Searched refs:policy (Results 26 - 50 of 479) sorted by relevance

1234567891011>>

/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecPolicy.cpp65 /* FIXME: this policy name should be deprecated and replaced with "kSecPolicyAppleIDValidationRecordSigning" */
178 SecPointer<Policy> policy; local
179 while ( cursor->next(policy) ) /* copies the next policy */
181 CFArrayAppendValue(currPolicies, policy->handle()); /* 'SecPolicyRef' appended */
182 CFRelease(policy->handle()); /* refcount bumped up when appended to array */
192 SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy) argument
194 Required(policy);
204 ortn = SecPolicySearchCopyNext(srchRef, policy);
213 // return a SecPolicyRef object for the X.509 Basic policy
214 SecPolicyRef policy = nil; local
231 SecPolicyRef policy = nil; local
270 SecPolicyRef policy = NULL; local
288 SecPolicyRef policy = NULL; local
350 SecPolicyRef policy = SecPolicyCreateWithOID(policyIdentifier); local
362 SecPolicyRef policy = SecPolicyCreateWithSecAsn1Oid(oidPtr); local
394 SecPolicyRef policy = SecPolicyCreateSSL(true, hostname); local
[all...]
H A DPolicyCursor.cpp93 bool PolicyCursor::next(SecPointer<Policy> &policy) argument
103 policy = new Policy(theOneTP(), *theOidList[mSearchPos]);
111 // Return a new policy instance for an OID, outside of cursor iteration
113 void PolicyCursor::policy(const CSSM_OID* oid, SecPointer<Policy> &policy) argument
116 policy = new Policy(theOneTP(), *policyOid);
H A DPolicyCursor.h53 bool next(SecPointer<Policy> &policy);
55 static void policy(const CSSM_OID* oid, SecPointer<Policy> &policy);
65 #if 1 // quick version -- using built-in policy list
H A DSecPolicySearch.cpp72 SecPointer<Policy> policy; local
73 if (!PolicyCursor::required(searchRef)->next(policy))
75 *policyRef = policy->handle();
H A DTrustStore.h54 // set/get user trust for a certificate and policy
55 SecTrustUserSetting find(Certificate *cert, Policy *policy,
57 void assign(Certificate *cert, Policy *policy, SecTrustUserSetting assignment);
64 Item findItem(Certificate *cert, Policy *policy,
H A DSecIdentitySearchPriv.h52 @param policy An optional policy reference. If provided, returned identities must be valid for this policy. Pass NULL to ignore policy when searching.
62 In 10.7 and later, you should use SecItemCopyMatching (see SecItem.h) to find identities that match a given policy.
64 To specify the policy which the identity must match, add this key/value pair to the query dictionary:
79 OSStatus SecIdentitySearchCreateWithPolicy(SecPolicyRef policy, CFStringRef idString, uint32 keyUsage, CFTypeRef keychainOrArray, Boolean returnOnlyValidIdentities, SecIdentitySearchRef* searchRef)
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecPolicy.cpp65 /* FIXME: this policy name should be deprecated and replaced with "kSecPolicyAppleIDValidationRecordSigning" */
178 SecPointer<Policy> policy; local
179 while ( cursor->next(policy) ) /* copies the next policy */
181 CFArrayAppendValue(currPolicies, policy->handle()); /* 'SecPolicyRef' appended */
182 CFRelease(policy->handle()); /* refcount bumped up when appended to array */
192 SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy) argument
194 Required(policy);
204 ortn = SecPolicySearchCopyNext(srchRef, policy);
213 // return a SecPolicyRef object for the X.509 Basic policy
214 SecPolicyRef policy = nil; local
231 SecPolicyRef policy = nil; local
270 SecPolicyRef policy = NULL; local
288 SecPolicyRef policy = NULL; local
350 SecPolicyRef policy = SecPolicyCreateWithOID(policyIdentifier); local
362 SecPolicyRef policy = SecPolicyCreateWithSecAsn1Oid(oidPtr); local
394 SecPolicyRef policy = SecPolicyCreateSSL(true, hostname); local
[all...]
H A DPolicyCursor.cpp93 bool PolicyCursor::next(SecPointer<Policy> &policy) argument
103 policy = new Policy(theOneTP(), *theOidList[mSearchPos]);
111 // Return a new policy instance for an OID, outside of cursor iteration
113 void PolicyCursor::policy(const CSSM_OID* oid, SecPointer<Policy> &policy) argument
116 policy = new Policy(theOneTP(), *policyOid);
H A DPolicyCursor.h53 bool next(SecPointer<Policy> &policy);
55 static void policy(const CSSM_OID* oid, SecPointer<Policy> &policy);
65 #if 1 // quick version -- using built-in policy list
H A DSecPolicySearch.cpp72 SecPointer<Policy> policy; local
73 if (!PolicyCursor::required(searchRef)->next(policy))
75 *policyRef = policy->handle();
H A DTrustStore.h54 // set/get user trust for a certificate and policy
55 SecTrustUserSetting find(Certificate *cert, Policy *policy,
57 void assign(Certificate *cert, Policy *policy, SecTrustUserSetting assignment);
64 Item findItem(Certificate *cert, Policy *policy,
H A DSecIdentitySearchPriv.h52 @param policy An optional policy reference. If provided, returned identities must be valid for this policy. Pass NULL to ignore policy when searching.
