ok 261 lib/nss_wrapper/nss_wrapper.c bool ok; ok 283 lib/nss_wrapper/nss_wrapper.c ok = nwrap->parse_line(nwrap, line); ok 284 lib/nss_wrapper/nss_wrapper.c if (!ok) { ok 311 lib/nss_wrapper/nss_wrapper.c bool ok; ok 360 lib/nss_wrapper/nss_wrapper.c ok = nwrap_parse_file(nwrap); ok 361 lib/nss_wrapper/nss_wrapper.c if (!ok) { ok 289 libcli/nbt/nbtname.c bool ok; ok 316 libcli/nbt/nbtname.c ok = decompress_name(cname, &r->type); ok 317 libcli/nbt/nbtname.c if (!ok) { ok 1345 nsswitch/wbinfo.c bool ok; ok 1347 nsswitch/wbinfo.c ok = SMBencrypt(pass, params.password.response.challenge, ok 1349 nsswitch/wbinfo.c if (!ok) { ok 3400 source3/client/client.c bool ok; ok 3403 source3/client/client.c ok = next_token_talloc(ctx, &cmd_ptr,&buf,NULL); ok 3404 source3/client/client.c if (ok && (sys_stat(buf,&sbuf) == 0)) { ok 3412 source3/client/client.c if (ok && newer_than == 0) { ok 372 source3/libads/sasl.c bool ok; ok 523 source3/libads/sasl.c ok = spnego_parse_auth_response(wrapped, NT_STATUS_OK, ok 527 source3/libads/sasl.c if (!ok) { ok 392 source3/libsmb/cliconnect.c bool ok; ok 503 source3/libsmb/cliconnect.c ok = cli_simple_set_signing(cli, session_key, lm_response); ok 505 source3/libsmb/cliconnect.c ok = cli_simple_set_signing(cli, session_key, nt_response); ok 507 source3/libsmb/cliconnect.c if (ok) { ok 734 source3/libsmb/nmblib.c bool ok=False; ok 752 source3/libsmb/nmblib.c ok = parse_nmb(buf,length,&p->packet.nmb); ok 756 source3/libsmb/nmblib.c ok = parse_dgram(buf,length,&p->packet.dgram); ok 760 source3/libsmb/nmblib.c if (!ok) { ok 299 source3/locking/locking.c bool ok = False; ok 318 source3/locking/locking.c ok = brl_unlock(msg_ctx, ok 328 source3/locking/locking.c if (!ok) { ok 348 source3/locking/locking.c bool ok = False; ok 368 source3/locking/locking.c ok = brl_lock_cancel(br_lck, ok 378 source3/locking/locking.c if (!ok) { ok 80 source3/passdb/lookup_sid.c goto ok; ok 94 source3/passdb/lookup_sid.c goto ok; ok 106 source3/passdb/lookup_sid.c goto ok; ok 112 source3/passdb/lookup_sid.c goto ok; ok 121 source3/passdb/lookup_sid.c goto ok; ok 143 source3/passdb/lookup_sid.c goto ok; ok 155 source3/passdb/lookup_sid.c goto ok; ok 171 source3/passdb/lookup_sid.c goto ok; ok 187 source3/passdb/lookup_sid.c goto ok; ok 199 source3/passdb/lookup_sid.c goto ok; ok 211 source3/passdb/lookup_sid.c goto ok; ok 225 source3/passdb/lookup_sid.c goto ok; ok 241 source3/passdb/lookup_sid.c goto ok; ok 257 source3/passdb/lookup_sid.c goto ok; ok 275 source3/passdb/lookup_sid.c goto ok; ok 286 source3/passdb/lookup_sid.c goto ok; ok 292 source3/passdb/lookup_sid.c goto ok; ok 302 source3/passdb/lookup_sid.c ok: ok 308 source3/passdb/pdb_tdb.c bool ok = false; ok 310 source3/passdb/pdb_tdb.c ok = dbwrap_fetch_uint32(db, NEXT_RID_STRING, &rid); ok 311 source3/passdb/pdb_tdb.c if (ok) { ok 319 source3/passdb/pdb_tdb.c ok = tdb_fetch_uint32(tdb, "RID_COUNTER", &rid); ok 320 source3/passdb/pdb_tdb.c if (!ok) { ok 5761 source3/printing/nt_printing.c bool ok = False; ok 5770 source3/printing/nt_printing.c ok = True; ok 5776 source3/printing/nt_printing.c ok = True; ok 5780 source3/printing/nt_printing.c if (!ok) ok 5783 