Searched refs:policy (Results 276 - 300 of 435) sorted by relevance

<<1112131415161718

/macosx-10.9.5/xnu-2422.115.4/osfmk/kern/
H A Dsched.h70 #include <mach/policy.h>
H A Dtask_policy.c59 * Threads and tasks have three policy fields: requested, effective, and pending.
60 * Requested represents the wishes of each interface that influences task policy.
61 * Effective represents the distillation of that policy into a set of behaviors.
64 * Each interface that has an input into the task policy state machine controls a field in requested.
68 * All kernel subsystems that behave differently based on task policy call into
69 * the get_effective_policy function, which returns the decision of the task policy state machine
73 * Here are the steps to change a policy on a task or thread:
75 * 2) Change requested field for the relevant policy
76 * 3) Run a task policy update, which recalculates effective based on requested,
80 * 5) Run task policy updat
945 thread_precedence_policy_data_t policy; local
1671 set_thread_iotier_override(thread_t thread, int policy) argument
2010 proc_set_task_ruse_cpu(task_t task, uint32_t policy, uint8_t percentage, uint64_t interval, uint64_t deadline, int cpumon_entitled) argument
[all...]
H A Dprocessor.c64 #include <mach/policy.h>
761 * Allow indicated policy on processor set.
767 __unused int policy)
775 * Forbid indicated policy on processor set. Time sharing cannot
781 __unused int policy,
1005 * Allows control of enabled policies, and per-policy base and limit
765 processor_set_policy_enable( __unused processor_set_t pset, __unused int policy) argument
779 processor_set_policy_disable( __unused processor_set_t pset, __unused int policy, __unused boolean_t change_threads) argument
H A Dsync_sema.c161 int policy,
169 if (task == TASK_NULL || value < 0 || policy > SYNC_POLICY_MAX)
177 kret = wait_queue_init(&s->wait_queue, policy); /* also inits lock */
158 semaphore_create( task_t task, semaphore_t *new_semaphore, int policy, int value) argument
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/
H A Dsignerutils.cpp345 CFRef<SecPolicyRef> policy = SecPolicyCreateWithOID(kSecPolicyAppleCodeSigning); local
347 MacOSError::check(SecTrustCreateWithCertificates(CFArrayRef(signingCert.get()), policy, &trust.aref()));
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DIdentityCursor.cpp42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument
44 mPolicy(policy),
145 // If there was no policy specified, we're done.
154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with
184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy
202 // Perform a full trust evaluation on the certificate with the specified policy.
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/
H A Dsignerutils.cpp345 CFRef<SecPolicyRef> policy = SecPolicyCreateWithOID(kSecPolicyAppleCodeSigning); local
347 MacOSError::check(SecTrustCreateWithCertificates(CFArrayRef(signingCert.get()), policy, &trust.aref()));
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DIdentityCursor.cpp42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument
44 mPolicy(policy),
145 // If there was no policy specified, we're done.
154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with
184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy
202 // Perform a full trust evaluation on the certificate with the specified policy.
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DIdentityCursor.cpp42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument
44 mPolicy(policy),
145 // If there was no policy specified, we're done.
154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with
184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy
202 // Perform a full trust evaluation on the certificate with the specified policy.
/macosx-10.9.5/Security-55471.14.18/sec/Security/Tool/
H A Dshow_certificates.c131 SecPolicyRef policy = SecPolicyCreateSSL(true, NULL); local
133 OSStatus status = SecTrustCreateWithCertificates(certs, policy, &trust);
/macosx-10.9.5/WebCore-7537.78.1/workers/
H A DWorkerContext.cpp114 void WorkerContext::applyContentSecurityPolicyFromString(const String& policy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType) argument
117 contentSecurityPolicy()->didReceiveHeader(policy, contentSecurityPolicyType);
/macosx-10.9.5/WebKit-7537.78.2/win/
H A DWebMutableURLRequest.cpp283 /* [in] */ WebURLRequestCachePolicy policy)
285 m_request.setCachePolicy(core(policy));
282 setCachePolicy( WebURLRequestCachePolicy policy) argument
/macosx-10.9.5/WebKit2-7537.78.2/Shared/linux/SeccompFilters/
H A DSeccompBroker.cpp249 void SeccompBroker::launchProcess(SeccompFilters* filters, const SyscallPolicy& policy) argument
278 seccompBroker.setSyscallPolicy(policy);
