Searched refs:policy (Results 301 - 325 of 479) sorted by relevance

<<11121314151617181920

/macosx-10.10/xnu-2782.1.97/tools/tests/affinity/
H A Dsets.c188 thread_affinity_policy_data_t policy; local
199 policy.affinity_tag = lp->setnum;
202 (thread_policy_t) &policy,
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-79-smp-cert-policy.c2 * si-79-smp-cert-policy.c
266 SecPolicyRef policy=NULL; local
297 /* Case 1: production policy with production certs (should succeed) */
298 isnt(policy = SecPolicyCreateAppleSMPEncryption(), NULL, "create policy");
299 policies = CFArrayCreate(NULL, (const void **)&policy, 1, &kCFTypeArrayCallBacks);
300 CFRelease(policy);
301 policy = NULL;
308 //%%% policy currently doesn't care about expiration dates
320 /* Case 2: test policy wit
[all...]
H A Dsi-21-sectrust-asr.c118 SecPolicyRef policy; local
138 isnt(policy = SecPolicyCreateBasicX509(), NULL, "create policy instance");
140 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust for leaf");
158 CFReleaseSafe(policy);
H A Dsi-81-sectrust-server-auth.c377 SecPolicyRef policy=NULL; local
395 isnt(policy = SecPolicyCreateAppleSSLService(CFSTR("test.nosuchdomain")), NULL, "create policy");
396 policies = CFArrayCreate(NULL, (const void **)&policy, 1, &kCFTypeArrayCallBacks);
397 CFRelease(policy);
398 policy = NULL;
424 SecPolicyRef policy=NULL; local
447 isnt(policy = SecPolicyCreateSSL(true, CFSTR("com.apple.ist.ds.appleconnect2.production.vpn.8F2B3ADCD72ED2EA08DDC26AD0255A983B1DEBEB")), NULL, "create policy");
448 policies = CFArrayCreate(NULL, (const void **)&policy,
[all...]
/macosx-10.10/mDNSResponder-561.1.1/mDNSMacOSX/
H A Dhelper.c1722 /* Caller owns object returned in `policy' */
1728 ipsec_policy_t *policy, size_t *len)
1737 *policy = NULL;
1781 debug("policy=\"%s\"", buf);
1782 if (NULL == (*policy = (ipsec_policy_t)ipsec_set_policy(buf, n)))
1785 "Could not create IPsec policy from \"%s\"", buf);
1789 *len = ((ipsec_policy_t)(*policy))->sadb_x_policy_len * 8;
1799 ipsec_policy_t policy, size_t len)
1807 (char *)policy, len, policySeq++);
1810 (char *)policy, le
1724 generateTunnelPolicy(mDNSTunnelPolicyWhich which, mDNSTunnelType type, int in, v4addr_t src, uint16_t src_port, v4addr_t dst, uint16_t dst_port, v6addr_t src6, v6addr_t dst6, ipsec_policy_t *policy, size_t *len) argument
1796 sendPolicy(int s, int setup, struct sockaddr *src, uint8_t src_bits, struct sockaddr *dst, uint8_t dst_bits, ipsec_policy_t policy, size_t len) argument
1865 ipsec_policy_t policy = NULL; local
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certcrl/
H A Dscript.cpp84 { "policy", LT_Policy },
113 /* map policy string to CertVerifyPolicy */
116 CertVerifyPolicy policy; member in struct:__anon5212
879 /* parse policy string; returns nonzero if not found */
882 CertVerifyPolicy *policy)
887 *policy = ps->policy;
896 printf("Valid policy strings are:\n ");
880 parsePolicyString( const char *str, CertVerifyPolicy *policy) argument
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/secTime/
H A DsecTime.cpp330 SecPolicyRef policy = NULL; local
335 NULL, // policy opts
342 ortn = SecPolicySearchCopyNext(policySearch, &policy);
350 ortn = SecTrustCreateWithCertificates(certs, policy, &secTrust);
366 CFRelease(policy);
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/gtk/
H A DWebKitWebContext.cpp791 * @policy: a #WebKitTLSErrorsPolicy
793 * Set the TLS errors policy of @context as @policy
795 void webkit_web_context_set_tls_errors_policy(WebKitWebContext* context, WebKitTLSErrorsPolicy policy) argument
799 if (context->priv->tlsErrorsPolicy == policy)
802 context->priv->tlsErrorsPolicy = policy;
803 bool ignoreTLSErrors = policy == WEBKIT_TLS_ERRORS_POLICY_IGNORE;
812 * Get the TLS errors policy of @context
H A DWebKitWebContext.h99 * Enum values used to denote the TLS errors policy.
215 WebKitTLSErrorsPolicy policy);
/macosx-10.10/xnu-2782.1.97/osfmk/kern/
H A Dast.c83 #include <mach/policy.h>
H A Dtask_policy.c63 * Threads and tasks have three policy fields: requested, effective, and pending.
64 * Requested represents the wishes of each interface that influences task policy.
65 * Effective represents the distillation of that policy into a set of behaviors.
68 * Each interface that has an input into the task policy state machine controls a field in requested.
72 * All kernel subsystems that behave differently based on task policy call into
73 * the get_effective_policy function, which returns the decision of the task policy state machine
77 * Here are the steps to change a policy on a task or thread:
79 * 2) Change requested field for the relevant policy
80 * 3) Run a task policy update, which recalculates effective based on requested,
84 * 5) Run task policy updat
1208 thread_precedence_policy_data_t policy; local
2065 set_thread_iotier_override(thread_t thread, int policy) argument
2738 proc_set_task_ruse_cpu(task_t task, uint32_t policy, uint8_t percentage, uint64_t interval, uint64_t deadline, int cpumon_entitled) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/
H A DStaticCode.cpp620 // impose policy: if the signature itself draws to Apple, then so must the timestamp signature
636 // Return the TP policy used for signature verification.
642 CFRef<SecPolicyRef> policy; local
643 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref()));
649 MacOSError::check(SecPolicySetValue(policy, &optData));
650 return policy.yield();
655 CFRef<SecPolicyRef> policy; local
656 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_OCSP, &policy.aref()));
662 MacOSError::check(SecPolicySetValue(policy, &optData));
663 return policy
[all...]
H A Dsignerutils.cpp345 CFRef<SecPolicyRef> policy = SecPolicyCreateWithOID(kSecPolicyAppleCodeSigning); local
347 MacOSError::check(SecTrustCreateWithCertificates(CFArrayRef(signingCert.get()), policy, &trust.aref()));
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DIdentityCursor.cpp42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument
44 mPolicy(policy),
145 // If there was no policy specified, we're done.
154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with
184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy
202 // Perform a full trust evaluation on the certificate with the specified policy.
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/
H A DStaticCode.cpp620 // impose policy: if the signature itself draws to Apple, then so must the timestamp signature
636 // Return the TP policy used for signature verification.
642 CFRef<SecPolicyRef> policy; local
643 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref()));
649 MacOSError::check(SecPolicySetValue(policy, &optData));
650 return policy.yield();
655 CFRef<SecPolicyRef> policy; local
656 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_OCSP, &policy.aref()));
662 MacOSError::check(SecPolicySetValue(policy, &optData));
663 return policy
[all...]
H A Dsignerutils.cpp345 CFRef<SecPolicyRef> policy = SecPolicyCreateWithOID(kSecPolicyAppleCodeSigning); local
347 MacOSError::check(SecTrustCreateWithCertificates(CFArrayRef(signingCert.get()), policy, &trust.aref()));
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DIdentityCursor.cpp42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument
44 mPolicy(policy),
145 // If there was no policy specified, we're done.
