Home
last modified time | relevance | path

Searched refs:rule (Results 1 – 25 of 335) sorted by relevance

12345678910>>...14

/src/contrib/tzdata/
H A Dzishrink.awk45 rule["Arg"] = "A"
46 rule["Brazil"] = "B"
47 rule["Canada"] = "C"
48 rule["Denmark"] = "D"
49 rule["EU"] = "E"
50 rule["France"] = "F"
51 rule["GB-Eire"] = "G"
52 rule["Halifax"] = "H"
53 rule["Italy"] = "I"
54 rule["Jordan"] = "J"
[all …]
/src/contrib/libarchive/tar/
H A Dsubst.c55 struct subst_rule *rule; in add_substitution() local
66 rule = malloc(sizeof(*rule)); in add_substitution()
67 if (rule == NULL) in add_substitution()
69 rule->next = NULL; in add_substitution()
70 rule->result = NULL; in add_substitution()
73 subst->first_rule = rule; in add_substitution()
75 subst->last_rule->next = rule; in add_substitution()
76 subst->last_rule = rule; in add_substitution()
90 if ((r = regcomp(&rule->re, pattern, REG_BASIC)) != 0) { in add_substitution()
92 regerror(r, &rule->re, buf, sizeof(buf)); in add_substitution()
[all …]
/src/sys/kern/
H A Dkern_rctl.c218 static int rctl_rule_fully_specified(const struct rctl_rule *rule);
219 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule);
331 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) in rctl_proc_rule_to_racct() argument
338 switch (rule->rr_per) { in rctl_proc_rule_to_racct()
348 panic("%s: unknown per %d", __func__, rule->rr_per); in rctl_proc_rule_to_racct()
357 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) in rctl_available_resource() argument
365 racct = rctl_proc_rule_to_racct(p, rule); in rctl_available_resource()
366 available = rule->rr_amount - racct->r_resources[rule->rr_resource]; in rctl_available_resource()
381 struct rctl_rule *rule; in rctl_throttle_decay() local
391 rule = link->rrl_rule; in rctl_throttle_decay()
[all …]
/src/sys/netpfil/pf/
H A Dpf_nv.c505 pf_nvrule_to_krule(const nvlist_t *nvl, struct pf_krule *rule) in pf_nvrule_to_krule() argument
512 PFNV_CHK(pf_nvuint32(nvl, "nr", &rule->nr)); in pf_nvrule_to_krule()
518 &rule->src); in pf_nvrule_to_krule()
526 &rule->dst)); in pf_nvrule_to_krule()
529 PFNV_CHK(pf_nvstring(nvl, "label", rule->label[0], in pf_nvrule_to_krule()
530 sizeof(rule->label[0]))); in pf_nvrule_to_krule()
541 ret = strlcpy(rule->label[i], strs[i], in pf_nvrule_to_krule()
542 sizeof(rule->label[0])); in pf_nvrule_to_krule()
543 if (ret >= sizeof(rule->label[0])) in pf_nvrule_to_krule()
548 PFNV_CHK(pf_nvuint32_opt(nvl, "ridentifier", &rule->ridentifier, 0)); in pf_nvrule_to_krule()
[all …]
H A Dpf_ioctl.c445 struct pf_krule *rule; in pf_get_kpool() local
461 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, in pf_get_kpool()
464 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); in pf_get_kpool()
470 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, in pf_get_kpool()
473 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); in pf_get_kpool()
476 while ((rule != NULL) && (rule->nr != rule_number)) in pf_get_kpool()
477 rule = TAILQ_NEXT(rule, entries); in pf_get_kpool()
479 if (rule == NULL) in pf_get_kpool()
484 return (&rule->rdr); in pf_get_kpool()
486 return (&rule->nat); in pf_get_kpool()
[all …]
/src/sys/security/mac_bsdextended/
