2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
13 * Copyright (c) 2009 Mojatatu Networks, Inc
17 /* \summary: Forwarding and Control Element Separation (ForCES) Protocol printer */
19 /* specification: RFC 5810 */
25 #include <netdissect-stdinc.h>
27 #include "netdissect.h"
30 static const char tstr
[] = "[|forces]";
33 #define ForCES_HDRL 24
34 #define ForCES_ALNL 4U
39 #define TOM_ASSNSETUP 0x1
40 #define TOM_ASSNTEARD 0x2
41 #define TOM_CONFIG 0x3
43 #define TOM_EVENTNOT 0x5
44 #define TOM_PKTREDIR 0x6
45 #define TOM_HEARTBT 0x0F
46 #define TOM_ASSNSETREP 0x11
47 #define TOM_CONFIGREP 0x13
48 #define TOM_QUERYREP 0x14
51 * tom_h Flags: resv1(8b):maxtlvs(4b):resv2(2b):mintlv(2b)
53 #define ZERO_TTLV 0x01
54 #define ZERO_MORE_TTLV 0x02
55 #define ONE_MORE_TTLV 0x04
61 #define TTLV_T1 (ONE_MORE_TTLV|ONE_TLV)
62 #define TTLV_T2 (ONE_MORE_TTLV|MAX_TLV)
69 int (*print
) (netdissect_options
*ndo
, const u_char
* pptr
, u_int len
,
70 uint16_t op_msk
, int indent
);
87 #define TOM_MAX_IND (_TOM_RSV_MAX - 1)
89 static inline int tom_valid(uint8_t tom
)
92 if (tom
>= 0x7 && tom
<= 0xe)
103 static inline const char *ForCES_node(uint32_t node
)
105 if (node
<= 0x3FFFFFFF)
107 if (node
>= 0x40000000 && node
<= 0x7FFFFFFF)
109 if (node
>= 0xC0000000 && node
<= 0xFFFFFFEF)
110 return "AllMulticast";
111 if (node
== 0xFFFFFFFD)
112 return "AllCEsBroadcast";
113 if (node
== 0xFFFFFFFE)
114 return "AllFEsBroadcast";
115 if (node
== 0xFFFFFFFF)
116 return "AllBroadcast";
118 return "ForCESreserved";
122 static const struct tok ForCES_ACKs
[] = {
130 static const struct tok ForCES_EMs
[] = {
132 {0x1, "execute-all-or-none"},
133 {0x2, "execute-until-failure"},
134 {0x3, "continue-execute-on-failure"},
138 static const struct tok ForCES_ATs
[] = {
140 {0x1, "2PCtransaction"},
144 static const struct tok ForCES_TPs
[] = {
145 {0x0, "StartofTransaction"},
146 {0x1, "MiddleofTransaction"},
147 {0x2, "EndofTransaction"},
153 * Structure of forces header, naked of TLVs.
156 nd_uint8_t fm_vrsvd
; /* version and reserved */
157 #define ForCES_V(forcesh) (EXTRACT_U_1((forcesh)->fm_vrsvd) >> 4)
158 nd_uint8_t fm_tom
; /* type of message */
159 nd_uint16_t fm_len
; /* total length * 4 bytes */
160 #define ForCES_BLN(forcesh) ((uint32_t)(EXTRACT_BE_U_2((forcesh)->fm_len) << 2))
161 nd_uint32_t fm_sid
; /* Source ID */
162 #define ForCES_SID(forcesh) EXTRACT_BE_U_4((forcesh)->fm_sid)
163 nd_uint32_t fm_did
; /* Destination ID */
164 #define ForCES_DID(forcesh) EXTRACT_BE_U_4((forcesh)->fm_did)
165 nd_uint8_t fm_cor
[8]; /* correlator */
166 nd_uint32_t fm_flags
; /* flags */
167 #define ForCES_ACK(forcesh) ((EXTRACT_BE_U_4((forcesh)->fm_flags)&0xC0000000) >> 30)
168 #define ForCES_PRI(forcesh) ((EXTRACT_BE_U_4((forcesh)->fm_flags)&0x38000000) >> 27)
169 #define ForCES_RS1(forcesh) ((EXTRACT_BE_U_4((forcesh)->fm_flags)&0x07000000) >> 24)
170 #define ForCES_EM(forcesh) ((EXTRACT_BE_U_4((forcesh)->fm_flags)&0x00C00000) >> 22)
171 #define ForCES_AT(forcesh) ((EXTRACT_BE_U_4((forcesh)->fm_flags)&0x00200000) >> 21)
172 #define ForCES_TP(forcesh) ((EXTRACT_BE_U_4((forcesh)->fm_flags)&0x00180000) >> 19)
173 #define ForCES_RS2(forcesh) ((EXTRACT_BE_U_4((forcesh)->fm_flags)&0x0007FFFF) >> 0)
176 #define ForCES_HLN_VALID(fhl,tlen) ((tlen) >= ForCES_HDRL && \
177 (fhl) >= ForCES_HDRL && \
180 #define F_LFB_RSVD 0x0
181 #define F_LFB_FEO 0x1
182 #define F_LFB_FEPO 0x2
183 static const struct tok ForCES_LFBs
[] = {
184 {F_LFB_RSVD
, "Invalid TLV"},
185 {F_LFB_FEO
, "FEObj LFB"},
186 {F_LFB_FEPO
, "FEProtoObj LFB"},
190 /* this is defined in RFC5810 section A.2 */
191 /* http://www.iana.org/assignments/forces/forces.xhtml#oper-tlv-types */
210 #define F_OP_MAX (_F_OP_MAX - 1)
213 B_OP_SET
= 1 << (F_OP_SET
- 1),
214 B_OP_SETPROP
= 1 << (F_OP_SETPROP
- 1),
215 B_OP_SETRESP
= 1 << (F_OP_SETRESP
- 1),
216 B_OP_SETPRESP
= 1 << (F_OP_SETPRESP
- 1),
217 B_OP_DEL
= 1 << (F_OP_DEL
- 1),
218 B_OP_DELRESP
= 1 << (F_OP_DELRESP
- 1),
219 B_OP_GET
= 1 << (F_OP_GET
- 1),
220 B_OP_GETPROP
= 1 << (F_OP_GETPROP
- 1),
221 B_OP_GETRESP
= 1 << (F_OP_GETRESP
- 1),
222 B_OP_GETPRESP
= 1 << (F_OP_GETPRESP
- 1),
223 B_OP_REPORT
= 1 << (F_OP_REPORT
- 1),
224 B_OP_COMMIT
= 1 << (F_OP_COMMIT
- 1),
225 B_OP_RCOMMIT
= 1 << (F_OP_RCOMMIT
- 1),
226 B_OP_RTRCOMP
= 1 << (F_OP_RTRCOMP
- 1)
233 int (*print
) (netdissect_options
*ndo
, const u_char
* pptr
, u_int len
,
234 uint16_t op_msk
, int indent
);
237 static int genoptlv_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
238 uint16_t op_msk
, int indent
);
239 static int recpdoptlv_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
