HomeSort by: relevance | last modified time | path
    Searched refs:ACCEPT (Results 1 - 17 of 17) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/test/recipes/
82-test_ocsp_cert_chain.t 66 # ACCEPT 0.0.0.0:19254 PID=620007
68 # ACCEPT [::]:19254 PID=620007
73 if (/^ACCEPT 0.0.0.0:(\d+)/) {
76 } elsif (/^ACCEPT \[::\]:(\d+)/) {
88 # openssl s_server -accept 0 -naccept 1 \
91 my @s_server_cmd = ("s_server", "-accept", "0", "-naccept", "1",
96 # ACCEPT 0.0.0.0:45921
97 # ACCEPT [::]:45921
102 if (/^ACCEPT 0.0.0.0:(\d+)/) {
105 } elsif (/^ACCEPT \[::\]:(\d+)/)
    [all...]
70-test_sslkeylogfile.t 40 my @s_server_cmd = ("s_server", "-accept", "0", "-naccept", "1",
45 # ACCEPT 0.0.0.0:<port>
46 # ACCEPT [::]:<port>
52 if (/^ACCEPT 0.0.0.0:(\d+)/) {
55 } elsif (/^ACCEPT \[::\]:(\d+)/) {
79-test_http.t 28 ok($output[0] =~ /^ACCEPT (0.0.0.0|\[::\]):(\d+?) PID=(\d+)$/
82-test_tfo_cli.t 40 my @s_cmd = ("s_server", "-accept", ":0", "-cert", $cert, "-www", "-no_tls1_3", "-naccept", "1");
45 # Read until we get the port, TFO is output before the ACCEPT line
49 if (/^ACCEPT\s.*:(\d+)$/) {
  /src/external/bsd/wpa/dist/wpa_supplicant/examples/
p2p-action-udhcp.sh 56 iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
57 iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
67 iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
68 iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
p2p-action.sh 83 iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
84 iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
94 iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
95 iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
  /src/crypto/external/bsd/openssl/dist/test/recipes/
79-test_http.t 23 ok($output[0] =~ /^ACCEPT (0.0.0.0|\[::\]):(\d+?) PID=(\d+)$/
  /src/bin/ksh/
syn.c 63 #define ACCEPT (reject = 0)
65 ((reject) ? (ACCEPT, symbol) : (symbol = yylex(cf)))
74 ACCEPT;
170 ACCEPT;
249 ACCEPT;
270 ACCEPT;
277 ACCEPT;
307 ACCEPT;
319 ACCEPT;
899 ACCEPT;
    [all...]
  /src/external/gpl3/gcc/dist/gcc/
genrecog.cc 34 present, recog will accept a pattern if it matches except for
1176 /* Accept u.acceptance. Always succeeds for SUBPATTERN, RECOG and SPLIT.
1178 ACCEPT
1231 static rtx_test accept (const acceptance_type &);
1359 rtx_test::accept (const acceptance_type &acceptance)
1361 rtx_test res (0, rtx_test::ACCEPT);
1371 return kind == rtx_test::ACCEPT && u.acceptance.type != PEEPHOLE2;
1423 case rtx_test::ACCEPT:
1754 if (d->test.kind == rtx_test::ACCEPT)
1812 case rtx_test::ACCEPT
1355 rtx_test::accept (const acceptance_type &acceptance) function in class:rtx_test
    [all...]
  /src/external/gpl3/gcc.old/dist/gcc/
genrecog.cc 34 present, recog will accept a pattern if it matches except for
1176 /* Accept u.acceptance. Always succeeds for SUBPATTERN, RECOG and SPLIT.
1178 ACCEPT
1231 static rtx_test accept (const acceptance_type &);
1359 rtx_test::accept (const acceptance_type &acceptance)
1361 rtx_test res (0, rtx_test::ACCEPT);
1371 return kind == rtx_test::ACCEPT && u.acceptance.type != PEEPHOLE2;
1423 case rtx_test::ACCEPT:
1754 if (d->test.kind == rtx_test::ACCEPT)
1812 case rtx_test::ACCEPT
1355 rtx_test::accept (const acceptance_type &acceptance) function in class:rtx_test
    [all...]
  /src/external/mpl/dhcp/dist/includes/
dhctoken.h 188 ACCEPT = 385,
  /src/external/mpl/dhcp/dist/keama/
dhctoken.h 192 ACCEPT = 385,
  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
Proxy.pm 231 ." -accept $self->{server_addr}:0"
253 # Process the output from s_server until we find the ACCEPT line, which
258 next unless (/^ACCEPT\s.*:(\d+)$/);
265 # we would still searching for ACCEPT...
267 die "no ACCEPT detected in '$execcmd' output: $?\n";
366 if(!($client_sock = $self->{proxy_sock}->accept())) {
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
Proxy.pm 230 ." -accept $self->{server_addr}:0"
252 # Process the output from s_server until we find the ACCEPT line, which
257 next unless (/^ACCEPT\s.*:(\d+)$/);
264 # we would still searching for ACCEPT...
266 die "no ACCEPT detected in '$execcmd' output: $?\n";
365 if(!($client_sock = $self->{proxy_sock}->accept())) {
  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
Proxy.pm 328 ." -accept $self->{server_addr}:0"
359 # Process the output from s_server until we find the ACCEPT line, which
364 next unless (/^ACCEPT\s.*:(\d+)$/);
371 # we would still searching for ACCEPT...
373 die "no ACCEPT detected in '$execcmd' output: $?\n";
433 # UDP has no "accept" for sockets which means we need to
487 } elsif (!($client_sock = $self->{proxy_sock}->accept())) {
  /src/lib/librumphijack/
hijack.c 304 { DUALCALL_ACCEPT, "accept", RSYS_NAME(ACCEPT) },
1437 accept(int s, struct sockaddr *addr, socklen_t *addrlen) function
1445 DPRINTF(("accept -> %d", s));
1447 op_accept = GETSYSCALL(rump, ACCEPT);
1450 op_accept = GETSYSCALL(host, ACCEPT);
  /src/external/mpl/dhcp/dist/client/
clparse.c 545 case ACCEPT:

Completed in 51 milliseconds