summaryrefslogtreecommitdiffstats
path: root/regress/sys/netinet6/frag6/frag6_overdrop.py (follow)
Commit message (Expand)AuthorAgeFilesLines
* Wrap long lines.bluhm2020-12-251-5/+10
* Switch to scapy with python 3.bluhm2020-12-251-13/+13
* Use consistent address schema with local and remote machine. Fillbluhm2017-03-011-6/+7
* Do not use privileged or NFS source ports for UDP packets as inetdbluhm2017-01-181-8/+10
* Put all make targets in a loop and print a little more what eachbluhm2016-11-171-2/+2
* Fix tests: Restrict getpid() to lower 16 bit so that it can stillbluhm2016-05-221-1/+1
* Use a simpler expression to check the ether type in scapy. Thisbluhm2014-12-191-1/+1
* fix typo in fragment payloadbluhm2013-07-231-1/+1
* After overlapping IPv6 fragments have been dropped, new fragmentsbluhm2012-01-231-5/+4
* Do not read dstaddr from command line, get it from addr.py.bluhm2012-01-111-4/+3
* According to RFC 5722 we drop all IPv6 fragments that belong to abluhm2012-01-101-0/+55