/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/ |
H A D | cssmaclpod.h | 117 AclEntryInfo(const AclEntryPrototype &prot, CSSM_ACL_HANDLE h = 0) 118 { proto() = prot; handle() = h; } 135 AclEntryInput(const CSSM_ACL_ENTRY_PROTOTYPE &prot) 136 { Prototype = prot; Callback = NULL; CallerContext = NULL; } 138 AclEntryInput &operator = (const CSSM_ACL_ENTRY_PROTOTYPE &prot) 139 { Prototype = prot; Callback = NULL; CallerContext = NULL; return *this; }
|
/macosx-10.10/xnu-2782.1.97/bsd/kern/ |
H A D | kern_core.c | 223 vm_prot_t prot; local 400 prot = vbr.protection; 417 sc64->initprot = prot; 430 sc->initprot = prot; 438 if ((prot & VM_PROT_READ) == 0) { 440 prot|VM_PROT_READ);
|
/macosx-10.10/xnu-2782.1.97/osfmk/device/ |
H A D | iokit_rpc.c | 481 vm_prot_t prot; local 486 prot = (options & kIOMapReadOnly) 524 pmap_map_block(pmap, va, pagenum, (uint32_t) atop_64(round_page_64(length)), prot, 0, 0); 542 vm_prot_t prot; local 548 prot = (options & kIOMapReadOnly) 583 pmap_enter_options(pmap, va + off, ppnum, prot, VM_PROT_NONE, flags, TRUE,
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | ssl-43-ciphers.c | 118 int prot; member in struct:_CipherSuiteName 125 /* prot: 0 = SSL3, 1=TLSv1.0, 2=TLSv1.1, 3=TLSv1.2 */ 126 #define CIPHER(prot, cipher, offsets...) { prot, cipher, #cipher, offsets}, 446 bool dtls, int sock, CFArrayRef certs, SSLProtocol prot) 453 require_noerr(SSLSetProtocolVersionMax(ctx, prot), out); 626 int comm, CFArrayRef certs, SSLProtocol prot) 637 handle->st = make_ssl_ref(server, client_side_auth, dh_anonymous, dtls, comm, certs, prot); 663 skip("This ciphersuite is not supported for this protocol version", 2, ciphers[i].prot<=pr); 445 make_ssl_ref(bool server, bool client_side_auth, bool dh_anonymous, bool dtls, int sock, CFArrayRef certs, SSLProtocol prot) argument 625 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, int comm, CFArrayRef certs, SSLProtocol prot) argument
|
/macosx-10.10/curl-83.1.2/curl/packages/vms/ |
H A D | stage_curl_install.com | 108 $ create/dir 'new_gnu''this_dir'/prot=(o:rwed) 118 $ copy [--.src]curl.exe 'new_gnu'[usr.bin]gnv$curl.exe/prot=w:re 119 $ copy [--]curl-config. 'new_gnu'[usr.bin]curl-config./prot=w:re 120 $ copy sys$disk:[]gnv$libcurl.exe 'new_gnu'[usr.lib]gnv$libcurl.exe/prot=w:re
|
/macosx-10.10/xnu-2782.1.97/osfmk/i386/ |
H A D | pmap_x86_common.c | 424 vm_prot_t prot, 429 (void) pmap_enter_options(pmap, vaddr, pn, prot, fault_type, flags, wired, PMAP_EXPAND_OPTIONS_NONE, NULL); 438 vm_prot_t prot, 480 pn, prot); 482 if ((prot & VM_PROT_EXECUTE) || !nx_enabled || !pmap->nx_enabled) 598 if (prot & VM_PROT_WRITE) { 872 if (prot & VM_PROT_WRITE) 1257 vm_prot_t prot) 1259 pmap_page_protect_options(pn, prot, 0, NULL); 1272 vm_prot_t prot, 420 pmap_enter( register pmap_t pmap, vm_map_offset_t vaddr, ppnum_t pn, vm_prot_t prot, vm_prot_t fault_type, unsigned int flags, boolean_t wired) argument 434 pmap_enter_options( register pmap_t pmap, vm_map_offset_t vaddr, ppnum_t pn, vm_prot_t prot, __unused vm_prot_t fault_type, unsigned int flags, boolean_t wired, unsigned int options, void *arg) argument 1255 pmap_page_protect( ppnum_t pn, vm_prot_t prot) argument 1270 pmap_page_protect_options( ppnum_t pn, vm_prot_t prot, unsigned int options, void *arg) argument 1784 pmap_map_bd( vm_offset_t virt, vm_map_offset_t start_addr, vm_map_offset_t end_addr, vm_prot_t prot, unsigned int flags) argument [all...] |
