/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/ntvfs/posix/ |
H A D | pvfs_setfileinfo.c | 317 uint32_t access_needed; local 327 access_needed = pvfs_setfileinfo_access(info); 328 if ((f->access_mask & access_needed) != access_needed) { 642 uint32_t access_needed; local 658 access_needed = pvfs_setfileinfo_access(info); 659 status = pvfs_access_check_simple(pvfs, req, name, access_needed);
|
H A D | pvfs_qfileinfo.c | 383 uint32_t access_needed; local 391 access_needed = pvfs_fileinfo_access(info); 392 if ((f->access_mask & access_needed) != access_needed) {
|
H A D | pvfs_acl.c | 619 uint32_t access_needed) 621 if (access_needed == 0) { 624 return pvfs_access_check(pvfs, req, name, &access_needed); 616 pvfs_access_check_simple(struct pvfs_state *pvfs, struct ntvfs_request *req, struct pvfs_filename *name, uint32_t access_needed) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/ntvfs/posix/ |
H A D | pvfs_setfileinfo.c | 317 uint32_t access_needed; local 327 access_needed = pvfs_setfileinfo_access(info); 328 if ((f->access_mask & access_needed) != access_needed) { 642 uint32_t access_needed; local 658 access_needed = pvfs_setfileinfo_access(info); 659 status = pvfs_access_check_simple(pvfs, req, name, access_needed);
|
H A D | pvfs_qfileinfo.c | 383 uint32_t access_needed; local 391 access_needed = pvfs_fileinfo_access(info); 392 if ((f->access_mask & access_needed) != access_needed) {
|
H A D | pvfs_acl.c | 619 uint32_t access_needed) 621 if (access_needed == 0) { 624 return pvfs_access_check(pvfs, req, name, &access_needed); 616 pvfs_access_check_simple(struct pvfs_state *pvfs, struct ntvfs_request *req, struct pvfs_filename *name, uint32_t access_needed) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/ntvfs/posix/ |
H A D | pvfs_setfileinfo.c | 317 uint32_t access_needed; local 327 access_needed = pvfs_setfileinfo_access(info); 328 if ((f->access_mask & access_needed) != access_needed) { 642 uint32_t access_needed; local 658 access_needed = pvfs_setfileinfo_access(info); 659 status = pvfs_access_check_simple(pvfs, req, name, access_needed);
|
H A D | pvfs_qfileinfo.c | 383 uint32_t access_needed; local 391 access_needed = pvfs_fileinfo_access(info); 392 if ((f->access_mask & access_needed) != access_needed) {
|
H A D | pvfs_acl.c | 619 uint32_t access_needed) 621 if (access_needed == 0) { 624 return pvfs_access_check(pvfs, req, name, &access_needed); 616 pvfs_access_check_simple(struct pvfs_state *pvfs, struct ntvfs_request *req, struct pvfs_filename *name, uint32_t access_needed) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/dsdb/samdb/ldb_modules/ |
H A D | acl.c | 53 uint32_t access_needed; member in struct:acl_context 377 &attr->attributeSecurityGUID, ac->access_needed, tree); 1009 ac->access_needed = SEC_ADS_READ_PROP; 1011 ot = insert_in_object_tree(req, oc_guid, NULL, ac->access_needed, NULL); 1016 ac->access_needed, 1021 ac->access_needed,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/dsdb/samdb/ldb_modules/ |
H A D | acl.c | 53 uint32_t access_needed; member in struct:acl_context 377 &attr->attributeSecurityGUID, ac->access_needed, tree); 1009 ac->access_needed = SEC_ADS_READ_PROP; 1011 ot = insert_in_object_tree(req, oc_guid, NULL, ac->access_needed, NULL); 1016 ac->access_needed, 1021 ac->access_needed,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/dsdb/samdb/ldb_modules/ |
H A D | acl.c | 53 uint32_t access_needed; member in struct:acl_context 377 &attr->attributeSecurityGUID, ac->access_needed, tree); 1009 ac->access_needed = SEC_ADS_READ_PROP; 1011 ot = insert_in_object_tree(req, oc_guid, NULL, ac->access_needed, NULL); 1016 ac->access_needed, 1021 ac->access_needed,
|