/freebsd-current/contrib/tzdata/ |
H A D | zishrink.awk | 20 # Return a shortened rule name representing NAME, 45 rule["Arg"] = "A" 46 rule["Brazil"] = "B" 47 rule["Canada"] = "C" 48 rule["Denmark"] = "D" 49 rule["EU"] = "E" 50 rule["France"] = "F" 51 rule["GB-Eire"] = "G" 52 rule["Halifax"] = "H" 53 rule["Ital [all...] |
/freebsd-current/contrib/libarchive/tar/ |
H A D | subst.c | 73 struct subst_rule *rule; local 84 rule = malloc(sizeof(*rule)); 85 if (rule == NULL) 87 rule->next = NULL; 88 rule->result = NULL; 91 subst->first_rule = rule; 93 subst->last_rule->next = rule; 94 subst->last_rule = rule; 108 if ((r = regcomp(&rule 224 struct subst_rule *rule; local 332 struct subst_rule *rule; local [all...] |
/freebsd-current/contrib/bmake/unit-tests/ |
H A D | var-scope-local.exp | 1 Global: .ALLTARGETS = all target-rule.ext dir/subdir/target-rule.ext target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from inference-rule.ir-to dir/subdir/inference-rule.ir-to inference-rule.ir-from dir/subdir/inference-rule.ir-from inference-rule-chain.ir-to dir/subdir/inference-rule [all...] |
/freebsd-current/crypto/openssl/util/ |
H A D | markdownlint.rb | 7 rule 'MD003', :style => :setext_with_atx 10 rule 'MD046', :style => :consistent
|
/freebsd-current/lib/libugidfw/ |
H A D | ugidfw.h | 38 int bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, 43 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr); 45 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr); 49 int bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule, 52 int bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule, 54 int bsde_add_rule(int *rulename, struct mac_bsdextended_rule *rule,
|
H A D | ugidfw.c | 62 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) argument 67 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1]; 79 if (rule->mbr_subject.mbs_flags) { 80 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) { 91 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) { 98 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) { 99 pwd = getpwuid(rule->mbr_subject.mbs_uid_min); 109 rule->mbr_subject.mbs_uid_min); 115 if (rule->mbr_subject.mbs_uid_min != 116 rule 1008 bsde_parse_rule(int argc, char *argv[], struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument 1078 bsde_parse_rule_string(const char *string, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument 1189 bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t errlen, char *errstr) argument 1229 struct mac_bsdextended_rule rule; local 1259 bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument 1291 bsde_add_rule(int *rulenum, struct mac_bsdextended_rule *rule, size_t buflen, char *errstr) argument [all...] |
/freebsd-current/sys/security/mac_portacl/ |
H A D | mac_portacl.c | 113 struct rule { struct 119 TAILQ_ENTRY(rule) r_entries; 128 * Text format for the rule string is that a rule consists of a 135 static TAILQ_HEAD(rulehead, rule) rule_head; 141 struct rule *rule; local 143 while ((rule = TAILQ_FIRST(head)) != NULL) { 144 TAILQ_REMOVE(head, rule, r_entries); 145 free(rule, M_PORTAC 173 parse_rule_element(char *element, struct rule **rule) argument 381 struct rule *rule; local [all...] |
/freebsd-current/sys/kern/ |
