xref: /openbsd-src/regress/sys/netinet6/frag6/frag6_ext2long.py (revision 527238f8366f912058230e3d6442aa63ea8ac5b3)
1#!/usr/local/bin/python3
2
3print("ping6 fragments with long extension header in second fragment")
4
5# |FFFF|---------|
6# |HHHHHHHHHHHHHHHHHHHH|DDDD|FFFF|----|
7
8import os
9from addr import *
10from scapy.all import *
11
12pid=os.getpid()
13eid=pid & 0xffff
14payload=b"ABCDEFGHIJKLMNOP"
15packet=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/ \
16    ICMPv6EchoRequest(id=eid, data=payload)
17frag=[]
18fid=pid & 0xffffffff
19frag.append(IPv6ExtHdrFragment(nh=58, id=fid, m=1)/bytes(packet)[40:56])
20frag.append(IPv6ExtHdrHopByHop(options=PadN(optdata="\0"*28))/ \
21    IPv6ExtHdrDestOpt()/ \
22    IPv6ExtHdrFragment(nh=58, id=fid, offset=2)/bytes(packet)[56:64])
23eth=[]
24for f in frag:
25	pkt=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/f
26	eth.append(Ether(src=LOCAL_MAC, dst=REMOTE_MAC)/pkt)
27
28if os.fork() == 0:
29	time.sleep(1)
30	sendp(eth, iface=LOCAL_IF)
31	os._exit(0)
32
33ans=sniff(iface=LOCAL_IF, timeout=3, filter=
34    "ip6 and src "+REMOTE_ADDR6+" and dst "+LOCAL_ADDR6+" and icmp6")
35for a in ans:
36	if a and a.type == ETH_P_IPV6 and \
37	    ipv6nh[a.payload.nh] == 'ICMPv6' and \
38	    icmp6types[a.payload.payload.type] == 'Echo Reply':
39		id=a.payload.payload.id
40		print("id=%#x" % (id))
41		if id != eid:
42			print("WRONG ECHO REPLY ID")
43			exit(2)
44		data=a.payload.payload.data
45		print("payload=%s" % (data))
46		if data == payload:
47			exit(0)
48		print("PAYLOAD!=%s" % (payload))
49		exit(1)
50print("NO ECHO REPLY")
51exit(2)
52