Home
last modified time | relevance | path

Searched full:policy (Results 1 – 25 of 1424) sorted by relevance

12345678910>>...57

/freebsd/crypto/openssl/test/
H A Dpkits-test.pl38 my $apolicy = "X509v3 Any Policy";
136 # Certificate policy tests need special handling. They can have several
142 "All Certificates Same Policy Test1",
143 "-policy anyPolicy -explicit_policy",
148 "All Certificates Same Policy Test1",
149 "-policy $nist1 -explicit_policy",
154 "All Certificates Same Policy Test1",
155 "-policy $nist2 -explicit_policy",
160 "All Certificates Same Policy Test1",
161 "-policy $nist1 -policy $nist2 -explicit_policy",
[all …]
/freebsd/crypto/openssl/crypto/x509/
H A Dv3_pci.c78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci()
80 pci->proxyPolicy->policy->length, in i2r_pci()
81 pci->proxyPolicy->policy->data); in i2r_pci()
87 ASN1_OCTET_STRING **policy) in process_pci_value() argument
114 } else if (strcmp(val->name, "policy") == 0) { in process_pci_value()
119 if (*policy == NULL) { in process_pci_value()
120 *policy = ASN1_OCTET_STRING_new(); in process_pci_value()
121 if (*policy == NULL) { in process_pci_value()
137 tmp_data = OPENSSL_realloc((*policy)->data, in process_pci_value()
138 (*policy)->length + val_len + 1); in process_pci_value()
[all …]
H A Dpcy_data.c16 /* Policy Node routines */
31 * Create a data based on an existing policy. If 'id' is NULL use the OID in
32 * the policy, otherwise use 'id'. This behaviour covers the two types of
38 X509_POLICY_DATA *ossl_policy_data_new(POLICYINFO *policy, in ossl_policy_data_new() argument
44 if (policy == NULL && cid == NULL) in ossl_policy_data_new()
71 ret->valid_policy = policy->policyid; in ossl_policy_data_new()
72 policy->policyid = NULL; in ossl_policy_data_new()
75 if (policy) { in ossl_policy_data_new()
76 ret->qualifier_set = policy->qualifiers; in ossl_policy_data_new()
77 policy->qualifiers = NULL; in ossl_policy_data_new()
/freebsd/crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/
H A Dldap_pwd_policy.c50 /* Fill in mods with LDAP operations for the fields of policy, using the
53 add_policy_mods(krb5_context context, LDAPMod ***mods, osa_policy_ent_t policy, in add_policy_mods() argument
60 (int)policy->pw_max_life); in add_policy_mods()
65 (int)policy->pw_min_life); in add_policy_mods()
70 (int)policy->pw_min_classes); in add_policy_mods()
75 (int)policy->pw_min_length); in add_policy_mods()
80 (int)policy->pw_history_num); in add_policy_mods()
85 (int)policy->pw_max_fail); in add_policy_mods()
90 (int)policy->pw_failcnt_interval); in add_policy_mods()
95 (int)policy->pw_lockout_duration); in add_policy_mods()
[all …]
H A Dldap_tkt_policy.c36 /* Ticket policy object management */
49 * create the Ticket policy object in Directory.
52 krb5_ldap_create_policy(krb5_context context, krb5_ldap_policy_params *policy, in krb5_ldap_create_policy() argument
64 if (policy == NULL || policy->policy == NULL) { in krb5_ldap_create_policy()
66 k5_setmsg(context, st, _("Ticket Policy Name missing")); in krb5_ldap_create_policy()
73 if ((st = krb5_ldap_name_to_policydn (context, policy->policy, &policy_dn)) != 0) in krb5_ldap_create_policy()
77 strval[0] = policy->policy; in krb5_ldap_create_policy()
89 policy->maxtktlife)) != 0) in krb5_ldap_create_policy()
95 policy->maxrenewlife)) != 0) in krb5_ldap_create_policy()
101 policy->tktflags)) != 0) in krb5_ldap_create_policy()
[all …]
/freebsd/crypto/krb5/src/plugins/kdb/ldap/ldap_util/
H A Dkdb5_ldap_policy.c31 * Create / Delete / Modify / View / List policy objects.
