tok 663 librpc/ndr/ndr.c struct ndr_token_list *tok; tok 664 librpc/ndr/ndr.c tok = talloc(mem_ctx, struct ndr_token_list); tok 665 librpc/ndr/ndr.c NDR_ERR_HAVE_NO_MEMORY(tok); tok 666 librpc/ndr/ndr.c tok->key = key; tok 667 librpc/ndr/ndr.c tok->value = value; tok 668 librpc/ndr/ndr.c DLIST_ADD((*list), tok); tok 678 librpc/ndr/ndr.c struct ndr_token_list *tok; tok 679 librpc/ndr/ndr.c for (tok=*list;tok;tok=tok->next) { tok 680 librpc/ndr/ndr.c if (_cmp_fn && _cmp_fn(tok->key,key)==0) goto found; tok 681 librpc/ndr/ndr.c else if (!_cmp_fn && tok->key == key) goto found; tok 685 librpc/ndr/ndr.c *v = tok->value; tok 687 librpc/ndr/ndr.c DLIST_REMOVE((*list), tok); tok 688 librpc/ndr/ndr.c talloc_free(tok); tok 192 source3/auth/auth_sam.c char *tok; tok 199 source3/auth/auth_sam.c while (next_token_talloc(mem_ctx, &s, &tok, ",")) { tok 201 source3/auth/auth_sam.c tok, user_info->wksta_name)); tok 202 source3/auth/auth_sam.c if(strequal(tok, user_info->wksta_name)) { tok 206 source3/auth/auth_sam.c if (tok[0] == '+') { tok 208 source3/auth/auth_sam.c machine_name, tok + 1)); tok 209 source3/auth/auth_sam.c if (user_in_group(machine_name, tok + 1)) { tok 214 source3/auth/auth_sam.c TALLOC_FREE(tok); tok 216 source3/auth/auth_sam.c TALLOC_FREE(tok); tok 50 source3/client/client.c static int process_tok(char *tok); tok 3987 source3/client/client.c static int process_tok(char *tok) tok 3991 source3/client/client.c int tok_len = strlen(tok); tok 3994 source3/client/client.c if (strequal(commands[i].name,tok)) { tok 3998 source3/client/client.c } else if (strnequal(commands[i].name, tok, tok_len)) { tok 4068 source3/client/client.c char *tok; tok 4082 source3/client/client.c if (!next_token_talloc(ctx, &cmd_ptr,&tok,NULL)) { tok 4086 source3/client/client.c if ((i = process_tok(tok)) >= 0) { tok 4089 source3/client/client.c d_printf("%s: command abbreviation ambiguous\n",tok); tok 4091 source3/client/client.c d_printf("%s: command not found\n",tok); tok 4465 source3/client/client.c char *tok = NULL; tok 4495 source3/client/client.c if (!next_token_talloc(frame, &cmd_ptr,&tok,NULL)) { tok 4501 source3/client/client.c if ((i = process_tok(tok)) >= 0) { tok 4504 source3/client/client.c d_printf("%s: command abbreviation ambiguous\n",tok); tok 4506 source3/client/client.c d_printf("%s: command not found\n",tok); tok 41 source3/client/clitar.c static int clipfind(char **aret, int ret, char *tok); tok 1617 source3/client/clitar.c static int clipfind(char **aret, int ret, char *tok) tok 1623 source3/client/clitar.c while(strchr_m("/\\.", *tok)) tok 1624 source3/client/clitar.c tok++; tok 1633 source3/client/clitar.c if (!strslashcmp(pkey, tok)) tok 64 source3/include/debugparse.h const char *dbg_token2string( dbg_Token tok ); tok 278 source3/include/proto.h bool client_match(const char *tok, const void *item); tok 3481 source3/include/proto.h void set_delete_on_close_token(struct share_mode_lock *lck, const UNIX_USER_TOKEN *tok); tok 3482 source3/include/proto.h void set_delete_on_close_lck(struct share_mode_lock *lck, bool delete_on_close, const UNIX_USER_TOKEN *tok); tok 3483 source3/include/proto.h bool set_delete_on_close(files_struct *fsp, bool delete_on_close, const UNIX_USER_TOKEN *tok); tok 19 source3/lib/access.c static bool masked_match(const char *tok, const char *slash, const char *s) tok 30 source3/lib/access.c if (*tok == '[') { tok 32 source3/lib/access.c tok_copy = SMB_STRDUP(tok+1); tok 37 source3/lib/access.c tok_copy[PTR_DIFF(slash,tok)-1] = '\0'; tok 39 source3/lib/access.c tok_copy = SMB_STRDUP(tok); tok 44 source3/lib/access.c tok_copy[PTR_DIFF(slash,tok)] = '\0'; tok 73 source3/lib/access.c