Home
last modified time | relevance | path

Searched refs:nla_data (Results 1 – 6 of 6) sorted by relevance

/kernel/tests/net/test/
Dgenetlink.py83 nla, nla_data, data = self._ReadNlAttr(data)
86 op_id = struct.unpack("=I", nla_data)[0]
88 nla, nla_data, data = self._ReadNlAttr(data)
91 op_flags = struct.unpack("=I", nla_data)[0]
96 def _Decode(self, command, msg, nla_type, nla_data, nested): argument
102 data = struct.unpack("=H", nla_data)[0]
104 data = nla_data.strip(b"\x00")
106 data = struct.unpack("=I", nla_data)[0]
108 data = self._DecodeOps(nla_data)
110 data = nla_data
Dtcp_metrics.py65 def _Decode(self, command, msg, nla_type, nla_data, nested): argument
71 data = inet_ntop(AF_INET, nla_data)
73 data = inet_ntop(AF_INET6, nla_data)
75 data = struct.unpack("=Q", nla_data)[0]
77 data = struct.unpack("=I", nla_data)[0]
79 data = struct.unpack("=H", nla_data)[0]
81 data = nla_data
83 data = binascii.hexlify(nla_data)
Dnetlink.py120 def _Decode(self, command, msg, nla_type, nla_data, nested): argument
122 return nla_type, nla_data
131 nla_data, data = data[:datalen], data[padded_len:]
133 return nla, nla_data, data
156 nla, nla_data, data = self._ReadNlAttr(data)
159 nla_name, nla_data = self._Decode(command, msg, nla.nla_type, nla_data, nested)
164 attributes[nla_name] = nla_data
166 self._Debug(" %s" % (str((nla_name, nla_data))))
Dsock_diag.py120 def _Decode(self, command, msg, nla_type, nla_data, nested): argument
134 data = ord(nla_data)
136 data = nla_data.strip(b"\x00")
138 data = InetDiagMeminfo(nla_data)
141 data = TcpInfo(nla_data)
143 data = SkMeminfo(nla_data)
145 data = struct.unpack("=I", nla_data)[0]
147 data = self.DecodeBytecode(nla_data)
150 while len(nla_data):
154 addr, nla_data = cstruct.Read(nla_data, csocket.SockaddrStorage)
[all …]
Diproute.py292 def _Decode(self, command, msg, nla_type, nla_data, nested): argument
355 data = struct.unpack("=I", nla_data)[0]
364 elif name in ["IFLA_VTI_OKEY", "IFLA_VTI_IKEY"] and len(nla_data) == 4:
365 data = struct.unpack("!I", nla_data)[0]
367 data = struct.unpack("=i", nla_data)[0]
370 data = ord(nla_data)
373 data = socket.inet_ntop(msg.family, nla_data)
375 data = [struct.unpack("=I", nla_data[i:i+4])[0]
376 for i in range(0, len(nla_data), 4)]
378 data = socket.inet_ntop(AF_INET6, nla_data)
[all …]
Dxfrm.py371 def _Decode(self, command, unused_msg, nla_type, nla_data, nested): argument
376 data = cstruct.Read(nla_data, XfrmAlgo)[0]
378 data = cstruct.Read(nla_data, XfrmAlgoAuth)[0]
380 data = cstruct.Read(nla_data, XfrmEncapTmpl)[0]
382 data = cstruct.Read(nla_data, XfrmMark)[0]
384 data = struct.unpack("=I", nla_data)[0]
386 data = cstruct.Read(nla_data, XfrmUserTmpl)[0]
388 data = struct.unpack("=I", nla_data)[0]
390 data = nla_data