diff options
author | 2020-12-25 19:01:09 +0000 | |
---|---|---|
committer | 2020-12-25 19:01:09 +0000 | |
commit | e7abe75af641bacab1663afa28052d03f1e67610 (patch) | |
tree | 1ec0be4a3c08eae1304d087ff731da63b59fa37a /regress/sys/netinet/pmtu/tcp_atomicfrag6.py | |
parent | Switch to scapy with python 3. (diff) | |
download | wireguard-openbsd-e7abe75af641bacab1663afa28052d03f1e67610.tar.xz wireguard-openbsd-e7abe75af641bacab1663afa28052d03f1e67610.zip |
Switch to scapy with python 3.
Diffstat (limited to 'regress/sys/netinet/pmtu/tcp_atomicfrag6.py')
-rwxr-xr-x | regress/sys/netinet/pmtu/tcp_atomicfrag6.py | 30 |
1 files changed, 15 insertions, 15 deletions
diff --git a/regress/sys/netinet/pmtu/tcp_atomicfrag6.py b/regress/sys/netinet/pmtu/tcp_atomicfrag6.py index 247068f9c9a..8352df61e19 100755 --- a/regress/sys/netinet/pmtu/tcp_atomicfrag6.py +++ b/regress/sys/netinet/pmtu/tcp_atomicfrag6.py @@ -1,4 +1,4 @@ -#!/usr/local/bin/python2.7 +#!/usr/local/bin/python3 import os import threading @@ -23,24 +23,24 @@ e=Ether(src=LOCAL_MAC, dst=REMOTE_MAC) ip6=IPv6(src=FAKE_NET_ADDR6, dst=REMOTE_ADDR6) tport=os.getpid() & 0xffff -print "Send SYN packet, receive SYN+ACK." +print("Send SYN packet, receive SYN+ACK.") syn=TCP(sport=tport, dport='chargen', seq=1, flags='S', window=(2**16)-1) synack=srp1(e/ip6/syn, iface=LOCAL_IF, timeout=5) if synack is None: - print "ERROR: no SYN+ACK from chargen server received" + print("ERROR: No SYN+ACK from chargen server received.") exit(1) -print "Send ACK packet, receive chargen data." +print("Send ACK packet, receive chargen data.") ack=TCP(sport=synack.dport, dport=synack.sport, seq=2, flags='A', ack=synack.seq+1, window=(2**16)-1) data=srp1(e/ip6/ack, iface=LOCAL_IF, timeout=5) if data is None: - print "ERROR: no data from chargen server received" + print("ERROR: No data from chargen server received.") exit(1) -print "Fill our receive buffer." +print("Fill our receive buffer.") time.sleep(1) # srp1 cannot be used, fragment answer will not match outgoing ICMP6 packet @@ -50,14 +50,14 @@ sniffer.filter = \ sniffer.start() time.sleep(1) -print "Send ICMP6 packet too big packet with MTU 1272." +print("Send ICMP6 packet too big packet with MTU 1272.") icmp6=ICMPv6PacketTooBig(mtu=1272)/data.payload sendp(e/IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/icmp6, iface=LOCAL_IF) -print "Path MTU discovery will not resend data, ICMP6 packet is ignored." +print("Path MTU discovery will not resend data, ICMP6 packet is ignored.") sniffer.join(timeout=5) -print "IPv6 atomic fragments must not be generated." +print("IPv6 atomic fragments must not be generated.") frag=None for a in sniffer.captured: fh=a.payload.payload @@ -70,25 +70,25 @@ for a in sniffer.captured: break if frag is not None: - print "ERROR: matching IPv6 fragment TCP answer found" + print("ERROR: Matching IPv6 fragment TCP answer found.") exit(1) -print "Send ACK again to trigger retransmit." +print("Send ACK again to trigger retransmit.") data=srp1(e/ip6/ack, iface=LOCAL_IF, timeout=5) if data is None: - print "ERROR: no data retransmit from chargen server received" + print("ERROR: No data retransmit from chargen server received.") exit(1) -print "Cleanup the other's socket with a reset packet." +print("Cleanup the other's socket with a reset packet.") rst=TCP(sport=synack.dport, dport=synack.sport, seq=2, flags='AR', ack=synack.seq+1) sendp(e/ip6/rst, iface=LOCAL_IF) len = data.plen + len(IPv6()) -print "len=%d" % len +print("len=%d" % len) if len != 1500: - print "ERROR: TCP data packet len is %d, expected 1500." % len + print("ERROR: TCP data packet len is %d, expected 1500." % len) exit(1) exit(0) |