Searched refs:security (Results 1 - 25 of 288) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/docs_src/ref/env/
H A DMakefile5 security.html
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cachefiles/
H A DMakefile13 security.o \
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/
H A Dar-security.c1 /* RxRPC security handling
26 * get an RxRPC security module
34 * release an RxRPC security module
42 * look up an rxrpc security module
68 * rxrpc_register_security - register an RxRPC security handler
69 * @sec: security module
71 * register an RxRPC security handler for use by RxRPC
89 printk(KERN_NOTICE "RxRPC: Registered security type %d '%s'\n",
102 * rxrpc_unregister_security - unregister an RxRPC security handler
103 * @sec: security modul
[all...]
H A DMakefile19 ar-security.o \
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/include/
H A Dcontext.h2 * AppArmor security module
92 struct aa_task_cxt *cxt = __task_cred(task)->security;
111 struct aa_task_cxt *cxt = cred->security;
139 const struct aa_task_cxt *cxt = current_cred()->security;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/
H A Dcontext.c2 * AppArmor security module
4 * This file contains AppArmor functions used to manipulate object security
79 struct aa_task_cxt *cxt = current_cred()->security;
90 cxt = new->security;
126 cxt = new->security;
153 cxt = new->security;
190 cxt = new->security;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/tests/
H A Dt_cltsrv.sh32 if test "`sysctl 2>/dev/null -n security.jail.jailed`" = 1 \
58 "${top_builddir}/src/openvpn/openvpn" --script-security 2 --cd "${root}" ${addopts} --setenv role srv --down "${downscript}" --tls-exit --ping-exit 180 --config "sample-config-files/loopback-server" &
59 "${top_builddir}/src/openvpn/openvpn" --script-security 2 --cd "${top_srcdir}/sample" ${addopts} --setenv role clt --down "${downscript}" --tls-exit --ping-exit 180 --config "sample-config-files/loopback-client"
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/
H A Dmin_addr.c3 #include <linux/security.h>
H A DMakefile2 # Makefile for the kernel security code
16 obj-$(CONFIG_SECURITY) += security.o capability.o
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/tomoyo/
H A Dtomoyo.c2 * security/tomoyo/tomoyo.c
9 #include <linux/security.h>
14 new->security = NULL;
21 struct tomoyo_domain_info *domain = old->security;
22 new->security = domain;
35 struct tomoyo_domain_info *domain = cred->security;
62 * "bprm->cred->security". New reference to "struct tomoyo_domain_info"
63 * stored inside "bprm->cred->security" will be acquired later inside
67 bprm->cred->security)->users);
72 bprm->cred->security
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/
H A Dxfrm.c2 * NSA Security-Enhanced Linux (SELinux) security module
32 * 3. Testing addition of sk_policy's with security context via setsockopt
36 #include <linux/security.h>
69 * Returns true if the xfrm contains a security blob for SELinux
73 return selinux_authorizable_ctx(x->security);
120 if (!xp->security)
121 if (x->security)
128 if (!x->security)
136 state_sid = x->security->ctx_sid;
176 struct xfrm_sec_ctx *ctx = x->security;
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/
H A Dwsse2api.c141 _wsse2__Security *security = soap_wsse_Security(soap);
142 if (security)
143 { ... = security->SOAP_ENV__actor; // SOAP 1.1
144 ... = security->SOAP_ENV__role; // SOAP 1.2
243 security tokens. A certificate is used to verify the digital signature of a
270 where Id is the identification string of the binary security token or NULL.
275 To attach a binary security token stored in a PEM file to a Security header
282 A binary security token can be automatically signed by setting its Id
300 Other types of binary security tokens can be added to the Security header block using:
345 To use a certificate for signature verification, add a direct security toke
776 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
824 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
841 { _wsse2__Security *security = soap_wsse_Security(soap); local
855 { _wsse2__Security *security = soap_wsse_Security(soap); local
877 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
901 { _wsse2__Security *security = soap_wsse_Security(soap); local
954 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
988 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
1024 { _wsse2__Security *security = soap_wsse_Security(soap); local
1127 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
1210 { _wsse2__Security *security = soap_wsse_Security(soap); local
[all...]
H A Dwsseapi.c140 _wsse__Security *security = soap_wsse_Security(soap);
141 if (security)
142 { ... = security->SOAP_ENV__actor; // SOAP 1.1
143 ... = security->SOAP_ENV__role; // SOAP 1.2
242 security tokens. A certificate is used to verify the digital signature of a
269 where Id is the identification string of the binary security token or NULL.
