/third_party/iptables/extensions/ |
D | libebt_ip6.t | 2 -p ip6 --ip6-src ! dead::beef/64 -j ACCEPT;-p IPv6 --ip6-src ! dead::/64 -j ACCEPT;OK 3 -p IPv6 --ip6-dst dead:beef::/64 -j ACCEPT;=;OK 4 -p IPv6 --ip6-dst f00:ba::;=;OK 5 -p IPv6 --ip6-tclass 0xFF;=;OK 6 -p IPv6 --ip6-proto tcp --ip6-dport 22;=;OK 7 -p IPv6 --ip6-proto tcp --ip6-dport ! 22;=;OK 8 -p IPv6 --ip6-proto udp --ip6-sport 1024:65535;=;OK 9 -p IPv6 --ip6-proto 253;=;OK 10 -p IPv6 --ip6-proto ipv6-icmp --ip6-icmp-type echo-request -j CONTINUE;=;OK 11 -p IPv6 --ip6-proto ipv6-icmp --ip6-icmp-type echo-request;=;OK [all …]
|
D | libebt_ip6.txlate | 1 ebtables-translate -A FORWARD -p ip6 --ip6-src ! dead::beef/64 -j ACCEPT 2 nft add rule bridge filter FORWARD ip6 saddr != dead::/64 counter accept 4 ebtables-translate -A FORWARD -p ip6 ! --ip6-dst dead:beef::/64 -j ACCEPT 5 nft add rule bridge filter FORWARD ip6 daddr != dead:beef::/64 counter accept 7 ebtables-translate -I FORWARD -p ip6 --ip6-dst f00:ba:: 8 nft insert rule bridge filter FORWARD ip6 daddr f00:ba:: counter 10 ebtables-translate -I OUTPUT -o eth0 -p ip6 --ip6-tclass 0xff 11 nft insert rule bridge filter OUTPUT oifname "eth0" ip6 dscp 0x3f counter 13 ebtables-translate -A FORWARD -p ip6 --ip6-proto tcp --ip6-dport 22 14 nft add rule bridge filter FORWARD ether type ip6 tcp dport 22 counter [all …]
|
D | libxt_TOS.txlate | 2 nft add rule ip6 filter INPUT counter ip6 dscp set 0x07 5 nft add rule ip6 filter INPUT counter ip6 dscp set 0x3f 8 nft add rule ip6 filter INPUT counter ip6 dscp set 0x04 11 nft add rule ip6 filter INPUT counter ip6 dscp set 0x00 14 nft add rule ip6 filter INPUT counter ip6 dscp set 0x00 17 nft add rule ip6 filter INPUT counter ip6 dscp set 0x00 20 nft add rule ip6 filter INPUT counter ip6 dscp set 0x04 23 nft add rule ip6 filter INPUT counter ip6 dscp set 0x04
|
D | libip6t_NETMAP.c | 45 range->min_addr.ip6[i] = cb->val.haddr.ip6[i] & in NETMAP_parse() 46 cb->val.hmask.ip6[i]; in NETMAP_parse() 47 range->max_addr.ip6[i] = range->min_addr.ip6[i] | in NETMAP_parse() 48 ~cb->val.hmask.ip6[i]; in NETMAP_parse() 63 a.s6_addr32[i] = ~(r->min_addr.ip6[i] ^ r->max_addr.ip6[i]); in __NETMAP_print()
|
D | libip6t_ah.txlate | 2 nft add rule ip6 filter INPUT ah spi 500 counter drop 5 nft add rule ip6 filter INPUT ah spi 500-550 counter drop 8 nft add rule ip6 filter INPUT ah hdrlength != 120 counter 11 nft add rule ip6 filter INPUT ah reserved 1 counter 14 nft add rule ip6 filter INPUT ah spi 500 ah hdrlength != 120 counter drop 17 nft add rule ip6 filter INPUT ah spi 500 ah hdrlength 120 ah reserved 1 counter accept
|
D | libip6t_frag.txlate | 2 nft add rule ip6 filter INPUT frag id 100-200 counter accept 5 nft add rule ip6 filter INPUT frag id 100 frag reserved 1 frag more-fragments 1 counter accept 8 nft add rule ip6 filter INPUT frag id != 100-200 counter accept 11 nft add rule ip6 filter INPUT frag id 100-200 frag more-fragments 0 counter accept 14 nft add rule ip6 filter INPUT frag id 100-200 frag frag-off 0 counter accept 17 nft add rule ip6 filter INPUT frag more-fragments 0 counter accept
