/freebsd-13-stable/contrib/ntp/ntpd/ |
H A D | ntp_io.c | 90 * NIC rule entry 104 * NIC rule listhead. Entries are added at the head so that the first 105 * match in the list is the last matching rule specified. 1188 * add_nic_rule() -- insert a rule entry at the head of nic_rule_list. 1198 nic_rule * rule; local 1201 rule = emalloc_zero(sizeof(*rule)); 1202 rule->match_type = match_type; 1203 rule->prefixlen = prefixlen; 1204 rule 1263 nic_rule * rule; local [all...] |
/freebsd-13-stable/sys/dev/mlx5/mlx5_core/ |
H A D | mlx5_fs_tree.c | 1657 static void add_rule_to_tree(struct mlx5_flow_rule *rule, argument 1662 dest_name = get_dest_name(&rule->dest_attr); 1663 fs_add_node(&rule->base, &fte->base, dest_name, 1); 1665 list_add_tail(&rule->base.list, &fte->dests); 1667 call_to_add_rule_notifiers(rule, fte); 2284 u8 mlx5_get_match_criteria_enable(struct mlx5_flow_rule *rule) argument 2289 pbase = rule->base.parent; 2299 struct mlx5_flow_rule *rule) 2304 pbase = rule->base.parent; 2312 struct mlx5_flow_rule *rule) 2298 mlx5_get_match_value(u32 *match_value, struct mlx5_flow_rule *rule) argument 2311 mlx5_get_match_criteria(u32 *match_criteria, struct mlx5_flow_rule *rule) argument 2426 mlx5_set_rule_private_data(struct mlx5_flow_rule *rule, struct mlx5_flow_handler *fs_handler, void *client_data) argument 2456 remove_from_clients(struct mlx5_flow_rule *rule, bool ctx_changed, void *client_data, void *context) argument [all...] |
/freebsd-13-stable/contrib/bmake/mk/ |
H A D | yacc.mk | 44 # Normally the .y.h rule does the work - to avoid races.
|
/freebsd-13-stable/contrib/llvm-project/lldb/source/Plugins/SymbolFile/Breakpad/ |
H A D | SymbolFileBreakpad.cpp | 400 // Go back one token to find the end of the current rule. 449 while (auto rule = GetRule(unwind_rules)) { 451 llvm::StringRef lhs = rule->first; 452 postfix::Node *rhs = postfix::ParseOneExpression(rule->second, node_alloc); 454 LLDB_LOG(log, "Could not parse `{0}` as unwind rhs.", rule->second); 473 LLDB_LOG(log, "Resolving symbols in `{0}` failed.", rule->second); 486 LLDB_LOG(log, "Invalid register `{0}` in unwind rule.", lhs); 491 LLDB_LOG(log, "Could not parse `{0}` as an unwind rule.", unwind_rules); 581 LLDB_LOG(log, "Invalid unwind rule: {0}.", record->ProgramString); 589 for (const auto &rule [all...] |
/freebsd-13-stable/contrib/ntp/sntp/libopts/ |
H A D | Makefile.am | 20 @: do-nothing rule to avoid default SCCS get
|
/freebsd-13-stable/sys/netgraph/ |
H A D | ng_ipfw.c | 212 /* Look up hook by rule number */ 296 (hook = ng_ipfw_findhook1(fw_node, fwa->rule.info)) == NULL) 297 return (ESRCH); /* no hook associated with this rule */ 317 *r = fwa->rule;
|
/freebsd-13-stable/sys/netpfil/ipfw/ |
H A D | ip_fw_private.h | 101 * On return, it points to the matching rule. 102 * On entry, rule.slot > 0 means the info is valid and 103 * contains the starting rule for an ipfw search. 105 * Otherwise, we locate the first rule >= rulenum:rule_id 107 struct ipfw_rule_ref rule; /* match/restart info */ member in struct:ip_fw_args 114 * stored in rule's opcode to avoid copying into hopstore. 207 int ipfw_dyn_install_state(struct ip_fw_chain *chain, struct ip_fw *rule, 215 int ipfw_is_dyn_rule(struct ip_fw *rule); 256 * Here we have the structure representing an ipfw rule. 262 * Given a rule pointe [all...] |
