Lines Matching +full:ipv6 +full:- +full:multi +full:- +full:target +full:- +full:srv +full:- +full:disabled
55 b = Bunch(returncode=0, communicate=lambda *args, **kargs: (b"v2.4.5rc1-261-g44b98e14", None))
77 = List layers - advanced
87 = List packet fields - ls
137 # only upper case and +-
138 assert re.match(r"[A-Z+-]*", l)
145 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
147 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
149 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
151 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
153 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
155 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
157 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
168 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
170 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
172 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
174 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
186 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
188 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
190 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
198 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
206 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
208 Fig. IPv6
211 output = [x.strip() for x in rfc(IPv6, ret=True).strip().split("\n")]
225 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
227 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
229 +-+-+-+-+-+-+-+-+ +
231 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
233 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
241 = Check that all contrib modules are well-configured
371 Source Index Name MAC IPv4 IPv6
402 parser.add_argument('--extcap-interfaces', action='store_true')
403 parser.add_argument('--capture', action='store_true')
404 parser.add_argument('--extcap-config', action='store_true')
405 parser.add_argument('--scan-follow-rsp', action='store_true')
406 parser.add_argument('--scan-follow-aux', action='store_true')
407 parser.add_argument('--extcap-interface', type=str)
408 parser.add_argument('--fifo', type=str)
451 iface = conf.ifaces.dev_from_networkname('/dev/ttyUSB5-None')
460 ('0', '--only-advertising', 'Only advertising packets', '', ''),
461 ('1', '--only-legacy-advertising', 'Only legacy advertising packets', '', ''),
462 ('2', '--scan-follow-rsp', 'Find scan response data', 'true', ''),
463 ('3', '--scan-follow-aux', 'Find auxiliary pointer data', 'true', ''),
464 ('3', '--coded', 'Scan and follow devices on LE Coded PHY', 'false', '')
472 = Test read_routes6() - default output
482 # - one route if there is only the loopback interface
483 # - one route if IPv6 is supported but disabled on network interfaces
484 # - three routes if there is a network interface
485 # - on OpenBSD, only two routes on lo0 are expected
491 _route_add_loopback(ipv6=True, iflist=iflist)
501 # IPv6 seems disabled. Force a route to ::1
506 = Build HBHOptUnknown for IPv6ExtHdrHopByHop with disabled autopad
507 ~ ipv6 hbh opt
510 pkt = Ether()/IPv6()/IPv6ExtHdrHopByHop(autopad=0, options=[v6Opt, ])
513 = Build HBHOptUnknown for IPv6ExtHdrDestOpt with disabled autopad
514 ~ ipv6 hbh opt
517 pkt = Ether()/IPv6()/IPv6ExtHdrDestOpt(autopad=0, options=[v6Opt, ])
521 = Test read_routes6() - check mandatory routes
535 # Identify a route to a node IPv6 link-local address
538 # IPv6 is not available, but we still check the loopback
719 interact(argv=["-s scapy1"] + extra_args, mybanner="What a test")
726 interact_emulator(extra_args=["-?"]) # Failing
731 interact_emulator(extra_args=["-d"]) # Extended
818 = Test explore() with non-GUI mode
937 expected += " -003 5F 63 6F 6D 6D 6F 6E 5F 72 65 6D 6F 76 _common_remov\n"
979 = Test mysummary functions - Ether
1092 itu-bicc-stc 3097/sctp
1094 x11 6000-6063/tcp # X Window System
1095 x11 6000-6063/udp # X Window System
1096 ndl-ahp-svc 6064/tcp # NDL-AHP-SVC
1115 = Test utility functions - network related
1434 px = [IP()/p1, IPv6()/p1]
1444 = answers - Net
