| /freebsd/usr.sbin/nscd/ |
| H A D | cachelib.c | 242 destroy_cache_fifo_policy(common_entry->policies[0]); in destroy_cache_entry() 245 destroy_cache_lru_policy(common_entry->policies[1]); in destroy_cache_entry() 248 destroy_cache_lfu_policy(common_entry->policies[1]); in destroy_cache_entry() 253 free(common_entry->policies); in destroy_cache_entry() 311 policy = common_entry->policies[i]; in clear_cache_entry() 434 policy = common_entry->policies[0]; in flush_cache_entry() 436 connected_policy = common_entry->policies[1]; in flush_cache_entry() 449 policy = common_entry->policies[1]; in flush_cache_entry() 450 connected_policy = common_entry->policies[0]; in flush_cache_entry() 452 policy = common_entry->policies[0]; in flush_cache_entry() [all …]
|
| /freebsd/crypto/openssl/crypto/x509/ |
| H A D | x509_vpm.c | 100 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free() 188 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit() 189 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit() 339 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy() 340 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 341 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy() 345 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy() 351 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies() 360 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies() 362 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies() [all …]
|
| H A D | pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create() 42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 75 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create() 107 * don't have any policies. in policy_cache_new() 131 * no point continuing because the valid policies will be NULL. in policy_cache_new()
|
| /freebsd/crypto/openssl/test/ |
| H A D | pkits-test.pl | 139 [ "4.8", "Certificate Policies" ], 166 "All Certificates No Policies Test2", 172 "All Certificates No Policies Test2", 178 "Different Policies Test3", 184 "Different Policies Test3", 190 "Different Policies Test3", 197 "Different Policies Test4", 203 "Different Policies Test5", 209 "Overlapping Policies Test6", 215 "Overlapping Policies Test6", [all …]
|
| H A D | CAtsa.cnf | 17 # Policies used by the TSA tests. 137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional) 163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
| /freebsd/share/man/man4/ |
| H A D | ipsec.4 | 123 interface and allows the programmer to define IPsec policies 139 IPsec policies can be managed in one of two ways, either by 140 configuring per-socket policies using the 143 policies using the 147 you can define IPsec policies against packets using rules similar to packet 155 may be used to configure per-socket security policies. 163 When setting policies using the 297 By default, inbound security policies check that packets handled by IPsec 431 When a large database of security associations or policies is present
|
| H A D | if_ipsec.4 | 76 interface is configured, it automatically creates special security policies. 77 These policies can be used to acquire security associations from the IKE daemon, 89 is used to distinguish traffic and security policies between several 98 will lead to generation of new security policies, and this
|
| H A D | mac.4 | 44 It is important to note that due to its nature, MAC security policies may 84 By default, file system enforcement of labeled MAC policies relies on 90 With some policies, this configuration may not allow administrators to take 253 As such, MAC Framework policies should not be relied on, in isolation,
|
| H A D | numa.4 | 46 implements NUMA-aware memory allocation policies. 68 policies are controlled with the 150 allocation policies succeed or fail.
|
| H A D | dummynet.4 | 14 management policies, and emulating delays and losses. 80 support multiple queueing and scheduling policies.
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | kadm5.acl.man | 87 [Dis]allows the addition of principals or policies 99 [Dis]allows the deletion of principals or policies 111 [Dis]allows inquiries about principals or policies 117 [Dis]allows the listing of all principals or policies 123 [Dis]allows the modification of principals or policies 248 the list of principals in the database, and the list of policies
|
| /freebsd/lib/libc/posix1e/ |
| H A D | mac.3 | 49 Not all system objects support MAC labeling, and MAC policies must be 55 attributes from MAC policies. 56 For example, this label contains security labels defined by two policies, 75 allowing the application to declare which policies it wishes to interrogate. 91 specific policies are configured.
