Home
last modified time | relevance | path

Searched refs:ip6 (Results 1 – 25 of 73) sorted by relevance

123

/third_party/iptables/extensions/
Dlibebt_ip6.t2 -p ip6 --ip6-src ! dead::beef/64 -j ACCEPT;-p IPv6 --ip6-src ! dead::/64 -j ACCEPT;OK
3 -p IPv6 --ip6-dst dead:beef::/64 -j ACCEPT;=;OK
4 -p IPv6 --ip6-dst f00:ba::;=;OK
5 -p IPv6 --ip6-tclass 0xFF;=;OK
6 -p IPv6 --ip6-proto tcp --ip6-dport 22;=;OK
7 -p IPv6 --ip6-proto tcp --ip6-dport ! 22;=;OK
8 -p IPv6 --ip6-proto udp --ip6-sport 1024:65535;=;OK
9 -p IPv6 --ip6-proto 253;=;OK
10 -p IPv6 --ip6-proto ipv6-icmp --ip6-icmp-type echo-request -j CONTINUE;=;OK
11 -p IPv6 --ip6-proto ipv6-icmp --ip6-icmp-type echo-request;=;OK
[all …]
Dlibebt_ip6.txlate1 ebtables-translate -A FORWARD -p ip6 --ip6-src ! dead::beef/64 -j ACCEPT
2 nft add rule bridge filter FORWARD ip6 saddr != dead::/64 counter accept
4 ebtables-translate -A FORWARD -p ip6 ! --ip6-dst dead:beef::/64 -j ACCEPT
5 nft add rule bridge filter FORWARD ip6 daddr != dead:beef::/64 counter accept
7 ebtables-translate -I FORWARD -p ip6 --ip6-dst f00:ba::
8 nft insert rule bridge filter FORWARD ip6 daddr f00:ba:: counter
10 ebtables-translate -I OUTPUT -o eth0 -p ip6 --ip6-tclass 0xff
11 nft insert rule bridge filter OUTPUT oifname "eth0" ip6 dscp 0x3f counter
13 ebtables-translate -A FORWARD -p ip6 --ip6-proto tcp --ip6-dport 22
14 nft add rule bridge filter FORWARD ether type ip6 tcp dport 22 counter
[all …]
Dlibxt_TOS.txlate2 nft add rule ip6 filter INPUT counter ip6 dscp set 0x07
5 nft add rule ip6 filter INPUT counter ip6 dscp set 0x3f
8 nft add rule ip6 filter INPUT counter ip6 dscp set 0x04
11 nft add rule ip6 filter INPUT counter ip6 dscp set 0x00
14 nft add rule ip6 filter INPUT counter ip6 dscp set 0x00
17 nft add rule ip6 filter INPUT counter ip6 dscp set 0x00
20 nft add rule ip6 filter INPUT counter ip6 dscp set 0x04
23 nft add rule ip6 filter INPUT counter ip6 dscp set 0x04
Dlibip6t_NETMAP.c45 range->min_addr.ip6[i] = cb->val.haddr.ip6[i] & in NETMAP_parse()
46 cb->val.hmask.ip6[i]; in NETMAP_parse()
47 range->max_addr.ip6[i] = range->min_addr.ip6[i] | in NETMAP_parse()
48 ~cb->val.hmask.ip6[i]; in NETMAP_parse()
63 a.s6_addr32[i] = ~(r->min_addr.ip6[i] ^ r->max_addr.ip6[i]); in __NETMAP_print()
Dlibip6t_ah.txlate2 nft add rule ip6 filter INPUT ah spi 500 counter drop
5 nft add rule ip6 filter INPUT ah spi 500-550 counter drop
8 nft add rule ip6 filter INPUT ah hdrlength != 120 counter
11 nft add rule ip6 filter INPUT ah reserved 1 counter
14 nft add rule ip6 filter INPUT ah spi 500 ah hdrlength != 120 counter drop
17 nft add rule ip6 filter INPUT ah spi 500 ah hdrlength 120 ah reserved 1 counter accept
Dlibip6t_frag.txlate2 nft add rule ip6 filter INPUT frag id 100-200 counter accept
5 nft add rule ip6 filter INPUT frag id 100 frag reserved 1 frag more-fragments 1 counter accept
