Home
last modified time | relevance | path

Searched full:policy (Results 1 – 25 of 1218) sorted by relevance

12345678910>>...49

/freebsd/crypto/openssl/test/
H A Dpkits-test.pl38 my $apolicy = "X509v3 Any Policy";
136 # Certificate policy tests need special handling. They can have several
142 "All Certificates Same Policy Test1",
143 "-policy anyPolicy -explicit_policy",
148 "All Certificates Same Policy Test1",
149 "-policy $nist1 -explicit_policy",
154 "All Certificates Same Policy Test1",
155 "-policy $nist2 -explicit_policy",
160 "All Certificates Same Policy Test1",
161 "-policy $nist1 -policy $nist2 -explicit_policy",
[all …]
/freebsd/crypto/openssl/crypto/x509/
H A Dv3_pci.c78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci()
80 pci->proxyPolicy->policy->length, in i2r_pci()
81 pci->proxyPolicy->policy->data); in i2r_pci()
87 ASN1_OCTET_STRING **policy) in process_pci_value() argument
114 } else if (strcmp(val->name, "policy") == 0) { in process_pci_value()
118 if (*policy == NULL) { in process_pci_value()
119 *policy = ASN1_OCTET_STRING_new(); in process_pci_value()
120 if (*policy == NULL) { in process_pci_value()
136 tmp_data = OPENSSL_realloc((*policy)->data, in process_pci_value()
137 (*policy)->length + val_len + 1); in process_pci_value()
[all …]
H A Dpcy_data.c16 /* Policy Node routines */
31 * Create a data based on an existing policy. If 'id' is NULL use the OID in
32 * the policy, otherwise use 'id'. This behaviour covers the two types of
38 X509_POLICY_DATA *ossl_policy_data_new(POLICYINFO *policy, in ossl_policy_data_new() argument
44 if (policy == NULL && cid == NULL) in ossl_policy_data_new()
72 ret->valid_policy = policy->policyid; in ossl_policy_data_new()
73 policy->policyid = NULL; in ossl_policy_data_new()
76 if (policy) { in ossl_policy_data_new()
77 ret->qualifier_set = policy->qualifiers; in ossl_policy_data_new()
78 policy->qualifiers = NULL; in ossl_policy_data_new()
H A Dpcy_local.h17 * This structure and the field names correspond to the Policy 'node' of
19 * X509_POLICY_NODE contains that. This means that the main policy data can
25 /* Policy OID and qualifiers for this data */
34 * This flag indicates the structure has been mapped using a policy mapping
35 * extension. If policy mapping is not active its references get deleted.
41 * This flag indicates the data doesn't correspond to a policy in Certificate
42 * Policies: it has been mapped to any policy.
68 /* other policy data */
123 * Extra policy data when additional nodes (not from the certificate) are
127 /* This is the authority constrained policy set */
[all …]
/freebsd/usr.sbin/nscd/
H A Dcacheplcs.c106 cache_queue_policy_add_item(struct cache_policy_ *policy, in cache_queue_policy_add_item() argument
113 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_add_item()
120 cache_queue_policy_remove_item(struct cache_policy_ *policy, in cache_queue_policy_remove_item() argument
127 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_remove_item()
134 cache_queue_policy_get_first_item(struct cache_policy_ *policy) in cache_queue_policy_get_first_item() argument
139 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_get_first_item()
145 cache_queue_policy_get_last_item(struct cache_policy_ *policy) in cache_queue_policy_get_last_item() argument
150 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_get_last_item()
157 cache_queue_policy_get_next_item(struct cache_policy_ *policy, in cache_queue_policy_get_next_item() argument
170 cache_queue_policy_get_prev_item(struct cache_policy_ *policy, in cache_queue_policy_get_prev_item() argument
[all …]
H A Dcacheplcs.h32 /* common policy definitions */
36 * cache_policy_item_ represents some abstract cache element in the policy
38 * another policy queue.
52 * cache_policy_ represents an abstract policy queue. It can be customized by
77 * LFU cache policy item "inherited" from cache_policy_item_ structure
89 * LFU policy queue "inherited" from cache_policy_.
