Searched refs:policy (Results 101 - 125 of 435) sorted by relevance

1234567891011>>

/macosx-10.9.5/WebCore-7537.78.1/platform/ios/
H A DClipboardIOS.h40 static PassRefPtr<ClipboardIOS> create(ClipboardType clipboardType, ClipboardAccessPolicy policy, Frame* frame) argument
42 return adoptRef(new ClipboardIOS(clipboardType, policy, frame));
/macosx-10.9.5/WebKit2-7537.78.2/WebProcess/Cookies/
H A DWebCookieManager.cpp102 void WebCookieManager::setHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument
104 platformSetHTTPCookieAcceptPolicy(policy);
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/examples/mime/
H A Dmaildemo.tcl15 # The use of SSL by our client can be controlled by a policy procedure. Using
19 proc policy {demoarg code diagnostic} { procedure
59 -tlspolicy [list policy $tok] \
/macosx-10.9.5/Heimdal-323.92.1/kadmin/
H A Dutil.c149 * try to parse the string `resp' into policy in `attr', also
157 parse_policy (const char *resp, char **policy, int *mask, int bit) argument
164 *policy = strdup(resp);
165 if (*policy == NULL) {
173 fprintf (stderr, "Policy is free string or \"none\" for no policy, "
174 "by default the \"default\" policy is used\n");
186 edit_policy (const char *prompt, char **policy, int *mask, int bit) argument
200 if (parse_policy (resp, policy, mask, bit) == 0)
456 ent->policy = strdup(default_ent->policy);
503 set_entry(krb5_context contextp, kadm5_principal_ent_t ent, int *mask, const char *max_ticket_life, const char *max_renewable_life, const char *expiration, const char *pw_expiration, const char *attributes, const char *policy) argument
[all...]
/macosx-10.9.5/WebKit-7537.78.2/win/
H A DWebMutableURLRequest.h37 inline WebCore::ResourceRequestCachePolicy core(WebURLRequestCachePolicy policy) argument
39 return static_cast<WebCore::ResourceRequestCachePolicy>(policy);
42 inline WebURLRequestCachePolicy kit(WebCore::ResourceRequestCachePolicy policy) argument
44 return static_cast<WebURLRequestCachePolicy>(policy);
127 /* [in] */ WebURLRequestCachePolicy policy);
/macosx-10.9.5/WebCore-7537.78.1/dom/
H A DClipboard.cpp59 Clipboard::Clipboard(ClipboardAccessPolicy policy, ClipboardType clipboardType argument
64 : m_policy(policy)
84 void Clipboard::setAccessPolicy(ClipboardAccessPolicy policy) argument
87 ASSERT(m_policy != ClipboardNumb || policy == ClipboardNumb);
88 m_policy = policy;
296 PassRefPtr<Clipboard> Clipboard::createForCopyAndPaste(ClipboardAccessPolicy policy) argument
298 return adoptRef(new Clipboard(policy, CopyAndPaste, policy == ClipboardWritable ? Pasteboard::createPrivate() : Pasteboard::createForCopyAndPaste()));
372 PassRefPtr<Clipboard> Clipboard::create(ClipboardAccessPolicy policy, DragData* dragData, Frame*) argument
374 return adoptRef(new Clipboard(policy, DragAndDro
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DTrustStore.cpp51 // Retrieve the trust setting for a (certificate, policy) pair.
53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument
58 if (Item item = findItem(cert, policy, keychainList)) {
99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument
109 if (Item item = findItem(cert, policy, searchList)) {
119 Item item = new UserTrustItem(cert, policy, trustData);
162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument
182 const CssmOid &policyOid = policy->oid();
H A DSecImportExport.c82 SecPolicyRef policy = NULL;
111 policy = SecPolicyCreateBasicX509();
112 if(!policy) goto out; //require(policy, out);
114 SecTrustCreateWithCertificates(eval_chain, policy, &trust);
133 CFReleaseSafe(policy);
250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
256 status = SecTrustCreateWithCertificates(certArray, policy, &trust);
257 if (policy) {
258 CFRelease(policy);
[all...]
