tok 663 librpc/ndr/ndr.c struct ndr_token_list *tok;
tok 664 librpc/ndr/ndr.c tok = talloc(mem_ctx, struct ndr_token_list);
tok 665 librpc/ndr/ndr.c NDR_ERR_HAVE_NO_MEMORY(tok);
tok 666 librpc/ndr/ndr.c tok->key = key;
tok 667 librpc/ndr/ndr.c tok->value = value;
tok 668 librpc/ndr/ndr.c DLIST_ADD((*list), tok);
tok 678 librpc/ndr/ndr.c struct ndr_token_list *tok;
tok 679 librpc/ndr/ndr.c for (tok=*list;tok;tok=tok->next) {
tok 680 librpc/ndr/ndr.c if (_cmp_fn && _cmp_fn(tok->key,key)==0) goto found;
tok 681 librpc/ndr/ndr.c else if (!_cmp_fn && tok->key == key) goto found;
tok 685 librpc/ndr/ndr.c *v = tok->value;
tok 687 librpc/ndr/ndr.c DLIST_REMOVE((*list), tok);
tok 688 librpc/ndr/ndr.c talloc_free(tok);
tok 192 source3/auth/auth_sam.c char *tok;
tok 199 source3/auth/auth_sam.c while (next_token_talloc(mem_ctx, &s, &tok, ",")) {
tok 201 source3/auth/auth_sam.c tok, user_info->wksta_name));
tok 202 source3/auth/auth_sam.c if(strequal(tok, user_info->wksta_name)) {
tok 206 source3/auth/auth_sam.c if (tok[0] == '+') {
tok 208 source3/auth/auth_sam.c machine_name, tok + 1));
tok 209 source3/auth/auth_sam.c if (user_in_group(machine_name, tok + 1)) {
tok 214 source3/auth/auth_sam.c TALLOC_FREE(tok);
tok 216 source3/auth/auth_sam.c TALLOC_FREE(tok);
tok 50 source3/client/client.c static int process_tok(char *tok);
tok 3987 source3/client/client.c static int process_tok(char *tok)
tok 3991 source3/client/client.c int tok_len = strlen(tok);
tok 3994 source3/client/client.c if (strequal(commands[i].name,tok)) {
tok 3998 source3/client/client.c } else if (strnequal(commands[i].name, tok, tok_len)) {
tok 4068 source3/client/client.c char *tok;
tok 4082 source3/client/client.c if (!next_token_talloc(ctx, &cmd_ptr,&tok,NULL)) {
tok 4086 source3/client/client.c if ((i = process_tok(tok)) >= 0) {
tok 4089 source3/client/client.c d_printf("%s: command abbreviation ambiguous\n",tok);
tok 4091 source3/client/client.c d_printf("%s: command not found\n",tok);
tok 4465 source3/client/client.c char *tok = NULL;
tok 4495 source3/client/client.c if (!next_token_talloc(frame, &cmd_ptr,&tok,NULL)) {
tok 4501 source3/client/client.c if ((i = process_tok(tok)) >= 0) {
tok 4504 source3/client/client.c d_printf("%s: command abbreviation ambiguous\n",tok);
tok 4506 source3/client/client.c d_printf("%s: command not found\n",tok);
tok 41 source3/client/clitar.c static int clipfind(char **aret, int ret, char *tok);
tok 1617 source3/client/clitar.c static int clipfind(char **aret, int ret, char *tok)
tok 1623 source3/client/clitar.c while(strchr_m("/\\.", *tok))
tok 1624 source3/client/clitar.c tok++;
tok 1633 source3/client/clitar.c if (!strslashcmp(pkey, tok))
tok 64 source3/include/debugparse.h const char *dbg_token2string( dbg_Token tok );
tok 278 source3/include/proto.h bool client_match(const char *tok, const void *item);
tok 3481 source3/include/proto.h void set_delete_on_close_token(struct share_mode_lock *lck, const UNIX_USER_TOKEN *tok);
tok 3482 source3/include/proto.h void set_delete_on_close_lck(struct share_mode_lock *lck, bool delete_on_close, const UNIX_USER_TOKEN *tok);
tok 3483 source3/include/proto.h bool set_delete_on_close(files_struct *fsp, bool delete_on_close, const UNIX_USER_TOKEN *tok);
tok 19 source3/lib/access.c static bool masked_match(const char *tok, const char *slash, const char *s)
tok 30 source3/lib/access.c if (*tok == '[') {
tok 32 source3/lib/access.c tok_copy = SMB_STRDUP(tok+1);
tok 37 source3/lib/access.c tok_copy[PTR_DIFF(slash,tok)-1] = '\0';
tok 39 source3/lib/access.c tok_copy = SMB_STRDUP(tok);
tok 44 source3/lib/access.c tok_copy[PTR_DIFF(slash,tok)] = '\0';
tok 73 source3/lib/access.c static bool string_match(const char *tok,const char *s)
tok 93 source3/lib/access.c if (tok[0] == '.') { /* domain: match last fields */
tok 94 source3/lib/access.c if ((str_len = strlen(s)) > (tok_len = strlen(tok))
tok 95 source3/lib/access.c && strequal(tok, s + str_len - tok_len)) {
tok 98 source3/lib/access.c } else if (tok[0] == '@') { /* netgroup: look it up */
tok 132 source3/lib/access.c netgroup_ok = innetgr(tok + 1, hostname, (char *) 0, mydomain);
tok 137 source3/lib/access.c tok+1,
tok 148 source3/lib/access.c } else if (strequal(tok, "ALL")) { /* all: match any */
tok 150 source3/lib/access.c } else if (strequal(tok, "FAIL")) { /* fail: match any */
tok 152 source3/lib/access.c } else if (strequal(tok, "LOCAL")) { /* local: no dots */
tok 156 source3/lib/access.c } else if (strequal(tok, s)) { /* match host name or address */
tok 158 source3/lib/access.c } else if (tok[(tok_len = strlen(tok)) - 1] == '.') { /* network */
tok 159 source3/lib/access.c if (strncmp(tok, s, tok_len) == 0) {
tok 162 source3/lib/access.c } else if ((cut = strchr_m(tok, '/')) != 0) { /* netnumber/netmask */
tok 163 source3/lib/access.c if ((isdigit(s[0]) && strchr_m(tok, '.') != NULL) ||
tok 164 source3/lib/access.c (tok[0] == '[' && cut > tok && cut[-1] == ']') ||
tok 166 source3/lib/access.c strchr_m(tok, ':') != NULL)) {
tok 169 source3/lib/access.c return masked_match(tok, cut, s);
tok 171 source3/lib/access.c } else if (strchr_m(tok, '*') != 0 || strchr_m(tok, '?')) {
tok 172 source3/lib/access.c return unix_wild_match(tok, s);
tok 178 source3/lib/access.c bool client_match(const char *tok, const void *item)
tok 187 source3/lib/access.c if (string_match(tok, client[ADDR_INDEX])) {
tok 192 source3/lib/access.c !strnequal(tok, "::ffff:",7)) {
tok 199 source3/lib/access.c if (string_match(tok, (client[ADDR_INDEX])+7)) {
tok 205 source3/lib/access.c if (string_match(tok, client[NAME_INDEX])) {
tok 392 source3/lib/util_sock.c char *tok;
tok 394 source3/lib/util_sock.c while (next_token_talloc(ctx, &options, &tok," \t,")) {
tok 400 source3/lib/util_sock.c if ((p = strchr_m(tok,'='))) {
tok 407 source3/lib/util_sock.c if (strequal(socket_options[i].name,tok))
tok 411 source3/lib/util_sock.c DEBUG(0,("Unknown socket option %s\n",tok));
tok 426 source3/lib/util_sock.c "does not take a value\n",tok));
tok 442 source3/lib/util_sock.c tok, strerror(errno) ));
tok 703 source3/lib/util_str.c char *tok = NULL;
tok 712 source3/lib/util_str.c while (next_token_talloc(frame, &list, &tok,LIST_SEP)) {
tok 714 source3/lib/util_str.c if (strcmp(tok,s) == 0) {
tok 719 source3/lib/util_str.c if (StrCaseCmp(tok,s) == 0) {
tok 2438 source3/lib/util_str.c char *tok;
tok 2460 source3/lib/util_str.c while (next_token_talloc(list, &str, &tok, sep)) {
tok 2482 source3/lib/util_str.c list[num] = tok;
tok 87 source3/libgpo/gpo_fetch.c char *tok;
tok 96 source3/libgpo/gpo_fetch.c while (next_token_talloc(mem_ctx, &unix_path, &tok, "/")) {
tok 97 source3/libgpo/gpo_fetch.c if (strequal(tok, GPO_CACHE_DIR)) {
tok 102 source3/libgpo/gpo_fetch.c while (next_token_talloc(mem_ctx, &unix_path, &tok, "/")) {
tok 103 source3/libgpo/gpo_fetch.c current_dir = talloc_asprintf_append_buffer(current_dir, "/%s", tok);
tok 265 source3/libsmb/libsmb_xattr.c char *tok;
tok 320 source3/libsmb/libsmb_xattr.c if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok 325 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, "ALLOWED", strlen("ALLOWED")) == 0) {
tok 327 source3/libsmb/libsmb_xattr.c } else if (StrnCaseCmp(tok, "DENIED", strlen("DENIED")) == 0) {
tok 336 source3/libsmb/libsmb_xattr.c if (!(next_token_talloc(frame, &cp, &tok, "/") &&
