/macosx-10.9.5/WebCore-7537.78.1/dom/ |
H A D | SecurityContext.h | 74 static SandboxFlags parseSandboxPolicy(const String& policy, String& invalidTokensErrorMessage);
|
/macosx-10.9.5/WebKit-7537.78.2/gtk/webkit/ |
H A D | webkitglobals.h | 161 * Flags used to represent the security policy of a URI scheme. 205 WebKitSecurityPolicy policy);
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/checkconf/ |
H A D | good.conf | 77 update-policy local; 89 update-policy local;
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/nsupdate/ns1/ |
H A D | named.conf | 50 update-policy { 60 update-policy local;
|
/macosx-10.9.5/xnu-2422.115.4/osfmk/kern/ |
H A D | sync_lock.c | 66 __unused int policy) 62 lock_set_create( __unused task_t task, __unused lock_set_t *new_lock_set, __unused int n_ulocks, __unused int policy) argument
|
/macosx-10.9.5/xnu-2422.115.4/osfmk/mach/ |
H A D | thread_act.defs | 260 policy : policy_t; 265 * Set/get policy information for a thread. 329 policy : policy_t;
|
/macosx-10.9.5/Heimdal-323.92.1/lib/kadm5/ |
H A D | common_glue.c | 383 kadm5_policy_ent_t policy, long mask) 396 kadm5_modify_policy(void *server_handle, kadm5_policy_ent_t policy, argument 403 kadm5_get_policy(void *server_handle, char *policy, kadm5_policy_ent_t ent) argument 422 if (ent->policy) 423 free(ent->policy); 382 kadm5_create_policy(void *server_handle, kadm5_policy_ent_t policy, long mask) argument
|
H A D | admin.h | 154 char * policy; member in struct:_kadm5_principal_ent_t 168 char *policy; member in struct:_kadm5_policy_ent_t
|
/macosx-10.9.5/WebKit2-7537.78.2/UIProcess/API/efl/tests/ |
H A D | test_ewk2_cookie_manager.cpp | 65 static void getAcceptPolicyCallback(Ewk_Cookie_Accept_Policy policy, Ewk_Error* error, void* event_info) argument 69 *ret = policy; 75 Ewk_Cookie_Accept_Policy policy = EWK_COOKIE_ACCEPT_POLICY_ALWAYS; local 76 ewk_cookie_manager_async_accept_policy_get(manager, getAcceptPolicyCallback, &policy); 78 return policy; 129 // Default policy is EWK_COOKIE_ACCEPT_POLICY_NO_THIRD_PARTY. 139 // Change policy to EWK_COOKIE_ACCEPT_POLICY_ALWAYS 152 // Change policy to EWK_COOKIE_ACCEPT_POLICY_NEVER
|
/macosx-10.9.5/WebCore-7537.78.1/page/ |
H A D | ContentSecurityPolicy.cpp | 231 CSPSource(ContentSecurityPolicy* policy, const String& scheme, const String& host, int port, const String& path, bool hostHasWildcard, bool portHasWildcard) argument 232 : m_policy(policy) 349 CSPSourceList::CSPSourceList(ContentSecurityPolicy* policy, const String& directiveName) argument 350 : m_policy(policy) 669 CSPDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument 672 , m_policy(policy) 679 const ContentSecurityPolicy* policy() const { return m_policy; } function in class:WebCore::CSPDirective 689 NonceDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument 690 : CSPDirective(name, value, policy) 710 policy() 733 MediaListDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument 809 SourceListDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument 925 CSPDirectiveList(ContentSecurityPolicy* policy, ContentSecurityPolicy::HeaderType type) argument 935 create(ContentSecurityPolicy* policy, const String& header, ContentSecurityPolicy::HeaderType type) argument 1229 parse(const String& policy) argument 1481 OwnPtr<CSPDirectiveList> policy = CSPDirectiveList::create(this, String(begin, position - begin), type); local [all...] |
H A D | SecurityPolicy.cpp | 94 void SecurityPolicy::setLocalLoadPolicy(LocalLoadPolicy policy) argument 96 localLoadPolicy = policy;
|
/macosx-10.9.5/xnu-2422.115.4/bsd/netinet6/ |
H A D | ipsec.c | 174 &ip4_def_policy.policy, 0, &sysctl_def_policy, "I", ""); 196 /* for performance, we bypass ipsec until a security policy is set */ 223 def_policy, CTLFLAG_RW | CTLFLAG_LOCKED, &ip6_def_policy.policy, 0, ""); 274 int old_policy = ip4_def_policy.policy; 279 if (ip4_def_policy.policy != IPSEC_POLICY_NONE && 280 ip4_def_policy.policy != IPSEC_POLICY_DISCARD) { 281 ip4_def_policy.policy = old_policy; 285 /* Turn off the bypass if the default security policy changes */ 286 if (ipsec_bypass != 0 && ip4_def_policy.policy != IPSEC_POLICY_NONE) 312 struct secpolicy *currsp = NULL; /* policy o [all...] |
