/freebsd-11-stable/contrib/tzdata/ |
H A D | zishrink.awk | 20 # Return a shortened rule name representing NAME, 45 rule["Arg"] = "A" 46 rule["Brazil"] = "B" 47 rule["Canada"] = "C" 48 rule["Denmark"] = "D" 49 rule["EU"] = "E" 50 rule["France"] = "F" 51 rule["GB-Eire"] = "G" 52 rule["Halifax"] = "H" 53 rule["Ital [all...] |
/freebsd-11-stable/contrib/libarchive/tar/ |
H A D | subst.c | 72 struct subst_rule *rule; local 83 rule = malloc(sizeof(*rule)); 84 if (rule == NULL) 86 rule->next = NULL; 87 rule->result = NULL; 90 subst->first_rule = rule; 92 subst->last_rule->next = rule; 93 subst->last_rule = rule; 107 if ((r = regcomp(&rule 216 struct subst_rule *rule; local 314 struct subst_rule *rule; local [all...] |
/freebsd-11-stable/lib/libugidfw/ |
H A D | ugidfw.h | 38 int bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, 43 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr); 45 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr); 49 int bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule, 52 int bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule, 54 int bsde_add_rule(int *rulename, struct mac_bsdextended_rule *rule,
|
H A D | ugidfw.c | 62 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) argument 67 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1]; 79 if (rule->mbr_subject.mbs_flags) { 80 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) { 91 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) { 98 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) { 99 pwd = getpwuid(rule->mbr_subject.mbs_uid_min); 109 rule->mbr_subject.mbs_uid_min); 115 if (rule->mbr_subject.mbs_uid_min != 116 rule 1009 bsde_parse_rule(int argc, char *argv[], struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument 1079 bsde_parse_rule_string(const char *string, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument 1190 bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t errlen, char *errstr) argument 1230 struct mac_bsdextended_rule rule; local 1260 bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument 1292 bsde_add_rule(int *rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument [all...] |
/freebsd-11-stable/sys/security/mac_portacl/ |
H A D | mac_portacl.c | 114 struct rule { struct 120 TAILQ_ENTRY(rule) r_entries; 129 * Text format for the rule string is that a rule consists of a 136 static TAILQ_HEAD(rulehead, rule) rule_head; 142 struct rule *rule; local 144 while ((rule = TAILQ_FIRST(head)) != NULL) { 145 TAILQ_REMOVE(head, rule, r_entries); 146 free(rule, M_PORTAC 174 parse_rule_element(char *element, struct rule **rule) argument 380 struct rule *rule; local [all...] |
/freebsd-11-stable/sys/security/mac_bsdextended/ |
H A D | mac_bsdextended.c | 83 "BSD Extended MAC rule"); 94 &rule_slots, 0, "Number of used rule slots\n"); 108 * between the new mode (first rule matches) and the old functionality (all 114 "Disable/enable match first rule functionality"); 117 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) argument 120 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) 122 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) 124 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) 126 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) 128 if (((rule 228 ugidfw_rulecheck(struct mac_bsdextended_rule *rule, struct ucred *cred, struct vnode *vp, struct vattr *vap, int acc_mode) argument [all...] |
/freebsd-11-stable/sys/kern/ |
H A D | kern_rctl.c | 122 * 'rctl_rule_link' connects a rule with every racct it's related to. 123 * For example, rule 'user:X:openfiles:deny=N/process' is linked 216 static int rctl_rule_fully_specified(const struct rctl_rule *rule); 217 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule); 329 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) argument 336 switch (rule->rr_per) { 346 panic("%s: unknown per %d", __func__, rule->rr_per); 352 * hitting 'rule'. 