History log of /external/android-clat/dns64.c
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
cdc003dc8a8ffb418f33518ac545016e6991534a 30-Mar-2018 Erik Kline <ek@google.com> When manipulating flags, |= rather than +=

Test: as follows
- builds
- flashes
- boots
- runtest -x external/android-clat/clatd_test.cpp passes
Bug: 64133961
Bug: 72345192

Merged-In: I10367d3b83acce55e3492812fd04cbdf5f0e6e1a
Merged-In: I5c13652a2c79c07318cc20311c9666535df91d7d
Change-Id: Ieb46fa6a158ec7470e261cc6e9345a3266c81a04
(cherry picked from commit f1c79f8dac61141a518b87361cfef0619e3ef49e)
/external/android-clat/dns64.c
eb5c05baea931ebe37f3fc161e231b7fc56f2aaa 29-Mar-2018 Erik Kline <ek@google.com> Resolve DNS64 hostname with Private DNS bypass

Test: as follows
- builds
- flashes
- boots
- runtest -x external/android-clat/clatd_test.cpp passes
Bug: 64133961
Bug: 72345192

Merged-In: I0b70f1655c9a202905a30838b002c9482898d506
Merged-In: I45214f0a04623012187168d9319babc98eb396de
Change-Id: If5238d0cdf27cb4cd689e1ff1ff776bc638d5a7b
(cherry picked from commit 0b1d19ca5f77aa99fee2f390c76c40c9bfcef8b4)
/external/android-clat/dns64.c
89f49ae6d7ddde7a765cce7ecd5006ecf97e8754 22-Sep-2014 Erik Kline <ek@google.com> Simplify and always retry DNS64 prefix discovery.

- Only request AAAAs for the IPv4-only hostname, since that's
all the information being used. Perhaps at some point in the
future when _validation_ of the IPv4 address(es)'s presence
within the IPv6 address(es) is being done this should be
revisited.

- Only use the first AAAA returned to find the DNS64 prefix.
It's not clear how to properly resolve any potential DNS64
prefix conflicts anyway.

- Re-try DNS64 prefix discovery on any type of error.
If clatd was started (presumably an IPv6-only network), retry
DNS64 prefix discovery with exponential backoff. Some
"permanent" errors can be indistinguishable from transient
errors (e.g. receiving an erroneous SERVFAIL from a DNS
resolver, ...).

- Fix-up back-off logic to not sleep 128 then 120, 120, ...
:-)

Bug: 17569702
Change-Id: I226ea7772cd7c88d2b60153ef76e5435400e11aa
/external/android-clat/dns64.c
247dd7199b4e89c6a974794056b468bfac5f0e51 30-May-2014 Paul Jensen <pauljensen@google.com> Make DNS request for plat prefix detection network specific.

When plat prefix detection is done on a non-default network it
must use the network specific version of getaddrinfo() so the
plat prefix corresponds to the particular network. The network
is specified to clatd via a NetID command line argument.

(cherry picked from commit a1c871c8efad6c0b69e27d3b85e82a27e282b8be)

Change-Id: I270c5afc4b445cf20e95fd3e58eada6bc24b16ef
/external/android-clat/dns64.c
baf62997b598ac38a99fd30419ccf7c109ffb3bc 01-Mar-2013 Lorenzo Colitti <lorenzo@google.com> Make clatd a bit more robust when started by netd.

1. When started from netd, DNS lookups (used to detect the NAT64
prefix) fail because ANDROID_DNS_MODE=local. Unset it.
2. Only add the SIGTERM handler just before starting the event
loop. Otherwise, if clatd hangs before the event loop is
started (e.g., when #1 happens), it can't be stopped.

While I'm at it, add a couple of logging statements.

Change-Id: Ie24b37e34b729ce6cd3769b5d64348f2c1b9627d
/external/android-clat/dns64.c
a45056e35c1af2a0f0a6eed258fd5fdf4846a79f 23-Mar-2012 Daniel Drown <dan-android@drown.org> android clat service

This software provides the nat 4->6 translation needed for the "clat" part of
the 464xlat standard. It is needed for better IPv4 application support while
on an IPv6-only mobile network connection using 464xlat's nat64 (such as
T-Mobile's IPv6 trial).

A general diagram of how 464xlat works:
http://dan.drown.org/android/clat/Clat-Plat.png

Depends-on: I2392f8127dcd90d16b0f20ff31bcc5aa096db464
Change-Id: If2bc6916fc66fd4bca7cc241c83cfae839b82e15
Signed-off-by: Daniel Drown <dan-android@drown.org>
/external/android-clat/dns64.c