/freebsd-13-stable/sys/dev/mlx5/ |
H A D | fs.h | 149 /* Single destination per rule. 163 typedef int (*rule_event_fn)(struct mlx5_flow_rule *rule, 176 int mlx5_set_rule_private_data(struct mlx5_flow_rule *rule, struct 193 struct mlx5_flow_rule *rule); 196 struct mlx5_flow_rule *rule); 198 u8 mlx5_get_match_criteria_enable(struct mlx5_flow_rule *rule);
|
/freebsd-13-stable/sys/netpfil/ipfw/ |
H A D | ip_fw_eaction.c | 64 * the search continues to the next rule. If it has non zero value, 281 * will be decremented on rule deletion, thus we 376 ipfw_reset_eaction(struct ip_fw_chain *ch, struct ip_fw *rule, argument 389 cmd = ipfw_get_action(rule); 395 * to truncate the rule length. 398 * and rule length should be enough to keep O_EXTERNAL_INSTANCE 401 l = rule->cmd + rule->cmd_len - cmd; 414 EACTION_DEBUG("truncate rule %d: len %u -> %u", 415 rule [all...] |
H A D | ip_fw_dynamic.c | 107 * Each state holds a pointer to the parent ipfw rule so we know what 108 * action to perform. Dynamic rules are removed when the parent rule is 131 void *parent; /* pointer to parent rule */ 133 uint32_t f_pos; /* cached rule index */ 139 uint16_t rulenum; /* parent rule number */ 140 uint32_t ruleid; /* parent rule id */ 162 void *parent; /* pointer to parent rule */ 165 uint16_t rulenum; /* parent rule number */ 166 uint32_t ruleid; /* parent rule id */ 352 * seconds of lifetime of a rule 782 hash_parent(const struct ipfw_flow_id *id, const void *rule) argument 878 hash_parent(const struct ipfw_flow_id *id, const void *rule) argument 1112 dyn_lookup_ipv4_parent(const struct ipfw_flow_id *pkt, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t hashval) argument 1148 dyn_lookup_ipv4_parent_locked(const struct ipfw_flow_id *pkt, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t bucket) argument 1261 dyn_lookup_ipv6_parent(const struct ipfw_flow_id *pkt, uint32_t zoneid, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t hashval) argument 1298 dyn_lookup_ipv6_parent_locked(const struct ipfw_flow_id *pkt, uint32_t zoneid, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t bucket) argument 1334 struct ip_fw *rule; local 1537 dyn_add_ipv4_parent(void *rule, uint32_t ruleid, uint16_t rulenum, const struct ipfw_flow_id *pkt, uint32_t hashval, uint32_t version, uint16_t kidx) argument 1668 dyn_add_ipv6_parent(void *rule, uint32_t ruleid, uint16_t rulenum, const struct ipfw_flow_id *pkt, uint32_t zoneid, uint32_t hashval, uint32_t version, uint16_t kidx) argument 1771 dyn_get_parent_state(const struct ipfw_flow_id *pkt, uint32_t zoneid, struct ip_fw *rule, uint32_t hashval, uint32_t limit, uint16_t kidx) argument 1863 dyn_install_state(const struct ipfw_flow_id *pkt, uint32_t zoneid, uint16_t fibnum, const void *ulp, int pktlen, struct ip_fw *rule, struct ipfw_dyn_info *info, uint32_t limit, uint16_t limit_mask, uint16_t kidx, uint8_t type) argument 1988 ipfw_dyn_install_state(struct ip_fw_chain *chain, struct ip_fw *rule, const ipfw_insn_limit *cmd, const struct ip_fw_args *args, const void *ulp, int pktlen, struct ipfw_dyn_info *info, uint32_t tablearg) argument 2133 dyn_acquire_rule(struct ip_fw_chain *ch, struct dyn_data *data, struct ip_fw *rule, uint16_t kidx) argument 2160 dyn_release_rule(struct ip_fw_chain *ch, struct dyn_data *data, struct ip_fw *rule, uint16_t kidx) argument 2190 struct ip_fw *rule; local 2215 struct ip_fw *rule; local 2249 void *rule; local 2830 struct ip_fw *rule; local 2911 ipfw_is_dyn_rule(struct ip_fw *rule) argument 3004 struct ip_fw *rule; local 3036 struct ip_fw *rule; local [all...] |
H A D | ip_fw2.c | 120 "struct ip_fw *" /* rule */); 158 * Each rule belongs to one of 32 different sets (0..31). 161 * are disabled. Set RESVD_SET(31) is reserved for the default rule 212 "The default/max possible rule number."); 223 "Make the default rule accept all packets."); 1215 * Helper function to set args with info on the rule after the matching 1223 args->rule.chain_id = chain->id; 1224 args->rule.slot = slot + 1; /* we use 0 as a marker */ 1225 args->rule.rule_id = 1 + chain->map[slot]->id; 1226 args->rule 3258 struct ip_fw *rule = chain->map[f_pos]; local 3405 struct ip_fw *rule = NULL; local [all...] |
/freebsd-13-stable/tests/sys/mac/bsdextended/ |
H A D | ugidfw_test.c | 52 * rule<->string routines to confirm they work approximately as desired. 149 struct mac_bsdextended_rule rule; local 172 error = bsde_parse_rule_string(test_strings[i], &rule, 181 error = bsde_rule_to_string(&rule, rulestr, sizeof(rulestr)); 183 printf("not ok %d # bsde_rule_to_string: rule for '%s' " 232 * policy for basic state. We want the rule count to be 0 before
|
/freebsd-13-stable/sbin/pfctl/ |
H A D | pfctl.c | 947 pfctl_print_rule_counters(struct pfctl_rule *rule, int opts) argument 956 if (rule->skip[i].nr == rule->nr + 1) 959 if (rule->skip[i].nr == -1) 962 printf("%u ", rule->skip[i].nr); 967 rule->qname, rule->qid, rule->pqname, rule->pqid); 972 (unsigned long long)rule 999 struct pfctl_rule rule; local 1154 struct pfctl_rule rule; local 1367 struct pfctl_rule *rule; local [all...] |
/freebsd-13-stable/contrib/netbsd-tests/ipf/ |
H A D | t_filter_exec.sh | 49 { while read rule; do 50 atf_check -x "echo \"$rule\" | ipftest -F \ 101 { while read rule; do 102 atf_check -o save:save -x "echo \"$rule\" | \
|
H A D | t_nat_exec.sh | 53 { while read rule; do 55 "echo \"$rule\" | ipftest $format -RDbN - -i in $args"
|
H A D | t_nat_ipf_exec.sh | 55 { while read rule; do 56 atf_check -o save:save -x "echo \"$rule\" | \
|
/freebsd-13-stable/usr.sbin/ppp/ |
H A D | filter.h | 49 * There's a struct filterent for each possible filter rule. The 77 /* f_action values [0..MAXFILTERS) specify the next filter rule, others are: */ 83 struct filterent rule[MAXFILTERS]; /* incoming packet filter */ member in struct:filter
|
/freebsd-13-stable/share/dtrace/ |
H A D | ipfw.d | 188 slot = (p->flags & IPFW_ARGS_REF) ? p->rule.slot : 0; 189 rulenum = (p->flags & IPFW_ARGS_REF) ? p->rule.rulenum : 0; 190 rule_id = (p->flags & IPFW_ARGS_REF) ? p->rule.rule_id : 0; 191 chain_id = (p->flags & IPFW_ARGS_REF) ? p->rule.chain_id : 0; 192 match_info = (p->flags & IPFW_ARGS_REF) ? p->rule.info : 0;
|
/freebsd-13-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | date.c | 30 /* Valid rule actions */ 47 typedef struct rule struct 49 char key; /* The template char that this rule matches */ 50 const char *valid; /* String of valid chars for this rule */ 51 enum rule_action action; /* What action to take when the rule is matched */ 55 } rule; typedef in typeref:struct:rule 68 should be processed, using a rule for each valid symbol. */ 69 static const rule 93 /* Return the rule associated with TCHAR, or NULL if there 94 is no such rule [all...] |
