Home
last modified time | relevance | path

Searched refs:payload (Results 1 – 25 of 270) sorted by relevance

1234567891011

/openbsd/regress/sys/net/pf_fragment/
H A Dping_cksum.py10 payload=b"a" * 1472 variable
12 ICMP(type='echo-request', id=eid)/payload)
13 ipcksum=IP(bytes(p.payload)).chksum
15 echocksum=IP(bytes(p.payload)).payload.chksum
19 a.payload.proto == 1 and \
20 icmptypes[a.payload.payload.type] == 'dest-unreach' and \
21 icmpcodes[a.payload.payload.type][a.payload.payload.code] == \
23 outeripcksum=a.payload.chksum
25 outercksum=a.payload.payload.chksum
27 q=a.payload.payload.payload
[all …]
H A Dudp_cksum.py13 payload=b"a" * 1472 variable
15 UDP(sport=uport, dport=9)/payload)
16 ipcksum=IP(bytes(p.payload)).chksum
18 udpcksum=IP(bytes(p.payload)).payload.chksum
22 a.payload.proto == 1 and \
23 icmptypes[a.payload.payload.type] == 'dest-unreach' and \
24 icmpcodes[a.payload.payload.type][a.payload.payload.code] == \
26 outeripcksum=a.payload.chksum
28 outercksum=a.payload.payload.chksum
30 q=a.payload.payload.payload
[all …]
H A Dping6_cksum.py10 payload=b"a" * 1452 variable
12 ICMPv6EchoRequest(id=eid, data=payload))
13 echocksum=IPv6(bytes(p.payload)).payload.cksum
17 ipv6nh[a.payload.nh] == 'ICMPv6' and \
18 icmp6types[a.payload.payload.type] == 'Packet too big':
19 outercksum=a.payload.payload.cksum
21 q=a.payload.payload.payload
23 icmp6types[q.payload.type] == 'Echo Request':
24 innercksum=q.payload.cksum
H A Dudp6_cksum.py13 payload=b"a" * 1452 variable
15 UDP(sport=uport, dport=9)/payload)
16 udpcksum=IPv6(bytes(p.payload)).payload.chksum
20 ipv6nh[a.payload.nh] == 'ICMPv6' and \
21 icmp6types[a.payload.payload.type] == 'Packet too big':
22 outercksum=a.payload.payload.cksum
24 q=a.payload.payload.payload
26 innercksum=q.payload.chksum
/openbsd/regress/sys/netinet6/frag6/
H A Dfrag6_refrag.py17 payload=b"ABCDEFGHIJKLMNOP" * 100 variable
19 ICMPv6EchoRequest(id=eid, data=payload)
20 request_cksum=ICMPv6Unknown(bytes(packet.payload)).cksum
27 while 40+8*(offset+chunk) < len(payload):
48 ipv6nh[a.payload.nh] == 'Fragment Header' and \
49 a.payload.payload.offset == 0 and \
50 ipv6nh[a.payload.payload.nh] == 'ICMPv6' and \
51 icmp6types[a.payload.payload.payload.type] == 'Echo Reply':
52 id=a.payload.payload.payload.id
57 reply_cksum=a.payload.payload.payload.cksum
H A Dfrag6_oversize.py16 payload=b"ABCDEFGHIJKLMNOP" variable
18 ICMPv6EchoRequest(id=eid, data=4095*payload)
47 print("type %d" % (a.payload.payload.type))
48 print("icmp %s" % (icmp6types[a.payload.payload.type]))
50 ipv6nh[a.payload.nh] == 'ICMPv6' and \
51 icmp6types[a.payload.payload.type] == 'Parameter problem':
52 print("code=%u" % (a.payload.payload.code))
54 if a.payload.payload.code != 0:
57 ptr=a.payload.payload.ptr
/openbsd/sys/dev/pci/drm/amd/display/dc/dce/
H A Ddce_aux.c537 if (payload->mot) in i2caux_action_from_payload()
543 if (payload->mot) in i2caux_action_from_payload()
548 if (payload->mot) in i2caux_action_from_payload()
553 if (payload->write) in i2caux_action_from_payload()
602 payload->data, payload->reply, in dce_aux_transfer_raw()
732 payload->address, in dce_aux_transfer_with_retries()
733 payload->length, in dce_aux_transfer_with_retries()
736 if (payload->write) in dce_aux_transfer_with_retries()
737 dce_aux_log_payload(" write", payload->data, payload->length, 16); in dce_aux_transfer_with_retries()
746 payload->length, in dce_aux_transfer_with_retries()
