| /src/usr.bin/make/unit-tests/ |
| var-scope-local.exp | 1 Global: .ALLTARGETS = all target-rule.ext dir/subdir/target-rule.ext target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-from inference-rule.ir-to dir/subdir/inference-rule.ir-to inference-rule.ir-from dir/subdir/inference-rule.ir-from inference-rule-chain.ir-to dir/subdir/inference-rule-chain.ir-to inference-rule-chain.ir-gen-from dir/subdir/inference-rule-chain.ir-gen-from on [all...] |
| var-scope-local.mk | 15 # Target-local variables in a target rule 20 # expect: target-rule.ext: * = <target-rule.ext> 21 all: target-rule.ext dir/subdir/target-rule.ext 22 target-rule.ext dir/subdir/target-rule.ext: .PHONY 34 # expect: target-rule.ir-gen-from: * = <target-rule> 35 all: target-rule.ir-gen-from dir/subdir/target-rule-dir.ir-gen-fro [all...] |
| posix1.mk | 114 # The system makefiles make the .c.a rule .PRECIOUS with a special source, 139 # Explicit rule where the dependency is an inferred file. The dependency 152 # Excplicit rule where the dependency also has an explicit rule.
|
| /src/dist/pf/usr.sbin/ftp-proxy/ |
| filter.c | 97 pfr.rule.direction = dir; 131 pfr.rule.rpool.proxy_port[0] = nat_range_low; 132 pfr.rule.rpool.proxy_port[1] = nat_range_high; 165 pfr.rule.rpool.proxy_port[0] = rdr_port; 289 /* Generic for all rule types. */ 290 pfr.rule.af = src->sa_family; 291 pfr.rule.proto = IPPROTO_TCP; 292 pfr.rule.src.addr.type = PF_ADDR_ADDRMASK; 293 pfr.rule.dst.addr.type = PF_ADDR_ADDRMASK; 295 memcpy(&pfr.rule.src.addr.v.a.addr.v4 [all...] |
| /src/dist/pf/libexec/tftp-proxy/ |
| filter.c | 74 pfr.rule.direction = dir; 107 pfr.rule.rpool.proxy_port[0] = nat_range_low; 108 pfr.rule.rpool.proxy_port[1] = nat_range_high; 140 pfr.rule.rpool.proxy_port[0] = rdr_port; 267 /* Generic for all rule types. */ 268 pfr.rule.af = src->sa_family; 269 pfr.rule.proto = proto; 270 pfr.rule.src.addr.type = PF_ADDR_ADDRMASK; 271 pfr.rule.dst.addr.type = PF_ADDR_ADDRMASK; 273 memcpy(&pfr.rule.src.addr.v.a.addr.v4 [all...] |
| /src/sys/dist/pf/net/ |
| pf_ioctl.c | 288 /* default rule should never be garbage collected */ 481 struct pf_rule *rule; local 495 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, 498 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); 504 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, 507 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); 510 while ((rule != NULL) && (rule->nr != rule_number)) 511 rule = TAILQ_NEXT(rule, entries) 912 struct pf_rule *rule; local 932 struct pf_rule *rule; local 1035 struct pf_rule *rule, **old_array; local 1216 struct pf_rule *rule; local 1410 struct pf_rule *rule, *tail; local 1596 struct pf_rule *rule; local 2215 struct pf_rule *rule; local [all...] |
| pf.c | 283 (((*state)->rule.ptr->rt == PF_ROUTETO && \ 284 (*state)->rule.ptr->direction == PF_OUT) || \ 285 ((*state)->rule.ptr->rt == PF_REPLYTO && \ 286 (*state)->rule.ptr->direction == PF_IN)) && \ 305 s->rule.ptr->states++; \ 318 s->rule.ptr->states--; \ 365 if (a->rule.ptr > b->rule.ptr) 367 if (a->rule.ptr < b->rule.ptr [all...] |
| /src/tests/ipf/ |
| t_bpf.sh | 52 { while read rule; do 53 atf_check -o save:save -x "echo '$rule' | ipftest -Rbr - -i in"
|
| t_logging.sh | 47 { while read rule; do 48 echo $rule >>out 50 "echo $rule | ipftest -br - -F $2 -i in -l logout"
|
| t_filter_exec.sh | 49 { while read rule; do 50 atf_check -x "echo \"$rule\" | ipftest -F \ 101 { while read rule; do 102 atf_check -o save:save -x "echo \"$rule\" | \
|
| t_nat_exec.sh | 53 { while read rule; do 55 "echo \"$rule\" | ipftest $format -RDbN - -i in $args"
|
| t_nat_ipf_exec.sh | 55 { while read rule; do 56 atf_check -o save:save -x "echo \"$rule\" | \
