/freebsd-current/contrib/tcpdump/ |
H A D | print-dhcp6.c | 275 dhcp6opt_print(netdissect_options *ndo, argument 377 dhcp6opt_print(ndo, tp + 24, tp + optlen); 424 snapend_save = ndo->ndo_snapend; 425 ndo->ndo_snapend = ND_MIN(tp + optlen, ndo->ndo_snapend); 426 dhcp6_print(ndo, tp, optlen); 427 ndo->ndo_snapend = snapend_save; 584 if ((tp = fqdn_print(ndo, tp, cp + sizeof(*dh6o) + optlen)) == NULL) 610 dhcp6opt_print(ndo, tp + 12, tp + optlen); 623 dhcp6opt_print(ndo, t 804 dhcp6_print(netdissect_options *ndo, const u_char *cp, u_int length) argument [all...] |
H A D | print-timed.c | 112 timed_print(netdissect_options *ndo, argument 119 ndo->ndo_protocol = "timed"; 152 nd_printjnp(ndo, tsp->tsp_name, sizeof(tsp->tsp_name));
|
H A D | print-mptcp.c | 185 dummy_print(netdissect_options *ndo _U_, 192 mp_capable_print(netdissect_options *ndo, argument 226 mp_join_print(netdissect_options *ndo, argument 266 mp_dss_print(netdissect_options *ndo, argument 357 add_addr_print(netdissect_options *ndo, argument 394 remove_addr_print(netdissect_options *ndo, argument 411 mp_prio_print(netdissect_options *ndo, argument 430 mp_fail_print(netdissect_options *ndo, argument 441 mp_fast_close_print(netdissect_options *ndo, argument 467 mptcp_print(netdissect_options *ndo, argument [all...] |
H A D | print-cfm.c | 217 cfm_network_addr_print(netdissect_options *ndo, argument 269 cfm_print(netdissect_options *ndo, argument 292 ndo->ndo_protocol = "cfm"; 319 if (ndo->ndo_vflag < 1) { 404 nd_printjnp(ndo, md_name, md_namelength); 418 print_unknown_data(ndo, md_name, "\n\t ", 455 nd_printjnp(ndo, ma_name, ma_namelength); 464 print_unknown_data(ndo, ma_name, "\n\t ", ma_namelength); 523 print_unknown_data(ndo, tptr, "\n\t ", 652 hexdump |= cfm_network_addr_print(ndo, tpt [all...] |
H A D | print-m3ua.c | 222 tag_value_print(netdissect_options *ndo, argument 242 nd_print_invalid(ndo); 258 m3ua_tags_print(netdissect_options *ndo, argument 280 tag_value_print(ndo, p, hdr_tag, hdr_len - sizeof(struct m3ua_param_header)); 286 nd_print_invalid(ndo); 302 m3ua_print(netdissect_options *ndo, argument 309 ndo->ndo_protocol = "m3ua"; 329 m3ua_tags_print(ndo, buf + sizeof(struct m3ua_common_header), 334 nd_print_invalid(ndo);
|
H A D | print-lwapp.c | 166 lwapp_control_print(netdissect_options *ndo, argument 176 ndo->ndo_protocol = "lwapp_control"; 199 if (ndo->ndo_vflag < 1) { 297 nd_print_trunc(ndo); 301 lwapp_data_print(netdissect_options *ndo, argument 309 ndo->ndo_protocol = "lwapp_data"; 328 if (ndo->ndo_vflag < 1) { 361 print_unknown_data(ndo, tptr, "\n\t", tlen); 366 nd_print_trunc(ndo);
|
H A D | print-sunrpc.c | 158 sunrpc_print(netdissect_options *ndo, const u_char *bp, argument 167 ndo->ndo_protocol = "sunrpc"; 171 if (!ndo->ndo_nflag) { 212 if (!ndo->ndo_nflag)
|
H A D | print-ospf.c | 184 ospf_grace_lsa_print(netdissect_options *ndo, argument 247 if (ndo->ndo_vflag <= 1) { 248 if (!print_unknown_data(ndo, tptr, "\n\t ", tlv_length)) 267 ospf_te_lsa_print(netdissect_options *ndo, argument 470 if (ndo->ndo_vflag <= 1) { 471 if (!print_unknown_data(ndo, tptr, "\n\t\t", subtlv_length)) 500 if (ndo->ndo_vflag <= 1) { 501 if (!print_unknown_data(ndo, tptr, "\n\t ", tlv_length)) 521 nd_print_invalid(ndo); 526 ospf_print_lshdr(netdissect_options *ndo, argument 588 ospf_print_tos_metrics(netdissect_options *ndo, const union un_tos *tos) argument 620 ospf_print_lsa(netdissect_options *ndo, const struct lsa *lsap) argument 889 ospf_decode_lls(netdissect_options *ndo, const struct ospfhdr *op, u_int length) argument 970 ospf_decode_v2(netdissect_options *ndo, const struct ospfhdr *op, const u_char *dataend) argument 1084 ospf_print(netdissect_options *ndo, const u_char *bp, u_int length, const u_char *bp2 _U_) argument [all...] |
H A D | print-olsr.c | 235 olsr_print_lq_neighbor4(netdissect_options *ndo, argument 260 olsr_print_lq_neighbor6(netdissect_options *ndo, argument 288 olsr_print_neighbor(netdissect_options *ndo, argument 309 olsr_print(netdissect_options *ndo, argument 328 ndo->ndo_protocol = "olsr"; 331 nd_print_protocol_caps(ndo); 352 if (ndo->ndo_vflag < 1) { 474 if (olsr_print_neighbor(ndo, msg_data, hello_len) == -1) 478 if (olsr_print_lq_neighbor6(ndo, msg_data, hello_len) == -1) 481 if (olsr_print_lq_neighbor4(ndo, msg_dat [all...] |
H A D | print-openflow-1.3.c | 648 of13_port_print(netdissect_options *ndo, argument 664 nd_printjnp(ndo, cp, OFP_MAX_PORT_NAME_LEN); 668 if (ndo->ndo_vflag < 2) { 675 of_bitmap_print(ndo, ofppc_bm, GET_BE_U_4(cp), OFPPC_U); 679 of_bitmap_print(ndo, ofpps_bm, GET_BE_U_4(cp), OFPPS_U);; 683 of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U); 687 of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U); 691 of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U); 695 of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U); 706 of13_features_reply_print(netdissect_options *ndo, argument 733 of13_switch_config_msg_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument 747 of13_table_mod_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument 761 of13_role_msg_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument 776 of13_async_msg_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument 806 of13_port_mod_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument 838 of13_port_status_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument 853 of13_hello_elements_print(netdissect_options *ndo, const u_char *cp, u_int len) argument 907 of13_experimenter_message_print(netdissect_options *ndo, const u_char *cp, u_int len) argument 926 of13_queue_get_config_request_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument 939 of13_error_print(netdissect_options *ndo, const u_char *cp, u_int len) argument [all...] |
H A D | print-decnet.c | 468 decnet_print(netdissect_options *ndo, argument 479 ndo->ndo_protocol = "decnet"; 502 if (ndo->ndo_vflag) 524 if (!print_decnet_ctlmsg(ndo, rhp, length, caplen)) 558 dnaddr_string(ndo, src), dnaddr_string(ndo, dst), pktlen); 559 if (ndo->ndo_vflag) { 569 if (!print_nsp(ndo, nspp, nsplen)) 574 nd_print_invalid(ndo); 578 print_decnet_ctlmsg(netdissect_options *ndo, argument 699 print_t_info(netdissect_options *ndo, u_int info) argument 716 print_l1_routes(netdissect_options *ndo, const u_char *rp, u_int len) argument 743 print_l2_routes(netdissect_options *ndo, const u_char *rp, u_int len) argument 770 print_i_info(netdissect_options *ndo, u_int info) argument 795 print_nsp(netdissect_options *ndo, const u_char *nspp, u_int nsplen) argument 1162 print_reason(netdissect_options *ndo, u_int reason) argument 1169 dnnum_string(netdissect_options *ndo, u_short dnaddr) argument [all...] |
