/kernel/tests/net/test/ |
D | packets.py | 63 ip(src=srcaddr, dst=dstaddr) / 68 packet = (scapy.IP(src=srcaddr, dst=dstaddr, ttl=lifetime, tos=0x83) / 72 packet = (scapy.IPv6(src=srcaddr, dst=dstaddr, 85 ip(src=srcaddr, dst=dstaddr) / 95 ip(src=srcaddr, dst=dstaddr) / 105 ip(src=srcaddr, dst=dstaddr) / 118 ip(src=srcaddr, dst=dstaddr) / 130 ip(src=srcaddr, dst=dstaddr) / 137 ip = scapy.IP(src=srcaddr, dst=dstaddr, proto=net_test.IPPROTO_GRE) 139 ip = scapy.IPv6(src=srcaddr, dst=dstaddr, nh=net_test.IPPROTO_GRE) [all …]
|
D | ping6_test.py | 107 src = packet.getlayer(scapy.IP).src 109 scapy.IP(src=self.INTERMEDIATE_IPV4, dst=src) / 113 src = packet.getlayer(scapy.IPv6).src 115 scapy.IPv6(src=self.INTERMEDIATE_IPV6, dst=src) / 120 src = packet.getlayer(scapy.IPv6).src 123 scapy.IPv6(src=self.INTERMEDIATE_IPV6, dst=src) / 163 ipv6.dst = ipv6.src 164 for src in [self._routeraddr]: 165 ipv6.src = src 180 src = packet.src [all …]
|
D | policy_crash_test.py | 106 src = ip6loopback 121 pkt1 = (ver6 + tclass + flowlbl + pkt1_plen + nexthdr + hoplimit + src + dst 124 pkt2 = (ver6 + tclass + flowlbl + pkt2_plen + nexthdr + hoplimit + src + dst
|
D | bpf.py | 263 def BpfMov64Reg(dst, src): argument 265 dst_src = src << 4 | dst 270 def BpfLdxMem(size, dst, src, off): argument 272 dst_src = src << 4 | dst 277 def BpfStxMem(size, dst, src, off): argument 279 dst_src = src << 4 | dst 305 def BpfRawInsn(code, dst, src, off, imm): argument 306 ret = BpfInsn((code, (src << 4 | dst), off, imm))
|
D | tun_twister.py | 158 packet.src, packet.dst = packet.dst, packet.src 210 packet.src, packet.dst = packet.dst, packet.src
|
D | xfrm.py | 250 def SrcDstSelector(src, dst): argument 252 srcver = csocket.AddressVersion(src) 256 (src, dst)) 259 return XfrmSelector(saddr=PaddedAddress(src), daddr=PaddedAddress(dst), 485 def AddSaInfo(self, src, dst, spi, mode, reqid, encryption, auth_trunc, aead, argument 557 sa = XfrmUsersaInfo((selector, xfrm_id, PaddedAddress(src), NO_LIFETIME_CFG, 637 def CreateTunnel(self, direction, selector, src, dst, spi, encryption, argument 685 self.AddSaInfo(src, dst, spi, XFRM_MODE_TUNNEL, 0, encryption, auth_trunc, 695 tmpl = UserTemplate(outer_family, tmpl_spi, 0, (src, dst))
|
D | neighbour_test.py | 122 src = self.MyLinkLocalAddress(self.netid) 128 src = self.MyAddress(6, self.netid) 130 scapy.IPv6(src=src, dst=dst) / 154 scapy.Ether(src=mac, dst=self.MyMacAddress(self.netid)) / 155 scapy.IPv6(src=srcaddr, dst=dstaddr) /
|
D | xfrm_algorithm_test.py | 152 src=local_addr, 165 src=remote_addr, 178 src=local_addr, 191 src=remote_addr,
|
D | pf_key.py | 238 def AddSa(self, src, dst, spi, satype, mode, reqid, encryption, argument 246 self.MakeSadbExtAddr(SADB_EXT_ADDRESS_SRC, src), 255 def DelSa(self, src, dst, spi, satype): argument 261 self.MakeSadbExtAddr(SADB_EXT_ADDRESS_SRC, src),
