Searched refs:INPUT (Results 1 – 25 of 236) sorted by relevance
12345678910
/external/syslinux/com32/hdt/ |
D | hdt-cli.c | 875 memset(&INPUT[hdt_cli.cursor_pos], 0, in start_cli_mode() 876 strlen(INPUT) - hdt_cli.cursor_pos); in start_cli_mode() 892 if (hdt_cli.cursor_pos < (int)strlen(INPUT)) { in start_cli_mode() 902 if ((strlen(INPUT) - hdt_cli.cursor_pos) > 0) { in start_cli_mode() 904 move_cursor_right(strlen(INPUT) - hdt_cli.cursor_pos); in start_cli_mode() 905 hdt_cli.cursor_pos = strlen(INPUT); in start_cli_mode() 940 memset(INPUT, 0, sizeof(INPUT)); in start_cli_mode() 941 strlcpy(INPUT, hdt_cli.history[future_history_pos], sizeof(INPUT)); in start_cli_mode() 950 printf("%s", INPUT); in start_cli_mode() 951 hdt_cli.cursor_pos = strlen(INPUT); in start_cli_mode() [all …]
|
/external/mesa3d/bin/ |
D | installmesa | 22 read INPUT 23 if [ "x${INPUT}" != "x" ] ; then 24 INCLUDE_DIR=${INPUT} 31 read INPUT 32 if [ "x${INPUT}" != "x" ] ; then 33 LIB_DIR=${INPUT} 41 read INPUT
|
/external/iptables/etc/ |
D | xtables.conf | 9 chain INPUT hook NF_INET_LOCAL_IN prio -150 16 chain INPUT hook NF_INET_LOCAL_IN prio 0 23 chain INPUT hook NF_INET_LOCAL_IN prio -100 29 chain INPUT hook NF_INET_LOCAL_IN prio 50 43 chain INPUT hook NF_INET_LOCAL_IN prio -150 50 chain INPUT hook NF_INET_LOCAL_IN prio 0 57 chain INPUT hook NF_INET_LOCAL_IN prio -100 63 chain INPUT hook NF_INET_LOCAL_IN prio 50 71 chain INPUT hook NF_ARP_IN prio 0
|
/external/iptables/extensions/ |
D | libxt_string.t | 1 :INPUT,FORWARD,OUTPUT 2 # ERROR: cannot find: iptables -I INPUT -m string --algo bm --string "test" 4 # ERROR: cannot find: iptables -I INPUT -m string --algo kmp --string "test") 6 # ERROR: cannot find: iptables -I INPUT -m string --algo kmp ! --string "test" 8 # cannot find: iptables -I INPUT -m string --algo bm --string "xxxxxxxxxxx" ....] 10 # ERROR: cannot load: iptables -A INPUT -m string --algo bm --string "xxxx" 12 # ERROR: cannot load: iptables -A INPUT -m string --algo bm --hexstring "|0a0a0a0a|" 14 # ERROR: cannot find: iptables -I INPUT -m string --algo bm --from 0 --to 65535 --string "test"
|
D | libipt_icmp.t | 1 :INPUT,FORWARD,OUTPUT 4 # ERROR: cannot find: iptables -I INPUT -p icmp -m icmp --icmp-type echo-reply 7 # ERROR: annot find: iptables -I INPUT -p icmp -m icmp --icmp-type destination-unreachable 10 # ERROR: cannot load: iptables -A INPUT -p icmp -m icmp --icmp-type destination-unreachable/network… 13 # we accept "iptables -I INPUT -p tcp -m tcp", why not this below? 14 # ERROR: cannot load: iptables -A INPUT -p icmp -m icmp
|
D | libxt_iprange.t | 1 :INPUT,FORWARD,OUTPUT 6 # it shows -A INPUT -m iprange --src-range 1.1.1.1-1.1.1.1, should we support this? 7 # ERROR: should fail: iptables -A INPUT -m iprange --src-range 1.1.1.1 9 # ERROR: should fail: iptables -A INPUT -m iprange --dst-range 1.1.1.1
