#
51c2e16f |
| 25-Dec-2020 |
bluhm <bluhm@openbsd.org> |
Wrap long lines.
|
#
527238f8 |
| 25-Dec-2020 |
bluhm <bluhm@openbsd.org> |
Switch to scapy with python 3.
|
#
7cd47444 |
| 07-Sep-2017 |
bluhm <bluhm@openbsd.org> |
Link regress/sys/netinet/frag to build. Get IPv4 and IPv6 fragment tests into common shape. Add some missing test cases.
|
#
7b3475a7 |
| 01-Mar-2017 |
bluhm <bluhm@openbsd.org> |
Use consistent address schema with local and remote machine. Fill variables with example IPs from my daily test run.
|
#
9ae5678b |
| 18-Jan-2017 |
bluhm <bluhm@openbsd.org> |
Do not use privileged or NFS source ports for UDP packets as inetd ignores such packets. This should avoid some sporadic failures. While there, use variable names consistently in all tests.
|
#
233b170e |
| 17-Nov-2016 |
bluhm <bluhm@openbsd.org> |
Put all make targets in a loop and print a little more what each IPv6 fragment header test is doing.
|
#
7553dc43 |
| 22-May-2016 |
bluhm <bluhm@openbsd.org> |
Fix tests: Restrict getpid() to lower 16 bit so that it can still be used as packet id. Now scapy calls nexthopmtu with this name explicitly in icmp structure.
|
#
9c70e3bf |
| 19-Dec-2014 |
bluhm <bluhm@openbsd.org> |
Use a simpler expression to check the ether type in scapy. This makes the fragment tests work on FreeBSD. From Ilya Bakulin.
|
#
6de4c68b |
| 23-Jul-2013 |
bluhm <bluhm@openbsd.org> |
fix typo in fragment payload
|
#
3c2c48ac |
| 08-Feb-2012 |
bluhm <bluhm@openbsd.org> |
Add IPv6 tests for fragmented destination options, fragments without payload, fragmented UDP packets.
|
#
46dd4a5a |
| 11-Jan-2012 |
bluhm <bluhm@openbsd.org> |
Do not read dstaddr from command line, get it from addr.py.
|
#
499024cc |
| 10-Jan-2012 |
bluhm <bluhm@openbsd.org> |
According to RFC 5722 we drop all IPv6 fragments that belong to a packet with overlaps. Adapt existing tests and add one more.
|
#
741f9993 |
| 06-Jan-2012 |
bluhm <bluhm@openbsd.org> |
Add tests for IPv6 fragment reassembly. Hand-crafted ping6 echo-request fragments are sent by scapy to the target machine. There they get reassembled and a echo-reply comes back. The ping6 payload
Add tests for IPv6 fragment reassembly. Hand-crafted ping6 echo-request fragments are sent by scapy to the target machine. There they get reassembled and a echo-reply comes back. The ping6 payload is checked.
show more ...
|