History log of /openbsd-src/regress/sys/netinet6/frag6/frag6_overhead.py (Results 1 – 13 of 13)
Revision Date Author Comments
# 51c2e16f 25-Dec-2020 bluhm <bluhm@openbsd.org>

Wrap long lines.


# 527238f8 25-Dec-2020 bluhm <bluhm@openbsd.org>

Switch to scapy with python 3.


# 7cd47444 07-Sep-2017 bluhm <bluhm@openbsd.org>

Link regress/sys/netinet/frag to build. Get IPv4 and IPv6 fragment
tests into common shape. Add some missing test cases.


# 7b3475a7 01-Mar-2017 bluhm <bluhm@openbsd.org>

Use consistent address schema with local and remote machine. Fill
variables with example IPs from my daily test run.


# 9ae5678b 18-Jan-2017 bluhm <bluhm@openbsd.org>

Do not use privileged or NFS source ports for UDP packets as inetd
ignores such packets. This should avoid some sporadic failures.
While there, use variable names consistently in all tests.


# 233b170e 17-Nov-2016 bluhm <bluhm@openbsd.org>

Put all make targets in a loop and print a little more what each
IPv6 fragment header test is doing.


# 7553dc43 22-May-2016 bluhm <bluhm@openbsd.org>

Fix tests: Restrict getpid() to lower 16 bit so that it can still
be used as packet id. Now scapy calls nexthopmtu with this name
explicitly in icmp structure.


# 9c70e3bf 19-Dec-2014 bluhm <bluhm@openbsd.org>

Use a simpler expression to check the ether type in scapy. This
makes the fragment tests work on FreeBSD. From Ilya Bakulin.


# 6de4c68b 23-Jul-2013 bluhm <bluhm@openbsd.org>

fix typo in fragment payload


# 3c2c48ac 08-Feb-2012 bluhm <bluhm@openbsd.org>

Add IPv6 tests for fragmented destination options, fragments without
payload, fragmented UDP packets.


# 46dd4a5a 11-Jan-2012 bluhm <bluhm@openbsd.org>

Do not read dstaddr from command line, get it from addr.py.


# 499024cc 10-Jan-2012 bluhm <bluhm@openbsd.org>

According to RFC 5722 we drop all IPv6 fragments that belong to a
packet with overlaps. Adapt existing tests and add one more.


# 741f9993 06-Jan-2012 bluhm <bluhm@openbsd.org>

Add tests for IPv6 fragment reassembly. Hand-crafted ping6
echo-request fragments are sent by scapy to the target machine.
There they get reassembled and a echo-reply comes back. The ping6
payload

Add tests for IPv6 fragment reassembly. Hand-crafted ping6
echo-request fragments are sent by scapy to the target machine.
There they get reassembled and a echo-reply comes back. The ping6
payload is checked.

show more ...