token             476 lib/replace/replace.c 	char *token;
token             486 lib/replace/replace.c 	token = s;
token             487 lib/replace/replace.c 	s = strpbrk(token, delim);
token             489 lib/replace/replace.c 		*save_ptr = token + strlen(token);
token             495 lib/replace/replace.c 	return token;
token            1578 nsswitch/pam_winbind.c 	char *token = NULL;
token            1629 nsswitch/pam_winbind.c 	while ((token = strtok_r(p, "/", &safe_ptr)) != NULL) {
token            1635 nsswitch/pam_winbind.c 		_pam_log_debug(ctx, LOG_DEBUG, "token is %s", token);
token            1637 nsswitch/pam_winbind.c 		create_dir = talloc_asprintf_append(create_dir, "%s/", token);
token            1643 nsswitch/pam_winbind.c 		if (strcmp(token, user_dir) == 0) {
token            1644 nsswitch/pam_winbind.c 			_pam_log_debug(ctx, LOG_DEBUG, "assuming last directory: %s", token);
token            2105 nsswitch/pam_winbind.c 	char *token;
token            2113 nsswitch/pam_winbind.c 	*pass = token = NULL;
token            2199 nsswitch/pam_winbind.c 		token = x_strdup(resp[i - replies].resp);
token            2200 nsswitch/pam_winbind.c 		if (!token) {
token            2211 nsswitch/pam_winbind.c 			    strcmp(token, resp[i - 1].resp)) {
token            2212 nsswitch/pam_winbind.c 				_pam_delete(token);	/* mistyped */
token            2236 nsswitch/pam_winbind.c 	retval = pam_set_item(ctx->pamh, authtok_flag, token);
token            2237 nsswitch/pam_winbind.c 	_pam_delete(token);	/* clean it up */
token             743 nsswitch/winbind_nss_aix.c static void wb_aix_close(void *token)
token             655 source3/auth/auth_util.c static NTSTATUS log_nt_token(NT_USER_TOKEN *token)
token             669 source3/auth/auth_util.c 	for (i=1; i<token->num_sids; i++) {
token             672 source3/auth/auth_util.c 			sid_string_talloc(frame, &token->user_sids[i]));
token             677 source3/auth/auth_util.c 		"%s", sid_string_talloc(frame, &token->user_sids[0]));
token             824 source3/auth/auth_util.c 				    struct nt_user_token **token)
token            1056 source3/auth/auth_util.c 	*token = create_local_nt_token(mem_ctx, &user_sid,
token            1059 source3/auth/auth_util.c 	if ((*token == NULL) || (*found_username == NULL)) {
token            1083 source3/auth/auth_util.c 	struct nt_user_token *token;
token            1096 source3/auth/auth_util.c 					    &token);
token            1103 source3/auth/auth_util.c 	result = nt_token_check_sid(group_sid, token);
token              33 source3/auth/token_util.c bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token )
token              37 source3/auth/token_util.c 	if ( !sid || !token )
token              40 source3/auth/token_util.c 	for ( i=0; i<token->num_sids; i++ ) {
token              41 source3/auth/token_util.c 		if ( sid_equal( sid, &token->user_sids[i] ) )
token              48 source3/auth/token_util.c bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid )
token              68 source3/auth/token_util.c 	return nt_token_check_sid( &domain_sid, token );\
token              80 source3/auth/token_util.c 	struct nt_user_token *token, *for_cache;
token             105 source3/auth/token_util.c 	token = create_local_nt_token(talloc_autofree_context(), &u_sid, False,
token             108 source3/auth/token_util.c 	token->privileges = se_disk_operators;
token             110 source3/auth/token_util.c 	for_cache = token;
token             116 source3/auth/token_util.c 	return token;
token             125 source3/auth/token_util.c 		     struct nt_user_token *token)
token             140 source3/auth/token_util.c 					    token->user_sids,
token             141 source3/auth/token_util.c 					    token->num_sids,
token             153 source3/auth/token_util.c 		status = add_sid_to_array_unique(token, &alias_sid,
token             154 source3/auth/token_util.c 						 &token->user_sids,
token             155 source3/auth/token_util.c 						 &token->num_sids);
token             170 source3/auth/token_util.c static NTSTATUS add_builtin_administrators(struct nt_user_token *token,
token             193 source3/auth/token_util.c 	if ( nt_token_check_sid( &domadm, token ) ) {
token             194 source3/auth/token_util.c 		status = add_sid_to_array(token,
token             196 source3/auth/token_util.c 					  &token->user_sids, &token->num_sids);
token             517 source3/auth/token_util.c void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token)
token             521 source3/auth/token_util.c 	if (!token) {
token             528 source3/auth/token_util.c 		sid_string_dbg(&token->user_sids[0]) ));
token             530 source3/auth/token_util.c 		  ("contains %lu SIDs\n", (unsigned long)token->num_sids));
token             531 source3/auth/token_util.c 	for (i = 0; i < token->num_sids; i++)
token             534 source3/auth/token_util.c 			   sid_string_dbg(&token->user_sids[i])));
token             536 source3/auth/token_util.c 	dump_se_priv( dbg_class, dbg_lev, &token->privileges );
token             149 source3/include/gpo.h 	const struct nt_user_token *token;
token             268 source3/include/nameserv.h 	int     token;        /* Used when communicating with backup browsers. */
token             115 source3/include/proto.h 				    struct nt_user_token **token);
token             176 source3/include/proto.h bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token );
token             177 source3/include/proto.h bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid );
token             180 source3/include/proto.h 		     struct nt_user_token *token);
token             188 source3/include/proto.h void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token);
token             628 source3/include/proto.h bool user_has_privileges(const NT_USER_TOKEN *token, const SE_PRIV *privilege);
token             629 source3/include/proto.h bool user_has_any_privilege(NT_USER_TOKEN *token, const SE_PRIV *privilege);
token             719 source3/include/proto.h bool share_access_check(const NT_USER_TOKEN *token, const char *sharename,
token            1242 source3/include/proto.h bool token_sid_in_ace(const NT_USER_TOKEN *token, const SEC_ACE *ace);
token            1272 source3/include/proto.h NTSTATUS se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token,
token            1329 source3/include/proto.h bool is_sid_in_token(const NT_USER_TOKEN *token, const DOM_SID *sid);
token            2011 source3/include/proto.h 			   const struct nt_user_token *token,
token            2018 source3/include/proto.h 				 const struct nt_user_token *token,
token            2085 source3/include/proto.h 			     struct nt_user_token **token);
token            2090 source3/include/proto.h 			    const struct nt_user_token *token,
token            2099 source3/include/proto.h 		       const struct nt_user_token *token,
token            2121 source3/include/proto.h 			  const struct nt_user_token *token,
token            2149 source3/include/proto.h 				const struct nt_user_token *token,
token            2155 source3/include/proto.h 				      const struct nt_user_token *token);
token            2174 source3/include/proto.h 			     const struct nt_user_token *token,
token            2181 source3/include/proto.h 				const struct nt_user_token *token,
token            2206 source3/include/proto.h 				struct nt_user_token **token);
token            3296 source3/include/proto.h ssize_t read_spnego_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, SPNEGO_DATA *token);
token            4951 source3/include/proto.h 		    const struct nt_user_token *token,
token            4984 source3/include/proto.h 		     uint32 desired_access, const struct nt_user_token *token,
token            4994 source3/include/proto.h 		       const struct nt_user_token *token,
token            4997 source3/include/proto.h WERROR reg_delete_path(const struct nt_user_token *token,
token            5061 source3/include/proto.h 			  const struct nt_user_token *token );
token            5157 source3/include/proto.h                              const struct nt_user_token *token,
token            5963 source3/include/proto.h WERROR delete_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *sharename );
token            6052 source3/include/proto.h WERROR add_port_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *portname, const char *uri );
token            6053 source3/include/proto.h bool add_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, NT_PRINTER_INFO_LEVEL *printer);
token            6106 source3/include/proto.h SEC_DESC *svcctl_get_secdesc( TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token );
token            6107 source3/include/proto.h bool svcctl_set_secdesc( TALLOC_CTX *ctx, const char *name, SEC_DESC *sec_desc, NT_USER_TOKEN *token );
token            6108 source3/include/proto.h const char *svcctl_lookup_dispname(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token );
token            6109 source3/include/proto.h const char *svcctl_lookup_description(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token );
token            6110 source3/include/proto.h REGVAL_CTR *svcctl_fetch_regvalues( const char *name, NT_USER_TOKEN *token );
token            6599 source3/include/proto.h                           const NT_USER_TOKEN *token,
token            6965 source3/include/proto.h void set_sec_ctx(uid_t uid, gid_t gid, int ngroups, gid_t *groups, NT_USER_TOKEN *token);
token            7014 source3/include/proto.h 				 const struct nt_user_token *token,
token            7017 source3/include/proto.h 		   const struct nt_user_token *token, int snum);
token            7020 source3/include/proto.h 				  const struct nt_user_token *token,
token            7282 source3/include/proto.h NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token,
token            7286 source3/include/proto.h void map_max_allowed_access(const NT_USER_TOKEN *token,
token             139 source3/include/reg_objects.h 				     const NT_USER_TOKEN *token );
token             167 source3/include/reg_objects.h 	struct nt_user_token *token;
token             361 source3/lib/interface.c static void interpret_interface(char *token)
token             375 source3/lib/interface.c 		if (gen_fnmatch(token, probed_ifaces[i].name) == 0) {
token             385 source3/lib/interface.c 	p = strchr_m(token,'/');
token             387 source3/lib/interface.c 		if (!interpret_string_addr(&ss, token, 0)) {
token             389 source3/lib/interface.c 				  "for %s\n", token));
token             401 source3/lib/interface.c 			token));
token             407 source3/lib/interface.c 	goodaddr = interpret_string_addr(&ss, token, 0);
token             413 source3/lib/interface.c 			token));
token             471 source3/lib/interface.c 			token));
token             478 source3/lib/interface.c 		token));