tok 337 source3/libsmb/libsmb_xattr.c sscanf(tok, "%i", &aflags))) {
tok 342 source3/libsmb/libsmb_xattr.c if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok 347 source3/libsmb/libsmb_xattr.c if (strncmp(tok, "0x", 2) == 0) {
tok 348 source3/libsmb/libsmb_xattr.c if (sscanf(tok, "%i", &amask) != 1) {
tok 356 source3/libsmb/libsmb_xattr.c if (strcmp(tok, v->perm) == 0) {
tok 362 source3/libsmb/libsmb_xattr.c p = tok;
tok 430 source3/libsmb/libsmb_xattr.c char *tok;
tok 438 source3/libsmb/libsmb_xattr.c while (next_token_talloc(ctx, &p, &tok, "\t,\r\n")) {
tok 440 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"REVISION:", 9) == 0) {
tok 441 source3/libsmb/libsmb_xattr.c revision = strtol(tok+9, NULL, 16);
tok 445 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"OWNER:", 6) == 0) {
tok 454 source3/libsmb/libsmb_xattr.c owner_sid, tok+6)) {
tok 461 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"OWNER+:", 7) == 0) {
tok 470 source3/libsmb/libsmb_xattr.c owner_sid, tok+7)) {
tok 477 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"GROUP:", 6) == 0) {
tok 486 source3/libsmb/libsmb_xattr.c group_sid, tok+6)) {
tok 493 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"GROUP+:", 7) == 0) {
tok 502 source3/libsmb/libsmb_xattr.c group_sid, tok+6)) {
tok 509 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"ACL:", 4) == 0) {
tok 511 source3/libsmb/libsmb_xattr.c if (!parse_ace(ipc_cli, pol, &ace, numeric, tok+4)) {
tok 512 source3/libsmb/libsmb_xattr.c DEBUG(5, ("Failed to parse ACL %s\n", tok));
tok 516 source3/libsmb/libsmb_xattr.c DEBUG(5, ("Failed to add ACL %s\n", tok));
tok 522 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"ACL+:", 5) == 0) {
tok 524 source3/libsmb/libsmb_xattr.c if (!parse_ace(ipc_cli, pol, &ace, False, tok+5)) {
tok 525 source3/libsmb/libsmb_xattr.c DEBUG(5, ("Failed to parse ACL %s\n", tok));
tok 529 source3/libsmb/libsmb_xattr.c DEBUG(5, ("Failed to add ACL %s\n", tok));
tok 606 source3/libsmb/libsmb_xattr.c char *tok = NULL;
tok 641 source3/libsmb/libsmb_xattr.c while (next_token_talloc(frame, &p, &tok, "\t,\r\n")) {
tok 642 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, "MODE:", 5) == 0) {
tok 643 source3/libsmb/libsmb_xattr.c long request = strtol(tok+5, NULL, 16);
tok 655 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, "SIZE:", 5) == 0) {
tok 656 source3/libsmb/libsmb_xattr.c dad->size = (SMB_OFF_T)atof(tok+5);
tok 661 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, attr_strings.access_time_attr, n) == 0) {
tok 662 source3/libsmb/libsmb_xattr.c dad->access_time = (time_t)strtol(tok+n+1, NULL, 10);
tok 667 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, attr_strings.change_time_attr, n) == 0) {
tok 668 source3/libsmb/libsmb_xattr.c dad->change_time = (time_t)strtol(tok+n+1, NULL, 10);
tok 673 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, attr_strings.write_time_attr, n) == 0) {
tok 674 source3/libsmb/libsmb_xattr.c dad->write_time = (time_t)strtol(tok+n+1, NULL, 10);
tok 680 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, attr_strings.create_time_attr,
tok 682 source3/libsmb/libsmb_xattr.c dad->create_time = (time_t)strtol(tok+n+1,
tok 688 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, "INODE:", 6) == 0) {
tok 689 source3/libsmb/libsmb_xattr.c dad->inode = (SMB_INO_T)atof(tok+6);
tok 1496 source3/libsmb/namequery.c char *tok;
tok 1558 source3/libsmb/namequery.c while (next_token_talloc(frame, &ptr, &tok, LIST_SEP)) {
tok 1559 source3/libsmb/namequery.c if((strequal(tok, "host") || strequal(tok, "hosts"))) {
tok 1565 source3/libsmb/namequery.c } else if(strequal( tok, "kdc")) {
