tok               663 librpc/ndr/ndr.c 	struct ndr_token_list *tok;
tok               664 librpc/ndr/ndr.c 	tok = talloc(mem_ctx, struct ndr_token_list);
tok               665 librpc/ndr/ndr.c 	NDR_ERR_HAVE_NO_MEMORY(tok);
tok               666 librpc/ndr/ndr.c 	tok->key = key;
tok               667 librpc/ndr/ndr.c 	tok->value = value;
tok               668 librpc/ndr/ndr.c 	DLIST_ADD((*list), tok);
tok               678 librpc/ndr/ndr.c 	struct ndr_token_list *tok;
tok               679 librpc/ndr/ndr.c 	for (tok=*list;tok;tok=tok->next) {
tok               680 librpc/ndr/ndr.c 		if (_cmp_fn && _cmp_fn(tok->key,key)==0) goto found;
tok               681 librpc/ndr/ndr.c 		else if (!_cmp_fn && tok->key == key) goto found;
tok               685 librpc/ndr/ndr.c 	*v = tok->value;
tok               687 librpc/ndr/ndr.c 		DLIST_REMOVE((*list), tok);
tok               688 librpc/ndr/ndr.c 		talloc_free(tok);
tok               192 source3/auth/auth_sam.c 		char *tok;
tok               199 source3/auth/auth_sam.c 		while (next_token_talloc(mem_ctx, &s, &tok, ",")) {
tok               201 source3/auth/auth_sam.c 				  tok, user_info->wksta_name));
tok               202 source3/auth/auth_sam.c 			if(strequal(tok, user_info->wksta_name)) {
tok               206 source3/auth/auth_sam.c 			if (tok[0] == '+') {
tok               208 source3/auth/auth_sam.c 					machine_name, tok + 1));
tok               209 source3/auth/auth_sam.c 				if (user_in_group(machine_name, tok + 1)) {
tok               214 source3/auth/auth_sam.c 			TALLOC_FREE(tok);
tok               216 source3/auth/auth_sam.c 		TALLOC_FREE(tok);
tok                50 source3/client/client.c static int process_tok(char *tok);
tok              3987 source3/client/client.c static int process_tok(char *tok)
tok              3991 source3/client/client.c 	int tok_len = strlen(tok);
tok              3994 source3/client/client.c 		if (strequal(commands[i].name,tok)) {
tok              3998 source3/client/client.c 		} else if (strnequal(commands[i].name, tok, tok_len)) {
tok              4068 source3/client/client.c 		char *tok;
tok              4082 source3/client/client.c 		if (!next_token_talloc(ctx, &cmd_ptr,&tok,NULL)) {
tok              4086 source3/client/client.c 		if ((i = process_tok(tok)) >= 0) {
tok              4089 source3/client/client.c 			d_printf("%s: command abbreviation ambiguous\n",tok);
tok              4091 source3/client/client.c 			d_printf("%s: command not found\n",tok);
tok              4465 source3/client/client.c 		char *tok = NULL;
tok              4495 source3/client/client.c 		if (!next_token_talloc(frame, &cmd_ptr,&tok,NULL)) {
tok              4501 source3/client/client.c 		if ((i = process_tok(tok)) >= 0) {
tok              4504 source3/client/client.c 			d_printf("%s: command abbreviation ambiguous\n",tok);
tok              4506 source3/client/client.c 			d_printf("%s: command not found\n",tok);
tok                41 source3/client/clitar.c static int clipfind(char **aret, int ret, char *tok);
tok              1617 source3/client/clitar.c static int clipfind(char **aret, int ret, char *tok)
tok              1623 source3/client/clitar.c 	while(strchr_m("/\\.", *tok))
tok              1624 source3/client/clitar.c 		tok++;
tok              1633 source3/client/clitar.c 		if (!strslashcmp(pkey, tok))
tok                64 source3/include/debugparse.h  const char *dbg_token2string( dbg_Token tok );
tok               278 source3/include/proto.h bool client_match(const char *tok, const void *item);
tok              3481 source3/include/proto.h void set_delete_on_close_token(struct share_mode_lock *lck, const UNIX_USER_TOKEN *tok);
tok              3482 source3/include/proto.h void set_delete_on_close_lck(struct share_mode_lock *lck, bool delete_on_close, const UNIX_USER_TOKEN *tok);
tok              3483 source3/include/proto.h bool set_delete_on_close(files_struct *fsp, bool delete_on_close, const UNIX_USER_TOKEN *tok);
tok                19 source3/lib/access.c static bool masked_match(const char *tok, const char *slash, const char *s)
tok                30 source3/lib/access.c 	if (*tok == '[') {
tok                32 source3/lib/access.c 		tok_copy = SMB_STRDUP(tok+1);
tok                37 source3/lib/access.c 		tok_copy[PTR_DIFF(slash,tok)-1] = '\0';
tok                39 source3/lib/access.c 		tok_copy = SMB_STRDUP(tok);
tok                44 source3/lib/access.c 		tok_copy[PTR_DIFF(slash,tok)] = '\0';
