Home
last modified time | relevance | path

Searched full:policies (Results 1 – 25 of 419) sorted by relevance

12345678910>>...17

/freebsd/usr.sbin/nscd/
H A Dcachelib.c242 destroy_cache_fifo_policy(common_entry->policies[0]); in destroy_cache_entry()
245 destroy_cache_lru_policy(common_entry->policies[1]); in destroy_cache_entry()
248 destroy_cache_lfu_policy(common_entry->policies[1]); in destroy_cache_entry()
253 free(common_entry->policies); in destroy_cache_entry()
311 policy = common_entry->policies[i]; in clear_cache_entry()
434 policy = common_entry->policies[0]; in flush_cache_entry()
436 connected_policy = common_entry->policies[1]; in flush_cache_entry()
449 policy = common_entry->policies[1]; in flush_cache_entry()
450 connected_policy = common_entry->policies[0]; in flush_cache_entry()
452 policy = common_entry->policies[0]; in flush_cache_entry()
[all …]
/freebsd/crypto/openssl/crypto/x509/
H A Dx509_vpm.c102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free()
190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit()
191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit()
335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy()
336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy()
337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy()
341 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy()
347 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies()
356 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies()
358 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies()
[all …]
H A Dpcy_cache.c27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument
34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create()
42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create()
73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
107 * don't have any policies. in policy_cache_new()
131 * no point continuing because the valid policies will be NULL. in policy_cache_new()
H A Dpcy_tree.c134 * At this point check for invalid policies and required explicit policy. in tree_init()
140 * The ultimate policy set is the intersection of all the policies along in tree_init()
150 /* All the policies are already cached, we can return early */ in tree_init()
186 * policies of anyPolicy. (RFC 5280 has the TA at depth 0 and the leaf at in tree_init()
305 * policies in the parent and link to anyPolicy.
474 * valid policies (other than anyPolicy) is store in pnodes.
496 /* Add policies to authority set */ in tree_calculate_authority_set()
/freebsd/crypto/openssl/test/
H A Dpkits-test.pl139 [ "4.8", "Certificate Policies" ],
166 "All Certificates No Policies Test2",
172 "All Certificates No Policies Test2",
178 "Different Policies Test3",
184 "Different Policies Test3",
190 "Different Policies Test3",
197 "Different Policies Test4",
203 "Different Policies Test5",
209 "Overlapping Policies Test6",
215 "Overlapping Policies Test6",
[all …]
H A DCAtsa.cnf17 # Policies used by the TSA tests.
137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
/freebsd/share/man/man4/
H A Dipsec.4123 interface and allows the programmer to define IPsec policies
139 IPsec policies can be managed in one of two ways, either by
140 configuring per-socket policies using the
143 policies using the
147 you can define IPsec policies against packets using rules similar to packet
155 may be used to configure per-socket security policies.
163 When setting policies using the
296 By default, inbound security policies check that packets handled by IPsec
427 When a large database of security associations or policies is present
H A Dif_ipsec.476 interface is configured, it automatically creates special security policies.
77 These policies can be used to acquire security associations from the IKE daemon,
89 is used to distinguish traffic and security policies between several
98 will lead to generation of new security policies, and this
H A Dmac.444 It is important to note that due to its nature, MAC security policies may
84 By default, file system enforcement of labeled MAC policies relies on
90 With some policies, this configuration may not allow administrators to take
253 As such, MAC Framework policies should not be relied on, in isolation,
H A Dnuma.446 implements NUMA-aware memory allocation policies.
68 policies are controlled with the
150 allocation policies succeed or fail.
H A Ddummynet.414 management policies, and emulating delays and losses.
80 support multiple queueing and scheduling policies.
/freebsd/lib/libc/posix1e/
H A Dmac.349 Not all system objects support MAC labeling, and MAC policies must be
55 attributes from MAC policies.
56 For example, this label contains security labels defined by two policies,
75 allowing the application to declare which policies it wishes to interrogate.
91 specific policies are configured.
/freebsd/share/man/man9/
H A Dcr_bsd_visible.931 .Nd determine if subjects may see entities according to BSD security policies
41 by the following policies and associated
63 policies provided that the
81 by the active above-mentioned policies, or
H A Ddomainset.9114 macros provide pointers to global pre-defined policies for use when the
129 policies, respectively.
132 policies attempt allocation from the specified domain, but unlike
135 These policies should be used in preference to
H A Dmac.9129 In order that policies may be guaranteed the opportunity to ubiquitously
142 policies.
221 As such, MAC Framework policies should not be relied on, in isolation,
/freebsd/libexec/rc/rc.d/
H A Dipsec37 echo "Installing ipsec manual keys/policies."
43 echo "Clearing ipsec manual keys/policies."
55 echo "Reloading ipsec manual keys/policies."
/freebsd/sys/security/mac/
H A Dmac_framework.c159 * Labels consist of a indexed set of "slots", which are allocated policies
164 * collect slots on policy unload. As labeled policies tend to be statically
198 * for policies that are loaded early and cannot be unloaded, and
199 * mac_policy_list, which holds policies either loaded later in the boot
389 * When policies are loaded or unloaded, walk the list of registered policies
391 * requiring labels across all policies.
416 * policies. Gross hack below enables doing it in a cheap manner.
579 * exclusive lock, so policies must not sleep in their init method. in mac_policy_register()
H A Dmac_internal.h156 * all policies currently registered with the MAC Framework, used to key
271 * MAC Framework composition macros invoke all registered MAC policies for a
272 * specific entry point. They come in two forms: one which permits policies
328 * Unlike MAC_POLICY_CHECK, it grants if any policies return '0', and
408 * externalized version of a label element by name. Policies declare whether
459 * data. If no policies match, an error is returned.
/freebsd/contrib/googletest/docs/
H A Dplatforms.md4 [Foundational C++ Support Policy](https://opensource.google/documentation/policies/cplusplus-suppor…
6 [this table](https://github.com/google/oss-policies-info/blob/main/foundational-cxx-support-matrix.…
/freebsd/crypto/openssl/crypto/ts/
H A Dts_local.h107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
/freebsd/crypto/openssl/include/crypto/
H A Dess.h41 * policies SEQUENCE OF PolicyInformation OPTIONAL
67 * policies SEQUENCE OF PolicyInformation OPTIONAL
/freebsd/contrib/openpam/doc/man/
H A Dpam.conf.536 The PAM library searches for policies in the following files, in
161 This allows one to define system-wide policies which are then included
162 into service-specific policies.
/freebsd/crypto/openssl/
H A DCONTRIBUTING.md43 [Contributor License Agreement]: <https://www.openssl.org/policies/cla.html>
80 [coding style]: https://openssl-library.org/policies/technical/coding-style/
81 [documentation policy]: https://openssl-library.org/policies/technical/documentation-policy/
/freebsd/share/doc/smm/05.fastfs/
H A D3.t309 In order for the layout policies to be effective,
444 Layout policies
446 The file system layout policies are divided into two distinct parts.
447 At the top level are global policies that use file system
465 The global layout policies try to improve performance
476 The global policies try to balance the two conflicting
551 If the global layout policies had complete information,
/freebsd/sys/kern/
H A Dkern_priv.c129 * The default is deny, so if no policies have granted it, reject in priv_check_cred_post()
163 * We first evaluate policies that may deny the granting of in priv_check_cred()
203 * Having determined if privilege is restricted by various policies, in priv_check_cred()
206 * evaluation, so may not call all policies. Perhaps we should. in priv_check_cred()

12345678910>>...17