tcp: fix mss flag in option parsing 89/22789/2
authorFlorin Coras <fcoras@cisco.com>
Wed, 16 Oct 2019 19:26:51 +0000 (12:26 -0700)
committerJohn Lo <loj@cisco.com>
Thu, 17 Oct 2019 13:06:35 +0000 (13:06 +0000)
Type: fix

Change-Id: Ib03151a097caf15e4e8285afea83d1b930a874b0
Signed-off-by: Florin Coras <fcoras@cisco.com>
src/vnet/tcp/tcp_input.c

index 310742b..22222fb 100755 (executable)
@@ -136,7 +136,7 @@ tcp_options_parse (tcp_header_t * th, tcp_options_t * to, u8 is_syn)
 
   /* Zero out all flags but those set in SYN */
   to->flags &= (TCP_OPTS_FLAG_SACK_PERMITTED | TCP_OPTS_FLAG_WSCALE
-               | TCP_OPTS_FLAG_TSTAMP | TCP_OPTION_MSS);
+               | TCP_OPTS_FLAG_TSTAMP | TCP_OPTS_FLAG_MSS);
 
   for (; opts_len > 0; opts_len -= opt_len, data += opt_len)
     {