/system/extras/tests/net_test/ |
D | packets.py | 45 def _GetIpLayer(version): argument 46 return {4: scapy.IP, 6: scapy.IPv6}[version] 56 def UDP(version, srcaddr, dstaddr, sport=0): argument 57 ip = _GetIpLayer(version) 61 return ("UDPv%d packet" % version, 65 def UDPWithOptions(version, srcaddr, dstaddr, sport=0): argument 66 if version == 4: 75 return ("UDPv%d packet with options" % version, packet) 77 def SYN(dport, version, srcaddr, dstaddr, sport=0, seq=TCP_SEQ): argument 78 ip = _GetIpLayer(version) [all …]
|
D | tcp_test.py | 48 def OpenListenSocket(self, version, netid): argument 50 family = {4: AF_INET, 5: AF_INET6, 6: AF_INET6}[version] 51 address = {4: "0.0.0.0", 5: "::", 6: "::"}[version] 71 return packets.RST(self.version, self.myaddr, self.remoteaddr, 74 def IncomingConnection(self, version, end_state, netid): argument 75 self.s = self.OpenListenSocket(version, netid) 78 remoteaddr = self.remoteaddr = self.GetRemoteAddress(version) 79 myaddr = self.myaddr = self.MyAddress(version, netid) 81 if version == 5: version = 4 82 self.version = version [all …]
|
D | multinetwork_test.py | 54 for version in [4, 6]: 58 iptables = {4: "iptables", 6: "ip6tables"}[version] 94 def CheckPingPacket(self, version, netid, routing_mode, dstaddr, packet): argument 95 s = self.BuildSocket(version, net_test.PingSocket, netid, routing_mode) 97 myaddr = self.MyAddress(version, netid) 102 desc, expected = packets.ICMPEcho(version, myaddr, dstaddr) 104 version, desc, self.GetInterfaceName(netid)) 110 def CheckTCPSYNPacket(self, version, netid, routing_mode, dstaddr): argument 111 s = self.BuildSocket(version, net_test.TCPSocket, netid, routing_mode) 113 if version == 6 and dstaddr.startswith("::ffff"): [all …]
|
D | multinetwork_base.py | 90 def MakePktInfo(version, addr, ifindex): argument 91 family = {4: AF_INET, 6: AF_INET6}[version] 93 addr = {4: "0.0.0.0", 6: "::"}[version] 96 if version == 6: 172 def _RouterAddress(netid, version): argument 173 if version == 6: 175 elif version == 4: 178 raise ValueError("Don't support IPv%s" % version) 189 def MyAddress(cls, version, netid): argument 192 6: cls._MyIPv6Address(netid)}[version] [all …]
|
D | iproute.py | 303 def _AddressFamily(self, version): argument 304 return {4: socket.AF_INET, 6: socket.AF_INET6}[version] 318 def _Rule(self, version, is_add, rule_type, table, match_nlattr, priority): argument 335 family = self._AddressFamily(version) 348 def DeleteRulesAtPriority(self, version, priority): argument 349 family = self._AddressFamily(version) 362 def FwmarkRule(self, version, is_add, fwmark, table, priority): argument 364 return self._Rule(version, is_add, RTN_UNICAST, table, nlattr, priority) 366 def IifRule(self, version, is_add, iif, table, priority): argument 368 return self._Rule(version, is_add, RTN_UNICAST, table, nlattr, priority) [all …]
|
D | forwarding_test.py | 52 version = 6 53 remoteaddr = self.GetRemoteAddress(version) 54 myaddr = self.MyAddress(version, netid) 56 desc, syn = packets.SYN(listenport, version, remoteaddr, myaddr) 57 synack_desc, synack = packets.SYNACK(version, myaddr, remoteaddr, syn) 61 establishing_ack = packets.ACK(version, remoteaddr, myaddr, reply)[1] 67 desc, fin = packets.FIN(version, myaddr, remoteaddr, establishing_ack) 70 desc, finack = packets.FIN(version, remoteaddr, myaddr, fin)
|
D | sock_diag_test.py | 406 for version in [4, 5, 6]: 407 msg = "Closing incoming IPv%d %s socket" % (version, statename) 408 self.IncomingConnection(version, state, self.netid) 411 msg = "Closing accepted IPv%d %s socket" % (version, statename) 430 def CheckChildSocket(self, version, statename, parent_first): argument 433 self.IncomingConnection(version, state, self.netid) 456 version, statename, "before" if parent_first else "after") 467 version, statename, "after" if parent_first else "before") 490 for version in [4, 5, 6]: 491 self.CheckChildSocket(version, "TCP_SYN_RECV", False) [all …]
|