static bool string_match(const char *tok,const char *s) tok 93 source3/lib/access.c if (tok[0] == '.') { /* domain: match last fields */ tok 94 source3/lib/access.c if ((str_len = strlen(s)) > (tok_len = strlen(tok)) tok 95 source3/lib/access.c && strequal(tok, s + str_len - tok_len)) { tok 98 source3/lib/access.c } else if (tok[0] == '@') { /* netgroup: look it up */ tok 132 source3/lib/access.c netgroup_ok = innetgr(tok + 1, hostname, (char *) 0, mydomain); tok 137 source3/lib/access.c tok+1, tok 148 source3/lib/access.c } else if (strequal(tok, "ALL")) { /* all: match any */ tok 150 source3/lib/access.c } else if (strequal(tok, "FAIL")) { /* fail: match any */ tok 152 source3/lib/access.c } else if (strequal(tok, "LOCAL")) { /* local: no dots */ tok 156 source3/lib/access.c } else if (strequal(tok, s)) { /* match host name or address */ tok 158 source3/lib/access.c } else if (tok[(tok_len = strlen(tok)) - 1] == '.') { /* network */ tok 159 source3/lib/access.c if (strncmp(tok, s, tok_len) == 0) { tok 162 source3/lib/access.c } else if ((cut = strchr_m(tok, '/')) != 0) { /* netnumber/netmask */ tok 163 source3/lib/access.c if ((isdigit(s[0]) && strchr_m(tok, '.') != NULL) || tok 164 source3/lib/access.c (tok[0] == '[' && cut > tok && cut[-1] == ']') || tok 166 source3/lib/access.c strchr_m(tok, ':') != NULL)) { tok 169 source3/lib/access.c return masked_match(tok, cut, s); tok 171 source3/lib/access.c } else if (strchr_m(tok, '*') != 0 || strchr_m(tok, '?')) { tok 172 source3/lib/access.c return unix_wild_match(tok, s); tok 178 source3/lib/access.c bool client_match(const char *tok, const void *item) tok 187 source3/lib/access.c if (string_match(tok, client[ADDR_INDEX])) { tok 192 source3/lib/access.c !strnequal(tok, "::ffff:",7)) { tok 199 source3/lib/access.c if (string_match(tok, (client[ADDR_INDEX])+7)) { tok 205 source3/lib/access.c if (string_match(tok, client[NAME_INDEX])) { tok 392 source3/lib/util_sock.c char *tok; tok 394 source3/lib/util_sock.c while (next_token_talloc(ctx, &options, &tok," \t,")) { tok 400 source3/lib/util_sock.c if ((p = strchr_m(tok,'='))) { tok 407 source3/lib/util_sock.c if (strequal(socket_options[i].name,tok)) tok 411 source3/lib/util_sock.c DEBUG(0,("Unknown socket option %s\n",tok)); tok 426 source3/lib/util_sock.c "does not take a value\n",tok)); tok 442 source3/lib/util_sock.c tok, strerror(errno) )); tok 703 source3/lib/util_str.c char *tok = NULL; tok 712 source3/lib/util_str.c while (next_token_talloc(frame, &list, &tok,LIST_SEP)) { tok 714 source3/lib/util_str.c if (strcmp(tok,s) == 0) { tok 719 source3/lib/util_str.c if (StrCaseCmp(tok,s) == 0) { tok 2438 source3/lib/util_str.c char *tok; tok 2460 source3/lib/util_str.c while (next_token_talloc(list, &str, &tok, sep)) { tok 2482 source3/lib/util_str.c list[num] = tok; tok 87 source3/libgpo/gpo_fetch.c char *tok; tok 96 source3/libgpo/gpo_fetch.c while (next_token_talloc(mem_ctx, &unix_path, &tok, "/")) { tok 97 source3/libgpo/gpo_fetch.c if (strequal(tok, GPO_CACHE_DIR)) { tok 102 source3/libgpo/gpo_fetch.c while (next_token_talloc(mem_ctx, &unix_path, &tok, "/")) { tok 103 source3/libgpo/gpo_fetch.c current_dir = talloc_asprintf_append_buffer(current_dir, "/%s", tok); tok 265 source3/libsmb/libsmb_xattr.c char *tok; tok 320 source3/libsmb/libsmb_xattr.c if (!next_token_talloc(frame, &cp, &tok, "/")) { tok 325 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, "ALLOWED", strlen("ALLOWED")) == 0) { tok 327 source3/libsmb/libsmb_xattr.c } else if (StrnCaseCmp(tok, "DENIED", strlen("DENIED")) == 0) { tok 336 source3/libsmb/libsmb_xattr.c if (!