Searched refs:rule (Results 26 - 50 of 105) sorted by relevance

12345

/freebsd-13-stable/sys/dev/mlx5/
H A Dfs.h149 /* Single destination per rule.
163 typedef int (*rule_event_fn)(struct mlx5_flow_rule *rule,
176 int mlx5_set_rule_private_data(struct mlx5_flow_rule *rule, struct
193 struct mlx5_flow_rule *rule);
196 struct mlx5_flow_rule *rule);
198 u8 mlx5_get_match_criteria_enable(struct mlx5_flow_rule *rule);
/freebsd-13-stable/sys/netpfil/ipfw/
H A Dip_fw_eaction.c64 * the search continues to the next rule. If it has non zero value,
281 * will be decremented on rule deletion, thus we
376 ipfw_reset_eaction(struct ip_fw_chain *ch, struct ip_fw *rule, argument
389 cmd = ipfw_get_action(rule);
395 * to truncate the rule length.
398 * and rule length should be enough to keep O_EXTERNAL_INSTANCE
401 l = rule->cmd + rule->cmd_len - cmd;
414 EACTION_DEBUG("truncate rule %d: len %u -> %u",
415 rule
[all...]
H A Dip_fw_dynamic.c107 * Each state holds a pointer to the parent ipfw rule so we know what
108 * action to perform. Dynamic rules are removed when the parent rule is
131 void *parent; /* pointer to parent rule */
133 uint32_t f_pos; /* cached rule index */
139 uint16_t rulenum; /* parent rule number */
140 uint32_t ruleid; /* parent rule id */
162 void *parent; /* pointer to parent rule */
165 uint16_t rulenum; /* parent rule number */
166 uint32_t ruleid; /* parent rule id */
352 * seconds of lifetime of a rule
782 hash_parent(const struct ipfw_flow_id *id, const void *rule) argument
878 hash_parent(const struct ipfw_flow_id *id, const void *rule) argument
1112 dyn_lookup_ipv4_parent(const struct ipfw_flow_id *pkt, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t hashval) argument
1148 dyn_lookup_ipv4_parent_locked(const struct ipfw_flow_id *pkt, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t bucket) argument
1261 dyn_lookup_ipv6_parent(const struct ipfw_flow_id *pkt, uint32_t zoneid, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t hashval) argument
1298 dyn_lookup_ipv6_parent_locked(const struct ipfw_flow_id *pkt, uint32_t zoneid, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t bucket) argument
1334 struct ip_fw *rule; local
1537 dyn_add_ipv4_parent(void *rule, uint32_t ruleid, uint16_t rulenum, const struct ipfw_flow_id *pkt, uint32_t hashval, uint32_t version, uint16_t kidx) argument
1668 dyn_add_ipv6_parent(void *rule, uint32_t ruleid, uint16_t rulenum, const struct ipfw_flow_id *pkt, uint32_t zoneid, uint32_t hashval, uint32_t version, uint16_t kidx) argument
1771 dyn_get_parent_state(const struct ipfw_flow_id *pkt, uint32_t zoneid, struct ip_fw *rule, uint32_t hashval, uint32_t limit, uint16_t kidx) argument
1863 dyn_install_state(const struct ipfw_flow_id *pkt, uint32_t zoneid, uint16_t fibnum, const void *ulp, int pktlen, struct ip_fw *rule, struct ipfw_dyn_info *info, uint32_t limit, uint16_t limit_mask, uint16_t kidx, uint8_t type) argument
1988 ipfw_dyn_install_state(struct ip_fw_chain *chain, struct ip_fw *rule, const ipfw_insn_limit *cmd, const struct ip_fw_args *args, const void *ulp, int pktlen, struct ipfw_dyn_info *info, uint32_t tablearg) argument
2133 dyn_acquire_rule(struct ip_fw_chain *ch, struct dyn_data *data, struct ip_fw *rule, uint16_t kidx) argument
2160 dyn_release_rule(struct ip_fw_chain *ch, struct dyn_data *data, struct ip_fw *rule, uint16_t kidx) argument
2190 struct ip_fw *rule; local
2215 struct ip_fw *rule; local
2249 void *rule; local
2830 struct ip_fw *rule; local
2911 ipfw_is_dyn_rule(struct ip_fw *rule) argument
3004 struct ip_fw *rule; local
3036 struct ip_fw *rule; local
[all...]
H A Dip_fw2.c120 "struct ip_fw *" /* rule */);
158 * Each rule belongs to one of 32 different sets (0..31).
161 * are disabled. Set RESVD_SET(31) is reserved for the default rule
212 "The default/max possible rule number.");
223 "Make the default rule accept all packets.");
1215 * Helper function to set args with info on the rule after the matching
1223 args->rule.chain_id = chain->id;
1224 args->rule.slot = slot + 1; /* we use 0 as a marker */
1225 args->rule.rule_id = 1 + chain->map[slot]->id;
1226 args->rule
3258 struct ip_fw *rule = chain->map[f_pos]; local
3405 struct ip_fw *rule = NULL; local
[all...]
/freebsd-13-stable/tests/sys/mac/bsdextended/
H A Dugidfw_test.c52 * rule<->string routines to confirm they work approximately as desired.
149 struct mac_bsdextended_rule rule; local
172 error = bsde_parse_rule_string(test_strings[i], &rule,
181 error = bsde_rule_to_string(&rule, rulestr, sizeof(rulestr));
183 printf("not ok %d # bsde_rule_to_string: rule for '%s' "
232 * policy for basic state. We want the rule count to be 0 before
/freebsd-13-stable/sbin/pfctl/
H A Dpfctl.c947 pfctl_print_rule_counters(struct pfctl_rule *rule, int opts) argument
956 if (rule->skip[i].nr == rule->nr + 1)
959 if (rule->skip[i].nr == -1)
962 printf("%u ", rule->skip[i].nr);
967 rule->qname, rule->qid, rule->pqname, rule->pqid);
972 (unsigned long long)rule
999 struct pfctl_rule rule; local
1154 struct pfctl_rule rule; local
1367 struct pfctl_rule *rule; local
[all...]
/freebsd-13-stable/contrib/netbsd-tests/ipf/
H A Dt_filter_exec.sh49 { while read rule; do
50 atf_check -x "echo \"$rule\" | ipftest -F \
101 { while read rule; do
102 atf_check -o save:save -x "echo \"$rule\" | \
H A Dt_nat_exec.sh53 { while read rule; do
55 "echo \"$rule\" | ipftest $format -RDbN - -i in $args"
H A Dt_nat_ipf_exec.sh55 { while read rule; do
56 atf_check -o save:save -x "echo \"$rule\" | \
/freebsd-13-stable/usr.sbin/ppp/
H A Dfilter.h49 * There's a struct filterent for each possible filter rule. The
77 /* f_action values [0..MAXFILTERS) specify the next filter rule, others are: */
83 struct filterent rule[MAXFILTERS]; /* incoming packet filter */ member in struct:filter
/freebsd-13-stable/share/dtrace/
H A Dipfw.d188 slot = (p->flags & IPFW_ARGS_REF) ? p->rule.slot : 0;
189 rulenum = (p->flags & IPFW_ARGS_REF) ? p->rule.rulenum : 0;
190 rule_id = (p->flags & IPFW_ARGS_REF) ? p->rule.rule_id : 0;
191 chain_id = (p->flags & IPFW_ARGS_REF) ? p->rule.chain_id : 0;
192 match_info = (p->flags & IPFW_ARGS_REF) ? p->rule.info : 0;
/freebsd-13-stable/contrib/subversion/subversion/libsvn_subr/
H A Ddate.c30 /* Valid rule actions */
47 typedef struct rule struct
49 char key; /* The template char that this rule matches */
50 const char *valid; /* String of valid chars for this rule */
51 enum rule_action action; /* What action to take when the rule is matched */
55 } rule; typedef in typeref:struct:rule
68 should be processed, using a rule for each valid symbol. */
69 static const rule
93 /* Return the rule associated with TCHAR, or NULL if there
94 is no such rule
[all...]
