/macosx-10.10.1/bind9-45.101/bind9/bin/named/include/named/ |
H A D | listenlist.h | 49 dns_acl_t * acl; member in struct:ns_listenelt 65 dns_acl_t *acl, ns_listenelt_t **target);
|
H A D | sortlist.h | 45 ns_sortlist_setup(dns_acl_t *acl, isc_netaddr_t *clientaddr, 48 * Find the sortlist statement in 'acl' that applies to 'clientaddr', if any. 80 * Find the sortlist statement in 'acl' that applies to 'clientaddr', if any.
|
/macosx-10.10.1/file_cmds-242/ls/ |
H A D | ls.h | 70 #include <sys/acl.h> 98 acl_t acl; /* f_acl */ member in struct:__anon8661
|
/macosx-10.10.1/ruby-106/ruby/sample/drb/ |
H A D | drbs-acl.rb | 22 require 'acl' 41 acl = ACL.new(%w(deny all 45 DRb.install_acl(acl)
|
/macosx-10.10.1/KerberosHelper-151/Source/ |
H A D | lkdc_acl.c | 41 * Create ACL, XXX should add acl, not modify ACL. 142 SecACLRef acl; local 159 acl = (SecACLRef)CFArrayGetValueAtIndex(aclList, i); 166 ret = SecACLCopySimpleContents(acl, &apps, &description, &prompt); 175 SecACLRemove(acl); 220 SecACLRef acl; local 224 * Check if we are already on the acl list 228 printf("%s already in acl\n", trustedAppName); 233 * Add new acl entry for our trusted app 248 CFSTR("lkdc-acl"), 292 SecACLRef acl; local 326 SecACLRef acl; local [all...] |
/macosx-10.10.1/Libc-1044.1.2/posix1e/ |
H A D | acl_translate.c | 26 #include <sys/acl.h> 53 acl_copy_ext(void *buf, acl_t acl, ssize_t size) argument 60 reqsize = acl_size(acl); 72 if (acl == (acl_t)_FILESEC_REMOVE_ACL) { 78 ext->fsec_entrycount = OSSwapHostToBigInt32(acl->a_entries); 79 ext->fsec_flags = OSSwapHostToBigInt32(acl->a_flags); 82 for (i = 0; i < acl->a_entries; i++) { 84 ext->fsec_ace[i].ace_applicable = acl->a_ace[i].ae_applicable; 86 OSSwapHostToBigInt32((acl->a_ace[i].ae_tag & KAUTH_ACE_KINDMASK) | (acl 97 acl_copy_ext_native(void *buf, acl_t acl, ssize_t size) argument 598 acl_to_text(acl_t acl, ssize_t *len_p) argument 715 acl_size(acl_t acl) argument [all...] |
/macosx-10.10.1/bind9-45.101/bind9/bin/named/ |
H A D | sortlist.c | 27 #include <dns/acl.h> 35 ns_sortlist_setup(dns_acl_t *acl, isc_netaddr_t *clientaddr, argument 40 if (acl == NULL) 43 for (i = 0; i < acl->length; i++) { 48 dns_aclelement_t *e = &acl->elements[i];
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | Access.cpp | 153 convert(const SecPointer<ACL> &acl) argument 155 return *acl; 246 AclEntryInfo *aclp = acls; // -> next unfilled acl element 248 SecPointer<ACL> acl = it->second; local 249 if (acl->isOwner()) { 250 acl->copyAclOwner(owner, alloc); 252 aclp->handle() = acl->entryHandle(); 253 acl->copyAclEntry(*aclp, alloc); 274 ACL *acl = it->second; local 275 switch (acl 332 const AclEntryInfo *acl = AclEntryInfo::overlay(acls); local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | Access.cpp | 153 convert(const SecPointer<ACL> &acl) argument 155 return *acl; 246 AclEntryInfo *aclp = acls; // -> next unfilled acl element 248 SecPointer<ACL> acl = it->second; local 249 if (acl->isOwner()) { 250 acl->copyAclOwner(owner, alloc); 252 aclp->handle() = acl->entryHandle(); 253 acl->copyAclEntry(*aclp, alloc); 274 ACL *acl = it->second; local 275 switch (acl 332 const AclEntryInfo *acl = AclEntryInfo::overlay(acls); local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | Access.cpp | 153 convert(const SecPointer<ACL> &acl) argument 155 return *acl; 246 AclEntryInfo *aclp = acls; // -> next unfilled acl element 248 SecPointer<ACL> acl = it->second; local 249 if (acl->isOwner()) { 250 acl->copyAclOwner(owner, alloc); 252 aclp->handle() = acl->entryHandle(); 253 acl->copyAclEntry(*aclp, alloc); 274 ACL *acl = it->second; local 275 switch (acl 332 const AclEntryInfo *acl = AclEntryInfo::overlay(acls); local [all...] |
/macosx-10.10.1/libarchive-30/libarchive/libarchive/ |
H A D | archive_read_disk_entry_from_file.c | 30 /* Mac OSX requires sys/types.h before sys/acl.h. */ 34 #include <sys/acl.h> 49 #include <acl/libacl.h> 190 struct archive_entry *entry, acl_t acl, int archive_entry_acl_type); 197 acl_t acl; local 207 acl = acl_get_fd(fd); 210 acl = acl_get_link_np(accpath, ACL_TYPE_ACCESS); 216 acl = NULL; 219 acl = acl_get_file(accpath, ACL_TYPE_ACCESS); 220 if (acl ! 242 setup_acl_posix1e(struct archive_read_disk *a, struct archive_entry *entry, acl_t acl, int archive_entry_acl_type) argument [all...] |
