| /src/lib/libc/posix1e/ |
| acl_valid.c | 31 * acl_valid -- POSIX.1e ACL check routine 43 #include <sys/acl.h> 50 * acl_valid: accepts an ACL, returns 0 on valid ACL, -1 for invalid, 55 * true. POSIX.1e allows acl_valid() to reorder the ACL as it sees fit. 57 * This call is deprecated, as it doesn't ask whether the ACL is valid 62 acl_valid(acl_t acl) 66 if (acl == NULL) { 70 if (!_acl_brand_may_be(acl, ACL_BRAND_POSIX)) { 74 _posix1e_acl_sort(acl); [all...] |
| acl_branding.c | 38 #include <sys/acl.h> 45 * of what "brand" ACL is: NFSv4, POSIX.1e or unknown. It happens 46 * automatically - for example, during acl_get_file(3) ACL gets 48 * ACL, if its brand is unknown it gets branded as NFSv4 if any of the 49 * NFSv4 permissions that are not valid for POSIX.1e ACL are set etc. 50 * Branding information is used for printing out the ACL (acl_to_text(3)), 52 * bits that are valid only for NFSv4 in ACL branded as POSIX.1e) etc. 66 * Return brand of an ACL. 69 _acl_brand(const acl_t acl) 72 return (acl->ats_brand) [all...] |
| acl_init.c | 29 * acl_init -- return a fresh acl structure 30 * acl_dup -- duplicate an acl and return the new copy 42 #include <sys/acl.h> 56 acl_t acl; local 67 error = posix_memalign((void *)&acl, 1 << _ACL_T_ALIGNMENT_BITS, 74 bzero(acl, sizeof(struct acl_t_struct)); 75 acl->ats_brand = ACL_BRAND_UNKNOWN; 76 acl->ats_acl.acl_maxcnt = ACL_MAX_ENTRIES; 78 return (acl); 82 acl_dup(acl_t acl) [all...] |
| acl_delete_entry.c | 38 #include <sys/acl.h> 51 * user or group. In NFSv4 ACL, there may be any number of them. We're 76 * acl_delete_entry() (23.4.9): remove the ACL entry indicated by entry_d 77 * from acl. 80 acl_delete_entry(acl_t acl, acl_entry_t entry_d) 86 if (acl == NULL || entry_d == NULL) { 91 if (_entry_brand(entry_d) != _acl_brand(acl)) { 96 if ((acl->ats_acl.acl_cnt < 1) || 97 (acl->ats_acl.acl_cnt > ACL_MAX_ENTRIES)) { 105 for (i = 0; i < acl->ats_acl.acl_cnt;) [all...] |
| acl_set.c | 31 * acl_set_file -- set a file/directory ACL by name 43 #include <sys/acl.h> 54 * (the POSIX.1e semantic code will reject unsorted ACL submission). If it's 59 acl_set_file(const char *path_p, acl_type_t type, acl_t acl) 62 if (acl == NULL || path_p == NULL) { 67 if (_acl_type_not_valid_for_acl(acl, type)) { 71 if (_posix1e_acl(acl, type)) 72 _posix1e_acl_sort(acl); 74 acl->ats_cur_entry = 0; 76 return (__acl_set_file(path_p, type, &acl->ats_acl)) [all...] |
| acl_support.h | 31 * Support functionality for the POSIX.1e ACL interface 42 int _acl_type_not_valid_for_acl(const acl_t acl, acl_type_t type); 43 void _acl_brand_from_type(acl_t acl, acl_type_t type); 44 int _acl_brand(const acl_t acl); 46 int _acl_brand_may_be(const acl_t acl, int brand); 48 void _acl_brand_as(acl_t acl, int brand); 56 int _posix1e_acl_check(acl_t acl); 57 void _posix1e_acl_sort(acl_t acl); 58 int _posix1e_acl(acl_t acl, acl_type_t type); 64 int _posix1e_acl_add_entry(acl_t acl, acl_tag_t tag, uid_t id [all...] |
| acl_entry.c | 38 #include <sys/acl.h> 44 * acl_create_entry() (23.4.7): create a new ACL entry in the ACL pointed 50 struct acl *acl_int; 85 struct acl *acl_int; 124 * acl_get_entry() (23.4.14): returns an ACL entry from an ACL 128 acl_get_entry(acl_t acl, int entry_id, acl_entry_t *entry_p) 130 struct acl *acl_int; 132 if (acl == NULL) [all...] |
| acl_from_text.c | 29 * acl_from_text: Convert a text-form ACL from a string to an acl_t. 41 #include <sys/acl.h> 189 * acl_from_text -- Convert a string into an ACL. 196 acl_t acl; local 205 acl = acl_init(3); /* XXX: WTF, 3? */ 206 if (acl == NULL) { 225 if (_acl_brand(acl) == ACL_BRAND_UNKNOWN) { 227 _acl_brand_as(acl, ACL_BRAND_NFS4); 229 _acl_brand_as(acl, ACL_BRAND_POSIX); 232 switch (_acl_brand(acl)) { [all...] |
| /src/bin/setfacl/ |
