smb/negprot.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 352 source4/smb_server/smb/negprot.c NTSTATUS nt_status; nt_status 362 source4/smb_server/smb/negprot.c nt_status = cli_credentials_set_machine_account(server_credentials, req->smb_conn->lp_ctx); nt_status 363 source4/smb_server/smb/negprot.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 364 source4/smb_server/smb/negprot.c DEBUG(10, ("Failed to obtain server credentials, perhaps a standalone server?: %s\n", nt_errstr(nt_status))); nt_status 369 source4/smb_server/smb/negprot.c nt_status = samba_server_gensec_start(req, nt_status 377 source4/smb_server/smb/negprot.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 378 source4/smb_server/smb/negprot.c DEBUG(0, ("Failed to start GENSEC: %s\n", nt_errstr(nt_status))); nt_status 394 source4/smb_server/smb/negprot.c nt_status = gensec_start_mech_by_oid(gensec_security, oid); nt_status 396 source4/smb_server/smb/negprot.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 398 source4/smb_server/smb/negprot.c nt_status = gensec_update(gensec_security, req, null_data_blob, &blob); nt_status 400 source4/smb_server/smb/negprot.c if (!NT_STATUS_IS_OK(nt_status) && !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 401 source4/smb_server/smb/negprot.c DEBUG(1, ("Failed to get SPNEGO to give us the first token: %s\n", nt_errstr(nt_status))); nt_status 405 source4/smb_server/smb/negprot.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 408 source4/smb_server/smb/negprot.c DEBUG(5, ("Failed to start SPNEGO, falling back to NTLMSSP only: %s\n", nt_errstr(nt_status))); nt_status 410 source4/smb_server/smb/negprot.c nt_status = gensec_start_mech_by_oid(gensec_security, oid); nt_status 412 source4/smb_server/smb/negprot.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 413 source4/smb_server/smb/negprot.c DEBUG(0, ("Failed to start SPNEGO as well as NTLMSSP fallback: %s\n", nt_errstr(nt_status))); nt_status 41 source4/smb_server/smb2/negprot.c NTSTATUS nt_status; nt_status 51 source4/smb_server/smb2/negprot.c nt_status = cli_credentials_set_machine_account(server_credentials, req->smb_conn->lp_ctx); nt_status 52 source4/smb_server/smb2/negprot.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 53 source4/smb_server/smb2/negprot.c DEBUG(10, ("Failed to obtain server credentials, perhaps a standalone server?: %s\n", nt_errstr(nt_status))); nt_status 60 source4/smb_server/smb2/negprot.c nt_status = samba_server_gensec_start(req, nt_status 67 source4/smb_server/smb2/negprot.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 68 source4/smb_server/smb2/negprot.c DEBUG(0, ("Failed to start GENSEC: %s\n", nt_errstr(nt_status))); nt_status 70 source4/smb_server/smb2/negprot.c return nt_status; nt_status 77 source4/smb_server/smb2/negprot.c nt_status = gensec_start_mech_by_oid(gensec_security, GENSEC_OID_SPNEGO); nt_status 78 source4/smb_server/smb2/negprot.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 79 source4/smb_server/smb2/negprot.c DEBUG(0, ("Failed to start SPNEGO: %s\n", nt_errstr(nt_status))); nt_status 81 source4/smb_server/smb2/negprot.c return nt_status; nt_status 84 source4/smb_server/smb2/negprot.c nt_status = gensec_update(gensec_security, req, null_data_blob, &blob); nt_status 85 source4/smb_server/smb2/negprot.c if (!NT_STATUS_IS_OK(nt_status) && !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 86 source4/smb_server/smb2/negprot.c DEBUG(0, ("Failed to get SPNEGO to give us the first token: %s\n", nt_errstr(nt_status))); nt_status 88 source4/smb_server/smb2/negprot.c return nt_status; nt_status 35 source4/torture/auth/pac.c NTSTATUS nt_status; nt_status 93 source4/torture/auth/pac.c nt_status = auth_anonymous_server_info(mem_ctx, lp_netbios_name(tctx->lp_ctx), &server_info); nt_status 95 source4/torture/auth/pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 143 source4/torture/auth/pac.c nt_status = kerberos_decode_pac(mem_ctx, nt_status 153 source4/torture/auth/pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 163 source4/torture/auth/pac.c nt_errstr(nt_status))); nt_status 167 source4/torture/auth/pac.c nt_status = kerberos_pac_blob_to_server_info(mem_ctx, nt_status 191 