/freebsd-11-stable/sys/compat/linux/ |
H A D | linux_misc.c | 1517 int error, policy; local 1522 args->pid, args->policy, (const void *)args->param); 1525 switch (args->policy) { 1527 policy = SCHED_OTHER; 1530 policy = SCHED_FIFO; 1533 policy = SCHED_RR; 1547 error = kern_sched_setscheduler(td, tdt, policy, &sched_param); 1557 int error, policy; local 1568 error = kern_sched_getscheduler(td, tdt, &policy); 1571 switch (policy) { [all...] |
/freebsd-11-stable/contrib/openbsm/bsm/ |
H A D | libbsm.h | 84 #define POLICY_CONTROL_ENTRY "policy" 818 ssize_t au_poltostr(int policy, size_t maxsize, char *buf); 819 int au_strtopol(const char *polstr, int *policy); 1314 int audit_get_policy(int *policy); 1315 int audit_set_policy(int *policy);
|
/freebsd-11-stable/crypto/openssl/crypto/ts/ |
H A D | ts.h | 150 policy TSAPolicyId, 376 int TS_REQ_set_policy_id(TS_REQ *a, ASN1_OBJECT *policy); 544 * Adds a new acceptable policy, only the default policy is accepted by 547 int TS_RESP_CTX_add_policy(TS_RESP_CTX *ctx, ASN1_OBJECT *policy); 624 /* Verify if the policy supplied by the user matches the policy of the TSA. */ 667 ASN1_OBJECT *policy; member in struct:TS_verify_ctx 703 * policy = policy fro [all...] |
/freebsd-11-stable/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/sys/ |
H A D | zfs_context.h | 82 #include <sys/policy.h>
|
/freebsd-11-stable/sys/dev/iwm/ |
H A D | if_iwm_time_event.c | 207 time_cmd.policy
|
/freebsd-11-stable/contrib/llvm-project/lldb/source/Plugins/Process/Darwin/ |
H A D | NativeThreadDarwin.cpp | 112 DNBLogThreaded("[%3u] #%3u tid: 0x%8.8" PRIx64 ", pc: 0x%16.16" PRIx64 ", sp: 0x%16.16" PRIx64 ", user: %d.%6.6d, system: %d.%6.6d, cpu: %2d, policy: %2d, run_state: %2d (%s), flags: %2d, suspend_count: %2d (current %2d), sleep_time: %d", 121 m_basic_info.policy,
|
/freebsd-11-stable/usr.sbin/inetd/ |
H A D | inetd.c | 104 * Comment lines that start with "#@" denote IPsec policy string, as described 106 * inetd.conf(8). To reset the policy, just use "#@" line. By default, 107 * there's no IPsec policy. 1425 syslog(LOG_ERR, "invalid security policy \"%s\"", 1442 syslog(LOG_ERR, "invalid security policy \"%s\"", 1456 syslog(LOG_ERR, "invalid security policy \"%s\"", 1618 char *policy; local 1628 policy = NULL; 1637 /* lines starting with #@ is not a comment, but the policy */ 1643 free(policy); [all...] |
/freebsd-11-stable/usr.sbin/ppp/ |
H A D | radius.c | 123 radius_policyname(int policy) argument 125 switch(policy) { 131 return NumStr(policy, NULL, 0); 593 r->mppe.policy = rad_cvt_int(data); 596 radius_policyname(r->mppe.policy)); 783 r->mppe.policy = 0; 1313 radius_policyname(r->mppe.policy));
|
H A D | mppe.c | 467 if (*fp->bundle->radius.cfg.file && fp->bundle->radius.mppe.policy) 468 return fp->bundle->radius.mppe.policy == MPPE_POLICY_REQUIRED ? 1 : 0;
|
/freebsd-11-stable/sys/net/ |
