/macosx-10.10/xnu-2782.1.97/tools/tests/affinity/ |
H A D | sets.c | 188 thread_affinity_policy_data_t policy; local 199 policy.affinity_tag = lp->setnum; 202 (thread_policy_t) &policy,
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-79-smp-cert-policy.c | 2 * si-79-smp-cert-policy.c 266 SecPolicyRef policy=NULL; local 297 /* Case 1: production policy with production certs (should succeed) */ 298 isnt(policy = SecPolicyCreateAppleSMPEncryption(), NULL, "create policy"); 299 policies = CFArrayCreate(NULL, (const void **)&policy, 1, &kCFTypeArrayCallBacks); 300 CFRelease(policy); 301 policy = NULL; 308 //%%% policy currently doesn't care about expiration dates 320 /* Case 2: test policy wit [all...] |
H A D | si-21-sectrust-asr.c | 118 SecPolicyRef policy; local 138 isnt(policy = SecPolicyCreateBasicX509(), NULL, "create policy instance"); 140 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust for leaf"); 158 CFReleaseSafe(policy);
|
H A D | si-81-sectrust-server-auth.c | 377 SecPolicyRef policy=NULL; local 395 isnt(policy = SecPolicyCreateAppleSSLService(CFSTR("test.nosuchdomain")), NULL, "create policy"); 396 policies = CFArrayCreate(NULL, (const void **)&policy, 1, &kCFTypeArrayCallBacks); 397 CFRelease(policy); 398 policy = NULL; 424 SecPolicyRef policy=NULL; local 447 isnt(policy = SecPolicyCreateSSL(true, CFSTR("com.apple.ist.ds.appleconnect2.production.vpn.8F2B3ADCD72ED2EA08DDC26AD0255A983B1DEBEB")), NULL, "create policy"); 448 policies = CFArrayCreate(NULL, (const void **)&policy, [all...] |
/macosx-10.10/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | helper.c | 1722 /* Caller owns object returned in `policy' */ 1728 ipsec_policy_t *policy, size_t *len) 1737 *policy = NULL; 1781 debug("policy=\"%s\"", buf); 1782 if (NULL == (*policy = (ipsec_policy_t)ipsec_set_policy(buf, n))) 1785 "Could not create IPsec policy from \"%s\"", buf); 1789 *len = ((ipsec_policy_t)(*policy))->sadb_x_policy_len * 8; 1799 ipsec_policy_t policy, size_t len) 1807 (char *)policy, len, policySeq++); 1810 (char *)policy, le 1724 generateTunnelPolicy(mDNSTunnelPolicyWhich which, mDNSTunnelType type, int in, v4addr_t src, uint16_t src_port, v4addr_t dst, uint16_t dst_port, v6addr_t src6, v6addr_t dst6, ipsec_policy_t *policy, size_t *len) argument 1796 sendPolicy(int s, int setup, struct sockaddr *src, uint8_t src_bits, struct sockaddr *dst, uint8_t dst_bits, ipsec_policy_t policy, size_t len) argument 1865 ipsec_policy_t policy = NULL; local [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certcrl/ |
H A D | script.cpp | 84 { "policy", LT_Policy }, 113 /* map policy string to CertVerifyPolicy */ 116 CertVerifyPolicy policy; member in struct:__anon5212 879 /* parse policy string; returns nonzero if not found */ 882 CertVerifyPolicy *policy) 887 *policy = ps->policy; 896 printf("Valid policy strings are:\n "); 880 parsePolicyString( const char *str, CertVerifyPolicy *policy) argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/secTime/ |
H A D | secTime.cpp | 330 SecPolicyRef policy = NULL; local 335 NULL, // policy opts 342 ortn = SecPolicySearchCopyNext(policySearch, &policy); 350 ortn = SecTrustCreateWithCertificates(certs, policy, &secTrust); 366 CFRelease(policy);
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/gtk/ |
H A D | WebKitWebContext.cpp | 791 * @policy: a #WebKitTLSErrorsPolicy 793 * Set the TLS errors policy of @context as @policy 795 void webkit_web_context_set_tls_errors_policy(WebKitWebContext* context, WebKitTLSErrorsPolicy policy) argument 799 if (context->priv->tlsErrorsPolicy == policy) 802 context->priv->tlsErrorsPolicy = policy; 803 bool ignoreTLSErrors = policy == WEBKIT_TLS_ERRORS_POLICY_IGNORE; 812 * Get the TLS errors policy of @context
|
