sd 611 librpc/gen_ndr/cli_winreg.c struct KeySecurityData *sd /* [in,out] [ref] */, sd 620 librpc/gen_ndr/cli_winreg.c r.in.sd = sd; sd 645 librpc/gen_ndr/cli_winreg.c *sd = *r.out.sd; sd 1074 librpc/gen_ndr/cli_winreg.c struct KeySecurityData *sd /* [in] [ref] */, sd 1083 librpc/gen_ndr/cli_winreg.c r.in.sd = sd; sd 85 librpc/gen_ndr/cli_winreg.h struct KeySecurityData *sd /* [in,out] [ref] */, sd 152 librpc/gen_ndr/cli_winreg.h struct KeySecurityData *sd /* [in] [ref] */, sd 777 librpc/gen_ndr/ndr_security.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_size_security_descriptor(r->sd, ndr->iconv_convenience, ndr->flags))); sd 778 librpc/gen_ndr/ndr_security.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->sd)); sd 781 librpc/gen_ndr/ndr_security.c if (r->sd) { sd 785 librpc/gen_ndr/ndr_security.c NDR_CHECK(ndr_push_security_descriptor(_ndr_sd, NDR_SCALARS|NDR_BUFFERS, r->sd)); sd 805 librpc/gen_ndr/ndr_security.c NDR_PULL_ALLOC(ndr, r->sd); sd 807 librpc/gen_ndr/ndr_security.c r->sd = NULL; sd 811 librpc/gen_ndr/ndr_security.c if (r->sd) { sd 813 librpc/gen_ndr/ndr_security.c NDR_PULL_SET_MEM_CTX(ndr, r->sd, 0); sd 817 librpc/gen_ndr/ndr_security.c NDR_CHECK(ndr_pull_security_descriptor(_ndr_sd, NDR_SCALARS|NDR_BUFFERS, r->sd)); sd 830 librpc/gen_ndr/ndr_security.c ndr_print_uint32(ndr, "sd_size", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?ndr_size_security_descriptor(r->sd, ndr->iconv_convenience, ndr->flags):r->sd_size); sd 831 librpc/gen_ndr/ndr_security.c ndr_print_ptr(ndr, "sd", r->sd); sd 833 librpc/gen_ndr/ndr_security.c if (r->sd) { sd 834 librpc/gen_ndr/ndr_security.c ndr_print_security_descriptor(ndr, "sd", r->sd); sd 17506 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_sec_desc_buf(ndr, NDR_SCALARS, &r->sd)); sd 17532 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_sec_desc_buf(ndr, NDR_BUFFERS, &r->sd)); sd 17573 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_sec_desc_buf(ndr, NDR_SCALARS, &r->sd)); sd 17598 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_sec_desc_buf(ndr, NDR_BUFFERS, &r->sd)); sd 17641 librpc/gen_ndr/ndr_spoolss.c ndr_print_sec_desc_buf(ndr, "sd", &r->sd); sd 215 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_KeySecurityData(ndr, NDR_SCALARS, &r->sd)); sd 219 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_KeySecurityData(ndr, NDR_BUFFERS, &r->sd)); sd 229 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_KeySecurityData(ndr, NDR_SCALARS, &r->sd)); sd 233 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_KeySecurityData(ndr, NDR_BUFFERS, &r->sd)); sd 243 librpc/gen_ndr/ndr_winreg.c ndr_print_KeySecurityData(ndr, "sd", &r->sd); sd 1901 librpc/gen_ndr/ndr_winreg.c if (r->in.sd == NULL) { sd 1904 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->in.sd)); sd 1907 librpc/gen_ndr/ndr_winreg.c if (r->out.sd == NULL) { sd 1910 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->out.sd)); sd 1932 librpc/gen_ndr/ndr_winreg.c NDR_PULL_ALLOC(ndr, r->in.sd); sd 1935 librpc/gen_ndr/ndr_winreg.c NDR_PULL_SET_MEM_CTX(ndr, r->in.sd, LIBNDR_FLAG_REF_ALLOC); sd 1936 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->in.sd)); sd 1938 librpc/gen_ndr/ndr_winreg.c NDR_PULL_ALLOC(ndr, r->out.sd); sd 1939 librpc/gen_ndr/ndr_winreg.c *r->out.sd = *r->in.sd; sd 1943 librpc/gen_ndr/ndr_winreg.c NDR_PULL_ALLOC(ndr, r->out.sd); sd 1946 librpc/gen_ndr/ndr_winreg.c NDR_PULL_SET_MEM_CTX(ndr, r->out.sd, LIBNDR_FLAG_REF_ALLOC); sd 1947 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->out.sd)); sd 1969 librpc/gen_ndr/ndr_winreg.c ndr_print_ptr(ndr, "sd", r->in.sd); sd 1971 librpc/gen_ndr/ndr_winreg.c ndr_print_KeySecurityData(ndr, "sd", r->in.sd); sd 1978 librpc/gen_ndr/ndr_winreg.c ndr_print_ptr(ndr, "sd", r->out.sd); sd 1980 librpc/gen_ndr/ndr_winreg.c ndr_print_KeySecurityData(ndr, "sd", r->out.sd); sd 3007 librpc/gen_ndr/ndr_winreg.c if (r->in.sd == NULL) { sd 3010 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->in.sd)); sd 3032 librpc/gen_ndr/ndr_winreg.c NDR_PULL_ALLOC(ndr, r->in.sd); sd 3035 librpc/gen_ndr/ndr_winreg.c NDR_PULL_SET_MEM_CTX(ndr, r->in.sd, LIBNDR_FLAG_REF_ALLOC); sd 3036 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->in.sd)); sd 3060 librpc/gen_ndr/ndr_winreg.c ndr_print_ptr(ndr, "sd", r->in.sd); sd 3062 librpc/gen_ndr/ndr_winreg.c ndr_print_KeySecurityData(ndr, "sd", r->in.sd); sd 553 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->sd)); sd 557 librpc/gen_ndr/ndr_xattr.c if (r->sd) { sd 558 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_push_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, r->sd)); sd 572 librpc/gen_ndr/ndr_xattr.c NDR_PULL_ALLOC(ndr, r->sd); sd 574 librpc/gen_ndr/ndr_xattr.c r->sd = NULL; sd 579 librpc/gen_ndr/ndr_xattr.c if (r->sd) { sd 581 librpc/gen_ndr/ndr_xattr.c NDR_PULL_SET_MEM_CTX(ndr, r->sd, 0); sd 582 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_pull_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, r->sd)); sd 593 librpc/gen_ndr/ndr_xattr.c ndr_print_ptr(ndr, "sd", r->sd); sd 595 librpc/gen_ndr/ndr_xattr.c if (r->sd) { sd 596 librpc/gen_ndr/ndr_xattr.c ndr_print_security_descriptor(ndr, "sd", r->sd); sd 610 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->sd)); sd 625 librpc/gen_ndr/ndr_xattr.c if (r->sd) { sd 626 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_push_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, r->sd)); sd 660 librpc/gen_ndr/ndr_xattr.c NDR_PULL_ALLOC(ndr, r->sd); sd 662 librpc/gen_ndr/ndr_xattr.c r->sd = NULL; sd 683 librpc/gen_ndr/ndr_xattr.c if (r->sd) { sd 685 librpc/gen_ndr/ndr_xattr.c NDR_PULL_SET_MEM_CTX(ndr, r->sd, 0); sd 686 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_pull_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, r->sd)); sd 714 librpc/gen_ndr/ndr_xattr.c ndr_print_ptr(ndr, "sd", r->sd); sd 716 librpc/gen_ndr/ndr_xattr.c if (r->sd) { sd 717 librpc/gen_ndr/ndr_xattr.c ndr_print_security_descriptor(ndr, "sd", r->sd); sd 328 librpc/gen_ndr/security.h struct security_descriptor *sd;/* [unique,subcontext(4)] */ sd 1485 librpc/gen_ndr/spoolss.h struct sec_desc_buf sd;/* [case(5)] */ sd 979 librpc/gen_ndr/srv_winreg.c r->out.sd = r->in.sd; sd 2901 librpc/gen_ndr/srv_winreg.c r->out.sd = r->in.sd; sd 73 librpc/gen_ndr/winreg.h struct KeySecurityData sd; sd 311 librpc/gen_ndr/winreg.h struct KeySecurityData *sd;/* [ref] */ sd 315 librpc/gen_ndr/winreg.h struct KeySecurityData *sd;/* [ref] */ sd 453 librpc/gen_ndr/winreg.h struct KeySecurityData *sd;/* [ref] */ sd 79 librpc/gen_ndr/xattr.h struct security_descriptor *sd;/* [unique] */ sd 84 librpc/gen_ndr/xattr.h struct security_descriptor *sd;/* [unique,case] */ sd 109 librpc/ndr/ndr_sec_helper.c size_t ndr_size_security_descriptor(const struct security_descriptor *sd, struct smb_iconv_convenience *ic, int flags) sd 112 librpc/ndr/ndr_sec_helper.c if (!sd) return 0; sd 115 librpc/ndr/ndr_sec_helper.c ret += ndr_size_dom_sid(sd->owner_sid, ic, flags); sd 116 librpc/ndr/ndr_sec_helper.c ret += ndr_size_dom_sid(sd->group_sid, ic, flags); sd 117 librpc/ndr/ndr_sec_helper.c ret += ndr_size_security_acl(sd->dacl, ic, flags); sd 118 librpc/ndr/ndr_sec_helper.c ret += ndr_size_security_acl(sd->sacl, ic, flags); sd 563 source3/client/client.c SEC_DESC *sd = NULL; sd 564 source3/client/client.c sd = cli_query_secdesc(finfo->cli, fnum, ctx); sd 565 source3/client/client.c if (!sd) { sd 570 source3/client/client.c display_sec_desc(sd); sd 572 source3/client/client.c TALLOC_FREE(sd); sd 29 source3/include/ads_protos.h LDAPMessage *msg, const char *field, SEC_DESC **sd); sd 660 source3/include/proto.h uint32_t get_sec_info(const SEC_DESC *sd); sd 683 source3/include/proto.h NTSTATUS sec_desc_mod_sid(SEC_DESC *sd, DOM_SID *sid, uint32 mask); sd 1272 source3/include/proto.h NTSTATUS se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token, sd 1725 source3/include/proto.h void ads_disp_sd(ADS_STRUCT *ads, TALLOC_CTX *mem_ctx, SEC_DESC *sd); sd 2803 source3/include/proto.h bool cli_set_secdesc(struct cli_state *cli, int fnum, SEC_DESC *sd); sd 4851 source3/include/proto.h void map_printer_permissions(SEC_DESC *sd); sd 4852 source3/include/proto.h void map_job_permissions(SEC_DESC *sd); sd 6598 source3/include/proto.h NTSTATUS smb1_file_se_access_check(const struct security_descriptor *sd, sd 6663 source3/include/proto.h struct security_descriptor *sd, sd 343 source3/include/vfs.h struct security_descriptor *sd, sd 52 source3/include/vfs_macros.h #define SMB_VFS_CREATE_FILE(conn, req, root_dir_fid, fname, create_file_flags, access_mask, share_access, create_disposition, create_options, file_attributes, oplock_request, allocation_size, sd, ea_list, result, pinfo, psbuf) (((conn)->vfs.ops.create_file)((conn)->vfs.handles.create_file, (req), (root_dir_fid), (fname), (create_file_flags), (access_mask), (share_access), (create_disposition), (create_options), (file_attributes), (oplock_request), (allocation_size), (sd), (ea_list), (result), (pinfo), (psbuf))) sd 186 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_CREATE_FILE(conn, req, root_dir_fid, fname, create_file_flags, access_mask, share_access, create_disposition, create_options, file_attributes, oplock_request, allocation_size, sd, ea_list, result, pinfo, psbuf) (((conn)->vfs_opaque.ops.create_file)((conn)->vfs_opaque.handles.create_file, (req), (root_dir_fid), (fname), (create_file_flags), (access_mask), (share_access), (create_disposition), (create_options), (file_attributes), (oplock_request), (allocation_size), (sd), (ea_list), (result), (pinfo), (psbuf))) sd 321 source3/include/vfs_macros.h #define SMB_VFS_NEXT_CREATE_FILE(handle, req, root_dir_fid, fname, create_file_flags, access_mask, share_access, create_disposition, create_options, file_attributes, oplock_request, allocation_size, sd, ea_list, result, pinfo, psbuf) (((handle)->vfs_next.ops.create_file)((handle)->vfs_next.handles.create_file, (req), (root_dir_fid), (fname), (create_file_flags), (access_mask), (share_access), (create_disposition), (create_options), (file_attributes), (oplock_request), (allocation_size), (sd), (ea_list), (result), (pinfo), (psbuf))) sd 247 source3/lib/ldb/samba/ldif_handlers.c struct security_descriptor *sd; sd 250 source3/lib/ldb/samba/ldif_handlers.c sd = sddl_decode(mem_ctx, (const char *)in->data, NULL); sd 251 source3/lib/ldb/samba/ldif_handlers.c if (sd == NULL) { sd 254 source3/lib/ldb/samba/ldif_handlers.c status = ndr_push_struct_blob(out, mem_ctx, sd, sd 256 source3/lib/ldb/samba/ldif_handlers.c talloc_free(sd); sd 269 source3/lib/ldb/samba/ldif_handlers.c struct security_descriptor *sd; sd 272 source3/lib/ldb/samba/ldif_handlers.c sd = talloc(mem_ctx, struct security_descriptor); sd 273 source3/lib/ldb/samba/ldif_handlers.c if (sd == NULL) { sd 276 source3/lib/ldb/samba/ldif_handlers.c status = ndr_pull_struct_blob(in, sd, sd, sd 279 source3/lib/ldb/samba/ldif_handlers.c talloc_free(sd); sd 282 source3/lib/ldb/samba/ldif_handlers.c out->data = (uint8_t *)sddl_encode(mem_ctx, sd, NULL); sd 283 source3/lib/ldb/samba/ldif_handlers.c talloc_free(sd); sd 106 source3/lib/secdesc.c uint32_t get_sec_info(const SEC_DESC *sd) sd 110 source3/lib/secdesc.c SMB_ASSERT(sd); sd 112 source3/lib/secdesc.c if (sd->owner_sid == NULL) { sd 115 source3/lib/secdesc.c if (sd->group_sid == NULL) { sd 118 source3/lib/secdesc.c if (sd->sacl == NULL) { sd 121 source3/lib/secdesc.c if (sd->dacl == NULL) { sd 146 source3/lib/secdesc.c owner_sid = new_sdb->sd->owner_sid ? new_sdb->sd->owner_sid : sd 147 source3/lib/secdesc.c old_sdb->sd->owner_sid; sd 149 source3/lib/secdesc.c group_sid = new_sdb->sd->group_sid ? new_sdb->sd->group_sid : sd 150 source3/lib/secdesc.c old_sdb->sd->group_sid; sd 152 source3/lib/secdesc.c secdesc_type = new_sdb->sd->type; sd 164 source3/lib/secdesc.c dacl = new_sdb->sd->dacl; sd 166 source3/lib/secdesc.c dacl = old_sdb->sd->dacl; sd 171 source3/lib/secdesc.c psd = make_sec_desc(ctx, new_sdb->sd->revision, secdesc_type, sd 418 source3/lib/secdesc.c if(sec_desc && ((dst->sd = dup_sec_desc(ctx, sec_desc)) == NULL)) { sd 434 source3/lib/secdesc.c return make_sec_desc_buf( ctx, src->sd_size, src->sd); sd 443 source3/lib/secdesc.c SEC_DESC *sd = 0; sd 461 source3/lib/secdesc.c if (!(sd = make_sec_desc(ctx, psd[0]->revision, psd[0]->type, psd[0]->owner_sid, sd 465 source3/lib/secdesc.c *psd = sd; sd 466 source3/lib/secdesc.c sd = 0; sd 474 source3/lib/secdesc.c NTSTATUS sec_desc_mod_sid(SEC_DESC *sd, DOM_SID *sid, uint32 mask) sd 478 source3/lib/secdesc.c if (!sd || !sid) sd 481 source3/lib/secdesc.c status = sec_ace_mod_sid(sd->dacl->aces, sd->dacl->num_aces, sid, mask); sd 495 source3/lib/secdesc.c SEC_DESC *sd = 0; sd 513 source3/lib/secdesc.c if (!(sd = make_sec_desc(ctx, psd[0]->revision, psd[0]->type, psd[0]->owner_sid, sd 517 source3/lib/secdesc.c *psd = sd; sd 518 source3/lib/secdesc.c sd = 0; sd 691 source3/lib/secdesc.c SEC_DESC *sd = NULL; sd 695 source3/lib/secdesc.c &sd, sd 705 source3/lib/secdesc.c *ppsdb = make_sec_desc_buf(ctx, size, sd); sd 1095 source3/lib/smbldap.c int sd; sd 1097 source3/lib/smbldap.c opt_rc = ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_DESC, &sd); sd 1098 source3/lib/smbldap.c if (opt_rc == 0 && (getpeername(sd, (struct sockaddr *) &addr, &len)) < 0 ) sd 108 source3/lib/util_seaccess.c static uint32_t access_check_max_allowed(const struct security_descriptor *sd, sd 114 source3/lib/util_seaccess.c if (is_sid_in_token(token, sd->owner_sid)) { sd 120 source3/lib/util_seaccess.c if (sd->dacl == NULL) { sd 124 source3/lib/util_seaccess.c for (i = 0;i<sd->dacl->num_aces; i++) { sd 125 source3/lib/util_seaccess.c struct security_ace *ace = &sd->dacl->aces[i]; sd 156 source3/lib/util_seaccess.c NTSTATUS se_access_check(const struct security_descriptor *sd, sd 171 source3/lib/util_seaccess.c access_desired |= access_check_max_allowed(sd, token); sd 195 source3/lib/util_seaccess.c if ((sd->type & SEC_DESC_DACL_PRESENT) && sd->dacl == NULL) { sd 202 source3/lib/util_seaccess.c is_sid_in_token(token, sd->owner_sid)) { sd 210 source3/lib/util_seaccess.c if (sd->dacl == NULL) { sd 215 source3/lib/util_seaccess.c for (i=0; bits_remaining && i < sd->dacl->num_aces; i++) { sd 216 source3/lib/util_seaccess.c struct security_ace *ace = &sd->dacl->aces[i]; sd 190 source3/libads/disp_sec.c void ads_disp_sd(ADS_STRUCT *ads, TALLOC_CTX *mem_ctx, SEC_DESC *sd) sd 195 source3/libads/disp_sec.c if (!sd) { sd 212 source3/libads/disp_sec.c sd->revision, sd 213 source3/libads/disp_sec.c sd->type); sd 215 source3/libads/disp_sec.c printf("owner SID: %s\n", sd->owner_sid ? sd 216 source3/libads/disp_sec.c sid_string_talloc(mem_ctx, sd->owner_sid) : "(null)"); sd 217 source3/libads/disp_sec.c printf("group SID: %s\n", sd->group_sid ? sd 218 source3/libads/disp_sec.c sid_string_talloc(mem_ctx, sd->group_sid) : "(null)"); sd 220 source3/libads/disp_sec.c ads_disp_acl(sd->sacl, "system"); sd 221 source3/libads/disp_sec.c if (sd->sacl) { sd 222 source3/libads/disp_sec.c for (i = 0; i < sd->sacl->num_aces; i ++) { sd 223 source3/libads/disp_sec.c ads_disp_ace(ads, mem_ctx, &sd->sacl->aces[i]); sd 227 source3/libads/disp_sec.c ads_disp_acl(sd->dacl, "user"); sd 228 source3/libads/disp_sec.c if (sd->dacl) { sd 229 source3/libads/disp_sec.c for (i = 0; i < sd->dacl->num_aces; i ++) { sd 230 source3/libads/disp_sec.c ads_disp_ace(ads, mem_ctx, &sd->dacl->aces[i]); sd 2695 source3/libads/ldap.c LDAPMessage *msg, const char *field, SEC_DESC **sd) sd 2708 source3/libads/ldap.c values[0]->bv_len, sd); sd 688 source3/libgpo/gpo_reg.c struct security_descriptor **sd, sd 741 source3/libgpo/gpo_reg.c *sd = make_sec_desc(mem_ctx, SEC_DESC_REVISION, sd 747 source3/libgpo/gpo_reg.c W_ERROR_HAVE_NO_MEMORY(*sd); sd 760 source3/libgpo/gpo_reg.c struct security_descriptor *sd = NULL; sd 769 source3/libgpo/gpo_reg.c werr = gp_reg_generate_sd(mem_ctx, sd_sid, &sd, &sd_size); sd 772 source3/libgpo/gpo_reg.c return reg_setkeysecurity(key, sd); sd 150 source3/libgpo/gpo_sec.c SEC_DESC *sd = gpo->security_descriptor; sd 159 source3/libgpo/gpo_sec.c if (!sd) { sd 163 source3/libgpo/gpo_sec.c dacl = sd->dacl; sd 73 source3/libsmb/clisecdesc.c bool cli_set_secdesc(struct cli_state *cli, int fnum, SEC_DESC *sd) sd 85 source3/libsmb/clisecdesc.c status = marshall_sec_desc(talloc_tos(), sd, &data, &len); sd 94 source3/libsmb/clisecdesc.c if (sd->dacl) sd 96 source3/libsmb/clisecdesc.c if (sd->owner_sid) sd 98 source3/libsmb/clisecdesc.c if (sd->group_sid) sd 734 source3/libsmb/libsmb_xattr.c SEC_DESC *sd; sd 913 source3/libsmb/libsmb_xattr.c sd = cli_query_secdesc(targetcli, fnum, ctx); sd 915 source3/libsmb/libsmb_xattr.c if (!sd) { sd 929 source3/libsmb/libsmb_xattr.c sd->revision); sd 938 source3/libsmb/libsmb_xattr.c sd->revision); sd 943 source3/libsmb/libsmb_xattr.c sd->revision); sd 951 source3/libsmb/libsmb_xattr.c sd->revision); sd 967 source3/libsmb/libsmb_xattr.c if (sd->owner_sid) { sd 971 source3/libsmb/libsmb_xattr.c sd->owner_sid); sd 1014 source3/libsmb/libsmb_xattr.c if (sd->group_sid) { sd 1017 source3/libsmb/libsmb_xattr.c sd->group_sid); sd 1061 source3/libsmb/libsmb_xattr.c for (i = 0; sd->dacl && i < sd->dacl->num_aces; i++) { sd 1063 source3/libsmb/libsmb_xattr.c SEC_ACE *ace = &sd->dacl->aces[i]; sd 1512 source3/libsmb/libsmb_xattr.c SEC_DESC *sd = NULL, *old; sd 1536 source3/libsmb/libsmb_xattr.c sd = sec_desc_parse(ctx, ipc_cli, pol, numeric, the_acl); sd 1538 source3/libsmb/libsmb_xattr.c if (!sd) { sd 1547 source3/libsmb/libsmb_xattr.c if (!sd && (mode != SMBC_XATTR_MODE_REMOVE_ALL)) { sd 1589 source3/libsmb/libsmb_xattr.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) { sd 1593 source3/libsmb/libsmb_xattr.c if (sec_ace_equal(&sd->dacl->aces[i], sd 1616 source3/libsmb/libsmb_xattr.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) { sd 1620 source3/libsmb/libsmb_xattr.c if (sid_equal(&sd->dacl->aces[i].trustee, sd 1627 source3/libsmb/libsmb_xattr.c old->dacl->aces[j] = sd->dacl->aces[i]; sd 1639 source3/libsmb/libsmb_xattr.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) { sd 1640 source3/libsmb/libsmb_xattr.c add_ace(&old->dacl, &sd->dacl->aces[i], ctx); sd 1647 source3/libsmb/libsmb_xattr.c old = sd; sd 1654 source3/libsmb/libsmb_xattr.c owner_sid = sd->owner_sid; sd 1658 source3/libsmb/libsmb_xattr.c group_sid = sd->group_sid; sd 1666 source3/libsmb/libsmb_xattr.c sd = make_sec_desc(ctx, old->revision, SEC_DESC_SELF_RELATIVE, sd 1679 source3/libsmb/libsmb_xattr.c if (!cli_set_secdesc(targetcli, fnum, sd)) { sd 58 source3/modules/onefs.h struct security_descriptor *sd, sd 140 source3/modules/onefs.h struct ifs_security_descriptor *sd, int snum, sd 162 source3/modules/onefs.h struct security_descriptor *sd, sd 369 source3/modules/onefs_acl.c onefs_canon_acl(files_struct *fsp, struct ifs_security_descriptor *sd) sd 377 source3/modules/onefs_acl.c if (sd == NULL || sd->dacl == NULL || sd->dacl->num_aces == 0) sd 412 source3/modules/onefs_acl.c new_aces = SMB_MALLOC_ARRAY(struct ifs_ace, sd->dacl->num_aces); sd 420 source3/modules/onefs_acl.c for (cur = 0; cur < sd->dacl->num_aces; cur++) { sd 421 source3/modules/onefs_acl.c if (sd->dacl->aces[cur].flags & IFS_ACE_FLAG_INHERITED_ACE) sd 422 source3/modules/onefs_acl.c new_aces[new_aces_count++] = sd->dacl->aces[cur]; sd 425 source3/modules/onefs_acl.c for (cur = 0; cur < sd->dacl->num_aces; cur++) { sd 426 source3/modules/onefs_acl.c if (!(sd->dacl->aces[cur].flags & IFS_ACE_FLAG_INHERITED_ACE) && sd 427 source3/modules/onefs_acl.c (sd->dacl->aces[cur].type == IFS_ACE_TYPE_ACCESS_DENIED)) sd 428 source3/modules/onefs_acl.c new_aces[new_aces_count++] = sd->dacl->aces[cur]; sd 431 source3/modules/onefs_acl.c for (cur = 0; cur < sd->dacl->num_aces; cur++) { sd 432 source3/modules/onefs_acl.c if (!(sd->dacl->aces[cur].flags & IFS_ACE_FLAG_INHERITED_ACE) && sd 433 source3/modules/onefs_acl.c !(sd->dacl->aces[cur].type == IFS_ACE_TYPE_ACCESS_DENIED)) sd 434 source3/modules/onefs_acl.c new_aces[new_aces_count++] = sd->dacl->aces[cur]; sd 437 source3/modules/onefs_acl.c SMB_ASSERT(new_aces_count == sd->dacl->num_aces); sd 449 source3/modules/onefs_acl.c memcpy(sd->dacl->aces, new_aces, sd 529 source3/modules/onefs_acl.c static bool add_sfs_aces(files_struct *fsp, struct ifs_security_descriptor *sd) sd 567 source3/modules/onefs_acl.c old_aces = sd->dacl->aces; sd 569 source3/modules/onefs_acl.c sd->dacl->aces = SMB_MALLOC_ARRAY(struct ifs_ace, sd 570 source3/modules/onefs_acl.c sd->dacl->num_aces + num_aces_to_add); sd 571 source3/modules/onefs_acl.c if (!sd->dacl->aces) { sd 574 source3/modules/onefs_acl.c sd->dacl->num_aces + num_aces_to_add)); sd 577 source3/modules/onefs_acl.c memcpy(sd->dacl->aces, old_aces, sd 578 source3/modules/onefs_acl.c sizeof(struct ifs_ace) * sd->dacl->num_aces); sd 583 source3/modules/onefs_acl.c sd->dacl->aces[sd->dacl->num_aces] = sd 585 source3/modules/onefs_acl.c sd->dacl->num_aces++; sd 607 source3/modules/onefs_acl.c struct ifs_security_descriptor *sd = NULL; sd 658 source3/modules/onefs_acl.c sd = SMB_REALLOC(sd, sd_size); sd 659 source3/modules/onefs_acl.c if (!sd) { sd 670 source3/modules/onefs_acl.c sd_size, &sd_size, sd); sd 685 source3/modules/onefs_acl.c sd->dacl) { sd 686 source3/modules/onefs_acl.c if(!(new_aces_alloced = add_sfs_aces(fsp, sd))) sd 690 source3/modules/onefs_acl.c if (!