/macosx-10.9.5/bind9-45.100/bind9/lib/isccfg/ |
H A D | aclconf.c | 76 dns_acl_t *dacl, *next; local 85 for (dacl = ISC_LIST_HEAD(actx->named_acl_cache); 86 dacl != NULL; 87 dacl = next) 89 next = ISC_LIST_NEXT(dacl, nextincache); 90 ISC_LIST_UNLINK(actx->named_acl_cache, dacl, 92 dns_acl_detach(&dacl); 135 dns_acl_t *dacl; local 140 for (dacl = ISC_LIST_HEAD(ctx->named_acl_cache); 141 dacl ! 275 dns_acl_t *dacl = NULL, *inneracl = NULL; local [all...] |
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/ |
H A D | acl.c | 448 destroy(dns_acl_t *dacl) { argument 451 INSIST(!ISC_LINK_LINKED(dacl, nextincache)); 453 for (i = 0; i < dacl->length; i++) { 454 dns_aclelement_t *de = &dacl->elements[i]; 456 dns_name_free(&de->keyname, dacl->mctx); 461 if (dacl->elements != NULL) 462 isc_mem_put(dacl->mctx, dacl->elements, 463 dacl->alloc * sizeof(dns_aclelement_t)); 464 if (dacl [all...] |
/macosx-10.9.5/ntfs-83/kext/ |
H A D | ntfs_secure.c | 97 ACL *dacl; local 108 sd->dacl = const_cpu_to_le32(sizeof(SECURITY_DESCRIPTOR_RELATIVE)); 114 dacl = (ACL*)((u8*)sd + le32_to_cpu(sd->dacl)); 115 dacl->revision = ACL_REVISION; 116 dacl->ace_count = const_cpu_to_le16(1); 117 ace = (ACCESS_ALLOWED_ACE*)((u8*)dacl + sizeof(ACL)); 141 dacl->size = const_cpu_to_le16(sizeof(ACL) + le16_to_cpu(ace->size)); 143 sd->owner = cpu_to_le32(le32_to_cpu(sd->dacl) + 144 le16_to_cpu(dacl [all...] |
H A D | ntfs_layout.h | 1726 * as the sacl and dacl ACLs inside the security descriptor itself. 1743 le32 dacl; /* Byte offset to a discretionary ACL. Only valid, if member in struct:__anon11307 1745 SE_DACL_PRESENT is set but dacl is NULL, a NULL ACL 1752 * the sacl and dacl ACLs inside the security descriptor. Instead, it contains 1772 ACL *dacl; /* Points to a discretionary ACL. Only valid, if member in struct:__anon11308 1774 SE_DACL_PRESENT is set but dacl is NULL, a NULL ACL
|
/macosx-10.9.5/apache-786.1/httpd/srclib/apr/file_io/win32/ |
H A D | filestat.c | 91 static void resolve_prot(apr_finfo_t *finfo, apr_int32_t wanted, PACL dacl) argument 114 if (GetEffectiveRightsFromAclW(dacl, &ident, &acc) == ERROR_SUCCESS) { 127 if (GetEffectiveRightsFromAclW(dacl, &ident, &acc) == ERROR_SUCCESS) { 135 if (GetEffectiveRightsFromAclW(dacl, &ident, &acc) == ERROR_SUCCESS) { 217 PACL dacl = NULL; local 251 ((wanted & APR_FINFO_PROT) ? &dacl : NULL), 261 ((wanted & APR_FINFO_PROT) ? &dacl : NULL), 268 ((wanted & APR_FINFO_PROT) ? &dacl : NULL), 276 user = grp = dacl = NULL; 288 if (dacl) { [all...] |
/macosx-10.9.5/apr-30/apr/apr/file_io/win32/ |
H A D | filestat.c | 91 static void resolve_prot(apr_finfo_t *finfo, apr_int32_t wanted, PACL dacl) argument 114 if (GetEffectiveRightsFromAclW(dacl, &ident, &acc) == ERROR_SUCCESS) { 127 if (GetEffectiveRightsFromAclW(dacl, &ident, &acc) == ERROR_SUCCESS) { 135 if (GetEffectiveRightsFromAclW(dacl, &ident, &acc) == ERROR_SUCCESS) { 217 PACL dacl = NULL; local 251 ((wanted & APR_FINFO_PROT) ? &dacl : NULL), 261 ((wanted & APR_FINFO_PROT) ? &dacl : NULL), 268 ((wanted & APR_FINFO_PROT) ? &dacl : NULL), 276 user = grp = dacl = NULL; 288 if (dacl) { [all...] |
/macosx-10.9.5/smb-697.95.1/kernel/smbfs/ |
H A D | smbfs_subr_2.h | 108 struct ntacl *sacl, struct ntacl *dacl, 114 struct ntacl *sacl, struct ntacl *dacl,
|
H A D | smbfs_subr.h | 288 struct ntsid *group, struct ntacl *sacl, struct ntacl *dacl,
|
H A D | smbfs_smb_2.c | 5826 struct ntacl *sacl, struct ntacl *dacl, 5841 sec_info.dacl = dacl; 5876 struct ntacl *sacl, struct ntacl *dacl, 5885 sacl, dacl, 5890 owner, group, sacl, dacl, context); 5822 smb2fs_smb_security_set(struct smb_share *share, struct smbnode *np, uint32_t desired_access, uint32_t security_attrs, uint16_t control_flags, struct ntsid *owner, struct ntsid *group, struct ntacl *sacl, struct ntacl *dacl, vfs_context_t context) argument 5872 smbfs_smb_setsec(struct smb_share *share, struct smbnode *np, uint32_t desired_access, SMBFID fid, uint32_t selector, uint16_t control_flags, struct ntsid *owner, struct ntsid *group, struct ntacl *sacl, struct ntacl *dacl, vfs_context_t context) argument
|
H A D | smbfs_smb.c | 5880 struct ntacl *sacl, struct ntacl *dacl, vfs_context_t context) 5924 if (dacl) { 5937 if (dacl) 5938 mb_put_mem(mbp, (caddr_t)dacl, acllen(dacl), MB_MSYSTEM); 5878 smb1fs_setsec(struct smb_share *share, SMBFID fid, uint32_t selector, uint16_t ControlFlags, struct ntsid *owner, struct ntsid *group, struct ntacl *sacl, struct ntacl *dacl, vfs_context_t context) argument
|
/macosx-10.9.5/smb-697.95.1/kernel/netsmb/ |
H A D | smb_rq_2.h | 302 struct ntacl *dacl; member in struct:smb2_set_info_security
|
H A D | smb_smb_2.c | 6496 if (sec_infop->dacl) { 6499 offset += acllen(sec_infop->dacl); 6526 if (sec_infop->dacl) 6527 mb_put_mem(mbp, (caddr_t)sec_infop->dacl, acllen(sec_infop->dacl),
|