1#!/usr/local/bin/python2.7
2
3print "ping6 fragments with long extension header in second fragment"
4
5# |FFFF|---------|
6# |HHHHHHHHHHHHHHHHHHHH|DDDD|FFFF|----|
7
8import os
9from addr import *
10from scapy.all import *
11
12pid=os.getpid()
13eid=pid & 0xffff
14payload="ABCDEFGHIJKLMNOP"
15packet=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/ \
16    ICMPv6EchoRequest(id=eid, data=payload)
17frag=[]
18fid=pid & 0xffffffff
19frag.append(IPv6ExtHdrFragment(nh=58, id=fid, m=1)/str(packet)[40:56])
20frag.append(IPv6ExtHdrHopByHop(options=PadN(optdata="\0"*28))/ \
21    IPv6ExtHdrDestOpt()/ \
22    IPv6ExtHdrFragment(nh=58, id=fid, offset=2)/str(packet)[56:64])
23eth=[]
24for f in frag:
25	pkt=IPv6(src=LOCAL_ADDR6, dst=REMOTE_ADDR6)/f
26	eth.append(Ether(src=LOCAL_MAC, dst=REMOTE_MAC)/pkt)
27
28if os.fork() == 0:
29	time.sleep(1)
30	sendp(eth, iface=LOCAL_IF)
31	os._exit(0)
32
33ans=sniff(iface=LOCAL_IF, timeout=3, filter=
34    "ip6 and src "+REMOTE_ADDR6+" and dst "+LOCAL_ADDR6+" and icmp6")
35for a in ans:
36	if a and a.type == ETH_P_IPV6 and \
37	    ipv6nh[a.payload.nh] == 'ICMPv6' and \
38	    icmp6types[a.payload.payload.type] == 'Echo Reply':
39		id=a.payload.payload.id
40		print "id=%#x" % (id)
41		if id != eid:
42			print "WRONG ECHO REPLY ID"
43			exit(2)
44		data=a.payload.payload.data
45		print "payload=%s" % (data)
46		if data == payload:
47			exit(0)
48		print "PAYLOAD!=%s" % (payload)
49		exit(1)
50print "NO ECHO REPLY"
51exit(2)
52