]> The Tcpdump Group git mirrors - tcpdump/blob - print-lmp.c
Merge pull request #667 from slavashw/master
[tcpdump] / print-lmp.c
1 /*
2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
12 *
13 * Original code by Hannes Gredler (hannes@gredler.at)
14 * Support for LMP service discovery extensions (defined by OIF UNI 1.0)
15 * added by Manu Pathak (mapathak@cisco.com), May 2005
16 */
17
18 /* \summary: Link Management Protocol (LMP) printer */
19
20 /* specification: RFC 4204 */
21 /* OIF UNI 1.0: http://www.oiforum.com/public/documents/OIF-UNI-01.0.pdf */
22
23 #ifdef HAVE_CONFIG_H
24 #include <config.h>
25 #endif
26
27 #include "netdissect-stdinc.h"
28
29 #include "netdissect.h"
30 #include "extract.h"
31 #include "addrtoname.h"
32 #include "gmpls.h"
33
34 static const char tstr[] = " [|lmp]";
35
36 /*
37 * LMP common header
38 *
39 * 0 1 2 3
40 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
41 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
42 * | Vers | (Reserved) | Flags | Msg Type |
43 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
44 * | LMP Length | (Reserved) |
45 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
46 */
47
48 struct lmp_common_header {
49 nd_uint16_t version_res;
50 nd_uint8_t flags;
51 nd_uint8_t msg_type;
52 nd_uint16_t length;
53 nd_byte reserved[2];
54 };
55
56 #define LMP_VERSION 1
57 #define LMP_EXTRACT_VERSION(x) (((x)&0xf000)>>12)
58
59 static const struct tok lmp_header_flag_values[] = {
60 { 0x01, "Control Channel Down"},
61 { 0x02, "LMP restart"},
62 { 0, NULL}
63 };
64
65 static const struct tok lmp_obj_te_link_flag_values[] = {
66 { 0x01, "Fault Management Supported"},
67 { 0x02, "Link Verification Supported"},
68 { 0, NULL}
69 };
70
71 static const struct tok lmp_obj_data_link_flag_values[] = {
72 { 0x01, "Data Link Port"},
73 { 0x02, "Allocated for user traffic"},
74 { 0x04, "Failed link"},
75 { 0, NULL}
76 };
77
78 static const struct tok lmp_obj_channel_status_values[] = {
79 { 1, "Signal Okay"},
80 { 2, "Signal Degraded"},
81 { 3, "Signal Fail"},
82 { 0, NULL}
83 };
84
85 static const struct tok lmp_obj_begin_verify_flag_values[] = {
86 { 0x0001, "Verify all links"},
87 { 0x0002, "Data link type"},
88 { 0, NULL}
89 };
90
91 static const struct tok lmp_obj_begin_verify_error_values[] = {
92 { 0x01, "Link Verification Procedure Not supported"},
93 { 0x02, "Unwilling to verify"},
94 { 0x04, "Unsupported verification transport mechanism"},
95 { 0x08, "Link-Id configuration error"},
96 { 0x10, "Unknown object c-type"},
97 { 0, NULL}
98 };
99
100 static const struct tok lmp_obj_link_summary_error_values[] = {
101 { 0x01, "Unacceptable non-negotiable LINK-SUMMARY parameters"},
102 { 0x02, "Renegotiate LINK-SUMMARY parameters"},
103 { 0x04, "Invalid TE-LINK Object"},
104 { 0x08, "Invalid DATA-LINK Object"},
105 { 0x10, "Unknown TE-LINK Object c-type"},
106 { 0x20, "Unknown DATA-LINK Object c-type"},
107 { 0, NULL}
108 };
109
110 /* Service Config Supported Protocols Flags */
111 static const struct tok lmp_obj_service_config_sp_flag_values[] = {
112 { 0x01, "RSVP Supported"},
113 { 0x02, "LDP Supported"},
114 { 0, NULL}
115 };
116
117 /* Service Config Client Port Service Attribute Transparency Flags */
118 static const struct tok lmp_obj_service_config_cpsa_tp_flag_values[] = {
119 { 0x01, "Path/VC Overhead Transparency Supported"},
120 { 0x02, "Line/MS Overhead Transparency Supported"},
121 { 0x04, "Section/RS Overhead Transparency Supported"},
122 { 0, NULL}
123 };
124
125 /* Service Config Client Port Service Attribute Contiguous Concatenation Types Flags */
126 static const struct tok lmp_obj_service_config_cpsa_cct_flag_values[] = {
127 { 0x01, "Contiguous Concatenation Types Supported"},
128 { 0, NULL}
129 };
130
131 /* Service Config Network Service Attributes Transparency Flags */
132 static const struct tok lmp_obj_service_config_nsa_transparency_flag_values[] = {
133 { 0x01, "Standard SOH/RSOH Transparency Supported"},
134 { 0x02, "Standard LOH/MSOH Transparency Supported"},
135 { 0, NULL}
136 };
137
138 /* Service Config Network Service Attributes TCM Monitoring Flags */
139 static const struct tok lmp_obj_service_config_nsa_tcm_flag_values[] = {
140 { 0x01, "Transparent Tandem Connection Monitoring Supported"},
141 { 0, NULL}
142 };
143
144 /* Network Service Attributes Network Diversity Flags */
145 static const struct tok lmp_obj_service_config_nsa_network_diversity_flag_values[] = {