|
| /src/usr.bin/xlint/lint1/ |
| check-msgs.lua | 143 print_error("%s:%d: duplicate type declaration for rule %q", 147 table.insert(decl_list, { lineno = lineno, rule = type }) 149 local rule = line:match("^([%w_]+):") 150 if rule then 151 if decl[rule] then 152 decl[rule] = nil 154 print_error("%s:%d: missing type declaration for rule %q", 155 filename, lineno, rule) 159 if expected.rule == rule the [all...] |
| /src/sys/net/npf/ |
| npf_ruleset.c | 90 /* NAT policy (optional), rule procedure and subset. */ 96 * Dynamic group: rule subset and a group list entry. 104 * Dynamic rule: priority, parent group and next rule. 113 /* Rule ID, name and the optional key. */ 188 * npf_ruleset_insert: insert the rule into the specified ruleset. 201 KASSERTMSG(rl->r_parent == NULL, "cannot be dynamic rule"); 228 * npf_ruleset_add: insert dynamic rule into the (active) ruleset. 244 /* Dynamic rule - assign a unique ID and save the parent. */ 249 * Rule priority: (highest) 1, 2 ... n (lowest) 377 nvlist_t *rule; local 449 nvlist_t *rule; local 678 nvlist_t *rule = nvlist_create(0); local [all...] |
| /src/dist/pf/sbin/pfctl/ |
| pfctl.c | 711 pfctl_print_rule_counters(struct pf_rule *rule, int opts) 720 if (rule->skip[i].nr == rule->nr + 1) 723 if (rule->skip[i].nr == -1) 726 printf("%u ", rule->skip[i].nr); 731 rule->qname, rule->qid, rule->pqname, rule->pqid); 736 (unsigned long long)rule->evaluations 1134 struct pf_rule *rule; local [all...] |
| /src/share/mk/ |
| bsd.inc.mk | 29 ${_F}! ${F} __incinstall # install rule 31 ${_F}: ${F} __incinstall # install rule
|
| bsd.nls.mk | 45 ${_F}! ${F} __nlsinstall # install rule 50 ${_F}: ${F} __nlsinstall # install rule
|
| bsd.files.mk | 47 ${_F}! ${F} __fileinstall # install rule 52 ${_F}: ${F} __fileinstall # install rule 80 ${_F}! ${F} __fileinstall # install rule 85 ${_F}: ${F} __fileinstall # install rule
|
| bsd.man.mk | 91 ${_MSECTIONS:@N@.$N.$N${MANSUFFIX}@}: # build rule 100 ${_F}! ${F}${MANSUFFIX} __installpage # install rule 105 ${_F}: ${F}${MANSUFFIX} __installpage # install rule 146 ${_MSECTIONS:@N@.$N.cat$N${MANSUFFIX}@}: ${CATDEPS} # build rule 168 ${_F}! ${F}${MANSUFFIX} __installpage # install rule 173 ${_F}: ${F}${MANSUFFIX} __installpage # install rule 216 ${_MSECTIONS:@N@.$N.html$N@}: # build rule 240 ${_F}! ${F} __installpage # install rule 245 ${_F}: ${F} __installpage # install rule
|
| bsd.info.mk | 64 ${_F}! ${F} __infoinstall # install rule 69 ${_F}: ${F} __infoinstall # install rule
|
| bsd.kinc.mk | 54 ${_F}! ${F} __incinstall # install rule 56 ${_F}: ${F} __incinstall # install rule
|
| /src/usr.sbin/npf/npftest/libnpftest/ |
| npf_l2rule_test.c | 119 nvlist_t *rule = nvlist_create(0); local 122 nvlist_add_number(rule, "attr", 124 rl = npf_rule_alloc(npf, rule); 125 nvlist_destroy(rule); 144 printf("rule test %d:\texpected %d\n"
|
| npf_rule_test.c | 273 nvlist_t *rule = nvlist_create(0); local 276 nvlist_add_number(rule, "attr", 278 rl = npf_rule_alloc(npf, rule); 279 nvlist_destroy(rule); 299 printf("rule test %d:\texpected %d (stateful) and %d\n"
|
| /src/sbin/cgdconfig/ |
| cgdparse.y | 60 %type <params> entry rules rule 83 | rules rule { $$ = params_combine($$, $2); } 85 rule: ALGORITHM stringlit EOL { $$ = params_algorithm($2); } label
|
| /src/games/atc/ |
| input.c | 112 } RULE; 116 RULE *rule; member in struct:__anon87 122 int rule; member in struct:__anon88 127 #define T_RULE stack[level].rule 138 RULE state0[] = { { ALPHATOKEN, 1, "%c:", setplane}, 255 st[T_STATE].rule[ruleno].str, tval); 258 newstate = st[T_STATE].rule[ruleno].to_state; 292 if (st[T_STATE].rule[i].token == c || 293 st[T_STATE].rule[i].token == tval) [all...] |