⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 lex.yy.c

📁 eCos操作系统源码
💻 C
📖 第 1 页 / 共 4 页
字号:
    {   0,        1,    1,    1,    1,    1,    1,    1,    1,    1,    1,        1,    1,    1,    1,    1,    1,    1,    1,    1,    1,        1,    1,    1,    1,    1,    1,    1,    1,    1,   10,       11,   13,   14,   12,   15,   17,   16,   19,   25,   18,       20,   26,   10,   28,   12,   15,   10,   12,   13,   14,       18,   14,   27,   13,   16,   11,   29,   20,   19,   17,       26,   19,   20,   25,   27,   28,   30,   32,   35,   34,       36,   37,   40,   39,   43,   38,   32,   44,   37,   29,       46,   43,   48,   40,   44,   30,   34,   39,   45,   32,       36,   35,   38,   49,   50,   52,   53,   45,   54,   57,       48,   46,   55,   58,   49,   50,   60,   59,   61,   62,       65,   64,   66,   53,   59,   54,   67,   68,   62,   52,       69,   57,   55,   66,   61,   64,   70,   58,   71,   72,       60,   74,   65,   77,   75,   69,   76,   79,   81,   68,       67,   84,   91,   83,   77,   80,   93,   70,   72,   98,       71,   76,   74,   75,   83,   80,   95,   86,   90,   84,       79,   81,   86,   91,   92,   89,   94,   88,   92,   93,       94,   97,   97,   87,   85,   82,   78,   73,   63,   56,       51,   47,   42,   33,   31,   24,   23,   21,    8,    5,        3,   96,   96,   96,   96,   96,   96,   96,   96,   96,       96,   96,   96,   96,   96,   96,   96,   96,   96,   96,       96,   96,   96,   96,   96,   96,   96,   96,   96,   96,       96    } ;static yy_state_type yy_last_accepting_state;static char *yy_last_accepting_cpos;extern int yy_flex_debug;int yy_flex_debug = 0;/* The intent behind this definition is that it'll catch * any uses of REJECT which flex missed. */#define REJECT reject_used_but_not_detected#define yymore() yymore_used_but_not_detected#define YY_MORE_ADJ 0#define YY_RESTORE_YY_MORE_OFFSETchar *yytext;#line 1 "policy_token.l"/*	$KAME: policy_token.l,v 1.13 2003/05/09 05:19:55 sakane Exp $	*//* * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */#line 33 "policy_token.l"#define __FreeBSD__#include <sys/types.h>#include <sys/param.h>#include <sys/socket.h>#include <net/route.h>#include <net/pfkeyv2.h>#include <netkey/keydb.h>#include <netinet/in.h>#include <netinet6/ipsec.h>#include <stdlib.h>#include <limits.h>#include <string.h>#include <unistd.h>#include <errno.h>#ifdef __ECOS#include "policy_parse.tab.h"#else#ifndef __NetBSD__#include "y.tab.h"#else#include "policy_parse.h"#endif#define yylval __libyylval	/* XXX */#endifint yylex __P((void));/* common section */#line 583 "lex.yy.c"#define INITIAL 0#ifndef YY_NO_UNISTD_H/* Special case for "unistd.h", since it is non-ANSI. We include it way * down here because we want the user's section 1 to have been scanned first. * The user has a chance to override it with an option. */#include <unistd.h>#endif#ifndef YY_EXTRA_TYPE#define YY_EXTRA_TYPE void *#endif/* Macros after this point can all be overridden by user definitions in * section 1. */#ifndef YY_SKIP_YYWRAP#ifdef __cplusplusextern "C" int yywrap (void );#elseextern int yywrap (void );#endif#endif#ifndef yytext_ptrstatic void yy_flex_strncpy (char *,yyconst char *,int );#endif#ifdef YY_NEED_STRLENstatic int yy_flex_strlen (yyconst char * );#endif#ifndef YY_NO_INPUT#ifdef __cplusplusstatic int yyinput (void );#elsestatic int input (void );#endif#endif/* Amount of stuff to slurp up with each read. */#ifndef YY_READ_BUF_SIZE#define YY_READ_BUF_SIZE 8192#endif/* Copy whatever the last rule matched to the standard output. */#ifndef ECHO/* This used to be an fputs(), but since the string might contain NUL's, * we now use fwrite(). */#define ECHO (void) fwrite( yytext, yyleng, 1, yyout )#endif/* Gets input and stuffs it into "buf".  