ace 101 libcli/security/secace.c NTSTATUS sec_ace_mod_sid(struct security_ace *ace, size_t num, struct dom_sid *sid, uint32_t mask)
ace 105 libcli/security/secace.c if (!ace || !sid) return NT_STATUS_INVALID_PARAMETER;
ace 108 libcli/security/secace.c if (dom_sid_equal(&ace[i].trustee, sid)) {
ace 109 libcli/security/secace.c ace[i].access_mask = mask;
ace 31 libcli/security/secace.h NTSTATUS sec_ace_mod_sid(struct security_ace *ace, size_t num, struct dom_sid *sid, uint32_t mask);
ace 33 librpc/ndr/ndr_sec_helper.c size_t ndr_size_security_ace(const struct security_ace *ace, struct smb_iconv_convenience *ic, int flags)
ace 37 librpc/ndr/ndr_sec_helper.c if (!ace) return 0;
ace 39 librpc/ndr/ndr_sec_helper.c ret = 8 + ndr_size_dom_sid(&ace->trustee, ic, flags);
ace 41 librpc/ndr/ndr_sec_helper.c switch (ace->type) {
ace 47 librpc/ndr/ndr_sec_helper.c if (ace->object.object.flags & SEC_ACE_OBJECT_TYPE_PRESENT) {
ace 50 librpc/ndr/ndr_sec_helper.c if (ace->object.object.flags & SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT) {
ace 488 source3/include/proto.h void display_sec_ace(SEC_ACE *ace);
ace 1242 source3/include/proto.h bool token_sid_in_ace(const NT_USER_TOKEN *token, const SEC_ACE *ace);
ace 173 source3/lib/display_sec.c void display_sec_ace(SEC_ACE *ace)
ace 178 source3/lib/display_sec.c switch (ace->type) {
ace 211 source3/lib/display_sec.c printf(" (%d) flags: 0x%02x ", ace->type, ace->flags);
ace 212 source3/lib/display_sec.c display_sec_ace_flags(ace->flags);
ace 213 source3/lib/display_sec.c display_sec_access(&ace->access_mask);
ace 214 source3/lib/display_sec.c sid_to_fstring(sid_str, &ace->trustee);
ace 217 source3/lib/display_sec.c if (sec_ace_object(ace->type)) {
ace 218 source3/lib/display_sec.c disp_sec_ace_object(&ace->object.object);
ace 445 source3/lib/secdesc.c SEC_ACE *ace = 0;
ace 453 source3/lib/secdesc.c status = sec_ace_add_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid, mask);
ace 458 source3/lib/secdesc.c if (!(dacl = make_sec_acl(ctx, psd[0]->dacl->revision, psd[0]->dacl->num_aces, ace)))
ace 497 source3/lib/secdesc.c SEC_ACE *ace = 0;
ace 505 source3/lib/secdesc.c status = sec_ace_del_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid);
ace 510 source3/lib/secdesc.c if (!(dacl = make_sec_acl(ctx, psd[0]->dacl->revision, psd[0]->dacl->num_aces, ace)))
ace 526 source3/lib/secdesc.c static bool is_inheritable_ace(const SEC_ACE *ace,
ace 530 source3/lib/secdesc.c return ((ace->flags & SEC_ACE_FLAG_OBJECT_INHERIT) != 0);
ace 533 source3/lib/secdesc.c if (ace->flags & SEC_ACE_FLAG_CONTAINER_INHERIT) {
ace 537 source3/lib/secdesc.c if ((ace->flags & SEC_ACE_FLAG_OBJECT_INHERIT) &&
ace 538 source3/lib/secdesc.c !(ace->flags & SEC_ACE_FLAG_NO_PROPAGATE_INHERIT)) {
ace 584 source3/lib/secdesc.c const SEC_ACE *ace = &the_acl->aces[i];
ace 586 source3/lib/secdesc.c const DOM_SID *ptrustee = &ace->trustee;
ace 588 source3/lib/secdesc.c uint8 new_flags = ace->flags;
ace 590 source3/lib/secdesc.c if (!is_inheritable_ace(ace, container)) {
ace 621 source3/lib/secdesc.c init_sec_ace(new_ace, ptrustee, ace->type,
ace 622 source3/lib/secdesc.c ace->access_mask, 0);
ace 626 source3/lib/secdesc.c sid_string_dbg(&ace->trustee),
ace 627 source3/lib/secdesc.c ace->type, ace->flags, ace->access_mask,
ace 640 source3/lib/secdesc.c !(ace->flags & SEC_ACE_FLAG_NO_PROPAGATE_INHERIT)) {
ace 641 source3/lib/secdesc.c ptrustee = &ace->trustee;
ace 644 source3/lib/secdesc.c init_sec_ace(new_ace, ptrustee, ace->type,
ace 645 source3/lib/secdesc.c ace->access_mask, new_flags);
ace 649 source3/lib/secdesc.c sid_string_dbg(&ace->trustee),
ace 650 source3/lib/secdesc.c ace->type, ace->flags, ace->access_mask,
ace 651 source3/lib/secdesc.c sid_string_dbg(&ace->trustee),
ace 128 source3/lib/sharesec.c SEC_ACE ace;
ace 136 source3/lib/sharesec.c init_sec_ace(&ace, &global_sid_World, SEC_ACE_TYPE_ACCESS_ALLOWED, sa, 0);
ace 138 source3/lib/sharesec.c if ((psa = make_sec_acl(ctx, NT4_ACL_REVISION, 1, &ace)) != NULL) {
ace 123 source3/lib/util_nttoken.c bool token_sid_in_ace(const NT_USER_TOKEN *token, const struct security_ace *ace)
ace 128 source3/lib/util_nttoken.c if (sid_equal(&ace->trustee, &token->user_sids[i]))
ace 125 source3/lib/util_seaccess.c struct security_ace *ace = &sd->dacl->aces[i];
ace 127 source3/lib/util_seaccess.c if (ace->flags & SEC_ACE_FLAG_INHERIT_ONLY) {
ace 131 source3/lib/util_seaccess.c if (!is_sid_in_token(token, &ace->trustee)) {
ace 135 source3/lib/util_seaccess.c switch (ace->type) {
ace 137 source3/lib/util_seaccess.c granted |= ace->access_mask;
ace 141 source3/lib/util_seaccess.c denied |= ace->access_mask;
ace 216 source3/lib/util_seaccess.c struct security_ace *ace = &sd->dacl->aces[i];
ace 218 source3/lib/util_seaccess.c if (ace->flags & SEC_ACE_FLAG_INHERIT_ONLY) {
ace 222 source3/lib/util_seaccess.c if (!is_sid_in_token(token, &ace->trustee)) {
ace 226 source3/lib/util_seaccess.c switch (ace->type) {
ace 228 source3/lib/util_seaccess.c bits_remaining &= ~ace->access_mask;
ace 232 source3/lib/util_seaccess.c if (bits_remaining & ace->access_mask) {
ace 259 source3/lib/util_seaccess.c SEC_ACE ace[3];
ace 270 source3/lib/util_seaccess.c init_sec_ace(&ace[0], &global_sid_World, SEC_ACE_TYPE_ACCESS_ALLOWED,
ace 274 source3/lib/util_seaccess.c init_sec_ace(&ace[1], &adm_sid,
ace 276 source3/lib/util_seaccess.c init_sec_ace(&ace[2], &act_sid,
ace 279 source3/lib/util_seaccess.c if ((psa = make_sec_acl(ctx, NT4_ACL_REVISION, 3, ace)) == NULL)
ace 691 source3/libgpo/gpo_reg.c SEC_ACE ace[6];
ace 699 source3/libgpo/gpo_reg.c init_sec_ace(&ace[0],
ace 705 source3/libgpo/gpo_reg.c init_sec_ace(&ace[1],
ace 711 source3/libgpo/gpo_reg.c init_sec_ace(&ace[2],
ace 721 source3/libgpo/gpo_reg.c init_sec_ace(&ace[3],
ace 727 source3/libgpo/gpo_reg.c init_sec_ace(&ace[4],
ace 733 source3/libgpo/gpo_reg.c init_sec_ace(&ace[5],
ace 738 source3/libgpo/gpo_reg.c theacl = make_sec_acl(mem_ctx, NT4_ACL_REVISION, 6, ace);
ace 61 source3/libgpo/gpo_sec.c static bool gpo_sd_check_agp_object(const SEC_ACE *ace)
ace 63 source3/libgpo/gpo_sec.c if (!sec_ace_object(ace->type)) {
ace 67 source3/libgpo/gpo_sec.c return gpo_sd_check_agp_object_guid(&ace->object.object);
ace 95 source3/libgpo/gpo_sec.c static NTSTATUS gpo_sd_check_ace_denied_object(const SEC_ACE *ace,
ace 98 source3/libgpo/gpo_sec.c if (gpo_sd_check_agp_object(ace) &&
ace 99 source3/libgpo/gpo_sec.c gpo_sd_check_agp_access_bits(ace->access_mask) &&
ace 100 source3/libgpo/gpo_sec.c nt_token_check_sid(&ace->trustee, token)) {
ace 103 source3/libgpo/gpo_sec.c sid_string_dbg(&ace->trustee)));
ace 113 source3/libgpo/gpo_sec.c static NTSTATUS gpo_sd_check_ace_allowed_object(const SEC_ACE *ace,
