Blame SOURCES/tcpdump-4.0.0-portnumbers.patch
|
|
75b7d9 |
diff -up tcpdump-3.9.8/addrtoname.c.portnumbers tcpdump-3.9.8/addrtoname.c
|
|
|
75b7d9 |
--- tcpdump-3.9.8/addrtoname.c.portnumbers 2007-09-26 03:59:52.000000000 +0200
|
|
|
75b7d9 |
+++ tcpdump-3.9.8/addrtoname.c 2008-08-29 13:53:12.000000000 +0200
|
|
|
75b7d9 |
@@ -704,7 +704,7 @@ init_servarray(void)
|
|
|
75b7d9 |
|
|
|
75b7d9 |
while (table->name)
|
|
|
75b7d9 |
table = table->nxt;
|
|
|
75b7d9 |
- if (nflag) {
|
|
|
75b7d9 |
+ if (nflag > 1) {
|
|
|
75b7d9 |
(void)snprintf(buf, sizeof(buf), "%d", port);
|
|
|
75b7d9 |
table->name = strdup(buf);
|
|
|
75b7d9 |
} else
|
|
|
75b7d9 |
@@ -1104,7 +1104,7 @@ init_addrtoname(u_int32_t localnet, u_in
|
|
|
75b7d9 |
f_localnet = localnet;
|
|
|
75b7d9 |
f_netmask = mask;
|
|
|
75b7d9 |
}
|
|
|
75b7d9 |
- if (nflag)
|
|
|
75b7d9 |
+ if (nflag > 1)
|
|
|
75b7d9 |
/*
|
|
|
75b7d9 |
* Simplest way to suppress names.
|
|
|
75b7d9 |
*/
|
|
|
75b7d9 |
diff -up tcpdump-3.9.8/tcpdump.1.portnumbers tcpdump-3.9.8/tcpdump.1
|
|
|
75b7d9 |
--- tcpdump-3.9.8/tcpdump.1.in.portnumbers 2008-08-29 13:53:12.000000000 +0200
|
|
|
75b7d9 |
+++ tcpdump-3.9.8/tcpdump.1.in 2008-08-29 13:53:12.000000000 +0200
|
|
|
75b7d9 |
@@ -403,7 +403,11 @@ Use \fIsecret\fP as a shared secret for
|
|
|
75b7d9 |
TCP segments with the TCP-MD5 option (RFC 2385), if present.
|
|
|
75b7d9 |
.TP
|
|
|
75b7d9 |
.B \-n
|
|
|
75b7d9 |
-Don't convert addresses (i.e., host addresses, port numbers, etc.) to names.
|
|
|
75b7d9 |
+Don't convert host addresses to names. This can be used to avoid
|
|
|
75b7d9 |
+DNS lookups.
|
|
|
75b7d9 |
+.TP
|
|
|
75b7d9 |
+.B \-nn
|
|
|
75b7d9 |
+Don't convert protocol and port numbers etc. to names either.
|
|
|
75b7d9 |
.TP
|
|
|
75b7d9 |
.B \-N
|
|
|
75b7d9 |
Don't print domain name qualification of host names.
|