code checker
In order to verify the software IPv6 compliance, a dedicated code checker tool has been developed. It searches "suspicious" IPv4 (no IPv6 compliance ) code patterns and function calls inside the source code (C/C++, Java, Python, Perl).
It is just a simple bash script which should be executed in the main folder of the code to check.
Using the script:
- copy the script in the main folder of the source code you want to examine
- run the following commands in the same folder:
- $find -type d -maxdepth 1 -name "*" | awk -F/ '{print$2}' > components $./ipv6check.sh > log.txt
- the first command creates a list of components used as input by the code checker; you have to replace the parameter with the prefix of all the code packages you want to examine (e.g. find -type d -maxdepth 1 -name "org*" | awk -F/ '{print$2}' > components ./ipv6check.sh). The second command run the code checker
- the two files generated (components and log.txt) contain, respectively, the list of checked packages and the output of the analysis.
sample of file "components"
sample of file "log.txt"
Download the folder containing the IPv6 code checker and a readme file with the instructions on how to use the checker.