/third_party/ltp/testcases/network/nfsv4/acl/ |
D | acl1.c | 3 * ACL testing basic program 4 * Purpose: setting an acl on a file a verifies that the accesses are right 24 #include <sys/acl.h> 31 /* the "typical" acl used for the test */ 74 /* acl with user entries used for the test */ 79 acl_t acl; in test_acl_user_create() local 80 acl = acl_from_text(acl_text); in test_acl_user_create() 81 return acl; in test_acl_user_create() 84 /* acl with group entries used for the test */ 90 acl_t acl; in test_acl_grp_create() local [all …]
|
D | test_acl.py | 18 # set default acl on the test directory 21 acl=[] 26 acl.append(name,entry) 29 # get the file's ACL and verify 43 if acl2[i] == acl[j]: 51 path = '/mnt/nfs/test-acl' 64 print("test acl 10000\n") 66 f = open('/tmp/acl-result-10000','w') 67 path = '/mnt/nfs/test-acl' 87 path = '/mnt/nfs/test-acl' # NFS mounted directory [all …]
|
D | README | 1 ACL testing 5 Testing ACL conformance, ACL limits, and ACL robustness 8 ACL support must be present on the remote host 9 attr and acl packages must be install for the stestsuite to build/run. 12 acl1: verify the conformance ok access regarding the ACL of files and directory. 13 stress: multiprocess application to stress the ACL
|
D | runtest | 5 # runtests script for ACL testing 7 MAXLENGTH=30 # maximum ACL length - NB: the current NFSv4 acl implementation does not allow ACL gre… 8 NFSMNTDIR=/mnt/nfs-acl 27 echo "Starting ACL testing" 52 echo "LONG ACL TEST" 59 echo "Long ACL test OK with $MAXLENGTH entries" 60 echo "ACL STRESSING TEST"
|
D | random_gen.py | 9 """ ACL support attribute """ 184 """ Create Random ACL for a file with a fixed number a entries """ 186 acl = [] 193 acl.append(newace) 194 return acl 208 """ Create a random ACL operation (delete / remove / modify on user / group ) """ 246 if a == 9: #Copying the ACL of one file to another
|
/third_party/gn/infra/config/ |
D | main.star | 30 acl.entry( 32 acl.BUILDBUCKET_READER, 33 acl.LOGDOG_READER, 34 acl.PROJECT_CONFIGS_READER, 35 acl.SCHEDULER_READER, 39 acl.entry([acl.SCHEDULER_OWNER], groups = ["project-gn-committers"]), 40 acl.entry([acl.LOGDOG_WRITER], groups = ["luci-logdog-chromium-writers"]), 87 acl.entry( 88 [acl.BUILDBUCKET_TRIGGERER], 116 acl.entry( [all …]
|
/third_party/ntfs-3g/ntfsprogs/ |
D | sd.c | 26 ACL *acl; in init_system_file_sd() local 50 acl = (ACL*)((char*)sd + le32_to_cpu(sd->dacl)); in init_system_file_sd() 51 acl->revision = 2; in init_system_file_sd() 52 acl->alignment1 = 0; in init_system_file_sd() 53 acl->size = const_cpu_to_le16(0x34); in init_system_file_sd() 54 acl->ace_count = const_cpu_to_le16(2); in init_system_file_sd() 55 acl->alignment2 = const_cpu_to_le16(0); in init_system_file_sd() 57 * Now at offset 0x1c, just after the DACL's ACL, we have the first in init_system_file_sd() 60 aa_ace = (ACCESS_ALLOWED_ACE*)((char*)acl + sizeof(ACL)); in init_system_file_sd() 174 ACL *acl; in init_root_sd() local [all …]
|
D | ntfssecaudit.8.in | 79 (rwx flags in octal) and Posix ACL[1], its security key if any, and its 100 a Posix ACL[1] (expressed like in setfacl -m). This sets a new ACL 106 expressed in octal form as in \fBchmod\fP), or a Posix ACL[1] (expressed like 112 Linux mode (rwx flags in octal) and Posix ACL[1], its security key if any, 115 Posix ACL interpretation can only be displayed if the full path to 128 [1] provided the POSIX ACL option was selected at compile time. A Posix ACL
|
D | ntfssecaudit.c | 33 * set the security parameters of file to perms (mode or acl) 58 * set the security parameters of file to perms (mode or acl) 98 * - reenabled recursion for setting a new mode or ACL 126 * - added optional logging of ACL hashes to facilitate restore checks 385 * To identify NTFS ACL meaning Posix ACL granted to root 390 #define ROOT_OWNER_UNMARK SYNCHRONIZE /* ACL granted to root as owner */ 391 #define ROOT_GROUP_UNMARK FILE_READ_EA /* ACL granted to root as group */ 1377 printf("%*cCan access security ACL\n",-level-4,marker); in showace() 1512 const struct POSIX_ACL *acl; in showposix() local 1526 acl = &pxdesc->acl; in showposix() [all …]
