| /src/contrib/tzdata/ |
| H A D | zishrink.awk | 45 rule["Arg"] = "A" 46 rule["Brazil"] = "B" 47 rule["Canada"] = "C" 48 rule["Denmark"] = "D" 49 rule["EU"] = "E" 50 rule["France"] = "F" 51 rule["GB-Eire"] = "G" 52 rule["Halifax"] = "H" 53 rule["Italy"] = "I" 54 rule["Jordan"] = "J" [all …]
|
| /src/contrib/libarchive/tar/ |
| H A D | subst.c | 55 struct subst_rule *rule; in add_substitution() local 66 rule = malloc(sizeof(*rule)); in add_substitution() 67 if (rule == NULL) in add_substitution() 69 rule->next = NULL; in add_substitution() 70 rule->result = NULL; in add_substitution() 73 subst->first_rule = rule; in add_substitution() 75 subst->last_rule->next = rule; in add_substitution() 76 subst->last_rule = rule; in add_substitution() 90 if ((r = regcomp(&rule->re, pattern, REG_BASIC)) != 0) { in add_substitution() 92 regerror(r, &rule->re, buf, sizeof(buf)); in add_substitution() [all …]
|
| /src/sys/kern/ |
| H A D | kern_rctl.c | 218 static int rctl_rule_fully_specified(const struct rctl_rule *rule); 219 static void rctl_rule_to_sbuf(struct sbuf *sb, const struct rctl_rule *rule); 331 rctl_proc_rule_to_racct(const struct proc *p, const struct rctl_rule *rule) in rctl_proc_rule_to_racct() argument 338 switch (rule->rr_per) { in rctl_proc_rule_to_racct() 348 panic("%s: unknown per %d", __func__, rule->rr_per); in rctl_proc_rule_to_racct() 357 rctl_available_resource(const struct proc *p, const struct rctl_rule *rule) in rctl_available_resource() argument 365 racct = rctl_proc_rule_to_racct(p, rule); in rctl_available_resource() 366 available = rule->rr_amount - racct->r_resources[rule->rr_resource]; in rctl_available_resource() 381 struct rctl_rule *rule; in rctl_throttle_decay() local 391 rule = link->rrl_rule; in rctl_throttle_decay() [all …]
|
| /src/sys/netpfil/pf/ |
| H A D | pf_nv.c | 505 pf_nvrule_to_krule(const nvlist_t *nvl, struct pf_krule *rule) in pf_nvrule_to_krule() argument 512 PFNV_CHK(pf_nvuint32(nvl, "nr", &rule->nr)); in pf_nvrule_to_krule() 518 &rule->src); in pf_nvrule_to_krule() 526 &rule->dst)); in pf_nvrule_to_krule() 529 PFNV_CHK(pf_nvstring(nvl, "label", rule->label[0], in pf_nvrule_to_krule() 530 sizeof(rule->label[0]))); in pf_nvrule_to_krule() 541 ret = strlcpy(rule->label[i], strs[i], in pf_nvrule_to_krule() 542 sizeof(rule->label[0])); in pf_nvrule_to_krule() 543 if (ret >= sizeof(rule->label[0])) in pf_nvrule_to_krule() 548 PFNV_CHK(pf_nvuint32_opt(nvl, "ridentifier", &rule->ridentifier, 0)); in pf_nvrule_to_krule() [all …]
|
| H A D | pf_ioctl.c | 445 struct pf_krule *rule; in pf_get_kpool() local 461 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, in pf_get_kpool() 464 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); in pf_get_kpool() 470 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, in pf_get_kpool() 473 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); in pf_get_kpool() 476 while ((rule != NULL) && (rule->nr != rule_number)) in pf_get_kpool() 477 rule = TAILQ_NEXT(rule, entries); in pf_get_kpool() 479 if (rule == NULL) in pf_get_kpool() 484 return (&rule->rdr); in pf_get_kpool() 486 return (&rule->nat); in pf_get_kpool() [all …]
|
| /src/sys/security/mac_bsdextended/ |
