/freebsd-12-stable/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus-wpa_supplicant.conf | 13 <deny own="fi.w1.wpa_supplicant1"/> 14 <deny send_destination="fi.w1.wpa_supplicant1"/> 15 <deny receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
|
/freebsd-12-stable/release/picobsd/floppy.tree/etc/ppp/ |
H A D | ppp.conf | 8 deny lqr
|
/freebsd-12-stable/etc/ |
H A D | rc.firewall | 86 ${fwcmd} add 200 deny all from any to 127.0.0.0/8 87 ${fwcmd} add 300 deny ip from 127.0.0.0/8 to any 89 ${fwcmd} add 400 deny all from any to ::1 90 ${fwcmd} add 500 deny all from ::1 to any 248 ${fwcmd} add deny tcp from any to any setup 292 ${fwcmd} add deny all from ${inet} to any in via ${oif} 293 ${fwcmd} add deny all from ${onet} to any in via ${iif} 295 ${fwcmd} add deny all from ${inet6} to any in via ${oif6} 297 ${fwcmd} add deny all from ${onet6} to any in \ 318 ${fwcmd} add deny al [all...] |
/freebsd-12-stable/crypto/openssh/regress/ |
H A D | allow-deny-users.sh | 3 # $OpenBSD: allow-deny-users.sh,v 1.5 2018/07/13 02:13:50 djm Exp $ 17 deny="$1" 23 echo DenyUsers="$deny" >> $OBJ/sshd_proxy 26 start_sshd -oDenyUsers="$deny" -oAllowUsers="$allow"
|
H A D | Makefile | 86 allow-deny-users \
|
/freebsd-12-stable/tools/tools/tinybsd/conf/firewall/etc/ |
H A D | rc.firewall | 85 ${fwcmd} add 200 deny all from any to 127.0.0.0/8 86 ${fwcmd} add 300 deny ip from 127.0.0.0/8 to any 177 ${fwcmd} add deny tcp from any to any setup 212 ${fwcmd} add deny all from ${inet}:${imask} to any in via ${oif} 213 ${fwcmd} add deny all from ${onet}:${omask} to any in via ${iif} 216 ${fwcmd} add deny all from any to 10.0.0.0/8 via ${oif} 217 ${fwcmd} add deny all from any to 172.16.0.0/12 via ${oif} 218 ${fwcmd} add deny all from any to 192.168.0.0/16 via ${oif} 223 ${fwcmd} add deny all from any to 0.0.0.0/8 via ${oif} 224 ${fwcmd} add deny al [all...] |
/freebsd-12-stable/tools/tools/tinybsd/conf/wireless/etc/ |
H A D | rc.firewall | 85 ${fwcmd} add 200 deny all from any to 127.0.0.0/8 86 ${fwcmd} add 300 deny ip from 127.0.0.0/8 to any 177 ${fwcmd} add deny tcp from any to any setup 212 ${fwcmd} add deny all from ${inet}:${imask} to any in via ${oif} 213 ${fwcmd} add deny all from ${onet}:${omask} to any in via ${iif} 216 ${fwcmd} add deny all from any to 10.0.0.0/8 via ${oif} 217 ${fwcmd} add deny all from any to 172.16.0.0/12 via ${oif} 218 ${fwcmd} add deny all from any to 192.168.0.0/16 via ${oif} 223 ${fwcmd} add deny all from any to 0.0.0.0/8 via ${oif} 224 ${fwcmd} add deny al [all...] |
/freebsd-12-stable/contrib/pjdfstest/tests/granular/ |
H A D | 02.t | 26 expect 0 prependacl ${n0} user:65534:read_acl::deny 108 # ACL and file mode, even if ACL_{READ,WRITE}_ACL would deny it. 111 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:write_acl::deny 112 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:read_acl::deny 119 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:write_acl::deny 120 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:read_acl::deny 128 expect 0 prependacl ${n0} everyone@:write_acl::deny 129 expect 0 prependacl ${n0} everyone@:read_acl::deny 136 expect 0 prependacl ${n0} everyone@:write_acl::deny 137 expect 0 prependacl ${n0} everyone@:read_acl::deny [all...] |
H A D | 03.t | 32 expect 0 prependacl . user:65534:write_data::deny 45 expect 0 prependacl . user:65534:write_data::deny 53 expect 0 prependacl ${n0} user:65534:delete::deny 64 expect 0 prependacl . user:65534:delete_child::deny 73 # DELETE_CHILD does not deny moving file from elsewhere 101 expect 0 prependacl . user:65534:write_data::deny 102 expect 0 prependacl . user:65534:delete_child::deny 131 expect 0 prependacl ${n0} user:65534:delete::deny
|
