mask 83 examples/VFS/skel_opaque.c static SMB_STRUCT_DIR *skel_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask 85 examples/VFS/skel_opaque.c return vfswrap_opendir(NULL, fname, mask, attr);
mask 77 examples/VFS/skel_transparent.c static SMB_STRUCT_DIR *skel_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask 79 examples/VFS/skel_transparent.c return SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask 591 lib/util/util.h _PUBLIC_ bool same_net_v4(struct in_addr ip1,struct in_addr ip2,struct in_addr mask);
mask 154 lib/util/util_net.c _PUBLIC_ bool same_net_v4(struct in_addr ip1, struct in_addr ip2, struct in_addr mask)
mask 158 lib/util/util_net.c nmask = ntohl(mask.s_addr);
mask 324 lib/util/util_net.c const struct sockaddr *mask)
mask 335 lib/util/util_net.c struct sockaddr_in6 mask_6 = *(const struct sockaddr_in6 *)mask;
mask 354 lib/util/util_net.c ((const struct sockaddr_in *)mask)->sin_addr);
mask 52 lib/zlib/contrib/infback9/inftree9.c unsigned mask; /* mask for low root bits */
mask 203 lib/zlib/contrib/infback9/inftree9.c mask = used - 1; /* mask for comparing low */
mask 253 lib/zlib/contrib/infback9/inftree9.c if (len > root && (huff & mask) != low) {
mask 277 lib/zlib/contrib/infback9/inftree9.c low = huff & mask;
mask 296 lib/zlib/contrib/infback9/inftree9.c if (drop != 0 && (huff & mask) != low) {
mask 205 lib/zlib/examples/gun.c unsigned mask; /* mask for current bits codes */
mask 239 lib/zlib/examples/gun.c mask = 0x1ff;
mask 263 lib/zlib/examples/gun.c if (end >= mask && bits < max) {
mask 266 lib/zlib/examples/gun.c mask <<= 1;
mask 267 lib/zlib/examples/gun.c mask++;
mask 292 lib/zlib/examples/gun.c code &= mask; /* mask to current code length */
mask 300 lib/zlib/examples/gun.c mask = 0x1ff;
mask 333 lib/zlib/examples/gun.c if (end < mask) {
mask 52 lib/zlib/inftrees.c unsigned mask; /* mask for low root bits */
mask 209 lib/zlib/inftrees.c mask = used - 1; /* mask for comparing low */
mask 260 lib/zlib/inftrees.c if (len > root && (huff & mask) != low) {
mask 284 lib/zlib/inftrees.c low = huff & mask;
mask 303 lib/zlib/inftrees.c if (drop != 0 && (huff & mask) != low) {
mask 61 libcli/security/secace.c uint32_t mask, uint8_t flag)
mask 66 libcli/security/secace.c t->access_mask = mask;
mask 75 libcli/security/secace.c NTSTATUS sec_ace_add_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, unsigned *num, struct dom_sid *sid, uint32_t mask)
mask 92 libcli/security/secace.c (*pp_new)[i].access_mask = mask;
mask 101 libcli/security/secace.c NTSTATUS sec_ace_mod_sid(struct security_ace *ace, size_t num, struct dom_sid *sid, uint32_t mask)
mask 109 libcli/security/secace.c ace[i].access_mask = mask;
mask 29 libcli/security/secace.h uint32_t mask, uint8_t flag);
mask 30 libcli/security/secace.h NTSTATUS sec_ace_add_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, unsigned *num, struct dom_sid *sid, uint32_t mask);
mask 31 libcli/security/secace.h NTSTATUS sec_ace_mod_sid(struct security_ace *ace, size_t num, struct dom_sid *sid, uint32_t mask);
mask 1709 librpc/gen_ndr/cli_netlogon.c uint32_t mask /* [in] */,
mask 1723 librpc/gen_ndr/cli_netlogon.c r.in.mask = mask;
mask 275 librpc/gen_ndr/cli_netlogon.h uint32_t mask /* [in] */,
mask 14062 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_samr_AcctFlags(ndr, NDR_SCALARS, r->in.mask));
mask 14150 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_samr_AcctFlags(ndr, NDR_SCALARS, &r->in.mask));
mask 14249 librpc/gen_ndr/ndr_netlogon.c ndr_print_samr_AcctFlags(ndr, "mask", r->in.mask);
mask 1562 librpc/gen_ndr/netlogon.h uint32_t mask;
mask 712 source3/client/client.c static void do_list_helper(const char *mntpoint, file_info *f, const char *mask, void *state)
mask 719 source3/client/client.c dir = talloc_strdup(ctx, mask);
mask 747 source3/client/client.c mask);
mask 783 source3/client/client.c void do_list(const char *mask,
mask 807 source3/client/client.c add_to_do_list_queue(mask);
mask 858 source3/client/client.c if (cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetpath)) {
mask 865 source3/client/client.c d_printf("do_list: [%s] %s\n", mask, cli_errstr(cli));
mask 881 source3/client/client.c char *mask = NULL;
mask 886 source3/client/client.c mask = talloc_strdup(ctx, client_get_cur_dir());
mask 887 source3/client/client.c if (!mask) {
mask 894 source3/client/client.c mask = talloc_strdup(ctx, buf);
mask 896 source3/client/client.c mask = talloc_asprintf_append(mask, "%s", buf);
mask 899 source3/client/client.c mask = talloc_asprintf_append(mask, "*");
mask 901 source3/client/client.c if (!mask) {
mask 910 source3/client/client.c do_list(mask, attribute, display_finfo, recurse, true);
mask 927 source3/client/client.c char *mask = NULL;
mask 932 source3/client/client.c mask = talloc_strdup(ctx, client_get_cur_dir());
mask 933 source3/client/client.c if (!mask) {
mask 936 source3/client/client.c if ((mask[0] != '\0') && (mask[strlen(mask)-1]!=CLI_DIRSEP_CHAR)) {
mask 937 source3/client/client.c mask = talloc_asprintf_append(mask, "%s", CLI_DIRSEP_STR);
mask 938 source3/client/client.c if (!mask) {
mask 946 source3/client/client.c mask = talloc_strdup(ctx, buf);
mask 948 source3/client/client.c mask = talloc_asprintf_append(mask, "%s", buf);
mask 951 source3/client/client.c mask = talloc_strdup(ctx, "*");
mask 954 source3/client/client.c do_list(mask, attribute, do_du, recurse, true);
mask 1438 source3/client/client.c char *mask = NULL;
mask 1441 source3/client/client.c mask = talloc_strdup(ctx, client_get_cur_dir());
mask 1442 source3/client/client.c if (!mask) {
mask 1452 source3/client/client.c mask = talloc_asprintf_append(mask, "%s", buf);
mask 1453 source3/client/client.c if (!mask) {
mask 1470 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask 1495 source3/client/client.c do_mkdir(mask);
mask 2102 source3/client/client.c char *mask = NULL;
mask 2104 source3/client/client.c mask = talloc_asprintf(ctx,
mask 2109 source3/client/client.c if (!mask) {
mask 2114 source3/client/client.c TALLOC_FREE(mask);
mask 2118 source3/client/client.c if (!cli_unlink(finfo->cli, mask)) {
mask 2120 source3/client/client.c cli_errstr(finfo->cli),mask);
mask 2122 source3/client/client.c TALLOC_FREE(mask);
mask 2132 source3/client/client.c char *mask = NULL;
mask 2140 source3/client/client.c mask = talloc_strdup(ctx, client_get_cur_dir());
mask 2141 source3/client/client.c if (!mask) {
mask 2148 source3/client/client.c mask = talloc_asprintf_append(mask, "%s", buf);
mask 2149 source3/client/client.c if (!mask) {
