| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| extensions_cust.c | 75 * Find a custom extension from the list. The |role| param is there to 82 ENDPOINT role, unsigned int ext_type, 90 && (role == ENDPOINT_BOTH || role == meth->role 91 || meth->role == ENDPOINT_BOTH)) { 120 ENDPOINT role = ENDPOINT_BOTH; local 123 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; 125 meth = custom_ext_find(exts, role, ext_type, NULL); 260 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, [all...] |
| extensions.c | 424 ENDPOINT role = ENDPOINT_BOTH; local 427 role = ENDPOINT_SERVER; 429 role = ENDPOINT_CLIENT; 443 meth = custom_ext_find(&s->cert->custext, role, thisext->type, 484 ENDPOINT role = ENDPOINT_BOTH; local 488 role = ENDPOINT_SERVER; 490 role = ENDPOINT_CLIENT; 492 meth = custom_ext_find(meths, role, type, &offset);
|
| extensions_clnt.c | 1463 ENDPOINT role = (context & SSL_EXT_TLS1_2_SERVER_HELLO) != 0 local 1470 if (custom_ext_find(&s->cert->custext, role,
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| extensions_cust.c | 75 * Find a custom extension from the list. The |role| param is there to 82 ENDPOINT role, unsigned int ext_type, 90 && (role == ENDPOINT_BOTH || role == meth->role 91 || meth->role == ENDPOINT_BOTH)) { 120 ENDPOINT role = ENDPOINT_BOTH; local 123 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; 125 meth = custom_ext_find(exts, role, ext_type, NULL); 258 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, [all...] |
| extensions.c | 420 ENDPOINT role = ENDPOINT_BOTH; local 423 role = ENDPOINT_SERVER; 425 role = ENDPOINT_CLIENT; 439 meth = custom_ext_find(&s->cert->custext, role, thisext->type, 480 ENDPOINT role = ENDPOINT_BOTH; local 484 role = ENDPOINT_SERVER; 486 role = ENDPOINT_CLIENT; 488 meth = custom_ext_find(meths, role, type, &offset);
|
| /src/external/mpl/dhcp/bind/dist/lib/isccfg/ |
| kaspconf.c | 89 key->role |= DNS_KASP_KEY_ROLE_KSK | DNS_KASP_KEY_ROLE_ZSK; 98 rolestr = cfg_obj_asstring(cfg_tuple_get(config, "role")); 100 key->role |= DNS_KASP_KEY_ROLE_KSK; 102 key->role |= DNS_KASP_KEY_ROLE_ZSK; 104 key->role |= DNS_KASP_KEY_ROLE_KSK; 105 key->role |= DNS_KASP_KEY_ROLE_ZSK; 328 char role[256] = { 0 }; local 346 INSIST(keyalg < ARRAY_SIZE(role)); 349 role[keyalg] |= DNS_KASP_KEY_ROLE_ZSK; 353 role[keyalg] |= DNS_KASP_KEY_ROLE_KSK [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| extensions_cust.c | 75 * Find a custom extension from the list. The |role| param is there to 82 ENDPOINT role, unsigned int ext_type, 90 && (role == ENDPOINT_BOTH || role == meth->role 91 || meth->role == ENDPOINT_BOTH)) { 121 ENDPOINT role = ENDPOINT_BOTH; local 124 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; 126 meth = custom_ext_find(exts, role, ext_type, NULL); 263 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, [all...] |
| extensions.c | 420 ENDPOINT role = ENDPOINT_BOTH; local 423 role = ENDPOINT_SERVER; 425 role = ENDPOINT_CLIENT; 439 meth = custom_ext_find(&s->cert->custext, role, thisext->type, 480 ENDPOINT role = ENDPOINT_BOTH; local 484 role = ENDPOINT_SERVER; 486 role = ENDPOINT_CLIENT; 488 meth = custom_ext_find(meths, role, type, &offset);