number of characters read, or YY_NULL, * is returned in "result". */#ifndef YY_INPUT#define YY_INPUT(buf,result,max_size) \	if ( YY_CURRENT_BUFFER_LVALUE->yy_is_interactive ) \		{ \		int c = '*'; \		size_t n; \		for ( n = 0; n < max_size && \			     (c = getc( yyin )) != EOF && c != '\n'; ++n ) \			buf[n] = (char) c; \		if ( c == '\n' ) \			buf[n++] = (char) c; \		if ( c == EOF && ferror( yyin ) ) \			YY_FATAL_ERROR( "input in flex scanner failed" ); \		result = n; \		} \	else \		{ \		errno=0; \		while ( (result = fread(buf, 1, max_size, yyin))==0 && ferror(yyin)) \			{ \			if( errno != EINTR) \				{ \				YY_FATAL_ERROR( "input in flex scanner failed" ); \				break; \				} \			errno=0; \			clearerr(yyin); \			} \		}\\#endif/* No semi-colon after return; correct usage is to write "yyterminate();" - * we don't want an extra ';' after the "return" because that will cause * some compilers to complain about unreachable statements. */#ifndef yyterminate#define yyterminate() return YY_NULL#endif/* Number of entries by which start-condition stack grows. */#ifndef YY_START_STACK_INCR#define YY_START_STACK_INCR 25#endif/* Report a fatal error. */#ifndef YY_FATAL_ERROR#define YY_FATAL_ERROR(msg) yy_fatal_error( msg )#endif/* end tables serialization structures and prototypes *//* Default declaration of generated scanner - a define so the user can * easily add parameters. */#ifndef YY_DECL#define YY_DECL_IS_OURS 1extern int yylex (void);#define YY_DECL int yylex (void)#endif /* !YY_DECL *//* Code executed at the beginning of each rule, after yytext and yyleng * have been set up. */#ifndef YY_USER_ACTION#define YY_USER_ACTION#endif/* Code executed at the end of each rule. */#ifndef YY_BREAK#define YY_BREAK break;#endif#define YY_RULE_SETUP \	YY_USER_ACTION/** The main scanner function which does all the work. */YY_DECL{	register yy_state_type yy_current_state;	register char *yy_cp, *yy_bp;	register int yy_act;    #line 94 "policy_token.l"#line 735 "lex.yy.c"	if ( (yy_init) )		{		(yy_init) = 0;#ifdef YY_USER_INIT		YY_USER_INIT;#endif		if ( ! (yy_start) )			(yy_start) = 1;	/* first start state */		if ( ! yyin )			yyin = stdin;		if ( ! yyout )			yyout = stdout;		if ( ! YY_CURRENT_BUFFER ) {			yyensure_buffer_stack ();			YY_CURRENT_BUFFER_LVALUE =				yy_create_buffer(yyin,YY_BUF_SIZE );		}		yy_load_buffer_state( );		}	while ( 1 )		/* loops until end-of-file is reached */		{		yy_cp = (yy_c_buf_p);		/* Support of yytext. */		*yy_cp = (yy_hold_char);		/* yy_bp points to the position in yy_ch_buf of the start of		 * the current run.		 */		yy_bp = yy_cp;		yy_current_state = (yy_start);yy_match:		do			{			register YY_CHAR yy_c = yy_ec[YY_SC_TO_UI(*yy_cp)];			if ( yy_accept[yy_current_state] )				{				(yy_last_accepting_state) = yy_current_state;				(yy_last_accepting_cpos) = yy_cp;				}			while ( yy_chk[yy_base[yy_current_state] + yy_c] != yy_current_state )				{				yy_current_state = (int) yy_def[yy_current_state];				if ( yy_current_state >= 97 )					yy_c = yy_meta[(unsigned int) yy_c];				}			yy_current_state = yy_nxt[yy_base[yy_current_state] + (unsigned int) yy_c];			++yy_cp;			}		while ( yy_base[yy_current_state] != 192 );yy_find_action:		yy_act = yy_accept[yy_current_state];		if ( yy_act == 0 )			{ /* have to back up */			yy_cp = (yy_last_accepting_cpos);			yy_current_state = (yy_last_accepting_state);			yy_act = yy_accept[yy_current_state];			}		YY_DO_BEFORE_ACTION;do_action:	/* This label is used only to access EOF actions. */		switch ( yy_act )	{ /* beginning of action switch */			case 0: /* must back up */			/* undo the effects of YY_DO_BEFORE_ACTION */			*yy_cp = (yy_hold_char);			yy_cp = (yy_last_accepting_cpos);			yy_current_state = (yy_last_accepting_state);			goto yy_find_action;case 1:YY_RULE_SETUP#line 96 "policy_token.l"{ yylval.num = IPSEC_DIR_INBOUND; return(DIR); }	YY_BREAKcase 2:YY_RULE_SETUP#line 97 "policy_token.l"{ yylval.num = IPSEC_DIR_OUTBOUND; return(DIR); }	YY_BREAKcase 3:YY_RULE_SETUP#line 99 "policy_token.l"{ yylval.num = IPSEC_POLICY_DISCARD; return(ACTION); }	YY_BREAKcase 4:YY_RULE_SETUP#line 100 "policy_token.l"{ yylval.num = IPSEC_POLICY_NONE; return(ACTION); }	YY_BREAKcase 5:YY_RULE_SETUP#line 101 "policy_token.l"{ yylval.num = IPSEC_POLICY_IPSEC; return(ACTION); }	YY_BREAKcase 6:YY_RULE_SETUP#line 102 "policy_token.l"{ yylval.num = IPSEC_POLICY_BYPASS; return(ACTION); }	YY_BREAKcase 7:YY_RULE_SETUP#line 103 "policy_token.l"{ yylval.num = IPSEC_POLICY_ENTRUST; return(ACTION); }	YY_BREAKcase 8:YY_RULE_SETUP#line 105 "policy_token.l"{ yylval.num = IPPROTO_ESP; return(PROTOCOL); }	YY_BREAKcase 9:YY_RULE_SETUP#line 106 "policy_token.l"{ yylval.num = IPPROTO_AH; return(PROTOCOL); }	YY_BREAKcase 10:YY_RULE_SETUP#line 107 "policy_token.l"{ yylval.num = IPPROTO_IPCOMP; return(PROTOCOL); }	YY_BREAKcase 11:YY_RULE_SETUP#line 109 "policy_token.l"{ yylval.num = IPSEC_MODE_TRANSPORT; return(MODE); }	YY_BREAKcase 12:YY_RULE_SETUP#line 110 "policy_token.l"{ yylval.num = IPSEC_MODE_TUNNEL; return(MODE); }	YY_BREAKcase 13:YY_RULE_SETUP#line 112 "policy_token.l"{ return(ME); }	YY_BREAKcase 14:YY_RULE_SETUP#line 113 "policy_token.l"{ return(ANY); }	YY_BREAKcase 15:YY_RULE_SETUP#line 115 "policy_token.l"{ yylval.num = IPSEC_LEVEL_DEFAULT; return(LEVEL); }	YY_BREAKcase 16:YY_RULE_SETUP#line 116 "policy_token.l"{ yylval.num = IPSEC_LEVEL_USE; return(LEVEL); }	YY_BREAKcase 17:YY_RULE_SETUP#line 117 "policy_token.l"{ yylval.num = IPSEC_LEVEL_REQUIRE; return(LEVEL); }	YY_BREAKcase 18:YY_RULE_SETUP#line 118 "policy_token.l"{			yylval.val.len = strlen(yytext + 7);			yylval.val.buf = yytext + 7;			return(LEVEL_SPECIFY);		}	YY_BREAKcase 19:YY_RULE_SETUP#line 123 "policy_token.l"{ yylval.num = IPSEC_LEVEL_UNIQUE; return(LEVEL); }	YY_BREAKcase 20:YY_RULE_SETUP#line 124 "policy_token.l"{ return(SLASH); }	YY_BREAKcase 21:YY_RULE_SETUP#line 126 "policy_token.l"{			yylval.val.len = strlen(yytext);			yylval.val.buf = yytext;			return(IPADDRESS);		}	YY_BREAKcase 22:YY_RULE_SETUP#line 132 "policy_token.l"{ return(HYPHEN); }	YY_BREAKcase 23:YY_RULE_SETUP#line 134 "policy_token.l"{ ; }	YY_BREAKcase 24:/* rule 24 can match eol */YY_RULE_SETUP#line 135 "policy_token.l"{ ; }	YY_BREAKcase 25:YY_RULE_SETUP#line 137 "policy_token.l"ECHO;	YY_BREAK#line 952 "lex.yy.c"case YY_STATE_EOF(INITIAL):	yyterminate();	case YY_END_OF_BUFFER:		{		/* Amount of text matched not including the EOB char. */		int yy_amount_of_matched_text = (int) (yy_cp - (yytext_ptr)) - 1;

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -