security 463 TSRM/tsrm_win32.c SECURITY_ATTRIBUTES security; security 492 TSRM/tsrm_win32.c security.nLength = sizeof(SECURITY_ATTRIBUTES); security 493 TSRM/tsrm_win32.c security.bInheritHandle = TRUE; security 494 TSRM/tsrm_win32.c security.lpSecurityDescriptor = NULL; security 496 TSRM/tsrm_win32.c if (!type_len || !CreatePipe(&in, &out, &security, 2048L)) { security 527 TSRM/tsrm_win32.c DuplicateTokenEx(thread_token, MAXIMUM_ALLOWED, &security, SecurityImpersonation, TokenPrimary, &token_user); security 542 TSRM/tsrm_win32.c res = CreateProcessAsUser(token_user, NULL, cmd, &security, &security, security.bInheritHandle, dwCreateFlags, env, cwd, &startup, &process); security 545 TSRM/tsrm_win32.c res = CreateProcess(NULL, cmd, &security, &security, security.bInheritHandle, dwCreateFlags, env, cwd, &startup, &process); security 615 ext/phar/phar_internal.h phar_entry_info *phar_get_entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security TSRMLS_DC); security 616 ext/phar/phar_internal.h phar_entry_info *phar_get_entry_info_dir(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security TSRMLS_DC); security 617 ext/phar/phar_internal.h phar_entry_data *phar_get_or_create_entry_data(char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security TSRMLS_DC); security 618 ext/phar/phar_internal.h int phar_get_entry_data(phar_entry_data **ret, char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security TSRMLS_DC); security 353 ext/phar/util.c int phar_get_entry_data(phar_entry_data **ret, char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security TSRMLS_DC) /* {{{ */ security 391 ext/phar/util.c if ((entry = phar_get_entry_info_dir(phar, path, path_len, allow_dir, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security TSRMLS_CC)) == NULL) { security 398 ext/phar/util.c if ((entry = phar_get_entry_info(phar, path, path_len, for_create && !PHAR_G(readonly) && !phar->is_data ? NULL : error, security TSRMLS_CC)) == NULL) { security 519 ext/phar/util.c phar_entry_data *phar_get_or_create_entry_data(char *fname, int fname_len, char *path, int path_len, const char *mode, char allow_dir, char **error, int security TSRMLS_DC) /* {{{ */ security 537 ext/phar/util.c if (FAILURE == phar_get_entry_data(&ret, fname, fname_len, path, path_len, mode, allow_dir, error, security TSRMLS_CC)) { security 1214 ext/phar/util.c phar_entry_info *phar_get_entry_info(phar_archive_data *phar, char *path, int path_len, char **error, int security TSRMLS_DC) /* {{{ */ security 1216 ext/phar/util.c return phar_get_entry_info_dir(phar, path, path_len, 0, error, security TSRMLS_CC); security 1224 ext/phar/util.c phar_entry_info *phar_get_entry_info_dir(phar_archive_data *phar, char *path, int path_len, char dir, char **error, int security TSRMLS_DC) /* {{{ */ security 1240 ext/phar/util.c if (security && path_len >= sizeof(".phar")-1 && !memcmp(path, ".phar", sizeof(".phar")-1)) { security 414 ext/standard/proc_open.c # define pipe(pair) (CreatePipe(&pair[0], &pair[1], &security, 0) ? 0 : -1) security 471 ext/standard/proc_open.c SECURITY_ATTRIBUTES security; security 534 ext/standard/proc_open.c memset(&security, 0, sizeof(security)); security 535 ext/standard/proc_open.c security.nLength = sizeof(security); security 536 ext/standard/proc_open.c security.bInheritHandle = TRUE; security 537 ext/standard/proc_open.c security.lpSecurityDescriptor = NULL; security 759 ext/standard/proc_open.c newprocok = CreateProcess(NULL, command, &security, &security, TRUE, dwCreateFlags, env.envp, cwd, &si, &pi); security 763 ext/standard/proc_open.c newprocok = CreateProcess(NULL, command_with_cmd, &security, &security, TRUE, dwCreateFlags, env.envp, cwd, &si, &pi);