ace 116 source3/libgpo/gpo_sec.c if (gpo_sd_check_agp_object(ace) &&
ace 117 source3/libgpo/gpo_sec.c gpo_sd_check_agp_access_bits(ace->access_mask) &&
ace 118 source3/libgpo/gpo_sec.c nt_token_check_sid(&ace->trustee, token)) {
ace 121 source3/libgpo/gpo_sec.c sid_string_dbg(&ace->trustee)));
ace 131 source3/libgpo/gpo_sec.c static NTSTATUS gpo_sd_check_ace(const SEC_ACE *ace,
ace 134 source3/libgpo/gpo_sec.c switch (ace->type) {
ace 136 source3/libgpo/gpo_sec.c return gpo_sd_check_ace_denied_object(ace, token);
ace 138 source3/libgpo/gpo_sec.c return gpo_sd_check_ace_allowed_object(ace, token);
ace 259 source3/libsmb/libsmb_xattr.c SEC_ACE *ace,
ace 297 source3/libsmb/libsmb_xattr.c ZERO_STRUCTP(ace);
ace 388 source3/libsmb/libsmb_xattr.c init_sec_ace(ace, &sid, atype, mask, aflags);
ace 396 source3/libsmb/libsmb_xattr.c SEC_ACE *ace,
ace 403 source3/libsmb/libsmb_xattr.c (*the_acl) = make_sec_acl(ctx, 3, 1, ace);
ace 412 source3/libsmb/libsmb_xattr.c memcpy(aces+(*the_acl)->num_aces, ace, sizeof(SEC_ACE));
ace 510 source3/libsmb/libsmb_xattr.c SEC_ACE ace;
ace 511 source3/libsmb/libsmb_xattr.c if (!parse_ace(ipc_cli, pol, &ace, numeric, tok+4)) {
ace 515 source3/libsmb/libsmb_xattr.c if(!add_ace(&dacl, &ace, ctx)) {
ace 523 source3/libsmb/libsmb_xattr.c SEC_ACE ace;
ace 524 source3/libsmb/libsmb_xattr.c if (!parse_ace(ipc_cli, pol, &ace, False, tok+5)) {
ace 528 source3/libsmb/libsmb_xattr.c if(!add_ace(&dacl, &ace, ctx)) {
ace 1063 source3/libsmb/libsmb_xattr.c SEC_ACE *ace = &sd->dacl->aces[i];
ace 1066 source3/libsmb/libsmb_xattr.c &ace->trustee);
ace 1075 source3/libsmb/libsmb_xattr.c ace->type,
ace 1076 source3/libsmb/libsmb_xattr.c ace->flags,
ace 1077 source3/libsmb/libsmb_xattr.c ace->access_mask);
ace 1088 source3/libsmb/libsmb_xattr.c ace->type,
ace 1089 source3/libsmb/libsmb_xattr.c ace->flags,
ace 1090 source3/libsmb/libsmb_xattr.c ace->access_mask);
ace 1100 source3/libsmb/libsmb_xattr.c ace->type,
ace 1101 source3/libsmb/libsmb_xattr.c ace->flags,
ace 1102 source3/libsmb/libsmb_xattr.c ace->access_mask);
ace 1111 source3/libsmb/libsmb_xattr.c ace->type,
ace 1112 source3/libsmb/libsmb_xattr.c ace->flags,
ace 1113 source3/libsmb/libsmb_xattr.c ace->access_mask);
ace 1122 source3/libsmb/libsmb_xattr.c ace->type,
ace 1123 source3/libsmb/libsmb_xattr.c ace->flags,
ace 1124 source3/libsmb/libsmb_xattr.c ace->access_mask);
ace 1135 source3/libsmb/libsmb_xattr.c ace->type,
ace 1136 source3/libsmb/libsmb_xattr.c ace->flags,
ace 1137 source3/libsmb/libsmb_xattr.c ace->access_mask);
ace 65 source3/modules/nfs4_acls.c static SMB_ACE4_INT_T *get_validated_aceint(SMB4ACE_T *ace)
ace 67 source3/modules/nfs4_acls.c SMB_ACE4_INT_T *aceint = (SMB_ACE4_INT_T *)ace;
ace 68 source3/modules/nfs4_acls.c if (ace==NULL)
ace 102 source3/modules/nfs4_acls.c SMB_ACE4_INT_T *ace;
ace 104 source3/modules/nfs4_acls.c ace = (SMB_ACE4_INT_T *)TALLOC_ZERO_SIZE(mem_ctx, sizeof(SMB_ACE4_INT_T));
ace 105 source3/modules/nfs4_acls.c if (ace==NULL)
ace 111 source3/modules/nfs4_acls.c ace->magic = SMB_ACE4_INT_MAGIC;
ace 113 source3/modules/nfs4_acls.c memcpy(&ace->prop, prop, sizeof(SMB_ACE4PROP_T));
ace 117 source3/modules/nfs4_acls.c aclint->first = ace;
ace 118 source3/modules/nfs4_acls.c aclint->last = ace;
ace 120 source3/modules/nfs4_acls.c aclint->last->next = (void *)ace;
ace 121 source3/modules/nfs4_acls.c aclint->last = ace;
ace 125 source3/modules/nfs4_acls.c return (SMB4ACE_T *)ace;
ace 128 source3/modules/nfs4_acls.c SMB_ACE4PROP_T *smb_get_ace4(SMB4ACE_T *ace)
ace 130 source3/modules/nfs4_acls.c SMB_ACE4_INT_T *aceint = get_validated_aceint(ace);
ace 137 source3/modules/nfs4_acls.c SMB4ACE_T *smb_next_ace4(SMB4ACE_T *ace)
ace 139 source3/modules/nfs4_acls.c SMB_ACE4_INT_T *aceint = get_validated_aceint(ace);
ace 233 source3/modules/nfs4_acls.c SMB_ACE4PROP_T *ace = &aceint->prop;
ace 236 source3/modules/nfs4_acls.c "who: %d\n", aceint->magic, ace->aceType, ace->flags,
ace 237 source3/modules/nfs4_acls.c ace->aceFlags, ace->aceMask, ace->who.id));
ace 241 source3/modules/nfs4_acls.c if (ace->flags & SMB_ACE4_ID_SPECIAL) {
ace 242 source3/modules/nfs4_acls.c switch (ace->who.special_id) {
ace 254 source3/modules/nfs4_acls.c "ignored\n", ace->who.special_id));
ace 257 source3/modules/nfs4_acls.c if (ace->aceFlags & SMB_ACE4_IDENTIFIER_GROUP) {
ace 258 source3/modules/nfs4_acls.c gid_to_sid(&sid, ace->who.gid);
ace 260 source3/modules/nfs4_acls.c uid_to_sid(&sid, ace->who.uid);
ace 263 source3/modules/nfs4_acls.c DEBUG(10, ("mapped %d to %s\n", ace->who.id,
ace 266 source3/modules/nfs4_acls.c if (is_directory && (ace->aceMask & SMB_ACE4_ADD_FILE)) {
ace 267 source3/modules/nfs4_acls.c ace->aceMask |= SMB_ACE4_DELETE_CHILD;
ace 270 source3/modules/nfs4_acls.c mask = ace->aceMask;
ace 272 source3/modules/nfs4_acls.c ace->aceType, mask,
ace 273 source3/modules/nfs4_acls.c ace->aceFlags & 0xf);
ace 416 source3/modules/nfs4_acls.c SMB_ACE4PROP_T *ace = &aceint->prop;
ace 419 source3/modules/nfs4_acls.c ace->aceType,
ace 420 source3/modules/nfs4_acls.c ace->aceFlags, ace->flags,
ace 421 source3/modules/nfs4_acls.c ace->aceMask,
ace 422 source3/modules/nfs4_acls.c ace->who.id));
ace 439 source3/modules/nfs4_acls.c SMB_ACE4PROP_T *ace = &aceint->prop;
ace 441 source3/modules/nfs4_acls.c if (ace->flags == aceNew->flags &&
ace 442 source3/modules/nfs4_acls.c ace->aceType==aceNew->aceType &&
ace 443 source3/modules/nfs4_acls.c (ace->aceFlags&SMB_ACE4_IDENTIFIER_GROUP)==
ace 447 source3/modules/nfs4_acls.c if (ace->flags & SMB_ACE4_ID_SPECIAL)
ace 449 source3/modules/nfs4_acls.c if (ace->who.special_id==aceNew->who.special_id)
ace 450 source3/modules/nfs4_acls.c return ace;
ace 452 source3/modules/nfs4_acls.c if (ace->aceFlags & SMB_ACE4_IDENTIFIER_GROUP)
ace 454 source3/modules/nfs4_acls.c if (ace->who.gid==aceNew->who.gid)
ace 455 source3/modules/nfs4_acls.c return ace;
ace 457 source3/modules/nfs4_acls.c if (ace->who.uid==aceNew->who.uid)
ace 458 source3/modules/nfs4_acls.c return ace;
ace 628 source3/modules/nfs4_acls.c SMB_ACE4PROP_T *ace, /* the "new" ACE */
ace 634 source3/modules/nfs4_acls.c SMB_ACE4PROP_T *ace4found = smbacl4_find_equal_special(theacl, ace);
ace 641 source3/modules/nfs4_acls.c ace4found->aceFlags |= ace->aceFlags;
ace 642 source3/modules/nfs4_acls.c ace4found->aceMask |= ace->aceMask;
ace 122 source3/modules/nfs4_acls.h SMB_ACE4PROP_T *smb_get_ace4(SMB4ACE_T *ace);
ace 128 source3/modules/nfs4_acls.h SMB4ACE_T *smb_next_ace4(SMB4ACE_T *ace);
ace 170 source3/modules/onefs_acl.c onefs_samba_ace_to_ace(SEC_ACE * samba_ace, struct ifs_ace * ace,
ace 175 source3/modules/onefs_acl.c SMB_ASSERT(ace);
ace 220 source3/modules/onefs_acl.c if (aclu_initialize_ace(ace, samba_ace->type,