H A D | kern_rctl.c | 124 * 'rctl_rule_link' connects a rule with every racct it's related to. 125 * For example, rule 'user:X:openfiles:deny=N/process' is linked 218 static int rctl_rule_fully_specified(const struct rctl_rule *rule); 219 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule); 331 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) argument 338 switch (rule->rr_per) { 348 panic("%s: unknown per %d", __func__, rule->rr_per); 354 * hitting 'rule'. 357 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) argument 365 racct = rctl_proc_rule_to_racct(p, rule); 381 struct rctl_rule *rule; local 424 struct rctl_rule *rule; local 498 struct rctl_rule *rule; local 700 struct rctl_rule *rule; local 727 struct rctl_rule *rule; local 764 rctl_rule_matches(const struct rctl_rule *rule, const struct rctl_rule *filter) argument 882 rctl_racct_add_rule(struct racct *racct, struct rctl_rule *rule) argument 900 rctl_racct_add_rule_locked(struct racct *racct, struct rctl_rule *rule) argument 948 rctl_rule_acquire_subject(struct rctl_rule *rule) argument 976 rctl_rule_release_subject(struct rctl_rule *rule) argument 1006 struct rctl_rule *rule; local 1028 rctl_rule_duplicate(const struct rctl_rule *rule, int flags) argument 1053 rctl_rule_acquire(struct rctl_rule *rule) argument 1065 struct rctl_rule *rule; local 1081 rctl_rule_release(struct rctl_rule *rule) argument 1101 rctl_rule_fully_specified(const struct rctl_rule *rule) argument 1144 struct rctl_rule *rule; local 1272 rctl_rule_add(struct rctl_rule *rule) argument 1476 rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule) argument 1876 struct rctl_rule *rule; local 2108 struct rctl_rule *rule; local [all...] |
/freebsd-current/sys/security/mac_bsdextended/ |
H A D | mac_bsdextended.c | 82 "BSD Extended MAC rule"); 93 &rule_slots, 0, "Number of used rule slots\n"); 107 * between the new mode (first rule matches) and the old functionality (all 113 "Disable/enable match first rule functionality"); 116 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) argument 119 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) 121 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) 123 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) 125 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) 127 if (((rule 227 ugidfw_rulecheck(struct mac_bsdextended_rule *rule, struct ucred *cred, struct vnode *vp, struct vattr *vap, int acc_mode) argument [all...] |
/freebsd-current/sys/netpfil/pf/ |
H A D | pf_nv.c | 505 pf_nvrule_to_krule(const nvlist_t *nvl, struct pf_krule *rule) argument 511 PFNV_CHK(pf_nvuint32(nvl, "nr", &rule->nr)); 517 &rule->src); 525 &rule->dst)); 528 PFNV_CHK(pf_nvstring(nvl, "label", rule->label[0], 529 sizeof(rule->label[0]))); 540 ret = strlcpy(rule->label[i], strs[i], 541 sizeof(rule->label[0])); 542 if (ret >= sizeof(rule->label[0])) 547 PFNV_CHK(pf_nvuint32_opt(nvl, "ridentifier", &rule 660 pf_divert_to_nvdivert(const struct pf_krule *rule) argument 684 pf_krule_to_nvrule(struct pf_krule *rule) argument [all...] |
H A D | pf_ioctl.c | 177 "Size of pf(4) rule tag hashtable"); 211 "Make the default rule drop all packets."); 345 /* default rule should never be garbage collected */ 407 * scrub rule functionality is hopefully removed some day in future. 438 struct pf_krule *rule; local 452 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, 455 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); 461 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, 464 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); 467 while ((rule ! 