Document revision date: 19 July 1999
[Compaq] [Go to the documentation home page] [How to order documentation] [Help on this site] [How to contact us]
[OpenVMS documentation]

OpenVMS Programming Concepts Manual


Previous Contents Index

Chapter 23
23 Using Run-Time Routines for Memory Allocation
     23.1     Allocating and Freeing Pages
     23.2     Interactions with Other Run-Time Library Routines
     23.3     Interactions with System Services
     23.4     Zones
         23.4.1         Zone Attributes
         23.4.2         Default Zone
         23.4.3         Zone Identification
         23.4.4         Creating a Zone
         23.4.5         Deleting a Zone
         23.4.6         Resetting a Zone
     23.5     Allocating and Freeing Blocks
     23.6     Allocation Algorithms
         23.6.1         First Fit Algorithm
         23.6.2         Quick Fit Algorithm
         23.6.3         Frequent Sizes Algorithm
         23.6.4         Fixed Size Algorithm
     23.7     User-Defined Zones
     23.8     Debugging Programs That Use Virtual Memory Zones
Chapter 24
24 Alignment on OpenVMS VAX and Alpha Systems
     24.1     Alignment
         24.1.1         Alignment and Performance
             24.1.1.1             Alignment on OpenVMS VAX (VAX Only)
             24.1.1.2             Alignment on OpenVMS Alpha (Alpha Only)
     24.2     Using Compilers for Alignment (Alpha Only)
         24.2.1         The DEC C Compiler (Alpha Only)
             24.2.1.1             Compiler Example of Memory Structure of VAX C and DEC C
         24.2.2         The BLISS Compiler
         24.2.3         The DEC Fortran Compiler (Alpha Only)
         24.2.4         The MACRO-32 Compiler (Alpha Only)
         24.2.5         The VAX Environment Software Translator---VEST (Alpha Only)
     24.3     Using Tools for Finding Unaligned Data
         24.3.1         The OpenVMS Debugger
         24.3.2         The Performance and Coverage Analyzer---PCA
         24.3.3         System Services (Alpha Only)
Chapter 25
25 System Security Services
     25.1     Overview of the Operating System's Protection Scheme
     25.2     Identifiers
         25.2.1         Identifier Format
         25.2.2         General Identifiers
         25.2.3         System-Defined Identifiers
         25.2.4         UIC Identifiers
         25.2.5         Facility Identifiers
         25.2.6         Identifier Attributes
     25.3     Rights Database
         25.3.1         Initializing a Rights Database
         25.3.2         Using System Services to Affect a Rights Database
             25.3.2.1             Translating Identifier Values and Identifier Names
             25.3.2.2             Adding Identifiers and Holders to the Rights Database
             25.3.2.3             Determining Holders of Identifiers
             25.3.2.4             Determining Identifiers Held by a Holder
             25.3.2.5             Modifying the Identifier Record
             25.3.2.6             Modifying a Holder Record
             25.3.2.7             Removing Identifiers and Holders from the Rights Database
         25.3.3         Search Operations
         25.3.4         Modifying a Rights List
     25.4     Persona (Alpha Only1)
         25.4.1         Impersonation Services (Alpha Only)
             25.4.1.1             Using Impersonation System Services
         25.4.2         Per-Thread Security (Alpha Only)
             25.4.2.1             Previous Security Model
             25.4.2.2             Per-Thread Security Model
         25.4.3         Persona Extensions (Alpha Only)
     25.5     Managing Object Protection
         25.5.1         Protected Objects
         25.5.2         Object Security Profile
             25.5.2.1             Displaying the Security Profile
             25.5.2.2             Modifying the Security Profile
         25.5.3         Types of Access Control Entries
             25.5.3.1             Design Considerations
             25.5.3.2             Translating ACEs
             25.5.3.3             Creating and Maintaining ACEs
     25.6     Protected Subsystems
     25.7     Security Auditing
     25.8     Checking Access Protection
         25.8.1         Creating a Security Profile
         25.8.2         SYS$CHKPRO System Sevice
         25.8.3         SYS$CHECK_ACCESS System Service
     25.9     SYS$CHECK_PRIVILEGE
     25.10     Implementing Site-Specific Security Policies
         25.10.1         Creating Loadable Security Services
             25.10.1.1             Preparing and Loading a System Service
             25.10.1.2             Removing an Executive Loaded Image
         25.10.2         Installing Filters for Site-Specific Password Policies
             25.10.2.1             Creating a Shareable Image
             25.10.2.2             Installing a Shareable Image


Previous Next Contents Index

  [Go to the documentation home page] [How to order documentation] [Help on this site] [How to contact us]  
  privacy and legal statement  
5841PRO_CONTENTS_008.HTML