/external/python/cpython2/Doc/distutils/ |
D | commandref.rst | 7 .. % \section{Building modules: the \protect\command{build} command family} 9 .. % \subsubsection{\protect\command{build}} 11 .. % \subsubsection{\protect\command{build\_py}} 13 .. % \subsubsection{\protect\command{build\_ext}} 15 .. % \subsubsection{\protect\command{build\_clib}} 28 .. % \subsubsection{\protect\command{install\_lib}} 47 .. % \subsection{Cleaning up: the \protect\command{clean} command} 52 .. % \protect\command{bdist} command family} 55 .. % \subsection{\protect\command{bdist}} 56 .. % \subsection{\protect\command{bdist\_dumb}} [all …]
|
/external/autotest/server/site_tests/firmware_Fingerprint/tests/ |
D | sw_write_protect.sh | 12 echo "Running test to validate software write protect cannot be disabled when \ 13 hardware write protect is enabled" 15 echo "Making sure all write protect is enabled" 31 echo "Disabling software write protect when hardware write protect is enabled \ 34 echo "Disabling software write protect should fail" 48 echo "Disabling software write protect when hardware write protect is enabled \ 51 echo "Disabling software write protect should fail"
|
D | common.sh | 16 Flash protect flags: 0x0000040f wp_gpio_asserted ro_at_boot ro_now rollback_now all_now 23 Flash protect flags: 0x0000000b wp_gpio_asserted ro_at_boot ro_now 32 Flash protect flags: 0x0000000b wp_gpio_asserted ro_at_boot ro_now 42 Flash protect flags: 0x00000000 51 Flash protect flags: 0x00000407 ro_at_boot ro_now rollback_now all_now 58 Flash protect flags: 0x00000003 ro_at_boot ro_now 327 # NOTE: "wspw_cur" stands for "write protect switch current" 330 echo "Error getting hardware write protect state" 340 echo "Expected HW write protect to be enabled, but it is not" 350 echo "Expected HW write protect to be disabled, but it is not" [all …]
|
D | rdp1.sh | 16 # * Hardware write protect is disabled 18 # * Software write protect is enabled 48 # * Hardware write protect is disabled 50 # * Software write protect is enabled 83 echo "Making sure hardware write protect is DISABLED and software write \ 84 protect is ENABLED"
|
D | rdp0.sh | 17 # * Hardware write protect is disabled 18 # * Software write protect is disabled 48 # * Hardware write protect is disabled 49 # * Software write protect is disabled 80 echo "Making sure all write protect is disabled"
|
/external/apache-commons-bcel/docs/ |
D | manual.bib | 3 title = {\protect{Programming the Internet in Ada95}}, 11 title = {\protect{Adding Type Parameterization to the Java 22 title = {\protect{Aspect-Oriented Programming}}, 30 title = {\protect{Barat -- A Front-End for Java}}, 38 title = {\protect{Binary Component Adaptation}}, 47 title = {\protect{BIT: A Tool for Instrumenting Java 72 title = {\protect{Dynamic Class Loading in the Java Virtual 90 title = {\protect{Type Inference for Late Binding. The 121 title = {\protect{JaWa: Java with Assertions}}, 130 title = {\protect{Automatic Program Transformation with [all …]
|
/external/grpc-grpc-java/alts/src/test/java/io/grpc/alts/internal/ |
D | TsiTest.java | 141 ByteBuf protect = ref.register(protectOut.get(0)); in sendMessage() local 142 while (protect.isReadable()) { in sendMessage() 143 ByteBuf buf = protect; in sendMessage() 145 int size = Math.min(protect.readableBytes(), recvFragmentSize); in sendMessage() 146 buf = protect.readSlice(size); in sendMessage() 275 ByteBuf protect = ref.register(protectOut.get(0)); in corruptedCounterTest() local 277 receiver.unprotect(protect.slice(), unprotectOut, alloc); in corruptedCounterTest() 282 receiver.unprotect(protect, unprotectOut, alloc); in corruptedCounterTest() 316 ByteBuf protect = ref.register(protectOut.get(0)); in corruptedCiphertextTest() local 317 int ciphertextIdx = protect.writerIndex() - FakeChannelCrypter.getTagBytes() - 2; in corruptedCiphertextTest() [all …]
|
/external/autotest/server/site_tests/firmware_Fingerprint/ |
D | control.sw_write_protect | 10 Verify that software write protect cannot be disabled when hardware write 11 protect is enabled. 14 Fails if we can disable software write protect from RO or RW." 25 Reboots to RO, attempts to disable software write protect while hardware write 26 protect is enabled and verifies that it fails. Then reboots to RW, attempts to 27 disable software write protect while hardware write protect is enabled and
