security          464 TSRM/tsrm_win32.c 	SECURITY_ATTRIBUTES security;
security          493 TSRM/tsrm_win32.c 	security.nLength				= sizeof(SECURITY_ATTRIBUTES);
security          494 TSRM/tsrm_win32.c 	security.bInheritHandle			= TRUE;
security          495 TSRM/tsrm_win32.c 	security.lpSecurityDescriptor	= NULL;
security          497 TSRM/tsrm_win32.c 	if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) {
security          528 TSRM/tsrm_win32.c 		DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &token_user);
security          543 TSRM/tsrm_win32.c 		res = CreateProcessAsUser(token_user, NULL, cmd, &security, &security, security.bInheritHandle, dwCreateFlags, env, cwd, &startup, &process);
security          546 TSRM/tsrm_win32.c 		res = CreateProcess(NULL, cmd, &security, &security, security.bInheritHandle, dwCreateFlags, env, cwd, &startup, &process);
security          603 ext/phar/phar_internal.h phar_entry_info *phar_get_entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security);
security          604 ext/phar/phar_internal.h phar_entry_info *phar_get_entry_info_dir(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security);
security          605 ext/phar/phar_internal.h phar_entry_data *phar_get_or_create_entry_data(char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security);
security          606 ext/phar/phar_internal.h int phar_get_entry_data(phar_entry_data **ret, char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security);
security          352 ext/phar/util.c int phar_get_entry_data(phar_entry_data **ret, char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */
security          390 ext/phar/util.c 		if ((entry = phar_get_entry_info_dir(phar, path, path_len, allow_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) {
security          397 ext/phar/util.c 		if ((entry = phar_get_entry_info(phar, path, path_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security)) == NULL) {
security          518 ext/phar/util.c phar_entry_data *phar_get_or_create_entry_data(char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security) /* {{{ */
security          536 ext/phar/util.c 	if (FAILURE == phar_get_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security)) {
security         1209 ext/phar/util.c phar_entry_info *phar_get_entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security) /* {{{ */
security         1211 ext/phar/util.c 	return phar_get_entry_info_dir(phar, path, path_len, 0, error, security);
security         1219 ext/phar/util.c phar_entry_info *phar_get_entry_info_dir(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security) /* {{{ */
security         1235 ext/phar/util.c 	if (security && path_len >= sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) {
security          386 ext/standard/proc_open.c # define pipe(pair)		(CreatePipe(&pair[0], &pair[1], &security, 0) ? 0 : -1)
security          445 ext/standard/proc_open.c 	SECURITY_ATTRIBUTES security;
security          520 ext/standard/proc_open.c 	memset(&security, 0, sizeof(security));
security          521 ext/standard/proc_open.c 	security.nLength = sizeof(security);
security          522 ext/standard/proc_open.c 	security.bInheritHandle = TRUE;
security          523 ext/standard/proc_open.c 	security.lpSecurityDescriptor = NULL;
security          736 ext/standard/proc_open.c 		newprocok = CreateProcess(NULL, command, &security, &security, TRUE, dwCreateFlags, env.envp, cwd, &si, &pi);
security          740 ext/standard/proc_open.c 		newprocok = CreateProcess(NULL, command_with_cmd, &security, &security, TRUE, dwCreateFlags, env.envp, cwd, &si, &pi);