| /freebsd/crypto/openssl/test/ |
| H A D | pkits-test.pl | 38 my $apolicy = "X509v3 Any Policy"; 136 # Certificate policy tests need special handling. They can have several 142 "All Certificates Same Policy Test1", 143 "-policy anyPolicy -explicit_policy", 148 "All Certificates Same Policy Test1", 149 "-policy $nist1 -explicit_policy", 154 "All Certificates Same Policy Test1", 155 "-policy $nist2 -explicit_policy", 160 "All Certificates Same Policy Test1", 161 "-policy $nist1 -policy $nist2 -explicit_policy", [all …]
|
| /freebsd/crypto/openssl/crypto/x509/ |
| H A D | v3_pci.c | 78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci() 80 pci->proxyPolicy->policy->length, in i2r_pci() 81 pci->proxyPolicy->policy->data); in i2r_pci() 87 ASN1_OCTET_STRING **policy) in process_pci_value() argument 114 } else if (strcmp(val->name, "policy") == 0) { in process_pci_value() 119 if (*policy == NULL) { in process_pci_value() 120 *policy = ASN1_OCTET_STRING_new(); in process_pci_value() 121 if (*policy == NULL) { in process_pci_value() 137 tmp_data = OPENSSL_realloc((*policy)->data, in process_pci_value() 138 (*policy)->length + val_len + 1); in process_pci_value() [all …]
|
| H A D | pcy_data.c | 16 /* Policy Node routines */ 31 * Create a data based on an existing policy. If 'id' is NULL use the OID in 32 * the policy, otherwise use 'id'. This behaviour covers the two types of 38 X509_POLICY_DATA *ossl_policy_data_new(POLICYINFO *policy, in ossl_policy_data_new() argument 44 if (policy == NULL && cid == NULL) in ossl_policy_data_new() 71 ret->valid_policy = policy->policyid; in ossl_policy_data_new() 72 policy->policyid = NULL; in ossl_policy_data_new() 75 if (policy) { in ossl_policy_data_new() 76 ret->qualifier_set = policy->qualifiers; in ossl_policy_data_new() 77 policy->qualifiers = NULL; in ossl_policy_data_new()
|
| /freebsd/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ |
| H A D | ldap_pwd_policy.c | 50 /* Fill in mods with LDAP operations for the fields of policy, using the 53 add_policy_mods(krb5_context context, LDAPMod ***mods, osa_policy_ent_t policy, in add_policy_mods() argument 60 (int)policy->pw_max_life); in add_policy_mods() 65 (int)policy->pw_min_life); in add_policy_mods() 70 (int)policy->pw_min_classes); in add_policy_mods() 75 (int)policy->pw_min_length); in add_policy_mods() 80 (int)policy->pw_history_num); in add_policy_mods() 85 (int)policy->pw_max_fail); in add_policy_mods() 90 (int)policy->pw_failcnt_interval); in add_policy_mods() 95 (int)policy->pw_lockout_duration); in add_policy_mods() [all …]
|
| H A D | ldap_tkt_policy.c | 36 /* Ticket policy object management */ 49 * create the Ticket policy object in Directory. 52 krb5_ldap_create_policy(krb5_context context, krb5_ldap_policy_params *policy, in krb5_ldap_create_policy() argument 64 if (policy == NULL || policy->policy == NULL) { in krb5_ldap_create_policy() 66 k5_setmsg(context, st, _("Ticket Policy Name missing")); in krb5_ldap_create_policy() 73 if ((st = krb5_ldap_name_to_policydn (context, policy->policy, &policy_dn)) != 0) in krb5_ldap_create_policy() 77 strval[0] = policy->policy; in krb5_ldap_create_policy() 89 policy->maxtktlife)) != 0) in krb5_ldap_create_policy() 95 policy->maxrenewlife)) != 0) in krb5_ldap_create_policy() 101 policy->tktflags)) != 0) in krb5_ldap_create_policy() [all …]
|
| /freebsd/crypto/krb5/src/plugins/kdb/ldap/ldap_util/ |
