- EXTRACT_BE_U_2(bp + i + 2),
- EXTRACT_BE_U_2(bp + i + 4));
+ GET_BE_U_2(bp + i + 2),
+ GET_BE_U_2(bp + i + 4));
* returned length, however, as it breaks out of the
* header-processing loop.
*/
* returned length, however, as it breaks out of the
* header-processing loop.
*/
if (type <= IP6M_MAX && mhlen < ip6m_hdrlen[type]) {
ND_PRINT("(header length %u is too small for type %u)", mhlen, type);
goto trunc;
if (type <= IP6M_MAX && mhlen < ip6m_hdrlen[type]) {
ND_PRINT("(header length %u is too small for type %u)", mhlen, type);
goto trunc;
ND_TCHECK_4(bp + hlen + 4);
ND_PRINT(" %s Init Cookie=%08x:%08x",
type == IP6M_HOME_TEST_INIT ? "Home" : "Care-of",
ND_TCHECK_4(bp + hlen + 4);
ND_PRINT(" %s Init Cookie=%08x:%08x",
type == IP6M_HOME_TEST_INIT ? "Home" : "Care-of",
hlen = IP6M_MINLEN;
if (ndo->ndo_vflag) {
ND_TCHECK_4(bp + hlen + 4);
ND_PRINT(" %s Init Cookie=%08x:%08x",
type == IP6M_HOME_TEST ? "Home" : "Care-of",
hlen = IP6M_MINLEN;
if (ndo->ndo_vflag) {
ND_TCHECK_4(bp + hlen + 4);
ND_PRINT(" %s Init Cookie=%08x:%08x",
type == IP6M_HOME_TEST ? "Home" : "Care-of",
}
hlen += 8;
if (ndo->ndo_vflag) {
ND_TCHECK_4(bp + hlen + 4);
ND_PRINT(" %s Keygen Token=%08x:%08x",
type == IP6M_HOME_TEST ? "Home" : "Care-of",
}
hlen += 8;
if (ndo->ndo_vflag) {
ND_TCHECK_4(bp + hlen + 4);
ND_PRINT(" %s Keygen Token=%08x:%08x",
type == IP6M_HOME_TEST ? "Home" : "Care-of",