token 476 lib/replace/replace.c char *token;
token 486 lib/replace/replace.c token = s;
token 487 lib/replace/replace.c s = strpbrk(token, delim);
token 489 lib/replace/replace.c *save_ptr = token + strlen(token);
token 495 lib/replace/replace.c return token;
token 1578 nsswitch/pam_winbind.c char *token = NULL;
token 1629 nsswitch/pam_winbind.c while ((token = strtok_r(p, "/", &safe_ptr)) != NULL) {
token 1635 nsswitch/pam_winbind.c _pam_log_debug(ctx, LOG_DEBUG, "token is %s", token);
token 1637 nsswitch/pam_winbind.c create_dir = talloc_asprintf_append(create_dir, "%s/", token);
token 1643 nsswitch/pam_winbind.c if (strcmp(token, user_dir) == 0) {
token 1644 nsswitch/pam_winbind.c _pam_log_debug(ctx, LOG_DEBUG, "assuming last directory: %s", token);
token 2105 nsswitch/pam_winbind.c char *token;
token 2113 nsswitch/pam_winbind.c *pass = token = NULL;
token 2199 nsswitch/pam_winbind.c token = x_strdup(resp[i - replies].resp);
token 2200 nsswitch/pam_winbind.c if (!token) {
token 2211 nsswitch/pam_winbind.c strcmp(token, resp[i - 1].resp)) {
token 2212 nsswitch/pam_winbind.c _pam_delete(token); /* mistyped */
token 2236 nsswitch/pam_winbind.c retval = pam_set_item(ctx->pamh, authtok_flag, token);
token 2237 nsswitch/pam_winbind.c _pam_delete(token); /* clean it up */
token 743 nsswitch/winbind_nss_aix.c static void wb_aix_close(void *token)
token 655 source3/auth/auth_util.c static NTSTATUS log_nt_token(NT_USER_TOKEN *token)
token 669 source3/auth/auth_util.c for (i=1; i<token->num_sids; i++) {
token 672 source3/auth/auth_util.c sid_string_talloc(frame, &token->user_sids[i]));
token 677 source3/auth/auth_util.c "%s", sid_string_talloc(frame, &token->user_sids[0]));
token 824 source3/auth/auth_util.c struct nt_user_token **token)
token 1056 source3/auth/auth_util.c *token = create_local_nt_token(mem_ctx, &user_sid,
token 1059 source3/auth/auth_util.c if ((*token == NULL) || (*found_username == NULL)) {
token 1083 source3/auth/auth_util.c struct nt_user_token *token;
token 1096 source3/auth/auth_util.c &token);
token 1103 source3/auth/auth_util.c result = nt_token_check_sid(group_sid, token);
token 33 source3/auth/token_util.c bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token )
token 37 source3/auth/token_util.c if ( !sid || !token )
token 40 source3/auth/token_util.c for ( i=0; i<token->num_sids; i++ ) {
token 41 source3/auth/token_util.c if ( sid_equal( sid, &token->user_sids[i] ) )
token 48 source3/auth/token_util.c bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid )
token 68 source3/auth/token_util.c return nt_token_check_sid( &domain_sid, token );\
token 80 source3/auth/token_util.c struct nt_user_token *token, *for_cache;
token 105 source3/auth/token_util.c token = create_local_nt_token(talloc_autofree_context(), &u_sid, False,
token 108 source3/auth/token_util.c token->privileges = se_disk_operators;
token 110 source3/auth/token_util.c for_cache = token;
token 116 source3/auth/token_util.c return token;
token 125 source3/auth/token_util.c struct nt_user_token *token)
token 140 source3/auth/token_util.c token->user_sids,
token 141 source3/auth/token_util.c token->num_sids,
token 153 source3/auth/token_util.c status = add_sid_to_array_unique(token, &alias_sid,
token 154 source3/auth/token_util.c &token->user_sids,
token 155 source3/auth/token_util.c &token->num_sids);
token 170 source3/auth/token_util.c static NTSTATUS add_builtin_administrators(struct nt_user_token *token,
token 193 source3/auth/token_util.c if ( nt_token_check_sid( &domadm, token ) ) {
token 194 source3/auth/token_util.c status = add_sid_to_array(token,
token 196 source3/auth/token_util.c &token->user_sids, &token->num_sids);
token 517 source3/auth/token_util.c void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token)
token 521 source3/auth/token_util.c if (!token) {
token 528 source3/auth/token_util.c sid_string_dbg(&token->user_sids[0]) ));
token 530 source3/auth/token_util.c ("contains %lu SIDs\n", (unsigned long)token->num_sids));
token 531 source3/auth/token_util.c for (i = 0; i < token->num_sids; i++)
token 534 source3/auth/token_util.c sid_string_dbg(&token->user_sids[i])));
token 536 source3/auth/token_util.c dump_se_priv( dbg_class, dbg_lev, &token->privileges );
token 149 source3/include/gpo.h const struct nt_user_token *token;
token 268 source3/include/nameserv.h int token; /* Used when communicating with backup browsers. */
token 115 source3/include/proto.h struct nt_user_token **token);
token 176 source3/include/proto.h bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token );
token 177 source3/include/proto.h bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid );
token 180 source3/include/proto.h struct nt_user_token *token);
token 188 source3/include/proto.h void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token);
token 628 source3/include/proto.h bool user_has_privileges(const NT_USER_TOKEN *token, const SE_PRIV *privilege);
token 629 source3/include/proto.h bool user_has_any_privilege(NT_USER_TOKEN *token, const SE_PRIV *privilege);
token 719 source3/include/proto.h bool share_access_check(const NT_USER_TOKEN *token, const char *sharename,
token 1242 source3/include/proto.h bool token_sid_in_ace(const NT_USER_TOKEN *token, const SEC_ACE *ace);
token 1272 source3/include/proto.h NTSTATUS se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token,
token 1329 source3/include/proto.h bool is_sid_in_token(const NT_USER_TOKEN *token, const DOM_SID *sid);
token 2011 source3/include/proto.h const struct nt_user_token *token,
token 2018 source3/include/proto.h const struct nt_user_token *token,
token 2085 source3/include/proto.h struct nt_user_token **token);
token 2090 source3/include/proto.h const struct nt_user_token *token,
token 2099 source3/include/proto.h const struct nt_user_token *token,
token 2121 source3/include/proto.h const struct nt_user_token *token,
token 2149 source3/include/proto.h const struct nt_user_token *token,
token 2155 source3/include/proto.h const struct nt_user_token *token);
token 2174 source3/include/proto.h const struct nt_user_token *token,
token 2181 source3/include/proto.h const struct nt_user_token *token,
token 2206 source3/include/proto.h struct nt_user_token **token);
token 3296 source3/include/proto.h ssize_t read_spnego_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, SPNEGO_DATA *token);
token 4951 source3/include/proto.h const struct nt_user_token *token,
token 4984 source3/include/proto.h uint32 desired_access, const struct nt_user_token *token,
token 4994 source3/include/proto.h const struct nt_user_token *token,
token 4997 source3/include/proto.h WERROR reg_delete_path(const struct nt_user_token *token,
token 5061 source3/include/proto.h const struct nt_user_token *token );
token 5157 source3/include/proto.h const struct nt_user_token *token,
token 5963 source3/include/proto.h WERROR delete_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *sharename );
token 6052 source3/include/proto.h WERROR add_port_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *portname, const char *uri );
token 6053 source3/include/proto.h bool add_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, NT_PRINTER_INFO_LEVEL *printer);
token 6106 source3/include/proto.h SEC_DESC *svcctl_get_secdesc( TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token );
token 6107 source3/include/proto.h bool svcctl_set_secdesc( TALLOC_CTX *ctx, const char *name, SEC_DESC *sec_desc, NT_USER_TOKEN *token );
token 6108 source3/include/proto.h const char *svcctl_lookup_dispname(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token );
token 6109 source3/include/proto.h const char *svcctl_lookup_description(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token );
token 6110 source3/include/proto.h REGVAL_CTR *svcctl_fetch_regvalues( const char *name, NT_USER_TOKEN *token );
token 6599 source3/include/proto.h const NT_USER_TOKEN *token,
token 6965 source3/include/proto.h void set_sec_ctx(uid_t uid, gid_t gid, int ngroups, gid_t *groups, NT_USER_TOKEN *token);
token 7014 source3/include/proto.h const struct nt_user_token *token,
token 7017 source3/include/proto.h const struct nt_user_token *token, int snum);
token 7020 source3/include/proto.h const struct nt_user_token *token,
token 7282 source3/include/proto.h NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token,
token 7286 source3/include/proto.h void map_max_allowed_access(const NT_USER_TOKEN *token,
token 139 source3/include/reg_objects.h const NT_USER_TOKEN *token );
token 167 source3/include/reg_objects.h struct nt_user_token *token;
token 361 source3/lib/interface.c static void interpret_interface(char *token)
token 375 source3/lib/interface.c if (gen_fnmatch(token, probed_ifaces[i].name) == 0) {
token 385 source3/lib/interface.c p = strchr_m(token,'/');
token 387 source3/lib/interface.c if (!interpret_string_addr(&ss, token, 0)) {
token 389 source3/lib/interface.c "for %s\n", token));
token 401 source3/lib/interface.c token));
token 407 source3/lib/interface.c goodaddr = interpret_string_addr(&ss, token, 0);
token 413 source3/lib/interface.c token));