ace 225 source3/modules/onefs_acl.c if ((ace->trustee.type == IFS_ID_TYPE_CREATOR_OWNER ||
ace 226 source3/modules/onefs_acl.c ace->trustee.type == IFS_ID_TYPE_CREATOR_GROUP) &&
ace 228 source3/modules/onefs_acl.c ace->flags |= SEC_ACE_FLAG_INHERIT_ONLY;
ace 88 source3/modules/vfs_afsacl.c static struct afs_ace *clone_afs_ace(TALLOC_CTX *mem_ctx, struct afs_ace *ace)
ace 95 source3/modules/vfs_afsacl.c *result = *ace;
ace 98 source3/modules/vfs_afsacl.c result->name = talloc_strdup(mem_ctx, ace->name);
ace 194 source3/modules/vfs_afsacl.c struct afs_ace *ace;
ace 196 source3/modules/vfs_afsacl.c for (ace = acl->acelist; ace != NULL; ace = ace->next) {
ace 197 source3/modules/vfs_afsacl.c if ((ace->positive == positive) &&
ace 198 source3/modules/vfs_afsacl.c (strequal(ace->name, name))) {
ace 199 source3/modules/vfs_afsacl.c ace->rights |= rights;
ace 204 source3/modules/vfs_afsacl.c ace = new_afs_ace(acl->ctx, positive, name, rights);
ace 206 source3/modules/vfs_afsacl.c ace->next = acl->acelist;
ace 207 source3/modules/vfs_afsacl.c acl->acelist = ace;
ace 212 source3/modules/vfs_afsacl.c ace->positive?"positive":"negative",
ace 213 source3/modules/vfs_afsacl.c ace->name, ace->rights));
ace 303 source3/modules/vfs_afsacl.c struct afs_ace *ace = acl->acelist;
ace 305 source3/modules/vfs_afsacl.c while (ace != NULL) {
ace 306 source3/modules/vfs_afsacl.c if (ace->positive)
ace 310 source3/modules/vfs_afsacl.c ace = ace->next;
ace 319 source3/modules/vfs_afsacl.c ace = acl->acelist;
ace 321 source3/modules/vfs_afsacl.c while (ace != NULL) {
ace 322 source3/modules/vfs_afsacl.c fstr_sprintf(line, "%s\t%d\n", ace->name, ace->rights);
ace 324 source3/modules/vfs_afsacl.c ace = ace->next;
ace 398 source3/modules/vfs_afsacl.c struct afs_ace *ace;
ace 403 source3/modules/vfs_afsacl.c for (ace = acl->acelist; ace != NULL; ace = ace->next) {
ace 404 source3/modules/vfs_afsacl.c if (ace->rights & AFS_FILE_RIGHTS) {
ace 405 source3/modules/vfs_afsacl.c add_afs_ace(file_acl, ace->positive, ace->name,
ace 406 source3/modules/vfs_afsacl.c ace->rights & AFS_FILE_RIGHTS);
ace 409 source3/modules/vfs_afsacl.c if (ace->rights & AFS_DIR_RIGHTS) {
ace 410 source3/modules/vfs_afsacl.c add_afs_ace(dir_acl, ace->positive, ace->name,
ace 411 source3/modules/vfs_afsacl.c ace->rights & AFS_DIR_RIGHTS);
ace 427 source3/modules/vfs_afsacl.c struct afs_ace *ace;
ace 431 source3/modules/vfs_afsacl.c for (ace = dir_acl->acelist; ace != NULL; ace = ace->next) {
ace 438 source3/modules/vfs_afsacl.c if (!same_principal(ace, file_ace))
ace 441 source3/modules/vfs_afsacl.c add_afs_ace(target, ace->positive, ace->name,
ace 442 source3/modules/vfs_afsacl.c ace->rights | file_ace->rights);
ace 447 source3/modules/vfs_afsacl.c add_afs_ace(target, ace->positive, ace->name,
ace 448 source3/modules/vfs_afsacl.c ace->rights);
ace 451 source3/modules/vfs_afsacl.c for (ace = file_acl->acelist; ace != NULL; ace = ace->next) {
ace 458 source3/modules/vfs_afsacl.c if (!same_principal(ace, dir_ace))
ace 464 source3/modules/vfs_afsacl.c add_afs_ace(target, ace->positive, ace->name,
ace 465 source3/modules/vfs_afsacl.c ace->rights);
ace 531 source3/modules/vfs_afsacl.c static uint32 nt_to_afs_dir_rights(const char *filename, const SEC_ACE *ace)
ace 534 source3/modules/vfs_afsacl.c uint32 rights = ace->access_mask;
ace 535 source3/modules/vfs_afsacl.c uint8 flags = ace->flags;
ace 540 source3/modules/vfs_afsacl.c if ( (ace->type == m->type) &&
ace 541 source3/modules/vfs_afsacl.c (ace->flags == m->flags) &&
ace 542 source3/modules/vfs_afsacl.c (ace->access_mask == m->mask) )
ace 547 source3/modules/vfs_afsacl.c ace->type, ace->flags, ace->access_mask, filename, rights));
ace 572 source3/modules/vfs_afsacl.c static uint32 nt_to_afs_file_rights(const char *filename, const SEC_ACE *ace)
ace 575 source3/modules/vfs_afsacl.c uint32 rights = ace->access_mask;
ace 726 source3/modules/vfs_afsacl.c const SEC_ACE *ace),
ace 744 source3/modules/vfs_afsacl.c const SEC_ACE *ace = &(dacl->aces[i]);
ace 749 source3/modules/vfs_afsacl.c if (ace->type != SEC_ACE_TYPE_ACCESS_ALLOWED) {
ace 754 source3/modules/vfs_afsacl.c if (!mappable_sid(&ace->trustee)) {
ace 756 source3/modules/vfs_afsacl.c sid_string_dbg(&ace->trustee)));
ace 760 source3/modules/vfs_afsacl.c if (sid_compare(&ace->trustee,
ace 765 source3/modules/vfs_afsacl.c } else if (sid_compare(&ace->trustee,
ace 770 source3/modules/vfs_afsacl.c } else if (sid_compare(&ace->trustee,
ace 775 source3/modules/vfs_afsacl.c } else if (sid_compare(&ace->trustee,
ace 783 source3/modules/vfs_afsacl.c if (!lookup_sid(talloc_tos(), &ace->trustee,
ace 786 source3/modules/vfs_afsacl.c sid_string_dbg(&ace->trustee),
ace 809 source3/modules/vfs_afsacl.c sid_string_tos(&ace->trustee));
ace 820 source3/modules/vfs_afsacl.c nt_to_afs_rights(filename, ace));
ace 865 source3/modules/vfs_afsacl.c struct afs_ace *ace;
ace 867 source3/modules/vfs_afsacl.c for (ace = src->acelist; ace != NULL; ace = ace->next)
ace 871 source3/modules/vfs_afsacl.c if (ace->type != SID_NAME_UNKNOWN) {
ace 873 source3/modules/vfs_afsacl.c ace->name));
ace 877 source3/modules/vfs_afsacl.c DEBUG(10, ("Merging unknown ACE for %s\n", ace->name));
ace 879 source3/modules/vfs_afsacl.c copy = clone_afs_ace(dst->ctx, ace);
ace 882 source3/modules/vfs_afsacl.c DEBUG(0, ("Could not clone ACE for %s\n", ace->name));
ace 28 source3/modules/vfs_aixacl_util.c struct smb_acl_entry *ace;
ace 75 source3/modules/vfs_aixacl_util.c ace = &result->acl[result->count];
ace 77 source3/modules/vfs_aixacl_util.c ace->a_type = idp->id_type;
ace 79 source3/modules/vfs_aixacl_util.c switch(ace->a_type) {
ace 81 source3/modules/vfs_aixacl_util.c ace->uid = idp->id_data[0];
ace 82 source3/modules/vfs_aixacl_util.c DEBUG(10,("case ACEID_USER ace->uid is %d\n",ace->uid));
ace 83 source3/modules/vfs_aixacl_util.c ace->a_type = SMB_ACL_USER;
ace 88 source3/modules/vfs_aixacl_util.c ace->gid = idp->id_data[0];
ace 89 source3/modules/vfs_aixacl_util.c DEBUG(10,("case ACEID_GROUP ace->gid is %d\n",ace->gid));
ace 90 source3/modules/vfs_aixacl_util.c ace->a_type = SMB_ACL_GROUP;
ace 103 source3/modules/vfs_aixacl_util.c ace->a_perm = acl_entry->ace_access;
ace 104 source3/modules/vfs_aixacl_util.c ace->a_perm <<= 6;
ace 105 source3/modules/vfs_aixacl_util.c DEBUG(10,("ace->a_perm is %d\n",ace->a_perm));
ace 111 source3/modules/vfs_aixacl_util.c ace->a_perm = ~acl_entry->ace_access & 7;
ace 112 source3/modules/vfs_aixacl_util.c DEBUG(10,("ace->a_perm is %d\n",ace->a_perm));
ace 113 source3/modules/vfs_aixacl_util.c ace->a_perm <<= 6;
ace 122 source3/modules/vfs_aixacl_util.c ace->a_perm |= (ace->a_perm & S_IRUSR) ? SMB_ACL_READ : 0;
