Searched refs:rule (Results 1 - 25 of 106) sorted by relevance

12345

/freebsd-11-stable/contrib/tzdata/
H A Dzishrink.awk20 # Return a shortened rule name representing NAME,
45 rule["Arg"] = "A"
46 rule["Brazil"] = "B"
47 rule["Canada"] = "C"
48 rule["Denmark"] = "D"
49 rule["EU"] = "E"
50 rule["France"] = "F"
51 rule["GB-Eire"] = "G"
52 rule["Halifax"] = "H"
53 rule["Ital
[all...]
/freebsd-11-stable/contrib/libarchive/tar/
H A Dsubst.c72 struct subst_rule *rule; local
83 rule = malloc(sizeof(*rule));
84 if (rule == NULL)
86 rule->next = NULL;
87 rule->result = NULL;
90 subst->first_rule = rule;
92 subst->last_rule->next = rule;
93 subst->last_rule = rule;
107 if ((r = regcomp(&rule
216 struct subst_rule *rule; local
314 struct subst_rule *rule; local
[all...]
/freebsd-11-stable/lib/libugidfw/
H A Dugidfw.h38 int bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf,
43 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr);
45 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr);
49 int bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule,
52 int bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule,
54 int bsde_add_rule(int *rulename, struct mac_bsdextended_rule *rule,
H A Dugidfw.c62 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) argument
67 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1];
79 if (rule->mbr_subject.mbs_flags) {
80 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) {
91 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) {
98 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) {
99 pwd = getpwuid(rule->mbr_subject.mbs_uid_min);
109 rule->mbr_subject.mbs_uid_min);
115 if (rule->mbr_subject.mbs_uid_min !=
116 rule
1009 bsde_parse_rule(int argc, char *argv[], struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
1079 bsde_parse_rule_string(const char *string, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
1190 bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t errlen, char *errstr) argument
1230 struct mac_bsdextended_rule rule; local
1260 bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
1292 bsde_add_rule(int *rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
[all...]
/freebsd-11-stable/sys/security/mac_portacl/
H A Dmac_portacl.c114 struct rule { struct
120 TAILQ_ENTRY(rule) r_entries;
129 * Text format for the rule string is that a rule consists of a
136 static TAILQ_HEAD(rulehead, rule) rule_head;
142 struct rule *rule; local
144 while ((rule = TAILQ_FIRST(head)) != NULL) {
145 TAILQ_REMOVE(head, rule, r_entries);
146 free(rule, M_PORTAC
174 parse_rule_element(char *element, struct rule **rule) argument
380 struct rule *rule; local
[all...]
/freebsd-11-stable/sys/security/mac_bsdextended/
H A Dmac_bsdextended.c83 "BSD Extended MAC rule");
94 &rule_slots, 0, "Number of used rule slots\n");
108 * between the new mode (first rule matches) and the old functionality (all
114 "Disable/enable match first rule functionality");
117 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) argument
120 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS)
122 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS)
124 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS)
126 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS)
128 if (((rule
228 ugidfw_rulecheck(struct mac_bsdextended_rule *rule, struct ucred *cred, struct vnode *vp, struct vattr *vap, int acc_mode) argument
[all...]
/freebsd-11-stable/sys/kern/
H A Dkern_rctl.c122 * 'rctl_rule_link' connects a rule with every racct it's related to.
123 * For example, rule 'user:X:openfiles:deny=N/process' is linked
216 static int rctl_rule_fully_specified(const struct rctl_rule *rule);
217 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule);
329 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) argument
336 switch (rule->rr_per) {
346 panic("%s: unknown per %d", __func__, rule->rr_per);
352 * hitting 'rule'.
355 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) argument
363 racct = rctl_proc_rule_to_racct(p, rule);
379 struct rctl_rule *rule; local
422 struct rctl_rule *rule; local
496 struct rctl_rule *rule; local
693 struct rctl_rule *rule; local
720 struct rctl_rule *rule; local
757 rctl_rule_matches(const struct rctl_rule *rule, const struct rctl_rule *filter) argument
875 rctl_racct_add_rule(struct racct *racct, struct rctl_rule *rule) argument
893 rctl_racct_add_rule_locked(struct racct *racct, struct rctl_rule *rule) argument
941 rctl_rule_acquire_subject(struct rctl_rule *rule) argument
969 rctl_rule_release_subject(struct rctl_rule *rule) argument
999 struct rctl_rule *rule; local
1021 rctl_rule_duplicate(const struct rctl_rule *rule, int flags) argument
1046 rctl_rule_acquire(struct rctl_rule *rule) argument
1058 struct rctl_rule *rule; local
1074 rctl_rule_release(struct rctl_rule *rule) argument
1094 rctl_rule_fully_specified(const struct rctl_rule *rule) argument
1137 struct rctl_rule *rule; local
1265 rctl_rule_add(struct rctl_rule *rule) argument
1469 rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule) argument
1869 struct rctl_rule *rule; local
2101 struct rctl_rule *rule; local
[all...]
