mask 83 examples/VFS/skel_opaque.c static SMB_STRUCT_DIR *skel_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr) mask 85 examples/VFS/skel_opaque.c return vfswrap_opendir(NULL, fname, mask, attr); mask 77 examples/VFS/skel_transparent.c static SMB_STRUCT_DIR *skel_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr) mask 79 examples/VFS/skel_transparent.c return SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr); mask 591 lib/util/util.h _PUBLIC_ bool same_net_v4(struct in_addr ip1,struct in_addr ip2,struct in_addr mask); mask 154 lib/util/util_net.c _PUBLIC_ bool same_net_v4(struct in_addr ip1, struct in_addr ip2, struct in_addr mask) mask 158 lib/util/util_net.c nmask = ntohl(mask.s_addr); mask 324 lib/util/util_net.c const struct sockaddr *mask) mask 335 lib/util/util_net.c struct sockaddr_in6 mask_6 = *(const struct sockaddr_in6 *)mask; mask 354 lib/util/util_net.c ((const struct sockaddr_in *)mask)->sin_addr); mask 52 lib/zlib/contrib/infback9/inftree9.c unsigned mask; /* mask for low root bits */ mask 203 lib/zlib/contrib/infback9/inftree9.c mask = used - 1; /* mask for comparing low */ mask 253 lib/zlib/contrib/infback9/inftree9.c if (len > root && (huff & mask) != low) { mask 277 lib/zlib/contrib/infback9/inftree9.c low = huff & mask; mask 296 lib/zlib/contrib/infback9/inftree9.c if (drop != 0 && (huff & mask) != low) { mask 205 lib/zlib/examples/gun.c unsigned mask; /* mask for current bits codes */ mask 239 lib/zlib/examples/gun.c mask = 0x1ff; mask 263 lib/zlib/examples/gun.c if (end >= mask && bits < max) { mask 266 lib/zlib/examples/gun.c mask <<= 1; mask 267 lib/zlib/examples/gun.c mask++; mask 292 lib/zlib/examples/gun.c code &= mask; /* mask to current code length */ mask 300 lib/zlib/examples/gun.c mask = 0x1ff; mask 333 lib/zlib/examples/gun.c if (end < mask) { mask 52 lib/zlib/inftrees.c unsigned mask; /* mask for low root bits */ mask 209 lib/zlib/inftrees.c mask = used - 1; /* mask for comparing low */ mask 260 lib/zlib/inftrees.c if (len > root && (huff & mask) != low) { mask 284 lib/zlib/inftrees.c low = huff & mask; mask 303 lib/zlib/inftrees.c if (drop != 0 && (huff & mask) != low) { mask 61 libcli/security/secace.c uint32_t mask, uint8_t flag) mask 66 libcli/security/secace.c t->access_mask = mask; mask 75 libcli/security/secace.c NTSTATUS sec_ace_add_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, unsigned *num, struct dom_sid *sid, uint32_t mask) mask 92 libcli/security/secace.c (*pp_new)[i].access_mask = mask; mask 101 libcli/security/secace.c NTSTATUS sec_ace_mod_sid(struct security_ace *ace, size_t num, struct dom_sid *sid, uint32_t mask) mask 109 libcli/security/secace.c ace[i].access_mask = mask; mask 29 libcli/security/secace.h uint32_t mask, uint8_t flag); mask 30 libcli/security/secace.h NTSTATUS sec_ace_add_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, unsigned *num, struct dom_sid *sid, uint32_t mask); mask 31 libcli/security/secace.h NTSTATUS sec_ace_mod_sid(struct security_ace *ace, size_t num, struct dom_sid *sid, uint32_t mask); mask 1709 librpc/gen_ndr/cli_netlogon.c uint32_t mask /* [in] */, mask 1723 librpc/gen_ndr/cli_netlogon.c r.in.mask = mask; mask 275 librpc/gen_ndr/cli_netlogon.h uint32_t mask /* [in] */, mask 14062 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_push_samr_AcctFlags(ndr, NDR_SCALARS, r->in.mask)); mask 14150 librpc/gen_ndr/ndr_netlogon.c NDR_CHECK(ndr_pull_samr_AcctFlags(ndr, NDR_SCALARS, &r->in.mask)); mask 14249 librpc/gen_ndr/ndr_netlogon.c ndr_print_samr_AcctFlags(ndr, "mask", r->in.mask); mask 1562 librpc/gen_ndr/netlogon.h uint32_t mask; mask 712 source3/client/client.c static void do_list_helper(const char *mntpoint, file_info *f, const char *mask, void *state) mask 719 source3/client/client.c dir = talloc_strdup(ctx, mask); mask 747 source3/client/client.c mask); mask 783 source3/client/client.c void do_list(const char *mask, mask 807 source3/client/client.c add_to_do_list_queue(mask); mask 858 source3/client/client.c if (cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetpath)) { mask 865 source3/client/client.c d_printf("do_list: [%s] %s\n", mask, cli_errstr(cli)); mask 881 source3/client/client.c char *mask = NULL; mask 886 source3/client/client.c mask = talloc_strdup(ctx, client_get_cur_dir()); mask 887 source3/client/client.c if (!mask) { mask 894 source3/client/client.c mask = talloc_strdup(ctx, buf); mask 896 source3/client/client.c mask = talloc_asprintf_append(mask, "%s", buf); mask 899 source3/client/client.c mask = talloc_asprintf_append(mask, "*"); mask 901 source3/client/client.c if (!mask) { mask 910 source3/client/client.c do_list(mask, attribute, display_finfo, recurse, true); mask 927 source3/client/client.c char *mask = NULL; mask 932 source3/client/client.c mask = talloc_strdup(ctx, client_get_cur_dir()); mask 933 source3/client/client.c if (!mask) { mask 936 source3/client/client.c if ((mask[0] != '\0') && (mask[strlen(mask)-1]!=CLI_DIRSEP_CHAR)) { mask 937 source3/client/client.c mask = talloc_asprintf_append(mask, "%s", CLI_DIRSEP_STR); mask 938 source3/client/client.c if (!mask) { mask 946 source3/client/client.c mask = talloc_strdup(ctx, buf); mask 948 source3/client/client.c mask = talloc_asprintf_append(mask, "%s", buf); mask 951 source3/client/client.c mask = talloc_strdup(ctx, "*"); mask 954 source3/client/client.c do_list(mask, attribute, do_du, recurse, true); mask 1438 source3/client/client.c char *mask = NULL; mask 1441 source3/client/client.c mask = talloc_strdup(ctx, client_get_cur_dir()); mask 1442 source3/client/client.c if (!mask) { mask 1452 source3/client/client.c mask = talloc_asprintf_append(mask, "%s", buf); mask 1453 source3/client/client.c if (!mask) { mask 1470 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) { mask 1495 source3/client/client.c do_mkdir(mask); mask 2102 source3/client/client.c char *mask = NULL; mask 2104 source3/client/client.c mask = talloc_asprintf(ctx, mask 2109 source3/client/client.c if (!mask) { mask 2114 source3/client/client.c TALLOC_FREE(mask); mask 2118 source3/client/client.c if (!cli_unlink(finfo->cli, mask)) { mask 2120 source3/client/client.c cli_errstr(finfo->cli),mask); mask 2122 source3/client/client.c TALLOC_FREE(mask); mask 2132 source3/client/client.c char *mask = NULL; mask 2140 source3/client/client.c mask = talloc_strdup(ctx, client_get_cur_dir()); mask 2141 source3/client/client.c if (!mask) { mask 2148 source3/client/client.c mask = talloc_asprintf_append(mask, "%s", buf); mask 2149 source3/client/client.c if (!mask) { mask 2153 source3/client/client.c