2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
13 * Original code by Hannes Gredler (hannes@gredler.at)
14 * and Steinar Haug (sthaug@nethelp.no)
17 /* \summary: Label Distribution Protocol (LDP) printer */
23 #include "netdissect-stdinc.h"
25 #include "netdissect.h"
27 #include "addrtoname.h"
37 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
38 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
39 * | Version | PDU Length |
40 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
42 * + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
44 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
48 struct ldp_common_header
{
50 nd_uint16_t pdu_length
;
52 nd_uint16_t label_space
;
61 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
62 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
63 * |U| Message Type | Message Length |
64 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
66 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
69 * | Mandatory Parameters |
72 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
75 * | Optional Parameters |
78 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
81 struct ldp_msg_header
{
87 #define LDP_MASK_MSG_TYPE(x) ((x)&0x7fff)
88 #define LDP_MASK_U_BIT(x) ((x)&0x8000)
90 #define LDP_MSG_NOTIF 0x0001
91 #define LDP_MSG_HELLO 0x0100
92 #define LDP_MSG_INIT 0x0200
93 #define LDP_MSG_KEEPALIVE 0x0201
94 #define LDP_MSG_ADDRESS 0x0300
95 #define LDP_MSG_ADDRESS_WITHDRAW 0x0301
96 #define LDP_MSG_LABEL_MAPPING 0x0400
97 #define LDP_MSG_LABEL_REQUEST 0x0401
98 #define LDP_MSG_LABEL_WITHDRAW 0x0402
99 #define LDP_MSG_LABEL_RELEASE 0x0403
100 #define LDP_MSG_LABEL_ABORT_REQUEST 0x0404
102 #define LDP_VENDOR_PRIVATE_MIN 0x3e00
103 #define LDP_VENDOR_PRIVATE_MAX 0x3eff
104 #define LDP_EXPERIMENTAL_MIN 0x3f00
105 #define LDP_EXPERIMENTAL_MAX 0x3fff
107 static const struct tok ldp_msg_values
[] = {
108 { LDP_MSG_NOTIF
, "Notification" },
109 { LDP_MSG_HELLO
, "Hello" },
110 { LDP_MSG_INIT
, "Initialization" },
111 { LDP_MSG_KEEPALIVE
, "Keepalive" },
112 { LDP_MSG_ADDRESS
, "Address" },
113 { LDP_MSG_ADDRESS_WITHDRAW
, "Address Withdraw" },
114 { LDP_MSG_LABEL_MAPPING
, "Label Mapping" },
115 { LDP_MSG_LABEL_REQUEST
, "Label Request" },
116 { LDP_MSG_LABEL_WITHDRAW
, "Label Withdraw" },
117 { LDP_MSG_LABEL_RELEASE
, "Label Release" },
118 { LDP_MSG_LABEL_ABORT_REQUEST
, "Label Abort Request" },
122 #define LDP_MASK_TLV_TYPE(x) ((x)&0x3fff)
123 #define LDP_MASK_F_BIT(x) ((x)&0x4000)
125 #define LDP_TLV_FEC 0x0100
126 #define LDP_TLV_ADDRESS_LIST 0x0101
127 #define LDP_TLV_ADDRESS_LIST_AFNUM_LEN 2
128 #define LDP_TLV_HOP_COUNT 0x0103
129 #define LDP_TLV_PATH_VECTOR 0x0104
130 #define LDP_TLV_GENERIC_LABEL 0x0200
131 #define LDP_TLV_ATM_LABEL 0x0201
132 #define LDP_TLV_FR_LABEL 0x0202
133 #define LDP_TLV_STATUS 0x0300
134 #define LDP_TLV_EXTD_STATUS 0x0301
135 #define LDP_TLV_RETURNED_PDU 0x0302
136 #define LDP_TLV_RETURNED_MSG 0x0303
137 #define LDP_TLV_COMMON_HELLO 0x0400
138 #define LDP_TLV_IPV4_TRANSPORT_ADDR 0x0401
139 #define LDP_TLV_CONFIG_SEQ_NUMBER 0x0402
140 #define LDP_TLV_IPV6_TRANSPORT_ADDR 0x0403
141 #define LDP_TLV_COMMON_SESSION 0x0500
142 #define LDP_TLV_ATM_SESSION_PARM 0x0501
143 #define LDP_TLV_FR_SESSION_PARM 0x0502
144 #define LDP_TLV_FT_SESSION 0x0503
145 #define LDP_TLV_LABEL_REQUEST_MSG_ID 0x0600
146 #define LDP_TLV_MTU 0x0601 /* rfc 3988 */
148 static const struct tok ldp_tlv_values
[] = {
149 { LDP_TLV_FEC
, "FEC" },
150 { LDP_TLV_ADDRESS_LIST
, "Address List" },
151 { LDP_TLV_HOP_COUNT
, "Hop Count" },
152 { LDP_TLV_PATH_VECTOR
, "Path Vector" },
153 { LDP_TLV_GENERIC_LABEL
, "Generic Label" },
154 { LDP_TLV_ATM_LABEL
, "ATM Label" },
155 { LDP_TLV_FR_LABEL
, "Frame-Relay Label" },
156 { LDP_TLV_STATUS
, "Status" },
157 { LDP_TLV_EXTD_STATUS
, "Extended Status" },
158 { LDP_TLV_RETURNED_PDU
, "Returned PDU" },
159 { LDP_TLV_RETURNED_MSG
, "Returned Message" },
160 { LDP_TLV_COMMON_HELLO
, "Common Hello Parameters" },
161 { LDP_TLV_IPV4_TRANSPORT_ADDR
, "IPv4 Transport Address" },
162 { LDP_TLV_CONFIG_SEQ_NUMBER
, "Configuration Sequence Number" },
163 { LDP_TLV_IPV6_TRANSPORT_ADDR
, "IPv6 Transport Address" },
164 { LDP_TLV_COMMON_SESSION
, "Common Session Parameters" },
165 { LDP_TLV_ATM_SESSION_PARM
, "ATM Session Parameters" },
166 { LDP_TLV_FR_SESSION_PARM
, "Frame-Relay Session Parameters" },
167 { LDP_TLV_FT_SESSION
, "Fault-Tolerant Session Parameters" },
168 { LDP_TLV_LABEL_REQUEST_MSG_ID
, "Label Request Message ID" },
169 { LDP_TLV_MTU
, "MTU" },
173 #define LDP_FEC_WILDCARD 0x01
174 #define LDP_FEC_PREFIX 0x02
175 #define LDP_FEC_HOSTADDRESS 0x03
176 /* From RFC 4906; should probably be updated to RFC 4447 (e.g., VC -> PW) */
177 #define LDP_FEC_MARTINI_VC 0x80
179 static const struct tok ldp_fec_values
[] = {
180 { LDP_FEC_WILDCARD
, "Wildcard" },
181 { LDP_FEC_PREFIX
, "Prefix" },
182 { LDP_FEC_HOSTADDRESS
, "Host address" },
183 { LDP_FEC_MARTINI_VC
, "Martini VC" },
187 #define LDP_FEC_MARTINI_IFPARM_MTU 0x01
188 #define LDP_FEC_MARTINI_IFPARM_DESC 0x03
189 #define LDP_FEC_MARTINI_IFPARM_VCCV 0x0c
191 static const struct tok ldp_fec_martini_ifparm_values
[] = {
192 { LDP_FEC_MARTINI_IFPARM_MTU
, "MTU" },
193 { LDP_FEC_MARTINI_IFPARM_DESC
, "Description" },
194 { LDP_FEC_MARTINI_IFPARM_VCCV
, "VCCV" },
198 /* draft-ietf-pwe3-vccv-04.txt */
199 static const struct tok ldp_fec_martini_ifparm_vccv_cc_values
[] = {
200 { 0x01, "PWE3 control word" },
201 { 0x02, "MPLS Router Alert Label" },
202 { 0x04, "MPLS inner label TTL = 1" },
206 /* draft-ietf-pwe3-vccv-04.txt */
207 static const struct tok ldp_fec_martini_ifparm_vccv_cv_values
[] = {
208 { 0x01, "ICMP Ping" },
209 { 0x02, "LSP Ping" },
214 static u_int
ldp_pdu_print(netdissect_options
*, const u_char
*);
220 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
221 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
222 * |U|F| Type | Length |
223 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
228 * | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
230 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
233 #define TLV_TCHECK(minlen) \
234 if (tlv_tlen < minlen) { \
235 ND_PRINT(" [tlv length %u < %u]", tlv_tlen, minlen); \
236 nd_print_invalid(ndo); \
241 ldp_tlv_print(netdissect_options
*ndo
,
245 struct ldp_tlv_header
{
250 const struct ldp_tlv_header
*ldp_tlv_header
;
251 u_short tlv_type
,tlv_len
,tlv_tlen
,af
,ft_flags
;
253 u_int ui
,vc_info_len
, vc_info_tlv_type
, vc_info_tlv_len
,idx
;
257 ldp_tlv_header
= (const struct ldp_tlv_header
*)tptr
;
258 ND_TCHECK_SIZE(ldp_tlv_header
);
259 tlv_len
=GET_BE_U_2(ldp_tlv_header
->length
);
260 if (tlv_len
+ 4U > msg_tlen
) {
261 ND_PRINT("\n\t\t TLV contents go past end of message");
265 tlv_type
=LDP_MASK_TLV_TYPE(GET_BE_U_2(ldp_tlv_header
->type
));
267 /* FIXME vendor private / experimental check */
268 ND_PRINT("\n\t %s TLV (0x%04x), length: %u, Flags: [%s and %s forward if unknown]",
269 tok2str(ldp_tlv_values
,
274 LDP_MASK_U_BIT(GET_BE_U_2(ldp_tlv_header
->type
)) ? "continue processing" : "ignore",
275 LDP_MASK_F_BIT(GET_BE_U_2(ldp_tlv_header
->type
)) ? "do" : "don't");
277 tptr
+=sizeof(struct ldp_tlv_header
);
281 case LDP_TLV_COMMON_HELLO
:
283 ND_PRINT("\n\t Hold Time: %us, Flags: [%s Hello%s]",
285 (GET_BE_U_2(tptr
+ 2)&0x8000) ? "Targeted" : "Link",
286 (GET_BE_U_2(tptr
+ 2)&0x4000) ? ", Request for targeted Hellos" : "");
289 case LDP_TLV_IPV4_TRANSPORT_ADDR
:
291 ND_PRINT("\n\t IPv4 Transport Address: %s", GET_IPADDR_STRING(tptr
));
293 case LDP_TLV_IPV6_TRANSPORT_ADDR
:
295 ND_PRINT("\n\t IPv6 Transport Address: %s", GET_IP6ADDR_STRING(tptr
));
297 case LDP_TLV_CONFIG_SEQ_NUMBER
:
299 ND_PRINT("\n\t Sequence Number: %u", GET_BE_U_4(tptr
));
302 case LDP_TLV_ADDRESS_LIST
:
303 TLV_TCHECK(LDP_TLV_ADDRESS_LIST_AFNUM_LEN
);
304 af
= GET_BE_U_2(tptr
);
305 tptr
+=LDP_TLV_ADDRESS_LIST_AFNUM_LEN
;
306 tlv_tlen
-= LDP_TLV_ADDRESS_LIST_AFNUM_LEN
;
307 ND_PRINT("\n\t Address Family: %s, addresses",
308 tok2str(af_values
, "Unknown (%u)", af
));
311 while(tlv_tlen
>= sizeof(nd_ipv4
)) {
312 ND_TCHECK_LEN(tptr
, sizeof(nd_ipv4
));
313 ND_PRINT(" %s", GET_IPADDR_STRING(tptr
));
314 tlv_tlen
-=sizeof(nd_ipv4
);
315 tptr
+=sizeof(nd_ipv4
);
319 while(tlv_tlen
>= sizeof(nd_ipv6
)) {
320 ND_TCHECK_LEN(tptr
, sizeof(nd_ipv6
));
321 ND_PRINT(" %s", GET_IP6ADDR_STRING(tptr
));
322 tlv_tlen
-=sizeof(nd_ipv6
);
323 tptr
+=sizeof(nd_ipv6
);
332 case LDP_TLV_COMMON_SESSION
:
334 ND_PRINT("\n\t Version: %u, Keepalive: %us, Flags: [Downstream %s, Loop Detection %s]",
335 GET_BE_U_2(tptr
), GET_BE_U_2(tptr
+ 2),
336 (GET_BE_U_2(tptr
+ 6)&0x8000) ? "On Demand" : "Unsolicited",
337 (GET_BE_U_2(tptr
+ 6)&0x4000) ? "Enabled" : "Disabled"
343 fec_type
= GET_U_1(tptr
);
344 ND_PRINT("\n\t %s FEC (0x%02x)",
345 tok2str(ldp_fec_values
, "Unknown", fec_type
),
352 case LDP_FEC_WILDCARD
:
356 af
= GET_BE_U_2(tptr
);
357 tptr
+=LDP_TLV_ADDRESS_LIST_AFNUM_LEN
;
358 tlv_tlen
-=LDP_TLV_ADDRESS_LIST_AFNUM_LEN
;
359 if (af
== AFNUM_INET
) {
360 i
=decode_prefix4(ndo
, tptr
, tlv_tlen
, buf
, sizeof(buf
));
364 ND_PRINT(": IPv4 prefix (goes past end of TLV)");
366 ND_PRINT(": IPv4 prefix (invalid length)");
368 ND_PRINT(": IPv4 prefix %s", buf
);
370 else if (af
== AFNUM_INET6
) {
371 i
=decode_prefix6(ndo
, tptr
, tlv_tlen
, buf
, sizeof(buf
));
375 ND_PRINT(": IPv4 prefix (goes past end of TLV)");
377 ND_PRINT(": IPv6 prefix (invalid length)");
379 ND_PRINT(": IPv6 prefix %s", buf
);
382 ND_PRINT(": Address family %u prefix", af
);
384 case LDP_FEC_HOSTADDRESS
:
386 case LDP_FEC_MARTINI_VC
:
388 * We assume the type was supposed to be one of the MPLS
392 vc_info_len
= GET_U_1(tptr
+ 2);
395 * According to RFC 4908, the VC info Length field can be zero,
396 * in which case not only are there no interface parameters,
399 if (vc_info_len
== 0) {
400 ND_PRINT(": %s, %scontrol word, group-ID %u, VC-info-length: %u",
401 tok2str(mpls_pw_types_values
, "Unknown", GET_BE_U_2(tptr
)&0x7fff),
402 GET_BE_U_2(tptr
)&0x8000 ? "" : "no ",
403 GET_BE_U_4(tptr
+ 3),
408 /* Make sure we have the VC ID as well */
410 ND_PRINT(": %s, %scontrol word, group-ID %u, VC-ID %u, VC-info-length: %u",
411 tok2str(mpls_pw_types_values
, "Unknown", GET_BE_U_2(tptr
)&0x7fff),
412 GET_BE_U_2(tptr
)&0x8000 ? "" : "no ",
413 GET_BE_U_4(tptr
+ 3),
414 GET_BE_U_4(tptr
+ 7),
416 if (vc_info_len
< 4) {
417 /* minimum 4, for the VC ID */
418 ND_PRINT(" (invalid, < 4");
419 return(tlv_len
+4); /* Type & Length fields not included */
421 vc_info_len
-= 4; /* subtract out the VC ID, giving the length of the interface parameters */
423 /* Skip past the fixed information and the VC ID */
426 TLV_TCHECK(vc_info_len
);
428 while (vc_info_len
> 2) {
429 vc_info_tlv_type
= GET_U_1(tptr
);
430 vc_info_tlv_len
= GET_U_1(tptr
+ 1);
431 if (vc_info_tlv_len
< 2)
433 if (vc_info_len
< vc_info_tlv_len
)
436 ND_PRINT("\n\t\tInterface Parameter: %s (0x%02x), len %u",
437 tok2str(ldp_fec_martini_ifparm_values
,"Unknown",vc_info_tlv_type
),
441 switch(vc_info_tlv_type
) {
442 case LDP_FEC_MARTINI_IFPARM_MTU
:
443 ND_PRINT(": %u", GET_BE_U_2(tptr
+ 2));
446 case LDP_FEC_MARTINI_IFPARM_DESC
:
448 for (idx
= 2; idx
< vc_info_tlv_len
; idx
++)
449 fn_print_char(ndo
, GET_U_1(tptr
+ idx
));
452 case LDP_FEC_MARTINI_IFPARM_VCCV
