]> The Tcpdump Group git mirrors - tcpdump/blob - print-lmp.c
Use nd_ types, add EXTRACT_ calls.
[tcpdump] / print-lmp.c
1 /*
2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
12 *
13 * Original code by Hannes Gredler (hannes@gredler.at)
14 * Support for LMP service discovery extensions (defined by OIF UNI 1.0)
15 * added by Manu Pathak (mapathak@cisco.com), May 2005
16 */
17
18 /* \summary: Link Management Protocol (LMP) printer */
19
20 /* specification: RFC 4204 */
21 /* OIF UNI 1.0: http://www.oiforum.com/public/documents/OIF-UNI-01.0.pdf */
22
23 #ifdef HAVE_CONFIG_H
24 #include "config.h"
25 #endif
26
27 #include <netdissect-stdinc.h>
28
29 #include "netdissect.h"
30 #include "extract.h"
31 #include "addrtoname.h"
32 #include "gmpls.h"
33
34 /*
35 * LMP common header
36 *
37 * 0 1 2 3
38 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
39 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
40 * | Vers | (Reserved) | Flags | Msg Type |
41 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
42 * | LMP Length | (Reserved) |
43 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
44 */
45
46 struct lmp_common_header {
47 nd_uint16_t version_res;
48 nd_uint8_t flags;
49 nd_uint8_t msg_type;
50 nd_uint16_t length;
51 nd_byte reserved[2];
52 };
53
54 #define LMP_VERSION 1
55 #define LMP_EXTRACT_VERSION(x) (((x)&0xf000)>>12)
56
57 static const struct tok lmp_header_flag_values[] = {
58 { 0x01, "Control Channel Down"},
59 { 0x02, "LMP restart"},
60 { 0, NULL}
61 };
62
63 static const struct tok lmp_obj_te_link_flag_values[] = {
64 { 0x01, "Fault Management Supported"},
65 { 0x02, "Link Verification Supported"},
66 { 0, NULL}
67 };
68
69 static const struct tok lmp_obj_data_link_flag_values[] = {
70 { 0x01, "Data Link Port"},
71 { 0x02, "Allocated for user traffic"},
72 { 0x04, "Failed link"},
73 { 0, NULL}
74 };
75
76 static const struct tok lmp_obj_channel_status_values[] = {
77 { 1, "Signal Okay"},
78 { 2, "Signal Degraded"},
79 { 3, "Signal Fail"},
80 { 0, NULL}
81 };
82
83 static const struct tok lmp_obj_begin_verify_flag_values[] = {
84 { 0x0001, "Verify all links"},
85 { 0x0002, "Data link type"},
86 { 0, NULL}
87 };
88
89 static const struct tok lmp_obj_begin_verify_error_values[] = {
90 { 0x01, "Link Verification Procedure Not supported"},
91 { 0x02, "Unwilling to verify"},
92 { 0x04, "Unsupported verification transport mechanism"},
93 { 0x08, "Link-Id configuration error"},
94 { 0x10, "Unknown object c-type"},
95 { 0, NULL}
96 };
97
98 static const struct tok lmp_obj_link_summary_error_values[] = {
99 { 0x01, "Unacceptable non-negotiable LINK-SUMMARY parameters"},
100 { 0x02, "Renegotiate LINK-SUMMARY parameters"},
101 { 0x04, "Invalid TE-LINK Object"},
102 { 0x08, "Invalid DATA-LINK Object"},
103 { 0x10, "Unknown TE-LINK Object c-type"},
104 { 0x20, "Unknown DATA-LINK Object c-type"},
105 { 0, NULL}
106 };
107
108 /* Service Config Supported Protocols Flags */
109 static const struct tok lmp_obj_service_config_sp_flag_values[] = {
110 { 0x01, "RSVP Supported"},
111 { 0x02, "LDP Supported"},
112 { 0, NULL}
113 };
114
115 /* Service Config Client Port Service Attribute Transparency Flags */
116 static const struct tok lmp_obj_service_config_cpsa_tp_flag_values[] = {
117 { 0x01, "Path/VC Overhead Transparency Supported"},
118 { 0x02, "Line/MS Overhead Transparency Supported"},
119 { 0x04, "Section/RS Overhead Transparency Supported"},
120 { 0, NULL}
121 };
122
123 /* Service Config Client Port Service Attribute Contiguous Concatenation Types Flags */
124 static const struct tok lmp_obj_service_config_cpsa_cct_flag_values[] = {
125 { 0x01, "Contiguous Concatenation Types Supported"},
126 { 0, NULL}
127 };
128
129 /* Service Config Network Service Attributes Transparency Flags */
130 static const struct tok lmp_obj_service_config_nsa_transparency_flag_values[] = {
131 { 0x01, "Standard SOH/RSOH Transparency Supported"},
132 { 0x02, "Standard LOH/MSOH Transparency Supported"},
133 { 0, NULL}
134 };
135
136 /* Service Config Network Service Attributes TCM Monitoring Flags */
137 static const struct tok lmp_obj_service_config_nsa_tcm_flag_values[] = {
138 { 0x01, "Transparent Tandem Connection Monitoring Supported"},
139 { 0, NULL}
140 };
141
142 /* Network Service Attributes Network Diversity Flags */
143 static const struct tok lmp_obj_service_config_nsa_network_diversity_flag_values[] = {
144 { 0x01, "Node Diversity Supported"},
145 { 0x02, "Link Diversity Supported"},
