/external/webrtc/webrtc/base/ |
win32_unittest.cc | 63 IPAddress ipv6; local 67 ASSERT_TRUE(IPFromString("2a00:8a00:a000:1190:0000:0001:000:252", &ipv6)); 68 EXPECT_EQ("2a00:8a00:a000:1190::1:0:252", ipv6.ToString()); 71 ASSERT_TRUE(IPFromString("0:0:0:0:0:0:0:1", &ipv6)); 72 EXPECT_EQ("::1", ipv6.ToString()); 75 ASSERT_TRUE(IPFromString("fe80:0:0:0:2aa:ff:fe9a:4ca2", &ipv6)); 76 EXPECT_EQ("fe80::2aa:ff:fe9a:4ca2", ipv6.ToString()); 79 ASSERT_TRUE(IPFromString("2a00:8a00:a000:1190:0000:0001:000:00", &ipv6)); 80 EXPECT_EQ("2a00:8a00:a000:1190:0:1::", ipv6.ToString()); 83 ASSERT_TRUE(IPFromString("0:0:000:1190:0000:0001:000:00", &ipv6)); [all...] |
/external/iptables/iptables/ |
nft-ipv6.c | 35 if (cs->fw6.ipv6.iniface[0] != '\0') { 36 op = nft_invflags2cmp(cs->fw6.ipv6.invflags, IPT_INV_VIA_IN); 37 add_iniface(r, cs->fw6.ipv6.iniface, op); 40 if (cs->fw6.ipv6.outiface[0] != '\0') { 41 op = nft_invflags2cmp(cs->fw6.ipv6.invflags, IPT_INV_VIA_OUT); 42 add_outiface(r, cs->fw6.ipv6.outiface, op); 45 if (cs->fw6.ipv6.proto != 0) { 46 op = nft_invflags2cmp(cs->fw6.ipv6.invflags, XT_INV_PROTO); 48 cs->fw6.ipv6.proto, op); 51 if (!IN6_IS_ADDR_UNSPECIFIED(&cs->fw6.ipv6.src)) [all...] |
ip6tables.c | 117 {.name = "ipv6", .has_arg = 0, .val = '6'}, 244 " --ipv6 -6 Nothing (line is ignored by iptables-restore)\n" 570 fputc(fw->ipv6.invflags & XT_INV_PROTO ? '!' : ' ', stdout); 572 const char *pname = proto_to_name(fw->ipv6.proto, format&FMT_NUMERIC); 576 printf(FMT("%-5hu", "%hu "), fw->ipv6.proto); 590 if (fw->ipv6.invflags & IP6T_INV_VIA_IN) { 596 if (fw->ipv6.iniface[0] != '\0') { 597 strcat(iface, fw->ipv6.iniface); 603 if (fw->ipv6.invflags & IP6T_INV_VIA_OUT) { 609 if (fw->ipv6.outiface[0] != '\0') [all...] |
/external/iptables/libiptc/ |
libip6tc.c | 142 inet_ntop(AF_INET6, &e->ipv6.src, buf, sizeof buf); 145 len = ipv6_prefix_length(&e->ipv6.smsk); 149 inet_ntop(AF_INET6, &e->ipv6.smsk, buf, sizeof buf); 155 inet_ntop(AF_INET6, &e->ipv6.dst, buf, sizeof buf); 158 len = ipv6_prefix_length(&e->ipv6.dmsk); 162 inet_ntop(AF_INET6, &e->ipv6.dmsk, buf, sizeof buf); 167 printf("Interface: `%s'/", e->ipv6.iniface); 169 printf("%c", e->ipv6.iniface_mask[i] ? 'X' : '.'); 170 printf("to `%s'/", e->ipv6.outiface); 172 printf("%c", e->ipv6.outiface_mask[i] ? 'X' : '.') [all...] |
/external/ltp/testcases/network/stress/multicast/grp-operation/ |
