/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-arcnet.c | 122 arcnet_print(netdissect_options *ndo, const u_char *bp, u_int length, int phds, argument 132 if (ndo->ndo_qflag) { 133 ND_PRINT((ndo, "%02x %02x %d: ", 143 ND_PRINT((ndo, "%02x %02x %s %d: ", 150 ND_PRINT((ndo, "%02x %02x %s seqid %04x %d: ", 157 ND_PRINT((ndo, "%02x %02x %s seqid %04x " 162 ND_PRINT((ndo, "%02x %02x %s seqid %04x " 175 arcnet_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) argument 186 ND_PRINT((ndo, "[|arcnet]")); 207 arcnet_print(ndo, 263 arcnet_linux_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) argument 320 arcnet_encap_print(netdissect_options *ndo, u_char arctype, const u_char *p, u_int length, u_int caplen) argument [all...] |
H A D | print-eap.c | 150 eap_print(netdissect_options *ndo, argument 165 if (ndo->ndo_vflag < 1) { 166 ND_PRINT((ndo, "%s (%u) v%u, len %u", 174 ND_PRINT((ndo, "%s (%u) v%u, len %u", 189 ND_PRINT((ndo, ", %s (%u), id %u, len %u", 200 ND_PRINT((ndo, "\n\t\t Type %s (%u)", 207 ND_PRINT((ndo, ", Identity: ")); 208 safeputs(ndo, tptr + 5, len - 5); 214 ND_PRINT((ndo, ", Notification: ")); 215 safeputs(ndo, tpt [all...] |
H A D | print-igrp.c | 69 igrp_entry_print(netdissect_options *ndo, register const struct igrprte *igr, argument 76 ND_PRINT((ndo, " *.%d.%d.%d", igr->igr_net[0], 79 ND_PRINT((ndo, " X%d.%d.%d.0", igr->igr_net[0], 82 ND_PRINT((ndo, " %d.%d.%d.0", igr->igr_net[0], 92 ND_PRINT((ndo, " d=%d b=%d r=%d l=%d M=%d mtu=%d in %d hops", 105 igrp_print(netdissect_options *ndo, register const u_char *bp, u_int length) argument 113 ND_PRINT((ndo, "igrp:")); 121 ND_PRINT((ndo, " %s V%d edit=%d AS=%d (%d/%d/%d)", 134 igrp_entry_print(ndo, (const struct igrprte *)cp, 1, 0); 138 igrp_entry_print(ndo, (cons [all...] |
H A D | print-pppoe.c | 88 pppoe_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, register const u_char *p) argument 90 return (pppoe_print(ndo, p, h->len)); 94 pppoe_print(netdissect_options *ndo, register const u_char *bp, u_int length) argument 101 ND_PRINT((ndo, "truncated-pppoe %u", length)); 115 ND_PRINT((ndo, " [ver %d]",pppoe_ver)); 118 ND_PRINT((ndo, " [type %d]",pppoe_type)); 121 ND_PRINT((ndo, "PPPoE %s", tok2str(pppoecode2str, "PAD-%x", pppoe_code))); 123 ND_PRINT((ndo, " [len %u!]",pppoe_length)); 126 ND_PRINT((ndo, " [len %u > %u!]", pppoe_length, length)); 130 ND_PRINT((ndo, " [se [all...] |
H A D | print-token.c | 108 token_hdr_print(netdissect_options *ndo, argument 114 srcname = etheraddr_string(ndo, fsrc); 115 dstname = etheraddr_string(ndo, fdst); 117 if (!ndo->ndo_qflag) 118 ND_PRINT((ndo, "%02x %02x ", 121 ND_PRINT((ndo, "%s > %s, length %u: ", 149 token_print(netdissect_options *ndo, const u_char *p, u_int length, u_int caplen) argument 161 ND_PRINT((ndo, "%s", tstr)); 175 if (ndo->ndo_eflag) 176 token_hdr_print(ndo, tr 247 token_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) argument [all...] |
H A D | addrtoname.c | 239 getname(netdissect_options *ndo, const u_char *ap) argument 252 p->nxt = newhnamemem(ndo); 261 if (!ndo->ndo_nflag && 275 (*ndo->ndo_error)(ndo, 277 if (ndo->ndo_Nflag) { 288 (*ndo->ndo_error)(ndo, "getname: strdup(intoa(addr))"); 297 getname6(netdissect_options *ndo, const u_char *ap) argument 318 p->nxt = newh6namemem(ndo); 361 lookup_emem(netdissect_options *ndo, const u_char *ep) argument 394 lookup_bytestring(netdissect_options *ndo, register const u_char *bs, const unsigned int nlen) argument 442 lookup_nsap(netdissect_options *ndo, register