if (!ND_TTEST_2(pgm->pgm_dport)) {
if (ip6) {
ND_PRINT("%s > %s:",
- ip6addr_string(ndo, ip6->ip6_src),
- ip6addr_string(ndo, ip6->ip6_dst));
+ GET_IP6ADDR_STRING(ip6->ip6_src),
+ GET_IP6ADDR_STRING(ip6->ip6_dst));
} else {
ND_PRINT("%s > %s:",
- ipaddr_string(ndo, ip->ip_src),
- ipaddr_string(ndo, ip->ip_dst));
+ GET_IPADDR_STRING(ip->ip_src),
+ GET_IPADDR_STRING(ip->ip_dst));
}
nd_print_trunc(ndo);
return;
if (ip6) {
if (GET_U_1(ip6->ip6_nxt) == IPPROTO_PGM) {
ND_PRINT("%s.%s > %s.%s: ",
- ip6addr_string(ndo, ip6->ip6_src),
+ GET_IP6ADDR_STRING(ip6->ip6_src),
tcpport_string(ndo, sport),
- ip6addr_string(ndo, ip6->ip6_dst),
+ GET_IP6ADDR_STRING(ip6->ip6_dst),
tcpport_string(ndo, dport));
} else {
ND_PRINT("%s > %s: ",
} else {
if (GET_U_1(ip->ip_p) == IPPROTO_PGM) {
ND_PRINT("%s.%s > %s.%s: ",
- ipaddr_string(ndo, ip->ip_src),
+ GET_IPADDR_STRING(ip->ip_src),
tcpport_string(ndo, sport),
- ipaddr_string(ndo, ip->ip_dst),
+ GET_IPADDR_STRING(ip->ip_dst),
tcpport_string(ndo, dport));
} else {
ND_PRINT("%s > %s: ",
break;
}
- ND_TCHECK_LEN(bp, sizeof(uint32_t));
ivl = GET_BE_U_4(bp);
bp += sizeof(uint32_t);
- ND_TCHECK_LEN(bp, sizeof(uint32_t));
rnd = GET_BE_U_4(bp);
bp += sizeof(uint32_t);
- ND_TCHECK_LEN(bp, sizeof(uint32_t));
mask = GET_BE_U_4(bp);
bp += sizeof(uint32_t);
* and stopping if we don't have enough.
*/
bp += (2 * sizeof(uint16_t));
- ND_TCHECK_2(bp);
switch (GET_BE_U_2(bp)) {
case AFNUM_INET:
ND_TCHECK_LEN(bp, sizeof(nd_ipv4));
ND_PRINT("[Total option length leaves no room for final option]");
return;
}
- ND_TCHECK_2(bp);
opt_type = GET_U_1(bp);
bp++;
opt_len = GET_U_1(bp);
ND_PRINT("[Option length not a multiple of 4]");
return;
}
- ND_TCHECK_4(bp);
ND_PRINT(" %u", GET_BE_U_4(bp));
bp += 4;
opt_len -= 4;