ok 261 lib/nss_wrapper/nss_wrapper.c bool ok;
ok 283 lib/nss_wrapper/nss_wrapper.c ok = nwrap->parse_line(nwrap, line);
ok 284 lib/nss_wrapper/nss_wrapper.c if (!ok) {
ok 311 lib/nss_wrapper/nss_wrapper.c bool ok;
ok 360 lib/nss_wrapper/nss_wrapper.c ok = nwrap_parse_file(nwrap);
ok 361 lib/nss_wrapper/nss_wrapper.c if (!ok) {
ok 289 libcli/nbt/nbtname.c bool ok;
ok 316 libcli/nbt/nbtname.c ok = decompress_name(cname, &r->type);
ok 317 libcli/nbt/nbtname.c if (!ok) {
ok 1345 nsswitch/wbinfo.c bool ok;
ok 1347 nsswitch/wbinfo.c ok = SMBencrypt(pass, params.password.response.challenge,
ok 1349 nsswitch/wbinfo.c if (!ok) {
ok 3400 source3/client/client.c bool ok;
ok 3403 source3/client/client.c ok = next_token_talloc(ctx, &cmd_ptr,&buf,NULL);
ok 3404 source3/client/client.c if (ok && (sys_stat(buf,&sbuf) == 0)) {
ok 3412 source3/client/client.c if (ok && newer_than == 0) {
ok 372 source3/libads/sasl.c bool ok;
ok 523 source3/libads/sasl.c ok = spnego_parse_auth_response(wrapped, NT_STATUS_OK,
ok 527 source3/libads/sasl.c if (!ok) {
ok 392 source3/libsmb/cliconnect.c bool ok;
ok 503 source3/libsmb/cliconnect.c ok = cli_simple_set_signing(cli, session_key, lm_response);
ok 505 source3/libsmb/cliconnect.c ok = cli_simple_set_signing(cli, session_key, nt_response);
ok 507 source3/libsmb/cliconnect.c if (ok) {
ok 734 source3/libsmb/nmblib.c bool ok=False;
ok 752 source3/libsmb/nmblib.c ok = parse_nmb(buf,length,&p->packet.nmb);
ok 756 source3/libsmb/nmblib.c ok = parse_dgram(buf,length,&p->packet.dgram);
ok 760 source3/libsmb/nmblib.c if (!ok) {
ok 299 source3/locking/locking.c bool ok = False;
ok 318 source3/locking/locking.c ok = brl_unlock(msg_ctx,
ok 328 source3/locking/locking.c if (!ok) {
ok 348 source3/locking/locking.c bool ok = False;
ok 368 source3/locking/locking.c ok = brl_lock_cancel(br_lck,
ok 378 source3/locking/locking.c if (!ok) {
ok 80 source3/passdb/lookup_sid.c goto ok;
ok 94 source3/passdb/lookup_sid.c goto ok;
ok 106 source3/passdb/lookup_sid.c goto ok;
ok 112 source3/passdb/lookup_sid.c goto ok;
ok 121 source3/passdb/lookup_sid.c goto ok;
ok 143 source3/passdb/lookup_sid.c goto ok;
ok 155 source3/passdb/lookup_sid.c goto ok;
ok 171 source3/passdb/lookup_sid.c goto ok;
ok 187 source3/passdb/lookup_sid.c goto ok;
ok 199 source3/passdb/lookup_sid.c goto ok;
ok 211 source3/passdb/lookup_sid.c goto ok;
ok 225 source3/passdb/lookup_sid.c goto ok;
ok 241 source3/passdb/lookup_sid.c goto ok;
ok 257 source3/passdb/lookup_sid.c goto ok;
ok 275 source3/passdb/lookup_sid.c goto ok;
ok 286 source3/passdb/lookup_sid.c goto ok;
ok 292 source3/passdb/lookup_sid.c goto ok;
ok 302 source3/passdb/lookup_sid.c ok:
ok 308 source3/passdb/pdb_tdb.c bool ok = false;
ok 310 source3/passdb/pdb_tdb.c ok = dbwrap_fetch_uint32(db, NEXT_RID_STRING, &rid);
ok 311 source3/passdb/pdb_tdb.c if (ok) {
ok 319 source3/passdb/pdb_tdb.c ok = tdb_fetch_uint32(tdb, "RID_COUNTER", &rid);
ok 320 source3/passdb/pdb_tdb.c if (!ok) {
ok 5761 source3/printing/nt_printing.c bool ok = False;
ok 5770 source3/printing/nt_printing.c ok = True;
ok 5776 source3/printing/nt_printing.c ok = True;
ok 5780 source3/printing/nt_printing.c if (!ok)
