HomeSort by relevance Sort by last modified time
    Searched refs:ip_xfrm_state (Results 1 - 2 of 2) sorted by null

  /tools/test/connectivity/acts/framework/acts/test_utils/net/
ipsec_test_utils.py 133 ip_xfrm_state = ad.adb.shell("ip -s xfrm state")
134 ad.log.info("XFRM STATE:\n%s\n" % ip_xfrm_state)
163 ip_xfrm_state = ad.adb.shell("ip -s xfrm state")
164 ad.log.info("XFRM STATE:\n%s\n" % ip_xfrm_state)
191 ip_xfrm_state = ad.adb.shell("ip -s xfrm state")
192 ad.log.info("XFRM STATE:\n%s\n" % ip_xfrm_state)
211 ip_xfrm_state = ad.adb.shell("ip -s xfrm state")
212 ad.log.info("XFRM STATE on %s:\n%s\n" % (ad.serial, ip_xfrm_state))
213 pattern = re.findall(r'\d+\(packets\)', ip_xfrm_state)
  /tools/test/connectivity/acts/tests/google/net/
LegacyVpnTest.py 162 ip_xfrm_state = self.dut.adb.shell("ip xfrm state")
163 match_obj = re.search(r'hmac(.*)', "%s" % ip_xfrm_state)
165 ip_xfrm_state = format(match_obj.group(0)).split()
166 self.log.info("HMAC for ESP is %s " % ip_xfrm_state[0])

Completed in 526 milliseconds