/dports/sysutils/ipdbtools/ipdb-1.1.2/ |
H A D | ipdb-update.sh | 70 if [ ! -d "$IPRanges" ]; then 71 mkdir -p "$IPRanges" 75 rm -f "$IPRanges/afrinic.md5" 78 if [ -f "$IPRanges/afrinic.md5" ] && [ -f "$IPRanges/afrinic.dat" ]; then 89 rm -f "$IPRanges/apnic.md5" 92 if [ -f "$IPRanges/apnic.md5" ] && [ -f "$IPRanges/apnic.dat" ]; then 103 rm -f "$IPRanges/arin.md5" 106 if [ -f "$IPRanges/arin.md5" ] && [ -f "$IPRanges/arin.dat" ]; then 117 rm -f "$IPRanges/lacnic.md5" 120 if [ -f "$IPRanges/lacnic.md5" ] && [ -f "$IPRanges/lacnic.dat" ]; then [all …]
|
/dports/www/zerowait-httpd/0W-httpd-0.8d/src/common/ |
H A D | ip_ranges.h | 21 } IPRanges; 24 IPRanges* newIPRanges(char* name); 25 int refreshRanges(IPRanges* ranges); 26 short ip2id(IPRanges* ranges, unsigned ip); 27 char* id2code(IPRanges* ranges, short id); 28 char* id2name(IPRanges* ranges, short id); 29 short code2id(IPRanges* ranges, char* code);
|
H A D | ip_ranges.c | 20 IPRanges* 23 IPRanges* ranges; in newIPRanges() 24 if (!(ranges = CALLOC(sizeof(IPRanges)))) return NULL; in newIPRanges() 31 loadIPRanges(IPRanges* ranges) in loadIPRanges() 80 refreshRanges(IPRanges* ranges) in refreshRanges() 97 ip2id(IPRanges* ranges, unsigned ip) in ip2id() 127 loadNames(IPRanges* ranges) in loadNames() 162 id2name(IPRanges* ranges, short id) in id2name() 171 id2code(IPRanges* ranges, short id) in id2code() 180 code2id(IPRanges* ranges, char* code) in code2id()
|
/dports/www/beehive/beehive-0.4.0/vendor/github.com/cloudflare/cloudflare-go/ |
H A D | ips.go | 12 type IPRanges struct { struct 20 Result IPRanges `json:"result"` 28 func IPs() (IPRanges, error) { 31 return IPRanges{}, errors.Wrap(err, "HTTP request failed") 36 return IPRanges{}, errors.Wrap(err, "Response body could not be read") 41 return IPRanges{}, errors.Wrap(err, errUnmarshalError)
|
/dports/security/lego/lego-4.5.3/vendor/github.com/cloudflare/cloudflare-go/ |
H A D | ips.go | 21 type IPRanges struct { struct 39 func IPs() (IPRanges, error) { 43 return IPRanges{}, errors.Wrap(err, "HTTP request failed") 48 return IPRanges{}, errors.Wrap(err, "Response body could not be read") 53 return IPRanges{}, errors.Wrap(err, errUnmarshalError) 56 var ips IPRanges
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/cloudflare/cloudflare-go/ |
H A D | ips.go | 20 type IPRanges struct { struct 38 func IPs() (IPRanges, error) { 41 return IPRanges{}, errors.Wrap(err, "HTTP request failed") 46 return IPRanges{}, errors.Wrap(err, "Response body could not be read") 51 return IPRanges{}, errors.Wrap(err, errUnmarshalError) 54 var ips IPRanges
|
/dports/net/traefik/traefik-2.6.1/vendor/github.com/cloudflare/cloudflare-go/ |
H A D | ips.go | 21 type IPRanges struct { struct 39 func IPs() (IPRanges, error) { 43 return IPRanges{}, errors.Wrap(err, "HTTP request failed") 48 return IPRanges{}, errors.Wrap(err, "Response body could not be read") 53 return IPRanges{}, errors.Wrap(err, errUnmarshalError) 56 var ips IPRanges
|
/dports/devel/p5-Paws/Paws-0.14/t/10_responses/ |
H A D | redshift-describe-cluster-security-groups.response | 6 <IPRanges> 11 </IPRanges> 17 <IPRanges/>
|
H A D | rds-describe-db-security-groups.response | 7 <IPRanges/> 14 <IPRanges/> 21 <IPRanges/>
|
H A D | redshift-authorize-cluster-security-group-ingress.response.test.yml | 13 path: ClusterSecurityGroup.IPRanges.0.CIDRIP 16 path: ClusterSecurityGroup.IPRanges.0.Status
|