H A D | ip_fw_table.h | 183 int ipfw_mark_table_kidx(struct ip_fw_chain *chain, struct ip_fw *rule, 187 void ipfw_unref_rule_tables(struct ip_fw_chain *chain, struct ip_fw *rule);
|
H A D | ip_fw_pfil.c | 139 args.rule = *((struct ipfw_rule_ref *)(tag+1)); 141 if (args.rule.info & IPFW_ONEPASS) 357 * Fetch start point from rule, if any. 364 args.rule = *((struct ipfw_rule_ref *)(mtag+1)); 366 if (args.rule.info & IPFW_ONEPASS) 469 * This means that listeners on a tee rule may get fragments, 523 *((struct ipfw_rule_ref *)(tag+1)) = args->rule;
|
H A D | ip_dn_io.c | 842 dt->rule = fwa->rule; 843 dt->rule.info &= IPFW_ONEPASS; /* only keep this info */ 867 fs_id = (fwa->rule.info & IPFW_INFO_MASK) + 868 ((fwa->rule.info & IPFW_IS_PIPE) ? 2*DN_MAX_ID : 0);
|
H A D | ip_dn_private.h | 375 * Outside dummynet, only the 'rule' field is relevant, and it must 379 struct ipfw_rule_ref rule; /* matching rule */ member in struct:dn_pkt_tag
|
/freebsd-13-stable/contrib/tzcode/zic/ |
H A D | zic.c | 49 struct rule { struct 74 int r_todo; /* a rule to do (used in outzone) */ 97 struct rule * z_rules; 100 struct rule z_untilrule; 143 static zic_t rpytime(const struct rule * rp, int wantedy); 144 static void rulesub(struct rule * rp, 149 static int stringrule(char * result, const struct rule * rp, 263 static struct rule * rules; 430 (void) fprintf(stderr, _(" (rule from \"%s\", line %d)"), 713 ** Sort by rule nam [all...] |
/freebsd-13-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | authz.c | 53 * a path rule (actually the rule set specified for a path). I.e. there is 54 * one instance of this per path rule. 58 /* Sequence number of the path rule that this struct was derived from. 63 * A value of 0 denotes the default rule at the repository root denying 68 /* Access rights of the respective user as defined by the rule set. */ 81 * NO_SEQUENCE_NUMBER, there has been no specific path rule for this PATH 82 * but only for some sub-path(s). There is always a rule at the root node. 272 /* The segment as specified in the path rule. During the lookup tree walk, 393 /* Combine an ACL rule segmen [all...] |
/freebsd-13-stable/lib/libipsec/ |
H A D | policy_parse.y | 137 | rules rule { 148 rule
|
/freebsd-13-stable/sys/netinet/libalias/ |
H A D | alias_db.c | 2614 struct ip_fw *rule = (struct ip_fw *)buf; local 2615 ipfw_insn *cmd = (ipfw_insn *)rule->cmd; 2618 rule->rulenum = rulenum; 2626 rule->act_ofs = (u_int32_t *)cmd - (u_int32_t *)rule->cmd; 2629 rule->cmd_len = (u_int32_t *)cmd - (u_int32_t *)rule->cmd; 2681 struct ip_fw rule; /* On-the-fly built rule */ local 2692 memset(&rule, 2760 struct ip_fw rule; local 2777 struct ip_fw rule; /* On-the-fly built rule */ local [all...] |
/freebsd-13-stable/share/mk/ |
