Lines Matching refs:client_flags
335 u_int32_t client_flags; member
6717 …proc_t proc, proc_t responsible_proc, u_int32_t drop_order, u_int32_t client_flags, u_int16_t sche… in necp_application_fillout_info_locked() argument
6730 info->client_flags = client_flags; in necp_application_fillout_info_locked()
6900 u_int32_t client_flags = 0; in necp_application_find_policy_match_internal() local
7174 if (length >= sizeof(client_flags)) { in necp_application_find_policy_match_internal()
7175 memcpy(&client_flags, value, sizeof(client_flags)); in necp_application_find_policy_match_internal()
7255 client_flags & NECP_CLIENT_PARAMETER_FLAG_LISTENER || in necp_application_find_policy_match_internal()
7256 ((client_flags & NECP_CLIENT_PARAMETER_FLAG_INBOUND) && remote_address_is_empty)) { in necp_application_find_policy_match_internal()
7287 …em_signed_result, proc, effective_proc, responsible_proc, drop_order, client_flags, scheme_port, &… in necp_application_find_policy_match_internal()
7442 if (!no_local_addr && (client_flags & NECP_CLIENT_PARAMETER_FLAG_LISTENER) != 0) { in necp_application_find_policy_match_internal()
7568 if ((client_flags & NECP_CLIENT_PARAMETER_FLAG_LISTENER) == 0) { in necp_application_find_policy_match_internal()
7647 if ((client_flags & NECP_CLIENT_PARAMETER_FLAG_DISCRETIONARY) && in necp_application_find_policy_match_internal()
7846 …const bool expensive_prohibited = ((client_flags & NECP_CLIENT_PARAMETER_FLAG_PROHIBIT_EXPENSIVE) … in necp_application_find_policy_match_internal()
7848 …const bool constrained_prohibited = ((client_flags & NECP_CLIENT_PARAMETER_FLAG_PROHIBIT_CONSTRAIN… in necp_application_find_policy_match_internal()
7930 …_types, u_int32_t num_required_agent_types, bool has_client, uint32_t client_flags, int is_platfor… in necp_socket_check_policy() argument
8343 kernel_policy->cond_client_flags, client_flags); in necp_socket_check_policy()
8345 if ((client_flags & kernel_policy->cond_client_flags) == kernel_policy->cond_client_flags) { in necp_socket_check_policy()
8350 if ((client_flags & kernel_policy->cond_client_flags) != kernel_policy->cond_client_flags) { in necp_socket_check_policy()
8494 info->client_flags = 0; in necp_socket_fillout_info_locked()
8496 info->client_flags |= NECP_CLIENT_PARAMETER_FLAG_PROHIBIT_CONSTRAINED; in necp_socket_fillout_info_locked()
8499 info->client_flags |= NECP_CLIENT_PARAMETER_FLAG_PROHIBIT_EXPENSIVE; in necp_socket_fillout_info_locked()
8502 info->client_flags |= NECP_CLIENT_PARAMETER_FLAG_FALLBACK_TRAFFIC; in necp_socket_fillout_info_locked()
8505 info->client_flags |= NECP_CLIENT_PARAMETER_FLAG_KNOWN_TRACKER; in necp_socket_fillout_info_locked()
8508 info->client_flags |= NECP_CLIENT_PARAMETER_FLAG_APPROVED_APP_DOMAIN; in necp_socket_fillout_info_locked()
8511 info->client_flags |= NECP_CLIENT_PARAMETER_FLAG_INBOUND; in necp_socket_fillout_info_locked()
8515 info->client_flags |= NECP_CLIENT_PARAMETER_FLAG_LISTENER; in necp_socket_fillout_info_locked()
8518 info->client_flags |= NECP_CLIENT_PARAMETER_FLAG_NO_WAKE_FROM_SLEEP; in necp_socket_fillout_info_locked()
8762 if (necp_pass_interpose > 0 && info->client_flags & NECP_CLIENT_PARAMETER_FLAG_INTERPOSE) { in necp_socket_find_policy_match_with_info_locked()
8833 …quired_agent_types, num_required_agent_types, info->has_client, info->client_flags, info->is_platf… in necp_socket_find_policy_match_with_info_locked()
9288 (info.client_flags & NECP_CLIENT_PARAMETER_FLAG_LISTENER || info.is_local)) { in necp_socket_find_policy_match()
9367 if (info.client_flags & NECP_CLIENT_PARAMETER_FLAG_LISTENER || info.is_local) { in necp_socket_find_policy_match()