Searched refs:policy (Results 176 - 200 of 435) sorted by relevance

1234567891011>>

/macosx-10.9.5/WebCore-7537.78.1/dom/
H A DSecurityContext.h74 static SandboxFlags parseSandboxPolicy(const String& policy, String& invalidTokensErrorMessage);
/macosx-10.9.5/WebKit-7537.78.2/gtk/webkit/
H A Dwebkitglobals.h161 * Flags used to represent the security policy of a URI scheme.
205 WebKitSecurityPolicy policy);
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/checkconf/
H A Dgood.conf77 update-policy local;
89 update-policy local;
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/nsupdate/ns1/
H A Dnamed.conf50 update-policy {
60 update-policy local;
/macosx-10.9.5/xnu-2422.115.4/osfmk/kern/
H A Dsync_lock.c66 __unused int policy)
62 lock_set_create( __unused task_t task, __unused lock_set_t *new_lock_set, __unused int n_ulocks, __unused int policy) argument
/macosx-10.9.5/xnu-2422.115.4/osfmk/mach/
H A Dthread_act.defs260 policy : policy_t;
265 * Set/get policy information for a thread.
329 policy : policy_t;
/macosx-10.9.5/Heimdal-323.92.1/lib/kadm5/
H A Dcommon_glue.c383 kadm5_policy_ent_t policy, long mask)
396 kadm5_modify_policy(void *server_handle, kadm5_policy_ent_t policy, argument
403 kadm5_get_policy(void *server_handle, char *policy, kadm5_policy_ent_t ent) argument
422 if (ent->policy)
423 free(ent->policy);
382 kadm5_create_policy(void *server_handle, kadm5_policy_ent_t policy, long mask) argument
H A Dadmin.h154 char * policy; member in struct:_kadm5_principal_ent_t
168 char *policy; member in struct:_kadm5_policy_ent_t
/macosx-10.9.5/WebKit2-7537.78.2/UIProcess/API/efl/tests/
H A Dtest_ewk2_cookie_manager.cpp65 static void getAcceptPolicyCallback(Ewk_Cookie_Accept_Policy policy, Ewk_Error* error, void* event_info) argument
69 *ret = policy;
75 Ewk_Cookie_Accept_Policy policy = EWK_COOKIE_ACCEPT_POLICY_ALWAYS; local
76 ewk_cookie_manager_async_accept_policy_get(manager, getAcceptPolicyCallback, &policy);
78 return policy;
129 // Default policy is EWK_COOKIE_ACCEPT_POLICY_NO_THIRD_PARTY.
139 // Change policy to EWK_COOKIE_ACCEPT_POLICY_ALWAYS
152 // Change policy to EWK_COOKIE_ACCEPT_POLICY_NEVER
/macosx-10.9.5/WebCore-7537.78.1/page/
H A DContentSecurityPolicy.cpp231 CSPSource(ContentSecurityPolicy* policy, const String& scheme, const String& host, int port, const String& path, bool hostHasWildcard, bool portHasWildcard) argument
232 : m_policy(policy)
349 CSPSourceList::CSPSourceList(ContentSecurityPolicy* policy, const String& directiveName) argument
350 : m_policy(policy)
669 CSPDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument
672 , m_policy(policy)
679 const ContentSecurityPolicy* policy() const { return m_policy; } function in class:WebCore::CSPDirective
689 NonceDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument
690 : CSPDirective(name, value, policy)
710 policy()
733 MediaListDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument
809 SourceListDirective(const String& name, const String& value, ContentSecurityPolicy* policy) argument
925 CSPDirectiveList(ContentSecurityPolicy* policy, ContentSecurityPolicy::HeaderType type) argument
935 create(ContentSecurityPolicy* policy, const String& header, ContentSecurityPolicy::HeaderType type) argument
1229 parse(const String& policy) argument
1481 OwnPtr<CSPDirectiveList> policy = CSPDirectiveList::create(this, String(begin, position - begin), type); local
[all...]
H A DSecurityPolicy.cpp94 void SecurityPolicy::setLocalLoadPolicy(LocalLoadPolicy policy) argument
96 localLoadPolicy = policy;
/macosx-10.9.5/xnu-2422.115.4/bsd/netinet6/
H A Dipsec.c174 &ip4_def_policy.policy, 0, &sysctl_def_policy, "I", "");
196 /* for performance, we bypass ipsec until a security policy is set */
223 def_policy, CTLFLAG_RW | CTLFLAG_LOCKED, &ip6_def_policy.policy, 0, "");
274 int old_policy = ip4_def_policy.policy;
279 if (ip4_def_policy.policy != IPSEC_POLICY_NONE &&
280 ip4_def_policy.policy != IPSEC_POLICY_DISCARD) {
281 ip4_def_policy.policy = old_policy;
