/freebsd-13-stable/contrib/tzdata/ |
H A D | zishrink.awk | 20 # Return a shortened rule name representing NAME, 45 rule["Arg"] = "A" 46 rule["Brazil"] = "B" 47 rule["Canada"] = "C" 48 rule["Denmark"] = "D" 49 rule["EU"] = "E" 50 rule["France"] = "F" 51 rule["GB-Eire"] = "G" 52 rule["Halifax"] = "H" 53 rule["Ital [all...] |
/freebsd-13-stable/contrib/libarchive/tar/ |
H A D | subst.c | 72 struct subst_rule *rule; local 83 rule = malloc(sizeof(*rule)); 84 if (rule == NULL) 86 rule->next = NULL; 87 rule->result = NULL; 90 subst->first_rule = rule; 92 subst->last_rule->next = rule; 93 subst->last_rule = rule; 107 if ((r = regcomp(&rule 216 struct subst_rule *rule; local 314 struct subst_rule *rule; local [all...] |
/freebsd-13-stable/lib/libugidfw/ |
H A D | ugidfw.h | 40 int bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, 45 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr); 47 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr); 51 int bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule, 54 int bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule, 56 int bsde_add_rule(int *rulename, struct mac_bsdextended_rule *rule,
|
H A D | ugidfw.c | 64 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) argument 69 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1]; 81 if (rule->mbr_subject.mbs_flags) { 82 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) { 93 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) { 100 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) { 101 pwd = getpwuid(rule->mbr_subject.mbs_uid_min); 111 rule->mbr_subject.mbs_uid_min); 117 if (rule->mbr_subject.mbs_uid_min != 118 rule 1010 bsde_parse_rule(int argc, char *argv[], struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument 1080 bsde_parse_rule_string(const char *string, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument 1191 bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t errlen, char *errstr) argument 1231 struct mac_bsdextended_rule rule; local 1261 bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument 1293 bsde_add_rule(int *rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument [all...] |
/freebsd-13-stable/sys/netpfil/pf/ |
H A D | pf_nv.c | 481 pf_nvrule_to_krule(const nvlist_t *nvl, struct pf_krule *rule) argument 487 PFNV_CHK(pf_nvuint32(nvl, "nr", &rule->nr)); 493 &rule->src); 501 &rule->dst)); 504 PFNV_CHK(pf_nvstring(nvl, "label", rule->label[0], 505 sizeof(rule->label[0]))); 516 ret = strlcpy(rule->label[i], strs[i], 517 sizeof(rule->label[0])); 518 if (ret >= sizeof(rule->label[0])) 523 PFNV_CHK(pf_nvstring(nvl, "ifname", rule 634 pf_divert_to_nvdivert(const struct pf_krule *rule) argument 658 pf_krule_to_nvrule(const struct pf_krule *rule) argument [all...] |
H A D | pf_ioctl.c | 167 "Size of pf(4) rule tag hashtable"); 295 /* default rule should never be garbage collected */ 365 struct pf_krule *rule; local 379 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, 382 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); 388 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, 391 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); 394 while ((rule != NULL) && (rule->nr != rule_number)) 395 rule 438 pf_unlink_rule(struct pf_krulequeue *rulequeue, struct pf_krule *rule) argument 452 pf_free_rule(struct pf_krule *rule) argument 922 struct pf_krule *rule; local 944 struct pf_krule *rule; local 1004 pf_hash_rule(MD5_CTX *ctx, struct pf_krule *rule) argument 1063 struct pf_krule *rule, **old_array, *tail; local 1143 struct pf_krule *rule; local 1491 pf_krule_free(struct pf_krule *rule) argument 1561 pf_krule_to_rule(const struct pf_krule *krule, struct pf_rule *rule) argument 1662 pf_rule_to_krule(const struct pf_rule *rule, struct pf_krule *krule) argument 1770 pf_label_match(const struct pf_krule *rule, const char *label) argument 1925 pf_ioctl_addrule(struct pf_krule *rule, uint32_t ticket, uint32_t pool_ticket, const char *anchor, const char *anchor_call, struct thread *td) argument 2250 struct pf_krule *rule = NULL; local 2310 struct pf_krule *rule; local 2361 struct pf_krule *rule; local 2419 struct pf_krule *rule; local 3066 struct pf_krule *rule; local [all...] |