146 { 0x04, "SRLG Diversity Supported"},
147 { 0, NULL}
148 };
149
150 #define LMP_MSGTYPE_CONFIG 1
151 #define LMP_MSGTYPE_CONFIG_ACK 2
152 #define LMP_MSGTYPE_CONFIG_NACK 3
153 #define LMP_MSGTYPE_HELLO 4
154 #define LMP_MSGTYPE_VERIFY_BEGIN 5
155 #define LMP_MSGTYPE_VERIFY_BEGIN_ACK 6
156 #define LMP_MSGTYPE_VERIFY_BEGIN_NACK 7
157 #define LMP_MSGTYPE_VERIFY_END 8
158 #define LMP_MSGTYPE_VERIFY_END_ACK 9
159 #define LMP_MSGTYPE_TEST 10
160 #define LMP_MSGTYPE_TEST_STATUS_SUCCESS 11
161 #define LMP_MSGTYPE_TEST_STATUS_FAILURE 12
162 #define LMP_MSGTYPE_TEST_STATUS_ACK 13
163 #define LMP_MSGTYPE_LINK_SUMMARY 14
164 #define LMP_MSGTYPE_LINK_SUMMARY_ACK 15
165 #define LMP_MSGTYPE_LINK_SUMMARY_NACK 16
166 #define LMP_MSGTYPE_CHANNEL_STATUS 17
167 #define LMP_MSGTYPE_CHANNEL_STATUS_ACK 18
168 #define LMP_MSGTYPE_CHANNEL_STATUS_REQ 19
169 #define LMP_MSGTYPE_CHANNEL_STATUS_RESP 20
170 /* LMP Service Discovery message types defined by UNI 1.0 */
171 #define LMP_MSGTYPE_SERVICE_CONFIG 50
172 #define LMP_MSGTYPE_SERVICE_CONFIG_ACK 51
173 #define LMP_MSGTYPE_SERVICE_CONFIG_NACK 52
174
175 static const struct tok lmp_msg_type_values[] = {
176 { LMP_MSGTYPE_CONFIG, "Config"},
177 { LMP_MSGTYPE_CONFIG_ACK, "Config ACK"},
178 { LMP_MSGTYPE_CONFIG_NACK, "Config NACK"},
179 { LMP_MSGTYPE_HELLO, "Hello"},
180 { LMP_MSGTYPE_VERIFY_BEGIN, "Begin Verify"},
181 { LMP_MSGTYPE_VERIFY_BEGIN_ACK, "Begin Verify ACK"},
182 { LMP_MSGTYPE_VERIFY_BEGIN_NACK, "Begin Verify NACK"},
183 { LMP_MSGTYPE_VERIFY_END, "End Verify"},
184 { LMP_MSGTYPE_VERIFY_END_ACK, "End Verify ACK"},
185 { LMP_MSGTYPE_TEST, "Test"},
186 { LMP_MSGTYPE_TEST_STATUS_SUCCESS, "Test Status Success"},
187 { LMP_MSGTYPE_TEST_STATUS_FAILURE, "Test Status Failure"},
188 { LMP_MSGTYPE_TEST_STATUS_ACK, "Test Status ACK"},
189 { LMP_MSGTYPE_LINK_SUMMARY, "Link Summary"},
190 { LMP_MSGTYPE_LINK_SUMMARY_ACK, "Link Summary ACK"},
191 { LMP_MSGTYPE_LINK_SUMMARY_NACK, "Link Summary NACK"},
192 { LMP_MSGTYPE_CHANNEL_STATUS, "Channel Status"},
193 { LMP_MSGTYPE_CHANNEL_STATUS_ACK, "Channel Status ACK"},
194 { LMP_MSGTYPE_CHANNEL_STATUS_REQ, "Channel Status Request"},
195 { LMP_MSGTYPE_CHANNEL_STATUS_RESP, "Channel Status Response"},
196 { LMP_MSGTYPE_SERVICE_CONFIG, "Service Config"},
197 { LMP_MSGTYPE_SERVICE_CONFIG_ACK, "Service Config ACK"},
198 { LMP_MSGTYPE_SERVICE_CONFIG_NACK, "Service Config NACK"},
199 { 0, NULL}
200 };
201
202 /*
203 * LMP object header
204 *
205 * 0 1 2 3
206 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
207 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
208 * |N| C-Type | Class | Length |
209 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
210 * | |
211 * // (object contents) //
212 * | |
213 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
214 */
215
216 struct lmp_object_header {
217 nd_uint8_t ctype;
218 nd_uint8_t class_num;
219 nd_uint16_t length;
220 };
221
222 #define LMP_OBJ_CC_ID 1
223 #define LMP_OBJ_NODE_ID 2
224 #define LMP_OBJ_LINK_ID 3
225 #define LMP_OBJ_INTERFACE_ID 4
226 #define LMP_OBJ_MESSAGE_ID 5
227 #define LMP_OBJ_CONFIG 6
228 #define LMP_OBJ_HELLO 7
229 #define LMP_OBJ_VERIFY_BEGIN 8
230 #define LMP_OBJ_VERIFY_BEGIN_ACK 9
231 #define LMP_OBJ_VERIFY_ID 10
232 #define LMP_OBJ_TE_LINK 11
233 #define LMP_OBJ_DATA_LINK 12
234 #define LMP_OBJ_CHANNEL_STATUS 13
235 #define LMP_OBJ_CHANNEL_STATUS_REQ 14
236 #define LMP_OBJ_ERROR_CODE 20
237
238 #define LMP_OBJ_SERVICE_CONFIG 51 /* defined in UNI 1.0 */
239
240 static const struct tok lmp_obj_values[] = {
241 { LMP_OBJ_CC_ID, "Control Channel ID" },
242 { LMP_OBJ_NODE_ID, "Node ID" },
243 { LMP_OBJ_LINK_ID, "Link ID" },
244 { LMP_OBJ_INTERFACE_ID, "Interface ID" },
245 { LMP_OBJ_MESSAGE_ID, "Message ID" },
246 { LMP_OBJ_CONFIG, "Configuration" },
247 { LMP_OBJ_HELLO, "Hello" },
248 { LMP_OBJ_VERIFY_BEGIN, "Verify Begin" },
249 { LMP_OBJ_VERIFY_BEGIN_ACK, "Verify Begin ACK" },
250 { LMP_OBJ_VERIFY_ID, "Verify ID" },
251 { LMP_OBJ_TE_LINK, "TE Link" },
252 { LMP_OBJ_DATA_LINK, "Data Link" },
253 { LMP_OBJ_CHANNEL_STATUS, "Channel Status" },
254 { LMP_OBJ_CHANNEL_STATUS_REQ, "Channel Status Request" },
255 { LMP_OBJ_ERROR_CODE, "Error Code" },
256 { LMP_OBJ_SERVICE_CONFIG, "Service Config" },
257
258 { 0, NULL}
259 };
260
261 #define INT_SWITCHING_TYPE_SUBOBJ 1
262 #define WAVELENGTH_SUBOBJ 2
263
264 static const struct tok lmp_data_link_subobj[] = {
265 { INT_SWITCHING_TYPE_SUBOBJ, "Interface Switching Type" },
266 { WAVELENGTH_SUBOBJ , "Wavelength" },
267 { 0, NULL}