mask 2153 source3/client/client.c do_list(mask,attribute,do_del,false,false);
mask 2164 source3/client/client.c char *mask = NULL;
mask 2182 source3/client/client.c mask = talloc_asprintf(ctx, "%s%s",
mask 2185 source3/client/client.c if (!mask) {
mask 2189 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask 2190 source3/client/client.c d_printf("cmd_wdel %s: %s\n", mask, cli_errstr(cli));
mask 2206 source3/client/client.c char *mask = NULL;
mask 2216 source3/client/client.c mask = talloc_asprintf(ctx,
mask 2220 source3/client/client.c if (!mask) {
mask 2224 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask 2225 source3/client/client.c d_printf("open %s: %s\n", mask, cli_errstr(cli));
mask 2292 source3/client/client.c char *mask = NULL;
mask 2303 source3/client/client.c mask = talloc_asprintf(ctx,
mask 2307 source3/client/client.c if (!mask) {
mask 2317 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask 2318 source3/client/client.c d_printf("posix_open %s: %s\n", mask, cli_errstr(cli));
mask 2340 source3/client/client.c char *mask = NULL;
mask 2351 source3/client/client.c mask = talloc_asprintf(ctx,
mask 2355 source3/client/client.c if (!mask) {
mask 2365 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask 2366 source3/client/client.c d_printf("posix_mkdir %s: %s\n", mask, cli_errstr(cli));
mask 2382 source3/client/client.c char *mask = NULL;
mask 2391 source3/client/client.c mask = talloc_asprintf(ctx,
mask 2395 source3/client/client.c if (!mask) {
mask 2399 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask 2400 source3/client/client.c d_printf("posix_unlink %s: %s\n", mask, cli_errstr(cli));
mask 2416 source3/client/client.c char *mask = NULL;
mask 2425 source3/client/client.c mask = talloc_asprintf(ctx,
mask 2429 source3/client/client.c if (!mask) {
mask 2433 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask 2434 source3/client/client.c d_printf("posix_rmdir %s: %s\n", mask, cli_errstr(cli));
mask 2656 source3/client/client.c char *mask = NULL;
mask 2665 source3/client/client.c mask = talloc_asprintf(ctx,
mask 2669 source3/client/client.c if (!mask) {
mask 2673 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask 2674 source3/client/client.c d_printf("rmdir %s: %s\n", mask, cli_errstr(cli));
mask 2680 source3/client/client.c cli_errstr(targetcli),mask);
mask 4110 source3/client/client.c const char *mask,
mask 31 source3/client/client_proto.h void do_list(const char *mask,
mask 1578 source3/client/clitar.c char *mask = talloc_asprintf(ctx,
mask 1581 source3/client/clitar.c if (!mask) {
mask 1584 source3/client/clitar.c DEBUG(5, ("process_tar, do_list with mask: %s\n", mask));
mask 1585 source3/client/clitar.c do_list(mask,attribute,do_tar,False, True);
mask 1586 source3/client/clitar.c TALLOC_FREE(mask);
mask 33 source3/include/privileges.h uint32 mask[SE_PRIV_MASKSIZE];
mask 600 source3/include/proto.h NTSTATUS privilege_enum_sids(const SE_PRIV *mask, TALLOC_CTX *mem_ctx,
mask 619 source3/include/proto.h bool se_priv_put_all_privileges(SE_PRIV *mask);
mask 620 source3/include/proto.h void se_priv_add( SE_PRIV *mask, const SE_PRIV *addpriv );
mask 621 source3/include/proto.h void se_priv_remove( SE_PRIV *mask, const SE_PRIV *removepriv );
mask 623 source3/include/proto.h bool se_priv_from_name( const char *name, SE_PRIV *mask );
mask 624 source3/include/proto.h void dump_se_priv( int dbg_cl, int dbg_lvl, const SE_PRIV *mask );
mask 631 source3/include/proto.h LUID_ATTR get_privilege_luid( SE_PRIV *mask );
mask 633 source3/include/proto.h bool se_priv_to_privilege_set( PRIVILEGE_SET *set, SE_PRIV *mask );
mask 634 source3/include/proto.h bool privilege_set_to_se_priv( SE_PRIV *mask, struct lsa_PrivilegeSet *privset );
mask 682 source3/include/proto.h NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size);
mask 683 source3/include/proto.h NTSTATUS sec_desc_mod_sid(SEC_DESC *sd, DOM_SID *sid, uint32 mask);
mask 1354 source3/include/proto.h const struct sockaddr *mask);
mask 6243 source3/include/proto.h const char *mask,
mask 6277 source3/include/proto.h const char *mask,
mask 6287 source3/include/proto.h const char *name, const char *mask, uint32 attr);
mask 7172 source3/include/proto.h void nb_findfirst(const char *mask);
mask 316 source3/include/vfs.h SMB_STRUCT_DIR *(*opendir)(struct vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attributes);
mask 40 source3/include/vfs_macros.h #define SMB_VFS_OPENDIR(conn, fname, mask, attr) ((conn)->vfs.ops.opendir((conn)->vfs.handles.opendir, (fname), (mask), (attr)))
mask 174 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_OPENDIR(conn, fname, mask, attr) ((conn)->vfs_opaque.ops.opendir((conn)->vfs_opaque.handles.opendir, (fname), (mask), (attr)))
mask 308 source3/include/vfs_macros.h #define SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr) ((handle)->vfs_next.ops.opendir((handle)->vfs_next.handles.opendir, (fname), (mask), (attr)))
mask 40 source3/lib/privileges.c static bool get_privileges( const DOM_SID *sid, SE_PRIV *mask )
mask 69 source3/lib/privileges.c se_priv_copy( mask, (SE_PRIV*)data.dptr );
mask 79 source3/lib/privileges.c static bool set_privileges( const DOM_SID *sid, SE_PRIV *mask )
mask 102 source3/lib/privileges.c data.dptr = (uint8 *)mask;
mask 115 source3/lib/privileges.c SE_PRIV mask;
mask 124 source3/lib/privileges.c if ( !get_privileges( &slist[i], &mask ) )
mask 129 source3/lib/privileges.c dump_se_priv( DBGC_ALL, 5, &mask );
mask 131 source3/lib/privileges.c se_priv_add( privileges, &mask );
mask 163 source3/lib/privileges.c SE_PRIV mask;
mask 165 source3/lib/privileges.c se_priv_copy( &mask, (SE_PRIV*)rec->value.dptr );
mask 170 source3/lib/privileges.c if ( !is_privilege_assigned( &mask, &priv->privilege) )
mask 229 source3/lib/privileges.c NTSTATUS privilege_enum_sids(const SE_PRIV *mask, TALLOC_CTX *mem_ctx,
mask 241 source3/lib/privileges.c se_priv_copy(&priv.privilege, mask);
mask 289 source3/lib/privileges.c SE_PRIV mask;
mask 291 source3/lib/privileges.c if (! se_priv_from_name(name, &mask)) {
mask 297 source3/lib/privileges.c return grant_privilege( sid, &mask );
mask 306 source3/lib/privileges.c SE_PRIV mask;
mask 310 source3/lib/privileges.c if ( !get_privileges( sid, &mask ) )
mask 316 source3/lib/privileges.c dump_se_priv( DBGC_ALL, 10, &mask );
mask 318 source3/lib/privileges.c se_priv_remove( &mask, priv_mask );
mask 321 source3/lib/privileges.c dump_se_priv( DBGC_ALL, 10, &mask );
mask 323 source3/lib/privileges.c return set_privileges( sid, &mask );
mask 341 source3/lib/privileges.c SE_PRIV mask;