/freebsd-13-stable/sys/security/mac_portacl/ |
H A D | mac_portacl.c | 115 struct rule { struct 121 TAILQ_ENTRY(rule) r_entries; 130 * Text format for the rule string is that a rule consists of a 137 static TAILQ_HEAD(rulehead, rule) rule_head; 143 struct rule *rule; local 145 while ((rule = TAILQ_FIRST(head)) != NULL) { 146 TAILQ_REMOVE(head, rule, r_entries); 147 free(rule, M_PORTAC 175 parse_rule_element(char *element, struct rule **rule) argument 383 struct rule *rule; local [all...] |
/freebsd-13-stable/sys/kern/ |
H A D | kern_rctl.c | 128 * 'rctl_rule_link' connects a rule with every racct it's related to. 129 * For example, rule 'user:X:openfiles:deny=N/process' is linked 222 static int rctl_rule_fully_specified(const struct rctl_rule *rule); 223 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule); 335 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) argument 342 switch (rule->rr_per) { 352 panic("%s: unknown per %d", __func__, rule->rr_per); 358 * hitting 'rule'. 361 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) argument 369 racct = rctl_proc_rule_to_racct(p, rule); 385 struct rctl_rule *rule; local 428 struct rctl_rule *rule; local 502 struct rctl_rule *rule; local 704 struct rctl_rule *rule; local 731 struct rctl_rule *rule; local 768 rctl_rule_matches(const struct rctl_rule *rule, const struct rctl_rule *filter) argument 886 rctl_racct_add_rule(struct racct *racct, struct rctl_rule *rule) argument 904 rctl_racct_add_rule_locked(struct racct *racct, struct rctl_rule *rule) argument 952 rctl_rule_acquire_subject(struct rctl_rule *rule) argument 980 rctl_rule_release_subject(struct rctl_rule *rule) argument 1010 struct rctl_rule *rule; local 1032 rctl_rule_duplicate(const struct rctl_rule *rule, int flags) argument 1057 rctl_rule_acquire(struct rctl_rule *rule) argument 1069 struct rctl_rule *rule; local 1085 rctl_rule_release(struct rctl_rule *rule) argument 1105 rctl_rule_fully_specified(const struct rctl_rule *rule) argument 1148 struct rctl_rule *rule; local 1276 rctl_rule_add(struct rctl_rule *rule) argument 1480 rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule) argument 1880 struct rctl_rule *rule; local 2112 struct rctl_rule *rule; local [all...] |
/freebsd-13-stable/sys/security/mac_bsdextended/ |
H A D | mac_bsdextended.c | 84 "BSD Extended MAC rule"); 95 &rule_slots, 0, "Number of used rule slots\n"); 109 * between the new mode (first rule matches) and the old functionality (all 115 "Disable/enable match first rule functionality"); 118 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) argument 121 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) 123 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) 125 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) 127 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) 129 if (((rule 229 ugidfw_rulecheck(struct mac_bsdextended_rule *rule, struct ucred *cred, struct vnode *vp, struct vattr *vap, int acc_mode) argument [all...] |
/freebsd-13-stable/usr.bin/rctl/ |
H A D | rctl.c | 68 warnx("malformed rule '%s': unknown user '%s'", 75 warnx("malformed rule '%s': trailing characters " 96 warnx("malformed rule '%s': unknown group '%s'", 103 warnx("malformed rule '%s': trailing characters " 115 expand_amount(const char *rule, const char *unexpanded_rule) argument 122 tofree = copy = strdup(rule); 140 copy = strdup(rule); 154 warnx("malformed rule '%s': invalid numeric value '%s'", 180 expand_rule(const char *rule, bool resolve_ids) argument 187 tofree = copy = strdup(rule); 252 humanize_ids(char *rule) argument 310 humanize_amount(char *rule) argument 364 char *rule; local 400 add_rule(const char *rule, const char *unexpanded_rule) argument 595 char *rule = NULL, *unexpanded_rule; local [all...] |
/freebsd-13-stable/lib/libpfctl/ |
H A D | libpfctl.c | 309 pf_nvdivert_to_divert(const nvlist_t *nvl, struct pfctl_rule *rule) argument 311 pf_nvaddr_to_addr(nvlist_get_nvlist(nvl, "addr"), &rule->divert.addr); 312 rule->divert.port = nvlist_get_number(nvl, "port"); 316 pf_nvrule_to_rule(const nvlist_t *nvl, struct pfctl_rule *rule) argument 322 rule->nr = nvlist_get_number(nvl, "nr"); 324 pf_nvrule_addr_to_rule_addr(nvlist_get_nvlist(nvl, "src"), &rule->src); 325 pf_nvrule_addr_to_rule_addr(nvlist_get_nvlist(nvl, "dst"), &rule->dst); 331 rule->skip[i].nr = skip[i]; 336 strlcpy(rule->label[i], labels[i], PF_RULE_LABEL_SIZE); 337 strlcpy(rule 536 pfctl_get_rule(int dev, u_int32_t nr, u_int32_t ticket, const char *anchor, u_int32_t ruleset, struct pfctl_rule *rule, char *anchor_call) argument 543 pfctl_get_clear_rule(int dev, u_int32_t nr, u_int32_t ticket, const char *anchor, u_int32_t ruleset, struct pfctl_rule *rule, char *anchor_call, bool clear) argument [all...] |
/freebsd-13-stable/sbin/devfs/ |
H A D | Makefile | 8 SRCS= devfs.c rule.c
|
/freebsd-13-stable/sys/contrib/openzfs/contrib/initramfs/hooks/ |
H A D | zfs.in | 38 copy_file rule "@udevruledir@/60-zvol.rules" 39 copy_file rule "@udevruledir@/69-vdev.rules"
|
/freebsd-13-stable/usr.sbin/ugidfw/ |
H A D | ugidfw.c | 77 struct mac_bsdextended_rule rule; local 80 error = bsde_parse_rule(argc, argv, &rule, BUFSIZ, errstr); 86 error = bsde_add_rule(&rulenum, &rule, BUFSIZ, errstr); 91 if (bsde_rule_to_string(&rule, charstr, BUFSIZ) == -1) 92 warnx("Added rule, but unable to print string."); 101 struct mac_bsdextended_rule rule; local 106 warnx("unable to get rule slots; mac_bsdextended.ko " 118 error = bsde_get_rule(i, &rule, BUFSIZ, errstr); 123 warnx("rule %d: %s", i, errstr); 129 if (bsde_rule_to_string(&rule, charst 140 struct mac_bsdextended_rule rule; local [all...] |
/freebsd-13-stable/contrib/ipfilter/rules/ |
H A D | ipmon.conf | 22 rule = 12, logtag = 101, direction = in, result = block,
|
/freebsd-13-stable/contrib/netbsd-tests/ipf/ |
H A D | t_bpf.sh | 52 { while read rule; do 53 atf_check -o save:save -x "echo '$rule' | ipftest -Rbr - -i in"
|
H A D | t_logging.sh | 47 { while read rule; do 48 echo $rule >>out 50 "echo $rule | ipftest -br - -F $2 -i in -l logout"
|
/freebsd-13-stable/contrib/byacc/ |
H A D | graph.c | 55 int rule; local 68 rule = -(*sp); 69 fprintf(graph_file, " %s -> ", symbol_pname[rlhs[rule]]); 71 for (sp = ritem + rrhs[rule]; sp < sp1; sp++)
|
H A D | closure.c | 27 int rule; local 36 for (rule = *sp; rule > 0; rule = *++sp) 38 symbol = ritem[rrhs[rule]]; 65 int rule; local 93 while ((rule = *rp++) >= 0) 95 SETBIT(rrow, rule);
|
/freebsd-13-stable/sys/netpfil/ipfw/ |
