Searched refs:policy (Results 251 - 275 of 435) sorted by relevance

<<1112131415161718

/macosx-10.9.5/WebKit2-7537.78.2/Shared/linux/SeccompFilters/
H A DOpenSyscall.cpp133 PassOwnPtr<SyscallResult> OpenSyscall::execute(const SyscallPolicy& policy) argument
152 if (!policy.hasPermissionForPath(m_path.data(), permission))
/macosx-10.9.5/adv_cmds-153/ps/
H A Dtasks.c140 switch(ki->tasks_info.policy) {
215 ki->thval[j].tb.policy, &ki->thval[j].schedinfo);
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/tsiggss/ns1/
H A Dnamed.conf48 update-policy {
/macosx-10.9.5/dtrace-118.1/libdtrace/
H A Ddt_options.c771 dtrace_optval_t policy = DTRACEOPT_UNSET; local
779 policy = _dtrace_bufpolicies[i].dtbp_policy;
784 if (policy == DTRACEOPT_UNSET)
787 dtp->dt_options[DTRACEOPT_BUFPOLICY] = policy;
805 dtrace_optval_t policy = DTRACEOPT_UNSET; local
813 policy = _dtrace_bufresize[i].dtbr_policy;
818 if (policy == DTRACEOPT_UNSET)
821 dtp->dt_options[DTRACEOPT_BUFRESIZE] = policy;
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/libipsec/
H A Dpolicy_parse.y33 * IN/OUT bound policy configuration take place such below:
34 * in <priority> <policy>
35 * out <priority> <policy>
49 * <policy> is one of following:
646 caddr_t policy;
648 policy = policy_parse(msg, msglen);
649 if (policy == NULL) {
656 return policy;
/macosx-10.9.5/postfix-252/Postfix.Config/
H A Dmaster.cf.default122 # Greylist policy server
124 policy unix - n n - - spawn
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/security/
H A Dpolicy.rb22 def initialize name, policy = {}, opt = {}
37 policy.each_pair do |key, val|
188 # signatures +signatures+ created by the signer depending on the +policy+
196 "unsigned gems are not allowed by the #{name} policy"
248 # the signatures and certificate chain is valid according to the policy..
/macosx-10.9.5/tcl-102/tcl_ext/trf/trf/generic/
H A Dregistry.c89 * standard policy with his own choice */
90 Trf_SeekInformation natural; /* Natural seek policy, copied from the
92 Trf_SeekInformation chosen; /* Seek policy chosen from natural policy
119 Trf_SeekInformation used; /* Seek policy currently in effect, might
196 /* Information about the chosen and used seek policy and wether the user
448 char* policy));
806 baseOpt.policy = (Tcl_Obj*) NULL;
928 baseOpt.policy = optarg;
973 baseOpt.policy !
2340 char policy [20]; local
2368 char policy [20]; local
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/
H A DStaticCode.cpp474 CFRef<CFTypeRef> policy = verificationPolicy(apiFlags()); local
476 MacOSError::check(CMSDecoderCopySignerStatus(cms, 0, policy,
572 // impose policy: if the signature itself draws to Apple, then so must the timestamp signature
588 // Return the TP policy used for signature verification.
594 CFRef<SecPolicyRef> policy; local
595 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref()));
601 MacOSError::check(SecPolicySetValue(policy, &optData));
602 return policy.yield();
607 CFRef<SecPolicyRef> policy; local
608 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_OCSP, &policy
[all...]
H A Dpolicyengine.cpp358 return makeCFNumber(OSStatus(errSecCSVetoed)); // (signal nested-code policy failure, picked up below)
415 // Hybrid policy: If we detect an installer signature, use and validate that.
459 CFRef<CFTypeRef> policy = installerPolicy(); local
461 MacOSError::check(SecTrustCreateWithCertificates(certs, policy, &trust.aref()));
541 // Create a suitable policy array for verification of installer signatures.
545 CFRef<SecPolicyRef> policy; local
546 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref()));
552 MacOSError::check(SecPolicySetValue(policy, &optData));
553 return policy.yield();
558 CFRef<SecPolicyRef> policy; local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/
H A DStaticCode.cpp474 CFRef<CFTypeRef> policy = verificationPolicy(apiFlags()); local
476 MacOSError::check(CMSDecoderCopySignerStatus(cms, 0, policy,
572 // impose policy: if the signature itself draws to Apple, then so must the timestamp signature
588 // Return the TP policy used for signature verification.
