Searched refs:policy (Results 51 - 75 of 479) sorted by relevance

1234567891011>>

/macosx-10.10/xnu-2782.1.97/bsd/net/
H A Dnetsrc.c141 struct in6_addrpolicy *policy; local
164 policy = in6_addrsel_lookup_policy(&v4entry);
165 if (policy->label != -1) {
166 nrp.nrp_label = policy->label;
167 nrp.nrp_precedence = policy->preced;
169 nrp.nrp_dstlabel = policy->label;
170 nrp.nrp_dstprecedence = policy->preced;
221 struct in6_addrpolicy *policy; local
236 policy = in6_addrsel_lookup_policy(&sin6);
237 if (policy
[all...]
/macosx-10.10/xnu-2782.1.97/libsyscall/mach/
H A Dthread_act.c35 thread_policy(thread_act_t thr_act, policy_t policy, policy_base_t base, mach_msg_type_number_t baseCnt, boolean_t set_limit) argument
39 kr = _kernelrpc_thread_policy(thr_act, policy, base, baseCnt, set_limit);
65 thread_set_policy(thread_act_t thr_act, processor_set_t pset, policy_t policy, policy_base_t base, mach_msg_type_number_t baseCnt, policy_limit_t limit, mach_msg_type_number_t limitCnt) argument
69 kr = _kernelrpc_thread_set_policy(thr_act, pset, policy, base, baseCnt, limit, limitCnt);
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/
H A Dapplehelpers.h22 int odusers_isdisabled(CFDictionaryRef policy);
23 bool odusers_isadmin(CFDictionaryRef policy);
27 int odusers_successful_auth(struct berval *dn, CFDictionaryRef policy);
53 int odusers_accountpolicy_successful_auth(struct berval *dn, CFDictionaryRef policy);
54 int odusers_accountpolicy_failed_auth(struct berval *dn, CFDictionaryRef policy);
/macosx-10.10/WebCore-7600.1.25/dom/
H A DSecurityContext.cpp79 SandboxFlags SecurityContext::parseSandboxPolicy(const String& policy, String& invalidTokensErrorMessage) argument
84 unsigned length = policy.length();
89 while (start < length && isHTMLSpace(policy[start]))
94 while (end < length && !isHTMLSpace(policy[end]))
98 String sandboxToken = policy.substring(start, end - start);
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/rpz/ns3/
H A Dnamed.conf31 response-policy {
34 zone "bl-given" policy given;
35 zone "bl-passthru" policy passthru;
36 zone "bl-no-op" policy no-op; # obsolete for passthru
37 zone "bl-disabled" policy disabled;
38 zone "bl-nodata" policy nodata;
39 zone "bl-nxdomain" policy nxdomain;
40 zone "bl-cname" policy cname txt-only.tld2.;
41 zone "bl-wildcname" policy cname *.tld4.;
42 zone "bl-garden" policy cnam
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DSecCertificateRequest.cpp43 const CSSM_OID *policy,
53 Required(policy);
54 *certRequest = (new CertificateRequest(*policy, certificateType, requestType,
162 const CSSM_OID *policy,
173 Required(policy);
174 *certRequest = (new CertificateRequest(*policy, certificateType, requestType,
42 SecCertificateRequestCreate( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef privateKeyItemRef, SecKeyRef publicKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument
161 SecCertificateFindRequest( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef publicKeyItemRef, SecKeyRef privateKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument
H A DSecTrustPriv.h54 @abstract Gets the user-specified trust settings of a certificate and policy.
56 @param policy A reference to a policy.
61 OSStatus SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting)
66 @abstract Sets the user-specified trust settings of a certificate and policy.
68 @param policy A reference to a policy.
75 OSStatus SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting)
80 @abstract Sets the user-specified trust settings of a certificate and policy.
82 @param policy
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecCertificateRequest.cpp43 const CSSM_OID *policy,
53 Required(policy);
54 *certRequest = (new CertificateRequest(*policy, certificateType, requestType,
162 const CSSM_OID *policy,
173 Required(policy);
174 *certRequest = (new CertificateRequest(*policy, certificateType, requestType,
42 SecCertificateRequestCreate( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef privateKeyItemRef, SecKeyRef publicKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument
161 SecCertificateFindRequest( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef publicKeyItemRef, SecKeyRef privateKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument
H A DSecTrustPriv.h54 @abstract Gets the user-specified trust settings of a certificate and policy.
56 @param policy A reference to a policy.
61 OSStatus SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting)
66 @abstract Sets the user-specified trust settings of a certificate and policy.
