History log of /openbsd-src/regress/sys/netinet/pmtu/udp_echo6.py (Results 1 – 7 of 7)
Revision Date Author Comments
# e7abe75a 25-Dec-2020 bluhm <bluhm@openbsd.org>

Switch to scapy with python 3.


# 2b21f7bd 30-Jul-2018 bluhm <bluhm@openbsd.org>

Replace fork with sniffer thread in Python. Clear the BPF list
before sniffing, Scapy 2.4.0 remembers old packets that confuse the
test.


# 03da3b73 19-Jan-2017 bluhm <bluhm@openbsd.org>

Our kernel does not generate IPv6 atomic fragments anymore. Check
that the test does not receive any.


# 9ae5678b 18-Jan-2017 bluhm <bluhm@openbsd.org>

Do not use privileged or NFS source ports for UDP packets as inetd
ignores such packets. This should avoid some sporadic failures.
While there, use variable names consistently in all tests.


# 93a55b4a 18-Jan-2017 bluhm <bluhm@openbsd.org>

Add tests that generate IPv6 atomic fragments for UDP and TCP by
sending an ICMP6 too big packet with MTU 1272.


# 140ee0aa 13-Dec-2016 bluhm <bluhm@openbsd.org>

Print better error messages in case an expected packet is missing.


# b83a2f27 11-Jul-2016 bluhm <bluhm@openbsd.org>

Add regression tests for the path MTU discovery implementation in
the kernel. Generate TCP and TCP6 and UDP6 packets with Scapy,
check the kernel's reaction to ICMP fragmentation needed and ICMP6

Add regression tests for the path MTU discovery implementation in
the kernel. Generate TCP and TCP6 and UDP6 packets with Scapy,
check the kernel's reaction to ICMP fragmentation needed and ICMP6
packet too big.
OK mpi@

show more ...