Searched refs:prot (Results 1 - 25 of 170) sorted by path

1234567

/macosx-10.10/BerkeleyDB-21/db/os/
H A Dos_map.c429 int flags, prot, ret; local
486 prot = PROT_READ | (is_rdonly ? 0 : PROT_WRITE);
511 len, prot, flags, fhp->fd, (off_t)0)) == (void *)MAP_FAILED) {
/macosx-10.10/Heimdal-398.1.2/appl/ftp/ftp/
H A Dsecurity.c496 prot(char *pl) function
H A Dsecurity.h121 void prot (char *);
/macosx-10.10/Heimdal-398.1.2/appl/ftp/ftpd/
H A Dftpcmd.y691 prot($3);
987 { "PROT", PROT, STR1, 1, "<sp> prot-level" },
/macosx-10.10/IOPCIFamily-239.1.2/IOKit/pci/
H A DIOPCIBridge.h265 IOReturn protectDevice(IOPCIDevice * device, uint32_t space, uint32_t prot);
H A DIOPCIDevice.h841 IOReturn protectDevice(uint32_t space, uint32_t prot);
/macosx-10.10/IOPCIFamily-239.1.2/
H A DIOPCIBridge.cpp1953 IOReturn IOPCIBridge::protectDevice(IOPCIDevice * device, uint32_t space, uint32_t prot) argument
1957 prot &= (VM_PROT_READ|VM_PROT_WRITE);
1958 prot <<= kPCIDeviceStateConfigProtectShift;
1960 DLOG("%s::protectDevice(%x, %x)\n", device->getName(), space, prot);
1962 ret = configOp(device, kConfigOpProtect, &prot);
H A DIOPCIDevice.cpp1127 IOReturn IOPCIDevice::protectDevice(uint32_t space, uint32_t prot) argument
1132 reserved->configProt = prot;
1134 return (parent->protectDevice(this, space, prot));
/macosx-10.10/Libc-1044.1.2/gen/FreeBSD/
H A Dglob.c193 Char *bufnext, *bufend, patbuf[MAXPATHLEN], prot; local
231 prot = M_PROTECT;
233 prot = 0;
239 *bufnext++ = wc | prot;
/macosx-10.10/NFS-82/rpc.statd/
H A Dfile.c97 int prot; local
105 prot = PROT_READ;
107 prot |= PROT_WRITE;
109 status_info = mmap(NULL, status_info_len, prot, MAP_SHARED, status_fd, 0);
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/nssov/
H A Dservice.c111 struct berval prot;);
167 if (BER_BVISNULL(&cbp->prot))
182 protos[0]=cbp->prot;
218 cbp.prot.bv_len = tmpint32;
219 cbp.prot.bv_val = tmpint32 ? cbp.pbuf : NULL;,
220 Debug(LDAP_DEBUG_TRACE,"nssov_service_byname(%s,%s)\n",cbp.name.bv_val,cbp.prot.bv_val,0);,
222 mkfilter_service_byname(cbp.mi,&cbp.name,&cbp.prot,&filter)
235 cbp.prot.bv_len = tmpint32;
236 cbp.prot.bv_val = tmpint32 ? cbp.pbuf : NULL;,
237 Debug(LDAP_DEBUG_TRACE,"nssov_service_bynumber(%s,%s)\n",cbp.name.bv_val,cbp.prot
[all...]
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/
H A Dxcrypt.c37 # include <prot.h>
43 # include <prot.h>
/macosx-10.10/OpenSSH-189/openssh/
H A Dsshd.c90 #include <prot.h>
/macosx-10.10/OpenSSL098-52/src/test/
H A Dtestca.com16 $ set file/prot=(S:RWED,O:RWED,G:RWED,W:RWED) demoCA.dir;*
43 $ set file/prot=(S:RWED,O:RWED,G:RWED,W:RWED) demoCA.dir;*
69 $ set file/prot=(S:RWED,O:RWED,G:RWED,W:RWED) '_fp'
H A Dtestssl127 prot=""
129 prot="-ssl3"
131 $ssltest -cipher $cipher $prot
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_utilities/
H A Dcssmaclpod.h117 AclEntryInfo(const AclEntryPrototype &prot, CSSM_ACL_HANDLE h = 0)
118 { proto() = prot; handle() = h; }
135 AclEntryInput(const CSSM_ACL_ENTRY_PROTOTYPE &prot)
136 { Prototype = prot; Callback = NULL; CallerContext = NULL; }
138 AclEntryInput &operator = (const CSSM_ACL_ENTRY_PROTOTYPE &prot)
139 { Prototype = prot; Callback = NULL; CallerContext = NULL; return *this; }
/macosx-10.10/Security-57031.1.35/Security/include/security_utilities/
H A Dunix++.cpp178 void *FileDesc::mmap(int prot, size_t length, int flags, size_t offset, void *addr) argument
182 void *result = ::mmap(addr, length ? length : fileSize(), prot, flags, mFd, offset);
H A Dunix++.h148 void *mmap(int prot = PROT_READ, size_t length = 0,
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/
H A Dcssmaclpod.h117 AclEntryInfo(const AclEntryPrototype &prot, CSSM_ACL_HANDLE h = 0)
118 { proto() = prot; handle() = h; }
135 AclEntryInput(const CSSM_ACL_ENTRY_PROTOTYPE &prot)
136 { Prototype = prot; Callback = NULL; CallerContext = NULL; }
138 AclEntryInput &operator = (const CSSM_ACL_ENTRY_PROTOTYPE &prot)
139 { Prototype = prot; Callback = NULL; CallerContext = NULL; return *this; }
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/
H A DsslUtils.c123 const char *protocolVersStr(SSLProtocolVersion prot) argument
125 switch(prot) {
132 default: sslErrorLog("protocolVersStr: bad prot\n"); return "BAD PROTOCOL";
H A DsslUtils.h75 extern const char *protocolVersStr(SSLProtocolVersion prot);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/
H A DsslUtils.c123 const char *protocolVersStr(SSLProtocolVersion prot) argument
125 switch(prot) {
132 default: sslErrorLog("protocolVersStr: bad prot\n"); return "BAD PROTOCOL";
H A DsslUtils.h75 extern const char *protocolVersStr(SSLProtocolVersion prot);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/
H A Dssl-43-ciphers.c118 int prot; member in struct:_CipherSuiteName
125 /* prot: 0 = SSL3, 1=TLSv1.0, 2=TLSv1.1, 3=TLSv1.2 */
126 #define CIPHER(prot, cipher, offsets...) { prot, cipher, #cipher, offsets},
446 bool dtls, int sock, CFArrayRef certs, SSLProtocol prot)
453 require_noerr(SSLSetProtocolVersionMax(ctx, prot), out);
626 int comm, CFArrayRef certs, SSLProtocol prot)
637 handle->st = make_ssl_ref(server, client_side_auth, dh_anonymous, dtls, comm, certs, prot);
663 skip("This ciphersuite is not supported for this protocol version", 2, ciphers[i].prot<=pr);
445 make_ssl_ref(bool server, bool client_side_auth, bool dh_anonymous, bool dtls, int sock, CFArrayRef certs, SSLProtocol prot) argument
625 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, int comm, CFArrayRef certs, SSLProtocol prot) argument
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/
H A DsslUtils.c123 const char *protocolVersStr(SSLProtocolVersion prot) argument
125 switch(prot) {
132 default: sslErrorLog("protocolVersStr: bad prot\n"); return "BAD PROTOCOL";

Completed in 300 milliseconds

1234567