/external/toybox/tests/ |
D | chmod.test | 22 # Creating test files to test chmod command 44 testing "$u$g$o $type" "chmod $u$g$o $type && 52 "chmod 750 dir 640 file 2>/dev/null || 57 "chmod 666 dir file && 61 testing "765 *" "chmod 765 * && 66 testing "u=r dir file" "chmod u=r dir file && 70 testing "u=w dir file" "chmod u=w dir file && 74 testing "u=x dir file" "chmod u=x dir file && 78 testing "u+r dir file" "chmod u+r dir file && 82 testing "u+w dir file" "chmod u+w dir file && [all …]
|
D | mv.test | 5 # "touch two; chmod -w two; mv one two" shouldn't prompt to delete two if 68 chmod a-r file1 100 chmod 400 file1 file2 121 chmod 400 file1 file2 128 chmod 400 file1 file2 135 chmod 400 file1 file2
|
/external/bcc/tools/ |
D | capable_example.txt | 11 22:11:23 0 7003 chmod 3 CAP_FOWNER 1 12 22:11:23 0 7003 chmod 4 CAP_FSETID 1 13 22:11:23 0 7005 chmod 4 CAP_FSETID 1 14 22:11:23 0 7005 chmod 4 CAP_FSETID 1 21 22:11:24 0 7026 chmod 3 CAP_FOWNER 1 22 22:11:24 0 7026 chmod 4 CAP_FSETID 1 23 22:11:24 0 7028 chmod 4 CAP_FSETID 1 24 22:11:24 0 7028 chmod 4 CAP_FSETID 1 31 22:11:25 0 7049 chmod 3 CAP_FOWNER 1 32 22:11:25 0 7049 chmod 4 CAP_FSETID 1 [all …]
|
/external/selinux/libsemanage/tests/ |
D | test_semanage_store.c | 163 err = chmod(modpath, 0); in test_semanage_store_access_check() 165 err = chmod(readlockpath, 0); in test_semanage_store_access_check() 167 err = chmod(polpath, 0); in test_semanage_store_access_check() 174 err = chmod(polpath, S_IRUSR | S_IXUSR); in test_semanage_store_access_check() 176 err = chmod(readlockpath, S_IRUSR); in test_semanage_store_access_check() 178 err = chmod(modpath, S_IRUSR | S_IXUSR); in test_semanage_store_access_check() 185 err = chmod(polpath, S_IRUSR | S_IWUSR | S_IXUSR); in test_semanage_store_access_check() 187 err = chmod(readlockpath, S_IRUSR | S_IWUSR); in test_semanage_store_access_check() 189 err = chmod(modpath, S_IRUSR | S_IWUSR | S_IXUSR); in test_semanage_store_access_check() 196 err = chmod(polpath, S_IRUSR | S_IXUSR); in test_semanage_store_access_check() [all …]
|
/external/toybox/toys/posix/ |
D | chmod.c | 1 /* chmod.c - Change file mode bits 5 * See http://opengroup.org/onlinepubs/9699919799/utilities/chmod.html 7 USE_CHMOD(NEWTOY(chmod, "<2?vRf[-vf]", TOYFLAG_BIN)) 9 config CHMOD 10 bool "chmod" 13 usage: chmod [-R] MODE FILE... 31 chmod u+w file - allow owner of "file" to write to it. 32 chmod 744 file - user can read/write/execute, everyone else read only 51 printf("chmod '%s' to %04o\n", s, mode);
|
/external/ltp/testcases/kernel/syscalls/chmod/ |
D | chmod06.c | 26 * 1) chmod(2) returns -1 and sets errno to EPERM if the effective user id 29 * 2) chmod(2) returns -1 and sets errno to EACCES if search permission is 31 * 3) chmod(2) returns -1 and sets errno to EFAULT if pathname points 33 * 4) chmod(2) returns -1 and sets errno to ENAMETOOLONG if the pathname 35 * 5) chmod(2) returns -1 and sets errno to ENOTDIR if the directory 37 * 6) chmod(2) returns -1 and sets errno to ENOENT if the specified file 88 TEST(chmod(tc[i].pathname, tc[i].mode)); in run() 94 tst_res(TFAIL, "chmod succeeded unexpectedly"); in run() 99 tst_res(TPASS | TTERRNO, "chmod failed as expected"); in run() 101 tst_res(TFAIL | TTERRNO, "chmod failed unexpectedly; " in run()