const u_char *nsap, register u_int nsap_length) argument 487 lookup_protoid(netdissect_options *ndo, const u_char *pi) argument 513 etheraddr_string(netdissect_options *ndo, register const u_char *ep) argument 559 le64addr_string(netdissect_options *ndo, const u_char *ep) argument 589 linkaddr_string(netdissect_options *ndo, const u_char *ep, const unsigned int type, const unsigned int len) argument 624 etherproto_string(netdissect_options *ndo, u_short port) argument 652 protoid_string(netdissect_options *ndo, register const u_char *pi) argument 682 isonsap_string(netdissect_options *ndo, const u_char *nsap, register u_int nsap_length) argument 713 tcpport_string(netdissect_options *ndo, u_short port) argument 734 udpport_string(netdissect_options *ndo, register u_short port) argument 755 ipxsap_string(netdissect_options *ndo, u_short port) argument 783 init_servarray(netdissect_options *ndo) argument 844 init_eprotoarray(netdissect_options *ndo) argument 877 init_protoidarray(netdissect_options *ndo) argument 931 init_etherarray(netdissect_options *ndo) argument 1196 init_ipxsaparray(netdissect_options *ndo) argument 1219 init_addrtoname(netdissect_options *ndo, uint32_t localnet, uint32_t mask) argument 1239 dnaddr_string(netdissect_options *ndo, u_short dnaddr) argument 1257 newhnamemem(netdissect_options *ndo) argument 1276 newh6namemem(netdissect_options *ndo) argument [all...] |
H A D | print-eigrp.c | 210 eigrp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len) argument 236 ND_PRINT((ndo, "EIGRP version %u packet not supported",eigrp_com_header->version)); 241 if (ndo->ndo_vflag < 1) { 242 ND_PRINT((ndo, "EIGRP %s, length: %u", 251 ND_PRINT((ndo, "EIGRP %s, length: %u (too short, < %u)", 259 ND_PRINT((ndo, "\n\tEIGRP v%u, opcode: %s (%u), chksum: 0x%04x, Flags: [%s]\n\tseq: 0x%08x, ack: 0x%08x, AS: %u, length: %u", 285 print_unknown_data(ndo,tptr+sizeof(struct eigrp_tlv_header),"\n\t ",tlen); 289 ND_PRINT((ndo, "\n\t %s TLV (0x%04x), length: %u", 297 ND_PRINT((ndo, " (too short, < %u)", 312 ND_PRINT((ndo, " (to [all...] |
H A D | print-ospf6.c | 375 ospf6_print_ls_type(netdissect_options *ndo, argument 378 ND_PRINT((ndo, "\n\t %s LSA (%d), %s Scope%s, LSA-ID %s", 383 ipaddr_string(ndo, ls_stateid))); 387 ospf6_print_lshdr(netdissect_options *ndo, argument 394 ND_PRINT((ndo, "\n\t Advertising Router %s, seq 0x%08x, age %us, length %u", 395 ipaddr_string(ndo, &lshp->ls_router), 400 ospf6_print_ls_type(ndo, EXTRACT_16BITS(&lshp->ls_type), &lshp->ls_stateid); 408 ospf6_print_lsaprefix(netdissect_options *ndo, argument 421 ND_PRINT((ndo, " bogus prefixlen /%d", lsapp->lsa_p_len)); 430 ND_PRINT((ndo, "\ 449 ospf6_print_lsa(netdissect_options *ndo, register const struct lsa6 *lsap, const u_char *dataend) argument 723 ospf6_decode_v3(netdissect_options *ndo, register const struct ospf6hdr *op, register const u_char *dataend) argument 846 ospf6_print_lls(netdissect_options *ndo, const u_char *cp, const u_int len) argument 877 ospf6_decode_at(netdissect_options *ndo, const u_char *cp, const u_int len) argument 928 ospf6_decode_v3_trailer(netdissect_options *ndo, const struct ospf6hdr *op, const u_char *cp, const unsigned len) argument 955 ospf6_print(netdissect_options *ndo, register const u_char *bp, register u_int length) argument [all...] |
