/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | util_seaccess.c | 34 uint32 mask = ace->access_mask; 101 uint32 mask = ace->access_mask; 150 void se_map_generic(uint32 *access_mask, struct generic_mapping *mapping) argument 152 uint32 old_mask = *access_mask; 154 if (*access_mask & GENERIC_READ_ACCESS) { 155 *access_mask &= ~GENERIC_READ_ACCESS; 156 *access_mask |= mapping->generic_read; 159 if (*access_mask & GENERIC_WRITE_ACCESS) { 160 *access_mask &= ~GENERIC_WRITE_ACCESS; 161 *access_mask | 185 se_map_standard(uint32 *access_mask, struct standard_mapping *mapping) argument [all...] |
H A D | secace.c | 49 ace_dest->access_mask = ace_src->access_mask; 65 t->access_mask = mask; 92 (*pp_new)[i].access_mask = mask; 109 ace[i].access_mask = mask; 167 s1->access_mask != s2->access_mask) {
|
H A D | secdesc.c | 497 init_sec_access(&new_ace->access_mask, ace->access_mask); 499 new_ace->access_mask, new_flags); 505 ace->type, ace->flags, ace->access_mask, 507 new_ace->access_mask));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/modules/ |
H A D | gpfs.c | 35 BOOL set_gpfs_sharemode(files_struct *fsp, uint32 access_mask, argument 51 allow |= (access_mask & (FILE_WRITE_DATA|FILE_APPEND_DATA| 53 allow |= (access_mask & (FILE_READ_DATA|FILE_EXECUTE)) ? 57 DEBUG(10, ("special case am=no_access:%x\n",access_mask)); 66 access_mask, allow, share_access, deny)); 211 BOOL set_gpfs_sharemode(files_struct *fsp, uint32 access_mask, argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | fake_file.c | 107 uint32 access_mask, 126 DEBUG(5,("open_fake_file_shared: fname = %s, FID = %d, access_mask = 0x%x\n", 127 fname, fsp->fnum, (unsigned int)access_mask)); 134 fsp->access_mask = access_mask; 104 open_fake_file(connection_struct *conn, enum FAKE_FILE_TYPE fake_file_type, const char *fname, uint32 access_mask, files_struct **result) argument
|
H A D | open.c | 272 uint32 access_mask, /* client requested access mask. */ 428 fsp->can_read = (access_mask & (FILE_READ_DATA)) ? True : False; 432 fsp->can_write = (access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) ? 481 uint32 access_mask, 484 DEBUG(10,("share_conflict: entry->access_mask = 0x%x, " 487 (unsigned int)entry->access_mask, 491 DEBUG(10,("share_conflict: access_mask = 0x%x, share_access = 0x%x\n", 492 (unsigned int)access_mask, (unsigned int)share_access)); 494 if ((entry->access_mask & (FILE_WRITE_DATA| 500 "entry->access_mask 264 open_file(files_struct *fsp, connection_struct *conn, const char *parent_dir, const char *name, const char *path, SMB_STRUCT_STAT *psbuf, int flags, mode_t unx_mode, uint32 access_mask, uint32 open_access_mask) argument 480 share_conflict(struct share_mode_entry *entry, uint32 access_mask, uint32 share_access) argument 622 is_stat_open(uint32 access_mask) argument 637 open_mode_check(connection_struct *conn, const char *fname, struct share_mode_lock *lck, uint32 access_mask, uint32 share_access, uint32 create_options, BOOL *file_existed) argument 936 fcb_or_dos_open(connection_struct *conn, const char *fname, SMB_DEV_T dev, SMB_INO_T inode, uint32 access_mask, uint32 share_access, uint32 create_options) argument 1002 uint32 access_mask; local 1171 open_file_ntcreate(connection_struct *conn, const char *fname, SMB_STRUCT_STAT *psbuf, uint32 access_mask, uint32 share_access, uint32 create_disposition, uint32 create_options, uint32 new_dos_attributes, int oplock_request, int *pinfo, files_struct **result) argument 2077 open_directory(connection_struct *conn, const char *fname, SMB_STRUCT_STAT *psbuf, uint32 access_mask, uint32 share_access, uint32 create_disposition, uint32 create_options, uint32 file_attributes, int *pinfo, files_struct **result) argument [all...] |
