This project is mirrored from https://github.com/nplab/packetdrill.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
- Oct 12, 2018
-
-
Michael Tüxen authored
-
- Jun 03, 2018
-
-
Michael Tüxen authored
-
- May 23, 2017
-
-
Michael Tüxen authored
This adds support for SCTP/UDP and TCP/UDP including ICMP support. Sponsored by: Netflix, Inc.
-
- Jan 03, 2016
-
-
Julian Cordes authored
-
- Aug 01, 2015
-
-
Michael Tüxen authored
This fixes https://github.com/nplab/packetdrill/issues/5.
-
- May 23, 2015
-
-
Michael Tüxen authored
This patch adds support for the SCTP parameters defined in RFC 4960. While there, make the syntax more consistent and make sure that the packet printing is in line with the syntax being used. This fixes https://github.com/nplab/packetdrill/issues/6
-
- May 01, 2015
-
-
Michael Tüxen authored
Current limitations: * Chunk parameters are not yet supported. * Error causes are not yet supported. * Chunks can't be bundled with COOKIE-ECHO chunks. * Chunk flags are not supported. * Chunk lengths are not supported. * Gap reports and duplicate TSNs are not supported for SACK chunks. * SCTP related ICMP messages are not supported. This version is only tested in a limited way, only on FreeBSD and only in local mode.
-
- Jan 07, 2015
-
-
Michael Tüxen authored
This commit adds support for parsing SCTP packets and converting them to strings. Currently only chunks, parameters and error causes specified in RFC 4960 are supported. Support for other RFCs will be added in the future. Tested on FreeBSD (amd64 and arm) and Linux. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
- Dec 28, 2014
-
-
Michael Tüxen authored
This commit adds support for UDPLite as specified in RFC 3828 and the corresponding socket options. It is tested on FreeBSD 10.1 and Linux, the platforms supporting UDPLite. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
Michael Tüxen authored
This patch makes sure that all heaaders start at a four byte boundary. This is done by not having the ethernet header, which is 14 bytes long, in the packet buffer. This fixes the remote mode for platforms having strict alignment restrictions, like ARM. Without this patch you can't use the remote mode on a Rasperry Pi running FreeBSD. This patch has been tested on Linux (Intel) in local and remote mode and one FreeBSD (Intel and ARM) in local and remote mode. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
- Jan 24, 2014
-
-
Neal Cardwell authored
Fix the packet header location calculations in packet_append_header() forgot to account for the fact that there might be layer 2 headers. Remote mode has been broken since the addition of encapsulation support, partly due to this issue. Change-Id: Idfb0670da8799e11fe1b72771ed13d52d8e991fe
-
- Nov 30, 2013
-
-
Neal Cardwell authored
Code to parse script packets using an encapsulation layer that is an MPLS label stack. The syntax looks like: mpls (label 123, tc 1, [S], ttl 255) (label 456, tc 1, [S], ttl 255) This is borrowed from the syntax from tcpdump, which is: MPLS (label 123, exp 1, [S], ttl 255) (label 456, exp 1, [S], ttl 255) We use "tc" because RFC 5462 renamed the EXP ("experimental") field to the TC ("traffic class") field. We use lower-case "mpls" instead of "MPLS" for consistency with other packetdrill protocols, and for ease of typing. Change-Id: I2e797aead8605da9fe3f0461594cf7273d4ef0ec
-
- Nov 28, 2013
-
-
Neal Cardwell authored
Add support for IPv6 in encapsulation layers, including: lexical scanning of IPv6 addresses, parsing IPv6 encap in scripts, appending and filling in IPv6 encapsulation. Change-Id: I1349cd4056c168a4114a92324eb2a321f7db7697
-
Neal Cardwell authored
The main engine for handling encapsualted packets in packetdrill, including: - parsing scripts with encapsulation - parsing packets with encapsulation - injecting packets with encapsulation Encapsulated packets look like the following, which has an IP header, GRE header, and then regular IP/TCP header: +0 > ipv4 1.1.1.1 > 2.2.2.2: gre: . 1:1001(1000) ack 1 See other patches in the series for more detailed examples. Change-Id: Ia8c7580e268f5b0347bd9d3fdc73b096f751a79d
-
- Jun 26, 2013
-
-
Neal Cardwell authored
Initial commit for the packetdrill network stack testing tool: https://code.google.com/p/packetdrill/ Signed-off-by:
Neal Cardwell <ncardwell@google.com>
-