|
| extensions_clnt.c | 1567 ENDPOINT role = (context & SSL_EXT_TLS1_2_SERVER_HELLO) != 0 local 1575 if (custom_ext_find(&s->cert->custext, role,
|
| /src/external/bsd/ipf/dist/tools/ |
| ippool.c | 81 fprintf(stderr, "\t-a [-dnv] [-m <name>] [-o <role>] [-t type] [-T ttl] -i <ipaddr>[/netmask]\n"); 82 fprintf(stderr, "\t-A [-dnv] [-m <name>] [-o <role>] [-S <seed>] [-t <type>]\n"); 84 fprintf(stderr, "\t-F [-dv] [-o <role>] [-t <type>]\n"); 86 fprintf(stderr, "\t-r [-dnv] [-m <name>] [-o <role>] [-t type] -i <ipaddr>[/netmask]\n"); 87 fprintf(stderr, "\t-R [-dnv] [-m <name>] [-o <role>] [-t <type>]\n"); 152 int err = 0, c, ipset, role, type = IPLT_POOL, ttl = 0; local 159 role = IPL_LOGIPF; 171 if (setnodeaddr(type, role, ptr, optarg) == 0) 183 "cannot set role after ip address\n"); 186 role = getrole(optarg) 267 int type, role, c, err; local 412 int c, type, role; local 527 int c, role, type, arg; local 593 int role; local 651 int c, role, type, live_kernel; local [all...] |
| ippool_y.y | 89 %type <num> role table inout unit dstopts weighting 106 line: table role ipftree eol { ip_pool_node_t *n; 117 | table role ipfhash eol { iphtent_t *h; 128 | groupmap role number ipfgroup eol 184 role: IPT_ROLE '=' unit { $$ = $3; } label 588 { "role", IPT_ROLE },
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/rbac/ |
| rbacsess.c | 236 // convert the role name to lower case: 237 rbac_to_lower( &reqp->role ); 240 ber_dupbv( &vals[0], &reqp->role ); 271 "role already activated in session\n" ); 306 // convert the role name to lower case: 307 rbac_to_lower( &reqp->role ); 309 ber_dupbv( &m->sml_values[0], &reqp->role ); 314 ber_dupbv( &m->sml_nvalues[0], &reqp->role ); 318 //ber_dupbv( &m->sml_nvalues[0], &reqp->role); 968 /* no role requested, assign all roles from the user to the session. * 974 struct berval role; local 993 struct berval role; local [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/dbus/ |
| dbus_new_handlers_wps.c | 25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member in struct:wps_start_params 45 "dbus: WPS.Start - Wrong Role type, string required"); 47 "Role must be a string"); 52 params->role = 1; 54 params->role = 2; 56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown role %s", val); 186 if (os_strcmp(key, "Role") == 0) 217 * information about role (enrollee or registrar), authorization method 254 "dbus: WPS.Start - Pin required for registrar role"); 256 message, "Pin required for registrar role.") [all...] |
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| kasp.h | 63 uint8_t role; member in struct:dns_kasp_key 735 *\li True, if the key role has DNS_KASP_KEY_ROLE_KSK set. 751 *\li True, if the key role has DNS_KASP_KEY_ROLE_ZSK set. 781 * it has the same role as the kasp key configuration. 797 * Write the identifying information about the policy key (role,
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| kasp.h | 54 uint8_t role; member in struct:dns_kasp_key 625 *\li True, if the key role has DNS_KASP_KEY_ROLE_KSK set. 641 *\li True, if the key role has DNS_KASP_KEY_ROLE_ZSK set.
|
| /src/sys/dev/ic/ |
| isp_ioctl.h | 59 * role that was passed in (the old role will be returned). It almost 72 * Get the current adapter role 120 role : 2, member in struct:isp_fc_device
|
| /src/external/gpl3/gcc/dist/gcc/cp/ |
| contracts.h | 69 /* Assertion role info. */ 83 contract_role* role; member in struct:contract_configuration 94 contract_mode (contract_level level, contract_role *role = NULL) 99 cc.role = role; 116 return u.config.role; 152 /* Returns the default role. */ 223 is the role. */ 233 literal semantic or a TREE_LIST containing the level and role. */ 241 /* The identifier denoting the role of the contract * [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| kasp.c | 519 return key->role & DNS_KASP_KEY_ROLE_KSK; 526 return key->role & DNS_KASP_KEY_ROLE_ZSK; 544 bool role = false; local 557 /* Matching role? */ 558 ret = dst_key_getbool(dkey->key, DST_BOOL_KSK, &role); 559 if (ret != ISC_R_SUCCESS || role != dns_kasp_key_ksk(key)) { 562 ret = dst_key_getbool(dkey->key, DST_BOOL_ZSK, &role); 563 if (ret != ISC_R_SUCCESS || role != dns_kasp_key_zsk(key)) {
|
| /src/external/mpl/bind/dist/lib/isccfg/ |
| kaspconf.c | 133 key->role |= DNS_KASP_KEY_ROLE_KSK | DNS_KASP_KEY_ROLE_ZSK; 150 rolestr = cfg_obj_asstring(cfg_tuple_get(config, "role")); 152 key->role |= DNS_KASP_KEY_ROLE_KSK; 154 key->role |= DNS_KASP_KEY_ROLE_ZSK; 168 key->role |= DNS_KASP_KEY_ROLE_KSK; 169 key->role |= DNS_KASP_KEY_ROLE_ZSK; 216 if ((key->role & DNS_KASP_KEY_ROLE_KSK) != 0 && 221 if ((key->role & DNS_KASP_KEY_ROLE_ZSK) != 0 && 739 char role[256] = { 0 }; local 766 INSIST(keyalg < ARRAY_SIZE(role)); [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/bio/ |
| bss_dgram_pair.c | 269 unsigned int role : 1; /* Determines lock order */ member in struct:bio_dgram_pair_st 394 b1->role = 0; 395 b2->role = 1; 979 x = (a->role == 1) ? a : b; 980 y = (a->role == 1) ? b : a; 982 if (!ossl_assert(a->role != b->role))
|
| /src/crypto/external/apache2/openssl/dist/crypto/hpke/ |
| hpke.c | 57 int role; /* sender(0) or receiver(1) */ member in struct:ossl_hpke_ctx_st 809 OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role, 825 if (role != OSSL_HPKE_ROLE_SENDER && role != OSSL_HPKE_ROLE_RECEIVER) { 845 ctx->role = role; 937 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { 960 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { 989 if (ctx->role != OSSL_HPKE_ROLE_RECEIVER) { 1059 if (ctx->role == OSSL_HPKE_ROLE_SENDER) [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| dpp_auth.c | 846 "DPP: Local policy does not allow Configurator role"); 855 "DPP: Local policy does not allow Enrollee role"); 870 "DPP: Local policy does not allow Configurator/Enrollee role"); 875 wpa_printf(MSG_DEBUG, "DPP: Unexpected role in I-capabilities"); 877 DPP_EVENT_FAIL "Invalid role in I-capabilities 0x%02x", 1382 u8 role = auth->r_capab & DPP_CAPAB_ROLE_MASK; local 1384 if ((auth->configurator && role != DPP_CAPAB_ENROLLEE) || 1385 (!auth->configurator && role != DPP_CAPAB_CONFIGURATOR)) { 1387 DPP_EVENT_FAIL "Unexpected role in R-capabilities 0x%02x", 1388 role); 1418 u8 role; local [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| p2p_supplicant_sd.c | 482 u8 role; local 496 "Role"); 504 role = *pos++; 505 wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role); 507 /* TODO: role specific handling */ 1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role, 1045 wpabuf_put_u8(tlvs, role); 1067 const u8 *dst, const char *role) 1074 subelems = os_strchr(role, ' '); [all...] |
| /src/usr.bin/sdpquery/ |
| print.c | 1671 uint8_t id, role; local 1680 || !sdp_get_uint8(&feature, &role)) 1717 switch(role) { 1720 default: printf(" [Role 0x%02x]", role); break; 1786 if (v & (1<<4)) printf(" Sync-Master Role\n");
|
| /src/crypto/external/apache2/openssl/dist/ssl/record/methods/ |
| recmethod_local.h | 215 int role; member in struct:ossl_record_layer_st 439 int role, int direction, int level,
|