psd               320 examples/VFS/skel_opaque.c 	uint32 security_info_sent, const SEC_DESC *psd)
psd               307 examples/VFS/skel_transparent.c 	uint32 security_info_sent, const SEC_DESC *psd)
psd               309 examples/VFS/skel_transparent.c 	return SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd);
psd               682 source3/include/proto.h NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size);
psd               684 source3/include/proto.h NTSTATUS sec_desc_del_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, size_t *sd_size);
psd               717 source3/include/proto.h bool set_share_security(const char *share_name, SEC_DESC *psd);
psd              1274 source3/include/proto.h NTSTATUS samr_make_sam_obj_sd(TALLOC_CTX *ctx, SEC_DESC **psd, size_t *sd_size);
psd              6747 source3/include/proto.h NTSTATUS unpack_nt_owners(int snum, uid_t *puser, gid_t *pgrp, uint32 security_info_sent, const SEC_DESC *psd);
psd              6757 source3/include/proto.h NTSTATUS set_nt_acl(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd);
psd              7282 source3/include/proto.h NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token,
psd               442 source3/include/vfs.h 					const struct security_descriptor *psd);
psd               100 source3/include/vfs_macros.h #define SMB_VFS_FSET_NT_ACL(fsp, security_info_sent, psd) ((fsp)->conn->vfs.ops.fset_nt_acl((fsp)->conn->vfs.handles.fset_nt_acl, (fsp), (security_info_sent), (psd)))
psd               234 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_FSET_NT_ACL(fsp, security_info_sent, psd) ((fsp)->conn->vfs_opaque.ops.fset_nt_acl((fsp)->conn->vfs_opaque.handles.fset_nt_acl, (fsp), (security_info_sent), (psd)))
psd               369 source3/include/vfs_macros.h #define SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd) ((handle)->vfs_next.ops.fset_nt_acl((handle)->vfs_next.handles.fset_nt_acl, (fsp), (security_info_sent), (psd)))
psd               139 source3/lib/secdesc.c 	SEC_DESC *psd = NULL;
psd               171 source3/lib/secdesc.c 	psd = make_sec_desc(ctx, new_sdb->sd->revision, secdesc_type,
psd               174 source3/lib/secdesc.c 	return_sdb = make_sec_desc_buf(ctx, secdesc_size, psd);
psd               441 source3/lib/secdesc.c NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size)
psd               448 source3/lib/secdesc.c 	if (!ctx || !psd || !sid || !sd_size)
psd               453 source3/lib/secdesc.c 	status = sec_ace_add_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid, mask);
psd               458 source3/lib/secdesc.c 	if (!(dacl = make_sec_acl(ctx, psd[0]->dacl->revision, psd[0]->dacl->num_aces, ace)))
psd               461 source3/lib/secdesc.c 	if (!(sd = make_sec_desc(ctx, psd[0]->revision, psd[0]->type, psd[0]->owner_sid, 
psd               462 source3/lib/secdesc.c 		psd[0]->group_sid, psd[0]->sacl, dacl, sd_size)))
psd               465 source3/lib/secdesc.c 	*psd = sd;
psd               493 source3/lib/secdesc.c NTSTATUS sec_desc_del_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, size_t *sd_size)
psd               500 source3/lib/secdesc.c 	if (!ctx || !psd[0] || !sid || !sd_size)
psd               505 source3/lib/secdesc.c 	status = sec_ace_del_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid);
psd               510 source3/lib/secdesc.c 	if (!(dacl = make_sec_acl(ctx, psd[0]->dacl->revision, psd[0]->dacl->num_aces, ace)))
psd               513 source3/lib/secdesc.c 	if (!(sd = make_sec_desc(ctx, psd[0]->revision, psd[0]->type, psd[0]->owner_sid, 
psd               514 source3/lib/secdesc.c 		psd[0]->group_sid, psd[0]->sacl, dacl, sd_size)))
psd               517 source3/lib/secdesc.c 	*psd = sd;
psd               130 source3/lib/sharesec.c 	SEC_DESC *psd = NULL;
psd               139 source3/lib/sharesec.c 		psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1,
