Searched refs:ndo (Results 151 - 175 of 177) sorted by relevance

12345678

/freebsd-current/contrib/tcpdump/
H A Dprint-dhcp6.c275 dhcp6opt_print(netdissect_options *ndo, argument
377 dhcp6opt_print(ndo, tp + 24, tp + optlen);
424 snapend_save = ndo->ndo_snapend;
425 ndo->ndo_snapend = ND_MIN(tp + optlen, ndo->ndo_snapend);
426 dhcp6_print(ndo, tp, optlen);
427 ndo->ndo_snapend = snapend_save;
584 if ((tp = fqdn_print(ndo, tp, cp + sizeof(*dh6o) + optlen)) == NULL)
610 dhcp6opt_print(ndo, tp + 12, tp + optlen);
623 dhcp6opt_print(ndo, t
804 dhcp6_print(netdissect_options *ndo, const u_char *cp, u_int length) argument
[all...]
H A Dprint-timed.c112 timed_print(netdissect_options *ndo, argument
119 ndo->ndo_protocol = "timed";
152 nd_printjnp(ndo, tsp->tsp_name, sizeof(tsp->tsp_name));
H A Dprint-mptcp.c185 dummy_print(netdissect_options *ndo _U_,
192 mp_capable_print(netdissect_options *ndo, argument
226 mp_join_print(netdissect_options *ndo, argument
266 mp_dss_print(netdissect_options *ndo, argument
357 add_addr_print(netdissect_options *ndo, argument
394 remove_addr_print(netdissect_options *ndo, argument
411 mp_prio_print(netdissect_options *ndo, argument
430 mp_fail_print(netdissect_options *ndo, argument
441 mp_fast_close_print(netdissect_options *ndo, argument
467 mptcp_print(netdissect_options *ndo, argument
[all...]
H A Dprint-cfm.c217 cfm_network_addr_print(netdissect_options *ndo, argument
269 cfm_print(netdissect_options *ndo, argument
292 ndo->ndo_protocol = "cfm";
319 if (ndo->ndo_vflag < 1) {
404 nd_printjnp(ndo, md_name, md_namelength);
418 print_unknown_data(ndo, md_name, "\n\t ",
455 nd_printjnp(ndo, ma_name, ma_namelength);
464 print_unknown_data(ndo, ma_name, "\n\t ", ma_namelength);
523 print_unknown_data(ndo, tptr, "\n\t ",
652 hexdump |= cfm_network_addr_print(ndo, tpt
[all...]
H A Dprint-m3ua.c222 tag_value_print(netdissect_options *ndo, argument
242 nd_print_invalid(ndo);
258 m3ua_tags_print(netdissect_options *ndo, argument
280 tag_value_print(ndo, p, hdr_tag, hdr_len - sizeof(struct m3ua_param_header));
286 nd_print_invalid(ndo);
302 m3ua_print(netdissect_options *ndo, argument
309 ndo->ndo_protocol = "m3ua";
329 m3ua_tags_print(ndo, buf + sizeof(struct m3ua_common_header),
334 nd_print_invalid(ndo);
H A Dprint-lwapp.c166 lwapp_control_print(netdissect_options *ndo, argument
176 ndo->ndo_protocol = "lwapp_control";
199 if (ndo->ndo_vflag < 1) {
297 nd_print_trunc(ndo);
301 lwapp_data_print(netdissect_options *ndo, argument
309 ndo->ndo_protocol = "lwapp_data";
328 if (ndo->ndo_vflag < 1) {
361 print_unknown_data(ndo, tptr, "\n\t", tlen);
366 nd_print_trunc(ndo);
H A Dprint-sunrpc.c158 sunrpc_print(netdissect_options *ndo, const u_char *bp, argument
167 ndo->ndo_protocol = "sunrpc";
171 if (!ndo->ndo_nflag) {
212 if (!ndo->ndo_nflag)
H A Dprint-ospf.c184 ospf_grace_lsa_print(netdissect_options *ndo, argument
247 if (ndo->ndo_vflag <= 1) {
248 if (!print_unknown_data(ndo, tptr, "\n\t ", tlv_length))
267 ospf_te_lsa_print(netdissect_options *ndo, argument
470 if (ndo->ndo_vflag <= 1) {
471 if (!print_unknown_data(ndo, tptr, "\n\t\t", subtlv_length))
500 if (ndo->ndo_vflag <= 1) {
501 if (!print_unknown_data(ndo, tptr, "\n\t ", tlv_length))
521 nd_print_invalid(ndo);
526 ospf_print_lshdr(netdissect_options *ndo, argument
588 ospf_print_tos_metrics(netdissect_options *ndo, const union un_tos *tos) argument
620 ospf_print_lsa(netdissect_options *ndo, const struct lsa *lsap) argument
889 ospf_decode_lls(netdissect_options *ndo, const struct ospfhdr *op, u_int length) argument
970 ospf_decode_v2(netdissect_options *ndo, const struct ospfhdr *op, const u_char *dataend) argument
1084 ospf_print(netdissect_options *ndo, const u_char *bp, u_int length, const u_char *bp2 _U_) argument
[all...]