H A Dmac_bsdextended.c114 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) in ugidfw_rule_valid() argument
117 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid()
119 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid()
121 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid()
123 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid()
125 if (((rule->mbr_object.mbo_flags & MBO_TYPE_DEFINED) != 0) && in ugidfw_rule_valid()
126 (rule->mbr_object.mbo_type | MBO_ALL_TYPE) != MBO_ALL_TYPE) in ugidfw_rule_valid()
128 if ((rule->mbr_mode | MBI_ALLPERM) != MBI_ALLPERM) in ugidfw_rule_valid()
225 ugidfw_rulecheck(struct mac_bsdextended_rule *rule, in ugidfw_rulecheck() argument
235 if (rule->mbr_subject.mbs_flags & MBS_UID_DEFINED) { in ugidfw_rulecheck()
[all …]
/src/sys/security/mac_portacl/
H A Dmac_portacl.c111 struct rule { struct
117 TAILQ_ENTRY(rule) r_entries; argument
133 static TAILQ_HEAD(rulehead, rule) rule_head;
139 struct rule *rule; in toast_rules() local
141 while ((rule = TAILQ_FIRST(head)) != NULL) { in toast_rules()
142 TAILQ_REMOVE(head, rule, r_entries); in toast_rules()
143 free(rule, M_PORTACL); in toast_rules()
171 parse_rule_element(char *element, struct rule **rule) in parse_rule_element() argument
174 struct rule *new; in parse_rule_element()
230 *rule = NULL; in parse_rule_element()
[all …]
/src/sys/net/
H A Ddummymbuf.c144 #define FEEDBACK_RULE(rule, msg) \ argument
147 (rule).syntax_len, (rule).syntax_begin \
150 #define FEEDBACK_PFIL(pfil_type, pfil_flags, ifp, rule, msg) \ argument
159 (rule).syntax_len, (rule).syntax_begin \
166 struct rule;
167 typedef struct mbuf * (*op_t)(struct mbuf *, struct rule *);
168 struct rule { struct
179 dmb_m_pull_head(struct mbuf *m, struct rule *rule) in dmb_m_pull_head() argument
184 count = (int)strtol(rule->opargs, NULL, 10); in dmb_m_pull_head()
213 dmb_m_enlarge(struct mbuf *m, struct rule *rule) in dmb_m_enlarge() argument
[all …]
/src/sys/security/mac_ipacl/
H A Dmac_ipacl.c133 struct ip_rule *rule; in destroy_rules() local
135 while ((rule = TAILQ_FIRST(head)) != NULL) { in destroy_rules()
136 TAILQ_REMOVE(head, rule, r_entries); in destroy_rules()
137 free(rule, M_IPACL); in destroy_rules()
159 parse_rule_element(char *element, struct ip_rule *rule) in parse_rule_element() argument
171 rule->jid = strtol(tok, &p, 10); in parse_rule_element()
177 rule->allow = strtol(tok, &p, 10); in parse_rule_element()
184 strlcpy(rule->if_name, tok, strlen(tok) + 1); in parse_rule_element()
188 rule->af = (strcmp(tok, "AF_INET") == 0) ? AF_INET : in parse_rule_element()
190 if (rule->af == -1) in parse_rule_element()
[all …]
/src/tests/sys/mac/ipacl/
H A Dipacl_test.sh74 rule="${jidA},1,${epairA}b,AF_INET,192.0.2.42/-1@"
75 rule="${rule}${jidB},1,${epairB}b,AF_INET,198.51.100.12/-1@"
76 rule="${rule}${jidB},1,,AF_INET,203.0.113.1/24@"
77 rule="${rule}${jidB},0,,AF_INET,203.0.113.9/-1"
78 sysctl security.mac.ipacl.rules="${rule}"
110 rule="${jidA},1,,AF_INET,198.18.0.0/15@"
111 rule="${rule}${jidA},0,,AF_INET,198.18.23.0/24@"
112 rule="${rule}${jidA},1,,AF_INET,198.18.23.1/-1@"
113 rule="${rule}${jidA},1,,AF_INET,198.51.100.0/24@"