H A D | redshift-authorize-cluster-security-group-ingress.response | 5 <IPRanges> 10 </IPRanges>
|
H A D | redshift-describe-cluster-security-groups.response.test.yml | 13 path: ClusterSecurityGroups.0.IPRanges.0.CIDRIP 16 path: ClusterSecurityGroups.0.IPRanges.0.Status
|
/dports/net/p5-VM-EC2/VM-EC2-1.28/lib/VM/EC2/DB/ |
H A D | SecurityGroup.pm | 89 sub IPRanges { subroutine 91 my $ranges = $self->SUPER::IPRanges; 101 sub ip_ranges { shift->IPRanges }
|
/dports/devel/awscli/awscli-1.20.61/awscli/examples/redshift/ |
H A D | describe-cluster-security-groups.rst | 20 "IPRanges": [ 32 "IPRanges": \[]
|
/dports/devel/awless/awless-0.1.11/graph/ |
H A D | type.go | 35 sort.Slice(r.IPRanges, func(i int, j int) bool { 36 return r.IPRanges[i].String() < r.IPRanges[j].String() 47 IPRanges []*net.IPNet `predicate:"net:cidr"` // IPv4 or IPv6 range member 53 for _, n := range r.IPRanges { 62 …Range:%+v; Protocol:%s; IPRanges:%+v; Sources:%+v", r.PortRange, r.Protocol, r.IPRanges, r.Sources) 101 r.IPRanges = append(r.IPRanges, cidr)
|
H A D | resource_test.go | 222 …{PortRange: PortRange{FromPort: 1, ToPort: 1024}, Protocol: "udp", IPRanges: []*net.IPNet{subnetci… 225 …{PortRange: PortRange{Any: true}, Protocol: "icmp", IPRanges: []*net.IPNet{localhost, {IP: net.Par… 311 IPRanges: []*net.IPNet{{IP: net.IPv4(10, 10, 0, 0), Mask: net.CIDRMask(16, 32)}}, 316 IPRanges: []*net.IPNet{{IP: net.IPv4(0, 0, 0, 0), Mask: net.CIDRMask(0, 32)}}, 322 IPRanges: []*net.IPNet{{IP: net.IPv4(0, 0, 0, 0), Mask: net.CIDRMask(0, 32)}}, 369 …{PortRange: PortRange{FromPort: 80, ToPort: 80}, Protocol: "tcp", IPRanges: []*net.IPNet{localhost… 370 …{PortRange: PortRange{FromPort: 1, ToPort: 1024}, Protocol: "udp", IPRanges: []*net.IPNet{subnetci…
|
/dports/devel/awscli/awscli-1.20.61/awscli/examples/rds/ |
H A D | describe-db-security-groups.rst | 16 "IPRanges": [], 25 "IPRanges": [],
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/go-tfe/ |
H A D | ip_ranges_test.go | 17 r, err := client.Meta.IPRanges.Read(ctx, "") 28 r, err := client.Meta.IPRanges.Read(ctx, modifiedSince)
|
H A D | ip_ranges.go | 11 var _ IPRanges = (*ipRanges)(nil) 16 type IPRanges interface { interface
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/hashicorp/go-tfe/ |
H A D | ip_ranges_test.go | 19 r, err := client.Meta.IPRanges.Read(ctx, "") 30 r, err := client.Meta.IPRanges.Read(ctx, modifiedSince)
|
H A D | ip_ranges.go | 12 var _ IPRanges = (*ipRanges)(nil) 17 type IPRanges interface { interface
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vault-plugin-secrets-terraform/vendor/github.com/hashicorp/go-tfe/ |
H A D | ip_ranges.go | 11 var _ IPRanges = (*ipRanges)(nil) 16 type IPRanges interface { interface
|
/dports/security/lego/lego-4.5.3/vendor/github.com/transip/gotransip/v6/colocation/ |
H A D | repository_test.go | 78 require.Equal(t, 1, len(all[0].IPRanges)) 80 assert.Equal(t, "2a01:7c8:c038:6::/64", all[0].IPRanges[0].String()) 94 require.Equal(t, 1, len(colo.IPRanges)) 96 assert.Equal(t, "2a01:7c8:c038:6::/64", colo.IPRanges[0].String())
|
/dports/devel/awless/awless-0.1.11/inspect/inspectors/ |
H A D | port_scanner.go | 83 for _, n := range inbound.IPRanges { 91 fmt.Fprintf(w, "\tall ports via any protocol for IPs: %s\n", inbound.IPRanges)
|
/dports/www/zerowait-httpd/0W-httpd-0.8d/src/httpd/ |
H A D | httpd.c | 36 IPRanges* countries; 37 IPRanges* classes; 38 IPRanges* regions;
|