/macosx-10.9.5/WebCore-7537.78.1/platform/ios/ |
H A D | ClipboardIOS.h | 40 static PassRefPtr<ClipboardIOS> create(ClipboardType clipboardType, ClipboardAccessPolicy policy, Frame* frame) argument 42 return adoptRef(new ClipboardIOS(clipboardType, policy, frame));
|
/macosx-10.9.5/WebKit2-7537.78.2/WebProcess/Cookies/ |
H A D | WebCookieManager.cpp | 102 void WebCookieManager::setHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument 104 platformSetHTTPCookieAcceptPolicy(policy);
|
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/examples/mime/ |
H A D | maildemo.tcl | 15 # The use of SSL by our client can be controlled by a policy procedure. Using 19 proc policy {demoarg code diagnostic} { procedure 59 -tlspolicy [list policy $tok] \
|
/macosx-10.9.5/Heimdal-323.92.1/kadmin/ |
H A D | util.c | 149 * try to parse the string `resp' into policy in `attr', also 157 parse_policy (const char *resp, char **policy, int *mask, int bit) argument 164 *policy = strdup(resp); 165 if (*policy == NULL) { 173 fprintf (stderr, "Policy is free string or \"none\" for no policy, " 174 "by default the \"default\" policy is used\n"); 186 edit_policy (const char *prompt, char **policy, int *mask, int bit) argument 200 if (parse_policy (resp, policy, mask, bit) == 0) 456 ent->policy = strdup(default_ent->policy); 503 set_entry(krb5_context contextp, kadm5_principal_ent_t ent, int *mask, const char *max_ticket_life, const char *max_renewable_life, const char *expiration, const char *pw_expiration, const char *attributes, const char *policy) argument [all...] |
/macosx-10.9.5/WebKit-7537.78.2/win/ |
H A D | WebMutableURLRequest.h | 37 inline WebCore::ResourceRequestCachePolicy core(WebURLRequestCachePolicy policy) argument 39 return static_cast<WebCore::ResourceRequestCachePolicy>(policy); 42 inline WebURLRequestCachePolicy kit(WebCore::ResourceRequestCachePolicy policy) argument 44 return static_cast<WebURLRequestCachePolicy>(policy); 127 /* [in] */ WebURLRequestCachePolicy policy);
|
/macosx-10.9.5/WebCore-7537.78.1/dom/ |
H A D | Clipboard.cpp | 59 Clipboard::Clipboard(ClipboardAccessPolicy policy, ClipboardType clipboardType argument 64 : m_policy(policy) 84 void Clipboard::setAccessPolicy(ClipboardAccessPolicy policy) argument 87 ASSERT(m_policy != ClipboardNumb || policy == ClipboardNumb); 88 m_policy = policy; 296 PassRefPtr<Clipboard> Clipboard::createForCopyAndPaste(ClipboardAccessPolicy policy) argument 298 return adoptRef(new Clipboard(policy, CopyAndPaste, policy == ClipboardWritable ? Pasteboard::createPrivate() : Pasteboard::createForCopyAndPaste())); 372 PassRefPtr<Clipboard> Clipboard::create(ClipboardAccessPolicy policy, DragData* dragData, Frame*) argument 374 return adoptRef(new Clipboard(policy, DragAndDro [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | TrustStore.cpp | 51 // Retrieve the trust setting for a (certificate, policy) pair. 53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument 58 if (Item item = findItem(cert, policy, keychainList)) { 99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument 109 if (Item item = findItem(cert, policy, searchList)) { 119 Item item = new UserTrustItem(cert, policy, trustData); 162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument 182 const CssmOid &policyOid = policy->oid();
|
H A D | SecImportExport.c | 82 SecPolicyRef policy = NULL; 111 policy = SecPolicyCreateBasicX509(); 112 if(!policy) goto out; //require(policy, out); 114 SecTrustCreateWithCertificates(eval_chain, policy, &trust); 133 CFReleaseSafe(policy); 250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 256 status = SecTrustCreateWithCertificates(certArray, policy, &trust); 257 if (policy) { 258 CFRelease(policy); [all...] |
H A D | CertificateRequest.cpp | 42 * Within that dictionary is a set of per-policy dictionaries; the key in the 43 * top-level prefs for these dictionaries is the raw policy OID data encoded 46 * Within one per-policy dictionary exists a number of per-user dictionaries, 52 * Within the per-policy, per user dictionary are these two values, both stored 134 CertificateRequest::CertificateRequest(const CSSM_OID &policy, argument 144 mPolicy(mAlloc, policy.Data, policy.Length), 164 /* Validate policy OID. */ 165 if(!(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_IDENTITY, &policy) || 166 nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_EMAIL_SIGN, &policy) || 273 CSSM_DATA &policy = mPolicy.get(); local 476 CSSM_DATA &policy = mPolicy.get(); local [all...] |
