Home
last modified time | relevance | path

Searched full:acl (Results 1 – 25 of 184) sorted by relevance

12345678

/third_party/ltp/testcases/network/nfsv4/acl/
Dacl1.c3 * ACL testing basic program
4 * Purpose: setting an acl on a file a verifies that the accesses are right
24 #include <sys/acl.h>
31 /* the "typical" acl used for the test */
74 /* acl with user entries used for the test */
79 acl_t acl; in test_acl_user_create() local
80 acl = acl_from_text(acl_text); in test_acl_user_create()
81 return acl; in test_acl_user_create()
84 /* acl with group entries used for the test */
90 acl_t acl; in test_acl_grp_create() local
[all …]
Dtest_acl.py18 # set default acl on the test directory
21 acl=[]
26 acl.append(name,entry)
29 # get the file's ACL and verify
43 if acl2[i] == acl[j]:
51 path = '/mnt/nfs/test-acl'
64 print("test acl 10000\n")
66 f = open('/tmp/acl-result-10000','w')
67 path = '/mnt/nfs/test-acl'
87 path = '/mnt/nfs/test-acl' # NFS mounted directory
[all …]
DREADME1 ACL testing
5 Testing ACL conformance, ACL limits, and ACL robustness
8 ACL support must be present on the remote host
9 attr and acl packages must be install for the stestsuite to build/run.
12 acl1: verify the conformance ok access regarding the ACL of files and directory.
13 stress: multiprocess application to stress the ACL
Druntest5 # runtests script for ACL testing
7 MAXLENGTH=30 # maximum ACL length - NB: the current NFSv4 acl implementation does not allow ACL gre…
8 NFSMNTDIR=/mnt/nfs-acl
27 echo "Starting ACL testing"
52 echo "LONG ACL TEST"
59 echo "Long ACL test OK with $MAXLENGTH entries"
60 echo "ACL STRESSING TEST"
Drandom_gen.py9 """ ACL support attribute """
184 """ Create Random ACL for a file with a fixed number a entries """
186 acl = []
193 acl.append(newace)
194 return acl
208 """ Create a random ACL operation (delete / remove / modify on user / group ) """
246 if a == 9: #Copying the ACL of one file to another
/third_party/gn/infra/config/
Dmain.star30 acl.entry(
32 acl.BUILDBUCKET_READER,
33 acl.LOGDOG_READER,
34 acl.PROJECT_CONFIGS_READER,
35 acl.SCHEDULER_READER,
39 acl.entry([acl.SCHEDULER_OWNER], groups = ["project-gn-committers"]),
40 acl.entry([acl.LOGDOG_WRITER], groups = ["luci-logdog-chromium-writers"]),
87 acl.entry(
88 [acl.BUILDBUCKET_TRIGGERER],
116 acl.entry(
[all …]
/third_party/ntfs-3g/ntfsprogs/
Dsd.c26 ACL *acl; in init_system_file_sd() local
50 acl = (ACL*)((char*)sd + le32_to_cpu(sd->dacl)); in init_system_file_sd()
51 acl->revision = 2; in init_system_file_sd()
52 acl->alignment1 = 0; in init_system_file_sd()
53 acl->size = const_cpu_to_le16(0x34); in init_system_file_sd()
54 acl->ace_count = const_cpu_to_le16(2); in init_system_file_sd()
55 acl->alignment2 = const_cpu_to_le16(0); in init_system_file_sd()
57 * Now at offset 0x1c, just after the DACL's ACL, we have the first in init_system_file_sd()
60 aa_ace = (ACCESS_ALLOWED_ACE*)((char*)acl + sizeof(ACL)); in init_system_file_sd()
174 ACL *acl; in init_root_sd() local
[all …]
Dntfssecaudit.8.in79 (rwx flags in octal) and Posix ACL[1], its security key if any, and its
100 a Posix ACL[1] (expressed like in setfacl -m). This sets a new ACL
106 expressed in octal form as in \fBchmod\fP), or a Posix ACL[1] (expressed like
112 Linux mode (rwx flags in octal) and Posix ACL[1], its security key if any,
115 Posix ACL interpretation can only be displayed if the full path to
128 [1] provided the POSIX ACL option was selected at compile time. A Posix ACL
