summaryrefslogtreecommitdiffstats
path: root/regress/sys/netinet6/frag6/frag6_overhead.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Wrap long lines.bluhm2020-12-251-3/+6
|
* Switch to scapy with python 3.bluhm2020-12-251-12/+12
|
* Link regress/sys/netinet/frag to build. Get IPv4 and IPv6 fragmentbluhm2017-09-071-6/+3
| | | | tests into common shape. Add some missing test cases.
* Use consistent address schema with local and remote machine. Fillbluhm2017-03-011-6/+7
| | | | variables with example IPs from my daily test run.
* Do not use privileged or NFS source ports for UDP packets as inetdbluhm2017-01-181-7/+9
| | | | | ignores such packets. This should avoid some sporadic failures. While there, use variable names consistently in all tests.
* Put all make targets in a loop and print a little more what eachbluhm2016-11-171-1/+2
| | | | IPv6 fragment header test is doing.
* Fix tests: Restrict getpid() to lower 16 bit so that it can stillbluhm2016-05-221-1/+1
| | | | | be used as packet id. Now scapy calls nexthopmtu with this name explicitly in icmp structure.
* Use a simpler expression to check the ether type in scapy. Thisbluhm2014-12-191-1/+1
| | | | makes the fragment tests work on FreeBSD. From Ilya Bakulin.
* fix typo in fragment payloadbluhm2013-07-231-1/+1
|
* Add IPv6 tests for fragmented destination options, fragments withoutbluhm2012-02-081-1/+1
| | | | payload, fragmented UDP packets.
* Do not read dstaddr from command line, get it from addr.py.bluhm2012-01-111-4/+3
|
* According to RFC 5722 we drop all IPv6 fragments that belong to abluhm2012-01-101-4/+5
| | | | packet with overlaps. Adapt existing tests and add one more.
* Add tests for IPv6 fragment reassembly. Hand-crafted ping6bluhm2012-01-061-0/+51
echo-request fragments are sent by scapy to the target machine. There they get reassembled and a echo-reply comes back. The ping6 payload is checked.