H A Dprint-olsr.c235 olsr_print_lq_neighbor4(netdissect_options *ndo, argument
260 olsr_print_lq_neighbor6(netdissect_options *ndo, argument
288 olsr_print_neighbor(netdissect_options *ndo, argument
309 olsr_print(netdissect_options *ndo, argument
328 ndo->ndo_protocol = "olsr";
331 nd_print_protocol_caps(ndo);
352 if (ndo->ndo_vflag < 1) {
474 if (olsr_print_neighbor(ndo, msg_data, hello_len) == -1)
478 if (olsr_print_lq_neighbor6(ndo, msg_data, hello_len) == -1)
481 if (olsr_print_lq_neighbor4(ndo, msg_dat
[all...]
H A Dprint-openflow-1.3.c648 of13_port_print(netdissect_options *ndo, argument
664 nd_printjnp(ndo, cp, OFP_MAX_PORT_NAME_LEN);
668 if (ndo->ndo_vflag < 2) {
675 of_bitmap_print(ndo, ofppc_bm, GET_BE_U_4(cp), OFPPC_U);
679 of_bitmap_print(ndo, ofpps_bm, GET_BE_U_4(cp), OFPPS_U);;
683 of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U);
687 of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U);
691 of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U);
695 of_bitmap_print(ndo, ofppf_bm, GET_BE_U_4(cp), OFPPF_U);
706 of13_features_reply_print(netdissect_options *ndo, argument
733 of13_switch_config_msg_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument
747 of13_table_mod_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument
761 of13_role_msg_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument
776 of13_async_msg_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument
806 of13_port_mod_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument
838 of13_port_status_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument
853 of13_hello_elements_print(netdissect_options *ndo, const u_char *cp, u_int len) argument
907 of13_experimenter_message_print(netdissect_options *ndo, const u_char *cp, u_int len) argument
926 of13_queue_get_config_request_print(netdissect_options *ndo, const u_char *cp, u_int len _U_) argument
939 of13_error_print(netdissect_options *ndo, const u_char *cp, u_int len) argument
[all...]
H A Dprint-decnet.c468 decnet_print(netdissect_options *ndo, argument
479 ndo->ndo_protocol = "decnet";
502 if (ndo->ndo_vflag)
524 if (!print_decnet_ctlmsg(ndo, rhp, length, caplen))
558 dnaddr_string(ndo, src), dnaddr_string(ndo, dst), pktlen);
559 if (ndo->ndo_vflag) {
569 if (!print_nsp(ndo, nspp, nsplen))
574 nd_print_invalid(ndo);
578 print_decnet_ctlmsg(netdissect_options *ndo, argument
699 print_t_info(netdissect_options *ndo, u_int info) argument
716 print_l1_routes(netdissect_options *ndo, const u_char *rp, u_int len) argument
743 print_l2_routes(netdissect_options *ndo, const u_char *rp, u_int len) argument
770 print_i_info(netdissect_options *ndo, u_int info) argument
795 print_nsp(netdissect_options *ndo, const u_char *nspp, u_int nsplen) argument
1162 print_reason(netdissect_options *ndo, u_int reason) argument
1169 dnnum_string(netdissect_options *ndo, u_short dnaddr) argument
[all...]
