/external/iptables/extensions/ |
D | libip6t_REJECT.c | 77 struct ip6t_reject_info *reject = (struct ip6t_reject_info *)t->data; in init() local 80 reject->with = IP6T_ICMP6_PORT_UNREACH; in init() 91 struct ip6t_reject_info *reject = in parse() local 104 reject->with = reject_table[i].with; in parse() 127 const struct ip6t_reject_info *reject in print() local 132 if (reject_table[i].with == reject->with) in print() 142 const struct ip6t_reject_info *reject in save() local 147 if (reject_table[i].with == reject->with) in save() 153 struct ip6tables_target reject = { variable 169 register_target6(&reject); in _init()
|
D | libipt_REJECT.c | 92 struct ipt_reject_info *reject = (struct ipt_reject_info *)t->data; in init() local 95 reject->with = IPT_ICMP_PORT_UNREACHABLE; in init() 106 struct ipt_reject_info *reject = (struct ipt_reject_info *)(*target)->data; in parse() local 118 reject->with = reject_table[i].with; in parse() 146 const struct ipt_reject_info *reject in print() local 151 if (reject_table[i].with == reject->with) in print() 160 const struct ipt_reject_info *reject in save() local 165 if (reject_table[i].with == reject->with) in save() 171 static struct iptables_target reject = { variable 188 register_target(&reject); in ipt_REJECT_init()
|
D | libipt_REJECT.man | 14 .BI "--reject-with " "type"
|
D | libip6t_REJECT.man | 14 .BI "--reject-with " "type"
|
/external/openssl/crypto/asn1/ |
D | x_x509a.c | 76 ASN1_IMP_SEQUENCE_OF_OPT(X509_CERT_AUX, reject, ASN1_OBJECT, 0), 154 if(!aux->reject in X509_add1_reject_object() 155 && !(aux->reject = sk_ASN1_OBJECT_new_null())) return 0; in X509_add1_reject_object() 156 return sk_ASN1_OBJECT_push(aux->reject, objtmp); in X509_add1_reject_object() 169 if(x->aux && x->aux->reject) { in X509_reject_clear() 170 sk_ASN1_OBJECT_pop_free(x->aux->reject, ASN1_OBJECT_free); in X509_reject_clear() 171 x->aux->reject = NULL; in X509_reject_clear()
|
D | t_x509a.c | 86 if(aux->reject) { in X509_CERT_AUX_print() 90 for(i = 0; i < sk_ASN1_OBJECT_num(aux->reject); i++) { in X509_CERT_AUX_print() 94 sk_ASN1_OBJECT_value(aux->reject, i), 0); in X509_CERT_AUX_print()
|
/external/webkit/WebKitTools/android/flex-2.5.4a/ |
D | gen.c | 84 if ( reject || num_backing_up == 0 ) in gen_backing_up() 105 if ( reject || num_backing_up == 0 ) in gen_bu_action() 278 else if ( reject ) in gen_find_action() 388 if ( interactive && ! reject ) in gen_find_action() 583 if ( ! reject && ! interactive ) in gen_next_match() 657 if ( reject ) 669 int need_backing_up = (num_backing_up > 0 && ! reject); in gen_NUL_trans() 719 if ( reject ) in gen_NUL_trans() 772 if ( reject ) in gen_start_state() 799 if ( reject ) in gentabs() [all …]
|
D | main.c | 60 int yymore_used, reject, real_reject, continued_action, in_rule; variable 156 if ( spprdflt && ! reject && rule_useful[default_rule] ) 593 do_yylineno = yytext_is_array = in_rule = reject = do_stdinit = false; 887 reject = true; in readin() 889 reject = false; in readin() 918 if ( reject ) in readin() 927 if ( reject ) in readin() 931 reject = true; in readin() 933 if ( (fulltbl || fullspd) && reject ) in readin() 946 if ( reject ) in readin()
|
D | dfa.c | 55 if ( (reject && ! dfaacc[ds].dfaacc_set) || 56 (! reject && ! dfaacc[ds].dfaacc_state) ) 860 if ( reject ) 868 else if ( reject )
|
/external/bluetooth/bluez/test/ |
D | btiotest.c | 41 gint reject; member 65 static struct io_data *io_data_new(GIOChannel *io, BtIOType type, gint reject, in io_data_new() argument 73 data->reject = reject; in io_data_new() 165 if (data->reject >= 0) { in confirm_timeout() 197 if (data->accept < 0 && data->reject < 0) in confirm_cb() 200 if (data->reject == 0) { in confirm_cb() 219 gint seconds = (data->reject > 0) ? in confirm_cb() 220 data->reject : data->accept; in confirm_cb() 263 gint reject, gint disconn, gint accept, in l2cap_listen() argument 282 data = io_data_new(NULL, BT_IO_L2CAP, reject, disconn, accept); in l2cap_listen() [all …]
|
D | avtest.c | 203 static void process_avdtp(int srv_sk, int sk, unsigned char reject, in process_avdtp() argument 233 if (reject == AVDTP_DISCOVER) { in process_avdtp() 252 if (reject == AVDTP_GET_CAPABILITIES) { in process_avdtp() 297 if (reject == AVDTP_SET_CONFIGURATION) { in process_avdtp() 311 if (reject == AVDTP_GET_CONFIGURATION) { in process_avdtp() 324 if (reject == AVDTP_OPEN) { in process_avdtp() 351 if (reject == AVDTP_ABORT) in process_avdtp() 353 else if (reject == AVDTP_START) { in process_avdtp() 366 if (reject == AVDTP_CLOSE) { in process_avdtp() 383 if (reject == AVDTP_SUSPEND) { in process_avdtp() [all …]
|
/external/bluetooth/bluez/input/ |
D | server.c | 114 goto reject; in auth_callback() 119 goto reject; in auth_callback() 126 goto reject; in auth_callback() 134 reject: in auth_callback()
|
/external/openssl/crypto/x509/ |
D | x509_trs.c | 246 if(x->aux && (x->aux->trust || x->aux->reject)) in trust_1oidany() 274 if(ax->reject) { in obj_trust() 275 for(i = 0; i < sk_ASN1_OBJECT_num(ax->reject); i++) { in obj_trust() 276 obj = sk_ASN1_OBJECT_value(ax->reject, i); in obj_trust()
|
/external/apache-http/src/org/apache/http/client/params/ |
D | ClientParamBean.java | 60 public void setRejectRelativeRedirect (final boolean reject) { in setRejectRelativeRedirect() argument 61 params.setBooleanParameter(ClientPNames.REJECT_RELATIVE_REDIRECT, reject); in setRejectRelativeRedirect()
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
D | userdatarequest.cpp | 27 connect(buttonCancel, SIGNAL(clicked()), this, SLOT(reject())); in UserDataRequest() 91 reject(); in sendReply()
|
/external/wpa_supplicant/wpa_gui-qt4/ |
D | userdatarequest.cpp | 27 connect(buttonCancel, SIGNAL(clicked()), this, SLOT(reject())); in UserDataRequest() 91 reject(); in sendReply()
|
/external/qemu/hw/ |
D | bt-l2cap.c | 812 goto reject; in l2cap_command() 824 goto reject; in l2cap_command() 835 goto reject; in l2cap_command() 846 goto reject; in l2cap_command() 859 goto reject; in l2cap_command() 875 goto reject; in l2cap_command() 886 goto reject; in l2cap_command() 907 goto reject; in l2cap_command() 916 goto reject; in l2cap_command() 926 reject: in l2cap_command()
|
/external/qemu/android/ |
D | boot-properties.c | 83 const char* reject = " =$*?'\""; in boot_property_add2() local 87 if (strchr(reject, name[nn]) != NULL) in boot_property_add2()
|
/external/openssl/apps/ |
D | x509.c | 180 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; in MAIN() 361 if (!reject) reject = sk_ASN1_OBJECT_new_null(); in MAIN() 362 sk_ASN1_OBJECT_push(reject, objtmp); in MAIN() 707 if (reject) in MAIN() 709 for (i = 0; i < sk_ASN1_OBJECT_num(reject); i++) in MAIN() 711 objtmp = sk_ASN1_OBJECT_value(reject, i); in MAIN() 1089 sk_ASN1_OBJECT_pop_free(reject, ASN1_OBJECT_free); in MAIN()
|
/external/bluetooth/hcidump/parser/ |
D | capi.c | 632 uint16_t reject; in cmd_connect_b3() local 641 reject = CAPI_U16(frm); in cmd_connect_b3() 643 printf("Reject: 0x%04x (%s)\n", reject, info2str(reject)); in cmd_connect_b3()
|
/external/webkit/LayoutTests/http/tests/appcache/ |
D | top-frame-1-expected.txt | 3 …op frame cache are loaded anyway, so it can also pass if the UA fails to reject loads for cache mi…
|
/external/bison/m4/ |
D | stdbool.m4 | 82 reject this program, as the initializer for xlcbug is 88 meantime, this test will reject xlc, which is OK, since
|
/external/iptables/ |
D | INCOMPATIBILITIES | 3 - The REJECT target has an '--reject-with admin-prohib' option which used
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui/ |
D | userdatarequest.ui.h | 63 reject(); in sendReply()
|
/external/wpa_supplicant/wpa_gui/ |
D | userdatarequest.ui.h | 63 reject(); in sendReply()
|