114 rule="${rule}${jidA},0,,AF_INET,198.51.100.100/-1"
[all …]
/src/sys/netpfil/ipfw/
H A Dip_fw_bpf.c60 uint32_t rule; member
69 return (a->rule != b->rule ? (a->rule < b->rule ? -1 : 1) : 0); in tap_compare()
76 ipfw_tap_alloc(struct ip_fw_chain *ch, uint32_t rule) in ipfw_tap_alloc() argument
78 struct ipfw_tap *tap, key = { .rule = rule }; in ipfw_tap_alloc()
81 MPASS(rule > 0 && rule < IPFW_DEFAULT_RULE); in ipfw_tap_alloc()
86 MPASS(tap->rule == rule); in ipfw_tap_alloc()
91 tap->rule = rule; in ipfw_tap_alloc()
93 n = snprintf(tap->name, sizeof(tap->name), "ipfw%u", rule); in ipfw_tap_alloc()
102 ipfw_tap_free(struct ip_fw_chain *ch, uint32_t rule) in ipfw_tap_free() argument
104 struct ipfw_tap *tap, key = { .rule = rule }; in ipfw_tap_free()
[all …]
H A Dip_fw_dynamic.c801 hash_parent(const struct ipfw_flow_id *id, const void *rule) in hash_parent() argument
804 return (hash_packet(id) ^ ((uintptr_t)rule)); in hash_parent()
897 hash_parent(const struct ipfw_flow_id *id, const void *rule) in hash_parent() argument
900 return (jenkins_hash32((const uint32_t *)&rule, in hash_parent()
901 sizeof(rule) / sizeof(uint32_t), hash_packet(id))); in hash_parent()
1132 dyn_lookup_ipv4_parent(const struct ipfw_flow_id *pkt, const void *rule, in dyn_lookup_ipv4_parent() argument
1150 if (s->limit->parent == rule && in dyn_lookup_ipv4_parent()
1169 const void *rule, uint32_t ruleid, uint32_t rulenum, uint32_t bucket) in dyn_lookup_ipv4_parent_locked() argument
1175 if (s->limit->parent == rule && in dyn_lookup_ipv4_parent_locked()
1282 const void *rule, uint32_t ruleid, uint32_t rulenum, uint32_t hashval) in dyn_lookup_ipv6_parent() argument
[all …]
H A Dip_fw_sockopt.c150 static int ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule,
154 static void unref_rule_objects(struct ip_fw_chain *chain, struct ip_fw *rule);
192 struct ip_fw *rule; in ipfw_alloc_rule() local
194 rule = malloc(rulesize, M_IPFW, M_WAITOK | M_ZERO); in ipfw_alloc_rule()
195 rule->cntr = uma_zalloc_pcpu(V_ipfw_cntr_zone, M_WAITOK | M_ZERO); in ipfw_alloc_rule()
196 rule->refcnt = 1; in ipfw_alloc_rule()
198 return (rule); in ipfw_alloc_rule()
202 ipfw_free_rule(struct ip_fw *rule) in ipfw_free_rule() argument
211 if (rule->refcnt > 1) in ipfw_free_rule()
213 uma_zfree_pcpu(V_ipfw_cntr_zone, rule->cntr); in ipfw_free_rule()
[all …]
/src/tests/sys/netpfil/pf/ioctl/
H A Dvalidation.c855 struct pfioc_rule rule; in ATF_TC_BODY() local
859 memset(&rule, 0x42, sizeof(rule)); in ATF_TC_BODY()
861 rule.ticket = 0; in ATF_TC_BODY()
862 rule.pool_ticket = 0; in ATF_TC_BODY()
863 rule.anchor[0] = 0; in ATF_TC_BODY()
865 rule.rule.return_icmp = 0; in ATF_TC_BODY()
866 bzero(&rule.rule.src, sizeof(rule.rule.src)); in ATF_TC_BODY()
867 bzero(&rule.rule.dst, sizeof(rule.rule.dst)); in ATF_TC_BODY()
869 rule.rule.ifname[0] = 0; in ATF_TC_BODY()
870 rule.rule.action = 0; in ATF_TC_BODY()
[all …]
/src/lib/libugidfw/
H A Dugidfw.c62 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) in bsde_rule_to_string() argument
67 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1]; in bsde_rule_to_string()
79 if (rule->mbr_subject.mbs_flags) { in bsde_rule_to_string()
80 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) { in bsde_rule_to_string()
91 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) { in bsde_rule_to_string()
98 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) { in bsde_rule_to_string()
99 pwd = getpwuid(rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string()
109 rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string()
115 if (rule->mbr_subject.mbs_uid_min != in bsde_rule_to_string()
116 rule->mbr_subject.mbs_uid_max) { in bsde_rule_to_string()
[all …]
H A Dugidfw.h38 int bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf,
43 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr);
45 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr);
49 int bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule,
52 int bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule,
54 int bsde_add_rule(int *rulename, struct mac_bsdextended_rule *rule,
/src/usr.bin/rctl/
H A Drctl.c110 expand_amount(const char *rule, const char *unexpanded_rule) in expand_amount() argument
117 tofree = copy = strdup(rule); in expand_amount()
135 copy = strdup(rule); in expand_amount()
175 expand_rule(const char *rule, bool resolve_ids) in expand_rule() argument
182 tofree = copy = strdup(rule); in expand_rule()
191 warnx("malformed rule '%s': missing subject", rule); in expand_rule()
214 error = parse_user(textid, &id, rule); in expand_rule()
222 error = parse_group(textid, &id, rule); in expand_rule()
240 expanded = expand_amount(resolved, rule); in expand_rule()
247 humanize_ids(char *rule) in humanize_ids() argument
[all …]
/src/sys/security/mac_do/
H A Dmac_do.c153 struct rule { struct
154 STAILQ_ENTRY(rule) r_entries;
165 STAILQ_HEAD(rulehead, rule); argument
319 struct rule *rule, *rule_next; in toast_rules() local
321 STAILQ_FOREACH_SAFE(rule, head, r_entries, rule_next) { in toast_rules()
322 free(rule->uids, M_MAC_DO); in toast_rules()
323 free(rule->gids, M_MAC_DO); in toast_rules()
324 free(rule, M_MAC_DO); in toast_rules()
517 parse_target_clause(char *to, struct rule *const rule, in parse_target_clause() argument
565 nb = &rule->gids_nb; in parse_target_clause()
[all …]
/src/sbin/ipfw/tests/
H A Dipfw_test.sh23 local rule="xyzzy"
31 atf_check jexec ${jail} ipfw nptv6 ${rule} create \
34 "nptv6 $rule int_prefix $int ext_prefix $ext prefixlen 64\n" \
39 atf_check jexec ${jail} ipfw nptv6 ${rule} create \
42 "nptv6 $rule int_prefix $int ext_if ${epair}a prefixlen 64\n" \
47 atf_check jexec ${jail} ipfw nptv6 ${rule} create \
50 "nptv6 $rule int_prefix $int ext_prefix $ext prefixlen 64\n" \
56 jexec ${jail} ipfw nptv6 ${rule} create \
59 "nptv6 $rule int_prefix $int ext_prefix $ext prefixlen 64\n" \
65 jexec ${jail} ipfw nptv6 ${rule} create \
[all …]
/src/contrib/bmake/unit-tests/
H A Dvar-scope-local.mk21 all: target-rule.ext dir/subdir/target-rule.ext
22 target-rule.ext dir/subdir/target-rule.ext: .PHONY
35 all: target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from
36 target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from:
57 all: inference-rule.ir-to dir/subdir/inference-rule.ir-to
58 inference-rule.ir-from: .PHONY
59 dir/subdir/inference-rule.ir-from: .PHONY
