Lines Matching defs:ae
69 _acl_entry_matches(struct acl_entry *ae, acl_tag_t tag, acl_perm_t perm,
72 if (ae->ae_tag != tag)
75 if (ae->ae_id != ACL_UNDEFINED_ID)
78 if (ae->ae_perm != perm)
81 if (ae->ae_entry_type != entry_type)
84 if (ae->ae_flags != 0)
95 struct acl_entry *ae;
99 ae = &(aclp->acl_entry[aclp->acl_cnt]);
102 ae->ae_tag = tag;
103 ae->ae_id = ACL_UNDEFINED_ID;
104 ae->ae_perm = perm;
105 ae->ae_entry_type = entry_type;
106 ae->ae_flags = 0;
108 return (ae);
144 const struct acl_entry *ae;
155 ae = &(aclp->acl_entry[i]);
157 if (ae->ae_entry_type != ACL_ENTRY_TYPE_ALLOW &&
158 ae->ae_entry_type != ACL_ENTRY_TYPE_DENY)
161 if (ae->ae_flags & ACL_ENTRY_INHERIT_ONLY)
164 if (ae->ae_tag == ACL_USER_OBJ) {
165 if ((ae->ae_perm & ACL_READ_DATA) &&
168 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
171 if ((ae->ae_perm & ACL_WRITE_DATA) &&
174 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
177 if ((ae->ae_perm & ACL_EXECUTE) &&
180 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
183 } else if (ae->ae_tag == ACL_GROUP_OBJ) {
184 if ((ae->ae_perm & ACL_READ_DATA) &&
187 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
190 if ((ae->ae_perm & ACL_WRITE_DATA) &&
193 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
196 if ((ae->ae_perm & ACL_EXECUTE) &&
199 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
202 } else if (ae->ae_tag == ACL_EVERYONE) {
203 if (ae->ae_perm & ACL_READ_DATA) {
206 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
211 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
216 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
220 if (ae->ae_perm & ACL_WRITE_DATA) {
223 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
228 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
233 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
237 if (ae->ae_perm & ACL_EXECUTE) {
240 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
245 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
250 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW)
272 struct acl_entry *ae;
296 * We're creating a file, but ae is not inheritable
316 ae = &(child_aclp->acl_entry[child_aclp->acl_cnt]);
317 *ae = *parent_entry;
320 ae->ae_flags &= ~ACL_ENTRY_INHERIT_ONLY;
321 ae->ae_flags |= ACL_ENTRY_INHERITED;
327 if (ae->ae_entry_type != ACL_ENTRY_TYPE_ALLOW &&
328 ae->ae_entry_type != ACL_ENTRY_TYPE_DENY)
338 if (ae->ae_flags & ACL_ENTRY_NO_PROPAGATE_INHERIT ||
340 ae->ae_flags &= ~(ACL_ENTRY_NO_PROPAGATE_INHERIT |
351 (ae->ae_flags & ACL_ENTRY_FILE_INHERIT) &&
352 ((ae->ae_flags & ACL_ENTRY_DIRECTORY_INHERIT) == 0)) {
353 ae->ae_flags |= ACL_ENTRY_INHERIT_ONLY;
356 if (ae->ae_entry_type == ACL_ENTRY_TYPE_ALLOW &&
357 (ae->ae_flags & ACL_ENTRY_INHERIT_ONLY) == 0) {
361 ae->ae_perm &= ~(ACL_WRITE_ACL | ACL_WRITE_OWNER |
368 ae->ae_perm &= ~ACL_READ_DATA;
370 ae->ae_perm &=
373 ae->ae_perm &= ~ACL_EXECUTE;
553 const struct acl_entry *ae;
567 ae = &(aclp->acl_entry[i]);
569 switch (ae->ae_tag) {
573 if (ae->ae_id != ACL_UNDEFINED_ID)
579 if (ae->ae_id == ACL_UNDEFINED_ID)
587 if ((ae->ae_perm | ACL_NFS4_PERM_BITS) != ACL_NFS4_PERM_BITS)
593 if (ae->ae_entry_type != ACL_ENTRY_TYPE_ALLOW &&
594 ae->ae_entry_type != ACL_ENTRY_TYPE_DENY)
597 if ((ae->ae_flags | ACL_FLAGS_BITS) != ACL_FLAGS_BITS)
601 if (ae->ae_flags & (ACL_ENTRY_SUCCESSFUL_ACCESS |
607 if (ae->ae_flags & (ACL_ENTRY_FILE_INHERIT |