8 nft add rule ip6 filter INPUT frag id != 100-200 counter accept
11 nft add rule ip6 filter INPUT frag id 100-200 frag more-fragments 0 counter accept
14 nft add rule ip6 filter INPUT frag id 100-200 frag frag-off 0 counter accept
17 nft add rule ip6 filter INPUT frag more-fragments 0 counter accept
Dlibip6t_hl.txlate2 nft add rule ip6 nat postrouting ip6 hoplimit gt 3 counter
5 nft add rule ip6 nat postrouting ip6 hoplimit != 3 counter
Dlibip6t_rt.txlate2 nft add rule ip6 filter INPUT rt type 0 counter drop
5 nft add rule ip6 filter INPUT rt hdrlength != 22 counter drop
8 nft add rule ip6 filter INPUT rt seg-left 26 counter accept
11 nft add rule ip6 filter INPUT rt type 0 rt hdrlength 22 counter drop
14 nft add rule ip6 filter INPUT rt type 0 rt seg-left != 26 rt hdrlength 22 counter accept
Dlibxt_iprange.txlate11 nft add rule ip6 filter INPUT ip6 daddr != ::2d01-::2d03 counter accept
14 nft add rule ip6 filter INPUT ip6 saddr ::2d01-::2d03 ip6 daddr != ::2d01-::2d03 counter accept
Dlibebt_log.t5 --log-level emerg --log-ip --log-arp --log-ip6;--log-level emerg --log-prefix "" --log-ip --log-arp…
6 …vel crit --log-ip --log-arp --log-ip6 --log-prefix foo;--log-level crit --log-prefix "foo" --log-i…
Dlibip6t_DNAT.txlate2 nft add rule ip6 nat prerouting iifname "eth1" tcp dport 8080 counter dnat to [fec0::1234]:80
5 nft add rule ip6 nat prerouting meta l4proto tcp counter dnat to [fec0::1234]:1-20
8 nft add rule ip6 nat prerouting meta l4proto tcp counter dnat to [fec0::1234]:80 persistent
11 nft add rule ip6 nat prerouting meta l4proto tcp counter dnat to [fec0::1234]:80 random,persistent
Dlibip6t_SNAT.txlate2 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:80
5 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:1-20
8 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:123 r…
11 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:123 f…
Dlibip6t_MASQUERADE.txlate2 nft add rule ip6 nat POSTROUTING counter masquerade
5 nft add rule ip6 nat POSTROUTING meta l4proto tcp counter masquerade to :10
8 nft add rule ip6 nat POSTROUTING meta l4proto tcp counter masquerade to :10-20 random
Dlibip6t_REJECT.txlate2 nft add rule ip6 filter FORWARD tcp dport 22 counter reject
5 nft add rule ip6 filter FORWARD tcp dport 22 counter reject with icmpv6 type reject-route
8 nft add rule ip6 filter FORWARD tcp dport 22 counter reject with tcp reset
Dlibip6t_icmp6.txlate2 nft add rule ip6 filter INPUT icmpv6 type destination-unreachable counter log
5 nft add rule ip6 filter INPUT icmpv6 type nd-neighbor-advert counter log
8 nft add rule ip6 filter INPUT icmpv6 type != packet-too-big counter log
Dlibip6t_hbh.txlate2 nft add rule ip6 filter INPUT hbh hdrlength 22 counter
5 nft add rule ip6 filter INPUT hbh hdrlength != 22 counter
Dlibxt_DSCP.txlate5 nft add rule ip6 filter OUTPUT counter ip6 dscp set 0x06
