mask               83 examples/VFS/skel_opaque.c static SMB_STRUCT_DIR *skel_opendir(vfs_handle_struct *handle,  const char *fname, const char *mask, uint32 attr)
mask               85 examples/VFS/skel_opaque.c 	return vfswrap_opendir(NULL,  fname, mask, attr);
mask               77 examples/VFS/skel_transparent.c static SMB_STRUCT_DIR *skel_opendir(vfs_handle_struct *handle,  const char *fname, const char *mask, uint32 attr)
mask               79 examples/VFS/skel_transparent.c 	return SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask              591 lib/util/util.h _PUBLIC_ bool same_net_v4(struct in_addr ip1,struct in_addr ip2,struct in_addr mask);
mask              154 lib/util/util_net.c _PUBLIC_ bool same_net_v4(struct in_addr ip1, struct in_addr ip2, struct in_addr mask)
mask              158 lib/util/util_net.c 	nmask = ntohl(mask.s_addr);
mask              324 lib/util/util_net.c 		const struct sockaddr *mask)
mask              335 lib/util/util_net.c 		struct sockaddr_in6 mask_6 = *(const struct sockaddr_in6 *)mask;
mask              354 lib/util/util_net.c 				((const struct sockaddr_in *)mask)->sin_addr);
mask               52 lib/zlib/contrib/infback9/inftree9.c     unsigned mask;              /* mask for low root bits */
mask              203 lib/zlib/contrib/infback9/inftree9.c     mask = used - 1;            /* mask for comparing low */
mask              253 lib/zlib/contrib/infback9/inftree9.c         if (len > root && (huff & mask) != low) {
mask              277 lib/zlib/contrib/infback9/inftree9.c             low = huff & mask;
mask              296 lib/zlib/contrib/infback9/inftree9.c         if (drop != 0 && (huff & mask) != low) {
mask              205 lib/zlib/examples/gun.c     unsigned mask;              /* mask for current bits codes */
mask              239 lib/zlib/examples/gun.c     mask = 0x1ff;
mask              263 lib/zlib/examples/gun.c         if (end >= mask && bits < max) {
mask              266 lib/zlib/examples/gun.c             mask <<= 1;
mask              267 lib/zlib/examples/gun.c             mask++;
mask              292 lib/zlib/examples/gun.c         code &= mask;                       /* mask to current code length */
mask              300 lib/zlib/examples/gun.c             mask = 0x1ff;
mask              333 lib/zlib/examples/gun.c         if (end < mask) {
mask               52 lib/zlib/inftrees.c     unsigned mask;              /* mask for low root bits */
mask              209 lib/zlib/inftrees.c     mask = used - 1;            /* mask for comparing low */
mask              260 lib/zlib/inftrees.c         if (len > root && (huff & mask) != low) {
mask              284 lib/zlib/inftrees.c             low = huff & mask;
mask              303 lib/zlib/inftrees.c         if (drop != 0 && (huff & mask) != low) {
mask               61 libcli/security/secace.c 		  uint32_t mask, uint8_t flag)
mask               66 libcli/security/secace.c 	t->access_mask = mask;
mask               75 libcli/security/secace.c NTSTATUS sec_ace_add_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, unsigned *num, struct dom_sid *sid, uint32_t mask)
mask               92 libcli/security/secace.c 	(*pp_new)[i].access_mask = mask;
mask              101 libcli/security/secace.c NTSTATUS sec_ace_mod_sid(struct security_ace *ace, size_t num, struct dom_sid *sid, uint32_t mask)
mask              109 libcli/security/secace.c 			ace[i].access_mask = mask;
mask               29 libcli/security/secace.h 		  uint32_t mask, uint8_t flag);
mask               30 libcli/security/secace.h NTSTATUS sec_ace_add_sid(TALLOC_CTX *ctx, struct security_ace **pp_new, struct security_ace *old, unsigned *num, struct dom_sid *sid, uint32_t mask);
mask               31 libcli/security/secace.h NTSTATUS sec_ace_mod_sid(struct security_ace *ace, size_t num, struct dom_sid *sid, uint32_t mask);
mask             1709 librpc/gen_ndr/cli_netlogon.c 				     uint32_t mask /* [in]  */,
mask             1723 librpc/gen_ndr/cli_netlogon.c 	r.in.mask = mask;
mask              275 librpc/gen_ndr/cli_netlogon.h 				     uint32_t mask /* [in]  */,
mask             14062 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_samr_AcctFlags(ndr, NDR_SCALARS, r->in.mask));
mask             14150 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_pull_samr_AcctFlags(ndr, NDR_SCALARS, &r->in.mask));
mask             14249 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_samr_AcctFlags(ndr, "mask", r->in.mask);
mask             1562 librpc/gen_ndr/netlogon.h 		uint32_t mask;
mask              712 source3/client/client.c static void do_list_helper(const char *mntpoint, file_info *f, const char *mask, void *state)
mask              719 source3/client/client.c 	dir = talloc_strdup(ctx, mask);
mask              747 source3/client/client.c 					mask);
mask              783 source3/client/client.c void do_list(const char *mask,
mask              807 source3/client/client.c 		add_to_do_list_queue(mask);
mask              858 source3/client/client.c 		if (cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetpath)) {
mask              865 source3/client/client.c 			d_printf("do_list: [%s] %s\n", mask, cli_errstr(cli));
mask              881 source3/client/client.c 	char *mask = NULL;
mask              886 source3/client/client.c 	mask = talloc_strdup(ctx, client_get_cur_dir());
mask              887 source3/client/client.c 	if (!mask) {
mask              894 source3/client/client.c 			mask = talloc_strdup(ctx, buf);
mask              896 source3/client/client.c 			mask = talloc_asprintf_append(mask, "%s", buf);
mask              899 source3/client/client.c 		mask = talloc_asprintf_append(mask, "*");
mask              901 source3/client/client.c 	if (!mask) {
mask              910 source3/client/client.c 	do_list(mask, attribute, display_finfo, recurse, true);
mask              927 source3/client/client.c 	char *mask = NULL;
mask              932 source3/client/client.c 	mask = talloc_strdup(ctx, client_get_cur_dir());
mask              933 source3/client/client.c 	if (!mask) {
mask              936 source3/client/client.c 	if ((mask[0] != '\0') && (mask[strlen(mask)-1]!=CLI_DIRSEP_CHAR)) {
mask              937 source3/client/client.c 		mask = talloc_asprintf_append(mask, "%s", CLI_DIRSEP_STR);
mask              938 source3/client/client.c 		if (!mask) {
mask              946 source3/client/client.c 			mask = talloc_strdup(ctx, buf);
mask              948 source3/client/client.c 			mask = talloc_asprintf_append(mask, "%s", buf);
mask              951 source3/client/client.c 		mask = talloc_strdup(ctx, "*");
mask              954 source3/client/client.c 	do_list(mask, attribute, do_du, recurse, true);
mask             1438 source3/client/client.c 	char *mask = NULL;
mask             1441 source3/client/client.c 	mask = talloc_strdup(ctx, client_get_cur_dir());
mask             1442 source3/client/client.c 	if (!mask) {
mask             1452 source3/client/client.c 	mask = talloc_asprintf_append(mask, "%s", buf);
mask             1453 source3/client/client.c 	if (!mask) {
mask             1470 source3/client/client.c 		if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask             1495 source3/client/client.c 		do_mkdir(mask);
mask             2102 source3/client/client.c 	char *mask = NULL;
mask             2104 source3/client/client.c 	mask = talloc_asprintf(ctx,
mask             2109 source3/client/client.c 	if (!mask) {
mask             2114 source3/client/client.c 		TALLOC_FREE(mask);
mask             2118 source3/client/client.c 	if (!cli_unlink(finfo->cli, mask)) {
mask             2120 source3/client/client.c 				cli_errstr(finfo->cli),mask);
mask             2122 source3/client/client.c 	TALLOC_FREE(mask);
mask             2132 source3/client/client.c 	char *mask = NULL;
mask             2140 source3/client/client.c 	mask = talloc_strdup(ctx, client_get_cur_dir());
mask             2141 source3/client/client.c 	if (!mask) {
mask             2148 source3/client/client.c 	mask = talloc_asprintf_append(mask, "%s", buf);