/freebsd-13-stable/sys/dev/mlx4/mlx4_core/
H A Dmlx4_mcg.c803 mlx4_err(dev, "Invalid network rule id. id = %d\n", id);
830 mlx4_err(dev, "Invalid network rule id. id = %d\n", id);
903 struct mlx4_net_trans_rule *rule)
913 rule->port, rule->priority, rule->qpn);
915 list_for_each_entry(cur, &rule->list, list) {
980 mlx4_err(dev, "Network rule error message was truncated, print buffer is too small\n");
984 struct mlx4_net_trans_rule *rule, u64 *reg_id)
995 trans_rule_ctrl_to_hw(rule, mailbo
902 mlx4_err_rule(struct mlx4_dev *dev, char *str, struct mlx4_net_trans_rule *rule) argument
983 mlx4_flow_attach(struct mlx4_dev *dev, struct mlx4_net_trans_rule *rule, u64 *reg_id) argument
1057 struct mlx4_net_trans_rule rule = { local
1376 struct mlx4_net_trans_rule rule = { local
1468 struct mlx4_net_trans_rule rule = { local
[all...]
/freebsd-13-stable/contrib/subversion/subversion/libsvn_repos/
H A Dauthz_info.c39 /* The repository name must match the one in the rule, iff the rule
41 return (0 == strcmp(acl->rule.repos, AUTHZ_ANY_REPOSITORY))
42 || (0 == strcmp(repos, acl->rule.repos));
54 /* The repository name must match the one in the rule, iff the rule
179 /* Check if inverted-rule rights apply */
H A Dauthz.h230 rule patterns will always contain the same pointer value and
239 /* The repository that this rule applies to. This will be the empty
240 string string if a the rule did not name a repository. The
244 /* The number of segments in the rule path. */
247 /* The array of path segments for this rule. Will be NULL for the
262 /* The parsed rule. */ member in struct:authz_acl_t
263 authz_rule_t rule;
297 /* True if this is an inverse-match rule. */
/freebsd-13-stable/contrib/bmake/unit-tests/
H A Dposix1.mk114 # The system makefiles make the .c.a rule .PRECIOUS with a special source,
139 # Explicit rule where the dependency is an inferred file. The dependency
152 # Excplicit rule where the dependency also has an explicit rule.
/freebsd-13-stable/contrib/byacc/
H A Dverbose.c176 int rule; local
190 rule = -(*sp);
191 fprintf(verbose_file, "\t%s : ", symbol_name[rlhs[rule]]);
193 for (sp = ritem + rrhs[rule]; sp < sp1; sp++)
/freebsd-13-stable/lib/libpfctl/
H A Dlibpfctl.h234 uint32_t rule; member in struct:pfctl_state
260 const char *anchor, u_int32_t ruleset, struct pfctl_rule *rule,
263 const char *anchor, u_int32_t ruleset, struct pfctl_rule *rule,
/freebsd-13-stable/sys/netinet/
H A Dip_fw.h34 * The default rule number. By the design of ip_fw, the default rule
36 * allowed for a rule. The ip_fw code relies on both meanings of this
69 * Call stack currently is an uint16_t array with rule numbers.
92 #define IP_FW_XADD 98 /* add rule */
93 #define IP_FW_XDEL 99 /* del rule */
233 O_SKIPTO, /* arg1=next rule number */
283 O_CALLRETURN, /* arg1=called rule number */
588 * Here we have the structure representing an ipfw rule.
592 * [ counter block, size = rule
706 struct ip_fw *rule; /* pointer to rule */ member in struct:_ipfw_dyn_rule
[all...]
/freebsd-13-stable/crypto/openssl/ssl/
H A Dssl_ciph.c187 * This rule isn't currently supported by the public cipherstring API.
