OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:protection
(Results
1 - 25
of
442
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/dalvik/libcore/security/src/main/java/java/security/
DomainCombiner.java
36
* the
protection
domains of the current execution thread (since
40
* the
protection
domains of the parent thread, maybe {@code
package.html
17
with a
protection
domain (<i>java.security.ProtectionDomain</i>) which consists of a
/external/stlport/stlport/stl/
_cprolog.h
2
* If you are using "header
protection
" option with your compiler,
_prolog.h
2
* If you are using "header
protection
" option with your compiler,
_epilog.h
2
* If you are using "header
protection
" option with your compiler,
/dalvik/libcore/security/src/test/java/tests/security/
AccessControllerTest.java
46
fail("
Protection
domain could not be set");
48
fail("
Protection
domain could not be set");
88
"if a particular permission is not set in the
protection
domain " +
119
"if all classes on the call stack refer to a
protection
domain " +
153
"set in their
protection
domains.",
162
"set in their
protection
domains.",
/external/webkit/WebCore/platform/network/
CredentialStorage.h
45
// a client should assume that all paths at or deeper than the depth of a known protected resource share are within the same
protection
space.
46
static bool set(const Credential&, const KURL&); // Returns true if the URL corresponds to a known
protection
space, so credentials could be updated.
/dalvik/libcore/security/src/test/java/org/apache/harmony/security/tests/java/security/
AccessController2Test.java
69
@KnownFailure("Fails (probably) because no
protection
domain is set.")
100
@KnownFailure("Fails (probably) because no
protection
domain is set.")
125
@KnownFailure("Fails (probably) because no
protection
domain is set.")
169
@KnownFailure("Fails (probably) because no
protection
domain is set.")
220
@KnownFailure("Fails (probably) because no
protection
domain is set.")
/external/webkit/JavaScriptCore/tests/mozilla/js1_5/Regress/
regress-96128-n.js
22
* SUMMARY: Negative test that JS infinite recursion
protection
works.
29
var summary = 'Testing that JS infinite recursion
protection
works';
/external/icu4c/test/testdata/
testaliases.txt
15
aaa:alias { "testaliases/aab" } // Test circular dependency
protection
/external/iproute2/examples/
SYN-DoS.rate.limit
5
# Useful for TCP-SYN attack
protection
. You can use
/external/quake/quake/src/QW/client/
sys.h
40
// memory
protection
/external/quake/quake/src/WinQuake/
sys.h
40
// memory
protection
/external/webkit/WebCore/dom/
ScriptExecutionContext.cpp
190
// No
protection
against m_activeDOMObjects changing during iteration: canSuspend() shouldn't execute arbitrary JS.
202
// No
protection
against m_activeDOMObjects changing during iteration: suspend() shouldn't execute arbitrary JS.
212
// No
protection
against m_activeDOMObjects changing during iteration: resume() shouldn't execute arbitrary JS.
222
// No
protection
against m_activeDOMObjects changing during iteration: stop() shouldn't execute arbitrary JS.
/external/openssl/apps/
CA.com
95
$ CREATE /DIR /
PROTECTION
=OWNER:RWED 'CATOP']
96
$ CREATE /DIR /
PROTECTION
=OWNER:RWED 'CATOP'.certs]
97
$ CREATE /DIR /
PROTECTION
=OWNER:RWED 'CATOP'.crl]
98
$ CREATE /DIR /
PROTECTION
=OWNER:RWED 'CATOP'.newcerts]
99
$ CREATE /DIR /
PROTECTION
=OWNER:RWED 'CATOP'.private]
/hardware/ti/wlan/wl1271/utils/
context.c
41
*
protection
-locking) is provided by the OS abstraction layer (osapi.c).
74
TI_HANDLE hProtectionLock; /* Handle of
protection
lock used by context clients */
135
/* Destroy the
protection
handle */
165
/* Create the module's
protection
lock and save its handle */
440
/* Start critical section
protection
*/
450
/* Stop critical section
protection
*/
/system/wlan/ti/wilink_6_1/utils/
context.c
41
*
protection
-locking) is provided by the OS abstraction layer (osapi.c).
74
TI_HANDLE hProtectionLock; /* Handle of
protection
lock used by context clients */
135
/* Destroy the
protection
handle */
165
/* Create the module's
protection
lock and save its handle */
440
/* Start critical section
protection
*/
450
/* Stop critical section
protection
*/
/system/wlan/ti/sta_dk_4_0_4_32/pform/common/inc/
osApi.h
304
*
Protection
services API *
307
* OS
protection
is implemented as dummy functions because *
310
*
Protection
in IOCTL handlers and hard_start_xmit is done by different *
/dalvik/libcore/luni/src/main/java/org/apache/harmony/luni/util/
PasswordProtectedInputStream.java
26
* for
protection
is a Vigenere (repeated-key) cipher. The encrypted data is the
/external/gtest/test/
gtest_break_on_failure_unittest_.cc
60
// a general
protection
fault (segment violation).
/external/kernel-headers/original/asm-x86/
processor-flags.h
29
#define X86_CR0_PE 0x00000001 /*
Protection
Enable */
/external/opencore/oscl/oscl/osclio/src/
oscl_socket_serv_imp_reqlist.h
73
//thread
protection
/development/pdk/docs/source/
licenses.jd
30
is for your
protection
as a contributor as well as the
protection
of the
/external/webkit/WebCore/workers/
WorkerThread.cpp
99
// Mutex
protection
is necessary to ensure that m_threadID is initialized when the thread starts.
208
// Mutex
protection
is necessary because stop() can be called before the context is fully created.
/external/webkit/WebKit/chromium/tests/
UniscribeHelperTest.cpp
113
// Test a long string without the normal length
protection
we have. This
147
// the length
protection
.
Completed in 601 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>