acl.3 (57bd0fc6e89b888516b6a64206715bef500fc2d1) | acl.3 (6394f703dcdf80f1fd010d508645732880f46d93) |
---|---|
1.\"- 2.\" Copyright (c) 2000, 2001, 2002 Robert N. M. Watson 3.\" All rights reserved. 4.\" | 1.\"- 2.\" Copyright (c) 2000, 2001, 2002 Robert N. M. Watson 3.\" All rights reserved. 4.\" |
5.\" This software was developed by Robert Watson for the TrustedBSD Project. 6.\" |
|
5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright 9.\" notice, this list of conditions and the following disclaimer. 10.\" 2. Redistributions in binary form must reproduce the above copyright 11.\" notice, this list of conditions and the following disclaimer in the 12.\" documentation and/or other materials provided with the distribution. --- 7 unchanged lines hidden (view full) --- 20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24.\" SUCH DAMAGE. 25.\" 26.\" $FreeBSD$ 27.\" | 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions 9.\" are met: 10.\" 1. Redistributions of source code must retain the above copyright 11.\" notice, this list of conditions and the following disclaimer. 12.\" 2. Redistributions in binary form must reproduce the above copyright 13.\" notice, this list of conditions and the following disclaimer in the 14.\" documentation and/or other materials provided with the distribution. --- 7 unchanged lines hidden (view full) --- 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" $FreeBSD$ 29.\" |
28.Dd January 28, 2000 | 30.Dd December 18, 2002 |
29.Dt ACL 3 30.Os 31.Sh NAME 32.Nm acl 33.Nd introduction to the POSIX.1e ACL security API 34.Sh LIBRARY 35.Lb libc 36.Sh SYNOPSIS --- 40 unchanged lines hidden (view full) --- 77.Xr acl_copy_entry 3 , 78and may be used to copy the contents of an ACL entry. 79.It Fn acl_create_entry 80This function is described in 81.Xr acl_create_entry 3 , 82and may be used to create an empty entry in an ACL. 83.It Xo 84.Fn acl_delete_def_file , | 31.Dt ACL 3 32.Os 33.Sh NAME 34.Nm acl 35.Nd introduction to the POSIX.1e ACL security API 36.Sh LIBRARY 37.Lb libc 38.Sh SYNOPSIS --- 40 unchanged lines hidden (view full) --- 79.Xr acl_copy_entry 3 , 80and may be used to copy the contents of an ACL entry. 81.It Fn acl_create_entry 82This function is described in 83.Xr acl_create_entry 3 , 84and may be used to create an empty entry in an ACL. 85.It Xo 86.Fn acl_delete_def_file , |
87.Fn acl_delete_def_link_np , 88.Fn acl_delete_fd_np , |
|
85.Fn acl_delete_file_np , | 89.Fn acl_delete_file_np , |
86.Fn acl_delete_fd_np | 90.Fn acl_delete_link_np |
87.Xc 88These functions are described in 89.Xr acl_delete 3 , 90and may be used to delete ACLs from file system objects. 91.It Fn acl_delete_entry 92This function is described in 93.Xr acl_delete_entry 3 , 94and may be used to delete an entry from an ACL. --- 14 unchanged lines hidden (view full) --- 109.Xr acl_from_text 3 , 110and may be used to convert a text-form ACL into working ACL state, if 111the ACL has POSIX.1e semantics. 112.It Fn acl_get_entry 113This function is described in 114.Xr acl_get_entry 3 , 115and may be used to retrieve a designated ACL entry from an ACL. 116.It Xo | 91.Xc 92These functions are described in 93.Xr acl_delete 3 , 94and may be used to delete ACLs from file system objects. 95.It Fn acl_delete_entry 96This function is described in 97.Xr acl_delete_entry 3 , 98and may be used to delete an entry from an ACL. --- 14 unchanged lines hidden (view full) --- 113.Xr acl_from_text 3 , 114and may be used to convert a text-form ACL into working ACL state, if 115the ACL has POSIX.1e semantics. 116.It Fn acl_get_entry 117This function is described in 118.Xr acl_get_entry 3 , 119and may be used to retrieve a designated ACL entry from an ACL. 120.It Xo |
117.Fn acl_get_file , | |
118.Fn acl_get_fd , | 121.Fn acl_get_fd , |
119.Fn acl_get_fd_np | 122.Fn acl_get_fd_np , 123.Fn acl_get_file , 124.Fn acl_get_link_np |
120.Xc 121These functions are described in 122.Xr acl_get 3 , 123and may be used to retrieve ACLs from file system objects. 124.It Fn acl_get_permset 125This function is described in 126.Xr acl_get_permset 3 , 127and may be used to retrieve a permset from an ACL entry. --- 5 unchanged lines hidden (view full) --- 133This function is described in 134.Xr acl_get_tag_type 3 , 135and may be used to retrieve the tag type from an ACL entry. 136.It Fn acl_init 137This function is described in 138.Xr acl_init 3 , 139and may be used to allocate a fresh (empty) ACL structure. 140.It Xo | 125.Xc 126These functions are described in 127.Xr acl_get 3 , 128and may be used to retrieve ACLs from file system objects. 129.It Fn acl_get_permset 130This function is described in 131.Xr acl_get_permset 3 , 132and may be used to retrieve a permset from an ACL entry. --- 5 unchanged lines hidden (view full) --- 138This function is described in 139.Xr acl_get_tag_type 3 , 140and may be used to retrieve the tag type from an ACL entry. 141.It Fn acl_init 142This function is described in 143.Xr acl_init 3 , 144and may be used to allocate a fresh (empty) ACL structure. 145.It Xo |
141.Fn acl_set_file , | |
142.Fn acl_set_fd , | 146.Fn acl_set_fd , |
143.Fn acl_set_fd_np | 147.Fn acl_set_fd_np , 148.Fn acl_set_file , 149.Fn acl_set_link_np |
144.Xc 145These functions are described in 146.Xr acl_set 3 , 147and may be used to assign an ACL to a file system object. 148.It Fn acl_set_permset 149This function is described in 150.Xr acl_set_permset 3 , 151and may be used to set the permissions of an ACL entry from a permset. --- 6 unchanged lines hidden (view full) --- 158.Xr acl_set_tag_type 3 , 159and may be used to set the tag type of an ACL. 160.It Fn acl_to_text 161This function is described in 162.Xr acl_to_text 3 , 163and may be used to generate a text-form of a POSIX.1e semantics ACL. 164.It Xo 165.Fn acl_valid , | 150.Xc 151These functions are described in 152.Xr acl_set 3 , 153and may be used to assign an ACL to a file system object. 154.It Fn acl_set_permset 155This function is described in 156.Xr acl_set_permset 3 , 157and may be used to set the permissions of an ACL entry from a permset. --- 6 unchanged lines hidden (view full) --- 164.Xr acl_set_tag_type 3 , 165and may be used to set the tag type of an ACL. 166.It Fn acl_to_text 167This function is described in 168.Xr acl_to_text 3 , 169and may be used to generate a text-form of a POSIX.1e semantics ACL. 170.It Xo 171.Fn acl_valid , |
172.Fn acl_valid_fd_np , |
|
166.Fn acl_valid_file_np , | 173.Fn acl_valid_file_np , |
167.Fn acl_valid_fd_np | 174.Fn acl_valid_link_np |
168.Xc 169These functions are described in 170.Xr acl_valid 3 , 171and may be used to validate an ACL as correct POSIX.1e-semantics, or 172as appropriate for a particular file system object regardless of semantics. 173.El 174.Pp 175Documentation of the internal kernel interfaces backing these calls may --- 61 unchanged lines hidden --- | 175.Xc 176These functions are described in 177.Xr acl_valid 3 , 178and may be used to validate an ACL as correct POSIX.1e-semantics, or 179as appropriate for a particular file system object regardless of semantics. 180.El 181.Pp 182Documentation of the internal kernel interfaces backing these calls may --- 61 unchanged lines hidden --- |