ace 123 source3/modules/vfs_aixacl_util.c ace->a_perm |= (ace->a_perm & S_IWUSR) ? SMB_ACL_WRITE : 0;
ace 124 source3/modules/vfs_aixacl_util.c ace->a_perm |= (ace->a_perm & S_IXUSR) ? SMB_ACL_EXECUTE : 0;
ace 125 source3/modules/vfs_aixacl_util.c DEBUG(10,("ace->a_perm is %d\n",ace->a_perm));
ace 151 source3/modules/vfs_aixacl_util.c ace = &result->acl[result->count];
ace 153 source3/modules/vfs_aixacl_util.c ace->uid = 0;
ace 154 source3/modules/vfs_aixacl_util.c ace->gid = 0;
ace 155 source3/modules/vfs_aixacl_util.c DEBUG(10,("ace->uid = %d\n",ace->uid));
ace 159 source3/modules/vfs_aixacl_util.c ace->a_perm = file_acl->g_access << 6;
ace 160 source3/modules/vfs_aixacl_util.c ace->a_type = SMB_ACL_GROUP_OBJ;
ace 164 source3/modules/vfs_aixacl_util.c ace->a_perm = file_acl->o_access << 6;
ace 165 source3/modules/vfs_aixacl_util.c ace->a_type = SMB_ACL_OTHER;
ace 169 source3/modules/vfs_aixacl_util.c ace->a_perm = file_acl->u_access << 6;
ace 170 source3/modules/vfs_aixacl_util.c ace->a_type = SMB_ACL_USER_OBJ;
ace 177 source3/modules/vfs_aixacl_util.c ace->a_perm |= ((ace->a_perm & S_IRUSR) ? SMB_ACL_READ : 0);
ace 178 source3/modules/vfs_aixacl_util.c ace->a_perm |= ((ace->a_perm & S_IWUSR) ? SMB_ACL_WRITE : 0);
ace 179 source3/modules/vfs_aixacl_util.c ace->a_perm |= ((ace->a_perm & S_IXUSR) ? SMB_ACL_EXECUTE : 0);
ace 181 source3/modules/vfs_aixacl_util.c memcpy(&result->acl[result->count],ace,sizeof(struct smb_acl_entry));
ace 183 source3/modules/vfs_aixacl_util.c DEBUG(10,("ace->a_perm = %d\n",ace->a_perm));
ace 184 source3/modules/vfs_aixacl_util.c DEBUG(10,("ace->a_type = %d\n",ace->a_type));
ace 477 source3/modules/vfs_gpfs.c struct smb_acl_entry *ace = &result->acl[i];
ace 486 source3/modules/vfs_gpfs.c ace->a_type = SMB_ACL_USER;
ace 487 source3/modules/vfs_gpfs.c ace->uid = (uid_t)g_ace->ace_who;
ace 490 source3/modules/vfs_gpfs.c ace->a_type = SMB_ACL_USER_OBJ;
ace 493 source3/modules/vfs_gpfs.c ace->a_type = SMB_ACL_GROUP;
ace 494 source3/modules/vfs_gpfs.c ace->gid = (gid_t)g_ace->ace_who;
ace 497 source3/modules/vfs_gpfs.c ace->a_type = SMB_ACL_GROUP_OBJ;
ace 500 source3/modules/vfs_gpfs.c ace->a_type = SMB_ACL_OTHER;
ace 503 source3/modules/vfs_gpfs.c ace->a_type = SMB_ACL_MASK;
ace 513 source3/modules/vfs_gpfs.c ace->a_perm = 0;
ace 514 source3/modules/vfs_gpfs.c ace->a_perm |= (g_ace->ace_perm & ACL_PERM_READ) ?
ace 516 source3/modules/vfs_gpfs.c ace->a_perm |= (g_ace->ace_perm & ACL_PERM_WRITE) ?
ace 518 source3/modules/vfs_gpfs.c ace->a_perm |= (g_ace->ace_perm & ACL_PERM_EXECUTE) ?
ace 522 source3/modules/vfs_gpfs.c ace->a_type, ace->a_perm));
ace 626 source3/modules/vfs_gpfs.c const struct smb_acl_entry *ace = &pacl->acl[i];
ace 630 source3/modules/vfs_gpfs.c (int)ace->a_type, (int)ace->a_perm));
ace 634 source3/modules/vfs_gpfs.c switch(ace->a_type) {
ace 637 source3/modules/vfs_gpfs.c g_ace->ace_who = (gpfs_uid_t)ace->uid;
ace 646 source3/modules/vfs_gpfs.c g_ace->ace_who = (gpfs_uid_t)ace->gid;
ace 662 source3/modules/vfs_gpfs.c DEBUG(10, ("Got invalid ace_type: %d\n", ace->a_type));
ace 668 source3/modules/vfs_gpfs.c g_ace->ace_perm |= (ace->a_perm & SMB_ACL_READ) ?
ace 670 source3/modules/vfs_gpfs.c g_ace->ace_perm |= (ace->a_perm & SMB_ACL_WRITE) ?
ace 672 source3/modules/vfs_gpfs.c g_ace->ace_perm |= (ace->a_perm & SMB_ACL_EXECUTE) ?
ace 774 source3/modules/vfs_gpfs.c SMB_ACE4PROP_T *ace = smb_get_ace4(smbace);
ace 775 source3/modules/vfs_gpfs.c uint32_t specid = ace->who.special_id;
ace 777 source3/modules/vfs_gpfs.c if (ace->flags&SMB_ACE4_ID_SPECIAL &&
ace 778 source3/modules/vfs_gpfs.c ace->aceType<=SMB_ACE4_ACCESS_DENIED_ACE_TYPE &&
ace 783 source3/modules/vfs_gpfs.c if (ace->aceType==SMB_ACE4_ACCESS_ALLOWED_ACE_TYPE)
ace 788 source3/modules/vfs_gpfs.c newMask = gpfsacl_mask_filter(ace->aceType, ace->aceMask,
ace 790 source3/modules/vfs_gpfs.c if (ace->aceMask!=newMask) {
ace 792 source3/modules/vfs_gpfs.c path, ace->aceMask, newMask, specid));
ace 794 source3/modules/vfs_gpfs.c ace->aceMask = newMask;
ace 803 source3/modules/vfs_gpfs.c SMB_ACE4PROP_T ace;
ace 808 source3/modules/vfs_gpfs.c ZERO_STRUCT(ace);
ace 809 source3/modules/vfs_gpfs.c ace.aceType = SMB_ACE4_ACCESS_ALLOWED_ACE_TYPE;
ace 810 source3/modules/vfs_gpfs.c ace.flags |= SMB_ACE4_ID_SPECIAL;
ace 811 source3/modules/vfs_gpfs.c ace.who.special_id = i;
ace 814 source3/modules/vfs_gpfs.c ace.aceFlags |= SMB_ACE4_IDENTIFIER_GROUP;
ace 816 source3/modules/vfs_gpfs.c ace.aceMask = gpfsacl_mask_filter(ace.aceType, ace.aceMask,
ace 820 source3/modules/vfs_gpfs.c if (!ace.aceMask)
ace 824 source3/modules/vfs_gpfs.c smb_add_ace4(pacl, &ace);
ace 826 source3/modules/vfs_gpfs.c path, mode, i, ace.aceMask));
ace 96 source3/modules/vfs_hpuxacl.c #define _IS_DEFAULT(ace) ((ace).a_type & ACL_DEFAULT)
ace 97 source3/modules/vfs_hpuxacl.c #define _IS_OF_TYPE(ace, type) ( \
ace 98 source3/modules/vfs_hpuxacl.c (((type) == SMB_ACL_TYPE_ACCESS) && !_IS_DEFAULT(ace)) \
ace 100 source3/modules/vfs_hpuxacl.c (((type) == SMB_ACL_TYPE_DEFAULT) && _IS_DEFAULT(ace)) \
ace 26 source3/modules/vfs_posixacl.c struct smb_acl_entry *ace);
ace 138 source3/modules/vfs_posixacl.c struct smb_acl_entry *ace)
ace 150 source3/modules/vfs_posixacl.c ace->a_type = SMB_ACL_USER;
ace 153 source3/modules/vfs_posixacl.c ace->a_type = SMB_ACL_USER_OBJ;
ace 156 source3/modules/vfs_posixacl.c ace->a_type = SMB_ACL_GROUP;
ace 159 source3/modules/vfs_posixacl.c ace->a_type = SMB_ACL_GROUP_OBJ;
ace 162 source3/modules/vfs_posixacl.c ace->a_type = SMB_ACL_OTHER;
ace 165 source3/modules/vfs_posixacl.c ace->a_type = SMB_ACL_MASK;
ace 171 source3/modules/vfs_posixacl.c switch(ace->a_type) {
ace 178 source3/modules/vfs_posixacl.c ace->uid = *puid;
ace 189 source3/modules/vfs_posixacl.c ace->gid = *pgid;
ace 200 source3/modules/vfs_posixacl.c ace->a_perm = 0;
ace 202 source3/modules/vfs_posixacl.c ace->a_perm |= (acl_get_perm_np(permset, ACL_READ) ? SMB_ACL_READ : 0);
ace 203 source3/modules/vfs_posixacl.c ace->a_perm |= (acl_get_perm_np(permset, ACL_WRITE) ? SMB_ACL_WRITE : 0);
ace 204 source3/modules/vfs_posixacl.c ace->a_perm |= (acl_get_perm_np(permset, ACL_EXECUTE) ? SMB_ACL_EXECUTE : 0);
ace 206 source3/modules/vfs_posixacl.c ace->a_perm |= (acl_get_perm(permset, ACL_READ) ? SMB_ACL_READ : 0);
ace 207 source3/modules/vfs_posixacl.c ace->a_perm |= (acl_get_perm(permset, ACL_WRITE) ? SMB_ACL_WRITE : 0);
ace 208 source3/modules/vfs_posixacl.c ace->a_perm |= (acl_get_perm(permset, ACL_EXECUTE) ? SMB_ACL_EXECUTE : 0);
ace 31 source3/modules/vfs_solarisacl.c #define _IS_DEFAULT(ace) ((ace).a_type & ACL_DEFAULT)
ace 32 source3/modules/vfs_solarisacl.c #define _IS_OF_TYPE(ace, type) ( \