/macosx-10.9.5/JavaScriptCore-7537.78.1/interpreter/
H A DInterpreter.cpp114 // Currently the requiredStack is computed based on a policy. See comments
857 StackPolicy policy(*this, nativeStack);
858 if (!nativeStack.isSafeToRecurse(policy.requiredCapacity()))
1023 StackPolicy policy(*this, nativeStack);
1024 if (!nativeStack.isSafeToRecurse(policy.requiredCapacity()))
1101 StackPolicy policy(*this, nativeStack);
1102 if (!nativeStack.isSafeToRecurse(policy.requiredCapacity()))
1182 StackPolicy policy(*this, nativeStack);
1183 if (!nativeStack.isSafeToRecurse(policy.requiredCapacity())) {
1285 StackPolicy policy(*thi
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/
H A Dssl-39-echo.c335 SecPolicyRef policy = NULL;
340 policy = SecPolicyCreateSSL(false, NULL);
341 if (!policy)
354 if (SecTrustCreateWithCertificates(certs, policy, &trust))
357 CFRelease(policy);
373 if (policy)
374 CFRelease(policy);
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/
H A Dsi-27-sectrust-exceptions.c310 SecPolicyRef policy = SecPolicyCreateSSL(false, CFSTR("store.apple.com")); local
313 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust");
329 CFReleaseSafe(policy);
330 policy = SecPolicyCreateSSL(false, CFSTR("badstore.apple.com"));
331 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust with hostname mismatch");
343 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust");
375 CFReleaseSafe(policy);
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/
H A DEAPTLSUtil.c1227 SecPolicyRef policy = NULL; local
1244 policy = SecPolicyCreateEAP(FALSE, trusted_server_names);
1245 if (policy == NULL) {
1248 status = SecTrustCreateWithCertificates(server_certs, policy, &trust);
1328 my_CFRelease(&policy);
1619 SecPolicyRef policy = NULL; local
1678 status = EAPSecPolicyCopy(&policy);
1682 status = SecTrustCreateWithCertificates(server_certs, policy, &trust);
1772 my_CFRelease(&policy);
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/sslViewer/
H A DsslAppUtils.cpp530 SecPolicyRef policy = NULL;
579 ortn = SecPolicySearchCopyNext(policySearch, &policy);
585 /* build a SecTrustRef for specified policy and certs */
587 policy, &secTrust);
681 if(policy) {
682 CFRelease(policy);
/macosx-10.9.5/network_cmds-433/traceroute6.tproj/
H A Dtraceroute6.c317 int setpolicy(int so, char *policy);
993 setpolicy(so, policy)
995 char *policy;
999 buf = ipsec_set_policy(policy, strlen(policy));
/macosx-10.9.5/ruby-104/ruby/
H A Dthread_pthread.c937 int policy; local
940 pthread_getschedparam(th->thread_id, &policy, &sp);
941 max = sched_get_priority_max(policy);
942 min = sched_get_priority_min(policy);
952 pthread_setschedparam(th->thread_id, policy, &sp);
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/
H A DtpCertGroup.cpp376 * Map a policy OID to one of the standard (non-revocation) policies.
377 * Returns true if it's a standard policy.
504 * PolicyIdentifiers, Optional policy OID. NULL indicates default
505 * X.509 trust policy.
529 * policy action.
559 /* keep track of whether we did policy checking; if not, we do defaults */
630 /* default policy OID in case caller hasn't specified one */
634 /* keep going, I guess - no policy-specific info - use kTPx509Basic */
642 /* keep going, I guess - no policy-specific info - use kTPx509Basic */
645 /* get policy
[all...]
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/Common/
H A Dkey_debug.c532 printf("kdebug_sadb_x_policy: wrong policy struct.\n");
537 printf("invalid ipsec policy length\n");
548 panic("kdebug_sadb_x_policy: wrong policy struct.\n");
594 printf("secpolicy{ refcnt=%u state=%u policy=%u\n",
595 sp->refcnt, sp->state, sp->policy);
599 switch (sp->policy) {
630 printf("kdebug_secpolicy: Invalid policy found. %d\n",
631 sp->policy);
/macosx-10.9.5/xnu-2422.115.4/bsd/netkey/
H A Dkey_debug.c481 printf("kdebug_sadb_x_policy: wrong policy struct.\n");
486 printf("invalid ipsec policy length\n");
497 panic("kdebug_sadb_x_policy: wrong policy struct.\n");
513 printf("secpolicy{ refcnt=%u state=%u policy=%u\n",
514 sp->refcnt, sp->state, sp->policy);
518 switch (sp->policy) {
545 printf("kdebug_secpolicy: Invalid policy found. %d\n",
546 sp->policy);
/macosx-10.9.5/xnu-2422.115.4/tools/tests/MPMMTest/
H A DMPMMtest.c334 thread_affinity_policy_data_t policy; local
347 policy.affinity_tag = tag;
350 (thread_policy_t) &policy,
/macosx-10.9.5/Heimdal-323.92.1/tests/gss/
H A Dcheck-context.in340 echo "host without ok-as-delegate with policy-delegate" ; > ${testdir}/messages.log
343 --policy-delegate \
348 echo "ok-as-delegate used by policy" ; > ${testdir}/messages.log
351 --policy-delegate \
360 echo "policy delegate to non delegate host" ; > ${testdir}/messages.log
363 --policy-delegate \

Completed in 403 milliseconds

<<1112131415161718