Searched refs:ndo (Results 126 - 150 of 157) sorted by relevance

1234567

/freebsd-11-stable/contrib/tcpdump/
H A Dprint-arcnet.c122 arcnet_print(netdissect_options *ndo, const u_char *bp, u_int length, int phds, argument
132 if (ndo->ndo_qflag) {
133 ND_PRINT((ndo, "%02x %02x %d: ",
143 ND_PRINT((ndo, "%02x %02x %s %d: ",
150 ND_PRINT((ndo, "%02x %02x %s seqid %04x %d: ",
157 ND_PRINT((ndo, "%02x %02x %s seqid %04x "
162 ND_PRINT((ndo, "%02x %02x %s seqid %04x "
175 arcnet_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) argument
186 ND_PRINT((ndo, "[|arcnet]"));
207 arcnet_print(ndo,
263 arcnet_linux_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) argument
320 arcnet_encap_print(netdissect_options *ndo, u_char arctype, const u_char *p, u_int length, u_int caplen) argument
[all...]
H A Dprint-eap.c150 eap_print(netdissect_options *ndo, argument
165 if (ndo->ndo_vflag < 1) {
166 ND_PRINT((ndo, "%s (%u) v%u, len %u",
174 ND_PRINT((ndo, "%s (%u) v%u, len %u",
189 ND_PRINT((ndo, ", %s (%u), id %u, len %u",
200 ND_PRINT((ndo, "\n\t\t Type %s (%u)",
207 ND_PRINT((ndo, ", Identity: "));
208 safeputs(ndo, tptr + 5, len - 5);
214 ND_PRINT((ndo, ", Notification: "));
215 safeputs(ndo, tpt
[all...]
H A Dprint-igrp.c69 igrp_entry_print(netdissect_options *ndo, register const struct igrprte *igr, argument
76 ND_PRINT((ndo, " *.%d.%d.%d", igr->igr_net[0],
79 ND_PRINT((ndo, " X%d.%d.%d.0", igr->igr_net[0],
82 ND_PRINT((ndo, " %d.%d.%d.0", igr->igr_net[0],
92 ND_PRINT((ndo, " d=%d b=%d r=%d l=%d M=%d mtu=%d in %d hops",
105 igrp_print(netdissect_options *ndo, register const u_char *bp, u_int length) argument
113 ND_PRINT((ndo, "igrp:"));
121 ND_PRINT((ndo, " %s V%d edit=%d AS=%d (%d/%d/%d)",
134 igrp_entry_print(ndo, (const struct igrprte *)cp, 1, 0);
138 igrp_entry_print(ndo, (cons
[all...]
H A Dprint-pppoe.c88 pppoe_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, register const u_char *p) argument
90 return (pppoe_print(ndo, p, h->len));
94 pppoe_print(netdissect_options *ndo, register const u_char *bp, u_int length) argument
101 ND_PRINT((ndo, "truncated-pppoe %u", length));
115 ND_PRINT((ndo, " [ver %d]",pppoe_ver));
118 ND_PRINT((ndo, " [type %d]",pppoe_type));
121 ND_PRINT((ndo, "PPPoE %s", tok2str(pppoecode2str, "PAD-%x", pppoe_code)));
123 ND_PRINT((ndo, " [len %u!]",pppoe_length));
126 ND_PRINT((ndo, " [len %u > %u!]", pppoe_length, length));
130 ND_PRINT((ndo, " [se
[all...]
H A Dprint-token.c108 token_hdr_print(netdissect_options *ndo, argument
114 srcname = etheraddr_string(ndo, fsrc);
115 dstname = etheraddr_string(ndo, fdst);
117 if (!ndo->ndo_qflag)
118 ND_PRINT((ndo, "%02x %02x ",
121 ND_PRINT((ndo, "%s > %s, length %u: ",
149 token_print(netdissect_options *ndo, const u_char *p, u_int length, u_int caplen) argument
161 ND_PRINT((ndo, "%s", tstr));
175 if (ndo->ndo_eflag)
176 token_hdr_print(ndo, tr
247 token_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) argument
[all...]
