| /src/crypto/external/apache2/openssl/dist/providers/common/ |
| securitycheck.c | 27 int protect = 0; local 32 protect = 1; 39 protect = 1; 58 *outprotect = protect; 65 * Set protect = 1 for encryption or signing operations, or 0 otherwise. See 68 int ossl_rsa_check_key_size(const RSA *rsa, int protect) 72 if (protect ? (sz < 2048) : (sz < 1024)) 110 * protect should be 1 for any operations that need 112 bits of security 122 int ossl_ec_check_security_strength(const EC_GROUP *group, int protect) 136 if (protect && strength < OSSL_FIPS_MIN_SECURITY_STRENGTH_BITS [all...] |
| securitycheck_fips.c | 38 const RSA *rsa, const char *desc, int protect) 40 int key_approved = ossl_rsa_check_key_size(rsa, protect); 57 int protect) 65 strength_allowed = ossl_ec_check_security_strength(group, protect);
|
| /src/crypto/external/apache2/openssl/dist/providers/common/include/prov/ |
| securitycheck.h | 17 int ossl_rsa_check_key_size(const RSA *rsa, int protect); 23 int ossl_ec_check_security_strength(const EC_GROUP *group, int protect);
|
| /src/crypto/external/bsd/openssl/dist/providers/common/ |
| securitycheck.c | 26 * Set protect = 1 for encryption or signing operations, or 0 otherwise. See 31 int protect = 0; local 35 protect = 1; 41 protect = 1; 64 if (protect ? (sz < 2048) : (sz < 1024)) { 71 /* make protect used */ 72 (void)protect; 80 * protect should be 1 for any operations that need 112 bits of security 92 int ossl_ec_check_key(OSSL_LIB_CTX *ctx, const EC_KEY *ec, int protect) 133 if (protect && strength < 112) [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/common/include/prov/ |
| securitycheck.h | 14 int ossl_ec_check_key(OSSL_LIB_CTX *ctx, const EC_KEY *ec, int protect);
|
| /src/sys/external/bsd/compiler_rt/dist/lib/msan/ |
| msan_linux.cc | 61 // Depending on the kernel configuration, we may not be able to protect 70 Printf("FATAL: Cannot protect memory range %p - %p (%s).\n", beg, end, 138 bool protect = type == MappingDesc::INVALID || local 140 CHECK(!(map && protect)); 141 if (!map && !protect) 151 if (protect) {
|
| /src/sys/external/isc/atheros_hal/dist/ |
| ah_eeprom_v1.c | 115 uint16_t protect, eeprom_version, eeval; local 132 if (!ath_hal_eepromRead(ah, AR_EEPROM_PROTECT, &protect)) { 138 HALDEBUG(ah, HAL_DEBUG_ATTACH, "EEPROM protect 0x%x\n", protect); 187 ee->ee_protect = protect;
|
| /src/external/bsd/kyua-testers/dist/ |
| run.c | 73 /// Must be protected by protect() and unprotect(). 122 protect(void) function 151 protect(); 184 protect(); 432 protect(); 473 protect();
|
| /src/crypto/external/apache2/openssl/dist/providers/fips/include/fips/ |
| fipsindicator.h | 126 const RSA *rsa, const char *desc, int protect); 130 int protect);
|
| /src/sys/arch/mac68k/mac68k/ |
| pramasm.s | 248 movel #0x00d50035,%d1 | we have to set the write protect bit 257 movel #0x00550035,%d1 | de-write-protect the PRAM 268 movel #0x00d50035,%d1 | we have to set the write protect bit 287 bne NoWrit | go around de-write protect logic 288 movel #0x00550035,%d1 | clear write protect bit of PRAM 292 bsr _C_LABEL(Transfer) | and go de-write protect RTC
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kem/ |
| rsa_kem.c | 134 int protect = 0; local 142 if (!ossl_rsa_key_op_get_protect(vrsa, operation, &protect)) 155 prsactx->rsa, desc, protect))
