| /src/sys/external/isc/atheros_hal/dist/ |
| ah_eeprom_v1.c | 115 uint16_t protect, eeprom_version, eeval; local 132 if (!ath_hal_eepromRead(ah, AR_EEPROM_PROTECT, &protect)) { 138 HALDEBUG(ah, HAL_DEBUG_ATTACH, "EEPROM protect 0x%x\n", protect); 187 ee->ee_protect = protect;
|
| /src/crypto/external/apache2/openssl/dist/providers/common/ |
| securitycheck.c | 27 int protect = 0; local 32 protect = 1; 39 protect = 1; 58 *outprotect = protect; 65 * Set protect = 1 for encryption or signing operations, or 0 otherwise. See 68 int ossl_rsa_check_key_size(const RSA *rsa, int protect) 72 if (protect ? (sz < 2048) : (sz < 1024)) 110 * protect should be 1 for any operations that need 112 bits of security 122 int ossl_ec_check_security_strength(const EC_GROUP *group, int protect) 136 if (protect && strength < OSSL_FIPS_MIN_SECURITY_STRENGTH_BITS [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/common/ |
| securitycheck.c | 26 * Set protect = 1 for encryption or signing operations, or 0 otherwise. See 31 int protect = 0; local 35 protect = 1; 41 protect = 1; 64 if (protect ? (sz < 2048) : (sz < 1024)) { 71 /* make protect used */ 72 (void)protect; 80 * protect should be 1 for any operations that need 112 bits of security 92 int ossl_ec_check_key(OSSL_LIB_CTX *ctx, const EC_KEY *ec, int protect) 133 if (protect && strength < 112) [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/msan/ |
| msan_linux.cc | 61 // Depending on the kernel configuration, we may not be able to protect 70 Printf("FATAL: Cannot protect memory range %p - %p (%s).\n", beg, end, 138 bool protect = type == MappingDesc::INVALID || local 140 CHECK(!(map && protect)); 141 if (!map && !protect) 151 if (protect) {
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kem/ |
| rsa_kem.c | 134 int protect = 0; local 142 if (!ossl_rsa_key_op_get_protect(vrsa, operation, &protect)) 155 prsactx->rsa, desc, protect))
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/asymciphers/ |
| rsa_enc.c | 100 int protect = 0; local 105 if (!ossl_rsa_key_op_get_protect(vrsa, operation, &protect)) 130 prsactx->rsa, desc, protect))
|
| /src/external/bsd/kyua-testers/dist/ |
| run.c | 73 /// Must be protected by protect() and unprotect(). 122 protect(void) function 151 protect(); 184 protect(); 432 protect(); 473 protect();
|
| /src/usr.bin/mail/ |
| format.c | 959 * Protect a string against strftime() conversion. 962 protect(const char *str) function 994 subj = protect(subjof(mp)); 995 addr = protect(addrof(mp)); 996 user = protect(userof(mp));
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| rsa_sig.c | 509 int protect; local 525 if (!ossl_rsa_key_op_get_protect(prsactx->rsa, operation, &protect)) 604 prsactx->rsa, desc, protect))
|
| /src/external/gpl2/mkhybrid/dist/ |
| apple.h | 261 byte protect; /* = 1 for protected file, 0 otherwise */ member in struct:__anon9484
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| rbtdb.c | 153 * to protect the access to the counters by locks. 157 * NODE_UNLOCK. In some other cases, however, we need to protect reference 158 * counters first and then protect other parts of a node as read-only data. 161 * routines, we should only protect the "other members" by NODE_WEAKLOCK(read). 162 * Otherwise, we should use NODE_STRONGLOCK() to protect the entire critical 7690 int protect, flags; local 7704 protect = PROT_READ | PROT_WRITE; 7710 base = isc_file_mmap(NULL, filesize, protect, flags, fd, 0);
|
| /src/external/public-domain/sqlite/dist/ |
| sqlite3.c | 2737 ** takes additional defensive steps to protect the application from harm 6920 ** threads should mutex-protect calls to this API and should make their own 50522 DWORD protect = PAGE_READWRITE; local 50743 DWORD protect = PAGE_READONLY; local [all...] |