/freebsd/crypto/openssl/test/ |
H A D | pkits-test.pl | 38 my $apolicy = "X509v3 Any Policy"; 136 # Certificate policy tests need special handling. They can have several 142 "All Certificates Same Policy Test1", 143 "-policy anyPolicy -explicit_policy", 148 "All Certificates Same Policy Test1", 149 "-policy $nist1 -explicit_policy", 154 "All Certificates Same Policy Test1", 155 "-policy $nist2 -explicit_policy", 160 "All Certificates Same Policy Test1", 161 "-policy $nist1 -policy $nist2 -explicit_policy", [all …]
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | v3_pci.c | 78 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) in i2r_pci() 80 pci->proxyPolicy->policy->length, in i2r_pci() 81 pci->proxyPolicy->policy->data); in i2r_pci() 87 ASN1_OCTET_STRING **policy) in process_pci_value() argument 114 } else if (strcmp(val->name, "policy") == 0) { in process_pci_value() 118 if (*policy == NULL) { in process_pci_value() 119 *policy = ASN1_OCTET_STRING_new(); in process_pci_value() 120 if (*policy == NULL) { in process_pci_value() 136 tmp_data = OPENSSL_realloc((*policy)->data, in process_pci_value() 137 (*policy)->length + val_len + 1); in process_pci_value() [all …]
|
H A D | pcy_data.c | 16 /* Policy Node routines */ 31 * Create a data based on an existing policy. If 'id' is NULL use the OID in 32 * the policy, otherwise use 'id'. This behaviour covers the two types of 38 X509_POLICY_DATA *ossl_policy_data_new(POLICYINFO *policy, in ossl_policy_data_new() argument 44 if (policy == NULL && cid == NULL) in ossl_policy_data_new() 72 ret->valid_policy = policy->policyid; in ossl_policy_data_new() 73 policy->policyid = NULL; in ossl_policy_data_new() 76 if (policy) { in ossl_policy_data_new() 77 ret->qualifier_set = policy->qualifiers; in ossl_policy_data_new() 78 policy->qualifiers = NULL; in ossl_policy_data_new()
|
H A D | pcy_local.h | 17 * This structure and the field names correspond to the Policy 'node' of 19 * X509_POLICY_NODE contains that. This means that the main policy data can 25 /* Policy OID and qualifiers for this data */ 34 * This flag indicates the structure has been mapped using a policy mapping 35 * extension. If policy mapping is not active its references get deleted. 41 * This flag indicates the data doesn't correspond to a policy in Certificate 42 * Policies: it has been mapped to any policy. 68 /* other policy data */ 123 * Extra policy data when additional nodes (not from the certificate) are 127 /* This is the authority constrained policy set */ [all …]
|
/freebsd/usr.sbin/nscd/ |
H A D | cacheplcs.c | 106 cache_queue_policy_add_item(struct cache_policy_ *policy, in cache_queue_policy_add_item() argument 113 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_add_item() 120 cache_queue_policy_remove_item(struct cache_policy_ *policy, in cache_queue_policy_remove_item() argument 127 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_remove_item() 134 cache_queue_policy_get_first_item(struct cache_policy_ *policy) in cache_queue_policy_get_first_item() argument 139 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_get_first_item() 145 cache_queue_policy_get_last_item(struct cache_policy_ *policy) in cache_queue_policy_get_last_item() argument 150 queue_policy = (struct cache_queue_policy_ *)policy; in cache_queue_policy_get_last_item() 157 cache_queue_policy_get_next_item(struct cache_policy_ *policy, in cache_queue_policy_get_next_item() argument 170 cache_queue_policy_get_prev_item(struct cache_policy_ *policy, in cache_queue_policy_get_prev_item() argument [all …]
|
H A D | cacheplcs.h | 32 /* common policy definitions */ 36 * cache_policy_item_ represents some abstract cache element in the policy 38 * another policy queue. 52 * cache_policy_ represents an abstract policy queue. It can be customized by 77 * LFU cache policy item "inherited" from cache_policy_item_ structure 89 * LFU policy queue "inherited" from cache_policy_. 115 /* fifo policy routines */ 119 /* lru policy routines */ 123 /* lfu policy routines */
|
/freebsd/contrib/llvm-project/clang/lib/AST/ |