mask             2149 source3/client/client.c 	if (!mask) {
mask             2153 source3/client/client.c 	do_list(mask,attribute,do_del,false,false);
mask             2164 source3/client/client.c 	char *mask = NULL;
mask             2182 source3/client/client.c 	mask = talloc_asprintf(ctx, "%s%s",
mask             2185 source3/client/client.c 	if (!mask) {
mask             2189 source3/client/client.c 	if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask             2190 source3/client/client.c 		d_printf("cmd_wdel %s: %s\n", mask, cli_errstr(cli));
mask             2206 source3/client/client.c 	char *mask = NULL;
mask             2216 source3/client/client.c 	mask = talloc_asprintf(ctx,
mask             2220 source3/client/client.c 	if (!mask) {
mask             2224 source3/client/client.c 	if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask             2225 source3/client/client.c 		d_printf("open %s: %s\n", mask, cli_errstr(cli));
mask             2292 source3/client/client.c 	char *mask = NULL;
mask             2303 source3/client/client.c 	mask = talloc_asprintf(ctx,
mask             2307 source3/client/client.c 	if (!mask) {
mask             2317 source3/client/client.c 	if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask             2318 source3/client/client.c 		d_printf("posix_open %s: %s\n", mask, cli_errstr(cli));
mask             2340 source3/client/client.c 	char *mask = NULL;
mask             2351 source3/client/client.c 	mask = talloc_asprintf(ctx,
mask             2355 source3/client/client.c 	if (!mask) {
mask             2365 source3/client/client.c 	if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask             2366 source3/client/client.c 		d_printf("posix_mkdir %s: %s\n", mask, cli_errstr(cli));
mask             2382 source3/client/client.c 	char *mask = NULL;
mask             2391 source3/client/client.c 	mask = talloc_asprintf(ctx,
mask             2395 source3/client/client.c 	if (!mask) {
mask             2399 source3/client/client.c 	if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask             2400 source3/client/client.c 		d_printf("posix_unlink %s: %s\n", mask, cli_errstr(cli));
mask             2416 source3/client/client.c 	char *mask = NULL;
mask             2425 source3/client/client.c 	mask = talloc_asprintf(ctx,
mask             2429 source3/client/client.c 	if (!mask) {
mask             2433 source3/client/client.c 	if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask             2434 source3/client/client.c 		d_printf("posix_rmdir %s: %s\n", mask, cli_errstr(cli));
mask             2656 source3/client/client.c 	char *mask = NULL;
mask             2665 source3/client/client.c 	mask = talloc_asprintf(ctx,
mask             2669 source3/client/client.c 	if (!mask) {
mask             2673 source3/client/client.c 	if (!cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli, &targetname)) {
mask             2674 source3/client/client.c 		d_printf("rmdir %s: %s\n", mask, cli_errstr(cli));
mask             2680 source3/client/client.c 			 cli_errstr(targetcli),mask);
mask             4110 source3/client/client.c 				const char *mask,
mask               31 source3/client/client_proto.h void do_list(const char *mask,
mask             1578 source3/client/clitar.c 				char *mask = talloc_asprintf(ctx,
mask             1581 source3/client/clitar.c 				if (!mask) {
mask             1584 source3/client/clitar.c 				DEBUG(5, ("process_tar, do_list with mask: %s\n", mask));
mask             1585 source3/client/clitar.c 				do_list(mask,attribute,do_tar,False, True);
mask             1586 source3/client/clitar.c 				TALLOC_FREE(mask);
mask               33 source3/include/privileges.h 	uint32 mask[SE_PRIV_MASKSIZE];
mask              600 source3/include/proto.h NTSTATUS privilege_enum_sids(const SE_PRIV *mask, TALLOC_CTX *mem_ctx,
mask              619 source3/include/proto.h bool se_priv_put_all_privileges(SE_PRIV *mask);
mask              620 source3/include/proto.h void se_priv_add( SE_PRIV *mask, const SE_PRIV *addpriv );
mask              621 source3/include/proto.h void se_priv_remove( SE_PRIV *mask, const SE_PRIV *removepriv );
mask              623 source3/include/proto.h bool se_priv_from_name( const char *name, SE_PRIV *mask );
mask              624 source3/include/proto.h void dump_se_priv( int dbg_cl, int dbg_lvl, const SE_PRIV *mask );
mask              631 source3/include/proto.h LUID_ATTR get_privilege_luid( SE_PRIV *mask );
mask              633 source3/include/proto.h bool se_priv_to_privilege_set( PRIVILEGE_SET *set, SE_PRIV *mask );
mask              634 source3/include/proto.h bool privilege_set_to_se_priv( SE_PRIV *mask, struct lsa_PrivilegeSet *privset );
mask              682 source3/include/proto.h NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size);
mask              683 source3/include/proto.h NTSTATUS sec_desc_mod_sid(SEC_DESC *sd, DOM_SID *sid, uint32 mask);
mask             1354 source3/include/proto.h 		const struct sockaddr *mask);
mask             6243 source3/include/proto.h 			const char *mask,
mask             6277 source3/include/proto.h 		const char *mask,
mask             6287 source3/include/proto.h 			const char *name, const char *mask, uint32 attr);
mask             7172 source3/include/proto.h void nb_findfirst(const char *mask);
mask              316 source3/include/vfs.h 		SMB_STRUCT_DIR *(*opendir)(struct vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attributes);
mask               40 source3/include/vfs_macros.h #define SMB_VFS_OPENDIR(conn, fname, mask, attr) ((conn)->vfs.ops.opendir((conn)->vfs.handles.opendir, (fname), (mask), (attr)))
mask              174 source3/include/vfs_macros.h #define SMB_VFS_OPAQUE_OPENDIR(conn, fname, mask, attr) ((conn)->vfs_opaque.ops.opendir((conn)->vfs_opaque.handles.opendir, (fname), (mask), (attr)))
mask              308 source3/include/vfs_macros.h #define SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr) ((handle)->vfs_next.ops.opendir((handle)->vfs_next.handles.opendir, (fname), (mask), (attr)))
mask               40 source3/lib/privileges.c static bool get_privileges( const DOM_SID *sid, SE_PRIV *mask )
mask               69 source3/lib/privileges.c 	se_priv_copy( mask, (SE_PRIV*)data.dptr );
mask               79 source3/lib/privileges.c static bool set_privileges( const DOM_SID *sid, SE_PRIV *mask )
mask              102 source3/lib/privileges.c 	data.dptr  = (uint8 *)mask;
mask              115 source3/lib/privileges.c 	SE_PRIV mask;
mask              124 source3/lib/privileges.c 		if ( !get_privileges( &slist[i], &mask ) )
mask              129 source3/lib/privileges.c 		dump_se_priv( DBGC_ALL, 5, &mask );
mask              131 source3/lib/privileges.c 		se_priv_add( privileges, &mask );
mask              163 source3/lib/privileges.c 		SE_PRIV mask;
mask              165 source3/lib/privileges.c 		se_priv_copy( &mask, (SE_PRIV*)rec->value.dptr );
mask              170 source3/lib/privileges.c 		if ( !is_privilege_assigned( &mask, &priv->privilege) )
mask              229 source3/lib/privileges.c NTSTATUS privilege_enum_sids(const SE_PRIV *mask, TALLOC_CTX *mem_ctx,
mask              241 source3/lib/privileges.c 	se_priv_copy(&priv.privilege, mask);
mask              289 source3/lib/privileges.c 	SE_PRIV mask;
mask              291 source3/lib/privileges.c 	if (! se_priv_from_name(name, &mask)) {
mask              297 source3/lib/privileges.c 	return grant_privilege( sid, &mask );
mask              306 source3/lib/privileges.c 	SE_PRIV mask;
mask              310 source3/lib/privileges.c 	if ( !get_privileges( sid, &mask ) )
mask              316 source3/lib/privileges.c 	dump_se_priv( DBGC_ALL, 10, &mask );
mask              318 source3/lib/privileges.c 	se_priv_remove( &mask, priv_mask );
mask              321 source3/lib/privileges.c 	dump_se_priv( DBGC_ALL, 10, &mask );
mask              323 source3/lib/privileges.c 	return set_privileges( sid, &mask );
