/macosx-10.9.5/vim-53/runtime/syntax/ |
H A D | gpg.vim | 56 \ secret-keyring set-filename set-policy-url status-fd 81 \ no-show-policy-url no-sig-cache no-sig-create-check 86 \ show-policy-url show-session-key simple-sk-checksum
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | sslKeychain.c | 425 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 426 ortn = SecTrustCreateWithCertificates(certChain, policy, &trust); 427 CFReleaseSafe(policy);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | sslKeychain.c | 425 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 426 ortn = SecTrustCreateWithCertificates(certChain, policy, &trust); 427 CFReleaseSafe(policy);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | sslKeychain.c | 425 SecPolicyRef policy = SecPolicyCreateBasicX509(); local 426 ortn = SecTrustCreateWithCertificates(certChain, policy, &trust); 427 CFReleaseSafe(policy);
|
/macosx-10.9.5/Security-55471.14.18/utilities/src/ |
H A D | SecCertificateTrace.c | 491 CFStringRef policy = SecCFStringCopyEncodingDelimiters(CFDictionaryGetValue(certRecord, kCertStatsPolicy), kCertStatsDelimiters); 502 kCertStatsPolicy, policy, 509 CFReleaseSafe(policy);
|
/macosx-10.9.5/Security-55471.14.18/utilities/utilities/ |
H A D | SecCertificateTrace.c | 491 CFStringRef policy = SecCFStringCopyEncodingDelimiters(CFDictionaryGetValue(certRecord, kCertStatsPolicy), kCertStatsDelimiters); 502 kCertStatsPolicy, policy, 509 CFReleaseSafe(policy);
|
/macosx-10.9.5/xnu-2422.115.4/bsd/kern/ |
H A D | kern_resource.c | 1214 * Description: System call MUX for use in manipulating I/O policy attributes of the current process or thread 1217 * arg Pointer to policy arguments 1220 * EINVAL Invalid command or invalid policy arguments 1225 iopolicysys_disk(struct proc *p, int cmd, int scope, int policy, struct _iopol_param_t *iop_param); 1227 iopolicysys_vfs(struct proc *p, int cmd, int scope, int policy, struct _iopol_param_t *iop_param); 1266 iopolicysys_disk(struct proc *p __unused, int cmd, int scope, int policy, struct _iopol_param_t *iop_param) argument 1294 /* Validate policy */ 1296 switch (policy) { 1300 policy = IOPOL_UTILITY; 1302 policy 1334 policy); local 1352 iopolicysys_vfs(struct proc *p, int cmd, int scope, int policy, struct _iopol_param_t *iop_param) argument [all...] |
/macosx-10.9.5/xnu-2422.115.4/osfmk/kern/ |
H A D | wait_queue.c | 221 * KERN_INVALID_ARGUMENT - The policy parameter was invalid 226 int policy) 229 if ((policy & SYNC_POLICY_FIXED_PRIORITY) != 0) 232 wq->wq_fifo = ((policy & SYNC_POLICY_REVERSED) == 0); 253 int policy) 260 ret = wait_queue_init(wq, policy); 294 * KERN_INVALID_ARGUMENT - The policy parameter was invalid 299 int policy) 303 ret = wait_queue_init(&wqset->wqs_wait_queue, policy); 308 if (policy 224 wait_queue_init( wait_queue_t wq, int policy) argument 252 wait_queue_alloc( int policy) argument 297 wait_queue_set_init( wait_queue_set_t wqset, int policy) argument 319 wait_queue_sub_init( wait_queue_set_t wqset, int policy) argument 361 wait_queue_set_alloc( int policy) argument [all...] |
H A D | ast.c | 85 #include <mach/policy.h>
|
/macosx-10.9.5/Heimdal-323.92.1/lib/kadm5/ |
H A D | get_s.c | 225 out->policy = strdup("default"); 228 out->policy = strdup(ext->data.u.policy); 229 if (out->policy == NULL) {
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/ |
H A D | applehelpers.c | 307 static void MergePolicyIntValue(CFDictionaryRef global, CFDictionaryRef user, CFMutableDictionaryRef merged, CFStringRef policy, int defaultvalue) { argument 309 CFNumberRef anumber = CFDictionaryGetValue(user, policy); 313 anumber = CFDictionaryGetValue(global, policy); 316 CFDictionarySetValue(merged, policy, anumber); 320 anumber = CFDictionaryGetValue(global, policy); 323 CFDictionarySetValue(merged, policy, anumber); 355 // Merge expiration date if not set in the user policy and is set 356 // in global policy 371 // Merge hard expiration date if not set in the user policy and is set 372 // in global policy 389 GetDisabledStatus(CFMutableDictionaryRef policy, CFDateRef ctime, CFDateRef lastLogin, CFDateRef passModDate, uint16_t *failedattempts, int disableReason) argument 849 odusers_isdisabled(CFDictionaryRef policy) argument 865 