(next_token_talloc(frame, &cp, &tok, "/") && tok 337 source3/libsmb/libsmb_xattr.c sscanf(tok, "%i", &aflags))) { tok 342 source3/libsmb/libsmb_xattr.c if (!next_token_talloc(frame, &cp, &tok, "/")) { tok 347 source3/libsmb/libsmb_xattr.c if (strncmp(tok, "0x", 2) == 0) { tok 348 source3/libsmb/libsmb_xattr.c if (sscanf(tok, "%i", &amask) != 1) { tok 356 source3/libsmb/libsmb_xattr.c if (strcmp(tok, v->perm) == 0) { tok 362 source3/libsmb/libsmb_xattr.c p = tok; tok 430 source3/libsmb/libsmb_xattr.c char *tok; tok 438 source3/libsmb/libsmb_xattr.c while (next_token_talloc(ctx, &p, &tok, "\t,\r\n")) { tok 440 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"REVISION:", 9) == 0) { tok 441 source3/libsmb/libsmb_xattr.c revision = strtol(tok+9, NULL, 16); tok 445 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"OWNER:", 6) == 0) { tok 454 source3/libsmb/libsmb_xattr.c owner_sid, tok+6)) { tok 461 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"OWNER+:", 7) == 0) { tok 470 source3/libsmb/libsmb_xattr.c owner_sid, tok+7)) { tok 477 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"GROUP:", 6) == 0) { tok 486 source3/libsmb/libsmb_xattr.c group_sid, tok+6)) { tok 493 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"GROUP+:", 7) == 0) { tok 502 source3/libsmb/libsmb_xattr.c group_sid, tok+6)) { tok 509 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"ACL:", 4) == 0) { tok 511 source3/libsmb/libsmb_xattr.c if (!parse_ace(ipc_cli, pol, &ace, numeric, tok+4)) { tok 512 source3/libsmb/libsmb_xattr.c DEBUG(5, ("Failed to parse ACL %s\n", tok)); tok 516 source3/libsmb/libsmb_xattr.c DEBUG(5, ("Failed to add ACL %s\n", tok)); tok 522 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok,"ACL+:", 5) == 0) { tok 524 source3/libsmb/libsmb_xattr.c if (!parse_ace(ipc_cli, pol, &ace, False, tok+5)) { tok 525 source3/libsmb/libsmb_xattr.c DEBUG(5, ("Failed to parse ACL %s\n", tok)); tok 529 source3/libsmb/libsmb_xattr.c DEBUG(5, ("Failed to add ACL %s\n", tok)); tok 606 source3/libsmb/libsmb_xattr.c char *tok = NULL; tok 641 source3/libsmb/libsmb_xattr.c while (next_token_talloc(frame, &p, &tok, "\t,\r\n")) { tok 642 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, "MODE:", 5) == 0) { tok 643 source3/libsmb/libsmb_xattr.c long request = strtol(tok+5, NULL, 16); tok 655 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, "SIZE:", 5) == 0) { tok 656 source3/libsmb/libsmb_xattr.c dad->size = (SMB_OFF_T)atof(tok+5); tok 661 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, attr_strings.access_time_attr, n) == 0) { tok 662 source3/libsmb/libsmb_xattr.c dad->access_time = (time_t)strtol(tok+n+1, NULL, 10); tok 667 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, attr_strings.change_time_attr, n) == 0) { tok 668 source3/libsmb/libsmb_xattr.c dad->change_time = (time_t)strtol(tok+n+1, NULL, 10); tok 673 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, attr_strings.write_time_attr, n) == 0) { tok 674 source3/libsmb/libsmb_xattr.c dad->write_time = (time_t)strtol(tok+n+1, NULL, 10); tok 680 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, attr_strings.create_time_attr, tok 682 source3/libsmb/libsmb_xattr.c dad->create_time = (time_t)strtol(tok+n+1, tok 688 source3/libsmb/libsmb_xattr.c if (StrnCaseCmp(tok, "INODE:", 6) == 0) { tok 689 source3/libsmb/libsmb_xattr.c dad->inode = (SMB_INO_T)atof(tok+6); tok 1496 source3/libsmb/namequery.c char *tok; tok 1558 source3/libsmb/namequery.c while (next_token_talloc(frame, &ptr, &tok, LIST_SEP)) { tok 1559 source3/libsmb/namequery.c if((strequal(tok, "host") || strequal(tok, "hosts"))) { tok 1565 source3/libsmb/namequery.c } else if(strequal( tok, "kdc")) { tok 1576 