146 { 0x01, "Node Diversity Supported"},
147 { 0x02, "Link Diversity Supported"},
148 { 0x04, "SRLG Diversity Supported"},
149 { 0, NULL}
150 };
151
152 #define LMP_MSGTYPE_CONFIG 1
153 #define LMP_MSGTYPE_CONFIG_ACK 2
154 #define LMP_MSGTYPE_CONFIG_NACK 3
155 #define LMP_MSGTYPE_HELLO 4
156 #define LMP_MSGTYPE_VERIFY_BEGIN 5
157 #define LMP_MSGTYPE_VERIFY_BEGIN_ACK 6
158 #define LMP_MSGTYPE_VERIFY_BEGIN_NACK 7
159 #define LMP_MSGTYPE_VERIFY_END 8
160 #define LMP_MSGTYPE_VERIFY_END_ACK 9
161 #define LMP_MSGTYPE_TEST 10
162 #define LMP_MSGTYPE_TEST_STATUS_SUCCESS 11
163 #define LMP_MSGTYPE_TEST_STATUS_FAILURE 12
164 #define LMP_MSGTYPE_TEST_STATUS_ACK 13
165 #define LMP_MSGTYPE_LINK_SUMMARY 14
166 #define LMP_MSGTYPE_LINK_SUMMARY_ACK 15
167 #define LMP_MSGTYPE_LINK_SUMMARY_NACK 16
168 #define LMP_MSGTYPE_CHANNEL_STATUS 17
169 #define LMP_MSGTYPE_CHANNEL_STATUS_ACK 18
170 #define LMP_MSGTYPE_CHANNEL_STATUS_REQ 19
171 #define LMP_MSGTYPE_CHANNEL_STATUS_RESP 20
172 /* LMP Service Discovery message types defined by UNI 1.0 */
173 #define LMP_MSGTYPE_SERVICE_CONFIG 50
174 #define LMP_MSGTYPE_SERVICE_CONFIG_ACK 51
175 #define LMP_MSGTYPE_SERVICE_CONFIG_NACK 52
176
177 static const struct tok lmp_msg_type_values[] = {
178 { LMP_MSGTYPE_CONFIG, "Config"},
179 { LMP_MSGTYPE_CONFIG_ACK, "Config ACK"},
180 { LMP_MSGTYPE_CONFIG_NACK, "Config NACK"},
181 { LMP_MSGTYPE_HELLO, "Hello"},
182 { LMP_MSGTYPE_VERIFY_BEGIN, "Begin Verify"},
183 { LMP_MSGTYPE_VERIFY_BEGIN_ACK, "Begin Verify ACK"},
184 { LMP_MSGTYPE_VERIFY_BEGIN_NACK, "Begin Verify NACK"},
185 { LMP_MSGTYPE_VERIFY_END, "End Verify"},
186 { LMP_MSGTYPE_VERIFY_END_ACK, "End Verify ACK"},
187 { LMP_MSGTYPE_TEST, "Test"},
188 { LMP_MSGTYPE_TEST_STATUS_SUCCESS, "Test Status Success"},
189 { LMP_MSGTYPE_TEST_STATUS_FAILURE, "Test Status Failure"},
190 { LMP_MSGTYPE_TEST_STATUS_ACK, "Test Status ACK"},
191 { LMP_MSGTYPE_LINK_SUMMARY, "Link Summary"},
192 { LMP_MSGTYPE_LINK_SUMMARY_ACK, "Link Summary ACK"},
193 { LMP_MSGTYPE_LINK_SUMMARY_NACK, "Link Summary NACK"},
194 { LMP_MSGTYPE_CHANNEL_STATUS, "Channel Status"},
195 { LMP_MSGTYPE_CHANNEL_STATUS_ACK, "Channel Status ACK"},
196 { LMP_MSGTYPE_CHANNEL_STATUS_REQ, "Channel Status Request"},
197 { LMP_MSGTYPE_CHANNEL_STATUS_RESP, "Channel Status Response"},
198 { LMP_MSGTYPE_SERVICE_CONFIG, "Service Config"},
199 { LMP_MSGTYPE_SERVICE_CONFIG_ACK, "Service Config ACK"},
200 { LMP_MSGTYPE_SERVICE_CONFIG_NACK, "Service Config NACK"},
201 { 0, NULL}
202 };
203
204 /*
205 * LMP object header
206 *
207 * 0 1 2 3
208 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
209 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
210 * |N| C-Type | Class | Length |
211 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
212 * | |
213 * // (object contents) //
214 * | |
215 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
216 */
217
218 struct lmp_object_header {
219 nd_uint8_t ctype;
220 nd_uint8_t class_num;
221 nd_uint16_t length;
222 };
223
224 #define LMP_OBJ_CC_ID 1
225 #define LMP_OBJ_NODE_ID 2
226 #define LMP_OBJ_LINK_ID 3
227 #define LMP_OBJ_INTERFACE_ID 4
228 #define LMP_OBJ_MESSAGE_ID 5
229 #define LMP_OBJ_CONFIG 6
230 #define LMP_OBJ_HELLO 7
231 #define LMP_OBJ_VERIFY_BEGIN 8
232 #define LMP_OBJ_VERIFY_BEGIN_ACK 9
233 #define LMP_OBJ_VERIFY_ID 10
234 #define LMP_OBJ_TE_LINK 11
235 #define LMP_OBJ_DATA_LINK 12
236 #define LMP_OBJ_CHANNEL_STATUS 13
237 #define LMP_OBJ_CHANNEL_STATUS_REQ 14
238 #define LMP_OBJ_ERROR_CODE 20
239
240 #define LMP_OBJ_SERVICE_CONFIG 51 /* defined in UNI 1.0 */
241
242 static const struct tok lmp_obj_values[] = {
243 { LMP_OBJ_CC_ID, "Control Channel ID" },
244 { LMP_OBJ_NODE_ID, "Node ID" },
245 { LMP_OBJ_LINK_ID, "Link ID" },
246 { LMP_OBJ_INTERFACE_ID, "Interface ID" },
247 { LMP_OBJ_MESSAGE_ID, "Message ID" },
248 { LMP_OBJ_CONFIG, "Configuration" },
249 { LMP_OBJ_HELLO, "Hello" },
250 { LMP_OBJ_VERIFY_BEGIN, "Verify Begin" },
251 { LMP_OBJ_VERIFY_BEGIN_ACK, "Verify Begin ACK" },
252 { LMP_OBJ_VERIFY_ID, "Verify ID" },
253 { LMP_OBJ_TE_LINK, "TE Link" },
254 { LMP_OBJ_DATA_LINK, "Data Link" },
255 { LMP_OBJ_CHANNEL_STATUS, "Channel Status" },
256 { LMP_OBJ_CHANNEL_STATUS_REQ, "Channel Status Request" },
257 { LMP_OBJ_ERROR_CODE, "Error Code" },
258 { LMP_OBJ_SERVICE_CONFIG, "Service Config" },
259
260 { 0, NULL}
261 };
262
263 #define INT_SWITCHING_TYPE_SUBOBJ 1