mask              341 source3/lib/privileges.c 	SE_PRIV mask;
mask              343 source3/lib/privileges.c 	if (! se_priv_from_name(name, &mask)) {
mask              349 source3/lib/privileges.c 	return revoke_privilege(sid, &mask);
mask              475 source3/lib/privileges.c 	SE_PRIV mask;
mask              477 source3/lib/privileges.c 	return get_privileges( sid, &mask );
mask              485 source3/lib/privileges.c 	SE_PRIV mask;
mask              487 source3/lib/privileges.c 	if (!se_priv_put_all_privileges(&mask)) {
mask              491 source3/lib/privileges.c 	return grant_privilege( sid, &mask );
mask              131 source3/lib/privileges_basic.c bool se_priv_put_all_privileges(SE_PRIV *mask)
mask              136 source3/lib/privileges_basic.c 	if (!se_priv_copy(mask, &se_priv_none)) {
mask              140 source3/lib/privileges_basic.c 		se_priv_add(mask, &privs[i].se_priv);
mask              149 source3/lib/privileges_basic.c void se_priv_add( SE_PRIV *mask, const SE_PRIV *addpriv )
mask              154 source3/lib/privileges_basic.c 		mask->mask[i] |= addpriv->mask[i];
mask              163 source3/lib/privileges_basic.c void se_priv_remove( SE_PRIV *mask, const SE_PRIV *removepriv )
mask              168 source3/lib/privileges_basic.c 		mask->mask[i] &= ~removepriv->mask[i];
mask              176 source3/lib/privileges_basic.c static void se_priv_invert( SE_PRIV *new_mask, const SE_PRIV *mask )
mask              181 source3/lib/privileges_basic.c 	se_priv_remove( &allprivs, mask );
mask              198 source3/lib/privileges_basic.c static bool se_priv_empty( const SE_PRIV *mask )
mask              203 source3/lib/privileges_basic.c 	se_priv_copy( &p1, mask );
mask              206 source3/lib/privileges_basic.c 		p1.mask[i] &= se_priv_all.mask[i];
mask              216 source3/lib/privileges_basic.c bool se_priv_from_name( const char *name, SE_PRIV *mask )
mask              222 source3/lib/privileges_basic.c 			se_priv_copy( mask, &privs[i].se_priv );
mask              234 source3/lib/privileges_basic.c void dump_se_priv( int dbg_cl, int dbg_lvl, const SE_PRIV *mask )
mask              241 source3/lib/privileges_basic.c 		DEBUGADDC( dbg_cl, dbg_lvl,(" 0x%x", mask->mask[i] ));
mask              383 source3/lib/privileges_basic.c LUID_ATTR get_privilege_luid( SE_PRIV *mask )
mask              392 source3/lib/privileges_basic.c 		if ( se_priv_equal( &privs[i].se_priv, mask ) ) {
mask              451 source3/lib/privileges_basic.c bool se_priv_to_privilege_set( PRIVILEGE_SET *set, SE_PRIV *mask )
mask              461 source3/lib/privileges_basic.c 		if ( !is_privilege_assigned(mask, &privs[i].se_priv) )
mask              476 source3/lib/privileges_basic.c static bool luid_to_se_priv( struct lsa_LUID *luid, SE_PRIV *mask )
mask              483 source3/lib/privileges_basic.c 			se_priv_copy( mask, &privs[i].se_priv );
mask              494 source3/lib/privileges_basic.c bool privilege_set_to_se_priv( SE_PRIV *mask, struct lsa_PrivilegeSet *privset )
mask              498 source3/lib/privileges_basic.c 	ZERO_STRUCTP( mask );
mask              510 source3/lib/privileges_basic.c 			se_priv_add( mask, &r );
mask              441 source3/lib/secdesc.c NTSTATUS sec_desc_add_sid(TALLOC_CTX *ctx, SEC_DESC **psd, DOM_SID *sid, uint32 mask, size_t *sd_size)
mask              453 source3/lib/secdesc.c 	status = sec_ace_add_sid(ctx, &ace, psd[0]->dacl->aces, &psd[0]->dacl->num_aces, sid, mask);
mask              474 source3/lib/secdesc.c NTSTATUS sec_desc_mod_sid(SEC_DESC *sd, DOM_SID *sid, uint32 mask)
mask              481 source3/lib/secdesc.c 	status = sec_ace_mod_sid(sd->dacl->aces, sd->dacl->num_aces, sid, mask);
mask               25 source3/libads/disp_sec.c 	uint32  mask;
mask               70 source3/libads/disp_sec.c 				if (perms[j].mask == (((unsigned) 1) << i)) {
mask               71 source3/libads/disp_sec.c 					printf("\n\t%s (0x%08x)", perms[j].str, perms[j].mask);
mask               27 source3/libgpo/gpo_filesync.c 	char *mask;
mask               33 source3/libgpo/gpo_filesync.c 			  const char *mask,
mask              111 source3/libgpo/gpo_filesync.c 	DEBUG(3,("calling cli_list with mask: %s\n", ctx->mask));
mask              114 source3/libgpo/gpo_filesync.c 		     ctx->mask,
mask              119 source3/libgpo/gpo_filesync.c 			ctx->mask, cli_errstr(ctx->cli)));
mask              132 source3/libgpo/gpo_filesync.c 			  const char *mask,
mask              148 source3/libgpo/gpo_filesync.c 		mask, info->name));
mask              174 source3/libgpo/gpo_filesync.c 		ctx->mask = talloc_asprintf(ctx->mem_ctx,
mask              177 source3/libgpo/gpo_filesync.c 		if (!ctx->local_path || !ctx->mask || !ctx->remote_path) {
mask              226 source3/libgpo/gpo_filesync.c 	ctx.mask = talloc_asprintf(mem_ctx,
mask              229 source3/libgpo/gpo_filesync.c 	if (!ctx.mask) {
mask              692 source3/libgpo/gpo_reg.c 	uint32_t mask;
mask              698 source3/libgpo/gpo_reg.c 	mask = REG_KEY_ALL;
mask              702 source3/libgpo/gpo_reg.c 		     mask, 0);
mask              704 source3/libgpo/gpo_reg.c 	mask = REG_KEY_ALL;
mask              708 source3/libgpo/gpo_reg.c 		     mask, 0);
mask              710 source3/libgpo/gpo_reg.c 	mask = REG_KEY_READ;
mask              714 source3/libgpo/gpo_reg.c 		     mask, 0);
mask              720 source3/libgpo/gpo_reg.c 	mask = REG_KEY_ALL;
mask              724 source3/libgpo/gpo_reg.c 		     mask, inherit_flags);
mask              726 source3/libgpo/gpo_reg.c 	mask = REG_KEY_ALL;
mask              730 source3/libgpo/gpo_reg.c 		     mask, inherit_flags);
mask              732 source3/libgpo/gpo_reg.c 	mask = REG_KEY_READ;
mask              736 source3/libgpo/gpo_reg.c 		     mask, inherit_flags);
mask              232 source3/libsmb/clilist.c 	char *mask = NULL;
mask              254 source3/libsmb/clilist.c 	mask = SMB_STRDUP(Mask);
mask              255 source3/libsmb/clilist.c 	if (!mask) {
mask              261 source3/libsmb/clilist.c 		size_t nlen = 2*(strlen(mask)+1);
mask              282 source3/libsmb/clilist.c 			p += clistr_push(cli, param+12, mask,
mask              300 source3/libsmb/clilist.c 				p += clistr_push(cli, param+12, mask,
mask              411 source3/libsmb/clilist.c 			if (!First && *mask && strcsequal(finfo.name, mask)) {
mask              419 source3/libsmb/clilist.c 		SAFE_FREE(mask);
mask              421 source3/libsmb/clilist.c 			mask = SMB_STRDUP(finfo.name);
mask              423 source3/libsmb/clilist.c 			mask = SMB_STRDUP("");
mask              425 source3/libsmb/clilist.c 		if (!mask) {
mask              486 source3/libsmb/clilist.c 	SAFE_FREE(mask);
mask              549 source3/libsmb/clilist.c 	char *mask = NULL;
mask              554 source3/libsmb/clilist.c 	mask = SMB_STRDUP(Mask);
mask              555 source3/libsmb/clilist.c 	if (!mask) {
mask              576 source3/libsmb/clilist.c 		p += clistr_push(cli, p, first?mask:"",
mask              609 source3/libsmb/clilist.c 			SAFE_FREE(mask);
mask              665 source3/libsmb/clilist.c 	SAFE_FREE(mask);
mask              239 source3/libsmb/libsmb_dir.c             const char *mask,
mask             1209 source3/libsmb/libsmb_dir.c               const char *mask,
mask              270 source3/libsmb/libsmb_xattr.c 	uint32_t mask;
mask              274 source3/libsmb/libsmb_xattr.c                 uint32 mask;
mask              357 source3/libsmb/libsmb_xattr.c 			amask = v->mask;
mask              369 source3/libsmb/libsmb_xattr.c 				amask |= v->mask;
mask              387 source3/libsmb/libsmb_xattr.c 	mask = amask;
mask              388 source3/libsmb/libsmb_xattr.c 	init_sec_ace(ace, &sid, atype, mask, aflags);
mask              104 source3/locking/posix.c 	SMB_OFF_T mask = (mask2<<1);
mask              105 source3/locking/posix.c 	SMB_OFF_T max_positive_lock_offset = ~mask;
mask              231 source3/modules/nfs4_acls.c 		uint32_t mask;
mask              270 source3/modules/nfs4_acls.c 		mask = ace->aceMask;
