Home
last modified time | relevance | path

Searched full:policies (Results 1 – 25 of 465) sorted by relevance

12345678910>>...19

/freebsd/usr.sbin/nscd/
H A Dcachelib.c242 destroy_cache_fifo_policy(common_entry->policies[0]); in destroy_cache_entry()
245 destroy_cache_lru_policy(common_entry->policies[1]); in destroy_cache_entry()
248 destroy_cache_lfu_policy(common_entry->policies[1]); in destroy_cache_entry()
253 free(common_entry->policies); in destroy_cache_entry()
311 policy = common_entry->policies[i]; in clear_cache_entry()
434 policy = common_entry->policies[0]; in flush_cache_entry()
436 connected_policy = common_entry->policies[1]; in flush_cache_entry()
449 policy = common_entry->policies[1]; in flush_cache_entry()
450 connected_policy = common_entry->policies[0]; in flush_cache_entry()
452 policy = common_entry->policies[0]; in flush_cache_entry()
[all …]
/freebsd/crypto/openssl/crypto/x509/
H A Dx509_vpm.c102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free()
190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit()
191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit()
335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy()
336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy()
337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy()
341 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy()
347 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies()
356 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies()
358 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies()
[all …]
H A Dpcy_cache.c27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument
34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create()
42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create()
73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
107 * don't have any policies. in policy_cache_new()
131 * no point continuing because the valid policies will be NULL. in policy_cache_new()
/freebsd/crypto/openssl/test/
H A Dpkits-test.pl139 [ "4.8", "Certificate Policies" ],
166 "All Certificates No Policies Test2",
172 "All Certificates No Policies Test2",
178 "Different Policies Test3",
184 "Different Policies Test3",
190 "Different Policies Test3",
197 "Different Policies Test4",
203 "Different Policies Test5",
209 "Overlapping Policies Test6",
215 "Overlapping Policies Test6",
[all …]
H A DCAtsa.cnf17 # Policies used by the TSA tests.
137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
/freebsd/share/man/man4/
H A Dipsec.4123 interface and allows the programmer to define IPsec policies
139 IPsec policies can be managed in one of two ways, either by
140 configuring per-socket policies using the
143 policies using the
147 you can define IPsec policies against packets using rules similar to packet
155 may be used to configure per-socket security policies.
163 When setting policies using the
297 By default, inbound security policies check that packets handled by IPsec
431 When a large database of security associations or policies is present
H A Dif_ipsec.476 interface is configured, it automatically creates special security policies.
77 These policies can be used to acquire security associations from the IKE daemon,
89 is used to distinguish traffic and security policies between several
98 will lead to generation of new security policies, and this
H A Dmac.444 It is important to note that due to its nature, MAC security policies may
84 By default, file system enforcement of labeled MAC policies relies on
90 With some policies, this configuration may not allow administrators to take
253 As such, MAC Framework policies should not be relied on, in isolation,
H A Dnuma.446 implements NUMA-aware memory allocation policies.
68 policies are controlled with the
150 allocation policies succeed or fail.
H A Ddummynet.414 management policies, and emulating delays and losses.
80 support multiple queueing and scheduling policies.
/freebsd/crypto/krb5/src/man/
H A Dkadm5.acl.man88 [Dis]allows the addition of principals or policies
100 [Dis]allows the deletion of principals or policies
112 [Dis]allows inquiries about principals or policies
118 [Dis]allows the listing of all principals or policies
124 [Dis]allows the modification of principals or policies
251 the list of principals in the database, and the list of policies
/freebsd/lib/libc/posix1e/
H A Dmac.349 Not all system objects support MAC labeling, and MAC policies must be
55 attributes from MAC policies.
56 For example, this label contains security labels defined by two policies,
75 allowing the application to declare which policies it wishes to interrogate.
91 specific policies are configured.
/freebsd/crypto/krb5/doc/html/_sources/admin/conf_files/
H A Dkadm5_acl.rst.txt47 a [Dis]allows the addition of principals or policies
49 d [Dis]allows the deletion of principals or policies
51 i [Dis]allows inquiries about principals or policies
52 l [Dis]allows the listing of all principals or policies
53 m [Dis]allows the modification of principals or policies
137 the list of principals in the database, and the list of policies
/freebsd/crypto/krb5/doc/admin/conf_files/
H A Dkadm5_acl.rst47 a [Dis]allows the addition of principals or policies
49 d [Dis]allows the deletion of principals or policies
51 i [Dis]allows inquiries about principals or policies
52 l [Dis]allows the listing of all principals or policies
53 m [Dis]allows the modification of principals or policies
137 the list of principals in the database, and the list of policies
/freebsd/share/man/man9/
H A Dcr_bsd_visible.931 .Nd determine if subjects may see entities according to BSD security policies
41 by the following policies and associated
63 policies provided that the
81 by the active above-mentioned policies, or
H A Ddomainset.9114 macros provide pointers to global pre-defined policies for use when the
129 policies, respectively.
132 policies attempt allocation from the specified domain, but unlike
135 These policies should be used in preference to
/freebsd/libexec/rc/rc.d/
H A Dipsec37 echo "Installing ipsec manual keys/policies."
43 echo "Clearing ipsec manual keys/policies."
55 echo "Reloading ipsec manual keys/policies."
/freebsd/contrib/openpam/doc/man/
H A Dpam.conf.536 The PAM library searches for policies in the following files, in
107 or policies may only be present on some of them.
174 This allows one to define system-wide policies which are then included
175 into service-specific policies.
/freebsd/sys/security/mac/
H A Dmac_framework.c159 * Labels consist of a indexed set of "slots", which are allocated policies
164 * collect slots on policy unload. As labeled policies tend to be statically
198 * for policies that are loaded early and cannot be unloaded, and
199 * mac_policy_list, which holds policies either loaded later in the boot
389 * When policies are loaded or unloaded, walk the list of registered policies
391 * requiring labels across all policies.
416 * policies. Gross hack below enables doing it in a cheap manner.
579 * exclusive lock, so policies must not sleep in their init method. in mac_policy_register()
/freebsd/contrib/googletest/docs/
H A Dplatforms.md4 [Foundational C++ Support Policy](https://opensource.google/documentation/policies/cplusplus-suppor…
6 [this table](https://github.com/google/oss-policies-info/blob/main/foundational-cxx-support-matrix.…
/freebsd/crypto/openssl/crypto/ts/
H A Dts_local.h107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
/freebsd/crypto/openssl/include/crypto/
H A Dess.h41 * policies SEQUENCE OF PolicyInformation OPTIONAL
67 * policies SEQUENCE OF PolicyInformation OPTIONAL
/freebsd/crypto/openssl/
H A DCONTRIBUTING.md43 [Contributor License Agreement]: <https://www.openssl.org/policies/cla.html>
80 [coding style]: https://openssl-library.org/policies/technical/coding-style/
81 [documentation policy]: https://openssl-library.org/policies/technical/documentation-policy/
/freebsd/contrib/openpam/
H A DINSTALL28 Search for additional policies and modules in DIR/etc and
34 Do not search for policies and modules anywhere else than /etc
/freebsd/share/doc/smm/05.fastfs/
H A D3.t309 In order for the layout policies to be effective,
444 Layout policies
446 The file system layout policies are divided into two distinct parts.
447 At the top level are global policies that use file system
465 The global layout policies try to improve performance
476 The global policies try to balance the two conflicting
551 If the global layout policies had complete information,

12345678910>>...19