/macosx-10.9.5/WebKit2-7537.78.2/Shared/linux/SeccompFilters/ |
H A D | OpenSyscall.cpp | 133 PassOwnPtr<SyscallResult> OpenSyscall::execute(const SyscallPolicy& policy) argument 152 if (!policy.hasPermissionForPath(m_path.data(), permission))
|
/macosx-10.9.5/adv_cmds-153/ps/ |
H A D | tasks.c | 140 switch(ki->tasks_info.policy) { 215 ki->thval[j].tb.policy, &ki->thval[j].schedinfo);
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/tsiggss/ns1/ |
H A D | named.conf | 48 update-policy {
|
/macosx-10.9.5/dtrace-118.1/libdtrace/ |
H A D | dt_options.c | 771 dtrace_optval_t policy = DTRACEOPT_UNSET; local 779 policy = _dtrace_bufpolicies[i].dtbp_policy; 784 if (policy == DTRACEOPT_UNSET) 787 dtp->dt_options[DTRACEOPT_BUFPOLICY] = policy; 805 dtrace_optval_t policy = DTRACEOPT_UNSET; local 813 policy = _dtrace_bufresize[i].dtbr_policy; 818 if (policy == DTRACEOPT_UNSET) 821 dtp->dt_options[DTRACEOPT_BUFRESIZE] = policy;
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/libipsec/ |
H A D | policy_parse.y | 33 * IN/OUT bound policy configuration take place such below: 34 * in <priority> <policy> 35 * out <priority> <policy> 49 * <policy> is one of following: 646 caddr_t policy; 648 policy = policy_parse(msg, msglen); 649 if (policy == NULL) { 656 return policy;
|
/macosx-10.9.5/postfix-252/Postfix.Config/ |
H A D | master.cf.default | 122 # Greylist policy server 124 policy unix - n n - - spawn
|
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/security/ |
H A D | policy.rb | 22 def initialize name, policy = {}, opt = {} 37 policy.each_pair do |key, val| 188 # signatures +signatures+ created by the signer depending on the +policy+ 196 "unsigned gems are not allowed by the #{name} policy" 248 # the signatures and certificate chain is valid according to the policy..
|
/macosx-10.9.5/tcl-102/tcl_ext/trf/trf/generic/ |
H A D | registry.c | 89 * standard policy with his own choice */ 90 Trf_SeekInformation natural; /* Natural seek policy, copied from the 92 Trf_SeekInformation chosen; /* Seek policy chosen from natural policy 119 Trf_SeekInformation used; /* Seek policy currently in effect, might 196 /* Information about the chosen and used seek policy and wether the user 448 char* policy)); 806 baseOpt.policy = (Tcl_Obj*) NULL; 928 baseOpt.policy = optarg; 973 baseOpt.policy ! 2340 char policy [20]; local 2368 char policy [20]; local [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/ |
H A D | StaticCode.cpp | 474 CFRef<CFTypeRef> policy = verificationPolicy(apiFlags()); local 476 MacOSError::check(CMSDecoderCopySignerStatus(cms, 0, policy, 572 // impose policy: if the signature itself draws to Apple, then so must the timestamp signature 588 // Return the TP policy used for signature verification. 594 CFRef<SecPolicyRef> policy; local 595 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref())); 601 MacOSError::check(SecPolicySetValue(policy, &optData)); 602 return policy.yield(); 607 CFRef<SecPolicyRef> policy; local 608 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_OCSP, &policy [all...] |
H A D | policyengine.cpp | 358 return makeCFNumber(OSStatus(errSecCSVetoed)); // (signal nested-code policy failure, picked up below) 415 // Hybrid policy: If we detect an installer signature, use and validate that. 459 CFRef<CFTypeRef> policy = installerPolicy(); local 461 MacOSError::check(SecTrustCreateWithCertificates(certs, policy, &trust.aref())); 541 // Create a suitable policy array for verification of installer signatures. 545 CFRef<SecPolicyRef> policy; local 546 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref())); 552 MacOSError::check(SecPolicySetValue(policy, &optData)); 553 return policy.yield(); 558 CFRef<SecPolicyRef> policy; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/ |
