Home
last modified time | relevance | path

Searched full:protect (Results 1 – 25 of 1485) sorted by relevance

12345678910>>...60

/external/python/cpython2/Doc/distutils/
Dcommandref.rst7 .. % \section{Building modules: the \protect\command{build} command family}
9 .. % \subsubsection{\protect\command{build}}
11 .. % \subsubsection{\protect\command{build\_py}}
13 .. % \subsubsection{\protect\command{build\_ext}}
15 .. % \subsubsection{\protect\command{build\_clib}}
28 .. % \subsubsection{\protect\command{install\_lib}}
47 .. % \subsection{Cleaning up: the \protect\command{clean} command}
52 .. % \protect\command{bdist} command family}
55 .. % \subsection{\protect\command{bdist}}
56 .. % \subsection{\protect\command{bdist\_dumb}}
[all …]
/external/autotest/server/site_tests/firmware_Fingerprint/tests/
Dsw_write_protect.sh12 echo "Running test to validate software write protect cannot be disabled when \
13 hardware write protect is enabled"
15 echo "Making sure all write protect is enabled"
31 echo "Disabling software write protect when hardware write protect is enabled \
34 echo "Disabling software write protect should fail"
48 echo "Disabling software write protect when hardware write protect is enabled \
51 echo "Disabling software write protect should fail"
Dcommon.sh16 Flash protect flags: 0x0000040f wp_gpio_asserted ro_at_boot ro_now rollback_now all_now
23 Flash protect flags: 0x0000000b wp_gpio_asserted ro_at_boot ro_now
32 Flash protect flags: 0x0000000b wp_gpio_asserted ro_at_boot ro_now
42 Flash protect flags: 0x00000000
51 Flash protect flags: 0x00000407 ro_at_boot ro_now rollback_now all_now
58 Flash protect flags: 0x00000003 ro_at_boot ro_now
327 # NOTE: "wspw_cur" stands for "write protect switch current"
330 echo "Error getting hardware write protect state"
340 echo "Expected HW write protect to be enabled, but it is not"
350 echo "Expected HW write protect to be disabled, but it is not"
[all …]
Drdp1.sh16 # * Hardware write protect is disabled
18 # * Software write protect is enabled
48 # * Hardware write protect is disabled
50 # * Software write protect is enabled
83 echo "Making sure hardware write protect is DISABLED and software write \
84 protect is ENABLED"
Drdp0.sh17 # * Hardware write protect is disabled
18 # * Software write protect is disabled
48 # * Hardware write protect is disabled
49 # * Software write protect is disabled
80 echo "Making sure all write protect is disabled"
/external/apache-commons-bcel/docs/
Dmanual.bib3 title = {\protect{Programming the Internet in Ada95}},
11 title = {\protect{Adding Type Parameterization to the Java
22 title = {\protect{Aspect-Oriented Programming}},
30 title = {\protect{Barat -- A Front-End for Java}},
38 title = {\protect{Binary Component Adaptation}},
47 title = {\protect{BIT: A Tool for Instrumenting Java
72 title = {\protect{Dynamic Class Loading in the Java Virtual
90 title = {\protect{Type Inference for Late Binding. The
121 title = {\protect{JaWa: Java with Assertions}},
130 title = {\protect{Automatic Program Transformation with
[all …]
/external/grpc-grpc-java/alts/src/test/java/io/grpc/alts/internal/
DTsiTest.java141 ByteBuf protect = ref.register(protectOut.get(0)); in sendMessage() local
142 while (protect.isReadable()) { in sendMessage()
143 ByteBuf buf = protect; in sendMessage()
145 int size = Math.min(protect.readableBytes(), recvFragmentSize); in sendMessage()
146 buf = protect.readSlice(size); in sendMessage()
275 ByteBuf protect = ref.register(protectOut.get(0)); in corruptedCounterTest() local
277 receiver.unprotect(protect.slice(), unprotectOut, alloc); in corruptedCounterTest()
282 receiver.unprotect(protect, unprotectOut, alloc); in corruptedCounterTest()
316 ByteBuf protect = ref.register(protectOut.get(0)); in corruptedCiphertextTest() local
317 int ciphertextIdx = protect.writerIndex() - FakeChannelCrypter.getTagBytes() - 2; in corruptedCiphertextTest()
[all …]
/external/autotest/server/site_tests/firmware_Fingerprint/
Dcontrol.sw_write_protect10 Verify that software write protect cannot be disabled when hardware write
11 protect is enabled.
