/macosx-10.10/xnu-2782.1.97/osfmk/kern/ |
H A D | mk_sp.c | 46 #include <mach/policy.h> 66 * Set scheduling policy and parameters, both base and limit, for 67 * the given thread. Policy can be any policy implemented by the 74 policy_t policy, 87 if (invalid_policy(policy)) 92 switch (policy) { 170 result = thread_set_mode_and_absolute_pri(thread, policy, bas); 182 * Set scheduling policy and parameters, both base and limit, for 183 * the given thread. Policy must be a policy which is enabled for the 189 policy_t policy, 71 thread_set_policy( thread_t thread, processor_set_t pset, policy_t policy, policy_base_t base, mach_msg_type_number_t base_count, policy_limit_t limit, mach_msg_type_number_t limit_count) argument 187 thread_policy( thread_t thread, policy_t policy, policy_base_t base, mach_msg_type_number_t count, boolean_t set_limit) argument [all...] |
H A D | task_swap.c | 48 #include <mach/policy.h>
|
/macosx-10.10/WebKit2-7600.1.25/Shared/linux/SeccompFilters/ |
H A D | SyscallPolicy.cpp | 50 // The root directory policy needs to be set because it is the 71 PermissionMap::const_iterator policy = m_filePermission.find(String(canonicalPath)); local 72 if (policy != m_filePermission.end()) { 75 return (permission & policy->value) == permission; 78 // If not a directory neither a file with a policy defined, 90 PermissionMap::const_iterator policy = m_directoryPermission.find(String(canonicalPath)); local 91 while (policy == m_directoryPermission.end()) { 93 policy = m_directoryPermission.find(String(currentBaseDirectory)); 99 return (permission & policy->value) == permission; 134 // The root policy wil [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTool/ |
H A D | identity_find.c | 180 static void printIdentity(SecIdentityRef identity, SecPolicyRef policy, int ordinalValue) argument 225 // Default to X.509 Basic if no policy was specified 226 if (!policy) { 229 SecPolicySearchCopyNext(policySearch, &policy); 233 CFRetain(policy); 236 // Create the trust reference, given policy and certificates 244 status = SecTrustCreateWithCertificates((CFArrayRef)certificates, policy, &trust); 257 safe_CFRelease(&policy); 293 // get a policy ref for the specified policy OI 295 SecPolicyRef policy = NULL; local 401 SecPolicyRef policy = NULL; local [all...] |
/macosx-10.10/WTF-7600.1.24/wtf/text/ |
H A D | Base64.cpp | 95 static inline void base64EncodeInternal(const char* data, unsigned len, Vector<char>& out, Base64EncodePolicy policy, const char (&encodeMap)[64]) argument 114 bool insertLFs = (policy == Base64InsertLFs && outLength > 76); 150 if (policy == Base64URLPolicy) 160 String base64Encode(const void* data, unsigned length, Base64EncodePolicy policy) argument 163 base64EncodeInternal(static_cast<const char*>(data), length, result, policy, base64EncMap); local 167 void base64Encode(const void* data, unsigned len, Vector<char>& out, Base64EncodePolicy policy) argument 169 base64EncodeInternal(static_cast<const char*>(data), len, out, policy, base64EncMap); local 185 static inline bool base64DecodeInternal(const T* data, unsigned length, Vector<char>& out, Base64DecodePolicy policy, const char (&decodeMap)[128]) argument 201 if (policy == Base64FailOnInvalidCharacterOrExcessPadding && (length % 4 || equalsSignCount > 2)) 210 } else if (policy 251 base64Decode(const String& in, SignedOrUnsignedCharVectorAdapter out, Base64DecodePolicy policy) argument 259 base64Decode(const Vector<char>& in, SignedOrUnsignedCharVectorAdapter out, Base64DecodePolicy policy) argument 270 base64Decode(const char* data, unsigned len, SignedOrUnsignedCharVectorAdapter out, Base64DecodePolicy policy) argument [all...] |
/macosx-10.10/xnu-2782.1.97/bsd/kern/ |
H A D | process_policy.c | 30 * process policy syscall implementation 73 static int handle_lowresource(int scope, int action, int policy, int policy_subtype, user_addr_t attrp, proc_t proc, uint64_t target_threadid); 74 static int handle_resourceuse(int scope, int action, int policy, int policy_subtype, user_addr_t attrp, proc_t proc, uint64_t target_threadid); 75 static int handle_apptype(int scope, int action, int policy, int policy_subtype, user_addr_t attrp, proc_t proc, uint64_t target_threadid); 76 static int handle_boost(int scope, int action, int policy, int policy_subtype, user_addr_t attrp, proc_t proc, uint64_t target_threadid); 85 *int process_policy(int scope, int action, int policy, int policy_subtype, 88 *{ int process_policy(int scope, int action, int policy, int policy_subtype, 98 int policy = uap->policy; local 126 if ((policy ! 