/external/autotest/frontend/afe/ |
D | rpc_handler.py | 78 def validate_rpc_only_called_by_main(self, meth_name, remote_ip): argument 93 if remote_ip != global_afe_ip: 97 meth_name, remote_ip, global_afe_ip)) 184 remote_ip, log_all=False): argument 194 msg = '%s| %s:%s %s' % (remote_ip, decoded_request['method'], 216 remote_ip = self._get_remote_ip(request) 226 meth_name, remote_ip) 232 decoded_request['remote_ip'] = remote_ip 237 remote_ip)
|
/external/linux-kselftest/tools/testing/selftests/net/forwarding/ |
D | mirror_gre_changes.sh | 114 local remote_ip=$1; shift 127 ping -c 1 -I $swp3 $remote_ip &>/dev/null 162 local remote_ip=$1; shift 172 tunnel_create $tundev $type $local_ip $remote_ip \
|
/external/curl/tests/data/ |
D | test1223 | 30 HTTP GET -w remote_ip and -w remote_port 33 http://%HOSTIP:%HTTPPORT/1223 -w 'IP %{remote_ip} and PORT %{remote_port}\n'
|
D | test970 | 62 …esult":0,"proxy_ssl_verify_result":0,"filename_effective":"log/out970","remote_ip":"%HOSTIP","remo…
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_ctrl.c | 65 char *remote_ip; member 405 ctrl->remote_ip = os_strdup(name); in wpa_ctrl_open() 410 os_free(ctrl->remote_ip); in wpa_ctrl_open() 423 ctrl->remote_ip = os_strdup("localhost"); in wpa_ctrl_open() 442 os_free(ctrl->remote_ip); in wpa_ctrl_open() 467 ctrl->remote_ip, ctrl->remote_ifname); in wpa_ctrl_get_remote_ifname() 477 os_free(ctrl->remote_ip); in wpa_ctrl_close()
|
/external/toybox/toys/pending/ |
D | lsof.c | 177 char remote_ip[INET6_ADDRSTRLEN] = {0}; in scan_ip() local 202 inet_ntop(af, &remote, remote_ip, sizeof(remote_ip)); in scan_ip() 208 local_ip, local_port, remote_ip, remote_port, in scan_ip() 213 local_ip, local_port, remote_ip, remote_port); in scan_ip()
|
/external/openssh/ |
D | auth.c | 1109 const char *remote_ip = ssh_remote_ipaddr(ssh); in auth_authorise_keyopts() local 1143 switch (match_host_and_ip(remote_host, remote_ip, in auth_authorise_keyopts() 1157 loc, pw->pw_name, remote_host, remote_ip, in auth_authorise_keyopts() 1168 switch (addr_match_cidr_list(remote_ip, in auth_authorise_keyopts() 1182 "address (%.200s).", loc, pw->pw_name, remote_ip); in auth_authorise_keyopts() 1185 loc, remote_ip); in auth_authorise_keyopts()
|
D | sshd.c | 1494 const char *remote_ip, *rdomain; local 2131 remote_ip = ssh_remote_ipaddr(ssh); 2134 audit_connection_from(remote_ip, remote_port); 2142 remote_ip, remote_port, laddr, ssh_local_port(ssh), 2263 verbose("Closing connection to %.500s port %d", remote_ip, remote_port);
|
/external/toolchain-utils/binary_search_tool/sysroot_wrapper/ |
D | README.md | 11 ./sysroot_wrapper/setup.sh ${board} ${remote_ip} ${package}
|
/external/scapy/scapy/layers/tls/ |
D | automaton_srv.py | 84 self.remote_ip = None 114 s += "Remote end : %s:%d\n" % (self.remote_ip, self.remote_port) 160 self.remote_ip, self.remote_port = addr 161 self.vprint("Accepted connection from %s:%d" % (self.remote_ip,
|
D | automaton_cli.py | 85 self.remote_ip = tmp[0][4][0] 150 self.vprint("Trying to connect on %s:%d" % (self.remote_ip, 152 s.connect((self.remote_ip, self.remote_port))
|
/external/webrtc/rtc_base/ |
D | virtual_socket_server.cc | 1156 IPAddress remote_ip = remote->GetLocalAddress().ipaddr(); in CanInteractWith() local 1158 IPAddress remote_normalized = remote_ip.Normalized(); in CanInteractWith() 1169 if (local_ip.family() == AF_INET && !remote_v6_only && IPIsAny(remote_ip)) { in CanInteractWith() 1175 if (remote_ip.family() == AF_INET && !local_v6_only && IPIsAny(local_ip)) { in CanInteractWith() 1184 if (remote_ip.family() == AF_INET6 && remote->was_any()) { in CanInteractWith()
|
/external/autotest/server/site_tests/provision_FactoryImage/ |
D | control | 26 test_that <remote_ip> provision_FactoryImage --board=<board> \
|
/external/curl/docs/cmdline-opts/ |
D | write-out.d | 86 .B remote_ip
|