H A D | netisr.c | 60 * netisr supports several policy variations, represented by the 143 * Notice that changing the global policy could lead to short periods of 145 * the complexity of enforcing ordering during policy changes. Protocols can 146 * override the global policy (when they're not doing that, they select 155 "netisr dispatch policy"); 754 * dispatch policy to use. 770 * checking the protocol's policy, and optionally call out to the protocol 778 u_int policy; local 792 * What happens next depends on the policy selected by the protocol. 796 policy [all...] |
/freebsd-11-stable/contrib/netcat/ |
H A D | netcat.c | 1321 \t-e policy Use specified IPsec policy\n"); 1358 add_ipsec_policy(int s, int af, char *policy) argument 1363 raw = ipsec_set_policy(policy, strlen(policy)); 1365 errx(1, "ipsec_set_policy `%s': %s", policy, 1374 err(1, "ipsec policy cannot be configured"); 1377 fprintf(stderr, "ipsec policy configured: `%s'\n", policy); 1387 "usage: nc [-46DdEFhklNnrStUuvz] [-e policy] [ [all...] |
/freebsd-11-stable/contrib/llvm-project/compiler-rt/include/sanitizer/ |
H A D | linux_syscall_hooks.h | 252 #define __sanitizer_syscall_pre_sched_setscheduler(pid, policy, param) \ 253 __sanitizer_syscall_pre_impl_sched_setscheduler((long)(pid), (long)(policy), \ 255 #define __sanitizer_syscall_post_sched_setscheduler(res, pid, policy, param) \ 257 res, (long)(pid), (long)(policy), (long)(param)) 288 #define __sanitizer_syscall_pre_sched_get_priority_max(policy) \ 289 __sanitizer_syscall_pre_impl_sched_get_priority_max((long)(policy)) 290 #define __sanitizer_syscall_post_sched_get_priority_max(res, policy) \ 291 __sanitizer_syscall_post_impl_sched_get_priority_max(res, (long)(policy)) 292 #define __sanitizer_syscall_pre_sched_get_priority_min(policy) \ 293 __sanitizer_syscall_pre_impl_sched_get_priority_min((long)(policy)) [all...] |
/freebsd-11-stable/crypto/openssl/crypto/x509/ |
H A D | x509_vpm.c | 420 ASN1_OBJECT *policy) 427 if (!sk_ASN1_OBJECT_push(param->policies, policy)) 419 X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) argument
|
/freebsd-11-stable/sys/netipsec/ |
H A D | ipsec_pcb.c | 55 MALLOC_DEFINE(M_IPSEC_INPCB, "inpcbpolicy", "inpcb-resident ipsec policy"); 152 /* Initialize PCB policy. */ 167 /* Delete PCB policy. */ 186 /* Deep-copy a policy in PCB. */ 203 dst->policy = src->policy; 225 * Copy IPsec policy from old INPCB into new. 291 * Privileged sockets are allowed to set own security policy 293 * have ENTRUST policy. 327 /* We just use NULL pointer for ENTRUST policy */ [all...] |
H A D | ipsec.h | 84 u_int policy; /* policy_type per pfkeyv2.h */ member in struct:secpolicy 91 uint32_t priority; /* priority of this policy */ 95 * the policy can be used without limitiation if both lifetime and 100 time_t created; /* time created the policy */ 102 long lifetime; /* duration of the lifetime of this policy */ 103 long validtime; /* duration this policy is valid without use */ 111 * When application sets BYPASS or IPSEC type policy, the flags field 113 * used security policy into the sp_in/sp_out pointer to speed up further 155 * Direction of security policy. 191 * if security policy leve [all...] |
/freebsd-11-stable/usr.sbin/nscd/ |