token             481 source3/lib/interface.c 	(void)strlcpy(ifs.name, token, sizeof(ifs.name));
token             141 source3/lib/ldb/tools/oLschema2ldif.c 	struct schema_token *token;
token             144 source3/lib/ldb/tools/oLschema2ldif.c 	token = talloc(ctx, struct schema_token);
token             147 source3/lib/ldb/tools/oLschema2ldif.c 	type = talloc_strndup(token, c, n);
token             153 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_NAME;
token             165 source3/lib/ldb/tools/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             171 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             175 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_SUP;
token             180 source3/lib/ldb/tools/oLschema2ldif.c 			token->value = talloc_strndup(ctx, c, n);
token             184 source3/lib/ldb/tools/oLschema2ldif.c 			token->value = get_def_value(ctx, &c);
token             189 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             194 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_STRUCTURAL;
token             196 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             201 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_ABSTRACT;
token             203 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             208 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_AUXILIARY;
token             210 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             215 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_MUST;
token             220 source3/lib/ldb/tools/oLschema2ldif.c 			token->value = talloc_strndup(ctx, c, n);
token             224 source3/lib/ldb/tools/oLschema2ldif.c 			token->value = get_def_value(ctx, &c);
token             229 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             234 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_MAY;
token             239 source3/lib/ldb/tools/oLschema2ldif.c 			token->value = talloc_strndup(ctx, c, n);
token             243 source3/lib/ldb/tools/oLschema2ldif.c 			token->value = get_def_value(ctx, &c);
token             248 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             253 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_SINGLE_VALUE;
token             255 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             260 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_EQUALITY;
token             262 source3/lib/ldb/tools/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             266 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             271 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_ORDERING;
token             273 source3/lib/ldb/tools/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             277 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             282 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_SUBSTR;
token             284 source3/lib/ldb/tools/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             288 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             293 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_SYNTAX;
token             295 source3/lib/ldb/tools/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             299 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             304 source3/lib/ldb/tools/oLschema2ldif.c 		token->type = SCHEMA_DESC;
token             306 source3/lib/ldb/tools/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             310 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             313 source3/lib/ldb/tools/oLschema2ldif.c 	token->type = SCHEMA_UNKNOWN;
token             314 source3/lib/ldb/tools/oLschema2ldif.c 	token->value = type;
token             317 source3/lib/ldb/tools/oLschema2ldif.c 		return token;
token             328 source3/lib/ldb/tools/oLschema2ldif.c 	return token;
token             335 source3/lib/ldb/tools/oLschema2ldif.c 	struct schema_token *token;
token             382 source3/lib/ldb/tools/oLschema2ldif.c 		token = get_next_schema_token(msg, &c);
token             383 source3/lib/ldb/tools/oLschema2ldif.c 		if (!token) goto failed;
token             385 source3/lib/ldb/tools/oLschema2ldif.c 		switch (token->type) {
token             387 source3/lib/ldb/tools/oLschema2ldif.c 			MSG_ADD_STRING("cn", token->value);
token             388 source3/lib/ldb/tools/oLschema2ldif.c 			MSG_ADD_STRING("name", token->value);
token             389 source3/lib/ldb/tools/oLschema2ldif.c 			MSG_ADD_STRING("lDAPDisplayName", token->value);
token             392 source3/lib/ldb/tools/oLschema2ldif.c 							token->value);
token             396 source3/lib/ldb/tools/oLschema2ldif.c 			MSG_ADD_M_STRING("subClassOf", token->value);
token             412 source3/lib/ldb/tools/oLschema2ldif.c 			MSG_ADD_M_STRING("mustContain", token->value);
token             416 source3/lib/ldb/tools/oLschema2ldif.c 			MSG_ADD_M_STRING("mayContain", token->value);
token             438 source3/lib/ldb/tools/oLschema2ldif.c 				find_syntax_map_by_standard_oid(token->value);
token             446 source3/lib/ldb/tools/oLschema2ldif.c 			MSG_ADD_STRING("description", token->value);
token             450 source3/lib/ldb/tools/oLschema2ldif.c 			fprintf(stderr, "Unknown Definition: %s\n", token->value);
token             343 source3/lib/privileges_basic.c bool user_has_privileges(const NT_USER_TOKEN *token, const SE_PRIV *privilege)
token             345 source3/lib/privileges_basic.c 	if ( !token )
token             348 source3/lib/privileges_basic.c 	return is_privilege_assigned( &token->privileges, privilege );
token             356 source3/lib/privileges_basic.c bool user_has_any_privilege(NT_USER_TOKEN *token, const SE_PRIV *privilege)
token             358 source3/lib/privileges_basic.c 	if ( !token )
token             361 source3/lib/privileges_basic.c 	return is_any_privilege_assigned( &token->privileges, privilege );
token             279 source3/lib/sharesec.c bool share_access_check(const NT_USER_TOKEN *token, const char *sharename,
token             293 source3/lib/sharesec.c 	status = se_access_check(psd, token, desired_access, &granted);
token             538 source3/lib/smbconf/smbconf_reg.c 	struct nt_user_token *token;
token             551 source3/lib/smbconf/smbconf_reg.c 	werr = ntstatus_to_werror(registry_create_admin_token(ctx, &token));
token             571 source3/lib/smbconf/smbconf_reg.c 			     token, &rpd(ctx)->base_key);
token             666 source3/lib/smbconf/smbconf_reg.c 	struct nt_user_token *token;
token             668 source3/lib/smbconf/smbconf_reg.c 	werr = ntstatus_to_werror(registry_create_admin_token(ctx, &token));
token             681 source3/lib/smbconf/smbconf_reg.c 	werr = reg_open_path(mem_ctx, path, REG_KEY_WRITE, token,
token              36 source3/lib/util_nttoken.c 	NT_USER_TOKEN *token;
token              41 source3/lib/util_nttoken.c 	token = TALLOC_ZERO_P(mem_ctx, NT_USER_TOKEN);
token              42 source3/lib/util_nttoken.c 	if (token == NULL) {
token              48 source3/lib/util_nttoken.c 		token->user_sids = (DOM_SID *)talloc_memdup(
token              49 source3/lib/util_nttoken.c 			token, ptoken->user_sids, sizeof(DOM_SID) * ptoken->num_sids );
token              51 source3/lib/util_nttoken.c 		if (token->user_sids == NULL) {
token              53 source3/lib/util_nttoken.c 			TALLOC_FREE(token);
token              56 source3/lib/util_nttoken.c 		token->num_sids = ptoken->num_sids;
token              61 source3/lib/util_nttoken.c 	if ( !se_priv_copy( &token->privileges, &ptoken->privileges ) ) {
token              66 source3/lib/util_nttoken.c 	return token;
token              78 source3/lib/util_nttoken.c 	struct nt_user_token *token = NULL;
token              86 source3/lib/util_nttoken.c 	token = TALLOC_ZERO_P(mem_ctx, struct nt_user_token);
token              87 source3/lib/util_nttoken.c 	NT_STATUS_HAVE_NO_MEMORY(token);
token              92 source3/lib/util_nttoken.c 						 &token->user_sids,
token              93 source3/lib/util_nttoken.c 						 &token->num_sids);
token              95 source3/lib/util_nttoken.c 			TALLOC_FREE(token);
token             103 source3/lib/util_nttoken.c 						 &token->user_sids,
token             104 source3/lib/util_nttoken.c 						 &token->num_sids);
token             106 source3/lib/util_nttoken.c 			TALLOC_FREE(token);
token             111 source3/lib/util_nttoken.c 	se_priv_add(&token->privileges, &token_1->privileges);
token             112 source3/lib/util_nttoken.c 	se_priv_add(&token->privileges, &token_2->privileges);
token             114 source3/lib/util_nttoken.c 	*token_out = token;
token             123 source3/lib/util_nttoken.c bool token_sid_in_ace(const NT_USER_TOKEN *token, const struct security_ace *ace)
token             127 source3/lib/util_nttoken.c 	for (i = 0; i < token->num_sids; i++) {
token             128 source3/lib/util_nttoken.c 		if (sid_equal(&ace->trustee, &token->user_sids[i]))
token             109 source3/lib/util_seaccess.c 			  		const NT_USER_TOKEN *token)
token             114 source3/lib/util_seaccess.c 	if (is_sid_in_token(token, sd->owner_sid)) {
token             116 source3/lib/util_seaccess.c 	} else if (user_has_privileges(token, &se_restore)) {
token             131 source3/lib/util_seaccess.c 		if (!is_sid_in_token(token, &ace->trustee)) {
token             157 source3/lib/util_seaccess.c 			  const NT_USER_TOKEN *token,
token             171 source3/lib/util_seaccess.c 		access_desired |= access_check_max_allowed(sd, token);
token             186 source3/lib/util_seaccess.c 		if (user_has_privileges(token, &sec_security)) {
token             202 source3/lib/util_seaccess.c 	    is_sid_in_token(token, sd->owner_sid)) {
token             206 source3/lib/util_seaccess.c 	    user_has_privileges(token, &se_restore)) {
token             222 source3/lib/util_seaccess.c 		if (!is_sid_in_token(token, &ace->trustee)) {
token             667 source3/lib/util_sid.c bool is_sid_in_token(const NT_USER_TOKEN *token, const DOM_SID *sid)
token             671 source3/lib/util_sid.c         for (i=0; i<token->num_sids; i++) {
token             672 source3/lib/util_sid.c                 if (sid_compare(sid, &token->user_sids[i]) == 0)
token             586 source3/libgpo/gpext/gpext.c 				struct nt_user_token *token;
token             588 source3/libgpo/gpext/gpext.c 				token = registry_create_system_token(mem_ctx);
token             589 source3/libgpo/gpext/gpext.c 				NT_STATUS_HAVE_NO_MEMORY(token);
token             594 source3/libgpo/gpext/gpext.c 						       token,
token             670 source3/libgpo/gpext/gpext.c 			   const struct nt_user_token *token,
token             684 source3/libgpo/gpext/gpext.c 				 const struct nt_user_token *token,
token             726 source3/libgpo/gpext/gpext.c 						    token,
