pp_new             75 libcli/security/secace.c NTSTATUS sec_ace_add_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, unsigned *num, struct dom_sid *sid, uint32_t mask)
pp_new             79 libcli/security/secace.c 	if (!ctx || !pp_new || !old || !sid || !num)  return NT_STATUS_INVALID_PARAMETER;
pp_new             83 libcli/security/secace.c 	if((pp_new[0] = talloc_zero_array(ctx, struct security_ace, *num )) == 0)
pp_new             87 libcli/security/secace.c 		sec_ace_copy(&(*pp_new)[i], &old[i]);
pp_new             89 libcli/security/secace.c 	(*pp_new)[i].type  = SEC_ACE_TYPE_ACCESS_ALLOWED;
pp_new             90 libcli/security/secace.c 	(*pp_new)[i].flags = 0;
pp_new             91 libcli/security/secace.c 	(*pp_new)[i].size  = SEC_ACE_HEADER_SIZE + ndr_size_dom_sid(sid, NULL, 0);
pp_new             92 libcli/security/secace.c 	(*pp_new)[i].access_mask = mask;
pp_new             93 libcli/security/secace.c 	(*pp_new)[i].trustee = *sid;
pp_new            120 libcli/security/secace.c NTSTATUS sec_ace_del_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, uint32_t *num, struct dom_sid *sid)
pp_new            125 libcli/security/secace.c 	if (!ctx || !pp_new || !old || !sid || !num)  return NT_STATUS_INVALID_PARAMETER;
pp_new            128 libcli/security/secace.c 		if((pp_new[0] = talloc_zero_array(ctx, struct security_ace, *num )) == 0)
pp_new            131 libcli/security/secace.c 		pp_new[0] = NULL;
pp_new            136 libcli/security/secace.c 			sec_ace_copy(&(*pp_new)[i], &old[i]);
pp_new             30 libcli/security/secace.h NTSTATUS sec_ace_add_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, unsigned *num, struct dom_sid *sid, uint32_t mask);
pp_new             32 libcli/security/secace.h NTSTATUS sec_ace_del_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, uint32_t *num, struct dom_sid *sid);