Searched refs:policy (Results 201 - 225 of 479) sorted by relevance

1234567891011>>

/macosx-10.10/dtrace-147/libdtrace/
H A Ddt_work.c55 dtrace_optval_t policy = dtp->dt_options[DTRACEOPT_BUFPOLICY]; local
69 * If the buffering policy is set to anything other than
73 if (policy != DTRACEOPT_BUFPOLICY_SWITCH &&
258 dtrace_optval_t policy = dtp->dt_options[DTRACEOPT_BUFPOLICY]; local
285 policy != DTRACEOPT_BUFPOLICY_SWITCH) {
/macosx-10.10/xnu-2782.1.97/osfmk/kern/
H A Dsync_lock.c66 __unused int policy)
62 lock_set_create( __unused task_t task, __unused lock_set_t *new_lock_set, __unused int n_ulocks, __unused int policy) argument
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dcommon_glue.c383 kadm5_policy_ent_t policy, long mask)
396 kadm5_modify_policy(void *server_handle, kadm5_policy_ent_t policy, argument
403 kadm5_get_policy(void *server_handle, char *policy, kadm5_policy_ent_t ent) argument
422 if (ent->policy)
423 free(ent->policy);
382 kadm5_create_policy(void *server_handle, kadm5_policy_ent_t policy, long mask) argument
H A Dadmin.h154 char * policy; member in struct:_kadm5_principal_ent_t
168 char *policy; member in struct:_kadm5_policy_ent_t
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/krbtool/
H A DidentPicker.cpp224 SecPolicyRef policy = NULL; local
273 ortn = SecPolicySearchCopyNext(policySearch, &policy);
279 /* build a SecTrustRef for specified policy and certs */
281 policy, &secTrust);
375 if(policy) {
376 CFRelease(policy);
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/efl/tests/
H A Dtest_ewk2_cookie_manager.cpp66 static void getAcceptPolicyCallback(Ewk_Cookie_Accept_Policy policy, void* event_info) argument
69 *ret = policy;
97 Ewk_Cookie_Accept_Policy policy = EWK_COOKIE_ACCEPT_POLICY_ALWAYS; local
98 ewk_cookie_manager_accept_policy_async_get(manager, getAcceptPolicyCallback, &policy);
100 return policy;
137 // Default policy is EWK_COOKIE_ACCEPT_POLICY_NO_THIRD_PARTY.
146 // Change policy to EWK_COOKIE_ACCEPT_POLICY_ALWAYS
159 // Change policy to EWK_COOKIE_ACCEPT_POLICY_NEVER
/macosx-10.10/ppp-786.1.1/Helpers/vpnd/
H A Dipsec_utils.c97 static int configure_sainfo(int level, FILE *file, CFDictionaryRef ipsec_dict, CFDictionaryRef policy, char **errstr);
988 policy: dictionary that uses this proposal, from the Policies array of ipsec_dict.
995 configure_sainfo(int level, FILE *file, CFDictionaryRef ipsec_dict, CFDictionaryRef policy, char **errstr) argument
1008 if (policy) {
1009 algos = CFDictionaryGetValue(policy, kRASPropIPSecPolicyEncryptionAlgorithm);
1059 if (policy) {
1060 algos = CFDictionaryGetValue(policy, kRASPropIPSecPolicyHashAlgorithm);
1106 if (policy) {
1107 algos = CFDictionaryGetValue(policy, kRASPropIPSecPolicyCompressionAlgorithm);
1146 if (policy)
1324 CFDictionaryRef policy; local
1631 CFDictionaryRef policy; local
1916 CFDictionaryRef policy; local
2148 CFDictionaryRef policy; local
[all...]
/macosx-10.10/OpenSSL098-52/src/apps/
H A DCA.com148 $ CA -policy policy_anything -infiles newreq.pem
157 $ CA -policy policy_anything -out newcert.pem -infiles newreq.pem
171 $ CA -policy policy_anything -out newcert.pem -infiles tmp.pem
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/
H A Dcrypto-embedded.c109 SecPolicyRef policy = NULL; local
113 policy = SecPolicyCreateBasicX509();
114 if (!policy)
118 if (SecTrustCreateWithCertificates(wrappedCert, policy, &trust))
131 if (policy) CFRelease(policy);
H A Dcert.c222 SecPolicyRef policy = NULL; local
235 status = SecPolicySearchCopyNext(searchRef, &policy);
240 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust);
265 if (policy)
266 CFRelease(policy);
679 SecPolicyRef policy = NULL; local
716 rv = SecPolicySearchCopyNext(search, &policy);
722 return policy;
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/
H A Dcrypto-embedded.c109 SecPolicyRef policy = NULL; local
113 policy = SecPolicyCreateBasicX509();
114 if (!policy)
118 if (SecTrustCreateWithCertificates(wrappedCert, policy, &trust))
131 if (policy) CFRelease(policy);
