/freebsd/crypto/heimdal/appl/ftp/ftpd/ |
H A D | Makefile.am | 24 security.c \ 32 $(ftpd_OBJECTS): security.h 34 security.c: 35 @test -f security.c || $(LN_S) $(srcdir)/../ftp/security.c . 36 security.h: 37 @test -f security.h || $(LN_S) $(srcdir)/../ftp/security.h . 41 CLEANFILES = security.c security.h gssapi.c
|
/freebsd/crypto/openssh/contrib/aix/ |
H A D | pam.conf | 7 sshd auth required /usr/lib/security/pam_aix 8 OTHER auth required /usr/lib/security/pam_aix 11 sshd account required /usr/lib/security/pam_aix 12 OTHER account required /usr/lib/security/pam_aix 15 sshd password required /usr/lib/security/pam_aix 16 OTHER password required /usr/lib/security/pam_aix 19 sshd session required /usr/lib/security/pam_aix 20 OTHER session required /usr/lib/security/pam_aix
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_security_level.pod | 5 …rity_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data - SSL/TLS security framework 42 the security level to B<level>. If not set the library default security level 46 retrieve the current security level. 50 the security callback associated with B<ctx> or B<s>. If not set a default 51 security callback is used. The meaning of the parameters and the behaviour 62 If an application doesn't set its own security callback the default 75 The security level corresponds to a minimum of 80 bits of security. Any 76 parameters offering below 80 bits of security are excluded. As a result RSA, 79 less than 80 bits of security. SSL version 2 is prohibited. Any cipher suite 81 and MD5 are also forbidden at this level as they have less than 80 security [all …]
|
H A D | BN_security_bits.pod | 5 BN_security_bits - returns bits of security based on given numbers 15 BN_security_bits() returns the number of bits of security provided by a 16 specific algorithm and a particular key size. The bits of security is 20 parameters B<L> and B<N> are used to decide the bits of security, where 27 Number of security bits.
|
/freebsd/crypto/openssh/contrib/ |
H A D | sshd.pam.generic | 2 auth required /lib/security/pam_unix.so shadow nodelay 3 account required /lib/security/pam_nologin.so 4 account required /lib/security/pam_unix.so 5 password required /lib/security/pam_cracklib.so 6 password required /lib/security/pam_unix.so shadow nullok use_authtok 7 session required /lib/security/pam_unix.so 8 session required /lib/security/pam_limits.so
|
/freebsd/tests/sys/mac/portacl/ |
H A D | misc.sh | 3 sysctl security.mac.portacl >/dev/null 2>&1 66 sysctl security.mac.portacl.rules= >/dev/null 84 sysctl security.mac.portacl.rules=${idtype}:${idstr}:${proto}:${port} >/dev/null 95 sysctl security.mac.portacl.rules= >/dev/null 99 suser_exempt=$(sysctl -n security.mac.portacl.suser_exempt) 100 port_high=$(sysctl -n security.mac.portacl.port_high) 104 sysctl -n security.mac.portacl.suser_exempt=${suser_exempt} >/dev/null 105 sysctl -n security.mac.portacl.port_high=${port_high} >/dev/null
|
/freebsd/lib/libpam/libpam/ |
H A D | Makefile | 164 HEADERS= security/openpam.h \ 165 security/openpam_attr.h \ 166 security/openpam_version.h \ 167 security/pam_appl.h \ 168 security/pam_constants.h \ 169 security/pam_modules.h \ 170 security/pam_types.h \ 172 ADD_HEADERS= security/pam_mod_misc.h 176 INCSDIR= ${INCLUDEDIR}/security
|
/freebsd/contrib/unbound/validator/ |
H A D | validator.c | 408 if (ret_msg && ret_msg->rep->security > sec_status_bogus) in already_validated() 411 sec_status_to_string(ret_msg->rep->security)); in already_validated() 672 …((struct packed_rrset_data*)chase_reply->rrsets[i-1]->entry.data)->security == sec_status_secure && in validate_msg_signatures() 677 ((struct packed_rrset_data*)s->entry.data)->security = in validate_msg_signatures() 700 chase_reply->security = sec_status_bogus; in validate_msg_signatures() 742 chase_reply->security = sec_status_bogus; in validate_msg_signatures() 882 ->entry.data)->security == sec_status_secure) in detect_wrongly_truncated() 887 ->entry.data)->security != sec_status_secure) in detect_wrongly_truncated() 994 chase_reply->security = sec_status_bogus; in validate_positive_response() 1042 chase_reply->security = sec_status_insecure; in validate_positive_response() [all …]
|
/freebsd/tests/sys/mac/ipacl/ |
H A D | ipacl_test.sh | 54 sysctl security.mac.ipacl.ipv4=0 63 sysctl security.mac.ipacl.ipv4=1 64 sysctl security.mac.ipacl.rules= 75 sysctl security.mac.ipacl.rules="${rule}" 112 sysctl security.mac.ipacl.rules="${rule}" 134 sysctl security.mac.ipacl.rules= 165 sysctl security.mac.ipacl.ipv6=0 174 sysctl security.mac.ipacl.ipv6=1 175 sysctl security.mac.ipacl.rules= 186 sysctl security.mac.ipacl.rules="${rule}" [all …]
|
/freebsd/usr.sbin/bsdinstall/scripts/ |
H A D | hardening | 63 echo security.bsd.see_other_uids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening 66 echo security.bsd.see_other_gids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening 69 echo security.bsd.see_jail_proc=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening 72 echo security.bsd.unprivileged_read_msgbuf=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening 75 echo security.bsd.unprivileged_proc_debug=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