psd               144 source3/lib/sharesec.c 	if (!psd) {
psd               149 source3/lib/sharesec.c 	return psd;
psd               160 source3/lib/sharesec.c 	SEC_DESC *psd = NULL;
psd               182 source3/lib/sharesec.c 	status = unmarshall_sec_desc(ctx, data.dptr, data.dsize, &psd);
psd               192 source3/lib/sharesec.c 	if (psd)
psd               193 source3/lib/sharesec.c 		*psize = ndr_size_security_descriptor(psd, NULL, 0);
psd               195 source3/lib/sharesec.c 	return psd;
psd               202 source3/lib/sharesec.c bool set_share_security(const char *share_name, SEC_DESC *psd)
psd               216 source3/lib/sharesec.c 	status = marshall_sec_desc(frame, psd, &blob.dptr, &blob.dsize);
psd               284 source3/lib/sharesec.c 	SEC_DESC *psd = NULL;
psd               287 source3/lib/sharesec.c 	psd = get_share_security(talloc_tos(), sharename, &sd_size);
psd               289 source3/lib/sharesec.c 	if (!psd) {
psd               293 source3/lib/sharesec.c 	status = se_access_check(psd, token, desired_access, &granted);
psd               295 source3/lib/sharesec.c 	TALLOC_FREE(psd);
psd               311 source3/lib/sharesec.c 	SEC_DESC *psd = NULL;
psd               391 source3/lib/sharesec.c 		psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1,
psd               396 source3/lib/sharesec.c 	if (!psd) {
psd               401 source3/lib/sharesec.c 	*ppsd = psd;
psd               254 source3/lib/util_seaccess.c NTSTATUS samr_make_sam_obj_sd(TALLOC_CTX *ctx, SEC_DESC **psd, size_t *sd_size)
psd               282 source3/lib/util_seaccess.c 	if ((*psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1,
psd              2142 source3/libads/ldap.c 	struct security_descriptor *psd;
psd              2146 source3/libads/ldap.c 				     values[0]->bv_len, &psd);
psd              2154 source3/libads/ldap.c 	if (psd) {
psd              2155 source3/libads/ldap.c 		ads_disp_sd(ads, talloc_tos(), psd);
psd                31 source3/libsmb/clisecdesc.c 	SEC_DESC *psd = NULL;
psd                54 source3/libsmb/clisecdesc.c 				     &psd);
psd                67 source3/libsmb/clisecdesc.c 	return psd;
psd               705 source3/modules/nfs4_acls.c 	const SEC_DESC *psd,
psd               737 source3/modules/nfs4_acls.c 		NTSTATUS status = unpack_nt_owners(SNUM(fsp->conn), &newUID, &newGID, security_info_sent, psd);
psd               763 source3/modules/nfs4_acls.c 	if (!(security_info_sent & DACL_SECURITY_INFORMATION) || psd->dacl ==NULL) {
psd               768 source3/modules/nfs4_acls.c 	theacl = smbacl4_win2nfs4(fsp->fsp_name, psd->dacl, &params, sbuf.st_uid, sbuf.st_gid);
psd               147 source3/modules/nfs4_acls.h 	const SEC_DESC *psd,
psd               133 source3/modules/onefs.h 			   uint32 security_info_sent, SEC_DESC *psd);
psd               139 source3/modules/onefs.h NTSTATUS onefs_samba_sd_to_sd(uint32_t security_info_sent, SEC_DESC *psd,
psd               813 source3/modules/onefs_acl.c NTSTATUS onefs_samba_sd_to_sd(uint32_t security_info_sent, SEC_DESC *psd,
psd               830 source3/modules/onefs_acl.c 		if (!onefs_og_to_identity(psd->owner_sid, &owner, false, snum))
psd               840 source3/modules/onefs_acl.c 		if (!onefs_og_to_identity(psd->group_sid, &group, true, snum))
psd               849 source3/modules/onefs_acl.c 	if ((security_info_sent & DACL_SECURITY_INFORMATION) && (psd->dacl)) {
psd               850 source3/modules/onefs_acl.c 		if (!onefs_samba_acl_to_acl(psd->dacl, &daclp, &ignore_aces,
psd               866 source3/modules/onefs_acl.c 			if (psd->sacl) {
psd               867 source3/modules/onefs_acl.c 				if (!onefs_samba_acl_to_acl(psd->sacl,
psd               881 source3/modules/onefs_acl.c 	if (aclu_initialize_sd(sd, psd->type, ownerp, groupp,
psd               899 source3/modules/onefs_acl.c 		  uint32_t sec_info_sent, SEC_DESC *psd)