268 };
269
270 #define LMP_CTYPE_IPV4 1
271 #define LMP_CTYPE_IPV6 2
272
273 #define LMP_CTYPE_LOC 1
274 #define LMP_CTYPE_RMT 2
275 #define LMP_CTYPE_UNMD 3
276
277 #define LMP_CTYPE_IPV4_LOC 1
278 #define LMP_CTYPE_IPV4_RMT 2
279 #define LMP_CTYPE_IPV6_LOC 3
280 #define LMP_CTYPE_IPV6_RMT 4
281 #define LMP_CTYPE_UNMD_LOC 5
282 #define LMP_CTYPE_UNMD_RMT 6
283
284 #define LMP_CTYPE_1 1
285 #define LMP_CTYPE_2 2
286
287 #define LMP_CTYPE_HELLO_CONFIG 1
288 #define LMP_CTYPE_HELLO 1
289
290 #define LMP_CTYPE_BEGIN_VERIFY_ERROR 1
291 #define LMP_CTYPE_LINK_SUMMARY_ERROR 2
292
293 /* C-Types for Service Config Object */
294 #define LMP_CTYPE_SERVICE_CONFIG_SP 1
295 #define LMP_CTYPE_SERVICE_CONFIG_CPSA 2
296 #define LMP_CTYPE_SERVICE_CONFIG_TRANSPARENCY_TCM 3
297 #define LMP_CTYPE_SERVICE_CONFIG_NETWORK_DIVERSITY 4
298
299 /*
300 * Different link types allowed in the Client Port Service Attributes
301 * subobject defined for LMP Service Discovery in the UNI 1.0 spec
302 */
303 #define LMP_SD_SERVICE_CONFIG_CPSA_LINK_TYPE_SDH 5 /* UNI 1.0 Sec 9.4.2 */
304 #define LMP_SD_SERVICE_CONFIG_CPSA_LINK_TYPE_SONET 6 /* UNI 1.0 Sec 9.4.2 */
305
306 /*
307 * the ctypes are not globally unique so for
308 * translating it to strings we build a table based
309 * on objects offsetted by the ctype
310 */
311
312 static const struct tok lmp_ctype_values[] = {
313 { 256*LMP_OBJ_CC_ID+LMP_CTYPE_LOC, "Local" },
314 { 256*LMP_OBJ_CC_ID+LMP_CTYPE_RMT, "Remote" },
315 { 256*LMP_OBJ_NODE_ID+LMP_CTYPE_LOC, "Local" },
316 { 256*LMP_OBJ_NODE_ID+LMP_CTYPE_RMT, "Remote" },
317 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_IPV4_LOC, "IPv4 Local" },
318 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_IPV4_RMT, "IPv4 Remote" },
319 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_IPV6_LOC, "IPv6 Local" },
320 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_IPV6_RMT, "IPv6 Remote" },
321 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_UNMD_LOC, "Unnumbered Local" },
322 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_UNMD_RMT, "Unnumbered Remote" },
323 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_IPV4_LOC, "IPv4 Local" },
324 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_IPV4_RMT, "IPv4 Remote" },
325 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_IPV6_LOC, "IPv6 Local" },
326 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_IPV6_RMT, "IPv6 Remote" },
327 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_UNMD_LOC, "Unnumbered Local" },
328 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_UNMD_RMT, "Unnumbered Remote" },
329 { 256*LMP_OBJ_MESSAGE_ID+LMP_CTYPE_1, "1" },
330 { 256*LMP_OBJ_MESSAGE_ID+LMP_CTYPE_2, "2" },
331 { 256*LMP_OBJ_CONFIG+LMP_CTYPE_1, "1" },
332 { 256*LMP_OBJ_HELLO+LMP_CTYPE_1, "1" },
333 { 256*LMP_OBJ_VERIFY_BEGIN+LMP_CTYPE_1, "1" },
334 { 256*LMP_OBJ_VERIFY_BEGIN_ACK+LMP_CTYPE_1, "1" },
335 { 256*LMP_OBJ_VERIFY_ID+LMP_CTYPE_1, "1" },
336 { 256*LMP_OBJ_TE_LINK+LMP_CTYPE_IPV4, "IPv4" },
337 { 256*LMP_OBJ_TE_LINK+LMP_CTYPE_IPV6, "IPv6" },
338 { 256*LMP_OBJ_TE_LINK+LMP_CTYPE_UNMD, "Unnumbered" },
339 { 256*LMP_OBJ_DATA_LINK+LMP_CTYPE_IPV4, "IPv4" },
340 { 256*LMP_OBJ_DATA_LINK+LMP_CTYPE_IPV6, "IPv6" },
341 { 256*LMP_OBJ_DATA_LINK+LMP_CTYPE_UNMD, "Unnumbered" },
342 { 256*LMP_OBJ_CHANNEL_STATUS+LMP_CTYPE_IPV4, "IPv4" },
343 { 256*LMP_OBJ_CHANNEL_STATUS+LMP_CTYPE_IPV6, "IPv6" },
344 { 256*LMP_OBJ_CHANNEL_STATUS+LMP_CTYPE_UNMD, "Unnumbered" },
345 { 256*LMP_OBJ_CHANNEL_STATUS_REQ+LMP_CTYPE_IPV4, "IPv4" },
346 { 256*LMP_OBJ_CHANNEL_STATUS_REQ+LMP_CTYPE_IPV6, "IPv6" },
347 { 256*LMP_OBJ_CHANNEL_STATUS_REQ+LMP_CTYPE_UNMD, "Unnumbered" },
348 { 256*LMP_OBJ_ERROR_CODE+LMP_CTYPE_1, "1" },
349 { 256*LMP_OBJ_ERROR_CODE+LMP_CTYPE_2, "2" },
350 { 256*LMP_OBJ_SERVICE_CONFIG+LMP_CTYPE_SERVICE_CONFIG_SP, "1" },
351 { 256*LMP_OBJ_SERVICE_CONFIG+LMP_CTYPE_SERVICE_CONFIG_CPSA, "2" },
352 { 256*LMP_OBJ_SERVICE_CONFIG+LMP_CTYPE_SERVICE_CONFIG_TRANSPARENCY_TCM, "3" },
353 { 256*LMP_OBJ_SERVICE_CONFIG+LMP_CTYPE_SERVICE_CONFIG_NETWORK_DIVERSITY, "4" },
354 { 0, NULL}
355 };
356
357 static int
358 lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr,
359 int total_subobj_len, int offset)
360 {
361 int hexdump = FALSE;
362 int subobj_type, subobj_len;
363
364 union { /* int to float conversion buffer */
365 float f;
366 uint32_t i;
367 } bw;
368
369 while (total_subobj_len > 0 && hexdump == FALSE ) {
370 subobj_type = EXTRACT_U_1(obj_tptr + offset);
371 subobj_len = EXTRACT_U_1(obj_tptr + offset + 1);
372 ND_PRINT((ndo, "\n\t Subobject, Type: %s (%u), Length: %u",
373 tok2str(lmp_data_link_subobj,
374 "Unknown",
375 subobj_type),
376 subobj_type,
377 subobj_len));
378 if (subobj_len < 4) {
379 ND_PRINT((ndo, " (too short)"));
380 break;
381 }
382 if ((subobj_len % 4) != 0) {
383 ND_PRINT((ndo, " (not a multiple of 4)"));
384 break;
385 }
386 if (total_subobj_len < subobj_len) {
387 ND_PRINT((ndo, " (goes past the end of the object)"));
388 break;
389 }
390 switch(subobj_type) {
391 case INT_SWITCHING_TYPE_SUBOBJ:
392 ND_PRINT((ndo, "\n\t Switching Type: %s (%u)",
393 tok2str(gmpls_switch_cap_values,
394 "Unknown",
395 EXTRACT_U_1(obj_tptr + offset + 2)),
396 EXTRACT_U_1(obj_tptr + offset + 2)));
397 ND_PRINT((ndo, "\n\t Encoding Type: %s (%u)",
398 tok2str(gmpls_encoding_values,
399 "Unknown",
400 EXTRACT_U_1(obj_tptr + offset + 3)),
401 EXTRACT_U_1(obj_tptr + offset + 3)));
402 bw.i = EXTRACT_BE_U_4(obj_tptr + offset + 4);
403 ND_PRINT((ndo, "\n\t Min Reservable Bandwidth: %.3f Mbps",
404 bw.f*8/1000000));
405 bw.i = EXTRACT_BE_U_4(obj_tptr + offset + 8);
406 ND_PRINT((ndo, "\n\t Max Reservable Bandwidth: %.3f Mbps",
407 bw.f*8/1000000));
408 break;
409 case WAVELENGTH_SUBOBJ:
410 ND_PRINT((ndo, "\n\t Wavelength: %u",
411 EXTRACT_BE_U_4(obj_tptr + offset + 4)));
412 break;
413 default:
414 /* Any Unknown Subobject ==> Exit loop */
415 hexdump=TRUE;
416 break;
417 }
418 total_subobj_len-=subobj_len;
419 offset+=subobj_len;
420 }
421 return (hexdump);
422 }
423
424 void
425 lmp_print(netdissect_options *ndo,
426 const u_char *pptr, u_int len)
427 {
428 const struct lmp_common_header *lmp_com_header;
429 const struct lmp_object_header *lmp_obj_header;
430 const u_char *tptr,*obj_tptr;
431 u_int version_res, tlen, lmp_obj_len, lmp_obj_ctype, obj_tlen;
432 int hexdump;
433 u_int offset;
434 u_int link_type;
435
436 union { /* int to float conversion buffer */
437 float f;
438 uint32_t i;
439 } bw;
440
441 tptr=pptr;
442 lmp_com_header = (const struct lmp_common_header *)pptr;
443 ND_TCHECK(*lmp_com_header);
444
445 version_res = EXTRACT_BE_U_2(lmp_com_header->version_res);
446
447 /*
448 * Sanity checking of the header.
449 */
450 if (LMP_EXTRACT_VERSION(version_res) != LMP_VERSION) {
451 ND_PRINT((ndo, "LMP version %u packet not supported",
452 LMP_EXTRACT_VERSION(version_res)));
453 return;
454 }
455
456 /* in non-verbose mode just lets print the basic Message Type*/
457 if (ndo->ndo_vflag < 1) {
458 ND_PRINT((ndo, "LMPv%u %s Message, length: %u",
459 LMP_EXTRACT_VERSION(version_res),
460 tok2str(lmp_msg_type_values, "unknown (%u)",EXTRACT_U_1(lmp_com_header->msg_type)),
461 len));
462 return;
463 }
464
465 /* ok they seem to want to know everything - lets fully decode it */
466
467 tlen=EXTRACT_BE_U_2(lmp_com_header->length);
468
469 ND_PRINT((ndo, "\n\tLMPv%u, msg-type: %s, Flags: [%s], length: %u",
470 LMP_EXTRACT_VERSION(version_res),
471 tok2str(lmp_msg_type_values, "unknown, type: %u",EXTRACT_U_1(lmp_com_header->msg_type)),
472 bittok2str(lmp_header_flag_values,"none",EXTRACT_U_1(lmp_com_header->flags)),
473 tlen));
474 if (tlen < sizeof(struct lmp_common_header)) {
475 ND_PRINT((ndo, " (too short)"));
476 return;
477 }
478 if (tlen > len) {
479 ND_PRINT((ndo, " (too long)"));
480 tlen = len;
481 }
482
483 tptr+=sizeof(struct lmp_common_header);
484 tlen-=sizeof(struct lmp_common_header);
485
486 while(tlen>0) {
487 /* did we capture enough for fully decoding the object header ? */
488 ND_TCHECK_LEN(tptr, sizeof(struct lmp_object_header));
489
490 lmp_obj_header = (const struct lmp_object_header *)tptr;
491 lmp_obj_len=EXTRACT_BE_U_2(lmp_obj_header->length);
492 lmp_obj_ctype=EXTRACT_U_1(lmp_obj_header->ctype)&0x7f;
493
494 ND_PRINT((ndo, "\n\t %s Object (%u), Class-Type: %s (%u) Flags: [%snegotiable], length: %u",
495 tok2str(lmp_obj_values,
496 "Unknown",
497 EXTRACT_U_1(lmp_obj_header->class_num)),
498 EXTRACT_U_1(lmp_obj_header->class_num),
499 tok2str(lmp_ctype_values,
500 "Unknown",
501 (EXTRACT_U_1(lmp_obj_header->class_num)<<8)+lmp_obj_ctype),
502 lmp_obj_ctype,
503 EXTRACT_U_1(lmp_obj_header->ctype)&0x80 ? "" : "non-",
504 lmp_obj_len));
505
506 if (lmp_obj_len < 4) {
507 ND_PRINT((ndo, " (too short)"));
508 return;
509 }
510 if ((lmp_obj_len % 4) != 0) {
511 ND_PRINT((ndo, " (not a multiple of 4)"));
512 return;
513 }
514
515 obj_tptr=tptr+sizeof(struct lmp_object_header);
516 obj_tlen=lmp_obj_len-sizeof(struct lmp_object_header);
517