do_list(mask,attribute,do_del,false,false); mask 2164 source3/client/client.c char *mask = NULL; mask 2182 source3/client/client.c mask = talloc_asprintf(ctx, "%s%s", mask 2185 source3/client/client.c if (!mask) { mask 2189 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) { mask 2190 source3/client/client.c d_printf("cmd_wdel %s: %s\n", mask, cli_errstr(cli)); mask 2206 source3/client/client.c char *mask = NULL; mask 2216 source3/client/client.c mask = talloc_asprintf(ctx, mask 2220 source3/client/client.c if (!mask) { mask 2224 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) { mask 2225 source3/client/client.c d_printf("open %s: %s\n", mask, cli_errstr(cli)); mask 2292 source3/client/client.c char *mask = NULL; mask 2303 source3/client/client.c mask = talloc_asprintf(ctx, mask 2307 source3/client/client.c if (!mask) { mask 2317 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) { mask 2318 source3/client/client.c d_printf("posix_open %s: %s\n", mask, cli_errstr(cli)); mask 2340 source3/client/client.c char *mask = NULL; mask 2351 source3/client/client.c mask = talloc_asprintf(ctx, mask 2355 source3/client/client.c if (!mask) { mask 2365 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) { mask 2366 source3/client/client.c d_printf("posix_mkdir %s: %s\n", mask, cli_errstr(cli)); mask 2382 source3/client/client.c char *mask = NULL; mask 2391 source3/client/client.c mask = talloc_asprintf(ctx, mask 2395 source3/client/client.c if (!mask) { mask 2399 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) { mask 2400 source3/client/client.c d_printf("posix_unlink %s: %s\n", mask, cli_errstr(cli)); mask 2416 source3/client/client.c char *mask = NULL; mask 2425 source3/client/client.c mask = talloc_asprintf(ctx, mask 2429 source3/client/client.c if (!mask) { mask 2433 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) { mask 2434 source3/client/client.c d_printf("posix_rmdir %s: %s\n", mask, cli_errstr(cli)); mask 2656 source3/client/client.c char *mask = NULL; mask 2665 source3/client/client.c mask = talloc_asprintf(ctx, mask 2669 source3/client/client.c if (!mask) { mask 2673 source3/client/client.c if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) { mask 2674 source3/client/client.c d_printf("rmdir %s: %s\n", mask, cli_errstr(cli)); mask 2680 source3/client/client.c cli_errstr(targetcli),mask); mask 4110 source3/client/client.c const char *mask, mask 31 source3/client/client_proto.h void do_list(const char *mask, mask 1578 source3/client/clitar.c char *mask = talloc_asprintf(ctx, mask 1581 source3/client/clitar.c if (!mask) { mask 1584 source3/client/clitar.c DEBUG(5, ("process_tar, do_list with mask: %s\n", mask)); mask 1585 source3/client/clitar.c do_list(mask,attribute,do_tar,False, True); mask 1586 source3/client/clitar.c TALLOC_FREE(mask); mask 33 source3/include/privileges.h uint32 mask[SE_PRIV_MASKSIZE]; mask 600 source3/include/proto.h NTSTATUS privilege_enum_sids(const SE_PRIV *mask, TALLOC_CTX *mem_ctx, mask 619 source3/include/proto.h bool se_priv_put_all_privileges(SE_PRIV *mask); mask 620 source3/include/proto.h void se_priv_add( SE_PRIV *mask, const SE_PRIV *addpriv ); mask 621 source3/include/proto.h void se_priv_remove( SE_PRIV *mask, const SE_PRIV *removepriv ); mask 623 source3/include/proto.h bool se_priv_from_name( const char *name, SE_PRIV *mask ); mask 624 source3/include/proto.h void dump_se_priv( int dbg_cl, int dbg_lvl, const SE_PRIV *mask ); mask 631 source3/include/proto.h LUID_ATTR get_privilege_luid( SE_PRIV *mask ); mask 633 source3/include/proto.h bool se_priv_to_privilege_set( PRIVILEGE_SET *set, SE_PRIV *mask ); mask 634 source3/include/proto.h bool privilege_set_to_se_priv( SE_PRIV *mask, struct lsa_PrivilegeSet *privset ); mask 682 source3/include/proto.h NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size); mask 683 source3/include/proto.h NTSTATUS sec_desc_mod_sid(SEC_DESC *sd, DOM_SID *sid, uint32 mask); mask 1354 source3/include/proto.h const struct sockaddr *mask); mask 6243 source3/include/proto.h const char *mask, mask 6277 source3/include/proto.h const char *mask, mask 6287 source3/include/proto.h const char *name, const char *mask, uint32 attr); mask 7172 source3/include/proto.h void nb_findfirst(const char *mask); mask 316 source3/include/vfs.h SMB_STRUCT_DIR *(*opendir)(struct vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attributes); mask 40 source3/include/vfs_macros.h #define SMB_VFS_OPENDIR(conn, fname, mask, attr) ((conn)->vfs.ops.opendir((conn)->vfs.handles.opendir, (fname), (mask), (attr))) mask 174 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_OPENDIR(conn, fname, mask, attr) ((conn)->vfs_opaque.ops.opendir((conn)->vfs_opaque.handles.opendir, (fname), (mask), (attr))) mask 308 source3/include/vfs_macros.h #define SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr) ((handle)->vfs_next.ops.opendir((handle)->vfs_next.handles.opendir, (fname), (mask), (attr))) mask 40 source3/lib/privileges.c static bool get_privileges( const DOM_SID *sid, SE_PRIV *mask ) mask 69 source3/lib/privileges.c se_priv_copy( mask, (SE_PRIV*)data.dptr ); mask 79 source3/lib/privileges.c static bool set_privileges( const DOM_SID *sid, SE_PRIV *mask ) mask 102 source3/lib/privileges.c data.dptr = (uint8 *)mask; mask 115 source3/lib/privileges.c SE_PRIV mask; mask 124 source3/lib/privileges.c if ( !get_privileges( &slist[i], &mask ) ) mask 129 source3/lib/privileges.c dump_se_priv( DBGC_ALL, 5, &mask ); mask 131 source3/lib/privileges.c se_priv_add( privileges, &mask ); mask 163 source3/lib/privileges.c SE_PRIV mask; mask 165 source3/lib/privileges.c se_priv_copy( &mask, (SE_PRIV*)rec->value.dptr ); mask 170 source3/lib/privileges.c if ( !is_privilege_assigned( &mask, &priv->privilege) ) mask 229 source3/lib/privileges.c NTSTATUS privilege_enum_sids(const SE_PRIV *mask, TALLOC_CTX *mem_ctx, mask 241 source3/lib/privileges.c se_priv_copy(&priv.privilege, mask); mask 289 source3/lib/privileges.c SE_PRIV mask; mask 291 source3/lib/privileges.c if (! se_priv_from_name(name, &mask)) { mask 297 source3/lib/privileges.c return grant_privilege( sid, &mask ); mask 306 source3/lib/privileges.c SE_PRIV mask; mask 310 source3/lib/privileges.c if ( !get_privileges( sid, &mask ) ) mask 316 source3/lib/privileges.c dump_se_priv( DBGC_ALL, 10, &mask ); mask 318 source3/lib/privileges.c se_priv_remove( &mask, priv_mask ); mask 321 source3/lib/privileges.c dump_se_priv( DBGC_ALL, 10, &mask ); mask 323 source3/lib/privileges.c return set_privileges( sid, &mask ); mask 341 source3/lib/privileges.c