Displaying 7 results from an estimated 7 matches for "aclnam".
Did you mean:
aclname
2007 Jan 06
1
Re: [nut-commits] svn commit r710 - in trunk: . clients server
...y) {
> case AF_INET:
> return((((struct sockaddr_in*)ip_addr)->sin_addr.s_addr & htonl(prefix)) == ((struct sockaddr_in*)net_addr)->sin_addr.s_addr);
> @@ -72,8 +73,31 @@
> return(0);
> }
> }
> +#endif
>
> /* see if <addr> matches the acl <aclname> */
> +#ifndef HAVE_IPV6
> +int acl_check(const char *aclname, const struct sockaddr_in *addr)
> +{
> + struct acl_t *tmp;
> + int aclchk, addrchk;
> +
> + tmp = acl_head;
> + while (tmp != NULL) {
> + if (!strcmp(tmp->name, aclname)) {
> + aclchk = tmp->a...
2007 Jan 06
3
Re: [nut-commits] svn commit r708 - in trunk: . clients server
...r32[1] == 0) && (ip6->s6_addr32[0] == 0))
> + return(1);
> + else
> + return(0);
> + }
> + default:
> + fatal_with_errno("mask_cmp: Unknown address family");
> + return(0);
> + }
> +}
>
> /* see if <addr> matches the acl <aclname> */
> -int acl_check(const char *aclname, const struct sockaddr_in *addr)
> +int acl_check(const char *aclname, const struct sockaddr_storage *addr)
> {
> struct acl_t *tmp;
> - int aclchk, addrchk;
>
> tmp = acl_head;
> while (tmp != NULL) {
> - if (!strcmp...
2017 Mar 01
3
fail2ban Asterisk 13.13.1
...,LocalAddress="IPV
[46]/(UDP|TCP|WS)/[\da-fA-F:.]+/\d+",RemoteAddress="IPV[46]/(UDP|TCP|WS)/<HO
ST>/\d+"(,Challenge="[\w/]+")?(,ReceivedChallenge="\w+")?(,Response="\w+",Ex
pectedResponse="\w*")?(,ReceivedHash="[\da-f]+")?(,ACLName="\w+")?$
^%(__prefix_line)s%(log_prefix)s "Rejecting unknown SIP
connection from <HOST>"$
^%(__prefix_line)s%(log_prefix)s Request (?:'[^']*' )?from '[^']
*' failed for '<HOST>(?::\d+)?'\s\(callid: [^\)]*\) -...
2017 Jan 09
2
NUT Client shuts down when performing runtime calibration on APC UPS
...control data, you should keep it secure.
#
# It should only be readable by the user that upsd becomes. See the FAQ.
# =======================================================================
# Access Control Lists (ACLs)
#
# ACL <name> <ipblock>
# ACL myhost 10.0.0.1/32
#
# ACCEPT <aclname> [<aclname>...]
# REJECT <aclname> [<aclname>...]
#
# Define lists of hosts or networks with ACL definitions.
#
# ACCEPT and REJECT use ACL definitions to control whether a host is
# allowed to connect to upsd.
#
# This default configuration only gives access to localhost. To...
2017 Mar 02
3
fail2ban Asterisk 13.13.1
...,LocalAddress="IPV
[46]/(UDP|TCP|WS)/[\da-fA-F:.]+/\d+",RemoteAddress="IPV[46]/(UDP|TCP|WS)/<HO
ST>/\d+"(,Challenge="[\w/]+")?(,ReceivedChallenge="\w+")?(,Response="\w+",Ex
pectedResponse="\w*")?(,ReceivedHash="[\da-f]+")?(,ACLName="\w+")?$
^%(__prefix_line)s%(log_prefix)s "Rejecting unknown SIP
connection from <HOST>"$
^%(__prefix_line)s%(log_prefix)s Request (?:'[^']*' )?from
'[^']*' failed for '<HOST>(?::\d+)?'\s\(callid: [^\)]*\) -...
2009 Aug 25
3
Extending virtio_console to support multiple ports
Hello all,
Here is a new iteration of the patch series that implements a
transport for guest and host communications.
The code has been updated to reuse the virtio-console device instead
of creating a new virtio-serial device.
I've tested for compatibility (old qemu & new kernel, new qemu & old
kernel, new qemu & new kernel) and it all works fine.
There are a few items on my
2009 Aug 25
3
Extending virtio_console to support multiple ports
Hello all,
Here is a new iteration of the patch series that implements a
transport for guest and host communications.
The code has been updated to reuse the virtio-console device instead
of creating a new virtio-serial device.
I've tested for compatibility (old qemu & new kernel, new qemu & old
kernel, new qemu & new kernel) and it all works fine.
There are a few items on my