• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/rpc_server/lsa/

Lines Matching refs:sid

28 	const char *sid;
33 .sid = SID_WORLD,
38 .sid = SID_CREATOR_OWNER,
43 .sid = SID_CREATOR_GROUP,
48 .sid = SID_OWNER_RIGHTS,
54 .sid = SID_NT_DIALUP,
60 .sid = SID_NT_NETWORK,
66 .sid = SID_NT_BATCH,
72 .sid = SID_NT_INTERACTIVE,
78 .sid = SID_NT_SERVICE,
84 .sid = SID_NT_ANONYMOUS,
90 .sid = SID_NT_PROXY,
96 .sid = SID_NT_ENTERPRISE_DCS,
102 .sid = SID_NT_SELF,
108 .sid = SID_NT_AUTHENTICATED_USERS,
114 .sid = SID_NT_RESTRICTED,
120 .sid = SID_NT_TERMINAL_SERVER_USERS,
126 .sid = SID_NT_REMOTE_INTERACTIVE,
132 .sid = SID_NT_THIS_ORGANISATION,
138 .sid = SID_NT_SYSTEM,
144 .sid = SID_NT_LOCAL_SERVICE,
150 .sid = SID_NT_NETWORK_SERVICE,
156 .sid = SID_NT_DIGEST_AUTHENTICATION,
162 .sid = SID_NT_ENTERPRISE_DCS,
168 .sid = SID_NT_NTLM_AUTHENTICATION,
174 .sid = SID_NT_OTHER_ORGANISATION,
180 .sid = SID_NT_SCHANNEL_AUTHENTICATION,
186 .sid = SID_NT_IUSR,
190 .sid = NULL,
196 struct dom_sid **sid, uint32_t *rtype)
199 for (i=0; well_known[i].sid; i++) {
204 *sid = dom_sid_parse_talloc(mem_ctx, well_known[i].sid);
211 *sid = dom_sid_parse_talloc(mem_ctx, well_known[i].sid);
225 for (i=0; well_known[i].sid; i++) {
226 if (strcasecmp_m(sid_str, well_known[i].sid) == 0) {
243 struct dom_sid **sid, enum lsa_SidType *rtype)
275 status = lookup_well_known_names(mem_ctx, NULL, username, authority_name, sid, rtype);
282 *sid = dom_sid_parse_talloc(mem_ctx, SID_NT_AUTHORITY);
288 *sid = dom_sid_parse_talloc(mem_ctx, SID_BUILTIN);
294 *sid = state->domain_sid;
300 *sid = state->domain_sid;
310 status = dcesrv_lsa_lookup_name(ev_ctx, lp_ctx, state, mem_ctx, name, authority_name, sid, rtype);
320 status = dcesrv_lsa_lookup_name(ev_ctx, lp_ctx, state, mem_ctx, name, authority_name, sid, rtype);
330 status = dcesrv_lsa_lookup_name(ev_ctx, lp_ctx, state, mem_ctx, name, authority_name, sid, rtype);
339 *sid = dom_sid_parse_talloc(mem_ctx, SID_NT_AUTHORITY);
346 sid, rtype);
372 *sid = domain_sid;
385 *sid = samdb_result_dom_sid(mem_ctx, res[i], "objectSid");
386 if (*sid == NULL) {
391 if (!dom_sid_in_domain(domain_sid, *sid)) {
405 /* need to check for an allocated sid */
417 struct dom_sid *sid,
425 authority_sid = dom_sid_dup(mem_ctx, sid);
431 authority_sid = sid;
450 domains->domains[i].sid = authority_sid;
462 struct dom_sid *sid, const char *sid_str,
478 if (dom_sid_in_domain(state->domain_sid, sid)) {
481 } else if (dom_sid_in_domain(state->builtin_sid, sid)) {
493 "objectSid=%s", ldap_encode_ndr_dom_sid(mem_ctx, sid));
511 /* need to re-add a check for an allocated sid */
567 struct dom_sid *sid = r->in.sids->sids[i].sid;
568 char *sid_str = dom_sid_string(mem_ctx, sid);
587 status2 = dcesrv_lsa_lookup_sid(state, mem_ctx, sid, sid_str,
596 authority_name, sid,
776 struct dom_sid *sid;
784 r->out.sids->sids[i].sid = NULL;
788 status2 = dcesrv_lsa_lookup_name(dce_call->event_ctx, lp_ctx, policy_state, mem_ctx, name, &authority_name, &sid, &rtype);
789 if (!NT_STATUS_IS_OK(status2) || sid->num_auths == 0) {
794 sid, domains, &sid_index);
800 r->out.sids->sids[i].sid = sid;
917 struct dom_sid *sid;
925 to sid NULL - so we should return 0 rid for
932 &authority_name, &sid, &rtype);
938 sid, domains, &sid_index);
944 r->out.sids->sids[i].rid = sid->sub_auths[sid->num_auths-1];