cap_offset=2;
while (tcap_len != 0) {
if (tcap_len < 4) {
- ND_PRINT("\n\t\t(invalid)");
+ nd_print_invalid(ndo);
break;
}
ND_PRINT("\n\t\tAFI %s (%u), SAFI %s (%u), Send/Receive: %s",
hlen = EXTRACT_BE_U_2(bgp_header->bgp_len);
if (hlen < BGP_SIZE) {
- ND_PRINT("\n[|BGP Bogus header length %u < %u]", hlen,
- BGP_SIZE);
+ ND_PRINT("\nmessage length %u < %u", hlen, BGP_SIZE);
+ nd_print_invalid(ndo);
break;
}