mask 343 source3/lib/privileges.c if (! se_priv_from_name(name, &mask)) {
mask 349 source3/lib/privileges.c return revoke_privilege(sid, &mask);
mask 475 source3/lib/privileges.c SE_PRIV mask;
mask 477 source3/lib/privileges.c return get_privileges( sid, &mask );
mask 485 source3/lib/privileges.c SE_PRIV mask;
mask 487 source3/lib/privileges.c if (!se_priv_put_all_privileges(&mask)) {
mask 491 source3/lib/privileges.c return grant_privilege( sid, &mask );
mask 131 source3/lib/privileges_basic.c bool se_priv_put_all_privileges(SE_PRIV *mask)
mask 136 source3/lib/privileges_basic.c if (!se_priv_copy(mask, &se_priv_none)) {
mask 140 source3/lib/privileges_basic.c se_priv_add(mask, &privs[i].se_priv);
mask 149 source3/lib/privileges_basic.c void se_priv_add( SE_PRIV *mask, const SE_PRIV *addpriv )
mask 154 source3/lib/privileges_basic.c mask->mask[i] |= addpriv->mask[i];
mask 163 source3/lib/privileges_basic.c void se_priv_remove( SE_PRIV *mask, const SE_PRIV *removepriv )
mask 168 source3/lib/privileges_basic.c mask->mask[i] &= ~removepriv->mask[i];
mask 176 source3/lib/privileges_basic.c static void se_priv_invert( SE_PRIV *new_mask, const SE_PRIV *mask )
mask 181 source3/lib/privileges_basic.c se_priv_remove( &allprivs, mask );
mask 198 source3/lib/privileges_basic.c static bool se_priv_empty( const SE_PRIV *mask )
mask 203 source3/lib/privileges_basic.c se_priv_copy( &p1, mask );
mask 206 source3/lib/privileges_basic.c p1.mask[i] &= se_priv_all.mask[i];
mask 216 source3/lib/privileges_basic.c bool se_priv_from_name( const char *name, SE_PRIV *mask )
mask 222 source3/lib/privileges_basic.c se_priv_copy( mask, &privs[i].se_priv );
mask 234 source3/lib/privileges_basic.c void dump_se_priv( int dbg_cl, int dbg_lvl, const SE_PRIV *mask )
mask 241 source3/lib/privileges_basic.c DEBUGADDC( dbg_cl, dbg_lvl,(" 0x%x", mask->mask[i] ));
mask 383 source3/lib/privileges_basic.c LUID_ATTR get_privilege_luid( SE_PRIV *mask )
mask 392 source3/lib/privileges_basic.c if ( se_priv_equal( &privs[i].se_priv, mask ) ) {
mask 451 source3/lib/privileges_basic.c bool se_priv_to_privilege_set( PRIVILEGE_SET *set, SE_PRIV *mask )
mask 461 source3/lib/privileges_basic.c if ( !is_privilege_assigned(mask, &privs[i].se_priv) )
mask 476 source3/lib/privileges_basic.c static bool luid_to_se_priv( struct lsa_LUID *luid, SE_PRIV *mask )
mask 483 source3/lib/privileges_basic.c se_priv_copy( mask, &privs[i].se_priv );
mask 494 source3/lib/privileges_basic.c bool privilege_set_to_se_priv( SE_PRIV *mask, struct lsa_PrivilegeSet *privset )
mask 498 source3/lib/privileges_basic.c ZERO_STRUCTP( mask );
mask 510 source3/lib/privileges_basic.c se_priv_add( mask, &r );
mask 441 source3/lib/secdesc.c NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size)
mask 453 source3/lib/secdesc.c status = sec_ace_add_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid, mask);
mask 474 source3/lib/secdesc.c NTSTATUS sec_desc_mod_sid(SEC_DESC *sd, DOM_SID *sid, uint32 mask)
mask 481 source3/lib/secdesc.c status = sec_ace_mod_sid(sd->dacl->aces, sd->dacl->num_aces, sid, mask);
mask 25 source3/libads/disp_sec.c uint32 mask;
mask 70 source3/libads/disp_sec.c if (perms[j].mask == (((unsigned) 1) << i)) {
mask 71 source3/libads/disp_sec.c printf("\n\t%s (0x%08x)", perms[j].str, perms[j].mask);
mask 27 source3/libgpo/gpo_filesync.c char *mask;
mask 33 source3/libgpo/gpo_filesync.c const char *mask,
mask 111 source3/libgpo/gpo_filesync.c DEBUG(3,("calling cli_list with mask: %s\n", ctx->mask));
mask 114 source3/libgpo/gpo_filesync.c ctx->mask,
mask 119 source3/libgpo/gpo_filesync.c ctx->mask, cli_errstr(ctx->cli)));
mask 132 source3/libgpo/gpo_filesync.c const char *mask,
mask 148 source3/libgpo/gpo_filesync.c mask, info->name));
mask 174 source3/libgpo/gpo_filesync.c ctx->mask = talloc_asprintf(ctx->mem_ctx,
mask 177 source3/libgpo/gpo_filesync.c if (!ctx->local_path || !ctx->mask || !ctx->remote_path) {
mask 226 source3/libgpo/gpo_filesync.c ctx.mask = talloc_asprintf(mem_ctx,
mask 229 source3/libgpo/gpo_filesync.c if (!ctx.mask) {
mask 692 source3/libgpo/gpo_reg.c uint32_t mask;
mask 698 source3/libgpo/gpo_reg.c mask = REG_KEY_ALL;
mask 702 source3/libgpo/gpo_reg.c mask, 0);
mask 704 source3/libgpo/gpo_reg.c mask = REG_KEY_ALL;
mask 708 source3/libgpo/gpo_reg.c mask, 0);
mask 710 source3/libgpo/gpo_reg.c mask = REG_KEY_READ;
mask 714 source3/libgpo/gpo_reg.c mask, 0);
mask 720 source3/libgpo/gpo_reg.c mask = REG_KEY_ALL;
mask 724 source3/libgpo/gpo_reg.c mask, inherit_flags);
mask 726 source3/libgpo/gpo_reg.c mask = REG_KEY_ALL;
mask 730 source3/libgpo/gpo_reg.c mask, inherit_flags);
mask 732 source3/libgpo/gpo_reg.c mask = REG_KEY_READ;
mask 736 source3/libgpo/gpo_reg.c mask, inherit_flags);
mask 232 source3/libsmb/clilist.c char *mask = NULL;
mask 254 source3/libsmb/clilist.c mask = SMB_STRDUP(Mask);
mask 255 source3/libsmb/clilist.c if (!mask) {
mask 261 source3/libsmb/clilist.c size_t nlen = 2*(strlen(mask)+1);
mask 282 source3/libsmb/clilist.c p += clistr_push(cli, param+12, mask,
mask 300 source3/libsmb/clilist.c p += clistr_push(cli, param+12, mask,
mask 411 source3/libsmb/clilist.c if (!First && *mask && strcsequal(finfo.name, mask)) {
mask 419 source3/libsmb/clilist.c SAFE_FREE(mask);
mask 421 source3/libsmb/clilist.c mask = SMB_STRDUP(finfo.name);
mask 423 source3/libsmb/clilist.c mask = SMB_STRDUP("");
mask 425 source3/libsmb/clilist.c if (!mask) {
mask 486 source3/libsmb/clilist.c SAFE_FREE(mask);
mask 549 source3/libsmb/clilist.c char *mask = NULL;
mask 554 source3/libsmb/clilist.c mask = SMB_STRDUP(Mask);
mask 555 source3/libsmb/clilist.c if (!mask) {
mask 576 source3/libsmb/clilist.c p += clistr_push(cli, p, first?mask:"",
mask 609 source3/libsmb/clilist.c SAFE_FREE(mask);
mask 665 source3/libsmb/clilist.c SAFE_FREE(mask);
mask 239 source3/libsmb/libsmb_dir.c const char *mask,
mask 1209 source3/libsmb/libsmb_dir.c const char *mask,
mask 270 source3/libsmb/libsmb_xattr.c uint32_t mask;
mask 274 source3/libsmb/libsmb_xattr.c uint32 mask;
mask 357 source3/libsmb/libsmb_xattr.c amask = v->mask;
mask 369 source3/libsmb/libsmb_xattr.c amask |= v->mask;
mask 387 source3/libsmb/libsmb_xattr.c mask = amask;
mask 388 source3/libsmb/libsmb_xattr.c init_sec_ace(ace, &sid, atype, mask, aflags);
mask 104 source3/locking/posix.c SMB_OFF_T mask = (mask2<<1);
mask 105 source3/locking/posix.c SMB_OFF_T max_positive_lock_offset = ~mask;
mask 231 source3/modules/nfs4_acls.c uint32_t mask;
mask 270 source3/modules/nfs4_acls.c mask = ace->aceMask;
mask 272 source3/modules/nfs4_acls.c ace->aceType, mask,
