token 476 lib/replace/replace.c char *token; token 486 lib/replace/replace.c token = s; token 487 lib/replace/replace.c s = strpbrk(token, delim); token 489 lib/replace/replace.c *save_ptr = token + strlen(token); token 495 lib/replace/replace.c return token; token 1578 nsswitch/pam_winbind.c char *token = NULL; token 1629 nsswitch/pam_winbind.c while ((token = strtok_r(p, "/", &safe_ptr)) != NULL) { token 1635 nsswitch/pam_winbind.c _pam_log_debug(ctx, LOG_DEBUG, "token is %s", token); token 1637 nsswitch/pam_winbind.c create_dir = talloc_asprintf_append(create_dir, "%s/", token); token 1643 nsswitch/pam_winbind.c if (strcmp(token, user_dir) == 0) { token 1644 nsswitch/pam_winbind.c _pam_log_debug(ctx, LOG_DEBUG, "assuming last directory: %s", token); token 2105 nsswitch/pam_winbind.c char *token; token 2113 nsswitch/pam_winbind.c *pass = token = NULL; token 2199 nsswitch/pam_winbind.c token = x_strdup(resp[i - replies].resp); token 2200 nsswitch/pam_winbind.c if (!token) { token 2211 nsswitch/pam_winbind.c strcmp(token, resp[i - 1].resp)) { token 2212 nsswitch/pam_winbind.c _pam_delete(token); /* mistyped */ token 2236 nsswitch/pam_winbind.c retval = pam_set_item(ctx->pamh, authtok_flag, token); token 2237 nsswitch/pam_winbind.c _pam_delete(token); /* clean it up */ token 743 nsswitch/winbind_nss_aix.c static void wb_aix_close(void *token) token 655 source3/auth/auth_util.c static NTSTATUS log_nt_token(NT_USER_TOKEN *token) token 669 source3/auth/auth_util.c for (i=1; i<token->num_sids; i++) { token 672 source3/auth/auth_util.c sid_string_talloc(frame, &token->user_sids[i])); token 677 source3/auth/auth_util.c "%s", sid_string_talloc(frame, &token->user_sids[0])); token 824 source3/auth/auth_util.c struct nt_user_token **token) token 1056 source3/auth/auth_util.c *token = create_local_nt_token(mem_ctx, &user_sid, token 1059 source3/auth/auth_util.c if ((*token == NULL) || (*found_username == NULL)) { token 1083 source3/auth/auth_util.c struct nt_user_token *token; token 1096 source3/auth/auth_util.c &token); token 1103 source3/auth/auth_util.c result = nt_token_check_sid(group_sid, token); token 33 source3/auth/token_util.c bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token ) token 37 source3/auth/token_util.c if ( !sid || !token ) token 40 source3/auth/token_util.c for ( i=0; i<token->num_sids; i++ ) { token 41 source3/auth/token_util.c if ( sid_equal( sid, &token->user_sids[i] ) ) token 48 source3/auth/token_util.c bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid ) token 68 source3/auth/token_util.c return nt_token_check_sid( &domain_sid, token );\ token 80 source3/auth/token_util.c struct nt_user_token *token, *for_cache; token 105 source3/auth/token_util.c token = create_local_nt_token(talloc_autofree_context(), &u_sid, False, token 108 source3/auth/token_util.c token->privileges = se_disk_operators; token 110 source3/auth/token_util.c for_cache = token; token 116 source3/auth/token_util.c return token; token 125 source3/auth/token_util.c struct nt_user_token *token) token 140 source3/auth/token_util.c token->user_sids, token 141 source3/auth/token_util.c token->num_sids, token 153 source3/auth/token_util.c status = add_sid_to_array_unique(token, &alias_sid, token 154 source3/auth/token_util.c &token->user_sids, token 155 source3/auth/token_util.c &token->num_sids); token 170 source3/auth/token_util.c static NTSTATUS add_builtin_administrators(struct nt_user_token *token, token 193 source3/auth/token_util.c if ( nt_token_check_sid( &domadm, token ) ) { token 194 source3/auth/token_util.c status = add_sid_to_array(token, token 196 source3/auth/token_util.c &token->user_sids, &token->num_sids); token 517 source3/auth/token_util.c void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token) token 521 source3/auth/token_util.c if (!token) { token 528 source3/auth/token_util.c sid_string_dbg(&token->user_sids[0]) )); token 530 source3/auth/token_util.c ("contains %lu SIDs\n", (unsigned long)token->num_sids)); token 531 source3/auth/token_util.c for (i = 0; i < token->num_sids; i++) token 534 source3/auth/token_util.c sid_string_dbg(&token->user_sids[i]))); token 536 source3/auth/token_util.c dump_se_priv( dbg_class, dbg_lev, &token->privileges ); token 149 source3/include/gpo.h const struct nt_user_token *token; token 268 source3/include/nameserv.h int token; /* Used when communicating with backup browsers. */ token 115 source3/include/proto.h struct nt_user_token **token); token 176 source3/include/proto.h bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token ); token 177 source3/include/proto.h bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid ); token 180 source3/include/proto.h struct nt_user_token *token); token 188 source3/include/proto.h void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token); token 628 source3/include/proto.h bool user_has_privileges(const NT_USER_TOKEN *token, const SE_PRIV *privilege); token 629 source3/include/proto.h bool user_has_any_privilege(NT_USER_TOKEN *token, const SE_PRIV *privilege); token 719 source3/include/proto.h bool share_access_check(const NT_USER_TOKEN *token, const char *sharename, token 1242 source3/include/proto.h bool token_sid_in_ace(const NT_USER_TOKEN *token, const SEC_ACE *ace); token 1272 source3/include/proto.h NTSTATUS se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token, token 1329 source3/include/proto.h bool is_sid_in_token(const NT_USER_TOKEN *token, const DOM_SID *sid); token 2011 source3/include/proto.h const struct nt_user_token *token, token 2018 source3/include/proto.h const struct nt_user_token *token, token 2085 source3/include/proto.h struct nt_user_token **token); token 2090 source3/include/proto.h const struct nt_user_token *token, token 2099 source3/include/proto.h const struct nt_user_token *token, token 2121 source3/include/proto.h const struct nt_user_token *token, token 2149 source3/include/proto.h const struct nt_user_token *token, token 2155 source3/include/proto.h const struct nt_user_token *token); token 2174 source3/include/proto.h const struct nt_user_token *token, token 2181 source3/include/proto.h const struct nt_user_token *token, token 2206 source3/include/proto.h struct nt_user_token **token); token 3296 source3/include/proto.h ssize_t read_spnego_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, SPNEGO_DATA *token); token 4951 source3/include/proto.h const struct nt_user_token *token, token 4984 source3/include/proto.h uint32 desired_access, const struct nt_user_token *token, token 4994 source3/include/proto.h const struct nt_user_token *token, token 4997 source3/include/proto.h WERROR reg_delete_path(const struct nt_user_token *token, token 5061 source3/include/proto.h const struct nt_user_token *token ); token 5157 source3/include/proto.h const struct nt_user_token *token, token 5963 source3/include/proto.h WERROR delete_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *sharename ); token 6052 source3/include/proto.h WERROR add_port_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *portname, const char *uri ); token 6053 source3/include/proto.h bool add_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, NT_PRINTER_INFO_LEVEL *printer); token 6106 source3/include/proto.h SEC_DESC *svcctl_get_secdesc( TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token ); token 6107 source3/include/proto.h bool svcctl_set_secdesc( TALLOC_CTX *ctx, const char *name, SEC_DESC *sec_desc, NT_USER_TOKEN *token ); token 6108 source3/include/proto.h const char *svcctl_lookup_dispname(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token ); token 6109 source3/include/proto.h const char *svcctl_lookup_description(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token ); token 6110 source3/include/proto.h REGVAL_CTR *svcctl_fetch_regvalues( const char *name, NT_USER_TOKEN *token ); token 6599 source3/include/proto.h const NT_USER_TOKEN *token, token 6965 source3/include/proto.h void set_sec_ctx(uid_t uid, gid_t gid, int ngroups, gid_t *groups, NT_USER_TOKEN *token); token 7014 source3/include/proto.h const struct nt_user_token *token, token 7017 source3/include/proto.h const struct nt_user_token *token, int snum); token 7020 source3/include/proto.h const struct nt_user_token *token, token 7282 source3/include/proto.h NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token, token 7286 source3/include/proto.h void map_max_allowed_access(const NT_USER_TOKEN *token, token 139 source3/include/reg_objects.h const NT_USER_TOKEN *token ); token 167 source3/include/reg_objects.h struct nt_user_token *token; token 361 source3/lib/interface.c static void interpret_interface(char *token) token 375 source3/lib/interface.c if (gen_fnmatch(token, probed_ifaces[i].name) == 0) { token 385 source3/lib/interface.c p = strchr_m(token,'/'); token 387 source3/lib/interface.c if (!interpret_string_addr(&ss, token, 0)) { token 389 source3/lib/interface.c "for %s\n", token)); token 401 source3/lib/interface.c token)); token 407 source3/lib/interface.c goodaddr = interpret_string_addr(&ss, token, 0); token 413 source3/lib/interface.c