Home
last modified time | relevance | path

Searched +full:- +full:- +full:redirect (Results 1 – 25 of 1093) sorted by relevance

12345678910>>...44

/external/cronet/net/url_request/
Dredirect_info.h2 // Use of this source code is governed by a BSD-style license that can be
13 #include "third_party/abseil-cpp/absl/types/optional.h"
18 // RedirectInfo captures information about a redirect and any fields in a
21 // First-party URL redirect policy: During server redirects, the first-party
23 // top-level first-party request, the first-party URL should be updated to the
24 // URL on every redirect.
44 // The HTTP status code of the redirect response.
46 // The new location URL of the redirect response.
48 // Referrer-Policy header of the redirect response.
50 // Whether the URL was upgraded to HTTPS due to upgrade-insecure-requests.
[all …]
Dredirect_info_unittest.cc2 // Use of this source code is governed by a BSD-style license that can be
165 // If a redirect serves 'Referrer-Policy: no-referrer', then the referrer in TEST()
170 "Referrer-Policy: no-referrer\n", in TEST()
180 "Location: http://foo.test/test\nReferrer-Policy: never\n", in TEST()
187 // If a redirect serves 'Referrer-Policy: no-referrer-when-downgrade', in TEST()
193 "Referrer-Policy: no-referrer-when-downgrade\n", in TEST()
204 "Referrer-Policy: default\n", in TEST()
210 // If a redirect serves 'Referrer-Policy: no-referrer-when-downgrade', in TEST()
211 // the referrer should not be cleared for a non-downgrading redirect. But in TEST()
216 "Referrer-Policy: no-referrer-when-downgrade\n", in TEST()
[all …]
Durl_request_job.h2 // Use of this source code is governed by a BSD-style license that can be
33 #include "third_party/abseil-cpp/absl/types/optional.h"
106 // Called to read post-filtered data from this Job, returning the number of
145 // Called to determine if this response is a redirect. Only makes sense
147 // is a redirect, and fills in the location param with the URL of the
148 // redirect. The HTTP status code (e.g., 302) is filled into
149 // |*http_status_code| to signify the type of redirect.
151 // request was upgraded to HTTPS due to an 'upgrade-insecure-requests'
154 // The caller is responsible for following the redirect by setting up an
170 // Called to determine if it is okay to redirect this job to the specified
[all …]
/external/linux-kselftest/tools/testing/selftests/net/
Dfib_rule_tests.sh2 # SPDX-License-Identifier: GPL-2.0
6 # Kselftest framework requirement - SKIP code is 4.
12 IP="ip -netns testns"
30 if [ ${rc} -eq ${expected} ]; then
32 printf "\n TEST: %-50s [ OK ]\n" "${msg}"
36 printf "\n TEST: %-50s [FAIL]\n" "${msg}"
56 set -e
63 $IP -6 address add $DEV_ADDR6/64 dev dummy0
76 ip rule help 2>&1 | grep -q $1
77 if [ $? -ne 0 ]; then
[all …]
Dicmp_redirect.sh2 # SPDX-License-Identifier: GPL-2.0
4 # redirect test
6 # .253 +----+
7 # +----| r1 |
8 # | +----+
9 # +----+ | |.1
10 # | h1 |--------------+ | 10.1.1.0/30 2001:db8:1::0/126
11 # +----+ .1 | |.2
12 # 172.16.1/24 | +----+ +----+
13 # 2001:db8:16:1/64 +----| r2 |-------------------| h2 |
[all …]
/external/python/google-api-python-client/docs/dyn/
Dfirebasehosting_v1beta1.projects.sites.domains.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Dfirebasehosting_v1beta1.sites.domains.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Dcompute_v1.securityPolicies.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
/external/iproute2/man/man8/
Dtc-mirred.81 .TH "Mirror/redirect action in tc" 8 "11 Jan 2015" "iproute2" "Linux"
4 mirred - mirror/redirect action
37 .B redirect
41 .RB ( redirect )
51 Specify the network interface to redirect or mirror to.
53 Limit ingress bandwidth on eth0 to 1mbit/s, redirect exceeding traffic to lo for
61 action police rate 1mbit burst 100k conform-exceed pipe \\
62 action mirred egress redirect dev lo
93 action mirred egress redirect dev ifb0
/external/iproute2/doc/actions/
Dmirred-usage4 mirror and redirect packets. The main difference with say a vannila