| mask.c | 37 #include <sys/acl.h> 47 /* set the appropriate mask the given ACL's */ 52 acl_t acl; local 60 * entry in the resulting ACL shall be set to the permissions in the 61 * specified ACL mask entry. 66 acl = acl_dup(*prev_acl); 67 if (acl == NULL) 73 * specified, then the permissions of the resulting ACL mask 76 * class in the resulting ACL 78 if (acl_calc_mask(&acl)) { [all...] |
| setfacl.h | 37 #include <sys/acl.h> 43 int merge_acl(acl_t acl, acl_t *prev_acl, const char *filename); 44 int add_acl(acl_t acl, uint entry_number, acl_t *prev_acl, 47 int remove_acl(acl_t acl, acl_t *prev_acl, const char *filename);
|
| setfacl.c | 37 #include <sys/acl.h> 53 #define OP_MERGE_ACL 0x00 /* merge acl's (-mM) */ 54 #define OP_REMOVE_DEF 0x01 /* remove default acl's (-k) */ 55 #define OP_REMOVE_EXT 0x02 /* remove extended acl's (-b) */ 56 #define OP_REMOVE_ACL 0x03 /* remove acl's (-xX) */ 57 #define OP_REMOVE_BY_NUMBER 0x04 /* remove acl's (-xX) by acl entry number */ 60 /* TAILQ entry for acl operations */ 63 acl_t acl; member in struct:sf_entry 80 static acl_t clear_inheritance_flags(acl_t acl); 182 acl_t acl, nacl; local [all...] |
| /src/sys/ufs/ufs/ |
| acl.h | 30 * $FreeBSD: head/sys/ufs/ufs/acl.h 326272 2017-11-27 15:23:17Z pfg $ 43 int ufs_getacl_nfs4_internal(struct vnode *vp, struct acl *aclp, struct lwp *l); 44 int ufs_setacl_nfs4_internal(struct vnode *vp, struct acl *aclp, struct lwp *l, bool lock); 45 int ufs_setacl_posix1e(struct vnode *vp, int type, struct acl *aclp, 47 void ufs_sync_acl_from_inode(struct inode *ip, struct acl *acl); 48 void ufs_sync_inode_from_acl(struct acl *acl, struct inode *ip);
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| acl.c | 1 /* $NetBSD: acl.c,v 1.3 2023/06/19 21:41:44 christos Exp $ */ 49 free_retv(struct acl_field *acl) 51 while(acl != NULL) { 52 if (acl->type == acl_retval) { 53 if (*acl->u.retv) 54 free(*acl->u.retv); 55 *acl->u.retv = NULL; 57 acl = acl->next; 62 acl_free_list(struct acl_field *acl, int retv 81 struct acl_field *acl = NULL, *tmp; local 209 struct acl_field *acl; local 251 struct acl_field *acl = NULL; local [all...] |
| /src/sys/net80211/ |
| ieee80211_acl.c | 41 * IEEE 802.11 MAC ACL support. 67 ACL_POLICY_OPEN = 0, /* open, don't check ACL's */ 74 struct acl { struct 75 TAILQ_ENTRY(acl) acl_list; 76 LIST_ENTRY(acl) acl_hash; 83 TAILQ_HEAD(, acl) as_list; /* list of all ACL's */ 84 LIST_HEAD(, acl) as_hash[ACL_HASHSIZE]; 92 MALLOC_DEFINE(M_80211_ACL, "acl", "802.11 station acl"); 125 struct acl *acl; local 167 struct acl *acl, *new; local 199 struct acl *acl; local 218 struct acl *acl; local 274 struct acl *acl; local [all...] |
| /src/external/bsd/unbound/dist/daemon/ |
| acl_list.h | 110 /* If the acl node is for an interface */ 117 * Create acl structure 123 * Delete acl structure. 124 * @param acl: to delete. 126 void acl_list_delete(struct acl_list* acl); 144 * @param acl: where to store. 149 int acl_list_apply_cfg(struct acl_list* acl, struct config_file* cfg, 169 * Lookup access control status for acl structure. 170 * @param acl: structure for acl storage [all...] |
| acl_list.c | 55 struct acl_list* acl = (struct acl_list*)calloc(1, local 57 if(!acl) 59 acl->region = regional_create(); 60 if(!acl->region) { 61 acl_list_delete(acl); 64 return acl; 68 acl_list_delete(struct acl_list* acl) 70 if(!acl) 72 regional_destroy(acl->region); 73 free(acl); [all...] |
| /src/external/bsd/libarchive/dist/libarchive/ |
| archive_disk_acl_freebsd.c | 43 #include <sys/acl.h> 107 struct archive_entry *entry, acl_t acl, int default_entry_acl_type) 125 // Make sure the "brand" on this ACL is consistent 127 if (acl_get_brand_np(acl, &brand) != 0) { 129 "Failed to read ACL brand"); 140 "Invalid ACL entry type for POSIX.1e ACL"); 147 "Invalid ACL entry type for NFSv4 ACL"); 153 "Unknown ACL brand") 326 acl_t acl; local 577 acl_t acl; local [all...] |
| /src/external/mpl/bind/dist/lib/ns/include/ns/ |
| sortlist.h | 22 #include <dns/acl.h> 41 ns_sortlist_setup(dns_acl_t *acl, dns_aclenv_t *env, isc_netaddr_t *clientaddr, 44 * Find the sortlist statement in 'acl' (for ACL environment 'env') 51 * make '*argp' point to ACL that forms the second element. 68 * ACL forming the second element in a 2-element top-level
|
| /src/external/ibm-public/postfix/dist/src/global/ |
| server_acl.c | 127 char *acl; local 137 while ((acl = mystrtokq(&bp, CHARS_COMMA_SP, CHARS_BRACE)) != 0) { 138 if (strchr(acl, ':') != 0) { 142 origin, acl); 146 if (dict_handle(acl) == 0) 147 dict_register(acl, dict_open(acl, O_RDONLY, DICT_FLAG_LOCK 152 argv_add(intern_acl, acl, (char *) 0); 172 const char *acl; local 176 for (cpp = intern_acl->argv; (acl = *cpp) != 0; cpp++) [all...] |
| /src/external/bsd/libarchive/dist/libarchive/test/ |
| test_write_disk_mac_metadata.c | 29 #include <sys/acl.h> 39 // The test ACL used here is sometimes assigned to the 'Guest' user 46 clean_acl(const char *acl) { 48 if (strlen(acl) >= sizeof(_acl_temp)) 49 return acl; 51 strcpy(_acl_temp, acl); 113 acl_t acl; 157 assert(NULL != (acl = acl_get_file("file3", ACL_TYPE_EXTENDED))); 158 assertEqualString(clean_acl(acl_to_text(acl, NULL)), 159 "!#acl 1\n [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/geoip2/ns2/ |
| named2.conf.j2 | 38 acl gAU { geoip db country country AU; }; 39 acl gUS { geoip db country country US; }; 40 acl gGB { geoip db country country GB; }; 41 acl gCA { geoip db country country CA; }; 42 acl gCL { geoip db country country CL; }; 43 acl gDE { geoip db country country DE; }; 44 acl gEH { geoip db country country EH; };
|
| /src/external/mpl/bind/dist/tests/ns/ |
| listenlist_test.c | 33 #include <dns/acl.h> 59 dns_acl_t *acl = NULL; local 61 dns_acl_attach(elt->acl, &acl); 66 assert_true(dns_acl_isnone(acl)); 67 dns_acl_detach(&acl); 86 assert_true(dns_acl_isany(elt->acl));
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| acl.c | 1 /* $NetBSD: acl.c,v 1.1 2024/02/18 20:57:30 christos Exp $ */ 26 #include <dns/acl.h> 30 * Create a new ACL, including an IP table and an array with room 31 * for 'n' ACL elements. The elements are uninitialized and the 37 dns_acl_t *acl; local 46 acl = isc_mem_get(mctx, sizeof(*acl)); 48 acl->mctx = NULL; 49 isc_mem_attach(mctx, &acl->mctx); 51 acl->name = NULL 88 dns_acl_t *acl = NULL; local 481 dns_acl_t *acl = *aclp; local [all...] |
| /src/external/cddl/osnet/sys/sys/ |
| acl.h | 29 * $FreeBSD: head/sys/sys/acl.h 287445 2015-09-04 00:14:20Z delphij $ 40 * This file contains the FreeBSD native <sys/acl.h>. 46 #include_next <sys/acl.h> 54 * POSIX.1e and NFSv4 ACL types and related constants. 67 * Note that with NFSv4 ACLs, the maximum number of ACL entries one 75 * compatibility with pre-8.0 userland and change on-disk ACL layout. 86 #define NFS4_ACL_EXTATTR_NAME "nfs4.acl" 90 * "struct oldacl" is used in compatibility ACL syscalls and for on-disk 109 * Current "struct acl". 117 /* NFSv4 ACL inheritance. Unused in POSIX.1e ACLs. * 127 struct acl { struct [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| acl.c | 1 /* $NetBSD: acl.c,v 1.11 2026/01/29 18:37:48 christos Exp $ */ 27 #include <dns/acl.h> 34 * Create a new ACL, including an IP table and an array with room 35 * for 'n' ACL elements. The elements are uninitialized and the 42 dns_acl_t *acl = isc_mem_get(mctx, sizeof(*acl)); local 43 *acl = (dns_acl_t){ 46 .elements = isc_mem_cget(mctx, n, sizeof(acl->elements[0])), 52 isc_mem_attach(mctx, &acl->mctx); 53 dns_iptable_create(acl->mctx, &acl->iptable) 67 dns_acl_t *acl = NULL; local [all...] |