| H A D | kdb5_ldap_policy.c | 31 * Create / Delete / Modify / View / List policy objects. 89 * This function will create a ticket policy object with the 110 /* Allocate memory for policy parameters structure */ in kdb5_ldap_create_policy() 258 } else { /* Any other argument must be policy DN */ in kdb5_ldap_create_policy() 259 /* First check if policy DN is already provided -- in kdb5_ldap_create_policy() 261 if (policyparams->policy != NULL) in kdb5_ldap_create_policy() 264 /* If not present already, fill up policy DN */ in kdb5_ldap_create_policy() 265 policyparams->policy = strdup(argv[i]); in kdb5_ldap_create_policy() 266 if (policyparams->policy == NULL) { in kdb5_ldap_create_policy() 268 com_err(me, retval, _("while creating policy object")); in kdb5_ldap_create_policy() [all …]
|
| /freebsd/usr.sbin/nscd/ |
| H A D | cacheplcs.c | 106 cache_queue_policy_add_item(struct cache_policy_ *policy, in cache_queue_policy_add_item() argument 113 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_add_item() 120 cache_queue_policy_remove_item(struct cache_policy_ *policy, in cache_queue_policy_remove_item() argument 127 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_remove_item() 134 cache_queue_policy_get_first_item(struct cache_policy_ *policy) in cache_queue_policy_get_first_item() argument 139 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_get_first_item() 145 cache_queue_policy_get_last_item(struct cache_policy_ *policy) in cache_queue_policy_get_last_item() argument 150 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_get_last_item() 157 cache_queue_policy_get_next_item(struct cache_policy_ *policy, in cache_queue_policy_get_next_item() argument 170 cache_queue_policy_get_prev_item(struct cache_policy_ *policy, in cache_queue_policy_get_prev_item() argument [all …]
|
| /freebsd/contrib/llvm-project/clang/lib/AST/ |
| H A D | TypePrinter.cpp | 55 PrintingPolicy &Policy; member in __anon5708b7770111::IncludeStrongLifetimeRAII 59 explicit IncludeStrongLifetimeRAII(PrintingPolicy &Policy) in IncludeStrongLifetimeRAII() argument 60 : Policy(Policy), Old(Policy.SuppressStrongLifetime) { in IncludeStrongLifetimeRAII() 61 if (!Policy.SuppressLifetimeQualifiers) in IncludeStrongLifetimeRAII() 62 Policy.SuppressStrongLifetime = false; in IncludeStrongLifetimeRAII() 65 ~IncludeStrongLifetimeRAII() { Policy.SuppressStrongLifetime = Old; } in ~IncludeStrongLifetimeRAII() 69 PrintingPolicy &Policy; member in __anon5708b7770111::ParamPolicyRAII 73 explicit ParamPolicyRAII(PrintingPolicy &Policy) in ParamPolicyRAII() argument 74 : Policy(Policy), Old(Policy.SuppressSpecifiers) { in ParamPolicyRAII() 75 Policy.SuppressSpecifiers = false; in ParamPolicyRAII() [all …]
|
| H A D | DeclPrinter.cpp | 31 PrintingPolicy Policy; member in __anond0616ced0111::DeclPrinter 54 DeclPrinter(raw_ostream &Out, const PrintingPolicy &Policy, in DeclPrinter() argument 57 : Out(Out), Policy(Policy), Context(Context), Indentation(Indentation), in DeclPrinter() 135 void Decl::print(raw_ostream &Out, const PrintingPolicy &Policy, in print() argument 137 DeclPrinter Printer(Out, Policy, getASTContext(), Indentation, in print() 148 const PrintingPolicy &Policy, in print() argument 150 DeclPrinter Printer(Out, Policy, Context); in print() 193 raw_ostream &Out, const PrintingPolicy &Policy, in printGroup() argument 196 (*Begin)->print(Out, Policy, Indentation); in printGroup() 205 PrintingPolicy SubPolicy(Policy); in printGroup() [all …]
|