H A DCertificateRequest.cpp42 * Within that dictionary is a set of per-policy dictionaries; the key in the
43 * top-level prefs for these dictionaries is the raw policy OID data encoded
46 * Within one per-policy dictionary exists a number of per-user dictionaries,
52 * Within the per-policy, per user dictionary are these two values, both stored
134 CertificateRequest::CertificateRequest(const CSSM_OID &policy, argument
144 mPolicy(mAlloc, policy.Data, policy.Length),
164 /* Validate policy OID. */
165 if(!(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_IDENTITY, &policy) ||
166 nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_EMAIL_SIGN, &policy) ||
273 CSSM_DATA &policy = mPolicy.get(); local
476 CSSM_DATA &policy = mPolicy.get(); local
[all...]
H A DSecPolicyPriv.h42 @discussion Predefined constants used to specify a policy.
63 @abstract Returns a copy of a policy reference based on certificate type and OID.
65 @param policyOID The OID of the policy you want to find. This is a required parameter. See oidsalg.h to see a list of policy OIDs.
66 @param policy The returned policy reference. This is a required parameter.
69 to obtain a policy reference, use one of the SecPolicyCreate* functions in SecPolicy.h.
71 OSStatus SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy)
81 to obtain a policy reference, use one of the SecPolicyCreate* functions in SecPolicy.h. (Note: there is normally
83 policy, a
[all...]
H A DTrust.h61 useAnchorsDefault, // default policy: trust built-in unless passed-in
67 useNetworkDefault, // default policy: network fetch enabled only for SSL
68 useNetworkDisabled, // explicitly disable network use for any policy
69 useNetworkEnabled // explicitly enable network use for any policy
78 void anchorPolicy(AnchorPolicy policy) { mAnchorPolicy = policy; } argument
79 void networkPolicy(NetworkPolicy policy) { mNetworkPolicy = policy; } argument
124 /* revocation policy support */
151 CFRef<CFArrayRef> mPolicies; // array of policy object
[all...]
H A DTrustItem.h59 UserTrustItem(Certificate *cert, Policy *policy, const TrustData &trust);
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DTrustStore.cpp51 // Retrieve the trust setting for a (certificate, policy) pair.
53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument
58 if (Item item = findItem(cert, policy, keychainList)) {
99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument
109 if (Item item = findItem(cert, policy, searchList)) {
119 Item item = new UserTrustItem(cert, policy, trustData);
162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument
182 const CssmOid &policyOid = policy->oid();
H A DSecImportExport.c82 SecPolicyRef policy = NULL;
111 policy = SecPolicyCreateBasicX509();
112 if(!policy) goto out; //require(policy, out);
114 SecTrustCreateWithCertificates(eval_chain, policy, &trust);
133 CFReleaseSafe(policy);
250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
256 status = SecTrustCreateWithCertificates(certArray, policy, &trust);
257 if (policy) {
258 CFRelease(policy);
[all...]
H A DCertificateRequest.cpp42 * Within that dictionary is a set of per-policy dictionaries; the key in the
43 * top-level prefs for these dictionaries is the raw policy OID data encoded
46 * Within one per-policy dictionary exists a number of per-user dictionaries,
52 * Within the per-policy, per user dictionary are these two values, both stored
134 CertificateRequest::CertificateRequest(const CSSM_OID &policy, argument
144 mPolicy(mAlloc, policy.Data, policy.Length),
164 /* Validate policy OID. */
165 if(!(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_IDENTITY, &policy) ||
166 nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_EMAIL_SIGN, &policy) ||
273 CSSM_DATA &policy = mPolicy.get(); local
476 CSSM_DATA &policy = mPolicy.get(); local
[all...]
H A DSecPolicyPriv.h42 @discussion Predefined constants used to specify a policy.
63 @abstract Returns a copy of a policy reference based on certificate type and OID.
65 @param policyOID The OID of the policy you want to find. This is a required parameter. See oidsalg.h to see a list of policy OIDs.
66 @param policy The returned policy reference. This is a required parameter.
69 to obtain a policy reference, use one of the SecPolicyCreate* functions in SecPolicy.h.
71 OSStatus SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy)
81 to obtain a policy reference, use one of the SecPolicyCreate* functions in SecPolicy.h. (Note: there is normally
83 policy, a
[all...]
H A DTrust.h61 useAnchorsDefault, // default policy: trust built-in unless passed-in
67 useNetworkDefault, // default policy: network fetch enabled only for SSL
68 useNetworkDisabled, // explicitly disable network use for any policy
69 useNetworkEnabled // explicitly enable network use for any policy
78 void anchorPolicy(AnchorPolicy policy) { mAnchorPolicy = policy; } argument
79 void networkPolicy(NetworkPolicy policy) { mNetworkPolicy = policy; } argument
124 /* revocation policy support */
151 CFRef<CFArrayRef> mPolicies; // array of policy object
[all...]
