admin 66 source4/torture/rpc/dssync.c } admin;
admin 103 source4/torture/rpc/dssync.c ctx->admin.credentials = cmdline_credentials;
admin 105 source4/torture/rpc/dssync.c our_bind_info28 = &ctx->admin.drsuapi.our_bind_info28;
admin 112 source4/torture/rpc/dssync.c our_bind_info_ctr = &ctx->admin.drsuapi.our_bind_info_ctr;
admin 116 source4/torture/rpc/dssync.c GUID_from_string(DRSUAPI_DS_BIND_GUID, &ctx->admin.drsuapi.bind_guid);
admin 118 source4/torture/rpc/dssync.c ctx->admin.drsuapi.req.in.bind_guid = &ctx->admin.drsuapi.bind_guid;
admin 119 source4/torture/rpc/dssync.c ctx->admin.drsuapi.req.in.bind_info = our_bind_info_ctr;
admin 120 source4/torture/rpc/dssync.c ctx->admin.drsuapi.req.out.bind_handle = &ctx->admin.drsuapi.bind_handle;
admin 278 source4/torture/rpc/dssync.c r.in.bind_handle = &ctx->admin.drsuapi.bind_handle;
admin 293 source4/torture/rpc/dssync.c status = dcerpc_drsuapi_DsCrackNames(ctx->admin.drsuapi.pipe, ctx, &r);
admin 297 source4/torture/rpc/dssync.c errstr = dcerpc_errstr(ctx, ctx->admin.drsuapi.pipe->last_fault_code);
admin 897 source4/torture/rpc/dssync.c ret &= _test_DsBind(torture, ctx, ctx->admin.credentials, &ctx->admin.drsuapi);
admin 901 source4/torture/rpc/dssync.c ret &= test_LDAPBind(torture, ctx, ctx->admin.credentials, &ctx->admin.ldap);
admin 478 source4/torture/rpc/srvsvc.c const char *sharename, bool admin)
admin 506 source4/torture/rpc/srvsvc.c if (admin) expected = levels[i].admin_status;
admin 730 source4/torture/rpc/srvsvc.c bool admin)
admin 796 source4/torture/rpc/srvsvc.c if (admin) expected = levels[i].admin_status;
admin 810 source4/torture/rpc/srvsvc.c if (!test_NetShareGetInfo(tctx, p, name, admin)) {
admin 833 source4/torture/rpc/srvsvc.c struct dcerpc_pipe *p, bool admin)
admin 893 source4/torture/rpc/srvsvc.c if (admin) expected = levels[i].admin_status;