H A D | trap.c | 513 vm_prot_t prot; local 701 prot = VM_PROT_READ; 704 prot |= VM_PROT_WRITE; 706 prot |= VM_PROT_EXECUTE; 711 prot, 877 vm_prot_t prot; local 1071 prot = VM_PROT_READ; 1074 prot |= VM_PROT_WRITE; 1076 prot |= VM_PROT_EXECUTE; 1080 prot, FALS [all...] |
/macosx-10.10/pyobjc-45/2.5/pyobjc/pyobjc-framework-SystemConfiguration/PyObjCTest/ |
H A D | test_scnetworkconfiguration.py | 228 prot = SCNetworkServiceCopyProtocol(serv, kSCNetworkProtocolTypeIPv4) 229 self.failUnlessIsInstance(prot, SCNetworkProtocolRef) 231 conf = SCNetworkProtocolGetConfiguration(prot) 234 enabled = SCNetworkProtocolGetEnabled(prot) 237 pr = SCNetworkProtocolGetProtocolType(prot) 240 v = SCNetworkProtocolSetConfiguration(prot, conf) 243 v = SCNetworkProtocolSetEnabled(prot, enabled)
|
/macosx-10.10/pyobjc-45/2.6/pyobjc/pyobjc-framework-SystemConfiguration/PyObjCTest/ |
H A D | test_scnetworkconfiguration.py | 235 prot = SCNetworkServiceCopyProtocol(serv, kSCNetworkProtocolTypeIPv4) 236 self.assertIsInstance(prot, SCNetworkProtocolRef) 238 conf = SCNetworkProtocolGetConfiguration(prot) 241 enabled = SCNetworkProtocolGetEnabled(prot) 244 pr = SCNetworkProtocolGetProtocolType(prot) 247 v = SCNetworkProtocolSetConfiguration(prot, conf) 250 v = SCNetworkProtocolSetEnabled(prot, enabled)
|
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-framework-SystemConfiguration-2.5.1/PyObjCTest/ |
H A D | test_scnetworkconfiguration.py | 246 prot = SCNetworkServiceCopyProtocol(serv, kSCNetworkProtocolTypeIPv4) 247 self.assertIsInstance(prot, SCNetworkProtocolRef) 249 conf = SCNetworkProtocolGetConfiguration(prot) 252 enabled = SCNetworkProtocolGetEnabled(prot) 255 pr = SCNetworkProtocolGetProtocolType(prot) 258 v = SCNetworkProtocolSetConfiguration(prot, conf) 261 v = SCNetworkProtocolSetEnabled(prot, enabled)
|
/macosx-10.10/xnu-2782.1.97/iokit/Kernel/ |
H A D | IOMemoryDescriptor.cpp | 311 vm_prot_t prot = 0; local 315 SET_MAP_MEM(MAP_MEM_IO, prot); 319 SET_MAP_MEM(MAP_MEM_WTHRU, prot); 323 SET_MAP_MEM(MAP_MEM_WCOMB, prot); 327 SET_MAP_MEM(MAP_MEM_COPYBACK, prot); 331 SET_MAP_MEM(MAP_MEM_INNERWBACK, prot); 336 SET_MAP_MEM(MAP_MEM_NOOP, prot); 340 return (prot); 390 vm_prot_t prot; member in struct:IOMemoryReference 475 vm_prot_t prot; local 675 vm_prot_t prot; member in struct:IOMemoryDescriptorMapAllocRef 728 vm_prot_t prot, memEntryCacheMode; local [all...] |
/macosx-10.10/xnu-2782.1.97/osfmk/vm/ |
H A D | vm_fault.c | 952 "vm_f_page: obj 0x%X, offset 0x%X, type %d, prot %d\n", 2521 vm_prot_t prot, 2564 prot &= ~VM_PROT_WRITE; 2608 #define page_immutable(m,prot) ((m)->cs_validated /*&& ((prot) & VM_PROT_EXECUTE)*/) 2627 map_is_switch_protected && page_immutable(m, prot) && 2628 (prot & VM_PROT_WRITE)) 2646 (!m->cs_validated && (prot & VM_PROT_EXECUTE)) || 2660 (page_immutable(m, prot) && ((prot 2518 vm_fault_enter(vm_page_t m, pmap_t pmap, vm_map_offset_t vaddr, vm_prot_t prot, vm_prot_t fault_type, boolean_t wired, boolean_t change_wiring, boolean_t no_cache, boolean_t cs_bypass, __unused int user_tag, int pmap_options, boolean_t *need_retry, int *type_of_fault) argument 3245 vm_prot_t prot; /* Protection for mapping */ local 4981 vm_prot_t prot; local 5115 vm_prot_t prot; local [all...] |
H A D | vm_fault.h | 175 vm_prot_t prot,
|
/macosx-10.10/OpenSSL098-52/src/test/ |
H A D | testssl | 127 prot="" 129 prot="-ssl3" 131 $ssltest -cipher $cipher $prot
|
/macosx-10.10/BerkeleyDB-21/db/os/ |