H A D | TypePrinter.cpp | 55 PrintingPolicy &Policy; member in __anon5708b7770111::IncludeStrongLifetimeRAII 59 explicit IncludeStrongLifetimeRAII(PrintingPolicy &Policy) in IncludeStrongLifetimeRAII() argument 60 : Policy(Policy), Old(Policy.SuppressStrongLifetime) { in IncludeStrongLifetimeRAII() 61 if (!Policy.SuppressLifetimeQualifiers) in IncludeStrongLifetimeRAII() 62 Policy.SuppressStrongLifetime = false; in IncludeStrongLifetimeRAII() 65 ~IncludeStrongLifetimeRAII() { Policy.SuppressStrongLifetime = Old; } in ~IncludeStrongLifetimeRAII() 69 PrintingPolicy &Policy; member in __anon5708b7770111::ParamPolicyRAII 73 explicit ParamPolicyRAII(PrintingPolicy &Policy) in ParamPolicyRAII() argument 74 : Policy(Policy), Old(Policy.SuppressSpecifiers) { in ParamPolicyRAII() 75 Policy.SuppressSpecifiers = false; in ParamPolicyRAII() [all …]
|
H A D | DeclPrinter.cpp | 31 PrintingPolicy Policy; member in __anond0616ced0111::DeclPrinter 54 DeclPrinter(raw_ostream &Out, const PrintingPolicy &Policy, in DeclPrinter() argument 57 : Out(Out), Policy(Policy), Context(Context), Indentation(Indentation), in DeclPrinter() 135 void Decl::print(raw_ostream &Out, const PrintingPolicy &Policy, in print() argument 137 DeclPrinter Printer(Out, Policy, getASTContext(), Indentation, in print() 148 const PrintingPolicy &Policy, in print() argument 150 DeclPrinter Printer(Out, Policy, Context); in print() 193 raw_ostream &Out, const PrintingPolicy &Policy, in printGroup() argument 196 (*Begin)->print(Out, Policy, Indentation); in printGroup() 205 PrintingPolicy SubPolicy(Policy); in printGroup() [all …]
|
H A D | AttrImpl.cpp | 21 const PrintingPolicy &Policy) const { in printPrettyPragma() 30 OS << ' ' << getValueString(Policy); in printPrettyPragma() 35 OS << ' ' << getOptionName(option) << getValueString(Policy); in printPrettyPragma() 40 std::string LoopHintAttr::getValueString(const PrintingPolicy &Policy) const { in getValueString() 45 value->printPretty(OS, nullptr, Policy); in getValueString() 48 value->printPretty(OS, nullptr, Policy); in getValueString() 69 LoopHintAttr::getDiagnosticName(const PrintingPolicy &Policy) const { in getDiagnosticName() 75 (option == UnrollCount ? getValueString(Policy) : ""); in getDiagnosticName() 80 (option == UnrollAndJamCount ? getValueString(Policy) : ""); in getDiagnosticName() 83 return getOptionName(option) + getValueString(Policy); in getDiagnosticName() [all …]
|
/freebsd/contrib/llvm-project/llvm/lib/Support/ |
H A D | CachePruning.cpp | 79 CachePruningPolicy Policy; in parseCachePruningPolicy() local 90 Policy.Interval = *DurationOrErr; in parseCachePruningPolicy() 95 Policy.Expiration = *DurationOrErr; in parseCachePruningPolicy() 109 Policy.MaxSizePercentageOfAvailableSpace = Size; in parseCachePruningPolicy() 130 Policy.MaxSizeBytes = Size * Mult; in parseCachePruningPolicy() 132 if (Value.getAsInteger(0, Policy.MaxSizeFiles)) in parseCachePruningPolicy() 141 return Policy; in parseCachePruningPolicy() 145 bool llvm::pruneCache(StringRef Path, CachePruningPolicy Policy, in pruneCache() argument 159 Policy.MaxSizePercentageOfAvailableSpace = in pruneCache() 160 std::min(Policy in pruneCache() [all...] |
/freebsd/lib/libipsec/ |
H A D | ipsec_set_policy.3 | 37 .Nd create an IPsec policy structure from a human readable string 44 .Fn ipsec_set_policy "const char *policy" "int len" 52 function generates an IPsec policy specification structure, 56 from a human-readable policy specification. 57 The policy specification must be given as a C string, 59 .Fa policy 65 IPsec policy specification structure. 79 function converts an IPsec policy structure into a human readable form. 82 argument points to an IPsec policy structure, 99 .Fa policy [all...] |
/freebsd/lib/libsys/ |
H A D | sched_setscheduler.2 | 31 .Nd set/get scheduling policy and scheduler parameters 37 .Fn sched_setscheduler "pid_t pid" "int policy" "const struct sched_param *param" 43 system call sets the scheduling policy and scheduling parameters 47 .Fa policy 58 the scheduling policy specified by 59 .Fa policy . 68 policy and scheduling parameters will be set for the process 74 is zero, the scheduling policy and scheduling 77 In this implementation, the policy of when a process can affect 105 system call returns the scheduling policy of the process specified [all …]
|