tok                73 source3/lib/access.c static bool string_match(const char *tok,const char *s)
tok                93 source3/lib/access.c 	if (tok[0] == '.') {			/* domain: match last fields */
tok                94 source3/lib/access.c 		if ((str_len = strlen(s)) > (tok_len = strlen(tok))
tok                95 source3/lib/access.c 		    && strequal(tok, s + str_len - tok_len)) {
tok                98 source3/lib/access.c 	} else if (tok[0] == '@') { /* netgroup: look it up */
tok               132 source3/lib/access.c 		netgroup_ok = innetgr(tok + 1, hostname, (char *) 0, mydomain);
tok               137 source3/lib/access.c 			 tok+1,
tok               148 source3/lib/access.c 	} else if (strequal(tok, "ALL")) {	/* all: match any */
tok               150 source3/lib/access.c 	} else if (strequal(tok, "FAIL")) {	/* fail: match any */
tok               152 source3/lib/access.c 	} else if (strequal(tok, "LOCAL")) {	/* local: no dots */
tok               156 source3/lib/access.c 	} else if (strequal(tok, s)) {   /* match host name or address */
tok               158 source3/lib/access.c 	} else if (tok[(tok_len = strlen(tok)) - 1] == '.') {	/* network */
tok               159 source3/lib/access.c 		if (strncmp(tok, s, tok_len) == 0) {
tok               162 source3/lib/access.c 	} else if ((cut = strchr_m(tok, '/')) != 0) {	/* netnumber/netmask */
tok               163 source3/lib/access.c 		if ((isdigit(s[0]) && strchr_m(tok, '.') != NULL) ||
tok               164 source3/lib/access.c 			(tok[0] == '[' && cut > tok && cut[-1] == ']') ||
tok               166 source3/lib/access.c 				strchr_m(tok, ':') != NULL)) {
tok               169 source3/lib/access.c 			return masked_match(tok, cut, s);
tok               171 source3/lib/access.c 	} else if (strchr_m(tok, '*') != 0 || strchr_m(tok, '?')) {
tok               172 source3/lib/access.c 		return unix_wild_match(tok, s);
tok               178 source3/lib/access.c bool client_match(const char *tok, const void *item)
tok               187 source3/lib/access.c 	if (string_match(tok, client[ADDR_INDEX])) {
tok               192 source3/lib/access.c 			!strnequal(tok, "::ffff:",7)) {
tok               199 source3/lib/access.c 		if (string_match(tok, (client[ADDR_INDEX])+7)) {
tok               205 source3/lib/access.c 		if (string_match(tok, client[NAME_INDEX])) {
tok               392 source3/lib/util_sock.c 	char *tok;
tok               394 source3/lib/util_sock.c 	while (next_token_talloc(ctx, &options, &tok," \t,")) {
tok               400 source3/lib/util_sock.c 		if ((p = strchr_m(tok,'='))) {
tok               407 source3/lib/util_sock.c 			if (strequal(socket_options[i].name,tok))
tok               411 source3/lib/util_sock.c 			DEBUG(0,("Unknown socket option %s\n",tok));
tok               426 source3/lib/util_sock.c 					"does not take a value\n",tok));
tok               442 source3/lib/util_sock.c 				tok, strerror(errno) ));
tok               703 source3/lib/util_str.c 	char *tok = NULL;
tok               712 source3/lib/util_str.c 	while (next_token_talloc(frame, &list, &tok,LIST_SEP)) {
tok               714 source3/lib/util_str.c 			if (strcmp(tok,s) == 0) {
tok               719 source3/lib/util_str.c 			if (StrCaseCmp(tok,s) == 0) {
tok              2438 source3/lib/util_str.c 	char *tok;
tok              2460 source3/lib/util_str.c 	while (next_token_talloc(list, &str, &tok, sep)) {
tok              2482 source3/lib/util_str.c 		list[num] = tok;
tok                87 source3/libgpo/gpo_fetch.c 	char *tok;
tok                96 source3/libgpo/gpo_fetch.c 	while (next_token_talloc(mem_ctx, &unix_path, &tok, "/")) {
tok                97 source3/libgpo/gpo_fetch.c 		if (strequal(tok, GPO_CACHE_DIR)) {
tok               102 source3/libgpo/gpo_fetch.c 	while (next_token_talloc(mem_ctx, &unix_path, &tok, "/")) {
tok               103 source3/libgpo/gpo_fetch.c 		current_dir = talloc_asprintf_append_buffer(current_dir, "/%s", tok);
tok               265 source3/libsmb/libsmb_xattr.c 	char *tok;
tok               320 source3/libsmb/libsmb_xattr.c 	if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok               325 source3/libsmb/libsmb_xattr.c 	if (StrnCaseCmp(tok, "ALLOWED", strlen("ALLOWED")) == 0) {
tok               327 source3/libsmb/libsmb_xattr.c 	} else if (StrnCaseCmp(tok, "DENIED", strlen("DENIED")) == 0) {
tok               336 source3/libsmb/libsmb_xattr.c 	if (!(next_token_talloc(frame, &cp, &tok, "/") &&
tok               337 source3/libsmb/libsmb_xattr.c 	      sscanf(tok, "%i", &aflags))) {
