2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
13 * Copyright (c) 2009 Mojatatu Networks, Inc
17 #define NETDISSECT_REWORKED
22 #include <tcpdump-stdinc.h>
24 #include "interface.h"
27 static const char tstr[] = "[|forces]";
30 * Per draft-ietf-forces-protocol-22
33 #define ForCES_HDRL 24
34 #define ForCES_ALNL 4U
39 #define TOM_ASSNSETUP 0x1
40 #define TOM_ASSNTEARD 0x2
41 #define TOM_CONFIG 0x3
43 #define TOM_EVENTNOT 0x5
44 #define TOM_PKTREDIR 0x6
45 #define TOM_HEARTBT 0x0F
46 #define TOM_ASSNSETREP 0x11
47 #define TOM_CONFIGREP 0x13
48 #define TOM_QUERYREP 0x14
51 * tom_h Flags: resv1(8b):maxtlvs(4b):resv2(2b):mintlv(2b)
53 #define ZERO_TTLV 0x01
54 #define ZERO_MORE_TTLV 0x02
55 #define ONE_MORE_TTLV 0x04
61 #define TTLV_T1 (ONE_MORE_TTLV|ONE_TLV)
62 #define TTLV_T2 (ONE_MORE_TTLV|MAX_TLV)
69 int (*print) (netdissect_options *ndo, register const u_char * pptr, register u_int len,
70 uint16_t op_msk, int indent);
87 #define TOM_MAX_IND (_TOM_RSV_MAX - 1)
89 static inline int tom_valid(uint8_t tom)
92 if (tom >= 0x7 && tom <= 0xe)
103 static inline const char *ForCES_node(uint32_t node)
105 if (node <= 0x3FFFFFFF)
107 if (node >= 0x40000000 && node <= 0x7FFFFFFF)
109 if (node >= 0xC0000000 && node <= 0xFFFFFFEF)
110 return "AllMulticast";
111 if (node == 0xFFFFFFFD)
112 return "AllCEsBroadcast";
113 if (node == 0xFFFFFFFE)
114 return "AllFEsBroadcast";
115 if (node == 0xFFFFFFFF)
116 return "AllBroadcast";
118 return "ForCESreserved";
122 static const struct tok ForCES_ACKs[] = {
130 static const struct tok ForCES_EMs[] = {
132 {0x1, "execute-all-or-none"},
133 {0x2, "execute-until-failure"},
134 {0x3, "continue-execute-on-failure"},
138 static const struct tok ForCES_ATs[] = {
140 {0x1, "2PCtransaction"},
144 static const struct tok ForCES_TPs[] = {
145 {0x0, "StartofTransaction"},
146 {0x1, "MiddleofTransaction"},
147 {0x2, "EndofTransaction"},
153 * Structure of forces header, naked of TLVs.
156 uint8_t fm_vrsvd; /* version and reserved */
157 #define ForCES_V(forcesh) ((forcesh)->fm_vrsvd >> 4)
158 uint8_t fm_tom; /* type of message */
159 uint16_t fm_len; /* total length * 4 bytes */
160 #define ForCES_BLN(forcesh) ((uint32_t)(EXTRACT_16BITS(&(forcesh)->fm_len) << 2))
161 uint32_t fm_sid; /* Source ID */
162 #define ForCES_SID(forcesh) EXTRACT_32BITS(&(forcesh)->fm_sid)
163 uint32_t fm_did; /* Destination ID */
164 #define ForCES_DID(forcesh) EXTRACT_32BITS(&(forcesh)->fm_did)
165 uint8_t fm_cor[8]; /* correlator */
166 uint32_t fm_flags; /* flags */
167 #define ForCES_ACK(forcesh) ((EXTRACT_32BITS(&(forcesh)->fm_flags)&0xC0000000) >> 30)
168 #define ForCES_PRI(forcesh) ((EXTRACT_32BITS(&(forcesh)->fm_flags)&0x38000000) >> 27)