token              63 source3/libgpo/gpext/gpext.h 					 const struct nt_user_token *token,
token              71 source3/libgpo/gpext/gpext.h 					 const struct nt_user_token *token,
token             468 source3/libgpo/gpext/registry.c 				 const struct nt_user_token *token,
token             489 source3/libgpo/gpext/registry.c 				       token,
token             502 source3/libgpo/gpext/registry.c 						token, flags);
token             523 source3/libgpo/gpext/registry.c 					      const struct nt_user_token *token,
token             553 source3/libgpo/gpext/registry.c 	werr = reg_apply_registry(mem_ctx, token, root_key, flags,
token             254 source3/libgpo/gpext/scripts.c 			    const struct nt_user_token *token,
token             284 source3/libgpo/gpext/scripts.c 				       token,
token             311 source3/libgpo/gpext/scripts.c 						token, flags);
token             331 source3/libgpo/gpext/scripts.c 					     const struct nt_user_token *token,
token             377 source3/libgpo/gpext/scripts.c 		werr = scripts_apply(ini_ctx->mem_ctx, token, root_key,
token             142 source3/libgpo/gpext/security.c 					      const struct nt_user_token *token,
token             550 source3/libgpo/gpo_ldap.c 					 const struct nt_user_token *token)
token             590 source3/libgpo/gpo_ldap.c 								   token));
token             617 source3/libgpo/gpo_ldap.c 			     struct nt_user_token **token)
token             666 source3/libgpo/gpo_ldap.c 	*token = new_token;
token             668 source3/libgpo/gpo_ldap.c 	debug_nt_user_token(DBGC_CLASS, 5, *token);
token             708 source3/libgpo/gpo_ldap.c 			    const struct nt_user_token *token,
token             759 source3/libgpo/gpo_ldap.c 							token);
token             806 source3/libgpo/gpo_ldap.c 							token);
token             852 source3/libgpo/gpo_ldap.c 							token);
token              28 source3/libgpo/gpo_reg.c 	struct nt_user_token *token = NULL;
token              30 source3/libgpo/gpo_reg.c 	token = TALLOC_ZERO_P(mem_ctx, struct nt_user_token);
token              31 source3/libgpo/gpo_reg.c 	if (!token) {
token              36 source3/libgpo/gpo_reg.c 	token->privileges = se_priv_all;
token              38 source3/libgpo/gpo_reg.c 	if (!NT_STATUS_IS_OK(add_sid_to_array(token, &global_sid_System,
token              39 source3/libgpo/gpo_reg.c 			 &token->user_sids, &token->num_sids))) {
token              44 source3/libgpo/gpo_reg.c 	return token;
token              53 source3/libgpo/gpo_reg.c 		       const struct nt_user_token *token,
token              71 source3/libgpo/gpo_reg.c 	if (token) {
token              72 source3/libgpo/gpo_reg.c 		tmp_ctx->token = token;
token              74 source3/libgpo/gpo_reg.c 		tmp_ctx->token = registry_create_system_token(mem_ctx);
token              76 source3/libgpo/gpo_reg.c 	if (!tmp_ctx->token) {
token              94 source3/libgpo/gpo_reg.c 				     tmp_ctx->token, &tmp_ctx->curr_key);
token             152 source3/libgpo/gpo_reg.c 			     reg_ctx->token, key);
token             313 source3/libgpo/gpo_reg.c 					 const struct nt_user_token *token,
token             318 source3/libgpo/gpo_reg.c 	path = gp_reg_groupmembership_path(mem_ctx, &token->user_sids[0],
token             331 source3/libgpo/gpo_reg.c 					   const struct nt_user_token *token,
token             342 source3/libgpo/gpo_reg.c 	path = gp_reg_groupmembership_path(mem_ctx, &token->user_sids[0],
token             346 source3/libgpo/gpo_reg.c 	gp_reg_del_groupmembership(mem_ctx, reg_ctx->curr_key, token, flags);
token             352 source3/libgpo/gpo_reg.c 	for (i=0; i<token->num_sids; i++) {
token             357 source3/libgpo/gpo_reg.c 		val = sid_string_talloc(mem_ctx, &token->user_sids[i]);
token             376 source3/libgpo/gpo_reg.c 					  struct nt_user_token **token,
token             417 source3/libgpo/gpo_reg.c 	*token = tmp_token;
token             452 source3/libgpo/gpo_reg.c 			  const struct nt_user_token *token,
token             463 source3/libgpo/gpo_reg.c 			       token, &reg_ctx);
token             467 source3/libgpo/gpo_reg.c 			     &token->user_sids[0]);
token             473 source3/libgpo/gpo_reg.c 	werr = gp_reg_store_groupmembership(mem_ctx, reg_ctx, token, flags);
token             479 source3/libgpo/gpo_reg.c 	subkeyname = gp_req_state_path(mem_ctx, &token->user_sids[0], flags);
token             927 source3/libgpo/gpo_reg.c 				const struct nt_user_token *token,
token             956 source3/libgpo/gpo_reg.c 					     &token->user_sids[0]);
token              96 source3/libgpo/gpo_sec.c 					       const struct nt_user_token *token)
token             100 source3/libgpo/gpo_sec.c 	    nt_token_check_sid(&ace->trustee, token)) {
token             114 source3/libgpo/gpo_sec.c 						const struct nt_user_token *token)
token             118 source3/libgpo/gpo_sec.c 	    nt_token_check_sid(&ace->trustee, token)) {
token             132 source3/libgpo/gpo_sec.c 				 const struct nt_user_token *token)
token             136 source3/libgpo/gpo_sec.c 			return gpo_sd_check_ace_denied_object(ace, token);
token             138 source3/libgpo/gpo_sec.c 			return gpo_sd_check_ace_allowed_object(ace, token);
token             148 source3/libgpo/gpo_sec.c 				      const struct nt_user_token *token)
token             155 source3/libgpo/gpo_sec.c 	if (!token) {
token             174 source3/libgpo/gpo_sec.c 		status = gpo_sd_check_ace(&dacl->aces[i], token);
token             438 source3/libgpo/gpo_util.c 			     const struct nt_user_token *token,
token             479 source3/libgpo/gpo_util.c 						   flags, token, root_key, gpo,
token             495 source3/libgpo/gpo_util.c 					      const struct nt_user_token *token,
token             515 source3/libgpo/gpo_util.c 		status = gpo_process_a_gpo(ads, mem_ctx, token, root_key,
token             533 source3/libgpo/gpo_util.c 				const struct nt_user_token *token,
token             562 source3/libgpo/gpo_util.c 				       token,
token             592 source3/libgpo/gpo_util.c 		status = gpo_process_gpo_list_by_ext(ads, mem_ctx, token,
token             849 source3/libgpo/gpo_util.c 				struct nt_user_token **token)
token             864 source3/libgpo/gpo_util.c 				  token);
token             497 source3/libsmb/clispnego.c 	SPNEGO_DATA token;
token             500 source3/libsmb/clispnego.c 	len = read_spnego_data(talloc_tos(), blob, &token);
token             506 source3/libsmb/clispnego.c 	if (token.type != SPNEGO_NEG_TOKEN_TARG) {
token             508 source3/libsmb/clispnego.c 			token.type));
token             509 source3/libsmb/clispnego.c 		free_spnego_data(&token);
token             514 source3/libsmb/clispnego.c 				 token.negTokenTarg.responseToken.data,
token             515 source3/libsmb/clispnego.c 				 token.negTokenTarg.responseToken.length);
token             516 source3/libsmb/clispnego.c 	free_spnego_data(&token);
token              28 source3/libsmb/spnego.c static bool read_negTokenInit(TALLOC_CTX *mem_ctx, ASN1_DATA *asn1, negTokenInit_t *token)
token              30 source3/libsmb/spnego.c 	ZERO_STRUCTP(token);
token              44 source3/libsmb/spnego.c 			token->mechTypes = TALLOC_P(mem_ctx, const char *);
token              48 source3/libsmb/spnego.c 				token->mechTypes = 
token              49 source3/libsmb/spnego.c 					TALLOC_REALLOC_ARRAY(mem_ctx, token->mechTypes, const char *, i + 2);
token              50 source3/libsmb/spnego.c 				if (!token->mechTypes) {
token              55 source3/libsmb/spnego.c 				token->mechTypes[i] = p_oid;
token              57 source3/libsmb/spnego.c 			token->mechTypes[i] = NULL;
token              65 source3/libsmb/spnego.c 			asn1_read_Integer(asn1, &token->reqFlags);
token              66 source3/libsmb/spnego.c 			token->reqFlags |= SPNEGO_REQ_FLAG;
token              72 source3/libsmb/spnego.c 			asn1_read_OctetString(asn1, mem_ctx, &token->mechToken);
token              80 source3/libsmb/spnego.c 						      &token->mechListMIC);
token              91 source3/libsmb/spnego.c 				token->mechListMIC =
token             109 source3/libsmb/spnego.c static bool write_negTokenInit(ASN1_DATA *asn1, negTokenInit_t *token)
token             115 source3/libsmb/spnego.c 	if (token->mechTypes && *token->mechTypes) {
token             120 source3/libsmb/spnego.c 		for (i = 0; token->mechTypes[i]; i++) {
token             121 source3/libsmb/spnego.c 			asn1_write_OID(asn1, token->mechTypes[i]);
token             128 source3/libsmb/spnego.c 	if (token->reqFlags & SPNEGO_REQ_FLAG) {
token             129 source3/libsmb/spnego.c 		int flags = token->reqFlags & ~SPNEGO_REQ_FLAG;
token             137 source3/libsmb/spnego.c 	if (token->mechToken.data) {
token             139 source3/libsmb/spnego.c 		asn1_write_OctetString(asn1, token->mechToken.data,
token             140 source3/libsmb/spnego.c 				       token->mechToken.length);
token             145 source3/libsmb/spnego.c 	if (token->mechListMIC.data) {
token             149 source3/libsmb/spnego.c 		asn1_write_OctetString(asn1, token->mechListMIC.data,
token             150 source3/libsmb/spnego.c 				       token->mechListMIC.length);
token             157 source3/libsmb/spnego.c 		asn1_write(asn1, token->mechListMIC.data,
token             158 source3/libsmb/spnego.c 			   token->mechListMIC.length);
token             172 source3/libsmb/spnego.c static bool read_negTokenTarg(TALLOC_CTX *mem_ctx, ASN1_DATA *asn1, negTokenTarg_t *token)
token             174 source3/libsmb/spnego.c 	ZERO_STRUCTP(token);
token             184 source3/libsmb/spnego.c 			asn1_read_uint8(asn1, &token->negResult);
token             193 source3/libsmb/spnego.c 			token->supportedMech = CONST_DISCARD(char *, mech);
token             198 source3/libsmb/spnego.c 			asn1_read_OctetString(asn1, mem_ctx, &token->responseToken);
token             203 source3/libsmb/spnego.c 			asn1_read_OctetString(asn1, mem_ctx, &token->mechListMIC);
token             218 source3/libsmb/spnego.c static bool write_negTokenTarg(ASN1_DATA *asn1, negTokenTarg_t *token)
token             224 source3/libsmb/spnego.c 	asn1_write_enumerated(asn1, token->negResult);
token             227 source3/libsmb/spnego.c 	if (token->supportedMech) {
token             229 source3/libsmb/spnego.c 		asn1_write_OID(asn1, token->supportedMech);
token             233 source3/libsmb/spnego.c 	if (token->responseToken.data) {
token             235 source3/libsmb/spnego.c 		asn1_write_OctetString(asn1, token->responseToken.data,
token             236 source3/libsmb/spnego.c 				       token->responseToken.length);
token             240 source3/libsmb/spnego.c 	if (token->mechListMIC.data) {
token             242 source3/libsmb/spnego.c 		asn1_write_OctetString(asn1, token->mechListMIC.data,
token             243 source3/libsmb/spnego.c 				      token->mechListMIC.length);
token             253 source3/libsmb/spnego.c ssize_t read_spnego_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, SPNEGO_DATA *token)