177 handle_lowresource(__unused int scope, int action, __unused int policy, int policy_subtype, __unused user_addr_t attrp, proc_t proc, __unused uint64_t target_threadid) argument 199 handle_resourceuse(__unused int scope, __unused int action, __unused int policy, int policy_subtype, user_addr_t attrp, proc_t proc, __unused uint64_t target_threadid) argument 293 handle_apptype( int scope, int action, __unused int policy, int policy_subtype, __unused user_addr_t attrp, proc_t target_proc, __unused uint64_t target_threadid) argument 378 handle_boost(int scope, int action, __unused int policy, int policy_subtype, __unused user_addr_t attrp, proc_t target_proc, __unused uint64_t target_threadid) argument [all...] |
/macosx-10.10/xnu-2782.1.97/bsd/net/ |
H A D | necp.c | 62 * kernel control socket to create high-level policy sessions, which 75 * can specify the sub-order for each policy it creates which will be 84 * and generate kernel policies. There are two phases of kernel policy 87 * 1. The session policy is parsed to create kernel policies at the socket 88 * and IP layers, when applicable. For example, a policy that requires 89 * all traffic from App1 to Pass will generate a socket kernel policy to 90 * match App1 and mark packets with ID1, and also an IP policy to match 93 * policy lists. 105 * The app layer map is used for policy checks coming in from user space, and is one 279 * A note on policy 'map 1210 struct necp_session_policy *policy = NULL; local 1378 struct necp_session_policy *policy = NULL; local 1525 struct necp_session_policy *policy = NULL; local 1580 struct necp_session_policy *policy = NULL; local 1624 struct necp_session_policy *policy; local 1728 struct necp_session_policy *policy = NULL; local 1743 necp_policy_get_result_type(struct necp_session_policy *policy) argument 1749 necp_policy_get_result_parameter_length(struct necp_session_policy *policy) argument 1755 necp_policy_get_result_parameter(struct necp_session_policy *policy, u_int8_t *parameter_buffer, size_t parameter_buffer_length) argument 1772 necp_policy_mark_for_deletion(struct necp_session *session, struct necp_session_policy *policy) argument 1790 struct necp_session_policy *policy = NULL; local 1801 necp_policy_delete(struct necp_session *session, struct necp_session_policy *policy) argument 1828 necp_policy_unapply(struct necp_session_policy *policy) argument 1898 necp_policy_apply(struct necp_session *session, struct necp_session_policy *policy) argument 2356 struct necp_session_policy *policy = NULL; local 2539 struct necp_kernel_socket_policy *policy = NULL; local 2567 struct necp_kernel_socket_policy *policy = NULL; local 2634 necp_kernel_socket_policy_is_unnecessary(struct necp_kernel_socket_policy *policy, struct necp_kernel_socket_policy **policy_array, int valid_indices) argument 3345 struct necp_kernel_ip_output_policy *policy = NULL; local 3368 struct necp_kernel_ip_output_policy *policy = NULL; local 3410 necp_kernel_ip_output_policy_is_unnecessary(struct necp_kernel_ip_output_policy *policy, struct necp_kernel_ip_output_policy **policy_array, int valid_indices) argument [all...] |
/macosx-10.10/ipsec-286.1.1/ipsec-tools/libipsec/ |
H A D | ipsec_dump_policy.c | 73 * policy is sadb_x_policy buffer. 78 ipsec_dump_policy(policy, delimiter) 79 ipsec_policy_t policy; 82 return ipsec_dump_policy1(policy, delimiter, 0); 86 ipsec_dump_policy_withports(policy, delimiter) 87 void *policy; 90 return ipsec_dump_policy1(policy, delimiter, 1); 94 ipsec_dump_policy1(policy, delimiter, withports) 95 void *policy; 99 struct sadb_x_policy *xpl = policy; [all...] |
/macosx-10.10/WebKit2-7600.1.25/UIProcess/ |
H A D | WebCookieManagerProxy.cpp | 152 void WebCookieManagerProxy::setHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument 155 persistHTTPCookieAcceptPolicy(policy); 158 context()->setInitialHTTPCookieAcceptPolicy(policy); 161 context()->sendToNetworkingProcessRelaunchingIfNecessary(Messages::WebCookieManager::SetHTTPCookieAcceptPolicy(policy)); 174 void WebCookieManagerProxy::didGetHTTPCookieAcceptPolicy(uint32_t policy, uint64_t callbackID) argument 182 callback->performCallbackWithReturnValue(policy);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecCMS.h | 58 @param policy specifies policy or array thereof should be used (optional). 75 CFTypeRef policy, SecTrustRef *trustref, 83 CFTypeRef policy, SecTrustRef *trustref, CFDataRef *attached_contents); 168 CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certificates,