source4/torture/auth/pac.c nt_status = kerberos_pac_logon_info(mem_ctx, nt_status 202 source4/torture/auth/pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 213 source4/torture/auth/pac.c nt_errstr(nt_status))); nt_status 225 source4/torture/auth/pac.c nt_status = make_server_info_netlogon_validation(mem_ctx, nt_status 229 source4/torture/auth/pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 233 source4/torture/auth/pac.c nt_errstr(nt_status))); nt_status 297 source4/torture/auth/pac.c NTSTATUS nt_status; nt_status 411 source4/torture/auth/pac.c nt_status = kerberos_decode_pac(mem_ctx, nt_status 419 source4/torture/auth/pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 428 source4/torture/auth/pac.c nt_errstr(nt_status))); nt_status 432 source4/torture/auth/pac.c nt_status = kerberos_pac_blob_to_server_info(mem_ctx, nt_status 438 source4/torture/auth/pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 447 source4/torture/auth/pac.c nt_errstr(nt_status))); nt_status 470 source4/torture/auth/pac.c nt_status = kerberos_pac_logon_info(mem_ctx, nt_status 479 source4/torture/auth/pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 489 source4/torture/auth/pac.c nt_errstr(nt_status))); nt_status 493 source4/torture/auth/pac.c nt_status = make_server_info_netlogon_validation(mem_ctx, nt_status 497 source4/torture/auth/pac.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 507 source4/torture/auth/pac.c nt_errstr(nt_status))); nt_status 616 source4/torture/auth/pac.c nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 617 source4/torture/auth/pac.c torture_assert_ntstatus_ok(tctx, nt_status, "can't parse the PAC"); nt_status 638 source4/torture/auth/pac.c nt_status = ndr_map_error2ntstatus(ndr_err); nt_status 639 source4/torture/auth/pac.c torture_assert_ntstatus_ok(tctx, nt_status, "can't parse the PAC"); nt_status 661 source4/torture/auth/pac.c nt_status = kerberos_decode_pac(mem_ctx, nt_status 670 source4/torture/auth/pac.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 699 source4/torture/auth/pac.c nt_status = kerberos_decode_pac(mem_ctx, nt_status 708 source4/torture/auth/pac.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 719 source4/torture/auth/pac.c nt_status = kerberos_decode_pac(mem_ctx, nt_status 728 source4/torture/auth/pac.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 739 source4/torture/basic/base.c if (!NT_STATUS_EQUAL(cli->transport->error.e.nt_status, nt_status 741 source4/torture/basic/base.c !NT_STATUS_EQUAL(cli->transport->error.e.nt_status, nt_status 105 source4/torture/basic/delete.c torture_assert_ntstatus_equal(tctx, _cli->tree->session->transport->error.e.nt_status, _expected, \ nt_status 155 source4/torture/locktest2.c NTSTATUS nt_status; nt_status 174 source4/torture/locktest2.c nt_status = smbcli_full_connection(NULL, nt_status 178 source4/torture/locktest2.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 179 source4/torture/locktest2.c DEBUG(0, ("smbcli_full_connection failed with error %s\n", nt_errstr(nt_status))); nt_status 274 source4/torture/rpc/samlogon.c NTSTATUS nt_status; nt_status 299 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, nt_status 311 source4/torture/rpc/samlogon.c if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) { nt_status 321 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) { nt_status 323 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { nt_status 325 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); nt_status 327 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { nt_status 329 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 406 source4/torture/rpc/samlogon.c NTSTATUS nt_status; nt_status 428 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, nt_status 438 source4/torture/rpc/samlogon.c if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) { nt_status 444 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { nt_status 446 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); nt_status 448 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { nt_status 450 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 502 source4/torture/rpc/samlogon.c NTSTATUS nt_status; nt_status 525 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, nt_status 535 source4/torture/rpc/samlogon.c if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) { nt_status 541 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { nt_status 543 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); nt_status 545 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { nt_status 547 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 551 source4/torture/rpc/samlogon.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 593 source4/torture/rpc/samlogon.c NTSTATUS nt_status; nt_status 632 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, nt_status 646 source4/torture/rpc/samlogon.c if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) { nt_status 652 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) { nt_status 654 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { nt_status 656 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); nt_status 658 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { nt_status 660 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 741 source4/torture/rpc/samlogon.c NTSTATUS nt_status; nt_status 800 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, nt_status 814 source4/torture/rpc/samlogon.c if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) { nt_status 820 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) { nt_status 822 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { nt_status 824 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); nt_status 826 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { nt_status 828 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1046 source4/torture/rpc/samlogon.c NTSTATUS nt_status; nt_status 1087 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, nt_status 1097 source4/torture/rpc/samlogon.c if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) { nt_status 1103 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { nt_status 1105 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); nt_status 1107 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { nt_status 1109 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 1148 source4/torture/rpc/samlogon.c NTSTATUS nt_status; nt_status 1185 source4/torture/rpc/samlogon.c nt_status = check_samlogon(samlogon_state, nt_status 1195 source4/torture/rpc/samlogon.c if (NT_STATUS_EQUAL(NT_STATUS_WRONG_PASSWORD, nt_status)) { nt_status 1205 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(NT_STATUS_NOT_FOUND, nt_status) && strchr_m(samlogon_state->account_name, '@')) { nt_status 1207 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status)) { nt_status 1209 source4/torture/rpc/samlogon.c asprintf(error_string, "Expected error: %s, got %s", nt_errstr(samlogon_state->expected_error), nt_errstr(nt_status)); nt_status 1211 source4/torture/rpc/samlogon.c } else if (NT_STATUS_EQUAL(samlogon_state->expected_error, nt_status) && !NT_STATUS_IS_OK(nt_status)) { nt_status 1213 source4/torture/rpc/samlogon.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 4365 source4/torture/rpc/samr.c NTSTATUS nt_status; nt_status 4424 source4/torture/rpc/samr.c if (!NT_STATUS_EQUAL(status, account_types[i].nt_status)) { nt_status 4426 source4/torture/rpc/samr.c nt_errstr(status), nt_errstr(account_types[i].nt_status)); nt_status 161 source4/torture/rpc/samsync.c NTSTATUS nt_status; nt_status 168 source4/torture/rpc/samsync.c nt_status = dcerpc_samr_LookupDomain(samsync_state->p_samr, mem_ctx, &l); nt_status 169 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 170 source4/torture/rpc/samsync.c printf("LookupDomain failed - %s\n", nt_errstr(nt_status)); nt_status 183 source4/torture/rpc/samsync.c nt_status = dcerpc_samr_OpenDomain(samsync_state->p_samr, mem_ctx, &o); nt_status 184 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 185 source4/torture/rpc/samsync.c printf("OpenDomain failed - %s\n", nt_errstr(nt_status)); nt_status 312 source4/torture/rpc/samsync.c NTSTATUS nt_status; nt_status 363 source4/torture/rpc/samsync.c nt_status = dcerpc_samr_QueryDomainInfo(samsync_state->p_samr, mem_ctx, &q[levels[i]]); nt_status 365 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 