psd 320 examples/VFS/skel_opaque.c uint32 security_info_sent, const SEC_DESC *psd)
psd 307 examples/VFS/skel_transparent.c uint32 security_info_sent, const SEC_DESC *psd)
psd 309 examples/VFS/skel_transparent.c return SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd);
psd 682 source3/include/proto.h NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size);
psd 684 source3/include/proto.h NTSTATUS sec_desc_del_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, size_t *sd_size);
psd 717 source3/include/proto.h bool set_share_security(const char *share_name, SEC_DESC *psd);
psd 1274 source3/include/proto.h NTSTATUS samr_make_sam_obj_sd(TALLOC_CTX *ctx, SEC_DESC **psd, size_t *sd_size);
psd 6747 source3/include/proto.h NTSTATUS unpack_nt_owners(int snum, uid_t *puser, gid_t *pgrp, uint32 security_info_sent, const SEC_DESC *psd);
psd 6757 source3/include/proto.h NTSTATUS set_nt_acl(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd);
psd 7282 source3/include/proto.h NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token,
psd 442 source3/include/vfs.h const struct security_descriptor *psd);
psd 100 source3/include/vfs_macros.h #define SMB_VFS_FSET_NT_ACL(fsp, security_info_sent, psd) ((fsp)->conn->vfs.ops.fset_nt_acl((fsp)->conn->vfs.handles.fset_nt_acl, (fsp), (security_info_sent), (psd)))
psd 234 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_FSET_NT_ACL(fsp, security_info_sent, psd) ((fsp)->conn->vfs_opaque.ops.fset_nt_acl((fsp)->conn->vfs_opaque.handles.fset_nt_acl, (fsp), (security_info_sent), (psd)))
psd 369 source3/include/vfs_macros.h #define SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd) ((handle)->vfs_next.ops.fset_nt_acl((handle)->vfs_next.handles.fset_nt_acl, (fsp), (security_info_sent), (psd)))
psd 139 source3/lib/secdesc.c SEC_DESC *psd = NULL;
psd 171 source3/lib/secdesc.c psd = make_sec_desc(ctx, new_sdb->sd->revision, secdesc_type,
psd 174 source3/lib/secdesc.c return_sdb = make_sec_desc_buf(ctx, secdesc_size, psd);
psd 441 source3/lib/secdesc.c NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size)
psd 448 source3/lib/secdesc.c if (!ctx || !psd || !sid || !sd_size)
psd 453 source3/lib/secdesc.c status = sec_ace_add_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid, mask);
psd 458 source3/lib/secdesc.c if (!(dacl = make_sec_acl(ctx, psd[0]->dacl->revision, psd[0]->dacl->num_aces, ace)))
psd 461 source3/lib/secdesc.c if (!(sd = make_sec_desc(ctx, psd[0]->revision, psd[0]->type, psd[0]->owner_sid,
psd 462 source3/lib/secdesc.c psd[0]->group_sid, psd[0]->sacl, dacl, sd_size)))
psd 465 source3/lib/secdesc.c *psd = sd;
psd 493 source3/lib/secdesc.c NTSTATUS sec_desc_del_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, size_t *sd_size)
psd 500 source3/lib/secdesc.c if (!ctx || !psd[0] || !sid || !sd_size)
psd 505 source3/lib/secdesc.c status = sec_ace_del_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid);
psd 510 source3/lib/secdesc.c if (!(dacl = make_sec_acl(ctx, psd[0]->dacl->revision, psd[0]->dacl->num_aces, ace)))
psd 513 source3/lib/secdesc.c if (!(sd = make_sec_desc(ctx, psd[0]->revision, psd[0]->type, psd[0]->owner_sid,
psd 514 source3/lib/secdesc.c psd[0]->group_sid, psd[0]->sacl, dacl, sd_size)))