115 /* fifo policy routines */
119 /* lru policy routines */
123 /* lfu policy routines */
/freebsd/contrib/llvm-project/clang/lib/AST/
H A DTypePrinter.cpp55 PrintingPolicy &Policy; member in __anon5708b7770111::IncludeStrongLifetimeRAII
59 explicit IncludeStrongLifetimeRAII(PrintingPolicy &Policy) in IncludeStrongLifetimeRAII() argument
60 : Policy(Policy), Old(Policy.SuppressStrongLifetime) { in IncludeStrongLifetimeRAII()
61 if (!Policy.SuppressLifetimeQualifiers) in IncludeStrongLifetimeRAII()
62 Policy.SuppressStrongLifetime = false; in IncludeStrongLifetimeRAII()
65 ~IncludeStrongLifetimeRAII() { Policy.SuppressStrongLifetime = Old; } in ~IncludeStrongLifetimeRAII()
69 PrintingPolicy &Policy; member in __anon5708b7770111::ParamPolicyRAII
73 explicit ParamPolicyRAII(PrintingPolicy &Policy) in ParamPolicyRAII() argument
74 : Policy(Policy), Old(Policy.SuppressSpecifiers) { in ParamPolicyRAII()
75 Policy.SuppressSpecifiers = false; in ParamPolicyRAII()
[all …]
H A DDeclPrinter.cpp31 PrintingPolicy Policy; member in __anond0616ced0111::DeclPrinter
54 DeclPrinter(raw_ostream &Out, const PrintingPolicy &Policy, in DeclPrinter() argument
57 : Out(Out), Policy(Policy), Context(Context), Indentation(Indentation), in DeclPrinter()
135 void Decl::print(raw_ostream &Out, const PrintingPolicy &Policy, in print() argument
137 DeclPrinter Printer(Out, Policy, getASTContext(), Indentation, in print()
148 const PrintingPolicy &Policy, in print() argument
150 DeclPrinter Printer(Out, Policy, Context); in print()
193 raw_ostream &Out, const PrintingPolicy &Policy, in printGroup() argument
196 (*Begin)->print(Out, Policy, Indentation); in printGroup()
205 PrintingPolicy SubPolicy(Policy); in printGroup()
[all …]
H A DAttrImpl.cpp21 const PrintingPolicy &Policy) const { in printPrettyPragma()
30 OS << ' ' << getValueString(Policy); in printPrettyPragma()
35 OS << ' ' << getOptionName(option) << getValueString(Policy); in printPrettyPragma()
40 std::string LoopHintAttr::getValueString(const PrintingPolicy &Policy) const { in getValueString()
45 value->printPretty(OS, nullptr, Policy); in getValueString()
48 value->printPretty(OS, nullptr, Policy); in getValueString()
69 LoopHintAttr::getDiagnosticName(const PrintingPolicy &Policy) const { in getDiagnosticName()
75 (option == UnrollCount ? getValueString(Policy) : ""); in getDiagnosticName()
80 (option == UnrollAndJamCount ? getValueString(Policy) : ""); in getDiagnosticName()
83 return getOptionName(option) + getValueString(Policy); in getDiagnosticName()
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Support/
H A DCachePruning.cpp79 CachePruningPolicy Policy; in parseCachePruningPolicy() local
90 Policy.Interval = *DurationOrErr; in parseCachePruningPolicy()
95 Policy.Expiration = *DurationOrErr; in parseCachePruningPolicy()
109 Policy.MaxSizePercentageOfAvailableSpace = Size; in parseCachePruningPolicy()
130 Policy.MaxSizeBytes = Size * Mult; in parseCachePruningPolicy()
132 if (Value.getAsInteger(0, Policy.MaxSizeFiles)) in parseCachePruningPolicy()
141 return Policy; in parseCachePruningPolicy()
145 bool llvm::pruneCache(StringRef Path, CachePruningPolicy Policy, in pruneCache() argument
159 Policy.MaxSizePercentageOfAvailableSpace = in pruneCache()
160 std::min(Policy in pruneCache()
[all...]
/freebsd/lib/libipsec/
H A Dipsec_set_policy.337 .Nd create an IPsec policy structure from a human readable string
44 .Fn ipsec_set_policy "const char *policy" "int len"
52 function generates an IPsec policy specification structure,
56 from a human-readable policy specification.
57 The policy specification must be given as a C string,
59 .Fa policy
65 IPsec policy specification structure.
79 function converts an IPsec policy structure into a human readable form.
82 argument points to an IPsec policy structure,
99 .Fa policy
[all...]
/freebsd/lib/libsys/
H A Dsched_setscheduler.231 .Nd set/get scheduling policy and scheduler parameters
37 .Fn sched_setscheduler "pid_t pid" "int policy" "const struct sched_param *param"
43 system call sets the scheduling policy and scheduling parameters
47 .Fa policy
58 the scheduling policy specified by
59 .Fa policy .
68 policy and scheduling parameters will be set for the process
74 is zero, the scheduling policy and scheduling
77 In this implementation, the policy of when a process can affect
105 system call returns the scheduling policy of the process specified
[all …]
H A Dcpuset_getdomain.231 .Nd manage memory domain policy
38 … "cpulevel_t level" "cpuwhich_t which" "id_t id" "size_t setsize" "domainset_t *mask" "int *policy"
40 …level_t level" "cpuwhich_t which" "id_t id" "size_t setsize" "const domainset_t *mask" "int policy"
45 allow the manipulation of sets of memory domains and allocation policy available
92 mask and policy from the object specified by
100 .Fa policy .
103 attempts to set the mask and policy for the object specified by
111 .Fa policy .
113 Valid policy values are as follows:
144 .Fa policy
/freebsd/contrib/wpa/wpa_supplicant/
H A Drobust_av.c822 return; /* AP does not enable QM DSCP Policy */ in wpas_handle_assoc_resp_qos_mgmt()
1105 static int set_frame_classifier_type4_ipv4(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv4() argument
1108 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv4()
1109 struct type4_params *type4_param = &policy->type4_param; in set_frame_classifier_type4_ipv4()
1111 if (policy->frame_classifier_len < 18) { in set_frame_classifier_type4_ipv4()
1114 policy->frame_classifier_len); in set_frame_classifier_type4_ipv4()
1129 if (policy->domain_name) { in set_frame_classifier_type4_ipv4()
1149 if (policy->port_range_info) { in set_frame_classifier_type4_ipv4()
1172 static int set_frame_classifier_type4_ipv6(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv6() argument
1175 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv6()
[all …]
/freebsd/bin/cpuset/
H A Dcpuset.c74 int policy; member
177 * permissively parse policy:domain list
181 * 0-4 implicit root policy
183 * all explicit root domains and implicit policy
189 struct numa_policy *policy; in parsedomainlist() local
194 * Use the rootset's policy as the default for unspecified policies. in parsedomainlist()
201 for (policy = &policies[0]; policy->name != NULL; policy++) { in parsedomainlist()
202 if (strncasecmp(l, policy->name, strlen(policy->name)) == 0) { in parsedomainlist()
203 p = policy->policy; in parsedomainlist()
204 l += strlen(policy->name); in parsedomainlist()
[all …]
/freebsd/share/man/man4/
H A Dmac.442 finely control system security by providing for a loadable security policy
45 only restrict access relative to one another and the base system policy;
50 Currently, the following MAC policy modules are shipped with
54 .It Xr mac_biba 4 Ta "Biba integrity policy" Ta yes Ta boot only
60 .It Xr mac_lomac 4 Ta "Low-Watermark MAC policy" Ta yes Ta boot only
61 .It Xr mac_mls 4 Ta "Confidentiality policy" Ta yes Ta boot only
62 .It Xr mac_ntpd 4 Ta "Non-root NTP Daemon policy" Ta no Ta any time
63 .It Xr mac_partition 4 Ta "Process partition policy" Ta yes Ta any time
65 .It Xr mac_priority 4 Ta "Scheduling priority policy" Ta no Ta any time
66 .It Xr mac_seeotheruids 4 Ta "See-other-UIDs policy" Ta no Ta any time
[all …]
H A Dmac_priority.429 .Nd "policy for scheduling privileges of non-root users"
31 To compile the mac_priority policy into your kernel, place the following lines
38 Alternately, to load the mac_priority policy module at boot time,
52 policy grants scheduling privileges based on
66 realtime policy active, privileged users may use the
74 When the idletime policy is active, privileged users may use the
82 The realtime policy grants the following kernel privileges to any process
89 The kernel privilege granted by the idletime policy is:
96 MIBs are available for fine-tuning this MAC policy.
105 Enable the realtime policy.
[all …]
H A Dmac_ipacl.432 .Nd "IP Address access control policy"
35 IP address access control policy into your kernel:
41 To load the mac_ipacl policy module at boot time, add the
54 policy allows the root of the host to use the
67 policy is enforced and allow/deny IP (or subnets) according to the
74 MIBs are used to control enforcement and behavior of this MAC Policy.
110 Prefix length of the subnet to be enforced by the policy.
111 -1 implies the policy is enforced for the individual IP address.
119 policy module for different inputs of sysctl variable:
125 It allows all IPv6 addresses since the policy is not enforced for IPv6.
[all …]
/freebsd/crypto/heimdal/lib/kadm5/
H A Dkadm5_pwcheck.384 configured by the user. If any policy rejects the password, the password
87 Policy names are of the form
88 .Ql module-name:policy-name
89 or, if the the policy name is unique enough, just
90 .Ql policy-name .