ace 33 source3/modules/vfs_solarisacl.c (((type) == SMB_ACL_TYPE_ACCESS) && !_IS_DEFAULT(ace)) \
ace 35 source3/modules/vfs_solarisacl.c (((type) == SMB_ACL_TYPE_DEFAULT) && _IS_DEFAULT(ace)) \
ace 5398 source3/printing/nt_printing.c SEC_ACE ace[5]; /* max number of ace entries */
ace 5410 source3/printing/nt_printing.c init_sec_ace(&ace[i++], &global_sid_World, SEC_ACE_TYPE_ACCESS_ALLOWED,
ace 5422 source3/printing/nt_printing.c init_sec_ace(&ace[i++], &domadmins_sid,
ace 5425 source3/printing/nt_printing.c init_sec_ace(&ace[i++], &domadmins_sid, SEC_ACE_TYPE_ACCESS_ALLOWED,
ace 5432 source3/printing/nt_printing.c init_sec_ace(&ace[i++], &adm_sid,
ace 5435 source3/printing/nt_printing.c init_sec_ace(&ace[i++], &adm_sid, SEC_ACE_TYPE_ACCESS_ALLOWED,
ace 5442 source3/printing/nt_printing.c init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
ace 5445 source3/printing/nt_printing.c init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
ace 5456 source3/printing/nt_printing.c if ((psa = make_sec_acl(ctx, NT4_ACL_REVISION, i, ace)) != NULL) {
ace 39 source3/registry/reg_dispatcher.c SEC_ACE ace[3];
ace 47 source3/registry/reg_dispatcher.c init_sec_ace(&ace[i++], &global_sid_World, SEC_ACE_TYPE_ACCESS_ALLOWED,
ace 52 source3/registry/reg_dispatcher.c init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
ace 57 source3/registry/reg_dispatcher.c init_sec_ace(&ace[i++], &global_sid_System, SEC_ACE_TYPE_ACCESS_ALLOWED,
ace 62 source3/registry/reg_dispatcher.c theacl = make_sec_acl(ctx, NT4_ACL_REVISION, i, ace);
ace 295 source3/rpc_server/srv_lsa_nt.c SEC_ACE ace[5];
ace 302 source3/rpc_server/srv_lsa_nt.c init_sec_ace(&ace[i++], &global_sid_World, SEC_ACE_TYPE_ACCESS_ALLOWED,
ace 307 source3/rpc_server/srv_lsa_nt.c init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
ace 309 source3/rpc_server/srv_lsa_nt.c init_sec_ace(&ace[i++], &global_sid_Builtin_Account_Operators,
ace 315 source3/rpc_server/srv_lsa_nt.c init_sec_ace(&ace[i++], &adm_sid, SEC_ACE_TYPE_ACCESS_ALLOWED,
ace 321 source3/rpc_server/srv_lsa_nt.c init_sec_ace(&ace[i++], sid, SEC_ACE_TYPE_ACCESS_ALLOWED,
ace 325 source3/rpc_server/srv_lsa_nt.c if((psa = make_sec_acl(mem_ctx, NT4_ACL_REVISION, i, ace)) == NULL)
ace 117 source3/rpc_server/srv_samr_nt.c SEC_ACE ace[5]; /* at most 5 entries */
ace 124 source3/rpc_server/srv_samr_nt.c init_sec_ace(&ace[i++], &global_sid_World, SEC_ACE_TYPE_ACCESS_ALLOWED,
ace 129 source3/rpc_server/srv_samr_nt.c init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
ace 131 source3/rpc_server/srv_samr_nt.c init_sec_ace(&ace[i++], &global_sid_Builtin_Account_Operators,
ace 139 source3/rpc_server/srv_samr_nt.c init_sec_ace(&ace[i++], &domadmin_sid,
ace 146 source3/rpc_server/srv_samr_nt.c init_sec_ace(&ace[i++], sid, SEC_ACE_TYPE_ACCESS_ALLOWED, sid_access, 0);
ace 151 source3/rpc_server/srv_samr_nt.c if ((psa = make_sec_acl(ctx, NT4_ACL_REVISION, i, ace)) == NULL)
ace 137 source3/rpc_server/srv_svcctl_nt.c SEC_ACE ace[2];
ace 145 source3/rpc_server/srv_svcctl_nt.c init_sec_ace(&ace[i++], &global_sid_World,
ace 150 source3/rpc_server/srv_svcctl_nt.c init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
ace 156 source3/rpc_server/srv_svcctl_nt.c if ( !(theacl = make_sec_acl(ctx, NT4_ACL_REVISION, i, ace)) )
ace 91 source3/services/services_db.c SEC_ACE ace[4];
ace 99 source3/services/services_db.c init_sec_ace(&ace[i++], &global_sid_World,
ace 102 source3/services/services_db.c init_sec_ace(&ace[i++], &global_sid_Builtin_Power_Users,
ace 105 source3/services/services_db.c init_sec_ace(&ace[i++], &global_sid_Builtin_Server_Operators,
ace 107 source3/services/services_db.c init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
ace 112 source3/services/services_db.c if ( !(theacl = make_sec_acl(ctx, NT4_ACL_REVISION, i, ace)) )
ace 726 source3/smbd/posix_acls.c canon_ace *ace;
ace 728 source3/smbd/posix_acls.c for (ace = l_head; ace; ace = ace->next)
ace 1464 source3/smbd/posix_acls.c static void check_owning_objs(canon_ace *ace, DOM_SID *pfile_owner_sid, DOM_SID *pfile_grp_sid)
ace 1470 source3/smbd/posix_acls.c entries = count_canon_ace_list(ace);
ace 1474 source3/smbd/posix_acls.c for (i=0, current_ace = ace; i < entries; i++, current_ace = current_ace->next) {
ace 1485 source3/smbd/posix_acls.c for (i=0, current_ace = ace; i < entries; i++, current_ace = current_ace->next) {
ace 2332 source3/smbd/posix_acls.c canon_ace *ace = NULL;
ace 2334 source3/smbd/posix_acls.c for (ace = l_head; ace; ace = ace->next) {
ace 2335 source3/smbd/posix_acls.c if (ace->type == SMB_ACL_USER_OBJ)
ace 2336 source3/smbd/posix_acls.c owner_ace = ace;
ace 2337 source3/smbd/posix_acls.c else if (ace->type == SMB_ACL_OTHER) {
ace 2339 source3/smbd/posix_acls.c other_ace = ace;
ace 2378 source3/smbd/posix_acls.c canon_ace *ace = NULL;
ace 2469 source3/smbd/posix_acls.c if ((ace = SMB_MALLOC_P(canon_ace)) == NULL)
ace 2472 source3/smbd/posix_acls.c ZERO_STRUCTP(ace);
ace 2473 source3/smbd/posix_acls.c ace->type = tagtype;
ace 2474 source3/smbd/posix_acls.c ace->perms = convert_permset_to_mode_t(conn, permset);
ace 2475 source3/smbd/posix_acls.c ace->attr = ALLOW_ACE;
ace 2476 source3/smbd/posix_acls.c ace->trustee = sid;
ace 2477 source3/smbd/posix_acls.c ace->unix_ug = unix_ug;
ace 2478 source3/smbd/posix_acls.c ace->owner_type = owner_type;
ace 2479 source3/smbd/posix_acls.c ace->ace_flags = get_pai_flags(pal, ace, (the_acl_type == SMB_ACL_TYPE_DEFAULT));
ace 2481 source3/smbd/posix_acls.c DLIST_ADD(l_head, ace);
ace 2500 source3/smbd/posix_acls.c for ( ace_count = 0, ace = l_head; ace; ace = next_ace, ace_count++) {
ace 2501 source3/smbd/posix_acls.c next_ace = ace->next;
ace 2504 source3/smbd/posix_acls.c if (ace->type != SMB_ACL_OTHER && ace->type != SMB_ACL_USER_OBJ)
ace 2505 source3/smbd/posix_acls.c ace->perms &= acl_mask;
ace 2507 source3/smbd/posix_acls.c if (ace->perms == 0) {
ace 2508 source3/smbd/posix_acls.c DLIST_PROMOTE(l_head, ace);
ace 2512 source3/smbd/posix_acls.c print_canon_ace(ace, ace_count);
ace 3111 source3/smbd/posix_acls.c canon_ace *ace;
ace 3127 source3/smbd/posix_acls.c ace = canon_ace_entry_for(dir_ace, SMB_ACL_OTHER, NULL);
ace 3128 source3/smbd/posix_acls.c if (ace && !ace->perms) {
ace 3129 source3/smbd/posix_acls.c DLIST_REMOVE(dir_ace, ace);
ace 3130 source3/smbd/posix_acls.c SAFE_FREE(ace);
ace 3132 source3/smbd/posix_acls.c ace = canon_ace_entry_for(file_ace, SMB_ACL_OTHER, NULL);
ace 3133 source3/smbd/posix_acls.c if (ace && !ace->perms) {
ace 3134 source3/smbd/posix_acls.c DLIST_REMOVE(file_ace, ace);
ace 3135 source3/smbd/posix_acls.c SAFE_FREE(ace);
ace 3149 source3/smbd/posix_acls.c ace = canon_ace_entry_for(dir_ace, SMB_ACL_GROUP_OBJ, NULL);
ace 3150 source3/smbd/posix_acls.c if (ace && !ace->perms) {
