X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/ba8936b39b0ce2ff02f3aeb307df4c27657652d8..496c43c10b94112b5a2d0634d55d85e58e3f6722:/print-null.c diff --git a/print-null.c b/print-null.c index e7daacd4..1edff6af 100644 --- a/print-null.c +++ b/print-null.c @@ -55,7 +55,7 @@ ((((y)&0xff)<<24) | (((y)&0xff00)<<8) | (((y)&0xff0000)>>8) | (((y)>>24)&0xff)) static void -null_hdr_print(netdissect_options *ndo, u_int family, u_int length) +null_hdr_print(netdissect_options *ndo, uint32_t family, u_int length) { if (!ndo->ndo_qflag) { ND_PRINT("AF %s (%u)", @@ -74,19 +74,22 @@ null_hdr_print(netdissect_options *ndo, u_int family, u_int length) * 'h->len' is the length of the packet off the wire, and 'h->caplen' * is the number of bytes actually captured. */ -u_int +void null_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) { u_int length = h->len; u_int caplen = h->caplen; uint32_t family; - ndo->ndo_protocol = "null_if"; - if (caplen < NULL_HDRLEN) - goto trunc; + ndo->ndo_protocol = "null"; + if (caplen < NULL_HDRLEN) { + ndo->ndo_ll_hdr_len += caplen; + nd_print_trunc(ndo); + return; + } + ndo->ndo_ll_hdr_len += NULL_HDRLEN; - ND_TCHECK_4(p); - memcpy((char *)&family, (const char *)p, sizeof(family)); + family = GET_HE_U_4(p); /* * This isn't necessarily in our host byte order; if this is @@ -138,8 +141,5 @@ null_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char ND_DEFAULTPRINT(p, caplen); } - return (NULL_HDRLEN); -trunc: - nd_print_trunc(ndo); - return (NULL_HDRLEN); + return; }