source3/printing/nt_printing.c return ok; ok 1176 source3/smbd/lanman.c bool ok = True; ok 1230 source3/smbd/lanman.c ok = False; ok 1238 source3/smbd/lanman.c ok = False; ok 1244 source3/smbd/lanman.c ok = False; ok 1250 source3/smbd/lanman.c ok = False; ok 1254 source3/smbd/lanman.c ok = False; ok 1260 source3/smbd/lanman.c if (ok) { ok 678 source3/smbd/password.c bool ok = False; ok 702 source3/smbd/password.c if (!ok) { ok 716 source3/smbd/password.c !ok && auser; ok 724 source3/smbd/password.c ok = True; ok 736 source3/smbd/password.c if (!ok && lp_username(snum)) { ok 756 source3/smbd/password.c auser && !ok; ok 761 source3/smbd/password.c ok = True; ok 772 source3/smbd/password.c ok = True; ok 786 source3/smbd/password.c if (!ok && GUEST_OK(snum)) { ok 793 source3/smbd/password.c ok = True; ok 804 source3/smbd/password.c if (ok && !user_ok(user, snum)) { ok 806 source3/smbd/password.c ok = False; ok 809 source3/smbd/password.c return(ok); ok 309 source3/smbd/sesssetup.c bool ok = make_krb5_skew_error(&ap_rep); ok 310 source3/smbd/sesssetup.c if (!ok) { ok 31 source3/torture/t_asn1.c bool ok = True; ok 47 source3/torture/t_asn1.c ok = False; ok 56 source3/torture/t_asn1.c ok = False; ok 60 source3/torture/t_asn1.c ok = False; ok 64 source3/torture/t_asn1.c return ok ? 0 : 1; ok 5419 source3/torture/torture.c bool ok = true; ok 5421 source3/torture/torture.c ok &= subst_test("%U", "bla", "", -1, -1, "bla"); ok 5422 source3/torture/torture.c ok &= subst_test("%u%U", "bla", "", -1, -1, "blabla"); ok 5423 source3/torture/torture.c ok &= subst_test("%g", "", "", -1, -1, "NO_GROUP"); ok 5424 source3/torture/torture.c ok &= subst_test("%G", "", "", -1, -1, "NO_GROUP"); ok 5425 source3/torture/torture.c ok &= subst_test("%g", "", "", -1, 0, gidtoname(0)); ok 5426 source3/torture/torture.c ok &= subst_test("%G", "", "", -1, 0, gidtoname(0)); ok 5427 source3/torture/torture.c ok &= subst_test("%D%u", "u", "dom", -1, 0, "domu"); ok 5428 source3/torture/torture.c ok &= subst_test("%i %I", "", "", -1, -1, "0.0.0.0 0.0.0.0"); ok 5432 source3/torture/torture.c ok &= (strcmp(talloc_sub_basic(talloc_tos(), "BLA", "dom", "%U%D"), ok 5435 source3/torture/torture.c return ok; ok 405 source4/auth/gensec/spnego.c bool ok; ok 413 source4/auth/gensec/spnego.c ok = spnego_write_mech_types(spnego_state, ok 416 source4/auth/gensec/spnego.c if (!ok) { ok 580 source4/auth/gensec/spnego.c bool ok; ok 621 source4/auth/gensec/spnego.c ok = spnego_write_mech_types(spnego_state, ok 624 source4/auth/gensec/spnego.c if (!ok) { ok 1308 source4/dsdb/samdb/ldb_modules/password_hash.c bool ok; ok 1392 source4/dsdb/samdb/ldb_modules/password_hash.c ok = E_deshash((char *)cleartext_unix, lm_hash->hash); ok 1393 source4/dsdb/samdb/ldb_modules/password_hash.c if (ok) { ok 218 source4/heimdal/lib/hcrypto/rand-fortuna.c int ok; ok 225 source4/heimdal/lib/hcrypto/rand-fortuna.c ok = 0; ok 227 source4/heimdal/lib/hcrypto/rand-fortuna.c ok = 1; ok 231 source4/heimdal/lib/hcrypto/rand-fortuna.c ok = 1; ok 234 source4/heimdal/lib/hcrypto/rand-fortuna.c ok = 1; ok 237 source4/heimdal/lib/hcrypto/rand-fortuna.c if (ok) ok 242 source4/heimdal/lib/hcrypto/rand-fortuna.c return ok; ok 785 source4/lib/wmi/wmi_wrap.c PyObject *PyBool_FromLong(long ok) ok 787 source4/lib/wmi/wmi_wrap.c PyObject *result = ok ? Py_True : Py_False; ok 154 source4/libnet/libnet_vampire.c bool ok; ok 344 source4/libnet/libnet_vampire.c ok = samdb_set_ntds_invocation_id(s->ldb, &c->dest_dsa->invocation_id); ok 345 source4/libnet/libnet_vampire.c if (!ok) { ok 349 source4/libnet/libnet_vampire.c ok = samdb_set_ntds_objectGUID(s->ldb, &c->dest_dsa->ntds_guid); ok 350 source4/libnet/libnet_vampire.c if (!ok) { ok 43 source4/torture/ldap/uptodatevector.c bool ok = true; ok 145 source4/torture/ldap/uptodatevector.c ok = false; ok 151 source4/torture/ldap/uptodatevector.c return ok; ok 142 source4/torture/libnet/libnet_BecomeDC.c bool ok; ok 334 source4/torture/libnet/libnet_BecomeDC.c ok = samdb_set_ntds_invocation_id(s->ldb, &c->dest_dsa->invocation_id); ok 335 source4/torture/libnet/libnet_BecomeDC.c if (!ok) { ok 339 source4/torture/libnet/libnet_BecomeDC.c ok = samdb_set_ntds_objectGUID(s->ldb, &c->dest_dsa->ntds_guid); ok 340 source4/torture/libnet/libnet_BecomeDC.c if (!ok) { ok 56 source4/torture/raw/streams.c bool ok; \ ok 58 source4/torture/raw/streams.c ok = false; \ ok 60 source4/torture/raw/streams.c ok = false; \ ok 62 source4/torture/raw/streams.c ok = true; \ ok 64 source4/torture/raw/streams.c ok = true; \ ok 66 source4/torture/raw/streams.c ok = false; \ ok 68 source4/torture/raw/streams.c if (!ok) { \ ok 566 source4/torture/rpc/dssync.c bool ok; ok 567 source4/torture/rpc/dssync.c ok = file_save(fname, plain_data.data, plain_data.length); ok 568 source4/torture/rpc/dssync.c if (!ok) { ok 1836 source4/torture/rpc/lsa.c int ok[] = {1, 0, 1, 0, 0, 1, 0, 1, 0, 0, 0, 1, 1}; ok 1864 source4/torture/rpc/lsa.c if (!NT_STATUS_IS_OK(status) && ok[j]) { ok 1868 source4/torture/rpc/lsa.c } else if (NT_STATUS_IS_OK(status) && !ok[j]) { ok 1904 source4/torture/rpc/lsa.c if (!NT_STATUS_IS_OK(status) && ok[j]) { ok 1908 source4/torture/rpc/lsa.c } else if (NT_STATUS_IS_OK(status) && !ok[j]) { ok 1935 source4/torture/rpc/lsa.c if (!NT_STATUS_IS_OK(status) && ok[j]) { ok 1939 source4/torture/rpc/lsa.c } else if (NT_STATUS_IS_OK(status) && !ok[j]) { ok 1967 source4/torture/rpc/lsa.c if (!NT_STATUS_IS_OK(status) && ok[j]) { ok 1971 source4/torture/rpc/lsa.c } else if (NT_STATUS_IS_OK(status) && !ok[j]) { ok 216 source4/torture/winbind/struct_based.c bool ok; ok 224 source4/torture/winbind/struct_based.c ok = true; ok 226 source4/torture/winbind/struct_based.c NSS_STATUS_SUCCESS, strict, ok = false, ok 229 source4/torture/winbind/struct_based.c if (!ok) { ok 337 source4/torture/winbind/struct_based.c bool ok; ok 371 source4/torture/winbind/struct_based.c ok = get_trusted_domains(torture, &listd); ok 372 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get trust list"); ok 390 source4/torture/winbind/struct_based.c ok = dom_sid_equal(builtin_sid, ok 392 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "BUILTIN domain should have S-1-5-32"); ok 408 source4/torture/winbind/struct_based.c bool ok; ok 414 source4/torture/winbind/struct_based.c ok = get_trusted_domains(torture, &listd); ok 415 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get