| /freebsd/crypto/heimdal/appl/ftp/ftpd/ |
| H A D | Makefile.am | 24 security.c \ 32 $(ftpd_OBJECTS): security.h 34 security.c: 35 @test -f security.c || $(LN_S) $(srcdir)/../ftp/security.c . 36 security.h: 37 @test -f security.h || $(LN_S) $(srcdir)/../ftp/security.h . 41 CLEANFILES = security.c security.h gssapi.c
|
| /freebsd/crypto/openssh/contrib/aix/ |
| H A D | pam.conf | 7 sshd auth required /usr/lib/security/pam_aix 8 OTHER auth required /usr/lib/security/pam_aix 11 sshd account required /usr/lib/security/pam_aix 12 OTHER account required /usr/lib/security/pam_aix 15 sshd password required /usr/lib/security/pam_aix 16 OTHER password required /usr/lib/security/pam_aix 19 sshd session required /usr/lib/security/pam_aix 20 OTHER session required /usr/lib/security/pam_aix
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_security_level.pod | 5 …rity_ex_data, SSL_CTX_get0_security_ex_data, SSL_get0_security_ex_data - SSL/TLS security framework 42 the security level to B<level>. If not set the library default security level 46 retrieve the current security level. 50 the security callback associated with B<ctx> or B<s>. If not set a default 51 security callback is used. The meaning of the parameters and the behaviour 62 If an application doesn't set its own security callback the default 75 The security level corresponds to a minimum of 80 bits of security. Any 76 parameters offering below 80 bits of security are excluded. As a result RSA, 81 have less than 80 security bits. Additionally, SSLv3, TLS 1.0, TLS 1.1 and 86 Security level set to 112 bits of security. As a result RSA, DSA and DH keys [all …]
|
| H A D | BN_security_bits.pod | 5 BN_security_bits - returns bits of security based on given numbers 15 BN_security_bits() returns the number of bits of security provided by a 16 specific algorithm and a particular key size. The bits of security is 20 parameters B<L> and B<N> are used to decide the bits of security, where 27 Number of security bits.
|
| /freebsd/crypto/openssh/contrib/ |
| H A D | sshd.pam.generic | 2 auth required /lib/security/pam_unix.so shadow nodelay 3 account required /lib/security/pam_nologin.so 4 account required /lib/security/pam_unix.so 5 password required /lib/security/pam_cracklib.so 6 password required /lib/security/pam_unix.so shadow nullok use_authtok 7 session required /lib/security/pam_unix.so 8 session required /lib/security/pam_limits.so
|
| /freebsd/tests/sys/mac/portacl/ |
| H A D | misc.sh | 56 sysctl security.mac.portacl.rules= >/dev/null 74 sysctl security.mac.portacl.rules=${idtype}:${idstr}:${proto}:${port} >/dev/null 85 sysctl security.mac.portacl.rules= >/dev/null 88 portacl_enabled=$(sysctl -n security.mac.portacl.enabled) 90 suser_exempt=$(sysctl -n security.mac.portacl.suser_exempt) 91 port_high=$(sysctl -n security.mac.portacl.port_high) 95 sysctl -n security.mac.portacl.suser_exempt=${suser_exempt} >/dev/null 96 sysctl -n security.mac.portacl.port_high=${port_high} >/dev/null 97 sysctl -n security.mac.portacl.enabled=${portacl_enabled} >/dev/null
|
| H A D | nobody_test.sh | 14 sysctl security.mac.portacl.suser_exempt=1 >/dev/null 16 sysctl security.mac.portacl.enabled=1 >/dev/null 28 sysctl security.mac.portacl.suser_exempt=0 >/dev/null 42 sysctl security.mac.portacl.port_high=7778 >/dev/null 57 sysctl security.mac.portacl.port_high=7776 >/dev/null
|
| H A D | root_test.sh | 12 sysctl security.mac.portacl.suser_exempt=1 >/dev/null 13 sysctl security.mac.portacl.enabled=1 >/dev/null 27 sysctl security.mac.portacl.suser_exempt=0 >/dev/null 41 sysctl security.mac.portacl.port_high=7778 >/dev/null
|
| /freebsd/contrib/unbound/validator/ |
| H A D | validator.c | 446 if (ret_msg && ret_msg->rep->security > sec_status_bogus) in already_validated() 449 sec_status_to_string(ret_msg->rep->security)); in already_validated() 710 …((struct packed_rrset_data*)chase_reply->rrsets[i-1]->entry.data)->security == sec_status_secure && in validate_msg_signatures() 715 ((struct packed_rrset_data*)s->entry.data)->security = in validate_msg_signatures() 738 chase_reply->security = sec_status_bogus; in validate_msg_signatures() 780 chase_reply->security = sec_status_bogus; in validate_msg_signatures() 920 ->entry.data)->security == sec_status_secure) in detect_wrongly_truncated() 925 ->entry.data)->security != sec_status_secure) in detect_wrongly_truncated() 1032 chase_reply->security = sec_status_bogus; in validate_positive_response() 1080 chase_reply->security = sec_status_insecure; in validate_positive_response() [all …]
|
| /freebsd/tests/sys/mac/ipacl/ |
| H A D | ipacl_test.sh | 57 sysctl security.mac.ipacl.ipv4=0 66 sysctl security.mac.ipacl.ipv4=1 67 sysctl security.mac.ipacl.rules= 78 sysctl security.mac.ipacl.rules="${rule}" 115 sysctl security.mac.ipacl.rules="${rule}" 137 sysctl security.mac.ipacl.rules="${prev_ipacl_rules}" 138 sysctl security.mac.ipacl.ipv4="${prev_ipacl_ipv4}" 172 sysctl security.mac.ipacl.ipv6=0 181 sysctl security.mac.ipacl.ipv6=1 182 sysctl security.mac.ipacl.rules= [all …]
|
| /freebsd/usr.sbin/bsdinstall/scripts/ |
