sd 611 librpc/gen_ndr/cli_winreg.c struct KeySecurityData *sd /* [in,out] [ref] */,
sd 620 librpc/gen_ndr/cli_winreg.c r.in.sd = sd;
sd 645 librpc/gen_ndr/cli_winreg.c *sd = *r.out.sd;
sd 1074 librpc/gen_ndr/cli_winreg.c struct KeySecurityData *sd /* [in] [ref] */,
sd 1083 librpc/gen_ndr/cli_winreg.c r.in.sd = sd;
sd 85 librpc/gen_ndr/cli_winreg.h struct KeySecurityData *sd /* [in,out] [ref] */,
sd 152 librpc/gen_ndr/cli_winreg.h struct KeySecurityData *sd /* [in] [ref] */,
sd 777 librpc/gen_ndr/ndr_security.c NDR_CHECK(ndr_push_uint32(ndr, NDR_SCALARS, ndr_size_security_descriptor(r->sd, ndr->iconv_convenience, ndr->flags)));
sd 778 librpc/gen_ndr/ndr_security.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->sd));
sd 781 librpc/gen_ndr/ndr_security.c if (r->sd) {
sd 785 librpc/gen_ndr/ndr_security.c NDR_CHECK(ndr_push_security_descriptor(_ndr_sd, NDR_SCALARS|NDR_BUFFERS, r->sd));
sd 805 librpc/gen_ndr/ndr_security.c NDR_PULL_ALLOC(ndr, r->sd);
sd 807 librpc/gen_ndr/ndr_security.c r->sd = NULL;
sd 811 librpc/gen_ndr/ndr_security.c if (r->sd) {
sd 813 librpc/gen_ndr/ndr_security.c NDR_PULL_SET_MEM_CTX(ndr, r->sd, 0);
sd 817 librpc/gen_ndr/ndr_security.c NDR_CHECK(ndr_pull_security_descriptor(_ndr_sd, NDR_SCALARS|NDR_BUFFERS, r->sd));
sd 830 librpc/gen_ndr/ndr_security.c ndr_print_uint32(ndr, "sd_size", (ndr->flags & LIBNDR_PRINT_SET_VALUES)?ndr_size_security_descriptor(r->sd, ndr->iconv_convenience, ndr->flags):r->sd_size);
sd 831 librpc/gen_ndr/ndr_security.c ndr_print_ptr(ndr, "sd", r->sd);
sd 833 librpc/gen_ndr/ndr_security.c if (r->sd) {
sd 834 librpc/gen_ndr/ndr_security.c ndr_print_security_descriptor(ndr, "sd", r->sd);
sd 17506 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_sec_desc_buf(ndr, NDR_SCALARS, &r->sd));
sd 17532 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_push_sec_desc_buf(ndr, NDR_BUFFERS, &r->sd));
sd 17573 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_sec_desc_buf(ndr, NDR_SCALARS, &r->sd));
sd 17598 librpc/gen_ndr/ndr_spoolss.c NDR_CHECK(ndr_pull_sec_desc_buf(ndr, NDR_BUFFERS, &r->sd));
sd 17641 librpc/gen_ndr/ndr_spoolss.c ndr_print_sec_desc_buf(ndr, "sd", &r->sd);
sd 215 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_KeySecurityData(ndr, NDR_SCALARS, &r->sd));
sd 219 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_KeySecurityData(ndr, NDR_BUFFERS, &r->sd));
sd 229 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_KeySecurityData(ndr, NDR_SCALARS, &r->sd));
sd 233 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_KeySecurityData(ndr, NDR_BUFFERS, &r->sd));
sd 243 librpc/gen_ndr/ndr_winreg.c ndr_print_KeySecurityData(ndr, "sd", &r->sd);
sd 1901 librpc/gen_ndr/ndr_winreg.c if (r->in.sd == NULL) {
sd 1904 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->in.sd));
sd 1907 librpc/gen_ndr/ndr_winreg.c if (r->out.sd == NULL) {
sd 1910 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->out.sd));
sd 1932 librpc/gen_ndr/ndr_winreg.c NDR_PULL_ALLOC(ndr, r->in.sd);
sd 1935 librpc/gen_ndr/ndr_winreg.c NDR_PULL_SET_MEM_CTX(ndr, r->in.sd, LIBNDR_FLAG_REF_ALLOC);
sd 1936 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->in.sd));
sd 1938 librpc/gen_ndr/ndr_winreg.c NDR_PULL_ALLOC(ndr, r->out.sd);
sd 1939 librpc/gen_ndr/ndr_winreg.c *r->out.sd = *r->in.sd;
sd 1943 librpc/gen_ndr/ndr_winreg.c NDR_PULL_ALLOC(ndr, r->out.sd);
sd 1946 librpc/gen_ndr/ndr_winreg.c NDR_PULL_SET_MEM_CTX(ndr, r->out.sd, LIBNDR_FLAG_REF_ALLOC);
sd 1947 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->out.sd));
sd 1969 librpc/gen_ndr/ndr_winreg.c ndr_print_ptr(ndr, "sd", r->in.sd);
sd 1971 librpc/gen_ndr/ndr_winreg.c ndr_print_KeySecurityData(ndr, "sd", r->in.sd);
sd 1978 librpc/gen_ndr/ndr_winreg.c ndr_print_ptr(ndr, "sd", r->out.sd);
sd 1980 librpc/gen_ndr/ndr_winreg.c ndr_print_KeySecurityData(ndr, "sd", r->out.sd);
sd 3007 librpc/gen_ndr/ndr_winreg.c if (r->in.sd == NULL) {
sd 3010 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_push_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->in.sd));
sd 3032 librpc/gen_ndr/ndr_winreg.c NDR_PULL_ALLOC(ndr, r->in.sd);
sd 3035 librpc/gen_ndr/ndr_winreg.c NDR_PULL_SET_MEM_CTX(ndr, r->in.sd, LIBNDR_FLAG_REF_ALLOC);
sd 3036 librpc/gen_ndr/ndr_winreg.c NDR_CHECK(ndr_pull_KeySecurityData(ndr, NDR_SCALARS|NDR_BUFFERS, r->in.sd));
sd 3060 librpc/gen_ndr/ndr_winreg.c ndr_print_ptr(ndr, "sd", r->in.sd);
sd 3062 librpc/gen_ndr/ndr_winreg.c ndr_print_KeySecurityData(ndr, "sd", r->in.sd);
sd 553 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->sd));
sd 557 librpc/gen_ndr/ndr_xattr.c if (r->sd) {
sd 558 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_push_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, r->sd));
sd 572 librpc/gen_ndr/ndr_xattr.c NDR_PULL_ALLOC(ndr, r->sd);
sd 574 librpc/gen_ndr/ndr_xattr.c r->sd = NULL;
sd 579 librpc/gen_ndr/ndr_xattr.c if (r->sd) {
sd 581 librpc/gen_ndr/ndr_xattr.c NDR_PULL_SET_MEM_CTX(ndr, r->sd, 0);
sd 582 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_pull_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, r->sd));
sd 593 librpc/gen_ndr/ndr_xattr.c ndr_print_ptr(ndr, "sd", r->sd);
sd 595 librpc/gen_ndr/ndr_xattr.c if (r->sd) {
sd 596 librpc/gen_ndr/ndr_xattr.c ndr_print_security_descriptor(ndr, "sd", r->sd);
sd 610 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_push_unique_ptr(ndr, r->sd));
sd 625 librpc/gen_ndr/ndr_xattr.c if (r->sd) {
sd 626 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_push_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, r->sd));
sd 660 librpc/gen_ndr/ndr_xattr.c NDR_PULL_ALLOC(ndr, r->sd);
sd 662 librpc/gen_ndr/ndr_xattr.c r->sd = NULL;
sd 683 librpc/gen_ndr/ndr_xattr.c if (r->sd) {
sd 685 librpc/gen_ndr/ndr_xattr.c NDR_PULL_SET_MEM_CTX(ndr, r->sd, 0);
sd 686 librpc/gen_ndr/ndr_xattr.c NDR_CHECK(ndr_pull_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, r->sd));
sd 714 librpc/gen_ndr/ndr_xattr.c ndr_print_ptr(ndr, "sd", r->sd);
sd 716 librpc/gen_ndr/ndr_xattr.c if (r->sd) {
sd 717 librpc/gen_ndr/ndr_xattr.c ndr_print_security_descriptor(ndr, "sd", r->sd);
sd 328 librpc/gen_ndr/security.h struct security_descriptor *sd;/* [unique,subcontext(4)] */
sd 1485 librpc/gen_ndr/spoolss.h struct sec_desc_buf sd;/* [case(5)] */
sd 979 librpc/gen_ndr/srv_winreg.c r->out.sd = r->in.sd;
sd 2901 librpc/gen_ndr/srv_winreg.c r->out.sd = r->in.sd;
sd 73 librpc/gen_ndr/winreg.h struct KeySecurityData sd;
sd 311 librpc/gen_ndr/winreg.h struct KeySecurityData *sd;/* [ref] */
sd 315 librpc/gen_ndr/winreg.h struct KeySecurityData *sd;/* [ref] */
sd 453 librpc/gen_ndr/winreg.h struct KeySecurityData *sd;/* [ref] */
sd 79 librpc/gen_ndr/xattr.h struct security_descriptor *sd;/* [unique] */
sd 84 librpc/gen_ndr/xattr.h struct security_descriptor *sd;/* [unique,case] */
sd 109 librpc/ndr/ndr_sec_helper.c size_t ndr_size_security_descriptor(const struct security_descriptor *sd, struct smb_iconv_convenience *ic, int flags)
sd 112 librpc/ndr/ndr_sec_helper.c if (!sd) return 0;
sd 115 librpc/ndr/ndr_sec_helper.c ret += ndr_size_dom_sid(sd->owner_sid, ic, flags);
sd 116 librpc/ndr/ndr_sec_helper.c ret += ndr_size_dom_sid(sd->group_sid, ic, flags);
sd 117 librpc/ndr/ndr_sec_helper.c ret += ndr_size_security_acl(sd->dacl, ic, flags);
sd 118 librpc/ndr/ndr_sec_helper.c ret += ndr_size_security_acl(sd->sacl, ic, flags);
sd 563 source3/client/client.c SEC_DESC *sd = NULL;
sd 564 source3/client/client.c sd = cli_query_secdesc(finfo->cli, fnum, ctx);
sd 565 source3/client/client.c if (!sd) {
sd 570 source3/client/client.c display_sec_desc(sd);
sd 572 source3/client/client.c TALLOC_FREE(sd);
sd 29 source3/include/ads_protos.h LDAPMessage *msg, const char *field, SEC_DESC **sd);
sd 660 source3/include/proto.h uint32_t get_sec_info(const SEC_DESC *sd);
sd 683 source3/include/proto.h NTSTATUS sec_desc_mod_sid(SEC_DESC *sd, DOM_SID *sid, uint32 mask);
sd 1272 source3/include/proto.h NTSTATUS se_access_check(const SEC_DESC *sd, const NT_USER_TOKEN *token,
sd 1725 source3/include/proto.h void ads_disp_sd(ADS_STRUCT *ads, TALLOC_CTX *mem_ctx, SEC_DESC *sd);
sd 2803 source3/include/proto.h bool cli_set_secdesc(struct cli_state *cli, int fnum, SEC_DESC *sd);
sd 4851 source3/include/proto.h void map_printer_permissions(SEC_DESC *sd);
sd 4852 source3/include/proto.h void map_job_permissions(SEC_DESC *sd);
sd 6598 source3/include/proto.h NTSTATUS smb1_file_se_access_check(const struct security_descriptor *sd,
sd 6663 source3/include/proto.h struct security_descriptor *sd,
sd 343 source3/include/vfs.h struct security_descriptor *sd,
sd 52 source3/include/vfs_macros.h #define SMB_VFS_CREATE_FILE(conn, req, root_dir_fid, fname, create_file_flags, access_mask, share_access, create_disposition, create_options, file_attributes, oplock_request, allocation_size, sd, ea_list, result, pinfo, psbuf) (((conn)->vfs.ops.create_file)((conn)->vfs.handles.create_file, (req), (root_dir_fid), (fname), (create_file_flags), (access_mask), (share_access), (create_disposition), (create_options), (file_attributes), (oplock_request), (allocation_size), (sd), (ea_list), (result), (pinfo), (psbuf)))
sd 186 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_CREATE_FILE(conn, req, root_dir_fid, fname, create_file_flags, access_mask, share_access, create_disposition, create_options, file_attributes, oplock_request, allocation_size, sd, ea_list, result, pinfo, psbuf) (((conn)->vfs_opaque.ops.create_file)((conn)->vfs_opaque.handles.create_file, (req), (root_dir_fid), (fname), (create_file_flags), (access_mask), (share_access), (create_disposition), (create_options), (file_attributes), (oplock_request), (allocation_size), (sd), (ea_list), (result), (pinfo), (psbuf)))
sd 321 source3/include/vfs_macros.h #define SMB_VFS_NEXT_CREATE_FILE(handle, req, root_dir_fid, fname, create_file_flags, access_mask, share_access, create_disposition, create_options, file_attributes, oplock_request, allocation_size, sd, ea_list, result, pinfo, psbuf) (((handle)->vfs_next.ops.create_file)((handle)->vfs_next.handles.create_file, (req), (root_dir_fid), (fname), (create_file_flags), (access_mask), (share_access), (create_disposition), (create_options), (file_attributes), (oplock_request), (allocation_size), (sd), (ea_list), (result), (pinfo), (psbuf)))
sd 247 source3/lib/ldb/samba/ldif_handlers.c struct security_descriptor *sd;
sd 250 source3/lib/ldb/samba/ldif_handlers.c sd = sddl_decode(mem_ctx, (const char *)in->data, NULL);
sd 251 source3/lib/ldb/samba/ldif_handlers.c if (sd == NULL) {
sd 254 source3/lib/ldb/samba/ldif_handlers.c status = ndr_push_struct_blob(out, mem_ctx, sd,
sd 256 source3/lib/ldb/samba/ldif_handlers.c talloc_free(sd);
sd 269 source3/lib/ldb/samba/ldif_handlers.c struct security_descriptor *sd;
sd 272 source3/lib/ldb/samba/ldif_handlers.c sd = talloc(mem_ctx, struct security_descriptor);
sd 273 source3/lib/ldb/samba/ldif_handlers.c if (sd == NULL) {
sd 276 source3/lib/ldb/samba/ldif_handlers.c status = ndr_pull_struct_blob(in, sd, sd,
sd 279 source3/lib/ldb/samba/ldif_handlers.c talloc_free(sd);
