2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
13 * Original code by Hannes Gredler (hannes@juniper.net)
14 * and Steinar Haug (sthaug@nethelp.no)
21 #include <netdissect-stdinc.h>
23 #include "netdissect.h"
25 #include "addrtoname.h"
34 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
35 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
36 * | Version | PDU Length |
37 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
39 * + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
41 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
45 struct ldp_common_header
{
47 uint8_t pdu_length
[2];
49 uint8_t label_space
[2];
58 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
59 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
60 * |U| Message Type | Message Length |
61 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
63 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
66 * | Mandatory Parameters |
69 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
72 * | Optional Parameters |
75 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
78 struct ldp_msg_header
{
84 #define LDP_MASK_MSG_TYPE(x) ((x)&0x7fff)
85 #define LDP_MASK_U_BIT(x) ((x)&0x8000)
87 #define LDP_MSG_NOTIF 0x0001
88 #define LDP_MSG_HELLO 0x0100
89 #define LDP_MSG_INIT 0x0200
90 #define LDP_MSG_KEEPALIVE 0x0201
91 #define LDP_MSG_ADDRESS 0x0300
92 #define LDP_MSG_ADDRESS_WITHDRAW 0x0301
93 #define LDP_MSG_LABEL_MAPPING 0x0400
94 #define LDP_MSG_LABEL_REQUEST 0x0401
95 #define LDP_MSG_LABEL_WITHDRAW 0x0402
96 #define LDP_MSG_LABEL_RELEASE 0x0403
97 #define LDP_MSG_LABEL_ABORT_REQUEST 0x0404
99 #define LDP_VENDOR_PRIVATE_MIN 0x3e00
100 #define LDP_VENDOR_PRIVATE_MAX 0x3eff
101 #define LDP_EXPERIMENTAL_MIN 0x3f00
102 #define LDP_EXPERIMENTAL_MAX 0x3fff
104 static const struct tok ldp_msg_values
[] = {
105 { LDP_MSG_NOTIF
, "Notification" },
106 { LDP_MSG_HELLO
, "Hello" },
107 { LDP_MSG_INIT
, "Initialization" },
108 { LDP_MSG_KEEPALIVE
, "Keepalive" },
109 { LDP_MSG_ADDRESS
, "Address" },
110 { LDP_MSG_ADDRESS_WITHDRAW
, "Address Withdraw" },
111 { LDP_MSG_LABEL_MAPPING
, "Label Mapping" },
112 { LDP_MSG_LABEL_REQUEST
, "Label Request" },
113 { LDP_MSG_LABEL_WITHDRAW
, "Label Withdraw" },
114 { LDP_MSG_LABEL_RELEASE
, "Label Release" },
115 { LDP_MSG_LABEL_ABORT_REQUEST
, "Label Abort Request" },
119 #define LDP_MASK_TLV_TYPE(x) ((x)&0x3fff)
120 #define LDP_MASK_F_BIT(x) ((x)&0x4000)
122 #define LDP_TLV_FEC 0x0100
123 #define LDP_TLV_ADDRESS_LIST 0x0101
124 #define LDP_TLV_ADDRESS_LIST_AFNUM_LEN 2
125 #define LDP_TLV_HOP_COUNT 0x0103
126 #define LDP_TLV_PATH_VECTOR 0x0104
127 #define LDP_TLV_GENERIC_LABEL 0x0200
128 #define LDP_TLV_ATM_LABEL 0x0201
129 #define LDP_TLV_FR_LABEL 0x0202
130 #define LDP_TLV_STATUS 0x0300
131 #define LDP_TLV_EXTD_STATUS 0x0301
132 #define LDP_TLV_RETURNED_PDU 0x0302