H A D | 05.t | 32 expect 0 prependacl . user:65534:write_data::deny 48 expect 0 prependacl . user:65534:write_data::deny 57 expect 0 prependacl ${n0} user:65534:delete::deny 68 expect 0 prependacl . user:65534:delete_child::deny 78 # DELETE_CHILD does not deny moving directory from elsewhere 107 expect 0 prependacl . user:65534:write_data::deny 108 expect 0 prependacl . user:65534:delete_child::deny 146 expect 0 prependacl ${n0} user:65534:delete::deny
|
H A D | 01.t | 26 expect 0 prependacl ${n0} user:65534:read_attributes::deny
|
H A D | 00.t | 39 expect 0 prependacl . user:65534:write_data::allow,user:65534:append_data::deny 75 expect 0 prependacl . user:65534:write_data::deny,user:65534:append_data::allow
|
/freebsd-12-stable/tests/sys/cddl/zfs/tests/acl/nontrivial/ |
H A D | zfs_acl_chmod_001_neg.ksh | 76 log_mustnot usr_exec $CHMOD A+ asd owner@:execute:deny $node 81 log_mustnot usr_exec $CHMOD A+$tp:read_data:deny $node
|
H A D | zfs_acl_chmod_rwx_003_pos.ksh | 46 # 2. Separated verify type@:access:allow|deny to file and directory 47 # 3. To super user, read and write deny was override. 82 # To super user, read and write deny permission was override. 88 elif [[ $acl_spec == *:deny ]]; then 124 for tp in allow deny; do
|
H A D | zfs_acl_chmod_rwacl_001_pos.ksh | 47 # 2. Verify owner always can read and write acl, even deny. 51 # 5. Verify everyone@ was deny except specificied user, this user can read 53 # 6. Verify the group was deny except specified user, this user can read 128 for acc in allow deny; do 153 log_must usr_exec $CHMOD A0+group@:read_acl/write_acl:deny $node 164 for flag in allow deny; do 185 log_must usr_exec $CHMOD A0+everyone@:read_acl/write_acl:deny $node 207 log_must usr_exec $CHMOD A0+everyone@:read_acl/write_acl:deny $node 225 A0+group:$ZFS_ACL_OTHER_GROUP:read_acl/write_acl:deny $node
|
H A D | zfs_acl_cp_001_pos.ksh | 98 A0+user:$ZFS_ACL_OTHER1:read_acl:deny $obj
|
H A D | zfs_acl_chmod_compact_001_pos.ksh | 71 set -A a_type allow deny 127 # $5 ACE type which is allow or deny 234 log_must $CHMOD A0+user:$ZFS_ACL_OTHER1:execute:deny \
|
H A D | zfs_acl_chmod_rwx_002_pos.ksh | 70 set -A a_type allow deny 118 # $3 ACE type which is allow or deny 133 elif [[ $acl_type == "deny" ]]; then 218 log_must $CHMOD A0+user:$ZFS_ACL_OTHER1:execute:deny \
|
H A D | zfs_acl_cp_002_pos.ksh | 103 A0+user:$ZFS_ACL_OTHER1:read_acl:deny $obj
|
H A D | zfs_acl_chmod_rwx_004_pos.ksh | 72 # When everyone@ were deny, this file can't execute. 98 rflag=deny 131 set -A a_flag "allow" "deny"
|
H A D | zfs_acl_chmod_aclmode_001_pos.ksh | 124 # $4 ACE type which is allow or deny 351 expect1=$prefix:$priv:deny 450 acl=$acl:deny
|
/freebsd-12-stable/usr.sbin/cron/lib/ |
H A D | misc.c | 352 FILE *allow, *deny; local 357 deny = NULL; 361 if ((deny = fopen(DENY_FILE, "r")) == NULL && errno != ENOENT) 363 Debug(DMISC, ("allow/deny enabled, %d/%d\n", !!allow, !!deny)) 370 else if (deny) 371 isallowed = !in_file(username, deny); 381 if (deny) 382 fclose(deny);
|
/freebsd-12-stable/usr.sbin/rpcbind/ |
H A D | security.c | 248 goto deny; 254 goto deny; 262 goto deny; 269 goto deny; 278 deny:
|
/freebsd-12-stable/tests/sys/cddl/zfs/tests/acl/cifs/ |
H A D | cifs_attr_001_pos.ksh | 152 # To increase the coverage, here we set 'deny' against 157 log_must chmod A+user:root:write_attributes:deny $object 160 log_must chmod A+owner@:write_attributes:deny $object 162 log_must chmod A+user:$user:write_attributes:deny \
|
/freebsd-12-stable/sys/cddl/contrib/opensolaris/common/acl/ |
H A D | acl_common.c | 435 ace_make_deny(ace_t *allow, ace_t *deny, int isdir, int isowner) argument 437 (void) memcpy(deny, allow, sizeof (ace_t)); 439 deny->a_who = allow->a_who; 441 deny->a_type = ACE_ACCESS_DENIED_ACE_TYPE; 442 deny->a_access_mask ^= ACE_POSIX_SUPPORTED_BITS; 444 deny->a_access_mask ^= ACE_DELETE_CHILD; 446 deny->a_access_mask &= ~(ACE_SYNCHRONIZE | ACE_WRITE_OWNER | 449 deny->a_access_mask |= access_mask_set((allow->a_access_mask & 523 /* allow + deny for each aclent */ 527 * stick extra deny o [all...] |