| H A D | hardening | 63 echo security.bsd.see_other_uids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening 66 echo security.bsd.see_other_gids=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening 69 echo security.bsd.see_jail_proc=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening 72 echo security.bsd.unprivileged_read_msgbuf=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening 75 echo security.bsd.unprivileged_proc_debug=0 >> $BSDINSTALL_TMPETC/sysctl.conf.hardening
|
| /freebsd/usr.sbin/periodic/etc/daily/ |
| H A D | 450.status-security | 27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX` 29 periodic security > $tempfile || rc=3 38 periodic security || rc=3;; 41 periodic security || rc=3;;
|
| /freebsd/usr.sbin/periodic/etc/monthly/ |
| H A D | 450.status-security | 27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX` 29 periodic security > $tempfile || rc=3 38 periodic security || rc=3;; 41 periodic security || rc=3;;
|
| /freebsd/usr.sbin/periodic/etc/weekly/ |
| H A D | 450.status-security | 27 if tempfile=`mktemp ${TMPDIR:-/tmp}/450.status-security.XXXXXX` 29 periodic security > $tempfile || rc=3 38 periodic security || rc=3;; 41 periodic security || rc=3;;
|
| /freebsd/contrib/unbound/services/cache/ |
| H A D | rrset.c | 139 if( newd->security == sec_status_secure && in need_to_update_rrset() 140 cached->security != sec_status_secure) in need_to_update_rrset() 142 if( cached->security == sec_status_bogus && in need_to_update_rrset() 143 newd->security != sec_status_bogus && !equal) in need_to_update_rrset() 150 cached->security == sec_status_bogus) in need_to_update_rrset() 393 if(updata->security > cachedata->security) { in rrset_update_sec_status() 397 cachedata->security = updata->security; in rrset_update_sec_status() 402 updata->security == sec_status_bogus) { in rrset_update_sec_status() 432 if(cachedata->security > updata->security) { in rrset_check_sec_status() 433 updata->security = cachedata->security; in rrset_check_sec_status() [all …]
|
| /freebsd/sys/contrib/openzfs/config/ |
| H A D | user-pam.m4 | 10 [install pam module in dir [[$libdir/security]]]), 11 [pammoduledir="$withval"],[pammoduledir=$libdir/security]) 20 AC_CHECK_HEADERS([security/pam_modules.h], [ 25 *** security/pam_modules.h missing, libpam0g-dev package required
|
| /freebsd/contrib/libfido2/ |
| H A D | SECURITY.md | 3 To report security issues in libfido2, please contact security@yubico.com. 5 https://www.yubico.com/support/security-advisories/issue-rating-system/.
|
| /freebsd/tools/test/stress2/misc/ |
| H A D | stack_guard_page.sh | 32 [ `sysctl -n security.bsd.stack_guard_page` -eq 0 ] && exit 0 34 old=`sysctl -n security.bsd.stack_guard_page` 41 sysctl security.bsd.stack_guard_page=`jot -r 1 1 512` > \
|
| /freebsd/usr.sbin/periodic/etc/security/ |
| H A D | 500.ipfwdenied | 37 . /etc/periodic/security/security.functions 43 TMP=`mktemp -t security`
|
| H A D | 510.ipfdenied | 37 . /etc/periodic/security/security.functions 43 TMP=`mktemp -t security`
|
| H A D | 610.ipf6denied | 37 . /etc/periodic/security/security.functions 43 TMP=`mktemp ${TMPDIR:-/tmp}/security.XXXXXXXXXX`
|
| H A D | 520.pfdenied | 37 . /etc/periodic/security/security.functions 43 TMP=`mktemp -t security`
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/SystemZ/ |
| H A D | SystemZFeatures.td | 89 …"message-security-assist-extension3", "MessageSecurityAssist3", (all_of FeatureMessageSecurityAssi… 90 "Assume that the message-security-assist extension facility 3 is installed" 94 …"message-security-assist-extension4", "MessageSecurityAssist4", (all_of FeatureMessageSecurityAssi… 95 "Assume that the message-security-assist extension facility 4 is installed" 184 …"message-security-assist-extension5", "MessageSecurityAssist5", (all_of FeatureMessageSecurityAssi… 185 "Assume that the message-security-assist extension facility 5 is installed" 224 …"message-security-assist-extension7", "MessageSecurityAssist7", (all_of FeatureMessageSecurityAssi… 225 "Assume that the message-security-assist extension facility 7 is installed" 229 …"message-security-assist-extension8", "MessageSecurityAssist8", (all_of FeatureMessageSecurityAssi… 230 "Assume that the message-security-assist extension facility 8 is installed" [all …]
|
| /freebsd/contrib/unbound/ |
| H A D | SECURITY.md | 9 highest minor and patch version level. We do not backport security fixes to 25 We take security very seriously. If you have discovered a security vulnerability 31 https://www.nlnetlabs.nl/security-report/
|
| /freebsd/sys/contrib/openzfs/lib/libshare/os/linux/ |
| H A D | nfs.c | 57 const char *host, const char *security, const char *access, void *cookie); 128 const char *security; member 150 udata->security = value; in foreach_nfs_host_cb() 209 udata->sharepath, host, udata->security, in foreach_nfs_host_cb() 240 udata.security = "sys"; in foreach_nfs_host() 424 const char *host, const char *security, const char *access_opts, in nfs_add_entry() argument 438 get_linux_hostspec(host), security, access_opts, in nfs_add_entry()
|