/macosx-10.10/xnu-2782.1.97/bsd/net/ |
H A D | netsrc.c | 141 struct in6_addrpolicy *policy; local 164 policy = in6_addrsel_lookup_policy(&v4entry); 165 if (policy->label != -1) { 166 nrp.nrp_label = policy->label; 167 nrp.nrp_precedence = policy->preced; 169 nrp.nrp_dstlabel = policy->label; 170 nrp.nrp_dstprecedence = policy->preced; 221 struct in6_addrpolicy *policy; local 236 policy = in6_addrsel_lookup_policy(&sin6); 237 if (policy [all...] |
/macosx-10.10/xnu-2782.1.97/libsyscall/mach/ |
H A D | thread_act.c | 35 thread_policy(thread_act_t thr_act, policy_t policy, policy_base_t base, mach_msg_type_number_t baseCnt, boolean_t set_limit) argument 39 kr = _kernelrpc_thread_policy(thr_act, policy, base, baseCnt, set_limit); 65 thread_set_policy(thread_act_t thr_act, processor_set_t pset, policy_t policy, policy_base_t base, mach_msg_type_number_t baseCnt, policy_limit_t limit, mach_msg_type_number_t limitCnt) argument 69 kr = _kernelrpc_thread_set_policy(thr_act, pset, policy, base, baseCnt, limit, limitCnt);
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/ |
H A D | applehelpers.h | 22 int odusers_isdisabled(CFDictionaryRef policy); 23 bool odusers_isadmin(CFDictionaryRef policy); 27 int odusers_successful_auth(struct berval *dn, CFDictionaryRef policy); 53 int odusers_accountpolicy_successful_auth(struct berval *dn, CFDictionaryRef policy); 54 int odusers_accountpolicy_failed_auth(struct berval *dn, CFDictionaryRef policy);
|
/macosx-10.10/WebCore-7600.1.25/dom/ |
H A D | SecurityContext.cpp | 79 SandboxFlags SecurityContext::parseSandboxPolicy(const String& policy, String& invalidTokensErrorMessage) argument 84 unsigned length = policy.length(); 89 while (start < length && isHTMLSpace(policy[start])) 94 while (end < length && !isHTMLSpace(policy[end])) 98 String sandboxToken = policy.substring(start, end - start);
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/rpz/ns3/ |
H A D | named.conf | 31 response-policy { 34 zone "bl-given" policy given; 35 zone "bl-passthru" policy passthru; 36 zone "bl-no-op" policy no-op; # obsolete for passthru 37 zone "bl-disabled" policy disabled; 38 zone "bl-nodata" policy nodata; 39 zone "bl-nxdomain" policy nxdomain; 40 zone "bl-cname" policy cname txt-only.tld2.; 41 zone "bl-wildcname" policy cname *.tld4.; 42 zone "bl-garden" policy cnam [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecCertificateRequest.cpp | 43 const CSSM_OID *policy, 53 Required(policy); 54 *certRequest = (new CertificateRequest(*policy, certificateType, requestType, 162 const CSSM_OID *policy, 173 Required(policy); 174 *certRequest = (new CertificateRequest(*policy, certificateType, requestType, 42 SecCertificateRequestCreate( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef privateKeyItemRef, SecKeyRef publicKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument 161 SecCertificateFindRequest( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef publicKeyItemRef, SecKeyRef privateKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument
|
H A D | SecTrustPriv.h | 54 @abstract Gets the user-specified trust settings of a certificate and policy. 56 @param policy A reference to a policy. 61 OSStatus SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) 66 @abstract Sets the user-specified trust settings of a certificate and policy. 68 @param policy A reference to a policy. 75 OSStatus SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) 80 @abstract Sets the user-specified trust settings of a certificate and policy. 82 @param policy [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecCertificateRequest.cpp | 43 const CSSM_OID *policy, 53 Required(policy); 54 *certRequest = (new CertificateRequest(*policy, certificateType, requestType, 162 const CSSM_OID *policy, 173 Required(policy); 174 *certRequest = (new CertificateRequest(*policy, certificateType, requestType, 42 SecCertificateRequestCreate( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef privateKeyItemRef, SecKeyRef publicKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument 161 SecCertificateFindRequest( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef publicKeyItemRef, SecKeyRef privateKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument
|
H A D | SecTrustPriv.h | 54 @abstract Gets the user-specified trust settings of a certificate and policy. 56 @param policy A reference to a policy. 61 OSStatus SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) 66 @abstract Sets the user-specified trust settings of a certificate and policy. 68 @param policy A reference to a policy. 75 OSStatus SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) 80 @abstract Sets the user-specified trust settings of a certificate and policy. 82 @param policy [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecCertificateRequest.cpp | 43 const CSSM_OID *policy, 53 Required(policy); 54 *certRequest = (new CertificateRequest(*policy, certificateType, requestType, 162 const CSSM_OID *policy, 173 Required(policy); 174 *certRequest = (new CertificateRequest(*policy, certificateType, requestType, 42 SecCertificateRequestCreate( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef privateKeyItemRef, SecKeyRef publicKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument 161 SecCertificateFindRequest( const CSSM_OID *policy, CSSM_CERT_TYPE certificateType, CSSM_TP_AUTHORITY_REQUEST_TYPE requestType, SecKeyRef publicKeyItemRef, SecKeyRef privateKeyItemRef, const SecCertificateRequestAttributeList* attributeList, SecCertificateRequestRef* certRequest) argument
