Lines Matching +full:python3 +full:- +full:dev

2 # SPDX-License-Identifier: BSD-2-Clause
52 jexec alcatraz pfctl -e
61 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
64 atf_check -s exit:0 -o ignore ping -c 1 -s 800 192.0.2.2
67 atf_check -s exit:2 -o ignore ping -c 1 -s 20000 192.0.2.2
80 atf_set require.progs python3 scapy
100 jexec singsing route add -6 2001:db8:42::/64 2001:db8:43::2
101 route add -6 2001:db8:43::/64 2001:db8:42::2
103 jexec alcatraz ifconfig ${epair_send}b inet6 -ifdisabled
104 jexec alcatraz ifconfig ${epair_link}a inet6 -ifdisabled
105 jexec singsing ifconfig ${epair_link}b inet6 -ifdisabled
106 ifconfig ${epair_send}a inet6 -ifdisabled
110 lladdr=$(jexec alcatraz ifconfig ${epair_send}b | awk '/ scopeid / { print($2); }' | cut -f 1 -d %)
112 jexec alcatraz pfctl -e
117 "pass in inet6 proto icmp6 icmp6-type { neighbrsol, neighbradv }" \
118 "pass in inet6 proto icmp6 icmp6-type { echoreq, echorep }" \
122 atf_check -s exit:0 -o ignore \
123 ping -6 -c 1 2001:db8:42::2
125 atf_check -s exit:0 -o ignore \
126 ping -6 -c 1 -s 4500 2001:db8:42::2
128 atf_check -s exit:0 -o ignore\
129 ping -6 -c 1 -b 70000 -s 65000 2001:db8:42::2
132 ping -6 -c 1 ${lladdr}%${epair_send}a
134 atf_check -s exit:0 -o ignore\
135 ping -6 -c 1 -b 70000 -s 65000 ${lladdr}%${epair_send}a
138 atf_check -s exit:0 -o ignore \
139 ping -6 -c 1 2001:db8:43::3
141 atf_check -s exit:0 -o ignore \
142 ping -6 -c 1 -s 4500 2001:db8:43::3
144 atf_check -s exit:0 -o ignore\
145 ping -6 -c 1 -b 70000 -s 65000 2001:db8:43::3
147 $(atf_get_srcdir)/CVE-2019-5597.py \
161 atf_set descr 'Test IPv6 reassembly combined with route-to'
182 jexec singsing route add -6 2001:db8:42::/64 2001:db8:43::2
183 route add -6 2001:db8:43::/64 2001:db8:42::2
185 jexec alcatraz ifconfig ${epair_send}b inet6 -ifdisabled
186 jexec alcatraz ifconfig ${epair_link}a inet6 -ifdisabled
187 jexec singsing ifconfig ${epair_link}b inet6 -ifdisabled
188 ifconfig ${epair_send}a inet6 -ifdisabled
190 jexec alcatraz pfctl -e
194 …"pass in route-to (${epair_link}a 2001:db8:43::3) inet6 proto icmp6 from any to 2001:db8:43::3 kee…
197 atf_check -s exit:0 -o ignore \
198 ping -6 -c 1 2001:db8:43::3
200 atf_check -s exit:0 -o ignore \
201 ping -6 -c 1 -s 4500 2001:db8:43::3
203 atf_check -s exit:0 -o ignore\
204 ping -6 -c 1 -b 70000 -s 65000 2001:db8:43::3
210 …"pass in route-to (${epair_link}a 2001:db8:43::3) inet6 proto icmp6 from any to 2001:db8:43::3 kee…
212 atf_check -s exit:0 -o ignore \
213 ping -6 -c 1 2001:db8:43::3
215 atf_check -s exit:0 -o ignore \
216 ping -6 -c 1 -s 4500 2001:db8:43::3
218 atf_check -s exit:0 -o ignore\
219 ping -6 -c 1 -b 70000 -s 65000 2001:db8:43::3
256 jexec first pfctl -e
262 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
263 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.130
264 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.131
268 atf_check -s exit:0 -o ignore ping -c 1 -s 8000 192.0.2.131
288 jexec alcatraz pfctl -e
294 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
296 atf_check -s exit:0 -o ignore $(atf_get_srcdir)/frag-${1}.py \
297 --to 192.0.2.2 \
298 --fromaddr 192.0.2.1 \
299 --sendif ${epair}b \
300 --recvif ${epair}b
308 atf_set require.progs python3 scapy
326 atf_set require.progs python3 scapy
344 atf_set require.progs python3 scapy
362 atf_set require.progs python3 scapy
380 atf_set require.progs python3 scapy
411 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
413 jexec alcatraz pfctl -e
417 "pass in inet proto icmp all icmp-type echoreq"
420 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
423 atf_check -s exit:2 -o ignore ping -c 1 -s 2000 192.0.2.2
429 "pass in inet proto icmp all icmp-type echoreq"
432 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
433 atf_check -s exit:0 -o ignore ping -c 1 -s 2000 192.0.2.2
446 atf_set require.progs python3 scapy
462 ping_server_check_reply exit:0 --ping-type=icmp
464 # Enable packet reassembly with clearing of the no-df flag.
466 "scrub all fragment reassemble no-df" \
468 "pass inet proto icmp all icmp-type echoreq"
469 # Ping with non-fragmentable packets.
472 ping_server_check_reply exit:0 --ping-type=icmp --send-length=2000 --send-flags DF
485 atf_set require.progs python3 scapy
490 if ! sysctl -q kern.features.ipsec >/dev/null ; then
501 spdadd 203.0.113.1/32 203.0.113.2/32 any -P out ipsec esp/transport//require;
502 add 203.0.113.1 203.0.113.2 esp 0x1001 -E aes-gcm-16 \"12345678901234567890\";" \
503 | jexec router setkey -c
506 ping_server_check_reply exit:0 --ping-type=icmp
508 # Enable packet reassembly with clearing of the no-df flag.
515 atf_check -s exit:0 -o ignore \
516 ping -c 1 -s 2000 198.51.100.2
543 atf_check -s exit:0 -o ignore ping -c 1 192.0.2.2
548 jexec alcatraz pfctl -e
552 "pass inet proto icmp all icmp-type echoreq dnpipe (1, 2)"
554 atf_check -s exit:0 -o ignore ping -s 2000 -c 1 192.0.2.2
593 jexec alcatraz pfctl -e
596 "nat on ${epair_two}a from 192.0.2.0/24 -> (${epair_two}a)" \
598 "pass in inet proto icmp all icmp-type echoreq dnpipe (1, 2)"
600 atf_check -s exit:0 -o ignore ping -c 1 198.51.100.2
601 atf_check -s exit:0 -o ignore ping -c 1 -s 2000 198.51.100.2
614 atf_set require.progs python3 scapy
630 "pass inet6 proto icmp6 icmp6-type { neighbrsol, neighbradv }" \
634 ping_dummy_check_request exit:0 --ping-type=udp --send-length=10000 --send-frag-length=1280
637 jexec router pfctl -qvsr | normalize_pfctl_s > $rules
642 …grep -qE 'pass in on epair0b inet proto udp all keep state dnpipe\(1, 1\) .* Packets: 8 Bytes: 101…