240 uint16_t op_msk
, int indent
);
241 static int invoptlv_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
242 uint16_t op_msk
, int indent
);
257 static const struct optlv_h OPTLV_msg
[F_OP_MAX
+ 1] = {
258 /* F_OP_RSV */ {ZERO_TTLV
, 0, "Invalid OPTLV", invoptlv_print
},
259 /* F_OP_SET */ {TTLV_T2
, B_FULLD
| B_SPARD
, " Set", recpdoptlv_print
},
261 {TTLV_T2
, B_FULLD
| B_SPARD
, " SetProp", recpdoptlv_print
},
262 /* F_OP_SETRESP */ {TTLV_T2
, B_RESTV
, " SetResp", recpdoptlv_print
},
263 /* F_OP_SETPRESP */ {TTLV_T2
, B_RESTV
, " SetPropResp", recpdoptlv_print
},
264 /* F_OP_DEL */ {ZERO_TTLV
, 0, " Del", recpdoptlv_print
},
265 /* F_OP_DELRESP */ {TTLV_T2
, B_RESTV
, " DelResp", recpdoptlv_print
},
266 /* F_OP_GET */ {ZERO_TTLV
, 0, " Get", recpdoptlv_print
},
267 /* F_OP_GETPROP */ {ZERO_TTLV
, 0, " GetProp", recpdoptlv_print
},
269 {TTLV_T2
, B_FULLD
| B_SPARD
| B_RESTV
, " GetResp", recpdoptlv_print
},
271 {TTLV_T2
, B_FULLD
| B_RESTV
, " GetPropResp", recpdoptlv_print
},
273 {TTLV_T2
, B_FULLD
| B_SPARD
, " Report", recpdoptlv_print
},
274 /* F_OP_COMMIT */ {ZERO_TTLV
, 0, " Commit", NULL
},
275 /* F_OP_RCOMMIT */ {TTLV_T1
, B_RESTV
, " RCommit", genoptlv_print
},
276 /* F_OP_RTRCOMP */ {ZERO_TTLV
, 0, " RTRCOMP", NULL
},
279 static inline const struct optlv_h
*get_forces_optlv_h(uint16_t opt
)
281 if (opt
> F_OP_MAX
|| opt
== F_OP_RSV
)
282 return &OPTLV_msg
[F_OP_RSV
];
284 return &OPTLV_msg
[opt
];
289 #define IND_PREF '\n'
291 static char ind_buf
[IND_SIZE
];
293 static inline char *indent_pr(int indent
, int nlpref
)
298 if (indent
> (IND_SIZE
- 1))
299 indent
= IND_SIZE
- 1;
307 while (--indent
>= 0)
314 static inline int op_valid(uint16_t op
, uint16_t mask
)
319 return (1 << (op
- 1)) & mask
; /* works only for 0x0001 through 0x0010 */
320 /* I guess we should allow vendor operations? */
326 #define F_TLV_RSVD 0x0000
327 #define F_TLV_REDR 0x0001
328 #define F_TLV_ASRS 0x0010
329 #define F_TLV_ASRT 0x0011
330 #define F_TLV_LFBS 0x1000
331 #define F_TLV_PDAT 0x0110
332 #define F_TLV_KEYI 0x0111
333 #define F_TLV_FULD 0x0112
334 #define F_TLV_SPAD 0x0113
335 #define F_TLV_REST 0x0114
336 #define F_TLV_METD 0x0115
337 #define F_TLV_REDD 0x0116
338 #define F_TLV_TRNG 0x0117
341 #define F_TLV_VNST 0x8000
343 static const struct tok ForCES_TLV
[] = {
344 {F_TLV_RSVD
, "Invalid TLV"},
345 {F_TLV_REDR
, "REDIRECT TLV"},
346 {F_TLV_ASRS
, "ASResult TLV"},
347 {F_TLV_ASRT
, "ASTreason TLV"},
348 {F_TLV_LFBS
, "LFBselect TLV"},
349 {F_TLV_PDAT
, "PATH-DATA TLV"},
350 {F_TLV_KEYI
, "KEYINFO TLV"},
351 {F_TLV_FULD
, "FULLDATA TLV"},
352 {F_TLV_SPAD
, "SPARSEDATA TLV"},
353 {F_TLV_REST
, "RESULT TLV"},
354 {F_TLV_METD
, "METADATA TLV"},
355 {F_TLV_REDD
, "REDIRECTDATA TLV"},
360 static inline int ttlv_valid(uint16_t ttlv
)
363 if (ttlv
== 1 || ttlv
== 0x1000)
365 if (ttlv
>= 0x10 && ttlv
<= 0x11)
367 if (ttlv
>= 0x110 && ttlv
<= 0x116)
386 #define F_ALN_LEN(len) ( ((len)+ForCES_ALNL-1) & ~(ForCES_ALNL-1) )
387 #define GET_TOP_TLV(fhdr) ((const struct forces_tlv *)((fhdr) + sizeof (struct forcesh)))
388 #define TLV_SET_LEN(len) (F_ALN_LEN(TLV_HDRL) + (len))
389 #define TLV_ALN_LEN(len) F_ALN_LEN(TLV_SET_LEN(len))
390 #define TLV_RDAT_LEN(tlv) (EXTRACT_BE_U_2(&(tlv)->length) - TLV_SET_LEN(0)
391 #define TLV_DATA(tlvp) ((const void*)(((const char*)(tlvp)) + TLV_SET_LEN(0)))
392 #define GO_NXT_TLV(tlv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_BE_U_2(&(tlv)->length)), \
393 (const struct forces_tlv*)(((const char*)(tlv)) \
394 + F_ALN_LEN(EXTRACT_BE_U_2(&(tlv)->length))))
395 #define ILV_SET_LEN(len) (F_ALN_LEN(ILV_HDRL) + (len))
396 #define ILV_ALN_LEN(len) F_ALN_LEN(ILV_SET_LEN(len))
397 #define ILV_RDAT_LEN(ilv) (EXTRACT_BE_U_4(&(ilv)->length)) - ILV_SET_LEN(0)
398 #define ILV_DATA(ilvp) ((const void*)(((const char*)(ilvp)) + ILV_SET_LEN(0)))
399 #define GO_NXT_ILV(ilv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_BE_U_4(&(ilv)->length)), \
400 (const struct forces_ilv *)(((const char*)(ilv)) \
401 + F_ALN_LEN(EXTRACT_BE_U_4(&(ilv)->length))))
402 #define INVALID_RLEN 1
403 #define INVALID_STLN 2
404 #define INVALID_LTLN 3
405 #define INVALID_ALEN 4
407 static const struct tok ForCES_TLV_err
[] = {
408 {INVALID_RLEN
, "Invalid total length"},
409 {INVALID_STLN
, "xLV too short"},
410 {INVALID_LTLN
, "xLV too long"},
411 {INVALID_ALEN
, "data padding missing"},
415 static inline u_int
tlv_valid(const struct forces_tlv
*tlv
, u_int rlen
)
419 if (EXTRACT_BE_U_2(&tlv
->length
) < TLV_HDRL
)
421 if (EXTRACT_BE_U_2(&tlv
->length
) > rlen
)
423 if (rlen
< F_ALN_LEN(EXTRACT_BE_U_2(&tlv
->length
)))
429 static inline int ilv_valid(const struct forces_ilv
*ilv
, u_int rlen
)
433 if (EXTRACT_BE_U_4(&ilv
->length
) < ILV_HDRL
)
435 if (EXTRACT_BE_U_4(&ilv
->length
) > rlen
)
437 if (rlen
< F_ALN_LEN(EXTRACT_BE_U_4(&ilv
->length
)))
443 static int lfbselect_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
444 uint16_t op_msk
, int indent
);
445 static int redirect_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
446 uint16_t op_msk
, int indent
);
447 static int asrtlv_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
448 uint16_t op_msk
, int indent
);
449 static int asttlv_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
450 uint16_t op_msk
, int indent
);
452 struct forces_lfbsh
{
454 nd_uint32_t instance
;
457 #define ASSNS_OPS (B_OP_REPORT)
458 #define CFG_OPS (B_OP_SET|B_OP_SETPROP|B_OP_DEL|B_OP_COMMIT|B_OP_RTRCOMP)
459 #define CFG_ROPS (B_OP_SETRESP|B_OP_SETPRESP|B_OP_DELRESP|B_OP_RCOMMIT)
460 #define CFG_QY (B_OP_GET|B_OP_GETPROP)
461 #define CFG_QYR (B_OP_GETRESP|B_OP_GETPRESP)
462 #define CFG_EVN (B_OP_REPORT)
464 static const struct tom_h ForCES_msg
[TOM_MAX_IND
+ 1] = {
465 /* TOM_RSV_I */ {TOM_RSVD
, ZERO_TTLV
, 0, "Invalid message", NULL
},
466 /* TOM_ASS_I */ {TOM_ASSNSETUP
, ZERO_MORE_TTLV
| TWO_TLV
, ASSNS_OPS
,
467 "Association Setup", lfbselect_print
},
469 {TOM_ASSNTEARD
, TTLV_T1
, 0, "Association TearDown", asttlv_print
},
470 /* TOM_CFG_I */ {TOM_CONFIG
, TTLV_T2
, CFG_OPS
, "Config", lfbselect_print
},
471 /* TOM_QRY_I */ {TOM_QUERY
, TTLV_T2
, CFG_QY
, "Query", lfbselect_print
},
472 /* TOM_EVN_I */ {TOM_EVENTNOT
, TTLV_T1
, CFG_EVN
, "Event Notification",
475 {TOM_PKTREDIR
, TTLV_T2
, 0, "Packet Redirect", redirect_print
},
476 /* TOM_HBT_I */ {TOM_HEARTBT
, ZERO_TTLV
, 0, "HeartBeat", NULL
},
478 {TOM_ASSNSETREP
, TTLV_T1
, 0, "Association Response", asrtlv_print
},
479 /* TOM_CNR_I */ {TOM_CONFIGREP
, TTLV_T2
, CFG_ROPS
, "Config Response",
482 {TOM_QUERYREP
, TTLV_T2
, CFG_QYR
, "Query Response", lfbselect_print
},
485 static inline const struct tom_h
*get_forces_tom(uint8_t tom
)
488 for (i
= TOM_RSV_I
; i
<= TOM_MAX_IND
; i
++) {
489 const struct tom_h
*th
= &ForCES_msg
[i
];
493 return &ForCES_msg
[TOM_RSV_I
];
501 int (*print
) (netdissect_options
*, const u_char
* pptr
, u_int len
,
502 uint16_t op_msk
, int indent
);
514 #define PD_MAX_IND (_TOM_RSV_MAX - 1)
516 static inline int pd_valid(uint16_t pd
)
518 if (pd
>= F_TLV_PDAT
&& pd
<= F_TLV_REST
)
524 chk_op_type(netdissect_options
*ndo
,
525 uint16_t type
, uint16_t msk
, uint16_t omsk
)
527 if (type
!= F_TLV_PDAT
) {
529 if (type
!= F_TLV_KEYI
) {
530 ND_PRINT("Based on flags expected KEYINFO TLV!\n");
534 ND_PRINT("Illegal DATA encoding for type 0x%x programmed %x got %x \n",
543 #define F_SELTABRANGE 2
544 #define F_TABAPPEND 4
552 static int prestlv_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
553 uint16_t op_msk
, int indent
);
554 static int pkeyitlv_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
555 uint16_t op_msk
, int indent
);
556 static int fdatatlv_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
557 uint16_t op_msk
, int indent
);
558 static int sdatatlv_print(netdissect_options
*, const u_char
* pptr
, u_int len
,
559 uint16_t op_msk
, int indent
);
561 static const struct pdata_ops ForCES_pdata
[PD_MAX_IND
+ 1] = {
562 /* PD_RSV_I */ {0, 0, 0, "Invalid message", NULL
},
563 /* PD_SEL_I */ {F_TLV_KEYI
, 0, 0, "KEYINFO TLV", pkeyitlv_print
},
564 /* PD_FDT_I */ {F_TLV_FULD
, 0, B_FULLD
, "FULLDATA TLV", fdatatlv_print
},
565 /* PD_SDT_I */ {F_TLV_SPAD
, 0, B_SPARD
, "SPARSEDATA TLV", sdatatlv_print
},
566 /* PD_RES_I */ {F_TLV_REST
, 0, B_RESTV
, "RESULT TLV", prestlv_print
},
568 {F_TLV_PDAT
, 0, 0, "Inner PATH-DATA TLV", recpdoptlv_print
},
571 static inline const struct pdata_ops
*get_forces_pd(uint16_t pd
)
574 for (i
= PD_RSV_I
+ 1; i
<= PD_MAX_IND
; i
++) {
575 const struct pdata_ops
*pdo
= &ForCES_pdata
[i
];
579 return &ForCES_pdata
[TOM_RSV_I
];
587 E_INVALID_DESTINATION_PID
,
590 E_LFB_INSTANCE_ID_NOT_FOUND
,
592 E_COMPONENT_DOES_NOT_EXIST
,
596 E_INVALID_ARRAY_CREATION
,
597 E_VALUE_OUT_OF_RANGE
,
599 E_INVALID_PARAMETERS
,
600 E_INVALID_MESSAGE_TYPE
,
607 /* 0x18-0xFE are reserved .. */
608 E_UNSPECIFIED_ERROR
= 0XFF
611 static const struct tok ForCES_errs
[] = {
612 {E_SUCCESS
, "SUCCESS"},
613 {E_INVALID_HEADER
, "INVALID HEADER"},
614 {E_LENGTH_MISMATCH
, "LENGTH MISMATCH"},
615 {E_VERSION_MISMATCH
, "VERSION MISMATCH"},
616 {E_INVALID_DESTINATION_PID
, "INVALID DESTINATION PID"},
617 {E_LFB_UNKNOWN
, "LFB UNKNOWN"},
618 {E_LFB_NOT_FOUND
, "LFB NOT FOUND"},
619 {E_LFB_INSTANCE_ID_NOT_FOUND