H A D | bsd.info.mk | 188 # The indirection in the following is to avoid the null install rule 189 # "install:" from being overridden by the implicit .sh rule if there
|
/freebsd-13-stable/usr.sbin/ppp/ |
H A D | filter.c | 278 log_Printf(LogWARN, "Parse: Can only jump forward from rule %d\n", 433 arg->argv + arg->argn + 1, filter->rule); 519 doShowFilter(filter->rule, arg->prompt); 532 doShowFilter(filter[f]->rule, arg->prompt); 569 for (fp = filter->rule, n = 0; n < MAXFILTERS; fp++, n++)
|
/freebsd-13-stable/usr.sbin/bsnmpd/modules/snmp_pf/ |
H A D | pf_snmp.c | 1518 struct pfctl_rule rule; local 1524 pr.rule.action = PF_PASS; 1534 PF_PASS, &rule, pr.anchor_call)) { 1540 if (rule.label[0]) { 1548 strlcat(e->name, rule.label[0], sizeof(e->name)); 1550 e->evals = rule.evaluations; 1551 e->bytes[IN] = rule.bytes[IN]; 1552 e->bytes[OUT] = rule.bytes[OUT]; 1553 e->pkts[IN] = rule.packets[IN]; 1554 e->pkts[OUT] = rule [all...] |
/freebsd-13-stable/contrib/ipfilter/tools/ |
H A D | ipfstat.c | 74 "log rule failure", 791 ipfruleiter_t rule; local 800 rule.iri_inout = out; 801 rule.iri_active = set; 802 rule.iri_rule = &fb; 803 rule.iri_nrules = 1; 805 strncpy(rule.iri_group, group, FR_GROUPLEN); 807 rule.iri_group[0] = '\0'; 814 obj.ipfo_size = sizeof(rule); 815 obj.ipfo_ptr = &rule; [all...] |
/freebsd-13-stable/contrib/flex/src/ |
H A D | parse.y | 77 int previous_continued_action; /* whether the previous rule's action was '|' */ 119 { /* add default rule */ 127 /* Remember the number of the default rule so we 222 /* Initialize for a parse of one rule. */ 233 flexrule : '^' rule 269 | rule 317 { synerr( _("unrecognized rule") ); } 379 rule : re2 re label 413 { /* variable trailing context rule */ 414 /* Mark the first part of the rule a [all...] |
/freebsd-13-stable/contrib/tcpdump/ |
H A D | print-pfsync.c | 449 if (s->rule != ntohl(-1)) 450 ND_PRINT((ndo, ", rule %u", ntohl(s->rule)));
|
/freebsd-13-stable/sbin/pfctl/ |
H A D | pf_print_state.c | 340 if (s->rule != -1) 341 printf(", rule %u", s->rule);
|
H A D | pfctl_parser.c | 683 if (sn->rule.nr != -1) 684 printf(", nat rule %u", sn->rule.nr); 687 if (sn->rule.nr != -1) 688 printf(", rdr rule %u", sn->rule.nr); 691 if (sn->rule.nr != -1) 692 printf(", filter rule %u", sn->rule.nr); 933 printf(" rule"); [all...] |
/freebsd-13-stable/sys/dev/cxgbe/ |
H A D | t4_ioctl.h | 240 * Filter rule value/mask pairs. 401 * settings of the first rule that matches are applied to that connection. 405 struct offload_rule *rule; member in struct:t4_offload_policy
|
/freebsd-13-stable/contrib/tzcode/stdtime/ |
H A D | localtime.c | 157 struct rule { struct 158 int r_type; /* type of rule--see below */ 159 int r_day; /* day number of rule */ 160 int r_week; /* week number of rule */ 161 int r_mon; /* month number of rule */ 162 long r_time; /* transition time of rule */ 183 static const char * getrule(const char * strp, struct rule * rulep); 214 const struct rule * rulep, long offset) 813 ** Given a pointer into a time zone string, extract a rule in the form 815 ** If a valid rule i [all...] |