68 @param policy A reference to a policy.
75 OSStatus SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting)
80 @abstract Sets the user-specified trust settings of a certificate and policy.
82 @param policy
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecCertificateRequest.cpp43 const CSSM_OID *policy,
53 Required(policy);
54 *certRequest = (new CertificateRequest(*policy, certificateType, requestType,
162 const CSSM_OID *policy,
173 Required(policy);
174 *certRequest = (new CertificateRequest(*policy, certificateType, requestType,
42 SecCertificateRequestCreate( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef privateKeyItemRef, SecKeyRef publicKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument
161 SecCertificateFindRequest( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef publicKeyItemRef, SecKeyRef privateKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument
H A DSecTrustPriv.h54 @abstract Gets the user-specified trust settings of a certificate and policy.
56 @param policy A reference to a policy.
61 OSStatus SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting)
66 @abstract Sets the user-specified trust settings of a certificate and policy.
68 @param policy A reference to a policy.
75 OSStatus SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting)
80 @abstract Sets the user-specified trust settings of a certificate and policy.
82 @param policy
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-64-ossl-cms.c149 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
152 ok_status(SecCMSVerifyCopyDataAndAttributes(attached_signed_data, NULL, policy, &trust, NULL, NULL), "verify attached data");
154 ok_status(SecCMSVerifyCopyDataAndAttributes(detached_signed_data, detached_data, policy, &trust, NULL, NULL), "verify detached data");
156 ok_status(SecCMSVerifyCopyDataAndAttributes(attached_no_data_signed_data, NULL, policy, &trust, NULL, NULL), "verify attached no data");
158 ok_status(SecCMSVerifyCopyDataAndAttributes(attached_no_data_signed_data, no_data, policy, &trust, NULL, NULL), "verify attached no data");
191 CFRelease(policy);
/macosx-10.10/WebKit2-7600.1.25/WebProcess/InjectedBundle/
H A DInjectedBundlePagePolicyClient.cpp45 WKBundlePagePolicyAction policy = m_client.decidePolicyForNavigationAction(toAPI(page), toAPI(frame), toAPI(action), toAPI(request.get()), &userDataToPass, m_client.base.clientInfo); local
47 return policy;
58 WKBundlePagePolicyAction policy = m_client.decidePolicyForNewWindowAction(toAPI(page), toAPI(frame), toAPI(action), toAPI(request.get()), toAPI(frameName.impl()), &userDataToPass, m_client.base.clientInfo); local
60 return policy;
72 WKBundlePagePolicyAction policy = m_client.decidePolicyForResponse(toAPI(page), toAPI(frame), toAPI(response.get()), toAPI(request.get()), &userDataToPass, m_client.base.clientInfo); local
74 return policy;
/macosx-10.10/xnu-2782.1.97/tools/tests/affinity/
H A Dtags.c45 thread_affinity_policy_data_t policy; local
47 policy.affinity_tag = tag;
50 (thread_policy_t) &policy,
63 thread_affinity_policy_data_t policy; local
68 (thread_policy_t) &policy, &count, &get_default);
74 return policy.affinity_tag;
/macosx-10.10/OpenSSL098-52/src/crypto/x509v3/
H A Dv3_pcia.c44 ASN1_OPT(PROXY_POLICY,policy,ASN1_OCTET_STRING)
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/
H A DtpPolicies.h20 tpPolicies.h - TP module policy implementation
70 TPPolicy policy,
82 * Obtain policy-specific User Trust parameters
85 TPPolicy policy,
/macosx-10.10/WTF-7600.1.24/wtf/text/
H A DBase64.h92 inline void base64Encode(ConstSignedOrUnsignedCharVectorAdapter in, Vector<char>& out, Base64EncodePolicy policy) argument
94 base64Encode(in.data(), in.size(), out, policy);
97 inline void base64Encode(const CString& in, Vector<char>& out, Base64EncodePolicy policy) argument
99 base64Encode(in.data(), in.length(), out, policy);
102 inline String base64Encode(ConstSignedOrUnsignedCharVectorAdapter in, Base64EncodePolicy policy) argument
104 return base64Encode(in.data(), in.size(), policy);
107 inline String base64Encode(const CString& in, Base64EncodePolicy policy) argument
109 return base64Encode(in.data(), in.length(), policy);
/macosx-10.10/WebCore-7600.1.25/platform/network/curl/
H A DResourceRequest.h50 ResourceRequest(const URL& url, const String& referrer, ResourceRequestCachePolicy policy = UseProtocolCachePolicy)
51 : ResourceRequestBase(url, policy)
/macosx-10.10/WebCore-7600.1.25/platform/network/win/
H A DResourceRequest.h45 ResourceRequest(const URL& url, const String& referrer, ResourceRequestCachePolicy policy = UseProtocolCachePolicy)
46 : ResourceRequestBase(url, policy)
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/efl/
H A Dewk_cookie_manager.h79 typedef void (*Ewk_Cookie_Manager_Policy_Async_Get_Cb)(Ewk_Cookie_Accept_Policy policy, void *event_info);
113 * Set @a policy as the cookie acceptance policy for @a manager.
118 * @param policy a #Ewk_Cookie_Accept_Policy
121 EAPI void ewk_cookie_manager_accept_policy_set(Ewk_Cookie_Manager *manager, Ewk_Cookie_Accept_Policy policy);
124 * Asynchronously get the cookie acceptance policy of @a manager.
129 * @param callback The function to call when the policy is received.
/macosx-10.10/dtrace-147/test/tst/common/buffering/
H A Dtst.cputime.ksh66 printf("'%s' buffering policy took %d%% of CPU; ",
74 for policy in "fill ring switch"; do
75 script $policy
/macosx-10.10/system_cmds-643.1.1/mean.tproj/
H A Dmean.c41 thread_precedence_policy_data_t policy; local
91 policy.importance = -100;
93 policy.importance = 0;
98 (thread_policy_t) &policy,
/macosx-10.10/OpenPAM-20/openpam/lib/
H A Dopenpam_load.c141 openpam_clear_chains(pam_chain_t *policy[]) argument
146 openpam_destroy_chain(policy[i]);
147 policy[i] = NULL;
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/Cocoa/
H A DWKPreferences.mm116 static WebCore::SecurityOrigin::StorageBlockingPolicy toStorageBlockingPolicy(_WKStorageBlockingPolicy policy)
118 switch (policy) {
131 static _WKStorageBlockingPolicy toAPI(WebCore::SecurityOrigin::StorageBlockingPolicy policy)
133 switch (policy) {
151 - (void)_setStorageBlockingPolicy:(_WKStorageBlockingPolicy)policy
153 _preferences->setStorageBlockingPolicy(toStorageBlockingPolicy(policy));
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecPolicy.c169 /* Public policy names. */
192 /* FIXME: this policy name should be deprecated and replaced with "kSecPolicyAppleIDValidationRecordSigning" */
206 /* Private policy names */
251 IDEA Store partial valid policy tree in each chain? Result tree pruning might make this not feasible unless you can pretend to prune the tree without actually deleting nodes and somehow still have shable nodes with parent chains (this assumes that chains will be built as cached things from the root down), and we can build something equivalent to rfc5280 in a tree of certs. So we need to maintain a cache of leaf->chain with this certificate as any_ca_cert->tree. Revocation status caching can be done in this cache as well, so maybe the cache should be in sqlite3, or at least written there before exit and querying of the cache could be done first on the in core (possibly CF or custom tree like structure) and secondarly on the sqlite3 backed store. We should choose the lowest memory footprint solution in my mind, while choosing a sqlite3 cache size that gives us a resonable io usage pattern.
275 ALTERNATIVE: A policy can have one or more sub-policies. Each sub-policy will be evaluated only after the parent policy succeeds. Subpolicies can be either required (making the parent policy fail) or optional making the parent policy succeed, but allowing the chainbuilder to continue building chains after an optional subpolicy failure in search of a chain for which the subpolicy also succeeded. Subpolicies can be dynamically added to the policy evaluatio
439 SecPolicyRef policy = (SecPolicyRef) cf; local
452 SecPolicyRef policy = (SecPolicyRef) cf; local
458 SecPolicyRef policy = (SecPolicyRef) cf; local
503 SecPolicyRef policy = NULL; local
694 SecPolicySetOid(SecPolicyRef policy, CFStringRef oid) argument
702 SecPolicySetOptionsValue(SecPolicyRef policy, CFStringRef key, CFTypeRef value) argument
789 SecPolicyCopyXPCObject(SecPolicyRef policy, CFErrorRef *error) argument
805 SecPolicyAppendToXPCArray(SecPolicyRef policy, xpc_object_t policies, CFErrorRef *error) argument
834 SecPolicyRef policy = NULL; local
865 SecPolicyRef policy = SecPolicyCreateWithXPCObject(xpc_array_get_value(xpc_policies, ix), error); local
2133 SecPolicyRef policy = SecPolicyCreateSSL(true, hostname); local
[all...]

Completed in 244 milliseconds

1234567891011>>