summaryrefslogtreecommitdiffstats
path: root/regress/sys/netinet (follow)
Commit message (Expand)AuthorAgeFilesLines
* ESP path MTU discovery over IPv6 tunnel has been fixed. Add test.bluhm2021-02-011-6/+76
* Test path MTU discovery with IPv6 TCP packets tunneled in IPv4 ESP.bluhm2021-01-203-17/+75
* py3-scapy is now scapykn2020-12-303-9/+9
* getifaddrs() can return entries where ifa_addr is NULL. Check for thisbenno2020-12-301-2/+3
* Missed a python2.7, scapy 2, copyright bump in previous scapy 3 commits.bluhm2020-12-261-13/+13
* Wrap long lines.bluhm2020-12-261-2/+2
* Send fragment that reaches beyond max packet length. pf ignoresbluhm2020-12-252-1/+60
* Switch to scapy with python 3.bluhm2020-12-256-73/+72
* Switch to scapy with python 3.bluhm2020-12-2524-263/+263
* Switch to scapy with python 3.bluhm2020-12-2514-101/+100
* Test that IPv4 path MTU discovery works over IPsec in tunnel mode.bluhm2020-12-212-3/+53
* Use regress framework for setup and shorten target names.bluhm2020-12-201-41/+47
* Link broadcast_bind, carp, in_pcbbind, sendsrcaddr regress to build.bluhm2020-12-171-2/+10
* Use ${SUDO} or skip test if not root.bluhm2020-12-171-3/+3
* Remove echo headlines.bluhm2020-12-175-81/+5
* Do not create files as dependency of .BEGIN rule. Noticed bybluhm2020-01-152-7/+7
* Rework when tests have to be skipped due to insufficient configurationbluhm2020-01-081-1/+7
* The IPsec policy check for IPComp bundles has been fixed in thebluhm2019-12-201-11/+11
* Make checksum comparison more robust. 0xffff is the same as 0.bluhm2019-09-191-1/+1
* Ignore missing pseudo terminal for ssh when called from cron job.bluhm2019-09-051-5/+5
* Name environment variables consistently.bluhm2019-09-054-21/+21
* Minimize differences between IPv4 and IPv6 multicast tests.bluhm2019-09-054-61/+98
* Create remote log files in obj directory.bluhm2019-09-031-15/+15
* Link multicast tests to regress build.bluhm2019-09-021-2/+2
* Test multicast sender, receiver, router. Minimal mcroute implmentationbluhm2019-09-025-0/+834
* Simplify the detection for installed python and scapy. Refactorbluhm2019-05-103-100/+79
* Always try to build packet reflector on remote machine. It may bebluhm2018-09-281-1/+2
* Send many small fragments that exceed the pf reassembly queue limit.bluhm2018-09-102-1/+77
* Fragment one large 64k IP ping packet into 155 fragments, each withbluhm2018-09-071-0/+62
* Use correct environment variable to access remote machine.bluhm2018-08-301-3/+3
* Replace fork with sniffer thread in Python. Clear the BPF listbluhm2018-07-305-40/+129
* zap empty lineanton2018-07-081-2/+1
* hook up recvmsganton2018-07-041-2/+2
* Add regress covering the recently fixed mbuf double free in rip_usrreq().anton2018-07-042-0/+97
* Make sure that the inetd echo and nonxt protocol reflectors arebluhm2018-05-281-2/+9
* Activate IPv6 no next header protocol over IPsec test. Run thebluhm2018-05-214-28/+112
* Install inetd.conf files and start the daemon on remote machinesbluhm2018-05-191-17/+53
* Additionally send no next header protocol 59 packets through thebluhm2018-05-193-14/+285
* Typo fix, ok bluhm@mpi2018-05-151-4/+4
* Disable counting TCP packets in the test as it does not work reliably.bluhm2018-04-121-23/+4
* Clean up pf rules and states on remote machine so that they do notbluhm2017-09-152-4/+13
* Link regress/sys/netinet/frag to build. Get IPv4 and IPv6 fragmentbluhm2017-09-0719-76/+188
* Copy IPv6 fragment test cases to IPv4 and adapt to the different bluhm2017-09-0721-0/+1195
* Rewrite regress sendsrcaddr so that is uses UDP sockets on localhost,bluhm2017-07-112-319/+232
* Remove useless make depend targets.bluhm2017-07-073-9/+3
* Initialize the return value and do not use garbage as exit status.bluhm2017-07-061-1/+4
* Now that pf looks behind IPv4 authentication headers, disable thebluhm2017-05-281-2/+5
* Do not use reject routes as they prevent path MTU discovery.bluhm2017-05-271-14/+30
* Try to work around a race in the daily test run. Before killingbluhm2017-05-151-1/+2
* Run all IPsec tests with a pf rule that logs everything on the enc0bluhm2017-05-123-15/+69