H A D | print-fddi.c | 162 print_fddi_fc(netdissect_options *ndo, u_char fc) argument 167 ND_PRINT((ndo, "void ")); 171 ND_PRINT((ndo, "nrt ")); 175 ND_PRINT((ndo, "rt ")); 179 ND_PRINT((ndo, "info ")); 183 ND_PRINT((ndo, "nsa ")); 187 ND_PRINT((ndo, "beacon ")); 191 ND_PRINT((ndo, "claim ")); 198 ND_PRINT((ndo, "mac%1x ", fc & FDDIFC_ZZZZ)); 202 ND_PRINT((ndo, "sm 254 fddi_hdr_print(netdissect_options *ndo, register const struct fddi_header *fddip, register u_int length, register const u_char *fsrc, register const u_char *fdst) argument 271 fddi_smt_print(netdissect_options *ndo, const u_char *p _U_, u_int length _U_) argument 277 fddi_print(netdissect_options *ndo, const u_char *p, u_int length, u_int caplen) argument 342 fddi_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, register const u_char *p) argument [all...] |
H A D | util-print.c | 75 fn_print_char(netdissect_options *ndo, u_char c) argument 79 ND_PRINT((ndo, "M-")); 83 ND_PRINT((ndo, "^")); 85 ND_PRINT((ndo, "%c", c)); 95 fn_print(netdissect_options *ndo, argument 110 ND_PRINT((ndo, "M-")); 114 ND_PRINT((ndo, "^")); 116 ND_PRINT((ndo, "%c", c)); 130 * of the packet, e.g. ndo->ndo_snapend. If ep is NULL, we assume no 140 fn_printztn(netdissect_options *ndo, argument 190 fn_printn(netdissect_options *ndo, register const u_char *s, register u_int n, register const u_char *ep) argument 219 fn_printzp(netdissect_options *ndo, register const u_char *s, register u_int n, register const u_char *ep) argument 325 ts_print(netdissect_options *ndo, register const struct timeval *tvp) argument 407 unsigned_relts_print(netdissect_options *ndo, uint32_t secs) argument 435 signed_relts_print(netdissect_options *ndo, int32_t secs) argument 472 print_unknown_data(netdissect_options *ndo, const u_char *cp,const char *ident,int len) argument 697 fetch_token(netdissect_options *ndo, const u_char *pptr, u_int idx, u_int len, u_char *tbuf, size_t tbuflen) argument 764 print_txt_line(netdissect_options *ndo, const char *protoname, const char *prefix, const u_char *pptr, u_int idx, u_int len) argument 834 txtproto_print(netdissect_options *ndo, const u_char *pptr, u_int len, const char *protoname, const char **cmds, u_int flags) argument 925 safeputs(netdissect_options *ndo, const u_char *s, const u_int maxlen) argument 938 safeputchar(netdissect_options *ndo, const u_char c) argument [all...] |
H A D | print-cnfp.c | 158 cnfp_v1_print(netdissect_options *ndo, const u_char *cp) argument 182 ND_PRINT((ndo, "NetFlow v%x, %u.%03u uptime, %u.%09u, ", ver, 189 ND_PRINT((ndo, "%2u recs", nrecs)); 199 ND_PRINT((ndo, "\n started %u.%03u, last %u.%03u", 206 ND_PRINT((ndo, "\n %s%s%s:%u ", intoa(nr->src_ina.s_addr), buf, asbuf, 209 ND_PRINT((ndo, "> %s%s%s:%u ", intoa(nr->dst_ina.s_addr), buf, asbuf, 212 ND_PRINT((ndo, ">> %s\n ", intoa(nr->nhop_ina.s_addr))); 214 if (!ndo->ndo_nflag && (p_name = netdb_protoname(nr->proto)) != NULL) 215 ND_PRINT((ndo, "%s ", p_name)); 217 ND_PRINT((ndo, " 247 cnfp_v5_print(netdissect_options *ndo, const u_char *cp) argument 343 cnfp_v6_print(netdissect_options *ndo, const u_char *cp) argument 442 cnfp_print(netdissect_options *ndo, const u_char *cp) argument [all...] |
