/macosx-10.10/BerkeleyDB-21/db/os/ |
H A D | os_map.c | 429 int flags, prot, ret; local 486 prot = PROT_READ | (is_rdonly ? 0 : PROT_WRITE); 511 len, prot, flags, fhp->fd, (off_t)0)) == (void *)MAP_FAILED) {
|
/macosx-10.10/Heimdal-398.1.2/appl/ftp/ftp/ |
H A D | security.c | 496 prot(char *pl) function
|
H A D | security.h | 121 void prot (char *);
|
/macosx-10.10/Heimdal-398.1.2/appl/ftp/ftpd/ |
H A D | ftpcmd.y | 691 prot($3); 987 { "PROT", PROT, STR1, 1, "<sp> prot-level" },
|
/macosx-10.10/IOPCIFamily-239.1.2/IOKit/pci/ |
H A D | IOPCIBridge.h | 265 IOReturn protectDevice(IOPCIDevice * device, uint32_t space, uint32_t prot);
|
H A D | IOPCIDevice.h | 841 IOReturn protectDevice(uint32_t space, uint32_t prot);
|
/macosx-10.10/IOPCIFamily-239.1.2/ |
H A D | IOPCIBridge.cpp | 1953 IOReturn IOPCIBridge::protectDevice(IOPCIDevice * device, uint32_t space, uint32_t prot) argument 1957 prot &= (VM_PROT_READ|VM_PROT_WRITE); 1958 prot <<= kPCIDeviceStateConfigProtectShift; 1960 DLOG("%s::protectDevice(%x, %x)\n", device->getName(), space, prot); 1962 ret = configOp(device, kConfigOpProtect, &prot);
|
H A D | IOPCIDevice.cpp | 1127 IOReturn IOPCIDevice::protectDevice(uint32_t space, uint32_t prot) argument 1132 reserved->configProt = prot; 1134 return (parent->protectDevice(this, space, prot));
|
/macosx-10.10/Libc-1044.1.2/gen/FreeBSD/ |
H A D | glob.c | 193 Char *bufnext, *bufend, patbuf[MAXPATHLEN], prot; local 231 prot = M_PROTECT; 233 prot = 0; 239 *bufnext++ = wc | prot;
|
/macosx-10.10/NFS-82/rpc.statd/ |
H A D | file.c | 97 int prot; local 105 prot = PROT_READ; 107 prot |= PROT_WRITE; 109 status_info = mmap(NULL, status_info_len, prot, MAP_SHARED, status_fd, 0);
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/nssov/ |
H A D | service.c | 111 struct berval prot;); 167 if (BER_BVISNULL(&cbp->prot)) 182 protos[0]=cbp->prot; 218 cbp.prot.bv_len = tmpint32; 219 cbp.prot.bv_val = tmpint32 ? cbp.pbuf : NULL;, 220 Debug(LDAP_DEBUG_TRACE,"nssov_service_byname(%s,%s)\n",cbp.name.bv_val,cbp.prot.bv_val,0);, 222 mkfilter_service_byname(cbp.mi,&cbp.name,&cbp.prot,&filter) 235 cbp.prot.bv_len = tmpint32; 236 cbp.prot.bv_val = tmpint32 ? cbp.pbuf : NULL;, 237 Debug(LDAP_DEBUG_TRACE,"nssov_service_bynumber(%s,%s)\n",cbp.name.bv_val,cbp.prot [all...] |
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | xcrypt.c | 37 # include <prot.h> 43 # include <prot.h>
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | sshd.c | 90 #include <prot.h>
|
/macosx-10.10/OpenSSL098-52/src/test/ |
H A D | testca.com | 16 $ set file/prot=(S:RWED,O:RWED,G:RWED,W:RWED) demoCA.dir;* 43 $ set file/prot=(S:RWED,O:RWED,G:RWED,W:RWED) demoCA.dir;* 69 $ set file/prot=(S:RWED,O:RWED,G:RWED,W:RWED) '_fp'
|
H A D | testssl | 127 prot="" 129 prot="-ssl3" 131 $ssltest -cipher $cipher $prot
|
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/ |
H A D | cssmaclpod.h | 117 AclEntryInfo(const AclEntryPrototype &prot, CSSM_ACL_HANDLE h = 0) 118 { proto() = prot; handle() = h; } 135 AclEntryInput(const CSSM_ACL_ENTRY_PROTOTYPE &prot) 136 { Prototype = prot; Callback = NULL; CallerContext = NULL; } 138 AclEntryInput &operator = (const CSSM_ACL_ENTRY_PROTOTYPE &prot) 139 { Prototype = prot; Callback = NULL; CallerContext = NULL; return *this; }
|
/macosx-10.10/Security-57031.1.35/Security/include/security_utilities/ |
H A D | unix++.cpp | 178 void *FileDesc::mmap(int prot, size_t length, int flags, size_t offset, void *addr) argument 182 void *result = ::mmap(addr, length ? length : fileSize(), prot, flags, mFd, offset);
|
H A D | unix++.h | 148 void *mmap(int prot = PROT_READ, size_t length = 0,
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/ |
H A D | cssmaclpod.h | 117 AclEntryInfo(const AclEntryPrototype &prot, CSSM_ACL_HANDLE h = 0) 118 { proto() = prot; handle() = h; } 135 AclEntryInput(const CSSM_ACL_ENTRY_PROTOTYPE &prot) 136 { Prototype = prot; Callback = NULL; CallerContext = NULL; } 138 AclEntryInput &operator = (const CSSM_ACL_ENTRY_PROTOTYPE &prot) 139 { Prototype = prot; Callback = NULL; CallerContext = NULL; return *this; }
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslUtils.c | 123 const char *protocolVersStr(SSLProtocolVersion prot) argument 125 switch(prot) { 132 default: sslErrorLog("protocolVersStr: bad prot\n"); return "BAD PROTOCOL";
|
H A D | sslUtils.h | 75 extern const char *protocolVersStr(SSLProtocolVersion prot);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslUtils.c | 123 const char *protocolVersStr(SSLProtocolVersion prot) argument 125 switch(prot) { 132 default: sslErrorLog("protocolVersStr: bad prot\n"); return "BAD PROTOCOL";
|
H A D | sslUtils.h | 75 extern const char *protocolVersStr(SSLProtocolVersion prot);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | ssl-43-ciphers.c | 118 int prot; member in struct:_CipherSuiteName 125 /* prot: 0 = SSL3, 1=TLSv1.0, 2=TLSv1.1, 3=TLSv1.2 */ 126 #define CIPHER(prot, cipher, offsets...) { prot, cipher, #cipher, offsets}, 446 bool dtls, int sock, CFArrayRef certs, SSLProtocol prot) 453 require_noerr(SSLSetProtocolVersionMax(ctx, prot), out); 626 int comm, CFArrayRef certs, SSLProtocol prot) 637 handle->st = make_ssl_ref(server, client_side_auth, dh_anonymous, dtls, comm, certs, prot); 663 skip("This ciphersuite is not supported for this protocol version", 2, ciphers[i].prot<=pr); 445 make_ssl_ref(bool server, bool client_side_auth, bool dh_anonymous, bool dtls, int sock, CFArrayRef certs, SSLProtocol prot) argument 625 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, int comm, CFArrayRef certs, SSLProtocol prot) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslUtils.c | 123 const char *protocolVersStr(SSLProtocolVersion prot) argument 125 switch(prot) { 132 default: sslErrorLog("protocolVersStr: bad prot\n"); return "BAD PROTOCOL";
|