HomeSort by: relevance | last modified time | path
    Searched defs:protect (Results 1 - 12 of 12) sorted by relevancy

  /src/sys/external/isc/atheros_hal/dist/
ah_eeprom_v1.c 115 uint16_t protect, eeprom_version, eeval; local
132 if (!ath_hal_eepromRead(ah, AR_EEPROM_PROTECT, &protect)) {
138 HALDEBUG(ah, HAL_DEBUG_ATTACH, "EEPROM protect 0x%x\n", protect);
187 ee->ee_protect = protect;
  /src/crypto/external/apache2/openssl/dist/providers/common/
securitycheck.c 27 int protect = 0; local
32 protect = 1;
39 protect = 1;
58 *outprotect = protect;
65 * Set protect = 1 for encryption or signing operations, or 0 otherwise. See
68 int ossl_rsa_check_key_size(const RSA *rsa, int protect)
72 if (protect ? (sz < 2048) : (sz < 1024))
110 * protect should be 1 for any operations that need 112 bits of security
122 int ossl_ec_check_security_strength(const EC_GROUP *group, int protect)
136 if (protect && strength < OSSL_FIPS_MIN_SECURITY_STRENGTH_BITS
    [all...]
  /src/crypto/external/bsd/openssl/dist/providers/common/
securitycheck.c 26 * Set protect = 1 for encryption or signing operations, or 0 otherwise. See
31 int protect = 0; local
35 protect = 1;
41 protect = 1;
64 if (protect ? (sz < 2048) : (sz < 1024)) {
71 /* make protect used */
72 (void)protect;
80 * protect should be 1 for any operations that need 112 bits of security
92 int ossl_ec_check_key(OSSL_LIB_CTX *ctx, const EC_KEY *ec, int protect)
133 if (protect && strength < 112)
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/msan/
msan_linux.cc 61 // Depending on the kernel configuration, we may not be able to protect
70 Printf("FATAL: Cannot protect memory range %p - %p (%s).\n", beg, end,
138 bool protect = type == MappingDesc::INVALID || local
140 CHECK(!(map && protect));
141 if (!map && !protect)
151 if (protect) {
  /src/crypto/external/apache2/openssl/dist/providers/implementations/kem/
rsa_kem.c 134 int protect = 0; local
142 if (!ossl_rsa_key_op_get_protect(vrsa, operation, &protect))
155 prsactx->rsa, desc, protect))
  /src/crypto/external/apache2/openssl/dist/providers/implementations/asymciphers/
rsa_enc.c 100 int protect = 0; local
105 if (!ossl_rsa_key_op_get_protect(vrsa, operation, &protect))
130 prsactx->rsa, desc, protect))
  /src/external/bsd/kyua-testers/dist/
run.c 73 /// Must be protected by protect() and unprotect().
122 protect(void) function
151 protect();
184 protect();
432 protect();
473 protect();
  /src/usr.bin/mail/
format.c 959 * Protect a string against strftime() conversion.
962 protect(const char *str) function
994 subj = protect(subjof(mp));
995 addr = protect(addrof(mp));
996 user = protect(userof(mp));
  /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/
rsa_sig.c 509 int protect; local
525 if (!ossl_rsa_key_op_get_protect(prsactx->rsa, operation, &protect))
604 prsactx->rsa, desc, protect))
  /src/external/gpl2/mkhybrid/dist/
apple.h 261 byte protect; /* = 1 for protected file, 0 otherwise */ member in struct:__anon9484
  /src/external/mpl/dhcp/bind/dist/lib/dns/
rbtdb.c 153 * to protect the access to the counters by locks.
157 * NODE_UNLOCK. In some other cases, however, we need to protect reference
158 * counters first and then protect other parts of a node as read-only data.
161 * routines, we should only protect the "other members" by NODE_WEAKLOCK(read).
162 * Otherwise, we should use NODE_STRONGLOCK() to protect the entire critical
7690 int protect, flags; local
7704 protect = PROT_READ | PROT_WRITE;
7710 base = isc_file_mmap(NULL, filesize, protect, flags, fd, 0);
  /src/external/public-domain/sqlite/dist/
sqlite3.c 2737 ** takes additional defensive steps to protect the application from harm
6920 ** threads should mutex-protect calls to this API and should make their own
50522 DWORD protect = PAGE_READWRITE; local
50743 DWORD protect = PAGE_READONLY; local
    [all...]

Completed in 100 milliseconds