/external/android-clat/ |
H A D | checksum.c | 19 #include <netinet/ip.h> 107 * ip - the ipv4 header 110 uint32_t ipv4_pseudo_header_checksum(const struct iphdr *ip, uint16_t len) { argument 113 temp_protocol = htons(ip->protocol); 117 current = ip_checksum_add(current, &(ip->saddr), sizeof(uint32_t)); 118 current = ip_checksum_add(current, &(ip->daddr), sizeof(uint32_t));
|
H A D | clatd_test.cpp | 83 #define IPV4_PSEUDOHEADER(ip, tlen) \ 84 ip[12], ip[13], ip[14], ip[15], /* Source address */ \ 85 ip[16], ip[17], ip[18], ip[19], /* Destination address */ \ 86 0, ip[ 179 is_ipv4_fragment(struct iphdr *ip) argument 193 ipv4_fragment_offset(struct iphdr *ip) argument 209 struct iphdr *ip = (struct iphdr *) packet; local 288 struct iphdr *ip = NULL; local 402 struct iphdr *ip = (struct iphdr *) packet; local 522 struct iphdr *ip; local 821 uint8_t ip[] = { IPV4_UDP_HEADER }; local [all...] |
H A D | config.c | 240 * picks a free IPv4 address, starting from ip and trying all addresses in the prefix in order 241 * ip - the IP address from the configuration file 245 in_addr_t config_select_ipv4_address(const struct in_addr *ip, int16_t prefixlen) { argument 255 in_addr_t ipv4 = ntohl(ip->s_addr); 273 * generates the local ipv6 subnet when given the interface ip 275 * interface_ip - in: interface ip, out: local ipv6 host address
|
H A D | dump.c | 24 #include <netinet/ip.h> 39 /* print ip header */ 149 void dump_udp(const struct udphdr *udp, const struct iphdr *ip, argument 152 temp_checksum = ipv4_pseudo_header_checksum(ip, sizeof(*udp) + payload_size); 206 void dump_tcp(const struct tcphdr *tcp, const struct iphdr *ip, argument 211 temp_checksum = ipv4_pseudo_header_checksum(ip, sizeof(*tcp) + options_size + payload_size);
|
H A D | getaddr.c | 35 union anyip ip; member in struct:target 64 memcpy(&targ_p->ip.ip6, RTA_DATA(rta_p), rta_p->rta_len - sizeof(struct rtattr)); 71 memcpy(&targ_p->ip.ip4, RTA_DATA(rta_p), rta_p->rta_len - sizeof(struct rtattr)); 131 memcpy(retval, &targ.ip, sizeof(union anyip));
|
H A D | translate.c | 123 void fill_ip_header(struct iphdr *ip, uint16_t payload_len, uint8_t protocol, argument 126 memset(ip, 0, sizeof(struct iphdr)); 128 ip->ihl = 5; 129 ip->version = 4; 130 ip->tos = 0; 131 ip->tot_len = htons(sizeof(struct iphdr) + payload_len); 132 ip->id = 0; 133 ip->frag_off = htons(IP_DF); 134 ip->ttl = old_header->ip6_hlim; 135 ip [all...] |
/external/antlr/antlr-3.4/lib/ |
H A D | antlr-3.4-complete.jar | META-INF/ META-INF/MANIFEST.MF org/ org/antlr/ org/antlr/analysis/ org/antlr/codegen/ org/ ... |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | GeneralName.java | 264 private byte[] toGeneralNameEncoding(String ip) argument 266 if (IPAddress.isValidIPv6WithNetmask(ip) || IPAddress.isValidIPv6(ip)) 268 int slashIndex = ip.indexOf('/'); 273 int[] parsedIp = parseIPv6(ip); 281 int[] parsedIp = parseIPv6(ip.substring(0, slashIndex)); 283 String mask = ip.substring(slashIndex + 1); 297 else if (IPAddress.isValidIPv4WithNetmask(ip) || IPAddress.isValidIPv4(ip)) 299 int slashIndex = ip 342 parseIPv4(String ip, byte[] addr, int offset) argument 374 parseIPv6(String ip) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXNameConstraintValidator.java | 266 * <code>permitted</code> with <code>ip</code>. 272 * <code>ip</code>. 279 byte[] ip = ASN1OctetString.getInstance( 283 if (ip != null) 285 intersect.add(ip); 294 intersect.addAll(intersectIPRange(_permitted, ip)); 303 * with <code>ip</code>. 307 * @param ip The IP address with its subnet mask. 309 * <code>ip</code> as byte arrays. 311 private Set unionIP(Set excluded, byte[] ip) argument 406 ipWithSubnetMask(byte[] ip, byte[] subnetMask) argument 540 checkPermittedIP(Set permitted, byte[] ip) argument 577 checkExcludedIP(Set excluded, byte[] ip) argument 609 isIPConstrained(byte ip[], byte[] constraint) argument 1837 stringifyIP(byte[] ip) argument [all...] |
/external/chromium_org/base/debug/ |
H A D | stack_trace_android.cc | 37 uintptr_t ip = _Unwind_GetIP(context); local 40 if (ip != 0 && !state->have_skipped_self) { 45 state->frames[state->frame_count++] = ip;
|
/external/chromium_org/base/files/ |
H A D | file_util_posix.cc | 755 std::vector<FilePath::StringType>::const_iterator ib, ip; local 756 for (ib = base_components.begin(), ip = path_components.begin(); 757 ib != base_components.end(); ++ib, ++ip) { 761 DCHECK(ip != path_components.end()); 762 DCHECK(*ip == *ib); 769 for (; ip != path_components.end(); ++ip) { 770 current_path = current_path.Append(*ip);
