Searched refs:rule (Results 1 - 25 of 105) sorted by relevance

12345

/freebsd-13-stable/contrib/tzdata/
H A Dzishrink.awk20 # Return a shortened rule name representing NAME,
45 rule["Arg"] = "A"
46 rule["Brazil"] = "B"
47 rule["Canada"] = "C"
48 rule["Denmark"] = "D"
49 rule["EU"] = "E"
50 rule["France"] = "F"
51 rule["GB-Eire"] = "G"
52 rule["Halifax"] = "H"
53 rule["Ital
[all...]
/freebsd-13-stable/contrib/libarchive/tar/
H A Dsubst.c72 struct subst_rule *rule; local
83 rule = malloc(sizeof(*rule));
84 if (rule == NULL)
86 rule->next = NULL;
87 rule->result = NULL;
90 subst->first_rule = rule;
92 subst->last_rule->next = rule;
93 subst->last_rule = rule;
107 if ((r = regcomp(&rule
216 struct subst_rule *rule; local
314 struct subst_rule *rule; local
[all...]
/freebsd-13-stable/lib/libugidfw/
H A Dugidfw.h40 int bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf,
45 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr);
47 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr);
51 int bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule,
54 int bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule,
56 int bsde_add_rule(int *rulename, struct mac_bsdextended_rule *rule,
H A Dugidfw.c64 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) argument
69 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1];
81 if (rule->mbr_subject.mbs_flags) {
82 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) {
93 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) {
100 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) {
101 pwd = getpwuid(rule->mbr_subject.mbs_uid_min);
111 rule->mbr_subject.mbs_uid_min);
117 if (rule->mbr_subject.mbs_uid_min !=
118 rule
1010 bsde_parse_rule(int argc, char *argv[], struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
1080 bsde_parse_rule_string(const char *string, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
1191 bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t errlen, char *errstr) argument
1231 struct mac_bsdextended_rule rule; local
1261 bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
1293 bsde_add_rule(int *rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
[all...]
/freebsd-13-stable/sys/netpfil/pf/
H A Dpf_nv.c481 pf_nvrule_to_krule(const nvlist_t *nvl, struct pf_krule *rule) argument
487 PFNV_CHK(pf_nvuint32(nvl, "nr", &rule->nr));
493 &rule->src);
501 &rule->dst));
504 PFNV_CHK(pf_nvstring(nvl, "label", rule->label[0],
505 sizeof(rule->label[0])));
516 ret = strlcpy(rule->label[i], strs[i],
517 sizeof(rule->label[0]));
518 if (ret >= sizeof(rule->label[0]))
523 PFNV_CHK(pf_nvstring(nvl, "ifname", rule
634 pf_divert_to_nvdivert(const struct pf_krule *rule) argument
658 pf_krule_to_nvrule(const struct pf_krule *rule) argument
[all...]
H A Dpf_ioctl.c167 "Size of pf(4) rule tag hashtable");
295 /* default rule should never be garbage collected */
365 struct pf_krule *rule; local
379 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr,
382 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr);
388 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr,
391 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr);
394 while ((rule != NULL) && (rule->nr != rule_number))
395 rule
438 pf_unlink_rule(struct pf_krulequeue *rulequeue, struct pf_krule *rule) argument
452 pf_free_rule(struct pf_krule *rule) argument
922 struct pf_krule *rule; local
944 struct pf_krule *rule; local
1004 pf_hash_rule(MD5_CTX *ctx, struct pf_krule *rule) argument
1063 struct pf_krule *rule, **old_array, *tail; local
1143 struct pf_krule *rule; local
1491 pf_krule_free(struct pf_krule *rule) argument
1561 pf_krule_to_rule(const struct pf_krule *krule, struct pf_rule *rule) argument
1662 pf_rule_to_krule(const struct pf_rule *rule, struct pf_krule *krule) argument
1770 pf_label_match(const struct pf_krule *rule, const char *label) argument
1925 pf_ioctl_addrule(struct pf_krule *rule, uint32_t ticket, uint32_t pool_ticket, const char *anchor, const char *anchor_call, struct thread *td) argument
2250 struct pf_krule *rule = NULL; local
2310 struct pf_krule *rule; local
2361 struct pf_krule *rule; local
2419 struct pf_krule *rule; local
3066 struct pf_krule *rule; local
[all...]