psd 517 source3/lib/secdesc.c *psd = sd;
psd 130 source3/lib/sharesec.c SEC_DESC *psd = NULL;
psd 139 source3/lib/sharesec.c psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1,
psd 144 source3/lib/sharesec.c if (!psd) {
psd 149 source3/lib/sharesec.c return psd;
psd 160 source3/lib/sharesec.c SEC_DESC *psd = NULL;
psd 182 source3/lib/sharesec.c status = unmarshall_sec_desc(ctx, data.dptr, data.dsize, &psd);
psd 192 source3/lib/sharesec.c if (psd)
psd 193 source3/lib/sharesec.c *psize = ndr_size_security_descriptor(psd, NULL, 0);
psd 195 source3/lib/sharesec.c return psd;
psd 202 source3/lib/sharesec.c bool set_share_security(const char *share_name, SEC_DESC *psd)
psd 216 source3/lib/sharesec.c status = marshall_sec_desc(frame, psd, &blob.dptr, &blob.dsize);
psd 284 source3/lib/sharesec.c SEC_DESC *psd = NULL;
psd 287 source3/lib/sharesec.c psd = get_share_security(talloc_tos(), sharename, &sd_size);
psd 289 source3/lib/sharesec.c if (!psd) {
psd 293 source3/lib/sharesec.c status = se_access_check(psd, token, desired_access, &granted);
psd 295 source3/lib/sharesec.c TALLOC_FREE(psd);
psd 311 source3/lib/sharesec.c SEC_DESC *psd = NULL;
psd 391 source3/lib/sharesec.c psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1,
psd 396 source3/lib/sharesec.c if (!psd) {
psd 401 source3/lib/sharesec.c *ppsd = psd;
psd 254 source3/lib/util_seaccess.c NTSTATUS samr_make_sam_obj_sd(TALLOC_CTX *ctx, SEC_DESC **psd, size_t *sd_size)
psd 282 source3/lib/util_seaccess.c if ((*psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1,
psd 2142 source3/libads/ldap.c struct security_descriptor *psd;
psd 2146 source3/libads/ldap.c values[0]->bv_len, &psd);
psd 2154 source3/libads/ldap.c if (psd) {
psd 2155 source3/libads/ldap.c ads_disp_sd(ads, talloc_tos(), psd);
psd 31 source3/libsmb/clisecdesc.c SEC_DESC *psd = NULL;
psd 54 source3/libsmb/clisecdesc.c &psd);
psd 67 source3/libsmb/clisecdesc.c return psd;
psd 705 source3/modules/nfs4_acls.c const SEC_DESC *psd,
psd 737 source3/modules/nfs4_acls.c NTSTATUS status = unpack_nt_owners(SNUM(fsp->conn), &newUID, &newGID, security_info_sent, psd);
psd 763 source3/modules/nfs4_acls.c if (!(security_info_sent & DACL_SECURITY_INFORMATION) || psd->dacl ==NULL) {
psd 768 source3/modules/nfs4_acls.c theacl = smbacl4_win2nfs4(fsp->fsp_name, psd->dacl, ¶ms, sbuf.st_uid, sbuf.st_gid);
psd 147 source3/modules/nfs4_acls.h const SEC_DESC *psd,
psd 133 source3/modules/onefs.h uint32 security_info_sent, SEC_DESC *psd);
psd 139 source3/modules/onefs.h NTSTATUS onefs_samba_sd_to_sd(uint32_t security_info_sent, SEC_DESC *psd,
psd 813 source3/modules/onefs_acl.c NTSTATUS onefs_samba_sd_to_sd(uint32_t security_info_sent, SEC_DESC *psd,
psd 830 source3/modules/onefs_acl.c if (!onefs_og_to_identity(psd->owner_sid, &owner, false, snum))
psd 840 source3/modules/onefs_acl.c if (!onefs_og_to_identity(psd->group_sid, &group, true, snum))
psd 849 source3/modules/onefs_acl.c if ((security_info_sent & DACL_SECURITY_INFORMATION) && (psd->dacl)) {
psd 850 source3/modules/onefs_acl.c if (!onefs_samba_acl_to_acl(psd->dacl, &daclp, &ignore_aces,
psd 866 source3/modules/onefs_acl.c if (psd->sacl) {
psd 867 source3/modules/onefs_acl.c if (!onefs_samba_acl_to_acl(psd->sacl,
