mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 14:48:21 +00:00
Fix comparison against CapLen results in IPTunnel
This commit is contained in:
parent
311a744a20
commit
a27dee6370
1 changed files with 2 additions and 2 deletions
|
@ -39,9 +39,9 @@ bool IPTunnelAnalyzer::AnalyzePacket(size_t len, const uint8_t* data, Packet* pa
|
|||
auto result = packet_analysis::IP::ParsePacket(len, data, proto, inner);
|
||||
if ( result == packet_analysis::IP::ParseResult::BadProtocol )
|
||||
Weird("invalid_inner_IP_version", packet);
|
||||
else if ( result < packet_analysis::IP::ParseResult::CaplenTooSmall )
|
||||
else if ( result == packet_analysis::IP::ParseResult::CaplenTooSmall )
|
||||
Weird("truncated_inner_IP", packet);
|
||||
else if ( result > packet_analysis::IP::ParseResult::CaplenTooLarge )
|
||||
else if ( result == packet_analysis::IP::ParseResult::CaplenTooLarge )
|
||||
Weird("inner_IP_payload_length_mismatch", packet);
|
||||
|
||||
if ( result != packet_analysis::IP::ParseResult::Ok )
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue