/freebsd-11-stable/contrib/bmake/mk/ |
H A D | options.mk | 62 # If neither WITH[OUT]_FOO_UTILS is set, (see rules above)
|
H A D | dep.mk | 55 # some of the rules involve .h sources, so remove them from mkdep line
|
H A D | own.mk | 62 # for suffix rules
|
/freebsd-11-stable/tools/tools/editing/ |
H A D | freebsd.vim | 29 " indentation rules but does not change the indentation of existing code.
|
/freebsd-11-stable/contrib/blacklist/libexec/ |
H A D | blacklistd-helper | 125 /sbin/pfctl -a $anchor -F rules
|
/freebsd-11-stable/share/mk/ |
H A D | atf.test.mk | 15 # respectively, from bsd.prog.mk. However, the build rules are tweaked to
|
H A D | sys.mk | 121 # The rules below use this macro to distinguish between Posix-compliant 271 # Posix 1003.2 mandated rules
|
H A D | bsd.dep.mk | 245 # ambiguous suffix transformation rules from .PATH. Meta mode does not
|
/freebsd-11-stable/sys/dev/bxe/ |
H A D | ecore_sp.c | 983 union eth_classify_rule_cmd *rule_entry = &data->rules[rule_idx]; 1170 union eth_classify_rule_cmd *rule_entry = &data->rules[rule_idx]; 1220 union eth_classify_rule_cmd *rule_entry = &data->rules[rule_idx]; 1277 union eth_classify_rule_cmd *rule_entry = &data->rules[rule_idx]; 2110 * ecore_config_vlan_mac - configure VLAN/MAC/VLAN_MAC filtering rules. 2689 data->rules[rule_idx].client_id = p->cl_id; 2690 data->rules[rule_idx].func_id = p->func_id; 2692 data->rules[rule_idx].cmd_general_data = 2696 &(data->rules[rule_idx++]), 2702 data->rules[rule_id [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | authz.c | 59 * If multiple rules apply to the same path (only possible with wildcard 64 * access to everybody. User-defined path rules start with ID 1. 104 * are specified, pick one in accordance to the precedence rules. */ 266 /* The pattern tree. All relevant path rules are being folded into this 276 /* Immediate access rights granted by rules on this node and the min / 281 * sub-segments that have rules on themselves or their respective subtrees. 282 * NULL, if there are no rules for sub-paths relevant to the user. */ 445 /* Set access rights. Note that there might be multiple rules for 446 * the same path due to non-repo-specific rules vs. repo-specific 680 /* Remove all rules an 1708 authz_user_rules_t *rules = get_user_rules( local [all...] |
H A D | authz_parse.c | 108 /* A set of all the unique rules we parsed from the section names. */ 697 /* Insert the rule into the known rules set. */ 1370 svn_stream_t *rules, 1383 SVN_ERR(svn_config__parse_stream(rules, 1499 /* Sort shorter rules first. */ 1369 svn_authz__parse(authz_full_t **authz, svn_stream_t *rules, svn_stream_t *groups, svn_repos_authz_warning_func_t warning_func, void *warning_baton, apr_pool_t *result_pool, apr_pool_t *scratch_pool) argument
|
/freebsd-11-stable/usr.bin/rctl/ |
H A D | rctl.c | 360 * Print rules, one per line. 363 print_rules(char *rules, int hflag, int nflag) argument 367 while ((rule = strsep(&rules, ",")) != NULL) { 542 * Query the kernel about resource limit rules and print them out. 569 warn("failed to show rules for '%s'", unexpanded_rule); 649 * so we can still do "rctl -n u:root" and see the rules without
|
/freebsd-11-stable/contrib/apr-util/ |
H A D | Makefile.in | 49 # bring in rules.mk for standard functionality 59 export_vars.sh $(APU_CONFIG) build/rules.mk include/apu_want.h \
|
/freebsd-11-stable/sbin/pfctl/ |