776 uint32_t algo_strength, int rule,
786 "Applying rule %d with %08x/%08x/%08x/%08x/%08x %08x (%d)\n",
787 rule, alg_mkey, alg_auth, alg_enc, alg_mac, min_tls,
791 if (rule == CIPHER_DEL || rule == CIPHER_BUMP)
856 fprintf(stderr, "Action = %d\n", rule);
860 if (rule == CIPHER_ADD) {
868 else if (rule == CIPHER_ORD) {
873 } else if (rule
773 ssl_cipher_apply_rule(uint32_t cipher_id, uint32_t alg_mkey, uint32_t alg_auth, uint32_t alg_enc, uint32_t alg_mac, int min_tls, uint32_t algo_strength, int rule, int32_t strength_bits, CIPHER_ORDER **head_p, CIPHER_ORDER **tail_p) argument
965 int j, multi, found, rule, retval, ok, buflen; local
[all...]
/freebsd-13-stable/sbin/ipfw/
H A Dipfw2.c69 uint32_t first; /* first rule to request */
70 uint32_t last; /* last rule to request */
1393 struct ip_fw_rule *rule; member in struct:show_state
1406 init_show_state(struct show_state *state, struct ip_fw_rule *rule) argument
1409 state->printed = calloc(rule->cmd_len, sizeof(uint8_t));
1412 state->rule = rule;
1431 return (state->printed[cmd - state->rule->cmd]);
1438 state->printed[cmd - state->rule->cmd] = 1;
1775 for (l = state->rule
2155 show_static_rule(struct cmdline_opts *co, struct format_opts *fo, struct buf_pr *bp, struct ip_fw_rule *rule, struct ip_fw_bcounter *cntr) argument
3803 struct ip_fw_rule *rule; local
5298 struct ip_fw_rule *rule; local
[all...]
/freebsd-13-stable/sys/netpfil/pf/
H A Dpf.c194 struct pf_krule *rule; member in struct:pf_overload_entry
345 (s)->rule.ptr->rt == PF_ROUTETO && \
346 (s)->rule.ptr->direction == PF_OUT && \
357 counter_u64_add(s->rule.ptr->states_cur, 1); \
358 counter_u64_add(s->rule.ptr->states_tot, 1); \
375 counter_u64_add(s->rule.ptr->states_cur, -1); \
553 if ((*state)->rule.ptr->max_src_conn &&
554 (*state)->rule.ptr->max_src_conn <
560 if ((*state)->rule.ptr->max_src_conn_rate.limit &&
573 if ((*state)->rule
691 pf_find_src_node(struct pf_addr *src, struct pf_krule *rule, sa_family_t af, int returnlocked) argument
727 pf_insert_src_node(struct pf_ksrc_node **sn, struct pf_krule *rule, struct pf_addr *src, sa_family_t af) argument
[all...]
/freebsd-13-stable/contrib/ofed/opensm/opensm/
H A Dosm_qos_parser_l.l82 #define START_QOS_LEVEL_NAME {in_single_string = TRUE;} /* single string w/o whitespaces (qos level name in match rule) */
175 QOS_MATCH_RULE_START qos\-match\-rule
176 QOS_MATCH_RULE_END end\-qos\-match\-rule
/freebsd-13-stable/contrib/ncurses/ncurses/widechar/
H A Dlib_wacs.c115 * be the rule, but there are people who are offended by the notion that
/freebsd-13-stable/sys/contrib/dpdk_rte_lpm/
H A Drte_lpm6.c145 * LPM6 rule hash function
213 * Init a rule key.
449 /* Find a rule */
458 /* lookup for a rule */
469 /* Find a rule */
476 /* init a rule key */
483 * Checks if a rule already exists in the rules table and updates
484 * the nexthop if so. Otherwise it adds a new rule if enough space is available.
487 * 0 - next hop of existed rule is updated
488 * 1 - new rule successfull
1030 struct rte_lpm6_rule *rule = (struct rte_lpm6_rule *)buffer; local
[all...]

Completed in 325 milliseconds

12345