admin 66 source4/torture/rpc/dssync.c } admin; admin 103 source4/torture/rpc/dssync.c ctx->admin.credentials = cmdline_credentials; admin 105 source4/torture/rpc/dssync.c our_bind_info28 = &ctx->admin.drsuapi.our_bind_info28; admin 112 source4/torture/rpc/dssync.c our_bind_info_ctr = &ctx->admin.drsuapi.our_bind_info_ctr; admin 116 source4/torture/rpc/dssync.c GUID_from_string(DRSUAPI_DS_BIND_GUID, &ctx->admin.drsuapi.bind_guid); admin 118 source4/torture/rpc/dssync.c ctx->admin.drsuapi.req.in.bind_guid = &ctx->admin.drsuapi.bind_guid; admin 119 source4/torture/rpc/dssync.c ctx->admin.drsuapi.req.in.bind_info = our_bind_info_ctr; admin 120 source4/torture/rpc/dssync.c ctx->admin.drsuapi.req.out.bind_handle = &ctx->admin.drsuapi.bind_handle; admin 278 source4/torture/rpc/dssync.c r.in.bind_handle = &ctx->admin.drsuapi.bind_handle; admin 293 source4/torture/rpc/dssync.c status = dcerpc_drsuapi_DsCrackNames(ctx->admin.drsuapi.pipe, ctx, &r); admin 297 source4/torture/rpc/dssync.c errstr = dcerpc_errstr(ctx, ctx->admin.drsuapi.pipe->last_fault_code); admin 897 source4/torture/rpc/dssync.c ret &= _test_DsBind(torture, ctx, ctx->admin.credentials, &ctx->admin.drsuapi); admin 901 source4/torture/rpc/dssync.c ret &= test_LDAPBind(torture, ctx, ctx->admin.credentials, &ctx->admin.ldap); admin 478 source4/torture/rpc/srvsvc.c const char *sharename, bool admin) admin 506 source4/torture/rpc/srvsvc.c if (admin) expected = levels[i].admin_status; admin 730 source4/torture/rpc/srvsvc.c bool admin) admin 796 source4/torture/rpc/srvsvc.c if (admin) expected = levels[i].admin_status; admin 810 source4/torture/rpc/srvsvc.c if (!test_NetShareGetInfo(tctx, p, name, admin)) { admin 833 source4/torture/rpc/srvsvc.c struct dcerpc_pipe *p, bool admin) admin 893 source4/torture/rpc/srvsvc.c if (admin) expected = levels[i].admin_status;