/macosx-10.9.5/xnu-2422.115.4/osfmk/kern/ |
H A D | sched.h | 70 #include <mach/policy.h>
|
H A D | task_policy.c | 59 * Threads and tasks have three policy fields: requested, effective, and pending. 60 * Requested represents the wishes of each interface that influences task policy. 61 * Effective represents the distillation of that policy into a set of behaviors. 64 * Each interface that has an input into the task policy state machine controls a field in requested. 68 * All kernel subsystems that behave differently based on task policy call into 69 * the get_effective_policy function, which returns the decision of the task policy state machine 73 * Here are the steps to change a policy on a task or thread: 75 * 2) Change requested field for the relevant policy 76 * 3) Run a task policy update, which recalculates effective based on requested, 80 * 5) Run task policy updat 945 thread_precedence_policy_data_t policy; local 1671 set_thread_iotier_override(thread_t thread, int policy) argument 2010 proc_set_task_ruse_cpu(task_t task, uint32_t policy, uint8_t percentage, uint64_t interval, uint64_t deadline, int cpumon_entitled) argument [all...] |
H A D | processor.c | 64 #include <mach/policy.h> 761 * Allow indicated policy on processor set. 767 __unused int policy) 775 * Forbid indicated policy on processor set. Time sharing cannot 781 __unused int policy, 1005 * Allows control of enabled policies, and per-policy base and limit 765 processor_set_policy_enable( __unused processor_set_t pset, __unused int policy) argument 779 processor_set_policy_disable( __unused processor_set_t pset, __unused int policy, __unused boolean_t change_threads) argument
|
H A D | sync_sema.c | 161 int policy, 169 if (task == TASK_NULL || value < 0 || policy > SYNC_POLICY_MAX) 177 kret = wait_queue_init(&s->wait_queue, policy); /* also inits lock */ 158 semaphore_create( task_t task, semaphore_t *new_semaphore, int policy, int value) argument
|
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/ |
H A D | signerutils.cpp | 345 CFRef<SecPolicyRef> policy = SecPolicyCreateWithOID(kSecPolicyAppleCodeSigning); local 347 MacOSError::check(SecTrustCreateWithCertificates(CFArrayRef(signingCert.get()), policy, &trust.aref()));
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | IdentityCursor.cpp | 42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument 44 mPolicy(policy), 145 // If there was no policy specified, we're done. 154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with 184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy 202 // Perform a full trust evaluation on the certificate with the specified policy.
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/ |
H A D | signerutils.cpp | 345 CFRef<SecPolicyRef> policy = SecPolicyCreateWithOID(kSecPolicyAppleCodeSigning); local 347 MacOSError::check(SecTrustCreateWithCertificates(CFArrayRef(signingCert.get()), policy, &trust.aref()));
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | IdentityCursor.cpp | 42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument 44 mPolicy(policy), 145 // If there was no policy specified, we're done. 154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with 184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy 202 // Perform a full trust evaluation on the certificate with the specified policy.
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | IdentityCursor.cpp | 42 IdentityCursorPolicyAndID::IdentityCursorPolicyAndID(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage, CFStringRef idString, SecPolicyRef policy, bool returnOnlyValidIdentities) : argument 44 mPolicy(policy), 145 // If there was no policy specified, we're done. 154 // Rather than try to duplicate the TP's policy logic here, we'll just call the TP with 184 if (!evInfo || evInfo->NumStatusCodes > 0) // per-cert codes means we can't use this cert for this policy 202 // Perform a full trust evaluation on the certificate with the specified policy.
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Tool/ |
H A D | show_certificates.c | 131 SecPolicyRef policy = SecPolicyCreateSSL(true, NULL); local 133 OSStatus status = SecTrustCreateWithCertificates(certs, policy, &trust);
|
/macosx-10.9.5/WebCore-7537.78.1/workers/ |
H A D | WorkerContext.cpp | 114 void WorkerContext::applyContentSecurityPolicyFromString(const String& policy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType) argument 117 contentSecurityPolicy()->didReceiveHeader(policy, contentSecurityPolicyType);
|
/macosx-10.9.5/WebKit-7537.78.2/win/ |
H A D | WebMutableURLRequest.cpp | 283 /* [in] */ WebURLRequestCachePolicy policy) 285 m_request.setCachePolicy(core(policy)); 282 setCachePolicy( WebURLRequestCachePolicy policy) argument
|
/macosx-10.9.5/WebKit2-7537.78.2/Shared/linux/SeccompFilters/ |
H A D | SeccompBroker.cpp | 249 void SeccompBroker::launchProcess(SeccompFilters* filters, const SyscallPolicy& policy) argument 278 seccompBroker.setSyscallPolicy(policy);