264 #define WAVELENGTH_SUBOBJ 2
265
266 static const struct tok lmp_data_link_subobj[] = {
267 { INT_SWITCHING_TYPE_SUBOBJ, "Interface Switching Type" },
268 { WAVELENGTH_SUBOBJ , "Wavelength" },
269 { 0, NULL}
270 };
271
272 #define LMP_CTYPE_IPV4 1
273 #define LMP_CTYPE_IPV6 2
274
275 #define LMP_CTYPE_LOC 1
276 #define LMP_CTYPE_RMT 2
277 #define LMP_CTYPE_UNMD 3
278
279 #define LMP_CTYPE_IPV4_LOC 1
280 #define LMP_CTYPE_IPV4_RMT 2
281 #define LMP_CTYPE_IPV6_LOC 3
282 #define LMP_CTYPE_IPV6_RMT 4
283 #define LMP_CTYPE_UNMD_LOC 5
284 #define LMP_CTYPE_UNMD_RMT 6
285
286 #define LMP_CTYPE_1 1
287 #define LMP_CTYPE_2 2
288
289 #define LMP_CTYPE_HELLO_CONFIG 1
290 #define LMP_CTYPE_HELLO 1
291
292 #define LMP_CTYPE_BEGIN_VERIFY_ERROR 1
293 #define LMP_CTYPE_LINK_SUMMARY_ERROR 2
294
295 /* C-Types for Service Config Object */
296 #define LMP_CTYPE_SERVICE_CONFIG_SP 1
297 #define LMP_CTYPE_SERVICE_CONFIG_CPSA 2
298 #define LMP_CTYPE_SERVICE_CONFIG_TRANSPARENCY_TCM 3
299 #define LMP_CTYPE_SERVICE_CONFIG_NETWORK_DIVERSITY 4
300
301 /*
302 * Different link types allowed in the Client Port Service Attributes
303 * subobject defined for LMP Service Discovery in the UNI 1.0 spec
304 */
305 #define LMP_SD_SERVICE_CONFIG_CPSA_LINK_TYPE_SDH 5 /* UNI 1.0 Sec 9.4.2 */
306 #define LMP_SD_SERVICE_CONFIG_CPSA_LINK_TYPE_SONET 6 /* UNI 1.0 Sec 9.4.2 */
307
308 /*
309 * the ctypes are not globally unique so for
310 * translating it to strings we build a table based
311 * on objects offsetted by the ctype
312 */
313
314 static const struct tok lmp_ctype_values[] = {
315 { 256*LMP_OBJ_CC_ID+LMP_CTYPE_LOC, "Local" },
316 { 256*LMP_OBJ_CC_ID+LMP_CTYPE_RMT, "Remote" },
317 { 256*LMP_OBJ_NODE_ID+LMP_CTYPE_LOC, "Local" },
318 { 256*LMP_OBJ_NODE_ID+LMP_CTYPE_RMT, "Remote" },
319 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_IPV4_LOC, "IPv4 Local" },
320 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_IPV4_RMT, "IPv4 Remote" },
321 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_IPV6_LOC, "IPv6 Local" },
322 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_IPV6_RMT, "IPv6 Remote" },
323 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_UNMD_LOC, "Unnumbered Local" },
324 { 256*LMP_OBJ_LINK_ID+LMP_CTYPE_UNMD_RMT, "Unnumbered Remote" },
325 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_IPV4_LOC, "IPv4 Local" },
326 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_IPV4_RMT, "IPv4 Remote" },
327 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_IPV6_LOC, "IPv6 Local" },
328 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_IPV6_RMT, "IPv6 Remote" },
329 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_UNMD_LOC, "Unnumbered Local" },
330 { 256*LMP_OBJ_INTERFACE_ID+LMP_CTYPE_UNMD_RMT, "Unnumbered Remote" },
331 { 256*LMP_OBJ_MESSAGE_ID+LMP_CTYPE_1, "1" },
332 { 256*LMP_OBJ_MESSAGE_ID+LMP_CTYPE_2, "2" },
333 { 256*LMP_OBJ_CONFIG+LMP_CTYPE_1, "1" },
334 { 256*LMP_OBJ_HELLO+LMP_CTYPE_1, "1" },
335 { 256*LMP_OBJ_VERIFY_BEGIN+LMP_CTYPE_1, "1" },
336 { 256*LMP_OBJ_VERIFY_BEGIN_ACK+LMP_CTYPE_1, "1" },
337 { 256*LMP_OBJ_VERIFY_ID+LMP_CTYPE_1, "1" },
338 { 256*LMP_OBJ_TE_LINK+LMP_CTYPE_IPV4, "IPv4" },
339 { 256*LMP_OBJ_TE_LINK+LMP_CTYPE_IPV6, "IPv6" },
340 { 256*LMP_OBJ_TE_LINK+LMP_CTYPE_UNMD, "Unnumbered" },
341 { 256*LMP_OBJ_DATA_LINK+LMP_CTYPE_IPV4, "IPv4" },
342 { 256*LMP_OBJ_DATA_LINK+LMP_CTYPE_IPV6, "IPv6" },
343 { 256*LMP_OBJ_DATA_LINK+LMP_CTYPE_UNMD, "Unnumbered" },
344 { 256*LMP_OBJ_CHANNEL_STATUS+LMP_CTYPE_IPV4, "IPv4" },
345 { 256*LMP_OBJ_CHANNEL_STATUS+LMP_CTYPE_IPV6, "IPv6" },
346 { 256*LMP_OBJ_CHANNEL_STATUS+LMP_CTYPE_UNMD, "Unnumbered" },
347 { 256*LMP_OBJ_CHANNEL_STATUS_REQ+LMP_CTYPE_IPV4, "IPv4" },
348 { 256*LMP_OBJ_CHANNEL_STATUS_REQ+LMP_CTYPE_IPV6, "IPv6" },
349 { 256*LMP_OBJ_CHANNEL_STATUS_REQ+LMP_CTYPE_UNMD, "Unnumbered" },
350 { 256*LMP_OBJ_ERROR_CODE+LMP_CTYPE_1, "1" },
351 { 256*LMP_OBJ_ERROR_CODE+LMP_CTYPE_2, "2" },
352 { 256*LMP_OBJ_SERVICE_CONFIG+LMP_CTYPE_SERVICE_CONFIG_SP, "1" },
353 { 256*LMP_OBJ_SERVICE_CONFIG+LMP_CTYPE_SERVICE_CONFIG_CPSA, "2" },
354 { 256*LMP_OBJ_SERVICE_CONFIG+LMP_CTYPE_SERVICE_CONFIG_TRANSPARENCY_TCM, "3" },
355 { 256*LMP_OBJ_SERVICE_CONFIG+LMP_CTYPE_SERVICE_CONFIG_NETWORK_DIVERSITY, "4" },
356 { 0, NULL}
357 };
358
359 static int
360 lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr,
361 int total_subobj_len, int offset)
362 {
363 int hexdump = FALSE;
364 int subobj_type, subobj_len;