ok 5783 source3/printing/nt_printing.c return ok;
ok 1176 source3/smbd/lanman.c bool ok = True;
ok 1230 source3/smbd/lanman.c ok = False;
ok 1238 source3/smbd/lanman.c ok = False;
ok 1244 source3/smbd/lanman.c ok = False;
ok 1250 source3/smbd/lanman.c ok = False;
ok 1254 source3/smbd/lanman.c ok = False;
ok 1260 source3/smbd/lanman.c if (ok) {
ok 678 source3/smbd/password.c bool ok = False;
ok 702 source3/smbd/password.c if (!ok) {
ok 716 source3/smbd/password.c !ok && auser;
ok 724 source3/smbd/password.c ok = True;
ok 736 source3/smbd/password.c if (!ok && lp_username(snum)) {
ok 756 source3/smbd/password.c auser && !ok;
ok 761 source3/smbd/password.c ok = True;
ok 772 source3/smbd/password.c ok = True;
ok 786 source3/smbd/password.c if (!ok && GUEST_OK(snum)) {
ok 793 source3/smbd/password.c ok = True;
ok 804 source3/smbd/password.c if (ok && !user_ok(user, snum)) {
ok 806 source3/smbd/password.c ok = False;
ok 809 source3/smbd/password.c return(ok);
ok 309 source3/smbd/sesssetup.c bool ok = make_krb5_skew_error(&ap_rep);
ok 310 source3/smbd/sesssetup.c if (!ok) {
ok 31 source3/torture/t_asn1.c bool ok = True;
ok 47 source3/torture/t_asn1.c ok = False;
ok 56 source3/torture/t_asn1.c ok = False;
ok 60 source3/torture/t_asn1.c ok = False;
ok 64 source3/torture/t_asn1.c return ok ? 0 : 1;
ok 5419 source3/torture/torture.c bool ok = true;
ok 5421 source3/torture/torture.c ok &= subst_test("%U", "bla", "", -1, -1, "bla");
ok 5422 source3/torture/torture.c ok &= subst_test("%u%U", "bla", "", -1, -1, "blabla");
ok 5423 source3/torture/torture.c ok &= subst_test("%g", "", "", -1, -1, "NO_GROUP");
ok 5424 source3/torture/torture.c ok &= subst_test("%G", "", "", -1, -1, "NO_GROUP");
ok 5425 source3/torture/torture.c ok &= subst_test("%g", "", "", -1, 0, gidtoname(0));
ok 5426 source3/torture/torture.c ok &= subst_test("%G", "", "", -1, 0, gidtoname(0));
ok 5427 source3/torture/torture.c ok &= subst_test("%D%u", "u", "dom", -1, 0, "domu");
ok 5428 source3/torture/torture.c ok &= subst_test("%i %I", "", "", -1, -1, "0.0.0.0 0.0.0.0");
ok 5432 source3/torture/torture.c ok &= (strcmp(talloc_sub_basic(talloc_tos(), "BLA", "dom", "%U%D"),
ok 5435 source3/torture/torture.c return ok;
ok 405 source4/auth/gensec/spnego.c bool ok;
ok 413 source4/auth/gensec/spnego.c ok = spnego_write_mech_types(spnego_state,
ok 416 source4/auth/gensec/spnego.c if (!ok) {
ok 580 source4/auth/gensec/spnego.c bool ok;
ok 621 source4/auth/gensec/spnego.c ok = spnego_write_mech_types(spnego_state,
ok 624 source4/auth/gensec/spnego.c if (!ok) {
ok 1308 source4/dsdb/samdb/ldb_modules/password_hash.c bool ok;
ok 1392 source4/dsdb/samdb/ldb_modules/password_hash.c ok = E_deshash((char *)cleartext_unix, lm_hash->hash);
ok 1393 source4/dsdb/samdb/ldb_modules/password_hash.c if (ok) {
ok 218 source4/heimdal/lib/hcrypto/rand-fortuna.c int ok;
ok 225 source4/heimdal/lib/hcrypto/rand-fortuna.c ok = 0;
ok 227 source4/heimdal/lib/hcrypto/rand-fortuna.c ok = 1;
ok 231 source4/heimdal/lib/hcrypto/rand-fortuna.c ok = 1;
ok 234 source4/heimdal/lib/hcrypto/rand-fortuna.c ok = 1;
ok 237 source4/heimdal/lib/hcrypto/rand-fortuna.c if (ok)
ok 242 source4/heimdal/lib/hcrypto/rand-fortuna.c return ok;