518 /* did we capture enough for fully decoding the object ? */
519 ND_TCHECK_LEN(tptr, lmp_obj_len);
520 hexdump=FALSE;
521
522 switch(EXTRACT_U_1(lmp_obj_header->class_num)) {
523
524 case LMP_OBJ_CC_ID:
525 switch(lmp_obj_ctype) {
526 case LMP_CTYPE_LOC:
527 case LMP_CTYPE_RMT:
528 if (obj_tlen != 4) {
529 ND_PRINT((ndo, " (not correct for object)"));
530 break;
531 }
532 ND_PRINT((ndo, "\n\t Control Channel ID: %u (0x%08x)",
533 EXTRACT_BE_U_4(obj_tptr),
534 EXTRACT_BE_U_4(obj_tptr)));
535 break;
536
537 default:
538 hexdump=TRUE;
539 }
540 break;
541
542 case LMP_OBJ_LINK_ID:
543 case LMP_OBJ_INTERFACE_ID:
544 switch(lmp_obj_ctype) {
545 case LMP_CTYPE_IPV4_LOC:
546 case LMP_CTYPE_IPV4_RMT:
547 if (obj_tlen != 4) {
548 ND_PRINT((ndo, " (not correct for object)"));
549 break;
550 }
551 ND_PRINT((ndo, "\n\t IPv4 Link ID: %s (0x%08x)",
552 ipaddr_string(ndo, obj_tptr),
553 EXTRACT_BE_U_4(obj_tptr)));
554 break;
555 case LMP_CTYPE_IPV6_LOC:
556 case LMP_CTYPE_IPV6_RMT:
557 if (obj_tlen != 16) {
558 ND_PRINT((ndo, " (not correct for object)"));
559 break;
560 }
561 ND_PRINT((ndo, "\n\t IPv6 Link ID: %s (0x%08x)",
562 ip6addr_string(ndo, obj_tptr),
563 EXTRACT_BE_U_4(obj_tptr)));
564 break;
565 case LMP_CTYPE_UNMD_LOC:
566 case LMP_CTYPE_UNMD_RMT:
567 if (obj_tlen != 4) {
568 ND_PRINT((ndo, " (not correct for object)"));
569 break;
570 }
571 ND_PRINT((ndo, "\n\t Link ID: %u (0x%08x)",
572 EXTRACT_BE_U_4(obj_tptr),
573 EXTRACT_BE_U_4(obj_tptr)));
574 break;
575 default:
576 hexdump=TRUE;
577 }
578 break;
579
580 case LMP_OBJ_MESSAGE_ID:
581 switch(lmp_obj_ctype) {
582 case LMP_CTYPE_1:
583 if (obj_tlen != 4) {
584 ND_PRINT((ndo, " (not correct for object)"));
585 break;
586 }
587 ND_PRINT((ndo, "\n\t Message ID: %u (0x%08x)",
588 EXTRACT_BE_U_4(obj_tptr),
589 EXTRACT_BE_U_4(obj_tptr)));
590 break;
591 case LMP_CTYPE_2:
592 if (obj_tlen != 4) {
593 ND_PRINT((ndo, " (not correct for object)"));
594 break;
595 }
596 ND_PRINT((ndo, "\n\t Message ID Ack: %u (0x%08x)",
597 EXTRACT_BE_U_4(obj_tptr),
598 EXTRACT_BE_U_4(obj_tptr)));
599 break;
600 default:
601 hexdump=TRUE;
602 }
603 break;
604
605 case LMP_OBJ_NODE_ID:
606 switch(lmp_obj_ctype) {
607 case LMP_CTYPE_LOC:
608 case LMP_CTYPE_RMT:
609 if (obj_tlen != 4) {
610 ND_PRINT((ndo, " (not correct for object)"));
611 break;
612 }
613 ND_PRINT((ndo, "\n\t Node ID: %s (0x%08x)",
614 ipaddr_string(ndo, obj_tptr),
615 EXTRACT_BE_U_4(obj_tptr)));
616 break;
617
618 default:
619 hexdump=TRUE;
620 }
621 break;
622
623 case LMP_OBJ_CONFIG:
624 switch(lmp_obj_ctype) {
625 case LMP_CTYPE_HELLO_CONFIG:
626 if (obj_tlen != 4) {
627 ND_PRINT((ndo, " (not correct for object)"));
628 break;
629 }
630 ND_PRINT((ndo, "\n\t Hello Interval: %u\n\t Hello Dead Interval: %u",
631 EXTRACT_BE_U_2(obj_tptr),
632 EXTRACT_BE_U_2(obj_tptr + 2)));
633 break;
634
635 default:
636 hexdump=TRUE;
637 }
638 break;
639
640 case LMP_OBJ_HELLO:
641 switch(lmp_obj_ctype) {
642 case LMP_CTYPE_HELLO:
643 if (obj_tlen != 8) {
644 ND_PRINT((ndo, " (not correct for object)"));
645 break;
646 }
647 ND_PRINT((ndo, "\n\t Tx Seq: %u, Rx Seq: %u",
648 EXTRACT_BE_U_4(obj_tptr),
649 EXTRACT_BE_U_4(obj_tptr + 4)));
650 break;
651
652 default:
653 hexdump=TRUE;
654 }
655 break;
656
657 case LMP_OBJ_TE_LINK:
658 switch(lmp_obj_ctype) {
659 case LMP_CTYPE_IPV4:
660 if (obj_tlen != 12) {
661 ND_PRINT((ndo, " (not correct for object)"));
662 break;
663 }
664 ND_PRINT((ndo, "\n\t Flags: [%s]",
665 bittok2str(lmp_obj_te_link_flag_values,
666 "none",
667 EXTRACT_U_1(obj_tptr))));
668
669 ND_PRINT((ndo, "\n\t Local Link-ID: %s (0x%08x)"
670 "\n\t Remote Link-ID: %s (0x%08x)",
671 ipaddr_string(ndo, obj_tptr+4),
672 EXTRACT_BE_U_4(obj_tptr + 4),
673 ipaddr_string(ndo, obj_tptr+8),
674 EXTRACT_BE_U_4(obj_tptr + 8)));
675 break;
676
677 case LMP_CTYPE_IPV6:
678 if (obj_tlen != 36) {
679 ND_PRINT((ndo, " (not correct for object)"));
680 break;
681 }
682 ND_PRINT((ndo, "\n\t Flags: [%s]",
683 bittok2str(lmp_obj_te_link_flag_values,
684 "none",
685 EXTRACT_U_1(obj_tptr))));
686
687 ND_PRINT((ndo, "\n\t Local Link-ID: %s (0x%08x)"
688 "\n\t Remote Link-ID: %s (0x%08x)",
689 ip6addr_string(ndo, obj_tptr+4),
690 EXTRACT_BE_U_4(obj_tptr + 4),
691 ip6addr_string(ndo, obj_tptr+20),
692 EXTRACT_BE_U_4(obj_tptr + 20)));
693 break;
694
695 case LMP_CTYPE_UNMD:
696 if (obj_tlen != 12) {
697 ND_PRINT((ndo, " (not correct for object)"));
698 break;
699 }
700 ND_PRINT((ndo, "\n\t Flags: [%s]",
701 bittok2str(lmp_obj_te_link_flag_values,