(onefs_canon_acl(fsp, sd))) { sd 704 source3/modules/onefs_acl.c if (!onefs_identity_to_sid(sd->owner, &owner_sid)) { sd 714 source3/modules/onefs_acl.c if (!onefs_identity_to_sid(sd->group, &group_sid)) { sd 724 source3/modules/onefs_acl.c if (!onefs_acl_to_samba_acl(sd->dacl, &dacl)) { sd 732 source3/modules/onefs_acl.c if (!onefs_acl_to_samba_acl(sd->sacl, &sacl)) { sd 741 source3/modules/onefs_acl.c sd->control &= ~(IFS_SD_CTRL_DACL_AUTO_INHERIT_REQ | sd 744 source3/modules/onefs_acl.c pdesc = make_sec_desc(talloc_tos(), sd->revision, sd->control, sd 761 source3/modules/onefs_acl.c if (alloced && sd) { sd 762 source3/modules/onefs_acl.c if (new_aces_alloced && sd->dacl->aces) sd 763 source3/modules/onefs_acl.c SAFE_FREE(sd->dacl->aces); sd 765 source3/modules/onefs_acl.c SAFE_FREE(sd); sd 814 source3/modules/onefs_acl.c struct ifs_security_descriptor *sd, int snum, sd 881 source3/modules/onefs_acl.c if (aclu_initialize_sd(sd, psd->type, ownerp, groupp, sd 901 source3/modules/onefs_acl.c struct ifs_security_descriptor sd = {}; sd 911 source3/modules/onefs_acl.c status = onefs_samba_sd_to_sd(sec_info_sent, psd, &sd, sd 945 source3/modules/onefs_acl.c if (ifs_set_security_descriptor(fd, sec_info_effective, &sd)) { sd 962 source3/modules/onefs_acl.c aclu_free_sd(&sd, false); sd 57 source3/modules/onefs_open.c struct security_descriptor *sd, sd 84 source3/modules/onefs_open.c struct security_descriptor *sd, sd 220 source3/modules/onefs_open.c sd, sd 438 source3/modules/onefs_open.c struct security_descriptor *sd, sd 899 source3/modules/onefs_open.c sd, sd 1339 source3/modules/onefs_open.c struct security_descriptor *sd, sd 1453 source3/modules/onefs_open.c sd, sd 1639 source3/modules/onefs_open.c struct security_descriptor *sd, sd 1663 source3/modules/onefs_open.c ea_list, sd, fname)); sd 1782 source3/modules/onefs_open.c if (sd != NULL) { sd 1783 source3/modules/onefs_open.c security_acl_map_generic(sd->dacl, &file_generic_mapping); sd 1784 source3/modules/onefs_open.c security_acl_map_generic(sd->sacl, &file_generic_mapping); sd 1820 source3/modules/onefs_open.c sd, /* sd */ sd 1853 source3/modules/onefs_open.c sd, /* sd */ sd 1894 source3/modules/onefs_open.c sd, /* sd */ sd 2002 source3/modules/onefs_open.c struct security_descriptor *sd, sd 2029 source3/modules/onefs_open.c ea_list, sd, create_file_flags, fname)); sd 2110 source3/modules/onefs_open.c sd, /* sd */ sd 89 source3/modules/onefs_system.c struct security_descriptor *sd, sd 105 source3/modules/onefs_system.c if (sd != NULL) { sd 109 source3/modules/onefs_system.c sec_info_sent = (get_sec_info(sd) & IFS_SEC_INFO_KNOWN_MASK); sd 111 source3/modules/onefs_system.c status = onefs_samba_sd_to_sd(sec_info_sent, sd, &ifs_sd, sd 177 source3/modules/onefs_system.c sec_info_effective, sd, sd 159 source3/modules/vfs_acl_tdb.c *ppdesc = make_sec_desc(ctx, SEC_DESC_REVISION, xacl.info.sd_hs->sd->type | SEC_DESC_SELF_RELATIVE, sd 161 source3/modules/vfs_acl_tdb.c ? xacl.info.sd_hs->sd->owner_sid : NULL, sd 163 source3/modules/vfs_acl_tdb.c ? xacl.info.sd_hs->sd->group_sid : NULL, sd 165 source3/modules/vfs_acl_tdb.c ? xacl.info.sd_hs->sd->sacl : NULL, sd 167 source3/modules/vfs_acl_tdb.c ? xacl.info.sd_hs->sd->dacl : NULL, sd 170 source3/modules/vfs_acl_tdb.c TALLOC_FREE(xacl.info.sd); sd 249 source3/modules/vfs_acl_tdb.c xacl.info.sd_hs->sd = CONST_DISCARD(struct security_descriptor *, psd); sd 56 source3/modules/vfs_acl_xattr.c *ppdesc = make_sec_desc(ctx, SEC_DESC_REVISION, xacl.info.sd_hs->sd->type | SEC_DESC_SELF_RELATIVE, sd 58 source3/modules/vfs_acl_xattr.c ? xacl.info.sd_hs->sd->owner_sid : NULL, sd 60 source3/modules/vfs_acl_xattr.c ? xacl.info.sd_hs->sd->group_sid : NULL, sd 62 source3/modules/vfs_acl_xattr.c ? xacl.info.sd_hs->sd->sacl : NULL, sd 64 source3/modules/vfs_acl_xattr.c ? xacl.info.sd_hs->sd->dacl : NULL, sd 67 source3/modules/vfs_acl_xattr.c TALLOC_FREE(xacl.info.sd); sd 146 source3/modules/vfs_acl_xattr.c xacl.info.sd_hs->sd = CONST_DISCARD(struct security_descriptor *, psd); sd 289 source3/modules/vfs_default.c struct security_descriptor *sd, sd 299 source3/modules/vfs_default.c allocation_size, sd, ea_list, result, pinfo, sd 127 source3/modules/vfs_full_audit.c struct security_descriptor *sd, sd 1204 source3/modules/vfs_full_audit.c struct security_descriptor *sd, sd 1225 source3/modules/vfs_full_audit.c sd, /* sd */ sd 217 source3/modules/vfs_onefs_shadow_copy.c struct security_descriptor *sd, sd 227 source3/modules/vfs_onefs_shadow_copy.c oplock_request, allocation_size, sd, ea_list, result, sd 363 source3/printing/nt_printing.c sec = sd_orig->sd; sd 412 source3/printing/nt_printing.c sd_size = ndr_size_security_descriptor(sd_store->sd, NULL, 0) sd 5312 source3/printing/nt_printing.c if (!secdesc_ctr->sd->owner_sid || !secdesc_ctr->sd->group_sid) { sd 5325 source3/printing/nt_printing.c owner_sid = secdesc_ctr->sd->owner_sid ? sd 5326 source3/printing/nt_printing.c secdesc_ctr->sd->owner_sid : sd 5327 source3/printing/nt_printing.c old_secdesc_ctr->sd->owner_sid; sd 5329 source3/printing/nt_printing.c group_sid = secdesc_ctr->sd->group_sid ? sd 5330 source3/printing/nt_printing.c secdesc_ctr->sd->group_sid : sd 5331 source3/printing/nt_printing.c old_secdesc_ctr->sd->group_sid; sd 5333 source3/printing/nt_printing.c dacl = secdesc_ctr->sd->dacl ? sd 5334 source3/printing/nt_printing.c secdesc_ctr->sd->dacl : sd 5335 source3/printing/nt_printing.c old_secdesc_ctr->sd->dacl; sd 5337 source3/printing/nt_printing.c sacl = secdesc_ctr->sd->sacl ? sd 5338 source3/printing/nt_printing.c secdesc_ctr->sd->sacl : sd 5339 source3/printing/nt_printing.c old_secdesc_ctr->sd->sacl; sd 5343 source3/printing/nt_printing.c psd = make_sec_desc(mem_ctx, secdesc_ctr->sd->revision, secdesc_ctr->sd->type, sd 5526 source3/printing/nt_printing.c if (sid_equal((*secdesc_ctr)->sd->owner_sid, &global_sid_World)) { sd 5540 source3/printing/nt_printing.c psd = make_sec_desc(ctx, (*secdesc_ctr)->sd->revision, (*secdesc_ctr)->sd->type, sd 5542 source3/printing/nt_printing.c (*secdesc_ctr)->sd->group_sid, sd 5543 source3/printing/nt_printing.c (*secdesc_ctr)->sd->sacl, sd 5544 source3/printing/nt_printing.c (*secdesc_ctr)->sd->dacl, sd 5567 source3/printing/nt_printing.c SEC_ACL *the_acl = (*secdesc_ctr)->sd->dacl; sd 5624 source3/printing/nt_printing.c void map_printer_permissions(SEC_DESC *sd) sd 5628 source3/printing/nt_printing.c for (i = 0; sd->dacl && i < sd->dacl->num_aces; i++) { sd 5629 source3/printing/nt_printing.c se_map_generic(&sd->dacl->aces[i].access_mask, sd 5634 source3/printing/nt_printing.c void map_job_permissions(SEC_DESC *sd) sd 5638 source3/printing/nt_printing.c for (i = 0; sd->dacl && i < sd->dacl->num_aces; i++) { sd 5639 source3/printing/nt_printing.c se_map_generic(&sd->dacl->aces[i].access_mask, sd 5716 source3/printing/nt_printing.c status = se_create_child_secdesc_buf(mem_ctx, &secdesc, parent_secdesc->sd, False); sd 5724 source3/printing/nt_printing.c map_job_permissions(secdesc->sd); sd 5726 source3/printing/nt_printing.c map_printer_permissions(secdesc->sd); sd 5730 source3/printing/nt_printing.c status = se_access_check(secdesc->sd, server_info->ptok, access_type, sd 458 source3/registry/reg_backend_printing.c info2->secdesc_buf->sd && sd 464 source3/registry/reg_backend_printing.c status = marshall_sec_desc(values, info2->secdesc_buf->sd, sd 41 source3/registry/reg_dispatcher.c SEC_DESC *sd; sd 67 source3/registry/reg_dispatcher.c sd = make_sec_desc(ctx, SEC_DESC_REVISION, SEC_DESC_SELF_RELATIVE, sd 71 source3/registry/reg_dispatcher.c if (sd == NULL) { sd 75 source3/registry/reg_dispatcher.c *psd = sd; sd 956 source3/registry/regfio.c static REGF_SK_REC* find_sk_record_by_sec_desc( REGF_FILE *file, SEC_DESC *sd ) sd 961 source3/registry/regfio.c if ( sec_desc_equal( p->sec_desc, sd ) ) sd 1570 source3/registry/regfio.c static uint32 sk_record_data_size( SEC_DESC * sd ) sd 1578 source3/registry/regfio.c size = sizeof(uint32)*5 + ndr_size_security_descriptor(sd, NULL, 0) + sizeof(uint32); sd 290 source3/rpc_server/srv_lsa_nt.c static NTSTATUS make_lsa_object_sd(TALLOC_CTX *mem_ctx, SEC_DESC **sd, size_t *sd_size, sd 328 source3/rpc_server/srv_lsa_nt.c if((*sd = make_sec_desc(mem_ctx, SECURITY_DESCRIPTOR_REVISION_1, sd 790 source3/rpc_server/srv_samr_nt.c dacl = r->in.sdbuf->sd->dacl; sd 665 source3/rpc_server/srv_spoolss_nt.c _data->data.sd.sd = dup_sec_desc(mem_ctx, _sd); \ sd 666 source3/rpc_server/srv_spoolss_nt.c if (!_data->data.sd.sd) { \ sd 667 source3/rpc_server/srv_spoolss_nt.c _data->data.sd.sd_size = 0; \ sd 669 source3/rpc_server/srv_spoolss_nt.c _data->data.sd.sd_size = _size; sd 3012 source3/rpc_server/srv_spoolss_nt.c printer->info_2->secdesc_buf->sd); sd 3987 source3/rpc_server/srv_spoolss_nt.c ntprinter->info_2->secdesc_buf->sd); sd 4214 source3/rpc_server/srv_spoolss_nt.c r->secdesc = dup_sec_desc(mem_ctx, ntprinter->info_2->secdesc_buf->sd); sd 5824 source3/rpc_server/srv_spoolss_nt.c the_acl = old_secdesc_ctr->sd->dacl; sd 5834 source3/rpc_server/srv_spoolss_nt.c the_acl = secdesc_ctr->sd->dacl; sd 5856 source3/rpc_server/srv_spoolss_nt.c if (sec_desc_equal(new_secdesc_ctr->sd, old_secdesc_ctr->sd)) { sd 6315 source3/rpc_server/srv_spoolss_nt.c if (r->in.secdesc_ctr->sd) sd 7606 source3/rpc_server/srv_spoolss_nt.c r->in.secdesc_ctr->sd, sd 374 source3/rpc_server/srv_srvsvc_nt.c SEC_DESC *sd = NULL; sd 396 source3/rpc_server/srv_srvsvc_nt.c sd = get_share_security(ctx, lp_servicename(snum), &sd_size); sd 398 source3/rpc_server/srv_srvsvc_nt.c sd_buf = make_sec_desc_buf(p->mem_ctx, sd_size, sd); sd 472 source3/rpc_server/srv_srvsvc_nt.c SEC_DESC *sd; sd 476 source3/rpc_server/srv_srvsvc_nt.c sd = get_share_security(ctx, lp_servicename(snum), &sd_size); sd 478 source3/rpc_server/srv_srvsvc_nt.c r = make_sec_desc_buf(p->mem_ctx, sd_size, sd); sd 1571 source3/rpc_server/srv_srvsvc_nt.c psd = info->info502->sd_buf.sd; sd 1598 source3/rpc_server/srv_srvsvc_nt.c psd = info->info1501->sd; sd 1770 source3/rpc_server/srv_srvsvc_nt.c psd = r->in.info->info502->sd_buf.sd; sd 2131 source3/rpc_server/srv_srvsvc_nt.c sd_buf->sd = psd; sd 2225 source3/rpc_server/srv_srvsvc_nt.c psd = r->in.sd_buf->sd; sd 139 source3/rpc_server/srv_svcctl_nt.c SEC_DESC *sd; sd 159 source3/rpc_server/srv_svcctl_nt.c if ( !(sd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1, sd 164 source3/rpc_server/srv_svcctl_nt.c return sd; sd 837 source3/rpc_server/srv_winreg_nt.c if (len > r->out.sd->size) { sd 838 source3/rpc_server/srv_winreg_nt.c r->out.sd->size = len; sd 842 source3/rpc_server/srv_winreg_nt.c r->out.sd->size = len; sd 843 source3/rpc_server/srv_winreg_nt.c r->out.sd->len = len; sd 844 source3/rpc_server/srv_winreg_nt.c r->out.sd->data = data; sd 866 source3/rpc_server/srv_winreg_nt.c err = ntstatus_to_werror(unmarshall_sec_desc(p->mem_ctx, r->in.sd->data, sd 867 source3/rpc_server/srv_winreg_nt.c r->in.sd->len, &secdesc)); sd 942 source3/rpcclient/cmd_lsarpc.c display_sec_desc(sdb->sd); sd 2216 source3/rpcclient/cmd_samr.c display_sec_desc(sec_desc_buf->sd); sd 241 source3/rpcclient/cmd_srvsvc.c if (r->sd_buf.sd) sd 242 source3/rpcclient/cmd_srvsvc.c display_sec_desc(r->sd_buf.sd); sd 639 source3/rpcclient/cmd_srvsvc.c display_sec_desc(sd_buf->sd); sd 93 source3/services/services_db.c SEC_DESC *sd = NULL; sd 115 source3/services/services_db.c if ( !(sd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1, sd 120 source3/services/services_db.c return sd; sd 343 source3/services/services_db.c SEC_DESC *sd = NULL; sd 417 source3/services/services_db.c if ( !