ace 3151 source3/smbd/posix_acls.c DLIST_REMOVE(dir_ace, ace);
ace 3152 source3/smbd/posix_acls.c SAFE_FREE(ace);
ace 3156 source3/smbd/posix_acls.c ace = canon_ace_entry_for(file_ace, SMB_ACL_GROUP_OBJ, NULL);
ace 3157 source3/smbd/posix_acls.c if (ace && !ace->perms) {
ace 3158 source3/smbd/posix_acls.c DLIST_REMOVE(file_ace, ace);
ace 3159 source3/smbd/posix_acls.c SAFE_FREE(ace);
ace 3178 source3/smbd/posix_acls.c for (ace = file_ace; ace != NULL; ace = ace->next) {
ace 3181 source3/smbd/posix_acls.c ace->perms,
ace 3184 source3/smbd/posix_acls.c &ace->trustee,
ace 3187 source3/smbd/posix_acls.c ace->ace_flags);
ace 3199 source3/smbd/posix_acls.c for (ace = dir_ace; ace != NULL; ace = ace->next) {
ace 3202 source3/smbd/posix_acls.c ace->perms,
ace 3205 source3/smbd/posix_acls.c &ace->trustee,
ace 3208 source3/smbd/posix_acls.c ace->ace_flags |
ace 67 source3/utils/sharesec.c static void print_ace(FILE *f, SEC_ACE *ace)
ace 73 source3/utils/sharesec.c fprintf(f, "%s:", sid_string_tos(&ace->trustee));
ace 77 source3/utils/sharesec.c if (ace->type == SEC_ACE_TYPE_ACCESS_ALLOWED) {
ace 79 source3/utils/sharesec.c } else if (ace->type == SEC_ACE_TYPE_ACCESS_DENIED) {
ace 82 source3/utils/sharesec.c fprintf(f, "%d", ace->type);
ace 87 source3/utils/sharesec.c fprintf(f, "/%d/", ace->flags);
ace 92 source3/utils/sharesec.c if (ace->access_mask == v->mask) {
ace 101 source3/utils/sharesec.c got_mask = ace->access_mask;
ace 105 source3/utils/sharesec.c if ((ace->access_mask & v->mask) == v->mask) {
ace 115 source3/utils/sharesec.c fprintf(f, "0x%08x", ace->access_mask);
ace 141 source3/utils/sharesec.c SEC_ACE *ace = &sd->dacl->aces[i];
ace 143 source3/utils/sharesec.c print_ace(f, ace);
ace 152 source3/utils/sharesec.c static bool parse_ace(SEC_ACE *ace, const char *orig_str)
ace 171 source3/utils/sharesec.c ZERO_STRUCTP(ace);
ace 287 source3/utils/sharesec.c init_sec_ace(ace, &sid, atype, mask, aflags);
ace 300 source3/utils/sharesec.c SEC_ACE *ace;
ace 312 source3/utils/sharesec.c if ( !(ace = TALLOC_ZERO_ARRAY( mem_ctx, SEC_ACE, num_ace )) )
ace 322 source3/utils/sharesec.c if ( !parse_ace( &ace[i], acl_string ) )
ace 329 source3/utils/sharesec.c if ( !(theacl = make_sec_acl( mem_ctx, NT4_ACL_REVISION, num_ace, ace )) )
ace 339 source3/utils/sharesec.c static bool add_ace(TALLOC_CTX *mem_ctx, SEC_ACL **the_acl, SEC_ACE *ace)
ace 344 source3/utils/sharesec.c return (((*the_acl) = make_sec_acl(mem_ctx, 3, 1, ace)) != NULL);
ace 351 source3/utils/sharesec.c memcpy(aces+(*the_acl)->num_aces, ace, sizeof(SEC_ACE));
ace 265 source3/utils/smbcacls.c static void print_ace(struct cli_state *cli, FILE *f, SEC_ACE *ace)
ace 272 source3/utils/smbcacls.c SidToString(cli, sidstr, &ace->trustee);
ace 278 source3/utils/smbcacls.c ace->type, ace->flags, ace->access_mask);
ace 284 source3/utils/smbcacls.c if (ace->type == SEC_ACE_TYPE_ACCESS_ALLOWED) {
ace 286 source3/utils/smbcacls.c } else if (ace->type == SEC_ACE_TYPE_ACCESS_DENIED) {
ace 289 source3/utils/smbcacls.c fprintf(f, "%d", ace->type);
ace 292 source3/utils/smbcacls.c print_ace_flags(f, ace->flags);
ace 297 source3/utils/smbcacls.c if (ace->access_mask == v->mask) {
ace 306 source3/utils/smbcacls.c got_mask = ace->access_mask;
ace 310 source3/utils/smbcacls.c if ((ace->access_mask & v->mask) == v->mask) {
ace 320 source3/utils/smbcacls.c fprintf(f, "0x%08x", ace->access_mask);
ace 361 source3/utils/smbcacls.c static bool parse_ace(struct cli_state *cli, SEC_ACE *ace,
ace 381 source3/utils/smbcacls.c ZERO_STRUCTP(ace);
ace 521 source3/utils/smbcacls.c init_sec_ace(ace, &sid, atype, mask, aflags);
ace 528 source3/utils/smbcacls.c static bool add_ace(SEC_ACL **the_acl, SEC_ACE *ace)
ace 533 source3/utils/smbcacls.c return (((*the_acl) = make_sec_acl(talloc_tos(), 3, 1, ace))
ace 541 source3/utils/smbcacls.c memcpy(aces+(*the_acl)->num_aces, ace, sizeof(SEC_ACE));
ace 594 source3/utils/smbcacls.c SEC_ACE ace;
ace 595 source3/utils/smbcacls.c if (!parse_ace(cli, &ace, tok+4)) {
ace 598 source3/utils/smbcacls.c if(!add_ace(&dacl, &ace)) {
ace 649 source3/utils/smbcacls.c SEC_ACE *ace = &sd->dacl->aces[i];
ace 651 source3/utils/smbcacls.c print_ace(cli, f, ace);
ace 46 source4/libcli/security/access_check.c struct security_ace *ace = &sd->dacl->aces[i];
ace 48 source4/libcli/security/access_check.c if (ace->flags & SEC_ACE_FLAG_INHERIT_ONLY) {
ace 52 source4/libcli/security/access_check.c if (!security_token_has_sid(token, &ace->trustee)) {
ace 56 source4/libcli/security/access_check.c switch (ace->type) {
ace 58 source4/libcli/security/access_check.c granted |= ace->access_mask;
ace 62 source4/libcli/security/access_check.c denied |= ace->access_mask;
ace 124 source4/libcli/security/access_check.c struct security_ace *ace = &sd->dacl->aces[i];
ace 126 source4/libcli/security/access_check.c if (ace->flags & SEC_ACE_FLAG_INHERIT_ONLY) {
ace 130 source4/libcli/security/access_check.c if (!security_token_has_sid(token, &ace->trustee)) {
ace 134 source4/libcli/security/access_check.c switch (ace->type) {
ace 136 source4/libcli/security/access_check.c bits_remaining &= ~ace->access_mask;
ace 140 source4/libcli/security/access_check.c if (bits_remaining & ace->access_mask) {
ace 182 source4/libcli/security/sddl.c static bool sddl_decode_ace(TALLOC_CTX *mem_ctx, struct security_ace *ace, char *str,
ace 191 source4/libcli/security/sddl.c ZERO_STRUCTP(ace);
ace 207 source4/libcli/security/sddl.c ace->type = v;
ace 213 source4/libcli/security/sddl.c ace->flags = v;
ace 217 source4/libcli/security/sddl.c ace->access_mask = strtol(tok[2], NULL, 16);
ace 222 source4/libcli/security/sddl.c ace->access_mask = v;
ace 228 source4/libcli/security/sddl.c &ace->object.object.type.type);
ace 232 source4/libcli/security/sddl.c ace->object.object.flags |= SEC_ACE_OBJECT_TYPE_PRESENT;
ace 238 source4/libcli/security/sddl.c &ace->object.object.inherited_type.inherited_type);
ace 242 source4/libcli/security/sddl.c ace->object.object.flags |= SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT;
ace 251 source4/libcli/security/sddl.c ace->trustee = *sid;
ace 465 source4/libcli/security/sddl.c static char *sddl_encode_ace(TALLOC_CTX *mem_ctx, const struct security_ace *ace,
ace 479 source4/libcli/security/sddl.c s_type = sddl_flags_to_string(tmp_ctx, ace_types, ace->type, true);
ace 482 source4/libcli/security/sddl.c s_flags = sddl_flags_to_string(tmp_ctx, ace_flags, ace->flags, true);
ace 485 source4/libcli/security/sddl.c s_mask = sddl_flags_to_string(tmp_ctx, ace_access_mask, ace->access_mask, true);
ace 487 source4/libcli/security/sddl.c s_mask = talloc_asprintf(tmp_ctx, "0x%08x", ace->access_mask);