511 pf_unlink_rule_locked(struct pf_krulequeue *rulequeue, struct pf_krule *rule) argument 524 pf_unlink_rule(struct pf_krulequeue *rulequeue, struct pf_krule *rule) argument 535 pf_free_eth_rule(struct pf_keth_rule *rule) argument 572 pf_free_rule(struct pf_krule *rule) argument 761 struct pf_keth_rule *rule, *tmp; local 804 struct pf_keth_rule *rule, *tmp; local 1210 struct pf_krule *rule; local 1240 struct pf_krule *rule; local 1300 pf_hash_rule_rolling(MD5_CTX *ctx, struct pf_krule *rule) argument 1345 pf_hash_rule(struct pf_krule *rule) argument 1365 struct pf_krule *rule, **old_array, *old_rule; local 1454 struct pf_krule *rule; local 1822 struct pf_krule *rule; local 1832 pf_krule_free(struct pf_krule *rule) argument 1868 pf_krule_clear_counters(struct pf_krule *rule) argument 1917 pf_rule_to_krule(const struct pf_rule *rule, struct pf_krule *krule) argument 2064 pf_ioctl_addrule(struct pf_krule *rule, uint32_t ticket, uint32_t pool_ticket, const char *anchor, const char *anchor_call, uid_t uid, pid_t pid) argument 2246 pf_label_match(const struct pf_krule *rule, const char *label) argument 2666 struct pf_keth_rule *rule = NULL; local 2767 struct pf_keth_rule *rule = NULL, *tail = NULL; local 3078 struct pf_krule *rule = NULL; local 3139 struct pf_krule *rule; local 3172 struct pf_krule *rule; local 3910 struct pf_krule *rule; local [all...] |
H A D | pf_nl.c | 190 nlattr_add_u32(nw, PF_ST_RULE, s->rule.ptr ? s->rule.ptr->nr : -1); 735 struct pf_krule *rule; member in struct:nl_parsed_addrule 748 { .type = PF_ART_RULE, .off = _OUT(rule), .arg = &rule_parser, .cb = nlattr_get_nested_ptr } 762 attrs.rule = pf_krule_alloc(); 766 pf_free_rule(attrs.rule); 770 error = pf_ioctl_addrule(attrs.rule, attrs.ticket, attrs.pool_ticket, 781 { .type = PF_GR_ACTION, .off = _OUT(rule.action), .cb = nlattr_get_uint8 }, 858 struct pf_krule *rule; local 895 rule [all...] |
/freebsd-current/sys/security/mac_ipacl/ |
H A D | mac_ipacl.c | 120 bool subnet_apply; /* Apply rule on whole subnet. */ 135 struct ip_rule *rule; local 137 while ((rule = TAILQ_FIRST(head)) != NULL) { 138 TAILQ_REMOVE(head, rule, r_entries); 139 free(rule, M_IPACL); 161 parse_rule_element(char *element, struct ip_rule *rule) argument 173 rule->jid = strtol(tok, &p, 10); 179 rule->allow = strtol(tok, &p, 10); 186 strlcpy(rule->if_name, tok, strlen(tok) + 1); 190 rule 322 struct ip_rule *rule; local [all...] |
/freebsd-current/tests/sys/netpfil/pf/ioctl/ |
H A D | validation.c | 804 struct pfioc_rule rule; local 808 memset(&rule, 0x42, sizeof(rule)); 810 rule.ticket = 0; 811 rule.pool_ticket = 0; 812 rule.anchor[0] = 0; 814 rule.rule.return_icmp = 0; 815 bzero(&rule.rule 841 struct pfioc_rule rule; local 878 struct pfioc_rule rule; local [all...] |
/freebsd-current/usr.bin/rctl/ |
H A D | rctl.c | 63 warnx("malformed rule '%s': unknown user '%s'", 70 warnx("malformed rule '%s': trailing characters " 91 warnx("malformed rule '%s': unknown group '%s'", 98 warnx("malformed rule '%s': trailing characters " 110 expand_amount(const char *rule, const char *unexpanded_rule) argument 117 tofree = copy = strdup(rule); 135 copy = strdup(rule); 149 warnx("malformed rule '%s': invalid numeric value '%s'", 175 expand_rule(const char *rule, bool resolve_ids) argument 182 tofree = copy = strdup(rule); 247 humanize_ids(char *rule) argument 305 humanize_amount(char *rule) argument 359 char *rule; local 395 add_rule(const char *rule, const char *unexpanded_rule) argument 590 char *rule = NULL, *unexpanded_rule; local [all...] |
/freebsd-current/tests/sys/mac/ipacl/ |
H A D | ipacl_test.sh | 71 rule="${jidA},1,${epairA}b,AF_INET,192.0.2.42/-1@" 72 rule="${rule}${jidB},1,${epairB}b,AF_INET,198.51.100.12/-1@" 73 rule="${rule}${jidB},1,,AF_INET,203.0.113.1/24@" 74 rule="${rule}${jidB},0,,AF_INET,203.0.113.9/-1" 75 sysctl security.mac.ipacl.rules="${rule}" 107 rule="${jidA},1,,AF_INET,198.18.0.0/15@" 108 rule [all...] |
/freebsd-current/sbin/devfs/ |
H A D | Makefile | 7 SRCS= devfs.c rule.c
|
/freebsd-current/usr.sbin/ugidfw/ |