H A Daddrtoname.c239 getname(netdissect_options *ndo, const u_char *ap) argument
252 p->nxt = newhnamemem(ndo);
261 if (!ndo->ndo_nflag &&
275 (*ndo->ndo_error)(ndo,
277 if (ndo->ndo_Nflag) {
288 (*ndo->ndo_error)(ndo, "getname: strdup(intoa(addr))");
297 getname6(netdissect_options *ndo, const u_char *ap) argument
318 p->nxt = newh6namemem(ndo);
361 lookup_emem(netdissect_options *ndo, const u_char *ep) argument
394 lookup_bytestring(netdissect_options *ndo, register const u_char *bs, const unsigned int nlen) argument
442 lookup_nsap(netdissect_options *ndo, register const u_char *nsap, register u_int nsap_length) argument
487 lookup_protoid(netdissect_options *ndo, const u_char *pi) argument
513 etheraddr_string(netdissect_options *ndo, register const u_char *ep) argument
559 le64addr_string(netdissect_options *ndo, const u_char *ep) argument
589 linkaddr_string(netdissect_options *ndo, const u_char *ep, const unsigned int type, const unsigned int len) argument
624 etherproto_string(netdissect_options *ndo, u_short port) argument
652 protoid_string(netdissect_options *ndo, register const u_char *pi) argument
682 isonsap_string(netdissect_options *ndo, const u_char *nsap, register u_int nsap_length) argument
713 tcpport_string(netdissect_options *ndo, u_short port) argument
734 udpport_string(netdissect_options *ndo, register u_short port) argument
755 ipxsap_string(netdissect_options *ndo, u_short port) argument
783 init_servarray(netdissect_options *ndo) argument
844 init_eprotoarray(netdissect_options *ndo) argument
877 init_protoidarray(netdissect_options *ndo) argument
931 init_etherarray(netdissect_options *ndo) argument
1196 init_ipxsaparray(netdissect_options *ndo) argument
1219 init_addrtoname(netdissect_options *ndo, uint32_t localnet, uint32_t mask) argument
1239 dnaddr_string(netdissect_options *ndo, u_short dnaddr) argument
1257 newhnamemem(netdissect_options *ndo) argument
1276 newh6namemem(netdissect_options *ndo) argument
[all...]
H A Dprint-eigrp.c210 eigrp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len) argument
236 ND_PRINT((ndo, "EIGRP version %u packet not supported",eigrp_com_header->version));
241 if (ndo->ndo_vflag < 1) {
242 ND_PRINT((ndo, "EIGRP %s, length: %u",
251 ND_PRINT((ndo, "EIGRP %s, length: %u (too short, < %u)",
259 ND_PRINT((ndo, "\n\tEIGRP v%u, opcode: %s (%u), chksum: 0x%04x, Flags: [%s]\n\tseq: 0x%08x, ack: 0x%08x, AS: %u, length: %u",
285 print_unknown_data(ndo,tptr+sizeof(struct eigrp_tlv_header),"\n\t ",tlen);
289 ND_PRINT((ndo, "\n\t %s TLV (0x%04x), length: %u",
297 ND_PRINT((ndo, " (too short, < %u)",
312 ND_PRINT((ndo, " (to
[all...]
H A Dprint-ospf6.c375 ospf6_print_ls_type(netdissect_options *ndo, argument
378 ND_PRINT((ndo, "\n\t %s LSA (%d), %s Scope%s, LSA-ID %s",
383 ipaddr_string(ndo, ls_stateid)));
387 ospf6_print_lshdr(netdissect_options *ndo, argument
394 ND_PRINT((ndo, "\n\t Advertising Router %s, seq 0x%08x, age %us, length %u",
395 ipaddr_string(ndo, &lshp->ls_router),
400 ospf6_print_ls_type(ndo, EXTRACT_16BITS(&lshp->ls_type), &lshp->ls_stateid);
408 ospf6_print_lsaprefix(netdissect_options *ndo, argument
421 ND_PRINT((ndo, " bogus prefixlen /%d", lsapp->lsa_p_len));
430 ND_PRINT((ndo, "\
449 ospf6_print_lsa(netdissect_options *ndo, register const struct lsa6 *lsap, const u_char *dataend) argument
723 ospf6_decode_v3(netdissect_options *ndo, register const struct ospf6hdr *op, register const u_char *dataend) argument
846 ospf6_print_lls(netdissect_options *ndo, const u_char *cp, const u_int len) argument
877 ospf6_decode_at(netdissect_options *ndo, const u_char *cp, const u_int len) argument
928 ospf6_decode_v3_trailer(netdissect_options *ndo, const struct ospf6hdr *op, const u_char *cp, const unsigned len) argument
955 ospf6_print(netdissect_options *ndo, register const u_char *bp, register u_int length) argument
[all...]
