New scapy 2.4.0 buffers packets at the bfp layer. Call sniff() to
authorbluhm <bluhm@openbsd.org>
Sun, 29 Jul 2018 09:25:58 +0000 (09:25 +0000)
committerbluhm <bluhm@openbsd.org>
Sun, 29 Jul 2018 09:25:58 +0000 (09:25 +0000)
commit925939b706654eeebe43e597bffe0e97c52fc5a2
treebba97d5af0e38f6eef1594efa7c7560649998009
parente351e6cba3fb961b8d1e5be874c39ddb7da9f6b5
New scapy 2.4.0 buffers packets at the bfp layer.  Call sniff() to
clear this list when starting the sniffer thread.  The TCP sequence
number check in sr1() became more strict.  Use the sniffer thread
to capture retransmitted packetes which the new TCP answers() check
ignores now.
regress/sys/kern/sosplice/scapy/scapy-delay-oobinline.py
regress/sys/kern/sosplice/scapy/scapy-delay-synack.py
regress/sys/kern/sosplice/scapy/scapy-handshake.py
regress/sys/kern/sosplice/scapy/scapy-oobinline-delay-connect.py
regress/sys/kern/sosplice/scapy/scapy-oobinline.py
regress/sys/kern/sosplice/scapy/scapy-payload-delay-connect.py
regress/sys/kern/sosplice/scapy/scapy-payload.py