|
/macosx-10.9.5/JavaScriptCore-7537.78.1/interpreter/ |
H A D | Interpreter.cpp | 114 // Currently the requiredStack is computed based on a policy. See comments 857 StackPolicy policy(*this, nativeStack); 858 if (!nativeStack.isSafeToRecurse(policy.requiredCapacity())) 1023 StackPolicy policy(*this, nativeStack); 1024 if (!nativeStack.isSafeToRecurse(policy.requiredCapacity())) 1101 StackPolicy policy(*this, nativeStack); 1102 if (!nativeStack.isSafeToRecurse(policy.requiredCapacity())) 1182 StackPolicy policy(*this, nativeStack); 1183 if (!nativeStack.isSafeToRecurse(policy.requiredCapacity())) { 1285 StackPolicy policy(*thi [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/ |
H A D | ssl-39-echo.c | 335 SecPolicyRef policy = NULL; 340 policy = SecPolicyCreateSSL(false, NULL); 341 if (!policy) 354 if (SecTrustCreateWithCertificates(certs, policy, &trust)) 357 CFRelease(policy); 373 if (policy) 374 CFRelease(policy);
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-27-sectrust-exceptions.c | 310 SecPolicyRef policy = SecPolicyCreateSSL(false, CFSTR("store.apple.com")); local 313 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust"); 329 CFReleaseSafe(policy); 330 policy = SecPolicyCreateSSL(false, CFSTR("badstore.apple.com")); 331 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust with hostname mismatch"); 343 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust"); 375 CFReleaseSafe(policy);
|
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/ |
H A D | EAPTLSUtil.c | 1227 SecPolicyRef policy = NULL; local 1244 policy = SecPolicyCreateEAP(FALSE, trusted_server_names); 1245 if (policy == NULL) { 1248 status = SecTrustCreateWithCertificates(server_certs, policy, &trust); 1328 my_CFRelease(&policy); 1619 SecPolicyRef policy = NULL; local 1678 status = EAPSecPolicyCopy(&policy); 1682 status = SecTrustCreateWithCertificates(server_certs, policy, &trust); 1772 my_CFRelease(&policy);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/sslViewer/ |
H A D | sslAppUtils.cpp | 530 SecPolicyRef policy = NULL; 579 ortn = SecPolicySearchCopyNext(policySearch, &policy); 585 /* build a SecTrustRef for specified policy and certs */ 587 policy, &secTrust); 681 if(policy) { 682 CFRelease(policy);
|
/macosx-10.9.5/network_cmds-433/traceroute6.tproj/ |
H A D | traceroute6.c | 317 int setpolicy(int so, char *policy); 993 setpolicy(so, policy) 995 char *policy; 999 buf = ipsec_set_policy(policy, strlen(policy));
|
/macosx-10.9.5/ruby-104/ruby/ |
H A D | thread_pthread.c | 937 int policy; local 940 pthread_getschedparam(th->thread_id, &policy, &sp); 941 max = sched_get_priority_max(policy); 942 min = sched_get_priority_min(policy); 952 pthread_setschedparam(th->thread_id, policy, &sp);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/ |
H A D | tpCertGroup.cpp | 376 * Map a policy OID to one of the standard (non-revocation) policies. 377 * Returns true if it's a standard policy. 504 * PolicyIdentifiers, Optional policy OID. NULL indicates default 505 * X.509 trust policy. 529 * policy action. 559 /* keep track of whether we did policy checking; if not, we do defaults */ 630 /* default policy OID in case caller hasn't specified one */ 634 /* keep going, I guess - no policy-specific info - use kTPx509Basic */ 642 /* keep going, I guess - no policy-specific info - use kTPx509Basic */ 645 /* get policy [all...] |
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/Common/ |
H A D | key_debug.c | 532 printf("kdebug_sadb_x_policy: wrong policy struct.\n"); 537 printf("invalid ipsec policy length\n"); 548 panic("kdebug_sadb_x_policy: wrong policy struct.\n"); 594 printf("secpolicy{ refcnt=%u state=%u policy=%u\n", 595 sp->refcnt, sp->state, sp->policy); 599 switch (sp->policy) { 630 printf("kdebug_secpolicy: Invalid policy found. %d\n", 631 sp->policy);
|
/macosx-10.9.5/xnu-2422.115.4/bsd/netkey/ |
H A D | key_debug.c | 481 printf("kdebug_sadb_x_policy: wrong policy struct.\n"); 486 printf("invalid ipsec policy length\n"); 497 panic("kdebug_sadb_x_policy: wrong policy struct.\n"); 513 printf("secpolicy{ refcnt=%u state=%u policy=%u\n", 514 sp->refcnt, sp->state, sp->policy); 518 switch (sp->policy) { 545 printf("kdebug_secpolicy: Invalid policy found. %d\n", 546 sp->policy);
|
/macosx-10.9.5/xnu-2422.115.4/tools/tests/MPMMTest/ |
H A D | MPMMtest.c | 334 thread_affinity_policy_data_t policy; local 347 policy.affinity_tag = tag; 350 (thread_policy_t) &policy,
|
/macosx-10.9.5/Heimdal-323.92.1/tests/gss/ |
H A D | check-context.in | 340 echo "host without ok-as-delegate with policy-delegate" ; > ${testdir}/messages.log 343 --policy-delegate \ 348 echo "ok-as-delegate used by policy" ; > ${testdir}/messages.log 351 --policy-delegate \ 360 echo "policy delegate to non delegate host" ; > ${testdir}/messages.log 363 --policy-delegate \
|