📄 lex.yy.c
字号:
{ 0, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 10, 11, 13, 14, 12, 15, 17, 16, 19, 25, 18, 20, 26, 10, 28, 12, 15, 10, 12, 13, 14, 18, 14, 27, 13, 16, 11, 29, 20, 19, 17, 26, 19, 20, 25, 27, 28, 30, 32, 35, 34, 36, 37, 40, 39, 43, 38, 32, 44, 37, 29, 46, 43, 48, 40, 44, 30, 34, 39, 45, 32, 36, 35, 38, 49, 50, 52, 53, 45, 54, 57, 48, 46, 55, 58, 49, 50, 60, 59, 61, 62, 65, 64, 66, 53, 59, 54, 67, 68, 62, 52, 69, 57, 55, 66, 61, 64, 70, 58, 71, 72, 60, 74, 65, 77, 75, 69, 76, 79, 81, 68, 67, 84, 91, 83, 77, 80, 93, 70, 72, 98, 71, 76, 74, 75, 83, 80, 95, 86, 90, 84, 79, 81, 86, 91, 92, 89, 94, 88, 92, 93, 94, 97, 97, 87, 85, 82, 78, 73, 63, 56, 51, 47, 42, 33, 31, 24, 23, 21, 8, 5, 3, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96, 96 } ;static yy_state_type yy_last_accepting_state;static char *yy_last_accepting_cpos;extern int yy_flex_debug;int yy_flex_debug = 0;/* The intent behind this definition is that it'll catch * any uses of REJECT which flex missed. */#define REJECT reject_used_but_not_detected#define yymore() yymore_used_but_not_detected#define YY_MORE_ADJ 0#define YY_RESTORE_YY_MORE_OFFSETchar *yytext;#line 1 "policy_token.l"/* $KAME: policy_token.l,v 1.13 2003/05/09 05:19:55 sakane Exp $ *//* * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */#line 33 "policy_token.l"#define __FreeBSD__#include <sys/types.h>#include <sys/param.h>#include <sys/socket.h>#include <net/route.h>#include <net/pfkeyv2.h>#include <netkey/keydb.h>#include <netinet/in.h>#include <netinet6/ipsec.h>#include <stdlib.h>#include <limits.h>#include <string.h>#include <unistd.h>#include <errno.h>#ifdef __ECOS#include "policy_parse.tab.h"#else#ifndef __NetBSD__#include "y.tab.h"#else#include "policy_parse.h"#endif#define yylval __libyylval /* XXX */#endifint yylex __P((void));/* common section */#line 583 "lex.yy.c"#define INITIAL 0#ifndef YY_NO_UNISTD_H/* Special case for "unistd.h", since it is non-ANSI. We include it way * down here because we want the user's section 1 to have been scanned first. * The user has a chance to override it with an option. */#include <unistd.h>#endif#ifndef YY_EXTRA_TYPE#define YY_EXTRA_TYPE void *#endif/* Macros after this point can all be overridden by user definitions in * section 1. */#ifndef YY_SKIP_YYWRAP#ifdef __cplusplusextern "C" int yywrap (void );#elseextern int yywrap (void );#endif#endif#ifndef yytext_ptrstatic void yy_flex_strncpy (char *,yyconst char *,int );#endif#ifdef YY_NEED_STRLENstatic int yy_flex_strlen (yyconst char * );#endif#ifndef YY_NO_INPUT#ifdef __cplusplusstatic int yyinput (void );#elsestatic int input (void );#endif#endif/* Amount of stuff to slurp up with each read. */#ifndef YY_READ_BUF_SIZE#define YY_READ_BUF_SIZE 8192#endif/* Copy whatever the last rule matched to the standard output. */#ifndef ECHO/* This used to be an fputs(), but since the string might contain NUL's, * we now use fwrite(). */#define ECHO (void) fwrite( yytext, yyleng, 1, yyout )#endif/* Gets input and stuffs it into "buf". number of characters read, or YY_NULL, * is returned in "result". */#ifndef YY_INPUT#define