Home
last modified time | relevance | path

Searched full:security (Results 1 – 25 of 1992) sorted by relevance

12345678910>>...80

/third_party/mingw-w64/mingw-w64-headers/crt/
DChangeLog-200912 * conio.h (_cgets): Warn about security deprecations.
18 * float.h (_controlfp): Warn about security deprecations.
19 * io.h (_chsize): Warn about security deprecations.
29 * malloc.h (_alloca): Warn about security deprecations.
30 * mbctype.h (_mbccpy): New, Warn about security deprecations.
32 * mbstring.h (_mbsnbcat): Warn about security deprecations.
52 * memory.h (memcpy): Warn about security deprecations.
53 * stdio.h (fopen): Warn about security deprecations.
63 (_sscanf_l): New, Warn about security deprecations.
64 (_snscanf): Warn about security deprecations.
[all …]
/third_party/openssl/doc/man3/
DSSL_CTX_set_security_level.pod5 …rity_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data - SSL/TLS security framework
42 the security level to B<level>. If not set the library default security level
46 retrieve the current security level.
50 the security callback associated with B<ctx> or B<s>. If not set a default
51 security callback is used. The meaning of the parameters and the behaviour
62 If an application doesn't set its own security callback the default
75 The security level corresponds to a minimum of 80 bits of security. Any
76 parameters offering below 80 bits of security are excluded. As a result RSA,
79 less than 80 bits of security. SSL version 2 is prohibited. Any cipher suite
84 Security level set to 112 bits of security. As a result RSA, DSA and DH keys
[all …]
/third_party/curl/docs/
DSECURITY-PROCESS.md1 curl security process
4 This document describes how security vulnerabilities should be handled in the
11 [the curl website security page](https://curl.se/docs/security.html).
13 Security vulnerabilities **should not** be entered in the project's public bug
19 The typical process for handling a new security vulnerability is as follows.
26 reference to the security nature of the commit if done prior to the public
34 security vulnerability in curl or libcurl are ignored and no further action
37 - A person in the security team responds to the original report to acknowledge
40 - The security team investigates the report and either rejects it or accepts
48 - The security team discusses the problem, works out a fix, considers the
[all …]
DBUG-BOUNTY.md9 Start out by posting your suspected security vulnerability directly to [curl's
12 After you have reported a security issue, it has been deemed credible, and a
26 security vulnerabilities. The amount of money that is rewarded depends on how
29 We offer reward money *up to* a certain amount per severity. The curl security
37 Everyone and anyone who reports a security problem in a released curl version
55 The curl security team is the sole arbiter if a reported flaw is subject to a
61 performed by the curl security team. The grading will be based on the CVSS
66 The curl security team first gives the vulnerability a score, as mentioned
82 curl project or its security team never actually receive any of this money,
/third_party/Linux_Kernel/include/linux/
Dlsm_hooks.h2 * Linux Security Module interfaces
27 #include <linux/security.h>
32 * Security hooks for program execution operations.
35 * Save security information in the bprm->security field, typically based
38 * transitions between security domains).
41 * checking to see if @bprm->security is non-NULL. If so, then the hook
42 * may decide either to retain the security information saved earlier or
48 * begin. It allows a check the @bprm->security value which is set in the
56 * Prepare to install the new security attributes of a process being
65 * Tidy up after the installation of the new security attributes of a
[all …]
/third_party/weston/man/
Dweston-rdp.man20 On the security part, the backend supports RDP security or TLS, keys and certificates
21 must be provided to the backend depending on which kind of security is requested. The RDP
22 backend will announce security options based on which files have been given.
