/src/bin/setfacl/ |
mask.c | 37 #include <sys/acl.h> 47 /* set the appropriate mask the given ACL's */ 52 acl_t acl; local in function:set_acl_mask 60 * entry in the resulting ACL shall be set to the permissions in the 61 * specified ACL mask entry. 66 acl = acl_dup(*prev_acl); 67 if (acl == NULL) 73 * specified, then the permissions of the resulting ACL mask 76 * class in the resulting ACL 78 if (acl_calc_mask(&acl)) { [all...] |
setfacl.c | 37 #include <sys/acl.h> 53 #define OP_MERGE_ACL 0x00 /* merge acl's (-mM) */ 54 #define OP_REMOVE_DEF 0x01 /* remove default acl's (-k) */ 55 #define OP_REMOVE_EXT 0x02 /* remove extended acl's (-b) */ 56 #define OP_REMOVE_ACL 0x03 /* remove acl's (-xX) */ 57 #define OP_REMOVE_BY_NUMBER 0x04 /* remove acl's (-xX) by acl entry number */ 60 /* TAILQ entry for acl operations */ 63 acl_t acl; member in struct:sf_entry 80 static acl_t clear_inheritance_flags(acl_t acl); 182 acl_t acl, nacl; local in function:handle_file [all...] |
/src/lib/libc/posix1e/ |
acl_init.c | 29 * acl_init -- return a fresh acl structure 30 * acl_dup -- duplicate an acl and return the new copy 42 #include <sys/acl.h> 56 acl_t acl; local in function:acl_init 67 error = posix_memalign((void *)&acl, 1 << _ACL_T_ALIGNMENT_BITS, 74 bzero(acl, sizeof(struct acl_t_struct)); 75 acl->ats_brand = ACL_BRAND_UNKNOWN; 76 acl->ats_acl.acl_maxcnt = ACL_MAX_ENTRIES; 78 return (acl); 82 acl_dup(acl_t acl) [all...] |
acl_from_text.c | 29 * acl_from_text: Convert a text-form ACL from a string to an acl_t. 41 #include <sys/acl.h> 189 * acl_from_text -- Convert a string into an ACL. 196 acl_t acl; local in function:acl_from_text 205 acl = acl_init(3); /* XXX: WTF, 3? */ 206 if (acl == NULL) { 225 if (_acl_brand(acl) == ACL_BRAND_UNKNOWN) { 227 _acl_brand_as(acl, ACL_BRAND_NFS4); 229 _acl_brand_as(acl, ACL_BRAND_POSIX); 232 switch (_acl_brand(acl)) { [all...] |
/src/sys/netbt/ |
sco_upper.c | 126 struct hci_link *acl, *sco; local in function:sco_connect_pcb 148 * We must have an already open ACL connection before we open the SCO 153 acl = hci_link_lookup_bdaddr(unit, &pcb->sp_raddr, HCI_LINK_ACL); 154 if (acl == NULL || acl->hl_state != HCI_LINK_OPEN) 162 KASSERT(sco->hl_link == acl); 164 cp.con_handle = htole16(acl->hl_handle);
|
hci_unit.c | 216 int acl; local in function:hci_disable 239 * they may depend on ACL links. 241 for (acl = 0 ; acl < 2 ; acl++) { 245 if (acl || link->hl_type != HCI_LINK_ACL) 400 DPRINTFN(10, "(%s) recv ACL, len = %d\n", 477 DPRINTF("(%s) dropped ACL packet.\n", device_xname(unit->hci_dev));
|
hci_event.c | 588 (ep.link_type == HCI_LINK_ACL ? "ACL" : "SCO"), 717 ep.link_type == HCI_LINK_ACL ? "ACL" : "SCO"); 745 * Authentication has been completed on an ACL link. We can notify the 1009 /* ACL packet mask */ 1251 int acl; local in function:hci_cmd_reset 1264 * an ACL link reference. 1266 for (acl = 0 ; acl < 2 ; acl++) { 1270 if (acl || link->hl_type != HCI_LINK_ACL [all...] |
hci_link.c | 51 * HCI ACL Connections 55 * Automatically expire unused ACL connections after this number of 63 * open ACL connection to remote bdaddr. Only one ACL connection is permitted 145 * Close ACL connection. When there are no more references to this link, 163 * Incoming ACL connection. 419 * Receive ACL Data 465 * which emit empty ACL packets during connection setup, so 483 "dropped incomplete ACL packet\n"); 537 * Send ACL data on lin 773 struct hci_link *sco, *acl; local in function:hci_sco_newconn [all...] |
/src/bin/getfacl/ |
getfacl.c | 45 #include <sys/acl.h> 94 * return an ACL corresponding to the permissions 100 acl_t acl; local in function:acl_from_stat 104 /* create the ACL */ 105 acl = acl_init(3); 106 if (!acl) 110 if (acl_create_entry(&acl, &entry) == -1) 134 if (acl_create_entry(&acl, &entry) == -1) 158 if (acl_create_entry(&acl, &entry) == -1) 181 return(acl); 189 acl_t acl; local in function:print_acl [all...] |
/src/sys/net80211/ |