|
D | chmod07.c | 10 * Verify that, chmod(2) will succeed to change the mode of a file/directory 18 * chmod() should return value 0 on success and succeeds to set sticky bit 43 * Call chmod(2) with specified mode argument in test_chmod() 46 TEST(chmod(TESTFILE, PERMS)); in test_chmod() 48 tst_brk(TFAIL | TTERRNO, "chmod(%s, %#o) failed", in test_chmod() 58 tst_res(TPASS, "Functionality of chmod(%s, %#o) successful", in test_chmod()
|
D | chmod05.c | 10 * Verify that, chmod(2) will succeed to change the mode of a directory 18 * chmod() should return value 0 on success and though succeeds to change 51 TEST(chmod(TESTDIR, PERMS)); in test_chmod() 53 tst_res(TFAIL, "chmod(%s, %#o) failed", TESTDIR, PERMS); in test_chmod() 64 tst_res(TPASS, "Functionality of chmod(%s, %#o) successful", in test_chmod()
|
D | chmod04.c | 24 * Verify that, chmod(2) will succeed to change the mode of a directory 32 * chmod() should return value 0 on success and succeeds to set sticky bit 115 * Call chmod(2) with mode argument to in main() 118 TEST(chmod(TESTDIR, PERMS)); in main() 121 tst_resm(TFAIL | TTERRNO, "chmod(%s, %#o) failed", in main() 140 "chmod(%s, %#o) successful", in main()
|
D | chmod01.c | 24 * Verify that, chmod(2) succeeds when used to change the mode permissions 28 * chmod(2) should return 0 and the mode permissions set on file should match 112 TEST(chmod(TESTFILE, mode)); in main() 116 "chmod(%s, %#o) failed", TESTFILE, in main() 127 "chmod(%s, %#o) successful", in main()
|
/external/bzip2/ |
D | Makefile | 82 chmod a+x $(PREFIX)/bin/bzip2 83 chmod a+x $(PREFIX)/bin/bunzip2 84 chmod a+x $(PREFIX)/bin/bzcat 85 chmod a+x $(PREFIX)/bin/bzip2recover 87 chmod a+r $(PREFIX)/man/man1/bzip2.1 89 chmod a+r $(PREFIX)/include/bzlib.h 91 chmod a+r $(PREFIX)/lib/libbz2.a 95 chmod a+x $(PREFIX)/bin/bzgrep 98 chmod a+x $(PREFIX)/bin/bzmore 101 chmod a+x $(PREFIX)/bin/bzdiff [all …]
|
/external/libexif/doc/ |
D | Makefile.am | 52 \( -type d -exec chmod 0755 {} \; \) -or \ 53 \( -type f -exec chmod 0644 {} \; \) 67 \( -type d -exec chmod 0755 {} \; \) -or \ 68 \( -type f -exec chmod 0644 {} \; \) 82 find $(DOXYGEN_OUTPUT_DIR) \( -type d -exec chmod a+rx,go-w,g+s {} \; \) \ 83 -or \( -type f -exec chmod a+r {} \; \) 88 …chmod g+rwxs,a+rx {} \; \) -or \( -type f -exec chgrp libexif {} \; -exec chmod g+rw {} \; \( -nam…
|
/external/libcap/contrib/ |
D | pcaps4server | 89 chmod $VERBOSE u+s /usr/sbin/httpd 99 chmod $VERBOSE u-s /usr/sbin/httpd 124 chmod $VERBOSE u+s /usr/sbin/httpd 135 chmod $VERBOSE u-s /usr/sbin/httpd 160 chmod $VERBOSE u+s /usr/sbin/smbd /usr/sbin/nmbd 174 chmod $VERBOSE u-s /usr/sbin/smbd /usr/sbin/nmbd 199 chmod $VERBOSE u+s /usr/sbin/named 209 chmod $VERBOSE u-s /usr/sbin/named 232 chmod $VERBOSE u+s /usr/sbin/dhcpd 242 chmod $VERBOSE u-s /usr/sbin/dhcpd [all …]
|
D | pcaps4suid0 | 86 CHMOD=`which chmod 2>/dev/null` 88 if [ "$CHMOD" == "" -o "$SETCAP" == "" ]; then 89 echo "Sorry, I'm missing chmod or setcap !" 114 chmod u-s $i 140 chmod u+s $i 193 echo "You need and I will check fot the utilities which, chmod and setcap."
