TWG 111 TSRM/tsrm_win32.c PSID pSid = TWG(impersonation_token_sid); TWG 250 TSRM/tsrm_win32.c TWG(impersonation_token) = NULL; TWG 259 TSRM/tsrm_win32.c if (TWG(impersonation_token_sid)) { TWG 260 TSRM/tsrm_win32.c free(TWG(impersonation_token_sid)); TWG 262 TSRM/tsrm_win32.c TWG(impersonation_token_sid) = NULL; TWG 267 TSRM/tsrm_win32.c if (!TWG(impersonation_token_sid) || !EqualSid(token_sid, TWG(impersonation_token_sid))) { TWG 268 TSRM/tsrm_win32.c if (TWG(impersonation_token_sid)) { TWG 269 TSRM/tsrm_win32.c free(TWG(impersonation_token_sid)); TWG 271 TSRM/tsrm_win32.c TWG(impersonation_token_sid) = token_sid; TWG 274 TSRM/tsrm_win32.c if (!DuplicateToken(thread_token, SecurityImpersonation, &TWG(impersonation_token))) { TWG 323 TSRM/tsrm_win32.c if(TWG(impersonation_token) == NULL) { TWG 340 TSRM/tsrm_win32.c if(!AccessCheck((PSECURITY_DESCRIPTOR)psec_desc, TWG(impersonation_token), desired_access, &gen_map, &privilege_set, &priv_set_length, &granted_access, &fAccess)) { TWG 391 TSRM/tsrm_win32.c for (ptr = TWG(process); ptr < (TWG(process) + TWG(process_size)); ptr++) { TWG 397 TSRM/tsrm_win32.c if (ptr < (TWG(process) + TWG(process_size))) { TWG 401 TSRM/tsrm_win32.c newptr = (process_pair*)realloc((void*)TWG(process), (TWG(process_size)+1)*sizeof(process_pair)); TWG 406 TSRM/tsrm_win32.c TWG(process) = newptr; TWG 407 TSRM/tsrm_win32.c ptr = newptr + TWG(process_size); TWG 408 TSRM/tsrm_win32.c TWG(process_size)++; TWG 417 TSRM/tsrm_win32.c for (ptr = TWG(shm); ptr < (TWG(shm) + TWG(shm_size)); ptr++) { TWG 428 TSRM/tsrm_win32.c if (ptr < (TWG(shm) + TWG(shm_size))) { TWG 432 TSRM/tsrm_win32.c newptr = (shm_pair*)realloc((void*)TWG(shm), (TWG(shm_size)+1)*sizeof(shm_pair)); TWG 437 TSRM/tsrm_win32.c TWG(shm) = newptr; TWG 438 TSRM/tsrm_win32.c ptr = newptr + TWG(shm_size); TWG 439 TSRM/tsrm_win32.c TWG(shm_size)++; TWG 536 TSRM/tsrm_win32.c cmd = (char*)malloc(strlen(command)+strlen(TWG(comspec))+sizeof(" /c ")+2); TWG 541 TSRM/tsrm_win32.c sprintf(cmd, "%s /c \"%s\"", TWG(comspec), command);