/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecCertificateRequest.h | 70 Create a certificate request operation based on a policy and certificate 71 type. If a policy is not specified, one will be chosen for the caller. 75 @param policy A policy. 88 const CSSM_OID *policy, 151 @param policy A policy. 167 const CSSM_OID *policy, 177 Get policy-specific data following a SecCertificateRequestSubmit.
|
H A D | TrustStore.cpp | 51 // Retrieve the trust setting for a (certificate, policy) pair. 53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument 58 if (Item item = findItem(cert, policy, keychainList)) { 99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument 109 if (Item item = findItem(cert, policy, searchList)) { 119 Item item = new UserTrustItem(cert, policy, trustData); 162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument 182 const CssmOid &policyOid = policy->oid();
|
H A D | SecImportExport.c | 82 SecPolicyRef policy = NULL; 111 policy = SecPolicyCreateBasicX509(); 112 if(!policy) goto out; //require(policy, out); 114 SecTrustCreateWithCertificates(eval_chain, policy, &trust); 133 CFReleaseSafe(policy); 250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 256 status = SecTrustCreateWithCertificates(certArray, policy, &trust); 257 if (policy) { 258 CFRelease(policy); [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/trustSettings/ |
H A D | trustSettings.scr | 74 policy = swuSign 85 policy = swuSign 97 policy = swuSign 149 policy = smime
|
/macosx-10.10/WebCore-7600.1.25/loader/ |
H A D | PolicyChecker.cpp | 163 void PolicyChecker::continueAfterNavigationPolicy(PolicyAction policy) argument 168 bool shouldContinue = policy == PolicyUse; 170 switch (policy) { 196 void PolicyChecker::continueAfterNewWindowPolicy(PolicyAction policy) argument 201 switch (policy) { 213 callback.call(policy == PolicyUse); 216 void PolicyChecker::continueAfterContentPolicy(PolicyAction policy) argument 220 callback.call(policy);
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/C/ |
H A D | WKCookieManager.cpp | 64 void WKCookieManagerSetHTTPCookieAcceptPolicy(WKCookieManagerRef cookieManager, WKHTTPCookieAcceptPolicy policy) argument 66 toImpl(cookieManager)->setHTTPCookieAcceptPolicy(toHTTPCookieAcceptPolicy(policy));
|
/macosx-10.10/WebKit2-7600.1.25/WebProcess/Cookies/ |
H A D | WebCookieManager.cpp | 107 void WebCookieManager::setHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument 109 platformSetHTTPCookieAcceptPolicy(policy);
|
/macosx-10.10/WebKit2-7600.1.25/WebProcess/WebCoreSupport/mac/ |
H A D | WebFrameNetworkingContext.mm | 62 void WebFrameNetworkingContext::setCookieAcceptPolicyForAllContexts(HTTPCookieAcceptPolicy policy) 64 [[NSHTTPCookieStorage sharedHTTPCookieStorage] setCookieAcceptPolicy:static_cast<NSHTTPCookieAcceptPolicy>(policy)]; 67 WKSetHTTPCookieAcceptPolicy(cookieStorage.get(), policy); 71 WKSetHTTPCookieAcceptPolicy(session->cookieStorage().get(), policy);
|
/macosx-10.10/WebKit2-7600.1.25/WebProcess/WebCoreSupport/soup/ |
H A D | WebFrameNetworkingContext.cpp | 54 void WebFrameNetworkingContext::setCookieAcceptPolicyForAllContexts(HTTPCookieAcceptPolicy policy) argument 57 switch (policy) {
|
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/examples/mime/ |
H A D | maildemo.tcl | 15 # The use of SSL by our client can be controlled by a policy procedure. Using 19 proc policy {demoarg code diagnostic} { procedure 59 -tlspolicy [list policy $tok] \
|
/macosx-10.10/xnu-2782.1.97/osfmk/mach/ |
H A D | thread_info.h | 73 #include <mach/policy.h> 96 policy_t policy; /* scheduling policy in effect */ member in struct:thread_basic_info
|
/macosx-10.10/Heimdal-398.1.2/kadmin/ |
H A D | util.c | 149 * try to parse the string `resp' into policy in `attr', also 157 parse_policy (const char *resp, char **policy, int *mask, int bit) argument 164 *policy = strdup(resp); 165 if (*policy == NULL) { 173 fprintf (stderr, "Policy is free string or \"none\" for no policy, " 174 "by default the \"default\" policy is used\n"); 186 edit_policy (const char *prompt, char **policy, int *mask, int bit) argument 200 if (parse_policy (resp, policy, mask, bit) == 0) 456 ent->policy = strdup(default_ent->policy); 503 set_entry(krb5_context contextp, kadm5_principal_ent_t ent, int *mask, const char *max_ticket_life, const char *max_renewable_life, const char *expiration, const char *pw_expiration, const char *attributes, const char *policy) argument [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certChain/ |
H A D | certChain.cpp | 26 SecPolicyRef policy = NULL; local 93 ortn = SecPolicySearchCopyNext(policySearch, &policy); 99 /* build a SecTrustRef for specified policy and certs */ 101 policy, &secTrust); 227 if(policy) { 228 CFRelease(policy);
|
/macosx-10.10/WebKit-7600.1.25/win/ |
H A D | WebMutableURLRequest.h | 37 inline WebCore::ResourceRequestCachePolicy core(WebURLRequestCachePolicy policy) argument 39 return static_cast<WebCore::ResourceRequestCachePolicy>(policy); 42 inline WebURLRequestCachePolicy kit(WebCore::ResourceRequestCachePolicy policy) argument 44 return static_cast<WebURLRequestCachePolicy>(policy); 127 /* [in] */ WebURLRequestCachePolicy policy);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/X509tests/ |
H A D | x509tests.scr | 384 echo FIXME: test34 needs policy work 395 echo FIXME: test35 needs policy work 406 echo FIXME: test36 needs policy work 419 echo FIXME: test37 needs policy work 432 echo FIXME: test38 needs policy work 445 echo FIXME: test39 needs policy work 461 echo FIXME: test40 needs policy work 477 echo FIXME: test41 needs policy work 493 echo FIXME: test42 needs policy work 510 echo FIXME: test43 needs policy wor [all...] |
/macosx-10.10/WebCore-7600.1.25/dom/ |
H A D | DataTransfer.cpp | 58 DataTransfer::DataTransfer(DataTransferAccessPolicy policy, PassOwnPtr<Pasteboard> pasteboard, Type type, bool forFileDrag) argument 59 : m_policy(policy) 75 PassRefPtr<DataTransfer> DataTransfer::createForCopyAndPaste(DataTransferAccessPolicy policy) argument 77 return adoptRef(new DataTransfer(policy, policy == DataTransferAccessPolicy::Writable ? Pasteboard::createPrivate() : Pasteboard::createForCopyAndPaste())); 88 void DataTransfer::setAccessPolicy(DataTransferAccessPolicy policy) argument 91 ASSERT(m_policy != DataTransferAccessPolicy::Numb || policy == DataTransferAccessPolicy::Numb); 92 m_policy = policy; 237 PassRefPtr<DataTransfer> DataTransfer::createForDragAndDrop(DataTransferAccessPolicy policy, const DragData& dragData) argument 239 return adoptRef(new DataTransfer(policy, Pasteboar [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | TrustStore.cpp | 51 // Retrieve the trust setting for a (certificate, policy) pair. 53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument 58 if (Item item = findItem(cert, policy, keychainList)) { 99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument 109 if (Item item = findItem(cert, policy, searchList)) { 119 Item item = new UserTrustItem(cert, policy, trustData); 162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument 182 const CssmOid &policyOid = policy->oid();
|