(sd = construct_service_sd(key_secdesc)) ) { sd 423 source3/services/services_db.c status = marshall_sec_desc(key_secdesc, sd, &sd_blob.data, sd 855 source3/smbd/nttrans.c struct security_descriptor *sd = NULL; sd 936 source3/smbd/nttrans.c &sd); sd 999 source3/smbd/nttrans.c sd, /* sd */ sd 42 source3/smbd/open.c struct security_descriptor *sd, sd 53 source3/smbd/open.c NTSTATUS smb1_file_se_access_check(const struct security_descriptor *sd, sd 58 source3/smbd/open.c return se_access_check(sd, sd 75 source3/smbd/open.c struct security_descriptor *sd; sd 91 source3/smbd/open.c DACL_SECURITY_INFORMATION),&sd); sd 101 source3/smbd/open.c status = smb1_file_se_access_check(sd, sd 106 source3/smbd/open.c TALLOC_FREE(sd); sd 1357 source3/smbd/open.c struct security_descriptor *sd; sd 1363 source3/smbd/open.c DACL_SECURITY_INFORMATION),&sd); sd 1373 source3/smbd/open.c status = smb1_file_se_access_check(sd, sd 1378 source3/smbd/open.c TALLOC_FREE(sd); sd 2872 source3/smbd/open.c struct security_descriptor *sd, sd 2896 source3/smbd/open.c ea_list, sd, fname)); sd 2974 source3/smbd/open.c sd && (sd->sacl != NULL)) { sd 3138 source3/smbd/open.c if ((sd != NULL) && (info == FILE_WAS_CREATED) sd 3144 source3/smbd/open.c sec_info_sent = get_sec_info(sd); sd 3149 source3/smbd/open.c security_acl_map_generic(sd->dacl, &file_generic_mapping); sd 3150 source3/smbd/open.c security_acl_map_generic(sd->sacl, &file_generic_mapping); sd 3156 source3/smbd/open.c status = SMB_VFS_FSET_NT_ACL(fsp, sec_info_sent, sd); sd 3340 source3/smbd/open.c struct security_descriptor *sd, sd 3366 source3/smbd/open.c ea_list, sd, create_file_flags, fname)); sd 3488 source3/smbd/open.c oplock_request, allocation_size, sd, ea_list, sd 3571 source3/utils/net_rpc.c display_sec_desc(info502.sd_buf.sd); sd 4276 source3/utils/net_rpc.c share_sd = info.info502->sd_buf.sd; sd 153 source3/utils/net_rpc_printer.c SEC_DESC *sd = NULL; sd 178 source3/utils/net_rpc_printer.c sd = cli_query_secdesc(cli_share_src, fnum_src, mem_ctx); sd 179 source3/utils/net_rpc_printer.c if (!sd) { sd 187 source3/utils/net_rpc_printer.c display_sec_desc(sd); sd 228 source3/utils/net_rpc_printer.c if (!cli_set_secdesc(cli_share_dst, fnum_dst, sd)) { sd 339 source3/utils/net_rpc_registry.c struct KeySecurityData *sd) sd 342 source3/utils/net_rpc_registry.c sec_info, sd, NULL); sd 1145 source3/utils/net_rpc_registry.c struct KeySecurityData *sd = NULL; sd 1168 source3/utils/net_rpc_registry.c sd = TALLOC_ZERO_P(mem_ctx, struct KeySecurityData); sd 1169 source3/utils/net_rpc_registry.c if (!sd) { sd 1174 source3/utils/net_rpc_registry.c sd->size = 0x1000; sd 1182 source3/utils/net_rpc_registry.c status = registry_getsd(mem_ctx, pipe_hnd, &pol_key, sec_info, sd); sd 1189 source3/utils/net_rpc_registry.c blob.data = sd->data; sd 1190 source3/utils/net_rpc_registry.c blob.length = sd->size; sd 58 source3/utils/profiles.c static bool swap_sid_in_acl( SEC_DESC *sd, DOM_SID *s1, DOM_SID *s2 ) sd 64 source3/utils/profiles.c verbose_output(" Owner SID: %s\n", sid_string_tos(sd->owner_sid)); sd 65 source3/utils/profiles.c if ( sid_equal( sd->owner_sid, s1 ) ) { sd 66 source3/utils/profiles.c sid_copy( sd->owner_sid, s2 ); sd 69 source3/utils/profiles.c sid_string_tos(sd->owner_sid)); sd 73 source3/utils/profiles.c verbose_output(" Group SID: %s\n", sid_string_tos(sd->group_sid)); sd 74 source3/utils/profiles.c if ( sid_equal( sd->group_sid, s1 ) ) { sd 75 source3/utils/profiles.c sid_copy( sd->group_sid, s2 ); sd 78 source3/utils/profiles.c sid_string_tos(sd->group_sid)); sd 81 source3/utils/profiles.c theacl = sd->dacl; sd 95 source3/utils/profiles.c theacl = sd->sacl; sd 127 source3/utils/sharesec.c static void sec_desc_print(FILE *f, SEC_DESC *sd) sd 131 source3/utils/sharesec.c fprintf(f, "REVISION:%d\n", sd->revision); sd 135 source3/utils/sharesec.c fprintf(f, "OWNER:%s\n", sid_string_tos(sd->owner_sid)); sd 137 source3/utils/sharesec.c fprintf(f, "GROUP:%s\n", sid_string_tos(sd->group_sid)); sd 140 source3/utils/sharesec.c for (i = 0; sd->dacl && i < sd->dacl->num_aces; i++) { sd 141 source3/utils/sharesec.c SEC_ACE *ace = &sd->dacl->aces[i]; sd 299 source3/utils/sharesec.c SEC_DESC *sd = NULL; sd 332 source3/utils/sharesec.c sd = make_sec_desc( mem_ctx, SEC_DESC_REVISION, SEC_DESC_SELF_RELATIVE, sd 335 source3/utils/sharesec.c return sd; sd 409 source3/utils/sharesec.c SEC_DESC *sd = NULL; sd 423 source3/utils/sharesec.c !(sd = parse_acl_string(mem_ctx, the_acl, &sd_size )) ) { sd 433 source3/utils/sharesec.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) { sd 437 source3/utils/sharesec.c if (sec_ace_equal(&sd->dacl->aces[i], &old->dacl->aces[j])) { sd 450 source3/utils/sharesec.c print_ace(stdout, &sd->dacl->aces[i]); sd 456 source3/utils/sharesec.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) { sd 460 source3/utils/sharesec.c if (sid_equal(&sd->dacl->aces[i].trustee, sd 462 source3/utils/sharesec.c old->dacl->aces[j] = sd->dacl->aces[i]; sd 469 source3/utils/sharesec.c sid_string_tos(&sd->dacl->aces[i].trustee)); sd 473 source3/utils/sharesec.c if (sd->owner_sid) { sd 474 source3/utils/sharesec.c old->owner_sid = sd->owner_sid; sd 477 source3/utils/sharesec.c if (sd->group_sid) { sd 478 source3/utils/sharesec.c old->group_sid = sd->group_sid; sd 482 source3/utils/sharesec.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) { sd 483 source3/utils/sharesec.c add_ace(mem_ctx, &old->dacl, &sd->dacl->aces[i]); sd 487 source3/utils/sharesec.c old = sd; sd 621 source3/utils/smbcacls.c static void sec_desc_print(struct cli_state *cli, FILE *f, SEC_DESC *sd) sd 626 source3/utils/smbcacls.c fprintf(f, "REVISION:%d\n", sd->revision); sd 627 source3/utils/smbcacls.c fprintf(f, "CONTROL:0x%x\n", sd->type); sd 631 source3/utils/smbcacls.c if (sd->owner_sid) { sd 632 source3/utils/smbcacls.c SidToString(cli, sidstr, sd->owner_sid); sd 639 source3/utils/smbcacls.c if (sd->group_sid) { sd 640 source3/utils/smbcacls.c SidToString(cli, sidstr, sd->group_sid); sd 648 source3/utils/smbcacls.c for (i = 0; sd->dacl && i < sd->dacl->num_aces; i++) { sd 649 source3/utils/smbcacls.c SEC_ACE *ace = &sd->dacl->aces[i]; sd 664 source3/utils/smbcacls.c SEC_DESC *sd; sd 676 source3/utils/smbcacls.c sd = cli_query_secdesc(cli, fnum, talloc_tos()); sd 678 source3/utils/smbcacls.c if (!sd) { sd 683 source3/utils/smbcacls.c sec_desc_print(cli, stdout, sd); sd 704 source3/utils/smbcacls.c SEC_DESC *sd, *old; sd 726 source3/utils/smbcacls.c sd = make_sec_desc(talloc_tos(),old->revision, old->type, sd 738 source3/utils/smbcacls.c if (!cli_set_secdesc(cli, fnum, sd)) { sd 819 source3/utils/smbcacls.c SEC_DESC *sd, *old; sd 824 source3/utils/smbcacls.c sd = sec_desc_parse(talloc_tos(), cli, the_acl); sd 826 source3/utils/smbcacls.c if (!sd) return EXIT_PARSE_ERROR; sd 851 source3/utils/smbcacls.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) { sd 855 source3/utils/smbcacls.c if (sec_ace_equal(&sd->dacl->aces[i], sd 869 source3/utils/smbcacls.c print_ace(cli, stdout, &sd->dacl->aces[i]); sd 876 source3/utils/smbcacls.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) { sd 880 source3/utils/smbcacls.c if (sid_equal(&sd->dacl->aces[i].trustee, sd 882 source3/utils/smbcacls.c old->dacl->aces[j] = sd->dacl->aces[i]; sd 891 source3/utils/smbcacls.c &sd->dacl->aces[i].trustee); sd 896 source3/utils/smbcacls.c if (sd->owner_sid) { sd 897 source3/utils/smbcacls.c old->owner_sid = sd->owner_sid; sd 900 source3/utils/smbcacls.c if (sd->group_sid) { sd 901 source3/utils/smbcacls.c old->group_sid = sd->group_sid; sd 907 source3/utils/smbcacls.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) { sd 908 source3/utils/smbcacls.c add_ace(&old->dacl, &sd->dacl->aces[i]); sd 913 source3/utils/smbcacls.c old = sd; sd 929 source3/utils/smbcacls.c sd = make_sec_desc(talloc_tos(),old->revision, old->type, sd 940 source3/utils/smbcacls.c if (!cli_set_secdesc(cli, fnum, sd)) { sd 1953 source4/client/client.c NDR_PRINT_DEBUG(security_descriptor, query.query_secdesc.out.sd); sd 992 source4/dsdb/common/util.c struct security_descriptor *sd; sd 994 source4/dsdb/common/util.c sd = security_descriptor_initialise(mem_ctx); sd 996 source4/dsdb/common/util.c return sd; sd 241 source4/dsdb/samdb/ldb_modules/objectclass.c struct security_descriptor *sd; sd 248 source4/dsdb/samdb/ldb_modules/objectclass.c sd = sddl_decode(mem_ctx, sd 252 source4/dsdb/samdb/ldb_modules/objectclass.c if (!sd || !session_info || !session_info->security_token) { sd 256 source4/dsdb/samdb/ldb_modules/objectclass.c sd->owner_sid = session_info->security_token->user_sid; sd 257 source4/dsdb/samdb/ldb_modules/objectclass.c sd->group_sid = session_info->security_token->group_sid; sd 266 source4/dsdb/samdb/ldb_modules/objectclass.c sd, sd 589 source4/dsdb/samdb/ldb_modules/objectclass.c DATA_BLOB *sd = get_sd(ac->module, mem_ctx, current->objectclass); sd 590 source4/dsdb/samdb/ldb_modules/objectclass.c if (sd) { sd 591 source4/dsdb/samdb/ldb_modules/objectclass.c ldb_msg_add_steal_value(msg, "nTSecurityDescriptor", sd); sd 702 source4/heimdal/lib/hx509/cms.c any_to_certs(hx509_context context, const SignedData *sd, hx509_certs certs) sd 706 source4/heimdal/lib/hx509/cms.c if (sd->certificates == NULL) sd 709 source4/heimdal/lib/hx509/cms.c for (i = 0; i < sd->certificates->len; i++) { sd 713 source4/heimdal/lib/hx509/cms.c sd->certificates->val[i].data, sd 714 source4/heimdal/lib/hx509/cms.c sd->certificates->val[i].length, sd 769 source4/heimdal/lib/hx509/cms.c SignedData sd; sd 779 source4/heimdal/lib/hx509/cms.c memset(&sd, 0, sizeof(sd)); sd 781 source4/heimdal/lib/hx509/cms.c ret = decode_SignedData(data, length, &sd, &size); sd 788 source4/heimdal/lib/hx509/cms.c if (sd.encapContentInfo.eContent == NULL && signedContent == NULL) { sd 794 source4/heimdal/lib/hx509/cms.c if (sd.encapContentInfo.eContent && signedContent) { sd 800 source4/heimdal/lib/hx509/cms.c if (sd.encapContentInfo.eContent) sd 801 source4/heimdal/lib/hx509/cms.c signedContent = sd.encapContentInfo.eContent; sd 815 source4/heimdal/lib/hx509/cms.c ret = any_to_certs(context, &sd, certs); sd 825 source4/heimdal/lib/hx509/cms.c for (found_valid_sig = 0, i = 0; i < sd.signerInfos.len; i++) { sd 830 source4/heimdal/lib/hx509/cms.c signer_info = &sd.signerInfos.val[i]; sd 954 source4/heimdal/lib/hx509/cms.c if (der_heim_oid_cmp(match_oid, &sd.encapContentInfo.eContentType)) { sd 1004 source4/heimdal/lib/hx509/cms.c ret = der_copy_oid(&sd.encapContentInfo.eContentType, contentType); sd 1020 source4/heimdal/lib/hx509/cms.c free_SignedData(&sd); sd 1104 source4/heimdal/lib/hx509/cms.c SignedData sd; sd 1110 source4/heimdal/lib/hx509/cms.c memset(&sd, 0, sizeof(sd)); sd 1138 source4/heimdal/lib/hx509/cms.c sd.version = CMSVersion_v3; sd 1143 source4/heimdal/lib/hx509/cms.c der_copy_oid(eContentType, &sd.encapContentInfo.eContentType); sd 1147 source4/heimdal/lib/hx509/cms.c ALLOC(sd.encapContentInfo.eContent, 1); sd 1148 source4/heimdal/lib/hx509/cms.c if (sd.encapContentInfo.eContent == NULL) { sd 1154 source4/heimdal/lib/hx509/cms.c sd.encapContentInfo.eContent->data = malloc(length); sd 1155 source4/heimdal/lib/hx509/cms.c if (sd.encapContentInfo.eContent->data == NULL) { sd 1160 source4/heimdal/lib/hx509/cms.c memcpy(sd.encapContentInfo.eContent->data, data, length); sd 1161 source4/heimdal/lib/hx509/cms.c sd.encapContentInfo.eContent->length = length; sd 1164 source4/heimdal/lib/hx509/cms.c ALLOC_SEQ(&sd.signerInfos, 1); sd 1165 source4/heimdal/lib/hx509/cms.c if (sd.signerInfos.val == NULL) { sd 1171 source4/heimdal/lib/hx509/cms.c signer_info = &sd.signerInfos.val[0]; sd 1299 source4/heimdal/lib/hx509/cms.c ALLOC_SEQ(&sd.digestAlgorithms, 1); sd 1300 source4/heimdal/lib/hx509/cms.c if (sd.digestAlgorithms.val == NULL) { sd 1306 source4/heimdal/lib/hx509/cms.c ret = copy_AlgorithmIdentifier(&digest, &sd.digestAlgorithms.val[0]); sd 1331 source4/heimdal/lib/hx509/cms.c ALLOC(sd.certificates, 1); sd 1332 source4/heimdal/lib/hx509/cms.c if (sd.certificates == NULL) { sd 1337 source4/heimdal/lib/hx509/cms.c ALLOC_SEQ(sd.certificates, path.len); sd 1338 source4/heimdal/lib/hx509/cms.c if (sd.certificates->val == NULL) { sd 1346 source4/heimdal/lib/hx509/cms.c &sd.certificates->val[i]); sd 1356 source4/heimdal/lib/hx509/cms.c &sd, &size, ret); sd 1369 source4/heimdal/lib/hx509/cms.c free_SignedData(&sd); sd 189 source4/heimdal/lib/krb5/log.c struct _heimdal_syslog_data *sd = malloc(sizeof(*sd)); sd 192 source4/heimdal/lib/krb5/log.c if(sd == NULL) { sd 200 source4/heimdal/lib/krb5/log.c sd->priority = i; sd 204 source4/heimdal/lib/krb5/log.c sd->priority |= i; sd 207 source4/heimdal/lib/krb5/log.c log_syslog, close_syslog, sd); sd 314 source4/lib/ldb-samba/ldif_handlers.c struct security_descriptor *sd; sd 317 source4/lib/ldb-samba/ldif_handlers.c sd = sddl_decode(mem_ctx, (const char *)in->data, NULL); sd 318 source4/lib/ldb-samba/ldif_handlers.c if (sd == NULL) { sd 321 source4/lib/ldb-samba/ldif_handlers.c ndr_err = ndr_push_struct_blob(out, mem_ctx, NULL, sd, sd 323 source4/lib/ldb-samba/ldif_handlers.c talloc_free(sd); sd 336 source4/lib/ldb-samba/ldif_handlers.c struct security_descriptor *sd; sd 339 source4/lib/ldb-samba/ldif_handlers.c sd = talloc(mem_ctx, struct security_descriptor); sd 340 source4/lib/ldb-samba/ldif_handlers.c if (sd == NULL) { sd 344 source4/lib/ldb-samba/ldif_handlers.c ndr_err = ndr_pull_struct_blob(in, sd, NULL, sd, sd 347 source4/lib/ldb-samba/ldif_handlers.c talloc_free(sd); sd 350 source4/lib/ldb-samba/ldif_handlers.c out->data = (uint8_t *)sddl_encode(mem_ctx, sd, NULL); sd 351 source4/lib/ldb-samba/ldif_handlers.c talloc_free(sd); sd 475 source4/lib/registry/ldb.c struct security_descriptor *sd, sd 1183 source4/lib/registry/regf.c struct security_descriptor **sd) sd 1202 source4/lib/registry/regf.c *sd = talloc(ctx, struct security_descriptor); sd 1203 source4/lib/registry/regf.c W_ERROR_HAVE_NO_MEMORY(*sd); sd 1207 source4/lib/registry/regf.c if (!NDR_ERR_CODE_IS_SUCCESS(ndr_pull_struct_blob(&data, ctx, NULL, *sd, sd 1923 source4/lib/registry/regf.c struct security_descriptor *sd; sd 1988 source4/lib/registry/regf.c sd = security_descriptor_dacl_create(regf, sd 1999 source4/lib/registry/regf.c sd, (ndr_push_flags_fn_t)ndr_push_security_descriptor))) { sd 884 source4/libcli/raw/interfaces.h struct security_descriptor *sd; sd 1125 source4/libcli/raw/interfaces.h struct security_descriptor *sd; sd 85 source4/libcli/raw/rawacl.c io->query_secdesc.out.sd = talloc(mem_ctx, struct security_descriptor); sd 86 source4/libcli/raw/rawacl.c if (!io->query_secdesc.out.sd) { sd 90 source4/libcli/raw/rawacl.c io->query_secdesc.out.sd); sd 141 source4/libcli/raw/rawacl.c ndr_err = ndr_push_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, io->set_secdesc.in.sd); sd 253 source4/libcli/raw/rawfileinfo.c parms->query_secdesc.out.sd = talloc(mem_ctx, struct security_descriptor); sd 254 source4/libcli/raw/rawfileinfo.c NT_STATUS_HAVE_NO_MEMORY(parms->query_secdesc.out.sd); sd 257 source4/libcli/raw/rawfileinfo.c parms->query_secdesc.out.sd, sd 103 source4/libcli/raw/rawsetfileinfo.c parms->set_secdesc.in.sd, sd 29 source4/libcli/security/access_check.c static uint32_t access_check_max_allowed(const struct security_descriptor *sd, sd 35 source4/libcli/security/access_check.c if (security_token_has_sid(token, sd->owner_sid)) { sd 41 source4/libcli/security/access_check.c if (sd->dacl == NULL) { sd 45 source4/libcli/security/access_check.c for (i = 0;i<sd->dacl->num_aces; i++) { sd 46 source4/libcli/security/access_check.c struct security_ace *ace = &sd->dacl->aces[i]; sd 75 source4/libcli/security/access_check.c NTSTATUS sec_access_check(const struct security_descriptor *sd, sd 88 source4/libcli/security/access_check.c access_desired |= access_check_max_allowed(sd, token); sd 103 source4/libcli/security/access_check.c if ((sd->type & SEC_DESC_DACL_PRESENT) && sd->dacl == NULL) { sd 110 source4/libcli/security/access_check.c security_token_has_sid(token, sd->owner_sid)) { sd 118 source4/libcli/security/access_check.c if (sd->dacl == NULL) { sd 123 source4/libcli/security/access_check.c for (i=0; bits_remaining && i < sd->dacl->num_aces; i++) { sd 124 source4/libcli/security/access_check.c struct security_ace *ace = &sd->dacl->aces[i]; sd 267 source4/libcli/security/sddl.c static struct security_acl *sddl_decode_acl(struct security_descriptor *sd, sd 277 source4/libcli/security/sddl.c acl = talloc_zero(sd, struct security_acl); sd 338 source4/libcli/security/sddl.c struct security_descriptor *sd; sd 339 source4/libcli/security/sddl.c sd = talloc_zero(mem_ctx, struct security_descriptor); sd 341 source4/libcli/security/sddl.c sd->revision = SECURITY_DESCRIPTOR_REVISION_1; sd 342 source4/libcli/security/sddl.c sd->type = SEC_DESC_SELF_RELATIVE; sd 352 source4/libcli/security/sddl.c if (sd->dacl != NULL) goto failed; sd 353 source4/libcli/security/sddl.c sd->dacl = sddl_decode_acl(sd, &sddl, &flags, domain_sid); sd 354 source4/libcli/security/sddl.c if (sd->dacl == NULL) goto failed; sd 355 source4/libcli/security/sddl.c sd->type |= flags | SEC_DESC_DACL_PRESENT; sd 358 source4/libcli/security/sddl.c if (sd->sacl != NULL) goto failed; sd 359 source4/libcli/security/sddl.c sd->sacl = sddl_decode_acl(sd, &sddl, &flags, domain_sid); sd 360 source4/libcli/security/sddl.c if (sd->sacl == NULL) goto failed; sd 363 source4/libcli/security/sddl.c sd->type |= (flags<<1) | SEC_DESC_SACL_PRESENT; sd 366 source4/libcli/security/sddl.c if (sd->owner_sid != NULL) goto failed; sd 367 source4/libcli/security/sddl.c sd->owner_sid = sddl_decode_sid(sd, &sddl, domain_sid); sd 368 source4/libcli/security/sddl.c if (sd->owner_sid == NULL) goto failed; sd 371 source4/libcli/security/sddl.c if (sd->group_sid != NULL) goto failed; sd 372 source4/libcli/security/sddl.c sd->group_sid = sddl_decode_sid(sd, &sddl, domain_sid); sd 373 source4/libcli/security/sddl.c if (sd->group_sid == NULL) goto failed; sd 378 source4/libcli/security/sddl.c return sd; sd 382 source4/libcli/security/sddl.c talloc_free(sd); sd 550 source4/libcli/security/sddl.c char *sddl_encode(TALLOC_CTX *mem_ctx, const struct security_descriptor *sd, sd 562 source4/libcli/security/sddl.c if (sd->owner_sid != NULL) { sd 563 source4/libcli/security/sddl.c char *sid = sddl_encode_sid(tmp_ctx, sd->owner_sid, domain_sid); sd 569 source4/libcli/security/sddl.c if (sd->group_sid != NULL) { sd 570 source4/libcli/security/sddl.c char *sid = sddl_encode_sid(tmp_ctx, sd->group_sid, domain_sid); sd 576 source4/libcli/security/sddl.c if ((sd->type & SEC_DESC_DACL_PRESENT) && sd->dacl != NULL) { sd 577 source4/libcli/security/sddl.c char *acl = sddl_encode_acl(tmp_ctx, sd->dacl, sd->type, domain_sid); sd 583 source4/libcli/security/sddl.c if ((sd->type & SEC_DESC_SACL_PRESENT) && sd->sacl != NULL) { sd 584 source4/libcli/security/sddl.c char *acl = sddl_encode_acl(tmp_ctx, sd->sacl, sd->type>>1, domain_sid); sd 30 source4/libcli/security/security_descriptor.c struct security_descriptor *sd; sd 32 source4/libcli/security/security_descriptor.c sd = talloc(mem_ctx, struct security_descriptor); sd 33 source4/libcli/security/security_descriptor.c if (!sd) { sd 37 source4/libcli/security/security_descriptor.c sd->revision = SD_REVISION; sd 42 source4/libcli/security/security_descriptor.c sd->type = SEC_DESC_SELF_RELATIVE; sd 44 source4/libcli/security/security_descriptor.c sd->owner_sid = NULL; sd 45 source4/libcli/security/security_descriptor.c sd->group_sid = NULL; sd 46 source4/libcli/security/security_descriptor.c sd->sacl = NULL; sd 47 source4/libcli/security/security_descriptor.c sd->dacl = NULL; sd 49 source4/libcli/security/security_descriptor.c return sd; sd 135 source4/libcli/security/security_descriptor.c static NTSTATUS security_descriptor_acl_add(struct security_descriptor *sd, sd 142 source4/libcli/security/security_descriptor.c acl = sd->sacl; sd 144 source4/libcli/security/security_descriptor.c acl = sd->dacl; sd 148 source4/libcli/security/security_descriptor.c acl = talloc(sd, struct security_acl); sd 180 source4/libcli/security/security_descriptor.c sd->sacl = acl; sd 181 source4/libcli/security/security_descriptor.c sd->type |= SEC_DESC_SACL_PRESENT; sd 183 source4/libcli/security/security_descriptor.c sd->dacl = acl; sd 184 source4/libcli/security/security_descriptor.c sd->type |= SEC_DESC_DACL_PRESENT; sd 194 source4/libcli/security/security_descriptor.c NTSTATUS security_descriptor_sacl_add(struct security_descriptor *sd, sd 197 source4/libcli/security/security_descriptor.c return security_descriptor_acl_add(sd, true, ace); sd 204 source4/libcli/security/security_descriptor.c NTSTATUS security_descriptor_dacl_add(struct security_descriptor *sd, sd 207 source4/libcli/security/security_descriptor.c return security_descriptor_acl_add(sd, false, ace); sd 215 source4/libcli/security/security_descriptor.c static NTSTATUS security_descriptor_acl_del(struct security_descriptor *sd, sd 224 source4/libcli/security/security_descriptor.c acl = sd->sacl; sd 226 source4/libcli/security/security_descriptor.c acl = sd->dacl; sd 273 source4/libcli/security/security_descriptor.c NTSTATUS security_descriptor_dacl_del(struct security_descriptor *sd, sd 276 source4/libcli/security/security_descriptor.c return security_descriptor_acl_del(sd, false, trustee); sd 284 source4/libcli/security/security_descriptor.c NTSTATUS security_descriptor_sacl_del(struct security_descriptor *sd, sd 287 source4/libcli/security/security_descriptor.c return security_descriptor_acl_del(sd, true, trustee); sd 367 source4/libcli/security/security_descriptor.c static struct security_descriptor *security_descriptor_appendv(struct security_descriptor *sd, sd 375 source4/libcli/security/security_descriptor.c struct security_ace *ace = talloc(sd, struct security_ace); sd 379 source4/libcli/security/security_descriptor.c talloc_free(sd); sd 387 source4/libcli/security/security_descriptor.c talloc_free(sd); sd 392 source4/libcli/security/security_descriptor.c status = security_descriptor_sacl_add(sd, ace); sd 394 