tok               342 source3/libsmb/libsmb_xattr.c 	if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok               347 source3/libsmb/libsmb_xattr.c 	if (strncmp(tok, "0x", 2) == 0) {
tok               348 source3/libsmb/libsmb_xattr.c 		if (sscanf(tok, "%i", &amask) != 1) {
tok               356 source3/libsmb/libsmb_xattr.c 		if (strcmp(tok, v->perm) == 0) {
tok               362 source3/libsmb/libsmb_xattr.c 	p = tok;
tok               430 source3/libsmb/libsmb_xattr.c 	char *tok;
tok               438 source3/libsmb/libsmb_xattr.c 	while (next_token_talloc(ctx, &p, &tok, "\t,\r\n")) {
tok               440 source3/libsmb/libsmb_xattr.c 		if (StrnCaseCmp(tok,"REVISION:", 9) == 0) {
tok               441 source3/libsmb/libsmb_xattr.c 			revision = strtol(tok+9, NULL, 16);
tok               445 source3/libsmb/libsmb_xattr.c 		if (StrnCaseCmp(tok,"OWNER:", 6) == 0) {
tok               454 source3/libsmb/libsmb_xattr.c                                                    owner_sid, tok+6)) {
tok               461 source3/libsmb/libsmb_xattr.c 		if (StrnCaseCmp(tok,"OWNER+:", 7) == 0) {
tok               470 source3/libsmb/libsmb_xattr.c                                                    owner_sid, tok+7)) {
tok               477 source3/libsmb/libsmb_xattr.c 		if (StrnCaseCmp(tok,"GROUP:", 6) == 0) {
tok               486 source3/libsmb/libsmb_xattr.c                                                    group_sid, tok+6)) {
tok               493 source3/libsmb/libsmb_xattr.c 		if (StrnCaseCmp(tok,"GROUP+:", 7) == 0) {
tok               502 source3/libsmb/libsmb_xattr.c                                                    group_sid, tok+6)) {
tok               509 source3/libsmb/libsmb_xattr.c 		if (StrnCaseCmp(tok,"ACL:", 4) == 0) {
tok               511 source3/libsmb/libsmb_xattr.c 			if (!parse_ace(ipc_cli, pol, &ace, numeric, tok+4)) {
tok               512 source3/libsmb/libsmb_xattr.c 				DEBUG(5, ("Failed to parse ACL %s\n", tok));
tok               516 source3/libsmb/libsmb_xattr.c 				DEBUG(5, ("Failed to add ACL %s\n", tok));
tok               522 source3/libsmb/libsmb_xattr.c 		if (StrnCaseCmp(tok,"ACL+:", 5) == 0) {
tok               524 source3/libsmb/libsmb_xattr.c 			if (!parse_ace(ipc_cli, pol, &ace, False, tok+5)) {
tok               525 source3/libsmb/libsmb_xattr.c 				DEBUG(5, ("Failed to parse ACL %s\n", tok));
tok               529 source3/libsmb/libsmb_xattr.c 				DEBUG(5, ("Failed to add ACL %s\n", tok));
tok               606 source3/libsmb/libsmb_xattr.c 	char *tok = NULL;
tok               641 source3/libsmb/libsmb_xattr.c 	while (next_token_talloc(frame, &p, &tok, "\t,\r\n")) {
tok               642 source3/libsmb/libsmb_xattr.c 		if (StrnCaseCmp(tok, "MODE:", 5) == 0) {
tok               643 source3/libsmb/libsmb_xattr.c                         long request = strtol(tok+5, NULL, 16);
tok               655 source3/libsmb/libsmb_xattr.c 		if (StrnCaseCmp(tok, "SIZE:", 5) == 0) {
tok               656 source3/libsmb/libsmb_xattr.c                         dad->size = (SMB_OFF_T)atof(tok+5);
tok               661 source3/libsmb/libsmb_xattr.c                 if (StrnCaseCmp(tok, attr_strings.access_time_attr, n) == 0) {
tok               662 source3/libsmb/libsmb_xattr.c                         dad->access_time = (time_t)strtol(tok+n+1, NULL, 10);
tok               667 source3/libsmb/libsmb_xattr.c                 if (StrnCaseCmp(tok, attr_strings.change_time_attr, n) == 0) {
tok               668 source3/libsmb/libsmb_xattr.c                         dad->change_time = (time_t)strtol(tok+n+1, NULL, 10);
tok               673 source3/libsmb/libsmb_xattr.c                 if (StrnCaseCmp(tok, attr_strings.write_time_attr, n) == 0) {
tok               674 source3/libsmb/libsmb_xattr.c                         dad->write_time = (time_t)strtol(tok+n+1, NULL, 10);
tok               680 source3/libsmb/libsmb_xattr.c 			if (StrnCaseCmp(tok, attr_strings.create_time_attr,
tok               682 source3/libsmb/libsmb_xattr.c 				dad->create_time = (time_t)strtol(tok+n+1,
tok               688 source3/libsmb/libsmb_xattr.c 		if (StrnCaseCmp(tok, "INODE:", 6) == 0) {
tok               689 source3/libsmb/libsmb_xattr.c                         dad->inode = (SMB_INO_T)atof(tok+6);
tok              1496 source3/libsmb/namequery.c 	char *tok;
tok              1558 source3/libsmb/namequery.c 	while (next_token_talloc(frame, &ptr, &tok, LIST_SEP)) {
