Searched refs:sec_desc (Results 1 - 19 of 19) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/
H A Dsrv_svcctl_nt.c123 static NTSTATUS svcctl_access_check( SEC_DESC *sec_desc, NT_USER_TOKEN *token, argument
133 se_access_check( sec_desc, token, access_desired, access_granted, &result );
267 SEC_DESC *sec_desc; local
273 if ( !(sec_desc = construct_scm_sd( p->mem_ctx )) )
277 status = svcctl_access_check( sec_desc, p->pipe_user.nt_user_token, q_u->access, &access_granted );
289 SEC_DESC *sec_desc; local
307 if ( !(sec_desc = svcctl_get_secdesc( p->mem_ctx, service, get_root_nt_token() )) )
311 status = svcctl_access_check( sec_desc, p->pipe_user.nt_user_token, q_u->access, &access_granted );
784 SEC_DESC *sec_desc; local
804 if ( !(sec_desc
828 SEC_DESC *sec_desc = NULL; local
[all...]
H A Dsrv_eventlog_nt.c74 SEC_DESC *sec_desc; local
83 sec_desc = get_nt_acl_no_snum( info, tdbname );
86 if ( !sec_desc ) {
101 ret = se_access_check( sec_desc, token, MAXIMUM_ALLOWED_ACCESS,
104 if ( sec_desc )
105 TALLOC_FREE( sec_desc );
H A Dsrv_reg_nt.c454 r_u->sec_desc = 0x00000078; /* size for key's sec_desc */
882 REGF_NK_REC *parent, SEC_DESC *sec_desc )
931 if ( !(key = regfio_write_key( regfile, keyname, values, subkeys, sec_desc, parent )) ) {
942 result = reg_write_tree( regfile, subkeypath, key, sec_desc );
H A Dsrv_srvsvc_nt.c2040 r_u->sec_desc = psd;
2146 ret = SMB_VFS_SET_NT_ACL(fsp, fsp->fsp_name, q_u->sec_info, q_u->sec_desc);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/registry/
H A Dregfio.c710 if ( !sec_io_desc( "sec_desc", &sk->sec_desc, ps, depth ))
934 if ( sec_desc_equal( p->sec_desc, sd ) )
995 if ( (nk->sk_off!=REGF_OFFSET_NONE) && !( nk->sec_desc = find_sk_record_by_offset( file, nk->sk_off )) ) {
1007 if ( !(nk->sec_desc = TALLOC_ZERO_P( file->mem_ctx, REGF_SK_REC )) )
1009 nk->sec_desc->sk_off = nk->sk_off;
1010 if ( !hbin_prs_sk_rec( "sk_rec", sub_hbin, depth, nk->sec_desc ))
1015 nk->sec_desc->sk_off = nk->sk_off;
1016 DLIST_ADD( file->sec_desc_list, nk->sec_desc );
1692 SEC_DESC *sec_desc, REGF_NK_RE
1690 regfio_write_key( REGF_FILE *file, const char *name, REGVAL_CTR *values, REGSUBKEY_CTR *subkeys, SEC_DESC *sec_desc, REGF_NK_REC *parent ) argument
[all...]
H A Dreg_frontend.c53 static NTSTATUS registry_access_check( SEC_DESC *sec_desc, NT_USER_TOKEN *token, argument
64 se_access_check( sec_desc, token, access_desired, access_granted, &result );
331 SEC_DESC *sec_desc; local
334 if ( !(sec_desc = construct_registry_sd( get_talloc_ctx() )) )
337 status = registry_access_check( sec_desc, token, requested, granted );
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Dregfio.h131 SEC_DESC *sec_desc; member in struct:_regf_sk_rec
175 REGF_SK_REC *sec_desc; member in struct:__anon5298
219 SEC_DESC *sec_desc, REGF_NK_REC *parent );
H A Drpc_srvsvc.h846 SEC_DESC *sec_desc; member in struct:r_net_file_query_secdesc
862 SEC_DESC *sec_desc; member in struct:q_net_file_set_secdesc
H A Drpc_reg.h287 uint32 sec_desc; /* 0x0000 0078 */ member in struct:__anon5415
H A Drpc_netlogon.h892 SEC_DESC *sec_desc; member in struct:__anon5376
941 SEC_DESC *sec_desc; member in struct:__anon5378
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dprofiles.c128 if ( !(new_sd = dup_sec_desc( outfile->mem_ctx, nk->sec_desc->sec_desc )) ) {
H A Dnet_rpc_registry.c372 key = regfio_write_key( outfile, nk->keyname, values, subkeys, nk->sec_desc->sec_desc, parent );
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/
H A Dcli_reg.c195 uint32 *sec_desc, NTTIME *mod_time)
248 *sec_desc = out.sec_desc ;
326 size_t secdesc_size, SEC_DESC *sec_desc)
338 if ( !(sec_desc_buf = make_sec_desc_buf(mem_ctx, secdesc_size, sec_desc)) )
189 rpccli_reg_query_key(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *hnd, char *key_class, uint32 *class_len, uint32 *num_subkeys, uint32 *max_subkeylen, uint32 *max_classlen, uint32 *num_values, uint32 *max_valnamelen, uint32 *max_valbufsize, uint32 *sec_desc, NTTIME *mod_time) argument
324 rpccli_reg_set_key_sec(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *hnd, uint32 sec_info, size_t secdesc_size, SEC_DESC *sec_desc) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/
H A Dsecdesc.c296 SEC_DESC_BUF *make_sec_desc_buf(TALLOC_CTX *ctx, size_t len, SEC_DESC *sec_desc) argument
307 if(sec_desc && ((dst->sec = dup_sec_desc(ctx, sec_desc)) == NULL)) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ntfs-3g-2009.3.8/include/ntfs-3g/
H A Dattrib.h232 SECURITY_DESCRIPTOR_ATTR sec_desc; member in union:__anon4167
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/services/
H A Dservices_db.c379 DEBUG(0,("add_new_svc_name: Failed to create default sec_desc!\n"));
388 if ( sec_io_desc("sec_desc", &sd, &ps, 0 ) ) {
507 if ( !sec_io_desc("sec_desc", &sd, &ps, 0 ) ) {
526 BOOL svcctl_set_secdesc( TALLOC_CTX *ctx, const char *name, SEC_DESC *sec_desc, NT_USER_TOKEN *token ) argument
555 if ( sec_io_desc("sec_desc", &sec_desc, &ps, 0 ) ) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_parse/
H A Dparse_reg.c513 if(!prs_uint32("sec_desc ", ps, depth, &r_u->sec_desc))
H A Dparse_net.c2769 if(!sec_io_desc("sec_desc", &info->sec_desc, ps, depth))
2823 if(!sec_io_desc("sec_desc", &info->sec_desc, ps, depth))
H A Dparse_srv.c3414 if(!sec_io_desc("sec_desc", &r_n->sec_desc, ps, depth))
3477 if(!sec_io_desc("sec_desc", &q_n->sec_desc, ps, depth))

Completed in 194 milliseconds