[BACK]Return to inet.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / netstat

Diff for /src/usr.bin/netstat/inet.c between version 1.49 and 1.50

version 1.49, 2001/03/03 01:00:20 version 1.50, 2001/06/23 06:09:09
Line 272 
Line 272 
         p(tcps_sndprobe, "\t\t%u window probe packet%s\n");          p(tcps_sndprobe, "\t\t%u window probe packet%s\n");
         p(tcps_sndwinup, "\t\t%u window update packet%s\n");          p(tcps_sndwinup, "\t\t%u window update packet%s\n");
         p(tcps_sndctrl, "\t\t%u control packet%s\n");          p(tcps_sndctrl, "\t\t%u control packet%s\n");
           p(tcps_outhwcsum, "\t\t%u packet%s hardware-checksummed\n");
         p(tcps_rcvtotal, "\t%u packet%s received\n");          p(tcps_rcvtotal, "\t%u packet%s received\n");
         p2(tcps_rcvackpack, tcps_rcvackbyte, "\t\t%u ack%s (for %qd byte%s)\n");          p2(tcps_rcvackpack, tcps_rcvackbyte, "\t\t%u ack%s (for %qd byte%s)\n");
         p(tcps_rcvdupack, "\t\t%u duplicate ack%s\n");          p(tcps_rcvdupack, "\t\t%u duplicate ack%s\n");
Line 294 
Line 295 
         p(tcps_rcvbadoff, "\t\t%u discarded for bad header offset field%s\n");          p(tcps_rcvbadoff, "\t\t%u discarded for bad header offset field%s\n");
         p1(tcps_rcvshort, "\t\t%u discarded because packet too short\n");          p1(tcps_rcvshort, "\t\t%u discarded because packet too short\n");
         p1(tcps_rcvnosec, "\t\t%u discarded for missing IPSec protection\n");          p1(tcps_rcvnosec, "\t\t%u discarded for missing IPSec protection\n");
           p(tcps_inhwcsum, "\t\t%u packet%s hardware-checksummed\n");
         p(tcps_connattempt, "\t%u connection request%s\n");          p(tcps_connattempt, "\t%u connection request%s\n");
         p(tcps_accepts, "\t%u connection accept%s\n");          p(tcps_accepts, "\t%u connection accept%s\n");
         p(tcps_connects, "\t%u connection%s established (including accepts)\n");          p(tcps_connects, "\t%u connection%s established (including accepts)\n");
Line 343 
Line 345 
         p1(udps_badlen, "\t%lu with bad data length field\n");          p1(udps_badlen, "\t%lu with bad data length field\n");
         p1(udps_badsum, "\t%lu with bad checksum\n");          p1(udps_badsum, "\t%lu with bad checksum\n");
         p1(udps_nosum, "\t%lu with no checksum\n");          p1(udps_nosum, "\t%lu with no checksum\n");
           p(udps_inhwcsum, "\t%lu input packet%s hardware-checksummed\n");
           p(udps_outhwcsum, "\t%lu output packet%s hardware-checksummed\n");
         p1(udps_noport, "\t%lu dropped due to no socket\n");          p1(udps_noport, "\t%lu dropped due to no socket\n");
         p(udps_noportbcast, "\t%lu broadcast/multicast datagram%s dropped due to no socket\n");          p(udps_noportbcast, "\t%lu broadcast/multicast datagram%s dropped due to no socket\n");
         p1(udps_nosec, "\t%lu dropped due to missing IPSec protection\n");          p1(udps_nosec, "\t%lu dropped due to missing IPSec protection\n");
Line 411 
Line 415 
         p(ips_toolong, "\t%lu packet%s with ip length > max ip packet size\n");          p(ips_toolong, "\t%lu packet%s with ip length > max ip packet size\n");
         p(ips_nogif, "\t%lu tunneling packet%s that can't find gif\n");          p(ips_nogif, "\t%lu tunneling packet%s that can't find gif\n");
         p(ips_badaddr, "\t%lu datagram%s with bad address in header\n");          p(ips_badaddr, "\t%lu datagram%s with bad address in header\n");
           p(ips_inhwcsum, "\t%lu input datagram%s checksum-processed by hardware\n");
           p(ips_outhwcsum, "\t%lu output datagram%s checksum-processed by hardware\n");
 #undef p  #undef p
 #undef p1  #undef p1
 }  }

Legend:
Removed from v.1.49  
changed lines
  Added in v.1.50