tok 1576 source3/libsmb/namequery.c } else if(strequal( tok, "ads")) {
tok 1584 source3/libsmb/namequery.c } else if(strequal( tok, "lmhosts")) {
tok 1590 source3/libsmb/namequery.c } else if(strequal( tok, "wins")) {
tok 1600 source3/libsmb/namequery.c } else if(strequal( tok, "bcast")) {
tok 1609 source3/libsmb/namequery.c tok));
tok 1319 source3/locking/locking.c static UNIX_USER_TOKEN *copy_unix_token(TALLOC_CTX *ctx, const UNIX_USER_TOKEN *tok)
tok 1323 source3/locking/locking.c if (tok == NULL) {
tok 1332 source3/locking/locking.c cpy->uid = tok->uid;
tok 1333 source3/locking/locking.c cpy->gid = tok->gid;
tok 1334 source3/locking/locking.c cpy->ngroups = tok->ngroups;
tok 1335 source3/locking/locking.c if (tok->ngroups) {
tok 1337 source3/locking/locking.c cpy->groups = TALLOC_ARRAY(cpy, gid_t, tok->ngroups);
tok 1341 source3/locking/locking.c memcpy(cpy->groups, tok->groups, tok->ngroups * sizeof(gid_t));
tok 1350 source3/locking/locking.c void set_delete_on_close_token(struct share_mode_lock *lck, const UNIX_USER_TOKEN *tok)
tok 1355 source3/locking/locking.c lck->delete_token = copy_unix_token(lck, tok);
tok 1370 source3/locking/locking.c void set_delete_on_close_lck(struct share_mode_lock *lck, bool delete_on_close, const UNIX_USER_TOKEN *tok)
tok 1373 source3/locking/locking.c set_delete_on_close_token(lck, tok);
tok 1382 source3/locking/locking.c bool set_delete_on_close(files_struct *fsp, bool delete_on_close, const UNIX_USER_TOKEN *tok)
tok 1399 source3/locking/locking.c tok_copy = copy_unix_token(lck, tok);
tok 1405 source3/locking/locking.c tok = tok_copy;
tok 1408 source3/locking/locking.c set_delete_on_close_lck(lck, delete_on_close, tok);
tok 197 source3/passdb/pdb_ldap.c char *tok;
tok 295 source3/passdb/pdb_ldap.c if (!next_token_talloc(mem_ctx, &p, &tok, "#")) {
tok 300 source3/passdb/pdb_ldap.c p = tok;
tok 30 source3/printing/lpq_parse.c static time_t EntryTime(char *tok[], int ptr, int count, int minimum)
tok 40 source3/printing/lpq_parse.c if (!strncmp(tok[ptr], Months[i],3)) {
tok 51 source3/printing/lpq_parse.c day = atoi(tok[ptr+1]);
tok 52 source3/printing/lpq_parse.c fstrcpy(c,tok[ptr+2]);
tok 126 source3/printing/lpq_parse.c char *tok[MAXTOK];
tok 148 source3/printing/lpq_parse.c tok[0] = strtok_r(line2," \t", &saveptr);
tok 152 source3/printing/lpq_parse.c && ((tok[count] = strtok_r(NULL, " \t", &saveptr)) != NULL)) {
tok 162 source3/printing/lpq_parse.c if (!isdigit((int)*tok[JOBTOK]) || !isdigit((int)*tok[TOTALTOK])) {
tok 166 source3/printing/lpq_parse.c buf->job = atoi(tok[JOBTOK]);
tok 167 source3/printing/lpq_parse.c buf->size = atoi(tok[TOTALTOK]);
tok 168 source3/printing/lpq_parse.c buf->status = strequal(tok[RANKTOK],"active")?LPQ_PRINTING:LPQ_QUEUED;
tok 170 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[USERTOK]);
tok 171 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[FILETOK]);
tok 181 source3/printing/lpq_parse.c fstrcat(buf->fs_file, tok[i]);
tok 188 source3/printing/lpq_parse.c buf->priority = atoi(tok[PRIOTOK]);
tok 345 source3/printing/lpq_parse.c char *tok[11];
tok 356 source3/printing/lpq_parse.c next_token_talloc(frame,&cline,&tok[count],NULL); count++) {
tok 362 source3/printing/lpq_parse.c if ((count == 7) && ((strcmp(tok[0],"QUEUED") == 0) || (strcmp(tok[0],"HELD") == 0))) {
tok 364 source3/printing/lpq_parse.c if (!isdigit((int)*tok[1]) || !isdigit((int)*tok[4])) {
tok 368 source3/printing/lpq_parse.c buf->size = atoi(tok[4]) * 1024;
tok 370 source3/printing/lpq_parse.c if (strchr_m(tok[2],' ')) {
tok 371 source3/printing/lpq_parse.c tok[2] = talloc_strdup(frame,"STDIN");
tok 372 source3/printing/lpq_parse.c if (!tok[2]) {
