/kernel/tests/net/test/ |
D | xfrm_test.py | 55 def assertIsUdpEncapEsp(self, packet, spi, seq, length): argument 63 self.assertEqual(xfrm.EspHdr((spi, seq)), esp_hdr) 65 def CreateNewSa(self, localAddr, remoteAddr, spi, reqId, encap_tmpl, argument 69 self.xfrm.AddSaInfo(localAddr, remoteAddr, spi, xfrm.XFRM_MODE_TRANSPORT, 401 spi = 0xABCD 402 new_sa = self.xfrm.AllocSpi("::", IPPROTO_ESP, spi, spi) 403 self.assertEqual(spi, new_sa.id.spi) 407 spi = 0xABCD 408 new_sa = self.xfrm.AllocSpi("::", IPPROTO_ESP, spi, spi) 409 self.assertEqual(spi, new_sa.id.spi) [all …]
|
D | xfrm_tunnel_test.py | 126 dst_port, spi, seq_num, ip_hdr_options=None): argument 138 input_pkt = xfrm_base.EncryptPacketWithNull(input_pkt, spi, seq_num, 334 def __init__(self, spi): argument 335 self.spi = spi 426 self.out_sa.spi, crypt_algo, auth_algo, 431 self.in_sa.spi, crypt_algo, auth_algo, 437 self.out_sa.spi, self.okey, None) 439 self.in_sa.spi, self.ikey, None) 445 self.xfrm.AddSaInfo(self.local, self.remote, new_out_sa.spi, 450 self.xfrm.AddSaInfo(self.remote, self.local, new_in_sa.spi, [all …]
|
D | xfrm.py | 292 def UserTemplate(family, spi, reqid, tun_addrs): argument 315 xfrmid = XfrmId(daddr=daddr, spi=spi, proto=IPPROTO_ESP) 493 def AddSaInfo(self, src, dst, spi, mode, reqid, encryption, auth_trunc, aead, argument 516 xfrm_id = XfrmId((PaddedAddress(dst), spi, proto)) 572 def DeleteSaInfo(self, dst, spi, proto, mark=None, xfrm_if_id=None): argument 584 usersa_id = XfrmUsersaId((PaddedAddress(dst), spi, family, proto)) 605 spi = XfrmUserSpiInfo("\x00" * len(XfrmUserSpiInfo)) 606 spi.min = min_spi 607 spi.max = max_spi 608 spi.info.id.daddr = PaddedAddress(dst) [all …]
|
D | xfrm_base.py | 53 def ApplySocketPolicy(sock, family, direction, spi, reqid, tun_addrs): argument 73 template = xfrm.UserTemplate(family, spi, reqid, tun_addrs) 145 def EncryptPacketWithNull(packet, spi, seq, tun_addrs): argument 176 esp_packet = scapy.Raw(xfrm.EspHdr((spi, seq)).Pack()) 280 def _ExpectEspPacketOn(self, netid, spi, seq, length, src_addr, dst_addr): argument 309 self.assertEqual(xfrm.EspHdr((spi, seq)), esp_hdr)
|
D | pf_key.py | 239 def AddSa(self, src, dst, spi, satype, mode, reqid, encryption, argument 245 (SADB_EXT_SA, SadbSa((htonl(spi), replay, SADB_SASTATE_MATURE, 256 def DelSa(self, src, dst, spi, satype): argument 260 (SADB_EXT_SA, SadbSa((htonl(spi), 4, SADB_SASTATE_MATURE, 284 sa.spi, sa.replay, state, auth, encrypt, sa.flags))
|
D | xfrm_algorithm_test.py | 109 spi=xfrm_test.TEST_SPI, 255 spi=spi_right, 268 spi=spi_right, 281 spi=spi_left, 294 spi=spi_left,
|
D | pf_key_test.py | 65 self.assertEqual(0xdeadbeef, state4.id.spi) 66 self.assertEqual(0xbeefdead, state6.id.spi)
|
/kernel/prebuilts/4.19/arm64/ |
D | abi_symbol_list | 2408 # required by citadel-spi.ko 3715 # required by snd-soc-rt5514-spi.ko 3733 # required by spi-geni-qcom.ko
|
/kernel/prebuilts/5.4/arm64/ |
D | abi_symbol_list | 2509 # required by spi-pl022.ko 6962 # required by spi-sprd.ko 6968 # required by spi-sprd-adi.ko 7012 # required by sprd-sc27xx-spi.ko 7326 # required by spi-bitbang.ko
|
/kernel/prebuilts/5.10/arm64/ |
D | modules.builtin | 228 kernel/drivers/base/regmap/regmap-spi.ko
|
D | abi_symbol_list | 1752 # required by spi-pl022.ko 7307 # required by spi-pl022.ko 17619 # required by spi-exynosauto.ko
|
/kernel/prebuilts/5.10/x86_64/ |
D | modules.builtin | 234 kernel/drivers/base/regmap/regmap-spi.ko
|
D | modules.builtin.modinfo | 11 …gmap-i2cregmap_i2c.license=GPLregmap_spi.file=drivers/base/regmap/regmap-spiregmap_spi.license=…
|