ptoken 1237 source3/include/proto.h NT_USER_TOKEN *dup_nt_token(TALLOC_CTX *mem_ctx, const NT_USER_TOKEN *ptoken); ptoken 5087 source3/include/proto.h NT_USER_TOKEN **ptoken); ptoken 34 source3/lib/util_nttoken.c NT_USER_TOKEN *dup_nt_token(TALLOC_CTX *mem_ctx, const NT_USER_TOKEN *ptoken) ptoken 38 source3/lib/util_nttoken.c if (!ptoken) ptoken 47 source3/lib/util_nttoken.c if (ptoken->user_sids && ptoken->num_sids) { ptoken 49 source3/lib/util_nttoken.c token, ptoken->user_sids, sizeof(DOM_SID) * ptoken->num_sids ); ptoken 56 source3/lib/util_nttoken.c token->num_sids = ptoken->num_sids; ptoken 61 source3/lib/util_nttoken.c if ( !se_priv_copy( &token->privileges, &ptoken->privileges ) ) { ptoken 35 source3/registry/reg_init_smbconf.c NT_USER_TOKEN **ptoken) ptoken 40 source3/registry/reg_init_smbconf.c if (ptoken == NULL) { ptoken 59 source3/registry/reg_init_smbconf.c *ptoken = token; ptoken 46 source4/auth/system_session.c struct security_token *ptoken; ptoken 49 source4/auth/system_session.c ptoken = security_token_initialise(mem_ctx); ptoken 50 source4/auth/system_session.c NT_STATUS_HAVE_NO_MEMORY(ptoken); ptoken 52 source4/auth/system_session.c ptoken->sids = talloc_array(ptoken, struct dom_sid *, n_groupSIDs + 5); ptoken 53 source4/auth/system_session.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids); ptoken 55 source4/auth/system_session.c ptoken->user_sid = talloc_reference(ptoken, user_sid); ptoken 56 source4/auth/system_session.c ptoken->group_sid = talloc_reference(ptoken, group_sid); ptoken 57 source4/auth/system_session.c ptoken->privilege_mask = 0; ptoken 59 source4/auth/system_session.c ptoken->sids[0] = ptoken->user_sid; ptoken 60 source4/auth/system_session.c ptoken->sids[1] = ptoken->group_sid; ptoken 67 source4/auth/system_session.c ptoken->sids[2] = dom_sid_parse_talloc(ptoken->sids, SID_WORLD); ptoken 68 source4/auth/system_session.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[2]); ptoken 69 source4/auth/system_session.c ptoken->sids[3] = dom_sid_parse_talloc(ptoken->sids, SID_NT_NETWORK); ptoken 70 source4/auth/system_session.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[3]); ptoken 71 source4/auth/system_session.c ptoken->num_sids = 4; ptoken 74 source4/auth/system_session.c ptoken->sids[4] = dom_sid_parse_talloc(ptoken->sids, SID_NT_AUTHENTICATED_USERS); ptoken 75 source4/auth/system_session.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[4]); ptoken 76 source4/auth/system_session.c ptoken->num_sids++; ptoken 82 source4/auth/system_session.c check_sid_idx < ptoken->num_sids; ptoken 84 source4/auth/system_session.c if (dom_sid_equal(ptoken->sids[check_sid_idx], groupSIDs[i])) { ptoken 89 source4/auth/system_session.c if (check_sid_idx == ptoken->num_sids) { ptoken 90 source4/auth/system_session.c ptoken->sids[ptoken->num_sids++] = talloc_reference(ptoken->sids, groupSIDs[i]); ptoken 94 source4/auth/system_session.c *token = ptoken; ptoken 97 source4/auth/system_session.c if (ptoken->user_sid == NULL) { ptoken 98 source4/auth/system_session.c ptoken->privilege_mask = 0; ptoken 102 source4/auth/system_session.c if (security_token_is_system(ptoken)) { ptoken 103 source4/auth/system_session.c ptoken->privilege_mask = ~0; ptoken 107 source4/auth/system_session.c if (security_token_is_anonymous(ptoken)) { ptoken 108 source4/auth/system_session.c ptoken->privilege_mask = 0; ptoken 235 source4/dsdb/samdb/samdb.c struct security_token *ptoken; ptoken 239 source4/dsdb/samdb/samdb.c ptoken = security_token_initialise(mem_ctx); ptoken 240 source4/dsdb/samdb/samdb.c NT_STATUS_HAVE_NO_MEMORY(ptoken); ptoken 242 source4/dsdb/samdb/samdb.c ptoken->sids = talloc_array(ptoken, struct dom_sid *, n_groupSIDs + 5); ptoken 243 source4/dsdb/samdb/samdb.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids); ptoken 245 source4/dsdb/samdb/samdb.c ptoken->user_sid = talloc_reference(ptoken, user_sid); ptoken 246 source4/dsdb/samdb/samdb.c ptoken->group_sid = talloc_reference(ptoken, group_sid); ptoken 247 source4/dsdb/samdb/samdb.c ptoken->privilege_mask = 0; ptoken 249 source4/dsdb/samdb/samdb.c ptoken->sids[0] = ptoken->user_sid; ptoken 250 source4/dsdb/samdb/samdb.c ptoken->sids[1] = ptoken->group_sid; ptoken 257 source4/dsdb/samdb/samdb.c ptoken->sids[2] = dom_sid_parse_talloc(ptoken->sids, SID_WORLD); ptoken 258 source4/dsdb/samdb/samdb.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[2]); ptoken 259 source4/dsdb/samdb/samdb.c ptoken->sids[3] = dom_sid_parse_talloc(ptoken->sids, SID_NT_NETWORK); ptoken 260 source4/dsdb/samdb/samdb.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[3]); ptoken 261 source4/dsdb/samdb/samdb.c ptoken->num_sids = 4; ptoken 264 source4/dsdb/samdb/samdb.c ptoken->sids[4] = dom_sid_parse_talloc(ptoken->sids, SID_NT_AUTHENTICATED_USERS); ptoken 265 source4/dsdb/samdb/samdb.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[4]); ptoken 266 source4/dsdb/samdb/samdb.c ptoken->num_sids++; ptoken 272 source4/dsdb/samdb/samdb.c check_sid_idx < ptoken->num_sids; ptoken 274 source4/dsdb/samdb/samdb.c if (dom_sid_equal(ptoken->sids[check_sid_idx], groupSIDs[i])) { ptoken 279 source4/dsdb/samdb/samdb.c if (check_sid_idx == ptoken->num_sids) { ptoken 280 source4/dsdb/samdb/samdb.c ptoken->sids[ptoken->num_sids++] = talloc_reference(ptoken->sids, groupSIDs[i]); ptoken 285 source4/dsdb/samdb/samdb.c status = samdb_privilege_setup(ev_ctx, lp_ctx, ptoken); ptoken 287 source4/dsdb/samdb/samdb.c talloc_free(ptoken); ptoken 291 source4/dsdb/samdb/samdb.c security_token_debug(10, ptoken); ptoken 293 source4/dsdb/samdb/samdb.c *token = ptoken;