| /src/bin/setfacl/ |
| mask.c | 37 #include <sys/acl.h> 47 /* set the appropriate mask the given ACL's */ 52 acl_t acl; local 60 * entry in the resulting ACL shall be set to the permissions in the 61 * specified ACL mask entry. 66 acl = acl_dup(*prev_acl); 67 if (acl == NULL) 73 * specified, then the permissions of the resulting ACL mask 76 * class in the resulting ACL 78 if (acl_calc_mask(&acl)) { [all...] |
| setfacl.c | 37 #include <sys/acl.h> 53 #define OP_MERGE_ACL 0x00 /* merge acl's (-mM) */ 54 #define OP_REMOVE_DEF 0x01 /* remove default acl's (-k) */ 55 #define OP_REMOVE_EXT 0x02 /* remove extended acl's (-b) */ 56 #define OP_REMOVE_ACL 0x03 /* remove acl's (-xX) */ 57 #define OP_REMOVE_BY_NUMBER 0x04 /* remove acl's (-xX) by acl entry number */ 60 /* TAILQ entry for acl operations */ 63 acl_t acl; member in struct:sf_entry 80 static acl_t clear_inheritance_flags(acl_t acl); 182 acl_t acl, nacl; local [all...] |
| /src/lib/libc/posix1e/ |
| acl_init.c | 29 * acl_init -- return a fresh acl structure 30 * acl_dup -- duplicate an acl and return the new copy 42 #include <sys/acl.h> 56 acl_t acl; local 67 error = posix_memalign((void *)&acl, 1 << _ACL_T_ALIGNMENT_BITS, 74 bzero(acl, sizeof(struct acl_t_struct)); 75 acl->ats_brand = ACL_BRAND_UNKNOWN; 76 acl->ats_acl.acl_maxcnt = ACL_MAX_ENTRIES; 78 return (acl); 82 acl_dup(acl_t acl) [all...] |
| acl_from_text.c | 29 * acl_from_text: Convert a text-form ACL from a string to an acl_t. 41 #include <sys/acl.h> 189 * acl_from_text -- Convert a string into an ACL. 196 acl_t acl; local 205 acl = acl_init(3); /* XXX: WTF, 3? */ 206 if (acl == NULL) { 225 if (_acl_brand(acl) == ACL_BRAND_UNKNOWN) { 227 _acl_brand_as(acl, ACL_BRAND_NFS4); 229 _acl_brand_as(acl, ACL_BRAND_POSIX); 232 switch (_acl_brand(acl)) { [all...] |
| /src/external/mpl/bind/dist/tests/ns/ |
| listenlist_test.c | 33 #include <dns/acl.h> 59 dns_acl_t *acl = NULL; local 61 dns_acl_attach(elt->acl, &acl); 66 assert_true(dns_acl_isnone(acl)); 67 dns_acl_detach(&acl); 86 assert_true(dns_acl_isany(elt->acl));
|
| /src/external/bsd/nsd/dist/ |
| axfr.c | 188 struct acl_options *acl = NULL; local 213 zone_opt->pattern->provide_xfr, q, &acl) == -1) { 223 (acl?acl->ip_address_spec:"."), 224 (acl ? ( acl->nokey ? "NOKEY" 225 : acl->blocked ? "BLOCKED" 226 : acl->key_name ) 227 : "no acl matches"))); 236 acl_check_incoming(zone_opt->pattern->provide_xfr, q, &acl)==-1 [all...] |
| /src/sys/netbt/ |
| sco_upper.c | 126 struct hci_link *acl, *sco; local 148 * We must have an already open ACL connection before we open the SCO 153 acl = hci_link_lookup_bdaddr(unit, &pcb->sp_raddr, HCI_LINK_ACL); 154 if (acl == NULL || acl->hl_state != HCI_LINK_OPEN) 162 KASSERT(sco->hl_link == acl); 164 cp.con_handle = htole16(acl->hl_handle);
|
| hci_unit.c | 216 int acl; local 239 * they may depend on ACL links. 241 for (acl = 0 ; acl < 2 ; acl++) { 245 if (acl || link->hl_type != HCI_LINK_ACL) 400 DPRINTFN(10, "(%s) recv ACL, len = %d\n", 477 DPRINTF("(%s) dropped ACL packet.\n", device_xname(unit->hci_dev));
|
| hci_event.c | 588 (ep.link_type == HCI_LINK_ACL ? "ACL" : "SCO"), 717 ep.link_type == HCI_LINK_ACL ? "ACL" : "SCO"); 745 * Authentication has been completed on an ACL link. We can notify the 1009 /* ACL packet mask */ 1251 int acl; local 1264 * an ACL link reference. 1266 for (acl = 0 ; acl < 2 ; acl++) { 1270 if (acl || link->hl_type != HCI_LINK_ACL [all...] |
| hci_link.c | 51 * HCI ACL Connections 55 * Automatically expire unused ACL connections after this number of 63 * open ACL connection to remote bdaddr. Only one ACL connection is permitted 145 * Close ACL connection. When there are no more references to this link, 163 * Incoming ACL connection. 419 * Receive ACL Data 465 * which emit empty ACL packets during connection setup, so 483 "dropped incomplete ACL packet\n"); 537 * Send ACL data on lin 773 struct hci_link *sco, *acl; local [all...] |
| /src/external/mpl/bind/dist/lib/ns/ |
| listenlist.c | 24 #include <dns/acl.h> 33 listenelt_create(isc_mem_t *mctx, in_port_t port, dns_acl_t *acl, 193 elt->acl = acl; 219 ns_listenelt_create(isc_mem_t *mctx, in_port_t port, dns_acl_t *acl, 224 return listenelt_create(mctx, port, acl, family, false, tls, tls_params, 229 ns_listenelt_create_http(isc_mem_t *mctx, in_port_t http_port, dns_acl_t *acl, 242 result = listenelt_create(mctx, http_port, acl, family, true, tls, 269 if (elt->acl != NULL) { 270 dns_acl_detach(&elt->acl); 333 dns_acl_t *acl = NULL; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/kadm5/ |
| get_s.c | 298 const HDB_Ext_PKINIT_acl *acl; local 325 ret = hdb_entry_get_pkinit_acl(&ent.entry, &acl); 326 if (ret == 0 && acl) { 331 acl, &len, ret);
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| acl.c | 1 /* $NetBSD: acl.c,v 1.3 2023/06/19 21:41:44 christos Exp $ */ 49 free_retv(struct acl_field *acl) 51 while(acl != NULL) { 52 if (acl->type == acl_retval) { 53 if (*acl->u.retv) 54 free(*acl->u.retv); 55 *acl->u.retv = NULL; 57 acl = acl->next; 62 acl_free_list(struct acl_field *acl, int retv 81 struct acl_field *acl = NULL, *tmp; local 209 struct acl_field *acl; local 251 struct acl_field *acl = NULL; local [all...] |
| /src/external/ibm-public/postfix/dist/src/global/ |
| server_acl.c | 127 char *acl; local 137 while ((acl = mystrtokq(&bp, CHARS_COMMA_SP, CHARS_BRACE)) != 0) { 138 if (strchr(acl, ':') != 0) { 142 origin, acl); 146 if (dict_handle(acl) == 0) 147 dict_register(acl, dict_open(acl, O_RDONLY, DICT_FLAG_LOCK 152 argv_add(intern_acl, acl, (char *) 0); 172 const char *acl; local 176 for (cpp = intern_acl->argv; (acl = *cpp) != 0; cpp++) [all...] |
| /src/bin/getfacl/ |
| getfacl.c | 45 #include <sys/acl.h> 94 * return an ACL corresponding to the permissions 100 acl_t acl; local 104 /* create the ACL */ 105 acl = acl_init(3); 106 if (!acl) 110 if (acl_create_entry(&acl, &entry) == -1) 134 if (acl_create_entry(&acl, &entry) == -1) 158 if (acl_create_entry(&acl, &entry) == -1) 181 return(acl); 189 acl_t acl; local [all...] |
| /src/sys/net80211/ |
| ieee80211_acl.c | 41 * IEEE 802.11 MAC ACL support. 67 ACL_POLICY_OPEN = 0, /* open, don't check ACL's */ 74 struct acl { struct 75 TAILQ_ENTRY(acl) acl_list; 76 LIST_ENTRY(acl) acl_hash; 83 TAILQ_HEAD(, acl) as_list; /* list of all ACL's */ 84 LIST_HEAD(, acl) as_hash[ACL_HASHSIZE]; 92 MALLOC_DEFINE(M_80211_ACL, "acl", "802.11 station acl"); 125 struct acl *acl; local 167 struct acl *acl, *new; local 199 struct acl *acl; local 218 struct acl *acl; local 274 struct acl *acl; local [all...] |
| /src/external/bsd/libarchive/dist/libarchive/ |
| archive_disk_acl_freebsd.c | 43 #include <sys/acl.h> 107 struct archive_entry *entry, acl_t acl, int default_entry_acl_type) 125 // Make sure the "brand" on this ACL is consistent 127 if (acl_get_brand_np(acl, &brand) != 0) { 129 "Failed to read ACL brand"); 140 "Invalid ACL entry type for POSIX.1e ACL"); 147 "Invalid ACL entry type for NFSv4 ACL"); 153 "Unknown ACL brand") 326 acl_t acl; local 577 acl_t acl; local [all...] |
