Home
last modified time | relevance | path

Searched refs:protection (Results 1 - 20 of 20) sorted by relevance

/third_party/openssl/test/
H A Dcmp_protect_test.c21 /* for protection tests */
76 ASN1_BIT_STRING *protection = in execute_calc_protection_fails_test() local
78 int res = TEST_ptr_null(protection); in execute_calc_protection_fails_test()
80 ASN1_BIT_STRING_free(protection); in execute_calc_protection_fails_test()
86 ASN1_BIT_STRING *protection = in execute_calc_protection_pbmac_test() local
88 int res = TEST_ptr(protection) in execute_calc_protection_pbmac_test()
89 && TEST_true(ASN1_STRING_cmp(protection, in execute_calc_protection_pbmac_test()
90 fixture->msg->protection) == 0); in execute_calc_protection_pbmac_test()
92 ASN1_BIT_STRING_free(protection); in execute_calc_protection_pbmac_test()
101 ASN1_BIT_STRING *protection, in verify_signature()
100 verify_signature(OSSL_CMP_MSG *msg, ASN1_BIT_STRING *protection, EVP_PKEY *pkey, EVP_MD *digest) verify_signature() argument
130 ASN1_BIT_STRING *protection = execute_calc_protection_signature_test() local
[all...]
H A Dcmp_vfy_test.c260 || (bad_sig && !flip_bit(fixture->msg->protection))) { in test_validate_msg_signature_srvcert()
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_vfy.c55 msg->header->protectionAlg, msg->protection, in verify_signature()
79 ASN1_BIT_STRING *protection = NULL; in verify_PBMAC() local
82 /* generate expected protection for the message */ in verify_PBMAC()
83 if ((protection = ossl_cmp_calc_protection(ctx, msg)) == NULL) in verify_PBMAC()
84 return 0; /* failed to generate protection string! */ in verify_PBMAC()
86 valid = msg->protection != NULL && msg->protection->length >= 0 in verify_PBMAC()
87 && msg->protection->type == protection->type in verify_PBMAC()
88 && msg->protection in verify_PBMAC()
[all...]
H A Dcmp_protect.c24 * Calculate protection for given PKImessage according to
28 * returns ASN1_BIT_STRING representing the protection on success, else NULL
57 unsigned char *protection = NULL; in ossl_cmp_calc_protection() local
89 &protection, &sig_len)) in ossl_cmp_calc_protection()
97 if (!ASN1_BIT_STRING_set(prot, protection, sig_len)) { in ossl_cmp_calc_protection()
103 OPENSSL_free(protection); in ossl_cmp_calc_protection()
138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts()
185 * Create an X509_ALGOR structure for PasswordBasedMAC protection based on
262 * For the case of re-protection remove pre-existing protection in ossl_cmp_msg_protect()
[all...]
H A Dcmp_asn.c450 ASN1_EXP_OPT(OSSL_CMP_MSG, protection, ASN1_BIT_STRING, 0),
H A Dcmp_local.h60 * accept missing or invalid protection of regular error messages, negative
72 * when validating message protection; this is used for 3GPP-style E.7
78 X509 *cert; /* protection cert used to identify and sign for MSG_SIG_ALG */
79 STACK_OF(X509) *chain; /* (cached) chain of protection cert including it */
459 * -- algorithm used for calculation of protection bits
462 * -- to identify specific keys used for protection
469 * -- nonces used to provide replay protection, senderNonce
662 * protection [0] PKIProtection OPTIONAL,
670 ASN1_BIT_STRING *protection; /* 0 */ member
/third_party/openssl/crypto/cmp/
H A Dcmp_vfy.c55 msg->header->protectionAlg, msg->protection, in verify_signature()
79 ASN1_BIT_STRING *protection = NULL; in verify_PBMAC() local
82 /* generate expected protection for the message */ in verify_PBMAC()
83 if ((protection = ossl_cmp_calc_protection(ctx, msg)) == NULL) in verify_PBMAC()
84 return 0; /* failed to generate protection string! */ in verify_PBMAC()
86 valid = msg->protection != NULL && msg->protection->length >= 0 in verify_PBMAC()
87 && msg->protection->type == protection->type in verify_PBMAC()
88 && msg->protection in verify_PBMAC()
[all...]
H A Dcmp_protect.c24 * Calculate protection for given PKImessage according to
28 * returns ASN1_BIT_STRING representing the protection on success, else NULL
57 unsigned char *protection = NULL; in ossl_cmp_calc_protection() local
89 &protection, &sig_len)) in ossl_cmp_calc_protection()
97 if (!ASN1_BIT_STRING_set(prot, protection, sig_len)) { in ossl_cmp_calc_protection()
103 OPENSSL_free(protection); in ossl_cmp_calc_protection()
138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts()
185 * Create an X509_ALGOR structure for PasswordBasedMAC protection based on
262 * For the case of re-protection remove pre-existing protection in ossl_cmp_msg_protect()
[all...]
H A Dcmp_asn.c450 ASN1_EXP_OPT(OSSL_CMP_MSG, protection, ASN1_BIT_STRING, 0),
H A Dcmp_local.h60 * accept missing or invalid protection of regular error messages, negative
72 * when validating message protection; this is used for 3GPP-style E.7
78 X509 *cert; /* protection cert used to identify and sign for MSG_SIG_ALG */
79 STACK_OF(X509) *chain; /* (cached) chain of protection cert including it */
459 * -- algorithm used for calculation of protection bits
462 * -- to identify specific keys used for protection
469 * -- nonces used to provide replay protection, senderNonce
662 * protection [0] PKIProtection OPTIONAL,
670 ASN1_BIT_STRING *protection; /* 0 */ member
/third_party/ltp/testcases/kernel/syscalls/sendfile/
H A Dsendfile04.c19 * - a protected buffer is created by mmap with specifying protection
29 int protection; member
56 tc[i].protection, in run()
63 EFAULT, "sendfile(..) with %s, protection=%d", in run()
64 tc[i].desc, tc[i].protection); in run()
/third_party/ltp/testcases/kernel/hotplug/memory_hotplug/
H A Dsegment.c562 char *protection, *share, *name; in show_one_segment() local
566 protection = "rw"; in show_one_segment()
570 protection = "r-"; in show_one_segment()
574 protection = "-w"; in show_one_segment()
578 protection = "--"; in show_one_segment()
597 segp->seg_offset, protection, share, name); in show_one_segment()
602 segp->seg_offset, protection, share, name); in show_one_segment()
668 * test protection.
/third_party/node/deps/v8/src/wasm/
H A Dmemory-protection-key.cc5 #include "src/wasm/memory-protection-key.h"
8 #include <sys/mman.h> // For {mprotect()} protection macros.
20 // For now, we support memory protection keys/PKEYs/PKU only for Linux on x64
181 int protection = GetProtectionFromMemoryPermission(page_permissions); in SetPermissionsAndMemoryProtectionKey() local
183 int ret = pkey_mprotect(address, size, protection, key); in SetPermissionsAndMemoryProtectionKey()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dtwt.c32 bool flow_type, u8 flow_id, bool protection, in wpas_twt_send_setup()
79 if (protection) in wpas_twt_send_setup()
29 wpas_twt_send_setup(struct wpa_supplicant *wpa_s, u8 dtok, int exponent, int mantissa, u8 min_twt, int setup_cmd, u64 twt, bool requestor, bool trigger, bool implicit, bool flow_type, u8 flow_id, bool protection, u8 twt_channel, u8 control) wpas_twt_send_setup() argument
H A Dwpa_supplicant_i.h1722 bool flow_type, u8 flow_id, bool protection,
H A Dctrl_iface.c10508 bool protection = false;
10558 tok_s = os_strstr(cmd, " protection=");
10560 protection = atoi(tok_s + os_strlen(" protection="));
10572 flow_type, flow_id, protection, twt_channel,
/third_party/node/src/large_pages/
H A Dnode_large_page.cc247 if (end > start && (map.protection & VM_PROT_READ) != 0 && in FindNodeTextRegion()
248 (map.protection & VM_PROT_EXECUTE) != 0) { in FindNodeTextRegion()
/third_party/rust/crates/libc/src/unix/haiku/
H A Dnative.rs209 pub protection: u32,
850 protection: u32, in create_area()
856 protection: u32, in clone_area()
/third_party/node/deps/v8/src/base/platform/
H A Dplatform-win32.cc1174 DWORD protection = in open()
1178 CreateFileMapping(file, nullptr, protection, 0, size, nullptr); in open()
/third_party/rust/crates/libc/src/unix/bsd/freebsdlike/dragonfly/
H A Dmod.rs358 pub protection: ::vm_prot_t,

Completed in 37 milliseconds