tok              1559 source3/libsmb/namequery.c 		if((strequal(tok, "host") || strequal(tok, "hosts"))) {
tok              1565 source3/libsmb/namequery.c 		} else if(strequal( tok, "kdc")) {
tok              1576 source3/libsmb/namequery.c 		} else if(strequal( tok, "ads")) {
tok              1584 source3/libsmb/namequery.c 		} else if(strequal( tok, "lmhosts")) {
tok              1590 source3/libsmb/namequery.c 		} else if(strequal( tok, "wins")) {
tok              1600 source3/libsmb/namequery.c 		} else if(strequal( tok, "bcast")) {
tok              1609 source3/libsmb/namequery.c 				tok));
tok              1319 source3/locking/locking.c static UNIX_USER_TOKEN *copy_unix_token(TALLOC_CTX *ctx, const UNIX_USER_TOKEN *tok)
tok              1323 source3/locking/locking.c 	if (tok == NULL) {
tok              1332 source3/locking/locking.c 	cpy->uid = tok->uid;
tok              1333 source3/locking/locking.c 	cpy->gid = tok->gid;
tok              1334 source3/locking/locking.c 	cpy->ngroups = tok->ngroups;
tok              1335 source3/locking/locking.c 	if (tok->ngroups) {
tok              1337 source3/locking/locking.c 		cpy->groups = TALLOC_ARRAY(cpy, gid_t, tok->ngroups);
tok              1341 source3/locking/locking.c 		memcpy(cpy->groups, tok->groups, tok->ngroups * sizeof(gid_t));
tok              1350 source3/locking/locking.c void set_delete_on_close_token(struct share_mode_lock *lck, const UNIX_USER_TOKEN *tok)
tok              1355 source3/locking/locking.c 	lck->delete_token = copy_unix_token(lck, tok);
tok              1370 source3/locking/locking.c void set_delete_on_close_lck(struct share_mode_lock *lck, bool delete_on_close, const UNIX_USER_TOKEN *tok)
tok              1373 source3/locking/locking.c 		set_delete_on_close_token(lck, tok);
tok              1382 source3/locking/locking.c bool set_delete_on_close(files_struct *fsp, bool delete_on_close, const UNIX_USER_TOKEN *tok)
tok              1399 source3/locking/locking.c 		tok_copy = copy_unix_token(lck, tok);
tok              1405 source3/locking/locking.c 		tok = tok_copy;
tok              1408 source3/locking/locking.c 	set_delete_on_close_lck(lck, delete_on_close, tok);
tok               197 source3/passdb/pdb_ldap.c 	char *tok;
tok               295 source3/passdb/pdb_ldap.c 	if (!next_token_talloc(mem_ctx, &p, &tok, "#")) {
tok               300 source3/passdb/pdb_ldap.c 	p = tok;
tok                30 source3/printing/lpq_parse.c static time_t EntryTime(char *tok[], int ptr, int count, int minimum)
tok                40 source3/printing/lpq_parse.c 			if (!strncmp(tok[ptr], Months[i],3)) {
tok                51 source3/printing/lpq_parse.c 			day = atoi(tok[ptr+1]);
tok                52 source3/printing/lpq_parse.c 			fstrcpy(c,tok[ptr+2]);
tok               126 source3/printing/lpq_parse.c 	char *tok[MAXTOK];
tok               148 source3/printing/lpq_parse.c 	tok[0] = strtok_r(line2," \t", &saveptr);
tok               152 source3/printing/lpq_parse.c 	       && ((tok[count] = strtok_r(NULL, " \t", &saveptr)) != NULL)) {
tok               162 source3/printing/lpq_parse.c 	if (!isdigit((int)*tok[JOBTOK]) || !isdigit((int)*tok[TOTALTOK])) {
tok               166 source3/printing/lpq_parse.c 	buf->job = atoi(tok[JOBTOK]);
tok               167 source3/printing/lpq_parse.c 	buf->size = atoi(tok[TOTALTOK]);
tok               168 source3/printing/lpq_parse.c 	buf->status = strequal(tok[RANKTOK],"active")?LPQ_PRINTING:LPQ_QUEUED;
tok               170 source3/printing/lpq_parse.c 	fstrcpy(buf->fs_user,tok[USERTOK]);
tok               171 source3/printing/lpq_parse.c 	fstrcpy(buf->fs_file,tok[FILETOK]);
tok               181 source3/printing/lpq_parse.c 			fstrcat(buf->fs_file, tok[i]);
tok               188 source3/printing/lpq_parse.c 	buf->priority = atoi(tok[PRIOTOK]);
tok               345 source3/printing/lpq_parse.c 	char *tok[11];
tok               356 source3/printing/lpq_parse.c 			next_token_talloc(frame,&cline,&tok[count],NULL); count++) {
tok               362 source3/printing/lpq_parse.c 		if ((count == 7) && ((strcmp(tok[0],"QUEUED") == 0) || (strcmp(tok[0],"HELD") == 0))) {
tok               364 source3/printing/lpq_parse.c 			if (!isdigit((int)*tok[1]) || !isdigit((int)*tok[4])) {
tok               368 source3/printing/lpq_parse.c 			buf->size = atoi(tok[4]) * 1024;
tok               370 source3/printing/lpq_parse.c 			if (strchr_m(tok[2],' ')) {
tok               371 source3/printing/lpq_parse.c 				tok[2] = talloc_strdup(frame,"STDIN");