H A D | config.c | 213 positive_params.policy = CPT_LRU; 221 negative_params.policy = CPT_FIFO;
|
/freebsd-11-stable/usr.bin/netstat/ |
H A D | netisr.c | 82 netisr_dispatch_policy_to_string(u_int policy, char *buf, argument 87 switch (policy) { 403 xo_emit(" {:policy-type/%6s}", 409 xo_emit(" {:policy/%8s}", tmp); 474 "Dispatch policy", dispatch_policy, "n/a");
|
/freebsd-11-stable/crypto/heimdal/lib/kadm5/ |
H A D | create_s.c | 72 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default"))
|
/freebsd-11-stable/lib/libsysdecode/ |
H A D | flags.c | 786 sysdecode_scheduler_policy(int policy) argument 789 return (lookup_value(schedpolicy, policy)); 1201 sysdecode_sctp_pr_policy(int policy) argument 1204 return (lookup_value(sctpprpolicy, policy));
|
/freebsd-11-stable/etc/rc.d/ |
H A D | sendmail | 89 policy = policy_anything
|
/freebsd-11-stable/cddl/contrib/opensolaris/cmd/zpool/ |
H A D | zpool_main.c | 2307 nvlist_t *policy = NULL; local 2443 /* In the future, we can capture further policy and include it here */ 2444 if (nvlist_alloc(&policy, NV_UNIQUE_NAME, 0) != 0 || 2445 nvlist_add_uint64(policy, ZPOOL_LOAD_REQUEST_TXG, txg) != 0 || 2446 nvlist_add_uint32(policy, ZPOOL_LOAD_REWIND_POLICY, 2477 nvlist_free(policy); 2518 idata.policy = policy; 2548 nvlist_free(policy); 2573 policy) 4010 nvlist_t *policy = NULL; local [all...] |
/freebsd-11-stable/usr.sbin/traceroute6/ |
H A D | traceroute6.c | 302 int setpolicy(int so, char *policy); 1043 setpolicy(so, policy) 1045 char *policy; 1049 buf = ipsec_set_policy(policy, strlen(policy));
|
/freebsd-11-stable/sys/cddl/contrib/opensolaris/uts/common/fs/zfs/ |
H A D | spa.c | 2122 zpool_load_policy_t policy; local 2126 zpool_get_load_policy(spa->spa_config, &policy); 2128 if (policy.zlp_rewind & ZPOOL_NEVER_REWIND) 2167 (!error && sle.sle_meta_count <= policy.zlp_maxmeta && 2168 sle.sle_data_count <= policy.zlp_maxdata)) { 2792 nvlist_t *nv, *mos_config, *policy; local 2844 * best effort policy. 2877 &policy) == 0) 2878 fnvlist_add_nvlist(mos_config, ZPOOL_LOAD_POLICY, policy); 4142 zpool_load_policy_t policy; local 4234 spa_open_rewind(const char *name, spa_t **spapp, void *tag, nvlist_t *policy, nvlist_t **config) argument 5401 zpool_load_policy_t policy; local 5592 zpool_load_policy_t policy; local [all...] |
/freebsd-11-stable/sys/netinet/ |
H A D | sctp_usrreq.c | 3652 uint16_t policy; local 3658 policy = sprstat->sprstat_policy; 3662 (policy != SCTP_PR_SCTP_NONE) && 3663 ((policy <= SCTP_PR_SCTP_MAX) || 3664 (policy == SCTP_PR_SCTP_ALL))) { 3665 if (policy == SCTP_PR_SCTP_ALL) { 3669 sprstat->sprstat_abandoned_unsent = stcb->asoc.strmout[sid].abandoned_unsent[policy]; 3670 sprstat->sprstat_abandoned_sent = stcb->asoc.strmout[sid].abandoned_sent[policy]; 3675 (policy == SCTP_PR_SCTP_ALL)) { 3694 uint16_t policy; local 6243 uint16_t policy; local [all...] |
/freebsd-11-stable/crypto/heimdal/kadmin/ |
H A D | get.c | 62 { "policy", KADM5_POLICY, 0, 0, "Policy", "Policy", 0 }, 223 if(princ->policy != NULL) 224 strlcpy(buf, princ->policy, buf_len);
|