365
366 union { /* int to float conversion buffer */
367 float f;
368 uint32_t i;
369 } bw;
370
371 while (total_subobj_len > 0 && hexdump == FALSE ) {
372 subobj_type = EXTRACT_U_1(obj_tptr + offset);
373 subobj_len = EXTRACT_U_1(obj_tptr + offset + 1);
374 ND_PRINT("\n\t Subobject, Type: %s (%u), Length: %u",
375 tok2str(lmp_data_link_subobj,
376 "Unknown",
377 subobj_type),
378 subobj_type,
379 subobj_len);
380 if (subobj_len < 4) {
381 ND_PRINT(" (too short)");
382 break;
383 }
384 if ((subobj_len % 4) != 0) {
385 ND_PRINT(" (not a multiple of 4)");
386 break;
387 }
388 if (total_subobj_len < subobj_len) {
389 ND_PRINT(" (goes past the end of the object)");
390 break;
391 }
392 switch(subobj_type) {
393 case INT_SWITCHING_TYPE_SUBOBJ:
394 ND_PRINT("\n\t Switching Type: %s (%u)",
395 tok2str(gmpls_switch_cap_values,
396 "Unknown",
397 EXTRACT_U_1(obj_tptr + offset + 2)),
398 EXTRACT_U_1(obj_tptr + offset + 2));
399 ND_PRINT("\n\t Encoding Type: %s (%u)",
400 tok2str(gmpls_encoding_values,
401 "Unknown",
402 EXTRACT_U_1(obj_tptr + offset + 3)),
403 EXTRACT_U_1(obj_tptr + offset + 3));
404 bw.i = EXTRACT_BE_U_4(obj_tptr + offset + 4);
405 ND_PRINT("\n\t Min Reservable Bandwidth: %.3f Mbps",
406 bw.f*8/1000000);
407 bw.i = EXTRACT_BE_U_4(obj_tptr + offset + 8);
408 ND_PRINT("\n\t Max Reservable Bandwidth: %.3f Mbps",
409 bw.f*8/1000000);
410 break;
411 case WAVELENGTH_SUBOBJ:
412 ND_PRINT("\n\t Wavelength: %u",
413 EXTRACT_BE_U_4(obj_tptr + offset + 4));
414 break;
415 default:
416 /* Any Unknown Subobject ==> Exit loop */
417 hexdump=TRUE;
418 break;
419 }
420 total_subobj_len-=subobj_len;
421 offset+=subobj_len;
422 }
423 return (hexdump);
424 }
425
426 void
427 lmp_print(netdissect_options *ndo,
428 const u_char *pptr, u_int len)
429 {
430 const struct lmp_common_header *lmp_com_header;
431 const struct lmp_object_header *lmp_obj_header;
432 const u_char *tptr,*obj_tptr;
433 u_int version_res, tlen, lmp_obj_len, lmp_obj_ctype, obj_tlen;
434 int hexdump;
435 u_int offset;
436 u_int link_type;
437
438 union { /* int to float conversion buffer */
439 float f;
440 uint32_t i;
441 } bw;
442
443 ndo->ndo_protocol = "lmp";
444 tptr=pptr;
445 lmp_com_header = (const struct lmp_common_header *)pptr;
446 ND_TCHECK_SIZE(lmp_com_header);
447
448 version_res = EXTRACT_BE_U_2(lmp_com_header->version_res);
449
450 /*
451 * Sanity checking of the header.
452 */
453 if (LMP_EXTRACT_VERSION(version_res) != LMP_VERSION) {
454 ND_PRINT("LMP version %u packet not supported",
455 LMP_EXTRACT_VERSION(version_res));
456 return;
457 }
458
459 /* in non-verbose mode just lets print the basic Message Type*/
460 if (ndo->ndo_vflag < 1) {
461 ND_PRINT("LMPv%u %s Message, length: %u",
462 LMP_EXTRACT_VERSION(version_res),
463 tok2str(lmp_msg_type_values, "unknown (%u)",EXTRACT_U_1(lmp_com_header->msg_type)),
464 len);
465 return;
466 }
467
468 /* ok they seem to want to know everything - lets fully decode it */
469
470 tlen=EXTRACT_BE_U_2(lmp_com_header->length);
471
472 ND_PRINT("\n\tLMPv%u, msg-type: %s, Flags: [%s], length: %u",
473 LMP_EXTRACT_VERSION(version_res),
474 tok2str(lmp_msg_type_values, "unknown, type: %u",EXTRACT_U_1(lmp_com_header->msg_type)),
475 bittok2str(lmp_header_flag_values,"none",EXTRACT_U_1(lmp_com_header->flags)),
476 tlen);
477 if (tlen < sizeof(struct lmp_common_header)) {
478 ND_PRINT(" (too short)");
479 return;
480 }
481 if (tlen > len) {
482 ND_PRINT(" (too long)");
483 tlen = len;
484 }
485
486 tptr+=sizeof(struct lmp_common_header);
487 tlen-=sizeof(struct lmp_common_header);
488
489 while(tlen>0) {
490 /* did we capture enough for fully decoding the object header ? */
491 ND_TCHECK_LEN(tptr, sizeof(struct lmp_object_header));
492
493 lmp_obj_header = (const struct lmp_object_header *)tptr;
494 lmp_obj_len=EXTRACT_BE_U_2(lmp_obj_header->length);
495 lmp_obj_ctype=EXTRACT_U_1(lmp_obj_header->ctype)&0x7f;
496
497 ND_PRINT("\n\t %s Object (%u), Class-Type: %s (%u) Flags: [%snegotiable], length: %u",
498 tok2str(lmp_obj_values,
499 "Unknown",
500 EXTRACT_U_1(lmp_obj_header->class_num)),
501 EXTRACT_U_1(lmp_obj_header->class_num),
502 tok2str(lmp_ctype_values,
503 "Unknown",
504 (EXTRACT_U_1(lmp_obj_header->class_num)<<8)+lmp_obj_ctype),
505 lmp_obj_ctype,
506 EXTRACT_U_1(lmp_obj_header->ctype)&0x80 ? "" : "non-",
507 lmp_obj_len);
508
509 if (lmp_obj_len < 4) {
510 ND_PRINT(" (too short)");
511 return;
512 }
513 if ((lmp_obj_len % 4) != 0) {
514 ND_PRINT(" (not a multiple of 4)");
515 return;
516 }
517
518 obj_tptr=tptr+sizeof(struct lmp_object_header);
519 obj_tlen=lmp_obj_len-sizeof(struct lmp_object_header);
520
521 /* did we capture enough for fully decoding the object ? */
522 ND_TCHECK_LEN(tptr, lmp_obj_len);
523 hexdump=FALSE;
524
525 switch(EXTRACT_U_1(lmp_obj_header->class_num)) {
526
527 case LMP_OBJ_CC_ID:
528 switch(lmp_obj_ctype) {
529 case LMP_CTYPE_LOC:
530 case LMP_CTYPE_RMT:
531 if (obj_tlen != 4) {
532 ND_PRINT(" (not correct for object)");
533 break;
534 }
535 ND_PRINT("\n\t Control Channel ID: %u (0x%08x)",
536 EXTRACT_BE_U_4(obj_tptr),
537 EXTRACT_BE_U_4(obj_tptr));
538 break;
539
540 default:
541 hexdump=TRUE;
542 }
543 break;
544
545 case LMP_OBJ_LINK_ID:
546 case LMP_OBJ_INTERFACE_ID:
547 switch(lmp_obj_ctype) {
548 case LMP_CTYPE_IPV4_LOC:
549 case LMP_CTYPE_IPV4_RMT:
550 if (obj_tlen != 4) {
551 ND_PRINT(" (not correct for object)");
552 break;
553 }
554 ND_PRINT("\n\t IPv4 Link ID: %s (0x%08x)",
555 ipaddr_string(ndo, obj_tptr),
556 EXTRACT_BE_U_4(obj_tptr));
557 break;
558 case LMP_CTYPE_IPV6_LOC:
559 case LMP_CTYPE_IPV6_RMT:
560 if (obj_tlen != 16) {
561 ND_PRINT(" (not correct for object)");
562 break;
563 }
564 ND_PRINT("\n\t IPv6 Link ID: %s (0x%08x)",
565 ip6addr_string(ndo, obj_tptr),
566 EXTRACT_BE_U_4(obj_tptr));
567 break;
568 case LMP_CTYPE_UNMD_LOC:
569 case LMP_CTYPE_UNMD_RMT:
570 if (obj_tlen != 4) {
571 ND_PRINT(" (not correct for object)");
572 break;
573 }
574 ND_PRINT("\n\t Link ID: %u (0x%08x)",
575 EXTRACT_BE_U_4(obj_tptr),
576 EXTRACT_BE_U_4(obj_tptr));
577 break;
578 default:
579 hexdump=TRUE;
580 }
581 break;
582
583 case LMP_OBJ_MESSAGE_ID:
584 switch(lmp_obj_ctype) {
585 case LMP_CTYPE_1:
586 if (obj_tlen != 4) {
587 ND_PRINT(" (not correct for object)");
588 break;
589 }
590 ND_PRINT("\n\t Message ID: %u (0x%08x)",
591 EXTRACT_BE_U_4(obj_tptr),
592 EXTRACT_BE_U_4(obj_tptr));
593 break;
594 case LMP_CTYPE_2:
595 if (obj_tlen != 4) {
596 ND_PRINT(" (not correct for object)");
597 break;
598 }
599 ND_PRINT("\n\t Message ID Ack: %u (0x%08x)",
600 EXTRACT_BE_U_4(obj_tptr),
601 EXTRACT_BE_U_4(obj_tptr));
602 break;
603 default:
604 hexdump=TRUE;
605 }
606 break;
607
608 case LMP_OBJ_NODE_ID:
609 switch(lmp_obj_ctype) {
610 case LMP_CTYPE_LOC:
611 case LMP_CTYPE_RMT:
612 if (obj_tlen != 4) {
613 ND_PRINT(" (not correct for object)");
614 break;
615 }
616 ND_PRINT("\n\t Node ID: %s (0x%08x)",
617 ipaddr_string(ndo, obj_tptr),
618 EXTRACT_BE_U_4(obj_tptr));
619 break;
620
621 default:
622 hexdump=TRUE;
623 }
624 break;
625
626 case LMP_OBJ_CONFIG:
627 switch(lmp_obj_ctype) {
628 case LMP_CTYPE_HELLO_CONFIG:
629 if (obj_tlen != 4) {
630 ND_PRINT(" (not correct for object)");
631 break;
632 }
633 ND_PRINT("\n\t Hello Interval: %u\n\t Hello Dead Interval: %u",
634 EXTRACT_BE_U_2(obj_tptr),
635 EXTRACT_BE_U_2(obj_tptr + 2));
636 break;
637
638 default:
639 hexdump=TRUE;
640 }
641 break;
642
643 case LMP_OBJ_HELLO:
644 switch(lmp_obj_ctype) {
645 case LMP_CTYPE_HELLO:
646 if (obj_tlen != 8) {
647 ND_PRINT(" (not correct for object)");
648 break;
649 }
650 ND_PRINT("\n\t Tx Seq: %u, Rx Seq: %u",
651 EXTRACT_BE_U_4(obj_tptr),
652 EXTRACT_BE_U_4(obj_tptr + 4));
653 break;
654
655 default:
656 hexdump=TRUE;
657 }
658 break;
659
660 case LMP_OBJ_TE_LINK:
661 switch(lmp_obj_ctype) {
662 case LMP_CTYPE_IPV4:
663 if (obj_tlen != 12) {
664 ND_PRINT(" (not correct for object)");
665 break;
666 }
667 ND_PRINT("\n\t Flags: [%s]",
668 bittok2str(lmp_obj_te_link_flag_values,
669 "none",
670 EXTRACT_U_1(obj_tptr)));
671
672 ND_PRINT("\n\t Local Link-ID: %s (0x%08x)"
673 "\n\t Remote Link-ID: %s (0x%08x)",
674 ipaddr_string(ndo, obj_tptr+4),
675 EXTRACT_BE_U_4(obj_tptr + 4),
676 ipaddr_string(ndo, obj_tptr+8),
677 EXTRACT_BE_U_4(obj_tptr + 8));
678 break;
679
680 case LMP_CTYPE_IPV6:
681 if (obj_tlen != 36) {
682 ND_PRINT(" (not correct for object)");
683 break;
684 }
685 ND_PRINT("\n\t Flags: [%s]",
686 bittok2str(lmp_obj_te_link_flag_values,
687 "none",
688 EXTRACT_U_1(obj_tptr)));
689
690 ND_PRINT("\n\t Local Link-ID: %s (0x%08x)"
691 "\n\t Remote Link-ID: %s (0x%08x)",
692 ip6addr_string(ndo, obj_tptr+4),
693 EXTRACT_BE_U_4(obj_tptr + 4),
694 ip6addr_string(ndo, obj_tptr+20),
695 EXTRACT_BE_U_4(obj_tptr + 20));
696 break;
697
698 case LMP_CTYPE_UNMD:
699 if (obj_tlen != 12) {
700 ND_PRINT(" (not correct for object)");
