/illumos-gate/usr/src/cmd/lp/lib/access/ |
H A D | allowed.c | 77 char ** deny 80 is_user_allowed (user, allow, deny) 83 **deny; 89 return (allowed(user, allow, deny)); 109 **deny; local 111 if (loadaccess(Lp_A_Forms, form, "", &allow, &deny) == -1) 114 return (is_user_allowed(user, allow, deny)); 134 **deny; local 136 if (loadaccess(Lp_A_Printers, printer, UACCESSPREFIX, &allow, &deny) == -1) 139 return (is_user_allowed(user, allow, deny)); 159 **deny; local [all...] |
/illumos-gate/usr/src/lib/pam_modules/deny/ |
H A D | Makefile | 31 POFILE= deny.po 32 MSGFILES= deny.c
|
H A D | Makefile.com | 26 # usr/src/lib/pam_modules/deny/Makefile.com 32 OBJECTS= deny.o
|
/illumos-gate/usr/src/cmd/cron/ |
H A D | permit.c | 72 allowed(user, allow, deny) 73 char *user, *allow, *deny; 81 } else if (exists(deny)) { 82 if (within(user, deny)) {
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/ |
H A D | zfs_acl_chmod_001_neg.ksh | 60 log_mustnot usr_exec chmod A+ asd owner@:execute:deny $node 65 log_mustnot usr_exec chmod A+$tp:read_data:deny $node
|
H A D | zfs_acl_chmod_rwx_003_pos.ksh | 41 # 2. Separated verify type@:access:allow|deny to file and directory 42 # 3. To super user, read and write deny was override. 68 # To super user, read and write deny permission was override. 74 elif [[ $acl_spec == *:deny ]]; then 110 for tp in allow deny; do
|
H A D | zfs_acl_chmod_rwacl_001_pos.ksh | 42 # 2. Verify owner always can read and write acl, even deny. 46 # 5. Verify everyone@ was deny except specificied user, this user can read 48 # 6. Verify the group was deny except specified user, this user can read 114 for acc in allow deny; do 139 log_must usr_exec chmod A0+group@:read_acl/write_acl:deny $node 150 for flag in allow deny; do 171 log_must usr_exec chmod A0+everyone@:read_acl/write_acl:deny $node 193 log_must usr_exec chmod A0+everyone@:read_acl/write_acl:deny $node 211 A0+group:$ZFS_ACL_OTHER_GROUP:read_acl/write_acl:deny $node
|
H A D | zfs_acl_cp_001_pos.ksh | 82 A0+user:$ZFS_ACL_OTHER1:read_acl:deny $obj
|
H A D | zfs_acl_chmod_rwx_002_pos.ksh | 56 set -A a_type allow deny 104 # $3 ACE type which is allow or deny 119 elif [[ $acl_type == "deny" ]]; then 203 log_must chmod A0+user:$ZFS_ACL_OTHER1:execute:deny \
|
H A D | zfs_acl_cp_002_pos.ksh | 87 A0+user:$ZFS_ACL_OTHER1:read_acl:deny $obj
|
H A D | zfs_acl_chmod_rwx_004_pos.ksh | 58 # When everyone@ were deny, this file can't execute. 83 rflag=deny 116 set -A a_flag "allow" "deny"
|
H A D | zfs_acl_chmod_compact_001_pos.ksh | 54 typeset a_type=('allow' 'deny') 104 # $5 ACE type which is allow or deny 206 log_must chmod A0+user:$ZFS_ACL_OTHER1:execute:deny \
|
H A D | zfs_acl_chmod_aclmode_001_pos.ksh | 101 # $5 ctrl which is to determine allow or deny according to owner/group bit 287 expect=$prefix$status:deny 501 acl=$acl:deny
|
/illumos-gate/usr/src/lib/pam_modules/ |
H A D | Makefile | 37 deny \
|
/illumos-gate/usr/src/cmd/Adm/ |
H A D | Makefile | 27 CRON_LIB= .proto at.deny cron.deny queuedefs
|
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/cifs/ |
H A D | cifs_attr_001_pos.ksh | 132 # To increase the coverage, here we set 'deny' against 137 log_must chmod A+user:root:write_attributes:deny $object 140 log_must chmod A+owner@:write_attributes:deny $object 142 log_must chmod A+user:$user:write_attributes:deny \
|
/illumos-gate/usr/src/man/man4/ |
H A D | Makefile | 228 hosts.deny.4 \ 273 hosts.deny.4 := LINKSRC = hosts_access.4
|
/illumos-gate/usr/src/common/acl/ |
H A D | acl_common.c | 434 ace_make_deny(ace_t *allow, ace_t *deny, int isdir, int isowner) argument 436 (void) memcpy(deny, allow, sizeof (ace_t)); 438 deny->a_who = allow->a_who; 440 deny->a_type = ACE_ACCESS_DENIED_ACE_TYPE; 441 deny->a_access_mask ^= ACE_POSIX_SUPPORTED_BITS; 443 deny->a_access_mask ^= ACE_DELETE_CHILD; 445 deny->a_access_mask &= ~(ACE_SYNCHRONIZE | ACE_WRITE_OWNER | 448 deny->a_access_mask |= access_mask_set((allow->a_access_mask & 522 /* allow + deny for each aclent */ 526 * stick extra deny o [all...] |
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_acl.c | 482 ace4_make_deny(nfsace4 *allow, nfsace4 *deny, int isdir, int isowner, argument 485 bcopy(allow, deny, sizeof (nfsace4)); 487 (void) utf8_copy(&allow->who, &deny->who); 489 deny->type = ACE4_ACCESS_DENIED_ACE_TYPE; 490 deny->access_mask ^= ACE4_POSIX_SUPPORTED_BITS; 492 deny->access_mask ^= ACE4_DELETE_CHILD; 494 deny->access_mask &= ~(ACE4_SYNCHRONIZE | ACE4_WRITE_OWNER | 497 deny->access_mask |= access_mask_set((allow->access_mask & 581 /* allow + deny for each aclent */ 585 * stick extra deny o [all...] |
H A D | nfs4_srv_deleg.c | 1137 * delegation type and the desired access and deny modes on the file. 1139 * deny modes are consistent with the file modes. 1146 uint32_t deny = sp->rs_share_deny; local 1171 (deny & (OPEN4_SHARE_DENY_READ | OPEN4_SHARE_DENY_WRITE))) 1178 (deny & ~OPEN4_SHARE_DENY_READ)) 1187 * write or deny others to read then we can't delegate 1192 (deny & OPEN4_SHARE_DENY_READ)) 1386 * Default is to deny all access, the client will have 1388 * set a deny for every one, or do we simply want to
|
H A D | nfs4_srv.c | 6694 uint32_t access, uint32_t deny, 6751 * Calculate the new deny and access mode that this open is adding to 6754 open_d = (deny & ~sp->rs_open_deny); 6758 * Calculate the new share access and share deny modes that this open 6762 share_d = (deny & ~sp->rs_share_deny); 6768 * open owner on this file with the same share/deny modes. 6771 * check for conflicts in deny and access before checking for 6778 if ((err = rfs4_share(sp, access, deny)) != 0) { 6886 sp->rs_open_deny |= deny; 6892 fp->rf_share_deny |= deny; 6692 rfs4_do_open(struct compound_state *cs, struct svc_req *req, rfs4_openowner_t *oo, delegreq_t deleg, uint32_t access, uint32_t deny, OPEN4res *resp, int deleg_cur) argument 7686 uint32_t deny = args->share_deny; local 9496 rfs4_share(rfs4_state_t *sp, uint32_t access, uint32_t deny) argument [all...] |
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_vops.c | 1360 short deny = 0; local 1393 deny |= F_RDDNY; 1397 deny |= F_WRDNY; 1405 deny |= F_RMDNY; 1411 shr.s_deny = deny;
|
/illumos-gate/usr/src/lib/libsec/common/ |
H A D | acl_lex.l | 79 * AIS = Allow/deny/inheritance state 433 <AS>deny/[:,\n] { 478 " it should be either allow or deny.\n")); 527 <AIS>deny/[:,\n] { 609 * allow/deny fields match on ":" as part
|
/illumos-gate/usr/src/cmd/perl/contrib/Sun/Solaris/Project/ |
H A D | Project.pm | 72 'actions' => [ qw(none deny sig) ], 1525 $rctl->{'actions'} = ['deny']; 1530 $rctl->{'actions'} = ['none', 'deny']; 1829 if ($action eq 'deny') { 1835 'deny'), $name]);
|
/illumos-gate/usr/src/cmd/ldap/ns_ldap/ |
H A D | idsconfig.sh | 4432 aci: (targetattr = "cn||uid||uidNumber||gidNumber||homeDirectory||shadowLastChange||shadowMin||shadowMax||shadowWarning||shadowInactive||shadowExpire||shadowFlag||memberUid||SolarisAttrKeyValue||SolarisAttrReserved1||SolarisAttrReserved2||SolarisUserQualifier")(version 3.0; acl ${ACI_NAME}; deny (write) userdn = "ldap:///self";) 4498 # Add an ACI to deny non-admin access to shadow data when 4542 deny (write,read,search,compare) userdn != "ldap:///${LDAP_ADMINDN}";) 4567 # Add an ACI to deny non-host access to shadow data when 4611 deny (write,read,search,compare) 5325 # give read/write permission for shadow, and deny all others read/write 5330 # deny non-admin access to shadow data 5345 # shadow, and deny all others' read/write access to it. 5348 # deny non-host access to shadow data
|