summaryrefslogtreecommitdiffstats
path: root/regress/sys/netinet/pmtu/tcp_atomicfrag6.py
diff options
context:
space:
mode:
authorbluhm <bluhm@openbsd.org>2020-12-25 19:01:09 +0000
committerbluhm <bluhm@openbsd.org>2020-12-25 19:01:09 +0000
commite7abe75af641bacab1663afa28052d03f1e67610 (patch)
tree1ec0be4a3c08eae1304d087ff731da63b59fa37a /regress/sys/netinet/pmtu/tcp_atomicfrag6.py
parentSwitch to scapy with python 3. (diff)
downloadwireguard-openbsd-e7abe75af641bacab1663afa28052d03f1e67610.tar.xz
wireguard-openbsd-e7abe75af641bacab1663afa28052d03f1e67610.zip
Switch to scapy with python 3.
Diffstat (limited to 'regress/sys/netinet/pmtu/tcp_atomicfrag6.py')
-rwxr-xr-xregress/sys/netinet/pmtu/tcp_atomicfrag6.py30
1 files changed, 15 insertions, 15 deletions
diff --git a/regress/sys/netinet/pmtu/tcp_atomicfrag6.py b/regress/sys/netinet/pmtu/tcp_atomicfrag6.py
index 247068f9c9a..8352df61e19 100755
--- a/regress/sys/netinet/pmtu/tcp_atomicfrag6.py
+++ b/regress/sys/netinet/pmtu/tcp_atomicfrag6.py
@@ -1,4 +1,4 @@
-#!/usr/local/bin/python2.7
+#!/usr/local/bin/python3
import os
import threading
@@ -23,24 +23,24 @@ e=Ether(src=LOCAL_MAC, dst=REMOTE_MAC)
ip6=IPv6(src=FAKE_NET_ADDR6, dst=REMOTE_ADDR6)
tport=os.getpid() & 0xffff
-print "Send SYN packet, receive SYN+ACK."
+print("Send SYN packet, receive SYN+ACK.")
syn=TCP(sport=tport, dport='chargen', seq=1, flags='S', window=(2**16)-1)
synack=srp1(e/ip6/syn, iface=LOCAL_IF, timeout=5)
if synack is None:
- print "ERROR: no SYN+ACK from chargen server received"
+ print("ERROR: No SYN+ACK from chargen server received.")
exit(1)
-print "Send ACK packet, receive chargen data."
+print("Send ACK packet, receive chargen data.")
ack=TCP(sport=synack.dport, dport=synack.sport, seq=2, flags='A',
ack=synack.seq+1, window=(2**16)-1)
data=srp1(e/ip6/ack, iface=LOCAL_IF, timeout=5)
if data is None:
- print "ERROR: no data from chargen server received"
+ print("ERROR: No data from chargen server received.")
exit(1)
-print "Fill our receive buffer."
+print("Fill our receive buffer.")
time.sleep(1)
# srp1 cannot be used, fragment answer will not match outgoing ICMP6 packet
@@ -50,14 +50,14 @@ sniffer.filter = \
sniffer.start()
time.sleep(1)
-print "Send ICMP6 packet too big packet with MTU 1272."
+print("Send ICMP6 packet too big packet with MTU 1272.")
icmp6=ICMPv6PacketTooBig(mtu=1272)/data.payload
sendp(e/IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/icmp6, iface=LOCAL_IF)
-print "Path MTU discovery will not resend data, ICMP6 packet is ignored."
+print("Path MTU discovery will not resend data, ICMP6 packet is ignored.")
sniffer.join(timeout=5)
-print "IPv6 atomic fragments must not be generated."
+print("IPv6 atomic fragments must not be generated.")
frag=None
for a in sniffer.captured:
fh=a.payload.payload
@@ -70,25 +70,25 @@ for a in sniffer.captured:
break
if frag is not None:
- print "ERROR: matching IPv6 fragment TCP answer found"
+ print("ERROR: Matching IPv6 fragment TCP answer found.")
exit(1)
-print "Send ACK again to trigger retransmit."
+print("Send ACK again to trigger retransmit.")
data=srp1(e/ip6/ack, iface=LOCAL_IF, timeout=5)
if data is None:
- print "ERROR: no data retransmit from chargen server received"
+ print("ERROR: No data retransmit from chargen server received.")
exit(1)
-print "Cleanup the other's socket with a reset packet."
+print("Cleanup the other's socket with a reset packet.")
rst=TCP(sport=synack.dport, dport=synack.sport, seq=2, flags='AR',
ack=synack.seq+1)
sendp(e/ip6/rst, iface=LOCAL_IF)
len = data.plen + len(IPv6())
-print "len=%d" % len
+print("len=%d" % len)
if len != 1500:
- print "ERROR: TCP data packet len is %d, expected 1500." % len
+ print("ERROR: TCP data packet len is %d, expected 1500." % len)
exit(1)
exit(0)