source3/libsmb/namequery.c } else if(strequal( tok, "ads")) { tok 1584 source3/libsmb/namequery.c } else if(strequal( tok, "lmhosts")) { tok 1590 source3/libsmb/namequery.c } else if(strequal( tok, "wins")) { tok 1600 source3/libsmb/namequery.c } else if(strequal( tok, "bcast")) { tok 1609 source3/libsmb/namequery.c tok)); tok 1319 source3/locking/locking.c static UNIX_USER_TOKEN *copy_unix_token(TALLOC_CTX *ctx, const UNIX_USER_TOKEN *tok) tok 1323 source3/locking/locking.c if (tok == NULL) { tok 1332 source3/locking/locking.c cpy->uid = tok->uid; tok 1333 source3/locking/locking.c cpy->gid = tok->gid; tok 1334 source3/locking/locking.c cpy->ngroups = tok->ngroups; tok 1335 source3/locking/locking.c if (tok->ngroups) { tok 1337 source3/locking/locking.c cpy->groups = TALLOC_ARRAY(cpy, gid_t, tok->ngroups); tok 1341 source3/locking/locking.c memcpy(cpy->groups, tok->groups, tok->ngroups * sizeof(gid_t)); tok 1350 source3/locking/locking.c void set_delete_on_close_token(struct share_mode_lock *lck, const UNIX_USER_TOKEN *tok) tok 1355 source3/locking/locking.c lck->delete_token = copy_unix_token(lck, tok); tok 1370 source3/locking/locking.c void set_delete_on_close_lck(struct share_mode_lock *lck, bool delete_on_close, const UNIX_USER_TOKEN *tok) tok 1373 source3/locking/locking.c set_delete_on_close_token(lck, tok); tok 1382 source3/locking/locking.c bool set_delete_on_close(files_struct *fsp, bool delete_on_close, const UNIX_USER_TOKEN *tok) tok 1399 source3/locking/locking.c tok_copy = copy_unix_token(lck, tok); tok 1405 source3/locking/locking.c tok = tok_copy; tok 1408 source3/locking/locking.c set_delete_on_close_lck(lck, delete_on_close, tok); tok 197 source3/passdb/pdb_ldap.c char *tok; tok 295 source3/passdb/pdb_ldap.c if (!next_token_talloc(mem_ctx, &p, &tok, "#")) { tok 300 source3/passdb/pdb_ldap.c p = tok; tok 30 source3/printing/lpq_parse.c static time_t EntryTime(char *tok[], int ptr, int count, int minimum) tok 40 source3/printing/lpq_parse.c if (!strncmp(tok[ptr], Months[i],3)) { tok 51 source3/printing/lpq_parse.c day = atoi(tok[ptr+1]); tok 52 source3/printing/lpq_parse.c fstrcpy(c,tok[ptr+2]); tok 126 source3/printing/lpq_parse.c char *tok[MAXTOK]; tok 148 source3/printing/lpq_parse.c tok[0] = strtok_r(line2," \t", &saveptr); tok 152 source3/printing/lpq_parse.c && ((tok[count] = strtok_r(NULL, " \t", &saveptr)) != NULL)) { tok 162 source3/printing/lpq_parse.c if (!isdigit((int)*tok[JOBTOK]) || !isdigit((int)*tok[TOTALTOK])) { tok 166 source3/printing/lpq_parse.c buf->job = atoi(tok[JOBTOK]); tok 167 source3/printing/lpq_parse.c buf->size = atoi(tok[TOTALTOK]); tok 168 source3/printing/lpq_parse.c buf->status = strequal(tok[RANKTOK],"active")?LPQ_PRINTING:LPQ_QUEUED; tok 170 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[USERTOK]); tok 171 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[FILETOK]); tok 181 source3/printing/lpq_parse.c fstrcat(buf->fs_file, tok[i]); tok 188 source3/printing/lpq_parse.c buf->priority = atoi(tok[PRIOTOK]); tok 345 source3/printing/lpq_parse.c char *tok[11]; tok 356 source3/printing/lpq_parse.c next_token_talloc(frame,&cline,&tok[count],NULL); count++) { tok 362 source3/printing/lpq_parse.c if ((count == 7) && ((strcmp(tok[0],"QUEUED") == 0) || (strcmp(tok[0],"HELD") == 0))) { tok 364 source3/printing/lpq_parse.c if (!isdigit((int)*tok[1]) || !isdigit((int)*tok[4])) { tok 368 source3/printing/lpq_parse.c buf->size = atoi(tok[4]) * 1024; tok 370 source3/printing/lpq_parse.c if (strchr_m(tok[2],' ')) { tok 371 source3/printing/lpq_parse.c tok[2] = talloc_strdup(frame,"STDIN"); tok 372 source3/printing/lpq_parse.c if (!tok[2]) { tok 380 