/third_party/ltp/testcases/network/nfsv4/acl/ |
D | acl1.c | 3 * ACL testing basic program 4 * Purpose: setting an acl on a file a verifies that the accesses are right 24 #include <sys/acl.h> 31 /* the "typical" acl used for the test */ 74 /* acl with user entries used for the test */ 79 acl_t acl; in test_acl_user_create() local 80 acl = acl_from_text(acl_text); in test_acl_user_create() 81 return acl; in test_acl_user_create() 84 /* acl with group entries used for the test */ 90 acl_t acl; in test_acl_grp_create() local [all …]
|
D | README | 1 ACL testing 5 Testing ACL conformance, ACL limits, and ACL robustness 8 ACL support must be present on the remote host 9 attr and acl packages must be install for the stestsuite to build/run. 12 acl1: verify the conformance ok access regarding the ACL of files and directory. 13 stress: multiprocess application to stress the ACL
|
D | test_acl.py | 18 # set default acl on the test directory 21 acl=[] 26 acl.append(name,entry) 29 # get the file's ACL and verify 43 if acl2[i] == acl[j]: 51 path = '/mnt/nfs/test-acl' 64 print("test acl 10000\n") 66 f = open('/tmp/acl-result-10000','w') 67 path = '/mnt/nfs/test-acl' 87 path = '/mnt/nfs/test-acl' # NFS mounted directory [all …]
|
D | runtest | 5 # runtests script for ACL testing 7 MAXLENGTH=30 # maximum ACL length - NB: the current NFSv4 acl implementation does not allow ACL gre… 8 NFSMNTDIR=/mnt/nfs-acl 27 echo "Starting ACL testing" 52 echo "LONG ACL TEST" 59 echo "Long ACL test OK with $MAXLENGTH entries" 60 echo "ACL STRESSING TEST"
|
D | random_gen.py | 9 """ ACL support attribute """ 184 """ Create Random ACL for a file with a fixed number a entries """ 186 acl = [] 193 acl.append(newace) 194 return acl 208 """ Create a random ACL operation (delete / remove / modify on user / group ) """ 246 if a == 9: #Copying the ACL of one file to another
|
/third_party/gn/infra/config/ |
D | main.star | 30 acl.entry( 32 acl.BUILDBUCKET_READER, 33 acl.LOGDOG_READER, 34 acl.PROJECT_CONFIGS_READER, 35 acl.SCHEDULER_READER, 39 acl.entry([acl.SCHEDULER_OWNER], groups = ["project-gn-committers"]), 40 acl.entry([acl.LOGDOG_WRITER], groups = ["luci-logdog-chromium-writers"]), 87 acl.entry( 88 [acl.BUILDBUCKET_TRIGGERER], 116 acl.entry( [all …]
|
/third_party/ntfs-3g/ntfsprogs/ |
D | sd.c | 26 ACL *acl; in init_system_file_sd() local 50 acl = (ACL*)((char*)sd + le32_to_cpu(sd->dacl)); in init_system_file_sd() 51 acl->revision = 2; in init_system_file_sd() 52 acl->alignment1 = 0; in init_system_file_sd() 53 acl->size = const_cpu_to_le16(0x34); in init_system_file_sd() 54 acl->ace_count = const_cpu_to_le16(2); in init_system_file_sd() 55 acl->alignment2 = const_cpu_to_le16(0); in init_system_file_sd() 57 * Now at offset 0x1c, just after the DACL's ACL, we have the first in init_system_file_sd() 60 aa_ace = (ACCESS_ALLOWED_ACE*)((char*)acl + sizeof(ACL)); in init_system_file_sd() 174 ACL *acl; in init_root_sd() local [all …]
|
D | ntfssecaudit.8.in | 79 (rwx flags in octal) and Posix ACL[1], its security key if any, and its 100 a Posix ACL[1] (expressed like in setfacl -m). This sets a new ACL 106 expressed in octal form as in \fBchmod\fP), or a Posix ACL[1] (expressed like 112 Linux mode (rwx flags in octal) and Posix ACL[1], its security key if any, 115 Posix ACL interpretation can only be displayed if the full path to 128 [1] provided the POSIX ACL option was selected at compile time. A Posix ACL
|
D | ntfssecaudit.c | 33 * set the security parameters of file to perms (mode or acl) 58 * set the security parameters of file to perms (mode or acl) 98 * - reenabled recursion for setting a new mode or ACL 126 * - added optional logging of ACL hashes to facilitate restore checks 385 * To identify NTFS ACL meaning Posix ACL granted to root 390 #define ROOT_OWNER_UNMARK SYNCHRONIZE /* ACL granted to root as owner */ 391 #define ROOT_GROUP_UNMARK FILE_READ_EA /* ACL granted to root as group */ 1377 printf("%*cCan access security ACL\n",-level-4,marker); in showace() 1512 const struct POSIX_ACL *acl; in showposix() local 1526 acl = &pxdesc->acl; in showposix() [all …]