H A D | files.c | 529 uint32 access_mask, 555 dup_fsp->access_mask = access_mask; 562 dup_fsp->can_read = (access_mask & (FILE_READ_DATA)) ? True : False; 566 dup_fsp->can_write = (access_mask & (FILE_WRITE_DATA | FILE_APPEND_DATA)) ? True : False; 528 dup_file_fsp(files_struct *fsp, uint32 access_mask, uint32 share_access, uint32 create_options, files_struct **result) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpcclient/ |
H A D | cmd_samr.c | 328 uint32 access_mask, POLICY_HND *connect_pol) 332 result = rpccli_samr_connect4(cli, mem_ctx, access_mask, connect_pol); 334 result = rpccli_samr_connect(cli, mem_ctx, access_mask, 350 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 366 sscanf(argv[3], "%x", &access_mask); 386 access_mask, 404 access_mask, 544 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 560 sscanf(argv[3], "%x", &access_mask); 579 access_mask, 327 try_samr_connects(struct rpc_pipe_client *cli, TALLOC_CTX *mem_ctx, uint32 access_mask, POLICY_HND *connect_pol) argument 612 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 679 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 768 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 841 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 916 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 989 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 1068 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 1142 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 1218 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 1354 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 1454 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 1517 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 1577 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 1787 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 2027 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 2073 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local 2127 uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | disp_sec.c | 93 sec_ace->access_mask); 99 sec_ace->access_mask, 120 ads_disp_perms(sec_ace->access_mask);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/pcap2nbench/ |
H A D | ntcreateandxrequest.hpp | 44 uint32_t access_mask; member in struct:NtCreateAndXRequest
|
H A D | ntcreateandxrequest.cpp | 41 memcpy(&access_mask, data + 16, 4); 63 << "Access Mask: " << rhs.access_mask << std::endl
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | sharesec.c | 87 if (ace->access_mask == v->mask) { 96 got_mask = ace->access_mask; 100 if ((ace->access_mask & v->mask) == v->mask) { 110 fprintf(f, "0x%08x", ace->access_mask); 361 if (ace1->access_mask != ace2->access_mask) 362 return ace1->access_mask - ace2->access_mask;
|
H A D | status.c | 142 d_printf("0x%-8x ",(unsigned int)e->access_mask); 143 if ((e->access_mask & (FILE_READ_DATA|FILE_WRITE_DATA))== 146 } else if (e->access_mask & FILE_WRITE_DATA) {
|
H A D | smbcacls.c | 175 ace->type, ace->flags, ace->access_mask); 196 if (ace->access_mask == v->mask) { 205 got_mask = ace->access_mask; 209 if ((ace->access_mask & v->mask) == v->mask) { 219 fprintf(f, "0x%08x", ace->access_mask); 596 if (ace1->access_mask != ace2->access_mask) 597 return ace1->access_mask - ace2->access_mask;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | smb_share_modes.h | 51 uint32_t access_mask; member in struct:smb_share_mode_entry
|
H A D | rpc_samr.h | 1092 uint32 access_mask; member in struct:q_samr_create_dom_group_info 1234 uint32 access_mask; /* 0x001f000f */ member in struct:q_samr_create_dom_alias_info 1522 uint32 access_mask; /* 32 bit unknown - 0x02011b */ member in struct:q_samr_open_user_info 1546 uint32 access_mask; /* 0xe005 00b0 */ member in struct:q_samr_create_user_info 1648 uint32 access_mask; /* 0x0000 0001, 0x0000 0003, 0x0000 001f */ member in struct:q_samr_open_group_info 1727 uint32 access_mask; member in struct:q_samr_open_alias_info 1746 uint32 access_mask; member in struct:q_samr_connect_anon_info 1763 uint32 access_mask; member in struct:q_samr_connect_info 1783 uint32 access_mask; member in struct:q_samr_connect4_info 1794 uint32 access_mask; member in struct:q_samr_connect5_info [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | smb_share_modes.c | 139 e_entry->access_mask == (uint32_t)entry->access_mask && 158 out->access_mask = in->access_mask; 230 sme->access_mask = (uint32_t)share->access_mask;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/alsa-lib-1.0.26/src/pcm/ |