47 The file containing the RSA key for doing RDP security. As RDP security is known
51 The file containing the key for doing TLS security. To have TLS security you also need
55 The file containing the certificate for doing TLS security. To have TLS security you also need
62 To generate a key file to use for RDP security, you need the
67 $ winpr-makecert -rdp -silent -n rdp-security
70 This will create a rdp-security.key file.
73 You can generate a key and certificate file to use with TLS security using a typical
/third_party/node/
DSECURITY.md1 # Security chapter
5 Report security bugs in Node.js via [HackerOne](https://hackerone.com/nodejs).
11 After the initial reply to your report, the security team will endeavor to keep
18 The Node.js project engages in an official bug bounty program for security
24 Security bugs in third party modules should be reported to their respective
26 Security Team via [HackerOne](https://hackerone.com/nodejs-ecosystem).
29 [Security Working Group repository](https://github.com/nodejs/security-wg/blob/master/processes/thi…
31 Thank you for improving the security of Node.js and its ecosystem. Your efforts
36 Here is the security disclosure policy for Node.js
38 * The security report is received and is assigned a primary handler. This
[all …]
/third_party/e2fsprogs/tests/d_xattr_sorting/
Dexpect4 ea_set -f /tmp/b / security.SMEG64
6 ea_set -f /tmp/b / security.imb
13 security.imb (256)
14 security.SMEG64 (256)
16 ea_get / security.imb
17 security.imb (256) = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx…
20 ea_get / security.SMEG64
21 security.SMEG64 (256) = "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx…
Dscript27 echo "ea_set -f /tmp/b / security.SMEG64" >> $OUT.new
28 $DEBUGFS -w -R "ea_set -f $B / security.SMEG64" $TMPFILE >> $OUT.new 2>&1
32 echo "ea_set -f /tmp/b / security.imb" >> $OUT.new
33 $DEBUGFS -w -R "ea_set -f $B / security.imb" $TMPFILE >> $OUT.new 2>&1
50 echo "ea_get / security.imb" >> $OUT.new
51 $DEBUGFS -w -R "ea_get / security.imb" $TMPFILE >> $OUT.new 2>&1
55 echo "ea_get / security.SMEG64" >> $OUT.new
56 $DEBUGFS -w -R "ea_get / security.SMEG64" $TMPFILE >> $OUT.new 2>&1
/third_party/python/.github/
DSECURITY.md1 # Security Policy
5 The Python team applies security fixes according to the table
12 Please read the guidelines on reporting security issues [on the
14 https://www.python.org/news/security/#reporting-security-issues-in-python
15 ) for instructions on how to report a security-related problem to
18 To reach the response team, email `security at python dot org`.
/third_party/mbedtls/include/mbedtls/
Dmd4.h7 * security risk. We recommend considering stronger message digests
81 * constitutes a security risk. We recommend considering
103 * constitutes a security risk. We recommend considering
115 * constitutes a security risk. We recommend considering
128 * constitutes a security risk. We recommend considering
143 * constitutes a security risk. We recommend considering
158 * constitutes a security risk. We recommend considering
175 * constitutes a security risk. We recommend considering
191 * constitutes a security risk. We recommend considering
212 * constitutes a security risk. We recommend considering
[all …]
Dmd2.h7 * security risk. We recommend considering stronger message digests
80 * constitutes a security risk. We recommend considering
103 * constitutes a security risk. We recommend considering
115 * constitutes a security risk. We recommend considering
128 * constitutes a security risk. We recommend considering
143 * constitutes a security risk. We recommend considering
159 * constitutes a security risk. We recommend considering
176 * constitutes a security risk. We recommend considering
191 * constitutes a security risk. We recommend considering
211 * constitutes a security risk. We recommend considering
[all …]
Dmd5.h7 * security risk. We recommend considering stronger message
80 * constitutes a security risk. We recommend considering
102 * constitutes a security risk. We recommend considering
114 * constitutes a security risk. We recommend considering
127 * constitutes a security risk. We recommend considering
142 * constitutes a security risk. We recommend considering
158 * constitutes a security risk. We recommend considering
175 * constitutes a security risk. We recommend considering
191 * constitutes a security risk. We recommend considering
212 * constitutes a security risk. We recommend considering
[all …]
Dsha1.h10 * a security risk. We recommend considering stronger message
84 * constitutes a security risk. We recommend considering
104 * constitutes a security risk. We recommend considering
117 * constitutes a security risk. We recommend considering
132 * constitutes a security risk. We recommend considering
146 * constitutes a security risk. We recommend considering
162 * constitutes a security risk. We recommend considering
183 * constitutes a security risk. We recommend considering
201 * constitutes a security risk. We recommend considering
225 * constitutes a security risk. We recommend considering
[all …]
