7 Index

A

Abstract data model

   ByteRangeLock

   CancelableOperations

   ChangeNotifyEntry

   file

   link

   NotifyEventEntry

   open

   Oplock

   overview

   RHOpContext

   SecurityContext

   stream

   TunnelCacheEntry

   volume

Algorithms - common

   AccessCheck

   BlockAlign

   BlockAlignTruncate

   BuildRelativeName

   ClustersFromBytes

   ClustersFromBytesTruncate

   directory change report

   FileName in an expression - determining

   FindAllFiles

   open files - detecting

   Oplock break - checking

   overview

   range access conflict with byte-range locks - determining

   shared Oplock - recomputing state

   SidLength

   USN change for a file - posting

   wildcard - determining

Applicability

C

Capability negotiation

Change tracking

Common algorithms

   AccessCheck

   BlockAlign

   BlockAlignTruncate

   BuildRelativeName

   ClustersFromBytes

   ClustersFromBytesTruncate

   directory change report

   FileName in an expression - determining

   FindAllFiles

   open files - detecting

   Oplock break - checking

   overview

   range access conflict with byte-range locks - determining

   shared Oplock - recomputing state

   SidLength

   USN change for a file - posting

   wildcard - determining

D

Data model - abstract

   ByteRangeLock

   CancelableOperations

   ChangeNotifyEntry

   file

   link

   NotifyEventEntry

   open

   Oplock

   overview

   RHOpContext

   SecurityContext

   stream

   TunnelCacheEntry

   volume

E

Examples

   overview

Examples - overview

F

Fields - vendor-extensible

G

Glossary

H

Higher-layer triggered events

   byte-range

      lock

      unlock

   cached data - flushing

   closing an open

   directory

      change notifications

      querying

   file

      information

         query

         setting

      open

      system information

         query

         setting

   FsControl request

   operation - canceling

   Oplock

   Oplock break

   overview

   quota information

      querying

      setting

   read

   security information

      query

      setting

   write

I

Implementer - security considerations

Index of security parameters

Informative references

Initialization

Introduction

N

Normative references

O

Overview (synopsis)

P

Parameters - security index

Product behavior

R

References

   informative

   normative

Relationship to other protocols

S

Security

   implementer considerations

   parameter index

Standards assignments

T

Timers

Tracking changes

Triggered events

   byte-range

      lock

      unlock

   cached data - flushing

   closing an open

   directory

      change notifications

      querying

   file

      information

         query

         setting

      open

      system information

         query

         setting

   FsControl request

   operation - canceling

   Oplock

   Oplock break

   overview

   quota information

      querying

      setting

   read

   security information

      query

      setting

   write

V

Vendor-extensible fields

Versioning