/kernel/tests/net/test/ |
D | packets.py | 63 ip(src=srcaddr, dst=dstaddr) / 68 packet = (scapy.IP(src=srcaddr, dst=dstaddr, ttl=lifetime, tos=0x83) / 72 packet = (scapy.IPv6(src=srcaddr, dst=dstaddr, 85 ip(src=srcaddr, dst=dstaddr) / 95 ip(src=srcaddr, dst=dstaddr) / 105 ip(src=srcaddr, dst=dstaddr) / 118 ip(src=srcaddr, dst=dstaddr) / 130 ip(src=srcaddr, dst=dstaddr) / 137 ip = scapy.IP(src=srcaddr, dst=dstaddr, proto=net_test.IPPROTO_GRE) 139 ip = scapy.IPv6(src=srcaddr, dst=dstaddr, nh=net_test.IPPROTO_GRE) [all …]
|
D | bpf.py | 263 def BpfMov64Reg(dst, src): argument 265 dst_src = src << 4 | dst 270 def BpfLdxMem(size, dst, src, off): argument 272 dst_src = src << 4 | dst 277 def BpfStxMem(size, dst, src, off): argument 279 dst_src = src << 4 | dst 284 def BpfStMem(size, dst, off, imm): argument 286 dst_src = dst 291 def BpfAlu64Imm(op, dst, imm): argument 293 dst_src = dst [all …]
|
D | xfrm.py | 250 def SrcDstSelector(src, dst): argument 253 dstver = csocket.AddressVersion(dst) 256 (src, dst)) 259 return XfrmSelector(saddr=PaddedAddress(src), daddr=PaddedAddress(dst), 485 def AddSaInfo(self, src, dst, spi, mode, reqid, encryption, auth_trunc, aead, argument 508 xfrm_id = XfrmId((PaddedAddress(dst), spi, proto)) 509 family = AF_INET6 if ":" in dst else AF_INET 564 def DeleteSaInfo(self, dst, spi, proto, mark=None, xfrm_if_id=None): argument 575 family = AF_INET6 if ":" in dst else AF_INET 576 usersa_id = XfrmUsersaId((PaddedAddress(dst), spi, family, proto)) [all …]
|
D | policy_crash_test.py | 107 dst = ip6loopback 121 pkt1 = (ver6 + tclass + flowlbl + pkt1_plen + nexthdr + hoplimit + src + dst 124 pkt2 = (ver6 + tclass + flowlbl + pkt2_plen + nexthdr + hoplimit + src + dst
|
D | tun_twister.py | 158 packet.src, packet.dst = packet.dst, packet.src 184 return int(eth_pkt.dst.split(":")[0], 16) & 0x1 210 packet.src, packet.dst = packet.dst, packet.src
|
D | ping6_test.py | 109 scapy.IP(src=self.INTERMEDIATE_IPV4, dst=src) / 115 scapy.IPv6(src=self.INTERMEDIATE_IPV6, dst=src) / 123 scapy.IPv6(src=self.INTERMEDIATE_IPV6, dst=src) / 162 if ipv6.dst.startswith("ff02::"): 163 ipv6.dst = ipv6.src 174 if ipv6.dst.startswith("fe80:") and ipv6.dst != self._routeraddr: 181 packet.src = packet.dst 182 packet.dst = src 185 packet = scapy.Ether(src=self._routermac, dst=self._mymac) / packet 395 return (scapy.IP(src="192.0.2.1", dst="127.0.0.1") / [all …]
|
D | neighbour_test.py | 123 dst = addr 127 dst = "ff02::1:ff%02x:%02x%02x" % last3bytes 130 scapy.IPv6(src=src, dst=dst) / 154 scapy.Ether(src=mac, dst=self.MyMacAddress(self.netid)) / 155 scapy.IPv6(src=srcaddr, dst=dstaddr) /
|
D | sock_diag.py | 336 return SockDiag.GetRawAddress(diag_msg.family, diag_msg.id.dst) 365 dst, dport = s.getpeername()[:2] 369 dst = "::" if family == AF_INET6 else "0.0.0.0" 373 dst = SockDiag.PaddedAddress(dst) 374 sock_id = InetDiagSockId((sport, dport, src, dst, iface, "\x00" * 8))
|
D | xfrm_algorithm_test.py | 153 dst=remote_addr, 166 dst=local_addr, 179 dst=remote_addr, 192 dst=local_addr,
|
D | pf_key.py | 238 def AddSa(self, src, dst, spi, satype, mode, reqid, encryption, argument 247 self.MakeSadbExtAddr(SADB_EXT_ADDRESS_DST, dst), 255 def DelSa(self, src, dst, spi, satype): argument 262 self.MakeSadbExtAddr(SADB_EXT_ADDRESS_DST, dst),
|
D | sock_diag_test.py | 142 dst, dport = s.getpeername()[0:2] 143 self.assertEqual(diag_msg.id.dst, self.sock_diag.PaddedAddress(dst)) 250 req.id.src, req.id.dst = req.id.dst, req.id.src 428 req.id.src, req.id.dst = req.id.dst, req.id.src 549 child.id.dst) 947 dst = self.GetRemoteSocketAddress(version) 955 s.connect((dst, 53)) 963 s.connect((dst, 53)) 971 s.connect((dst, 53))
|
D | xfrm_base.py | 182 new_ip_layer = ip_type(src=tsrc_addr, dst=tdst_addr) 293 self.assertEquals(dst_addr, packet.dst)
|
D | xfrm_test.py | 303 incoming = (scapy.IP(src=remoteaddr, dst=myaddr) / 327 scapy.IP(src=remoteaddr, dst=myaddr) / scapy.UDP( 508 input_pkt = (IpType(src=remote_addr, dst=local_addr) / 527 self.assertEquals(remote_addr, output_pkt.dst) 572 input_pkt = (IpType(src=remote_addr, dst=local_addr) / 591 self.assertEquals(remote_addr, output_pkt.dst)
|
D | multinetwork_base.py | 246 ra = (scapy.Ether(src=macaddr, dst="33:33:00:00:00:01") / 537 packet = scapy.Ether(src=routermac, dst=mymac) / ip_packet 559 if include_multicast or not int(ether.dst.split(":")[0], 16) & 0x1: 694 if ipv6 and ipv6.dst.startswith("ff"):
|
D | srcaddr_selection_test.py | 285 dad_defense = (scapy.Ether(src=conflict_macaddr, dst="33:33:33:00:00:01") / 286 scapy.IPv6(src=self.test_ip, dst="ff02::1") /
|
D | net_test.py | 463 (_, src, dst, state, mem, 465 out.append([src, dst, state, mem, uid, refcnt, extra])
|
D | xfrm_tunnel_test.py | 705 self.assertEquals(expected.dst, pkt.dst) 732 self.assertEquals(tunnel.remote, pkt.dst)
|
D | multinetwork_test.py | 279 expected = (scapy.IPv6(src=srcaddr, dst=net_test.IPV6_ADDR, 831 reply = scapy.Ether(src=tgtmac, dst=mymac) / reply
|