psd               911 source3/modules/onefs_acl.c 	status = onefs_samba_sd_to_sd(sec_info_sent, psd, &sd,
psd               237 source3/modules/vfs_acl_tdb.c static NTSTATUS create_acl_blob(const struct security_descriptor *psd, DATA_BLOB *pblob)
psd               249 source3/modules/vfs_acl_tdb.c 	xacl.info.sd_hs->sd = CONST_DISCARD(struct security_descriptor *, psd);
psd               458 source3/modules/vfs_acl_tdb.c 	struct security_descriptor *psd = NULL;
psd               486 source3/modules/vfs_acl_tdb.c 				&psd,
psd               498 source3/modules/vfs_acl_tdb.c 			NDR_PRINT_DEBUG(security_descriptor, psd);
psd               508 source3/modules/vfs_acl_tdb.c 	if (!psd || psd->dacl == NULL) {
psd               512 source3/modules/vfs_acl_tdb.c 		TALLOC_FREE(psd);
psd               525 source3/modules/vfs_acl_tdb.c 		psd = default_file_sd(ctx, &sbuf);
psd               526 source3/modules/vfs_acl_tdb.c 		if (!psd) {
psd               532 source3/modules/vfs_acl_tdb.c 			NDR_PRINT_DEBUG(security_descriptor, psd);
psd               536 source3/modules/vfs_acl_tdb.c 	status = create_acl_blob(psd, &blob);
psd               738 source3/modules/vfs_acl_tdb.c         uint32 security_info_sent, const struct security_descriptor *psd)
psd               747 source3/modules/vfs_acl_tdb.c 			CONST_DISCARD(struct security_descriptor *,psd));
psd               750 source3/modules/vfs_acl_tdb.c 	status = SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd);
psd               756 source3/modules/vfs_acl_tdb.c 	if (!psd->owner_sid || !psd->group_sid) {
psd               760 source3/modules/vfs_acl_tdb.c 		struct security_descriptor *nc_psd = dup_sec_desc(talloc_tos(), psd);
psd               784 source3/modules/vfs_acl_tdb.c 		psd = nc_psd;
psd               789 source3/modules/vfs_acl_tdb.c 			psd->dacl != NULL &&
psd               790 source3/modules/vfs_acl_tdb.c 			(psd->type & (SE_DESC_DACL_AUTO_INHERITED|
psd               795 source3/modules/vfs_acl_tdb.c 		status = append_parent_acl(fsp, psd, &new_psd);
psd               801 source3/modules/vfs_acl_tdb.c 		psd = new_psd;
psd               809 source3/modules/vfs_acl_tdb.c 			CONST_DISCARD(struct security_descriptor *,psd));
psd               811 source3/modules/vfs_acl_tdb.c 	create_acl_blob(psd, &blob);
psd               134 source3/modules/vfs_acl_xattr.c static NTSTATUS create_acl_blob(const struct security_descriptor *psd, DATA_BLOB *pblob)
psd               146 source3/modules/vfs_acl_xattr.c 	xacl.info.sd_hs->sd = CONST_DISCARD(struct security_descriptor *, psd);
psd               326 source3/modules/vfs_acl_xattr.c 	struct security_descriptor *psd = NULL;
psd               354 source3/modules/vfs_acl_xattr.c 				&psd,
psd               366 source3/modules/vfs_acl_xattr.c 			NDR_PRINT_DEBUG(security_descriptor, psd);
psd               376 source3/modules/vfs_acl_xattr.c 	if (!psd || psd->dacl == NULL) {
psd               380 source3/modules/vfs_acl_xattr.c 		TALLOC_FREE(psd);
psd               393 source3/modules/vfs_acl_xattr.c 		psd = default_file_sd(ctx, &sbuf);
psd               394 source3/modules/vfs_acl_xattr.c 		if (!psd) {
psd               400 source3/modules/vfs_acl_xattr.c 			NDR_PRINT_DEBUG(security_descriptor, psd);
psd               404 source3/modules/vfs_acl_xattr.c 	status = create_acl_blob(psd, &blob);
psd               538 source3/modules/vfs_acl_xattr.c         uint32 security_info_sent, const struct security_descriptor *psd)
psd               547 source3/modules/vfs_acl_xattr.c 			CONST_DISCARD(struct security_descriptor *,psd));
psd               550 source3/modules/vfs_acl_xattr.c 	status = SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd);
psd               556 source3/modules/vfs_acl_xattr.c 	if (!psd->owner_sid || !psd->group_sid) {
