Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 723) sorted by relevance

12345678910>>...29

/freebsd/crypto/heimdal/appl/ftp/ftpd/
H A DMakefile.am24 security.c \
32 $(ftpd_OBJECTS): security.h
34 security.c:
35 @test -f security.c || $(LN_S) $(srcdir)/../ftp/security.c .
36 security.h:
37 @test -f security.h || $(LN_S) $(srcdir)/../ftp/security.h .
41 CLEANFILES = security.c security.h gssapi.c
/freebsd/crypto/openssh/contrib/aix/
H A Dpam.conf7 sshd auth required /usr/lib/security/pam_aix
8 OTHER auth required /usr/lib/security/pam_aix
11 sshd account required /usr/lib/security/pam_aix
12 OTHER account required /usr/lib/security/pam_aix
15 sshd password required /usr/lib/security/pam_aix
16 OTHER password required /usr/lib/security/pam_aix
19 sshd session required /usr/lib/security/pam_aix
20 OTHER session required /usr/lib/security/pam_aix
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_security_level.pod5 …rity_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data - SSL/TLS security framework
42 the security level to B<level>. If not set the library default security level
46 retrieve the current security level.
50 the security callback associated with B<ctx> or B<s>. If not set a default
51 security callback is used. The meaning of the parameters and the behaviour
62 If an application doesn't set its own security callback the default
75 The security level corresponds to a minimum of 80 bits of security. Any
76 parameters offering below 80 bits of security are excluded. As a result RSA,
79 less than 80 bits of security. SSL version 2 is prohibited. Any cipher suite
81 and MD5 are also forbidden at this level as they have less than 80 security
[all …]
H A DBN_security_bits.pod5 BN_security_bits - returns bits of security based on given numbers
15 BN_security_bits() returns the number of bits of security provided by a
16 specific algorithm and a particular key size. The bits of security is
20 parameters B<L> and B<N> are used to decide the bits of security, where
27 Number of security bits.
/freebsd/crypto/openssh/contrib/
H A Dsshd.pam.generic2 auth required /lib/security/pam_unix.so shadow nodelay
3 account required /lib/security/pam_nologin.so
4 account required /lib/security/pam_unix.so
5 password required /lib/security/pam_cracklib.so
6 password required /lib/security/pam_unix.so shadow nullok use_authtok
7 session required /lib/security/pam_unix.so
8 session required /lib/security/pam_limits.so
/freebsd/tests/sys/mac/portacl/
H A Dmisc.sh3 sysctl security.mac.portacl >/dev/null 2>&1
66 sysctl security.mac.portacl.rules= >/dev/null
84 sysctl security.mac.portacl.rules=${idtype}:${idstr}:${proto}:${port} >/dev/null
95 sysctl security.mac.portacl.rules= >/dev/null
99 suser_exempt=$(sysctl -n security.mac.portacl.suser_exempt)
100 port_high=$(sysctl -n security.mac.portacl.port_high)
104 sysctl -n security.mac.portacl.suser_exempt=${suser_exempt} >/dev/null
105 sysctl -n security.mac.portacl.port_high=${port_high} >/dev/null
/freebsd/lib/libpam/libpam/
H A DMakefile164 HEADERS= security/openpam.h \
165 security/openpam_attr.h \
166 security/openpam_version.h \
167 security/pam_appl.h \
168 security/pam_constants.h \
169 security/pam_modules.h \
170 security/pam_types.h \
172 ADD_HEADERS= security/pam_mod_misc.h
176 INCSDIR= ${INCLUDEDIR}/security
/freebsd/contrib/unbound/validator/
H A Dvalidator.c408 if (ret_msg && ret_msg->rep->security > sec_status_bogus) in already_validated()
411 sec_status_to_string(ret_msg->rep->security)); in already_validated()
672 …((struct packed_rrset_data*)chase_reply->rrsets[i-1]->entry.data)->security == sec_status_secure && in validate_msg_signatures()
677 ((struct packed_rrset_data*)s->entry.data)->security = in validate_msg_signatures()
700 chase_reply->security = sec_status_bogus; in validate_msg_signatures()
742 chase_reply->security = sec_status_bogus; in validate_msg_signatures()
882 ->entry.data)->security == sec_status_secure) in detect_wrongly_truncated()
887 ->entry.data)->security != sec_status_secure) in detect_wrongly_truncated()
994 chase_reply->security = sec_status_bogus; in validate_positive_response()
1042 chase_reply->security = sec_status_insecure; in validate_positive_response()
[all …]
/freebsd/tests/sys/mac/ipacl/
H A Dipacl_test.sh54 sysctl security.mac.ipacl.ipv4=0
63 sysctl security.mac.ipacl.ipv4=1
64 sysctl security.mac.ipacl.rules=
75 sysctl security.mac.ipacl.rules="${rule}"
112 sysctl security.mac.ipacl.rules="${rule}"
134 sysctl security.mac.ipacl.rules=
165 sysctl security.mac.ipacl.ipv6=0
174 sysctl security.mac.ipacl.ipv6=1
175 sysctl security.mac.ipacl.rules=
186 sysctl security.mac.ipacl.rules="${rule}"
[all …]
/freebsd/usr.sbin/bsdinstall/scripts/
H A Dhardening63 echo security.bsd.see_other_uids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
66 echo security.bsd.see_other_gids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
