diff options
author | Günther Deschner <gd@samba.org> | 2010-06-03 10:36:05 +0200 |
---|---|---|
committer | Günther Deschner <gd@samba.org> | 2010-06-03 11:00:26 +0200 |
commit | b6a2cea74d90499bd3e239ab696502ae8afed30e (patch) | |
tree | 5b2796475ab3e334cd4d39fa25742d756a6b851c /source3/rpc_server/srv_samr_nt.c | |
parent | 102b0cfe62c6486846cdfb4938a83e2be4aad912 (diff) | |
download | samba-b6a2cea74d90499bd3e239ab696502ae8afed30e.tar.gz samba-b6a2cea74d90499bd3e239ab696502ae8afed30e.tar.bz2 samba-b6a2cea74d90499bd3e239ab696502ae8afed30e.zip |
s3-security: use shared "Standard access rights.".
Guenther
Diffstat (limited to 'source3/rpc_server/srv_samr_nt.c')
-rw-r--r-- | source3/rpc_server/srv_samr_nt.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/source3/rpc_server/srv_samr_nt.c b/source3/rpc_server/srv_samr_nt.c index 30c5c5e839..fda8515e12 100644 --- a/source3/rpc_server/srv_samr_nt.c +++ b/source3/rpc_server/srv_samr_nt.c @@ -779,7 +779,7 @@ NTSTATUS _samr_QuerySecurity(pipes_struct *p, size_t sd_size = 0; cinfo = policy_handle_find(p, r->in.handle, - STD_RIGHT_READ_CONTROL_ACCESS, NULL, + SEC_STD_READ_CONTROL, NULL, struct samr_connect_info, &status); if (NT_STATUS_IS_OK(status)) { DEBUG(5,("_samr_QuerySecurity: querying security on SAM\n")); @@ -789,7 +789,7 @@ NTSTATUS _samr_QuerySecurity(pipes_struct *p, } dinfo = policy_handle_find(p, r->in.handle, - STD_RIGHT_READ_CONTROL_ACCESS, NULL, + SEC_STD_READ_CONTROL, NULL, struct samr_domain_info, &status); if (NT_STATUS_IS_OK(status)) { DEBUG(5,("_samr_QuerySecurity: querying security on Domain " @@ -804,7 +804,7 @@ NTSTATUS _samr_QuerySecurity(pipes_struct *p, } uinfo = policy_handle_find(p, r->in.handle, - STD_RIGHT_READ_CONTROL_ACCESS, NULL, + SEC_STD_READ_CONTROL, NULL, struct samr_user_info, &status); if (NT_STATUS_IS_OK(status)) { DEBUG(10,("_samr_QuerySecurity: querying security on user " @@ -825,7 +825,7 @@ NTSTATUS _samr_QuerySecurity(pipes_struct *p, } ginfo = policy_handle_find(p, r->in.handle, - STD_RIGHT_READ_CONTROL_ACCESS, NULL, + SEC_STD_READ_CONTROL, NULL, struct samr_group_info, &status); if (NT_STATUS_IS_OK(status)) { /* @@ -843,7 +843,7 @@ NTSTATUS _samr_QuerySecurity(pipes_struct *p, } ainfo = policy_handle_find(p, r->in.handle, - STD_RIGHT_READ_CONTROL_ACCESS, NULL, + SEC_STD_READ_CONTROL, NULL, struct samr_alias_info, &status); if (NT_STATUS_IS_OK(status)) { /* @@ -5699,7 +5699,7 @@ NTSTATUS _samr_DeleteUser(pipes_struct *p, DEBUG(5, ("_samr_DeleteUser: %d\n", __LINE__)); uinfo = policy_handle_find(p, r->in.user_handle, - STD_RIGHT_DELETE_ACCESS, NULL, + SEC_STD_DELETE, NULL, struct samr_user_info, &status); if (!NT_STATUS_IS_OK(status)) { return status; @@ -5767,7 +5767,7 @@ NTSTATUS _samr_DeleteDomainGroup(pipes_struct *p, DEBUG(5, ("samr_DeleteDomainGroup: %d\n", __LINE__)); ginfo = policy_handle_find(p, r->in.group_handle, - STD_RIGHT_DELETE_ACCESS, NULL, + SEC_STD_DELETE, NULL, struct samr_group_info, &status); if (!NT_STATUS_IS_OK(status)) { return status; @@ -5817,7 +5817,7 @@ NTSTATUS _samr_DeleteDomAlias(pipes_struct *p, DEBUG(5, ("_samr_DeleteDomAlias: %d\n", __LINE__)); ainfo = policy_handle_find(p, r->in.alias_handle, - STD_RIGHT_DELETE_ACCESS, NULL, + SEC_STD_DELETE, NULL, struct samr_alias_info, &status); if (!NT_STATUS_IS_OK(status)) { return status; |