| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| rand_pool.h | 45 * There is a distinction between the secure and normal allocation minimums. 46 * Ideally, the secure allocation size should be a power of two. The normal 49 * The secure value is based on 128 bits of secure material, which is 16 bytes. 59 #define RAND_POOL_MIN_ALLOCATION(secure) ((secure) ? 16 : 48) 75 int secure; /* 1: allocated on the secure heap, 0: otherwise */ member in struct:rand_pool_st 84 RAND_POOL *ossl_rand_pool_new(int entropy_requested, int secure,
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| rand_pool.h | 46 * There is a distinction between the secure and normal allocation minimums. 47 * Ideally, the secure allocation size should be a power of two. The normal 50 * The secure value is based on 128 bits of secure material, which is 16 bytes. 60 # define RAND_POOL_MIN_ALLOCATION(secure) ((secure) ? 16 : 48) 76 int secure; /* 1: allocated on the secure heap, 0: otherwise */ member in struct:rand_pool_st 85 RAND_POOL *ossl_rand_pool_new(int entropy_requested, int secure,
|
| /src/sbin/blkdiscard/ |
| blkdiscard.c | 50 static bool secure = false; variable 86 if (secure) 138 secure = true; 157 if (secure) 158 usage("blkdiscard: secure erase not yet implemented\n"); 231 secure ? "secure erase" :
|
| /src/usr.sbin/ypserv/ypserv/ |
| ypserv_proc.c | 152 int secure; local 159 secure = ypdb_secure(k->domain, k->map); 162 "match_2: request from %.500s, secure %s, domain %s, map %s, " 163 "key %.*s", clientstr, TORF(secure), k->domain, k->map, 166 if (secure && securecheck(caller)) { 170 res = ypdb_get_record(k->domain, k->map, k->keydat, secure); 181 int secure; local 188 secure = ypdb_secure(k->domain, k->map); 191 "first_2: request from %.500s, secure %s, domain %s, map %s", 192 clientstr, TORF(secure), k->domain, k->map)) 209 int secure; local 316 int secure; local 362 int secure; local 404 int secure; local [all...] |
| ypserv_db.c | 75 int secure; /* is this map secure? */ member in struct:opt_map 440 m->secure = FALSE; 445 m->secure = TRUE; 455 domain, map, m->host_lookup, m->secure, m->db); 827 int secure; local 831 secure = FALSE; 835 return (secure); 837 secure = map_info->secure; [all...] |
| /src/external/apache2/llvm/dist/clang/lib/Headers/ |
| arm_cmse.h | 18 #define CMSE_AU_NONSECURE 2 /* checks if permissions have secure field unset */ 21 #define CMSE_MPU_NONSECURE 16 /* sets A flag, checks if secure field unset */ 38 unsigned secure : 1; member in struct:__anon3037::cmse_address_info 77 unsigned secure : 1; 182 return __permb.flags.secure ? NULL : __pb;
|
| /src/external/bsd/nvi/dist/common/ |
| main.c | 74 int ch, flagchk, lflag, secure, startup, readonly, rval, silent; local 112 lflag = secure = silent = 0; 184 secure = 1; 269 if (secure)
|
| /src/external/gpl3/gcc/dist/gcc/config/arm/ |
| arm_cmse.h | 1 /* ARMv8-M Secure Extensions intrinsics include file. 46 unsigned secure:1; member in struct:__anon12691::cmse_address_info 91 unsigned secure:1; member in struct:__anon12692::cmse_address_info
|
| /src/external/gpl3/gcc.old/dist/gcc/config/arm/ |
| arm_cmse.h | 1 /* ARMv8-M Secure Extensions intrinsics include file. 46 unsigned secure:1; member in struct:__anon15306::cmse_address_info 91 unsigned secure:1; member in struct:__anon15307::cmse_address_info
|
| /src/bin/pax/ |
| pax.c | 118 int secure = 1; /* don't extract names that contain .. */ variable 276 if (act == EXTRACT && secure) {
|
| /src/crypto/external/apache2/openssl/dist/crypto/ |
| param_build.c | 27 int secure; member in struct:__anon334 53 int secure) 63 if ((pd->secure = secure) != 0) 196 int n, secure = 0; local 220 secure = 1; 226 pd = param_push(bld, key, sz, sz, type, secure); 256 int secure; local 260 secure = CRYPTO_secure_allocated(buf); 261 pd = param_push(bld, key, bsize, bsize + 1, OSSL_PARAM_UTF8_STRING, secure); 286 int secure; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/ |
| param_build.c | 27 int secure; member in struct:__anon1433 53 int secure) 65 if ((pd->secure = secure) != 0) 203 int n, secure = 0; local 223 secure = 1; 229 pd = param_push(bld, key, sz, sz, OSSL_PARAM_UNSIGNED_INTEGER, secure); 240 int secure; local 248 secure = CRYPTO_secure_allocated(buf); 249 pd = param_push(bld, key, bsize, bsize + 1, OSSL_PARAM_UTF8_STRING, secure); 278 int secure; local [all...] |