ok 785 source4/lib/wmi/wmi_wrap.c PyObject *PyBool_FromLong(long ok)
ok 787 source4/lib/wmi/wmi_wrap.c PyObject *result = ok ? Py_True : Py_False;
ok 154 source4/libnet/libnet_vampire.c bool ok;
ok 344 source4/libnet/libnet_vampire.c ok = samdb_set_ntds_invocation_id(s->ldb, &c->dest_dsa->invocation_id);
ok 345 source4/libnet/libnet_vampire.c if (!ok) {
ok 349 source4/libnet/libnet_vampire.c ok = samdb_set_ntds_objectGUID(s->ldb, &c->dest_dsa->ntds_guid);
ok 350 source4/libnet/libnet_vampire.c if (!ok) {
ok 43 source4/torture/ldap/uptodatevector.c bool ok = true;
ok 145 source4/torture/ldap/uptodatevector.c ok = false;
ok 151 source4/torture/ldap/uptodatevector.c return ok;
ok 142 source4/torture/libnet/libnet_BecomeDC.c bool ok;
ok 334 source4/torture/libnet/libnet_BecomeDC.c ok = samdb_set_ntds_invocation_id(s->ldb, &c->dest_dsa->invocation_id);
ok 335 source4/torture/libnet/libnet_BecomeDC.c if (!ok) {
ok 339 source4/torture/libnet/libnet_BecomeDC.c ok = samdb_set_ntds_objectGUID(s->ldb, &c->dest_dsa->ntds_guid);
ok 340 source4/torture/libnet/libnet_BecomeDC.c if (!ok) {
ok 56 source4/torture/raw/streams.c bool ok; \
ok 58 source4/torture/raw/streams.c ok = false; \
ok 60 source4/torture/raw/streams.c ok = false; \
ok 62 source4/torture/raw/streams.c ok = true; \
ok 64 source4/torture/raw/streams.c ok = true; \
ok 66 source4/torture/raw/streams.c ok = false; \
ok 68 source4/torture/raw/streams.c if (!ok) { \
ok 566 source4/torture/rpc/dssync.c bool ok;
ok 567 source4/torture/rpc/dssync.c ok = file_save(fname, plain_data.data, plain_data.length);
ok 568 source4/torture/rpc/dssync.c if (!ok) {
ok 1836 source4/torture/rpc/lsa.c int ok[] = {1, 0, 1, 0, 0, 1, 0, 1, 0, 0, 0, 1, 1};
ok 1864 source4/torture/rpc/lsa.c if (!NT_STATUS_IS_OK(status) && ok[j]) {
ok 1868 source4/torture/rpc/lsa.c } else if (NT_STATUS_IS_OK(status) && !ok[j]) {
ok 1904 source4/torture/rpc/lsa.c if (!NT_STATUS_IS_OK(status) && ok[j]) {
ok 1908 source4/torture/rpc/lsa.c } else if (NT_STATUS_IS_OK(status) && !ok[j]) {
ok 1935 source4/torture/rpc/lsa.c if (!NT_STATUS_IS_OK(status) && ok[j]) {
ok 1939 source4/torture/rpc/lsa.c } else if (NT_STATUS_IS_OK(status) && !ok[j]) {
ok 1967 source4/torture/rpc/lsa.c if (!NT_STATUS_IS_OK(status) && ok[j]) {
ok 1971 source4/torture/rpc/lsa.c } else if (NT_STATUS_IS_OK(status) && !ok[j]) {
ok 216 source4/torture/winbind/struct_based.c bool ok;
ok 224 source4/torture/winbind/struct_based.c ok = true;
ok 226 source4/torture/winbind/struct_based.c NSS_STATUS_SUCCESS, strict, ok = false,
ok 229 source4/torture/winbind/struct_based.c if (!ok) {
ok 337 source4/torture/winbind/struct_based.c bool ok;
ok 371 source4/torture/winbind/struct_based.c ok = get_trusted_domains(torture, &listd);
ok 372 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get trust list");
ok 390 source4/torture/winbind/struct_based.c ok = dom_sid_equal(builtin_sid,
ok 392 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "BUILTIN domain should have S-1-5-32");
ok 408 source4/torture/winbind/struct_based.c bool ok;
ok 414 source4/torture/winbind/struct_based.c ok = get_trusted_domains(torture, &listd);