mask              272 source3/modules/nfs4_acls.c 			ace->aceType, mask,
mask               28 source3/modules/onefs.h 			      const char *fname, const char *mask,
mask              249 source3/modules/onefs_dir.c onefs_opendir(vfs_handle_struct *handle, const char *fname, const char *mask,
mask              259 source3/modules/onefs_dir.c 		return SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask              263 source3/modules/onefs_dir.c 	ret_dirp = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask              476 source3/modules/vfs_afsacl.c 	uint32 mask;
mask              542 source3/modules/vfs_afsacl.c 		     (ace->access_mask == m->mask) )
mask               33 source3/modules/vfs_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr);
mask              148 source3/modules/vfs_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask              152 source3/modules/vfs_audit.c 	result = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask               45 source3/modules/vfs_cap.c static SMB_STRUCT_DIR *cap_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask               53 source3/modules/vfs_cap.c 	return SMB_VFS_NEXT_OPENDIR(handle, capname, mask, attr);
mask               94 source3/modules/vfs_catia.c 			  const char *fname, const char *mask, uint32 attr)
mask              102 source3/modules/vfs_catia.c         return SMB_VFS_NEXT_OPENDIR(handle, name, mask, attr);
mask              155 source3/modules/vfs_default.c static SMB_STRUCT_DIR *vfswrap_opendir(vfs_handle_struct *handle,  const char *fname, const char *mask, uint32 attr)
mask               89 source3/modules/vfs_dirsort.c 				       const char *fname, const char *mask,
mask              102 source3/modules/vfs_dirsort.c 	data->source_directory = SMB_VFS_NEXT_OPENDIR(handle, fname, mask,
mask               36 source3/modules/vfs_extd_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr);
mask              159 source3/modules/vfs_extd_audit.c static SMB_STRUCT_DIR *audit_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask              163 source3/modules/vfs_extd_audit.c 	result = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask               95 source3/modules/vfs_full_audit.c 			  const char *fname, const char *mask, uint32 attr);
mask             1077 source3/modules/vfs_full_audit.c 			  const char *fname, const char *mask, uint32 attr)
mask             1081 source3/modules/vfs_full_audit.c 	result = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask              174 source3/modules/vfs_netatalk.c static SMB_STRUCT_DIR *atalk_opendir(struct vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask              178 source3/modules/vfs_netatalk.c 	ret = SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr);
mask               55 source3/modules/vfs_notify_fam.c 	uint32_t mask; /* the inotify mask */
mask              171 source3/modules/vfs_onefs_shadow_copy.c 			  const char *mask, uint32_t attr)
mask              174 source3/modules/vfs_onefs_shadow_copy.c 		    (handle, cpath ?: path, mask, attr),
mask               74 source3/modules/vfs_shadow_copy.c static SMB_STRUCT_DIR *shadow_copy_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
mask               77 source3/modules/vfs_shadow_copy.c 	SMB_STRUCT_DIR *p = SMB_VFS_NEXT_OPENDIR(handle,fname,mask,attr);
mask              346 source3/modules/vfs_shadow_copy2.c 			  const char *fname, const char *mask, uint32 attr)
mask              348 source3/modules/vfs_shadow_copy2.c         SHADOW2_NEXT(OPENDIR, (handle, name, mask, attr), SMB_STRUCT_DIR *, NULL);
mask               39 source3/pam_smbpass/general.h      unsigned int mask;            /* shall assume 32 bits of flags */
mask               58 source3/pam_smbpass/general.h #define set(x,ctrl)   (ctrl = ((ctrl)&smb_args[x].mask)|smb_args[x].flag)
mask              232 source3/pam_smbpass/support.c             ctrl &= smb_args[j].mask;	/* for turning things off */
mask             1701 source3/rpc_server/srv_lsa_nt.c 	SE_PRIV mask;
mask             1718 source3/rpc_server/srv_lsa_nt.c 	if ( !get_privileges_for_sids( &mask, &info->sid, 1 ) )
mask             1723 source3/rpc_server/srv_lsa_nt.c 	if ( se_priv_to_privilege_set( &privileges, &mask ) ) {
mask             1860 source3/rpc_server/srv_lsa_nt.c 	SE_PRIV mask;
mask             1876 source3/rpc_server/srv_lsa_nt.c 	if ( !privilege_set_to_se_priv( &mask, set ) )
mask             1879 source3/rpc_server/srv_lsa_nt.c 	if ( !grant_privilege( &info->sid, &mask ) ) {
mask             1883 source3/rpc_server/srv_lsa_nt.c 		dump_se_priv( DBGC_ALL, 3, &mask );
mask             1899 source3/rpc_server/srv_lsa_nt.c 	SE_PRIV mask;
mask             1916 source3/rpc_server/srv_lsa_nt.c 	if ( !privilege_set_to_se_priv( &mask, set ) )
mask             1919 source3/rpc_server/srv_lsa_nt.c 	if ( !revoke_privilege( &info->sid, &mask ) ) {
mask             1923 source3/rpc_server/srv_lsa_nt.c 		dump_se_priv( DBGC_ALL, 3, &mask );
mask             2244 source3/rpc_server/srv_lsa_nt.c 	SE_PRIV mask;
mask             2264 source3/rpc_server/srv_lsa_nt.c 	if ( !get_privileges_for_sids( &mask, &sid, 1 ) )
mask             2269 source3/rpc_server/srv_lsa_nt.c 	if ( se_priv_to_privilege_set( &privileges, &mask ) ) {
mask             2294 source3/rpc_server/srv_lsa_nt.c 	SE_PRIV mask;
mask             2312 source3/rpc_server/srv_lsa_nt.c 	if ( !se_priv_from_name( name, &mask ) )
mask             2315 source3/rpc_server/srv_lsa_nt.c 	priv_luid = get_privilege_luid( &mask );
mask              298 source3/rpcclient/cmd_netlogon.c 	uint32_t mask = 0;
mask              315 source3/rpcclient/cmd_netlogon.c 		mask = atoi(argv[2]);
mask              341 source3/rpcclient/cmd_netlogon.c 					     mask,
mask               74 source3/smbd/dir.c 			const char *mask,
mask               82 source3/smbd/dir.c 	char *mask2 = talloc_strdup(ctx, mask);
mask              784 source3/smbd/dir.c 	uint32 mask;
mask              793 source3/smbd/dir.c 	mask = ((dirtype >> 8) & (aDIR|aARCH|aRONLY|aHIDDEN|aSYSTEM)); /* & 0x37 */
mask              794 source3/smbd/dir.c 	if(mask) {
mask              795 source3/smbd/dir.c 		if((mask & (mode & (aDIR|aARCH|aRONLY|aHIDDEN|aSYSTEM))) == mask)   /* check if matching attribute present */
mask              806 source3/smbd/dir.c 		const char *mask)
mask              813 source3/smbd/dir.c 	return mask_match_search(mname,mask,False);
mask              822 source3/smbd/dir.c 		const char *mask,
mask              863 source3/smbd/dir.c 		if ((strcmp(mask,"*.*") == 0) ||
mask              864 source3/smbd/dir.c 		    mask_match_search(filename,mask,False) ||
mask              865 source3/smbd/dir.c 		    mangle_mask_match(conn,filename,mask)) {
mask              929 source3/smbd/dir.c 				mask,
mask             1108 source3/smbd/dir.c 			const char *name, const char *mask, uint32 attr)
mask             1128 source3/smbd/dir.c 	dirp->dir = SMB_VFS_OPENDIR(conn, dirp->dir_path, mask, attr);
mask              545 source3/smbd/dosmode.c 	int mask=0;
mask              627 source3/smbd/dosmode.c 	mask |= (S_ISUID | S_ISGID);
mask              631 source3/smbd/dosmode.c 	mask |= S_ISVTX;
mask              636 source3/smbd/dosmode.c 		mask |= S_IXUSR;
mask              638 source3/smbd/dosmode.c 		mask |= S_IXGRP;
mask              640 source3/smbd/dosmode.c 		mask |= S_IXOTH;
mask              642 source3/smbd/dosmode.c 	unixmode |= (st->st_mode & mask);
mask               50 source3/smbd/notify_inotify.c static int inotify_add_watch(int fd, const char *path, __u32 mask)
mask               52 source3/smbd/notify_inotify.c 	return syscall(__NR_inotify_add_watch, fd, path, mask);
mask               88 source3/smbd/notify_inotify.c 	uint32_t mask; /* the inotify mask */
mask              112 source3/smbd/notify_inotify.c 		   e->mask, w->mask, w->filter));
mask              114 source3/smbd/notify_inotify.c 	if ((e->mask & w->mask) == 0) {
mask              121 source3/smbd/notify_inotify.c 	if (e->mask & IN_ISDIR) {
