Searched refs:rule (Results 1 - 25 of 121) sorted by relevance

12345

/freebsd-current/contrib/tzdata/
H A Dzishrink.awk20 # Return a shortened rule name representing NAME,
45 rule["Arg"] = "A"
46 rule["Brazil"] = "B"
47 rule["Canada"] = "C"
48 rule["Denmark"] = "D"
49 rule["EU"] = "E"
50 rule["France"] = "F"
51 rule["GB-Eire"] = "G"
52 rule["Halifax"] = "H"
53 rule["Ital
[all...]
/freebsd-current/contrib/libarchive/tar/
H A Dsubst.c73 struct subst_rule *rule; local
84 rule = malloc(sizeof(*rule));
85 if (rule == NULL)
87 rule->next = NULL;
88 rule->result = NULL;
91 subst->first_rule = rule;
93 subst->last_rule->next = rule;
94 subst->last_rule = rule;
108 if ((r = regcomp(&rule
224 struct subst_rule *rule; local
332 struct subst_rule *rule; local
[all...]
/freebsd-current/contrib/bmake/unit-tests/
H A Dvar-scope-local.exp1 Global: .ALLTARGETS = all target-rule.ext dir/subdir/target-rule.ext target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from inference-rule.ir-to dir/subdir/inference-rule.ir-to inference-rule.ir-from dir/subdir/inference-rule.ir-from inference-rule-chain.ir-to dir/subdir/inference-rule
[all...]
/freebsd-current/crypto/openssl/util/
H A Dmarkdownlint.rb7 rule 'MD003', :style => :setext_with_atx
10 rule 'MD046', :style => :consistent
/freebsd-current/lib/libugidfw/
H A Dugidfw.h38 int bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf,
43 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr);
45 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr);
49 int bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule,
52 int bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule,
54 int bsde_add_rule(int *rulename, struct mac_bsdextended_rule *rule,
H A Dugidfw.c62 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) argument
67 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1];
79 if (rule->mbr_subject.mbs_flags) {
80 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) {
91 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) {
98 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) {
99 pwd = getpwuid(rule->mbr_subject.mbs_uid_min);
109 rule->mbr_subject.mbs_uid_min);
115 if (rule->mbr_subject.mbs_uid_min !=
116 rule
1008 bsde_parse_rule(int argc, char *argv[], struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
1078 bsde_parse_rule_string(const char *string, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
1189 bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t errlen, char *errstr) argument
1229 struct mac_bsdextended_rule rule; local
1259 bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
1291 bsde_add_rule(int *rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument
[all...]
/freebsd-current/sys/security/mac_portacl/
H A Dmac_portacl.c113 struct rule { struct
119 TAILQ_ENTRY(rule) r_entries;
128 * Text format for the rule string is that a rule consists of a
135 static TAILQ_HEAD(rulehead, rule) rule_head;
141 struct rule *rule; local
143 while ((rule = TAILQ_FIRST(head)) != NULL) {
144 TAILQ_REMOVE(head, rule, r_entries);
145 free(rule, M_PORTAC
173 parse_rule_element(char *element, struct rule **rule) argument
381 struct rule *rule; local
[all...]
/freebsd-current/sys/kern/
H A Dkern_rctl.c124 * 'rctl_rule_link' connects a rule with every racct it's related to.
125 * For example, rule 'user:X:openfiles:deny=N/process' is linked
218 static int rctl_rule_fully_specified(const struct rctl_rule *rule);
219 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule);
331 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) argument
338 switch (rule->rr_per) {
348 panic("%s: unknown per %d", __func__, rule->rr_per);
354 * hitting 'rule'.
357 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) argument
365 racct = rctl_proc_rule_to_racct(p, rule);
381 struct rctl_rule *rule; local
424 struct rctl_rule *rule; local
498 struct rctl_rule *rule; local
700 struct rctl_rule *rule; local
727 struct rctl_rule *rule; local
764 rctl_rule_matches(const struct rctl_rule *rule, const struct rctl_rule *filter) argument
882 rctl_racct_add_rule(struct racct *racct, struct rctl_rule *rule) argument
900 rctl_racct_add_rule_locked(struct racct *racct, struct rctl_rule *rule) argument
948 rctl_rule_acquire_subject(struct rctl_rule *rule) argument
976 rctl_rule_release_subject(struct rctl_rule *rule) argument
1006 struct rctl_rule *rule; local
1028 rctl_rule_duplicate(const struct rctl_rule *rule, int flags) argument
1053 rctl_rule_acquire(struct rctl_rule *rule) argument
1065 struct rctl_rule *rule; local
1081 rctl_rule_release(struct rctl_rule *rule) argument
1101 rctl_rule_fully_specified(const struct rctl_rule *rule) argument
1144 struct rctl_rule *rule; local
1272 rctl_rule_add(struct rctl_rule *rule) argument
1476 rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule) argument
1876 struct rctl_rule *rule; local
2108 struct rctl_rule *rule; local
[all...]
/freebsd-current/sys/security/mac_bsdextended/
H A Dmac_bsdextended.c82 "BSD Extended MAC rule");
93 &rule_slots, 0, "Number of used rule slots\n");
107 * between the new mode (first rule matches) and the old functionality (all
113 "Disable/enable match first rule functionality");
116 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) argument
119 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS)
121 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS)
123 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS)
125 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS)
127 if (((rule
227 ugidfw_rulecheck(struct mac_bsdextended_rule *rule, struct ucred *cred, struct vnode *vp, struct vattr *vap, int acc_mode) argument
[all...]
/freebsd-current/sys/netpfil/pf/
H A Dpf_nv.c505 pf_nvrule_to_krule(const nvlist_t *nvl, struct pf_krule *rule) argument
511 PFNV_CHK(pf_nvuint32(nvl, "nr", &rule->nr));
517 &rule->src);
525 &rule->dst));
528 PFNV_CHK(pf_nvstring(nvl, "label", rule->label[0],
529 sizeof(rule->label[0])));
540 ret = strlcpy(rule->label[i], strs[i],
541 sizeof(rule->label[0]));
542 if (ret >= sizeof(rule->label[0]))
547 PFNV_CHK(pf_nvuint32_opt(nvl, "ridentifier", &rule
660 pf_divert_to_nvdivert(const struct pf_krule *rule) argument
684 pf_krule_to_nvrule(struct pf_krule *rule) argument
[all...]
H A Dpf_ioctl.c177 "Size of pf(4) rule tag hashtable");
211 "Make the default rule drop all packets.");
345 /* default rule should never be garbage collected */
407 * scrub rule functionality is hopefully removed some day in future.
438 struct pf_krule *rule; local
452 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr,
455 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr);
461 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr,
464 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr);
467 while ((rule !
511 pf_unlink_rule_locked(struct pf_krulequeue *rulequeue, struct pf_krule *rule) argument
524 pf_unlink_rule(struct pf_krulequeue *rulequeue, struct pf_krule *rule) argument
535 pf_free_eth_rule(struct pf_keth_rule *rule) argument
572 pf_free_rule(struct pf_krule *rule) argument
761 struct pf_keth_rule *rule, *tmp; local
804 struct pf_keth_rule *rule, *tmp; local
1210 struct pf_krule *rule; local
1240 struct pf_krule *rule; local
1300 pf_hash_rule_rolling(MD5_CTX *ctx, struct pf_krule *rule) argument
1345 pf_hash_rule(struct pf_krule *rule) argument
1365 struct pf_krule *rule, **old_array, *old_rule; local
1454 struct pf_krule *rule; local
1822 struct pf_krule *rule; local
1832 pf_krule_free(struct pf_krule *rule) argument
1868 pf_krule_clear_counters(struct pf_krule *rule) argument
1917 pf_rule_to_krule(const struct pf_rule *rule, struct pf_krule *krule) argument
2064 pf_ioctl_addrule(struct pf_krule *rule, uint32_t ticket, uint32_t pool_ticket, const char *anchor, const char *anchor_call, uid_t uid, pid_t pid) argument
2246 pf_label_match(const struct pf_krule *rule, const char *label) argument
2666 struct pf_keth_rule *rule = NULL; local
2767 struct pf_keth_rule *rule = NULL, *tail = NULL; local
3078 struct pf_krule *rule = NULL; local
3139 struct pf_krule *rule; local
3172 struct pf_krule *rule; local
3910 struct pf_krule *rule; local
[all...]
