/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/ |
H A D | cli_samr.c | 29 uint32 access_mask, POLICY_HND *connect_pol) 43 init_samr_q_connect(&q, cli->cli->desthost, access_mask); 66 uint32 access_mask, POLICY_HND *connect_pol) 78 init_samr_q_connect4(&q, cli->cli->desthost, access_mask); 140 POLICY_HND *connect_pol, uint32 access_mask, 156 init_samr_q_open_domain(&q, connect_pol, access_mask, domain_sid); 179 POLICY_HND *domain_pol, uint32 access_mask, 194 init_samr_q_open_user(&q, domain_pol, access_mask, user_rid); 219 POLICY_HND *domain_pol, uint32 access_mask, 234 init_samr_q_open_group(&q, domain_pol, access_mask, group_ri 28 rpccli_samr_connect(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 access_mask, POLICY_HND *connect_pol) argument 65 rpccli_samr_connect4(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 access_mask, POLICY_HND *connect_pol) argument 139 rpccli_samr_open_domain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *connect_pol, uint32 access_mask, const DOM_SID *domain_sid, POLICY_HND *domain_pol) argument 177 rpccli_samr_open_user(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *domain_pol, uint32 access_mask, uint32 user_rid, POLICY_HND *user_pol) argument 217 rpccli_samr_open_group(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *domain_pol, uint32 access_mask, uint32 group_rid, POLICY_HND *group_pol) argument 257 rpccli_samr_create_dom_group(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *domain_pol, const char *group_name, uint32 access_mask, POLICY_HND *group_pol) argument 913 rpccli_samr_open_alias(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *domain_pol, uint32 access_mask, uint32 alias_rid, POLICY_HND *alias_pol) argument [all...] |
H A D | cli_reg.c | 38 uint32 access_mask, POLICY_HND *hnd) 47 init_reg_q_open_hive(&in, access_mask); 69 uint32 reg_type, uint32 access_mask, 99 access_mask, reg_hnd); 35 rpccli_reg_open_hive_int(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint16 op_code, const char *op_name, uint32 access_mask, POLICY_HND *hnd) argument 68 rpccli_reg_connect(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 reg_type, uint32 access_mask, POLICY_HND *reg_hnd) argument
|
H A D | cli_lsarpc.c | 1398 POLICY_HND *pol, DOM_SID *dom_sid, uint32 access_mask, 1411 init_lsa_q_open_trusted_domain(&q, pol, dom_sid, access_mask); 1470 POLICY_HND *pol, const char *name, uint32 access_mask, 1483 init_lsa_q_open_trusted_domain_by_name(&q, pol, name, access_mask); 1397 rpccli_lsa_open_trusted_domain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *pol, DOM_SID *dom_sid, uint32 access_mask, POLICY_HND *trustdom_pol) argument 1469 rpccli_lsa_open_trusted_domain_by_name(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *pol, const char *name, uint32 access_mask, POLICY_HND *trustdom_pol) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpcclient/ |
H A D | cmd_lsarpc.c | 916 uint32 access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; local 932 result = rpccli_lsa_open_policy2(cli, mem_ctx, True, access_mask, &pol); 958 uint32 access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; local 970 result = rpccli_lsa_open_policy2(cli, mem_ctx, True, access_mask, &pol); 996 uint32 access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; local 1013 result = rpccli_lsa_open_policy2(cli, mem_ctx, True, access_mask, &pol); 1019 &dom_sid, access_mask, &trustdom_pol);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | display_sec.c | 95 display_sec_access(&ace->access_mask);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/web/ |
H A D | statuspage.c | 138 if (e->access_mask & (FILE_READ_DATA|FILE_WRITE_DATA)) { 140 } else if (e->access_mask & FILE_WRITE_DATA) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | nttrans.c | 481 uint32 access_mask = IVAL(inbuf,smb_ntcreate_DesiredAccess); local 511 DEBUG(10,("reply_ntcreate_and_X: flags = 0x%x, access_mask = 0x%x " 516 (unsigned int)access_mask, 696 && (access_mask & DELETE_ACCESS)) { 719 access_mask, 757 access_mask, 800 access_mask, 1195 uint32 access_mask; local 1241 access_mask = IVAL(params,8); 1394 && (access_mask [all...] |
