HomeSort by: relevance | last modified time | path
    Searched refs:policies (Results 1 - 25 of 45) sorted by relevancy

1 2

  /src/sys/external/bsd/drm2/dist/drm/i915/gt/uc/
intel_guc_ads.c 19 * scheduling policies (guc_policies), a structure describing a collection of
32 static void guc_policies_init(struct guc_policies *policies)
37 policies->dpc_promote_time = POLICY_DEFAULT_DPC_PROMOTE_TIME_US;
38 policies->max_num_work_items = POLICY_MAX_NUM_WI;
42 policy = &policies->policy[p][i];
48 policies->is_valid = 1;
65 struct guc_policies policies; member in struct:__guc_ads_blob
81 /* GuC scheduling policies */
82 guc_policies_init(&blob->policies);
125 blob->ads.scheduler_policies = base + ptr_offset(blob, policies);
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/x509/
x509_vpm.c 99 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
187 if (test_x509_verify_param_copy(policies, NULL)) {
188 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies))
337 if (param->policies == NULL) {
338 param->policies = sk_ASN1_OBJECT_new_null();
339 if (param->policies == NULL)
343 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0)
349 STACK_OF(ASN1_OBJECT) *policies)
358 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
360 if (policies == NULL)
    [all...]
pcy_cache.c 27 CERTIFICATEPOLICIES *policies, int crit)
34 if ((num = sk_POLICYINFO_num(policies)) <= 0)
42 policy = sk_POLICYINFO_value(policies, i);
75 sk_POLICYINFO_pop_free(policies, POLICYINFO_free);
107 * don't have any policies.
131 * no point continuing because the valid policies will be NULL.
x509_local.h 30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
  /src/crypto/external/bsd/openssl/dist/crypto/x509/
x509_vpm.c 102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
190 if (test_x509_verify_param_copy(policies, NULL)) {
191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies))
335 if (param->policies == NULL) {
336 param->policies = sk_ASN1_OBJECT_new_null();
337 if (param->policies == NULL)
341 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0)
347 STACK_OF(ASN1_OBJECT) *policies)
356 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
358 if (policies == NULL)
    [all...]
pcy_cache.c 27 CERTIFICATEPOLICIES *policies, int crit)
34 if ((num = sk_POLICYINFO_num(policies)) <= 0)
42 policy = sk_POLICYINFO_value(policies, i);
73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free);
107 * don't have any policies.
131 * no point continuing because the valid policies will be NULL.
x509_local.h 30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509/
x509_vpm.c 102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
197 if (test_x509_verify_param_copy(policies, NULL)) {
198 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies))
335 if (!param->policies) {
336 param->policies = sk_ASN1_OBJECT_new_null();
337 if (!param->policies)
340 if (!sk_ASN1_OBJECT_push(param->policies, policy))
346 STACK_OF(ASN1_OBJECT) *policies)
353 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free);
355 if (!policies) {
    [all...]
x509_local.h 27 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/
pcy_cache.c 27 CERTIFICATEPOLICIES *policies, int crit)
34 if ((num = sk_POLICYINFO_num(policies)) <= 0)
42 policy = sk_POLICYINFO_value(policies, i);
73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free);
107 * don't have any policies.
131 * no point continuing because the valid policies will be NULL.
  /src/external/mpl/bind/dist/bin/tests/system/checkconf/
bad-kasp-keystore2.conf 15 * Both policies use the same key-store. Should fail because the same zone in
16 * different views is using different DNSSEC policies.
bad-kasp-keydir-vs-keystore1.conf 15 * The same zone in different views is using different DNSSEC policies, so it
bad-kasp-keydir-vs-keystore2.conf 18 * different DNSSEC policies.
bad-kasp-keydir-vs-keystore3.conf 18 * DNSSEC policies and should thus use different key directories.
bad-kasp-keystore1.conf 15 * The same zone in different views is using different DNSSEC policies, so it
  /src/crypto/external/apache2/openssl/dist/crypto/ts/
ts_local.h 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx
108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
ts_conf.c 329 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); local
332 if (policies && (list = X509V3_parse_list(policies)) == NULL) {
ts_rsp_sign.c 129 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free);
193 if (ctx->policies == NULL
194 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) {
202 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) {
500 /* Returns the TSA policy based on the requested and acceptable policies. */
515 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) {
516 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i);
  /src/crypto/external/bsd/openssl/dist/crypto/ts/
ts_local.h 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx
108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
ts_conf.c 317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); local
320 if (policies && (list = X509V3_parse_list(policies)) == NULL) {
ts_rsp_sign.c 151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free);
210 if (ctx->policies == NULL
211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL)
215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy))
497 /* Returns the TSA policy based on the requested and acceptable policies. */
512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) {
513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i);
  /src/crypto/external/bsd/openssl.old/dist/crypto/ts/
ts_local.h 126 * policies SEQUENCE OF PolicyInformation OPTIONAL
152 * policies SEQUENCE OF PolicyInformation OPTIONAL
168 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx
169 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
ts_conf.c 310 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); local
313 if (policies && (list = X509V3_parse_list(policies)) == NULL) {
ts_rsp_sign.c 148 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free);
215 if (ctx->policies == NULL
216 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL)
220 if (!sk_ASN1_OBJECT_push(ctx->policies, copy))
502 /* Returns the TSA policy based on the requested and acceptable policies. */
517 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) {
518 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i);
  /src/crypto/dist/ipsec-tools/rpm/suse/
ipsec-tools.spec.in 39 - setkey, a program to directly manipulate policies and SAs

Completed in 41 milliseconds

1 2