tok 380 source3/printing/lpq_parse.c char *p = strrchr_m(tok[2],'/');
tok 382 source3/printing/lpq_parse.c tok[2] = p+1;
tok 386 source3/printing/lpq_parse.c buf->job = atoi(tok[1]);
tok 387 source3/printing/lpq_parse.c buf->status = strequal(tok[0],"HELD")?LPQ_PAUSED:LPQ_QUEUED;
tok 390 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[3]);
tok 391 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[2]);
tok 399 source3/printing/lpq_parse.c if (!isdigit((int)*tok[3]) || !isdigit((int)*tok[8])) {
tok 404 source3/printing/lpq_parse.c buf->size = atoi(tok[8]) * 1024;
tok 406 source3/printing/lpq_parse.c if (strchr_m(tok[4],' ')) {
tok 407 source3/printing/lpq_parse.c tok[4] = talloc_strdup(frame,"STDIN");
tok 408 source3/printing/lpq_parse.c if (!tok[4]) {
tok 416 source3/printing/lpq_parse.c char *p = strrchr_m(tok[4],'/');
tok 418 source3/printing/lpq_parse.c tok[4] = p+1;
tok 422 source3/printing/lpq_parse.c buf->job = atoi(tok[3]);
tok 423 source3/printing/lpq_parse.c buf->status = strequal(tok[2],"RUNNING")?LPQ_PRINTING:LPQ_QUEUED;
tok 426 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[5]);
tok 427 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[4]);
tok 460 source3/printing/lpq_parse.c char *tok[12];
tok 483 source3/printing/lpq_parse.c next_token_talloc(frame, &cline, &tok[count],NULL);
tok 494 source3/printing/lpq_parse.c if (!isdigit((int)*tok[1])) {
tok 500 source3/printing/lpq_parse.c if (strchr_m(tok[0],' ')) {
tok 501 source3/printing/lpq_parse.c tok[0] = talloc_strdup(frame, "STDIN");
tok 502 source3/printing/lpq_parse.c if (!tok[0]) {
tok 508 source3/printing/lpq_parse.c buf->size = atoi(tok[1]);
tok 509 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[0]);
tok 539 source3/printing/lpq_parse.c next_token_talloc(frame, &cline, &tok[count],NULL);
tok 552 source3/printing/lpq_parse.c if (!isdigit((int)*tok[1]) || !isdigit((int)*tok[4]) || !isdigit((int)*tok[6])) {
tok 556 source3/printing/lpq_parse.c jobid = atoi(tok[1]);
tok 558 source3/printing/lpq_parse.c jobuser = SMB_STRDUP(tok[2]);
tok 559 source3/printing/lpq_parse.c jobprio = atoi(tok[4]);
tok 562 source3/printing/lpq_parse.c jobtime=EntryTime(tok, 5, count, 8);
tok 569 source3/printing/lpq_parse.c if ((count >8) && (((strequal(tok[8],"on")) ||
tok 570 source3/printing/lpq_parse.c ((strequal(tok[8],"from")) &&
tok 571 source3/printing/lpq_parse.c ((count > 10)&&(strequal(tok[10],"on"))))))) {
tok 594 source3/printing/lpq_parse.c char *tok[9];
tok 627 source3/printing/lpq_parse.c next_token_talloc(frame, &cline, &tok[count],NULL);
tok 639 source3/printing/lpq_parse.c if (!isdigit((int)*tok[1]) || !isdigit((int)*tok[3])) {
tok 643 source3/printing/lpq_parse.c if (!isdigit((int)*tok[5])) {
tok 649 source3/printing/lpq_parse.c if ((p=strchr_m(tok[2],'!'))) {
tok 650 source3/printing/lpq_parse.c tok[2] = p+1;
tok 653 source3/printing/lpq_parse.c buf->job = atoi(tok[1]);
tok 654 source3/printing/lpq_parse.c buf->size = atoi(tok[3]);
tok 655 source3/printing/lpq_parse.c if (count > 7 && strequal(tok[7],"on")) {
tok 657 source3/printing/lpq_parse.c } else if (count > 8 && strequal(tok[7],"being") && strequal(tok[8],"held")) {
tok 663 source3/printing/lpq_parse.c buf->time = EntryTime(tok, 4, count, 7);
tok 664 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[2]);
tok 665 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[2]);
tok 683 source3/printing/lpq_parse.c char *tok[7];
tok 703 source3/printing/lpq_parse.c next_token_talloc(frame,&cline,&tok[count],NULL);
tok 715 source3/printing/lpq_parse.c if (!isdigit((int)*tok[2]) || !isdigit((int)*tok[4])) {
tok 722 source3/printing/lpq_parse.c char *p = strrchr_m(tok[6],'/');