|
/macosx-10.10/WebKit-7600.1.25/win/WebCoreSupport/ |
H A D | WebFrameNetworkingContext.cpp | 58 void WebFrameNetworkingContext::setCookieAcceptPolicyForAllContexts(WebKitCookieStorageAcceptPolicy policy) argument 61 CFHTTPCookieStorageSetCookieAcceptPolicy(cookieStorage.get(), policy); 64 CFHTTPCookieStorageSetCookieAcceptPolicy(privateSession()->cookieStorage().get(), policy);
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/ |
H A D | ipsecMessageTracer.h | 51 #define IPSECPOLICYTRACEREVENT(policy, eventCode, message, failure_reason) 62 #define IPSECPOLICYTRACEREVENT(policy, eventCode, message, failure_reason) ipsecPolicyTracerEvent(policy, eventCode, message, failure_reason)
|
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | modify_s.c | 52 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default")) 79 ext.data.u.policy = strdup(princ->policy); 80 if (ext.data.u.policy == NULL) { 84 /* This calls free_HDB_extension(), freeing ext.data.u.policy */
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certcrl/ |
H A D | script.h | 42 /* parse policy string; returns nonzero of not found */ 45 CertVerifyPolicy *policy);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/threadTest/ |
H A D | secTrustEval.cpp | 87 SecPolicyRef policy = NULL; local 92 NULL, // policy opts 99 ortn = SecPolicySearchCopyNext(policySearch, &policy); 107 ortn = SecTrustCreateWithCertificates(certs, policy, &secTrust); 123 CFRelease(policy);
|
/macosx-10.10/webdavfs-367/webdav_cert_ui.tproj/ |
H A D | Controller.m | 72 * Returns a copy of the SSL policy. 77 SecPolicyRef policy; 85 status = SecPolicySearchCopyNext(policy_search, &policy); 88 *ret_policy = policy; 182 SecPolicyRef policy; 189 status = SSLSecPolicyCopy(&policy); 192 status = SecTrustCreateWithCertificates(cert_list, policy, &trust); 227 [panel setPolicies:(id)policy]; 263 CFRelease(policy);
|
/macosx-10.10/xnu-2782.1.97/osfmk/mach/ |
H A D | policy.h | 63 * mach/policy.h 65 * Definitions for scheduing policy. 87 * policy 'class'. 97 * Check if policy is of 'class' fixed-priority. 102 * Check if policy is valid. 104 #define invalid_policy(policy) \ 105 ((policy) != POLICY_TIMESHARE && \ 106 (policy) != POLICY_RR && \ 107 (policy) != POLICY_FIFO) 111 * Types for TIMESHARE policy [all...] |
H A D | processor_set.defs | 99 * Enable policy for processor set 103 policy : int); 106 * Disable policy for processor set 110 policy : int; 129 * Allows control of enabled policies, and per-policy base and limit
|
/macosx-10.10/objc4-646/runtime/ |
H A D | objc-references.mm | 159 ObjcAssociation(uintptr_t policy, id value) : _policy(policy), _value(value) {} 162 uintptr_t policy() const { return _policy; } 210 // expanded policy bits. 223 uintptr_t policy = OBJC_ASSOCIATION_ASSIGN; 235 policy = entry.policy(); 236 if (policy & OBJC_ASSOCIATION_GETTER_RETAIN) ((id(*)(id, SEL))objc_msgSend)(value, SEL_retain); 240 if (value && (policy & OBJC_ASSOCIATION_GETTER_AUTORELEASE)) { 246 static id acquireValue(id value, uintptr_t policy) { [all...] |
/macosx-10.10/BerkeleyDB-21/db/tcl/ |
H A D | tcl_lock.c | 64 u_int32_t flag, policy; local 68 flag = policy = 0; 77 FLAG_CHECK(policy); 78 policy = DB_LOCK_DEFAULT; 81 FLAG_CHECK(policy); 82 policy = DB_LOCK_EXPIRE; 85 FLAG_CHECK(policy); 86 policy = DB_LOCK_MAXLOCKS; 89 FLAG_CHECK(policy); 90 policy [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/ |
H A D | slapd-ldapgluegroups.conf | 34 authz-policy to
|
H A D | slapd-ldapgluepeople.conf | 34 authz-policy to
|
H A D | slapd-whoami.conf | 33 authz-policy both
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecCertificateRequest.h | 70 Create a certificate request operation based on a policy and certificate 71 type. If a policy is not specified, one will be chosen for the caller. 75 @param policy A policy. 88 const CSSM_OID *policy, 151 @param policy A policy. 167 const CSSM_OID *policy, 177 Get policy-specific data following a SecCertificateRequestSubmit.
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecCertificateRequest.h | 70 Create a certificate request operation based on a policy and certificate 71 type. If a policy is not specified, one will be chosen for the caller. 75 @param policy A policy. 88 const CSSM_OID *policy, 151 @param policy A policy. 167 const CSSM_OID *policy, 177 Get policy-specific data following a SecCertificateRequestSubmit.
|