62 In 10.7 and later, you should use SecItemCopyMatching (see SecItem.h) to find identities that match a given policy.
64 To specify the policy which the identity must match, add this key/value pair to the query dictionary:
79 OSStatus SecIdentitySearchCreateWithPolicy(SecPolicyRef policy, CFStringRef idString, uint32 keyUsage, CFTypeRef keychainOrArray, Boolean returnOnlyValidIdentities, SecIdentitySearchRef* searchRef)
/macosx-10.10/OpenSSH-189/openssh/
H A Dsandbox-systrace.c109 struct systrace_policy policy; local
142 /* Allocate and assign policy */
143 bzero(&policy, sizeof(policy));
144 policy.strp_op = SYSTR_POLICY_NEW;
145 policy.strp_maxents = SYS_MAXSYSCALL;
146 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1)
150 policy.strp_op = SYSTR_POLICY_ASSIGN;
151 policy.strp_pid = box->child_pid;
152 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy)
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DPolicyCursor.cpp93 bool PolicyCursor::next(SecPointer<Policy> &policy) argument
103 policy = new Policy(theOneTP(), *theOidList[mSearchPos]);
111 // Return a new policy instance for an OID, outside of cursor iteration
113 void PolicyCursor::policy(const CSSM_OID* oid, SecPointer<Policy> &policy) argument
116 policy = new Policy(theOneTP(), *policyOid);
H A DPolicyCursor.h53 bool next(SecPointer<Policy> &policy);
55 static void policy(const CSSM_OID* oid, SecPointer<Policy> &policy);
65 #if 1 // quick version -- using built-in policy list
H A DSecPolicySearch.cpp72 SecPointer<Policy> policy; local
73 if (!PolicyCursor::required(searchRef)->next(policy))
75 *policyRef = policy->handle();
H A DTrustStore.h54 // set/get user trust for a certificate and policy
55 SecTrustUserSetting find(Certificate *cert, Policy *policy,
57 void assign(Certificate *cert, Policy *policy, SecTrustUserSetting assignment);
64 Item findItem(Certificate *cert, Policy *policy,
H A DSecIdentitySearchPriv.h52 @param policy An optional policy reference. If provided, returned identities must be valid for this policy. Pass NULL to ignore policy when searching.
62 In 10.7 and later, you should use SecItemCopyMatching (see SecItem.h) to find identities that match a given policy.
64 To specify the policy which the identity must match, add this key/value pair to the query dictionary:
79 OSStatus SecIdentitySearchCreateWithPolicy(SecPolicyRef policy, CFStringRef idString, uint32 keyUsage, CFTypeRef keychainOrArray, Boolean returnOnlyValidIdentities, SecIdentitySearchRef* searchRef)
/macosx-10.10/WebKit2-7600.1.25/WebProcess/Cookies/cf/
H A DWebCookieManagerCFNet.cpp43 void WebCookieManager::platformSetHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument
51 CFHTTPCookieStorageSetCookieAcceptPolicy(defaultCookieStorage, policy);
56 CFHTTPCookieStorageSetCookieAcceptPolicy(cookieStorage.get(), policy);
/macosx-10.10/BerkeleyDB-21/db/repmgr/
H A Drepmgr_stub.c73 __repmgr_get_ack_policy(dbenv, policy)
75 int *policy;
77 COMPQUIET(policy, NULL);
87 __repmgr_set_ack_policy(dbenv, policy)
89 int policy;
91 COMPQUIET(policy, 0);
/macosx-10.10/WebKit2-7600.1.25/WebProcess/Cookies/
H A DWebCookieManager.messages.in32 void SetHTTPCookieAcceptPolicy(uint32_t policy)
/macosx-10.10/cups-408/cups/scheduler/
H A Dpolicy.h2 * "$Id: policy.h 11093 2013-07-03 20:48:42Z msweet $"
46 extern cupsd_policy_t *cupsdAddPolicy(const char *policy);
53 extern cupsd_policy_t *cupsdFindPolicy(const char *policy);
62 * End of "$Id: policy.h 11093 2013-07-03 20:48:42Z msweet $".
H A Dpolicy.c2 * "$Id: policy.c 11742 2014-03-26 21:14:15Z msweet $"
35 * 'cupsdAddPolicy()' - Add a policy to the system.
39 cupsdAddPolicy(const char *policy) /* I - Name of policy */ argument
41 cupsd_policy_t *temp; /* Pointer to policy */
44 if (!policy)
58 cupsdSetString(&temp->name, policy);
67 * 'cupsdAddPolicyOp()' - Add an operation to a policy.
70 cupsd_location_t * /* O - New policy operation */
75 cupsd_location_t *temp; /* New policy operatio
187 cupsdFindPolicy(const char *policy) argument
262 cupsdGetPrivateAttrs( cupsd_policy_t *policy, cupsd_client_t *con, cupsd_printer_t *printer, const char *owner) argument
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTool/
H A Dtrusted_cert_utils.c272 /* convert a policy string to a SecPolicyRef */
393 /* policy string --> CSSM_OID */
395 const char *policy)
397 if(policy == NULL) {
400 if(!strcmp(policy, "ssl")) {
403 else if(!strcmp(policy, "smime")) {
406 else if(!strcmp(policy, "codeSign")) {
409 else if(!strcmp(policy, "IPSec")) {
412 else if(!strcmp(policy, "iChat")) {
415 else if(!strcmp(policy, "basi
394 policyStringToOid( const char *policy) argument
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/cgVerifyParsed/
H A DtpVerifyParsed.h17 const CSSM_OID *policy, // optional

Completed in 291 milliseconds

1234567891011>>