|
/external/openssh/contrib/hpux/ |
D | README | 19 # chmod 444 /etc/rc.config.d/sshd 21 # chmod 555 /sbin/init.d/sshd.rc 36 # chmod 711 /etc/opt/egd 41 # chmod 444 /etc/rc.config.d/egd 43 # chmod 555 /sbin/init.d/egd.rc
|
/external/ltp/testcases/kernel/syscalls/nftw/ |
D | tools64.c | 48 chmod("./tmp/data/d333", (mode_t) S_IRWXU | S_IRWXG | S_IRWXO); in cleanup_function() 49 chmod("./tmp/data/d666", (mode_t) S_IRWXU | S_IRWXG | S_IRWXO); in cleanup_function() 50 chmod("./tmp/data/dirg/dir_right.1", (mode_t) S_IRWXU | S_IRWXG | in cleanup_function() 121 if (chmod("./tmp/data/d333", (mode_t) S_IWUSR | S_IXUSR | S_IWGRP | in setup_path() 123 sprintf(ebuf, "Can't chmod %s ", "./tmp/data/d333"); in setup_path() 129 if (chmod("./tmp/data/d666", (mode_t) S_IRUSR | S_IWUSR | S_IRGRP | in setup_path() 131 sprintf(ebuf, "Can't chmod %s ", "./tmp/data/d666"); in setup_path() 137 if (chmod("./tmp/data/dirg/dir_right.1", (mode_t) S_IWUSR | S_IXUSR | in setup_path() 139 sprintf(ebuf, "Can't chmod %s ", "./tmp/data/dirg/dir_right.1"); in setup_path()
|
D | tools.c | 49 chmod("./tmp/data/d333", (mode_t) S_IRWXU | S_IRWXG | S_IRWXO); in cleanup_function() 50 chmod("./tmp/data/d666", (mode_t) S_IRWXU | S_IRWXG | S_IRWXO); in cleanup_function() 51 chmod("./tmp/data/dirg/dir_right.1", (mode_t) S_IRWXU | S_IRWXG | in cleanup_function() 122 if (chmod("./tmp/data/d333", (mode_t) S_IWUSR | S_IXUSR | S_IWGRP | in setup_path() 124 sprintf(ebuf, "Can't chmod %s ", "./tmp/data/d333"); in setup_path() 130 if (chmod("./tmp/data/d666", (mode_t) S_IRUSR | S_IWUSR | S_IRGRP | in setup_path() 132 sprintf(ebuf, "Can't chmod %s ", "./tmp/data/d666"); in setup_path() 138 if (chmod("./tmp/data/dirg/dir_right.1", (mode_t) S_IWUSR | S_IXUSR | in setup_path() 140 sprintf(ebuf, "Can't chmod %s ", "./tmp/data/dirg/dir_right.1"); in setup_path()
|
/external/openssh/contrib/redhat/ |
D | sshd.init.old | 68 chmod 600 $RSA1_KEY 69 chmod 644 $RSA1_KEY.pub 83 chmod 600 $RSA_KEY 84 chmod 644 $RSA_KEY.pub 98 chmod 600 $DSA_KEY 99 chmod 644 $DSA_KEY.pub
|
/external/python/cpython2/Lib/test/ |
D | test_dumbdbm.py | 41 @unittest.skipUnless(hasattr(os, 'chmod'), 'os.chmod not available') 172 @unittest.skipUnless(hasattr(os, 'chmod'), 'test needs os.chmod()') 183 os.chmod(fname + ".dir", stat.S_IRUSR) 184 os.chmod(fname + ".dat", stat.S_IRUSR) 185 os.chmod(dir, stat.S_IRUSR|stat.S_IXUSR)
|
D | test_stat.py | 89 os.chmod(TESTFN, 0o700) 95 os.chmod(TESTFN, 0o070) 101 os.chmod(TESTFN, 0o007) 107 os.chmod(TESTFN, 0o444) 112 os.chmod(TESTFN, 0o700) 120 os.chmod(TESTFN, 0o700)
|
/external/openssh/ |
D | start-ssh | 16 chmod 600 /$DSA_KEY 17 chmod 644 $DSA_PUB_KEY 22 chmod 600 /$RSA_KEY 23 chmod 644 $RSA_PUB_KEY
|
/external/python/cpython2/Lib/distutils/tests/ |
D | test_spawn.py | 39 os.chmod(exe, 0777) 44 os.chmod(exe, 0777) 51 os.chmod(exe, 0777) 56 os.chmod(exe, 0777) 70 os.chmod(filename, stat.S_IXUSR)
|
/external/adeb/addons/ |
D | run.common | 15 chmod 0777 /sys/kernel/debug > /dev/null 16 chmod 0777 debian/sys/kernel/debug > /dev/null 17 chmod 0777 /sys/kernel/debug/tracing > /dev/null 18 chmod 0777 debian/sys/kernel/debug/tracing > /dev/null
|
/external/adhd/cras/src/fuzz/ |
D | Dockerfile | 35 chmod 644 /usr/local/include/dictionary.h /usr/local/include/iniparser.h && \ 36 chmod 644 /usr/local/lib/libiniparser.a && \ 37 chmod 755 /usr/local/lib/libiniparser.so.* 41 chmod 644 *.a && \
|
/external/autotest/site_utils/admin/scripts/ |
D | fixperms.sh | 3 chmod -R o+r /usr/local/autotest 4 find /usr/local/autotest/ -type d | xargs chmod o+x 5 chmod o+x /usr/local/autotest/tko/*.cgi
|