|
D | libxt_rateest.t | 1 :INPUT,FORWARD,OUTPUT 2 @iptables -I INPUT -j RATEEST --rateest-name RE1 --rateest-interval 250.0ms --rateest-ewmalog 500.0… 7 @iptables -I INPUT -j RATEEST --rateest-name RE2 --rateest-interval 250.0ms --rateest-ewmalog 500.0… 15 @iptables -D INPUT -j RATEEST --rateest-name RE1 --rateest-interval 250.0ms --rateest-ewmalog 500.0… 16 @iptables -D INPUT -j RATEEST --rateest-name RE2 --rateest-interval 250.0ms --rateest-ewmalog 500.0…
|
D | libxt_NFLOG.t | 1 :INPUT,FORWARD,OUTPUT 15 # ERROR: cannot find: iptables -I INPUT -j NFLOG --nflog-prefix xxxxxx [...] 17 # ERROR: should fail: iptables -A INPUT -j NFLOG --nflog-prefix xxxxxxx [...] 20 # ERROR: line 13 (should fail: iptables -A INPUT -j NFLOG --nflog-threshold 0
|
D | libipt_ttl.t | 1 :INPUT,FORWARD,OUTPUT 8 # ERROR: should fail: iptables -A INPUT -m ttl --ttl-gt 255 11 # ERROR: should fail: iptables -A INPUT -m ttl --ttl-lt 0
|
D | libipt_ULOG.t | 1 :INPUT,FORWARD,OUTPUT 9 # ERROR: should fail: iptables -A INPUT -j ULOG --ulog-cprange 4294967296 13 # ERROR: should fail: iptables -A INPUT -j ULOG --ulog-prefix xxxxxx [...]
|
D | libxt_sctp.t | 1 :INPUT,FORWARD,OUTPUT 26 # ERROR: iptables-save segfaults: iptables -A INPUT -p sctp -m sctp --chunk-types all ASCONF 28 # ERROR: iptables-save segfaults: iptables -A INPUT -p sctp -m sctp --chunk-types all ASCONF_ACK 30 # ERROR: iptables-save segfaults: iptables -A INPUT -p sctp -m sctp --chunk-types all FORWARD_TSN
|
D | libxt_sctp.man | 24 iptables \-A INPUT \-p sctp \-\-dport 80 \-j DROP 26 iptables \-A INPUT \-p sctp \-\-chunk\-types any DATA,INIT \-j DROP 28 iptables \-A INPUT \-p sctp \-\-chunk\-types any DATA:Be \-j ACCEPT
|
D | libxt_helper.t | 1 :INPUT,FORWARD,OUTPUT 4 # ERROR: should fail: iptables -A INPUT -m helper --helper wrong
|
/external/autotest/client/site_tests/security_Firewall/ |
D | baseline.iptables | 1 -P INPUT DROP 4 -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT 5 -A INPUT -i lo -j ACCEPT 6 -A INPUT -p icmp -j ACCEPT 7 -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT 8 -A INPUT -d 224.0.0.251/32 -p udp -m udp --dport 5353 -j ACCEPT
|
D | baseline.ip6tables | 1 -P INPUT DROP 4 -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT 5 -A INPUT -i lo -j ACCEPT 6 -A INPUT -p ipv6-icmp -j ACCEPT 7 -A INPUT -d ff02::fb/128 -p udp -m udp --dport 5353 -j ACCEPT 8 -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
|
D | baseline.webservd | 1 -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT 2 -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
|
/external/google-breakpad/src/tools/python/tests/ |
D | filter_syms_unittest.py | 59 INPUT = \ 79 self.assertParsed(INPUT, [], EXPECTED_OUTPUT) 84 INPUT = \ 106 self.assertParsed(INPUT, IGNORED_PREFIXES, EXPECTED_OUTPUT) 112 INPUT = \ 135 self.assertParsed(INPUT, IGNORED_PREFIXES, EXPECTED_OUTPUT)
|
/external/llvm/test/CodeGen/AMDGPU/ |
D | fract.ll | 11 ; GCN-SAFE: v_floor_f32_e32 [[FLR:v[0-9]+]], [[INPUT:v[0-9]+]] 12 ; GCN-SAFE: v_subrev_f32_e32 [[RESULT:v[0-9]+]], [[FLR]], [[INPUT]] 14 ; GCN-UNSAFE: v_fract_f32_e32 [[RESULT:v[0-9]+]], [[INPUT:v[0-9]+]] 26 ; GCN-SAFE: v_floor_f32_e64 [[FLR:v[0-9]+]], -[[INPUT:v[0-9]+]] 27 ; GCN-SAFE: v_sub_f32_e64 [[RESULT:v[0-9]+]], -[[INPUT]], [[FLR]] 29 ; GCN-UNSAFE: v_fract_f32_e64 [[RESULT:v[0-9]+]], -[[INPUT:v[0-9]+]] 42 ; GCN-SAFE: v_floor_f32_e64 [[FLR:v[0-9]+]], -|[[INPUT:v[0-9]+]]| 43 ; GCN-SAFE: v_sub_f32_e64 [[RESULT:v[0-9]+]], -|[[INPUT]]|, [[FLR]] 45 ; GCN-UNSAFE: v_fract_f32_e64 [[RESULT:v[0-9]+]], -|[[INPUT:v[0-9]+]]| 59 ; GCN-UNSAFE-DAG: v_floor_f32_e32 [[FLOOR:v[0-9]+]], [[INPUT:v[0-9]+]] [all …]
|
/external/llvm/utils/ |
D | codegen-diff | 9 open (INPUT, $filename) or die "$filename: $!\n"; 11 while (<INPUT>) { 21 close INPUT; 29 open (INPUT, $filename) or die "$filename: $!\n"; 31 while (<INPUT>) { 53 close INPUT;
|
D | test_debuginfo.pl | 38 open(INPUT, $testcase_file); 40 while(<INPUT>) { 51 close(INPUT);
|
/external/swiftshader/third_party/LLVM/utils/ |
D | codegen-diff | 9 open (INPUT, $filename) or die "$filename: $!\n"; 11 while (<INPUT>) { 21 close INPUT; 29 open (INPUT, $filename) or die "$filename: $!\n"; 31 while (<INPUT>) { 53 close INPUT;
|
D | test_debuginfo.pl | 28 open(INPUT, $testcase_file); 30 while(<INPUT>) { 41 close(INPUT);
|
/external/ltp/testcases/network/iptables/ |
D | iptables_tests.sh | 131 iptables -A INPUT -s 127.0.0.1 -p icmp -j DROP > tst_iptables.out 2>&1 157 iptables -D INPUT 1 > tst_iptables.out 2>&1 181 iptables -A INPUT -p icmp --icmp-type echo-request -d 127.0.0.1 -j \ 207 iptables -D INPUT 1 > tst_iptables.out 2>&1 235 iptables -A INPUT -p tcp -d 127.0.0.1 --dport $dport -j LOG \ 263 iptables -D INPUT 1 > tst_iptables.out 2>&1 280 iptables -A INPUT -p tcp -d 127.0.0.1 --dport 45801:45803 -j LOG \ 289 iptables -A INPUT -p tcp -d 127.0.0.1 -m multiport --dports \ 339 iptables -A INPUT -p icmp --icmp-type echo-request -d 127.0.0.1 -m \ 369 iptables -D INPUT 1 > tst_iptables.out 2>&1
|
/external/libpng/scripts/ |
D | genchk.cmake.in | 16 get_filename_component(INPUTEXT "${INPUT}" EXT) 18 get_filename_component(INPUTBASE "${INPUT}" NAME_WE) 20 get_filename_component(INPUTDIR "${INPUT}" PATH) 29 "${INPUT}"
|
D | genout.cmake.in | 37 get_filename_component(INPUTEXT "${INPUT}" EXT) 39 get_filename_component(INPUTBASE "${INPUT}" NAME_WE) 41 get_filename_component(INPUTDIR "${INPUT}" PATH) 73 "${INPUT}"
|
12345678910