psd 881 source3/modules/onefs_acl.c if (aclu_initialize_sd(sd, psd->type, ownerp, groupp,
psd 899 source3/modules/onefs_acl.c uint32_t sec_info_sent, SEC_DESC *psd)
psd 911 source3/modules/onefs_acl.c status = onefs_samba_sd_to_sd(sec_info_sent, psd, &sd,
psd 237 source3/modules/vfs_acl_tdb.c static NTSTATUS create_acl_blob(const struct security_descriptor *psd, DATA_BLOB *pblob)
psd 249 source3/modules/vfs_acl_tdb.c xacl.info.sd_hs->sd = CONST_DISCARD(struct security_descriptor *, psd);
psd 458 source3/modules/vfs_acl_tdb.c struct security_descriptor *psd = NULL;
psd 486 source3/modules/vfs_acl_tdb.c &psd,
psd 498 source3/modules/vfs_acl_tdb.c NDR_PRINT_DEBUG(security_descriptor, psd);
psd 508 source3/modules/vfs_acl_tdb.c if (!psd || psd->dacl == NULL) {
psd 512 source3/modules/vfs_acl_tdb.c TALLOC_FREE(psd);
psd 525 source3/modules/vfs_acl_tdb.c psd = default_file_sd(ctx, &sbuf);
psd 526 source3/modules/vfs_acl_tdb.c if (!psd) {
psd 532 source3/modules/vfs_acl_tdb.c NDR_PRINT_DEBUG(security_descriptor, psd);
psd 536 source3/modules/vfs_acl_tdb.c status = create_acl_blob(psd, &blob);
psd 738 source3/modules/vfs_acl_tdb.c uint32 security_info_sent, const struct security_descriptor *psd)
psd 747 source3/modules/vfs_acl_tdb.c CONST_DISCARD(struct security_descriptor *,psd));
psd 750 source3/modules/vfs_acl_tdb.c status = SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd);
psd 756 source3/modules/vfs_acl_tdb.c if (!psd->owner_sid || !psd->group_sid) {
psd 760 source3/modules/vfs_acl_tdb.c struct security_descriptor *nc_psd = dup_sec_desc(talloc_tos(), psd);
psd 784 source3/modules/vfs_acl_tdb.c psd = nc_psd;
psd 789 source3/modules/vfs_acl_tdb.c psd->dacl != NULL &&
psd 790 source3/modules/vfs_acl_tdb.c (psd->type & (SE_DESC_DACL_AUTO_INHERITED|
psd 795 source3/modules/vfs_acl_tdb.c status = append_parent_acl(fsp, psd, &new_psd);
psd 801 source3/modules/vfs_acl_tdb.c psd = new_psd;
psd 809 source3/modules/vfs_acl_tdb.c CONST_DISCARD(struct security_descriptor *,psd));
psd 811 source3/modules/vfs_acl_tdb.c create_acl_blob(psd, &blob);
psd 134 source3/modules/vfs_acl_xattr.c static NTSTATUS create_acl_blob(const struct security_descriptor *psd, DATA_BLOB *pblob)
psd 146 source3/modules/vfs_acl_xattr.c xacl.info.sd_hs->sd = CONST_DISCARD(struct security_descriptor *, psd);
psd 326 source3/modules/vfs_acl_xattr.c struct security_descriptor *psd = NULL;
psd 354 source3/modules/vfs_acl_xattr.c &psd,
psd 366 source3/modules/vfs_acl_xattr.c NDR_PRINT_DEBUG(security_descriptor, psd);
psd 376 source3/modules/vfs_acl_xattr.c if (!psd || psd->dacl == NULL) {
psd 380 source3/modules/vfs_acl_xattr.c TALLOC_FREE(psd);
psd 393 source3/modules/vfs_acl_xattr.c psd = default_file_sd(ctx, &sbuf);
psd 394 source3/modules/vfs_acl_xattr.c if (!psd) {
psd 400 source3/modules/vfs_acl_xattr.c NDR_PRINT_DEBUG(security_descriptor, psd);
psd 404 source3/modules/vfs_acl_xattr.c status = create_acl_blob(psd, &blob);
psd 538 source3/modules/vfs_acl_xattr.c uint32 security_info_sent, const struct security_descriptor *psd)
psd 547 source3/modules/vfs_acl_xattr.c CONST_DISCARD(struct security_descriptor *,psd));
psd 550 source3/modules/vfs_acl_xattr.c status = SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd);
psd 556 source3/modules/vfs_acl_xattr.c if (!psd->owner_sid || !psd->group_sid) {
