Searched refs:policy (Results 76 - 100 of 479) sorted by relevance

1234567891011>>

/macosx-10.10/xnu-2782.1.97/osfmk/kern/
H A Dmk_sp.c46 #include <mach/policy.h>
66 * Set scheduling policy and parameters, both base and limit, for
67 * the given thread. Policy can be any policy implemented by the
74 policy_t policy,
87 if (invalid_policy(policy))
92 switch (policy) {
170 result = thread_set_mode_and_absolute_pri(thread, policy, bas);
182 * Set scheduling policy and parameters, both base and limit, for
183 * the given thread. Policy must be a policy which is enabled for the
189 policy_t policy,
71 thread_set_policy( thread_t thread, processor_set_t pset, policy_t policy, policy_base_t base, mach_msg_type_number_t base_count, policy_limit_t limit, mach_msg_type_number_t limit_count) argument
187 thread_policy( thread_t thread, policy_t policy, policy_base_t base, mach_msg_type_number_t count, boolean_t set_limit) argument
[all...]
H A Dtask_swap.c48 #include <mach/policy.h>
/macosx-10.10/WebKit2-7600.1.25/Shared/linux/SeccompFilters/
H A DSyscallPolicy.cpp50 // The root directory policy needs to be set because it is the
71 PermissionMap::const_iterator policy = m_filePermission.find(String(canonicalPath)); local
72 if (policy != m_filePermission.end()) {
75 return (permission & policy->value) == permission;
78 // If not a directory neither a file with a policy defined,
90 PermissionMap::const_iterator policy = m_directoryPermission.find(String(canonicalPath)); local
91 while (policy == m_directoryPermission.end()) {
93 policy = m_directoryPermission.find(String(currentBaseDirectory));
99 return (permission & policy->value) == permission;
134 // The root policy wil
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTool/
H A Didentity_find.c180 static void printIdentity(SecIdentityRef identity, SecPolicyRef policy, int ordinalValue) argument
225 // Default to X.509 Basic if no policy was specified
226 if (!policy) {
229 SecPolicySearchCopyNext(policySearch, &policy);
233 CFRetain(policy);
236 // Create the trust reference, given policy and certificates
244 status = SecTrustCreateWithCertificates((CFArrayRef)certificates, policy, &trust);
257 safe_CFRelease(&policy);
293 // get a policy ref for the specified policy OI
295 SecPolicyRef policy = NULL; local
401 SecPolicyRef policy = NULL; local
[all...]
/macosx-10.10/WTF-7600.1.24/wtf/text/
H A DBase64.cpp95 static inline void base64EncodeInternal(const char* data, unsigned len, Vector<char>& out, Base64EncodePolicy policy, const char (&encodeMap)[64]) argument
114 bool insertLFs = (policy == Base64InsertLFs && outLength > 76);
150 if (policy == Base64URLPolicy)
160 String base64Encode(const void* data, unsigned length, Base64EncodePolicy policy) argument
163 base64EncodeInternal(static_cast<const char*>(data), length, result, policy, base64EncMap); local
167 void base64Encode(const void* data, unsigned len, Vector<char>& out, Base64EncodePolicy policy) argument
169 base64EncodeInternal(static_cast<const char*>(data), len, out, policy, base64EncMap); local
185 static inline bool base64DecodeInternal(const T* data, unsigned length, Vector<char>& out, Base64DecodePolicy policy, const char (&decodeMap)[128]) argument
201 if (policy == Base64FailOnInvalidCharacterOrExcessPadding && (length % 4 || equalsSignCount > 2))
210 } else if (policy
251 base64Decode(const String& in, SignedOrUnsignedCharVectorAdapter out, Base64DecodePolicy policy) argument
259 base64Decode(const Vector<char>& in, SignedOrUnsignedCharVectorAdapter out, Base64DecodePolicy policy) argument
270 base64Decode(const char* data, unsigned len, SignedOrUnsignedCharVectorAdapter out, Base64DecodePolicy policy) argument
[all...]
/macosx-10.10/xnu-2782.1.97/bsd/kern/
H A Dprocess_policy.c30 * process policy syscall implementation
73 static int handle_lowresource(int scope, int action, int policy, int policy_subtype, user_addr_t attrp, proc_t proc, uint64_t target_threadid);
74 static int handle_resourceuse(int scope, int action, int policy, int policy_subtype, user_addr_t attrp, proc_t proc, uint64_t target_threadid);
75 static int handle_apptype(int scope, int action, int policy, int policy_subtype, user_addr_t attrp, proc_t proc, uint64_t target_threadid);
76 static int handle_boost(int scope, int action, int policy, int policy_subtype, user_addr_t attrp, proc_t proc, uint64_t target_threadid);
85 *int process_policy(int scope, int action, int policy, int policy_subtype,
88 *{ int process_policy(int scope, int action, int policy, int policy_subtype,
98 int policy = uap->policy; local
126 if ((policy !