|
H A D | SecTrustPriv.h | 54 @abstract Gets the user-specified trust settings of a certificate and policy. 56 @param policy A reference to a policy. 61 OSStatus SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) 66 @abstract Sets the user-specified trust settings of a certificate and policy. 68 @param policy A reference to a policy. 75 OSStatus SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) 80 @abstract Sets the user-specified trust settings of a certificate and policy. 82 @param policy [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-64-ossl-cms.c | 149 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 152 ok_status(SecCMSVerifyCopyDataAndAttributes(attached_signed_data, NULL, policy, &trust, NULL, NULL), "verify attached data"); 154 ok_status(SecCMSVerifyCopyDataAndAttributes(detached_signed_data, detached_data, policy, &trust, NULL, NULL), "verify detached data"); 156 ok_status(SecCMSVerifyCopyDataAndAttributes(attached_no_data_signed_data, NULL, policy, &trust, NULL, NULL), "verify attached no data"); 158 ok_status(SecCMSVerifyCopyDataAndAttributes(attached_no_data_signed_data, no_data, policy, &trust, NULL, NULL), "verify attached no data"); 191 CFRelease(policy);
|
/macosx-10.10/WebKit2-7600.1.25/WebProcess/InjectedBundle/ |
H A D | InjectedBundlePagePolicyClient.cpp | 45 WKBundlePagePolicyAction policy = m_client.decidePolicyForNavigationAction(toAPI(page), toAPI(frame), toAPI(action), toAPI(request.get()), &userDataToPass, m_client.base.clientInfo); local 47 return policy; 58 WKBundlePagePolicyAction policy = m_client.decidePolicyForNewWindowAction(toAPI(page), toAPI(frame), toAPI(action), toAPI(request.get()), toAPI(frameName.impl()), &userDataToPass, m_client.base.clientInfo); local 60 return policy; 72 WKBundlePagePolicyAction policy = m_client.decidePolicyForResponse(toAPI(page), toAPI(frame), toAPI(response.get()), toAPI(request.get()), &userDataToPass, m_client.base.clientInfo); local 74 return policy;
|
/macosx-10.10/xnu-2782.1.97/tools/tests/affinity/ |
H A D | tags.c | 45 thread_affinity_policy_data_t policy; local 47 policy.affinity_tag = tag; 50 (thread_policy_t) &policy, 63 thread_affinity_policy_data_t policy; local 68 (thread_policy_t) &policy, &count, &get_default); 74 return policy.affinity_tag;
|
/macosx-10.10/OpenSSL098-52/src/crypto/x509v3/ |
H A D | v3_pcia.c | 44 ASN1_OPT(PROXY_POLICY,policy,ASN1_OCTET_STRING)
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/ |
H A D | tpPolicies.h | 20 tpPolicies.h - TP module policy implementation 70 TPPolicy policy, 82 * Obtain policy-specific User Trust parameters 85 TPPolicy policy,
|
/macosx-10.10/WTF-7600.1.24/wtf/text/ |
H A D | Base64.h | 92 inline void base64Encode(ConstSignedOrUnsignedCharVectorAdapter in, Vector<char>& out, Base64EncodePolicy policy) argument 94 base64Encode(in.data(), in.size(), out, policy); 97 inline void base64Encode(const CString& in, Vector<char>& out, Base64EncodePolicy policy) argument 99 base64Encode(in.data(), in.length(), out, policy); 102 inline String base64Encode(ConstSignedOrUnsignedCharVectorAdapter in, Base64EncodePolicy policy) argument 104 return base64Encode(in.data(), in.size(), policy); 107 inline String base64Encode(const CString& in, Base64EncodePolicy policy) argument 109 return base64Encode(in.data(), in.length(), policy);
|
/macosx-10.10/WebCore-7600.1.25/platform/network/curl/ |
H A D | ResourceRequest.h | 50 ResourceRequest(const URL& url, const String& referrer, ResourceRequestCachePolicy policy = UseProtocolCachePolicy) 51 : ResourceRequestBase(url, policy)
|
/macosx-10.10/WebCore-7600.1.25/platform/network/win/ |
H A D | ResourceRequest.h | 45 ResourceRequest(const URL& url, const String& referrer, ResourceRequestCachePolicy policy = UseProtocolCachePolicy) 46 : ResourceRequestBase(url, policy)
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/efl/ |
H A D | ewk_cookie_manager.h | 79 typedef void (*Ewk_Cookie_Manager_Policy_Async_Get_Cb)(Ewk_Cookie_Accept_Policy policy, void *event_info); 113 * Set @a policy as the cookie acceptance policy for @a manager. 118 * @param policy a #Ewk_Cookie_Accept_Policy 121 EAPI void ewk_cookie_manager_accept_policy_set(Ewk_Cookie_Manager *manager, Ewk_Cookie_Accept_Policy policy); 124 * Asynchronously get the cookie acceptance policy of @a manager. 129 * @param callback The function to call when the policy is received.