H A Dcert.c222 SecPolicyRef policy = NULL; local
235 status = SecPolicySearchCopyNext(searchRef, &policy);
240 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust);
265 if (policy)
266 CFRelease(policy);
679 SecPolicyRef policy = NULL; local
716 rv = SecPolicySearchCopyNext(search, &policy);
722 return policy;
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/
H A Dcrypto-embedded.c109 SecPolicyRef policy = NULL; local
113 policy = SecPolicyCreateBasicX509();
114 if (!policy)
118 if (SecTrustCreateWithCertificates(wrappedCert, policy, &trust))
131 if (policy) CFRelease(policy);
H A Dcert.c222 SecPolicyRef policy = NULL; local
235 status = SecPolicySearchCopyNext(searchRef, &policy);
240 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust);
265 if (policy)
266 CFRelease(policy);
679 SecPolicyRef policy = NULL; local
716 rv = SecPolicySearchCopyNext(search, &policy);
722 return policy;
/macosx-10.10/xnu-2782.1.97/bsd/netinet6/
H A Dipsec.c175 &ip4_def_policy.policy, 0, &sysctl_def_policy, "I", "");
197 /* for performance, we bypass ipsec until a security policy is set */
224 def_policy, CTLFLAG_RW | CTLFLAG_LOCKED, &ip6_def_policy.policy, 0, "");
275 int old_policy = ip4_def_policy.policy;
280 if (ip4_def_policy.policy != IPSEC_POLICY_NONE &&
281 ip4_def_policy.policy != IPSEC_POLICY_DISCARD) {
282 ip4_def_policy.policy = old_policy;
286 /* Turn off the bypass if the default security policy changes */
287 if (ipsec_bypass != 0 && ip4_def_policy.policy != IPSEC_POLICY_NONE)
312 struct secpolicy *currsp = NULL; /* policy o
[all...]
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/
H A Dslapd-idassert.conf38 authz-policy both
/macosx-10.10/OpenSSL098-52/src/test/
H A DCAss.cnf58 policy = policy_anything
H A Dtest.cnf34 policy = policy_match
36 # For the CA policy
45 # For the 'anything' policy
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/
H A Dcert.c247 SecPolicyRef policy = NULL; local
261 status = SecPolicySearchCopyNext(searchRef, &policy);
266 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust);
307 if (policy)
308 CFRelease(policy);
784 SecPolicyRef policy = NULL; local
821 rv = SecPolicySearchCopyNext(search, &policy);
827 return policy;
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/
H A Dcert.c247 SecPolicyRef policy = NULL; local
261 status = SecPolicySearchCopyNext(searchRef, &policy);
266 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust);
307 if (policy)
308 CFRelease(policy);
784 SecPolicyRef policy = NULL; local
821 rv = SecPolicySearchCopyNext(search, &policy);
827 return policy;
/macosx-10.10/WebCore-7600.1.25/dom/
H A DContainerNodeAlgorithms.cpp150 void disconnectSubframes(ContainerNode& root, SubframeDisconnectPolicy policy) argument
159 if (policy == RootAndDescendants) {
/macosx-10.10/WebCore-7600.1.25/page/
H A DSecurityPolicy.cpp96 void SecurityPolicy::setLocalLoadPolicy(LocalLoadPolicy policy) argument
98 localLoadPolicy = policy;
/macosx-10.10/WebCore-7600.1.25/testing/
H A DInternalSettings.idl66 [RaisesException] void setStorageBlockingPolicy(DOMString policy);
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/
H A Ddnsextd.conf22 // policy for your dynamic zone. For example, within a small closed private
39 // update-policy { grant * wildcard *.my-dynamic-subdomain.company.com.; };
/macosx-10.10/security_systemkeychain-55202/src/
H A Dcs_utils.cpp197 static SecIdentityRef findIdentity(SecKeychainRef keychain, const char *match, SecPolicyRef policy);
219 CFRef<SecPolicyRef> policy; local
221 &CSSMOID_APPLE_TP_CODE_SIGNING, &policy.aref()));
222 if (SecIdentityRef identity = findIdentity(keychain, match, policy))
225 // now try again, using the generic policy
227 &CSSMOID_APPLE_X509_BASIC, &policy.aref()));
228 if (SecIdentityRef identity = findIdentity(keychain, match, policy)) {
246 static SecIdentityRef findIdentity(SecKeychainRef keychain, const char *match, SecPolicyRef policy) argument
249 MacOSError::check(SecIdentitySearchCreateWithPolicy(policy, NULL,

Completed in 270 milliseconds

1234567891011>>