|
| /freebsd/share/man/man9/ |
| H A D | cr_bsd_visible.9 | 31 .Nd determine if subjects may see entities according to BSD security policies 41 by the following policies and associated 63 policies provided that the 81 by the active above-mentioned policies, or
|
| H A D | domainset.9 | 116 macros provide pointers to global pre-defined policies for use when the 131 policies, respectively. 134 policies attempt allocation from the specified domain, but unlike 137 These policies should be used in preference to
|
| /freebsd/libexec/rc/rc.d/ |
| H A D | ipsec | 37 echo "Installing ipsec manual keys/policies." 43 echo "Clearing ipsec manual keys/policies." 55 echo "Reloading ipsec manual keys/policies."
|
| /freebsd/contrib/openpam/doc/man/ |
| H A D | pam.conf.5 | 36 The PAM library searches for policies in the following files, in 107 or policies may only be present on some of them. 174 This allows one to define system-wide policies which are then included 175 into service-specific policies.
|
| /freebsd/sys/security/mac/ |
| H A D | mac_framework.c | 159 * Labels consist of a indexed set of "slots", which are allocated policies 164 * collect slots on policy unload. As labeled policies tend to be statically 198 * for policies that are loaded early and cannot be unloaded, and 199 * mac_policy_list, which holds policies either loaded later in the boot 389 * When policies are loaded or unloaded, walk the list of registered policies 391 * requiring labels across all policies. 416 * policies. Gross hack below enables doing it in a cheap manner. 579 * exclusive lock, so policies must not sleep in their init method. in mac_policy_register()
|
| /freebsd/contrib/googletest/docs/ |
| H A D | platforms.md | 4 [Foundational C++ Support Policy](https://opensource.google/documentation/policies/cplusplus-suppor… 6 [this table](https://github.com/google/oss-policies-info/blob/main/foundational-cxx-support-matrix.…
|
| /freebsd/crypto/openssl/crypto/ts/ |
| H A D | ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ 108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 25-test_x509.t | 272 "X509v3 Acceptable Certification Policies", 273 1, 'X509v3 Acceptable Certification Policies'); 274 # Yes, I know these OIDs make no sense in a policies extension. It's just a test. 277 1, 'X509v3 Acceptable Certification Policies'); 280 1, 'X509v3 Acceptable Certification Policies'); 284 "X509v3 Acceptable Privilege Policies", 285 1, 'X509v3 Acceptable Privilege Policies'); 286 # Yes, I know these OIDs make no sense in a policies extension. It's just a test. 289 1, 'X509v3 Acceptable Certification Policies'); 292 1, 'X509v3 Acceptable Certification Policies');
|
| /freebsd/crypto/openssl/ |
| H A D | CONTRIBUTING.md | 43 [Contributor License Agreement]: <https://www.openssl.org/policies/cla.html> 80 [coding style]: https://openssl-library.org/policies/technical/coding-style/ 81 [documentation policy]: https://openssl-library.org/policies/technical/documentation-policy/
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | ess.h | 41 * policies SEQUENCE OF PolicyInformation OPTIONAL 67 * policies SEQUENCE OF PolicyInformation OPTIONAL
|
| /freebsd/lib/libutil/ |
| H A D | cpuset.c | 47 static const struct numa_policy policies[] = { variable 147 * Use the rootset's policy as the default for unspecified policies. in domainset_parselist() 160 for (policy = &policies[0]; policy->name != NULL; policy++) { in domainset_parselist()
|
| /freebsd/contrib/openpam/ |
| H A D | INSTALL | 28 Search for additional policies and modules in DIR/etc and 34 Do not search for policies and modules anywhere else than /etc
|
| /freebsd/share/doc/smm/05.fastfs/ |
| H A D | 3.t | 309 In order for the layout policies to be effective, 444 Layout policies 446 The file system layout policies are divided into two distinct parts. 447 At the top level are global policies that use file system 465 The global layout policies try to improve performance 476 The global policies try to balance the two conflicting 551 If the global layout policies had complete information,
|