psd 320 examples/VFS/skel_opaque.c uint32 security_info_sent, const SEC_DESC *psd) psd 307 examples/VFS/skel_transparent.c uint32 security_info_sent, const SEC_DESC *psd) psd 309 examples/VFS/skel_transparent.c return SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd); psd 682 source3/include/proto.h NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size); psd 684 source3/include/proto.h NTSTATUS sec_desc_del_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, size_t *sd_size); psd 717 source3/include/proto.h bool set_share_security(const char *share_name, SEC_DESC *psd); psd 1274 source3/include/proto.h NTSTATUS samr_make_sam_obj_sd(TALLOC_CTX *ctx, SEC_DESC **psd, size_t *sd_size); psd 6747 source3/include/proto.h NTSTATUS unpack_nt_owners(int snum, uid_t *puser, gid_t *pgrp, uint32 security_info_sent, const SEC_DESC *psd); psd 6757 source3/include/proto.h NTSTATUS set_nt_acl(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd); psd 7282 source3/include/proto.h NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token, psd 442 source3/include/vfs.h const struct security_descriptor *psd); psd 100 source3/include/vfs_macros.h #define SMB_VFS_FSET_NT_ACL(fsp, security_info_sent, psd) ((fsp)->conn->vfs.ops.fset_nt_acl((fsp)->conn->vfs.handles.fset_nt_acl, (fsp), (security_info_sent), (psd))) psd 234 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_FSET_NT_ACL(fsp, security_info_sent, psd) ((fsp)->conn->vfs_opaque.ops.fset_nt_acl((fsp)->conn->vfs_opaque.handles.fset_nt_acl, (fsp), (security_info_sent), (psd))) psd 369 source3/include/vfs_macros.h #define SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd) ((handle)->vfs_next.ops.fset_nt_acl((handle)->vfs_next.handles.fset_nt_acl, (fsp), (security_info_sent), (psd))) psd 139 source3/lib/secdesc.c SEC_DESC *psd = NULL; psd 171 source3/lib/secdesc.c psd = make_sec_desc(ctx, new_sdb->sd->revision, secdesc_type, psd 174 source3/lib/secdesc.c return_sdb = make_sec_desc_buf(ctx, secdesc_size, psd); psd 441 source3/lib/secdesc.c NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size) psd 448 source3/lib/secdesc.c if (!ctx || !psd || !sid || !sd_size) psd 453 source3/lib/secdesc.c status = sec_ace_add_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid, mask); psd 458 source3/lib/secdesc.c if (!(dacl = make_sec_acl(ctx, psd[0]->dacl->revision, psd[0]->dacl->num_aces, ace))) psd 461 source3/lib/secdesc.c if (!(sd = make_sec_desc(ctx, psd[0]->revision, psd[0]->type, psd[0]->owner_sid, psd 462 source3/lib/secdesc.c psd[0]->group_sid, psd[0]->sacl, dacl, sd_size))) psd 465 source3/lib/secdesc.c *psd = sd; psd 493 source3/lib/secdesc.c NTSTATUS sec_desc_del_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, size_t *sd_size) psd 500 source3/lib/secdesc.c if (!ctx || !psd[0] || !sid || !sd_size) psd 505 source3/lib/secdesc.c status = sec_ace_del_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid); psd 510 source3/lib/secdesc.c if (!(dacl = make_sec_acl(ctx, psd[0]->dacl->revision, psd[0]->dacl->num_aces, ace))) psd 513 source3/lib/secdesc.c if (!