Searched refs:policy (Results 376 - 400 of 479) sorted by relevance

<<11121314151617181920

/macosx-10.10/xnu-2782.1.97/osfmk/kern/
H A Dtask.h650 /* The main entrance to task policy is this function */
699 * for IPC importance hooks into task policy
713 * Get effective policy
724 int proc_set_task_ruse_cpu(task_t task, uint32_t policy, uint8_t percentage, uint64_t interval, uint64_t deadline, int cpumon_entitled);
727 void set_thread_iotier_override(thread_t, int policy);
H A Dthread_policy.c191 * flag set by -qos-policy-allow boot-arg to allow
192 * testing thread qos policy from userspace
454 * Going into task policy requires the task mutex,
455 * because of the way synchronization against the IO policy
458 * We need to move thread policy to the thread mutex instead.
459 * <rdar://problem/15831652> separate thread policy from task policy
471 /* There is a race here. To be closed in <rdar://problem/15831652> separate thread policy from task policy */
503 * Set scheduling policy
512 thread_set_mode_and_absolute_pri( thread_t thread, integer_t policy, integer_t priority) argument
[all...]
/macosx-10.10/BerkeleyDB-21/db/cxx/
H A Dcxx_env.cpp71 // there is typically a single policy of throwing or returning.
574 // ON_ERROR_UNKNOWN defer the policy to policy saved in DbEnv::DbEnv
1107 DBENV_METHOD(repmgr_get_ack_policy, (int *policy), (dbenv, policy))
1108 DBENV_METHOD(repmgr_set_ack_policy, (int policy), (dbenv, policy))
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/libldap/
H A Dtls_o.c1762 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
1771 status = SecTrustCreateWithCertificates(certChain, policy, &trustRef);
1818 if (policy)
1819 CFRelease(policy);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/
H A Dssl-40-clientauth.c427 SecPolicyRef policy = NULL; local
433 ok(policy = SecPolicyCreateBasicX509(), "SecPolicyCreateBasicX509");
438 ok_status(status = SecTrustCreateWithCertificates(certs, policy, &trust),
459 CFReleaseNull(policy);
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-75-AppleIDRecordSigning.c202 SecPolicyRef policy = NULL; local
226 isnt(policy = SecPolicyCreateAppleIDValidationRecordSigningPolicy(),
227 NULL, "Create AppleID Record signing policy SecPolicyRef");
229 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust),
238 CFReleaseSafe(policy);
H A Dsi-25-sectrust-ipsec-eap.c628 SecPolicyRef policy; local
642 isnt(policy = SecPolicyCreateIPSec(true, *host_value++), NULL, "create ipsec policy instance");
644 ok_status(SecTrustCreateWithCertificates(leaf_certs, policy, &trust), "create trust for leaf");
661 CFReleaseNull(policy);
667 isnt(policy = SecPolicyCreateEAP(true, valid_hosts), NULL, "create eap policy instance");
669 ok_status(SecTrustCreateWithCertificates(leaf_certs, policy, &trust), "create trust for leaf");
684 CFReleaseNull(policy);
702 isnt(policy
732 SecPolicyRef policy; local
[all...]
H A Dsi-26-applicationsigning.c360 SecPolicyRef policy; local
370 isnt(policy = SecPolicyCreateiPhoneProfileApplicationSigning(), NULL,
371 "create iPhoneProfileApplicationSigning policy instance");
372 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust for leaf");
396 CFReleaseNull(policy);
/macosx-10.10/WebCore-7600.1.25/loader/
H A DDocumentLoader.cpp529 // Update cookie policy base URL as URL changes, except for subframes, which use the
559 // FIXME: Ideally we'd stop the I/O until we hear back from the navigation policy delegate
561 // listener tells us to. In practice that means the navigation policy needs to be decided
658 // Respect the hidden FTP Directory Listing pref so it can be tested even if the policy delegate might otherwise disallow it
670 frameLoader()->policyChecker().checkContentPolicy(m_response, [this](PolicyAction policy) {
671 continueAfterContentPolicy(policy);
675 void DocumentLoader::continueAfterContentPolicy(PolicyAction policy) argument
685 switch (policy) {
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/C/
H A DWKPreferencesRef.h220 WK_EXPORT void WKPreferencesSetStorageBlockingPolicy(WKPreferencesRef preferencesRef, WKStorageBlockingPolicy policy);
/macosx-10.10/tcl-105/tcl_ext/trf/trf/generic/
H A Dtransform.h156 * * Name of the seek policy requested by the user.
168 Tcl_Obj* policy; /* Refers to string object containing the seek policy member in struct:_Trf_BaseOptions_
332 * The procedure is allowed to change the natural seek policy defined for the
346 Trf_SeekInformation* seekInfo, /* The policy to modify */
372 Trf_SeekQueryOptions* seekQueryProc; /* query options about changes to the natural seek policy */
593 * Information about a seek policy. Just the ratio of input to output, if
622 * policy. Compile time configuration. */
/macosx-10.10/vim-55/runtime/syntax/
H A Dnamed.vim85 " + these keywords are contained within `update-policy' section only
173 syn keyword namedZoneOpt contained update-policy
/macosx-10.10/xnu-2782.1.97/osfmk/mach/
H A DMakefile123 policy.h \
/macosx-10.10/xnu-2782.1.97/osfmk/vm/
H A Ddevice_vm.c36 #include <mach/policy.h>
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/
H A DtpUtils.cpp873 const CSSM_OID *policy, // optional
912 /* zero or one policy here */
914 if(policy != NULL) {
915 policyId.FieldOid = (CSSM_OID)*policy;
868 tpCertGroupVerify( CSSM_TP_HANDLE tpHand, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, CSSM_DL_DB_LIST_PTR dbListPtr, const CSSM_OID *policy, const CSSM_DATA *fieldOpts, const CSSM_DATA *actionData, void *policyOpts, const CSSM_CERTGROUP *certGroup, CSSM_DATA_PTR anchorCerts, unsigned numAnchorCerts, CSSM_TP_STOP_ON stopOn, CSSM_TIMESTRING cssmTimeStr, CSSM_TP_VERIFY_CONTEXT_RESULT_PTR result) argument
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/cmstool/
H A Dcmstool.cpp269 SecPolicyRef policy = NULL; local
280 ortn = SecPolicySearchCopyNext(policySearch, &policy);
321 policy, &secTrust);
1144 NULL, // no verify policy
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/mime/
H A Dsmtp.tcl764 # Call a TLS client policy proc here
767 set policy insecure
773 } policy
775 if {$policy != "insecure"} {
/macosx-10.10/xnu-2782.1.97/tools/tests/MPMMTest/
H A DKQMPMMtest.c316 thread_affinity_policy_data_t policy; local
329 policy.affinity_tag = tag;
332 (thread_policy_t) &policy,
/macosx-10.10/cups-408/cups/scheduler/
H A Dipp.c793 * Check policy...
922 * No, check the default policy and then add the class...
1239 * Check policy...
2280 * No, check the default policy then add the printer...
3210 * Check policy...
3267 * Check policy...
3569 * Check policy...
4896 if (!ra || cupsArrayFind(ra, "printer-error-policy"))
4898 "printer-error-policy", NULL, printer->error_policy);
4900 if (!ra || cupsArrayFind(ra, "printer-error-policy
6028 cupsd_policy_t *policy; /* Current security policy */ local
6167 cupsd_policy_t *policy; /* Current policy */ local
7270 cupsd_policy_t *policy; /* Current security policy */ local
7352 cupsd_policy_t *policy; /* Policy */ local
[all...]
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/overlays/
H A Dodusers.c393 Debug(LDAP_DEBUG_ANY, "%s: slap_str2ad failed for global policy", __PRETTY_FUNCTION__, 0, 0);
452 Debug(LDAP_DEBUG_ANY, "%s: Unable to retrieve effective policy for %s\n", __func__, op->o_req_ndn.bv_val, 0);
466 Debug(LDAP_DEBUG_ANY, "%s: Unable to convert effective policy to berval", __PRETTY_FUNCTION__, 0, 0);
472 Debug(LDAP_DEBUG_ANY, "%s: slap_str2ad failed for effective policy", __PRETTY_FUNCTION__, 0, 0);
548 Debug(LDAP_DEBUG_ANY, "%s: slap_str2ad failed for global policy", __PRETTY_FUNCTION__, 0, 0);
963 Debug(LDAP_DEBUG_ANY, "%s: Could not convert user policy to dict", __func__, 0, 0);
1050 Debug(LDAP_DEBUG_ANY, "%s: Could not convert global policy to dict", __func__, 0, 0);
1128 Debug(LDAP_DEBUG_ANY, "%s: Unable to modify user policy: %s (%d)\n", __PRETTY_FUNCTION__, fakeop->o_req_ndn.bv_val, rs->sr_err);
1142 CFDictionaryRef policy = NULL; local
1150 policy
[all...]
/macosx-10.10/SmartcardCCID-55008/libusb/libusb/libusb/os/
H A Dwindows_usb.c2375 UCHAR policy; local
2391 policy = false;
2393 SHORT_PACKET_TERMINATE, sizeof(UCHAR), &policy)) {
2397 IGNORE_SHORT_PACKETS, sizeof(UCHAR), &policy)) {
2401 ALLOW_PARTIAL_READS, sizeof(UCHAR), &policy)) {
2404 policy = true;
2406 AUTO_CLEAR_STALL, sizeof(UCHAR), &policy)) {
/macosx-10.10/OpenSSL098-52/src/crypto/x509/
H A Dx509_vfy.h255 X509_POLICY_TREE *tree; /* Valid policy tree */
257 int explicit_policy; /* Require explicit policy value */
355 /* Enable policy checking */
357 /* Policy variable require-explicit-policy */
359 /* Policy variable inhibit-any-policy */
361 /* Policy variable inhibit-policy-mapping */
363 /* Notify callback that policy is OK */
375 /* Internal use: mask of policy related options */
493 ASN1_OBJECT *policy);
/macosx-10.10/OpenSSL098-52/src/include/openssl/
H A Dx509_vfy.h255 X509_POLICY_TREE *tree; /* Valid policy tree */
257 int explicit_policy; /* Require explicit policy value */
355 /* Enable policy checking */
357 /* Policy variable require-explicit-policy */
359 /* Policy variable inhibit-any-policy */
361 /* Policy variable inhibit-policy-mapping */
363 /* Notify callback that policy is OK */
375 /* Internal use: mask of policy related options */
493 ASN1_OBJECT *policy);
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecTrustSettings.c422 SecPolicyRef policy,
420 SecTrustSettingsEvaluateCertificate( SecCertificateRef certificate, SecPolicyRef policy, SecTrustSettingsKeyUsage keyUsage, bool isSelfSignedCert, SecTrustSettingsDomain *foundDomain, CFArrayRef *allowedErrors, SecTrustSettingsResult *resultType, bool *foundMatchingEntry, bool *foundAnyEntry) argument
/macosx-10.10/apache-793/httpd/modules/proxy/
H A Dmod_proxy_http.c1575 const char *policy = apr_table_get(r->subprocess_env, local
1579 if (!policy
1580 || (!strcasecmp(policy, "RFC") && ((r->expecting_100 = 1)))) {
1586 else if (strcasecmp(policy, "Suppress")) {
1588 "undefined proxy interim response policy");

Completed in 282 milliseconds

<<11121314151617181920