HomeSort by relevance Sort by last modified time
    Searched defs:ip (Results 226 - 250 of 571) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /prebuilts/ndk/9/platforms/android-14/arch-mips/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57012
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57014
  /prebuilts/ndk/9/platforms/android-14/arch-x86/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57464
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57466
  /prebuilts/ndk/9/platforms/android-18/arch-arm/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57862
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57864
  /prebuilts/ndk/9/platforms/android-18/arch-mips/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon58312
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon58314
  /prebuilts/ndk/9/platforms/android-18/arch-x86/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon58764
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon58766
  /prebuilts/ndk/9/platforms/android-3/arch-arm/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59129
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59131
  /prebuilts/ndk/9/platforms/android-4/arch-arm/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59491
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59493
  /prebuilts/ndk/9/platforms/android-5/arch-arm/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59853
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59855
  /prebuilts/ndk/9/platforms/android-8/arch-arm/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon60218
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon60220
  /prebuilts/ndk/9/platforms/android-9/arch-arm/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon60615
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon60617
  /prebuilts/ndk/9/platforms/android-9/arch-mips/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon61065
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon61067
  /prebuilts/ndk/9/platforms/android-9/arch-x86/usr/include/linux/netfilter/
xt_conntrack.h 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon61517
44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon61519
  /system/core/libnetutils/
packet.c 22 #include <netinet/ip.h>
92 struct iphdr ip; local
100 ip.version = IPVERSION;
101 ip.ihl = sizeof(ip) >> 2;
102 ip.tos = 0;
103 ip.tot_len = htons(sizeof(ip) + sizeof(udp) + size);
104 ip.id = 0;
105 ip.frag_off = 0
161 struct iphdr ip; member in struct:dhcp_packet
    [all...]
  /external/chromium/net/socket/
socks_client_socket.cc 42 uint8 ip[4]; member in struct:net::SOCKS4ServerRequest
52 uint8 ip[4]; member in struct:net::SOCKS4ServerResponse
282 // falling back to SOCKS4a (since it can be confusing to see invalid IP
304 // more robust to try all the IP addresses we have before
309 memcpy(&request.ip, &ipv4_host->sin_addr, sizeof(ipv4_host->sin_addr));
  /external/chromium/third_party/libjingle/source/talk/base/
network.cc 156 network->set_ip(list[i]->ip());
223 unsigned int ip, gw; local
224 if (sscanf(line.c_str(), "%7s %8X %8X", iface, &ip, &gw) == 3 &&
225 name == iface && ip == 0) {
261 uint32 ip = ntohl(inaddr->sin_addr.s_addr); local
263 new Network(ptr->ifr_name, ptr->ifr_name, ip,
353 // Ignore any networks with a 0.x.y.z IP
354 return (network.ip() < 0x01000000);
364 uint32 ip, uint32 gateway_ip)
365 : name_(name), description_(desc), ip_(ip), gateway_ip_(gateway_ip)
    [all...]
socketaddress.cc 32 #include <netinet/ip.h>
69 SocketAddress::SocketAddress(uint32 ip, int port) {
70 SetIP(ip);
99 void SocketAddress::SetIP(uint32 ip) {
101 ip_ = ip;
109 void SocketAddress::SetResolvedIP(uint32 ip) {
110 ip_ = ip;
118 uint32 SocketAddress::ip() const { function in class:talk_base::SocketAddress
304 std::string SocketAddress::IPToString(uint32 ip) {
306 ost << ((ip >> 24) & 0xff)
325 uint32 ip = 0; local
347 uint32 ip = local
    [all...]
  /external/chromium_org/chrome/browser/safe_browsing/
browser_feature_extractor_unittest.cc 588 std::string ip = base::StringPrintf("%d.%d.%d.%d", i, i, i, i); local
589 ips.push_back(ip);
590 browse_info_->ips.insert(std::make_pair(ip, bad_urls));
593 // First ip is good, then check the next 5 bad ips.
client_side_detection_host_unittest.cc 230 void UpdateIPUrlMap(const std::string& ip, const std::string& host) {
231 csd_host_->UpdateIPUrlMap(ip, host);
588 // Empty IP or host are skipped
606 // Add more urls for this ip, it exceeds max limit and won't be added
614 std::string ip = base::StringPrintf("%d.%d.%d.256", i, i, i); local
617 UpdateIPUrlMap(ip, "test.com/");
618 ASSERT_EQ(1U, browse_info->ips[ip].size());
619 EXPECT_EQ(expected_urls, browse_info->ips[ip]);
623 // Exceeding max ip limit 200, these won't be added
641 // malware bad IP lis
    [all...]
  /external/chromium_org/net/dns/
mock_host_resolver.cc 47 LOG(WARNING) << "Not a supported IP literal: " << addresses[index];
152 IPAddressNumber ip; local
153 if (ParseIPLiteralToNumber(info.hostname(), &ip)) {
154 *addresses = AddressList::CreateFromIPAddress(ip, info.port());
  /external/chromium_org/net/quic/test_tools/
crypto_test_utils.cc 134 IPAddressNumber ip; local
135 CHECK(ParseIPLiteralToNumber("192.0.2.33", &ip));
136 IPEndPoint addr = IPEndPoint(ip, 1);
167 IPAddressNumber ip; local
168 CHECK(ParseIPLiteralToNumber("192.0.2.33", &ip));
169 IPEndPoint addr = IPEndPoint(ip, 1);
  /external/chromium_org/net/socket/
socks_client_socket.cc 43 uint8 ip[4]; member in struct:net::SOCKS4ServerRequest
53 uint8 ip[4]; member in struct:net::SOCKS4ServerResponse
294 // falling back to SOCKS4a (since it can be confusing to see invalid IP
316 // more robust to try all the IP addresses we have before
319 CHECK_LE(endpoint.address().size(), sizeof(request.ip));
320 memcpy(&request.ip, &endpoint.address()[0], endpoint.address().size());
  /external/chromium_org/net/tools/quic/
end_to_end_test.cc 120 net::IPAddressNumber ip; local
121 CHECK(net::ParseIPLiteralToNumber("127.0.0.1", &ip));
122 server_address_ = IPEndPoint(ip, 0);
242 IPAddressNumber ip; local
243 CHECK(net::ParseIPLiteralToNumber("::1", &ip));
244 server_address_ = IPEndPoint(ip, server_address_.port());
603 IPAddressNumber ip; local
604 CHECK(net::ParseIPLiteralToNumber("127.0.0.2", &ip));
605 self_address_ = IPEndPoint(ip, 0);
  /external/chromium_org/ppapi/tests/
test_net_address_private.cc 27 uint8_t ip[16]; local
29 ip[i * 2] = host[i] >> 8;
30 ip[i * 2 + 1] = host[i] & 0xff;
32 NetAddressPrivate::CreateFromIPv6Address(ip, scope_id, port, &addr);
  /external/chromium_org/sandbox/linux/seccomp-bpf/
codegen.cc 58 int ip = (int)(iter - program.begin()); local
59 fprintf(stderr, "%3d) ", ip);
90 fprintf(stderr, "JMP %d\n", ip + iter->k + 1);
98 ip + iter->jt + 1, ip + iter->jf + 1);
  /external/chromium_org/third_party/libjingle/source/talk/base/
nat_unittest.cc 186 // The physical NAT tests require connectivity to the selected ip from the
188 // check to see if it's worth even trying with this ip.
225 // Find an available IP with matching family. The test breaks if int_addr
226 // can't talk to ip, so check for connectivity as well.
229 const IPAddress& ip = (*it)->ip(); local
230 if (ip.family() == int_addr.family() && TestConnectivity(int_addr, ip)) {
231 ext_addr2.SetIP(ip);
236 LOG(LS_WARNING) << "No available IP of same family as " << int_addr
    [all...]

Completed in 1476 milliseconds

1 2 3 4 5 6 7 8 91011>>