Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 646) sorted by relevance

12345678910>>...26

/third_party/python/Doc/library/
Dsecurity_warnings.rst3 .. index:: single: security considerations
8 The following modules have specific security considerations:
10 * :mod:`base64`: :ref:`base64 security considerations <base64-security>` in
12 * :mod:`cgi`: :ref:`CGI security considerations <cgi-security>`
17 basic security checks
19 <logging-eval-security>`
21 <multiprocessing-recv-pickle-security>`
23 * :mod:`random` shouldn't be used for security purposes, use :mod:`secrets`
26 dealing with untrusted sources <shelve-security>`
27 * :mod:`ssl`: :ref:`SSL/TLS security considerations <ssl-security>`
[all …]
/third_party/openssl/doc/man3/
DSSL_CTX_set_security_level.pod5 …rity_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data - SSL/TLS security framework
42 the security level to B<level>. If not set the library default security level
46 retrieve the current security level.
50 the security callback associated with B<ctx> or B<s>. If not set a default
51 security callback is used. The meaning of the parameters and the behaviour
62 If an application doesn't set its own security callback the default
75 The security level corresponds to a minimum of 80 bits of security. Any
76 parameters offering below 80 bits of security are excluded. As a result RSA,
79 less than 80 bits of security. SSL version 2 is prohibited. Any cipher suite
81 and MD5 are also forbidden at this level as they have less than 80 security
[all …]
DBN_security_bits.pod5 BN_security_bits - returns bits of security based on given numbers
15 BN_security_bits() returns the number of bits of security provided by a
16 specific algorithm and a particular key size. The bits of security is
20 parameters B<L> and B<N> are used to decide the bits of security, where
27 Number of security bits.
/third_party/ntfs-3g/src/
Dntfs-3g.c297 scx->mapping[MAPUSERS] = ctx->security.mapping[MAPUSERS]; in ntfs_fuse_fill_security_context()
298 scx->mapping[MAPGROUPS] = ctx->security.mapping[MAPGROUPS]; in ntfs_fuse_fill_security_context()
312 return (ctx->security.mapping[MAPUSERS] != (struct MAPPING*)NULL); in ntfs_fuse_fill_security_context()
814 struct SECURITY_CONTEXT security; in ntfs_fuse_getattr() local
825 withusermapping = ntfs_fuse_fill_security_context(&security); in ntfs_fuse_getattr()
831 && !ntfs_allowed_dir_access(&security,path, in ntfs_fuse_getattr()
1034 if (ntfs_get_owner_mode(&security,ni,stbuf) < 0) in ntfs_fuse_getattr()
1379 struct SECURITY_CONTEXT security; in ntfs_fuse_opendir() local
1386 if (ntfs_fuse_fill_security_context(&security)) { in ntfs_fuse_opendir()
1399 ? !ntfs_allowed_dir_access(&security, in ntfs_fuse_opendir()
[all …]
Dlowntfs-3g.c350 scx->mapping[MAPUSERS] = ctx->security.mapping[MAPUSERS]; in ntfs_fuse_fill_security_context()
351 scx->mapping[MAPGROUPS] = ctx->security.mapping[MAPGROUPS]; in ntfs_fuse_fill_security_context()
372 return (ctx->security.mapping[MAPUSERS] != (struct MAPPING*)NULL); in ntfs_fuse_fill_security_context()
988 struct SECURITY_CONTEXT security; in ntfs_fuse_getattr() local
994 ntfs_fuse_fill_security_context(req, &security); in ntfs_fuse_getattr()
995 res = ntfs_fuse_getstat(&security, ni, &stbuf); in ntfs_fuse_getattr()
1030 struct SECURITY_CONTEXT security; in ntfs_fuse_lookup() local
1043 if (ntfs_fuse_fill_security_context(req, &security) in ntfs_fuse_lookup()
1044 && !ntfs_allowed_access(&security,dir_ni,S_IEXEC)) { in ntfs_fuse_lookup()
1049 ntfs_fuse_fill_security_context(req, &security); in ntfs_fuse_lookup()
[all …]
/third_party/node/deps/cares/
DSECURITY.md1 c-ares security
4 This document is intended to provide guidance on how security vulnerabilities
15 issue to only the reporter and the project's security team.
20 The typical process for handling a new security vulnerability is as follows.
27 reference to the security nature of the commit if done prior to the public
31 privately to `c-ares-security@haxx.se`. That's an email alias that reaches a
35 security vulnerability in c-ares are ignored and no further action is
38 - A person in the security team sends an e-mail to the original reporter to
41 - The security team investigates the report and either rejects it or accepts
49 - The security team discusses the problem, works out a fix, considers the
[all …]
/third_party/mbedtls/
DSECURITY.md3 If you think you have found an Mbed TLS security vulnerability, then please
4 send an email to the security team at
5 <mbed-tls-security@lists.trustedfirmware.org>.