H A D | posix_acls.c | 1298 se_map_generic(&psa->access_mask, &file_generic_mapping); 1300 psa->access_mask &= (UNIX_ACCESS_NONE|FILE_ALL_ACCESS); 1302 if(psa->access_mask != UNIX_ACCESS_NONE) 1303 psa->access_mask &= ~UNIX_ACCESS_NONE; 1321 if (psa1->access_mask != psa2->access_mask) 1433 current_ace->perms |= map_nt_perms( &psa->access_mask, S_IRUSR); 2669 (nt_ace_list[i].access_mask == nt_ace_list[j].access_mask) && 2682 if (nt_ace_list[i].access_mask 3925 check_posix_acl_group_access(connection_struct *conn, const char *fname, SMB_STRUCT_STAT *psbuf, uint32 access_mask) argument 4280 can_access_file(connection_struct *conn, const char *fname, SMB_STRUCT_STAT *psbuf, uint32 access_mask) argument [all...] |
H A D | oplock.c | 824 SIVAL(msg,8,e->access_mask); 845 e->access_mask = IVAL(msg,8);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_parse/ |
H A D | parse_samr.c | 2181 uint32 access_mask, uint32 rid) 2186 q_c->access_mask = access_mask; 2209 if(!prs_uint32("access_mask", ps, depth, &q_u->access_mask)) 2527 uint32 access_mask) 2536 q_e->access_mask = access_mask; 2566 if(!prs_uint32("access", ps, depth, &q_e->access_mask)) 4101 uint32 access_mask, uint3 2179 init_samr_q_open_group(SAMR_Q_OPEN_GROUP * q_c, POLICY_HND *hnd, uint32 access_mask, uint32 rid) argument 2525 init_samr_q_create_dom_group(SAMR_Q_CREATE_DOM_GROUP * q_e, POLICY_HND *pol, const char *acct_desc, uint32 access_mask) argument 4100 init_samr_q_open_alias(SAMR_Q_OPEN_ALIAS * q_u, POLICY_HND *pol, uint32 access_mask, uint32 rid) argument 5114 init_samr_q_open_user(SAMR_Q_OPEN_USER * q_u, POLICY_HND *pol, uint32 access_mask, uint32 rid) argument 5182 init_samr_q_create_user(SAMR_Q_CREATE_USER * q_u, POLICY_HND *pol, const char *name, uint32 acb_info, uint32 access_mask) argument 7002 init_samr_q_connect(SAMR_Q_CONNECT * q_u, char *srv_name, uint32 access_mask) argument 7073 init_samr_q_connect4(SAMR_Q_CONNECT4 * q_u, char *srv_name, uint32 access_mask) argument 7149 init_samr_q_connect5(SAMR_Q_CONNECT5 * q_u, char *srv_name, uint32 access_mask) argument [all...] |
H A D | parse_sec.c | 56 if (!prs_uint32("access_mask", ps, depth, &psa->access_mask))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/modules/ |
H A D | nfs4_acls.c | 453 ace_v4->aceMask = ace_nt->access_mask & 460 if (ace_v4->aceMask!=ace_nt->access_mask) 461 DEBUG(9, ("ace_v4->aceMask(0x%x)!=ace_nt->access_mask(0x%x)\n", 462 ace_v4->aceMask, ace_nt->access_mask));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/alsa-lib-1.0.26/src/pcm/ |
H A D | pcm_alaw.c | 225 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local 227 &access_mask);
|
H A D | pcm_lfloat.c | 192 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local 196 &access_mask);
|
H A D | pcm_linear.c | 252 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local 255 &access_mask);
|
H A D | pcm_mulaw.c | 242 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local 244 &access_mask);
|
H A D | pcm_adpcm.c | 328 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local 330 &access_mask);
|
H A D | pcm_extplug.c | 209 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local 211 &access_mask);
|
H A D | pcm_iec958.c | 230 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local 232 &access_mask);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/librpc/ndr/ |
H A D | security.h | 186 uint32_t access_mask; member in struct:security_ace
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/locking/ |
H A D | locking.c | 453 "access_mask = 0x%x, mid = 0x%x, type= 0x%x, file_id = %lu, " 459 e->access_mask, e->op_mid, e->op_type, e->share_file_id, 946 e->access_mask = fsp->access_mask; 1187 if (!(fsp->access_mask & DELETE_ACCESS)) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/ |
H A D | py_ntsec.c | 63 "mask", ace->access_mask);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | rpc_lsa.h | 979 uint32 access_mask; /* access mask */ member in struct:lsa_q_open_trusted_domain 997 uint32 access_mask; /* access mask */ member in struct:lsa_q_open_trusted_domain_by_name
|
H A D | rpc_secdes.h | 83 SEC_ACCESS access_mask; member in struct:security_ace_info
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | nfs4.h | 159 uint32_t access_mask; member in struct:nfs4_ace
|