/third_party/node/tools/
Dosx-entitlements.plist5 <key>com.apple.security.cs.allow-jit</key>
7 <key>com.apple.security.cs.allow-unsigned-executable-memory</key>
9 <key>com.apple.security.cs.disable-executable-page-protection</key>
11 <key>com.apple.security.cs.allow-dyld-environment-variables</key>
13 <key>com.apple.security.cs.disable-library-validation</key>
15 <key>com.apple.security.get-task-allow</key>
/third_party/curl/
DSECURITY.md1 # Security Policy
3 See [docs/SECURITY-PROCESS.md](docs/SECURITY-PROCESS.md) for full details.
7 If you have found or just suspect a security problem somewhere in curl or libcurl,
10 We treat security issues with confidentiality until controlled and disclosed responsibly.
/third_party/grpc/
DBUILD.gn785 "src/core/lib/security/context/security_context.cc",
786 "src/core/lib/security/context/security_context.h",
787 "src/core/lib/security/credentials/alts/alts_credentials.cc",
788 "src/core/lib/security/credentials/alts/alts_credentials.h",
789 "src/core/lib/security/credentials/alts/check_gcp_environment.cc",
790 "src/core/lib/security/credentials/alts/check_gcp_environment.h",
791 "src/core/lib/security/credentials/alts/check_gcp_environment_linux.cc",
792 "src/core/lib/security/credentials/alts/check_gcp_environment_no_op.cc",
793 "src/core/lib/security/credentials/alts/check_gcp_environment_windows.cc",
794 "src/core/lib/security/credentials/alts/grpc_alts_credentials_client_options.cc",
[all …]
DgRPC-C++.podspec133 'include/grpcpp/impl/codegen/security/auth_context.h',
164 'include/grpcpp/security/auth_context.h',
165 'include/grpcpp/security/auth_metadata_processor.h',
166 'include/grpcpp/security/credentials.h',
167 'include/grpcpp/security/credentials_impl.h',
168 'include/grpcpp/security/server_credentials.h',
169 'include/grpcpp/security/server_credentials_impl.h',
170 'include/grpcpp/security/tls_credentials_options.h',
516 'src/core/lib/security/context/security_context.h',
517 'src/core/lib/security/credentials/alts/alts_credentials.h',
[all …]
Dconfig.w32358 "src\\core\\lib\\security\\context\\security_context.cc " +
359 "src\\core\\lib\\security\\credentials\\alts\\alts_credentials.cc " +
360 "src\\core\\lib\\security\\credentials\\alts\\check_gcp_environment.cc " +
361 "src\\core\\lib\\security\\credentials\\alts\\check_gcp_environment_linux.cc " +
362 "src\\core\\lib\\security\\credentials\\alts\\check_gcp_environment_no_op.cc " +
363 "src\\core\\lib\\security\\credentials\\alts\\check_gcp_environment_windows.cc " +
364 "src\\core\\lib\\security\\credentials\\alts\\grpc_alts_credentials_client_options.cc " +
365 "src\\core\\lib\\security\\credentials\\alts\\grpc_alts_credentials_options.cc " +
366 "src\\core\\lib\\security\\credentials\\alts\\grpc_alts_credentials_server_options.cc " +
367 "src\\core\\lib\\security\\credentials\\composite\\composite_credentials.cc " +
[all …]
DgRPC-Core.podspec832 'src/core/lib/security/context/security_context.cc',
833 'src/core/lib/security/context/security_context.h',
834 'src/core/lib/security/credentials/alts/alts_credentials.cc',
835 'src/core/lib/security/credentials/alts/alts_credentials.h',
836 'src/core/lib/security/credentials/alts/check_gcp_environment.cc',
837 'src/core/lib/security/credentials/alts/check_gcp_environment.h',
838 'src/core/lib/security/credentials/alts/check_gcp_environment_linux.cc',
839 'src/core/lib/security/credentials/alts/check_gcp_environment_no_op.cc',
840 'src/core/lib/security/credentials/alts/check_gcp_environment_windows.cc',
841 … 'src/core/lib/security/credentials/alts/grpc_alts_credentials_client_options.cc',
[all …]
/third_party/grpc/src/core/lib/surface/
Dinit_secure.cc27 #include "src/core/lib/security/context/security_context.h"
28 #include "src/core/lib/security/credentials/credentials.h"
29 #include "src/core/lib/security/credentials/plugin/plugin_credentials.h"
30 #include "src/core/lib/security/security_connector/security_connector.h"
31 #include "src/core/lib/security/transport/auth_filters.h"
32 #include "src/core/lib/security/transport/secure_endpoint.h"
33 #include "src/core/lib/security/transport/security_handshaker.h"
/third_party/FreeBSD/
DLOCKS10 releng/* Requires Security Officer approval.
