/freebsd/sbin/ping/tests/ |
H A D | test_ping.py | 208 ping utility 217 "/sbin/ping", 244 ) as ping: 264 stdout, stderr = ping.communicate() 266 ping.args, ping.returncode, stdout, stderr 271 """Redact some elements of ping's output""" 297 "args": "ping -4 -c1 -s56 -t1 localhost", 300 PING localhost: 56 data bytes 303 --- localhost ping statistics --- 313 "args": "ping -6 -c1 -s8 -t1 localhost", [all …]
|
H A D | ping_test.sh | 51 ping -4 -c 1 -s 56 -t 1 localhost 58 atf_set "descr" "Check that ping -S 127.0.0.1 localhost succeeds" 65 ping -c 1 -s 56 -t 1 -S 127.0.0.1 localhost 78 ping -6 -c 1 -s 8 -t 1 localhost 85 atf_set "descr" "Check that ping -S ::1 localhost succeeds" 92 ping -c 1 -s 8 -t 1 -S ::1 localhost 112 atf_set "descr" "-t6 is not interpreted as -t -6 by ping" 117 atf_check -s exit:0 -o ignore -e empty ping -c1 -t6 127.0.0.1 142 ping -4 -6 localhost 156 ping -6 -4 localhost [all …]
|
/freebsd/tests/sys/netpfil/pf/ |
H A D | pass_block.sh | 86 # Trivial ping to the jail, without pf 87 atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.2 89 # pf without policy will let us ping 91 atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.2 95 atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.2 99 atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.2 125 # Trivial ping to the jail, without pf 126 atf_check -s exit:0 -o ignore ping -6 -c 1 -W 1 2001:db8:42::2 128 # pf without policy will let us ping 130 atf_check -s exit:0 -o ignore ping -6 -c 1 -W 1 2001:db8:42::2 [all …]
|
H A D | ether.sh | 53 atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.2 55 # Now enable. Ping should fail. 58 atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.2 63 atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.2 68 atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.2 73 atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.2 78 atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.2 83 atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.2 88 atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.2 92 atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.2 [all …]
|
H A D | fragmentation_pass.sh | 61 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2 63 # We can ping with < 64 fragments 64 atf_check -s exit:0 -o ignore ping -c 1 -s 800 192.0.2.2 67 atf_check -s exit:2 -o ignore ping -c 1 -s 20000 192.0.2.2 123 ping -6 -c 1 2001:db8:42::2 126 ping -6 -c 1 -s 4500 2001:db8:42::2 129 ping -6 -c 1 -b 70000 -s 65000 2001:db8:42::2 132 ping -6 -c 1 ${lladdr}%${epair_send}a 135 ping -6 -c 1 -b 70000 -s 65000 ${lladdr}%${epair_send}a 139 ping -6 -c 1 2001:db8:43::3 [all …]
|
H A D | altq.sh | 22 atf_check -s exit:0 -o ignore ping -i .1 -c 3 -s 1200 192.0.2.2 30 # single ping succeeds just fine 31 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2 34 ping -i .1 -c 5 -s 1200 192.0.2.2 37 atf_check -s exit:2 -o ignore ping -c 1 -s 1200 192.0.2.2 64 atf_check -s exit:0 -o ignore ping -i .1 -c 3 -s 1200 192.0.2.2 74 # single ping succeeds just fine 75 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2 78 ping -i .1 -c 5 -s 1200 192.0.2.2 81 atf_check -s exit:2 -o ignore ping -c 1 -s 1200 192.0.2.2 [all …]
|