133 #define LDP_TLV_RETURNED_MSG 0x0303
134 #define LDP_TLV_COMMON_HELLO 0x0400
135 #define LDP_TLV_IPV4_TRANSPORT_ADDR 0x0401
136 #define LDP_TLV_CONFIG_SEQ_NUMBER 0x0402
137 #define LDP_TLV_IPV6_TRANSPORT_ADDR 0x0403
138 #define LDP_TLV_COMMON_SESSION 0x0500
139 #define LDP_TLV_ATM_SESSION_PARM 0x0501
140 #define LDP_TLV_FR_SESSION_PARM 0x0502
141 #define LDP_TLV_FT_SESSION 0x0503
142 #define LDP_TLV_LABEL_REQUEST_MSG_ID 0x0600
143 #define LDP_TLV_MTU 0x0601 /* rfc 3988 */
145 static const struct tok ldp_tlv_values
[] = {
146 { LDP_TLV_FEC
, "FEC" },
147 { LDP_TLV_ADDRESS_LIST
, "Address List" },
148 { LDP_TLV_HOP_COUNT
, "Hop Count" },
149 { LDP_TLV_PATH_VECTOR
, "Path Vector" },
150 { LDP_TLV_GENERIC_LABEL
, "Generic Label" },
151 { LDP_TLV_ATM_LABEL
, "ATM Label" },
152 { LDP_TLV_FR_LABEL
, "Frame-Relay Label" },
153 { LDP_TLV_STATUS
, "Status" },
154 { LDP_TLV_EXTD_STATUS
, "Extended Status" },
155 { LDP_TLV_RETURNED_PDU
, "Returned PDU" },
156 { LDP_TLV_RETURNED_MSG
, "Returned Message" },
157 { LDP_TLV_COMMON_HELLO
, "Common Hello Parameters" },
158 { LDP_TLV_IPV4_TRANSPORT_ADDR
, "IPv4 Transport Address" },
159 { LDP_TLV_CONFIG_SEQ_NUMBER
, "Configuration Sequence Number" },
160 { LDP_TLV_IPV6_TRANSPORT_ADDR
, "IPv6 Transport Address" },
161 { LDP_TLV_COMMON_SESSION
, "Common Session Parameters" },
162 { LDP_TLV_ATM_SESSION_PARM
, "ATM Session Parameters" },
163 { LDP_TLV_FR_SESSION_PARM
, "Frame-Relay Session Parameters" },
164 { LDP_TLV_FT_SESSION
, "Fault-Tolerant Session Parameters" },
165 { LDP_TLV_LABEL_REQUEST_MSG_ID
, "Label Request Message ID" },
166 { LDP_TLV_MTU
, "MTU" },
170 #define LDP_FEC_WILDCARD 0x01
171 #define LDP_FEC_PREFIX 0x02
172 #define LDP_FEC_HOSTADDRESS 0x03
173 /* From RFC 4906; should probably be updated to RFC 4447 (e.g., VC -> PW) */
174 #define LDP_FEC_MARTINI_VC 0x80
176 static const struct tok ldp_fec_values
[] = {
177 { LDP_FEC_WILDCARD
, "Wildcard" },
178 { LDP_FEC_PREFIX
, "Prefix" },
179 { LDP_FEC_HOSTADDRESS
, "Host address" },
180 { LDP_FEC_MARTINI_VC
, "Martini VC" },
184 #define LDP_FEC_MARTINI_IFPARM_MTU 0x01
185 #define LDP_FEC_MARTINI_IFPARM_DESC 0x03
186 #define LDP_FEC_MARTINI_IFPARM_VCCV 0x0c
188 static const struct tok ldp_fec_martini_ifparm_values
[] = {
189 { LDP_FEC_MARTINI_IFPARM_MTU
, "MTU" },
190 { LDP_FEC_MARTINI_IFPARM_DESC
, "Description" },
191 { LDP_FEC_MARTINI_IFPARM_VCCV
, "VCCV" },
195 /* draft-ietf-pwe3-vccv-04.txt */
196 static const struct tok ldp_fec_martini_ifparm_vccv_cc_values
[] = {
197 { 0x01, "PWE3 control word" },
198 { 0x02, "MPLS Router Alert Label" },
199 { 0x04, "MPLS inner label TTL = 1" },
203 /* draft-ietf-pwe3-vccv-04.txt */
204 static const struct tok ldp_fec_martini_ifparm_vccv_cv_values
[] = {
205 { 0x01, "ICMP Ping" },
206 { 0x02, "LSP Ping" },
211 static int ldp_pdu_print(netdissect_options
*, register const u_char
*);
