X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/944e93fa4c29c4e5cdecd858ead5a37430a418af..cda9bf8c5f842fc7110fbbf2234bcc898f78c0bd:/print-symantec.c diff --git a/print-symantec.c b/print-symantec.c index 4fd834e1..6a0b4918 100644 --- a/print-symantec.c +++ b/print-symantec.c @@ -45,7 +45,7 @@ symantec_hdr_print(netdissect_options *ndo, const u_char *bp, u_int length) sp = (const struct symantec_header *)bp; - etype = EXTRACT_BE_U_2(sp->ether_type); + etype = GET_BE_U_2(sp->ether_type); if (!ndo->ndo_qflag) { if (etype <= MAX_ETHERNET_LENGTH_VAL) ND_PRINT("invalid ethertype %u", etype); @@ -77,8 +77,9 @@ symantec_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_ const struct symantec_header *sp; u_short ether_type; + ndo->ndo_protocol = "symantec_if"; if (caplen < sizeof (struct symantec_header)) { - ND_PRINT("[|symantec]"); + nd_print_trunc(ndo); return caplen; } @@ -90,7 +91,7 @@ symantec_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_ sp = (const struct symantec_header *)p; p += sizeof (struct symantec_header); - ether_type = EXTRACT_BE_U_2(sp->ether_type); + ether_type = GET_BE_U_2(sp->ether_type); if (ether_type <= MAX_ETHERNET_LENGTH_VAL) { /* ether_type not known, print raw packet */