/macosx-10.10.1/WTF-7600.1.24/wtf/ |
H A D | OSAllocatorWin.cpp | 36 static inline DWORD protection(bool writable, bool executable) function in namespace:WTF 45 void* result = VirtualAlloc(0, bytes, MEM_RESERVE, protection(writable, executable)); 53 void* result = VirtualAlloc(0, bytes, MEM_RESERVE | MEM_COMMIT, protection(writable, executable)); 61 void* result = VirtualAlloc(address, bytes, MEM_COMMIT, protection(writable, executable));
|
H A D | OSAllocatorPosix.cpp | 65 int protection = PROT_READ; local 67 protection |= PROT_WRITE; 69 protection |= PROT_EXEC; 105 result = mmap(result, bytes, protection, flags, fd, 0); 126 int protection = PROT_READ; local 128 protection |= PROT_WRITE; 130 protection |= PROT_EXEC; 131 if (mprotect(address, bytes, protection))
|
H A D | PageAllocationAligned.cpp | 43 int protection = PROT_READ; local 45 protection |= PROT_WRITE; 48 vm_map(current_task(), &address, size, alignmentMask, flags, MEMORY_OBJECT_NULL, 0, FALSE, protection, PROT_READ | PROT_WRITE, VM_INHERIT_DEFAULT); local
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecAccessControl.h | 51 @abstract Creates new access control object based on protection type and additional flags. 53 @param protection Protection class to be used for the item. One of kSecAttrAccessible constants. 58 SecAccessControlRef SecAccessControlCreateWithFlags(CFAllocatorRef allocator, CFTypeRef protection,
|
H A D | SecAccessControlPriv.h | 42 // Protection, currently only kSecAttrAccessible* constants are allowed. In future, another probable protection type might be CTK key object ID. 44 bool SecAccessControlSetProtection(SecAccessControlRef access_control, CFTypeRef protection, CFErrorRef *error);
|
H A D | SecAccessControl.c | 86 SecAccessControlRef SecAccessControlCreateWithFlags(CFAllocatorRef allocator, CFTypeRef protection, argument 93 if (!SecAccessControlSetProtection(access_control, protection, error)) 136 bool SecAccessControlSetProtection(SecAccessControlRef access_control, CFTypeRef protection, CFErrorRef *error) { argument 137 // Verify protection type. 138 CheckItemInArray(protection, ItemArray(kSecAttrAccessibleAlways, kSecAttrAccessibleAfterFirstUnlock, 143 "SecAccessControl: invalid protection %@"); 146 CFDictionarySetValue(access_control->dict, kSecAccessControlKeyProtection, protection);
|
/macosx-10.10.1/xnu-2782.1.97/osfmk/mach/ |
H A D | vm_region.h | 76 vm_prot_t protection; member in struct:vm_region_basic_info_64 104 vm_prot_t protection; member in struct:vm_region_basic_info 140 vm_prot_t protection; member in struct:vm_region_extended_info__legacy 167 vm_prot_t protection; member in struct:vm_region_extended_info 228 vm_prot_t protection; /* present access protection */ member in struct:vm_region_submap_info 255 vm_prot_t protection; /* present access protection */ member in struct:vm_region_submap_info_64 295 vm_prot_t protection; /* present access protection */ member in struct:vm_region_submap_short_info_64 [all...] |
H A D | shared_memory_server.h | 97 vm_prot_t protection; /* read/write/execute/COW/ZF */ member in struct:sf_mapping
|
/macosx-10.10.1/apr-32/apr/apr/file_io/netware/ |
H A D | filestat.c | 62 finfo->protection = apr_unix_mode2perms(info->st_mode); 163 finfo.protection &= ~APR_UWRITE; 164 finfo.protection &= ~APR_GWRITE; 165 finfo.protection &= ~APR_WWRITE; 170 finfo.protection |= APR_UWRITE; 171 finfo.protection |= APR_GWRITE; 172 finfo.protection |= APR_WWRITE; 181 finfo.protection |= APR_UEXECUTE; 182 finfo.protection |= APR_GEXECUTE; 183 finfo.protection | [all...] |
/macosx-10.10.1/apr-32/apr/apr/file_io/unix/ |
H A D | filestat.c | 79 finfo->protection = apr_unix_mode2perms(info->st_mode); 211 finfo.protection &= ~APR_UWRITE; 212 finfo.protection &= ~APR_GWRITE; 213 finfo.protection &= ~APR_WWRITE; 218 finfo.protection |= APR_UWRITE; 219 finfo.protection |= APR_GWRITE; 220 finfo.protection |= APR_WWRITE; 229 finfo.protection |= APR_UEXECUTE; 230 finfo.protection |= APR_GEXECUTE; 231 finfo.protection | [all...] |
H A D | copy.c | 43 perms = finfo.protection;
|
/macosx-10.10.1/WebKit2-7600.1.25/Platform/mac/ |
H A D | SharedMemoryMac.cpp | 152 static inline vm_prot_t machProtection(SharedMemory::Protection protection) argument 154 switch (protection) { 165 PassRefPtr<SharedMemory> SharedMemory::create(const Handle& handle, Protection protection) argument 173 vm_prot_t vmProtection = machProtection(protection); 201 bool SharedMemory::createHandle(Handle& handle, Protection protection) argument 211 if (protection == ReadWrite && m_port) { 218 kern_return_t kr = mach_make_memory_entry_64(mach_task_self(), &size, address, machProtection(protection), &port, MACH_PORT_NULL);
