acl.3 (192638) | acl.3 (194955) |
---|---|
1.\"- 2.\" Copyright (c) 2000, 2001, 2002 Robert N. M. Watson 3.\" All rights reserved. 4.\" 5.\" This software was developed by Robert Watson for the TrustedBSD Project. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions --- 11 unchanged lines hidden (view full) --- 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" | 1.\"- 2.\" Copyright (c) 2000, 2001, 2002 Robert N. M. Watson 3.\" All rights reserved. 4.\" 5.\" This software was developed by Robert Watson for the TrustedBSD Project. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions --- 11 unchanged lines hidden (view full) --- 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" |
28.\" $FreeBSD: head/lib/libc/posix1e/acl.3 192638 2009-05-23 13:51:05Z trasz $ | 28.\" $FreeBSD: head/lib/libc/posix1e/acl.3 194955 2009-06-25 12:46:59Z trasz $ |
29.\" 30.Dd December 18, 2002 31.Dt ACL 3 32.Os 33.Sh NAME 34.Nm acl 35.Nd introduction to the POSIX.1e ACL security API 36.Sh LIBRARY --- 17 unchanged lines hidden (view full) --- 54.Pp 55POSIX.1e describes a set of ACL manipulation routines to manage the 56contents of ACLs, as well as their relationships with files; almost 57all of these support routines are implemented in 58.Fx . 59.Pp 60Available functions, sorted by behavior, include: 61.Bl -tag -width indent | 29.\" 30.Dd December 18, 2002 31.Dt ACL 3 32.Os 33.Sh NAME 34.Nm acl 35.Nd introduction to the POSIX.1e ACL security API 36.Sh LIBRARY --- 17 unchanged lines hidden (view full) --- 54.Pp 55POSIX.1e describes a set of ACL manipulation routines to manage the 56contents of ACLs, as well as their relationships with files; almost 57all of these support routines are implemented in 58.Fx . 59.Pp 60Available functions, sorted by behavior, include: 61.Bl -tag -width indent |
62.It Fn acl_add_flag_np 63This function is described in 64.Xr acl_add_flag_np 3 , 65and may be used to add flags to a flagset. |
|
62.It Fn acl_add_perm 63This function is described in 64.Xr acl_add_perm 3 , 65and may be used to add permissions to a permission set. 66.It Fn acl_calc_mask 67This function is described in 68.Xr acl_calc_mask 3 , 69and may be used to calculate and set the permissions associated with 70the 71.Dv ACL_MASK 72entry. | 66.It Fn acl_add_perm 67This function is described in 68.Xr acl_add_perm 3 , 69and may be used to add permissions to a permission set. 70.It Fn acl_calc_mask 71This function is described in 72.Xr acl_calc_mask 3 , 73and may be used to calculate and set the permissions associated with 74the 75.Dv ACL_MASK 76entry. |
77.It Fn acl_clear_flags_np 78This function is described in 79.Xr acl_clear_flags_np 3 , 80and may be used to clear all flags from a flagset. |
|
73.It Fn acl_clear_perms 74This function is described in 75.Xr acl_clear_perms 3 , 76and may be used to clear all permissions from a permission set. 77.It Fn acl_copy_entry 78This function is described in 79.Xr acl_copy_entry 3 , 80and may be used to copy the contents of an ACL entry. | 81.It Fn acl_clear_perms 82This function is described in 83.Xr acl_clear_perms 3 , 84and may be used to clear all permissions from a permission set. 85.It Fn acl_copy_entry 86This function is described in 87.Xr acl_copy_entry 3 , 88and may be used to copy the contents of an ACL entry. |
81.It Fn acl_create_entry 82This function is described in | 89.It Xo 90.Fn acl_create_entry , 91.Fn acl_create_entry_np 92.Xc 93These functions are described in |
83.Xr acl_create_entry 3 , 84and may be used to create an empty entry in an ACL. 85.It Xo 86.Fn acl_delete_def_file , 87.Fn acl_delete_def_link_np , 88.Fn acl_delete_fd_np , 89.Fn acl_delete_file_np , 90.Fn acl_delete_link_np 91.Xc 92These functions are described in 93.Xr acl_delete 3 , 94and may be used to delete ACLs from file system objects. | 94.Xr acl_create_entry 3 , 95and may be used to create an empty entry in an ACL. 96.It Xo 97.Fn acl_delete_def_file , 98.Fn acl_delete_def_link_np , 99.Fn acl_delete_fd_np , 100.Fn acl_delete_file_np , 101.Fn acl_delete_link_np 102.Xc 103These functions are described in 104.Xr acl_delete 3 , 105and may be used to delete ACLs from file system objects. |