ace 491 source4/libcli/security/sddl.c if (ace->type == SEC_ACE_TYPE_ACCESS_ALLOWED_OBJECT ||
ace 492 source4/libcli/security/sddl.c ace->type == SEC_ACE_TYPE_ACCESS_DENIED_OBJECT ||
ace 493 source4/libcli/security/sddl.c ace->type == SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT ||
ace 494 source4/libcli/security/sddl.c ace->type == SEC_ACE_TYPE_SYSTEM_AUDIT_OBJECT) {
ace 495 source4/libcli/security/sddl.c if (ace->object.object.flags & SEC_ACE_OBJECT_TYPE_PRESENT) {
ace 496 source4/libcli/security/sddl.c s_object = GUID_string(tmp_ctx, &ace->object.object.type.type);
ace 500 source4/libcli/security/sddl.c if (ace->object.object.flags & SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT) {
ace 501 source4/libcli/security/sddl.c s_iobject = GUID_string(tmp_ctx, &ace->object.object.inherited_type.inherited_type);
ace 506 source4/libcli/security/sddl.c s_trustee = sddl_encode_sid(tmp_ctx, &ace->trustee, domain_sid);
ace 532 source4/libcli/security/sddl.c char *ace = sddl_encode_ace(sddl, &acl->aces[i], domain_sid);
ace 533 source4/libcli/security/sddl.c if (ace == NULL) goto failed;
ace 534 source4/libcli/security/sddl.c sddl = talloc_asprintf_append_buffer(sddl, "(%s)", ace);
ace 536 source4/libcli/security/sddl.c talloc_free(ace);
ace 137 source4/libcli/security/security_descriptor.c const struct security_ace *ace)
ace 164 source4/libcli/security/security_descriptor.c acl->aces[acl->num_aces] = *ace;
ace 195 source4/libcli/security/security_descriptor.c const struct security_ace *ace)
ace 197 source4/libcli/security/security_descriptor.c return security_descriptor_acl_add(sd, true, ace);
ace 205 source4/libcli/security/security_descriptor.c const struct security_ace *ace)
ace 207 source4/libcli/security/security_descriptor.c return security_descriptor_acl_add(sd, false, ace);
ace 375 source4/libcli/security/security_descriptor.c struct security_ace *ace = talloc(sd, struct security_ace);
ace 378 source4/libcli/security/security_descriptor.c if (ace == NULL) {
ace 382 source4/libcli/security/security_descriptor.c ace->type = va_arg(ap, unsigned int);
ace 383 source4/libcli/security/security_descriptor.c ace->access_mask = va_arg(ap, unsigned int);
ace 384 source4/libcli/security/security_descriptor.c ace->flags = va_arg(ap, unsigned int);
ace 385 source4/libcli/security/security_descriptor.c sid = dom_sid_parse_talloc(ace, sidstr);
ace 390 source4/libcli/security/security_descriptor.c ace->trustee = *sid;
ace 392 source4/libcli/security/security_descriptor.c status = security_descriptor_sacl_add(sd, ace);
ace 394 source4/libcli/security/security_descriptor.c status = security_descriptor_dacl_add(sd, ace);
ace 514 source4/libcli/security/security_descriptor.c struct security_ace *ace;
ace 516 source4/libcli/security/security_descriptor.c ace = talloc_zero(mem_ctx, struct security_ace);
ace 517 source4/libcli/security/security_descriptor.c if (ace == NULL) {
ace 521 source4/libcli/security/security_descriptor.c sid = dom_sid_parse_talloc(ace, sid_str);
ace 523 source4/libcli/security/security_descriptor.c talloc_free(ace);
ace 527 source4/libcli/security/security_descriptor.c ace->trustee = *sid;
ace 528 source4/libcli/security/security_descriptor.c ace->type = type;
ace 529 source4/libcli/security/security_descriptor.c ace->access_mask = access_mask;
ace 530 source4/libcli/security/security_descriptor.c ace->flags = flags;
ace 532 source4/libcli/security/security_descriptor.c return ace;
ace 103 source4/librpc/ndr/py_security.c struct security_ace *ace;
ace 109 source4/librpc/ndr/py_security.c ace = py_talloc_get_ptr(py_ace);
ace 110 source4/librpc/ndr/py_security.c status = security_descriptor_sacl_add(desc, ace);
ace 119 source4/librpc/ndr/py_security.c struct security_ace *ace;
ace 125 source4/librpc/ndr/py_security.c ace = py_talloc_get_ptr(py_ace);
ace 127 source4/librpc/ndr/py_security.c status = security_descriptor_dacl_add(desc, ace);
ace 133 source4/ntvfs/posix/pvfs_acl.c struct security_ace *ace = &acl->aces[i];
ace 134 source4/ntvfs/posix/pvfs_acl.c ace->access_mask = pvfs_translate_mask(ace->access_mask);
ace 149 source4/ntvfs/posix/pvfs_acl.c struct security_ace ace;
ace 201 source4/ntvfs/posix/pvfs_acl.c ace.type = SEC_ACE_TYPE_ACCESS_ALLOWED;
ace 202 source4/ntvfs/posix/pvfs_acl.c ace.flags = 0;
ace 203 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *sd->owner_sid;
ace 204 source4/ntvfs/posix/pvfs_acl.c ace.access_mask = 0;
ace 208 source4/ntvfs/posix/pvfs_acl.c ace.access_mask |= SEC_RIGHTS_FILE_ALL;
ace 210 source4/ntvfs/posix/pvfs_acl.c ace.access_mask |= SEC_RIGHTS_FILE_READ | SEC_FILE_EXECUTE;
ace 214 source4/ntvfs/posix/pvfs_acl.c ace.access_mask |= SEC_RIGHTS_FILE_WRITE | SEC_STD_DELETE;
ace 216 source4/ntvfs/posix/pvfs_acl.c if (ace.access_mask) {
ace 217 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace);
ace 222 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *sd->group_sid;
ace 223 source4/ntvfs/posix/pvfs_acl.c ace.access_mask = 0;
ace 225 source4/ntvfs/posix/pvfs_acl.c ace.access_mask |= SEC_RIGHTS_FILE_READ | SEC_FILE_EXECUTE;
ace 229 source4/ntvfs/posix/pvfs_acl.c ace.access_mask |= SEC_RIGHTS_FILE_WRITE;
ace 231 source4/ntvfs/posix/pvfs_acl.c if (ace.access_mask) {
ace 232 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace);
ace 236 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *dom_sid_parse_talloc(req, SID_WORLD);
ace 237 source4/ntvfs/posix/pvfs_acl.c ace.access_mask = 0;
ace 239 source4/ntvfs/posix/pvfs_acl.c ace.access_mask |= SEC_RIGHTS_FILE_READ | SEC_FILE_EXECUTE;
ace 242 source4/ntvfs/posix/pvfs_acl.c ace.access_mask |= SEC_RIGHTS_FILE_WRITE;
ace 244 source4/ntvfs/posix/pvfs_acl.c if (ace.access_mask) {
ace 245 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace);
ace 249 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *dom_sid_parse_talloc(req, SID_NT_SYSTEM);
ace 250 source4/ntvfs/posix/pvfs_acl.c ace.access_mask = SEC_RIGHTS_FILE_ALL;
ace 251 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace);
ace 634 source4/ntvfs/posix/pvfs_acl.c const struct security_ace *ace,
ace 638 source4/ntvfs/posix/pvfs_acl.c return (ace->flags & SEC_ACE_FLAG_OBJECT_INHERIT) != 0;
ace 641 source4/ntvfs/posix/pvfs_acl.c if (ace->flags & SEC_ACE_FLAG_CONTAINER_INHERIT) {
ace 645 source4/ntvfs/posix/pvfs_acl.c if ((ace->flags & SEC_ACE_FLAG_OBJECT_INHERIT) &&
ace 646 source4/ntvfs/posix/pvfs_acl.c !(ace->flags & SEC_ACE_FLAG_NO_PROPAGATE_INHERIT)) {
ace 666 source4/ntvfs/posix/pvfs_acl.c struct security_ace ace = parent_sd->dacl->aces[i];
ace 671 source4/ntvfs/posix/pvfs_acl.c if (!pvfs_inheritable_ace(pvfs, &ace, container)) {
ace 675 source4/ntvfs/posix/pvfs_acl.c orig_flags = ace.flags;
