/macosx-10.10/xnu-2782.1.97/osfmk/vm/ |
H A D | bsd_vm.c | 38 #include <mach/policy.h> 301 * Set thread scheduling priority and policy for the current thread
|
H A D | vm_apple_protect.c | 38 #include <mach/policy.h>
|
H A D | vm_pageout.c | 3444 uint32_t policy; local 3462 policy = THROTTLE_LEVEL_PAGEOUT_THROTTLED; 3465 policy = THROTTLE_LEVEL_PAGEOUT_UNTHROTTLED; 3469 proc_set_task_policy_thread(kernel_task, iq->pgo_tid, TASK_POLICY_EXTERNAL, TASK_POLICY_IO, policy); 3474 proc_set_task_policy_thread(kernel_task, eq->pgo_tid, TASK_POLICY_EXTERNAL, TASK_POLICY_IO, policy);
|
/macosx-10.10/WebInspectorUI-7600.1.17/Tools/PrettyPrinting/ |
H A D | css.js | 429 "page-policy", "pause", "pause-after", "pause-before", "perspective",
|
/macosx-10.10/WebInspectorUI-7600.1.17/UserInterface/External/CodeMirror/ |
H A D | css.js | 429 "page-policy", "pause", "pause-after", "pause-before", "perspective",
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | isakmp_quick.c | 77 #include "policy.h" 87 #include "policy.h" 1384 /* generate a policy template from peer's proposal */ 2116 * set policies into SPD if the policy is generated 2117 * from peer's policy. 2127 /* make inbound policy */ 2140 /* make forward policy if required */ 2153 /* make outbound policy */ 2407 * Then get remote's policy from SPD copied from kernel. 2462 /* get a destination address of a policy */ [all...] |
/macosx-10.10/xnu-2782.1.97/bsd/netinet/ |
H A D | ip_output.c | 1230 /* check policy */ 1231 switch (sp->policy) { 1251 /* acquire a policy */ 1268 printf("ip_output: Invalid policy found. %d\n", sp->policy);
|
/macosx-10.10/WebKit-7600.1.25/mac/Plugins/ |
H A D | WebNetscapePluginView.mm | 1280 - (void)_containerCheckResult:(PolicyAction)policy contextInfo:(id)contextInfo 1290 pluginCallback([self plugin], [contextInfo checkRequestID], (policy == PolicyUse), [contextInfo context]);
|
/macosx-10.10/xnu-2782.1.97/bsd/vm/ |
H A D | vm_unix.c | 1016 SYSCTL_PROC(_kern_tfp, KERN_TFP_POLICY, policy, CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED, 1017 &tfp_policy, sizeof(uint32_t), &sysctl_settfp_policy ,"I","policy");
|
/macosx-10.10/xnu-2782.1.97/tools/lldbmacros/ |
H A D | process.py | 236 policy flags: 1491 """ Routine to print the proc UUID policy table 1617 @header("{: <20s} {: <20s} {: <15s} {:<5s} {:<5s} {: <20s}".format("waitq", "interlock", "policy", "members", "threads", "eventmask")) 1643 out_string += format_string.format(waitq, unsigned(waitq.wq_interlock.lock_data), policy, 0, 0, unsigned(waitq.wq_eventmask))
|
/macosx-10.10/WebCore-7600.1.25/editing/ |
H A D | Editor.cpp | 921 bool Editor::dispatchCPPEvent(const AtomicString& eventType, DataTransferAccessPolicy policy) argument 927 RefPtr<DataTransfer> dataTransfer = DataTransfer::createForCopyAndPaste(policy); 932 if (noDefaultProcessing && policy == DataTransferAccessPolicy::Writable) {
|
/macosx-10.10/libdispatch-442.1.4/src/ |
H A D | queue.c | 1400 int policy; member in struct:__anon9496 1413 &_dispatch_mgr_sched.policy)); 1456 _dispatch_mgr_sched.tid, _dispatch_mgr_sched.policy,
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-74-OTAPKISigner.c | 892 SecPolicyRef policy = NULL; local 895 isnt(policy = SecPolicyCreateOTAPKISigner(), NULL, "create the OTAPKISigner policy"); 896 ok_status(SecCMSVerifyCopyDataAndAttributes(signed_plist_data, NULL, policy, &trustRef, &payload, NULL)); 954 ok_status(SecCMSVerifyCopyDataAndAttributes(signed_manifest_data, NULL, policy, &trustRef, &payload, NULL)); 982 CFReleaseSafe(policy);
|
H A D | si-66-smime.c | 2389 SecPolicyRef policy = NULL; local 2393 policy = SecPolicyCreateSMIME(kSecSignSMIMEUsage, CFSTR("Daly_c@apple.com")); 2394 ok_status(SecCMSVerifySignedData(signature, message, policy, &trust, NULL, NULL, NULL), "validate message"); 2402 CFReleaseNull(policy); 2475 policy = SecPolicyCreateSMIME(kSecSignSMIMEUsage, CFSTR("cbaray@applex3.apple.com")); 2480 ok_status(SecCMSVerifySignedData(sig, eml, policy, &trust, NULL, NULL, NULL), 2487 CFReleaseNull(policy); 2538 policy = SecPolicyCreateBasicX509(); 2539 ok(errSecDecode == SecCMSVerifySignedData(msg, NULL, policy, &trust, NULL, NULL, NULL), "decode signed receipt w/ special oid"); 2540 CFReleaseNull(policy); [all...] |
H A D | si-16-ec-certificate.c | 1097 SecPolicyRef policy = SecPolicyCreateSSL(false, NULL); local 1098 ok_status(SecTrustCreateWithCertificates(cert, policy, &trust), 1111 CFReleaseSafe(policy);
|
/macosx-10.10/xnu-2782.1.97/bsd/net/ |
H A D | dlil.c | 1224 thread_affinity_policy_data_t policy; local 1226 bzero(&policy, sizeof (policy)); 1227 policy.affinity_tag = tag; 1229 (thread_policy_t)&policy, THREAD_AFFINITY_POLICY_COUNT));
|
/macosx-10.10/WebCore-7600.1.25/dom/ |
H A D | Document.h | 865 void processReferrerPolicy(const String& policy); 1391 URL m_firstPartyForCookies; // The policy URL for third-party cookie blocking.
|
/macosx-10.10/bind9-45.101/bind9/bin/named/ |
H A D | server.c | 1456 policy_obj = cfg_tuple_get(rpz_obj, "policy"); 1458 new->policy = DNS_RPZ_POLICY_GIVEN; 1461 new->policy = dns_rpz_str2policy(str); 1462 INSIST(new->policy != DNS_RPZ_POLICY_ERROR); 1492 * Are we configured to with the reponse policy zone? 1523 if (new->policy == DNS_RPZ_POLICY_CNAME) { 2876 * Make the list of response policy zone names for views that 2882 result = ns_config_get(maps, "response-policy", &obj);
|
/macosx-10.10/files-662.1.1/private/etc/ |
H A D | services | 4 # Note that it is presently the policy of IANA to assign a single well-known 2899 passwrd-policy 1333/udp # Password Policy 2900 passwrd-policy 1333/tcp # Password Policy 7375 iph-policy-cli 2962/udp # IPH-POLICY-CLI 7376 iph-policy-cli 2962/tcp # IPH-POLICY-CLI 7377 iph-policy-adm 2963/udp # IPH-POLICY-ADM 7378 iph-policy-adm 2963/tcp # IPH-POLICY-ADM 9792 acp-policy 3824/tcp # Compute Pool Policy 9793 acp-policy 3824/udp # Compute Pool Policy
|
/macosx-10.10/xnu-2782.1.97/security/ |
H A D | mac_base.c | 67 * Kernel and userland interface to the framework, policy registration 125 "TrustedBSD MAC policy controls"); 163 * that if a dynamically loaded policy requests mbuf labels, it must 165 * were already in flight when the policy was loaded. Since the policy 181 * that if a dynamically loaded policy requests vnode labels, it must 183 * were already in flight when the policy was loaded. Since the policy 204 &mac_device_enforce, 0, "Enforce MAC policy on device operations"); 208 &mac_pipe_enforce, 0, "Enforce MAC policy o [all...] |
/macosx-10.10/vim-55/runtime/syntax/ |
H A D | sqlanywhere.vim | 434 syn keyword sqlKeyword pctfree plan policy populate port postfilter preceding precision
|
/macosx-10.10/xnu-2782.1.97/bsd/netinet6/ |
H A D | ip6_output.c | 551 /* get a security policy for this packet */ 567 /* check policy */ 568 switch (sp->policy) { 585 /* acquire a policy */ 598 printf("%s: Invalid policy found: %d\n", __func__, sp->policy);
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/ |
H A D | rbtdb.c | 376 * XXXJT: should we change the lock policy based on the refcount 4548 * Mark a database for response policy rewriting. 4564 * Search the CDIR block tree of a response policy tree of trees for all of 4567 * the earliest configured policy, 4571 * The caller must have already checked that any existing policy was not 4572 * configured earlier than this policy zone and does not have a higher 4639 if (st->m.policy != DNS_RPZ_POLICY_MISS && 4699 if (rpz->policy != DNS_RPZ_POLICY_GIVEN) { 4703 if (rpz->policy == DNS_RPZ_POLICY_DISABLED) { 4726 rpz_policy = rpz->policy; [all...] |
/macosx-10.10/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | mDNSMacOSX.c | 3656 SecPolicyRef policy; local 3657 err = SecPolicySearchCopyNext(searchRef, &policy); 3658 if (err || !policy) LogMsg("getCertChain: SecPolicySearchCopyNext() returned %d", (int) err); 3666 err = SecTrustCreateWithCertificates(wrappedCert, policy, &trust); 3701 CFRelease(policy); 7258 // Skip over TCP KeepAlive records if the policy prohibits it or if the interface does not support TCP Keepalive. 7301 // Skip over TCP KeepAlive records if the policy prohibits it or if the interface does not support TCP Keepalive 7369 // Check if the interface supports TCP Keepalives and the system policy says it is ok to offload TCP Keepalive records 7477 // Further policy decisions on whether to offload the records is handled during sleep processing.
|
/macosx-10.10/WebCore-7600.1.25/html/canvas/ |
H A D | WebGLRenderingContext.cpp | 410 WebGLLoadPolicy policy = page->mainFrame().loader().client().webGLPolicyForURL(topDocument.url()); local 412 if (policy == WebGLBlockCreation) { 413 LOG(WebGL, "The policy for this URL (%s) is to block WebGL.", topDocument.url().host().utf8().data()); 417 if (policy == WebGLPendingCreation) { 418 LOG(WebGL, "WebGL policy is pending. May need to be resolved later."); 441 LOG(WebGL, "Create a WebGL context that looks real, but will require a policy resolution if used."); 3368 LOG(WebGL, "Context is being used. Attempt to resolve the policy.");
|