702 "none",
703 EXTRACT_U_1(obj_tptr))));
704
705 ND_PRINT((ndo, "\n\t Local Link-ID: %u (0x%08x)"
706 "\n\t Remote Link-ID: %u (0x%08x)",
707 EXTRACT_BE_U_4(obj_tptr + 4),
708 EXTRACT_BE_U_4(obj_tptr + 4),
709 EXTRACT_BE_U_4(obj_tptr + 8),
710 EXTRACT_BE_U_4(obj_tptr + 8)));
711 break;
712
713 default:
714 hexdump=TRUE;
715 }
716 break;
717
718 case LMP_OBJ_DATA_LINK:
719 switch(lmp_obj_ctype) {
720 case LMP_CTYPE_IPV4:
721 if (obj_tlen < 12) {
722 ND_PRINT((ndo, " (not correct for object)"));
723 break;
724 }
725 ND_PRINT((ndo, "\n\t Flags: [%s]",
726 bittok2str(lmp_obj_data_link_flag_values,
727 "none",
728 EXTRACT_U_1(obj_tptr))));
729 ND_PRINT((ndo, "\n\t Local Interface ID: %s (0x%08x)"
730 "\n\t Remote Interface ID: %s (0x%08x)",
731 ipaddr_string(ndo, obj_tptr+4),
732 EXTRACT_BE_U_4(obj_tptr + 4),
733 ipaddr_string(ndo, obj_tptr+8),
734 EXTRACT_BE_U_4(obj_tptr + 8)));
735
736 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 12, 12))
737 hexdump=TRUE;
738 break;
739
740 case LMP_CTYPE_IPV6:
741 if (obj_tlen < 36) {
742 ND_PRINT((ndo, " (not correct for object)"));
743 break;
744 }
745 ND_PRINT((ndo, "\n\t Flags: [%s]",
746 bittok2str(lmp_obj_data_link_flag_values,
747 "none",
748 EXTRACT_U_1(obj_tptr))));
749 ND_PRINT((ndo, "\n\t Local Interface ID: %s (0x%08x)"
750 "\n\t Remote Interface ID: %s (0x%08x)",
751 ip6addr_string(ndo, obj_tptr+4),
752 EXTRACT_BE_U_4(obj_tptr + 4),
753 ip6addr_string(ndo, obj_tptr+20),
754 EXTRACT_BE_U_4(obj_tptr + 20)));
755
756 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 36, 36))
757 hexdump=TRUE;
758 break;
759
760 case LMP_CTYPE_UNMD:
761 if (obj_tlen < 12) {
762 ND_PRINT((ndo, " (not correct for object)"));
763 break;
764 }
765 ND_PRINT((ndo, "\n\t Flags: [%s]",
766 bittok2str(lmp_obj_data_link_flag_values,
767 "none",
768 EXTRACT_U_1(obj_tptr))));
769 ND_PRINT((ndo, "\n\t Local Interface ID: %u (0x%08x)"
770 "\n\t Remote Interface ID: %u (0x%08x)",
771 EXTRACT_BE_U_4(obj_tptr + 4),
772 EXTRACT_BE_U_4(obj_tptr + 4),
773 EXTRACT_BE_U_4(obj_tptr + 8),
774 EXTRACT_BE_U_4(obj_tptr + 8)));
775
776 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 12, 12))
777 hexdump=TRUE;
778 break;
779
780 default:
781 hexdump=TRUE;
782 }
783 break;
784
785 case LMP_OBJ_VERIFY_BEGIN:
786 switch(lmp_obj_ctype) {
787 case LMP_CTYPE_1:
788 if (obj_tlen != 20) {
789 ND_PRINT((ndo, " (not correct for object)"));
790 break;
791 }
792 ND_PRINT((ndo, "\n\t Flags: %s",
793 bittok2str(lmp_obj_begin_verify_flag_values,
794 "none",
795 EXTRACT_BE_U_2(obj_tptr))));
796 ND_PRINT((ndo, "\n\t Verify Interval: %u",
797 EXTRACT_BE_U_2(obj_tptr + 2)));
798 ND_PRINT((ndo, "\n\t Data links: %u",
799 EXTRACT_BE_U_4(obj_tptr + 4)));
800 ND_PRINT((ndo, "\n\t Encoding type: %s",
801 tok2str(gmpls_encoding_values, "Unknown", EXTRACT_U_1((obj_tptr + 8)))));
802 ND_PRINT((ndo, "\n\t Verify Transport Mechanism: %u (0x%x)%s",
803 EXTRACT_BE_U_2(obj_tptr + 10),
804 EXTRACT_BE_U_2(obj_tptr + 10),
805 EXTRACT_BE_U_2(obj_tptr + 10)&8000 ? " (Payload test messages capable)" : ""));
806 bw.i = EXTRACT_BE_U_4(obj_tptr + 12);
807 ND_PRINT((ndo, "\n\t Transmission Rate: %.3f Mbps",bw.f*8/1000000));
808 ND_PRINT((ndo, "\n\t Wavelength: %u",
809 EXTRACT_BE_U_4(obj_tptr + 16)));
810 break;
811
812 default:
813 hexdump=TRUE;
814 }
815 break;
816
817 case LMP_OBJ_VERIFY_BEGIN_ACK:
818 switch(lmp_obj_ctype) {
819 case LMP_CTYPE_1:
820 if (obj_tlen != 4) {
821 ND_PRINT((ndo, " (not correct for object)"));
822 break;
823 }
824 ND_PRINT((ndo, "\n\t Verify Dead Interval: %u"
825 "\n\t Verify Transport Response: %u",
826 EXTRACT_BE_U_2(obj_tptr),
827 EXTRACT_BE_U_2(obj_tptr + 2)));
828 break;
829
830 default:
831 hexdump=TRUE;
832 }
833 break;
834
835 case LMP_OBJ_VERIFY_ID:
836 switch(lmp_obj_ctype) {
837 case LMP_CTYPE_1:
838 if (obj_tlen != 4) {
839 ND_PRINT((ndo, " (not correct for object)"));
840 break;
841 }
842 ND_PRINT((ndo, "\n\t Verify ID: %u",
843 EXTRACT_BE_U_4(obj_tptr)));
844 break;
845
846 default:
847 hexdump=TRUE;
848 }
849 break;
850
851 case LMP_OBJ_CHANNEL_STATUS:
852 switch(lmp_obj_ctype) {
853 case LMP_CTYPE_IPV4:
854 offset = 0;
855 /* Decode pairs: <Interface_ID (4 bytes), Channel_status (4 bytes)> */
856 while (offset+8 <= obj_tlen) {
857 ND_PRINT((ndo, "\n\t Interface ID: %s (0x%08x)",
858 ipaddr_string(ndo, obj_tptr+offset),
859 EXTRACT_BE_U_4(obj_tptr + offset)));
860
861 ND_PRINT((ndo, "\n\t\t Active: %s (%u)",
862 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>31) ?