/freebsd-11-stable/sbin/devfs/
H A DMakefile5 SRCS= devfs.c rule.c
/freebsd-11-stable/usr.bin/rctl/
H A Drctl.c69 warnx("malformed rule '%s': unknown user '%s'",
76 warnx("malformed rule '%s': trailing characters "
97 warnx("malformed rule '%s': unknown group '%s'",
104 warnx("malformed rule '%s': trailing characters "
116 expand_amount(const char *rule, const char *unexpanded_rule) argument
123 tofree = copy = strdup(rule);
141 copy = strdup(rule);
155 warnx("malformed rule '%s': invalid numeric value '%s'",
181 expand_rule(const char *rule, bool resolve_ids) argument
188 tofree = copy = strdup(rule);
253 humanize_ids(char *rule) argument
311 humanize_amount(char *rule) argument
365 char *rule; local
400 add_rule(const char *rule, const char *unexpanded_rule) argument
595 char *rule = NULL, *unexpanded_rule; local
[all...]
/freebsd-11-stable/contrib/pf/ftp-proxy/
H A Dfilter.c70 pfr.rule.direction = dir;
103 pfr.rule.rpool.proxy_port[0] = nat_range_low;
104 pfr.rule.rpool.proxy_port[1] = nat_range_high;
136 pfr.rule.rpool.proxy_port[0] = rdr_port;
258 /* Generic for all rule types. */
259 pfr.rule.af = src->sa_family;
260 pfr.rule.proto = IPPROTO_TCP;
261 pfr.rule.src.addr.type = PF_ADDR_ADDRMASK;
262 pfr.rule.dst.addr.type = PF_ADDR_ADDRMASK;
264 memcpy(&pfr.rule
[all...]
/freebsd-11-stable/contrib/pf/tftp-proxy/
H A Dfilter.c74 pfr.rule.direction = dir;
107 pfr.rule.rpool.proxy_port[0] = nat_range_low;
108 pfr.rule.rpool.proxy_port[1] = nat_range_high;
140 pfr.rule.rpool.proxy_port[0] = rdr_port;
267 /* Generic for all rule types. */
268 pfr.rule.af = src->sa_family;
269 pfr.rule.proto = proto;
270 pfr.rule.src.addr.type = PF_ADDR_ADDRMASK;
271 pfr.rule.dst.addr.type = PF_ADDR_ADDRMASK;
273 memcpy(&pfr.rule
[all...]
/freebsd-11-stable/usr.sbin/ugidfw/
H A Dugidfw.c77 struct mac_bsdextended_rule rule; local
80 error = bsde_parse_rule(argc, argv, &rule, BUFSIZ, errstr);
86 error = bsde_add_rule(&rulenum, &rule, BUFSIZ, errstr);
91 if (bsde_rule_to_string(&rule, charstr, BUFSIZ) == -1)
92 warnx("Added rule, but unable to print string.");
101 struct mac_bsdextended_rule rule; local
106 warnx("unable to get rule slots; mac_bsdextended.ko "
118 error = bsde_get_rule(i, &rule, BUFSIZ, errstr);
123 warnx("rule %d: %s", i, errstr);
129 if (bsde_rule_to_string(&rule, charst
140 struct mac_bsdextended_rule rule; local
[all...]
/freebsd-11-stable/sys/netpfil/pf/
H A Dpf_ioctl.c234 /* default rule should never be garbage collected */
300 struct pf_rule *rule; local
314 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr,
317 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr);
323 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr,
326 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr);
329 while ((rule != NULL) && (rule->nr != rule_number))
330 rule = TAILQ_NEXT(rule, entrie
373 pf_unlink_rule(struct pf_rulequeue *rulequeue, struct pf_rule *rule) argument
387 pf_free_rule(struct pf_rule *rule) argument
739 struct pf_rule *rule; local
761 struct pf_rule *rule; local
821 pf_hash_rule(MD5_CTX *ctx, struct pf_rule *rule) argument
863 struct pf_rule *rule, **old_array; local
921 struct pf_rule *rule; local
1146 struct pf_rule *rule, *tail; local
1344 struct pf_rule *rule; local
1992 struct pf_rule *rule; local
[all...]
