HomeSort by: relevance | last modified time | path
    Searched refs:acl (Results 1 - 25 of 254) sorted by relevancy

1 2 3 4 5 6 7 8 91011

  /src/lib/libc/posix1e/
acl_valid.c 31 * acl_valid -- POSIX.1e ACL check routine
43 #include <sys/acl.h>
50 * acl_valid: accepts an ACL, returns 0 on valid ACL, -1 for invalid,
55 * true. POSIX.1e allows acl_valid() to reorder the ACL as it sees fit.
57 * This call is deprecated, as it doesn't ask whether the ACL is valid
62 acl_valid(acl_t acl)
66 if (acl == NULL) {
70 if (!_acl_brand_may_be(acl, ACL_BRAND_POSIX)) {
74 _posix1e_acl_sort(acl);
    [all...]
acl_branding.c 38 #include <sys/acl.h>
45 * of what "brand" ACL is: NFSv4, POSIX.1e or unknown. It happens
46 * automatically - for example, during acl_get_file(3) ACL gets
48 * ACL, if its brand is unknown it gets branded as NFSv4 if any of the
49 * NFSv4 permissions that are not valid for POSIX.1e ACL are set etc.
50 * Branding information is used for printing out the ACL (acl_to_text(3)),
52 * bits that are valid only for NFSv4 in ACL branded as POSIX.1e) etc.
66 * Return brand of an ACL.
69 _acl_brand(const acl_t acl)
72 return (acl->ats_brand)
    [all...]
acl_init.c 29 * acl_init -- return a fresh acl structure
30 * acl_dup -- duplicate an acl and return the new copy
42 #include <sys/acl.h>
56 acl_t acl; local
67 error = posix_memalign((void *)&acl, 1 << _ACL_T_ALIGNMENT_BITS,
74 bzero(acl, sizeof(struct acl_t_struct));
75 acl->ats_brand = ACL_BRAND_UNKNOWN;
76 acl->ats_acl.acl_maxcnt = ACL_MAX_ENTRIES;
78 return (acl);
82 acl_dup(acl_t acl)
    [all...]
acl_delete_entry.c 38 #include <sys/acl.h>
51 * user or group. In NFSv4 ACL, there may be any number of them. We're
76 * acl_delete_entry() (23.4.9): remove the ACL entry indicated by entry_d
77 * from acl.
80 acl_delete_entry(acl_t acl, acl_entry_t entry_d)
86 if (acl == NULL || entry_d == NULL) {
91 if (_entry_brand(entry_d) != _acl_brand(acl)) {
96 if ((acl->ats_acl.acl_cnt < 1) ||
97 (acl->ats_acl.acl_cnt > ACL_MAX_ENTRIES)) {
105 for (i = 0; i < acl->ats_acl.acl_cnt;)
    [all...]
acl_set.c 31 * acl_set_file -- set a file/directory ACL by name
43 #include <sys/acl.h>
54 * (the POSIX.1e semantic code will reject unsorted ACL submission). If it's
59 acl_set_file(const char *path_p, acl_type_t type, acl_t acl)
62 if (acl == NULL || path_p == NULL) {
67 if (_acl_type_not_valid_for_acl(acl, type)) {
71 if (_posix1e_acl(acl, type))
72 _posix1e_acl_sort(acl);
74 acl->ats_cur_entry = 0;
76 return (__acl_set_file(path_p, type, &acl->ats_acl))
    [all...]
acl_support.h 31 * Support functionality for the POSIX.1e ACL interface
42 int _acl_type_not_valid_for_acl(const acl_t acl, acl_type_t type);
43 void _acl_brand_from_type(acl_t acl, acl_type_t type);
44 int _acl_brand(const acl_t acl);
46 int _acl_brand_may_be(const acl_t acl, int brand);
48 void _acl_brand_as(acl_t acl, int brand);
56 int _posix1e_acl_check(acl_t acl);
57 void _posix1e_acl_sort(acl_t acl);
58 int _posix1e_acl(acl_t acl, acl_type_t type);
64 int _posix1e_acl_add_entry(acl_t acl, acl_tag_t tag, uid_t id
    [all...]
acl_entry.c 38 #include <sys/acl.h>
44 * acl_create_entry() (23.4.7): create a new ACL entry in the ACL pointed
50 struct acl *acl_int;
85 struct acl *acl_int;
124 * acl_get_entry() (23.4.14): returns an ACL entry from an ACL
128 acl_get_entry(acl_t acl, int entry_id, acl_entry_t *entry_p)
130 struct acl *acl_int;
132 if (acl == NULL)
    [all...]
acl_from_text.c 29 * acl_from_text: Convert a text-form ACL from a string to an acl_t.
41 #include <sys/acl.h>
189 * acl_from_text -- Convert a string into an ACL.
196 acl_t acl; local
205 acl = acl_init(3); /* XXX: WTF, 3? */
206 if (acl == NULL) {
225 if (_acl_brand(acl) == ACL_BRAND_UNKNOWN) {
227 _acl_brand_as(acl, ACL_BRAND_NFS4);
229 _acl_brand_as(acl, ACL_BRAND_POSIX);
232 switch (_acl_brand(acl)) {
    [all...]