H A D | pfctl_optimize.c | 44 /* The size at which a table becomes faster than individual rules */ 68 * A superblock is a block of adjacent rules of similar action. If there 69 * are five PASS rules in a row, they all become members of a superblock. 70 * Once we have a superblock, we are free to re-order any rules within it 88 BREAK, /* the field may not differ between rules in a superblock */ 89 NOMERGE, /* the field may not differ between rules when combined */ 90 COMBINED, /* the field may itself be combined with other rules */ 121 * These fields must be the same between all rules in the same superblock. 122 * These rules are allowed to be re-ordered but only among like rules [all...] |
H A D | pfctl.c | 214 "nat", "queue", "rules", "Sources", 219 "nat", "queue", "rules", "Anchors", "Sources", "states", "info", 415 fprintf(stderr, "rules cleared\n"); 1329 TAILQ_INSERT_TAIL(rs->rules[rs_num].active.ptr, rule, entries); 1379 if (TAILQ_FIRST(rs->rules[rs_num].active.ptr) != NULL) { 1398 while ((r = TAILQ_FIRST(rs->rules[rs_num].active.ptr)) != NULL) { 1399 TAILQ_REMOVE(rs->rules[rs_num].active.ptr, r, entries); 1580 "pf rules not loaded"); 1596 ERRX("Unable to load rules into kernel");
|
H A D | parse.y | 823 /* move inline rules into relative location */ 847 "rules must specify a name"); 1091 yyerror("scrub rules do not support 'quick'"); 1102 yyerror("reassemble tcp rules can not " 2116 /* 'keep state' by default on pass rules. */ 2285 /* 'flags S/SA' by default on stateful rules */ 2341 "with rules that specify routing"); 4193 "only valid with nat rules"); 4663 yyerror("allow-opts can only be specified for pass rules"); 4672 yyerror("return-rst can only be applied to TCP rules"); [all...] |
/freebsd-11-stable/sys/conf/ |
H A D | kern.post.mk | 166 # XXX the low quality .m.o rules gnerated by config are normally used 167 # instead of the .m.c rules here. 270 # ambiguous suffix transformation rules from .PATH. Meta mode does not
|
/freebsd-11-stable/contrib/ipfilter/ |
H A D | Makefile | 34 # To enable loading filter rules compiled to C code... 50 # To enable rules to be written with BPF syntax, uncomment these two lines. 102 # For packets which don't match any pass rules or any block rules, set either 395 ip_rules.c ip_rules.h: rules/ip_rules tools/ipfcomp.c 396 -./ipf -n -cc -f rules/ip_rules 2>/dev/null 1>&2
|
/freebsd-11-stable/sys/security/mac_portacl/ |
H A D | mac_portacl.c | 53 * sysctl(8) to modify the rules string: 55 * # sysctl security.mac.portacl.rules="uid:425:tcp:80,uid:425:tcp:79" 265 * user when the rules are queried, which is faster anyway. 374 SYSCTL_PROC(_security_mac_portacl, OID_AUTO, rules,
|
/freebsd-11-stable/contrib/ipfilter/tools/ |
H A D | ipnat_y.y | 1033 yyerror("Can only use pool with from/to rules\n"); 1041 yyerror("Can only use hash with from/to rules\n"); 1666 proxy_loadrules(fd, ioctlfunc, rules) 1669 proxyrule_t *rules; 1673 while ((pr = rules) != NULL) { 1676 rules = pr->pr_next;
|
H A D | ipf_y.y | 187 file: settings rules 188 | rules 197 rules: line label 199 | rules line 200 | rules assign 2523 * Only copy down matching fields if the rules are of the same type 2526 * protocol should be for rules with port comparisons in them.
|
/freebsd-11-stable/contrib/ntp/sntp/ |
H A D | Makefile.am | 157 @: similarly always be outdated causing their rules to fire
|
/freebsd-11-stable/sys/netpfil/pf/ |
H A D | pf_norm.c | 831 r = TAILQ_FIRST(pf_main_ruleset.rules[PF_RULESET_SCRUB].active.ptr); 975 r = TAILQ_FIRST(pf_main_ruleset.rules[PF_RULESET_SCRUB].active.ptr); 1153 r = TAILQ_FIRST(pf_main_ruleset.rules[PF_RULESET_SCRUB].active.ptr); 1517 * gives us a set of rules for rejecting packets on 1521 * rules and infer a few others that will let us treat
|
/freebsd-11-stable/contrib/byacc/ |
H A D | lalr.c | 169 LAruleno[k] = rp->rules[j];
|
/freebsd-11-stable/contrib/elftoolchain/libdwarf/ |
H A D | libdwarf.h | 208 } rules[DW_REG_TABLE_SIZE]; member in struct:__anon426
|