psd 560 source3/modules/vfs_acl_xattr.c struct security_descriptor *nc_psd = dup_sec_desc(talloc_tos(), psd);
psd 584 source3/modules/vfs_acl_xattr.c psd = nc_psd;
psd 589 source3/modules/vfs_acl_xattr.c psd->dacl != NULL &&
psd 590 source3/modules/vfs_acl_xattr.c (psd->type & (SE_DESC_DACL_AUTO_INHERITED|
psd 595 source3/modules/vfs_acl_xattr.c status = append_parent_acl(fsp, psd, &new_psd);
psd 601 source3/modules/vfs_acl_xattr.c psd = new_psd;
psd 609 source3/modules/vfs_acl_xattr.c CONST_DISCARD(struct security_descriptor *,psd));
psd 611 source3/modules/vfs_acl_xattr.c create_acl_blob(psd, &blob);
psd 724 source3/modules/vfs_afsacl.c const struct security_descriptor *psd,
psd 735 source3/modules/vfs_afsacl.c (psd->dacl == NULL))
psd 741 source3/modules/vfs_afsacl.c dacl = psd->dacl;
psd 894 source3/modules/vfs_afsacl.c const struct security_descriptor *psd)
psd 950 source3/modules/vfs_afsacl.c if (!nt_to_afs_acl(fsp->fsp_name, security_info_sent, psd,
psd 965 source3/modules/vfs_afsacl.c if (!nt_to_afs_acl(fsp->fsp_name, security_info_sent, psd,
psd 1047 source3/modules/vfs_afsacl.c const SEC_DESC *psd)
psd 1049 source3/modules/vfs_afsacl.c return afs_set_nt_acl(handle, fsp, security_info_sent, psd);
psd 372 source3/modules/vfs_aixacl2.c static NTSTATUS aixjfs2_set_nt_acl_common(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd 386 source3/modules/vfs_aixacl2.c fsp, security_info_sent, psd,
psd 389 source3/modules/vfs_aixacl2.c result = set_nt_acl(fsp, security_info_sent, psd);
psd 396 source3/modules/vfs_aixacl2.c NTSTATUS aixjfs2_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd 398 source3/modules/vfs_aixacl2.c return aixjfs2_set_nt_acl_common(fsp, security_info_sent, psd);
psd 1263 source3/modules/vfs_default.c static NTSTATUS vfswrap_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd 1268 source3/modules/vfs_default.c result = set_nt_acl(fsp, security_info_sent, psd);
psd 251 source3/modules/vfs_full_audit.c const SEC_DESC *psd);
psd 1840 source3/modules/vfs_full_audit.c const SEC_DESC *psd)
psd 1844 source3/modules/vfs_full_audit.c result = SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd);
psd 437 source3/modules/vfs_gpfs.c static NTSTATUS gpfsacl_set_nt_acl_internal(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd 449 source3/modules/vfs_gpfs.c fsp, security_info_sent, psd,
psd 452 source3/modules/vfs_gpfs.c result = set_nt_acl(fsp, security_info_sent, psd);
psd 458 source3/modules/vfs_gpfs.c static NTSTATUS gpfsacl_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd 460 source3/modules/vfs_gpfs.c return gpfsacl_set_nt_acl_internal(fsp, security_info_sent, psd);
psd 169 source3/modules/vfs_zfsacl.c const struct security_descriptor *psd)
psd 171 source3/modules/vfs_zfsacl.c return smb_set_nt_acl_nfs4(fsp, security_info_sent, psd,
psd 210 source3/modules/vfs_zfsacl.c const SEC_DESC *psd)
psd 212 source3/modules/vfs_zfsacl.c return zfs_set_nt_acl(handle, fsp, security_info_sent, psd);
psd 8533 source3/param/loadparm.c SEC_DESC *psd = NULL;
psd 8648 source3/param/loadparm.c &comment, &psd, &guest_ok) != USERSHARE_OK) {
psd 8675 source3/param/loadparm.c if (!set_share_security(service_name, psd)) {
