Searched refs:policy (Results 226 - 250 of 435) sorted by relevance

1234567891011>>

/macosx-10.9.5/vim-53/runtime/syntax/
H A Dgpg.vim56 \ secret-keyring set-filename set-policy-url status-fd
81 \ no-show-policy-url no-sig-cache no-sig-create-check
86 \ show-policy-url show-session-key simple-sk-checksum
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/
H A DsslKeychain.c425 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
426 ortn = SecTrustCreateWithCertificates(certChain, policy, &trust);
427 CFReleaseSafe(policy);
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/
H A DsslKeychain.c425 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
426 ortn = SecTrustCreateWithCertificates(certChain, policy, &trust);
427 CFReleaseSafe(policy);
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/
H A DsslKeychain.c425 SecPolicyRef policy = SecPolicyCreateBasicX509(); local
426 ortn = SecTrustCreateWithCertificates(certChain, policy, &trust);
427 CFReleaseSafe(policy);
/macosx-10.9.5/Security-55471.14.18/utilities/src/
H A DSecCertificateTrace.c491 CFStringRef policy = SecCFStringCopyEncodingDelimiters(CFDictionaryGetValue(certRecord, kCertStatsPolicy), kCertStatsDelimiters);
502 kCertStatsPolicy, policy,
509 CFReleaseSafe(policy);
/macosx-10.9.5/Security-55471.14.18/utilities/utilities/
H A DSecCertificateTrace.c491 CFStringRef policy = SecCFStringCopyEncodingDelimiters(CFDictionaryGetValue(certRecord, kCertStatsPolicy), kCertStatsDelimiters);
502 kCertStatsPolicy, policy,
509 CFReleaseSafe(policy);
/macosx-10.9.5/xnu-2422.115.4/bsd/kern/
H A Dkern_resource.c1214 * Description: System call MUX for use in manipulating I/O policy attributes of the current process or thread
1217 * arg Pointer to policy arguments
1220 * EINVAL Invalid command or invalid policy arguments
1225 iopolicysys_disk(struct proc *p, int cmd, int scope, int policy, struct _iopol_param_t *iop_param);
1227 iopolicysys_vfs(struct proc *p, int cmd, int scope, int policy, struct _iopol_param_t *iop_param);
1266 iopolicysys_disk(struct proc *p __unused, int cmd, int scope, int policy, struct _iopol_param_t *iop_param) argument
1294 /* Validate policy */
1296 switch (policy) {
1300 policy = IOPOL_UTILITY;
1302 policy
1334 policy); local
1352 iopolicysys_vfs(struct proc *p, int cmd, int scope, int policy, struct _iopol_param_t *iop_param) argument
[all...]
/macosx-10.9.5/xnu-2422.115.4/osfmk/kern/
H A Dwait_queue.c221 * KERN_INVALID_ARGUMENT - The policy parameter was invalid
226 int policy)
229 if ((policy & SYNC_POLICY_FIXED_PRIORITY) != 0)
232 wq->wq_fifo = ((policy & SYNC_POLICY_REVERSED) == 0);
253 int policy)
260 ret = wait_queue_init(wq, policy);
294 * KERN_INVALID_ARGUMENT - The policy parameter was invalid
299 int policy)
303 ret = wait_queue_init(&wqset->wqs_wait_queue, policy);
308 if (policy
224 wait_queue_init( wait_queue_t wq, int policy) argument
252 wait_queue_alloc( int policy) argument
297 wait_queue_set_init( wait_queue_set_t wqset, int policy) argument
319 wait_queue_sub_init( wait_queue_set_t wqset, int policy) argument
361 wait_queue_set_alloc( int policy) argument
[all...]