62 all: inference-rule-chain.ir-to dir/subdir/inference-rule-chain.ir-to
63 inference-rule-chain.ir-gen-from: .PHONY
64 dir/subdir/inference-rule-chain.ir-gen-from: .PHONY
/src/sys/dev/mlx5/mlx5_accel/
H A Dmlx5_ipsec_fs.c110 struct mlx5_flow_handle *rule; member
116 struct mlx5_flow_handle *rule; member
134 struct mlx5_flow_handle *rule; member
336 miss->rule = mlx5_add_flow_rules(ft, NULL, &flow_act, dest, 1); in ipsec_miss_create()
337 if (IS_ERR(miss->rule)) { in ipsec_miss_create()
339 err = PTR_ERR(miss->rule); in ipsec_miss_create()
526 struct mlx5_flow_handle *rule; in rx_add_rule() local
589 rule = mlx5_add_flow_rules(rx->ft.sa, spec, &flow_act, dest, 2); in rx_add_rule()
590 if (IS_ERR(rule)) { in rx_add_rule()
591 err = PTR_ERR(rule); in rx_add_rule()
[all …]
/src/usr.sbin/ugidfw/
H A Dugidfw.c74 struct mac_bsdextended_rule rule; in add_rule() local
77 error = bsde_parse_rule(argc, argv, &rule, BUFSIZ, errstr); in add_rule()
83 error = bsde_add_rule(&rulenum, &rule, BUFSIZ, errstr); in add_rule()
88 if (bsde_rule_to_string(&rule, charstr, BUFSIZ) == -1) in add_rule()
98 struct mac_bsdextended_rule rule; in list_rules() local
115 error = bsde_get_rule(i, &rule, BUFSIZ, errstr); in list_rules()
126 if (bsde_rule_to_string(&rule, charstr, BUFSIZ) == -1) in list_rules()
137 struct mac_bsdextended_rule rule; in set_rule() local
154 error = bsde_parse_rule(argc - 1, argv + 1, &rule, BUFSIZ, errstr); in set_rule()
160 error = bsde_set_rule(rulenum, &rule, BUFSIZ, errstr); in set_rule()
/src/crypto/openssl/doc/designs/quic-design/images/
H A Dquic-concurrency-models.svg1rule="evenodd"/></clipPath><clipPath clipPathUnits="userSpaceOnUse" id="b"><path d="M0 0h3575v1622…
/src/sbin/pfctl/
H A Dpfctl.c1164 pfctl_print_eth_rule_counters(struct pfctl_eth_rule *rule, int opts) in pfctl_print_eth_rule_counters() argument
1169 (unsigned long long)rule->evaluations, in pfctl_print_eth_rule_counters()
1170 (unsigned long long)(rule->packets[0] + in pfctl_print_eth_rule_counters()
1171 rule->packets[1]), in pfctl_print_eth_rule_counters()
1172 (unsigned long long)(rule->bytes[0] + in pfctl_print_eth_rule_counters()
1173 rule->bytes[1])); in pfctl_print_eth_rule_counters()
1178 if (rule->last_active_timestamp != 0) { in pfctl_print_eth_rule_counters()
1179 bcopy(ctime(&rule->last_active_timestamp), timestr, in pfctl_print_eth_rule_counters()
1190 pfctl_print_rule_counters(struct pfctl_rule *rule, int opts) in pfctl_print_rule_counters() argument
1199 if (rule->skip[i].nr == rule->nr + 1) in pfctl_print_rule_counters()
[all …]
/src/crypto/krb5/src/lib/krb5/os/
H A Dlocalauth_rule.c145 char *newstr, *rule = NULL, *repl = NULL, *current = NULL; in aname_replacer() local
169 free(rule); in aname_replacer()
170 rule = k5memdup0(cp + 2, ep - (cp + 2), &ret); in aname_replacer()
171 if (rule == NULL) in aname_replacer()
184 ret = do_replacement(rule, repl, doglobal, current, &newstr); in aname_replacer()
196 free(rule); in aname_replacer()
273 const char *rule, krb5_const_principal aname, char **lname_out) in an2ln_rule() argument
280 if (rule == NULL) in an2ln_rule()
284 current = rule; in an2ln_rule()

12345678910>>...14