217 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
218 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
219 * |U|F| Type | Length |
220 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
225 * | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
227 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
230 #define TLV_TCHECK(minlen) \
231 ND_TCHECK2(*tptr, minlen); if (tlv_tlen < minlen) goto badtlv;
234 ldp_tlv_print(netdissect_options
*ndo
,
235 register const u_char
*tptr
,
238 struct ldp_tlv_header
{
243 const struct ldp_tlv_header
*ldp_tlv_header
;
244 u_short tlv_type
,tlv_len
,tlv_tlen
,af
,ft_flags
;
246 u_int ui
,vc_info_len
, vc_info_tlv_type
, vc_info_tlv_len
,idx
;
250 ldp_tlv_header
= (const struct ldp_tlv_header
*)tptr
;
251 ND_TCHECK(*ldp_tlv_header
);
252 tlv_len
=EXTRACT_16BITS(ldp_tlv_header
->length
);
253 if (tlv_len
+ 4 > msg_tlen
) {
254 ND_PRINT((ndo
, "\n\t\t TLV contents go past end of message"));
258 tlv_type
=LDP_MASK_TLV_TYPE(EXTRACT_16BITS(ldp_tlv_header
->type
));
260 /* FIXME vendor private / experimental check */
261 ND_PRINT((ndo
, "\n\t %s TLV (0x%04x), length: %u, Flags: [%s and %s forward if unknown]",
262 tok2str(ldp_tlv_values
,
267 LDP_MASK_U_BIT(EXTRACT_16BITS(&ldp_tlv_header
->type
)) ? "continue processing" : "ignore",
268 LDP_MASK_F_BIT(EXTRACT_16BITS(&ldp_tlv_header
->type
)) ? "do" : "don't"));
270 tptr
+=sizeof(struct ldp_tlv_header
);
274 case LDP_TLV_COMMON_HELLO
:
276 ND_PRINT((ndo
, "\n\t Hold Time: %us, Flags: [%s Hello%s]",
277 EXTRACT_16BITS(tptr
),
278 (EXTRACT_16BITS(tptr
+2)&0x8000) ? "Targeted" : "Link",
279 (EXTRACT_16BITS(tptr
+2)&0x4000) ? ", Request for targeted Hellos" : ""));
282 case LDP_TLV_IPV4_TRANSPORT_ADDR
:
284 ND_PRINT((ndo
, "\n\t IPv4 Transport Address: %s", ipaddr_string(ndo
, tptr
)));
286 case LDP_TLV_IPV6_TRANSPORT_ADDR
:
288 ND_PRINT((ndo
, "\n\t IPv6 Transport Address: %s", ip6addr_string(ndo
, tptr
)));
290 case LDP_TLV_CONFIG_SEQ_NUMBER
:
292 ND_PRINT((ndo
, "\n\t Sequence Number: %u", EXTRACT_32BITS(tptr
)));
295 case LDP_TLV_ADDRESS_LIST
:
296 TLV_TCHECK(LDP_TLV_ADDRESS_LIST_AFNUM_LEN
);
297 af
= EXTRACT_16BITS(tptr
);
298 tptr
+=LDP_TLV_ADDRESS_LIST_AFNUM_LEN
;
299 tlv_tlen
-= LDP_TLV_ADDRESS_LIST_AFNUM_LEN
;
300 ND_PRINT((ndo
, "\n\t Address Family: %s, addresses",
301 tok2str(af_values
, "Unknown (%u)", af
)));
304 while(tlv_tlen
>= sizeof(struct in_addr
)) {
305 ND_TCHECK2(*tptr
, sizeof(struct in_addr
));
306 ND_PRINT((ndo
, " %s", ipaddr_string(ndo
, tptr
)));
307 tlv_tlen
-=sizeof(struct in_addr
);
308 tptr
+=sizeof(struct in_addr
);
312 while(tlv_tlen
>= sizeof(struct in6_addr
)) {
313 ND_TCHECK2(*tptr
, sizeof(struct in6_addr
));
314 ND_PRINT((ndo
, " %s", ip6addr_string(ndo
, tptr
)));
315 tlv_tlen
-=sizeof(struct in6_addr
);
316 tptr
+=sizeof(struct in6_addr
);
325 case LDP_TLV_COMMON_SESSION
:
327 ND_PRINT((ndo
, "\n\t Version: %u, Keepalive: %us, Flags: [Downstream %s, Loop Detection %s]",
328 EXTRACT_16BITS(tptr
), EXTRACT_16BITS(tptr
+2),
329 (EXTRACT_16BITS(tptr
+6)&0x8000) ? "On Demand" : "Unsolicited",
330 (EXTRACT_16BITS(tptr
+6)&0x4000) ? "Enabled" : "Disabled"
337 ND_PRINT((ndo
, "\n\t %s FEC (0x%02x)",
338 tok2str(ldp_fec_values
, "Unknown", fec_type
),
345 case LDP_FEC_WILDCARD
:
349 af
= EXTRACT_16BITS(tptr
);
350 tptr
+=LDP_TLV_ADDRESS_LIST_AFNUM_LEN
;
351 tlv_tlen
-=LDP_TLV_ADDRESS_LIST_AFNUM_LEN
;
352 if (af
== AFNUM_INET
) {
353 i
=decode_prefix4(ndo
, tptr
, tlv_tlen
, buf
, sizeof(buf
));
357 ND_PRINT((ndo
, ": IPv4 prefix (goes past end of TLV)"));
359 ND_PRINT((ndo
, ": IPv4 prefix (invalid length)"));
361 ND_PRINT((ndo
, ": IPv4 prefix %s", buf
));
363 else if (af
== AFNUM_INET6
) {
364 i
=decode_prefix6(ndo
, tptr
, tlv_tlen
, buf
, sizeof(buf
));
368 ND_PRINT((ndo
, ": IPv4 prefix (goes past end of TLV)"));
370 ND_PRINT((ndo
, ": IPv6 prefix (invalid length)"));
372 ND_PRINT((ndo
, ": IPv6 prefix %s", buf
));
375 ND_PRINT((ndo
, ": Address family %u prefix", af
));
377 case LDP_FEC_HOSTADDRESS
:
379 case LDP_FEC_MARTINI_VC
:
381 * According to RFC 4908, the VC info Length field can be zero,
382 * in which case not only are there no interface parameters,
386 vc_info_len
= *(tptr
+2);
388 if (vc_info_len
== 0) {
389 ND_PRINT((ndo
, ": %s, %scontrol word, group-ID %u, VC-info-length: %u",
390 tok2str(l2vpn_encaps_values
, "Unknown", EXTRACT_16BITS(tptr
)&0x7fff),
391 EXTRACT_16BITS(tptr
)&0x8000 ? "" : "no ",
392 EXTRACT_32BITS(tptr
+3),
397 /* Make sure we have the VC ID as well */
399 ND_PRINT((ndo
, ": %s, %scontrol word, group-ID %u, VC-ID %u, VC-info-length: %u",
400 tok2str(l2vpn_encaps_values
, "Unknown", EXTRACT_16BITS(tptr
)&0x7fff),
401 EXTRACT_16BITS(tptr
)&0x8000 ? "" : "no ",
402 EXTRACT_32BITS(tptr
+3),
403 EXTRACT_32BITS(tptr
+7),
405 if (vc_info_len
< 4) {
406 /* minimum 4, for the VC ID */
407 ND_PRINT((ndo
, " (invalid, < 4"));
408 return(tlv_len
+4); /* Type & Length fields not included */
410 vc_info_len
-= 4; /* subtract out the VC ID, giving the length of the interface parameters */
412 /* Skip past the fixed information and the VC ID */
415 TLV_TCHECK(vc_info_len
);
417 while (vc_info_len
> 2) {
418 vc_info_tlv_type
= *tptr
;
419 vc_info_tlv_len
= *(tptr
+1);
420 if (vc_info_tlv_len
< 2)
422 if (vc_info_len
< vc_info_tlv_len
)
425 ND_PRINT((ndo
, "\n\t\tInterface Parameter: %s (0x%02x), len %u",
426 tok2str(ldp_fec_martini_ifparm_values
,"Unknown",vc_info_tlv_type
),
430 switch(vc_info_tlv_type
) {
431 case LDP_FEC_MARTINI_IFPARM_MTU
:
432 ND_PRINT((ndo
, ": %u", EXTRACT_16BITS(tptr
+2)));
435 case LDP_FEC_MARTINI_IFPARM_DESC
:
436 ND_PRINT((ndo
, ": "));
437 for (idx
= 2; idx
< vc_info_tlv_len
; idx
++)
438 safeputchar(ndo
, *(tptr
+ idx
));
441 case LDP_FEC_MARTINI_IFPARM_VCCV