mask 28 source3/modules/onefs.h const char *fname, const char *mask,
mask 249 source3/modules/onefs_dir.c onefs_opendir(vfs_handle_struct *handle, const char *fname, const char *mask,
mask 259 source3/modules/onefs_dir.c return SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask 263 source3/modules/onefs_dir.c ret_dirp = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask 476 source3/modules/vfs_afsacl.c uint32 mask;
mask 542 source3/modules/vfs_afsacl.c (ace->access_mask == m->mask) )
mask 33 source3/modules/vfs_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr);
mask 148 source3/modules/vfs_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask 152 source3/modules/vfs_audit.c result = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask 45 source3/modules/vfs_cap.c static SMB_STRUCT_DIR *cap_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask 53 source3/modules/vfs_cap.c return SMB_VFS_NEXT_OPENDIR(handle, capname, mask, attr);
mask 94 source3/modules/vfs_catia.c const char *fname, const char *mask, uint32 attr)
mask 102 source3/modules/vfs_catia.c return SMB_VFS_NEXT_OPENDIR(handle, name, mask, attr);
mask 155 source3/modules/vfs_default.c static SMB_STRUCT_DIR *vfswrap_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask 89 source3/modules/vfs_dirsort.c const char *fname, const char *mask,
mask 102 source3/modules/vfs_dirsort.c data->source_directory = SMB_VFS_NEXT_OPENDIR(handle, fname, mask,
mask 36 source3/modules/vfs_extd_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr);
mask 159 source3/modules/vfs_extd_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask 163 source3/modules/vfs_extd_audit.c result = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask 95 source3/modules/vfs_full_audit.c const char *fname, const char *mask, uint32 attr);
mask 1077 source3/modules/vfs_full_audit.c const char *fname, const char *mask, uint32 attr)
mask 1081 source3/modules/vfs_full_audit.c result = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask 174 source3/modules/vfs_netatalk.c static SMB_STRUCT_DIR *atalk_opendir(struct vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask 178 source3/modules/vfs_netatalk.c ret = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask 55 source3/modules/vfs_notify_fam.c uint32_t mask; /* the inotify mask */
mask 171 source3/modules/vfs_onefs_shadow_copy.c const char *mask, uint32_t attr)
mask 174 source3/modules/vfs_onefs_shadow_copy.c (handle, cpath ?: path, mask, attr),
mask 74 source3/modules/vfs_shadow_copy.c static SMB_STRUCT_DIR *shadow_copy_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask 77 source3/modules/vfs_shadow_copy.c SMB_STRUCT_DIR *p = SMB_VFS_NEXT_OPENDIR(handle,fname,mask,attr);
mask 346 source3/modules/vfs_shadow_copy2.c const char *fname, const char *mask, uint32 attr)
mask 348 source3/modules/vfs_shadow_copy2.c SHADOW2_NEXT(OPENDIR, (handle, name, mask, attr), SMB_STRUCT_DIR *, NULL);
mask 39 source3/pam_smbpass/general.h unsigned int mask; /* shall assume 32 bits of flags */
mask 58 source3/pam_smbpass/general.h #define set(x,ctrl) (ctrl = ((ctrl)&smb_args[x].mask)|smb_args[x].flag)
mask 232 source3/pam_smbpass/support.c ctrl &= smb_args[j].mask; /* for turning things off */
mask 1701 source3/rpc_server/srv_lsa_nt.c SE_PRIV mask;
mask 1718 source3/rpc_server/srv_lsa_nt.c if ( !get_privileges_for_sids( &mask, &info->sid, 1 ) )
mask 1723 source3/rpc_server/srv_lsa_nt.c if ( se_priv_to_privilege_set( &privileges, &mask ) ) {
mask 1860 source3/rpc_server/srv_lsa_nt.c SE_PRIV mask;
mask 1876 source3/rpc_server/srv_lsa_nt.c if ( !privilege_set_to_se_priv( &mask, set ) )
mask 1879 source3/rpc_server/srv_lsa_nt.c if ( !grant_privilege( &info->sid, &mask ) ) {
mask 1883 source3/rpc_server/srv_lsa_nt.c dump_se_priv( DBGC_ALL, 3, &mask );
mask 1899 source3/rpc_server/srv_lsa_nt.c SE_PRIV mask;
mask 1916 source3/rpc_server/srv_lsa_nt.c if ( !privilege_set_to_se_priv( &mask, set ) )
mask 1919 source3/rpc_server/srv_lsa_nt.c if ( !revoke_privilege( &info->sid, &mask ) ) {
mask 1923 source3/rpc_server/srv_lsa_nt.c dump_se_priv( DBGC_ALL, 3, &mask );
mask 2244 source3/rpc_server/srv_lsa_nt.c SE_PRIV mask;
mask 2264 source3/rpc_server/srv_lsa_nt.c if ( !get_privileges_for_sids( &mask, &sid, 1 ) )
mask 2269 source3/rpc_server/srv_lsa_nt.c if ( se_priv_to_privilege_set( &privileges, &mask ) ) {
mask 2294 source3/rpc_server/srv_lsa_nt.c SE_PRIV mask;
mask 2312 source3/rpc_server/srv_lsa_nt.c if ( !se_priv_from_name( name, &mask ) )
mask 2315 source3/rpc_server/srv_lsa_nt.c priv_luid = get_privilege_luid( &mask );
mask 298 source3/rpcclient/cmd_netlogon.c uint32_t mask = 0;
mask 315 source3/rpcclient/cmd_netlogon.c mask = atoi(argv[2]);
mask 341 source3/rpcclient/cmd_netlogon.c mask,
mask 74 source3/smbd/dir.c const char *mask,
mask 82 source3/smbd/dir.c char *mask2 = talloc_strdup(ctx, mask);
mask 784 source3/smbd/dir.c uint32 mask;
mask 793 source3/smbd/dir.c mask = ((dirtype >> 8) & (aDIR|aARCH|aRONLY|aHIDDEN|aSYSTEM)); /* & 0x37 */
mask 794 source3/smbd/dir.c if(mask) {
mask 795 source3/smbd/dir.c if((mask & (mode & (aDIR|aARCH|aRONLY|aHIDDEN|aSYSTEM))) == mask) /* check if matching attribute present */
mask 806 source3/smbd/dir.c const char *mask)
mask 813 source3/smbd/dir.c return mask_match_search(mname,mask,False);
mask 822 source3/smbd/dir.c const char *mask,
mask 863 source3/smbd/dir.c if ((strcmp(mask,"*.*") == 0) ||
mask 864 source3/smbd/dir.c mask_match_search(filename,mask,False) ||
mask 865 source3/smbd/dir.c mangle_mask_match(conn,filename,mask)) {
mask 929 source3/smbd/dir.c mask,
mask 1108 source3/smbd/dir.c const char *name, const char *mask, uint32 attr)
mask 1128 source3/smbd/dir.c dirp->dir = SMB_VFS_OPENDIR(conn, dirp->dir_path, mask, attr);
mask 545 source3/smbd/dosmode.c int mask=0;
mask 627 source3/smbd/dosmode.c mask |= (S_ISUID | S_ISGID);
mask 631 source3/smbd/dosmode.c mask |= S_ISVTX;
mask 636 source3/smbd/dosmode.c mask |= S_IXUSR;
mask 638 source3/smbd/dosmode.c mask |= S_IXGRP;
mask 640 source3/smbd/dosmode.c mask |= S_IXOTH;
mask 642 source3/smbd/dosmode.c unixmode |= (st->st_mode & mask);
mask 50 source3/smbd/notify_inotify.c static int inotify_add_watch(int fd, const char *path, __u32 mask)
mask 52 source3/smbd/notify_inotify.c return syscall(__NR_inotify_add_watch, fd, path, mask);
mask 88 source3/smbd/notify_inotify.c uint32_t mask; /* the inotify mask */
mask 112 source3/smbd/notify_inotify.c e->mask, w->mask, w->filter));
mask 114 source3/smbd/notify_inotify.c if ((e->mask & w->mask) == 0) {
