/kernel/tests/net/test/ |
D | pf_key.py | 205 msg = SadbMsg(reply) 207 if msg.errno != 0: 208 raise OSError(msg.errno, os.strerror(msg.errno)) 211 def SendAndRecv(self, msg, extensions): argument 213 msg.seq = self.seq 214 msg.pid = os.getpid() 215 msg.len = (len(SadbMsg) + len(extensions)) / 8 216 self.sock.send(msg.Pack() + extensions) 242 msg = self.MakeSadbMsg(SADB_ADD, satype) 254 self.SendAndRecv(msg, self.PackPfKeyExtensions(extlist)) [all …]
|
D | tcp_fastopen_test.py | 85 msg = "Fastopen connect: expected %s" % desc 86 syn = self.ExpectPacketOn(netid, msg, syn) 97 msg = "First connect: got SYN+ACK, expected %s" % desc 98 self.ExpectPacketOn(netid, msg, ack) 102 msg = "Closing client socket, expecting %s" % desc 103 self.ExpectPacketOn(netid, msg, rst) 119 msg = "TFO write, expected %s" % desc 120 self.ExpectPacketOn(netid, msg, syn)
|
D | tcp_test.py | 57 def _ReceiveAndExpectResponse(self, netid, packet, reply, msg): argument 59 reply, msg) 102 msg = "Received %s, expected to see reply %s" % (desc, synack_desc) 103 reply = self._ReceiveAndExpectResponse(netid, syn, synack, msg) 122 self.ExpectPacketOn(netid, msg + ": expecting %s" % desc, data) 127 msg = "Received %s, expected to see reply %s" % (desc, ack_desc) 133 self.ExpectPacketOn(netid, msg + ": expecting %s" % ack_desc, ack)
|
D | sysctls_test.py | 27 msg = ("Obsolete TCP congestion control algorithm found. These " 30 self.assertEqual(bad_algs, [], msg)
|
D | forwarding_test.py | 77 msg = "Sent %s, expected %s" % (desc, desc_fwded) 79 self.ExpectPacketOn(iface2, msg, udp_fwd) 108 msg = "Sent %s, expected %s" % (desc, synack_desc) 109 reply = self._ReceiveAndExpectResponse(netid, syn, synack, msg) 118 self.ExpectPacketOn(netid, msg + ": expecting %s after close" % desc, fin)
|
D | genetlink.py | 65 msg = Genlmsghdr((command, version)) 66 return super(GenericNetlink, self)._Dump(family, msg, Genlmsghdr, "") 95 def _Decode(self, command, msg, nla_type, nla_data): argument
|
D | neighbour_test.py | 136 for msg, args in self.iproute.DumpNeighbours(version, ifindex): 138 return msg, args 153 msg = self.sock.recv(4096) 154 msg, actual_attrs = self.iproute.ParseNeighbourMessage(msg) 156 self.assertEqual(state, msg.state) 178 msg = "%s probe" % ("Unicast" if is_unicast else "Multicast") 179 self.ExpectPacketOn(self.netid, msg, expected) 187 msg = "Unicast ARP probe" 188 self.ExpectPacketOn(self.netid, msg, expected)
|
D | multinetwork_base.py | 681 def ExpectNoPacketsOn(self, netid, msg): argument 687 self.assertFalse(packets, msg + ": unexpected packet: " + firstpacket) 689 def ExpectPacketOn(self, netid, msg, expected): argument 700 self.assertTrue(packets, msg + ": received no packets") 715 "%s: diff with last packet:\n%s" % (msg, e.message)) 736 msg = "Receiving %s on %s to %s IP, %s" % (desc, iif, ip_if, extra) 738 msg += ": Expecting %s on %s" % (reply_desc, iif) 740 msg += ": Expecting no packets on %s" % iif 741 return msg 743 def _ReceiveAndExpectResponse(self, netid, packet, reply, msg): argument [all …]
|
D | xfrm.py | 394 def _UpdatePolicyInfo(self, msg, policy, tmpl, mark, xfrm_if_id): argument 403 self.SendXfrmNlRequest(msg, policy, nlattrs) 462 msg = req.Pack() 490 msg += self._NlAttr(attr_type, attr_msg) 491 return self._SendNlRequest(msg_type, msg, flags) 567 msg = sa.Pack() + nlattrs 570 self._SendNlRequest(nl_msg_type, msg, flags) 612 msg = spi.Pack() 614 self._SendNlRequest(XFRM_MSG_ALLOCSPI, msg, flags)
|
D | sock_diag_test.py | 585 msg = "IPv%s TCP connect: expected %s on %s" % ( 587 syn = self.ExpectPacketOn(netid, msg, expected) 604 def CheckRstOnClose(self, sock, req, expect_reset, msg, do_close=True): argument 616 msg = "%s: expecting %s: " % (msg, desc) 617 self.ExpectPacketOn(self.netid, msg, rst) 619 msg = "%s: " % msg 620 self.ExpectNoPacketsOn(self.netid, msg) 627 msg = "Closing incoming IPv%d %s socket" % (version, statename) 629 self.CheckRstOnClose(self.s, None, False, msg) 631 msg = "Closing accepted IPv%d %s socket" % (version, statename) [all …]
|
D | tcp_repair_test.py | 86 msg = "socket connect: expected %s" % desc 87 syn = self.ExpectPacketOn(netid, msg, expect_syn) 93 msg = "socket connect: got SYN+ACK, expected %s" % desc 94 ack = self.ExpectPacketOn(netid, msg, ack) 219 def assertThreadsStopped(self, multiThreads, msg) : argument 225 raise AssertionError(msg)
|
D | pf_key_test.py | 58 self.assertTrue(all(msg.satype == pf_key.SDB_TYPE_ESP) 59 for msg, _ in pfkey_sainfos)
|
D | qtaguid_test.py | 140 msg = "closing socket with linger2, expecting %s: " % desc 141 self.ExpectPacketOn(netid, msg, rst) 143 msg = "closing socket with linger2, expecting no packets" 144 self.ExpectNoPacketsOn(netid, msg)
|
D | sock_diag.py | 117 def _Decode(self, command, msg, nla_type, nla_data): argument 119 if msg.family == AF_INET or msg.family == AF_INET6: 120 if isinstance(msg, InetDiagReqV2):
|
D | net_test.py | 418 msg = os.strerror(err_num) 420 return self.assertRaisesRegex(EnvironmentError, msg) 422 self.assertRaisesRegex(EnvironmentError, msg, f, *args)
|
D | tcp_metrics.py | 64 def _Decode(self, command, msg, nla_type, nla_data): argument
|
D | xfrm_test.py | 516 msg, addr = sock.recvfrom(1024) 517 self.assertEqual("input hello", msg) 579 msg, addr = sock.recvfrom(1024) 580 self.assertEqual("input hello", msg)
|
D | ping6_test.py | 228 msg = "WARNING: reply threads not all started after %.1f seconds\n" % ( 230 sys.stderr.write(msg)
|