H A Dast.c85 #include <mach/policy.h>
/macosx-10.9.5/Heimdal-323.92.1/lib/kadm5/
H A Dget_s.c225 out->policy = strdup("default");
228 out->policy = strdup(ext->data.u.policy);
229 if (out->policy == NULL) {
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/
H A Dapplehelpers.c307 static void MergePolicyIntValue(CFDictionaryRef global, CFDictionaryRef user, CFMutableDictionaryRef merged, CFStringRef policy, int defaultvalue) { argument
309 CFNumberRef anumber = CFDictionaryGetValue(user, policy);
313 anumber = CFDictionaryGetValue(global, policy);
316 CFDictionarySetValue(merged, policy, anumber);
320 anumber = CFDictionaryGetValue(global, policy);
323 CFDictionarySetValue(merged, policy, anumber);
355 // Merge expiration date if not set in the user policy and is set
356 // in global policy
371 // Merge hard expiration date if not set in the user policy and is set
372 // in global policy
389 GetDisabledStatus(CFMutableDictionaryRef policy, CFDateRef ctime, CFDateRef lastLogin, CFDateRef passModDate, uint16_t *failedattempts, int disableReason) argument
849 odusers_isdisabled(CFDictionaryRef policy) argument
865 odusers_isadmin(CFDictionaryRef policy) argument
1030 odusers_successful_auth(struct berval *dn, CFDictionaryRef policy) argument
2224 odusers_store_history(struct berval *dn, const char *password, CFDictionaryRef policy) argument
2335 odusers_check_history(struct berval *dn, const char *password, CFDictionaryRef policy) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DSecTrust.cpp134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local
135 Trust::required(trust)->anchorPolicy(policy);
358 // caller has explicitly set the network policy
803 SecPolicyRef policy, SecTrustUserSetting *trustSetting)
810 Policy::required(policy),
820 SecPolicyRef policy, SecTrustUserSetting trustSetting)
826 Policy::required(policy);
851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy);
869 SecPolicyRef policy, SecTrustUserSetting trustSetting)
883 Policy::required(policy),
802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument
819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DSecTrust.cpp134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local
135 Trust::required(trust)->anchorPolicy(policy);
358 // caller has explicitly set the network policy
803 SecPolicyRef policy, SecTrustUserSetting *trustSetting)
810 Policy::required(policy),
820 SecPolicyRef policy, SecTrustUserSetting trustSetting)
826 Policy::required(policy);
851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy);
869 SecPolicyRef policy, SecTrustUserSetting trustSetting)
883 Policy::required(policy),
802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument
819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DSecTrust.cpp134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local
135 Trust::required(trust)->anchorPolicy(policy);
358 // caller has explicitly set the network policy
803 SecPolicyRef policy, SecTrustUserSetting *trustSetting)
810 Policy::required(policy),
820 SecPolicyRef policy, SecTrustUserSetting trustSetting)
826 Policy::required(policy);
851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy);
869 SecPolicyRef policy, SecTrustUserSetting trustSetting)
883 Policy::required(policy),
802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument
819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/
H A Dsi-70-sectrust-unified.c136 SecPolicyRef policy = NULL; local
146 policy = SecPolicyCreateSSL(server, CFSTR("xedge.apple.com")); // deliberate hostname mismatch
147 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust),
160 isnt(revocation, NULL, "create revocation policy");
194 /* Test creation of a policy via SecPolicyCreateWithProperties */
195 CFReleaseNull(policy);
203 policy = SecPolicyCreateWithProperties(kSecPolicyAppleSSL, properties);
204 isnt(policy, NULL, "SecPolicyCreateWithProperties");
208 /* Test introspection of a policy's properties via SecPolicyCopyProperties */
211 isnt(properties = SecPolicyCopyProperties(policy), NUL
[all...]
/macosx-10.9.5/WebCore-7537.78.1/platform/qt/
H A DDataTransferItemQt.cpp98 if (!owner()->policy()->canReadData() || kind() != kindString)
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/Common/
H A Dpfkey.c863 u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq)
870 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0)
884 struct sockaddr_storage *dst_end, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq, char *ipsec_if,
892 policy, policylen, seq, ipsec_if, internal_if, outgoing_if, disabled)) < 0)
906 caddr_t policy, int policylen, u_int32_t seq)
913 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0)
927 u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq)
934 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0)
949 caddr_t policy, int policylen, u_int32_t seq)
956 policy, policyle
862 pfkey_send_spdadd(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
883 pfkey_send_spdadd_with_interface(int so, struct sockaddr_storage *src, struct sockaddr_storage *src_end, u_int prefs, struct sockaddr_storage *dst, struct sockaddr_storage *dst_end, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq, char *ipsec_if, char *internal_if, char *outgoing_if, u_int disabled) argument
905 pfkey_send_spdadd2(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument
926 pfkey_send_spdupdate(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
947 pfkey_send_spdupdate2(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument
969 pfkey_send_spddelete(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
1051 pfkey_send_spdsetidx(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
1429 pfkey_send_x4(int so, u_int type, struct sockaddr_storage *src, struct sockaddr_storage *src_end, u_int prefs, struct sockaddr_storage *dst, struct sockaddr_storage *dst_end, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, char *policy, int policylen, u_int32_t seq, char *ipsec_if, char *internal_if, char *outgoing_if, u_int disabled) argument
[all...]