|
/third_party/ntfs-3g/libntfs-3g/ |
D | xattrs.c | 65 * Posix ACL structures 151 * Make a Posix ACL CPU endian 155 struct POSIX_ACL *acl) in le_acl_to_cpu() argument 160 acl->version = le_acl->version; in le_acl_to_cpu() 161 acl->flags = le_acl->flags; in le_acl_to_cpu() 162 acl->filler = 0; in le_acl_to_cpu() 165 acl->ace[i].tag = le16_to_cpu(le_acl->ace[i].tag); in le_acl_to_cpu() 166 acl->ace[i].perms = le16_to_cpu(le_acl->ace[i].perms); in le_acl_to_cpu() 167 acl->ace[i].id = le32_to_cpu(le_acl->ace[i].id); in le_acl_to_cpu() 173 * Make a Posix ACL little endian [all …]
|
D | acls.c | 260 const ACL *pdacl; in ntfs_attr_size() 261 const ACL *psacl; in ntfs_attr_size() 294 psacl = (const ACL*)&attr[offsacl]; in ntfs_attr_size() 304 pdacl = (const ACL*)&attr[offdacl]; in ntfs_attr_size() 542 static BOOL valid_acl(const ACL *pacl, unsigned int end) in valid_acl() 554 offace = sizeof(ACL); in valid_acl() 610 const ACL *pdacl; in ntfs_valid_descr() 611 const ACL *psacl; in ntfs_valid_descr() 631 pdacl = (const ACL*)&securattr[offdacl]; in ntfs_valid_descr() 632 psacl = (const ACL*)&securattr[offsacl]; in ntfs_valid_descr() [all …]
|
/third_party/pulseaudio/src/pulsecore/ |
D | ipacl.c | 67 pa_ip_acl *acl; in pa_ip_acl_new() local 71 acl = pa_xnew(pa_ip_acl, 1); in pa_ip_acl_new() 72 PA_LLIST_HEAD_INIT(struct acl_entry, acl->entries); in pa_ip_acl_new() 101 pa_log_warn("Host part of ACL entry '%s/%u' is not zero!", a, e.bits); in pa_ip_acl_new() 131 pa_log_warn("Host part of ACL entry '%s/%u' is not zero!", a, e.bits); in pa_ip_acl_new() 141 PA_LLIST_PREPEND(struct acl_entry, acl->entries, n); in pa_ip_acl_new() 146 return acl; in pa_ip_acl_new() 150 pa_ip_acl_free(acl); in pa_ip_acl_new() 155 void pa_ip_acl_free(pa_ip_acl *acl) { in pa_ip_acl_free() argument 156 pa_assert(acl); in pa_ip_acl_free() [all …]
|
/third_party/skia/third_party/externals/tint/infra/config/global/ |
D | main.star | 26 acl.entry( 28 acl.PROJECT_CONFIGS_READER, 29 acl.LOGDOG_READER, 30 acl.BUILDBUCKET_READER, 31 acl.SCHEDULER_READER, 35 acl.entry( 37 acl.SCHEDULER_OWNER, 41 acl.entry( 43 acl.LOGDOG_WRITER, 61 acl.entry( [all …]
|
/third_party/skia/third_party/externals/dawn/infra/config/global/ |
D | main.star | 26 acl.entry( 28 acl.PROJECT_CONFIGS_READER, 29 acl.LOGDOG_READER, 30 acl.BUILDBUCKET_READER, 31 acl.SCHEDULER_READER, 35 acl.entry( 37 acl.SCHEDULER_OWNER, 41 acl.entry( 43 acl.LOGDOG_WRITER, 61 acl.entry( [all …]
|
/third_party/protobuf/php/src/Google/Protobuf/ |
D | Mixin.php | 26 * package google.acl.v1; 28 * // Get the underlying ACL object. 29 * rpc GetAcl(GetAclRequest) returns (Acl) { 35 * rpc GetAcl(GetAclRequest) returns (Acl); 45 * - name: google.acl.v1.AccessControl 52 * // Get the underlying ACL object. 53 * rpc GetAcl(GetAclRequest) returns (Acl) { 64 * - name: google.acl.v1.AccessControl 68 * // Get the underlying ACL object. 69 * rpc GetAcl(GetAclRequest) returns (Acl) {
|
/third_party/skia/third_party/externals/swiftshader/infra/config/ |
D | main.star | 9 acl.entry( 10 acl.PROJECT_CONFIGS_READER, 23 acl.entry( 24 acl.CQ_COMMITTER, 27 acl.entry( 28 acl.CQ_DRY_RUNNER,
|
/third_party/skia/third_party/externals/angle2/infra/config/ |
D | main.star | 45 acl.entry( 47 acl.PROJECT_CONFIGS_READER, 48 acl.LOGDOG_READER, 49 acl.BUILDBUCKET_READER, 50 acl.SCHEDULER_READER, 54 acl.entry( 56 acl.SCHEDULER_OWNER, 60 acl.entry( 62 acl.LOGDOG_WRITER, 336 acl.entry( [all …]
|
/third_party/e2fsprogs/ |
D | 0013-e2fsck-do-not-clean-up-file-acl-if-the-inode-is-trun.patch | 4 Subject: [PATCH] e2fsck: do not clean up file acl if the inode is truncating 29 File acl would be clean up in release_inode_blocks, whether the orphan 31 the file acl would be clean up, but the blocks count is not be 32 subtract acl blocks, and the inode is not unmark in bitmap, which causes 35 To slove this issue, do not clean up file acl if the inode is truncating 53 + /* do not clean up file acl if the inode is truncating type */