H A D | cpuset_getdomain.2 | 31 .Nd manage memory domain policy 38 … "cpulevel_t level" "cpuwhich_t which" "id_t id" "size_t setsize" "domainset_t *mask" "int *policy" 40 …level_t level" "cpuwhich_t which" "id_t id" "size_t setsize" "const domainset_t *mask" "int policy" 45 allow the manipulation of sets of memory domains and allocation policy available 92 mask and policy from the object specified by 100 .Fa policy . 103 attempts to set the mask and policy for the object specified by 111 .Fa policy . 113 Valid policy values are as follows: 144 .Fa policy
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | robust_av.c | 822 return; /* AP does not enable QM DSCP Policy */ in wpas_handle_assoc_resp_qos_mgmt() 1105 static int set_frame_classifier_type4_ipv4(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv4() argument 1108 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv4() 1109 struct type4_params *type4_param = &policy->type4_param; in set_frame_classifier_type4_ipv4() 1111 if (policy->frame_classifier_len < 18) { in set_frame_classifier_type4_ipv4() 1114 policy->frame_classifier_len); in set_frame_classifier_type4_ipv4() 1129 if (policy->domain_name) { in set_frame_classifier_type4_ipv4() 1149 if (policy->port_range_info) { in set_frame_classifier_type4_ipv4() 1172 static int set_frame_classifier_type4_ipv6(struct dscp_policy_data *policy) in set_frame_classifier_type4_ipv6() argument 1175 const u8 *frame_classifier = policy->frame_classifier; in set_frame_classifier_type4_ipv6() [all …]
|
/freebsd/bin/cpuset/ |
H A D | cpuset.c | 74 int policy; member 177 * permissively parse policy:domain list 181 * 0-4 implicit root policy 183 * all explicit root domains and implicit policy 189 struct numa_policy *policy; in parsedomainlist() local 194 * Use the rootset's policy as the default for unspecified policies. in parsedomainlist() 201 for (policy = &policies[0]; policy->name != NULL; policy++) { in parsedomainlist() 202 if (strncasecmp(l, policy->name, strlen(policy->name)) == 0) { in parsedomainlist() 203 p = policy->policy; in parsedomainlist() 204 l += strlen(policy->name); in parsedomainlist() [all …]
|
/freebsd/share/man/man4/ |
H A D | mac.4 | 42 finely control system security by providing for a loadable security policy 45 only restrict access relative to one another and the base system policy; 50 Currently, the following MAC policy modules are shipped with 54 .It Xr mac_biba 4 Ta "Biba integrity policy" Ta yes Ta boot only 60 .It Xr mac_lomac 4 Ta "Low-Watermark MAC policy" Ta yes Ta boot only 61 .It Xr mac_mls 4 Ta "Confidentiality policy" Ta yes Ta boot only 62 .It Xr mac_ntpd 4 Ta "Non-root NTP Daemon policy" Ta no Ta any time 63 .It Xr mac_partition 4 Ta "Process partition policy" Ta yes Ta any time 65 .It Xr mac_priority 4 Ta "Scheduling priority policy" Ta no Ta any time 66 .It Xr mac_seeotheruids 4 Ta "See-other-UIDs policy" Ta no Ta any time [all …]
|
H A D | mac_priority.4 | 29 .Nd "policy for scheduling privileges of non-root users" 31 To compile the mac_priority policy into your kernel, place the following lines 38 Alternately, to load the mac_priority policy module at boot time, 52 policy grants scheduling privileges based on 66 realtime policy active, privileged users may use the 74 When the idletime policy is active, privileged users may use the 82 The realtime policy grants the following kernel privileges to any process 89 The kernel privilege granted by the idletime policy is: 96 MIBs are available for fine-tuning this MAC policy. 105 Enable the realtime policy. [all …]
|
H A D | mac_ipacl.4 | 32 .Nd "IP Address access control policy" 35 IP address access control policy into your kernel: 41 To load the mac_ipacl policy module at boot time, add the 54 policy allows the root of the host to use the 67 policy is enforced and allow/deny IP (or subnets) according to the 74 MIBs are used to control enforcement and behavior of this MAC Policy. 110 Prefix length of the subnet to be enforced by the policy. 111 -1 implies the policy is enforced for the individual IP address. 119 policy module for different inputs of sysctl variable: 125 It allows all IPv6 addresses since the policy is not enforced for IPv6. [all …]