source3/printing/lpq_parse.c char *p = strrchr_m(tok[2],'/'); tok 382 source3/printing/lpq_parse.c tok[2] = p+1; tok 386 source3/printing/lpq_parse.c buf->job = atoi(tok[1]); tok 387 source3/printing/lpq_parse.c buf->status = strequal(tok[0],"HELD")?LPQ_PAUSED:LPQ_QUEUED; tok 390 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[3]); tok 391 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[2]); tok 399 source3/printing/lpq_parse.c if (!isdigit((int)*tok[3]) || !isdigit((int)*tok[8])) { tok 404 source3/printing/lpq_parse.c buf->size = atoi(tok[8]) * 1024; tok 406 source3/printing/lpq_parse.c if (strchr_m(tok[4],' ')) { tok 407 source3/printing/lpq_parse.c tok[4] = talloc_strdup(frame,"STDIN"); tok 408 source3/printing/lpq_parse.c if (!tok[4]) { tok 416 source3/printing/lpq_parse.c char *p = strrchr_m(tok[4],'/'); tok 418 source3/printing/lpq_parse.c tok[4] = p+1; tok 422 source3/printing/lpq_parse.c buf->job = atoi(tok[3]); tok 423 source3/printing/lpq_parse.c buf->status = strequal(tok[2],"RUNNING")?LPQ_PRINTING:LPQ_QUEUED; tok 426 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[5]); tok 427 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[4]); tok 460 source3/printing/lpq_parse.c char *tok[12]; tok 483 source3/printing/lpq_parse.c next_token_talloc(frame, &cline, &tok[count],NULL); tok 494 source3/printing/lpq_parse.c if (!isdigit((int)*tok[1])) { tok 500 source3/printing/lpq_parse.c if (strchr_m(tok[0],' ')) { tok 501 source3/printing/lpq_parse.c tok[0] = talloc_strdup(frame, "STDIN"); tok 502 source3/printing/lpq_parse.c if (!tok[0]) { tok 508 source3/printing/lpq_parse.c buf->size = atoi(tok[1]); tok 509 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[0]); tok 539 source3/printing/lpq_parse.c next_token_talloc(frame, &cline, &tok[count],NULL); tok 552 source3/printing/lpq_parse.c if (!isdigit((int)*tok[1]) || !isdigit((int)*tok[4]) || !isdigit((int)*tok[6])) { tok 556 source3/printing/lpq_parse.c jobid = atoi(tok[1]); tok 558 source3/printing/lpq_parse.c jobuser = SMB_STRDUP(tok[2]); tok 559 source3/printing/lpq_parse.c jobprio = atoi(tok[4]); tok 562 source3/printing/lpq_parse.c jobtime=EntryTime(tok, 5, count, 8); tok 569 source3/printing/lpq_parse.c if ((count >8) && (((strequal(tok[8],"on")) || tok 570 source3/printing/lpq_parse.c ((strequal(tok[8],"from")) && tok 571 source3/printing/lpq_parse.c ((count > 10)&&(strequal(tok[10],"on"))))))) { tok 594 source3/printing/lpq_parse.c char *tok[9]; tok 627 source3/printing/lpq_parse.c next_token_talloc(frame, &cline, &tok[count],NULL); tok 639 source3/printing/lpq_parse.c if (!isdigit((int)*tok[1]) || !isdigit((int)*tok[3])) { tok 643 source3/printing/lpq_parse.c if (!isdigit((int)*tok[5])) { tok 649 source3/printing/lpq_parse.c if ((p=strchr_m(tok[2],'!'))) { tok 650 source3/printing/lpq_parse.c tok[2] = p+1; tok 653 source3/printing/lpq_parse.c buf->job = atoi(tok[1]); tok 654 source3/printing/lpq_parse.c buf->size = atoi(tok[3]); tok 655 source3/printing/lpq_parse.c if (count > 7 && strequal(tok[7],"on")) { tok 657 source3/printing/lpq_parse.c } else if (count > 8 && strequal(tok[7],"being") && strequal(tok[8],"held")) { tok 663 source3/printing/lpq_parse.c buf->time = EntryTime(tok, 4, count, 7); tok 664 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[2]); tok 665 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[2]); tok 683 source3/printing/lpq_parse.c char *tok[7]; tok 703 source3/printing/lpq_parse.c next_token_talloc(frame,&cline,&tok[count],NULL); tok 715 source3/printing/lpq_parse.c if (!isdigit((int)*tok[2]) || !isdigit((int)*tok[4])) { tok 722 source3/printing/lpq_parse.c char *p = strrchr_m(tok[6],'/'); tok 724 source3/printing/lpq_parse.c tok[6] = p+1; tok 728 source3/printing/lpq_parse.c buf->job = atoi(tok[2]); tok 729 source3/printing/lpq_parse.c buf->size = atoi(tok[4]); tok 730 source3/printing/lpq_parse.c buf->status = strequal(tok[3],"active")?LPQ_PRINTING:LPQ_QUEUED; tok 733 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[1]); tok 734 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[6]); tok 755 source3/printing/lpq_parse.c char *tok[11]; tok 766 source3/printing/lpq_parse.c next_token_talloc(frame,&cline,&tok[count],NULL); tok 778 source3/printing/lpq_parse.c if (strcmp(tok[0],"active") && !isdigit((int)tok[0][0])) { tok 784 source3/printing/lpq_parse.c if (!isdigit((int)*tok[4]) || !isdigit((int)*tok[7])) { tok 790 source3/printing/lpq_parse.c if (strchr_m(tok[6],' ')) { tok 791 source3/printing/lpq_parse.c tok[6] = talloc_strdup(frame, "STDIN"); tok 792 source3/printing/lpq_parse.c if (!tok[6]) { tok 801 source3/printing/lpq_parse.c char *p = strrchr_m(tok[6],'/'); tok 804 source3/printing/lpq_parse.c fstrcpy(tok[6],tmp); tok 808 source3/printing/lpq_parse.c buf->job = atoi(tok[4]); tok 810 source3/printing/lpq_parse.c buf->size = atoi(tok[7]); tok 811 source3/printing/lpq_parse.c if (strchr_m(tok[7],'K')) { tok 814 source3/printing/lpq_parse.c if (strchr_m(tok[7],'M')) { tok 818 source3/printing/lpq_parse.c buf->status = strequal(tok[0],"active")?LPQ_PRINTING:LPQ_QUEUED; tok 821 source3/printing/lpq_parse.c fstrcpy(buf->fs_user,tok[1]); tok 822 source3/printing/lpq_parse.c fstrcpy(buf->fs_file,tok[6]); tok 1009 source3/printing/lpq_parse.c char *tok; tok 1022 source3/printing/lpq_parse.c while(next_token_talloc(frame, &cline, &tok, NULL)) { tok 1025 source3/printing/lpq_parse.c buf->job = atoi(tok); tok 1028 source3/printing/lpq_parse.c buf->size = atoi(tok); tok 1031 source3/printing/lpq_parse.c buf->status = atoi(tok); tok 1034 source3/printing/lpq_parse.c buf->time = atoi(tok); tok 1037 source3/printing/lpq_parse.c fstrcpy(buf->fs_user, tok); tok 1040 source3/printing/lpq_parse.c fstrcpy(buf->fs_file, tok); tok 543 source3/smbd/server.c char *tok; tok 554 source3/smbd/server.c next_token_talloc(talloc_tos(),&ptr, &tok, " \t,");) { tok 555 source3/smbd/server.c unsigned port = atoi(tok); tok 569 source3/smbd/server.c char *tok; tok 586 source3/smbd/server.c for (ptr=ports; next_token_talloc(talloc_tos(), &ptr, &tok, " \t,"); ) { tok 589 source3/smbd/server.c unsigned port = atoi(tok); tok 167 source3/utils/debug2html.c static void charprint( dbg_Token tok, int c ) tok 179 source3/utils/debug2html.c switch( tok ) tok 47 source3/utils/debugparse.c const char *dbg_token2string( dbg_Token tok ) tok 62 source3/utils/debugparse.c switch( tok ) tok 488 source3/utils/net_rpc_printer.c char *tok; tok 497 source3/utils/net_rpc_printer.c while (next_token_talloc(mem_ctx, &p, &tok, "\\")) { tok 498 source3/utils/net_rpc_printer.c if (strequal(tok, short_archi)) { tok 156 source3/utils/sharesec.c char *tok; tok 199 source3/utils/sharesec.c if (!next_token_talloc(frame, &cp, &tok, "/")) { tok 207 source3/utils/sharesec.c if (strncmp(tok, "ALLOWED", strlen("ALLOWED")) == 0) { tok 209 source3/utils/sharesec.c } else if (strncmp(tok, "DENIED", strlen("DENIED")) == 0) { tok 213 source3/utils/sharesec.c "entry at '%s'\n", orig_str, tok); tok 222 source3/utils/sharesec.c if (!