| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 82-test_ocsp_cert_chain.t | 66 # ACCEPT 0.0.0.0:19254 PID=620007 68 # ACCEPT [::]:19254 PID=620007 73 if (/^ACCEPT 0.0.0.0:(\d+)/) { 76 } elsif (/^ACCEPT \[::\]:(\d+)/) { 88 # openssl s_server -accept 0 -naccept 1 \ 91 my @s_server_cmd = ("s_server", "-accept", "0", "-naccept", "1", 96 # ACCEPT 0.0.0.0:45921 97 # ACCEPT [::]:45921 102 if (/^ACCEPT 0.0.0.0:(\d+)/) { 105 } elsif (/^ACCEPT \[::\]:(\d+)/) [all...] |
| 70-test_sslkeylogfile.t | 40 my @s_server_cmd = ("s_server", "-accept", "0", "-naccept", "1", 45 # ACCEPT 0.0.0.0:<port> 46 # ACCEPT [::]:<port> 52 if (/^ACCEPT 0.0.0.0:(\d+)/) { 55 } elsif (/^ACCEPT \[::\]:(\d+)/) {
|
| 79-test_http.t | 28 ok($output[0] =~ /^ACCEPT (0.0.0.0|\[::\]):(\d+?) PID=(\d+)$/
|
| 82-test_tfo_cli.t | 40 my @s_cmd = ("s_server", "-accept", ":0", "-cert", $cert, "-www", "-no_tls1_3", "-naccept", "1"); 45 # Read until we get the port, TFO is output before the ACCEPT line 49 if (/^ACCEPT\s.*:(\d+)$/) {
|
| /src/external/bsd/wpa/dist/wpa_supplicant/examples/ |
| p2p-action-udhcp.sh | 56 iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT 57 iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT 67 iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT 68 iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
|
| p2p-action.sh | 83 iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT 84 iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT 94 iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT 95 iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 79-test_http.t | 23 ok($output[0] =~ /^ACCEPT (0.0.0.0|\[::\]):(\d+?) PID=(\d+)$/
|
| /src/bin/ksh/ |
| syn.c | 63 #define ACCEPT (reject = 0) 65 ((reject) ? (ACCEPT, symbol) : (symbol = yylex(cf))) 74 ACCEPT; 170 ACCEPT; 249 ACCEPT; 270 ACCEPT; 277 ACCEPT; 307 ACCEPT; 319 ACCEPT; 899 ACCEPT; [all...] |
| /src/external/gpl3/gcc/dist/gcc/ |
| genrecog.cc | 34 present, recog will accept a pattern if it matches except for 1176 /* Accept u.acceptance. Always succeeds for SUBPATTERN, RECOG and SPLIT. 1178 ACCEPT 1231 static rtx_test accept (const acceptance_type &); 1359 rtx_test::accept (const acceptance_type &acceptance) 1361 rtx_test res (0, rtx_test::ACCEPT); 1371 return kind == rtx_test::ACCEPT && u.acceptance.type != PEEPHOLE2; 1423 case rtx_test::ACCEPT: 1754 if (d->test.kind == rtx_test::ACCEPT) 1812 case rtx_test::ACCEPT 1355 rtx_test::accept (const acceptance_type &acceptance) function in class:rtx_test [all...] |
| /src/external/gpl3/gcc.old/dist/gcc/ |
| genrecog.cc | 34 present, recog will accept a pattern if it matches except for 1176 /* Accept u.acceptance. Always succeeds for SUBPATTERN, RECOG and SPLIT. 1178 ACCEPT 1231 static rtx_test accept (const acceptance_type &); 1359 rtx_test::accept (const acceptance_type &acceptance) 1361 rtx_test res (0, rtx_test::ACCEPT); 1371 return kind == rtx_test::ACCEPT && u.acceptance.type != PEEPHOLE2; 1423 case rtx_test::ACCEPT: 1754 if (d->test.kind == rtx_test::ACCEPT) 1812 case rtx_test::ACCEPT 1355 rtx_test::accept (const acceptance_type &acceptance) function in class:rtx_test [all...] |
| /src/external/mpl/dhcp/dist/includes/ |
| dhctoken.h | 188 ACCEPT = 385,
|
| /src/external/mpl/dhcp/dist/keama/ |
| dhctoken.h | 192 ACCEPT = 385,
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| Proxy.pm | 231 ." -accept $self->{server_addr}:0" 253 # Process the output from s_server until we find the ACCEPT line, which 258 next unless (/^ACCEPT\s.*:(\d+)$/); 265 # we would still searching for ACCEPT... 267 die "no ACCEPT detected in '$execcmd' output: $?\n"; 366 if(!($client_sock = $self->{proxy_sock}->accept())) {
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| Proxy.pm | 230 ." -accept $self->{server_addr}:0" 252 # Process the output from s_server until we find the ACCEPT line, which 257 next unless (/^ACCEPT\s.*:(\d+)$/); 264 # we would still searching for ACCEPT... 266 die "no ACCEPT detected in '$execcmd' output: $?\n"; 365 if(!($client_sock = $self->{proxy_sock}->accept())) {
|
| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| Proxy.pm | 328 ." -accept $self->{server_addr}:0" 359 # Process the output from s_server until we find the ACCEPT line, which 364 next unless (/^ACCEPT\s.*:(\d+)$/); 371 # we would still searching for ACCEPT... 373 die "no ACCEPT detected in '$execcmd' output: $?\n"; 433 # UDP has no "accept" for sockets which means we need to 487 } elsif (!($client_sock = $self->{proxy_sock}->accept())) {
|
| /src/lib/librumphijack/ |
| hijack.c | 304 { DUALCALL_ACCEPT, "accept", RSYS_NAME(ACCEPT) }, 1437 accept(int s, struct sockaddr *addr, socklen_t *addrlen) function 1445 DPRINTF(("accept -> %d", s)); 1447 op_accept = GETSYSCALL(rump, ACCEPT); 1450 op_accept = GETSYSCALL(host, ACCEPT);
|
| /src/external/mpl/dhcp/dist/client/ |
| clparse.c | 545 case ACCEPT:
|