summaryrefslogtreecommitdiffstats
path: root/regress/sys/net/pf_fragment/ping6_mtu_1300.py (follow)
Commit message (Expand)AuthorAgeFilesLines
* Switch to scapy with python 3.bluhm2020-12-251-6/+6
* Do not use privileged or NFS source ports for UDP packets as inetdbluhm2017-01-181-2/+2
* During sniffing filter strictly on icmp6 "packet too big" to avoidbluhm2016-10-201-1/+3
* By removing all the sleeps I created a race in the pf tests. Thebluhm2016-10-201-0/+1
* Replace fork() and sleep() with a Python thread for sniffing packets.bluhm2016-10-201-11/+21
* Fix tests: Restrict getpid() to lower 16 bit so that it can stillbluhm2016-05-221-1/+1
* Extend the pf forward and fragment tests with a second challengebluhm2015-08-241-3/+4
* Enable path MTU test with ping for IPv6. Scapy srp1() does notbluhm2015-08-241-2/+16
* Use a simpler expression to check the ether type in scapy. Thisbluhm2014-12-191-1/+1
* Kill trailing whitespaces.bluhm2012-07-101-1/+1
* Add a test suite to route ip fragments through a box running pf.bluhm2011-09-191-0/+23