YY_INPUT(buf,result,max_size) \ if ( YY_CURRENT_BUFFER_LVALUE->yy_is_interactive ) \ { \ int c = '*'; \ size_t n; \ for ( n = 0; n < max_size && \ (c = getc( yyin )) != EOF && c != '\n'; ++n ) \ buf[n] = (char) c; \ if ( c == '\n' ) \ buf[n++] = (char) c; \ if ( c == EOF && ferror( yyin ) ) \ YY_FATAL_ERROR( "input in flex scanner failed" ); \ result = n; \ } \ else \ { \ errno=0; \ while ( (result = fread(buf, 1, max_size, yyin))==0 && ferror(yyin)) \ { \ if( errno != EINTR) \ { \ YY_FATAL_ERROR( "input in flex scanner failed" ); \ break; \ } \ errno=0; \ clearerr(yyin); \ } \ }\\#endif/* No semi-colon after return; correct usage is to write "yyterminate();" - * we don't want an extra ';' after the "return" because that will cause * some compilers to complain about unreachable statements. */#ifndef yyterminate#define yyterminate() return YY_NULL#endif/* Number of entries by which start-condition stack grows. */#ifndef YY_START_STACK_INCR#define YY_START_STACK_INCR 25#endif/* Report a fatal error. */#ifndef YY_FATAL_ERROR#define YY_FATAL_ERROR(msg) yy_fatal_error( msg )#endif/* end tables serialization structures and prototypes *//* Default declaration of generated scanner - a define so the user can * easily add parameters. */#ifndef YY_DECL#define YY_DECL_IS_OURS 1extern int yylex (void);#define YY_DECL int yylex (void)#endif /* !YY_DECL *//* Code executed at the beginning of each rule, after yytext and yyleng * have been set up. */#ifndef YY_USER_ACTION#define YY_USER_ACTION#endif/* Code executed at the end of each rule. */#ifndef YY_BREAK#define YY_BREAK break;#endif#define YY_RULE_SETUP \ YY_USER_ACTION/** The main scanner function which does all the work. */YY_DECL{ register yy_state_type yy_current_state; register char *yy_cp, *yy_bp; register int yy_act; #line 94 "policy_token.l"#line 735 "lex.yy.c" if ( (yy_init) ) { (yy_init) = 0;#ifdef YY_USER_INIT YY_USER_INIT;#endif if ( ! (yy_start) ) (yy_start) = 1; /* first start state */ if ( ! yyin ) yyin = stdin; if ( ! yyout ) yyout = stdout; if ( ! YY_CURRENT_BUFFER ) { yyensure_buffer_stack (); YY_CURRENT_BUFFER_LVALUE = yy_create_buffer(yyin,YY_BUF_SIZE ); } yy_load_buffer_state( ); } while ( 1 ) /* loops until end-of-file is reached */ { yy_cp = (yy_c_buf_p); /* Support of yytext. */ *yy_cp = (yy_hold_char); /* yy_bp points to the position in yy_ch_buf of the start of * the current run. */ yy_bp = yy_cp; yy_current_state = (yy_start);yy_match: do { register YY_CHAR yy_c = yy_ec[YY_SC_TO_UI(*yy_cp)]; if ( yy_accept[yy_current_state] ) { (yy_last_accepting_state) = yy_current_state; (yy_last_accepting_cpos) = yy_cp; } while ( yy_chk[yy_base[yy_current_state] + yy_c] != yy_current_state ) { yy_current_state = (int) yy_def[yy_current_state]; if ( yy_current_state >= 97 ) yy_c = yy_meta[(unsigned int) yy_c]; } yy_current_state = yy_nxt[yy_base[yy_current_state] + (unsigned int) yy_c]; ++yy_cp; } while ( yy_base[yy_current_state] != 192 );yy_find_action: yy_act = yy_accept[yy_current_state]; if ( yy_act == 0 ) { /* have to back up */ yy_cp = (yy_last_accepting_cpos); yy_current_state = (yy_last_accepting_state); yy_act = yy_accept[yy_current_state]; } YY_DO_BEFORE_ACTION;do_action: /* This label is used only to access EOF actions. */ switch ( yy_act ) { /* beginning of action switch */ case 0: /* must back up */ /* undo the effects of YY_DO_BEFORE_ACTION */ *yy_cp = (yy_hold_char); yy_cp = (yy_last_accepting_cpos); yy_current_state = (yy_last_accepting_state); goto yy_find_action;case 1:YY_RULE_SETUP#line 96 "policy_token.l"{ yylval.num = IPSEC_DIR_INBOUND; return(DIR); } YY_BREAKcase 2:YY_RULE_SETUP#line 97 "policy_token.l"{ yylval.num = IPSEC_DIR_OUTBOUND; return(DIR); } YY_BREAKcase 3:YY_RULE_SETUP#line 99 "policy_token.l"{ yylval.num = IPSEC_POLICY_DISCARD; return(ACTION); } YY_BREAKcase 4:YY_RULE_SETUP#line 100 "policy_token.l"{ yylval.num = IPSEC_POLICY_NONE; return(ACTION); } YY_BREAKcase 5:YY_RULE_SETUP#line 101 "policy_token.l"{ yylval.num = IPSEC_POLICY_IPSEC; return(ACTION); } YY_BREAKcase 6:YY_RULE_SETUP#line 102 "policy_token.l"{ yylval.num = IPSEC_POLICY_BYPASS; return(ACTION); } YY_BREAKcase 7:YY_RULE_SETUP#line 103 "policy_token.l"{ yylval.num = IPSEC_POLICY_ENTRUST; return(ACTION); } YY_BREAKcase 8:YY_RULE_SETUP#line 105 "policy_token.l"{ yylval.num = IPPROTO_ESP; return(PROTOCOL); } YY_BREAKcase 9:YY_RULE_SETUP#line 106 "policy_token.l"{ yylval.num = IPPROTO_AH; return(PROTOCOL); } YY_BREAKcase 10:YY_RULE_SETUP#line 107 "policy_token.l"{ yylval.num = IPPROTO_IPCOMP; return(PROTOCOL); } YY_BREAKcase 11:YY_RULE_SETUP#line 109 "policy_token.l"{ yylval.num = IPSEC_MODE_TRANSPORT; return(MODE); } YY_BREAKcase 12:YY_RULE_SETUP#line 110 "policy_token.l"{ yylval.num = IPSEC_MODE_TUNNEL; return(MODE); } YY_BREAKcase 13:YY_RULE_SETUP#line 112 "policy_token.l"{ return(ME); } YY_BREAKcase 14:YY_RULE_SETUP#line 113 "policy_token.l"{ return(ANY); } YY_BREAKcase 15:YY_RULE_SETUP#line 115 "policy_token.l"{ yylval.num = IPSEC_LEVEL_DEFAULT; return(LEVEL); } YY_BREAKcase 16:YY_RULE_SETUP#line 116 "policy_token.l"{ yylval.num = IPSEC_LEVEL_USE; return(LEVEL); } YY_BREAKcase 17:YY_RULE_SETUP#line 117 "policy_token.l"{ yylval.num = IPSEC_LEVEL_REQUIRE; return(LEVEL); } YY_BREAKcase 18:YY_RULE_SETUP#line 118 "policy_token.l"{ yylval.val.len = strlen(yytext + 7); yylval.val.buf = yytext + 7; return(LEVEL_SPECIFY); } YY_BREAKcase 19:YY_RULE_SETUP#line 123 "policy_token.l"{ yylval.num = IPSEC_LEVEL_UNIQUE; return(LEVEL); } YY_BREAKcase 20:YY_RULE_SETUP#line 124 "policy_token.l"{ return(SLASH); } YY_BREAKcase 21:YY_RULE_SETUP#line 126 "policy_token.l"{ yylval.val.len = strlen(yytext); yylval.val.buf = yytext; return(IPADDRESS); } YY_BREAKcase 22:YY_RULE_SETUP#line 132 "policy_token.l"{ return(HYPHEN); } YY_BREAKcase 23:YY_RULE_SETUP#line 134 "policy_token.l"{ ; } YY_BREAKcase 24:/* rule 24 can match eol */YY_RULE_SETUP#line 135 "policy_token.l"{ ; } YY_BREAKcase 25:YY_RULE_SETUP#line 137 "policy_token.l"ECHO; YY_BREAK#line 952 "lex.yy.c"case YY_STATE_EOF(INITIAL): yyterminate(); case YY_END_OF_BUFFER: { /* Amount of text matched not including the EOB char. */ int yy_amount_of_matched_text = (int) (yy_cp - (yytext_ptr)) - 1;
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -