Searched refs:access_mask (Results 26 - 50 of 70) sorted by relevance

123

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_client/
H A Dcli_samr.c29 uint32 access_mask, POLICY_HND *connect_pol)
43 init_samr_q_connect(&q, cli->cli->desthost, access_mask);
66 uint32 access_mask, POLICY_HND *connect_pol)
78 init_samr_q_connect4(&q, cli->cli->desthost, access_mask);
140 POLICY_HND *connect_pol, uint32 access_mask,
156 init_samr_q_open_domain(&q, connect_pol, access_mask, domain_sid);
179 POLICY_HND *domain_pol, uint32 access_mask,
194 init_samr_q_open_user(&q, domain_pol, access_mask, user_rid);
219 POLICY_HND *domain_pol, uint32 access_mask,
234 init_samr_q_open_group(&q, domain_pol, access_mask, group_ri
28 rpccli_samr_connect(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 access_mask, POLICY_HND *connect_pol) argument
65 rpccli_samr_connect4(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 access_mask, POLICY_HND *connect_pol) argument
139 rpccli_samr_open_domain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *connect_pol, uint32 access_mask, const DOM_SID *domain_sid, POLICY_HND *domain_pol) argument
177 rpccli_samr_open_user(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *domain_pol, uint32 access_mask, uint32 user_rid, POLICY_HND *user_pol) argument
217 rpccli_samr_open_group(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *domain_pol, uint32 access_mask, uint32 group_rid, POLICY_HND *group_pol) argument
257 rpccli_samr_create_dom_group(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *domain_pol, const char *group_name, uint32 access_mask, POLICY_HND *group_pol) argument
913 rpccli_samr_open_alias(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *domain_pol, uint32 access_mask, uint32 alias_rid, POLICY_HND *alias_pol) argument
[all...]
H A Dcli_reg.c38 uint32 access_mask, POLICY_HND *hnd)
47 init_reg_q_open_hive(&in, access_mask);
69 uint32 reg_type, uint32 access_mask,
99 access_mask, reg_hnd);
35 rpccli_reg_open_hive_int(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint16 op_code, const char *op_name, uint32 access_mask, POLICY_HND *hnd) argument
68 rpccli_reg_connect(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 reg_type, uint32 access_mask, POLICY_HND *reg_hnd) argument
H A Dcli_lsarpc.c1398 POLICY_HND *pol, DOM_SID *dom_sid, uint32 access_mask,
1411 init_lsa_q_open_trusted_domain(&q, pol, dom_sid, access_mask);
1470 POLICY_HND *pol, const char *name, uint32 access_mask,
1483 init_lsa_q_open_trusted_domain_by_name(&q, pol, name, access_mask);
1397 rpccli_lsa_open_trusted_domain(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *pol, DOM_SID *dom_sid, uint32 access_mask, POLICY_HND *trustdom_pol) argument
1469 rpccli_lsa_open_trusted_domain_by_name(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, POLICY_HND *pol, const char *name, uint32 access_mask, POLICY_HND *trustdom_pol) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpcclient/
H A Dcmd_lsarpc.c916 uint32 access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; local
932 result = rpccli_lsa_open_policy2(cli, mem_ctx, True, access_mask, &pol);
958 uint32 access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; local
970 result = rpccli_lsa_open_policy2(cli, mem_ctx, True, access_mask, &pol);
996 uint32 access_mask = SEC_RIGHTS_MAXIMUM_ALLOWED; local
1013 result = rpccli_lsa_open_policy2(cli, mem_ctx, True, access_mask, &pol);
1019 &dom_sid, access_mask, &trustdom_pol);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/
H A Ddisplay_sec.c95 display_sec_access(&ace->access_mask);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/web/
H A Dstatuspage.c138 if (e->access_mask & (FILE_READ_DATA|FILE_WRITE_DATA)) {
140 } else if (e->access_mask & FILE_WRITE_DATA) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/
H A Dnttrans.c481 uint32 access_mask = IVAL(inbuf,smb_ntcreate_DesiredAccess); local
511 DEBUG(10,("reply_ntcreate_and_X: flags = 0x%x, access_mask = 0x%x "
516 (unsigned int)access_mask,
696 && (access_mask & DELETE_ACCESS)) {
719 access_mask,
757 access_mask,
800 access_mask,
1195 uint32 access_mask; local
1241 access_mask = IVAL(params,8);
1394 && (access_mask