mcast-lib.sh | 51 SYSCTL_ALL_FORCE_MLD_VERSION=$(sysctl -b net.ipv6.conf.all.force_mld_version) 52 SYSCTL_FORCE_MLD_VERSION=$(sysctl -b net.ipv6.conf.$(tst_iface).force_mld_version) 53 SYSCTL_MLD_MAX_MSF=$(sysctl -b net.ipv6.mld_max_msf) 55 ROD sysctl -q -w net.ipv6.conf.all.force_mld_version=0 56 ROD sysctl -q -w net.ipv6.conf.$(tst_iface).force_mld_version=0 57 ROD sysctl -q -w net.ipv6.mld_max_msf=$default_mld_max_msf 85 [ -n "$SYSCTL_ALL_FORCE_MLD_VERSION" ] && sysctl -q -w net.ipv6.conf.all.force_mld_version=$SYSCTL_ALL_FORCE_MLD_VERSION 86 [ -n "$SYSCTL_FORCE_MLD_VERSION" ] && sysctl -q -w net.ipv6.conf.$(tst_iface).force_mld_version=$SYSCTL_FORCE_MLD_VERSION 87 [ -n "$SYSCTL_MLD_MAX_MSF" ] && sysctl -q -w net.ipv6.mld_max_msf=$SYSCTL_MLD_MAX_MSF
|
/external/grpc-grpc/test/core/client_channel/resolvers/ |
sockaddr_resolver_test.cc | 94 grpc_core::ResolverFactory* ipv6 = local 95 grpc_core::ResolverRegistry::LookupResolverFactory("ipv6"); 105 test_fails(ipv6, "ipv6:["); 106 test_fails(ipv6, "ipv6:[::]"); 107 test_succeeds(ipv6, "ipv6:[::]:1234"); 108 test_fails(ipv6, "ipv6:[::]:123456") [all...] |
/external/curl/docs/cmdline-opts/ |
ipv4.d | 6 Mutexed: ipv6 12 example try IPv6.
|
ipv6.d | 2 Long: ipv6 9 Help: Resolve names to IPv6 addresses 11 This option tells curl to resolve names to IPv6 addresses only, and not for
|
dns-interface.d | 5 See-also: dns-ipv4-addr dns-ipv6-addr
|
dns-ipv4-addr.d | 5 See-also: dns-interface dns-ipv6-addr
|
dns-ipv6-addr.d | 1 Long: dns-ipv6-addr 3 Help: IPv6 address to use for DNS requests 9 Tell curl to bind to <ip-address> when making IPv6 DNS requests, so that 11 single IPv6 address.
|
/external/linux-kselftest/tools/testing/selftests/net/ |
ip_defrag.sh | 16 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_high_thresh=9000000 >/dev/null 2>&1 17 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_low_thresh=7000000 >/dev/null 2>&1 34 echo "ipv6 defrag" 37 echo "ipv6 defrag with overlaps"
|
reuseaddr_conflict.c | 7 * when we open the ipv6 conterpart, which is what was happening previously. 21 int open_port(int ipv6, int any) 29 int family = ipv6 ? AF_INET6 : AF_INET; 43 if (ipv6) { 56 if (ipv6 && setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void*)&v6only, 102 error(1, errno, "Couldn't open ipv6 reuseport"); 108 fprintf(stderr, "Opening INADDR_ANY:%d after closing ipv6 socket\n", PORT); 111 error(1, 0, "Was allowed to create an ipv4 reuseport on an already bound non-reuseport socket with no ipv6");
|
ip_defrag.c | 32 /* IPv6 fragment header lenth. */ 41 #define IP6_MF (1) /* IPv6 MF flag. */ 133 int offset, bool ipv6) 138 uint8_t *frag_start = ipv6 ? ip_frame + IP6_HLEN + FRAG_HLEN : 147 if (ipv6) 154 if (ipv6) { 202 socklen_t alen, bool ipv6) 217 if (ipv6) { 245 send_fragment(fd_raw, addr, alen, offset, ipv6); 253 if (ipv6) { [all...] |
/external/libcups/cups/ |
