/macosx-10.10/remote_cmds-47/telnet.tproj/ |
H A D | commands.c | 2138 setpolicy(int lnet, struct addrinfo *res, char *policy) 2144 if (policy == NULL) 2147 buf = ipsec_set_policy(policy, strlen(policy)); 2130 setpolicy(int lnet, struct addrinfo *res, char *policy) argument
|
/macosx-10.10/xnu-2782.1.97/bsd/miscfs/specfs/ |
H A D | spec_vnops.c | 1748 * set a kernel thread's IO policy. policy can be: 1753 void throttle_set_thread_io_policy(int policy) argument 1757 policy); local 1912 int throttle_info_io_will_be_throttled(void * throttle_info, int policy) argument 1920 switch (policy) {
|
/macosx-10.10/xnu-2782.1.97/libsyscall/wrappers/libproc/ |
H A D | libproc.c | 39 int __process_policy(int scope, int action, int policy, int policy_subtype, proc_policy_attribute_t * attrp, pid_t target_pid, uint64_t target_threadid); 719 /* disable the launch time backgroudn policy and restore the process to default group */ 738 /* re-enable the launch time background policy if it had been disabled. */
|
/macosx-10.10/xnu-2782.1.97/osfmk/kern/ |
H A D | sched_proto.c | 31 #include <mach/policy.h>
|
H A D | syscall_subr.c | 71 #include <mach/policy.h>
|
H A D | sched_grrr.c | 31 #include <mach/policy.h>
|
H A D | thread.h | 382 static_param:1, /* Disallow policy parameter changes */ 383 policy_reset:1, /* Disallow policy parameter changes on terminating threads */ 460 /* policy is protected by the task lock */ 598 integer_t policy,
|
/macosx-10.10/objc4-646/runtime/ |
H A D | objc-private.h | 677 extern void objc_setAssociatedObject_non_gc(id object, const void *key, id value, objc_AssociationPolicy policy); 680 extern void objc_setAssociatedObject_gc(id object, const void *key, id value, objc_AssociationPolicy policy);
|
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/db/internal/ |
H A D | DbEnv.java | 580 public void repmgr_set_ack_policy(int policy) throws com.sleepycat.db.DatabaseException { db_javaJNI.DbEnv_repmgr_set_ack_policy(swigCPtr, this, policy); } argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/smimePolicy/ |
H A D | smimePolicy.cpp | 66 /* policy: CVP_SMIME or CVP_iChat */ 67 CertVerifyPolicy policy; member in struct:__anon5265 1197 testCase->policy,
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/C/ |
H A D | WKPreferences.cpp | 892 void WKPreferencesSetStorageBlockingPolicy(WKPreferencesRef preferencesRef, WKStorageBlockingPolicy policy) argument 894 toImpl(preferencesRef)->setStorageBlockingPolicy(toStorageBlockingPolicy(policy));
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/ |
H A D | rpz.c | 44 * Parallel radix trees for databases of response policy IP addresses 47 * policy addresses by representing the two test of IP IP addresses and name 51 * name server IP address policy sub-zone (or both) of the corresponding 52 * response response zone. The policy data such as a CNAME or an A record 53 * is kept in the policy zone. After an IP address has been found in a radix 54 * tree, the node in the policy zone's database is found by converting 57 * The response policy zone canonical form of IPv6 addresses is one of: 172 dns_rpz_policy2str(dns_rpz_policy_t policy) { argument 175 switch (policy) { 200 * Free the radix tree of a response policy databas [all...] |
/macosx-10.10/vim-55/runtime/syntax/ |
H A D | samba.vim | 95 syn keyword sambaKeyword contained policy spin spoolss
|
/macosx-10.10/Heimdal-398.1.2/lib/akadmin/ |
H A D | HeimODAdmin.c | 1855 SecPolicyRef policy = NULL; local 1861 policy = SecPolicyCreateBasicX509(); 1867 ret = SecTrustCreateWithCertificates(inArray, policy, &trust); 1887 if (policy) 1888 CFRelease(policy);
|
/macosx-10.10/cups-408/cups/scheduler/ |
H A D | conf.c | 1265 * Update the default policy, as needed... 1275 cupsd_location_t *po; /* New policy operation */ 1279 cupsdLogMessage(CUPSD_LOG_ERROR, "Default policy \"%s\" not found.", 1286 "Using policy \"default\" as the default."); 1290 "Creating CUPS default administrative policy:"); 3654 char *policy, /* I - Location name/path */ 3669 * Create the policy... 3672 if ((pol = cupsdFindPolicy(policy)) != NULL) 3674 policy, linenum); 3675 else if ((pol = cupsdAddPolicy(policy)) 3653 read_policy(cups_file_t *fp, char *policy, int linenum) argument [all...] |
H A D | Makefile | 35 policy.o \
|
/macosx-10.10/curl-83.1.2/curl/lib/vtls/ |
H A D | nss.c | 273 PRInt32 policy = 0; local 278 SSL_CipherPolicyGet(cipherlist[i].num, &policy); 279 if(policy)
|
/macosx-10.10/BerkeleyDB-21/db/dbinc/ |
H A D | db_cxx.in | 625 virtual int repmgr_get_ack_policy(int *policy); 626 virtual int repmgr_set_ack_policy(int policy);
|
/macosx-10.10/CPANInternal-159.1/common-sense-3.6/ |
H A D | sense.pm.PL | 267 code you need to add to gte I<this> policy is daunting. Nobody would write 472 to its strictness in enforcing policy, while at the same time not limiting
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/ |
H A D | tpOcspVerify.cpp | 238 * Note we're enforcing a not-so-obvious policy here: if nonce match is 430 assert(vfyCtx.policy == kRevokeOcsp);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-22-sectrust-iap.c | 548 SecPolicyRef policy = SecPolicyCreateiAP(); local 557 ok_status(SecTrustCreateWithCertificates(certs0, policy, &trust), "create trust for leaf0"); 572 ok_status(SecTrustCreateWithCertificates(certs1, policy, &trust), "create trust for leaf1"); 586 CFReleaseSafe(policy);
|
/macosx-10.10/bind9-45.101/bind9/lib/bind9/ |
H A D | check.c | 1164 check_update_policy(const cfg_obj_t *policy, isc_log_t *logctx) { argument 1173 /* Check for "update-policy local;" */ 1174 if (cfg_obj_isstring(policy) && 1175 strcmp("local", cfg_obj_asstring(policy)) == 0) 1178 /* Now check the grant policy */ 1179 for (element = cfg_list_first(policy); 1323 { "update-policy", MASTERZONE }, 1495 * Master zones can't have both "allow-update" and "update-policy". 1505 res2 = cfg_map_get(zoptions, "update-policy", &obj); 1509 "when 'update-policy' i [all...] |
/macosx-10.10/network_cmds-457/ping6.tproj/ |
H A D | ping6.c | 627 errx(1, "invalid security policy"); 2934 setpolicy(int so __unused, char *policy) argument 2938 if (policy == NULL) 2941 buf = ipsec_set_policy(policy, strlen(policy)); 2946 warnx("Unable to set IPsec policy"); 3054 " [-P policy]"
|
/macosx-10.10/postfix-255/ |
H A D | Makefile | 184 install -m 755 $(SRCROOT)/postfix/examples/smtpd-policy/greylist.pl $(DSTROOT)/usr/libexec/postfix
|
/macosx-10.10/ruby-106/ruby/ext/socket/ |
H A D | mkconstants.rb | 532 IP_IPSEC_POLICY nil IPsec security policy
|