token             258 source3/libsmb/spnego.c 	ZERO_STRUCTP(token);
token             271 source3/libsmb/spnego.c 		if (read_negTokenInit(mem_ctx, asn1, &token->negTokenInit)) {
token             272 source3/libsmb/spnego.c 			token->type = SPNEGO_NEG_TOKEN_INIT;
token             277 source3/libsmb/spnego.c 		if (read_negTokenTarg(mem_ctx, asn1, &token->negTokenTarg)) {
token             278 source3/libsmb/spnego.c 			token->type = SPNEGO_NEG_TOKEN_TARG;
token             269 source3/modules/vfs_recycle.c 	char *token;
token             290 source3/modules/vfs_recycle.c 	for(token = strtok_r(tok_str, "/", &saveptr); token;
token             291 source3/modules/vfs_recycle.c 	    token = strtok_r(NULL, "/", &saveptr)) {
token             292 source3/modules/vfs_recycle.c 		safe_strcat(new_dir, token, len);
token             541 source3/nmbd/nmbd_incomingdgrams.c 				      uint32 token, struct in_addr sendto_ip,
token             566 source3/nmbd/nmbd_incomingdgrams.c 	SIVAL(p,0,token); /* The sender's unique info. */
token             646 source3/nmbd/nmbd_incomingdgrams.c 	uint32 token = IVAL(buf,1); /* Sender's key index for the workgroup. */
token             706 source3/nmbd/nmbd_incomingdgrams.c 			max_number_requested, token, p->ip, p->port);
token              80 source3/nmbd/nmbd_processlogon.c 	uint16 token = 0;
token             142 source3/nmbd/nmbd_processlogon.c 				token = SVAL(q,3);
token             151 source3/nmbd/nmbd_processlogon.c 					mach_str,inet_ntoa(p->ip),user_str,token));
token             167 source3/nmbd/nmbd_processlogon.c 				SSVAL(q, 0, token);
token              75 source3/nmbd/nmbd_sendannounce.c 	SCVAL(p,0,work->token); /* (local) Unique workgroup token id. */
token              99 source3/nmbd/nmbd_workgroupdb.c 				t = w->token;
token             104 source3/nmbd/nmbd_workgroupdb.c 		work->token = ++workgroup_count;
token             106 source3/nmbd/nmbd_workgroupdb.c 		work->token = t;
token             289 source3/nmbd/nmbd_workgroupdb.c 					work->token, *work->local_master_browser_name ? work->local_master_browser_name : "UNKNOWN" ) );
token              38 source3/pam_smbpass/general.h      const char *token;
token             191 source3/pam_smbpass/support.c 	    if (smb_args[j].token
token             192 source3/pam_smbpass/support.c 	        && !strncmp(argv[i], smb_args[j].token, strlen(smb_args[j].token)))
token             222 source3/pam_smbpass/support.c             if (smb_args[j].token
token             223 source3/pam_smbpass/support.c 	        && !strncmp(*argv, smb_args[j].token, strlen(smb_args[j].token)))
token             510 source3/pam_smbpass/support.c     char *token;
token             519 source3/pam_smbpass/support.c     *pass = token = NULL;
token             584 source3/pam_smbpass/support.c             token = smbpXstrDup(pamh, resp[j++].resp);
token             585 source3/pam_smbpass/support.c             if (token != NULL) {
token             588 source3/pam_smbpass/support.c                     if (!resp[j].resp || strcmp( token, resp[j].resp )) {
token             589 source3/pam_smbpass/support.c                         _pam_delete( token );
token             619 source3/pam_smbpass/support.c         retval = pam_set_item( pamh, authtok_flag, (const void *)token );
token             620 source3/pam_smbpass/support.c         _pam_delete( token );		/* clean it up */
token             634 source3/pam_smbpass/support.c         retval = pam_set_data( pamh, data_name, (void *) token, _cleanup );
token             641 source3/pam_smbpass/support.c             _pam_delete( token );
token             645 source3/pam_smbpass/support.c         token = NULL;			/* break link to password */
token             124 source3/registry/reg_api.c 				   const struct nt_user_token *token,
token             138 source3/registry/reg_api.c 	    !(regkey->token = dup_nt_token(regkey, token)) ||
token             210 source3/registry/reg_api.c 				   token ) ) {
token             228 source3/registry/reg_api.c 		    const struct nt_user_token *token,
token             235 source3/registry/reg_api.c 	return regkey_open_onelevel(mem_ctx, NULL, hive, token, desired_access,
token             274 source3/registry/reg_api.c 					   name_component, parent->token,
token             289 source3/registry/reg_api.c 	err = regkey_open_onelevel(mem_ctx, direct_parent, path, parent->token,
token            1010 source3/registry/reg_api.c 		     uint32 desired_access, const struct nt_user_token *token,
token            1028 source3/registry/reg_api.c 		err = reg_openhive(mem_ctx, path, desired_access, token,
token            1041 source3/registry/reg_api.c 	err = reg_openhive(mem_ctx, path, KEY_ENUMERATE_SUB_KEYS, token,
token            1177 source3/registry/reg_api.c 		       const struct nt_user_token *token,
token            1196 source3/registry/reg_api.c 		err = reg_openhive(mem_ctx, path, desired_access, token,
token            1213 source3/registry/reg_api.c 			   token, &hive);
token            1230 source3/registry/reg_api.c WERROR reg_delete_path(const struct nt_user_token *token,
token            1253 source3/registry/reg_api.c 			   token, &hive);
token              60 source3/registry/reg_backend_smbconf.c 				     const struct nt_user_token *token)
token              62 source3/registry/reg_backend_smbconf.c 	if (!(user_has_privileges(token, &se_disk_operators))) {
token             159 source3/registry/reg_dispatcher.c 			  const struct nt_user_token *token )
token             170 source3/registry/reg_dispatcher.c 						  granted, token);
token             181 source3/registry/reg_dispatcher.c 	status =se_access_check(sec_desc, token, requested, granted);
token              38 source3/registry/reg_init_smbconf.c 	NT_USER_TOKEN *token = NULL;
token              44 source3/registry/reg_init_smbconf.c 	token = TALLOC_ZERO_P(mem_ctx, NT_USER_TOKEN);
token              45 source3/registry/reg_init_smbconf.c 	if (token == NULL) {
token              50 source3/registry/reg_init_smbconf.c 	token->privileges = se_disk_operators;
token              51 source3/registry/reg_init_smbconf.c 	status = add_sid_to_array(token, &global_sid_Builtin_Administrators,
token              52 source3/registry/reg_init_smbconf.c 				  &token->user_sids, &token->num_sids);
token              59 source3/registry/reg_init_smbconf.c 	*ptoken = token;
token              33 source3/registry/reg_util_legacy.c                              const struct nt_user_token *token,
token              39 source3/registry/reg_util_legacy.c 	err = reg_open_path(NULL, path, access_desired, token, &key);
token              69 source3/rpc_server/srv_eventlog_nt.c static bool elog_check_access( EVENTLOG_INFO *info, NT_USER_TOKEN *token )
token              93 source3/rpc_server/srv_eventlog_nt.c 		token = get_root_nt_token();
token              98 source3/rpc_server/srv_eventlog_nt.c 	status = se_access_check( sec_desc, token, MAXIMUM_ALLOWED_ACCESS,
token             167 source3/rpc_server/srv_samr_nt.c NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token,
token             180 source3/rpc_server/srv_samr_nt.c 			user_has_any_privilege(token, rights)) {
token             192 source3/rpc_server/srv_samr_nt.c 	status = se_access_check(psd, token, des_access, acc_granted);
token             259 source3/rpc_server/srv_samr_nt.c void map_max_allowed_access(const NT_USER_TOKEN *token,
token             278 source3/rpc_server/srv_samr_nt.c 	if (is_sid_in_token(token, &global_sid_Builtin_Administrators) ||
token             279 source3/rpc_server/srv_samr_nt.c 			is_sid_in_token(token, &global_sid_Builtin_Account_Operators)) {
token             289 source3/rpc_server/srv_samr_nt.c 		if (is_sid_in_token(token, &domadmin_sid)) {
token              80 source3/rpc_server/srv_spoolss_nt.c 	WERROR(*fn) (TALLOC_CTX *mem_ctx, NT_USER_TOKEN *token, DATA_BLOB *in, DATA_BLOB *out, uint32_t *needed);
token             264 source3/rpc_server/srv_spoolss_nt.c WERROR delete_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *sharename )
token             283 source3/rpc_server/srv_spoolss_nt.c 	if ( token )
token             284 source3/rpc_server/srv_spoolss_nt.c 		is_print_op = user_has_privileges( token, &se_printop );
token            5922 source3/rpc_server/srv_spoolss_nt.c WERROR add_port_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *portname, const char *uri )
token            5940 source3/rpc_server/srv_spoolss_nt.c 	if ( token )
token            5941 source3/rpc_server/srv_spoolss_nt.c 		is_print_op = user_has_privileges( token, &se_printop );
token            5971 source3/rpc_server/srv_spoolss_nt.c bool add_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, NT_PRINTER_INFO_LEVEL *printer)
token            6003 source3/rpc_server/srv_spoolss_nt.c 	if ( token )
token            6004 source3/rpc_server/srv_spoolss_nt.c 		is_print_op = user_has_privileges( token, &se_printop );
token            9645 source3/rpc_server/srv_spoolss_nt.c 			       NT_USER_TOKEN *token, DATA_BLOB *in,
token            9700 source3/rpc_server/srv_spoolss_nt.c 			     NT_USER_TOKEN *token, DATA_BLOB *in,
token            9779 source3/rpc_server/srv_spoolss_nt.c 	return add_port_hook(mem_ctx, token, portname, device_uri);
token            9792 source3/rpc_server/srv_spoolss_nt.c 				     NT_USER_TOKEN *token, const char *command,
token            9803 source3/rpc_server/srv_spoolss_nt.c 			return xcvtcp_cmds[i].fn(mem_ctx, token, inbuf, outbuf, needed);
token            9814 source3/rpc_server/srv_spoolss_nt.c 				 NT_USER_TOKEN *token, DATA_BLOB *in,
token            9851 source3/rpc_server/srv_spoolss_nt.c 				       NT_USER_TOKEN *token, const char *command,
token            9861 source3/rpc_server/srv_spoolss_nt.c 			return xcvlocal_cmds[i].fn(mem_ctx, token, inbuf, outbuf, needed);
token             121 source3/rpc_server/srv_svcctl_nt.c static NTSTATUS svcctl_access_check( SEC_DESC *sec_desc, NT_USER_TOKEN *token,
token             126 source3/rpc_server/srv_svcctl_nt.c 		token = get_root_nt_token();
token             129 source3/rpc_server/srv_svcctl_nt.c 	return se_access_check( sec_desc, token, access_desired, access_granted);
token             381 source3/rpc_server/srv_svcctl_nt.c static int enumerate_status( TALLOC_CTX *ctx, struct ENUM_SERVICE_STATUSW **status, NT_USER_TOKEN *token )
token             400 source3/rpc_server/srv_svcctl_nt.c 		display_name = svcctl_lookup_dispname(ctx, svcctl_ops[i].name, token );
token             424 source3/rpc_server/srv_svcctl_nt.c 	NT_USER_TOKEN *token = p->server_info->ptok;
token             436 source3/rpc_server/srv_svcctl_nt.c 	num_services = enumerate_status( p->mem_ctx, &services, token );
token             637 source3/rpc_server/srv_svcctl_nt.c 			       NT_USER_TOKEN *token )
token             644 source3/rpc_server/srv_svcctl_nt.c 	if ( !(values = svcctl_fetch_regvalues( name, token )) )