H A D | StaticCode.cpp | 474 CFRef<CFTypeRef> policy = verificationPolicy(apiFlags()); local 476 MacOSError::check(CMSDecoderCopySignerStatus(cms, 0, policy, 572 // impose policy: if the signature itself draws to Apple, then so must the timestamp signature 588 // Return the TP policy used for signature verification. 594 CFRef<SecPolicyRef> policy; local 595 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref())); 601 MacOSError::check(SecPolicySetValue(policy, &optData)); 602 return policy.yield(); 607 CFRef<SecPolicyRef> policy; local 608 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_OCSP, &policy [all...] |
H A D | policyengine.cpp | 358 return makeCFNumber(OSStatus(errSecCSVetoed)); // (signal nested-code policy failure, picked up below) 415 // Hybrid policy: If we detect an installer signature, use and validate that. 459 CFRef<CFTypeRef> policy = installerPolicy(); local 461 MacOSError::check(SecTrustCreateWithCertificates(certs, policy, &trust.aref())); 541 // Create a suitable policy array for verification of installer signatures. 545 CFRef<SecPolicyRef> policy; local 546 MacOSError::check(SecPolicyCopy(CSSM_CERT_X_509v3, &CSSMOID_APPLE_TP_REVOCATION_CRL, &policy.aref())); 552 MacOSError::check(SecPolicySetValue(policy, &optData)); 553 return policy.yield(); 558 CFRef<SecPolicyRef> policy; local [all...] |
/macosx-10.9.5/ICU-511.35/icuSources/common/ |
H A D | uhash.c | 52 * hashtable is set to a U_FIXED resize policy, or if memory is 190 _uhash_internalSetResizePolicy(UHashtable *hash, enum UHashResizePolicy policy) { argument 192 U_ASSERT(((int32_t)policy) >= 0); 193 U_ASSERT(((int32_t)policy) < 3); 194 hash->lowWaterRatio = RESIZE_POLICY_RATIO_TABLE[policy * 2]; 195 hash->highWaterRatio = RESIZE_POLICY_RATIO_TABLE[policy * 2 + 1]; 627 uhash_setResizePolicy(UHashtable *hash, enum UHashResizePolicy policy) { argument 629 _uhash_internalSetResizePolicy(hash, policy);
|
/macosx-10.9.5/WebKit-7537.78.2/qt/WebCoreSupport/ |
H A D | QWebFrameAdapter.cpp | 715 void QWebFrameAdapter::setScrollBarPolicy(Qt::Orientation orientation, Qt::ScrollBarPolicy policy) argument 722 horizontalScrollBarPolicy = policy; 724 frame->view()->setHorizontalScrollbarMode((ScrollbarMode)policy, policy != Qt::ScrollBarAsNeeded /* lock */); 728 verticalScrollBarPolicy = policy; 730 frame->view()->setVerticalScrollbarMode((ScrollbarMode)policy, policy != Qt::ScrollBarAsNeeded /* lock */);
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | sockmisc.c | 753 char *policy; local 770 policy = "in bypass"; 771 buf = ipsec_set_policy(policy, strlen(policy)); 789 policy = "out bypass"; 790 buf = ipsec_set_policy(policy, strlen(policy));
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-20-sectrust.c | 611 SecPolicyRef policy = SecPolicyCreateSSL(false, NULL); local 616 ok_status(SecTrustCreateWithCertificates(cert0, policy, &trust), 623 is_status(SecTrustCreateWithCertificates(kCFBooleanTrue, policy, &trust), 626 errSecParam, "create trust with boolean instead of policy"); 629 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust"); 698 ok_status(SecTrustCreateWithCertificates(cert0, policy, &trust), 722 CFReleaseSafe(policy); 725 policy = SecPolicyCreateSSL(server, CFSTR("xedge2.apple.com")); 726 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), 736 CFReleaseSafe(policy); [all...] |
H A D | si-21-sectrust-asr.c | 118 SecPolicyRef policy; local 138 isnt(policy = SecPolicyCreateBasicX509(), NULL, "create policy instance"); 140 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust for leaf"); 158 CFReleaseSafe(policy);
|
/macosx-10.9.5/SecurityTool-55115/ |