source4/libcli/security/security_descriptor.c status = security_descriptor_dacl_add(sd, ace); sd 398 source4/libcli/security/security_descriptor.c talloc_free(sd); sd 403 source4/libcli/security/security_descriptor.c return sd; sd 406 source4/libcli/security/security_descriptor.c struct security_descriptor *security_descriptor_append(struct security_descriptor *sd, sd 411 source4/libcli/security/security_descriptor.c va_start(ap, sd); sd 412 source4/libcli/security/security_descriptor.c sd = security_descriptor_appendv(sd, false, ap); sd 415 source4/libcli/security/security_descriptor.c return sd; sd 425 source4/libcli/security/security_descriptor.c struct security_descriptor *sd; sd 427 source4/libcli/security/security_descriptor.c sd = security_descriptor_initialise(mem_ctx); sd 428 source4/libcli/security/security_descriptor.c if (sd == NULL) { sd 432 source4/libcli/security/security_descriptor.c sd->type |= sd_type; sd 435 source4/libcli/security/security_descriptor.c sd->owner_sid = dom_sid_parse_talloc(sd, owner_sid); sd 436 source4/libcli/security/security_descriptor.c if (sd->owner_sid == NULL) { sd 437 source4/libcli/security/security_descriptor.c talloc_free(sd); sd 442 source4/libcli/security/security_descriptor.c sd->group_sid = dom_sid_parse_talloc(sd, group_sid); sd 443 source4/libcli/security/security_descriptor.c if (sd->group_sid == NULL) { sd 444 source4/libcli/security/security_descriptor.c talloc_free(sd); sd 449 source4/libcli/security/security_descriptor.c return security_descriptor_appendv(sd, add_ace_to_sacl, ap); sd 480 source4/libcli/security/security_descriptor.c struct security_descriptor *sd = NULL; sd 483 source4/libcli/security/security_descriptor.c sd = security_descriptor_createv(mem_ctx, sd_type, owner_sid, sd 487 source4/libcli/security/security_descriptor.c return sd; sd 496 source4/libcli/security/security_descriptor.c struct security_descriptor *sd = NULL; sd 499 source4/libcli/security/security_descriptor.c sd = security_descriptor_createv(mem_ctx, sd_type, owner_sid, sd 503 source4/libcli/security/security_descriptor.c return sd; sd 34 source4/libcli/security/tests/sddl.c struct security_descriptor *sd, *sd2; sd 42 source4/libcli/security/tests/sddl.c sd = sddl_decode(mem_ctx, sddl, domain); sd 43 source4/libcli/security/tests/sddl.c torture_assert(tctx, sd != NULL, talloc_asprintf(tctx, sd 46 source4/libcli/security/tests/sddl.c sddl2 = sddl_encode(mem_ctx, sd, domain); sd 54 source4/libcli/security/tests/sddl.c torture_assert(tctx, security_descriptor_equal(sd, sd2), sd 65 source4/libcli/security/tests/sddl.c NDR_PRINT_DEBUG(security_descriptor, sd); sd 67 source4/libcli/security/tests/sddl.c talloc_free(sd); sd 76 source4/libcli/smb_composite/appendacl.c state->io_setfileinfo->set_secdesc.in.sd = state->io_fileinfo->query_secdesc.out.sd; sd 77 source4/libcli/smb_composite/appendacl.c talloc_steal(state->io_setfileinfo, state->io_setfileinfo->set_secdesc.in.sd); sd 80 source4/libcli/smb_composite/appendacl.c if (io->in.sd->dacl != NULL) { sd 81 source4/libcli/smb_composite/appendacl.c for (i = 0; i < io->in.sd->dacl->num_aces; i++) { sd 82 source4/libcli/smb_composite/appendacl.c security_descriptor_dacl_add(state->io_setfileinfo->set_secdesc.in.sd, sd 83 source4/libcli/smb_composite/appendacl.c &(io->in.sd->dacl->aces[i])); sd 147 source4/libcli/smb_composite/appendacl.c io->out.sd = state->io_fileinfo->query_secdesc.out.sd; sd 295 source4/libcli/smb_composite/appendacl.c state->io->out.sd = security_descriptor_copy (mem_ctx, state->io->out.sd); sd 166 source4/libcli/smb_composite/smb_composite.h const struct security_descriptor *sd; sd 170 source4/libcli/smb_composite/smb_composite.h struct security_descriptor *sd; sd 147 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *sd; sd 158 source4/ntvfs/posix/pvfs_acl.c sd = *psd; sd 160 source4/ntvfs/posix/pvfs_acl.c ids = talloc_zero_array(sd, struct id_mapping, 2); sd 183 source4/ntvfs/posix/pvfs_acl.c sd->owner_sid = talloc_steal(sd, ids[0].sid); sd 184 source4/ntvfs/posix/pvfs_acl.c sd->group_sid = talloc_steal(sd, ids[1].sid); sd 187 source4/ntvfs/posix/pvfs_acl.c sd->type |= SEC_DESC_DACL_PRESENT; sd 203 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *sd->owner_sid; sd 217 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace); sd 222 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *sd->group_sid; sd 232 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace); sd 245 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace); sd 251 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace); sd 261 source4/ntvfs/posix/pvfs_acl.c static void normalise_sd_flags(struct security_descriptor *sd, uint32_t secinfo_flags) sd 264 source4/ntvfs/posix/pvfs_acl.c sd->owner_sid = NULL; sd 267 source4/ntvfs/posix/pvfs_acl.c sd->group_sid = NULL; sd 270 source4/ntvfs/posix/pvfs_acl.c sd->dacl = NULL; sd 273 source4/ntvfs/posix/pvfs_acl.c sd->sacl = NULL; sd 287 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *new_sd, *sd, orig_sd; sd 297 source4/ntvfs/posix/pvfs_acl.c status = pvfs->acl_ops->acl_load(pvfs, name, fd, req, &sd); sd 300 source4/ntvfs/posix/pvfs_acl.c status = pvfs_default_acl(pvfs, req, name, fd, &sd); sd 312 source4/ntvfs/posix/pvfs_acl.c new_sd = info->set_secdesc.in.sd; sd 313 source4/ntvfs/posix/pvfs_acl.c orig_sd = *sd; sd 323 source4/ntvfs/posix/pvfs_acl.c if (!dom_sid_equal(sd->owner_sid, new_sd->owner_sid)) { sd 335 source4/ntvfs/posix/pvfs_acl.c sd->owner_sid = new_sd->owner_sid; sd 341 source4/ntvfs/posix/pvfs_acl.c if (!dom_sid_equal(sd->group_sid, new_sd->group_sid)) { sd 354 source4/ntvfs/posix/pvfs_acl.c sd->group_sid = new_sd->group_sid; sd 360 source4/ntvfs/posix/pvfs_acl.c sd->dacl = new_sd->dacl; sd 361 source4/ntvfs/posix/pvfs_acl.c pvfs_translate_generic_bits(sd->dacl); sd 367 source4/ntvfs/posix/pvfs_acl.c sd->sacl = new_sd->sacl; sd 368 source4/ntvfs/posix/pvfs_acl.c pvfs_translate_generic_bits(sd->sacl); sd 395 source4/ntvfs/posix/pvfs_acl.c if (!security_descriptor_equal(sd, &orig_sd) && pvfs->acl_ops) { sd 396 source4/ntvfs/posix/pvfs_acl.c status = pvfs->acl_ops->acl_save(pvfs, name, fd, sd); sd 412 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *sd; sd 415 source4/ntvfs/posix/pvfs_acl.c status = pvfs->acl_ops->acl_load(pvfs, name, fd, req, &sd); sd 418 source4/ntvfs/posix/pvfs_acl.c status = pvfs_default_acl(pvfs, req, name, fd, &sd); sd 424 source4/ntvfs/posix/pvfs_acl.c normalise_sd_flags(sd, info->query_secdesc.in.secinfo_flags); sd 426 source4/ntvfs/posix/pvfs_acl.c info->query_secdesc.out.sd = sd; sd 512 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *sd; sd 546 source4/ntvfs/posix/pvfs_acl.c sd = acl->info.sd; sd 553 source4/ntvfs/posix/pvfs_acl.c status = sec_access_check(sd, token, *access_mask, access_mask); sd 660 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *sd, sd 694 source4/ntvfs/posix/pvfs_acl.c new_id = sd->owner_sid; sd 697 source4/ntvfs/posix/pvfs_acl.c new_id = sd->group_sid; sd 708 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace); sd 715 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace); sd 718 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace); sd 721 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace); sd 747 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *parent_sd, *sd; sd 773 source4/ntvfs/posix/pvfs_acl.c parent_sd = acl->info.sd; sd 787 source4/ntvfs/posix/pvfs_acl.c sd = security_descriptor_initialise(req); sd 788 source4/ntvfs/posix/pvfs_acl.c if (sd == NULL) { sd 792 source4/ntvfs/posix/pvfs_acl.c ids = talloc_array(sd, struct id_mapping, 2); sd 815 source4/ntvfs/posix/pvfs_acl.c sd->owner_sid = talloc_steal(sd, ids[0].sid); sd 816 source4/ntvfs/posix/pvfs_acl.c sd->group_sid = talloc_steal(sd, ids[1].sid); sd 818 source4/ntvfs/posix/pvfs_acl.c sd->type |= SEC_DESC_DACL_PRESENT; sd 823 source4/ntvfs/posix/pvfs_acl.c status = pvfs_acl_inherit_aces(pvfs, parent_sd, sd, container); sd 830 source4/ntvfs/posix/pvfs_acl.c if (sd->dacl == NULL || sd->dacl->num_aces == 0) { sd 834 source4/ntvfs/posix/pvfs_acl.c acl->info.sd = sd; sd 40 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_descriptor *sd; sd 59 source4/ntvfs/posix/pvfs_acl_nfs4.c sd = *psd; sd 61 source4/ntvfs/posix/pvfs_acl_nfs4.c sd->type |= acl->a_flags; sd 65 source4/ntvfs/posix/pvfs_acl_nfs4.c ids = talloc_array(sd, struct id_mapping, num_ids); sd 98 source4/ntvfs/posix/pvfs_acl_nfs4.c ctx = wbc_xids_to_sids_send(pvfs->wbc_ctx, sd, num_ids, ids); sd 103 source4/ntvfs/posix/pvfs_acl_nfs4.c sd->owner_sid = talloc_steal(sd, ids[0].sid); sd 104 source4/ntvfs/posix/pvfs_acl_nfs4.c sd->group_sid = talloc_steal(sd, ids[1].sid); sd 113 source4/ntvfs/posix/pvfs_acl_nfs4.c security_descriptor_dacl_add(sd, &ace); sd 123 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_descriptor *sd) sd 137 source4/ntvfs/posix/pvfs_acl_nfs4.c acl.a_flags = sd->type; sd 138 source4/ntvfs/posix/pvfs_acl_nfs4.c acl.a_count = sd->dacl?sd->dacl->num_aces:0; sd 156 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_ace *ace = &sd->dacl->aces[i]; sd 179 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_ace *ace = &sd->dacl->aces[i]; sd 32 source4/ntvfs/posix/pvfs_acl_xattr.c struct security_descriptor **sd) sd 59 source4/ntvfs/posix/pvfs_acl_xattr.c *sd = talloc_steal(mem_ctx, acl->info.sd); sd 68 source4/ntvfs/posix/pvfs_acl_xattr.c struct security_descriptor *sd) sd 79 source4/ntvfs/posix/pvfs_acl_xattr.c acl.info.sd = sd; sd 109 source4/ntvfs/posix/pvfs_open.c struct security_descriptor *sd; sd 121 source4/ntvfs/posix/pvfs_open.c sd = io->ntcreatex.in.sec_desc; sd 123 source4/ntvfs/posix/pvfs_open.c if (sd && (sd->type & SEC_DESC_DACL_PRESENT)) { sd 134 source4/ntvfs/posix/pvfs_open.c set.set_secdesc.in.sd = sd; sd 161 source4/rpc_server/dcerpc_server.c const struct security_descriptor *sd) sd 218 source4/rpc_server/dcerpc_server.c if (sd != NULL) { sd 222 source4/rpc_server/dcerpc_server.c if (ep->sd == NULL) { sd 223 source4/rpc_server/dcerpc_server.c ep->sd = security_descriptor_copy(dce_ctx, sd); sd 230 source4/rpc_server/dcerpc_server.c if (ep->sd != NULL) { sd 262 source4/rpc_server/dcerpc_server.h struct security_descriptor *sd; sd 293 source4/rpc_server/dcerpc_server.h const struct security_descriptor *sd); sd 232 source4/rpc_server/samr/dcesrv_samr.c struct sec_desc_buf *sd; sd 238 source4/rpc_server/samr/dcesrv_samr.c sd = talloc(mem_ctx, struct sec_desc_buf); sd 239 source4/rpc_server/samr/dcesrv_samr.c if (sd == NULL) { sd 243 source4/rpc_server/samr/dcesrv_samr.c sd->sd = samdb_default_security_descriptor(mem_ctx); sd 245 source4/rpc_server/samr/dcesrv_samr.c *r->out.sdbuf = sd; sd 690 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info->info502->sd_buf.sd = dcesrv_common_get_security_descriptor(mem_ctx, dce_ctx, scfg); sd 1104 source4/rpc_server/srvsvc/dcesrv_srvsvc.c struct security_descriptor *sd) sd 1316 source4/rpc_server/srvsvc/dcesrv_srvsvc.c r->in.info->info502->sd_buf.sd); sd 2110 source4/rpc_server/srvsvc/dcesrv_srvsvc.c sd_buf->sd = io->query_secdesc.out.sd; sd 2144 source4/rpc_server/srvsvc/dcesrv_srvsvc.c io->set_secdesc.in.sd = r->in.sd_buf->sd; sd 117 source4/rpc_server/winreg/rpc_winreg.c struct security_descriptor sd; sd 134 source4/rpc_server/winreg/rpc_winreg.c sdblob.data = r->in.secdesc->sd.data; sd 135 source4/rpc_server/winreg/rpc_winreg.c sdblob.length = r->in.secdesc->sd.len; sd 139 source4/rpc_server/winreg/rpc_winreg.c ndr_err = ndr_pull_struct_blob_all(&sdblob, mem_ctx, NULL, &sd, sd 147 source4/rpc_server/winreg/rpc_winreg.c r->in.secdesc?