trust list"); ok 443 source4/torture/winbind/struct_based.c ok = dom_sid_equal(listd[i].sid, sid); ok 444 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "SID's doesn't match"); ok 475 source4/torture/winbind/struct_based.c bool ok; ok 482 source4/torture/winbind/struct_based.c ok = get_trusted_domains(torture, &listd); ok 483 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get trust list"); ok 494 source4/torture/winbind/struct_based.c ok = true; ok 497 source4/torture/winbind/struct_based.c (i <2 || strict), ok = false, ok 500 source4/torture/winbind/struct_based.c if (!ok) continue; ok 517 source4/torture/winbind/struct_based.c bool ok; ok 525 source4/torture/winbind/struct_based.c ok = get_trusted_domains(torture, &listd); ok 526 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get trust list"); ok 550 source4/torture/winbind/struct_based.c ok = true; ok 553 source4/torture/winbind/struct_based.c strict, ok = false, ok 556 source4/torture/winbind/struct_based.c if (!ok) continue; ok 615 source4/torture/winbind/struct_based.c bool ok; ok 619 source4/torture/winbind/struct_based.c ok = get_user_list(torture, &users); ok 620 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get group list"); ok 665 source4/torture/winbind/struct_based.c bool ok; ok 669 source4/torture/winbind/struct_based.c ok = get_group_list(torture, &groups); ok 670 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get group list"); ok 744 source4/torture/winbind/struct_based.c bool ok; ok 751 source4/torture/winbind/struct_based.c ok = get_sequence_numbers(torture, &s); ok 752 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get list of sequence numbers"); ok 754 source4/torture/winbind/struct_based.c ok = get_trusted_domains(torture, &domlist); ok 755 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to get trust list"); ok 959 source4/torture/winbind/struct_based.c bool ok; ok 963 source4/torture/winbind/struct_based.c ok = get_user_list(torture, &users); ok 964 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to retrieve list of users"); ok 967 source4/torture/winbind/struct_based.c ok = get_group_list(torture, &groups); ok 968 source4/torture/winbind/struct_based.c torture_assert(torture, ok, "failed to retrieve list of groups"); ok 976 source4/torture/winbind/struct_based.c ok = true; ok 980 source4/torture/winbind/struct_based.c ok=false, ok 1005 source4/torture/winbind/struct_based.c ok = true; ok 1009 source4/torture/winbind/struct_based.c ok=false, ok 80 source4/winbind/wb_cmd_getgrnam.c bool ok; ok 88 source4/winbind/wb_cmd_getgrnam.c ok = wb_samba3_split_username(state, state->service->task->lp_ctx, ok 90 source4/winbind/wb_cmd_getgrnam.c if(!ok){ ok 81 source4/winbind/wb_cmd_getpwnam.c bool ok; ok 89 source4/winbind/wb_cmd_getpwnam.c ok= wb_samba3_split_username(state, state->service->task->lp_ctx, state->name, &user_dom, &user_name); ok 90 source4/winbind/wb_cmd_getpwnam.c if(!ok){ ok 45 source4/winbind/wb_name2domain.c bool ok; ok 58 source4/winbind/wb_name2domain.c ok = wb_samba3_split_username(state, service->task->lp_ctx, name, &user_dom, &user_name); ok 59 source4/winbind/wb_name2domain.c if(!ok) {