| /src/tests/sys/acl/ |
| H A D | tools-nfs4.test | 43 > owner@:--x-----------:-------:deny 45 > group@:-wxp----------:-------:deny 47 > everyone@:-wxp---A-W-Co-:-------:deny 51 > owner@:--x-----------:-------:deny 53 > group@:-wxp----------:-------:deny 55 > everyone@:-wxp---A-W-Co-:-------:deny 63 > owner@:execute::deny 65 > group@:write_data/execute/append_data::deny 67 … everyone@:write_data/execute/append_data/write_attributes/write_xattr/write_acl/write_owner::deny 71 $ setfacl -a2 u:0:write_acl:allow,g:1:read_acl:deny xxx [all …]
|
| H A D | tools-nfs4-psarc.test | 62 $ setfacl -a2 u:0:write_acl:allow,g:1:read_acl:deny xxx 70 > group:1:----------c---:-------:deny 76 $ setfacl -a2 u:root:write_acl:allow,g:daemon:read_acl:deny xxx 84 > group:daemon:----------c---:-------:deny 99 > group:1:----------c---:-------:deny 103 $ setfacl -a0 everyone@:rwx:deny xxx 104 $ setfacl -a0 everyone@:rwx:deny xxx 105 $ setfacl -a0 everyone@:rwx:deny xxx 106 $ setfacl -m everyone@::deny xxx 111 > everyone@:--------------:-------:deny [all …]
|
| H A D | tools-nfs4-trivial.test | 50 $ setfacl -a0 owner@:x:deny,owner@:rwpAWCo:allow,group@:wxp:deny,group@:r:allow,everyone@:wxpAWCo:d… 59 > owner@:--x-----------:-------:deny 61 > group@:-wxp----------:-------:deny 63 > everyone@:-wxp---A-W-Co-:-------:deny 74 > group@:-wxp----------:-------:deny 76 > everyone@:-wxp---A-W-Co-:-------:deny
|
| /src/libexec/rc/ |
| H A D | rc.firewall | 85 ${fwcmd} add 200 deny all from any to 127.0.0.0/8 86 ${fwcmd} add 300 deny ip from 127.0.0.0/8 to any 88 ${fwcmd} add 400 deny all from any to ::1 89 ${fwcmd} add 500 deny all from ::1 to any 244 ${fwcmd} add deny tcp from any to any setup 288 ${fwcmd} add deny all from ${inet} to any in via ${oif} 289 ${fwcmd} add deny all from ${onet} to any in via ${iif} 291 ${fwcmd} add deny all from ${inet6} to any in via ${oif6} 293 ${fwcmd} add deny all from ${onet6} to any in \ 314 ${fwcmd} add deny all from any to "table($BAD_ADDR_TBL)" via ${oif} [all …]
|
| /src/lib/libwrap/ |
| H A D | hosts.allow | 4 # NOTE: The hosts.deny file is deprecated. 5 # Place both 'allow' and 'deny' rules in the hosts.allow file. 26 #sshd : .evil.cracker.example.com : deny 34 ALL : PARANOID : RFC931 20 : deny 45 #ALL : [fe80::]/10 : deny 46 #ALL : [2001:db8:2:1:2:3:4:3fe1] : deny 52 #sendmail : .evil.cracker.example.com : deny 58 #exim : .evil.cracker.example.com : deny 66 rpcbind : ALL : deny 71 #ypserv : .unsafe.my.net.example.com : deny [all …]
|
| /src/contrib/pjdfstest/tests/granular/ |
| H A D | 02.t | 26 expect 0 prependacl ${n0} user:65534:read_acl::deny 111 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:write_acl::deny 112 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:read_acl::deny 119 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:write_acl::deny 120 expect 0 -u 65534 -g 65534 prependacl ${n0} user:65534:read_acl::deny 128 expect 0 prependacl ${n0} everyone@:write_acl::deny 129 expect 0 prependacl ${n0} everyone@:read_acl::deny 136 expect 0 prependacl ${n0} everyone@:write_acl::deny 137 expect 0 prependacl ${n0} everyone@:read_acl::deny
|
| H A D | 03.t | 32 expect 0 prependacl . user:65534:write_data::deny 45 expect 0 prependacl . user:65534:write_data::deny 53 expect 0 prependacl ${n0} user:65534:delete::deny 64 expect 0 prependacl . user:65534:delete_child::deny 101 expect 0 prependacl . user:65534:write_data::deny 102 expect 0 prependacl . user:65534:delete_child::deny 131 expect 0 prependacl ${n0} user:65534:delete::deny
|
| H A D | 05.t | 32 expect 0 prependacl . user:65534:write_data::deny 48 expect 0 prependacl . user:65534:write_data::deny 57 expect 0 prependacl ${n0} user:65534:delete::deny 68 expect 0 prependacl . user:65534:delete_child::deny 107 expect 0 prependacl . user:65534:write_data::deny 108 expect 0 prependacl . user:65534:delete_child::deny 146 expect 0 prependacl ${n0} user:65534:delete::deny
|
| H A D | 00.t | 39 expect 0 prependacl . user:65534:write_data::allow,user:65534:append_data::deny 75 expect 0 prependacl . user:65534:write_data::deny,user:65534:append_data::allow
