Deleted Added
full compact
acl.3 (108317) acl.3 (108410)
1.\"-
2.\" Copyright (c) 2000, 2001, 2002 Robert N. M. Watson
3.\" All rights reserved.
4.\"
1.\"-
2.\" Copyright (c) 2000, 2001, 2002 Robert N. M. Watson
3.\" All rights reserved.
4.\"
5.\" This software was developed by Robert Watson for the TrustedBSD Project.
6.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright
9.\" notice, this list of conditions and the following disclaimer.
10.\" 2. Redistributions in binary form must reproduce the above copyright
11.\" notice, this list of conditions and the following disclaimer in the
12.\" documentation and/or other materials provided with the distribution.

--- 5 unchanged lines hidden (view full) ---

18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions
9.\" are met:
10.\" 1. Redistributions of source code must retain the above copyright
11.\" notice, this list of conditions and the following disclaimer.
12.\" 2. Redistributions in binary form must reproduce the above copyright
13.\" notice, this list of conditions and the following disclaimer in the
14.\" documentation and/or other materials provided with the distribution.

--- 5 unchanged lines hidden (view full) ---

20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26.\" SUCH DAMAGE.
27.\"
26.\" $FreeBSD: head/lib/libc/posix1e/acl.3 108317 2002-12-27 12:15:40Z schweikh $
28.\" $FreeBSD: head/lib/libc/posix1e/acl.3 108410 2002-12-29 20:47:05Z rwatson $
27.\"
29.\"
28.Dd January 28, 2000
30.Dd December 18, 2002
29.Dt ACL 3
30.Os
31.Sh NAME
32.Nm acl
33.Nd introduction to the POSIX.1e ACL security API
34.Sh LIBRARY
35.Lb libc
36.Sh SYNOPSIS

--- 40 unchanged lines hidden (view full) ---

77.Xr acl_copy_entry 3 ,
78and may be used to copy the contents of an ACL entry.
79.It Fn acl_create_entry
80This function is described in
81.Xr acl_create_entry 3 ,
82and may be used to create an empty entry in an ACL.
83.It Xo
84.Fn acl_delete_def_file ,
31.Dt ACL 3
32.Os
33.Sh NAME
34.Nm acl
35.Nd introduction to the POSIX.1e ACL security API
36.Sh LIBRARY
37.Lb libc
38.Sh SYNOPSIS

--- 40 unchanged lines hidden (view full) ---

79.Xr acl_copy_entry 3 ,
80and may be used to copy the contents of an ACL entry.
81.It Fn acl_create_entry
82This function is described in
83.Xr acl_create_entry 3 ,
84and may be used to create an empty entry in an ACL.
85.It Xo
86.Fn acl_delete_def_file ,
87.Fn acl_delete_def_link_np ,
88.Fn acl_delete_fd_np ,
85.Fn acl_delete_file_np ,
89.Fn acl_delete_file_np ,
86.Fn acl_delete_fd_np
90.Fn acl_delete_link_np
87.Xc
88These functions are described in
89.Xr acl_delete 3 ,
90and may be used to delete ACLs from file system objects.
91.It Fn acl_delete_entry
92This function is described in
93.Xr acl_delete_entry 3 ,
94and may be used to delete an entry from an ACL.

--- 14 unchanged lines hidden (view full) ---

109.Xr acl_from_text 3 ,
110and may be used to convert a text-form ACL into working ACL state, if
111the ACL has POSIX.1e semantics.
112.It Fn acl_get_entry
113This function is described in
114.Xr acl_get_entry 3 ,
115and may be used to retrieve a designated ACL entry from an ACL.
116.It Xo
91.Xc
92These functions are described in
93.Xr acl_delete 3 ,
94and may be used to delete ACLs from file system objects.
95.It Fn acl_delete_entry
96This function is described in
97.Xr acl_delete_entry 3 ,
98and may be used to delete an entry from an ACL.

--- 14 unchanged lines hidden (view full) ---

113.Xr acl_from_text 3 ,
114and may be used to convert a text-form ACL into working ACL state, if
115the ACL has POSIX.1e semantics.
116.It Fn acl_get_entry
117This function is described in
118.Xr acl_get_entry 3 ,
119and may be used to retrieve a designated ACL entry from an ACL.
120.It Xo
117.Fn acl_get_file ,
118.Fn acl_get_fd ,
121.Fn acl_get_fd ,
119.Fn acl_get_fd_np
122.Fn acl_get_fd_np ,
123.Fn acl_get_file ,
124.Fn acl_get_link_np
120.Xc
121These functions are described in
122.Xr acl_get 3 ,
123and may be used to retrieve ACLs from file system objects.
124.It Fn acl_get_permset
125This function is described in
126.Xr acl_get_permset 3 ,
127and may be used to retrieve a permset from an ACL entry.

--- 5 unchanged lines hidden (view full) ---

133This function is described in
134.Xr acl_get_tag_type 3 ,
135and may be used to retrieve the tag type from an ACL entry.
136.It Fn acl_init
137This function is described in
138.Xr acl_init 3 ,
139and may be used to allocate a fresh (empty) ACL structure.
140.It Xo
125.Xc
126These functions are described in
127.Xr acl_get 3 ,
128and may be used to retrieve ACLs from file system objects.
129.It Fn acl_get_permset
130This function is described in
131.Xr acl_get_permset 3 ,
132and may be used to retrieve a permset from an ACL entry.

--- 5 unchanged lines hidden (view full) ---

138This function is described in
139.Xr acl_get_tag_type 3 ,
140and may be used to retrieve the tag type from an ACL entry.
141.It Fn acl_init
142This function is described in
143.Xr acl_init 3 ,
144and may be used to allocate a fresh (empty) ACL structure.
145.It Xo
141.Fn acl_set_file ,
142.Fn acl_set_fd ,
146.Fn acl_set_fd ,
143.Fn acl_set_fd_np
147.Fn acl_set_fd_np ,
148.Fn acl_set_file ,
149.Fn acl_set_link_np
144.Xc
145These functions are described in
146.Xr acl_set 3 ,
147and may be used to assign an ACL to a file system object.
148.It Fn acl_set_permset
149This function is described in
150.Xr acl_set_permset 3 ,
151and may be used to set the permissions of an ACL entry from a permset.

--- 6 unchanged lines hidden (view full) ---

158.Xr acl_set_tag_type 3 ,
159and may be used to set the tag type of an ACL.
160.It Fn acl_to_text
161This function is described in
162.Xr acl_to_text 3 ,
163and may be used to generate a text-form of a POSIX.1e semantics ACL.
164.It Xo
165.Fn acl_valid ,
150.Xc
151These functions are described in
152.Xr acl_set 3 ,
153and may be used to assign an ACL to a file system object.
154.It Fn acl_set_permset
155This function is described in
156.Xr acl_set_permset 3 ,
157and may be used to set the permissions of an ACL entry from a permset.

--- 6 unchanged lines hidden (view full) ---

164.Xr acl_set_tag_type 3 ,
165and may be used to set the tag type of an ACL.
166.It Fn acl_to_text
167This function is described in
168.Xr acl_to_text 3 ,
169and may be used to generate a text-form of a POSIX.1e semantics ACL.
170.It Xo
171.Fn acl_valid ,
172.Fn acl_valid_fd_np ,
166.Fn acl_valid_file_np ,
173.Fn acl_valid_file_np ,
167.Fn acl_valid_fd_np
174.Fn acl_valid_link_np
168.Xc
169These functions are described in
170.Xr acl_valid 3 ,
171and may be used to validate an ACL as correct POSIX.1e-semantics, or
172as appropriate for a particular file system object regardless of semantics.
173.El
174.Pp
175Documentation of the internal kernel interfaces backing these calls may

--- 61 unchanged lines hidden ---
175.Xc
176These functions are described in
177.Xr acl_valid 3 ,
178and may be used to validate an ACL as correct POSIX.1e-semantics, or
179as appropriate for a particular file system object regardless of semantics.
180.El
181.Pp
182Documentation of the internal kernel interfaces backing these calls may

--- 61 unchanged lines hidden ---