token 471 source3/lib/interface.c token));
token 478 source3/lib/interface.c token));
token 481 source3/lib/interface.c (void)strlcpy(ifs.name, token, sizeof(ifs.name));
token 141 source3/lib/ldb/tools/oLschema2ldif.c struct schema_token *token;
token 144 source3/lib/ldb/tools/oLschema2ldif.c token = talloc(ctx, struct schema_token);
token 147 source3/lib/ldb/tools/oLschema2ldif.c type = talloc_strndup(token, c, n);
token 153 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_NAME;
token 165 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 171 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 175 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_SUP;
token 180 source3/lib/ldb/tools/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n);
token 184 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 189 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 194 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_STRUCTURAL;
token 196 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 201 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_ABSTRACT;
token 203 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 208 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_AUXILIARY;
token 210 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 215 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_MUST;
token 220 source3/lib/ldb/tools/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n);
token 224 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 229 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 234 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_MAY;
token 239 source3/lib/ldb/tools/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n);
token 243 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 248 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 253 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_SINGLE_VALUE;
token 255 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 260 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_EQUALITY;
token 262 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 266 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 271 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_ORDERING;
token 273 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 277 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 282 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_SUBSTR;
token 284 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 288 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 293 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_SYNTAX;
token 295 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 299 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 304 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_DESC;
token 306 source3/lib/ldb/tools/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 310 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 313 source3/lib/ldb/tools/oLschema2ldif.c token->type = SCHEMA_UNKNOWN;
token 314 source3/lib/ldb/tools/oLschema2ldif.c token->value = type;
token 317 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 328 source3/lib/ldb/tools/oLschema2ldif.c return token;
token 335 source3/lib/ldb/tools/oLschema2ldif.c struct schema_token *token;
token 382 source3/lib/ldb/tools/oLschema2ldif.c token = get_next_schema_token(msg, &c);
token 383 source3/lib/ldb/tools/oLschema2ldif.c if (!token) goto failed;
token 385 source3/lib/ldb/tools/oLschema2ldif.c switch (token->type) {
token 387 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_STRING("cn", token->value);
token 388 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_STRING("name", token->value);
token 389 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_STRING("lDAPDisplayName", token->value);
token 392 source3/lib/ldb/tools/oLschema2ldif.c token->value);
token 396 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_M_STRING("subClassOf", token->value);
token 412 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_M_STRING("mustContain", token->value);
token 416 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_M_STRING("mayContain", token->value);
token 438 source3/lib/ldb/tools/oLschema2ldif.c find_syntax_map_by_standard_oid(token->value);
token 446 source3/lib/ldb/tools/oLschema2ldif.c MSG_ADD_STRING("description", token->value);
token 450 source3/lib/ldb/tools/oLschema2ldif.c fprintf(stderr, "Unknown Definition: %s\n", token->value);
token 343 source3/lib/privileges_basic.c bool user_has_privileges(const NT_USER_TOKEN *token, const SE_PRIV *privilege)
token 345 source3/lib/privileges_basic.c if ( !token )
token 348 source3/lib/privileges_basic.c return is_privilege_assigned( &token->privileges, privilege );
token 356 source3/lib/privileges_basic.c bool user_has_any_privilege(NT_USER_TOKEN *token, const SE_PRIV *privilege)
token 358 source3/lib/privileges_basic.c if ( !token )
token 361 source3/lib/privileges_basic.c return is_any_privilege_assigned( &token->privileges, privilege );
token 279 source3/lib/sharesec.c bool share_access_check(const NT_USER_TOKEN *token, const char *sharename,
token 293 source3/lib/sharesec.c status = se_access_check(psd, token, desired_access, &granted);
token 538 source3/lib/smbconf/smbconf_reg.c struct nt_user_token *token;
token 551 source3/lib/smbconf/smbconf_reg.c werr = ntstatus_to_werror(registry_create_admin_token(ctx, &token));
token 571 source3/lib/smbconf/smbconf_reg.c token, &rpd(ctx)->base_key);
token 666 source3/lib/smbconf/smbconf_reg.c struct nt_user_token *token;
token 668 source3/lib/smbconf/smbconf_reg.c werr = ntstatus_to_werror(registry_create_admin_token(ctx, &token));
token 681 source3/lib/smbconf/smbconf_reg.c werr = reg_open_path(mem_ctx, path, REG_KEY_WRITE, token,
token 36 source3/lib/util_nttoken.c NT_USER_TOKEN *token;
token 41 source3/lib/util_nttoken.c token = TALLOC_ZERO_P(mem_ctx, NT_USER_TOKEN);
token 42 source3/lib/util_nttoken.c if (token == NULL) {
token 48 source3/lib/util_nttoken.c token->user_sids = (DOM_SID *)talloc_memdup(
token 49 source3/lib/util_nttoken.c token, ptoken->user_sids, sizeof(DOM_SID) * ptoken->num_sids );
token 51 source3/lib/util_nttoken.c if (token->user_sids == NULL) {
token 53 source3/lib/util_nttoken.c TALLOC_FREE(token);
token 56 source3/lib/util_nttoken.c token->num_sids = ptoken->num_sids;
token 61 source3/lib/util_nttoken.c if ( !se_priv_copy( &token->privileges, &ptoken->privileges ) ) {
token 66 source3/lib/util_nttoken.c return token;
token 78 source3/lib/util_nttoken.c struct nt_user_token *token = NULL;
token 86 source3/lib/util_nttoken.c token = TALLOC_ZERO_P(mem_ctx, struct nt_user_token);
token 87 source3/lib/util_nttoken.c NT_STATUS_HAVE_NO_MEMORY(token);
token 92 source3/lib/util_nttoken.c &token->user_sids,
token 93 source3/lib/util_nttoken.c &token->num_sids);
token 95 source3/lib/util_nttoken.c TALLOC_FREE(token);
token 103 source3/lib/util_nttoken.c &token->user_sids,
token 104 source3/lib/util_nttoken.c &token->num_sids);
token 106 source3/lib/util_nttoken.c TALLOC_FREE(token);
token 111 source3/lib/util_nttoken.c se_priv_add(&token->privileges, &token_1->privileges);
token 112 source3/lib/util_nttoken.c se_priv_add(&token->privileges, &token_2->privileges);
token 114 source3/lib/util_nttoken.c *token_out = token;
token 123 source3/lib/util_nttoken.c bool token_sid_in_ace(const NT_USER_TOKEN *token, const struct security_ace *ace)
token 127 source3/lib/util_nttoken.c for (i = 0; i < token->num_sids; i++) {
token 128 source3/lib/util_nttoken.c if (sid_equal(&ace->trustee, &token->user_sids[i]))
token 109 source3/lib/util_seaccess.c const NT_USER_TOKEN *token)
token 114 source3/lib/util_seaccess.c if (is_sid_in_token(token, sd->owner_sid)) {
token 116 source3/lib/util_seaccess.c } else if (user_has_privileges(token, &se_restore)) {
token 131 source3/lib/util_seaccess.c if (!is_sid_in_token(token, &ace->trustee)) {
token 157 source3/lib/util_seaccess.c const NT_USER_TOKEN *token,
token 171 source3/lib/util_seaccess.c access_desired |= access_check_max_allowed(sd, token);
token 186 source3/lib/util_seaccess.c if (user_has_privileges(token, &sec_security)) {
token 202 source3/lib/util_seaccess.c is_sid_in_token(token, sd->owner_sid)) {
token 206 source3/lib/util_seaccess.c user_has_privileges(token, &se_restore)) {
token 222 source3/lib/util_seaccess.c if (!is_sid_in_token(token, &ace->trustee)) {
token 667 source3/lib/util_sid.c bool is_sid_in_token(const NT_USER_TOKEN *token, const DOM_SID *sid)
token 671 source3/lib/util_sid.c for (i=0; i<token->num_sids; i++) {
token 672 source3/lib/util_sid.c if (sid_compare(sid, &token->user_sids[i]) == 0)
token 586 source3/libgpo/gpext/gpext.c struct nt_user_token *token;
token 588 source3/libgpo/gpext/gpext.c token = registry_create_system_token(mem_ctx);
token 589 source3/libgpo/gpext/gpext.c NT_STATUS_HAVE_NO_MEMORY(token);
token 594 source3/libgpo/gpext/gpext.c token,
token 670 source3/libgpo/gpext/gpext.c const struct nt_user_token *token,
token 684 source3/libgpo/gpext/gpext.c const struct nt_user_token *token,
token 726 source3/libgpo/gpext/gpext.c token,
