Searched refs:policy (Results 101 - 125 of 479) sorted by relevance

1234567891011>>

/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecCertificateRequest.h70 Create a certificate request operation based on a policy and certificate
71 type. If a policy is not specified, one will be chosen for the caller.
75 @param policy A policy.
88 const CSSM_OID *policy,
151 @param policy A policy.
167 const CSSM_OID *policy,
177 Get policy-specific data following a SecCertificateRequestSubmit.
H A DTrustStore.cpp51 // Retrieve the trust setting for a (certificate, policy) pair.
53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument
58 if (Item item = findItem(cert, policy, keychainList)) {
99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument
109 if (Item item = findItem(cert, policy, searchList)) {
119 Item item = new UserTrustItem(cert, policy, trustData);
162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument
182 const CssmOid &policyOid = policy->oid();
H A DSecImportExport.c82 SecPolicyRef policy = NULL;
111 policy = SecPolicyCreateBasicX509();
112 if(!policy) goto out; //require(policy, out);
114 SecTrustCreateWithCertificates(eval_chain, policy, &trust);
133 CFReleaseSafe(policy);
250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
256 status = SecTrustCreateWithCertificates(certArray, policy, &trust);
257 if (policy) {
258 CFRelease(policy);
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/trustSettings/
H A DtrustSettings.scr74 policy = swuSign
85 policy = swuSign
97 policy = swuSign
149 policy = smime
/macosx-10.10/WebCore-7600.1.25/loader/
H A DPolicyChecker.cpp163 void PolicyChecker::continueAfterNavigationPolicy(PolicyAction policy) argument
168 bool shouldContinue = policy == PolicyUse;
170 switch (policy) {
196 void PolicyChecker::continueAfterNewWindowPolicy(PolicyAction policy) argument
201 switch (policy) {
213 callback.call(policy == PolicyUse);
216 void PolicyChecker::continueAfterContentPolicy(PolicyAction policy) argument
220 callback.call(policy);
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/C/
H A DWKCookieManager.cpp64 void WKCookieManagerSetHTTPCookieAcceptPolicy(WKCookieManagerRef cookieManager, WKHTTPCookieAcceptPolicy policy) argument
66 toImpl(cookieManager)->setHTTPCookieAcceptPolicy(toHTTPCookieAcceptPolicy(policy));
/macosx-10.10/WebKit2-7600.1.25/WebProcess/Cookies/
H A DWebCookieManager.cpp107 void WebCookieManager::setHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument
109 platformSetHTTPCookieAcceptPolicy(policy);
/macosx-10.10/WebKit2-7600.1.25/WebProcess/WebCoreSupport/mac/
H A DWebFrameNetworkingContext.mm62 void WebFrameNetworkingContext::setCookieAcceptPolicyForAllContexts(HTTPCookieAcceptPolicy policy)
64 [[NSHTTPCookieStorage sharedHTTPCookieStorage] setCookieAcceptPolicy:static_cast<NSHTTPCookieAcceptPolicy>(policy)];
67 WKSetHTTPCookieAcceptPolicy(cookieStorage.get(), policy);
71 WKSetHTTPCookieAcceptPolicy(session->cookieStorage().get(), policy);
/macosx-10.10/WebKit2-7600.1.25/WebProcess/WebCoreSupport/soup/
H A DWebFrameNetworkingContext.cpp54 void WebFrameNetworkingContext::setCookieAcceptPolicyForAllContexts(HTTPCookieAcceptPolicy policy) argument
57 switch (policy) {
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/examples/mime/
H A Dmaildemo.tcl15 # The use of SSL by our client can be controlled by a policy procedure. Using
19 proc policy {demoarg code diagnostic} { procedure
59 -tlspolicy [list policy $tok] \
/macosx-10.10/xnu-2782.1.97/osfmk/mach/
H A Dthread_info.h73 #include <mach/policy.h>
96 policy_t policy; /* scheduling policy in effect */ member in struct:thread_basic_info
/macosx-10.10/Heimdal-398.1.2/kadmin/
H A Dutil.c149 * try to parse the string `resp' into policy in `attr', also
157 parse_policy (const char *resp, char **policy, int *mask, int bit) argument
164 *policy = strdup(resp);
165 if (*policy == NULL) {
173 fprintf (stderr, "Policy is free string or \"none\" for no policy, "
174 "by default the \"default\" policy is used\n");
186 edit_policy (const char *prompt, char **policy, int *mask, int bit) argument
200 if (parse_policy (resp, policy, mask, bit) == 0)
456 ent->policy = strdup(default_ent->policy);
503 set_entry(krb5_context contextp, kadm5_principal_ent_t ent, int *mask, const char *max_ticket_life, const char *max_renewable_life, const char *expiration, const char *pw_expiration, const char *attributes, const char *policy) argument
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certChain/
H A DcertChain.cpp26 SecPolicyRef policy = NULL; local
93 ortn = SecPolicySearchCopyNext(policySearch, &policy);
99 /* build a SecTrustRef for specified policy and certs */
101 policy, &secTrust);
227 if(policy) {
228 CFRelease(policy);
/macosx-10.10/WebKit-7600.1.25/win/
H A DWebMutableURLRequest.h37 inline WebCore::ResourceRequestCachePolicy core(WebURLRequestCachePolicy policy) argument
39 return static_cast<WebCore::ResourceRequestCachePolicy>(policy);
42 inline WebURLRequestCachePolicy kit(WebCore::ResourceRequestCachePolicy policy) argument
44 return static_cast<WebURLRequestCachePolicy>(policy);
127 /* [in] */ WebURLRequestCachePolicy policy);
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/X509tests/
H A Dx509tests.scr384 echo FIXME: test34 needs policy work
395 echo FIXME: test35 needs policy work
406 echo FIXME: test36 needs policy work
419 echo FIXME: test37 needs policy work
432 echo FIXME: test38 needs policy work
445 echo FIXME: test39 needs policy work
461 echo FIXME: test40 needs policy work
477 echo FIXME: test41 needs policy work
493 echo FIXME: test42 needs policy work
510 echo FIXME: test43 needs policy wor
[all...]
/macosx-10.10/WebCore-7600.1.25/dom/
H A DDataTransfer.cpp58 DataTransfer::DataTransfer(DataTransferAccessPolicy policy, PassOwnPtr<Pasteboard> pasteboard, Type type, bool forFileDrag) argument
59 : m_policy(policy)
75 PassRefPtr<DataTransfer> DataTransfer::createForCopyAndPaste(DataTransferAccessPolicy policy) argument
77 return adoptRef(new DataTransfer(policy, policy == DataTransferAccessPolicy::Writable ? Pasteboard::createPrivate() : Pasteboard::createForCopyAndPaste()));
88 void DataTransfer::setAccessPolicy(DataTransferAccessPolicy policy) argument
91 ASSERT(m_policy != DataTransferAccessPolicy::Numb || policy == DataTransferAccessPolicy::Numb);
92 m_policy = policy;
237 PassRefPtr<DataTransfer> DataTransfer::createForDragAndDrop(DataTransferAccessPolicy policy, const DragData& dragData) argument
239 return adoptRef(new DataTransfer(policy, Pasteboar
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DTrustStore.cpp51 // Retrieve the trust setting for a (certificate, policy) pair.
53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument
58 if (Item item = findItem(cert, policy, keychainList)) {
99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument
109 if (Item item = findItem(cert, policy, searchList)) {
119 Item item = new UserTrustItem(cert, policy, trustData);
162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument
182 const CssmOid &policyOid = policy->oid();
H A DSecImportExport.c82 SecPolicyRef policy = NULL;
111 policy = SecPolicyCreateBasicX509();
112 if(!policy) goto out; //require(policy, out);
114 SecTrustCreateWithCertificates(eval_chain, policy, &trust);
133 CFReleaseSafe(policy);
250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
256 status = SecTrustCreateWithCertificates(certArray, policy, &trust);
257 if (policy) {
258 CFRelease(policy);
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DTrustStore.cpp51 // Retrieve the trust setting for a (certificate, policy) pair.