(next_token_talloc(frame, &cp, &tok, "/") && tok 223 source3/utils/sharesec.c sscanf(tok, "%i", &aflags) && aflags == 0)) { tok 225 source3/utils/sharesec.c orig_str, tok); tok 231 source3/utils/sharesec.c if (!next_token_talloc(frame, &cp, &tok, "/")) { tok 233 source3/utils/sharesec.c orig_str, tok); tok 239 source3/utils/sharesec.c if (strncmp(tok, "0x", 2) == 0) { tok 240 source3/utils/sharesec.c if (sscanf(tok, "%i", &amask) != 1) { tok 242 source3/utils/sharesec.c orig_str, tok); tok 251 source3/utils/sharesec.c if (strcmp(tok, v->perm) == 0) { tok 257 source3/utils/sharesec.c p = tok; tok 366 source3/utils/smbcacls.c char *tok; tok 409 source3/utils/smbcacls.c if (!next_token_talloc(frame, &cp, &tok, "/")) { tok 417 source3/utils/smbcacls.c if (strncmp(tok, "ALLOWED", strlen("ALLOWED")) == 0) { tok 419 source3/utils/smbcacls.c } else if (strncmp(tok, "DENIED", strlen("DENIED")) == 0) { tok 423 source3/utils/smbcacls.c orig_str, tok); tok 431 source3/utils/smbcacls.c if (!next_token_talloc(frame, &cp, &tok, "/")) { tok 433 source3/utils/smbcacls.c orig_str, tok); tok 439 source3/utils/smbcacls.c if (tok[0] < '0' || tok[0] > '9') { tok 440 source3/utils/smbcacls.c if (!parse_ace_flags(tok, &aflags)) { tok 442 source3/utils/smbcacls.c orig_str, tok); tok 447 source3/utils/smbcacls.c } else if (strnequal(tok, "0x", 2)) { tok 448 source3/utils/smbcacls.c if (!sscanf(tok, "%x", &aflags)) { tok 450 source3/utils/smbcacls.c orig_str, tok); tok 456 source3/utils/smbcacls.c if (!sscanf(tok, "%i", &aflags)) { tok 458 source3/utils/smbcacls.c orig_str, tok); tok 465 source3/utils/smbcacls.c if (!next_token_talloc(frame, &cp, &tok, "/")) { tok 467 source3/utils/smbcacls.c orig_str, tok); tok 473 source3/utils/smbcacls.c if (strncmp(tok, "0x", 2) == 0) { tok 474 source3/utils/smbcacls.c if (sscanf(tok, "%i", &amask) != 1) { tok 476 source3/utils/smbcacls.c orig_str, tok); tok 485 source3/utils/smbcacls.c if (strcmp(tok, v->perm) == 0) { tok 491 source3/utils/smbcacls.c p = tok; tok 552 source3/utils/smbcacls.c char *tok; tok 559 source3/utils/smbcacls.c while (next_token_talloc(ctx, &p, &tok, "\t,\r\n")) { tok 560 source3/utils/smbcacls.c if (strncmp(tok,"REVISION:", 9) == 0) { tok 561 source3/utils/smbcacls.c revision = strtol(tok+9, NULL, 16); tok 565 source3/utils/smbcacls.c if (strncmp(tok,"OWNER:", 6) == 0) { tok 572 source3/utils/smbcacls.c !StringToSid(cli, owner_sid, tok+6)) { tok 579 source3/utils/smbcacls.c if (strncmp(tok,"GROUP:", 6) == 0) { tok 586 source3/utils/smbcacls.c !StringToSid(cli, grp_sid, tok+6)) { tok 593 source3/utils/smbcacls.c if (strncmp(tok,"ACL:", 4) == 0) { tok 595 source3/utils/smbcacls.c if (!parse_ace(cli, &ace, tok+4)) { tok 599 source3/utils/smbcacls.c printf("Failed to add ACL %s\n", tok); tok 605 source3/utils/smbcacls.c printf("Failed to parse token '%s' in security descriptor,\n", tok); tok 110 source3/web/cgi.c char *p, *s, *tok; tok 168 source3/web/cgi.c for (tok=strtok_r(s, "&;", &saveptr); tok; tok 169 source3/web/cgi.c tok=strtok_r(NULL, "&;", &saveptr)) { tok 170 source3/web/cgi.c p = strchr_m(tok,'='); tok 175 source3/web/cgi.c variables[num_variables].name = SMB_STRDUP(tok); tok 2717 source4/client/client.c static int process_tok(const char *tok) tok 2721 source4/client/client.c int tok_len = strlen(tok); tok 2724 source4/client/client.c if (strequal(commands[i].name,tok)) { tok 2728 source4/client/client.c } else if (strncasecmp(commands[i].name, tok, tok_len) == 0) { tok 42 source4/lib/socket/access.c static bool masked_match(TALLOC_CTX *mem_ctx, const char *tok, const char *slash, const char *s) tok 52 source4/lib/socket/access.c tok_cpy = talloc_strdup(mem_ctx, tok); tok 53 source4/lib/socket/access.c tok_cpy[PTR_DIFF(slash,tok)] = '\0'; tok 66 source4/lib/socket/access.c DEBUG(0,("access: bad net/mask access control: %s\n", tok)); tok 74 source4/lib/socket/access.c static bool string_match(TALLOC_CTX *mem_ctx, const char *tok,const char *s, char *invalid_char) tok 96 