mask 121 source3/smbd/notify_inotify.c if (e->mask & IN_ISDIR) {
mask 126 source3/smbd/notify_inotify.c if ((e->mask & IN_ATTRIB) &&
mask 134 source3/smbd/notify_inotify.c if ((e->mask & IN_MODIFY) &&
mask 162 source3/smbd/notify_inotify.c e->mask, e->len ? e->name : ""));
mask 165 source3/smbd/notify_inotify.c if ((e->mask & (IN_ATTRIB|IN_MODIFY|IN_CREATE|IN_DELETE|
mask 172 source3/smbd/notify_inotify.c if (e->mask & IN_CREATE) {
mask 174 source3/smbd/notify_inotify.c } else if (e->mask & IN_DELETE) {
mask 176 source3/smbd/notify_inotify.c } else if (e->mask & IN_MOVED_FROM) {
mask 182 source3/smbd/notify_inotify.c } else if (e->mask & IN_MOVED_TO) {
mask 208 source3/smbd/notify_inotify.c (e->mask & IN_ISDIR) != 0) {
mask 213 source3/smbd/notify_inotify.c e->mask = IN_ATTRIB;
mask 379 source3/smbd/notify_inotify.c uint32_t mask;
mask 393 source3/smbd/notify_inotify.c mask = inotify_map(e);
mask 394 source3/smbd/notify_inotify.c if (mask == 0) {
mask 401 source3/smbd/notify_inotify.c mask |= (IN_MASK_ADD | IN_ONLYDIR);
mask 404 source3/smbd/notify_inotify.c wd = inotify_add_watch(in->fd, e->path, mask);
mask 412 source3/smbd/notify_inotify.c e->path, mask, wd));
mask 425 source3/smbd/notify_inotify.c w->mask = mask;
mask 1105 source3/smbd/posix_acls.c static mode_t map_nt_perms( uint32 *mask, int type)
mask 1111 source3/smbd/posix_acls.c if((*mask) & GENERIC_ALL_ACCESS)
mask 1114 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IRUSR : 0;
mask 1115 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWUSR : 0;
mask 1116 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXUSR : 0;
mask 1120 source3/smbd/posix_acls.c if((*mask) & GENERIC_ALL_ACCESS)
mask 1123 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IRGRP : 0;
mask 1124 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWGRP : 0;
mask 1125 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXGRP : 0;
mask 1129 source3/smbd/posix_acls.c if((*mask) & GENERIC_ALL_ACCESS)
mask 1132 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IROTH : 0;
mask 1133 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWOTH : 0;
mask 1134 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXOTH : 0;
mask 2856 source3/smbd/posix_acls.c #define MAP_PERM(p,mask,result) (((p) & (mask)) ? (result) : 0 )
mask 3007 source3/smbd/posix_acls.c uint32_t mask, uint8_t flags)
mask 3019 source3/smbd/posix_acls.c nt_ace_list[i].access_mask = mask;
mask 3026 source3/smbd/posix_acls.c init_sec_ace(&nt_ace_list[(*num_aces)++], sid, type, mask, flags);
mask 1250 source3/smbd/reply.c const char *mask = NULL;
mask 1347 source3/smbd/reply.c mask = p + 1;
mask 1351 source3/smbd/reply.c mask = directory;
mask 1369 source3/smbd/reply.c mask,
mask 1393 source3/smbd/reply.c mask = dptr_wcard(dptr_num);
mask 1394 source3/smbd/reply.c if (!mask) {
mask 1401 source3/smbd/reply.c mask_contains_wcard = ms_has_wild(mask);
mask 1449 source3/smbd/reply.c mask,
mask 1462 source3/smbd/reply.c mask,
mask 1535 source3/smbd/reply.c mask,
mask 2419 source3/smbd/reply.c char *mask = NULL;
mask 2438 source3/smbd/reply.c mask = name;
mask 2442 source3/smbd/reply.c mask = p+1;
mask 2454 source3/smbd/reply.c if (!VALID_STAT(sbuf) && mangle_is_mangled(mask,conn->params)) {
mask 2457 source3/smbd/reply.c mask,
mask 2461 source3/smbd/reply.c mask = new_mask;
mask 2469 source3/smbd/reply.c mask);
mask 2497 source3/smbd/reply.c if (strequal(mask,"????????.???")) {
mask 2498 source3/smbd/reply.c mask[0] = '*';
mask 2499 source3/smbd/reply.c mask[1] = '\0';
mask 2507 source3/smbd/reply.c dir_hnd = OpenDir(talloc_tos(), conn, directory, mask,
mask 2534 source3/smbd/reply.c if(!mask_match(dname, mask, conn->case_sensitive)) {
mask 5616 source3/smbd/reply.c uint32 mask;
mask 5618 source3/smbd/reply.c mask = is_dir ? FILE_NOTIFY_CHANGE_DIR_NAME
mask 5628 source3/smbd/reply.c notify_fname(conn, NOTIFY_ACTION_OLD_NAME, mask, oldpath);
mask 5629 source3/smbd/reply.c notify_fname(conn, NOTIFY_ACTION_NEW_NAME, mask, newpath);
mask 5632 source3/smbd/reply.c notify_fname(conn, NOTIFY_ACTION_REMOVED, mask, oldpath);
mask 5633 source3/smbd/reply.c notify_fname(conn, NOTIFY_ACTION_ADDED, mask, newpath);
mask 5870 source3/smbd/reply.c char *mask = NULL;
mask 5915 source3/smbd/reply.c mask = name;
mask 5922 source3/smbd/reply.c mask = p+1;
mask 5935 source3/smbd/reply.c if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) {
mask 5938 source3/smbd/reply.c mask,
mask 5942 source3/smbd/reply.c mask = new_mask;
mask 5955 source3/smbd/reply.c mask);
mask 6044 source3/smbd/reply.c if (strequal(mask,"????????.???")) {
mask 6045 source3/smbd/reply.c mask[0] = '*';
mask 6046 source3/smbd/reply.c mask[1] = '\0';
mask 6054 source3/smbd/reply.c dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, attrs);
mask 6084 source3/smbd/reply.c if(!mask_match(dname, mask, conn->case_sensitive)) {
mask 6441 source3/smbd/reply.c const char *mask = NULL;
mask 6570 source3/smbd/reply.c mask = p+1;
mask 6573 source3/smbd/reply.c mask = name;
mask 6591 source3/smbd/reply.c if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) {
mask 6594 source3/smbd/reply.c mask,
mask 6598 source3/smbd/reply.c mask = new_mask;
mask 6605 source3/smbd/reply.c mask);
mask 6646 source3/smbd/reply.c if (strequal(mask,"????????.???")) {
mask 6647 source3/smbd/reply.c mask = mask_star;
mask 6657 source3/smbd/reply.c dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, 0);
mask 6679 source3/smbd/reply.c if(!mask_match(dname, mask, conn->case_sensitive)) {
mask 6819 source3/smbd/reply.c uint32 mask = 0;
mask 6834 source3/smbd/reply.c mask = (~0) << (31 - i);
mask 6836 source3/smbd/reply.c if(low & mask)
mask 1071 source3/smbd/trans2.c const char *mask)
mask 1073 source3/smbd/trans2.c if (mask[0] == '.' && mask[1] == 0)
mask 1079 source3/smbd/trans2.c return strcmp(str,mask)==0;
mask 1081 source3/smbd/trans2.c return StrCaseCmp(str,mask) == 0;
mask 1242 source3/smbd/trans2.c const char *mask = NULL;
mask 1276 source3/smbd/trans2.c mask = talloc_strdup(ctx,"*.*");
mask 1278 source3/smbd/trans2.c mask = p+1;
mask 1281 source3/smbd/trans2.c mask = path_mask;
mask 1329 source3/smbd/trans2.c if(!(got_match = *got_exact_match = exact_match(conn, fname, mask))) {
mask 1330 source3/smbd/trans2.c got_match = mask_match(fname, mask, conn->case_sensitive);
mask 1347 source3/smbd/trans2.c if(!(got_match = *got_exact_match = exact_match(conn, mangled_name, mask))) {
mask 1348 source3/smbd/trans2.c got_match = mask_match(mangled_name, mask, conn->case_sensitive);
mask 1894 source3/smbd/trans2.c char *mask = NULL;