53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument
58 if (Item item = findItem(cert, policy, keychainList)) {
99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument
109 if (Item item = findItem(cert, policy, searchList)) {
119 Item item = new UserTrustItem(cert, policy, trustData);
162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument
182 const CssmOid &policyOid = policy->oid();
H A DSecImportExport.c82 SecPolicyRef policy = NULL;
111 policy = SecPolicyCreateBasicX509();
112 if(!policy) goto out; //require(policy, out);
114 SecTrustCreateWithCertificates(eval_chain, policy, &trust);
133 CFReleaseSafe(policy);
250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
256 status = SecTrustCreateWithCertificates(certArray, policy, &trust);
257 if (policy) {
258 CFRelease(policy);
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTool/
H A Dverify_cert.c66 const CSSM_OID *policy = &CSSMOID_APPLE_X509_BASIC; local
108 policy = policyStringToOid(optarg);
109 if(policy == NULL) {
183 policy,
184 NULL, // policy opts
198 /* per-policy options */
199 if(compareOids(policy, &CSSMOID_APPLE_TP_SSL) || compareOids(policy, &CSSMOID_APPLE_TP_APPLEID_SHARING)) {
215 if(compareOids(policy, &CSSMOID_APPLE_TP_SMIME)) {
/macosx-10.10/Security-57031.1.35/Security/regressions/test/
H A Dtestpolicy.m67 static void runOneLeafTest(SecPolicyRef policy,
125 err = SecTrustCreateWithCertificates(certArray, policy, &trustRef);
166 static void runCertificateTestFor(SecPolicyRef policy,
178 runOneLeafTest(policy, anchors, intermediates, path, ![fileName hasPrefix:@"Invalid"], [expect objectForKey:fileName], date);
182 void runCertificateTestForDirectory(SecPolicyRef policy, CFStringRef resourceSubDirectory, CFDateRef date)
211 runCertificateTestFor(policy, allRoots, allCAs, certTests, expect, date);
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-67-sectrust-blacklist.c57 SecPolicyRef policy = SecPolicyCreateSSL(false, NULL); local
63 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust),
74 CFRelease(policy);
85 returned for policy failures that aren't blacklisting */
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/dotMacRequest/
H A DdotMacRequest.cpp137 /* map CertRequestType to a policy OID */
138 const CSSM_OID *policy; local
141 policy = &CSSMOID_DOTMAC_CERT_REQ_IDENTITY;
144 policy = &CSSMOID_DOTMAC_CERT_REQ_EMAIL_SIGN;
147 policy = &CSSMOID_DOTMAC_CERT_REQ_EMAIL_ENCRYPT;
159 ortn = SecCertificateFindRequest(policy,
241 /* policy, not technically needed; use this one by convention */
242 const CSSM_OID *policy = &CSSMOID_DOTMAC_CERT_REQ_IDENTITY; local
248 ortn = SecCertificateFindRequest(policy,
350 /* map CertRequestType to a policy OI
351 const CSSM_OID *policy; local
[all...]
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dns/
H A Drpz.h50 DNS_RPZ_POLICY_GIVEN = 0, /* 'given': what policy record says */
63 * Specify a response policy zone.
72 dns_rpz_policy_t policy; /* DNS_RPZ_POLICY_GIVEN or override */ member in struct:dns_rpz_zone
77 * Radix trees for response policy IP addresses.
82 * context for finding the best policy
92 # define DNS_RPZ_HAVE_IP 0x0040 /* a policy zone has IP addresses */
103 dns_rpz_policy_t policy; member in struct:__anon6718::__anon6719
148 * So various response policy zone messages can be turned up or down.
163 dns_rpz_policy2str(dns_rpz_policy_t policy);

Completed in 322 milliseconds

1234567891011>>