89 * This function will create a ticket policy object with the
110 /* Allocate memory for policy parameters structure */ in kdb5_ldap_create_policy()
258 } else { /* Any other argument must be policy DN */ in kdb5_ldap_create_policy()
259 /* First check if policy DN is already provided -- in kdb5_ldap_create_policy()
261 if (policyparams->policy != NULL) in kdb5_ldap_create_policy()
264 /* If not present already, fill up policy DN */ in kdb5_ldap_create_policy()
265 policyparams->policy = strdup(argv[i]); in kdb5_ldap_create_policy()
266 if (policyparams->policy == NULL) { in kdb5_ldap_create_policy()
268 com_err(me, retval, _("while creating policy object")); in kdb5_ldap_create_policy()
[all …]
/freebsd/usr.sbin/nscd/
H A Dcacheplcs.c106 cache_queue_policy_add_item(struct cache_policy_ *policy, in cache_queue_policy_add_item() argument
113 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_add_item()
120 cache_queue_policy_remove_item(struct cache_policy_ *policy, in cache_queue_policy_remove_item() argument
127 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_remove_item()
134 cache_queue_policy_get_first_item(struct cache_policy_ *policy) in cache_queue_policy_get_first_item() argument
139 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_get_first_item()
145 cache_queue_policy_get_last_item(struct cache_policy_ *policy) in cache_queue_policy_get_last_item() argument
150 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_get_last_item()
157 cache_queue_policy_get_next_item(struct cache_policy_ *policy, in cache_queue_policy_get_next_item() argument
170 cache_queue_policy_get_prev_item(struct cache_policy_ *policy, in cache_queue_policy_get_prev_item() argument
[all …]
/freebsd/contrib/llvm-project/clang/lib/AST/
H A DTypePrinter.cpp55 PrintingPolicy &Policy; member in __anon5708b7770111::IncludeStrongLifetimeRAII
59 explicit IncludeStrongLifetimeRAII(PrintingPolicy &Policy) in IncludeStrongLifetimeRAII() argument
60 : Policy(Policy), Old(Policy.SuppressStrongLifetime) { in IncludeStrongLifetimeRAII()
61 if (!Policy.SuppressLifetimeQualifiers) in IncludeStrongLifetimeRAII()
62 Policy.SuppressStrongLifetime = false; in IncludeStrongLifetimeRAII()
65 ~IncludeStrongLifetimeRAII() { Policy.SuppressStrongLifetime = Old; } in ~IncludeStrongLifetimeRAII()
69 PrintingPolicy &Policy; member in __anon5708b7770111::ParamPolicyRAII
73 explicit ParamPolicyRAII(PrintingPolicy &Policy) in ParamPolicyRAII() argument
74 : Policy(Policy), Old(Policy.SuppressSpecifiers) { in ParamPolicyRAII()
75 Policy.SuppressSpecifiers = false; in ParamPolicyRAII()
[all …]
H A DDeclPrinter.cpp31 PrintingPolicy Policy; member in __anond0616ced0111::DeclPrinter
54 DeclPrinter(raw_ostream &Out, const PrintingPolicy &Policy, in DeclPrinter() argument
57 : Out(Out), Policy(Policy), Context(Context), Indentation(Indentation), in DeclPrinter()
135 void Decl::print(raw_ostream &Out, const PrintingPolicy &Policy, in print() argument
137 DeclPrinter Printer(Out, Policy, getASTContext(), Indentation, in print()
148 const PrintingPolicy &Policy, in print() argument
150 DeclPrinter Printer(Out, Policy, Context); in print()
193 raw_ostream &Out, const PrintingPolicy &Policy, in printGroup() argument
196 (*Begin)->print(Out, Policy, Indentation); in printGroup()
205 PrintingPolicy SubPolicy(Policy); in printGroup()
[all …]
H A DAttrImpl.cpp21 const PrintingPolicy &Policy) const { in printPrettyPragma()
30 OS << ' ' << getValueString(Policy); in printPrettyPragma()
35 OS << ' ' << getOptionName(option) << getValueString(Policy); in printPrettyPragma()
40 std::string LoopHintAttr::getValueString(const PrintingPolicy &Policy) const { in getValueString()
45 value->printPretty(OS, nullptr, Policy); in getValueString()
48 value->printPretty(OS, nullptr, Policy); in getValueString()
69 LoopHintAttr::getDiagnosticName(const PrintingPolicy &Policy) const { in getDiagnosticName()
75 (option == UnrollCount ? getValueString(Policy) : ""); in getDiagnosticName()
80 (option == UnrollAndJamCount ? getValueString(Policy) : ""); in getDiagnosticName()
83 return getOptionName(option) + getValueString(Policy); in getDiagnosticName()
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Support/
H A DCachePruning.cpp79 CachePruningPolicy Policy; in parseCachePruningPolicy() local
90 Policy.Interval = *DurationOrErr; in parseCachePruningPolicy()
95 Policy.Expiration = *DurationOrErr; in parseCachePruningPolicy()
109 Policy.MaxSizePercentageOfAvailableSpace = Size; in parseCachePruningPolicy()
130 Policy.MaxSizeBytes = Size * Mult; in parseCachePruningPolicy()
132 if (Value.getAsInteger(0, Policy.MaxSizeFiles)) in parseCachePruningPolicy()
141 return Policy; in parseCachePruningPolicy()
145 bool llvm::pruneCache(StringRef Path, CachePruningPolicy Policy, in pruneCache() argument
159 Policy.MaxSizePercentageOfAvailableSpace = in pruneCache()
160 std::min(Policy in pruneCache()
[all...]
/freebsd/lib/libipsec/
H A Dipsec_set_policy.337 .Nd create an IPsec policy structure from a human readable string
44 .Fn ipsec_set_policy "const char *policy" "int len"
52 function generates an IPsec policy specification structure,
56 from a human-readable policy specification.
57 The policy specification must be given as a C string,
59 .Fa policy
65 IPsec policy specification structure.
79 function converts an IPsec policy structure into a human readable form.
82 argument points to an IPsec policy structure,
99 .Fa policy
[all...]
/freebsd/lib/libsys/
H A Dsched_setscheduler.231 .Nd set/get scheduling policy and scheduler parameters
37 .Fn sched_setscheduler "pid_t pid" "int policy" "const struct sched_param *param"
43 system call sets the scheduling policy and scheduling parameters
47 .Fa policy
58 the scheduling policy specified by
59 .Fa policy .
68 policy and scheduling parameters will be set for the process
74 is zero, the scheduling policy and scheduling
77 In this implementation, the policy of when a process can affect
105 system call returns the scheduling policy of the process specified
[all …]
/freebsd/contrib/wpa/wpa_supplicant/
H A Drobust_av.c822 return; /* AP does not enable QM DSCP Policy */ in wpas_handle_assoc_resp_qos_mgmt()
1105 static int set_frame_classifier_type4_ipv4(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv4() argument
1108 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv4()
1109 struct type4_params *type4_param = &policy->type4_param; in set_frame_classifier_type4_ipv4()
1111 if (policy->frame_classifier_len < 18) { in set_frame_classifier_type4_ipv4()
1114 policy->frame_classifier_len); in set_frame_classifier_type4_ipv4()
1129 if (policy->domain_name) { in set_frame_classifier_type4_ipv4()
1149 if (policy->port_range_info) { in set_frame_classifier_type4_ipv4()
1172 static int set_frame_classifier_type4_ipv6(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv6() argument
1175 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv6()
[all …]
/freebsd/share/man/man9/
H A Ddomainset.957 .Fn domainset_populate "struct domainset *domain" "domainset_t *mask" "int policy" "size_t mask_siz…
63 API provides memory domain allocation policy for NUMA machines.
66 contains a bitmask of allowed domains, an integer policy, and an optional
78 falls back to the thread policy if none exists.
