This project is mirrored from https://github.com/nplab/packetdrill.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
- May 06, 2015
-
-
Felix Weinrank authored
-
- May 05, 2015
-
-
Michael Tüxen authored
are installed.
-
Michael Tüxen authored
in SACK chunks.
-
Michael Tüxen authored
of duplicate TSNs in SACK chunks.
-
- May 04, 2015
-
-
Michael Tüxen authored
and SHUTDOWN_COMPLETE chunk flags using T. This finally fixes https://github.com/nplab/packetdrill/issues/2
-
- May 03, 2015
-
-
Michael Tüxen authored
DATA[flgs=0x03 len=1016 tsn=0 ... This fixes https://github.com/nplab/packetdrill/issues/3
-
Michael Tüxen authored
flags as atwo digit hex number like DATA[flgs=0x03 tsn=0 ... This addresses https://github.com/nplab/packetdrill/issues/2
-
Michael Tüxen authored
-
- May 02, 2015
-
-
Michael Tüxen authored
SACK[tsn=2 gaps=[4:4, 6:6] dups=[8]] This fixes https://github.com/nplab/packetdrill/issues/4
-
Michael Tüxen authored
This fixes https://github.com/nplab/packetdrill/issues/1
-
Michael Tüxen authored
-
Michael Tüxen authored
-
Michael Tüxen authored
-
- May 01, 2015
-
-
Michael Tüxen authored
Current limitations: * Chunk parameters are not yet supported. * Error causes are not yet supported. * Chunks can't be bundled with COOKIE-ECHO chunks. * Chunk flags are not supported. * Chunk lengths are not supported. * Gap reports and duplicate TSNs are not supported for SACK chunks. * SCTP related ICMP messages are not supported. This version is only tested in a limited way, only on FreeBSD and only in local mode.
-
Michael Tüxen authored
-
- Feb 02, 2015
-
-
Michael Tüxen authored
-
Michael Tüxen authored
-
- Feb 01, 2015
-
-
Michael Tüxen authored
-
- Jan 07, 2015
-
-
Michael Tüxen authored
This commit adds support for parsing SCTP packets and converting them to strings. Currently only chunks, parameters and error causes specified in RFC 4960 are supported. Support for other RFCs will be added in the future. Tested on FreeBSD (amd64 and arm) and Linux. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
- Dec 28, 2014
-
-
Michael Tüxen authored
-
Michael Tüxen authored
-
Michael Tüxen authored
-
Michael Tüxen authored
Add some UDPLite tests.
-
Michael Tüxen authored
with the other patches.
-
Michael Tüxen authored
-
Michael Tüxen authored
This commit adds support for UDPLite as specified in RFC 3828 and the corresponding socket options. It is tested on FreeBSD 10.1 and Linux, the platforms supporting UDPLite. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
Michael Tüxen authored
This patch makes sure that all heaaders start at a four byte boundary. This is done by not having the ethernet header, which is 14 bytes long, in the packet buffer. This fixes the remote mode for platforms having strict alignment restrictions, like ARM. Without this patch you can't use the remote mode on a Rasperry Pi running FreeBSD. This patch has been tested on Linux (Intel) in local and remote mode and one FreeBSD (Intel and ARM) in local and remote mode. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
Michael Tüxen authored
When using libpcap, the function packet_socket_receive was ignoring the direction. If there were inbound packets sniffed the following try to read the packet from the tun descriptor blocked. This patch makes packet_socket_receive aware of the direction and therefore the libpcap implementation has the same functionality as the Linux one. It just uses two pcap handles, one for each direction. Tested on FreeBSD. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
Michael Tüxen authored
This commit adds support for the following SCTP socket options: * SCTP_RTOINFO * SCTP_INITMSG * SCTP_NODELAY * SCTP_MAXSEG * SCTP_DELAYED_SACK * SCTP_MAX_BURST Tested on Linux and FreeBSD. NetBSD and OpenBSD doen't support SCTP and should not be affected. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
Michael Tüxen authored
This commit get the declaration and definition of the parse_mpls() function in-line. Make it static. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
Michael Tüxen authored
This patch fixes two issues: * It only makes sense to report errno if a system call has actually failed. * You can't call strerror() two times in printf(), since it might use a single static buffer. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
Michael Tüxen authored
This commit makes sure that the udp length is verified in host byte order. Signed-off-by:
Michael Tuexen <tuexen@fh-muenster.de>
-
- May 09, 2014
-
-
Neal Cardwell authored
In local mode, read the outbound packets from the tun device. A recent Linux patch "tcp: avoid retransmits of TCP packets hanging in host queues" means that TCP behavior now depends on whether and when the network device (tun device here) consumes the packets. We now read all these packets so that the kernel can exercise its normal code paths for packet transmit completion. An alternative approach would be to set the tun txqueuelen to 0, but this would impact qdisc behavior. It is more realistic, and has fewer side-effects, to make sure the network device has a non-zero queue length, but packets are still consumed. Change-Id: Ia922994d4eeea12e61d7876b4c4ef34bc9cef34e
-
- Jan 24, 2014
-
-
Neal Cardwell authored
Fix the packet header location calculations in packet_append_header() forgot to account for the fact that there might be layer 2 headers. Remote mode has been broken since the addition of encapsulation support, partly due to this issue. Change-Id: Idfb0670da8799e11fe1b72771ed13d52d8e991fe
-
Neal Cardwell authored
packet_buffer_to_string() needs to accont for the fact that packet->ip_bytes does not capture the full length of the packet (in remote mode there will be layer 2 ethernet headers as well). Change-Id: If2c95e68071545a27078141b6ba5f98cd2c46fb9
-
Neal Cardwell authored
Fix wire_server_netdev_receive() to reflect the fact that in remote mode the server is sniffing packets that are inbound (whereas in local mode we are sniffing *outbound* packets). This was a bug introduced in "net-test: packetdrill encap support: refactor packet receive loops into one loop". Remote mode has been broken since the addition of encapsulation support, partly due to this issue. Change-Id: Ia92f70f48ae90cb2e089ee51d728473a12c63595
-
- Jan 11, 2014
-
-
Neal Cardwell authored
-
Mike Neilsen authored
Signed-off-by:
Mike Neilsen <mneilsen@acm.org>
-
Mike Neilsen authored
Handle ICMPv4 and ICMPv6 parsing separately. Return PACKET_BAD if IP and ICMP versions mismatch. Signed-off-by:
Mike Neilsen <mneilsen@acm.org> Signed-off-by:
Neal Cardwell <ncardwell@google.com>
-
Neal Cardwell authored
Add a little helper for accessing the inner-most header of a packet. In preparation for a patch to support parsing ICMP packets on the wire.
-