Home
last modified time | relevance | path

Searched full:security (Results 1 – 25 of 2547) sorted by relevance

12345678910>>...102

/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_security_level.pod5 …rity_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data - SSL/TLS security framework
42 the security level to B<level>. If not set the library default security level
46 retrieve the current security level.
50 the security callback associated with B<ctx> or B<s>. If not set a default
51 security callback is used. The meaning of the parameters and the behaviour
62 If an application doesn't set its own security callback the default
75 The security level corresponds to a minimum of 80 bits of security. Any
76 parameters offering below 80 bits of security are excluded. As a result RSA,
79 less than 80 bits of security. SSL version 2 is prohibited. Any cipher suite
81 and MD5 are also forbidden at this level as they have less than 80 security
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_set_security_level.3140 …ity_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data \- SSL/TLS security framework
177 the security level to \fBlevel\fR. If not set the library default security level
181 retrieve the current security level.
185 the security callback associated with \fBctx\fR or \fBs\fR. If not set a default
186 security callback is used. The meaning of the parameters and the behaviour
196 If an application doesn't set its own security callback the default
205 The security level corresponds to a minimum of 80 bits of security. Any
206 parameters offering below 80 bits of security are excluded. As a result \s-1RSA,
209 less than 80 bits of security. \s-1SSL\s0 version 2 is prohibited. Any cipher suite
211 and \s-1MD5\s0 are also forbidden at this level as they have less than 80 security
[all …]
/freebsd/share/man/man7/
H A Dsdoc.735 .Nd guide to adding security considerations sections to manual pages
38 adding security considerations sections to manual pages.
47 system should contain a security considerations section
48 describing what security requirements can be broken
53 On one hand, security consideration sections must not be too verbose,
55 On the other hand, security consideration sections must not be incomplete,
59 in the security consideration section for a given feature of the
64 those general security requirements that can be violated
66 There are four classes of security requirements:
81 A good security considerations section
[all …]
H A Dsecurity.733 .Nm security
34 .Nd introduction to security under FreeBSD
42 security related topics.
44 Security is a function that begins and ends with the system administrator.
47 multi-user systems have some inherent security, the job of building and
48 maintaining additional security mechanisms to keep users
53 only as secure as you make them, and security concerns are ever competing
62 security becomes an ever bigger issue.
64 Security is best implemented through a layered onion approach.
66 what you want to do is to create as many layers of security as are convenient
[all …]
/freebsd/lib/libgssapi/
H A Dgssapi.332 .Nd "Generic Security Services API"
38 The Generic Security Service Application Programming Interface
39 provides security services to its callers,
43 security enhancements are integrated through invocation of services
48 and to apply security services such as confidentiality and integrity
60 A pair of communicating applications establish a joint security
62 The security context is a pair of GSS-API data structures that contain
64 security services may be provided.
66 a security context are cryptographic keys,
68 As part of the establishment of a security context,
[all …]
H A Dgss_export_sec_context.333 .Nd Transfer a security context to another process
48 requests and accepts security contexts over them,
52 deactivates the security context for the calling process and creates
60 a subsequent attempt by a context exporter to access the exported security context will fail.
64 either as a function of local security policy,
71 The interprocess token may contain security-sensitive information
84 associated with the security context,
88 export of the security context,
90 and should strive to leave the security context referenced by the
94 it is permissible for the implementation to delete the security
[all …]
H A Dgss_delete_sec_context.333 .Nd Discard a security context
45 Delete a security context.
48 security context,
56 No further security services may be obtained using the context
60 In addition to deleting established security contexts,
62 must also be able to delete "half-built" security contexts resulting
124 Generic Security Service Application Program Interface Version 2, Update 1
126 Generic Security Service API Version 2 : C-bindings
/freebsd/lib/librpcsec_gss/
H A Drpcsec_gss.337 is a security mechanism for the RPC protocol.
38 It uses the Generic Security Service API (GSS-API) to establish a
39 security context between a client and a server and to ensure that all
50 to establish a security context.
57 This type defines the types of security service required for
69 creating a security context.
79 Various details of the created security context are returned using
113 security context.