token 63 source3/libgpo/gpext/gpext.h const struct nt_user_token *token,
token 71 source3/libgpo/gpext/gpext.h const struct nt_user_token *token,
token 468 source3/libgpo/gpext/registry.c const struct nt_user_token *token,
token 489 source3/libgpo/gpext/registry.c token,
token 502 source3/libgpo/gpext/registry.c token, flags);
token 523 source3/libgpo/gpext/registry.c const struct nt_user_token *token,
token 553 source3/libgpo/gpext/registry.c werr = reg_apply_registry(mem_ctx, token, root_key, flags,
token 254 source3/libgpo/gpext/scripts.c const struct nt_user_token *token,
token 284 source3/libgpo/gpext/scripts.c token,
token 311 source3/libgpo/gpext/scripts.c token, flags);
token 331 source3/libgpo/gpext/scripts.c const struct nt_user_token *token,
token 377 source3/libgpo/gpext/scripts.c werr = scripts_apply(ini_ctx->mem_ctx, token, root_key,
token 142 source3/libgpo/gpext/security.c const struct nt_user_token *token,
token 550 source3/libgpo/gpo_ldap.c const struct nt_user_token *token)
token 590 source3/libgpo/gpo_ldap.c token));
token 617 source3/libgpo/gpo_ldap.c struct nt_user_token **token)
token 666 source3/libgpo/gpo_ldap.c *token = new_token;
token 668 source3/libgpo/gpo_ldap.c debug_nt_user_token(DBGC_CLASS, 5, *token);
token 708 source3/libgpo/gpo_ldap.c const struct nt_user_token *token,
token 759 source3/libgpo/gpo_ldap.c token);
token 806 source3/libgpo/gpo_ldap.c token);
token 852 source3/libgpo/gpo_ldap.c token);
token 28 source3/libgpo/gpo_reg.c struct nt_user_token *token = NULL;
token 30 source3/libgpo/gpo_reg.c token = TALLOC_ZERO_P(mem_ctx, struct nt_user_token);
token 31 source3/libgpo/gpo_reg.c if (!token) {
token 36 source3/libgpo/gpo_reg.c token->privileges = se_priv_all;
token 38 source3/libgpo/gpo_reg.c if (!NT_STATUS_IS_OK(add_sid_to_array(token, &global_sid_System,
token 39 source3/libgpo/gpo_reg.c &token->user_sids, &token->num_sids))) {
token 44 source3/libgpo/gpo_reg.c return token;
token 53 source3/libgpo/gpo_reg.c const struct nt_user_token *token,
token 71 source3/libgpo/gpo_reg.c if (token) {
token 72 source3/libgpo/gpo_reg.c tmp_ctx->token = token;
token 74 source3/libgpo/gpo_reg.c tmp_ctx->token = registry_create_system_token(mem_ctx);
token 76 source3/libgpo/gpo_reg.c if (!tmp_ctx->token) {
token 94 source3/libgpo/gpo_reg.c tmp_ctx->token, &tmp_ctx->curr_key);
token 152 source3/libgpo/gpo_reg.c reg_ctx->token, key);
token 313 source3/libgpo/gpo_reg.c const struct nt_user_token *token,
token 318 source3/libgpo/gpo_reg.c path = gp_reg_groupmembership_path(mem_ctx, &token->user_sids[0],
token 331 source3/libgpo/gpo_reg.c const struct nt_user_token *token,
token 342 source3/libgpo/gpo_reg.c path = gp_reg_groupmembership_path(mem_ctx, &token->user_sids[0],
token 346 source3/libgpo/gpo_reg.c gp_reg_del_groupmembership(mem_ctx, reg_ctx->curr_key, token, flags);
token 352 source3/libgpo/gpo_reg.c for (i=0; i<token->num_sids; i++) {
token 357 source3/libgpo/gpo_reg.c val = sid_string_talloc(mem_ctx, &token->user_sids[i]);
token 376 source3/libgpo/gpo_reg.c struct nt_user_token **token,
token 417 source3/libgpo/gpo_reg.c *token = tmp_token;
token 452 source3/libgpo/gpo_reg.c const struct nt_user_token *token,
token 463 source3/libgpo/gpo_reg.c token, ®_ctx);
token 467 source3/libgpo/gpo_reg.c &token->user_sids[0]);
token 473 source3/libgpo/gpo_reg.c werr = gp_reg_store_groupmembership(mem_ctx, reg_ctx, token, flags);
token 479 source3/libgpo/gpo_reg.c subkeyname = gp_req_state_path(mem_ctx, &token->user_sids[0], flags);
token 927 source3/libgpo/gpo_reg.c const struct nt_user_token *token,
token 956 source3/libgpo/gpo_reg.c &token->user_sids[0]);
token 96 source3/libgpo/gpo_sec.c const struct nt_user_token *token)
token 100 source3/libgpo/gpo_sec.c nt_token_check_sid(&ace->trustee, token)) {
token 114 source3/libgpo/gpo_sec.c const struct nt_user_token *token)
token 118 source3/libgpo/gpo_sec.c nt_token_check_sid(&ace->trustee, token)) {
token 132 source3/libgpo/gpo_sec.c const struct nt_user_token *token)
token 136 source3/libgpo/gpo_sec.c return gpo_sd_check_ace_denied_object(ace, token);
token 138 source3/libgpo/gpo_sec.c return gpo_sd_check_ace_allowed_object(ace, token);
token 148 source3/libgpo/gpo_sec.c const struct nt_user_token *token)
token 155 source3/libgpo/gpo_sec.c if (!token) {
token 174 source3/libgpo/gpo_sec.c status = gpo_sd_check_ace(&dacl->aces[i], token);
token 438 source3/libgpo/gpo_util.c const struct nt_user_token *token,
token 479 source3/libgpo/gpo_util.c flags, token, root_key, gpo,
token 495 source3/libgpo/gpo_util.c const struct nt_user_token *token,
token 515 source3/libgpo/gpo_util.c status = gpo_process_a_gpo(ads, mem_ctx, token, root_key,
token 533 source3/libgpo/gpo_util.c const struct nt_user_token *token,
token 562 source3/libgpo/gpo_util.c token,
token 592 source3/libgpo/gpo_util.c status = gpo_process_gpo_list_by_ext(ads, mem_ctx, token,
token 849 source3/libgpo/gpo_util.c struct nt_user_token **token)
token 864 source3/libgpo/gpo_util.c token);
token 497 source3/libsmb/clispnego.c SPNEGO_DATA token;
token 500 source3/libsmb/clispnego.c len = read_spnego_data(talloc_tos(), blob, &token);
token 506 source3/libsmb/clispnego.c if (token.type != SPNEGO_NEG_TOKEN_TARG) {
token 508 source3/libsmb/clispnego.c token.type));
token 509 source3/libsmb/clispnego.c free_spnego_data(&token);
token 514 source3/libsmb/clispnego.c token.negTokenTarg.responseToken.data,
token 515 source3/libsmb/clispnego.c token.negTokenTarg.responseToken.length);
token 516 source3/libsmb/clispnego.c free_spnego_data(&token);
token 28 source3/libsmb/spnego.c static bool read_negTokenInit(TALLOC_CTX *mem_ctx, ASN1_DATA *asn1, negTokenInit_t *token)
token 30 source3/libsmb/spnego.c ZERO_STRUCTP(token);
token 44 source3/libsmb/spnego.c token->mechTypes = TALLOC_P(mem_ctx, const char *);
token 48 source3/libsmb/spnego.c token->mechTypes =
token 49 source3/libsmb/spnego.c TALLOC_REALLOC_ARRAY(mem_ctx, token->mechTypes, const char *, i + 2);
token 50 source3/libsmb/spnego.c if (!token->mechTypes) {
token 55 source3/libsmb/spnego.c token->mechTypes[i] = p_oid;
token 57 source3/libsmb/spnego.c token->mechTypes[i] = NULL;
token 65 source3/libsmb/spnego.c asn1_read_Integer(asn1, &token->reqFlags);
token 66 source3/libsmb/spnego.c token->reqFlags |= SPNEGO_REQ_FLAG;
token 72 source3/libsmb/spnego.c asn1_read_OctetString(asn1, mem_ctx, &token->mechToken);
token 80 source3/libsmb/spnego.c &token->mechListMIC);
token 91 source3/libsmb/spnego.c token->mechListMIC =
token 109 source3/libsmb/spnego.c static bool write_negTokenInit(ASN1_DATA *asn1, negTokenInit_t *token)
token 115 source3/libsmb/spnego.c if (token->mechTypes && *token->mechTypes) {
token 120 source3/libsmb/spnego.c for (i = 0; token->mechTypes[i]; i++) {
token 121 source3/libsmb/spnego.c asn1_write_OID(asn1, token->mechTypes[i]);
token 128 source3/libsmb/spnego.c if (token->reqFlags & SPNEGO_REQ_FLAG) {
token 129 source3/libsmb/spnego.c int flags = token->reqFlags & ~SPNEGO_REQ_FLAG;
token 137 source3/libsmb/spnego.c if (token->mechToken.data) {
token 139 source3/libsmb/spnego.c asn1_write_OctetString(asn1, token->mechToken.data,
token 140 source3/libsmb/spnego.c token->mechToken.length);
token 145 source3/libsmb/spnego.c if (token->mechListMIC.data) {
token 149 source3/libsmb/spnego.c asn1_write_OctetString(asn1, token->mechListMIC.data,
token 150 source3/libsmb/spnego.c token->mechListMIC.length);
token 157 source3/libsmb/spnego.c asn1_write(asn1, token->mechListMIC.data,
token 158 source3/libsmb/spnego.c token->mechListMIC.length);
token 172 source3/libsmb/spnego.c static bool read_negTokenTarg(TALLOC_CTX *mem_ctx, ASN1_DATA *asn1, negTokenTarg_t *token)
token 174 source3/libsmb/spnego.c ZERO_STRUCTP(token);
token 184 source3/libsmb/spnego.c asn1_read_uint8(asn1, &token->negResult);
token 193 source3/libsmb/spnego.c token->supportedMech = CONST_DISCARD(char *, mech);
token 198 source3/libsmb/spnego.c asn1_read_OctetString(asn1, mem_ctx, &token->responseToken);
token 203 source3/libsmb/spnego.c asn1_read_OctetString(asn1, mem_ctx, &token->mechListMIC);
token 218 source3/libsmb/spnego.c static bool write_negTokenTarg(ASN1_DATA *asn1, negTokenTarg_t *token)
token 224 source3/libsmb/spnego.c asn1_write_enumerated(asn1, token->negResult);
token 227 source3/libsmb/spnego.c if (token->supportedMech) {
token 229 source3/libsmb/spnego.c asn1_write_OID(asn1, token->supportedMech);
token 233 source3/libsmb/spnego.c if (token->responseToken.data) {
token 235 source3/libsmb/spnego.c asn1_write_OctetString(asn1, token->responseToken.data,
token 236 source3/libsmb/spnego.c token->responseToken.length);
token 240 source3/libsmb/spnego.c if (token->mechListMIC.data) {
token 242 source3/libsmb/spnego.c asn1_write_OctetString(asn1, token->mechListMIC.data,
token 243 source3/libsmb/spnego.c token->mechListMIC.length);
token 253 source3/libsmb/spnego.c ssize_t read_spnego_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, SPNEGO_DATA *token)
token 258 source3/libsmb/spnego.c ZERO_STRUCTP(token);
token 271 source3/libsmb/spnego.c if (read_negTokenInit(mem_ctx, asn1, &token->negTokenInit)) {
