/macosx-10.9.5/WebKit-7537.78.2/gtk/tests/ |
H A D | testglobals.c | 49 // Check default policy for well known schemes. 50 WebKitSecurityPolicy policy = webkit_get_security_policy_for_uri_scheme("http"); local 52 g_assert_cmpuint(policy & mask, ==, mask); 54 policy = webkit_get_security_policy_for_uri_scheme("https"); 56 g_assert_cmpuint(policy & mask, ==, mask); 58 policy = webkit_get_security_policy_for_uri_scheme("file"); 60 g_assert_cmpuint(policy & mask, ==, mask); 62 policy = webkit_get_security_policy_for_uri_scheme("data"); 64 g_assert_cmpuint(policy & mask, ==, mask); 66 policy [all...] |
/macosx-10.9.5/bind9-45.100/bind9/contrib/dbus/ |
H A D | named-dbus-system.conf | 5 <policy user="named"> 9 </policy> 10 <policy user="root"> 13 </policy> 14 <policy context="default"> 18 </policy>
|
/macosx-10.9.5/dcerpc-58/dcerpc/libdcethread/ |
H A D | dcethread_attr_getsched.c | 88 int policy; local 90 if (dcethread__set_errno(pthread_attr_getschedpolicy(attr, &policy))) 96 return policy;
|
H A D | dcethread_setprio.c | 88 int old, policy; local 91 if (dcethread__set_errno(pthread_getschedparam(thread->pthread, &policy, &sp))) 99 if (dcethread__set_errno(pthread_setschedparam(thread->pthread, policy, &sp)))
|
H A D | dcethread_getprio.c | 88 int policy; local 91 if (dcethread__set_errno(pthread_getschedparam(thread->pthread, &policy, &sp)))
|
/macosx-10.9.5/WebCore-7537.78.1/platform/win/ |
H A D | EditorWin.cpp | 35 PassRefPtr<Clipboard> Editor::newGeneralClipboard(ClipboardAccessPolicy policy, Frame* frame) argument 37 return Clipboard::createForCopyAndPaste(policy);
|
/macosx-10.9.5/cups-372.4/cups/desktop/ |
H A D | cups.conf | 5 <policy user="root"> 7 </policy> 10 <policy context="default"> 12 </policy>
|
/macosx-10.9.5/WebKit2-7537.78.2/UIProcess/mac/ |
H A D | WebCookieManagerProxyMac.mm | 31 void WebCookieManagerProxy::persistHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) 33 // FIXME: The sandbox appears to prevent persisting the new policy to disk, so we must set the 34 // policy in the UI Process as well as in the Web Process (to make sure it gets set on any 36 [[NSHTTPCookieStorage sharedHTTPCookieStorage] setCookieAcceptPolicy:static_cast<NSHTTPCookieAcceptPolicy>(policy)];
|
/macosx-10.9.5/WebKit2-7537.78.2/WebProcess/Cookies/mac/ |
H A D | WebCookieManagerMac.mm | 35 void WebCookieManager::platformSetHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) 37 WebFrameNetworkingContext::setCookieAcceptPolicyForAllContexts(policy);
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-24-sectrust-appleid.c | 14 SecPolicyRef policy = SecPolicyCreateAppleIDAuthorityPolicy(); local 17 runCertificateTestForDirectory(policy, CFSTR("AppleID-certs"), NULL); 19 CFReleaseSafe(policy);
|
/macosx-10.9.5/xnu-2422.115.4/libsyscall/wrappers/ |
H A D | getiopolicy_np.c | 31 int policy, error; local 37 policy = -1; 46 policy = -1; 50 policy = iop_param.iop_policy; 53 return policy; 57 setiopolicy_np(int iotype, int scope, int policy) argument 64 iop_param.iop_policy = policy;
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/libipsec/ |
H A D | ipsec_get_policylen.c | 57 ipsec_get_policylen(ipsec_policy_t policy) argument 61 if (policy) { 62 memcpy(&aligned_len, policy, sizeof(u_int16_t));
|
/macosx-10.9.5/WebKit2-7537.78.2/WebProcess/Cookies/soup/ |
H A D | WebCookieManagerSoup.cpp | 41 void WebCookieManager::platformSetHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument 47 switch (policy) { 66 HTTPCookieAcceptPolicy policy; local 71 policy = HTTPCookieAcceptPolicyAlways; 74 policy = HTTPCookieAcceptPolicyNever; 77 policy = HTTPCookieAcceptPolicyOnlyFromMainDocumentDomain; 80 policy = HTTPCookieAcceptPolicyAlways; 82 return policy;
|
/macosx-10.9.5/BerkeleyDB-21/db/dbinc/ |
H A D | cxx_int.h | 59 // change the default behavior. The 'policy' is one of 63 #define DB_ERROR(dbenv, caller, ecode, policy) \ 64 DbEnv::runtime_error(dbenv, caller, ecode, policy) 66 #define DB_ERROR_DBT(dbenv, caller, dbt, policy) \ 67 DbEnv::runtime_error_dbt(dbenv, caller, dbt, policy)
|
/macosx-10.9.5/Security-55471.14.18/regressions/test/ |
H A D | testpolicy.h | 16 void runCertificateTestForDirectory(SecPolicyRef policy, CFStringRef resourceSubDirectory, CFGregorianDate *date);
|
/macosx-10.9.5/WebKit2-7537.78.2/WebProcess/Cookies/curl/ |
H A D | WebCookieManagerCurl.cpp | 35 void WebCookieManager::platformSetHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument
|
/macosx-10.9.5/objc4-551.1/runtime/ |