mask              126 source3/smbd/notify_inotify.c 		if ((e->mask & IN_ATTRIB) &&
mask              134 source3/smbd/notify_inotify.c 		if ((e->mask & IN_MODIFY) && 
mask              162 source3/smbd/notify_inotify.c 		   e->mask, e->len ? e->name : ""));
mask              165 source3/smbd/notify_inotify.c 	if ((e->mask & (IN_ATTRIB|IN_MODIFY|IN_CREATE|IN_DELETE|
mask              172 source3/smbd/notify_inotify.c 	if (e->mask & IN_CREATE) {
mask              174 source3/smbd/notify_inotify.c 	} else if (e->mask & IN_DELETE) {
mask              176 source3/smbd/notify_inotify.c 	} else if (e->mask & IN_MOVED_FROM) {
mask              182 source3/smbd/notify_inotify.c 	} else if (e->mask & IN_MOVED_TO) {
mask              208 source3/smbd/notify_inotify.c 	    (e->mask & IN_ISDIR) != 0) {
mask              213 source3/smbd/notify_inotify.c 	e->mask = IN_ATTRIB;
mask              379 source3/smbd/notify_inotify.c 	uint32_t mask;
mask              393 source3/smbd/notify_inotify.c 	mask = inotify_map(e);
mask              394 source3/smbd/notify_inotify.c 	if (mask == 0) {
mask              401 source3/smbd/notify_inotify.c 	mask |= (IN_MASK_ADD | IN_ONLYDIR);
mask              404 source3/smbd/notify_inotify.c 	wd = inotify_add_watch(in->fd, e->path, mask);
mask              412 source3/smbd/notify_inotify.c 		   e->path, mask, wd));
mask              425 source3/smbd/notify_inotify.c 	w->mask = mask;
mask             1105 source3/smbd/posix_acls.c static mode_t map_nt_perms( uint32 *mask, int type)
mask             1111 source3/smbd/posix_acls.c 		if((*mask) & GENERIC_ALL_ACCESS)
mask             1114 source3/smbd/posix_acls.c 			mode |= ((*mask) & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IRUSR : 0;
mask             1115 source3/smbd/posix_acls.c 			mode |= ((*mask) & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWUSR : 0;
mask             1116 source3/smbd/posix_acls.c 			mode |= ((*mask) & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXUSR : 0;
mask             1120 source3/smbd/posix_acls.c 		if((*mask) & GENERIC_ALL_ACCESS)
mask             1123 source3/smbd/posix_acls.c 			mode |= ((*mask) & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IRGRP : 0;
mask             1124 source3/smbd/posix_acls.c 			mode |= ((*mask) & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWGRP : 0;
mask             1125 source3/smbd/posix_acls.c 			mode |= ((*mask) & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXGRP : 0;
mask             1129 source3/smbd/posix_acls.c 		if((*mask) & GENERIC_ALL_ACCESS)
mask             1132 source3/smbd/posix_acls.c 			mode |= ((*mask) & (GENERIC_READ_ACCESS|FILE_SPECIFIC_READ_BITS)) ? S_IROTH : 0;
mask             1133 source3/smbd/posix_acls.c 			mode |= ((*mask) & (GENERIC_WRITE_ACCESS|FILE_SPECIFIC_WRITE_BITS)) ? S_IWOTH : 0;
mask             1134 source3/smbd/posix_acls.c 			mode |= ((*mask) & (GENERIC_EXECUTE_ACCESS|FILE_SPECIFIC_EXECUTE_BITS)) ? S_IXOTH : 0;
mask             2856 source3/smbd/posix_acls.c #define MAP_PERM(p,mask,result) (((p) & (mask)) ? (result) : 0 )
mask             3007 source3/smbd/posix_acls.c 				uint32_t mask, uint8_t flags)
mask             3019 source3/smbd/posix_acls.c 		nt_ace_list[i].access_mask = mask;
mask             3026 source3/smbd/posix_acls.c 	init_sec_ace(&nt_ace_list[(*num_aces)++], sid, type, mask, flags);
mask             1250 source3/smbd/reply.c 	const char *mask = NULL;
mask             1347 source3/smbd/reply.c 			mask = p + 1;
mask             1351 source3/smbd/reply.c 			mask = directory;
mask             1369 source3/smbd/reply.c 					mask,
mask             1393 source3/smbd/reply.c 		mask = dptr_wcard(dptr_num);
mask             1394 source3/smbd/reply.c 		if (!mask) {
mask             1401 source3/smbd/reply.c 		mask_contains_wcard = ms_has_wild(mask);
mask             1449 source3/smbd/reply.c 						  mask,
mask             1462 source3/smbd/reply.c 						mask,
mask             1535 source3/smbd/reply.c 		mask,
mask             2419 source3/smbd/reply.c 	char *mask = NULL;
mask             2438 source3/smbd/reply.c 		mask = name;
mask             2442 source3/smbd/reply.c 		mask = p+1;
mask             2454 source3/smbd/reply.c 	if (!VALID_STAT(sbuf) && mangle_is_mangled(mask,conn->params)) {
mask             2457 source3/smbd/reply.c 				mask,
mask             2461 source3/smbd/reply.c 			mask = new_mask;
mask             2469 source3/smbd/reply.c 				mask);
mask             2497 source3/smbd/reply.c 		if (strequal(mask,"????????.???")) {
mask             2498 source3/smbd/reply.c 			mask[0] = '*';
mask             2499 source3/smbd/reply.c 			mask[1] = '\0';
mask             2507 source3/smbd/reply.c 		dir_hnd = OpenDir(talloc_tos(), conn, directory, mask,
mask             2534 source3/smbd/reply.c 			if(!mask_match(dname, mask, conn->case_sensitive)) {
mask             5616 source3/smbd/reply.c 	uint32 mask;
mask             5618 source3/smbd/reply.c 	mask = is_dir ? FILE_NOTIFY_CHANGE_DIR_NAME
mask             5628 source3/smbd/reply.c 		notify_fname(conn, NOTIFY_ACTION_OLD_NAME, mask, oldpath);
mask             5629 source3/smbd/reply.c 		notify_fname(conn, NOTIFY_ACTION_NEW_NAME, mask, newpath);
mask             5632 source3/smbd/reply.c 		notify_fname(conn, NOTIFY_ACTION_REMOVED, mask, oldpath);
mask             5633 source3/smbd/reply.c 		notify_fname(conn, NOTIFY_ACTION_ADDED, mask, newpath);
mask             5870 source3/smbd/reply.c 	char *mask = NULL;
mask             5915 source3/smbd/reply.c 		mask = name;
mask             5922 source3/smbd/reply.c 		mask = p+1;
mask             5935 source3/smbd/reply.c 	if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) {
mask             5938 source3/smbd/reply.c 					mask,
mask             5942 source3/smbd/reply.c 			mask = new_mask;
mask             5955 source3/smbd/reply.c 				mask);
mask             6044 source3/smbd/reply.c 	if (strequal(mask,"????????.???")) {
mask             6045 source3/smbd/reply.c 		mask[0] = '*';
mask             6046 source3/smbd/reply.c 		mask[1] = '\0';
mask             6054 source3/smbd/reply.c 	dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, attrs);
mask             6084 source3/smbd/reply.c 		if(!mask_match(dname, mask, conn->case_sensitive)) {
mask             6441 source3/smbd/reply.c 	const char *mask = NULL;
mask             6570 source3/smbd/reply.c 		mask = p+1;
mask             6573 source3/smbd/reply.c 		mask = name;
mask             6591 source3/smbd/reply.c 	if (!VALID_STAT(sbuf1) && mangle_is_mangled(mask, conn->params)) {
mask             6594 source3/smbd/reply.c 					mask,
mask             6598 source3/smbd/reply.c 			mask = new_mask;
mask             6605 source3/smbd/reply.c 				mask);
mask             6646 source3/smbd/reply.c 		if (strequal(mask,"????????.???")) {
mask             6647 source3/smbd/reply.c 			mask = mask_star;
mask             6657 source3/smbd/reply.c 		dir_hnd = OpenDir(talloc_tos(), conn, directory, mask, 0);
mask             6679 source3/smbd/reply.c 			if(!mask_match(dname, mask, conn->case_sensitive)) {
mask             6819 source3/smbd/reply.c 	uint32 mask = 0;
mask             6834 source3/smbd/reply.c 	mask = (~0) << (31 - i);
mask             6836 source3/smbd/reply.c 	if(low & mask)
mask             1071 source3/smbd/trans2.c 		const char *mask)
mask             1073 source3/smbd/trans2.c 	if (mask[0] == '.' && mask[1] == 0)
mask             1079 source3/smbd/trans2.c 		return strcmp(str,mask)==0;
mask             1081 source3/smbd/trans2.c 		return StrCaseCmp(str,mask) == 0;
mask             1242 source3/smbd/trans2.c 	const char *mask = NULL;
mask             1276 source3/smbd/trans2.c 			mask = talloc_strdup(ctx,"*.*");
mask             1278 source3/smbd/trans2.c 			mask = p+1;
mask             1281 source3/smbd/trans2.c 		mask = path_mask;
mask             1329 source3/smbd/trans2.c 		if(!(got_match = *got_exact_match = exact_match(conn, fname, mask))) {
mask             1330 source3/smbd/trans2.c 			got_match = mask_match(fname, mask, conn->case_sensitive);