| /src/external/bsd/less/dist/ |
| main.c | 34 public int secure; variable 87 #if SECURE 88 secure = 1; 90 secure = 0; 93 secure = 1;
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| validator.h | 32 * Correct operation is critical to preventing spoofed answers from secure 72 * If the RESULT is ISC_R_SUCCESS and the answer is secure then 104 * Answer is secure. 106 bool secure; member in struct:dns_validatorevent 203 * response was successfully proven to be either secure or
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/rand/ |
| rand_local.h | 77 * There is a distinction between the secure and normal allocation minimums. 78 * Ideally, the secure allocation size should be a power of two. The normal 81 * The secure value is based on 128 bits of secure material, which is 16 bytes. 91 # define RAND_POOL_MIN_ALLOCATION(secure) ((secure) ? 16 : 48) 172 int secure; /* 1: allocated on the secure heap, 0: otherwise */ member in struct:rand_pool_st 188 int secure; /* 1: allocated on the secure heap, 0: otherwise * member in struct:rand_drbg_st [all...] |
| /src/external/gpl3/gcc/dist/gcc/config/nds32/ |
| nds32-isr.cc | 668 tree secure; local 690 secure = lookup_attribute ("secure", func_attrs); 691 if (secure != NULL) 693 security_level_list = TREE_VALUE (secure); 699 /* If there is no secure attribute, the security level is set by 700 nds32_isr_secure_level, which is controlled by -misr-secure=X option.
|
| /src/external/gpl3/gcc.old/dist/gcc/config/nds32/ |
| nds32-isr.cc | 668 tree secure; local 690 secure = lookup_attribute ("secure", func_attrs); 691 if (secure != NULL) 693 security_level_list = TREE_VALUE (secure); 699 /* If there is no secure attribute, the security level is set by 700 nds32_isr_secure_level, which is controlled by -misr-secure=X option.
|
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| validator.h | 31 * Correct operation is critical to preventing spoofed answers from secure 123 * Answer is secure. 125 bool secure; member in struct:dns_validator 223 * response was successfully proven to be either secure or
|
| /src/external/mpl/bind/dist/lib/dns/ |
| rbtdb_p.h | 79 bool secure; member in struct:dns_rbtdb_version 416 * Update the secure status for an RBT database version 'version'. 417 * The version will be marked secure if it is fully signed and
|
| rbt-zonedb.c | 789 bool secure DNS__DB_FLARG) { 801 bool need_sig = secure; 1080 if ((search.rbtversion->secure && 1087 search.rbtversion->secure DNS__DB_FLARG_PASS); 1347 if (search.rbtversion->secure && 1352 * The zone is secure but there's no NSEC, 1364 search.rbtversion->secure DNS__DB_FLARG_PASS); 1375 if (search.rbtversion->secure && !search.rbtversion->havensec3) 1844 * zone key, we consider the zone secure. 1865 bool secure; local [all...] |
| /src/bin/ed/ |
| main.c | 97 int secure = 0; /* is set, ! is not allowed */ variable 142 secure = 1; 994 if (red || secure) {
|
| /src/libexec/tftpd/ |
| tftpd.c | 109 static int secure; variable 227 secure = 1; 291 if (secure) {
|
| /src/external/bsd/unbound/dist/daemon/ |
| worker.c | 502 /** check if a delegation is secure */ 566 int secure = 0; local 616 /* all rrsets are secure */ 617 /* remove non-secure rrsets from the add. section*/ 620 secure = 1; 625 /* not secure */ 626 secure = 0; 654 udpsize, edns, (int)(edns->bits & EDNS_DO), secure)) { 663 if(secure) worker->stats.ans_secure++; 829 verbose(VERB_ALGO, "Cache reply: secure entry [all...] |
| /src/external/bsd/unbound/dist/libunbound/ |
| unbound.h | 180 * and secure is true. This means that the non-existence of the data 183 int secure; member in struct:ub_result 186 * If the result was not secure (secure==0), and this result is due 192 * If !secure and !bogus, this can happen if the data is not secure 393 * These addresses are not flagged as DNSSEC secure when queried for. 769 /** answers that were secure (AD) */
|
| /src/external/bsd/unbound/dist/services/ |
| mesh.c | 374 verbose(VERB_ALGO, "Serve expired: secure entry" 1310 int secure; local 1316 secure = 1; 1317 else secure = 0; 1354 (int)(r->edns.bits & EDNS_DO), secure)) 1431 int secure; local 1453 secure = 1; 1454 else secure = 0; 1530 * validation paths may attach to a secure answer. */ 1542 secure)) [all...] |