if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&info))
return NT_STATUS_INVALID_HANDLE;
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
if (!(info->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
return NT_STATUS_ACCESS_DENIED;
uint32 policy_def = LSA_AUDIT_POLICY_ALL;
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
if (!(handle->access & LSA_POLICY_VIEW_AUDIT_INFORMATION)) {
DEBUG(10,("_lsa_QueryInfoPolicy: insufficient access rights\n"));
return NT_STATUS_ACCESS_DENIED;
break;
}
case 0x03:
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
return NT_STATUS_ACCESS_DENIED;
init_dom_query_3(&info->domain, name, sid);
break;
case 0x05:
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
return NT_STATUS_ACCESS_DENIED;
init_dom_query_5(&info->account_domain, name, sid);
break;
case 0x06:
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
return NT_STATUS_ACCESS_DENIED;
return NT_STATUS_INVALID_HANDLE;
}
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
if (!(handle->access & LSA_POLICY_LOOKUP_NAMES)) {
return NT_STATUS_ACCESS_DENIED;
}
goto done;
}
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
if (!(handle->access & LSA_POLICY_LOOKUP_NAMES)) {
status = NT_STATUS_ACCESS_DENIED;
goto done;
goto done;
}
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
if (!(handle->access & LSA_POLICY_LOOKUP_NAMES)) {
status = NT_STATUS_ACCESS_DENIED;
goto done;
if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&handle))
return NT_STATUS_INVALID_HANDLE;
- /* check if the user have enough rights
+ /* check if the user has enough rights
I don't know if it's the right one. not documented. */
if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&handle))
return NT_STATUS_INVALID_HANDLE;
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
/*
* I don't know if it's the right one. not documented.
if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&handle))
return NT_STATUS_INVALID_HANDLE;
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
/*
* I don't know if it's the right one. not documented.
if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&handle))
return NT_STATUS_INVALID_HANDLE;
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
/*
* I don't know if it's the right one. not documented.
if (!find_policy_by_hnd(p, r->in.handle, (void **)(void *)&handle))
return NT_STATUS_INVALID_HANDLE;
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
return NT_STATUS_ACCESS_DENIED;
switch (q_u->info_class) {
case 0x0c:
- /* check if the user have enough rights */
+ /* check if the user has enough rights */
if (!(handle->access & LSA_POLICY_VIEW_LOCAL_INFORMATION))
return NT_STATUS_ACCESS_DENIED;