token)); token 471 source3/lib/interface.c token)); token 478 source3/lib/interface.c token)); token 481 source3/lib/interface.c (void)strlcpy(ifs.name, token, sizeof(ifs.name)); token 141 source3/lib/ldb/tools/oLschema2ldif.c struct schema_token *token; token 144 source3/lib/ldb/tools/oLschema2ldif.c token = talloc(ctx, struct schema_token); token 147 source3/lib/ldb/tools/oLschema2ldif.c type = talloc_strndup(token, c, n); token 153 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_NAME; token 165 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 171 source3/lib/ldb/tools/oLschema2ldif.c return token; token 175 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_SUP; token 180 source3/lib/ldb/tools/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n); token 184 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 189 source3/lib/ldb/tools/oLschema2ldif.c return token; token 194 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_STRUCTURAL; token 196 source3/lib/ldb/tools/oLschema2ldif.c return token; token 201 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_ABSTRACT; token 203 source3/lib/ldb/tools/oLschema2ldif.c return token; token 208 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_AUXILIARY; token 210 source3/lib/ldb/tools/oLschema2ldif.c return token; token 215 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_MUST; token 220 source3/lib/ldb/tools/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n); token 224 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 229 source3/lib/ldb/tools/oLschema2ldif.c return token; token 234 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_MAY; token 239 source3/lib/ldb/tools/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n); token 243 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 248 source3/lib/ldb/tools/oLschema2ldif.c return token; token 253 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_SINGLE_VALUE; token 255 source3/lib/ldb/tools/oLschema2ldif.c return token; token 260 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_EQUALITY; token 262 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 266 source3/lib/ldb/tools/oLschema2ldif.c return token; token 271 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_ORDERING; token 273 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 277 source3/lib/ldb/tools/oLschema2ldif.c return token; token 282 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_SUBSTR; token 284 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 288 source3/lib/ldb/tools/oLschema2ldif.c return token; token 293 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_SYNTAX; token 295 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 299 source3/lib/ldb/tools/oLschema2ldif.c return token; token 304 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_DESC; token 306 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 310 source3/lib/ldb/tools/oLschema2ldif.c return token; token 313 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_UNKNOWN; token 314 source3/lib/ldb/tools/oLschema2ldif.c token->value = type; token 317 source3/lib/ldb/tools/oLschema2ldif.c return token; token 328 source3/lib/ldb/tools/oLschema2ldif.c return token; token 335 source3/lib/ldb/tools/oLschema2ldif.c struct schema_token *token; token 382 source3/lib/ldb/tools/oLschema2ldif.c token = get_next_schema_token(msg, &c); token 383 source3/lib/ldb/tools/oLschema2ldif.c if (!token) goto failed; token 385 source3/lib/ldb/tools/oLschema2ldif.c switch (token->type) { token 387 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_STRING("cn", token->value); token 388 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_STRING("name", token->value); token 389 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_STRING("lDAPDisplayName", token->value); token 392 source3/lib/ldb/tools/oLschema2ldif.c token->value); token 396 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_M_STRING("subClassOf", token->value); token 412 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_M_STRING("mustContain", token->value); token 416 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_M_STRING("mayContain", token->value); token 438 source3/lib/ldb/tools/oLschema2ldif.c find_syntax_map_by_standard_oid(token->value); token 446 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_STRING("description", token->value); token 450 source3/lib/ldb/tools/oLschema2ldif.c fprintf(stderr, "Unknown Definition: %s\n", token->value); token 343 source3/lib/privileges_basic.c bool user_has_privileges(const NT_USER_TOKEN *token, const SE_PRIV *privilege) token 345 source3/lib/privileges_basic.c if ( !token ) token 348 source3/lib/privileges_basic.c return is_privilege_assigned( &token->privileges, privilege ); token 356 source3/lib/privileges_basic.c bool user_has_any_privilege(NT_USER_TOKEN *token, const SE_PRIV *privilege) token 358 source3/lib/privileges_basic.c if ( !token ) token 361 source3/lib/privileges_basic.c return is_any_privilege_assigned( &token->privileges, privilege ); token 279 source3/lib/sharesec.c bool share_access_check(const NT_USER_TOKEN *token, const char *sharename, token 293 source3/lib/sharesec.c status = se_access_check(psd, token, desired_access, &granted); token 538 source3/lib/smbconf/smbconf_reg.c struct nt_user_token *token; token 551 source3/lib/smbconf/smbconf_reg.c werr = ntstatus_to_werror(registry_create_admin_token(ctx, &token)); token 571 source3/lib/smbconf/smbconf_reg.c token, &rpd(ctx)->base_key); token 666 source3/lib/smbconf/smbconf_reg.c struct nt_user_token *token; token 668 source3/lib/smbconf/smbconf_reg.c werr = ntstatus_to_werror(registry_create_admin_token(ctx, &token)); token 681 source3/lib/smbconf/smbconf_reg.c werr = reg_open_path(mem_ctx, path, REG_KEY_WRITE, token, token 36 source3/lib/util_nttoken.c NT_USER_TOKEN *token; token 41 source3/lib/util_nttoken.c token = TALLOC_ZERO_P(mem_ctx, NT_USER_TOKEN); token 42 source3/lib/util_nttoken.c if (token == NULL) { token 48 source3/lib/util_nttoken.c token->user_sids = (DOM_SID *)talloc_memdup( token 49 source3/lib/util_nttoken.c token, ptoken->user_sids, sizeof(DOM_SID) * ptoken->num_sids ); token 51 source3/lib/util_nttoken.c if (token->user_sids == NULL) { token 53 source3/lib/util_nttoken.c TALLOC_FREE(token); token 56 source3/lib/util_nttoken.c token->num_sids = ptoken->num_sids; token 61 source3/lib/util_nttoken.c if ( !se_priv_copy( &token->privileges, &ptoken->privileges ) ) { token 66 source3/lib/util_nttoken.c return token; token 78 source3/lib/util_nttoken.c struct nt_user_token *token = NULL; token 86 source3/lib/util_nttoken.c token = TALLOC_ZERO_P(mem_ctx, struct nt_user_token); token 87 source3/lib/util_nttoken.c NT_STATUS_HAVE_NO_MEMORY(token); token 92 source3/lib/util_nttoken.c &token->user_sids, token 93 source3/lib/util_nttoken.c &token->num_sids); token 95 source3/lib/util_nttoken.c TALLOC_FREE(token); token 103 source3/lib/util_nttoken.c &token->user_sids, token 104 source3/lib/util_nttoken.c &token->num_sids); token 106 source3/lib/util_nttoken.c TALLOC_FREE(token); token 111 source3/lib/util_nttoken.c se_priv_add(&token->privileges, &token_1->privileges); token 112 source3/lib/util_nttoken.c se_priv_add(&token->privileges, &token_2->privileges); token 114 source3/lib/util_nttoken.c *token_out = token; token 123 source3/lib/util_nttoken.c bool token_sid_in_ace(const NT_USER_TOKEN *token, const struct security_ace *ace) token 127 source3/lib/util_nttoken.c for (i = 0; i < token->num_sids; i++) { token 128 source3/lib/util_nttoken.c if (sid_equal(&ace->trustee, &token->user_sids[i])) token 109 source3/lib/util_seaccess.c const NT_USER_TOKEN *token) token 114 source3/lib/util_seaccess.c if (is_sid_in_token(token, sd->owner_sid)) { token 116 source3/lib/util_seaccess.c } else if (user_has_privileges(token, &se_restore)) { token 131 source3/lib/util_seaccess.c if (!is_sid_in_token(token, &ace->trustee)) { token 157 source3/lib/util_seaccess.c const NT_USER_TOKEN *token, token 171 source3/lib/util_seaccess.c access_desired |= access_check_max_allowed(sd, token); token 186 source3/lib/util_seaccess.c if (user_has_privileges(token, &sec_security)) { token 202 source3/lib/util_seaccess.c is_sid_in_token(token, sd->owner_sid)) { token 206 source3/lib/util_seaccess.c user_has_privileges(token, &se_restore)) { token 222 source3/lib/util_seaccess.c if (!is_sid_in_token(token, &ace->trustee)) { token 667 source3/lib/util_sid.c bool is_sid_in_token(const NT_USER_TOKEN *token, const DOM_SID *sid) token 671 source3/lib/util_sid.c for (i=0; i<token->num_sids; i++) { token 672 source3/lib/util_sid.c if (sid_compare(sid, &token->user_sids[i]) == 0) token 586 source3/libgpo/gpext/gpext.c struct nt_user_token *token; token 588 source3/libgpo/gpext/gpext.c token = registry_create_system_token(mem_ctx); token 589 source3/libgpo/gpext/gpext.c NT_STATUS_HAVE_NO_MEMORY(token); token 594 source3/libgpo/gpext/gpext.c token, token 670 source3/libgpo/gpext/gpext.c const struct nt_user_token *token, token 684 source3/libgpo/gpext/gpext.c const struct nt_user_token *token, token 726 source3/libgpo/gpext/gpext.c token, token 63 source3/libgpo/gpext/gpext.h const struct nt_user_token *token, token 71 source3/libgpo/gpext/gpext.h const struct nt_user_token *token, token 468 source3/libgpo/gpext/registry.c const struct nt_user_token *token, token 489 source3/libgpo/gpext/registry.c token, token 502 source3/libgpo/gpext/registry.c token, flags); token 523 source3/libgpo/gpext/registry.c const struct nt_user_token *token, token 553 source3/libgpo/gpext/registry.c werr = reg_apply_registry(mem_ctx, token, root_key, flags, token 254 source3/libgpo/gpext/scripts.c const struct nt_user_token *token, token 284 source3/libgpo/gpext/scripts.c token, token 311 source3/libgpo/gpext/scripts.c token, flags); token 331 source3/libgpo/gpext/scripts.c const struct nt_user_token *token, token 377 source3/libgpo/gpext/scripts.c werr = scripts_apply(ini_ctx->mem_ctx, token, root_key, token 142 source3/libgpo/gpext/security.c const struct nt_user_token *token, token 550 source3/libgpo/gpo_ldap.c const struct nt_user_token *token) token 590 source3/libgpo/gpo_ldap.c token)); token 617 source3/libgpo/gpo_ldap.c struct nt_user_token **token) token 666 source3/libgpo/gpo_ldap.c *token = new_token; token 668 source3/libgpo/gpo_ldap.c debug_nt_user_token(DBGC_CLASS, 5, *token); token 708 source3/libgpo/gpo_ldap.c const struct nt_user_token *token, token 759 source3/libgpo/gpo_ldap.c token); token 806 source3/libgpo/gpo_ldap.c token); token 852 source3/libgpo/gpo_ldap.c token); token 28 source3/libgpo/gpo_reg.c struct nt_user_token *token = NULL; token 30 source3/libgpo/gpo_reg.c token = TALLOC_ZERO_P(mem_ctx, struct nt_user_token); token 31 source3/libgpo/gpo_reg.c if (!token) { token 36 source3/libgpo/gpo_reg.c token->privileges = se_priv_all; token 38 source3/libgpo/gpo_reg.c if (!NT_STATUS_IS_OK(add_sid_to_array(token, &global_sid_System, token 39 source3/libgpo/gpo_reg.c &token->user_sids, &token->num_sids))) { token 44 source3/libgpo/gpo_reg.c return token; token 53 source3/libgpo/gpo_reg.c const struct nt_user_token *token, token 71 source3/libgpo/gpo_reg.c if (token) { token 72 source3/libgpo/gpo_reg.c tmp_ctx->token = token; token 74 source3/libgpo/gpo_reg.c tmp_ctx->token = registry_create_system_token(mem_ctx); token 76 source3/libgpo/gpo_reg.c if (!tmp_ctx->token) { token 94 source3/libgpo/gpo_reg.c tmp_ctx->token, &tmp_ctx->curr_key); token 152 source3/libgpo/gpo_reg.c reg_ctx->token, key); token 313 source3/libgpo/gpo_reg.c const struct nt_user_token *token, token 318 source3/libgpo/gpo_reg.c path = gp_reg_groupmembership_path(mem_ctx, &token->user_sids[0], token 331 source3/libgpo/gpo_reg.c const struct nt_user_token *token, token 342 source3/libgpo/gpo_reg.c path = gp_reg_groupmembership_path(mem_ctx, &token->user_sids[0], token 346 source3/libgpo/gpo_reg.c gp_reg_del_groupmembership(mem_ctx, reg_ctx->curr_key, token, flags); token 352 source3/libgpo/gpo_reg.c for (i=0; i<token->num_sids; i++) { token 357 source3/libgpo/gpo_reg.c val = sid_string_talloc(mem_ctx, &token->user_sids[i]); token 376 source3/libgpo/gpo_reg.c struct nt_user_token **token, token 417 source3/libgpo/gpo_reg.c *token = tmp_token; token 452 source3/libgpo/gpo_reg.c const struct nt_user_token *token, token 463 source3/libgpo/gpo_reg.c token, ®_ctx); token 467 source3/libgpo/gpo_reg.c &token->user_sids[0]); token 473 source3/libgpo/gpo_reg.c werr = gp_reg_store_groupmembership(mem_ctx, reg_ctx, token, flags); token 479 source3/libgpo/gpo_reg.c subkeyname = gp_req_state_path(mem_ctx, &token->user_sids[0], flags); token 927 source3/libgpo/gpo_reg.c const struct nt_user_token *token, token 956 source3/libgpo/gpo_reg.c &token->user_sids[0]); token 96 source3/libgpo/gpo_sec.c const struct nt_user_token *token) token 100 source3/libgpo/gpo_sec.c nt_token_check_sid(&ace->trustee, token)) { token 114 source3/libgpo/gpo_sec.c const struct nt_user_token *token) token 118 source3/libgpo/gpo_sec.c nt_token_check_sid(&ace->trustee, token)) { token 132 source3/libgpo/gpo_sec.c const struct nt_user_token *token) token 136 source3/libgpo/gpo_sec.c return gpo_sd_check_ace_denied_object(ace, token); token 138 source3/libgpo/gpo_sec.c return gpo_sd_check_ace_allowed_object(ace, token); token 148 source3/libgpo/gpo_sec.c const struct nt_user_token *token) token 155 source3/libgpo/gpo_sec.c if (!token) { token 174 source3/libgpo/gpo_sec.c status = gpo_sd_check_ace(&dacl->aces[i], token); token 438 source3/libgpo/gpo_util.c const struct nt_user_token *token, token 479 source3/libgpo/gpo_util.c flags, token, root_key, gpo, token 495 source3/libgpo/gpo_util.c const struct nt_user_token *token, token 515 source3/libgpo/gpo_util.c status = gpo_process_a_gpo(ads, mem_ctx, token, root_key, token 533 source3/libgpo/gpo_util.c const struct nt_user_token *token, token 562 source3/libgpo/gpo_util.c token, token 592 source3/libgpo/gpo_util.c status = gpo_process_gpo_list_by_ext(ads, mem_ctx, token, token 849 source3/libgpo/gpo_util.c struct nt_user_token **token) token 864 source3/libgpo/gpo_util.c token); token 497 source3/libsmb/clispnego.c SPNEGO_DATA token; token 500 source3/libsmb/clispnego.c len = read_spnego_data(talloc_tos(), blob, &token); token 506 source3/libsmb/clispnego.c if (token.type != SPNEGO_NEG_TOKEN_TARG) { token 508 source3/libsmb/clispnego.c token.type)); token 509 source3/libsmb/clispnego.c free_spnego_data(&token); token 514 source3/libsmb/clispnego.c token.negTokenTarg.responseToken.data, token 515 source3/libsmb/clispnego.c token.negTokenTarg.responseToken.length); token 516 source3/libsmb/clispnego.c free_spnego_data(&token); token 28 source3/libsmb/spnego.c static bool read_negTokenInit(TALLOC_CTX *mem_ctx, ASN1_DATA *asn1, negTokenInit_t *token) token 30 source3/libsmb/spnego.c ZERO_STRUCTP(token); token 44 source3/libsmb/spnego.c token->mechTypes = TALLOC_P(mem_ctx, const char *); token 48 source3/libsmb/spnego.c token->mechTypes = token 49 source3/libsmb/spnego.c TALLOC_REALLOC_ARRAY(mem_ctx, token->mechTypes, const char *, i + 2); token 50 source3/libsmb/spnego.c if (!token->mechTypes) { token 55 source3/libsmb/spnego.c token->mechTypes[i] = p_oid; token 57 source3/libsmb/spnego.c token->mechTypes[i] = NULL; token 65 source3/libsmb/spnego.c asn1_read_Integer(asn1, &token->reqFlags); token 66 source3/libsmb/spnego.c token->reqFlags |= SPNEGO_REQ_FLAG; token 72 source3/libsmb/spnego.c asn1_read_OctetString(asn1, mem_ctx, &token->mechToken); token 80 source3/libsmb/spnego.c &token->mechListMIC); token 91 source3/libsmb/spnego.c token->mechListMIC = token 109 source3/libsmb/spnego.c static bool write_negTokenInit(ASN1_DATA *asn1, negTokenInit_t *token) token 115 source3/libsmb/spnego.c if (token->mechTypes && *token->mechTypes) { token 120 source3/libsmb/spnego.c for (i = 0; token->mechTypes[i]; i++) { token 121 source3/libsmb/spnego.c asn1_write_OID(asn1, token->mechTypes[i]); token 128 source3/libsmb/spnego.c if (token->reqFlags & SPNEGO_REQ_FLAG) { token 129 source3/libsmb/spnego.c int flags = token->reqFlags & ~SPNEGO_REQ_FLAG; token 137 source3/libsmb/spnego.c if (token->mechToken.data) { token 139 source3/libsmb/spnego.c asn1_write_OctetString(asn1, token->mechToken.data, token 140 source3/libsmb/spnego.c token->mechToken.length); token 145 source3/libsmb/spnego.c if (token->mechListMIC.data) { token 149 source3/libsmb/spnego.c asn1_write_OctetString(asn1, token->mechListMIC.data, token 150 source3/libsmb/spnego.c token->mechListMIC.length); token 157 source3/libsmb/spnego.c asn1_write(asn1, token->mechListMIC.data, token 158 source3/libsmb/spnego.c token->mechListMIC.length); token 172 source3/libsmb/spnego.c static bool read_negTokenTarg(TALLOC_CTX *mem_ctx, ASN1_DATA *asn1, negTokenTarg_t *token) token 174 source3/libsmb/spnego.c ZERO_STRUCTP(token); token 184 source3/libsmb/spnego.c asn1_read_uint8(asn1, &token->negResult); token 193 source3/libsmb/spnego.c token->supportedMech = CONST_DISCARD(char *, mech); token 198 source3/libsmb/spnego.c asn1_read_OctetString(asn1, mem_ctx, &token->responseToken); token 203 source3/libsmb/spnego.c asn1_read_OctetString(asn1, mem_ctx, &token->mechListMIC); token 218 source3/libsmb/spnego.c static bool write_negTokenTarg(ASN1_DATA *asn1, negTokenTarg_t *token) token 224 source3/libsmb/spnego.c asn1_write_enumerated(asn1, token->negResult); token 227 source3/libsmb/spnego.c if (token->supportedMech) { token 229 source3/libsmb/spnego.c asn1_write_OID(asn1, token->supportedMech); token 233 source3/libsmb/spnego.c if (token->responseToken.data) { token 235 source3/libsmb/spnego.c asn1_write_OctetString(asn1, token->responseToken.data, token 236 source3/libsmb/spnego.c token->responseToken.length); token 240 source3/libsmb/spnego.c if (token->mechListMIC.data) { token 242 source3/libsmb/spnego.c asn1_write_OctetString(asn1, token->mechListMIC.data, token 243 source3/libsmb/spnego.c token->mechListMIC.length); token 253 source3/libsmb/spnego.c ssize_t read_spnego_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, SPNEGO_DATA *token) token 258 source3/libsmb/spnego.c ZERO_STRUCTP(token); token 271 source3/libsmb/spnego.c if (read_negTokenInit(mem_ctx, asn1, &token->negTokenInit)) { token 272 source3/libsmb/spnego.c token->type = SPNEGO_NEG_TOKEN_INIT; token 277 source3/libsmb/spnego.c if (read_negTokenTarg(mem_ctx, asn1, &token->negTokenTarg)) { token 278 source3/libsmb/spnego.c token->type = SPNEGO_NEG_TOKEN_TARG; token 269 source3/modules/vfs_recycle.c char *token; token 290 source3/modules/vfs_recycle.c for(token = strtok_r(tok_str, "/", &saveptr); token; token 291 source3/modules/vfs_recycle.c token = strtok_r(NULL, "/", &saveptr)) { token 292 source3/modules/vfs_recycle.c safe_strcat(new_dir, token, len); token 541 source3/nmbd/nmbd_incomingdgrams.c uint32 token, struct in_addr sendto_ip, token 566 source3/nmbd/nmbd_incomingdgrams.c SIVAL(p,0,token); /* The sender's unique info. */ token 646 source3/nmbd/nmbd_incomingdgrams.c uint32 token = IVAL(buf,1); /* Sender's key index for the workgroup. */ token 706 source3/nmbd/nmbd_incomingdgrams.c max_number_requested, token, p->ip, p->port); token 80 source3/nmbd/nmbd_processlogon.c uint16 token = 0; token 142 source3/nmbd/nmbd_processlogon.c token = SVAL(q,3); token 151 source3/nmbd/nmbd_processlogon.c mach_str,inet_ntoa(p->ip),user_str,token)); token 167 source3/nmbd/nmbd_processlogon.c SSVAL(q, 0, token); token 75 source3/nmbd/nmbd_sendannounce.c SCVAL(p,0,work->token); /* (local) Unique workgroup token id. */ token 99 source3/nmbd/nmbd_workgroupdb.c t = w->token; token 104 source3/nmbd/nmbd_workgroupdb.c work->token = ++workgroup_count; token 106 source3/nmbd/nmbd_workgroupdb.c work->token = t; token 289 source3/nmbd/nmbd_workgroupdb.c work->token, *work->local_master_browser_name ? work->local_master_browser_name : "UNKNOWN" ) ); token 38 source3/pam_smbpass/general.h const char *token; token 191 source3/pam_smbpass/support.c if (smb_args[j].token token 192 source3/pam_smbpass/support.c && !strncmp(argv[i], smb_args[j].token, strlen(smb_args[j].token))) token 222 source3/pam_smbpass/support.c if (smb_args[j].token token 223 source3/pam_smbpass/support.c && !strncmp(*argv, smb_args[j].token, strlen(smb_args[j].token))) token 510 source3/pam_smbpass/support.c char *token; token 519 source3/pam_smbpass/support.c *pass = token = NULL; token 584 source3/pam_smbpass/support.c token = smbpXstrDup(pamh, resp[j++].resp); token 585 source3/pam_smbpass/support.c if (token != NULL) { token 588 source3/pam_smbpass/support.c if (!resp[j].resp || strcmp( token, resp[j].resp )) { token 589 source3/pam_smbpass/support.c _pam_delete( token ); token 619 source3/pam_smbpass/support.c retval = pam_set_item( pamh, authtok_flag, (const void *)token ); token 620 source3/pam_smbpass/support.c _pam_delete( token ); /* clean it up */ token 634 source3/pam_smbpass/support.c retval = pam_set_data( pamh, data_name, (void *) token, _cleanup ); token 641 source3/pam_smbpass/support.c _pam_delete( token ); token 645 source3/pam_smbpass/support.c token = NULL; /* break link to password */ token 124 source3/registry/reg_api.c const struct nt_user_token *token, token 138 source3/registry/reg_api.c !(regkey->token = dup_nt_token(regkey, token)) || token 210 source3/registry/reg_api.c token ) ) { token 228 source3/registry/reg_api.c const struct nt_user_token *token, token 235 source3/registry/reg_api.c return regkey_open_onelevel(mem_ctx, NULL, hive, token, desired_access, token 274 source3/registry/reg_api.c name_component, parent->token, token 289 source3/registry/reg_api.c err = regkey_open_onelevel(mem_ctx, direct_parent, path, parent->token, token 1010 source3/registry/reg_api.c uint32 desired_access, const struct nt_user_token *token, token 1028 source3/registry/reg_api.c err = reg_openhive(mem_ctx, path, desired_access, token, token 1041 source3/registry/reg_api.c err = reg_openhive(mem_ctx, path, KEY_ENUMERATE_SUB_KEYS, token, token 1177 source3/registry/reg_api.c const struct nt_user_token *token, token 1196 source3/registry/reg_api.c err = reg_openhive(mem_ctx, path, desired_access, token, token 1213 source3/registry/reg_api.c token, &hive); token 1230 source3/registry/reg_api.c WERROR reg_delete_path(const struct nt_user_token *token, token 1253 source3/registry/reg_api.c token, &hive); token 60 source3/registry/reg_backend_smbconf.c const struct nt_user_token *token) token 62 source3/registry/reg_backend_smbconf.c if (!(user_has_privileges(token, &se_disk_operators))) { token 159 source3/registry/reg_dispatcher.c const struct nt_user_token *token ) token 170 source3/registry/reg_dispatcher.c granted, token); token 181 source3/registry/reg_dispatcher.c status =se_access_check(sec_desc, token, requested, granted); token 38 source3/registry/reg_init_smbconf.c NT_USER_TOKEN *token = NULL; token 44 source3/registry/reg_init_smbconf.c token = TALLOC_ZERO_P(mem_ctx, NT_USER_TOKEN); token 45 source3/registry/reg_init_smbconf.c if (token == NULL) { token 50 source3/registry/reg_init_smbconf.c token->privileges = se_disk_operators; token 51 source3/registry/reg_init_smbconf.c status = add_sid_to_array(token, &global_sid_Builtin_Administrators, token 52 source3/registry/reg_init_smbconf.c &token->user_sids, &token->num_sids); token 59 source3/registry/reg_init_smbconf.c *ptoken = token; token 33 source3/registry/reg_util_legacy.c const struct nt_user_token *token, token 39 source3/registry/reg_util_legacy.c err = reg_open_path(NULL, path, access_desired, token, &key); token 69 source3/rpc_server/srv_eventlog_nt.c static bool elog_check_access( EVENTLOG_INFO *info, NT_USER_TOKEN *token ) token 93 source3/rpc_server/srv_eventlog_nt.c token = get_root_nt_token(); token 98 source3/rpc_server/srv_eventlog_nt.c status = se_access_check( sec_desc, token, MAXIMUM_ALLOWED_ACCESS, token 167 source3/rpc_server/srv_samr_nt.c NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token, token 180 source3/rpc_server/srv_samr_nt.c user_has_any_privilege(token, rights)) { token 192 source3/rpc_server/srv_samr_nt.c status = se_access_check(psd, token, des_access, acc_granted); token 259 source3/rpc_server/srv_samr_nt.c void map_max_allowed_access(const NT_USER_TOKEN *token, token 278 source3/rpc_server/srv_samr_nt.c if (is_sid_in_token(token, &global_sid_Builtin_Administrators) || token 279 source3/rpc_server/srv_samr_nt.c is_sid_in_token(token, &global_sid_Builtin_Account_Operators)) { token 289 source3/rpc_server/srv_samr_nt.c if (is_sid_in_token(token, &domadmin_sid)) { token 80 source3/rpc_server/srv_spoolss_nt.c WERROR(*fn) (TALLOC_CTX *mem_ctx, NT_USER_TOKEN *token, DATA_BLOB *in, DATA_BLOB *out, uint32_t *needed); token 264 source3/rpc_server/srv_spoolss_nt.c WERROR delete_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *sharename ) token 283 source3/rpc_server/srv_spoolss_nt.c if ( token ) token 284 source3/rpc_server/srv_spoolss_nt.c is_print_op = user_has_privileges( token, &se_printop ); token 5922 source3/rpc_server/srv_spoolss_nt.c WERROR add_port_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *portname, const char *uri ) token 5940 source3/rpc_server/srv_spoolss_nt.c if ( token ) token 5941 source3/rpc_server/srv_spoolss_nt.c is_print_op = user_has_privileges( token, &se_printop ); token 5971 source3/rpc_server/srv_spoolss_nt.c bool add_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, NT_PRINTER_INFO_LEVEL *printer) token 6003 source3/rpc_server/srv_spoolss_nt.c if ( token ) token 6004 source3/rpc_server/srv_spoolss_nt.c is_print_op = user_has_privileges( token, &se_printop ); token 9645 source3/rpc_server/srv_spoolss_nt.c NT_USER_TOKEN *token, DATA_BLOB *in, token 9700 source3/rpc_server/srv_spoolss_nt.c NT_USER_TOKEN *token, DATA_BLOB *in, token 9779 source3/rpc_server/srv_spoolss_nt.c return add_port_hook(mem_ctx, token, portname, device_uri); token 9792 source3/rpc_server/srv_spoolss_nt.c NT_USER_TOKEN *token, const char *command, token 9803 source3/rpc_server/srv_spoolss_nt.c return xcvtcp_cmds[i].fn(mem_ctx, token, inbuf, outbuf, needed); token 9814 source3/rpc_server/srv_spoolss_nt.c NT_USER_TOKEN *token, DATA_BLOB *in, token 9851 source3/rpc_server/srv_spoolss_nt.c NT_USER_TOKEN *token, const char *command, token 9861 source3/rpc_server/srv_spoolss_nt.c return xcvlocal_cmds[i].fn(mem_ctx, token, inbuf, outbuf, needed); token 121 source3/rpc_server/srv_svcctl_nt.c static NTSTATUS svcctl_access_check( SEC_DESC *sec_desc, NT_USER_TOKEN *token, token 126 source3/rpc_server/srv_svcctl_nt.c token = get_root_nt_token(); token 129 source3/rpc_server/srv_svcctl_nt.c return se_access_check( sec_desc, token, access_desired, access_granted); token 381 source3/rpc_server/srv_svcctl_nt.c static int enumerate_status( TALLOC_CTX *ctx, struct ENUM_SERVICE_STATUSW **status, NT_USER_TOKEN *token ) token 400 source3/rpc_server/srv_svcctl_nt.c display_name = svcctl_lookup_dispname(ctx, svcctl_ops[i].name, token ); token 424 source3/rpc_server/srv_svcctl_nt.c NT_USER_TOKEN *token = p->server_info->ptok; token 436 source3/rpc_server/srv_svcctl_nt.c num_services = enumerate_status( p->mem_ctx, &services, token ); token 637 source3/rpc_server/srv_svcctl_nt.c NT_USER_TOKEN *token ) token 644 source3/rpc_server/srv_svcctl_nt.c if ( !