TWG 108 TSRM/tsrm_win32.c PSID pSid = TWG(impersonation_token_sid); TWG 248 TSRM/tsrm_win32.c TWG(impersonation_token) = NULL; TWG 257 TSRM/tsrm_win32.c if (TWG(impersonation_token_sid)) { TWG 258 TSRM/tsrm_win32.c free(TWG(impersonation_token_sid)); TWG 260 TSRM/tsrm_win32.c TWG(impersonation_token_sid) = NULL; TWG 265 TSRM/tsrm_win32.c if (!TWG(impersonation_token_sid) || !EqualSid(token_sid, TWG(impersonation_token_sid))) { TWG 266 TSRM/tsrm_win32.c if (TWG(impersonation_token_sid)) { TWG 267 TSRM/tsrm_win32.c free(TWG(impersonation_token_sid)); TWG 269 TSRM/tsrm_win32.c TWG(impersonation_token_sid) = token_sid; TWG 272 TSRM/tsrm_win32.c if (!DuplicateToken(thread_token, SecurityImpersonation, &TWG(impersonation_token))) { TWG 321 TSRM/tsrm_win32.c if(TWG(impersonation_token) == NULL) { TWG 338 TSRM/tsrm_win32.c if(!AccessCheck((PSECURITY_DESCRIPTOR)psec_desc, TWG(impersonation_token), desired_access, &gen_map, &privilege_set, &priv_set_length, &granted_access, &fAccess)) { TWG 389 TSRM/tsrm_win32.c for (ptr = TWG(process); ptr < (TWG(process) + TWG(process_size)); ptr++) { TWG 395 TSRM/tsrm_win32.c if (ptr < (TWG(process) + TWG(process_size))) { TWG 399 TSRM/tsrm_win32.c newptr = (process_pair*)realloc((void*)TWG(process), (TWG(process_size)+1)*sizeof(process_pair)); TWG 404 TSRM/tsrm_win32.c TWG(process) = newptr; TWG 405 TSRM/tsrm_win32.c ptr = newptr + TWG(process_size); TWG 406 TSRM/tsrm_win32.c TWG(process_size)++; TWG 416 TSRM/tsrm_win32.c for (ptr = TWG(shm); ptr < (TWG(shm) + TWG(shm_size)); ptr++) { TWG 427 TSRM/tsrm_win32.c if (ptr < (TWG(shm) + TWG(shm_size))) { TWG 431 TSRM/tsrm_win32.c newptr = (shm_pair*)realloc((void*)TWG(shm), (TWG(shm_size)+1)*sizeof(shm_pair)); TWG 436 TSRM/tsrm_win32.c TWG(shm) = newptr; TWG 437 TSRM/tsrm_win32.c ptr = newptr + TWG(shm_size); TWG 438 TSRM/tsrm_win32.c TWG(shm_size)++; TWG 535 TSRM/tsrm_win32.c cmd = (char*)malloc(strlen(command)+strlen(TWG(comspec))+sizeof(" /c ")+2); TWG 540 TSRM/tsrm_win32.c sprintf(cmd, "%s /c \"%s\"", TWG(comspec), command);