/third_party/typescript/tests/cases/compiler/ |
D | specedNoStackBlown.ts | 9 type Predicate<INPUT, ROOTINPUT> = (value: INPUT, inputs: ROOTINPUT) => boolean; 11 type ErrorMsg<INPUT> = 13 | ((value: INPUT, field: string) => any); 15 export type Spec<INPUT, ROOTINPUT = any> = [Predicate<INPUT, ROOTINPUT>, ErrorMsg<INPUT>]; 17 export type SpecArray<INPUT, ROOTINPUT = any> = Array<Spec<INPUT, ROOTINPUT>>; 19 export type SpecFunction<INPUT, ROOTINPUT = any> = [INPUT] extends [ReadonlyArray<infer U>] 20 ? (value: INPUT) => ReadonlyArray<SpecArray<U, ROOTINPUT>> 21 : [INPUT] extends [object] 22 ? (value: INPUT) => SpecObject<INPUT, ROOTINPUT> 23 : (value: INPUT) => SpecArray<INPUT, ROOTINPUT>; [all …]
|
/third_party/typescript/tests/baselines/reference/ |
D | specedNoStackBlown.types | 13 type Predicate<INPUT, ROOTINPUT> = (value: INPUT, inputs: ROOTINPUT) => boolean; 14 >Predicate : Predicate<INPUT, ROOTINPUT> 15 >value : INPUT 18 type ErrorMsg<INPUT> = 19 >ErrorMsg : ErrorMsg<INPUT> 24 | ((value: INPUT, field: string) => any); 25 >value : INPUT 28 export type Spec<INPUT, ROOTINPUT = any> = [Predicate<INPUT, ROOTINPUT>, ErrorMsg<INPUT>]; 29 >Spec : Spec<INPUT, ROOTINPUT> 31 export type SpecArray<INPUT, ROOTINPUT = any> = Array<Spec<INPUT, ROOTINPUT>>; [all …]
|
D | specedNoStackBlown.symbols | 26 type Predicate<INPUT, ROOTINPUT> = (value: INPUT, inputs: ROOTINPUT) => boolean; 28 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 8, 15)) 31 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 8, 15)) 35 type ErrorMsg<INPUT> = 37 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 10, 14)) 40 | ((value: INPUT, field: string) => any); 42 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 10, 14)) 45 export type Spec<INPUT, ROOTINPUT = any> = [Predicate<INPUT, ROOTINPUT>, ErrorMsg<INPUT>]; 47 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 14, 17)) 50 >INPUT : Symbol(INPUT, Decl(specedNoStackBlown.ts, 14, 17)) [all …]
|
D | specedNoStackBlown.js | 10 type Predicate<INPUT, ROOTINPUT> = (value: INPUT, inputs: ROOTINPUT) => boolean; argument 12 type ErrorMsg<INPUT> = 14 | ((value: INPUT, field: string) => any); 16 export type Spec<INPUT, ROOTINPUT = any> = [Predicate<INPUT, ROOTINPUT>, ErrorMsg<INPUT>]; 18 export type SpecArray<INPUT, ROOTINPUT = any> = Array<Spec<INPUT, ROOTINPUT>>; 20 export type SpecFunction<INPUT, ROOTINPUT = any> = [INPUT] extends [ReadonlyArray<infer U>] 21 ? (value: INPUT) => ReadonlyArray<SpecArray<U, ROOTINPUT>> 22 : [INPUT] extends [object] 23 ? (value: INPUT) => SpecObject<INPUT, ROOTINPUT> 24 : (value: INPUT) => SpecArray<INPUT, ROOTINPUT>; [all …]
|
/third_party/iptables/extensions/ |
D | libxt_sctp.txlate | 1 iptables-translate -A INPUT -p sctp --dport 80 -j DROP 2 nft add rule ip filter INPUT sctp dport 80 counter drop 4 iptables-translate -A INPUT -p sctp --sport 50 -j DROP 5 nft add rule ip filter INPUT sctp sport 50 counter drop 7 iptables-translate -A INPUT -p sctp ! --dport 80 -j DROP 8 nft add rule ip filter INPUT sctp dport != 80 counter drop 10 iptables-translate -A INPUT -p sctp ! --sport 50 -j DROP 11 nft add rule ip filter INPUT sctp sport != 50 counter drop 13 iptables-translate -A INPUT -p sctp --sport 80:100 -j ACCEPT 14 nft add rule ip filter INPUT sctp sport 80-100 counter accept [all …]
|
