History log of /openbsd-src/regress/sys/kern/sosplice/scapy/scapy-payload-delay-connect.py (Results 1 – 4 of 4)
Revision Date Author Comments
# 8feac640 25-Dec-2020 bluhm <bluhm@openbsd.org>

Switch to scapy with python 3.


# 925939b7 29-Jul-2018 bluhm <bluhm@openbsd.org>

New scapy 2.4.0 buffers packets at the bfp layer. Call sniff() to
clear this list when starting the sniffer thread. The TCP sequence
number check in sr1() became more strict. Use the sniffer threa

New scapy 2.4.0 buffers packets at the bfp layer. Call sniff() to
clear this list when starting the sniffer thread. The TCP sequence
number check in sr1() became more strict. Use the sniffer thread
to capture retransmitted packetes which the new TCP answers() check
ignores now.

show more ...


# e1860033 08-Nov-2017 bluhm <bluhm@openbsd.org>

Wait for the splicing syscall by grepping it in the relay log. This
ensures that scapy's SYN+ACK packet hits the TCP stack when it hurts.


# 15b894fd 07-Nov-2017 bluhm <bluhm@openbsd.org>

Test more variations of TCP packets in the scapy splicing tests.
Delay connect and SYN+ACK to splice data into a connecting socket.