Home
last modified time | relevance | path

Searched refs:gateway (Results 1 – 25 of 60) sorted by relevance

123

/external/ltp/testcases/network/stress/route/
Droute6-change-if240 gateway="${IPV6_NETWORK_PRE}:${link_num}:${RHOST_IPV6_HOST}"
243 route -A inet6 add ${dst_network}/64 gw $gateway dev $lhost_ifname
246 ip -f inet6 route add ${dst_network}/64 via $gateway dev $lhost_ifname
266 pre_gateway=$gateway
270 gateway="${IPV6_NETWORK_PRE}:${link_num}:${RHOST_IPV6_HOST}"
274 route -A inet6 add ${dst_network}/64 gw $gateway dev $lhost_ifname
278 ip -f inet6 route add ${dst_network}/64 via $gateway dev $lhost_ifname
283 tst_resm TFAIL "Failed to change the gateway to $gateway"
Droute4-change-if242 gateway="${IPV4_NETWORK_PRE}.${link_num}.${RHOST_IPV4_HOST}"
245 route add -net $dst_network netmask 255.255.255.0 gw $gateway dev $lhost_ifname
248 ip route add ${dst_network}/24 via $gateway dev $lhost_ifname
268 pre_gateway=$gateway
272 gateway="${IPV4_NETWORK_PRE}.${link_num}.${RHOST_IPV4_HOST}"
276 route add -net $dst_network netmask 255.255.255.0 gw $gateway dev $lhost_ifname
280 ip route change ${dst_network}/24 via $gateway dev $lhost_ifname
284 tst_resm TFAIL "Failed to change the gateway to $gateway"
D00_Descriptions.txt10 Verify the kernel is not crashed when the gateway of an IPv4 route is
14 Verify the kernel is not crashed when the gateway of an IPv4 route is
47 Verify the kernel is not crashed when the gateway of an IPv6 route is
51 Verify the kernel is not crashed when the gateway of an IPv6 route is
/external/ipsec-tools/src/racoon/samples/roadwarrior/
DREADME3 gateway authenticates to the client using a certificate, and the client
4 authenticates to the VPN gateway using a login and a password.
8 internal address, netmask and DNS from the VPN gateway.
17 The first server setup, in server/racoon.conf, is for a VPN gateway
44 certificate authority that signed the VPN gateway certificate in
49 racoonctl vc -u username vpn-gateway.example.net
51 Where username is your login, and vpn-gateway.example.net is
52 the DNS or IP address of the VPN gateway. racoonctl will prompt
64 racoonctl vd vpn-gateway.example.net
/external/autotest/client/cros/
Dbackchannel.py35 self.gateway = None
78 self.gateway, self.interface = line.strip().split(' ')
99 self.gateway)
104 logging.info('Waiting for route to gateway %s', self.gateway)
130 if self.gateway:
132 self.gateway)
215 dest = self.gateway
Drouting.py32 self.gateway = gway
49 self._intToIp(self.gateway),
98 gateway = route[col_map["Gateway"]]
101 routes.append(IPv4Route(interface, destination, gateway, flags, mask))
133 gateway = route[4]
136 routes.append(IPv6Route(interface, destination, gateway, flags, prefix))
Ddhcp_test_base.py363 for prefix, destination, gateway in classless_static_routes:
365 logging.info('Using %s as the default gateway', gateway)
366 expected_routers = [ gateway ]
/external/autotest/client/site_tests/network_DhcpBrokenDefaultGateway/
Dcontrol12 a server that provides a broken default gateway option. Specifically,
13 the gateway provided is outside the broadcast domain specified by the
15 mitigates this issue by creating a link-scoped route to the gateway,
16 or via some other method which allows the gateway route to be
Dnetwork_DhcpBrokenDefaultGateway.py56 if default_route.gateway != gateway_ip:
59 (default_route.gateway, gateway_ip))
/external/autotest/client/site_tests/network_WiFiTxRx/
Dnetwork-flipflop.sh177 gateway=$(ip route show dev $iface to match 0/0|\
180 progress Allowing link $gateway strength/quality readings to stabilise;
181 ping -n -w 5 -c 5 $gateway 1>&2;
183 progress Contacting AP at "/dev/tcp/$gateway/80" to collect TX strength;
184 if exec {http}<>/dev/tcp/$gateway/80; then
/external/iptables/extensions/
Dlibxt_TEE.t2 -j TEE --gateway 1.1.1.1;=;OK
3 -j TEE ! --gateway 1.1.1.1;;FAIL
Dlibxt_TEE.man6 \fB\-\-gateway\fP \fIipaddr\fP
12 \-t mangle \-A PREROUTING \-i eth0 \-j TEE \-\-gateway 2001:db8::1
Dlibxt_cluster.man1 Allows you to deploy gateway and back-end load-sharing clusters without the
/external/autotest/site_utils/
Dmysql_bootstrap.py230 gateway = get_gateway()
231 logging.info('Enabling access through gateway %s', gateway)
232 bootstrap(user, password, gateway, dest_host)
/external/android-clat/
DBUGS4 - assumes the /128 ipv6 subnet it generates can use the nat64 gateway
5 …- assumes the nat64 gateway has the ipv4 address in the last 32 bits of the ipv6 address (that it …
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-natt29 # To keep the NAT-mappings on your NAT gateway, there must be
42 # 172.16.0.1 and 172.16.1.1, where the first gateway is behind
75 # regardless of whether there is a NAT gateway between them
/external/wpa_supplicant_8/hostapd/
Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
4 database/authentication gateway interface to HLR/AuC. It could be
5 replaced with an implementation of SS7 gateway to GSM/UMTS
/external/autotest/client/common_lib/cros/network/
Dinterface.py542 gateway = match.group(1)
549 gateway=gateway, metric=metric))
/external/kernel-headers/original/uapi/linux/
Dicmp.h78 __be32 gateway; member
/external/autotest/client/site_tests/network_DhcpClasslessStaticRoute/
Dcontrol16 gateway parameter.
/external/autotest/client/site_tests/network_VPNConnect/
Dcontrol.l2tpipsec_psk23 The -evil variant simulates connecting to a VPN gateway that specifies
/external/scapy/test/
Dnmap.uts46 = fingerprint test: gateway
/external/openssh/
Dssh_config49 # ProxyCommand ssh -q -W %h:%p gateway.example.com
/external/iputils/
Dping.c898 pr_icmph(icp->type, icp->code, ntohl(icp->un.gateway), icp); in parse_reply()
924 pr_icmph(icp->type, icp->code, ntohl(icp->un.gateway), icp); in parse_reply()
1074 printf("(New nexthop: %s)\n", pr_addr(icp ? icp->un.gateway : info)); in pr_icmph()
1098 printf("Parameter problem: pointer = %u\n", icp ? (ntohl(icp->un.gateway)>>24) : info); in pr_icmph()
/external/ltp/testcases/network/stress/ns-tools/
D00_Descriptions.txt74 gateway. When the utility receives the packet from the host

123