Searched refs:policy (Results 401 - 425 of 479) sorted by relevance

<<11121314151617181920

/macosx-10.10/remote_cmds-47/telnet.tproj/
H A Dcommands.c2138 setpolicy(int lnet, struct addrinfo *res, char *policy)
2144 if (policy == NULL)
2147 buf = ipsec_set_policy(policy, strlen(policy));
2130 setpolicy(int lnet, struct addrinfo *res, char *policy) argument
/macosx-10.10/xnu-2782.1.97/bsd/miscfs/specfs/
H A Dspec_vnops.c1748 * set a kernel thread's IO policy. policy can be:
1753 void throttle_set_thread_io_policy(int policy) argument
1757 policy); local
1912 int throttle_info_io_will_be_throttled(void * throttle_info, int policy) argument
1920 switch (policy) {
/macosx-10.10/xnu-2782.1.97/libsyscall/wrappers/libproc/
H A Dlibproc.c39 int __process_policy(int scope, int action, int policy, int policy_subtype, proc_policy_attribute_t * attrp, pid_t target_pid, uint64_t target_threadid);
719 /* disable the launch time backgroudn policy and restore the process to default group */
738 /* re-enable the launch time background policy if it had been disabled. */
/macosx-10.10/xnu-2782.1.97/osfmk/kern/
H A Dsched_proto.c31 #include <mach/policy.h>
H A Dsyscall_subr.c71 #include <mach/policy.h>
H A Dsched_grrr.c31 #include <mach/policy.h>
H A Dthread.h382 static_param:1, /* Disallow policy parameter changes */
383 policy_reset:1, /* Disallow policy parameter changes on terminating threads */
460 /* policy is protected by the task lock */
598 integer_t policy,
/macosx-10.10/objc4-646/runtime/
H A Dobjc-private.h677 extern void objc_setAssociatedObject_non_gc(id object, const void *key, id value, objc_AssociationPolicy policy);
680 extern void objc_setAssociatedObject_gc(id object, const void *key, id value, objc_AssociationPolicy policy);
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/db/internal/
H A DDbEnv.java580 public void repmgr_set_ack_policy(int policy) throws com.sleepycat.db.DatabaseException { db_javaJNI.DbEnv_repmgr_set_ack_policy(swigCPtr, this, policy); } argument
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/smimePolicy/
H A DsmimePolicy.cpp66 /* policy: CVP_SMIME or CVP_iChat */
67 CertVerifyPolicy policy; member in struct:__anon5265
1197 testCase->policy,
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/C/
H A DWKPreferences.cpp892 void WKPreferencesSetStorageBlockingPolicy(WKPreferencesRef preferencesRef, WKStorageBlockingPolicy policy) argument
894 toImpl(preferencesRef)->setStorageBlockingPolicy(toStorageBlockingPolicy(policy));
/macosx-10.10/bind9-45.101/bind9/lib/dns/
H A Drpz.c44 * Parallel radix trees for databases of response policy IP addresses
47 * policy addresses by representing the two test of IP IP addresses and name
51 * name server IP address policy sub-zone (or both) of the corresponding
52 * response response zone. The policy data such as a CNAME or an A record
53 * is kept in the policy zone. After an IP address has been found in a radix
54 * tree, the node in the policy zone's database is found by converting
57 * The response policy zone canonical form of IPv6 addresses is one of:
172 dns_rpz_policy2str(dns_rpz_policy_t policy) { argument
175 switch (policy) {
200 * Free the radix tree of a response policy databas
[all...]
/macosx-10.10/vim-55/runtime/syntax/
H A Dsamba.vim95 syn keyword sambaKeyword contained policy spin spoolss
/macosx-10.10/Heimdal-398.1.2/lib/akadmin/
H A DHeimODAdmin.c1855 SecPolicyRef policy = NULL; local
1861 policy = SecPolicyCreateBasicX509();
1867 ret = SecTrustCreateWithCertificates(inArray, policy, &trust);
1887 if (policy)
1888 CFRelease(policy);
/macosx-10.10/cups-408/cups/scheduler/
H A Dconf.c1265 * Update the default policy, as needed...
1275 cupsd_location_t *po; /* New policy operation */
1279 cupsdLogMessage(CUPSD_LOG_ERROR, "Default policy \"%s\" not found.",
1286 "Using policy \"default\" as the default.");
1290 "Creating CUPS default administrative policy:");
3654 char *policy, /* I - Location name/path */
3669 * Create the policy...
3672 if ((pol = cupsdFindPolicy(policy)) != NULL)
3674 policy, linenum);
3675 else if ((pol = cupsdAddPolicy(policy))
3653 read_policy(cups_file_t *fp, char *policy, int linenum) argument
[all...]
H A DMakefile35 policy.o \
/macosx-10.10/curl-83.1.2/curl/lib/vtls/
H A Dnss.c273 PRInt32 policy = 0; local
278 SSL_CipherPolicyGet(cipherlist[i].num, &policy);
279 if(policy)
/macosx-10.10/BerkeleyDB-21/db/dbinc/
H A Ddb_cxx.in625 virtual int repmgr_get_ack_policy(int *policy);
626 virtual int repmgr_set_ack_policy(int policy);
/macosx-10.10/CPANInternal-159.1/common-sense-3.6/
H A Dsense.pm.PL267 code you need to add to gte I<this> policy is daunting. Nobody would write
472 to its strictness in enforcing policy, while at the same time not limiting
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/
H A DtpOcspVerify.cpp238 * Note we're enforcing a not-so-obvious policy here: if nonce match is
430 assert(vfyCtx.policy == kRevokeOcsp);
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-22-sectrust-iap.c548 SecPolicyRef policy = SecPolicyCreateiAP(); local
557 ok_status(SecTrustCreateWithCertificates(certs0, policy, &trust), "create trust for leaf0");
572 ok_status(SecTrustCreateWithCertificates(certs1, policy, &trust), "create trust for leaf1");
586 CFReleaseSafe(policy);
/macosx-10.10/bind9-45.101/bind9/lib/bind9/
H A Dcheck.c1164 check_update_policy(const cfg_obj_t *policy, isc_log_t *logctx) { argument
1173 /* Check for "update-policy local;" */
1174 if (cfg_obj_isstring(policy) &&
1175 strcmp("local", cfg_obj_asstring(policy)) == 0)
1178 /* Now check the grant policy */
1179 for (element = cfg_list_first(policy);
1323 { "update-policy", MASTERZONE },
1495 * Master zones can't have both "allow-update" and "update-policy".
1505 res2 = cfg_map_get(zoptions, "update-policy", &obj);
1509 "when 'update-policy' i
[all...]
/macosx-10.10/network_cmds-457/ping6.tproj/
H A Dping6.c627 errx(1, "invalid security policy");
2934 setpolicy(int so __unused, char *policy) argument
2938 if (policy == NULL)
2941 buf = ipsec_set_policy(policy, strlen(policy));
2946 warnx("Unable to set IPsec policy");
3054 " [-P policy]"
/macosx-10.10/postfix-255/
H A DMakefile184 install -m 755 $(SRCROOT)/postfix/examples/smtpd-policy/greylist.pl $(DSTROOT)/usr/libexec/postfix
/macosx-10.10/ruby-106/ruby/ext/socket/
H A Dmkconstants.rb532 IP_IPSEC_POLICY nil IPsec security policy

Completed in 244 milliseconds

<<11121314151617181920