token 272 source3/libsmb/spnego.c token->type = SPNEGO_NEG_TOKEN_INIT;
token 277 source3/libsmb/spnego.c if (read_negTokenTarg(mem_ctx, asn1, &token->negTokenTarg)) {
token 278 source3/libsmb/spnego.c token->type = SPNEGO_NEG_TOKEN_TARG;
token 269 source3/modules/vfs_recycle.c char *token;
token 290 source3/modules/vfs_recycle.c for(token = strtok_r(tok_str, "/", &saveptr); token;
token 291 source3/modules/vfs_recycle.c token = strtok_r(NULL, "/", &saveptr)) {
token 292 source3/modules/vfs_recycle.c safe_strcat(new_dir, token, len);
token 541 source3/nmbd/nmbd_incomingdgrams.c uint32 token, struct in_addr sendto_ip,
token 566 source3/nmbd/nmbd_incomingdgrams.c SIVAL(p,0,token); /* The sender's unique info. */
token 646 source3/nmbd/nmbd_incomingdgrams.c uint32 token = IVAL(buf,1); /* Sender's key index for the workgroup. */
token 706 source3/nmbd/nmbd_incomingdgrams.c max_number_requested, token, p->ip, p->port);
token 80 source3/nmbd/nmbd_processlogon.c uint16 token = 0;
token 142 source3/nmbd/nmbd_processlogon.c token = SVAL(q,3);
token 151 source3/nmbd/nmbd_processlogon.c mach_str,inet_ntoa(p->ip),user_str,token));
token 167 source3/nmbd/nmbd_processlogon.c SSVAL(q, 0, token);
token 75 source3/nmbd/nmbd_sendannounce.c SCVAL(p,0,work->token); /* (local) Unique workgroup token id. */
token 99 source3/nmbd/nmbd_workgroupdb.c t = w->token;
token 104 source3/nmbd/nmbd_workgroupdb.c work->token = ++workgroup_count;
token 106 source3/nmbd/nmbd_workgroupdb.c work->token = t;
token 289 source3/nmbd/nmbd_workgroupdb.c work->token, *work->local_master_browser_name ? work->local_master_browser_name : "UNKNOWN" ) );
token 38 source3/pam_smbpass/general.h const char *token;
token 191 source3/pam_smbpass/support.c if (smb_args[j].token
token 192 source3/pam_smbpass/support.c && !strncmp(argv[i], smb_args[j].token, strlen(smb_args[j].token)))
token 222 source3/pam_smbpass/support.c if (smb_args[j].token
token 223 source3/pam_smbpass/support.c && !strncmp(*argv, smb_args[j].token, strlen(smb_args[j].token)))
token 510 source3/pam_smbpass/support.c char *token;
token 519 source3/pam_smbpass/support.c *pass = token = NULL;
token 584 source3/pam_smbpass/support.c token = smbpXstrDup(pamh, resp[j++].resp);
token 585 source3/pam_smbpass/support.c if (token != NULL) {
token 588 source3/pam_smbpass/support.c if (!resp[j].resp || strcmp( token, resp[j].resp )) {
token 589 source3/pam_smbpass/support.c _pam_delete( token );
token 619 source3/pam_smbpass/support.c retval = pam_set_item( pamh, authtok_flag, (const void *)token );
token 620 source3/pam_smbpass/support.c _pam_delete( token ); /* clean it up */
token 634 source3/pam_smbpass/support.c retval = pam_set_data( pamh, data_name, (void *) token, _cleanup );
token 641 source3/pam_smbpass/support.c _pam_delete( token );
token 645 source3/pam_smbpass/support.c token = NULL; /* break link to password */
token 124 source3/registry/reg_api.c const struct nt_user_token *token,
token 138 source3/registry/reg_api.c !(regkey->token = dup_nt_token(regkey, token)) ||
token 210 source3/registry/reg_api.c token ) ) {
token 228 source3/registry/reg_api.c const struct nt_user_token *token,
token 235 source3/registry/reg_api.c return regkey_open_onelevel(mem_ctx, NULL, hive, token, desired_access,
token 274 source3/registry/reg_api.c name_component, parent->token,
token 289 source3/registry/reg_api.c err = regkey_open_onelevel(mem_ctx, direct_parent, path, parent->token,
token 1010 source3/registry/reg_api.c uint32 desired_access, const struct nt_user_token *token,
token 1028 source3/registry/reg_api.c err = reg_openhive(mem_ctx, path, desired_access, token,
token 1041 source3/registry/reg_api.c err = reg_openhive(mem_ctx, path, KEY_ENUMERATE_SUB_KEYS, token,
token 1177 source3/registry/reg_api.c const struct nt_user_token *token,
token 1196 source3/registry/reg_api.c err = reg_openhive(mem_ctx, path, desired_access, token,
token 1213 source3/registry/reg_api.c token, &hive);
token 1230 source3/registry/reg_api.c WERROR reg_delete_path(const struct nt_user_token *token,
token 1253 source3/registry/reg_api.c token, &hive);
token 60 source3/registry/reg_backend_smbconf.c const struct nt_user_token *token)
token 62 source3/registry/reg_backend_smbconf.c if (!(user_has_privileges(token, &se_disk_operators))) {
token 159 source3/registry/reg_dispatcher.c const struct nt_user_token *token )
token 170 source3/registry/reg_dispatcher.c granted, token);
token 181 source3/registry/reg_dispatcher.c status =se_access_check(sec_desc, token, requested, granted);
token 38 source3/registry/reg_init_smbconf.c NT_USER_TOKEN *token = NULL;
token 44 source3/registry/reg_init_smbconf.c token = TALLOC_ZERO_P(mem_ctx, NT_USER_TOKEN);
token 45 source3/registry/reg_init_smbconf.c if (token == NULL) {
token 50 source3/registry/reg_init_smbconf.c token->privileges = se_disk_operators;
token 51 source3/registry/reg_init_smbconf.c status = add_sid_to_array(token, &global_sid_Builtin_Administrators,
token 52 source3/registry/reg_init_smbconf.c &token->user_sids, &token->num_sids);
token 59 source3/registry/reg_init_smbconf.c *ptoken = token;
token 33 source3/registry/reg_util_legacy.c const struct nt_user_token *token,
token 39 source3/registry/reg_util_legacy.c err = reg_open_path(NULL, path, access_desired, token, &key);
token 69 source3/rpc_server/srv_eventlog_nt.c static bool elog_check_access( EVENTLOG_INFO *info, NT_USER_TOKEN *token )
token 93 source3/rpc_server/srv_eventlog_nt.c token = get_root_nt_token();
token 98 source3/rpc_server/srv_eventlog_nt.c status = se_access_check( sec_desc, token, MAXIMUM_ALLOWED_ACCESS,
token 167 source3/rpc_server/srv_samr_nt.c NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token,
token 180 source3/rpc_server/srv_samr_nt.c user_has_any_privilege(token, rights)) {
token 192 source3/rpc_server/srv_samr_nt.c status = se_access_check(psd, token, des_access, acc_granted);
token 259 source3/rpc_server/srv_samr_nt.c void map_max_allowed_access(const NT_USER_TOKEN *token,
token 278 source3/rpc_server/srv_samr_nt.c if (is_sid_in_token(token, &global_sid_Builtin_Administrators) ||
token 279 source3/rpc_server/srv_samr_nt.c is_sid_in_token(token, &global_sid_Builtin_Account_Operators)) {
token 289 source3/rpc_server/srv_samr_nt.c if (is_sid_in_token(token, &domadmin_sid)) {
token 80 source3/rpc_server/srv_spoolss_nt.c WERROR(*fn) (TALLOC_CTX *mem_ctx, NT_USER_TOKEN *token, DATA_BLOB *in, DATA_BLOB *out, uint32_t *needed);
token 264 source3/rpc_server/srv_spoolss_nt.c WERROR delete_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *sharename )
token 283 source3/rpc_server/srv_spoolss_nt.c if ( token )
token 284 source3/rpc_server/srv_spoolss_nt.c is_print_op = user_has_privileges( token, &se_printop );
token 5922 source3/rpc_server/srv_spoolss_nt.c WERROR add_port_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, const char *portname, const char *uri )
token 5940 source3/rpc_server/srv_spoolss_nt.c if ( token )
token 5941 source3/rpc_server/srv_spoolss_nt.c is_print_op = user_has_privileges( token, &se_printop );
token 5971 source3/rpc_server/srv_spoolss_nt.c bool add_printer_hook(TALLOC_CTX *ctx, NT_USER_TOKEN *token, NT_PRINTER_INFO_LEVEL *printer)
token 6003 source3/rpc_server/srv_spoolss_nt.c if ( token )
token 6004 source3/rpc_server/srv_spoolss_nt.c is_print_op = user_has_privileges( token, &se_printop );
token 9645 source3/rpc_server/srv_spoolss_nt.c NT_USER_TOKEN *token, DATA_BLOB *in,
token 9700 source3/rpc_server/srv_spoolss_nt.c NT_USER_TOKEN *token, DATA_BLOB *in,
token 9779 source3/rpc_server/srv_spoolss_nt.c return add_port_hook(mem_ctx, token, portname, device_uri);
token 9792 source3/rpc_server/srv_spoolss_nt.c NT_USER_TOKEN *token, const char *command,
token 9803 source3/rpc_server/srv_spoolss_nt.c return xcvtcp_cmds[i].fn(mem_ctx, token, inbuf, outbuf, needed);
token 9814 source3/rpc_server/srv_spoolss_nt.c NT_USER_TOKEN *token, DATA_BLOB *in,
token 9851 source3/rpc_server/srv_spoolss_nt.c NT_USER_TOKEN *token, const char *command,
token 9861 source3/rpc_server/srv_spoolss_nt.c return xcvlocal_cmds[i].fn(mem_ctx, token, inbuf, outbuf, needed);
token 121 source3/rpc_server/srv_svcctl_nt.c static NTSTATUS svcctl_access_check( SEC_DESC *sec_desc, NT_USER_TOKEN *token,
token 126 source3/rpc_server/srv_svcctl_nt.c token = get_root_nt_token();
token 129 source3/rpc_server/srv_svcctl_nt.c return se_access_check( sec_desc, token, access_desired, access_granted);
token 381 source3/rpc_server/srv_svcctl_nt.c static int enumerate_status( TALLOC_CTX *ctx, struct ENUM_SERVICE_STATUSW **status, NT_USER_TOKEN *token )
token 400 source3/rpc_server/srv_svcctl_nt.c display_name = svcctl_lookup_dispname(ctx, svcctl_ops[i].name, token );
token 424 source3/rpc_server/srv_svcctl_nt.c NT_USER_TOKEN *token = p->server_info->ptok;
token 436 source3/rpc_server/srv_svcctl_nt.c num_services = enumerate_status( p->mem_ctx, &services, token );
token 637 source3/rpc_server/srv_svcctl_nt.c NT_USER_TOKEN *token )
token 644 source3/rpc_server/srv_svcctl_nt.c if ( !(values = svcctl_fetch_regvalues( name, token )) )
token 296 source3/rpc_server/srv_wkssvc_nt.c struct nt_user_token *token = p->server_info->ptok;