355 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) argument 363 racct = rctl_proc_rule_to_racct(p, rule); 379 struct rctl_rule *rule; local 422 struct rctl_rule *rule; local 496 struct rctl_rule *rule; local 693 struct rctl_rule *rule; local 720 struct rctl_rule *rule; local 757 rctl_rule_matches(const struct rctl_rule *rule, const struct rctl_rule *filter) argument 875 rctl_racct_add_rule(struct racct *racct, struct rctl_rule *rule) argument 893 rctl_racct_add_rule_locked(struct racct *racct, struct rctl_rule *rule) argument 941 rctl_rule_acquire_subject(struct rctl_rule *rule) argument 969 rctl_rule_release_subject(struct rctl_rule *rule) argument 999 struct rctl_rule *rule; local 1021 rctl_rule_duplicate(const struct rctl_rule *rule, int flags) argument 1046 rctl_rule_acquire(struct rctl_rule *rule) argument 1058 struct rctl_rule *rule; local 1074 rctl_rule_release(struct rctl_rule *rule) argument 1094 rctl_rule_fully_specified(const struct rctl_rule *rule) argument 1137 struct rctl_rule *rule; local 1265 rctl_rule_add(struct rctl_rule *rule) argument 1469 rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule) argument 1869 struct rctl_rule *rule; local 2101 struct rctl_rule *rule; local [all...] |
/freebsd-11-stable/sbin/devfs/ |
H A D | Makefile | 5 SRCS= devfs.c rule.c
|
/freebsd-11-stable/usr.bin/rctl/ |
H A D | rctl.c | 69 warnx("malformed rule '%s': unknown user '%s'", 76 warnx("malformed rule '%s': trailing characters " 97 warnx("malformed rule '%s': unknown group '%s'", 104 warnx("malformed rule '%s': trailing characters " 116 expand_amount(const char *rule, const char *unexpanded_rule) argument 123 tofree = copy = strdup(rule); 141 copy = strdup(rule); 155 warnx("malformed rule '%s': invalid numeric value '%s'", 181 expand_rule(const char *rule, bool resolve_ids) argument 188 tofree = copy = strdup(rule); 253 humanize_ids(char *rule) argument 311 humanize_amount(char *rule) argument 365 char *rule; local 400 add_rule(const char *rule, const char *unexpanded_rule) argument 595 char *rule = NULL, *unexpanded_rule; local [all...] |
/freebsd-11-stable/contrib/pf/ftp-proxy/ |
H A D | filter.c | 70 pfr.rule.direction = dir; 103 pfr.rule.rpool.proxy_port[0] = nat_range_low; 104 pfr.rule.rpool.proxy_port[1] = nat_range_high; 136 pfr.rule.rpool.proxy_port[0] = rdr_port; 258 /* Generic for all rule types. */ 259 pfr.rule.af = src->sa_family; 260 pfr.rule.proto = IPPROTO_TCP; 261 pfr.rule.src.addr.type = PF_ADDR_ADDRMASK; 262 pfr.rule.dst.addr.type = PF_ADDR_ADDRMASK; 264 memcpy(&pfr.rule [all...] |
/freebsd-11-stable/contrib/pf/tftp-proxy/ |
H A D | filter.c | 74 pfr.rule.direction = dir; 107 pfr.rule.rpool.proxy_port[0] = nat_range_low; 108 pfr.rule.rpool.proxy_port[1] = nat_range_high; 140 pfr.rule.rpool.proxy_port[0] = rdr_port; 267 /* Generic for all rule types. */ 268 pfr.rule.af = src->sa_family; 269 pfr.rule.proto = proto; 270 pfr.rule.src.addr.type = PF_ADDR_ADDRMASK; 271 pfr.rule.dst.addr.type = PF_ADDR_ADDRMASK; 273 memcpy(&pfr.rule [all...] |
/freebsd-11-stable/usr.sbin/ugidfw/ |
H A D | ugidfw.c | 77 struct mac_bsdextended_rule rule; local 80 error = bsde_parse_rule(argc, argv, &rule, BUFSIZ, errstr); 86 error = bsde_add_rule(&rulenum, &rule, BUFSIZ, errstr); 91 if (bsde_rule_to_string(&rule, charstr, BUFSIZ) == -1) 92 warnx("Added rule, but unable to print string."); 101 struct mac_bsdextended_rule rule; local 106 warnx("unable to get rule slots; mac_bsdextended.ko " 118 error = bsde_get_rule(i, &rule, BUFSIZ, errstr); 123 warnx("rule %d: %s", i, errstr); 129 if (bsde_rule_to_string(&rule, charst 140 struct mac_bsdextended_rule rule; local [all...] |
/freebsd-11-stable/sys/netpfil/pf/ |
H A D | pf_ioctl.c | 234 /* default rule should never be garbage collected */ 300 struct pf_rule *rule; local 314 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, 317 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); 323 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, 326 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); 329 while ((rule != NULL) && (rule->nr != rule_number)) 330 rule = TAILQ_NEXT(rule, entrie 373 pf_unlink_rule(struct pf_rulequeue *rulequeue, struct pf_rule *rule) argument 387 pf_free_rule(struct pf_rule *rule) argument 739 struct pf_rule *rule; local 761 struct pf_rule *rule; local 821 pf_hash_rule(MD5_CTX *ctx, struct pf_rule *rule) argument 863 struct pf_rule *rule, **old_array; local 921 struct pf_rule *rule; local 1146 struct pf_rule *rule, *tail; local 1344 struct pf_rule *rule; local 1992 struct pf_rule *rule; local [all...] |