&sd:NULL, (struct registry_key **)&newh->data); sd 209 source4/smb_server/smb/nttrans.c io->query_secdesc.out.sd, sd 271 source4/smb_server/smb/nttrans.c io->set_secdesc.in.sd = talloc(io, struct security_descriptor); sd 272 source4/smb_server/smb/nttrans.c NT_STATUS_HAVE_NO_MEMORY(io->set_secdesc.in.sd); sd 275 source4/smb_server/smb/nttrans.c io->set_secdesc.in.sd, sd 155 source4/smb_server/smb2/fileinfo.c io->query_secdesc.out.sd, sd 317 source4/smb_server/smb2/fileinfo.c io->set_secdesc.in.sd = talloc(io, struct security_descriptor); sd 318 source4/smb_server/smb2/fileinfo.c NT_STATUS_HAVE_NO_MEMORY(io->set_secdesc.in.sd); sd 321 source4/smb_server/smb2/fileinfo.c io->set_secdesc.in.sd, sd 948 source4/torture/gentest.c struct security_descriptor *sd; sd 951 source4/torture/gentest.c sd = security_descriptor_dacl_create(current_op.mem_ctx, sd 962 source4/torture/gentest.c return sd; sd 1717 source4/torture/gentest.c CHECK_SECDESC(query_secdesc.out.sd); sd 465 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->size, 65536, "sd size"); sd 466 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->len, 0, "sd len"); sd 467 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.sd->data == NULL, "sd data"); sd 481 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->size, 20, "sd size"); sd 482 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->len, 20, "sd len"); sd 54 source4/torture/raw/acls.c struct security_descriptor *sd; sd 85 source4/torture/raw/acls.c sd = q.query_secdesc.out.sd; sd 96 source4/torture/raw/acls.c status = security_descriptor_dacl_add(sd, &ace); sd 102 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 110 source4/torture/raw/acls.c if (!security_acl_equal(q.query_secdesc.out.sd->dacl, sd->dacl)) { sd 113 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 115 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, sd); sd 121 source4/torture/raw/acls.c status = security_descriptor_dacl_del(sd, test_sid); sd 130 source4/torture/raw/acls.c if (!security_acl_equal(q.query_secdesc.out.sd->dacl, sd->dacl)) { sd 133 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 135 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, sd); sd 158 source4/torture/raw/acls.c struct security_descriptor *sd; sd 196 source4/torture/raw/acls.c sd = q.query_secdesc.out.sd; sd 209 source4/torture/raw/acls.c status = security_descriptor_dacl_add(sd, &ace); sd 214 source4/torture/raw/acls.c io.ntcreatex.in.sec_desc = sd; sd 223 source4/torture/raw/acls.c if (!security_acl_equal(q.query_secdesc.out.sd->dacl, sd->dacl)) { sd 226 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 228 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, sd); sd 264 source4/torture/raw/acls.c struct security_descriptor *sd = security_descriptor_initialise(tctx); sd 283 source4/torture/raw/acls.c io.ntcreatex.in.sec_desc = sd; sd 306 source4/torture/raw/acls.c if (!(q.query_secdesc.out.sd->type & SEC_DESC_DACL_PRESENT)) { sd 311 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL) { sd 318 source4/torture/raw/acls.c sd->type |= SEC_DESC_DACL_PRESENT; sd 323 source4/torture/raw/acls.c s.set_secdesc.in.sd = sd; sd 338 source4/torture/raw/acls.c if (!(q.query_secdesc.out.sd->type & SEC_DESC_DACL_PRESENT)) { sd 343 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl != NULL) { sd 393 source4/torture/raw/acls.c sd->dacl = &dacl; sd 398 source4/torture/raw/acls.c s.set_secdesc.in.sd = sd; sd 413 source4/torture/raw/acls.c if (!(q.query_secdesc.out.sd->type & SEC_DESC_DACL_PRESENT)) { sd 418 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL) { sd 423 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl->num_aces != 0) { sd 425 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->num_aces); sd 459 source4/torture/raw/acls.c sd->type &= ~SEC_DESC_DACL_PRESENT; sd 460 source4/torture/raw/acls.c sd->dacl = NULL; sd 465 source4/torture/raw/acls.c s.set_secdesc.in.sd = sd; sd 480 source4/torture/raw/acls.c if (!(q.query_secdesc.out.sd->type & SEC_DESC_DACL_PRESENT)) { sd 485 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl != NULL) { sd 509 source4/torture/raw/acls.c struct security_descriptor *sd, *sd_orig, *sd2; sd 538 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd; sd 543 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 554 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 580 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 591 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 598 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd)) { sd 601 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 603 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, sd); sd 635 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 643 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 658 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) { sd 661 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 696 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig; sd 721 source4/torture/raw/acls.c struct security_descriptor *sd, *sd_orig, *sd2; sd 777 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd; sd 813 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 824 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 839 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) { sd 842 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 861 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 872 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 887 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) { sd 890 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 905 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig; sd 942 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd; sd 978 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 989 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 1004 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) { sd 1007 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 1026 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 1037 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 1052 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) { sd 1055 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 1070 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig; sd 1096 source4/torture/raw/acls.c struct security_descriptor *sd, *sd_orig; sd 1131 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd; sd 1153 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 1164 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 1194 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig; sd 1221 source4/torture/raw/acls.c struct security_descriptor *sd, *sd2, *sd_orig=NULL, *sd_def; sd 1359 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd; sd 1380 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 1394 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 1412 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd_def)) { sd 1416 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 1421 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL || sd 1422 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->num_aces != 1 || sd 1423 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].access_mask != SEC_FILE_WRITE_DATA || sd 1424 source4/torture/raw/acls.c !dom_sid_equal(&q.query_secdesc.out.sd->dacl->aces[0].trustee, sd 1427 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 1432 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl->aces[0].flags != sd 1435 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].flags, sd 1459 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd_def)) { sd 1463 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 1470 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL || sd 1471 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->num_aces != 1 || sd 1472 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].access_mask != SEC_FILE_WRITE_DATA || sd 1473 source4/torture/raw/acls.c !dom_sid_equal(&q.query_secdesc.out.sd->dacl->aces[0].trustee, sd 1475 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].flags != test_flags[i].dir_flags) { sd 1478 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 1483 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL || sd 1484 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->num_aces != 2 || sd 1485 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].access_mask != SEC_FILE_WRITE_DATA || sd 1486 source4/torture/raw/acls.c !dom_sid_equal(&q.query_secdesc.out.sd->dacl->aces[0].trustee, sd 1488 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[1].access_mask != SEC_FILE_WRITE_DATA || sd 1489 source4/torture/raw/acls.c !dom_sid_equal(&q.query_secdesc.out.sd->dacl->aces[1].trustee, sd 1491 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].flags != 0 || sd 1492 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[1].flags != sd 1496 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 1501 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL || sd 1502 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->num_aces != 1 || sd 1503 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].access_mask != SEC_FILE_WRITE_DATA || sd 1504 source4/torture/raw/acls.c !dom_sid_equal(&q.query_secdesc.out.sd->dacl->aces[0].trustee, sd 1506 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].flags != test_flags[i].dir_flags) { sd 1509 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 1517 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 1531 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 1557 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) { sd 1560 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd); sd 1602 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig; sd 1626 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig; sd 1648 source4/torture/raw/acls.c struct security_descriptor *sd, *sd_orig=NULL; sd 1680 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd; sd 1686 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 1693 source4/torture/raw/acls.c sd->type |= SEC_DESC_DACL_AUTO_INHERITED | SEC_DESC_DACL_AUTO_INHERIT_REQ; sd 1698 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 1726 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 1733 source4/torture/raw/acls.c sd->type |= SEC_DESC_DACL_AUTO_INHERITED | SEC_DESC_DACL_AUTO_INHERIT_REQ; sd 1735 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd; sd 