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | kadm5_pwcheck.3 | 84 configured by the user. If any policy rejects the password, the password 87 Policy names are of the form 88 .Ql module-name:policy-name 89 or, if the the policy name is unique enough, just 90 .Ql policy-name . 109 portion of the policy name (the part before the colon), if the policy name 110 contains a colon, or the policy will not be run. 125 .Ql policy-name 126 portion of a policy name (the part after the colon, or the complete policy 127 name if there is no colon) specified by the user or the policy will not be
|
/freebsd/sys/kern/ |
H A D | ksched.c | 106 getscheduler(struct ksched *ksched, struct thread *td, int *policy) in getscheduler() argument 115 *policy = SCHED_FIFO; in getscheduler() 118 *policy = SCHED_RR; in getscheduler() 121 *policy = SCHED_OTHER; in getscheduler() 131 int e, policy; in ksched_setparam() local 133 e = getscheduler(ksched, td, &policy); in ksched_setparam() 135 e = ksched_setscheduler(ksched, td, policy, param); in ksched_setparam() 170 ksched_setscheduler(struct ksched *ksched, struct thread *td, int policy, in ksched_setscheduler() argument 177 switch(policy) { in ksched_setscheduler() 183 rtp.type = (policy == SCHED_FIFO) ? RTP_PRIO_FIFO : in ksched_setscheduler() [all …]
|
/freebsd/crypto/openssh/ |
H A D | sandbox-systrace.c | 129 struct systrace_policy policy; in ssh_sandbox_parent() local 162 /* Allocate and assign policy */ in ssh_sandbox_parent() 163 memset(&policy, 0, sizeof(policy)); in ssh_sandbox_parent() 164 policy.strp_op = SYSTR_POLICY_NEW; in ssh_sandbox_parent() 165 policy.strp_maxents = SYS_MAXSYSCALL; in ssh_sandbox_parent() 166 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1) in ssh_sandbox_parent() 170 policy.strp_op = SYSTR_POLICY_ASSIGN; in ssh_sandbox_parent() 171 policy.strp_pid = box->child_pid; in ssh_sandbox_parent() 172 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1) in ssh_sandbox_parent() 176 /* Set per-syscall policy */ in ssh_sandbox_parent() [all …]
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | selinux | 1 # Type: SE Linux policy modules *.pp reference policy 6 0 lelong 0xf97cff8f SE Linux modular policy 17 1 string policy_module( SE Linux policy module source 18 2 string policy_module( SE Linux policy module source 20 0 string ##\ <summary> SE Linux policy interface source 22 #0 search gen_context( SE Linux policy file contexts 24 #0 search gen_sens( SE Linux policy MLS constraints source
|
/freebsd/sys/security/mac/ |
H A D | mac_framework.c | 47 * kernel infrastructure for the TrustedBSD MAC Framework, including policy 57 * - The MAC policy module interface, defined in mac_policy.h, which is 58 * implemented by MAC policy modules and invoked by the MAC Framework to 59 * forward kernel security requests and notifications to policy modules. 65 * src/sys/security/mac. Sample policy modules may be found in 95 SDT_PROBE_DEFINE2(mac, , policy, modevent, "int", 97 SDT_PROBE_DEFINE1(mac, , policy, register, 99 SDT_PROBE_DEFINE1(mac, , policy, unregister, 103 * Root sysctl node for all MAC and MAC policy controls. 106 "TrustedBSD MAC policy controls"); [all …]
|
/freebsd/sbin/setkey/ |
H A D | setkey.8 | 63 as well as Security Policy Database (SPD) entries in the kernel. 192 .Ar src_range Ar dst_range Ar upperspec Ar policy 306 Specify the identifier of the policy entry in SPD. 308 .Ar policy . 455 The following example shows a policy where IPSec is not required for 470 .It Ar policy 471 .Ar policy 482 .Bl -tag -compact -width "policy level" 486 of a policy must be specified as one of: 490 .It Ar policy level [all …]
|
/freebsd/share/man/man9/ |
H A D | domainset.9 | 61 API provides memory domain allocation policy for NUMA machines. 64 contains a bitmask of allowed domains, an integer policy, and an optional 76 falls back to the thread policy if none exists. 78 The allocation policy has the following possible values: 83 This policy can specify a single domain for a fixed allocation. 88 This policy optimizes for locality but may give pessimal results if the 115 desired policy is known at compile time. 117 is a policy which only permits allocations from the specified domain. 119 is a policy which attempts to allocate memory local to the current CPU, 120 falling back to a round-robin policy if the initial allocation fails.
|