/netbsd-src/usr.sbin/altq/altqd/altq.conf.samples/ |
H A D | cbq.widecamp | 25 filter sr0 tcp 0 0 0 0 6 # other tcp 27 filter sr0 ftp 0 0 0 20 6 # ftp-data 28 filter sr0 ftp 0 20 0 0 6 # ftp-data 30 filter sr0 http 0 0 0 80 6 # http 31 filter sr0 http 0 80 0 0 6 # http 32 filter sr0 http 0 0 0 8080 6 # cache 33 filter sr0 http 0 8080 0 0 6 # cache 34 filter sr0 http 0 0 0 443 6 # https 35 filter sr0 http 0 443 0 0 6 # https 37 filter sr0 pop3 0 0 0 110 6 # pop3 [all …]
|
H A D | cbq.sample0 | 24 filter sr0 tcp 0 0 0 0 6 # other tcp 26 filter sr0 ftp 0 0 0 20 6 # ftp-data 27 filter sr0 ftp 0 20 0 0 6 # ftp-data 29 filter sr0 http 0 0 0 80 6 # http 30 filter sr0 http 0 80 0 0 6 # http 32 filter sr0 pop3 0 0 0 110 6 # pop3 33 filter sr0 pop3 0 110 0 0 6 # pop3 35 filter sr0 imap 0 0 0 143 6 # imap 36 filter sr0 imap 0 143 0 0 6 # imap 41 filter sr0 udp 0 0 0 0 17 # other udp [all …]
|
H A D | cbq.diffedge | 13 filter pvc1 ef_cdnr 0 0 172.16.4.174 0 0 27 filter pvc1 af1x_cdnr 0 0 172.16.4.176 0 0 28 filter pvc1 af2x_cdnr 0 0 172.16.4.177 0 0 29 filter pvc1 af3x_cdnr 0 0 172.16.4.178 0 0 30 filter pvc1 af4x_cdnr 0 0 172.16.4.179 0 0 42 filter pvc0 ef_class 0 0 0 0 0 tos 0xb8 tosmask 0xfc 54 filter pvc0 af1x_class 0 0 0 0 0 tos 0x20 tosmask 0xe4 55 filter pvc0 af2x_class 0 0 0 0 0 tos 0x40 tosmask 0xe4 56 filter pvc0 af3x_class 0 0 0 0 0 tos 0x60 tosmask 0xe4 57 filter pvc0 af4x_class 0 0 0 0 0 tos 0x80 tosmask 0xe4
|
H A D | hfsc.diffedge | 12 filter pvc1 ef_cdnr 0 0 172.16.4.174 0 0 26 filter pvc1 af1x_cdnr 0 0 172.16.4.176 0 0 27 filter pvc1 af2x_cdnr 0 0 172.16.4.177 0 0 28 filter pvc1 af3x_cdnr 0 0 172.16.4.178 0 0 29 filter pvc1 af4x_cdnr 0 0 172.16.4.179 0 0 42 filter pvc0 ef_class 0 0 0 0 0 tos 0xb8 tosmask 0xfc 56 filter pvc0 af1x_class 0 0 0 0 0 tos 0x20 tosmask 0xe4 57 filter pvc0 af2x_class 0 0 0 0 0 tos 0x40 tosmask 0xe4 58 filter pvc0 af3x_class 0 0 0 0 0 tos 0x60 tosmask 0xe4 59 filter pvc0 af4x_class 0 0 0 0 0 tos 0x80 tosmask 0xe4
|
/netbsd-src/external/mit/isl/dist/test_inputs/codegen/cloog/ |
H A D | swim.st | 6 - filter: "[M, N, O, P, Q, R] -> { S1[] }" 7 - filter: "[M, N, O, P, Q, R] -> { S2[] }" 8 - filter: "[M, N, O, P, Q, R] -> { S3[] }" 9 - filter: "[M, N, O, P, Q, R] -> { S4[] }" 10 - filter: "[M, N, O, P, Q, R] -> { S5[] }" 11 - filter: "[M, N, O, P, Q, R] -> { S6[] }" 12 - filter: "[M, N, O, P, Q, R] -> { S7[] }" 13 - filter: "[M, N, O, P, Q, R] -> { S8[] }" 14 - filter: "[M, N, O, P, Q, R] -> { S9[] }" 15 - filter: "[M, N, O, P, Q, R] -> { S10[] }" [all …]
|
H A D | usvd_e_t.st | 9 - filter: "{ S1[i0, i1, i2] }" 10 - filter: "{ S2[i0, i1, i2] }" 11 - filter: "{ S3[i0, i1, i2] }" 12 - filter: "{ S4[i0, i1, i2] }" 13 - filter: "{ S5[i0, i1, i2] }" 14 - filter: "{ S6[i0, i1, i2] }" 15 - filter: "{ S7[i0, i1, i2] }" 16 - filter: "{ S8[i0, i1, i2] }" 17 - filter: "{ S9[i0, i1, i2] }" 18 - filter: "{ S10[i0, i1, i2] }" [all …]
|
/netbsd-src/external/mit/isl/dist/test_inputs/schedule/ |
H A D | fork3.st | 4 - filter: "{ D[]; B[]; C[]; A[] }" 7 - filter: "{ B[]; C[]; A[] }" 10 - filter: "{ B[]; A[] }" 13 - filter: "{ A[] }" 14 - filter: "{ B[] }" 15 - filter: "{ C[] }" 16 - filter: "{ D[] }" 17 - filter: "{ E[] }" 18 - filter: "{ G[]; F[] }" 21 - filter: "{ F[] }" [all …]
