summaryrefslogtreecommitdiffstats
path: root/regress/sys/netinet6/frag6/frag6_overdrop.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Wrap long lines.bluhm2020-12-251-5/+10
|
* Switch to scapy with python 3.bluhm2020-12-251-13/+13
|
* Use consistent address schema with local and remote machine. Fillbluhm2017-03-011-6/+7
| | | | variables with example IPs from my daily test run.
* Do not use privileged or NFS source ports for UDP packets as inetdbluhm2017-01-181-8/+10
| | | | | ignores such packets. This should avoid some sporadic failures. While there, use variable names consistently in all tests.
* Put all make targets in a loop and print a little more what eachbluhm2016-11-171-2/+2
| | | | IPv6 fragment header test is doing.
* Fix tests: Restrict getpid() to lower 16 bit so that it can stillbluhm2016-05-221-1/+1
| | | | | be used as packet id. Now scapy calls nexthopmtu with this name explicitly in icmp structure.
* Use a simpler expression to check the ether type in scapy. Thisbluhm2014-12-191-1/+1
| | | | makes the fragment tests work on FreeBSD. From Ilya Bakulin.
* fix typo in fragment payloadbluhm2013-07-231-1/+1
|
* After overlapping IPv6 fragments have been dropped, new fragmentsbluhm2012-01-231-5/+4
| | | | with the same id get reassembled into a valid packet. Adapt test.
* Do not read dstaddr from command line, get it from addr.py.bluhm2012-01-111-4/+3
|
* According to RFC 5722 we drop all IPv6 fragments that belong to abluhm2012-01-101-0/+55
packet with overlaps. Adapt existing tests and add one more.