Searched refs:policy (Results 76 - 100 of 435) sorted by relevance

1234567891011>>

/macosx-10.9.5/WebCore-7537.78.1/fileapi/
H A DFile.h48 static PassRefPtr<File> create(const String& path, ContentTypeLookupPolicy policy = WellKnownContentTypes)
50 return adoptRef(new File(path, policy));
81 static PassRefPtr<File> createWithName(const String& path, const String& name, ContentTypeLookupPolicy policy = WellKnownContentTypes)
84 return adoptRef(new File(path, policy));
85 return adoptRef(new File(path, name, policy));
H A DFile.cpp38 static String getContentTypeFromFileName(const String& name, File::ContentTypeLookupPolicy policy) argument
43 if (policy == File::WellKnownContentTypes)
46 ASSERT(policy == File::AllContentTypes);
62 static PassOwnPtr<BlobData> createBlobDataForFile(const String& path, File::ContentTypeLookupPolicy policy) argument
64 return createBlobDataForFileWithType(path, getContentTypeFromFileName(path, policy));
67 static PassOwnPtr<BlobData> createBlobDataForFileWithName(const String& path, const String& fileSystemName, File::ContentTypeLookupPolicy policy) argument
69 return createBlobDataForFileWithType(path, getContentTypeFromFileName(fileSystemName, policy));
99 File::File(const String& path, ContentTypeLookupPolicy policy) argument
100 : Blob(createBlobDataForFile(path, policy), -1)
124 File::File(const String& path, const String& name, ContentTypeLookupPolicy policy) argument
[all...]
/macosx-10.9.5/WebKit2-7537.78.2/Shared/linux/SeccompFilters/
H A DSyscallPolicy.cpp51 // The root directory policy needs to be set because it is the
72 PermissionMap::const_iterator policy = m_filePermission.find(String(canonicalPath)); local
73 if (policy != m_filePermission.end()) {
76 return (permission & policy->value) == permission;
79 // If not a directory neither a file with a policy defined,
91 PermissionMap::const_iterator policy = m_directoryPermission.find(String(canonicalPath)); local
92 while (policy == m_directoryPermission.end()) {
94 policy = m_directoryPermission.find(String(currentBaseDirectory));
100 return (permission & policy->value) == permission;
135 // The root policy wil
[all...]
/macosx-10.9.5/SecurityTool-55115/
H A Didentity_find.c181 void printIdentity(SecIdentityRef identity, SecPolicyRef policy, int ordinalValue) argument
226 // Default to X.509 Basic if no policy was specified
227 if (!policy) {
230 SecPolicySearchCopyNext(policySearch, &policy);
234 CFRetain(policy);
237 // Create the trust reference, given policy and certificates
245 status = SecTrustCreateWithCertificates((CFArrayRef)certificates, policy, &trust);
258 safe_CFRelease(&policy);
293 // get a policy ref for the specified policy OI
295 SecPolicyRef policy = NULL; local
401 SecPolicyRef policy = NULL; local
[all...]
/macosx-10.9.5/cups-372.4/cups/scheduler/
H A Dtls-darwin.c165 SecPolicyRef policy = NULL; /* Policy ref */ local
189 policy = SecPolicyCreateSSL(1, servername);
194 if (!policy)
196 cupsdLogMessage(CUPSD_LOG_ERROR, "Cannot create ssl policy reference");
212 CFDictionaryAddValue(query, kSecMatchPolicy, policy);
238 CFRelease(policy);
240 policy = SecPolicyCreateSSL(1, servername);
245 if (!policy)
247 cupsdLogMessage(CUPSD_LOG_ERROR, "Cannot create ssl policy reference");
251 CFDictionarySetValue(query, kSecMatchPolicy, policy);
[all...]
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/libipsec/
H A Dipsec_dump_policy.c73 * policy is sadb_x_policy buffer.
78 ipsec_dump_policy(policy, delimiter)
79 ipsec_policy_t policy;
82 return ipsec_dump_policy1(policy, delimiter, 0);
86 ipsec_dump_policy_withports(policy, delimiter)
87 void *policy;
90 return ipsec_dump_policy1(policy, delimiter, 1);
94 ipsec_dump_policy1(policy, delimiter, withports)
95 void *policy;
99 struct sadb_x_policy *xpl = policy;
[all...]
