mausezahn: Fix reading of hex payload file
commitf634c7420a9345987001c0e965c4d79057197f6f
authorThomas Fleischmann <thomas.fleischmann.08@googlemail.com>
Thu, 19 Feb 2015 10:46:48 +0000 (19 02:46 -0800)
committerTobias Klauser <tklauser@distanz.ch>
Thu, 21 Jan 2016 17:35:13 +0000 (21 18:35 +0100)
treebf7adffad4682c0c040688697275b794de657cf3
parent73928b158a1190c55b22418faf5cd3f3204108d1
mausezahn: Fix reading of hex payload file

Using the option -F with mausezahn, to read input out of a hexfile,
results in corrupt data transmitted (first byte will always be 0).

Properly parse "payload="/p=" at the start of the file by the same
method as used in layer3.c and layer4.c

Closes #153

Reference: http://permalink.gmane.org/gmane.linux.network.netsniff-ng/600
Signed-off-by: Thomas Fleischmann <thomas.fleischmann.08@googlemail.com>
Reported-by: Thomas De Schampheleire
Signed-off-by: Tobias Klauser <tklauser@distanz.ch>
staging/layer1.c