Home
last modified time | relevance | path

Searched refs:INPUT (Results 1 – 25 of 489) sorted by relevance

12345678910>>...20

/third_party/typescript/tests/cases/compiler/
DspecedNoStackBlown.ts9 type Predicate<INPUT, ROOTINPUT> = (value: INPUT, inputs: ROOTINPUT) => boolean;
11 type ErrorMsg<INPUT> =
13 | ((value: INPUT, field: string) => any);
15 export type Spec<INPUT, ROOTINPUT = any> = [Predicate<INPUT, ROOTINPUT>, ErrorMsg<INPUT>];
17 export type SpecArray<INPUT, ROOTINPUT = any> = Array<Spec<INPUT, ROOTINPUT>>;
19 export type SpecFunction<INPUT, ROOTINPUT = any> = [INPUT] extends [ReadonlyArray<infer U>]
20 ? (value: INPUT) => ReadonlyArray<SpecArray<U, ROOTINPUT>>
21 : [INPUT] extends [object]
22 ? (value: INPUT) => SpecObject<INPUT, ROOTINPUT>
23 : (value: INPUT) => SpecArray<INPUT, ROOTINPUT>;
[all …]
/third_party/typescript/tests/baselines/reference/
DspecedNoStackBlown.types13 type Predicate<INPUT, ROOTINPUT> = (value: INPUT, inputs: ROOTINPUT) => boolean;
14 >Predicate : Predicate<INPUT, ROOTINPUT>
15 >value : INPUT
18 type ErrorMsg<INPUT> =
19 >ErrorMsg : ErrorMsg<INPUT>
24 | ((value: INPUT, field: string) => any);
25 >value : INPUT
28 export type Spec<INPUT, ROOTINPUT = any> = [Predicate<INPUT, ROOTINPUT>, ErrorMsg<INPUT>];
29 >Spec : Spec<INPUT, ROOTINPUT>
31 export type SpecArray<INPUT, ROOTINPUT = any> = Array<Spec<INPUT, ROOTINPUT>>;
[all …]
DspecedNoStackBlown.symbols26 type Predicate<INPUT, ROOTINPUT> = (value: INPUT, inputs: ROOTINPUT) => boolean;
28 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 8, 15))
31 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 8, 15))
35 type ErrorMsg<INPUT> =
37 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 10, 14))
40 | ((value: INPUT, field: string) => any);
42 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 10, 14))
45 export type Spec<INPUT, ROOTINPUT = any> = [Predicate<INPUT, ROOTINPUT>, ErrorMsg<INPUT>];
47 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 14, 17))
50 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 14, 17))
[all …]
DspecedNoStackBlown.js10 type Predicate<INPUT, ROOTINPUT> = (value: INPUT, inputs: ROOTINPUT) => boolean; argument
12 type ErrorMsg<INPUT> =
14 | ((value: INPUT, field: string) => any);
16 export type Spec<INPUT, ROOTINPUT = any> = [Predicate<INPUT, ROOTINPUT>, ErrorMsg<INPUT>];
18 export type SpecArray<INPUT, ROOTINPUT = any> = Array<Spec<INPUT, ROOTINPUT>>;
20 export type SpecFunction<INPUT, ROOTINPUT = any> = [INPUT] extends [ReadonlyArray<infer U>]
21 ? (value: INPUT) => ReadonlyArray<SpecArray<U, ROOTINPUT>>
22 : [INPUT] extends [object]
23 ? (value: INPUT) => SpecObject<INPUT, ROOTINPUT>
24 : (value: INPUT) => SpecArray<INPUT, ROOTINPUT>;
[all …]
/third_party/iptables/extensions/
Dlibxt_sctp.txlate1 iptables-translate -A INPUT -p sctp --dport 80 -j DROP
2 nft add rule ip filter INPUT sctp dport 80 counter drop
4 iptables-translate -A INPUT -p sctp --sport 50 -j DROP
5 nft add rule ip filter INPUT sctp sport 50 counter drop
7 iptables-translate -A INPUT -p sctp ! --dport 80 -j DROP
8 nft add rule ip filter INPUT sctp dport != 80 counter drop
10 iptables-translate -A INPUT -p sctp ! --sport 50 -j DROP
11 nft add rule ip filter INPUT sctp sport != 50 counter drop
13 iptables-translate -A INPUT -p sctp --sport 80:100 -j ACCEPT