mask             1347 source3/smbd/trans2.c 			if(!(got_match = *got_exact_match = exact_match(conn, mangled_name, mask))) {
mask             1348 source3/smbd/trans2.c 				got_match = mask_match(mangled_name, mask, conn->case_sensitive);
mask             1894 source3/smbd/trans2.c 	char *mask = NULL;
mask             1982 source3/smbd/trans2.c 	ntstatus = unix_convert(ctx, conn, directory, True, &directory, &mask, &sbuf);
mask             1998 source3/smbd/trans2.c 			mask = talloc_strdup(ctx,"*");
mask             1999 source3/smbd/trans2.c 			if (!mask) {
mask             2014 source3/smbd/trans2.c 	DEBUG(5,("dir=%s, mask = %s\n",directory, mask));
mask             2070 source3/smbd/trans2.c 				mask,
mask             2081 source3/smbd/trans2.c 	DEBUG(4,("dptr_num is %d, wcard = %s, attr = %d\n", dptr_num, mask, dirtype));
mask             2109 source3/smbd/trans2.c 					mask,dirtype,info_level,
mask             2189 source3/smbd/trans2.c 		mask, directory, dirtype, numentries ) );
mask             2199 source3/smbd/trans2.c 	if(!mangle_is_8_3_wildcards( mask, False, conn->params)) {
mask             2201 source3/smbd/trans2.c 		name_to_8_3(mask, mangled_name, True, conn->params);
mask             2236 source3/smbd/trans2.c 	const char *mask = NULL;
mask             2385 source3/smbd/trans2.c 	mask = p;
mask             2392 source3/smbd/trans2.c 		dptr_num, mask, dirtype,
mask             2460 source3/smbd/trans2.c 						mask,dirtype,info_level,
mask             2490 source3/smbd/trans2.c 		mask, directory, dirtype, numentries ) );
mask              312 source3/torture/masktest.c static void testpair(struct cli_state *cli, const char *mask, const char *file)
mask              341 source3/torture/masktest.c 	cli_list(cli, mask, aHIDDEN | aDIR, listfn, NULL);
mask              343 source3/torture/masktest.c 	res2 = reg_test(cli, mask, long_name, short_name);
mask              349 source3/torture/masktest.c 			 res1, res2, count, mask, file, long_name, short_name));
mask              362 source3/torture/masktest.c 	char *mask, *file;
mask              374 source3/torture/masktest.c 			mask = talloc_asprintf(ctx,
mask              380 source3/torture/masktest.c 			if (!mask || !file) {
mask              383 source3/torture/masktest.c 			testpair(cli, mask, file);
mask              393 source3/torture/masktest.c 		mask = TALLOC_ARRAY(ctx, char, strlen("\\masktest\\")+1+22);
mask              395 source3/torture/masktest.c 		if (!mask || !file) {
mask              398 source3/torture/masktest.c 		memcpy(mask,"\\masktest\\",strlen("\\masktest\\")+1);
mask              400 source3/torture/masktest.c 		l = strlen(mask);
mask              402 source3/torture/masktest.c 			mask[i+l] = maskchars[random() % mc_len];
mask              404 source3/torture/masktest.c 		mask[l+l1] = 0;
mask              413 source3/torture/masktest.c 		    strcmp(mask+l,"..") == 0) continue;
mask              417 source3/torture/masktest.c 		testpair(cli, mask, file);
mask              420 source3/torture/masktest.c 		TALLOC_FREE(mask);
mask              264 source3/torture/nbio.c void nb_findfirst(const char *mask)
mask              266 source3/torture/nbio.c 	cli_list(c, mask, 0, find_fn, NULL);
mask              307 source3/torture/nbio.c 	char *mask;
mask              308 source3/torture/nbio.c 	if (asprintf(&mask, "%s\\*", dname) == -1) {
mask              314 source3/torture/nbio.c 	cli_list(c, mask, aDIR, delete_fn, NULL);
mask              315 source3/torture/nbio.c 	free(mask);
mask             4503 source3/torture/torture.c static void del_fn(const char *mnt, file_info *finfo, const char *mask, void *state)
mask             5291 source3/torture/torture.c static void shortname_del_fn(const char *mnt, file_info *finfo, const char *mask, void *state)
mask               27 source3/utils/net_rpc.c static bool sync_files(struct copy_clistate *cp_clistate, const char *mask);
mask             3193 source3/utils/net_rpc.c 		    const char *mask, void *state)
mask             3210 source3/utils/net_rpc.c 	DEBUG(3,("got mask: %s, name: %s\n", mask, f->name));
mask             3296 source3/utils/net_rpc.c static bool sync_files(struct copy_clistate *cp_clistate, const char *mask)
mask             3301 source3/utils/net_rpc.c 	DEBUG(3,("calling cli_list with mask: %s\n", mask));
mask             3304 source3/utils/net_rpc.c 				mask, &targetcli, &targetpath ) ) {
mask             3306 source3/utils/net_rpc.c 			mask, cli_errstr(cp_clistate->cli_share_src));
mask             3312 source3/utils/net_rpc.c 			mask, cli_errstr(targetcli));
mask             3391 source3/utils/net_rpc.c 	const char *mask = "\\*";
mask             3467 source3/utils/net_rpc.c 		if (!sync_files(&cp_clistate, mask)) {
mask              626 source3/utils/net_sam.c 	SE_PRIV mask;
mask              643 source3/utils/net_sam.c 	if (se_priv_from_name(argv[0], &mask)) {
mask              648 source3/utils/net_sam.c 		status = privilege_enum_sids(&mask, talloc_tos(),
mask              680 source3/utils/net_sam.c 	SE_PRIV mask;
mask              696 source3/utils/net_sam.c 		if (!se_priv_from_name(argv[i], &mask)) {
mask              701 source3/utils/net_sam.c 		if (!grant_privilege(&sid, &mask)) {
mask              718 source3/utils/net_sam.c 	SE_PRIV mask;
mask              735 source3/utils/net_sam.c 		if (!se_priv_from_name(argv[i], &mask)) {
mask              740 source3/utils/net_sam.c 		if (!revoke_privilege(&sid, &mask)) {
mask               38 source3/utils/sharesec.c 	uint32 mask;
mask               92 source3/utils/sharesec.c 		if (ace->access_mask == v->mask) {
mask              105 source3/utils/sharesec.c 		if ((ace->access_mask & v->mask) == v->mask) {
mask              109 source3/utils/sharesec.c 			got_mask &= ~v->mask;
mask              161 source3/utils/sharesec.c 	uint32_t mask;
mask              252 source3/utils/sharesec.c 			amask = v->mask;
mask              264 source3/utils/sharesec.c 				amask |= v->mask;
mask              286 source3/utils/sharesec.c 	mask = amask;
mask              287 source3/utils/sharesec.c 	init_sec_ace(ace, &sid, atype, mask, aflags);
mask               40 source3/utils/smbcacls.c 	uint32 mask;
mask              297 source3/utils/smbcacls.c 		if (ace->access_mask == v->mask) {
mask              310 source3/utils/smbcacls.c 		if ((ace->access_mask & v->mask) == v->mask) {
mask              314 source3/utils/smbcacls.c 			got_mask &= ~v->mask;
mask              371 source3/utils/smbcacls.c 	uint32_t mask;
mask              486 source3/utils/smbcacls.c 			amask = v->mask;
mask              498 source3/utils/smbcacls.c 				amask |= v->mask;
mask              520 source3/utils/smbcacls.c 	mask = amask;
mask              521 source3/utils/smbcacls.c 	init_sec_ace(ace, &sid, atype, mask, aflags);
mask              512 source4/client/client.c static void do_list_helper(struct clilist_file_info *f, const char *mask, void *state)
mask              526 source4/client/client.c 			mask2 = talloc_strdup(NULL, mask);
mask              545 source4/client/client.c static void do_list(struct smbclient_context *ctx, const char *mask,uint16_t attribute,
mask              565 source4/client/client.c 		add_to_do_list_queue(mask);
mask              602 source4/client/client.c 		if (smbcli_list(ctx->cli->tree, mask, attribute, do_list_helper, ctx) == -1)
mask              604 source4/client/client.c 			d_printf("%s listing %s\n", smbcli_errstr(ctx->cli->tree), mask);
mask              618 source4/client/client.c 	char *mask;
mask              623 source4/client/client.c 	mask = talloc_strdup(ctx, ctx->remote_cur_dir);
mask              624 source4/client/client.c 	if(mask[strlen(mask)-1]!='\\')
mask              625 source4/client/client.c 		mask = talloc_append_string(ctx, mask,"\\");
mask              628 source4/client/client.c 		mask = talloc_strdup(ctx, args[1]);
mask              629 source4/client/client.c 		if (mask[0] != '\\')
mask              630 source4/client/client.c 			mask = talloc_append_string(ctx, mask, "\\");