/freebsd-11-stable/contrib/netbsd-tests/ipf/
H A Dt_bpf.sh52 { while read rule; do
53 atf_check -o save:save -x "echo '$rule' | ipftest -Rbr - -i in"
H A Dt_logging.sh47 { while read rule; do
48 echo $rule >>out
50 "echo $rule | ipftest -br - -F $2 -i in -l logout"
/freebsd-11-stable/contrib/ipfilter/rules/
H A Dipmon.conf22 rule = 12, logtag = 101, direction = in, result = block,
/freebsd-11-stable/contrib/byacc/
H A Dgraph.c55 int rule; local
68 rule = -(*sp);
69 fprintf(graph_file, " %s -> ", symbol_pname[rlhs[rule]]);
71 for (sp = ritem + rrhs[rule]; sp < sp1; sp++)
H A Dclosure.c27 int rule; local
36 for (rule = *sp; rule > 0; rule = *++sp)
38 symbol = ritem[rrhs[rule]];
65 int rule; local
93 while ((rule = *rp++) >= 0)
95 SETBIT(rrow, rule);
/freebsd-11-stable/sys/netpfil/ipfw/
H A Dip_fw_sockopt.c34 * Control socket and rule management routines for ipfw.
81 static int check_ipfw_rule1(struct ip_fw_rule *rule, int size,
83 static int check_ipfw_rule0(struct ip_fw_rule0 *rule, int size,
159 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule);
162 static int ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule,
166 static void unref_rule_objects(struct ip_fw_chain *chain, struct ip_fw *rule);
204 struct ip_fw *rule; local
206 rule = malloc(rulesize, M_IPFW, M_WAITOK | M_ZERO);
207 rule->cntr = uma_zalloc(V_ipfw_cntr_zone, M_WAITOK | M_ZERO);
208 rule
214 ipfw_free_rule(struct ip_fw *rule) argument
799 ipfw_add_protected_rule(struct ip_fw_chain *chain, struct ip_fw *rule, int locked) argument
826 ipfw_reap_add(struct ip_fw_chain *chain, struct ip_fw **head, struct ip_fw *rule) argument
847 struct ip_fw *rule; local
873 ipfw_match_range(struct ip_fw *rule, ipfw_range_tlv *rt) argument
1012 struct ip_fw *reap, *rule, **map; local
1100 struct ip_fw *rule; local
1189 struct ip_fw *rule; local
1224 ipfw_get_action(struct ip_fw *rule) argument
1254 clear_counters(struct ip_fw *rule, int log_only) argument
1272 struct ip_fw *rule; local
1432 struct ip_fw *rule; local
1621 struct ip_fw *rule; local
1683 check_ipfw_rule1(struct ip_fw_rule *rule, int size, struct rule_check_info *ci) argument
1716 check_ipfw_rule0(struct ip_fw_rule0 *rule, int size, struct rule_check_info *ci) argument
2149 struct ip_fw *rule; local
2378 mark_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct dump_args *da) argument
2425 struct ip_fw *rule; local
2605 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule) argument
2691 unref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule) argument
2787 ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct rule_check_info *ci, struct obj_idx *oib, struct tid_info *ti) argument
3813 struct ip_fw_rule0 *rule; local
4126 convert_rule_to_7(struct ip_fw_rule0 *rule) argument
4180 convert_rule_to_8(struct ip_fw_rule0 *rule) argument
[all...]
H A Dip_fw_eaction.c64 * the search continues to the next rule. If it has non zero value,
281 * will be decremented on rule deletion, thus we
376 ipfw_reset_eaction(struct ip_fw_chain *ch, struct ip_fw *rule, argument
389 cmd = ipfw_get_action(rule);
395 * to truncate the rule length.
398 * and rule length should be enough to keep O_EXTERNAL_INSTANCE
401 l = rule->cmd + rule->cmd_len - cmd;
414 EACTION_DEBUG("truncate rule %d: len %u -> %u",
415 rule
[all...]
