Searched refs:policy (Results 151 - 175 of 247) sorted by relevance

12345678910

/netbsd-6-1-5-RELEASE/sys/compat/linux32/common/
H A Dlinux32_sched.c111 syscallarg(int) policy;
117 NETBSD32TO64_UAP(policy);
179 syscallarg(int) policy;
184 NETBSD32TO64_UAP(policy);
192 syscallarg(int) policy;
197 NETBSD32TO64_UAP(policy);
/netbsd-6-1-5-RELEASE/sys/net80211/
H A Dieee80211_acl.c45 * if the frame should be accepted or rejected. If the policy is
239 acl_setpolicy(struct ieee80211com *ic, int policy) argument
244 "ACL: set policy to %u\n", policy);
246 switch (policy) {
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/setkey/
H A Dparse.y883 char *policy;
888 policy = ipsec_set_policy($2.buf, $2.len);
889 if (policy == NULL) {
894 $$.buf = policy;
895 $$.len = ipsec_get_policylen(policy);
939 setkeymsg_spdaddr(type, upper, policy, srcs, splen, dsts, dplen)
942 vchar_t *policy;
973 memcpy(buf + l, policy->buf, policy->len);
974 l += policy
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ts/
H A Dts_conf.c303 const char *policy, TS_RESP_CTX *ctx)
307 if (!policy)
308 policy = NCONF_get_string(conf, section,
310 if (!policy)
315 if (!(policy_obj = OBJ_txt2obj(policy, 0)))
337 /* If no other policy is specified, that's fine. */
302 TS_CONF_set_def_policy(CONF *conf, const char *section, const char *policy, TS_RESP_CTX *ctx) argument
H A Dts.h152 policy TSAPolicyId,
384 int TS_REQ_set_policy_id(TS_REQ *a, ASN1_OBJECT *policy);
550 /* Adds a new acceptable policy, only the default policy
552 int TS_RESP_CTX_add_policy(TS_RESP_CTX *ctx, ASN1_OBJECT *policy);
620 /* Verify if the policy supplied by the user matches the policy of the TSA. */
662 ASN1_OBJECT *policy; member in struct:TS_verify_ctx
700 * policy = policy fro
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/
H A Dobj_tpm.c45 /* add usage policy */
47 &tpm->policy))) {
94 tpm->policy = hPolicy;
124 *phPolicy = tpm->policy;
473 if (tpm->policy == hPolicy)
474 tpm->policy = NULL_HPOLICY;
H A Dobj_context.c62 /* Add the default policy */
63 if ((result = obj_policy_add(*phObject, TSS_POLICY_USAGE, &context->policy))) {
163 *phPolicy = context->policy;
341 struct tr_policy_obj *policy; local
349 policy = (struct tr_policy_obj *)obj->data;
350 if (policy->SecretMode == TSS_SECRET_MODE_POPUP)
422 obj_context_set_connection_policy(TSS_HCONTEXT tspContext, UINT32 policy) argument
427 switch (policy) {
441 context->connection_policy = policy;
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtp/
H A Dsmtp_session.c40 /* verification. The resulting policy is stored into the
139 /* smtp_tls_list_init - initialize per-site policy lists */
157 /* policy_name - printable tls policy level */
176 * Look up a non-default policy. In case of multiple lookup results, the
179 * specific policy including NONE, otherwise we choose the stronger
198 msg_warn("Table %s: ignoring unknown TLS policy '%s' for %s %s",
204 /* tls_policy_lookup_one - look up destination TLS policy */
211 char *policy; local
229 vstring_str(vstring_sprintf(cbuf, "TLS policy table, %s \"%s\"", \
232 saved_policy = policy
[all...]
/netbsd-6-1-5-RELEASE/sys/netinet/
H A Din_selsrc.c151 SYSCTL_DESCR("default source selection policy"),
290 * according to the source address-selection policy for this
459 * the default policy, increase the sequence number on the
460 * default policy, forcing routes that cache a source
461 * (rt_ifa) found by the default policy to refresh their
480 char policy[IN_SELECTSRC_LEN]; local
488 (error = in_get_selectsrc(iss, policy, sizeof(policy))) >= sizeof(policy))
490 node.sysctl_data = &policy[
[all...]
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/
H A Dpolicy.h1 /* $NetBSD: policy.h,v 1.7 2007/05/31 19:54:55 manu Exp $ */
3 /* Id: policy.h,v 1.5 2004/06/11 16:00:17 ludvigm Exp */
67 u_int32_t priority; /* priority for the policy */
81 u_int policy; /* DISCARD, NONE or IPSEC, see keyv2.h */ member in struct:secpolicy
84 /* if policy == IPSEC else this value == NULL.*/
H A Dsockmisc.c602 char *policy; local
619 policy = "in bypass";
620 buf = ipsec_set_policy(policy, strlen(policy));
638 policy = "out bypass";
639 buf = ipsec_set_policy(policy, strlen(policy));
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/
H A Dtesttsa79 ../../util/shlib_wrap.sh ../../apps/openssl ts -query -data ../testtsa -policy tsa_policy1 -cert -out req1.tsq
85 ../../util/shlib_wrap.sh ../../apps/openssl ts -query -data ../testtsa -policy tsa_policy2 -no_nonce \
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/include/
H A Dobj_context.h30 TSS_HPOLICY policy; member in struct:tr_context_obj
H A Dobj_nv.h54 TSS_HPOLICY policy; member in struct:tr_nvstore_obj
/netbsd-6-1-5-RELEASE/usr.sbin/racoon/
H A DMakefile16 grabmyaddr.c vendorid.c policy.c localconf.c \
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/libipsec/