| H A D | mac_bsdextended.c | 114 ugidfw_rule_valid(struct mac_bsdextended_rule *rule) in ugidfw_rule_valid() argument 117 if ((rule->mbr_subject.mbs_flags | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid() 119 if ((rule->mbr_subject.mbs_neg | MBS_ALL_FLAGS) != MBS_ALL_FLAGS) in ugidfw_rule_valid() 121 if ((rule->mbr_object.mbo_flags | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid() 123 if ((rule->mbr_object.mbo_neg | MBO_ALL_FLAGS) != MBO_ALL_FLAGS) in ugidfw_rule_valid() 125 if (((rule->mbr_object.mbo_flags & MBO_TYPE_DEFINED) != 0) && in ugidfw_rule_valid() 126 (rule->mbr_object.mbo_type | MBO_ALL_TYPE) != MBO_ALL_TYPE) in ugidfw_rule_valid() 128 if ((rule->mbr_mode | MBI_ALLPERM) != MBI_ALLPERM) in ugidfw_rule_valid() 225 ugidfw_rulecheck(struct mac_bsdextended_rule *rule, in ugidfw_rulecheck() argument 235 if (rule->mbr_subject.mbs_flags & MBS_UID_DEFINED) { in ugidfw_rulecheck() [all …]
|
| /src/sys/security/mac_portacl/ |
| H A D | mac_portacl.c | 111 struct rule { struct 117 TAILQ_ENTRY(rule) r_entries; argument 133 static TAILQ_HEAD(rulehead, rule) rule_head; 139 struct rule *rule; in toast_rules() local 141 while ((rule = TAILQ_FIRST(head)) != NULL) { in toast_rules() 142 TAILQ_REMOVE(head, rule, r_entries); in toast_rules() 143 free(rule, M_PORTACL); in toast_rules() 171 parse_rule_element(char *element, struct rule **rule) in parse_rule_element() argument 174 struct rule *new; in parse_rule_element() 230 *rule = NULL; in parse_rule_element() [all …]
|
| /src/sys/net/ |
| H A D | dummymbuf.c | 144 #define FEEDBACK_RULE(rule, msg) \ argument 147 (rule).syntax_len, (rule).syntax_begin \ 150 #define FEEDBACK_PFIL(pfil_type, pfil_flags, ifp, rule, msg) \ argument 159 (rule).syntax_len, (rule).syntax_begin \ 166 struct rule; 167 typedef struct mbuf * (*op_t)(struct mbuf *, struct rule *); 168 struct rule { struct 179 dmb_m_pull_head(struct mbuf *m, struct rule *rule) in dmb_m_pull_head() argument 184 count = (int)strtol(rule->opargs, NULL, 10); in dmb_m_pull_head() 213 dmb_m_enlarge(struct mbuf *m, struct rule *rule) in dmb_m_enlarge() argument [all …]
|
| /src/sys/security/mac_ipacl/ |
| H A D | mac_ipacl.c | 133 struct ip_rule *rule; in destroy_rules() local 135 while ((rule = TAILQ_FIRST(head)) != NULL) { in destroy_rules() 136 TAILQ_REMOVE(head, rule, r_entries); in destroy_rules() 137 free(rule, M_IPACL); in destroy_rules() 159 parse_rule_element(char *element, struct ip_rule *rule) in parse_rule_element() argument 171 rule->jid = strtol(tok, &p, 10); in parse_rule_element() 177 rule->allow = strtol(tok, &p, 10); in parse_rule_element() 184 strlcpy(rule->if_name, tok, strlen(tok) + 1); in parse_rule_element() 188 rule->af = (strcmp(tok, "AF_INET") == 0) ? AF_INET : in parse_rule_element() 190 if (rule->af == -1) in parse_rule_element() [all …]
|
| /src/tests/sys/mac/ipacl/ |
| H A D | ipacl_test.sh | 74 rule="${jidA},1,${epairA}b,AF_INET,192.0.2.42/-1@" 75 rule="${rule}${jidB},1,${epairB}b,AF_INET,198.51.100.12/-1@" 76 rule="${rule}${jidB},1,,AF_INET,203.0.113.1/24@" 77 rule="${rule}${jidB},0,,AF_INET,203.0.113.9/-1" 78 sysctl security.mac.ipacl.rules="${rule}" 110 rule="${jidA},1,,AF_INET,198.18.0.0/15@" 111 rule="${rule}${jidA},0,,AF_INET,198.18.23.0/24@" 112 rule="${rule}${jidA},1,,AF_INET,198.18.23.1/-1@" 113 rule="${rule}${jidA},1,,AF_INET,198.51.100.0/24@" 114 rule="${rule}${jidA},0,,AF_INET,198.51.100.100/-1" [all …]