(sd = make_sec_desc(ctx, psd[0]->revision, psd[0]->type, psd[0]->owner_sid, psd 514 source3/lib/secdesc.c psd[0]->group_sid, psd[0]->sacl, dacl, sd_size))) psd 517 source3/lib/secdesc.c *psd = sd; psd 130 source3/lib/sharesec.c SEC_DESC *psd = NULL; psd 139 source3/lib/sharesec.c psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1, psd 144 source3/lib/sharesec.c if (!psd) { psd 149 source3/lib/sharesec.c return psd; psd 160 source3/lib/sharesec.c SEC_DESC *psd = NULL; psd 182 source3/lib/sharesec.c status = unmarshall_sec_desc(ctx, data.dptr, data.dsize, &psd); psd 192 source3/lib/sharesec.c if (psd) psd 193 source3/lib/sharesec.c *psize = ndr_size_security_descriptor(psd, NULL, 0); psd 195 source3/lib/sharesec.c return psd; psd 202 source3/lib/sharesec.c bool set_share_security(const char *share_name, SEC_DESC *psd) psd 216 source3/lib/sharesec.c status = marshall_sec_desc(frame, psd, &blob.dptr, &blob.dsize); psd 284 source3/lib/sharesec.c SEC_DESC *psd = NULL; psd 287 source3/lib/sharesec.c psd = get_share_security(talloc_tos(), sharename, &sd_size); psd 289 source3/lib/sharesec.c if (!psd) { psd 293 source3/lib/sharesec.c status = se_access_check(psd, token, desired_access, &granted); psd 295 source3/lib/sharesec.c TALLOC_FREE(psd); psd 311 source3/lib/sharesec.c SEC_DESC *psd = NULL; psd 391 source3/lib/sharesec.c psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1, psd 396 source3/lib/sharesec.c if (!psd) { psd 401 source3/lib/sharesec.c *ppsd = psd; psd 254 source3/lib/util_seaccess.c NTSTATUS samr_make_sam_obj_sd(TALLOC_CTX *ctx, SEC_DESC **psd, size_t *sd_size) psd 282 source3/lib/util_seaccess.c if ((*psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1, psd 2142 source3/libads/ldap.c struct security_descriptor *psd; psd 2146 source3/libads/ldap.c values[0]->bv_len, &psd); psd 2154 source3/libads/ldap.c if (psd) { psd 2155 source3/libads/ldap.c ads_disp_sd(ads, talloc_tos(), psd); psd 31 source3/libsmb/clisecdesc.c SEC_DESC *psd = NULL; psd 54 source3/libsmb/clisecdesc.c &psd); psd 67 source3/libsmb/clisecdesc.c return psd; psd 705 source3/modules/nfs4_acls.c const SEC_DESC *psd, psd 737 source3/modules/nfs4_acls.c NTSTATUS status = unpack_nt_owners(SNUM(fsp->conn), &newUID, &newGID, security_info_sent, psd); psd 763 source3/modules/nfs4_acls.c if (!(security_info_sent & DACL_SECURITY_INFORMATION) || psd->dacl ==NULL) { psd 768 source3/modules/nfs4_acls.c theacl = smbacl4_win2nfs4(fsp->fsp_name, psd->dacl, ¶ms, sbuf.st_uid, sbuf.st_gid); psd 147 source3/modules/nfs4_acls.h const SEC_DESC *psd, psd 133 source3/modules/onefs.h uint32 security_info_sent, SEC_DESC *psd); psd 139 source3/modules/onefs.h NTSTATUS onefs_samba_sd_to_sd(uint32_t security_info_sent, SEC_DESC *psd, psd 813 source3/modules/onefs_acl.c NTSTATUS onefs_samba_sd_to_sd(uint32_t security_info_sent, SEC_DESC *psd, psd 830 source3/modules/onefs_acl.c if (!onefs_og_to_identity(psd->owner_sid, &owner, false, snum)) psd 840 source3/modules/onefs_acl.c if (!onefs_og_to_identity(psd->group_sid, &group, true, snum)) psd 849 source3/modules/onefs_acl.c if ((security_info_sent & DACL_SECURITY_INFORMATION) && (psd->dacl)) { psd 850 source3/modules/onefs_acl.c if (!onefs_samba_acl_to_acl(psd->dacl, &daclp, &ignore_aces, psd 866 source3/modules/onefs_acl.c if (psd->sacl) { psd 867 source3/modules/onefs_acl.c if (!onefs_samba_acl_to_acl(psd->sacl, psd 881 source3/modules/onefs_acl.c if (aclu_initialize_sd(sd, psd->type, ownerp, groupp, psd 899 source3/modules/onefs_acl.c uint32_t sec_info_sent, SEC_DESC *psd) psd 911 source3/modules/onefs_acl.c status = onefs_samba_sd_to_sd(sec_info_sent, psd, &sd, psd 237 source3/modules/vfs_acl_tdb.c static NTSTATUS create_acl_blob(const struct security_descriptor *psd, DATA_BLOB *pblob) psd 249 source3/modules/vfs_acl_tdb.c xacl.info.sd_hs->sd = CONST_DISCARD(struct security_descriptor *, psd); psd 458 source3/modules/vfs_acl_tdb.c struct security_descriptor *psd = NULL; psd 486 source3/modules/vfs_acl_tdb.c &psd, psd 498 source3/modules/vfs_acl_tdb.c NDR_PRINT_DEBUG(security_descriptor, psd); psd 508 source3/modules/vfs_acl_tdb.c if (!psd || psd->dacl == NULL) { psd 512 source3/modules/vfs_acl_tdb.c TALLOC_FREE(psd); psd 525 source3/modules/vfs_acl_tdb.c psd = default_file_sd(ctx, &sbuf); psd 526 source3/modules/vfs_acl_tdb.c if (!psd) { psd 532 source3/modules/vfs_acl_tdb.c NDR_PRINT_DEBUG(security_descriptor, psd); psd 536 source3/modules/vfs_acl_tdb.c status = create_acl_blob(psd, &blob); psd 738 source3/modules/vfs_acl_tdb.c uint32 security_info_sent, const struct security_descriptor *psd) psd 747 source3/modules/vfs_acl_tdb.c CONST_DISCARD(struct security_descriptor *,psd)); psd 750 source3/modules/vfs_acl_tdb.c status = SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd); psd 756 source3/modules/vfs_acl_tdb.c if (!psd->owner_sid || !psd->group_sid) { psd 760 source3/modules/vfs_acl_tdb.c struct security_descriptor *nc_psd = dup_sec_desc(talloc_tos(), psd); psd 784 source3/modules/vfs_acl_tdb.c psd = nc_psd; psd 789 source3/modules/vfs_acl_tdb.c psd->dacl != NULL && psd 790 source3/modules/vfs_acl_tdb.c (psd->type & (SE_DESC_DACL_AUTO_INHERITED| psd 795 source3/modules/vfs_acl_tdb.c status = append_parent_acl(fsp, psd, &new_psd); psd 801 source3/modules/vfs_acl_tdb.c psd = new_psd; psd 809 source3/modules/vfs_acl_tdb.c CONST_DISCARD(struct security_descriptor *,psd)); psd 811 source3/modules/vfs_acl_tdb.c create_acl_blob(psd, &blob); psd 134 source3/modules/vfs_acl_xattr.c static NTSTATUS create_acl_blob(const struct security_descriptor *psd, DATA_BLOB *pblob) psd 146 source3/modules/vfs_acl_xattr.c xacl.info.sd_hs->sd = CONST_DISCARD(struct security_descriptor *, psd); psd 326 source3/modules/vfs_acl_xattr.c struct security_descriptor *psd = NULL; psd 354 source3/modules/vfs_acl_xattr.c &psd, psd 366 source3/modules/vfs_acl_xattr.c NDR_PRINT_DEBUG(security_descriptor, psd); psd 376 source3/modules/vfs_acl_xattr.c if (!psd || psd->dacl == NULL) { psd 380 source3/modules/vfs_acl_xattr.c TALLOC_FREE(psd); psd 393 source3/modules/vfs_acl_xattr.c psd = default_file_sd(ctx, &sbuf); psd 394 source3/modules/vfs_acl_xattr.c if (!psd) { psd 400 source3/modules/vfs_acl_xattr.c NDR_PRINT_DEBUG(security_descriptor, psd); psd 404 source3/modules/vfs_acl_xattr.c status = create_acl_blob(psd, &blob); psd 538 source3/modules/vfs_acl_xattr.c uint32 security_info_sent, const struct security_descriptor *psd) psd 547 source3/modules/vfs_acl_xattr.c CONST_DISCARD(struct security_descriptor *,psd)); psd 550 source3/modules/vfs_acl_xattr.c status = SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd); psd 556 source3/modules/vfs_acl_xattr.c if (!psd->owner_sid || !psd->group_sid) { psd 560 source3/modules/vfs_acl_xattr.c struct security_descriptor *nc_psd = dup_sec_desc(talloc_tos(), psd); psd 584 source3/modules/vfs_acl_xattr.c psd = nc_psd; psd 589 source3/modules/vfs_acl_xattr.c psd->dacl != NULL && psd 590 source3/modules/vfs_acl_xattr.c (psd->type & (SE_DESC_DACL_AUTO_INHERITED| psd 595 source3/modules/vfs_acl_xattr.c status = append_parent_acl(fsp, psd, &new_psd); psd 601 source3/modules/vfs_acl_xattr.c psd = new_psd; psd 609 source3/modules/vfs_acl_xattr.c CONST_DISCARD(struct security_descriptor *,psd)); psd 611 source3/modules/vfs_acl_xattr.c create_acl_blob(psd, &blob); psd 724 source3/modules/vfs_afsacl.c const struct security_descriptor *psd, psd 735 source3/modules/vfs_afsacl.c (psd->dacl == NULL)) psd 741 source3/modules/vfs_afsacl.c dacl = psd->dacl; psd 894 source3/modules/vfs_afsacl.c const struct security_descriptor *psd) psd 950 source3/modules/vfs_afsacl.c if (!nt_to_afs_acl(fsp->fsp_name, security_info_sent, psd, psd 965 source3/modules/vfs_afsacl.c if (!nt_to_afs_acl(fsp->fsp_name, security_info_sent, psd, psd 1047 source3/modules/vfs_afsacl.c const SEC_DESC *psd) psd 1049 source3/modules/vfs_afsacl.c return afs_set_nt_acl(handle, fsp, security_info_sent, psd); psd 372 source3/modules/vfs_aixacl2.c static NTSTATUS aixjfs2_set_nt_acl_common(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd) psd 386 source3/modules/vfs_aixacl2.c fsp, security_info_sent, psd, psd 389 source3/modules/vfs_aixacl2.c result = set_nt_acl(fsp, security_info_sent, psd); psd 396 source3/modules/vfs_aixacl2.c NTSTATUS aixjfs2_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd) psd 398 source3/modules/vfs_aixacl2.c return aixjfs2_set_nt_acl_common(fsp, security_info_sent, psd); psd 1263 source3/modules/vfs_default.c static NTSTATUS vfswrap_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd) psd 1268 source3/modules/vfs_default.c result = set_nt_acl(fsp, security_info_sent, psd); psd 251 source3/modules/vfs_full_audit.c const SEC_DESC *psd); psd 1840 source3/modules/vfs_full_audit.c const SEC_DESC *psd) psd 1844 source3/modules/vfs_full_audit.c result = SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd); psd 437 source3/modules/vfs_gpfs.c static NTSTATUS gpfsacl_set_nt_acl_internal(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd) psd 449 source3/modules/vfs_gpfs.c fsp, security_info_sent, psd, psd 452 source3/modules/vfs_gpfs.c result = set_nt_acl(fsp, security_info_sent, psd); psd 458 source3/modules/vfs_gpfs.c static NTSTATUS gpfsacl_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd) psd 460 source3/modules/vfs_gpfs.c return gpfsacl_set_nt_acl_internal(fsp, security_info_sent, psd); psd 169 source3/modules/vfs_zfsacl.c const struct security_descriptor *psd) psd 171 source3/modules/vfs_zfsacl.c return smb_set_nt_acl_nfs4(fsp, security_info_sent, psd, psd 210 source3/modules/vfs_zfsacl.c const SEC_DESC *psd) psd 212 source3/modules/vfs_zfsacl.c return zfs_set_nt_acl(handle, fsp, security_info_sent, psd); psd 8533 source3/param/loadparm.c SEC_DESC *psd = NULL; psd 8648 source3/param/loadparm.c &comment, &psd, &guest_ok) != USERSHARE_OK) { psd 8675 source3/param/loadparm.c if (!set_share_security(service_name, psd)) { psd 5315 source3/printing/nt_printing.c SEC_DESC *psd = NULL; psd 5343 source3/printing/nt_printing.c psd = make_sec_desc(mem_ctx, secdesc_ctr->sd->revision, secdesc_ctr->sd->type, psd 5349 source3/printing/nt_printing.c if (!psd) { psd 5354 source3/printing/nt_printing.c new_secdesc_ctr = make_sec_desc_buf(mem_ctx, size, psd); psd 5403 source3/printing/nt_printing.c SEC_DESC *psd = NULL; psd 5457 source3/printing/nt_printing.c psd = make_sec_desc(ctx, SEC_DESC_REVISION, SEC_DESC_SELF_RELATIVE, psd 5463 source3/printing/nt_printing.c if (!psd) { psd 5468 source3/printing/nt_printing.c sdb = make_sec_desc_buf(ctx, sd_size, psd); psd 5533 source3/printing/nt_printing.c SEC_DESC *psd = NULL; psd 5540 source3/printing/nt_printing.c psd = make_sec_desc(ctx, (*secdesc_ctr)->sd->revision, (*secdesc_ctr)->sd->type, psd 5547 source3/printing/nt_printing.c if (!psd) { psd 5551 source3/printing/nt_printing.c new_secdesc_ctr = make_sec_desc_buf(ctx, size, psd); psd 37 source3/registry/reg_dispatcher.c static WERROR construct_registry_sd(TALLOC_CTX *ctx, SEC_DESC **psd) psd 75 source3/registry/reg_dispatcher.c *psd = sd; psd 388 source3/rpc_server/srv_lsa_nt.c SEC_DESC *psd = NULL; psd 401 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size, &lsa_policy_mapping, psd 407 source3/rpc_server/srv_lsa_nt.c status = access_check_object(psd, p->server_info->ptok, psd 1630 source3/rpc_server/srv_lsa_nt.c SEC_DESC *psd = NULL; psd 1654 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size, psd 1661 source3/rpc_server/srv_lsa_nt.c status = access_check_object(psd, p->server_info->ptok, psd 1938 source3/rpc_server/srv_lsa_nt.c SEC_DESC *psd = NULL; psd 1947 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size, psd 1950 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size, psd 1964 source3/rpc_server/srv_lsa_nt.c if((*r->out.sdbuf = make_sec_desc_buf(p->mem_ctx, sd_size, psd)) == NULL) psd 1969 source3/rpc_server/srv_lsa_nt.c if((*r->out.sdbuf = make_sec_desc_buf(p->mem_ctx, sd_size, psd)) == NULL) psd 2057 source3/rpc_server/srv_lsa_nt.c SEC_DESC *psd = NULL; psd 2071 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size, psd 2085 source3/rpc_server/srv_lsa_nt.c status = access_check_object(psd, p->server_info->ptok, psd 2126 source3/rpc_server/srv_lsa_nt.c SEC_DESC *psd = NULL; psd 2142 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size, psd 2155 source3/rpc_server/srv_lsa_nt.c status = access_check_object(psd, p->server_info->ptok, psd 112 source3/rpc_server/srv_samr_nt.c static NTSTATUS make_samr_object_sd( TALLOC_CTX *ctx, SEC_DESC **psd, size_t *sd_size, psd 154 source3/rpc_server/srv_samr_nt.c if ((*psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1, psd 167 source3/rpc_server/srv_samr_nt.c NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token, psd 192 source3/rpc_server/srv_samr_nt.c status = se_access_check(psd, token, des_access, acc_granted); psd 603 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd = NULL; psd 619 source3/rpc_server/srv_samr_nt.c make_samr_object_sd( p->mem_ctx, &psd, &sd_size, &dom_generic_mapping, NULL, 0 ); psd 641 source3/rpc_server/srv_samr_nt.c status = access_check_object( psd, p->server_info->ptok, psd 863 source3/rpc_server/srv_samr_nt.c