/third_party/python/Doc/library/ |
D | security_warnings.rst | 3 .. index:: single: security considerations 8 The following modules have specific security considerations: 10 * :mod:`base64`: :ref:`base64 security considerations <base64-security>` in 12 * :mod:`cgi`: :ref:`CGI security considerations <cgi-security>` 17 basic security checks 19 <logging-eval-security>` 21 <multiprocessing-recv-pickle-security>` 23 * :mod:`random` shouldn't be used for security purposes, use :mod:`secrets` 26 dealing with untrusted sources <shelve-security>` 27 * :mod:`ssl`: :ref:`SSL/TLS security considerations <ssl-security>` [all …]
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_security_level.pod | 5 …rity_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data - SSL/TLS security framework 42 the security level to B<level>. If not set the library default security level 46 retrieve the current security level. 50 the security callback associated with B<ctx> or B<s>. If not set a default 51 security callback is used. The meaning of the parameters and the behaviour 62 If an application doesn't set its own security callback the default 75 The security level corresponds to a minimum of 80 bits of security. Any 76 parameters offering below 80 bits of security are excluded. As a result RSA, 79 less than 80 bits of security. SSL version 2 is prohibited. Any cipher suite 81 and MD5 are also forbidden at this level as they have less than 80 security [all …]
|
D | BN_security_bits.pod | 5 BN_security_bits - returns bits of security based on given numbers 15 BN_security_bits() returns the number of bits of security provided by a 16 specific algorithm and a particular key size. The bits of security is 20 parameters B<L> and B<N> are used to decide the bits of security, where 27 Number of security bits.
|
/third_party/ntfs-3g/src/ |
D | ntfs-3g.c | 297 scx->mapping[MAPUSERS] = ctx->security.mapping[MAPUSERS]; in ntfs_fuse_fill_security_context() 298 scx->mapping[MAPGROUPS] = ctx->security.mapping[MAPGROUPS]; in ntfs_fuse_fill_security_context() 312 return (ctx->security.mapping[MAPUSERS] != (struct MAPPING*)NULL); in ntfs_fuse_fill_security_context() 814 struct SECURITY_CONTEXT security; in ntfs_fuse_getattr() local 825 withusermapping = ntfs_fuse_fill_security_context(&security); in ntfs_fuse_getattr() 831 && !ntfs_allowed_dir_access(&security,path, in ntfs_fuse_getattr() 1034 if (ntfs_get_owner_mode(&security,ni,stbuf) < 0) in ntfs_fuse_getattr() 1379 struct SECURITY_CONTEXT security; in ntfs_fuse_opendir() local 1386 if (ntfs_fuse_fill_security_context(&security)) { in ntfs_fuse_opendir() 1399 ? !ntfs_allowed_dir_access(&security, in ntfs_fuse_opendir() [all …]
|
D | lowntfs-3g.c | 350 scx->mapping[MAPUSERS] = ctx->security.mapping[MAPUSERS]; in ntfs_fuse_fill_security_context() 351 scx->mapping[MAPGROUPS] = ctx->security.mapping[MAPGROUPS]; in ntfs_fuse_fill_security_context() 372 return (ctx->security.mapping[MAPUSERS] != (struct MAPPING*)NULL); in ntfs_fuse_fill_security_context() 988 struct SECURITY_CONTEXT security; in ntfs_fuse_getattr() local 994 ntfs_fuse_fill_security_context(req, &security); in ntfs_fuse_getattr() 995 res = ntfs_fuse_getstat(&security, ni, &stbuf); in ntfs_fuse_getattr() 1030 struct SECURITY_CONTEXT security; in ntfs_fuse_lookup() local 1043 if (ntfs_fuse_fill_security_context(req, &security) in ntfs_fuse_lookup() 1044 && !ntfs_allowed_access(&security,dir_ni,S_IEXEC)) { in ntfs_fuse_lookup() 1049 ntfs_fuse_fill_security_context(req, &security); in ntfs_fuse_lookup() [all …]
|
/third_party/node/deps/cares/ |
D | SECURITY.md | 1 c-ares security 4 This document is intended to provide guidance on how security vulnerabilities 15 issue to only the reporter and the project's security team. 20 The typical process for handling a new security vulnerability is as follows. 27 reference to the security nature of the commit if done prior to the public 31 privately to `c-ares-security@haxx.se`. That's an email alias that reaches a 35 security vulnerability in c-ares are ignored and no further action is 38 - A person in the security team sends an e-mail to the original reporter to 41 - The security team investigates the report and either rejects it or accepts 49 - The security team discusses the problem, works out a fix, considers the [all …]
|
/third_party/mbedtls/ |
D | SECURITY.md | 3 If you think you have found an Mbed TLS security vulnerability, then please 4 send an email to the security team at 5 <mbed-tls-security@lists.trustedfirmware.org>. 9 Our security process is detailled in our 10 [security 11 center](https://developer.trustedfirmware.org/w/mbed-tls/security-center/). 19 get security fixes.
