/macosx-10.10.1/bind9-45.101/bind9/lib/dns/include/dns/ |
H A D | view.h | 74 #include <dns/acl.h>
|
/macosx-10.10.1/Heimdal-398.1.2/lib/heimcred/ |
H A D | server.m | 370 CFArrayRef acl = CFDictionaryGetValue(attrs, kHEIMAttrBundleIdentifierACL); 371 if (acl == NULL || CFGetTypeID(acl) != CFArrayGetTypeID()) 374 if (!CFArrayContainsValue(acl, CFRangeMake(0, CFArrayGetCount(acl)), peer->bundleID)) { 375 CFMutableArrayRef a = CFArrayCreateMutableCopy(NULL, 0, acl);
|
/macosx-10.10.1/SecurityTokend-55108/lib/ |
H A D | transition.cpp | 524 COPY_IN(AclEntryInput, acl)) 528 relocate(acl, aclBase); 529 AclEdit edit(mode, handle, acl);
|
/macosx-10.10.1/SecurityTokend-55108/security_tokend_client/ |
H A D | transition.cpp | 524 COPY_IN(AclEntryInput, acl)) 528 relocate(acl, aclBase); 529 AclEdit edit(mode, handle, acl);
|
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/win32/ |
H A D | libdns.mak | 124 -@erase "$(INTDIR)\acl.obj"
260 "$(INTDIR)\acl.obj" \
376 -@erase "$(INTDIR)\acl.obj"
377 -@erase "$(INTDIR)\acl.sbr"
596 "$(INTDIR)\acl.sbr" \
691 "$(INTDIR)\acl.obj" \
813 SOURCE=..\acl.c
818 "$(INTDIR)\acl.obj" : $(SOURCE) "$(INTDIR)"
825 "$(INTDIR)\acl.obj" "$(INTDIR)\acl [all...] |
/macosx-10.10.1/syslog-267/libsystem_asl.tproj/src/ |
H A D | asl_file.c | 37 #include <sys/acl.h> 296 acl_t acl; 309 acl = acl_init(1); 316 status = acl_create_entry_np(&acl, &entry, ACL_FIRST_ENTRY); 337 status = acl_create_entry_np(&acl, &entry, ACL_FIRST_ENTRY); 356 status = acl_set_fd(fd, acl); 366 acl_free(acl);
|
/macosx-10.10.1/emacs-93/emacs/lisp/gnus/ |
H A D | imap.el | 54 ;; imap-mailbox-acl-get, imap-mailbox-acl-set, imap-mailbox-acl-delete 1418 (defun imap-mailbox-acl-get (&optional mailbox buffer) 1426 (imap-mailbox-get-1 'acl (or mailbox imap-current-mailbox)))))) 1428 (defun imap-mailbox-acl-set (identifier rights &optional mailbox buffer) 1440 (defun imap-mailbox-acl-delete (identifier &optional mailbox buffer) 2115 (ACL (imap-parse-acl)) 2433 (defun imap-parse-acl () 2435 identifier rights acl) [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/securityd_client/ |
H A D | transition.cpp | 674 const AccessCredentials *cred, const AclEntryInput *acl, 681 CopyIn proto(acl ? &acl->proto() : NULL, reinterpret_cast<xdrproc_t>(xdr_CSSM_ACL_ENTRY_PROTOTYPE)); 671 unwrapKey(DbHandle db, const Context &context, KeyHandle key, KeyHandle publicKey, const CssmWrappedKey &wrappedKey, uint32 usage, uint32 attr, const AccessCredentials *cred, const AclEntryInput *acl, CssmData &descriptiveData, KeyHandle &newKey, CssmKey::Header &newHeader, Allocator &alloc) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurityd/lib/ |
H A D | transition.cpp | 674 const AccessCredentials *cred, const AclEntryInput *acl, 681 CopyIn proto(acl ? &acl->proto() : NULL, reinterpret_cast<xdrproc_t>(xdr_CSSM_ACL_ENTRY_PROTOTYPE)); 671 unwrapKey(DbHandle db, const Context &context, KeyHandle key, KeyHandle publicKey, const CssmWrappedKey &wrappedKey, uint32 usage, uint32 attr, const AccessCredentials *cred, const AclEntryInput *acl, CssmData &descriptiveData, KeyHandle &newKey, CssmKey::Header &newHeader, Allocator &alloc) argument
|
/macosx-10.10.1/xnu-2782.1.97/security/ |
H A D | mac_vfs.c | 1126 struct acl *acl) 1136 MAC_CHECK(vnode_check_setacl, cred, vp, vp->v_label, type, acl);
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/xdr_rpc/Reference/ |
H A D | transition.cpp | 870 COPY_IN(AclEntryInput, acl)) 874 relocate(acl, aclBase, aclLength); 876 sds.writeAclEntryInput(acl, aclLength); 877 Server::aclBearer(kind, key).changeAcl(AclEdit(mode, handle, acl), cred);
|
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | server.cpp | 170 if (kind != bearer.acl().aclKind())
|
H A D | tokendatabase.cpp | 179 SecurityServerAcl &TokenDatabase::acl() function in class:TokenDatabase
|
/macosx-10.10.1/libarchive-30/libarchive/ |
H A D | CMakeLists.txt | 213 LA_CHECK_INCLUDE_FILE("acl/libacl.h" HAVE_ACL_LIBACL_H) 240 LA_CHECK_INCLUDE_FILE("sys/acl.h" HAVE_SYS_ACL_H) 671 # platforms. Worse, some systems have completely non-POSIX acl functions, 675 CHECK_LIBRARY_EXISTS(acl "acl_get_file" "" HAVE_ACL_LIB) 677 SET(CMAKE_REQUIRED_LIBRARIES "acl") 678 FIND_LIBRARY(ACL_LIBRARY NAMES acl) 699 # MacOS has an acl.h that isn't POSIX. It can be detected by
|
/macosx-10.10.1/vim-55/runtime/syntax/ |
H A D | samba.vim | 30 syn keyword sambaKeyword contained account acl action add address admin aliases
|
/macosx-10.10.1/Heimdal-398.1.2/kdc/ |
H A D | krb5tgs.c | 515 const HDB_Ext_Constrained_delegation_acl *acl; local 541 ret = hdb_entry_get_ConstrainedDelegACL(&client->entry, &acl); 547 if (acl) { 548 for (i = 0; i < acl->len; i++) { 549 if (krb5_principal_compare(context, target, &acl->val[i]) == TRUE)
|
/macosx-10.10.1/vim-55/src/ |
H A D | os_unix.c | 2661 # include <sys/acl.h> 2746 if ((aclent->acl_cnt = acl((char *)fname, GETACLCNT, 0, NULL)) < 0) 2752 if (acl((char *)fname, GETACL, aclent->acl_cnt, aclent->acl_entry) < 0) 2762 struct acl *aclent; 2764 aclsize = sizeof(struct acl); 2792 * Set the ACL of file "fname" to "acl" (unless it's NULL). 2805 acl((char *)fname, SETACL, ((vim_acl_solaris_T *)aclent)->acl_cnt, 2809 chacl((char *)fname, aclent, ((struct acl *)aclent)->acl_len);
|
H A D | fileio.c | 3213 vim_acl_T acl = NULL; /* ACL copied from original file to local 3667 acl = mch_get_acl(fname); 4052 mch_set_acl(backup, acl); 4764 mch_set_acl(wfname, acl); 5059 mch_free_acl(acl); 6552 vim_acl_T acl; /* ACL from original file */ local 6668 acl = mch_get_acl(from); 6674 mch_free_acl(acl); 6686 mch_free_acl(acl); 6697 mch_free_acl(acl); [all...] |
H A D | undo.c | 1537 vim_acl_T acl; local 1540 acl = mch_get_acl(buf->b_ffname); 1541 mch_set_acl(file_name, acl);
|