token             296 source3/rpc_server/srv_wkssvc_nt.c 	struct nt_user_token *token = p->server_info->ptok;
token             306 source3/rpc_server/srv_wkssvc_nt.c 	if (!user_has_privileges(token, &se_machine_account) &&
token             307 source3/rpc_server/srv_wkssvc_nt.c 	    !nt_token_check_domain_rid(token, DOMAIN_GROUP_RID_ADMINS) &&
token             308 source3/rpc_server/srv_wkssvc_nt.c 	    !nt_token_check_domain_rid(token, BUILTIN_ALIAS_RID_ADMINS)) {
token             371 source3/rpc_server/srv_wkssvc_nt.c 	struct nt_user_token *token = p->server_info->ptok;
token             377 source3/rpc_server/srv_wkssvc_nt.c 	if (!user_has_privileges(token, &se_machine_account) &&
token             378 source3/rpc_server/srv_wkssvc_nt.c 	    !nt_token_check_domain_rid(token, DOMAIN_GROUP_RID_ADMINS) &&
token             379 source3/rpc_server/srv_wkssvc_nt.c 	    !nt_token_check_domain_rid(token, BUILTIN_ALIAS_RID_ADMINS)) {
token             505 source3/services/services_db.c SEC_DESC *svcctl_get_secdesc( TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token )
token             520 source3/services/services_db.c 	wresult = regkey_open_internal( NULL, &key, path, token,
token             566 source3/services/services_db.c bool svcctl_set_secdesc( TALLOC_CTX *ctx, const char *name, SEC_DESC *sec_desc, NT_USER_TOKEN *token )
token             581 source3/services/services_db.c 	wresult = regkey_open_internal( NULL, &key, path, token,
token             619 source3/services/services_db.c const char *svcctl_lookup_dispname(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token )
token             633 source3/services/services_db.c 	wresult = regkey_open_internal( NULL, &key, path, token,
token             669 source3/services/services_db.c const char *svcctl_lookup_description(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token )
token             683 source3/services/services_db.c 	wresult = regkey_open_internal( NULL, &key, path, token,
token             715 source3/services/services_db.c REGVAL_CTR *svcctl_fetch_regvalues( const char *name, NT_USER_TOKEN *token )
token             727 source3/services/services_db.c 	wresult = regkey_open_internal( NULL, &key, path, token,
token             147 source3/smbd/globals.h 	NT_USER_TOKEN *token;
token              54 source3/smbd/open.c                           const NT_USER_TOKEN *token,
token              59 source3/smbd/open.c 				token,
token             212 source3/smbd/sec_ctx.c 	ctx_p->token = dup_nt_token(NULL,
token             213 source3/smbd/sec_ctx.c 				    sec_ctx_stack[sec_ctx_stack_ndx-1].token);
token             220 source3/smbd/sec_ctx.c 			TALLOC_FREE(ctx_p->token);
token             303 source3/smbd/sec_ctx.c void set_sec_ctx(uid_t uid, gid_t gid, int ngroups, gid_t *groups, NT_USER_TOKEN *token)
token             312 source3/smbd/sec_ctx.c 	debug_nt_user_token(DBGC_CLASS, 5, token);
token             321 source3/smbd/sec_ctx.c 	if (token && (token == ctx_p->token)) {
token             325 source3/smbd/sec_ctx.c 	TALLOC_FREE(ctx_p->token);
token             337 source3/smbd/sec_ctx.c 	if (token) {
token             338 source3/smbd/sec_ctx.c 		ctx_p->token = dup_nt_token(NULL, token);
token             339 source3/smbd/sec_ctx.c 		if (!ctx_p->token) {
token             343 source3/smbd/sec_ctx.c 		ctx_p->token = NULL;
token             355 source3/smbd/sec_ctx.c 	current_user.nt_user_token = ctx_p->token;
token             395 source3/smbd/sec_ctx.c 	TALLOC_FREE(ctx_p->token);
token             415 source3/smbd/sec_ctx.c 	current_user.nt_user_token = prev_ctx_p->token;
token             447 source3/smbd/sec_ctx.c 	ctx_p->token = NULL; /* Maps to guest user. */
token              69 source3/smbd/share_access.c 				const struct nt_user_token *token,
token              93 source3/smbd/share_access.c 		return nt_token_check_sid( &sid, token );
token             107 source3/smbd/share_access.c 		return nt_token_check_sid(&sid, token);
token             125 source3/smbd/share_access.c 			if (nt_token_check_sid(&sid, token)) {
token             155 source3/smbd/share_access.c 				 const struct nt_user_token *token,
token             170 source3/smbd/share_access.c 					token, *list)) {
token             195 source3/smbd/share_access.c 		   const struct nt_user_token *token, int snum)
token             200 source3/smbd/share_access.c 						token,
token             209 source3/smbd/share_access.c 						 lp_servicename(snum), token,
token             227 source3/smbd/share_access.c 						 token, list)) {
token             255 source3/smbd/share_access.c 				  const struct nt_user_token *token,
token             263 source3/smbd/share_access.c 						lp_servicename(snum), token,
token             271 source3/smbd/share_access.c 						lp_servicename(snum), token,
token              37 source3/utils/net_ads_gpo.c 	struct nt_user_token *token = NULL;
token              76 source3/utils/net_ads_gpo.c 		status = gp_get_machine_token(ads, mem_ctx, dn, &token);
token              78 source3/utils/net_ads_gpo.c 		status = ads_get_sid_token(ads, mem_ctx, dn, &token);
token              88 source3/utils/net_ads_gpo.c 	status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list);
token             108 source3/utils/net_ads_gpo.c 						 token, gpo_list);
token             152 source3/utils/net_ads_gpo.c 						&token->user_sids[0],
token             294 source3/utils/net_ads_gpo.c 	struct nt_user_token *token = NULL;
token             329 source3/utils/net_ads_gpo.c 		status = gp_get_machine_token(ads, mem_ctx, dn, &token);
token             331 source3/utils/net_ads_gpo.c 		status = ads_get_sid_token(ads, mem_ctx, dn, &token);
token             338 source3/utils/net_ads_gpo.c 	status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list);
token             364 source3/utils/net_ads_gpo.c 	struct nt_user_token *token = NULL;
token             411 source3/utils/net_ads_gpo.c 		status = gp_get_machine_token(ads, mem_ctx, dn, &token);
token             413 source3/utils/net_ads_gpo.c 		status = ads_get_sid_token(ads, mem_ctx, dn, &token);
token             420 source3/utils/net_ads_gpo.c 	status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list);
token             425 source3/utils/net_ads_gpo.c 	status = gpo_process_gpo_list(ads, mem_ctx, token, gpo_list,
token              68 source3/utils/net_afs.c 	char *token;
token              75 source3/utils/net_afs.c 	token = afs_createtoken_str(argv[0], argv[1]);
token              77 source3/utils/net_afs.c 	if (token == NULL) {
token              82 source3/utils/net_afs.c 	if (!afs_settoken_str(token)) {
token              29 source3/utils/net_proto.h bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token );
token              30 source3/utils/net_proto.h bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid );
token              33 source3/utils/net_proto.h 		     struct nt_user_token *token);
token              39 source3/utils/net_proto.h void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token);
token              42 source3/utils/net_registry.c 	NT_USER_TOKEN *token = NULL;
token              62 source3/utils/net_registry.c 	werr = ntstatus_to_werror(registry_create_admin_token(tmp_ctx, &token));
token              67 source3/utils/net_registry.c 	werr = reg_openhive(ctx, hivename, desired_access, token, hive);
token            3940 source3/utils/net_rpc.c static void init_user_token(NT_USER_TOKEN *token, DOM_SID *user_sid)
token            3942 source3/utils/net_rpc.c 	token->num_sids = 4;
token            3944 source3/utils/net_rpc.c 	if (!(token->user_sids = SMB_MALLOC_ARRAY(DOM_SID, 4))) {
token            3946 source3/utils/net_rpc.c 		token->num_sids = 0;
token            3950 source3/utils/net_rpc.c 	token->user_sids[0] = *user_sid;
token            3951 source3/utils/net_rpc.c 	sid_copy(&token->user_sids[1], &global_sid_World);
token            3952 source3/utils/net_rpc.c 	sid_copy(&token->user_sids[2], &global_sid_Network);
token            3953 source3/utils/net_rpc.c 	sid_copy(&token->user_sids[3], &global_sid_Authenticated_Users);
token            3956 source3/utils/net_rpc.c static void free_user_token(NT_USER_TOKEN *token)
token            3958 source3/utils/net_rpc.c 	SAFE_FREE(token->user_sids);
token            3961 source3/utils/net_rpc.c static void add_sid_to_token(NT_USER_TOKEN *token, DOM_SID *sid)
token            3963 source3/utils/net_rpc.c 	if (is_sid_in_token(token, sid))
token            3966 source3/utils/net_rpc.c 	token->user_sids = SMB_REALLOC_ARRAY(token->user_sids, DOM_SID, token->num_sids+1);
token            3967 source3/utils/net_rpc.c 	if (!token->user_sids) {
token            3971 source3/utils/net_rpc.c 	sid_copy(&token->user_sids[token->num_sids], sid);
token            3973 source3/utils/net_rpc.c 	token->num_sids += 1;
token            3978 source3/utils/net_rpc.c 	NT_USER_TOKEN token;
token            3981 source3/utils/net_rpc.c static void dump_user_token(struct user_token *token)
token            3985 source3/utils/net_rpc.c 	d_printf("%s\n", token->name);
token            3987 source3/utils/net_rpc.c 	for (i=0; i<token->token.num_sids; i++) {
token            3988 source3/utils/net_rpc.c 		d_printf(" %s\n", sid_string_tos(&token->token.user_sids[i]));
token            4004 source3/utils/net_rpc.c static void collect_sid_memberships(NT_USER_TOKEN *token, DOM_SID sid)
token            4010 source3/utils/net_rpc.c 			add_sid_to_token(token, &server_aliases[i].sid);
token            4021 source3/utils/net_rpc.c static void collect_alias_memberships(NT_USER_TOKEN *token)
token            4023 source3/utils/net_rpc.c 	int num_global_sids = token->num_sids;
token            4027 source3/utils/net_rpc.c 		collect_sid_memberships(token, token->user_sids[i]);
token            4031 source3/utils/net_rpc.c static bool get_user_sids(const char *domain, const char *user, NT_USER_TOKEN *token)
token            4075 source3/utils/net_rpc.c 	init_user_token(token, &user_sid);
token            4110 source3/utils/net_rpc.c 		add_sid_to_token(token, &sid);
token            4175 source3/utils/net_rpc.c 		get_user_sids(domain, user, &(result[i].token));
token            4191 source3/utils/net_rpc.c 	struct user_token *token = NULL;
token            4213 source3/utils/net_rpc.c 			if (token == NULL) {
token            4218 source3/utils/net_rpc.c 			add_sid_to_token(&token->token, &sid);
token            4231 source3/utils/net_rpc.c 		token = &((*tokens)[*num_tokens-1]);
token            4233 source3/utils/net_rpc.c 		fstrcpy(token->name, line);
token            4234 source3/utils/net_rpc.c 		token->token.num_sids = 0;
token            4235 source3/utils/net_rpc.c 		token->token.user_sids = NULL;
token            4298 source3/utils/net_rpc.c 			status = se_access_check(share_sd, &tokens[i].token,