H A D | ugidfw.c | 74 struct mac_bsdextended_rule rule; local 77 error = bsde_parse_rule(argc, argv, &rule, BUFSIZ, errstr); 83 error = bsde_add_rule(&rulenum, &rule, BUFSIZ, errstr); 88 if (bsde_rule_to_string(&rule, charstr, BUFSIZ) == -1) 89 warnx("Added rule, but unable to print string."); 98 struct mac_bsdextended_rule rule; local 103 warnx("unable to get rule slots; mac_bsdextended.ko " 115 error = bsde_get_rule(i, &rule, BUFSIZ, errstr); 120 warnx("rule %d: %s", i, errstr); 126 if (bsde_rule_to_string(&rule, charst 137 struct mac_bsdextended_rule rule; local [all...] |
/freebsd-current/contrib/netbsd-tests/ipf/ |
H A D | t_bpf.sh | 52 { while read rule; do 53 atf_check -o save:save -x "echo '$rule' | ipftest -Rbr - -i in"
|
H A D | t_logging.sh | 47 { while read rule; do 48 echo $rule >>out 50 "echo $rule | ipftest -br - -F $2 -i in -l logout"
|
/freebsd-current/share/examples/ipfilter/rules/ |
H A D | ipmon.conf | 22 rule = 12, logtag = 101, direction = in, result = block,
|
/freebsd-current/contrib/byacc/ |
H A D | closure.c | 25 int rule; local 34 for (rule = *sp; rule > 0; rule = *++sp) 36 symbol = ritem[rrhs[rule]]; 61 int rule; local 89 while ((rule = *rp++) >= 0) 91 SETBIT(rrow, rule);
|
H A D | graph.c | 63 int rule; local 69 rule = -(*sp); 70 fprintf(graph_file, " %s -> ", symbol_pname[rlhs[rule]]); 72 for (sp = ritem + rrhs[rule]; sp < sp1; sp++)
|
/freebsd-current/sys/contrib/openzfs/contrib/initramfs/hooks/ |
H A D | zfs.in | 47 copy_file rule "@udevruledir@/60-zvol.rules" 48 copy_file rule "@udevruledir@/69-vdev.rules"
|
/freebsd-current/sys/netpfil/ipfw/ |
H A D | ip_fw_sockopt.c | 34 * Control socket and rule management routines for ipfw. 80 static int check_ipfw_rule1(struct ip_fw_rule *rule, int size, 82 static int check_ipfw_rule0(struct ip_fw_rule0 *rule, int size, 158 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule); 161 static int ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, 165 static void unref_rule_objects(struct ip_fw_chain *chain, struct ip_fw *rule); 203 struct ip_fw *rule; local 205 rule = malloc(rulesize, M_IPFW, M_WAITOK | M_ZERO); 206 rule->cntr = uma_zalloc_pcpu(V_ipfw_cntr_zone, M_WAITOK | M_ZERO); 207 rule 213 ipfw_free_rule(struct ip_fw *rule) argument 794 ipfw_add_protected_rule(struct ip_fw_chain *chain, struct ip_fw *rule, int locked) argument 821 ipfw_reap_add(struct ip_fw_chain *chain, struct ip_fw **head, struct ip_fw *rule) argument 842 struct ip_fw *rule; local 868 ipfw_match_range(struct ip_fw *rule, ipfw_range_tlv *rt) argument 1007 struct ip_fw *reap, *rule, **map; local 1095 struct ip_fw *rule; local 1184 struct ip_fw *rule; local 1219 ipfw_get_action(struct ip_fw *rule) argument 1249 clear_counters(struct ip_fw *rule, int log_only) argument 1267 struct ip_fw *rule; local 1427 struct ip_fw *rule; local 1616 struct ip_fw *rule; local 1677 check_ipfw_rule1(struct ip_fw_rule *rule, int size, struct rule_check_info *ci) argument 1710 check_ipfw_rule0(struct ip_fw_rule0 *rule, int size, struct rule_check_info *ci) argument 2153 struct ip_fw *rule; local 2381 mark_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct dump_args *da) argument 2428 struct ip_fw *rule; local 2608 set_legacy_obj_kidx(struct ip_fw_chain *ch, struct ip_fw_rule0 *rule) argument 2692 unref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule) argument 2787 ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, struct rule_check_info *ci, struct obj_idx *oib, struct tid_info *ti) argument 3809 struct ip_fw_rule0 *rule; local 4119 convert_rule_to_7(struct ip_fw_rule0 *rule) argument 4173 convert_rule_to_8(struct ip_fw_rule0 *rule) argument [all...] |