tok               372 source3/printing/lpq_parse.c 				if (!tok[2]) {
tok               380 source3/printing/lpq_parse.c 				char *p = strrchr_m(tok[2],'/');
tok               382 source3/printing/lpq_parse.c 					tok[2] = p+1;
tok               386 source3/printing/lpq_parse.c 			buf->job = atoi(tok[1]);
tok               387 source3/printing/lpq_parse.c 			buf->status = strequal(tok[0],"HELD")?LPQ_PAUSED:LPQ_QUEUED;
tok               390 source3/printing/lpq_parse.c 			fstrcpy(buf->fs_user,tok[3]);
tok               391 source3/printing/lpq_parse.c 			fstrcpy(buf->fs_file,tok[2]);
tok               399 source3/printing/lpq_parse.c 		if (!isdigit((int)*tok[3]) || !isdigit((int)*tok[8])) {
tok               404 source3/printing/lpq_parse.c 		buf->size = atoi(tok[8]) * 1024;
tok               406 source3/printing/lpq_parse.c 		if (strchr_m(tok[4],' ')) {
tok               407 source3/printing/lpq_parse.c 			tok[4] = talloc_strdup(frame,"STDIN");
tok               408 source3/printing/lpq_parse.c 			if (!tok[4]) {
tok               416 source3/printing/lpq_parse.c 			char *p = strrchr_m(tok[4],'/');
tok               418 source3/printing/lpq_parse.c 				tok[4] = p+1;
tok               422 source3/printing/lpq_parse.c 		buf->job = atoi(tok[3]);
tok               423 source3/printing/lpq_parse.c 		buf->status = strequal(tok[2],"RUNNING")?LPQ_PRINTING:LPQ_QUEUED;
tok               426 source3/printing/lpq_parse.c 		fstrcpy(buf->fs_user,tok[5]);
tok               427 source3/printing/lpq_parse.c 		fstrcpy(buf->fs_file,tok[4]);
tok               460 source3/printing/lpq_parse.c 	char *tok[12];
tok               483 source3/printing/lpq_parse.c 				next_token_talloc(frame, &cline, &tok[count],NULL);
tok               494 source3/printing/lpq_parse.c 		if (!isdigit((int)*tok[1])) {
tok               500 source3/printing/lpq_parse.c 		if (strchr_m(tok[0],' ')) {
tok               501 source3/printing/lpq_parse.c 			tok[0] = talloc_strdup(frame, "STDIN");
tok               502 source3/printing/lpq_parse.c 			if (!tok[0]) {
tok               508 source3/printing/lpq_parse.c 		buf->size = atoi(tok[1]);
tok               509 source3/printing/lpq_parse.c 		fstrcpy(buf->fs_file,tok[0]);
tok               539 source3/printing/lpq_parse.c 				next_token_talloc(frame, &cline, &tok[count],NULL);
tok               552 source3/printing/lpq_parse.c 		if (!isdigit((int)*tok[1]) || !isdigit((int)*tok[4]) || !isdigit((int)*tok[6])) {
tok               556 source3/printing/lpq_parse.c 		jobid = atoi(tok[1]);
tok               558 source3/printing/lpq_parse.c 		jobuser = SMB_STRDUP(tok[2]);
tok               559 source3/printing/lpq_parse.c 		jobprio = atoi(tok[4]);
tok               562 source3/printing/lpq_parse.c 		jobtime=EntryTime(tok, 5, count, 8);
tok               569 source3/printing/lpq_parse.c 			if ((count >8) && (((strequal(tok[8],"on")) ||
tok               570 source3/printing/lpq_parse.c 					((strequal(tok[8],"from")) && 
tok               571 source3/printing/lpq_parse.c 					((count > 10)&&(strequal(tok[10],"on"))))))) {
tok               594 source3/printing/lpq_parse.c 	char *tok[9];
tok               627 source3/printing/lpq_parse.c 			next_token_talloc(frame, &cline, &tok[count],NULL);
tok               639 source3/printing/lpq_parse.c 	if (!isdigit((int)*tok[1]) || !isdigit((int)*tok[3])) {
tok               643 source3/printing/lpq_parse.c 	if (!isdigit((int)*tok[5])) {
tok               649 source3/printing/lpq_parse.c 	if ((p=strchr_m(tok[2],'!'))) {
tok               650 source3/printing/lpq_parse.c 		tok[2] = p+1;
tok               653 source3/printing/lpq_parse.c 	buf->job = atoi(tok[1]);
tok               654 source3/printing/lpq_parse.c 	buf->size = atoi(tok[3]);
tok               655 source3/printing/lpq_parse.c 	if (count > 7 && strequal(tok[7],"on")) {
tok               657 source3/printing/lpq_parse.c 	} else if (count > 8 && strequal(tok[7],"being") && strequal(tok[8],"held")) {
tok               663 source3/printing/lpq_parse.c 	buf->time = EntryTime(tok, 4, count, 7);
tok               664 source3/printing/lpq_parse.c 	fstrcpy(buf->fs_user,tok[2]);
tok               665 source3/printing/lpq_parse.c 	fstrcpy(buf->fs_file,tok[2]);
tok               683 source3/printing/lpq_parse.c 	char *tok[7];
tok               703 source3/printing/lpq_parse.c 			next_token_talloc(frame,&cline,&tok[count],NULL);
tok               715 source3/printing/lpq_parse.c 	if (!isdigit((int)*tok[2]) || !isdigit((int)*tok[4])) {
