PASS
{ "PASS", PASS, ZSTR1, 1, "<sp> password" },
| PASS SP password CRLF check_secure
{ "PASS", PASS, ZSTR1, 1, "<sp> password" },
USER PASS ACCT REIN QUIT PORT
tst->pass == PASS ? "pass" : "fail");
action : PASS {
| PASS { $$.b1 = 1; $$.b2 = 0; $$.w2 = 0; }
| PASS log { $$.b1 = 1; $$.b2 = $2.log; $$.w2 = $2.logif; }
%token PASS BLOCK MATCH SCRUB RETURN IN OS OUT LOG QUICK ON FROM TO FLAGS
{ "pass", PASS},
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
if (error_handling == PASS) \
ng_errors(PASS);
ng_errors(PASS);
ng_errors(PASS);
e->pfi.pfik_bytes[IPV4][IN][PASS];
e->pfi.pfik_bytes[IPV4][OUT][PASS];
e->pfi.pfik_packets[IPV4][IN][PASS];
e->pfi.pfik_packets[IPV4][OUT][PASS];
e->pfi.pfik_bytes[IPV6][IN][PASS];
e->pfi.pfik_bytes[IPV6][OUT][PASS];
e->pfi.pfik_packets[IPV6][IN][PASS];
e->pfi.pfik_packets[IPV6][OUT][PASS];