Dntfssecaudit.c33 * set the security parameters of file to perms (mode or acl)
58 * set the security parameters of file to perms (mode or acl)
98 * - reenabled recursion for setting a new mode or ACL
126 * - added optional logging of ACL hashes to facilitate restore checks
385 * To identify NTFS ACL meaning Posix ACL granted to root
390 #define ROOT_OWNER_UNMARK SYNCHRONIZE /* ACL granted to root as owner */
391 #define ROOT_GROUP_UNMARK FILE_READ_EA /* ACL granted to root as group */
1377 printf("%*cCan access security ACL\n",-level-4,marker); in showace()
1512 const struct POSIX_ACL *acl; in showposix() local
1526 acl = &pxdesc->acl; in showposix()
[all …]
/third_party/ntfs-3g/libntfs-3g/
Dxattrs.c65 * Posix ACL structures
151 * Make a Posix ACL CPU endian
155 struct POSIX_ACL *acl) in le_acl_to_cpu() argument
160 acl->version = le_acl->version; in le_acl_to_cpu()
161 acl->flags = le_acl->flags; in le_acl_to_cpu()
162 acl->filler = 0; in le_acl_to_cpu()
165 acl->ace[i].tag = le16_to_cpu(le_acl->ace[i].tag); in le_acl_to_cpu()
166 acl->ace[i].perms = le16_to_cpu(le_acl->ace[i].perms); in le_acl_to_cpu()
167 acl->ace[i].id = le32_to_cpu(le_acl->ace[i].id); in le_acl_to_cpu()
173 * Make a Posix ACL little endian
[all …]
Dacls.c260 const ACL *pdacl; in ntfs_attr_size()
261 const ACL *psacl; in ntfs_attr_size()
294 psacl = (const ACL*)&attr[offsacl]; in ntfs_attr_size()
304 pdacl = (const ACL*)&attr[offdacl]; in ntfs_attr_size()
542 static BOOL valid_acl(const ACL *pacl, unsigned int end) in valid_acl()
554 offace = sizeof(ACL); in valid_acl()
610 const ACL *pdacl; in ntfs_valid_descr()
611 const ACL *psacl; in ntfs_valid_descr()
631 pdacl = (const ACL*)&securattr[offdacl]; in ntfs_valid_descr()
632 psacl = (const ACL*)&securattr[offsacl]; in ntfs_valid_descr()
[all …]
/third_party/pulseaudio/src/pulsecore/
Dipacl.c67 pa_ip_acl *acl; in pa_ip_acl_new() local
71 acl = pa_xnew(pa_ip_acl, 1); in pa_ip_acl_new()
72 PA_LLIST_HEAD_INIT(struct acl_entry, acl->entries); in pa_ip_acl_new()
101 pa_log_warn("Host part of ACL entry '%s/%u' is not zero!", a, e.bits); in pa_ip_acl_new()
131 pa_log_warn("Host part of ACL entry '%s/%u' is not zero!", a, e.bits); in pa_ip_acl_new()
141 PA_LLIST_PREPEND(struct acl_entry, acl->entries, n); in pa_ip_acl_new()
146 return acl; in pa_ip_acl_new()
150 pa_ip_acl_free(acl); in pa_ip_acl_new()
155 void pa_ip_acl_free(pa_ip_acl *acl) { in pa_ip_acl_free() argument
156 pa_assert(acl); in pa_ip_acl_free()
[all …]
/third_party/skia/third_party/externals/tint/infra/config/global/
Dmain.star26 acl.entry(
28 acl.PROJECT_CONFIGS_READER,
29 acl.LOGDOG_READER,
30 acl.BUILDBUCKET_READER,
31 acl.SCHEDULER_READER,
35 acl.entry(
37 acl.SCHEDULER_OWNER,
41 acl.entry(
43 acl.LOGDOG_WRITER,
61 acl.entry(
[all …]
/third_party/skia/third_party/externals/dawn/infra/config/global/
Dmain.star26 acl.entry(
28 acl.PROJECT_CONFIGS_READER,
29 acl.LOGDOG_READER,
30 acl.BUILDBUCKET_READER,
31 acl.SCHEDULER_READER,
35 acl.entry(
37 acl.SCHEDULER_OWNER,
41 acl.entry(
43 acl.LOGDOG_WRITER,
61 acl.entry(
[all …]
/third_party/protobuf/php/src/Google/Protobuf/
DMixin.php26 * package google.acl.v1;
28 * // Get the underlying ACL object.
29 * rpc GetAcl(GetAclRequest) returns (Acl) {
35 * rpc GetAcl(GetAclRequest) returns (Acl);
45 * - name: google.acl.v1.AccessControl
52 * // Get the underlying ACL object.
53 * rpc GetAcl(GetAclRequest) returns (Acl) {
64 * - name: google.acl.v1.AccessControl
68 * // Get the underlying ACL object.
69 * rpc GetAcl(GetAclRequest) returns (Acl) {
/third_party/skia/third_party/externals/swiftshader/infra/config/
Dmain.star9 acl.entry(
10 acl.PROJECT_CONFIGS_READER,
23 acl.entry(
24 acl.CQ_COMMITTER,
27 acl.entry(
28 acl.CQ_DRY_RUNNER,
/third_party/skia/third_party/externals/angle2/infra/config/
Dmain.star45 acl.entry(
47 acl.PROJECT_CONFIGS_READER,
48 acl.LOGDOG_READER,
49 acl.BUILDBUCKET_READER,
50 acl.SCHEDULER_READER,
54 acl.entry(
56 acl.SCHEDULER_OWNER,
60 acl.entry(
62 acl.LOGDOG_WRITER,
336 acl.entry(
[all …]
/third_party/e2fsprogs/
D0013-e2fsck-do-not-clean-up-file-acl-if-the-inode-is-trun.patch4 Subject: [PATCH] e2fsck: do not clean up file acl if the inode is truncating
29 File acl would be clean up in release_inode_blocks, whether the orphan
31 the file acl would be clean up, but the blocks count is not be
32 subtract acl blocks, and the inode is not unmark in bitmap, which causes
35 To slove this issue, do not clean up file acl if the inode is truncating
53 + /* do not clean up file acl if the inode is truncating type */
/third_party/ltp/testcases/kernel/syscalls/getxattr/
Dgetxattr05.c31 # include <sys/acl.h>
44 static acl_t acl; variable
139 acl = acl_from_text(acl_text); in setup()
140 if (!acl) in setup()
143 res = acl_set_file(TEST_FILE, ACL_TYPE_ACCESS, acl); in setup()
168 if (acl) in cleanup()
169 acl_free(acl); in cleanup()
184 TST_TEST_TCONF("<sys/xattr.h> or <sys/acl.h> does not exist.");
/third_party/protobuf/src/google/protobuf/
Dapi.proto144 // package google.acl.v1;
146 // // Get the underlying ACL object.
147 // rpc GetAcl(GetAclRequest) returns (Acl) {
154 // rpc GetAcl(GetAclRequest) returns (Acl);
167 // - name: google.acl.v1.AccessControl
176 // // Get the underlying ACL object.
177 // rpc GetAcl(GetAclRequest) returns (Acl) {
191 // - name: google.acl.v1.AccessControl
197 // // Get the underlying ACL object.
198 // rpc GetAcl(GetAclRequest) returns (Acl) {
/third_party/pulseaudio/src/tests/
Dipacl-test.c29 pa_ip_acl *acl; in do_ip_acl_check() local
32 acl = pa_ip_acl_new(s); in do_ip_acl_check()
33 fail_unless(acl != NULL); in do_ip_acl_check()
34 result = pa_ip_acl_check(acl, fd); in do_ip_acl_check()
35 pa_ip_acl_free(acl); in do_ip_acl_check()
105 s = suite_create("IP ACL"); in main()
/third_party/protobuf/objectivec/
DGPBApi.pbobjc.h232 * package google.acl.v1;
234 * // Get the underlying ACL object.
235 * rpc GetAcl(GetAclRequest) returns (Acl) {
242 * rpc GetAcl(GetAclRequest) returns (Acl);
255 * - name: google.acl.v1.AccessControl
264 * // Get the underlying ACL object.
265 * rpc GetAcl(GetAclRequest) returns (Acl) {
279 * - name: google.acl.v1.AccessControl
285 * // Get the underlying ACL object.
286 * rpc GetAcl(GetAclRequest) returns (Acl) {
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dieee802_11_auth.c2 * hostapd / IEEE 802.11 authentication (ACL)
9 * configured ACL from configuration files or an external RADIUS server.
240 /* Check whether ACL cache has an entry for this station */ in hostapd_allowed_address()
271 "for ACL query."); in hostapd_allowed_address()
309 wpa_printf(MSG_DEBUG, "Cached ACL entry for " MACSTR_SEC in hostapd_acl_expire_cache()
339 wpa_printf(MSG_DEBUG, "ACL query for " MACSTR_SEC in hostapd_acl_expire_queries()
359 * hostapd_acl_expire - ACL cache expiration callback
445 * Returns: RADIUS_RX_PROCESSED if RADIUS message was a reply to ACL query (and
481 wpa_printf(MSG_DEBUG, "Unknown RADIUS message code %d to ACL " in hostapd_acl_recv_radius()
486 /* Insert Accept/Reject info into ACL cache */ in hostapd_acl_recv_radius()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dieee802_11_auth.c2 * hostapd / IEEE 802.11 authentication (ACL)
9 * configured ACL from configuration files or an external RADIUS server.
295 /* Check whether ACL cache has an entry for this station */ in hostapd_allowed_address()
336 "for ACL query."); in hostapd_allowed_address()
374 wpa_printf(MSG_DEBUG, "Cached ACL entry for " MACSTR in hostapd_acl_expire_cache()
404 wpa_printf(MSG_DEBUG, "ACL query for " MACSTR in hostapd_acl_expire_queries()
424 * hostapd_acl_expire - ACL cache expiration callback
510 * Returns: RADIUS_RX_PROCESSED if RADIUS message was a reply to ACL query (and
545 wpa_printf(MSG_DEBUG, "Unknown RADIUS message code %d to ACL " in hostapd_acl_recv_radius()
550 /* Insert Accept/Reject info into ACL cache */ in hostapd_acl_recv_radius()
[all …]
/third_party/ntfs-3g/include/ntfs-3g/
Dacls.h86 * To identify NTFS ACL meaning Posix ACL granted to root
91 #define ROOT_OWNER_UNMARK SYNCHRONIZE /* ACL granted to root as owner */
92 #define ROOT_GROUP_UNMARK FILE_READ_EA /* ACL granted to root as group */
171 int ntfs_inherit_acl(const ACL *oldacl, ACL *newacl,

12345678