H A D | fragmentation_compat.sh | 58 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2 60 # We can ping with < 64 fragments 61 atf_check -s exit:0 -o ignore ping -c 1 -s 800 192.0.2.2 64 atf_check -s exit:2 -o ignore ping -c 1 -s 20000 192.0.2.2 119 ping -6 -c 1 2001:db8:42::2 122 ping -6 -c 1 -s 4500 2001:db8:42::2 125 ping -6 -c 1 -b 70000 -s 65000 2001:db8:42::2 128 ping -6 -c 1 ${lladdr}%${epair_send}a 131 ping -6 -c 1 -b 70000 -s 65000 ${lladdr}%${epair_send}a 135 ping -6 -c 1 2001:db8:43::3 [all …]
|
H A D | mbuf.sh | 55 atf_check -s exit:0 -o ignore ping -c1 192.0.2.2 61 atf_check -s not-exit:0 -o ignore ping -c1 -t1 192.0.2.2 67 atf_check -s exit:0 -o ignore ping -c1 192.0.2.2 73 atf_check -s exit:0 -o ignore ping -c1 192.0.2.2 79 atf_check -s exit:0 -o ignore ping -c1 192.0.2.2 86 atf_check -s exit:0 -o ignore ping -c1 192.0.2.2 113 atf_check -s exit:0 -o ignore ping -c1 2001:db8::2 120 atf_check -s not-exit:0 -o ignore ping -c1 -t1 2001:db8::2 132 atf_check -s exit:0 -o ignore ping -c1 2001:db8::2 138 atf_check -s exit:0 -o ignore ping -c1 2001:db8::2 [all …]
|
H A D | set_skip.sh | 50 atf_check -s exit:0 -o ignore jexec alcatraz ping -c 1 127.0.0.1 62 # And now our ping is blocked 63 atf_check -s exit:2 -o ignore jexec alcatraz ping -c 1 127.0.0.1 96 atf_check -s exit:0 -o ignore jexec alcatraz ping -c 1 127.0.0.1 105 # And now our ping is blocked 106 atf_check -s exit:2 -o ignore jexec alcatraz ping -c 1 127.0.0.1 135 atf_check -s exit:0 -o ignore jexec alcatraz ping -c 1 127.0.0.1 138 atf_check -s exit:0 -o ignore jexec alcatraz ping -c 1 127.0.0.1 171 atf_check -s exit:0 -o ignore jexec alcatraz ping -c 1 192.0.2.2 199 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2 [all …]
|
H A D | src_track.sh | 54 ping -c 3 192.0.2.1 101 ping -c 1 -S 192.0.2.2 192.0.2.1 103 ping -c 1 -S 192.0.2.3 192.0.2.1 160 ping_server_check_reply exit:0 --ping-type=tcp3way --send-sport=4201 --fromaddr 2001:db8:44::1 161 ping_server_check_reply exit:0 --ping-type=tcp3way --send-sport=4202 --fromaddr 2001:db8:44::1 162 ping_server_check_reply exit:0 --ping-type=tcp3way --send-sport=4203 --fromaddr 2001:db8:44::1 164 ping_server_check_reply exit:0 --ping-type=tcp3way --send-sport=4204 --fromaddr 2001:db8:44::1 166 ping_server_check_reply exit:0 --ping-type=tcp3way --send-sport=4205 --fromaddr 2001:db8:44::2 220 ping_server_check_reply exit:0 --ping-type=tcp3way --send-sport=4211 --fromaddr 2001:db8:44::1 221 ping_server_check_reply exit:0 --ping-type=tcp3way --send-sport=4212 --fromaddr 2001:db8:44::1 [all …]
|
H A D | fragmentation_no_reassembly.sh | 43 ping_dummy_check_request exit:0 --ping-type=icmp 51 ping_dummy_check_request exit:0 --ping-type=icmp 52 ping_dummy_check_request exit:1 --ping-type=icmp --send-length=2000 --send-frag-length 1000 74 ping_dummy_check_request exit:0 --ping-type=icmp 81 ping_dummy_check_request exit:1 --ping-type=icmp 82 ping_dummy_check_request exit:0 --ping-type=icmp --send-length=2000 --send-frag-length 1000 104 ping_dummy_check_request exit:0 --ping-type=icmp 115 ping_dummy_check_request exit:1 --ping-type=icmp 116 ping_dummy_check_request exit:0 --ping-type=icmp --send-length=2000 --send-frag-length 1000
|
H A D | divert-to.sh | 94 atf_check -s exit:0 -o ignore ping -c3 192.0.2.2 107 atf_check -s not-exit:0 -o ignore ping -c1 -t1 192.0.2.2 133 atf_check -s exit:0 -o ignore ping -c3 192.0.2.2 146 atf_check -s exit:0 -o ignore ping -c1 192.0.2.2 172 atf_check -s exit:0 -o ignore ping -c3 192.0.2.2 186 atf_check -s not-exit:0 -o ignore ping -c1 -t1 192.0.2.2 212 atf_check -s exit:0 -o ignore ping -c3 192.0.2.2 226 atf_check -s exit:0 -o ignore ping -c1 192.0.2.2 263 atf_check -s exit:0 -o ignore ping -c3 192.0.2.2 266 atf_check -s exit:0 -o ignore ping -c3 198.51.100.2 [all …]