psd               560 source3/modules/vfs_acl_xattr.c 		struct security_descriptor *nc_psd = dup_sec_desc(talloc_tos(), psd);
psd               584 source3/modules/vfs_acl_xattr.c 		psd = nc_psd;
psd               589 source3/modules/vfs_acl_xattr.c 			psd->dacl != NULL &&
psd               590 source3/modules/vfs_acl_xattr.c 			(psd->type & (SE_DESC_DACL_AUTO_INHERITED|
psd               595 source3/modules/vfs_acl_xattr.c 		status = append_parent_acl(fsp, psd, &new_psd);
psd               601 source3/modules/vfs_acl_xattr.c 		psd = new_psd;
psd               609 source3/modules/vfs_acl_xattr.c 			CONST_DISCARD(struct security_descriptor *,psd));
psd               611 source3/modules/vfs_acl_xattr.c 	create_acl_blob(psd, &blob);
psd               724 source3/modules/vfs_afsacl.c 			  const struct security_descriptor *psd,
psd               735 source3/modules/vfs_afsacl.c 	    (psd->dacl == NULL))
psd               741 source3/modules/vfs_afsacl.c 	dacl = psd->dacl;
psd               894 source3/modules/vfs_afsacl.c 			   const struct security_descriptor *psd)
psd               950 source3/modules/vfs_afsacl.c 		if (!nt_to_afs_acl(fsp->fsp_name, security_info_sent, psd,
psd               965 source3/modules/vfs_afsacl.c 		if (!nt_to_afs_acl(fsp->fsp_name, security_info_sent, psd,
psd              1047 source3/modules/vfs_afsacl.c 			 const SEC_DESC *psd)
psd              1049 source3/modules/vfs_afsacl.c 	return afs_set_nt_acl(handle, fsp, security_info_sent, psd);
psd               372 source3/modules/vfs_aixacl2.c static NTSTATUS aixjfs2_set_nt_acl_common(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd               386 source3/modules/vfs_aixacl2.c 			fsp, security_info_sent, psd,
psd               389 source3/modules/vfs_aixacl2.c 		result = set_nt_acl(fsp, security_info_sent, psd);
psd               396 source3/modules/vfs_aixacl2.c NTSTATUS aixjfs2_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd               398 source3/modules/vfs_aixacl2.c 	return aixjfs2_set_nt_acl_common(fsp, security_info_sent, psd);
psd              1263 source3/modules/vfs_default.c static NTSTATUS vfswrap_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd              1268 source3/modules/vfs_default.c 	result = set_nt_acl(fsp, security_info_sent, psd);
psd               251 source3/modules/vfs_full_audit.c 			      const SEC_DESC *psd);
psd              1840 source3/modules/vfs_full_audit.c 			      const SEC_DESC *psd)
psd              1844 source3/modules/vfs_full_audit.c 	result = SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd);
psd               437 source3/modules/vfs_gpfs.c static NTSTATUS gpfsacl_set_nt_acl_internal(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd               449 source3/modules/vfs_gpfs.c 			fsp, security_info_sent, psd,
psd               452 source3/modules/vfs_gpfs.c 		result = set_nt_acl(fsp, security_info_sent, psd);
psd               458 source3/modules/vfs_gpfs.c static NTSTATUS gpfsacl_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd               460 source3/modules/vfs_gpfs.c 	return gpfsacl_set_nt_acl_internal(fsp, security_info_sent, psd);
psd               169 source3/modules/vfs_zfsacl.c 			   const struct security_descriptor *psd)
psd               171 source3/modules/vfs_zfsacl.c 	return smb_set_nt_acl_nfs4(fsp, security_info_sent, psd,
psd               210 source3/modules/vfs_zfsacl.c 			 const SEC_DESC *psd)
psd               212 source3/modules/vfs_zfsacl.c 	return zfs_set_nt_acl(handle, fsp, security_info_sent, psd);
psd              8533 source3/param/loadparm.c 	SEC_DESC *psd = NULL;
psd              8648 source3/param/loadparm.c 			&comment, &psd, &guest_ok) != USERSHARE_OK) {
psd              8675 source3/param/loadparm.c 	if (!set_share_security(service_name, psd)) {
psd              5315 source3/printing/nt_printing.c 		SEC_DESC *psd = NULL;
psd              5343 source3/printing/nt_printing.c 		psd = make_sec_desc(mem_ctx, secdesc_ctr->sd->revision, secdesc_ctr->sd->type,
psd              5349 source3/printing/nt_printing.c 		if (!psd) {
psd              5354 source3/printing/nt_printing.c 		new_secdesc_ctr = make_sec_desc_buf(mem_ctx, size, psd);
psd              5403 source3/printing/nt_printing.c 	SEC_DESC *psd = NULL;
psd              5457 source3/printing/nt_printing.c 		psd = make_sec_desc(ctx, SEC_DESC_REVISION, SEC_DESC_SELF_RELATIVE,
psd              5463 source3/printing/nt_printing.c 	if (!psd) {
psd              5468 source3/printing/nt_printing.c 	sdb = make_sec_desc_buf(ctx, sd_size, psd);
psd              5533 source3/printing/nt_printing.c 			SEC_DESC *psd = NULL;
psd              5540 source3/printing/nt_printing.c 			psd = make_sec_desc(ctx, (*secdesc_ctr)->sd->revision, (*secdesc_ctr)->sd->type,
psd              5547 source3/printing/nt_printing.c 			if (!psd) {
psd              5551 source3/printing/nt_printing.c 			new_secdesc_ctr = make_sec_desc_buf(ctx, size, psd);
psd                37 source3/registry/reg_dispatcher.c static WERROR construct_registry_sd(TALLOC_CTX *ctx, SEC_DESC **psd)
psd                75 source3/registry/reg_dispatcher.c 	*psd = sd;
psd               388 source3/rpc_server/srv_lsa_nt.c 	SEC_DESC *psd = NULL;
psd               401 source3/rpc_server/srv_lsa_nt.c 	status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size, &lsa_policy_mapping,
psd               407 source3/rpc_server/srv_lsa_nt.c 	status = access_check_object(psd, p->server_info->ptok,
psd              1630 source3/rpc_server/srv_lsa_nt.c 	SEC_DESC *psd = NULL;
psd              1654 source3/rpc_server/srv_lsa_nt.c 	status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size,
psd              1661 source3/rpc_server/srv_lsa_nt.c 	status = access_check_object(psd, p->server_info->ptok,
psd              1938 source3/rpc_server/srv_lsa_nt.c 	SEC_DESC *psd = NULL;
psd              1947 source3/rpc_server/srv_lsa_nt.c 		status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size,
psd              1950 source3/rpc_server/srv_lsa_nt.c 		status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size,
psd              1964 source3/rpc_server/srv_lsa_nt.c 		if((*r->out.sdbuf = make_sec_desc_buf(p->mem_ctx, sd_size, psd)) == NULL)
psd              1969 source3/rpc_server/srv_lsa_nt.c 		if((*r->out.sdbuf = make_sec_desc_buf(p->mem_ctx, sd_size, psd)) == NULL)
psd              2057 source3/rpc_server/srv_lsa_nt.c 	SEC_DESC *psd = NULL;
psd              2071 source3/rpc_server/srv_lsa_nt.c         status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size,
psd              2085 source3/rpc_server/srv_lsa_nt.c         status = access_check_object(psd, p->server_info->ptok,
psd              2126 source3/rpc_server/srv_lsa_nt.c 	SEC_DESC *psd = NULL;
psd              2142 source3/rpc_server/srv_lsa_nt.c         status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size,
psd              2155 source3/rpc_server/srv_lsa_nt.c         status = access_check_object(psd, p->server_info->ptok,
psd               112 source3/rpc_server/srv_samr_nt.c static NTSTATUS make_samr_object_sd( TALLOC_CTX *ctx, SEC_DESC **psd, size_t *sd_size,
psd               154 source3/rpc_server/srv_samr_nt.c 	if ((*psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1,
psd               167 source3/rpc_server/srv_samr_nt.c NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token,
psd               192 source3/rpc_server/srv_samr_nt.c 	status = se_access_check(psd, token, des_access, acc_granted);
psd               603 source3/rpc_server/srv_samr_nt.c 	SEC_DESC *psd = NULL;
psd               619 source3/rpc_server/srv_samr_nt.c 	make_samr_object_sd( p->mem_ctx, &psd, &sd_size, &dom_generic_mapping, NULL, 0 );
psd               641 source3/rpc_server/srv_samr_nt.c 	status = access_check_object( psd, p->server_info->ptok,
psd               863 source3/rpc_server/srv_samr_nt.c 	SEC_DESC * psd = NULL;
psd               886 source3/rpc_server/srv_samr_nt.c 		status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &sam_generic_mapping, NULL, 0);
psd               891 source3/rpc_server/srv_samr_nt.c 		status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &dom_generic_mapping, NULL, 0);
psd               897 source3/rpc_server/srv_samr_nt.c 		status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &dom_generic_mapping, NULL, 0);
psd               905 source3/rpc_server/srv_samr_nt.c 			status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_generic_mapping,
psd               908 source3/rpc_server/srv_samr_nt.c 			status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_nopwchange_generic_mapping,
psd               915 source3/rpc_server/srv_samr_nt.c 	if ((*r->out.sdbuf = make_sec_desc_buf(p->mem_ctx, sd_size, psd)) == NULL)
psd              2331 source3/rpc_server/srv_samr_nt.c 	SEC_DESC *psd = NULL;
psd              2365 source3/rpc_server/srv_samr_nt.c 	make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_generic_mapping, &sid, SAMR_USR_RIGHTS_WRITE_PW);
psd              2433 source3/rpc_server/srv_samr_nt.c 	nt_status = access_check_object(psd, p->server_info->ptok,
psd              3750 source3/rpc_server/srv_samr_nt.c 	SEC_DESC *psd;
psd              3846 source3/rpc_server/srv_samr_nt.c 	make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_generic_mapping,
psd              3857 source3/rpc_server/srv_samr_nt.c 	nt_status = access_check_object(psd, p->server_info->ptok,
psd              3954 source3/rpc_server/srv_samr_nt.c 	SEC_DESC *psd = NULL;
psd              3987 source3/rpc_server/srv_samr_nt.c 	make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &sam_generic_mapping, NULL, 0);
psd              3990 source3/rpc_server/srv_samr_nt.c 	nt_status = access_check_object(psd, p->server_info->ptok,
psd              4185 source3/rpc_server/srv_samr_nt.c 	SEC_DESC *psd = NULL;
psd              4213 source3/rpc_server/srv_samr_nt.c 	make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &ali_generic_mapping, NULL, 0);
psd              4218 source3/rpc_server/srv_samr_nt.c 	status = access_check_object(psd, p->server_info->ptok,
psd              6360 source3/rpc_server/srv_samr_nt.c 	SEC_DESC         *psd = NULL;
psd              6382 source3/rpc_server/srv_samr_nt.c 	make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &grp_generic_mapping, NULL, 0);
psd              6387 source3/rpc_server/srv_samr_nt.c 	status = access_check_object(psd, p->server_info->ptok,
psd               322 source3/rpc_server/srv_srvsvc_nt.c static void map_generic_share_sd_bits(SEC_DESC *psd)
psd               327 source3/rpc_server/srv_srvsvc_nt.c 	if (!psd)
psd               330 source3/rpc_server/srv_srvsvc_nt.c 	ps_dacl = psd->dacl;
psd              1493 source3/rpc_server/srv_srvsvc_nt.c 	SEC_DESC *psd = NULL;
psd              1549 source3/rpc_server/srv_srvsvc_nt.c 		psd = NULL;
psd              1557 source3/rpc_server/srv_srvsvc_nt.c 		psd = NULL;
psd              1564 source3/rpc_server/srv_srvsvc_nt.c 		psd = NULL;
psd              1571 source3/rpc_server/srv_srvsvc_nt.c 		psd = info->info502->sd_buf.sd;
psd              1572 source3/rpc_server/srv_srvsvc_nt.c 		map_generic_share_sd_bits(psd);
psd              1598 source3/rpc_server/srv_srvsvc_nt.c 		psd = info->info1501->sd;
psd              1599 source3/rpc_server/srv_srvsvc_nt.c 		map_generic_share_sd_bits(psd);
psd              1688 source3/rpc_server/srv_srvsvc_nt.c 	if (psd) {
psd              1694 source3/rpc_server/srv_srvsvc_nt.c 		if (old_sd && !sec_desc_equal(old_sd, psd)) {
psd              1695 source3/rpc_server/srv_srvsvc_nt.c 			if (!set_share_security(share_name, psd))