9 Our security process is detailled in our
10 [security
11 center](https://developer.trustedfirmware.org/w/mbed-tls/security-center/).
19 get security fixes.
DBRANCHES.md7 security fixes.
11 as well as all the new features and bug fixes and security fixes.
14 features added after Mbed TLS 2.26.0 and bug fixes and security fixes.
16 these only get bug fixes and security fixes.
49 crypto that was found to be weak) may need to be changed. In case security
50 comes in conflict with backwards compatibility, we will put security first,
59 before, is in case those goals would conflict with fixing a security issue, we
60 will put security first but provide a compatibility option. (So far we never
62 increase code size for a security fix.)
/third_party/nghttp2/doc/sources/
Dsecurity.rst12 open a new security advisory draft using `GitHub security feature
13 <https://github.com/nghttp2/nghttp2/security>`_ and discuss the
17 We write the security advisory and get CVE number from GitHub
24 security advisory (which includes all the details of the vulnerability
27 <https://oss-security.openwall.org/wiki/mailing-lists/distros>`_
30 upcoming release will have a security fix. The ``SECURITY`` label is
36 vulnerability information to `oss-security
37 <https://oss-security.openwall.org/wiki/mailing-lists/oss-security>`_
/third_party/node/doc/guides/
Dsecurity-release-process.md3 The security release process covers the steps required to plan/implement a
4 security release. This document is copied into the description of the Next
25 security release blog page:
49 * Subject: `Node.js security updates for all active release lines, Month Year`
53 For more information see: https://nodejs.org/en/blog/vulnerability/month-year-security-releases/
57 * [ ] CC `oss-security@lists.openwall.com` on pre-release
61 `oss-security@lists.openwall.com` as a CC.
73 * [ ] Notify [docker-node][] of upcoming security release date: ***LINK***
75 Heads up of Node.js security releases Day Month Year
77 …As per the Node.js security release process this is the FYI that there is going to be a security r…
[all …]
/third_party/selinux/secilc/docs/
Dcil_sid_statements.md40 (sid security)
76 This will produce an ordered list of "`kernel security unlabeled`"
80 (sid security)
82 (sidorder (kernel security))
83 (sidorder (security unlabeled))
89 Associates an SELinux security [context](#context) to a previously declared [`sid`](cil_sid_stateme…
115 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security
122 This shows two named security context examples plus an anonymous context:
130 (sid security)
132 (sidcontext security security_context)
/third_party/gstreamer/
DCVE.md6 | CVE-2021-3497 | 误报 | https://gstreamer.freedesktop.org/security/sa-2021-0002.html |
7 | CVE-2021-3498 | 误报 | https://gstreamer.freedesktop.org/security/sa-2021-0003.html |
9 | CVE-2023-37327 | 已修复 | https://gstreamer.freedesktop.org/security/sa-2023-0001.html |
10 | CVE-2023-37328 | 已修复 | https://gstreamer.freedesktop.org/security/sa-2023-0002.html |
11 | CVE-2023-37329 | 已修复 | https://gstreamer.freedesktop.org/security/sa-2023-0003.html |
/third_party/node/
DSECURITY.md5 Report security bugs in Node.js via [HackerOne](https://hackerone.com/nodejs).
11 After the initial reply to your report, the security team will endeavor to keep
18 The Node.js project engages in an official bug bounty program for security
29 [Security Working Group repository](https://github.com/nodejs/security-wg/blob/HEAD/processes/third…
31 Thank you for improving the security of Node.js and its ecosystem. Your efforts
36 Here is the security disclosure policy for Node.js
38 * The security report is received and is assigned a primary handler. This
48 * On the embargo date, the Node.js security mailing list is sent a copy of the
63 ## Receiving security updates
74 [file an issue](https://github.com/nodejs/security-wg/issues/new) to discuss.
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/SystemZ/
DSystemZFeatures.td72 "message-security-assist-extension3", "MessageSecurityAssist3",
73 "Assume that the message-security-assist extension facility 3 is installed"
77 "message-security-assist-extension4", "MessageSecurityAssist4",
78 "Assume that the message-security-assist extension facility 4 is installed"
167 "message-security-assist-extension5", "MessageSecurityAssist5",
168 "Assume that the message-security-assist extension facility 5 is installed"
207 "message-security-assist-extension7", "MessageSecurityAssist7",
208 "Assume that the message-security-assist extension facility 7 is installed"
212 "message-security-assist-extension8", "MessageSecurityAssist8",
213 "Assume that the message-security-assist extension facility 8 is installed"
[all …]
/third_party/rust/crates/rustix/
DSECURITY.md3 … core of what we do in the Bytecode Alliance. Contributions of external security researchers are a…
7 If you believe you've found a security issue in any website, service, or software owned or operated…
11 …at [security@bytecodealliance.org](mailto:security@bytecodealliance.org). Your submission will be …
15 The Bytecode Alliance supports safe harbor for security researchers who:
/third_party/vk-gl-cts/external/vulkan-docs/src/chapters/VK_NV_external_memory_win32/
Dhandle_permissions.txt5 [open,refpage='VkExportMemoryWin32HandleInfoNV',desc='Specify security attributes and access rights…
10 the slink:VkExportMemoryAllocateInfoNV structure to specify security
21 structure specifying security attributes of the handle.
25 default security descriptor values will be used, and child processes created
33 …https://docs.microsoft.com/en-us/windows/win32/sync/synchronization-object-security-and-access-rig…
Dhandle_permissions.adoc5 [open,refpage='VkExportMemoryWin32HandleInfoNV',desc='Specify security attributes and access rights…
10 the slink:VkExportMemoryAllocateInfoNV structure to specify security
21 structure specifying security attributes of the handle.
25 default security descriptor values will be used, and child processes created
33 …https://docs.microsoft.com/en-us/windows/win32/sync/synchronization-object-security-and-access-rig…
/third_party/grpc/
DBUILD.gn725 "${GRPC_DIR}/src/core/ext/upb-generated/udpa/annotations/security.upb.c",
726 "${GRPC_DIR}/src/core/ext/upb-generated/udpa/annotations/security.upb.h",
901 "${GRPC_DIR}/src/core/ext/upbdefs-generated/udpa/annotations/security.upbdefs.c",
902 "${GRPC_DIR}/src/core/ext/upbdefs-generated/udpa/annotations/security.upbdefs.h",
1195 "${GRPC_DIR}/src/core/lib/security/authorization/authorization_engine.h",
1196 "${GRPC_DIR}/src/core/lib/security/authorization/cel_authorization_engine.cc",
1197 "${GRPC_DIR}/src/core/lib/security/authorization/cel_authorization_engine.h",
1198 "${GRPC_DIR}/src/core/lib/security/authorization/evaluate_args.cc",
1199 "${GRPC_DIR}/src/core/lib/security/authorization/evaluate_args.h",
1200 "${GRPC_DIR}/src/core/lib/security/authorization/matchers.cc",
[all …]
/third_party/parse5/
DSECURITY.md9 To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com…
/third_party/flutter/flutter/packages/flutter_tools/test/general.shard/ios/
Dcode_signing_test.dart60 testUsingContext('No auto-sign if security or openssl not available', () async {
61 when(mockProcessManager.runSync(<String>['which', 'security']))
71 when(mockProcessManager.runSync(<String>['which', 'security']))
97 when(mockProcessManager.runSync(<String>['which', 'security']))
114 <String>['security', 'find-certificate', '-c', '1111AAAA11', '-p'],
158 when(mockProcessManager.runSync(<String>['which', 'security']))
175 <String>['security', 'find-certificate', '-c', '1111AAAA11', '-p'],
224 when(mockProcessManager.runSync(<String>['which', 'security']))
245 <String>['security', 'find-certificate', '-c', '3333CCCC33', '-p'],
299 when(mockProcessManager.runSync(<String>['which', 'security']))
[all …]
/third_party/node/deps/npm/node_modules/npm-audit-report/
DREADME.md1 # npm audit security report
3 Given a response from the npm security api, render it into a variety of security reports
12 report: 'string that contains the security report',
/third_party/node/deps/npm/node_modules/yargs/node_modules/strip-ansi/
Dreadme.md13 … sustainable for maintainers while giving companies<br>assurances about security, maintenance, and…
41 To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com…
/third_party/node/deps/npm/node_modules/wrap-ansi/node_modules/strip-ansi/
Dreadme.md13 … sustainable for maintainers while giving companies<br>assurances about security, maintenance, and…
41 To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com…
/third_party/node/deps/npm/node_modules/cliui/node_modules/strip-ansi/
Dreadme.md13 … sustainable for maintainers while giving companies<br>assurances about security, maintenance, and…
41 To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com…
/third_party/icu/ohos_icu4j/src/main/java/ohos/global/icu/impl/
DICUConfig.java14 import java.security.AccessControlException;
15 import java.security.AccessController;
16 import java.security.PrivilegedAction;

12345678910>>...26