psd 5315 source3/printing/nt_printing.c SEC_DESC *psd = NULL;
psd 5343 source3/printing/nt_printing.c psd = make_sec_desc(mem_ctx, secdesc_ctr->sd->revision, secdesc_ctr->sd->type,
psd 5349 source3/printing/nt_printing.c if (!psd) {
psd 5354 source3/printing/nt_printing.c new_secdesc_ctr = make_sec_desc_buf(mem_ctx, size, psd);
psd 5403 source3/printing/nt_printing.c SEC_DESC *psd = NULL;
psd 5457 source3/printing/nt_printing.c psd = make_sec_desc(ctx, SEC_DESC_REVISION, SEC_DESC_SELF_RELATIVE,
psd 5463 source3/printing/nt_printing.c if (!psd) {
psd 5468 source3/printing/nt_printing.c sdb = make_sec_desc_buf(ctx, sd_size, psd);
psd 5533 source3/printing/nt_printing.c SEC_DESC *psd = NULL;
psd 5540 source3/printing/nt_printing.c psd = make_sec_desc(ctx, (*secdesc_ctr)->sd->revision, (*secdesc_ctr)->sd->type,
psd 5547 source3/printing/nt_printing.c if (!psd) {
psd 5551 source3/printing/nt_printing.c new_secdesc_ctr = make_sec_desc_buf(ctx, size, psd);
psd 37 source3/registry/reg_dispatcher.c static WERROR construct_registry_sd(TALLOC_CTX *ctx, SEC_DESC **psd)
psd 75 source3/registry/reg_dispatcher.c *psd = sd;
psd 388 source3/rpc_server/srv_lsa_nt.c SEC_DESC *psd = NULL;
psd 401 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size, &lsa_policy_mapping,
psd 407 source3/rpc_server/srv_lsa_nt.c status = access_check_object(psd, p->server_info->ptok,
psd 1630 source3/rpc_server/srv_lsa_nt.c SEC_DESC *psd = NULL;
psd 1654 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size,
psd 1661 source3/rpc_server/srv_lsa_nt.c status = access_check_object(psd, p->server_info->ptok,
psd 1938 source3/rpc_server/srv_lsa_nt.c SEC_DESC *psd = NULL;
psd 1947 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size,
psd 1950 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size,
psd 1964 source3/rpc_server/srv_lsa_nt.c if((*r->out.sdbuf = make_sec_desc_buf(p->mem_ctx, sd_size, psd)) == NULL)
psd 1969 source3/rpc_server/srv_lsa_nt.c if((*r->out.sdbuf = make_sec_desc_buf(p->mem_ctx, sd_size, psd)) == NULL)
psd 2057 source3/rpc_server/srv_lsa_nt.c SEC_DESC *psd = NULL;
psd 2071 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size,
psd 2085 source3/rpc_server/srv_lsa_nt.c status = access_check_object(psd, p->server_info->ptok,
psd 2126 source3/rpc_server/srv_lsa_nt.c SEC_DESC *psd = NULL;
psd 2142 source3/rpc_server/srv_lsa_nt.c status = make_lsa_object_sd(p->mem_ctx, &psd, &sd_size,
psd 2155 source3/rpc_server/srv_lsa_nt.c status = access_check_object(psd, p->server_info->ptok,
psd 112 source3/rpc_server/srv_samr_nt.c static NTSTATUS make_samr_object_sd( TALLOC_CTX *ctx, SEC_DESC **psd, size_t *sd_size,
psd 154 source3/rpc_server/srv_samr_nt.c if ((*psd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1,
psd 167 source3/rpc_server/srv_samr_nt.c NTSTATUS access_check_object( SEC_DESC *psd, NT_USER_TOKEN *token,
psd 192 source3/rpc_server/srv_samr_nt.c status = se_access_check(psd, token, des_access, acc_granted);
psd 603 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd = NULL;
psd 619 source3/rpc_server/srv_samr_nt.c make_samr_object_sd( p->mem_ctx, &psd, &sd_size, &dom_generic_mapping, NULL, 0 );
psd 641 source3/rpc_server/srv_samr_nt.c status = access_check_object( psd, p->server_info->ptok,