D | net_test.py | 86 version = os.uname()[2].split("-")[0] 89 version = tuple(int(i) for i in version.split(".")) 90 return version 246 def GetDefaultRoute(version=6): argument 247 if version == 6: 256 elif version == 4: 266 raise ValueError("Don't know about IPv%s" % version) 306 GetDefaultRoute(version=4) 312 GetDefaultRoute(version=6)
|
/system/connectivity/shill/ |
D | static_ip_parameters_unittest.cc | 70 string VersionedAddress(const string& address, int version) { in VersionedAddress() argument 73 returned_address[returned_address.length() - 1] += version; in VersionedAddress() 76 void ExpectPopulatedIPConfigWithVersion(int version) { in ExpectPopulatedIPConfigWithVersion() argument 77 EXPECT_EQ(VersionedAddress(kAddress, version), ipconfig_props_.address); in ExpectPopulatedIPConfigWithVersion() 78 EXPECT_EQ(VersionedAddress(kGateway, version), ipconfig_props_.gateway); in ExpectPopulatedIPConfigWithVersion() 79 EXPECT_EQ(kMtu + version, ipconfig_props_.mtu); in ExpectPopulatedIPConfigWithVersion() 81 EXPECT_EQ(VersionedAddress(kNameServer0, version), in ExpectPopulatedIPConfigWithVersion() 83 EXPECT_EQ(VersionedAddress(kNameServer1, version), in ExpectPopulatedIPConfigWithVersion() 85 EXPECT_EQ(VersionedAddress(kPeerAddress, version), in ExpectPopulatedIPConfigWithVersion() 87 EXPECT_EQ(kPrefixLen + version, ipconfig_props_.subnet_prefix); in ExpectPopulatedIPConfigWithVersion() [all …]
|
/system/update_engine/ |
D | omaha_response_handler_action_unittest.cc | 103 if (in.update_exists && in.version != kBadVersion) { in DoTest() 146 in.version = "a.b.c.d"; in TEST_F() 166 EXPECT_EQ(in.version, install_plan.version); in TEST_F() 171 in.version = "a.b.c.d"; in TEST_F() 187 EXPECT_EQ(in.version, install_plan.version); in TEST_F() 192 in.version = "a.b.c.d"; in TEST_F() 208 EXPECT_EQ(in.version, install_plan.version); in TEST_F() 223 in.version = "a.b.c.d"; in TEST_F() 237 EXPECT_EQ(in.version, install_plan.version); in TEST_F() 243 in.version = "a.b.c.d"; in TEST_F() [all …]
|
/system/extras/tests/crypto/ |
D | get_dm_versions.c | 16 io->version[0] = 4; in ioctl_init() 17 io->version[1] = 0; in ioctl_init() 18 io->version[2] = 0; in ioctl_init() 51 printf("%s: %d.%d.%d\n", v->name, v->version[0], v->version[1], v->version[2]); in main()
|
/system/core/metricsd/ |
D | persistent_integer.cc | 82 int32_t version; in Read() local 85 if (HANDLE_EINTR(read(fd, &version, sizeof(version))) == sizeof(version) && in Read() 86 version == version_ && in Read()
|
/system/security/keystore/ |
D | blob.h | 53 uint8_t version; member 92 uint8_t getVersion() const { return mBlob.version; } in getVersion() 100 void setVersion(uint8_t version) { mBlob.version = version; } in setVersion() argument
|
/system/update_engine/payload_generator/ |
D | delta_diff_utils.h | 49 const PayloadVersion& version, 68 const PayloadVersion& version, 87 const PayloadVersion& version, 102 const PayloadVersion& version, 118 const PayloadVersion& version,
|
D | ab_generator.h | 65 static bool FragmentOperations(const PayloadVersion& version, 92 static bool SplitAReplaceOp(const PayloadVersion& version, 108 const PayloadVersion& version, 127 const PayloadVersion& version,
|
D | delta_diff_utils.cc | 174 const PayloadVersion& version, in DeltaReadPartition() argument 186 version, in DeltaReadPartition() 244 version, in DeltaReadPartition() 274 version, in DeltaReadPartition() 286 const PayloadVersion& version, in DeltaMovedAndZeroBlocks() argument 303 if (version.InplaceUpdate()) { in DeltaMovedAndZeroBlocks() 355 if (version.InplaceUpdate()) in DeltaMovedAndZeroBlocks() 371 version, in DeltaMovedAndZeroBlocks() 392 aop->op.set_type(version.OperationAllowed(InstallOperation::SOURCE_COPY) in DeltaMovedAndZeroBlocks() 431 const PayloadVersion& version, in DeltaReadFile() argument [all …]
|