95.It Fn acl_delete_entry 96This function is described in | 106.It Xo 107.Fn acl_delete_entry , 108.Fn acl_delete_entry_np , 109.Xc 110This functions are described in |
97.Xr acl_delete_entry 3 , 98and may be used to delete an entry from an ACL. | 111.Xr acl_delete_entry 3 , 112and may be used to delete an entry from an ACL. |
113.It Fn acl_delete_flag_np 114This function is described in 115.Xr acl_delete_flag_np 3 , 116and may be used to delete flags from a flagset. |
|
99.It Fn acl_delete_perm 100This function is described in 101.Xr acl_delete_perm 3 , 102and may be used to delete permissions from a permset. 103.It Fn acl_dup 104This function is described in 105.Xr acl_dup 3 , 106and may be used to duplicate an ACL structure. --- 14 unchanged lines hidden (view full) --- 121.Fn acl_get_fd , 122.Fn acl_get_fd_np , 123.Fn acl_get_file , 124.Fn acl_get_link_np 125.Xc 126These functions are described in 127.Xr acl_get 3 , 128and may be used to retrieve ACLs from file system objects. | 117.It Fn acl_delete_perm 118This function is described in 119.Xr acl_delete_perm 3 , 120and may be used to delete permissions from a permset. 121.It Fn acl_dup 122This function is described in 123.Xr acl_dup 3 , 124and may be used to duplicate an ACL structure. --- 14 unchanged lines hidden (view full) --- 139.Fn acl_get_fd , 140.Fn acl_get_fd_np , 141.Fn acl_get_file , 142.Fn acl_get_link_np 143.Xc 144These functions are described in 145.Xr acl_get 3 , 146and may be used to retrieve ACLs from file system objects. |
147.It Fn acl_get_entry_type_np 148This function is described in 149.Xr acl_get_entry_type_np 3 , 150and may be used to retrieve an ACL type from an ACL entry. 151.It Fn acl_get_flagset_np 152This function is described in 153.Xr acl_get_flagset_np 3 , 154and may be used to retrieve a flagset from an ACL entry. |
|
129.It Fn acl_get_permset 130This function is described in 131.Xr acl_get_permset 3 , 132and may be used to retrieve a permset from an ACL entry. 133.It Fn acl_get_qualifier 134This function is described in 135.Xr acl_get_qualifier 3 , 136and may be used to retrieve the qualifier from an ACL entry. 137.It Fn acl_get_tag_type 138This function is described in 139.Xr acl_get_tag_type 3 , 140and may be used to retrieve the tag type from an ACL entry. 141.It Fn acl_init 142This function is described in 143.Xr acl_init 3 , 144and may be used to allocate a fresh (empty) ACL structure. | 155.It Fn acl_get_permset 156This function is described in 157.Xr acl_get_permset 3 , 158and may be used to retrieve a permset from an ACL entry. 159.It Fn acl_get_qualifier 160This function is described in 161.Xr acl_get_qualifier 3 , 162and may be used to retrieve the qualifier from an ACL entry. 163.It Fn acl_get_tag_type 164This function is described in 165.Xr acl_get_tag_type 3 , 166and may be used to retrieve the tag type from an ACL entry. 167.It Fn acl_init 168This function is described in 169.Xr acl_init 3 , 170and may be used to allocate a fresh (empty) ACL structure. |
171.It Fn acl_is_trivial_np 172This function is described in 173.Xr acl_is_trivial_np 3 , 174and may be used to find out whether ACL is trivial. |
|
145.It Xo 146.Fn acl_set_fd , 147.Fn acl_set_fd_np , 148.Fn acl_set_file , 149.Fn acl_set_link_np 150.Xc 151These functions are described in 152.Xr acl_set 3 , 153and may be used to assign an ACL to a file system object. | 175.It Xo 176.Fn acl_set_fd , 177.Fn acl_set_fd_np , 178.Fn acl_set_file , 179.Fn acl_set_link_np 180.Xc 181These functions are described in 182.Xr acl_set 3 , 183and may be used to assign an ACL to a file system object. |
184.It Fn acl_set_entry_type_np 185This function is described in 186.Xr acl_set_entry_type_np 3 , 187and may be used to set the ACL type of an ACL entry. 188.It Fn acl_set_flagset_np 189This function is described in 190.Xr acl_set_flagset_np 3 , 191and may be used to set the flags of an ACL entry from a flagset. |
|
