/external/webkit/Source/WebKit2/Platform/unix/ |
SharedMemoryUnix.cpp | 155 static inline int accessModeMMap(SharedMemory::Protection protection) 157 switch (protection) { 168 PassRefPtr<SharedMemory> SharedMemory::create(const Handle& handle, Protection protection) 172 void* data = mmap(0, handle.m_size, accessModeMMap(protection), MAP_SHARED, handle.m_fileDescriptor, 0); 190 static inline int accessModeFile(SharedMemory::Protection protection) 192 switch (protection) { 203 bool SharedMemory::createHandle(Handle& handle, Protection protection [all...] |
/external/webkit/Source/WebKit2/Platform/win/ |
SharedMemoryWin.cpp | 133 static DWORD accessRights(SharedMemory::Protection protection) 135 switch (protection) { 146 PassRefPtr<SharedMemory> SharedMemory::create(const Handle& handle, Protection protection) 148 RefPtr<SharedMemory> memory = adopt(handle.m_handle, handle.m_size, protection); 158 PassRefPtr<SharedMemory> SharedMemory::adopt(HANDLE handle, size_t size, Protection protection) 163 DWORD desiredAccess = accessRights(protection); 187 bool SharedMemory::createHandle(Handle& handle, Protection protection [all...] |
/external/webkit/Source/WebKit2/Platform/ |
SharedMemory.h | 47 enum Protection { 82 // Create a shared memory object from the given handle and the requested protection. Will return 0 on failure. 83 static PassRefPtr<SharedMemory> create(const Handle&, Protection); 86 static PassRefPtr<SharedMemory> adopt(HANDLE, size_t, Protection); 91 bool createHandle(Handle&, Protection);
|
/external/webkit/Source/WebKit2/Platform/mac/ |
SharedMemoryMac.cpp | 121 static inline vm_prot_t machProtection(SharedMemory::Protection protection) 123 switch (protection) { 134 PassRefPtr<SharedMemory> SharedMemory::create(const Handle& handle, Protection protection) 140 vm_prot_t vmProtection = machProtection(protection); 167 bool SharedMemory::createHandle(Handle& handle, Protection protection) 177 if (protection == ReadWrite && m_port) { 184 kern_return_t kr = mach_make_memory_entry_64(mach_task_self(), &size, address, machProtection(protection), &port, MACH_PORT_NULL) [all...] |
/external/webkit/Source/JavaScriptCore/wtf/ |
OSAllocatorWin.cpp | 34 static inline DWORD protection(bool writable, bool executable) function in namespace:WTF 43 void* result = VirtualAlloc(0, bytes, MEM_RESERVE, protection(writable, executable)); 51 void* result = VirtualAlloc(0, bytes, MEM_RESERVE | MEM_COMMIT, protection(writable, executable)); 59 void* result = VirtualAlloc(address, bytes, MEM_COMMIT, protection(writable, executable));
|
OSAllocatorPosix.cpp | 49 int protection = PROT_READ; local 51 protection |= PROT_WRITE; 53 protection |= PROT_EXEC; 83 result = mmap(result, bytes, protection, flags, fd, 0);
|
PageAllocationAligned.cpp | 43 int protection = PROT_READ; local 45 protection |= PROT_WRITE; 47 protection |= PROT_EXEC; 50 vm_map(current_task(), &address, size, alignmentMask, flags, MEMORY_OBJECT_NULL, 0, FALSE, protection, PROT_READ | PROT_WRITE | PROT_EXEC, VM_INHERIT_DEFAULT); local
|
/external/webkit/Source/WebKit2/Platform/gtk/ |
SharedMemoryGtk.cpp | 61 PassRefPtr<SharedMemory> SharedMemory::create(const Handle& handle, Protection protection) 72 bool SharedMemory::createHandle(Handle& handle, Protection protection)
|
/libcore/luni/src/main/java/java/security/ |
DomainCombiner.java | 31 * the protection domains of the current execution thread 33 * the protection domains of the parent thread, may be {@code null}.
|
/external/chromium/net/http/ |
http_auth_cache.h | 52 // Find the entry on server |origin| whose protection space includes 54 // paths lie in the same protection space. 70 // |path| - absolute path for a resource contained in the protection 159 // Adds a path defining the realm's protection space. If the path is 160 // already contained in the protection space, is a no-op. 163 // Returns true if |dir| is contained within the realm's protection 185 // List of paths that define the realm's protection space.
|
/external/openssl/crypto/ |
s390xcap.c | 31 /* protection against missing store-facility-list-extended */
|
/external/qemu/hw/ |
mips.h | 10 void ds1225y_set_protection(void *opaque, int protection);
|
/external/stlport/stlport/stl/ |
_cprolog.h | 2 * If you are using "header protection" option with your compiler,
|
_prolog.h | 2 * If you are using "header protection" option with your compiler,
|
/ndk/sources/cxx-stl/stlport/stlport/stl/ |
_cprolog.h | 2 * If you are using "header protection" option with your compiler,
|
_prolog.h | 2 * If you are using "header protection" option with your compiler,
|
/prebuilts/ndk/android-ndk-r5/sources/cxx-stl/stlport/stlport/stl/ |
_cprolog.h | 2 * If you are using "header protection" option with your compiler,
|
_prolog.h | 2 * If you are using "header protection" option with your compiler,
|
/prebuilts/ndk/android-ndk-r6/sources/cxx-stl/stlport/stlport/stl/ |
_cprolog.h | 2 * If you are using "header protection" option with your compiler,
|
_prolog.h | 2 * If you are using "header protection" option with your compiler,
|
/prebuilts/ndk/android-ndk-r7/sources/cxx-stl/stlport/stlport/stl/ |
_cprolog.h | 2 * If you are using "header protection" option with your compiler,
|
_prolog.h | 2 * If you are using "header protection" option with your compiler,
|
/external/webkit/Source/WebCore/platform/network/ |
CredentialStorage.h | 46 // a client should assume that all paths at or deeper than the depth of a known protected resource share are within the same protection space. 47 static bool set(const Credential&, const KURL&); // Returns true if the URL corresponds to a known protection space, so credentials could be updated.
|
/external/nist-sip/ |
NIST-CONDITIONS-OF-USE.txt | 13 * employees are not subject to copyright protection in the United States
|
/external/nist-sip/java/gov/nist/core/ |
Match.java | 7 * employees are not subject to copyright protection in the United States
|