701 break;
702 }
703 ND_PRINT("\n\t Flags: [%s]",
704 bittok2str(lmp_obj_te_link_flag_values,
705 "none",
706 EXTRACT_U_1(obj_tptr)));
707
708 ND_PRINT("\n\t Local Link-ID: %u (0x%08x)"
709 "\n\t Remote Link-ID: %u (0x%08x)",
710 EXTRACT_BE_U_4(obj_tptr + 4),
711 EXTRACT_BE_U_4(obj_tptr + 4),
712 EXTRACT_BE_U_4(obj_tptr + 8),
713 EXTRACT_BE_U_4(obj_tptr + 8));
714 break;
715
716 default:
717 hexdump=TRUE;
718 }
719 break;
720
721 case LMP_OBJ_DATA_LINK:
722 switch(lmp_obj_ctype) {
723 case LMP_CTYPE_IPV4:
724 if (obj_tlen < 12) {
725 ND_PRINT(" (not correct for object)");
726 break;
727 }
728 ND_PRINT("\n\t Flags: [%s]",
729 bittok2str(lmp_obj_data_link_flag_values,
730 "none",
731 EXTRACT_U_1(obj_tptr)));
732 ND_PRINT("\n\t Local Interface ID: %s (0x%08x)"
733 "\n\t Remote Interface ID: %s (0x%08x)",
734 ipaddr_string(ndo, obj_tptr+4),
735 EXTRACT_BE_U_4(obj_tptr + 4),
736 ipaddr_string(ndo, obj_tptr+8),
737 EXTRACT_BE_U_4(obj_tptr + 8));
738
739 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 12, 12))
740 hexdump=TRUE;
741 break;
742
743 case LMP_CTYPE_IPV6:
744 if (obj_tlen < 36) {
745 ND_PRINT(" (not correct for object)");
746 break;
747 }
748 ND_PRINT("\n\t Flags: [%s]",
749 bittok2str(lmp_obj_data_link_flag_values,
750 "none",
751 EXTRACT_U_1(obj_tptr)));
752 ND_PRINT("\n\t Local Interface ID: %s (0x%08x)"
753 "\n\t Remote Interface ID: %s (0x%08x)",
754 ip6addr_string(ndo, obj_tptr+4),
755 EXTRACT_BE_U_4(obj_tptr + 4),
756 ip6addr_string(ndo, obj_tptr+20),
757 EXTRACT_BE_U_4(obj_tptr + 20));
758
759 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 36, 36))
760 hexdump=TRUE;
761 break;
762
763 case LMP_CTYPE_UNMD:
764 if (obj_tlen < 12) {
765 ND_PRINT(" (not correct for object)");
766 break;
767 }
768 ND_PRINT("\n\t Flags: [%s]",
769 bittok2str(lmp_obj_data_link_flag_values,
770 "none",
771 EXTRACT_U_1(obj_tptr)));
772 ND_PRINT("\n\t Local Interface ID: %u (0x%08x)"
773 "\n\t Remote Interface ID: %u (0x%08x)",
774 EXTRACT_BE_U_4(obj_tptr + 4),
775 EXTRACT_BE_U_4(obj_tptr + 4),
776 EXTRACT_BE_U_4(obj_tptr + 8),
777 EXTRACT_BE_U_4(obj_tptr + 8));
778
779 if (lmp_print_data_link_subobjs(ndo, obj_tptr, obj_tlen - 12, 12))
780 hexdump=TRUE;
781 break;
782
783 default:
784 hexdump=TRUE;
785 }
786 break;
787
788 case LMP_OBJ_VERIFY_BEGIN:
789 switch(lmp_obj_ctype) {
790 case LMP_CTYPE_1:
791 if (obj_tlen != 20) {
792 ND_PRINT(" (not correct for object)");
793 break;
794 }
795 ND_PRINT("\n\t Flags: %s",
796 bittok2str(lmp_obj_begin_verify_flag_values,
797 "none",
798 EXTRACT_BE_U_2(obj_tptr)));
799 ND_PRINT("\n\t Verify Interval: %u",
800 EXTRACT_BE_U_2(obj_tptr + 2));
801 ND_PRINT("\n\t Data links: %u",
802 EXTRACT_BE_U_4(obj_tptr + 4));
803 ND_PRINT("\n\t Encoding type: %s",
804 tok2str(gmpls_encoding_values, "Unknown", EXTRACT_U_1((obj_tptr + 8))));
805 ND_PRINT("\n\t Verify Transport Mechanism: %u (0x%x)%s",
806 EXTRACT_BE_U_2(obj_tptr + 10),
807 EXTRACT_BE_U_2(obj_tptr + 10),
808 EXTRACT_BE_U_2(obj_tptr + 10)&8000 ? " (Payload test messages capable)" : "");
809 bw.i = EXTRACT_BE_U_4(obj_tptr + 12);
810 ND_PRINT("\n\t Transmission Rate: %.3f Mbps",bw.f*8/1000000);
811 ND_PRINT("\n\t Wavelength: %u",
812 EXTRACT_BE_U_4(obj_tptr + 16));
813 break;
814
815 default:
816 hexdump=TRUE;
817 }
818 break;
819
820 case LMP_OBJ_VERIFY_BEGIN_ACK:
821 switch(lmp_obj_ctype) {
822 case LMP_CTYPE_1:
823 if (obj_tlen != 4) {
824 ND_PRINT(" (not correct for object)");
825 break;
826 }
827 ND_PRINT("\n\t Verify Dead Interval: %u"
828 "\n\t Verify Transport Response: %u",
829 EXTRACT_BE_U_2(obj_tptr),
830 EXTRACT_BE_U_2(obj_tptr + 2));
831 break;
832
833 default:
834 hexdump=TRUE;
835 }
836 break;
837
838 case LMP_OBJ_VERIFY_ID:
839 switch(lmp_obj_ctype) {
840 case LMP_CTYPE_1:
841 if (obj_tlen != 4) {
842 ND_PRINT(" (not correct for object)");
843 break;
844 }
845 ND_PRINT("\n\t Verify ID: %u",
846 EXTRACT_BE_U_4(obj_tptr));
847 break;
848
849 default:
850 hexdump=TRUE;
851 }
852 break;
853
854 case LMP_OBJ_CHANNEL_STATUS:
855 switch(lmp_obj_ctype) {
856 case LMP_CTYPE_IPV4:
857 offset = 0;
858 /* Decode pairs: <Interface_ID (4 bytes), Channel_status (4 bytes)> */
859 while (offset+8 <= obj_tlen) {
860 ND_PRINT("\n\t Interface ID: %s (0x%08x)",
861 ipaddr_string(ndo, obj_tptr+offset),
862 EXTRACT_BE_U_4(obj_tptr + offset));
863
864 ND_PRINT("\n\t\t Active: %s (%u)",
865 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>31) ?
