summaryrefslogtreecommitdiffstats
path: root/regress/sys (follow)
Commit message (Expand)AuthorAgeFilesLines
* These regress tests expect coredumps to be written so run them withclaudio2021-02-092-2/+2
* These regress test expect coredumps as an effect of the test so runclaudio2021-02-092-4/+4
* Setup two pair(4) and one lo(4) interface in different routingbluhm2021-02-052-0/+181
* ESP path MTU discovery over IPv6 tunnel has been fixed. Add test.bluhm2021-02-011-6/+76
* Syntax of pf(4) route-to has changed. Adapt tests.bluhm2021-02-014-24/+24
* Pledge violation for SO_RTABLE prints "wroute" now. Adapt test.bluhm2021-01-211-5/+4
* Test path MTU discovery with IPv6 TCP packets tunneled in IPv4 ESP.bluhm2021-01-203-17/+75
* Check the rewritten address output from tcpdump -e on pflog.bluhm2021-01-201-15/+37
* If ip or ip6 forwarding is not set, expect af-to failure.bluhm2021-01-161-1/+8
* IPv4 loopback addresses do not work with af-to as in_canforward()bluhm2021-01-142-55/+92
* IPv6 link-local addresses are broken in pf(4) as scope ID is usedbluhm2021-01-142-28/+73
* Add pflog(4) tests for IPv6.bluhm2021-01-132-8/+74
* Check that rule without logopt user has no uid in log entry.bluhm2021-01-121-4/+3
* Add some basic tests for pflog(4) interface. Create special routingbluhm2021-01-113-2/+225
* Test that local UDP broadcast packets to 255.255.255.255 are handledbluhm2021-01-092-4/+110
* Increase file descriptor limit to allow long chains of splicedbluhm2021-01-031-1/+2
* Create chains and loops of spliced tcp and udp sockets. Send databluhm2021-01-025-2/+259
* py3-scapy is now scapykn2020-12-3011-32/+32
* getifaddrs() can return entries where ifa_addr is NULL. Check for thisbenno2020-12-301-2/+3
* Ensure that a sufficient part of the remote log file has beenbluhm2020-12-271-1/+3
* Missed a python2.7, scapy 2, copyright bump in previous scapy 3 commits.bluhm2020-12-263-17/+17
* Wrap long lines.bluhm2020-12-263-11/+12
* Send fragment that reaches beyond max packet length. pf ignoresbluhm2020-12-252-1/+60
* Wrap long lines.bluhm2020-12-257-26/+52
* Switch to scapy with python 3.bluhm2020-12-2510-86/+85
* Link pktinfo_addr and srcaddr regress to build.bluhm2020-12-251-2/+8
* Switch to scapy with python 3.bluhm2020-12-2534-377/+376
* Switch to scapy with python 3.bluhm2020-12-256-38/+37
* Switch to scapy with python 3.bluhm2020-12-256-73/+72
* Switch to scapy with python 3.bluhm2020-12-2524-263/+263
* Switch to scapy with python 3.bluhm2020-12-2510-174/+176
* Switch to scapy with python 3.bluhm2020-12-2514-101/+100
* Switch to scapy with python 3.bluhm2020-12-253-45/+42
* Switch to scapy with python 3.bluhm2020-12-2518-177/+177
* Switch to scapy with python 3.bluhm2020-12-243-26/+26
* Switch to scapy with python 3.bluhm2020-12-243-28/+28
* Test that IPv4 path MTU discovery works over IPsec in tunnel mode.bluhm2020-12-212-3/+53
* Use regress framework for setup and shorten target names.bluhm2020-12-201-41/+47
* Fix regress target name, they must be unique.bluhm2020-12-171-2/+2
* Link broadcast_bind, carp, in_pcbbind, sendsrcaddr regress to build.bluhm2020-12-171-2/+10
* Use ${SUDO} or skip test if not root.bluhm2020-12-171-3/+3
* Fix a race where the ${SUDO} process was killed instead of tcpdump.bluhm2020-12-171-2/+2
* Link pflow and wg regress to build.bluhm2020-12-171-2/+2
* Remove echo headlines.bluhm2020-12-1726-295/+26
* Use setup and cleanup feature from regress framework.bluhm2020-12-173-218/+170
* Remove echo headlines. Makefile cleanup.bluhm2020-12-161-11/+2
* Remove echo headlines. Use consistent target names.bluhm2020-12-166-48/+33
* Use setup and cleanup feature from regress framework.bluhm2020-12-164-90/+67
* Make test actually fail if something is broken.bluhm2020-12-161-33/+26
* restructure, making room for several testsanton2020-12-034-120/+258