# BGP tests
bgp_vpn_attrset bgp_vpn_attrset.pcap bgp_vpn_attrset.out -t -v
mpbgp-linklocal-nexthop mpbgp-linklocal-nexthop.pcap mpbgp-linklocal-nexthop.out -t -v
+bgp_infloop-v bgp-infinite-loop.pcap bgp_infloop-v.out -t -v
# EAP tests
eapon1 eapon1.pcap eapon1.out -t
# MPLS tests
mpls-ldp-hello mpls-ldp-hello.pcap mpls-ldp-hello.out -t -v
+ldp_infloop ldp-infinite-loop.pcap ldp_infloop.out -t
# OSPF tests
ospf-gmpls ospf-gmpls.pcap ospf-gmpls.out -t -v
pimv2_sm-v PIM-SM_join_prune.pcap pimv2_sm-v.out -t -v
pimv2_bootstrap-v PIMv2_bootstrap.pcap pimv2_bootstrap-v.out -t -v
pimv2_hellos-v PIMv2_hellos.pcap pimv2_hellos-v.out -t -v
+
+# IS-IS tests
+isis_infloop-v isis-infinite-loop.pcap isis_infloop-v.out -t -v
+
+# RSVP tests
+rsvp_infloop-v rsvp-infinite-loop.pcap rsvp_infloop-v.out -t -v
+
+# HDLC tests
+hdlc1 chdlc-slarp.pcap hdlc1.out -t
+hdlc2 chdlc-slarp-short.pcap hdlc2.out -t
--- /dev/null
+IP (tos 0x0, ttl 128, id 1467, offset 0, flags [DF], proto TCP (6), length 74)
+ 196.59.48.65.14214 > 192.168.1.1.179: Flags [P.], cksum 0xbec1 (correct), seq 2470159403:2470159437, ack 160570221, win 8192, length 34: BGP, length: 34
+ Update Message (2), length: 19[|BGP]
+IP (tos 0x0, ttl 64, id 39449, offset 0, flags [DF], proto TCP (6), length 74)
+ 235.101.90.12.60082 > 192.168.1.1.179: Flags [P.], cksum 0x742d (correct), seq 1978178:1978212, ack 2473062416, win 4096, length 34: BGP, length: 34
+ Update Message (2), length: 19[|BGP]
+IP (tos 0x0, ttl 128, id 43331, offset 0, flags [DF], proto TCP (6), length 74)
+ 179.110.109.87.40936 > 192.168.1.1.179: Flags [P.], cksum 0xd82d (correct), seq 3014673177:3014673211, ack 1498443316, win 4096, length 34: BGP, length: 34
+ Update Message (2), length: 19[|BGP]
+IP (tos 0x0, ttl 64, id 51082, offset 0, flags [DF], proto TCP (6), length 74)
+ 114.227.144.98.32757 > 192.168.1.1.179: Flags [P.], cksum 0xb456 (correct), seq 1117364848:1117364882, ack 3778435416, win 4096, length 34: BGP, length: 34
+ Update Message (2), length: 19[|BGP]
+IP (tos 0x0, ttl 64, id 51082, offset 0, flags [DF], proto TCP (6), length 74)
+ 114.227.144.98.32757 > 192.168.1.1.179: Flags [P.], cksum 0xb456 (correct), seq 0:34, ack 1, win 4096, length 34: BGP, length: 34
+ Update Message (2), length: 19[|BGP]
--- /dev/null
+SLARP (length: 18), keepalive: mineseen=0x000d0a31, yourseen=0x57405e26, reliability=0x04ff, link uptime=49d12h52m33s
--- /dev/null
+SLARP (length: 14), keepalive: mineseen=0x000d0a31, yourseen=0x57405e26, reliability=0x04ff
--- /dev/null
+IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto GRE (47), length 54)
+ 253.120.2.55 > 192.168.1.1: GREv0, Flags [none], length 34
+ IS-IS, length 30
+ L1 LSP, hlen: 27, v: 1, pdu-v: 1, sys-id-len: 6 (6), max-area: 7 (7)
+ lsp-id: ffff.ffff.ffff.ff-ff, seq: 0xffffffff, lifetime: 65535s
+ chksum: 0xffff (incorrect should be 0x0fe8), PDU length: 65535, Flags: [ L1 IS ]
+ IS Neighbor(s) (variable length) TLV #7, length: 0
+ 1 straggler bytes
+IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto GRE (47), length 54)
+ 234.176.145.73 > 192.168.1.1: GREv0, Flags [none], length 34
+ IS-IS, length 30
+ L1 LSP, hlen: 27, v: 1, pdu-v: 1, sys-id-len: 6 (6), max-area: 7 (7)
+ lsp-id: ffff.ffff.ffff.ff-ff, seq: 0xffffffff, lifetime: 65535s
+ chksum: 0xffff (incorrect should be 0x0fe8), PDU length: 65535, Flags: [ L1 IS ]
+ IS Neighbor(s) (variable length) TLV #7, length: 0
+ 1 straggler bytes
+IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto GRE (47), length 54)
+ 225.91.211.91 > 192.168.1.1: GREv0, Flags [none], length 34
+ IS-IS, length 30
+ L1 LSP, hlen: 27, v: 1, pdu-v: 1, sys-id-len: 6 (6), max-area: 7 (7)
+ lsp-id: ffff.ffff.ffff.ff-ff, seq: 0xffffffff, lifetime: 65535s
+ chksum: 0xffff (incorrect should be 0x0fe8), PDU length: 65535, Flags: [ L1 IS ]
+ IS Neighbor(s) (variable length) TLV #7, length: 0
+ 1 straggler bytes
+IP (tos 0x0, ttl 128, id 0, offset 0, flags [DF], proto GRE (47), length 54)
+ 160.196.17.46 > 192.168.1.1: GREv0, Flags [none], length 34
+ IS-IS, length 30
+ L1 LSP, hlen: 27, v: 1, pdu-v: 1, sys-id-len: 6 (6), max-area: 7 (7)
+ lsp-id: ffff.ffff.ffff.ff-ff, seq: 0xffffffff, lifetime: 65535s
+ chksum: 0xffff (incorrect should be 0x0fe8), PDU length: 65535, Flags: [ L1 IS ]
+ IS Neighbor(s) (variable length) TLV #7, length: 0
+ 1 straggler bytes
+IP (tos 0x0, ttl 128, id 0, offset 0, flags [DF], proto GRE (47), length 54)
+ 246.181.173.63 > 192.168.1.1: GREv0, Flags [none], length 34
+ IS-IS, length 30
+ L1 LSP, hlen: 27, v: 1, pdu-v: 1, sys-id-len: 6 (6), max-area: 7 (7)
+ lsp-id: ffff.ffff.ffff.ff-ff, seq: 0xffffffff, lifetime: 65535s
+ chksum: 0xffff (incorrect should be 0x0fe8), PDU length: 65535, Flags: [ L1 IS ]
+ IS Neighbor(s) (variable length) TLV #7, length: 0
+ 1 straggler bytes
--- /dev/null
+IP 45.116.197.72.45307 > 192.168.1.1.646:
+IP 90.6.30.91.34115 > 192.168.1.1.646:
+IP 146.203.190.45.13504 > 192.168.1.1.646:
+IP 67.199.76.127.18327 > 192.168.1.1.646:
+IP 13.213.243.81.57100 > 192.168.1.1.646:
--- /dev/null
+IP (tos 0x0, ttl 128, id 0, offset 0, flags [DF], proto RSVP (46), length 40)
+ 208.208.77.43 > 192.168.1.1:
+ RSVPv1 Hello Message (20), Flags: [none], length: 20, ttl: 64, checksum: 0x98ce
+ ERO Object (20) Flags: [reject if unknown], Class-Type: IPv4 (1), length: 8
+ Subobject Type: Label, length 0
+ ERROR: zero length ERO subtype
+ ERROR: object header too short 0 < 4
+IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto RSVP (46), length 40)
+ 199.106.167.61 > 192.168.1.1:
+ RSVPv1 Hello Message (20), Flags: [none], length: 20, ttl: 64, checksum: 0x98ce
+ ERO Object (20) Flags: [reject if unknown], Class-Type: IPv4 (1), length: 8
+ Subobject Type: Label, length 0
+ ERROR: zero length ERO subtype
+ ERROR: object header too short 0 < 4
+IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto RSVP (46), length 40)
+ 179.9.22.16 > 192.168.1.1:
+ RSVPv1 Hello Message (20), Flags: [none], length: 20, ttl: 128, checksum: 0x58ce
+ ERO Object (20) Flags: [reject if unknown], Class-Type: IPv4 (1), length: 8
+ Subobject Type: Label, length 0
+ ERROR: zero length ERO subtype
+ ERROR: object header too short 0 < 4
+IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto RSVP (46), length 40)
+ 99.107.153.33 > 192.168.1.1:
+ RSVPv1 Hello Message (20), Flags: [none], length: 20, ttl: 128, checksum: 0x58ce
+ ERO Object (20) Flags: [reject if unknown], Class-Type: IPv4 (1), length: 8
+ Subobject Type: Label, length 0
+ ERROR: zero length ERO subtype
+ ERROR: object header too short 0 < 4
+IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto RSVP (46), length 40)
+ 188.46.23.116 > 192.168.1.1:
+ RSVPv1 Hello Message (20), Flags: [none], length: 20, ttl: 128, checksum: 0x58ce
+ ERO Object (20) Flags: [reject if unknown], Class-Type: IPv4 (1), length: 8
+ Subobject Type: Label, length 0
+ ERROR: zero length ERO subtype
+ ERROR: object header too short 0 < 4