(values = svcctl_fetch_regvalues( name, token )) ) token 296 source3/rpc_server/srv_wkssvc_nt.c struct nt_user_token *token = p->server_info->ptok; token 306 source3/rpc_server/srv_wkssvc_nt.c if (!user_has_privileges(token, &se_machine_account) && token 307 source3/rpc_server/srv_wkssvc_nt.c !nt_token_check_domain_rid(token, DOMAIN_GROUP_RID_ADMINS) && token 308 source3/rpc_server/srv_wkssvc_nt.c !nt_token_check_domain_rid(token, BUILTIN_ALIAS_RID_ADMINS)) { token 371 source3/rpc_server/srv_wkssvc_nt.c struct nt_user_token *token = p->server_info->ptok; token 377 source3/rpc_server/srv_wkssvc_nt.c if (!user_has_privileges(token, &se_machine_account) && token 378 source3/rpc_server/srv_wkssvc_nt.c !nt_token_check_domain_rid(token, DOMAIN_GROUP_RID_ADMINS) && token 379 source3/rpc_server/srv_wkssvc_nt.c !nt_token_check_domain_rid(token, BUILTIN_ALIAS_RID_ADMINS)) { token 505 source3/services/services_db.c SEC_DESC *svcctl_get_secdesc( TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token ) token 520 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token, token 566 source3/services/services_db.c bool svcctl_set_secdesc( TALLOC_CTX *ctx, const char *name, SEC_DESC *sec_desc, NT_USER_TOKEN *token ) token 581 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token, token 619 source3/services/services_db.c const char *svcctl_lookup_dispname(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token ) token 633 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token, token 669 source3/services/services_db.c const char *svcctl_lookup_description(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token ) token 683 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token, token 715 source3/services/services_db.c REGVAL_CTR *svcctl_fetch_regvalues( const char *name, NT_USER_TOKEN *token ) token 727 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token, token 147 source3/smbd/globals.h NT_USER_TOKEN *token; token 54 source3/smbd/open.c const NT_USER_TOKEN *token, token 59 source3/smbd/open.c token, token 212 source3/smbd/sec_ctx.c ctx_p->token = dup_nt_token(NULL, token 213 source3/smbd/sec_ctx.c sec_ctx_stack[sec_ctx_stack_ndx-1].token); token 220 source3/smbd/sec_ctx.c TALLOC_FREE(ctx_p->token); token 303 source3/smbd/sec_ctx.c void set_sec_ctx(uid_t uid, gid_t gid, int ngroups, gid_t *groups, NT_USER_TOKEN *token) token 312 source3/smbd/sec_ctx.c debug_nt_user_token(DBGC_CLASS, 5, token); token 321 source3/smbd/sec_ctx.c if (token && (token == ctx_p->token)) { token 325 source3/smbd/sec_ctx.c TALLOC_FREE(ctx_p->token); token 337 source3/smbd/sec_ctx.c if (token) { token 338 source3/smbd/sec_ctx.c ctx_p->token = dup_nt_token(NULL, token); token 339 source3/smbd/sec_ctx.c if (!ctx_p->token) { token 343 source3/smbd/sec_ctx.c ctx_p->token = NULL; token 355 source3/smbd/sec_ctx.c current_user.nt_user_token = ctx_p->token; token 395 source3/smbd/sec_ctx.c TALLOC_FREE(ctx_p->token); token 415 source3/smbd/sec_ctx.c current_user.nt_user_token = prev_ctx_p->token; token 447 source3/smbd/sec_ctx.c ctx_p->token = NULL; /* Maps to guest user. */ token 69 source3/smbd/share_access.c const struct nt_user_token *token, token 93 source3/smbd/share_access.c return nt_token_check_sid( &sid, token ); token 107 source3/smbd/share_access.c return nt_token_check_sid(&sid, token); token 125 source3/smbd/share_access.c if (nt_token_check_sid(&sid, token)) { token 155 source3/smbd/share_access.c const struct nt_user_token *token, token 170 source3/smbd/share_access.c token, *list)) { token 195 source3/smbd/share_access.c const struct nt_user_token *token, int snum) token 200 source3/smbd/share_access.c token, token 209 source3/smbd/share_access.c lp_servicename(snum), token, token 227 source3/smbd/share_access.c token, list)) { token 255 source3/smbd/share_access.c const struct nt_user_token *token, token 263 source3/smbd/share_access.c lp_servicename(snum), token, token 271 source3/smbd/share_access.c lp_servicename(snum), token, token 37 source3/utils/net_ads_gpo.c struct nt_user_token *token = NULL; token 76 source3/utils/net_ads_gpo.c status = gp_get_machine_token(ads, mem_ctx, dn, &token); token 78 source3/utils/net_ads_gpo.c status = ads_get_sid_token(ads, mem_ctx, dn, &token); token 88 source3/utils/net_ads_gpo.c status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list); token 108 source3/utils/net_ads_gpo.c token, gpo_list); token 152 source3/utils/net_ads_gpo.c &token->user_sids[0], token 294 source3/utils/net_ads_gpo.c struct nt_user_token *token = NULL; token 329 source3/utils/net_ads_gpo.c status = gp_get_machine_token(ads, mem_ctx, dn, &token); token 331 source3/utils/net_ads_gpo.c status = ads_get_sid_token(ads, mem_ctx, dn, &token); token 338 source3/utils/net_ads_gpo.c status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list); token 364 source3/utils/net_ads_gpo.c struct nt_user_token *token = NULL; token 411 source3/utils/net_ads_gpo.c status = gp_get_machine_token(ads, mem_ctx, dn, &token); token 413 source3/utils/net_ads_gpo.c status = ads_get_sid_token(ads, mem_ctx, dn, &token); token 420 source3/utils/net_ads_gpo.c status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list); token 425 source3/utils/net_ads_gpo.c status = gpo_process_gpo_list(ads, mem_ctx, token, gpo_list, token 68 source3/utils/net_afs.c char *token; token 75 source3/utils/net_afs.c token = afs_createtoken_str(argv[0], argv[1]); token 77 source3/utils/net_afs.c if (token == NULL) { token 82 source3/utils/net_afs.c if (!afs_settoken_str(token)) { token 29 source3/utils/net_proto.h bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token ); token 30 source3/utils/net_proto.h bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid ); token 33 source3/utils/net_proto.h struct nt_user_token *token); token 39 source3/utils/net_proto.h void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token); token 42 source3/utils/net_registry.c NT_USER_TOKEN *token = NULL; token 62 source3/utils/net_registry.c werr = ntstatus_to_werror(registry_create_admin_token(tmp_ctx, &token)); token 67 source3/utils/net_registry.c werr = reg_openhive(ctx, hivename, desired_access, token, hive); token 3940 source3/utils/net_rpc.c static void init_user_token(NT_USER_TOKEN *token, DOM_SID *user_sid) token 3942 source3/utils/net_rpc.c token->num_sids = 4; token 3944 source3/utils/net_rpc.c if (!(token->user_sids = SMB_MALLOC_ARRAY(DOM_SID, 4))) { token 3946 source3/utils/net_rpc.c token->num_sids = 0; token 3950 source3/utils/net_rpc.c token->user_sids[0] = *user_sid; token 3951 source3/utils/net_rpc.c sid_copy(&token->user_sids[1], &global_sid_World); token 3952 source3/utils/net_rpc.c sid_copy(&token->user_sids[2], &global_sid_Network); token 3953 source3/utils/net_rpc.c sid_copy(&token->user_sids[3], &global_sid_Authenticated_Users); token 3956 source3/utils/net_rpc.c static void free_user_token(NT_USER_TOKEN *token) token 3958 source3/utils/net_rpc.c SAFE_FREE(token->user_sids); token 3961 source3/utils/net_rpc.c static void add_sid_to_token(NT_USER_TOKEN *token, DOM_SID *sid) token 3963 source3/utils/net_rpc.c if (is_sid_in_token(token, sid)) token 3966 source3/utils/net_rpc.c token->user_sids = SMB_REALLOC_ARRAY(token->user_sids, DOM_SID, token->num_sids+1); token 3967 source3/utils/net_rpc.c if (!token->user_sids) { token 3971 source3/utils/net_rpc.c sid_copy(&token->user_sids[token->num_sids], sid); token 3973 source3/utils/net_rpc.c token->num_sids += 1; token 3978 source3/utils/net_rpc.c NT_USER_TOKEN token; token 3981 source3/utils/net_rpc.c static void dump_user_token(struct user_token *token) token 3985 source3/utils/net_rpc.c d_printf("%s\n", token->name); token 3987 source3/utils/net_rpc.c for (i=0; i<token->token.num_sids; i++) { token 3988 source3/utils/net_rpc.c d_printf(" %s\n", sid_string_tos(&token->token.user_sids[i])); token 4004 source3/utils/net_rpc.c static void collect_sid_memberships(NT_USER_TOKEN *token, DOM_SID sid) token 4010 source3/utils/net_rpc.c add_sid_to_token(token, &server_aliases[i].sid); token 4021 source3/utils/net_rpc.c static void collect_alias_memberships(NT_USER_TOKEN *token) token 4023 source3/utils/net_rpc.c int num_global_sids = token->num_sids; token 4027 source3/utils/net_rpc.c collect_sid_memberships(token, token->user_sids[i]); token 4031 source3/utils/net_rpc.c static bool get_user_sids(const char *domain, const char *user, NT_USER_TOKEN *token) token 4075 source3/utils/net_rpc.c init_user_token(token, &user_sid); token 4110 source3/utils/net_rpc.c add_sid_to_token(token, &sid); token 4175 source3/utils/net_rpc.c get_user_sids(domain, user, &(result[i].token)); token 4191 source3/utils/net_rpc.c struct user_token *token = NULL; token 4213 source3/utils/net_rpc.c if (token == NULL) { token 4218 source3/utils/net_rpc.c add_sid_to_token(&token->token, &sid); token 4231 source3/utils/net_rpc.c token = &((*tokens)[*num_tokens-1]); token 4233 source3/utils/net_rpc.c fstrcpy(token->name, line); token 4234 source3/utils/net_rpc.c token->token.num_sids = 0; token 4235 source3/utils/net_rpc.c token->token.user_sids = NULL; token 4298 source3/utils/net_rpc.c status = se_access_check(share_sd, &tokens[i].token, token 4314 source3/utils/net_rpc.c status = se_access_check(root_sd, &tokens[i].token, token 4411 source3/utils/net_rpc.c collect_alias_memberships(&tokens[i].token); token 4437 source3/utils/net_rpc.c free_user_token(&tokens[i].token); token 4492 source3/utils/net_rpc.c free_user_token(&tokens[i].token); token 1061 source3/utils/ntlm_auth.c DATA_BLOB token; token 1098 source3/utils/ntlm_auth.c len = write_spnego_data(&token, &spnego); token 1107 source3/utils/ntlm_auth.c reply_base64 = base64_encode_data_blob(talloc_tos(), token); token 1111 source3/utils/ntlm_auth.c data_blob_free(&token); token 1121 source3/utils/ntlm_auth.c DATA_BLOB token; token 1167 source3/utils/ntlm_auth.c token = base64_decode_data_blob(buf + 3); token 1168 source3/utils/ntlm_auth.c len = read_spnego_data(talloc_tos(), token, &request); token 1169 source3/utils/ntlm_auth.c data_blob_free(&token); token 1342 source3/utils/ntlm_auth.c len = write_spnego_data(&token, &response); token 1351 source3/utils/ntlm_auth.c reply_base64 = base64_encode_data_blob(talloc_tos(), token); token 1357 source3/utils/ntlm_auth.c data_blob_free(&token); token 271 source3/winbindd/winbindd_pam.c struct nt_user_token *token; token 282 source3/winbindd/winbindd_pam.c if (!