80 The allocation policy has the following possible values:
85 This policy can specify a single domain for a fixed allocation.
90 This policy optimizes for locality but may give pessimal results if the
117 desired policy is known at compile time.
119 is a policy which only permits allocations from the specified domain.
121 is a policy which attempts to allocate memory local to the current CPU,
[all …]
/freebsd/share/man/man4/
H A Dmac.442 finely control system security by providing for a loadable security policy
45 only restrict access relative to one another and the base system policy;
50 Currently, the following MAC policy modules are shipped with
54 .It Xr mac_biba 4 Ta "Biba integrity policy" Ta yes Ta boot only
60 .It Xr mac_lomac 4 Ta "Low-Watermark MAC policy" Ta yes Ta boot only
61 .It Xr mac_mls 4 Ta "Confidentiality policy" Ta yes Ta boot only
62 .It Xr mac_ntpd 4 Ta "Non-root NTP Daemon policy" Ta no Ta any time
63 .It Xr mac_partition 4 Ta "Process partition policy" Ta yes Ta any time
65 .It Xr mac_priority 4 Ta "Scheduling priority policy" Ta no Ta any time
66 .It Xr mac_seeotheruids 4 Ta "See-other-UIDs policy" Ta no Ta any time
[all …]
H A Dmac_priority.429 .Nd "policy for scheduling privileges of non-root users"
31 To compile the mac_priority policy into your kernel, place the following lines
38 Alternately, to load the mac_priority policy module at boot time,
52 policy grants scheduling privileges based on
66 realtime policy active, privileged users may use the
74 When the idletime policy is active, privileged users may use the
82 The realtime policy grants the following kernel privileges to any process
89 The kernel privilege granted by the idletime policy is:
96 MIBs are available for fine-tuning this MAC policy.
105 Enable the realtime policy.
[all …]
/freebsd/crypto/heimdal/lib/kadm5/
H A Dkadm5_pwcheck.384 configured by the user. If any policy rejects the password, the password
87 Policy names are of the form
88 .Ql module-name:policy-name
89 or, if the the policy name is unique enough, just
90 .Ql policy-name .
109 portion of the policy name (the part before the colon), if the policy name
110 contains a colon, or the policy will not be run.
125 .Ql policy-name
126 portion of a policy name (the part after the colon, or the complete policy
127 name if there is no colon) specified by the user or the policy will not be
/freebsd/lib/libutil/
H A Dcpuset.c44 int policy; member
130 * permissively parse policy:domain list
134 * 0-4 implicit root policy
136 * all explicit root domains and implicit policy
142 const struct numa_policy *policy; in domainset_parselist() local
147 * Use the rootset's policy as the default for unspecified policies. in domainset_parselist()
160 for (policy = &policies[0]; policy->name != NULL; policy++) { in domainset_parselist()
161 if (strncasecmp(l, policy->name, strlen(policy->name)) == 0) { in domainset_parselist()
162 p = policy->policy; in domainset_parselist()
163 l += strlen(policy->name); in domainset_parselist()
/freebsd/crypto/krb5/src/lib/kadm5/
H A Dt_kadm5.c115 ent.policy = name; in create_simple_policy()
135 check(kadm5_get_policy(handle, x->policy, &g)); in compare_policy()
137 assert(strcmp(g.policy, x->policy) == 0); in compare_policy()
160 create_simple_princ(krb5_principal princ, char *policy) in create_simple_princ() argument
168 ent.policy = policy; in create_simple_princ()
169 if (policy != NULL) in create_simple_princ()
208 assert(strcmp(g.policy, x->policy) == 0); in compare_princ()