psd              1723 source3/rpc_server/srv_srvsvc_nt.c 	SEC_DESC *psd = NULL;
psd              1770 source3/rpc_server/srv_srvsvc_nt.c 		psd = r->in.info->info502->sd_buf.sd;
psd              1771 source3/rpc_server/srv_srvsvc_nt.c 		map_generic_share_sd_bits(psd);
psd              1870 source3/rpc_server/srv_srvsvc_nt.c 	if (psd) {
psd              1871 source3/rpc_server/srv_srvsvc_nt.c 		if (!set_share_security(share_name, psd)) {
psd              2051 source3/rpc_server/srv_srvsvc_nt.c 	SEC_DESC *psd = NULL;
psd              2113 source3/rpc_server/srv_srvsvc_nt.c 					|DACL_SECURITY_INFORMATION), &psd);
psd              2122 source3/rpc_server/srv_srvsvc_nt.c 	sd_size = ndr_size_security_descriptor(psd, NULL, 0);
psd              2131 source3/rpc_server/srv_srvsvc_nt.c 	sd_buf->sd = psd;
psd              2135 source3/rpc_server/srv_srvsvc_nt.c 	psd->dacl->revision = NT4_ACL_REVISION;
psd              2175 source3/rpc_server/srv_srvsvc_nt.c 	struct security_descriptor *psd = NULL;
psd              2225 source3/rpc_server/srv_srvsvc_nt.c 	psd = r->in.sd_buf->sd;
psd              2228 source3/rpc_server/srv_srvsvc_nt.c 	if (psd->owner_sid==0) {
psd              2231 source3/rpc_server/srv_srvsvc_nt.c 	if (psd->group_sid==0) {
psd              2234 source3/rpc_server/srv_srvsvc_nt.c 	if (psd->sacl==0) {
psd              2237 source3/rpc_server/srv_srvsvc_nt.c 	if (psd->dacl==0) {
psd              2242 source3/rpc_server/srv_srvsvc_nt.c 	security_acl_map_generic(psd->dacl, &file_generic_mapping);
psd              2243 source3/rpc_server/srv_srvsvc_nt.c 	security_acl_map_generic(psd->sacl, &file_generic_mapping);
psd              2247 source3/rpc_server/srv_srvsvc_nt.c 					psd);
psd               760 source3/smbd/nttrans.c 	SEC_DESC *psd = NULL;
psd               767 source3/smbd/nttrans.c 	status = unmarshall_sec_desc(talloc_tos(), data, sd_len, &psd);
psd               773 source3/smbd/nttrans.c 	if (psd->owner_sid == NULL) {
psd               776 source3/smbd/nttrans.c 	if (psd->group_sid == NULL) {
psd               781 source3/smbd/nttrans.c 	security_acl_map_generic(psd->dacl, &file_generic_mapping);
psd               782 source3/smbd/nttrans.c 	security_acl_map_generic(psd->sacl, &file_generic_mapping);
psd               786 source3/smbd/nttrans.c 		NDR_PRINT_DEBUG(security_descriptor, psd);
psd               789 source3/smbd/nttrans.c 	status = SMB_VFS_FSET_NT_ACL(fsp, security_info_sent, psd);
psd               791 source3/smbd/nttrans.c 	TALLOC_FREE(psd);
psd              1642 source3/smbd/nttrans.c 	SEC_DESC *psd = NULL;
psd              1676 source3/smbd/nttrans.c 		status = get_null_nt_acl(talloc_tos(), &psd);
psd              1679 source3/smbd/nttrans.c 			fsp, security_info_wanted, &psd);
psd              1688 source3/smbd/nttrans.c 	if (psd->sacl == NULL &&
psd              1690 source3/smbd/nttrans.c 		psd->type |= SEC_DESC_SACL_PRESENT;
psd              1691 source3/smbd/nttrans.c 	if (psd->dacl == NULL &&
psd              1693 source3/smbd/nttrans.c 		psd->type |= SEC_DESC_DACL_PRESENT;
psd              1695 source3/smbd/nttrans.c 	sd_size = ndr_size_security_descriptor(psd, NULL, 0);
psd              1701 source3/smbd/nttrans.c 		NDR_PRINT_DEBUG(security_descriptor, psd);
psd              1722 source3/smbd/nttrans.c 	status = marshall_sec_desc(talloc_tos(), psd,
psd              1146 source3/smbd/posix_acls.c NTSTATUS unpack_nt_owners(int snum, uid_t *puser, gid_t *pgrp, uint32 security_info_sent, const SEC_DESC *psd)
psd              1174 source3/smbd/posix_acls.c 		sid_copy(&owner_sid, psd->owner_sid);
psd              1197 source3/smbd/posix_acls.c 		sid_copy(&grp_sid, psd->group_sid);
psd              2205 source3/smbd/posix_acls.c 				const SEC_DESC *psd)
psd              2222 source3/smbd/posix_acls.c 	if(!(security_info_sent & DACL_SECURITY_INFORMATION) || !psd->dacl)
psd              2230 source3/smbd/posix_acls.c 								&file_ace, &dir_ace, psd->dacl))