D | libxt_conntrack.txlate | 1 iptables-translate -t filter -A INPUT -m conntrack --ctstate NEW,RELATED -j ACCEPT 2 nft add rule ip filter INPUT ct state new,related counter accept 4 ip6tables-translate -t filter -A INPUT -m conntrack ! --ctstate NEW,RELATED -j ACCEPT 5 nft add rule ip6 filter INPUT ct state != new,related counter accept 7 iptables-translate -t filter -A INPUT -m conntrack --ctproto UDP -j ACCEPT 8 nft add rule ip filter INPUT ct original protocol 17 counter accept 10 iptables-translate -t filter -A INPUT -m conntrack ! --ctproto UDP -j ACCEPT 11 nft add rule ip filter INPUT ct original protocol != 17 counter accept 13 iptables-translate -t filter -A INPUT -m conntrack --ctorigsrc 10.100.2.131 -j ACCEPT 14 nft add rule ip filter INPUT ct original saddr 10.100.2.131 counter accept [all …]
|
D | libxt_ecn.txlate | 1 iptables-translate -A INPUT -m ecn --ecn-ip-ect 0 2 nft add rule ip filter INPUT ip ecn not-ect counter 4 iptables-translate -A INPUT -m ecn --ecn-ip-ect 1 5 nft add rule ip filter INPUT ip ecn ect1 counter 7 iptables-translate -A INPUT -m ecn --ecn-ip-ect 2 8 nft add rule ip filter INPUT ip ecn ect0 counter 10 iptables-translate -A INPUT -m ecn --ecn-ip-ect 3 11 nft add rule ip filter INPUT ip ecn ce counter 13 iptables-translate -A INPUT -m ecn ! --ecn-ip-ect 0 14 nft add rule ip filter INPUT ip ecn != not-ect counter [all …]
|
D | libxt_TOS.txlate | 1 ip6tables-translate -A INPUT -j TOS --set-tos 0x1f 2 nft add rule ip6 filter INPUT counter ip6 dscp set 0x07 4 ip6tables-translate -A INPUT -j TOS --set-tos 0xff 5 nft add rule ip6 filter INPUT counter ip6 dscp set 0x3f 7 ip6tables-translate -A INPUT -j TOS --set-tos Minimize-Delay 8 nft add rule ip6 filter INPUT counter ip6 dscp set 0x04 10 ip6tables-translate -A INPUT -j TOS --set-tos Minimize-Cost 11 nft add rule ip6 filter INPUT counter ip6 dscp set 0x00 13 ip6tables-translate -A INPUT -j TOS --set-tos Normal-Service 14 nft add rule ip6 filter INPUT counter ip6 dscp set 0x00 [all …]
|
D | libebt_pkttype.txlate | 1 ebtables-translate -A INPUT --pkttype-type host 2 nft add rule bridge filter INPUT meta pkttype host counter 4 ebtables-translate -A INPUT ! --pkttype-type broadcast 5 nft add rule bridge filter INPUT meta pkttype != broadcast counter 7 ebtables-translate -A INPUT --pkttype-type ! multicast 8 nft add rule bridge filter INPUT meta pkttype != multicast counter 10 ebtables-translate -A INPUT --pkttype-type otherhost 11 nft add rule bridge filter INPUT meta pkttype other counter 13 ebtables-translate -A INPUT --pkttype-type outgoing 14 nft add rule bridge filter INPUT meta pkttype 4 counter [all …]
|
D | libxt_dccp.txlate | 1 iptables-translate -A INPUT -p dccp -m dccp --sport 100 2 nft add rule ip filter INPUT dccp sport 100 counter 4 iptables-translate -A INPUT -p dccp -m dccp --dport 100:200 5 nft add rule ip filter INPUT dccp dport 100-200 counter 7 iptables-translate -A INPUT -p dccp -m dccp ! --dport 100 8 nft add rule ip filter INPUT dccp dport != 100 counter 10 iptables-translate -A INPUT -p dccp -m dccp --dccp-types CLOSE 11 nft add rule ip filter INPUT dccp type close counter 13 iptables-translate -A INPUT -p dccp -m dccp --dccp-types INVALID 14 nft add rule ip filter INPUT dccp type 10-15 counter [all …]
|