117 const char *mechanism; /* security mechanism */
178 Create a new security context
[all …]
H A Drpc_gss_seccreate.330 .Nd "create a security context using the RPCSEC_GSS protocol"
46 This function is used to establish a security context between an
58 The desired mechanism for this security context.
59 The value of mechanism should be the name of one of the security
78 Extra security context options to be passed to the underlying GSS-API
90 If the security context was created successfully, a pointer to an
93 To use this security context for subsequent RPC calls, set
/freebsd/crypto/heimdal/appl/ftp/ftpd/
H A DMakefile.am24 security.c \
32 $(ftpd_OBJECTS): security.h
34 security.c:
35 @test -f security.c || $(LN_S) $(srcdir)/../ftp/security.c .
36 security.h:
37 @test -f security.h || $(LN_S) $(srcdir)/../ftp/security.h .
41 CLEANFILES = security.c security.h gssapi.c
/freebsd/crypto/openssh/contrib/aix/
H A Dpam.conf7 sshd auth required /usr/lib/security/pam_aix
8 OTHER auth required /usr/lib/security/pam_aix
11 sshd account required /usr/lib/security/pam_aix
12 OTHER account required /usr/lib/security/pam_aix
15 sshd password required /usr/lib/security/pam_aix
16 OTHER password required /usr/lib/security/pam_aix
19 sshd session required /usr/lib/security/pam_aix
20 OTHER session required /usr/lib/security/pam_aix
/freebsd/tests/sys/kern/
H A Dsysctl_security_jail_children.sh36 origin_max=$(sysctl -n security.jail.children.max)
37 origin_cur=$(sysctl -n security.jail.children.cur)
52 atf_check_equal "$((origin_cur + 1))" "$(sysctl -n security.jail.children.cur)"
53 atf_check_equal "0" "$(jexec childfree sysctl -n security.jail.children.max)"
54 atf_check_equal "0" "$(jexec childfree sysctl -n security.jail.children.cur)"
57 atf_check_equal "$((origin_cur + 2))" "$(sysctl -n security.jail.children.cur)"
58 atf_check_equal "$((origin_max - 1))" "$(jexec maxallowed sysctl -n security.jail.children.max)"
59 atf_check_equal "0" "$(jexec maxallowed sysctl -n security.jail.children.cur)"
62 atf_check_equal "$((origin_cur + 3))" "$(sysctl -n security.jail.children.cur)"
63 atf_check_equal "1" "$(jexec maxallowed sysctl -n security.jail.children.cur)"
[all …]
/freebsd/usr.sbin/periodic/
H A Dperiodic.conf90 if [ $(sysctl -n security.jail.jailed) = 0 ]; then
160 # 450.status-security
161 daily_status_security_enable="YES" # Security check
162 # See also "Security options" below for more options
222 # 450.status-security
223 weekly_status_security_enable="YES" # Security check
224 # See also "Security options" above for more options
247 # 450.status-security
248 monthly_status_security_enable="YES" # Security check
249 # See also "Security options" above for more options
[all …]
/freebsd/crypto/openssh/contrib/
H A Dsshd.pam.generic2 auth required /lib/security/pam_unix.so shadow nodelay
3 account required /lib/security/pam_nologin.so
4 account required /lib/security/pam_unix.so
5 password required /lib/security/pam_cracklib.so
6 password required /lib/security/pam_unix.so shadow nullok use_authtok
7 session required /lib/security/pam_unix.so
8 session required /lib/security/pam_limits.so
/freebsd/share/man/man4/
H A Dmac_portacl.46 .\" Security Research Division of Network Associates, Inc. under
99 .Va security.mac.portacl.port_high
109 .Va security.mac.portacl.suser_exempt
118 .Va security.mac.portacl.rules ,
124 .It Va security.mac.portacl.enabled
129 .It Va security.mac.portacl.port_high
134 .It Va security.mac.portacl.rules
166 NOTE: MAC security policies may not override other security system policies
177 .It Va security.mac.portacl.suser_exempt
183 .It Va security.mac.portacl.autoport_exempt
[all …]
H A Dipsec.435 .Nd Internet Protocol Security protocol
47 is a security protocol implemented within the Internet Protocol layer
57 (for Encapsulating Security Payload)
63 that provide security services for IP datagrams.
75 and is designed for security gateways such as VPN endpoints.
101 is the process of associating keys with security associations, also
103 Policy management dictates when new security
155 may be used to configure per-socket security policies.