tok               722 source3/printing/lpq_parse.c 		char *p = strrchr_m(tok[6],'/');
tok               724 source3/printing/lpq_parse.c 			tok[6] = p+1;
tok               728 source3/printing/lpq_parse.c 	buf->job = atoi(tok[2]);
tok               729 source3/printing/lpq_parse.c 	buf->size = atoi(tok[4]);
tok               730 source3/printing/lpq_parse.c 	buf->status = strequal(tok[3],"active")?LPQ_PRINTING:LPQ_QUEUED;
tok               733 source3/printing/lpq_parse.c 	fstrcpy(buf->fs_user,tok[1]);
tok               734 source3/printing/lpq_parse.c 	fstrcpy(buf->fs_file,tok[6]);
tok               755 source3/printing/lpq_parse.c 	char *tok[11];
tok               766 source3/printing/lpq_parse.c 			next_token_talloc(frame,&cline,&tok[count],NULL);
tok               778 source3/printing/lpq_parse.c 	if (strcmp(tok[0],"active") && !isdigit((int)tok[0][0])) {
tok               784 source3/printing/lpq_parse.c 	if (!isdigit((int)*tok[4]) || !isdigit((int)*tok[7])) {
tok               790 source3/printing/lpq_parse.c 	if (strchr_m(tok[6],' ')) {
tok               791 source3/printing/lpq_parse.c 		tok[6] = talloc_strdup(frame, "STDIN");
tok               792 source3/printing/lpq_parse.c 		if (!tok[6]) {
tok               801 source3/printing/lpq_parse.c 		char *p = strrchr_m(tok[6],'/');
tok               804 source3/printing/lpq_parse.c 			fstrcpy(tok[6],tmp);
tok               808 source3/printing/lpq_parse.c 	buf->job = atoi(tok[4]);
tok               810 source3/printing/lpq_parse.c 	buf->size = atoi(tok[7]);
tok               811 source3/printing/lpq_parse.c 	if (strchr_m(tok[7],'K')) {
tok               814 source3/printing/lpq_parse.c 	if (strchr_m(tok[7],'M')) {
tok               818 source3/printing/lpq_parse.c 	buf->status = strequal(tok[0],"active")?LPQ_PRINTING:LPQ_QUEUED;
tok               821 source3/printing/lpq_parse.c 	fstrcpy(buf->fs_user,tok[1]);
tok               822 source3/printing/lpq_parse.c 	fstrcpy(buf->fs_file,tok[6]);
tok              1009 source3/printing/lpq_parse.c 	char *tok;
tok              1022 source3/printing/lpq_parse.c 	while(next_token_talloc(frame, &cline, &tok, NULL)) {
tok              1025 source3/printing/lpq_parse.c 			buf->job = atoi(tok);
tok              1028 source3/printing/lpq_parse.c 			buf->size = atoi(tok);
tok              1031 source3/printing/lpq_parse.c 			buf->status = atoi(tok);
tok              1034 source3/printing/lpq_parse.c 			buf->time = atoi(tok);
tok              1037 source3/printing/lpq_parse.c 			fstrcpy(buf->fs_user, tok);
tok              1040 source3/printing/lpq_parse.c 			fstrcpy(buf->fs_file, tok);
tok               543 source3/smbd/server.c 			char *tok;
tok               554 source3/smbd/server.c 			     next_token_talloc(talloc_tos(),&ptr, &tok, " \t,");) {
tok               555 source3/smbd/server.c 				unsigned port = atoi(tok);
tok               569 source3/smbd/server.c 		char *tok;
tok               586 source3/smbd/server.c 			for (ptr=ports; next_token_talloc(talloc_tos(), &ptr, &tok, " \t,"); ) {
tok               589 source3/smbd/server.c 				unsigned port = atoi(tok);
tok               167 source3/utils/debug2html.c static void charprint( dbg_Token tok, int c )
tok               179 source3/utils/debug2html.c   switch( tok )
tok                47 source3/utils/debugparse.c const char *dbg_token2string( dbg_Token tok )
tok                62 source3/utils/debugparse.c   switch( tok )
tok               488 source3/utils/net_rpc_printer.c 	char *tok;
tok               497 source3/utils/net_rpc_printer.c 	while (next_token_talloc(mem_ctx, &p, &tok, "\\")) {
tok               498 source3/utils/net_rpc_printer.c 		if (strequal(tok, short_archi)) {
tok               156 source3/utils/sharesec.c 	char *tok;
tok               199 source3/utils/sharesec.c 	if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok               207 source3/utils/sharesec.c 	if (strncmp(tok, "ALLOWED", strlen("ALLOWED")) == 0) {
tok               209 source3/utils/sharesec.c 	} else if (strncmp(tok, "DENIED", strlen("DENIED")) == 0) {
tok               213 source3/utils/sharesec.c 			"entry at '%s'\n", orig_str, tok);
tok               222 source3/utils/sharesec.c 	if (!(next_token_talloc(frame, &cp, &tok, "/") &&
tok               223 source3/utils/sharesec.c 	      sscanf(tok, "%i", &aflags) && aflags == 0)) {
tok               225 source3/utils/sharesec.c 			orig_str, tok);
tok               231 source3/utils/sharesec.c 	if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok               233 source3/utils/sharesec.c 			orig_str, tok);
