/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/ |
H A D | srv_svcctl_nt.c | 123 static NTSTATUS svcctl_access_check( SEC_DESC *sec_desc, NT_USER_TOKEN *token, argument 133 se_access_check( sec_desc, token, access_desired, access_granted, &result ); 267 SEC_DESC *sec_desc; local 273 if ( !(sec_desc = construct_scm_sd( p->mem_ctx )) ) 277 status = svcctl_access_check( sec_desc, p->pipe_user.nt_user_token, q_u->access, &access_granted ); 289 SEC_DESC *sec_desc; local 307 if ( !(sec_desc = svcctl_get_secdesc( p->mem_ctx, service, get_root_nt_token() )) ) 311 status = svcctl_access_check( sec_desc, p->pipe_user.nt_user_token, q_u->access, &access_granted ); 784 SEC_DESC *sec_desc; local 804 if ( !(sec_desc 828 SEC_DESC *sec_desc = NULL; local [all...] |
H A D | srv_eventlog_nt.c | 74 SEC_DESC *sec_desc; local 83 sec_desc = get_nt_acl_no_snum( info, tdbname ); 86 if ( !sec_desc ) { 101 ret = se_access_check( sec_desc, token, MAXIMUM_ALLOWED_ACCESS, 104 if ( sec_desc ) 105 TALLOC_FREE( sec_desc );
|
H A D | srv_reg_nt.c | 454 r_u->sec_desc = 0x00000078; /* size for key's sec_desc */ 882 REGF_NK_REC *parent, SEC_DESC *sec_desc ) 931 if ( !(key = regfio_write_key( regfile, keyname, values, subkeys, sec_desc, parent )) ) { 942 result = reg_write_tree( regfile, subkeypath, key, sec_desc );
|
H A D | srv_srvsvc_nt.c | 2040 r_u->sec_desc = psd; 2146 ret = SMB_VFS_SET_NT_ACL(fsp, fsp->fsp_name, q_u->sec_info, q_u->sec_desc);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/registry/ |
H A D | regfio.c | 710 if ( !sec_io_desc( "sec_desc", &sk->sec_desc, ps, depth )) 934 if ( sec_desc_equal( p->sec_desc, sd ) ) 995 if ( (nk->sk_off!=REGF_OFFSET_NONE) && !( nk->sec_desc = find_sk_record_by_offset( file, nk->sk_off )) ) { 1007 if ( !(nk->sec_desc = TALLOC_ZERO_P( file->mem_ctx, REGF_SK_REC )) ) 1009 nk->sec_desc->sk_off = nk->sk_off; 1010 if ( !hbin_prs_sk_rec( "sk_rec", sub_hbin, depth, nk->sec_desc )) 1015 nk->sec_desc->sk_off = nk->sk_off; 1016 DLIST_ADD( file->sec_desc_list, nk->sec_desc ); 1692 SEC_DESC *sec_desc, REGF_NK_RE 1690 regfio_write_key( REGF_FILE *file, const char *name, REGVAL_CTR *values, REGSUBKEY_CTR *subkeys, SEC_DESC *sec_desc, REGF_NK_REC *parent ) argument [all...] |
H A D | reg_frontend.c | 53 static NTSTATUS registry_access_check( SEC_DESC *sec_desc, NT_USER_TOKEN *token, argument 64 se_access_check( sec_desc, token, access_desired, access_granted, &result ); 331 SEC_DESC *sec_desc; local 334 if ( !(sec_desc = construct_registry_sd( get_talloc_ctx() )) ) 337 status = registry_access_check( sec_desc, token, requested, granted );
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | regfio.h | 131 SEC_DESC *sec_desc; member in struct:_regf_sk_rec 175 REGF_SK_REC *sec_desc; member in struct:__anon5298 219 SEC_DESC *sec_desc, REGF_NK_REC *parent );
|
H A D | rpc_srvsvc.h | 846 SEC_DESC *sec_desc; member in struct:r_net_file_query_secdesc 862 SEC_DESC *sec_desc; member in struct:q_net_file_set_secdesc
|
H A D | rpc_reg.h | 287 uint32 sec_desc; /* 0x0000 0078 */ member in struct:__anon5415
|
H A D | rpc_netlogon.h | 892 SEC_DESC *sec_desc; member in struct:__anon5376 941 SEC_DESC *sec_desc; member in struct:__anon5378
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | profiles.c | 128 if ( !(new_sd = dup_sec_desc( outfile->mem_ctx, nk->sec_desc->sec_desc )) ) {
|
H A D | net_rpc_registry.c | 372 key = regfio_write_key( outfile, nk->keyname, values, subkeys, nk->sec_desc->sec_desc, parent );
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/ |
H A D | cli_reg.c | 195 uint32 *sec_desc, NTTIME *mod_time) 248 *sec_desc = out.sec_desc ; 326 size_t secdesc_size, SEC_DESC *sec_desc) 338 if ( !(sec_desc_buf = make_sec_desc_buf(mem_ctx, secdesc_size, sec_desc)) ) 189 rpccli_reg_query_key(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *hnd, char *key_class, uint32 *class_len, uint32 *num_subkeys, uint32 *max_subkeylen, uint32 *max_classlen, uint32 *num_values, uint32 *max_valnamelen, uint32 *max_valbufsize, uint32 *sec_desc, NTTIME *mod_time) argument 324 rpccli_reg_set_key_sec(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *hnd, uint32 sec_info, size_t secdesc_size, SEC_DESC *sec_desc) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | secdesc.c | 296 SEC_DESC_BUF *make_sec_desc_buf(TALLOC_CTX *ctx, size_t len, SEC_DESC *sec_desc) argument 307 if(sec_desc && ((dst->sec = dup_sec_desc(ctx, sec_desc)) == NULL)) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ntfs-3g-2009.3.8/include/ntfs-3g/ |
H A D | attrib.h | 232 SECURITY_DESCRIPTOR_ATTR sec_desc; member in union:__anon4167
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/services/ |
H A D | services_db.c | 379 DEBUG(0,("add_new_svc_name: Failed to create default sec_desc!\n")); 388 if ( sec_io_desc("sec_desc", &sd, &ps, 0 ) ) { 507 if ( !sec_io_desc("sec_desc", &sd, &ps, 0 ) ) { 526 BOOL svcctl_set_secdesc( TALLOC_CTX *ctx, const char *name, SEC_DESC *sec_desc, NT_USER_TOKEN *token ) argument 555 if ( sec_io_desc("sec_desc", &sec_desc, &ps, 0 ) ) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_parse/ |
H A D | parse_reg.c | 513 if(!prs_uint32("sec_desc ", ps, depth, &r_u->sec_desc))
|
H A D | parse_net.c | 2769 if(!sec_io_desc("sec_desc", &info->sec_desc, ps, depth)) 2823 if(!sec_io_desc("sec_desc", &info->sec_desc, ps, depth))
|
H A D | parse_srv.c | 3414 if(!sec_io_desc("sec_desc", &r_n->sec_desc, ps, depth)) 3477 if(!sec_io_desc("sec_desc", &q_n->sec_desc, ps, depth))
|