8 Commits

Author SHA1 Message Date
Rainer Gerhards
e4c926bfbc changed omudpspoof default spoof address to simplify typical use case 2010-08-05 15:44:01 +02:00
Rainer Gerhards
4ae292e664 bugfix: omudpspoof miscalculated source and destination ports
while this was probably not noticed for source ports, it resulted in
almost all destination ports being wrong, except for the default port
of 514, which by virtue of its binary representation was calculated
correct (and probably thus the bug not earlier detected).
2009-11-12 11:55:04 +01:00
Rainer Gerhards
6f511cecfa more cleanup and working towards a parser module calling interface
I cleaned up a lot of config variable access along the way. This
version compiles and runs, but does not yet offer any enhanced
functionality. pmrfc5424 is just a dummy that is not yet being used.
2009-11-03 12:39:48 +01:00
Rainer Gerhards
e04e1b5002 enhanced test environment (including testbench)
support for enhancing probability of memory addressing failure by
using non-NULL default value for malloced memory (optional, only if
requested by configure option). This helps to track down some
otherwise undetected issues within the testbench and is expected
to be very useful in the future.
2009-10-22 11:33:38 +02:00
Rainer Gerhards
f619d9ef14 done implementing omudpspoof
This is now a "good" rsyslog output module, working as usual. I've also
sorted out some reentrency issues. Code is clean and ready to be tested
in practice ;)
2009-07-10 12:59:27 +02:00
Rainer Gerhards
f2ce2b1cb7 commiting interim version with ability to specify spoof source 2009-07-09 18:55:49 +02:00
Rainer Gerhards
33c5bb3c08 first version supporting udp spoofing and non-spoofing at the same time
omudpspoof is now a dedicated output module. It's calling semantics so far
are based on omfwd, plus the need for the template to have the IP address
as a string in the starting position.
2009-07-09 11:27:10 +02:00
Rainer Gerhards
a7f8d99884 moved udp spoofing code to its own output module (omudpspoof) 2009-07-09 10:23:49 +02:00