/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_procmaps_linux.cc | 31 uptr *protection) { 38 if (!protection) protection = &dummy; 48 *protection = 0; 50 *protection |= kProtectionRead; 53 *protection |= kProtectionWrite; 56 *protection |= kProtectionExecute; 59 *protection |= kProtectionShared;
|
sanitizer_procmaps_freebsd.cc | 53 uptr *protection) { 60 if (!protection) protection = &dummy; 67 *protection = 0; 69 *protection |= kProtectionRead; 71 *protection |= kProtectionWrite; 73 *protection |= kProtectionExecute;
|
sanitizer_procmaps_mac.cc | 77 char filename[], uptr filename_size, uptr *protection) { 84 if (protection) { 85 // Return the initial protection. 86 *protection = sc->initprot; 107 uptr *protection) { 139 start, end, offset, filename, filename_size, protection)) 146 start, end, offset, filename, filename_size, protection))
|
sanitizer_procmaps.h | 39 char filename[], uptr filename_size, uptr *protection); 49 // Memory protection masks. 71 uptr *protection);
|
/external/curl/docs/cmdline-opts/ |
socks5-gssapi-nec.d | 5 As part of the GSS-API negotiation a protection mode is negotiated. RFC 1961 8 unprotected exchange of the protection mode negotiation.
|
/libcore/ojluni/src/main/java/java/security/ |
KeyStore.java | 154 * different passwords or other protection parameters 263 * A marker interface for keystore protection parameters. 267 * For example, protection parameters may be used to check 304 * Creates a password parameter and specifies the protection algorithm 336 * Gets the name of the protection algorithm. 338 * protection algorithm. The name of the default protection algorithm 343 * name of the default key protection algorithm used for PKCS12 356 * Gets the parameters supplied for the protection algorithm. 1806 private ProtectionParameter protection; field in class:KeyStore.FileBuilder [all...] |
KeyStoreSpi.java | 390 ProtectionParameter protection = param.getProtectionParameter(); local 392 if (protection instanceof PasswordProtection) { 393 password = ((PasswordProtection)protection).getPassword(); 394 } else if (protection instanceof CallbackHandlerProtection) { 396 ((CallbackHandlerProtection)protection).getCallbackHandler(); 424 * with the specified protection parameter. 497 * The specified protection parameter is used to protect the 520 throw new KeyStoreException("unsupported protection parameter");
|
/bionic/linker/ |
linker_main.h | 45 void protect_data(int protection);
|
/external/autotest/cli/ |
change_protection_level.py | 3 # change_protection_level.py "No protection" machine1 machine2 machine3 15 assert len(leftover_args) > 1, 'Must pass protection level and hosts' 25 afe_proxy.run('modify_host', host['id'], protection=protection_level)
|
host_unittest.py | 618 u'protection': 'No protection', 633 u'protection': u'No protection', 696 u'protection': u'No protection', [all...] |
host.py | 40 protections = host_protections.Protection.names 262 'lock_time', 'lock_reason', 'protection',]) 351 self.parser.add_option('-p', '--protection', type='choice', 352 help=('Set the protection level on a host. ' 397 if options.protection: 398 self.data['protection'] = options.protection 399 self.messages.append('Protection set to "%s"' % options.protection) 499 --protection <protection_type [all...] |
/external/v8/src/base/platform/ |
platform-cygwin.cc | 136 static void* RandomizedVirtualAlloc(size_t size, int action, int protection) { 139 if (protection == PAGE_EXECUTE_READWRITE || protection == PAGE_NOACCESS) { 142 base = VirtualAlloc(OS::GetRandomMmapAddr(), size, action, protection); 147 if (base == NULL) base = VirtualAlloc(NULL, size, action, protection);
|
platform-win32.cc | 752 static void* RandomizedVirtualAlloc(size_t size, int action, int protection) { 765 (protection == PAGE_EXECUTE_READWRITE || protection == PAGE_NOACCESS)) { 768 base = VirtualAlloc(OS::GetRandomMmapAddr(), size, action, protection); 773 if (base == NULL) base = VirtualAlloc(NULL, size, action, protection); [all...] |
/external/compiler-rt/lib/interception/ |
interception_win.cc | 577 // Change memory protection to writable. 578 DWORD protection = 0; 579 if (!ChangeMemoryProtection(header, patch_length, &protection)) 588 // Restore previous memory protection. 589 if (!RestoreMemoryProtection(header, patch_length, protection)) 619 // Change memory protection to writable. 620 DWORD protection = 0; local 621 if (!ChangeMemoryProtection(old_func, kJumpInstructionLength, &protection)) 627 // Restore previous memory protection. 628 if (!RestoreMemoryProtection(old_func, kJumpInstructionLength, protection)) 724 DWORD protection = 0; local [all...] |
/external/autotest/scheduler/ |
prejob_task.py | 71 if self.host.protection == host_protections.Protection.DO_NOT_VERIFY: 227 do_not_verify_protection = host_protections.Protection.DO_NOT_VERIFY 230 and self.host.protection != do_not_verify_protection) 439 protection = host_protections.Protection.get_string( 440 task.host.protection) 441 # normalize the protection name 442 protection = host_protections.Protection.get_attr_name(protection [all...] |
monitor_db_cleanup_test.py | 36 self.hosts[2].protection = host_protections.Protection.DO_NOT_VERIFY 62 self.hosts[2].protection = host_protections.Protection.DO_NOT_VERIFY
|
rdb_hosts.py | 111 self.protection = host.protection 172 host_info['protection'] = self.protection
|
/external/ltp/testcases/kernel/syscalls/sendfile/ |
sendfile04.c | 32 * A protected buffer is created by mmap with specifying protection. 84 int protection; member in struct:test_case_t 280 do_sendfile(testcases[i].protection,
|
/external/valgrind/coregrind/ |
pub_core_threadstate.h | 223 UWord protection; member in struct:__anon42546::__anon42547::__anon42559 245 UWord protection; member in struct:__anon42546::__anon42547::__anon42564
|
/external/ltp/testcases/kernel/hotplug/memory_hotplug/ |
segment.c | 565 char *protection, *share, *name; local 569 protection = "rw"; 573 protection = "r-"; 577 protection = "-w"; 581 protection = "--"; 600 segp->seg_offset, protection, share, name); 605 segp->seg_offset, protection, share, name); 671 * test protection.
|
/external/webrtc/webrtc/modules/video_coding/include/ |
video_coding.h | 201 // Register a video protection callback which will be called to deliver 205 // - protection : The callback object to register. 210 VCMProtectionCallback* protection) = 0; 212 // Enable or disable a video protection method.
|
/compatibility/cdd/9_security-model/ |
9_1_permissions.md | 16 https://developer.android.com/reference/android/content/pm/PermissionInfo.html#PROTECTION_FLAG_PRIVILEGED) 24 Permissions with a protection level of dangerous are runtime permissions.
|
9_10_device-integrity.md | 41 * [SR] STRONGLY RECOMMENDED to implement rollback protection for the HLOS 44 * SHOULD implement rollback protection for any component with persistent
|
/external/ImageMagick/MagickCore/ |
nt-base.h | 190 # define mmap(address,length,protection,access,file,offset) \ 191 NTMapMemory(address,length,protection,access,file,offset)
|
/external/webrtc/webrtc/modules/video_coding/ |
video_coding_impl.cc | 144 VCMProtectionCallback* protection) override { 145 return sender_.RegisterProtectionCallback(protection); 150 // TODO(pbos): Remove enable from receive-side protection modes as well.
|