SE_PRIV mask; mask 343 source3/lib/privileges.c if (! se_priv_from_name(name, &mask)) { mask 349 source3/lib/privileges.c return revoke_privilege(sid, &mask); mask 475 source3/lib/privileges.c SE_PRIV mask; mask 477 source3/lib/privileges.c return get_privileges( sid, &mask ); mask 485 source3/lib/privileges.c SE_PRIV mask; mask 487 source3/lib/privileges.c if (!se_priv_put_all_privileges(&mask)) { mask 491 source3/lib/privileges.c return grant_privilege( sid, &mask ); mask 131 source3/lib/privileges_basic.c bool se_priv_put_all_privileges(SE_PRIV *mask) mask 136 source3/lib/privileges_basic.c if (!se_priv_copy(mask, &se_priv_none)) { mask 140 source3/lib/privileges_basic.c se_priv_add(mask, &privs[i].se_priv); mask 149 source3/lib/privileges_basic.c void se_priv_add( SE_PRIV *mask, const SE_PRIV *addpriv ) mask 154 source3/lib/privileges_basic.c mask->mask[i] |= addpriv->mask[i]; mask 163 source3/lib/privileges_basic.c void se_priv_remove( SE_PRIV *mask, const SE_PRIV *removepriv ) mask 168 source3/lib/privileges_basic.c mask->mask[i] &= ~removepriv->mask[i]; mask 176 source3/lib/privileges_basic.c static void se_priv_invert( SE_PRIV *new_mask, const SE_PRIV *mask ) mask 181 source3/lib/privileges_basic.c se_priv_remove( &allprivs, mask ); mask 198 source3/lib/privileges_basic.c static bool se_priv_empty( const SE_PRIV *mask ) mask 203 source3/lib/privileges_basic.c se_priv_copy( &p1, mask ); mask 206 source3/lib/privileges_basic.c p1.mask[i] &= se_priv_all.mask[i]; mask 216 source3/lib/privileges_basic.c bool se_priv_from_name( const char *name, SE_PRIV *mask ) mask 222 source3/lib/privileges_basic.c se_priv_copy( mask, &privs[i].se_priv ); mask 234 source3/lib/privileges_basic.c void dump_se_priv( int dbg_cl, int dbg_lvl, const SE_PRIV *mask ) mask 241 source3/lib/privileges_basic.c DEBUGADDC( dbg_cl, dbg_lvl,(" 0x%x", mask->mask[i] )); mask 383 source3/lib/privileges_basic.c LUID_ATTR get_privilege_luid( SE_PRIV *mask ) mask 392 source3/lib/privileges_basic.c if ( se_priv_equal( &privs[i].se_priv, mask ) ) { mask 451 source3/lib/privileges_basic.c bool se_priv_to_privilege_set( PRIVILEGE_SET *set, SE_PRIV *mask ) mask 461 source3/lib/privileges_basic.c if ( !is_privilege_assigned(mask, &privs[i].se_priv) ) mask 476 source3/lib/privileges_basic.c static bool luid_to_se_priv( struct lsa_LUID *luid, SE_PRIV *mask ) mask 483 source3/lib/privileges_basic.c se_priv_copy( mask, &privs[i].se_priv ); mask 494 source3/lib/privileges_basic.c bool privilege_set_to_se_priv( SE_PRIV *mask, struct lsa_PrivilegeSet *privset ) mask 498 source3/lib/privileges_basic.c ZERO_STRUCTP( mask ); mask 510 source3/lib/privileges_basic.c se_priv_add( mask, &r ); mask 441 source3/lib/secdesc.c NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size) mask 453 source3/lib/secdesc.c status = sec_ace_add_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid, mask); mask 474 source3/lib/secdesc.c NTSTATUS sec_desc_mod_sid(SEC_DESC *sd, DOM_SID *sid, uint32 mask) mask 481 source3/lib/secdesc.c status = sec_ace_mod_sid(sd->dacl->aces, sd->dacl->num_aces, sid, mask); mask 25 source3/libads/disp_sec.c uint32 mask; mask 70 source3/libads/disp_sec.c if (perms[j].mask == (((unsigned) 1) << i)) { mask 71 source3/libads/disp_sec.c printf("\n\t%s (0x%08x)", perms[j].str, perms[j].mask); mask 27 source3/libgpo/gpo_filesync.c char *mask; mask 33 source3/libgpo/gpo_filesync.c const char *mask, mask 111 source3/libgpo/gpo_filesync.c DEBUG(3,("calling cli_list with mask: %s\n", ctx->mask)); mask 114 source3/libgpo/gpo_filesync.c ctx->mask, mask 119 source3/libgpo/gpo_filesync.c ctx->mask, cli_errstr(ctx->cli))); mask 132 source3/libgpo/gpo_filesync.c const char *mask, mask 148 source3/libgpo/gpo_filesync.c mask, info->name)); mask 174 source3/libgpo/gpo_filesync.c ctx->mask = talloc_asprintf(ctx->mem_ctx, mask 177 source3/libgpo/gpo_filesync.c if (!ctx->local_path || !ctx->mask || !ctx->remote_path) { mask 226 source3/libgpo/gpo_filesync.c ctx.mask = talloc_asprintf(mem_ctx, mask 229 source3/libgpo/gpo_filesync.c if (!ctx.mask) { mask 692 source3/libgpo/gpo_reg.c uint32_t mask; mask 698 source3/libgpo/gpo_reg.c mask = REG_KEY_ALL; mask 702 source3/libgpo/gpo_reg.c mask, 0); mask 704 source3/libgpo/gpo_reg.c mask = REG_KEY_ALL; mask 708 source3/libgpo/gpo_reg.c mask, 0); mask 710 source3/libgpo/gpo_reg.c mask = REG_KEY_READ; mask 714 source3/libgpo/gpo_reg.c mask, 0); mask 720 source3/libgpo/gpo_reg.c mask = REG_KEY_ALL; mask 724 source3/libgpo/gpo_reg.c mask, inherit_flags); mask 726 source3/libgpo/gpo_reg.c mask = REG_KEY_ALL; mask 730 source3/libgpo/gpo_reg.c mask, inherit_flags); mask 732 source3/libgpo/gpo_reg.c mask = REG_KEY_READ; mask 736 source3/libgpo/gpo_reg.c mask, inherit_flags); mask 232 source3/libsmb/clilist.c char *mask = NULL; mask 254 source3/libsmb/clilist.c mask = SMB_STRDUP(Mask); mask 255 source3/libsmb/clilist.c if (!mask) { mask 261 source3/libsmb/clilist.c size_t nlen = 2*(strlen(mask)+1); mask 282 source3/libsmb/clilist.c p += clistr_push(cli, param+12, mask, mask 300 source3/libsmb/clilist.c p += clistr_push(cli, param+12, mask, mask 411 source3/libsmb/clilist.c if (!First && *mask && strcsequal(finfo.name, mask)) { mask 419 source3/libsmb/clilist.c SAFE_FREE(mask); mask 421 source3/libsmb/clilist.c mask = SMB_STRDUP(finfo.name); mask 423 source3/libsmb/clilist.c mask = SMB_STRDUP(""); mask 425 source3/libsmb/clilist.c if (!mask) { mask 486 source3/libsmb/clilist.c SAFE_FREE(mask); mask 549 source3/libsmb/clilist.c char *mask = NULL; mask 554 source3/libsmb/clilist.c mask = SMB_STRDUP(Mask); mask 555 source3/libsmb/clilist.c if (!mask) { mask 576 source3/libsmb/clilist.c p += clistr_push(cli, p, first?mask:"", mask 609 source3/libsmb/clilist.c SAFE_FREE(mask); mask 665 source3/libsmb/clilist.c SAFE_FREE(mask); mask 239 source3/libsmb/libsmb_dir.c const char *mask, mask 1209 source3/libsmb/libsmb_dir.c const char *mask, mask 270 source3/libsmb/libsmb_xattr.c uint32_t mask; mask 274 source3/libsmb/libsmb_xattr.c uint32 mask; mask 357 source3/libsmb/libsmb_xattr.c amask = v->mask; mask 369 source3/libsmb/libsmb_xattr.c amask |= v->mask; mask 387 source3/libsmb/libsmb_xattr.c mask = amask; mask 388 source3/libsmb/libsmb_xattr.c init_sec_ace(ace, &sid, atype, mask, aflags); mask 104 source3/locking/posix.c SMB_OFF_T mask = (mask2<<1); mask 105 source3/locking/posix.c SMB_OFF_T max_positive_lock_offset = ~mask; mask 231 source3/modules/nfs4_acls.c uint32_t mask; mask 270 source3/modules/nfs4_acls.c mask = ace->aceMask; mask 272 source3/modules/nfs4_acls.c