bool se_priv_copy( uint64_t *dst, const uint64_t *src )
{
if ( !dst || !src )
- return False;
+ return false;
memcpy( dst, src, sizeof(uint64_t) );
- return True;
+ return true;
}
/***************************************************************************
uint32 num_privs = count_all_privileges();
if (!se_priv_copy(privilege_mask, &se_priv_none)) {
- return False;
+ return false;
}
for ( i=0; i<num_privs; i++ ) {
se_priv_add(privilege_mask, &privs[i].privilege_mask);
}
- return True;
+ return true;
}
/***************************************************************************
for ( i=0; !se_priv_equal(&privs[i].privilege_mask, &se_priv_end); i++ ) {
if ( strequal( privs[i].name, name ) ) {
se_priv_copy( privilege_mask, &privs[i].privilege_mask );
- return True;
+ return true;
}
}
- return False;
+ return false;
}
/***************************************************************************
uint64_t p1, p2;
if ( !privileges || !check )
- return False;
+ return false;
/* everyone has privileges if you aren't checking for any */
if ( se_priv_empty( check ) ) {
DEBUG(1,("is_privilege_assigned: no privileges in check_mask!\n"));
- return True;
+ return true;
}
se_priv_copy( &p1, check );
/* invert the uint64_t we want to check for and remove that from the
original set. If we are left with the uint64_t we are checking
- for then return True */
+ for then return true */
se_priv_invert( &p1, check );
se_priv_copy( &p2, privileges );
uint64_t p1, p2;
if ( !privileges || !check )
- return False;
+ return false;
/* everyone has privileges if you aren't checking for any */
if ( se_priv_empty( check ) ) {
DEBUG(1,("is_any_privilege_assigned: no privileges in check_mask!\n"));
- return True;
+ return true;
}
se_priv_copy( &p1, check );
/* invert the uint64_t we want to check for and remove that from the
original set. If we are left with the uint64_t we are checking
- for then return True */
+ for then return true */
se_priv_invert( &p1, check );
se_priv_copy( &p2, privileges );
bool user_has_privileges(const struct security_token *token, const uint64_t *privilege_bit)
{
if ( !token )
- return False;
+ return false;
return is_privilege_assigned( &token->privilege_mask, privilege_bit );
}
bool user_has_any_privilege(struct security_token *token, const uint64_t *privilege_mask)
{
if ( !token )
- return False;
+ return false;
return is_any_privilege_assigned( &token->privilege_mask, privilege_mask );
}
new_set = TALLOC_REALLOC_ARRAY(priv_set->mem_ctx, priv_set->set, struct lsa_LUIDAttribute, priv_set->count + 1);
if ( !new_set ) {
DEBUG(0,("privilege_set_add: failed to allocate memory!\n"));
- return False;
+ return false;
}
new_set[priv_set->count].luid.high = set.luid.high;
priv_set->count++;
priv_set->set = new_set;
- return True;
+ return true;
}
/*******************************************************************
luid.luid.low = privs[i].luid;
if ( !privilege_set_add( set, luid ) )
- return False;
+ return false;
}
- return True;
+ return true;
}
/*******************************************************************
for ( i=0; i<num_privs; i++ ) {
if ( luid->low == privs[i].luid ) {
se_priv_copy( privilege_mask, &privs[i].privilege_mask );
- return True;
+ return true;
}
}
- return False;
+ return false;
}
/*******************************************************************
only care about the low 32 bits */
if ( privset->set[i].luid.high != 0 )
- return False;
+ return false;
if ( luid_to_se_priv( &privset->set[i].luid, &r ) )
se_priv_add( privilege_mask, &r );
}
- return True;
+ return true;
}