token 306 source3/rpc_server/srv_wkssvc_nt.c if (!user_has_privileges(token, &se_machine_account) &&
token 307 source3/rpc_server/srv_wkssvc_nt.c !nt_token_check_domain_rid(token, DOMAIN_GROUP_RID_ADMINS) &&
token 308 source3/rpc_server/srv_wkssvc_nt.c !nt_token_check_domain_rid(token, BUILTIN_ALIAS_RID_ADMINS)) {
token 371 source3/rpc_server/srv_wkssvc_nt.c struct nt_user_token *token = p->server_info->ptok;
token 377 source3/rpc_server/srv_wkssvc_nt.c if (!user_has_privileges(token, &se_machine_account) &&
token 378 source3/rpc_server/srv_wkssvc_nt.c !nt_token_check_domain_rid(token, DOMAIN_GROUP_RID_ADMINS) &&
token 379 source3/rpc_server/srv_wkssvc_nt.c !nt_token_check_domain_rid(token, BUILTIN_ALIAS_RID_ADMINS)) {
token 505 source3/services/services_db.c SEC_DESC *svcctl_get_secdesc( TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token )
token 520 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token,
token 566 source3/services/services_db.c bool svcctl_set_secdesc( TALLOC_CTX *ctx, const char *name, SEC_DESC *sec_desc, NT_USER_TOKEN *token )
token 581 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token,
token 619 source3/services/services_db.c const char *svcctl_lookup_dispname(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token )
token 633 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token,
token 669 source3/services/services_db.c const char *svcctl_lookup_description(TALLOC_CTX *ctx, const char *name, NT_USER_TOKEN *token )
token 683 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token,
token 715 source3/services/services_db.c REGVAL_CTR *svcctl_fetch_regvalues( const char *name, NT_USER_TOKEN *token )
token 727 source3/services/services_db.c wresult = regkey_open_internal( NULL, &key, path, token,
token 147 source3/smbd/globals.h NT_USER_TOKEN *token;
token 54 source3/smbd/open.c const NT_USER_TOKEN *token,
token 59 source3/smbd/open.c token,
token 212 source3/smbd/sec_ctx.c ctx_p->token = dup_nt_token(NULL,
token 213 source3/smbd/sec_ctx.c sec_ctx_stack[sec_ctx_stack_ndx-1].token);
token 220 source3/smbd/sec_ctx.c TALLOC_FREE(ctx_p->token);
token 303 source3/smbd/sec_ctx.c void set_sec_ctx(uid_t uid, gid_t gid, int ngroups, gid_t *groups, NT_USER_TOKEN *token)
token 312 source3/smbd/sec_ctx.c debug_nt_user_token(DBGC_CLASS, 5, token);
token 321 source3/smbd/sec_ctx.c if (token && (token == ctx_p->token)) {
token 325 source3/smbd/sec_ctx.c TALLOC_FREE(ctx_p->token);
token 337 source3/smbd/sec_ctx.c if (token) {
token 338 source3/smbd/sec_ctx.c ctx_p->token = dup_nt_token(NULL, token);
token 339 source3/smbd/sec_ctx.c if (!ctx_p->token) {
token 343 source3/smbd/sec_ctx.c ctx_p->token = NULL;
token 355 source3/smbd/sec_ctx.c current_user.nt_user_token = ctx_p->token;
token 395 source3/smbd/sec_ctx.c TALLOC_FREE(ctx_p->token);
token 415 source3/smbd/sec_ctx.c current_user.nt_user_token = prev_ctx_p->token;
token 447 source3/smbd/sec_ctx.c ctx_p->token = NULL; /* Maps to guest user. */
token 69 source3/smbd/share_access.c const struct nt_user_token *token,
token 93 source3/smbd/share_access.c return nt_token_check_sid( &sid, token );
token 107 source3/smbd/share_access.c return nt_token_check_sid(&sid, token);
token 125 source3/smbd/share_access.c if (nt_token_check_sid(&sid, token)) {
token 155 source3/smbd/share_access.c const struct nt_user_token *token,
token 170 source3/smbd/share_access.c token, *list)) {
token 195 source3/smbd/share_access.c const struct nt_user_token *token, int snum)
token 200 source3/smbd/share_access.c token,
token 209 source3/smbd/share_access.c lp_servicename(snum), token,
token 227 source3/smbd/share_access.c token, list)) {
token 255 source3/smbd/share_access.c const struct nt_user_token *token,
token 263 source3/smbd/share_access.c lp_servicename(snum), token,
token 271 source3/smbd/share_access.c lp_servicename(snum), token,
token 37 source3/utils/net_ads_gpo.c struct nt_user_token *token = NULL;
token 76 source3/utils/net_ads_gpo.c status = gp_get_machine_token(ads, mem_ctx, dn, &token);
token 78 source3/utils/net_ads_gpo.c status = ads_get_sid_token(ads, mem_ctx, dn, &token);
token 88 source3/utils/net_ads_gpo.c status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list);
token 108 source3/utils/net_ads_gpo.c token, gpo_list);
token 152 source3/utils/net_ads_gpo.c &token->user_sids[0],
token 294 source3/utils/net_ads_gpo.c struct nt_user_token *token = NULL;
token 329 source3/utils/net_ads_gpo.c status = gp_get_machine_token(ads, mem_ctx, dn, &token);
token 331 source3/utils/net_ads_gpo.c status = ads_get_sid_token(ads, mem_ctx, dn, &token);
token 338 source3/utils/net_ads_gpo.c status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list);
token 364 source3/utils/net_ads_gpo.c struct nt_user_token *token = NULL;
token 411 source3/utils/net_ads_gpo.c status = gp_get_machine_token(ads, mem_ctx, dn, &token);
token 413 source3/utils/net_ads_gpo.c status = ads_get_sid_token(ads, mem_ctx, dn, &token);
token 420 source3/utils/net_ads_gpo.c status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list);
token 425 source3/utils/net_ads_gpo.c status = gpo_process_gpo_list(ads, mem_ctx, token, gpo_list,
token 68 source3/utils/net_afs.c char *token;
token 75 source3/utils/net_afs.c token = afs_createtoken_str(argv[0], argv[1]);
token 77 source3/utils/net_afs.c if (token == NULL) {
token 82 source3/utils/net_afs.c if (!afs_settoken_str(token)) {
token 29 source3/utils/net_proto.h bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token );
token 30 source3/utils/net_proto.h bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid );
token 33 source3/utils/net_proto.h struct nt_user_token *token);
token 39 source3/utils/net_proto.h void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token);
token 42 source3/utils/net_registry.c NT_USER_TOKEN *token = NULL;
token 62 source3/utils/net_registry.c werr = ntstatus_to_werror(registry_create_admin_token(tmp_ctx, &token));
token 67 source3/utils/net_registry.c werr = reg_openhive(ctx, hivename, desired_access, token, hive);
token 3940 source3/utils/net_rpc.c static void init_user_token(NT_USER_TOKEN *token, DOM_SID *user_sid)
token 3942 source3/utils/net_rpc.c token->num_sids = 4;
token 3944 source3/utils/net_rpc.c if (!(token->user_sids = SMB_MALLOC_ARRAY(DOM_SID, 4))) {
token 3946 source3/utils/net_rpc.c token->num_sids = 0;
token 3950 source3/utils/net_rpc.c token->user_sids[0] = *user_sid;
token 3951 source3/utils/net_rpc.c sid_copy(&token->user_sids[1], &global_sid_World);
token 3952 source3/utils/net_rpc.c sid_copy(&token->user_sids[2], &global_sid_Network);
token 3953 source3/utils/net_rpc.c sid_copy(&token->user_sids[3], &global_sid_Authenticated_Users);
token 3956 source3/utils/net_rpc.c static void free_user_token(NT_USER_TOKEN *token)
token 3958 source3/utils/net_rpc.c SAFE_FREE(token->user_sids);
token 3961 source3/utils/net_rpc.c static void add_sid_to_token(NT_USER_TOKEN *token, DOM_SID *sid)
token 3963 source3/utils/net_rpc.c if (is_sid_in_token(token, sid))
token 3966 source3/utils/net_rpc.c token->user_sids = SMB_REALLOC_ARRAY(token->user_sids, DOM_SID, token->num_sids+1);
token 3967 source3/utils/net_rpc.c if (!token->user_sids) {
token 3971 source3/utils/net_rpc.c sid_copy(&token->user_sids[token->num_sids], sid);
token 3973 source3/utils/net_rpc.c token->num_sids += 1;
token 3978 source3/utils/net_rpc.c NT_USER_TOKEN token;
token 3981 source3/utils/net_rpc.c static void dump_user_token(struct user_token *token)
token 3985 source3/utils/net_rpc.c d_printf("%s\n", token->name);
token 3987 source3/utils/net_rpc.c for (i=0; i<token->token.num_sids; i++) {
token 3988 source3/utils/net_rpc.c d_printf(" %s\n", sid_string_tos(&token->token.user_sids[i]));
token 4004 source3/utils/net_rpc.c static void collect_sid_memberships(NT_USER_TOKEN *token, DOM_SID sid)
token 4010 source3/utils/net_rpc.c add_sid_to_token(token, &server_aliases[i].sid);
token 4021 source3/utils/net_rpc.c static void collect_alias_memberships(NT_USER_TOKEN *token)
token 4023 source3/utils/net_rpc.c int num_global_sids = token->num_sids;
token 4027 source3/utils/net_rpc.c collect_sid_memberships(token, token->user_sids[i]);
token 4031 source3/utils/net_rpc.c static bool get_user_sids(const char *domain, const char *user, NT_USER_TOKEN *token)
token 4075 source3/utils/net_rpc.c init_user_token(token, &user_sid);
token 4110 source3/utils/net_rpc.c add_sid_to_token(token, &sid);
token 4175 source3/utils/net_rpc.c get_user_sids(domain, user, &(result[i].token));
token 4191 source3/utils/net_rpc.c struct user_token *token = NULL;
token 4213 source3/utils/net_rpc.c if (token == NULL) {
token 4218 source3/utils/net_rpc.c add_sid_to_token(&token->token, &sid);
token 4231 source3/utils/net_rpc.c token = &((*tokens)[*num_tokens-1]);
token 4233 source3/utils/net_rpc.c fstrcpy(token->name, line);
token 4234 source3/utils/net_rpc.c token->token.num_sids = 0;
token 4235 source3/utils/net_rpc.c token->token.user_sids = NULL;
token 4298 source3/utils/net_rpc.c status = se_access_check(share_sd, &tokens[i].token,