274 To attach a binary security token stored in a PEM file to a Security header
281 A binary security token can be automatically signed by setting its Id
299 Other types of binary security tokens can be added to the Security header block using:
344 To use a certificate for signature verification, add a direct security toke
841 { _wsse__Security *security = soap_wsse_add_Security(soap); local
889 { _wsse__Security *security = soap_wsse_add_Security(soap); local
906 { _wsse__Security *security = soap_wsse_Security(soap); local
920 { _wsse__Security *security = soap_wsse_Security(soap); local
942 { _wsse__Security *security = soap_wsse_add_Security(soap); local
966 { _wsse__Security *security = soap_wsse_Security(soap); local
1019 { _wsse__Security *security = soap_wsse_add_Security(soap); local
1053 { _wsse__Security *security = soap_wsse_add_Security(soap); local
1089 { _wsse__Security *security = soap_wsse_Security(soap); local
1192 { _wsse__Security *security = soap_wsse_add_Security(soap); local
1275 { _wsse__Security *security = soap_wsse_Security(soap); local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/
H A Dwsse2api.c141 _wsse2__Security *security = soap_wsse_Security(soap);
142 if (security)
143 { ... = security->SOAP_ENV__actor; // SOAP 1.1
144 ... = security->SOAP_ENV__role; // SOAP 1.2
243 security tokens. A certificate is used to verify the digital signature of a
270 where Id is the identification string of the binary security token or NULL.
275 To attach a binary security token stored in a PEM file to a Security header
282 A binary security token can be automatically signed by setting its Id
300 Other types of binary security tokens can be added to the Security header block using:
345 To use a certificate for signature verification, add a direct security toke
776 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
824 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
841 { _wsse2__Security *security = soap_wsse_Security(soap); local
855 { _wsse2__Security *security = soap_wsse_Security(soap); local
877 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
901 { _wsse2__Security *security = soap_wsse_Security(soap); local
954 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
988 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
1024 { _wsse2__Security *security = soap_wsse_Security(soap); local
1127 { _wsse2__Security *security = soap_wsse_add_Security(soap); local
1210 { _wsse2__Security *security = soap_wsse_Security(soap); local
[all...]
H A Dwsseapi.c140 _wsse__Security *security = soap_wsse_Security(soap);
141 if (security)
142 { ... = security->SOAP_ENV__actor; // SOAP 1.1
143 ... = security->SOAP_ENV__role; // SOAP 1.2
242 security tokens. A certificate is used to verify the digital signature of a
269 where Id is the identification string of the binary security token or NULL.
274 To attach a binary security token stored in a PEM file to a Security header
281 A binary security token can be automatically signed by setting its Id
299 Other types of binary security tokens can be added to the Security header block using:
344 To use a certificate for signature verification, add a direct security toke
841 { _wsse__Security *security = soap_wsse_add_Security(soap); local
889 { _wsse__Security *security = soap_wsse_add_Security(soap); local
906 { _wsse__Security *security = soap_wsse_Security(soap); local
920 { _wsse__Security *security = soap_wsse_Security(soap); local
942 { _wsse__Security *security = soap_wsse_add_Security(soap); local
966 { _wsse__Security *security = soap_wsse_Security(soap); local
1019 { _wsse__Security *security = soap_wsse_add_Security(soap); local
1053 { _wsse__Security *security = soap_wsse_add_Security(soap); local
1089 { _wsse__Security *security = soap_wsse_Security(soap); local
1192 { _wsse__Security *security = soap_wsse_add_Security(soap); local
1275 { _wsse__Security *security = soap_wsse_Security(soap); local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/pam_smbpass/
H A Dgeneral.h3 #include <security/pam_appl.h>
6 #include <security/pam_modules.h>
H A Dpam_smb_acct.c26 #include <security/pam_appl.h>
30 #include <security/pam_modules.h>
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bftpd-1.6.6/
H A Dlogin.h4 #include <security/pam_appl.h>
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/LDAP/smbldap-tools-0.9.2/
H A Dsmb.conf5 security = user
10 #security = ads
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/replace/system/
H A Dpasswd.h48 #include <sys/security.h>
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dpam_winbind.h17 #define PAM_WINBIND_CONFIG_FILE "/etc/security/pam_winbind.conf"
26 #include <security/pam_appl.h>
35 #include <security/pam_modules.h>
39 #include <security/_pam_macros.h>
41 /* Define required macros from (Linux PAM 0.68) security/_pam_macros.h */
74 #include <security/pam_ext.h>
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/usb/wusbcore/
H A DMakefile14 security.o \
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/afs/
H A DMakefile22 security.o \
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/wimax/
H A Dop-state-get.c29 #include <linux/security.h>
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ntfs-3g-2009.3.8/include/ntfs-3g/
H A DMakefile.am28 security.h \

Completed in 312 milliseconds

1234567891011>>