/freebsd-13-stable/sys/security/mac_portacl/
H A Dmac_portacl.c115 struct rule { struct
121 TAILQ_ENTRY(rule) r_entries;
130 * Text format for the rule string is that a rule consists of a
137 static TAILQ_HEAD(rulehead, rule) rule_head;
143 struct rule *rule; local
145 while ((rule = TAILQ_FIRST(head)) != NULL) {
146 TAILQ_REMOVE(head, rule, r_entries);
147 free(rule, M_PORTAC
175 parse_rule_element(char *element, struct rule **rule) argument
383 struct rule *rule; local
[all...]
/freebsd-13-stable/sys/kern/
H A Dkern_rctl.c128 * 'rctl_rule_link' connects a rule with every racct it's related to.
129 * For example, rule 'user:X:openfiles:deny=N/process' is linked
222 static int rctl_rule_fully_specified(const struct rctl_rule *rule);
223 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule);
335 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) argument
342 switch (rule->rr_per) {
352 panic("%s: unknown per %d", __func__, rule->rr_per);
358 * hitting 'rule'.
361 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) argument
369 racct = rctl_proc_rule_to_racct(p, rule);
385 struct rctl_rule *rule; local
428 struct rctl_rule *rule; local
502 struct rctl_rule *rule; local
704 struct rctl_rule *rule; local
731 struct rctl_rule *rule; local
768 rctl_rule_matches(const struct rctl_rule *rule, const struct rctl_rule *filter) argument
886 rctl_racct_add_rule(struct racct *racct, struct rctl_rule *rule) argument
904 rctl_racct_add_rule_locked(struct racct *racct, struct rctl_rule *rule) argument
952 rctl_rule_acquire_subject(struct rctl_rule *rule) argument
980 rctl_rule_release_subject(struct rctl_rule *rule) argument
1010 struct rctl_rule *rule; local
1032 rctl_rule_duplicate(const struct rctl_rule *rule, int flags) argument
1057 rctl_rule_acquire(struct rctl_rule *rule) argument
1069 struct rctl_rule *rule; local
1085 rctl_rule_release(struct rctl_rule *rule) argument
1105 rctl_rule_fully_specified(const struct rctl_rule *rule) argument
1148 struct rctl_rule *rule; local
1276 rctl_rule_add(struct rctl_rule *rule) argument
1480 rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule) argument
1880 struct rctl_rule *rule; local
2112 struct rctl_rule *rule; local
[all...]
/freebsd-13-stable/sys/security/mac_bsdextended/
H A Dmac_bsdextended.c84 "BSD Extended MAC rule");
95 &rule_slots, 0, "Number of used rule slots\n");
109 * between the new mode (first rule matches) and the old functionality (all
115 "Disable/enable match first rule functionality");
118 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) argument
121 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS)
123 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS)
125 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS)
127 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS)
129 if (((rule
229 ugidfw_rulecheck(struct mac_bsdextended_rule *rule, struct ucred *cred, struct vnode *vp, struct vattr *vap, int acc_mode) argument
[all...]
/freebsd-13-stable/usr.bin/rctl/
H A Drctl.c68 warnx("malformed rule '%s': unknown user '%s'",
75 warnx("malformed rule '%s': trailing characters "
96 warnx("malformed rule '%s': unknown group '%s'",
103 warnx("malformed rule '%s': trailing characters "
115 expand_amount(const char *rule, const char *unexpanded_rule) argument
122 tofree = copy = strdup(rule);
140 copy = strdup(rule);
154 warnx("malformed rule '%s': invalid numeric value '%s'",
180 expand_rule(const char *rule, bool resolve_ids) argument
187 tofree = copy = strdup(rule);
252 humanize_ids(char *rule) argument
310 humanize_amount(char *rule) argument
364 char *rule; local
400 add_rule(const char *rule, const char *unexpanded_rule) argument
595 char *rule = NULL, *unexpanded_rule; local
[all...]
