tcpdump/tests/nsh-over-vxlan-gpe-vv.out
Denis Ovsienko f620cb78c2 NSH: Modernize packet parsing style.
Enable ND_LONGJMP_FROM_TCHECK. Remove a redundant ND_TCHECK_LEN()
instance and make another one conditional. Report invalid packets as
invalid with a reason, not truncated.

Update the code from draft-ietf-sfc-nsh-01 to RFC 8300: remove the no
longer existent C-bit, add the TTL field, adjust the MD Type field
offset and size, apply correct mask to TLV length, redo TLV length in
bytes instead of 4-byte words and mind the padding.

Fetch and print one header at a time. Add and use two lookup tables for
MD Type and Next Protocol. Add a version number check. Add a length
check for MD Type 1. Update some error messages. Add a few encoding
diagrams for clarity. Lose a few variables and reduce scope of the
remaining variables. Update a few tests.
2020-12-20 13:41:40 +00:00

6 lines
438 B
Plaintext

1 14:19:08.994912 IP (tos 0x0, ttl 64, id 16419, offset 0, flags [DF], proto UDP (17), length 92)
127.0.0.1.4790 > 127.0.0.1.4790: [udp sum ok] VXLAN-GPE, flags [IP], vni 16777215
NSH, ver 0, flags [O], next-protocol IPv4, service-path-id 0xffffff, service-index 0xff
IP (tos 0x0, ttl 255, id 54321, offset 0, flags [none], proto UDP (17), length 32)
192.168.0.1.10000 > 192.168.0.2.20000: [udp sum ok] UDP, length 4