/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_dhx_pam.c | 24 #include <security/pam_appl.h>
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/ |
H A D | pampass.c | 44 #include <security/pam_appl.h> 506 * auth required /lib/security/pam_pwdb.so nullok shadow audit
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/sparc/kernel/ |
H A D | sys_sparc32.c | 42 #include <linux/security.h>
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/powerpc/kernel/ |
H A D | vdso.c | 23 #include <linux/security.h>
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/netfilter/ |
H A D | ip_queue.c | 26 #include <linux/security.h>
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/ |
H A D | ar-input.c | 209 /* if the packet need security things doing to it, then it goes down 211 if (call->conn->security)
|
H A D | ar-internal.h | 55 struct list_head secureq; /* calls awaiting connection security clearance */ 57 struct key *key; /* security for this socket */ 58 struct key *securities; /* list of server security descriptors */ 63 u32 min_sec_level; /* minimum security level */ 99 * RxRPC security module interface 105 u8 security_index; /* security type provided */ 107 /* initialise a connection's security */ 110 /* prime a connection's packet security */ 113 /* impose security on a packet */ 119 /* verify the security o 244 struct rxrpc_security *security; /* applied security module */ member in struct:rxrpc_connection [all...] |
H A D | ar-output.c | 670 /* pad out if we're using security */ 671 if (conn->security) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/ |
H A D | commoncap.c | 15 #include <linux/security.h> 246 * affects the security markings on that inode, and if it is, should 267 * cap_inode_killpriv - Erase the security markings on an inode 270 * Erase the privilege-enhancing security markings on an inode. 560 * This is used to make sure security xattrs don't get updated or set by those 587 * This is used to make sure security xattrs don't get removed by those who 770 * cap_task_prctl - Implement process control functions for this security module 930 * capability security module. Returns 0 if this mapping should be allowed
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/keys/ |
H A D | process_keys.c | 19 #include <linux/security.h>
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/init/ |
H A D | main.c | 33 #include <linux/security.h>
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/ipc/ |
H A D | util.c | 28 #include <linux/security.h> 319 * ipc_check_perms - check security and permissions for an IPC 321 * @ops: the actual security routine to call 358 * / security checkings if the key is found.
|
H A D | sem.c | 81 #include <linux/security.h> 264 sma->sem_perm.security = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/ |
H A D | acct.c | 52 #include <linux/security.h>
|
H A D | ptrace.c | 18 #include <linux/security.h> 132 /* Don't let security modules deny introspection */
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/arm/kernel/ |
H A D | ptrace.c | 18 #include <linux/security.h>
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/ |
H A D | xfrm.h | 94 Q: allow to resolve security gateway? 220 struct xfrm_sec_ctx *security; member in struct:xfrm_state 499 struct xfrm_sec_ctx *security; member in struct:xfrm_policy
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/key/ |
H A D | af_key.c | 746 if ((xfrm_ctx = x->security)) { 983 /* security context */ 1913 struct xfrm_sec_ctx *xfrm_ctx = xp->security; 2093 /* security context */ 2094 if ((xfrm_ctx = xp->security)) { 2207 err = security_xfrm_policy_alloc(&xp->security, uctx); 3027 if ((xfrm_ctx = x->security)) { 3091 /* security context */ 3164 /* security context too */ 3180 *dir = security_xfrm_policy_alloc(&xp->security, uct [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/packaging/Mandrake/ |
H A D | samba2.spec | 1070 mkdir -p $RPM_BUILD_ROOT/%{_lib}/security 1077 install -m 755 source/bin/pam_smbpass.so $RPM_BUILD_ROOT/%{_lib}/security/pam_smbpass%{samba_major}.so 1078 install -m 755 source/nsswitch/pam_winbind.so $RPM_BUILD_ROOT/%{_lib}/security/pam_winbind.so 1158 cat packaging/Mandrake/smb.conf|sed -e 's/^; winbind/ winbind/g;s/^; obey pam/ obey pam/g; s/^; printer admin = @"D/ printer admin = @"D/g;s/^; password server = \*/ password server = \*/g;s/^; template/ template/g; s/^ security = user/ security = domain/g' > packaging/Mandrake/smb-winbind.conf 1489 %attr(755,root,root) /%{_lib}/security/pam_smbpass* 1611 %attr(755,root,root) /%{_lib}/security/pam_winbind* 1843 - make release-depenent release tag more like security updates tags 2539 - 2.0.5a (bug security fix).
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/reiserfs/ |
H A D | inode.c | 1751 struct reiserfs_security_handle *security) 1930 if (security->name) { 1931 retval = reiserfs_security_write(th, inode, security); 1745 reiserfs_new_inode(struct reiserfs_transaction_handle *th, struct inode *dir, int mode, const char *symname, loff_t i_size, struct dentry *dentry, struct inode *inode, struct reiserfs_security_handle *security) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | Makefile.vc10 | 604 $(DIROBJ)\security.obj \
|
H A D | Makefile.vc6 | 604 $(DIROBJ)\security.obj \
|
H A D | Makefile.vc8 | 604 $(DIROBJ)\security.obj \
|
H A D | Makefile.vc9 | 604 $(DIROBJ)\security.obj \
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/ |
H A D | selinuxfs.c | 25 #include <linux/security.h> 32 /* selinuxfs pseudo filesystem for exporting the security policy API. 38 #include "security.h" 76 /* Check whether a task is allowed to use a security operation. */ 84 tsec = __task_cred(tsk)->security;
|