H A D | os_win32.c | 2788 * Set the ACL of file "fname" to "acl" (unless it's NULL). 2790 * This must only be called with "acl" equal to what mch_get_acl() returned. 2793 mch_set_acl(char_u *fname, vim_acl_T acl) argument 2796 struct my_acl *p = (struct my_acl *)acl; 2816 mch_free_acl(vim_acl_T acl) argument 2819 struct my_acl *p = (struct my_acl *)acl;
|
/macosx-10.10.1/xnu-2782.1.97/bsd/nfs/ |
H A D | nfs_subs.c | 1380 kauth_acl_t acl; local 1455 acl = npnvap->nva_acl; 1531 /* make a copy of the acl for the cache */ 1542 if (acl) { 1543 kauth_acl_free(acl); 1544 acl = NULL; 1554 npnvap->nva_acl = acl;
|
/macosx-10.10.1/xnu-2782.1.97/bsd/vfs/ |
H A D | kpi_vfs.c | 1962 * Get a filesec and optional acl contents from an extended attribute. 2105 * Set a filesec and optional acl contents into an extended attribute. 2107 * write to a named extended attribute (KAUTH_FILESEC_XATTR). The 'acl' 2109 * original caller supplied an acl. 2113 * acl The acl to be associated with 'fsec'. 2120 * Notes: Both the fsec and the acl are always valid. 2123 * as are the acl contents, if they are used. Internally, we will 2136 vnode_set_filesec(vnode_t vp, kauth_filesec_t fsec, kauth_acl_t acl, vfs_context_t ctx) argument 2153 saved_acl_copysize = KAUTH_ACL_COPYSIZE(acl); [all...] |
/macosx-10.10.1/bind9-45.101/bind9/bin/named/ |
H A D | update.c | 327 * Override the default acl logging when checking whether a client 332 * 'slave' indicates if this is a slave zone. If 'acl' is NULL then 334 * If the zone has no access controls configured ('acl' == NULL && 341 checkupdateacl(ns_client_t *client, dns_acl_t *acl, const char *message, argument 351 if (slave && acl == NULL) { 356 result = ns_client_checkaclsilent(client, NULL, acl, ISC_FALSE); 360 } else if (acl == NULL && !has_ssutable) {
|
/macosx-10.10.1/xar-254/xar/lib/ |
H A D | stat.c | 67 #include <sys/acl.h> 131 if( !xar_check_prop(x, "acl") ) 139 /* If the acl is empty, or not valid, skip it */ 145 xar_prop_set(f, "acl/default", t); 157 /* If the acl is empty, or not valid, skip it */ 163 xar_prop_set(f, "acl/access", t); 174 if( !xar_check_prop(x, "acl") ) 185 xar_prop_set(f, "acl/appleextended", t); 208 xar_prop_get(f, "acl/default", &t); 214 xar_err_set_string(x, "Error extracting default acl fro [all...] |
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/ |
H A D | zone.c | 42 #include <dns/acl.h> 10993 dns_zone_setnotifyacl(dns_zone_t *zone, dns_acl_t *acl) { argument 11000 dns_acl_attach(acl, &zone->notify_acl); 11005 dns_zone_setqueryacl(dns_zone_t *zone, dns_acl_t *acl) { argument 11012 dns_acl_attach(acl, &zone->query_acl); 11017 dns_zone_setqueryonacl(dns_zone_t *zone, dns_acl_t *acl) { argument 11024 dns_acl_attach(acl, &zone->queryon_acl); 11029 dns_zone_setupdateacl(dns_zone_t *zone, dns_acl_t *acl) { argument 11036 dns_acl_attach(acl, &zone->update_acl); 11041 dns_zone_setforwardacl(dns_zone_t *zone, dns_acl_t *acl) { argument 11053 dns_zone_setxfracl(dns_zone_t *zone, dns_acl_t *acl) argument [all...] |