|
D | firmware_Fingerprint.py | 68 'Flash protect flags: 0x00000407 ro_at_boot ro_now rollback_now all_now\n' 73 'Flash protect flags: 0x00000003 ro_at_boot ro_now\n' 81 logging.info('Making sure hardware write protect is DISABLED and ' 82 'software write protect is ENABLED') 105 'Flash protect flags: 0x00000000\n' 113 logging.info('Making sure all write protect is disabled') 134 * Hardware write protect is disabled 136 * Software write protect is enabled 168 * Hardware write protect is disabled 170 * Software write protect is enabled [all …]
|
D | control.rdp1 | 26 The test setup enables RDP level 1 by enabling hardware write protect and then 27 enabling software write protect (with reboot of the EC); the test setup then 28 disables hardware write protect, so that we can perform reads and change RDP 29 levels through the bootloader (only accessible when HW write protect is
|
D | control.rw_no_update_ro | 10 Verify HW write protect prevents RO fingerprint firmware modification. 13 Fails if the RO firmware can be written while HW write protect is enabled. 27 Enables hardware write protect, attempts to flash the RO fingerprint firmware,
|
/external/python/cpython3/Doc/distutils/ |
D | commandref.rst | 9 .. % \section{Building modules: the \protect\command{build} command family} 11 .. % \subsubsection{\protect\command{build}} 13 .. % \subsubsection{\protect\command{build\_py}} 15 .. % \subsubsection{\protect\command{build\_ext}} 17 .. % \subsubsection{\protect\command{build\_clib}} 30 .. % \subsubsection{\protect\command{install\_lib}} 49 .. % \subsection{Cleaning up: the \protect\command{clean} command} 98 .. % \protect\command{bdist} command family} 101 .. % \subsection{\protect\command{bdist}} 102 .. % \subsection{\protect\command{bdist\_dumb}} [all …]
|
/external/vulkan-validation-layers/scripts/ |
D | layer_dispatch_table_generator.py | 89 …self.CommandData = namedtuple('CommandData', ['name', 'ext_name', 'ext_type', 'protect', 'return_t… 234 protect=self.featureExtraProtect, 244 protect=self.featureExtraProtect, 256 protect=self.featureExtraProtect, 267 protect=self.featureExtraProtect, 320 if cur_cmd.protect is not None: 321 table += '#ifdef %s\n' % cur_cmd.protect 325 if cur_cmd.protect is not None: 326 table += '#endif // %s\n' % cur_cmd.protect 361 if cur_cmd.protect is not None: [all …]
|
/external/autotest/server/site_tests/firmware_WriteProtect/ |
D | firmware_WriteProtect.py | 12 This test checks whether the hardware write-protect state reported by 13 crossystem matches the real write-protect state driven by Servo. 34 logging.info('Enable write-protect.') 37 logging.info('Now disable write-protect and check again.') 40 logging.info('Enable write-protect again to check final state.')
|
D | control.dev | 9 PURPOSE = "Servo based hardware write protect test" 10 CRITERIA = "This test will fail if SPI hardware write-protect cannot be read correctly" 20 This is a simple test which toggles the hardware write-protect line via Servo
|
D | control | 9 PURPOSE = "Servo based hardware write protect test" 10 CRITERIA = "This test will fail if SPI hardware write-protect cannot be read correctly" 20 This is a simple test which toggles the hardware write-protect line via Servo
|
/external/llvm-project/llvm/test/tools/obj2yaml/Minidump/ |
D | basic.yaml | 72 Allocation Protect: [ ] 75 Protect: [ PAGE_NO_ACCESS ] 78 Allocation Protect: [ PAGE_READ_WRITE ] 84 Allocation Protect: [ PAGE_READ_WRITE, PAGE_WRITECOMBINE ] 161 # CHECK-NEXT: Allocation Protect: [ ] 164 # CHECK-NEXT: Protect: [ PAGE_NO_ACCESS ] 167 # CHECK-NEXT: Allocation Protect: [ PAGE_READ_WRITE ] 173 # CHECK-NEXT: Allocation Protect: [ PAGE_READ_WRITE, PAGE_WRITECOMBINE ]
|
/external/libnl/lib/route/link/ |