source4/lib/socket/access.c if (tok[0] == '.') { /* domain: match last fields */ tok 97 source4/lib/socket/access.c if ((str_len = strlen(s)) > (tok_len = strlen(tok)) tok 98 source4/lib/socket/access.c && strcasecmp(tok, s + str_len - tok_len)==0) { tok 101 source4/lib/socket/access.c } else if (tok[0] == '@') { /* netgroup: look it up */ tok 104 source4/lib/socket/access.c } else if (strcmp(tok, "ALL")==0) { /* all: match any */ tok 106 source4/lib/socket/access.c } else if (strcmp(tok, "FAIL")==0) { /* fail: match any */ tok 108 source4/lib/socket/access.c } else if (strcmp(tok, "LOCAL")==0) { /* local: no dots */ tok 112 source4/lib/socket/access.c } else if (strcasecmp(tok, s)==0) { /* match host name or address */ tok 114 source4/lib/socket/access.c } else if (tok[(tok_len = strlen(tok)) - 1] == '.') { /* network */ tok 115 source4/lib/socket/access.c if (strncmp(tok, s, tok_len) == 0) tok 117 source4/lib/socket/access.c } else if ((cut = strchr(tok, '/')) != 0) { /* netnumber/netmask */ tok 118 source4/lib/socket/access.c if (isdigit((int)s[0]) && masked_match(mem_ctx, tok, cut, s)) tok 120 source4/lib/socket/access.c } else if (strchr(tok, '*') != 0) { tok 122 source4/lib/socket/access.c } else if (strchr(tok, '?') != 0) { tok 134 source4/lib/socket/access.c static bool client_match(TALLOC_CTX *mem_ctx, const char *tok, struct client_addr *client) tok 144 source4/lib/socket/access.c if ((match = string_match(mem_ctx, tok, client->caddr, &invalid_char)) == 0) { tok 147 source4/lib/socket/access.c token '%s' in an allow/deny hosts line.\n", invalid_char, tok )); tok 150 source4/lib/socket/access.c match = string_match(mem_ctx, tok, client->cname, &invalid_char); tok 154 source4/lib/socket/access.c token '%s' in an allow/deny hosts line.\n", invalid_char, tok )); tok 543 source4/lib/socket/socket.c const char *tok = options_list[j]; tok 549 source4/lib/socket/socket.c if ((p = strchr(tok,'='))) { tok 556 source4/lib/socket/socket.c if (strequal(socket_options[i].name,tok)) tok 560 source4/lib/socket/socket.c DEBUG(0,("Unknown socket option %s\n",tok)); tok 573 source4/lib/socket/socket.c DEBUG(0,("syntax error - %s does not take a value\n",tok)); tok 584 source4/lib/socket/socket.c DEBUG(0,("Failed to set socket option %s (Error %s)\n",tok, strerror(errno) )); tok 185 source4/libcli/security/sddl.c const char *tok[6]; tok 194 source4/libcli/security/sddl.c tok[0] = str; tok 200 source4/libcli/security/sddl.c tok[i+1] = str; tok 204 source4/libcli/security/sddl.c if (!sddl_map_flags(ace_types, tok[0], &v, NULL)) { tok 210 source4/libcli/security/sddl.c if (!sddl_map_flags(ace_flags, tok[1], &v, NULL)) { tok 216 source4/libcli/security/sddl.c if (strncmp(tok[2], "0x", 2) == 0) { tok 217 source4/libcli/security/sddl.c ace->access_mask = strtol(tok[2], NULL, 16); tok 219 source4/libcli/security/sddl.c if (!sddl_map_flags(ace_access_mask, tok[2], &v, NULL)) { tok 226 source4/libcli/security/sddl.c if (tok[3][0] != 0) { tok 227 source4/libcli/security/sddl.c NTSTATUS status = GUID_from_string(tok[3], tok 236 source4/libcli/security/sddl.c if (tok[4][0] != 0) { tok 237 source4/libcli/security/sddl.c NTSTATUS status = GUID_from_string(tok[4], tok 246 source4/libcli/security/sddl.c s = tok[5]; tok 343 source4/utils/ntlm_auth.c char *tok; tok 350 source4/utils/ntlm_auth.c tok = (char *)malloc(tok_len); tok 351 source4/utils/ntlm_auth.c if (!tok) { tok 355 source4/utils/ntlm_auth.c while (next_token(&p, tok, LIST_SEP, tok_len)) { tok 356 source4/utils/ntlm_auth.c if ((casesensitive?strcmp:strcasecmp_m)(tok,s) == 0) { tok 357 source4/utils/ntlm_auth.c free(tok); tok 361 source4/utils/ntlm_auth.c free(tok);