mask 1982 source3/smbd/trans2.c ntstatus = unix_convert(ctx, conn, directory, True, &directory, &mask, &sbuf);
mask 1998 source3/smbd/trans2.c mask = talloc_strdup(ctx,"*");
mask 1999 source3/smbd/trans2.c if (!mask) {
mask 2014 source3/smbd/trans2.c DEBUG(5,("dir=%s, mask = %s\n",directory, mask));
mask 2070 source3/smbd/trans2.c mask,
mask 2081 source3/smbd/trans2.c DEBUG(4,("dptr_num is %d, wcard = %s, attr = %d\n", dptr_num, mask, dirtype));
mask 2109 source3/smbd/trans2.c mask,dirtype,info_level,
mask 2189 source3/smbd/trans2.c mask, directory, dirtype, numentries ) );
mask 2199 source3/smbd/trans2.c if(!mangle_is_8_3_wildcards( mask, False, conn->params)) {
mask 2201 source3/smbd/trans2.c name_to_8_3(mask, mangled_name, True, conn->params);
mask 2236 source3/smbd/trans2.c const char *mask = NULL;
mask 2385 source3/smbd/trans2.c mask = p;
mask 2392 source3/smbd/trans2.c dptr_num, mask, dirtype,
mask 2460 source3/smbd/trans2.c mask,dirtype,info_level,
mask 2490 source3/smbd/trans2.c mask, directory, dirtype, numentries ) );
mask 312 source3/torture/masktest.c static void testpair(struct cli_state *cli, const char *mask, const char *file)
mask 341 source3/torture/masktest.c cli_list(cli, mask, aHIDDEN | aDIR, listfn, NULL);
mask 343 source3/torture/masktest.c res2 = reg_test(cli, mask, long_name, short_name);
mask 349 source3/torture/masktest.c res1, res2, count, mask, file, long_name, short_name));
mask 362 source3/torture/masktest.c char *mask, *file;
mask 374 source3/torture/masktest.c mask = talloc_asprintf(ctx,
mask 380 source3/torture/masktest.c if (!mask || !file) {
mask 383 source3/torture/masktest.c testpair(cli, mask, file);
mask 393 source3/torture/masktest.c mask = TALLOC_ARRAY(ctx, char, strlen("\\masktest\\")+1+22);
mask 395 source3/torture/masktest.c if (!mask || !file) {
mask 398 source3/torture/masktest.c memcpy(mask,"\\masktest\\",strlen("\\masktest\\")+1);
mask 400 source3/torture/masktest.c l = strlen(mask);
mask 402 source3/torture/masktest.c mask[i+l] = maskchars[random() % mc_len];
mask 404 source3/torture/masktest.c mask[l+l1] = 0;
mask 413 source3/torture/masktest.c strcmp(mask+l,"..") == 0) continue;
mask 417 source3/torture/masktest.c testpair(cli, mask, file);
mask 420 source3/torture/masktest.c TALLOC_FREE(mask);
mask 264 source3/torture/nbio.c void nb_findfirst(const char *mask)
mask 266 source3/torture/nbio.c cli_list(c, mask, 0, find_fn, NULL);
mask 307 source3/torture/nbio.c char *mask;
mask 308 source3/torture/nbio.c if (asprintf(&mask, "%s\\*", dname) == -1) {
mask 314 source3/torture/nbio.c cli_list(c, mask, aDIR, delete_fn, NULL);
mask 315 source3/torture/nbio.c free(mask);
mask 4503 source3/torture/torture.c static void del_fn(const char *mnt, file_info *finfo, const char *mask, void *state)
mask 5291 source3/torture/torture.c static void shortname_del_fn(const char *mnt, file_info *finfo, const char *mask, void *state)
mask 27 source3/utils/net_rpc.c static bool sync_files(struct copy_clistate *cp_clistate, const char *mask);
mask 3193 source3/utils/net_rpc.c const char *mask, void *state)
mask 3210 source3/utils/net_rpc.c DEBUG(3,("got mask: %s, name: %s\n", mask, f->name));
mask 3296 source3/utils/net_rpc.c static bool sync_files(struct copy_clistate *cp_clistate, const char *mask)
mask 3301 source3/utils/net_rpc.c DEBUG(3,("calling cli_list with mask: %s\n", mask));
mask 3304 source3/utils/net_rpc.c mask, &targetcli, &targetpath ) ) {
mask 3306 source3/utils/net_rpc.c mask, cli_errstr(cp_clistate->cli_share_src));
mask 3312 source3/utils/net_rpc.c mask, cli_errstr(targetcli));
mask 3391 source3/utils/net_rpc.c const char *mask = "\\*";
mask 3467 source3/utils/net_rpc.c if (!sync_files(&cp_clistate, mask)) {
mask 626 source3/utils/net_sam.c SE_PRIV mask;
mask 643 source3/utils/net_sam.c if (se_priv_from_name(argv[0], &mask)) {
mask 648 source3/utils/net_sam.c status = privilege_enum_sids(&mask, talloc_tos(),
mask 680 source3/utils/net_sam.c SE_PRIV mask;
mask 696 source3/utils/net_sam.c if (!se_priv_from_name(argv[i], &mask)) {
mask 701 source3/utils/net_sam.c if (!grant_privilege(&sid, &mask)) {
mask 718 source3/utils/net_sam.c SE_PRIV mask;
mask 735 source3/utils/net_sam.c if (!se_priv_from_name(argv[i], &mask)) {
mask 740 source3/utils/net_sam.c if (!revoke_privilege(&sid, &mask)) {
mask 38 source3/utils/sharesec.c uint32 mask;
mask 92 source3/utils/sharesec.c if (ace->access_mask == v->mask) {
mask 105 source3/utils/sharesec.c if ((ace->access_mask & v->mask) == v->mask) {
mask 109 source3/utils/sharesec.c got_mask &= ~v->mask;
mask 161 source3/utils/sharesec.c uint32_t mask;
mask 252 source3/utils/sharesec.c amask = v->mask;
mask 264 source3/utils/sharesec.c amask |= v->mask;
mask 286 source3/utils/sharesec.c mask = amask;
mask 287 source3/utils/sharesec.c init_sec_ace(ace, &sid, atype, mask, aflags);
mask 40 source3/utils/smbcacls.c uint32 mask;
mask 297 source3/utils/smbcacls.c if (ace->access_mask == v->mask) {
mask 310 source3/utils/smbcacls.c if ((ace->access_mask & v->mask) == v->mask) {
mask 314 source3/utils/smbcacls.c got_mask &= ~v->mask;
mask 371 source3/utils/smbcacls.c uint32_t mask;
mask 486 source3/utils/smbcacls.c amask = v->mask;
mask 498 source3/utils/smbcacls.c amask |= v->mask;
mask 520 source3/utils/smbcacls.c mask = amask;
mask 521 source3/utils/smbcacls.c init_sec_ace(ace, &sid, atype, mask, aflags);
mask 512 source4/client/client.c static void do_list_helper(struct clilist_file_info *f, const char *mask, void *state)
mask 526 source4/client/client.c mask2 = talloc_strdup(NULL, mask);
mask 545 source4/client/client.c static void do_list(struct smbclient_context *ctx, const char *mask,uint16_t attribute,
mask 565 source4/client/client.c add_to_do_list_queue(mask);
mask 602 source4/client/client.c if (smbcli_list(ctx->cli->tree, mask, attribute, do_list_helper, ctx) == -1)
mask 604 source4/client/client.c d_printf("%s listing %s\n", smbcli_errstr(ctx->cli->tree), mask);
mask 618 source4/client/client.c char *mask;
mask 623 source4/client/client.c mask = talloc_strdup(ctx, ctx->remote_cur_dir);
mask 624 source4/client/client.c if(mask[strlen(mask)-1]!='\\')
mask 625 source4/client/client.c mask = talloc_append_string(ctx, mask,"\\");
mask 628 source4/client/client.c mask = talloc_strdup(ctx, args[1]);
mask 629 source4/client/client.c if (mask[0] != '\\')
mask 630 source4/client/client.c mask = talloc_append_string(ctx, mask, "\\");
mask 631 source4/client/client.c dos_format(mask);
mask 636 source4/client/client.c mask = talloc_append_string(ctx, mask, "*.*");
