/*******************************************************************
*******************************************************************/
-bool se_priv_to_privilege_set( PRIVILEGE_SET *set, uint64_t *privilege_mask )
+bool se_priv_to_privilege_set( PRIVILEGE_SET *set, uint64_t privilege_mask )
{
int i;
uint32_t num_privs = ARRAY_SIZE(privs);
luid.luid.high = 0;
for ( i=0; i<num_privs; i++ ) {
- if ( !is_privilege_assigned(privilege_mask, &privs[i].privilege_mask) )
+ if ((privilege_mask & privs[i].privilege_mask) == 0)
continue;
luid.luid.high = 0;
const char *luid_to_privilege_name(const struct lsa_LUID *set);
-bool se_priv_to_privilege_set( PRIVILEGE_SET *set, uint64_t *privilege_mask );
+bool se_priv_to_privilege_set( PRIVILEGE_SET *set, uint64_t privilege_mask );
bool privilege_set_to_se_priv( uint64_t *privilege_mask, struct lsa_PrivilegeSet *privset );
/*
goto done;
}
- if ( se_priv_to_privilege_set( &privileges, &mask ) ) {
+ if ( se_priv_to_privilege_set( &privileges, mask ) ) {
DEBUG(10,("_lsa_EnumPrivsAccount: %s has %d privileges\n",
sid_string_dbg(&info->sid),
return status;
}
- se_priv_to_privilege_set(&privileges, &mask);
+ se_priv_to_privilege_set(&privileges, mask);
DEBUG(10,("_lsa_EnumAccountRights: %s has %d privileges\n",
sid_string_dbg(&sid), privileges.count));