H A D | SecPolicyPriv.h | 42 @discussion Predefined constants used to specify a policy. 63 @abstract Returns a copy of a policy reference based on certificate type and OID. 65 @param policyOID The OID of the policy you want to find. This is a required parameter. See oidsalg.h to see a list of policy OIDs. 66 @param policy The returned policy reference. This is a required parameter. 69 to obtain a policy reference, use one of the SecPolicyCreate* functions in SecPolicy.h. 71 OSStatus SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy) 81 to obtain a policy reference, use one of the SecPolicyCreate* functions in SecPolicy.h. (Note: there is normally 83 policy, a [all...] |
H A D | Trust.h | 61 useAnchorsDefault, // default policy: trust built-in unless passed-in 67 useNetworkDefault, // default policy: network fetch enabled only for SSL 68 useNetworkDisabled, // explicitly disable network use for any policy 69 useNetworkEnabled // explicitly enable network use for any policy 78 void anchorPolicy(AnchorPolicy policy) { mAnchorPolicy = policy; } argument 79 void networkPolicy(NetworkPolicy policy) { mNetworkPolicy = policy; } argument 124 /* revocation policy support */ 151 CFRef<CFArrayRef> mPolicies; // array of policy object [all...] |
H A D | TrustItem.h | 59 UserTrustItem(Certificate *cert, Policy *policy, const TrustData &trust);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | TrustStore.cpp | 51 // Retrieve the trust setting for a (certificate, policy) pair. 53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument 58 if (Item item = findItem(cert, policy, keychainList)) { 99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument 109 if (Item item = findItem(cert, policy, searchList)) { 119 Item item = new UserTrustItem(cert, policy, trustData); 162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument 182 const CssmOid &policyOid = policy->oid();
|
H A D | SecImportExport.c | 82 SecPolicyRef policy = NULL; 111 policy = SecPolicyCreateBasicX509(); 112 if(!policy) goto out; //require(policy, out); 114 SecTrustCreateWithCertificates(eval_chain, policy, &trust); 133 CFReleaseSafe(policy); 250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 256 status = SecTrustCreateWithCertificates(certArray, policy, &trust); 257 if (policy) { 258 CFRelease(policy); [all...] |
H A D | CertificateRequest.cpp | 42 * Within that dictionary is a set of per-policy dictionaries; the key in the 43 * top-level prefs for these dictionaries is the raw policy OID data encoded 46 * Within one per-policy dictionary exists a number of per-user dictionaries, 52 * Within the per-policy, per user dictionary are these two values, both stored 134 CertificateRequest::CertificateRequest(const CSSM_OID &policy, argument 144 mPolicy(mAlloc, policy.Data, policy.Length), 164 /* Validate policy OID. */ 165 if(!(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_IDENTITY, &policy) || 166 nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_EMAIL_SIGN, &policy) || 273 CSSM_DATA &policy = mPolicy.get(); local 476 CSSM_DATA &policy = mPolicy.get(); local [all...] |
H A D | SecPolicyPriv.h | 42 @discussion Predefined constants used to specify a policy. 63 @abstract Returns a copy of a policy reference based on certificate type and OID. 65 @param policyOID The OID of the policy you want to find. This is a required parameter. See oidsalg.h to see a list of policy OIDs. 66 @param policy The returned policy reference. This is a required parameter. 69 to obtain a policy reference, use one of the SecPolicyCreate* functions in SecPolicy.h. 71 OSStatus SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy) 81 to obtain a policy reference, use one of the SecPolicyCreate* functions in SecPolicy.h. (Note: there is normally 83 policy, a [all...] |
