Update the output of a test accordingly.
u_int ui;
ndo->ndo_protocol = "tftp";
+
+ /* Print protocol */
+ ND_PRINT("TFTP");
/* Print length */
- ND_PRINT(" %u", length);
+ ND_PRINT(", length %u", length);
/* Print tftp request type */
if (length < 2)
ND_TCHECK_2(bp);
opcode = EXTRACT_BE_U_2(bp);
cp = tok2str(op2str, "tftp-#%u", opcode);
- ND_PRINT(" %s", cp);
+ ND_PRINT(", %s", cp);
/* Bail if bogus opcode */
if (*cp == 't')
return;
1 01:10:59.680304 IP (tos 0x30, ttl 48, id 12336, offset 0, flags [DF], proto UDP (17), length 12336, bad cksum 3030 (->299d)!)
- 48.48.48.48.69 > 48.48.48.48.12336: 12308 RRQ "00" [|tftp]
+ 48.48.48.48.69 > 48.48.48.48.12336: TFTP, length 12308, RRQ "00" [|tftp]