|
H A D | nat66.py | 151 # For unclear reasons vnet3 doesn't respond to the first ping. 153 ToolsHelper.print_output("/sbin/ping -6 -c 1 2001:db8:1::2") 154 ToolsHelper.print_output("/sbin/ping -6 -c 1 2001:db8:1::2") 159 # A ping that easily passes without fragmentation 162 # Send a ping that just barely doesn't need to be fragmented 165 # Send a ping that just barely needs to be fragmented 168 # A ping that arrives fragmented 181 # For unclear reasons vnet3 doesn't respond to the first ping. 183 ToolsHelper.print_output("/sbin/ping -6 -c 1 -S 2001:db8::3 2001:db8:1::2") 184 ToolsHelper.print_output("/sbin/ping -6 -c 1 -S 2001:db8::3 2001:db8:1::2") [all …]
|
H A D | anchor.sh | 144 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1 151 atf_check -s exit:2 -o ignore ping -c 1 192.0.2.1 156 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1 216 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1 225 # We can still ping because the anchor is 'quick' 226 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1 254 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1 265 ping -c 1 192.0.2.1 270 # We can still ping because the anchor is 'quick' 271 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1 [all …]
|
H A D | match.sh | 47 atf_check -s exit:0 -o ignore ping -i .1 -c 3 -s 1200 192.0.2.2 55 # single ping succeeds just fine 56 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2 59 ping -i .1 -c 5 -s 1200 192.0.2.2 62 atf_check -s exit:2 -o ignore ping -c 1 -s 1200 192.0.2.2 89 ping -c 1 192.0.2.2 99 ping -c 1 192.0.2.2 107 ping -c 1 192.0.2.2
|
H A D | pflow.sh | 47 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1 102 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1 112 ping -c 1 192.0.2.1 124 ping -c 1 192.0.2.1 133 ping -c 1 192.0.2.1 164 ping -6 -c 1 2001:db8::1 175 ping -6 -c 1 2001:db8::1 226 ping -c 1 198.51.100.2 257 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1 267 # No flow is generated if we ping from 192.0.2.3 [all …]
|
H A D | route_to.sh | 286 atf_check -s exit:0 -o ignore ping -c 1 198.51.100.2 301 # ping reports the ICMP error, so check of that too. 303 ping -D -c 1 -s 1000 198.51.100.2 338 atf_check -s exit:0 -o ignore ping -c 1 -t 1 192.0.2.1 345 # The ping request will pass, but take 1.2 seconds 347 atf_check -s exit:0 -o ignore ping -c 1 -t 2 192.0.2.1 349 atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.1 355 # The ping request will pass, but take 1.2 seconds 357 atf_check -s exit:0 -o ignore ping -c 1 -t 2 192.0.2.1 359 atf_check -s exit:2 -o ignore ping -c 1 -t 1 192.0.2.1 [all …]
|
H A D | synproxy.sh | 64 # Sanity check, can we ping singing 65 atf_check -s exit:0 -o ignore ping -c 1 198.51.100.2 68 reply=$(echo ping | nc -N 198.51.100.2 7) 69 if [ "${reply}" != "ping" ]; 105 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.1 108 reply=$(echo ping | nc -N -w 5 192.0.2.1 7) 109 if [ "${reply}" != "ping" ]; 147 reply=$(echo ping | nc -N -w 5 2001:db8:42::2 7) 148 if [ "${reply}" != "ping" ];
|
/freebsd/tests/sys/net/if_ovpn/ |
