token = create_local_nt_token(talloc_autofree_context(), &u_sid, False,
1, &global_sid_Builtin_Administrators);
- token->privileges = se_disk_operators;
+ token->privilege_mask = se_disk_operators;
for_cache = token;
/* Add privileges based on current user sids */
- get_privileges_for_sids(&result->privileges, result->sids,
+ get_privileges_for_sids(&result->privilege_mask, result->sids,
result->num_sids);
return NT_STATUS_OK;
("SID[%3lu]: %s\n", (unsigned long)i,
sid_string_dbg(&token->sids[i])));
- dump_se_priv( dbg_class, dbg_lev, &token->privileges );
+ dump_se_priv( dbg_class, dbg_lev, &token->privilege_mask );
}
/****************************************************************************
typedef struct nt_user_token {
size_t num_sids;
struct dom_sid *sids;
- SE_PRIV privileges;
+ SE_PRIV privilege_mask;
} NT_USER_TOKEN;
typedef struct unix_user_token {
if ( !token )
return False;
- return is_privilege_assigned( &token->privileges, privilege );
+ return is_privilege_assigned( &token->privilege_mask, privilege );
}
/****************************************************************************
if ( !token )
return False;
- return is_any_privilege_assigned( &token->privileges, privilege );
+ return is_any_privilege_assigned( &token->privilege_mask, privilege );
}
/*******************************************************************
/* copy the privileges; don't consider failure to be critical here */
- if ( !se_priv_copy( &token->privileges, &ptoken->privileges ) ) {
- DEBUG(0,("dup_nt_token: Failure to copy SE_PRIV!. "
+ if ( !se_priv_copy( &token->privilege_mask, &ptoken->privilege_mask ) ) {
+ DEBUG(0,("dup_nt_token: Failure to copy privilages!. "
"Continuing with 0 privileges assigned.\n"));
}
}
}
- se_priv_add(&token->privileges, &token_1->privileges);
- se_priv_add(&token->privileges, &token_2->privileges);
+ se_priv_add(&token->privilege_mask, &token_1->privilege_mask);
+ se_priv_add(&token->privilege_mask, &token_2->privilege_mask);
*token_out = token;
return NULL;
}
- token->privileges = se_priv_all;
+ token->privilege_mask = se_priv_all;
if (!NT_STATUS_IS_OK(add_sid_to_array(token, &global_sid_System,
&token->sids, &token->num_sids))) {
status = NT_STATUS_NO_MEMORY;
goto done;
}
- token->privileges = se_disk_operators;
+ token->privilege_mask = se_disk_operators;
status = add_sid_to_array(token, &global_sid_Builtin_Administrators,
&token->sids, &token->num_sids);
if (!NT_STATUS_IS_OK(status)) {