mask 638 source4/client/client.c mask = talloc_append_string(ctx, mask, "*");
mask 642 source4/client/client.c do_list(ctx, mask, attribute, display_finfo, ctx->recurse, true);
mask 659 source4/client/client.c char *mask;
mask 665 source4/client/client.c mask = talloc_strdup(ctx, args[1]);
mask 667 source4/client/client.c mask = talloc_asprintf(ctx, "%s\\%s", ctx->remote_cur_dir, args[1]);
mask 668 source4/client/client.c dos_format(mask);
mask 670 source4/client/client.c mask = talloc_asprintf(ctx, "%s\\*", ctx->remote_cur_dir);
mask 673 source4/client/client.c do_list(ctx, mask, attribute, do_du, ctx->recurse, true);
mask 675 source4/client/client.c talloc_free(mask);
mask 1022 source4/client/client.c char *mask, *p;
mask 1030 source4/client/client.c mask = talloc_asprintf(ctx, "%s%s", ctx->remote_cur_dir,args[1]);
mask 1033 source4/client/client.c dos_clean_name(mask);
mask 1035 source4/client/client.c trim_string(mask,".",NULL);
mask 1036 source4/client/client.c for (p = strtok(mask,"/\\"); p; p = strtok(p, "/\\")) {
mask 1037 source4/client/client.c char *parent = talloc_strndup(ctx, mask, PTR_DIFF(p, mask));
mask 1046 source4/client/client.c do_mkdir(ctx, mask);
mask 1522 source4/client/client.c char *mask;
mask 1532 source4/client/client.c mask = talloc_asprintf(ctx,"%s%s", ctx->remote_cur_dir, args[1]);
mask 1534 source4/client/client.c if (NT_STATUS_IS_ERR(smbcli_unlink(ctx->cli->tree, mask))) {
mask 1535 source4/client/client.c d_printf("%s deleting remote file %s\n",smbcli_errstr(ctx->cli->tree),mask);
mask 2128 source4/client/client.c char *mask;
mask 2134 source4/client/client.c mask = talloc_asprintf(ctx, "%s%s", ctx->remote_cur_dir, args[1]);
mask 2136 source4/client/client.c smbcli_open(ctx->cli->tree, mask, O_RDWR, DENY_ALL);
mask 2147 source4/client/client.c char *mask;
mask 2153 source4/client/client.c mask = talloc_asprintf(ctx, "%s%s", ctx->remote_cur_dir, args[1]);
mask 2155 source4/client/client.c if (NT_STATUS_IS_ERR(smbcli_rmdir(ctx->cli->tree, mask))) {
mask 2157 source4/client/client.c smbcli_errstr(ctx->cli->tree),mask);
mask 2793 source4/client/client.c static void completion_remote_filter(struct clilist_file_info *f, const char *mask, void *state)
mask 2737 source4/heimdal/lib/hcrypto/imath/imath.c mp_digit mask = (1 << rest) - 1;
mask 2741 source4/heimdal/lib/hcrypto/imath/imath.c z->digits[start - 1] &= mask;
mask 3034 source4/heimdal/lib/hx509/cert.c int type, mask, i, num;
mask 3053 source4/heimdal/lib/hx509/cert.c while (fscanf(f, "%d %d\n", &type, &mask) == 2) {
mask 3057 source4/heimdal/lib/hx509/cert.c while (mask && i < sizeof(stats)/sizeof(stats[0])) {
mask 3058 source4/heimdal/lib/hx509/cert.c if (mask & 1) {
mask 3062 source4/heimdal/lib/hx509/cert.c mask = mask >>1 ;
mask 847 source4/heimdal/lib/krb5/store.c uint32_t mask = 0xffff0000;
mask 850 source4/heimdal/lib/krb5/store.c if (creds->flags.i & mask)
mask 851 source4/heimdal/lib/krb5/store.c mask = ~mask;
mask 852 source4/heimdal/lib/krb5/store.c if (dummy32 & mask)
mask 1002 source4/heimdal/lib/krb5/store.c uint32_t mask = 0xffff0000;
mask 1005 source4/heimdal/lib/krb5/store.c if (creds->flags.i & mask)
mask 1006 source4/heimdal/lib/krb5/store.c mask = ~mask;
mask 1007 source4/heimdal/lib/krb5/store.c if (dummy32 & mask)
mask 45 source4/lib/socket/access.c uint32_t mask;
mask 58 source4/lib/socket/access.c mask = interpret_addr(slash + 1);
mask 60 source4/lib/socket/access.c mask = (uint32_t)((ALLONES >> atoi(slash + 1)) ^ ALLONES);
mask 62 source4/lib/socket/access.c mask = htonl(mask);
mask 65 source4/lib/socket/access.c if (net == INADDR_NONE || mask == INADDR_NONE) {
mask 70 source4/lib/socket/access.c return (addr & mask) == (net & mask);
mask 85 source4/libcli/clideltree.c char *mask;
mask 112 source4/libcli/clideltree.c asprintf(&mask, "%s\\*", dname);
mask 113 source4/libcli/clideltree.c smbcli_unlink(dstate.tree, mask);
mask 114 source4/libcli/clideltree.c smbcli_list(dstate.tree, mask,
mask 117 source4/libcli/clideltree.c free(mask);
mask 113 source4/libcli/clilist.c char *mask;
mask 124 source4/libcli/clilist.c mask = talloc_strdup(state.mem_ctx, Mask);
mask 144 source4/libcli/clilist.c first_parms.t2ffirst.in.pattern = mask;
mask 271 source4/libcli/clilist.c char *mask;
mask 282 source4/libcli/clilist.c mask = talloc_strdup(state.mem_ctx, Mask);
mask 293 source4/libcli/clilist.c first_parms.search_first.in.pattern = mask;
mask 183 source4/libcli/security/privilege.c uint64_t mask = 1;
mask 189 source4/libcli/security/privilege.c mask <<= (privilege-1);
mask 190 source4/libcli/security/privilege.c return mask;
mask 199 source4/libcli/security/privilege.c uint64_t mask;
mask 205 source4/libcli/security/privilege.c mask = sec_privilege_mask(privilege);
mask 206 source4/libcli/security/privilege.c if (token->privilege_mask & mask) {
mask 233 source4/libcli/security/privilege.c uint64_t mask = sec_privilege_mask(privilege);
mask 235 source4/libcli/security/privilege.c if (token->privilege_mask & mask) {
mask 351 source4/libcli/security/security_descriptor.c uint32_t mask)
mask 356 source4/libcli/security/security_descriptor.c if ((sd1->type & mask) != (sd2->type & mask)) return false;
mask 360 source4/libcli/security/security_descriptor.c if ((mask & SEC_DESC_DACL_PRESENT) && !security_acl_equal(sd1->dacl, sd2->dacl)) return false;
mask 361 source4/libcli/security/security_descriptor.c if ((mask & SEC_DESC_SACL_PRESENT) && !security_acl_equal(sd1->sacl, sd2->sacl)) return false;
mask 656 source4/nbt_server/wins/winsserver.c const char *mask;
mask 670 source4/nbt_server/wins/winsserver.c mask = lp_parm_string(lp_ctx, NULL, "nbtd", "wins_randomize1Clist_mask");
mask 671 source4/nbt_server/wins/winsserver.c if (!mask) {
mask 672 source4/nbt_server/wins/winsserver.c mask = "255.255.255.0";
mask 686 source4/nbt_server/wins/winsserver.c same = iface_same_net(addresses[idx], src->addr, mask);
mask 65 source4/ntvfs/cifs_posix_cli/svfs_util.c char *p, *mask;
mask 86 source4/ntvfs/cifs_posix_cli/svfs_util.c mask = p+1;
mask 88 source4/ntvfs/cifs_posix_cli/svfs_util.c low_mask = talloc_strdup(mem_ctx, mask);
mask 38 source4/ntvfs/posix/pvfs_read.c uint32_t mask;
mask 53 source4/ntvfs/posix/pvfs_read.c mask = SEC_FILE_READ_DATA;
mask 55 source4/ntvfs/posix/pvfs_read.c mask |= SEC_FILE_EXECUTE;
mask 57 source4/ntvfs/posix/pvfs_read.c if (!(f->access_mask & mask)) {
mask 37 source4/ntvfs/posix/pvfs_rename.c uint32_t mask;
mask 48 source4/ntvfs/posix/pvfs_rename.c mask = FILE_NOTIFY_CHANGE_DIR_NAME;