token 4314 source3/utils/net_rpc.c status = se_access_check(root_sd, &tokens[i].token,
token 4411 source3/utils/net_rpc.c collect_alias_memberships(&tokens[i].token);
token 4437 source3/utils/net_rpc.c free_user_token(&tokens[i].token);
token 4492 source3/utils/net_rpc.c free_user_token(&tokens[i].token);
token 1061 source3/utils/ntlm_auth.c DATA_BLOB token;
token 1098 source3/utils/ntlm_auth.c len = write_spnego_data(&token, &spnego);
token 1107 source3/utils/ntlm_auth.c reply_base64 = base64_encode_data_blob(talloc_tos(), token);
token 1111 source3/utils/ntlm_auth.c data_blob_free(&token);
token 1121 source3/utils/ntlm_auth.c DATA_BLOB token;
token 1167 source3/utils/ntlm_auth.c token = base64_decode_data_blob(buf + 3);
token 1168 source3/utils/ntlm_auth.c len = read_spnego_data(talloc_tos(), token, &request);
token 1169 source3/utils/ntlm_auth.c data_blob_free(&token);
token 1342 source3/utils/ntlm_auth.c len = write_spnego_data(&token, &response);
token 1351 source3/utils/ntlm_auth.c reply_base64 = base64_encode_data_blob(talloc_tos(), token);
token 1357 source3/utils/ntlm_auth.c data_blob_free(&token);
token 271 source3/winbindd/winbindd_pam.c struct nt_user_token *token;
token 282 source3/winbindd/winbindd_pam.c if (!(token = TALLOC_ZERO_P(mem_ctx, struct nt_user_token))) {
token 314 source3/winbindd/winbindd_pam.c &token->user_sids,
token 315 source3/winbindd/winbindd_pam.c &token->num_sids,
token 322 source3/winbindd/winbindd_pam.c token))
token 324 source3/winbindd/winbindd_pam.c token))) {
token 330 source3/winbindd/winbindd_pam.c debug_nt_user_token(DBGC_CLASS, 10, token);
token 336 source3/winbindd/winbindd_pam.c token)) {
token 29 source3/winbindd/winbindd_proto.h bool nt_token_check_sid ( const DOM_SID *sid, const NT_USER_TOKEN *token );
token 30 source3/winbindd/winbindd_proto.h bool nt_token_check_domain_rid( NT_USER_TOKEN *token, uint32 rid );
token 33 source3/winbindd/winbindd_proto.h struct nt_user_token *token);
token 39 source3/winbindd/winbindd_proto.h void debug_nt_user_token(int dbg_class, int dbg_lev, NT_USER_TOKEN *token);
token 29 source4/auth/gensec/spnego_parse.c struct spnego_negTokenInit *token)
token 31 source4/auth/gensec/spnego_parse.c ZERO_STRUCTP(token);
token 50 source4/auth/gensec/spnego_parse.c token->mechTypes = talloc(NULL, const char *);
token 53 source4/auth/gensec/spnego_parse.c token->mechTypes = talloc_realloc(NULL,
token 54 source4/auth/gensec/spnego_parse.c token->mechTypes,
token 56 source4/auth/gensec/spnego_parse.c asn1_read_OID(asn1, token->mechTypes, token->mechTypes + i);
token 58 source4/auth/gensec/spnego_parse.c token->mechTypes[i] = NULL;
token 66 source4/auth/gensec/spnego_parse.c asn1_read_Integer(asn1, &token->reqFlags);
token 67 source4/auth/gensec/spnego_parse.c token->reqFlags |= SPNEGO_REQ_FLAG;
token 73 source4/auth/gensec/spnego_parse.c asn1_read_OctetString(asn1, mem_ctx, &token->mechToken);
token 87 source4/auth/gensec/spnego_parse.c &token->mechListMIC);
token 98 source4/auth/gensec/spnego_parse.c token->targetPrincipal = mechListMIC;
token 115 source4/auth/gensec/spnego_parse.c static bool write_negTokenInit(struct asn1_data *asn1, struct spnego_negTokenInit *token)
token 121 source4/auth/gensec/spnego_parse.c if (token->mechTypes && *token->mechTypes) {
token 126 source4/auth/gensec/spnego_parse.c for (i = 0; token->mechTypes[i]; i++) {
token 127 source4/auth/gensec/spnego_parse.c asn1_write_OID(asn1, token->mechTypes[i]);
token 134 source4/auth/gensec/spnego_parse.c if (token->reqFlags & SPNEGO_REQ_FLAG) {
token 135 source4/auth/gensec/spnego_parse.c int flags = token->reqFlags & ~SPNEGO_REQ_FLAG;
token 143 source4/auth/gensec/spnego_parse.c if (token->mechToken.data) {
token 145 source4/auth/gensec/spnego_parse.c asn1_write_OctetString(asn1, token->mechToken.data,
token 146 source4/auth/gensec/spnego_parse.c token->mechToken.length);
token 151 source4/auth/gensec/spnego_parse.c if (token->mechListMIC.data) {
token 155 source4/auth/gensec/spnego_parse.c asn1_write_OctetString(asn1, token->mechListMIC.data,
token 156 source4/auth/gensec/spnego_parse.c token->mechListMIC.length);
token 163 source4/auth/gensec/spnego_parse.c asn1_write(asn1, token->mechListMIC.data,
token 164 source4/auth/gensec/spnego_parse.c token->mechListMIC.length);
token 179 source4/auth/gensec/spnego_parse.c struct spnego_negTokenTarg *token)
token 181 source4/auth/gensec/spnego_parse.c ZERO_STRUCTP(token);
token 197 source4/auth/gensec/spnego_parse.c asn1_read_uint8(asn1, &token->negResult);
token 203 source4/auth/gensec/spnego_parse.c asn1_read_OID(asn1, mem_ctx, &token->supportedMech);
token 208 source4/auth/gensec/spnego_parse.c asn1_read_OctetString(asn1, mem_ctx, &token->responseToken);
token 213 source4/auth/gensec/spnego_parse.c asn1_read_OctetString(asn1, mem_ctx, &token->mechListMIC);
token 228 source4/auth/gensec/spnego_parse.c static bool write_negTokenTarg(struct asn1_data *asn1, struct spnego_negTokenTarg *token)
token 233 source4/auth/gensec/spnego_parse.c if (token->negResult != SPNEGO_NONE_RESULT) {
token 235 source4/auth/gensec/spnego_parse.c asn1_write_enumerated(asn1, token->negResult);
token 239 source4/auth/gensec/spnego_parse.c if (token->supportedMech) {
token 241 source4/auth/gensec/spnego_parse.c asn1_write_OID(asn1, token->supportedMech);
token 245 source4/auth/gensec/spnego_parse.c if (token->responseToken.data) {
token 247 source4/auth/gensec/spnego_parse.c asn1_write_OctetString(asn1, token->responseToken.data,
token 248 source4/auth/gensec/spnego_parse.c token->responseToken.length);
token 252 source4/auth/gensec/spnego_parse.c if (token->mechListMIC.data) {
token 254 source4/auth/gensec/spnego_parse.c asn1_write_OctetString(asn1, token->mechListMIC.data,
token 255 source4/auth/gensec/spnego_parse.c token->mechListMIC.length);
token 265 source4/auth/gensec/spnego_parse.c ssize_t spnego_read_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, struct spnego_data *token)
token 271 source4/auth/gensec/spnego_parse.c ZERO_STRUCTP(token);
token 291 source4/auth/gensec/spnego_parse.c if (read_negTokenInit(asn1, mem_ctx, &token->negTokenInit)) {
token 292 source4/auth/gensec/spnego_parse.c token->type = SPNEGO_NEG_TOKEN_INIT;
token 297 source4/auth/gensec/spnego_parse.c if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) {
token 298 source4/auth/gensec/spnego_parse.c token->type = SPNEGO_NEG_TOKEN_TARG;
token 44 source4/auth/system_session.c struct security_token **token)
token 94 source4/auth/system_session.c *token = ptoken;
token 113 source4/auth/system_session.c *token = NULL;
token 233 source4/dsdb/samdb/samdb.c struct security_token **token)
token 293 source4/dsdb/samdb/samdb.c *token = ptoken;
token 34 source4/dsdb/samdb/samdb_privilege.c struct security_token *token,
token 66 source4/dsdb/samdb/samdb_privilege.c security_token_set_privilege(token, privilege);
token 77 source4/dsdb/samdb/samdb_privilege.c struct loadparm_context *lp_ctx, struct security_token *token)
token 85 source4/dsdb/samdb/samdb_privilege.c if (token->user_sid == NULL) {
token 86 source4/dsdb/samdb/samdb_privilege.c token->privilege_mask = 0;
token 90 source4/dsdb/samdb/samdb_privilege.c if (security_token_is_system(token)) {
token 91 source4/dsdb/samdb/samdb_privilege.c token->privilege_mask = ~0;
token 95 source4/dsdb/samdb/samdb_privilege.c if (security_token_is_anonymous(token)) {
token 96 source4/dsdb/samdb/samdb_privilege.c token->privilege_mask = 0;
token 100 source4/dsdb/samdb/samdb_privilege.c mem_ctx = talloc_new(token);
token 107 source4/dsdb/samdb/samdb_privilege.c token->privilege_mask = 0;
token 109 source4/dsdb/samdb/samdb_privilege.c for (i=0;i<token->num_sids;i++) {
token 111 source4/dsdb/samdb/samdb_privilege.c token, token->sids[i]);
token 251 source4/heimdal/lib/gssapi/krb5/cfx.c gss_cfx_wrap_token token;
token 277 source4/heimdal/lib/gssapi/krb5/cfx.c rrc = (conf_req_flag ? sizeof(*token) : 0) + (uint16_t)cksumsize;
token 288 source4/heimdal/lib/gssapi/krb5/cfx.c token = (gss_cfx_wrap_token)p;
token 289 source4/heimdal/lib/gssapi/krb5/cfx.c token->TOK_ID[0] = 0x05;
token 290 source4/heimdal/lib/gssapi/krb5/cfx.c token->TOK_ID[1] = 0x04;
token 291 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags = 0;
token 292 source4/heimdal/lib/gssapi/krb5/cfx.c token->Filler = 0xFF;
token 294 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags |= CFXSentByAcceptor;
token 296 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags |= CFXAcceptorSubkey;
token 302 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags |= CFXSealed;
token 303 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[0] = (padlength >> 8) & 0xFF;
token 304 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[1] = (padlength >> 0) & 0xFF;
token 315 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[0] = 0;
token 316 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[1] = 0;
token 329 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[0] = 0;
token 330 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[1] = 0;
token 336 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_encode_be_om_uint32(0, &token->SND_SEQ[0]);