| H A D | AttrImpl.cpp | 21 const PrintingPolicy &Policy) const { in printPrettyPragma() 30 OS << ' ' << getValueString(Policy); in printPrettyPragma() 35 OS << ' ' << getOptionName(option) << getValueString(Policy); in printPrettyPragma() 40 std::string LoopHintAttr::getValueString(const PrintingPolicy &Policy) const { in getValueString() 45 value->printPretty(OS, nullptr, Policy); in getValueString() 48 value->printPretty(OS, nullptr, Policy); in getValueString() 69 LoopHintAttr::getDiagnosticName(const PrintingPolicy &Policy) const { in getDiagnosticName() 75 (option == UnrollCount ? getValueString(Policy) : ""); in getDiagnosticName() 80 (option == UnrollAndJamCount ? getValueString(Policy) : ""); in getDiagnosticName() 83 return getOptionName(option) + getValueString(Policy); in getDiagnosticName() [all …]
|
| /freebsd/contrib/llvm-project/llvm/lib/Support/ |
| H A D | CachePruning.cpp | 79 CachePruningPolicy Policy; in parseCachePruningPolicy() local 90 Policy.Interval = *DurationOrErr; in parseCachePruningPolicy() 95 Policy.Expiration = *DurationOrErr; in parseCachePruningPolicy() 109 Policy.MaxSizePercentageOfAvailableSpace = Size; in parseCachePruningPolicy() 130 Policy.MaxSizeBytes = Size * Mult; in parseCachePruningPolicy() 132 if (Value.getAsInteger(0, Policy.MaxSizeFiles)) in parseCachePruningPolicy() 141 return Policy; in parseCachePruningPolicy() 145 bool llvm::pruneCache(StringRef Path, CachePruningPolicy Policy, in pruneCache() argument 159 Policy.MaxSizePercentageOfAvailableSpace = in pruneCache() 160 std::min(Policy in pruneCache() [all...] |
| /freebsd/lib/libipsec/ |
| H A D | ipsec_set_policy.3 | 37 .Nd create an IPsec policy structure from a human readable string 44 .Fn ipsec_set_policy "const char *policy" "int len" 52 function generates an IPsec policy specification structure, 56 from a human-readable policy specification. 57 The policy specification must be given as a C string, 59 .Fa policy 65 IPsec policy specification structure. 79 function converts an IPsec policy structure into a human readable form. 82 argument points to an IPsec policy structure, 99 .Fa policy [all...] |
| /freebsd/lib/libsys/ |
| H A D | sched_setscheduler.2 | 31 .Nd set/get scheduling policy and scheduler parameters 37 .Fn sched_setscheduler "pid_t pid" "int policy" "const struct sched_param *param" 43 system call sets the scheduling policy and scheduling parameters 47 .Fa policy 58 the scheduling policy specified by 59 .Fa policy . 68 policy and scheduling parameters will be set for the process 74 is zero, the scheduling policy and scheduling 77 In this implementation, the policy of when a process can affect 105 system call returns the scheduling policy of the process specified [all …]
|
| /freebsd/contrib/wpa/wpa_supplicant/ |
| H A D | robust_av.c | 822 return; /* AP does not enable QM DSCP Policy */ in wpas_handle_assoc_resp_qos_mgmt() 1105 static int set_frame_classifier_type4_ipv4(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv4() argument 1108 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv4() 1109 struct type4_params *type4_param = &policy->type4_param; in set_frame_classifier_type4_ipv4() 1111 if (policy->frame_classifier_len < 18) { in set_frame_classifier_type4_ipv4() 1114 policy->frame_classifier_len); in set_frame_classifier_type4_ipv4() 1129 if (policy->domain_name) { in set_frame_classifier_type4_ipv4() 1149 if (policy->port_range_info) { in set_frame_classifier_type4_ipv4() 1172 static int set_frame_classifier_type4_ipv6(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv6() argument 1175 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv6() [all …]
|
| /freebsd/share/man/man9/ |