sd 282 source3/lib/ldb/samba/ldif_handlers.c out->data = (uint8_t *)sddl_encode(mem_ctx, sd, NULL);
sd 283 source3/lib/ldb/samba/ldif_handlers.c talloc_free(sd);
sd 106 source3/lib/secdesc.c uint32_t get_sec_info(const SEC_DESC *sd)
sd 110 source3/lib/secdesc.c SMB_ASSERT(sd);
sd 112 source3/lib/secdesc.c if (sd->owner_sid == NULL) {
sd 115 source3/lib/secdesc.c if (sd->group_sid == NULL) {
sd 118 source3/lib/secdesc.c if (sd->sacl == NULL) {
sd 121 source3/lib/secdesc.c if (sd->dacl == NULL) {
sd 146 source3/lib/secdesc.c owner_sid = new_sdb->sd->owner_sid ? new_sdb->sd->owner_sid :
sd 147 source3/lib/secdesc.c old_sdb->sd->owner_sid;
sd 149 source3/lib/secdesc.c group_sid = new_sdb->sd->group_sid ? new_sdb->sd->group_sid :
sd 150 source3/lib/secdesc.c old_sdb->sd->group_sid;
sd 152 source3/lib/secdesc.c secdesc_type = new_sdb->sd->type;
sd 164 source3/lib/secdesc.c dacl = new_sdb->sd->dacl;
sd 166 source3/lib/secdesc.c dacl = old_sdb->sd->dacl;
sd 171 source3/lib/secdesc.c psd = make_sec_desc(ctx, new_sdb->sd->revision, secdesc_type,
sd 418 source3/lib/secdesc.c if(sec_desc && ((dst->sd = dup_sec_desc(ctx, sec_desc)) == NULL)) {
sd 434 source3/lib/secdesc.c return make_sec_desc_buf( ctx, src->sd_size, src->sd);
sd 443 source3/lib/secdesc.c SEC_DESC *sd = 0;
sd 461 source3/lib/secdesc.c if (!(sd = make_sec_desc(ctx, psd[0]->revision, psd[0]->type, psd[0]->owner_sid,
sd 465 source3/lib/secdesc.c *psd = sd;
sd 466 source3/lib/secdesc.c sd = 0;
sd 474 source3/lib/secdesc.c NTSTATUS sec_desc_mod_sid(SEC_DESC *sd, DOM_SID *sid, uint32 mask)
sd 478 source3/lib/secdesc.c if (!sd || !sid)
sd 481 source3/lib/secdesc.c status = sec_ace_mod_sid(sd->dacl->aces, sd->dacl->num_aces, sid, mask);
sd 495 source3/lib/secdesc.c SEC_DESC *sd = 0;
sd 513 source3/lib/secdesc.c if (!(sd = make_sec_desc(ctx, psd[0]->revision, psd[0]->type, psd[0]->owner_sid,
sd 517 source3/lib/secdesc.c *psd = sd;
sd 518 source3/lib/secdesc.c sd = 0;
sd 691 source3/lib/secdesc.c SEC_DESC *sd = NULL;
sd 695 source3/lib/secdesc.c &sd,
sd 705 source3/lib/secdesc.c *ppsdb = make_sec_desc_buf(ctx, size, sd);
sd 1095 source3/lib/smbldap.c int sd;
sd 1097 source3/lib/smbldap.c opt_rc = ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_DESC, &sd);
sd 1098 source3/lib/smbldap.c if (opt_rc == 0 && (getpeername(sd, (struct sockaddr *) &addr, &len)) < 0 )
sd 108 source3/lib/util_seaccess.c static uint32_t access_check_max_allowed(const struct security_descriptor *sd,
sd 114 source3/lib/util_seaccess.c if (is_sid_in_token(token, sd->owner_sid)) {
sd 120 source3/lib/util_seaccess.c if (sd->dacl == NULL) {
sd 124 source3/lib/util_seaccess.c for (i = 0;i<sd->dacl->num_aces; i++) {
sd 125 source3/lib/util_seaccess.c struct security_ace *ace = &sd->dacl->aces[i];
sd 156 source3/lib/util_seaccess.c NTSTATUS se_access_check(const struct security_descriptor *sd,
sd 171 source3/lib/util_seaccess.c access_desired |= access_check_max_allowed(sd, token);
sd 195 source3/lib/util_seaccess.c if ((sd->type & SEC_DESC_DACL_PRESENT) && sd->dacl == NULL) {
sd 202 source3/lib/util_seaccess.c is_sid_in_token(token, sd->owner_sid)) {
sd 210 source3/lib/util_seaccess.c if (sd->dacl == NULL) {
sd 215 source3/lib/util_seaccess.c for (i=0; bits_remaining && i < sd->dacl->num_aces; i++) {
sd 216 source3/lib/util_seaccess.c struct security_ace *ace = &sd->dacl->aces[i];
sd 190 source3/libads/disp_sec.c void ads_disp_sd(ADS_STRUCT *ads, TALLOC_CTX *mem_ctx, SEC_DESC *sd)
sd 195 source3/libads/disp_sec.c if (!sd) {
sd 212 source3/libads/disp_sec.c sd->revision,
sd 213 source3/libads/disp_sec.c sd->type);
sd 215 source3/libads/disp_sec.c printf("owner SID: %s\n", sd->owner_sid ?
sd 216 source3/libads/disp_sec.c sid_string_talloc(mem_ctx, sd->owner_sid) : "(null)");
sd 217 source3/libads/disp_sec.c printf("group SID: %s\n", sd->group_sid ?
sd 218 source3/libads/disp_sec.c sid_string_talloc(mem_ctx, sd->group_sid) : "(null)");
sd 220 source3/libads/disp_sec.c ads_disp_acl(sd->sacl, "system");
sd 221 source3/libads/disp_sec.c if (sd->sacl) {
sd 222 source3/libads/disp_sec.c for (i = 0; i < sd->sacl->num_aces; i ++) {
sd 223 source3/libads/disp_sec.c ads_disp_ace(ads, mem_ctx, &sd->sacl->aces[i]);
sd 227 source3/libads/disp_sec.c ads_disp_acl(sd->dacl, "user");
sd 228 source3/libads/disp_sec.c if (sd->dacl) {
sd 229 source3/libads/disp_sec.c for (i = 0; i < sd->dacl->num_aces; i ++) {
sd 230 source3/libads/disp_sec.c ads_disp_ace(ads, mem_ctx, &sd->dacl->aces[i]);
sd 2695 source3/libads/ldap.c LDAPMessage *msg, const char *field, SEC_DESC **sd)
sd 2708 source3/libads/ldap.c values[0]->bv_len, sd);
sd 688 source3/libgpo/gpo_reg.c struct security_descriptor **sd,
sd 741 source3/libgpo/gpo_reg.c *sd = make_sec_desc(mem_ctx, SEC_DESC_REVISION,
sd 747 source3/libgpo/gpo_reg.c W_ERROR_HAVE_NO_MEMORY(*sd);
sd 760 source3/libgpo/gpo_reg.c struct security_descriptor *sd = NULL;
sd 769 source3/libgpo/gpo_reg.c werr = gp_reg_generate_sd(mem_ctx, sd_sid, &sd, &sd_size);
sd 772 source3/libgpo/gpo_reg.c return reg_setkeysecurity(key, sd);
sd 150 source3/libgpo/gpo_sec.c SEC_DESC *sd = gpo->security_descriptor;
sd 159 source3/libgpo/gpo_sec.c if (!sd) {
sd 163 source3/libgpo/gpo_sec.c dacl = sd->dacl;
sd 73 source3/libsmb/clisecdesc.c bool cli_set_secdesc(struct cli_state *cli, int fnum, SEC_DESC *sd)
sd 85 source3/libsmb/clisecdesc.c status = marshall_sec_desc(talloc_tos(), sd, &data, &len);
sd 94 source3/libsmb/clisecdesc.c if (sd->dacl)
sd 96 source3/libsmb/clisecdesc.c if (sd->owner_sid)
sd 98 source3/libsmb/clisecdesc.c if (sd->group_sid)
sd 734 source3/libsmb/libsmb_xattr.c SEC_DESC *sd;
sd 913 source3/libsmb/libsmb_xattr.c sd = cli_query_secdesc(targetcli, fnum, ctx);
sd 915 source3/libsmb/libsmb_xattr.c if (!sd) {
sd 929 source3/libsmb/libsmb_xattr.c sd->revision);
sd 938 source3/libsmb/libsmb_xattr.c sd->revision);
sd 943 source3/libsmb/libsmb_xattr.c sd->revision);
sd 951 source3/libsmb/libsmb_xattr.c sd->revision);
sd 967 source3/libsmb/libsmb_xattr.c if (sd->owner_sid) {
sd 971 source3/libsmb/libsmb_xattr.c sd->owner_sid);
sd 1014 source3/libsmb/libsmb_xattr.c if (sd->group_sid) {
sd 1017 source3/libsmb/libsmb_xattr.c sd->group_sid);
sd 1061 source3/libsmb/libsmb_xattr.c for (i = 0; sd->dacl && i < sd->dacl->num_aces; i++) {
sd 1063 source3/libsmb/libsmb_xattr.c SEC_ACE *ace = &sd->dacl->aces[i];
sd 1512 source3/libsmb/libsmb_xattr.c SEC_DESC *sd = NULL, *old;
sd 1536 source3/libsmb/libsmb_xattr.c sd = sec_desc_parse(ctx, ipc_cli, pol, numeric, the_acl);
sd 1538 source3/libsmb/libsmb_xattr.c if (!sd) {
sd 1547 source3/libsmb/libsmb_xattr.c if (!sd && (mode != SMBC_XATTR_MODE_REMOVE_ALL)) {
sd 1589 source3/libsmb/libsmb_xattr.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
sd 1593 source3/libsmb/libsmb_xattr.c if (sec_ace_equal(&sd->dacl->aces[i],
sd 1616 source3/libsmb/libsmb_xattr.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
sd 1620 source3/libsmb/libsmb_xattr.c if (sid_equal(&sd->dacl->aces[i].trustee,
sd 1627 source3/libsmb/libsmb_xattr.c old->dacl->aces[j] = sd->dacl->aces[i];
sd 1639 source3/libsmb/libsmb_xattr.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
sd 1640 source3/libsmb/libsmb_xattr.c add_ace(&old->dacl, &sd->dacl->aces[i], ctx);
sd 1647 source3/libsmb/libsmb_xattr.c old = sd;
sd 1654 source3/libsmb/libsmb_xattr.c owner_sid = sd->owner_sid;
sd 1658 source3/libsmb/libsmb_xattr.c group_sid = sd->group_sid;
sd 1666 source3/libsmb/libsmb_xattr.c sd = make_sec_desc(ctx, old->revision, SEC_DESC_SELF_RELATIVE,
sd 1679 source3/libsmb/libsmb_xattr.c if (!cli_set_secdesc(targetcli, fnum, sd)) {
sd 58 source3/modules/onefs.h struct security_descriptor *sd,
sd 140 source3/modules/onefs.h struct ifs_security_descriptor *sd, int snum,
sd 162 source3/modules/onefs.h struct security_descriptor *sd,
sd 369 source3/modules/onefs_acl.c onefs_canon_acl(files_struct *fsp, struct ifs_security_descriptor *sd)
sd 377 source3/modules/onefs_acl.c if (sd == NULL || sd->dacl == NULL || sd->dacl->num_aces == 0)
sd 412 source3/modules/onefs_acl.c new_aces = SMB_MALLOC_ARRAY(struct ifs_ace, sd->dacl->num_aces);
sd 420 source3/modules/onefs_acl.c for (cur = 0; cur < sd->dacl->num_aces; cur++) {
sd 421 source3/modules/onefs_acl.c if (sd->dacl->aces[cur].flags & IFS_ACE_FLAG_INHERITED_ACE)
sd 422 source3/modules/onefs_acl.c new_aces[new_aces_count++] = sd->dacl->aces[cur];
sd 425 source3/modules/onefs_acl.c for (cur = 0; cur < sd->dacl->num_aces; cur++) {
sd 426 source3/modules/onefs_acl.c if (!(sd->dacl->aces[cur].flags & IFS_ACE_FLAG_INHERITED_ACE) &&
sd 427 source3/modules/onefs_acl.c (sd->dacl->aces[cur].type == IFS_ACE_TYPE_ACCESS_DENIED))
sd 428 source3/modules/onefs_acl.c new_aces[new_aces_count++] = sd->dacl->aces[cur];
sd 431 source3/modules/onefs_acl.c for (cur = 0; cur < sd->dacl->num_aces; cur++) {
sd 432 source3/modules/onefs_acl.c if (!(sd->dacl->aces[cur].flags & IFS_ACE_FLAG_INHERITED_ACE) &&
sd 433 source3/modules/onefs_acl.c !(sd->dacl->aces[cur].type == IFS_ACE_TYPE_ACCESS_DENIED))
sd 434 source3/modules/onefs_acl.c new_aces[new_aces_count++] = sd->dacl->aces[cur];
sd 437 source3/modules/onefs_acl.c SMB_ASSERT(new_aces_count == sd->dacl->num_aces);
sd 449 source3/modules/onefs_acl.c memcpy(sd->dacl->aces, new_aces,
sd 529 source3/modules/onefs_acl.c static bool add_sfs_aces(files_struct *fsp, struct ifs_security_descriptor *sd)
sd 567 source3/modules/onefs_acl.c old_aces = sd->dacl->aces;
sd 569 source3/modules/onefs_acl.c sd->dacl->aces = SMB_MALLOC_ARRAY(struct ifs_ace,
sd 570 source3/modules/onefs_acl.c sd->dacl->num_aces + num_aces_to_add);
sd 571 source3/modules/onefs_acl.c if (!sd->dacl->aces) {
sd 574 source3/modules/onefs_acl.c sd->dacl->num_aces + num_aces_to_add));
sd 577 source3/modules/onefs_acl.c memcpy(sd->dacl->aces, old_aces,
sd 578 source3/modules/onefs_acl.c sizeof(struct ifs_ace) * sd->dacl->num_aces);
sd 583 source3/modules/onefs_acl.c sd->dacl->aces[sd->dacl->num_aces] =
sd 585 source3/modules/onefs_acl.c sd->dacl->num_aces++;
sd 607 source3/modules/onefs_acl.c struct ifs_security_descriptor *sd = NULL;
sd 658 source3/modules/onefs_acl.c sd = SMB_REALLOC(sd, sd_size);
sd 659 source3/modules/onefs_acl.c if (!sd) {
sd 670 source3/modules/onefs_acl.c sd_size, &sd_size, sd);
sd 685 source3/modules/onefs_acl.c sd->dacl) {
sd 686 source3/modules/onefs_acl.c if(!(new_aces_alloced = add_sfs_aces(fsp, sd)))
sd 690 source3/modules/onefs_acl.c if (!(onefs_canon_acl(fsp, sd))) {
sd 704 source3/modules/onefs_acl.c if (!onefs_identity_to_sid(sd->owner, &owner_sid)) {
sd 714 source3/modules/onefs_acl.c if (!onefs_identity_to_sid(sd->group, &group_sid)) {
sd 724 source3/modules/onefs_acl.c if (!onefs_acl_to_samba_acl(sd->dacl, &dacl)) {
sd 732 source3/modules/onefs_acl.c if (!onefs_acl_to_samba_acl(sd->sacl, &sacl)) {
sd 741 source3/modules/onefs_acl.c sd->control &= ~(IFS_SD_CTRL_DACL_AUTO_INHERIT_REQ |
sd 744 source3/modules/onefs_acl.c pdesc = make_sec_desc(talloc_tos(), sd->revision, sd->control,
sd 761 source3/modules/onefs_acl.c if (alloced && sd) {