H A Dprint-tipc.c157 print_payload(netdissect_options *ndo, const struct payload_tipc_pkthdr *ap) argument
203 if (ndo->ndo_vflag) {
216 print_internal(netdissect_options *ndo, const struct internal_tipc_pkthdr *ap) argument
253 if (ndo->ndo_vflag) {
278 print_link_conf(netdissect_options *ndo, const struct link_conf_tipc_pkthdr *ap) argument
307 if (ndo->ndo_vflag) {
318 tipc_print(netdissect_options *ndo, const u_char *bp, u_int length _U_, argument
325 ndo->ndo_protocol = "tipc";
338 print_payload(ndo, (const struct payload_tipc_pkthdr *)bp);
342 print_link_conf(ndo, (cons
[all...]
H A Dprint-cnfp.c157 cnfp_v1_print(netdissect_options *ndo, const u_char *cp) argument
220 if (!ndo->ndo_nflag && (p_name = netdb_protoname(proto)) != NULL)
248 nd_print_trunc(ndo);
252 cnfp_v5_print(netdissect_options *ndo, const u_char *cp) argument
322 if (!ndo->ndo_nflag && (p_name = netdb_protoname(proto)) != NULL)
350 nd_print_trunc(ndo);
354 cnfp_v6_print(netdissect_options *ndo, const u_char *cp) argument
424 if (!ndo->ndo_nflag && (p_name = netdb_protoname(proto)) != NULL)
455 nd_print_trunc(ndo);
459 cnfp_print(netdissect_options *ndo, cons argument
[all...]
H A Dsmbutil.c85 make_unix_date(netdissect_options *ndo, const u_char *date_ptr) argument
99 make_unix_date2(netdissect_options *ndo, const u_char *date_ptr) argument
113 interpret_long_date(netdissect_options *ndo, const u_char *p) argument
140 name_interpret(netdissect_options *ndo, argument
183 name_ptr(netdissect_options *ndo, argument
222 name_extract(netdissect_options *ndo, argument
225 const u_char *p = name_ptr(ndo, buf, ofs, maxbuf);
229 return(name_interpret(ndo, p, maxbuf, name));
237 name_len(netdissect_options *ndo, argument
261 print_asc(netdissect_options *ndo, argument
287 smb_data_print(netdissect_options *ndo, const u_char *buf, u_int len) argument
330 write_bits(netdissect_options *ndo, unsigned int val, const char *fmt) argument
348 unistr(netdissect_options *ndo, char (*buf)[MAX_UNISTR_SIZE+1], const u_char *s, uint32_t strsize, int is_null_terminated, int use_unicode) argument
467 smb_fdata1(netdissect_options *ndo, const u_char *buf, const char *fmt, const u_char *maxbuf, int unicodestr) argument
830 smb_fdata(netdissect_options *ndo, const u_char *buf, const char *fmt, const u_char *maxbuf, int unicodestr) argument
[all...]
H A Dntp.c34 p_ntp_time(netdissect_options *ndo, argument
H A Dprint-icmp.c314 icmp_print(netdissect_options *ndo, const u_char *bp, u_int plen, const u_char *bp2, argument
334 ndo->ndo_protocol = "icmp";
388 tcpport_string(ndo, dport));
395 udpport_string(ndo, dport));
652 if (ndo->ndo_vflag && !fragmented) { /* don't attempt checksumming if this is a frag */
672 if (ndo->ndo_vflag >= 1 && ICMP_ERRTYPE(icmp_type)) {
678 snapend_save = ndo->ndo_snapend;
688 ndo->ndo_snapend = ND_MIN(bp + GET_BE_U_2(ip->ip_len),
689 ndo->ndo_snapend);
690 ip_print(ndo, b
[all...]
H A Dprint-mpcp.c121 mpcp_print(netdissect_options *ndo, const u_char *pptr, u_int length) argument
135 ndo->ndo_protocol = "mpcp";
147 if (!ndo->ndo_vflag)
232 print_unknown_data(ndo,pptr, "\n\t", length);
H A Dprint-eigrp.c215 eigrp_print(netdissect_options *ndo, const u_char *pptr, u_int len) argument
233 ndo->ndo_protocol = "eigrp";
248 if (ndo->ndo_vflag < 1) {
293 print_unknown_data(ndo,tptr+sizeof(struct eigrp_tlv_header),"\n\t ",tlen);
367 ipaddr_string(ndo, prefix), /* local buffer, not packet data; don't use GET_IPADDR_STRING() */
402 ipaddr_string(ndo, prefix), /* local buffer, not packet data; don't use GET_IPADDR_STRING() */
517 if (ndo->ndo_vflag <= 1)
518 print_unknown_data(ndo,tlv_tptr,"\n\t ",tlv_tlen);
522 if (ndo->ndo_vflag > 1)
523 print_unknown_data(ndo,tpt
[all...]