ok 415 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get trust list");
ok 443 source4/torture/winbind/struct_based.c ok = dom_sid_equal(listd[i].sid, sid);
ok 444 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "SID's doesn't match");
ok 475 source4/torture/winbind/struct_based.c bool ok;
ok 482 source4/torture/winbind/struct_based.c ok = get_trusted_domains(torture, &listd);
ok 483 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get trust list");
ok 494 source4/torture/winbind/struct_based.c ok = true;
ok 497 source4/torture/winbind/struct_based.c (i <2 || strict), ok = false,
ok 500 source4/torture/winbind/struct_based.c if (!ok) continue;
ok 517 source4/torture/winbind/struct_based.c bool ok;
ok 525 source4/torture/winbind/struct_based.c ok = get_trusted_domains(torture, &listd);
ok 526 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get trust list");
ok 550 source4/torture/winbind/struct_based.c ok = true;
ok 553 source4/torture/winbind/struct_based.c strict, ok = false,
ok 556 source4/torture/winbind/struct_based.c if (!ok) continue;
ok 615 source4/torture/winbind/struct_based.c bool ok;
ok 619 source4/torture/winbind/struct_based.c ok = get_user_list(torture, &users);
ok 620 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get group list");
ok 665 source4/torture/winbind/struct_based.c bool ok;
ok 669 source4/torture/winbind/struct_based.c ok = get_group_list(torture, &groups);
ok 670 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get group list");
ok 744 source4/torture/winbind/struct_based.c bool ok;
ok 751 source4/torture/winbind/struct_based.c ok = get_sequence_numbers(torture, &s);
ok 752 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get list of sequence numbers");
ok 754 source4/torture/winbind/struct_based.c ok = get_trusted_domains(torture, &domlist);
ok 755 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get trust list");
ok 959 source4/torture/winbind/struct_based.c bool ok;
ok 963 source4/torture/winbind/struct_based.c ok = get_user_list(torture, &users);
ok 964 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to retrieve list of users");
ok 967 source4/torture/winbind/struct_based.c ok = get_group_list(torture, &groups);
ok 968 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to retrieve list of groups");
ok 976 source4/torture/winbind/struct_based.c ok = true;
ok 980 source4/torture/winbind/struct_based.c ok=false,
ok 1005 source4/torture/winbind/struct_based.c ok = true;
ok 1009 source4/torture/winbind/struct_based.c ok=false,
ok 80 source4/winbind/wb_cmd_getgrnam.c bool ok;
ok 88 source4/winbind/wb_cmd_getgrnam.c ok = wb_samba3_split_username(state, state->service->task->lp_ctx,
ok 90 source4/winbind/wb_cmd_getgrnam.c if(!ok){
ok 81 source4/winbind/wb_cmd_getpwnam.c bool ok;
ok 89 source4/winbind/wb_cmd_getpwnam.c ok= wb_samba3_split_username(state, state->service->task->lp_ctx, state->name, &user_dom, &user_name);
ok 90 source4/winbind/wb_cmd_getpwnam.c if(!ok){
ok 45 source4/winbind/wb_name2domain.c bool ok;
ok 58 source4/winbind/wb_name2domain.c ok = wb_samba3_split_username(state, service->task->lp_ctx, name, &user_dom, &user_name);
ok 59 source4/winbind/wb_name2domain.c if(!ok) {