sd 762 source3/modules/onefs_acl.c if (new_aces_alloced && sd->dacl->aces)
sd 763 source3/modules/onefs_acl.c SAFE_FREE(sd->dacl->aces);
sd 765 source3/modules/onefs_acl.c SAFE_FREE(sd);
sd 814 source3/modules/onefs_acl.c struct ifs_security_descriptor *sd, int snum,
sd 881 source3/modules/onefs_acl.c if (aclu_initialize_sd(sd, psd->type, ownerp, groupp,
sd 901 source3/modules/onefs_acl.c struct ifs_security_descriptor sd = {};
sd 911 source3/modules/onefs_acl.c status = onefs_samba_sd_to_sd(sec_info_sent, psd, &sd,
sd 945 source3/modules/onefs_acl.c if (ifs_set_security_descriptor(fd, sec_info_effective, &sd)) {
sd 962 source3/modules/onefs_acl.c aclu_free_sd(&sd, false);
sd 57 source3/modules/onefs_open.c struct security_descriptor *sd,
sd 84 source3/modules/onefs_open.c struct security_descriptor *sd,
sd 220 source3/modules/onefs_open.c sd,
sd 438 source3/modules/onefs_open.c struct security_descriptor *sd,
sd 899 source3/modules/onefs_open.c sd,
sd 1339 source3/modules/onefs_open.c struct security_descriptor *sd,
sd 1453 source3/modules/onefs_open.c sd,
sd 1639 source3/modules/onefs_open.c struct security_descriptor *sd,
sd 1663 source3/modules/onefs_open.c ea_list, sd, fname));
sd 1782 source3/modules/onefs_open.c if (sd != NULL) {
sd 1783 source3/modules/onefs_open.c security_acl_map_generic(sd->dacl, &file_generic_mapping);
sd 1784 source3/modules/onefs_open.c security_acl_map_generic(sd->sacl, &file_generic_mapping);
sd 1820 source3/modules/onefs_open.c sd, /* sd */
sd 1853 source3/modules/onefs_open.c sd, /* sd */
sd 1894 source3/modules/onefs_open.c sd, /* sd */
sd 2002 source3/modules/onefs_open.c struct security_descriptor *sd,
sd 2029 source3/modules/onefs_open.c ea_list, sd, create_file_flags, fname));
sd 2110 source3/modules/onefs_open.c sd, /* sd */
sd 89 source3/modules/onefs_system.c struct security_descriptor *sd,
sd 105 source3/modules/onefs_system.c if (sd != NULL) {
sd 109 source3/modules/onefs_system.c sec_info_sent = (get_sec_info(sd) & IFS_SEC_INFO_KNOWN_MASK);
sd 111 source3/modules/onefs_system.c status = onefs_samba_sd_to_sd(sec_info_sent, sd, &ifs_sd,
sd 177 source3/modules/onefs_system.c sec_info_effective, sd,
sd 159 source3/modules/vfs_acl_tdb.c *ppdesc = make_sec_desc(ctx, SEC_DESC_REVISION, xacl.info.sd_hs->sd->type | SEC_DESC_SELF_RELATIVE,
sd 161 source3/modules/vfs_acl_tdb.c ? xacl.info.sd_hs->sd->owner_sid : NULL,
sd 163 source3/modules/vfs_acl_tdb.c ? xacl.info.sd_hs->sd->group_sid : NULL,
sd 165 source3/modules/vfs_acl_tdb.c ? xacl.info.sd_hs->sd->sacl : NULL,
sd 167 source3/modules/vfs_acl_tdb.c ? xacl.info.sd_hs->sd->dacl : NULL,
sd 170 source3/modules/vfs_acl_tdb.c TALLOC_FREE(xacl.info.sd);
sd 249 source3/modules/vfs_acl_tdb.c xacl.info.sd_hs->sd = CONST_DISCARD(struct security_descriptor *, psd);
sd 56 source3/modules/vfs_acl_xattr.c *ppdesc = make_sec_desc(ctx, SEC_DESC_REVISION, xacl.info.sd_hs->sd->type | SEC_DESC_SELF_RELATIVE,
sd 58 source3/modules/vfs_acl_xattr.c ? xacl.info.sd_hs->sd->owner_sid : NULL,
sd 60 source3/modules/vfs_acl_xattr.c ? xacl.info.sd_hs->sd->group_sid : NULL,
sd 62 source3/modules/vfs_acl_xattr.c ? xacl.info.sd_hs->sd->sacl : NULL,
sd 64 source3/modules/vfs_acl_xattr.c ? xacl.info.sd_hs->sd->dacl : NULL,
sd 67 source3/modules/vfs_acl_xattr.c TALLOC_FREE(xacl.info.sd);
sd 146 source3/modules/vfs_acl_xattr.c xacl.info.sd_hs->sd = CONST_DISCARD(struct security_descriptor *, psd);
sd 289 source3/modules/vfs_default.c struct security_descriptor *sd,
sd 299 source3/modules/vfs_default.c allocation_size, sd, ea_list, result, pinfo,
sd 127 source3/modules/vfs_full_audit.c struct security_descriptor *sd,
sd 1204 source3/modules/vfs_full_audit.c struct security_descriptor *sd,
sd 1225 source3/modules/vfs_full_audit.c sd, /* sd */
sd 217 source3/modules/vfs_onefs_shadow_copy.c struct security_descriptor *sd,
sd 227 source3/modules/vfs_onefs_shadow_copy.c oplock_request, allocation_size, sd, ea_list, result,
sd 363 source3/printing/nt_printing.c sec = sd_orig->sd;
sd 412 source3/printing/nt_printing.c sd_size = ndr_size_security_descriptor(sd_store->sd, NULL, 0)
sd 5312 source3/printing/nt_printing.c if (!secdesc_ctr->sd->owner_sid || !secdesc_ctr->sd->group_sid) {
sd 5325 source3/printing/nt_printing.c owner_sid = secdesc_ctr->sd->owner_sid ?
sd 5326 source3/printing/nt_printing.c secdesc_ctr->sd->owner_sid :
sd 5327 source3/printing/nt_printing.c old_secdesc_ctr->sd->owner_sid;
sd 5329 source3/printing/nt_printing.c group_sid = secdesc_ctr->sd->group_sid ?
sd 5330 source3/printing/nt_printing.c secdesc_ctr->sd->group_sid :
sd 5331 source3/printing/nt_printing.c old_secdesc_ctr->sd->group_sid;
sd 5333 source3/printing/nt_printing.c dacl = secdesc_ctr->sd->dacl ?
sd 5334 source3/printing/nt_printing.c secdesc_ctr->sd->dacl :
sd 5335 source3/printing/nt_printing.c old_secdesc_ctr->sd->dacl;
sd 5337 source3/printing/nt_printing.c sacl = secdesc_ctr->sd->sacl ?
sd 5338 source3/printing/nt_printing.c secdesc_ctr->sd->sacl :
sd 5339 source3/printing/nt_printing.c old_secdesc_ctr->sd->sacl;
sd 5343 source3/printing/nt_printing.c psd = make_sec_desc(mem_ctx, secdesc_ctr->sd->revision, secdesc_ctr->sd->type,
sd 5526 source3/printing/nt_printing.c if (sid_equal((*secdesc_ctr)->sd->owner_sid, &global_sid_World)) {
sd 5540 source3/printing/nt_printing.c psd = make_sec_desc(ctx, (*secdesc_ctr)->sd->revision, (*secdesc_ctr)->sd->type,
sd 5542 source3/printing/nt_printing.c (*secdesc_ctr)->sd->group_sid,
sd 5543 source3/printing/nt_printing.c (*secdesc_ctr)->sd->sacl,
sd 5544 source3/printing/nt_printing.c (*secdesc_ctr)->sd->dacl,
sd 5567 source3/printing/nt_printing.c SEC_ACL *the_acl = (*secdesc_ctr)->sd->dacl;
sd 5624 source3/printing/nt_printing.c void map_printer_permissions(SEC_DESC *sd)
sd 5628 source3/printing/nt_printing.c for (i = 0; sd->dacl && i < sd->dacl->num_aces; i++) {
sd 5629 source3/printing/nt_printing.c se_map_generic(&sd->dacl->aces[i].access_mask,
sd 5634 source3/printing/nt_printing.c void map_job_permissions(SEC_DESC *sd)
sd 5638 source3/printing/nt_printing.c for (i = 0; sd->dacl && i < sd->dacl->num_aces; i++) {
sd 5639 source3/printing/nt_printing.c se_map_generic(&sd->dacl->aces[i].access_mask,
sd 5716 source3/printing/nt_printing.c status = se_create_child_secdesc_buf(mem_ctx, &secdesc, parent_secdesc->sd, False);
sd 5724 source3/printing/nt_printing.c map_job_permissions(secdesc->sd);
sd 5726 source3/printing/nt_printing.c map_printer_permissions(secdesc->sd);
sd 5730 source3/printing/nt_printing.c status = se_access_check(secdesc->sd, server_info->ptok, access_type,
sd 458 source3/registry/reg_backend_printing.c info2->secdesc_buf->sd &&
sd 464 source3/registry/reg_backend_printing.c status = marshall_sec_desc(values, info2->secdesc_buf->sd,
sd 41 source3/registry/reg_dispatcher.c SEC_DESC *sd;
sd 67 source3/registry/reg_dispatcher.c sd = make_sec_desc(ctx, SEC_DESC_REVISION, SEC_DESC_SELF_RELATIVE,
sd 71 source3/registry/reg_dispatcher.c if (sd == NULL) {
sd 75 source3/registry/reg_dispatcher.c *psd = sd;
sd 956 source3/registry/regfio.c static REGF_SK_REC* find_sk_record_by_sec_desc( REGF_FILE *file, SEC_DESC *sd )
sd 961 source3/registry/regfio.c if ( sec_desc_equal( p->sec_desc, sd ) )
sd 1570 source3/registry/regfio.c static uint32 sk_record_data_size( SEC_DESC * sd )
sd 1578 source3/registry/regfio.c size = sizeof(uint32)*5 + ndr_size_security_descriptor(sd, NULL, 0) + sizeof(uint32);
sd 290 source3/rpc_server/srv_lsa_nt.c static NTSTATUS make_lsa_object_sd(TALLOC_CTX *mem_ctx, SEC_DESC **sd, size_t *sd_size,
sd 328 source3/rpc_server/srv_lsa_nt.c if((*sd = make_sec_desc(mem_ctx, SECURITY_DESCRIPTOR_REVISION_1,
sd 790 source3/rpc_server/srv_samr_nt.c dacl = r->in.sdbuf->sd->dacl;
sd 665 source3/rpc_server/srv_spoolss_nt.c _data->data.sd.sd = dup_sec_desc(mem_ctx, _sd); \
sd 666 source3/rpc_server/srv_spoolss_nt.c if (!_data->data.sd.sd) { \
sd 667 source3/rpc_server/srv_spoolss_nt.c _data->data.sd.sd_size = 0; \
sd 669 source3/rpc_server/srv_spoolss_nt.c _data->data.sd.sd_size = _size;
sd 3012 source3/rpc_server/srv_spoolss_nt.c printer->info_2->secdesc_buf->sd);
sd 3987 source3/rpc_server/srv_spoolss_nt.c ntprinter->info_2->secdesc_buf->sd);
sd 4214 source3/rpc_server/srv_spoolss_nt.c r->secdesc = dup_sec_desc(mem_ctx, ntprinter->info_2->secdesc_buf->sd);
sd 5824 source3/rpc_server/srv_spoolss_nt.c the_acl = old_secdesc_ctr->sd->dacl;
sd 5834 source3/rpc_server/srv_spoolss_nt.c the_acl = secdesc_ctr->sd->dacl;
sd 5856 source3/rpc_server/srv_spoolss_nt.c if (sec_desc_equal(new_secdesc_ctr->sd, old_secdesc_ctr->sd)) {
sd 6315 source3/rpc_server/srv_spoolss_nt.c if (r->in.secdesc_ctr->sd)
sd 7606 source3/rpc_server/srv_spoolss_nt.c r->in.secdesc_ctr->sd,
sd 374 source3/rpc_server/srv_srvsvc_nt.c SEC_DESC *sd = NULL;
sd 396 source3/rpc_server/srv_srvsvc_nt.c sd = get_share_security(ctx, lp_servicename(snum), &sd_size);
sd 398 source3/rpc_server/srv_srvsvc_nt.c sd_buf = make_sec_desc_buf(p->mem_ctx, sd_size, sd);
sd 472 source3/rpc_server/srv_srvsvc_nt.c SEC_DESC *sd;
sd 476 source3/rpc_server/srv_srvsvc_nt.c sd = get_share_security(ctx, lp_servicename(snum), &sd_size);
sd 478 source3/rpc_server/srv_srvsvc_nt.c r = make_sec_desc_buf(p->mem_ctx, sd_size, sd);
sd 1571 source3/rpc_server/srv_srvsvc_nt.c psd = info->info502->sd_buf.sd;
sd 1598 source3/rpc_server/srv_srvsvc_nt.c psd = info->info1501->sd;
sd 1770 source3/rpc_server/srv_srvsvc_nt.c psd = r->in.info->info502->sd_buf.sd;
sd 2131 source3/rpc_server/srv_srvsvc_nt.c sd_buf->sd = psd;
sd 2225 source3/rpc_server/srv_srvsvc_nt.c psd = r->in.sd_buf->sd;
sd 139 source3/rpc_server/srv_svcctl_nt.c SEC_DESC *sd;
sd 159 source3/rpc_server/srv_svcctl_nt.c if ( !(sd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1,
sd 164 source3/rpc_server/srv_svcctl_nt.c return sd;
sd 837 source3/rpc_server/srv_winreg_nt.c if (len > r->out.sd->size) {
sd 838 source3/rpc_server/srv_winreg_nt.c r->out.sd->size = len;
sd 842 source3/rpc_server/srv_winreg_nt.c r->out.sd->size = len;
sd 843 source3/rpc_server/srv_winreg_nt.c r->out.sd->len = len;
sd 844 source3/rpc_server/srv_winreg_nt.c r->out.sd->data = data;
sd 866 source3/rpc_server/srv_winreg_nt.c err = ntstatus_to_werror(unmarshall_sec_desc(p->mem_ctx, r->in.sd->data,
sd 867 source3/rpc_server/srv_winreg_nt.c r->in.sd->len, &secdesc));
sd 942 source3/rpcclient/cmd_lsarpc.c display_sec_desc(sdb->sd);
sd 2216 source3/rpcclient/cmd_samr.c display_sec_desc(sec_desc_buf->sd);
sd 241 source3/rpcclient/cmd_srvsvc.c if (r->sd_buf.sd)
sd 242 source3/rpcclient/cmd_srvsvc.c display_sec_desc(r->sd_buf.sd);
sd 639 source3/rpcclient/cmd_srvsvc.c display_sec_desc(sd_buf->sd);
sd 93 source3/services/services_db.c SEC_DESC *sd = NULL;
sd 115 source3/services/services_db.c if ( !(sd = make_sec_desc(ctx, SECURITY_DESCRIPTOR_REVISION_1,
sd 120 source3/services/services_db.c return sd;
sd 343 source3/services/services_db.c SEC_DESC *sd = NULL;
sd 417 source3/services/services_db.c if ( !(sd = construct_service_sd(key_secdesc)) ) {
sd 423 source3/services/services_db.c status = marshall_sec_desc(key_secdesc, sd, &sd_blob.data,
sd 855 source3/smbd/nttrans.c struct security_descriptor *sd = NULL;
sd 936 source3/smbd/nttrans.c &sd);
sd 999 source3/smbd/nttrans.c sd, /* sd */
sd 42 source3/smbd/open.c struct security_descriptor *sd,
sd 53 source3/smbd/open.c NTSTATUS smb1_file_se_access_check(const struct security_descriptor *sd,
sd 58 source3/smbd/open.c return se_access_check(sd,
sd 75 source3/smbd/open.c struct security_descriptor *sd;
sd 91 source3/smbd/open.c DACL_SECURITY_INFORMATION),&sd);
sd 101 source3/smbd/open.c status = smb1_file_se_access_check(sd,
sd 106 source3/smbd/open.c TALLOC_FREE(sd);
sd 1357 source3/smbd/open.c struct security_descriptor *sd;
sd 1363 source3/smbd/open.c DACL_SECURITY_INFORMATION),&sd);
sd 1373 source3/smbd/open.c status = smb1_file_se_access_check(sd,
sd 1378 source3/smbd/open.c TALLOC_FREE(sd);
sd 2872 source3/smbd/open.c struct security_descriptor *sd,
sd 2896 source3/smbd/open.c ea_list, sd, fname));
sd 2974 source3/smbd/open.c sd && (sd->sacl != NULL)) {
sd 3138 source3/smbd/open.c if ((sd != NULL) && (info == FILE_WAS_CREATED)
sd 3144 source3/smbd/open.c sec_info_sent = get_sec_info(sd);
sd 3149 source3/smbd/open.c security_acl_map_generic(sd->dacl, &file_generic_mapping);
sd 3150 source3/smbd/open.c security_acl_map_generic(sd->sacl, &file_generic_mapping);
sd 3156 source3/smbd/open.c status = SMB_VFS_FSET_NT_ACL(fsp, sec_info_sent, sd);
sd 3340 source3/smbd/open.c struct security_descriptor *sd,
sd 3366 source3/smbd/open.c ea_list, sd, create_file_flags, fname));
sd 3488 source3/smbd/open.c oplock_request, allocation_size, sd, ea_list,
sd 3571 source3/utils/net_rpc.c display_sec_desc(info502.sd_buf.sd);
sd 4276 source3/utils/net_rpc.c share_sd = info.info502->sd_buf.sd;
sd 153 source3/utils/net_rpc_printer.c SEC_DESC *sd = NULL;
sd 178 source3/utils/net_rpc_printer.c sd = cli_query_secdesc(cli_share_src, fnum_src, mem_ctx);
sd 179 source3/utils/net_rpc_printer.c if (!sd) {
sd 187 source3/utils/net_rpc_printer.c display_sec_desc(sd);
sd 228 source3/utils/net_rpc_printer.c if (!cli_set_secdesc(cli_share_dst, fnum_dst, sd)) {
sd 339 source3/utils/net_rpc_registry.c struct KeySecurityData *sd)
sd 342 source3/utils/net_rpc_registry.c sec_info, sd, NULL);
sd 1145 source3/utils/net_rpc_registry.c struct KeySecurityData *sd = NULL;
sd 1168 source3/utils/net_rpc_registry.c sd = TALLOC_ZERO_P(mem_ctx, struct KeySecurityData);
sd 1169 source3/utils/net_rpc_registry.c if (!sd) {
sd 1174 source3/utils/net_rpc_registry.c sd->size = 0x1000;
sd 1182 source3/utils/net_rpc_registry.c status = registry_getsd(mem_ctx, pipe_hnd, &pol_key, sec_info, sd);
sd 1189 source3/utils/net_rpc_registry.c blob.data = sd->data;
sd 1190 source3/utils/net_rpc_registry.c blob.length = sd->size;
sd 58 source3/utils/profiles.c static bool swap_sid_in_acl( SEC_DESC *sd, DOM_SID *s1, DOM_SID *s2 )
sd 64 source3/utils/profiles.c verbose_output(" Owner SID: %s\n", sid_string_tos(sd->owner_sid));
sd 65 source3/utils/profiles.c if ( sid_equal( sd->owner_sid, s1 ) ) {
sd 66 source3/utils/profiles.c sid_copy( sd->owner_sid, s2 );
sd 69 source3/utils/profiles.c sid_string_tos(sd->owner_sid));
sd 73 source3/utils/profiles.c verbose_output(" Group SID: %s\n", sid_string_tos(sd->group_sid));
sd 74 source3/utils/profiles.c if ( sid_equal( sd->group_sid, s1 ) ) {
sd 75 source3/utils/profiles.c sid_copy( sd->group_sid, s2 );
sd 78 source3/utils/profiles.c sid_string_tos(sd->group_sid));
sd 81 source3/utils/profiles.c theacl = sd->dacl;
sd 95 source3/utils/profiles.c theacl = sd->sacl;
sd 127 source3/utils/sharesec.c static void sec_desc_print(FILE *f, SEC_DESC *sd)
sd 131 source3/utils/sharesec.c fprintf(f, "REVISION:%d\n", sd->revision);
sd 135 source3/utils/sharesec.c fprintf(f, "OWNER:%s\n", sid_string_tos(sd->owner_sid));
sd 137 source3/utils/sharesec.c fprintf(f, "GROUP:%s\n", sid_string_tos(sd->group_sid));
sd 140 source3/utils/sharesec.c for (i = 0; sd->dacl && i < sd->dacl->num_aces; i++) {
sd 141 source3/utils/sharesec.c SEC_ACE *ace = &sd->dacl->aces[i];
sd 299 source3/utils/sharesec.c SEC_DESC *sd = NULL;
sd 332 source3/utils/sharesec.c sd = make_sec_desc( mem_ctx, SEC_DESC_REVISION, SEC_DESC_SELF_RELATIVE,
sd 335 source3/utils/sharesec.c return sd;
sd 409 source3/utils/sharesec.c SEC_DESC *sd = NULL;
sd 423 source3/utils/sharesec.c !(sd = parse_acl_string(mem_ctx, the_acl, &sd_size )) ) {
sd 433 source3/utils/sharesec.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
sd 437 source3/utils/sharesec.c if (sec_ace_equal(&sd->dacl->aces[i], &old->dacl->aces[j])) {
sd 450 source3/utils/sharesec.c print_ace(stdout, &sd->dacl->aces[i]);
sd 456 source3/utils/sharesec.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
sd 460 source3/utils/sharesec.c if (sid_equal(&sd->dacl->aces[i].trustee,
sd 462 source3/utils/sharesec.c old->dacl->aces[j] = sd->dacl->aces[i];
sd 469 source3/utils/sharesec.c sid_string_tos(&sd->dacl->aces[i].trustee));
sd 473 source3/utils/sharesec.c if (sd->owner_sid) {
sd 474 source3/utils/sharesec.c old->owner_sid = sd->owner_sid;
sd 477 source3/utils/sharesec.c if (sd->group_sid) {
sd 478 source3/utils/sharesec.c old->group_sid = sd->group_sid;
sd 482 source3/utils/sharesec.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
sd 483 source3/utils/sharesec.c add_ace(mem_ctx, &old->dacl, &sd->dacl->aces[i]);
sd 487 source3/utils/sharesec.c old = sd;
sd 621 source3/utils/smbcacls.c static void sec_desc_print(struct cli_state *cli, FILE *f, SEC_DESC *sd)
sd 626 source3/utils/smbcacls.c fprintf(f, "REVISION:%d\n", sd->revision);
sd 627 source3/utils/smbcacls.c fprintf(f, "CONTROL:0x%x\n", sd->type);
sd 631 source3/utils/smbcacls.c if (sd->owner_sid) {
sd 632 source3/utils/smbcacls.c SidToString(cli, sidstr, sd->owner_sid);
sd 639 source3/utils/smbcacls.c if (sd->group_sid) {
sd 640 source3/utils/smbcacls.c SidToString(cli, sidstr, sd->group_sid);
sd 648 source3/utils/smbcacls.c for (i = 0; sd->dacl && i < sd->dacl->num_aces; i++) {
sd 649 source3/utils/smbcacls.c SEC_ACE *ace = &sd->dacl->aces[i];
sd 664 source3/utils/smbcacls.c SEC_DESC *sd;
sd 676 source3/utils/smbcacls.c sd = cli_query_secdesc(cli, fnum, talloc_tos());
sd 678 source3/utils/smbcacls.c if (!sd) {
sd 683 source3/utils/smbcacls.c sec_desc_print(cli, stdout, sd);
sd 704 source3/utils/smbcacls.c SEC_DESC *sd, *old;
sd 726 source3/utils/smbcacls.c sd = make_sec_desc(talloc_tos(),old->revision, old->type,
sd 738 source3/utils/smbcacls.c if (!cli_set_secdesc(cli, fnum, sd)) {
sd 819 source3/utils/smbcacls.c SEC_DESC *sd, *old;
sd 824 source3/utils/smbcacls.c sd = sec_desc_parse(talloc_tos(), cli, the_acl);
sd 826 source3/utils/smbcacls.c if (!sd) return EXIT_PARSE_ERROR;
sd 851 source3/utils/smbcacls.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
sd 855 source3/utils/smbcacls.c if (sec_ace_equal(&sd->dacl->aces[i],
sd 869 source3/utils/smbcacls.c print_ace(cli, stdout, &sd->dacl->aces[i]);
sd 876 source3/utils/smbcacls.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
sd 880 source3/utils/smbcacls.c if (sid_equal(&sd->dacl->aces[i].trustee,
sd 882 source3/utils/smbcacls.c old->dacl->aces[j] = sd->dacl->aces[i];
sd 891 source3/utils/smbcacls.c &sd->dacl->aces[i].trustee);
sd 896 source3/utils/smbcacls.c if (sd->owner_sid) {
sd 897 source3/utils/smbcacls.c old->owner_sid = sd->owner_sid;
sd 900 source3/utils/smbcacls.c if (sd->group_sid) {
sd 901 source3/utils/smbcacls.c old->group_sid = sd->group_sid;
sd 907 source3/utils/smbcacls.c for (i=0;sd->dacl && i<sd->dacl->num_aces;i++) {
sd 908 source3/utils/smbcacls.c add_ace(&old->dacl, &sd->dacl->aces[i]);
sd 913 source3/utils/smbcacls.c old = sd;
sd 929 source3/utils/smbcacls.c sd = make_sec_desc(talloc_tos(),old->revision, old->type,
sd 940 source3/utils/smbcacls.c if (!cli_set_secdesc(cli, fnum, sd)) {
sd 1953 source4/client/client.c NDR_PRINT_DEBUG(security_descriptor, query.query_secdesc.out.sd);
sd 992 source4/dsdb/common/util.c struct security_descriptor *sd;
sd 994 source4/dsdb/common/util.c sd = security_descriptor_initialise(mem_ctx);
sd 996 source4/dsdb/common/util.c return sd;
sd 241 source4/dsdb/samdb/ldb_modules/objectclass.c struct security_descriptor *sd;
sd 248 source4/dsdb/samdb/ldb_modules/objectclass.c sd = sddl_decode(mem_ctx,
sd 252 source4/dsdb/samdb/ldb_modules/objectclass.c if (!sd || !session_info || !session_info->security_token) {
sd 256 source4/dsdb/samdb/ldb_modules/objectclass.c sd->owner_sid = session_info->security_token->user_sid;
sd 257 source4/dsdb/samdb/ldb_modules/objectclass.c sd->group_sid = session_info->security_token->group_sid;
sd 266 source4/dsdb/samdb/ldb_modules/objectclass.c sd,
sd 589 source4/dsdb/samdb/ldb_modules/objectclass.c DATA_BLOB *sd = get_sd(ac->module, mem_ctx, current->objectclass);
sd 590 source4/dsdb/samdb/ldb_modules/objectclass.c if (sd) {
sd 591 source4/dsdb/samdb/ldb_modules/objectclass.c ldb_msg_add_steal_value(msg, "nTSecurityDescriptor", sd);
sd 702 source4/heimdal/lib/hx509/cms.c any_to_certs(hx509_context context, const SignedData *sd, hx509_certs certs)
sd 706 source4/heimdal/lib/hx509/cms.c if (sd->certificates == NULL)
sd 709 source4/heimdal/lib/hx509/cms.c for (i = 0; i < sd->certificates->len; i++) {
sd 713 source4/heimdal/lib/hx509/cms.c sd->certificates->val[i].data,
sd 714 source4/heimdal/lib/hx509/cms.c sd->certificates->val[i].length,
sd 769 source4/heimdal/lib/hx509/cms.c SignedData sd;
sd 779 source4/heimdal/lib/hx509/cms.c memset(&sd, 0, sizeof(sd));
sd 781 source4/heimdal/lib/hx509/cms.c ret = decode_SignedData(data, length, &sd, &size);
sd 788 source4/heimdal/lib/hx509/cms.c if (sd.encapContentInfo.eContent == NULL && signedContent == NULL) {
sd 794 source4/heimdal/lib/hx509/cms.c if (sd.encapContentInfo.eContent && signedContent) {
sd 800 source4/heimdal/lib/hx509/cms.c if (sd.encapContentInfo.eContent)
sd 801 source4/heimdal/lib/hx509/cms.c signedContent = sd.encapContentInfo.eContent;
sd 815 source4/heimdal/lib/hx509/cms.c ret = any_to_certs(context, &sd, certs);
sd 825 source4/heimdal/lib/hx509/cms.c for (found_valid_sig = 0, i = 0; i < sd.signerInfos.len; i++) {
sd 830 source4/heimdal/lib/hx509/cms.c signer_info = &sd.signerInfos.val[i];
sd 954 source4/heimdal/lib/hx509/cms.c if (der_heim_oid_cmp(match_oid, &sd.encapContentInfo.eContentType)) {
sd 1004 source4/heimdal/lib/hx509/cms.c ret = der_copy_oid(&sd.encapContentInfo.eContentType, contentType);
sd 1020 source4/heimdal/lib/hx509/cms.c free_SignedData(&sd);
sd 1104 source4/heimdal/lib/hx509/cms.c SignedData sd;
sd 1110 source4/heimdal/lib/hx509/cms.c memset(&sd, 0, sizeof(sd));
sd 1138 source4/heimdal/lib/hx509/cms.c sd.version = CMSVersion_v3;
sd 1143 source4/heimdal/lib/hx509/cms.c der_copy_oid(eContentType, &sd.encapContentInfo.eContentType);
sd 1147 source4/heimdal/lib/hx509/cms.c ALLOC(sd.encapContentInfo.eContent, 1);
sd 1148 source4/heimdal/lib/hx509/cms.c if (sd.encapContentInfo.eContent == NULL) {
sd 1154 source4/heimdal/lib/hx509/cms.c sd.encapContentInfo.eContent->data = malloc(length);