, "LFB INSTANCE ID NOT FOUND"},
620 {E_INVALID_PATH
, "INVALID PATH"},
621 {E_COMPONENT_DOES_NOT_EXIST
, "COMPONENT DOES NOT EXIST"},
622 {E_EXISTS
, "EXISTS ALREADY"},
623 {E_NOT_FOUND
, "NOT FOUND"},
624 {E_READ_ONLY
, "READ ONLY"},
625 {E_INVALID_ARRAY_CREATION
, "INVALID ARRAY CREATION"},
626 {E_VALUE_OUT_OF_RANGE
, "VALUE OUT OF RANGE"},
627 {E_CONTENTS_TOO_LONG
, "CONTENTS TOO LONG"},
628 {E_INVALID_PARAMETERS
, "INVALID PARAMETERS"},
629 {E_INVALID_MESSAGE_TYPE
, "INVALID MESSAGE TYPE"},
630 {E_INVALID_FLAGS
, "INVALID FLAGS"},
631 {E_INVALID_TLV
, "INVALID TLV"},
632 {E_EVENT_ERROR
, "EVENT ERROR"},
633 {E_NOT_SUPPORTED
, "NOT SUPPORTED"},
634 {E_MEMORY_ERROR
, "MEMORY ERROR"},
635 {E_INTERNAL_ERROR
, "INTERNAL ERROR"},
636 {E_UNSPECIFIED_ERROR
, "UNSPECIFIED ERROR"},
643 prestlv_print(netdissect_options
*ndo
,
644 const u_char
* pptr
, u_int len
,
645 uint16_t op_msk _U_
, int indent
)
647 const struct forces_tlv
*tlv
= (const struct forces_tlv
*)pptr
;
648 const u_char
*tdp
= (const u_char
*) TLV_DATA(tlv
);
649 const struct res_val
*r
= (const struct res_val
*)tdp
;
654 * pdatacnt_print() has ensured that len (the TLV length)
657 dlen
= len
- TLV_HDRL
;
658 if (dlen
!= RESLEN
) {
659 ND_PRINT("illegal RESULT-TLV: %d bytes!\n", dlen
);
664 result
= EXTRACT_U_1(r
->result
);
665 if (result
>= 0x18 && result
<= 0xFE) {
666 ND_PRINT("illegal reserved result code: 0x%x!\n", result
);
670 if (ndo
->ndo_vflag
>= 3) {
671 char *ib
= indent_pr(indent
, 0);
672 ND_PRINT("%s Result: %s (code 0x%x)\n", ib
,
673 tok2str(ForCES_errs
, NULL
, result
), result
);
678 ND_PRINT("%s", tstr
);
683 fdatatlv_print(netdissect_options
*ndo
,
684 const u_char
* pptr
, u_int len
,
685 uint16_t op_msk _U_
, int indent
)
687 const struct forces_tlv
*tlv
= (const struct forces_tlv
*)pptr
;
689 const u_char
*tdp
= (const u_char
*) TLV_DATA(tlv
);
693 * pdatacnt_print() or pkeyitlv_print() has ensured that len
694 * (the TLV length) >= TLV_HDRL.
696 rlen
= len
- TLV_HDRL
;
698 type
= EXTRACT_BE_U_2(&tlv
->type
);
699 if (type
!= F_TLV_FULD
) {
700 ND_PRINT("Error: expecting FULLDATA!\n");
704 if (ndo
->ndo_vflag
>= 3) {
705 char *ib
= indent_pr(indent
+ 2, 1);
706 ND_PRINT("%s[", ib
+ 1);
707 hex_print_with_offset(ndo
, ib
, tdp
, rlen
, 0);
708 ND_PRINT("\n%s]\n", ib
+ 1);
713 ND_PRINT("%s", tstr
);
718 sdatailv_print(netdissect_options
*ndo
,
719 const u_char
* pptr
, u_int len
,
720 uint16_t op_msk _U_
, int indent
)
723 const struct forces_ilv
*ilv
= (const struct forces_ilv
*)pptr
;
726 if (len
< ILV_HDRL
) {
727 ND_PRINT("Error: BAD SPARSEDATA-TLV!\n");
734 ND_PRINT("Jamal - outstanding length <%d>\n", rlen
);
736 char *ib
= indent_pr(indent
, 1);
737 const u_char
*tdp
= (const u_char
*) ILV_DATA(ilv
);
739 invilv
= ilv_valid(ilv
, rlen
);
741 ND_PRINT("%s[", ib
+ 1);
742 hex_print_with_offset(ndo
, ib
, tdp
, rlen
, 0);
743 ND_PRINT("\n%s]\n", ib
+ 1);
746 if (ndo
->ndo_vflag
>= 3) {
747 int ilvl
= EXTRACT_BE_U_4(&ilv
->length
);
748 ND_PRINT("\n%s ILV: type %x length %d\n", ib
+ 1,
749 EXTRACT_BE_U_4(&ilv
->type
), ilvl
);
750 hex_print_with_offset(ndo
, "\t\t[", tdp
, ilvl
-ILV_HDRL
, 0);
753 ilv
= GO_NXT_ILV(ilv
, rlen
);
759 ND_PRINT("%s", tstr
);
764 sdatatlv_print(netdissect_options
*ndo
,
765 const u_char
* pptr
, u_int len
,
766 uint16_t op_msk
, int indent
)
768 const struct forces_tlv
*tlv
= (const struct forces_tlv
*)pptr
;
770 const u_char
*tdp
= (const u_char
*) TLV_DATA(tlv
);
774 * pdatacnt_print() has ensured that len (the TLV length)
777 rlen
= len
- TLV_HDRL
;
779 type
= EXTRACT_BE_U_2(&tlv
->type
);
780 if (type
!= F_TLV_SPAD
) {
781 ND_PRINT("Error: expecting SPARSEDATA!\n");
785 return sdatailv_print(ndo
, tdp
, rlen
, op_msk
, indent
);
788 ND_PRINT("%s", tstr
);
793 pkeyitlv_print(netdissect_options
*ndo
,
794 const u_char
* pptr
, u_int len
,
795 uint16_t op_msk
, int indent
)
797 const struct forces_tlv
*tlv
= (const struct forces_tlv
*)pptr
;
798 const u_char
*tdp
= (const u_char
*) TLV_DATA(tlv
);
799 const u_char
*dp
= tdp
+ 4;
800 const struct forces_tlv
*kdtlv
= (const struct forces_tlv
*)dp
;
802 char *ib
= indent_pr(indent
, 0);
807 id
= EXTRACT_BE_U_4(tdp
);
808 ND_PRINT("%sKeyinfo: Key 0x%x\n", ib
, id
);
809 ND_TCHECK_SIZE(kdtlv
);
810 type
= EXTRACT_BE_U_2(&kdtlv
->type
);
811 invtlv
= tlv_valid(kdtlv
, len
);
814 ND_PRINT("%s TLV type 0x%x len %d\n",
815 tok2str(ForCES_TLV_err
, NULL
, invtlv
), type
,
816 EXTRACT_BE_U_2(&kdtlv
->length
));
820 * At this point, tlv_valid() has ensured that the TLV
821 * length is large enough but not too large (it doesn't
822 * go past the end of the containing TLV).