169 #define ForCES_RS1(forcesh) ((EXTRACT_32BITS(&(forcesh)->fm_flags)&0x07000000) >> 24)
170 #define ForCES_EM(forcesh) ((EXTRACT_32BITS(&(forcesh)->fm_flags)&0x00C00000) >> 22)
171 #define ForCES_AT(forcesh) ((EXTRACT_32BITS(&(forcesh)->fm_flags)&0x00200000) >> 21)
172 #define ForCES_TP(forcesh) ((EXTRACT_32BITS(&(forcesh)->fm_flags)&0x00180000) >> 19)
173 #define ForCES_RS2(forcesh) ((EXTRACT_32BITS(&(forcesh)->fm_flags)&0x0007FFFF) >> 0)
176 #define ForCES_HLN_VALID(fhl,tlen) ((tlen) >= ForCES_HDRL && \
177 (fhl) >= ForCES_HDRL && \
180 #define F_LFB_RSVD 0x0
181 #define F_LFB_FEO 0x1
182 #define F_LFB_FEPO 0x2
183 static const struct tok ForCES_LFBs[] = {
184 {F_LFB_RSVD, "Invalid TLV"},
185 {F_LFB_FEO, "FEObj LFB"},
186 {F_LFB_FEPO, "FEProtoObj LFB"},
209 #define F_OP_MAX (_F_OP_MAX - 1)
211 B_OP_SET = 1 << (F_OP_SET - 1),
212 B_OP_SETPROP = 1 << (F_OP_SETPROP - 1),
213 B_OP_SETRESP = 1 << (F_OP_SETRESP - 1),
214 B_OP_SETPRESP = 1 << (F_OP_SETPRESP - 1),
215 B_OP_DEL = 1 << (F_OP_DEL - 1),
216 B_OP_DELRESP = 1 << (F_OP_DELRESP - 1),
217 B_OP_GET = 1 << (F_OP_GET - 1),
218 B_OP_GETPROP = 1 << (F_OP_GETPROP - 1),
219 B_OP_GETRESP = 1 << (F_OP_GETRESP - 1),
220 B_OP_GETPRESP = 1 << (F_OP_GETPRESP - 1),
221 B_OP_REPORT = 1 << (F_OP_REPORT - 1),
222 B_OP_COMMIT = 1 << (F_OP_COMMIT - 1),
223 B_OP_RCOMMIT = 1 << (F_OP_RCOMMIT - 1),
224 B_OP_RTRCOMP = 1 << (F_OP_RTRCOMP - 1),
231 int (*print) (netdissect_options *ndo, register const u_char * pptr, register u_int len,
232 uint16_t op_msk, int indent);
235 static int genoptlv_print(netdissect_options *, register const u_char * pptr, register u_int len,
236 uint16_t op_msk, int indent);
237 static int recpdoptlv_print(netdissect_options *, register const u_char * pptr, register u_int len,
238 uint16_t op_msk, int indent);
239 static int invoptlv_print(netdissect_options *, register const u_char * pptr, register u_int len,
240 uint16_t op_msk, int indent);
255 static const struct optlv_h OPTLV_msg[F_OP_MAX + 1] = {
256 /* F_OP_RSV */ {ZERO_TTLV, 0, "Invalid OPTLV", invoptlv_print},
257 /* F_OP_SET */ {TTLV_T2, B_FULLD | B_SPARD, " Set", recpdoptlv_print},
259 {TTLV_T2, B_FULLD | B_SPARD, " SetProp", recpdoptlv_print},
260 /* F_OP_SETRESP */ {TTLV_T2, B_RESTV, " SetResp", recpdoptlv_print},
261 /* F_OP_SETPRESP */ {TTLV_T2, B_RESTV, " SetPropResp", recpdoptlv_print},
262 /* F_OP_DEL */ {ZERO_TTLV, 0, " Del", recpdoptlv_print},
263 /* F_OP_DELRESP */ {TTLV_T2, B_RESTV, " DelResp", recpdoptlv_print},
264 /* F_OP_GET */ {ZERO_TTLV, 0, " Get", recpdoptlv_print},
265 /* F_OP_GETPROP */ {ZERO_TTLV, 0, " GetProp", recpdoptlv_print},
267 {TTLV_T2, B_FULLD | B_SPARD | B_RESTV, " GetResp", recpdoptlv_print},
269 {TTLV_T2, B_FULLD | B_RESTV, " GetPropResp", recpdoptlv_print},