|
/third_party/pulseaudio/src/pulsecore/ |
D | ipacl.c | 67 pa_ip_acl *acl; in pa_ip_acl_new() local 71 acl = pa_xnew(pa_ip_acl, 1); in pa_ip_acl_new() 72 PA_LLIST_HEAD_INIT(struct acl_entry, acl->entries); in pa_ip_acl_new() 101 pa_log_warn("Host part of ACL entry '%s/%u' is not zero!", a, e.bits); in pa_ip_acl_new() 131 pa_log_warn("Host part of ACL entry '%s/%u' is not zero!", a, e.bits); in pa_ip_acl_new() 141 PA_LLIST_PREPEND(struct acl_entry, acl->entries, n); in pa_ip_acl_new() 146 return acl; in pa_ip_acl_new() 150 pa_ip_acl_free(acl); in pa_ip_acl_new() 155 void pa_ip_acl_free(pa_ip_acl *acl) { in pa_ip_acl_free() argument 156 pa_assert(acl); in pa_ip_acl_free() [all …]
|
/third_party/ntfs-3g/libntfs-3g/ |
D | xattrs.c | 65 * Posix ACL structures 151 * Make a Posix ACL CPU endian 155 struct POSIX_ACL *acl) in le_acl_to_cpu() argument 160 acl->version = le_acl->version; in le_acl_to_cpu() 161 acl->flags = le_acl->flags; in le_acl_to_cpu() 162 acl->filler = 0; in le_acl_to_cpu() 165 acl->ace[i].tag = le16_to_cpu(le_acl->ace[i].tag); in le_acl_to_cpu() 166 acl->ace[i].perms = le16_to_cpu(le_acl->ace[i].perms); in le_acl_to_cpu() 167 acl->ace[i].id = le32_to_cpu(le_acl->ace[i].id); in le_acl_to_cpu() 173 * Make a Posix ACL little endian [all …]
|
D | acls.c | 260 const ACL *pdacl; in ntfs_attr_size() 261 const ACL *psacl; in ntfs_attr_size() 294 psacl = (const ACL*)&attr[offsacl]; in ntfs_attr_size() 304 pdacl = (const ACL*)&attr[offdacl]; in ntfs_attr_size() 542 static BOOL valid_acl(const ACL *pacl, unsigned int end) in valid_acl() 554 offace = sizeof(ACL); in valid_acl() 610 const ACL *pdacl; in ntfs_valid_descr() 611 const ACL *psacl; in ntfs_valid_descr() 631 pdacl = (const ACL*)&securattr[offdacl]; in ntfs_valid_descr() 632 psacl = (const ACL*)&securattr[offsacl]; in ntfs_valid_descr() [all …]
|
/third_party/skia/third_party/externals/tint/infra/config/global/ |
D | main.star | 26 acl.entry( 28 acl.PROJECT_CONFIGS_READER, 29 acl.LOGDOG_READER, 30 acl.BUILDBUCKET_READER, 31 acl.SCHEDULER_READER, 35 acl.entry( 37 acl.SCHEDULER_OWNER, 41 acl.entry( 43 acl.LOGDOG_WRITER, 61 acl.entry( [all …]
|
/third_party/skia/third_party/externals/dawn/infra/config/global/ |
D | main.star | 26 acl.entry( 28 acl.PROJECT_CONFIGS_READER, 29 acl.LOGDOG_READER, 30 acl.BUILDBUCKET_READER, 31 acl.SCHEDULER_READER, 35 acl.entry( 37 acl.SCHEDULER_OWNER, 41 acl.entry( 43 acl.LOGDOG_WRITER, 61 acl.entry( [all …]
|
/third_party/skia/third_party/externals/swiftshader/infra/config/ |
D | main.star | 9 acl.entry( 10 acl.PROJECT_CONFIGS_READER, 23 acl.entry( 24 acl.CQ_COMMITTER, 27 acl.entry( 28 acl.CQ_DRY_RUNNER,
|
/third_party/protobuf/php/src/Google/Protobuf/ |
D | Mixin.php | 26 * package google.acl.v1; 28 * // Get the underlying ACL object. 29 * rpc GetAcl(GetAclRequest) returns (Acl) { 35 * rpc GetAcl(GetAclRequest) returns (Acl); 45 * - name: google.acl.v1.AccessControl 52 * // Get the underlying ACL object. 53 * rpc GetAcl(GetAclRequest) returns (Acl) { 64 * - name: google.acl.v1.AccessControl 68 * // Get the underlying ACL object. 69 * rpc GetAcl(GetAclRequest) returns (Acl) {
|
/third_party/skia/third_party/externals/angle2/infra/config/ |
D | main.star | 45 acl.entry( 47 acl.PROJECT_CONFIGS_READER, 48 acl.LOGDOG_READER, 49 acl.BUILDBUCKET_READER, 50 acl.SCHEDULER_READER, 54 acl.entry( 56 acl.SCHEDULER_OWNER, 60 acl.entry( 62 acl.LOGDOG_WRITER, 336 acl.entry( [all …]
|
/third_party/ltp/testcases/kernel/syscalls/getxattr/ |
D | getxattr05.c | 31 # include <sys/acl.h> 44 static acl_t acl; variable 139 acl = acl_from_text(acl_text); in setup() 140 if (!acl) in setup() 143 res = acl_set_file(TEST_FILE, ACL_TYPE_ACCESS, acl); in setup() 168 if (acl) in cleanup() 169 acl_free(acl); in cleanup() 184 TST_TEST_TCONF("<sys/xattr.h> or <sys/acl.h> does not exist.");
|
/third_party/protobuf/src/google/protobuf/ |
D | api.proto | 144 // package google.acl.v1; 146 // // Get the underlying ACL object. 147 // rpc GetAcl(GetAclRequest) returns (Acl) { 154 // rpc GetAcl(GetAclRequest) returns (Acl); 167 // - name: google.acl.v1.AccessControl 176 // // Get the underlying ACL object. 177 // rpc GetAcl(GetAclRequest) returns (Acl) { 191 // - name: google.acl.v1.AccessControl 197 // // Get the underlying ACL object. 198 // rpc GetAcl(GetAclRequest) returns (Acl) {
|
/third_party/pulseaudio/src/tests/ |
D | ipacl-test.c | 29 pa_ip_acl *acl; in do_ip_acl_check() local 32 acl = pa_ip_acl_new(s); in do_ip_acl_check() 33 fail_unless(acl != NULL); in do_ip_acl_check() 34 result = pa_ip_acl_check(acl, fd); in do_ip_acl_check() 35 pa_ip_acl_free(acl); in do_ip_acl_check() 105 s = suite_create("IP ACL"); in main()
|
/third_party/protobuf/objectivec/ |
D | GPBApi.pbobjc.h | 232 * package google.acl.v1; 234 * // Get the underlying ACL object. 235 * rpc GetAcl(GetAclRequest) returns (Acl) { 242 * rpc GetAcl(GetAclRequest) returns (Acl); 255 * - name: google.acl.v1.AccessControl 264 * // Get the underlying ACL object. 265 * rpc GetAcl(GetAclRequest) returns (Acl) { 279 * - name: google.acl.v1.AccessControl 285 * // Get the underlying ACL object. 286 * rpc GetAcl(GetAclRequest) returns (Acl) {
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | ieee802_11_auth.c | 2 * hostapd / IEEE 802.11 authentication (ACL) 9 * configured ACL from configuration files or an external RADIUS server. 240 /* Check whether ACL cache has an entry for this station */ in hostapd_allowed_address() 271 "for ACL query."); in hostapd_allowed_address() 309 wpa_printf(MSG_DEBUG, "Cached ACL entry for " MACSTR in hostapd_acl_expire_cache() 339 wpa_printf(MSG_DEBUG, "ACL query for " MACSTR in hostapd_acl_expire_queries() 359 * hostapd_acl_expire - ACL cache expiration callback 445 * Returns: RADIUS_RX_PROCESSED if RADIUS message was a reply to ACL query (and 481 wpa_printf(MSG_DEBUG, "Unknown RADIUS message code %d to ACL " in hostapd_acl_recv_radius() 486 /* Insert Accept/Reject info into ACL cache */ in hostapd_acl_recv_radius() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | ieee802_11_auth.c | 2 * hostapd / IEEE 802.11 authentication (ACL) 9 * configured ACL from configuration files or an external RADIUS server. 295 /* Check whether ACL cache has an entry for this station */ in hostapd_allowed_address() 336 "for ACL query."); in hostapd_allowed_address() 374 wpa_printf(MSG_DEBUG, "Cached ACL entry for " MACSTR in hostapd_acl_expire_cache() 404 wpa_printf(MSG_DEBUG, "ACL query for " MACSTR in hostapd_acl_expire_queries() 424 * hostapd_acl_expire - ACL cache expiration callback 510 * Returns: RADIUS_RX_PROCESSED if RADIUS message was a reply to ACL query (and 545 wpa_printf(MSG_DEBUG, "Unknown RADIUS message code %d to ACL " in hostapd_acl_recv_radius() 550 /* Insert Accept/Reject info into ACL cache */ in hostapd_acl_recv_radius() [all …]
|
/third_party/ntfs-3g/include/ntfs-3g/ |
D | acls.h | 86 * To identify NTFS ACL meaning Posix ACL granted to root 91 #define ROOT_OWNER_UNMARK SYNCHRONIZE /* ACL granted to root as owner */ 92 #define ROOT_GROUP_UNMARK FILE_READ_EA /* ACL granted to root as group */ 171 int ntfs_inherit_acl(const ACL *oldacl, ACL *newacl,
|
/third_party/flutter/flutter/dev/bots/test/ |
D | fake_process_manager_test.dart | 29 'gsutil acl get gs://flutter_infra/releases/releases.json': <ProcessResult>[ 51 'gsutil acl get gs://flutter_infra/releases/releases.json': <ProcessResult>[ 68 'gsutil acl get gs://flutter_infra/releases/releases.json': <ProcessResult>[ 85 'gsutil acl get gs://flutter_infra/releases/releases.json': <ProcessResult>[
|