|
/netbsd-src/external/bsd/tmux/dist/ |
H A D | cmd-find-window.c | 52 struct args_value *filter; in cmd_find_window_exec() local 71 filter = xcalloc(1, sizeof *filter); in cmd_find_window_exec() 72 filter->type = ARGS_STRING; in cmd_find_window_exec() 75 xasprintf(&filter->string, in cmd_find_window_exec() 81 xasprintf(&filter->string, in cmd_find_window_exec() 85 xasprintf(&filter->string, in cmd_find_window_exec() 89 xasprintf(&filter->string, in cmd_find_window_exec() 94 xasprintf(&filter->string, in cmd_find_window_exec() 98 xasprintf(&filter->string, in cmd_find_window_exec() 102 xasprintf(&filter->string, in cmd_find_window_exec() [all …]
|
/netbsd-src/external/bsd/openldap/dist/tests/progs/ |
H A D | slapd-search.c | 49 char *sbase, int scope, char *filter, LDAP **ldp, 55 char *sbase, int scope, char *filter, char *attr, 92 char *filter = NULL; in main() local 126 filter = optarg; in main() 160 if (( sbase == NULL ) || ( filter == NULL )) in main() 163 if ( *filter == '\0' ) { in main() 180 sbase, scope, filter, attr, in main() 184 do_search( config, sbase, scope, filter, in main() 196 char *sbase, int scope, char *filter, char *attr, in do_random() argument 213 filter, attrs, 0, NULL, NULL, NULL, LDAP_NO_LIMIT, &res ); in do_random() [all …]
|
/netbsd-src/external/public-domain/xz/dist/src/liblzma/common/ |
H A D | filter_flags_encoder.c | 17 lzma_filter_flags_size(uint32_t *size, const lzma_filter *filter) in lzma_filter_flags_size() argument 19 if (filter->id >= LZMA_FILTER_RESERVED_START) in lzma_filter_flags_size() 22 return_if_error(lzma_properties_size(size, filter)); in lzma_filter_flags_size() 24 *size += lzma_vli_size(filter->id) + lzma_vli_size(*size); in lzma_filter_flags_size() 31 lzma_filter_flags_encode(const lzma_filter *filter, in lzma_filter_flags_encode() argument 35 if (filter->id >= LZMA_FILTER_RESERVED_START) in lzma_filter_flags_encode() 38 return_if_error(lzma_vli_encode(filter->id, NULL, in lzma_filter_flags_encode() 43 return_if_error(lzma_properties_size(&props_size, filter)); in lzma_filter_flags_encode() 51 return_if_error(lzma_properties_encode(filter, out + *out_pos)); in lzma_filter_flags_encode()
|
/netbsd-src/crypto/external/bsd/heimdal/dist/doc/doxyout/hdb/html/ |
H A D | dynsections.js | 49 removeClass('even').filter(':visible:even').addClass('even'); 84 var childRows = rows.filter(function() { return this.id.match(re); }); 87 if (childRows.filter(':first').is(':visible')===true) { 90 currentRowSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 91 currentRowSpans.filter(".arrow").html('►'); 92 rows.filter("[id^=row_"+id+"]").hide(); // hide all children 96 currentRowSpans.filter(".iconfclosed").removeClass("iconfclosed").addClass("iconfopen"); 97 currentRowSpans.filter(".arrow").html('▼'); 100 childRowsSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 101 childRowsSpans.filter(".arrow").html('►'); [all …]
|
/netbsd-src/crypto/external/bsd/heimdal/dist/doc/doxyout/base/html/ |
