/kernel/tests/net/test/ |
D | netlink.py | 72 def _NlAttr(self, nla_type, data): argument 73 datalen = len(data) 77 return NLAttr((nla_len, nla_type)).Pack() + data + padding 104 def _ReadNlAttr(self, data): argument 106 nla, data = cstruct.Read(data, NLAttr) 111 nla_data, data = data[:datalen], data[padded_len:] 113 return nla, nla_data, data 115 def _ParseAttributes(self, command, msg, data, nested=0): argument 134 while data: 135 nla, nla_data, data = self._ReadNlAttr(data) [all …]
|
D | csocket.py | 153 msg_level, msg_type, data = opt 154 if isinstance(data, int): 155 data = struct.pack("=I", data) 156 elif isinstance(data, ctypes.c_uint32): 157 data = struct.pack("=I", data.value) 158 elif not isinstance(data, str): 160 msg_level, msg_type, type(data))) 162 datalen = len(data) 166 msg_control += data + padding 178 data, buf = buf[:datalen], buf[padlen + datalen:] [all …]
|
D | iproute.py | 317 data = struct.unpack("=I", nla_data)[0] 319 data = struct.unpack("!I", nla_data)[0] 321 data = struct.unpack("=i", nla_data)[0] 323 data = ord(nla_data) 326 data = socket.inet_ntop(msg.family, nla_data) 329 data = nla_data.strip("\x00") 331 data = self._ParseAttributes(-RTA_METRICS, None, nla_data, nested + 1) 333 data = self._ParseAttributes(-IFLA_LINKINFO, None, nla_data, nested + 1) 335 data = self._ParseAttributes(-IFLA_INFO_DATA, None, nla_data) 337 data = RTACacheinfo(nla_data) [all …]
|
D | genetlink.py | 60 def _SendCommand(self, family, command, version, data, flags): argument 62 self._SendNlRequest(family, genlmsghdr.Pack() + data, flags) 75 def _DecodeOps(self, data): argument 78 while data: 80 datalen, index, data = data[:2], data[2:4], data[4:] 82 nla, nla_data, data = self._ReadNlAttr(data) 87 nla, nla_data, data = self._ReadNlAttr(data) 101 data = struct.unpack("=H", nla_data)[0] 103 data = nla_data.strip("\x00") 105 data = struct.unpack("=I", nla_data)[0] [all …]
|
D | ping6_test.py | 264 def assertValidPingResponse(self, s, data): argument 278 self.assertGreater(len(data), 7, "Not enough data for ping packet") 280 self.assertTrue(data.startswith("\x08\x00"), "Not an IPv4 echo request") 282 self.assertTrue(data.startswith("\x80\x00"), "Not an IPv6 echo request") 306 self.assertEqual(len(data), len(rcvd)) 307 self.assertEqual(data[6:].encode("hex"), rcvd[6:].encode("hex")) 346 data = net_test.IPV4_PING + "foobarbaz" 347 s.send(data) 348 self.assertValidPingResponse(s, data) 404 scapy.ICMPv6EchoRequest(id=port, seq=1, data="foobarbaz")) [all …]
|
D | xfrm.py | 347 def MaybeDebugCommand(self, command, flags, data): argument 367 print("%s %s" % (cmdname, str(self._ParseNLMsg(data, struct_type)))) 376 data = cstruct.Read(nla_data, XfrmAlgo)[0] 378 data = cstruct.Read(nla_data, XfrmAlgoAuth)[0] 380 data = cstruct.Read(nla_data, XfrmEncapTmpl)[0] 382 data = cstruct.Read(nla_data, XfrmMark)[0] 384 data = struct.unpack("=I", nla_data)[0] 386 data = cstruct.Read(nla_data, XfrmUserTmpl)[0] 388 data = struct.unpack("=I", nla_data)[0] 390 data = nla_data [all …]
|
D | tcp_metrics.py | 70 data = inet_ntop(AF_INET, nla_data) 72 data = inet_ntop(AF_INET6, nla_data) 74 data = struct.unpack("=Q", nla_data)[0] 76 data = struct.unpack("=I", nla_data)[0] 78 data = struct.unpack("=H", nla_data)[0] 80 data = nla_data 82 data = nla_data.encode("hex") 84 return name, data 86 def MaybeDebugCommand(self, command, unused_flags, data): argument 89 parsed = self._ParseNLMsg(data, genetlink.Genlmsghdr) [all …]
|
D | pf_key.py | 167 def ParseExtension(exttype, data): argument 187 ext, attrs = cstruct.Read(data, struct_type) 189 ext, attrs, = data, "" 291 def ParseExtensions(data): argument 294 while data: 295 ext, data = cstruct.Read(data, SadbExt) 297 extdata, data = data[:datalen], data[datalen:] 307 msg, data = cstruct.Read(received, SadbMsg) 309 extensions, data = data[:extlen], data[extlen:]
|
D | sock_diag.py | 131 data = ord(nla_data) 133 data = nla_data.strip("\x00") 135 data = InetDiagMeminfo(nla_data) 138 data = TcpInfo(nla_data) 140 data = SkMeminfo(nla_data) 142 data = struct.unpack("=I", nla_data)[0] 144 data = self.DecodeBytecode(nla_data) 146 data = [] 156 data.append(addr) 158 data = nla_data [all …]
|
D | cstruct.py | 164 def _Parse(self, data): argument 165 data = data[:self._length] 166 values = list(struct.unpack(self._format, data)) 276 def Read(data, struct_type): argument 278 return struct_type(data), data[length:]
|
D | multinetwork_test.py | 463 desc, data = packets.ACK(version, myaddr, remoteaddr, establishing_ack, 466 self.ExpectPacketOn(netid, msg + ": expecting %s" % desc, data) 470 ack = packets.ACK(version, remoteaddr, myaddr, data)[1] 910 data = s._Recv() 917 nlmsghdr, data = cstruct.Read(data, netlink.NLMsgHdr) 921 ndopthdr, data = cstruct.Read(data, iproute.NdUseroptMsg) 926 actual_opt = self.Pref64Option(data)
|
D | qtaguid_test.py | 92 data, sockaddr = s.recvfrom(4096) 93 self.assertEqual("foo", data) 107 data, sockaddr = s.recvfrom(4096) 108 self.assertEqual("foo", data) 119 data, sockaddr = s.recvfrom(4096) 120 self.assertEqual("foo", data)
|
D | xfrm_algorithm_test.py | 343 data = accepted.recv(2048) 344 self.assertEqual("hello request", data) 354 data, peer = sock.recvfrom(2048) 357 self.assertEqual("hello request", data) 386 data = sock_left.recv(2048) 387 self.assertEqual("hello response", data)
|
D | xfrm_tunnel_test.py | 208 data, src = read_sock.recvfrom(4096) 209 self.assertEqual(net_test.UDP_PAYLOAD, data) 730 data, src = read_sock.recvfrom(4096) 732 self.assertEqual(net_test.UDP_PAYLOAD, data) 815 data, src = read_sock.recvfrom(4096) 816 self.assertEqual(net_test.UDP_PAYLOAD, data)
|
D | tcp_nuke_addr_test.py | 89 data = "foo" 91 self.assertEqual(len(data), s1.send(data)) 92 self.assertEqual(data, s2.recv(4096))
|
D | csocket_test.py | 49 data, addr = csocket.Recvfrom(s, 4096, 0) 50 self.assertEqual("foo", data) 81 data, addr, cmsg = csocket.Recvmsg(s, 4096, 1024, 0) 82 self.assertEqual("foo", data)
|
D | tcp_test.py | 119 desc, data = packets.ACK(version, myaddr, remoteaddr, establishing_ack, 122 self.ExpectPacketOn(netid, msg + ": expecting %s" % desc, data) 124 desc, fin = packets.FIN(version, remoteaddr, myaddr, data)
|
D | leak_test.py | 45 data, addr = csocket.Recvfrom(s, 4096) 46 self.assertEqual("", data)
|
D | bpf_test.py | 141 data, retaddr = csocket.Recvfrom(sock, 4096, 0) 142 assert "foo" == data
|
D | xfrm_test.py | 320 data, src = twisted_socket.recvfrom(4096) 321 self.assertEqual(net_test.UDP_PAYLOAD, data)
|
/kernel/prebuilts/5.10/x86_64/ |
D | modules.builtin.modinfo | 11 …data from keyboardi8042.parmtype=dumbkbd:booli8042.file=drivers/input/serio/i8042i8042.parm=kbd…
|
/kernel/prebuilts/5.10/arm64/ |
D | System.map | 90859 ffffffc01295e000 D __kvm_nvhe___hyp_section_.hyp.data..percpu 106305 ffffffc012b77000 D __kvm_nvhe___hyp_section_.hyp.data..ro_after_init 108711 ffffffc012c8914c b ipv6_generate_stable_address.data
|
D | System.map-allsyms | 116442 ffffffc012a2e000 D __kvm_nvhe___hyp_section_.hyp.data..percpu 131888 ffffffc012c47000 D __kvm_nvhe___hyp_section_.hyp.data..ro_after_init 134293 ffffffc012d59194 b ipv6_generate_stable_address.data
|
/kernel/prebuilts/mainline/arm64/ |
D | System.map-allsyms | 111019 ffffffc011a6f000 D __kvm_nvhe___hyp_section_.hyp.data..percpu 127981 ffffffc011c76000 D __kvm_nvhe___hyp_section_.hyp.data..ro_after_init 131047 ffffffc011d03a94 b ipv6_generate_stable_address.data
|
/kernel/prebuilts/5.4/arm64/ |
D | System.map | 107587 ffffffc01239fa8c b ipv6_generate_stable_address.data
|