/macosx-10.10/xnu-2782.1.97/osfmk/kern/ |
H A D | task.h | 650 /* The main entrance to task policy is this function */ 699 * for IPC importance hooks into task policy 713 * Get effective policy 724 int proc_set_task_ruse_cpu(task_t task, uint32_t policy, uint8_t percentage, uint64_t interval, uint64_t deadline, int cpumon_entitled); 727 void set_thread_iotier_override(thread_t, int policy);
|
H A D | thread_policy.c | 191 * flag set by -qos-policy-allow boot-arg to allow 192 * testing thread qos policy from userspace 454 * Going into task policy requires the task mutex, 455 * because of the way synchronization against the IO policy 458 * We need to move thread policy to the thread mutex instead. 459 * <rdar://problem/15831652> separate thread policy from task policy 471 /* There is a race here. To be closed in <rdar://problem/15831652> separate thread policy from task policy */ 503 * Set scheduling policy 512 thread_set_mode_and_absolute_pri( thread_t thread, integer_t policy, integer_t priority) argument [all...] |
/macosx-10.10/BerkeleyDB-21/db/cxx/ |
H A D | cxx_env.cpp | 71 // there is typically a single policy of throwing or returning. 574 // ON_ERROR_UNKNOWN defer the policy to policy saved in DbEnv::DbEnv 1107 DBENV_METHOD(repmgr_get_ack_policy, (int *policy), (dbenv, policy)) 1108 DBENV_METHOD(repmgr_set_ack_policy, (int policy), (dbenv, policy))
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | tls_o.c | 1762 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 1771 status = SecTrustCreateWithCertificates(certChain, policy, &trustRef); 1818 if (policy) 1819 CFRelease(policy);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | ssl-40-clientauth.c | 427 SecPolicyRef policy = NULL; local 433 ok(policy = SecPolicyCreateBasicX509(), "SecPolicyCreateBasicX509"); 438 ok_status(status = SecTrustCreateWithCertificates(certs, policy, &trust), 459 CFReleaseNull(policy);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-75-AppleIDRecordSigning.c | 202 SecPolicyRef policy = NULL; local 226 isnt(policy = SecPolicyCreateAppleIDValidationRecordSigningPolicy(), 227 NULL, "Create AppleID Record signing policy SecPolicyRef"); 229 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), 238 CFReleaseSafe(policy);
|
H A D | si-25-sectrust-ipsec-eap.c | 628 SecPolicyRef policy; local 642 isnt(policy = SecPolicyCreateIPSec(true, *host_value++), NULL, "create ipsec policy instance"); 644 ok_status(SecTrustCreateWithCertificates(leaf_certs, policy, &trust), "create trust for leaf"); 661 CFReleaseNull(policy); 667 isnt(policy = SecPolicyCreateEAP(true, valid_hosts), NULL, "create eap policy instance"); 669 ok_status(SecTrustCreateWithCertificates(leaf_certs, policy, &trust), "create trust for leaf"); 684 CFReleaseNull(policy); 702 isnt(policy 732 SecPolicyRef policy; local [all...] |
H A D | si-26-applicationsigning.c | 360 SecPolicyRef policy; local 370 isnt(policy = SecPolicyCreateiPhoneProfileApplicationSigning(), NULL, 371 "create iPhoneProfileApplicationSigning policy instance"); 372 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust for leaf"); 396 CFReleaseNull(policy);
|
/macosx-10.10/WebCore-7600.1.25/loader/ |
H A D | DocumentLoader.cpp | 529 // Update cookie policy base URL as URL changes, except for subframes, which use the 559 // FIXME: Ideally we'd stop the I/O until we hear back from the navigation policy delegate 561 // listener tells us to. In practice that means the navigation policy needs to be decided 658 // Respect the hidden FTP Directory Listing pref so it can be tested even if the policy delegate might otherwise disallow it 670 frameLoader()->policyChecker().checkContentPolicy(m_response, [this](PolicyAction policy) { 671 continueAfterContentPolicy(policy); 675 void DocumentLoader::continueAfterContentPolicy(PolicyAction policy) argument 685 switch (policy) {
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/C/ |
H A D | WKPreferencesRef.h | 220 WK_EXPORT void WKPreferencesSetStorageBlockingPolicy(WKPreferencesRef preferencesRef, WKStorageBlockingPolicy policy);
|
/macosx-10.10/tcl-105/tcl_ext/trf/trf/generic/ |
H A D | transform.h | 156 * * Name of the seek policy requested by the user. 168 Tcl_Obj* policy; /* Refers to string object containing the seek policy member in struct:_Trf_BaseOptions_ 332 * The procedure is allowed to change the natural seek policy defined for the 346 Trf_SeekInformation* seekInfo, /* The policy to modify */ 372 Trf_SeekQueryOptions* seekQueryProc; /* query options about changes to the natural seek policy */ 593 * Information about a seek policy. Just the ratio of input to output, if 622 * policy. Compile time configuration. */
|
/macosx-10.10/vim-55/runtime/syntax/ |
H A D | named.vim | 85 " + these keywords are contained within `update-policy' section only 173 syn keyword namedZoneOpt contained update-policy
|
/macosx-10.10/xnu-2782.1.97/osfmk/mach/ |
H A D | Makefile | 123 policy.h \
|
/macosx-10.10/xnu-2782.1.97/osfmk/vm/ |
H A D | device_vm.c | 36 #include <mach/policy.h>
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | tpUtils.cpp | 873 const CSSM_OID *policy, // optional 912 /* zero or one policy here */ 914 if(policy != NULL) { 915 policyId.FieldOid = (CSSM_OID)*policy; 868 tpCertGroupVerify( CSSM_TP_HANDLE tpHand, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, CSSM_DL_DB_LIST_PTR dbListPtr, const CSSM_OID *policy, const CSSM_DATA *fieldOpts, const CSSM_DATA *actionData, void *policyOpts, const CSSM_CERTGROUP *certGroup, CSSM_DATA_PTR anchorCerts, unsigned numAnchorCerts, CSSM_TP_STOP_ON stopOn, CSSM_TIMESTRING cssmTimeStr, CSSM_TP_VERIFY_CONTEXT_RESULT_PTR result) argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/cmstool/ |
H A D | cmstool.cpp | 269 SecPolicyRef policy = NULL; local 280 ortn = SecPolicySearchCopyNext(policySearch, &policy); 321 policy, &secTrust); 1144 NULL, // no verify policy
|
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/mime/ |
H A D | smtp.tcl | 764 # Call a TLS client policy proc here 767 set policy insecure 773 } policy 775 if {$policy != "insecure"} {
|
/macosx-10.10/xnu-2782.1.97/tools/tests/MPMMTest/ |
H A D | KQMPMMtest.c | 316 thread_affinity_policy_data_t policy; local 329 policy.affinity_tag = tag; 332 (thread_policy_t) &policy,
|
/macosx-10.10/cups-408/cups/scheduler/ |
H A D | ipp.c | 793 * Check policy... 922 * No, check the default policy and then add the class... 1239 * Check policy... 2280 * No, check the default policy then add the printer... 3210 * Check policy... 3267 * Check policy... 3569 * Check policy... 4896 if (!ra || cupsArrayFind(ra, "printer-error-policy")) 4898 "printer-error-policy", NULL, printer->error_policy); 4900 if (!ra || cupsArrayFind(ra, "printer-error-policy 6028 cupsd_policy_t *policy; /* Current security policy */ local 6167 cupsd_policy_t *policy; /* Current policy */ local 7270 cupsd_policy_t *policy; /* Current security policy */ local 7352 cupsd_policy_t *policy; /* Policy */ local [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/overlays/ |
H A D | odusers.c | 393 Debug(LDAP_DEBUG_ANY, "%s: slap_str2ad failed for global policy", __PRETTY_FUNCTION__, 0, 0); 452 Debug(LDAP_DEBUG_ANY, "%s: Unable to retrieve effective policy for %s\n", __func__, op->o_req_ndn.bv_val, 0); 466 Debug(LDAP_DEBUG_ANY, "%s: Unable to convert effective policy to berval", __PRETTY_FUNCTION__, 0, 0); 472 Debug(LDAP_DEBUG_ANY, "%s: slap_str2ad failed for effective policy", __PRETTY_FUNCTION__, 0, 0); 548 Debug(LDAP_DEBUG_ANY, "%s: slap_str2ad failed for global policy", __PRETTY_FUNCTION__, 0, 0); 963 Debug(LDAP_DEBUG_ANY, "%s: Could not convert user policy to dict", __func__, 0, 0); 1050 Debug(LDAP_DEBUG_ANY, "%s: Could not convert global policy to dict", __func__, 0, 0); 1128 Debug(LDAP_DEBUG_ANY, "%s: Unable to modify user policy: %s (%d)\n", __PRETTY_FUNCTION__, fakeop->o_req_ndn.bv_val, rs->sr_err); 1142 CFDictionaryRef policy = NULL; local 1150 policy [all...] |
/macosx-10.10/SmartcardCCID-55008/libusb/libusb/libusb/os/ |
H A D | windows_usb.c | 2375 UCHAR policy; local 2391 policy = false; 2393 SHORT_PACKET_TERMINATE, sizeof(UCHAR), &policy)) { 2397 IGNORE_SHORT_PACKETS, sizeof(UCHAR), &policy)) { 2401 ALLOW_PARTIAL_READS, sizeof(UCHAR), &policy)) { 2404 policy = true; 2406 AUTO_CLEAR_STALL, sizeof(UCHAR), &policy)) {
|
/macosx-10.10/OpenSSL098-52/src/crypto/x509/ |
H A D | x509_vfy.h | 255 X509_POLICY_TREE *tree; /* Valid policy tree */ 257 int explicit_policy; /* Require explicit policy value */ 355 /* Enable policy checking */ 357 /* Policy variable require-explicit-policy */ 359 /* Policy variable inhibit-any-policy */ 361 /* Policy variable inhibit-policy-mapping */ 363 /* Notify callback that policy is OK */ 375 /* Internal use: mask of policy related options */ 493 ASN1_OBJECT *policy);
|
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | x509_vfy.h | 255 X509_POLICY_TREE *tree; /* Valid policy tree */ 257 int explicit_policy; /* Require explicit policy value */ 355 /* Enable policy checking */ 357 /* Policy variable require-explicit-policy */ 359 /* Policy variable inhibit-any-policy */ 361 /* Policy variable inhibit-policy-mapping */ 363 /* Notify callback that policy is OK */ 375 /* Internal use: mask of policy related options */ 493 ASN1_OBJECT *policy);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecTrustSettings.c | 422 SecPolicyRef policy, 420 SecTrustSettingsEvaluateCertificate( SecCertificateRef certificate, SecPolicyRef policy, SecTrustSettingsKeyUsage keyUsage, bool isSelfSignedCert, SecTrustSettingsDomain *foundDomain, CFArrayRef *allowedErrors, SecTrustSettingsResult *resultType, bool *foundMatchingEntry, bool *foundAnyEntry) argument
|
/macosx-10.10/apache-793/httpd/modules/proxy/ |
H A D | mod_proxy_http.c | 1575 const char *policy = apr_table_get(r->subprocess_env, local 1579 if (!policy 1580 || (!strcasecmp(policy, "RFC") && ((r->expecting_100 = 1)))) { 1586 else if (strcasecmp(policy, "Suppress")) { 1588 "undefined proxy interim response policy");
|