863 "Allocated" : "Non-allocated",
864 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>31)));
865
866 ND_PRINT((ndo, "\n\t\t Direction: %s (%u)",
867 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>30)&0x1 ?
868 "Transmit" : "Receive",
869 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>30)&0x1));
870
871 ND_PRINT((ndo, "\n\t\t Channel Status: %s (%u)",
872 tok2str(lmp_obj_channel_status_values,
873 "Unknown",
874 EXTRACT_BE_U_4(obj_tptr + offset + 4)&0x3FFFFFF),
875 EXTRACT_BE_U_4(obj_tptr + offset + 4)&0x3FFFFFF));
876 offset+=8;
877 }
878 break;
879
880 case LMP_CTYPE_IPV6:
881 offset = 0;
882 /* Decode pairs: <Interface_ID (16 bytes), Channel_status (4 bytes)> */
883 while (offset+20 <= obj_tlen) {
884 ND_PRINT((ndo, "\n\t Interface ID: %s (0x%08x)",
885 ip6addr_string(ndo, obj_tptr+offset),
886 EXTRACT_BE_U_4(obj_tptr + offset)));
887
888 ND_PRINT((ndo, "\n\t\t Active: %s (%u)",
889 (EXTRACT_BE_U_4(obj_tptr + offset + 16)>>31) ?
890 "Allocated" : "Non-allocated",
891 (EXTRACT_BE_U_4(obj_tptr + offset + 16)>>31)));
892
893 ND_PRINT((ndo, "\n\t\t Direction: %s (%u)",
894 (EXTRACT_BE_U_4(obj_tptr + offset + 16)>>30)&0x1 ?
895 "Transmit" : "Receive",
896 (EXTRACT_BE_U_4(obj_tptr + offset + 16)>>30)&0x1));
897
898 ND_PRINT((ndo, "\n\t\t Channel Status: %s (%u)",
899 tok2str(lmp_obj_channel_status_values,
900 "Unknown",
901 EXTRACT_BE_U_4(obj_tptr + offset + 16)&0x3FFFFFF),
902 EXTRACT_BE_U_4(obj_tptr + offset + 16)&0x3FFFFFF));
903 offset+=20;
904 }
905 break;
906
907 case LMP_CTYPE_UNMD:
908 offset = 0;
909 /* Decode pairs: <Interface_ID (4 bytes), Channel_status (4 bytes)> */
910 while (offset+8 <= obj_tlen) {
911 ND_PRINT((ndo, "\n\t Interface ID: %u (0x%08x)",
912 EXTRACT_BE_U_4(obj_tptr + offset),
913 EXTRACT_BE_U_4(obj_tptr + offset)));
914
915 ND_PRINT((ndo, "\n\t\t Active: %s (%u)",
916 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>31) ?
917 "Allocated" : "Non-allocated",
918 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>31)));
919
920 ND_PRINT((ndo, "\n\t\t Direction: %s (%u)",
921 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>30)&0x1 ?
922 "Transmit" : "Receive",
923 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>30)&0x1));
924
925 ND_PRINT((ndo, "\n\t\t Channel Status: %s (%u)",
926 tok2str(lmp_obj_channel_status_values,
927 "Unknown",
928 EXTRACT_BE_U_4(obj_tptr + offset + 4)&0x3FFFFFF),
929 EXTRACT_BE_U_4(obj_tptr + offset + 4)&0x3FFFFFF));
930 offset+=8;
931 }
932 break;
933
934 default:
935 hexdump=TRUE;
936 }
937 break;
938
939 case LMP_OBJ_CHANNEL_STATUS_REQ:
940 switch(lmp_obj_ctype) {
941 case LMP_CTYPE_IPV4:
942 offset = 0;
943 while (offset+4 <= obj_tlen) {
944 ND_PRINT((ndo, "\n\t Interface ID: %s (0x%08x)",
945 ipaddr_string(ndo, obj_tptr+offset),
946 EXTRACT_BE_U_4(obj_tptr + offset)));
947 offset+=4;
948 }
949 break;
950
951 case LMP_CTYPE_IPV6:
952 offset = 0;
953 while (offset+16 <= obj_tlen) {
954 ND_PRINT((ndo, "\n\t Interface ID: %s (0x%08x)",
955 ip6addr_string(ndo, obj_tptr+offset),
956 EXTRACT_BE_U_4(obj_tptr + offset)));
957 offset+=16;
958 }
959 break;
960
961 case LMP_CTYPE_UNMD:
962 offset = 0;
963 while (offset+4 <= obj_tlen) {
964 ND_PRINT((ndo, "\n\t Interface ID: %u (0x%08x)",
965 EXTRACT_BE_U_4(obj_tptr + offset),
966 EXTRACT_BE_U_4(obj_tptr + offset)));
967 offset+=4;
968 }
969 break;
970
971 default:
972 hexdump=TRUE;
973 }
974 break;
975
976 case LMP_OBJ_ERROR_CODE:
977 switch(lmp_obj_ctype) {
978 case LMP_CTYPE_BEGIN_VERIFY_ERROR:
979 if (obj_tlen != 4) {
980 ND_PRINT((ndo, " (not correct for object)"));
981 break;
982 }
983 ND_PRINT((ndo, "\n\t Error Code: %s",
984 bittok2str(lmp_obj_begin_verify_error_values,
985 "none",
986 EXTRACT_BE_U_4(obj_tptr))));
987 break;
988
989 case LMP_CTYPE_LINK_SUMMARY_ERROR:
990 if (obj_tlen != 4) {
991 ND_PRINT((ndo, " (not correct for object)"));
992 break;
993 }
994 ND_PRINT((ndo, "\n\t Error Code: %s",
