summaryrefslogtreecommitdiffstats
path: root/regress/sys/net/pf_state/challenge_ack.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Switch to scapy with python 3.bluhm2020-12-241-8/+8
|
* Do not use privileged or NFS source ports for UDP packets as inetdbluhm2017-01-181-11/+11
| | | | | ignores such packets. This should avoid some sporadic failures. While there, use variable names consistently in all tests.
* Print better error message if test fails.bluhm2016-11-211-5/+9
|
* By removing all the sleeps I created a race in the pf tests. Thebluhm2016-10-201-2/+2
| | | | | | | | packet was sent and its reply received before the sniffer was up and running. So sleep a second after starting the sniffer thread but before sending the packet. With pf_forward 0m51.54s, pf_fragment 1m33.59s, pf_state 0m03.64s the test are still faster than with forking.
* Make the test faster. Move all the packet matching code into thebluhm2016-10-201-27/+19
| | | | | | pcap filter. That means the first packet sniffed is the correct one. In the success case, we can stop without waiting for a timeout. OK sashan@
* Add a test suite for pf state handling. It needs a remote machinebluhm2016-10-191-0/+68
to exchange packets, the remote kernel is tested. For now it only contains a challenge ack test written by sashan@. OK sashan@