177 handle_lowresource(__unused int scope, int action, __unused int policy, int policy_subtype, __unused user_addr_t attrp, proc_t proc, __unused uint64_t target_threadid) argument
199 handle_resourceuse(__unused int scope, __unused int action, __unused int policy, int policy_subtype, user_addr_t attrp, proc_t proc, __unused uint64_t target_threadid) argument
293 handle_apptype( int scope, int action, __unused int policy, int policy_subtype, __unused user_addr_t attrp, proc_t target_proc, __unused uint64_t target_threadid) argument
378 handle_boost(int scope, int action, __unused int policy, int policy_subtype, __unused user_addr_t attrp, proc_t target_proc, __unused uint64_t target_threadid) argument
[all...]
/macosx-10.10/xnu-2782.1.97/bsd/net/
H A Dnecp.c62 * kernel control socket to create high-level policy sessions, which
75 * can specify the sub-order for each policy it creates which will be
84 * and generate kernel policies. There are two phases of kernel policy
87 * 1. The session policy is parsed to create kernel policies at the socket
88 * and IP layers, when applicable. For example, a policy that requires
89 * all traffic from App1 to Pass will generate a socket kernel policy to
90 * match App1 and mark packets with ID1, and also an IP policy to match
93 * policy lists.
105 * The app layer map is used for policy checks coming in from user space, and is one
279 * A note on policy 'map
1210 struct necp_session_policy *policy = NULL; local
1378 struct necp_session_policy *policy = NULL; local
1525 struct necp_session_policy *policy = NULL; local
1580 struct necp_session_policy *policy = NULL; local
1624 struct necp_session_policy *policy; local
1728 struct necp_session_policy *policy = NULL; local
1743 necp_policy_get_result_type(struct necp_session_policy *policy) argument
1749 necp_policy_get_result_parameter_length(struct necp_session_policy *policy) argument
1755 necp_policy_get_result_parameter(struct necp_session_policy *policy, u_int8_t *parameter_buffer, size_t parameter_buffer_length) argument
1772 necp_policy_mark_for_deletion(struct necp_session *session, struct necp_session_policy *policy) argument
1790 struct necp_session_policy *policy = NULL; local
1801 necp_policy_delete(struct necp_session *session, struct necp_session_policy *policy) argument
1828 necp_policy_unapply(struct necp_session_policy *policy) argument
1898 necp_policy_apply(struct necp_session *session, struct necp_session_policy *policy) argument
2356 struct necp_session_policy *policy = NULL; local
2539 struct necp_kernel_socket_policy *policy = NULL; local
2567 struct necp_kernel_socket_policy *policy = NULL; local
2634 necp_kernel_socket_policy_is_unnecessary(struct necp_kernel_socket_policy *policy, struct necp_kernel_socket_policy **policy_array, int valid_indices) argument
3345 struct necp_kernel_ip_output_policy *policy = NULL; local
3368 struct necp_kernel_ip_output_policy *policy = NULL; local
3410 necp_kernel_ip_output_policy_is_unnecessary(struct necp_kernel_ip_output_policy *policy, struct necp_kernel_ip_output_policy **policy_array, int valid_indices) argument
[all...]
/macosx-10.10/ipsec-286.1.1/ipsec-tools/libipsec/
H A Dipsec_dump_policy.c73 * policy is sadb_x_policy buffer.
78 ipsec_dump_policy(policy, delimiter)
79 ipsec_policy_t policy;
82 return ipsec_dump_policy1(policy, delimiter, 0);
86 ipsec_dump_policy_withports(policy, delimiter)
87 void *policy;
90 return ipsec_dump_policy1(policy, delimiter, 1);
94 ipsec_dump_policy1(policy, delimiter, withports)
95 void *policy;
99 struct sadb_x_policy *xpl = policy;
[all...]
/macosx-10.10/WebKit2-7600.1.25/UIProcess/
H A DWebCookieManagerProxy.cpp152 void WebCookieManagerProxy::setHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument
155 persistHTTPCookieAcceptPolicy(policy);
158 context()->setInitialHTTPCookieAcceptPolicy(policy);
161 context()->sendToNetworkingProcessRelaunchingIfNecessary(Messages::WebCookieManager::SetHTTPCookieAcceptPolicy(policy));
174 void WebCookieManagerProxy::didGetHTTPCookieAcceptPolicy(uint32_t policy, uint64_t callbackID) argument
182 callback->performCallbackWithReturnValue(policy);
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecCMS.h58 @param policy specifies policy or array thereof should be used (optional).