psd 863 source3/rpc_server/srv_samr_nt.c SEC_DESC * psd = NULL;
psd 886 source3/rpc_server/srv_samr_nt.c status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &sam_generic_mapping, NULL, 0);
psd 891 source3/rpc_server/srv_samr_nt.c status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &dom_generic_mapping, NULL, 0);
psd 897 source3/rpc_server/srv_samr_nt.c status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &dom_generic_mapping, NULL, 0);
psd 905 source3/rpc_server/srv_samr_nt.c status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_generic_mapping,
psd 908 source3/rpc_server/srv_samr_nt.c status = make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_nopwchange_generic_mapping,
psd 915 source3/rpc_server/srv_samr_nt.c if ((*r->out.sdbuf = make_sec_desc_buf(p->mem_ctx, sd_size, psd)) == NULL)
psd 2331 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd = NULL;
psd 2365 source3/rpc_server/srv_samr_nt.c make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_generic_mapping, &sid, SAMR_USR_RIGHTS_WRITE_PW);
psd 2433 source3/rpc_server/srv_samr_nt.c nt_status = access_check_object(psd, p->server_info->ptok,
psd 3750 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd;
psd 3846 source3/rpc_server/srv_samr_nt.c make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &usr_generic_mapping,
psd 3857 source3/rpc_server/srv_samr_nt.c nt_status = access_check_object(psd, p->server_info->ptok,
psd 3954 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd = NULL;
psd 3987 source3/rpc_server/srv_samr_nt.c make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &sam_generic_mapping, NULL, 0);
psd 3990 source3/rpc_server/srv_samr_nt.c nt_status = access_check_object(psd, p->server_info->ptok,
psd 4185 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd = NULL;
psd 4213 source3/rpc_server/srv_samr_nt.c make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &ali_generic_mapping, NULL, 0);
psd 4218 source3/rpc_server/srv_samr_nt.c status = access_check_object(psd, p->server_info->ptok,
psd 6360 source3/rpc_server/srv_samr_nt.c SEC_DESC *psd = NULL;
psd 6382 source3/rpc_server/srv_samr_nt.c make_samr_object_sd(p->mem_ctx, &psd, &sd_size, &grp_generic_mapping, NULL, 0);
psd 6387 source3/rpc_server/srv_samr_nt.c status = access_check_object(psd, p->server_info->ptok,
psd 322 source3/rpc_server/srv_srvsvc_nt.c static void map_generic_share_sd_bits(SEC_DESC *psd)
psd 327 source3/rpc_server/srv_srvsvc_nt.c if (!psd)
psd 330 source3/rpc_server/srv_srvsvc_nt.c ps_dacl = psd->dacl;
psd 1493 source3/rpc_server/srv_srvsvc_nt.c SEC_DESC *psd = NULL;
psd 1549 source3/rpc_server/srv_srvsvc_nt.c psd = NULL;
psd 1557 source3/rpc_server/srv_srvsvc_nt.c psd = NULL;
psd 1564 source3/rpc_server/srv_srvsvc_nt.c psd = NULL;
psd 1571 source3/rpc_server/srv_srvsvc_nt.c psd = info->info502->sd_buf.sd;
psd 1572 source3/rpc_server/srv_srvsvc_nt.c map_generic_share_sd_bits(psd);
psd 1598 source3/rpc_server/srv_srvsvc_nt.c psd = info->info1501->sd;
psd 1599 source3/rpc_server/srv_srvsvc_nt.c map_generic_share_sd_bits(psd);
psd 1688 source3/rpc_server/srv_srvsvc_nt.c if (psd) {
psd 1694 source3/rpc_server/srv_srvsvc_nt.c if (old_sd && !sec_desc_equal(old_sd, psd)) {
psd 1695 source3/rpc_server/srv_srvsvc_nt.c if (!set_share_security(share_name, psd))