mask              631 source4/client/client.c 		dos_format(mask);
mask              636 source4/client/client.c 			mask = talloc_append_string(ctx, mask, "*.*");
mask              638 source4/client/client.c 			mask = talloc_append_string(ctx, mask, "*");
mask              642 source4/client/client.c 	do_list(ctx, mask, attribute, display_finfo, ctx->recurse, true);
mask              659 source4/client/client.c 	char *mask;
mask              665 source4/client/client.c 			mask = talloc_strdup(ctx, args[1]);
mask              667 source4/client/client.c 			mask = talloc_asprintf(ctx, "%s\\%s", ctx->remote_cur_dir, args[1]);
mask              668 source4/client/client.c 		dos_format(mask);
mask              670 source4/client/client.c 		mask = talloc_asprintf(ctx, "%s\\*", ctx->remote_cur_dir);
mask              673 source4/client/client.c 	do_list(ctx, mask, attribute, do_du, ctx->recurse, true);
mask              675 source4/client/client.c 	talloc_free(mask);
mask             1022 source4/client/client.c 	char *mask, *p;
mask             1030 source4/client/client.c 	mask = talloc_asprintf(ctx, "%s%s", ctx->remote_cur_dir,args[1]);
mask             1033 source4/client/client.c 		dos_clean_name(mask);
mask             1035 source4/client/client.c 		trim_string(mask,".",NULL);
mask             1036 source4/client/client.c 		for (p = strtok(mask,"/\\"); p; p = strtok(p, "/\\")) {
mask             1037 source4/client/client.c 			char *parent = talloc_strndup(ctx, mask, PTR_DIFF(p, mask));
mask             1046 source4/client/client.c 		do_mkdir(ctx, mask);
mask             1522 source4/client/client.c 	char *mask;
mask             1532 source4/client/client.c 	mask = talloc_asprintf(ctx,"%s%s", ctx->remote_cur_dir, args[1]);
mask             1534 source4/client/client.c 	if (NT_STATUS_IS_ERR(smbcli_unlink(ctx->cli->tree, mask))) {
mask             1535 source4/client/client.c 		d_printf("%s deleting remote file %s\n",smbcli_errstr(ctx->cli->tree),mask);
mask             2128 source4/client/client.c 	char *mask;
mask             2134 source4/client/client.c 	mask = talloc_asprintf(ctx, "%s%s", ctx->remote_cur_dir, args[1]);
mask             2136 source4/client/client.c 	smbcli_open(ctx->cli->tree, mask, O_RDWR, DENY_ALL);
mask             2147 source4/client/client.c 	char *mask;
mask             2153 source4/client/client.c 	mask = talloc_asprintf(ctx, "%s%s", ctx->remote_cur_dir, args[1]);
mask             2155 source4/client/client.c 	if (NT_STATUS_IS_ERR(smbcli_rmdir(ctx->cli->tree, mask))) {
mask             2157 source4/client/client.c 			 smbcli_errstr(ctx->cli->tree),mask);
mask             2793 source4/client/client.c static void completion_remote_filter(struct clilist_file_info *f, const char *mask, void *state)
mask             2737 source4/heimdal/lib/hcrypto/imath/imath.c   mp_digit  mask = (1 << rest) - 1;
mask             2741 source4/heimdal/lib/hcrypto/imath/imath.c     z->digits[start - 1] &= mask;
mask             3034 source4/heimdal/lib/hx509/cert.c     int type, mask, i, num;
mask             3053 source4/heimdal/lib/hx509/cert.c     while (fscanf(f, "%d %d\n", &type, &mask) == 2) {
mask             3057 source4/heimdal/lib/hx509/cert.c 	while (mask && i < sizeof(stats)/sizeof(stats[0])) {
mask             3058 source4/heimdal/lib/hx509/cert.c 	    if (mask & 1) {
mask             3062 source4/heimdal/lib/hx509/cert.c 	    mask = mask >>1 ;
mask              847 source4/heimdal/lib/krb5/store.c 	uint32_t mask = 0xffff0000;
mask              850 source4/heimdal/lib/krb5/store.c 	if (creds->flags.i & mask)
mask              851 source4/heimdal/lib/krb5/store.c 	    mask = ~mask;
mask              852 source4/heimdal/lib/krb5/store.c 	if (dummy32 & mask)
mask             1002 source4/heimdal/lib/krb5/store.c 	uint32_t mask = 0xffff0000;
mask             1005 source4/heimdal/lib/krb5/store.c 	if (creds->flags.i & mask)
mask             1006 source4/heimdal/lib/krb5/store.c 	    mask = ~mask;
mask             1007 source4/heimdal/lib/krb5/store.c 	if (dummy32 & mask)
mask               45 source4/lib/socket/access.c 	uint32_t mask;
mask               58 source4/lib/socket/access.c                 mask = interpret_addr(slash + 1);
mask               60 source4/lib/socket/access.c 		mask = (uint32_t)((ALLONES >> atoi(slash + 1)) ^ ALLONES);
mask               62 source4/lib/socket/access.c 		mask = htonl(mask);
mask               65 source4/lib/socket/access.c 	if (net == INADDR_NONE || mask == INADDR_NONE) {
mask               70 source4/lib/socket/access.c 	return (addr & mask) == (net & mask);
mask               85 source4/libcli/clideltree.c 	char *mask;
mask              112 source4/libcli/clideltree.c 	asprintf(&mask, "%s\\*", dname);
mask              113 source4/libcli/clideltree.c 	smbcli_unlink(dstate.tree, mask);
mask              114 source4/libcli/clideltree.c 	smbcli_list(dstate.tree, mask, 
mask              117 source4/libcli/clideltree.c 	free(mask);
mask              113 source4/libcli/clilist.c 	char *mask;
mask              124 source4/libcli/clilist.c 	mask = talloc_strdup(state.mem_ctx, Mask);
mask              144 source4/libcli/clilist.c 			first_parms.t2ffirst.in.pattern = mask;
mask              271 source4/libcli/clilist.c 	char *mask;
mask              282 source4/libcli/clilist.c 	mask = talloc_strdup(state.mem_ctx, Mask);
mask              293 source4/libcli/clilist.c 			first_parms.search_first.in.pattern = mask;
mask              183 source4/libcli/security/privilege.c 	uint64_t mask = 1;
mask              189 source4/libcli/security/privilege.c 	mask <<= (privilege-1);
mask              190 source4/libcli/security/privilege.c 	return mask;
mask              199 source4/libcli/security/privilege.c 	uint64_t mask;
mask              205 source4/libcli/security/privilege.c 	mask = sec_privilege_mask(privilege);
mask              206 source4/libcli/security/privilege.c 	if (token->privilege_mask & mask) {
mask              233 source4/libcli/security/privilege.c 			uint64_t mask = sec_privilege_mask(privilege);
mask              235 source4/libcli/security/privilege.c 			if (token->privilege_mask & mask) {
mask              351 source4/libcli/security/security_descriptor.c 				    uint32_t mask)
mask              356 source4/libcli/security/security_descriptor.c 	if ((sd1->type & mask) != (sd2->type & mask)) return false;
mask              360 source4/libcli/security/security_descriptor.c 	if ((mask & SEC_DESC_DACL_PRESENT) && !security_acl_equal(sd1->dacl, sd2->dacl))      return false;
mask              361 source4/libcli/security/security_descriptor.c 	if ((mask & SEC_DESC_SACL_PRESENT) && !security_acl_equal(sd1->sacl, sd2->sacl))      return false;
mask              656 source4/nbt_server/wins/winsserver.c 	const char *mask;
mask              670 source4/nbt_server/wins/winsserver.c 	mask = lp_parm_string(lp_ctx, NULL, "nbtd", "wins_randomize1Clist_mask");
mask              671 source4/nbt_server/wins/winsserver.c 	if (!mask) {
mask              672 source4/nbt_server/wins/winsserver.c 		mask = "255.255.255.0";
mask              686 source4/nbt_server/wins/winsserver.c 		same = iface_same_net(addresses[idx], src->addr, mask);
mask               65 source4/ntvfs/cifs_posix_cli/svfs_util.c 	char *p, *mask;
mask               86 source4/ntvfs/cifs_posix_cli/svfs_util.c 	mask = p+1;
mask               88 source4/ntvfs/cifs_posix_cli/svfs_util.c 	low_mask = talloc_strdup(mem_ctx, mask);
mask               38 source4/ntvfs/posix/pvfs_read.c 	uint32_t mask;
mask               53 source4/ntvfs/posix/pvfs_read.c 	mask = SEC_FILE_READ_DATA;
mask               55 source4/ntvfs/posix/pvfs_read.c 		mask |= SEC_FILE_EXECUTE;
mask               57 source4/ntvfs/posix/pvfs_read.c 	if (!(f->access_mask & mask)) {
mask               37 source4/ntvfs/posix/pvfs_rename.c 	uint32_t mask;
mask               48 source4/ntvfs/posix/pvfs_rename.c 		mask = FILE_NOTIFY_CHANGE_DIR_NAME;
mask               50 source4/ntvfs/posix/pvfs_rename.c 		mask = FILE_NOTIFY_CHANGE_FILE_NAME;
