Lines Matching refs:TWG

112 	PSID pSid = TWG(impersonation_token_sid);  in tsrm_win32_get_path_sid_key()
264 TWG(impersonation_token) = NULL; in tsrm_win32_access()
273 if (TWG(impersonation_token_sid)) { in tsrm_win32_access()
274 free(TWG(impersonation_token_sid)); in tsrm_win32_access()
276 TWG(impersonation_token_sid) = NULL; in tsrm_win32_access()
281 if (!TWG(impersonation_token_sid) || !EqualSid(token_sid, TWG(impersonation_token_sid))) { in tsrm_win32_access()
282 if (TWG(impersonation_token_sid)) { in tsrm_win32_access()
283 free(TWG(impersonation_token_sid)); in tsrm_win32_access()
285 TWG(impersonation_token_sid) = token_sid; in tsrm_win32_access()
288 if (!DuplicateToken(thread_token, SecurityImpersonation, &TWG(impersonation_token))) { in tsrm_win32_access()
338 if(TWG(impersonation_token) == NULL) { in tsrm_win32_access()
355 …if(!AccessCheck((PSECURITY_DESCRIPTOR)psec_desc, TWG(impersonation_token), desired_access, &gen_ma… in tsrm_win32_access()
407 for (ptr = TWG(process); ptr < (TWG(process) + TWG(process_size)); ptr++) { in process_get()
413 if (ptr < (TWG(process) + TWG(process_size))) { in process_get()
417 newptr = (process_pair*)realloc((void*)TWG(process), (TWG(process_size)+1)*sizeof(process_pair)); in process_get()
422 TWG(process) = newptr; in process_get()
423 ptr = newptr + TWG(process_size); in process_get()
424 TWG(process_size)++; in process_get()
433 for (ptr = TWG(shm); ptr < (TWG(shm) + TWG(shm_size)); ptr++) { in shm_get()
444 if (ptr < (TWG(shm) + TWG(shm_size))) { in shm_get()
448 newptr = (shm_pair*)realloc((void*)TWG(shm), (TWG(shm_size)+1)*sizeof(shm_pair)); in shm_get()
453 TWG(shm) = newptr; in shm_get()
454 ptr = newptr + TWG(shm_size); in shm_get()
455 TWG(shm_size)++; in shm_get()
510 cmd = (char*)malloc(strlen(command)+strlen(TWG(comspec))+sizeof(" /c ")+2); in popen_ex()
515 sprintf(cmd, "%s /c \"%s\"", TWG(comspec), command); in popen_ex()