|
D | libip6t_hl.txlate | 2 nft add rule ip6 nat postrouting ip6 hoplimit gt 3 counter 5 nft add rule ip6 nat postrouting ip6 hoplimit != 3 counter
|
D | libip6t_rt.txlate | 2 nft add rule ip6 filter INPUT rt type 0 counter drop 5 nft add rule ip6 filter INPUT rt hdrlength != 22 counter drop 8 nft add rule ip6 filter INPUT rt seg-left 26 counter accept 11 nft add rule ip6 filter INPUT rt type 0 rt hdrlength 22 counter drop 14 nft add rule ip6 filter INPUT rt type 0 rt seg-left != 26 rt hdrlength 22 counter accept
|
D | libxt_iprange.txlate | 11 nft add rule ip6 filter INPUT ip6 daddr != ::2d01-::2d03 counter accept 14 nft add rule ip6 filter INPUT ip6 saddr ::2d01-::2d03 ip6 daddr != ::2d01-::2d03 counter accept
|
D | libebt_log.t | 5 --log-level emerg --log-ip --log-arp --log-ip6;--log-level emerg --log-prefix "" --log-ip --log-arp… 6 …vel crit --log-ip --log-arp --log-ip6 --log-prefix foo;--log-level crit --log-prefix "foo" --log-i…
|
D | libip6t_DNAT.txlate | 2 nft add rule ip6 nat prerouting iifname "eth1" tcp dport 8080 counter dnat to [fec0::1234]:80 5 nft add rule ip6 nat prerouting meta l4proto tcp counter dnat to [fec0::1234]:1-20 8 nft add rule ip6 nat prerouting meta l4proto tcp counter dnat to [fec0::1234]:80 persistent 11 nft add rule ip6 nat prerouting meta l4proto tcp counter dnat to [fec0::1234]:80 random,persistent
|
D | libip6t_SNAT.txlate | 2 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:80 5 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:1-20 8 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:123 r… 11 nft add rule ip6 nat postrouting oifname "eth0" meta l4proto tcp counter snat to [fec0::1234]:123 f…
|
D | libip6t_MASQUERADE.txlate | 2 nft add rule ip6 nat POSTROUTING counter masquerade 5 nft add rule ip6 nat POSTROUTING meta l4proto tcp counter masquerade to :10 8 nft add rule ip6 nat POSTROUTING meta l4proto tcp counter masquerade to :10-20 random
|
D | libip6t_REJECT.txlate | 2 nft add rule ip6 filter FORWARD tcp dport 22 counter reject 5 nft add rule ip6 filter FORWARD tcp dport 22 counter reject with icmpv6 type reject-route 8 nft add rule ip6 filter FORWARD tcp dport 22 counter reject with tcp reset
|
D | libip6t_icmp6.txlate | 2 nft add rule ip6 filter INPUT icmpv6 type destination-unreachable counter log 5 nft add rule ip6 filter INPUT icmpv6 type nd-neighbor-advert counter log 8 nft add rule ip6 filter INPUT icmpv6 type != packet-too-big counter log
|
D | libip6t_hbh.txlate | 2 nft add rule ip6 filter INPUT hbh hdrlength 22 counter 5 nft add rule ip6 filter INPUT hbh hdrlength != 22 counter
|
D | libxt_DSCP.txlate | 5 nft add rule ip6 filter OUTPUT counter ip6 dscp set 0x06
|