|
| /src/sys/netpfil/ipfw/ |
| H A D | ip_fw_bpf.c | 60 uint32_t rule; member 69 return (a->rule != b->rule ? (a->rule < b->rule ? -1 : 1) : 0); in tap_compare() 76 ipfw_tap_alloc(struct ip_fw_chain *ch, uint32_t rule) in ipfw_tap_alloc() argument 78 struct ipfw_tap *tap, key = { .rule = rule }; in ipfw_tap_alloc() 81 MPASS(rule > 0 && rule < IPFW_DEFAULT_RULE); in ipfw_tap_alloc() 86 MPASS(tap->rule == rule); in ipfw_tap_alloc() 91 tap->rule = rule; in ipfw_tap_alloc() 93 n = snprintf(tap->name, sizeof(tap->name), "ipfw%u", rule); in ipfw_tap_alloc() 102 ipfw_tap_free(struct ip_fw_chain *ch, uint32_t rule) in ipfw_tap_free() argument 104 struct ipfw_tap *tap, key = { .rule = rule }; in ipfw_tap_free() [all …]
|
| H A D | ip_fw_dynamic.c | 801 hash_parent(const struct ipfw_flow_id *id, const void *rule) in hash_parent() argument 804 return (hash_packet(id) ^ ((uintptr_t)rule)); in hash_parent() 897 hash_parent(const struct ipfw_flow_id *id, const void *rule) in hash_parent() argument 900 return (jenkins_hash32((const uint32_t *)&rule, in hash_parent() 901 sizeof(rule) / sizeof(uint32_t), hash_packet(id))); in hash_parent() 1132 dyn_lookup_ipv4_parent(const struct ipfw_flow_id *pkt, const void *rule, in dyn_lookup_ipv4_parent() argument 1150 if (s->limit->parent == rule && in dyn_lookup_ipv4_parent() 1169 const void *rule, uint32_t ruleid, uint32_t rulenum, uint32_t bucket) in dyn_lookup_ipv4_parent_locked() argument 1175 if (s->limit->parent == rule && in dyn_lookup_ipv4_parent_locked() 1282 const void *rule, uint32_t ruleid, uint32_t rulenum, uint32_t hashval) in dyn_lookup_ipv6_parent() argument [all …]
|
| H A D | ip_fw_sockopt.c | 150 static int ref_rule_objects(struct ip_fw_chain *ch, struct ip_fw *rule, 154 static void unref_rule_objects(struct ip_fw_chain *chain, struct ip_fw *rule); 192 struct ip_fw *rule; in ipfw_alloc_rule() local 194 rule = malloc(rulesize, M_IPFW, M_WAITOK | M_ZERO); in ipfw_alloc_rule() 195 rule->cntr = uma_zalloc_pcpu(V_ipfw_cntr_zone, M_WAITOK | M_ZERO); in ipfw_alloc_rule() 196 rule->refcnt = 1; in ipfw_alloc_rule() 198 return (rule); in ipfw_alloc_rule() 202 ipfw_free_rule(struct ip_fw *rule) in ipfw_free_rule() argument 211 if (rule->refcnt > 1) in ipfw_free_rule() 213 uma_zfree_pcpu(V_ipfw_cntr_zone, rule->cntr); in ipfw_free_rule() [all …]
|
| /src/tests/sys/netpfil/pf/ioctl/ |
| H A D | validation.c | 855 struct pfioc_rule rule; in ATF_TC_BODY() local 859 memset(&rule, 0x42, sizeof(rule)); in ATF_TC_BODY() 861 rule.ticket = 0; in ATF_TC_BODY() 862 rule.pool_ticket = 0; in ATF_TC_BODY() 863 rule.anchor[0] = 0; in ATF_TC_BODY() 865 rule.rule.return_icmp = 0; in ATF_TC_BODY() 866 bzero(&rule.rule.src, sizeof(rule.rule.src)); in ATF_TC_BODY() 867 bzero(&rule.rule.dst, sizeof(rule.rule.dst)); in ATF_TC_BODY() 869 rule.rule.ifname[0] = 0; in ATF_TC_BODY() 870 rule.rule.action = 0; in ATF_TC_BODY() [all …]
|
| /src/lib/libugidfw/ |