11 head/sys/dev/random Requires Security Officer approval.
12 head/sys/libkern/arc4random.c Requires Security Officer approval.
13 stable/*/sys/dev/random Requires Security Officer approval.
14 stable/*/sys/libkern/arc4random.c Requires Security Officer approval.
/third_party/ltp/testcases/kernel/security/tomoyo/
Dinclude.h116 #define proc_policy_dir "/sys/kernel/security/tomoyo/"
117 #define proc_policy_domain_policy "/sys/kernel/security/tomoyo/domain_policy"
118 #define proc_policy_exception_policy "/sys/kernel/security/tomoyo/exception_policy"
119 #define proc_policy_profile "/sys/kernel/security/tomoyo/profile"
120 #define proc_policy_manager "/sys/kernel/security/tomoyo/manager"
121 #define proc_policy_query "/sys/kernel/security/tomoyo/query"
122 #define proc_policy_grant_log "/sys/kernel/security/tomoyo/grant_log"
123 #define proc_policy_reject_log "/sys/kernel/security/tomoyo/reject_log"
124 #define proc_policy_domain_status "/sys/kernel/security/tomoyo/.domain_status"
125 #define proc_policy_process_status "/sys/kernel/security/tomoyo/.process_status"
[all …]
/third_party/eudev/src/shared/
Dsmack-util.c58 r = lsetxattr(path, "security.SMACK64", label, strlen(label), 0); in mac_smack_apply()
60 r = lremovexattr(path, "security.SMACK64"); in mac_smack_apply()
78 r = fsetxattr(fd, "security.SMACK64", label, strlen(label), 0); in mac_smack_apply_fd()
80 r = fremovexattr(fd, "security.SMACK64"); in mac_smack_apply_fd()
98 r = fsetxattr(fd, "security.SMACK64IPOUT", label, strlen(label), 0); in mac_smack_apply_ip_out_fd()
100 r = fremovexattr(fd, "security.SMACK64IPOUT"); in mac_smack_apply_ip_out_fd()
118 r = fsetxattr(fd, "security.SMACK64IPIN", label, strlen(label), 0); in mac_smack_apply_ip_in_fd()
120 r = fremovexattr(fd, "security.SMACK64IPIN"); in mac_smack_apply_ip_in_fd()
188 r = lsetxattr(path, "security.SMACK64", label, strlen(label), 0); in mac_smack_fix()
/third_party/grpc/src/core/lib/security/security_connector/alts/
Dalts_security_connector.h24 #include "src/core/lib/security/context/security_context.h"
25 #include "src/core/lib/security/credentials/alts/grpc_alts_credentials_options.h"
31 * This method creates an ALTS channel security connector.
37 * - sc: address of ALTS channel security connector instance to be returned from
49 * This method creates an ALTS server security connector.
52 * - sc: address of ALTS server security connector instance to be returned from

12345678910>>...80