[all...]
H A Dposix_acls.c1298 se_map_generic(&psa->access_mask, &file_generic_mapping);
1300 psa->access_mask &= (UNIX_ACCESS_NONE|FILE_ALL_ACCESS);
1302 if(psa->access_mask != UNIX_ACCESS_NONE)
1303 psa->access_mask &= ~UNIX_ACCESS_NONE;
1321 if (psa1->access_mask != psa2->access_mask)
1433 current_ace->perms |= map_nt_perms( &psa->access_mask, S_IRUSR);
2669 (nt_ace_list[i].access_mask == nt_ace_list[j].access_mask) &&
2682 if (nt_ace_list[i].access_mask
3925 check_posix_acl_group_access(connection_struct *conn, const char *fname, SMB_STRUCT_STAT *psbuf, uint32 access_mask) argument
4280 can_access_file(connection_struct *conn, const char *fname, SMB_STRUCT_STAT *psbuf, uint32 access_mask) argument
[all...]
H A Doplock.c824 SIVAL(msg,8,e->access_mask);
845 e->access_mask = IVAL(msg,8);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_parse/
H A Dparse_samr.c2181 uint32 access_mask, uint32 rid)
2186 q_c->access_mask = access_mask;
2209 if(!prs_uint32("access_mask", ps, depth, &q_u->access_mask))
2527 uint32 access_mask)
2536 q_e->access_mask = access_mask;
2566 if(!prs_uint32("access", ps, depth, &q_e->access_mask))
4101 uint32 access_mask, uint3
2179 init_samr_q_open_group(SAMR_Q_OPEN_GROUP * q_c, POLICY_HND *hnd, uint32 access_mask, uint32 rid) argument
2525 init_samr_q_create_dom_group(SAMR_Q_CREATE_DOM_GROUP * q_e, POLICY_HND *pol, const char *acct_desc, uint32 access_mask) argument
4100 init_samr_q_open_alias(SAMR_Q_OPEN_ALIAS * q_u, POLICY_HND *pol, uint32 access_mask, uint32 rid) argument
5114 init_samr_q_open_user(SAMR_Q_OPEN_USER * q_u, POLICY_HND *pol, uint32 access_mask, uint32 rid) argument
5182 init_samr_q_create_user(SAMR_Q_CREATE_USER * q_u, POLICY_HND *pol, const char *name, uint32 acb_info, uint32 access_mask) argument
7002 init_samr_q_connect(SAMR_Q_CONNECT * q_u, char *srv_name, uint32 access_mask) argument
7073 init_samr_q_connect4(SAMR_Q_CONNECT4 * q_u, char *srv_name, uint32 access_mask) argument
7149 init_samr_q_connect5(SAMR_Q_CONNECT5 * q_u, char *srv_name, uint32 access_mask) argument
[all...]
H A Dparse_sec.c56 if (!prs_uint32("access_mask", ps, depth, &psa->access_mask))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/modules/
H A Dnfs4_acls.c453 ace_v4->aceMask = ace_nt->access_mask &
460 if (ace_v4->aceMask!=ace_nt->access_mask)
461 DEBUG(9, ("ace_v4->aceMask(0x%x)!=ace_nt->access_mask(0x%x)\n",
462 ace_v4->aceMask, ace_nt->access_mask));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/alsa-lib-1.0.26/src/pcm/
H A Dpcm_alaw.c225 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local
227 &access_mask);
H A Dpcm_lfloat.c192 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local
196 &access_mask);
H A Dpcm_linear.c252 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local
255 &access_mask);
H A Dpcm_mulaw.c242 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local
244 &access_mask);
H A Dpcm_adpcm.c328 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local
330 &access_mask);
H A Dpcm_extplug.c209 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local
211 &access_mask);
H A Dpcm_iec958.c230 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local
232 &access_mask);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/librpc/ndr/
H A Dsecurity.h186 uint32_t access_mask; member in struct:security_ace
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/locking/
H A Dlocking.c453 "access_mask = 0x%x, mid = 0x%x, type= 0x%x, file_id = %lu, "
459 e->access_mask, e->op_mid, e->op_type, e->share_file_id,
946 e->access_mask = fsp->access_mask;
1187 if (!(fsp->access_mask & DELETE_ACCESS)) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/python/
H A Dpy_ntsec.c63 "mask", ace->access_mask);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Drpc_lsa.h979 uint32 access_mask; /* access mask */ member in struct:lsa_q_open_trusted_domain
997 uint32 access_mask; /* access mask */ member in struct:lsa_q_open_trusted_domain_by_name
H A Drpc_secdes.h83 SEC_ACCESS access_mask; member in struct:security_ace_info
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dnfs4.h159 uint32_t access_mask; member in struct:nfs4_ace

Completed in 149 milliseconds

123