/freebsd-13-stable/lib/libpfctl/
H A Dlibpfctl.c309 pf_nvdivert_to_divert(const nvlist_t *nvl, struct pfctl_rule *rule) argument
311 pf_nvaddr_to_addr(nvlist_get_nvlist(nvl, "addr"), &rule->divert.addr);
312 rule->divert.port = nvlist_get_number(nvl, "port");
316 pf_nvrule_to_rule(const nvlist_t *nvl, struct pfctl_rule *rule) argument
322 rule->nr = nvlist_get_number(nvl, "nr");
324 pf_nvrule_addr_to_rule_addr(nvlist_get_nvlist(nvl, "src"), &rule->src);
325 pf_nvrule_addr_to_rule_addr(nvlist_get_nvlist(nvl, "dst"), &rule->dst);
331 rule->skip[i].nr = skip[i];
336 strlcpy(rule->label[i], labels[i], PF_RULE_LABEL_SIZE);
337 strlcpy(rule
536 pfctl_get_rule(int dev, u_int32_t nr, u_int32_t ticket, const char *anchor, u_int32_t ruleset, struct pfctl_rule *rule, char *anchor_call) argument
543 pfctl_get_clear_rule(int dev, u_int32_t nr, u_int32_t ticket, const char *anchor, u_int32_t ruleset, struct pfctl_rule *rule, char *anchor_call, bool clear) argument
[all...]
/freebsd-13-stable/sbin/devfs/
H A DMakefile8 SRCS= devfs.c rule.c
/freebsd-13-stable/sys/contrib/openzfs/contrib/initramfs/hooks/
H A Dzfs.in38 copy_file rule "@udevruledir@/60-zvol.rules"
39 copy_file rule "@udevruledir@/69-vdev.rules"
/freebsd-13-stable/usr.sbin/ugidfw/
H A Dugidfw.c77 struct mac_bsdextended_rule rule; local
80 error = bsde_parse_rule(argc, argv, &rule, BUFSIZ, errstr);
86 error = bsde_add_rule(&rulenum, &rule, BUFSIZ, errstr);
91 if (bsde_rule_to_string(&rule, charstr, BUFSIZ) == -1)
92 warnx("Added rule, but unable to print string.");
101 struct mac_bsdextended_rule rule; local
106 warnx("unable to get rule slots; mac_bsdextended.ko "
118 error = bsde_get_rule(i, &rule, BUFSIZ, errstr);
123 warnx("rule %d: %s", i, errstr);
129 if (bsde_rule_to_string(&rule, charst
140 struct mac_bsdextended_rule rule; local
[all...]
/freebsd-13-stable/contrib/ipfilter/rules/
H A Dipmon.conf22 rule = 12, logtag = 101, direction = in, result = block,
/freebsd-13-stable/contrib/netbsd-tests/ipf/
H A Dt_bpf.sh52 { while read rule; do
53 atf_check -o save:save -x "echo '$rule' | ipftest -Rbr - -i in"
H A Dt_logging.sh47 { while read rule; do
48 echo $rule >>out
50 "echo $rule | ipftest -br - -F $2 -i in -l logout"
/freebsd-13-stable/contrib/byacc/
H A Dgraph.c55 int rule; local
68 rule = -(*sp);
69 fprintf(graph_file, " %s -> ", symbol_pname[rlhs[rule]]);
71 for (sp = ritem + rrhs[rule]; sp < sp1; sp++)
H A Dclosure.c27 int rule; local
36 for (rule = *sp; rule > 0; rule = *++sp)
38 symbol = ritem[rrhs[rule]];
65 int rule; local
93 while ((rule = *rp++) >= 0)
95 SETBIT(rrow, rule);
/freebsd-13-stable/sys/netpfil/ipfw/
H A Dip_fw_sockopt.c36 * Control socket and rule management routines for ipfw.