ace->aceType, mask, mask 28 source3/modules/onefs.h const char *fname, const char *mask, mask 249 source3/modules/onefs_dir.c onefs_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, mask 259 source3/modules/onefs_dir.c return SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr); mask 263 source3/modules/onefs_dir.c ret_dirp = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr); mask 476 source3/modules/vfs_afsacl.c uint32 mask; mask 542 source3/modules/vfs_afsacl.c (ace->access_mask == m->mask) ) mask 33 source3/modules/vfs_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr); mask 148 source3/modules/vfs_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr) mask 152 source3/modules/vfs_audit.c result = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr); mask 45 source3/modules/vfs_cap.c static SMB_STRUCT_DIR *cap_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr) mask 53 source3/modules/vfs_cap.c return SMB_VFS_NEXT_OPENDIR(handle, capname, mask, attr); mask 94 source3/modules/vfs_catia.c const char *fname, const char *mask, uint32 attr) mask 102 source3/modules/vfs_catia.c return SMB_VFS_NEXT_OPENDIR(handle, name, mask, attr); mask 155 source3/modules/vfs_default.c static SMB_STRUCT_DIR *vfswrap_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr) mask 89 source3/modules/vfs_dirsort.c const char *fname, const char *mask, mask 102 source3/modules/vfs_dirsort.c data->source_directory = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, mask 36 source3/modules/vfs_extd_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr); mask 159 source3/modules/vfs_extd_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr) mask 163 source3/modules/vfs_extd_audit.c result = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr); mask 95 source3/modules/vfs_full_audit.c const char *fname, const char *mask, uint32 attr); mask 1077 source3/modules/vfs_full_audit.c const char *fname, const char *mask, uint32 attr) mask 1081 source3/modules/vfs_full_audit.c result = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr); mask 174 source3/modules/vfs_netatalk.c static SMB_STRUCT_DIR *atalk_opendir(struct vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr) mask 178 source3/modules/vfs_netatalk.c ret = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr); mask 55 source3/modules/vfs_notify_fam.c uint32_t mask; /* the inotify mask */ mask 171 source3/modules/vfs_onefs_shadow_copy.c const char *mask, uint32_t attr) mask 174 source3/modules/vfs_onefs_shadow_copy.c (handle, cpath ?: path, mask, attr), mask 74 source3/modules/vfs_shadow_copy.c static SMB_STRUCT_DIR *shadow_copy_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr) mask 77 source3/modules/vfs_shadow_copy.c SMB_STRUCT_DIR *p = SMB_VFS_NEXT_OPENDIR(handle,fname,mask,attr); mask 346 source3/modules/vfs_shadow_copy2.c const char *fname, const char *mask, uint32 attr) mask 348 source3/modules/vfs_shadow_copy2.c SHADOW2_NEXT(OPENDIR, (handle, name, mask, attr), SMB_STRUCT_DIR *, NULL); mask 39 source3/pam_smbpass/general.h unsigned int mask; /* shall assume 32 bits of flags */ mask 58 source3/pam_smbpass/general.h #define set(x,ctrl) (ctrl = ((ctrl)&smb_args[x].mask)|smb_args[x].flag) mask 232 source3/pam_smbpass/support.c ctrl &= smb_args[j].mask; /* for turning things off */ mask 1701 source3/rpc_server/srv_lsa_nt.c SE_PRIV mask; mask 1718 source3/rpc_server/srv_lsa_nt.c if ( !get_privileges_for_sids( &mask, &info->sid, 1 ) ) mask 1723 source3/rpc_server/srv_lsa_nt.c if ( se_priv_to_privilege_set( &privileges, &mask ) ) { mask 1860 source3/rpc_server/srv_lsa_nt.c SE_PRIV mask; mask 1876 source3/rpc_server/srv_lsa_nt.c if ( !privilege_set_to_se_priv( &mask, set ) ) mask 1879 source3/rpc_server/srv_lsa_nt.c if ( !grant_privilege( &info->sid, &mask ) ) { mask 1883 source3/rpc_server/srv_lsa_nt.c dump_se_priv( DBGC_ALL, 3, &mask ); mask 1899 source3/rpc_server/srv_lsa_nt.c SE_PRIV mask; mask 1916 source3/rpc_server/srv_lsa_nt.c if ( !privilege_set_to_se_priv( &mask, set ) ) mask 1919 source3/rpc_server/srv_lsa_nt.c if ( !revoke_privilege( &info->sid, &mask ) ) { mask 1923 source3/rpc_server/srv_lsa_nt.c dump_se_priv( DBGC_ALL, 3, &mask ); mask 2244 source3/rpc_server/srv_lsa_nt.c SE_PRIV mask; mask 2264 source3/rpc_server/srv_lsa_nt.c if ( !get_privileges_for_sids( &mask, &sid, 1 ) ) mask 2269 source3/rpc_server/srv_lsa_nt.c if ( se_priv_to_privilege_set( &privileges, &mask ) ) { mask 2294 source3/rpc_server/srv_lsa_nt.c SE_PRIV mask; mask 2312 source3/rpc_server/srv_lsa_nt.c if ( !se_priv_from_name( name, &mask ) ) mask 2315 source3/rpc_server/srv_lsa_nt.c priv_luid = get_privilege_luid( &mask ); mask 298 source3/rpcclient/cmd_netlogon.c uint32_t mask = 0; mask 315 source3/rpcclient/cmd_netlogon.c mask = atoi(argv[2]); mask 341 source3/rpcclient/cmd_netlogon.c mask, mask 74 source3/smbd/dir.c const char *mask, mask 82 source3/smbd/dir.c char *mask2 = talloc_strdup(ctx, mask); mask 784 source3/smbd/dir.c uint32 mask; mask 793 source3/smbd/dir.c mask = ((dirtype >> 8) & (aDIR|aARCH|aRONLY|aHIDDEN|aSYSTEM)); /* & 0x37 */ mask 794 source3/smbd/dir.c if(mask) { mask 795 source3/smbd/dir.c if((mask & (mode & (aDIR|aARCH|aRONLY|aHIDDEN|aSYSTEM))) == mask) /* check if matching attribute present */ mask 806 source3/smbd/dir.c const char *mask) mask 813 source3/smbd/dir.c return mask_match_search(mname,mask,False); mask 822 source3/smbd/dir.c const char *mask, mask 863 source3/smbd/dir.c if ((strcmp(mask,"*.*") == 0) || mask 864 source3/smbd/dir.c mask_match_search(filename,mask,False) || mask 865 source3/smbd/dir.c mangle_mask_match(conn,filename,mask)) { mask 929 source3/smbd/dir.c mask, mask 1108 source3/smbd/dir.c const char *name, const char *mask, uint32 attr) mask 1128 source3/smbd/dir.c dirp->dir = SMB_VFS_OPENDIR(conn, dirp->dir_path, mask, attr); mask 545 source3/smbd/dosmode.c int mask=0; mask 627 source3/smbd/dosmode.c mask |= (S_ISUID | S_ISGID); mask 631 source3/smbd/dosmode.c mask |= S_ISVTX; mask 636 source3/smbd/dosmode.c mask |= S_IXUSR; mask 638 source3/smbd/dosmode.c mask |= S_IXGRP; mask 640 source3/smbd/dosmode.c mask |= S_IXOTH; mask 642 source3/smbd/dosmode.c unixmode |= (st->st_mode & mask); mask 50 source3/smbd/notify_inotify.c static int inotify_add_watch(int fd, const char *path, __u32 mask) mask 52 source3/smbd/notify_inotify.c return syscall(__NR_inotify_add_watch, fd, path, mask); mask 88 source3/smbd/notify_inotify.c uint32_t mask; /* the inotify mask */ mask 112 source3/smbd/notify_inotify.c e->mask, w->mask, w->filter)); mask 114 source3/smbd/notify_inotify.c if ((e->mask & w->mask) == 0) { mask 121 source3/smbd/notify_inotify.c if (e->mask & IN_ISDIR) { mask 126 source3/smbd/notify_inotify.c if ((e->mask & IN_ATTRIB) && mask 134 source3/smbd/notify_inotify.c if ((e->mask & IN_MODIFY) && mask 162 source3/smbd/notify_inotify.c e->mask, e->len ? e->name : "")); mask 165 source3/smbd/notify_inotify.c if ((e->mask & (IN_ATTRIB|IN_MODIFY|IN_CREATE|IN_DELETE| mask 172 source3/smbd/notify_inotify.c if (e->mask & IN_CREATE) { mask 174 source3/smbd/notify_inotify.c } else if (e->mask & IN_DELETE) { mask 176 source3/smbd/notify_inotify.c } else if (e->mask & IN_MOVED_FROM) { mask 182 source3/smbd/notify_inotify.c } else if (e->mask & IN_MOVED_TO) { mask 208 source3/smbd/notify_inotify.c (e->mask & IN_ISDIR) != 0) { mask 213 source3/smbd/notify_inotify.c e->mask = IN_ATTRIB; mask 379 source3/smbd/notify_inotify.c uint32_t mask; mask 393 source3/smbd/notify_inotify.c mask = inotify_map(e); mask 394 source3/smbd/notify_inotify.c if (mask == 0) { mask 401 source3/smbd/notify_inotify.c mask |= (IN_MASK_ADD | IN_ONLYDIR); mask 404 source3/smbd/notify_inotify.c wd = inotify_add_watch(in->fd, e->path, mask); mask 412 source3/smbd/notify_inotify.c e->path, mask, wd)); mask 425 source3/smbd/notify_inotify.c w->mask = mask; mask 1105 source3/smbd/posix_acls.c static mode_t map_nt_perms( uint32 *mask, int type) mask 1111 source3/smbd/posix_acls.c if((*mask) & GENERIC_ALL_ACCESS) mask 1114 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IRUSR : 0; mask 1115 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWUSR : 0; mask 1116 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXUSR : 0; mask 1120 source3/smbd/posix_acls.c if((*mask) & GENERIC_ALL_ACCESS) mask 1123 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IRGRP : 0; mask 1124 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWGRP : 0; mask 1125 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXGRP : 0; mask 1129 source3/smbd/posix_acls.c if((*mask) & GENERIC_ALL_ACCESS) mask 1132 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IROTH : 0; mask 1133 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWOTH : 0; mask 1134 source3/smbd/posix_acls.c mode |= ((*mask) & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXOTH : 0; mask 2856 source3/smbd/posix_acls.c #define MAP_PERM(p,mask,result) (((p) & (mask)) ? (result) : 0 ) mask 3007 source3/smbd/posix_acls.c uint32_t mask, uint8_t flags) mask 3019 source3/smbd/posix_acls.c nt_ace_list[i].access_mask = mask; mask 3026 source3/smbd/posix_acls.c init_sec_ace(&nt_ace_list[(*num_aces)++], sid, type, mask, flags); mask 1250 source3/smbd/reply.c const char *mask = NULL; mask 1347 source3/smbd/reply.c mask = p + 1; mask 1351 source3/smbd/reply.c mask = directory; mask 1369 source3/smbd/reply.c mask, mask 1393 source3/smbd/reply.c mask = dptr_wcard(dptr_num); mask 1394 source3/smbd/reply.c if (!mask) { mask 1401 source3/smbd/reply.c mask_contains_wcard = ms_has_wild(mask); mask 1449 source3/smbd/reply.c mask, mask 1462 source3/smbd/reply.c mask, mask 1535 source3/smbd/reply.c mask, mask 2419 source3/smbd/reply.c char *mask = NULL; mask 2438 source3/smbd/reply.c mask = name; mask 2442 source3/smbd/reply.c mask = p+1; mask 2454 source3/smbd/reply.c if (!VALID_STAT(sbuf) && mangle_is_mangled(mask,conn->params)) { mask 2457 source3/smbd/reply.c mask, mask 2461 source3/smbd/reply.c mask = new_mask; mask 2469 source3/smbd/reply.c mask); mask 2497 source3/smbd/reply.c if (strequal(mask,"????????.???")) { mask 2498 source3/smbd/reply.c mask[0] = '*'; mask 2499 source3/smbd/reply.c mask[1] = '\0'; mask 2507 source3/smbd/reply.c dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, mask 2534 source3/smbd/reply.c if(!mask_match(dname, mask, conn->case_sensitive)) { mask 5616 source3/smbd/reply.c uint32 mask; mask 5618 source3/smbd/reply.c mask = is_dir ? FILE_NOTIFY_CHANGE_DIR_NAME mask 5628 source3/smbd/reply.c notify_fname(conn, NOTIFY_ACTION_OLD_NAME, mask, oldpath); mask 5629 source3/smbd/reply.c notify_fname(conn, NOTIFY_ACTION_NEW_NAME, mask, newpath); mask 5632 source3/smbd/reply.c notify_fname(conn, NOTIFY_ACTION_REMOVED, mask, oldpath); mask 5633 source3/smbd/reply.c notify_fname(conn, NOTIFY_ACTION_ADDED, mask, newpath); mask 5870 source3/smbd/reply.c char *mask = NULL; mask 5915 source3/smbd/reply.c mask = name; mask 5922 source3/smbd/reply.c mask = p+1; mask 5935 source3/smbd/reply.c if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) { mask 5938 source3/smbd/reply.c mask, mask 5942 source3/smbd/reply.c mask = new_mask; mask 5955 source3/smbd/reply.c mask); mask 6044 source3/smbd/reply.c if (strequal(mask,"????????.???")) { mask 6045 source3/smbd/reply.c mask[0] = '*'; mask 6046 source3/smbd/reply.c mask[1] = '\0'; mask 6054 source3/smbd/reply.c dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, attrs); mask 6084 source3/smbd/reply.c if(!mask_match(dname, mask, conn->case_sensitive)) { mask 6441 source3/smbd/reply.c const char *mask = NULL; mask 6570 source3/smbd/reply.c mask = p+1; mask 6573 source3/smbd/reply.c mask = name; mask 6591 source3/smbd/reply.c if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) { mask 6594 source3/smbd/reply.c mask, mask 6598 source3/smbd/reply.c mask = new_mask; mask 6605 source3/smbd/reply.c mask); mask 6646 source3/smbd/reply.c if (strequal(mask,"????????.???")) { mask 6647 source3/smbd/reply.c mask = mask_star; mask 6657 source3/smbd/reply.c dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, 0); mask 6679 source3/smbd/reply.c if(!mask_match(dname, mask, conn->case_sensitive)) { mask 6819 source3/smbd/reply.c uint32 mask = 0; mask 6834 source3/smbd/reply.c mask = (~0) << (31 - i); mask 6836 source3/smbd/reply.c if(low & mask) mask 1071 source3/smbd/trans2.c const char *mask) mask 1073 source3/smbd/trans2.c if (mask[0] == '.' && mask[1] == 0) mask 1079 source3/smbd/trans2.c return strcmp(str,mask)==0; mask 1081 source3/smbd/trans2.c return StrCaseCmp(str,mask) == 0; mask 1242 source3/smbd/trans2.c const char *mask = NULL; mask 1276 source3/smbd/trans2.c mask = talloc_strdup(ctx,"*.*"); mask 1278 source3/smbd/trans2.c mask = p+1; mask 1281 source3/smbd/trans2.c mask = path_mask; mask 1329 source3/smbd/trans2.c if(!(got_match = *got_exact_match = exact_match(conn, fname, mask))) { mask 1330 source3/smbd/trans2.c got_match = mask_match(fname, mask, conn->case_sensitive); mask 1347 source3/smbd/trans2.c if(!