Searched refs:PING (Results 1 – 25 of 42) sorted by relevance
12
28 ut_assertok(net_loop(PING)); in dm_test_eth()32 ut_assertok(net_loop(PING)); in dm_test_eth()36 ut_assertok(net_loop(PING)); in dm_test_eth()47 ut_assertok(net_loop(PING)); in dm_test_eth_alias()51 ut_assertok(net_loop(PING)); in dm_test_eth_alias()56 ut_assertok(net_loop(PING)); in dm_test_eth_alias()60 ut_assertok(net_loop(PING)); in dm_test_eth_alias()74 ut_assertok(net_loop(PING)); in dm_test_eth_prime()80 ut_assertok(net_loop(PING)); in dm_test_eth_prime()131 ut_asserteq(-ENODEV, net_loop(PING)); in dm_test_eth_act()[all …]
16 PING=ping${TST_IPV6}18 tst_require_cmds $PING25 tst_res TINFO "flood $PING: ICMP packets filled with pattern '$pat'"31 EXPECT_PASS $PING -c $COUNT -f -s $s $ipaddr -p "$pat" \>/dev/null
7 type ping${1} >/dev/null 2>&1 && PING="ping${1}" || PING="ping -${1}"8 $PING -q -c 1 -W 1 ${2%%/*} >/dev/null 2>&1
42 + Test EDNS-PING44 = EDNS-PING - basic instanciation48 #= EDNS-PING - Live test53 … qname="www.edns-ping.org.")], ar=[DNSRROPT(z=0, rdata=[EDNS0TLV(optcode="PING", optdata=b"\x00\x1…
137 …, win 342, options [nop,nop,TS val 1132422271 ecr 1132422271], length 20: RESP "PING" "PING" "PING"147 …, win 342, options [nop,nop,TS val 1132422573 ecr 1132422573], length 20: RESP "PING" "PING" "PING"157 …, win 342, options [nop,nop,TS val 1132422875 ecr 1132422875], length 23: RESP "PING" "PING" "PING"
4 … seq 1:7, ack 1, win 342, options [nop,nop,TS val 2004405846 ecr 2004405846], length 6: RESP "PING"14 …eq 1:15, ack 1, win 342, options [nop,nop,TS val 2004405846 ecr 2004405846], length 14: RESP "PING"
7 PING = 1; enumerator
29 PING("server sends pings during request and verifies client response"), enumConstant
190 case PING: in runTest()
21 PING=ping
35 ${PING} ${sip:+-I $sip} $dip -c 10 -i 0.5 -w $ping_timeout \
8 PING=${PING:=ping}872 $PING $args $dip -c 10 -i 0.1 -w $PING_TIMEOUT &> /dev/null
176 $PING -I $oif $dip -c 10 -i 0.1 -w $PING_TIMEOUT -b 2>&1 \
242 ###### PING Frame243 …PING frame that the peer must respond to by precisely echoing what they received. This is used to …
120 * HTTP/2 PING is not supported or used
153 ${PING} -Q $dscp_10 ${sip:+-I $sip} $dip \
180 ${PING} -Q $dscp ${sip:+-I $sip} $dip \
72 PING = 1; enumerator
283 if (net_loop(PING) < 0) { in do_ping()
340 [CLOCKDIFF,PING,RDISC,TRACEROUTE6]: Support uClibc.342 [PING]: Use inet_pton() instead of sscan().383 [PING,PING6] Use proper type for printf()389 [PING,PING6] Avoid using __constant_htons() if it is really needed391 [ARPING,CLOCKDIFF,PING,PING6,TRACEROUTE6] Check return value from setuid().392 [PING,PING6] ensure to initialize msg.
495 case PING: in net_loop()1338 case PING: in net_check_prereq()
72 PING 10.22 (10.0.0.22): 56 data bytes
201 PING 10.0.0.22 (10.0.0.22): 56 data bytes
534 BOOTP, RARP, ARP, TFTPGET, DHCP, PING, DNS, NFS, CDP, NETCONS, SNTP, enumerator
955 PING