H A D | if_ovpn.sh | 50 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 94 atf_check -s exit:0 -o ignore jexec b ping -c 1 198.51.100.1 97 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1 101 atf_check -s exit:2 -o ignore jexec b ping -t 1 -c 1 198.51.100.1 129 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 173 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1 201 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 321 atf_check -s exit:0 -o ignore jexec b ping -c 3 198.51.100.1 327 ping -c 1 -s $i 198.51.100.1 443 atf_check -s exit:0 -o ignore jexec a ping -c 1 192.0.2.2 [all …]
|
/freebsd/tests/sys/netpfil/common/ |
H A D | nat.sh | 66 # ping fails without NAT configuration 67 atf_check -s exit:2 -o ignore jexec client1 ping -t 1 -c 1 198.51.100.2 68 atf_check -s exit:2 -o ignore jexec client2 ping -t 1 -c 1 198.51.100.2 81 # ping is successful now 82 atf_check -s exit:0 -o ignore jexec client1 ping -t 1 -c 1 198.51.100.2 83 atf_check -s exit:0 -o ignore jexec client2 ping -t 1 -c 1 198.51.100.2 129 # ping fails without NAT configuration 130 atf_check -s exit:2 -o ignore jexec client1 ping -t 1 -c 1 198.51.100.2 131 atf_check -s exit:2 -o ignore jexec client2 ping -t 1 -c 1 198.51.100.2 138 # ping is successful now [all …]
|
H A D | dummynet.sh | 49 atf_check -s exit:0 -o ignore ping -i .1 -c 3 -s 1200 192.0.2.2 59 # single ping succeeds just fine 60 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2 63 ping -c 5 -s 1200 192.0.2.2 & 64 sleep 1 # Give ping the chance to start. 96 atf_check -s exit:0 -o ignore ping -i .1 -c 3 -s 1200 192.0.2.2 106 # single ping succeeds just fine 107 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2 110 ping -i .1 -c 5 -s 1200 192.0.2.2 113 atf_check -s exit:2 -o ignore ping -c 1 -s 1200 192.0.2.2 [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/iio/proximity/ |
H A D | parallax-ping.yaml | 4 $id: http://devicetree.org/schemas/iio/proximity/parallax-ping.yaml# 7 title: Parallax PING))) and LaserPING range finder 14 - ping-gpios is raised by the driver to start measurement 15 - direction of ping-gpio is then switched into input with an interrupt 20 http://parallax.com/sites/default/files/downloads/28015-PING-Documentation-v1.6.pdf 25 - parallax,ping 28 ping-gpios: 43 - ping-gpios 52 ping-gpios = <&gpio0 26 GPIO_ACTIVE_HIGH>;
|
/freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/funcs/ |
H A D | tst.system.d.out | 2 PING 127.0.0.1 (127.0.0.1): 56 data bytes 4 --- 127.0.0.1 ping statistics --- 7 PING 127.0.0.1 (127.0.0.1): 56 data bytes 9 --- 127.0.0.1 ping statistics --- 12 PING 127.0.0.1 (127.0.0.1): 56 data bytes 14 --- 127.0.0.1 ping statistics ---
|
/freebsd/sys/contrib/device-tree/Bindings/net/ |
H A D | xlnx,emaclite.yaml | 36 xlnx,tx-ping-pong: 38 description: hardware supports tx ping pong buffer. 40 xlnx,rx-ping-pong: 42 description: hardware supports rx ping pong buffer. 61 xlnx,rx-ping-pong; 62 xlnx,tx-ping-pong;
|
/freebsd/contrib/netbsd-tests/net/carp/ |
H A D | t_basic.sh | 79 $DEBUG && echo "Trying ping $IP_CARP" 80 rump.ping -n -w 1 -c 1 $IP_CARP >/dev/null 82 $DEBUG && echo "Passed ping $IP_CARP" 85 $DEBUG && echo "Failed ping $IP_CARP" 114 rump.ping -n -w $TIMEOUT -c 1 $IP_MASTER 116 rump.ping -n -w $TIMEOUT -c 1 $IP_BACKUP 134 rump.ping -n -w $TIMEOUT -c 1 $IP_CARP 142 rump.ping -n -w $TIMEOUT -c 1 $IP_MASTER
|