|
D | BRANCHES.md | 7 security fixes. 11 as well as all the new features and bug fixes and security fixes. 14 features added after Mbed TLS 2.26.0 and bug fixes and security fixes. 16 these only get bug fixes and security fixes. 49 crypto that was found to be weak) may need to be changed. In case security 50 comes in conflict with backwards compatibility, we will put security first, 59 before, is in case those goals would conflict with fixing a security issue, we 60 will put security first but provide a compatibility option. (So far we never 62 increase code size for a security fix.)
|
/third_party/nghttp2/doc/sources/ |
D | security.rst | 12 open a new security advisory draft using `GitHub security feature 13 <https://github.com/nghttp2/nghttp2/security>`_ and discuss the 17 We write the security advisory and get CVE number from GitHub 24 security advisory (which includes all the details of the vulnerability 27 <https://oss-security.openwall.org/wiki/mailing-lists/distros>`_ 30 upcoming release will have a security fix. The ``SECURITY`` label is 36 vulnerability information to `oss-security 37 <https://oss-security.openwall.org/wiki/mailing-lists/oss-security>`_
|
/third_party/node/doc/guides/ |
D | security-release-process.md | 3 The security release process covers the steps required to plan/implement a 4 security release. This document is copied into the description of the Next 25 security release blog page: 49 * Subject: `Node.js security updates for all active release lines, Month Year` 53 For more information see: https://nodejs.org/en/blog/vulnerability/month-year-security-releases/ 57 * [ ] CC `oss-security@lists.openwall.com` on pre-release 61 `oss-security@lists.openwall.com` as a CC. 73 * [ ] Notify [docker-node][] of upcoming security release date: ***LINK*** 75 Heads up of Node.js security releases Day Month Year 77 …As per the Node.js security release process this is the FYI that there is going to be a security r… [all …]
|
/third_party/selinux/secilc/docs/ |
D | cil_sid_statements.md | 40 (sid security) 76 This will produce an ordered list of "`kernel security unlabeled`" 80 (sid security) 82 (sidorder (kernel security)) 83 (sidorder (security unlabeled)) 89 Associates an SELinux security [context](#context) to a previously declared [`sid`](cil_sid_stateme… 115 <td align="left"><p>A previously declared <code>context</code> identifier or an anonymous security … 122 This shows two named security context examples plus an anonymous context: 130 (sid security) 132 (sidcontext security security_context)
|
/third_party/gstreamer/ |
D | CVE.md | 6 | CVE-2021-3497 | 误报 | https://gstreamer.freedesktop.org/security/sa-2021-0002.html | 7 | CVE-2021-3498 | 误报 | https://gstreamer.freedesktop.org/security/sa-2021-0003.html | 9 | CVE-2023-37327 | 已修复 | https://gstreamer.freedesktop.org/security/sa-2023-0001.html | 10 | CVE-2023-37328 | 已修复 | https://gstreamer.freedesktop.org/security/sa-2023-0002.html | 11 | CVE-2023-37329 | 已修复 | https://gstreamer.freedesktop.org/security/sa-2023-0003.html |
|
/third_party/node/ |
D | SECURITY.md | 5 Report security bugs in Node.js via [HackerOne](https://hackerone.com/nodejs). 11 After the initial reply to your report, the security team will endeavor to keep 18 The Node.js project engages in an official bug bounty program for security 29 [Security Working Group repository](https://github.com/nodejs/security-wg/blob/HEAD/processes/third… 31 Thank you for improving the security of Node.js and its ecosystem. Your efforts 36 Here is the security disclosure policy for Node.js 38 * The security report is received and is assigned a primary handler. This 48 * On the embargo date, the Node.js security mailing list is sent a copy of the 63 ## Receiving security updates 74 [file an issue](https://github.com/nodejs/security-wg/issues/new) to discuss.
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Target/SystemZ/ |
D | SystemZFeatures.td | 72 "message-security-assist-extension3", "MessageSecurityAssist3", 73 "Assume that the message-security-assist extension facility 3 is installed" 77 "message-security-assist-extension4", "MessageSecurityAssist4", 78 "Assume that the message-security-assist extension facility 4 is installed" 167 "message-security-assist-extension5", "MessageSecurityAssist5", 168 "Assume that the message-security-assist extension facility 5 is installed" 207 "message-security-assist-extension7", "MessageSecurityAssist7", 208 "Assume that the message-security-assist extension facility 7 is installed" 212 "message-security-assist-extension8", "MessageSecurityAssist8", 213 "Assume that the message-security-assist extension facility 8 is installed" [all …]
|
/third_party/rust/crates/rustix/ |
D | SECURITY.md | 3 … core of what we do in the Bytecode Alliance. Contributions of external security researchers are a… 7 If you believe you've found a security issue in any website, service, or software owned or operated… 11 …at [security@bytecodealliance.org](mailto:security@bytecodealliance.org). Your submission will be … 15 The Bytecode Alliance supports safe harbor for security researchers who:
|
/third_party/vk-gl-cts/external/vulkan-docs/src/chapters/VK_NV_external_memory_win32/ |
D | handle_permissions.txt | 5 [open,refpage='VkExportMemoryWin32HandleInfoNV',desc='Specify security attributes and access rights… 10 the slink:VkExportMemoryAllocateInfoNV structure to specify security 21 structure specifying security attributes of the handle. 25 default security descriptor values will be used, and child processes created 33 …https://docs.microsoft.com/en-us/windows/win32/sync/synchronization-object-security-and-access-rig…
|
D | handle_permissions.adoc | 5 [open,refpage='VkExportMemoryWin32HandleInfoNV',desc='Specify security attributes and access rights… 10 the slink:VkExportMemoryAllocateInfoNV structure to specify security 21 structure specifying security attributes of the handle. 25 default security descriptor values will be used, and child processes created 33 …https://docs.microsoft.com/en-us/windows/win32/sync/synchronization-object-security-and-access-rig…
|
/third_party/grpc/ |
D | BUILD.gn | 725 "${GRPC_DIR}/src/core/ext/upb-generated/udpa/annotations/security.upb.c", 726 "${GRPC_DIR}/src/core/ext/upb-generated/udpa/annotations/security.upb.h", 901 "${GRPC_DIR}/src/core/ext/upbdefs-generated/udpa/annotations/security.upbdefs.c", 902 "${GRPC_DIR}/src/core/ext/upbdefs-generated/udpa/annotations/security.upbdefs.h", 1195 "${GRPC_DIR}/src/core/lib/security/authorization/authorization_engine.h", 1196 "${GRPC_DIR}/src/core/lib/security/authorization/cel_authorization_engine.cc", 1197 "${GRPC_DIR}/src/core/lib/security/authorization/cel_authorization_engine.h", 1198 "${GRPC_DIR}/src/core/lib/security/authorization/evaluate_args.cc", 1199 "${GRPC_DIR}/src/core/lib/security/authorization/evaluate_args.h", 1200 "${GRPC_DIR}/src/core/lib/security/authorization/matchers.cc", [all …]
|
/third_party/parse5/ |
D | SECURITY.md | 9 To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com…
|
/third_party/flutter/flutter/packages/flutter_tools/test/general.shard/ios/ |
D | code_signing_test.dart | 60 testUsingContext('No auto-sign if security or openssl not available', () async { 61 when(mockProcessManager.runSync(<String>['which', 'security'])) 71 when(mockProcessManager.runSync(<String>['which', 'security'])) 97 when(mockProcessManager.runSync(<String>['which', 'security'])) 114 <String>['security', 'find-certificate', '-c', '1111AAAA11', '-p'], 158 when(mockProcessManager.runSync(<String>['which', 'security'])) 175 <String>['security', 'find-certificate', '-c', '1111AAAA11', '-p'], 224 when(mockProcessManager.runSync(<String>['which', 'security'])) 245 <String>['security', 'find-certificate', '-c', '3333CCCC33', '-p'], 299 when(mockProcessManager.runSync(<String>['which', 'security'])) [all …]
|
/third_party/node/deps/npm/node_modules/npm-audit-report/ |
D | README.md | 1 # npm audit security report 3 Given a response from the npm security api, render it into a variety of security reports 12 report: 'string that contains the security report',
|
/third_party/node/deps/npm/node_modules/yargs/node_modules/strip-ansi/ |
D | readme.md | 13 … sustainable for maintainers while giving companies<br>assurances about security, maintenance, and… 41 To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com…
|
/third_party/node/deps/npm/node_modules/wrap-ansi/node_modules/strip-ansi/ |
D | readme.md | 13 … sustainable for maintainers while giving companies<br>assurances about security, maintenance, and… 41 To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com…
|
/third_party/node/deps/npm/node_modules/cliui/node_modules/strip-ansi/ |
D | readme.md | 13 … sustainable for maintainers while giving companies<br>assurances about security, maintenance, and… 41 To report a security vulnerability, please use the [Tidelift security contact](https://tidelift.com…
|
/third_party/icu/ohos_icu4j/src/main/java/ohos/global/icu/impl/ |
D | ICUConfig.java | 14 import java.security.AccessControlException; 15 import java.security.AccessController; 16 import java.security.PrivilegedAction;
|