H A D | SecImportExport.c | 82 SecPolicyRef policy = NULL; 111 policy = SecPolicyCreateBasicX509(); 112 if(!policy) goto out; //require(policy, out); 114 SecTrustCreateWithCertificates(eval_chain, policy, &trust); 133 CFReleaseSafe(policy); 250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 256 status = SecTrustCreateWithCertificates(certArray, policy, &trust); 257 if (policy) { 258 CFRelease(policy); [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | TrustStore.cpp | 51 // Retrieve the trust setting for a (certificate, policy) pair. 53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument 58 if (Item item = findItem(cert, policy, keychainList)) { 99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument 109 if (Item item = findItem(cert, policy, searchList)) { 119 Item item = new UserTrustItem(cert, policy, trustData); 162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument 182 const CssmOid &policyOid = policy->oid();
|
H A D | SecImportExport.c | 82 SecPolicyRef policy = NULL; 111 policy = SecPolicyCreateBasicX509(); 112 if(!policy) goto out; //require(policy, out); 114 SecTrustCreateWithCertificates(eval_chain, policy, &trust); 133 CFReleaseSafe(policy); 250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 256 status = SecTrustCreateWithCertificates(certArray, policy, &trust); 257 if (policy) { 258 CFRelease(policy); [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTool/ |
H A D | verify_cert.c | 66 const CSSM_OID *policy = &CSSMOID_APPLE_X509_BASIC; local 108 policy = policyStringToOid(optarg); 109 if(policy == NULL) { 183 policy, 184 NULL, // policy opts 198 /* per-policy options */ 199 if(compareOids(policy, &CSSMOID_APPLE_TP_SSL) || compareOids(policy, &CSSMOID_APPLE_TP_APPLEID_SHARING)) { 215 if(compareOids(policy, &CSSMOID_APPLE_TP_SMIME)) {
|
/macosx-10.10/Security-57031.1.35/Security/regressions/test/ |
H A D | testpolicy.m | 67 static void runOneLeafTest(SecPolicyRef policy, 125 err = SecTrustCreateWithCertificates(certArray, policy, &trustRef); 166 static void runCertificateTestFor(SecPolicyRef policy, 178 runOneLeafTest(policy, anchors, intermediates, path, ![fileName hasPrefix:@"Invalid"], [expect objectForKey:fileName], date); 182 void runCertificateTestForDirectory(SecPolicyRef policy, CFStringRef resourceSubDirectory, CFDateRef date) 211 runCertificateTestFor(policy, allRoots, allCAs, certTests, expect, date);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-67-sectrust-blacklist.c | 57 SecPolicyRef policy = SecPolicyCreateSSL(false, NULL); local 63 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), 74 CFRelease(policy); 85 returned for policy failures that aren't blacklisting */
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/dotMacRequest/ |
H A D | dotMacRequest.cpp | 137 /* map CertRequestType to a policy OID */ 138 const CSSM_OID *policy; local 141 policy = &CSSMOID_DOTMAC_CERT_REQ_IDENTITY; 144 policy = &CSSMOID_DOTMAC_CERT_REQ_EMAIL_SIGN; 147 policy = &CSSMOID_DOTMAC_CERT_REQ_EMAIL_ENCRYPT; 159 ortn = SecCertificateFindRequest(policy, 241 /* policy, not technically needed; use this one by convention */ 242 const CSSM_OID *policy = &CSSMOID_DOTMAC_CERT_REQ_IDENTITY; local 248 ortn = SecCertificateFindRequest(policy, 350 /* map CertRequestType to a policy OI 351 const CSSM_OID *policy; local [all...] |
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dns/ |
H A D | rpz.h | 50 DNS_RPZ_POLICY_GIVEN = 0, /* 'given': what policy record says */ 63 * Specify a response policy zone. 72 dns_rpz_policy_t policy; /* DNS_RPZ_POLICY_GIVEN or override */ member in struct:dns_rpz_zone 77 * Radix trees for response policy IP addresses. 82 * context for finding the best policy 92 # define DNS_RPZ_HAVE_IP 0x0040 /* a policy zone has IP addresses */ 103 dns_rpz_policy_t policy; member in struct:__anon6718::__anon6719 148 * So various response policy zone messages can be turned up or down. 163 dns_rpz_policy2str(dns_rpz_policy_t policy);
|