tok 724 source3/printing/lpq_parse.c tok[6] = p+1;
tok 728 source3/printing/lpq_parse.c buf->job = atoi(tok[2]);
tok 729 source3/printing/lpq_parse.c buf->size = atoi(tok[4]);
tok 730 source3/printing/lpq_parse.c buf->status = strequal(tok[3],"active")?LPQ_PRINTING:LPQ_QUEUED;
tok 733 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[1]);
tok 734 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[6]);
tok 755 source3/printing/lpq_parse.c char *tok[11];
tok 766 source3/printing/lpq_parse.c next_token_talloc(frame,&cline,&tok[count],NULL);
tok 778 source3/printing/lpq_parse.c if (strcmp(tok[0],"active") && !isdigit((int)tok[0][0])) {
tok 784 source3/printing/lpq_parse.c if (!isdigit((int)*tok[4]) || !isdigit((int)*tok[7])) {
tok 790 source3/printing/lpq_parse.c if (strchr_m(tok[6],' ')) {
tok 791 source3/printing/lpq_parse.c tok[6] = talloc_strdup(frame, "STDIN");
tok 792 source3/printing/lpq_parse.c if (!tok[6]) {
tok 801 source3/printing/lpq_parse.c char *p = strrchr_m(tok[6],'/');
tok 804 source3/printing/lpq_parse.c fstrcpy(tok[6],tmp);
tok 808 source3/printing/lpq_parse.c buf->job = atoi(tok[4]);
tok 810 source3/printing/lpq_parse.c buf->size = atoi(tok[7]);
tok 811 source3/printing/lpq_parse.c if (strchr_m(tok[7],'K')) {
tok 814 source3/printing/lpq_parse.c if (strchr_m(tok[7],'M')) {
tok 818 source3/printing/lpq_parse.c buf->status = strequal(tok[0],"active")?LPQ_PRINTING:LPQ_QUEUED;
tok 821 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[1]);
tok 822 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[6]);
tok 1009 source3/printing/lpq_parse.c char *tok;
tok 1022 source3/printing/lpq_parse.c while(next_token_talloc(frame, &cline, &tok, NULL)) {
tok 1025 source3/printing/lpq_parse.c buf->job = atoi(tok);
tok 1028 source3/printing/lpq_parse.c buf->size = atoi(tok);
tok 1031 source3/printing/lpq_parse.c buf->status = atoi(tok);
tok 1034 source3/printing/lpq_parse.c buf->time = atoi(tok);
tok 1037 source3/printing/lpq_parse.c fstrcpy(buf->fs_user, tok);
tok 1040 source3/printing/lpq_parse.c fstrcpy(buf->fs_file, tok);
tok 543 source3/smbd/server.c char *tok;
tok 554 source3/smbd/server.c next_token_talloc(talloc_tos(),&ptr, &tok, " \t,");) {
tok 555 source3/smbd/server.c unsigned port = atoi(tok);
tok 569 source3/smbd/server.c char *tok;
tok 586 source3/smbd/server.c for (ptr=ports; next_token_talloc(talloc_tos(), &ptr, &tok, " \t,"); ) {
tok 589 source3/smbd/server.c unsigned port = atoi(tok);
tok 167 source3/utils/debug2html.c static void charprint( dbg_Token tok, int c )
tok 179 source3/utils/debug2html.c switch( tok )
tok 47 source3/utils/debugparse.c const char *dbg_token2string( dbg_Token tok )
tok 62 source3/utils/debugparse.c switch( tok )
tok 488 source3/utils/net_rpc_printer.c char *tok;
tok 497 source3/utils/net_rpc_printer.c while (next_token_talloc(mem_ctx, &p, &tok, "\\")) {
tok 498 source3/utils/net_rpc_printer.c if (strequal(tok, short_archi)) {
tok 156 source3/utils/sharesec.c char *tok;
tok 199 source3/utils/sharesec.c if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok 207 source3/utils/sharesec.c if (strncmp(tok, "ALLOWED", strlen("ALLOWED")) == 0) {
tok 209 source3/utils/sharesec.c } else if (strncmp(tok, "DENIED", strlen("DENIED")) == 0) {
tok 213 source3/utils/sharesec.c "entry at '%s'\n", orig_str, tok);
tok 222 source3/utils/sharesec.c if (!(next_token_talloc(frame, &cp, &tok, "/") &&
tok 223 source3/utils/sharesec.c sscanf(tok, "%i", &aflags) && aflags == 0)) {
tok 225 source3/utils/sharesec.c orig_str, tok);
tok 231 source3/utils/sharesec.c if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok 233 source3/utils/sharesec.c orig_str, tok);
