HomeSort by relevance Sort by last modified time
    Searched refs:protection (Results 1 - 25 of 84) sorted by null

1 2 3 4

  /external/compiler-rt/lib/sanitizer_common/
sanitizer_procmaps_linux.cc 31 uptr *protection) {
38 if (!protection) protection = &dummy;
48 *protection = 0;
50 *protection |= kProtectionRead;
53 *protection |= kProtectionWrite;
56 *protection |= kProtectionExecute;
59 *protection |= kProtectionShared;
sanitizer_procmaps_freebsd.cc 53 uptr *protection) {
60 if (!protection) protection = &dummy;
67 *protection = 0;
69 *protection |= kProtectionRead;
71 *protection |= kProtectionWrite;
73 *protection |= kProtectionExecute;
sanitizer_procmaps_mac.cc 77 char filename[], uptr filename_size, uptr *protection) {
84 if (protection) {
85 // Return the initial protection.
86 *protection = sc->initprot;
107 uptr *protection) {
139 start, end, offset, filename, filename_size, protection))
146 start, end, offset, filename, filename_size, protection))
sanitizer_procmaps.h 39 char filename[], uptr filename_size, uptr *protection);
49 // Memory protection masks.
71 uptr *protection);
  /external/curl/docs/cmdline-opts/
socks5-gssapi-nec.d 5 As part of the GSS-API negotiation a protection mode is negotiated. RFC 1961
8 unprotected exchange of the protection mode negotiation.
  /libcore/ojluni/src/main/java/java/security/
KeyStore.java 154 * different passwords or other protection parameters
263 * A marker interface for keystore protection parameters.
267 * For example, protection parameters may be used to check
304 * Creates a password parameter and specifies the protection algorithm
336 * Gets the name of the protection algorithm.
338 * protection algorithm. The name of the default protection algorithm
343 * name of the default key protection algorithm used for PKCS12
356 * Gets the parameters supplied for the protection algorithm.
1806 private ProtectionParameter protection; field in class:KeyStore.FileBuilder
    [all...]
KeyStoreSpi.java 390 ProtectionParameter protection = param.getProtectionParameter(); local
392 if (protection instanceof PasswordProtection) {
393 password = ((PasswordProtection)protection).getPassword();
394 } else if (protection instanceof CallbackHandlerProtection) {
396 ((CallbackHandlerProtection)protection).getCallbackHandler();
424 * with the specified protection parameter.
497 * The specified protection parameter is used to protect the
520 throw new KeyStoreException("unsupported protection parameter");
  /bionic/linker/
linker_main.h 45 void protect_data(int protection);
  /external/autotest/cli/
change_protection_level.py 3 # change_protection_level.py "No protection" machine1 machine2 machine3
15 assert len(leftover_args) > 1, 'Must pass protection level and hosts'
25 afe_proxy.run('modify_host', host['id'], protection=protection_level)
host_unittest.py 618 u'protection': 'No protection',
633 u'protection': u'No protection',
696 u'protection': u'No protection',
    [all...]
host.py 40 protections = host_protections.Protection.names
262 'lock_time', 'lock_reason', 'protection',])
351 self.parser.add_option('-p', '--protection', type='choice',
352 help=('Set the protection level on a host. '
397 if options.protection:
398 self.data['protection'] = options.protection
399 self.messages.append('Protection set to "%s"' % options.protection)
499 --protection <protection_type
    [all...]
  /external/v8/src/base/platform/
platform-cygwin.cc 136 static void* RandomizedVirtualAlloc(size_t size, int action, int protection) {
139 if (protection == PAGE_EXECUTE_READWRITE || protection == PAGE_NOACCESS) {
142 base = VirtualAlloc(OS::GetRandomMmapAddr(), size, action, protection);
147 if (base == NULL) base = VirtualAlloc(NULL, size, action, protection);
platform-win32.cc 752 static void* RandomizedVirtualAlloc(size_t size, int action, int protection) {
765 (protection == PAGE_EXECUTE_READWRITE || protection == PAGE_NOACCESS)) {
768 base = VirtualAlloc(OS::GetRandomMmapAddr(), size, action, protection);
773 if (base == NULL) base = VirtualAlloc(NULL, size, action, protection);
    [all...]
  /external/compiler-rt/lib/interception/
interception_win.cc 577 // Change memory protection to writable.
578 DWORD protection = 0;
579 if (!ChangeMemoryProtection(header, patch_length, &protection))
588 // Restore previous memory protection.
589 if (!RestoreMemoryProtection(header, patch_length, protection))
619 // Change memory protection to writable.
620 DWORD protection = 0; local
621 if (!ChangeMemoryProtection(old_func, kJumpInstructionLength, &protection))
627 // Restore previous memory protection.
628 if (!RestoreMemoryProtection(old_func, kJumpInstructionLength, protection))
724 DWORD protection = 0; local
    [all...]
  /external/autotest/scheduler/
prejob_task.py 71 if self.host.protection == host_protections.Protection.DO_NOT_VERIFY:
227 do_not_verify_protection = host_protections.Protection.DO_NOT_VERIFY
230 and self.host.protection != do_not_verify_protection)
439 protection = host_protections.Protection.get_string(
440 task.host.protection)
441 # normalize the protection name
442 protection = host_protections.Protection.get_attr_name(protection
    [all...]
monitor_db_cleanup_test.py 36 self.hosts[2].protection = host_protections.Protection.DO_NOT_VERIFY
62 self.hosts[2].protection = host_protections.Protection.DO_NOT_VERIFY
rdb_hosts.py 111 self.protection = host.protection
172 host_info['protection'] = self.protection
  /external/ltp/testcases/kernel/syscalls/sendfile/
sendfile04.c 32 * A protected buffer is created by mmap with specifying protection.
84 int protection; member in struct:test_case_t
280 do_sendfile(testcases[i].protection,
  /external/valgrind/coregrind/
pub_core_threadstate.h 223 UWord protection; member in struct:__anon42546::__anon42547::__anon42559
245 UWord protection; member in struct:__anon42546::__anon42547::__anon42564
  /external/ltp/testcases/kernel/hotplug/memory_hotplug/
segment.c 565 char *protection, *share, *name; local
569 protection = "rw";
573 protection = "r-";
577 protection = "-w";
581 protection = "--";
600 segp->seg_offset, protection, share, name);
605 segp->seg_offset, protection, share, name);
671 * test protection.
  /external/webrtc/webrtc/modules/video_coding/include/
video_coding.h 201 // Register a video protection callback which will be called to deliver
205 // - protection : The callback object to register.
210 VCMProtectionCallback* protection) = 0;
212 // Enable or disable a video protection method.
  /compatibility/cdd/9_security-model/
9_1_permissions.md 16 https://developer.android.com/reference/android/content/pm/PermissionInfo.html#PROTECTION&lowbar;FLAG&lowbar;PRIVILEGED)
24 Permissions with a protection level of dangerous are runtime permissions.
9_10_device-integrity.md 41 * [SR] STRONGLY RECOMMENDED to implement rollback protection for the HLOS
44 * SHOULD implement rollback protection for any component with persistent
  /external/ImageMagick/MagickCore/
nt-base.h 190 # define mmap(address,length,protection,access,file,offset) \
191 NTMapMemory(address,length,protection,access,file,offset)
  /external/webrtc/webrtc/modules/video_coding/
video_coding_impl.cc 144 VCMProtectionCallback* protection) override {
145 return sender_.RegisterProtectionCallback(protection);
150 // TODO(pbos): Remove enable from receive-side protection modes as well.

Completed in 1001 milliseconds

1 2 3 4