psd 1723 source3/rpc_server/srv_srvsvc_nt.c SEC_DESC *psd = NULL;
psd 1770 source3/rpc_server/srv_srvsvc_nt.c psd = r->in.info->info502->sd_buf.sd;
psd 1771 source3/rpc_server/srv_srvsvc_nt.c map_generic_share_sd_bits(psd);
psd 1870 source3/rpc_server/srv_srvsvc_nt.c if (psd) {
psd 1871 source3/rpc_server/srv_srvsvc_nt.c if (!set_share_security(share_name, psd)) {
psd 2051 source3/rpc_server/srv_srvsvc_nt.c SEC_DESC *psd = NULL;
psd 2113 source3/rpc_server/srv_srvsvc_nt.c |DACL_SECURITY_INFORMATION), &psd);
psd 2122 source3/rpc_server/srv_srvsvc_nt.c sd_size = ndr_size_security_descriptor(psd, NULL, 0);
psd 2131 source3/rpc_server/srv_srvsvc_nt.c sd_buf->sd = psd;
psd 2135 source3/rpc_server/srv_srvsvc_nt.c psd->dacl->revision = NT4_ACL_REVISION;
psd 2175 source3/rpc_server/srv_srvsvc_nt.c struct security_descriptor *psd = NULL;
psd 2225 source3/rpc_server/srv_srvsvc_nt.c psd = r->in.sd_buf->sd;
psd 2228 source3/rpc_server/srv_srvsvc_nt.c if (psd->owner_sid==0) {
psd 2231 source3/rpc_server/srv_srvsvc_nt.c if (psd->group_sid==0) {
psd 2234 source3/rpc_server/srv_srvsvc_nt.c if (psd->sacl==0) {
psd 2237 source3/rpc_server/srv_srvsvc_nt.c if (psd->dacl==0) {
psd 2242 source3/rpc_server/srv_srvsvc_nt.c security_acl_map_generic(psd->dacl, &file_generic_mapping);
psd 2243 source3/rpc_server/srv_srvsvc_nt.c security_acl_map_generic(psd->sacl, &file_generic_mapping);
psd 2247 source3/rpc_server/srv_srvsvc_nt.c psd);
psd 760 source3/smbd/nttrans.c SEC_DESC *psd = NULL;
psd 767 source3/smbd/nttrans.c status = unmarshall_sec_desc(talloc_tos(), data, sd_len, &psd);
psd 773 source3/smbd/nttrans.c if (psd->owner_sid == NULL) {
psd 776 source3/smbd/nttrans.c if (psd->group_sid == NULL) {
psd 781 source3/smbd/nttrans.c security_acl_map_generic(psd->dacl, &file_generic_mapping);
psd 782 source3/smbd/nttrans.c security_acl_map_generic(psd->sacl, &file_generic_mapping);
psd 786 source3/smbd/nttrans.c NDR_PRINT_DEBUG(security_descriptor, psd);
psd 789 source3/smbd/nttrans.c status = SMB_VFS_FSET_NT_ACL(fsp, security_info_sent, psd);
psd 791 source3/smbd/nttrans.c TALLOC_FREE(psd);
psd 1642 source3/smbd/nttrans.c SEC_DESC *psd = NULL;
psd 1676 source3/smbd/nttrans.c status = get_null_nt_acl(talloc_tos(), &psd);
psd 1679 source3/smbd/nttrans.c fsp, security_info_wanted, &psd);
psd 1688 source3/smbd/nttrans.c if (psd->sacl == NULL &&
psd 1690 source3/smbd/nttrans.c psd->type |= SEC_DESC_SACL_PRESENT;
psd 1691 source3/smbd/nttrans.c if (psd->dacl == NULL &&
psd 1693 source3/smbd/nttrans.c psd->type |= SEC_DESC_DACL_PRESENT;
psd 1695 source3/smbd/nttrans.c sd_size = ndr_size_security_descriptor(psd, NULL, 0);
psd 1701 source3/smbd/nttrans.c NDR_PRINT_DEBUG(security_descriptor, psd);
psd 1722 source3/smbd/nttrans.c status = marshall_sec_desc(talloc_tos(), psd,
psd 1146 source3/smbd/posix_acls.c NTSTATUS unpack_nt_owners(int snum, uid_t *puser, gid_t *pgrp, uint32 security_info_sent, const SEC_DESC *psd)
psd 1174 source3/smbd/posix_acls.c sid_copy(&owner_sid, psd->owner_sid);
psd 1197 source3/smbd/posix_acls.c sid_copy(&grp_sid, psd->group_sid);
psd 2205 source3/smbd/posix_acls.c const SEC_DESC *psd)
psd 2222 source3/smbd/posix_acls.c if(!(security_info_sent & DACL_SECURITY_INFORMATION) || !psd->dacl)
