Lines Matching refs:ndo

238 ldp_tlv_print(netdissect_options *ndo,
258 ND_PRINT((ndo, "\n\t\t TLV contents go past end of message"));
265 ND_PRINT((ndo, "\n\t %s TLV (0x%04x), length: %u, Flags: [%s and %s forward if unknown]",
280 ND_PRINT((ndo, "\n\t Hold Time: %us, Flags: [%s Hello%s]",
288 ND_PRINT((ndo, "\n\t IPv4 Transport Address: %s", ipaddr_string(ndo, tptr)));
292 ND_PRINT((ndo, "\n\t IPv6 Transport Address: %s", ip6addr_string(ndo, tptr)));
296 ND_PRINT((ndo, "\n\t Sequence Number: %u", EXTRACT_32BITS(tptr)));
304 ND_PRINT((ndo, "\n\t Address Family: %s, addresses",
310 ND_PRINT((ndo, " %s", ipaddr_string(ndo, tptr)));
318 ND_PRINT((ndo, " %s", ip6addr_string(ndo, tptr)));
331 ND_PRINT((ndo, "\n\t Version: %u, Keepalive: %us, Flags: [Downstream %s, Loop Detection %s]",
341 ND_PRINT((ndo, "\n\t %s FEC (0x%02x)",
357 i=decode_prefix4(ndo, tptr, tlv_tlen, buf, sizeof(buf));
361 ND_PRINT((ndo, ": IPv4 prefix (goes past end of TLV)"));
363 ND_PRINT((ndo, ": IPv4 prefix (invalid length)"));
365 ND_PRINT((ndo, ": IPv4 prefix %s", buf));
368 i=decode_prefix6(ndo, tptr, tlv_tlen, buf, sizeof(buf));
372 ND_PRINT((ndo, ": IPv4 prefix (goes past end of TLV)"));
374 ND_PRINT((ndo, ": IPv6 prefix (invalid length)"));
376 ND_PRINT((ndo, ": IPv6 prefix %s", buf));
379 ND_PRINT((ndo, ": Address family %u prefix", af));
397 ND_PRINT((ndo, ": %s, %scontrol word, group-ID %u, VC-info-length: %u",
407 ND_PRINT((ndo, ": %s, %scontrol word, group-ID %u, VC-ID %u, VC-info-length: %u",
415 ND_PRINT((ndo, " (invalid, < 4"));
433 ND_PRINT((ndo, "\n\t\tInterface Parameter: %s (0x%02x), len %u",
441 ND_PRINT((ndo, ": %u", EXTRACT_16BITS(tptr+2)));
445 ND_PRINT((ndo, ": "));
448 safeputchar(ndo, *(tptr + idx));
454 ND_PRINT((ndo, "\n\t\t Control Channels (0x%02x) = [%s]",
458 ND_PRINT((ndo, "\n\t\t CV Types (0x%02x) = [%s]",
464 print_unknown_data(ndo, tptr+2, "\n\t\t ", vc_info_tlv_len-2);
478 ND_PRINT((ndo, "\n\t Label: %u", EXTRACT_32BITS(tptr) & 0xfffff));
485 ND_PRINT((ndo, "\n\t Status: 0x%02x, Flags: [%s and %s forward]",
492 ND_PRINT((ndo, ", causing Message ID: 0x%08x", ui));
498 ND_PRINT((ndo, "\n\t Flags: [%sReconnect, %sSave State, %sAll-Label Protection, %s Checkpoint, %sRe-Learn State]",
508 ND_PRINT((ndo, ", Reconnect Timeout: %ums", ui));
512 ND_PRINT((ndo, ", Recovery Time: %ums", ui));
517 ND_PRINT((ndo, "\n\t MTU: %u", EXTRACT_16BITS(tptr)));
538 if (ndo->ndo_vflag <= 1)
539 print_unknown_data(ndo, tptr, "\n\t ", tlv_tlen);
545 ND_PRINT((ndo, "%s", tstr));
549 ND_PRINT((ndo, "\n\t\t TLV contents go past end of TLV"));
554 ldp_print(netdissect_options *ndo,
559 processed = ldp_pdu_print(ndo, pptr);
563 ND_PRINT((ndo, " [remaining length %u < %u]", len, processed));
564 ND_PRINT((ndo, "%s", istr));
574 ldp_pdu_print(netdissect_options *ndo,
591 ND_PRINT((ndo, "%sLDP version %u packet not supported",
592 (ndo->ndo_vflag < 1) ? "" : "\n\t",
600 ND_PRINT((ndo, "%sLDP, pdu-length: %u (too short, < %u)",
601 (ndo->ndo_vflag < 1) ? "" : "\n\t",
608 ND_PRINT((ndo, "%sLDP, Label-Space-ID: %s:%u, pdu-length: %u",
609 (ndo->ndo_vflag < 1) ? "" : "\n\t",
610 ipaddr_string(ndo, &ldp_com_header->lsr_id),
615 if (ndo->ndo_vflag < 1)
633 ND_PRINT((ndo, "\n\t %s Message (0x%04x), length: %u (too short, < %u)",
644 ND_PRINT((ndo, "\n\t %s Message (0x%04x), length: %u, Message ID: 0x%08x, Flags: [%s if unknown]",
671 processed = ldp_tlv_print(ndo, msg_tptr, msg_tlen);
689 if (ndo->ndo_vflag <= 1)
690 print_unknown_data(ndo, msg_tptr, "\n\t ", msg_tlen);
694 if (ndo->ndo_vflag > 1 || hexdump==TRUE)
695 print_unknown_data(ndo, tptr+sizeof(struct ldp_msg_header), "\n\t ",
703 ND_PRINT((ndo, "%s", tstr));