| /external/cronet/net/url_request/ |
| D | redirect_info.h | 2 // Use of this source code is governed by a BSD-style license that can be 13 #include "third_party/abseil-cpp/absl/types/optional.h" 18 // RedirectInfo captures information about a redirect and any fields in a 21 // First-party URL redirect policy: During server redirects, the first-party 23 // top-level first-party request, the first-party URL should be updated to the 24 // URL on every redirect. 44 // The HTTP status code of the redirect response. 46 // The new location URL of the redirect response. 48 // Referrer-Policy header of the redirect response. 50 // Whether the URL was upgraded to HTTPS due to upgrade-insecure-requests. [all …]
|
| D | redirect_info_unittest.cc | 2 // Use of this source code is governed by a BSD-style license that can be 165 // If a redirect serves 'Referrer-Policy: no-referrer', then the referrer in TEST() 170 "Referrer-Policy: no-referrer\n", in TEST() 180 "Location: http://foo.test/test\nReferrer-Policy: never\n", in TEST() 187 // If a redirect serves 'Referrer-Policy: no-referrer-when-downgrade', in TEST() 193 "Referrer-Policy: no-referrer-when-downgrade\n", in TEST() 204 "Referrer-Policy: default\n", in TEST() 210 // If a redirect serves 'Referrer-Policy: no-referrer-when-downgrade', in TEST() 211 // the referrer should not be cleared for a non-downgrading redirect. But in TEST() 216 "Referrer-Policy: no-referrer-when-downgrade\n", in TEST() [all …]
|
| D | url_request_job.h | 2 // Use of this source code is governed by a BSD-style license that can be 33 #include "third_party/abseil-cpp/absl/types/optional.h" 106 // Called to read post-filtered data from this Job, returning the number of 145 // Called to determine if this response is a redirect. Only makes sense 147 // is a redirect, and fills in the location param with the URL of the 148 // redirect. The HTTP status code (e.g., 302) is filled into 149 // |*http_status_code| to signify the type of redirect. 151 // request was upgraded to HTTPS due to an 'upgrade-insecure-requests' 154 // The caller is responsible for following the redirect by setting up an 170 // Called to determine if it is okay to redirect this job to the specified [all …]
|
| /external/linux-kselftest/tools/testing/selftests/net/ |
| D | fib_rule_tests.sh | 2 # SPDX-License-Identifier: GPL-2.0 6 # Kselftest framework requirement - SKIP code is 4. 12 IP="ip -netns testns" 30 if [ ${rc} -eq ${expected} ]; then 32 printf "\n TEST: %-50s [ OK ]\n" "${msg}" 36 printf "\n TEST: %-50s [FAIL]\n" "${msg}" 56 set -e 63 $IP -6 address add $DEV_ADDR6/64 dev dummy0 76 ip rule help 2>&1 | grep -q $1 77 if [ $? -ne 0 ]; then [all …]
|
| D | icmp_redirect.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # redirect test 6 # .253 +----+ 7 # +----| r1 | 8 # | +----+ 9 # +----+ | |.1 10 # | h1 |--------------+ | 10.1.1.0/30 2001:db8:1::0/126 11 # +----+ .1 | |.2 12 # 172.16.1/24 | +----+ +----+ 13 # 2001:db8:16:1/64 +----| r2 |-------------------| h2 | [all …]
|
| /external/python/google-api-python-client/docs/dyn/ |
| D | firebasehosting_v1beta1.projects.sites.domains.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| D | firebasehosting_v1beta1.sites.domains.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| D | compute_v1.securityPolicies.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| /external/iproute2/man/man8/ |
| D | tc-mirred.8 | 1 .TH "Mirror/redirect action in tc" 8 "11 Jan 2015" "iproute2" "Linux" 4 mirred - mirror/redirect action 37 .B redirect 41 .RB ( redirect ) 51 Specify the network interface to redirect or mirror to. 53 Limit ingress bandwidth on eth0 to 1mbit/s, redirect exceeding traffic to lo for 61 action police rate 1mbit burst 100k conform-exceed pipe \\ 62 action mirred egress redirect dev lo 93 action mirred egress redirect dev ifb0
|
| /external/iproute2/doc/actions/ |
| D | mirred-usage | 4 mirror and redirect packets. The main difference with say a vannila 15 ACTION := <mirror | redirect> 20 - Ingress is not supported at the moment. It will be in the 24 - Mirror takes a copy of the packet and sends it to specified 26 - redirect 30 ------------------------------------------------------ 47 2) eth0->eth1-> eth0 48 3) eth0->lo-> eth1-> eth0 50 B) Do not redirect from one IFB device to another. 54 Redirecting from ifbX->ifbY will actually not crash your machine but your [all …]
|
| /external/linux-kselftest/tools/testing/selftests/bpf/progs/ |
| D | test_tc_neigh.c | 1 // SPDX-License-Identifier: GPL-2.0 42 void *data_end = ctx_ptr(skb->data_end); in is_remote_ep_v4() 43 void *data = ctx_ptr(skb->data); in is_remote_ep_v4() 53 return ip4h->daddr == addr; in is_remote_ep_v4() 59 void *data_end = ctx_ptr(skb->data_end); in is_remote_ep_v6() 60 void *data = ctx_ptr(skb->data); in is_remote_ep_v6() 70 return v6_equal(ip6h->daddr, addr); in is_remote_ep_v6() 76 void *data_end = ctx_ptr(skb->data_end); in tc_chk() 77 void *data = ctx_ptr(skb->data); in tc_chk() 90 bool redirect = false; in tc_dst() local [all …]
|
| /external/chromium-trace/catapult/third_party/polymer/components/iron-location/test/ |
| D | redirection.html | 1 <!-- 9 --> 10 <dom-module id='redirect-hash'> 12 <iron-location hash='{{hash}}'></iron-location> 16 is: 'redirect-hash', 28 </dom-module> 30 <dom-module id='redirect-path'> 32 <iron-location path='{{path}}'></iron-location> 36 is: 'redirect-path', 48 </dom-module> [all …]
|
| /external/linux-kselftest/tools/testing/selftests/net/forwarding/ |
| D | tc_mpls_l2vpn.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # +-----------------------+ 9 # +-----------------|-----+ 13 # +-----------------|-----------------------------------------+ 15 # | -ingress: | 16 # | -encapsulate Ethernet into MPLS | 17 # | -add outer Ethernet header | 18 # | -redirect to $mpls1 (egress) | 21 # | | -ingress: | 22 # | | -remove outer Ethernet header | [all …]
|
| /external/rust/crates/libz-sys/src/zlib-ng/cmake/ |
| D | test-tools.cmake | 1 # test-tools.cmake -- Tests targeting tool coverage 3 # Test --help and invalid parameters for our tools 4 set(TEST_COMMAND ${MINIGZIP_COMMAND} "--help") 5 add_test(NAME minigzip-help 7 "-DCOMMAND=${TEST_COMMAND}" 8 -P ${CMAKE_CURRENT_SOURCE_DIR}/cmake/run-and-redirect.cmake) 10 set(TEST_COMMAND ${MINIGZIP_COMMAND} "--invalid") 11 add_test(NAME minigzip-invalid 13 "-DCOMMAND=${TEST_COMMAND}" 14 -DSUCCESS_EXIT=64 [all …]
|
| /external/iptables/extensions/ |
| D | libebt_redirect.c | 16 #include "iptables/nft-bridge.h" 21 { "redirect-target", required_argument, 0, REDIRECT_TARGET }, 28 "redirect option:\n" in brredir_print_help() 29 " --redirect-target target : ACCEPT, DROP, RETURN or CONTINUE\n"); in brredir_print_help() 35 (struct ebt_redirect_info *)target->data; in brredir_init() 37 redirectinfo->target = EBT_ACCEPT; in brredir_init() 45 (struct ebt_redirect_info *)(*target)->data; in brredir_parse() 50 if (ebt_fill_target(optarg, (unsigned int *)&redirectinfo->target)) in brredir_parse() 51 xtables_error(PARAMETER_PROBLEM, "Illegal --redirect-target target"); in brredir_parse() 62 (struct ebt_redirect_info *)target->data; in brredir_print() [all …]
|
| D | libip6t_REDIRECT.t | 3 -p tcp -j REDIRECT --to-ports 42;=;OK 4 -p udp -j REDIRECT --to-ports 42-1234;=;OK 5 -p tcp -j REDIRECT --to-ports 42-1234 --random;=;OK 6 -j REDIRECT --to-ports 42;;FAIL
|
| D | libipt_REDIRECT.t | 3 -p tcp -j REDIRECT --to-ports 42;=;OK 4 -p udp -j REDIRECT --to-ports 42-1234;=;OK 5 -p tcp -j REDIRECT --to-ports 42-1234 --random;=;OK 6 -j REDIRECT --to-ports 42;;FAIL
|
| D | libipt_REDIRECT.txlate | 1 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080 2 nft add rule ip nat prerouting tcp dport 80 counter redirect to :8080 4 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080 --random 5 nft add rule ip nat prerouting tcp dport 80 counter redirect to :8080 random
|
| D | libip6t_REDIRECT.txlate | 1 ip6tables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080 2 nft add rule ip6 nat prerouting tcp dport 80 counter redirect to :8080 4 ip6tables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080 --random 5 nft add rule ip6 nat prerouting tcp dport 80 counter redirect to :8080 random
|
| /external/linux-kselftest/tools/testing/selftests/tc-testing/tc-tests/actions/ |
| D | mirred.json | 20 "matchPattern": "action order [0-9]*: mirred \\(Egress Mirror to device lo\\).*index 1 ref", 28 "name": "Add mirred redirect to egress action", 41 "cmdUnderTest": "$TC actions add action mirred egress redirect index 2 dev lo action pipe", 44 … "matchPattern": "action order [0-9]*: mirred \\(Egress Redirect to device lo\\).*index 2 ref", 66 "$TC actions add action mirred egress redirect index 2 dev lo" 71 "matchPattern": "[Mirror|Redirect] to device lo", 95 "matchPattern": "action order [0-9]*: mirred \\(.*to device lo\\).*index 20 ref", 119 "matchPattern": "action order [0-9]*: mirred \\(Egress.*to device lo\\).*index 20 ref", 143 "matchPattern": "action order [0-9]*: mirred \\(.*to device eltoh\\).*index 20 ref", 163 "$TC actions add action mirred egress redirect index 15 dev lo" [all …]
|
| /external/apache-http/src/org/apache/http/impl/client/ |
| D | DefaultRedirectHandler.java | 2 …* $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main… 4 * $Date: 2008-07-02 10:35:05 -0700 (Wed, 02 Jul 2008) $ 15 * http://www.apache.org/licenses/LICENSE-2.0 60 * <!-- empty lines to avoid svn diff problems --> 66 …* Please visit <a href="http://android-developers.blogspot.com/2011/09/androids-http-clients.h… 74 private static final String REDIRECT_LOCATIONS = "http.protocol.redirect-locations"; 104 //get the location header to find out where to redirect to in getLocationURI() 107 // got a redirect response, but no location header in getLocationURI() 109 "Received redirect response " + response.getStatusLine() in getLocationURI() 114 this.log.debug("Redirect requested to location '" + location + "'"); in getLocationURI() [all …]
|
| /external/curl/docs/libcurl/opts/ |
| D | CURLINFO_REDIRECT_URL.3 | 21 .\" * SPDX-License-Identifier: curl 27 CURLINFO_REDIRECT_URL \- get the URL a redirect would go to 35 Pass a pointer to a char pointer to receive the URL a redirect \fIwould\fP 37 handy if you think using the built-in libcurl redirect logic is not good enough 42 redirect to happen (since 7.54.1). 56 printf("Redirect to: %s\\n", url);
|
| /external/linux-kselftest/tools/testing/selftests/drivers/net/mlxsw/ |
| D | tc_restrictions.sh | 2 # SPDX-License-Identifier: GPL-2.0 41 # It is forbidden in mlxsw driver to have mixed-bound 89 # It is forbidden in mlxsw driver to have mirred redirect on 90 # egress-bound block. 97 action mirred egress redirect dev $swp2 98 check_err $? "Failed to add redirect rule to ingress bound block" 111 …check_err $? "Failed to create another clsact with egress shared block after blocker redirect rule… 115 action mirred egress redirect dev $swp2 116 check_fail $? "Incorrect success to add redirect rule to mixed bound block" 125 action mirred egress redirect dev $swp2 [all …]
|
| /external/llvm/test/CodeGen/X86/ |
| D | patchable-prologue.ll | 1 ; RUN: llc -filetype=obj -o - -mtriple=x86_64-apple-macosx < %s | llvm-objdump -triple x86_64-apple… 2 ; RUN: llc -mtriple=x86_64-apple-macosx < %s | FileCheck %s --check-prefix=CHECK-ALIGN 6 define void @f0() "patchable-function"="prologue-short-redirect" { 7 ; CHECK-LABEL: _f0: 8 ; CHECK-NEXT: 66 90 nop 10 ; CHECK-ALIGN: .p2align 4, 0x90 11 ; CHECK-ALIGN: _f0: 16 define void @f1() "patchable-function"="prologue-short-redirect" "no-frame-pointer-elim"="true" { 17 ; CHECK-LABEL: _f1 18 ; CHECK-NEXT: ff f5 pushq %rbp [all …]
|
| /external/curl/docs/cmdline-opts/ |
| D | proto-redir.d | 2 SPDX-License-Identifier: curl 3 Long: proto-redir 5 Help: Enable/disable PROTOCOLS on redirect 8 Example: --proto-redir =http,https $URL 9 See-also: proto 11 --- 12 Tells curl to limit what protocols it may use on redirect. Protocols denied by 13 --proto are not overridden by this option. See --proto for how protocols are 16 Example, allow only HTTP and HTTPS on redirect: 18 curl --proto-redir -all,http,https http://example.com [all …]
|