Searched refs:PING (Results 1 – 25 of 49) sorted by relevance
12
27 ut_assertok(net_loop(PING)); in dm_test_eth()31 ut_assertok(net_loop(PING)); in dm_test_eth()35 ut_assertok(net_loop(PING)); in dm_test_eth()46 ut_assertok(net_loop(PING)); in dm_test_eth_alias()50 ut_assertok(net_loop(PING)); in dm_test_eth_alias()55 ut_assertok(net_loop(PING)); in dm_test_eth_alias()59 ut_assertok(net_loop(PING)); in dm_test_eth_alias()73 ut_assertok(net_loop(PING)); in dm_test_eth_prime()79 ut_assertok(net_loop(PING)); in dm_test_eth_prime()130 ut_asserteq(-ENODEV, net_loop(PING)); in dm_test_eth_act()[all …]
28 PING=ping${TST_IPV6}30 tst_test_cmds $PING37 tst_resm TINFO "flood $PING: ICMP packets filled with pattern '$pat'"41 EXPECT_PASS $PING -c $COUNT -f -s $psize $ipaddr -p "$pat" \>/dev/null
7 type ping${1} >/dev/null 2>&1 && PING="ping${1}" || PING="ping -${1}"8 $PING -q -c 1 -W 1 ${2%%/*} >/dev/null 2>&1
42 + Test EDNS-PING44 = EDNS-PING - basic instanciation48 #= EDNS-PING - Live test53 … qname="www.edns-ping.org.")], ar=[DNSRROPT(z=0, rdata=[EDNS0TLV(optcode="PING", optdata=b"\x00\x1…
101 ping_msg.set_notice_code(NoticeCode::PING); in TEST_F()111 pong_msg.set_notice_code(NoticeCode::PING); in TEST_F()125 pong_msg.set_notice_code(NoticeCode::PING); in TEST_F()139 pong_msg.set_notice_code(NoticeCode::PING); in TEST_F()
137 …, win 342, options [nop,nop,TS val 1132422271 ecr 1132422271], length 20: RESP "PING" "PING" "PING"147 …, win 342, options [nop,nop,TS val 1132422573 ecr 1132422573], length 20: RESP "PING" "PING" "PING"157 …, win 342, options [nop,nop,TS val 1132422875 ecr 1132422875], length 23: RESP "PING" "PING" "PING"
4 … seq 1:7, ack 1, win 342, options [nop,nop,TS val 2004405846 ecr 2004405846], length 6: RESP "PING"14 …eq 1:15, ack 1, win 342, options [nop,nop,TS val 2004405846 ecr 2004405846], length 14: RESP "PING"
7 PING = 1; enumerator
21 PING=ping
34 ${PING} ${sip:+-I $sip} $dip -c 10 -i 0.1 -w 2 &> /dev/null
8 PING=${PING:=ping}796 ip vrf exec $vrf_name $PING $dip -c 10 -i 0.1 -w 2 &> /dev/null
173 $PING -I $oif $dip -c 10 -i 0.1 -w 2 -b 2>&1 | grep $from &> /dev/null
29 PING("server sends pings during request and verifies client response"), enumConstant
190 case PING: in runTest()
242 ###### PING Frame243 …PING frame that the peer must respond to by precisely echoing what they received. This is used to …
120 * HTTP/2 PING is not supported or used
152 ${PING} -Q $dscp_10 ${sip:+-I $sip} $dip \
173 ${PING} -Q $dscp ${sip:+-I $sip} $dip \
72 PING = 1; enumerator
276 if (net_loop(PING) < 0) { in do_ping()
340 [CLOCKDIFF,PING,RDISC,TRACEROUTE6]: Support uClibc.342 [PING]: Use inet_pton() instead of sscan().383 [PING,PING6] Use proper type for printf()389 [PING,PING6] Avoid using __constant_htons() if it is really needed391 [ARPING,CLOCKDIFF,PING,PING6,TRACEROUTE6] Check return value from setuid().392 [PING,PING6] ensure to initialize msg.
495 case PING: in net_loop()1315 case PING: in net_check_prereq()
72 PING 10.22 (10.0.0.22): 56 data bytes
201 PING 10.0.0.22 (10.0.0.22): 56 data bytes
538 BOOTP, RARP, ARP, TFTPGET, DHCP, PING, DNS, NFS, CDP, NETCONS, SNTP, enumerator