/* \summary: version-independent OpenFlow printer */
#ifdef HAVE_CONFIG_H
-#include "config.h"
+#include <config.h>
#endif
-#include <netdissect-stdinc.h>
+#include "netdissect-stdinc.h"
#include "netdissect.h"
#include "extract.h"
#include "openflow.h"
#include "oui.h"
-static const char tstr[] = " [|openflow]";
#define OF_VER_1_0 0x01
goto invalid;
/* version */
ND_TCHECK_1(cp);
- version = EXTRACT_U_1(cp);
+ version = GET_U_1(cp);
cp += 1;
/* type */
ND_TCHECK_1(cp);
- type = EXTRACT_U_1(cp);
+ type = GET_U_1(cp);
cp += 1;
/* length */
ND_TCHECK_2(cp);
- length = EXTRACT_BE_U_2(cp);
+ length = GET_BE_U_2(cp);
cp += 2;
/* xid */
ND_TCHECK_4(cp);
- xid = EXTRACT_BE_U_4(cp);
+ xid = GET_BE_U_4(cp);
cp += 4;
/* Message length includes the header length and a message always includes
* the basic header. A message length underrun fails decoding of the rest of
}
invalid: /* fail current packet */
- ND_PRINT("%s", istr);
+ nd_print_invalid(ndo);
ND_TCHECK_LEN(cp, ep - cp);
return ep;
trunc:
- ND_PRINT("%s", tstr);
+ nd_print_trunc(ndo);
return ep;
}
/* Print a TCP segment worth of OpenFlow messages presuming the segment begins
* on a message boundary. */
void
-openflow_print(netdissect_options *ndo, const u_char *cp, const u_int len)
+openflow_print(netdissect_options *ndo, const u_char *cp, const u_int len _U_)
{
- const u_char *ep = cp + len;
-
+ ndo->ndo_protocol = "openflow";
ND_PRINT(": OpenFlow");
- while (cp < ep)
- cp = of_header_body_print(ndo, cp, ep);
+ while (cp < ndo->ndo_snapend)
+ cp = of_header_body_print(ndo, cp, ndo->ndo_snapend);
}