/freebsd-11-stable/contrib/netbsd-tests/ipf/ |
H A D | t_bpf.sh | 52 { while read rule; do 53 atf_check -o save:save -x "echo '$rule' | ipftest -Rbr - -i in"
|
H A D | t_logging.sh | 47 { while read rule; do 48 echo $rule >>out 50 "echo $rule | ipftest -br - -F $2 -i in -l logout"
|
/freebsd-11-stable/contrib/ipfilter/rules/ |
H A D | ipmon.conf | 22 rule = 12, logtag = 101, direction = in, result = block,
|
/freebsd-11-stable/contrib/byacc/ |
H A D | graph.c | 55 int rule; local 68 rule = -(*sp); 69 fprintf(graph_file, " %s -> ", symbol_pname[rlhs[rule]]); 71 for (sp = ritem + rrhs[rule]; sp < sp1; sp++)
|
H A D | closure.c | 27 int rule; local 36 for (rule = *sp; rule > 0; rule = *++sp) 38 symbol = ritem[rrhs[rule]]; 65 int rule; local 93 while ((rule = *rp++) >= 0) 95 SETBIT(rrow, rule);
|
/freebsd-11-stable/sys/netpfil/ipfw/ |
H A D | ip_fw_sockopt.c | 34 * Control socket and rule management routines for ipfw. 81 static int check_ipfw_rule1(struct ip_fw_rule *rule, int size, 83 static int check_ipfw_rule0(struct ip_fw_rule0 *rule, int size, 159 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule); 162 static int ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, 166 static void unref_rule_objects(struct ip_fw_chain *chain, struct ip_fw *rule); 204 struct ip_fw *rule; local 206 rule = malloc(rulesize, M_IPFW, M_WAITOK | M_ZERO); 207 rule->cntr = uma_zalloc(V_ipfw_cntr_zone, M_WAITOK | M_ZERO); 208 rule 214 ipfw_free_rule(struct ip_fw *rule) argument 799 ipfw_add_protected_rule(struct ip_fw_chain *chain, struct ip_fw *rule, int locked) argument 826 ipfw_reap_add(struct ip_fw_chain *chain, struct ip_fw **head, struct ip_fw *rule) argument 847 struct ip_fw *rule; local 873 ipfw_match_range(struct ip_fw *rule, ipfw_range_tlv *rt) argument 1012 struct ip_fw *reap, *rule, **map; local 1100 struct ip_fw *rule; local 1189 struct ip_fw *rule; local 1224 ipfw_get_action(struct ip_fw *rule) argument 1254 clear_counters(struct ip_fw *rule, int log_only) argument 1272 struct ip_fw *rule; local 1432 struct ip_fw *rule; local 1621 struct ip_fw *rule; local 1683 check_ipfw_rule1(struct ip_fw_rule *rule, int size, struct rule_check_info *ci) argument 1716 check_ipfw_rule0(struct ip_fw_rule0 *rule, int size, struct rule_check_info *ci) argument 2149 struct ip_fw *rule; local 2378 mark_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct dump_args *da) argument 2425 struct ip_fw *rule; local 2605 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule) argument 2691 unref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule) argument 2787 ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct rule_check_info *ci, struct obj_idx *oib, struct tid_info *ti) argument 3813 struct ip_fw_rule0 *rule; local 4126 convert_rule_to_7(struct ip_fw_rule0 *rule) argument 4180 convert_rule_to_8(struct ip_fw_rule0 *rule) argument [all...] |
H A D | ip_fw_eaction.c | 64 * the search continues to the next rule. If it has non zero value, 281 * will be decremented on rule deletion, thus we 376 ipfw_reset_eaction(struct ip_fw_chain *ch, struct ip_fw *rule, argument 389 cmd = ipfw_get_action(rule); 395 * to truncate the rule length. 398 * and rule length should be enough to keep O_EXTERNAL_INSTANCE 401 l = rule->cmd + rule->cmd_len - cmd; 414 EACTION_DEBUG("truncate rule %d: len %u -> %u", 415 rule [all...] |