14 nft add rule ip filter INPUT sctp sport 80-100 counter accept
[all …]
Dlibxt_conntrack.txlate1 iptables-translate -t filter -A INPUT -m conntrack --ctstate NEW,RELATED -j ACCEPT
2 nft add rule ip filter INPUT ct state new,related counter accept
4 ip6tables-translate -t filter -A INPUT -m conntrack ! --ctstate NEW,RELATED -j ACCEPT
5 nft add rule ip6 filter INPUT ct state != new,related counter accept
7 iptables-translate -t filter -A INPUT -m conntrack --ctproto UDP -j ACCEPT
8 nft add rule ip filter INPUT ct original protocol 17 counter accept
10 iptables-translate -t filter -A INPUT -m conntrack ! --ctproto UDP -j ACCEPT
11 nft add rule ip filter INPUT ct original protocol != 17 counter accept
13 iptables-translate -t filter -A INPUT -m conntrack --ctorigsrc 10.100.2.131 -j ACCEPT
14 nft add rule ip filter INPUT ct original saddr 10.100.2.131 counter accept
[all …]
Dlibxt_ecn.txlate1 iptables-translate -A INPUT -m ecn --ecn-ip-ect 0
2 nft add rule ip filter INPUT ip ecn not-ect counter
4 iptables-translate -A INPUT -m ecn --ecn-ip-ect 1
5 nft add rule ip filter INPUT ip ecn ect1 counter
7 iptables-translate -A INPUT -m ecn --ecn-ip-ect 2
8 nft add rule ip filter INPUT ip ecn ect0 counter
10 iptables-translate -A INPUT -m ecn --ecn-ip-ect 3
11 nft add rule ip filter INPUT ip ecn ce counter
13 iptables-translate -A INPUT -m ecn ! --ecn-ip-ect 0
14 nft add rule ip filter INPUT ip ecn != not-ect counter
[all …]
Dlibxt_TOS.txlate1 ip6tables-translate -A INPUT -j TOS --set-tos 0x1f
2 nft add rule ip6 filter INPUT counter ip6 dscp set 0x07
4 ip6tables-translate -A INPUT -j TOS --set-tos 0xff
5 nft add rule ip6 filter INPUT counter ip6 dscp set 0x3f
7 ip6tables-translate -A INPUT -j TOS --set-tos Minimize-Delay
8 nft add rule ip6 filter INPUT counter ip6 dscp set 0x04
10 ip6tables-translate -A INPUT -j TOS --set-tos Minimize-Cost
11 nft add rule ip6 filter INPUT counter ip6 dscp set 0x00
13 ip6tables-translate -A INPUT -j TOS --set-tos Normal-Service
14 nft add rule ip6 filter INPUT counter ip6 dscp set 0x00
[all …]
Dlibebt_pkttype.txlate1 ebtables-translate -A INPUT --pkttype-type host
2 nft add rule bridge filter INPUT meta pkttype host counter
4 ebtables-translate -A INPUT ! --pkttype-type broadcast
5 nft add rule bridge filter INPUT meta pkttype != broadcast counter
7 ebtables-translate -A INPUT --pkttype-type ! multicast
8 nft add rule bridge filter INPUT meta pkttype != multicast counter
10 ebtables-translate -A INPUT --pkttype-type otherhost
11 nft add rule bridge filter INPUT meta pkttype other counter
13 ebtables-translate -A INPUT --pkttype-type outgoing
14 nft add rule bridge filter INPUT meta pkttype 4 counter
[all …]
Dlibxt_dccp.txlate1 iptables-translate -A INPUT -p dccp -m dccp --sport 100
2 nft add rule ip filter INPUT dccp sport 100 counter
4 iptables-translate -A INPUT -p dccp -m dccp --dport 100:200
5 nft add rule ip filter INPUT dccp dport 100-200 counter
7 iptables-translate -A INPUT -p dccp -m dccp ! --dport 100
8 nft add rule ip filter INPUT dccp dport != 100 counter
10 iptables-translate -A INPUT -p dccp -m dccp --dccp-types CLOSE
11 nft add rule ip filter INPUT dccp type close counter
13 iptables-translate -A INPUT -p dccp -m dccp --dccp-types INVALID
14 nft add rule ip filter INPUT dccp type 10-15 counter