token            4314 source3/utils/net_rpc.c 		status = se_access_check(root_sd, &tokens[i].token,
token            4411 source3/utils/net_rpc.c 		collect_alias_memberships(&tokens[i].token);
token            4437 source3/utils/net_rpc.c 		free_user_token(&tokens[i].token);
token            4492 source3/utils/net_rpc.c 		free_user_token(&tokens[i].token);
token            1061 source3/utils/ntlm_auth.c 	DATA_BLOB token;
token            1098 source3/utils/ntlm_auth.c 	len = write_spnego_data(&token, &spnego);
token            1107 source3/utils/ntlm_auth.c 	reply_base64 = base64_encode_data_blob(talloc_tos(), token);
token            1111 source3/utils/ntlm_auth.c 	data_blob_free(&token);
token            1121 source3/utils/ntlm_auth.c 	DATA_BLOB token;
token            1167 source3/utils/ntlm_auth.c 	token = base64_decode_data_blob(buf + 3);
token            1168 source3/utils/ntlm_auth.c 	len = read_spnego_data(talloc_tos(), token, &request);
token            1169 source3/utils/ntlm_auth.c 	data_blob_free(&token);
token            1342 source3/utils/ntlm_auth.c 	len = write_spnego_data(&token, &response);
token            1351 source3/utils/ntlm_auth.c 	reply_base64 = base64_encode_data_blob(talloc_tos(), token);
token            1357 source3/utils/ntlm_auth.c 	data_blob_free(&token);
token             271 source3/winbindd/winbindd_pam.c 	struct nt_user_token *token;
token             282 source3/winbindd/winbindd_pam.c 	if (!(token = TALLOC_ZERO_P(mem_ctx, struct nt_user_token))) {
token             314 source3/winbindd/winbindd_pam.c 				      &token->user_sids,
token             315 source3/winbindd/winbindd_pam.c 				      &token->num_sids,
token             322 source3/winbindd/winbindd_pam.c 						  token))
token             324 source3/winbindd/winbindd_pam.c 						     token))) {
token             330 source3/winbindd/winbindd_pam.c 	debug_nt_user_token(DBGC_CLASS, 10, token);
token             336 source3/winbindd/winbindd_pam.c 				       token)) {
token              29 source3/winbindd/winbindd_proto.h bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token );
token              30 source3/winbindd/winbindd_proto.h bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid );
token              33 source3/winbindd/winbindd_proto.h 		     struct nt_user_token *token);
token              39 source3/winbindd/winbindd_proto.h void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token);
token              29 source4/auth/gensec/spnego_parse.c 			      struct spnego_negTokenInit *token)
token              31 source4/auth/gensec/spnego_parse.c 	ZERO_STRUCTP(token);
token              50 source4/auth/gensec/spnego_parse.c 			token->mechTypes = talloc(NULL, const char *);
token              53 source4/auth/gensec/spnego_parse.c 				token->mechTypes = talloc_realloc(NULL, 
token              54 source4/auth/gensec/spnego_parse.c 								  token->mechTypes, 
token              56 source4/auth/gensec/spnego_parse.c 				asn1_read_OID(asn1, token->mechTypes, token->mechTypes + i);
token              58 source4/auth/gensec/spnego_parse.c 			token->mechTypes[i] = NULL;
token              66 source4/auth/gensec/spnego_parse.c 			asn1_read_Integer(asn1, &token->reqFlags);
token              67 source4/auth/gensec/spnego_parse.c 			token->reqFlags |= SPNEGO_REQ_FLAG;
token              73 source4/auth/gensec/spnego_parse.c 			asn1_read_OctetString(asn1, mem_ctx, &token->mechToken);
token              87 source4/auth/gensec/spnego_parse.c 						      &token->mechListMIC);
token              98 source4/auth/gensec/spnego_parse.c 				token->targetPrincipal = mechListMIC;
token             115 source4/auth/gensec/spnego_parse.c static bool write_negTokenInit(struct asn1_data *asn1, struct spnego_negTokenInit *token)
token             121 source4/auth/gensec/spnego_parse.c 	if (token->mechTypes && *token->mechTypes) {
token             126 source4/auth/gensec/spnego_parse.c 		for (i = 0; token->mechTypes[i]; i++) {
token             127 source4/auth/gensec/spnego_parse.c 			asn1_write_OID(asn1, token->mechTypes[i]);
token             134 source4/auth/gensec/spnego_parse.c 	if (token->reqFlags & SPNEGO_REQ_FLAG) {
token             135 source4/auth/gensec/spnego_parse.c 		int flags = token->reqFlags & ~SPNEGO_REQ_FLAG;
token             143 source4/auth/gensec/spnego_parse.c 	if (token->mechToken.data) {
token             145 source4/auth/gensec/spnego_parse.c 		asn1_write_OctetString(asn1, token->mechToken.data,
token             146 source4/auth/gensec/spnego_parse.c 				       token->mechToken.length);
token             151 source4/auth/gensec/spnego_parse.c 	if (token->mechListMIC.data) {
token             155 source4/auth/gensec/spnego_parse.c 		asn1_write_OctetString(asn1, token->mechListMIC.data,
token             156 source4/auth/gensec/spnego_parse.c 				       token->mechListMIC.length);
token             163 source4/auth/gensec/spnego_parse.c 		asn1_write(asn1, token->mechListMIC.data,
token             164 source4/auth/gensec/spnego_parse.c 			   token->mechListMIC.length);
token             179 source4/auth/gensec/spnego_parse.c 			      struct spnego_negTokenTarg *token)
token             181 source4/auth/gensec/spnego_parse.c 	ZERO_STRUCTP(token);
token             197 source4/auth/gensec/spnego_parse.c 			asn1_read_uint8(asn1, &token->negResult);
token             203 source4/auth/gensec/spnego_parse.c 			asn1_read_OID(asn1, mem_ctx, &token->supportedMech);
token             208 source4/auth/gensec/spnego_parse.c 			asn1_read_OctetString(asn1, mem_ctx, &token->responseToken);
token             213 source4/auth/gensec/spnego_parse.c 			asn1_read_OctetString(asn1, mem_ctx, &token->mechListMIC);
token             228 source4/auth/gensec/spnego_parse.c static bool write_negTokenTarg(struct asn1_data *asn1, struct spnego_negTokenTarg *token)
token             233 source4/auth/gensec/spnego_parse.c 	if (token->negResult != SPNEGO_NONE_RESULT) {
token             235 source4/auth/gensec/spnego_parse.c 		asn1_write_enumerated(asn1, token->negResult);
token             239 source4/auth/gensec/spnego_parse.c 	if (token->supportedMech) {
token             241 source4/auth/gensec/spnego_parse.c 		asn1_write_OID(asn1, token->supportedMech);
token             245 source4/auth/gensec/spnego_parse.c 	if (token->responseToken.data) {
token             247 source4/auth/gensec/spnego_parse.c 		asn1_write_OctetString(asn1, token->responseToken.data,
token             248 source4/auth/gensec/spnego_parse.c 				       token->responseToken.length);
token             252 source4/auth/gensec/spnego_parse.c 	if (token->mechListMIC.data) {
token             254 source4/auth/gensec/spnego_parse.c 		asn1_write_OctetString(asn1, token->mechListMIC.data,
token             255 source4/auth/gensec/spnego_parse.c 				      token->mechListMIC.length);
token             265 source4/auth/gensec/spnego_parse.c ssize_t spnego_read_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, struct spnego_data *token)
token             271 source4/auth/gensec/spnego_parse.c 	ZERO_STRUCTP(token);
token             291 source4/auth/gensec/spnego_parse.c 			if (read_negTokenInit(asn1, mem_ctx, &token->negTokenInit)) {
token             292 source4/auth/gensec/spnego_parse.c 				token->type = SPNEGO_NEG_TOKEN_INIT;
token             297 source4/auth/gensec/spnego_parse.c 			if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) {
token             298 source4/auth/gensec/spnego_parse.c 				token->type = SPNEGO_NEG_TOKEN_TARG;
token              44 source4/auth/system_session.c 			       struct security_token **token)
token              94 source4/auth/system_session.c 	*token = ptoken;
token             113 source4/auth/system_session.c 	*token = NULL;
token             233 source4/dsdb/samdb/samdb.c 			       struct security_token **token)
token             293 source4/dsdb/samdb/samdb.c 	*token = ptoken;
token              34 source4/dsdb/samdb/samdb_privilege.c 					  struct security_token *token,
token              66 source4/dsdb/samdb/samdb_privilege.c 		security_token_set_privilege(token, privilege);
token              77 source4/dsdb/samdb/samdb_privilege.c 			       struct loadparm_context *lp_ctx, struct security_token *token)
token              85 source4/dsdb/samdb/samdb_privilege.c 	if (token->user_sid == NULL) {
token              86 source4/dsdb/samdb/samdb_privilege.c 		token->privilege_mask = 0;
token              90 source4/dsdb/samdb/samdb_privilege.c 	if (security_token_is_system(token)) {
token              91 source4/dsdb/samdb/samdb_privilege.c 		token->privilege_mask = ~0;
token              95 source4/dsdb/samdb/samdb_privilege.c 	if (security_token_is_anonymous(token)) {
token              96 source4/dsdb/samdb/samdb_privilege.c 		token->privilege_mask = 0;
token             100 source4/dsdb/samdb/samdb_privilege.c 	mem_ctx = talloc_new(token);
token             107 source4/dsdb/samdb/samdb_privilege.c 	token->privilege_mask = 0;
token             109 source4/dsdb/samdb/samdb_privilege.c 	for (i=0;i<token->num_sids;i++) {
token             111 source4/dsdb/samdb/samdb_privilege.c 						   token, token->sids[i]);
token             251 source4/heimdal/lib/gssapi/krb5/cfx.c     gss_cfx_wrap_token token;
token             277 source4/heimdal/lib/gssapi/krb5/cfx.c     rrc = (conf_req_flag ? sizeof(*token) : 0) + (uint16_t)cksumsize;
token             288 source4/heimdal/lib/gssapi/krb5/cfx.c     token = (gss_cfx_wrap_token)p;
token             289 source4/heimdal/lib/gssapi/krb5/cfx.c     token->TOK_ID[0] = 0x05;
token             290 source4/heimdal/lib/gssapi/krb5/cfx.c     token->TOK_ID[1] = 0x04;
token             291 source4/heimdal/lib/gssapi/krb5/cfx.c     token->Flags     = 0;
token             292 source4/heimdal/lib/gssapi/krb5/cfx.c     token->Filler    = 0xFF;
token             294 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->Flags |= CFXSentByAcceptor;
token             296 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->Flags |= CFXAcceptorSubkey;
token             302 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->Flags |= CFXSealed;
token             303 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->EC[0] = (padlength >> 8) & 0xFF;
token             304 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->EC[1] = (padlength >> 0) & 0xFF;
token             315 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->EC[0] = 0;
token             316 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->EC[1] = 0;
token             329 source4/heimdal/lib/gssapi/krb5/cfx.c     token->RRC[0] = 0;
token             330 source4/heimdal/lib/gssapi/krb5/cfx.c     token->RRC[1] = 0;
token             336 source4/heimdal/lib/gssapi/krb5/cfx.c     _gsskrb5_encode_be_om_uint32(0,          &token->SND_SEQ[0]);
token             337 source4/heimdal/lib/gssapi/krb5/cfx.c     _gsskrb5_encode_be_om_uint32(seq_number, &token->SND_SEQ[4]);