/macosx-10.10.1/file_cmds-242/cp/ |
H A D | utils.c | 39 #include <sys/acl.h> 423 struct acl *aclp; 424 acl_t acl; local 429 acl = acl_get_fd(source_fd); 430 if (acl == NULL) { 431 warn("failed to get acl entries while setting %s", to.p_path); 434 aclp = &acl->ats_acl; 437 if (acl_set_fd(dest_fd, acl) < 0) { 438 warn("failed to set acl entries for %s", to.p_path); 449 struct acl *acl 450 acl_t acl; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_utilities/ |
H A D | muscle++.h | 112 virtual const ACL &acl() const = 0; 113 virtual ACL &acl() = 0; 131 const ACL &acl() const; 132 ACL &acl(); 147 const ACL &acl() const; 148 ACL &acl();
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_utilities/lib/ |
H A D | muscle++.h | 112 virtual const ACL &acl() const = 0; 113 virtual ACL &acl() = 0; 131 const ACL &acl() const; 132 ACL &acl(); 147 const ACL &acl() const; 148 ACL &acl();
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/tests/data/ |
H A D | slapd-syncrepl-multiproxy.conf | 62 acl-bind bindmethod=simple 86 acl-bind bindmethod=simple
|
H A D | slapd-syncrepl-slave-persist-ldap.conf | 53 acl-bind bindmethod=simple
|
H A D | slapd-translucent-local.conf | 62 acl-bind binddn="uid=binder,o=translucent" credentials="bindtest"
|
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | tokenkey.h | 53 SecurityServerAcl &acl();
|
H A D | kckey.cpp | 125 acl().importBlob(publicAcl, privateAcl); 152 acl().exportBlob(pubAcl, privAcl); 166 acl().allocator.free(pubAcl); 167 acl().allocator.free(privAcl); 225 SecurityServerAcl &KeychainKey::acl() function in class:KeychainKey
|
/macosx-10.10.1/cups-408/cups/scheduler/ |
H A D | policy.c | 366 char *acl; /* Current ACL user/group */ local 368 for (acl = (char *)cupsArrayFirst(printer->users); 369 acl; 370 acl = (char *)cupsArrayNext(printer->users)) 372 if (acl[0] == '@') 378 if (cupsdCheckGroup(username, pw, acl + 1)) 381 else if (acl[0] == '#') 387 if (cupsdCheckGroup(username, pw, acl)) 390 else if (!_cups_strcasecmp(username, acl))
|
/macosx-10.10.1/libarchive-30/libarchive/libarchive/test/ |
H A D | test_acl_basic.c | 93 acl_match(struct acl_t *acl, int type, int permset, int tag, int qual, const char *name) argument 95 if (type != acl->type) 97 if (permset != acl->permset) 99 if (tag != acl->tag) 107 if (qual != acl->qual) 110 if (acl->name == NULL || acl->name[0] == '\0') 113 if (acl->name == NULL) { 117 return (0 == strcmp(name, acl->name));
|
H A D | test_acl_pax.c | 319 acl_match(struct acl_t *acl, int type, int permset, int tag, int qual, const char *name) argument 321 if (type != acl->type) 323 if (permset != acl->permset) 325 if (tag != acl->tag) 333 if (qual != acl->qual) 336 return (acl->name == NULL || acl->name[0] == '\0'); 337 if (acl->name == NULL) 339 return (0 == strcmp(name, acl->name));
|
/macosx-10.10.1/ruby-106/ruby/lib/drb/ |
H A D | acl.rb | 3 # acl.rb is copyrighted free software by Masatoshi SEKI. 27 # acl = ACL.new 28 # p acl.allow_addr?(addr) # => true 30 # acl = ACL.new(list, ACL::DENY_ALLOW) 31 # p acl.allow_addr?(addr) # => true 244 acl = ACL.new 245 p acl.allow_addr?(addr) 247 acl = ACL.new(list, ACL::DENY_ALLOW) 248 p acl.allow_addr?(addr)
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/xdr_rpc/ |
H A D | securityd_data_saver.cpp | 72 SecuritydDataSave::writeAclEntryInput(AclEntryInput *acl, argument 80 uint32_t ptrsize = sizeof(acl); 82 writeAll(&acl, ptrsize); 84 writeAll(acl, aclLength); 194 COPY_IN(AclEntryInput, acl)) 198 relocate(acl, aclBase, aclLength); 200 sds.writeAclEntryInput(acl, aclLength); 201 Server::aclBearer(kind, key).changeAcl(AclEdit(mode, handle, acl), cred);
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/acl/ns2/ |
H A D | named4.conf | 47 acl rejectkeys { 51 acl rejectaddrs { 55 acl check1 { !key one; 10.53.0.1; }; 57 acl check2 { !key two; 10.53.0.2; };
|