82 static int check_ipfw_rule1(struct ip_fw_rule *rule, int size,
84 static int check_ipfw_rule0(struct ip_fw_rule0 *rule, int size,
160 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule);
163 static int ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule,
167 static void unref_rule_objects(struct ip_fw_chain *chain, struct ip_fw *rule);
205 struct ip_fw *rule; local
207 rule = malloc(rulesize, M_IPFW, M_WAITOK | M_ZERO);
208 rule->cntr = uma_zalloc_pcpu(V_ipfw_cntr_zone, M_WAITOK | M_ZERO);
209 rule
215 ipfw_free_rule(struct ip_fw *rule) argument
792 ipfw_add_protected_rule(struct ip_fw_chain *chain, struct ip_fw *rule, int locked) argument
819 ipfw_reap_add(struct ip_fw_chain *chain, struct ip_fw **head, struct ip_fw *rule) argument
840 struct ip_fw *rule; local
866 ipfw_match_range(struct ip_fw *rule, ipfw_range_tlv *rt) argument
1005 struct ip_fw *reap, *rule, **map; local
1093 struct ip_fw *rule; local
1182 struct ip_fw *rule; local
1217 ipfw_get_action(struct ip_fw *rule) argument
1247 clear_counters(struct ip_fw *rule, int log_only) argument
1265 struct ip_fw *rule; local
1425 struct ip_fw *rule; local
1614 struct ip_fw *rule; local
1675 check_ipfw_rule1(struct ip_fw_rule *rule, int size, struct rule_check_info *ci) argument
1708 check_ipfw_rule0(struct ip_fw_rule0 *rule, int size, struct rule_check_info *ci) argument
2139 struct ip_fw *rule; local
2367 mark_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct dump_args *da) argument
2414 struct ip_fw *rule; local
2594 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule) argument
2678 unref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule) argument
2773 ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct rule_check_info *ci, struct obj_idx *oib, struct tid_info *ti) argument
3797 struct ip_fw_rule0 *rule; local
4109 convert_rule_to_7(struct ip_fw_rule0 *rule) argument
4163 convert_rule_to_8(struct ip_fw_rule0 *rule) argument
[all...]
/freebsd-13-stable/tests/sys/netpfil/pf/ioctl/
H A Dvalidation.c806 struct pfioc_rule rule; local
810 memset(&rule, 0x42, sizeof(rule));
812 rule.ticket = 0;
813 rule.pool_ticket = 0;
814 rule.anchor[0] = 0;
816 rule.rule.return_icmp = 0;
817 bzero(&rule.rule
[all...]
/freebsd-13-stable/contrib/blacklist/libexec/
H A Dblacklistd-helper61 # use $ipfw_offset+$port for rule number
62 rule=$(($ipfw_offset + $6))
66 # if rule number $rule does not already exist, create it
67 /sbin/ipfw show $rule >/dev/null 2>&1 || \
68 /sbin/ipfw add $rule drop $3 from \
73 /sbin/npfctl rule "$2" add block in final $proto from \
77 # if the filtering rule does not exist, create it
101 /sbin/npfctl rule "$2" rem-id "$7"
118 /sbin/npfctl rule "
[all...]
/freebsd-13-stable/sys/sys/
H A Drctl.h56 * in the rule are met. There is no global list of rules; instead,
58 * they apply to - for example, a rule of type "user" is linked to the
62 * pointing to the rule.
65 * structures, to subjects. In order to change a rule, add a new rule
139 struct rctl_rule *rctl_rule_duplicate(const struct rctl_rule *rule, int flags);
140 void rctl_rule_acquire(struct rctl_rule *rule);
141 void rctl_rule_release(struct rctl_rule *rule);
142 int rctl_rule_add(struct rctl_rule *rule);
/freebsd-13-stable/contrib/subversion/subversion/libsvn_repos/
H A Dauthz_parse.c48 The strings in ACL.rule are allocated from the result pool.
126 /* Temporary buffers used to parse a rule into segments. */
152 /* The token indicating that an authz rule contains wildcards. */
193 acl->acl.rule.repos = interned_empty_string;
194 acl->acl.rule.len = 0;
195 acl->acl.rule.path = NULL;
471 /* Parse a rule path PATH up to PATH_LEN into *RULE.
473 SECTION is the whole rule in the authz file.
476 parse_rule_path(authz_rule_t *rule, argument
510 rule
668 check_unique_rule(ctor_baton_t *cb, const authz_rule_t *rule, const char *section) argument
712 const char *rule = section->data; local
[all...]
/freebsd-13-stable/contrib/kyua/admin/
H A Dcheck-style.sh109 for rule in $(guess_rules "${file}"); do
110 awk -f "${srcdir}/admin/check-style-${rule}.awk" \

Completed in 177 milliseconds

12345