Lines Matching defs:security

103 #include "security.h"
337 * Fill a security context as needed by security functions
350 scx->mapping[MAPUSERS] = ctx->security.mapping[MAPUSERS];
351 scx->mapping[MAPGROUPS] = ctx->security.mapping[MAPGROUPS];
372 return (ctx->security.mapping[MAPUSERS] != (struct MAPPING*)NULL);
988 struct SECURITY_CONTEXT security;
994 ntfs_fuse_fill_security_context(req, &security);
995 res = ntfs_fuse_getstat(&security, ni, &stbuf);
1030 struct SECURITY_CONTEXT security;
1043 if (ntfs_fuse_fill_security_context(req, &security)
1044 && !ntfs_allowed_access(&security,dir_ni,S_IEXEC)) {
1049 ntfs_fuse_fill_security_context(req, &security);
1061 &security,&entry,iref);
1383 struct SECURITY_CONTEXT security;
1387 if (ntfs_fuse_fill_security_context(req, &security)) {
1395 if (!ntfs_allowed_access(&security,ni,accesstype))
1611 struct SECURITY_CONTEXT security;
1624 if (ntfs_fuse_fill_security_context(req, &security)) {
1633 if (!ntfs_allowed_access(&security,
2219 struct SECURITY_CONTEXT security;
2222 ntfs_fuse_fill_security_context(req, &security);
2233 res = ntfs_fuse_getstat(&security, ni, &stbuf);
2246 res = ntfs_fuse_chmod(&security, ino,
2250 res = ntfs_fuse_chown(&security, ino, attr->st_uid,
2254 res = ntfs_fuse_chown(&security, ino, (uid_t)-1,
2258 res = ntfs_fuse_chown(&security, ino, attr->st_uid,
2262 res = ntfs_fuse_chownmod(&security, ino, attr->st_uid,
2267 res = ntfs_fuse_chownmod(&security, ino, (uid_t)-1,
2272 res = ntfs_fuse_chownmod(&security, ino, attr->st_uid,
2281 res = ntfs_fuse_trunc(&security, ino, attr->st_size,
2287 res = ntfs_fuse_utimens(&security, ino, attr, &stbuf, to_set);
2289 res = ntfs_fuse_utime(&security, ino, attr, &stbuf);
2305 struct SECURITY_CONTEXT security;
2308 if (!ntfs_fuse_fill_security_context(req, &security)) {
2323 if (!ntfs_allowed_access(&security,
2353 struct SECURITY_CONTEXT security;
2377 if (!ntfs_fuse_fill_security_context(req, &security)
2378 || ntfs_allowed_create(&security,
2381 ntfs_fuse_fill_security_context(req, &security);
2382 ntfs_allowed_create(&security, dir_ni, &gid, &dsetgid);
2394 * Try to get a security id available for
2397 * have to build a security attribute later.
