| /src/crypto/krb5/src/ccapi/common/win/OldCC/ |
| H A D | util.cxx | 126 DWORD alloc_token_user(HANDLE hToken, PTOKEN_USER *pptu) { in alloc_token_user() argument 131 GetTokenInformation(hToken, TokenUser, *pptu, 0, &size); in alloc_token_user() 140 if (!GetTokenInformation(hToken, TokenUser, *pptu, size, &size)) in alloc_token_user() 201 DWORD get_authentication_id(HANDLE hToken, LUID* pAuthId) { in get_authentication_id() argument 205 if (!GetTokenInformation(hToken, TokenStatistics, &ts, sizeof(ts), &len)) in get_authentication_id() 228 HANDLE hToken = 0; in alloc_name_NT() local 247 status = SecureClient::Token(hToken); in alloc_name_NT() 250 status = get_authentication_id(hToken, &auth_id); in alloc_name_NT() 259 if (!status) {status = alloc_token_user(hToken, &ptu);} in alloc_name_NT() 297 if (hToken && hToken != INVALID_HANDLE_VALUE) in alloc_name_NT() [all …]
|
| H A D | secure.cxx | 79 DWORD SecureClient::Token(HANDLE& hToken) { in Token() argument 82 hToken = 0; in Token() 90 GetCurrentProcess(), &hToken, 0, FALSE, in Token()
|
| H A D | secure.hxx | 37 static DWORD Token(HANDLE& hToken);
|
| /src/crypto/heimdal/lib/krb5/ |
| H A D | expand_path.c | 147 HANDLE hToken = NULL; in _expand_userid() local 157 &hToken)) { in _expand_userid() 165 if (!OpenProcessToken(hProcess, TOKEN_QUERY, &hToken)) in _expand_userid() 177 if (!GetTokenInformation(hToken, TokenOwner, NULL, 0, &len)) { in _expand_userid() 205 if (!GetTokenInformation(hToken, TokenOwner, pOwner, len, &len)) { in _expand_userid() 224 if (hToken != NULL) in _expand_userid() 225 CloseHandle(hToken); in _expand_userid()
|
| /src/crypto/krb5/src/lib/krb5/os/ |
| H A D | expand_path.c | 146 HANDLE hToken = NULL; in expand_userid() local 156 &hToken)) { in expand_userid() 164 if (!OpenProcessToken(hProcess, TOKEN_QUERY, &hToken)) in expand_userid() 174 if (!GetTokenInformation(hToken, TokenOwner, NULL, 0, &len)) { in expand_userid() 199 if (!GetTokenInformation(hToken, TokenOwner, pOwner, len, &len)) { in expand_userid() 220 if (hToken != NULL) in expand_userid() 221 CloseHandle(hToken); in expand_userid()
|
| /src/crypto/krb5/src/windows/kfwlogon/ |
| H A D | kfwlogon.c | 422 HANDLE hToken; member 434 GetSecurityLogonSessionData(HANDLE hToken, PSECURITY_LOGON_SESSION_DATA * ppSessionData) in GetSecurityLogonSessionData() argument 446 …Success = GetTokenInformation( hToken, TokenStatistics, &Stats, sizeof(TOKEN_STATISTICS), &ReqLen … in GetSecurityLogonSessionData() 479 GetSecurityLogonSessionData( pInfo->hToken, &pLogonSessionData ); in KFW_Logon_Event() 513 if (KFW_set_ccache_dacl(filename, pInfo->hToken)) { in KFW_Logon_Event() 519 if (KFW_obtain_user_temp_directory(pInfo->hToken, newfilename, sizeof(newfilename))) { in KFW_Logon_Event() 541 if (CreateProcessAsUser( pInfo->hToken, in KFW_Logon_Event()
|
| /src/crypto/openssh/ |
| H A D | auth-passwd.c | 106 HANDLE hToken = cygwin_logon_user(pw, password); in auth_password() local 108 if (hToken == INVALID_HANDLE_VALUE) in auth_password() 110 cygwin_set_impersonation_token(hToken); in auth_password()
|
| /src/contrib/ntp/ntpdate/ |
| H A D | ntpdate.c | 1560 HANDLE hToken; in init_alarm() 1618 if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &hToken)) { in init_alarm() 1627 AdjustTokenPrivileges(hToken, FALSE, &tkp, 0,(PTOKEN_PRIVILEGES) NULL, 0); in init_alarm()
|