H A Dpf_nl.c190 nlattr_add_u32(nw, PF_ST_RULE, s->rule.ptr ? s->rule.ptr->nr : -1);
735 struct pf_krule *rule; member in struct:nl_parsed_addrule
748 { .type = PF_ART_RULE, .off = _OUT(rule), .arg = &rule_parser, .cb = nlattr_get_nested_ptr }
762 attrs.rule = pf_krule_alloc();
766 pf_free_rule(attrs.rule);
770 error = pf_ioctl_addrule(attrs.rule, attrs.ticket, attrs.pool_ticket,
781 { .type = PF_GR_ACTION, .off = _OUT(rule.action), .cb = nlattr_get_uint8 },
858 struct pf_krule *rule; local
895 rule
[all...]
/freebsd-current/sys/security/mac_ipacl/
H A Dmac_ipacl.c120 bool subnet_apply; /* Apply rule on whole subnet. */
135 struct ip_rule *rule; local
137 while ((rule = TAILQ_FIRST(head)) != NULL) {
138 TAILQ_REMOVE(head, rule, r_entries);
139 free(rule, M_IPACL);
161 parse_rule_element(char *element, struct ip_rule *rule) argument
173 rule->jid = strtol(tok, &p, 10);
179 rule->allow = strtol(tok, &p, 10);
186 strlcpy(rule->if_name, tok, strlen(tok) + 1);
190 rule
322 struct ip_rule *rule; local
[all...]
/freebsd-current/tests/sys/netpfil/pf/ioctl/
H A Dvalidation.c804 struct pfioc_rule rule; local
808 memset(&rule, 0x42, sizeof(rule));
810 rule.ticket = 0;
811 rule.pool_ticket = 0;
812 rule.anchor[0] = 0;
814 rule.rule.return_icmp = 0;
815 bzero(&rule.rule
841 struct pfioc_rule rule; local
878 struct pfioc_rule rule; local
[all...]
/freebsd-current/usr.bin/rctl/
H A Drctl.c63 warnx("malformed rule '%s': unknown user '%s'",
70 warnx("malformed rule '%s': trailing characters "
91 warnx("malformed rule '%s': unknown group '%s'",
98 warnx("malformed rule '%s': trailing characters "
110 expand_amount(const char *rule, const char *unexpanded_rule) argument
117 tofree = copy = strdup(rule);
135 copy = strdup(rule);
149 warnx("malformed rule '%s': invalid numeric value '%s'",
175 expand_rule(const char *rule, bool resolve_ids) argument
182 tofree = copy = strdup(rule);
247 humanize_ids(char *rule) argument
305 humanize_amount(char *rule) argument
359 char *rule; local
395 add_rule(const char *rule, const char *unexpanded_rule) argument
590 char *rule = NULL, *unexpanded_rule; local
[all...]
/freebsd-current/tests/sys/mac/ipacl/
H A Dipacl_test.sh71 rule="${jidA},1,${epairA}b,AF_INET,192.0.2.42/-1@"
72 rule="${rule}${jidB},1,${epairB}b,AF_INET,198.51.100.12/-1@"
73 rule="${rule}${jidB},1,,AF_INET,203.0.113.1/24@"
74 rule="${rule}${jidB},0,,AF_INET,203.0.113.9/-1"
75 sysctl security.mac.ipacl.rules="${rule}"
107 rule="${jidA},1,,AF_INET,198.18.0.0/15@"
108 rule
[all...]
/freebsd-current/sbin/devfs/
H A DMakefile7 SRCS= devfs.c rule.c
/freebsd-current/usr.sbin/ugidfw/
H A Dugidfw.c74 struct mac_bsdextended_rule rule; local
77 error = bsde_parse_rule(argc, argv, &rule, BUFSIZ, errstr);
83 error = bsde_add_rule(&rulenum, &rule, BUFSIZ, errstr);
88 if (bsde_rule_to_string(&rule, charstr, BUFSIZ) == -1)
89 warnx("Added rule, but unable to print string.");
98 struct mac_bsdextended_rule rule; local
103 warnx("unable to get rule slots; mac_bsdextended.ko "
115 error = bsde_get_rule(i, &rule, BUFSIZ, errstr);
120 warnx("rule %d: %s", i, errstr);
126 if (bsde_rule_to_string(&rule, charst
137 struct mac_bsdextended_rule rule; local
[all...]