824 tll
= EXTRACT_BE_U_2(&kdtlv
->length
);
825 dp
= (const u_char
*) TLV_DATA(kdtlv
);
826 return fdatatlv_print(ndo
, dp
, tll
, op_msk
, indent
);
829 ND_PRINT("%s", tstr
);
833 #define PTH_DESC_SIZE 12
836 pdatacnt_print(netdissect_options
*ndo
,
837 const u_char
* pptr
, u_int len
,
838 uint16_t IDcnt
, uint16_t op_msk
, int indent
)
842 char *ib
= indent_pr(indent
, 0);
844 if ((op_msk
& B_APPND
) && ndo
->ndo_vflag
>= 3) {
845 ND_PRINT("%sTABLE APPEND\n", ib
);
847 for (i
= 0; i
< IDcnt
; i
++) {
851 id
= EXTRACT_BE_U_4(pptr
);
852 if (ndo
->ndo_vflag
>= 3)
853 ND_PRINT("%sID#%02u: %d\n", ib
, i
+ 1, id
);
858 if ((op_msk
& B_TRNG
) || (op_msk
& B_KEYIN
)) {
859 if (op_msk
& B_TRNG
) {
860 uint32_t starti
, endi
;
862 if (len
< PTH_DESC_SIZE
) {
863 ND_PRINT("pathlength %d with key/range too short %d\n",
868 pptr
+= sizeof(struct forces_tlv
);
869 len
-= sizeof(struct forces_tlv
);
871 starti
= EXTRACT_BE_U_4(pptr
);
875 endi
= EXTRACT_BE_U_4(pptr
);
879 if (ndo
->ndo_vflag
>= 3)
880 ND_PRINT("%sTable range: [%d,%d]\n", ib
, starti
, endi
);
883 if (op_msk
& B_KEYIN
) {
884 const struct forces_tlv
*keytlv
;
887 if (len
< PTH_DESC_SIZE
) {
888 ND_PRINT("pathlength %d with key/range too short %d\n",
896 keytlv
= (const struct forces_tlv
*)pptr
;
898 pptr
+= sizeof(struct forces_tlv
);
899 len
-= sizeof(struct forces_tlv
);
900 /* skip key content */
901 tll
= EXTRACT_BE_U_2(&keytlv
->length
);
902 if (tll
< TLV_HDRL
) {
903 ND_PRINT("key content length %u < %u\n",
909 ND_PRINT("key content too short\n");
919 const struct forces_tlv
*pdtlv
= (const struct forces_tlv
*)pptr
;
926 ND_TCHECK_SIZE(pdtlv
);
927 type
= EXTRACT_BE_U_2(&pdtlv
->type
);
928 invtlv
= tlv_valid(pdtlv
, len
);
930 ND_PRINT("%s Outstanding bytes %d for TLV type 0x%x TLV len %d\n",
931 tok2str(ForCES_TLV_err
, NULL
, invtlv
), len
, type
,
932 EXTRACT_BE_U_2(&pdtlv
->length
));
936 * At this point, tlv_valid() has ensured that the TLV
937 * length is large enough but not too large (it doesn't
938 * go past the end of the containing TLV).
940 tll
= EXTRACT_BE_U_2(&pdtlv
->length
) - TLV_HDRL
;
941 aln
= F_ALN_LEN(EXTRACT_BE_U_2(&pdtlv
->length
));
942 if (aln
> EXTRACT_BE_U_2(&pdtlv
->length
)) {
944 ND_PRINT("Invalid padded pathdata TLV type 0x%x len %d missing %d pad bytes\n",
945 type
, EXTRACT_BE_U_2(&pdtlv
->length
), aln
- len
);
947 pad
= aln
- EXTRACT_BE_U_2(&pdtlv
->length
);
950 if (pd_valid(type
)) {
951 const struct pdata_ops
*ops
= get_forces_pd(type
);
953 if (ndo
->ndo_vflag
>= 3 && ops
->v
!= F_TLV_PDAT
) {
955 ND_PRINT("%s %s (Length %d DataLen %d pad %d Bytes)\n",
956 ib
, ops
->s
, EXTRACT_BE_U_2(&pdtlv
->length
), tll
, pad
);
958 ND_PRINT("%s %s (Length %d DataLen %d Bytes)\n",
959 ib
, ops
->s
, EXTRACT_BE_U_2(&pdtlv
->length
), tll
);
962 chk_op_type(ndo
, type
, op_msk
, ops
->op_msk
);
964 if (ops
->print(ndo
, (const u_char
*)pdtlv
,
965 tll
+ pad
+ TLV_HDRL
, op_msk
,
968 len
-= (TLV_HDRL
+ pad
+ tll
);
970 ND_PRINT("Invalid path data content type 0x%x len %d\n",
971 type
, EXTRACT_BE_U_2(&pdtlv
->length
));
973 if (EXTRACT_BE_U_2(&pdtlv
->length
)) {
974 hex_print_with_offset(ndo
, "Bad Data val\n\t [",
985 ND_PRINT("%s", tstr
);
990 pdata_print(netdissect_options
*ndo
,
991 const u_char
* pptr
, u_int len
,
992 uint16_t op_msk
, int indent
)
994 const struct pathdata_h
*pdh
= (const struct pathdata_h
*)pptr
;
995 char *ib
= indent_pr(indent
, 0);
1000 ND_TCHECK_SIZE(pdh
);
1001 if (len
< sizeof(struct pathdata_h
))
1003 if (ndo
->ndo_vflag
>= 3) {
1004 ND_PRINT("\n%sPathdata: Flags 0x%x ID count %d\n",
1005 ib
, EXTRACT_BE_U_2(&pdh
->pflags
), EXTRACT_BE_U_2(&pdh
->pIDcnt
));
1008 if (EXTRACT_BE_U_2(&pdh
->pflags
) & F_SELKEY
) {
1012 /* Table GET Range operation */
1013 if (EXTRACT_BE_U_2(&pdh
->pflags
) & F_SELTABRANGE
) {
1016 /* Table SET append operation */
1017 if (EXTRACT_BE_U_2(&pdh
->pflags
) & F_TABAPPEND
) {
1021 pptr
+= sizeof(struct pathdata_h
);
1022 len
-= sizeof(struct pathdata_h
);
1023 idcnt
= EXTRACT_BE_U_2(&pdh
->pIDcnt
);
1024 minsize
= idcnt
* 4;
1025 if (len
< minsize
) {
1026 ND_PRINT("\t\t\ttruncated IDs expected %uB got %uB\n", minsize
,
1028 hex_print_with_offset(ndo
, "\t\t\tID Data[", pptr
, len
, 0);
1033 if ((op_msk
& B_TRNG
) && (op_msk
& B_KEYIN
)) {
1034 ND_PRINT("\t\t\tIllegal to have both Table ranges and keys\n");
1038 more_pd
= pdatacnt_print(ndo
, pptr
, len
, idcnt
, op_msk
, indent
);
1040 int consumed
= len
- more_pd
;
1043 /* XXX: Argh, recurse some more */
1044 return recpdoptlv_print(ndo
, pptr
, len
, op_msk
, indent
+1);
1049 ND_PRINT("%s", tstr
);
1054 genoptlv_print(netdissect_options
*ndo
,
1055 const u_char
* pptr
, u_int len
,
1056 uint16_t op_msk
, int indent
)
1058 const struct forces_tlv
*pdtlv
= (const struct forces_tlv
*)pptr
;
1062 char *ib
= indent_pr(indent
, 0);
1064 ND_TCHECK_SIZE(pdtlv
);
1065 type
= EXTRACT_BE_U_2(&pdtlv
->type
);
1066 tll
= EXTRACT_BE_U_2(&pdtlv
->length
) - TLV_HDRL
;
1067 invtlv
= tlv_valid(pdtlv
, len
);
1068 ND_PRINT("genoptlvprint - %s TLV type 0x%x len %d\n",
1069 tok2str(ForCES_TLV
, NULL
, type
), type
, EXTRACT_BE_U_2(&pdtlv
->length
));
1072 * At this point, tlv_valid() has ensured that the TLV
1073 * length is large enough but not too large (it doesn't
1074 * go past the end of the containing TLV).