H A D | print-tipc.c | 157 print_payload(netdissect_options *ndo, const struct payload_tipc_pkthdr *ap) argument 203 if (ndo->ndo_vflag) { 216 print_internal(netdissect_options *ndo, const struct internal_tipc_pkthdr *ap) argument 253 if (ndo->ndo_vflag) { 278 print_link_conf(netdissect_options *ndo, const struct link_conf_tipc_pkthdr *ap) argument 307 if (ndo->ndo_vflag) { 318 tipc_print(netdissect_options *ndo, const u_char *bp, u_int length _U_, argument 325 ndo->ndo_protocol = "tipc"; 338 print_payload(ndo, (const struct payload_tipc_pkthdr *)bp); 342 print_link_conf(ndo, (cons [all...] |
H A D | print-cnfp.c | 157 cnfp_v1_print(netdissect_options *ndo, const u_char *cp) argument 220 if (!ndo->ndo_nflag && (p_name = netdb_protoname(proto)) != NULL) 248 nd_print_trunc(ndo); 252 cnfp_v5_print(netdissect_options *ndo, const u_char *cp) argument 322 if (!ndo->ndo_nflag && (p_name = netdb_protoname(proto)) != NULL) 350 nd_print_trunc(ndo); 354 cnfp_v6_print(netdissect_options *ndo, const u_char *cp) argument 424 if (!ndo->ndo_nflag && (p_name = netdb_protoname(proto)) != NULL) 455 nd_print_trunc(ndo); 459 cnfp_print(netdissect_options *ndo, cons argument [all...] |
H A D | smbutil.c | 85 make_unix_date(netdissect_options *ndo, const u_char *date_ptr) argument 99 make_unix_date2(netdissect_options *ndo, const u_char *date_ptr) argument 113 interpret_long_date(netdissect_options *ndo, const u_char *p) argument 140 name_interpret(netdissect_options *ndo, argument 183 name_ptr(netdissect_options *ndo, argument 222 name_extract(netdissect_options *ndo, argument 225 const u_char *p = name_ptr(ndo, buf, ofs, maxbuf); 229 return(name_interpret(ndo, p, maxbuf, name)); 237 name_len(netdissect_options *ndo, argument 261 print_asc(netdissect_options *ndo, argument 287 smb_data_print(netdissect_options *ndo, const u_char *buf, u_int len) argument 330 write_bits(netdissect_options *ndo, unsigned int val, const char *fmt) argument 348 unistr(netdissect_options *ndo, char (*buf)[MAX_UNISTR_SIZE+1], const u_char *s, uint32_t strsize, int is_null_terminated, int use_unicode) argument 467 smb_fdata1(netdissect_options *ndo, const u_char *buf, const char *fmt, const u_char *maxbuf, int unicodestr) argument 830 smb_fdata(netdissect_options *ndo, const u_char *buf, const char *fmt, const u_char *maxbuf, int unicodestr) argument [all...] |
H A D | ntp.c | 34 p_ntp_time(netdissect_options *ndo, argument
|
H A D | print-icmp.c | 314 icmp_print(netdissect_options *ndo, const u_char *bp, u_int plen, const u_char *bp2, argument 334 ndo->ndo_protocol = "icmp"; 388 tcpport_string(ndo, dport)); 395 udpport_string(ndo, dport)); 652 if (ndo->ndo_vflag && !fragmented) { /* don't attempt checksumming if this is a frag */ 672 if (ndo->ndo_vflag >= 1 && ICMP_ERRTYPE(icmp_type)) { 678 snapend_save = ndo->ndo_snapend; 688 ndo->ndo_snapend = ND_MIN(bp + GET_BE_U_2(ip->ip_len), 689 ndo->ndo_snapend); 690 ip_print(ndo, b [all...] |
H A D | print-mpcp.c | 121 mpcp_print(netdissect_options *ndo, const u_char *pptr, u_int length) argument 135 ndo->ndo_protocol = "mpcp"; 147 if (!ndo->ndo_vflag) 232 print_unknown_data(ndo,pptr, "\n\t", length);
|