H A D | print-forces.c | 69 int (*print) (netdissect_options *ndo, register const u_char * pptr, register u_int len, 233 int (*print) (netdissect_options *ndo, register const u_char * pptr, register u_int len, 526 chk_op_type(netdissect_options *ndo, argument 532 ND_PRINT((ndo, "Based on flags expected KEYINFO TLV!\n")); 536 ND_PRINT((ndo, "Illegal DATA encoding for type 0x%x programmed %x got %x \n", 645 prestlv_print(netdissect_options *ndo, argument 660 ND_PRINT((ndo, "illegal RESULT-TLV: %d bytes!\n", dlen)); 666 ND_PRINT((ndo, "illegal reserved result code: 0x%x!\n", r->result)); 670 if (ndo->ndo_vflag >= 3) { 672 ND_PRINT((ndo, " 683 fdatatlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument 718 sdatailv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument 764 sdatatlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument 793 pkeyitlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument 836 pdatacnt_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t IDcnt, uint16_t op_msk, int indent) argument 991 pdata_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument 1055 genoptlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument 1101 recpdoptlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument 1155 invoptlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument 1170 otlv_print(netdissect_options *ndo, const struct forces_tlv *otlv, uint16_t op_msk _U_, int indent) argument 1216 asttlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument 1274 asrtlv_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument 1346 print_metailv(netdissect_options *ndo, register const u_char * pptr, uint16_t op_msk _U_, int indent) argument 1374 print_metatlv(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument 1416 print_reddata(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument 1438 redirect_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk _U_, int indent) argument 1507 lfbselect_print(netdissect_options *ndo, register const u_char * pptr, register u_int len, uint16_t op_msk, int indent) argument 1586 forces_type_print(netdissect_options *ndo, register const u_char * pptr, const struct forcesh *fhdr _U_, register u_int mlen, const struct tom_h *tops) argument 1676 forces_print(netdissect_options *ndo, register const u_char * pptr, register u_int len) argument [all...] |
H A D | print-olsr.c | 234 olsr_print_lq_neighbor4(netdissect_options *ndo, argument 245 ND_PRINT((ndo, "\n\t neighbor %s, link-quality %.2f%%" 247 ipaddr_string(ndo, lq_neighbor->neighbor), 258 olsr_print_lq_neighbor6(netdissect_options *ndo, argument 269 ND_PRINT((ndo, "\n\t neighbor %s, link-quality %.2f%%" 271 ip6addr_string(ndo, lq_neighbor->neighbor), 285 olsr_print_neighbor(netdissect_options *ndo, argument 290 ND_PRINT((ndo, "\n\t neighbor\n\t\t")); 299 ND_PRINT((ndo, "%s%s", ipaddr_string(ndo, msg_dat 310 olsr_print(netdissect_options *ndo, const u_char *pptr, u_int length, int is_ipv6) argument [all...] |
H A D | print-mpcp.c | 124 mpcp_print(netdissect_options *ndo, register const u_char *pptr, register u_int length) argument 145 ND_PRINT((ndo, "MPCP, Opcode %s", tok2str(mpcp_opcode_values, "Unknown (%u)", opcode))); 147 ND_PRINT((ndo, ", Timestamp %u ticks", EXTRACT_32BITS(mpcp.common_header->timestamp))); 149 ND_PRINT((ndo, ", length %u", length)); 151 if (!ndo->ndo_vflag) 163 ND_PRINT((ndo, "\n\tGrant Numbers %u, Flags [ %s ]", 173 ND_PRINT((ndo, "\n\tGrant #%u, Start-Time %u ticks, duration %u ticks", 181 ND_PRINT((ndo, "\n\tSync-Time %u ticks", EXTRACT_16BITS(tptr))); 189 ND_PRINT((ndo, "\n\tTotal Queue-Sets %u", queue_sets)); 194 ND_PRINT((ndo, "\ [all...] |