[all …]
Dlibxt_time.txlate1 iptables-translate -A INPUT -p icmp --icmp-type echo-request -m time --weekdays Sa,Su -j REJECT
2 nft add rule ip filter INPUT icmp type echo-request meta day {6,0} counter reject
4 iptables-translate -A INPUT -p icmp --icmp-type echo-request -m time --timestart 12:00 -j REJECT
5 nft add rule ip filter INPUT icmp type echo-request meta hour "12:00:00"-"23:59:59" counter reject
7 iptables-translate -A INPUT -p icmp --icmp-type echo-request -m time --timestop 12:00 -j REJECT
8 nft add rule ip filter INPUT icmp type echo-request meta hour "00:00:00"-"12:00:00" counter reject
10 iptables-translate -A INPUT -p icmp --icmp-type echo-request -m time --datestart 2021 -j REJECT
11 nft add rule ip filter INPUT icmp type echo-request meta time "2021-01-01 00:00:00"-"2038-01-19 03:…
13 iptables-translate -A INPUT -p icmp --icmp-type echo-request -m time --datestop 2021 -j REJECT
14 nft add rule ip filter INPUT icmp type echo-request meta time "1970-01-01 00:00:00"-"2021-01-01 00:…
[all …]
Dlibip6t_ah.txlate1 ip6tables-translate -A INPUT -m ah --ahspi 500 -j DROP
2 nft add rule ip6 filter INPUT ah spi 500 counter drop
4 ip6tables-translate -A INPUT -m ah --ahspi 500:550 -j DROP
5 nft add rule ip6 filter INPUT ah spi 500-550 counter drop
7 ip6tables-translate -A INPUT -m ah ! --ahlen 120
8 nft add rule ip6 filter INPUT ah hdrlength != 120 counter
10 ip6tables-translate -A INPUT -m ah --ahres
11 nft add rule ip6 filter INPUT ah reserved 1 counter
13 ip6tables-translate -A INPUT -m ah --ahspi 500 ! --ahlen 120 -j DROP
14 nft add rule ip6 filter INPUT ah spi 500 ah hdrlength != 120 counter drop
[all …]
Dlibip6t_frag.txlate1 ip6tables-translate -t filter -A INPUT -m frag --fragid 100:200 -j ACCEPT
2 nft add rule ip6 filter INPUT frag id 100-200 counter accept
4 ip6tables-translate -t filter -A INPUT -m frag --fragid 100 --fragres --fragmore -j ACCEPT
5 nft add rule ip6 filter INPUT frag id 100 frag reserved 1 frag more-fragments 1 counter accept
7 ip6tables-translate -t filter -A INPUT -m frag ! --fragid 100:200 -j ACCEPT
8 nft add rule ip6 filter INPUT frag id != 100-200 counter accept
10 ip6tables-translate -t filter -A INPUT -m frag --fragid 100:200 --fraglast -j ACCEPT
11 nft add rule ip6 filter INPUT frag id 100-200 frag more-fragments 0 counter accept
13 ip6tables-translate -t filter -A INPUT -m frag --fragid 100:200 --fragfirst -j ACCEPT
14 nft add rule ip6 filter INPUT frag id 100-200 frag frag-off 0 counter accept
[all …]
Dlibebt_mark_m.txlate1 ebtables-translate -A INPUT --mark 42
2 nft add rule bridge filter INPUT meta mark 0x2a counter
4 ebtables-translate -A INPUT ! --mark 42
5 nft add rule bridge filter INPUT meta mark != 0x2a counter
7 ebtables-translate -A INPUT --mark ! 42
8 nft add rule bridge filter INPUT meta mark != 0x2a counter
10 ebtables-translate -A INPUT --mark ! 0x1/0xff
11 nft add rule bridge filter INPUT meta mark and 0xff != 0x1 counter
13 ebtables-translate -A INPUT --mark /0x02
14 nft add rule bridge filter INPUT meta mark and 0x2 != 0 counter
Dlibebt_log.txlate1 ebtables-translate -A INPUT --log
2 nft add rule bridge filter INPUT log level notice flags ether counter
4 ebtables-translate -A INPUT --log-level 1
5 nft add rule bridge filter INPUT log level alert flags ether counter
