/macosx-10.10/dtrace-147/libdtrace/ |
H A D | dt_work.c | 55 dtrace_optval_t policy = dtp->dt_options[DTRACEOPT_BUFPOLICY]; local 69 * If the buffering policy is set to anything other than 73 if (policy != DTRACEOPT_BUFPOLICY_SWITCH && 258 dtrace_optval_t policy = dtp->dt_options[DTRACEOPT_BUFPOLICY]; local 285 policy != DTRACEOPT_BUFPOLICY_SWITCH) {
|
/macosx-10.10/xnu-2782.1.97/osfmk/kern/ |
H A D | sync_lock.c | 66 __unused int policy) 62 lock_set_create( __unused task_t task, __unused lock_set_t *new_lock_set, __unused int n_ulocks, __unused int policy) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | common_glue.c | 383 kadm5_policy_ent_t policy, long mask) 396 kadm5_modify_policy(void *server_handle, kadm5_policy_ent_t policy, argument 403 kadm5_get_policy(void *server_handle, char *policy, kadm5_policy_ent_t ent) argument 422 if (ent->policy) 423 free(ent->policy); 382 kadm5_create_policy(void *server_handle, kadm5_policy_ent_t policy, long mask) argument
|
H A D | admin.h | 154 char * policy; member in struct:_kadm5_principal_ent_t 168 char *policy; member in struct:_kadm5_policy_ent_t
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/krbtool/ |
H A D | identPicker.cpp | 224 SecPolicyRef policy = NULL; local 273 ortn = SecPolicySearchCopyNext(policySearch, &policy); 279 /* build a SecTrustRef for specified policy and certs */ 281 policy, &secTrust); 375 if(policy) { 376 CFRelease(policy);
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/efl/tests/ |
H A D | test_ewk2_cookie_manager.cpp | 66 static void getAcceptPolicyCallback(Ewk_Cookie_Accept_Policy policy, void* event_info) argument 69 *ret = policy; 97 Ewk_Cookie_Accept_Policy policy = EWK_COOKIE_ACCEPT_POLICY_ALWAYS; local 98 ewk_cookie_manager_accept_policy_async_get(manager, getAcceptPolicyCallback, &policy); 100 return policy; 137 // Default policy is EWK_COOKIE_ACCEPT_POLICY_NO_THIRD_PARTY. 146 // Change policy to EWK_COOKIE_ACCEPT_POLICY_ALWAYS 159 // Change policy to EWK_COOKIE_ACCEPT_POLICY_NEVER
|
/macosx-10.10/ppp-786.1.1/Helpers/vpnd/ |
H A D | ipsec_utils.c | 97 static int configure_sainfo(int level, FILE *file, CFDictionaryRef ipsec_dict, CFDictionaryRef policy, char **errstr); 988 policy: dictionary that uses this proposal, from the Policies array of ipsec_dict. 995 configure_sainfo(int level, FILE *file, CFDictionaryRef ipsec_dict, CFDictionaryRef policy, char **errstr) argument 1008 if (policy) { 1009 algos = CFDictionaryGetValue(policy, kRASPropIPSecPolicyEncryptionAlgorithm); 1059 if (policy) { 1060 algos = CFDictionaryGetValue(policy, kRASPropIPSecPolicyHashAlgorithm); 1106 if (policy) { 1107 algos = CFDictionaryGetValue(policy, kRASPropIPSecPolicyCompressionAlgorithm); 1146 if (policy) 1324 CFDictionaryRef policy; local 1631 CFDictionaryRef policy; local 1916 CFDictionaryRef policy; local 2148 CFDictionaryRef policy; local [all...] |
/macosx-10.10/OpenSSL098-52/src/apps/ |
H A D | CA.com | 148 $ CA -policy policy_anything -infiles newreq.pem 157 $ CA -policy policy_anything -out newcert.pem -infiles newreq.pem 171 $ CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | crypto-embedded.c | 109 SecPolicyRef policy = NULL; local 113 policy = SecPolicyCreateBasicX509(); 114 if (!policy) 118 if (SecTrustCreateWithCertificates(wrappedCert, policy, &trust)) 131 if (policy) CFRelease(policy);
|
H A D | cert.c | 222 SecPolicyRef policy = NULL; local 235 status = SecPolicySearchCopyNext(searchRef, &policy); 240 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust); 265 if (policy) 266 CFRelease(policy); 679 SecPolicyRef policy = NULL; local 716 rv = SecPolicySearchCopyNext(search, &policy); 722 return policy;
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | crypto-embedded.c | 109 SecPolicyRef policy = NULL; local 113 policy = SecPolicyCreateBasicX509(); 114 if (!policy) 118 if (SecTrustCreateWithCertificates(wrappedCert, policy, &trust)) 131 if (policy) CFRelease(policy);
|
H A D | cert.c | 222 SecPolicyRef policy = NULL; local 235 status = SecPolicySearchCopyNext(searchRef, &policy); 240 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust); 265 if (policy) 266 CFRelease(policy); 679 SecPolicyRef policy = NULL; local 716 rv = SecPolicySearchCopyNext(search, &policy); 722 return policy;
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | crypto-embedded.c | 109 SecPolicyRef policy = NULL; local 113 policy = SecPolicyCreateBasicX509(); 114 if (!policy) 118 if (SecTrustCreateWithCertificates(wrappedCert, policy, &trust)) 131 if (policy) CFRelease(policy);
|
H A D | cert.c | 222 SecPolicyRef policy = NULL; local 235 status = SecPolicySearchCopyNext(searchRef, &policy); 240 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust); 265 if (policy) 266 CFRelease(policy); 679 SecPolicyRef policy = NULL; local 716 rv = SecPolicySearchCopyNext(search, &policy); 722 return policy;
|
/macosx-10.10/xnu-2782.1.97/bsd/netinet6/ |
H A D | ipsec.c | 175 &ip4_def_policy.policy, 0, &sysctl_def_policy, "I", ""); 197 /* for performance, we bypass ipsec until a security policy is set */ 224 def_policy, CTLFLAG_RW | CTLFLAG_LOCKED, &ip6_def_policy.policy, 0, ""); 275 int old_policy = ip4_def_policy.policy; 280 if (ip4_def_policy.policy != IPSEC_POLICY_NONE && 281 ip4_def_policy.policy != IPSEC_POLICY_DISCARD) { 282 ip4_def_policy.policy = old_policy; 286 /* Turn off the bypass if the default security policy changes */ 287 if (ipsec_bypass != 0 && ip4_def_policy.policy != IPSEC_POLICY_NONE) 312 struct secpolicy *currsp = NULL; /* policy o [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/ |
H A D | slapd-idassert.conf | 38 authz-policy both
|
/macosx-10.10/OpenSSL098-52/src/test/ |
H A D | CAss.cnf | 58 policy = policy_anything
|
H A D | test.cnf | 34 policy = policy_match 36 # For the CA policy 45 # For the 'anything' policy
|
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/ |
H A D | cert.c | 247 SecPolicyRef policy = NULL; local 261 status = SecPolicySearchCopyNext(searchRef, &policy); 266 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust); 307 if (policy) 308 CFRelease(policy); 784 SecPolicyRef policy = NULL; local 821 rv = SecPolicySearchCopyNext(search, &policy); 827 return policy;
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | cert.c | 247 SecPolicyRef policy = NULL; local 261 status = SecPolicySearchCopyNext(searchRef, &policy); 266 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust); 307 if (policy) 308 CFRelease(policy); 784 SecPolicyRef policy = NULL; local 821 rv = SecPolicySearchCopyNext(search, &policy); 827 return policy;
|
/macosx-10.10/WebCore-7600.1.25/dom/ |
H A D | ContainerNodeAlgorithms.cpp | 150 void disconnectSubframes(ContainerNode& root, SubframeDisconnectPolicy policy) argument 159 if (policy == RootAndDescendants) {
|
/macosx-10.10/WebCore-7600.1.25/page/ |
H A D | SecurityPolicy.cpp | 96 void SecurityPolicy::setLocalLoadPolicy(LocalLoadPolicy policy) argument 98 localLoadPolicy = policy;
|
/macosx-10.10/WebCore-7600.1.25/testing/ |
H A D | InternalSettings.idl | 66 [RaisesException] void setStorageBlockingPolicy(DOMString policy);
|
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/ |
H A D | dnsextd.conf | 22 // policy for your dynamic zone. For example, within a small closed private 39 // update-policy { grant * wildcard *.my-dynamic-subdomain.company.com.; };
|
/macosx-10.10/security_systemkeychain-55202/src/ |
H A D | cs_utils.cpp | 197 static SecIdentityRef findIdentity(SecKeychainRef keychain, const char *match, SecPolicyRef policy); 219 CFRef<SecPolicyRef> policy; local 221 &CSSMOID_APPLE_TP_CODE_SIGNING, &policy.aref())); 222 if (SecIdentityRef identity = findIdentity(keychain, match, policy)) 225 // now try again, using the generic policy 227 &CSSMOID_APPLE_X509_BASIC, &policy.aref())); 228 if (SecIdentityRef identity = findIdentity(keychain, match, policy)) { 246 static SecIdentityRef findIdentity(SecKeychainRef keychain, const char *match, SecPolicyRef policy) argument 249 MacOSError::check(SecIdentitySearchCreateWithPolicy(policy, NULL,
|