xref: /openbsd-src/regress/sys/netinet6/frag6/frag6_mf0middle.py (revision 527238f8366f912058230e3d6442aa63ea8ac5b3)
1*527238f8Sbluhm#!/usr/local/bin/python3
2320944d6Sbluhm
3*527238f8Sbluhmprint("ping6 fragment with mf=0 that overlaps the first fragment")
4320944d6Sbluhm
5320944d6Sbluhm# |---------|
6320944d6Sbluhm#      |XXXX|
7320944d6Sbluhm#           |----|
8320944d6Sbluhm
9320944d6Sbluhmimport os
10320944d6Sbluhmfrom addr import *
11320944d6Sbluhmfrom scapy.all import *
12320944d6Sbluhm
139ae5678bSbluhmpid=os.getpid()
149ae5678bSbluhmeid=pid & 0xffff
15*527238f8Sbluhmpayload=b"ABCDEFGHIJKLMNOP"
167b3475a7Sbluhmpacket=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/ \
177b3475a7Sbluhm    ICMPv6EchoRequest(id=eid, data=payload)
18320944d6Sbluhmfrag=[]
199ae5678bSbluhmfid=pid & 0xffffffff
20*527238f8Sbluhmfrag.append(IPv6ExtHdrFragment(nh=58, id=fid, m=1)/bytes(packet)[40:56])
21*527238f8Sbluhmfrag.append(IPv6ExtHdrFragment(nh=58, id=fid, offset=1)/bytes(packet)[48:56])
22*527238f8Sbluhmfrag.append(IPv6ExtHdrFragment(nh=58, id=fid, offset=2)/bytes(packet)[56:64])
23320944d6Sbluhmeth=[]
24320944d6Sbluhmfor f in frag:
257b3475a7Sbluhm	pkt=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/f
267b3475a7Sbluhm	eth.append(Ether(src=LOCAL_MAC, dst=REMOTE_MAC)/pkt)
27320944d6Sbluhm
28320944d6Sbluhmif os.fork() == 0:
29320944d6Sbluhm	time.sleep(1)
307b3475a7Sbluhm	sendp(eth, iface=LOCAL_IF)
31320944d6Sbluhm	os._exit(0)
32320944d6Sbluhm
337b3475a7Sbluhmans=sniff(iface=LOCAL_IF, timeout=3, filter=
347b3475a7Sbluhm    "ip6 and src "+REMOTE_ADDR6+" and dst "+LOCAL_ADDR6+" and icmp6")
35320944d6Sbluhmfor a in ans:
36320944d6Sbluhm	if a and a.type == ETH_P_IPV6 and \
37320944d6Sbluhm	    ipv6nh[a.payload.nh] == 'ICMPv6' and \
38320944d6Sbluhm	    icmp6types[a.payload.payload.type] == 'Echo Reply':
39320944d6Sbluhm		id=a.payload.payload.id
40*527238f8Sbluhm		print("id=%#x" % (id))
419ae5678bSbluhm		if id != eid:
42*527238f8Sbluhm			print("WRONG ECHO REPLY ID")
43320944d6Sbluhm			exit(2)
44320944d6Sbluhm		data=a.payload.payload.data
45*527238f8Sbluhm		print("payload=%s" % (data))
46320944d6Sbluhm		if data == payload:
47*527238f8Sbluhm			print("ECHO REPLY")
48320944d6Sbluhm			exit(1)
49*527238f8Sbluhm		print("PAYLOAD!=%s" % (payload))
50320944d6Sbluhm		exit(2)
51*527238f8Sbluhmprint("no echo reply")
52320944d6Sbluhmexit(0)
53