Home
last modified time | relevance | path

Searched full:acl (Results 1 – 25 of 179) sorted by relevance

12345678

/third_party/ltp/testcases/network/nfsv4/acl/
Dacl1.c3 * ACL testing basic program
4 * Purpose: setting an acl on a file a verifies that the accesses are right
24 #include <sys/acl.h>
31 /* the "typical" acl used for the test */
74 /* acl with user entries used for the test */
79 acl_t acl; in test_acl_user_create() local
80 acl = acl_from_text(acl_text); in test_acl_user_create()
81 return acl; in test_acl_user_create()
84 /* acl with group entries used for the test */
90 acl_t acl; in test_acl_grp_create() local
[all …]
DREADME1 ACL testing
5 Testing ACL conformance, ACL limits, and ACL robustness
8 ACL support must be present on the remote host
9 attr and acl packages must be install for the stestsuite to build/run.
12 acl1: verify the conformance ok access regarding the ACL of files and directory.
13 stress: multiprocess application to stress the ACL
Dtest_acl.py18 # set default acl on the test directory
21 acl=[]
26 acl.append(name,entry)
29 # get the file's ACL and verify
43 if acl2[i] == acl[j]:
51 path = '/mnt/nfs/test-acl'
64 print("test acl 10000\n")
66 f = open('/tmp/acl-result-10000','w')
67 path = '/mnt/nfs/test-acl'
87 path = '/mnt/nfs/test-acl' # NFS mounted directory
[all …]
Druntest5 # runtests script for ACL testing
7 MAXLENGTH=30 # maximum ACL length - NB: the current NFSv4 acl implementation does not allow ACL gre…
8 NFSMNTDIR=/mnt/nfs-acl
27 echo "Starting ACL testing"
52 echo "LONG ACL TEST"
59 echo "Long ACL test OK with $MAXLENGTH entries"
60 echo "ACL STRESSING TEST"
Drandom_gen.py9 """ ACL support attribute """
184 """ Create Random ACL for a file with a fixed number a entries """
186 acl = []
193 acl.append(newace)
194 return acl
208 """ Create a random ACL operation (delete / remove / modify on user / group ) """
246 if a == 9: #Copying the ACL of one file to another
/third_party/gn/infra/config/
Dmain.star30 acl.entry(
32 acl.BUILDBUCKET_READER,
33 acl.LOGDOG_READER,
34 acl.PROJECT_CONFIGS_READER,
35 acl.SCHEDULER_READER,
39 acl.entry([acl.SCHEDULER_OWNER], groups = ["project-gn-committers"]),
40 acl.entry([acl.LOGDOG_WRITER], groups = ["luci-logdog-chromium-writers"]),
87 acl.entry(
88 [acl.BUILDBUCKET_TRIGGERER],
116 acl.entry(
[all …]
/third_party/ntfs-3g/ntfsprogs/
Dsd.c26 ACL *acl; in init_system_file_sd() local
50 acl = (ACL*)((char*)sd + le32_to_cpu(sd->dacl)); in init_system_file_sd()
51 acl->revision = 2; in init_system_file_sd()
52 acl->alignment1 = 0; in init_system_file_sd()
53 acl->size = const_cpu_to_le16(0x34); in init_system_file_sd()
54 acl->ace_count = const_cpu_to_le16(2); in init_system_file_sd()
55 acl->alignment2 = const_cpu_to_le16(0); in init_system_file_sd()
57 * Now at offset 0x1c, just after the DACL's ACL, we have the first in init_system_file_sd()
60 aa_ace = (ACCESS_ALLOWED_ACE*)((char*)acl + sizeof(ACL)); in init_system_file_sd()
174 ACL *acl; in init_root_sd() local
[all …]
Dntfssecaudit.8.in79 (rwx flags in octal) and Posix ACL[1], its security key if any, and its
100 a Posix ACL[1] (expressed like in setfacl -m). This sets a new ACL
106 expressed in octal form as in \fBchmod\fP), or a Posix ACL[1] (expressed like
112 Linux mode (rwx flags in octal) and Posix ACL[1], its security key if any,
115 Posix ACL interpretation can only be displayed if the full path to
128 [1] provided the POSIX ACL option was selected at compile time. A Posix ACL
Dntfssecaudit.c33 * set the security parameters of file to perms (mode or acl)
58 * set the security parameters of file to perms (mode or acl)
98 * - reenabled recursion for setting a new mode or ACL
126 * - added optional logging of ACL hashes to facilitate restore checks
385 * To identify NTFS ACL meaning Posix ACL granted to root
390 #define ROOT_OWNER_UNMARK SYNCHRONIZE /* ACL granted to root as owner */
391 #define ROOT_GROUP_UNMARK FILE_READ_EA /* ACL granted to root as group */