H A D | WebKitWebContext.h | 99 * Enum values used to denote the TLS errors policy. 215 WebKitTLSErrorsPolicy policy);
|
/macosx-10.10/xnu-2782.1.97/osfmk/kern/ |
H A D | ast.c | 83 #include <mach/policy.h>
|
H A D | task_policy.c | 63 * Threads and tasks have three policy fields: requested, effective, and pending. 64 * Requested represents the wishes of each interface that influences task policy. 65 * Effective represents the distillation of that policy into a set of behaviors. 68 * Each interface that has an input into the task policy state machine controls a field in requested. 72 * All kernel subsystems that behave differently based on task policy call into 73 * the get_effective_policy function, which returns the decision of the task policy state machine 77 * Here are the steps to change a policy on a task or thread: 79 * 2) Change requested field for the relevant policy 80 * 3) Run a task policy update, which recalculates effective based on requested, 84 * 5) Run task policy updat 1208 thread_precedence_policy_data_t policy; local 2065 set_thread_iotier_override(thread_t thread, int policy) argument 2738 proc_set_task_ruse_cpu(task_t task, uint32_t policy, uint8_t percentage, uint64_t interval, uint64_t deadline, int cpumon_entitled) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | StaticCode.cpp | 620 // impose policy: if the signature itself draws to Apple, then so must the timestamp signature 636 // Return the TP policy used for signature verification. 642 CFRef<SecPolicyRef> policy; local 643 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref())); 649 MacOSError::check(SecPolicySetValue(policy, &optData)); 650 return policy.yield(); 655 CFRef<SecPolicyRef> policy; local 656 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_OCSP, &policy.aref())); 662 MacOSError::check(SecPolicySetValue(policy, &optData)); 663 return policy [all...] |
H A D | signerutils.cpp | 345 CFRef<SecPolicyRef> policy = SecPolicyCreateWithOID(kSecPolicyAppleCodeSigning); local 347 MacOSError::check(SecTrustCreateWithCertificates(CFArrayRef(signingCert.get()), policy, &trust.aref()));
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | IdentityCursor.cpp | 42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument 44 mPolicy(policy), 145 // If there was no policy specified, we're done. 154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with 184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy 202 // Perform a full trust evaluation on the certificate with the specified policy.
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | StaticCode.cpp | 620 // impose policy: if the signature itself draws to Apple, then so must the timestamp signature 636 // Return the TP policy used for signature verification. 642 CFRef<SecPolicyRef> policy; local 643 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref())); 649 MacOSError::check(SecPolicySetValue(policy, &optData)); 650 return policy.yield(); 655 CFRef<SecPolicyRef> policy; local 656 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_OCSP, &policy.aref())); 662 MacOSError::check(SecPolicySetValue(policy, &optData)); 663 return policy [all...] |
H A D | signerutils.cpp | 345 CFRef<SecPolicyRef> policy = SecPolicyCreateWithOID(kSecPolicyAppleCodeSigning); local 347 MacOSError::check(SecTrustCreateWithCertificates(CFArrayRef(signingCert.get()), policy, &trust.aref()));
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | IdentityCursor.cpp | 42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument 44 mPolicy(policy), 145 // If there was no policy specified, we're done. 154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with 184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy 202 // Perform a full trust evaluation on the certificate with the specified policy.
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | IdentityCursor.cpp | 42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument 44 mPolicy(policy), 145 // If there was no policy specified, we're done. 154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with 184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy 202 // Perform a full trust evaluation on the certificate with the specified policy.
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecAccessControl.c | 48 // TODO: Use real name of this policy from SCred/AppleCredentialManager 150 SecAccessConstraintRef SecAccessConstraintCreatePolicy(CFTypeRef policy, CFErrorRef *error) { argument 151 return CFDictionaryCreateMutableForCFTypesWith(kCFAllocatorDefault, kAKSKeyAclConstraintPolicy, policy, NULL);
|
/macosx-10.10/WebCore-7600.1.25/workers/ |
H A D | WorkerGlobalScope.cpp | 93 void WorkerGlobalScope::applyContentSecurityPolicyFromString(const String& policy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType) argument 96 contentSecurityPolicy()->didReceiveHeader(policy, contentSecurityPolicyType);
|
/macosx-10.10/WebKit-7600.1.25/win/ |
H A D | WebMutableURLRequest.cpp | 283 /* [in] */ WebURLRequestCachePolicy policy) 285 m_request.setCachePolicy(core(policy)); 282 setCachePolicy( WebURLRequestCachePolicy policy) argument
|
/macosx-10.10/WebKit2-7600.1.25/Shared/linux/SeccompFilters/ |
H A D | SeccompBroker.cpp | 249 void SeccompBroker::launchProcess(SeccompFilters* filters, const SyscallPolicy& policy) argument 278 seccompBroker.setSyscallPolicy(policy);
|
/macosx-10.10/ppp-786.1.1/Controller/ |
H A D | ipsec_manager.c | 663 /* policy changed from "ok to save" to "do not save" 1644 CFDictionaryRef policy; local 1647 policy = CFArrayGetValueAtIndex(policies, i); 1648 if (!isDictionary(policy)) { 1654 policymode = CFDictionaryGetValue(policy, kRASPropIPSecPolicyMode); 1659 /* if policy direction is not specified, in/out is assumed */ 1660 policydirection = CFDictionaryGetValue(policy, kRASPropIPSecPolicyDirection); 1665 policylevel = CFDictionaryGetValue(policy, kRASPropIPSecPolicyLevel); 1675 if (!GetStrNetFromDict(policy, kRASPropIPSecPolicyRemoteAddress, str, sizeof(str))) { 1686 GetIntFromDict(policy, kRASPropIPSecPolicyRemotePrefi 1887 CFMutableDictionaryRef policies, policy; local 3239 CFDictionaryRef policy; local [all...] |
/macosx-10.10/WebCore-7600.1.25/page/ |
H A D | DragController.cpp | 185 DataTransferAccessPolicy policy = (m_page.mainFrame().settings().usesDashboardBackwardCompatibilityMode() && (!m_documentUnderMouse || m_documentUnderMouse->securityOrigin()->isLocal())) local 188 DataTransferAccessPolicy policy = DataTransferAccessPolicy::TypesReadable; 190 RefPtr<DataTransfer> dataTransfer = DataTransfer::createForDragAndDrop(policy, dragData); 596 DataTransferAccessPolicy policy = (mainFrame->settings().usesDashboardBackwardCompatibilityMode() && m_documentUnderMouse->securityOrigin()->isLocal()) ? 599 DataTransferAccessPolicy policy = DataTransferAccessPolicy::TypesReadable; 601 RefPtr<DataTransfer> dataTransfer = DataTransfer::createForDragAndDrop(policy, dragData);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | ssl-39-echo.c | 335 SecPolicyRef policy = NULL; 340 policy = SecPolicyCreateSSL(false, NULL); 341 if (!policy) 354 if (SecTrustCreateWithCertificates(certs, policy, &trust)) 357 CFRelease(policy); 373 if (policy) 374 CFRelease(policy);
|