367 source4/torture/rpc/samsync.c q[levels[i]].in.level, nt_errstr(nt_status)); nt_status 439 source4/torture/rpc/samsync.c NTSTATUS nt_status; nt_status 460 source4/torture/rpc/samsync.c nt_status = dcerpc_samr_OpenUser(samsync_state->p_samr, mem_ctx, &r); nt_status 461 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 462 source4/torture/rpc/samsync.c printf("OpenUser(%u) failed - %s\n", rid, nt_errstr(nt_status)); nt_status 472 source4/torture/rpc/samsync.c nt_status = dcerpc_samr_QueryUserInfo(samsync_state->p_samr, mem_ctx, &q); nt_status 473 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 475 source4/torture/rpc/samsync.c q.in.level, nt_errstr(nt_status)); nt_status 482 source4/torture/rpc/samsync.c nt_status = dcerpc_samr_GetGroupsForUser(samsync_state->p_samr, mem_ctx, &getgroups); nt_status 483 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 485 source4/torture/rpc/samsync.c nt_errstr(nt_status)); nt_status 491 source4/torture/rpc/samsync.c nt_errstr(nt_status)); nt_status 498 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 500 source4/torture/rpc/samsync.c q.in.level, nt_errstr(nt_status)); nt_status 610 source4/torture/rpc/samsync.c nt_status = test_SamLogon(samsync_state->p_netlogon_wksta, mem_ctx, samsync_state->creds_netlogon_wksta, nt_status 618 source4/torture/rpc/samsync.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_DISABLED)) { nt_status 622 source4/torture/rpc/samsync.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT)) { nt_status 626 source4/torture/rpc/samsync.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_SERVER_TRUST_ACCOUNT)) { nt_status 630 source4/torture/rpc/samsync.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT)) { nt_status 634 source4/torture/rpc/samsync.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT)) { nt_status 638 source4/torture/rpc/samsync.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_LOCKED_OUT)) { nt_status 642 source4/torture/rpc/samsync.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_EXPIRED)) { nt_status 646 source4/torture/rpc/samsync.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD)) { nt_status 650 source4/torture/rpc/samsync.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_MUST_CHANGE)) { nt_status 653 source4/torture/rpc/samsync.c } else if (NT_STATUS_IS_OK(nt_status)) { nt_status 719 source4/torture/rpc/samsync.c domain, username, nt_errstr(nt_status)); nt_status 730 source4/torture/rpc/samsync.c NTSTATUS nt_status; nt_status 748 source4/torture/rpc/samsync.c nt_status = dcerpc_samr_OpenAlias(samsync_state->p_samr, mem_ctx, &r); nt_status 749 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 750 source4/torture/rpc/samsync.c printf("OpenUser(%u) failed - %s\n", rid, nt_errstr(nt_status)); nt_status 760 source4/torture/rpc/samsync.c nt_status = dcerpc_samr_QueryAliasInfo(samsync_state->p_samr, mem_ctx, &q); nt_status 765 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 767 source4/torture/rpc/samsync.c q.in.level, nt_errstr(nt_status)); nt_status 781 source4/torture/rpc/samsync.c NTSTATUS nt_status; nt_status 799 source4/torture/rpc/samsync.c nt_status = dcerpc_samr_OpenGroup(samsync_state->p_samr, mem_ctx, &r); nt_status 800 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 801 source4/torture/rpc/samsync.c printf("OpenUser(%u) failed - %s\n", rid, nt_errstr(nt_status)); nt_status 811 source4/torture/rpc/samsync.c nt_status = dcerpc_samr_QueryGroupInfo(samsync_state->p_samr, mem_ctx, &q); nt_status 816 source4/torture/rpc/samsync.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 818 source4/torture/rpc/samsync.c q.in.level, nt_errstr(nt_status)); nt_status 1303 source4/torture/rpc/samsync.c NTSTATUS nt_status; nt_status 1308 source4/torture/rpc/samsync.c nt_status = test_SamLogon(samsync_state->p_netlogon_wksta, trustdom_ctx, samsync_state->creds_netlogon_wksta, nt_status 1315 source4/torture/rpc/samsync.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_LOGON_SERVERS)) { nt_status 1317 source4/torture/rpc/samsync.c t->name, nt_errstr(nt_status)); nt_status 1321 source4/torture/rpc/samsync.