  /src/bin/setfacl/
mask.c 37 #include <sys/acl.h>
47 /* set the appropriate mask the given ACL's */
52 acl_t acl; local
60 * entry in the resulting ACL shall be set to the permissions in the
61 * specified ACL mask entry.
66 acl = acl_dup(*prev_acl);
67 if (acl == NULL)
73 * specified, then the permissions of the resulting ACL mask
76 * class in the resulting ACL
78 if (acl_calc_mask(&acl)) {
    [all...]
setfacl.h 37 #include <sys/acl.h>
43 int merge_acl(acl_t acl, acl_t *prev_acl, const char *filename);
44 int add_acl(acl_t acl, uint entry_number, acl_t *prev_acl,
47 int remove_acl(acl_t acl, acl_t *prev_acl, const char *filename);
setfacl.c 37 #include <sys/acl.h>
53 #define OP_MERGE_ACL 0x00 /* merge acl's (-mM) */
54 #define OP_REMOVE_DEF 0x01 /* remove default acl's (-k) */
55 #define OP_REMOVE_EXT 0x02 /* remove extended acl's (-b) */
56 #define OP_REMOVE_ACL 0x03 /* remove acl's (-xX) */
57 #define OP_REMOVE_BY_NUMBER 0x04 /* remove acl's (-xX) by acl entry number */
60 /* TAILQ entry for acl operations */
63 acl_t acl; member in struct:sf_entry
80 static acl_t clear_inheritance_flags(acl_t acl);
182 acl_t acl, nacl; local
    [all...]
  /src/sys/ufs/ufs/
acl.h 30 * $FreeBSD: head/sys/ufs/ufs/acl.h 326272 2017-11-27 15:23:17Z pfg $
43 int ufs_getacl_nfs4_internal(struct vnode *vp, struct acl *aclp, struct lwp *l);
44 int ufs_setacl_nfs4_internal(struct vnode *vp, struct acl *aclp, struct lwp *l, bool lock);
45 int ufs_setacl_posix1e(struct vnode *vp, int type, struct acl *aclp,
47 void ufs_sync_acl_from_inode(struct inode *ip, struct acl *acl);
48 void ufs_sync_inode_from_acl(struct acl *acl, struct inode *ip);
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
acl.c 1 /* $NetBSD: acl.c,v 1.3 2023/06/19 21:41:44 christos Exp $ */
49 free_retv(struct acl_field *acl)
51 while(acl != NULL) {
52 if (acl->type == acl_retval) {
53 if (*acl->u.retv)
54 free(*acl->u.retv);
55 *acl->u.retv = NULL;
57 acl = acl->next;
62 acl_free_list(struct acl_field *acl, int retv
81 struct acl_field *acl = NULL, *tmp; local
209 struct acl_field *acl; local
251 struct acl_field *acl = NULL; local
    [all...]
  /src/sys/net80211/
ieee80211_acl.c 41 * IEEE 802.11 MAC ACL support.
67 ACL_POLICY_OPEN = 0, /* open, don't check ACL's */
74 struct acl { struct
75 TAILQ_ENTRY(acl) acl_list;
76 LIST_ENTRY(acl) acl_hash;
83 TAILQ_HEAD(, acl) as_list; /* list of all ACL's */
84 LIST_HEAD(, acl) as_hash[ACL_HASHSIZE];
92 MALLOC_DEFINE(M_80211_ACL, "acl", "802.11 station acl");
125 struct acl *acl; local
167 struct acl *acl, *new; local
199 struct acl *acl; local
218 struct acl *acl; local
274 struct acl *acl; local
    [all...]
  /src/external/bsd/unbound/dist/daemon/
acl_list.h 110 /* If the acl node is for an interface */
117 * Create acl structure
123 * Delete acl structure.
124 * @param acl: to delete.
126 void acl_list_delete(struct acl_list* acl);
144 * @param acl: where to store.
149 int acl_list_apply_cfg(struct acl_list* acl, struct config_file* cfg,
169 * Lookup access control status for acl structure.
170 * @param acl: structure for acl storage
    [all...]
acl_list.c 55 struct acl_list* acl = (struct acl_list*)calloc(1, local
57 if(!acl)
59 acl->region = regional_create();
60 if(!acl->region) {
61 acl_list_delete(acl);
64 return acl;
68 acl_list_delete(struct acl_list* acl)
70 if(!acl)
72 regional_destroy(acl->region);
73 free(acl);
    [all...]
  /src/external/bsd/libarchive/dist/libarchive/
archive_disk_acl_freebsd.c 43 #include <sys/acl.h>
107 struct archive_entry *entry, acl_t acl, int default_entry_acl_type)
125 // Make sure the "brand" on this ACL is consistent
127 if (acl_get_brand_np(acl, &brand) != 0) {
129 "Failed to read ACL brand");
140 "Invalid ACL entry type for POSIX.1e ACL");
147 "Invalid ACL entry type for NFSv4 ACL");
153 "Unknown ACL brand")
326 acl_t acl; local
577 acl_t acl; local
    [all...]