/freebsd-13-stable/sys/dev/mlx4/mlx4_core/ |
H A D | mlx4_mcg.c | 803 mlx4_err(dev, "Invalid network rule id. id = %d\n", id); 830 mlx4_err(dev, "Invalid network rule id. id = %d\n", id); 903 struct mlx4_net_trans_rule *rule) 913 rule->port, rule->priority, rule->qpn); 915 list_for_each_entry(cur, &rule->list, list) { 980 mlx4_err(dev, "Network rule error message was truncated, print buffer is too small\n"); 984 struct mlx4_net_trans_rule *rule, u64 *reg_id) 995 trans_rule_ctrl_to_hw(rule, mailbo 902 mlx4_err_rule(struct mlx4_dev *dev, char *str, struct mlx4_net_trans_rule *rule) argument 983 mlx4_flow_attach(struct mlx4_dev *dev, struct mlx4_net_trans_rule *rule, u64 *reg_id) argument 1057 struct mlx4_net_trans_rule rule = { local 1376 struct mlx4_net_trans_rule rule = { local 1468 struct mlx4_net_trans_rule rule = { local [all...] |
/freebsd-13-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | authz_info.c | 39 /* The repository name must match the one in the rule, iff the rule 41 return (0 == strcmp(acl->rule.repos, AUTHZ_ANY_REPOSITORY)) 42 || (0 == strcmp(repos, acl->rule.repos)); 54 /* The repository name must match the one in the rule, iff the rule 179 /* Check if inverted-rule rights apply */
|
H A D | authz.h | 230 rule patterns will always contain the same pointer value and 239 /* The repository that this rule applies to. This will be the empty 240 string string if a the rule did not name a repository. The 244 /* The number of segments in the rule path. */ 247 /* The array of path segments for this rule. Will be NULL for the 262 /* The parsed rule. */ member in struct:authz_acl_t 263 authz_rule_t rule; 297 /* True if this is an inverse-match rule. */
|
/freebsd-13-stable/contrib/bmake/unit-tests/ |
H A D | posix1.mk | 114 # The system makefiles make the .c.a rule .PRECIOUS with a special source, 139 # Explicit rule where the dependency is an inferred file. The dependency 152 # Excplicit rule where the dependency also has an explicit rule.
|
/freebsd-13-stable/contrib/byacc/ |
H A D | verbose.c | 176 int rule; local 190 rule = -(*sp); 191 fprintf(verbose_file, "\t%s : ", symbol_name[rlhs[rule]]); 193 for (sp = ritem + rrhs[rule]; sp < sp1; sp++)
|
/freebsd-13-stable/lib/libpfctl/ |
H A D | libpfctl.h | 234 uint32_t rule; member in struct:pfctl_state 260 const char *anchor, u_int32_t ruleset, struct pfctl_rule *rule, 263 const char *anchor, u_int32_t ruleset, struct pfctl_rule *rule,
|
/freebsd-13-stable/sys/netinet/ |
H A D | ip_fw.h | 34 * The default rule number. By the design of ip_fw, the default rule 36 * allowed for a rule. The ip_fw code relies on both meanings of this 69 * Call stack currently is an uint16_t array with rule numbers. 92 #define IP_FW_XADD 98 /* add rule */ 93 #define IP_FW_XDEL 99 /* del rule */ 233 O_SKIPTO, /* arg1=next rule number */ 283 O_CALLRETURN, /* arg1=called rule number */ 588 * Here we have the structure representing an ipfw rule. 592 * [ counter block, size = rule 706 struct ip_fw *rule; /* pointer to rule */ member in struct:_ipfw_dyn_rule [all...] |