ace 679 source4/ntvfs/posix/pvfs_acl.c ace.flags = 0;
ace 681 source4/ntvfs/posix/pvfs_acl.c ace.flags &= ~SEC_ACE_FLAG_INHERIT_ONLY;
ace 683 source4/ntvfs/posix/pvfs_acl.c if (!(ace.flags & SEC_ACE_FLAG_CONTAINER_INHERIT)) {
ace 684 source4/ntvfs/posix/pvfs_acl.c ace.flags |= SEC_ACE_FLAG_INHERIT_ONLY;
ace 686 source4/ntvfs/posix/pvfs_acl.c if (ace.flags & SEC_ACE_FLAG_NO_PROPAGATE_INHERIT) {
ace 687 source4/ntvfs/posix/pvfs_acl.c ace.flags = 0;
ace 692 source4/ntvfs/posix/pvfs_acl.c if (dom_sid_equal(&ace.trustee, pvfs->sid_cache.creator_owner)) {
ace 695 source4/ntvfs/posix/pvfs_acl.c } else if (dom_sid_equal(&ace.trustee, pvfs->sid_cache.creator_group)) {
ace 699 source4/ntvfs/posix/pvfs_acl.c new_id = &ace.trustee;
ace 703 source4/ntvfs/posix/pvfs_acl.c (ace.flags & SEC_ACE_FLAG_CONTAINER_INHERIT)) {
ace 704 source4/ntvfs/posix/pvfs_acl.c uint32_t flags = ace.flags;
ace 706 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *new_id;
ace 707 source4/ntvfs/posix/pvfs_acl.c ace.flags = 0;
ace 708 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace);
ace 713 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *creator;
ace 714 source4/ntvfs/posix/pvfs_acl.c ace.flags = flags | SEC_ACE_FLAG_INHERIT_ONLY;
ace 715 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace);
ace 718 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace);
ace 720 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *new_id;
ace 721 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace);
ace 83 source4/ntvfs/posix/pvfs_acl_nfs4.c struct nfs4ace *a = &acl->ace[i];
ace 107 source4/ntvfs/posix/pvfs_acl_nfs4.c struct nfs4ace *a = &acl->ace[i];
ace 108 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_ace ace;
ace 109 source4/ntvfs/posix/pvfs_acl_nfs4.c ace.type = a->e_type;
ace 110 source4/ntvfs/posix/pvfs_acl_nfs4.c ace.flags = a->e_flags;
ace 111 source4/ntvfs/posix/pvfs_acl_nfs4.c ace.access_mask = a->e_mask;
ace 112 source4/ntvfs/posix/pvfs_acl_nfs4.c ace.trustee = *ids[i+2].sid;
ace 113 source4/ntvfs/posix/pvfs_acl_nfs4.c security_descriptor_dacl_add(sd, &ace);
ace 143 source4/ntvfs/posix/pvfs_acl_nfs4.c acl.ace = talloc_array(tmp_ctx, struct nfs4ace, acl.a_count);
ace 144 source4/ntvfs/posix/pvfs_acl_nfs4.c if (!acl.ace) {
ace 156 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_ace *ace = &sd->dacl->aces[i];
ace 158 source4/ntvfs/posix/pvfs_acl_nfs4.c ids[i].sid = dom_sid_dup(ids, &ace->trustee);
ace 178 source4/ntvfs/posix/pvfs_acl_nfs4.c struct nfs4ace *a = &acl.ace[i];
ace 179 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_ace *ace = &sd->dacl->aces[i];
ace 180 source4/ntvfs/posix/pvfs_acl_nfs4.c a->e_type = ace->type;
ace 181 source4/ntvfs/posix/pvfs_acl_nfs4.c a->e_flags = ace->flags;
ace 182 source4/ntvfs/posix/pvfs_acl_nfs4.c a->e_mask = ace->access_mask;
ace 53 source4/torture/raw/acls.c struct security_ace ace;
ace 91 source4/torture/raw/acls.c ace.type = SEC_ACE_TYPE_ACCESS_ALLOWED;
ace 92 source4/torture/raw/acls.c ace.flags = 0;
ace 93 source4/torture/raw/acls.c ace.access_mask = SEC_STD_ALL;
ace 94 source4/torture/raw/acls.c ace.trustee = *test_sid;
ace 96 source4/torture/raw/acls.c status = security_descriptor_dacl_add(sd, &ace);
ace 157 source4/torture/raw/acls.c struct security_ace ace;
ace 204 source4/torture/raw/acls.c ace.type = SEC_ACE_TYPE_ACCESS_ALLOWED;
ace 205 source4/torture/raw/acls.c ace.flags = 0;
ace 206 source4/torture/raw/acls.c ace.access_mask = SEC_STD_ALL;
ace 207 source4/torture/raw/acls.c ace.trustee = *test_sid;
ace 209 source4/torture/raw/acls.c status = security_descriptor_dacl_add(sd, &ace);
ace 231 source4/torture/raw/composite.c struct security_ace *ace;
ace 272 source4/torture/raw/composite.c ace = talloc_zero(tctx, struct security_ace);
ace 274 source4/torture/raw/composite.c ace->type = SEC_ACE_TYPE_ACCESS_ALLOWED;
ace 275 source4/torture/raw/composite.c ace->flags = 0;
ace 276 source4/torture/raw/composite.c ace->access_mask = SEC_STD_ALL;
ace 277 source4/torture/raw/composite.c ace->trustee = *test_sid;
ace 279 source4/torture/raw/composite.c status = security_descriptor_dacl_add(test_sd, ace);
ace 320 source4/torture/raw/composite.c security_descriptor_dacl_add(io_orig[i]->out.sd, ace);
ace 328 source4/torture/raw/composite.c talloc_free (ace);
ace 245 source4/torture/rpc/samr_accessmask.c struct security_ace ace;
ace 281 source4/torture/rpc/samr_accessmask.c ace.type = SEC_ACE_TYPE_ACCESS_DENIED;
ace 282 source4/torture/rpc/samr_accessmask.c ace.flags = 0;
ace 283 source4/torture/rpc/samr_accessmask.c ace.access_mask = SAMR_ACCESS_CONNECT_TO_SERVER;
ace 284 source4/torture/rpc/samr_accessmask.c ace.trustee = *test_sid;
ace 285 source4/torture/rpc/samr_accessmask.c status = security_descriptor_dacl_add(sd, &ace);
ace 681 source4/torture/rpc/winreg.c const struct security_ace *ace)
ace 695 source4/torture/rpc/winreg.c if (security_ace_equal(&sd->dacl->aces[i], ace)) {
ace 774 source4/torture/rpc/winreg.c struct security_ace *ace = NULL;
ace 794 source4/torture/rpc/winreg.c ace = security_ace_create(tctx,
ace 800 source4/torture/rpc/winreg.c status = security_descriptor_dacl_add(sd, ace);
ace 814 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
ace 833 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
ace 850 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
ace 884 source4/torture/rpc/winreg.c struct security_ace *ace = NULL;
ace 906 source4/torture/rpc/winreg.c ace = security_ace_create(tctx,
ace 913 source4/torture/rpc/winreg.c status = security_descriptor_dacl_add(sd, ace);
ace 923 source4/torture/rpc/winreg.c if (!test_dacl_ace_present(p, tctx, &new_handle, ace)) {
ace 941 source4/torture/rpc/winreg.c if (test_dacl_ace_present(p, tctx, &new_handle, ace)) {
ace 965 source4/torture/rpc/winreg.c if (test_dacl_ace_present(p, tctx, &new_handle, ace)) {
ace 379 source4/torture/smb2/create.c struct security_ace ace;
ace 421 source4/torture/smb2/create.c ace.type = SEC_ACE_TYPE_ACCESS_ALLOWED;
ace 422 source4/torture/smb2/create.c ace.flags = 0;
ace 423 source4/torture/smb2/create.c ace.access_mask = SEC_STD_ALL;
ace 424 source4/torture/smb2/create.c ace.trustee = *test_sid;
ace 426 source4/torture/smb2/create.c status = security_descriptor_dacl_add(sd, &ace);
ace 48 source4/torture/smb2/setinfo.c struct security_ace ace;
ace 247 source4/torture/smb2/setinfo.c ZERO_STRUCT(ace);
ace 248 source4/torture/smb2/setinfo.c ace.type = SEC_ACE_TYPE_ACCESS_ALLOWED;
ace 249 source4/torture/smb2/setinfo.c ace.flags = 0;
ace 250 source4/torture/smb2/setinfo.c ace.access_mask = SEC_STD_ALL;
ace 251 source4/torture/smb2/setinfo.c ace.trustee = *test_sid;
ace 252 source4/torture/smb2/setinfo.c status = security_descriptor_dacl_add(sd, &ace);