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT)) { nt_status 1323 source4/torture/rpc/samsync.c t->name, nt_errstr(nt_status)); nt_status 1329 source4/torture/rpc/samsync.c nt_status = test_SamLogon(samsync_state->p_netlogon_wksta, trustdom_ctx, samsync_state->creds_netlogon_wksta, nt_status 1337 source4/torture/rpc/samsync.c if (!NT_STATUS_EQUAL(nt_status, NT_STATUS_WRONG_PASSWORD)) { nt_status 1339 source4/torture/rpc/samsync.c t->name, nt_errstr(nt_status)); nt_status 235 source4/torture/winbind/struct_based.c nt_errstr(NT_STATUS(rep.data.auth.nt_status)), nt_status 243 source4/torture/winbind/struct_based.c NT_STATUS(rep.data.auth.nt_status), nt_status 197 source4/utils/ntlm_auth.c NTSTATUS nt_status; nt_status 202 source4/utils/ntlm_auth.c nt_status = NT_STATUS_NO_MEMORY; nt_status 214 source4/utils/ntlm_auth.c nt_status = ntlm_password_check(mem_ctx, nt_status 227 source4/utils/ntlm_auth.c if (NT_STATUS_IS_OK(nt_status)) { nt_status 237 source4/utils/ntlm_auth.c nt_errstr(nt_status))); nt_status 242 source4/utils/ntlm_auth.c *error_string = strdup(nt_errstr(nt_status)); nt_status 244 source4/utils/ntlm_auth.c return nt_status; nt_status 398 source4/utils/ntlm_auth.c NTSTATUS nt_status; nt_status 476 source4/utils/ntlm_auth.c nt_status = gensec_client_start(NULL, &state->gensec_state, ev, nt_status 478 source4/utils/ntlm_auth.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 494 source4/utils/ntlm_auth.c nt_status = auth_context_create_methods(mem_ctx, nt_status 501 source4/utils/ntlm_auth.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 549 source4/utils/ntlm_auth.c nt_status = gensec_start_mech_by_oid(state->gensec_state, GENSEC_OID_SPNEGO); nt_status 560 source4/utils/ntlm_auth.c nt_status = gensec_start_mech_by_oid(state->gensec_state, GENSEC_OID_NTLMSSP); nt_status 566 source4/utils/ntlm_auth.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 567 source4/utils/ntlm_auth.c DEBUG(1, ("GENSEC mech failed to start: %s\n", nt_errstr(nt_status))); nt_status 596 source4/utils/ntlm_auth.c nt_status = gensec_session_info(state->gensec_state, &session_info); nt_status 597 source4/utils/ntlm_auth.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 598 source4/utils/ntlm_auth.c DEBUG(1, ("gensec_session_info failed: %s\n", nt_errstr(nt_status))); nt_status 599 source4/utils/ntlm_auth.c mux_printf(mux_id, "BH %s\n", nt_errstr(nt_status)); nt_status 625 source4/utils/ntlm_auth.c nt_status = gensec_session_key(state->gensec_state, &session_key); nt_status 626 source4/utils/ntlm_auth.c if(!NT_STATUS_IS_OK(nt_status)) { nt_status 627 source4/utils/ntlm_auth.c DEBUG(1, ("gensec_session_key failed: %s\n", nt_errstr(nt_status))); nt_status 653 source4/utils/ntlm_auth.c nt_status = gensec_update(state->gensec_state, mem_ctx, in, &out); nt_status 656 source4/utils/ntlm_auth.c nt_status = auth_nt_status_squash(nt_status); nt_status 664 source4/utils/ntlm_auth.c if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) { nt_status 677 source4/utils/ntlm_auth.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED)) { nt_status 679 source4/utils/ntlm_auth.c reply_arg = nt_errstr(nt_status); nt_status 680 source4/utils/ntlm_auth.c DEBUG(1, ("GENSEC login failed: %s\n", nt_errstr(nt_status))); nt_status 681 source4/utils/ntlm_auth.c } else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_UNSUCCESSFUL)) { nt_status 683 source4/utils/ntlm_auth.c reply_arg = nt_errstr(nt_status); nt_status 684 source4/utils/ntlm_auth.c DEBUG(1, ("GENSEC login failed: %s\n", nt_errstr(nt_status))); nt_status 685 source4/utils/ntlm_auth.c } else if (!NT_STATUS_IS_OK(nt_status)) { nt_status 687 source4/utils/ntlm_auth.c reply_arg = nt_errstr(nt_status); nt_status 688 source4/utils/ntlm_auth.c DEBUG(1, ("GENSEC login failed: %s\n", nt_errstr(nt_status))); nt_status 692 source4/utils/ntlm_auth.c nt_status = gensec_session_info(state->gensec_state, &session_info); nt_status 693 source4/utils/ntlm_auth.c if (!NT_STATUS_IS_OK(nt_status)) { nt_status 695 source4/utils/ntlm_auth.c reply_arg = nt_errstr(nt_status); nt_status 696 source4/utils/ntlm_auth.c DEBUG(1, ("GENSEC failed to retreive the session info: %s\n", nt_errstr(nt_status))); nt_status 57 source4/winbind/wb_samba3_cmd.c resp->data.auth.nt_status = NT_STATUS_V(status);