271 {TTLV_T2, B_FULLD | B_SPARD, " Report", recpdoptlv_print},
272 /* F_OP_COMMIT */ {ZERO_TTLV, 0, " Commit", NULL},
273 /* F_OP_RCOMMIT */ {TTLV_T1, B_RESTV, " RCommit", genoptlv_print},
274 /* F_OP_RTRCOMP */ {ZERO_TTLV, 0, " RTRCOMP", NULL},
277 static inline const struct optlv_h *get_forces_optlv_h(uint16_t opt)
279 if (opt > F_OP_MAX || opt <= F_OP_RSV)
280 return &OPTLV_msg[F_OP_RSV];
282 return &OPTLV_msg[opt];
287 #define IND_PREF '\n'
289 char ind_buf[IND_SIZE];
291 static inline char *indent_pr(int indent, int nlpref)
296 if (indent > (IND_SIZE - 1))
297 indent = IND_SIZE - 1;
305 while (--indent >= 0)
312 static inline int op_valid(uint16_t op, uint16_t mask)
314 int opb = 1 << (op - 1);
320 /* I guess we should allow vendor operations? */
326 #define F_TLV_RSVD 0x0000
327 #define F_TLV_REDR 0x0001
328 #define F_TLV_ASRS 0x0010
329 #define F_TLV_ASRT 0x0011
330 #define F_TLV_LFBS 0x1000
331 #define F_TLV_PDAT 0x0110
332 #define F_TLV_KEYI 0x0111
333 #define F_TLV_FULD 0x0112
334 #define F_TLV_SPAD 0x0113
335 #define F_TLV_REST 0x0114
336 #define F_TLV_METD 0x0115
337 #define F_TLV_REDD 0x0116
338 #define F_TLV_TRNG 0x0117
341 #define F_TLV_VNST 0x8000
343 static const struct tok ForCES_TLV[] = {
344 {F_TLV_RSVD, "Invalid TLV"},
345 {F_TLV_REDR, "REDIRECT TLV"},
346 {F_TLV_ASRS, "ASResult TLV"},
347 {F_TLV_ASRT, "ASTreason TLV"},
348 {F_TLV_LFBS, "LFBselect TLV"},
349 {F_TLV_PDAT, "PATH-DATA TLV"},
350 {F_TLV_KEYI, "KEYINFO TLV"},
351 {F_TLV_FULD, "FULLDATA TLV"},
352 {F_TLV_SPAD, "SPARSEDATA TLV"},
353 {F_TLV_REST, "RESULT TLV"},
354 {F_TLV_METD, "METADATA TLV"},
355 {F_TLV_REDD, "REDIRECTDATA TLV"},
360 static inline int ttlv_valid(uint16_t ttlv)
363 if (ttlv == 1 || ttlv == 0x1000)
365 if (ttlv >= 0x10 && ttlv <= 0x11)
367 if (ttlv >= 0x110 && ttlv <= 0x116)
386 #define F_ALN_LEN(len) ( ((len)+ForCES_ALNL-1) & ~(ForCES_ALNL-1) )
387 #define GET_TOP_TLV(fhdr) ((struct forces_tlv *)((fhdr) + sizeof (struct forcesh)))
388 #define TLV_SET_LEN(len) (F_ALN_LEN(TLV_HDRL) + (len))
389 #define TLV_ALN_LEN(len) F_ALN_LEN(TLV_SET_LEN(len))
390 #define TLV_RDAT_LEN(tlv) ((int)(EXTRACT_16BITS(&(tlv)->length) - TLV_SET_LEN(0))
391 #define TLV_DATA(tlvp) ((void*)(((char*)(tlvp)) + TLV_SET_LEN(0)))
392 #define GO_NXT_TLV(tlv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_16BITS(&(tlv)->length)), \
393 (struct forces_tlv*)(((char*)(tlv)) \
394 + F_ALN_LEN(EXTRACT_16BITS(&(tlv)->length))))
395 #define ILV_SET_LEN(len) (F_ALN_LEN(ILV_HDRL) + (len))
396 #define ILV_ALN_LEN(len) F_ALN_LEN(ILV_SET_LEN(len))
397 #define ILV_RDAT_LEN(ilv) ((int)(EXTRACT_32BITS(&(ilv)->length)) - ILV_SET_LEN(0))
398 #define ILV_DATA(ilvp) ((void*)(((char*)(ilvp)) + ILV_SET_LEN(0)))