14 Fails if we can disable software write protect from RO or RW."
25 Reboots to RO, attempts to disable software write protect while hardware write
26 protect is enabled and verifies that it fails. Then reboots to RW, attempts to
27 disable software write protect while hardware write protect is enabled and
Dfirmware_Fingerprint.py68 'Flash protect flags: 0x00000407 ro_at_boot ro_now rollback_now all_now\n'
73 'Flash protect flags: 0x00000003 ro_at_boot ro_now\n'
81 logging.info('Making sure hardware write protect is DISABLED and '
82 'software write protect is ENABLED')
105 'Flash protect flags: 0x00000000\n'
113 logging.info('Making sure all write protect is disabled')
134 * Hardware write protect is disabled
136 * Software write protect is enabled
168 * Hardware write protect is disabled
170 * Software write protect is enabled
[all …]
Dcontrol.rdp126 The test setup enables RDP level 1 by enabling hardware write protect and then
27 enabling software write protect (with reboot of the EC); the test setup then
28 disables hardware write protect, so that we can perform reads and change RDP
29 levels through the bootloader (only accessible when HW write protect is
Dcontrol.rw_no_update_ro10 Verify HW write protect prevents RO fingerprint firmware modification.
13 Fails if the RO firmware can be written while HW write protect is enabled.
27 Enables hardware write protect, attempts to flash the RO fingerprint firmware,
/external/python/cpython3/Doc/distutils/
Dcommandref.rst9 .. % \section{Building modules: the \protect\command{build} command family}
11 .. % \subsubsection{\protect\command{build}}
13 .. % \subsubsection{\protect\command{build\_py}}
15 .. % \subsubsection{\protect\command{build\_ext}}
17 .. % \subsubsection{\protect\command{build\_clib}}
30 .. % \subsubsection{\protect\command{install\_lib}}
49 .. % \subsection{Cleaning up: the \protect\command{clean} command}
98 .. % \protect\command{bdist} command family}
101 .. % \subsection{\protect\command{bdist}}
102 .. % \subsection{\protect\command{bdist\_dumb}}
[all …]
/external/vulkan-validation-layers/scripts/
Dlayer_dispatch_table_generator.py89 …self.CommandData = namedtuple('CommandData', ['name', 'ext_name', 'ext_type', 'protect', 'return_t…
234 protect=self.featureExtraProtect,
244 protect=self.featureExtraProtect,
256 protect=self.featureExtraProtect,
267 protect=self.featureExtraProtect,
320 if cur_cmd.protect is not None:
321 table += '#ifdef %s\n' % cur_cmd.protect
325 if cur_cmd.protect is not None:
326 table += '#endif // %s\n' % cur_cmd.protect
361 if cur_cmd.protect is not None:
[all …]
/external/autotest/server/site_tests/firmware_WriteProtect/
Dfirmware_WriteProtect.py12 This test checks whether the hardware write-protect state reported by
13 crossystem matches the real write-protect state driven by Servo.
34 logging.info('Enable write-protect.')
37 logging.info('Now disable write-protect and check again.')
40 logging.info('Enable write-protect again to check final state.')
Dcontrol.dev9 PURPOSE = "Servo based hardware write protect test"
10 CRITERIA = "This test will fail if SPI hardware write-protect cannot be read correctly"
20 This is a simple test which toggles the hardware write-protect line via Servo
Dcontrol9 PURPOSE = "Servo based hardware write protect test"
10 CRITERIA = "This test will fail if SPI hardware write-protect cannot be read correctly"
20 This is a simple test which toggles the hardware write-protect line via Servo
/external/llvm-project/llvm/test/tools/obj2yaml/Minidump/
Dbasic.yaml72 Allocation Protect: [ ]
75 Protect: [ PAGE_NO_ACCESS ]
78 Allocation Protect: [ PAGE_READ_WRITE ]
84 Allocation Protect: [ PAGE_READ_WRITE, PAGE_WRITECOMBINE ]
161 # CHECK-NEXT: Allocation Protect: [ ]
164 # CHECK-NEXT: Protect: [ PAGE_NO_ACCESS ]
167 # CHECK-NEXT: Allocation Protect: [ PAGE_READ_WRITE ]
173 # CHECK-NEXT: Allocation Protect: [ PAGE_READ_WRITE, PAGE_WRITECOMBINE ]
/external/libnl/lib/route/link/
Dmacsec.c61 uint8_t send_sci, end_station, scb, replay_protect, protect, encrypt; member
138 info->protect = nla_get_u8(tb[IFLA_MACSEC_PROTECT]); in macsec_parse()
232 PRINT_FLAG(tmp, info, protect, 'P'); in flags_str()
