summaryrefslogtreecommitdiffstats
path: root/tests/py/ip/ip.t.json
diff options
context:
space:
mode:
authorPablo Neira Ayuso <pablo@netfilter.org>2023-08-29 17:46:03 +0200
committerPablo Neira Ayuso <pablo@netfilter.org>2023-08-30 09:39:58 +0200
commit67edd1f2330a31e93789639d31315b64d01a79a3 (patch)
treeebb56759b647461b6e684c5f3f4b3d2c91d5192c /tests/py/ip/ip.t.json
parent01167c393a12c74c6f9a3015b75702964ff5bcda (diff)
proto: use hexadecimal to display ip frag-off field
The ip frag-off field in the protocol definition is 16-bits long and it contains the DF (0x2000) and MF (0x4000) bits too. iptables-translate also suggests: ip frag-off & 0x1ffff != 0 to match on fragments. Use hexadecimal for listing this header field. Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'tests/py/ip/ip.t.json')
-rw-r--r--tests/py/ip/ip.t.json12
1 files changed, 6 insertions, 6 deletions
diff --git a/tests/py/ip/ip.t.json b/tests/py/ip/ip.t.json
index b1085035..faf18fef 100644
--- a/tests/py/ip/ip.t.json
+++ b/tests/py/ip/ip.t.json
@@ -384,7 +384,7 @@
}
]
-# ip frag-off 222 accept
+# ip frag-off 0xde accept
[
{
"match": {
@@ -403,7 +403,7 @@
}
]
-# ip frag-off != 233
+# ip frag-off != 0xe9
[
{
"match": {
@@ -419,7 +419,7 @@
}
]
-# ip frag-off 33-45
+# ip frag-off 0x21-0x2d
[
{
"match": {
@@ -437,7 +437,7 @@
}
]
-# ip frag-off != 33-45
+# ip frag-off != 0x21-0x2d
[
{
"match": {
@@ -455,7 +455,7 @@
}
]
-# ip frag-off { 33, 55, 67, 88}
+# ip frag-off { 0x21, 0x37, 0x43, 0x58}
[
{
"match": {
@@ -478,7 +478,7 @@
}
]
-# ip frag-off != { 33, 55, 67, 88}
+# ip frag-off != { 0x21, 0x37, 0x43, 0x58}
[
{
"match": {