sd 1155 source4/heimdal/lib/hx509/cms.c if (sd.encapContentInfo.eContent->data == NULL) {
sd 1160 source4/heimdal/lib/hx509/cms.c memcpy(sd.encapContentInfo.eContent->data, data, length);
sd 1161 source4/heimdal/lib/hx509/cms.c sd.encapContentInfo.eContent->length = length;
sd 1164 source4/heimdal/lib/hx509/cms.c ALLOC_SEQ(&sd.signerInfos, 1);
sd 1165 source4/heimdal/lib/hx509/cms.c if (sd.signerInfos.val == NULL) {
sd 1171 source4/heimdal/lib/hx509/cms.c signer_info = &sd.signerInfos.val[0];
sd 1299 source4/heimdal/lib/hx509/cms.c ALLOC_SEQ(&sd.digestAlgorithms, 1);
sd 1300 source4/heimdal/lib/hx509/cms.c if (sd.digestAlgorithms.val == NULL) {
sd 1306 source4/heimdal/lib/hx509/cms.c ret = copy_AlgorithmIdentifier(&digest, &sd.digestAlgorithms.val[0]);
sd 1331 source4/heimdal/lib/hx509/cms.c ALLOC(sd.certificates, 1);
sd 1332 source4/heimdal/lib/hx509/cms.c if (sd.certificates == NULL) {
sd 1337 source4/heimdal/lib/hx509/cms.c ALLOC_SEQ(sd.certificates, path.len);
sd 1338 source4/heimdal/lib/hx509/cms.c if (sd.certificates->val == NULL) {
sd 1346 source4/heimdal/lib/hx509/cms.c &sd.certificates->val[i]);
sd 1356 source4/heimdal/lib/hx509/cms.c &sd, &size, ret);
sd 1369 source4/heimdal/lib/hx509/cms.c free_SignedData(&sd);
sd 189 source4/heimdal/lib/krb5/log.c struct _heimdal_syslog_data *sd = malloc(sizeof(*sd));
sd 192 source4/heimdal/lib/krb5/log.c if(sd == NULL) {
sd 200 source4/heimdal/lib/krb5/log.c sd->priority = i;
sd 204 source4/heimdal/lib/krb5/log.c sd->priority |= i;
sd 207 source4/heimdal/lib/krb5/log.c log_syslog, close_syslog, sd);
sd 314 source4/lib/ldb-samba/ldif_handlers.c struct security_descriptor *sd;
sd 317 source4/lib/ldb-samba/ldif_handlers.c sd = sddl_decode(mem_ctx, (const char *)in->data, NULL);
sd 318 source4/lib/ldb-samba/ldif_handlers.c if (sd == NULL) {
sd 321 source4/lib/ldb-samba/ldif_handlers.c ndr_err = ndr_push_struct_blob(out, mem_ctx, NULL, sd,
sd 323 source4/lib/ldb-samba/ldif_handlers.c talloc_free(sd);
sd 336 source4/lib/ldb-samba/ldif_handlers.c struct security_descriptor *sd;
sd 339 source4/lib/ldb-samba/ldif_handlers.c sd = talloc(mem_ctx, struct security_descriptor);
sd 340 source4/lib/ldb-samba/ldif_handlers.c if (sd == NULL) {
sd 344 source4/lib/ldb-samba/ldif_handlers.c ndr_err = ndr_pull_struct_blob(in, sd, NULL, sd,
sd 347 source4/lib/ldb-samba/ldif_handlers.c talloc_free(sd);
sd 350 source4/lib/ldb-samba/ldif_handlers.c out->data = (uint8_t *)sddl_encode(mem_ctx, sd, NULL);
sd 351 source4/lib/ldb-samba/ldif_handlers.c talloc_free(sd);
sd 475 source4/lib/registry/ldb.c struct security_descriptor *sd,
sd 1183 source4/lib/registry/regf.c struct security_descriptor **sd)
sd 1202 source4/lib/registry/regf.c *sd = talloc(ctx, struct security_descriptor);
sd 1203 source4/lib/registry/regf.c W_ERROR_HAVE_NO_MEMORY(*sd);
sd 1207 source4/lib/registry/regf.c if (!NDR_ERR_CODE_IS_SUCCESS(ndr_pull_struct_blob(&data, ctx, NULL, *sd,
sd 1923 source4/lib/registry/regf.c struct security_descriptor *sd;
sd 1988 source4/lib/registry/regf.c sd = security_descriptor_dacl_create(regf,
sd 1999 source4/lib/registry/regf.c sd, (ndr_push_flags_fn_t)ndr_push_security_descriptor))) {
sd 884 source4/libcli/raw/interfaces.h struct security_descriptor *sd;
sd 1125 source4/libcli/raw/interfaces.h struct security_descriptor *sd;
sd 85 source4/libcli/raw/rawacl.c io->query_secdesc.out.sd = talloc(mem_ctx, struct security_descriptor);
sd 86 source4/libcli/raw/rawacl.c if (!io->query_secdesc.out.sd) {
sd 90 source4/libcli/raw/rawacl.c io->query_secdesc.out.sd);
sd 141 source4/libcli/raw/rawacl.c ndr_err = ndr_push_security_descriptor(ndr, NDR_SCALARS|NDR_BUFFERS, io->set_secdesc.in.sd);
sd 253 source4/libcli/raw/rawfileinfo.c parms->query_secdesc.out.sd = talloc(mem_ctx, struct security_descriptor);
sd 254 source4/libcli/raw/rawfileinfo.c NT_STATUS_HAVE_NO_MEMORY(parms->query_secdesc.out.sd);
sd 257 source4/libcli/raw/rawfileinfo.c parms->query_secdesc.out.sd,
sd 103 source4/libcli/raw/rawsetfileinfo.c parms->set_secdesc.in.sd,
sd 29 source4/libcli/security/access_check.c static uint32_t access_check_max_allowed(const struct security_descriptor *sd,
sd 35 source4/libcli/security/access_check.c if (security_token_has_sid(token, sd->owner_sid)) {
sd 41 source4/libcli/security/access_check.c if (sd->dacl == NULL) {
sd 45 source4/libcli/security/access_check.c for (i = 0;i<sd->dacl->num_aces; i++) {
sd 46 source4/libcli/security/access_check.c struct security_ace *ace = &sd->dacl->aces[i];
sd 75 source4/libcli/security/access_check.c NTSTATUS sec_access_check(const struct security_descriptor *sd,
sd 88 source4/libcli/security/access_check.c access_desired |= access_check_max_allowed(sd, token);
sd 103 source4/libcli/security/access_check.c if ((sd->type & SEC_DESC_DACL_PRESENT) && sd->dacl == NULL) {
sd 110 source4/libcli/security/access_check.c security_token_has_sid(token, sd->owner_sid)) {
sd 118 source4/libcli/security/access_check.c if (sd->dacl == NULL) {
sd 123 source4/libcli/security/access_check.c for (i=0; bits_remaining && i < sd->dacl->num_aces; i++) {
sd 124 source4/libcli/security/access_check.c struct security_ace *ace = &sd->dacl->aces[i];
sd 267 source4/libcli/security/sddl.c static struct security_acl *sddl_decode_acl(struct security_descriptor *sd,
sd 277 source4/libcli/security/sddl.c acl = talloc_zero(sd, struct security_acl);
sd 338 source4/libcli/security/sddl.c struct security_descriptor *sd;
sd 339 source4/libcli/security/sddl.c sd = talloc_zero(mem_ctx, struct security_descriptor);
sd 341 source4/libcli/security/sddl.c sd->revision = SECURITY_DESCRIPTOR_REVISION_1;
sd 342 source4/libcli/security/sddl.c sd->type = SEC_DESC_SELF_RELATIVE;
sd 352 source4/libcli/security/sddl.c if (sd->dacl != NULL) goto failed;
sd 353 source4/libcli/security/sddl.c sd->dacl = sddl_decode_acl(sd, &sddl, &flags, domain_sid);
sd 354 source4/libcli/security/sddl.c if (sd->dacl == NULL) goto failed;
sd 355 source4/libcli/security/sddl.c sd->type |= flags | SEC_DESC_DACL_PRESENT;
sd 358 source4/libcli/security/sddl.c if (sd->sacl != NULL) goto failed;
sd 359 source4/libcli/security/sddl.c sd->sacl = sddl_decode_acl(sd, &sddl, &flags, domain_sid);
sd 360 source4/libcli/security/sddl.c if (sd->sacl == NULL) goto failed;
sd 363 source4/libcli/security/sddl.c sd->type |= (flags<<1) | SEC_DESC_SACL_PRESENT;
sd 366 source4/libcli/security/sddl.c if (sd->owner_sid != NULL) goto failed;
sd 367 source4/libcli/security/sddl.c sd->owner_sid = sddl_decode_sid(sd, &sddl, domain_sid);
sd 368 source4/libcli/security/sddl.c if (sd->owner_sid == NULL) goto failed;
sd 371 source4/libcli/security/sddl.c if (sd->group_sid != NULL) goto failed;
sd 372 source4/libcli/security/sddl.c sd->group_sid = sddl_decode_sid(sd, &sddl, domain_sid);
sd 373 source4/libcli/security/sddl.c if (sd->group_sid == NULL) goto failed;
sd 378 source4/libcli/security/sddl.c return sd;
sd 382 source4/libcli/security/sddl.c talloc_free(sd);
sd 550 source4/libcli/security/sddl.c char *sddl_encode(TALLOC_CTX *mem_ctx, const struct security_descriptor *sd,
sd 562 source4/libcli/security/sddl.c if (sd->owner_sid != NULL) {
sd 563 source4/libcli/security/sddl.c char *sid = sddl_encode_sid(tmp_ctx, sd->owner_sid, domain_sid);
sd 569 source4/libcli/security/sddl.c if (sd->group_sid != NULL) {
sd 570 source4/libcli/security/sddl.c char *sid = sddl_encode_sid(tmp_ctx, sd->group_sid, domain_sid);
sd 576 source4/libcli/security/sddl.c if ((sd->type & SEC_DESC_DACL_PRESENT) && sd->dacl != NULL) {
sd 577 source4/libcli/security/sddl.c char *acl = sddl_encode_acl(tmp_ctx, sd->dacl, sd->type, domain_sid);
sd 583 source4/libcli/security/sddl.c if ((sd->type & SEC_DESC_SACL_PRESENT) && sd->sacl != NULL) {
sd 584 source4/libcli/security/sddl.c char *acl = sddl_encode_acl(tmp_ctx, sd->sacl, sd->type>>1, domain_sid);
sd 30 source4/libcli/security/security_descriptor.c struct security_descriptor *sd;
sd 32 source4/libcli/security/security_descriptor.c sd = talloc(mem_ctx, struct security_descriptor);
sd 33 source4/libcli/security/security_descriptor.c if (!sd) {
sd 37 source4/libcli/security/security_descriptor.c sd->revision = SD_REVISION;
sd 42 source4/libcli/security/security_descriptor.c sd->type = SEC_DESC_SELF_RELATIVE;
sd 44 source4/libcli/security/security_descriptor.c sd->owner_sid = NULL;
sd 45 source4/libcli/security/security_descriptor.c sd->group_sid = NULL;
sd 46 source4/libcli/security/security_descriptor.c sd->sacl = NULL;
sd 47 source4/libcli/security/security_descriptor.c sd->dacl = NULL;
sd 49 source4/libcli/security/security_descriptor.c return sd;
sd 135 source4/libcli/security/security_descriptor.c static NTSTATUS security_descriptor_acl_add(struct security_descriptor *sd,
sd 142 source4/libcli/security/security_descriptor.c acl = sd->sacl;
sd 144 source4/libcli/security/security_descriptor.c acl = sd->dacl;
sd 148 source4/libcli/security/security_descriptor.c acl = talloc(sd, struct security_acl);
sd 180 source4/libcli/security/security_descriptor.c sd->sacl = acl;
sd 181 source4/libcli/security/security_descriptor.c sd->type |= SEC_DESC_SACL_PRESENT;
sd 183 source4/libcli/security/security_descriptor.c sd->dacl = acl;
sd 184 source4/libcli/security/security_descriptor.c sd->type |= SEC_DESC_DACL_PRESENT;
sd 194 source4/libcli/security/security_descriptor.c NTSTATUS security_descriptor_sacl_add(struct security_descriptor *sd,
sd 197 source4/libcli/security/security_descriptor.c return security_descriptor_acl_add(sd, true, ace);
sd 204 source4/libcli/security/security_descriptor.c NTSTATUS security_descriptor_dacl_add(struct security_descriptor *sd,
sd 207 source4/libcli/security/security_descriptor.c return security_descriptor_acl_add(sd, false, ace);
sd 215 source4/libcli/security/security_descriptor.c static NTSTATUS security_descriptor_acl_del(struct security_descriptor *sd,
sd 224 source4/libcli/security/security_descriptor.c acl = sd->sacl;
sd 226 source4/libcli/security/security_descriptor.c acl = sd->dacl;
sd 273 source4/libcli/security/security_descriptor.c NTSTATUS security_descriptor_dacl_del(struct security_descriptor *sd,
sd 276 source4/libcli/security/security_descriptor.c return security_descriptor_acl_del(sd, false, trustee);
sd 284 source4/libcli/security/security_descriptor.c NTSTATUS security_descriptor_sacl_del(struct security_descriptor *sd,
sd 287 source4/libcli/security/security_descriptor.c return security_descriptor_acl_del(sd, true, trustee);
sd 367 source4/libcli/security/security_descriptor.c static struct security_descriptor *security_descriptor_appendv(struct security_descriptor *sd,
sd 375 source4/libcli/security/security_descriptor.c struct security_ace *ace = talloc(sd, struct security_ace);
sd 379 source4/libcli/security/security_descriptor.c talloc_free(sd);
sd 387 source4/libcli/security/security_descriptor.c talloc_free(sd);
sd 392 source4/libcli/security/security_descriptor.c status = security_descriptor_sacl_add(sd, ace);
sd 394 source4/libcli/security/security_descriptor.c status = security_descriptor_dacl_add(sd, ace);
sd 398 source4/libcli/security/security_descriptor.c talloc_free(sd);
sd 403 source4/libcli/security/security_descriptor.c return sd;
sd 406 source4/libcli/security/security_descriptor.c struct security_descriptor *security_descriptor_append(struct security_descriptor *sd,
sd 411 source4/libcli/security/security_descriptor.c va_start(ap, sd);
sd 412 source4/libcli/security/security_descriptor.c sd = security_descriptor_appendv(sd, false, ap);
sd 415 source4/libcli/security/security_descriptor.c return sd;
sd 425 source4/libcli/security/security_descriptor.c struct security_descriptor *sd;
sd 427 source4/libcli/security/security_descriptor.c sd = security_descriptor_initialise(mem_ctx);
sd 428 source4/libcli/security/security_descriptor.c if (sd == NULL) {
sd 432 source4/libcli/security/security_descriptor.c sd->type |= sd_type;
sd 435 source4/libcli/security/security_descriptor.c sd->owner_sid = dom_sid_parse_talloc(sd, owner_sid);
sd 436 source4/libcli/security/security_descriptor.c if (sd->owner_sid == NULL) {
sd 437 source4/libcli/security/security_descriptor.c talloc_free(sd);
sd 442 source4/libcli/security/security_descriptor.c sd->group_sid = dom_sid_parse_talloc(sd, group_sid);
sd 443 source4/libcli/security/security_descriptor.c if (sd->group_sid == NULL) {
sd 444 source4/libcli/security/security_descriptor.c talloc_free(sd);
sd 449 source4/libcli/security/security_descriptor.c return security_descriptor_appendv(sd, add_ace_to_sacl, ap);
sd 480 source4/libcli/security/security_descriptor.c struct security_descriptor *sd = NULL;
sd 483 source4/libcli/security/security_descriptor.c sd = security_descriptor_createv(mem_ctx, sd_type, owner_sid,
sd 487 source4/libcli/security/security_descriptor.c return sd;
sd 496 source4/libcli/security/security_descriptor.c struct security_descriptor *sd = NULL;
sd 499 source4/libcli/security/security_descriptor.c sd = security_descriptor_createv(mem_ctx, sd_type, owner_sid,
sd 503 source4/libcli/security/security_descriptor.c return sd;
sd 34 source4/libcli/security/tests/sddl.c struct security_descriptor *sd, *sd2;
sd 42 source4/libcli/security/tests/sddl.c sd = sddl_decode(mem_ctx, sddl, domain);
sd 43 source4/libcli/security/tests/sddl.c torture_assert(tctx, sd != NULL, talloc_asprintf(tctx,
sd 46 source4/libcli/security/tests/sddl.c sddl2 = sddl_encode(mem_ctx, sd, domain);
sd 54 source4/libcli/security/tests/sddl.c torture_assert(tctx, security_descriptor_equal(sd, sd2),
sd 65 source4/libcli/security/tests/sddl.c NDR_PRINT_DEBUG(security_descriptor, sd);
sd 67 source4/libcli/security/tests/sddl.c talloc_free(sd);
sd 76 source4/libcli/smb_composite/appendacl.c state->io_setfileinfo->set_secdesc.in.sd = state->io_fileinfo->query_secdesc.out.sd;
sd 77 source4/libcli/smb_composite/appendacl.c talloc_steal(state->io_setfileinfo, state->io_setfileinfo->set_secdesc.in.sd);
sd 80 source4/libcli/smb_composite/appendacl.c if (io->in.sd->dacl != NULL) {
sd 81 source4/libcli/smb_composite/appendacl.c for (i = 0; i < io->in.sd->dacl->num_aces; i++) {
sd 82 source4/libcli/smb_composite/appendacl.c security_descriptor_dacl_add(state->io_setfileinfo->set_secdesc.in.sd,
sd 83 source4/libcli/smb_composite/appendacl.c &(io->in.sd->dacl->aces[i]));
sd 147 source4/libcli/smb_composite/appendacl.c io->out.sd = state->io_fileinfo->query_secdesc.out.sd;
sd 295 source4/libcli/smb_composite/appendacl.c state->io->out.sd = security_descriptor_copy (mem_ctx, state->io->out.sd);
sd 166 source4/libcli/smb_composite/smb_composite.h const struct security_descriptor *sd;
sd 170 source4/libcli/smb_composite/smb_composite.h struct security_descriptor *sd;
sd 147 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *sd;
sd 158 source4/ntvfs/posix/pvfs_acl.c sd = *psd;
sd 160 source4/ntvfs/posix/pvfs_acl.c ids = talloc_zero_array(sd, struct id_mapping, 2);
sd 183 source4/ntvfs/posix/pvfs_acl.c sd->owner_sid = talloc_steal(sd, ids[0].sid);
sd 184 source4/ntvfs/posix/pvfs_acl.c sd->group_sid = talloc_steal(sd, ids[1].sid);
sd 187 source4/ntvfs/posix/pvfs_acl.c sd->type |= SEC_DESC_DACL_PRESENT;
sd 203 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *sd->owner_sid;
sd 217 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace);
sd 222 source4/ntvfs/posix/pvfs_acl.c ace.trustee = *sd->group_sid;
sd 232 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace);
sd 245 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace);
sd 251 source4/ntvfs/posix/pvfs_acl.c security_descriptor_dacl_add(sd, &ace);
sd 261 source4/ntvfs/posix/pvfs_acl.c static void normalise_sd_flags(struct security_descriptor *sd, uint32_t secinfo_flags)
sd 264 source4/ntvfs/posix/pvfs_acl.c sd->owner_sid = NULL;
sd 267 source4/ntvfs/posix/pvfs_acl.c sd->group_sid = NULL;
sd 270 source4/ntvfs/posix/pvfs_acl.c sd->dacl = NULL;
sd 273 source4/ntvfs/posix/pvfs_acl.c sd->sacl = NULL;
sd 287 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *new_sd, *sd, orig_sd;
sd 297 source4/ntvfs/posix/pvfs_acl.c status = pvfs->acl_ops->acl_load(pvfs, name, fd, req, &sd);
sd 300 source4/ntvfs/posix/pvfs_acl.c status = pvfs_default_acl(pvfs, req, name, fd, &sd);
sd 312 source4/ntvfs/posix/pvfs_acl.c new_sd = info->set_secdesc.in.sd;
sd 313 source4/ntvfs/posix/pvfs_acl.c orig_sd = *sd;
sd 323 source4/ntvfs/posix/pvfs_acl.c if (!dom_sid_equal(sd->owner_sid, new_sd->owner_sid)) {
sd 335 source4/ntvfs/posix/pvfs_acl.c sd->owner_sid = new_sd->owner_sid;
sd 341 source4/ntvfs/posix/pvfs_acl.c if (!dom_sid_equal(sd->group_sid, new_sd->group_sid)) {
sd 354 source4/ntvfs/posix/pvfs_acl.c sd->group_sid = new_sd->group_sid;
sd 360 source4/ntvfs/posix/pvfs_acl.c sd->dacl = new_sd->dacl;
sd 361 source4/ntvfs/posix/pvfs_acl.c pvfs_translate_generic_bits(sd->dacl);
sd 367 source4/ntvfs/posix/pvfs_acl.c sd->sacl = new_sd->sacl;
sd 368 source4/ntvfs/posix/pvfs_acl.c pvfs_translate_generic_bits(sd->sacl);
sd 395 source4/ntvfs/posix/pvfs_acl.c if (!security_descriptor_equal(sd, &orig_sd) && pvfs->acl_ops) {
sd 396 source4/ntvfs/posix/pvfs_acl.c status = pvfs->acl_ops->acl_save(pvfs, name, fd, sd);
sd 412 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *sd;
sd 415 source4/ntvfs/posix/pvfs_acl.c status = pvfs->acl_ops->acl_load(pvfs, name, fd, req, &sd);
sd 418 source4/ntvfs/posix/pvfs_acl.c status = pvfs_default_acl(pvfs, req, name, fd, &sd);
sd 424 source4/ntvfs/posix/pvfs_acl.c normalise_sd_flags(sd, info->query_secdesc.in.secinfo_flags);
sd 426 source4/ntvfs/posix/pvfs_acl.c info->query_secdesc.out.sd = sd;
sd 512 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *sd;
sd 546 source4/ntvfs/posix/pvfs_acl.c sd = acl->info.sd;
sd 553 source4/ntvfs/posix/pvfs_acl.c status = sec_access_check(sd, token, *access_mask, access_mask);
sd 660 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *sd,
sd 694 source4/ntvfs/posix/pvfs_acl.c new_id = sd->owner_sid;
sd 697 source4/ntvfs/posix/pvfs_acl.c new_id = sd->group_sid;
sd 708 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace);
sd 715 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace);
sd 718 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace);
sd 721 source4/ntvfs/posix/pvfs_acl.c status = security_descriptor_dacl_add(sd, &ace);
sd 747 source4/ntvfs/posix/pvfs_acl.c struct security_descriptor *parent_sd, *sd;
sd 773 source4/ntvfs/posix/pvfs_acl.c parent_sd = acl->info.sd;
sd 787 source4/ntvfs/posix/pvfs_acl.c sd = security_descriptor_initialise(req);
sd 788 source4/ntvfs/posix/pvfs_acl.c if (sd == NULL) {
sd 792 source4/ntvfs/posix/pvfs_acl.c ids = talloc_array(sd, struct id_mapping, 2);
sd 815 source4/ntvfs/posix/pvfs_acl.c sd->owner_sid = talloc_steal(sd, ids[0].sid);
sd 816 source4/ntvfs/posix/pvfs_acl.c sd->group_sid = talloc_steal(sd, ids[1].sid);
sd 818 source4/ntvfs/posix/pvfs_acl.c sd->type |= SEC_DESC_DACL_PRESENT;
sd 823 source4/ntvfs/posix/pvfs_acl.c status = pvfs_acl_inherit_aces(pvfs, parent_sd, sd, container);
sd 830 source4/ntvfs/posix/pvfs_acl.c if (sd->dacl == NULL || sd->dacl->num_aces == 0) {
sd 834 source4/ntvfs/posix/pvfs_acl.c acl->info.sd = sd;
sd 40 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_descriptor *sd;
sd 59 source4/ntvfs/posix/pvfs_acl_nfs4.c sd = *psd;
sd 61 source4/ntvfs/posix/pvfs_acl_nfs4.c sd->type |= acl->a_flags;
sd 65 source4/ntvfs/posix/pvfs_acl_nfs4.c ids = talloc_array(sd, struct id_mapping, num_ids);
sd 98 source4/ntvfs/posix/pvfs_acl_nfs4.c ctx = wbc_xids_to_sids_send(pvfs->wbc_ctx, sd, num_ids, ids);
sd 103 source4/ntvfs/posix/pvfs_acl_nfs4.c sd->owner_sid = talloc_steal(sd, ids[0].sid);
sd 104 source4/ntvfs/posix/pvfs_acl_nfs4.c sd->group_sid = talloc_steal(sd, ids[1].sid);
sd 113 source4/ntvfs/posix/pvfs_acl_nfs4.c security_descriptor_dacl_add(sd, &ace);
sd 123 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_descriptor *sd)
sd 137 source4/ntvfs/posix/pvfs_acl_nfs4.c acl.a_flags = sd->type;
sd 138 source4/ntvfs/posix/pvfs_acl_nfs4.c acl.a_count = sd->dacl?sd->dacl->num_aces:0;
sd 156 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_ace *ace = &sd->dacl->aces[i];
sd 179 source4/ntvfs/posix/pvfs_acl_nfs4.c struct security_ace *ace = &sd->dacl->aces[i];
sd 32 source4/ntvfs/posix/pvfs_acl_xattr.c struct security_descriptor **sd)
sd 59 source4/ntvfs/posix/pvfs_acl_xattr.c *sd = talloc_steal(mem_ctx, acl->info.sd);
sd 68 source4/ntvfs/posix/pvfs_acl_xattr.c struct security_descriptor *sd)
sd 79 source4/ntvfs/posix/pvfs_acl_xattr.c acl.info.sd = sd;
sd 109 source4/ntvfs/posix/pvfs_open.c struct security_descriptor *sd;
sd 121 source4/ntvfs/posix/pvfs_open.c sd = io->ntcreatex.in.sec_desc;
sd 123 source4/ntvfs/posix/pvfs_open.c if (sd && (sd->type & SEC_DESC_DACL_PRESENT)) {
sd 134 source4/ntvfs/posix/pvfs_open.c set.set_secdesc.in.sd = sd;
sd 161 source4/rpc_server/dcerpc_server.c const struct security_descriptor *sd)
sd 218 source4/rpc_server/dcerpc_server.c if (sd != NULL) {
sd 222 source4/rpc_server/dcerpc_server.c if (ep->sd == NULL) {
sd 223 source4/rpc_server/dcerpc_server.c ep->sd = security_descriptor_copy(dce_ctx, sd);
sd 230 source4/rpc_server/dcerpc_server.c if (ep->sd != NULL) {
sd 262 source4/rpc_server/dcerpc_server.h struct security_descriptor *sd;
sd 293 source4/rpc_server/dcerpc_server.h const struct security_descriptor *sd);
sd 232 source4/rpc_server/samr/dcesrv_samr.c struct sec_desc_buf *sd;
sd 238 source4/rpc_server/samr/dcesrv_samr.c sd = talloc(mem_ctx, struct sec_desc_buf);
sd 239 source4/rpc_server/samr/dcesrv_samr.c if (sd == NULL) {
sd 243 source4/rpc_server/samr/dcesrv_samr.c sd->sd = samdb_default_security_descriptor(mem_ctx);
sd 245 source4/rpc_server/samr/dcesrv_samr.c *r->out.sdbuf = sd;
sd 690 source4/rpc_server/srvsvc/dcesrv_srvsvc.c info->info502->sd_buf.sd = dcesrv_common_get_security_descriptor(mem_ctx, dce_ctx, scfg);
sd 1104 source4/rpc_server/srvsvc/dcesrv_srvsvc.c struct security_descriptor *sd)
sd 1316 source4/rpc_server/srvsvc/dcesrv_srvsvc.c r->in.info->info502->sd_buf.sd);
sd 2110 source4/rpc_server/srvsvc/dcesrv_srvsvc.c sd_buf->sd = io->query_secdesc.out.sd;
sd 2144 source4/rpc_server/srvsvc/dcesrv_srvsvc.c io->set_secdesc.in.sd = r->in.sd_buf->sd;
sd 117 source4/rpc_server/winreg/rpc_winreg.c struct security_descriptor sd;
sd 134 source4/rpc_server/winreg/rpc_winreg.c sdblob.data = r->in.secdesc->sd.data;
sd 135 source4/rpc_server/winreg/rpc_winreg.c sdblob.length = r->in.secdesc->sd.len;
sd 139 source4/rpc_server/winreg/rpc_winreg.c ndr_err = ndr_pull_struct_blob_all(&sdblob, mem_ctx, NULL, &sd,
sd 147 source4/rpc_server/winreg/rpc_winreg.c r->in.secdesc?&sd:NULL, (struct registry_key **)&newh->data);
sd 209 source4/smb_server/smb/nttrans.c io->query_secdesc.out.sd,
sd 271 source4/smb_server/smb/nttrans.c io->set_secdesc.in.sd = talloc(io, struct security_descriptor);
sd 272 source4/smb_server/smb/nttrans.c NT_STATUS_HAVE_NO_MEMORY(io->set_secdesc.in.sd);
sd 275 source4/smb_server/smb/nttrans.c io->set_secdesc.in.sd,
sd 155 source4/smb_server/smb2/fileinfo.c io->query_secdesc.out.sd,
sd 317 source4/smb_server/smb2/fileinfo.c io->set_secdesc.in.sd = talloc(io, struct security_descriptor);
sd 318 source4/smb_server/smb2/fileinfo.c NT_STATUS_HAVE_NO_MEMORY(io->set_secdesc.in.sd);
sd 321 source4/smb_server/smb2/fileinfo.c io->set_secdesc.in.sd,
sd 948 source4/torture/gentest.c struct security_descriptor *sd;
sd 951 source4/torture/gentest.c sd = security_descriptor_dacl_create(current_op.mem_ctx,
sd 962 source4/torture/gentest.c return sd;
sd 1717 source4/torture/gentest.c CHECK_SECDESC(query_secdesc.out.sd);
sd 465 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->size, 65536, "sd size");
sd 466 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->len, 0, "sd len");
sd 467 source4/torture/ndr/winreg.c torture_assert(tctx, r->in.sd->data == NULL, "sd data");
sd 481 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->size, 20, "sd size");
sd 482 source4/torture/ndr/winreg.c torture_assert_int_equal(tctx, r->in.sd->len, 20, "sd len");
sd 54 source4/torture/raw/acls.c struct security_descriptor *sd;
sd 85 source4/torture/raw/acls.c sd = q.query_secdesc.out.sd;
sd 96 source4/torture/raw/acls.c status = security_descriptor_dacl_add(sd, &ace);
sd 102 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 110 source4/torture/raw/acls.c if (!security_acl_equal(q.query_secdesc.out.sd->dacl, sd->dacl)) {
sd 113 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 115 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, sd);
sd 121 source4/torture/raw/acls.c status = security_descriptor_dacl_del(sd, test_sid);
sd 130 source4/torture/raw/acls.c if (!security_acl_equal(q.query_secdesc.out.sd->dacl, sd->dacl)) {
sd 133 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 135 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, sd);
sd 158 source4/torture/raw/acls.c struct security_descriptor *sd;
sd 196 source4/torture/raw/acls.c sd = q.query_secdesc.out.sd;
sd 209 source4/torture/raw/acls.c status = security_descriptor_dacl_add(sd, &ace);
sd 214 source4/torture/raw/acls.c io.ntcreatex.in.sec_desc = sd;
sd 223 source4/torture/raw/acls.c if (!security_acl_equal(q.query_secdesc.out.sd->dacl, sd->dacl)) {
sd 226 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 228 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, sd);
sd 264 source4/torture/raw/acls.c struct security_descriptor *sd = security_descriptor_initialise(tctx);
sd 283 source4/torture/raw/acls.c io.ntcreatex.in.sec_desc = sd;
sd 306 source4/torture/raw/acls.c if (!(q.query_secdesc.out.sd->type & SEC_DESC_DACL_PRESENT)) {
sd 311 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL) {
sd 318 source4/torture/raw/acls.c sd->type |= SEC_DESC_DACL_PRESENT;
sd 323 source4/torture/raw/acls.c s.set_secdesc.in.sd = sd;
sd 338 source4/torture/raw/acls.c if (!(q.query_secdesc.out.sd->type & SEC_DESC_DACL_PRESENT)) {
sd 343 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl != NULL) {
sd 393 source4/torture/raw/acls.c sd->dacl = &dacl;
sd 398 source4/torture/raw/acls.c s.set_secdesc.in.sd = sd;
sd 413 source4/torture/raw/acls.c if (!(q.query_secdesc.out.sd->type & SEC_DESC_DACL_PRESENT)) {
sd 418 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL) {
sd 423 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl->num_aces != 0) {
sd 425 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->num_aces);
sd 459 source4/torture/raw/acls.c sd->type &= ~SEC_DESC_DACL_PRESENT;
sd 460 source4/torture/raw/acls.c sd->dacl = NULL;
sd 465 source4/torture/raw/acls.c s.set_secdesc.in.sd = sd;
sd 480 source4/torture/raw/acls.c if (!(q.query_secdesc.out.sd->type & SEC_DESC_DACL_PRESENT)) {
sd 485 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl != NULL) {
sd 509 source4/torture/raw/acls.c struct security_descriptor *sd, *sd_orig, *sd2;
sd 538 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd;
sd 543 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 554 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 580 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 591 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 598 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd)) {
sd 601 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 603 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, sd);
sd 635 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 643 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 658 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) {
sd 661 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 696 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig;
sd 721 source4/torture/raw/acls.c struct security_descriptor *sd, *sd_orig, *sd2;
sd 777 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd;
sd 813 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 824 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 839 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) {
sd 842 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 861 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 872 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 887 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) {
sd 890 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 905 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig;
sd 942 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd;
sd 978 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 989 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 1004 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) {
sd 1007 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 1026 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 1037 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 1052 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) {
sd 1055 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 1070 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig;
sd 1096 source4/torture/raw/acls.c struct security_descriptor *sd, *sd_orig;
sd 1131 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd;
sd 1153 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 1164 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 1194 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig;
sd 1221 source4/torture/raw/acls.c struct security_descriptor *sd, *sd2, *sd_orig=NULL, *sd_def;
sd 1359 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd;
sd 1380 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 1394 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 1412 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd_def)) {
sd 1416 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 1421 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL ||
sd 1422 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->num_aces != 1 ||
sd 1423 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].access_mask != SEC_FILE_WRITE_DATA ||
sd 1424 source4/torture/raw/acls.c !dom_sid_equal(&q.query_secdesc.out.sd->dacl->aces[0].trustee,
sd 1427 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 1432 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl->aces[0].flags !=
sd 1435 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].flags,
sd 1459 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd_def)) {
sd 1463 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 1470 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL ||
sd 1471 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->num_aces != 1 ||
sd 1472 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].access_mask != SEC_FILE_WRITE_DATA ||
sd 1473 source4/torture/raw/acls.c !dom_sid_equal(&q.query_secdesc.out.sd->dacl->aces[0].trustee,
sd 1475 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].flags != test_flags[i].dir_flags) {
sd 1478 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 1483 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL ||
sd 1484 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->num_aces != 2 ||
sd 1485 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].access_mask != SEC_FILE_WRITE_DATA ||
sd 1486 source4/torture/raw/acls.c !dom_sid_equal(&q.query_secdesc.out.sd->dacl->aces[0].trustee,
sd 1488 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[1].access_mask != SEC_FILE_WRITE_DATA ||
sd 1489 source4/torture/raw/acls.c !dom_sid_equal(&q.query_secdesc.out.sd->dacl->aces[1].trustee,
sd 1491 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].flags != 0 ||
sd 1492 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[1].flags !=
sd 1496 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 1501 source4/torture/raw/acls.c if (q.query_secdesc.out.sd->dacl == NULL ||
sd 1502 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->num_aces != 1 ||
sd 1503 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].access_mask != SEC_FILE_WRITE_DATA ||
sd 1504 source4/torture/raw/acls.c !dom_sid_equal(&q.query_secdesc.out.sd->dacl->aces[0].trustee,
sd 1506 source4/torture/raw/acls.c q.query_secdesc.out.sd->dacl->aces[0].flags != test_flags[i].dir_flags) {
sd 1509 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 1517 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 1531 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 1557 source4/torture/raw/acls.c if (!security_descriptor_equal(q.query_secdesc.out.sd, sd2)) {
sd 1560 source4/torture/raw/acls.c NDR_PRINT_DEBUG(security_descriptor, q.query_secdesc.out.sd);
sd 1602 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig;
sd 1626 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig;
sd 1648 source4/torture/raw/acls.c struct security_descriptor *sd, *sd_orig=NULL;
sd 1680 source4/torture/raw/acls.c sd_orig = q.query_secdesc.out.sd;
sd 1686 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 1693 source4/torture/raw/acls.c sd->type |= SEC_DESC_DACL_AUTO_INHERITED | SEC_DESC_DACL_AUTO_INHERIT_REQ;
sd 1698 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 1726 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 1733 source4/torture/raw/acls.c sd->type |= SEC_DESC_DACL_AUTO_INHERITED | SEC_DESC_DACL_AUTO_INHERIT_REQ;
sd 1735 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd;
sd 1765 source4/torture/raw/acls.c set.set_secdesc.in.sd = sd_orig;
sd 1811 source4/torture/raw/acls.c struct security_descriptor *sd;
sd 1841 source4/torture/raw/acls.c sd = security_descriptor_dacl_create(tctx,
sd 1848 source4/torture/raw/acls.c sd->type |= SEC_DESC_SACL_PRESENT;
sd 1849 source4/torture/raw/acls.c sd->sacl = NULL;
sd 1862 source4/torture/raw/acls.c io.ntcreatex.in.sec_desc = sd;
sd 1902 source4/torture/raw/acls.c if (fi.query_secdesc.out.sd) {
sd 1903 source4/torture/raw/acls.c sd_owner = fi.query_secdesc.out.sd;
sd 1905 source4/torture/raw/acls.c sd_owner = sd;
sd 1910 source4/torture/raw/acls.c si.set_secdesc.in.sd = sd_owner;
sd 1921 source4/torture/raw/acls.c if (fi.query_secdesc.out.sd) {
sd 1922 source4/torture/raw/acls.c sd_group = fi.query_secdesc.out.sd;
sd 1924 source4/torture/raw/acls.c sd_group = sd;
sd 1929 source4/torture/raw/acls.c si.set_secdesc.in.sd = sd_group;
sd 1940 source4/torture/raw/acls.c if (fi.query_secdesc.out.sd) {
sd 1941 source4/torture/raw/acls.c sd_dacl = fi.query_secdesc.out.sd;
sd 1943 source4/torture/raw/acls.c sd_dacl = sd;
sd 1948 source4/torture/raw/acls.c si.set_secdesc.in.sd = sd_dacl;
sd 1959 source4/torture/raw/acls.c if (fi.query_secdesc.out.sd) {
sd 1960 source4/torture/raw/acls.c sd_sacl = fi.query_secdesc.out.sd;
sd 1962 source4/torture/raw/acls.c sd_sacl = sd;
sd 1967 source4/torture/raw/acls.c si.set_secdesc.in.sd = sd_sacl;
sd 258 source4/torture/raw/composite.c io_orig[i]->in.sd = security_descriptor_initialise(io_orig[i]);
sd 294 source4/torture/raw/composite.c io[i]->in.sd = test_sd;
sd 320 source4/torture/raw/composite.c security_descriptor_dacl_add(io_orig[i]->out.sd, ace);
sd 321 source4/torture/raw/composite.c if (!security_acl_equal(io_orig[i]->out.sd->dacl, io[i]->out.sd->dacl)) {
sd 2240 source4/torture/rpc/samba3rpc.c result = talloc_steal(mem_ctx, info.info502->sd_buf.sd);
sd 2249 source4/torture/rpc/samba3rpc.c struct security_descriptor *sd)
sd 2288 source4/torture/rpc/samba3rpc.c i.sd = sd;
sd 2315 source4/torture/rpc/samba3rpc.c struct security_descriptor *sd;
sd 2340 source4/torture/rpc/samba3rpc.c sd = security_descriptor_dacl_create(
sd 2346 source4/torture/rpc/samba3rpc.c if (sd == NULL) {
sd 2352 source4/torture/rpc/samba3rpc.c status = set_sharesec(mem_ctx, lp_ctx, session, sharename, sd);
sd 2400 source4/torture/rpc/samba3rpc.c struct security_descriptor *sd;
sd 2421 source4/torture/rpc/samba3rpc.c sd = get_sharesec(mem_ctx, torture->lp_ctx, cli->session,
sd 2424 source4/torture/rpc/samba3rpc.c ret &= try_tcon(mem_ctx, torture->lp_ctx, sd, cli->session,
sd 2428 source4/torture/rpc/samba3rpc.c ret &= try_tcon(mem_ctx, torture->lp_ctx, sd, cli->session,
sd 2433 source4/torture/rpc/samba3rpc.c ret &= try_tcon(mem_ctx, torture->lp_ctx, sd, cli->session,
sd 246 source4/torture/rpc/samr_accessmask.c struct security_descriptor *sd;
sd 280 source4/torture/rpc/samr_accessmask.c sd = sdbuf->sd;
sd 285 source4/torture/rpc/samr_accessmask.c status = security_descriptor_dacl_add(sd, &ace);
sd 293 source4/torture/rpc/samr_accessmask.c sdb.sd = sd;
sd 290 source4/torture/rpc/samsync.c if (!sdbuf || !sdbuf->sd) { \
sd 294 source4/torture/rpc/samsync.c if (!security_descriptor_mask_equal(sd1.sd, sdbuf->sd, \
sd 297 source4/torture/rpc/samsync.c ndr_print_debug((ndr_print_fn_t)ndr_print_security_descriptor, "SamSync", sd1.sd);\
sd 298 source4/torture/rpc/samsync.c ndr_print_debug((ndr_print_fn_t)ndr_print_security_descriptor, "SamR", sdbuf->sd);\
sd 143 source4/torture/rpc/winreg.c struct security_descriptor *sd;
sd 147 source4/torture/rpc/winreg.c sd = security_descriptor_dacl_create(tctx,
sd 158 source4/torture/rpc/winreg.c ndr_push_struct_blob(&sdblob, tctx, NULL, sd,
sd 162 source4/torture/rpc/winreg.c secbuf.sd.data = sdblob.data;
sd 163 source4/torture/rpc/winreg.c secbuf.sd.len = sdblob.length;
sd 164 source4/torture/rpc/winreg.c secbuf.sd.size = sdblob.length;
sd 194 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL;
sd 208 source4/torture/rpc/winreg.c r.in.sd = r.out.sd = talloc_zero(tctx, struct KeySecurityData);
sd 209 source4/torture/rpc/winreg.c r.in.sd->size = 0x1000;
sd 218 source4/torture/rpc/winreg.c sdblob.data = r.out.sd->data;
sd 219 source4/torture/rpc/winreg.c sdblob.length = r.out.sd->len;
sd 221 source4/torture/rpc/winreg.c sd = talloc_zero(tctx, struct security_descriptor);
sd 224 source4/torture/rpc/winreg.c ndr_pull_struct_blob(&sdblob, tctx, NULL, sd,
sd 229 source4/torture/rpc/winreg.c NDR_PRINT_DEBUG(security_descriptor, sd);
sd 233 source4/torture/rpc/winreg.c *sd_out = sd;
sd 235 source4/torture/rpc/winreg.c talloc_free(sd);
sd 253 source4/torture/rpc/winreg.c struct security_descriptor *sd,
sd 263 source4/torture/rpc/winreg.c if (sd && (p->conn->flags & DCERPC_DEBUG_PRINT_OUT)) {
sd 264 source4/torture/rpc/winreg.c NDR_PRINT_DEBUG(security_descriptor, sd);
sd 268 source4/torture/rpc/winreg.c ndr_push_struct_blob(&sdblob, tctx, NULL, sd,
sd 282 source4/torture/rpc/winreg.c if (sd->owner_sid) {
sd 285 source4/torture/rpc/winreg.c if (sd->group_sid) {
sd 288 source4/torture/rpc/winreg.c if (sd->sacl) {
sd 291 source4/torture/rpc/winreg.c if (sd->dacl) {
sd 298 source4/torture/rpc/winreg.c r.in.sd = sdata;
sd 313 source4/torture/rpc/winreg.c struct security_descriptor *sd)
sd 315 source4/torture/rpc/winreg.c return _test_SetKeySecurity(p, tctx, handle, NULL, sd, WERR_OK);
sd 408 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL;
sd 410 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, NULL, get_werr, &sd)) {
sd 414 source4/torture/rpc/winreg.c if (!_test_SetKeySecurity(p, tctx, handle, NULL, sd, set_werr)) {
sd 486 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL;
sd 489 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) {
sd 493 source4/torture/rpc/winreg.c if (!sd || !sd->dacl) {
sd 497 source4/torture/rpc/winreg.c for (i = 0; i < sd->dacl->num_aces; i++) {
sd 498 source4/torture/rpc/winreg.c if (dom_sid_equal(&sd->dacl->aces[i].trustee, sid)) {
sd 531 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL;
sd 535 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) {
sd 539 source4/torture/rpc/winreg.c if (!sd || !sd->sacl) {
sd 543 source4/torture/rpc/winreg.c for (i = 0; i < sd->sacl->num_aces; i++) {
sd 544 source4/torture/rpc/winreg.c if (dom_sid_equal(&sd->sacl->aces[i].trustee, sid)) {
sd 578 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL;
sd 581 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) {
sd 585 source4/torture/rpc/winreg.c if (!sd || !sd->owner_sid) {
sd 589 source4/torture/rpc/winreg.c return dom_sid_equal(sd->owner_sid, sid);
sd 617 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL;
sd 620 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, handle, &sec_info, WERR_OK, &sd)) {
sd 624 source4/torture/rpc/winreg.c if (!sd || !sd->group_sid) {
sd 628 source4/torture/rpc/winreg.c return dom_sid_equal(sd->group_sid, sid);
sd 657 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL;
sd 660 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) {
sd 664 source4/torture/rpc/winreg.c if (!sd || !sd->dacl) {
sd 668 source4/torture/rpc/winreg.c for (i = 0; i < sd->dacl->num_aces; i++) {
sd 669 source4/torture/rpc/winreg.c if ((dom_sid_equal(&sd->dacl->aces[i].trustee, sid)) &&
sd 670 source4/torture/rpc/winreg.c (sd->dacl->aces[i].flags == flags)) {
sd 683 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL;
sd 686 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, handle, &sd)) {
sd 690 source4/torture/rpc/winreg.c if (!sd || !sd->dacl) {
sd 694 source4/torture/rpc/winreg.c for (i = 0; i < sd->dacl->num_aces; i++) {
sd 695 source4/torture/rpc/winreg.c if (security_ace_equal(&sd->dacl->aces[i], ace)) {
sd 707 source4/torture/rpc/winreg.c struct security_descriptor *sd)
sd 716 source4/torture/rpc/winreg.c if (!test_SetKeySecurity(p, tctx, &new_handle, sd)) {
sd 731 source4/torture/rpc/winreg.c struct security_descriptor **sd)
sd 740 source4/torture/rpc/winreg.c if (!test_GetKeySecurity(p, tctx, &new_handle, sd)) {
sd 772 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL;
sd 785 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, &new_handle, NULL, WERR_OK, &sd)) {
sd 789 source4/torture/rpc/winreg.c sd_orig = security_descriptor_copy(tctx, sd);
sd 800 source4/torture/rpc/winreg.c status = security_descriptor_dacl_add(sd, ace);
sd 807 source4/torture/rpc/winreg.c sd->type |= SEC_DESC_DACL_AUTO_INHERIT_REQ |
sd 810 source4/torture/rpc/winreg.c if (!test_SetKeySecurity(p, tctx, &new_handle, sd)) {
sd 882 source4/torture/rpc/winreg.c struct security_descriptor *sd = NULL;
sd 897 source4/torture/rpc/winreg.c if (!_test_GetKeySecurity(p, tctx, &new_handle, NULL, WERR_OK, &sd)) {
sd 901 source4/torture/rpc/winreg.c sd_orig = security_descriptor_copy(tctx, sd);
sd 913 source4/torture/rpc/winreg.c status = security_descriptor_dacl_add(sd, ace);
sd 919 source4/torture/rpc/winreg.c if (!_test_SetKeySecurity(p, tctx, &new_handle, NULL, sd, WERR_OK)) {
sd 1053 source4/torture/rpc/winreg.c struct security_descriptor *sd,
sd 1085 source4/torture/rpc/winreg.c sd,
sd 1162 source4/torture/rpc/winreg.c struct security_descriptor *sd;
sd 1251 source4/torture/rpc/winreg.c sec_info_owner_tests[i].sd,
sd 1275 source4/torture/rpc/winreg.c sec_info_group_tests[i].sd,
sd 1299 source4/torture/rpc/winreg.c sec_info_dacl_tests[i].sd,
sd 1323 source4/torture/rpc/winreg.c sec_info_sacl_tests[i].sd,
sd 380 source4/torture/smb2/create.c struct security_descriptor *sd, *sd2;
sd 411 source4/torture/smb2/create.c sd = q.query_secdesc.out.sd;
sd 426 source4/torture/smb2/create.c status = security_descriptor_dacl_add(sd, &ace);
sd 431 source4/torture/smb2/create.c io.in.sec_desc = sd;
sd 438 source4/torture/smb2/create.c sd2 = q.query_secdesc.out.sd;
sd 440 source4/torture/smb2/create.c if (!security_acl_equal(sd->dacl, sd2->dacl)) {
sd 445 source4/torture/smb2/create.c NDR_PRINT_DEBUG(security_descriptor, sd);
sd 49 source4/torture/smb2/setinfo.c struct security_descriptor *sd;
sd 244 source4/torture/smb2/setinfo.c sd = finfo2.query_secdesc.out.sd;
sd 252 source4/torture/smb2/setinfo.c status = security_descriptor_dacl_add(sd, &ace);
sd 258 source4/torture/smb2/setinfo.c sfinfo.set_secdesc.in.sd = sd;
sd 262 source4/torture/smb2/setinfo.c if (!security_acl_equal(finfo2.query_secdesc.out.sd->dacl, sd->dacl)) {
sd 265 source4/torture/smb2/setinfo.c NDR_PRINT_DEBUG(security_descriptor, finfo2.query_secdesc.out.sd);
sd 267 source4/torture/smb2/setinfo.c NDR_PRINT_DEBUG(security_descriptor, sd);
sd 273 source4/torture/smb2/setinfo.c status = security_descriptor_dacl_del(sd, test_sid);
sd 277 source4/torture/smb2/setinfo.c sfinfo.set_secdesc.in.sd = sd;
sd 281 source4/torture/smb2/setinfo.c if (!security_acl_equal(finfo2.query_secdesc.out.sd->dacl, sd->dacl)) {
sd 284 source4/torture/smb2/setinfo.c NDR_PRINT_DEBUG(security_descriptor, finfo2.query_secdesc.out.sd);
sd 286 source4/torture/smb2/setinfo.c NDR_PRINT_DEBUG(security_descriptor, sd);
sd 256 source4/torture/smb2/util.c NDR_PRINT_DEBUG(security_descriptor, io.query_secdesc.out.sd);