IPSEC: IPv6 ESP transport mode incorrect packet length and checksum (VPP-1654)
Change-Id: Ia3474e5bfea5764eae9b2987bf78296535df6778 Signed-off-by: Neale Ranns <nranns@cisco.com>
This commit is contained in:

committed by
Dave Wallace

parent
1b52ca965c
commit
1b582b8e92
@ -412,6 +412,8 @@ class IpsecTra4(object):
|
||||
recv_pkts = self.send_and_expect(self.tra_if, send_pkts,
|
||||
self.tra_if)
|
||||
for rx in recv_pkts:
|
||||
self.assertEqual(len(rx) - len(Ether()), rx[IP].len)
|
||||
self.assert_packet_checksums_valid(rx)
|
||||
try:
|
||||
decrypted = p.vpp_tra_sa.decrypt(rx[IP])
|
||||
self.assert_packet_checksums_valid(decrypted)
|
||||
@ -534,6 +536,8 @@ class IpsecTun4(object):
|
||||
def verify_encrypted(self, p, sa, rxs):
|
||||
decrypt_pkts = []
|
||||
for rx in rxs:
|
||||
self.assert_packet_checksums_valid(rx)
|
||||
self.assertEqual(len(rx) - len(Ether()), rx[IP].len)
|
||||
try:
|
||||
decrypt_pkt = p.vpp_tun_sa.decrypt(rx[IP])
|
||||
if not decrypt_pkt.haslayer(IP):
|
||||
|
Reference in New Issue
Block a user