|
/macosx-10.10/dtrace-147/test/tst/common/buffering/ |
H A D | tst.cputime.ksh | 66 printf("'%s' buffering policy took %d%% of CPU; ", 74 for policy in "fill ring switch"; do 75 script $policy
|
/macosx-10.10/system_cmds-643.1.1/mean.tproj/ |
H A D | mean.c | 41 thread_precedence_policy_data_t policy; local 91 policy.importance = -100; 93 policy.importance = 0; 98 (thread_policy_t) &policy,
|
/macosx-10.10/OpenPAM-20/openpam/lib/ |
H A D | openpam_load.c | 141 openpam_clear_chains(pam_chain_t *policy[]) argument 146 openpam_destroy_chain(policy[i]); 147 policy[i] = NULL;
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/Cocoa/ |
H A D | WKPreferences.mm | 116 static WebCore::SecurityOrigin::StorageBlockingPolicy toStorageBlockingPolicy(_WKStorageBlockingPolicy policy) 118 switch (policy) { 131 static _WKStorageBlockingPolicy toAPI(WebCore::SecurityOrigin::StorageBlockingPolicy policy) 133 switch (policy) { 151 - (void)_setStorageBlockingPolicy:(_WKStorageBlockingPolicy)policy 153 _preferences->setStorageBlockingPolicy(toStorageBlockingPolicy(policy));
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecPolicy.c | 169 /* Public policy names. */ 192 /* FIXME: this policy name should be deprecated and replaced with "kSecPolicyAppleIDValidationRecordSigning" */ 206 /* Private policy names */ 251 IDEA Store partial valid policy tree in each chain? Result tree pruning might make this not feasible unless you can pretend to prune the tree without actually deleting nodes and somehow still have shable nodes with parent chains (this assumes that chains will be built as cached things from the root down), and we can build something equivalent to rfc5280 in a tree of certs. So we need to maintain a cache of leaf->chain with this certificate as any_ca_cert->tree. Revocation status caching can be done in this cache as well, so maybe the cache should be in sqlite3, or at least written there before exit and querying of the cache could be done first on the in core (possibly CF or custom tree like structure) and secondarly on the sqlite3 backed store. We should choose the lowest memory footprint solution in my mind, while choosing a sqlite3 cache size that gives us a resonable io usage pattern. 275 ALTERNATIVE: A policy can have one or more sub-policies. Each sub-policy will be evaluated only after the parent policy succeeds. Subpolicies can be either required (making the parent policy fail) or optional making the parent policy succeed, but allowing the chainbuilder to continue building chains after an optional subpolicy failure in search of a chain for which the subpolicy also succeeded. Subpolicies can be dynamically added to the policy evaluatio 439 SecPolicyRef policy = (SecPolicyRef) cf; local 452 SecPolicyRef policy = (SecPolicyRef) cf; local 458 SecPolicyRef policy = (SecPolicyRef) cf; local 503 SecPolicyRef policy = NULL; local 694 SecPolicySetOid(SecPolicyRef policy, CFStringRef oid) argument 702 SecPolicySetOptionsValue(SecPolicyRef policy, CFStringRef key, CFTypeRef value) argument 789 SecPolicyCopyXPCObject(SecPolicyRef policy, CFErrorRef *error) argument 805 SecPolicyAppendToXPCArray(SecPolicyRef policy, xpc_object_t policies, CFErrorRef *error) argument 834 SecPolicyRef policy = NULL; local 865 SecPolicyRef policy = SecPolicyCreateWithXPCObject(xpc_array_get_value(xpc_policies, ix), error); local 2133 SecPolicyRef policy = SecPolicyCreateSSL(true, hostname); local [all...] |