Searched refs:policy (Results 326 - 350 of 479) sorted by relevance

<<11121314151617181920

/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-27-sectrust-exceptions.c310 SecPolicyRef policy = SecPolicyCreateSSL(false, CFSTR("store.apple.com")); local
313 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust");
329 CFReleaseSafe(policy);
330 policy = SecPolicyCreateSSL(false, CFSTR("badstore.apple.com"));
331 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust with hostname mismatch");
343 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust");
375 CFReleaseSafe(policy);
H A Dsi-70-sectrust-unified.c239 SecPolicyRef policy = NULL; local
249 policy = SecPolicyCreateSSL(server, CFSTR("xedge.apple.com")); // deliberate hostname mismatch
250 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust),
276 isnt(revocation, NULL, "create revocation policy");
310 /* Test creation of a policy via SecPolicyCreateWithProperties */
311 CFReleaseNull(policy);
319 policy = SecPolicyCreateWithProperties(kSecPolicyAppleSSL, properties);
320 isnt(policy, NULL, "SecPolicyCreateWithProperties");
324 /* Test introspection of a policy's properties via SecPolicyCopyProperties */
327 isnt(properties = SecPolicyCopyProperties(policy), NUL
[all...]
H A Dsi-20-sectrust.c639 SecPolicyRef policy = SecPolicyCreateSSL(false, NULL); local
644 is_status(SecTrustCreateWithCertificates(kCFBooleanTrue, policy, &trust),
647 errSecParam, "create trust with boolean instead of policy");
650 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust");
720 ok_status(SecTrustCreateWithCertificates(cert0, policy, &trust),
744 CFReleaseSafe(policy);
747 policy = SecPolicyCreateSSL(server, CFSTR("xedge2.apple.com"));
748 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust),
771 CFReleaseSafe(policy);
773 policy
[all...]
H A Dsi-24-sectrust-shoebox.c823 SecPolicyRef policy; local
836 SecPolicyRef policy, SecTrustRef *trustref, CFArrayRef additional_certificates,
841 isnt(policy = SecPolicyCreatePassbookCardSigner(CFSTR("pass.com.apple.cardman"), CFSTR("A1B2C3D4E5")),
842 NULL, "create policy");
843 ok_status(SecCMSVerifySignedData(goodSig, goodManifest, policy, NULL, NULL, NULL, NULL), "verify signed data 1");
844 CFReleaseNull(policy);
847 policy = NULL;
850 isnt(policy = SecPolicyCreatePassbookCardSigner(CFSTR("pass.com.apple.cardman"), CFSTR("IAMBOGUS")),
851 NULL, "create policy");
852 isnt(SecCMSVerifySignedData(badSig, badManifest, policy, NUL
877 SecPolicyRef policy; local
[all...]
/macosx-10.10/eap8021x-198/EAP8021X.fproj/
H A DEAPTLSUtil.c1227 SecPolicyRef policy = NULL; local
1244 policy = SecPolicyCreateEAP(FALSE, trusted_server_names);
1245 if (policy == NULL) {
1248 status = SecTrustCreateWithCertificates(server_certs, policy, &trust);
1323 my_CFRelease(&policy);
1614 SecPolicyRef policy = NULL; local
1667 status = EAPSecPolicyCopy(&policy);
1671 status = SecTrustCreateWithCertificates(server_certs, policy, &trust);
1761 my_CFRelease(&policy);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/sslViewer/
H A DsslAppUtils.cpp530 SecPolicyRef policy = NULL;
579 ortn = SecPolicySearchCopyNext(policySearch, &policy);
585 /* build a SecTrustRef for specified policy and certs */
587 policy, &secTrust);
681 if(policy) {
682 CFRelease(policy);
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/
H A DsslAppUtils.cpp448 NULL, // SSL policy
521 SecPolicyRef policy = NULL; local
570 ortn = SecPolicySearchCopyNext(policySearch, &policy);
576 /* build a SecTrustRef for specified policy and certs */
578 policy, &secTrust);
672 if(policy) {
673 CFRelease(policy);
691 const CSSM_OID *vfyPolicy, // optional - if NULL, use SSL policy to complete
/macosx-10.10/Security-57031.1.35/sslViewer/
H A DsslAppUtils.cpp521 SecPolicyRef policy = NULL;
570 ortn = SecPolicySearchCopyNext(policySearch, &policy);
576 /* build a SecTrustRef for specified policy and certs */
578 policy, &secTrust);
672 if(policy) {
673 CFRelease(policy);
/macosx-10.10/network_cmds-457/traceroute6.tproj/
H A Dtraceroute6.c310 int setpolicy(int so, char *policy);
986 setpolicy(so, policy)
988 char *policy;
992 buf = ipsec_set_policy(policy, strlen(policy));
/macosx-10.10/ruby-106/ruby/
H A Dthread_pthread.c937 int policy; local
940 pthread_getschedparam(th->thread_id, &policy, &sp);
941 max = sched_get_priority_max(policy);
942 min = sched_get_priority_min(policy);
952 pthread_setschedparam(th->thread_id, policy, &sp);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/
H A DtpCertGroup.cpp376 * Map a policy OID to one of the standard (non-revocation) policies.
377 * Returns true if it's a standard policy.
508 * PolicyIdentifiers, Optional policy OID. NULL indicates default
509 * X.509 trust policy.
533 * policy action.
563 /* keep track of whether we did policy checking; if not, we do defaults */
634 /* default policy OID in case caller hasn't specified one */
638 /* keep going, I guess - no policy-specific info - use kTPx509Basic */
646 /* keep going, I guess - no policy-specific info - use kTPx509Basic */
649 /* get policy
[all...]
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/
H A Dkey_debug.c547 printf("kdebug_sadb_x_policy: wrong policy struct.\n");
552 printf("invalid ipsec policy length\n");
563 panic("kdebug_sadb_x_policy: wrong policy struct.\n");
609 printf("secpolicy{ refcnt=%u state=%u policy=%u\n",
610 sp->refcnt, sp->state, sp->policy);
614 switch (sp->policy) {
645 printf("kdebug_secpolicy: Invalid policy found. %d\n",
646 sp->policy);
/macosx-10.10/xnu-2782.1.97/bsd/netkey/
H A Dkey_debug.c481 printf("kdebug_sadb_x_policy: wrong policy struct.\n");
486 printf("invalid ipsec policy length\n");
497 panic("kdebug_sadb_x_policy: wrong policy struct.\n");
513 printf("secpolicy{ refcnt=%u state=%u policy=%u\n",
514 sp->refcnt, sp->state, sp->policy);
518 switch (sp->policy) {
545 printf("kdebug_secpolicy: Invalid policy found. %d\n",
546 sp->policy);
/macosx-10.10/xnu-2782.1.97/osfmk/kern/
H A Dprocessor.c64 #include <mach/policy.h>
774 * Allow indicated policy on processor set.
780 __unused int policy)
788 * Forbid indicated policy on processor set. Time sharing cannot
794 __unused int policy,
1018 * Allows control of enabled policies, and per-policy base and limit
778 processor_set_policy_enable( __unused processor_set_t pset, __unused int policy) argument
792 processor_set_policy_disable( __unused processor_set_t pset, __unused int policy, __unused boolean_t change_threads) argument
H A Dsync_sema.c161 int policy,
169 if (task == TASK_NULL || value < 0 || policy > SYNC_POLICY_MAX)
177 kret = wait_queue_init(&s->wait_queue, policy); /* also inits lock */
158 semaphore_create( task_t task, semaphore_t *new_semaphore, int policy, int value) argument
/macosx-10.10/xnu-2782.1.97/tools/tests/MPMMTest/
H A DMPMMtest.c331 thread_affinity_policy_data_t policy; local
344 policy.affinity_tag = tag;
347 (thread_policy_t) &policy,
/macosx-10.10/Heimdal-398.1.2/tests/gss/
H A Dcheck-context.in340 echo "host without ok-as-delegate with policy-delegate" ; > ${testdir}/messages.log
343 --policy-delegate \
348 echo "ok-as-delegate used by policy" ; > ${testdir}/messages.log
351 --policy-delegate \
360 echo "policy delegate to non delegate host" ; > ${testdir}/messages.log
363 --policy-delegate \
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/
H A DtsaSupport.c1017 CFTypeRef policy = CFRetainSafe(timeStampPolicy); local
1021 if (!policy) {
1022 require(policy = SecPolicyCreateWithOID(kSecPolicyAppleTimeStamping), xit);
1038 result = SecCmsSignedDataVerifySignerInfo (signedData, jx, NULL, policy, &trustRef);
1099 if (policy)
1100 CFRelease (policy);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/
H A DtsaSupport.c1017 CFTypeRef policy = CFRetainSafe(timeStampPolicy); local
1021 if (!policy) {
1022 require(policy = SecPolicyCreateWithOID(kSecPolicyAppleTimeStamping), xit);
1038 result = SecCmsSignedDataVerifySignerInfo (signedData, jx, NULL, policy, &trustRef);
1099 if (policy)
1100 CFRelease (policy);
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/cmstool/testSubjects/
H A Dptext1.txt166 SecPolicyRef policy = NULL;
177 ortn = SecPolicySearchCopyNext(policySearch, &policy);
191 policy, &secTrust);
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/db/
H A DEnvironment.java958 @param policy
959 The policy defines the startup characteristics of a replication group.
963 int nthreads, ReplicationManagerStartPolicy policy)
966 dbenv.repmgr_start(nthreads, policy.getId());
962 replicationManagerStart( int nthreads, ReplicationManagerStartPolicy policy) argument
/macosx-10.10/Heimdal-398.1.2/tests/apple/
H A Dcheck-apple-ad.in112 echo " check delegation (spnego w/ kerberos credentials policy)"
113 ${http_client} --mech=spnego --cred-mech=krb5 --policy --client=ktestuser@ADS.APPLE.COM \
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Tool/
H A Dcodesign.c370 SecPolicyRef policy = SecPolicyCreateiPhoneApplicationSigning(); local
373 if (SecCMSVerify(signed_data, code_dir, policy, NULL, NULL)) {
/macosx-10.10/WebCore-7600.1.25/loader/cache/
H A DCachedImage.cpp571 bool CachedImage::mustRevalidateDueToCacheHeaders(CachePolicy policy) const
581 return CachedResource::mustRevalidateDueToCacheHeaders(policy);
/macosx-10.10/xnu-2782.1.97/bsd/netinet6/
H A Dip6_forward.c265 /* get a security policy for this packet */
284 /* check policy */
285 switch (sp->policy) {
332 printf("ip6_forward: Invalid policy found. %d\n", sp->policy);

Completed in 392 milliseconds

<<11121314151617181920