H A D | dynsections.js | 49 removeClass('even').filter(':visible:even').addClass('even'); 84 var childRows = rows.filter(function() { return this.id.match(re); }); 87 if (childRows.filter(':first').is(':visible')===true) { 90 currentRowSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 91 currentRowSpans.filter(".arrow").html('►'); 92 rows.filter("[id^=row_"+id+"]").hide(); // hide all children 96 currentRowSpans.filter(".iconfclosed").removeClass("iconfclosed").addClass("iconfopen"); 97 currentRowSpans.filter(".arrow").html('▼'); 100 childRowsSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 101 childRowsSpans.filter(".arrow").html('►'); [all …]
|
/netbsd-src/crypto/external/bsd/heimdal/dist/doc/doxyout/ntlm/html/ |
H A D | dynsections.js | 49 removeClass('even').filter(':visible:even').addClass('even'); 84 var childRows = rows.filter(function() { return this.id.match(re); }); 87 if (childRows.filter(':first').is(':visible')===true) { 90 currentRowSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 91 currentRowSpans.filter(".arrow").html('►'); 92 rows.filter("[id^=row_"+id+"]").hide(); // hide all children 96 currentRowSpans.filter(".iconfclosed").removeClass("iconfclosed").addClass("iconfopen"); 97 currentRowSpans.filter(".arrow").html('▼'); 100 childRowsSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 101 childRowsSpans.filter(".arrow").html('►'); [all …]
|
/netbsd-src/crypto/external/bsd/heimdal/dist/doc/doxyout/gssapi/html/ |
H A D | dynsections.js | 49 removeClass('even').filter(':visible:even').addClass('even'); 84 var childRows = rows.filter(function() { return this.id.match(re); }); 87 if (childRows.filter(':first').is(':visible')===true) { 90 currentRowSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 91 currentRowSpans.filter(".arrow").html('►'); 92 rows.filter("[id^=row_"+id+"]").hide(); // hide all children 96 currentRowSpans.filter(".iconfclosed").removeClass("iconfclosed").addClass("iconfopen"); 97 currentRowSpans.filter(".arrow").html('▼'); 100 childRowsSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 101 childRowsSpans.filter(".arrow").html('►'); [all …]
|
/netbsd-src/crypto/external/bsd/heimdal/dist/doc/doxyout/hx509/html/ |
H A D | dynsections.js | 49 removeClass('even').filter(':visible:even').addClass('even'); 84 var childRows = rows.filter(function() { return this.id.match(re); }); 87 if (childRows.filter(':first').is(':visible')===true) { 90 currentRowSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 91 currentRowSpans.filter(".arrow").html('►'); 92 rows.filter("[id^=row_"+id+"]").hide(); // hide all children 96 currentRowSpans.filter(".iconfclosed").removeClass("iconfclosed").addClass("iconfopen"); 97 currentRowSpans.filter(".arrow").html('▼'); 100 childRowsSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 101 childRowsSpans.filter(".arrow").html('►'); [all …]
|
/netbsd-src/crypto/external/bsd/heimdal/dist/doc/doxyout/krb5/html/ |
H A D | dynsections.js | 49 removeClass('even').filter(':visible:even').addClass('even'); 84 var childRows = rows.filter(function() { return this.id.match(re); }); 87 if (childRows.filter(':first').is(':visible')===true) { 90 currentRowSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 91 currentRowSpans.filter(".arrow").html('►'); 92 rows.filter("[id^=row_"+id+"]").hide(); // hide all children 96 currentRowSpans.filter(".iconfclosed").removeClass("iconfclosed").addClass("iconfopen"); 97 currentRowSpans.filter(".arrow").html('▼'); 100 childRowsSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 101 childRowsSpans.filter(".arrow").html('►'); [all …]
