Home
last modified time | relevance | path

Searched refs:INPUT (Results 1 – 25 of 236) sorted by relevance

12345678910

/external/syslinux/com32/hdt/
Dhdt-cli.c875 memset(&INPUT[hdt_cli.cursor_pos], 0, in start_cli_mode()
876 strlen(INPUT) - hdt_cli.cursor_pos); in start_cli_mode()
892 if (hdt_cli.cursor_pos < (int)strlen(INPUT)) { in start_cli_mode()
902 if ((strlen(INPUT) - hdt_cli.cursor_pos) > 0) { in start_cli_mode()
904 move_cursor_right(strlen(INPUT) - hdt_cli.cursor_pos); in start_cli_mode()
905 hdt_cli.cursor_pos = strlen(INPUT); in start_cli_mode()
940 memset(INPUT, 0, sizeof(INPUT)); in start_cli_mode()
941 strlcpy(INPUT, hdt_cli.history[future_history_pos], sizeof(INPUT)); in start_cli_mode()
950 printf("%s", INPUT); in start_cli_mode()
951 hdt_cli.cursor_pos = strlen(INPUT); in start_cli_mode()
[all …]
/external/mesa3d/bin/
Dinstallmesa22 read INPUT
23 if [ "x${INPUT}" != "x" ] ; then
24 INCLUDE_DIR=${INPUT}
31 read INPUT
32 if [ "x${INPUT}" != "x" ] ; then
33 LIB_DIR=${INPUT}
41 read INPUT
/external/iptables/etc/
Dxtables.conf9 chain INPUT hook NF_INET_LOCAL_IN prio -150
16 chain INPUT hook NF_INET_LOCAL_IN prio 0
23 chain INPUT hook NF_INET_LOCAL_IN prio -100
29 chain INPUT hook NF_INET_LOCAL_IN prio 50
43 chain INPUT hook NF_INET_LOCAL_IN prio -150
50 chain INPUT hook NF_INET_LOCAL_IN prio 0
57 chain INPUT hook NF_INET_LOCAL_IN prio -100
63 chain INPUT hook NF_INET_LOCAL_IN prio 50
71 chain INPUT hook NF_ARP_IN prio 0
/external/iptables/extensions/
Dlibxt_string.t1 :INPUT,FORWARD,OUTPUT
2 # ERROR: cannot find: iptables -I INPUT -m string --algo bm --string "test"
4 # ERROR: cannot find: iptables -I INPUT -m string --algo kmp --string "test")
6 # ERROR: cannot find: iptables -I INPUT -m string --algo kmp ! --string "test"
8 # cannot find: iptables -I INPUT -m string --algo bm --string "xxxxxxxxxxx" ....]
10 # ERROR: cannot load: iptables -A INPUT -m string --algo bm --string "xxxx"
12 # ERROR: cannot load: iptables -A INPUT -m string --algo bm --hexstring "|0a0a0a0a|"
14 # ERROR: cannot find: iptables -I INPUT -m string --algo bm --from 0 --to 65535 --string "test"
Dlibipt_icmp.t1 :INPUT,FORWARD,OUTPUT
4 # ERROR: cannot find: iptables -I INPUT -p icmp -m icmp --icmp-type echo-reply
7 # ERROR: annot find: iptables -I INPUT -p icmp -m icmp --icmp-type destination-unreachable
10 # ERROR: cannot load: iptables -A INPUT -p icmp -m icmp --icmp-type destination-unreachable/network…
13 # we accept "iptables -I INPUT -p tcp -m tcp", why not this below?
14 # ERROR: cannot load: iptables -A INPUT -p icmp -m icmp
Dlibxt_iprange.t1 :INPUT,FORWARD,OUTPUT
6 # it shows -A INPUT -m iprange --src-range 1.1.1.1-1.1.1.1, should we support this?