69 echo security.bsd.see_jail_proc=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
72 echo security.bsd.unprivileged_read_msgbuf=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
75 echo security.bsd.unprivileged_proc_debug=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
/freebsd/usr.sbin/periodic/etc/daily/
H A D450.status-security27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX`
29 periodic security > $tempfile || rc=3
38 periodic security || rc=3;;
41 periodic security || rc=3;;
/freebsd/usr.sbin/periodic/etc/monthly/
H A D450.status-security27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX`
29 periodic security > $tempfile || rc=3
38 periodic security || rc=3;;
41 periodic security || rc=3;;
/freebsd/usr.sbin/periodic/etc/weekly/
H A D450.status-security27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX`
29 periodic security > $tempfile || rc=3
38 periodic security || rc=3;;
41 periodic security || rc=3;;
/freebsd/contrib/unbound/services/cache/
H A Drrset.c137 if( newd->security == sec_status_secure && in need_to_update_rrset()
138 cached->security != sec_status_secure) in need_to_update_rrset()
140 if( cached->security == sec_status_bogus && in need_to_update_rrset()
141 newd->security != sec_status_bogus && !equal) in need_to_update_rrset()
148 cached->security == sec_status_bogus) in need_to_update_rrset()
391 if(updata->security > cachedata->security) { in rrset_update_sec_status()
395 cachedata->security = updata->security; in rrset_update_sec_status()
400 updata->security == sec_status_bogus) { in rrset_update_sec_status()
430 if(cachedata->security > updata->security) { in rrset_check_sec_status()
431 updata->security = cachedata->security; in rrset_check_sec_status()
[all …]
/freebsd/libexec/rc/rc.d/
H A Dzfs21 if [ `$SYSCTL_N security.jail.mount_allowed` -eq 1 ]; then
37 if [ `$SYSCTL_N security.jail.jailed` -eq 1 ]; then
57 if [ `$SYSCTL_N security.jail.mount_allowed` -eq 1 ]; then
70 if [ `$SYSCTL_N security.jail.jailed` -eq 1 ]; then
/freebsd/sys/contrib/openzfs/config/
H A Duser-pam.m410 [install pam module in dir [[$libdir/security]]]),
11 [pammoduledir="$withval"],[pammoduledir=$libdir/security])
20 AC_CHECK_HEADERS([security/pam_modules.h], [
25 *** security/pam_modules.h missing, libpam0g-dev package required
/freebsd/contrib/libfido2/
H A DSECURITY.md3 To report security issues in libfido2, please contact security@yubico.com.
5 https://www.yubico.com/support/security-advisories/issue-rating-system/.
/freebsd/tools/test/stress2/misc/
H A Dstack_guard_page.sh32 [ `sysctl -n security.bsd.stack_guard_page` -eq 0 ] && exit 0
34 old=`sysctl -n security.bsd.stack_guard_page`
41 sysctl security.bsd.stack_guard_page=`jot -r 1 1 512` > \
/freebsd/usr.sbin/periodic/etc/security/
H A D500.ipfwdenied37 . /etc/periodic/security/security.functions
43 TMP=`mktemp -t security`
H A D510.ipfdenied37 . /etc/periodic/security/security.functions
43 TMP=`mktemp -t security`
H A D610.ipf6denied37 . /etc/periodic/security/security.functions
43 TMP=`mktemp ${TMPDIR:-/tmp}/security.XXXXXXXXXX`
H A D520.pfdenied37 . /etc/periodic/security/security.functions
43 TMP=`mktemp -t security`
/freebsd/contrib/llvm-project/llvm/lib/Target/SystemZ/
H A DSystemZFeatures.td89 …"message-security-assist-extension3", "MessageSecurityAssist3", (all_of FeatureMessageSecurityAssi…
90 "Assume that the message-security-assist extension facility 3 is installed"
94 …"message-security-assist-extension4", "MessageSecurityAssist4", (all_of FeatureMessageSecurityAssi…
95 "Assume that the message-security-assist extension facility 4 is installed"
184 …"message-security-assist-extension5", "MessageSecurityAssist5", (all_of FeatureMessageSecurityAssi…
185 "Assume that the message-security-assist extension facility 5 is installed"
224 …"message-security-assist-extension7", "MessageSecurityAssist7", (all_of FeatureMessageSecurityAssi…
225 "Assume that the message-security-assist extension facility 7 is installed"
229 …"message-security-assist-extension8", "MessageSecurityAssist8", (all_of FeatureMessageSecurityAssi…
230 "Assume that the message-security-assist extension facility 8 is installed"
[all …]
/freebsd/contrib/unbound/
H A DSECURITY.md9 highest minor and patch version level. We do not backport security fixes to
25 We take security very seriously. If you have discovered a security vulnerability
31 https://www.nlnetlabs.nl/security-report/
/freebsd/sys/contrib/openzfs/lib/libshare/os/linux/
H A Dnfs.c56 const char *host, const char *security, const char *access, void *cookie);
127 const char *security; member
149 udata->security = value; in foreach_nfs_host_cb()
208 udata->sharepath, host, udata->security, in foreach_nfs_host_cb()
239 udata.security = "sys"; in foreach_nfs_host()
423 const char *host, const char *security, const char *access_opts, in nfs_add_entry() argument
437 get_linux_hostspec(host), security, access_opts, in nfs_add_entry()

12345678910>>...29