Document revision date: 19 July 1999
OpenVMS Programming Concepts Manual
Previous
Contents
Index
Chapter 23
23
Using Run-Time Routines for Memory Allocation
23.1
Allocating and Freeing Pages
23.2
Interactions with Other Run-Time Library Routines
23.3
Interactions with System Services
23.4
Zones
23.4.1
Zone Attributes
23.4.2
Default Zone
23.4.3
Zone Identification
23.4.4
Creating a Zone
23.4.5
Deleting a Zone
23.4.6
Resetting a Zone
23.5
Allocating and Freeing Blocks
23.6
Allocation Algorithms
23.6.1
First Fit Algorithm
23.6.2
Quick Fit Algorithm
23.6.3
Frequent Sizes Algorithm
23.6.4
Fixed Size Algorithm
23.7
User-Defined Zones
23.8
Debugging Programs That Use Virtual Memory Zones
Chapter 24
24
Alignment on OpenVMS VAX and Alpha Systems
24.1
Alignment
24.1.1
Alignment and Performance
24.1.1.1
Alignment on OpenVMS VAX (VAX Only)
24.1.1.2
Alignment on OpenVMS Alpha (Alpha Only)
24.2
Using Compilers for Alignment (Alpha Only)
24.2.1
The DEC C Compiler (Alpha Only)
24.2.1.1
Compiler Example of Memory Structure of VAX C and DEC C
24.2.2
The BLISS Compiler
24.2.3
The DEC Fortran Compiler (Alpha Only)
24.2.4
The MACRO-32 Compiler (Alpha Only)
24.2.5
The VAX Environment Software Translator---VEST (Alpha Only)
24.3
Using Tools for Finding Unaligned Data
24.3.1
The OpenVMS Debugger
24.3.2
The Performance and Coverage Analyzer---PCA
24.3.3
System Services (Alpha Only)
Chapter 25
25
System Security Services
25.1
Overview of the Operating System's Protection Scheme
25.2
Identifiers
25.2.1
Identifier Format
25.2.2
General Identifiers
25.2.3
System-Defined Identifiers
25.2.4
UIC Identifiers
25.2.5
Facility Identifiers
25.2.6
Identifier Attributes
25.3
Rights Database
25.3.1
Initializing a Rights Database
25.3.2
Using System Services to Affect a Rights Database
25.3.2.1
Translating Identifier Values and Identifier Names
25.3.2.2
Adding Identifiers and Holders to the Rights Database
25.3.2.3
Determining Holders of Identifiers
25.3.2.4
Determining Identifiers Held by a Holder
25.3.2.5
Modifying the Identifier Record
25.3.2.6
Modifying a Holder Record
25.3.2.7
Removing Identifiers and Holders from the Rights Database
25.3.3
Search Operations
25.3.4
Modifying a Rights List
25.4
Persona (Alpha Only
1
)
25.4.1
Impersonation Services (Alpha Only)
25.4.1.1
Using Impersonation System Services
25.4.2
Per-Thread Security (Alpha Only)
25.4.2.1
Previous Security Model
25.4.2.2
Per-Thread Security Model
25.4.3
Persona Extensions (Alpha Only)
25.5
Managing Object Protection
25.5.1
Protected Objects
25.5.2
Object Security Profile
25.5.2.1
Displaying the Security Profile
25.5.2.2
Modifying the Security Profile
25.5.3
Types of Access Control Entries
25.5.3.1
Design Considerations
25.5.3.2
Translating ACEs
25.5.3.3
Creating and Maintaining ACEs
25.6
Protected Subsystems
25.7
Security Auditing
25.8
Checking Access Protection
25.8.1
Creating a Security Profile
25.8.2
SYS$CHKPRO System Sevice
25.8.3
SYS$CHECK_ACCESS System Service
25.9
SYS$CHECK_PRIVILEGE
25.10
Implementing Site-Specific Security Policies
25.10.1
Creating Loadable Security Services
25.10.1.1
Preparing and Loading a System Service
25.10.1.2
Removing an Executive Loaded Image
25.10.2
Installing Filters for Site-Specific Password Policies
25.10.2.1
Creating a Shareable Image
25.10.2.2
Installing a Shareable Image
Previous
Next
Contents
Index
privacy and legal statement
5841PRO_CONTENTS_008.HTML