7 # ERROR: should fail: iptables -A INPUT -m iprange --src-range 1.1.1.1
9 # ERROR: should fail: iptables -A INPUT -m iprange --dst-range 1.1.1.1
Dlibxt_rateest.t1 :INPUT,FORWARD,OUTPUT
2 @iptables -I INPUT -j RATEEST --rateest-name RE1 --rateest-interval 250.0ms --rateest-ewmalog 500.0…
7 @iptables -I INPUT -j RATEEST --rateest-name RE2 --rateest-interval 250.0ms --rateest-ewmalog 500.0…
15 @iptables -D INPUT -j RATEEST --rateest-name RE1 --rateest-interval 250.0ms --rateest-ewmalog 500.0…
16 @iptables -D INPUT -j RATEEST --rateest-name RE2 --rateest-interval 250.0ms --rateest-ewmalog 500.0…
Dlibxt_NFLOG.t1 :INPUT,FORWARD,OUTPUT
15 # ERROR: cannot find: iptables -I INPUT -j NFLOG --nflog-prefix xxxxxx [...]
17 # ERROR: should fail: iptables -A INPUT -j NFLOG --nflog-prefix xxxxxxx [...]
20 # ERROR: line 13 (should fail: iptables -A INPUT -j NFLOG --nflog-threshold 0
Dlibipt_ttl.t1 :INPUT,FORWARD,OUTPUT
8 # ERROR: should fail: iptables -A INPUT -m ttl --ttl-gt 255
11 # ERROR: should fail: iptables -A INPUT -m ttl --ttl-lt 0
Dlibipt_ULOG.t1 :INPUT,FORWARD,OUTPUT
9 # ERROR: should fail: iptables -A INPUT -j ULOG --ulog-cprange 4294967296
13 # ERROR: should fail: iptables -A INPUT -j ULOG --ulog-prefix xxxxxx [...]
Dlibxt_sctp.t1 :INPUT,FORWARD,OUTPUT
26 # ERROR: iptables-save segfaults: iptables -A INPUT -p sctp -m sctp --chunk-types all ASCONF
28 # ERROR: iptables-save segfaults: iptables -A INPUT -p sctp -m sctp --chunk-types all ASCONF_ACK
30 # ERROR: iptables-save segfaults: iptables -A INPUT -p sctp -m sctp --chunk-types all FORWARD_TSN
Dlibxt_sctp.man24 iptables \-A INPUT \-p sctp \-\-dport 80 \-j DROP
26 iptables \-A INPUT \-p sctp \-\-chunk\-types any DATA,INIT \-j DROP
28 iptables \-A INPUT \-p sctp \-\-chunk\-types any DATA:Be \-j ACCEPT
Dlibxt_helper.t1 :INPUT,FORWARD,OUTPUT
4 # ERROR: should fail: iptables -A INPUT -m helper --helper wrong
/external/autotest/client/site_tests/security_Firewall/
Dbaseline.iptables1 -P INPUT DROP
4 -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
5 -A INPUT -i lo -j ACCEPT
6 -A INPUT -p icmp -j ACCEPT
7 -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
8 -A INPUT -d 224.0.0.251/32 -p udp -m udp --dport 5353 -j ACCEPT
Dbaseline.ip6tables1 -P INPUT DROP
4 -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
5 -A INPUT -i lo -j ACCEPT
6 -A INPUT -p ipv6-icmp -j ACCEPT
7 -A INPUT -d ff02::fb/128 -p udp -m udp --dport 5353 -j ACCEPT
8 -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
Dbaseline.webservd1 -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
2 -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
/external/google-breakpad/src/tools/python/tests/
Dfilter_syms_unittest.py59 INPUT = \
79 self.assertParsed(INPUT, [], EXPECTED_OUTPUT)
84 INPUT = \
106 self.assertParsed(INPUT, IGNORED_PREFIXES, EXPECTED_OUTPUT)
112 INPUT = \
135 self.assertParsed(INPUT, IGNORED_PREFIXES, EXPECTED_OUTPUT)
/external/llvm/test/CodeGen/AMDGPU/
Dfract.ll11 ; GCN-SAFE: v_floor_f32_e32 [[FLR:v[0-9]+]], [[INPUT:v[0-9]+]]
12 ; GCN-SAFE: v_subrev_f32_e32 [[RESULT:v[0-9]+]], [[FLR]], [[INPUT]]
14 ; GCN-UNSAFE: v_fract_f32_e32 [[RESULT:v[0-9]+]], [[INPUT:v[0-9]+]]
26 ; GCN-SAFE: v_floor_f32_e64 [[FLR:v[0-9]+]], -[[INPUT:v[0-9]+]]
27 ; GCN-SAFE: v_sub_f32_e64 [[RESULT:v[0-9]+]], -[[INPUT]], [[FLR]]
29 ; GCN-UNSAFE: v_fract_f32_e64 [[RESULT:v[0-9]+]], -[[INPUT:v[0-9]+]]
42 ; GCN-SAFE: v_floor_f32_e64 [[FLR:v[0-9]+]], -|[[INPUT:v[0-9]+]]|
43 ; GCN-SAFE: v_sub_f32_e64 [[RESULT:v[0-9]+]], -|[[INPUT]]|, [[FLR]]
45 ; GCN-UNSAFE: v_fract_f32_e64 [[RESULT:v[0-9]+]], -|[[INPUT:v[0-9]+]]|
59 ; GCN-UNSAFE-DAG: v_floor_f32_e32 [[FLOOR:v[0-9]+]], [[INPUT:v[0-9]+]]
[all …]
/external/llvm/utils/
Dcodegen-diff9 open (INPUT, $filename) or die "$filename: $!\n";
11 while (<INPUT>) {
21 close INPUT;
29 open (INPUT, $filename) or die "$filename: $!\n";
31 while (<INPUT>) {
53 close INPUT;
Dtest_debuginfo.pl38 open(INPUT, $testcase_file);
40 while(<INPUT>) {
51 close(INPUT);
/external/swiftshader/third_party/LLVM/utils/
Dcodegen-diff9 open (INPUT, $filename) or die "$filename: $!\n";
11 while (<INPUT>) {
21 close INPUT;
29 open (INPUT, $filename) or die "$filename: $!\n";
31 while (<INPUT>) {
53 close INPUT;
Dtest_debuginfo.pl28 open(INPUT, $testcase_file);
30 while(<INPUT>) {
41 close(INPUT);
/external/ltp/testcases/network/iptables/
Diptables_tests.sh131 iptables -A INPUT -s 127.0.0.1 -p icmp -j DROP > tst_iptables.out 2>&1
157 iptables -D INPUT 1 > tst_iptables.out 2>&1
181 iptables -A INPUT -p icmp --icmp-type echo-request -d 127.0.0.1 -j \
207 iptables -D INPUT 1 > tst_iptables.out 2>&1
235 iptables -A INPUT -p tcp -d 127.0.0.1 --dport $dport -j LOG \
263 iptables -D INPUT 1 > tst_iptables.out 2>&1
280 iptables -A INPUT -p tcp -d 127.0.0.1 --dport 45801:45803 -j LOG \
289 iptables -A INPUT -p tcp -d 127.0.0.1 -m multiport --dports \
339 iptables -A INPUT -p icmp --icmp-type echo-request -d 127.0.0.1 -m \
369 iptables -D INPUT 1 > tst_iptables.out 2>&1
/external/libpng/scripts/
Dgenchk.cmake.in16 get_filename_component(INPUTEXT "${INPUT}" EXT)
18 get_filename_component(INPUTBASE "${INPUT}" NAME_WE)
20 get_filename_component(INPUTDIR "${INPUT}" PATH)
29 "${INPUT}"
Dgenout.cmake.in37 get_filename_component(INPUTEXT "${INPUT}" EXT)
39 get_filename_component(INPUTBASE "${INPUT}" NAME_WE)
41 get_filename_component(INPUTDIR "${INPUT}" PATH)
73 "${INPUT}"

12345678910