H A D | ip_fw_dynamic.c | 107 * Each state holds a pointer to the parent ipfw rule so we know what 108 * action to perform. Dynamic rules are removed when the parent rule is 131 void *parent; /* pointer to parent rule */ 133 uint32_t f_pos; /* cached rule index */ 139 uint16_t rulenum; /* parent rule number */ 140 uint32_t ruleid; /* parent rule id */ 162 void *parent; /* pointer to parent rule */ 165 uint16_t rulenum; /* parent rule number */ 166 uint32_t ruleid; /* parent rule id */ 352 * seconds of lifetime of a rule 780 hash_parent(const struct ipfw_flow_id *id, const void *rule) argument 876 hash_parent(const struct ipfw_flow_id *id, const void *rule) argument 1110 dyn_lookup_ipv4_parent(const struct ipfw_flow_id *pkt, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t hashval) argument 1146 dyn_lookup_ipv4_parent_locked(const struct ipfw_flow_id *pkt, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t bucket) argument 1263 dyn_lookup_ipv6_parent(const struct ipfw_flow_id *pkt, uint32_t zoneid, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t hashval) argument 1300 dyn_lookup_ipv6_parent_locked(const struct ipfw_flow_id *pkt, uint32_t zoneid, const void *rule, uint32_t ruleid, uint16_t rulenum, uint32_t bucket) argument 1336 struct ip_fw *rule; local 1539 dyn_add_ipv4_parent(void *rule, uint32_t ruleid, uint16_t rulenum, const struct ipfw_flow_id *pkt, uint32_t hashval, uint32_t version, uint16_t kidx) argument 1670 dyn_add_ipv6_parent(void *rule, uint32_t ruleid, uint16_t rulenum, const struct ipfw_flow_id *pkt, uint32_t zoneid, uint32_t hashval, uint32_t version, uint16_t kidx) argument 1773 dyn_get_parent_state(const struct ipfw_flow_id *pkt, uint32_t zoneid, struct ip_fw *rule, uint32_t hashval, uint32_t limit, uint16_t kidx) argument 1865 dyn_install_state(const struct ipfw_flow_id *pkt, uint32_t zoneid, uint16_t fibnum, const void *ulp, int pktlen, struct ip_fw *rule, struct ipfw_dyn_info *info, uint32_t limit, uint16_t limit_mask, uint16_t kidx, uint8_t type) argument 1990 ipfw_dyn_install_state(struct ip_fw_chain *chain, struct ip_fw *rule, const ipfw_insn_limit *cmd, const struct ip_fw_args *args, const void *ulp, int pktlen, struct ipfw_dyn_info *info, uint32_t tablearg) argument 2135 dyn_acquire_rule(struct ip_fw_chain *ch, struct dyn_data *data, struct ip_fw *rule, uint16_t kidx) argument 2162 dyn_release_rule(struct ip_fw_chain *ch, struct dyn_data *data, struct ip_fw *rule, uint16_t kidx) argument 2192 struct ip_fw *rule; local 2217 struct ip_fw *rule; local 2251 void *rule; local 2795 struct ip_fw *rule; local 2876 ipfw_is_dyn_rule(struct ip_fw *rule) argument 2969 struct ip_fw *rule; local 3001 struct ip_fw *rule; local [all...] |
/freebsd-11-stable/contrib/blacklist/libexec/ |
H A D | blacklistd-helper | 61 # use $ipfw_offset+$port for rule number 62 rule=$(($ipfw_offset + $6)) 66 # if rule number $rule does not already exist, create it 67 /sbin/ipfw show $rule >/dev/null 2>&1 || \ 68 /sbin/ipfw add $rule drop $3 from \ 73 /sbin/npfctl rule "$2" add block in final $proto from \ 77 # if the filtering rule does not exist, create it 101 /sbin/npfctl rule "$2" rem-id "$7" 118 /sbin/npfctl rule " [all...] |
/freebsd-11-stable/sys/sys/ |
H A D | rctl.h | 55 * in the rule are met. There is no global list of rules; instead, 57 * they apply to - for example, a rule of type "user" is linked to the 61 * pointing to the rule. 64 * structures, to subjects. In order to change a rule, add a new rule 138 struct rctl_rule *rctl_rule_duplicate(const struct rctl_rule *rule, int flags); 139 void rctl_rule_acquire(struct rctl_rule *rule); 140 void rctl_rule_release(struct rctl_rule *rule); 141 int rctl_rule_add(struct rctl_rule *rule);
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | authz_parse.c | 48 The strings in ACL.rule are allocated from the result pool. 126 /* Temporary buffers used to parse a rule into segments. */ 152 /* The token indicating that an authz rule contains wildcards. */ 193 acl->acl.rule.repos = interned_empty_string; 194 acl->acl.rule.len = 0; 195 acl->acl.rule.path = NULL; 471 /* Parse a rule path PATH up to PATH_LEN into *RULE. 473 SECTION is the whole rule in the authz file. 476 parse_rule_path(authz_rule_t *rule, argument 510 rule 668 check_unique_rule(ctor_baton_t *cb, const authz_rule_t *rule, const char *section) argument 712 const char *rule = section->data; local [all...] |
/freebsd-11-stable/sys/dev/mlx5/ |
H A D | fs.h | 149 /* Single destination per rule. 163 typedef int (*rule_event_fn)(struct mlx5_flow_rule *rule, 176 int mlx5_set_rule_private_data(struct mlx5_flow_rule *rule, struct 193 struct mlx5_flow_rule *rule); 196 struct mlx5_flow_rule *rule); 198 u8 mlx5_get_match_criteria_enable(struct mlx5_flow_rule *rule);
|