/src/sbin/cgdconfig/ |
cgdparse.y | 60 %type <params> entry rules rule 80 entry: rules { yy_global_params = $$; } 82 rules: /* empty */ { $$ = NULL; } label 83 | rules rule { $$ = params_combine($$, $2); } 129 /* The following rules are deprecated */
|
/src/games/backgammon/backgammon/ |
main.c | 68 static const char rules[] = "\nDo you want the rules of the game?"; variable in typeref:typename:const char[] 145 if (aflag) { /* print rules */ 146 writel(rules); 156 } else {/* if not rules, then instructions */
|
/src/sys/net/npf/ |
npf_ctl.c | 33 * Implementation of (re)loading, construction of tables and rules. 401 const nvlist_t * const *rules; local in function:npf_mk_rules 406 if (nvlist_exists_nvlist_array(req, "rules")) { 407 rules = nvlist_get_nvlist_array(req, "rules", &nitems); 413 rules = NULL; 418 const nvlist_t *rule = rules[i]; 448 * NAT rules are standard rules, plus the translation policy. 565 * passed rules, tables, etc and atomically activate them all [all...] |
/src/lib/libnpf/ |
npf.c | 169 * _npf_rules_process: transform the ruleset representing nested rules 446 return nvlist_exists_nvlist_array(ncf->ncf_dict, "rules"); 455 nvlist_move_nvlist_array(ncf->ncf_dict, "rules", 757 "rules") ? "rules" : "__rules"; // config may not be built yet 822 return _npf_rule_iterate1(ncf, "rules", iter, level); 902 if (nvlist_exists_nvlist_array(resp, "rules")) { 903 nvlist_t **rules; local in function:_npf_ruleset_list 906 rules = nvlist_take_nvlist_array(resp, "rules", &n) [all...] |
/src/sys/external/bsd/ipf/netinet/ |
fil.c | 304 * Table of functions available for use with call rules. 818 /* are two rules that can be used to guard against type 3 packets: L4 */ 2194 /* port numbers, etc, for "standard" IPFilter rules are all orchestrated in */ 2364 /* Check the input/output list of rules for a match to the current packet. */ 2391 * If there are no rules in this list, return now. 2589 * packet, set it up. Add state for "quick" rules 2592 * filter rules. 2621 /* Checks a packet against accounting rules, if there are any for the given */ 2662 /* Applies an appropriate set of firewall rules to the packet, to see if */ 2664 /* in the cache. If not, then search an appropriate list of rules. Once a * 3861 int rules, rn; local in function:ipf_fixskip [all...] |
/src/lib/libc/time/ |
zic.c | 347 static struct rule * rules; variable in typeref:struct:rule * 348 static ptrdiff_t nrules; /* number of rules */ 1618 ** Associate sets of rules with zones. 1640 qsort(rules, (size_t)nrules, sizeof *rules, rcomp); 1642 if (strcmp(rules[i].r_name, 1643 rules[i + 1].r_name) != 0) 1645 if (rules[i].r_filenum == rules[i + 1].r_filenum) 1647 eat(rules[i].r_filenum, rules[i].r_linenum) [all...] |
/src/sys/dist/pf/net/ |
pfvar.h | 898 } rules[PF_RULESET_MAX]; member in struct:pf_ruleset 915 int refcnt; /* anchor rules */
|