  /src/external/mpl/bind/dist/lib/ns/include/ns/
sortlist.h 22 #include <dns/acl.h>
41 ns_sortlist_setup(dns_acl_t *acl, dns_aclenv_t *env, isc_netaddr_t *clientaddr,
44 * Find the sortlist statement in 'acl' (for ACL environment 'env')
51 * make '*argp' point to ACL that forms the second element.
68 * ACL forming the second element in a 2-element top-level
  /src/external/ibm-public/postfix/dist/src/global/
server_acl.c 127 char *acl; local
137 while ((acl = mystrtokq(&bp, CHARS_COMMA_SP, CHARS_BRACE)) != 0) {
138 if (strchr(acl, ':') != 0) {
142 origin, acl);
146 if (dict_handle(acl) == 0)
147 dict_register(acl, dict_open(acl, O_RDONLY, DICT_FLAG_LOCK
152 argv_add(intern_acl, acl, (char *) 0);
172 const char *acl; local
176 for (cpp = intern_acl->argv; (acl = *cpp) != 0; cpp++)
    [all...]
  /src/external/bsd/libarchive/dist/libarchive/test/
test_write_disk_mac_metadata.c 29 #include <sys/acl.h>
39 // The test ACL used here is sometimes assigned to the 'Guest' user
46 clean_acl(const char *acl) {
48 if (strlen(acl) >= sizeof(_acl_temp))
49 return acl;
51 strcpy(_acl_temp, acl);
113 acl_t acl;
157 assert(NULL != (acl = acl_get_file("file3", ACL_TYPE_EXTENDED)));
158 assertEqualString(clean_acl(acl_to_text(acl, NULL)),
159 "!#acl 1\n
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/geoip2/ns2/
named2.conf.j2 38 acl gAU { geoip db country country AU; };
39 acl gUS { geoip db country country US; };
40 acl gGB { geoip db country country GB; };
41 acl gCA { geoip db country country CA; };
42 acl gCL { geoip db country country CL; };
43 acl gDE { geoip db country country DE; };
44 acl gEH { geoip db country country EH; };
  /src/external/mpl/bind/dist/tests/ns/
listenlist_test.c 33 #include <dns/acl.h>
59 dns_acl_t *acl = NULL; local
61 dns_acl_attach(elt->acl, &acl);
66 assert_true(dns_acl_isnone(acl));
67 dns_acl_detach(&acl);
86 assert_true(dns_acl_isany(elt->acl));
  /src/external/mpl/dhcp/bind/dist/lib/dns/
acl.c 1 /* $NetBSD: acl.c,v 1.1 2024/02/18 20:57:30 christos Exp $ */
26 #include <dns/acl.h>
30 * Create a new ACL, including an IP table and an array with room
31 * for 'n' ACL elements. The elements are uninitialized and the
37 dns_acl_t *acl; local
46 acl = isc_mem_get(mctx, sizeof(*acl));
48 acl->mctx = NULL;
49 isc_mem_attach(mctx, &acl->mctx);
51 acl->name = NULL
88 dns_acl_t *acl = NULL; local
481 dns_acl_t *acl = *aclp; local
    [all...]
  /src/external/cddl/osnet/sys/sys/
acl.h 29 * $FreeBSD: head/sys/sys/acl.h 287445 2015-09-04 00:14:20Z delphij $
40 * This file contains the FreeBSD native <sys/acl.h>.
46 #include_next <sys/acl.h>
54 * POSIX.1e and NFSv4 ACL types and related constants.
67 * Note that with NFSv4 ACLs, the maximum number of ACL entries one
75 * compatibility with pre-8.0 userland and change on-disk ACL layout.
86 #define NFS4_ACL_EXTATTR_NAME "nfs4.acl"
90 * "struct oldacl" is used in compatibility ACL syscalls and for on-disk
109 * Current "struct acl".
117 /* NFSv4 ACL inheritance. Unused in POSIX.1e ACLs. *
127 struct acl { struct
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
acl.c 1 /* $NetBSD: acl.c,v 1.11 2026/01/29 18:37:48 christos Exp $ */
27 #include <dns/acl.h>
34 * Create a new ACL, including an IP table and an array with room
35 * for 'n' ACL elements. The elements are uninitialized and the
42 dns_acl_t *acl = isc_mem_get(mctx, sizeof(*acl)); local
43 *acl = (dns_acl_t){
46 .elements = isc_mem_cget(mctx, n, sizeof(acl->elements[0])),
52 isc_mem_attach(mctx, &acl->mctx);
53 dns_iptable_create(acl->mctx, &acl->iptable)
67 dns_acl_t *acl = NULL; local
    [all...]

Completed in 33 milliseconds

1 2 3 4 5 6 7 8 91011