/freebsd/usr.sbin/nscd/ |
H A D | cachelib.c | 253 free(common_entry->policies); in destroy_cache_entry() 311 policy = common_entry->policies[i]; in clear_cache_entry() 434 policy = common_entry->policies[0]; in flush_cache_entry() 593 new_common_entry->policies[1] = in register_cache_entry() 597 new_common_entry->policies[1] = in register_cache_entry() 748 common_entry->policies[1], in cache_read() 755 common_entry->policies[0], in cache_read() 777 common_entry->policies[0]->update_item_func(common_entry->policies[0], in cache_read() 886 common_entry->policies[0]->add_item_func(common_entry->policies[0], in cache_write() 1218 common_entry->policies[0], in transform_cache_entry_part() [all …]
|
H A D | cachelib.h | 145 struct cache_policy_ **policies; member
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | x509_vpm.c | 190 if (test_x509_verify_param_copy(policies, NULL)) { in X509_VERIFY_PARAM_inherit() 335 if (param->policies == NULL) { in X509_VERIFY_PARAM_add0_policy() 336 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_add0_policy() 337 if (param->policies == NULL) in X509_VERIFY_PARAM_add0_policy() 341 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) in X509_VERIFY_PARAM_add0_policy() 358 if (policies == NULL) { in X509_VERIFY_PARAM_set1_policies() 359 param->policies = NULL; in X509_VERIFY_PARAM_set1_policies() 363 param->policies = sk_ASN1_OBJECT_new_null(); in X509_VERIFY_PARAM_set1_policies() 364 if (param->policies == NULL) in X509_VERIFY_PARAM_set1_policies() 367 for (i = 0; i < sk_ASN1_OBJECT_num(policies); i++) { in X509_VERIFY_PARAM_set1_policies() [all …]
|
H A D | pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) in policy_cache_create() argument 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) in policy_cache_create() 42 policy = sk_POLICYINFO_value(policies, i); in policy_cache_create() 73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); in policy_cache_create()
|
H A D | x509_local.h | 30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */
|
/freebsd/contrib/googletest/docs/ |
H A D | platforms.md | 4 [Foundational C++ Support Policy](https://opensource.google/documentation/policies/cplusplus-suppor… 6 [this table](https://github.com/google/oss-policies-info/blob/main/foundational-cxx-support-matrix.…
|
/freebsd/crypto/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); in TS_RESP_CTX_free() 210 if (ctx->policies == NULL in TS_RESP_CTX_add_policy() 211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) in TS_RESP_CTX_add_policy() 215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) in TS_RESP_CTX_add_policy() 512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { in ts_RESP_get_policy() 513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i); in ts_RESP_get_policy()
|
H A D | ts_conf.c | 317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); in TS_CONF_set_policies() local 320 if (policies && (list = X509V3_parse_list(policies)) == NULL) { in TS_CONF_set_policies()
|
H A D | ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
|
/freebsd/contrib/openpam/ |
H A D | RELNOTES | 16 - A test application (pamtest) which can be used to test policies and
|
/freebsd/bin/cpuset/ |
H A D | cpuset.c | 77 static struct numa_policy policies[] = { variable 201 for (policy = &policies[0]; policy->name != NULL; policy++) { in parsedomainlist()
|
/freebsd/crypto/openssl/test/ |
H A D | CAtsa.cnf | 137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional) 163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
/freebsd/crypto/openssl/crypto/cmp/ |
H A D | cmp_ctx.c | 226 sk_POLICYINFO_pop_free(ctx->policies, POLICYINFO_free); in OSSL_CMP_CTX_free() 558 if (ctx->policies == NULL in OSSL_CMP_CTX_push0_policy() 559 && (ctx->policies = CERTIFICATEPOLICIES_new()) == NULL) in OSSL_CMP_CTX_push0_policy() 562 return sk_POLICYINFO_push(ctx->policies, pinfo); in OSSL_CMP_CTX_push0_policy()
|
/freebsd/contrib/libcxxrt/ |
H A D | LICENSE | 14 …e of the authors and should not be interpreted as representing official policies, either expressed…
|
/freebsd/contrib/libcbor/doc/source/api/ |
H A D | item_reference_counting.rst | 13 or if you want to implement custom policies (e.g. tighter restrictions on the amount of allocated m…
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OSSL_CMP_MSG_get0_header.pod | 93 Finally, policies are overridden by any policies included in I<ctx> via
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 46 STACK_OF(ASN1_OBJECT) *policies); 106 by default) and sets the acceptable policy set to B<policies>. Any existing 107 policy set is cleared. The B<policies> parameter can be B<NULL> to clear
|
/freebsd/crypto/openssl/ |
H A D | CONTRIBUTING.md | 43 [Contributor License Agreement]: <https://www.openssl.org/policies/cla.html> 79 [coding style]: https://www.openssl.org/policies/technical/coding-style.html
|
/freebsd/crypto/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | test.cnf | 10 policies = certificatePolicies
|
/freebsd/tools/tools/sysdoc/ |
H A D | tunables.mdoc | 1709 Enforce MAC policies for file system accesses. 1715 Enforce MAC policies on 1722 Enforce MAC policies on network interfaces. 1728 Enforce MAC policies on pipes. 1734 Enforce MAC policies between system processes 1743 Enforce MAC policies on sockets. 1749 Enforce MAC policies on system-related items 1759 Enforce MAC policies on 1870 NOTE: MAC security policies may not override other security system policies
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | proxy-certificates.pod | 99 The string is then a filename. This is useful for policies that are 106 application to interpret and combine these policies.> 133 To interpret proxy policies, the application would normally start with
|
/freebsd/crypto/openssl/doc/HOWTO/ |
H A D | certificates.txt | 48 policies). A certificate request is sent to a certificate authority 66 policies) and usually waits for payment from you. Once that is
|
/freebsd/contrib/googletest/ |
H A D | README.md | 92 [Foundational C++ Support Policy](https://opensource.google/documentation/policies/cplusplus-suppor… 94 [this table](https://github.com/google/oss-policies-info/blob/main/foundational-cxx-support-matrix.…
|
/freebsd/contrib/llvm-project/clang/include/clang/Basic/ |
H A D | riscv_vector.td | 252 1. When unmasked and the policies are all specified as agnostic: 254 2. When masked and the policies are all specified as agnostic: 259 4. When masked and one of the policies is specified as undisturbed: 268 1. When unmasked and the policies are all specified as agnostic: 270 2. When masked and the policies are all specified as agnostic: 275 4. When masked and one of the policies is specified as undisturbed: 281 1. When unmasked and the policies are all specified as agnostic: 283 2. When masked and the policies are all specified as agnostic: 288 4. When masked and one of the policies is specified as undisturbed: 293 1. When unmasked and the policies are all specified as agnostic: [all …]
|
/freebsd/contrib/openpam/doc/man/ |
H A D | pam.man | 70 function enforces policies such as password expiry, account expiry,
|