/macosx-10.9.5/Security-55471.14.18/sec/Security/
H A DSecPolicy.c169 /* Public policy names. */
201 /* Private policy names */
245 IDEA Store partial valid policy tree in each chain? Result tree pruning might make this not feasible unless you can pretend to prune the tree without actually deleting nodes and somehow still have shable nodes with parent chains (this assumes that chains will be built as cached things from the root down), and we can build something equivalent to rfc5280 in a tree of certs. So we need to maintain a cache of leaf->chain with this certificate as any_ca_cert->tree. Revocation status caching can be done in this cache as well, so maybe the cache should be in sqlite3, or at least written there before exit and querying of the cache could be done first on the in core (possibly CF or custom tree like structure) and secondarly on the sqlite3 backed store. We should choose the lowest memory footprint solution in my mind, while choosing a sqlite3 cache size that gives us a resonable io usage pattern.
269 ALTERNATIVE: A policy can have one or more sub-policies. Each sub-policy will be evaluated only after the parent policy succeeds. Subpolicies can be either required (making the parent policy fail) or optional making the parent policy succeed, but allowing the chainbuilder to continue building chains after an optional subpolicy failure in search of a chain for which the subpolicy also succeeded. Subpolicies can be dynamically added to the policy evaluation context tree (a tree with a node for every node in the certificate path. This tree however is from the leaf up stored in the SecCertificatePathRef objects themselves possibly - requiring a separate shared subtree of nodes for the underlying certificate state tree.) by a parent policy a
425 SecPolicyRef policy = (SecPolicyRef) cf; local
438 SecPolicyRef policy = (SecPolicyRef) cf; local
444 SecPolicyRef policy = (SecPolicyRef) cf; local
508 SecPolicyRef policy = NULL; local
684 SecPolicySetOid(SecPolicyRef policy, CFStringRef oid) argument
692 SecPolicySetOptionsValue(SecPolicyRef policy, CFStringRef key, CFTypeRef value) argument
779 SecPolicyCopyXPCObject(SecPolicyRef policy, CFErrorRef *error) argument
795 SecPolicyAppendToXPCArray(SecPolicyRef policy, xpc_object_t policies, CFErrorRef *error) argument
824 SecPolicyRef policy = NULL; local
855 SecPolicyRef policy = SecPolicyCreateWithXPCObject(xpc_array_get_value(xpc_policies, ix), error); local
[all...]
H A DSecCMS.h58 @param policy specifies policy or array thereof should be used (optional).
75 CFTypeRef policy, SecTrustRef *trustref,
83 CFTypeRef policy, SecTrustRef *trustref, CFDataRef *attached_contents);
168 CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certificates,
/macosx-10.9.5/WebKit2-7537.78.2/UIProcess/
H A DWebCookieManagerProxy.cpp152 void WebCookieManagerProxy::setHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument
155 persistHTTPCookieAcceptPolicy(policy);
158 context()->setInitialHTTPCookieAcceptPolicy(policy);
161 context()->sendToNetworkingProcessRelaunchingIfNecessary(Messages::WebCookieManager::SetHTTPCookieAcceptPolicy(policy));
174 void WebCookieManagerProxy::didGetHTTPCookieAcceptPolicy(uint32_t policy, uint64_t callbackID) argument
182 callback->performCallbackWithReturnValue(policy);
/macosx-10.9.5/system_cmds-597.90.1/system_cmds-597.1.1/taskpolicy.tproj/
H A Dtaskpolicy.c65 warnx("Could not parse '%s' as a disk policy", optarg);
72 warnx("Could not parse '%s' as a disk policy", optarg);
160 fprintf(stderr, "Usage: %s [-x|-X] [-d <policy>] [-g policy] [-b] [-t <tier>] [-l <tier>] <program> [<pargs> [...]]\n", getprogname());
166 long policy; local
170 policy = strtol(strpolicy, &endptr, 0);
173 return (int)policy;
194 long policy; local
198 policy = strtol(strtier, &endptr, 0);
200 switch (policy) {
[all...]
/macosx-10.9.5/system_cmds-597.90.1/taskpolicy.tproj/
H A Dtaskpolicy.c65 warnx("Could not parse '%s' as a disk policy", optarg);
72 warnx("Could not parse '%s' as a disk policy", optarg);
160 fprintf(stderr, "Usage: %s [-x|-X] [-d <policy>] [-g policy] [-b] [-t <tier>] [-l <tier>] <program> [<pargs> [...]]\n", getprogname());
166 long policy; local
170 policy = strtol(strpolicy, &endptr, 0);
173 return (int)policy;
194 long policy; local
198 policy = strtol(strtier, &endptr, 0);
200 switch (policy) {
[all...]