|
| /src/sys/external/bsd/drm2/dist/drm/nouveau/dispnv04/ |
| hw.h | 245 static inline void NVVgaProtect(struct drm_device *dev, int head, bool protect) 249 if (protect) { 257 NVSetEnablePalette(dev, head, protect);
|
| /src/usr.bin/mail/ |
| format.c | 959 * Protect a string against strftime() conversion. 962 protect(const char *str) function 994 subj = protect(subjof(mp)); 995 addr = protect(addrof(mp)); 996 user = protect(userof(mp));
|
| /src/external/gpl3/gcc/dist/gcc/cp/ |
| search.cc | 1151 XBASETYPE. If PROTECT is 0 or two, we do not check access. If it 1152 is 1, we enforce accessibility. If PROTECT is zero, then, for an 1153 ambiguous lookup, we return NULL. If PROTECT is 1, we issue error 1154 messages about inaccessible or ambiguous lookup. If PROTECT is 2, 1165 lookup_member (tree xbasetype, tree name, int protect, bool want_type, 1225 if (protect == 0) 1227 else if (protect == 1) 1236 else if (protect == 2) 1262 if (protect == 1 && !really_overloaded_fn (rval)) 1407 lookup_field (tree xbasetype, tree name, int protect, bool want_type [all...] |
| /src/external/gpl3/gcc.old/dist/gcc/cp/ |
| search.cc | 1100 XBASETYPE. If PROTECT is 0 or two, we do not check access. If it 1101 is 1, we enforce accessibility. If PROTECT is zero, then, for an 1102 ambiguous lookup, we return NULL. If PROTECT is 1, we issue error 1103 messages about inaccessible or ambiguous lookup. If PROTECT is 2, 1114 lookup_member (tree xbasetype, tree name, int protect, bool want_type, 1174 if (protect == 0) 1176 else if (protect == 1) 1185 else if (protect == 2) 1211 if (protect == 1 && !really_overloaded_fn (rval)) 1356 lookup_field (tree xbasetype, tree name, int protect, bool want_type [all...] |
| /src/tests/net/if_bridge/ |
| t_bridge.sh | 437 # Protect shmif0 and shmif2 438 atf_check -s exit:0 $HIJACKING brconfig bridge0 protect shmif0 439 atf_check -s exit:0 $HIJACKING brconfig bridge0 protect shmif2 486 atf_check -s exit:0 $HIJACKING brconfig bridge0 -protect shmif2
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/asymciphers/ |
| rsa_enc.c | 100 int protect = 0; local 105 if (!ossl_rsa_key_op_get_protect(vrsa, operation, &protect)) 130 prsactx->rsa, desc, protect))
|
| /src/sys/arch/sparc64/doc/ |
| TODO | 54 (in other words: let's protect the OF context with the lock, not
|
| /src/external/gpl2/groff/dist/arch/djgpp/ |
| config.bat | 4 Rem The SmallEnv tests protect against fixed and too small size
|
| /src/sys/arch/m68k/m68k/ |
| busaddrerr.s | 242 btst #3,%d1 | write protect bit set? 245 andw #0xc0,%d0 | write protect is set on page:
|
| /src/external/bsd/ntp/dist/ntpd/ |
| ntpd-opts.def | 106 In order to protect the network 149 However, and to protect against broken hardware, such as when the
|
| /src/external/gpl2/mkhybrid/dist/ |
| apple.h | 261 byte protect; /* = 1 for protected file, 0 otherwise */ member in struct:__anon9484
|
| /src/external/gpl3/gdb/dist/gdb/features/ |
| Makefile | 101 microblaze-with-stack-protect.xml \
|
| /src/external/gpl3/gdb.old/dist/gdb/features/ |
| Makefile | 103 microblaze-with-stack-protect.xml \
|
| /src/sys/arch/sun3/sun3x/ |
| locore.s | 238 btst #3,%d1 | write protect bit set? 241 andw #0xc0,%d0 | write protect is set on page:
|