diff options
author | Thomas Fleischmann <thomas.fleischmann.08@googlemail.com> | 2015-02-19 02:46:48 -0800 |
---|---|---|
committer | Tobias Klauser <tklauser@distanz.ch> | 2016-01-21 18:35:13 +0100 |
commit | f634c7420a9345987001c0e965c4d79057197f6f (patch) | |
tree | bf7adffad4682c0c040688697275b794de657cf3 /netsniff-ng.8 | |
parent | 73928b158a1190c55b22418faf5cd3f3204108d1 (diff) |
mausezahn: Fix reading of hex payload file
Using the option -F with mausezahn, to read input out of a hexfile,
results in corrupt data transmitted (first byte will always be 0).
Properly parse "payload="/p=" at the start of the file by the same
method as used in layer3.c and layer4.c
Closes #153
Reference: http://permalink.gmane.org/gmane.linux.network.netsniff-ng/600
Signed-off-by: Thomas Fleischmann <thomas.fleischmann.08@googlemail.com>
Reported-by: Thomas De Schampheleire
Signed-off-by: Tobias Klauser <tklauser@distanz.ch>
Diffstat (limited to 'netsniff-ng.8')
0 files changed, 0 insertions, 0 deletions