| H A D | domainset.9 | 57 .Fn domainset_populate "struct domainset *domain" "domainset_t *mask" "int policy" "size_t mask_siz… 63 API provides memory domain allocation policy for NUMA machines. 66 contains a bitmask of allowed domains, an integer policy, and an optional 78 falls back to the thread policy if none exists. 80 The allocation policy has the following possible values: 85 This policy can specify a single domain for a fixed allocation. 90 This policy optimizes for locality but may give pessimal results if the 117 desired policy is known at compile time. 119 is a policy which only permits allocations from the specified domain. 121 is a policy which attempts to allocate memory local to the current CPU, [all …]
|
| /freebsd/share/man/man4/ |
| H A D | mac.4 | 42 finely control system security by providing for a loadable security policy 45 only restrict access relative to one another and the base system policy; 50 Currently, the following MAC policy modules are shipped with 54 .It Xr mac_biba 4 Ta "Biba integrity policy" Ta yes Ta boot only 60 .It Xr mac_lomac 4 Ta "Low-Watermark MAC policy" Ta yes Ta boot only 61 .It Xr mac_mls 4 Ta "Confidentiality policy" Ta yes Ta boot only 62 .It Xr mac_ntpd 4 Ta "Non-root NTP Daemon policy" Ta no Ta any time 63 .It Xr mac_partition 4 Ta "Process partition policy" Ta yes Ta any time 65 .It Xr mac_priority 4 Ta "Scheduling priority policy" Ta no Ta any time 66 .It Xr mac_seeotheruids 4 Ta "See-other-UIDs policy" Ta no Ta any time [all …]
|
| H A D | mac_priority.4 | 29 .Nd "policy for scheduling privileges of non-root users" 31 To compile the mac_priority policy into your kernel, place the following lines 38 Alternately, to load the mac_priority policy module at boot time, 52 policy grants scheduling privileges based on 66 realtime policy active, privileged users may use the 74 When the idletime policy is active, privileged users may use the 82 The realtime policy grants the following kernel privileges to any process 89 The kernel privilege granted by the idletime policy is: 96 MIBs are available for fine-tuning this MAC policy. 105 Enable the realtime policy. [all …]
|
| /freebsd/crypto/heimdal/lib/kadm5/ |
| H A D | kadm5_pwcheck.3 | 84 configured by the user. If any policy rejects the password, the password 87 Policy names are of the form 88 .Ql module-name:policy-name 89 or, if the the policy name is unique enough, just 90 .Ql policy-name . 109 portion of the policy name (the part before the colon), if the policy name 110 contains a colon, or the policy will not be run. 125 .Ql policy-name 126 portion of a policy name (the part after the colon, or the complete policy 127 name if there is no colon) specified by the user or the policy will not be
|
| /freebsd/lib/libutil/ |
| H A D | cpuset.c | 44 int policy; member 130 * permissively parse policy:domain list 134 * 0-4 implicit root policy 136 * all explicit root domains and implicit policy 142 const struct numa_policy *policy; in domainset_parselist() local 147 * Use the rootset's policy as the default for unspecified policies. in domainset_parselist() 160 for (policy = &policies[0]; policy->name != NULL; policy++) { in domainset_parselist() 161 if (strncasecmp(l, policy->name, strlen(policy->name)) == 0) { in domainset_parselist() 162 p = policy->policy; in domainset_parselist() 163 l += strlen(policy->name); in domainset_parselist()
|
| /freebsd/crypto/krb5/src/lib/kadm5/ |
| H A D | t_kadm5.c | 115 ent.policy = name; in create_simple_policy() 135 check(kadm5_get_policy(handle, x->policy, &g)); in compare_policy() 137 assert(strcmp(g.policy, x->policy) == 0); in compare_policy() 160 create_simple_princ(krb5_principal princ, char *policy) in create_simple_princ() argument 168 ent.policy = policy; in create_simple_princ() 169 if (policy != NULL) in create_simple_princ() 208 assert(strcmp(g.policy, x->policy) == 0); in compare_princ() 225 kadm5_get_policy(handle, g.policy, &pol) == 0) { in compare_princ() 226 /* Check the policy pw_max_life computation. */ in compare_princ() 237 assert(g.policy == NULL); in compare_princ() [all …]