:
442 ND_PRINT((ndo
, "\n\t\t Control Channels (0x%02x) = [%s]",
444 bittok2str(ldp_fec_martini_ifparm_vccv_cc_values
, "none", *(tptr
+2))));
445 ND_PRINT((ndo
, "\n\t\t CV Types (0x%02x) = [%s]",
447 bittok2str(ldp_fec_martini_ifparm_vccv_cv_values
, "none", *(tptr
+3))));
451 print_unknown_data(ndo
, tptr
+2, "\n\t\t ", vc_info_tlv_len
-2);
455 vc_info_len
-= vc_info_tlv_len
;
456 tptr
+= vc_info_tlv_len
;
463 case LDP_TLV_GENERIC_LABEL
:
465 ND_PRINT((ndo
, "\n\t Label: %u", EXTRACT_32BITS(tptr
) & 0xfffff));
470 ui
= EXTRACT_32BITS(tptr
);
472 ND_PRINT((ndo
, "\n\t Status: 0x%02x, Flags: [%s and %s forward]",
474 ui
&0x80000000 ? "Fatal error" : "Advisory Notification",
475 ui
&0x40000000 ? "do" : "don't"));
476 ui
= EXTRACT_32BITS(tptr
);
479 ND_PRINT((ndo
, ", causing Message ID: 0x%08x", ui
));
482 case LDP_TLV_FT_SESSION
:
484 ft_flags
= EXTRACT_16BITS(tptr
);
485 ND_PRINT((ndo
, "\n\t Flags: [%sReconnect, %sSave State, %sAll-Label Protection, %s Checkpoint, %sRe-Learn State]",
486 ft_flags
&0x8000 ? "" : "No ",
487 ft_flags
&0x8 ? "" : "Don't ",
488 ft_flags
&0x4 ? "" : "No ",
489 ft_flags
&0x2 ? "Sequence Numbered Label" : "All Labels",
490 ft_flags
&0x1 ? "" : "Don't "));
492 ui
= EXTRACT_32BITS(tptr
);
494 ND_PRINT((ndo
, ", Reconnect Timeout: %ums", ui
));
496 ui
= EXTRACT_32BITS(tptr
);
498 ND_PRINT((ndo
, ", Recovery Time: %ums", ui
));
503 ND_PRINT((ndo
, "\n\t MTU: %u", EXTRACT_16BITS(tptr
)));
508 * FIXME those are the defined TLVs that lack a decoder
509 * you are welcome to contribute code ;-)
512 case LDP_TLV_HOP_COUNT
:
513 case LDP_TLV_PATH_VECTOR
:
514 case LDP_TLV_ATM_LABEL
:
515 case LDP_TLV_FR_LABEL
:
516 case LDP_TLV_EXTD_STATUS
:
517 case LDP_TLV_RETURNED_PDU
:
518 case LDP_TLV_RETURNED_MSG
:
519 case LDP_TLV_ATM_SESSION_PARM
:
520 case LDP_TLV_FR_SESSION_PARM
:
521 case LDP_TLV_LABEL_REQUEST_MSG_ID
:
524 if (ndo
->ndo_vflag
<= 1)
525 print_unknown_data(ndo
, tptr
, "\n\t ", tlv_tlen
);
528 return(tlv_len
+4); /* Type & Length fields not included */
531 ND_PRINT((ndo
, "\n\t\t packet exceeded snapshot"));
535 ND_PRINT((ndo
, "\n\t\t TLV contents go past end of TLV"));
536 return(tlv_len
+4); /* Type & Length fields not included */
540 ldp_print(netdissect_options
*ndo
,
541 register const u_char
*pptr
, register u_int len
)
544 while (len
> (sizeof(struct ldp_common_header
) + sizeof(struct ldp_msg_header
))) {
545 processed
= ldp_pdu_print(ndo
, pptr
);
554 ldp_pdu_print(netdissect_options
*ndo
,
555 register const u_char
*pptr
)
557 const struct ldp_common_header
*ldp_com_header
;
558 const struct ldp_msg_header
*ldp_msg_header
;
559 const u_char
*tptr
,*msg_tptr
;
561 u_short pdu_len
,msg_len
,msg_type
,msg_tlen
;
562 int hexdump
,processed
;
564 ldp_com_header
= (const struct ldp_common_header
*)pptr
;
565 ND_TCHECK(*ldp_com_header
);
568 * Sanity checking of the header.
