HomeSort by: relevance | last modified time | path
    Searched defs:secure (Results 1 - 25 of 42) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/include/crypto/
rand_pool.h 45 * There is a distinction between the secure and normal allocation minimums.
46 * Ideally, the secure allocation size should be a power of two. The normal
49 * The secure value is based on 128 bits of secure material, which is 16 bytes.
59 #define RAND_POOL_MIN_ALLOCATION(secure) ((secure) ? 16 : 48)
75 int secure; /* 1: allocated on the secure heap, 0: otherwise */ member in struct:rand_pool_st
84 RAND_POOL *ossl_rand_pool_new(int entropy_requested, int secure,
  /src/crypto/external/bsd/openssl/dist/include/crypto/
rand_pool.h 46 * There is a distinction between the secure and normal allocation minimums.
47 * Ideally, the secure allocation size should be a power of two. The normal
50 * The secure value is based on 128 bits of secure material, which is 16 bytes.
60 # define RAND_POOL_MIN_ALLOCATION(secure) ((secure) ? 16 : 48)
76 int secure; /* 1: allocated on the secure heap, 0: otherwise */ member in struct:rand_pool_st
85 RAND_POOL *ossl_rand_pool_new(int entropy_requested, int secure,
  /src/sbin/blkdiscard/
blkdiscard.c 50 static bool secure = false; variable
86 if (secure)
138 secure = true;
157 if (secure)
158 usage("blkdiscard: secure erase not yet implemented\n");
231 secure ? "secure erase" :
  /src/usr.sbin/ypserv/ypserv/
ypserv_proc.c 152 int secure; local
159 secure = ypdb_secure(k->domain, k->map);
162 "match_2: request from %.500s, secure %s, domain %s, map %s, "
163 "key %.*s", clientstr, TORF(secure), k->domain, k->map,
166 if (secure && securecheck(caller)) {
170 res = ypdb_get_record(k->domain, k->map, k->keydat, secure);
181 int secure; local
188 secure = ypdb_secure(k->domain, k->map);
191 "first_2: request from %.500s, secure %s, domain %s, map %s",
192 clientstr, TORF(secure), k->domain, k->map))
209 int secure; local
316 int secure; local
362 int secure; local
404 int secure; local
    [all...]
ypserv_db.c 75 int secure; /* is this map secure? */ member in struct:opt_map
440 m->secure = FALSE;
445 m->secure = TRUE;
455 domain, map, m->host_lookup, m->secure, m->db);
827 int secure; local
831 secure = FALSE;
835 return (secure);
837 secure = map_info->secure;
    [all...]
  /src/external/apache2/llvm/dist/clang/lib/Headers/
arm_cmse.h 18 #define CMSE_AU_NONSECURE 2 /* checks if permissions have secure field unset */
21 #define CMSE_MPU_NONSECURE 16 /* sets A flag, checks if secure field unset */
38 unsigned secure : 1; member in struct:__anon3037::cmse_address_info
77 unsigned secure : 1;
182 return __permb.flags.secure ? NULL : __pb;
  /src/external/bsd/nvi/dist/common/
main.c 74 int ch, flagchk, lflag, secure, startup, readonly, rval, silent; local
112 lflag = secure = silent = 0;
184 secure = 1;
269 if (secure)
  /src/external/gpl3/gcc/dist/gcc/config/arm/
arm_cmse.h 1 /* ARMv8-M Secure Extensions intrinsics include file.
46 unsigned secure:1; member in struct:__anon12691::cmse_address_info
91 unsigned secure:1; member in struct:__anon12692::cmse_address_info
  /src/external/gpl3/gcc.old/dist/gcc/config/arm/
arm_cmse.h 1 /* ARMv8-M Secure Extensions intrinsics include file.
46 unsigned secure:1; member in struct:__anon15306::cmse_address_info
91 unsigned secure:1; member in struct:__anon15307::cmse_address_info
  /src/bin/pax/
pax.c 118 int secure = 1; /* don't extract names that contain .. */ variable
276 if (act == EXTRACT && secure) {
  /src/crypto/external/apache2/openssl/dist/crypto/
param_build.c 27 int secure; member in struct:__anon334
53 int secure)
63 if ((pd->secure = secure) != 0)
196 int n, secure = 0; local
220 secure = 1;
226 pd = param_push(bld, key, sz, sz, type, secure);
256 int secure; local
260 secure = CRYPTO_secure_allocated(buf);
261 pd = param_push(bld, key, bsize, bsize + 1, OSSL_PARAM_UTF8_STRING, secure);
286 int secure; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/
param_build.c 27 int secure; member in struct:__anon1433
53 int secure)
65 if ((pd->secure = secure) != 0)
203 int n, secure = 0; local
223 secure = 1;
229 pd = param_push(bld, key, sz, sz, OSSL_PARAM_UNSIGNED_INTEGER, secure);
240 int secure; local
248 secure = CRYPTO_secure_allocated(buf);
249 pd = param_push(bld, key, bsize, bsize + 1, OSSL_PARAM_UTF8_STRING, secure);
278 int secure; local
    [all...]