|
/macosx-10.10.1/WebKit2-7600.1.25/Platform/unix/ |
H A D | SharedMemoryUnix.cpp | 147 static inline int accessModeMMap(SharedMemory::Protection protection) argument 149 switch (protection) { 160 PassRefPtr<SharedMemory> SharedMemory::create(const Handle& handle, Protection protection) argument 164 void* data = mmap(0, handle.m_size, accessModeMMap(protection), MAP_SHARED, handle.m_fileDescriptor, 0);
|
/macosx-10.10.1/WebKit2-7600.1.25/Shared/ |
H A D | ShareableBitmap.cpp | 99 PassRefPtr<ShareableBitmap> ShareableBitmap::create(const Handle& handle, SharedMemory::Protection protection) argument 102 RefPtr<SharedMemory> sharedMemory = SharedMemory::create(handle.m_handle, protection); 109 bool ShareableBitmap::createHandle(Handle& handle, SharedMemory::Protection protection) argument 113 if (!m_sharedMemory->createHandle(handle.m_handle, protection))
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si_77_SecAccessControl.c | 43 CFTypeRef protection = kSecAttrAccessibleAlways; local 49 // 1: ACL with protection only 50 SecAccessControlRef acl = SecAccessControlCreateWithFlags(allocator, protection, 0, &error); 61 // 3: ACL with protection and flags 62 acl = SecAccessControlCreateWithFlags(allocator, protection, flags, &error); 70 is(aclProtection, protection, "SecAccessControlGetProtection"); 87 // 8: ACL protection 88 bool result = SecAccessControlSetProtection(acl, protection, &error); 93 // 9: ACL protection 94 is(aclProtection, protection, "SecAccessControlGetProtectio [all...] |
/macosx-10.10.1/apr-32/apr/apr/file_io/win32/ |
H A D | filestat.c | 78 * the given behavior. They are -not- recommended for any set protection 115 finfo->protection |= convert_prot(acc, prot_scope_user); 128 finfo->protection |= convert_prot(acc, prot_scope_group); 136 finfo->protection |= convert_prot(acc, prot_scope_world); 199 if (finfo->protection & APR_FREADONLY) { 200 finfo->protection |= APR_WREAD | APR_WEXECUTE; 203 finfo->protection |= APR_WREAD | APR_WEXECUTE | APR_WWRITE; 205 finfo->protection |= (finfo->protection << prot_scope_group) 206 | (finfo->protection << prot_scope_use [all...] |
/macosx-10.10.1/tcl-105/tcl_ext/incrtcl/incrTcl/itcl/tests/ |
H A D | info.test | 78 info function ?name? ?-protection? ?-type? ?-name? ?-args? ?-body? 81 info variable ?name? ?-protection? ?-type? ?-name? ?-init? ?-value? ?-config? 91 info function ?name? ?-protection? ?-type? ?-name? ?-args? ?-body? 94 info variable ?name? ?-protection? ?-type? ?-name? ?-init? ?-value? ?-config? 113 list [ti info variable pubv -protection] \ 126 list [ti info variable prov -protection] \ 138 list [ti info variable priv -protection] \ 166 list [ti info variable pubc -protection] \ 178 list [ti info variable proc -protection] \ 190 list [ti info variable pric -protection] \ [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Tool/ |
H A D | keychain_util.c | 35 CFTypeRef protection = SecAccessControlGetProtection(sac); local 36 if(CFStringGetTypeID() == CFGetTypeID(protection)) 38 CFStringAppend(line, protection); 184 // process protection part 185 CFStringRef protection = CFArrayGetValueAtIndex(tokens, 0); local 188 sac = SecAccessControlCreateWithFlags(NULL, protection, 0, &error);
|
/macosx-10.10.1/llvmCore-3425.0.34/lib/Support/Windows/ |
H A D | Memory.inc | 24 // Contrary to what you might expect, the Windows page protection flags 42 llvm_unreachable("Illegal memory protection flag specified!");
|
/macosx-10.10.1/apr-32/apr/apr/file_io/os2/ |
H A D | filestat.c | 28 finfo->protection = (fstatus->attrFile & FILE_READONLY) ? 0x555 : 0x777; 123 finfo->protection = 0; 140 finfo->protection = 0; 164 finfo->protection = 0666;
|
/macosx-10.10.1/dyld-353.2.1/unit-tests/test-cases/read-only-stubs/ |
H A D | main.c | 54 //fprintf(stderr, "result=%X, info.protection=%X\n", result, info.protection); 56 return info.protection;
|
H A D | foo.c | 55 return info.protection;
|
/macosx-10.10.1/dyld-353.2.1/unit-tests/test-cases/text-relocs-perms/ |
H A D | foo.c | 54 return info.protection;
|
H A D | main.c | 54 //fprintf(stderr, "result=%X, info.protection=%X\n", result, info.protection); 56 return info.protection;
|
/macosx-10.10.1/vim-55/runtime/compiler/ |
H A D | decada.vim | 14 " 08.09.2006 MK Correct double load protection.
|