Searched refs:rules (Results 26 - 50 of 86) sorted by relevance

1234

/freebsd-11-stable/contrib/bmake/mk/
H A Doptions.mk62 # If neither WITH[OUT]_FOO_UTILS is set, (see rules above)
H A Ddep.mk55 # some of the rules involve .h sources, so remove them from mkdep line
H A Down.mk62 # for suffix rules
/freebsd-11-stable/tools/tools/editing/
H A Dfreebsd.vim29 " indentation rules but does not change the indentation of existing code.
/freebsd-11-stable/contrib/blacklist/libexec/
H A Dblacklistd-helper125 /sbin/pfctl -a $anchor -F rules
/freebsd-11-stable/share/mk/
H A Datf.test.mk15 # respectively, from bsd.prog.mk. However, the build rules are tweaked to
H A Dsys.mk121 # The rules below use this macro to distinguish between Posix-compliant
271 # Posix 1003.2 mandated rules
H A Dbsd.dep.mk245 # ambiguous suffix transformation rules from .PATH. Meta mode does not
/freebsd-11-stable/sys/dev/bxe/
H A Decore_sp.c983 union eth_classify_rule_cmd *rule_entry = &data->rules[rule_idx];
1170 union eth_classify_rule_cmd *rule_entry = &data->rules[rule_idx];
1220 union eth_classify_rule_cmd *rule_entry = &data->rules[rule_idx];
1277 union eth_classify_rule_cmd *rule_entry = &data->rules[rule_idx];
2110 * ecore_config_vlan_mac - configure VLAN/MAC/VLAN_MAC filtering rules.
2689 data->rules[rule_idx].client_id = p->cl_id;
2690 data->rules[rule_idx].func_id = p->func_id;
2692 data->rules[rule_idx].cmd_general_data =
2696 &(data->rules[rule_idx++]),
2702 data->rules[rule_id
[all...]
/freebsd-11-stable/contrib/subversion/subversion/libsvn_repos/
H A Dauthz.c59 * If multiple rules apply to the same path (only possible with wildcard
64 * access to everybody. User-defined path rules start with ID 1.
104 * are specified, pick one in accordance to the precedence rules. */
266 /* The pattern tree. All relevant path rules are being folded into this
276 /* Immediate access rights granted by rules on this node and the min /
281 * sub-segments that have rules on themselves or their respective subtrees.
282 * NULL, if there are no rules for sub-paths relevant to the user. */
445 /* Set access rights. Note that there might be multiple rules for
446 * the same path due to non-repo-specific rules vs. repo-specific
680 /* Remove all rules an
1708 authz_user_rules_t *rules = get_user_rules( local
[all...]
H A Dauthz_parse.c108 /* A set of all the unique rules we parsed from the section names. */
697 /* Insert the rule into the known rules set. */
1370 svn_stream_t *rules,
1383 SVN_ERR(svn_config__parse_stream(rules,
1499 /* Sort shorter rules first. */
1369 svn_authz__parse(authz_full_t **authz, svn_stream_t *rules, svn_stream_t *groups, svn_repos_authz_warning_func_t warning_func, void *warning_baton, apr_pool_t *result_pool, apr_pool_t *scratch_pool) argument
/freebsd-11-stable/usr.bin/rctl/
H A Drctl.c360 * Print rules, one per line.
363 print_rules(char *rules, int hflag, int nflag) argument
367 while ((rule = strsep(&rules, ",")) != NULL) {
542 * Query the kernel about resource limit rules and print them out.
569 warn("failed to show rules for '%s'", unexpanded_rule);
649 * so we can still do "rctl -n u:root" and see the rules without
/freebsd-11-stable/contrib/apr-util/
H A DMakefile.in49 # bring in rules.mk for standard functionality
59 export_vars.sh $(APU_CONFIG) build/rules.mk include/apu_want.h \
/freebsd-11-stable/sbin/pfctl/
H A Dpfctl_optimize.c44 /* The size at which a table becomes faster than individual rules */
68 * A superblock is a block of adjacent rules of similar action. If there
69 * are five PASS rules in a row, they all become members of a superblock.