mask 50 source4/ntvfs/posix/pvfs_rename.c mask = FILE_NOTIFY_CHANGE_FILE_NAME;
mask 63 source4/ntvfs/posix/pvfs_rename.c mask,
mask 67 source4/ntvfs/posix/pvfs_rename.c mask,
mask 72 source4/ntvfs/posix/pvfs_rename.c mask,
mask 76 source4/ntvfs/posix/pvfs_rename.c mask,
mask 62 source4/ntvfs/simple/svfs_util.c char *p, *mask;
mask 83 source4/ntvfs/simple/svfs_util.c mask = p+1;
mask 85 source4/ntvfs/simple/svfs_util.c low_mask = talloc_strdup(mem_ctx, mask);
mask 48 source4/ntvfs/sysdep/inotify.c static int inotify_add_watch(int fd, const char *path, __u32 mask)
mask 50 source4/ntvfs/sysdep/inotify.c return syscall(__NR_inotify_add_watch, fd, path, mask);
mask 81 source4/ntvfs/sysdep/inotify.c uint32_t mask; /* the inotify mask */
mask 94 source4/ntvfs/sysdep/inotify.c if ((e->mask & w->mask) == 0) {
mask 101 source4/ntvfs/sysdep/inotify.c if (e->mask & IN_ISDIR) {
mask 106 source4/ntvfs/sysdep/inotify.c if ((e->mask & IN_ATTRIB) &&
mask 114 source4/ntvfs/sysdep/inotify.c if ((e->mask & IN_MODIFY) &&
mask 142 source4/ntvfs/sysdep/inotify.c if ((e->mask & (IN_ATTRIB|IN_MODIFY|IN_CREATE|IN_DELETE|
mask 149 source4/ntvfs/sysdep/inotify.c if (e->mask & IN_CREATE) {
mask 151 source4/ntvfs/sysdep/inotify.c } else if (e->mask & IN_DELETE) {
mask 153 source4/ntvfs/sysdep/inotify.c } else if (e->mask & IN_MOVED_FROM) {
mask 159 source4/ntvfs/sysdep/inotify.c } else if (e->mask & IN_MOVED_TO) {
mask 182 source4/ntvfs/sysdep/inotify.c (e->mask & IN_ISDIR) != 0) {
mask 187 source4/ntvfs/sysdep/inotify.c e->mask = IN_ATTRIB;
mask 348 source4/ntvfs/sysdep/inotify.c uint32_t mask;
mask 362 source4/ntvfs/sysdep/inotify.c mask = inotify_map(e);
mask 363 source4/ntvfs/sysdep/inotify.c if (mask == 0) {
mask 370 source4/ntvfs/sysdep/inotify.c mask |= (IN_MASK_ADD | IN_ONLYDIR);
mask 373 source4/ntvfs/sysdep/inotify.c wd = inotify_add_watch(in->fd, e->path, mask);
mask 390 source4/ntvfs/sysdep/inotify.c w->mask = mask;
mask 1290 source4/rpc_server/netlogon/dcerpc_netlogon.c r2.in.mask = 0;
mask 1315 source4/rpc_server/netlogon/dcerpc_netlogon.c r2.in.mask = 0;
mask 625 source4/torture/gentest.c uint32_t mask;
mask 630 source4/torture/gentest.c mask = va_arg(ap, uint32_t);
mask 633 source4/torture/gentest.c return mask & random();
mask 643 source4/torture/gentest.c static uint32_t gen_bits_mask(uint_t mask)
mask 646 source4/torture/gentest.c return ret & mask;
mask 141 source4/torture/masktest.c const char *mask;
mask 145 source4/torture/masktest.c mask = "\\masktest\\*.*";
mask 147 source4/torture/masktest.c mask = "\\masktest\\*";
mask 154 source4/torture/masktest.c smbcli_list_new(cli->tree, mask,
mask 171 source4/torture/masktest.c static void testpair(TALLOC_CTX *mem_ctx, struct smbcli_state *cli, char *mask,
mask 199 source4/torture/masktest.c smbcli_list_new(cli->tree, mask,
mask 204 source4/torture/masktest.c res2 = reg_test(cli, mem_ctx, mask, long_name, short_name);
mask 208 source4/torture/masktest.c res1, res2, count, mask, file, long_name, short_name);
mask 223 source4/torture/masktest.c char *mask, *file;
mask 234 source4/torture/masktest.c mask = talloc_strdup(mem_ctx, "\\masktest\\");
mask 236 source4/torture/masktest.c mask = talloc_strdup_append(mask, argv[0]);
mask 238 source4/torture/masktest.c testpair(mem_ctx, cli, mask, file);
mask 248 source4/torture/masktest.c mask = talloc_strdup(mem_ctx, "\\masktest\\");
mask 250 source4/torture/masktest.c mask = talloc_realloc_size(mem_ctx, mask, strlen(mask)+l1+1);
mask 252 source4/torture/masktest.c l = strlen(mask);
mask 254 source4/torture/masktest.c mask[i+l] = maskchars[random() % mc_len];
mask 256 source4/torture/masktest.c mask[l+l1] = 0;
mask 263 source4/torture/masktest.c if (ISDOT(file+l) || ISDOTDOT(file+l) || ISDOTDOT(mask+l)) {
mask 269 source4/torture/masktest.c testpair(mem_ctx, cli, mask, file);
mask 914 source4/torture/nbench/nbio.c bool nb_findfirst(const char *mask, int level, int maxcnt, int count, NTSTATUS status)
mask 926 source4/torture/nbench/nbio.c io.t2ffirst.in.pattern = mask;
mask 554 source4/torture/raw/notify.c uint32_t mask;
mask 588 source4/torture/raw/notify.c do { for (mask=i=0;i<32;i++) { \
mask 632 source4/torture/raw/notify.c mask |= (1<<i); \
mask 634 source4/torture/raw/notify.c if ((expected) != mask) { \
mask 635 source4/torture/raw/notify.c if (((expected) & ~mask) != 0) { \
mask 637 source4/torture/raw/notify.c mask, expected); \
mask 641 source4/torture/raw/notify.c mask, expected); \
mask 63 source4/torture/raw/samba3hide.c static void set_visible(struct clilist_file_info *i, const char *mask,
mask 1955 source4/torture/rpc/netlogon.c r.in.mask = 0x00000000;
mask 1970 source4/torture/rpc/netlogon.c r.in.mask = ACB_SVRTRUST;
mask 4899 source4/torture/rpc/samr.c uint32_t mask, resume_handle=0;
mask 4919 source4/torture/rpc/samr.c r.in.acct_flags = mask = masks[mask_idx];
mask 4939 source4/torture/rpc/samr.c if (mask) {
mask 4940 source4/torture/rpc/samr.c if (!check_mask(p, tctx, handle, sam->entries[i].idx, mask)) {
mask 50 source4/torture/rpc/samr_accessmask.c uint32_t mask, struct policy_handle *h)
mask 65 source4/torture/rpc/samr_accessmask.c r5.in.access_mask = mask;
mask 79 source4/torture/rpc/samr_accessmask.c uint32_t mask;
mask 82 source4/torture/rpc/samr_accessmask.c mask = 1;
mask 84 source4/torture/rpc/samr_accessmask.c printf("testing Connect5 with access mask 0x%08x", mask);
mask 85 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &h);
mask 86 source4/torture/rpc/samr_accessmask.c mask <<= 1;
mask 150 source4/torture/rpc/samr_accessmask.c uint32_t mask;
mask 156 source4/torture/rpc/samr_accessmask.c mask = 1;
mask 158 source4/torture/rpc/samr_accessmask.c printf("testing Connect5/EnumDomains with access mask 0x%08x", mask);
mask 159 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch);
mask 160 source4/torture/rpc/samr_accessmask.c mask <<= 1;
mask 409 source4/torture/rpc/samr_accessmask.c uint32_t mask;
mask 412 source4/torture/rpc/samr_accessmask.c mask = 1;
mask 414 source4/torture/rpc/samr_accessmask.c printf("testing Connect5/LookupDomain with access mask 0x%08x", mask);
mask 415 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch);
mask 416 source4/torture/rpc/samr_accessmask.c mask <<= 1;
mask 498 source4/torture/rpc/samr_accessmask.c uint32_t mask;
mask 521 source4/torture/rpc/samr_accessmask.c mask = 1;
mask 523 source4/torture/rpc/samr_accessmask.c printf("testing Connect5/OpenDomain with access mask 0x%08x", mask);
mask 524 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch);
mask 525 source4/torture/rpc/samr_accessmask.c mask <<= 1;