token 337 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_encode_be_om_uint32(seq_number, &token->SND_SEQ[4]);
token 367 source4/heimdal/lib/gssapi/krb5/cfx.c p += sizeof(*token);
token 371 source4/heimdal/lib/gssapi/krb5/cfx.c token, sizeof(*token));
token 376 source4/heimdal/lib/gssapi/krb5/cfx.c sizeof(*token),
token 384 source4/heimdal/lib/gssapi/krb5/cfx.c assert(sizeof(*token) + cipher.length == wrapped_len);
token 385 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[0] = (rrc >> 8) & 0xFF;
token 386 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[1] = (rrc >> 0) & 0xFF;
token 409 source4/heimdal/lib/gssapi/krb5/cfx.c buf = malloc(input_message_buffer->length + sizeof(*token));
token 417 source4/heimdal/lib/gssapi/krb5/cfx.c memcpy(buf + input_message_buffer->length, token, sizeof(*token));
token 422 source4/heimdal/lib/gssapi/krb5/cfx.c sizeof(*token),
token 435 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[0] = (cksum.checksum.length >> 8) & 0xFF;
token 436 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[1] = (cksum.checksum.length >> 0) & 0xFF;
token 437 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[0] = (rrc >> 8) & 0xFF;
token 438 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[1] = (rrc >> 0) & 0xFF;
token 440 source4/heimdal/lib/gssapi/krb5/cfx.c p += sizeof(*token);
token 477 source4/heimdal/lib/gssapi/krb5/cfx.c gss_cfx_wrap_token token;
token 489 source4/heimdal/lib/gssapi/krb5/cfx.c if (input_message_buffer->length < sizeof(*token)) {
token 495 source4/heimdal/lib/gssapi/krb5/cfx.c token = (gss_cfx_wrap_token)p;
token 497 source4/heimdal/lib/gssapi/krb5/cfx.c if (token->TOK_ID[0] != 0x05 || token->TOK_ID[1] != 0x04) {
token 502 source4/heimdal/lib/gssapi/krb5/cfx.c token_flags = token->Flags &
token 518 source4/heimdal/lib/gssapi/krb5/cfx.c if (token->Filler != 0xFF) {
token 526 source4/heimdal/lib/gssapi/krb5/cfx.c ec = (token->EC[0] << 8) | token->EC[1];
token 527 source4/heimdal/lib/gssapi/krb5/cfx.c rrc = (token->RRC[0] << 8) | token->RRC[1];
token 532 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[0], &seq_number_hi);
token 533 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[4], &seq_number_lo);
token 565 source4/heimdal/lib/gssapi/krb5/cfx.c p += sizeof(*token);
token 593 source4/heimdal/lib/gssapi/krb5/cfx.c if (data.length < ec + sizeof(*token)) {
token 599 source4/heimdal/lib/gssapi/krb5/cfx.c p += data.length - sizeof(*token);
token 602 source4/heimdal/lib/gssapi/krb5/cfx.c ((gss_cfx_wrap_token)p)->RRC[0] = token->RRC[0];
token 603 source4/heimdal/lib/gssapi/krb5/cfx.c ((gss_cfx_wrap_token)p)->RRC[1] = token->RRC[1];
token 606 source4/heimdal/lib/gssapi/krb5/cfx.c if (memcmp(p, token, sizeof(*token)) != 0) {
token 613 source4/heimdal/lib/gssapi/krb5/cfx.c output_message_buffer->length = data.length - ec - sizeof(*token);
token 647 source4/heimdal/lib/gssapi/krb5/cfx.c output_message_buffer->value = malloc(len + sizeof(*token));
token 657 source4/heimdal/lib/gssapi/krb5/cfx.c token, sizeof(*token));
token 660 source4/heimdal/lib/gssapi/krb5/cfx.c token = (gss_cfx_wrap_token)((u_char *)output_message_buffer->value +
token 662 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[0] = 0;
token 663 source4/heimdal/lib/gssapi/krb5/cfx.c token->EC[1] = 0;
token 664 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[0] = 0;
token 665 source4/heimdal/lib/gssapi/krb5/cfx.c token->RRC[1] = 0;
token 670 source4/heimdal/lib/gssapi/krb5/cfx.c len + sizeof(*token),
token 699 source4/heimdal/lib/gssapi/krb5/cfx.c gss_cfx_mic_token token;
token 713 source4/heimdal/lib/gssapi/krb5/cfx.c len = message_buffer->length + sizeof(*token);
token 723 source4/heimdal/lib/gssapi/krb5/cfx.c token = (gss_cfx_mic_token)(buf + message_buffer->length);
token 724 source4/heimdal/lib/gssapi/krb5/cfx.c token->TOK_ID[0] = 0x04;
token 725 source4/heimdal/lib/gssapi/krb5/cfx.c token->TOK_ID[1] = 0x04;
token 726 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags = 0;
token 728 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags |= CFXSentByAcceptor;
token 730 source4/heimdal/lib/gssapi/krb5/cfx.c token->Flags |= CFXAcceptorSubkey;
token 731 source4/heimdal/lib/gssapi/krb5/cfx.c memset(token->Filler, 0xFF, 5);
token 737 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_encode_be_om_uint32(0, &token->SND_SEQ[0]);
token 738 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_encode_be_om_uint32(seq_number, &token->SND_SEQ[4]);
token 761 source4/heimdal/lib/gssapi/krb5/cfx.c message_token->length = sizeof(*token) + cksum.checksum.length;
token 771 source4/heimdal/lib/gssapi/krb5/cfx.c memcpy(message_token->value, token, sizeof(*token));
token 772 source4/heimdal/lib/gssapi/krb5/cfx.c memcpy((u_char *)message_token->value + sizeof(*token),
token 791 source4/heimdal/lib/gssapi/krb5/cfx.c gss_cfx_mic_token token;
token 801 source4/heimdal/lib/gssapi/krb5/cfx.c if (token_buffer->length < sizeof(*token)) {
token 807 source4/heimdal/lib/gssapi/krb5/cfx.c token = (gss_cfx_mic_token)p;
token 809 source4/heimdal/lib/gssapi/krb5/cfx.c if (token->TOK_ID[0] != 0x04 || token->TOK_ID[1] != 0x04) {
token 814 source4/heimdal/lib/gssapi/krb5/cfx.c token_flags = token->Flags & (CFXSentByAcceptor | CFXAcceptorSubkey);
token 828 source4/heimdal/lib/gssapi/krb5/cfx.c if (memcmp(token->Filler, "\xff\xff\xff\xff\xff", 5) != 0) {
token 835 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[0], &seq_number_hi);
token 836 source4/heimdal/lib/gssapi/krb5/cfx.c _gsskrb5_decode_be_om_uint32(&token->SND_SEQ[4], &seq_number_lo);
token 868 source4/heimdal/lib/gssapi/krb5/cfx.c cksum.checksum.data = p + sizeof(*token);
token 869 source4/heimdal/lib/gssapi/krb5/cfx.c cksum.checksum.length = token_buffer->length - sizeof(*token);
token 877 source4/heimdal/lib/gssapi/krb5/cfx.c buf = malloc(message_buffer->length + sizeof(*token));
token 884 source4/heimdal/lib/gssapi/krb5/cfx.c memcpy(buf + message_buffer->length, token, sizeof(*token));
token 889 source4/heimdal/lib/gssapi/krb5/cfx.c sizeof(*token) + message_buffer->length,
token 53 source4/heimdal/lib/hx509/ks_p11.c CK_BBOOL token;
token 96 source4/heimdal/lib/roken/base64.c token_decode(const char *token)
token 101 source4/heimdal/lib/roken/base64.c if (strlen(token) < 4)
token 105 source4/heimdal/lib/roken/base64.c if (token[i] == '=')
token 110 source4/heimdal/lib/roken/base64.c val += pos(token[i]);
token 113 source4/lib/socket/interface.c const char *token,
token 128 source4/lib/socket/interface.c if (gen_fnmatch(token, probed_ifaces[i].name) == 0) {
token 138 source4/lib/socket/interface.c p = strchr_m(token,'/');
token 141 source4/lib/socket/interface.c if (strpbrk(token, "*?") != NULL) {
token 144 source4/lib/socket/interface.c ip.s_addr = interpret_addr2(token).s_addr;
token 153 source4/lib/socket/interface.c DEBUG(2,("can't determine netmask for %s\n", token));
token 157 source4/lib/socket/interface.c address = talloc_strdup(mem_ctx, token);
token 30 source4/libcli/security/access_check.c const struct security_token *token)
token 35 source4/libcli/security/access_check.c if (security_token_has_sid(token, sd->owner_sid)) {
token 37 source4/libcli/security/access_check.c } else if (security_token_has_privilege(token, SEC_PRIV_RESTORE)) {
token 52 source4/libcli/security/access_check.c if (!security_token_has_sid(token, &ace->trustee)) {
token 76 source4/libcli/security/access_check.c const struct security_token *token,
token 88 source4/libcli/security/access_check.c access_desired |= access_check_max_allowed(sd, token);
token 95 source4/libcli/security/access_check.c if (security_token_has_privilege(token, SEC_PRIV_SECURITY)) {
token 110 source4/libcli/security/access_check.c security_token_has_sid(token, sd->owner_sid)) {
token 114 source4/libcli/security/access_check.c security_token_has_privilege(token, SEC_PRIV_RESTORE)) {
token 130 source4/libcli/security/access_check.c if (!security_token_has_sid(token, &ace->trustee)) {
token 197 source4/libcli/security/privilege.c bool security_token_has_privilege(const struct security_token *token, enum sec_privilege privilege)
token 206 source4/libcli/security/privilege.c if (token->privilege_mask & mask) {
token 215 source4/libcli/security/privilege.c void security_token_set_privilege(struct security_token *token, enum sec_privilege privilege)
token 220 source4/libcli/security/privilege.c token->privilege_mask |= sec_privilege_mask(privilege);
token 223 source4/libcli/security/privilege.c void security_token_debug_privileges(int dbg_lev, const struct security_token *token)
token 226 source4/libcli/security/privilege.c (unsigned long long) token->privilege_mask));
token 228 source4/libcli/security/privilege.c if (token->privilege_mask) {
token 235 source4/libcli/security/privilege.c if (token->privilege_mask & mask) {
token 51 source4/libcli/security/security_token.c void security_token_debug(int dbg_lev, const struct security_token *token)
token 56 source4/libcli/security/security_token.c if (!token) {
token 67 source4/libcli/security/security_token.c dom_sid_string(mem_ctx, token->user_sid) ));
token 69 source4/libcli/security/security_token.c (unsigned long)token->num_sids));
