diff options
author | Jérôme LAFORGE <jerome.laforge@gmail.com> | 2014-09-07 16:35:10 +0200 |
---|---|---|
committer | Evan Huus <eapache@gmail.com> | 2014-09-08 16:28:35 +0000 |
commit | 00a244445d3102d0169342e92b74471e8635623a (patch) | |
tree | 528d06d5d7d85629ed8e3e49697f886b5061bc0d /cmakeconfig.h.in | |
parent | cf8f11f67876462510cc4254b845063c6cc047de (diff) | |
download | wireshark-00a244445d3102d0169342e92b74471e8635623a.tar.gz |
Check hopcount is correctly incremented by 1
Extract RFC3315 about hop-count :
20.1.2. Relaying a Message from a Relay Agent
If the message received by the relay agent is a Relay-forward message
and the hop-count in the message is greater than or equal to
HOP_COUNT_LIMIT, the relay agent discards the received message.
The relay agent copies the source address from the IP datagram in
which the message was received from the client into the peer-address
field in the Relay-forward message and sets the hop-count field to
the value of the hop-count field in the received message incremented
by 1.
Bug:10449
Change-Id: Ifb94e7c54c0a26714fc543862d4358d3e60c2676
Reviewed-on: https://code.wireshark.org/review/4017
Reviewed-by: Michael Mann <mmann78@netscape.net>
Petri-Dish: Michael Mann <mmann78@netscape.net>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Evan Huus <eapache@gmail.com>
Diffstat (limited to 'cmakeconfig.h.in')
0 files changed, 0 insertions, 0 deletions