Reminder: EXTRACT_8BITS is now EXTRACT_U_1.
In tok2str() calls (step 4).
ND_PRINT((ndo, "Q.2931"));
ND_TCHECK(p[MSG_TYPE_POS]);
ND_PRINT((ndo, ":%s ",
- tok2str(msgtype2str, "msgtype#%d", p[MSG_TYPE_POS])));
+ tok2str(msgtype2str, "msgtype#%d", EXTRACT_U_1(p + MSG_TYPE_POS))));
/*
* The call reference comes before the message type,
ND_TCHECK(*tptr);
ND_PRINT((ndo, "%s", tok2str(bgp_origin_values,
"Unknown Origin Typecode",
- tptr[0])));
+ EXTRACT_U_1(tptr))));
}
break;
while (tptr < pptr + len) {
ND_TCHECK(tptr[0]);
ND_PRINT((ndo, "%s", tok2str(bgp_as_path_segment_open_values,
- "?", tptr[0])));
+ "?", EXTRACT_U_1(tptr))));
ND_TCHECK(tptr[1]);
for (i = 0; i < tptr[1] * as_size; i += as_size) {
ND_TCHECK2(tptr[2 + i], as_size);
}
ND_TCHECK(tptr[0]);
ND_PRINT((ndo, "%s", tok2str(bgp_as_path_segment_close_values,
- "?", tptr[0])));
+ "?", EXTRACT_U_1(tptr))));
ND_TCHECK(tptr[1]);
tptr += 2 + tptr[1] * as_size;
}
EXTRACT_BE_U_2(opt + i + 2)),
EXTRACT_BE_U_2(opt + i + 2),
tok2str(bgp_safi_values, "Unknown",
- opt[i+5]),
+ EXTRACT_U_1(opt + i + 5)),
opt[i+5]));
break;
case BGP_CAPCODE_RESTART:
EXTRACT_BE_U_2(opt + i + cap_offset)),
EXTRACT_BE_U_2(opt + i + cap_offset),
tok2str(bgp_safi_values,"Unknown",
- opt[i+cap_offset+2]),
+ EXTRACT_U_1(opt + i + cap_offset + 2)),
opt[i+cap_offset+2],
((opt[i+cap_offset+3])&0x80) ? "yes" : "no" ));
tcap_len-=4;
ND_PRINT((ndo, "\n\t\tAFI %s (%u), SAFI %s (%u), Send/Receive: %s",
tok2str(af_values,"Unknown",EXTRACT_BE_U_2(opt + i + cap_offset)),
EXTRACT_BE_U_2(opt + i + cap_offset),
- tok2str(bgp_safi_values,"Unknown",opt[i+cap_offset+2]),
+ tok2str(bgp_safi_values,"Unknown",EXTRACT_U_1(opt + i + cap_offset + 2)),
opt[i+cap_offset+2],
- tok2str(bgp_add_path_recvsend,"Bogus (0x%02x)",opt[i+cap_offset+3])
+ tok2str(bgp_add_path_recvsend,"Bogus (0x%02x)",EXTRACT_U_1(opt + i + cap_offset + 3))
));
tcap_len-=4;
cap_offset+=4;
proto = EXTRACT_BE_U_2(p + 2);
if (ndo->ndo_eflag) {
ND_PRINT((ndo, "%s, ethertype %s (0x%04x), length %u: ",
- tok2str(chdlc_cast_values, "0x%02x", p[0]),
+ tok2str(chdlc_cast_values, "0x%02x", EXTRACT_U_1(p)),
tok2str(ethertype_values, "Unknown", proto),
proto,
length));
ND_TCHECK2(bp[group + 4], sizeof(struct in6_addr));
ND_PRINT((ndo," [gaddr %s", ip6addr_string(ndo, &bp[group + 4])));
ND_PRINT((ndo," %s", tok2str(mldv2report2str, " [v2-report-#%d]",
- bp[group])));
+ EXTRACT_U_1(bp + group))));
nsrcs = (bp[group + 2] << 8) + bp[group + 3];
/* Check the number of sources and print them */
if (len < group + 20 + (nsrcs * sizeof(struct in6_addr))) {
ND_TCHECK2(bp[group+4], 4);
ND_PRINT((ndo, " [gaddr %s", ipaddr_string(ndo, &bp[group+4])));
ND_PRINT((ndo, " %s", tok2str(igmpv3report2str, " [v3-report-#%d]",
- bp[group])));
+ EXTRACT_U_1(bp + group))));
nsrcs = EXTRACT_BE_U_2(bp + group + 2);
/* Check the number of sources and print them */
if (len < group+8+(nsrcs<<2)) {
switch (EXTRACT_BE_U_2(p + 2)) {
case PPP_CHAP:
ND_TCHECK(p[4]);
- ND_PRINT((ndo, ", %s", tok2str(authalg_values, "Unknown Auth Alg %u", p[4])));
+ ND_PRINT((ndo, ", %s", tok2str(authalg_values, "Unknown Auth Alg %u", EXTRACT_U_1(p + 4))));
break;
case PPP_PAP: /* fall through */
case PPP_EAP:
ND_PRINT((ndo, ": "));
ND_TCHECK(p[2]);
ND_PRINT((ndo, ": Callback Operation %s (%u)",
- tok2str(ppp_callback_values, "Unknown", p[2]),
+ tok2str(ppp_callback_values, "Unknown", EXTRACT_U_1(p + 2)),
p[2]));
break;
case LCPOPT_MLMRRU: