struct
fragment_part {
- u_short ip_id;
+ uint16_t ip_id;
uint8_t data[65536];
size_t cur_len;
};
switch(id) {
case MATCH_QR:
- snprintf(val, valsize, "%u", ldns_pkt_qr(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_qr(pkt));
break;
case MATCH_ID:
- snprintf(val, valsize, "%u", ldns_pkt_id(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_id(pkt));
break;
case MATCH_OPCODE:
- snprintf(val, valsize, "%u", ldns_pkt_get_opcode(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_get_opcode(pkt));
break;
case MATCH_RCODE:
- snprintf(val, valsize, "%u", ldns_pkt_rcode(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_rcode(pkt));
break;
case MATCH_PACKETSIZE:
snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_size(pkt));
break;
case MATCH_TC:
- snprintf(val, valsize, "%u", ldns_pkt_tc(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_tc(pkt));
break;
case MATCH_AD:
- snprintf(val, valsize, "%u", ldns_pkt_ad(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_ad(pkt));
break;
case MATCH_CD:
- snprintf(val, valsize, "%u", ldns_pkt_cd(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_cd(pkt));
break;
case MATCH_RD:
- snprintf(val, valsize, "%u", ldns_pkt_rd(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_rd(pkt));
break;
case MATCH_EDNS:
- snprintf(val, valsize, "%u", ldns_pkt_edns(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_edns(pkt));
break;
case MATCH_EDNS_PACKETSIZE:
- snprintf(val, valsize, "%u", ldns_pkt_edns_udp_size(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_edns_udp_size(pkt));
break;
case MATCH_DO:
- snprintf(val, valsize, "%u", ldns_pkt_edns_do(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_edns_do(pkt));
break;
case MATCH_QUESTION_SIZE:
- snprintf(val, valsize, "%u", ldns_pkt_qdcount(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_qdcount(pkt));
break;
case MATCH_ANSWER_SIZE:
- snprintf(val, valsize, "%u", ldns_pkt_ancount(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_ancount(pkt));
break;
case MATCH_AUTHORITY_SIZE:
- snprintf(val, valsize, "%u", ldns_pkt_nscount(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_nscount(pkt));
break;
case MATCH_ADDITIONAL_SIZE:
- snprintf(val, valsize, "%u", ldns_pkt_arcount(pkt));
+ snprintf(val, valsize, "%u", (unsigned int) ldns_pkt_arcount(pkt));
break;
case MATCH_SRC_ADDRESS:
free(val);
lt = ldns_lookup_by_name(ldns_opcodes, &str[i]);
if (lt) {
val = malloc(4);
- snprintf(val, 3, "%u", lt->id);
+ snprintf(val, 3, "%u", (unsigned int) lt->id);
} else {
val = malloc(strlen(str) - i + 1);
strcpy(val, &str[i]);
lt = ldns_lookup_by_name(ldns_rcodes, &str[i]);
if (lt) {
val = malloc(4);
- snprintf(val, 3, "%u", lt->id);
+ snprintf(val, 3, "%u", (unsigned int) lt->id);
} else {
val = malloc(strlen(str) - i + 1);
strcpy(val, &str[i]);
bpf_u_int32 len = cur_hdr.caplen;
struct timeval timestamp;
uint16_t ip_flags;
- u_short ip_len;
- u_short ip_id;
- u_short ip_f_offset;
+ uint16_t ip_len;
+ uint16_t ip_id;
+ uint16_t ip_f_offset;
const u_char *newdata = NULL;
/*
if (ntohs (eptr->ether_type) == ETHERTYPE_IP)
{
if (verbosity >= 5) {
- printf("Ethernet type hex:%x dec:%d is an IP packet\n",
- ntohs(eptr->ether_type),
- ntohs(eptr->ether_type));
+ printf("Ethernet type hex:%x dec:%u is an IP packet\n",
+ (unsigned int) ntohs(eptr->ether_type),
+ (unsigned int) ntohs(eptr->ether_type));
}
data_offset = ETHER_HEADER_LENGTH;
}
memcpy((char *) newdata, data, data_offset);
memcpy((char *) newdata+data_offset, fragment_p->data, fragment_p->cur_len);
- iptr->ip_len = ldns_read_uint16(&(fragment_p->cur_len));
+ iptr->ip_len = (u_short) ldns_read_uint16(&(fragment_p->cur_len));
iptr->ip_off = 0;
- len = fragment_p->cur_len;
+ len = (bpf_u_int32) fragment_p->cur_len;
cur_hdr.caplen = len;
fragment_p->ip_id = 0;
fragmented_packets++;
free(astr);
}
- ip_hdr_size = iptr->ip_hl * 4;
+ ip_hdr_size = (int) iptr->ip_hl * 4;
protocol = iptr->ip_p;
data_offset += ip_hdr_size;
}
ip_hdr_size = IP6_HEADER_LENGTH;
- protocol = ip6_hdr->ip6_ctlun.ip6_un1.ip6_un1_nxt;
+ protocol = (u_int8_t) ip6_hdr->ip6_ctlun.ip6_un1.ip6_un1_nxt;
data_offset += ip_hdr_size;
} else if (ntohs (eptr->ether_type) == ETHERTYPE_ARP) {
if (verbosity >= 5) {
- printf("Ethernet type hex:%x dec:%d is an ARP packet\n",
- ntohs(eptr->ether_type),
- ntohs(eptr->ether_type));
+ printf("Ethernet type hex:%x dec:%u is an ARP packet\n",
+ (unsigned int) ntohs(eptr->ether_type),
+ (unsigned int) ntohs(eptr->ether_type));
}
arp_packets++;
} else {
- printf("Ethernet type %x not IP\n", ntohs(eptr->ether_type));
+ printf("Ethernet type %x not IP\n", (unsigned int) ntohs(eptr->ether_type));
if (verbosity >= 5) {
- printf("Ethernet type %x not IP\n", ntohs(eptr->ether_type));
+ printf("Ethernet type %x not IP\n", (unsigned int) ntohs(eptr->ether_type));
}
not_ip_packets++;
if (not_ip_dump) {