285 /* Turn off the bypass if the default security policy changes */
286 if (ipsec_bypass != 0 && ip4_def_policy.policy != IPSEC_POLICY_NONE)
312 struct secpolicy *currsp = NULL; /* policy o
[all...]
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/tests/data/
H A Dslapd-idassert.conf38 authz-policy both
/macosx-10.9.5/Security-55471.14.18/include/security_smime/
H A Dcert.c232 SecPolicyRef policy = NULL; local
246 status = SecPolicySearchCopyNext(searchRef, &policy);
251 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust);
292 if (policy)
293 CFRelease(policy);
769 SecPolicyRef policy = NULL; local
806 rv = SecPolicySearchCopyNext(search, &policy);
812 return policy;
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/
H A Dcert.c232 SecPolicyRef policy = NULL; local
246 status = SecPolicySearchCopyNext(searchRef, &policy);
251 status = SecTrustCreateWithCertificates(wrappedCert, policy, &trust);
292 if (policy)
293 CFRelease(policy);
769 SecPolicyRef policy = NULL; local
806 rv = SecPolicySearchCopyNext(search, &policy);
812 return policy;
/macosx-10.9.5/WebCore-7537.78.1/platform/ios/
H A DClipboardIOS.mm54 PassRefPtr<Clipboard> Clipboard::create(ClipboardAccessPolicy policy, DragData*, Frame* frame)
56 return ClipboardIOS::create(DragAndDrop, policy, frame);
59 ClipboardIOS::ClipboardIOS(ClipboardType clipboardType, ClipboardAccessPolicy policy, Frame* frame)
60 : Clipboard(policy, clipboardType)
/macosx-10.9.5/WebCore-7537.78.1/platform/network/
H A DResourceRequestBase.h170 ResourceRequestBase(const KURL& url, ResourceRequestCachePolicy policy) argument
172 , m_cachePolicy(policy)
/macosx-10.9.5/WebCore-7537.78.1/testing/
H A DInternalSettings.idl57 [RaisesException] void setStorageBlockingPolicy(DOMString policy);
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSShared/
H A Ddnsextd.conf22 // policy for your dynamic zone. For example, within a small closed private
39 // update-policy { grant * wildcard *.my-dynamic-subdomain.company.com.; };
/macosx-10.9.5/security_systemkeychain-55191.2/src/
H A Dcs_utils.cpp197 static SecIdentityRef findIdentity(SecKeychainRef keychain, const char *match, SecPolicyRef policy);
219 CFRef<SecPolicyRef> policy; local
221 &CSSMOID_APPLE_TP_CODE_SIGNING, &policy.aref()));
222 if (SecIdentityRef identity = findIdentity(keychain, match, policy))
225 // now try again, using the generic policy
227 &CSSMOID_APPLE_X509_BASIC, &policy.aref()));
228 if (SecIdentityRef identity = findIdentity(keychain, match, policy)) {
246 static SecIdentityRef findIdentity(SecKeychainRef keychain, const char *match, SecPolicyRef policy) argument
249 MacOSError::check(SecIdentitySearchCreateWithPolicy(policy, NULL,
/macosx-10.9.5/xnu-2422.115.4/bsd/sys/
H A Dsystm.h232 void throttle_set_thread_io_policy(int policy);
241 * 'policy' should be specified as either IOPOL_UTILITY or IPOL_THROTTLE,
244 int throttle_info_io_will_be_throttled(void *throttle_info_handle, int policy);
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DCertificateRequest.h54 CertificateRequest(const CSSM_OID &policy,
77 * Obtain policy/error specific return data blob. We own the data, it's
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DCertificateRequest.h54 CertificateRequest(const CSSM_OID &policy,
77 * Obtain policy/error specific return data blob. We own the data, it's
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DCertificateRequest.h54 CertificateRequest(const CSSM_OID &policy,
77 * Obtain policy/error specific return data blob. We own the data, it's
/macosx-10.9.5/Security-55471.14.18/sec/securityd/
H A DSecPolicyServer.h77 /* Set the string result as the reason for the sub policy check key
78 failing. The policy check function should continue processing if
85 /* Enable revocation checking if the rest of the policy checks succeed. */
115 this policy. Returns true if the policy accepts the certificate chain.
117 bool SecPolicyValidate(SecPolicyRef policy, SecPVCRef pvc, CFStringRef key);

Completed in 311 milliseconds

1234567891011>>