(got_match = *got_exact_match = exact_match(conn, mangled_name, mask))) { mask 1348 source3/smbd/trans2.c got_match = mask_match(mangled_name, mask, conn->case_sensitive); mask 1894 source3/smbd/trans2.c char *mask = NULL; mask 1982 source3/smbd/trans2.c ntstatus = unix_convert(ctx, conn, directory, True, &directory, &mask, &sbuf); mask 1998 source3/smbd/trans2.c mask = talloc_strdup(ctx,"*"); mask 1999 source3/smbd/trans2.c if (!mask) { mask 2014 source3/smbd/trans2.c DEBUG(5,("dir=%s, mask = %s\n",directory, mask)); mask 2070 source3/smbd/trans2.c mask, mask 2081 source3/smbd/trans2.c DEBUG(4,("dptr_num is %d, wcard = %s, attr = %d\n", dptr_num, mask, dirtype)); mask 2109 source3/smbd/trans2.c mask,dirtype,info_level, mask 2189 source3/smbd/trans2.c mask, directory, dirtype, numentries ) ); mask 2199 source3/smbd/trans2.c if(!mangle_is_8_3_wildcards( mask, False, conn->params)) { mask 2201 source3/smbd/trans2.c name_to_8_3(mask, mangled_name, True, conn->params); mask 2236 source3/smbd/trans2.c const char *mask = NULL; mask 2385 source3/smbd/trans2.c mask = p; mask 2392 source3/smbd/trans2.c dptr_num, mask, dirtype, mask 2460 source3/smbd/trans2.c mask,dirtype,info_level, mask 2490 source3/smbd/trans2.c mask, directory, dirtype, numentries ) ); mask 312 source3/torture/masktest.c static void testpair(struct cli_state *cli, const char *mask, const char *file) mask 341 source3/torture/masktest.c cli_list(cli, mask, aHIDDEN | aDIR, listfn, NULL); mask 343 source3/torture/masktest.c res2 = reg_test(cli, mask, long_name, short_name); mask 349 source3/torture/masktest.c res1, res2, count, mask, file, long_name, short_name)); mask 362 source3/torture/masktest.c char *mask, *file; mask 374 source3/torture/masktest.c mask = talloc_asprintf(ctx, mask 380 source3/torture/masktest.c if (!mask || !file) { mask 383 source3/torture/masktest.c testpair(cli, mask, file); mask 393 source3/torture/masktest.c mask = TALLOC_ARRAY(ctx, char, strlen("\\masktest\\")+1+22); mask 395 source3/torture/masktest.c if (!mask || !file) { mask 398 source3/torture/masktest.c memcpy(mask,"\\masktest\\",strlen("\\masktest\\")+1); mask 400 source3/torture/masktest.c l = strlen(mask); mask 402 source3/torture/masktest.c mask[i+l] = maskchars[random() % mc_len]; mask 404 source3/torture/masktest.c mask[l+l1] = 0; mask 413 source3/torture/masktest.c strcmp(mask+l,"..") == 0) continue; mask 417 source3/torture/masktest.c testpair(cli, mask, file); mask 420 source3/torture/masktest.c TALLOC_FREE(mask); mask 264 source3/torture/nbio.c void nb_findfirst(const char *mask) mask 266 source3/torture/nbio.c cli_list(c, mask, 0, find_fn, NULL); mask 307 source3/torture/nbio.c char *mask; mask 308 source3/torture/nbio.c if (asprintf(&mask, "%s\\*", dname) == -1) { mask 314 source3/torture/nbio.c cli_list(c, mask, aDIR, delete_fn, NULL); mask 315 source3/torture/nbio.c free(mask); mask 4503 source3/torture/torture.c static void del_fn(const char *mnt, file_info *finfo, const char *mask, void *state) mask 5291 source3/torture/torture.c static void shortname_del_fn(const char *mnt, file_info *finfo, const char *mask, void *state) mask 27 source3/utils/net_rpc.c static bool sync_files(struct copy_clistate *cp_clistate, const char *mask); mask 3193 source3/utils/net_rpc.c const char *mask, void *state) mask 3210 source3/utils/net_rpc.c DEBUG(3,("got mask: %s, name: %s\n", mask, f->name)); mask 3296 source3/utils/net_rpc.c static bool sync_files(struct copy_clistate *cp_clistate, const char *mask) mask 3301 source3/utils/net_rpc.c DEBUG(3,("calling cli_list with mask: %s\n", mask)); mask 3304 source3/utils/net_rpc.c mask, &targetcli, &targetpath ) ) { mask 3306 source3/utils/net_rpc.c mask, cli_errstr(cp_clistate->cli_share_src)); mask 3312 source3/utils/net_rpc.c mask, cli_errstr(targetcli)); mask 3391 source3/utils/net_rpc.c const char *mask = "\\*"; mask 3467 source3/utils/net_rpc.c if (!sync_files(&cp_clistate, mask)) { mask 626 source3/utils/net_sam.c SE_PRIV mask; mask 643 source3/utils/net_sam.c if (se_priv_from_name(argv[0], &mask)) { mask 648 source3/utils/net_sam.c status = privilege_enum_sids(&mask, talloc_tos(), mask 680 source3/utils/net_sam.c SE_PRIV mask; mask 696 source3/utils/net_sam.c if (!se_priv_from_name(argv[i], &mask)) { mask 701 source3/utils/net_sam.c if (!grant_privilege(&sid, &mask)) { mask 718 source3/utils/net_sam.c SE_PRIV mask; mask 735 source3/utils/net_sam.c if (!se_priv_from_name(argv[i], &mask)) { mask 740 source3/utils/net_sam.c if (!revoke_privilege(&sid, &mask)) { mask 38 source3/utils/sharesec.c uint32 mask; mask 92 source3/utils/sharesec.c if (ace->access_mask == v->mask) { mask 105 source3/utils/sharesec.c if ((ace->access_mask & v->mask) == v->mask) { mask 109 source3/utils/sharesec.c got_mask &= ~v->mask; mask 161 source3/utils/sharesec.c uint32_t mask; mask 252 source3/utils/sharesec.c amask = v->mask; mask 264 source3/utils/sharesec.c amask |= v->mask; mask 286 source3/utils/sharesec.c mask = amask; mask 287 source3/utils/sharesec.c init_sec_ace(ace, &sid, atype, mask, aflags); mask 40 source3/utils/smbcacls.c uint32 mask; mask 297 source3/utils/smbcacls.c if (ace->access_mask == v->mask) { mask 310 source3/utils/smbcacls.c if ((ace->access_mask & v->mask) == v->mask) { mask 314 source3/utils/smbcacls.c got_mask &= ~v->mask; mask 371 source3/utils/smbcacls.c uint32_t mask; mask 486 source3/utils/smbcacls.c amask = v->mask; mask 498 source3/utils/smbcacls.c amask |= v->mask; mask 520 source3/utils/smbcacls.c mask = amask; mask 521 source3/utils/smbcacls.c init_sec_ace(ace, &sid, atype, mask, aflags); mask 512 source4/client/client.c static void do_list_helper(struct clilist_file_info *f, const char *mask, void *state) mask 526 source4/client/client.c mask2 = talloc_strdup(NULL, mask); mask 545 source4/client/client.c static void do_list(struct smbclient_context *ctx, const char *mask,uint16_t attribute, mask 565 source4/client/client.c add_to_do_list_queue(mask); mask 602 source4/client/client.c if (smbcli_list(ctx->cli->tree, mask, attribute, do_list_helper, ctx) == -1) mask 604 source4/client/client.c d_printf("%s listing %s\n", smbcli_errstr(ctx->cli->tree), mask); mask 618 source4/client/client.c char *mask; mask 623 source4/client/client.c mask = talloc_strdup(ctx, ctx->remote_cur_dir); mask 624 source4/client/client.c if(mask[strlen(mask)-1]!='\\') mask 625 source4/client/client.c mask = talloc_append_string(ctx, mask,"\\"); mask 628 source4/client/client.c mask = talloc_strdup(ctx, args[1]); mask 629 source4/client/client.c if (mask[0] != '\\') mask 630 source4/client/client.c mask = talloc_append_string(ctx, mask, "\\"); mask 631 source4/client/client.c dos_format(mask); mask 636 source4/client/client.c mask = talloc_append_string(ctx, mask, "*.