154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with
184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy
202 // Perform a full trust evaluation on the certificate with the specified policy.
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DIdentityCursor.cpp42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument
44 mPolicy(policy),
145 // If there was no policy specified, we're done.
154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with
184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy
202 // Perform a full trust evaluation on the certificate with the specified policy.
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecAccessControl.c48 // TODO: Use real name of this policy from SCred/AppleCredentialManager
150 SecAccessConstraintRef SecAccessConstraintCreatePolicy(CFTypeRef policy, CFErrorRef *error) { argument
151 return CFDictionaryCreateMutableForCFTypesWith(kCFAllocatorDefault, kAKSKeyAclConstraintPolicy, policy, NULL);
/macosx-10.10/WebCore-7600.1.25/workers/
H A DWorkerGlobalScope.cpp93 void WorkerGlobalScope::applyContentSecurityPolicyFromString(const String& policy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType) argument
96 contentSecurityPolicy()->didReceiveHeader(policy, contentSecurityPolicyType);
/macosx-10.10/WebKit-7600.1.25/win/
H A DWebMutableURLRequest.cpp283 /* [in] */ WebURLRequestCachePolicy policy)
285 m_request.setCachePolicy(core(policy));
282 setCachePolicy( WebURLRequestCachePolicy policy) argument
/macosx-10.10/WebKit2-7600.1.25/Shared/linux/SeccompFilters/
H A DSeccompBroker.cpp249 void SeccompBroker::launchProcess(SeccompFilters* filters, const SyscallPolicy& policy) argument
278 seccompBroker.setSyscallPolicy(policy);
/macosx-10.10/ppp-786.1.1/Controller/
H A Dipsec_manager.c663 /* policy changed from "ok to save" to "do not save"
1644 CFDictionaryRef policy; local
1647 policy = CFArrayGetValueAtIndex(policies, i);
1648 if (!isDictionary(policy)) {
1654 policymode = CFDictionaryGetValue(policy, kRASPropIPSecPolicyMode);
1659 /* if policy direction is not specified, in/out is assumed */
1660 policydirection = CFDictionaryGetValue(policy, kRASPropIPSecPolicyDirection);
1665 policylevel = CFDictionaryGetValue(policy, kRASPropIPSecPolicyLevel);
1675 if (!GetStrNetFromDict(policy, kRASPropIPSecPolicyRemoteAddress, str, sizeof(str))) {
1686 GetIntFromDict(policy, kRASPropIPSecPolicyRemotePrefi
1887 CFMutableDictionaryRef policies, policy; local
3239 CFDictionaryRef policy; local
[all...]
/macosx-10.10/WebCore-7600.1.25/page/
H A DDragController.cpp185 DataTransferAccessPolicy policy = (m_page.mainFrame().settings().usesDashboardBackwardCompatibilityMode() && (!m_documentUnderMouse || m_documentUnderMouse->securityOrigin()->isLocal())) local
188 DataTransferAccessPolicy policy = DataTransferAccessPolicy::TypesReadable;
190 RefPtr<DataTransfer> dataTransfer = DataTransfer::createForDragAndDrop(policy, dragData);
596 DataTransferAccessPolicy policy = (mainFrame->settings().usesDashboardBackwardCompatibilityMode() && m_documentUnderMouse->securityOrigin()->isLocal()) ?
599 DataTransferAccessPolicy policy = DataTransferAccessPolicy::TypesReadable;
601 RefPtr<DataTransfer> dataTransfer = DataTransfer::createForDragAndDrop(policy, dragData);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/
H A Dssl-39-echo.c335 SecPolicyRef policy = NULL;
340 policy = SecPolicyCreateSSL(false, NULL);
341 if (!policy)
354 if (SecTrustCreateWithCertificates(certs, policy, &trust))
357 CFRelease(policy);
373 if (policy)
374 CFRelease(policy);

Completed in 209 milliseconds

<<11121314151617181920