mask               63 source4/ntvfs/posix/pvfs_rename.c 			       mask,
mask               67 source4/ntvfs/posix/pvfs_rename.c 			       mask,
mask               72 source4/ntvfs/posix/pvfs_rename.c 			       mask,
mask               76 source4/ntvfs/posix/pvfs_rename.c 			       mask,
mask               62 source4/ntvfs/simple/svfs_util.c 	char *p, *mask;
mask               83 source4/ntvfs/simple/svfs_util.c 	mask = p+1;
mask               85 source4/ntvfs/simple/svfs_util.c 	low_mask = talloc_strdup(mem_ctx, mask);
mask               48 source4/ntvfs/sysdep/inotify.c static int inotify_add_watch(int fd, const char *path, __u32 mask)
mask               50 source4/ntvfs/sysdep/inotify.c 	return syscall(__NR_inotify_add_watch, fd, path, mask);
mask               81 source4/ntvfs/sysdep/inotify.c 	uint32_t mask; /* the inotify mask */
mask               94 source4/ntvfs/sysdep/inotify.c 	if ((e->mask & w->mask) == 0) {
mask              101 source4/ntvfs/sysdep/inotify.c 	if (e->mask & IN_ISDIR) {
mask              106 source4/ntvfs/sysdep/inotify.c 		if ((e->mask & IN_ATTRIB) &&
mask              114 source4/ntvfs/sysdep/inotify.c 		if ((e->mask & IN_MODIFY) && 
mask              142 source4/ntvfs/sysdep/inotify.c 	if ((e->mask & (IN_ATTRIB|IN_MODIFY|IN_CREATE|IN_DELETE|
mask              149 source4/ntvfs/sysdep/inotify.c 	if (e->mask & IN_CREATE) {
mask              151 source4/ntvfs/sysdep/inotify.c 	} else if (e->mask & IN_DELETE) {
mask              153 source4/ntvfs/sysdep/inotify.c 	} else if (e->mask & IN_MOVED_FROM) {
mask              159 source4/ntvfs/sysdep/inotify.c 	} else if (e->mask & IN_MOVED_TO) {
mask              182 source4/ntvfs/sysdep/inotify.c 	    (e->mask & IN_ISDIR) != 0) {
mask              187 source4/ntvfs/sysdep/inotify.c 	e->mask = IN_ATTRIB;
mask              348 source4/ntvfs/sysdep/inotify.c 	uint32_t mask;
mask              362 source4/ntvfs/sysdep/inotify.c 	mask = inotify_map(e);
mask              363 source4/ntvfs/sysdep/inotify.c 	if (mask == 0) {
mask              370 source4/ntvfs/sysdep/inotify.c 	mask |= (IN_MASK_ADD | IN_ONLYDIR);
mask              373 source4/ntvfs/sysdep/inotify.c 	wd = inotify_add_watch(in->fd, e->path, mask);
mask              390 source4/ntvfs/sysdep/inotify.c 	w->mask = mask;
mask             1290 source4/rpc_server/netlogon/dcerpc_netlogon.c 	r2.in.mask = 0;
mask             1315 source4/rpc_server/netlogon/dcerpc_netlogon.c 	r2.in.mask = 0;
mask              625 source4/torture/gentest.c 	uint32_t mask;
mask              630 source4/torture/gentest.c 		mask = va_arg(ap, uint32_t);
mask              633 source4/torture/gentest.c 			return mask & random();
mask              643 source4/torture/gentest.c static uint32_t gen_bits_mask(uint_t mask)
mask              646 source4/torture/gentest.c 	return ret & mask;
mask              141 source4/torture/masktest.c 	const char *mask;
mask              145 source4/torture/masktest.c 		mask = "\\masktest\\*.*";
mask              147 source4/torture/masktest.c 		mask = "\\masktest\\*";
mask              154 source4/torture/masktest.c 	smbcli_list_new(cli->tree, mask,
mask              171 source4/torture/masktest.c static void testpair(TALLOC_CTX *mem_ctx, struct smbcli_state *cli, char *mask,
mask              199 source4/torture/masktest.c 	smbcli_list_new(cli->tree, mask,
mask              204 source4/torture/masktest.c 	res2 = reg_test(cli, mem_ctx, mask, long_name, short_name);
mask              208 source4/torture/masktest.c 			 res1, res2, count, mask, file, long_name, short_name);
mask              223 source4/torture/masktest.c 	char *mask, *file;
mask              234 source4/torture/masktest.c 			mask = talloc_strdup(mem_ctx, "\\masktest\\");
mask              236 source4/torture/masktest.c 			mask = talloc_strdup_append(mask, argv[0]);
mask              238 source4/torture/masktest.c 			testpair(mem_ctx, cli, mask, file);
mask              248 source4/torture/masktest.c 		mask = talloc_strdup(mem_ctx, "\\masktest\\");
mask              250 source4/torture/masktest.c 		mask = talloc_realloc_size(mem_ctx, mask, strlen(mask)+l1+1);
mask              252 source4/torture/masktest.c 		l = strlen(mask);
mask              254 source4/torture/masktest.c 			mask[i+l] = maskchars[random() % mc_len];
mask              256 source4/torture/masktest.c 		mask[l+l1] = 0;
mask              263 source4/torture/masktest.c 		if (ISDOT(file+l) || ISDOTDOT(file+l) || ISDOTDOT(mask+l)) {
mask              269 source4/torture/masktest.c 		testpair(mem_ctx, cli, mask, file);
mask              914 source4/torture/nbench/nbio.c bool nb_findfirst(const char *mask, int level, int maxcnt, int count, NTSTATUS status)
mask              926 source4/torture/nbench/nbio.c 	io.t2ffirst.in.pattern = mask;
mask              554 source4/torture/raw/notify.c 	uint32_t mask;
mask              588 source4/torture/raw/notify.c 	do { for (mask=i=0;i<32;i++) { \
mask              632 source4/torture/raw/notify.c 		mask |= (1<<i); \
mask              634 source4/torture/raw/notify.c 	if ((expected) != mask) { \
mask              635 source4/torture/raw/notify.c 		if (((expected) & ~mask) != 0) { \
mask              637 source4/torture/raw/notify.c 			       mask, expected); \
mask              641 source4/torture/raw/notify.c 			       mask, expected); \
mask               63 source4/torture/raw/samba3hide.c static void set_visible(struct clilist_file_info *i, const char *mask,
mask             1955 source4/torture/rpc/netlogon.c 	r.in.mask		= 0x00000000;
mask             1970 source4/torture/rpc/netlogon.c 	r.in.mask		= ACB_SVRTRUST;
mask             4899 source4/torture/rpc/samr.c 	uint32_t mask, resume_handle=0;
mask             4919 source4/torture/rpc/samr.c 		r.in.acct_flags = mask = masks[mask_idx];
mask             4939 source4/torture/rpc/samr.c 			if (mask) {
mask             4940 source4/torture/rpc/samr.c 				if (!check_mask(p, tctx, handle, sam->entries[i].idx, mask)) {
mask               50 source4/torture/rpc/samr_accessmask.c 				      uint32_t mask, struct policy_handle *h)
mask               65 source4/torture/rpc/samr_accessmask.c 	r5.in.access_mask = mask;
mask               79 source4/torture/rpc/samr_accessmask.c 	uint32_t mask;
mask               82 source4/torture/rpc/samr_accessmask.c 	mask = 1;
mask               84 source4/torture/rpc/samr_accessmask.c 		printf("testing Connect5 with access mask 0x%08x", mask);
mask               85 source4/torture/rpc/samr_accessmask.c 		status = torture_samr_Connect5(tctx, p, mask, &h);
mask               86 source4/torture/rpc/samr_accessmask.c 		mask <<= 1;
mask              150 source4/torture/rpc/samr_accessmask.c 	uint32_t mask;
mask              156 source4/torture/rpc/samr_accessmask.c 	mask = 1;
mask              158 source4/torture/rpc/samr_accessmask.c 		printf("testing Connect5/EnumDomains with access mask 0x%08x", mask);
mask              159 source4/torture/rpc/samr_accessmask.c 		status = torture_samr_Connect5(tctx, p, mask, &ch);
mask              160 source4/torture/rpc/samr_accessmask.c 		mask <<= 1;
mask              409 source4/torture/rpc/samr_accessmask.c 	uint32_t mask;
mask              412 source4/torture/rpc/samr_accessmask.c 	mask = 1;
mask              414 source4/torture/rpc/samr_accessmask.c 		printf("testing Connect5/LookupDomain with access mask 0x%08x", mask);
mask              415 source4/torture/rpc/samr_accessmask.c 		status = torture_samr_Connect5(tctx, p, mask, &ch);
mask              416 source4/torture/rpc/samr_accessmask.c 		mask <<= 1;
mask              498 source4/torture/rpc/samr_accessmask.c 	uint32_t mask;
mask              521 source4/torture/rpc/samr_accessmask.c 	mask = 1;
mask              523 source4/torture/rpc/samr_accessmask.c 		printf("testing Connect5/OpenDomain with access mask 0x%08x", mask);
mask              524 source4/torture/rpc/samr_accessmask.c 		status = torture_samr_Connect5(tctx, p, mask, &ch);
mask              525 source4/torture/rpc/samr_accessmask.c 		mask <<= 1;