|
| H A D | 01.t | 26 expect 0 prependacl ${n0} user:65534:read_attributes::deny
|
| /src/contrib/wpa/wpa_supplicant/dbus/ |
| H A D | dbus-wpa_supplicant.conf | 13 <deny own="fi.w1.wpa_supplicant1"/> 14 <deny send_destination="fi.w1.wpa_supplicant1"/> 15 <deny receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
|
| /src/usr.sbin/cron/lib/ |
| H A D | misc.c | 336 FILE *allow, *deny; in allowed() local 341 deny = NULL; in allowed() 345 if ((deny = fopen(DENY_FILE, "r")) == NULL && errno != ENOENT) in allowed() 347 Debug(DMISC, ("allow/deny enabled, %d/%d\n", !!allow, !!deny)) in allowed() 354 else if (deny) in allowed() 355 isallowed = !in_file(username, deny); in allowed() 365 if (deny) in allowed() 366 fclose(deny); in allowed()
|
| /src/tests/sys/cddl/zfs/tests/acl/nontrivial/ |
| H A D | zfs_acl_chmod_rwacl_001_pos.ksh | 123 for acc in allow deny; do 148 log_must usr_exec $CHMOD A0+group@:read_acl/write_acl:deny $node 159 for flag in allow deny; do 180 log_must usr_exec $CHMOD A0+everyone@:read_acl/write_acl:deny $node 202 log_must usr_exec $CHMOD A0+everyone@:read_acl/write_acl:deny $node 220 A0+group:$ZFS_ACL_OTHER_GROUP:read_acl/write_acl:deny $node
|
| H A D | zfs_acl_chmod_001_neg.ksh | 71 log_mustnot usr_exec $CHMOD A+ asd owner@:execute:deny $node 76 log_mustnot usr_exec $CHMOD A+$tp:read_data:deny $node
|
| H A D | zfs_acl_chmod_rwx_003_pos.ksh | 83 elif [[ $acl_spec == *:deny ]]; then 119 for tp in allow deny; do
|
| H A D | zfs_acl_chmod_rwx_002_pos.ksh | 65 set -A a_type allow deny 213 log_must $CHMOD A0+user:$ZFS_ACL_OTHER1:execute:deny \
|
| H A D | zfs_acl_chmod_compact_001_pos.ksh | 66 set -A a_type allow deny 229 log_must $CHMOD A0+user:$ZFS_ACL_OTHER1:execute:deny \
|
| H A D | zfs_acl_chmod_aclmode_001_pos.ksh | 346 expect1=$prefix:$priv:deny 445 acl=$acl:deny
|
| H A D | zfs_acl_cp_001_pos.ksh | 93 A0+user:$ZFS_ACL_OTHER1:read_acl:deny $obj
|
| /src/usr.sbin/rpcbind/ |
| H A D | security.c | 248 goto deny; in check_callit() 254 goto deny; in check_callit() 262 goto deny; in check_callit() 269 goto deny; in check_callit() 278 deny: in check_callit()
|
| /src/crypto/openssh/regress/ |
| H A D | allow-deny-users.sh | 17 deny="$1" 23 test -z "$deny" || echo DenyUsers="$deny" >> $OBJ/sshd_proxy
|
| /src/share/examples/ppp/ |
| H A D | ppp.conf.sample | 136 deny pred1 deflate mppe 266 set filter alive 0 deny udp src eq 520 # routed 267 set filter alive 1 deny udp dst eq 520 # routed 268 set filter alive 2 deny udp src eq 513 # rwhod 269 set filter alive 3 deny udp src eq 525 # timed 270 set filter alive 4 deny udp src eq 137 # NetBIOS name service 271 set filter alive 5 deny udp src eq 138 # NetBIOS datagram service 272 set filter alive 6 deny tcp src eq 139 # NetBIOS session service 273 set filter alive 7 deny udp dst eq 137 # NetBIOS name service 274 set filter alive 8 deny udp dst eq 138 # NetBIOS datagram service [all …]
|
| /src/tests/sys/cddl/zfs/tests/acl/cifs/ |
| H A D | cifs_attr_001_pos.ksh | 152 log_must chmod A+user:root:write_attributes:deny $object 155 log_must chmod A+owner@:write_attributes:deny $object 157 log_must chmod A+user:$user:write_attributes:deny \
|
| /src/contrib/unbound/contrib/ |
| H A D | drop-tld.diff | 27 /** deny queries of type ANY with an empty answer */ 41 deny-any{COLON} { YDVAR(1, VAR_DENY_ANY) }
|
| /src/sys/contrib/openzfs/module/os/freebsd/spl/ |
| H A D | acl_common.c | 401 ace_make_deny(ace_t *allow, ace_t *deny, int isdir, int isowner) in ace_make_deny() argument 403 (void) memcpy(deny, allow, sizeof (ace_t)); in ace_make_deny() 405 deny->a_who = allow->a_who; in ace_make_deny() 407 deny->a_type = ACE_ACCESS_DENIED_ACE_TYPE; in ace_make_deny() 408 deny->a_access_mask ^= ACE_POSIX_SUPPORTED_BITS; in ace_make_deny() 410 deny->a_access_mask ^= ACE_DELETE_CHILD; in ace_make_deny() 412 deny->a_access_mask &= ~(ACE_SYNCHRONIZE | ACE_WRITE_OWNER | in ace_make_deny() 415 deny->a_access_mask |= access_mask_set((allow->a_access_mask & in ace_make_deny()
|