/freebsd/usr.sbin/nscd/ |
H A D | cachelib.c | 242 destroy_cache_fifo_policy(common_entry->policies[0]); in destroy_cache_entry() 245 destroy_cache_lru_policy(common_entry->policies[1]); in destroy_cache_entry() 248 destroy_cache_lfu_policy(common_entry->policies[1]); in destroy_cache_entry() 253 free(common_entry->policies); in destroy_cache_entry() 311 policy = common_entry->policies[i]; in clear_cache_entry() 434 policy = common_entry->policies[0]; in flush_cache_entry() 436 connected_policy = common_entry->policies[1]; in flush_cache_entry() 449 policy = common_entry->policies[1]; in flush_cache_entry() 450 connected_policy = common_entry->policies[0]; in flush_cache_entry() 452 policy = common_entry->policies[0]; in flush_cache_entry() [all …]
|
H A D | cachelib.h | 145 struct cache_policy_ **policies; member
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | x509_vpm.c | 102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_free() 190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit() 191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) in X509_VERIFY_PARAM_inherit() 335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy() 336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy() 341 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy() 347 STACK_OF(ASN1_OBJECT) *policies) in X509_VERIFY_PARAM_set1_policies() 356 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); in X509_VERIFY_PARAM_set1_policies() 358 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies() [all …]
|
H A D | pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create() 42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
|
H A D | x509_local.h | 30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */
|
/freebsd/contrib/googletest/docs/ |
H A D | platforms.md | 4 [Foundational C++ Support Policy](https://opensource.google/documentation/policies/cplusplus-suppor… 6 [this table](https://github.com/google/oss-policies-info/blob/main/foundational-cxx-support-matrix.…
|
/freebsd/crypto/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free() 210 if (ctx->policies == NULL in TS_RESP_CTX_add_policy() 211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) in TS_RESP_CTX_add_policy() 215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) in TS_RESP_CTX_add_policy() 512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy() 513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
|
H A D | ts_conf.c | 317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local 320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
|
H A D | ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
|
/freebsd/crypto/openssl/ |
H A D | CONTRIBUTING.md | 43 [Contributor License Agreement]: <https://www.openssl.org/policies/cla.html> 80 [coding style]: https://openssl-library.org/policies/technical/coding-style/ 81 [documentation policy]: https://openssl-library.org/policies/technical/documentation-policy/
|
/freebsd/contrib/openpam/ |
H A D | RELNOTES | 16 - A test application (pamtest) which can be used to test policies and
|
/freebsd/bin/cpuset/ |
H A D | cpuset.c | 77 static struct numa_policy policies[] = { variable 201 for (policy = &policies[0]; policy->name != NULL; policy++) { in parsedomainlist()
|
/freebsd/crypto/openssl/test/ |
H A D | CAtsa.cnf | 137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional) 163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
/freebsd/crypto/openssl/crypto/cmp/ |
H A D | cmp_ctx.c | 226 sk_POLICYINFO_pop_free(ctx->policies, POLICYINFO_free); in OSSL_CMP_CTX_free() 558 if (ctx->policies == NULL in OSSL_CMP_CTX_push0_policy() 559 && (ctx->policies = CERTIFICATEPOLICIES_new()) == NULL) in OSSL_CMP_CTX_push0_policy() 562 return sk_POLICYINFO_push(ctx->policies, pinfo); in OSSL_CMP_CTX_push0_policy()
|
/freebsd/contrib/libcbor/doc/source/api/ |
H A D | item_reference_counting.rst | 13 or if you want to implement custom policies (e.g. tighter restrictions on the amount of allocated m…
|
/freebsd/contrib/libcxxrt/ |
H A D | LICENSE | 14 …e of the authors and should not be interpreted as representing official policies, either expressed…
|
/freebsd/tools/tools/sysdoc/ |
H A D | tunables.mdoc | 1709 Enforce MAC policies for file system accesses. 1715 Enforce MAC policies on 1722 Enforce MAC policies on network interfaces. 1728 Enforce MAC policies on pipes. 1734 Enforce MAC policies between system processes 1743 Enforce MAC policies on sockets. 1749 Enforce MAC policies on system-related items 1759 Enforce MAC policies on 1870 NOTE: MAC security policies may not override other security system policies
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OSSL_CMP_MSG_get0_header.pod | 93 Finally, policies are overridden by any policies included in I<ctx> via
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 46 STACK_OF(ASN1_OBJECT) *policies); 106 by default) and sets the acceptable policy set to B<policies>. Any existing 107 policy set is cleared. The B<policies> parameter can be B<NULL> to clear
|
/freebsd/crypto/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | test.cnf | 10 policies = certificatePolicies
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | proxy-certificates.pod | 99 The string is then a filename. This is useful for policies that are 106 application to interpret and combine these policies.> 133 To interpret proxy policies, the application would normally start with
|
/freebsd/crypto/openssl/doc/HOWTO/ |
H A D | certificates.txt | 48 policies). A certificate request is sent to a certificate authority 66 policies) and usually waits for payment from you. Once that is
|
/freebsd/contrib/googletest/ |
H A D | README.md | 88 [Foundational C++ Support Policy](https://opensource.google/documentation/policies/cplusplus-suppor… 90 [this table](https://github.com/google/oss-policies-info/blob/main/foundational-cxx-support-matrix.…
|
/freebsd/contrib/llvm-project/clang/include/clang/Basic/ |
H A D | riscv_vector.td | 256 1. When unmasked and the policies are all specified as agnostic: 258 2. When masked and the policies are all specified as agnostic: 260 3. When unmasked and one of the policies is specified as undisturbed: 263 4. When masked and one of the policies is specified as undisturbed: 272 1. When unmasked and the policies are all specified as agnostic: 274 2. When masked and the policies are all specified as agnostic: 276 3. When unmasked and one of the policies is specified as undisturbed: 279 4. When masked and one of the policies is specified as undisturbed: 285 1. When unmasked and the policies are all specified as agnostic: 287 2. When masked and the policies are all specified as agnostic: [all …]
|
/freebsd/contrib/openpam/doc/man/ |
H A D | pam.man | 70 function enforces policies such as password expiry, account expiry,
|