1454 # Not available yet because of IPv6
1600 = ASN1 - ASN1_Object
1609 = ASN1 - RandASN1Object
1617 b'F\x02\xfe\x92', # python 3.7-3.9
1620 = ASN1 - ASN1_BIT_STRING
1631 = ASN1 - ASN1_SEQUENCE
1635 = ASN1 - ASN1_DECODING_ERROR
1642 = ASN1 - ASN1_INTEGER
1647 = ASN1 - ASN1_OID
1677 assert ssid == "ROUTE-821E295"
1688 …-v8+\x04\x00E\x00Dumpcap (Wireshark) 3.4.10 (Git v3.4.10 packaged as 3.4.10-0+deb11u1)\x00\x00\x00…
1744 assert (ans.time - req.sent_time) >= 0
1745 assert (ans.time - req.sent_time) <= 1e-3
1835 r = ssck.sr1(ICMP(type='echo-request'), timeout=0.1, chainEX=True, threaded=False)
1843 ~ netaccess ipv6
1846 x = sr1(IPv6(dst="www.google.com")/ICMPv6EchoRequest(),timeout=3)
1848 assert x[IPv6].ottl() in [32, 64, 128, 255]
1849 assert 0 <= x[IPv6].hops() <= 126
1873 …-contact@google.com\nmnt-by: MAINT-AS15169\nchanged: radb-contact@google.com 20150728\nsour…
1889 Bulk mode; whois.cymru.com [2017-10-03 08:38:08 +0000]
1890 24776 | 217.25.178.5 | INFOCLIP-AS, FR
1891 36459 | 192.30.253.112 | GITHUB - GitHub, Inc., US
1892 26496 | 68.178.213.61 | AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US
1898 = AS resolver - IPv6
1910 = AS resolver - socket error
2009 = Send & receive with multi
2013 …r(IP(dst=["8.8.8.8", "1.2.3.4"]) / TCP(sport=RandShort(), dport=53, flags="S"), timeout=2, multi=1)
2172 + Ether tests with IPv6
2174 = Ether IPv6 checking for dst
2175 ~ netaccess ipv6
2177 p = Ether()/IPv6(dst="www.google.com")/TCP()
2178 assert p.dst != p[IPv6].dst
2189 …14\x00P\x00\x00\x00\x00\x00\x00\x00\x00P\x02 \x00\x91|\x00\x00\xcf\xc5\xacV_-\n\x00\x1c\x00\x00\x0…
2191 …x14\x00P\x00\x00\x00\x00\x00\x00\x00\x00P\x02 \x00\x91|\x00\x00\xcf\xc5\xacV-;\xc1'\x1c\x00\x00\x0…
2211 = Read a pcapng with little-endian SHB
2244 p = Ether() / IPv6() / TCP()
2267 ptypes.append(Ether((Ether() / IPv6() / TCP()).build()))
2268 ptypes.append(IP((IP() / IPv6() / TCP()).build()))
2276 comment=comment.encode('utf-8')
2313 = PcapNg - Process Information Block
2315 …x00f\x00Darwin Kernel Version 23.3.0: Thu Dec 21 02:29:41 PST 2023; root:xnu-10002.81.5~11/RELEASE…
2323 = OSS-Fuzz Findings
2346 # Issue #69628 - 32-bit alternative
2426 …f\xff\xff\x04\x009\x00TShark (Wireshark) 3.2.3 (Git v3.2.3 packaged as 3.2.3-1)\x00\x00\x00\x00\x0…
2497 pktpcapnano[0].time += Decimal('1E-9')
2505 …packet from capture file icmp2.ntar -- https://wiki.wireshark.org/Development/PcapNg?action=Attach…
2546 # Invalid PCAPNG format -> Raise
2554 # Invalid Packet in PCAPNG -> return
2558 # Invalid interface ID in PCAPNG -> raise EOFError
2566 # Invalid SPB in PCAPNG -> raise EOFError
2655 data = tcpdump(pcapfile, dump=True, args=['-nn']).split(b'\n')
2678 # Also check with use_tempfile=True (for non-OSX platforms)
2681 data = tcpdump(pcapfile, dump=True, args=['-nn'], use_tempfile=True).split(b'\n')
2690 data = tcpdump([Ether()/IP()/ICMP()], dump=True, args=['-nn']).split(b'\n')
2706 expected_command = [conf.prog.tcpdump, '-y', 'EN10MB', '-U', '-r', '-']
2708 expected_command = [conf.prog.tcpdump, '-y', 'EN10MB', '-r', '-']
2731 expected_command = [conf.prog.tcpdump, '-y', 'EN10MB', '-U', '-r', '-']
2733 expected_command = [conf.prog.tcpdump, '-y', 'EN10MB', '-r', '-']
2749 lst = sniff(offline=fd, filter="subtype probe-req")
2752 = Check tcpdump() command rejects non-string input for prog
2757 tcpdump([pkt], prog=+17607067425, args=['-nn'])
2768 …14\x00P\x00\x00\x00\x00\x00\x00\x00\x00P\x02 \x00\x91|\x00\x00\xcf\xc5\xacV_-\n\x00\x1c\x00\x00\x0…
2771 …r val in line[:-1].split(b'\t')) for line in tcpdump(pcapfile, prog=conf.prog.tshark, getfd=True, …
2779 Ether()/IP(src='192.0.2.1', dst='192.0.2.2')/ICMP(type='echo-request')/Raw(b'X'*100),
2780 Ether()/IP(src='192.0.2.2', dst='192.0.2.1')/ICMP(type='echo-reply')/Raw(b'X'*100),
2836 [conf.prog.wireshark, '-ki', '-'],
2848 wrpcap(filename, [IP()/UDP(), IPv6()/UDP()], linktype=DLT_RAW)
2850 assert isinstance(packets[0], IP) and isinstance(packets[1], IPv6)
2986 # Now apply post-load patches
3009 = OpenBSD 7.5 amd64 - read_routes()