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/Common/
H A DipsecMessageTracer.h51 #define IPSECPOLICYTRACEREVENT(policy, eventCode, message, failure_reason)
62 #define IPSECPOLICYTRACEREVENT(policy, eventCode, message, failure_reason) ipsecPolicyTracerEvent(policy, eventCode, message, failure_reason)
/macosx-10.9.5/Heimdal-323.92.1/lib/kadm5/
H A Dmodify_s.c52 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default"))
79 ext.data.u.policy = strdup(princ->policy);
80 if (ext.data.u.policy == NULL) {
84 /* This calls free_HDB_extension(), freeing ext.data.u.policy */
/macosx-10.9.5/objc4-551.1/runtime/
H A Dobjc-references.mm159 ObjcAssociation(uintptr_t policy, id value) : _policy(policy), _value(value) {}
162 uintptr_t policy() const { return _policy; }
210 // expanded policy bits.
223 uintptr_t policy = OBJC_ASSOCIATION_ASSIGN;
235 policy = entry.policy();
236 if (policy & OBJC_ASSOCIATION_GETTER_RETAIN) ((id(*)(id, SEL))objc_msgSend)(value, SEL_retain);
240 if (value && (policy & OBJC_ASSOCIATION_GETTER_AUTORELEASE)) {
246 static id acquireValue(id value, uintptr_t policy) {
[all...]
/macosx-10.9.5/webdavfs-352.92.2/webdav_cert_ui.tproj/
H A DController.m72 * Returns a copy of the SSL policy.
77 SecPolicyRef policy;
85 status = SecPolicySearchCopyNext(policy_search, &policy);
88 *ret_policy = policy;
182 SecPolicyRef policy;
189 status = SSLSecPolicyCopy(&policy);
192 status = SecTrustCreateWithCertificates(cert_list, policy, &trust);
227 [panel setPolicies:(id)policy];
263 CFRelease(policy);
/macosx-10.9.5/xnu-2422.115.4/osfmk/kern/
H A Dtask_swap.c49 #include <mach/policy.h>
/macosx-10.9.5/xnu-2422.115.4/osfmk/mach/
H A Dpolicy.h63 * mach/policy.h
65 * Definitions for scheduing policy.
87 * policy 'class'.
97 * Check if policy is of 'class' fixed-priority.
102 * Check if policy is valid.
104 #define invalid_policy(policy) \
105 ((policy) != POLICY_TIMESHARE && \
106 (policy) != POLICY_RR && \
107 (policy) != POLICY_FIFO)
111 * Types for TIMESHARE policy
[all...]
H A Dprocessor_set.defs99 * Enable policy for processor set
103 policy : int);
106 * Disable policy for processor set
110 policy : int;
129 * Allows control of enabled policies, and per-policy base and limit
/macosx-10.9.5/BerkeleyDB-21/db/tcl/
H A Dtcl_lock.c64 u_int32_t flag, policy; local
68 flag = policy = 0;
77 FLAG_CHECK(policy);
78 policy = DB_LOCK_DEFAULT;
81 FLAG_CHECK(policy);
82 policy = DB_LOCK_EXPIRE;
85 FLAG_CHECK(policy);
86 policy = DB_LOCK_MAXLOCKS;
89 FLAG_CHECK(policy);
90 policy
[all...]
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/tests/data/
H A Dslapd-ldapgluegroups.conf34 authz-policy to
H A Dslapd-ldapgluepeople.conf34 authz-policy to
H A Dslapd-whoami.conf33 authz-policy both
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DSecCertificateRequest.h70 Create a certificate request operation based on a policy and certificate
71 type. If a policy is not specified, one will be chosen for the caller.
75 @param policy A policy.
88 const CSSM_OID *policy,
151 @param policy A policy.
167 const CSSM_OID *policy,
177 Get policy-specific data following a SecCertificateRequestSubmit.
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DSecCertificateRequest.h70 Create a certificate request operation based on a policy and certificate
71 type. If a policy is not specified, one will be chosen for the caller.
75 @param policy A policy.
88 const CSSM_OID *policy,
151 @param policy A policy.
167 const CSSM_OID *policy,
177 Get policy-specific data following a SecCertificateRequestSubmit.
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DSecCertificateRequest.h70 Create a certificate request operation based on a policy and certificate
71 type. If a policy is not specified, one will be chosen for the caller.
75 @param policy A policy.
88 const CSSM_OID *policy,
151 @param policy A policy.
167 const CSSM_OID *policy,
177 Get policy-specific data following a SecCertificateRequestSubmit.

Completed in 187 milliseconds

1234567891011>>