[all …]
/openbsd/regress/sys/netinet6/rip6cksum/
H A Dsendrecv.py38 payload = b""; variable
41 payload += pack('B', i)
42 print("payload length is", len(payload))
45 payload = payload[:ckoff] + pack("xx") + payload[ckoff+2:] variable
46 cksum = in6_chksum(255, ip, payload)
48 payload = payload[:ckoff] + pack("!H", cksum) + payload[ckoff+2:] variable
50 req=ip/payload
72 print("response icmp6 type is", res.payload.type)
73 if res.payload.type != 4:
82 cksum = in6_chksum(255, res, res.payload.load)
[all …]
/openbsd/regress/sys/netinet/frag/
H A Dfrag.py14 payload=b"ABCDEFGHIJKLMNOP" variable
16 ICMP(type='echo-request', id=eid)/payload
36 a.payload.proto == 1 and \
37 a.payload.frag == 0 and a.payload.flags == 0 and \
38 icmptypes[a.payload.payload.type] == 'echo-reply':
39 id=a.payload.payload.id
44 data=a.payload.payload.payload.load
46 if data == payload:
48 print("PAYLOAD!=%s" % (payload))
H A Dfrag_opt.py14 payload=b"ABCDEFGHIJKLMNOP" variable
16 ICMP(type='echo-request', id=eid)/payload
36 a.payload.proto == 1 and \
37 a.payload.frag == 0 and a.payload.flags == 0 and \
38 icmptypes[a.payload.payload.type] == 'echo-reply':
39 id=a.payload.payload.id
44 data=a.payload.payload.payload.load
46 if data == payload:
48 print("PAYLOAD!=%s" % (payload))
H A Dfrag_overhead0.py14 payload=b"ABCDEFGHIJKLMNOP" variable
17 ICMP(type='echo-request', id=eid)/payload
37 a.payload.proto == 1 and \
38 a.payload.frag == 0 and a.payload.flags == 0 and \
39 icmptypes[a.payload.payload.type] == 'echo-reply':
40 id=a.payload.payload.id
45 data=a.payload.payload.payload.load
47 if data == payload:
49 print("PAYLOAD!=%s" % (payload))
H A Dfrag_overtail0.py14 payload=b"ABCDEFGHIJKLMNOP" variable
17 ICMP(type='echo-request', id=eid)/payload
37 a.payload.proto == 1 and \
38 a.payload.frag == 0 and a.payload.flags == 0 and \
39 icmptypes[a.payload.payload.type] == 'echo-reply':
40 id=a.payload.payload.id
45 data=a.payload.payload.payload.load
47 if data == payload:
49 print("PAYLOAD!=%s" % (payload))
H A Dfrag_udpheader.py17 payload=b"ABCDEFGHIJKLMNOP" variable
19 UDP(sport=uport, dport=7)/payload
39 a.payload.proto == 17 and \
40 a.payload.frag == 0 and a.payload.flags == 0 and \
41 a.payload.payload.sport == 7:
42 port=a.payload.payload.dport
47 data=a.payload.payload.payload.load
49 if data == payload:
51 print("PAYLOAD!=%s" % (payload))
H A Dfrag_udppayload.py17 payload=b"ABCDEFGHIJKLMNOP" variable
19 UDP(sport=uport, dport=7)/payload
39 a.payload.proto == 17 and \
40 a.payload.frag == 0 and a.payload.flags == 0 and \
41 a.payload.payload.sport == 7:
42 port=a.payload.payload.dport
47 data=a.payload.payload.payload.load
49 if data == payload:
51 print("PAYLOAD!=%s" % (payload))
H A Dfrag_maxpacket0.py16 payload=b"ABCDEFGHIJKLMNOP" variable
18 ICMP(type='echo-request', id=eid)/payload
40 a.payload.proto == 1 and \
41 a.payload.frag == 0 and a.payload.flags == 0 and \
42 icmptypes[a.payload.payload.type] == 'echo-reply':
43 id=a.payload.payload.id
48 data=a.payload.payload.payload.load
50 if data == payload:
52 print("PAYLOAD!=%s" % (payload))
H A Dfrag_padding.py14 payload=b"ABCDEFGHIJKLMNOP" variable
17 ICMP(type='echo-request', id=eid)/payload
38 a.payload.proto == 1 and \
39 a.payload.frag == 0 and a.payload.flags == 0 and \
40 icmptypes[a.payload.payload.type] == 'echo-reply':
41 id=a.payload.payload.id
46 data=a.payload.payload.payload.load