H A Dprint-fddi.c162 print_fddi_fc(netdissect_options *ndo, u_char fc) argument
167 ND_PRINT((ndo, "void "));
171 ND_PRINT((ndo, "nrt "));
175 ND_PRINT((ndo, "rt "));
179 ND_PRINT((ndo, "info "));
183 ND_PRINT((ndo, "nsa "));
187 ND_PRINT((ndo, "beacon "));
191 ND_PRINT((ndo, "claim "));
198 ND_PRINT((ndo, "mac%1x ", fc & FDDIFC_ZZZZ));
202 ND_PRINT((ndo, "sm
254 fddi_hdr_print(netdissect_options *ndo, register const struct fddi_header *fddip, register u_int length, register const u_char *fsrc, register const u_char *fdst) argument
271 fddi_smt_print(netdissect_options *ndo, const u_char *p _U_, u_int length _U_) argument
277 fddi_print(netdissect_options *ndo, const u_char *p, u_int length, u_int caplen) argument
342 fddi_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, register const u_char *p) argument
[all...]
H A Dutil-print.c75 fn_print_char(netdissect_options *ndo, u_char c) argument
79 ND_PRINT((ndo, "M-"));
83 ND_PRINT((ndo, "^"));
85 ND_PRINT((ndo, "%c", c));
95 fn_print(netdissect_options *ndo, argument
110 ND_PRINT((ndo, "M-"));
114 ND_PRINT((ndo, "^"));
116 ND_PRINT((ndo, "%c", c));
130 * of the packet, e.g. ndo->ndo_snapend. If ep is NULL, we assume no
140 fn_printztn(netdissect_options *ndo, argument
190 fn_printn(netdissect_options *ndo, register const u_char *s, register u_int n, register const u_char *ep) argument
219 fn_printzp(netdissect_options *ndo, register const u_char *s, register u_int n, register const u_char *ep) argument
325 ts_print(netdissect_options *ndo, register const struct timeval *tvp) argument
407 unsigned_relts_print(netdissect_options *ndo, uint32_t secs) argument
435 signed_relts_print(netdissect_options *ndo, int32_t secs) argument
472 print_unknown_data(netdissect_options *ndo, const u_char *cp,const char *ident,int len) argument
697 fetch_token(netdissect_options *ndo, const u_char *pptr, u_int idx, u_int len, u_char *tbuf, size_t tbuflen) argument
764 print_txt_line(netdissect_options *ndo, const char *protoname, const char *prefix, const u_char *pptr, u_int idx, u_int len) argument
834 txtproto_print(netdissect_options *ndo, const u_char *pptr, u_int len, const char *protoname, const char **cmds, u_int flags) argument
925 safeputs(netdissect_options *ndo, const u_char *s, const u_int maxlen) argument
938 safeputchar(netdissect_options *ndo, const u_char c) argument
[all...]
H A Dprint-cnfp.c158 cnfp_v1_print(netdissect_options *ndo, const u_char *cp) argument
182 ND_PRINT((ndo, "NetFlow v%x, %u.%03u uptime, %u.%09u, ", ver,
189 ND_PRINT((ndo, "%2u recs", nrecs));
199 ND_PRINT((ndo, "\n started %u.%03u, last %u.%03u",
206 ND_PRINT((ndo, "\n %s%s%s:%u ", intoa(nr->src_ina.s_addr), buf, asbuf,
209 ND_PRINT((ndo, "> %s%s%s:%u ", intoa(nr->dst_ina.s_addr), buf, asbuf,
212 ND_PRINT((ndo, ">> %s\n ", intoa(nr->nhop_ina.s_addr)));
214 if (!ndo->ndo_nflag && (p_name = netdb_protoname(nr->proto)) != NULL)
215 ND_PRINT((ndo, "%s ", p_name));
217 ND_PRINT((ndo, "
247 cnfp_v5_print(netdissect_options *ndo, const u_char *cp) argument
343 cnfp_v6_print(netdissect_options *ndo, const u_char *cp) argument
442 cnfp_print(netdissect_options *ndo, const u_char *cp) argument
[all...]
H A Dprint-forces.c69 int (*print) (netdissect_options *ndo, register const u_char * pptr, register u_int len,
233 int (*print) (netdissect_options *ndo, register const u_char * pptr, register u_int len,
526 chk_op_type(netdissect_options *ndo, argument
532 ND_PRINT((ndo, "Based on flags expected KEYINFO TLV!\n"));
536 ND_PRINT((ndo, "Illegal DATA encoding for type 0x%x programmed %x got %x \n",
645 prestlv_print(netdissect_options *ndo, argument
660 ND_PRINT((ndo, "illegal RESULT-TLV: %d bytes!\n", dlen));
666 ND_PRINT((ndo, "illegal reserved result code: 0x%x!\n", r->result));
670 if (ndo->ndo_vflag >= 3) {
672 ND_PRINT((ndo, "
683 fdatatlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument
718 sdatailv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument
764 sdatatlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument
793 pkeyitlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument
836 pdatacnt_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t IDcnt, uint16_t op_msk, int indent) argument
991 pdata_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument
1055 genoptlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument
1101 recpdoptlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument
1155 invoptlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument
1170 otlv_print(netdissect_options *ndo, const struct forces_tlv *otlv, uint16_t op_msk _U_, int indent) argument
1216 asttlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument
1274 asrtlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument
1346 print_metailv(netdissect_options *ndo, register const u_char * pptr, uint16_t op_msk _U_, int indent) argument
1374 print_metatlv(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument
1416 print_reddata(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument
1438 redirect_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument
1507 lfbselect_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument
1586 forces_type_print(netdissect_options *ndo, register const u_char * pptr, const struct forcesh *fhdr _U_, register u_int mlen, const struct tom_h *tops) argument
1676 forces_print(netdissect_options *ndo, register const u_char * pptr, register u_int len) argument
[all...]
H A Dprint-olsr.c234 olsr_print_lq_neighbor4(netdissect_options *ndo, argument
245 ND_PRINT((ndo, "\n\t neighbor %s, link-quality %.2f%%"
247 ipaddr_string(ndo, lq_neighbor->neighbor),
258 olsr_print_lq_neighbor6(netdissect_options *ndo, argument
269 ND_PRINT((ndo, "\n\t neighbor %s, link-quality %.2f%%"
271 ip6addr_string(ndo, lq_neighbor->neighbor),
285 olsr_print_neighbor(netdissect_options *ndo, argument
290 ND_PRINT((ndo, "\n\t neighbor\n\t\t"));
299 ND_PRINT((ndo, "%s%s", ipaddr_string(ndo, msg_dat
310 olsr_print(netdissect_options *ndo, const u_char *pptr, u_int length, int is_ipv6) argument
[all...]
H A Dprint-mpcp.c124 mpcp_print(netdissect_options *ndo, register const u_char *pptr, register u_int length) argument
145 ND_PRINT((ndo, "MPCP, Opcode %s", tok2str(mpcp_opcode_values, "Unknown (%u)", opcode)));
147 ND_PRINT((ndo, ", Timestamp %u ticks", EXTRACT_32BITS(mpcp.common_header->timestamp)));
149 ND_PRINT((ndo, ", length %u", length));
151 if (!ndo->ndo_vflag)
163 ND_PRINT((ndo, "\n\tGrant Numbers %u, Flags [ %s ]",
173 ND_PRINT((ndo, "\n\tGrant #%u, Start-Time %u ticks, duration %u ticks",
181 ND_PRINT((ndo, "\n\tSync-Time %u ticks", EXTRACT_16BITS(tptr)));
189 ND_PRINT((ndo, "\n\tTotal Queue-Sets %u", queue_sets));
194 ND_PRINT((ndo, "\
[all...]
H A Dprint-rpki-rtr.c178 rpki_rtr_pdu_print (netdissect_options *ndo, const u_char *tptr, const u_int len, argument
194 ND_PRINT((ndo, "%sRPKI-RTRv%u (unknown)", indent_string(8), *tptr));
198 ND_PRINT((ndo, "(%u bytes is too few to decode)", len));
211 ND_PRINT((ndo, "%sRPKI-RTRv%u, %s PDU (%u), length: %u",
231 ND_PRINT((ndo, "%sSession ID: 0x%04x, Serial: %u",
255 ND_PRINT((ndo, "%sSession ID: 0x%04x",
268 ND_PRINT((ndo, "%sIPv4 Prefix %s/%u-%u, origin-as %u, flags 0x%02x",
270 ipaddr_string(ndo, pdu->prefix),
284 ND_PRINT((ndo, "%sIPv6 Prefix %s/%u-%u, origin-as %u, flags 0x%02x",
286 ip6addr_string(ndo, pd
390 rpki_rtr_print(netdissect_options *ndo, register const u_char *pptr, register u_int len) argument
[all...]
