Revert 31864 and 31866: don't use suffix rules. Pattern rules would work but I don...
[obnox/wireshark/wip.git] / doc / randpkt.txt
index 1de2929859b2db7a23ca7d5563ec4d58ab173472..3680e7f483b0c17c7ceee23f653a3d50d4d167ea 100644 (file)
@@ -1,10 +1,13 @@
 Random Packet Generator
 -----------------------
-$Id: randpkt.txt,v 1.1 1999/09/10 05:15:17 gram Exp $
+$Id$
 
-This small utility creates a libpcap trace file full of random packets.
+randpkt is a small utility creates a libpcap trace file full of random packets.
 You can control the number of packets, the maximum size of each packet,
-and the type of each packet.
+and the type of each packet. It is not build by default, but you
+can create it in the top-level Wireshark directory by typing:
+
+make randpkt
 
 By creating many randomized packets of a certain type, you can
 test packet sniffers to see how well they handle malformed packets.
@@ -84,27 +87,6 @@ in the following locations.
                        NULL,
                        WTAP_ENCAP_ETHERNET,
                        0 },
-
-               { "fddi",
-                       "Fiber Distributed Data Interface",
-                       PKT_FDDI,
-                       NULL,
-                       WTAP_ENCAP_FDDI,
-                       0 },
-
-               { "llc",
-                       "Logical Link Control",
-                       PKT_LLC,
-                       pkt_llc,
-                       WTAP_ENCAP_TR,  
-                       array_length(pkt_llc) },
-
-               { "tr",
-                       "Token-Ring",
-                       PKT_TR,
-                       NULL,
-                       WTAP_ENCAP_TR,
-                       0 }
        };
 
 Note that packets that designate only their datalink type have no sample