http-addrlist.c | 140 * system not being configured with IPv4/IPv6/domain socket enabled. 548 char ipv6[64], /* IPv6 address */ local 550 int ipv6len; /* Length of IPv6 address */ 566 * Remove brackets from numeric IPv6 address... 575 strlcpy(ipv6, hostname + 4, sizeof(ipv6)); 576 if ((ipv6len = (int)strlen(ipv6) - 1) >= 0 && ipv6[ipv6len] == ']') 578 ipv6[ipv6len] = '\0' [all...] |
http-addr.c | 45 IN6_IS_ADDR_UNSPECIFIED(&(addr->ipv6.sin6_addr))) 114 return (!memcmp(&(addr1->ipv6.sin6_addr), &(addr2->ipv6.sin6_addr), 16)); 135 return (sizeof(addr->ipv6)); 293 IN6_IS_ADDR_LOOPBACK(&(addr->ipv6.sin6_addr))) 406 host = gethostbyaddr((char *)&(addr->ipv6.sin6_addr), 462 return (ntohs(addr->ipv6.sin6_port)); 484 addr->ipv6.sin6_port = htons(port); 570 for (sptr = temps, i = 0; i < 4 && addr->ipv6.sin6_addr.s6_addr32[i]; i ++) 572 temp = ntohl(addr->ipv6.sin6_addr.s6_addr32[i]) [all...] |
/bionic/libc/include/netinet/ |
in.h | 39 #include <linux/ipv6.h>
|
/external/scapy/test/ |
run_tests | 7 PYTHONPATH=$DIR exec $PYTHON ${DIR}/scapy/tools/UTscapy.py -t regression.uts -f html -K ipv6 -l -o /tmp/scapy_regression_test_$(date +%Y%m%d-%H%M%S).html
|
/external/iptables/extensions/ |
libip6t_MASQUERADE.c | 4 * Based on Rusty Russell's IPv4 MASQUERADE target. Development of IPv6 NAT 79 if (entry->ipv6.proto == IPPROTO_TCP || 80 entry->ipv6.proto == IPPROTO_UDP || 81 entry->ipv6.proto == IPPROTO_SCTP || 82 entry->ipv6.proto == IPPROTO_DCCP || 83 entry->ipv6.proto == IPPROTO_ICMP)
|
libip6t_REDIRECT.c | 4 * Based on Rusty Russell's IPv4 REDIRECT target. Development of IPv6 NAT 80 if (entry->ipv6.proto == IPPROTO_TCP 81 || entry->ipv6.proto == IPPROTO_UDP 82 || entry->ipv6.proto == IPPROTO_SCTP 83 || entry->ipv6.proto == IPPROTO_DCCP 84 || entry->ipv6.proto == IPPROTO_ICMP)
|
/external/sl4a/Common/src/com/googlecode/android_scripting/facade/ |
ConnectivityEvents.java | 149 String ipv6 = anc.getPeerIpv6Addr().toString(); local 150 if (ipv6.charAt(0) == '/') { 151 ipv6 = ipv6.substring(1); 153 json.put("aware_ipv6", ipv6);
|
/external/curl/tests/ |
serverhelp.pm | 82 /^((ftp|http|imap|pop3|smtp|http-pipe)s?)(\d*)(-ipv6|)$/) { 88 /^(tftp|sftp|socks|ssh|rtsp|gopher|httptls)(\d*)(-ipv6|)$/) { 112 ($ipver =~ /^(4|6|ipv4|ipv6|-ipv4|-ipv6|unix)$/)); 113 $ipver = ($ipver =~ /6$/) ? '-IPv6' : (($ipver =~ /unix$/) ? '-unix' : '');
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 34 * first item on the line is the IPv4 or IPv6 address of the client 187 * ipv6 - Whether to enable IPv6 support in the RADIUS server 189 int ipv6; member in struct:radius_server_conf
|
/external/curl/ |
androidconfigure | 81 # Enabled IPv6. 82 --enable-ipv6
|
/external/ltp/testcases/kernel/containers/netns/ |
netns_comm.sh | 28 # * IP_VERSION (ipv4|ipv6) 29 # Version of IP. (ipv4|ipv6) 78 ipv6) IP_LO="::1" ;;
|