|
D | sock_diag.py | 331 return SockDiag.GetRawAddress(diag_msg.family, diag_msg.id.src) 363 src, sport = s.getsockname()[:2] 372 src = SockDiag.PaddedAddress(src) 374 sock_id = InetDiagSockId((sport, dport, src, dst, iface, "\x00" * 8))
|
D | sock_diag_test.py | 137 src, sport = s.getsockname()[0:2] 138 self.assertEqual(diag_msg.id.src, self.sock_diag.PaddedAddress(src)) 250 req.id.src, req.id.dst = req.id.dst, req.id.src 428 req.id.src, req.id.dst = req.id.dst, req.id.src 551 child.id.src) 961 src = self.MySocketAddress(version, netid) 962 s.bind((src, 0)) 966 self.assertEqual((src, 0), s.getsockname()[:2]) 977 src = self.MySocketAddress(version, netid) 978 port = self.BindToRandomPort(s, src) [all …]
|
D | xfrm_tunnel_test.py | 171 data, src = read_sock.recvfrom(4096) 173 self.assertEquals((remote_inner, _TEST_REMOTE_PORT), src[:2]) 665 data, src = read_sock.recvfrom(4096) 668 self.assertEquals((remote_inner, _TEST_REMOTE_PORT), src[:2]) 704 self.assertEquals(expected.src, pkt.src) 731 self.assertEquals(tunnel.local, pkt.src) 750 data, src = read_sock.recvfrom(4096) 752 self.assertEquals((local_inner, src_port), src[:2])
|
D | xfrm_base.py | 182 new_ip_layer = ip_type(src=tsrc_addr, dst=tdst_addr) 295 self.assertEquals(src_addr, packet.src)
|
D | xfrm_test.py | 303 incoming = (scapy.IP(src=remoteaddr, dst=myaddr) / 320 data, src = twisted_socket.recvfrom(4096) 322 self.assertEquals((remoteaddr, srcport), src) 327 scapy.IP(src=remoteaddr, dst=myaddr) / scapy.UDP( 508 input_pkt = (IpType(src=remote_addr, dst=local_addr) / 572 input_pkt = (IpType(src=remote_addr, dst=local_addr) /
|
D | srcaddr_selection_test.py | 285 dad_defense = (scapy.Ether(src=conflict_macaddr, dst="33:33:33:00:00:01") / 286 scapy.IPv6(src=self.test_ip, dst="ff02::1") /
|
D | net_test.py | 463 (_, src, dst, state, mem, 465 out.append([src, dst, state, mem, uid, refcnt, extra])
|
D | multinetwork_base.py | 246 ra = (scapy.Ether(src=macaddr, dst="33:33:00:00:00:01") / 247 scapy.IPv6(src=lladdr, hlim=255) / 537 packet = scapy.Ether(src=routermac, dst=mymac) / ip_packet
|
D | multinetwork_test.py | 198 expected.src = self.MyAddress(version, netid) 214 expected.src = self.MyAddress(version, netid) 279 expected = (scapy.IPv6(src=srcaddr, dst=net_test.IPV6_ADDR, 831 reply = scapy.Ether(src=tgtmac, dst=mymac) / reply
|
/kernel/tests/net/test/rootfs/ |
D | stretch.sh | 31 deb-src http://ftp.debian.org/debian stretch main 33 deb-src http://ftp.debian.org/debian stretch-backports main 35 deb-src http://ftp.debian.org/debian buster main 88 mkdir -p /usr/src/$iptables 90 cd /usr/src/$iptables 106 cd /usr/src 113 cd /usr/src/$iptables 124 cd /usr/src
|