70 * Once we have a superblock, we are free to re-order any rules within it
88 BREAK, /* the field may not differ between rules in a superblock */
89 NOMERGE, /* the field may not differ between rules when combined */
90 COMBINED, /* the field may itself be combined with other rules */
121 * These fields must be the same between all rules in the same superblock.
122 * These rules are allowed to be re-ordered but only among like rules
[all...]
H A Dpfctl.c214 "nat", "queue", "rules", "Sources",
219 "nat", "queue", "rules", "Anchors", "Sources", "states", "info",
415 fprintf(stderr, "rules cleared\n");
1329 TAILQ_INSERT_TAIL(rs->rules[rs_num].active.ptr, rule, entries);
1379 if (TAILQ_FIRST(rs->rules[rs_num].active.ptr) != NULL) {
1398 while ((r = TAILQ_FIRST(rs->rules[rs_num].active.ptr)) != NULL) {
1399 TAILQ_REMOVE(rs->rules[rs_num].active.ptr, r, entries);
1580 "pf rules not loaded");
1596 ERRX("Unable to load rules into kernel");
H A Dparse.y823 /* move inline rules into relative location */
847 "rules must specify a name");
1091 yyerror("scrub rules do not support 'quick'");
1102 yyerror("reassemble tcp rules can not "
2116 /* 'keep state' by default on pass rules. */
2285 /* 'flags S/SA' by default on stateful rules */
2341 "with rules that specify routing");
4193 "only valid with nat rules");
4663 yyerror("allow-opts can only be specified for pass rules");
4672 yyerror("return-rst can only be applied to TCP rules");
[all...]
/freebsd-11-stable/sys/conf/
H A Dkern.post.mk166 # XXX the low quality .m.o rules gnerated by config are normally used
167 # instead of the .m.c rules here.
270 # ambiguous suffix transformation rules from .PATH. Meta mode does not
/freebsd-11-stable/contrib/ipfilter/
H A DMakefile34 # To enable loading filter rules compiled to C code...
50 # To enable rules to be written with BPF syntax, uncomment these two lines.
102 # For packets which don't match any pass rules or any block rules, set either
395 ip_rules.c ip_rules.h: rules/ip_rules tools/ipfcomp.c
396 -./ipf -n -cc -f rules/ip_rules 2>/dev/null 1>&2
/freebsd-11-stable/sys/security/mac_portacl/
H A Dmac_portacl.c53 * sysctl(8) to modify the rules string:
55 * # sysctl security.mac.portacl.rules="uid:425:tcp:80,uid:425:tcp:79"
265 * user when the rules are queried, which is faster anyway.
374 SYSCTL_PROC(_security_mac_portacl, OID_AUTO, rules,
/freebsd-11-stable/contrib/ipfilter/tools/
H A Dipnat_y.y1033 yyerror("Can only use pool with from/to rules\n");
1041 yyerror("Can only use hash with from/to rules\n");
1666 proxy_loadrules(fd, ioctlfunc, rules)
1669 proxyrule_t *rules;
1673 while ((pr = rules) != NULL) {
1676 rules = pr->pr_next;
H A Dipf_y.y187 file: settings rules
188 | rules
197 rules: line label
199 | rules line
200 | rules assign
2523 * Only copy down matching fields if the rules are of the same type
2526 * protocol should be for rules with port comparisons in them.
/freebsd-11-stable/contrib/ntp/sntp/
H A DMakefile.am157 @: similarly always be outdated causing their rules to fire
/freebsd-11-stable/sys/netpfil/pf/
H A Dpf_norm.c831 r = TAILQ_FIRST(pf_main_ruleset.rules[PF_RULESET_SCRUB].active.ptr);
975 r = TAILQ_FIRST(pf_main_ruleset.rules[PF_RULESET_SCRUB].active.ptr);
1153 r = TAILQ_FIRST(pf_main_ruleset.rules[PF_RULESET_SCRUB].active.ptr);
1517 * gives us a set of rules for rejecting packets on
1521 * rules and infer a few others that will let us treat
/freebsd-11-stable/contrib/byacc/
H A Dlalr.c169 LAruleno[k] = rp->rules[j];
/freebsd-11-stable/contrib/elftoolchain/libdwarf/
H A Dlibdwarf.h208 } rules[DW_REG_TABLE_SIZE]; member in struct:__anon426

Completed in 427 milliseconds

1234