399 #define GO_NXT_ILV(ilv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_32BITS(&(ilv)->length)), \
400 (struct forces_ilv *)(((char*)(ilv)) \
401 + F_ALN_LEN(EXTRACT_32BITS(&(ilv)->length))))
402 #define INVALID_RLEN 1
403 #define INVALID_STLN 2
404 #define INVALID_LTLN 3
405 #define INVALID_ALEN 4
407 static const struct tok ForCES_TLV_err[] = {
408 {INVALID_RLEN, "Invalid total length"},
409 {INVALID_STLN, "xLV too short"},
410 {INVALID_LTLN, "xLV too long"},
411 {INVALID_ALEN, "data padding missing"},
415 static inline u_int tlv_valid(const struct forces_tlv *tlv, u_int rlen)
419 if (EXTRACT_16BITS(&tlv->length) < TLV_HDRL)
421 if (EXTRACT_16BITS(&tlv->length) > rlen)
423 if (rlen < F_ALN_LEN(EXTRACT_16BITS(&tlv->length)))
429 static inline int ilv_valid(const struct forces_ilv *ilv, u_int rlen)
433 if (EXTRACT_32BITS(&ilv->length) < ILV_HDRL)
435 if (EXTRACT_32BITS(&ilv->length) > rlen)
437 if (rlen < F_ALN_LEN(EXTRACT_32BITS(&ilv->length)))
443 static int lfbselect_print(netdissect_options *, register const u_char * pptr, register u_int len,
444 uint16_t op_msk, int indent);
445 static int redirect_print(netdissect_options *, register const u_char * pptr, register u_int len,
446 uint16_t op_msk, int indent);
447 static int asrtlv_print(netdissect_options *, register const u_char * pptr, register u_int len,
448 uint16_t op_msk, int indent);
449 static int asttlv_print(netdissect_options *, register const u_char * pptr, register u_int len,
450 uint16_t op_msk, int indent);
452 struct forces_lfbsh {
457 #define ASSNS_OPS (B_OP_REPORT)
458 #define CFG_OPS (B_OP_SET|B_OP_SETPROP|B_OP_DEL|B_OP_COMMIT|B_OP_RTRCOMP)
459 #define CFG_ROPS (B_OP_SETRESP|B_OP_SETPRESP|B_OP_DELRESP|B_OP_RCOMMIT)
460 #define CFG_QY (B_OP_GET|B_OP_GETPROP)
461 #define CFG_QYR (B_OP_GETRESP|B_OP_GETPRESP)
462 #define CFG_EVN (B_OP_REPORT)
464 static const struct tom_h ForCES_msg[TOM_MAX_IND + 1] = {
465 /* TOM_RSV_I */ {TOM_RSVD, ZERO_TTLV, 0, "Invalid message", NULL},
466 /* TOM_ASS_I */ {TOM_ASSNSETUP, ZERO_MORE_TTLV | TWO_TLV, ASSNS_OPS,
467 "Association Setup", lfbselect_print},
469 {TOM_ASSNTEARD, TTLV_T1, 0, "Association TearDown", asttlv_print},
470 /* TOM_CFG_I */ {TOM_CONFIG, TTLV_T2, CFG_OPS, "Config", lfbselect_print},
471 /* TOM_QRY_I */ {TOM_QUERY, TTLV_T2, CFG_QY, "Query", lfbselect_print},
472 /* TOM_EVN_I */ {TOM_EVENTNOT, TTLV_T1, CFG_EVN, "Event Notification",
475 {TOM_PKTREDIR, TTLV_T2, 0, "Packet Redirect", redirect_print},
476 /* TOM_HBT_I */ {TOM_HEARTBT, ZERO_TTLV, 0, "HeartBeat", NULL},
478 {TOM_ASSNSETREP, TTLV_T1, 0, "Association Response", asrtlv_print},
479 /* TOM_CNR_I */ {TOM_CONFIGREP, TTLV_T2, CFG_ROPS, "Config Response",