H A D | ip_fw_sockopt.c | 36 * Control socket and rule management routines for ipfw. 82 static int check_ipfw_rule1(struct ip_fw_rule *rule, int size, 84 static int check_ipfw_rule0(struct ip_fw_rule0 *rule, int size, 160 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule); 163 static int ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, 167 static void unref_rule_objects(struct ip_fw_chain *chain, struct ip_fw *rule); 205 struct ip_fw *rule; local 207 rule = malloc(rulesize, M_IPFW, M_WAITOK | M_ZERO); 208 rule->cntr = uma_zalloc_pcpu(V_ipfw_cntr_zone, M_WAITOK | M_ZERO); 209 rule 215 ipfw_free_rule(struct ip_fw *rule) argument 792 ipfw_add_protected_rule(struct ip_fw_chain *chain, struct ip_fw *rule, int locked) argument 819 ipfw_reap_add(struct ip_fw_chain *chain, struct ip_fw **head, struct ip_fw *rule) argument 840 struct ip_fw *rule; local 866 ipfw_match_range(struct ip_fw *rule, ipfw_range_tlv *rt) argument 1005 struct ip_fw *reap, *rule, **map; local 1093 struct ip_fw *rule; local 1182 struct ip_fw *rule; local 1217 ipfw_get_action(struct ip_fw *rule) argument 1247 clear_counters(struct ip_fw *rule, int log_only) argument 1265 struct ip_fw *rule; local 1425 struct ip_fw *rule; local 1614 struct ip_fw *rule; local 1675 check_ipfw_rule1(struct ip_fw_rule *rule, int size, struct rule_check_info *ci) argument 1708 check_ipfw_rule0(struct ip_fw_rule0 *rule, int size, struct rule_check_info *ci) argument 2139 struct ip_fw *rule; local 2367 mark_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct dump_args *da) argument 2414 struct ip_fw *rule; local 2594 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule) argument 2678 unref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule) argument 2773 ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct rule_check_info *ci, struct obj_idx *oib, struct tid_info *ti) argument 3797 struct ip_fw_rule0 *rule; local 4109 convert_rule_to_7(struct ip_fw_rule0 *rule) argument 4163 convert_rule_to_8(struct ip_fw_rule0 *rule) argument [all...] |
/freebsd-13-stable/tests/sys/netpfil/pf/ioctl/ |
H A D | validation.c | 806 struct pfioc_rule rule; local 810 memset(&rule, 0x42, sizeof(rule)); 812 rule.ticket = 0; 813 rule.pool_ticket = 0; 814 rule.anchor[0] = 0; 816 rule.rule.return_icmp = 0; 817 bzero(&rule.rule [all...] |
/freebsd-13-stable/contrib/blacklist/libexec/ |
H A D | blacklistd-helper | 61 # use $ipfw_offset+$port for rule number 62 rule=$(($ipfw_offset + $6)) 66 # if rule number $rule does not already exist, create it 67 /sbin/ipfw show $rule >/dev/null 2>&1 || \ 68 /sbin/ipfw add $rule drop $3 from \ 73 /sbin/npfctl rule "$2" add block in final $proto from \ 77 # if the filtering rule does not exist, create it 101 /sbin/npfctl rule "$2" rem-id "$7" 118 /sbin/npfctl rule " [all...] |
/freebsd-13-stable/sys/sys/ |
H A D | rctl.h | 56 * in the rule are met. There is no global list of rules; instead, 58 * they apply to - for example, a rule of type "user" is linked to the 62 * pointing to the rule. 65 * structures, to subjects. In order to change a rule, add a new rule 139 struct rctl_rule *rctl_rule_duplicate(const struct rctl_rule *rule, int flags); 140 void rctl_rule_acquire(struct rctl_rule *rule); 141 void rctl_rule_release(struct rctl_rule *rule); 142 int rctl_rule_add(struct rctl_rule *rule);
|
/freebsd-13-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | authz_parse.c | 48 The strings in ACL.rule are allocated from the result pool. 126 /* Temporary buffers used to parse a rule into segments. */ 152 /* The token indicating that an authz rule contains wildcards. */ 193 acl->acl.rule.repos = interned_empty_string; 194 acl->acl.rule.len = 0; 195 acl->acl.rule.path = NULL; 471 /* Parse a rule path PATH up to PATH_LEN into *RULE. 473 SECTION is the whole rule in the authz file. 476 parse_rule_path(authz_rule_t *rule, argument 510 rule 668 check_unique_rule(ctor_baton_t *cb, const authz_rule_t *rule, const char *section) argument 712 const char *rule = section->data; local [all...] |
/freebsd-13-stable/contrib/kyua/admin/ |
H A D | check-style.sh | 109 for rule in $(guess_rules "${file}"); do 110 awk -f "${srcdir}/admin/check-style-${rule}.awk" \
|