security 464 TSRM/tsrm_win32.c SECURITY_ATTRIBUTES security; security 493 TSRM/tsrm_win32.c security.nLength = sizeof(SECURITY_ATTRIBUTES); security 494 TSRM/tsrm_win32.c security.bInheritHandle = TRUE; security 495 TSRM/tsrm_win32.c security.lpSecurityDescriptor = NULL; security 497 TSRM/tsrm_win32.c if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) { security 528 TSRM/tsrm_win32.c DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &token_user); security 543 TSRM/tsrm_win32.c res = CreateProcessAsUser(token_user, NULL, cmd, &security, &security, security.bInheritHandle, dwCreateFlags, env, cwd, &startup, &process); security 546 TSRM/tsrm_win32.c res = CreateProcess(NULL, cmd, &security, &security, security.bInheritHandle, dwCreateFlags, env, cwd, &startup, &process); security 603 ext/phar/phar_internal.h phar_entry_info *phar_get_entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security); security 604 ext/phar/phar_internal.h phar_entry_info *phar_get_entry_info_dir(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security); security 605 ext/phar/phar_internal.h phar_entry_data *phar_get_or_create_entry_data(char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security); security 606 ext/phar/phar_internal.h int phar_get_entry_data(phar_entry_data **ret, char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security); security 352 ext/phar/util.c int phar_get_entry_data(phar_entry_data **ret, char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ security 390 ext/phar/util.c if ((entry = phar_get_entry_info_dir(phar, path, path_len, allow_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { security 397 ext/phar/util.c if ((entry = phar_get_entry_info(phar, path, path_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) { security 518 ext/phar/util.c phar_entry_data *phar_get_or_create_entry_data(char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */ security 536 ext/phar/util.c if (FAILURE == phar_get_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security)) { security 1209 ext/phar/util.c phar_entry_info *phar_get_entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security) /* {{{ */ security 1211 ext/phar/util.c return phar_get_entry_info_dir(phar, path, path_len, 0, error, security); security 1219 ext/phar/util.c phar_entry_info *phar_get_entry_info_dir(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security) /* {{{ */ security 1235 ext/phar/util.c if (security && path_len >= sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) { security 386 ext/standard/proc_open.c # define pipe(pair) (CreatePipe(&pair[0], &pair[1], &security, 0) ? 0 : -1) security 445 ext/standard/proc_open.c SECURITY_ATTRIBUTES security; security 520 ext/standard/proc_open.c memset(&security, 0, sizeof(security)); security 521 ext/standard/proc_open.c security.nLength = sizeof(security); security 522 ext/standard/proc_open.c security.bInheritHandle = TRUE; security 523 ext/standard/proc_open.c security.lpSecurityDescriptor = NULL; security 736 ext/standard/proc_open.c newprocok = CreateProcess(NULL, command, &security, &security, TRUE, dwCreateFlags, env.envp, cwd, &si, &pi); security 740 ext/standard/proc_open.c newprocok = CreateProcess(NULL, command_with_cmd, &security, &security, TRUE, dwCreateFlags, env.envp, cwd, &si, &pi);