/prebuilts/ndk/9/platforms/android-14/arch-mips/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57012 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57014
|
/prebuilts/ndk/9/platforms/android-14/arch-x86/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57464 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57466
|
/prebuilts/ndk/9/platforms/android-18/arch-arm/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57862 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon57864
|
/prebuilts/ndk/9/platforms/android-18/arch-mips/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon58312 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon58314
|
/prebuilts/ndk/9/platforms/android-18/arch-x86/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon58764 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon58766
|
/prebuilts/ndk/9/platforms/android-3/arch-arm/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59129 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59131
|
/prebuilts/ndk/9/platforms/android-4/arch-arm/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59491 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59493
|
/prebuilts/ndk/9/platforms/android-5/arch-arm/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59853 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon59855
|
/prebuilts/ndk/9/platforms/android-8/arch-arm/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon60218 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon60220
|
/prebuilts/ndk/9/platforms/android-9/arch-arm/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon60615 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon60617
|
/prebuilts/ndk/9/platforms/android-9/arch-mips/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon61065 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon61067
|
/prebuilts/ndk/9/platforms/android-9/arch-x86/usr/include/linux/netfilter/ |
xt_conntrack.h | 37 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon61517 44 __u32 ip; member in struct:ip_conntrack_old_tuple::__anon61519
|
/system/core/libnetutils/ |
packet.c | 22 #include <netinet/ip.h> 92 struct iphdr ip; local 100 ip.version = IPVERSION; 101 ip.ihl = sizeof(ip) >> 2; 102 ip.tos = 0; 103 ip.tot_len = htons(sizeof(ip) + sizeof(udp) + size); 104 ip.id = 0; 105 ip.frag_off = 0 161 struct iphdr ip; member in struct:dhcp_packet [all...] |
/external/chromium/net/socket/ |
socks_client_socket.cc | 42 uint8 ip[4]; member in struct:net::SOCKS4ServerRequest 52 uint8 ip[4]; member in struct:net::SOCKS4ServerResponse 282 // falling back to SOCKS4a (since it can be confusing to see invalid IP 304 // more robust to try all the IP addresses we have before 309 memcpy(&request.ip, &ipv4_host->sin_addr, sizeof(ipv4_host->sin_addr));
|
/external/chromium/third_party/libjingle/source/talk/base/ |
network.cc | 156 network->set_ip(list[i]->ip()); 223 unsigned int ip, gw; local 224 if (sscanf(line.c_str(), "%7s %8X %8X", iface, &ip, &gw) == 3 && 225 name == iface && ip == 0) { 261 uint32 ip = ntohl(inaddr->sin_addr.s_addr); local 263 new Network(ptr->ifr_name, ptr->ifr_name, ip, 353 // Ignore any networks with a 0.x.y.z IP 354 return (network.ip() < 0x01000000); 364 uint32 ip, uint32 gateway_ip) 365 : name_(name), description_(desc), ip_(ip), gateway_ip_(gateway_ip) [all...] |
socketaddress.cc | 32 #include <netinet/ip.h> 69 SocketAddress::SocketAddress(uint32 ip, int port) { 70 SetIP(ip); 99 void SocketAddress::SetIP(uint32 ip) { 101 ip_ = ip; 109 void SocketAddress::SetResolvedIP(uint32 ip) { 110 ip_ = ip; 118 uint32 SocketAddress::ip() const { function in class:talk_base::SocketAddress 304 std::string SocketAddress::IPToString(uint32 ip) { 306 ost << ((ip >> 24) & 0xff) 325 uint32 ip = 0; local 347 uint32 ip = local [all...] |
/external/chromium_org/chrome/browser/safe_browsing/ |
browser_feature_extractor_unittest.cc | 588 std::string ip = base::StringPrintf("%d.%d.%d.%d", i, i, i, i); local 589 ips.push_back(ip); 590 browse_info_->ips.insert(std::make_pair(ip, bad_urls)); 593 // First ip is good, then check the next 5 bad ips.