D | libxt_time.txlate | 1 iptables-translate -A INPUT -p icmp --icmp-type echo-request -m time --weekdays Sa,Su -j REJECT 2 nft add rule ip filter INPUT icmp type echo-request meta day {6,0} counter reject 4 iptables-translate -A INPUT -p icmp --icmp-type echo-request -m time --timestart 12:00 -j REJECT 5 nft add rule ip filter INPUT icmp type echo-request meta hour "12:00:00"-"23:59:59" counter reject 7 iptables-translate -A INPUT -p icmp --icmp-type echo-request -m time --timestop 12:00 -j REJECT 8 nft add rule ip filter INPUT icmp type echo-request meta hour "00:00:00"-"12:00:00" counter reject 10 iptables-translate -A INPUT -p icmp --icmp-type echo-request -m time --datestart 2021 -j REJECT 11 nft add rule ip filter INPUT icmp type echo-request meta time "2021-01-01 00:00:00"-"2038-01-19 03:… 13 iptables-translate -A INPUT -p icmp --icmp-type echo-request -m time --datestop 2021 -j REJECT 14 nft add rule ip filter INPUT icmp type echo-request meta time "1970-01-01 00:00:00"-"2021-01-01 00:… [all …]
|
D | libip6t_ah.txlate | 1 ip6tables-translate -A INPUT -m ah --ahspi 500 -j DROP 2 nft add rule ip6 filter INPUT ah spi 500 counter drop 4 ip6tables-translate -A INPUT -m ah --ahspi 500:550 -j DROP 5 nft add rule ip6 filter INPUT ah spi 500-550 counter drop 7 ip6tables-translate -A INPUT -m ah ! --ahlen 120 8 nft add rule ip6 filter INPUT ah hdrlength != 120 counter 10 ip6tables-translate -A INPUT -m ah --ahres 11 nft add rule ip6 filter INPUT ah reserved 1 counter 13 ip6tables-translate -A INPUT -m ah --ahspi 500 ! --ahlen 120 -j DROP 14 nft add rule ip6 filter INPUT ah spi 500 ah hdrlength != 120 counter drop [all …]
|
D | libip6t_frag.txlate | 1 ip6tables-translate -t filter -A INPUT -m frag --fragid 100:200 -j ACCEPT 2 nft add rule ip6 filter INPUT frag id 100-200 counter accept 4 ip6tables-translate -t filter -A INPUT -m frag --fragid 100 --fragres --fragmore -j ACCEPT 5 nft add rule ip6 filter INPUT frag id 100 frag reserved 1 frag more-fragments 1 counter accept 7 ip6tables-translate -t filter -A INPUT -m frag ! --fragid 100:200 -j ACCEPT 8 nft add rule ip6 filter INPUT frag id != 100-200 counter accept 10 ip6tables-translate -t filter -A INPUT -m frag --fragid 100:200 --fraglast -j ACCEPT 11 nft add rule ip6 filter INPUT frag id 100-200 frag more-fragments 0 counter accept 13 ip6tables-translate -t filter -A INPUT -m frag --fragid 100:200 --fragfirst -j ACCEPT 14 nft add rule ip6 filter INPUT frag id 100-200 frag frag-off 0 counter accept [all …]
|
D | libebt_mark_m.txlate | 1 ebtables-translate -A INPUT --mark 42 2 nft add rule bridge filter INPUT meta mark 0x2a counter 4 ebtables-translate -A INPUT ! --mark 42 5 nft add rule bridge filter INPUT meta mark != 0x2a counter 7 ebtables-translate -A INPUT --mark ! 42 8 nft add rule bridge filter INPUT meta mark != 0x2a counter 10 ebtables-translate -A INPUT --mark ! 0x1/0xff 11 nft add rule bridge filter INPUT meta mark and 0xff != 0x1 counter 13 ebtables-translate -A INPUT --mark /0x02 14 nft add rule bridge filter INPUT meta mark and 0x2 != 0 counter
|