ieee80211_acl.c | 41 * IEEE 802.11 MAC ACL support. 67 ACL_POLICY_OPEN = 0, /* open, don't check ACL's */ 74 struct acl { struct 75 TAILQ_ENTRY(acl) acl_list; 76 LIST_ENTRY(acl) acl_hash; 83 TAILQ_HEAD(, acl) as_list; /* list of all ACL's */ 84 LIST_HEAD(, acl) as_hash[ACL_HASHSIZE]; 92 MALLOC_DEFINE(M_80211_ACL, "acl", "802.11 station acl"); 125 struct acl *acl; local in function:_find_acl 167 struct acl *acl, *new; local in function:acl_add 199 struct acl *acl; local in function:acl_remove 218 struct acl *acl; local in function:acl_free_all 274 struct acl *acl; local in function:acl_getioctl [all...] |
ieee80211_proto.c | 156 * Detach any ACL'ator. 231 * Very simple-minded ACL module support. 234 static const struct ieee80211_aclator *acl = NULL; variable in typeref:typename:const struct ieee80211_aclator * 239 printf("wlan: %s acl policy registered\n", iac->iac_name); 240 acl = iac; 246 if (acl == iac) 247 acl = NULL; 248 printf("wlan: %s acl policy unregistered\n", iac->iac_name); 254 if (acl == NULL) 256 return acl != NULL && strcmp(acl->iac_name, name) == 0 ? acl : NULL [all...] |
ieee80211_ioctl.c | 1311 const struct ieee80211_aclator *acl = ic->ic_acl; local in function:ieee80211_ioctl_getmaccmd 1313 return (acl == NULL ? EINVAL : acl->iac_getioctl(ic, ireq)); 1829 const struct ieee80211_aclator *acl = ic->ic_acl; local in function:ieee80211_ioctl_macmac 1837 if (acl == NULL) { 1838 acl = ieee80211_aclator_get("mac"); 1839 if (acl == NULL || !acl->iac_attach(ic)) 1841 ic->ic_acl = acl; 1844 acl->iac_add(ic, mac) 1853 const struct ieee80211_aclator *acl = ic->ic_acl; local in function:ieee80211_ioctl_setmaccmd [all...] |
/src/bin/cp/ |
utils.c | 47 #include <sys/acl.h> 419 acl_t acl; local in function:preserve_fd_acls 445 acl = acl_get_fd_np(source_fd, acl_type); 446 if (acl == NULL) { 447 warn("failed to get acl entries while setting %s", to.p_path); 450 if (acl_is_trivial_np(acl, &trivial)) { 452 acl_free(acl); 456 acl_free(acl); 459 if (acl_set_fd_np(dest_fd, acl, acl_type) < 0) { 460 warn("failed to set acl entries for %s", to.p_path) 474 acl_t acl; local in function:preserve_dir_acls [all...] |
/src/usr.sbin/mrouted/ |
vif.c | 399 struct vif_acl *acl; local in function:stop_all_vifs 414 acl = v->uv_acl; 415 v->uv_acl = acl->acl_next; 416 free((char *)acl); 1345 struct vif_acl *acl; local in function:dump_vifs 1349 for (acl = v->uv_acl->acl_next; acl != NULL; acl = acl->acl_next) { 1351 inet_fmts(acl->acl_addr, acl->acl_mask)) [all...] |
prune.c | 92 struct vif_acl *acl; local in function:scoped_addr 94 for (acl = uvifs[vifi].uv_acl; acl; acl = acl->acl_next) 95 if ((addr & acl->acl_mask) == acl->acl_addr)
|
/src/sys/sys/ |
acl.h | 31 * $FreeBSD: head/sys/sys/acl.h 326256 2017-11-27 15:01:59Z pfg $ 45 * POSIX.1e and NFSv4 ACL types and related constants. 58 * Note that with NFSv4 ACLs, the maximum number of ACL entries one 66 * compatibility with pre-8.0 userland and change on-disk ACL layout. 77 #define NFS4_ACL_EXTATTR_NAME "nfs4.acl" 81 * "struct oldacl" is used in compatibility ACL syscalls and for on-disk 100 * Current "struct acl". 108 /* NFSv4 ACL inheritance. Unused in POSIX.1e ACLs. */ 114 * Internal ACL structure, used in libc, kernel APIs and for on-disk 118 struct acl { struct [all...] |
/src/sys/ufs/ufs/ |
ufs_vnops.c | 100 #include <ufs/ufs/acl.h> 316 struct acl *acl, accmode_t accmode, kauth_cred_t cred, 318 struct acl *, accmode_t)) 323 ip->i_uid, ip->i_gid, ip->i_mode & ALLPERMS, acl, accmode)); 339 struct acl *acl; local in function:ufs_accessx 354 acl = acl_alloc(KM_SLEEP); 356 error = ufs_getacl_nfs4_internal(vp, acl, curlwp); 358 error = VOP_GETACL(vp, type, acl, ap->a_cred) 1037 struct acl *dacl, *acl; local in function:ufs_do_posix1e_acl_inheritance_dir 1118 struct acl *acl; local in function:ufs_do_posix1e_acl_inheritance_file [all...] |
/src/sys/dev/ic/ |
nvmereg.h | 453 uint8_t acl; /* Abort Command Limit */ member in struct:nvm_identify_controller
|