/third_party/openssl/test/ |
H A D | cmp_protect_test.c | 21 /* for protection tests */ 76 ASN1_BIT_STRING *protection = in execute_calc_protection_fails_test() local 78 int res = TEST_ptr_null(protection); in execute_calc_protection_fails_test() 80 ASN1_BIT_STRING_free(protection); in execute_calc_protection_fails_test() 86 ASN1_BIT_STRING *protection = in execute_calc_protection_pbmac_test() local 88 int res = TEST_ptr(protection) in execute_calc_protection_pbmac_test() 89 && TEST_true(ASN1_STRING_cmp(protection, in execute_calc_protection_pbmac_test() 90 fixture->msg->protection) == 0); in execute_calc_protection_pbmac_test() 92 ASN1_BIT_STRING_free(protection); in execute_calc_protection_pbmac_test() 101 ASN1_BIT_STRING *protection, in verify_signature() 100 verify_signature(OSSL_CMP_MSG *msg, ASN1_BIT_STRING *protection, EVP_PKEY *pkey, EVP_MD *digest) verify_signature() argument 130 ASN1_BIT_STRING *protection = execute_calc_protection_signature_test() local [all...] |
H A D | cmp_vfy_test.c | 260 || (bad_sig && !flip_bit(fixture->msg->protection))) { in test_validate_msg_signature_srvcert()
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_vfy.c | 55 msg->header->protectionAlg, msg->protection, in verify_signature() 79 ASN1_BIT_STRING *protection = NULL; in verify_PBMAC() local 82 /* generate expected protection for the message */ in verify_PBMAC() 83 if ((protection = ossl_cmp_calc_protection(ctx, msg)) == NULL) in verify_PBMAC() 84 return 0; /* failed to generate protection string! */ in verify_PBMAC() 86 valid = msg->protection != NULL && msg->protection->length >= 0 in verify_PBMAC() 87 && msg->protection->type == protection->type in verify_PBMAC() 88 && msg->protection in verify_PBMAC() [all...] |
H A D | cmp_protect.c | 24 * Calculate protection for given PKImessage according to 28 * returns ASN1_BIT_STRING representing the protection on success, else NULL 57 unsigned char *protection = NULL; in ossl_cmp_calc_protection() local 89 &protection, &sig_len)) in ossl_cmp_calc_protection() 97 if (!ASN1_BIT_STRING_set(prot, protection, sig_len)) { in ossl_cmp_calc_protection() 103 OPENSSL_free(protection); in ossl_cmp_calc_protection() 138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts() 185 * Create an X509_ALGOR structure for PasswordBasedMAC protection based on 262 * For the case of re-protection remove pre-existing protection in ossl_cmp_msg_protect() [all...] |
H A D | cmp_asn.c | 450 ASN1_EXP_OPT(OSSL_CMP_MSG, protection, ASN1_BIT_STRING, 0),
|
H A D | cmp_local.h | 60 * accept missing or invalid protection of regular error messages, negative 72 * when validating message protection; this is used for 3GPP-style E.7 78 X509 *cert; /* protection cert used to identify and sign for MSG_SIG_ALG */ 79 STACK_OF(X509) *chain; /* (cached) chain of protection cert including it */ 459 * -- algorithm used for calculation of protection bits 462 * -- to identify specific keys used for protection 469 * -- nonces used to provide replay protection, senderNonce 662 * protection [0] PKIProtection OPTIONAL, 670 ASN1_BIT_STRING *protection; /* 0 */ member
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_vfy.c | 55 msg->header->protectionAlg, msg->protection, in verify_signature() 79 ASN1_BIT_STRING *protection = NULL; in verify_PBMAC() local 82 /* generate expected protection for the message */ in verify_PBMAC() 83 if ((protection = ossl_cmp_calc_protection(ctx, msg)) == NULL) in verify_PBMAC() 84 return 0; /* failed to generate protection string! */ in verify_PBMAC() 86 valid = msg->protection != NULL && msg->protection->length >= 0 in verify_PBMAC() 87 && msg->protection->type == protection->type in verify_PBMAC() 88 && msg->protection in verify_PBMAC() [all...] |
