Because packet length (len) >= capture length (caplen).
(see the sanity checks in print.c, pretty_print_packet() function)
* Fail if we don't have enough data for the Hilscher pseudo-header.
*/
ndo->ndo_protocol = "netanalyzer_if";
- if (h->len < 4 || h->caplen < 4) {
+ if (h->caplen < 4) {
nd_print_trunc(ndo);
return (h->caplen);
}
* preamble, and SOF.
*/
ndo->ndo_protocol = "netanalyzer_transparent_if";
- if (h->len < 12 || h->caplen < 12) {
+ if (h->caplen < 12) {
nd_print_trunc(ndo);
return (h->caplen);
}