1076 const u_char
*dp
= (const u_char
*) TLV_DATA(pdtlv
);
1077 if (!ttlv_valid(type
)) {
1078 ND_PRINT("%s TLV type 0x%x len %d\n",
1079 tok2str(ForCES_TLV_err
, NULL
, invtlv
), type
,
1080 EXTRACT_BE_U_2(&pdtlv
->length
));
1083 if (ndo
->ndo_vflag
>= 3)
1084 ND_PRINT("%s%s, length %d (data length %d Bytes)",
1085 ib
, tok2str(ForCES_TLV
, NULL
, type
),
1086 EXTRACT_BE_U_2(&pdtlv
->length
), tll
);
1088 return pdata_print(ndo
, dp
, tll
, op_msk
, indent
+ 1);
1090 ND_PRINT("\t\t\tInvalid ForCES TLV type=%x", type
);
1095 ND_PRINT("%s", tstr
);
1100 recpdoptlv_print(netdissect_options
*ndo
,
1101 const u_char
* pptr
, u_int len
,
1102 uint16_t op_msk
, int indent
)
1104 const struct forces_tlv
*pdtlv
= (const struct forces_tlv
*)pptr
;
1112 ND_TCHECK_SIZE(pdtlv
);
1113 invtlv
= tlv_valid(pdtlv
, len
);
1119 * At this point, tlv_valid() has ensured that the TLV
1120 * length is large enough but not too large (it doesn't
1121 * go past the end of the containing TLV).
1123 ib
= indent_pr(indent
, 0);
1124 type
= EXTRACT_BE_U_2(&pdtlv
->type
);
1125 dp
= (const u_char
*) TLV_DATA(pdtlv
);
1126 tll
= EXTRACT_BE_U_2(&pdtlv
->length
) - TLV_HDRL
;
1128 if (ndo
->ndo_vflag
>= 3)
1129 ND_PRINT("%s%s, length %d (data encapsulated %d Bytes)",
1130 ib
, tok2str(ForCES_TLV
, NULL
, type
),
1131 EXTRACT_BE_U_2(&pdtlv
->length
),
1132 EXTRACT_BE_U_2(&pdtlv
->length
) - TLV_HDRL
);
1134 if (pdata_print(ndo
, dp
, tll
, op_msk
, indent
+ 1) == -1)
1136 pdtlv
= GO_NXT_TLV(pdtlv
, len
);
1140 ND_PRINT("\n\t\tMessy PATHDATA TLV header, type (0x%x)\n\t\texcess of %d Bytes ",
1141 EXTRACT_BE_U_2(&pdtlv
->type
), len
- EXTRACT_BE_U_2(&pdtlv
->length
));
1148 ND_PRINT("%s", tstr
);
1153 invoptlv_print(netdissect_options
*ndo
,
1154 const u_char
* pptr
, u_int len
,
1155 uint16_t op_msk _U_
, int indent
)
1157 char *ib
= indent_pr(indent
, 1);
1159 if (ndo
->ndo_vflag
>= 3) {
1160 ND_PRINT("%sData[", ib
+ 1);
1161 hex_print_with_offset(ndo
, ib
, pptr
, len
, 0);
1162 ND_PRINT("%s]\n", ib
);
1168 otlv_print(netdissect_options
*ndo
,
1169 const struct forces_tlv
*otlv
, uint16_t op_msk _U_
, int indent
)
1172 const u_char
*dp
= (const u_char
*) TLV_DATA(otlv
);
1175 char *ib
= indent_pr(indent
, 0);
1176 const struct optlv_h
*ops
;
1179 * lfbselect_print() has ensured that EXTRACT_BE_U_2(&otlv->length)
1182 ND_TCHECK_SIZE(otlv
);
1183 type
= EXTRACT_BE_U_2(&otlv
->type
);
1184 tll
= EXTRACT_BE_U_2(&otlv
->length
) - TLV_HDRL
;
1185 ops
= get_forces_optlv_h(type
);
1186 if (ndo
->ndo_vflag
>= 3) {
1187 ND_PRINT("%sOper TLV %s(0x%x) length %d\n", ib
, ops
->s
, type
,
1188 EXTRACT_BE_U_2(&otlv
->length
));
1190 /* rest of ops must at least have 12B {pathinfo} */
1191 if (tll
< OP_MIN_SIZ
) {
1192 ND_PRINT("\t\tOper TLV %s(0x%x) length %d\n", ops
->s
, type
,
1193 EXTRACT_BE_U_2(&otlv
->length
));
1194 ND_PRINT("\t\tTruncated data size %d minimum required %d\n", tll
,
1196 return invoptlv_print(ndo
, dp
, tll
, ops
->op_msk
, indent
);
1200 /* XXX - do anything with ops->flags? */
1202 rc
= ops
->print(ndo
, dp
, tll
, ops
->op_msk
, indent
+ 1);
1207 ND_PRINT("%s", tstr
);
1214 asttlv_print(netdissect_options
*ndo
,
1215 const u_char
* pptr
, u_int len
,
1216 uint16_t op_msk _U_
, int indent
)
1220 char *ib
= indent_pr(indent
, 0);
1223 * forces_type_print() has ensured that len (the TLV length)
1226 dlen
= len
- TLV_HDRL
;
1227 if (dlen
!= ASTDLN
) {
1228 ND_PRINT("illegal ASTresult-TLV: %d bytes!\n", dlen
);
1232 rescode
= EXTRACT_BE_U_4(pptr
);
1233 if (rescode
> ASTMCD
) {
1234 ND_PRINT("illegal ASTresult result code: %d!\n", rescode
);
1238 if (ndo
->ndo_vflag
>= 3) {
1239 ND_PRINT("Teardown reason:\n%s", ib
);
1242 ND_PRINT("Normal Teardown");
1245 ND_PRINT("Loss of Heartbeats");
1248 ND_PRINT("Out of bandwidth");
1251 ND_PRINT("Out of Memory");
1254 ND_PRINT("Application Crash");
1257 ND_PRINT("Unknown Teardown reason");
1260 ND_PRINT("(%x)\n%s", rescode
, ib
);
1265 ND_PRINT("%s", tstr
);
1272 asrtlv_print(netdissect_options
*ndo
,
1273 const u_char
* pptr
, u_int len
,
1274 uint16_t op_msk _U_
, int indent
)
1278 char *ib
= indent_pr(indent
, 0);
1281 * forces_type_print() has ensured that len (the TLV length)
1284 dlen
= len
- TLV_HDRL
;
1285 if (dlen
!= ASRDLN
) { /* id, instance, oper tlv */
1286 ND_PRINT("illegal ASRresult-TLV: %d bytes!\n", dlen
);
1290 rescode
= EXTRACT_BE_U_4(pptr
);
1292 if (rescode
> ASRMCD
) {
1293 ND_PRINT("illegal ASRresult result code: %d!\n", rescode
);
1297 if (ndo
->ndo_vflag
>= 3) {
1298 ND_PRINT("\n%s", ib
);
1301 ND_PRINT("Success ");
1304 ND_PRINT("FE ID invalid ");
1307 ND_PRINT("permission denied ");
1310 ND_PRINT("Unknown ");
1313 ND_PRINT("(%x)\n%s", rescode
, ib
);
1318 ND_PRINT("%s", tstr
);
1327 gentltlv_print(netdissect_options
*ndo
,
1328 const u_char
* pptr _U_
, u_int len
,
1329 uint16_t op_msk _U_
, int indent _U_
)
1331 u_int dlen
= len
- TLV_HDRL
;
1333 if (dlen
< 4) { /* at least 32 bits must exist */
1334 ND_PRINT("truncated TLV: %d bytes missing! ", 4 - dlen
);
1344 print_metailv(netdissect_options
*ndo
,
1345 const u_char
* pptr
, uint16_t op_msk _U_
, int indent
)
1348 char *ib
= indent_pr(indent
, 0);
1349 /* XXX: check header length */
1350 const struct forces_ilv
*ilv
= (const struct forces_ilv
*)pptr
;
1353 * print_metatlv() has ensured that len (what remains in the
1356 rlen
= EXTRACT_BE_U_4(&ilv
->length
) - ILV_HDRL
;
1357 ND_TCHECK_SIZE(ilv
);
1358 ND_PRINT("%sMetaID 0x%x length %d\n", ib
, EXTRACT_BE_U_4(&ilv
->type
),
1359 EXTRACT_BE_U_4(&ilv
->length
));
1360 if (ndo
->ndo_vflag
>= 3) {
1361 hex_print_with_offset(ndo
, "\t\t[", ILV_DATA(ilv
), rlen
, 0);
1367 ND_PRINT("%s", tstr
);
1372 print_metatlv(netdissect_options
*ndo
,
1373 const u_char
* pptr
, u_int len
,
1374 uint16_t op_msk _U_
, int indent
)
1377 char *ib
= indent_pr(indent
, 0);
1379 const struct forces_ilv
*ilv
= (const struct forces_ilv
*)pptr
;
1383 * redirect_print() has ensured that len (what remains in the
1386 dlen
= len
- TLV_HDRL
;
1388 ND_PRINT("\n%s METADATA length %d \n", ib
, rlen
);
1390 ND_TCHECK_SIZE(ilv
);
1391 invilv
= ilv_valid(ilv
, rlen
);
1397 * At this point, ilv_valid() has ensured that the ILV
1398 * length is large enough but not too large (it doesn't
1399 * go past the end of the containing TLV).
1401 print_metailv(ndo
, (const u_char
*) ilv
, 0, indent
+ 1);
1402 ilv
= GO_NXT_ILV(ilv
, rlen
);
1408 ND_PRINT("%s", tstr
);
1414 print_reddata(netdissect_options
*ndo
,
1415 const u_char
* pptr
, u_int len
,
1416 uint16_t op_msk _U_
, int indent
)
1419 char *ib
= indent_pr(indent
, 0);
1422 dlen
= len
- TLV_HDRL
;
1424 ND_PRINT("\n%s Redirect Data length %d \n", ib
, rlen
);
1426 if (ndo
->ndo_vflag
>= 3) {
1428 hex_print_with_offset(ndo
, "\n\t\t", pptr
, rlen
, 0);
1429 ND_PRINT("\n\t\t]");
1436 redirect_print(netdissect_options
*ndo
,
1437 const u_char
* pptr
, u_int len
,
1438 uint16_t op_msk _U_
, int indent
)
1440 const struct forces_tlv
*tlv
= (const struct forces_tlv
*)pptr
;
1446 * forces_type_print() has ensured that len (the TLV length)
1449 dlen
= len
- TLV_HDRL
;
1450 if (dlen
<= RD_MIN
) {
1451 ND_PRINT("\n\t\ttruncated Redirect TLV: %d bytes missing! ",
1459 ND_TCHECK_SIZE(tlv
);
1460 invtlv
= tlv_valid(tlv
, rlen
);
1462 ND_PRINT("Bad Redirect data\n");
1467 * At this point, tlv_valid() has ensured that the TLV
1468 * length is large enough but not too large (it doesn't
1469 * go past the end of the containing TLV).
1471 if (EXTRACT_BE_U_2(&tlv
->type
) == F_TLV_METD
) {
1472 print_metatlv(ndo
, (const u_char
*) TLV_DATA(tlv
),
1473 EXTRACT_BE_U_2(&tlv
->length
), 0,
1475 } else if ((EXTRACT_BE_U_2(&tlv
->type
) == F_TLV_REDD
)) {
1476 print_reddata(ndo
, (const u_char
*) TLV_DATA(tlv
),
1477 EXTRACT_BE_U_2(&tlv
->length
), 0,
1480 ND_PRINT("Unknown REDIRECT TLV 0x%x len %d\n",
1481 EXTRACT_BE_U_2(&tlv
->type
),
1482 EXTRACT_BE_U_2(&tlv
->length
));
1485 tlv
= GO_NXT_TLV(tlv
, rlen
);
1489 ND_PRINT("\n\t\tMessy Redirect TLV header, type (0x%x)\n\t\texcess of %d Bytes ",
1490 EXTRACT_BE_U_2(&tlv
->type
),
1491 rlen
- EXTRACT_BE_U_2(&tlv
->length
));
1498 ND_PRINT("%s", tstr
);
1506 lfbselect_print(netdissect_options
*ndo
,
1507 const u_char
* pptr
, u_int len
,
1508 uint16_t op_msk
, int indent
)
1510 const struct forces_lfbsh
*lfbs
;
1511 const struct forces_tlv
*otlv
;
1512 char *ib
= indent_pr(indent
, 0);
1518 * forces_type_print() has ensured that len (the TLV length)
1521 dlen
= len
- TLV_HDRL
;
1522 if (dlen
<= OP_MIN
) { /* id, instance, oper tlv header .. */
1523 ND_PRINT("\n\t\ttruncated lfb selector: %d bytes missing! ",
1529 * At this point, we know that dlen > OP_MIN; OP_OFF < OP_MIN, so
1530 * we also know that it's > OP_OFF.
1532 rlen
= dlen
- OP_OFF
;
1534 lfbs
= (const struct forces_lfbsh
*)pptr
;
1535 ND_TCHECK_SIZE(lfbs
);
1536 if (ndo
->ndo_vflag
>= 3) {
1537 ND_PRINT("\n%s%s(Classid %x) instance %x\n",
1538 ib
, tok2str(ForCES_LFBs
, NULL
, EXTRACT_BE_U_4(&lfbs
->class)),
1539 EXTRACT_BE_U_4(&lfbs
->class),
1540 EXTRACT_BE_U_4(&lfbs
->instance
));
1543 otlv
= (const struct forces_tlv
*)(lfbs
+ 1);
1547 ND_TCHECK_SIZE(otlv
);
1548 invtlv
= tlv_valid(otlv
, rlen
);
1553 * At this point, tlv_valid() has ensured that the TLV
1554 * length is large enough but not too large (it doesn't
1555 * go past the end of the containing TLV).