token 70 source4/libcli/security/security_token.c for (i = 0; i < token->num_sids; i++) {
token 72 source4/libcli/security/security_token.c dom_sid_string(mem_ctx, token->sids[i])));
token 75 source4/libcli/security/security_token.c security_token_debug_privileges(dbg_lev, token);
token 82 source4/libcli/security/security_token.c bool security_token_is_sid(const struct security_token *token, const struct dom_sid *sid)
token 84 source4/libcli/security/security_token.c if (dom_sid_equal(token->user_sid, sid)) {
token 90 source4/libcli/security/security_token.c bool security_token_is_sid_string(const struct security_token *token, const char *sid_string)
token 96 source4/libcli/security/security_token.c ret = security_token_is_sid(token, sid);
token 102 source4/libcli/security/security_token.c bool security_token_is_system(const struct security_token *token)
token 104 source4/libcli/security/security_token.c return security_token_is_sid_string(token, SID_NT_SYSTEM);
token 107 source4/libcli/security/security_token.c bool security_token_is_anonymous(const struct security_token *token)
token 109 source4/libcli/security/security_token.c return security_token_is_sid_string(token, SID_NT_ANONYMOUS);
token 112 source4/libcli/security/security_token.c bool security_token_has_sid(const struct security_token *token, const struct dom_sid *sid)
token 115 source4/libcli/security/security_token.c for (i = 0; i < token->num_sids; i++) {
token 116 source4/libcli/security/security_token.c if (dom_sid_equal(token->sids[i], sid)) {
token 123 source4/libcli/security/security_token.c bool security_token_has_sid_string(const struct security_token *token, const char *sid_string)
token 129 source4/libcli/security/security_token.c ret = security_token_has_sid(token, sid);
token 135 source4/libcli/security/security_token.c bool security_token_has_builtin_administrators(const struct security_token *token)
token 137 source4/libcli/security/security_token.c return security_token_has_sid_string(token, SID_BUILTIN_ADMINISTRATORS);
token 140 source4/libcli/security/security_token.c bool security_token_has_nt_authenticated_users(const struct security_token *token)
token 142 source4/libcli/security/security_token.c return security_token_has_sid_string(token, SID_NT_AUTHENTICATED_USERS);
token 235 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self);
token 241 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_is_sid(token, sid));
token 248 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self);
token 254 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_has_sid(token, sid));
token 259 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self);
token 261 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_is_anonymous(token));
token 266 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self);
token 268 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_is_system(token));
token 273 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self);
token 275 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_has_builtin_administrators(token));
token 280 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self);
token 282 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_has_nt_authenticated_users(token));
token 288 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self);
token 293 source4/librpc/ndr/py_security.c return PyBool_FromLong(security_token_has_privilege(token, priv));
token 299 source4/librpc/ndr/py_security.c struct security_token *token = py_talloc_get_ptr(self);
token 304 source4/librpc/ndr/py_security.c security_token_set_privilege(token, priv);
token 509 source4/ntvfs/posix/pvfs_acl.c struct security_token *token = req->session_info->security_token;
token 553 source4/ntvfs/posix/pvfs_acl.c status = sec_access_check(sd, token, *access_mask, access_mask);
token 99 source4/ntvfs/unixuid/vfs_unixuid.c struct security_token *token,
token 110 source4/ntvfs/unixuid/vfs_unixuid.c if (token->num_sids < 2) {
token 114 source4/ntvfs/unixuid/vfs_unixuid.c ids = talloc_array(req, struct id_mapping, token->num_sids);
token 118 source4/ntvfs/unixuid/vfs_unixuid.c ids[0].sid = token->user_sid;
token 122 source4/ntvfs/unixuid/vfs_unixuid.c ids[1].sid = token->group_sid;
token 125 source4/ntvfs/unixuid/vfs_unixuid.c (*sec)->ngroups = token->num_sids - 2;
token 131 source4/ntvfs/unixuid/vfs_unixuid.c ids[i+2].sid = token->sids[i+2];
token 135 source4/ntvfs/unixuid/vfs_unixuid.c ctx = wbc_sids_to_xids_send(priv->wbc_ctx, ids, token->num_sids, ids);
token 174 source4/ntvfs/unixuid/vfs_unixuid.c struct security_token *token;
token 182 source4/ntvfs/unixuid/vfs_unixuid.c token = req->session_info->security_token;
token 189 source4/ntvfs/unixuid/vfs_unixuid.c if (token == priv->last_token) {
token 192 source4/ntvfs/unixuid/vfs_unixuid.c status = nt_token_to_unix_security(ntvfs, req, token, &newsec);
token 201 source4/ntvfs/unixuid/vfs_unixuid.c priv->last_token = token;
token 609 source4/utils/ntlm_auth.c struct security_token *token = session_info->security_token;
token 611 source4/utils/ntlm_auth.c token->sids[i]);
token 141 source4/utils/oLschema2ldif.c struct schema_token *token;
token 144 source4/utils/oLschema2ldif.c token = talloc(ctx, struct schema_token);
token 147 source4/utils/oLschema2ldif.c type = talloc_strndup(token, c, n);
token 153 source4/utils/oLschema2ldif.c token->type = SCHEMA_NAME;
token 165 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 171 source4/utils/oLschema2ldif.c return token;
token 175 source4/utils/oLschema2ldif.c token->type = SCHEMA_SUP;
token 180 source4/utils/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n);
token 184 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 189 source4/utils/oLschema2ldif.c return token;
token 194 source4/utils/oLschema2ldif.c token->type = SCHEMA_STRUCTURAL;
token 196 source4/utils/oLschema2ldif.c return token;
token 201 source4/utils/oLschema2ldif.c token->type = SCHEMA_ABSTRACT;
token 203 source4/utils/oLschema2ldif.c return token;
token 208 source4/utils/oLschema2ldif.c token->type = SCHEMA_AUXILIARY;
token 210 source4/utils/oLschema2ldif.c return token;
token 215 source4/utils/oLschema2ldif.c token->type = SCHEMA_MUST;
token 220 source4/utils/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n);
token 224 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 229 source4/utils/oLschema2ldif.c return token;
token 234 source4/utils/oLschema2ldif.c token->type = SCHEMA_MAY;
token 239 source4/utils/oLschema2ldif.c token->value = talloc_strndup(ctx, c, n);
token 243 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 248 source4/utils/oLschema2ldif.c return token;
token 253 source4/utils/oLschema2ldif.c token->type = SCHEMA_SINGLE_VALUE;
token 255 source4/utils/oLschema2ldif.c return token;
token 260 source4/utils/oLschema2ldif.c token->type = SCHEMA_EQUALITY;
token 262 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 266 source4/utils/oLschema2ldif.c return token;
token 271 source4/utils/oLschema2ldif.c token->type = SCHEMA_ORDERING;
token 273 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 277 source4/utils/oLschema2ldif.c return token;
token 282 source4/utils/oLschema2ldif.c token->type = SCHEMA_SUBSTR;
token 284 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 288 source4/utils/oLschema2ldif.c return token;
token 293 source4/utils/oLschema2ldif.c token->type = SCHEMA_SYNTAX;
token 295 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 299 source4/utils/oLschema2ldif.c return token;
token 304 source4/utils/oLschema2ldif.c token->type = SCHEMA_DESC;
token 306 source4/utils/oLschema2ldif.c token->value = get_def_value(ctx, &c);
token 310 source4/utils/oLschema2ldif.c return token;
token 313 source4/utils/oLschema2ldif.c token->type = SCHEMA_UNKNOWN;
token 314 source4/utils/oLschema2ldif.c token->value = type;
token 317 source4/utils/oLschema2ldif.c return token;
token 328 source4/utils/oLschema2ldif.c return token;
token 335 source4/utils/oLschema2ldif.c struct schema_token *token;
token 382 source4/utils/oLschema2ldif.c token = get_next_schema_token(msg, &c);
token 383 source4/utils/oLschema2ldif.c if (!token) goto failed;
token 385 source4/utils/oLschema2ldif.c switch (token->type) {
token 387 source4/utils/oLschema2ldif.c MSG_ADD_STRING("cn", token->value);
token 388 source4/utils/oLschema2ldif.c MSG_ADD_STRING("name", token->value);
token 389 source4/utils/oLschema2ldif.c MSG_ADD_STRING("lDAPDisplayName", token->value);
token 391 source4/utils/oLschema2ldif.c ldb_dn_add_child_fmt(msg->dn, "CN=%s,CN=Schema,CN=Configuration", token->value);
token 395 source4/utils/oLschema2ldif.c MSG_ADD_M_STRING("subClassOf", token->value);
token 411 source4/utils/oLschema2ldif.c MSG_ADD_M_STRING("mustContain", token->value);
token 415 source4/utils/oLschema2ldif.c MSG_ADD_M_STRING("mayContain", token->value);
token 437 source4/utils/oLschema2ldif.c find_syntax_map_by_standard_oid(token->value);
token 445 source4/utils/oLschema2ldif.c MSG_ADD_STRING("description", token->value);
token 449 source4/utils/oLschema2ldif.c fprintf(stderr, "Unknown Definition: %s\n", token->value);