  /src/external/bsd/less/dist/
main.c 34 public int secure; variable
87 #if SECURE
88 secure = 1;
90 secure = 0;
93 secure = 1;
  /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/
validator.h 32 * Correct operation is critical to preventing spoofed answers from secure
72 * If the RESULT is ISC_R_SUCCESS and the answer is secure then
104 * Answer is secure.
106 bool secure; member in struct:dns_validatorevent
203 * response was successfully proven to be either secure or
  /src/crypto/external/bsd/openssl.old/dist/crypto/rand/
rand_local.h 77 * There is a distinction between the secure and normal allocation minimums.
78 * Ideally, the secure allocation size should be a power of two. The normal
81 * The secure value is based on 128 bits of secure material, which is 16 bytes.
91 # define RAND_POOL_MIN_ALLOCATION(secure) ((secure) ? 16 : 48)
172 int secure; /* 1: allocated on the secure heap, 0: otherwise */ member in struct:rand_pool_st
188 int secure; /* 1: allocated on the secure heap, 0: otherwise * member in struct:rand_drbg_st
    [all...]
  /src/external/gpl3/gcc/dist/gcc/config/nds32/
nds32-isr.cc 668 tree secure; local
690 secure = lookup_attribute ("secure", func_attrs);
691 if (secure != NULL)
693 security_level_list = TREE_VALUE (secure);
699 /* If there is no secure attribute, the security level is set by
700 nds32_isr_secure_level, which is controlled by -misr-secure=X option.
  /src/external/gpl3/gcc.old/dist/gcc/config/nds32/
nds32-isr.cc 668 tree secure; local
690 secure = lookup_attribute ("secure", func_attrs);
691 if (secure != NULL)
693 security_level_list = TREE_VALUE (secure);
699 /* If there is no secure attribute, the security level is set by
700 nds32_isr_secure_level, which is controlled by -misr-secure=X option.
  /src/external/mpl/bind/dist/lib/dns/include/dns/
validator.h 31 * Correct operation is critical to preventing spoofed answers from secure
123 * Answer is secure.
125 bool secure; member in struct:dns_validator
223 * response was successfully proven to be either secure or
  /src/external/mpl/bind/dist/lib/dns/
rbtdb_p.h 79 bool secure; member in struct:dns_rbtdb_version
416 * Update the secure status for an RBT database version 'version'.
417 * The version will be marked secure if it is fully signed and
rbt-zonedb.c 789 bool secure DNS__DB_FLARG) {
801 bool need_sig = secure;
1080 if ((search.rbtversion->secure &&
1087 search.rbtversion->secure DNS__DB_FLARG_PASS);
1347 if (search.rbtversion->secure &&
1352 * The zone is secure but there's no NSEC,
1364 search.rbtversion->secure DNS__DB_FLARG_PASS);
1375 if (search.rbtversion->secure && !search.rbtversion->havensec3)
1844 * zone key, we consider the zone secure.
1865 bool secure; local
    [all...]
  /src/bin/ed/
main.c 97 int secure = 0; /* is set, ! is not allowed */ variable
142 secure = 1;
994 if (red || secure) {
  /src/libexec/tftpd/
tftpd.c 109 static int secure; variable
227 secure = 1;
291 if (secure) {
  /src/external/bsd/unbound/dist/daemon/
worker.c 502 /** check if a delegation is secure */
566 int secure = 0; local
616 /* all rrsets are secure */
617 /* remove non-secure rrsets from the add. section*/
620 secure = 1;
625 /* not secure */
626 secure = 0;
654 udpsize, edns, (int)(edns->bits & EDNS_DO), secure)) {
663 if(secure) worker->stats.ans_secure++;
829 verbose(VERB_ALGO, "Cache reply: secure entry
    [all...]
  /src/external/bsd/unbound/dist/libunbound/
unbound.h 180 * and secure is true. This means that the non-existence of the data
183 int secure; member in struct:ub_result
186 * If the result was not secure (secure==0), and this result is due
192 * If !secure and !bogus, this can happen if the data is not secure
393 * These addresses are not flagged as DNSSEC secure when queried for.
769 /** answers that were secure (AD) */
  /src/external/bsd/unbound/dist/services/
mesh.c 374 verbose(VERB_ALGO, "Serve expired: secure entry"
1310 int secure; local
1316 secure = 1;
1317 else secure = 0;
1354 (int)(r->edns.bits & EDNS_DO), secure))
1431 int secure; local
1453 secure = 1;
1454 else secure = 0;
1530 * validation paths may attach to a secure answer. */
1542 secure))
    [all...]

Completed in 84 milliseconds

1 2