Lines Matching defs:volume
2 * Display and audit security attributes in an NTFS volume
18 * On Linux (being root, with volume not mounted) :
21 * ntfssecaudit -a[rv] volume
22 * audit the volume
23 * ntfssecaudit [-v] volume file
25 * ntfssecaudit -r[v] volume directory
27 * ntfssecaudit -b[v] volume [directory]
29 * ntfssecaudit -s[ve] volume [backupfile]
32 * ntfssecaudit volume perms file
34 * ntfssecaudit -r[v] volume perms directory
43 * On Windows (the volume being part of file name)
46 * ntfssecaudit -a[rv] volume
47 * audit the volume
54 * ntfssecaudit -s[v] volume [backupfile]
316 #include "volume.h"
573 * Open and close a volume
574 * Assumes a single volume is opened
577 static BOOL open_volume(const char *volume, unsigned long flags)
583 ntfs_context = ntfs_initialize_file_security(volume, flags);
589 fprintf(stderr,"\"%s\" opened %s\n",volume,
596 fprintf(stderr,"Could not open \"%s\"\n",volume);
601 volume);
604 fprintf(stderr,"Looks like \"%s\" is mounted,\n",volume);
608 fprintf(stderr,"Close all applications using %s\n", volume);
612 fprintf(stderr,"Make sure \"%s\" is not mounted\n",volume);
616 fprintf(stderr,"A volume is already open\n");
620 static BOOL close_volume(const char *volume)
626 fprintf(stderr,"\"%s\" closed\n",volume);
628 fprintf(stderr,"Could not close \"%s\"\n",volume);
2430 static BOOL dorestore(const char *volume, FILE *fd)
2437 if (open_volume(volume,NTFS_MNT_NONE)) {
2439 close_volume(volume);
2441 fprintf(stderr,"Could not open volume %s\n",volume);
4725 static BOOL backup(const char *volume, const char *root)
4736 if (open_volume(volume,NTFS_MNT_RDONLY)) {
4747 close_volume(volume);
4749 fprintf(stderr,"Could not open volume %s\n",volume);
4768 static BOOL listfiles(const char *volume, const char *root)
4775 if (open_volume(volume,NTFS_MNT_RDONLY)) {
4793 close_volume(volume);
4810 static BOOL mapproposal(const char *volume, const char *name)
4819 if (open_volume(volume,NTFS_MNT_RDONLY)) {
4835 close_volume(volume);
4837 fprintf(stderr,"Could not open volume %s\n",volume);
5029 printf("** There is no $SDS-%d in this volume\n",
5280 printf("** There is no $SII in this volume\n");
5469 printf("** There is no $SDH in this volume\n");
5540 static BOOL audit(const char *volume)
5546 if (open_volume(volume,NTFS_MNT_RDONLY)) {
5554 close_volume(volume);
5557 fprintf(stderr,"Could not open volume %s\n",volume);
5877 static BOOL setperms(const char *volume, const char *perms, const char *base)
5894 if (open_volume(volume,NTFS_MNT_NONE)) {
5901 close_volume(volume);
5903 fprintf(stderr,"Could not open volume %s\n",volume);
5927 if (open_volume(volume,NTFS_MNT_NONE)) {
5934 close_volume(volume);
5936 fprintf(stderr,"Could not open volume %s\n",volume);
5963 fprintf(stderr," ntfssecaudit -a[rv] volume\n");
5964 fprintf(stderr," audit the volume\n");
5971 fprintf(stderr," ntfssecaudit -s[ev] volume [backupfile]\n");
5985 fprintf(stderr," volume is a drive letter and colon (eg. D:)\n");
5995 fprintf(stderr," ntfssecaudit -a[rv] volume\n");
5996 fprintf(stderr," audit the volume\n");
5997 fprintf(stderr," ntfssecaudit [-v] volume file\n");
5999 fprintf(stderr," ntfssecaudit -r[v] volume directory\n");
6001 fprintf(stderr," ntfssecaudit -b[v] volume directory\n");
6003 fprintf(stderr," ntfssecaudit -s[ev] volume [backupfile]\n");
6006 fprintf(stderr," ntfssecaudit volume perms file\n");
6008 fprintf(stderr," ntfssecaudit -r[v] volume perms directory\n");
6023 fprintf(stderr," volume is a partition designator (eg. /dev/dsk/c5t0d0p1)\n");
6025 fprintf(stderr," volume is a partition designator (eg. /dev/sdb2)\n");
6045 * Split a Windows file designator into volume and fullpath
6055 char *volume;
6080 volume = (char*)malloc(4);
6081 if (volume) {
6083 volume[0] = arg[0];
6085 volume[0] = curdir[0];
6086 volume[1] = ':';
6087 volume[2] = 0;
6105 split[0] = volume;
6112 free(volume);