psd 2230 source3/smbd/posix_acls.c &file_ace, &dir_ace, psd->dacl))
psd 3058 source3/smbd/posix_acls.c SEC_DESC *psd = NULL;
psd 3256 source3/smbd/posix_acls.c psd = make_standard_sec_desc( talloc_tos(),
psd 3262 source3/smbd/posix_acls.c if(!psd) {
psd 3279 source3/smbd/posix_acls.c psd->type |= SEC_DESC_DACL_PROTECTED;
psd 3281 source3/smbd/posix_acls.c psd->type |= pal->sd_type;
psd 3284 source3/smbd/posix_acls.c if (psd->dacl) {
psd 3285 source3/smbd/posix_acls.c dacl_sort_into_canonical_order(psd->dacl->aces, (unsigned int)psd->dacl->num_aces);
psd 3288 source3/smbd/posix_acls.c *ppdesc = psd;
psd 3486 source3/smbd/posix_acls.c SEC_DESC *psd = dup_sec_desc(talloc_tos(), pcsd);
psd 3491 source3/smbd/posix_acls.c if (psd == NULL) {
psd 3551 source3/smbd/posix_acls.c for (i = 0; i < psd->dacl->num_aces; i++) {
psd 3552 source3/smbd/posix_acls.c sec_ace_copy(&new_ace[i], &psd->dacl->aces[i]);
psd 3597 source3/smbd/posix_acls.c for (k = 0; k < psd->dacl->num_aces; k++) {
psd 3598 source3/smbd/posix_acls.c if (sid_equal(&psd->dacl->aces[k].trustee,
psd 3603 source3/smbd/posix_acls.c if (k < psd->dacl->num_aces) {
psd 3651 source3/smbd/posix_acls.c psd->dacl->aces = new_ace;
psd 3652 source3/smbd/posix_acls.c psd->dacl->num_aces = i;
psd 3653 source3/smbd/posix_acls.c psd->type &= ~(SE_DESC_DACL_AUTO_INHERITED|
psd 3656 source3/smbd/posix_acls.c *pp_new_sd = psd;
psd 3667 source3/smbd/posix_acls.c NTSTATUS set_nt_acl(files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
psd 3718 source3/smbd/posix_acls.c status = unpack_nt_owners( SNUM(conn), &user, &grp, security_info_sent, psd);
psd 3784 source3/smbd/posix_acls.c &file_ace_list, &dir_ace_list, security_info_sent, psd);
psd 3802 source3/smbd/posix_acls.c if(!(security_info_sent & DACL_SECURITY_INFORMATION) || (psd->dacl == NULL)) {
psd 3884 source3/smbd/posix_acls.c psd->type);
psd 4540 source3/smbd/posix_acls.c SEC_DESC *psd, *ret_sd;
psd 4576 source3/smbd/posix_acls.c if (!NT_STATUS_IS_OK(SMB_VFS_FGET_NT_ACL( &finfo, DACL_SECURITY_INFORMATION, &psd))) {
psd 4582 source3/smbd/posix_acls.c ret_sd = dup_sec_desc( ctx, psd );
psd 323 source3/utils/net_usershare.c SEC_DESC *psd = NULL;
psd 385 source3/utils/net_usershare.c &psd,
psd 403 source3/utils/net_usershare.c for (num_aces = 0; num_aces < psd->dacl->num_aces; num_aces++) {
psd 409 source3/utils/net_usershare.c &psd->dacl->aces[num_aces].trustee,
psd 432 source3/utils/net_usershare.c &psd->dacl->aces[num_aces].trustee);
psd 445 source3/utils/net_usershare.c if (psd->dacl->aces[num_aces].type == SEC_ACE_TYPE_ACCESS_DENIED) {
psd 451 source3/utils/net_usershare.c if (psd->dacl->aces[num_aces].access_mask & GENERIC_ALL_ACCESS) {
psd 145 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor **psd)
psd 154 source4/ntvfs/posix/pvfs_acl.c *psd = security_descriptor_initialise(req);
psd 155 source4/ntvfs/posix/pvfs_acl.c if (*psd == NULL) {
psd 158 source4/ntvfs/posix/pvfs_acl.c sd = *psd;
psd 36 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_descriptor **psd)
psd 56 source4/ntvfs/posix/pvfs_acl_nfs4.c *psd = security_descriptor_initialise(mem_ctx);
psd 57 source4/ntvfs/posix/pvfs_acl_nfs4.c NT_STATUS_HAVE_NO_MEMORY(*psd);
psd 59 source4/ntvfs/posix/pvfs_acl_nfs4.c sd = *psd;