H A D | os_map.c | 429 int flags, prot, ret; local 486 prot = PROT_READ | (is_rdonly ? 0 : PROT_WRITE); 511 len, prot, flags, fhp->fd, (off_t)0)) == (void *)MAP_FAILED) {
|
/macosx-10.10/dyld-353.2.1/src/ |
H A D | glue.c | 359 void* mmap(void* addr, size_t len, int prot, int flags, int fd, off_t offset) { argument 360 return gSyscallHelpers->mmap(addr, len, prot, flags, fd, offset); 410 vm_size_t size, boolean_t max, vm_prot_t prot) { 411 return gSyscallHelpers->vm_protect(target_task, address, size, max, prot); 409 vm_protect(vm_map_t target_task, vm_address_t address, vm_size_t size, boolean_t max, vm_prot_t prot) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/sslViewer/ |
H A D | sslAppUtils.h | 25 const char *sslGetProtocolVersionString(SSLProtocol prot);
|
H A D | sslAppUtils.cpp | 164 const char *sslGetProtocolVersionString(SSLProtocol prot) argument 168 switch(prot) { 178 sprintf(noProt, "Unknown (%d)", (unsigned)prot); 1331 SSLProtocol prot; 1334 prot = kSSLProtocol2; 1337 prot = kSSLProtocol3; 1340 prot = kTLSProtocol1; 1346 ortn = SSLSetProtocolVersionEnabled(ctx, prot, true);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | sslAppUtils.h | 17 const char *sslGetProtocolVersionString(SSLProtocol prot);
|
/macosx-10.10/Security-57031.1.35/sslViewer/ |
H A D | sslAppUtils.h | 24 const char *sslGetProtocolVersionString(SSLProtocol prot);
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | pingpong.c | 310 enum protection_level prot = conn->data_prot; local 317 DEBUGASSERT(prot > PROT_NONE && prot < PROT_LAST); 318 conn->data_prot = prot;
|
/macosx-10.10/ruby-106/ruby/ext/socket/ |
H A D | unixsocket.c | 55 int prot; local 60 status = (int)rb_protect(unixsock_connect_internal, (VALUE)&arg, &prot); 61 if (prot) { 63 rb_jump_tag(prot);
|
/macosx-10.10/sudo-73/src/ |
H A D | getspwuid.c | 57 # include <prot.h>
|
/macosx-10.10/xnu-2782.1.97/osfmk/x86_64/ |
H A D | pmap.c | 267 vm_prot_t prot, 275 (ppnum_t) i386_btop(start_addr), prot, VM_PROT_NONE, flags, TRUE); local 1396 vm_prot_t prot) 1398 pmap_protect_options(map, sva, eva, prot, 0, NULL); 1412 vm_prot_t prot, 1428 if (prot == VM_PROT_NONE) { 1437 if ((prot & VM_PROT_EXECUTE) || !nx_enabled || !map->nx_enabled) 1465 if (prot & VM_PROT_WRITE) 1499 vm_prot_t prot, 1512 pmap_enter(pmap, va, pa, prot, VM_PROT_NON 263 pmap_map( vm_offset_t virt, vm_map_offset_t start_addr, vm_map_offset_t end_addr, vm_prot_t prot, unsigned int flags) argument 1392 pmap_protect( pmap_t map, vm_map_offset_t sva, vm_map_offset_t eva, vm_prot_t prot) argument 1408 pmap_protect_options( pmap_t map, vm_map_offset_t sva, vm_map_offset_t eva, vm_prot_t prot, unsigned int options, void *arg) argument 1494 pmap_map_block( pmap_t pmap, addr64_t va, ppnum_t pa, uint32_t size, vm_prot_t prot, int attr, __unused unsigned int flags) argument 2577 vm_prot_t prot; local [all...] |
/macosx-10.10/xnu-2782.1.97/security/ |
H A D | mac_process.c | 383 user_size_t u_size, int prot, int flags, int *maxprot) 393 MAC_CHECK(proc_check_map_anon, proc, cred, u_addr, u_size, prot, flags, maxprot); 401 user_addr_t addr, user_size_t size, int prot) 411 MAC_CHECK(proc_check_mprotect, cred, proc, addr, size, prot); 382 mac_proc_check_map_anon(proc_t proc, user_addr_t u_addr, user_size_t u_size, int prot, int flags, int *maxprot) argument 400 mac_proc_check_mprotect(proc_t proc, user_addr_t addr, user_size_t size, int prot) argument
|