Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 780) sorted by relevance

12345678910>>...32

/freebsd/crypto/heimdal/appl/ftp/ftpd/
H A DMakefile.am24 security.c \
32 $(ftpd_OBJECTS): security.h
34 security.c:
35 @test -f security.c || $(LN_S) $(srcdir)/../ftp/security.c .
36 security.h:
37 @test -f security.h || $(LN_S) $(srcdir)/../ftp/security.h .
41 CLEANFILES = security.c security.h gssapi.c
/freebsd/crypto/openssh/contrib/aix/
H A Dpam.conf7 sshd auth required /usr/lib/security/pam_aix
8 OTHER auth required /usr/lib/security/pam_aix
11 sshd account required /usr/lib/security/pam_aix
12 OTHER account required /usr/lib/security/pam_aix
15 sshd password required /usr/lib/security/pam_aix
16 OTHER password required /usr/lib/security/pam_aix
19 sshd session required /usr/lib/security/pam_aix
20 OTHER session required /usr/lib/security/pam_aix
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_security_level.pod5 …rity_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data - SSL/TLS security framework
42 the security level to B<level>. If not set the library default security level
46 retrieve the current security level.
50 the security callback associated with B<ctx> or B<s>. If not set a default
51 security callback is used. The meaning of the parameters and the behaviour
62 If an application doesn't set its own security callback the default
75 The security level corresponds to a minimum of 80 bits of security. Any
76 parameters offering below 80 bits of security are excluded. As a result RSA,
81 have less than 80 security bits. Additionally, SSLv3, TLS 1.0, TLS 1.1 and
86 Security level set to 112 bits of security. As a result RSA, DSA and DH keys
[all …]
H A DBN_security_bits.pod5 BN_security_bits - returns bits of security based on given numbers
15 BN_security_bits() returns the number of bits of security provided by a
16 specific algorithm and a particular key size. The bits of security is
20 parameters B<L> and B<N> are used to decide the bits of security, where
27 Number of security bits.
/freebsd/crypto/openssh/contrib/
H A Dsshd.pam.generic2 auth required /lib/security/pam_unix.so shadow nodelay
3 account required /lib/security/pam_nologin.so
4 account required /lib/security/pam_unix.so
5 password required /lib/security/pam_cracklib.so
6 password required /lib/security/pam_unix.so shadow nullok use_authtok
7 session required /lib/security/pam_unix.so
8 session required /lib/security/pam_limits.so
/freebsd/tests/sys/mac/portacl/
H A Dmisc.sh56 sysctl security.mac.portacl.rules= >/dev/null
74 sysctl security.mac.portacl.rules=${idtype}:${idstr}:${proto}:${port} >/dev/null
85 sysctl security.mac.portacl.rules= >/dev/null
88 portacl_enabled=$(sysctl -n security.mac.portacl.enabled)
90 suser_exempt=$(sysctl -n security.mac.portacl.suser_exempt)
91 port_high=$(sysctl -n security.mac.portacl.port_high)
95 sysctl -n security.mac.portacl.suser_exempt=${suser_exempt} >/dev/null
96 sysctl -n security.mac.portacl.port_high=${port_high} >/dev/null
97 sysctl -n security.mac.portacl.enabled=${portacl_enabled} >/dev/null
H A Dnobody_test.sh14 sysctl security.mac.portacl.suser_exempt=1 >/dev/null
16 sysctl security.mac.portacl.enabled=1 >/dev/null
28 sysctl security.mac.portacl.suser_exempt=0 >/dev/null
42 sysctl security.mac.portacl.port_high=7778 >/dev/null
57 sysctl security.mac.portacl.port_high=7776 >/dev/null
H A Droot_test.sh12 sysctl security.mac.portacl.suser_exempt=1 >/dev/null
13 sysctl security.mac.portacl.enabled=1 >/dev/null
27 sysctl security.mac.portacl.suser_exempt=0 >/dev/null
41 sysctl security.mac.portacl.port_high=7778 >/dev/null
/freebsd/contrib/unbound/validator/
H A Dvalidator.c446 if (ret_msg && ret_msg->rep->security > sec_status_bogus) in already_validated()
449 sec_status_to_string(ret_msg->rep->security)); in already_validated()
710 …((struct packed_rrset_data*)chase_reply->rrsets[i-1]->entry.data)->security == sec_status_secure && in validate_msg_signatures()
715 ((struct packed_rrset_data*)s->entry.data)->security = in validate_msg_signatures()
738 chase_reply->security = sec_status_bogus; in validate_msg_signatures()
780 chase_reply->security = sec_status_bogus; in validate_msg_signatures()
920 ->entry.data)->security == sec_status_secure) in detect_wrongly_truncated()
925 ->entry.data)->security != sec_status_secure) in detect_wrongly_truncated()
1032 chase_reply->security = sec_status_bogus; in validate_positive_response()
1080 chase_reply->security = sec_status_insecure; in validate_positive_response()
[all …]
/freebsd/tests/sys/mac/ipacl/
H A Dipacl_test.sh57 sysctl security.mac.ipacl.ipv4=0
66 sysctl security.mac.ipacl.ipv4=1
67 sysctl security.mac.ipacl.rules=
78 sysctl security.mac.ipacl.rules="${rule}"
115 sysctl security.mac.ipacl.rules="${rule}"
137 sysctl security.mac.ipacl.rules="${prev_ipacl_rules}"
138 sysctl security.mac.ipacl.ipv4="${prev_ipacl_ipv4}"
172 sysctl security.mac.ipacl.ipv6=0
181 sysctl security.mac.ipacl.ipv6=1
182 sysctl security.mac.ipacl.rules=
[all …]
/freebsd/usr.sbin/bsdinstall/scripts/
H A Dhardening63 echo security.bsd.see_other_uids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
66 echo security.bsd.see_other_gids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
69 echo security.bsd.see_jail_proc=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
72 echo security.bsd.unprivileged_read_msgbuf=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
75 echo security.bsd.unprivileged_proc_debug=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
/freebsd/usr.sbin/periodic/etc/daily/
H A D450.status-security27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX`
29 periodic security > $tempfile || rc=3
38 periodic security || rc=3;;
41 periodic security || rc=3;;
/freebsd/usr.sbin/periodic/etc/monthly/
H A D450.status-security27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX`
29 periodic security > $tempfile || rc=3
38 periodic security || rc=3;;
41 periodic security || rc=3;;
/freebsd/usr.sbin/periodic/etc/weekly/
H A D450.status-security27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX`
29 periodic security > $tempfile || rc=3
38 periodic security || rc=3;;
41 periodic security || rc=3;;
/freebsd/contrib/unbound/services/cache/
H A Drrset.c139 if( newd->security == sec_status_secure && in need_to_update_rrset()
140 cached->security != sec_status_secure) in need_to_update_rrset()
142 if( cached->security == sec_status_bogus && in need_to_update_rrset()
143 newd->security != sec_status_bogus && !equal) in need_to_update_rrset()
150 cached->security == sec_status_bogus) in need_to_update_rrset()
393 if(updata->security > cachedata->security) { in rrset_update_sec_status()
397 cachedata->security = updata->security; in rrset_update_sec_status()
402 updata->security == sec_status_bogus) { in rrset_update_sec_status()
432 if(cachedata->security > updata->security) { in rrset_check_sec_status()
433 updata->security = cachedata->security; in rrset_check_sec_status()
[all …]
/freebsd/sys/contrib/openzfs/config/
H A Duser-pam.m410 [install pam module in dir [[$libdir/security]]]),
11 [pammoduledir="$withval"],[pammoduledir=$libdir/security])
20 AC_CHECK_HEADERS([security/pam_modules.h], [
25 *** security/pam_modules.h missing, libpam0g-dev package required
/freebsd/contrib/libfido2/
H A DSECURITY.md3 To report security issues in libfido2, please contact security@yubico.com.
5 https://www.yubico.com/support/security-advisories/issue-rating-system/.
/freebsd/tools/test/stress2/misc/
H A Dstack_guard_page.sh32 [ `sysctl -n security.bsd.stack_guard_page` -eq 0 ] && exit 0
34 old=`sysctl -n security.bsd.stack_guard_page`
41 sysctl security.bsd.stack_guard_page=`jot -r 1 1 512` > \
/freebsd/usr.sbin/periodic/etc/security/
H A D500.ipfwdenied37 . /etc/periodic/security/security.functions
43 TMP=`mktemp -t security`
H A D510.ipfdenied37 . /etc/periodic/security/security.functions
43 TMP=`mktemp -t security`
H A D610.ipf6denied37 . /etc/periodic/security/security.functions
43 TMP=`mktemp ${TMPDIR:-/tmp}/security.XXXXXXXXXX`
H A D520.pfdenied37 . /etc/periodic/security/security.functions
43 TMP=`mktemp -t security`
/freebsd/contrib/llvm-project/llvm/lib/Target/SystemZ/
H A DSystemZFeatures.td89 …"message-security-assist-extension3", "MessageSecurityAssist3", (all_of FeatureMessageSecurityAssi…
90 "Assume that the message-security-assist extension facility 3 is installed"
94 …"message-security-assist-extension4", "MessageSecurityAssist4", (all_of FeatureMessageSecurityAssi…
95 "Assume that the message-security-assist extension facility 4 is installed"
184 …"message-security-assist-extension5", "MessageSecurityAssist5", (all_of FeatureMessageSecurityAssi…
185 "Assume that the message-security-assist extension facility 5 is installed"
224 …"message-security-assist-extension7", "MessageSecurityAssist7", (all_of FeatureMessageSecurityAssi…
225 "Assume that the message-security-assist extension facility 7 is installed"
229 …"message-security-assist-extension8", "MessageSecurityAssist8", (all_of FeatureMessageSecurityAssi…
230 "Assume that the message-security-assist extension facility 8 is installed"
[all …]
/freebsd/contrib/unbound/
H A DSECURITY.md9 highest minor and patch version level. We do not backport security fixes to
25 We take security very seriously. If you have discovered a security vulnerability
31 https://www.nlnetlabs.nl/security-report/
/freebsd/sys/contrib/openzfs/lib/libshare/os/linux/
H A Dnfs.c57 const char *host, const char *security, const char *access, void *cookie);
128 const char *security; member
150 udata->security = value; in foreach_nfs_host_cb()
209 udata->sharepath, host, udata->security, in foreach_nfs_host_cb()
240 udata.security = "sys"; in foreach_nfs_host()
424 const char *host, const char *security, const char *access_opts, in nfs_add_entry() argument
438 get_linux_hostspec(host), security, access_opts, in nfs_add_entry()

12345678910>>...32