/freebsd/usr.sbin/nscd/ |
H A D | cachelib.c | 242 destroy_cache_fifo_policy(common_entry->policies[0]); in destroy_cache_entry() 245 destroy_cache_lru_policy(common_entry->policies[1]); in destroy_cache_entry() 248 destroy_cache_lfu_policy(common_entry->policies[1]); in destroy_cache_entry() 253 free(common_entry->policies); in destroy_cache_entry() 311 policy = common_entry->policies[i]; in clear_cache_entry() 434 policy = common_entry->policies[0]; in flush_cache_entry() 436 connected_policy = common_entry->policies[1]; in flush_cache_entry() 449 policy = common_entry->policies[1]; in flush_cache_entry() 450 connected_policy = common_entry->policies[0]; in flush_cache_entry() 452 policy = common_entry->policies[0]; in flush_cache_entry() [all …]
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | x509_vpm.c | 102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free() 190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit() 191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit() 335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy() 336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy() 341 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy() 347 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies() 356 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies() 358 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies() [all …]
|
H A D | pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create() 42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create() 107 * don't have any policies. in policy_cache_new() 131 * no point continuing because the valid policies will be NULL. in policy_cache_new()
|
/freebsd/crypto/openssl/test/ |
H A D | pkits-test.pl | 139 [ "4.8", "Certificate Policies" ], 166 "All Certificates No Policies Test2", 172 "All Certificates No Policies Test2", 178 "Different Policies Test3", 184 "Different Policies Test3", 190 "Different Policies Test3", 197 "Different Policies Test4", 203 "Different Policies Test5", 209 "Overlapping Policies Test6", 215 "Overlapping Policies Test6", [all …]
|
H A D | CAtsa.cnf | 17 # Policies used by the TSA tests. 137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional) 163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
/freebsd/share/man/man4/ |
H A D | ipsec.4 | 123 interface and allows the programmer to define IPsec policies 139 IPsec policies can be managed in one of two ways, either by 140 configuring per-socket policies using the 143 policies using the 147 you can define IPsec policies against packets using rules similar to packet 155 may be used to configure per-socket security policies. 163 When setting policies using the 297 By default, inbound security policies check that packets handled by IPsec 431 When a large database of security associations or policies is present
|
H A D | if_ipsec.4 | 76 interface is configured, it automatically creates special security policies. 77 These policies can be used to acquire security associations from the IKE daemon, 89 is used to distinguish traffic and security policies between several 98 will lead to generation of new security policies, and this
|
H A D | mac.4 | 44 It is important to note that due to its nature, MAC security policies may 84 By default, file system enforcement of labeled MAC policies relies on 90 With some policies, this configuration may not allow administrators to take 253 As such, MAC Framework policies should not be relied on, in isolation,
|
H A D | numa.4 | 46 implements NUMA-aware memory allocation policies. 68 policies are controlled with the 150 allocation policies succeed or fail.
|
H A D | dummynet.4 | 14 management policies, and emulating delays and losses. 80 support multiple queueing and scheduling policies.
|
/freebsd/crypto/krb5/src/man/ |
H A D | kadm5.acl.man | 88 [Dis]allows the addition of principals or policies 100 [Dis]allows the deletion of principals or policies 112 [Dis]allows inquiries about principals or policies 118 [Dis]allows the listing of all principals or policies 124 [Dis]allows the modification of principals or policies 251 the list of principals in the database, and the list of policies
|
/freebsd/lib/libc/posix1e/ |
H A D | mac.3 | 49 Not all system objects support MAC labeling, and MAC policies must be 55 attributes from MAC policies. 56 For example, this label contains security labels defined by two policies, 75 allowing the application to declare which policies it wishes to interrogate. 91 specific policies are configured.
|
/freebsd/crypto/krb5/doc/html/_sources/admin/conf_files/ |
H A D | kadm5_acl.rst.txt | 47 a [Dis]allows the addition of principals or policies 49 d [Dis]allows the deletion of principals or policies 51 i [Dis]allows inquiries about principals or policies 52 l [Dis]allows the listing of all principals or policies 53 m [Dis]allows the modification of principals or policies 137 the list of principals in the database, and the list of policies
|
/freebsd/crypto/krb5/doc/admin/conf_files/ |
H A D | kadm5_acl.rst | 47 a [Dis]allows the addition of principals or policies 49 d [Dis]allows the deletion of principals or policies 51 i [Dis]allows inquiries about principals or policies 52 l [Dis]allows the listing of all principals or policies 53 m [Dis]allows the modification of principals or policies 137 the list of principals in the database, and the list of policies
|
/freebsd/share/man/man9/ |
H A D | cr_bsd_visible.9 | 31 .Nd determine if subjects may see entities according to BSD security policies 41 by the following policies and associated 63 policies provided that the 81 by the active above-mentioned policies, or
|
H A D | domainset.9 | 114 macros provide pointers to global pre-defined policies for use when the 129 policies, respectively. 132 policies attempt allocation from the specified domain, but unlike 135 These policies should be used in preference to
|
/freebsd/libexec/rc/rc.d/ |
H A D | ipsec | 37 echo "Installing ipsec manual keys/policies." 43 echo "Clearing ipsec manual keys/policies." 55 echo "Reloading ipsec manual keys/policies."
|
/freebsd/contrib/openpam/doc/man/ |
H A D | pam.conf.5 | 36 The PAM library searches for policies in the following files, in 107 or policies may only be present on some of them. 174 This allows one to define system-wide policies which are then included 175 into service-specific policies.
|
/freebsd/sys/security/mac/ |
H A D | mac_framework.c | 159 * Labels consist of a indexed set of "slots", which are allocated policies 164 * collect slots on policy unload. As labeled policies tend to be statically 198 * for policies that are loaded early and cannot be unloaded, and 199 * mac_policy_list, which holds policies either loaded later in the boot 389 * When policies are loaded or unloaded, walk the list of registered policies 391 * requiring labels across all policies. 416 * policies. Gross hack below enables doing it in a cheap manner. 579 * exclusive lock, so policies must not sleep in their init method. in mac_policy_register()
|
/freebsd/contrib/googletest/docs/ |
H A D | platforms.md | 4 [Foundational C++ Support Policy](https://opensource.google/documentation/policies/cplusplus-suppor… 6 [this table](https://github.com/google/oss-policies-info/blob/main/foundational-cxx-support-matrix.…
|
/freebsd/crypto/openssl/crypto/ts/ |
H A D | ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ 108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | ess.h | 41 * policies SEQUENCE OF PolicyInformation OPTIONAL 67 * policies SEQUENCE OF PolicyInformation OPTIONAL
|
/freebsd/crypto/openssl/ |
H A D | CONTRIBUTING.md | 43 [Contributor License Agreement]: <https://www.openssl.org/policies/cla.html> 80 [coding style]: https://openssl-library.org/policies/technical/coding-style/ 81 [documentation policy]: https://openssl-library.org/policies/technical/documentation-policy/
|
/freebsd/contrib/openpam/ |
H A D | INSTALL | 28 Search for additional policies and modules in DIR/etc and 34 Do not search for policies and modules anywhere else than /etc
|
/freebsd/share/doc/smm/05.fastfs/ |
H A D | 3.t | 309 In order for the layout policies to be effective, 444 Layout policies 446 The file system layout policies are divided into two distinct parts. 447 At the top level are global policies that use file system 465 The global layout policies try to improve performance 476 The global policies try to balance the two conflicting 551 If the global layout policies had complete information,
|