H A D | print-eigrp.c | 215 eigrp_print(netdissect_options *ndo, const u_char *pptr, u_int len) argument 233 ndo->ndo_protocol = "eigrp"; 248 if (ndo->ndo_vflag < 1) { 293 print_unknown_data(ndo,tptr+sizeof(struct eigrp_tlv_header),"\n\t ",tlen); 367 ipaddr_string(ndo, prefix), /* local buffer, not packet data; don't use GET_IPADDR_STRING() */ 402 ipaddr_string(ndo, prefix), /* local buffer, not packet data; don't use GET_IPADDR_STRING() */ 517 if (ndo->ndo_vflag <= 1) 518 print_unknown_data(ndo,tlv_tptr,"\n\t ",tlv_tlen); 522 if (ndo->ndo_vflag > 1) 523 print_unknown_data(ndo,tpt [all...] |
H A D | print-sctp.c | 451 sctp_print(netdissect_options *ndo, argument 467 ndo->ndo_protocol = "sctp"; 513 if (ndo->ndo_vflag >= 2) 610 forces_print(ndo, bp, payload_size); 612 ndo->ndo_protocol = "sctp"; 613 } else if (ndo->ndo_vflag >= 2) { /* if verbose output is specified */ 617 m3ua_print(ndo, bp, payload_size); 619 ndo->ndo_protocol = "sctp"; 623 if (!ndo->ndo_suppress_default_print) { 758 if (ndo [all...] |
H A D | print-zephyr.c | 89 parse_field(netdissect_options *ndo, const char **pptr, int *len) argument 143 { ND_PRINT("%s", (str1)); fn_print_str(ndo, (const u_char *)(str2)); } 146 zephyr_print(netdissect_options *ndo, const u_char *cp, u_int length) argument 172 ndo->ndo_protocol = "zephyr"; 176 s = parse_field(ndo, &parse, &parselen); \ 347 nd_print_invalid(ndo);
|
H A D | print-pgm.c | 146 pgm_print(netdissect_options *ndo, argument 160 ndo->ndo_protocol = "pgm"; 177 nd_print_trunc(ndo); 188 tcpport_string(ndo, sport), 190 tcpport_string(ndo, dport)); 193 tcpport_string(ndo, sport), tcpport_string(ndo, dport)); 199 tcpport_string(ndo, sport), 201 tcpport_string(ndo, dport)); 204 tcpport_string(ndo, spor [all...] |
H A D | print-lspping.c | 490 lspping_print(netdissect_options *ndo, argument 527 ndo->ndo_protocol = "lspping"; 544 if (ndo->ndo_vflag < 1) { 593 p_ntp_time(ndo, &lspping_com_header->ts_sent); 600 p_ntp_time(ndo, &lspping_com_header->ts_rcvd); 776 bgp_vpn_rd_print(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv4->rd), 791 bgp_vpn_rd_print(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv6->rd), 807 bgp_vpn_rd_print(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_endpt->rd), 862 if (ndo->ndo_vflag > 1 || subtlv_hexdump==TRUE) 863 print_unknown_data(ndo, tlv_tpt [all...] |
H A D | print-lmp.c | 360 lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr, argument 427 lmp_print(netdissect_options *ndo, argument 442 ndo->ndo_protocol = "lmp"; 459 if (ndo->ndo_vflag < 1) { 736 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 12, 12)) 756 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 36, 36)) 776 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 12, 12)) 1120 if (ndo->ndo_vflag <= 1) 1121 print_unknown_data(ndo,obj_tptr,"\n\t ",obj_tlen); 1125 if (ndo [all...] |
H A D | print-rsvp.c | 512 rsvp_intserv_print(netdissect_options *ndo, argument 654 if (ndo->ndo_vflag <= 1) 655 print_unknown_data(ndo, tptr + 4, "\n\t\t", parameter_length); 660 nd_print_trunc(ndo); 677 rsvp_obj_print(netdissect_options *ndo, argument 1224 fn_print_char(ndo, GET_U_1(obj_tptr + 4 + i)); 1451 processed = rsvp_intserv_print(ndo, obj_tptr, obj_tlen); 1721 print_unknown_data(ndo, obj_tptr + 2, "\n\t\t", 1783 sigcheck = signature_verify(ndo, pptr, plen, 1892 if (ndo 1920 rsvp_print(netdissect_options *ndo, const u_char *pptr, u_int len) argument [all...] |
H A D | parsenfsfh.c | 85 Parse_fh(netdissect_options *ndo, const unsigned char *fh, u_int len, argument 225 if (is_UCX(ndo, fhp, len)) { 434 is_UCX(netdissect_options *ndo, const unsigned char *fhp, u_int len) argument
|