570 if (EXTRACT_16BITS(&ldp_com_header
->version
) != LDP_VERSION
) {
571 ND_PRINT((ndo
, "%sLDP version %u packet not supported",
572 (ndo
->ndo_vflag
< 1) ? "" : "\n\t",
573 EXTRACT_16BITS(&ldp_com_header
->version
)));
577 pdu_len
= EXTRACT_16BITS(&ldp_com_header
->pdu_length
);
578 if (pdu_len
< sizeof(const struct ldp_common_header
)-4) {
579 /* length too short */
580 ND_PRINT((ndo
, "%sLDP, pdu-length: %u (too short, < %u)",
581 (ndo
->ndo_vflag
< 1) ? "" : "\n\t",
583 (u_int
)(sizeof(const struct ldp_common_header
)-4)));
587 /* print the LSR-ID, label-space & length */
588 ND_PRINT((ndo
, "%sLDP, Label-Space-ID: %s:%u, pdu-length: %u",
589 (ndo
->ndo_vflag
< 1) ? "" : "\n\t",
590 ipaddr_string(ndo
, &ldp_com_header
->lsr_id
),
591 EXTRACT_16BITS(&ldp_com_header
->label_space
),
594 /* bail out if non-verbose */
595 if (ndo
->ndo_vflag
< 1)
598 /* ok they seem to want to know everything - lets fully decode it */
599 tptr
= pptr
+ sizeof(const struct ldp_common_header
);
600 tlen
= pdu_len
- (sizeof(const struct ldp_common_header
)-4); /* Type & Length fields not included */
603 /* did we capture enough for fully decoding the msg header ? */
604 ND_TCHECK2(*tptr
, sizeof(struct ldp_msg_header
));
606 ldp_msg_header
= (const struct ldp_msg_header
*)tptr
;
607 msg_len
=EXTRACT_16BITS(ldp_msg_header
->length
);
608 msg_type
=LDP_MASK_MSG_TYPE(EXTRACT_16BITS(ldp_msg_header
->type
));
610 if (msg_len
< sizeof(struct ldp_msg_header
)-4) {
611 /* length too short */
612 /* FIXME vendor private / experimental check */
613 ND_PRINT((ndo
, "\n\t %s Message (0x%04x), length: %u (too short, < %u)",
614 tok2str(ldp_msg_values
,
619 (u_int
)(sizeof(struct ldp_msg_header
)-4)));
623 /* FIXME vendor private / experimental check */
624 ND_PRINT((ndo
, "\n\t %s Message (0x%04x), length: %u, Message ID: 0x%08x, Flags: [%s if unknown]",
625 tok2str(ldp_msg_values
,
630 EXTRACT_32BITS(&ldp_msg_header
->id
),
631 LDP_MASK_U_BIT(EXTRACT_16BITS(&ldp_msg_header
->type
)) ? "continue processing" : "ignore"));
633 msg_tptr
=tptr
+sizeof(struct ldp_msg_header
);
634 msg_tlen
=msg_len
-(sizeof(struct ldp_msg_header
)-4); /* Type & Length fields not included */
636 /* did we capture enough for fully decoding the message ? */
637 ND_TCHECK2(*tptr
, msg_len
);
645 case LDP_MSG_KEEPALIVE
:
646 case LDP_MSG_ADDRESS
:
647 case LDP_MSG_LABEL_MAPPING
:
648 case LDP_MSG_ADDRESS_WITHDRAW
:
649 case LDP_MSG_LABEL_WITHDRAW
:
650 while(msg_tlen
>= 4) {
651 processed
= ldp_tlv_print(ndo
, msg_tptr
, msg_tlen
);
660 * FIXME those are the defined messages that lack a decoder
661 * you are welcome to contribute code ;-)
664 case LDP_MSG_LABEL_REQUEST
:
665 case LDP_MSG_LABEL_RELEASE
:
666 case LDP_MSG_LABEL_ABORT_REQUEST
:
669 if (ndo
->ndo_vflag
<= 1)
670 print_unknown_data(ndo
, msg_tptr
, "\n\t ", msg_tlen
);
673 /* do we want to see an additionally hexdump ? */
674 if (ndo
->ndo_vflag
> 1 || hexdump
==TRUE
)
675 print_unknown_data(ndo
, tptr
+sizeof(struct ldp_msg_header
), "\n\t ",
683 ND_PRINT((ndo
, "\n\t\t packet exceeded snapshot"));
689 * c-style: whitesmith