*"); mask 638 source4/client/client.c mask = talloc_append_string(ctx, mask, "*"); mask 642 source4/client/client.c do_list(ctx, mask, attribute, display_finfo, ctx->recurse, true); mask 659 source4/client/client.c char *mask; mask 665 source4/client/client.c mask = talloc_strdup(ctx, args[1]); mask 667 source4/client/client.c mask = talloc_asprintf(ctx, "%s\\%s", ctx->remote_cur_dir, args[1]); mask 668 source4/client/client.c dos_format(mask); mask 670 source4/client/client.c mask = talloc_asprintf(ctx, "%s\\*", ctx->remote_cur_dir); mask 673 source4/client/client.c do_list(ctx, mask, attribute, do_du, ctx->recurse, true); mask 675 source4/client/client.c talloc_free(mask); mask 1022 source4/client/client.c char *mask, *p; mask 1030 source4/client/client.c mask = talloc_asprintf(ctx, "%s%s", ctx->remote_cur_dir,args[1]); mask 1033 source4/client/client.c dos_clean_name(mask); mask 1035 source4/client/client.c trim_string(mask,".",NULL); mask 1036 source4/client/client.c for (p = strtok(mask,"/\\"); p; p = strtok(p, "/\\")) { mask 1037 source4/client/client.c char *parent = talloc_strndup(ctx, mask, PTR_DIFF(p, mask)); mask 1046 source4/client/client.c do_mkdir(ctx, mask); mask 1522 source4/client/client.c char *mask; mask 1532 source4/client/client.c mask = talloc_asprintf(ctx,"%s%s", ctx->remote_cur_dir, args[1]); mask 1534 source4/client/client.c if (NT_STATUS_IS_ERR(smbcli_unlink(ctx->cli->tree, mask))) { mask 1535 source4/client/client.c d_printf("%s deleting remote file %s\n",smbcli_errstr(ctx->cli->tree),mask); mask 2128 source4/client/client.c char *mask; mask 2134 source4/client/client.c mask = talloc_asprintf(ctx, "%s%s", ctx->remote_cur_dir, args[1]); mask 2136 source4/client/client.c smbcli_open(ctx->cli->tree, mask, O_RDWR, DENY_ALL); mask 2147 source4/client/client.c char *mask; mask 2153 source4/client/client.c mask = talloc_asprintf(ctx, "%s%s", ctx->remote_cur_dir, args[1]); mask 2155 source4/client/client.c if (NT_STATUS_IS_ERR(smbcli_rmdir(ctx->cli->tree, mask))) { mask 2157 source4/client/client.c smbcli_errstr(ctx->cli->tree),mask); mask 2793 source4/client/client.c static void completion_remote_filter(struct clilist_file_info *f, const char *mask, void *state) mask 2737 source4/heimdal/lib/hcrypto/imath/imath.c mp_digit mask = (1 << rest) - 1; mask 2741 source4/heimdal/lib/hcrypto/imath/imath.c z->digits[start - 1] &= mask; mask 3034 source4/heimdal/lib/hx509/cert.c int type, mask, i, num; mask 3053 source4/heimdal/lib/hx509/cert.c while (fscanf(f, "%d %d\n", &type, &mask) == 2) { mask 3057 source4/heimdal/lib/hx509/cert.c while (mask && i < sizeof(stats)/sizeof(stats[0])) { mask 3058 source4/heimdal/lib/hx509/cert.c if (mask & 1) { mask 3062 source4/heimdal/lib/hx509/cert.c mask = mask >>1 ; mask 847 source4/heimdal/lib/krb5/store.c uint32_t mask = 0xffff0000; mask 850 source4/heimdal/lib/krb5/store.c if (creds->flags.i & mask) mask 851 source4/heimdal/lib/krb5/store.c mask = ~mask; mask 852 source4/heimdal/lib/krb5/store.c if (dummy32 & mask) mask 1002 source4/heimdal/lib/krb5/store.c uint32_t mask = 0xffff0000; mask 1005 source4/heimdal/lib/krb5/store.c if (creds->flags.i & mask) mask 1006 source4/heimdal/lib/krb5/store.c mask = ~mask; mask 1007 source4/heimdal/lib/krb5/store.c if (dummy32 & mask) mask 45 source4/lib/socket/access.c uint32_t mask; mask 58 source4/lib/socket/access.c mask = interpret_addr(slash + 1); mask 60 source4/lib/socket/access.c mask = (uint32_t)((ALLONES >> atoi(slash + 1)) ^ ALLONES); mask 62 source4/lib/socket/access.c mask = htonl(mask); mask 65 source4/lib/socket/access.c if (net == INADDR_NONE || mask == INADDR_NONE) { mask 70 source4/lib/socket/access.c return (addr & mask) == (net & mask); mask 85 source4/libcli/clideltree.c char *mask; mask 112 source4/libcli/clideltree.c asprintf(&mask, "%s\\*", dname); mask 113 source4/libcli/clideltree.c smbcli_unlink(dstate.tree, mask); mask 114 source4/libcli/clideltree.c smbcli_list(dstate.tree, mask, mask 117 source4/libcli/clideltree.c free(mask); mask 113 source4/libcli/clilist.c char *mask; mask 124 source4/libcli/clilist.c mask = talloc_strdup(state.mem_ctx, Mask); mask 144 source4/libcli/clilist.c first_parms.t2ffirst.in.pattern = mask; mask 271 source4/libcli/clilist.c char *mask; mask 282 source4/libcli/clilist.c mask = talloc_strdup(state.mem_ctx, Mask); mask 293 source4/libcli/clilist.c first_parms.search_first.in.pattern = mask; mask 183 source4/libcli/security/privilege.c uint64_t mask = 1; mask 189 source4/libcli/security/privilege.c mask <<= (privilege-1); mask 190 source4/libcli/security/privilege.c return mask; mask 199 source4/libcli/security/privilege.c uint64_t mask; mask 205 source4/libcli/security/privilege.c mask = sec_privilege_mask(privilege); mask 206 source4/libcli/security/privilege.c if (token->privilege_mask & mask) { mask 233 source4/libcli/security/privilege.c uint64_t mask = sec_privilege_mask(privilege); mask 235 source4/libcli/security/privilege.c if (token->privilege_mask & mask) { mask 351 source4/libcli/security/security_descriptor.c uint32_t mask) mask 356 source4/libcli/security/security_descriptor.c if ((sd1->type & mask) != (sd2->type & mask)) return false; mask 360 source4/libcli/security/security_descriptor.c if ((mask & SEC_DESC_DACL_PRESENT) && !security_acl_equal(sd1->dacl, sd2->dacl)) return false; mask 361 source4/libcli/security/security_descriptor.c if ((mask & SEC_DESC_SACL_PRESENT) && !security_acl_equal(sd1->sacl, sd2->sacl)) return false; mask 656 source4/nbt_server/wins/winsserver.c const char *mask; mask 670 source4/nbt_server/wins/winsserver.c mask = lp_parm_string(lp_ctx, NULL, "nbtd", "wins_randomize1Clist_mask"); mask 671 source4/nbt_server/wins/winsserver.c if (!mask) { mask 672 source4/nbt_server/wins/winsserver.c mask = "255.255.255.0"; mask 686 source4/nbt_server/wins/winsserver.c same = iface_same_net(addresses[idx], src->addr, mask); mask 65 source4/ntvfs/cifs_posix_cli/svfs_util.c char *p, *mask; mask 86 source4/ntvfs/cifs_posix_cli/svfs_util.c mask = p+1; mask 88 source4/ntvfs/cifs_posix_cli/svfs_util.c low_mask = talloc_strdup(mem_ctx, mask); mask 38 source4/ntvfs/posix/pvfs_read.c uint32_t mask; mask 53 source4/ntvfs/posix/pvfs_read.c mask = SEC_FILE_READ_DATA; mask 55 source4/ntvfs/posix/pvfs_read.c mask |= SEC_FILE_EXECUTE; mask 57 source4/ntvfs/posix/pvfs_read.c if (!