tok               239 source3/utils/sharesec.c 	if (strncmp(tok, "0x", 2) == 0) {
tok               240 source3/utils/sharesec.c 		if (sscanf(tok, "%i", &amask) != 1) {
tok               242 source3/utils/sharesec.c 				orig_str, tok);
tok               251 source3/utils/sharesec.c 		if (strcmp(tok, v->perm) == 0) {
tok               257 source3/utils/sharesec.c 	p = tok;
tok               366 source3/utils/smbcacls.c 	char *tok;
tok               409 source3/utils/smbcacls.c 	if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok               417 source3/utils/smbcacls.c 	if (strncmp(tok, "ALLOWED", strlen("ALLOWED")) == 0) {
tok               419 source3/utils/smbcacls.c 	} else if (strncmp(tok, "DENIED", strlen("DENIED")) == 0) {
tok               423 source3/utils/smbcacls.c 			orig_str, tok);
tok               431 source3/utils/smbcacls.c 	if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok               433 source3/utils/smbcacls.c 			orig_str, tok);
tok               439 source3/utils/smbcacls.c 	if (tok[0] < '0' || tok[0] > '9') {
tok               440 source3/utils/smbcacls.c 		if (!parse_ace_flags(tok, &aflags)) {
tok               442 source3/utils/smbcacls.c 				orig_str, tok);
tok               447 source3/utils/smbcacls.c 	} else if (strnequal(tok, "0x", 2)) {
tok               448 source3/utils/smbcacls.c 		if (!sscanf(tok, "%x", &aflags)) {
tok               450 source3/utils/smbcacls.c 				orig_str, tok);
tok               456 source3/utils/smbcacls.c 		if (!sscanf(tok, "%i", &aflags)) {
tok               458 source3/utils/smbcacls.c 				orig_str, tok);
tok               465 source3/utils/smbcacls.c 	if (!next_token_talloc(frame, &cp, &tok, "/")) {
tok               467 source3/utils/smbcacls.c 			orig_str, tok);
tok               473 source3/utils/smbcacls.c 	if (strncmp(tok, "0x", 2) == 0) {
tok               474 source3/utils/smbcacls.c 		if (sscanf(tok, "%i", &amask) != 1) {
tok               476 source3/utils/smbcacls.c 				orig_str, tok);
tok               485 source3/utils/smbcacls.c 		if (strcmp(tok, v->perm) == 0) {
tok               491 source3/utils/smbcacls.c 	p = tok;
tok               552 source3/utils/smbcacls.c 	char *tok;
tok               559 source3/utils/smbcacls.c 	while (next_token_talloc(ctx, &p, &tok, "\t,\r\n")) {
tok               560 source3/utils/smbcacls.c 		if (strncmp(tok,"REVISION:", 9) == 0) {
tok               561 source3/utils/smbcacls.c 			revision = strtol(tok+9, NULL, 16);
tok               565 source3/utils/smbcacls.c 		if (strncmp(tok,"OWNER:", 6) == 0) {
tok               572 source3/utils/smbcacls.c 			    !StringToSid(cli, owner_sid, tok+6)) {
tok               579 source3/utils/smbcacls.c 		if (strncmp(tok,"GROUP:", 6) == 0) {
tok               586 source3/utils/smbcacls.c 			    !StringToSid(cli, grp_sid, tok+6)) {
tok               593 source3/utils/smbcacls.c 		if (strncmp(tok,"ACL:", 4) == 0) {
tok               595 source3/utils/smbcacls.c 			if (!parse_ace(cli, &ace, tok+4)) {
tok               599 source3/utils/smbcacls.c 				printf("Failed to add ACL %s\n", tok);
tok               605 source3/utils/smbcacls.c 		printf("Failed to parse token '%s' in security descriptor,\n", tok);
tok               110 source3/web/cgi.c 	char *p, *s, *tok;
tok               168 source3/web/cgi.c 		for (tok=strtok_r(s, "&;", &saveptr); tok;
tok               169 source3/web/cgi.c 		     tok=strtok_r(NULL, "&;", &saveptr)) {
tok               170 source3/web/cgi.c 			p = strchr_m(tok,'=');
tok               175 source3/web/cgi.c 			variables[num_variables].name = SMB_STRDUP(tok);
tok              2717 source4/client/client.c static int process_tok(const char *tok)
tok              2721 source4/client/client.c 	int tok_len = strlen(tok);
tok              2724 source4/client/client.c 		if (strequal(commands[i].name,tok)) {
tok              2728 source4/client/client.c 		} else if (strncasecmp(commands[i].name, tok, tok_len) == 0) {
tok                42 source4/lib/socket/access.c static bool masked_match(TALLOC_CTX *mem_ctx, const char *tok, const char *slash, const char *s)
tok                52 source4/lib/socket/access.c 	tok_cpy = talloc_strdup(mem_ctx, tok);
tok                53 source4/lib/socket/access.c 	tok_cpy[PTR_DIFF(slash,tok)] = '\0';
tok                66 source4/lib/socket/access.c 		DEBUG(0,("access: bad net/mask access control: %s\n", tok));