| H A D | ugidfw.c | 62 bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, size_t buflen) in bsde_rule_to_string() argument 67 char *cur, type[sizeof(rule->mbr_object.mbo_type) * CHAR_BIT + 1]; in bsde_rule_to_string() 79 if (rule->mbr_subject.mbs_flags) { in bsde_rule_to_string() 80 if (rule->mbr_subject.mbs_neg == MBS_ALL_FLAGS) { in bsde_rule_to_string() 91 if (!notdone && (rule->mbr_subject.mbs_neg & MBO_UID_DEFINED)) { in bsde_rule_to_string() 98 if (rule->mbr_subject.mbs_flags & MBO_UID_DEFINED) { in bsde_rule_to_string() 99 pwd = getpwuid(rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string() 109 rule->mbr_subject.mbs_uid_min); in bsde_rule_to_string() 115 if (rule->mbr_subject.mbs_uid_min != in bsde_rule_to_string() 116 rule->mbr_subject.mbs_uid_max) { in bsde_rule_to_string() [all …]
|
| H A D | ugidfw.h | 38 int bsde_rule_to_string(struct mac_bsdextended_rule *rule, char *buf, 43 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr); 45 struct mac_bsdextended_rule *rule, size_t buflen, char *errstr); 49 int bsde_get_rule(int rulenum, struct mac_bsdextended_rule *rule, 52 int bsde_set_rule(int rulenum, struct mac_bsdextended_rule *rule, 54 int bsde_add_rule(int *rulename, struct mac_bsdextended_rule *rule,
|
| /src/usr.bin/rctl/ |
| H A D | rctl.c | 110 expand_amount(const char *rule, const char *unexpanded_rule) in expand_amount() argument 117 tofree = copy = strdup(rule); in expand_amount() 135 copy = strdup(rule); in expand_amount() 175 expand_rule(const char *rule, bool resolve_ids) in expand_rule() argument 182 tofree = copy = strdup(rule); in expand_rule() 191 warnx("malformed rule '%s': missing subject", rule); in expand_rule() 214 error = parse_user(textid, &id, rule); in expand_rule() 222 error = parse_group(textid, &id, rule); in expand_rule() 240 expanded = expand_amount(resolved, rule); in expand_rule() 247 humanize_ids(char *rule) in humanize_ids() argument [all …]
|
| /src/sys/security/mac_do/ |
| H A D | mac_do.c | 153 struct rule { struct 154 STAILQ_ENTRY(rule) r_entries; 165 STAILQ_HEAD(rulehead, rule); argument 319 struct rule *rule, *rule_next; in toast_rules() local 321 STAILQ_FOREACH_SAFE(rule, head, r_entries, rule_next) { in toast_rules() 322 free(rule->uids, M_MAC_DO); in toast_rules() 323 free(rule->gids, M_MAC_DO); in toast_rules() 324 free(rule, M_MAC_DO); in toast_rules() 517 parse_target_clause(char *to, struct rule *const rule, in parse_target_clause() argument 565 nb = &rule->gids_nb; in parse_target_clause() [all …]
|
| /src/sbin/ipfw/tests/ |
| H A D | ipfw_test.sh | 23 local rule="xyzzy" 31 atf_check jexec ${jail} ipfw nptv6 ${rule} create \ 34 "nptv6 $rule int_prefix $int ext_prefix $ext prefixlen 64\n" \ 39 atf_check jexec ${jail} ipfw nptv6 ${rule} create \ 42 "nptv6 $rule int_prefix $int ext_if ${epair}a prefixlen 64\n" \ 47 atf_check jexec ${jail} ipfw nptv6 ${rule} create \ 50 "nptv6 $rule int_prefix $int ext_prefix $ext prefixlen 64\n" \ 56 jexec ${jail} ipfw nptv6 ${rule} create \ 59 "nptv6 $rule int_prefix $int ext_prefix $ext prefixlen 64\n" \ 65 jexec ${jail} ipfw nptv6 ${rule} create \ [all …]
|
| /src/contrib/bmake/unit-tests/ |
| H A D | var-scope-local.mk | 21 all: target-rule.ext dir/subdir/target-rule.ext 22 target-rule.ext dir/subdir/target-rule.ext: .PHONY 35 all: target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from 36 target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from: 57 all: inference-rule.ir-to dir/subdir/inference-rule.ir-to 58 inference-rule.ir-from: .PHONY 59 dir/subdir/inference-rule.ir-from: .PHONY 62 all: inference-rule-chain.ir-to dir/subdir/inference-rule-chain.ir-to 63 inference-rule-chain.ir-gen-from: .PHONY 64 dir/subdir/inference-rule-chain.ir-gen-from: .PHONY