3033 = OpenBSD 7.5 amd64 - read_routes6()
3062 = FreeBSD 14.1 amd64 - read_routes()
3085 = FreeBSD 14.1 amd64 - read_routes6()
3108 = NetBSD 10.0 amd64 - read_routes()
3133 = NetBSD 10.0 amd64 - read_routes6()
3173 = Darwin 23.6 (MacOS 14.5) x86_64 - read_routes()
3203 = Darwin 23.6 (MacOS 14.5) x86_64 - read_routes6()
3277 processing file: replay-example.pcap"""
3279 argv = ['tcpreplay', '--intf1=mon0', '--multiplier=1.00', '--timer=nano', 'replay-example.pcap']
3302 Flows: 1 flows, 3597.12 fps, 1 flow packets, 0 non-flow
3365 assert conf.route.route("192.168.0.0-10") == ('enp3s0', '4.4.4.4', '0.0.0.0')
3377 = Mocked IPv6 routes calls
3445 = Test with recv() calls that return exact packet-length rawings
3457 return -1
3487 = Test with recv() calls that return twice as much data as the exact packet-length
3499 return -1
3543 return -1
3579 + Test correct conversion from binary to rawing of IPv6 addresses
3581 = IPv6 bin to rawing conversion
3607 = IPv6 bin to rawing conversion - Zero-block of length 1
3611 # shortens the single zero block to '::'. This is a valid IPv6 address
3617 = IPv6 bin to rawing conversion - Illegal sizes
3679 oid = OID("1.2.3.4.5.6-8")
3711 ~ netaccess ipv6
3713 ip = IPv6(dst="www.google.com")
3719 ip = IPv6(dst="www.yahoo.com")
3720 assert IPv6(raw(ip)).dst == [p.dst for p in ip][0]
3722 = Net6 using implicit format in IPv6
3724 assert len(list(IPv6(dst=("fe80::1", "fe80::1f")))) == 31
3726 = Multiple IPv6 addresses test
3727 ~ netaccess ipv6
3729 ip = IPv6(dst=['2001:db8::1', 'www.google.fr'],hlim=(1,5))
3744 ~ netaccess ipv6
3747 assert 'Net6("www.google.com/128")' in repr(IPv6(src="www.google.com"))
3751 + IPv6 helpers
3763 …c0d:0028:f508:f508:08f5") == "2001:0:0a0b:0c0d:0028:f508:f508:08f5 [Teredo srv: 10.11.12.13 cli: 1…
3841 b'\xfe\x80\x00\x00\x00\x00\x00\x00.g\xef-~\xce\xed\x8a'),
3879 r4.routes[-1][4] == "5.6.7.8"
4069 os.write(fd, b"-- MIB test\nscapy OBJECT IDENTIFIER ::= {test 2807}\n")
4077 = MIB - graph
4092 = MIB - test aliases
4124 assert issubclass(w[-1].category, DeprecationWarning)
4126 # -Werror is used
4129 = MIB - Check that MIB OIDs are not duplicated
4243 = Parsing a human-readable UUID
4244 f = UUIDField('f', '01234567-89ab-cdef-0123-456789abcdef')
4247 = Parsing a machine-encoded UUID
4262 …x('0123456789abcdef0123456789abcdef01')) == (b'\x01', UUID('01234567-89ab-cdef-0123-456789abcdef'))
4265 …hould be apply by block on each block in parenthesis '(01234567)-(89ab)-(cdef)-(01)(23)-(45)(67)(8…
4266 f = UUIDField('f', '01234567-89ab-cdef-0123-456789abcdef', uuid_fmt=UUIDField.FORMAT_LE)
4270 * This should reverse the entire value as 128-bits
4271 f = UUIDField('f', '01234567-89ab-cdef-0123-456789abcdef', uuid_fmt=UUIDField.FORMAT_REV)
4278 RANDUUID_TEMPLATE = '01234567-89ab-*-01*-*****ef'
4396 assert re.match(r'[0-9a-f]{8}(-[0-9a-f]{4}){3}-[0-9a-f]{12}', str(RandUUID()), re.I) is not None
4399 * RandUUID template can contain static part such a 01234567-89ab-*-01*-*****ef
4400 ru = RandUUID('01234567-89ab-*-01*-*****ef')
4401 assert re.match(r'01234567-89ab-[0-9a-f]{4}-01[0-9a-f]{2}-[0-9a-f]{10}ef', str(ru), re.I) is not No…
4402 assert ru.command() == "RandUUID(template='01234567-89ab-*-01*-*****ef')"
4405 * RandUUID template can contain a part with a range of values such a 01234567-89ab-*-01*-****c0:c9ef
4406 assert re.match(r'01234567-89ab-[0-9a-f]{4}-01[0-9a-f]{2}-[0-9a-f]{8}c[0-9]ef', str(RandUUID('01234…
4412 = MPLS - build/dissection
4425 = MPLS encapsulated Ethernet with CW - build/dissection
4434 = MPLS encapsulated Ethernet without CW - build/dissection
4451 = MPLS encapsulated IP - build/dissection
4580 lines = plist.diffplot(lambda x,y: (x.time, y.id-x.id))
4596 plist = PacketList([tuple(tmp[i-2:i]) for i in range(2, 10, 2)])
4704 plist.extend([IPv6(dst="::2", src="::1")/TCP(sport=i) for i in range(2)])
4705 plist.extend([IPv6(src="::2", dst="::1")/TCP(sport=i) for i in range(2)])
4717 pl = PacketList([Ether()/IPv6()/ICMPv6EchoRequest(), Ether()/IPv6()/IPv6()])