7 ebtables-translate -A INPUT --log-level crit
8 nft add rule bridge filter INPUT log level crit flags ether counter
10 ebtables-translate -A INPUT --log-level emerg --log-ip --log-arp --log-ip6
11 nft add rule bridge filter INPUT log level emerg flags ether counter
13 ebtables-translate -A INPUT --log-level crit --log-ip --log-arp --log-ip6 --log-prefix foo
14 nft add rule bridge filter INPUT log prefix "foo" level crit flags ether counter
Dlibip6t_rt.txlate1 ip6tables-translate -A INPUT -m rt --rt-type 0 -j DROP
2 nft add rule ip6 filter INPUT rt type 0 counter drop
4 ip6tables-translate -A INPUT -m rt ! --rt-len 22 -j DROP
5 nft add rule ip6 filter INPUT rt hdrlength != 22 counter drop
7 ip6tables-translate -A INPUT -m rt --rt-segsleft 26 -j ACCEPT
8 nft add rule ip6 filter INPUT rt seg-left 26 counter accept
10 ip6tables-translate -A INPUT -m rt --rt-type 0 --rt-len 22 -j DROP
11 nft add rule ip6 filter INPUT rt type 0 rt hdrlength 22 counter drop
13 ip6tables-translate -A INPUT -m rt --rt-type 0 --rt-len 22 ! --rt-segsleft 26 -j ACCEPT
14 nft add rule ip6 filter INPUT rt type 0 rt seg-left != 26 rt hdrlength 22 counter accept
Dlibxt_iprange.txlate1 iptables-translate -A INPUT -m iprange --src-range 192.168.25.149-192.168.25.151 -j ACCEPT
2 nft add rule ip filter INPUT ip saddr 192.168.25.149-192.168.25.151 counter accept
4 iptables-translate -A INPUT -m iprange --dst-range 192.168.25.149-192.168.25.151 -j ACCEPT
5 nft add rule ip filter INPUT ip daddr 192.168.25.149-192.168.25.151 counter accept
7 iptables-translate -A INPUT -m iprange --dst-range 3.3.3.3-6.6.6.6 --src-range 4.4.4.4-7.7.7.7 -j A…
8 nft add rule ip filter INPUT ip saddr 4.4.4.4-7.7.7.7 ip daddr 3.3.3.3-6.6.6.6 counter accept
10 ip6tables-translate -A INPUT -m iprange ! --dst-range ::2d01-::2d03 -j ACCEPT
11 nft add rule ip6 filter INPUT ip6 daddr != ::2d01-::2d03 counter accept
13 ip6tables-translate -A INPUT -m iprange ! --dst-range ::2d01-::2d03 --src-range ::2d01-::2d03 -j AC…
14 nft add rule ip6 filter INPUT ip6 saddr ::2d01-::2d03 ip6 daddr != ::2d01-::2d03 counter accept
Dlibxt_tcp.txlate1 iptables-translate -A INPUT -p tcp -i eth0 --sport 53 -j ACCEPT
2 nft add rule ip filter INPUT iifname "eth0" tcp sport 53 counter accept
13 iptables -A INPUT -p tcp --tcp-flags ACK,FIN FIN -j DROP
14 nft add rule ip filter INPUT tcp flags & fin|ack == fin counter drop
16 iptables-translate -A INPUT -p tcp --syn -j ACCEPT
17 nft add rule ip filter INPUT tcp flags & (fin|syn|rst|ack) == syn counter accept
19 iptables-translate -A INPUT -p tcp --syn --dport 80 -j ACCEPT
20 nft add rule ip filter INPUT tcp dport 80 tcp flags & (fin|syn|rst|ack) == syn counter accept
22 iptables-translate -A INPUT -f -p tcp
23 nft add rule ip filter INPUT ip frag-off & 0x1fff != 0 ip protocol tcp counter
[all …]
Dlibebt_nflog.txlate1 ebtables-translate -A INPUT --nflog
2 nft add rule bridge filter INPUT log group 1 counter
4 ebtables-translate -A INPUT --nflog-group 42
5 nft add rule bridge filter INPUT log group 42 counter
7 ebtables-translate -A INPUT --nflog-range 42
8 nft add rule bridge filter INPUT log group 1 snaplen 42 counter
10 ebtables-translate -A INPUT --nflog-threshold 100 --nflog-prefix foo
11 nft add rule bridge filter INPUT log prefix "foo" group 1 queue-threshold 100 counter
