Lines Matching defs:status

87 	uint32_t status = NT_STATUS_NO_MEMORY;
100 status = RPC_NT_PROTOCOL_ERROR;
104 status = netr_setup_token_info3(&info.info3, token);
113 return (status);
174 * this function must return without updating the status.
177 * access token and the status will be NT_STATUS_SUCCESS.
183 uint32_t status;
206 status = netlogon_logon(user_info, token);
211 status = NT_STATUS_REQUEST_ABORTED;
215 if (status != NT_STATUS_CANT_ACCESS_DOMAIN_INFO)
219 if (status != NT_STATUS_SUCCESS)
221 user_info->lg_e_username, xlate_nt_status(status));
223 user_info->lg_status = status;
233 uint32_t status;
261 status = netlogon_auth(di.d_dci.dc_name, &netr_handle,
264 if (status != 0) {
272 status = netr_server_samlogon(&netr_handle,
276 } while (status == NT_STATUS_INSUFFICIENT_LOGON_INFO && retries++ < 3);
279 status = NT_STATUS_LOGON_FAILURE;
281 return (status);
291 uint32_t status;
325 status = netr_setup_token_wingrps(info3, token);
326 if (status != NT_STATUS_SUCCESS)
327 return (status);
358 * Returns an NT status. There are numerous possibilities here.
387 uint32_t status;
450 status = NT_STATUS_INVALID_PARAMETER;
451 } else if (arg.status != 0) {
452 status = NT_SC_VALUE(arg.status);
456 * a non-zero status. If the status is ACCESS_DENIED
458 * a valid credential is returned with some status
463 status = netr_validate_chain(netr_info, arg.ret_auth);
464 if (status == NT_STATUS_INSUFFICIENT_LOGON_INFO) {
466 return (status);
470 status = netr_setup_token(info3, user_info, netr_info, token);
474 return (status);
727 uint32_t status;
732 status = netr_setup_domain_groups(info3, &tkn_grps);
733 if (status != NT_STATUS_SUCCESS) {
735 return (status);
738 status = smb_sam_usr_groups(token->tkn_user.i_sid, &tkn_grps);
739 if (status != NT_STATUS_SUCCESS) {
741 return (status);
747 status = smb_wka_token_groups(token->tkn_flags, &tkn_grps);
748 if (status == NT_STATUS_SUCCESS)
753 return (status);