D | macsec.c | 61 uint8_t send_sci, end_station, scb, replay_protect, protect, encrypt; member 138 info->protect = nla_get_u8(tb[IFLA_MACSEC_PROTECT]); in macsec_parse() 232 PRINT_FLAG(tmp, info, protect, 'P'); in flags_str() 273 nl_dump(p, " sci %016llx protect %s encoding_sa %d encrypt %s send_sci %s validate %s %s\n", in macsec_dump_details() 274 …ntohll(info->sci), values_on_off[info->protect], info->encoding_sa, values_on_off[info->encrypt], … in macsec_dump_details() 330 NLA_PUT_U8(msg, IFLA_MACSEC_PROTECT, info->protect); in macsec_put_attrs() 383 diff |= MACSEC_DIFF(PROTECT, a->protect != b->protect); in macsec_compare() 581 int rtnl_link_macsec_set_protect(struct rtnl_link *link, uint8_t protect) in rtnl_link_macsec_set_protect() argument 587 if (protect > 1) in rtnl_link_macsec_set_protect() 590 info->protect = protect; in rtnl_link_macsec_set_protect() [all …]
|
/external/llvm-project/lldb/test/Shell/SymbolFile/Breakpad/Inputs/ |
D | unwind-via-stack-win.yaml | 30 Allocation Protect: [ ] 33 Protect: [ PAGE_EXECUTE ] 37 Allocation Protect: [ ] 40 Protect: [ PAGE_EXECUTE ]
|
/external/vboot_reference/scripts/image_signing/ |
D | tofactory.sh | 8 # * Firmware write protect disabled 57 # Error message for write protect disable failure, with reminder 61 echo "ERROR: Unable to disable $which_rom write protect: $*" 1>&2 62 echo "Is hardware write protect still enabled?" 1>&2 66 # Disable write protect for an EEPROM 72 debug_msg "Disabling $which_rom write protect" 163 # Disable write protect
|
/external/llvm-project/lldb/source/Plugins/Process/Windows/Common/ |
D | ProcessDebugger.cpp | 32 static DWORD ConvertLldbToWinApiProtect(uint32_t protect) { in ConvertLldbToWinApiProtect() argument 40 if (protect & ePermissionsExecutable) in ConvertLldbToWinApiProtect() 50 static bool IsPageReadable(uint32_t protect) { in IsPageReadable() argument 51 return (protect & PAGE_NOACCESS) == 0; in IsPageReadable() 54 static bool IsPageWritable(uint32_t protect) { in IsPageWritable() argument 55 return (protect & (PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_WRITECOPY | in IsPageWritable() 59 static bool IsPageExecutable(uint32_t protect) { in IsPageExecutable() argument 60 return (protect & (PAGE_EXECUTE | PAGE_EXECUTE_READ | PAGE_EXECUTE_READWRITE | in IsPageExecutable() 344 auto protect = ConvertLldbToWinApiProtect(permissions); in AllocateMemory() local 345 auto result = ::VirtualAllocEx(handle, nullptr, size, MEM_COMMIT, protect); in AllocateMemory() [all …]
|
/external/arm-trusted-firmware/plat/arm/common/ |
D | arm_nor_psci_mem_protect.c | 19 * For this reason we reserve 64 MB for the NS images and protect the RAM 34 * Function that reads the content of the memory protect variable that 48 * Function that writes the content of the memory protect variable that 56 ERROR("unlocking memory protect variable\n"); in arm_nor_psci_write_mem_protect() 69 ERROR("erasing block containing memory protect variable\n"); in arm_nor_psci_write_mem_protect() 130 * Function that checks if a region is protected by the memory protect
|
/external/llvm-project/llvm/lib/Support/Unix/ |
D | Memory.inc | 108 int Protect = getPosixProtectionFlags(PFlags); 111 Protect |= PROT_MPROTECT(PROT_READ | PROT_WRITE | PROT_EXEC); 124 void *Addr = ::mmap(reinterpret_cast<void *>(Start), PageSize*NumPages, Protect, 183 int Protect = getPosixProtectionFlags(Flags); 193 if (InvalidateCache && !(Protect & PROT_READ)) { 194 int Result = ::mprotect((void *)Start, End - Start, Protect | PROT_READ); 203 int Result = ::mprotect((void *)Start, End - Start, Protect);
|
/external/swiftshader/third_party/llvm-10.0/llvm/lib/Support/Unix/ |
D | Memory.inc | 107 int Protect = getPosixProtectionFlags(PFlags); 110 Protect |= PROT_MPROTECT(PROT_READ | PROT_WRITE | PROT_EXEC); 123 void *Addr = ::mmap(reinterpret_cast<void *>(Start), PageSize*NumPages, Protect, 182 int Protect = getPosixProtectionFlags(Flags); 192 if (InvalidateCache && !(Protect & PROT_READ)) { 193 int Result = ::mprotect((void *)Start, End - Start, Protect | PROT_READ); 202 int Result = ::mprotect((void *)Start, End - Start, Protect);
|
/external/compiler-rt/lib/msan/ |
D | msan_linux.cc | 60 // Depending on the kernel configuration, we may not be able to protect in ProtectMemoryRange() 69 Printf("FATAL: Cannot protect memory range %p - %p.\n", beg, end); in ProtectMemoryRange() 136 bool protect = type == MappingDesc::INVALID || in InitShadow() local 138 CHECK(!(map && protect)); in InitShadow() 139 if (!map && !protect) in InitShadow() 149 if (protect) { in InitShadow()
|