ptoken 1237 source3/include/proto.h NT_USER_TOKEN *dup_nt_token(TALLOC_CTX *mem_ctx, const NT_USER_TOKEN *ptoken);
ptoken 5087 source3/include/proto.h NT_USER_TOKEN **ptoken);
ptoken 34 source3/lib/util_nttoken.c NT_USER_TOKEN *dup_nt_token(TALLOC_CTX *mem_ctx, const NT_USER_TOKEN *ptoken)
ptoken 38 source3/lib/util_nttoken.c if (!ptoken)
ptoken 47 source3/lib/util_nttoken.c if (ptoken->user_sids && ptoken->num_sids) {
ptoken 49 source3/lib/util_nttoken.c token, ptoken->user_sids, sizeof(DOM_SID) * ptoken->num_sids );
ptoken 56 source3/lib/util_nttoken.c token->num_sids = ptoken->num_sids;
ptoken 61 source3/lib/util_nttoken.c if ( !se_priv_copy( &token->privileges, &ptoken->privileges ) ) {
ptoken 35 source3/registry/reg_init_smbconf.c NT_USER_TOKEN **ptoken)
ptoken 40 source3/registry/reg_init_smbconf.c if (ptoken == NULL) {
ptoken 59 source3/registry/reg_init_smbconf.c *ptoken = token;
ptoken 46 source4/auth/system_session.c struct security_token *ptoken;
ptoken 49 source4/auth/system_session.c ptoken = security_token_initialise(mem_ctx);
ptoken 50 source4/auth/system_session.c NT_STATUS_HAVE_NO_MEMORY(ptoken);
ptoken 52 source4/auth/system_session.c ptoken->sids = talloc_array(ptoken, struct dom_sid *, n_groupSIDs + 5);
ptoken 53 source4/auth/system_session.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids);
ptoken 55 source4/auth/system_session.c ptoken->user_sid = talloc_reference(ptoken, user_sid);
ptoken 56 source4/auth/system_session.c ptoken->group_sid = talloc_reference(ptoken, group_sid);
ptoken 57 source4/auth/system_session.c ptoken->privilege_mask = 0;
ptoken 59 source4/auth/system_session.c ptoken->sids[0] = ptoken->user_sid;
ptoken 60 source4/auth/system_session.c ptoken->sids[1] = ptoken->group_sid;
ptoken 67 source4/auth/system_session.c ptoken->sids[2] = dom_sid_parse_talloc(ptoken->sids, SID_WORLD);
ptoken 68 source4/auth/system_session.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[2]);
ptoken 69 source4/auth/system_session.c ptoken->sids[3] = dom_sid_parse_talloc(ptoken->sids, SID_NT_NETWORK);
ptoken 70 source4/auth/system_session.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[3]);
ptoken 71 source4/auth/system_session.c ptoken->num_sids = 4;
ptoken 74 source4/auth/system_session.c ptoken->sids[4] = dom_sid_parse_talloc(ptoken->sids, SID_NT_AUTHENTICATED_USERS);
ptoken 75 source4/auth/system_session.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[4]);
ptoken 76 source4/auth/system_session.c ptoken->num_sids++;
ptoken 82 source4/auth/system_session.c check_sid_idx < ptoken->num_sids;
ptoken 84 source4/auth/system_session.c if (dom_sid_equal(ptoken->sids[check_sid_idx], groupSIDs[i])) {
ptoken 89 source4/auth/system_session.c if (check_sid_idx == ptoken->num_sids) {
ptoken 90 source4/auth/system_session.c ptoken->sids[ptoken->num_sids++] = talloc_reference(ptoken->sids, groupSIDs[i]);
ptoken 94 source4/auth/system_session.c *token = ptoken;
ptoken 97 source4/auth/system_session.c if (ptoken->user_sid == NULL) {
ptoken 98 source4/auth/system_session.c ptoken->privilege_mask = 0;
ptoken 102 source4/auth/system_session.c if (security_token_is_system(ptoken)) {
ptoken 103 source4/auth/system_session.c ptoken->privilege_mask = ~0;
ptoken 107 source4/auth/system_session.c if (security_token_is_anonymous(ptoken)) {
ptoken 108 source4/auth/system_session.c ptoken->privilege_mask = 0;
ptoken 235 source4/dsdb/samdb/samdb.c struct security_token *ptoken;
ptoken 239 source4/dsdb/samdb/samdb.c ptoken = security_token_initialise(mem_ctx);
ptoken 240 source4/dsdb/samdb/samdb.c NT_STATUS_HAVE_NO_MEMORY(ptoken);
ptoken 242 source4/dsdb/samdb/samdb.c ptoken->sids = talloc_array(ptoken, struct dom_sid *, n_groupSIDs + 5);
ptoken 243 source4/dsdb/samdb/samdb.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids);
ptoken 245 source4/dsdb/samdb/samdb.c ptoken->user_sid = talloc_reference(ptoken, user_sid);
ptoken 246 source4/dsdb/samdb/samdb.c ptoken->group_sid = talloc_reference(ptoken, group_sid);
ptoken 247 source4/dsdb/samdb/samdb.c ptoken->privilege_mask = 0;
ptoken 249 source4/dsdb/samdb/samdb.c ptoken->sids[0] = ptoken->user_sid;
ptoken 250 source4/dsdb/samdb/samdb.c ptoken->sids[1] = ptoken->group_sid;
ptoken 257 source4/dsdb/samdb/samdb.c ptoken->sids[2] = dom_sid_parse_talloc(ptoken->sids, SID_WORLD);
ptoken 258 source4/dsdb/samdb/samdb.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[2]);
ptoken 259 source4/dsdb/samdb/samdb.c ptoken->sids[3] = dom_sid_parse_talloc(ptoken->sids, SID_NT_NETWORK);
ptoken 260 source4/dsdb/samdb/samdb.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[3]);
ptoken 261 source4/dsdb/samdb/samdb.c ptoken->num_sids = 4;
ptoken 264 source4/dsdb/samdb/samdb.c ptoken->sids[4] = dom_sid_parse_talloc(ptoken->sids, SID_NT_AUTHENTICATED_USERS);
ptoken 265 source4/dsdb/samdb/samdb.c NT_STATUS_HAVE_NO_MEMORY(ptoken->sids[4]);
ptoken 266 source4/dsdb/samdb/samdb.c ptoken->num_sids++;
ptoken 272 source4/dsdb/samdb/samdb.c check_sid_idx < ptoken->num_sids;
ptoken 274 source4/dsdb/samdb/samdb.c if (dom_sid_equal(ptoken->sids[check_sid_idx], groupSIDs[i])) {
ptoken 279 source4/dsdb/samdb/samdb.c if (check_sid_idx == ptoken->num_sids) {
ptoken 280 source4/dsdb/samdb/samdb.c ptoken->sids[ptoken->num_sids++] = talloc_reference(ptoken->sids, groupSIDs[i]);
ptoken 285 source4/dsdb/samdb/samdb.c status = samdb_privilege_setup(ev_ctx, lp_ctx, ptoken);
ptoken 287 source4/dsdb/samdb/samdb.c talloc_free(ptoken);
ptoken 291 source4/dsdb/samdb/samdb.c security_token_debug(10, ptoken);
ptoken 293 source4/dsdb/samdb/samdb.c *token = ptoken;