866 "Allocated" : "Non-allocated",
867 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>31));
868
869 ND_PRINT("\n\t\t Direction: %s (%u)",
870 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>30)&0x1 ?
871 "Transmit" : "Receive",
872 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>30)&0x1);
873
874 ND_PRINT("\n\t\t Channel Status: %s (%u)",
875 tok2str(lmp_obj_channel_status_values,
876 "Unknown",
877 EXTRACT_BE_U_4(obj_tptr + offset + 4)&0x3FFFFFF),
878 EXTRACT_BE_U_4(obj_tptr + offset + 4)&0x3FFFFFF);
879 offset+=8;
880 }
881 break;
882
883 case LMP_CTYPE_IPV6:
884 offset = 0;
885 /* Decode pairs: <Interface_ID (16 bytes), Channel_status (4 bytes)> */
886 while (offset+20 <= obj_tlen) {
887 ND_PRINT("\n\t Interface ID: %s (0x%08x)",
888 ip6addr_string(ndo, obj_tptr+offset),
889 EXTRACT_BE_U_4(obj_tptr + offset));
890
891 ND_PRINT("\n\t\t Active: %s (%u)",
892 (EXTRACT_BE_U_4(obj_tptr + offset + 16)>>31) ?
893 "Allocated" : "Non-allocated",
894 (EXTRACT_BE_U_4(obj_tptr + offset + 16)>>31));
895
896 ND_PRINT("\n\t\t Direction: %s (%u)",
897 (EXTRACT_BE_U_4(obj_tptr + offset + 16)>>30)&0x1 ?
898 "Transmit" : "Receive",
899 (EXTRACT_BE_U_4(obj_tptr + offset + 16)>>30)&0x1);
900
901 ND_PRINT("\n\t\t Channel Status: %s (%u)",
902 tok2str(lmp_obj_channel_status_values,
903 "Unknown",
904 EXTRACT_BE_U_4(obj_tptr + offset + 16)&0x3FFFFFF),
905 EXTRACT_BE_U_4(obj_tptr + offset + 16)&0x3FFFFFF);
906 offset+=20;
907 }
908 break;
909
910 case LMP_CTYPE_UNMD:
911 offset = 0;
912 /* Decode pairs: <Interface_ID (4 bytes), Channel_status (4 bytes)> */
913 while (offset+8 <= obj_tlen) {
914 ND_PRINT("\n\t Interface ID: %u (0x%08x)",
915 EXTRACT_BE_U_4(obj_tptr + offset),
916 EXTRACT_BE_U_4(obj_tptr + offset));
917
918 ND_PRINT("\n\t\t Active: %s (%u)",
919 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>31) ?
920 "Allocated" : "Non-allocated",
921 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>31));
922
923 ND_PRINT("\n\t\t Direction: %s (%u)",
924 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>30)&0x1 ?
925 "Transmit" : "Receive",
926 (EXTRACT_BE_U_4(obj_tptr + offset + 4)>>30)&0x1);
927
928 ND_PRINT("\n\t\t Channel Status: %s (%u)",
929 tok2str(lmp_obj_channel_status_values,
930 "Unknown",
931 EXTRACT_BE_U_4(obj_tptr + offset + 4)&0x3FFFFFF),
932 EXTRACT_BE_U_4(obj_tptr + offset + 4)&0x3FFFFFF);
933 offset+=8;
934 }
935 break;
936
937 default:
938 hexdump=TRUE;
939 }
940 break;
941
942 case LMP_OBJ_CHANNEL_STATUS_REQ:
943 switch(lmp_obj_ctype) {
944 case LMP_CTYPE_IPV4:
945 offset = 0;
946 while (offset+4 <= obj_tlen) {
947 ND_PRINT("\n\t Interface ID: %s (0x%08x)",
948 ipaddr_string(ndo, obj_tptr+offset),
949 EXTRACT_BE_U_4(obj_tptr + offset));
950 offset+=4;
951 }
952 break;
953
954 case LMP_CTYPE_IPV6:
955 offset = 0;
956 while (offset+16 <= obj_tlen) {
957 ND_PRINT("\n\t Interface ID: %s (0x%08x)",
958 ip6addr_string(ndo, obj_tptr+offset),
959 EXTRACT_BE_U_4(obj_tptr + offset));
960 offset+=16;
961 }
962 break;
963
964 case LMP_CTYPE_UNMD:
965 offset = 0;
966 while (offset+4 <= obj_tlen) {
967 ND_PRINT("\n\t Interface ID: %u (0x%08x)",
968 EXTRACT_BE_U_4(obj_tptr + offset),
969 EXTRACT_BE_U_4(obj_tptr + offset));
970 offset+=4;
971 }
972 break;
973
974 default:
975 hexdump=TRUE;
976 }
977 break;
978
979 case LMP_OBJ_ERROR_CODE:
980 switch(lmp_obj_ctype) {
981 case LMP_CTYPE_BEGIN_VERIFY_ERROR:
982 if (obj_tlen != 4) {
983 ND_PRINT(" (not correct for object)");
984 break;
985 }
986 ND_PRINT("\n\t Error Code: %s",
987 bittok2str(lmp_obj_begin_verify_error_values,
988 "none",
989 EXTRACT_BE_U_4(obj_tptr)));
990 break;
991
992 case LMP_CTYPE_LINK_SUMMARY_ERROR:
993 if (obj_tlen != 4) {