176 which means that if there is a security association then use it but if
182 which requires that a security association must exist for the packets
[all …]
H A Dmac_bsdextended.46 .\" Security Research Division of Network Associates, Inc. under
59 security policy module provides an interface for the system administrator
94 .It Va security.mac.bsdextended.enabled
96 .It Va security.mac.bsdextended.rule_count
99 .It Va security.mac.bsdextended.rule_slots
101 .It Va security.mac.bsdextended.firstmatch_enabled
105 .It Va security.mac.bsdextended.logging
110 .It Va security.mac.bsdextended.rules
144 Project by NAI Labs, the Security Research Division of Network Associates
H A Dmac_seeotheruids.46 .\" Security Research Division of Network Associates, Inc. under
66 .Va security.mac.seeotheruids.enabled
70 .Va security.mac.seeotheruids.suser_privileged
75 .Va security.mac.seeotheruids.primarygroup_enabled
80 .Va security.mac.seeotheruids.specificgid_enabled
82 .Va security.mac.seeotheruids.specificgid
112 the Security Research Division of Network Associates
/freebsd/lib/libpam/libpam/
H A DMakefile8 # ThinkSec AS and NAI Labs, the Security Research Division of Network
164 HEADERS= security/openpam.h \
165 security/openpam_attr.h \
166 security/openpam_version.h \
167 security/pam_appl.h \
168 security/pam_constants.h \
169 security/pam_modules.h \
170 security/pam_types.h \
172 ADD_HEADERS= security/pam_mod_misc.h
176 INCSDIR= ${INCLUDEDIR}/security
/freebsd/share/man/man9/
H A Dmac.99 .\" Associates Laboratories, the Security Research Division of Network
52 introduced system security modules to modify system security functionality.
53 This can be used to support a variety of new security services, including
58 The framework then calls out to security modules to offer them the
59 opportunity to modify security behavior at those MAC API entry points.
60 Both consumers of the API (normal kernel services) and security modules
85 framework and modules may retrieve security labels and attributes from the
131 developers maintain awareness of when security checks or relevant
171 Project by Network Associates Laboratories, the Security Research
182 and implemented by the Network Associates Laboratories Network Security
/freebsd/contrib/openbsm/man/
H A Daudit_warn.546 .Pa /etc/security/audit_messages .
52 .Bl -tag -width ".Pa /etc/security/audit_messages" -compact
53 .It Pa /etc/security/audit_warn
54 .It Pa /etc/security/audit_messages
60 The OpenBSM implementation was created by McAfee Research, the security
66 This software was created by McAfee Research, the security research division
73 The Basic Security Module (BSM) interface to audit records and audit event
/freebsd/contrib/unbound/
H A DSECURITY.md1 # Security Policy
9 highest minor and patch version level. We do not backport security fixes to
25 We take security very seriously. If you have discovered a security vulnerability
27 encrypted message to our Security Entry Point.
31 https://www.nlnetlabs.nl/security-report/
/freebsd/tests/sys/mac/portacl/
H A Dmisc.sh3 sysctl security.mac.portacl >/dev/null 2>&1
66 sysctl security.mac.portacl.rules= >/dev/null
84 sysctl security.mac.portacl.rules=${idtype}:${idstr}:${proto}:${port} >/dev/null
95 sysctl security.mac.portacl.rules= >/dev/null
99 suser_exempt=$(sysctl -n security.mac.portacl.suser_exempt)
100 port_high=$(sysctl -n security.mac.portacl.port_high)
104 sysctl -n security.mac.portacl.suser_exempt=${suser_exempt} >/dev/null
105 sysctl -n security.mac.portacl.port_high=${port_high} >/dev/null
H A Droot_test.sh8 # Verify if security.mac.portacl.suser_exempt=1 really exempts super-user.
12 sysctl security.mac.portacl.suser_exempt=1 >/dev/null
24 # Verify if security.mac.portacl.suser_exempt=0 really doesn't exempt super-user.
26 sysctl security.mac.portacl.suser_exempt=0 >/dev/null
38 # Verify if security.mac.portacl.port_high works for super-user.
40 sysctl security.mac.portacl.port_high=7778 >/dev/null
/freebsd/contrib/openbsm/bin/praudit/
H A Dpraudit.188 .Pa /etc/security/audit_event ;
94 .Bl -tag -width ".Pa /etc/security/audit_control" -compact
95 .It Pa /etc/security/audit_class
97 .It Pa /etc/security/audit_event
107 The OpenBSM implementation was created by McAfee Research, the security
113 This software was created by McAfee Research, the security research division
120 The Basic Security Module (BSM) interface to audit records and audit event

12345678910>>...102