summaryrefslogtreecommitdiffstats
path: root/regress/sys/netinet6 (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Split the check-setup target into smaller parts to make it easierbluhm2016-08-311-6/+7
| | | | to configure the regression test machines.
* Fix tests: Restrict getpid() to lower 16 bit so that it can stillbluhm2016-05-2226-26/+26
| | | | | be used as packet id. Now scapy calls nexthopmtu with this name explicitly in icmp structure.
* Cover the case where we are bound to [::] and SO_REUSEADDR is not set.vgross2016-03-302-14/+24
|
* Add regress tests for IPV6_PKTINFO with addrvgross2016-03-192-0/+266
|
* Replace a sudo with ${SUDO}.bluhm2015-11-051-2/+2
|
* Add autoport to netinet6 regress testsvgross2015-10-261-2/+2
|
* bugfix: add ${.CURDIR} to deal with obj symlinksvgross2015-10-141-2/+2
|
* add regress tests for automatic port allocationvgross2015-10-142-0/+166
|
* Test that ping6 fragments with ethernet padding get reassembledbluhm2015-04-152-1/+54
| | | | correctly.
* Use a simpler expression to check the ether type in scapy. Thisbluhm2014-12-1928-28/+28
| | | | makes the fragment tests work on FreeBSD. From Ilya Bakulin.
* Verify the checksum of the echo reply fragment based on the echobluhm2014-07-111-0/+9
| | | | request.
* Add a test that sends a large ICMP6 packet in many small fragments.bluhm2014-07-114-3/+62
| | | | The echo reply has to be fragmented.
* Adapt the IPv6 routing header type 0 tests to the current behaviour.bluhm2013-11-177-25/+234
| | | | | | | | As header scanning is back, there is always a icmp6 parameter problem response. Add tests that hide the routing header behind an atomic fragment header to get the RFC 5095 behaviour. One test puts the routing header into the second fragment so that it cannot be detected without reassembly.
* Fix typo prt -> ptr.bluhm2013-11-131-3/+3
|
* Add a check-setup target to make sure that all addresses and routesbluhm2013-11-132-18/+58
| | | | | are configured correctly. Add a scapy test that creates a packet without routing header to check the setup.
* Do not fail the regression tests if python or the scapy package isbluhm2013-10-314-49/+151
| | | | | | | | not installed. Print a warning, explain the problem and skip the test in this case. Also skip the test if the environment has not been configured for the remote test target machine. Fix the Makefile to run the tests with or without an obj directory. Finally link the netinet6 regression tests into the build.
* Use scapy to test IPv6 packets with routing header type 0.bluhm2013-10-204-0/+193
|
* I need one more fragment to make the timeout test reliable.bluhm2013-07-232-7/+8
|
* fix typo in fragment payloadbluhm2013-07-2315-15/+15
|
* IPv6 fragments, that cannot be reassembled within 60 seconds afterbluhm2013-07-232-1/+63
| | | | | | the frist fragment has arrived, must be dropped. Add a regression test that sends 5 echo request fragments within 75 seconds and check that there is no echo reply.
* Add IPv6 tests for fragmented destination options, fragments withoutbluhm2012-02-088-3/+318
| | | | payload, fragmented UDP packets.
* Add test suite for IPv6 neighbor discovery protocol. Send all kindbluhm2012-01-315-0/+287
| | | | | of solicitations to remote host and check responses. This can be used to test both pf neighbor discovery states and the IPv6 stack.
* Test sending a short atomic IPv6 fragment.bluhm2012-01-272-1/+57
|
* Add a test for atomic IPv6 fragment reassembly.bluhm2012-01-242-1/+55
|
* After overlapping IPv6 fragments have been dropped, new fragmentsbluhm2012-01-231-5/+4
| | | | with the same id get reassembled into a valid packet. Adapt test.
* Do not read dstaddr from command line, get it from addr.py.bluhm2012-01-118-37/+29
|
* According to RFC 5722 we drop all IPv6 fragments that belong to abluhm2012-01-105-13/+78
| | | | packet with overlaps. Adapt existing tests and add one more.
* Add tests for IPv6 fragment reassembly. Hand-crafted ping6bluhm2012-01-067-0/+411
echo-request fragments are sent by scapy to the target machine. There they get reassembled and a echo-reply comes back. The ping6 payload is checked.