:
453 ND_PRINT("\n\t\t Control Channels (0x%02x) = [%s]",
455 bittok2str(ldp_fec_martini_ifparm_vccv_cc_values
, "none", GET_U_1((tptr
+ 2))));
456 ND_PRINT("\n\t\t CV Types (0x%02x) = [%s]",
458 bittok2str(ldp_fec_martini_ifparm_vccv_cv_values
, "none", GET_U_1((tptr
+ 3))));
462 print_unknown_data(ndo
, tptr
+2, "\n\t\t ", vc_info_tlv_len
-2);
466 vc_info_len
-= vc_info_tlv_len
;
467 tptr
+= vc_info_tlv_len
;
474 case LDP_TLV_GENERIC_LABEL
:
476 ND_PRINT("\n\t Label: %u", GET_BE_U_4(tptr
) & 0xfffff);
481 ui
= GET_BE_U_4(tptr
);
483 ND_PRINT("\n\t Status: 0x%02x, Flags: [%s and %s forward]",
485 ui
&0x80000000 ? "Fatal error" : "Advisory Notification",
486 ui
&0x40000000 ? "do" : "don't");
487 ui
= GET_BE_U_4(tptr
);
490 ND_PRINT(", causing Message ID: 0x%08x", ui
);
493 case LDP_TLV_FT_SESSION
:
495 ft_flags
= GET_BE_U_2(tptr
);
496 ND_PRINT("\n\t Flags: [%sReconnect, %sSave State, %sAll-Label Protection, %s Checkpoint, %sRe-Learn State]",
497 ft_flags
&0x8000 ? "" : "No ",
498 ft_flags
&0x8 ? "" : "Don't ",
499 ft_flags
&0x4 ? "" : "No ",
500 ft_flags
&0x2 ? "Sequence Numbered Label" : "All Labels",
501 ft_flags
&0x1 ? "" : "Don't ");
502 /* 16 bits (FT Flags) + 16 bits (Reserved) */
504 ui
= GET_BE_U_4(tptr
);
506 ND_PRINT(", Reconnect Timeout: %ums", ui
);
508 ui
= GET_BE_U_4(tptr
);
510 ND_PRINT(", Recovery Time: %ums", ui
);
515 ND_PRINT("\n\t MTU: %u", GET_BE_U_2(tptr
));
520 * FIXME those are the defined TLVs that lack a decoder
521 * you are welcome to contribute code ;-)
524 case LDP_TLV_HOP_COUNT
:
525 case LDP_TLV_PATH_VECTOR
:
526 case LDP_TLV_ATM_LABEL
:
527 case LDP_TLV_FR_LABEL
:
528 case LDP_TLV_EXTD_STATUS
:
529 case LDP_TLV_RETURNED_PDU
:
530 case LDP_TLV_RETURNED_MSG
:
531 case LDP_TLV_ATM_SESSION_PARM
:
532 case LDP_TLV_FR_SESSION_PARM
:
533 case LDP_TLV_LABEL_REQUEST_MSG_ID
:
536 if (ndo
->ndo_vflag
<= 1)
537 print_unknown_data(ndo
, tptr
, "\n\t ", tlv_tlen
);
540 return(tlv_len
+4); /* Type & Length fields not included */
547 return(tlv_len
+4); /* Type & Length fields not included */
551 ldp_print(netdissect_options
*ndo
,
552 const u_char
*pptr
, u_int len
)
556 ndo
->ndo_protocol
= "ldp";
557 while (len
> (sizeof(struct ldp_common_header
) + sizeof(struct ldp_msg_header
))) {
558 processed
= ldp_pdu_print(ndo
, pptr
);
561 if (len
< processed
) {
562 ND_PRINT(" [remaining length %u < %u]", len
, processed
);
563 nd_print_invalid(ndo
);
572 ldp_pdu_print(netdissect_options
*ndo
,
575 const struct ldp_common_header
*ldp_com_header
;
576 const struct ldp_msg_header
*ldp_msg_header
;
577 const u_char
*tptr
,*msg_tptr
;
579 u_short pdu_len
,msg_len
,msg_type
;
581 int hexdump
,processed
;
583 ldp_com_header
= (const struct ldp_common_header
*)pptr
;
584 ND_TCHECK_SIZE(ldp_com_header
);
587 * Sanity checking of the header.