tok 239 source3/utils/sharesec.c if (strncmp(tok, "0x", 2) == 0) {
tok 240 source3/utils/sharesec.c if (sscanf(tok, "%i", &amask) != 1) {
tok 242 source3/utils/sharesec.c orig_str, tok);
tok 251 source3/utils/sharesec.c if (strcmp(tok, v->perm) == 0) {
tok 257 source3/utils/sharesec.c p = tok;
tok 366 source3/utils/smbcacls.c char *tok;
tok 409 source3/utils/smbcacls.c if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok 417 source3/utils/smbcacls.c if (strncmp(tok, "ALLOWED", strlen("ALLOWED")) == 0) {
tok 419 source3/utils/smbcacls.c } else if (strncmp(tok, "DENIED", strlen("DENIED")) == 0) {
tok 423 source3/utils/smbcacls.c orig_str, tok);
tok 431 source3/utils/smbcacls.c if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok 433 source3/utils/smbcacls.c orig_str, tok);
tok 439 source3/utils/smbcacls.c if (tok[0] < '0' || tok[0] > '9') {
tok 440 source3/utils/smbcacls.c if (!parse_ace_flags(tok, &aflags)) {
tok 442 source3/utils/smbcacls.c orig_str, tok);
tok 447 source3/utils/smbcacls.c } else if (strnequal(tok, "0x", 2)) {
tok 448 source3/utils/smbcacls.c if (!sscanf(tok, "%x", &aflags)) {
tok 450 source3/utils/smbcacls.c orig_str, tok);
tok 456 source3/utils/smbcacls.c if (!sscanf(tok, "%i", &aflags)) {
tok 458 source3/utils/smbcacls.c orig_str, tok);
tok 465 source3/utils/smbcacls.c if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok 467 source3/utils/smbcacls.c orig_str, tok);
tok 473 source3/utils/smbcacls.c if (strncmp(tok, "0x", 2) == 0) {
tok 474 source3/utils/smbcacls.c if (sscanf(tok, "%i", &amask) != 1) {
tok 476 source3/utils/smbcacls.c orig_str, tok);
tok 485 source3/utils/smbcacls.c if (strcmp(tok, v->perm) == 0) {
tok 491 source3/utils/smbcacls.c p = tok;
tok 552 source3/utils/smbcacls.c char *tok;
tok 559 source3/utils/smbcacls.c while (next_token_talloc(ctx, &p, &tok, "\t,\r\n")) {
tok 560 source3/utils/smbcacls.c if (strncmp(tok,"REVISION:", 9) == 0) {
tok 561 source3/utils/smbcacls.c revision = strtol(tok+9, NULL, 16);
tok 565 source3/utils/smbcacls.c if (strncmp(tok,"OWNER:", 6) == 0) {
tok 572 source3/utils/smbcacls.c !StringToSid(cli, owner_sid, tok+6)) {
tok 579 source3/utils/smbcacls.c if (strncmp(tok,"GROUP:", 6) == 0) {
tok 586 source3/utils/smbcacls.c !StringToSid(cli, grp_sid, tok+6)) {
tok 593 source3/utils/smbcacls.c if (strncmp(tok,"ACL:", 4) == 0) {
tok 595 source3/utils/smbcacls.c if (!parse_ace(cli, &ace, tok+4)) {
tok 599 source3/utils/smbcacls.c printf("Failed to add ACL %s\n", tok);
tok 605 source3/utils/smbcacls.c printf("Failed to parse token '%s' in security descriptor,\n", tok);
tok 110 source3/web/cgi.c char *p, *s, *tok;
tok 168 source3/web/cgi.c for (tok=strtok_r(s, "&;", &saveptr); tok;
tok 169 source3/web/cgi.c tok=strtok_r(NULL, "&;", &saveptr)) {
tok 170 source3/web/cgi.c p = strchr_m(tok,'=');
tok 175 source3/web/cgi.c variables[num_variables].name = SMB_STRDUP(tok);
tok 2717 source4/client/client.c static int process_tok(const char *tok)
tok 2721 source4/client/client.c int tok_len = strlen(tok);
tok 2724 source4/client/client.c if (strequal(commands[i].name,tok)) {
tok 2728 source4/client/client.c } else if (strncasecmp(commands[i].name, tok, tok_len) == 0) {
tok 42 source4/lib/socket/access.c static bool masked_match(TALLOC_CTX *mem_ctx, const char *tok, const char *slash, const char *s)
tok 52 source4/lib/socket/access.c tok_cpy = talloc_strdup(mem_ctx, tok);
tok 53 source4/lib/socket/access.c tok_cpy[PTR_DIFF(slash,tok)] = '\0';
tok 66 source4/lib/socket/access.c DEBUG(0,("access: bad net/mask access control: %s\n", tok));
tok 74 source4/lib/socket/access.c static bool string_match(TALLOC_CTX *mem_ctx, const char *tok,const char *s, char *invalid_char)