H A D | trusted_cert_add.c | 38 * -- To add anotherRoot.cer to the local admin trust settings, only for policy 51 * -- To specify a default of "deny" for policy SMIME for the admin domain: 65 * policy SSL: 127 const char *policy, /* optional - smime, ssl, etc. */ 128 const char *policyStr, /* optional policy string */ 143 if(policy != NULL) { 144 oid = policyStringToOid(policy); 222 // char *policy = NULL; 269 fprintf(stderr, "Too many policy arguments.\n"); 282 fprintf(stderr, "Too many policy strin 125 appendConstraintsToDict( const char *appPath, const char *policy, const char *policyStr, SecTrustSettingsResult resultType, CSSM_RETURN allowErr, SecTrustSettingsKeyUsage keyUse, CFMutableDictionaryRef *dict) argument [all...] |
/macosx-10.9.5/bind9-45.100/bind9/bin/named/ |
H A D | query.c | 834 dns_rpz_policy_t policy, dns_rpz_type_t type, 848 dns_rpz_type2str(type), dns_rpz_policy2str(policy), 873 * Get a policy rewrite zone database. 3842 st->m.policy = DNS_RPZ_POLICY_MISS; 3846 * Get NS, A, or AAAA rrset for response policy zone checks. 3879 st->m.policy = DNS_RPZ_POLICY_ERROR; 3887 st->m.policy = DNS_RPZ_POLICY_ERROR; 3903 st->m.policy = DNS_RPZ_POLICY_ERROR; 3953 * the IP or NSIP response policy rules of a view. 3978 * Do not check policy zone 833 rpz_log_rewrite(ns_client_t *client, const char *disabled, dns_rpz_policy_t policy, dns_rpz_type_t type, dns_name_t *rpz_qname) argument 4117 dns_rpz_policy_t policy; local 4256 dns_rpz_policy_t policy; local [all...] |
/macosx-10.9.5/xnu-2422.115.4/tools/tests/affinity/ |
H A D | pool.c | 178 thread_affinity_policy_data_t policy; local 180 policy.affinity_tag = tag; 183 (thread_policy_t) &policy,
|
H A D | sets.c | 195 thread_affinity_policy_data_t policy; local 206 policy.affinity_tag = lp->setnum; 209 (thread_policy_t) &policy,
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hdb/ |
H A D | hdb-od.c | 996 booleanPolicy(CFDictionaryRef policy, CFStringRef key) argument 998 CFTypeRef val = CFDictionaryGetValue(policy, key); 1015 timePolicy(CFDictionaryRef policy, CFStringRef key) argument 1017 CFTypeRef val = CFDictionaryGetValue(policy, key); 1033 apply_policy(hdb_entry *entry, CFDictionaryRef policy) argument 1038 if (booleanPolicy(policy, CFSTR("isAdminUser"))) 1041 entry->flags.invalid = booleanPolicy(policy, CFSTR("isDisabled")); 1043 if (booleanPolicy(policy, CFSTR("newPasswordRequired"))) { 1050 } else if (booleanPolicy(policy, CFSTR("usingExpirationDate"))) { 1051 time_t t = timePolicy(policy, CFST 1188 CFDictionaryRef policy; local [all...] |
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/ |
H A D | helper.c | 1722 /* Caller owns object returned in `policy' */ 1728 ipsec_policy_t *policy, size_t *len) 1737 *policy = NULL; 1781 debug("policy=\"%s\"", buf); 1782 if (NULL == (*policy = (ipsec_policy_t)ipsec_set_policy(buf, n))) 1785 "Could not create IPsec policy from \"%s\"", buf); 1789 *len = ((ipsec_policy_t)(*policy))->sadb_x_policy_len * 8; 1799 ipsec_policy_t policy, size_t len) 1807 (char *)policy, len, policySeq++); 1810 (char *)policy, le 1724 generateTunnelPolicy(mDNSTunnelPolicyWhich which, mDNSTunnelType type, int in, v4addr_t src, uint16_t src_port, v4addr_t dst, uint16_t dst_port, v6addr_t src6, v6addr_t dst6, ipsec_policy_t *policy, size_t *len) argument 1796 sendPolicy(int s, int setup, struct sockaddr *src, uint8_t src_bits, struct sockaddr *dst, uint8_t dst_bits, ipsec_policy_t policy, size_t len) argument 1865 ipsec_policy_t policy = NULL; local [all...] |
/macosx-10.9.5/WebKit2-7537.78.2/UIProcess/API/gtk/ |
H A D | WebKitWebContext.cpp | 735 * @policy: a #WebKitTLSErrorsPolicy 737 * Set the TLS errors policy of @context as @policy 739 void webkit_web_context_set_tls_errors_policy(WebKitWebContext* context, WebKitTLSErrorsPolicy policy) argument 743 if (context->priv->tlsErrorsPolicy == policy) 746 context->priv->tlsErrorsPolicy = policy; 747 bool ignoreTLSErrors = policy == WEBKIT_TLS_ERRORS_POLICY_IGNORE; 756 * Get the TLS errors policy of @context
|
H A D | WebKitWebContext.h | 69 * Enum values used to denote the TLS errors policy. 185 WebKitTLSErrorsPolicy policy);
|