sddl               97 source4/libcli/security/sddl.c 	const char *sddl = (*sddlp);
sddl              101 source4/libcli/security/sddl.c 	if (strncmp(sddl, "S-", 2) == 0) {
sddl              104 source4/libcli/security/sddl.c 		size_t len = strspn(sddl+2, "-0123456789");
sddl              105 source4/libcli/security/sddl.c 		sid_str = talloc_strndup(mem_ctx, sddl, len+2);
sddl              117 source4/libcli/security/sddl.c 		if (strncmp(sid_codes[i].code, sddl, 2) == 0) break;
sddl              120 source4/libcli/security/sddl.c 		DEBUG(1,("Unknown sddl sid code '%2.2s'\n", sddl));
sddl              271 source4/libcli/security/sddl.c 	const char *sddl = *sddlp;
sddl              281 source4/libcli/security/sddl.c 	if (isupper(sddl[0]) && sddl[1] == ':') {
sddl              287 source4/libcli/security/sddl.c 	if (!sddl_map_flags(acl_flags, sddl, flags, &len)) {
sddl              291 source4/libcli/security/sddl.c 	sddl += len;
sddl              294 source4/libcli/security/sddl.c 	while (*sddl == '(') {
sddl              296 source4/libcli/security/sddl.c 		len = strcspn(sddl+1, ")");
sddl              297 source4/libcli/security/sddl.c 		astr = talloc_strndup(acl, sddl+1, len);
sddl              298 source4/libcli/security/sddl.c 		if (astr == NULL || sddl[len+1] != ')') {
sddl              324 source4/libcli/security/sddl.c 		sddl += len+2;
sddl              328 source4/libcli/security/sddl.c 	(*sddlp) = sddl;
sddl              335 source4/libcli/security/sddl.c struct security_descriptor *sddl_decode(TALLOC_CTX *mem_ctx, const char *sddl,
sddl              344 source4/libcli/security/sddl.c 	while (*sddl) {
sddl              346 source4/libcli/security/sddl.c 		char c = sddl[0];
sddl              347 source4/libcli/security/sddl.c 		if (sddl[1] != ':') goto failed;
sddl              349 source4/libcli/security/sddl.c 		sddl += 2;
sddl              353 source4/libcli/security/sddl.c 			sd->dacl = sddl_decode_acl(sd, &sddl, &flags, domain_sid);
sddl              359 source4/libcli/security/sddl.c 			sd->sacl = sddl_decode_acl(sd, &sddl, &flags, domain_sid);
sddl              367 source4/libcli/security/sddl.c 			sd->owner_sid = sddl_decode_sid(sd, &sddl, domain_sid);
sddl              372 source4/libcli/security/sddl.c 			sd->group_sid = sddl_decode_sid(sd, &sddl, domain_sid);
sddl              381 source4/libcli/security/sddl.c 	DEBUG(2,("Badly formatted SDDL '%s'\n", sddl));
sddl              468 source4/libcli/security/sddl.c 	char *sddl = NULL;
sddl              509 source4/libcli/security/sddl.c 	sddl = talloc_asprintf(mem_ctx, "%s;%s;%s;%s;%s;%s",
sddl              514 source4/libcli/security/sddl.c 	return sddl;
sddl              523 source4/libcli/security/sddl.c 	char *sddl;
sddl              527 source4/libcli/security/sddl.c 	sddl = sddl_flags_to_string(mem_ctx, acl_flags, flags, false);
sddl              528 source4/libcli/security/sddl.c 	if (sddl == NULL) goto failed;
sddl              532 source4/libcli/security/sddl.c 		char *ace = sddl_encode_ace(sddl, &acl->aces[i], domain_sid);
sddl              534 source4/libcli/security/sddl.c 		sddl = talloc_asprintf_append_buffer(sddl, "(%s)", ace);
sddl              535 source4/libcli/security/sddl.c 		if (sddl == NULL) goto failed;
sddl              539 source4/libcli/security/sddl.c 	return sddl;
sddl              542 source4/libcli/security/sddl.c 	talloc_free(sddl);
sddl              553 source4/libcli/security/sddl.c 	char *sddl;
sddl              557 source4/libcli/security/sddl.c 	sddl = talloc_strdup(mem_ctx, "");
sddl              558 source4/libcli/security/sddl.c 	if (sddl == NULL) goto failed;
sddl              565 source4/libcli/security/sddl.c 		sddl = talloc_asprintf_append_buffer(sddl, "O:%s", sid);
sddl              566 source4/libcli/security/sddl.c 		if (sddl == NULL) goto failed;
sddl              572 source4/libcli/security/sddl.c 		sddl = talloc_asprintf_append_buffer(sddl, "G:%s", sid);
sddl              573 source4/libcli/security/sddl.c 		if (sddl == NULL) goto failed;
sddl              579 source4/libcli/security/sddl.c 		sddl = talloc_asprintf_append_buffer(sddl, "D:%s", acl);
sddl              580 source4/libcli/security/sddl.c 		if (sddl == NULL) goto failed;
sddl              586 source4/libcli/security/sddl.c 		sddl = talloc_asprintf_append_buffer(sddl, "S:%s", acl);
sddl              587 source4/libcli/security/sddl.c 		if (sddl == NULL) goto failed;
sddl              591 source4/libcli/security/sddl.c 	return sddl;
sddl              594 source4/libcli/security/sddl.c 	talloc_free(sddl);
sddl               36 source4/libcli/security/tests/sddl.c 	const char *sddl = (const char *)test_data;
sddl               42 source4/libcli/security/tests/sddl.c 	sd = sddl_decode(mem_ctx, sddl, domain);
sddl               44 source4/libcli/security/tests/sddl.c 					"Failed to decode '%s'\n", sddl));
sddl               48 source4/libcli/security/tests/sddl.c 					"Failed to re-encode '%s'\n", sddl));
sddl               55 source4/libcli/security/tests/sddl.c 		talloc_asprintf(tctx, "Failed equality test for '%s'\n", sddl));
sddl               59 source4/libcli/security/tests/sddl.c 	if (strcmp(sddl, sddl2) != 0) {
sddl               60 source4/libcli/security/tests/sddl.c 		printf("Failed sddl equality test\norig: %s\n new: %s\n", sddl, sddl2);
sddl              172 source4/librpc/ndr/py_security.c 	char *sddl;
sddl              176 source4/librpc/ndr/py_security.c 	if (!PyArg_ParseTuple(args, "sO", &sddl, &py_sid))
sddl              181 source4/librpc/ndr/py_security.c 	secdesc = sddl_decode(NULL, sddl, sid);