pp_new 75 libcli/security/secace.c NTSTATUS sec_ace_add_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, unsigned *num, struct dom_sid *sid, uint32_t mask) pp_new 79 libcli/security/secace.c if (!ctx || !pp_new || !old || !sid || !num) return NT_STATUS_INVALID_PARAMETER; pp_new 83 libcli/security/secace.c if((pp_new[0] = talloc_zero_array(ctx, struct security_ace, *num )) == 0) pp_new 87 libcli/security/secace.c sec_ace_copy(&(*pp_new)[i], &old[i]); pp_new 89 libcli/security/secace.c (*pp_new)[i].type = SEC_ACE_TYPE_ACCESS_ALLOWED; pp_new 90 libcli/security/secace.c (*pp_new)[i].flags = 0; pp_new 91 libcli/security/secace.c (*pp_new)[i].size = SEC_ACE_HEADER_SIZE + ndr_size_dom_sid(sid, NULL, 0); pp_new 92 libcli/security/secace.c (*pp_new)[i].access_mask = mask; pp_new 93 libcli/security/secace.c (*pp_new)[i].trustee = *sid; pp_new 120 libcli/security/secace.c NTSTATUS sec_ace_del_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, uint32_t *num, struct dom_sid *sid) pp_new 125 libcli/security/secace.c if (!ctx || !pp_new || !old || !sid || !num) return NT_STATUS_INVALID_PARAMETER; pp_new 128 libcli/security/secace.c if((pp_new[0] = talloc_zero_array(ctx, struct security_ace, *num )) == 0) pp_new 131 libcli/security/secace.c pp_new[0] = NULL; pp_new 136 libcli/security/secace.c sec_ace_copy(&(*pp_new)[i], &old[i]); pp_new 30 libcli/security/secace.h NTSTATUS sec_ace_add_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, unsigned *num, struct dom_sid *sid, uint32_t mask); pp_new 32 libcli/security/secace.h NTSTATUS sec_ace_del_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, uint32_t *num, struct dom_sid *sid);