273 nl_dump(p, " sci %016llx protect %s encoding_sa %d encrypt %s send_sci %s validate %s %s\n", in macsec_dump_details()
274 …ntohll(info->sci), values_on_off[info->protect], info->encoding_sa, values_on_off[info->encrypt], … in macsec_dump_details()
330 NLA_PUT_U8(msg, IFLA_MACSEC_PROTECT, info->protect); in macsec_put_attrs()
383 diff |= MACSEC_DIFF(PROTECT, a->protect != b->protect); in macsec_compare()
581 int rtnl_link_macsec_set_protect(struct rtnl_link *link, uint8_t protect) in rtnl_link_macsec_set_protect() argument
587 if (protect > 1) in rtnl_link_macsec_set_protect()
590 info->protect = protect; in rtnl_link_macsec_set_protect()
[all …]
/external/llvm-project/lldb/test/Shell/SymbolFile/Breakpad/Inputs/
Dunwind-via-stack-win.yaml30 Allocation Protect: [ ]
33 Protect: [ PAGE_EXECUTE ]
37 Allocation Protect: [ ]
40 Protect: [ PAGE_EXECUTE ]
/external/vboot_reference/scripts/image_signing/
Dtofactory.sh8 # * Firmware write protect disabled
57 # Error message for write protect disable failure, with reminder
61 echo "ERROR: Unable to disable $which_rom write protect: $*" 1>&2
62 echo "Is hardware write protect still enabled?" 1>&2
66 # Disable write protect for an EEPROM
72 debug_msg "Disabling $which_rom write protect"
163 # Disable write protect
/external/llvm-project/lldb/source/Plugins/Process/Windows/Common/
DProcessDebugger.cpp32 static DWORD ConvertLldbToWinApiProtect(uint32_t protect) { in ConvertLldbToWinApiProtect() argument
40 if (protect & ePermissionsExecutable) in ConvertLldbToWinApiProtect()
50 static bool IsPageReadable(uint32_t protect) { in IsPageReadable() argument
51 return (protect & PAGE_NOACCESS) == 0; in IsPageReadable()
54 static bool IsPageWritable(uint32_t protect) { in IsPageWritable() argument
55 return (protect & (PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_WRITECOPY | in IsPageWritable()
59 static bool IsPageExecutable(uint32_t protect) { in IsPageExecutable() argument
60 return (protect & (PAGE_EXECUTE | PAGE_EXECUTE_READ | PAGE_EXECUTE_READWRITE | in IsPageExecutable()
344 auto protect = ConvertLldbToWinApiProtect(permissions); in AllocateMemory() local
345 auto result = ::VirtualAllocEx(handle, nullptr, size, MEM_COMMIT, protect); in AllocateMemory()
[all …]
/external/arm-trusted-firmware/plat/arm/common/
Darm_nor_psci_mem_protect.c19 * For this reason we reserve 64 MB for the NS images and protect the RAM
34 * Function that reads the content of the memory protect variable that
48 * Function that writes the content of the memory protect variable that
56 ERROR("unlocking memory protect variable\n"); in arm_nor_psci_write_mem_protect()
69 ERROR("erasing block containing memory protect variable\n"); in arm_nor_psci_write_mem_protect()
130 * Function that checks if a region is protected by the memory protect
/external/llvm-project/llvm/lib/Support/Unix/
DMemory.inc108 int Protect = getPosixProtectionFlags(PFlags);
111 Protect |= PROT_MPROTECT(PROT_READ | PROT_WRITE | PROT_EXEC);
124 void *Addr = ::mmap(reinterpret_cast<void *>(Start), PageSize*NumPages, Protect,
183 int Protect = getPosixProtectionFlags(Flags);
193 if (InvalidateCache && !(Protect & PROT_READ)) {
194 int Result = ::mprotect((void *)Start, End - Start, Protect | PROT_READ);
203 int Result = ::mprotect((void *)Start, End - Start, Protect);
/external/swiftshader/third_party/llvm-10.0/llvm/lib/Support/Unix/
DMemory.inc107 int Protect = getPosixProtectionFlags(PFlags);
110 Protect |= PROT_MPROTECT(PROT_READ | PROT_WRITE | PROT_EXEC);
123 void *Addr = ::mmap(reinterpret_cast<void *>(Start), PageSize*NumPages, Protect,
182 int Protect = getPosixProtectionFlags(Flags);
192 if (InvalidateCache && !(Protect & PROT_READ)) {
193 int Result = ::mprotect((void *)Start, End - Start, Protect | PROT_READ);
202 int Result = ::mprotect((void *)Start, End - Start, Protect);
/external/compiler-rt/lib/msan/
Dmsan_linux.cc60 // Depending on the kernel configuration, we may not be able to protect in ProtectMemoryRange()
69 Printf("FATAL: Cannot protect memory range %p - %p.\n", beg, end); in ProtectMemoryRange()
136 bool protect = type == MappingDesc::INVALID || in InitShadow() local
138 CHECK(!(map && protect)); in InitShadow()
139 if (!map && !protect) in InitShadow()
149 if (protect) { in InitShadow()

12345678910>>...60