|
/freebsd/usr.sbin/periodic/etc/daily/ |
H A D | 450.status-security | 27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX` 29 periodic security > $tempfile || rc=3 38 periodic security || rc=3;; 41 periodic security || rc=3;;
|
/freebsd/usr.sbin/periodic/etc/monthly/ |
H A D | 450.status-security | 27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX` 29 periodic security > $tempfile || rc=3 38 periodic security || rc=3;; 41 periodic security || rc=3;;
|
/freebsd/usr.sbin/periodic/etc/weekly/ |
H A D | 450.status-security | 27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX` 29 periodic security > $tempfile || rc=3 38 periodic security || rc=3;; 41 periodic security || rc=3;;
|
/freebsd/contrib/unbound/services/cache/ |
H A D | rrset.c | 137 if( newd->security == sec_status_secure && in need_to_update_rrset() 138 cached->security != sec_status_secure) in need_to_update_rrset() 140 if( cached->security == sec_status_bogus && in need_to_update_rrset() 141 newd->security != sec_status_bogus && !equal) in need_to_update_rrset() 148 cached->security == sec_status_bogus) in need_to_update_rrset() 391 if(updata->security > cachedata->security) { in rrset_update_sec_status() 395 cachedata->security = updata->security; in rrset_update_sec_status() 400 updata->security == sec_status_bogus) { in rrset_update_sec_status() 430 if(cachedata->security > updata->security) { in rrset_check_sec_status() 431 updata->security = cachedata->security; in rrset_check_sec_status() [all …]
|
/freebsd/libexec/rc/rc.d/ |
H A D | zfs | 21 if [ `$SYSCTL_N security.jail.mount_allowed` -eq 1 ]; then 37 if [ `$SYSCTL_N security.jail.jailed` -eq 1 ]; then 57 if [ `$SYSCTL_N security.jail.mount_allowed` -eq 1 ]; then 70 if [ `$SYSCTL_N security.jail.jailed` -eq 1 ]; then
|
/freebsd/sys/contrib/openzfs/config/ |
H A D | user-pam.m4 | 10 [install pam module in dir [[$libdir/security]]]), 11 [pammoduledir="$withval"],[pammoduledir=$libdir/security]) 20 AC_CHECK_HEADERS([security/pam_modules.h], [ 25 *** security/pam_modules.h missing, libpam0g-dev package required
|
/freebsd/contrib/libfido2/ |
H A D | SECURITY.md | 3 To report security issues in libfido2, please contact security@yubico.com. 5 https://www.yubico.com/support/security-advisories/issue-rating-system/.
|
/freebsd/tools/test/stress2/misc/ |
H A D | stack_guard_page.sh | 32 [ `sysctl -n security.bsd.stack_guard_page` -eq 0 ] && exit 0 34 old=`sysctl -n security.bsd.stack_guard_page` 41 sysctl security.bsd.stack_guard_page=`jot -r 1 1 512` > \
|
/freebsd/usr.sbin/periodic/etc/security/ |
H A D | 500.ipfwdenied | 37 . /etc/periodic/security/security.functions 43 TMP=`mktemp -t security`
|
H A D | 510.ipfdenied | 37 . /etc/periodic/security/security.functions 43 TMP=`mktemp -t security`
|
H A D | 610.ipf6denied | 37 . /etc/periodic/security/security.functions 43 TMP=`mktemp ${TMPDIR:-/tmp}/security.XXXXXXXXXX`
|
H A D | 520.pfdenied | 37 . /etc/periodic/security/security.functions 43 TMP=`mktemp -t security`
|
/freebsd/contrib/llvm-project/llvm/lib/Target/SystemZ/ |
H A D | SystemZFeatures.td | 89 …"message-security-assist-extension3", "MessageSecurityAssist3", (all_of FeatureMessageSecurityAssi… 90 "Assume that the message-security-assist extension facility 3 is installed" 94 …"message-security-assist-extension4", "MessageSecurityAssist4", (all_of FeatureMessageSecurityAssi… 95 "Assume that the message-security-assist extension facility 4 is installed" 184 …"message-security-assist-extension5", "MessageSecurityAssist5", (all_of FeatureMessageSecurityAssi… 185 "Assume that the message-security-assist extension facility 5 is installed" 224 …"message-security-assist-extension7", "MessageSecurityAssist7", (all_of FeatureMessageSecurityAssi… 225 "Assume that the message-security-assist extension facility 7 is installed" 229 …"message-security-assist-extension8", "MessageSecurityAssist8", (all_of FeatureMessageSecurityAssi… 230 "Assume that the message-security-assist extension facility 8 is installed" [all …]
|
/freebsd/contrib/unbound/ |
H A D | SECURITY.md | 9 highest minor and patch version level. We do not backport security fixes to 25 We take security very seriously. If you have discovered a security vulnerability 31 https://www.nlnetlabs.nl/security-report/
|
/freebsd/sys/contrib/openzfs/lib/libshare/os/linux/ |
H A D | nfs.c | 56 const char *host, const char *security, const char *access, void *cookie); 127 const char *security; member 149 udata->security = value; in foreach_nfs_host_cb() 208 udata->sharepath, host, udata->security, in foreach_nfs_host_cb() 239 udata.security = "sys"; in foreach_nfs_host() 423 const char *host, const char *security, const char *access_opts, in nfs_add_entry() argument 437 get_linux_hostspec(host), security, access_opts, in nfs_add_entry()
|