(token = TALLOC_ZERO_P(mem_ctx, struct nt_user_token))) { token 314 source3/winbindd/winbindd_pam.c &token->user_sids, token 315 source3/winbindd/winbindd_pam.c &token->num_sids, token 322 source3/winbindd/winbindd_pam.c token)) token 324 source3/winbindd/winbindd_pam.c token))) { token 330 source3/winbindd/winbindd_pam.c debug_nt_user_token(DBGC_CLASS, 10, token); token 336 source3/winbindd/winbindd_pam.c token)) { token 29 source3/winbindd/winbindd_proto.h bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token ); token 30 source3/winbindd/winbindd_proto.h bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid ); token 33 source3/winbindd/winbindd_proto.h struct nt_user_token *token); token 39 source3/winbindd/winbindd_proto.h void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token); token 29 source4/auth/gensec/spnego_parse.c struct spnego_negTokenInit *token) token 31 source4/auth/gensec/spnego_parse.c ZERO_STRUCTP(token); token 50 source4/auth/gensec/spnego_parse.c token->mechTypes = talloc(NULL, const char *); token 53 source4/auth/gensec/spnego_parse.c token->mechTypes = talloc_realloc(NULL, token 54 source4/auth/gensec/spnego_parse.c token->mechTypes, token 56 source4/auth/gensec/spnego_parse.c asn1_read_OID(asn1, token->mechTypes, token->mechTypes + i); token 58 source4/auth/gensec/spnego_parse.c token->mechTypes[i] = NULL; token 66 source4/auth/gensec/spnego_parse.c asn1_read_Integer(asn1, &token->reqFlags); token 67 source4/auth/gensec/spnego_parse.c token->reqFlags |= SPNEGO_REQ_FLAG; token 73 source4/auth/gensec/spnego_parse.c asn1_read_OctetString(asn1, mem_ctx, &token->mechToken); token 87 source4/auth/gensec/spnego_parse.c &token->mechListMIC); token 98 source4/auth/gensec/spnego_parse.c token->targetPrincipal = mechListMIC; token 115 source4/auth/gensec/spnego_parse.c static bool write_negTokenInit(struct asn1_data *asn1, struct spnego_negTokenInit *token) token 121 source4/auth/gensec/spnego_parse.c if (token->mechTypes && *token->mechTypes) { token 126 source4/auth/gensec/spnego_parse.c for (i = 0; token->mechTypes[i]; i++) { token 127 source4/auth/gensec/spnego_parse.c asn1_write_OID(asn1, token->mechTypes[i]); token 134 source4/auth/gensec/spnego_parse.c if (token->reqFlags & SPNEGO_REQ_FLAG) { token 135 source4/auth/gensec/spnego_parse.c int flags = token->reqFlags & ~SPNEGO_REQ_FLAG; token 143 source4/auth/gensec/spnego_parse.c if (token->mechToken.data) { token 145 source4/auth/gensec/spnego_parse.c asn1_write_OctetString(asn1, token->mechToken.data, token 146 source4/auth/gensec/spnego_parse.c token->mechToken.length); token 151 source4/auth/gensec/spnego_parse.c if (token->mechListMIC.data) { token 155 source4/auth/gensec/spnego_parse.c asn1_write_OctetString(asn1, token->mechListMIC.data, token 156 source4/auth/gensec/spnego_parse.c token->mechListMIC.length); token 163 source4/auth/gensec/spnego_parse.c asn1_write(asn1, token->mechListMIC.data, token 164 source4/auth/gensec/spnego_parse.c token->mechListMIC.length); token 179 source4/auth/gensec/spnego_parse.c struct spnego_negTokenTarg *token) token 181 source4/auth/gensec/spnego_parse.c ZERO_STRUCTP(token); token 197 source4/auth/gensec/spnego_parse.c asn1_read_uint8(asn1, &token->negResult); token 203 source4/auth/gensec/spnego_parse.c asn1_read_OID(asn1, mem_ctx, &token->supportedMech); token 208 source4/auth/gensec/spnego_parse.c asn1_read_OctetString(asn1, mem_ctx, &token->responseToken); token 213 source4/auth/gensec/spnego_parse.c asn1_read_OctetString(asn1, mem_ctx, &token->mechListMIC); token 228 source4/auth/gensec/spnego_parse.c static bool write_negTokenTarg(struct asn1_data *asn1, struct spnego_negTokenTarg *token) token 233 source4/auth/gensec/spnego_parse.c if (token->negResult != SPNEGO_NONE_RESULT) { token 235 source4/auth/gensec/spnego_parse.c asn1_write_enumerated(asn1, token->negResult); token 239 source4/auth/gensec/spnego_parse.c if (token->supportedMech) { token 241 source4/auth/gensec/spnego_parse.c asn1_write_OID(asn1, token->supportedMech); token 245 source4/auth/gensec/spnego_parse.c if (token->responseToken.data) { token 247 source4/auth/gensec/spnego_parse.c asn1_write_OctetString(asn1, token->responseToken.data, token 248 source4/auth/gensec/spnego_parse.c token->responseToken.length); token 252 source4/auth/gensec/spnego_parse.c if (token->mechListMIC.data) { token 254 source4/auth/gensec/spnego_parse.c asn1_write_OctetString(asn1, token->mechListMIC.data, token 255 source4/auth/gensec/spnego_parse.c token->mechListMIC.length); token 265 source4/auth/gensec/spnego_parse.c ssize_t spnego_read_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, struct spnego_data *token) token 271 source4/auth/gensec/spnego_parse.c ZERO_STRUCTP(token); token 291 source4/auth/gensec/spnego_parse.c if (read_negTokenInit(asn1, mem_ctx, &token->negTokenInit)) { token 292 source4/auth/gensec/spnego_parse.c token->type = SPNEGO_NEG_TOKEN_INIT; token 297 source4/auth/gensec/spnego_parse.c if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) { token 298 source4/auth/gensec/spnego_parse.c token->type = SPNEGO_NEG_TOKEN_TARG; token 44 source4/auth/system_session.c struct security_token **token) token 94 source4/auth/system_session.c *token = ptoken; token 113 source4/auth/system_session.c *token = NULL; token 233 source4/dsdb/samdb/samdb.c struct security_token **token) token 293 source4/dsdb/samdb/samdb.c *token = ptoken; token 34 source4/dsdb/samdb/samdb_privilege.c struct security_token *token, token 66 source4/dsdb/samdb/samdb_privilege.c security_token_set_privilege(token, privilege); token 77 source4/dsdb/samdb/samdb_privilege.c struct loadparm_context *lp_ctx, struct security_token *token) token 85 source4/dsdb/samdb/samdb_privilege.c if (token->user_sid == NULL) { token 86 source4/dsdb/samdb/samdb_privilege.c token->privilege_mask = 0; token 90 source4/dsdb/samdb/samdb_privilege.c if (security_token_is_system(token)) { token 91 source4/dsdb/samdb/samdb_privilege.c token->privilege_mask = ~0; token 95 source4/dsdb/samdb/samdb_privilege.c if (security_token_is_anonymous(token)) { token 96 source4/dsdb/samdb/samdb_privilege.c token->privilege_mask = 0; token 100 source4/dsdb/samdb/samdb_privilege.c mem_ctx = talloc_new(token); token 107 source4/dsdb/samdb/samdb_privilege.c token->privilege_mask = 0; token 109 source4/dsdb/samdb/samdb_privilege.c for (i=0;i<token->num_sids;i++) { token 111 source4/dsdb/samdb/samdb_privilege.c token, token->sids[i]); token 251 source4/heimdal/lib/gssapi/krb5/cfx.c gss_cfx_wrap_token token; token 277 source4/heimdal/lib/gssapi/krb5/cfx.c rrc = (conf_req_flag ? sizeof(*token) : 0) + (uint16_t)cksumsize; token 288 source4/heimdal/lib/gssapi/krb5/cfx.c token = (gss_cfx_wrap_token)p; token 289 source4/heimdal/lib/gssapi/krb5/cfx.c token->TOK_ID[0] = 0x05; token 290 source4/heimdal/lib/gssapi/krb5/cfx.c token->TOK_ID[1] = 0x04; token 291 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags = 0; token 292 source4/heimdal/lib/gssapi/krb5/cfx.c token->Filler = 0xFF; token 294 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags |= CFXSentByAcceptor; token 296 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags |= CFXAcceptorSubkey; token 302 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags |= CFXSealed; token 303 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[0] = (padlength >> 8) & 0xFF; token 304 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[1] = (padlength >> 0) & 0xFF; token 315 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[0] = 0; token 316 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[1] = 0; token 329 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[0] = 0; token 330 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[1] = 0; token 336 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_encode_be_om_uint32(0, &token->SND_SEQ[0]); token 