(f->access_mask & mask)) { mask 37 source4/ntvfs/posix/pvfs_rename.c uint32_t mask; mask 48 source4/ntvfs/posix/pvfs_rename.c mask = FILE_NOTIFY_CHANGE_DIR_NAME; mask 50 source4/ntvfs/posix/pvfs_rename.c mask = FILE_NOTIFY_CHANGE_FILE_NAME; mask 63 source4/ntvfs/posix/pvfs_rename.c mask, mask 67 source4/ntvfs/posix/pvfs_rename.c mask, mask 72 source4/ntvfs/posix/pvfs_rename.c mask, mask 76 source4/ntvfs/posix/pvfs_rename.c mask, mask 62 source4/ntvfs/simple/svfs_util.c char *p, *mask; mask 83 source4/ntvfs/simple/svfs_util.c mask = p+1; mask 85 source4/ntvfs/simple/svfs_util.c low_mask = talloc_strdup(mem_ctx, mask); mask 48 source4/ntvfs/sysdep/inotify.c static int inotify_add_watch(int fd, const char *path, __u32 mask) mask 50 source4/ntvfs/sysdep/inotify.c return syscall(__NR_inotify_add_watch, fd, path, mask); mask 81 source4/ntvfs/sysdep/inotify.c uint32_t mask; /* the inotify mask */ mask 94 source4/ntvfs/sysdep/inotify.c if ((e->mask & w->mask) == 0) { mask 101 source4/ntvfs/sysdep/inotify.c if (e->mask & IN_ISDIR) { mask 106 source4/ntvfs/sysdep/inotify.c if ((e->mask & IN_ATTRIB) && mask 114 source4/ntvfs/sysdep/inotify.c if ((e->mask & IN_MODIFY) && mask 142 source4/ntvfs/sysdep/inotify.c if ((e->mask & (IN_ATTRIB|IN_MODIFY|IN_CREATE|IN_DELETE| mask 149 source4/ntvfs/sysdep/inotify.c if (e->mask & IN_CREATE) { mask 151 source4/ntvfs/sysdep/inotify.c } else if (e->mask & IN_DELETE) { mask 153 source4/ntvfs/sysdep/inotify.c } else if (e->mask & IN_MOVED_FROM) { mask 159 source4/ntvfs/sysdep/inotify.c } else if (e->mask & IN_MOVED_TO) { mask 182 source4/ntvfs/sysdep/inotify.c (e->mask & IN_ISDIR) != 0) { mask 187 source4/ntvfs/sysdep/inotify.c e->mask = IN_ATTRIB; mask 348 source4/ntvfs/sysdep/inotify.c uint32_t mask; mask 362 source4/ntvfs/sysdep/inotify.c mask = inotify_map(e); mask 363 source4/ntvfs/sysdep/inotify.c if (mask == 0) { mask 370 source4/ntvfs/sysdep/inotify.c mask |= (IN_MASK_ADD | IN_ONLYDIR); mask 373 source4/ntvfs/sysdep/inotify.c wd = inotify_add_watch(in->fd, e->path, mask); mask 390 source4/ntvfs/sysdep/inotify.c w->mask = mask; mask 1290 source4/rpc_server/netlogon/dcerpc_netlogon.c r2.in.mask = 0; mask 1315 source4/rpc_server/netlogon/dcerpc_netlogon.c r2.in.mask = 0; mask 625 source4/torture/gentest.c uint32_t mask; mask 630 source4/torture/gentest.c mask = va_arg(ap, uint32_t); mask 633 source4/torture/gentest.c return mask & random(); mask 643 source4/torture/gentest.c static uint32_t gen_bits_mask(uint_t mask) mask 646 source4/torture/gentest.c return ret & mask; mask 141 source4/torture/masktest.c const char *mask; mask 145 source4/torture/masktest.c mask = "\\masktest\\*.*"; mask 147 source4/torture/masktest.c mask = "\\masktest\\*"; mask 154 source4/torture/masktest.c smbcli_list_new(cli->tree, mask, mask 171 source4/torture/masktest.c static void testpair(TALLOC_CTX *mem_ctx, struct smbcli_state *cli, char *mask, mask 199 source4/torture/masktest.c smbcli_list_new(cli->tree, mask, mask 204 source4/torture/masktest.c res2 = reg_test(cli, mem_ctx, mask, long_name, short_name); mask 208 source4/torture/masktest.c res1, res2, count, mask, file, long_name, short_name); mask 223 source4/torture/masktest.c char *mask, *file; mask 234 source4/torture/masktest.c mask = talloc_strdup(mem_ctx, "\\masktest\\"); mask 236 source4/torture/masktest.c mask = talloc_strdup_append(mask, argv[0]); mask 238 source4/torture/masktest.c testpair(mem_ctx, cli, mask, file); mask 248 source4/torture/masktest.c mask = talloc_strdup(mem_ctx, "\\masktest\\"); mask 250 source4/torture/masktest.c mask = talloc_realloc_size(mem_ctx, mask, strlen(mask)+l1+1); mask 252 source4/torture/masktest.c l = strlen(mask); mask 254 source4/torture/masktest.c mask[i+l] = maskchars[random() % mc_len]; mask 256 source4/torture/masktest.c mask[l+l1] = 0; mask 263 source4/torture/masktest.c if (ISDOT(file+l) || ISDOTDOT(file+l) || ISDOTDOT(mask+l)) { mask 269 source4/torture/masktest.c testpair(mem_ctx, cli, mask, file); mask 914 source4/torture/nbench/nbio.c bool nb_findfirst(const char *mask, int level, int maxcnt, int count, NTSTATUS status) mask 926 source4/torture/nbench/nbio.c io.t2ffirst.in.pattern = mask; mask 554 source4/torture/raw/notify.c uint32_t mask; mask 588 source4/torture/raw/notify.c do { for (mask=i=0;i<32;i++) { \ mask 632 source4/torture/raw/notify.c mask |= (1<<i); \ mask 634 source4/torture/raw/notify.c if ((expected) != mask) { \ mask 635 source4/torture/raw/notify.c if (((expected) & ~mask) != 0) { \ mask 637 source4/torture/raw/notify.c mask, expected); \ mask 641 source4/torture/raw/notify.c mask, expected); \ mask 63 source4/torture/raw/samba3hide.c static void set_visible(struct clilist_file_info *i, const char *mask, mask 1955 source4/torture/rpc/netlogon.c r.in.mask = 0x00000000; mask 1970 source4/torture/rpc/netlogon.c r.in.mask = ACB_SVRTRUST; mask 4899 source4/torture/rpc/samr.c uint32_t mask, resume_handle=0; mask 4919 source4/torture/rpc/samr.c r.in.acct_flags = mask = masks[mask_idx]; mask 4939 source4/torture/rpc/samr.c if (mask) { mask 4940 source4/torture/rpc/samr.c if (!check_mask(p, tctx, handle, sam->entries[i].idx, mask)) { mask 50 source4/torture/rpc/samr_accessmask.c uint32_t mask, struct policy_handle *h) mask 65 source4/torture/rpc/samr_accessmask.c r5.in.access_mask = mask; mask 79 source4/torture/rpc/samr_accessmask.c uint32_t mask; mask 82 source4/torture/rpc/samr_accessmask.c mask = 1; mask 84 source4/torture/rpc/samr_accessmask.c printf("testing Connect5 with access mask 0x%08x", mask); mask 85 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &h); mask 86 source4/torture/rpc/samr_accessmask.c mask <<= 1; mask 150 source4/torture/rpc/samr_accessmask.c uint32_t mask; mask 156 source4/torture/rpc/samr_accessmask.c mask = 1; mask 158 source4/torture/rpc/samr_accessmask.c printf("testing Connect5/EnumDomains with access mask 0x%08x", mask); mask 159 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch); mask 160 source4/torture/rpc/samr_accessmask.c mask <<= 1; mask 409 source4/torture/rpc/samr_accessmask.c uint32_t mask; mask 412 source4/torture/rpc/samr_accessmask.c mask = 1; mask 414 source4/torture/rpc/samr_accessmask.c printf("testing Connect5/LookupDomain with access mask 0x%08x", mask); mask 415 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch); mask 416 source4/torture/rpc/samr_accessmask.c mask <<= 1; mask 498 source4/torture/rpc/samr_accessmask.c uint32_t mask; mask 521 source4/torture/rpc/samr_accessmask.c mask = 1; mask 523 source4/torture/rpc/samr_accessmask.c printf("testing Connect5/OpenDomain with access mask 0x%08x", mask); mask 524 source4/torture/rpc/samr_accessmask.c status = torture_samr_Connect5(tctx, p, mask, &ch); mask 525 source4/torture/rpc/samr_accessmask.c mask <<= 1;