|
/netbsd-src/crypto/external/bsd/heimdal/dist/doc/doxyout/hcrypto/html/ |
H A D | dynsections.js | 49 removeClass('even').filter(':visible:even').addClass('even'); 84 var childRows = rows.filter(function() { return this.id.match(re); }); 87 if (childRows.filter(':first').is(':visible')===true) { 90 currentRowSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 91 currentRowSpans.filter(".arrow").html('►'); 92 rows.filter("[id^=row_"+id+"]").hide(); // hide all children 96 currentRowSpans.filter(".iconfclosed").removeClass("iconfclosed").addClass("iconfopen"); 97 currentRowSpans.filter(".arrow").html('▼'); 100 childRowsSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 101 childRowsSpans.filter(".arrow").html('►'); [all …]
|
/netbsd-src/crypto/external/bsd/heimdal/dist/doc/doxyout/wind/html/ |
H A D | dynsections.js | 49 removeClass('even').filter(':visible:even').addClass('even'); 84 var childRows = rows.filter(function() { return this.id.match(re); }); 87 if (childRows.filter(':first').is(':visible')===true) { 90 currentRowSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 91 currentRowSpans.filter(".arrow").html('►'); 92 rows.filter("[id^=row_"+id+"]").hide(); // hide all children 96 currentRowSpans.filter(".iconfclosed").removeClass("iconfclosed").addClass("iconfopen"); 97 currentRowSpans.filter(".arrow").html('▼'); 100 childRowsSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 101 childRowsSpans.filter(".arrow").html('►'); [all …]
|
/netbsd-src/external/mit/isl/dist/ |
H A D | isl_schedule_node.c | 330 isl_union_set *filter; member 353 isl_union_set *filter; in collect_filter_prefix_expansion() local 363 filter = isl_union_map_domain(universe); in collect_filter_prefix_expansion() 365 isl_space *space = isl_union_set_get_space(filter); in collect_filter_prefix_expansion() 369 contracted.filter = filter; in collect_filter_prefix_expansion() 372 contracted.filter = isl_union_set_free(contracted.filter); in collect_filter_prefix_expansion() 383 filter = contracted.filter; in collect_filter_prefix_expansion() 385 filter = isl_union_set_preimage_union_pw_multi_aff(filter, in collect_filter_prefix_expansion() 388 filter = isl_union_set_apply(filter, isl_union_map_copy(exp)); in collect_filter_prefix_expansion() 390 data->filter = filter; in collect_filter_prefix_expansion() [all …]
|
/netbsd-src/external/mit/libcbor/dist/docs/doxygen/ |
H A D | dynsections.js | 25 removeClass('even').filter(':visible:even').addClass('even'); 60 var childRows = rows.filter(function() { return this.id.match(re); }); 63 if (childRows.filter(':first').is(':visible')===true) { 66 currentRowSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 67 currentRowSpans.filter(".arrow").html('►'); 68 rows.filter("[id^=row_"+id+"]").hide(); // hide all children 72 currentRowSpans.filter(".iconfclosed").removeClass("iconfclosed").addClass("iconfopen"); 73 currentRowSpans.filter(".arrow").html('▼'); 76 childRowsSpans.filter(".iconfopen").removeClass("iconfopen").addClass("iconfclosed"); 77 childRowsSpans.filter(".arrow").html('►'); [all …]