Dlibebt_vlan.txlate1 ebtables-translate -A INPUT -p 802_1Q --vlan-id 42
2 nft add rule bridge filter INPUT vlan id 42 counter
4 ebtables-translate -A INPUT -p 802_1Q --vlan-prio ! 1
5 nft add rule bridge filter INPUT vlan pcp != 1 counter
7 ebtables-translate -A INPUT -p 802_1Q --vlan-encap ip
8 nft add rule bridge filter INPUT vlan type 0x0800 counter
10 ebtables-translate -A INPUT -p 802_1Q --vlan-encap ipv6 ! --vlan-id 1
11 nft add rule bridge filter INPUT vlan id != 1 vlan type 0x86dd counter
Dlibebt_mark.xlate1 ebtables-translate -A INPUT --mark-set 42
2 nft add rule bridge filter INPUT mark set 0x2a counter
4 ebtables-translate -A INPUT --mark-or 42 --mark-target RETURN
5 nft add rule bridge filter INPUT mark set mark or 0x2a counter return
7 ebtables-translate -A INPUT --mark-and 42 --mark-target ACCEPT
8 nft add rule bridge filter INPUT mark set mark and 0x2a counter accept
10 ebtables-translate -A INPUT --mark-xor 42 --mark-target DROP
11 nft add rule bridge filter INPUT mark set mark xor 0x2a counter drop
Dlibxt_length.txlate1 iptables-translate -A INPUT -p icmp -m length --length 86:0xffff -j DROP
2 nft add rule ip filter INPUT ip protocol icmp meta length 86-65535 counter drop
4 iptables-translate -A INPUT -p udp -m length --length :400
5 nft add rule ip filter INPUT ip protocol udp meta length 0-400 counter
7 iptables-translate -A INPUT -p udp -m length --length 40
8 nft add rule ip filter INPUT ip protocol udp meta length 40 counter
10 iptables-translate -A INPUT -p udp -m length ! --length 40
11 nft add rule ip filter INPUT ip protocol udp meta length != 40 counter
/third_party/iptables/iptables/tests/shell/testcases/iptables/
D0004-return-codes_065 cmd 0 -A INPUT -j ACCEPT
70 cmd 2 "" -I INPUT -j foobar
71 cmd 2 "" -R INPUT 1 -j foobar
72 cmd 2 "" -D INPUT -j foobar
73 cmd 1 "$EBADRULE" -D INPUT -p tcp --dport 22 -j ACCEPT
76 cmd 1 "$E2BIG_I" -I INPUT 23 -j ACCEPT
77 cmd 1 "$E2BIG_D" -D INPUT 23
78 cmd 1 "$E2BIG_R" -R INPUT 23 -j ACCEPT
84 cmd 0 -C INPUT -j ACCEPT
87 cmd 2 "$ENOMTH" -C INPUT -m foobar -j ACCEPT
[all …]
/third_party/python/Lib/test/
Dtest_lzma.py97 self.assertEqual(out, INPUT)
140 self.assertEqual(out, INPUT)
155 self.assertEqual(out, INPUT)
188 self.assertEqual(out, INPUT)
212 self.assertEqual(b''.join(out), INPUT)
233 self.assertEqual(b''.join(out), INPUT)
249 self.assertEqual(b''.join(out), INPUT)
281 cdata = lzc.compress(INPUT) + lzc.flush()
287 cdata = lzc.compress(INPUT) + lzc.flush()
293 cdata = lzc.compress(INPUT) + lzc.flush()
[all …]
/third_party/iptables/iptables/tests/shell/testcases/ipt-save/dumps/
Dwireless.txt13 :INPUT DROP [0:0]
25 -A INPUT -m conntrack --ctstate INVALID -j L_DROP
26 -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j L_ACCEPT
27 -A INPUT -i lo -j L_ACCEPT
28 -A INPUT -s 10.78.129.130/32 -p tcp -m tcp --dport 5666 -j L_ACCEPT
29 -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m multiport --dports 22,80,443,873,1723 -j …
30 -A INPUT -p udp -m udp -m multiport --dports 500,1701,4500 -j L_ACCEPT
31 -A INPUT -p icmp -m icmp --icmp-type 8 -j L_ACCEPT
32 -A INPUT -s 10.31.70.8/29 -i bond0.208 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -j…
33 -A INPUT -s 10.44.224.8/29 -i bond0.686 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -…
[all …]

12345678910>>...20