H A Dpolicy_parse.y35 * IN/OUT bound policy configuration take place such below:
36 * in <priority> <policy>
37 * out <priority> <policy>
51 * <policy> is one of following:
623 caddr_t policy;
625 policy = policy_parse(msg, msglen);
626 if (policy == NULL) {
633 return policy;
H A Dpfkey.c909 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy,
917 policy, policylen, seq)) < 0)
932 u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq)
939 policy, policylen, seq)) < 0)
953 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy,
961 policy, policylen, seq)) < 0)
976 u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq)
983 policy, policylen, seq)) < 0)
997 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy,
1010 policy, policyle
908 pfkey_send_spdadd(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
930 pfkey_send_spdadd2(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument
952 pfkey_send_spdupdate(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
974 pfkey_send_spdupdate2(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument
996 pfkey_send_spddelete(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
1057 pfkey_send_spdsetidx(int so, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
1120 pfkey_send_migrate(int so, struct sockaddr *local, struct sockaddr *remote, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
1642 pfkey_send_x4(int so, u_int type, struct sockaddr *src, u_int prefs, struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, char *policy, int policylen, u_int32_t seq) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/x509/
H A Dx509_vpm.c260 int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) argument
268 if (!sk_ASN1_OBJECT_push(param->policies, policy))
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/tsiggss/ns1/
H A Dnamed.conf48 update-policy {
/netbsd-6-1-5-RELEASE/external/cddl/osnet/dist/lib/libdtrace/common/
H A Ddt_options.c730 dtrace_optval_t policy = DTRACEOPT_UNSET; local
738 policy = _dtrace_bufpolicies[i].dtbp_policy;
743 if (policy == DTRACEOPT_UNSET)
746 dtp->dt_options[DTRACEOPT_BUFPOLICY] = policy;
764 dtrace_optval_t policy = DTRACEOPT_UNSET; local
772 policy = _dtrace_bufresize[i].dtbr_policy;
777 if (policy == DTRACEOPT_UNSET)
780 dtp->dt_options[DTRACEOPT_BUFRESIZE] = policy;
/netbsd-6-1-5-RELEASE/sys/modules/solaris/
H A DMakefile.solmod52 SRCS+= policy.c
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/
H A Dca.c129 #define ENV_POLICY "policy"
161 " -policy arg - The CA 'policy' to support\n",
201 STACK_OF(CONF_VALUE) *policy,CA_DB *db,
208 STACK_OF(CONF_VALUE) *policy,
216 STACK_OF(CONF_VALUE) *policy,
224 STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn,
268 char *policy=NULL; local
395 else if (strcmp(*argv,"-policy") == 0)
398 policy
1574 certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument
1647 certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, ENGINE *e) argument
1702 do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, int batch, int verbose, X509_REQ *req, char *ext_sect, CONF *lconf, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy, int selfsign) argument
2268 certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst, STACK_OF(OPENSSL_STRING) *sigopts, STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate, long days, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt, unsigned long nameopt, int default_op, int ext_copy) argument
[all...]
/netbsd-6-1-5-RELEASE/usr.sbin/inetd/
H A Dinetd.c157 * Comment lines that start with "#@" denote IPsec policy string, as described
159 * inetd.conf(8). To reset the policy, just use "#@" line. By default,
160 * there's no IPsec policy.
1239 static char *policy = NULL; variable
1249 if (policy)
1250 free(policy);
1251 policy = NULL;
1287 /* lines starting with #@ is not a comment, but the policy */
1293 if (policy)
1294 free(policy);
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/named/
H A Dquery.c837 dns_rpz_policy_t policy, dns_rpz_type_t type,
851 dns_rpz_type2str(type), dns_rpz_policy2str(policy),
876 * Get a policy rewrite zone database.
3887 st->m.policy = DNS_RPZ_POLICY_MISS;
3891 * Get NS, A, or AAAA rrset for response policy zone checks.
3929 st->m.policy = DNS_RPZ_POLICY_ERROR;
3937 st->m.policy = DNS_RPZ_POLICY_ERROR;
3953 st->m.policy = DNS_RPZ_POLICY_ERROR;
4004 * the IP or NSIP response policy rules of a view.
4032 * Do not check policy zone
836 rpz_log_rewrite(ns_client_t *client, const char *disabled, dns_rpz_policy_t policy, dns_rpz_type_t type, dns_name_t *rpz_qname) argument
4170 dns_rpz_policy_t policy; local
4315 dns_rpz_policy_t policy; local
[all...]
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/gdb/osf-share/
H A Dcma_tcb_defs.h164 cma_t_sched_policy policy; /* Scheduling policy of thread */ member in struct:CMA__T_TCB_SCHED

Completed in 202 milliseconds

12345678910