1557 if (op_valid(EXTRACT_BE_U_2(&otlv
->type
), op_msk
)) {
1558 otlv_print(ndo
, otlv
, 0, indent
);
1560 if (ndo
->ndo_vflag
< 3)
1562 ND_PRINT("\t\tINValid oper-TLV type 0x%x length %d for this ForCES message\n",
1563 EXTRACT_BE_U_2(&otlv
->type
), EXTRACT_BE_U_2(&otlv
->length
));
1564 invoptlv_print(ndo
, (const u_char
*)otlv
, rlen
, 0, indent
);
1566 otlv
= GO_NXT_TLV(otlv
, rlen
);
1570 ND_PRINT("\n\t\tMessy oper TLV header, type (0x%x)\n\t\texcess of %d Bytes ",
1571 EXTRACT_BE_U_2(&otlv
->type
), rlen
- EXTRACT_BE_U_2(&otlv
->length
));
1578 ND_PRINT("%s", tstr
);
1583 forces_type_print(netdissect_options
*ndo
,
1584 const u_char
* pptr
, const struct forcesh
*fhdr _U_
,
1585 u_int mlen
, const struct tom_h
*tops
)
1587 const struct forces_tlv
*tltlv
;
1594 * forces_print() has already checked that mlen >= ForCES_HDRL
1595 * by calling ForCES_HLN_VALID().
1597 rlen
= mlen
- ForCES_HDRL
;
1599 if (rlen
> TLV_HLN
) {
1600 if (tops
->flags
& ZERO_TTLV
) {
1601 ND_PRINT("<0x%x>Illegal Top level TLV!\n", tops
->flags
);
1605 if (tops
->flags
& ZERO_MORE_TTLV
)
1607 if (tops
->flags
& ONE_MORE_TTLV
) {
1608 ND_PRINT("\tTop level TLV Data missing!\n");
1613 if (tops
->flags
& ZERO_TTLV
) {
1617 ttlv
= tops
->flags
>> 4;
1618 tltlv
= GET_TOP_TLV(pptr
);
1620 /*XXX: 15 top level tlvs will probably be fine
1621 You are nuts if you send more ;-> */
1623 ND_TCHECK_SIZE(tltlv
);
1624 invtlv
= tlv_valid(tltlv
, rlen
);
1629 * At this point, tlv_valid() has ensured that the TLV
1630 * length is large enough but not too large (it doesn't
1631 * go past the end of the packet).
1633 if (!ttlv_valid(EXTRACT_BE_U_2(&tltlv
->type
))) {
1634 ND_PRINT("\n\tInvalid ForCES Top TLV type=0x%x",
1635 EXTRACT_BE_U_2(&tltlv
->type
));
1639 if (ndo
->ndo_vflag
>= 3)
1640 ND_PRINT("\t%s, length %d (data length %d Bytes)",
1641 tok2str(ForCES_TLV
, NULL
, EXTRACT_BE_U_2(&tltlv
->type
)),
1642 EXTRACT_BE_U_2(&tltlv
->length
),
1643 EXTRACT_BE_U_2(&tltlv
->length
) - TLV_HDRL
);
1645 rc
= tops
->print(ndo
, (const u_char
*) TLV_DATA(tltlv
),
1646 EXTRACT_BE_U_2(&tltlv
->length
),
1651 tltlv
= GO_NXT_TLV(tltlv
, rlen
);
1657 * XXX - if ttlv != 0, does that mean that the packet was too
1658 * short, and didn't have *enough* TLVs in it?
1661 ND_PRINT("\tMess TopTLV header: min %u, total %d advertised %d ",
1662 TLV_HDRL
, rlen
, EXTRACT_BE_U_2(&tltlv
->length
));
1669 ND_PRINT("%s", tstr
);
1674 forces_print(netdissect_options
*ndo
,
1675 const u_char
* pptr
, u_int len
)
1677 const struct forcesh
*fhdr
;
1681 const struct tom_h
*tops
;
1684 fhdr
= (const struct forcesh
*)pptr
;
1685 ND_TCHECK_SIZE(fhdr
);
1686 tom
= EXTRACT_U_1(fhdr
->fm_tom
);
1687 if (!tom_valid(tom
)) {
1688 ND_PRINT("Invalid ForCES message type %d\n", tom
);
1692 mlen
= ForCES_BLN(fhdr
);
1694 tops
= get_forces_tom(tom
);
1695 if (tops
->v
== TOM_RSVD
) {
1696 ND_PRINT("\n\tUnknown ForCES message type=0x%x", tom
);
1700 ND_PRINT("\n\tForCES %s ", tops
->s
);
1701 if (!ForCES_HLN_VALID(mlen
, len
)) {
1702 ND_PRINT("Illegal ForCES pkt len - min %u, total recvd %d, advertised %d ",
1703 ForCES_HDRL
, len
, ForCES_BLN(fhdr
));
1707 ND_TCHECK_4(pptr
+ 20);
1708 flg_raw
= EXTRACT_BE_U_4(pptr
+ 20);
1709 if (ndo
->ndo_vflag
>= 1) {
1710 ND_PRINT("\n\tForCES Version %d len %uB flags 0x%08x ",
1711 ForCES_V(fhdr
), mlen
, flg_raw
);
1712 ND_PRINT("\n\tSrcID 0x%x(%s) DstID 0x%x(%s) Correlator 0x%" PRIx64
,
1713 ForCES_SID(fhdr
), ForCES_node(ForCES_SID(fhdr
)),
1714 ForCES_DID(fhdr
), ForCES_node(ForCES_DID(fhdr
)),
1715 EXTRACT_BE_U_8(fhdr
->fm_cor
));
1718 if (ndo
->ndo_vflag
>= 2) {
1719 ND_PRINT("\n\tForCES flags:\n\t %s(0x%x), prio=%d, %s(0x%x),\n\t %s(0x%x), %s(0x%x)\n",
1720 tok2str(ForCES_ACKs
, "ACKUnknown", ForCES_ACK(fhdr
)),
1723 tok2str(ForCES_EMs
, "EMUnknown", ForCES_EM(fhdr
)),
1725 tok2str(ForCES_ATs
, "ATUnknown", ForCES_AT(fhdr
)),
1727 tok2str(ForCES_TPs
, "TPUnknown", ForCES_TP(fhdr
)),
1729 ND_PRINT("\t Extra flags: rsv(b5-7) 0x%x rsv(b13-31) 0x%x\n",
1730 ForCES_RS1(fhdr
), ForCES_RS2(fhdr
));
1732 rc
= forces_type_print(ndo
, pptr
, fhdr
, mlen
, tops
);
1735 hex_print_with_offset(ndo
, "\n\t[", pptr
, len
, 0);
1740 if (ndo
->ndo_vflag
>= 4) {
1741 ND_PRINT("\n\t Raw ForCES message\n\t [");
1742 hex_print_with_offset(ndo
, "\n\t ", pptr
, len
, 0);
1749 ND_PRINT("%s", tstr
);
1753 * c-style: whitesmith