| /src/sys/external/bsd/drm2/dist/drm/i915/gt/uc/ |
| intel_guc_ads.c | 19 * scheduling policies (guc_policies), a structure describing a collection of 32 static void guc_policies_init(struct guc_policies *policies) 37 policies->dpc_promote_time = POLICY_DEFAULT_DPC_PROMOTE_TIME_US; 38 policies->max_num_work_items = POLICY_MAX_NUM_WI; 42 policy = &policies->policy[p][i]; 48 policies->is_valid = 1; 65 struct guc_policies policies; member in struct:__guc_ads_blob 81 /* GuC scheduling policies */ 82 guc_policies_init(&blob->policies); 125 blob->ads.scheduler_policies = base + ptr_offset(blob, policies); [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| x509_vpm.c | 99 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 187 if (test_x509_verify_param_copy(policies, NULL)) { 188 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 337 if (param->policies == NULL) { 338 param->policies = sk_ASN1_OBJECT_new_null(); 339 if (param->policies == NULL) 343 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) 349 STACK_OF(ASN1_OBJECT) *policies) 358 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 360 if (policies == NULL) [all...] |
| pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) 42 policy = sk_POLICYINFO_value(policies, i); 75 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 107 * don't have any policies. 131 * no point continuing because the valid policies will be NULL.
|
| x509_local.h | 30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
|
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| x509_vpm.c | 102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 190 if (test_x509_verify_param_copy(policies, NULL)) { 191 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 335 if (param->policies == NULL) { 336 param->policies = sk_ASN1_OBJECT_new_null(); 337 if (param->policies == NULL) 341 if (sk_ASN1_OBJECT_push(param->policies, policy) <= 0) 347 STACK_OF(ASN1_OBJECT) *policies) 356 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 358 if (policies == NULL) [all...] |
| pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) 42 policy = sk_POLICYINFO_value(policies, i); 73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 107 * don't have any policies. 131 * no point continuing because the valid policies will be NULL.
|
| x509_local.h | 30 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509/ |
| x509_vpm.c | 102 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 197 if (test_x509_verify_param_copy(policies, NULL)) { 198 if (!X509_VERIFY_PARAM_set1_policies(dest, src->policies)) 335 if (!param->policies) { 336 param->policies = sk_ASN1_OBJECT_new_null(); 337 if (!param->policies) 340 if (!sk_ASN1_OBJECT_push(param->policies, policy)) 346 STACK_OF(ASN1_OBJECT) *policies) 353 sk_ASN1_OBJECT_pop_free(param->policies, ASN1_OBJECT_free); 355 if (!policies) { [all...] |
| x509_local.h | 27 STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ member in struct:X509_VERIFY_PARAM_st
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/ |
| pcy_cache.c | 27 CERTIFICATEPOLICIES *policies, int crit) 34 if ((num = sk_POLICYINFO_num(policies)) <= 0) 42 policy = sk_POLICYINFO_value(policies, i); 73 sk_POLICYINFO_pop_free(policies, POLICYINFO_free); 107 * don't have any policies. 131 * no point continuing because the valid policies will be NULL.
|
| /src/external/mpl/bind/dist/bin/tests/system/checkconf/ |
| bad-kasp-keystore2.conf | 15 * Both policies use the same key-store. Should fail because the same zone in 16 * different views is using different DNSSEC policies.
|
| bad-kasp-keydir-vs-keystore1.conf | 15 * The same zone in different views is using different DNSSEC policies, so it
|
| bad-kasp-keydir-vs-keystore2.conf | 18 * different DNSSEC policies.
|
| bad-kasp-keydir-vs-keystore3.conf | 18 * DNSSEC policies and should thus use different key directories.
|
| bad-kasp-keystore1.conf | 15 * The same zone in different views is using different DNSSEC policies, so it
|
| /src/crypto/external/apache2/openssl/dist/crypto/ts/ |
| ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx 108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|
| ts_conf.c | 329 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); local 332 if (policies && (list = X509V3_parse_list(policies)) == NULL) {
|
| ts_rsp_sign.c | 129 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); 193 if (ctx->policies == NULL 194 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) { 202 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) { 500 /* Returns the TSA policy based on the requested and acceptable policies. */ 515 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { 516 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i);
|
| /src/crypto/external/bsd/openssl/dist/crypto/ts/ |
| ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx 108 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|
| ts_conf.c | 317 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); local 320 if (policies && (list = X509V3_parse_list(policies)) == NULL) {
|
| ts_rsp_sign.c | 151 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); 210 if (ctx->policies == NULL 211 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) 215 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) 497 /* Returns the TSA policy based on the requested and acceptable policies. */ 512 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { 513 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ts/ |
| ts_local.h | 126 * policies SEQUENCE OF PolicyInformation OPTIONAL 152 * policies SEQUENCE OF PolicyInformation OPTIONAL 168 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ member in struct:TS_resp_ctx 169 ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
|
| ts_conf.c | 310 char *policies = NCONF_get_string(conf, section, ENV_OTHER_POLICIES); local 313 if (policies && (list = X509V3_parse_list(policies)) == NULL) {
|
| ts_rsp_sign.c | 148 sk_ASN1_OBJECT_pop_free(ctx->policies, ASN1_OBJECT_free); 215 if (ctx->policies == NULL 216 && (ctx->policies = sk_ASN1_OBJECT_new_null()) == NULL) 220 if (!sk_ASN1_OBJECT_push(ctx->policies, copy)) 502 /* Returns the TSA policy based on the requested and acceptable policies. */ 517 for (i = 0; !policy && i < sk_ASN1_OBJECT_num(ctx->policies); ++i) { 518 ASN1_OBJECT *current = sk_ASN1_OBJECT_value(ctx->policies, i);
|
| /src/crypto/dist/ipsec-tools/rpm/suse/ |
| ipsec-tools.spec.in | 39 - setkey, a program to directly manipulate policies and SAs
|