H A D | Trust.h | 61 useAnchorsDefault, // default policy: trust built-in unless passed-in 67 useNetworkDefault, // default policy: network fetch enabled only for SSL 68 useNetworkDisabled, // explicitly disable network use for any policy 69 useNetworkEnabled // explicitly enable network use for any policy 78 void anchorPolicy(AnchorPolicy policy) { mAnchorPolicy = policy; } argument 79 void networkPolicy(NetworkPolicy policy) { mNetworkPolicy = policy; } argument 124 /* revocation policy support */ 151 CFRef<CFArrayRef> mPolicies; // array of policy object [all...] |
H A D | TrustItem.h | 59 UserTrustItem(Certificate *cert, Policy *policy, const TrustData &trust);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | TrustStore.cpp | 51 // Retrieve the trust setting for a (certificate, policy) pair. 53 SecTrustUserSetting TrustStore::find(Certificate *cert, Policy *policy, argument 58 if (Item item = findItem(cert, policy, keychainList)) { 99 void TrustStore::assign(Certificate *cert, Policy *policy, SecTrustUserSetting trust) argument 109 if (Item item = findItem(cert, policy, searchList)) { 119 Item item = new UserTrustItem(cert, policy, trustData); 162 Item TrustStore::findItem(Certificate *cert, Policy *policy, argument 182 const CssmOid &policyOid = policy->oid();
|
H A D | SecImportExport.c | 82 SecPolicyRef policy = NULL; 111 policy = SecPolicyCreateBasicX509(); 112 if(!policy) goto out; //require(policy, out); 114 SecTrustCreateWithCertificates(eval_chain, policy, &trust); 133 CFReleaseSafe(policy); 250 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 256 status = SecTrustCreateWithCertificates(certArray, policy, &trust); 257 if (policy) { 258 CFRelease(policy); [all...] |
H A D | CertificateRequest.cpp | 42 * Within that dictionary is a set of per-policy dictionaries; the key in the 43 * top-level prefs for these dictionaries is the raw policy OID data encoded 46 * Within one per-policy dictionary exists a number of per-user dictionaries, 52 * Within the per-policy, per user dictionary are these two values, both stored 134 CertificateRequest::CertificateRequest(const CSSM_OID &policy, argument 144 mPolicy(mAlloc, policy.Data, policy.Length), 164 /* Validate policy OID. */ 165 if(!(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_IDENTITY, &policy) || 166 nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_EMAIL_SIGN, &policy) || 273 CSSM_DATA &policy = mPolicy.get(); local 476 CSSM_DATA &policy = mPolicy.get(); local [all...] |
/macosx-10.9.5/SecurityTool-55115/ |
H A D | verify_cert.c | 66 const CSSM_OID *policy = &CSSMOID_APPLE_X509_BASIC; local 108 policy = policyStringToOid(optarg); 109 if(policy == NULL) { 183 policy, 184 NULL, // policy opts 198 /* per-policy options */ 199 if(compareOids(policy, &CSSMOID_APPLE_TP_SSL) || compareOids(policy, &CSSMOID_APPLE_TP_APPLEID_SHARING)) { 215 if(compareOids(policy, &CSSMOID_APPLE_TP_SMIME)) {
|
/macosx-10.9.5/WebKit2-7537.78.2/UIProcess/API/gtk/ |
H A D | WebKitCookieManager.cpp | 43 * acceptance policy, with webkit_cookie_manager_get_accept_policy() 141 * @policy: a #WebKitCookieAcceptPolicy 143 * Set the cookie acceptance policy of @cookie_manager as @policy. 145 void webkit_cookie_manager_set_accept_policy(WebKitCookieManager* manager, WebKitCookieAcceptPolicy policy) argument 149 manager->priv->webCookieManager->setHTTPCookieAcceptPolicy(policy); 153 WKHTTPCookieAcceptPolicy policy; member in struct:GetAcceptPolicyAsyncData 158 static void webkitCookieManagerGetAcceptPolicyCallback(WKHTTPCookieAcceptPolicy policy, WKErrorRef, void* context) argument 166 data->policy = policy; [all...] |
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/include/dns/ |
H A D | rpz.h | 50 DNS_RPZ_POLICY_GIVEN = 0, /* 'given': what policy record says */ 63 * Specify a response policy zone. 72 dns_rpz_policy_t policy; /* DNS_RPZ_POLICY_GIVEN or override */ member in struct:dns_rpz_zone 77 * Radix trees for response policy IP addresses. 82 * context for finding the best policy 92 # define DNS_RPZ_HAVE_IP 0x0040 /* a policy zone has IP addresses */ 103 dns_rpz_policy_t policy; member in struct:__anon6520::__anon6521 148 * So various response policy zone messages can be turned up or down. 163 dns_rpz_policy2str(dns_rpz_policy_t policy);
|
/macosx-10.9.5/bind9-45.100/bind9/lib/isc/tests/ |
H A D | symtab_test.c | 53 isc_symexists_t policy = isc_symexists_reject; local 79 result = isc_symtab_define(st, key, 1, value, policy); 96 result = isc_symtab_define(st, key, 1, value, policy);
|