|
/netbsd-src/external/mpl/bind/dist/bin/plugins/ |
H A D | filter-a.rst | 14 .. iscman:: filter-a 17 filter-a.so - filter A in DNS responses when AAAA is present 23 :program:`plugin query` "filter-a.so" [{ parameters }]; 28 :program:`filter-a.so` is a query plugin module for :iscman:`named`, enabling 35 plugin query "filter-a.so" { 36 filter-a-on-v6 yes; 37 filter-a-on-v4 yes; 38 filter-a { 192.0.2.1; 2001:db8:2::1; }; 56 ``filter-a`` 60 ``filter-a-on-v6`` [all …]
|
/netbsd-src/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Checkers/ |
H A D | CheckSecuritySyntaxOnly.cpp | 77 const ChecksFilter &filter; member in __anon2e339db80111::WalkAST 84 filter(f) {} in WalkAST() 263 if (!filter.check_FloatLoopCounter) in checkLoopConditionForFloat() 338 BR.EmitBasicReport(AC->getDecl(), filter.checkName_FloatLoopCounter, in checkLoopConditionForFloat() 350 if (!filter.check_bcmp) in checkCall_bcmp() 378 BR.EmitBasicReport(AC->getDecl(), filter.checkName_bcmp, in checkCall_bcmp() 392 if (!filter.check_bcopy) in checkCall_bcopy() 420 BR.EmitBasicReport(AC->getDecl(), filter.checkName_bcopy, in checkCall_bcopy() 435 if (!filter.check_bzero) in checkCall_bzero() 461 BR.EmitBasicReport(AC->getDecl(), filter.checkName_bzero, in checkCall_bzero() [all …]
|
/netbsd-src/external/bsd/libarchive/dist/libarchive/ |
H A D | archive_write_set_options.c | 95 struct archive_write_filter *filter; in archive_set_filter_option() local 98 for (filter = a->filter_first; filter != NULL; filter = filter->next_filter) { in archive_set_filter_option() 99 if (filter->options == NULL) in archive_set_filter_option() 101 if (m != NULL && strcmp(filter->name, m) != 0) in archive_set_filter_option() 104 r = filter->options(filter, o, v); in archive_set_filter_option()
|
/netbsd-src/external/ibm-public/postfix/dist/src/smtpd/ |
H A D | smtpd_check.ref4 | 16 >>> mail filter@filter.domain 17 ./smtpd_check: warning: access table hash:./smtpd_check_access entry "filter@filter.domain" has FIL… 19 >>> mail filtertext@filter.domain 20 ./smtpd_check: warning: access table hash:./smtpd_check_access entry "filtertext@filter.domain" req… 22 >>> mail filtertexttext@filter.domain 23 … id>: filter: MAIL from localhost[127.0.0.1]: <filtertexttext@filter.domain>: Sender address trigg…
|
/netbsd-src/external/bsd/flex/dist/src/ |
H A D | filter.c | 35 struct filter *output_chain = NULL; 44 struct filter *filter_create_ext (struct filter *chain, const char *cmd, in filter_create_ext() 47 struct filter *f; in filter_create_ext() 53 f = malloc(sizeof(struct filter)); in filter_create_ext() 99 struct filter *filter_create_int (struct filter *chain, in filter_create_int() argument 100 int (*filter_func) (struct filter *), in filter_create_int() 103 struct filter *f; in filter_create_int() 106 f = malloc(sizeof(struct filter)); in filter_create_int() 131 bool filter_apply_chain (struct filter * chain) in filter_apply_chain() 209 int filter_truncate (struct filter *chain, int max_len) in filter_truncate() [all …]
|