D | libebt_log.txlate | 1 ebtables-translate -A INPUT --log 2 nft add rule bridge filter INPUT log level notice flags ether counter 4 ebtables-translate -A INPUT --log-level 1 5 nft add rule bridge filter INPUT log level alert flags ether counter 7 ebtables-translate -A INPUT --log-level crit 8 nft add rule bridge filter INPUT log level crit flags ether counter 10 ebtables-translate -A INPUT --log-level emerg --log-ip --log-arp --log-ip6 11 nft add rule bridge filter INPUT log level emerg flags ether counter 13 ebtables-translate -A INPUT --log-level crit --log-ip --log-arp --log-ip6 --log-prefix foo 14 nft add rule bridge filter INPUT log prefix "foo" level crit flags ether counter
|
D | libip6t_rt.txlate | 1 ip6tables-translate -A INPUT -m rt --rt-type 0 -j DROP 2 nft add rule ip6 filter INPUT rt type 0 counter drop 4 ip6tables-translate -A INPUT -m rt ! --rt-len 22 -j DROP 5 nft add rule ip6 filter INPUT rt hdrlength != 22 counter drop 7 ip6tables-translate -A INPUT -m rt --rt-segsleft 26 -j ACCEPT 8 nft add rule ip6 filter INPUT rt seg-left 26 counter accept 10 ip6tables-translate -A INPUT -m rt --rt-type 0 --rt-len 22 -j DROP 11 nft add rule ip6 filter INPUT rt type 0 rt hdrlength 22 counter drop 13 ip6tables-translate -A INPUT -m rt --rt-type 0 --rt-len 22 ! --rt-segsleft 26 -j ACCEPT 14 nft add rule ip6 filter INPUT rt type 0 rt seg-left != 26 rt hdrlength 22 counter accept
|
D | libxt_iprange.txlate | 1 iptables-translate -A INPUT -m iprange --src-range 192.168.25.149-192.168.25.151 -j ACCEPT 2 nft add rule ip filter INPUT ip saddr 192.168.25.149-192.168.25.151 counter accept 4 iptables-translate -A INPUT -m iprange --dst-range 192.168.25.149-192.168.25.151 -j ACCEPT 5 nft add rule ip filter INPUT ip daddr 192.168.25.149-192.168.25.151 counter accept 7 iptables-translate -A INPUT -m iprange --dst-range 3.3.3.3-6.6.6.6 --src-range 4.4.4.4-7.7.7.7 -j A… 8 nft add rule ip filter INPUT ip saddr 4.4.4.4-7.7.7.7 ip daddr 3.3.3.3-6.6.6.6 counter accept 10 ip6tables-translate -A INPUT -m iprange ! --dst-range ::2d01-::2d03 -j ACCEPT 11 nft add rule ip6 filter INPUT ip6 daddr != ::2d01-::2d03 counter accept 13 ip6tables-translate -A INPUT -m iprange ! --dst-range ::2d01-::2d03 --src-range ::2d01-::2d03 -j AC… 14 nft add rule ip6 filter INPUT ip6 saddr ::2d01-::2d03 ip6 daddr != ::2d01-::2d03 counter accept
|
D | libxt_tcp.txlate | 1 iptables-translate -A INPUT -p tcp -i eth0 --sport 53 -j ACCEPT 2 nft add rule ip filter INPUT iifname "eth0" tcp sport 53 counter accept 13 iptables -A INPUT -p tcp --tcp-flags ACK,FIN FIN -j DROP 14 nft add rule ip filter INPUT tcp flags & fin|ack == fin counter drop 16 iptables-translate -A INPUT -p tcp --syn -j ACCEPT 17 nft add rule ip filter INPUT tcp flags & (fin|syn|rst|ack) == syn counter accept 19 iptables-translate -A INPUT -p tcp --syn --dport 80 -j ACCEPT 20 nft add rule ip filter INPUT tcp dport 80 tcp flags & (fin|syn|rst|ack) == syn counter accept 22 iptables-translate -A INPUT -f -p tcp 23 nft add rule ip filter INPUT ip frag-off & 0x1fff != 0 ip protocol tcp counter [all …]
|
D | libebt_nflog.txlate | 1 ebtables-translate -A INPUT --nflog 2 nft add rule bridge filter INPUT log group 1 counter 4 ebtables-translate -A INPUT --nflog-group 42 5 nft add rule bridge filter INPUT log group 42 counter 7 ebtables-translate -A INPUT --nflog-range 42 8 nft add rule bridge filter INPUT log group 1 snaplen 42 counter 10 ebtables-translate -A INPUT --nflog-threshold 100 --nflog-prefix foo 11 nft add rule bridge filter INPUT log prefix "foo" group 1 queue-threshold 100 counter
|