tok                74 source4/lib/socket/access.c static bool string_match(TALLOC_CTX *mem_ctx, const char *tok,const char *s, char *invalid_char)
tok                96 source4/lib/socket/access.c 	if (tok[0] == '.') {			/* domain: match last fields */
tok                97 source4/lib/socket/access.c 		if ((str_len = strlen(s)) > (tok_len = strlen(tok))
tok                98 source4/lib/socket/access.c 		    && strcasecmp(tok, s + str_len - tok_len)==0) {
tok               101 source4/lib/socket/access.c 	} else if (tok[0] == '@') { /* netgroup: look it up */
tok               104 source4/lib/socket/access.c 	} else if (strcmp(tok, "ALL")==0) {	/* all: match any */
tok               106 source4/lib/socket/access.c 	} else if (strcmp(tok, "FAIL")==0) {	/* fail: match any */
tok               108 source4/lib/socket/access.c 	} else if (strcmp(tok, "LOCAL")==0) {	/* local: no dots */
tok               112 source4/lib/socket/access.c 	} else if (strcasecmp(tok, s)==0) {   /* match host name or address */
tok               114 source4/lib/socket/access.c 	} else if (tok[(tok_len = strlen(tok)) - 1] == '.') {	/* network */
tok               115 source4/lib/socket/access.c 		if (strncmp(tok, s, tok_len) == 0)
tok               117 source4/lib/socket/access.c 	} else if ((cut = strchr(tok, '/')) != 0) {	/* netnumber/netmask */
tok               118 source4/lib/socket/access.c 		if (isdigit((int)s[0]) && masked_match(mem_ctx, tok, cut, s))
tok               120 source4/lib/socket/access.c 	} else if (strchr(tok, '*') != 0) {
tok               122 source4/lib/socket/access.c 	} else if (strchr(tok, '?') != 0) {
tok               134 source4/lib/socket/access.c static bool client_match(TALLOC_CTX *mem_ctx, const char *tok, struct client_addr *client)
tok               144 source4/lib/socket/access.c 	if ((match = string_match(mem_ctx, tok, client->caddr, &invalid_char)) == 0) {
tok               147 source4/lib/socket/access.c token '%s' in an allow/deny hosts line.\n", invalid_char, tok ));
tok               150 source4/lib/socket/access.c 			match = string_match(mem_ctx, tok, client->cname, &invalid_char);
tok               154 source4/lib/socket/access.c token '%s' in an allow/deny hosts line.\n", invalid_char, tok ));
tok               543 source4/lib/socket/socket.c 		const char *tok = options_list[j];
tok               549 source4/lib/socket/socket.c 		if ((p = strchr(tok,'='))) {
tok               556 source4/lib/socket/socket.c 			if (strequal(socket_options[i].name,tok))
tok               560 source4/lib/socket/socket.c 			DEBUG(0,("Unknown socket option %s\n",tok));
tok               573 source4/lib/socket/socket.c 				DEBUG(0,("syntax error - %s does not take a value\n",tok));
tok               584 source4/lib/socket/socket.c 			DEBUG(0,("Failed to set socket option %s (Error %s)\n",tok, strerror(errno) ));
tok               185 source4/libcli/security/sddl.c 	const char *tok[6];
tok               194 source4/libcli/security/sddl.c 	tok[0] = str;
tok               200 source4/libcli/security/sddl.c 		tok[i+1] = str;
tok               204 source4/libcli/security/sddl.c 	if (!sddl_map_flags(ace_types, tok[0], &v, NULL)) {
tok               210 source4/libcli/security/sddl.c 	if (!sddl_map_flags(ace_flags, tok[1], &v, NULL)) {
tok               216 source4/libcli/security/sddl.c 	if (strncmp(tok[2], "0x", 2) == 0) {
tok               217 source4/libcli/security/sddl.c 		ace->access_mask = strtol(tok[2], NULL, 16);
tok               219 source4/libcli/security/sddl.c 		if (!sddl_map_flags(ace_access_mask, tok[2], &v, NULL)) {
tok               226 source4/libcli/security/sddl.c 	if (tok[3][0] != 0) {
tok               227 source4/libcli/security/sddl.c 		NTSTATUS status = GUID_from_string(tok[3], 
tok               236 source4/libcli/security/sddl.c 	if (tok[4][0] != 0) {
tok               237 source4/libcli/security/sddl.c 		NTSTATUS status = GUID_from_string(tok[4], 
tok               246 source4/libcli/security/sddl.c 	s = tok[5];
tok               343 source4/utils/ntlm_auth.c 	char *tok;
tok               350 source4/utils/ntlm_auth.c 	tok = (char *)malloc(tok_len);
tok               351 source4/utils/ntlm_auth.c 	if (!tok) {
tok               355 source4/utils/ntlm_auth.c 	while (next_token(&p, tok, LIST_SEP, tok_len)) {
tok               356 source4/utils/ntlm_auth.c 		if ((casesensitive?strcmp:strcasecmp_m)(tok,s) == 0) {
tok               357 source4/utils/ntlm_auth.c 			free(tok);
tok               361 source4/utils/ntlm_auth.c 	free(tok);