2399 if (!ctx->security.mapping[MAPUSERS])
2403 securid = ntfs_inherited_id(&security,
2407 securid = ntfs_alloc_securid(&security,
2408 security.uid, gid,
2411 securid = ntfs_alloc_securid(&security,
2412 security.uid, gid,
2413 perm & ~security.umask, S_ISDIR(type));
2463 * set the security attribute if a security id
2466 if (ctx->security.mapping[MAPUSERS]) {
2469 && ntfs_set_inherited_posix(&security, ni,
2470 security.uid, gid,
2475 && ntfs_set_owner_mode(&security, ni,
2476 security.uid, gid,
2477 perm & ~security.umask) < 0)
2501 res = ntfs_fuse_getstat(&security, ni, &e->attr);
2590 struct SECURITY_CONTEXT security;
2622 if (ntfs_fuse_fill_security_context(req, &security)
2623 && !ntfs_allowed_access(&security,dir_ni,S_IWRITE + S_IEXEC))
2627 ntfs_fuse_fill_security_context(req, &security);
2655 res = ntfs_fuse_getstat(&security, ni, &e->attr);
2700 struct SECURITY_CONTEXT security;
2777 if (ntfs_fuse_fill_security_context(req, &security)
2778 && !ntfs_allowed_dir_access(&security, dir_ni, ino, ni,
2957 struct SECURITY_CONTEXT security;
2982 if (!ntfs_fuse_fill_security_context(req,&security)
2983 || ntfs_allowed_dir_access(&security, newdir_ni,
3318 struct SECURITY_CONTEXT *security,
3336 if (((!ntfs_fuse_fill_security_context(req, security)
3342 if (ctx->silent && !ctx->security.mapping[MAPUSERS])
3363 || !ntfs_real_allowed_access(security,
3369 if (!ntfs_real_allowed_access(security,
3438 * security, trusted and unmapped system name spaces :
3470 struct SECURITY_CONTEXT security;
3474 ntfs_fuse_fill_security_context(req, &security);
3486 if (!ntfs_allowed_access(&security,ni,S_IREAD)) {
3551 struct SECURITY_CONTEXT security;
3574 ni = ntfs_check_access_xattr(req, &security, ino,
3577 if (ntfs_allowed_access(&security,ni,S_IREAD)) {
3582 res = ntfs_xattr_system_getxattr(&security,
3600 ntfs_fuse_fill_security_context(req, &security);
3605 res = ntfs_xattr_system_getxattr(&security,
3636 ntfs_fuse_fill_security_context(req,&security);
3639 && security.uid) {
3656 if (!ntfs_allowed_access(&security, ni, S_IREAD)) {
3732 struct SECURITY_CONTEXT security;
3754 ni = ntfs_check_access_xattr(req,&security,ino,attr,TRUE);
3756 if (ntfs_allowed_as_owner(&security, ni)) {
3761 res = ntfs_xattr_system_setxattr(&security,
3780 ni = ntfs_check_access_xattr(req, &security,
3789 if (!ntfs_fuse_fill_security_context(req, &security)
3790 || ntfs_allowed_as_owner(&security, ni)) {
3795 res = ntfs_xattr_system_setxattr(&security,
3841 ntfs_fuse_fill_security_context(req,&security);
3842 /* security and trusted only settable by root */
3845 && security.uid) {
3859 if (security.uid) {
3865 if (!ntfs_allowed_as_owner(&security, ni)) {
3876 if (!ntfs_allowed_access(&security,ni,S_IWRITE)) {
3979 struct SECURITY_CONTEXT security;
4000 ni = ntfs_check_access_xattr(req, &security, ino,
4003 if (ntfs_allowed_as_owner(&security, ni)) {
4008 res = ntfs_xattr_system_removexattr(&security,
4027 ni = ntfs_check_access_xattr(req, &security,
4036 if (!ntfs_fuse_fill_security_context(req, &security)
4037 || ntfs_allowed_as_owner(&security, ni)) {
4042 res = ntfs_xattr_system_removexattr(&security,
4091 ntfs_fuse_fill_security_context(req,&security);
4092 /* security and trusted only settable by root */
4095 && security.uid) {
4109 if (security.uid) {
4115 if (!ntfs_allowed_as_owner(&security, ni)) {
4126 if (!ntfs_allowed_access(&security,ni,S_IWRITE)) {
4205 struct SECURITY_CONTEXT security;
4216 if (ntfs_fuse_fill_security_context((fuse_req_t)NULL, &security)) {
4228 ntfs_destroy_security_context(&security);
4685 ctx->security.uid = 0;
4686 ctx->security.gid = 0;
4690 ctx->security.uid = sbuf.st_uid;
4691 ctx->security.gid = sbuf.st_gid;
4747 ctx->security.vol = ctx->vol;
4752 if (!ntfs_build_mapping(&ctx->security,ctx->usermap_path,
4776 * force default security
4790 ctx->security.uid = ctx->uid;
4791 ctx->security.gid = ctx->gid;
4793 ctx->security.mapping[MAPUSERS] = (struct MAPPING*)NULL;
4794 ctx->security.mapping[MAPGROUPS] = (struct MAPPING*)NULL;