=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/netstat/inet.c,v retrieving revision 1.31 retrieving revision 1.32 diff -c -r1.31 -r1.32 *** src/usr.bin/netstat/inet.c 1999/03/27 21:04:21 1.31 --- src/usr.bin/netstat/inet.c 1999/04/09 23:30:05 1.32 *************** *** 1,4 **** ! /* $OpenBSD: inet.c,v 1.31 1999/03/27 21:04:21 provos Exp $ */ /* $NetBSD: inet.c,v 1.14 1995/10/03 21:42:37 thorpej Exp $ */ /* --- 1,4 ---- ! /* $OpenBSD: inet.c,v 1.32 1999/04/09 23:30:05 niklas Exp $ */ /* $NetBSD: inet.c,v 1.14 1995/10/03 21:42:37 thorpej Exp $ */ /* *************** *** 38,44 **** #if 0 static char sccsid[] = "from: @(#)inet.c 8.4 (Berkeley) 4/20/94"; #else ! static char *rcsid = "$OpenBSD: inet.c,v 1.31 1999/03/27 21:04:21 provos Exp $"; #endif #endif /* not lint */ --- 38,44 ---- #if 0 static char sccsid[] = "from: @(#)inet.c 8.4 (Berkeley) 4/20/94"; #else ! static char *rcsid = "$OpenBSD: inet.c,v 1.32 1999/04/09 23:30:05 niklas Exp $"; #endif #endif /* not lint */ *************** *** 699,704 **** --- 699,706 ---- p(ip4s_ipackets, "\t%u total input packet%s\n"); p(ip4s_opackets, "\t%u total output packet%s\n"); p(ip4s_hdrops, "\t%u packet%s shorter than header shows\n"); + p(ip4s_pdrops, "\t%u packet%s dropped due to policy\n"); + p(ip4s_spoof, "\t%u packet%s with possibly spoofed local addresses\n"); p(ip4s_notip4, "\t%u packet%s with internal header not IPv4 received\n"); p(ip4s_qfull, "\t%u packet%s were dropped due to full output queue\n"); p(ip4s_ibytes, "\t%qu input byte%s\n");