|
| /src/sys/dev/mlx5/mlx5_accel/ |
| H A D | mlx5_ipsec_fs.c | 110 struct mlx5_flow_handle *rule; member 116 struct mlx5_flow_handle *rule; member 134 struct mlx5_flow_handle *rule; member 336 miss->rule = mlx5_add_flow_rules(ft, NULL, &flow_act, dest, 1); in ipsec_miss_create() 337 if (IS_ERR(miss->rule)) { in ipsec_miss_create() 339 err = PTR_ERR(miss->rule); in ipsec_miss_create() 526 struct mlx5_flow_handle *rule; in rx_add_rule() local 589 rule = mlx5_add_flow_rules(rx->ft.sa, spec, &flow_act, dest, 2); in rx_add_rule() 590 if (IS_ERR(rule)) { in rx_add_rule() 591 err = PTR_ERR(rule); in rx_add_rule() [all …]
|
| /src/usr.sbin/ugidfw/ |
| H A D | ugidfw.c | 74 struct mac_bsdextended_rule rule; in add_rule() local 77 error = bsde_parse_rule(argc, argv, &rule, BUFSIZ, errstr); in add_rule() 83 error = bsde_add_rule(&rulenum, &rule, BUFSIZ, errstr); in add_rule() 88 if (bsde_rule_to_string(&rule, charstr, BUFSIZ) == -1) in add_rule() 98 struct mac_bsdextended_rule rule; in list_rules() local 115 error = bsde_get_rule(i, &rule, BUFSIZ, errstr); in list_rules() 126 if (bsde_rule_to_string(&rule, charstr, BUFSIZ) == -1) in list_rules() 137 struct mac_bsdextended_rule rule; in set_rule() local 154 error = bsde_parse_rule(argc - 1, argv + 1, &rule, BUFSIZ, errstr); in set_rule() 160 error = bsde_set_rule(rulenum, &rule, BUFSIZ, errstr); in set_rule()
|
| /src/crypto/openssl/doc/designs/quic-design/images/ |
| H A D | quic-concurrency-models.svg | 1 …rule="evenodd"/></clipPath><clipPath clipPathUnits="userSpaceOnUse" id="b"><path d="M0 0h3575v1622…
|
| /src/sbin/pfctl/ |
| H A D | pfctl.c | 1164 pfctl_print_eth_rule_counters(struct pfctl_eth_rule *rule, int opts) in pfctl_print_eth_rule_counters() argument 1169 (unsigned long long)rule->evaluations, in pfctl_print_eth_rule_counters() 1170 (unsigned long long)(rule->packets[0] + in pfctl_print_eth_rule_counters() 1171 rule->packets[1]), in pfctl_print_eth_rule_counters() 1172 (unsigned long long)(rule->bytes[0] + in pfctl_print_eth_rule_counters() 1173 rule->bytes[1])); in pfctl_print_eth_rule_counters() 1178 if (rule->last_active_timestamp != 0) { in pfctl_print_eth_rule_counters() 1179 bcopy(ctime(&rule->last_active_timestamp), timestr, in pfctl_print_eth_rule_counters() 1190 pfctl_print_rule_counters(struct pfctl_rule *rule, int opts) in pfctl_print_rule_counters() argument 1199 if (rule->skip[i].nr == rule->nr + 1) in pfctl_print_rule_counters() [all …]
|
| /src/crypto/krb5/src/lib/krb5/os/ |
| H A D | localauth_rule.c | 145 char *newstr, *rule = NULL, *repl = NULL, *current = NULL; in aname_replacer() local 169 free(rule); in aname_replacer() 170 rule = k5memdup0(cp + 2, ep - (cp + 2), &ret); in aname_replacer() 171 if (rule == NULL) in aname_replacer() 184 ret = do_replacement(rule, repl, doglobal, current, &newstr); in aname_replacer() 196 free(rule); in aname_replacer() 273 const char *rule, krb5_const_principal aname, char **lname_out) in an2ln_rule() argument 280 if (rule == NULL) in an2ln_rule() 284 current = rule; in an2ln_rule()
|