1765 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig; sd 1811 source4/torture/raw/acls.c struct security_descriptor *sd; sd 1841 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx, sd 1848 source4/torture/raw/acls.c sd->type |= SEC_DESC_SACL_PRESENT; sd 1849 source4/torture/raw/acls.c sd->sacl = NULL; sd 1862 source4/torture/raw/acls.c io.ntcreatex.in.sec_desc = sd; sd 1902 source4/torture/raw/acls.c if (fi.query_secdesc.out.sd) { sd 1903 source4/torture/raw/acls.c sd_owner = fi.query_secdesc.out.sd; sd 1905 source4/torture/raw/acls.c sd_owner = sd; sd 1910 source4/torture/raw/acls.c si.set_secdesc.in.sd = sd_owner; sd 1921 source4/torture/raw/acls.c if (fi.query_secdesc.out.sd) { sd 1922 source4/torture/raw/acls.c sd_group = fi.query_secdesc.out.sd; sd 1924 source4/torture/raw/acls.c sd_group = sd; sd 1929 source4/torture/raw/acls.c si.set_secdesc.in.sd = sd_group; sd 1940 source4/torture/raw/acls.c if (fi.query_secdesc.out.sd) { sd 1941 source4/torture/raw/acls.c sd_dacl = fi.query_secdesc.out.sd; sd 1943 source4/torture/raw/acls.c sd_dacl = sd; sd 1948 source4/torture/raw/acls.c si.set_secdesc.in.sd = sd_dacl; sd 1959 source4/torture/raw/acls.c if (fi.query_secdesc.out.sd) { sd 1960 source4/torture/raw/acls.c sd_sacl = fi.query_secdesc.out.sd; sd 1962 source4/torture/raw/acls.c sd_sacl = sd; sd 1967 source4/torture/raw/acls.c si.set_secdesc.in.sd = sd_sacl; sd 258 source4/torture/raw/composite.c io_orig[i]->in.sd = security_descriptor_initialise(io_orig[i]); sd 294 source4/torture/raw/composite.c io[i]->in.sd = test_sd; sd 320 source4/torture/raw/composite.c security_descriptor_dacl_add(io_orig[i]->out.sd, ace); sd 321 source4/torture/raw/composite.c if (!security_acl_equal(io_orig[i]->out.sd->dacl, io[i]->out.sd->dacl)) { sd 2240 source4/torture/rpc/samba3rpc.c result = talloc_steal(mem_ctx, info.info502->sd_buf.sd); sd 2249 source4/torture/rpc/samba3rpc.c struct security_descriptor *sd) sd 2288 source4/torture/rpc/samba3rpc.c i.sd = sd; sd 2315 source4/torture/rpc/samba3rpc.c struct security_descriptor *sd; sd 2340 source4/torture/rpc/samba3rpc.c sd = security_descriptor_dacl_create( sd 2346 source4/torture/rpc/samba3rpc.c if (sd == NULL) { sd 2352 source4/torture/rpc/samba3rpc.c status = set_sharesec(mem_ctx, lp_ctx, session, sharename, sd); sd 2400 source4/torture/rpc/samba3rpc.c struct security_descriptor *sd; sd 2421 source4/torture/rpc/samba3rpc.c sd = get_sharesec(mem_ctx, torture->lp_ctx, cli->session, sd 2424 source4/torture/rpc/samba3rpc.c ret &= try_tcon(mem_ctx, torture->lp_ctx, sd, cli->session, sd 2428 source4/torture/rpc/samba3rpc.c ret &= try_tcon(mem_ctx, torture->lp_ctx, sd, cli->session, sd 2433 source4/torture/rpc/samba3rpc.c ret &= try_tcon(mem_ctx, torture->lp_ctx, sd, cli->session, sd 246 source4/torture/rpc/samr_accessmask.c struct security_descriptor *sd; sd 280 source4/torture/rpc/samr_accessmask.c sd = sdbuf->sd; sd 285 source4/torture/rpc/samr_accessmask.c status = security_descriptor_dacl_add(sd, &ace); sd 293 source4/torture/rpc/samr_accessmask.c sdb.sd = sd; sd 290 source4/torture/rpc/samsync.c if (!sdbuf || !sdbuf->sd) { \ sd 294 source4/torture/rpc/samsync.c if (!security_descriptor_mask_equal(sd1.sd, sdbuf->sd, \ sd 297 source4/torture/rpc/samsync.c ndr_print_debug((ndr_print_fn_t)ndr_print_security_descriptor, "SamSync", sd1.sd);\ sd 298 source4/torture/rpc/samsync.c ndr_print_debug((ndr_print_fn_t)ndr_print_security_descriptor, "SamR", sdbuf->sd);\ sd 143 source4/torture/rpc/winreg.c struct security_descriptor *sd; sd 147 source4/torture/rpc/winreg.c sd = security_descriptor_dacl_create(tctx, sd 158 source4/torture/rpc/winreg.c ndr_push_struct_blob(&sdblob, tctx, NULL, sd, sd 162 source4/torture/rpc/winreg.c secbuf.sd.data = sdblob.data; sd 163 source4/torture/rpc/winreg.c secbuf.sd.len = sdblob.length; sd 164 source4/torture/rpc/winreg.c secbuf.sd.size = sdblob.length; sd 194 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL; sd 208 source4/torture/rpc/winreg.c r.in.sd = r.out.sd = talloc_zero(tctx, struct KeySecurityData); sd 209 source4/torture/rpc/winreg.c r.in.sd->size = 0x1000; sd 218 source4/torture/rpc/winreg.c sdblob.data = r.out.sd->data; sd 219 source4/torture/rpc/winreg.c sdblob.length = r.out.sd->len; sd 221 source4/torture/rpc/winreg.c sd = talloc_zero(tctx, struct security_descriptor); sd 224 source4/torture/rpc/winreg.c ndr_pull_struct_blob(&sdblob, tctx, NULL, sd, sd 229 source4/torture/rpc/winreg.c NDR_PRINT_DEBUG(security_descriptor, sd); sd 233 source4/torture/rpc/winreg.c *sd_out = sd; sd 235 source4/torture/rpc/winreg.c talloc_free(sd); sd 253 source4/torture/rpc/winreg.c struct security_descriptor *sd, sd 263 source4/torture/rpc/winreg.c if (sd && (p->conn->flags & DCERPC_DEBUG_PRINT_OUT)) { sd 264 source4/torture/rpc/winreg.c NDR_PRINT_DEBUG(security_descriptor, sd); sd 268 source4/torture/rpc/winreg.c ndr_push_struct_blob(&sdblob, tctx, NULL, sd, sd 282 source4/torture/rpc/winreg.c if (sd->owner_sid) { sd 285 source4/torture/rpc/winreg.c if (sd->group_sid) { sd 288 source4/torture/rpc/winreg.c if (sd->sacl) { sd 291 source4/torture/rpc/winreg.c if (sd->dacl) { sd 298 source4/torture/rpc/winreg.c r.in.sd = sdata; sd 313 source4/torture/rpc/winreg.c struct security_descriptor *sd) sd 315 source4/torture/rpc/winreg.c return _test_SetKeySecurity(p, tctx, handle, NULL, sd, WERR_OK); sd 408 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL; sd 410 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, NULL, get_werr, &sd)) { sd 414 source4/torture/rpc/winreg.c if (!_test_SetKeySecurity(p, tctx, handle, NULL, sd, set_werr)) { sd 486 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL; sd 489 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) { sd 493 source4/torture/rpc/winreg.c if (!sd || !sd->dacl) { sd 497 source4/torture/rpc/winreg.c for (i = 0; i < sd->dacl->num_aces; i++) { sd 498 source4/torture/rpc/winreg.c if (dom_sid_equal(&sd->dacl->aces[i].trustee, sid)) { sd 531 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL; sd 535 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) { sd 539 source4/torture/rpc/winreg.c if (!sd || !sd->sacl) { sd 543 source4/torture/rpc/winreg.c for (i = 0; i < sd->sacl->num_aces; i++) { sd 544 source4/torture/rpc/winreg.c if (dom_sid_equal(&sd->sacl->aces[i].trustee, sid)) { sd 578 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL; sd 581 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) { sd 585 source4/torture/rpc/winreg.c if (!sd || !sd->owner_sid) { sd 589 source4/torture/rpc/winreg.c return dom_sid_equal(sd->owner_sid, sid); sd 617 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL; sd 620 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) { sd 624 source4/torture/rpc/winreg.c if (!sd || !sd->group_sid) { sd 628 source4/torture/rpc/winreg.c return dom_sid_equal(sd->group_sid, sid); sd 657 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL; sd 660 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) { sd 664 source4/torture/rpc/winreg.c if (!sd || !sd->dacl) { sd 668 source4/torture/rpc/winreg.c for (i = 0; i < sd->dacl->num_aces; i++) { sd 669 source4/torture/rpc/winreg.c if ((dom_sid_equal(&sd->dacl->aces[i].trustee, sid)) && sd 670 source4/torture/rpc/winreg.c (sd->dacl->aces[i].flags == flags)) { sd 683 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL; sd 686 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) { sd 690 source4/torture/rpc/winreg.c if (!sd || !sd->dacl) { sd 694 source4/torture/rpc/winreg.c for (i = 0; i < sd->dacl->num_aces; i++) { sd 695 source4/torture/rpc/winreg.c if (security_ace_equal(&sd->dacl->aces[i], ace)) { sd 707 source4/torture/rpc/winreg.c struct security_descriptor *sd) sd 716 source4/torture/rpc/winreg.c if (!test_SetKeySecurity(p, tctx, &new_handle, sd)) { sd 731 source4/torture/rpc/winreg.c struct security_descriptor **sd) sd 740 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, &new_handle, sd)) { sd 772 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL; sd 785 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, &new_handle, NULL, WERR_OK, &sd)) { sd 789 source4/torture/rpc/winreg.c sd_orig = security_descriptor_copy(tctx, sd); sd 800 source4/torture/rpc/winreg.c status = security_descriptor_dacl_add(sd, ace); sd 807 source4/torture/rpc/winreg.c sd->type |= SEC_DESC_DACL_AUTO_INHERIT_REQ | sd 810 source4/torture/rpc/winreg.c if (!test_SetKeySecurity(p, tctx, &new_handle, sd)) { sd 882 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL; sd 897 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, &new_handle, NULL, WERR_OK, &sd)) { sd 901 source4/torture/rpc/winreg.c sd_orig = security_descriptor_copy(tctx, sd); sd 913 source4/torture/rpc/winreg.c status = security_descriptor_dacl_add(sd, ace); sd 919 source4/torture/rpc/winreg.c if (!_test_SetKeySecurity(p, tctx, &new_handle, NULL, sd, WERR_OK)) { sd 1053 source4/torture/rpc/winreg.c struct security_descriptor *sd, sd 1085 source4/torture/rpc/winreg.c sd, sd 1162 source4/torture/rpc/winreg.c struct security_descriptor *sd; sd 1251 source4/torture/rpc/winreg.c sec_info_owner_tests[i].sd, sd 1275 source4/torture/rpc/winreg.c sec_info_group_tests[i].sd, sd 1299 source4/torture/rpc/winreg.c sec_info_dacl_tests[i].sd, sd 1323 source4/torture/rpc/winreg.c sec_info_sacl_tests[i].sd, sd 380 source4/torture/smb2/create.c struct security_descriptor *sd, *sd2; sd 411 source4/torture/smb2/create.c sd = q.query_secdesc.out.sd; sd 426 source4/torture/smb2/create.c status = security_descriptor_dacl_add(sd, &ace); sd 431 source4/torture/smb2/create.c io.in.sec_desc = sd; sd 438 source4/torture/smb2/create.c sd2 = q.query_secdesc.out.sd; sd 440 source4/torture/smb2/create.c if (!security_acl_equal(sd->dacl, sd2->dacl)) { sd 445 source4/torture/smb2/create.c NDR_PRINT_DEBUG(security_descriptor, sd); sd 49 source4/torture/smb2/setinfo.c struct security_descriptor *sd; sd 244 source4/torture/smb2/setinfo.c sd = finfo2.query_secdesc.out.sd; sd 252 source4/torture/smb2/setinfo.c status = security_descriptor_dacl_add(sd, &ace); sd 258 source4/torture/smb2/setinfo.c sfinfo.set_secdesc.in.sd = sd; sd 262 source4/torture/smb2/setinfo.c if (!security_acl_equal(finfo2.query_secdesc.out.sd->dacl, sd->dacl)) { sd 265 source4/torture/smb2/setinfo.c NDR_PRINT_DEBUG(security_descriptor, finfo2.query_secdesc.out.sd); sd 267 source4/torture/smb2/setinfo.c NDR_PRINT_DEBUG(security_descriptor, sd); sd 273 source4/torture/smb2/setinfo.c status = security_descriptor_dacl_del(sd, test_sid); sd 277 source4/torture/smb2/setinfo.c sfinfo.set_secdesc.in.sd = sd; sd 281 source4/torture/smb2/setinfo.c if (!security_acl_equal(finfo2.query_secdesc.out.sd->dacl, sd->dacl)) { sd 284 source4/torture/smb2/setinfo.c NDR_PRINT_DEBUG(security_descriptor, finfo2.query_secdesc.out.sd); sd 286 source4/torture/smb2/setinfo.c NDR_PRINT_DEBUG(security_descriptor, sd); sd 256 source4/torture/smb2/util.c NDR_PRINT_DEBUG(security_descriptor, io.query_secdesc.out.sd);