594 CFRef<SecPolicyRef> policy; local
595 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref()));
601 MacOSError::check(SecPolicySetValue(policy, &optData));
602 return policy.yield();
607 CFRef<SecPolicyRef> policy; local
608 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_OCSP, &policy
[all...]
H A Dpolicyengine.cpp358 return makeCFNumber(OSStatus(errSecCSVetoed)); // (signal nested-code policy failure, picked up below)
415 // Hybrid policy: If we detect an installer signature, use and validate that.
459 CFRef<CFTypeRef> policy = installerPolicy(); local
461 MacOSError::check(SecTrustCreateWithCertificates(certs, policy, &trust.aref()));
541 // Create a suitable policy array for verification of installer signatures.
545 CFRef<SecPolicyRef> policy; local
546 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref()));
552 MacOSError::check(SecPolicySetValue(policy, &optData));
553 return policy.yield();
558 CFRef<SecPolicyRef> policy; local
[all...]
/macosx-10.9.5/ICU-511.35/icuSources/common/
H A Duhash.c52 * hashtable is set to a U_FIXED resize policy, or if memory is
190 _uhash_internalSetResizePolicy(UHashtable *hash, enum UHashResizePolicy policy) { argument
192 U_ASSERT(((int32_t)policy) >= 0);
193 U_ASSERT(((int32_t)policy) < 3);
194 hash->lowWaterRatio = RESIZE_POLICY_RATIO_TABLE[policy * 2];
195 hash->highWaterRatio = RESIZE_POLICY_RATIO_TABLE[policy * 2 + 1];
627 uhash_setResizePolicy(UHashtable *hash, enum UHashResizePolicy policy) { argument
629 _uhash_internalSetResizePolicy(hash, policy);
/macosx-10.9.5/WebKit-7537.78.2/qt/WebCoreSupport/
H A DQWebFrameAdapter.cpp715 void QWebFrameAdapter::setScrollBarPolicy(Qt::Orientation orientation, Qt::ScrollBarPolicy policy) argument
722 horizontalScrollBarPolicy = policy;
724 frame->view()->setHorizontalScrollbarMode((ScrollbarMode)policy, policy != Qt::ScrollBarAsNeeded /* lock */);
728 verticalScrollBarPolicy = policy;
730 frame->view()->setVerticalScrollbarMode((ScrollbarMode)policy, policy != Qt::ScrollBarAsNeeded /* lock */);
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Dsockmisc.c753 char *policy; local
770 policy = "in bypass";
771 buf = ipsec_set_policy(policy, strlen(policy));
789 policy = "out bypass";
790 buf = ipsec_set_policy(policy, strlen(policy));
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/
H A Dsi-20-sectrust.c611 SecPolicyRef policy = SecPolicyCreateSSL(false, NULL); local
616 ok_status(SecTrustCreateWithCertificates(cert0, policy, &trust),
623 is_status(SecTrustCreateWithCertificates(kCFBooleanTrue, policy, &trust),
626 errSecParam, "create trust with boolean instead of policy");
629 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust");
698 ok_status(SecTrustCreateWithCertificates(cert0, policy, &trust),
722 CFReleaseSafe(policy);
725 policy = SecPolicyCreateSSL(server, CFSTR("xedge2.apple.com"));
726 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust),
736 CFReleaseSafe(policy);
[all...]
H A Dsi-21-sectrust-asr.c118 SecPolicyRef policy; local
138 isnt(policy = SecPolicyCreateBasicX509(), NULL, "create policy instance");
140 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust for leaf");
158 CFReleaseSafe(policy);
/macosx-10.9.5/SecurityTool-55115/
H A Dtrusted_cert_add.c38 * -- To add anotherRoot.cer to the local admin trust settings, only for policy
51 * -- To specify a default of "deny" for policy SMIME for the admin domain:
65 * policy SSL:
127 const char *policy, /* optional - smime, ssl, etc. */
128 const char *policyStr, /* optional policy string */
143 if(policy != NULL) {
144 oid = policyStringToOid(policy);
222 // char *policy = NULL;
269 fprintf(stderr, "Too many policy arguments.\n");
282 fprintf(stderr, "Too many policy strin
125 appendConstraintsToDict( const char *appPath, const char *policy, const char *policyStr, SecTrustSettingsResult resultType, CSSM_RETURN allowErr, SecTrustSettingsKeyUsage keyUse, CFMutableDictionaryRef *dict) argument
[all...]