995 bittok2str(lmp_obj_link_summary_error_values,
996 "none",
997 EXTRACT_BE_U_4(obj_tptr))));
998 break;
999 default:
1000 hexdump=TRUE;
1001 }
1002 break;
1003
1004 case LMP_OBJ_SERVICE_CONFIG:
1005 switch (lmp_obj_ctype) {
1006 case LMP_CTYPE_SERVICE_CONFIG_SP:
1007 if (obj_tlen != 4) {
1008 ND_PRINT((ndo, " (not correct for object)"));
1009 break;
1010 }
1011 ND_PRINT((ndo, "\n\t Flags: %s",
1012 bittok2str(lmp_obj_service_config_sp_flag_values,
1013 "none",
1014 EXTRACT_U_1(obj_tptr))));
1015
1016 ND_PRINT((ndo, "\n\t UNI Version: %u",
1017 EXTRACT_U_1(obj_tptr + 1)));
1018
1019 break;
1020
1021 case LMP_CTYPE_SERVICE_CONFIG_CPSA:
1022 if (obj_tlen != 16) {
1023 ND_PRINT((ndo, " (not correct for object)"));
1024 break;
1025 }
1026
1027 link_type = EXTRACT_U_1(obj_tptr);
1028
1029 ND_PRINT((ndo, "\n\t Link Type: %s (%u)",
1030 tok2str(lmp_sd_service_config_cpsa_link_type_values,
1031 "Unknown", link_type),
1032 link_type));
1033
1034 switch (link_type) {
1035 case LMP_SD_SERVICE_CONFIG_CPSA_LINK_TYPE_SDH:
1036 ND_PRINT((ndo, "\n\t Signal Type: %s (%u)",
1037 tok2str(lmp_sd_service_config_cpsa_signal_type_sdh_values,
1038 "Unknown",
1039 EXTRACT_U_1(obj_tptr + 1)),
1040 EXTRACT_U_1(obj_tptr + 1)));
1041 break;
1042
1043 case LMP_SD_SERVICE_CONFIG_CPSA_LINK_TYPE_SONET:
1044 ND_PRINT((ndo, "\n\t Signal Type: %s (%u)",
1045 tok2str(lmp_sd_service_config_cpsa_signal_type_sonet_values,
1046 "Unknown",
1047 EXTRACT_U_1(obj_tptr + 1)),
1048 EXTRACT_U_1(obj_tptr + 1)));
1049 break;
1050 }
1051
1052 ND_PRINT((ndo, "\n\t Transparency: %s",
1053 bittok2str(lmp_obj_service_config_cpsa_tp_flag_values,
1054 "none",
1055 EXTRACT_U_1(obj_tptr + 2))));
1056
1057 ND_PRINT((ndo, "\n\t Contiguous Concatenation Types: %s",
1058 bittok2str(lmp_obj_service_config_cpsa_cct_flag_values,
1059 "none",
1060 EXTRACT_U_1(obj_tptr + 3))));
1061
1062 ND_PRINT((ndo, "\n\t Minimum NCC: %u",
1063 EXTRACT_BE_U_2(obj_tptr + 4)));
1064
1065 ND_PRINT((ndo, "\n\t Maximum NCC: %u",
1066 EXTRACT_BE_U_2(obj_tptr + 6)));
1067
1068 ND_PRINT((ndo, "\n\t Minimum NVC:%u",
1069 EXTRACT_BE_U_2(obj_tptr + 8)));
1070
1071 ND_PRINT((ndo, "\n\t Maximum NVC:%u",
1072 EXTRACT_BE_U_2(obj_tptr + 10)));
1073
1074 ND_PRINT((ndo, "\n\t Local Interface ID: %s (0x%08x)",
1075 ipaddr_string(ndo, obj_tptr+12),
1076 EXTRACT_BE_U_4(obj_tptr + 12)));
1077
1078 break;
1079
1080 case LMP_CTYPE_SERVICE_CONFIG_TRANSPARENCY_TCM:
1081 if (obj_tlen != 8) {
1082 ND_PRINT((ndo, " (not correct for object)"));
1083 break;
1084 }
1085
1086 ND_PRINT((ndo, "\n\t Transparency Flags: %s",
1087 bittok2str(
1088 lmp_obj_service_config_nsa_transparency_flag_values,
1089 "none",
1090 EXTRACT_BE_U_4(obj_tptr))));
1091
1092 ND_PRINT((ndo, "\n\t TCM Monitoring Flags: %s",
1093 bittok2str(
1094 lmp_obj_service_config_nsa_tcm_flag_values,
1095 "none",
1096 EXTRACT_U_1(obj_tptr + 7))));
1097
1098 break;
1099
1100 case LMP_CTYPE_SERVICE_CONFIG_NETWORK_DIVERSITY:
1101 if (obj_tlen != 4) {
1102 ND_PRINT((ndo, " (not correct for object)"));
1103 break;
1104 }
1105
1106 ND_PRINT((ndo, "\n\t Diversity: Flags: %s",
1107 bittok2str(
1108 lmp_obj_service_config_nsa_network_diversity_flag_values,
1109 "none",
1110 EXTRACT_U_1(obj_tptr + 3))));
1111 break;
1112
1113 default:
1114 hexdump = TRUE;
1115 }
1116
1117 break;
1118
1119 default:
1120 if (ndo->ndo_vflag <= 1)
1121 print_unknown_data(ndo,obj_tptr,"\n\t ",obj_tlen);
1122 break;
1123 }
1124 /* do we want to see an additionally hexdump ? */
1125 if (ndo->ndo_vflag > 1 || hexdump==TRUE)
1126 print_unknown_data(ndo,tptr+sizeof(struct lmp_object_header),"\n\t ",
1127 lmp_obj_len-sizeof(struct lmp_object_header));
1128
1129 tptr+=lmp_obj_len;
1130 tlen-=lmp_obj_len;
1131 }
1132 return;
1133 trunc:
1134 ND_PRINT((ndo, "\n\t\t packet exceeded snapshot"));
1135 }
1136 /*
1137 * Local Variables:
1138 * c-style: whitesmith
1139 * c-basic-offset: 8
1140 * End:
1141 */