Dlibxt_dscp.txlate5 nft add rule ip6 filter INPUT ip6 dscp != 0x32 counter accept
Dlibip6t_mh.txlate2 nft add rule ip6 filter INPUT meta l4proto mobility-header mh type 1 counter accept
5 nft add rule ip6 filter INPUT meta l4proto mobility-header mh type 1-3 counter accept
/third_party/lwip/src/core/ipv6/
Dip6.c374 IP6_STATS_INC(ip6.rterr); in ip6_forward()
375 IP6_STATS_INC(ip6.drop); in ip6_forward()
397 IP6_STATS_INC(ip6.rterr); in ip6_forward()
398 IP6_STATS_INC(ip6.drop); in ip6_forward()
410 IP6_STATS_INC(ip6.rterr); in ip6_forward()
411 IP6_STATS_INC(ip6.drop); in ip6_forward()
419 IP6_STATS_INC(ip6.rterr); in ip6_forward()
420 IP6_STATS_INC(ip6.drop); in ip6_forward()
434 IP6_STATS_INC(ip6.drop); in ip6_forward()
445 IP6_STATS_INC(ip6.drop); in ip6_forward()
[all …]
/third_party/ltp/testcases/network/sctp/
Dsctp_big_chunk.c59 struct ip6_hdr ip6; in setup_client() local
60 const size_t ip6_hdr_len = sizeof(ip6); in setup_client()
65 memset(&ip6, 0, sizeof(ip6)); in setup_client()
66 ip6.ip6_flow = htonl(6 << 28 | 2 << 20); in setup_client()
67 ip6.ip6_hops = 64; in setup_client()
68 ip6.ip6_nxt = IPPROTO_SCTP; in setup_client()
69 ip6.ip6_src.s6_addr[15] = 1; in setup_client()
70 ip6.ip6_dst.s6_addr[15] = 1; in setup_client()
129 ip6.ip6_plen = htons(pkt_len - ip6_hdr_len); in setup_client()
130 memcpy(packet, &ip6, ip6_hdr_len); in setup_client()
/third_party/libnl/etc/
Dpktloc29 ip6.version u8 net+0 0xF0 4
30 ip6.tc u16 net+0 0xFF0 4
31 ip6.flowlabel u32 net+0 0xFFFFF
32 ip6.length u16 net+4
33 ip6.nexthdr u8 net+6
34 ip6.hoplimit u8 net+7
35 ip6.src 16 net+8
36 ip6.dst 16 net+24
/third_party/curl/tests/data/
Dtest24133 HTTP-IPv6 GET (using ip6-localhost)
36 -g "http://ip6-localhost:%HTTP6PORT/%TESTNUMBER"
39 ./server/resolve --ipv6 ip6-localhost
48 Host: ip6-localhost:%HTTP6PORT
Dtest108336 HTTP-IPv6 GET with ip6-localhost --interface
39 -g "http://%HOST6IP:%HTTP6PORT/%TESTNUMBER" --interface ip6-localhost
42 …es default test client host address';} else {exec './server/resolve --ipv6 ip6-localhost'; print '…
/third_party/ltp/testcases/lib/
Dtst_net_vars.c127 const struct in6_addr *mask, const struct in6_addr *ip6) in is_in_subnet_ipv6() argument
132 if (((((int *) ip6)[i] & ((int *) mask)[i])) != in is_in_subnet_ipv6()
261 static char *get_ipv6_net32_unused(const struct in6_addr *ip6, in get_ipv6_net32_unused() argument
287 if (!is_in_subnet_ipv6(ip6, &mask, &network)) in get_ipv6_net32_unused()
294 (rand() % 128) + (ip6->s6_addr[1] < 128 ? 128 : 0), in get_ipv6_net32_unused()
300 if (!is_in_subnet_ipv6(ip6, &mask, &network)) in get_ipv6_net32_unused()
305 256 * (rand() % 128) + (256 * ip6->s6_addr[0] < 128 ? in get_ipv6_net32_unused()
311 if (!is_in_subnet_ipv6(ip6, &mask, &network)) in get_ipv6_net32_unused()
577 struct in6_addr ip6; in main() local
594 tst_get_in6_addr(lip_str, &ip6); in main()
[all …]

123