H A Daddrtoname.h61 #define ipaddr_string(ndo, p) getname(ndo, (const u_char *)(p))
62 #define ip6addr_string(ndo, p) getname6(ndo, (const u_char *)(p))
H A Dprint-vtp.c119 vtp_print (netdissect_options *ndo, argument
134 ND_PRINT((ndo, "VTPv%u, Message %s (0x%02x), length %u",
141 if (ndo->ndo_vflag < 1) {
146 ND_PRINT((ndo, "\n\tDomain name: "));
149 ND_PRINT((ndo, " [invalid MgmtD Len %d]", mgmtd_len));
152 fn_printzp(ndo, tptr + 4, mgmtd_len, NULL);
153 ND_PRINT((ndo, ", %s: %u",
184 ND_PRINT((ndo, "\n\t Config Rev %x, Updater %s",
186 ipaddr_string(ndo, tptr+4)));
189 ND_PRINT((ndo, ", Timestam
[all...]
H A Dprint-stp.c102 stp_print_config_bpdu(netdissect_options *ndo, const struct stp_bpdu_ *stp_bpdu, argument
106 ND_PRINT((ndo, ", Flags [%s]",
110 ND_PRINT((ndo, ", bridge-id %s.%04x, length %u",
115 if (!ndo->ndo_vflag) {
120 ND_PRINT((ndo, "\n\tmessage-age %.2fs, max-age %.2fs"
127 ND_PRINT((ndo, "\n\troot-id %s, root-pathcost %u",
133 ND_PRINT((ndo, ", port-role %s",
239 stp_print_mstp_bpdu(netdissect_options *ndo, const struct stp_bpdu_ *stp_bpdu, argument
249 ND_PRINT((ndo, ", CIST Flags [%s], length %u",
255 if (!ndo
347 stp_print_spb_bpdu(netdissect_options *ndo, const struct stp_bpdu_ *stp_bpdu, u_int offset) argument
402 stp_print(netdissect_options *ndo, const u_char *p, u_int length) argument
[all...]
H A Dprint-vqp.c101 vqp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len) argument
123 ND_PRINT((ndo, "VQP version %u packet not supported",
129 if (ndo->ndo_vflag < 1) {
130 ND_PRINT((ndo, "VQPv%u %s Message, error-code %s (%u), length %u",
141 ND_PRINT((ndo, "\n\tVQPv%u, %s Message, error-code %s (%u), seq 0x%08x, items %u, length %u",
165 ND_PRINT((ndo, "\n\t %s Object (0x%08x), length %u, value: ",
183 ND_PRINT((ndo, "%s (0x%08x)", ipaddr_string(ndo, tptr), EXTRACT_32BITS(tptr)));
190 safeputs(ndo, tptr, vqp_obj_len);
197 ND_PRINT((ndo, "
[all...]
H A Dprint-slow.c245 slow_print(netdissect_options *ndo, argument
265 ND_PRINT((ndo, "LACP version %u packet not supported", *(pptr+1)));
276 ND_PRINT((ndo, "MARKER version %u packet not supported", *(pptr+1)));
293 ND_PRINT((ndo, "%sv%u, length %u",
299 ND_PRINT((ndo, "%s, length %u",
306 print_unknown_data(ndo, pptr, "\n\t", len);
310 if (!ndo->ndo_vflag)
321 slow_oam_print(ndo, pptr, len);
329 slow_marker_lacp_print(ndo, pptr, len, subtype);
335 if (!ndo
349 slow_marker_lacp_print(netdissect_options *ndo, register const u_char *tptr, register u_int tlen, u_int proto_subtype) argument
490 slow_oam_print(netdissect_options *ndo, register const u_char *tptr, register u_int tlen) argument
[all...]
H A Dprint-telnet.c390 telnet_parse(netdissect_options *ndo, const u_char *sp, u_int length, int print) argument
412 ND_PRINT((ndo, "IAC IAC"));
430 ND_PRINT((ndo, "%s %s", telcmds[i], telopts[x]));
433 ND_PRINT((ndo, "%s %#x", telcmds[i], x));
455 ND_PRINT((ndo, " %s", STR_OR_ID(c, authcmd)));
460 ND_PRINT((ndo, " %s", STR_OR_ID(c, authtype)));
467 ND_PRINT((ndo, " %s", STR_OR_ID(c, enccmd)));
472 ND_PRINT((ndo, " %s", STR_OR_ID(c, enctype)));
479 ND_PRINT((ndo, " %s", STR_OR_ID(c, cmds)));
485 ND_PRINT((ndo, "
509 telnet_print(netdissect_options *ndo, const u_char *sp, u_int length) argument
[all...]