/macosx-10.9.5/bind9-45.100/bind9/bin/named/
H A Dquery.c834 dns_rpz_policy_t policy, dns_rpz_type_t type,
848 dns_rpz_type2str(type), dns_rpz_policy2str(policy),
873 * Get a policy rewrite zone database.
3842 st->m.policy = DNS_RPZ_POLICY_MISS;
3846 * Get NS, A, or AAAA rrset for response policy zone checks.
3879 st->m.policy = DNS_RPZ_POLICY_ERROR;
3887 st->m.policy = DNS_RPZ_POLICY_ERROR;
3903 st->m.policy = DNS_RPZ_POLICY_ERROR;
3953 * the IP or NSIP response policy rules of a view.
3978 * Do not check policy zone
833 rpz_log_rewrite(ns_client_t *client, const char *disabled, dns_rpz_policy_t policy, dns_rpz_type_t type, dns_name_t *rpz_qname) argument
4117 dns_rpz_policy_t policy; local
4256 dns_rpz_policy_t policy; local
[all...]
/macosx-10.9.5/xnu-2422.115.4/tools/tests/affinity/
H A Dpool.c178 thread_affinity_policy_data_t policy; local
180 policy.affinity_tag = tag;
183 (thread_policy_t) &policy,
H A Dsets.c195 thread_affinity_policy_data_t policy; local
206 policy.affinity_tag = lp->setnum;
209 (thread_policy_t) &policy,
/macosx-10.9.5/Heimdal-323.92.1/lib/hdb/
H A Dhdb-od.c996 booleanPolicy(CFDictionaryRef policy, CFStringRef key) argument
998 CFTypeRef val = CFDictionaryGetValue(policy, key);
1015 timePolicy(CFDictionaryRef policy, CFStringRef key) argument
1017 CFTypeRef val = CFDictionaryGetValue(policy, key);
1033 apply_policy(hdb_entry *entry, CFDictionaryRef policy) argument
1038 if (booleanPolicy(policy, CFSTR("isAdminUser")))
1041 entry->flags.invalid = booleanPolicy(policy, CFSTR("isDisabled"));
1043 if (booleanPolicy(policy, CFSTR("newPasswordRequired"))) {
1050 } else if (booleanPolicy(policy, CFSTR("usingExpirationDate"))) {
1051 time_t t = timePolicy(policy, CFST
1188 CFDictionaryRef policy; local
[all...]
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/
H A Dhelper.c1722 /* Caller owns object returned in `policy' */
1728 ipsec_policy_t *policy, size_t *len)
1737 *policy = NULL;
1781 debug("policy=\"%s\"", buf);
1782 if (NULL == (*policy = (ipsec_policy_t)ipsec_set_policy(buf, n)))
1785 "Could not create IPsec policy from \"%s\"", buf);
1789 *len = ((ipsec_policy_t)(*policy))->sadb_x_policy_len * 8;
1799 ipsec_policy_t policy, size_t len)
1807 (char *)policy, len, policySeq++);
1810 (char *)policy, le
1724 generateTunnelPolicy(mDNSTunnelPolicyWhich which, mDNSTunnelType type, int in, v4addr_t src, uint16_t src_port, v4addr_t dst, uint16_t dst_port, v6addr_t src6, v6addr_t dst6, ipsec_policy_t *policy, size_t *len) argument
1796 sendPolicy(int s, int setup, struct sockaddr *src, uint8_t src_bits, struct sockaddr *dst, uint8_t dst_bits, ipsec_policy_t policy, size_t len) argument
1865 ipsec_policy_t policy = NULL; local
[all...]
/macosx-10.9.5/WebKit2-7537.78.2/UIProcess/API/gtk/
H A DWebKitWebContext.cpp735 * @policy: a #WebKitTLSErrorsPolicy
737 * Set the TLS errors policy of @context as @policy
739 void webkit_web_context_set_tls_errors_policy(WebKitWebContext* context, WebKitTLSErrorsPolicy policy) argument
743 if (context->priv->tlsErrorsPolicy == policy)
746 context->priv->tlsErrorsPolicy = policy;
747 bool ignoreTLSErrors = policy == WEBKIT_TLS_ERRORS_POLICY_IGNORE;
756 * Get the TLS errors policy of @context
H A DWebKitWebContext.h69 * Enum values used to denote the TLS errors policy.
185 WebKitTLSErrorsPolicy policy);

Completed in 245 milliseconds

<<1112131415161718