48 if data == payload:
50 print("PAYLOAD!=%s" % (payload))
H A Dfrag_zerofirst.py15 payload=b"ABCDEFGHIJKLMNOP" variable
17 ICMP(type='echo-request', id=eid)/payload
39 a.payload.proto == 1 and \
40 a.payload.frag == 0 and a.payload.flags == 0 and \
41 icmptypes[a.payload.payload.type] == 'echo-reply':
42 id=a.payload.payload.id
47 data=a.payload.payload.payload.load
49 if data == payload:
51 print("PAYLOAD!=%s" % (payload))
H A Dfrag_zerosecond.py15 payload=b"ABCDEFGHIJKLMNOP" variable
17 ICMP(type='echo-request', id=eid)/payload
39 a.payload.proto == 1 and \
40 a.payload.frag == 0 and a.payload.flags == 0 and \
41 icmptypes[a.payload.payload.type] == 'echo-reply':
42 id=a.payload.payload.id
47 data=a.payload.payload.payload.load
49 if data == payload:
51 print("PAYLOAD!=%s" % (payload))
H A Dfrag_mf0long.py15 payload=b"ABCDEFGHIJKLMNOP" variable
18 ICMP(type='echo-request', id=eid)/payload
40 a.payload.proto == 1 and \
41 a.payload.frag == 0 and a.payload.flags == 0 and \
42 icmptypes[a.payload.payload.type] == 'echo-reply':
43 id=a.payload.payload.id
48 data=a.payload.payload.payload.load
50 if data == payload:
52 print("PAYLOAD!=%s" % (payload))
H A Dfrag_mf0middle.py15 payload=b"ABCDEFGHIJKLMNOP" variable
18 ICMP(type='echo-request', id=eid)/payload
40 a.payload.proto == 1 and \
41 a.payload.frag == 0 and a.payload.flags == 0 and \
42 icmptypes[a.payload.payload.type] == 'echo-reply':
43 id=a.payload.payload.id
48 data=a.payload.payload.payload.load
50 if data == payload:
52 print("PAYLOAD!=%s" % (payload))
H A Dfrag_mf0short.py15 payload=b"ABCDEFGHIJKLMNOPQRSTUVWX" variable
18 ICMP(type='echo-request', id=eid)/payload
40 a.payload.proto == 1 and \
41 a.payload.frag == 0 and a.payload.flags == 0 and \
42 icmptypes[a.payload.payload.type] == 'echo-reply':
43 id=a.payload.payload.id
48 data=a.payload.payload.payload.load
50 if data == payload:
52 print("PAYLOAD!=%s" % (payload))
H A Dfrag_mf1end.py15 payload=b"ABCDEFGHIJKLMNOP" variable
18 ICMP(type='echo-request', id=eid)/payload
40 a.payload.proto == 1 and \
41 a.payload.frag == 0 and a.payload.flags == 0 and \
42 icmptypes[a.payload.payload.type] == 'echo-reply':
43 id=a.payload.payload.id
48 data=a.payload.payload.payload.load
50 if data == payload:
52 print("PAYLOAD!=%s" % (payload))
H A Dfrag_overhead.py15 payload=b"ABCDEFGHIJKLMNOP" variable
18 ICMP(type='echo-request', id=eid)/payload
40 a.payload.proto == 1 and \
41 a.payload.frag == 0 and a.payload.flags == 0 and \
42 icmptypes[a.payload.payload.type] == 'echo-reply':
43 id=a.payload.payload.id
48 data=a.payload.payload.payload.load
50 if data == payload:
52 print("PAYLOAD!=%s" % (payload))
H A Dfrag_overhead1.py15 payload=b"ABCDEFGHIJKLMNOP" variable
18 ICMP(type='echo-request', id=eid)/payload
40 a.payload.proto == 1 and \
41 a.payload.frag == 0 and a.payload.flags == 0 and \
42 icmptypes[a.payload.payload.type] == 'echo-reply':
43 id=a.payload.payload.id
48 data=a.payload.payload.payload.load
50 if data == payload:
52 print("PAYLOAD!=%s" % (payload))
H A Dfrag_overtail.py15 payload=b"ABCDEFGHIJKLMNOP" variable
18 ICMP(type='echo-request', id=eid)/payload
40 a.payload.proto == 1 and \
41 a.payload.frag == 0 and a.payload.flags == 0 and \
42 icmptypes[a.payload.payload.type] == 'echo-reply':
43 id=a.payload.payload.id
48 data=a.payload.payload.payload.load
50 if data == payload:
52 print("PAYLOAD!=%s" % (payload))

1234567891011