D | libxt_dscp.txlate | 5 nft add rule ip6 filter INPUT ip6 dscp != 0x32 counter accept
|
D | libip6t_mh.txlate | 2 nft add rule ip6 filter INPUT meta l4proto mobility-header mh type 1 counter accept 5 nft add rule ip6 filter INPUT meta l4proto mobility-header mh type 1-3 counter accept
|
/third_party/lwip/src/core/ipv6/ |
D | ip6.c | 374 IP6_STATS_INC(ip6.rterr); in ip6_forward() 375 IP6_STATS_INC(ip6.drop); in ip6_forward() 397 IP6_STATS_INC(ip6.rterr); in ip6_forward() 398 IP6_STATS_INC(ip6.drop); in ip6_forward() 410 IP6_STATS_INC(ip6.rterr); in ip6_forward() 411 IP6_STATS_INC(ip6.drop); in ip6_forward() 419 IP6_STATS_INC(ip6.rterr); in ip6_forward() 420 IP6_STATS_INC(ip6.drop); in ip6_forward() 434 IP6_STATS_INC(ip6.drop); in ip6_forward() 445 IP6_STATS_INC(ip6.drop); in ip6_forward() [all …]
|
/third_party/ltp/testcases/network/sctp/ |
D | sctp_big_chunk.c | 59 struct ip6_hdr ip6; in setup_client() local 60 const size_t ip6_hdr_len = sizeof(ip6); in setup_client() 65 memset(&ip6, 0, sizeof(ip6)); in setup_client() 66 ip6.ip6_flow = htonl(6 << 28 | 2 << 20); in setup_client() 67 ip6.ip6_hops = 64; in setup_client() 68 ip6.ip6_nxt = IPPROTO_SCTP; in setup_client() 69 ip6.ip6_src.s6_addr[15] = 1; in setup_client() 70 ip6.ip6_dst.s6_addr[15] = 1; in setup_client() 129 ip6.ip6_plen = htons(pkt_len - ip6_hdr_len); in setup_client() 130 memcpy(packet, &ip6, ip6_hdr_len); in setup_client()
|
/third_party/libnl/etc/ |
D | pktloc | 29 ip6.version u8 net+0 0xF0 4 30 ip6.tc u16 net+0 0xFF0 4 31 ip6.flowlabel u32 net+0 0xFFFFF 32 ip6.length u16 net+4 33 ip6.nexthdr u8 net+6 34 ip6.hoplimit u8 net+7 35 ip6.src 16 net+8 36 ip6.dst 16 net+24
|
/third_party/curl/tests/data/ |
D | test241 | 33 HTTP-IPv6 GET (using ip6-localhost) 36 -g "http://ip6-localhost:%HTTP6PORT/%TESTNUMBER" 39 ./server/resolve --ipv6 ip6-localhost 48 Host: ip6-localhost:%HTTP6PORT
|
D | test1083 | 36 HTTP-IPv6 GET with ip6-localhost --interface 39 -g "http://%HOST6IP:%HTTP6PORT/%TESTNUMBER" --interface ip6-localhost 42 …es default test client host address';} else {exec './server/resolve --ipv6 ip6-localhost'; print '…
|
/third_party/ltp/testcases/lib/ |
D | tst_net_vars.c | 127 const struct in6_addr *mask, const struct in6_addr *ip6) in is_in_subnet_ipv6() argument 132 if (((((int *) ip6)[i] & ((int *) mask)[i])) != in is_in_subnet_ipv6() 261 static char *get_ipv6_net32_unused(const struct in6_addr *ip6, in get_ipv6_net32_unused() argument 287 if (!is_in_subnet_ipv6(ip6, &mask, &network)) in get_ipv6_net32_unused() 294 (rand() % 128) + (ip6->s6_addr[1] < 128 ? 128 : 0), in get_ipv6_net32_unused() 300 if (!is_in_subnet_ipv6(ip6, &mask, &network)) in get_ipv6_net32_unused() 305 256 * (rand() % 128) + (256 * ip6->s6_addr[0] < 128 ? in get_ipv6_net32_unused() 311 if (!is_in_subnet_ipv6(ip6, &mask, &network)) in get_ipv6_net32_unused() 577 struct in6_addr ip6; in main() local 594 tst_get_in6_addr(lip_str, &ip6); in main() [all …]
|