337 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_encode_be_om_uint32(seq_number, &token->SND_SEQ[4]); token 367 source4/heimdal/lib/gssapi/krb5/cfx.c p += sizeof(*token); token 371 source4/heimdal/lib/gssapi/krb5/cfx.c token, sizeof(*token)); token 376 source4/heimdal/lib/gssapi/krb5/cfx.c sizeof(*token), token 384 source4/heimdal/lib/gssapi/krb5/cfx.c assert(sizeof(*token) + cipher.length == wrapped_len); token 385 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[0] = (rrc >> 8) & 0xFF; token 386 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[1] = (rrc >> 0) & 0xFF; token 409 source4/heimdal/lib/gssapi/krb5/cfx.c buf = malloc(input_message_buffer->length + sizeof(*token)); token 417 source4/heimdal/lib/gssapi/krb5/cfx.c memcpy(buf + input_message_buffer->length, token, sizeof(*token)); token 422 source4/heimdal/lib/gssapi/krb5/cfx.c sizeof(*token), token 435 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[0] = (cksum.checksum.length >> 8) & 0xFF; token 436 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[1] = (cksum.checksum.length >> 0) & 0xFF; token 437 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[0] = (rrc >> 8) & 0xFF; token 438 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[1] = (rrc >> 0) & 0xFF; token 440 source4/heimdal/lib/gssapi/krb5/cfx.c p += sizeof(*token); token 477 source4/heimdal/lib/gssapi/krb5/cfx.c gss_cfx_wrap_token token; token 489 source4/heimdal/lib/gssapi/krb5/cfx.c if (input_message_buffer->length < sizeof(*token)) { token 495 source4/heimdal/lib/gssapi/krb5/cfx.c token = (gss_cfx_wrap_token)p; token 497 source4/heimdal/lib/gssapi/krb5/cfx.c if (token->TOK_ID[0] != 0x05 || token->TOK_ID[1] != 0x04) { token 502 source4/heimdal/lib/gssapi/krb5/cfx.c token_flags = token->Flags & token 518 source4/heimdal/lib/gssapi/krb5/cfx.c if (token->Filler != 0xFF) { token 526 source4/heimdal/lib/gssapi/krb5/cfx.c ec = (token->EC[0] << 8) | token->EC[1]; token 527 source4/heimdal/lib/gssapi/krb5/cfx.c rrc = (token->RRC[0] << 8) | token->RRC[1]; token 532 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[0], &seq_number_hi); token 533 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[4], &seq_number_lo); token 565 source4/heimdal/lib/gssapi/krb5/cfx.c p += sizeof(*token); token 593 source4/heimdal/lib/gssapi/krb5/cfx.c if (data.length < ec + sizeof(*token)) { token 599 source4/heimdal/lib/gssapi/krb5/cfx.c p += data.length - sizeof(*token); token 602 source4/heimdal/lib/gssapi/krb5/cfx.c ((gss_cfx_wrap_token)p)->RRC[0] = token->RRC[0]; token 603 source4/heimdal/lib/gssapi/krb5/cfx.c ((gss_cfx_wrap_token)p)->RRC[1] = token->RRC[1]; token 606 source4/heimdal/lib/gssapi/krb5/cfx.c if (memcmp(p, token, sizeof(*token)) != 0) { token 613 source4/heimdal/lib/gssapi/krb5/cfx.c output_message_buffer->length = data.length - ec - sizeof(*token); token 647 source4/heimdal/lib/gssapi/krb5/cfx.c output_message_buffer->value = malloc(len + sizeof(*token)); token 657 source4/heimdal/lib/gssapi/krb5/cfx.c token, sizeof(*token)); token 660 source4/heimdal/lib/gssapi/krb5/cfx.c token = (gss_cfx_wrap_token)((u_char *)output_message_buffer->value + token 662 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[0] = 0; token 663 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[1] = 0; token 664 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[0] = 0; token 665 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[1] = 0; token 670 source4/heimdal/lib/gssapi/krb5/cfx.c len + sizeof(*token), token 699 source4/heimdal/lib/gssapi/krb5/cfx.c gss_cfx_mic_token token; token 713 source4/heimdal/lib/gssapi/krb5/cfx.c len = message_buffer->length + sizeof(*token); token 723 source4/heimdal/lib/gssapi/krb5/cfx.c token = (gss_cfx_mic_token)(buf + message_buffer->length); token 724 source4/heimdal/lib/gssapi/krb5/cfx.c token->TOK_ID[0] = 0x04; token 725 source4/heimdal/lib/gssapi/krb5/cfx.c token->TOK_ID[1] = 0x04; token 726 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags = 0; token 728 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags |= CFXSentByAcceptor; token 730 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags |= CFXAcceptorSubkey; token 731 source4/heimdal/lib/gssapi/krb5/cfx.c memset(token->Filler, 0xFF, 5); token 737 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_encode_be_om_uint32(0, &token->SND_SEQ[0]); token 738 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_encode_be_om_uint32(seq_number, &token->SND_SEQ[4]); token 761 source4/heimdal/lib/gssapi/krb5/cfx.c message_token->length = sizeof(*token) + cksum.checksum.length; token 771 source4/heimdal/lib/gssapi/krb5/cfx.c memcpy(message_token->value, token, sizeof(*token)); token 772 source4/heimdal/lib/gssapi/krb5/cfx.c memcpy((u_char *)message_token->value + sizeof(*token), token 791 source4/heimdal/lib/gssapi/krb5/cfx.c gss_cfx_mic_token token; token 801 source4/heimdal/lib/gssapi/krb5/cfx.c if (token_buffer->length < sizeof(*token)) { token 807 source4/heimdal/lib/gssapi/krb5/cfx.c token = (gss_cfx_mic_token)p; token 809 source4/heimdal/lib/gssapi/krb5/cfx.c if (token->TOK_ID[0] != 0x04 || token->TOK_ID[1] != 0x04) { token 814 source4/heimdal/lib/gssapi/krb5/cfx.c token_flags = token->Flags & (CFXSentByAcceptor | CFXAcceptorSubkey); token 828 source4/heimdal/lib/gssapi/krb5/cfx.c if (memcmp(token->Filler, "\xff\xff\xff\xff\xff", 5) != 0) { token 835 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[0], &seq_number_hi); token 836 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[4], &seq_number_lo); token 868 source4/heimdal/lib/gssapi/krb5/cfx.c cksum.checksum.data = p + sizeof(*token); token 869 source4/heimdal/lib/gssapi/krb5/cfx.c cksum.checksum.length = token_buffer->length - sizeof(*token); token 877 source4/heimdal/lib/gssapi/krb5/cfx.c buf = malloc(message_buffer->length + sizeof(*token)); token 884 source4/heimdal/lib/gssapi/krb5/cfx.c memcpy(buf + message_buffer->length, token, sizeof(*token)); token 889 source4/heimdal/lib/gssapi/krb5/cfx.c sizeof(*token) + message_buffer->length, token 53 source4/heimdal/lib/hx509/ks_p11.c CK_BBOOL token; token 96 source4/heimdal/lib/roken/base64.c token_decode(const char *token) token 101 source4/heimdal/lib/roken/base64.c if (strlen(token) < 4) token 105 source4/heimdal/lib/roken/base64.c if (token[i] == '=') token 110 source4/heimdal/lib/roken/base64.c val += pos(token[i]); token 113 source4/lib/socket/interface.c const char *token, token 128 source4/lib/socket/interface.c if (gen_fnmatch(token, probed_ifaces[i].name) == 0) { token 138 source4/lib/socket/interface.c p = strchr_m(token,'/'); token 141 source4/lib/socket/interface.c if (strpbrk(token, "*?") != NULL) { token 144 source4/lib/socket/interface.c ip.s_addr = interpret_addr2(token).s_addr; token 153 source4/lib/socket/interface.c DEBUG(2,("can't determine netmask for %s\n", token)); token 157 source4/lib/socket/interface.c address = talloc_strdup(mem_ctx, token); token 30 source4/libcli/security/access_check.c const struct security_token *token) token 35 source4/libcli/security/access_check.c if (security_token_has_sid(token, sd->owner_sid)) { token 37 source4/libcli/security/access_check.c } else if (security_token_has_privilege(token, SEC_PRIV_RESTORE)) { token 52 source4/libcli/security/access_check.c if (!security_token_has_sid(token, &ace->trustee)) { token 76 source4/libcli/security/access_check.c const struct security_token *token, token 88 source4/libcli/security/access_check.c access_desired |= access_check_max_allowed(sd, token); token 95 source4/libcli/security/access_check.c if (security_token_has_privilege(token, SEC_PRIV_SECURITY)) { token 110 source4/libcli/security/access_check.c security_token_has_sid(token, sd->owner_sid)) { token 114 source4/libcli/security/access_check.c security_token_has_privilege(token, SEC_PRIV_RESTORE)) { token 130 source4/libcli/security/access_check.c if (!security_token_has_sid(token, &ace->trustee)) { token 197 source4/libcli/security/privilege.c bool security_token_has_privilege(const struct security_token *token, enum sec_privilege privilege) token 206 source4/libcli/security/privilege.c if (token->privilege_mask & mask) { token 215 source4/libcli/security/privilege.c void security_token_set_privilege(struct security_token *token, enum sec_privilege privilege) token 220 source4/libcli/security/privilege.c token->privilege_mask |= sec_privilege_mask(privilege); token 223 source4/libcli/security/privilege.c void security_token_debug_privileges(int dbg_lev, const struct security_token *token) token 226 source4/libcli/security/privilege.c (unsigned long long) token->privilege_mask)); token 228 source4/libcli/security/privilege.c if (token->privilege_mask) { token 235 source4/libcli/security/privilege.c if (token->privilege_mask & mask) { token 51 source4/libcli/security/security_token.c void security_token_debug(int dbg_lev, const struct security_token *token) token 56 source4/libcli/security/security_token.c if (!token) { token 67 source4/libcli/security/security_token.c dom_sid_string(mem_ctx, token->user_sid) )); token 69 