75 CFTypeRef policy, SecTrustRef *trustref,
83 CFTypeRef policy, SecTrustRef *trustref, CFDataRef *attached_contents);
168 CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certificates,
/macosx-10.10/WebKit-7600.1.25/win/WebCoreSupport/
H A DWebFrameNetworkingContext.cpp58 void WebFrameNetworkingContext::setCookieAcceptPolicyForAllContexts(WebKitCookieStorageAcceptPolicy policy) argument
61 CFHTTPCookieStorageSetCookieAcceptPolicy(cookieStorage.get(), policy);
64 CFHTTPCookieStorageSetCookieAcceptPolicy(privateSession()->cookieStorage().get(), policy);
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/
H A DipsecMessageTracer.h51 #define IPSECPOLICYTRACEREVENT(policy, eventCode, message, failure_reason)
62 #define IPSECPOLICYTRACEREVENT(policy, eventCode, message, failure_reason) ipsecPolicyTracerEvent(policy, eventCode, message, failure_reason)
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dmodify_s.c52 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default"))
79 ext.data.u.policy = strdup(princ->policy);
80 if (ext.data.u.policy == NULL) {
84 /* This calls free_HDB_extension(), freeing ext.data.u.policy */
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certcrl/
H A Dscript.h42 /* parse policy string; returns nonzero of not found */
45 CertVerifyPolicy *policy);
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/threadTest/
H A DsecTrustEval.cpp87 SecPolicyRef policy = NULL; local
92 NULL, // policy opts
99 ortn = SecPolicySearchCopyNext(policySearch, &policy);
107 ortn = SecTrustCreateWithCertificates(certs, policy, &secTrust);
123 CFRelease(policy);
/macosx-10.10/webdavfs-367/webdav_cert_ui.tproj/
H A DController.m72 * Returns a copy of the SSL policy.
77 SecPolicyRef policy;
85 status = SecPolicySearchCopyNext(policy_search, &policy);
88 *ret_policy = policy;
182 SecPolicyRef policy;
189 status = SSLSecPolicyCopy(&policy);
192 status = SecTrustCreateWithCertificates(cert_list, policy, &trust);
227 [panel setPolicies:(id)policy];
263 CFRelease(policy);
/macosx-10.10/xnu-2782.1.97/osfmk/mach/
H A Dpolicy.h63 * mach/policy.h
65 * Definitions for scheduing policy.
87 * policy 'class'.
97 * Check if policy is of 'class' fixed-priority.
102 * Check if policy is valid.
104 #define invalid_policy(policy) \
105 ((policy) != POLICY_TIMESHARE && \
106 (policy) != POLICY_RR && \
107 (policy) != POLICY_FIFO)
111 * Types for TIMESHARE policy
[all...]
H A Dprocessor_set.defs99 * Enable policy for processor set
103 policy : int);
106 * Disable policy for processor set
110 policy : int;
129 * Allows control of enabled policies, and per-policy base and limit
/macosx-10.10/objc4-646/runtime/
H A Dobjc-references.mm159 ObjcAssociation(uintptr_t policy, id value) : _policy(policy), _value(value) {}
162 uintptr_t policy() const { return _policy; }
210 // expanded policy bits.
223 uintptr_t policy = OBJC_ASSOCIATION_ASSIGN;
235 policy = entry.policy();
236 if (policy & OBJC_ASSOCIATION_GETTER_RETAIN) ((id(*)(id, SEL))objc_msgSend)(value, SEL_retain);
240 if (value && (policy & OBJC_ASSOCIATION_GETTER_AUTORELEASE)) {
246 static id acquireValue(id value, uintptr_t policy) {
[all...]
/macosx-10.10/BerkeleyDB-21/db/tcl/
H A Dtcl_lock.c64 u_int32_t flag, policy; local
68 flag = policy = 0;
77 FLAG_CHECK(policy);
78 policy = DB_LOCK_DEFAULT;
81 FLAG_CHECK(policy);
82 policy = DB_LOCK_EXPIRE;
85 FLAG_CHECK(policy);
86 policy = DB_LOCK_MAXLOCKS;
89 FLAG_CHECK(policy);
90 policy
[all...]
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/
H A Dslapd-ldapgluegroups.conf34 authz-policy to
H A Dslapd-ldapgluepeople.conf34 authz-policy to
H A Dslapd-whoami.conf33 authz-policy both
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DSecCertificateRequest.h70 Create a certificate request operation based on a policy and certificate
71 type. If a policy is not specified, one will be chosen for the caller.
75 @param policy A policy.
88 const CSSM_OID *policy,
151 @param policy A policy.
167 const CSSM_OID *policy,
177 Get policy-specific data following a SecCertificateRequestSubmit.
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecCertificateRequest.h70 Create a certificate request operation based on a policy and certificate
71 type. If a policy is not specified, one will be chosen for the caller.
75 @param policy A policy.
88 const CSSM_OID *policy,
151 @param policy A policy.
167 const CSSM_OID *policy,
177 Get policy-specific data following a SecCertificateRequestSubmit.

Completed in 272 milliseconds

1234567891011>>