H A D | objc-references.h | 35 extern void _object_set_associative_reference(id object, void *key, id value, uintptr_t policy);
|
/macosx-10.9.5/WebKit2-7537.78.2/Shared/linux/SeccompFilters/ |
H A D | SeccompBroker.h | 48 void setSyscallPolicy(const SyscallPolicy& policy) { m_policy = policy; } argument
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecPolicy.cpp | 168 SecPointer<Policy> policy; local 169 while ( cursor->next(policy) ) /* copies the next policy */ 171 CFArrayAppendValue(currPolicies, policy->handle()); /* 'SecPolicyRef' appended */ 172 CFRelease(policy->handle()); /* refcount bumped up when appended to array */ 182 SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy) argument 184 Required(policy); 194 ortn = SecPolicySearchCopyNext(srchRef, policy); 203 // return a SecPolicyRef object for the X.509 Basic policy 204 SecPolicyRef policy local 221 SecPolicyRef policy = nil; local 260 SecPolicyRef policy = NULL; local 278 SecPolicyRef policy = NULL; local 333 SecPolicyRef policy = SecPolicyCreateWithOID(policyIdentifier); local 345 SecPolicyRef policy = SecPolicyCreateWithSecAsn1Oid(oidPtr); local [all...] |
H A D | PolicyCursor.cpp | 93 bool PolicyCursor::next(SecPointer<Policy> &policy) argument 103 policy = new Policy(theOneTP(), *theOidList[mSearchPos]); 111 // Return a new policy instance for an OID, outside of cursor iteration 113 void PolicyCursor::policy(const CSSM_OID* oid, SecPointer<Policy> &policy) argument 116 policy = new Policy(theOneTP(), *policyOid);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecPolicy.cpp | 168 SecPointer<Policy> policy; local 169 while ( cursor->next(policy) ) /* copies the next policy */ 171 CFArrayAppendValue(currPolicies, policy->handle()); /* 'SecPolicyRef' appended */ 172 CFRelease(policy->handle()); /* refcount bumped up when appended to array */ 182 SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy) argument 184 Required(policy); 194 ortn = SecPolicySearchCopyNext(srchRef, policy); 203 // return a SecPolicyRef object for the X.509 Basic policy 204 SecPolicyRef policy local 221 SecPolicyRef policy = nil; local 260 SecPolicyRef policy = NULL; local 278 SecPolicyRef policy = NULL; local 333 SecPolicyRef policy = SecPolicyCreateWithOID(policyIdentifier); local 345 SecPolicyRef policy = SecPolicyCreateWithSecAsn1Oid(oidPtr); local [all...] |
H A D | PolicyCursor.cpp | 93 bool PolicyCursor::next(SecPointer<Policy> &policy) argument 103 policy = new Policy(theOneTP(), *theOidList[mSearchPos]); 111 // Return a new policy instance for an OID, outside of cursor iteration 113 void PolicyCursor::policy(const CSSM_OID* oid, SecPointer<Policy> &policy) argument 116 policy = new Policy(theOneTP(), *policyOid);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecPolicy.cpp | 168 SecPointer<Policy> policy; local 169 while ( cursor->next(policy) ) /* copies the next policy */ 171 CFArrayAppendValue(currPolicies, policy->handle()); /* 'SecPolicyRef' appended */ 172 CFRelease(policy->handle()); /* refcount bumped up when appended to array */ 182 SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy) argument 184 Required(policy); 194 ortn = SecPolicySearchCopyNext(srchRef, policy); 203 // return a SecPolicyRef object for the X.509 Basic policy 204 SecPolicyRef policy local 221 SecPolicyRef policy = nil; local 260 SecPolicyRef policy = NULL; local 278 SecPolicyRef policy = NULL; local 333 SecPolicyRef policy = SecPolicyCreateWithOID(policyIdentifier); local 345 SecPolicyRef policy = SecPolicyCreateWithSecAsn1Oid(oidPtr); local [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | sandbox-systrace.c | 109 struct systrace_policy policy; local 142 /* Allocate and assign policy */ 143 bzero(&policy, sizeof(policy)); 144 policy.strp_op = SYSTR_POLICY_NEW; 145 policy.strp_maxents = SYS_MAXSYSCALL; 146 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1) 150 policy.strp_op = SYSTR_POLICY_ASSIGN; 151 policy.strp_pid = box->child_pid; 152 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) [all...] |
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/ |
H A D | applehelpers.h | 20 int odusers_isdisabled(CFDictionaryRef policy); 21 bool odusers_isadmin(CFDictionaryRef policy); 25 int odusers_successful_auth(struct berval *dn, CFDictionaryRef policy); 37 int odusers_store_history(struct berval *dn, const char *password, CFDictionaryRef policy); 38 int odusers_check_history(struct berval *dn, const char *password, CFDictionaryRef policy);
|