1377 printf("%*cCan access security ACL\n",-level-4,marker); in showace()
1512 const struct POSIX_ACL *acl; in showposix() local
1526 acl = &pxdesc->acl; in showposix()
[all …]
/third_party/pulseaudio/src/pulsecore/
Dipacl.c67 pa_ip_acl *acl; in pa_ip_acl_new() local
71 acl = pa_xnew(pa_ip_acl, 1); in pa_ip_acl_new()
72 PA_LLIST_HEAD_INIT(struct acl_entry, acl->entries); in pa_ip_acl_new()
101 pa_log_warn("Host part of ACL entry '%s/%u' is not zero!", a, e.bits); in pa_ip_acl_new()
131 pa_log_warn("Host part of ACL entry '%s/%u' is not zero!", a, e.bits); in pa_ip_acl_new()
141 PA_LLIST_PREPEND(struct acl_entry, acl->entries, n); in pa_ip_acl_new()
146 return acl; in pa_ip_acl_new()
150 pa_ip_acl_free(acl); in pa_ip_acl_new()
155 void pa_ip_acl_free(pa_ip_acl *acl) { in pa_ip_acl_free() argument
156 pa_assert(acl); in pa_ip_acl_free()
[all …]
/third_party/ntfs-3g/libntfs-3g/
Dxattrs.c65 * Posix ACL structures
151 * Make a Posix ACL CPU endian
155 struct POSIX_ACL *acl) in le_acl_to_cpu() argument
160 acl->version = le_acl->version; in le_acl_to_cpu()
161 acl->flags = le_acl->flags; in le_acl_to_cpu()
162 acl->filler = 0; in le_acl_to_cpu()
165 acl->ace[i].tag = le16_to_cpu(le_acl->ace[i].tag); in le_acl_to_cpu()
166 acl->ace[i].perms = le16_to_cpu(le_acl->ace[i].perms); in le_acl_to_cpu()
167 acl->ace[i].id = le32_to_cpu(le_acl->ace[i].id); in le_acl_to_cpu()
173 * Make a Posix ACL little endian
[all …]
Dacls.c260 const ACL *pdacl; in ntfs_attr_size()
261 const ACL *psacl; in ntfs_attr_size()
294 psacl = (const ACL*)&attr[offsacl]; in ntfs_attr_size()
304 pdacl = (const ACL*)&attr[offdacl]; in ntfs_attr_size()
542 static BOOL valid_acl(const ACL *pacl, unsigned int end) in valid_acl()
554 offace = sizeof(ACL); in valid_acl()
610 const ACL *pdacl; in ntfs_valid_descr()
611 const ACL *psacl; in ntfs_valid_descr()
631 pdacl = (const ACL*)&securattr[offdacl]; in ntfs_valid_descr()
632 psacl = (const ACL*)&securattr[offsacl]; in ntfs_valid_descr()
[all …]
/third_party/skia/third_party/externals/tint/infra/config/global/
Dmain.star26 acl.entry(
28 acl.PROJECT_CONFIGS_READER,
29 acl.LOGDOG_READER,
30 acl.BUILDBUCKET_READER,
31 acl.SCHEDULER_READER,
35 acl.entry(
37 acl.SCHEDULER_OWNER,
41 acl.entry(
43 acl.LOGDOG_WRITER,
61 acl.entry(
[all …]
/third_party/skia/third_party/externals/dawn/infra/config/global/
Dmain.star26 acl.entry(
28 acl.PROJECT_CONFIGS_READER,
29 acl.LOGDOG_READER,
30 acl.BUILDBUCKET_READER,
31 acl.SCHEDULER_READER,
35 acl.entry(
37 acl.SCHEDULER_OWNER,
41 acl.entry(
43 acl.LOGDOG_WRITER,
61 acl.entry(
[all …]
/third_party/skia/third_party/externals/swiftshader/infra/config/
Dmain.star9 acl.entry(
10 acl.PROJECT_CONFIGS_READER,
23 acl.entry(
24 acl.CQ_COMMITTER,
27 acl.entry(
28 acl.CQ_DRY_RUNNER,
/third_party/protobuf/php/src/Google/Protobuf/
DMixin.php26 * package google.acl.v1;
28 * // Get the underlying ACL object.
29 * rpc GetAcl(GetAclRequest) returns (Acl) {
35 * rpc GetAcl(GetAclRequest) returns (Acl);
45 * - name: google.acl.v1.AccessControl
52 * // Get the underlying ACL object.
53 * rpc GetAcl(GetAclRequest) returns (Acl) {
64 * - name: google.acl.v1.AccessControl
68 * // Get the underlying ACL object.
69 * rpc GetAcl(GetAclRequest) returns (Acl) {
/third_party/skia/third_party/externals/angle2/infra/config/
Dmain.star45 acl.entry(
47 acl.PROJECT_CONFIGS_READER,
48 acl.LOGDOG_READER,
49 acl.BUILDBUCKET_READER,
50 acl.SCHEDULER_READER,
54 acl.entry(
56 acl.SCHEDULER_OWNER,
60 acl.entry(
62 acl.LOGDOG_WRITER,
336 acl.entry(
[all …]
/third_party/ltp/testcases/kernel/syscalls/getxattr/
Dgetxattr05.c31 # include <sys/acl.h>
44 static acl_t acl; variable
139 acl = acl_from_text(acl_text); in setup()
140 if (!acl) in setup()
143 res = acl_set_file(TEST_FILE, ACL_TYPE_ACCESS, acl); in setup()
168 if (acl) in cleanup()
169 acl_free(acl); in cleanup()
184 TST_TEST_TCONF("<sys/xattr.h> or <sys/acl.h> does not exist.");
/third_party/protobuf/src/google/protobuf/
Dapi.proto144 // package google.acl.v1;
146 // // Get the underlying ACL object.
147 // rpc GetAcl(GetAclRequest) returns (Acl) {
154 // rpc GetAcl(GetAclRequest) returns (Acl);
167 // - name: google.acl.v1.AccessControl
176 // // Get the underlying ACL object.
177 // rpc GetAcl(GetAclRequest) returns (Acl) {
191 // - name: google.acl.v1.AccessControl
197 // // Get the underlying ACL object.
198 // rpc GetAcl(GetAclRequest) returns (Acl) {
/third_party/pulseaudio/src/tests/
Dipacl-test.c29 pa_ip_acl *acl; in do_ip_acl_check() local
32 acl = pa_ip_acl_new(s); in do_ip_acl_check()
33 fail_unless(acl != NULL); in do_ip_acl_check()
34 result = pa_ip_acl_check(acl, fd); in do_ip_acl_check()
35 pa_ip_acl_free(acl); in do_ip_acl_check()
105 s = suite_create("IP ACL"); in main()
/third_party/protobuf/objectivec/
DGPBApi.pbobjc.h232 * package google.acl.v1;
234 * // Get the underlying ACL object.
235 * rpc GetAcl(GetAclRequest) returns (Acl) {
242 * rpc GetAcl(GetAclRequest) returns (Acl);
255 * - name: google.acl.v1.AccessControl
264 * // Get the underlying ACL object.
265 * rpc GetAcl(GetAclRequest) returns (Acl) {
279 * - name: google.acl.v1.AccessControl
285 * // Get the underlying ACL object.
286 * rpc GetAcl(GetAclRequest) returns (Acl) {
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dieee802_11_auth.c2 * hostapd / IEEE 802.11 authentication (ACL)
9 * configured ACL from configuration files or an external RADIUS server.
240 /* Check whether ACL cache has an entry for this station */ in hostapd_allowed_address()
271 "for ACL query."); in hostapd_allowed_address()
309 wpa_printf(MSG_DEBUG, "Cached ACL entry for " MACSTR in hostapd_acl_expire_cache()
339 wpa_printf(MSG_DEBUG, "ACL query for " MACSTR in hostapd_acl_expire_queries()
359 * hostapd_acl_expire - ACL cache expiration callback
445 * Returns: RADIUS_RX_PROCESSED if RADIUS message was a reply to ACL query (and
481 wpa_printf(MSG_DEBUG, "Unknown RADIUS message code %d to ACL " in hostapd_acl_recv_radius()
486 /* Insert Accept/Reject info into ACL cache */ in hostapd_acl_recv_radius()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dieee802_11_auth.c2 * hostapd / IEEE 802.11 authentication (ACL)
9 * configured ACL from configuration files or an external RADIUS server.
295 /* Check whether ACL cache has an entry for this station */ in hostapd_allowed_address()
336 "for ACL query."); in hostapd_allowed_address()
374 wpa_printf(MSG_DEBUG, "Cached ACL entry for " MACSTR in hostapd_acl_expire_cache()
404 wpa_printf(MSG_DEBUG, "ACL query for " MACSTR in hostapd_acl_expire_queries()
424 * hostapd_acl_expire - ACL cache expiration callback
510 * Returns: RADIUS_RX_PROCESSED if RADIUS message was a reply to ACL query (and
545 wpa_printf(MSG_DEBUG, "Unknown RADIUS message code %d to ACL " in hostapd_acl_recv_radius()
550 /* Insert Accept/Reject info into ACL cache */ in hostapd_acl_recv_radius()
[all …]
/third_party/ntfs-3g/include/ntfs-3g/
Dacls.h86 * To identify NTFS ACL meaning Posix ACL granted to root
91 #define ROOT_OWNER_UNMARK SYNCHRONIZE /* ACL granted to root as owner */
92 #define ROOT_GROUP_UNMARK FILE_READ_EA /* ACL granted to root as group */
171 int ntfs_inherit_acl(const ACL *oldacl, ACL *newacl,
/third_party/flutter/flutter/dev/bots/test/
Dfake_process_manager_test.dart29 'gsutil acl get gs://flutter_infra/releases/releases.json': <ProcessResult>[
51 'gsutil acl get gs://flutter_infra/releases/releases.json': <ProcessResult>[
68 'gsutil acl get gs://flutter_infra/releases/releases.json': <ProcessResult>[
85 'gsutil acl get gs://flutter_infra/releases/releases.json': <ProcessResult>[

12345678