Lines Matching defs:security

211  * list of properties that are related to security flavors.
227 sa_security_t security;
312 * security flavor.
330 * Walk the current list of security flavors and return true if it is
338 if (seclist->security == sec)
348 * group's list of security optionsets. We also keep a list of
372 /* add to the security list if it isn't there already */
378 curp->security = sa_create_security(
381 curp->security = check;
476 prop = sa_get_property(sec->security, name);
483 * The security options of ro/rw/root/uidmap/gidmap
529 ret = sa_add_property(sec->security,
538 ret = sa_add_property(sec->security, prop);
541 ret = sa_commit_properties(sec->security, !persist);
586 /* HAVE security flavors so check them */
656 * check if security types are present and validate them. If
689 * add either the option or the security option as needed. If
716 * Once in security parsing, we only
717 * do security. We do need to move
718 * between the security node and the
719 * toplevel. The security tag goes on
721 * go on the security.
743 * default security model. This must be
745 * "standard" security structure.
751 * security
1073 * a principal name according to the security
1134 /* named security type needs secinfo to be filled in */
1301 * Count the number of security types (flavors). The optionset has
1302 * been populated with the security flavors as a holding mechanism.
1442 sa_security_t security = NULL;
1459 * these if we find them and then add any security definitions.
1504 security =
1507 if (security != NULL) {
1520 for (prop = sa_get_property(security,
1529 sa_free_derived_optionset(security);
1548 if (security != NULL)
1549 sa_free_derived_optionset(security);
1793 * find the optionsets and security sets. There may not be
1795 * security may have multiple, one per security type per
1813 * do non-security options first since there is only one after
1843 "NFS: NFS: no memory for security\n"));
1850 * since we must have one security option defined, we
1852 * defined security options. This handles the case
1862 "get default security mode\n"));
1875 * exporting with incorrect security,
2358 sa_security_t security;
2367 for (security = sa_get_security(parent_group,
2368 NULL, NULL); security != NULL;
2369 security = sa_get_next_security(security)) {
2373 type = sa_get_security_attr(security,
2384 sectype = sa_get_security_attr(security,
3199 * Lookup the space (security) name. If it is default, convert to the