H A Dprint-sflow.c300 print_sflow_counter_generic(netdissect_options *ndo, argument
310 ND_PRINT((ndo, "\n\t ifindex %u, iftype %u, ifspeed %" PRIu64 ", ifdirection %u (%s)",
317 ND_PRINT((ndo, "\n\t ifstatus %u, adminstatus: %s, operstatus: %s",
321 ND_PRINT((ndo, "\n\t In octets %" PRIu64
328 ND_PRINT((ndo, "\n\t In errors %u, unknown protos %u",
331 ND_PRINT((ndo, "\n\t Out octets %" PRIu64
338 ND_PRINT((ndo, "\n\t Out errors %u, promisc mode %u",
349 print_sflow_counter_ethernet(netdissect_options *ndo, argument
359 ND_PRINT((ndo, "\n\t align errors %u, fcs errors %u, single collision %u, multiple collision %u, test error %u",
365 ND_PRINT((ndo, "\
390 print_sflow_counter_basevg(netdissect_options *ndo, const u_char *pointer, u_int len) argument
430 print_sflow_counter_vlan(netdissect_options *ndo, const u_char *pointer, u_int len) argument
464 print_sflow_counter_processor(netdissect_options *ndo, const u_char *pointer, u_int len) argument
489 sflow_print_counter_records(netdissect_options *ndo, const u_char *pointer, u_int len, u_int records) argument
571 sflow_print_counter_sample(netdissect_options *ndo, const u_char *pointer, u_int len) argument
606 sflow_print_expanded_counter_sample(netdissect_options *ndo, const u_char *pointer, u_int len) argument
636 print_sflow_raw_packet(netdissect_options *ndo, const u_char *pointer, u_int len) argument
663 print_sflow_ethernet_frame(netdissect_options *ndo, const u_char *pointer, u_int len) argument
685 print_sflow_extended_switch_data(netdissect_options *ndo, const u_char *pointer, u_int len) argument
708 sflow_print_flow_records(netdissect_options *ndo, const u_char *pointer, u_int len, u_int records) argument
798 sflow_print_flow_sample(netdissect_options *ndo, const u_char *pointer, u_int len) argument
838 sflow_print_expanded_flow_sample(netdissect_options *ndo, const u_char *pointer, u_int len) argument
870 sflow_print(netdissect_options *ndo, const u_char *pptr, u_int len) argument
[all...]
H A Dprint-m3ua.c212 tag_value_print(netdissect_options *ndo, argument
223 ND_PRINT((ndo, "0x%08x", EXTRACT_32BITS(buf)));
227 ND_PRINT((ndo, "(length %u)", size + (u_int)sizeof(struct m3ua_param_header)));
233 ND_PRINT((ndo, "%s", istr));
237 ND_PRINT((ndo, "%s", tstr));
252 m3ua_tags_print(netdissect_options *ndo, argument
266 ND_PRINT((ndo, "\n\t\t\t%s: ", tok2str(ParamName, "Unknown Parameter (0x%04x)", hdr_tag)));
275 tag_value_print(ndo, p, hdr_tag, hdr_len - sizeof(struct m3ua_param_header));
281 ND_PRINT((ndo, "%s", istr));
285 ND_PRINT((ndo, "
300 m3ua_print(netdissect_options *ndo, const u_char *buf, const u_int size) argument
[all...]
H A Dprint-lwapp.c165 lwapp_control_print(netdissect_options *ndo, argument
189 ND_PRINT((ndo, "LWAPP version %u packet not supported",
195 if (ndo->ndo_vflag < 1) {
196 ND_PRINT((ndo, "LWAPPv%u, %s frame, Flags [%s], length %u",
207 ND_PRINT((ndo, "LWAPPv%u, %s frame, Radio-id %u, Flags [%s], Frag-id %u, length %u",
216 ND_PRINT((ndo, "\n\tAP identity: %s", etheraddr_string(ndo, tptr)));
231 ND_PRINT((ndo, "\n\t Msg type: %s (%u), Seqnum: %u, Msg len: %d, Session: 0x%08x",
284 ND_PRINT((ndo, "\n\t\t packet exceeded snapshot"));
288 lwapp_data_print(netdissect_options *ndo, argument
[all...]
H A Dopenflow.h48 extern const u_char *of10_header_body_print(netdissect_options *ndo,

Completed in 219 milliseconds

1234567