H A D | cmp_protect.c | 24 * Calculate protection for given PKImessage according to 28 * returns ASN1_BIT_STRING representing the protection on success, else NULL 57 unsigned char *protection = NULL; in ossl_cmp_calc_protection() local 89 &protection, &sig_len)) in ossl_cmp_calc_protection() 97 if (!ASN1_BIT_STRING_set(prot, protection, sig_len)) { in ossl_cmp_calc_protection() 103 OPENSSL_free(protection); in ossl_cmp_calc_protection() 138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts() 185 * Create an X509_ALGOR structure for PasswordBasedMAC protection based on 262 * For the case of re-protection remove pre-existing protection in ossl_cmp_msg_protect() [all...] |
H A D | cmp_asn.c | 450 ASN1_EXP_OPT(OSSL_CMP_MSG, protection, ASN1_BIT_STRING, 0),
|
H A D | cmp_local.h | 60 * accept missing or invalid protection of regular error messages, negative 72 * when validating message protection; this is used for 3GPP-style E.7 78 X509 *cert; /* protection cert used to identify and sign for MSG_SIG_ALG */ 79 STACK_OF(X509) *chain; /* (cached) chain of protection cert including it */ 459 * -- algorithm used for calculation of protection bits 462 * -- to identify specific keys used for protection 469 * -- nonces used to provide replay protection, senderNonce 662 * protection [0] PKIProtection OPTIONAL, 670 ASN1_BIT_STRING *protection; /* 0 */ member
|
/third_party/ltp/testcases/kernel/syscalls/sendfile/ |
H A D | sendfile04.c | 19 * - a protected buffer is created by mmap with specifying protection 29 int protection; member 56 tc[i].protection, in run() 63 EFAULT, "sendfile(..) with %s, protection=%d", in run() 64 tc[i].desc, tc[i].protection); in run()
|
/third_party/ltp/testcases/kernel/hotplug/memory_hotplug/ |
H A D | segment.c | 562 char *protection, *share, *name; in show_one_segment() local 566 protection = "rw"; in show_one_segment() 570 protection = "r-"; in show_one_segment() 574 protection = "-w"; in show_one_segment() 578 protection = "--"; in show_one_segment() 597 segp->seg_offset, protection, share, name); in show_one_segment() 602 segp->seg_offset, protection, share, name); in show_one_segment() 668 * test protection.
|
/third_party/node/deps/v8/src/wasm/ |
H A D | memory-protection-key.cc | 5 #include "src/wasm/memory-protection-key.h" 8 #include <sys/mman.h> // For {mprotect()} protection macros. 20 // For now, we support memory protection keys/PKEYs/PKU only for Linux on x64 181 int protection = GetProtectionFromMemoryPermission(page_permissions); in SetPermissionsAndMemoryProtectionKey() local 183 int ret = pkey_mprotect(address, size, protection, key); in SetPermissionsAndMemoryProtectionKey()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | twt.c | 32 bool flow_type, u8 flow_id, bool protection, in wpas_twt_send_setup() 79 if (protection) in wpas_twt_send_setup() 29 wpas_twt_send_setup(struct wpa_supplicant *wpa_s, u8 dtok, int exponent, int mantissa, u8 min_twt, int setup_cmd, u64 twt, bool requestor, bool trigger, bool implicit, bool flow_type, u8 flow_id, bool protection, u8 twt_channel, u8 control) wpas_twt_send_setup() argument
|
H A D | wpa_supplicant_i.h | 1722 bool flow_type, u8 flow_id, bool protection,
|
H A D | ctrl_iface.c | 10508 bool protection = false; 10558 tok_s = os_strstr(cmd, " protection="); 10560 protection = atoi(tok_s + os_strlen(" protection=")); 10572 flow_type, flow_id, protection, twt_channel,
|
/third_party/node/src/large_pages/ |
H A D | node_large_page.cc | 247 if (end > start && (map.protection & VM_PROT_READ) != 0 && in FindNodeTextRegion() 248 (map.protection & VM_PROT_EXECUTE) != 0) { in FindNodeTextRegion()
|
/third_party/rust/crates/libc/src/unix/haiku/ |
H A D | native.rs | 209 pub protection: u32, 850 protection: u32, in create_area() 856 protection: u32, in clone_area()
|
/third_party/node/deps/v8/src/base/platform/ |
H A D | platform-win32.cc | 1174 DWORD protection = in open() 1178 CreateFileMapping(file, nullptr, protection, 0, size, nullptr); in open()
|
/third_party/rust/crates/libc/src/unix/bsd/freebsdlike/dragonfly/ |
H A D | mod.rs | 358 pub protection: ::vm_prot_t,
|