589 if (GET_BE_U_2(ldp_com_header
->version
) != LDP_VERSION
) {
590 ND_PRINT("%sLDP version %u packet not supported",
591 (ndo
->ndo_vflag
< 1) ? "" : "\n\t",
592 GET_BE_U_2(ldp_com_header
->version
));
596 pdu_len
= GET_BE_U_2(ldp_com_header
->pdu_length
);
597 if (pdu_len
< sizeof(struct ldp_common_header
)-4) {
598 /* length too short */
599 ND_PRINT("%sLDP, pdu-length: %u (too short, < %u)",
600 (ndo
->ndo_vflag
< 1) ? "" : "\n\t",
602 (u_int
)(sizeof(struct ldp_common_header
)-4));
606 /* print the LSR-ID, label-space & length */
607 ND_PRINT("%sLDP, Label-Space-ID: %s:%u, pdu-length: %u",
608 (ndo
->ndo_vflag
< 1) ? "" : "\n\t",
609 GET_IPADDR_STRING(ldp_com_header
->lsr_id
),
610 GET_BE_U_2(ldp_com_header
->label_space
),
613 /* bail out if non-verbose */
614 if (ndo
->ndo_vflag
< 1)
617 /* ok they seem to want to know everything - lets fully decode it */
618 tptr
= pptr
+ sizeof(struct ldp_common_header
);
619 tlen
= pdu_len
- (sizeof(struct ldp_common_header
)-4); /* Type & Length fields not included */
622 /* did we capture enough for fully decoding the msg header ? */
623 ND_TCHECK_LEN(tptr
, sizeof(struct ldp_msg_header
));
625 ldp_msg_header
= (const struct ldp_msg_header
*)tptr
;
626 msg_len
=GET_BE_U_2(ldp_msg_header
->length
);
627 msg_type
=LDP_MASK_MSG_TYPE(GET_BE_U_2(ldp_msg_header
->type
));
629 if (msg_len
< sizeof(struct ldp_msg_header
)-4) {
630 /* length too short */
631 /* FIXME vendor private / experimental check */
632 ND_PRINT("\n\t %s Message (0x%04x), length: %u (too short, < %u)",
633 tok2str(ldp_msg_values
,
638 (u_int
)(sizeof(struct ldp_msg_header
)-4));
642 /* FIXME vendor private / experimental check */
643 ND_PRINT("\n\t %s Message (0x%04x), length: %u, Message ID: 0x%08x, Flags: [%s if unknown]",
644 tok2str(ldp_msg_values
,
649 GET_BE_U_4(ldp_msg_header
->id
),
650 LDP_MASK_U_BIT(GET_BE_U_2(ldp_msg_header
->type
)) ? "continue processing" : "ignore");
652 msg_tptr
=tptr
+sizeof(struct ldp_msg_header
);
653 msg_tlen
=msg_len
-(sizeof(struct ldp_msg_header
)-4); /* Type & Length fields not included */
655 /* did we capture enough for fully decoding the message ? */
656 ND_TCHECK_LEN(tptr
, msg_len
);
664 case LDP_MSG_KEEPALIVE
:
665 case LDP_MSG_ADDRESS
:
666 case LDP_MSG_LABEL_MAPPING
:
667 case LDP_MSG_ADDRESS_WITHDRAW
:
668 case LDP_MSG_LABEL_WITHDRAW
:
669 while(msg_tlen
>= 4) {
670 processed
= ldp_tlv_print(ndo
, msg_tptr
, msg_tlen
);
679 * FIXME those are the defined messages that lack a decoder
680 * you are welcome to contribute code ;-)
683 case LDP_MSG_LABEL_REQUEST
:
684 case LDP_MSG_LABEL_RELEASE
:
685 case LDP_MSG_LABEL_ABORT_REQUEST
:
688 if (ndo
->ndo_vflag
<= 1)
689 print_unknown_data(ndo
, msg_tptr
, "\n\t ", msg_tlen
);
692 /* do we want to see an additionally hexdump ? */
693 if (ndo
->ndo_vflag
> 1 || hexdump
==TRUE
)
694 print_unknown_data(ndo
, tptr
+sizeof(struct ldp_msg_header
), "\n\t ",