154.It Fn acl_set_permset 155This function is described in 156.Xr acl_set_permset 3 , 157and may be used to set the permissions of an ACL entry from a permset. 158.It Fn acl_set_qualifier 159This function is described in 160.Xr acl_set_qualifier 3 , 161and may be used to set the qualifier of an ACL. 162.It Fn acl_set_tag_type 163This function is described in 164.Xr acl_set_tag_type 3 , 165and may be used to set the tag type of an ACL. | 192.It Fn acl_set_permset 193This function is described in 194.Xr acl_set_permset 3 , 195and may be used to set the permissions of an ACL entry from a permset. 196.It Fn acl_set_qualifier 197This function is described in 198.Xr acl_set_qualifier 3 , 199and may be used to set the qualifier of an ACL. 200.It Fn acl_set_tag_type 201This function is described in 202.Xr acl_set_tag_type 3 , 203and may be used to set the tag type of an ACL. |
166.It Fn acl_to_text 167This function is described in | 204.It Fn acl_strip_np 205This function is describe din 206.Xr acl-strip_np 3 , 207and may be used to remove extended entries from an ACL. 208.It Xo 209.Fn acl_to_text , 210.Fn acl_to_text_np 211.Xc 212These functions are described in |
168.Xr acl_to_text 3 , 169and may be used to generate a text-form of a POSIX.1e semantics ACL. 170.It Xo 171.Fn acl_valid , 172.Fn acl_valid_fd_np , 173.Fn acl_valid_file_np , 174.Fn acl_valid_link_np 175.Xc --- 8 unchanged lines hidden (view full) --- 184.Xr acl 9 . 185The syscalls between the internal interfaces and the public library 186routines may change over time, and as such are not documented. 187They are not intended to be called directly without going through the 188library. 189.Sh SEE ALSO 190.Xr getfacl 1 , 191.Xr setfacl 1 , | 213.Xr acl_to_text 3 , 214and may be used to generate a text-form of a POSIX.1e semantics ACL. 215.It Xo 216.Fn acl_valid , 217.Fn acl_valid_fd_np , 218.Fn acl_valid_file_np , 219.Fn acl_valid_link_np 220.Xc --- 8 unchanged lines hidden (view full) --- 229.Xr acl 9 . 230The syscalls between the internal interfaces and the public library 231routines may change over time, and as such are not documented. 232They are not intended to be called directly without going through the 233library. 234.Sh SEE ALSO 235.Xr getfacl 1 , 236.Xr setfacl 1 , |
237.Xr acl_add_flag_np 3 , |
|
192.Xr acl_add_perm 3 , 193.Xr acl_calc_mask 3 , | 238.Xr acl_add_perm 3 , 239.Xr acl_calc_mask 3 , |
240.Xr acl_clear_flags_np 3 , |
|
194.Xr acl_clear_perms 3 , 195.Xr acl_copy_entry 3 , 196.Xr acl_create_entry 3 , 197.Xr acl_delete_entry 3 , | 241.Xr acl_clear_perms 3 , 242.Xr acl_copy_entry 3 , 243.Xr acl_create_entry 3 , 244.Xr acl_delete_entry 3 , |
245.Xr acl_delete_flag_np 3 , |
|
198.Xr acl_delete_perm 3 , 199.Xr acl_dup 3 , 200.Xr acl_free 3 , 201.Xr acl_from_text 3 , 202.Xr acl_get 3 , | 246.Xr acl_delete_perm 3 , 247.Xr acl_dup 3 , 248.Xr acl_free 3 , 249.Xr acl_from_text 3 , 250.Xr acl_get 3 , |
251.Xr acl_get_entry_type_np 3 , 252.Xr acl_get_flagset_np 3 , |
|
203.Xr acl_get_permset 3 , 204.Xr acl_get_qualifier 3 , 205.Xr acl_get_tag_type 3 , 206.Xr acl_init 3 , | 253.Xr acl_get_permset 3 , 254.Xr acl_get_qualifier 3 , 255.Xr acl_get_tag_type 3 , 256.Xr acl_init 3 , |
257.Xr acl_is_trivial_np 3 , |
|
207.Xr acl_set 3 , | 258.Xr acl_set 3 , |
259.Xr acl_set_entry_type_np 3 , 260.Xr acl_set_flagset_np 3 , |
|
208.Xr acl_set_permset 3 , 209.Xr acl_set_qualifier 3 , 210.Xr acl_set_tag_type 3 , | 261.Xr acl_set_permset 3 , 262.Xr acl_set_qualifier 3 , 263.Xr acl_set_tag_type 3 , |
264.Xr acl_strip_np 3 , |
|
211.Xr acl_to_text 3 , 212.Xr acl_valid 3 , 213.Xr posix1e 3 , 214.Xr acl 9 215.Sh STANDARDS 216POSIX.1e assigns security labels to all objects, extending the security 217functionality described in POSIX.1. 218These additional labels provide fine-grained discretionary access control, --- 26 unchanged lines hidden --- | 265.Xr acl_to_text 3 , 266.Xr acl_valid 3 , 267.Xr posix1e 3 , 268.Xr acl 9 269.Sh STANDARDS 270POSIX.1e assigns security labels to all objects, extending the security 271functionality described in POSIX.1. 272These additional labels provide fine-grained discretionary access control, --- 26 unchanged lines hidden --- |