psd              3058 source3/smbd/posix_acls.c 	SEC_DESC *psd = NULL;
psd              3256 source3/smbd/posix_acls.c 	psd = make_standard_sec_desc( talloc_tos(),
psd              3262 source3/smbd/posix_acls.c 	if(!psd) {
psd              3279 source3/smbd/posix_acls.c 		psd->type |= SEC_DESC_DACL_PROTECTED;
psd              3281 source3/smbd/posix_acls.c 		psd->type |= pal->sd_type;
psd              3284 source3/smbd/posix_acls.c 	if (psd->dacl) {
psd              3285 source3/smbd/posix_acls.c 		dacl_sort_into_canonical_order(psd->dacl->aces, (unsigned int)psd->dacl->num_aces);
psd              3288 source3/smbd/posix_acls.c 	*ppdesc = psd;
psd              3486 source3/smbd/posix_acls.c 	SEC_DESC *psd = dup_sec_desc(talloc_tos(), pcsd);
psd              3491 source3/smbd/posix_acls.c 	if (psd == NULL) {
psd              3551 source3/smbd/posix_acls.c 	for (i = 0; i < psd->dacl->num_aces; i++) {
psd              3552 source3/smbd/posix_acls.c 		sec_ace_copy(&new_ace[i], &psd->dacl->aces[i]);
psd              3597 source3/smbd/posix_acls.c 			for (k = 0; k < psd->dacl->num_aces; k++) {
psd              3598 source3/smbd/posix_acls.c 				if (sid_equal(&psd->dacl->aces[k].trustee,
psd              3603 source3/smbd/posix_acls.c 			if (k < psd->dacl->num_aces) {
psd              3651 source3/smbd/posix_acls.c 	psd->dacl->aces = new_ace;
psd              3652 source3/smbd/posix_acls.c 	psd->dacl->num_aces = i;
psd              3653 source3/smbd/posix_acls.c 	psd->type &= ~(SE_DESC_DACL_AUTO_INHERITED|
psd              3656 source3/smbd/posix_acls.c 	*pp_new_sd = psd;
psd              3667 source3/smbd/posix_acls.c NTSTATUS set_nt_acl(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd              3718 source3/smbd/posix_acls.c 	status = unpack_nt_owners( SNUM(conn), &user, &grp, security_info_sent, psd);
psd              3784 source3/smbd/posix_acls.c 					&file_ace_list, &dir_ace_list, security_info_sent, psd);
psd              3802 source3/smbd/posix_acls.c 	if(!(security_info_sent & DACL_SECURITY_INFORMATION) || (psd->dacl == NULL)) {
psd              3884 source3/smbd/posix_acls.c 				psd->type);
psd              4540 source3/smbd/posix_acls.c 	SEC_DESC *psd, *ret_sd;
psd              4576 source3/smbd/posix_acls.c 	if (!NT_STATUS_IS_OK(SMB_VFS_FGET_NT_ACL( &finfo, DACL_SECURITY_INFORMATION, &psd))) {
psd              4582 source3/smbd/posix_acls.c 	ret_sd = dup_sec_desc( ctx, psd );
psd               323 source3/utils/net_usershare.c 	SEC_DESC *psd = NULL;
psd               385 source3/utils/net_usershare.c 				&psd,
psd               403 source3/utils/net_usershare.c 	for (num_aces = 0; num_aces < psd->dacl->num_aces; num_aces++) {
psd               409 source3/utils/net_usershare.c 				                    &psd->dacl->aces[num_aces].trustee,
psd               432 source3/utils/net_usershare.c 				       &psd->dacl->aces[num_aces].trustee);
psd               445 source3/utils/net_usershare.c 		if (psd->dacl->aces[num_aces].type == SEC_ACE_TYPE_ACCESS_DENIED) {
psd               451 source3/utils/net_usershare.c 			if (psd->dacl->aces[num_aces].access_mask & GENERIC_ALL_ACCESS) {
psd               145 source4/ntvfs/posix/pvfs_acl.c 				 struct security_descriptor **psd)
psd               154 source4/ntvfs/posix/pvfs_acl.c 	*psd = security_descriptor_initialise(req);
psd               155 source4/ntvfs/posix/pvfs_acl.c 	if (*psd == NULL) {
psd               158 source4/ntvfs/posix/pvfs_acl.c 	sd = *psd;
psd                36 source4/ntvfs/posix/pvfs_acl_nfs4.c 				   struct security_descriptor **psd)
psd                56 source4/ntvfs/posix/pvfs_acl_nfs4.c 	*psd = security_descriptor_initialise(mem_ctx);
psd                57 source4/ntvfs/posix/pvfs_acl_nfs4.c 	NT_STATUS_HAVE_NO_MEMORY(*psd);
psd                59 source4/ntvfs/posix/pvfs_acl_nfs4.c 	sd = *psd;