D | libebt_vlan.txlate | 1 ebtables-translate -A INPUT -p 802_1Q --vlan-id 42 2 nft add rule bridge filter INPUT vlan id 42 counter 4 ebtables-translate -A INPUT -p 802_1Q --vlan-prio ! 1 5 nft add rule bridge filter INPUT vlan pcp != 1 counter 7 ebtables-translate -A INPUT -p 802_1Q --vlan-encap ip 8 nft add rule bridge filter INPUT vlan type 0x0800 counter 10 ebtables-translate -A INPUT -p 802_1Q --vlan-encap ipv6 ! --vlan-id 1 11 nft add rule bridge filter INPUT vlan id != 1 vlan type 0x86dd counter
|
D | libebt_mark.xlate | 1 ebtables-translate -A INPUT --mark-set 42 2 nft add rule bridge filter INPUT mark set 0x2a counter 4 ebtables-translate -A INPUT --mark-or 42 --mark-target RETURN 5 nft add rule bridge filter INPUT mark set mark or 0x2a counter return 7 ebtables-translate -A INPUT --mark-and 42 --mark-target ACCEPT 8 nft add rule bridge filter INPUT mark set mark and 0x2a counter accept 10 ebtables-translate -A INPUT --mark-xor 42 --mark-target DROP 11 nft add rule bridge filter INPUT mark set mark xor 0x2a counter drop
|
D | libxt_length.txlate | 1 iptables-translate -A INPUT -p icmp -m length --length 86:0xffff -j DROP 2 nft add rule ip filter INPUT ip protocol icmp meta length 86-65535 counter drop 4 iptables-translate -A INPUT -p udp -m length --length :400 5 nft add rule ip filter INPUT ip protocol udp meta length 0-400 counter 7 iptables-translate -A INPUT -p udp -m length --length 40 8 nft add rule ip filter INPUT ip protocol udp meta length 40 counter 10 iptables-translate -A INPUT -p udp -m length ! --length 40 11 nft add rule ip filter INPUT ip protocol udp meta length != 40 counter
|
/third_party/iptables/iptables/tests/shell/testcases/iptables/ |
D | 0004-return-codes_0 | 65 cmd 0 -A INPUT -j ACCEPT 70 cmd 2 "" -I INPUT -j foobar 71 cmd 2 "" -R INPUT 1 -j foobar 72 cmd 2 "" -D INPUT -j foobar 73 cmd 1 "$EBADRULE" -D INPUT -p tcp --dport 22 -j ACCEPT 76 cmd 1 "$E2BIG_I" -I INPUT 23 -j ACCEPT 77 cmd 1 "$E2BIG_D" -D INPUT 23 78 cmd 1 "$E2BIG_R" -R INPUT 23 -j ACCEPT 84 cmd 0 -C INPUT -j ACCEPT 87 cmd 2 "$ENOMTH" -C INPUT -m foobar -j ACCEPT [all …]
|
/third_party/python/Lib/test/ |
D | test_lzma.py | 97 self.assertEqual(out, INPUT) 140 self.assertEqual(out, INPUT) 155 self.assertEqual(out, INPUT) 188 self.assertEqual(out, INPUT) 212 self.assertEqual(b''.join(out), INPUT) 233 self.assertEqual(b''.join(out), INPUT) 249 self.assertEqual(b''.join(out), INPUT) 281 cdata = lzc.compress(INPUT) + lzc.flush() 287 cdata = lzc.compress(INPUT) + lzc.flush() 293 cdata = lzc.compress(INPUT) + lzc.flush() [all …]
|
/third_party/iptables/iptables/tests/shell/testcases/ipt-save/dumps/ |
D | wireless.txt | 13 :INPUT DROP [0:0] 25 -A INPUT -m conntrack --ctstate INVALID -j L_DROP 26 -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j L_ACCEPT 27 -A INPUT -i lo -j L_ACCEPT 28 -A INPUT -s 10.78.129.130/32 -p tcp -m tcp --dport 5666 -j L_ACCEPT 29 -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m multiport --dports 22,80,443,873,1723 -j … 30 -A INPUT -p udp -m udp -m multiport --dports 500,1701,4500 -j L_ACCEPT 31 -A INPUT -p icmp -m icmp --icmp-type 8 -j L_ACCEPT 32 -A INPUT -s 10.31.70.8/29 -i bond0.208 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -j… 33 -A INPUT -s 10.44.224.8/29 -i bond0.686 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -… [all …]
|