H A Dip_fw_dynamic.c107 * Each state holds a pointer to the parent ipfw rule so we know what
108 * action to perform. Dynamic rules are removed when the parent rule is
131 void *parent; /* pointer to parent rule */
133 uint32_t f_pos; /* cached rule index */
139 uint16_t rulenum; /* parent rule number */
140 uint32_t ruleid; /* parent rule id */
162 void *parent; /* pointer to parent rule */
165 uint16_t rulenum; /* parent rule number */
166 uint32_t ruleid; /* parent rule id */
352 * seconds of lifetime of a rule
780 hash_parent(const struct ipfw_flow_id *id, const void *rule) argument
876 hash_parent(const struct ipfw_flow_id *id, const void *rule) argument
1110 dyn_lookup_ipv4_parent(const struct ipfw_flow_id *pkt, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t hashval) argument
1146 dyn_lookup_ipv4_parent_locked(const struct ipfw_flow_id *pkt, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t bucket) argument
1263 dyn_lookup_ipv6_parent(const struct ipfw_flow_id *pkt, uint32_t zoneid, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t hashval) argument
1300 dyn_lookup_ipv6_parent_locked(const struct ipfw_flow_id *pkt, uint32_t zoneid, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t bucket) argument
1336 struct ip_fw *rule; local
1539 dyn_add_ipv4_parent(void *rule, uint32_t ruleid, uint16_t rulenum, const struct ipfw_flow_id *pkt, uint32_t hashval, uint32_t version, uint16_t kidx) argument
1670 dyn_add_ipv6_parent(void *rule, uint32_t ruleid, uint16_t rulenum, const struct ipfw_flow_id *pkt, uint32_t zoneid, uint32_t hashval, uint32_t version, uint16_t kidx) argument
1773 dyn_get_parent_state(const struct ipfw_flow_id *pkt, uint32_t zoneid, struct ip_fw *rule, uint32_t hashval, uint32_t limit, uint16_t kidx) argument
1865 dyn_install_state(const struct ipfw_flow_id *pkt, uint32_t zoneid, uint16_t fibnum, const void *ulp, int pktlen, struct ip_fw *rule, struct ipfw_dyn_info *info, uint32_t limit, uint16_t limit_mask, uint16_t kidx, uint8_t type) argument
1990 ipfw_dyn_install_state(struct ip_fw_chain *chain, struct ip_fw *rule, const ipfw_insn_limit *cmd, const struct ip_fw_args *args, const void *ulp, int pktlen, struct ipfw_dyn_info *info, uint32_t tablearg) argument
2135 dyn_acquire_rule(struct ip_fw_chain *ch, struct dyn_data *data, struct ip_fw *rule, uint16_t kidx) argument
2162 dyn_release_rule(struct ip_fw_chain *ch, struct dyn_data *data, struct ip_fw *rule, uint16_t kidx) argument
2192 struct ip_fw *rule; local
2217 struct ip_fw *rule; local
2251 void *rule; local
2795 struct ip_fw *rule; local
2876 ipfw_is_dyn_rule(struct ip_fw *rule) argument
2969 struct ip_fw *rule; local
3001 struct ip_fw *rule; local
[all...]
/freebsd-11-stable/contrib/blacklist/libexec/
H A Dblacklistd-helper61 # use $ipfw_offset+$port for rule number
62 rule=$(($ipfw_offset + $6))
66 # if rule number $rule does not already exist, create it
67 /sbin/ipfw show $rule >/dev/null 2>&1 || \
68 /sbin/ipfw add $rule drop $3 from \
73 /sbin/npfctl rule "$2" add block in final $proto from \
77 # if the filtering rule does not exist, create it
101 /sbin/npfctl rule "$2" rem-id "$7"
118 /sbin/npfctl rule "
[all...]
/freebsd-11-stable/sys/sys/
H A Drctl.h55 * in the rule are met. There is no global list of rules; instead,
57 * they apply to - for example, a rule of type "user" is linked to the
61 * pointing to the rule.
64 * structures, to subjects. In order to change a rule, add a new rule
138 struct rctl_rule *rctl_rule_duplicate(const struct rctl_rule *rule, int flags);
139 void rctl_rule_acquire(struct rctl_rule *rule);
140 void rctl_rule_release(struct rctl_rule *rule);
141 int rctl_rule_add(struct rctl_rule *rule);
/freebsd-11-stable/contrib/subversion/subversion/libsvn_repos/
H A Dauthz_parse.c48 The strings in ACL.rule are allocated from the result pool.
126 /* Temporary buffers used to parse a rule into segments. */
152 /* The token indicating that an authz rule contains wildcards. */
193 acl->acl.rule.repos = interned_empty_string;
194 acl->acl.rule.len = 0;
195 acl->acl.rule.path = NULL;
471 /* Parse a rule path PATH up to PATH_LEN into *RULE.
473 SECTION is the whole rule in the authz file.
476 parse_rule_path(authz_rule_t *rule, argument
510 rule
668 check_unique_rule(ctor_baton_t *cb, const authz_rule_t *rule, const char *section) argument
712 const char *rule = section->data; local
[all...]
/freebsd-11-stable/sys/dev/mlx5/
H A Dfs.h149 /* Single destination per rule.
163 typedef int (*rule_event_fn)(struct mlx5_flow_rule *rule,
176 int mlx5_set_rule_private_data(struct mlx5_flow_rule *rule, struct
193 struct mlx5_flow_rule *rule);
196 struct mlx5_flow_rule *rule);
198 u8 mlx5_get_match_criteria_enable(struct mlx5_flow_rule *rule);

Completed in 140 milliseconds

12345