H A Dprint-sctp.c451 sctp_print(netdissect_options *ndo, argument
467 ndo->ndo_protocol = "sctp";
513 if (ndo->ndo_vflag >= 2)
610 forces_print(ndo, bp, payload_size);
612 ndo->ndo_protocol = "sctp";
613 } else if (ndo->ndo_vflag >= 2) { /* if verbose output is specified */
617 m3ua_print(ndo, bp, payload_size);
619 ndo->ndo_protocol = "sctp";
623 if (!ndo->ndo_suppress_default_print) {
758 if (ndo
[all...]
H A Dprint-zephyr.c89 parse_field(netdissect_options *ndo, const char **pptr, int *len) argument
143 { ND_PRINT("%s", (str1)); fn_print_str(ndo, (const u_char *)(str2)); }
146 zephyr_print(netdissect_options *ndo, const u_char *cp, u_int length) argument
172 ndo->ndo_protocol = "zephyr";
176 s = parse_field(ndo, &parse, &parselen); \
347 nd_print_invalid(ndo);
H A Dprint-pgm.c146 pgm_print(netdissect_options *ndo, argument
160 ndo->ndo_protocol = "pgm";
177 nd_print_trunc(ndo);
188 tcpport_string(ndo, sport),
190 tcpport_string(ndo, dport));
193 tcpport_string(ndo, sport), tcpport_string(ndo, dport));
199 tcpport_string(ndo, sport),
201 tcpport_string(ndo, dport));
204 tcpport_string(ndo, spor
[all...]
H A Dprint-lspping.c490 lspping_print(netdissect_options *ndo, argument
527 ndo->ndo_protocol = "lspping";
544 if (ndo->ndo_vflag < 1) {
593 p_ntp_time(ndo, &lspping_com_header->ts_sent);
600 p_ntp_time(ndo, &lspping_com_header->ts_rcvd);
776 bgp_vpn_rd_print(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv4->rd),
791 bgp_vpn_rd_print(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv6->rd),
807 bgp_vpn_rd_print(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_endpt->rd),
862 if (ndo->ndo_vflag > 1 || subtlv_hexdump==TRUE)
863 print_unknown_data(ndo, tlv_tpt
[all...]
H A Dprint-lmp.c360 lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr, argument
427 lmp_print(netdissect_options *ndo, argument
442 ndo->ndo_protocol = "lmp";
459 if (ndo->ndo_vflag < 1) {
736 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 12, 12))
756 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 36, 36))
776 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 12, 12))
1120 if (ndo->ndo_vflag <= 1)
1121 print_unknown_data(ndo,obj_tptr,"\n\t ",obj_tlen);
1125 if (ndo
[all...]
H A Dprint-rsvp.c512 rsvp_intserv_print(netdissect_options *ndo, argument
654 if (ndo->ndo_vflag <= 1)
655 print_unknown_data(ndo, tptr + 4, "\n\t\t", parameter_length);
660 nd_print_trunc(ndo);
677 rsvp_obj_print(netdissect_options *ndo, argument
1224 fn_print_char(ndo, GET_U_1(obj_tptr + 4 + i));
1451 processed = rsvp_intserv_print(ndo, obj_tptr, obj_tlen);
1721 print_unknown_data(ndo, obj_tptr + 2, "\n\t\t",
1783 sigcheck = signature_verify(ndo, pptr, plen,
1892 if (ndo
1920 rsvp_print(netdissect_options *ndo, const u_char *pptr, u_int len) argument
[all...]
H A Dparsenfsfh.c85 Parse_fh(netdissect_options *ndo, const unsigned char *fh, u_int len, argument
225 if (is_UCX(ndo, fhp, len)) {
434 is_UCX(netdissect_options *ndo, const unsigned char *fhp, u_int len) argument

Completed in 286 milliseconds

12345678