source4/libcli/security/security_token.c (unsigned long)token->num_sids)); token 70 source4/libcli/security/security_token.c for (i = 0; i < token->num_sids; i++) { token 72 source4/libcli/security/security_token.c dom_sid_string(mem_ctx, token->sids[i]))); token 75 source4/libcli/security/security_token.c security_token_debug_privileges(dbg_lev, token); token 82 source4/libcli/security/security_token.c bool security_token_is_sid(const struct security_token *token, const struct dom_sid *sid) token 84 source4/libcli/security/security_token.c if (dom_sid_equal(token->user_sid, sid)) { token 90 source4/libcli/security/security_token.c bool security_token_is_sid_string(const struct security_token *token, const char *sid_string) token 96 source4/libcli/security/security_token.c ret = security_token_is_sid(token, sid); token 102 source4/libcli/security/security_token.c bool security_token_is_system(const struct security_token *token) token 104 source4/libcli/security/security_token.c return security_token_is_sid_string(token, SID_NT_SYSTEM); token 107 source4/libcli/security/security_token.c bool security_token_is_anonymous(const struct security_token *token) token 109 source4/libcli/security/security_token.c return security_token_is_sid_string(token, SID_NT_ANONYMOUS); token 112 source4/libcli/security/security_token.c bool security_token_has_sid(const struct security_token *token, const struct dom_sid *sid) token 115 source4/libcli/security/security_token.c for (i = 0; i < token->num_sids; i++) { token 116 source4/libcli/security/security_token.c if (dom_sid_equal(token->sids[i], sid)) { token 123 source4/libcli/security/security_token.c bool security_token_has_sid_string(const struct security_token *token, const char *sid_string) token 129 source4/libcli/security/security_token.c ret = security_token_has_sid(token, sid); token 135 source4/libcli/security/security_token.c bool security_token_has_builtin_administrators(const struct security_token *token) token 137 source4/libcli/security/security_token.c return security_token_has_sid_string(token, SID_BUILTIN_ADMINISTRATORS); token 140 source4/libcli/security/security_token.c bool security_token_has_nt_authenticated_users(const struct security_token *token) token 142 source4/libcli/security/security_token.c return security_token_has_sid_string(token, SID_NT_AUTHENTICATED_USERS); token 235 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self); token 241 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_is_sid(token, sid)); token 248 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self); token 254 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_has_sid(token, sid)); token 259 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self); token 261 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_is_anonymous(token)); token 266 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self); token 268 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_is_system(token)); token 273 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self); token 275 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_has_builtin_administrators(token)); token 280 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self); token 282 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_has_nt_authenticated_users(token)); token 288 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self); token 293 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_has_privilege(token, priv)); token 299 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self); token 304 source4/librpc/ndr/py_security.c security_token_set_privilege(token, priv); token 509 source4/ntvfs/posix/pvfs_acl.c struct security_token *token = req->session_info->security_token; token 553 source4/ntvfs/posix/pvfs_acl.c status = sec_access_check(sd, token, *access_mask, access_mask); token 99 source4/ntvfs/unixuid/vfs_unixuid.c struct security_token *token, token 110 source4/ntvfs/unixuid/vfs_unixuid.c if (token->num_sids < 2) { token 114 source4/ntvfs/unixuid/vfs_unixuid.c ids = talloc_array(req, struct id_mapping, token->num_sids); token 118 source4/ntvfs/unixuid/vfs_unixuid.c ids[0].sid = token->user_sid; token 122 source4/ntvfs/unixuid/vfs_unixuid.c ids[1].sid = token->group_sid; token 125 source4/ntvfs/unixuid/vfs_unixuid.c (*sec)->ngroups = token->num_sids - 2; token 131 source4/ntvfs/unixuid/vfs_unixuid.c ids[i+2].sid = token->sids[i+2]; token 135 source4/ntvfs/unixuid/vfs_unixuid.c ctx = wbc_sids_to_xids_send(priv->wbc_ctx, ids, token->num_sids, ids); token 174 source4/ntvfs/unixuid/vfs_unixuid.c struct security_token *token; token 182 source4/ntvfs/unixuid/vfs_unixuid.c token = req->session_info->security_token; token 189 source4/ntvfs/unixuid/vfs_unixuid.c if (token == priv->last_token) { token 192 source4/ntvfs/unixuid/vfs_unixuid.c status = nt_token_to_unix_security(ntvfs, req, token, &newsec); token 201 source4/ntvfs/unixuid/vfs_unixuid.c priv->last_token = token; token 609 source4/utils/ntlm_auth.c struct security_token *token = session_info->security_token; token 611 source4/utils/ntlm_auth.c token->sids[i]); token 141 source4/utils/oLschema2ldif.c struct schema_token *token; token 144 source4/utils/oLschema2ldif.c token = talloc(ctx, struct schema_token); token 147 source4/utils/oLschema2ldif.c type = talloc_strndup(token, c, n); token 153 source4/utils/oLschema2ldif.c token->type = SCHEMA_NAME; token 165 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 171 source4/utils/oLschema2ldif.c return token; token 175 source4/utils/oLschema2ldif.c token->type = SCHEMA_SUP; token 180 source4/utils/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n); token 184 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 189 source4/utils/oLschema2ldif.c return token; token 194 source4/utils/oLschema2ldif.c token->type = SCHEMA_STRUCTURAL; token 196 source4/utils/oLschema2ldif.c return token; token 201 source4/utils/oLschema2ldif.c token->type = SCHEMA_ABSTRACT; token 203 source4/utils/oLschema2ldif.c return token; token 208 source4/utils/oLschema2ldif.c token->type = SCHEMA_AUXILIARY; token 210 source4/utils/oLschema2ldif.c return token; token 215 source4/utils/oLschema2ldif.c token->type = SCHEMA_MUST; token 220 source4/utils/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n); token 224 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 229 source4/utils/oLschema2ldif.c return token; token 234 source4/utils/oLschema2ldif.c token->type = SCHEMA_MAY; token 239 source4/utils/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n); token 243 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 248 source4/utils/oLschema2ldif.c return token; token 253 source4/utils/oLschema2ldif.c token->type = SCHEMA_SINGLE_VALUE; token 255 source4/utils/oLschema2ldif.c return token; token 260 source4/utils/oLschema2ldif.c token->type = SCHEMA_EQUALITY; token 262 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 266 source4/utils/oLschema2ldif.c return token; token 271 source4/utils/oLschema2ldif.c token->type = SCHEMA_ORDERING; token 273 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 277 source4/utils/oLschema2ldif.c return token; token 282 source4/utils/oLschema2ldif.c token->type = SCHEMA_SUBSTR; token 284 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 288 source4/utils/oLschema2ldif.c return token; token 293 source4/utils/oLschema2ldif.c token->type = SCHEMA_SYNTAX; token 295 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 299 source4/utils/oLschema2ldif.c return token; token 304 source4/utils/oLschema2ldif.c token->type = SCHEMA_DESC; token 306 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c); token 310 source4/utils/oLschema2ldif.c return token; token 313 source4/utils/oLschema2ldif.c token->type = SCHEMA_UNKNOWN; token 314 source4/utils/oLschema2ldif.c token->value = type; token 317 source4/utils/oLschema2ldif.c return token; token 328 source4/utils/oLschema2ldif.c return token; token 335 source4/utils/oLschema2ldif.c struct schema_token *token; token 382 source4/utils/oLschema2ldif.c token = get_next_schema_token(msg, &c); token 383 source4/utils/oLschema2ldif.c if (!token) goto failed; token 385 source4/utils/oLschema2ldif.c switch (token->type) { token 387 source4/utils/oLschema2ldif.c MSG_ADD_STRING("cn", token->value); token 388 source4/utils/oLschema2ldif.c MSG_ADD_STRING("name", token->value); token 389 source4/utils/oLschema2ldif.c MSG_ADD_STRING("lDAPDisplayName", token->value); token 391 source4/utils/oLschema2ldif.c ldb_dn_add_child_fmt(msg->dn, "CN=%s,CN=Schema,CN=Configuration", token->value); token 395 source4/utils/oLschema2ldif.c MSG_ADD_M_STRING("subClassOf", token->value); token 411 source4/utils/oLschema2ldif.c MSG_ADD_M_STRING("mustContain", token->value); token 415 source4/utils/oLschema2ldif.c MSG_ADD_M_STRING("mayContain", token->value); token 437 source4/utils/oLschema2ldif.c find_syntax_map_by_standard_oid(token->value); token 445 source4/utils/oLschema2ldif.c MSG_ADD_STRING("description", token->value); token 449 source4/utils/oLschema2ldif.c fprintf(stderr, "Unknown Definition: %s\n", token->value);