D | ab_generator.cc | 55 config.version, in GenerateOperations() 60 FragmentOperations(config.version, aops, new_part.path, blob_file)); in GenerateOperations() 72 aops, config.version, merge_chunk_blocks, new_part.path, blob_file)); in GenerateOperations() 74 if (config.version.minor >= kOpSrcHashMinorPayloadVersion) in GenerateOperations() 85 bool ABGenerator::FragmentOperations(const PayloadVersion& version, in FragmentOperations() argument 95 version, aop, target_part_path, &fragmented_aops, blob_file)); in FragmentOperations() 157 bool ABGenerator::SplitAReplaceOp(const PayloadVersion& version, in SplitAReplaceOp() argument 186 AddDataAndSetType(&new_aop, version, target_part_path, blob_file)); in SplitAReplaceOp() 194 const PayloadVersion& version, in MergeOperations() argument 262 AddDataAndSetType(&curr_aop, version, target_part_path, blob_file)); in MergeOperations() [all …]
|
D | payload_signer_unittest.cc | 144 EXPECT_EQ(config.version.major, load_major_version); in DoWriteAndLoadPayloadTest() 153 config.version.major = kChromeOSMajorPayloadVersion; in TEST_F() 159 config.version.major = kBrilloMajorPayloadVersion; in TEST_F() 173 EXPECT_EQ(1U, signature.version()); in TEST_F() 214 config.version.major = kBrilloMajorPayloadVersion; in TEST_F() 239 config.version.major = kBrilloMajorPayloadVersion; in TEST_F()
|
D | delta_diff_generator.cc | 58 if (!config.version.Validate()) { in GenerateUpdatePayloadFile() 59 LOG(ERROR) << "Unsupported major.minor version: " << config.version.major in GenerateUpdatePayloadFile() 60 << "." << config.version.minor; in GenerateUpdatePayloadFile() 109 if (config.version.minor == kInPlaceMinorPayloadVersion) { in GenerateUpdatePayloadFile()
|
D | payload_generation_config.cc | 110 && image_info.version().empty() in ImageInfoIsEmpty() 179 TEST_AND_RETURN_FALSE(version.Validate()); in Validate() 180 TEST_AND_RETURN_FALSE(version.IsDelta() == is_delta); in Validate() 203 if (version.minor == kInPlaceMinorPayloadVersion && in Validate() 206 if (version.major == kChromeOSMajorPayloadVersion) in Validate()
|
/system/core/libmincrypt/tools/ |
D | DumpPublicKey.java | 51 int version; in checkRSA() local 54 version = useSHA256 ? 3 : 1; in checkRSA() 56 version = useSHA256 ? 4 : 2; in checkRSA() 67 return version; in checkRSA() 107 int version = check(key, useSHA256); in printRSA() local 115 if (version > 1) { in printRSA() 117 result.append(Integer.toString(version)); in printRSA() 172 int version = checkEC(key); in printEC() local 177 result.append(Integer.toString(version)); in printEC()
|
/system/core/libnativebridge/tests/ |
D | DummyNativeBridge2.cpp | 48 extern "C" bool native_bridge2_is_compatible_compatible_with(uint32_t version) { in native_bridge2_is_compatible_compatible_with() argument 50 return version <= 2; in native_bridge2_is_compatible_compatible_with() 67 .version = 2,
|
/system/bt/tools/scripts/ |
D | btsnooz.py | 72 version, last_timestamp_ms = struct.unpack_from('=bQ', snooz) 74 if version != 1 and version != 2: 75 sys.stderr.write('Unsupported btsnooz version: %s\n' % version) 83 if version == 1: 85 elif version == 2:
|
/system/core/libcutils/ |
D | native_handle.c | 40 h->version = sizeof(native_handle_t); in native_handle_create() 50 if (h->version != sizeof(native_handle_t)) in native_handle_delete() 59 if (h->version != sizeof(native_handle_t)) in native_handle_close()
|
/system/core/fastboot/ |
D | fastboot_protocol.txt | 75 Host: "getvar:version" request version variable 77 Client: "OKAY0.4" return version "0.4" 114 "getvar:%s" Read a config/version variable from the bootloader. 159 version Version of FastBoot protocol supported. 162 version-bootloader Version string for the Bootloader. 164 version-baseband Version string of the Baseband Software 191 followed by a 2-digit base-10 ASCII version number. For example, the version 1 196 The protocol version to use must be the minimum of the versions sent by each 197 side; if either side cannot speak this protocol version, it should disconnect. 210 "version" and "none". [all …]
|