Searched refs:code (Results 1 – 6 of 6) sorted by relevance
/kernel/tests/net/test/ |
D | bpf.py | 293 code = BPF_ALU64 | BPF_MOV | BPF_X 295 ret = BpfInsn((code, dst_src, 0, 0)) 300 code = BPF_LDX | (size & 0x18) | BPF_MEM 302 ret = BpfInsn((code, dst_src, off, 0)) 307 code = BPF_STX | (size & 0x18) | BPF_MEM 309 ret = BpfInsn((code, dst_src, off, 0)) 314 code = BPF_ST | (size & 0x18) | BPF_MEM 316 ret = BpfInsn((code, dst_src, off, imm)) 321 code = BPF_ALU64 | (op & 0xf0) | BPF_K 323 ret = BpfInsn((code, dst_src, 0, imm)) [all …]
|
D | sock_diag.py | 270 if op.code in [INET_DIAG_BC_NOP, INET_DIAG_BC_JMP, INET_DIAG_BC_AUTO]: 272 elif op.code in [INET_DIAG_BC_S_GE, INET_DIAG_BC_S_LE, 276 elif op.code in [INET_DIAG_BC_S_COND, INET_DIAG_BC_D_COND]: 285 elif op.code == INET_DIAG_BC_DEV_COND: 289 elif op.code == INET_DIAG_BC_MARK_COND: 292 raise ValueError("Unknown opcode %d" % op.code)
|
D | packets.py | 149 scapy.ICMPerror(type=3, code=3) / packet) 153 scapy.ICMPv6DestUnreach(code=4) / packet) 159 scapy.ICMPerror(type=3, code=4) / str(packet)[:64])
|
D | ping6_test.py | 110 scapy.ICMP(type=11, code=0) / 116 scapy.ICMPv6TimeExceeded(code=0) / 133 icmp.code != 0): 155 icmpv6.code != 0): 396 scapy.ICMP(type=3, code=0) /
|
D | README | 4 A simple framework for blackbox testing of kernel networking code.
|
D | sock_diag_test.py | 375 def DiagDump(code): argument 379 self.sock_diag._Dump(code, req, sock_diag.InetDiagMsg, "")
|