109 portion of the policy name (the part before the colon), if the policy name
110 contains a colon, or the policy will not be run.
125 .Ql policy-name
126 portion of a policy name (the part after the colon, or the complete policy
127 name if there is no colon) specified by the user or the policy will not be
/freebsd/sys/kern/
H A Dksched.c106 getscheduler(struct ksched *ksched, struct thread *td, int *policy) in getscheduler() argument
115 *policy = SCHED_FIFO; in getscheduler()
118 *policy = SCHED_RR; in getscheduler()
121 *policy = SCHED_OTHER; in getscheduler()
131 int e, policy; in ksched_setparam() local
133 e = getscheduler(ksched, td, &policy); in ksched_setparam()
135 e = ksched_setscheduler(ksched, td, policy, param); in ksched_setparam()
170 ksched_setscheduler(struct ksched *ksched, struct thread *td, int policy, in ksched_setscheduler() argument
177 switch(policy) { in ksched_setscheduler()
183 rtp.type = (policy == SCHED_FIFO) ? RTP_PRIO_FIFO : in ksched_setscheduler()
[all …]
/freebsd/crypto/openssh/
H A Dsandbox-systrace.c129 struct systrace_policy policy; in ssh_sandbox_parent() local
162 /* Allocate and assign policy */ in ssh_sandbox_parent()
163 memset(&policy, 0, sizeof(policy)); in ssh_sandbox_parent()
164 policy.strp_op = SYSTR_POLICY_NEW; in ssh_sandbox_parent()
165 policy.strp_maxents = SYS_MAXSYSCALL; in ssh_sandbox_parent()
166 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1) in ssh_sandbox_parent()
170 policy.strp_op = SYSTR_POLICY_ASSIGN; in ssh_sandbox_parent()
171 policy.strp_pid = box->child_pid; in ssh_sandbox_parent()
172 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1) in ssh_sandbox_parent()
176 /* Set per-syscall policy */ in ssh_sandbox_parent()
[all …]
/freebsd/contrib/file/magic/Magdir/
H A Dselinux1 # Type: SE Linux policy modules *.pp reference policy
6 0 lelong 0xf97cff8f SE Linux modular policy
17 1 string policy_module( SE Linux policy module source
18 2 string policy_module( SE Linux policy module source
20 0 string ##\ <summary> SE Linux policy interface source
22 #0 search gen_context( SE Linux policy file contexts
24 #0 search gen_sens( SE Linux policy MLS constraints source
/freebsd/sys/security/mac/
H A Dmac_framework.c47 * kernel infrastructure for the TrustedBSD MAC Framework, including policy
57 * - The MAC policy module interface, defined in mac_policy.h, which is
58 * implemented by MAC policy modules and invoked by the MAC Framework to
59 * forward kernel security requests and notifications to policy modules.
65 * src/sys/security/mac. Sample policy modules may be found in
95 SDT_PROBE_DEFINE2(mac, , policy, modevent, "int",
97 SDT_PROBE_DEFINE1(mac, , policy, register,
99 SDT_PROBE_DEFINE1(mac, , policy, unregister,
103 * Root sysctl node for all MAC and MAC policy controls.
106 "TrustedBSD MAC policy controls");
[all …]
/freebsd/sbin/setkey/
H A Dsetkey.863 as well as Security Policy Database (SPD) entries in the kernel.
192 .Ar src_range Ar dst_range Ar upperspec Ar policy
306 Specify the identifier of the policy entry in SPD.
308 .Ar policy .
455 The following example shows a policy where IPSec is not required for
470 .It Ar policy
471 .Ar policy
482 .Bl -tag -compact -width "policy level"
486 of a policy must be specified as one of:
490 .It Ar policy level
[all …]
/freebsd/share/man/man9/
H A Ddomainset.961 API provides memory domain allocation policy for NUMA machines.
64 contains a bitmask of allowed domains, an integer policy, and an optional
76 falls back to the thread policy if none exists.
78 The allocation policy has the following possible values:
83 This policy can specify a single domain for a fixed allocation.
88 This policy optimizes for locality but may give pessimal results if the
115 desired policy is known at compile time.
117 is a policy which only permits allocations from the specified domain.
119 is a policy which attempts to allocate memory local to the current CPU,
120 falling back to a round-robin policy if the initial allocation fails.

12345678910>>...49