SEC_DESC * psd = NULL; psd 886 source3/rpc_server/srv_samr_nt.c status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &sam_generic_mapping, NULL, 0); psd 891 source3/rpc_server/srv_samr_nt.c status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &dom_generic_mapping, NULL, 0); psd 897 source3/rpc_server/srv_samr_nt.c status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &dom_generic_mapping, NULL, 0); psd 905 source3/rpc_server/srv_samr_nt.c status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_generic_mapping, psd 908 source3/rpc_server/srv_samr_nt.c status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_nopwchange_generic_mapping, psd 915 source3/rpc_server/srv_samr_nt.c if ((*r->out.sdbuf = make_sec_desc_buf(p->mem_ctx, sd_size, psd)) == NULL) psd 2331 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd = NULL; psd 2365 source3/rpc_server/srv_samr_nt.c make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_generic_mapping, &sid, SAMR_USR_RIGHTS_WRITE_PW); psd 2433 source3/rpc_server/srv_samr_nt.c nt_status = access_check_object(psd, p->server_info->ptok, psd 3750 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd; psd 3846 source3/rpc_server/srv_samr_nt.c make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_generic_mapping, psd 3857 source3/rpc_server/srv_samr_nt.c nt_status = access_check_object(psd, p->server_info->ptok, psd 3954 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd = NULL; psd 3987 source3/rpc_server/srv_samr_nt.c make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &sam_generic_mapping, NULL, 0); psd 3990 source3/rpc_server/srv_samr_nt.c nt_status = access_check_object(psd, p->server_info->ptok, psd 4185 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd = NULL; psd 4213 source3/rpc_server/srv_samr_nt.c make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &ali_generic_mapping, NULL, 0); psd 4218 source3/rpc_server/srv_samr_nt.c status = access_check_object(psd, p->server_info->ptok, psd 6360 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd = NULL; psd 6382 source3/rpc_server/srv_samr_nt.c make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &grp_generic_mapping, NULL, 0); psd 6387 source3/rpc_server/srv_samr_nt.c status = access_check_object(psd, p->server_info->ptok, psd 322 source3/rpc_server/srv_srvsvc_nt.c static void map_generic_share_sd_bits(SEC_DESC *psd) psd 327 source3/rpc_server/srv_srvsvc_nt.c if (!psd) psd 330 source3/rpc_server/srv_srvsvc_nt.c ps_dacl = psd->dacl; psd 1493 source3/rpc_server/srv_srvsvc_nt.c SEC_DESC *psd = NULL; psd 1549 source3/rpc_server/srv_srvsvc_nt.c psd = NULL; psd 1557 source3/rpc_server/srv_srvsvc_nt.c psd = NULL; psd 1564 source3/rpc_server/srv_srvsvc_nt.c psd = NULL; psd 1571 source3/rpc_server/srv_srvsvc_nt.c psd = info->info502->sd_buf.sd; psd 1572 source3/rpc_server/srv_srvsvc_nt.c map_generic_share_sd_bits(psd); psd 1598 source3/rpc_server/srv_srvsvc_nt.c psd = info->info1501->sd; psd 1599 source3/rpc_server/srv_srvsvc_nt.c map_generic_share_sd_bits(psd); psd 1688 source3/rpc_server/srv_srvsvc_nt.c if (psd) { psd 1694 source3/rpc_server/srv_srvsvc_nt.c if (old_sd && !sec_desc_equal(old_sd, psd)) { psd 1695 source3/rpc_server/srv_srvsvc_nt.c if (!set_share_security(share_name, psd)) psd 1723 source3/rpc_server/srv_srvsvc_nt.c SEC_DESC *psd = NULL; psd 1770 source3/rpc_server/srv_srvsvc_nt.c psd = r->in.info->info502->sd_buf.sd; psd 1771 source3/rpc_server/srv_srvsvc_nt.c map_generic_share_sd_bits(psd); psd 1870 source3/rpc_server/srv_srvsvc_nt.c if (psd) { psd 1871 source3/rpc_server/srv_srvsvc_nt.c if (!set_share_security(share_name, psd)) { psd 2051 source3/rpc_server/srv_srvsvc_nt.c SEC_DESC *psd = NULL; psd 2113 source3/rpc_server/srv_srvsvc_nt.c |DACL_SECURITY_INFORMATION), &psd); psd 2122 source3/rpc_server/srv_srvsvc_nt.c sd_size = ndr_size_security_descriptor(psd, NULL, 0); psd 2131 source3/rpc_server/srv_srvsvc_nt.c sd_buf->sd = psd; psd 2135 source3/rpc_server/srv_srvsvc_nt.c psd->dacl->revision = NT4_ACL_REVISION; psd 2175 source3/rpc_server/srv_srvsvc_nt.c struct security_descriptor *psd = NULL; psd 2225 source3/rpc_server/srv_srvsvc_nt.c psd = r->in.sd_buf->sd; psd 2228 source3/rpc_server/srv_srvsvc_nt.c if (psd->owner_sid==0) { psd 2231 source3/rpc_server/srv_srvsvc_nt.c if (psd->group_sid==0) { psd 2234 source3/rpc_server/srv_srvsvc_nt.c if (psd->sacl==0) { psd 2237 source3/rpc_server/srv_srvsvc_nt.c if (psd->dacl==0) { psd 2242 source3/rpc_server/srv_srvsvc_nt.c security_acl_map_generic(psd->dacl, &file_generic_mapping); psd 2243 source3/rpc_server/srv_srvsvc_nt.c security_acl_map_generic(psd->sacl, &file_generic_mapping); psd 2247 source3/rpc_server/srv_srvsvc_nt.c psd); psd 760 source3/smbd/nttrans.c SEC_DESC *psd = NULL; psd 767 source3/smbd/nttrans.c status = unmarshall_sec_desc(talloc_tos(), data, sd_len, &psd); psd 773 source3/smbd/nttrans.c if (psd->owner_sid == NULL) { psd 776 source3/smbd/nttrans.c if (psd->group_sid == NULL) { psd 781 source3/smbd/nttrans.c security_acl_map_generic(psd->dacl, &file_generic_mapping); psd 782 source3/smbd/nttrans.c security_acl_map_generic(psd->sacl, &file_generic_mapping); psd 786 source3/smbd/nttrans.c NDR_PRINT_DEBUG(security_descriptor, psd); psd 789 source3/smbd/nttrans.c status = SMB_VFS_FSET_NT_ACL(fsp, security_info_sent, psd); psd 791 source3/smbd/nttrans.c TALLOC_FREE(psd); psd 1642 source3/smbd/nttrans.c SEC_DESC *psd = NULL; psd 1676 source3/smbd/nttrans.c status = get_null_nt_acl(talloc_tos(), &psd); psd 1679 source3/smbd/nttrans.c fsp, security_info_wanted, &psd); psd 1688 source3/smbd/nttrans.c if (psd->sacl == NULL && psd 1690 source3/smbd/nttrans.c psd->type |= SEC_DESC_SACL_PRESENT; psd 1691 source3/smbd/nttrans.c if (psd->dacl == NULL && psd 1693 source3/smbd/nttrans.c psd->type |= SEC_DESC_DACL_PRESENT; psd 1695 source3/smbd/nttrans.c sd_size = ndr_size_security_descriptor(psd, NULL, 0); psd 1701 source3/smbd/nttrans.c NDR_PRINT_DEBUG(security_descriptor, psd); psd 1722 source3/smbd/nttrans.c status = marshall_sec_desc(talloc_tos(), psd, psd 1146 source3/smbd/posix_acls.c NTSTATUS unpack_nt_owners(int snum, uid_t *puser, gid_t *pgrp, uint32 security_info_sent, const SEC_DESC *psd) psd 1174 source3/smbd/posix_acls.c sid_copy(&owner_sid, psd->owner_sid); psd 1197 source3/smbd/posix_acls.c sid_copy(&grp_sid, psd->group_sid); psd 2205 source3/smbd/posix_acls.c const SEC_DESC *psd) psd 2222 source3/smbd/posix_acls.c if(!(security_info_sent & DACL_SECURITY_INFORMATION) || !psd->dacl) psd 2230 source3/smbd/posix_acls.c &file_ace, &dir_ace, psd->dacl)) psd 3058 source3/smbd/posix_acls.c SEC_DESC *psd = NULL; psd 3256 source3/smbd/posix_acls.c psd = make_standard_sec_desc( talloc_tos(), psd 3262 source3/smbd/posix_acls.c if(!psd) { psd 3279 source3/smbd/posix_acls.c psd->type |= SEC_DESC_DACL_PROTECTED; psd 3281 source3/smbd/posix_acls.c psd->type |= pal->sd_type; psd 3284 source3/smbd/posix_acls.c if (psd->dacl) { psd 3285 source3/smbd/posix_acls.c dacl_sort_into_canonical_order(psd->dacl->aces, (unsigned int)psd->dacl->num_aces); psd 3288 source3/smbd/posix_acls.c *ppdesc = psd; psd 3486 source3/smbd/posix_acls.c SEC_DESC *psd = dup_sec_desc(talloc_tos(), pcsd); psd 3491 source3/smbd/posix_acls.c if (psd == NULL) { psd 3551 source3/smbd/posix_acls.c for (i = 0; i < psd->dacl->num_aces; i++) { psd 3552 source3/smbd/posix_acls.c sec_ace_copy(&new_ace[i], &psd->dacl->aces[i]); psd 3597 source3/smbd/posix_acls.c for (k = 0; k < psd->dacl->num_aces; k++) { psd 3598 source3/smbd/posix_acls.c if (sid_equal(&psd->dacl->aces[k].trustee, psd 3603 source3/smbd/posix_acls.c if (k < psd->dacl->num_aces) { psd 3651 source3/smbd/posix_acls.c psd->dacl->aces = new_ace; psd 3652 source3/smbd/posix_acls.c psd->dacl->num_aces = i; psd 3653 source3/smbd/posix_acls.c psd->type &= ~(SE_DESC_DACL_AUTO_INHERITED| psd 3656 source3/smbd/posix_acls.c *pp_new_sd = psd; psd 3667 source3/smbd/posix_acls.c NTSTATUS set_nt_acl(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd) psd 3718 source3/smbd/posix_acls.c status = unpack_nt_owners( SNUM(conn), &user, &grp, security_info_sent, psd); psd 3784 source3/smbd/posix_acls.c &file_ace_list, &dir_ace_list, security_info_sent, psd); psd 3802 source3/smbd/posix_acls.c if(!(security_info_sent & DACL_SECURITY_INFORMATION) || (psd->dacl == NULL)) { psd 3884 source3/smbd/posix_acls.c psd->type); psd 4540 source3/smbd/posix_acls.c SEC_DESC *psd, *ret_sd; psd 4576 source3/smbd/posix_acls.c if (!NT_STATUS_IS_OK(SMB_VFS_FGET_NT_ACL( &finfo, DACL_SECURITY_INFORMATION, &psd))) { psd 4582 source3/smbd/posix_acls.c ret_sd = dup_sec_desc( ctx, psd ); psd 323 source3/utils/net_usershare.c SEC_DESC *psd = NULL; psd 385 source3/utils/net_usershare.c &psd, psd 403 source3/utils/net_usershare.c for (num_aces = 0; num_aces < psd->dacl->num_aces; num_aces++) { psd 409 source3/utils/net_usershare.c &psd->dacl->aces[num_aces].trustee, psd 432 source3/utils/net_usershare.c &psd->dacl->aces[num_aces].trustee); psd 445 source3/utils/net_usershare.c if (psd->dacl->aces[num_aces].type == SEC_ACE_TYPE_ACCESS_DENIED) { psd 451 source3/utils/net_usershare.c if (psd->dacl->aces[num_aces].access_mask & GENERIC_ALL_ACCESS) { psd 145 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor **psd) psd 154 source4/ntvfs/posix/pvfs_acl.c *psd = security_descriptor_initialise(req); psd 155 source4/ntvfs/posix/pvfs_acl.c if (*psd == NULL) { psd 158 source4/ntvfs/posix/pvfs_acl.c sd = *psd; psd 36 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_descriptor **psd) psd 56 source4/ntvfs/posix/pvfs_acl_nfs4.c *psd = security_descriptor_initialise(mem_ctx); psd 57 source4/ntvfs/posix/pvfs_acl_nfs4.c NT_STATUS_HAVE_NO_MEMORY(*psd); psd 59 source4/ntvfs/posix/pvfs_acl_nfs4.c sd = *psd;