Lines Matching defs:security
210 * list of properties that are related to security flavors.
226 sa_security_t security;
311 * security flavor.
329 * Walk the current list of security flavors and return true if it is
337 if (seclist->security == sec)
347 * group's list of security optionsets. We also keep a list of
371 /* add to the security list if it isn't there already */
377 curp->security = sa_create_security(
380 curp->security = check;
475 prop = sa_get_property(sec->security, name);
482 * The security options of ro/rw/root/uidmap/gidmap
528 ret = sa_add_property(sec->security,
537 ret = sa_add_property(sec->security, prop);
540 ret = sa_commit_properties(sec->security, !persist);
585 /* HAVE security flavors so check them */
655 * check if security types are present and validate them. If
688 * add either the option or the security option as needed. If
715 * Once in security parsing, we only
716 * do security. We do need to move
717 * between the security node and the
718 * toplevel. The security tag goes on
720 * go on the security.
742 * default security model. This must be
744 * "standard" security structure.
750 * security
1072 * a principal name according to the security
1133 /* named security type needs secinfo to be filled in */
1300 * Count the number of security types (flavors). The optionset has
1301 * been populated with the security flavors as a holding mechanism.
1441 sa_security_t security = NULL;
1458 * these if we find them and then add any security definitions.
1503 security =
1506 if (security != NULL) {
1519 for (prop = sa_get_property(security,
1528 sa_free_derived_optionset(security);
1547 if (security != NULL)
1548 sa_free_derived_optionset(security);
1794 * find the optionsets and security sets. There may not be
1796 * security may have multiple, one per security type per
1814 * do non-security options first since there is only one after
1844 "NFS: NFS: no memory for security\n"));
1851 * since we must have one security option defined, we
1853 * defined security options. This handles the case
1863 "get default security mode\n"));
1876 * exporting with incorrect security,
2359 sa_security_t security;
2368 for (security = sa_get_security(parent_group,
2369 NULL, NULL); security != NULL;
2370 security = sa_get_next_security(security)) {
2374 type = sa_get_security_attr(security,
2385 sectype = sa_get_security_attr(security,
3182 * Lookup the space (security) name. If it is default, convert to the