/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_ciph.c | 187 * This rule isn't currently supported by the public cipherstring API. 776 uint32_t algo_strength, int rule, 786 "Applying rule %d with %08x/%08x/%08x/%08x/%08x %08x (%d)\n", 787 rule, alg_mkey, alg_auth, alg_enc, alg_mac, min_tls, 791 if (rule == CIPHER_DEL || rule == CIPHER_BUMP) 856 fprintf(stderr, "Action = %d\n", rule); 860 if (rule == CIPHER_ADD) { 868 else if (rule == CIPHER_ORD) { 873 } else if (rule 773 ssl_cipher_apply_rule(uint32_t cipher_id, uint32_t alg_mkey, uint32_t alg_auth, uint32_t alg_enc, uint32_t alg_mac, int min_tls, uint32_t algo_strength, int rule, int32_t strength_bits, CIPHER_ORDER **head_p, CIPHER_ORDER **tail_p) argument 965 int j, multi, found, rule, retval, ok, buflen; local [all...] |
/freebsd-13-stable/sbin/ipfw/ |
H A D | ipfw2.c | 69 uint32_t first; /* first rule to request */ 70 uint32_t last; /* last rule to request */ 1393 struct ip_fw_rule *rule; member in struct:show_state 1406 init_show_state(struct show_state *state, struct ip_fw_rule *rule) argument 1409 state->printed = calloc(rule->cmd_len, sizeof(uint8_t)); 1412 state->rule = rule; 1431 return (state->printed[cmd - state->rule->cmd]); 1438 state->printed[cmd - state->rule->cmd] = 1; 1775 for (l = state->rule 2155 show_static_rule(struct cmdline_opts *co, struct format_opts *fo, struct buf_pr *bp, struct ip_fw_rule *rule, struct ip_fw_bcounter *cntr) argument 3803 struct ip_fw_rule *rule; local 5298 struct ip_fw_rule *rule; local [all...] |
/freebsd-13-stable/sys/netpfil/pf/ |
H A D | pf.c | 194 struct pf_krule *rule; member in struct:pf_overload_entry 345 (s)->rule.ptr->rt == PF_ROUTETO && \ 346 (s)->rule.ptr->direction == PF_OUT && \ 357 counter_u64_add(s->rule.ptr->states_cur, 1); \ 358 counter_u64_add(s->rule.ptr->states_tot, 1); \ 375 counter_u64_add(s->rule.ptr->states_cur, -1); \ 553 if ((*state)->rule.ptr->max_src_conn && 554 (*state)->rule.ptr->max_src_conn < 560 if ((*state)->rule.ptr->max_src_conn_rate.limit && 573 if ((*state)->rule 691 pf_find_src_node(struct pf_addr *src, struct pf_krule *rule, sa_family_t af, int returnlocked) argument 727 pf_insert_src_node(struct pf_ksrc_node **sn, struct pf_krule *rule, struct pf_addr *src, sa_family_t af) argument [all...] |
/freebsd-13-stable/contrib/ofed/opensm/opensm/ |
H A D | osm_qos_parser_l.l | 82 #define START_QOS_LEVEL_NAME {in_single_string = TRUE;} /* single string w/o whitespaces (qos level name in match rule) */ 175 QOS_MATCH_RULE_START qos\-match\-rule 176 QOS_MATCH_RULE_END end\-qos\-match\-rule
|
/freebsd-13-stable/contrib/ncurses/ncurses/widechar/ |
H A D | lib_wacs.c | 115 * be the rule, but there are people who are offended by the notion that
|
/freebsd-13-stable/sys/contrib/dpdk_rte_lpm/ |
H A D | rte_lpm6.c | 145 * LPM6 rule hash function 213 * Init a rule key. 449 /* Find a rule */ 458 /* lookup for a rule */ 469 /* Find a rule */ 476 /* init a rule key */ 483 * Checks if a rule already exists in the rules table and updates 484 * the nexthop if so. Otherwise it adds a new rule if enough space is available. 487 * 0 - next hop of existed rule is updated 488 * 1 - new rule successfull 1030 struct rte_lpm6_rule *rule = (struct rte_lpm6_rule *)buffer; local [all...] |