|
/external/chromium_org/chrome/browser/ |
H A D | browser_process_impl.cc | 667 const std::string& ip, 675 new RemoteDebuggingServer(host_desktop_type, ip, port)); 665 CreateDevToolsHttpProtocolHandler( chrome::HostDesktopType host_desktop_type, const std::string& ip, int port) argument
|
/external/chromium_org/chrome/browser/devtools/ |
H A D | remote_debugging_server.cc | 37 const std::string& ip, 49 new TCPServerSocketFactory(ip, port, 1)); 35 RemoteDebuggingServer( chrome::HostDesktopType host_desktop_type, const std::string& ip, int port) argument
|
/external/chromium_org/chrome/browser/extensions/api/diagnostics/ |
H A D | diagnostics_api.cc | 34 const std::string& ip, 39 result.ip = ip; 32 OnCompleted( SendPacketResultCode result_code, const std::string& ip, double latency) argument
|
H A D | diagnostics_api_chromeos.cc | 27 const std::string& ip, 32 std::string* ip, 53 *ip = iterator.key(); 61 std::string ip; local 63 if (!succeeded || !ParseResult(status, &ip, &latency)) { 67 ip, 86 parameters_->options.ip, config, 31 ParseResult(const std::string& status, std::string* ip, double* latency) argument
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | browser_feature_extractor.cc | 86 static void AddMalwareIpUrlInfo(const std::string& ip, argument 94 // We add the information about url on the bad ip. 95 urlinfo->set_ip(ip); 101 DVLOG(2) << "Added url info for bad ip: " << ip;
|
H A D | browser_feature_extractor_unittest.cc | 202 (*urls)[urlinfo.ip()].insert(urlinfo.url()); 646 std::string ip = base::StringPrintf("%d.%d.%d.%d", i, i, i, i); local 647 ips.push_back(ip); 648 browse_info_->ips.insert(std::make_pair(ip, bad_urls)); 650 // First ip is good but all the others are bad. 651 EXPECT_CALL(*db_manager_, MatchMalwareIP(ip)).WillOnce(Return(i > 0));
|
H A D | client_side_detection_host.cc | 681 void ClientSideDetectionHost::UpdateIPUrlMap(const std::string& ip, argument 686 if (ip.empty() || url.empty()) 689 IPUrlMap::iterator it = browse_info_->ips.find(ip); 694 browse_info_->ips.insert(make_pair(ip, url_infos)); 711 UpdateIPUrlMap(req->socket_address.host() /* ip */,
|
H A D | client_side_detection_host_unittest.cc | 78 if (other.bad_ip_url_info(i).ip() != arg.bad_ip_url_info(i).ip() || 252 void UpdateIPUrlMap(const std::string& ip, const std::string& host) { argument 253 csd_host_->UpdateIPUrlMap(ip, host, "", "", content::RESOURCE_TYPE_OBJECT); 848 // Add more urls for this ip, it exceeds max limit and won't be added 857 std::string ip = base::StringPrintf("%d.%d.%d.256", i, i, i); local 861 UpdateIPUrlMap(ip, "test.com/"); 862 ASSERT_EQ(1U, browse_info->ips[ip].size()); 864 browse_info->ips[ip]); 868 // Exceeding max ip limi [all...] |
/external/chromium_org/chrome/renderer/extensions/ |
H A D | cast_streaming_native_handler.cc | 457 net::IPAddressNumber ip; local 458 if (!net::ParseIPLiteralToNumber(destination->address, &ip)) { 463 transport->SetDestination(net::IPEndPoint(ip, destination->port));
|
/external/chromium_org/chrome/test/base/ |
H A D | testing_browser_process.cc | 251 const std::string& ip, 249 CreateDevToolsHttpProtocolHandler( chrome::HostDesktopType host_desktop_type, const std::string& ip, int port) argument
|
/external/chromium_org/cloud_print/gcp20/prototype/ |
H A D | printer.cc | 136 net::IPAddressNumber ip = GetLocalIp("", false); local 137 if (!ip.empty()) 138 result += " at " + net::IPAddressToString(ip);
|
/external/chromium_org/content/browser/renderer_host/p2p/ |
H A D | socket_host_test_utils.cc | 208 net::IPAddressNumber ip; local 209 EXPECT_TRUE(net::ParseIPLiteralToNumber(ip_str, &ip)); 210 return net::IPEndPoint(ip, port);
|
/external/chromium_org/extensions/browser/api/cast_channel/ |
H A D | logger.cc | 130 const net::IPAddressNumber& ip = cast_socket.ip_endpoint().address(); local 131 aggregated_socket_event.set_endpoint_id(ip.back());
|
/external/chromium_org/extensions/browser/api/socket/ |
H A D | udp_socket.cc | 226 std::string ip; local 229 IPEndPointToStringAndPort(address->data, &ip, &port); 231 recv_from_callback_.Run(result, io_buffer, ip, port); 244 net::IPAddressNumber ip; local 245 if (!net::ParseIPLiteralToNumber(address, &ip)) 248 std::string normalized_address = net::IPAddressToString(ip); 254 int rv = socket_.JoinGroup(ip); 261 net::IPAddressNumber ip; local 262 if (!net::ParseIPLiteralToNumber(address, &ip)) 265 std::string normalized_address = net::IPAddressToString(ip); [all...] |