token             367 source4/heimdal/lib/gssapi/krb5/cfx.c 	p += sizeof(*token);
token             371 source4/heimdal/lib/gssapi/krb5/cfx.c 	       token, sizeof(*token));
token             376 source4/heimdal/lib/gssapi/krb5/cfx.c 				sizeof(*token),
token             384 source4/heimdal/lib/gssapi/krb5/cfx.c 	assert(sizeof(*token) + cipher.length == wrapped_len);
token             385 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->RRC[0] = (rrc >> 8) & 0xFF;
token             386 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->RRC[1] = (rrc >> 0) & 0xFF;
token             409 source4/heimdal/lib/gssapi/krb5/cfx.c 	buf = malloc(input_message_buffer->length + sizeof(*token));
token             417 source4/heimdal/lib/gssapi/krb5/cfx.c 	memcpy(buf + input_message_buffer->length, token, sizeof(*token));
token             422 source4/heimdal/lib/gssapi/krb5/cfx.c 					sizeof(*token),
token             435 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->EC[0] =  (cksum.checksum.length >> 8) & 0xFF;
token             436 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->EC[1] =  (cksum.checksum.length >> 0) & 0xFF;
token             437 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->RRC[0] = (rrc >> 8) & 0xFF;
token             438 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->RRC[1] = (rrc >> 0) & 0xFF;
token             440 source4/heimdal/lib/gssapi/krb5/cfx.c 	p += sizeof(*token);
token             477 source4/heimdal/lib/gssapi/krb5/cfx.c     gss_cfx_wrap_token token;
token             489 source4/heimdal/lib/gssapi/krb5/cfx.c     if (input_message_buffer->length < sizeof(*token)) {
token             495 source4/heimdal/lib/gssapi/krb5/cfx.c     token = (gss_cfx_wrap_token)p;
token             497 source4/heimdal/lib/gssapi/krb5/cfx.c     if (token->TOK_ID[0] != 0x05 || token->TOK_ID[1] != 0x04) {
token             502 source4/heimdal/lib/gssapi/krb5/cfx.c     token_flags = token->Flags &
token             518 source4/heimdal/lib/gssapi/krb5/cfx.c     if (token->Filler != 0xFF) {
token             526 source4/heimdal/lib/gssapi/krb5/cfx.c     ec  = (token->EC[0]  << 8) | token->EC[1];
token             527 source4/heimdal/lib/gssapi/krb5/cfx.c     rrc = (token->RRC[0] << 8) | token->RRC[1];
token             532 source4/heimdal/lib/gssapi/krb5/cfx.c     _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[0], &seq_number_hi);
token             533 source4/heimdal/lib/gssapi/krb5/cfx.c     _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[4], &seq_number_lo);
token             565 source4/heimdal/lib/gssapi/krb5/cfx.c     p += sizeof(*token);
token             593 source4/heimdal/lib/gssapi/krb5/cfx.c 	if (data.length < ec + sizeof(*token)) {
token             599 source4/heimdal/lib/gssapi/krb5/cfx.c 	p += data.length - sizeof(*token);
token             602 source4/heimdal/lib/gssapi/krb5/cfx.c 	((gss_cfx_wrap_token)p)->RRC[0] = token->RRC[0];
token             603 source4/heimdal/lib/gssapi/krb5/cfx.c 	((gss_cfx_wrap_token)p)->RRC[1] = token->RRC[1];
token             606 source4/heimdal/lib/gssapi/krb5/cfx.c 	if (memcmp(p, token, sizeof(*token)) != 0) {
token             613 source4/heimdal/lib/gssapi/krb5/cfx.c 	output_message_buffer->length = data.length - ec - sizeof(*token);
token             647 source4/heimdal/lib/gssapi/krb5/cfx.c 	output_message_buffer->value = malloc(len + sizeof(*token));
token             657 source4/heimdal/lib/gssapi/krb5/cfx.c 	       token, sizeof(*token));
token             660 source4/heimdal/lib/gssapi/krb5/cfx.c 	token = (gss_cfx_wrap_token)((u_char *)output_message_buffer->value +
token             662 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->EC[0]  = 0;
token             663 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->EC[1]  = 0;
token             664 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->RRC[0] = 0;
token             665 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->RRC[1] = 0;
token             670 source4/heimdal/lib/gssapi/krb5/cfx.c 				   len + sizeof(*token),
token             699 source4/heimdal/lib/gssapi/krb5/cfx.c     gss_cfx_mic_token token;
token             713 source4/heimdal/lib/gssapi/krb5/cfx.c     len = message_buffer->length + sizeof(*token);
token             723 source4/heimdal/lib/gssapi/krb5/cfx.c     token = (gss_cfx_mic_token)(buf + message_buffer->length);
token             724 source4/heimdal/lib/gssapi/krb5/cfx.c     token->TOK_ID[0] = 0x04;
token             725 source4/heimdal/lib/gssapi/krb5/cfx.c     token->TOK_ID[1] = 0x04;
token             726 source4/heimdal/lib/gssapi/krb5/cfx.c     token->Flags = 0;
token             728 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->Flags |= CFXSentByAcceptor;
token             730 source4/heimdal/lib/gssapi/krb5/cfx.c 	token->Flags |= CFXAcceptorSubkey;
token             731 source4/heimdal/lib/gssapi/krb5/cfx.c     memset(token->Filler, 0xFF, 5);
token             737 source4/heimdal/lib/gssapi/krb5/cfx.c     _gsskrb5_encode_be_om_uint32(0,          &token->SND_SEQ[0]);
token             738 source4/heimdal/lib/gssapi/krb5/cfx.c     _gsskrb5_encode_be_om_uint32(seq_number, &token->SND_SEQ[4]);
token             761 source4/heimdal/lib/gssapi/krb5/cfx.c     message_token->length = sizeof(*token) + cksum.checksum.length;
token             771 source4/heimdal/lib/gssapi/krb5/cfx.c     memcpy(message_token->value, token, sizeof(*token));
token             772 source4/heimdal/lib/gssapi/krb5/cfx.c     memcpy((u_char *)message_token->value + sizeof(*token),
token             791 source4/heimdal/lib/gssapi/krb5/cfx.c     gss_cfx_mic_token token;
token             801 source4/heimdal/lib/gssapi/krb5/cfx.c     if (token_buffer->length < sizeof(*token)) {
token             807 source4/heimdal/lib/gssapi/krb5/cfx.c     token = (gss_cfx_mic_token)p;
token             809 source4/heimdal/lib/gssapi/krb5/cfx.c     if (token->TOK_ID[0] != 0x04 || token->TOK_ID[1] != 0x04) {
token             814 source4/heimdal/lib/gssapi/krb5/cfx.c     token_flags = token->Flags & (CFXSentByAcceptor | CFXAcceptorSubkey);
token             828 source4/heimdal/lib/gssapi/krb5/cfx.c     if (memcmp(token->Filler, "\xff\xff\xff\xff\xff", 5) != 0) {
token             835 source4/heimdal/lib/gssapi/krb5/cfx.c     _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[0], &seq_number_hi);
token             836 source4/heimdal/lib/gssapi/krb5/cfx.c     _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[4], &seq_number_lo);
token             868 source4/heimdal/lib/gssapi/krb5/cfx.c     cksum.checksum.data = p + sizeof(*token);
token             869 source4/heimdal/lib/gssapi/krb5/cfx.c     cksum.checksum.length = token_buffer->length - sizeof(*token);
token             877 source4/heimdal/lib/gssapi/krb5/cfx.c     buf = malloc(message_buffer->length + sizeof(*token));
token             884 source4/heimdal/lib/gssapi/krb5/cfx.c     memcpy(buf + message_buffer->length, token, sizeof(*token));
token             889 source4/heimdal/lib/gssapi/krb5/cfx.c 			       sizeof(*token) + message_buffer->length,
token              53 source4/heimdal/lib/hx509/ks_p11.c     CK_BBOOL token;
token              96 source4/heimdal/lib/roken/base64.c token_decode(const char *token)
token             101 source4/heimdal/lib/roken/base64.c     if (strlen(token) < 4)
token             105 source4/heimdal/lib/roken/base64.c 	if (token[i] == '=')
token             110 source4/heimdal/lib/roken/base64.c 	    val += pos(token[i]);
token             113 source4/lib/socket/interface.c 				const char *token, 
token             128 source4/lib/socket/interface.c 		if (gen_fnmatch(token, probed_ifaces[i].name) == 0) {
token             138 source4/lib/socket/interface.c 	p = strchr_m(token,'/');
token             141 source4/lib/socket/interface.c 		if (strpbrk(token, "*?") != NULL) {
token             144 source4/lib/socket/interface.c 		ip.s_addr = interpret_addr2(token).s_addr;
token             153 source4/lib/socket/interface.c 		DEBUG(2,("can't determine netmask for %s\n", token));
token             157 source4/lib/socket/interface.c 	address = talloc_strdup(mem_ctx, token);
token              30 source4/libcli/security/access_check.c 					 const struct security_token *token)
token              35 source4/libcli/security/access_check.c 	if (security_token_has_sid(token, sd->owner_sid)) {
token              37 source4/libcli/security/access_check.c 	} else if (security_token_has_privilege(token, SEC_PRIV_RESTORE)) {
token              52 source4/libcli/security/access_check.c 		if (!security_token_has_sid(token, &ace->trustee)) {
token              76 source4/libcli/security/access_check.c 			  const struct security_token *token,
token              88 source4/libcli/security/access_check.c 		access_desired |= access_check_max_allowed(sd, token);
token              95 source4/libcli/security/access_check.c 		if (security_token_has_privilege(token, SEC_PRIV_SECURITY)) {
token             110 source4/libcli/security/access_check.c 	    security_token_has_sid(token, sd->owner_sid)) {
token             114 source4/libcli/security/access_check.c 	    security_token_has_privilege(token, SEC_PRIV_RESTORE)) {
token             130 source4/libcli/security/access_check.c 		if (!security_token_has_sid(token, &ace->trustee)) {
token             197 source4/libcli/security/privilege.c bool security_token_has_privilege(const struct security_token *token, enum sec_privilege privilege)
token             206 source4/libcli/security/privilege.c 	if (token->privilege_mask & mask) {
token             215 source4/libcli/security/privilege.c void security_token_set_privilege(struct security_token *token, enum sec_privilege privilege)
token             220 source4/libcli/security/privilege.c 	token->privilege_mask |= sec_privilege_mask(privilege);
token             223 source4/libcli/security/privilege.c void security_token_debug_privileges(int dbg_lev, const struct security_token *token)
token             226 source4/libcli/security/privilege.c 			    (unsigned long long) token->privilege_mask));
token             228 source4/libcli/security/privilege.c 	if (token->privilege_mask) {
token             235 source4/libcli/security/privilege.c 			if (token->privilege_mask & mask) {
token              51 source4/libcli/security/security_token.c void security_token_debug(int dbg_lev, const struct security_token *token)
token              56 source4/libcli/security/security_token.c 	if (!token) {
token              67 source4/libcli/security/security_token.c 				    dom_sid_string(mem_ctx, token->user_sid) ));
token              69 source4/libcli/security/security_token.c 				       (unsigned long)token->num_sids));
token              70 source4/libcli/security/security_token.c 	for (i = 0; i < token->num_sids; i++) {
token              72 source4/libcli/security/security_token.c 			   dom_sid_string(mem_ctx, token->sids[i])));