H A DTrustItem.h59 UserTrustItem(Certificate *cert, Policy *policy, const TrustData &trust);
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DTrustStore.cpp51 // Retrieve the trust setting for a (certificate, policy) pair.
53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument
58 if (Item item = findItem(cert, policy, keychainList)) {
99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument
109 if (Item item = findItem(cert, policy, searchList)) {
119 Item item = new UserTrustItem(cert, policy, trustData);
162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument
182 const CssmOid &policyOid = policy->oid();
H A DSecImportExport.c82 SecPolicyRef policy = NULL;
111 policy = SecPolicyCreateBasicX509();
112 if(!policy) goto out; //require(policy, out);
114 SecTrustCreateWithCertificates(eval_chain, policy, &trust);
133 CFReleaseSafe(policy);
250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
256 status = SecTrustCreateWithCertificates(certArray, policy, &trust);
257 if (policy) {
258 CFRelease(policy);
[all...]
H A DCertificateRequest.cpp42 * Within that dictionary is a set of per-policy dictionaries; the key in the
43 * top-level prefs for these dictionaries is the raw policy OID data encoded
46 * Within one per-policy dictionary exists a number of per-user dictionaries,
52 * Within the per-policy, per user dictionary are these two values, both stored
134 CertificateRequest::CertificateRequest(const CSSM_OID &policy, argument
144 mPolicy(mAlloc, policy.Data, policy.Length),
164 /* Validate policy OID. */
165 if(!(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_IDENTITY, &policy) ||
166 nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_EMAIL_SIGN, &policy) ||
273 CSSM_DATA &policy = mPolicy.get(); local
476 CSSM_DATA &policy = mPolicy.get(); local
[all...]
/macosx-10.9.5/SecurityTool-55115/
H A Dverify_cert.c66 const CSSM_OID *policy = &CSSMOID_APPLE_X509_BASIC; local
108 policy = policyStringToOid(optarg);
109 if(policy == NULL) {
183 policy,
184 NULL, // policy opts
198 /* per-policy options */
199 if(compareOids(policy, &CSSMOID_APPLE_TP_SSL) || compareOids(policy, &CSSMOID_APPLE_TP_APPLEID_SHARING)) {
215 if(compareOids(policy, &CSSMOID_APPLE_TP_SMIME)) {
/macosx-10.9.5/WebKit2-7537.78.2/UIProcess/API/gtk/
H A DWebKitCookieManager.cpp43 * acceptance policy, with webkit_cookie_manager_get_accept_policy()
141 * @policy: a #WebKitCookieAcceptPolicy
143 * Set the cookie acceptance policy of @cookie_manager as @policy.
145 void webkit_cookie_manager_set_accept_policy(WebKitCookieManager* manager, WebKitCookieAcceptPolicy policy) argument
149 manager->priv->webCookieManager->setHTTPCookieAcceptPolicy(policy);
153 WKHTTPCookieAcceptPolicy policy; member in struct:GetAcceptPolicyAsyncData
158 static void webkitCookieManagerGetAcceptPolicyCallback(WKHTTPCookieAcceptPolicy policy, WKErrorRef, void* context) argument
166 data->policy = policy;
[all...]
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/include/dns/
H A Drpz.h50 DNS_RPZ_POLICY_GIVEN = 0, /* 'given': what policy record says */
63 * Specify a response policy zone.
72 dns_rpz_policy_t policy; /* DNS_RPZ_POLICY_GIVEN or override */ member in struct:dns_rpz_zone
77 * Radix trees for response policy IP addresses.
82 * context for finding the best policy
92 # define DNS_RPZ_HAVE_IP 0x0040 /* a policy zone has IP addresses */
103 dns_rpz_policy_t policy; member in struct:__anon6520::__anon6521
148 * So various response policy zone messages can be turned up or down.
163 dns_rpz_policy2str(dns_rpz_policy_t policy);
/macosx-10.9.5/bind9-45.100/bind9/lib/isc/tests/
H A Dsymtab_test.c53 isc_symexists_t policy = isc_symexists_reject; local
79 result = isc_symtab_define(st, key, 1, value, policy);
96 result = isc_symtab_define(st, key, 1, value, policy);

Completed in 141 milliseconds

1234567891011>>