225 kadm5_get_policy(handle, g.policy, &pol) == 0) { in compare_princ()
226 /* Check the policy pw_max_life computation. */ in compare_princ()
237 assert(g.policy == NULL); in compare_princ()
[all …]
/freebsd/crypto/krb5/src/kadmin/cli/
H A Dkadmin.c1122 if (!strcmp("-policy", argv[i])) { in kadmin_parse_princ_args()
1125 oprinc->policy = argv[i]; in kadmin_parse_princ_args()
1130 oprinc->policy = NULL; in kadmin_parse_princ_args()
1188 "\t\t[-kvno kvno] [-policy policy] [-clearpolicy]\n" in kadmin_addprinc_usage()
1212 "\t\t[-kvno kvno] [-policy policy] [-clearpolicy]\n" in kadmin_modprinc_usage()
1234 /* Must try to pass any password policy in place, and be valid UTF-8. */ in prepare_dummy_password()
1272 /* Warn if the specified policy does not exist. */ in kadmin_addprinc()
1273 if (!script_mode && !policy_exists(princ.policy)) { in kadmin_addprinc()
1274 fprintf(stderr, _("WARNING: policy \"%s\" does not exist\n"), in kadmin_addprinc()
1275 princ.policy); in kadmin_addprinc()
[all …]
/freebsd/sys/kern/
H A Dksched.c106 getscheduler(struct ksched *ksched, struct thread *td, int *policy) in getscheduler() argument
115 *policy = SCHED_FIFO; in getscheduler()
118 *policy = SCHED_RR; in getscheduler()
121 *policy = SCHED_OTHER; in getscheduler()
131 int e, policy; in ksched_setparam() local
133 e = getscheduler(ksched, td, &policy); in ksched_setparam()
135 e = ksched_setscheduler(ksched, td, policy, param); in ksched_setparam()
170 ksched_setscheduler(struct ksched *ksched, struct thread *td, int policy, in ksched_setscheduler() argument
177 switch(policy) { in ksched_setscheduler()
183 rtp.type = (policy == SCHED_FIFO) ? RTP_PRIO_FIFO : in ksched_setscheduler()
[all …]
/freebsd/crypto/krb5/src/man/
H A Dkadmin.man267 no password policy is specified with the \fB\-policy\fP option, and the
268 policy named \fBdefault\fP is assigned to the principal if it exists.
269 However, creating a policy named \fBdefault\fP will not automatically
270 assign this policy to previously existing principals. This policy
297 \fB\-policy\fP \fIpolicy\fP
298 The password policy used by this principal. If not specified, the
299 policy \fBdefault\fP is used if it exists (unless \fB\-clearpolicy\fP
303 Prevents any policy from being assigned when \fB\-policy\fP is not
430 \fB\-x tktpolicy=\fP\fIpolicy\fP
431 Associates a ticket policy to the Kerberos principal.
[all …]
/freebsd/contrib/file/magic/Magdir/
H A Dselinux1 # Type: SE Linux policy modules *.pp reference policy
6 0 lelong 0xf97cff8f SE Linux modular policy
17 1 string policy_module( SE Linux policy module source
18 2 string policy_module( SE Linux policy module source
20 0 string ##\ <summary> SE Linux policy interface source
22 #0 search gen_context( SE Linux policy file contexts
24 #0 search gen_sens( SE Linux policy MLS constraints source
/freebsd/sys/security/mac/
H A Dmac_framework.c47 * kernel infrastructure for the TrustedBSD MAC Framework, including policy
57 * - The MAC policy module interface, defined in mac_policy.h, which is
58 * implemented by MAC policy modules and invoked by the MAC Framework to
59 * forward kernel security requests and notifications to policy modules.
65 * src/sys/security/mac. Sample policy modules may be found in
95 SDT_PROBE_DEFINE2(mac, , policy, modevent, "int",
97 SDT_PROBE_DEFINE1(mac, , policy, register,
99 SDT_PROBE_DEFINE1(mac, , policy, unregister,
103 * Root sysctl node for all MAC and MAC policy controls.
106 "TrustedBSD MAC policy controls");
[all …]

12345678910>>...57