Fix comparison against CapLen results in IPTunnel

This commit is contained in:
Tim Wojtulewicz 2025-06-11 14:02:44 -07:00
parent 311a744a20
commit a27dee6370

View file

@ -39,9 +39,9 @@ bool IPTunnelAnalyzer::AnalyzePacket(size_t len, const uint8_t* data, Packet* pa
auto result = packet_analysis::IP::ParsePacket(len, data, proto, inner); auto result = packet_analysis::IP::ParsePacket(len, data, proto, inner);
if ( result == packet_analysis::IP::ParseResult::BadProtocol ) if ( result == packet_analysis::IP::ParseResult::BadProtocol )
Weird("invalid_inner_IP_version", packet); Weird("invalid_inner_IP_version", packet);
else if ( result < packet_analysis::IP::ParseResult::CaplenTooSmall ) else if ( result == packet_analysis::IP::ParseResult::CaplenTooSmall )
Weird("truncated_inner_IP", packet); Weird("truncated_inner_IP", packet);
else if ( result > packet_analysis::IP::ParseResult::CaplenTooLarge ) else if ( result == packet_analysis::IP::ParseResult::CaplenTooLarge )
Weird("inner_IP_payload_length_mismatch", packet); Weird("inner_IP_payload_length_mismatch", packet);
if ( result != packet_analysis::IP::ParseResult::Ok ) if ( result != packet_analysis::IP::ParseResult::Ok )