| archive_disk_acl_darwin.c | 44 #include <sys/acl.h> 210 struct archive_entry *entry, acl_t acl) 220 s = acl_get_entry(acl, ACL_FIRST_ENTRY, &acl_entry); 223 "Failed to get first ACL entry"); 234 "Failed to get ACL tag type"); 250 s = acl_get_entry(acl, ACL_NEXT_ENTRY, &acl_entry); 256 s = acl_get_entry(acl, ACL_NEXT_ENTRY, &acl_entry); 268 "Failed to get flagset from a NFSv4 ACL entry"); 277 "ACL flagset"); 285 "Failed to get ACL permission set") 324 acl_t acl; local 496 acl_t acl; local [all...] |
| archive_disk_acl_linux.c | 39 #include <acl/libacl.h> 42 #include <sys/acl.h> 111 struct archive_entry *entry, acl_t acl, int default_entry_acl_type) 121 s = acl_get_entry(acl, ACL_FIRST_ENTRY, &acl_entry); 124 "Failed to get first ACL entry"); 135 "Failed to get ACL tag type"); 173 s = acl_get_entry(acl, ACL_NEXT_ENTRY, &acl_entry); 182 "Failed to get ACL permission set"); 191 "Failed to check permission in an ACL " 202 s = acl_get_entry(acl, ACL_NEXT_ENTRY, &acl_entry) 474 acl_t acl = NULL; local 618 acl_t acl; local [all...] |
| /src/external/mpl/bind/dist/lib/ns/include/ns/ |
| listenlist.h | 50 dns_acl_t *acl; member in struct:ns_listenelt 87 ns_listenelt_create(isc_mem_t *mctx, in_port_t port, dns_acl_t *acl, 102 ns_listenelt_create_http(isc_mem_t *mctx, in_port_t http_port, dns_acl_t *acl,
|
| /src/bin/cp/ |
| utils.c | 47 #include <sys/acl.h> 419 acl_t acl; local 445 acl = acl_get_fd_np(source_fd, acl_type); 446 if (acl == NULL) { 447 warn("failed to get acl entries while setting %s", to.p_path); 450 if (acl_is_trivial_np(acl, &trivial)) { 452 acl_free(acl); 456 acl_free(acl); 459 if (acl_set_fd_np(dest_fd, acl, acl_type) < 0) { 460 warn("failed to set acl entries for %s", to.p_path) 474 acl_t acl; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/kadmin/ |
| get.c | 67 { "pkinit-acl", KADM5_TL_DATA, KRB5_TL_PKINIT_ACL, 0, "PK-INIT ACL", "PK-INIT ACL", 0 }, 282 HDB_Ext_PKINIT_acl acl; local 289 &acl, 292 snprintf(buf, buf_len, "failed to decode ACL"); 297 for (i = 0; i < acl.len; i++) { 299 strlcat(buf, acl.val[i].subject, buf_len); 300 if (acl.val[i].issuer) { 302 strlcat(buf, *acl.val[i].issuer, buf_len) [all...] |
| /src/external/bsd/unbound/dist/daemon/ |
| acl_list.c | 55 struct acl_list* acl = (struct acl_list*)calloc(1, local 57 if(!acl) 59 acl->region = regional_create(); 60 if(!acl->region) { 61 acl_list_delete(acl); 64 return acl; 68 acl_list_delete(struct acl_list* acl) 70 if(!acl) 72 regional_destroy(acl->region); 73 free(acl); [all...] |
| daemon.h | 131 struct acl_list* acl; member in struct:daemon 225 * Setup acl list to have entries for the port list. 226 * @param list: the acl interface
|
| /src/external/mpl/bind/dist/lib/dns/ |
| acl.c | 1 /* $NetBSD: acl.c,v 1.11 2026/01/29 18:37:48 christos Exp $ */ 27 #include <dns/acl.h> 34 * Create a new ACL, including an IP table and an array with room 35 * for 'n' ACL elements. The elements are uninitialized and the 42 dns_acl_t *acl = isc_mem_get(mctx, sizeof(*acl)); local 43 *acl = (dns_acl_t){ 46 .elements = isc_mem_cget(mctx, n, sizeof(acl->elements[0])), 52 isc_mem_attach(mctx, &acl->mctx); 53 dns_iptable_create(acl->mctx, &acl->iptable) 67 dns_acl_t *acl = NULL; local [all...] |