/freebsd-current/contrib/netbsd-tests/ipf/
H A Dt_bpf.sh52 { while read rule; do
53 atf_check -o save:save -x "echo '$rule' | ipftest -Rbr - -i in"
H A Dt_logging.sh47 { while read rule; do
48 echo $rule >>out
50 "echo $rule | ipftest -br - -F $2 -i in -l logout"
/freebsd-current/share/examples/ipfilter/rules/
H A Dipmon.conf22 rule = 12, logtag = 101, direction = in, result = block,
/freebsd-current/contrib/byacc/
H A Dclosure.c25 int rule; local
34 for (rule = *sp; rule > 0; rule = *++sp)
36 symbol = ritem[rrhs[rule]];
61 int rule; local
89 while ((rule = *rp++) >= 0)
91 SETBIT(rrow, rule);
H A Dgraph.c63 int rule; local
69 rule = -(*sp);
70 fprintf(graph_file, " %s -> ", symbol_pname[rlhs[rule]]);
72 for (sp = ritem + rrhs[rule]; sp < sp1; sp++)
/freebsd-current/sys/contrib/openzfs/contrib/initramfs/hooks/
H A Dzfs.in47 copy_file rule "@udevruledir@/60-zvol.rules"
48 copy_file rule "@udevruledir@/69-vdev.rules"
/freebsd-current/sys/netpfil/ipfw/
H A Dip_fw_sockopt.c34 * Control socket and rule management routines for ipfw.
80 static int check_ipfw_rule1(struct ip_fw_rule *rule, int size,
82 static int check_ipfw_rule0(struct ip_fw_rule0 *rule, int size,
158 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule);
161 static int ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule,
165 static void unref_rule_objects(struct ip_fw_chain *chain, struct ip_fw *rule);
203 struct ip_fw *rule; local
205 rule = malloc(rulesize, M_IPFW, M_WAITOK | M_ZERO);
206 rule->cntr = uma_zalloc_pcpu(V_ipfw_cntr_zone, M_WAITOK | M_ZERO);
207 rule
213 ipfw_free_rule(struct ip_fw *rule) argument
794 ipfw_add_protected_rule(struct ip_fw_chain *chain, struct ip_fw *rule, int locked) argument
821 ipfw_reap_add(struct ip_fw_chain *chain, struct ip_fw **head, struct ip_fw *rule) argument
842 struct ip_fw *rule; local
868 ipfw_match_range(struct ip_fw *rule, ipfw_range_tlv *rt) argument
1007 struct ip_fw *reap, *rule, **map; local
1095 struct ip_fw *rule; local
1184 struct ip_fw *rule; local
1219 ipfw_get_action(struct ip_fw *rule) argument
1249 clear_counters(struct ip_fw *rule, int log_only) argument
1267 struct ip_fw *rule; local
1427 struct ip_fw *rule; local
1616 struct ip_fw *rule; local
1677 check_ipfw_rule1(struct ip_fw_rule *rule, int size, struct rule_check_info *ci) argument
1710 check_ipfw_rule0(struct ip_fw_rule0 *rule, int size, struct rule_check_info *ci) argument
2153 struct ip_fw *rule; local
2381 mark_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct dump_args *da) argument
2428 struct ip_fw *rule; local
2608 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule) argument
2692 unref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule) argument
2787 ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct rule_check_info *ci, struct obj_idx *oib, struct tid_info *ti) argument
3809 struct ip_fw_rule0 *rule; local
4119 convert_rule_to_7(struct ip_fw_rule0 *rule) argument
4173 convert_rule_to_8(struct ip_fw_rule0 *rule) argument
[all...]

Completed in 248 milliseconds

12345