|
/third_party/ltp/testcases/kernel/syscalls/getxattr/ |
D | getxattr05.c | 31 # include <sys/acl.h> 44 static acl_t acl; variable 139 acl = acl_from_text(acl_text); in setup() 140 if (!acl) in setup() 143 res = acl_set_file(TEST_FILE, ACL_TYPE_ACCESS, acl); in setup() 168 if (acl) in cleanup() 169 acl_free(acl); in cleanup() 184 TST_TEST_TCONF("<sys/xattr.h> or <sys/acl.h> does not exist.");
|
/third_party/protobuf/src/google/protobuf/ |
D | api.proto | 144 // package google.acl.v1; 146 // // Get the underlying ACL object. 147 // rpc GetAcl(GetAclRequest) returns (Acl) { 154 // rpc GetAcl(GetAclRequest) returns (Acl); 167 // - name: google.acl.v1.AccessControl 176 // // Get the underlying ACL object. 177 // rpc GetAcl(GetAclRequest) returns (Acl) { 191 // - name: google.acl.v1.AccessControl 197 // // Get the underlying ACL object. 198 // rpc GetAcl(GetAclRequest) returns (Acl) {
|
/third_party/pulseaudio/src/tests/ |
D | ipacl-test.c | 29 pa_ip_acl *acl; in do_ip_acl_check() local 32 acl = pa_ip_acl_new(s); in do_ip_acl_check() 33 fail_unless(acl != NULL); in do_ip_acl_check() 34 result = pa_ip_acl_check(acl, fd); in do_ip_acl_check() 35 pa_ip_acl_free(acl); in do_ip_acl_check() 105 s = suite_create("IP ACL"); in main()
|
/third_party/protobuf/objectivec/ |
D | GPBApi.pbobjc.h | 232 * package google.acl.v1; 234 * // Get the underlying ACL object. 235 * rpc GetAcl(GetAclRequest) returns (Acl) { 242 * rpc GetAcl(GetAclRequest) returns (Acl); 255 * - name: google.acl.v1.AccessControl 264 * // Get the underlying ACL object. 265 * rpc GetAcl(GetAclRequest) returns (Acl) { 279 * - name: google.acl.v1.AccessControl 285 * // Get the underlying ACL object. 286 * rpc GetAcl(GetAclRequest) returns (Acl) {
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | ieee802_11_auth.c | 2 * hostapd / IEEE 802.11 authentication (ACL) 9 * configured ACL from configuration files or an external RADIUS server. 240 /* Check whether ACL cache has an entry for this station */ in hostapd_allowed_address() 271 "for ACL query."); in hostapd_allowed_address() 309 wpa_printf(MSG_DEBUG, "Cached ACL entry for " MACSTR_SEC in hostapd_acl_expire_cache() 339 wpa_printf(MSG_DEBUG, "ACL query for " MACSTR_SEC in hostapd_acl_expire_queries() 359 * hostapd_acl_expire - ACL cache expiration callback 445 * Returns: RADIUS_RX_PROCESSED if RADIUS message was a reply to ACL query (and 481 wpa_printf(MSG_DEBUG, "Unknown RADIUS message code %d to ACL " in hostapd_acl_recv_radius() 486 /* Insert Accept/Reject info into ACL cache */ in hostapd_acl_recv_radius() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | ieee802_11_auth.c | 2 * hostapd / IEEE 802.11 authentication (ACL) 9 * configured ACL from configuration files or an external RADIUS server. 295 /* Check whether ACL cache has an entry for this station */ in hostapd_allowed_address() 336 "for ACL query."); in hostapd_allowed_address() 374 wpa_printf(MSG_DEBUG, "Cached ACL entry for " MACSTR in hostapd_acl_expire_cache() 404 wpa_printf(MSG_DEBUG, "ACL query for " MACSTR in hostapd_acl_expire_queries() 424 * hostapd_acl_expire - ACL cache expiration callback 510 * Returns: RADIUS_RX_PROCESSED if RADIUS message was a reply to ACL query (and 545 wpa_printf(MSG_DEBUG, "Unknown RADIUS message code %d to ACL " in hostapd_acl_recv_radius() 550 /* Insert Accept/Reject info into ACL cache */ in hostapd_acl_recv_radius() [all …]
|
/third_party/ntfs-3g/include/ntfs-3g/ |
D | acls.h | 86 * To identify NTFS ACL meaning Posix ACL granted to root 91 #define ROOT_OWNER_UNMARK SYNCHRONIZE /* ACL granted to root as owner */ 92 #define ROOT_GROUP_UNMARK FILE_READ_EA /* ACL granted to root as group */ 171 int ntfs_inherit_acl(const ACL *oldacl, ACL *newacl,
|