15 ACTION := <mirror | redirect>
20 - Ingress is not supported at the moment. It will be in the
24 - Mirror takes a copy of the packet and sends it to specified
26 - redirect
30 ------------------------------------------------------
47 2) eth0->eth1-> eth0
48 3) eth0->lo-> eth1-> eth0
50 B) Do not redirect from one IFB device to another.
54 Redirecting from ifbX->ifbY will actually not crash your machine but your
[all …]
/external/linux-kselftest/tools/testing/selftests/bpf/progs/
Dtest_tc_neigh.c1 // SPDX-License-Identifier: GPL-2.0
42 void *data_end = ctx_ptr(skb->data_end); in is_remote_ep_v4()
43 void *data = ctx_ptr(skb->data); in is_remote_ep_v4()
53 return ip4h->daddr == addr; in is_remote_ep_v4()
59 void *data_end = ctx_ptr(skb->data_end); in is_remote_ep_v6()
60 void *data = ctx_ptr(skb->data); in is_remote_ep_v6()
70 return v6_equal(ip6h->daddr, addr); in is_remote_ep_v6()
76 void *data_end = ctx_ptr(skb->data_end); in tc_chk()
77 void *data = ctx_ptr(skb->data); in tc_chk()
90 bool redirect = false; in tc_dst() local
[all …]
/external/chromium-trace/catapult/third_party/polymer/components/iron-location/test/
Dredirection.html1 <!--
9 -->
10 <dom-module id='redirect-hash'>
12 <iron-location hash='{{hash}}'></iron-location>
16 is: 'redirect-hash',
28 </dom-module>
30 <dom-module id='redirect-path'>
32 <iron-location path='{{path}}'></iron-location>
36 is: 'redirect-path',
48 </dom-module>
[all …]
/external/linux-kselftest/tools/testing/selftests/net/forwarding/
Dtc_mpls_l2vpn.sh2 # SPDX-License-Identifier: GPL-2.0
4 # +-----------------------+
9 # +-----------------|-----+
13 # +-----------------|-----------------------------------------+
15 # | -ingress: |
16 # | -encapsulate Ethernet into MPLS |
17 # | -add outer Ethernet header |
18 # | -redirect to $mpls1 (egress) |
21 # | | -ingress: |
22 # | | -remove outer Ethernet header |
[all …]
/external/rust/crates/libz-sys/src/zlib-ng/cmake/
Dtest-tools.cmake1 # test-tools.cmake -- Tests targeting tool coverage
3 # Test --help and invalid parameters for our tools
4 set(TEST_COMMAND ${MINIGZIP_COMMAND} "--help")
5 add_test(NAME minigzip-help
7 "-DCOMMAND=${TEST_COMMAND}"
8 -P ${CMAKE_CURRENT_SOURCE_DIR}/cmake/run-and-redirect.cmake)
10 set(TEST_COMMAND ${MINIGZIP_COMMAND} "--invalid")
11 add_test(NAME minigzip-invalid
13 "-DCOMMAND=${TEST_COMMAND}"
14 -DSUCCESS_EXIT=64
[all …]
/external/iptables/extensions/
Dlibebt_redirect.c16 #include "iptables/nft-bridge.h"
21 { "redirect-target", required_argument, 0, REDIRECT_TARGET },
28 "redirect option:\n" in brredir_print_help()
29 " --redirect-target target : ACCEPT, DROP, RETURN or CONTINUE\n"); in brredir_print_help()
35 (struct ebt_redirect_info *)target->data; in brredir_init()
37 redirectinfo->target = EBT_ACCEPT; in brredir_init()
45 (struct ebt_redirect_info *)(*target)->data; in brredir_parse()
50 if (ebt_fill_target(optarg, (unsigned int *)&redirectinfo->target)) in brredir_parse()
51 xtables_error(PARAMETER_PROBLEM, "Illegal --redirect-target target"); in brredir_parse()
62 (struct ebt_redirect_info *)target->data; in brredir_print()
[all …]
Dlibip6t_REDIRECT.t3 -p tcp -j REDIRECT --to-ports 42;=;OK
4 -p udp -j REDIRECT --to-ports 42-1234;=;OK
5 -p tcp -j REDIRECT --to-ports 42-1234 --random;=;OK
6 -j REDIRECT --to-ports 42;;FAIL
Dlibipt_REDIRECT.t3 -p tcp -j REDIRECT --to-ports 42;=;OK
4 -p udp -j REDIRECT --to-ports 42-1234;=;OK
5 -p tcp -j REDIRECT --to-ports 42-1234 --random;=;OK
6 -j REDIRECT --to-ports 42;;FAIL
Dlibipt_REDIRECT.txlate1 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080
2 nft add rule ip nat prerouting tcp dport 80 counter redirect to :8080
4 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080 --random
5 nft add rule ip nat prerouting tcp dport 80 counter redirect to :8080 random
Dlibip6t_REDIRECT.txlate1 ip6tables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080
2 nft add rule ip6 nat prerouting tcp dport 80 counter redirect to :8080
4 ip6tables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080 --random
5 nft add rule ip6 nat prerouting tcp dport 80 counter redirect to :8080 random
/external/linux-kselftest/tools/testing/selftests/tc-testing/tc-tests/actions/
Dmirred.json20 "matchPattern": "action order [0-9]*: mirred \\(Egress Mirror to device lo\\).*index 1 ref",
28 "name": "Add mirred redirect to egress action",
41 "cmdUnderTest": "$TC actions add action mirred egress redirect index 2 dev lo action pipe",
44 … "matchPattern": "action order [0-9]*: mirred \\(Egress Redirect to device lo\\).*index 2 ref",
66 "$TC actions add action mirred egress redirect index 2 dev lo"
71 "matchPattern": "[Mirror|Redirect] to device lo",
95 "matchPattern": "action order [0-9]*: mirred \\(.*to device lo\\).*index 20 ref",
119 "matchPattern": "action order [0-9]*: mirred \\(Egress.*to device lo\\).*index 20 ref",
143 "matchPattern": "action order [0-9]*: mirred \\(.*to device eltoh\\).*index 20 ref",
163 "$TC actions add action mirred egress redirect index 15 dev lo"
[all …]
/external/apache-http/src/org/apache/http/impl/client/
DDefaultRedirectHandler.java2 …* $HeadURL: http://svn.apache.org/repos/asf/httpcomponents/httpclient/trunk/module-client/src/main…
4 * $Date: 2008-07-02 10:35:05 -0700 (Wed, 02 Jul 2008) $
15 * http://www.apache.org/licenses/LICENSE-2.0
60 * <!-- empty lines to avoid svn diff problems -->
66 …* Please visit <a href="http://android-developers.blogspot.com/2011/09/androids-http-clients.h…
74 private static final String REDIRECT_LOCATIONS = "http.protocol.redirect-locations";
104 //get the location header to find out where to redirect to in getLocationURI()
107 // got a redirect response, but no location header in getLocationURI()
109 "Received redirect response " + response.getStatusLine() in getLocationURI()
114 this.log.debug("Redirect requested to location '" + location + "'"); in getLocationURI()
[all …]
/external/curl/docs/libcurl/opts/
DCURLINFO_REDIRECT_URL.321 .\" * SPDX-License-Identifier: curl
27 CURLINFO_REDIRECT_URL \- get the URL a redirect would go to
35 Pass a pointer to a char pointer to receive the URL a redirect \fIwould\fP
37 handy if you think using the built-in libcurl redirect logic is not good enough
42 redirect to happen (since 7.54.1).
56 printf("Redirect to: %s\\n", url);
/external/linux-kselftest/tools/testing/selftests/drivers/net/mlxsw/
Dtc_restrictions.sh2 # SPDX-License-Identifier: GPL-2.0
41 # It is forbidden in mlxsw driver to have mixed-bound
89 # It is forbidden in mlxsw driver to have mirred redirect on
90 # egress-bound block.
97 action mirred egress redirect dev $swp2
98 check_err $? "Failed to add redirect rule to ingress bound block"
111 …check_err $? "Failed to create another clsact with egress shared block after blocker redirect rule…
115 action mirred egress redirect dev $swp2
116 check_fail $? "Incorrect success to add redirect rule to mixed bound block"
125 action mirred egress redirect dev $swp2
[all …]
/external/llvm/test/CodeGen/X86/
Dpatchable-prologue.ll1 ; RUN: llc -filetype=obj -o - -mtriple=x86_64-apple-macosx < %s | llvm-objdump -triple x86_64-apple
2 ; RUN: llc -mtriple=x86_64-apple-macosx < %s | FileCheck %s --check-prefix=CHECK-ALIGN
6 define void @f0() "patchable-function"="prologue-short-redirect" {
7 ; CHECK-LABEL: _f0:
8 ; CHECK-NEXT: 66 90 nop
10 ; CHECK-ALIGN: .p2align 4, 0x90
11 ; CHECK-ALIGN: _f0:
16 define void @f1() "patchable-function"="prologue-short-redirect" "no-frame-pointer-elim"="true" {
17 ; CHECK-LABEL: _f1
18 ; CHECK-NEXT: ff f5 pushq %rbp
[all …]
/external/curl/docs/cmdline-opts/
Dproto-redir.d2 SPDX-License-Identifier: curl
3 Long: proto-redir
5 Help: Enable/disable PROTOCOLS on redirect
8 Example: --proto-redir =http,https $URL
9 See-also: proto
11 ---
12 Tells curl to limit what protocols it may use on redirect. Protocols denied by
13 --proto are not overridden by this option. See --proto for how protocols are
16 Example, allow only HTTP and HTTPS on redirect:
18 curl --proto-redir -all,http,https http://example.com
[all …]

12345678910>>...44