Lines Matching refs:TWG

108 	PSID pSid = TWG(impersonation_token_sid);  in tsrm_win32_get_path_sid_key()
248 TWG(impersonation_token) = NULL; in tsrm_win32_access()
257 if (TWG(impersonation_token_sid)) { in tsrm_win32_access()
258 free(TWG(impersonation_token_sid)); in tsrm_win32_access()
260 TWG(impersonation_token_sid) = NULL; in tsrm_win32_access()
265 if (!TWG(impersonation_token_sid) || !EqualSid(token_sid, TWG(impersonation_token_sid))) { in tsrm_win32_access()
266 if (TWG(impersonation_token_sid)) { in tsrm_win32_access()
267 free(TWG(impersonation_token_sid)); in tsrm_win32_access()
269 TWG(impersonation_token_sid) = token_sid; in tsrm_win32_access()
272 if (!DuplicateToken(thread_token, SecurityImpersonation, &TWG(impersonation_token))) { in tsrm_win32_access()
321 if(TWG(impersonation_token) == NULL) { in tsrm_win32_access()
338 …if(!AccessCheck((PSECURITY_DESCRIPTOR)psec_desc, TWG(impersonation_token), desired_access, &gen_ma… in tsrm_win32_access()
389 for (ptr = TWG(process); ptr < (TWG(process) + TWG(process_size)); ptr++) { in process_get()
395 if (ptr < (TWG(process) + TWG(process_size))) { in process_get()
399 newptr = (process_pair*)realloc((void*)TWG(process), (TWG(process_size)+1)*sizeof(process_pair)); in process_get()
404 TWG(process) = newptr; in process_get()
405 ptr = newptr + TWG(process_size); in process_get()
406 TWG(process_size)++; in process_get()
416 for (ptr = TWG(shm); ptr < (TWG(shm) + TWG(shm_size)); ptr++) { in shm_get()
427 if (ptr < (TWG(shm) + TWG(shm_size))) { in shm_get()
431 newptr = (shm_pair*)realloc((void*)TWG(shm), (TWG(shm_size)+1)*sizeof(shm_pair)); in shm_get()
436 TWG(shm) = newptr; in shm_get()
437 ptr = newptr + TWG(shm_size); in shm_get()
438 TWG(shm_size)++; in shm_get()
535 cmd = (char*)malloc(strlen(command)+strlen(TWG(comspec))+sizeof(" /c ")+2); in popen_ex()
540 sprintf(cmd, "%s /c \"%s\"", TWG(comspec), command); in popen_ex()