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Dpfkey_racoon.c88 #include "policy.h"
1809 * than one in the policy, so kernel will drop them;
1837 * If there is a phase 2 handler against the policy identifier in
1862 plog(ASL_LEVEL_ERR, "no policy found: id:%d.\n",
1869 /* get inbound policy */
1887 "No in-bound policy found: %s\n",
2115 caddr_t policy, p; local
2120 /* get policy buffer size */
2134 /* make policy structure */
2135 policy
2220 caddr_t policy = NULL; local
2321 caddr_t policy = NULL; local
2422 caddr_t policy = NULL; local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/
H A DtpPolicies.cpp20 policies.cpp - TP module policy implementation
124 * Certificate policy OIDs
1173 TPPolicy policy,
1274 if((policy == kTP_IPSec) && (tpCompareOids(purpose, &CSSMOID_EKU_IPSec))) {
1308 TPPolicy policy,
1313 bool iChat = (policy == kTP_iChat) ? true : false;
1339 /* Verify optional email address, a.k.a. handle for iChat policy */
1447 tpPolicyError("SMIME policy: error fetching subjectName");
1470 tpPolicyError("SMIME policy fail: empty subject name and "
1489 tpPolicyError("SMIME policy fai
1172 tp_verifySslOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *sslFieldOpts, const iSignCertInfo &leafCertInfo) argument
1307 tp_verifySmimeOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *smimeFieldOpts, const iSignCertInfo &leafCertInfo) argument
1832 tp_verifyCodePkgSignOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *fieldOpts, const iSignCertInfo *certInfo) argument
2600 tp_policyVerify( TPPolicy policy, Allocator &alloc, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, TPCertGroup *certGroup, CSSM_BOOL verifiedToRoot, CSSM_BOOL verifiedViaTrustSetting, CSSM_APPLE_TP_ACTION_FLAGS actionFlags, const CSSM_DATA *policyFieldData, void *policyOpts) argument
3198 tp_policyTrustSettingParams( TPPolicy policy, const CSSM_DATA *policyData, const char **policyStr, uint32 *policyStrLen, SecTrustSettingsKeyUsage *keyUse) argument
[all...]
H A DtpCrlVerify.cpp38 /* general purpose, switch to policy-specific code based on TPVerifyContext.policy */
43 switch(tpVerifyContext.policy) {
320 assert(vfyCtx.policy == kRevokeCrlBasic);
350 /* Another revocation policy claimed that this cert is good to go */
/macosx-10.9.5/CPANInternal-140/Perl-Ldap/lib/Net/LDAP/Control/
H A DPasswordPolicy.pm88 # Get password policy reponse
93 print "Password policy error $v\n" if defined $v;
103 draft-behera-password-policy-09.
161 draft-behera-ldap-password-policy-09.txt
/macosx-10.9.5/Heimdal-323.92.1/kadmin/
H A Dank.c72 char *policy,
99 expiration, pw_expiration, attributes, policy);
66 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, int verbose_flag, char *password, char *policy, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument
H A Dkadmin.local88 #Kerberos should pick up policy from policy data
93 #Kerberos should pick up policy from policy data
104 -policy)
105 # policy%dmin
/macosx-10.9.5/WebCore-7537.78.1/dom/
H A DComposedShadowTreeWalker.cpp63 ComposedShadowTreeWalker ComposedShadowTreeWalker::fromFirstChild(const Node* node, Policy policy) argument
65 ComposedShadowTreeWalker walker(node, policy);
H A DContainerNodeAlgorithms.h320 inline void ChildFrameDisconnector::disconnect(DisconnectPolicy policy) argument
329 if (policy == RootAndDescendants)

Completed in 254 milliseconds

1234567891011>>