/netbsd-6-1-5-RELEASE/sys/compat/linux32/common/ |
H A D | linux32_sched.c | 111 syscallarg(int) policy; 117 NETBSD32TO64_UAP(policy); 179 syscallarg(int) policy; 184 NETBSD32TO64_UAP(policy); 192 syscallarg(int) policy; 197 NETBSD32TO64_UAP(policy);
|
/netbsd-6-1-5-RELEASE/sys/net80211/ |
H A D | ieee80211_acl.c | 45 * if the frame should be accepted or rejected. If the policy is 239 acl_setpolicy(struct ieee80211com *ic, int policy) argument 244 "ACL: set policy to %u\n", policy); 246 switch (policy) {
|
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/setkey/ |
H A D | parse.y | 883 char *policy; 888 policy = ipsec_set_policy($2.buf, $2.len); 889 if (policy == NULL) { 894 $$.buf = policy; 895 $$.len = ipsec_get_policylen(policy); 939 setkeymsg_spdaddr(type, upper, policy, srcs, splen, dsts, dplen) 942 vchar_t *policy; 973 memcpy(buf + l, policy->buf, policy->len); 974 l += policy [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ts/ |
H A D | ts_conf.c | 303 const char *policy, TS_RESP_CTX *ctx) 307 if (!policy) 308 policy = NCONF_get_string(conf, section, 310 if (!policy) 315 if (!(policy_obj = OBJ_txt2obj(policy, 0))) 337 /* If no other policy is specified, that's fine. */ 302 TS_CONF_set_def_policy(CONF *conf, const char *section, const char *policy, TS_RESP_CTX *ctx) argument
|
H A D | ts.h | 152 policy TSAPolicyId, 384 int TS_REQ_set_policy_id(TS_REQ *a, ASN1_OBJECT *policy); 550 /* Adds a new acceptable policy, only the default policy 552 int TS_RESP_CTX_add_policy(TS_RESP_CTX *ctx, ASN1_OBJECT *policy); 620 /* Verify if the policy supplied by the user matches the policy of the TSA. */ 662 ASN1_OBJECT *policy; member in struct:TS_verify_ctx 700 * policy = policy fro [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | obj_tpm.c | 45 /* add usage policy */ 47 &tpm->policy))) { 94 tpm->policy = hPolicy; 124 *phPolicy = tpm->policy; 473 if (tpm->policy == hPolicy) 474 tpm->policy = NULL_HPOLICY;
|
H A D | obj_context.c | 62 /* Add the default policy */ 63 if ((result = obj_policy_add(*phObject, TSS_POLICY_USAGE, &context->policy))) { 163 *phPolicy = context->policy; 341 struct tr_policy_obj *policy; local 349 policy = (struct tr_policy_obj *)obj->data; 350 if (policy->SecretMode == TSS_SECRET_MODE_POPUP) 422 obj_context_set_connection_policy(TSS_HCONTEXT tspContext, UINT32 policy) argument 427 switch (policy) { 441 context->connection_policy = policy;
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtp/ |
H A D | smtp_session.c | 40 /* verification. The resulting policy is stored into the 139 /* smtp_tls_list_init - initialize per-site policy lists */ 157 /* policy_name - printable tls policy level */ 176 * Look up a non-default policy. In case of multiple lookup results, the 179 * specific policy including NONE, otherwise we choose the stronger 198 msg_warn("Table %s: ignoring unknown TLS policy '%s' for %s %s", 204 /* tls_policy_lookup_one - look up destination TLS policy */ 211 char *policy; local 229 vstring_str(vstring_sprintf(cbuf, "TLS policy table, %s \"%s\"", \ 232 saved_policy = policy [all...] |
/netbsd-6-1-5-RELEASE/sys/netinet/ |
H A D | in_selsrc.c | 151 SYSCTL_DESCR("default source selection policy"), 290 * according to the source address-selection policy for this 459 * the default policy, increase the sequence number on the 460 * default policy, forcing routes that cache a source 461 * (rt_ifa) found by the default policy to refresh their 480 char policy[IN_SELECTSRC_LEN]; local 488 (error = in_get_selectsrc(iss, policy, sizeof(policy))) >= sizeof(policy)) 490 node.sysctl_data = &policy[ [all...] |
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/ |
H A D | policy.h | 1 /* $NetBSD: policy.h,v 1.7 2007/05/31 19:54:55 manu Exp $ */ 3 /* Id: policy.h,v 1.5 2004/06/11 16:00:17 ludvigm Exp */ 67 u_int32_t priority; /* priority for the policy */ 81 u_int policy; /* DISCARD, NONE or IPSEC, see keyv2.h */ member in struct:secpolicy 84 /* if policy == IPSEC else this value == NULL.*/
|
H A D | sockmisc.c | 602 char *policy; local 619 policy = "in bypass"; 620 buf = ipsec_set_policy(policy, strlen(policy)); 638 policy = "out bypass"; 639 buf = ipsec_set_policy(policy, strlen(policy));
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/ |
H A D | testtsa | 79 ../../util/shlib_wrap.sh ../../apps/openssl ts -query -data ../testtsa -policy tsa_policy1 -cert -out req1.tsq 85 ../../util/shlib_wrap.sh ../../apps/openssl ts -query -data ../testtsa -policy tsa_policy2 -no_nonce \
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/include/ |
H A D | obj_context.h | 30 TSS_HPOLICY policy; member in struct:tr_context_obj
|
H A D | obj_nv.h | 54 TSS_HPOLICY policy; member in struct:tr_nvstore_obj
|
/netbsd-6-1-5-RELEASE/usr.sbin/racoon/ |
H A D | Makefile | 16 grabmyaddr.c vendorid.c policy.c localconf.c \
|
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/libipsec/ |
H A D | policy_parse.y | 35 * IN/OUT bound policy configuration take place such below: 36 * in <priority> <policy> 37 * out <priority> <policy> 51 * <policy> is one of following: 623 caddr_t policy; 625 policy = policy_parse(msg, msglen); 626 if (policy == NULL) { 633 return policy;
|
H A D | pfkey.c | 909 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, 917 policy, policylen, seq)) < 0) 932 u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) 939 policy, policylen, seq)) < 0) 953 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, 961 policy, policylen, seq)) < 0) 976 u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) 983 policy, policylen, seq)) < 0) 997 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, 1010 policy, policyle 908 pfkey_send_spdadd(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 930 pfkey_send_spdadd2(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument 952 pfkey_send_spdupdate(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 974 pfkey_send_spdupdate2(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument 996 pfkey_send_spddelete(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 1057 pfkey_send_spdsetidx(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 1120 pfkey_send_migrate(int so, struct sockaddr *local, struct sockaddr *remote, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 1642 pfkey_send_x4(int so, u_int type, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, char *policy, int policylen, u_int32_t seq) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/x509/ |
H A D | x509_vpm.c | 260 int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) argument 268 if (!sk_ASN1_OBJECT_push(param->policies, policy))
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/tsiggss/ns1/ |
H A D | named.conf | 48 update-policy {
|
/netbsd-6-1-5-RELEASE/external/cddl/osnet/dist/lib/libdtrace/common/ |
H A D | dt_options.c | 730 dtrace_optval_t policy = DTRACEOPT_UNSET; local 738 policy = _dtrace_bufpolicies[i].dtbp_policy; 743 if (policy == DTRACEOPT_UNSET) 746 dtp->dt_options[DTRACEOPT_BUFPOLICY] = policy; 764 dtrace_optval_t policy = DTRACEOPT_UNSET; local 772 policy = _dtrace_bufresize[i].dtbr_policy; 777 if (policy == DTRACEOPT_UNSET) 780 dtp->dt_options[DTRACEOPT_BUFRESIZE] = policy;
|
/netbsd-6-1-5-RELEASE/sys/modules/solaris/ |
H A D | Makefile.solmod | 52 SRCS+= policy.c
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | ca.c | 129 #define ENV_POLICY "policy" 161 " -policy arg - The CA 'policy' to support\n", 201 STACK_OF(CONF_VALUE) *policy,CA_DB *db, 208 STACK_OF(CONF_VALUE) *policy, 216 STACK_OF(CONF_VALUE) *policy, 224 STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn, 268 char *policy=NULL; local 395 else if (strcmp(*argv,"-policy") == 0) 398 policy 1574 certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument 1647 certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, ENGINE *e) argument 1702 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, int verbose, X509_REQ *req, char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument 2268 certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy) argument [all...] |
/netbsd-6-1-5-RELEASE/usr.sbin/inetd/ |
H A D | inetd.c | 157 * Comment lines that start with "#@" denote IPsec policy string, as described 159 * inetd.conf(8). To reset the policy, just use "#@" line. By default, 160 * there's no IPsec policy. 1239 static char *policy = NULL; variable 1249 if (policy) 1250 free(policy); 1251 policy = NULL; 1287 /* lines starting with #@ is not a comment, but the policy */ 1293 if (policy) 1294 free(policy); [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/named/ |
H A D | query.c | 837 dns_rpz_policy_t policy, dns_rpz_type_t type, 851 dns_rpz_type2str(type), dns_rpz_policy2str(policy), 876 * Get a policy rewrite zone database. 3887 st->m.policy = DNS_RPZ_POLICY_MISS; 3891 * Get NS, A, or AAAA rrset for response policy zone checks. 3929 st->m.policy = DNS_RPZ_POLICY_ERROR; 3937 st->m.policy = DNS_RPZ_POLICY_ERROR; 3953 st->m.policy = DNS_RPZ_POLICY_ERROR; 4004 * the IP or NSIP response policy rules of a view. 4032 * Do not check policy zone 836 rpz_log_rewrite(ns_client_t *client, const char *disabled, dns_rpz_policy_t policy, dns_rpz_type_t type, dns_name_t *rpz_qname) argument 4170 dns_rpz_policy_t policy; local 4315 dns_rpz_policy_t policy; local [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/gdb/osf-share/ |
H A D | cma_tcb_defs.h | 164 cma_t_sched_policy policy; /* Scheduling policy of thread */ member in struct:CMA__T_TCB_SCHED
|