H A D | pcm_multi.c | 148 snd_pcm_access_mask_t access_mask; local 150 snd_pcm_access_mask_any(&access_mask); 151 snd_pcm_access_mask_reset(&access_mask, SND_PCM_ACCESS_MMAP_INTERLEAVED); 153 &access_mask); 193 const snd_pcm_access_mask_t *access_mask = snd_pcm_hw_param_get_mask(params, SND_PCM_HW_PARAM_ACCESS); local 194 if (!snd_pcm_access_mask_test(access_mask, SND_PCM_ACCESS_RW_INTERLEAVED) && 195 !snd_pcm_access_mask_test(access_mask, SND_PCM_ACCESS_RW_NONINTERLEAVED) && 196 !snd_pcm_access_mask_test(access_mask, SND_PCM_ACCESS_MMAP_NONINTERLEAVED)) { 226 snd_pcm_access_mask_t access_mask; local 228 snd_pcm_access_mask_any(&access_mask); [all...] |
H A D | pcm_shm.c | 229 const snd_pcm_access_mask_t *access_mask = snd_pcm_hw_param_get_mask(params, SND_PCM_HW_PARAM_ACCESS); local 230 if (!snd_pcm_access_mask_test(access_mask, SND_PCM_ACCESS_RW_INTERLEAVED) && 231 !snd_pcm_access_mask_test(access_mask, SND_PCM_ACCESS_RW_NONINTERLEAVED)) { 233 access_mask); 248 snd_pcm_access_mask_t access_mask; local 249 snd_mask_copy(&access_mask, snd_pcm_hw_param_get_mask(sparams, SND_PCM_HW_PARAM_ACCESS)); 250 snd_pcm_access_mask_set(&access_mask, SND_PCM_ACCESS_RW_INTERLEAVED); 251 snd_pcm_access_mask_set(&access_mask, SND_PCM_ACCESS_RW_NONINTERLEAVED); 253 &access_mask);
|
H A D | pcm_copy.c | 48 snd_pcm_access_mask_t access_mask = { SND_PCM_ACCBIT_SHM }; local 50 &access_mask);
|
H A D | pcm_share.c | 478 snd_pcm_access_mask_t access_mask; local 480 snd_pcm_access_mask_any(&access_mask); 481 snd_pcm_access_mask_reset(&access_mask, SND_PCM_ACCESS_MMAP_INTERLEAVED); 483 &access_mask); 543 const snd_pcm_access_mask_t *access_mask = snd_pcm_hw_param_get_mask(params, SND_PCM_HW_PARAM_ACCESS); local 544 if (!snd_pcm_access_mask_test(access_mask, SND_PCM_ACCESS_RW_INTERLEAVED) && 545 !snd_pcm_access_mask_test(access_mask, SND_PCM_ACCESS_RW_NONINTERLEAVED) && 546 !snd_pcm_access_mask_test(access_mask, SND_PCM_ACCESS_MMAP_NONINTERLEAVED)) { 573 snd_pcm_access_mask_t access_mask; local 575 snd_pcm_access_mask_any(&access_mask); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/nfsd/ |
H A D | nfs4acl.c | 242 ace->access_mask = deny_mask_from_posix(deny, flags); 250 ace->access_mask = mask_from_posix(pa->e_perm, flags | NFS4_ACL_OWNER); 262 ace->access_mask = deny_mask_from_posix(deny, flags); 270 ace->access_mask = mask_from_posix(pa->e_perm & pas.mask, 288 ace->access_mask = mask_from_posix(pas.group, flags); 297 ace->access_mask = mask_from_posix(pa->e_perm & pas.mask, 314 ace->access_mask = deny_mask_from_posix(deny, flags); 327 ace->access_mask = deny_mask_from_posix(deny, flags); 340 ace->access_mask = mask_from_posix(pa->e_perm, flags); 622 u32 mask = ace->access_mask; [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/afs/ |
H A D | security.c | 179 permit->access_mask = 198 permits->permits[count].access_mask = vnode->status.caller_access; 252 *_access = permit->access_mask;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/librpc/gen_ndr/ |
H A D | svcctl.h | 290 uint32_t access_mask; member in struct:svcctl_OpenSCManagerW::__anon5707 305 uint32_t access_mask; member in struct:svcctl_OpenServiceW::__anon5709 494 uint32_t access_mask; member in struct:svcctl_OpenSCManagerA::__anon5731 509 uint32_t access_mask; member in struct:svcctl_OpenServiceA::__anon5733
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/printing/ |
H A D | printfsp.c | 78 fsp->access_mask = FILE_GENERIC_WRITE;
|