H A D | print-rpki-rtr.c | 178 rpki_rtr_pdu_print (netdissect_options *ndo, const u_char *tptr, const u_int len, argument 194 ND_PRINT((ndo, "%sRPKI-RTRv%u (unknown)", indent_string(8), *tptr)); 198 ND_PRINT((ndo, "(%u bytes is too few to decode)", len)); 211 ND_PRINT((ndo, "%sRPKI-RTRv%u, %s PDU (%u), length: %u", 231 ND_PRINT((ndo, "%sSession ID: 0x%04x, Serial: %u", 255 ND_PRINT((ndo, "%sSession ID: 0x%04x", 268 ND_PRINT((ndo, "%sIPv4 Prefix %s/%u-%u, origin-as %u, flags 0x%02x", 270 ipaddr_string(ndo, pdu->prefix), 284 ND_PRINT((ndo, "%sIPv6 Prefix %s/%u-%u, origin-as %u, flags 0x%02x", 286 ip6addr_string(ndo, pd 390 rpki_rtr_print(netdissect_options *ndo, register const u_char *pptr, register u_int len) argument [all...] |
H A D | addrtoname.h | 61 #define ipaddr_string(ndo, p) getname(ndo, (const u_char *)(p)) 62 #define ip6addr_string(ndo, p) getname6(ndo, (const u_char *)(p))
|
H A D | print-vtp.c | 119 vtp_print (netdissect_options *ndo, argument 134 ND_PRINT((ndo, "VTPv%u, Message %s (0x%02x), length %u", 141 if (ndo->ndo_vflag < 1) { 146 ND_PRINT((ndo, "\n\tDomain name: ")); 149 ND_PRINT((ndo, " [invalid MgmtD Len %d]", mgmtd_len)); 152 fn_printzp(ndo, tptr + 4, mgmtd_len, NULL); 153 ND_PRINT((ndo, ", %s: %u", 184 ND_PRINT((ndo, "\n\t Config Rev %x, Updater %s", 186 ipaddr_string(ndo, tptr+4))); 189 ND_PRINT((ndo, ", Timestam [all...] |
H A D | print-stp.c | 102 stp_print_config_bpdu(netdissect_options *ndo, const struct stp_bpdu_ *stp_bpdu, argument 106 ND_PRINT((ndo, ", Flags [%s]", 110 ND_PRINT((ndo, ", bridge-id %s.%04x, length %u", 115 if (!ndo->ndo_vflag) { 120 ND_PRINT((ndo, "\n\tmessage-age %.2fs, max-age %.2fs" 127 ND_PRINT((ndo, "\n\troot-id %s, root-pathcost %u", 133 ND_PRINT((ndo, ", port-role %s", 239 stp_print_mstp_bpdu(netdissect_options *ndo, const struct stp_bpdu_ *stp_bpdu, argument 249 ND_PRINT((ndo, ", CIST Flags [%s], length %u", 255 if (!ndo 347 stp_print_spb_bpdu(netdissect_options *ndo, const struct stp_bpdu_ *stp_bpdu, u_int offset) argument 402 stp_print(netdissect_options *ndo, const u_char *p, u_int length) argument [all...] |
H A D | print-vqp.c | 101 vqp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len) argument 123 ND_PRINT((ndo, "VQP version %u packet not supported", 129 if (ndo->ndo_vflag < 1) { 130 ND_PRINT((ndo, "VQPv%u %s Message, error-code %s (%u), length %u", 141 ND_PRINT((ndo, "\n\tVQPv%u, %s Message, error-code %s (%u), seq 0x%08x, items %u, length %u", 165 ND_PRINT((ndo, "\n\t %s Object (0x%08x), length %u, value: ", 183 ND_PRINT((ndo, "%s (0x%08x)", ipaddr_string(ndo, tptr), EXTRACT_32BITS(tptr))); 190 safeputs(ndo, tptr, vqp_obj_len); 197 ND_PRINT((ndo, " [all...] |
H A D | print-slow.c | 245 slow_print(netdissect_options *ndo, argument 265 ND_PRINT((ndo, "LACP version %u packet not supported", *(pptr+1))); 276 ND_PRINT((ndo, "MARKER version %u packet not supported", *(pptr+1))); 293 ND_PRINT((ndo, "%sv%u, length %u", 299 ND_PRINT((ndo, "%s, length %u", 306 print_unknown_data(ndo, pptr, "\n\t", len); 310 if (!ndo->ndo_vflag) 321 slow_oam_print(ndo, pptr, len); 329 slow_marker_lacp_print(ndo, pptr, len, subtype); 335 if (!ndo 349 slow_marker_lacp_print(netdissect_options *ndo, register const u_char *tptr, register u_int tlen, u_int proto_subtype) argument 490 slow_oam_print(netdissect_options *ndo, register const u_char *tptr, register u_int tlen) argument [all...] |
H A D | print-telnet.c | 390 telnet_parse(netdissect_options *ndo, const u_char *sp, u_int length, int print) argument 412 ND_PRINT((ndo, "IAC IAC")); 430 ND_PRINT((ndo, "%s %s", telcmds[i], telopts[x])); 433 ND_PRINT((ndo, "%s %#x", telcmds[i], x)); 455 ND_PRINT((ndo, " %s", STR_OR_ID(c, authcmd))); 460 ND_PRINT((ndo, " %s", STR_OR_ID(c, authtype))); 467 ND_PRINT((ndo, " %s", STR_OR_ID(c, enccmd))); 472 ND_PRINT((ndo, " %s", STR_OR_ID(c, enctype))); 479 ND_PRINT((ndo, " %s", STR_OR_ID(c, cmds))); 485 ND_PRINT((ndo, " 509 telnet_print(netdissect_options *ndo, const u_char *sp, u_int length) argument [all...] |
H A D | print-sflow.c | 300 print_sflow_counter_generic(netdissect_options *ndo, argument 310 ND_PRINT((ndo, "\n\t ifindex %u, iftype %u, ifspeed %" PRIu64 ", ifdirection %u (%s)", 317 ND_PRINT((ndo, "\n\t ifstatus %u, adminstatus: %s, operstatus: %s", 321 ND_PRINT((ndo, "\n\t In octets %" PRIu64 328 ND_PRINT((ndo, "\n\t In errors %u, unknown protos %u", 331 ND_PRINT((ndo, "\n\t Out octets %" PRIu64 338 ND_PRINT((ndo, "\n\t Out errors %u, promisc mode %u", 349 print_sflow_counter_ethernet(netdissect_options *ndo, argument 359 ND_PRINT((ndo, "\n\t align errors %u, fcs errors %u, single collision %u, multiple collision %u, test error %u", 365 ND_PRINT((ndo, "\ 390 print_sflow_counter_basevg(netdissect_options *ndo, const u_char *pointer, u_int len) argument 430 print_sflow_counter_vlan(netdissect_options *ndo, const u_char *pointer, u_int len) argument 464 print_sflow_counter_processor(netdissect_options *ndo, const u_char *pointer, u_int len) argument 489 sflow_print_counter_records(netdissect_options *ndo, const u_char *pointer, u_int len, u_int records) argument 571 sflow_print_counter_sample(netdissect_options *ndo, const u_char *pointer, u_int len) argument 606 sflow_print_expanded_counter_sample(netdissect_options *ndo, const u_char *pointer, u_int len) argument 636 print_sflow_raw_packet(netdissect_options *ndo, const u_char *pointer, u_int len) argument 663 print_sflow_ethernet_frame(netdissect_options *ndo, const u_char *pointer, u_int len) argument 685 print_sflow_extended_switch_data(netdissect_options *ndo, const u_char *pointer, u_int len) argument 708 sflow_print_flow_records(netdissect_options *ndo, const u_char *pointer, u_int len, u_int records) argument 798 sflow_print_flow_sample(netdissect_options *ndo, const u_char *pointer, u_int len) argument 838 sflow_print_expanded_flow_sample(netdissect_options *ndo, const u_char *pointer, u_int len) argument 870 sflow_print(netdissect_options *ndo, const u_char *pptr, u_int len) argument [all...] |
H A D | print-m3ua.c | 212 tag_value_print(netdissect_options *ndo, argument 223 ND_PRINT((ndo, "0x%08x", EXTRACT_32BITS(buf))); 227 ND_PRINT((ndo, "(length %u)", size + (u_int)sizeof(struct m3ua_param_header))); 233 ND_PRINT((ndo, "%s", istr)); 237 ND_PRINT((ndo, "%s", tstr)); 252 m3ua_tags_print(netdissect_options *ndo, argument 266 ND_PRINT((ndo, "\n\t\t\t%s: ", tok2str(ParamName, "Unknown Parameter (0x%04x)", hdr_tag))); 275 tag_value_print(ndo, p, hdr_tag, hdr_len - sizeof(struct m3ua_param_header)); 281 ND_PRINT((ndo, "%s", istr)); 285 ND_PRINT((ndo, " 300 m3ua_print(netdissect_options *ndo, const u_char *buf, const u_int size) argument [all...] |
H A D | print-lwapp.c | 165 lwapp_control_print(netdissect_options *ndo, argument 189 ND_PRINT((ndo, "LWAPP version %u packet not supported", 195 if (ndo->ndo_vflag < 1) { 196 ND_PRINT((ndo, "LWAPPv%u, %s frame, Flags [%s], length %u", 207 ND_PRINT((ndo, "LWAPPv%u, %s frame, Radio-id %u, Flags [%s], Frag-id %u, length %u", 216 ND_PRINT((ndo, "\n\tAP identity: %s", etheraddr_string(ndo, tptr))); 231 ND_PRINT((ndo, "\n\t Msg type: %s (%u), Seqnum: %u, Msg len: %d, Session: 0x%08x", 284 ND_PRINT((ndo, "\n\t\t packet exceeded snapshot")); 288 lwapp_data_print(netdissect_options *ndo, argument [all...] |
H A D | openflow.h | 48 extern const u_char *of10_header_body_print(netdissect_options *ndo,
|