|
client_side_detection_host_unittest.cc | 230 void UpdateIPUrlMap(const std::string& ip, const std::string& host) { 231 csd_host_->UpdateIPUrlMap(ip, host); 588 // Empty IP or host are skipped 606 // Add more urls for this ip, it exceeds max limit and won't be added 614 std::string ip = base::StringPrintf("%d.%d.%d.256", i, i, i); local 617 UpdateIPUrlMap(ip, "test.com/"); 618 ASSERT_EQ(1U, browse_info->ips[ip].size()); 619 EXPECT_EQ(expected_urls, browse_info->ips[ip]); 623 // Exceeding max ip limit 200, these won't be added 641 // malware bad IP lis [all...] |
/external/chromium_org/net/dns/ |
mock_host_resolver.cc | 47 LOG(WARNING) << "Not a supported IP literal: " << addresses[index]; 152 IPAddressNumber ip; local 153 if (ParseIPLiteralToNumber(info.hostname(), &ip)) { 154 *addresses = AddressList::CreateFromIPAddress(ip, info.port());
|
/external/chromium_org/net/quic/test_tools/ |
crypto_test_utils.cc | 134 IPAddressNumber ip; local 135 CHECK(ParseIPLiteralToNumber("192.0.2.33", &ip)); 136 IPEndPoint addr = IPEndPoint(ip, 1); 167 IPAddressNumber ip; local 168 CHECK(ParseIPLiteralToNumber("192.0.2.33", &ip)); 169 IPEndPoint addr = IPEndPoint(ip, 1);
|
/external/chromium_org/net/socket/ |
socks_client_socket.cc | 43 uint8 ip[4]; member in struct:net::SOCKS4ServerRequest 53 uint8 ip[4]; member in struct:net::SOCKS4ServerResponse 294 // falling back to SOCKS4a (since it can be confusing to see invalid IP 316 // more robust to try all the IP addresses we have before 319 CHECK_LE(endpoint.address().size(), sizeof(request.ip)); 320 memcpy(&request.ip, &endpoint.address()[0], endpoint.address().size());
|
/external/chromium_org/net/tools/quic/ |
end_to_end_test.cc | 120 net::IPAddressNumber ip; local 121 CHECK(net::ParseIPLiteralToNumber("127.0.0.1", &ip)); 122 server_address_ = IPEndPoint(ip, 0); 242 IPAddressNumber ip; local 243 CHECK(net::ParseIPLiteralToNumber("::1", &ip)); 244 server_address_ = IPEndPoint(ip, server_address_.port()); 603 IPAddressNumber ip; local 604 CHECK(net::ParseIPLiteralToNumber("127.0.0.2", &ip)); 605 self_address_ = IPEndPoint(ip, 0);
|
/external/chromium_org/ppapi/tests/ |
test_net_address_private.cc | 27 uint8_t ip[16]; local 29 ip[i * 2] = host[i] >> 8; 30 ip[i * 2 + 1] = host[i] & 0xff; 32 NetAddressPrivate::CreateFromIPv6Address(ip, scope_id, port, &addr);
|
/external/chromium_org/sandbox/linux/seccomp-bpf/ |
codegen.cc | 58 int ip = (int)(iter - program.begin()); local 59 fprintf(stderr, "%3d) ", ip); 90 fprintf(stderr, "JMP %d\n", ip + iter->k + 1); 98 ip + iter->jt + 1, ip + iter->jf + 1);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
nat_unittest.cc | 186 // The physical NAT tests require connectivity to the selected ip from the 188 // check to see if it's worth even trying with this ip. 225 // Find an available IP with matching family. The test breaks if int_addr 226 // can't talk to ip, so check for connectivity as well. 229 const IPAddress& ip = (*it)->ip(); local 230 if (ip.family() == int_addr.family() && TestConnectivity(int_addr, ip)) { 231 ext_addr2.SetIP(ip); 236 LOG(LS_WARNING) << "No available IP of same family as " << int_addr [all...] |