Searched refs:security (Results 176 - 200 of 288) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/
H A Duams_dhx_pam.c24 #include <security/pam_appl.h>
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/auth/
H A Dpampass.c44 #include <security/pam_appl.h>
506 * auth required /lib/security/pam_pwdb.so nullok shadow audit
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/sparc/kernel/
H A Dsys_sparc32.c42 #include <linux/security.h>
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/powerpc/kernel/
H A Dvdso.c23 #include <linux/security.h>
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/netfilter/
H A Dip_queue.c26 #include <linux/security.h>
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/
H A Dar-input.c209 /* if the packet need security things doing to it, then it goes down
211 if (call->conn->security)
H A Dar-internal.h55 struct list_head secureq; /* calls awaiting connection security clearance */
57 struct key *key; /* security for this socket */
58 struct key *securities; /* list of server security descriptors */
63 u32 min_sec_level; /* minimum security level */
99 * RxRPC security module interface
105 u8 security_index; /* security type provided */
107 /* initialise a connection's security */
110 /* prime a connection's packet security */
113 /* impose security on a packet */
119 /* verify the security o
244 struct rxrpc_security *security; /* applied security module */ member in struct:rxrpc_connection
[all...]
H A Dar-output.c670 /* pad out if we're using security */
671 if (conn->security) {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/
H A Dcommoncap.c15 #include <linux/security.h>
246 * affects the security markings on that inode, and if it is, should
267 * cap_inode_killpriv - Erase the security markings on an inode
270 * Erase the privilege-enhancing security markings on an inode.
560 * This is used to make sure security xattrs don't get updated or set by those
587 * This is used to make sure security xattrs don't get removed by those who
770 * cap_task_prctl - Implement process control functions for this security module
930 * capability security module. Returns 0 if this mapping should be allowed
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/keys/
H A Dprocess_keys.c19 #include <linux/security.h>
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/init/
H A Dmain.c33 #include <linux/security.h>
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/ipc/
H A Dutil.c28 #include <linux/security.h>
319 * ipc_check_perms - check security and permissions for an IPC
321 * @ops: the actual security routine to call
358 * / security checkings if the key is found.
H A Dsem.c81 #include <linux/security.h>
264 sma->sem_perm.security = NULL;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/
H A Dacct.c52 #include <linux/security.h>
H A Dptrace.c18 #include <linux/security.h>
132 /* Don't let security modules deny introspection */
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/arm/kernel/
H A Dptrace.c18 #include <linux/security.h>
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/
H A Dxfrm.h94 Q: allow to resolve security gateway?
220 struct xfrm_sec_ctx *security; member in struct:xfrm_state
499 struct xfrm_sec_ctx *security; member in struct:xfrm_policy
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/key/
H A Daf_key.c746 if ((xfrm_ctx = x->security)) {
983 /* security context */
1913 struct xfrm_sec_ctx *xfrm_ctx = xp->security;
2093 /* security context */
2094 if ((xfrm_ctx = xp->security)) {
2207 err = security_xfrm_policy_alloc(&xp->security, uctx);
3027 if ((xfrm_ctx = x->security)) {
3091 /* security context */
3164 /* security context too */
3180 *dir = security_xfrm_policy_alloc(&xp->security, uct
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/packaging/Mandrake/
H A Dsamba2.spec1070 mkdir -p $RPM_BUILD_ROOT/%{_lib}/security
1077 install -m 755 source/bin/pam_smbpass.so $RPM_BUILD_ROOT/%{_lib}/security/pam_smbpass%{samba_major}.so
1078 install -m 755 source/nsswitch/pam_winbind.so $RPM_BUILD_ROOT/%{_lib}/security/pam_winbind.so
1158 cat packaging/Mandrake/smb.conf|sed -e 's/^; winbind/ winbind/g;s/^; obey pam/ obey pam/g; s/^; printer admin = @"D/ printer admin = @"D/g;s/^; password server = \*/ password server = \*/g;s/^; template/ template/g; s/^ security = user/ security = domain/g' > packaging/Mandrake/smb-winbind.conf
1489 %attr(755,root,root) /%{_lib}/security/pam_smbpass*
1611 %attr(755,root,root) /%{_lib}/security/pam_winbind*
1843 - make release-depenent release tag more like security updates tags
2539 - 2.0.5a (bug security fix).
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/reiserfs/
H A Dinode.c1751 struct reiserfs_security_handle *security)
1930 if (security->name) {
1931 retval = reiserfs_security_write(th, inode, security);
1745 reiserfs_new_inode(struct reiserfs_transaction_handle *th, struct inode *dir, int mode, const char *symname, loff_t i_size, struct dentry *dentry, struct inode *inode, struct reiserfs_security_handle *security) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A DMakefile.vc10604 $(DIROBJ)\security.obj \
H A DMakefile.vc6604 $(DIROBJ)\security.obj \
H A DMakefile.vc8604 $(DIROBJ)\security.obj \
H A DMakefile.vc9604 $(DIROBJ)\security.obj \
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/
H A Dselinuxfs.c25 #include <linux/security.h>
32 /* selinuxfs pseudo filesystem for exporting the security policy API.
38 #include "security.h"
76 /* Check whether a task is allowed to use a security operation. */
84 tsec = __task_cred(tsk)->security;

Completed in 386 milliseconds

1234567891011>>