odusers_isadmin(CFDictionaryRef policy) argument 1030 odusers_successful_auth(struct berval *dn, CFDictionaryRef policy) argument 2224 odusers_store_history(struct berval *dn, const char *password, CFDictionaryRef policy) argument 2335 odusers_check_history(struct berval *dn, const char *password, CFDictionaryRef policy) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecTrust.cpp | 134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local 135 Trust::required(trust)->anchorPolicy(policy); 358 // caller has explicitly set the network policy 803 SecPolicyRef policy, SecTrustUserSetting *trustSetting) 810 Policy::required(policy), 820 SecPolicyRef policy, SecTrustUserSetting trustSetting) 826 Policy::required(policy); 851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy); 869 SecPolicyRef policy, SecTrustUserSetting trustSetting) 883 Policy::required(policy), 802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument 819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument 868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecTrust.cpp | 134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local 135 Trust::required(trust)->anchorPolicy(policy); 358 // caller has explicitly set the network policy 803 SecPolicyRef policy, SecTrustUserSetting *trustSetting) 810 Policy::required(policy), 820 SecPolicyRef policy, SecTrustUserSetting trustSetting) 826 Policy::required(policy); 851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy); 869 SecPolicyRef policy, SecTrustUserSetting trustSetting) 883 Policy::required(policy), 802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument 819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument 868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecTrust.cpp | 134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local 135 Trust::required(trust)->anchorPolicy(policy); 358 // caller has explicitly set the network policy 803 SecPolicyRef policy, SecTrustUserSetting *trustSetting) 810 Policy::required(policy), 820 SecPolicyRef policy, SecTrustUserSetting trustSetting) 826 Policy::required(policy); 851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy); 869 SecPolicyRef policy, SecTrustUserSetting trustSetting) 883 Policy::required(policy), 802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument 819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument 868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-70-sectrust-unified.c | 136 SecPolicyRef policy = NULL; local 146 policy = SecPolicyCreateSSL(server, CFSTR("xedge.apple.com")); // deliberate hostname mismatch 147 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), 160 isnt(revocation, NULL, "create revocation policy"); 194 /* Test creation of a policy via SecPolicyCreateWithProperties */ 195 CFReleaseNull(policy); 203 policy = SecPolicyCreateWithProperties(kSecPolicyAppleSSL, properties); 204 isnt(policy, NULL, "SecPolicyCreateWithProperties"); 208 /* Test introspection of a policy's properties via SecPolicyCopyProperties */ 211 isnt(properties = SecPolicyCopyProperties(policy), NUL [all...] |
/macosx-10.9.5/WebCore-7537.78.1/platform/qt/ |
H A D | DataTransferItemQt.cpp | 98 if (!owner()->policy()->canReadData() || kind() != kindString)
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/Common/ |
H A D | pfkey.c | 863 u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) 870 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0) 884 struct sockaddr_storage *dst_end, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq, char *ipsec_if, 892 policy, policylen, seq, ipsec_if, internal_if, outgoing_if, disabled)) < 0) 906 caddr_t policy, int policylen, u_int32_t seq) 913 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0) 927 u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) 934 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0) 949 caddr_t policy, int policylen, u_int32_t seq) 956 policy, policyle 862 pfkey_send_spdadd(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 883 pfkey_send_spdadd_with_interface(int so, struct sockaddr_storage *src, struct sockaddr_storage *src_end, u_int prefs, struct sockaddr_storage *dst, struct sockaddr_storage *dst_end, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq, char *ipsec_if, char *internal_if, char *outgoing_if, u_int disabled) argument 905 pfkey_send_spdadd2(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument 926 pfkey_send_spdupdate(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 947 pfkey_send_spdupdate2(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument 969 pfkey_send_spddelete(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 1051 pfkey_send_spdsetidx(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 1429 pfkey_send_x4(int so, u_int type, struct sockaddr_storage *src, struct sockaddr_storage *src_end, u_int prefs, struct sockaddr_storage *dst, struct sockaddr_storage *dst_end, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, char *policy, int policylen, u_int32_t seq, char *ipsec_if, char *internal_if, char *outgoing_if, u_int disabled) argument [all...] |
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | pfkey_racoon.c | 88 #include "policy.h" 1809 * than one in the policy, so kernel will drop them; 1837 * If there is a phase 2 handler against the policy identifier in 1862 plog(ASL_LEVEL_ERR, "no policy found: id:%d.\n", 1869 /* get inbound policy */ 1887 "No in-bound policy found: %s\n", 2115 caddr_t policy, p; local 2120 /* get policy buffer size */ 2134 /* make policy structure */ 2135 policy 2220 caddr_t policy = NULL; local 2321 caddr_t policy = NULL; local 2422 caddr_t policy = NULL; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/ |
H A D | tpPolicies.cpp | 20 policies.cpp - TP module policy implementation 124 * Certificate policy OIDs 1173 TPPolicy policy, 1274 if((policy == kTP_IPSec) && (tpCompareOids(purpose, &CSSMOID_EKU_IPSec))) { 1308 TPPolicy policy, 1313 bool iChat = (policy == kTP_iChat) ? true : false; 1339 /* Verify optional email address, a.k.a. handle for iChat policy */ 1447 tpPolicyError("SMIME policy: error fetching subjectName"); 1470 tpPolicyError("SMIME policy fail: empty subject name and " 1489 tpPolicyError("SMIME policy fai 1172 tp_verifySslOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *sslFieldOpts, const iSignCertInfo &leafCertInfo) argument 1307 tp_verifySmimeOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *smimeFieldOpts, const iSignCertInfo &leafCertInfo) argument 1832 tp_verifyCodePkgSignOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *fieldOpts, const iSignCertInfo *certInfo) argument 2600 tp_policyVerify( TPPolicy policy, Allocator &alloc, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, TPCertGroup *certGroup, CSSM_BOOL verifiedToRoot, CSSM_BOOL verifiedViaTrustSetting, CSSM_APPLE_TP_ACTION_FLAGS actionFlags, const CSSM_DATA *policyFieldData, void *policyOpts) argument 3198 tp_policyTrustSettingParams( TPPolicy policy, const CSSM_DATA *policyData, const char **policyStr, uint32 *policyStrLen, SecTrustSettingsKeyUsage *keyUse) argument [all...] |
H A D | tpCrlVerify.cpp | 38 /* general purpose, switch to policy-specific code based on TPVerifyContext.policy */ 43 switch(tpVerifyContext.policy) { 320 assert(vfyCtx.policy == kRevokeCrlBasic); 350 /* Another revocation policy claimed that this cert is good to go */
|
/macosx-10.9.5/CPANInternal-140/Perl-Ldap/lib/Net/LDAP/Control/ |
H A D | PasswordPolicy.pm | 88 # Get password policy reponse 93 print "Password policy error $v\n" if defined $v; 103 draft-behera-password-policy-09. 161 draft-behera-ldap-password-policy-09.txt
|
/macosx-10.9.5/Heimdal-323.92.1/kadmin/ |
H A D | ank.c | 72 char *policy, 99 expiration, pw_expiration, attributes, policy); 66 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, int verbose_flag, char *password, char *policy, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument
|
H A D | kadmin.local | 88 #Kerberos should pick up policy from policy data 93 #Kerberos should pick up policy from policy data 104 -policy) 105 # policy%dmin
|
/macosx-10.9.5/WebCore-7537.78.1/dom/ |
H A D | ComposedShadowTreeWalker.cpp | 63 ComposedShadowTreeWalker ComposedShadowTreeWalker::fromFirstChild(const Node* node, Policy policy) argument 65 ComposedShadowTreeWalker walker(node, policy);
|
H A D | ContainerNodeAlgorithms.h | 320 inline void ChildFrameDisconnector::disconnect(DisconnectPolicy policy) argument 329 if (policy == RootAndDescendants)
|