int i;
bool found = False;
- se_priv_copy( privileges, &se_priv_none );
+ *privileges = 0;
for ( i=0; i<scount; i++ ) {
/* don't add unless we actually have a privilege assigned */
"set: 0x%llx\n", sid_string_dbg(&slist[i]),
(unsigned long long)mask));
- se_priv_add( privileges, &mask );
+ *privileges |= mask;
found = True;
}
ZERO_STRUCT(priv);
- se_priv_copy( &priv.privilege, &se_priv_none );
-
db->traverse_read(db, priv_traverse_fn, &priv);
/* give the memory away; caller will free */
ZERO_STRUCT(priv);
- se_priv_copy(&priv.privilege, mask);
+ priv.privilege = *mask;
priv.mem_ctx = mem_ctx;
db->traverse_read(db, priv_traverse_fn, &priv);
token->num_sids = ptoken->num_sids;
}
- /* copy the privileges; don't consider failure to be critical here */
-
- if ( !se_priv_copy( &token->privilege_mask, &ptoken->privilege_mask ) ) {
- DEBUG(0,("dup_nt_token: Failure to copy privilages!. "
- "Continuing with 0 privileges assigned.\n"));
- }
+ token->privilege_mask = ptoken->privilege_mask;
return token;
}
}
}
- se_priv_add(&token->privilege_mask, &token_1->privilege_mask);
- se_priv_add(&token->privilege_mask, &token_2->privilege_mask);
+ token->privilege_mask |= token_1->privilege_mask;
+ token->privilege_mask |= token_2->privilege_mask;
*token_out = token;
return NULL;
}
- token->privilege_mask = se_priv_all;
+ token->privilege_mask = SE_ALL_PRIVS;
if (!NT_STATUS_IS_OK(add_sid_to_array(token, &global_sid_System,
&token->sids, &token->num_sids))) {