|
| /freebsd/crypto/krb5/src/kadmin/cli/ |
| H A D | kadmin.c | 1122 if (!strcmp("-policy", argv[i])) { in kadmin_parse_princ_args() 1125 oprinc->policy = argv[i]; in kadmin_parse_princ_args() 1130 oprinc->policy = NULL; in kadmin_parse_princ_args() 1188 "\t\t[-kvno kvno] [-policy policy] [-clearpolicy]\n" in kadmin_addprinc_usage() 1212 "\t\t[-kvno kvno] [-policy policy] [-clearpolicy]\n" in kadmin_modprinc_usage() 1234 /* Must try to pass any password policy in place, and be valid UTF-8. */ in prepare_dummy_password() 1272 /* Warn if the specified policy does not exist. */ in kadmin_addprinc() 1273 if (!script_mode && !policy_exists(princ.policy)) { in kadmin_addprinc() 1274 fprintf(stderr, _("WARNING: policy \"%s\" does not exist\n"), in kadmin_addprinc() 1275 princ.policy); in kadmin_addprinc() [all …]
|
| /freebsd/sys/kern/ |
| H A D | ksched.c | 106 getscheduler(struct ksched *ksched, struct thread *td, int *policy) in getscheduler() argument 115 *policy = SCHED_FIFO; in getscheduler() 118 *policy = SCHED_RR; in getscheduler() 121 *policy = SCHED_OTHER; in getscheduler() 131 int e, policy; in ksched_setparam() local 133 e = getscheduler(ksched, td, &policy); in ksched_setparam() 135 e = ksched_setscheduler(ksched, td, policy, param); in ksched_setparam() 170 ksched_setscheduler(struct ksched *ksched, struct thread *td, int policy, in ksched_setscheduler() argument 177 switch(policy) { in ksched_setscheduler() 183 rtp.type = (policy == SCHED_FIFO) ? RTP_PRIO_FIFO : in ksched_setscheduler() [all …]
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | kadmin.man | 267 no password policy is specified with the \fB\-policy\fP option, and the 268 policy named \fBdefault\fP is assigned to the principal if it exists. 269 However, creating a policy named \fBdefault\fP will not automatically 270 assign this policy to previously existing principals. This policy 297 \fB\-policy\fP \fIpolicy\fP 298 The password policy used by this principal. If not specified, the 299 policy \fBdefault\fP is used if it exists (unless \fB\-clearpolicy\fP 303 Prevents any policy from being assigned when \fB\-policy\fP is not 430 \fB\-x tktpolicy=\fP\fIpolicy\fP 431 Associates a ticket policy to the Kerberos principal. [all …]
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | selinux | 1 # Type: SE Linux policy modules *.pp reference policy 6 0 lelong 0xf97cff8f SE Linux modular policy 17 1 string policy_module( SE Linux policy module source 18 2 string policy_module( SE Linux policy module source 20 0 string ##\ <summary> SE Linux policy interface source 22 #0 search gen_context( SE Linux policy file contexts 24 #0 search gen_sens( SE Linux policy MLS constraints source
|
| /freebsd/sys/security/mac/ |
| H A D | mac_framework.c | 47 * kernel infrastructure for the TrustedBSD MAC Framework, including policy 57 * - The MAC policy module interface, defined in mac_policy.h, which is 58 * implemented by MAC policy modules and invoked by the MAC Framework to 59 * forward kernel security requests and notifications to policy modules. 65 * src/sys/security/mac. Sample policy modules may be found in 95 SDT_PROBE_DEFINE2(mac, , policy, modevent, "int", 97 SDT_PROBE_DEFINE1(mac, , policy, register, 99 SDT_PROBE_DEFINE1(mac, , policy, unregister, 103 * Root sysctl node for all MAC and MAC policy controls. 106 "TrustedBSD MAC policy controls"); [all …]
|