Home
last modified time | relevance | path

Searched refs:ICMP (Results 1 – 19 of 19) sorted by relevance

/openbmc/openbmc-test-automation/lib/
H A Dbmc_network_security_utils.robot10 [Documentation] Send TCP, UDP or ICMP packets to any network device and return packet loss.
18 # icmp_type Type of ICMP packets (e.g. 8, 13, 17, etc.).
23 # By default it sends 4 ICMP echo request packets at 1 packets/second.
49 # By default it sends 4 ICMP echo request packets at 1 packets/second.
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_network_security.robot4 # This Suite has few testcases which uses nping with ICMP.
5 # ICMP creates a raw socket, which requires root privilege/sudo to run tests.
32 Send ICMP Timestamp Request
33 [Documentation] Send ICMP packet type 13 and check BMC drops such packets
36 # Send ICMP packet type 13 to BMC and check packet loss.
42 Send ICMP Netmask Request
43 [Documentation] Send ICMP packet type 17 and check BMC drops such packets
46 # Send ICMP packet type 17 to BMC and check packet loss.
52 Send Continuous ICMP Echo Request To BMC And Verify No Packet Loss
53 [Documentation] Send ICMP packet type 8 continuously and check no packets are dropped from BMC
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/fping/
H A Dfping_5.3.bb1 SUMMARY = "sends ICMP ECHO_REQUEST packets to network hosts"
3 Message Protocol (ICMP) echo request to determine if a target host is \
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/iptraf/
H A Diptraf-ng_1.2.1.bb9 which shows TCP flag information, packet and byte counts, ICMP \
11 interface statistics showing IP, TCP, UDP, ICMP, non-IP and other IP \
/openbmc/openbmc/meta-security/recipes-security/isic/
H A Disic_0.07.bb2 …ilities to exercise the stability of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.)"
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/
H A Dconfig39 # Q: ICMP allowed types: [destination-unreachable echo-reply time-exceeded]
41 # Q: ICMP services to audit: [ ]
43 # Q: ICMP types to disallow outbound: [destination-unreachable time-exceeded]
/openbmc/docs/security/
H A Dnetwork-security-considerations.md45 ## Kernel and ICMP messages
55 Per [CVE 1999-0524][], responding to certain ICMP packets can give an attacker
57 attacks. OpenBMC responds to all ICMP requests.
61 General considerations for ICMP messages apply. For example, packet
/openbmc/openbmc-test-automation/network/
H A Dtest_network_nping.robot41 [Documentation] Send TCP, UDP or ICMP packets to the target.
/openbmc/openbmc/poky/meta/recipes-extended/iputils/iputils/
H A DCVE-2025-47268.patch6 Crafted ICMP Echo Reply packet can cause signed integer overflow in
/openbmc/openbmc/poky/meta/conf/distro/include/
H A Dcve-extra-exclusions.inc63 CVE_STATUS[CVE-1999-0524] = "ignored: cpe:*:linux_kernel:issue is that ICMP exists, can be filewall…
/openbmc/qemu/docs/specs/
H A Drocker.rst870 OF_DPA_ICMP_TYPE 1 ICMP type, only if IP
872 OF_DPA_ICMP_TYPE_MASK 1 ICMP type mask
873 OF_DPA_ICMP_CODE 1 ICMP code
874 OF_DPA_ICMP_CODE_MASK 1 ICMP code mask
/openbmc/u-boot/doc/
H A DREADME.m54418twr230 ping - send ICMP ECHO_REQUEST to network host
/openbmc/u-boot/board/freescale/m52277evb/
H A DREADME219 ping - send ICMP ECHO_REQUEST to network host
/openbmc/u-boot/board/freescale/m547xevb/
H A DREADME251 ping - send ICMP ECHO_REQUEST to network host
/openbmc/u-boot/arch/powerpc/include/asm/
H A Dprocessor.h646 #define ICMP SPRN_ICMP /* Instruction TLB Compare Register */ macro
/openbmc/u-boot/board/freescale/m5373evb/
H A DREADME234 ping - send ICMP ECHO_REQUEST to network host
/openbmc/u-boot/board/freescale/m54455evb/
H A DREADME323 ping - send ICMP ECHO_REQUEST to network host
/openbmc/u-boot/board/sandbox/
H A DREADME.sandbox283 Because only UDP is supported, ICMP traffic will not work, so expect that ping
/openbmc/u-boot/cmd/
H A DKconfig1315 Send ICMP ECHO_REQUEST to network host