token              75 source4/libcli/security/security_token.c 	security_token_debug_privileges(dbg_lev, token);
token              82 source4/libcli/security/security_token.c bool security_token_is_sid(const struct security_token *token, const struct dom_sid *sid)
token              84 source4/libcli/security/security_token.c 	if (dom_sid_equal(token->user_sid, sid)) {
token              90 source4/libcli/security/security_token.c bool security_token_is_sid_string(const struct security_token *token, const char *sid_string)
token              96 source4/libcli/security/security_token.c 	ret = security_token_is_sid(token, sid);
token             102 source4/libcli/security/security_token.c bool security_token_is_system(const struct security_token *token) 
token             104 source4/libcli/security/security_token.c 	return security_token_is_sid_string(token, SID_NT_SYSTEM);
token             107 source4/libcli/security/security_token.c bool security_token_is_anonymous(const struct security_token *token) 
token             109 source4/libcli/security/security_token.c 	return security_token_is_sid_string(token, SID_NT_ANONYMOUS);
token             112 source4/libcli/security/security_token.c bool security_token_has_sid(const struct security_token *token, const struct dom_sid *sid)
token             115 source4/libcli/security/security_token.c 	for (i = 0; i < token->num_sids; i++) {
token             116 source4/libcli/security/security_token.c 		if (dom_sid_equal(token->sids[i], sid)) {
token             123 source4/libcli/security/security_token.c bool security_token_has_sid_string(const struct security_token *token, const char *sid_string)
token             129 source4/libcli/security/security_token.c 	ret = security_token_has_sid(token, sid);
token             135 source4/libcli/security/security_token.c bool security_token_has_builtin_administrators(const struct security_token *token)
token             137 source4/libcli/security/security_token.c 	return security_token_has_sid_string(token, SID_BUILTIN_ADMINISTRATORS);
token             140 source4/libcli/security/security_token.c bool security_token_has_nt_authenticated_users(const struct security_token *token)
token             142 source4/libcli/security/security_token.c 	return security_token_has_sid_string(token, SID_NT_AUTHENTICATED_USERS);
token             235 source4/librpc/ndr/py_security.c 	struct security_token *token = py_talloc_get_ptr(self);
token             241 source4/librpc/ndr/py_security.c 	return PyBool_FromLong(security_token_is_sid(token, sid));
token             248 source4/librpc/ndr/py_security.c 	struct security_token *token = py_talloc_get_ptr(self);
token             254 source4/librpc/ndr/py_security.c 	return PyBool_FromLong(security_token_has_sid(token, sid));
token             259 source4/librpc/ndr/py_security.c 	struct security_token *token = py_talloc_get_ptr(self);
token             261 source4/librpc/ndr/py_security.c 	return PyBool_FromLong(security_token_is_anonymous(token));
token             266 source4/librpc/ndr/py_security.c 	struct security_token *token = py_talloc_get_ptr(self);
token             268 source4/librpc/ndr/py_security.c 	return PyBool_FromLong(security_token_is_system(token));
token             273 source4/librpc/ndr/py_security.c 	struct security_token *token = py_talloc_get_ptr(self);
token             275 source4/librpc/ndr/py_security.c 	return PyBool_FromLong(security_token_has_builtin_administrators(token));
token             280 source4/librpc/ndr/py_security.c 	struct security_token *token = py_talloc_get_ptr(self);
token             282 source4/librpc/ndr/py_security.c 	return PyBool_FromLong(security_token_has_nt_authenticated_users(token));
token             288 source4/librpc/ndr/py_security.c 	struct security_token *token = py_talloc_get_ptr(self);
token             293 source4/librpc/ndr/py_security.c 	return PyBool_FromLong(security_token_has_privilege(token, priv));
token             299 source4/librpc/ndr/py_security.c 	struct security_token *token = py_talloc_get_ptr(self);
token             304 source4/librpc/ndr/py_security.c 	security_token_set_privilege(token, priv);
token             509 source4/ntvfs/posix/pvfs_acl.c 	struct security_token *token = req->session_info->security_token;
token             553 source4/ntvfs/posix/pvfs_acl.c 	status = sec_access_check(sd, token, *access_mask, access_mask);
token              99 source4/ntvfs/unixuid/vfs_unixuid.c 					  struct security_token *token,
token             110 source4/ntvfs/unixuid/vfs_unixuid.c 	if (token->num_sids < 2) {
token             114 source4/ntvfs/unixuid/vfs_unixuid.c 	ids = talloc_array(req, struct id_mapping, token->num_sids);
token             118 source4/ntvfs/unixuid/vfs_unixuid.c 	ids[0].sid = token->user_sid;
token             122 source4/ntvfs/unixuid/vfs_unixuid.c 	ids[1].sid = token->group_sid;
token             125 source4/ntvfs/unixuid/vfs_unixuid.c 	(*sec)->ngroups = token->num_sids - 2;
token             131 source4/ntvfs/unixuid/vfs_unixuid.c 		ids[i+2].sid = token->sids[i+2];
token             135 source4/ntvfs/unixuid/vfs_unixuid.c 	ctx = wbc_sids_to_xids_send(priv->wbc_ctx, ids, token->num_sids, ids);
token             174 source4/ntvfs/unixuid/vfs_unixuid.c 	struct security_token *token;
token             182 source4/ntvfs/unixuid/vfs_unixuid.c 	token = req->session_info->security_token;
token             189 source4/ntvfs/unixuid/vfs_unixuid.c 	if (token == priv->last_token) {
token             192 source4/ntvfs/unixuid/vfs_unixuid.c 		status = nt_token_to_unix_security(ntvfs, req, token, &newsec);
token             201 source4/ntvfs/unixuid/vfs_unixuid.c 		priv->last_token = token;
token             609 source4/utils/ntlm_auth.c 			struct security_token *token = session_info->security_token; 
token             611 source4/utils/ntlm_auth.c 							    token->sids[i]);
token             141 source4/utils/oLschema2ldif.c 	struct schema_token *token;
token             144 source4/utils/oLschema2ldif.c 	token = talloc(ctx, struct schema_token);
token             147 source4/utils/oLschema2ldif.c 	type = talloc_strndup(token, c, n);
token             153 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_NAME;
token             165 source4/utils/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             171 source4/utils/oLschema2ldif.c 		return token;
token             175 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_SUP;
token             180 source4/utils/oLschema2ldif.c 			token->value = talloc_strndup(ctx, c, n);
token             184 source4/utils/oLschema2ldif.c 			token->value = get_def_value(ctx, &c);
token             189 source4/utils/oLschema2ldif.c 		return token;
token             194 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_STRUCTURAL;
token             196 source4/utils/oLschema2ldif.c 		return token;
token             201 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_ABSTRACT;
token             203 source4/utils/oLschema2ldif.c 		return token;
token             208 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_AUXILIARY;
token             210 source4/utils/oLschema2ldif.c 		return token;
token             215 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_MUST;
token             220 source4/utils/oLschema2ldif.c 			token->value = talloc_strndup(ctx, c, n);
token             224 source4/utils/oLschema2ldif.c 			token->value = get_def_value(ctx, &c);
token             229 source4/utils/oLschema2ldif.c 		return token;
token             234 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_MAY;
token             239 source4/utils/oLschema2ldif.c 			token->value = talloc_strndup(ctx, c, n);
token             243 source4/utils/oLschema2ldif.c 			token->value = get_def_value(ctx, &c);
token             248 source4/utils/oLschema2ldif.c 		return token;
token             253 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_SINGLE_VALUE;
token             255 source4/utils/oLschema2ldif.c 		return token;
token             260 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_EQUALITY;
token             262 source4/utils/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             266 source4/utils/oLschema2ldif.c 		return token;
token             271 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_ORDERING;
token             273 source4/utils/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             277 source4/utils/oLschema2ldif.c 		return token;
token             282 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_SUBSTR;
token             284 source4/utils/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             288 source4/utils/oLschema2ldif.c 		return token;
token             293 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_SYNTAX;
token             295 source4/utils/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             299 source4/utils/oLschema2ldif.c 		return token;
token             304 source4/utils/oLschema2ldif.c 		token->type = SCHEMA_DESC;
token             306 source4/utils/oLschema2ldif.c 		token->value = get_def_value(ctx, &c);
token             310 source4/utils/oLschema2ldif.c 		return token;
token             313 source4/utils/oLschema2ldif.c 	token->type = SCHEMA_UNKNOWN;
token             314 source4/utils/oLschema2ldif.c 	token->value = type;
token             317 source4/utils/oLschema2ldif.c 		return token;
token             328 source4/utils/oLschema2ldif.c 	return token;
token             335 source4/utils/oLschema2ldif.c 	struct schema_token *token;
token             382 source4/utils/oLschema2ldif.c 		token = get_next_schema_token(msg, &c);
token             383 source4/utils/oLschema2ldif.c 		if (!token) goto failed;
token             385 source4/utils/oLschema2ldif.c 		switch (token->type) {
token             387 source4/utils/oLschema2ldif.c 			MSG_ADD_STRING("cn", token->value);
token             388 source4/utils/oLschema2ldif.c 			MSG_ADD_STRING("name", token->value);
token             389 source4/utils/oLschema2ldif.c 			MSG_ADD_STRING("lDAPDisplayName", token->value);
token             391 source4/utils/oLschema2ldif.c 			ldb_dn_add_child_fmt(msg->dn, "CN=%s,CN=Schema,CN=Configuration", token->value);
token             395 source4/utils/oLschema2ldif.c 			MSG_ADD_M_STRING("subClassOf", token->value);
token             411 source4/utils/oLschema2ldif.c 			MSG_ADD_M_STRING("mustContain", token->value);
token             415 source4/utils/oLschema2ldif.c 			MSG_ADD_M_STRING("mayContain", token->value);
token             437 source4/utils/oLschema2ldif.c 				find_syntax_map_by_standard_oid(token->value);
token             445 source4/utils/oLschema2ldif.c 			MSG_ADD_STRING("description", token->value);
token             449 source4/utils/oLschema2ldif.c 			fprintf(stderr, "Unknown Definition: %s\n", token->value);