security          463 TSRM/tsrm_win32.c 	SECURITY_ATTRIBUTES security;
security          492 TSRM/tsrm_win32.c 	security.nLength				= sizeof(SECURITY_ATTRIBUTES);
security          493 TSRM/tsrm_win32.c 	security.bInheritHandle			= TRUE;
security          494 TSRM/tsrm_win32.c 	security.lpSecurityDescriptor	= NULL;
security          496 TSRM/tsrm_win32.c 	if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) {
security          527 TSRM/tsrm_win32.c 		DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &token_user);
security          542 TSRM/tsrm_win32.c 		res = CreateProcessAsUser(token_user, NULL, cmd, &security, &security, security.bInheritHandle, dwCreateFlags, env, cwd, &startup, &process);
security          545 TSRM/tsrm_win32.c 		res = CreateProcess(NULL, cmd, &security, &security, security.bInheritHandle, dwCreateFlags, env, cwd, &startup, &process);
security          615 ext/phar/phar_internal.h phar_entry_info *phar_get_entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security TSRMLS_DC);
security          616 ext/phar/phar_internal.h phar_entry_info *phar_get_entry_info_dir(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security TSRMLS_DC);
security          617 ext/phar/phar_internal.h phar_entry_data *phar_get_or_create_entry_data(char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security TSRMLS_DC);
security          618 ext/phar/phar_internal.h int phar_get_entry_data(phar_entry_data **ret, char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security TSRMLS_DC);
security          353 ext/phar/util.c int phar_get_entry_data(phar_entry_data **ret, char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security TSRMLS_DC) /* {{{ */
security          391 ext/phar/util.c 		if ((entry = phar_get_entry_info_dir(phar, path, path_len, allow_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security TSRMLS_CC)) == NULL) {
security          398 ext/phar/util.c 		if ((entry = phar_get_entry_info(phar, path, path_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security TSRMLS_CC)) == NULL) {
security          519 ext/phar/util.c phar_entry_data *phar_get_or_create_entry_data(char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security TSRMLS_DC) /* {{{ */
security          537 ext/phar/util.c 	if (FAILURE == phar_get_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security TSRMLS_CC)) {
security         1214 ext/phar/util.c phar_entry_info *phar_get_entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security TSRMLS_DC) /* {{{ */
security         1216 ext/phar/util.c 	return phar_get_entry_info_dir(phar, path, path_len, 0, error, security TSRMLS_CC);
security         1224 ext/phar/util.c phar_entry_info *phar_get_entry_info_dir(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security TSRMLS_DC) /* {{{ */
security         1240 ext/phar/util.c 	if (security && path_len >= sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) {
security          414 ext/standard/proc_open.c # define pipe(pair)		(CreatePipe(&pair[0], &pair[1], &security, 0) ? 0 : -1)
security          471 ext/standard/proc_open.c 	SECURITY_ATTRIBUTES security;
security          534 ext/standard/proc_open.c 	memset(&security, 0, sizeof(security));
security          535 ext/standard/proc_open.c 	security.nLength = sizeof(security);
security          536 ext/standard/proc_open.c 	security.bInheritHandle = TRUE;
security          537 ext/standard/proc_open.c 	security.lpSecurityDescriptor = NULL;
security          759 ext/standard/proc_open.c 		newprocok = CreateProcess(NULL, command, &security, &security, TRUE, dwCreateFlags, env.envp, cwd, &si, &pi);
security          763 ext/standard/proc_open.c 		newprocok = CreateProcess(NULL, command_with_cmd, &security, &security, TRUE, dwCreateFlags, env.envp, cwd, &si, &pi);