tok 96 source4/lib/socket/access.c if (tok[0] == '.') { /* domain: match last fields */
tok 97 source4/lib/socket/access.c if ((str_len = strlen(s)) > (tok_len = strlen(tok))
tok 98 source4/lib/socket/access.c && strcasecmp(tok, s + str_len - tok_len)==0) {
tok 101 source4/lib/socket/access.c } else if (tok[0] == '@') { /* netgroup: look it up */
tok 104 source4/lib/socket/access.c } else if (strcmp(tok, "ALL")==0) { /* all: match any */
tok 106 source4/lib/socket/access.c } else if (strcmp(tok, "FAIL")==0) { /* fail: match any */
tok 108 source4/lib/socket/access.c } else if (strcmp(tok, "LOCAL")==0) { /* local: no dots */
tok 112 source4/lib/socket/access.c } else if (strcasecmp(tok, s)==0) { /* match host name or address */
tok 114 source4/lib/socket/access.c } else if (tok[(tok_len = strlen(tok)) - 1] == '.') { /* network */
tok 115 source4/lib/socket/access.c if (strncmp(tok, s, tok_len) == 0)
tok 117 source4/lib/socket/access.c } else if ((cut = strchr(tok, '/')) != 0) { /* netnumber/netmask */
tok 118 source4/lib/socket/access.c if (isdigit((int)s[0]) && masked_match(mem_ctx, tok, cut, s))
tok 120 source4/lib/socket/access.c } else if (strchr(tok, '*') != 0) {
tok 122 source4/lib/socket/access.c } else if (strchr(tok, '?') != 0) {
tok 134 source4/lib/socket/access.c static bool client_match(TALLOC_CTX *mem_ctx, const char *tok, struct client_addr *client)
tok 144 source4/lib/socket/access.c if ((match = string_match(mem_ctx, tok, client->caddr, &invalid_char)) == 0) {
tok 147 source4/lib/socket/access.c token '%s' in an allow/deny hosts line.\n", invalid_char, tok ));
tok 150 source4/lib/socket/access.c match = string_match(mem_ctx, tok, client->cname, &invalid_char);
tok 154 source4/lib/socket/access.c token '%s' in an allow/deny hosts line.\n", invalid_char, tok ));
tok 543 source4/lib/socket/socket.c const char *tok = options_list[j];
tok 549 source4/lib/socket/socket.c if ((p = strchr(tok,'='))) {
tok 556 source4/lib/socket/socket.c if (strequal(socket_options[i].name,tok))
tok 560 source4/lib/socket/socket.c DEBUG(0,("Unknown socket option %s\n",tok));
tok 573 source4/lib/socket/socket.c DEBUG(0,("syntax error - %s does not take a value\n",tok));
tok 584 source4/lib/socket/socket.c DEBUG(0,("Failed to set socket option %s (Error %s)\n",tok, strerror(errno) ));
tok 185 source4/libcli/security/sddl.c const char *tok[6];
tok 194 source4/libcli/security/sddl.c tok[0] = str;
tok 200 source4/libcli/security/sddl.c tok[i+1] = str;
tok 204 source4/libcli/security/sddl.c if (!sddl_map_flags(ace_types, tok[0], &v, NULL)) {
tok 210 source4/libcli/security/sddl.c if (!sddl_map_flags(ace_flags, tok[1], &v, NULL)) {
tok 216 source4/libcli/security/sddl.c if (strncmp(tok[2], "0x", 2) == 0) {
tok 217 source4/libcli/security/sddl.c ace->access_mask = strtol(tok[2], NULL, 16);
tok 219 source4/libcli/security/sddl.c if (!sddl_map_flags(ace_access_mask, tok[2], &v, NULL)) {
tok 226 source4/libcli/security/sddl.c if (tok[3][0] != 0) {
tok 227 source4/libcli/security/sddl.c NTSTATUS status = GUID_from_string(tok[3],
tok 236 source4/libcli/security/sddl.c if (tok[4][0] != 0) {
tok 237 source4/libcli/security/sddl.c NTSTATUS status = GUID_from_string(tok[4],
tok 246 source4/libcli/security/sddl.c s = tok[5];
tok 343 source4/utils/ntlm_auth.c char *tok;
tok 350 source4/utils/ntlm_auth.c tok = (char *)malloc(tok_len);
tok 351 source4/utils/ntlm_auth.c if (!tok) {
tok 355 source4/utils/ntlm_auth.c while (next_token(&p, tok, LIST_SEP, tok_len)) {
tok 356 source4/utils/ntlm_auth.c if ((casesensitive?strcmp:strcasecmp_m)(tok,s) == 0) {
tok 357 source4/utils/ntlm_auth.c free(tok);
tok 361 source4/utils/ntlm_auth.c free(tok);