static const struct tok nflog_values[] = {
{ AF_INET, "IPv4" },
-#ifdef AF_INET6
{ AF_INET6, "IPv6" },
-#endif /*AF_INET6*/
{ 0, NULL }
};
ND_PRINT(", length %u: ", length);
}
-u_int
+void
nflog_if_print(netdissect_options *ndo,
- const struct pcap_pkthdr *h, const u_char *p)
+ const struct pcap_pkthdr *h, const u_char *p)
{
const nflog_hdr_t *hdr = (const nflog_hdr_t *)p;
uint16_t size;
u_int caplen = h->caplen;
u_int length = h->len;
- ndo->ndo_protocol = "nflog_if";
- if (caplen < NFLOG_HDR_LEN)
- goto trunc;
+ ndo->ndo_protocol = "nflog";
+ if (caplen < NFLOG_HDR_LEN) {
+ nd_print_trunc(ndo);
+ ndo->ndo_ll_hdr_len += caplen;
+ return;
+ }
+ ndo->ndo_ll_hdr_len += NFLOG_HDR_LEN;
ND_TCHECK_SIZE(hdr);
if (GET_U_1(hdr->nflog_version) != 0) {
ND_PRINT("version %u (unknown)", GET_U_1(hdr->nflog_version));
- return h_size;
+ return;
}
if (ndo->ndo_eflag)
ip_print(ndo, p, length);
break;
-#ifdef AF_INET6
case AF_INET6:
ip6_print(ndo, p, length);
break;
-#endif /* AF_INET6 */
default:
if (!ndo->ndo_eflag)
break;
}
- return h_size;
+ ndo->ndo_ll_hdr_len += h_size - NFLOG_HDR_LEN;
+ return;
trunc:
nd_print_trunc(ndo);
- return h_size;
+ ndo->ndo_ll_hdr_len += h_size - NFLOG_HDR_LEN;
}
#endif /* DLT_NFLOG */