994 ND_PRINT(" (not correct for object)");
995 break;
996 }
997 ND_PRINT("\n\t Error Code: %s",
998 bittok2str(lmp_obj_link_summary_error_values,
999 "none",
1000 EXTRACT_BE_U_4(obj_tptr)));
1001 break;
1002 default:
1003 hexdump=TRUE;
1004 }
1005 break;
1006
1007 case LMP_OBJ_SERVICE_CONFIG:
1008 switch (lmp_obj_ctype) {
1009 case LMP_CTYPE_SERVICE_CONFIG_SP:
1010 if (obj_tlen != 4) {
1011 ND_PRINT(" (not correct for object)");
1012 break;
1013 }
1014 ND_PRINT("\n\t Flags: %s",
1015 bittok2str(lmp_obj_service_config_sp_flag_values,
1016 "none",
1017 EXTRACT_U_1(obj_tptr)));
1018
1019 ND_PRINT("\n\t UNI Version: %u",
1020 EXTRACT_U_1(obj_tptr + 1));
1021
1022 break;
1023
1024 case LMP_CTYPE_SERVICE_CONFIG_CPSA:
1025 if (obj_tlen != 16) {
1026 ND_PRINT(" (not correct for object)");
1027 break;
1028 }
1029
1030 link_type = EXTRACT_U_1(obj_tptr);
1031
1032 ND_PRINT("\n\t Link Type: %s (%u)",
1033 tok2str(lmp_sd_service_config_cpsa_link_type_values,
1034 "Unknown", link_type),
1035 link_type);
1036
1037 switch (link_type) {
1038 case LMP_SD_SERVICE_CONFIG_CPSA_LINK_TYPE_SDH:
1039 ND_PRINT("\n\t Signal Type: %s (%u)",
1040 tok2str(lmp_sd_service_config_cpsa_signal_type_sdh_values,
1041 "Unknown",
1042 EXTRACT_U_1(obj_tptr + 1)),
1043 EXTRACT_U_1(obj_tptr + 1));
1044 break;
1045
1046 case LMP_SD_SERVICE_CONFIG_CPSA_LINK_TYPE_SONET:
1047 ND_PRINT("\n\t Signal Type: %s (%u)",
1048 tok2str(lmp_sd_service_config_cpsa_signal_type_sonet_values,
1049 "Unknown",
1050 EXTRACT_U_1(obj_tptr + 1)),
1051 EXTRACT_U_1(obj_tptr + 1));
1052 break;
1053 }
1054
1055 ND_PRINT("\n\t Transparency: %s",
1056 bittok2str(lmp_obj_service_config_cpsa_tp_flag_values,
1057 "none",
1058 EXTRACT_U_1(obj_tptr + 2)));
1059
1060 ND_PRINT("\n\t Contiguous Concatenation Types: %s",
1061 bittok2str(lmp_obj_service_config_cpsa_cct_flag_values,
1062 "none",
1063 EXTRACT_U_1(obj_tptr + 3)));
1064
1065 ND_PRINT("\n\t Minimum NCC: %u",
1066 EXTRACT_BE_U_2(obj_tptr + 4));
1067
1068 ND_PRINT("\n\t Maximum NCC: %u",
1069 EXTRACT_BE_U_2(obj_tptr + 6));
1070
1071 ND_PRINT("\n\t Minimum NVC:%u",
1072 EXTRACT_BE_U_2(obj_tptr + 8));
1073
1074 ND_PRINT("\n\t Maximum NVC:%u",
1075 EXTRACT_BE_U_2(obj_tptr + 10));
1076
1077 ND_PRINT("\n\t Local Interface ID: %s (0x%08x)",
1078 ipaddr_string(ndo, obj_tptr+12),
1079 EXTRACT_BE_U_4(obj_tptr + 12));
1080
1081 break;
1082
1083 case LMP_CTYPE_SERVICE_CONFIG_TRANSPARENCY_TCM:
1084 if (obj_tlen != 8) {
1085 ND_PRINT(" (not correct for object)");
1086 break;
1087 }
1088
1089 ND_PRINT("\n\t Transparency Flags: %s",
1090 bittok2str(
1091 lmp_obj_service_config_nsa_transparency_flag_values,
1092 "none",
1093 EXTRACT_BE_U_4(obj_tptr)));
1094
1095 ND_PRINT("\n\t TCM Monitoring Flags: %s",
1096 bittok2str(
1097 lmp_obj_service_config_nsa_tcm_flag_values,
1098 "none",
1099 EXTRACT_U_1(obj_tptr + 7)));
1100
1101 break;
1102
1103 case LMP_CTYPE_SERVICE_CONFIG_NETWORK_DIVERSITY:
1104 if (obj_tlen != 4) {
1105 ND_PRINT(" (not correct for object)");
1106 break;
1107 }
1108
1109 ND_PRINT("\n\t Diversity: Flags: %s",
1110 bittok2str(
1111 lmp_obj_service_config_nsa_network_diversity_flag_values,
1112 "none",
1113 EXTRACT_U_1(obj_tptr + 3)));
1114 break;
1115
1116 default:
1117 hexdump = TRUE;
1118 }
1119
1120 break;
1121
1122 default:
1123 if (ndo->ndo_vflag <= 1)
1124 print_unknown_data(ndo,obj_tptr,"\n\t ",obj_tlen);
1125 break;
1126 }
1127 /* do we want to see an additionally hexdump ? */
1128 if (ndo->ndo_vflag > 1 || hexdump==TRUE)
1129 print_unknown_data(ndo,tptr+sizeof(struct lmp_object_header),"\n\t ",
1130 lmp_obj_len-sizeof(struct lmp_object_header));
1131
1132 tptr+=lmp_obj_len;
1133 tlen-=lmp_obj_len;
1134 }
1135 return;
1136 trunc:
1137 ND_PRINT("%s", tstr);
1138 }