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/tests/data/ |
H A D | slapd-idassert.conf | 38 authz-policy both
|
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | cert.c | 232 SecPolicyRef policy = NULL; local 246 status = SecPolicySearchCopyNext(searchRef, &policy); 251 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust); 292 if (policy) 293 CFRelease(policy); 769 SecPolicyRef policy = NULL; local 806 rv = SecPolicySearchCopyNext(search, &policy); 812 return policy;
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | cert.c | 232 SecPolicyRef policy = NULL; local 246 status = SecPolicySearchCopyNext(searchRef, &policy); 251 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust); 292 if (policy) 293 CFRelease(policy); 769 SecPolicyRef policy = NULL; local 806 rv = SecPolicySearchCopyNext(search, &policy); 812 return policy;
|
/macosx-10.9.5/WebCore-7537.78.1/platform/ios/ |
H A D | ClipboardIOS.mm | 54 PassRefPtr<Clipboard> Clipboard::create(ClipboardAccessPolicy policy, DragData*, Frame* frame) 56 return ClipboardIOS::create(DragAndDrop, policy, frame); 59 ClipboardIOS::ClipboardIOS(ClipboardType clipboardType, ClipboardAccessPolicy policy, Frame* frame) 60 : Clipboard(policy, clipboardType)
|
/macosx-10.9.5/WebCore-7537.78.1/platform/network/ |
H A D | ResourceRequestBase.h | 170 ResourceRequestBase(const KURL& url, ResourceRequestCachePolicy policy) argument 172 , m_cachePolicy(policy)
|
/macosx-10.9.5/WebCore-7537.78.1/testing/ |
H A D | InternalSettings.idl | 57 [RaisesException] void setStorageBlockingPolicy(DOMString policy);
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSShared/ |
H A D | dnsextd.conf | 22 // policy for your dynamic zone. For example, within a small closed private 39 // update-policy { grant * wildcard *.my-dynamic-subdomain.company.com.; };
|
/macosx-10.9.5/security_systemkeychain-55191.2/src/ |
H A D | cs_utils.cpp | 197 static SecIdentityRef findIdentity(SecKeychainRef keychain, const char *match, SecPolicyRef policy); 219 CFRef<SecPolicyRef> policy; local 221 &CSSMOID_APPLE_TP_CODE_SIGNING, &policy.aref())); 222 if (SecIdentityRef identity = findIdentity(keychain, match, policy)) 225 // now try again, using the generic policy 227 &CSSMOID_APPLE_X509_BASIC, &policy.aref())); 228 if (SecIdentityRef identity = findIdentity(keychain, match, policy)) { 246 static SecIdentityRef findIdentity(SecKeychainRef keychain, const char *match, SecPolicyRef policy) argument 249 MacOSError::check(SecIdentitySearchCreateWithPolicy(policy, NULL,
|
/macosx-10.9.5/xnu-2422.115.4/bsd/sys/ |
H A D | systm.h | 232 void throttle_set_thread_io_policy(int policy); 241 * 'policy' should be specified as either IOPOL_UTILITY or IPOL_THROTTLE, 244 int throttle_info_io_will_be_throttled(void *throttle_info_handle, int policy);
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | CertificateRequest.h | 54 CertificateRequest(const CSSM_OID &policy, 77 * Obtain policy/error specific return data blob. We own the data, it's
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | CertificateRequest.h | 54 CertificateRequest(const CSSM_OID &policy, 77 * Obtain policy/error specific return data blob. We own the data, it's
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | CertificateRequest.h | 54 CertificateRequest(const CSSM_OID &policy, 77 * Obtain policy/error specific return data blob. We own the data, it's
|
/macosx-10.9.5/Security-55471.14.18/sec/securityd/ |
H A D | SecPolicyServer.h | 77 /* Set the string result as the reason for the sub policy check key 78 failing. The policy check function should continue processing if 85 /* Enable revocation checking if the rest of the policy checks succeed. */ 115 this policy. Returns true if the policy accepts the certificate chain. 117 bool SecPolicyValidate(SecPolicyRef policy, SecPVCRef pvc, CFStringRef key);
|