482 {TOM_QUERYREP, TTLV_T2, CFG_QYR, "Query Response", lfbselect_print},
485 static inline const struct tom_h *get_forces_tom(uint8_t tom)
488 for (i = TOM_RSV_I; i <= TOM_MAX_IND; i++) {
489 const struct tom_h *th = &ForCES_msg[i];
493 return &ForCES_msg[TOM_RSV_I];
501 int (*print) (netdissect_options *, register const u_char * pptr, register u_int len,
502 uint16_t op_msk, int indent);
514 #define PD_MAX_IND (_TOM_RSV_MAX - 1)
516 static inline int pd_valid(uint16_t pd)
518 if (pd >= F_TLV_PDAT && pd <= F_TLV_REST)
524 chk_op_type(netdissect_options *ndo,
525 uint16_t type, uint16_t msk, uint16_t omsk)
527 if (type != F_TLV_PDAT) {
529 if (type != F_TLV_KEYI) {
530 ND_PRINT((ndo, "Based on flags expected KEYINFO TLV!\n"));
534 ND_PRINT((ndo, "Illegal DATA encoding for type 0x%x programmed %x got %x \n",
543 #define F_SELTABRANGE 2
544 #define F_TABAPPEND 4
552 static int prestlv_print(netdissect_options *, register const u_char * pptr, register u_int len,
553 uint16_t op_msk, int indent);
554 static int pkeyitlv_print(netdissect_options *, register const u_char * pptr, register u_int len,
555 uint16_t op_msk, int indent);
556 static int fdatatlv_print(netdissect_options *, register const u_char * pptr, register u_int len,
557 uint16_t op_msk, int indent);
558 static int sdatatlv_print(netdissect_options *, register const u_char * pptr, register u_int len,
559 uint16_t op_msk, int indent);
561 static const struct pdata_ops ForCES_pdata[PD_MAX_IND + 1] = {
562 /* PD_RSV_I */ {0, 0, 0, "Invalid message", NULL},
563 /* PD_SEL_I */ {F_TLV_KEYI, 0, 0, "KEYINFO TLV", pkeyitlv_print},
564 /* PD_FDT_I */ {F_TLV_FULD, 0, B_FULLD, "FULLDATA TLV", fdatatlv_print},
565 /* PD_SDT_I */ {F_TLV_SPAD, 0, B_SPARD, "SPARSEDATA TLV", sdatatlv_print},
566 /* PD_RES_I */ {F_TLV_REST, 0, B_RESTV, "RESULT TLV", prestlv_print},
568 {F_TLV_PDAT, 0, 0, "Inner PATH-DATA TLV", recpdoptlv_print},
571 static inline const struct pdata_ops *get_forces_pd(uint16_t pd)
574 for (i = PD_RSV_I + 1; i <= PD_MAX_IND; i++) {
575 const struct pdata_ops *pdo = &ForCES_pdata[i];
579 return &ForCES_pdata[TOM_RSV_I];
587 E_INVALID_DESTINATION_PID,
590 E_LFB_INSTANCE_ID_NOT_FOUND,
592 E_COMPONENT_DOES_NOT_EXIST,
596 E_INVALID_ARRAY_CREATION,
597 E_VALUE_OUT_OF_RANGE,
599 E_INVALID_PARAMETERS,
600 E_INVALID_MESSAGE_TYPE,
607 /* 0x18-0xFE are reserved .. */
608 E_UNSPECIFIED_ERROR = 0XFF
611 static const struct tok ForCES_errs[] = {
612 {E_SUCCESS, "SUCCESS"},
613 {E_INVALID_HEADER, "INVALID HEADER"},
614 {E_LENGTH_MISMATCH, "LENGTH MISMATCH"},
615 {E_VERSION_MISMATCH, "VERSION MISMATCH"},
616 {E_INVALID_DESTINATION_PID, "INVALID DESTINATION PID"},
617 {E_LFB_UNKNOWN, "LFB UNKNOWN"},
618 {E_LFB_NOT_FOUND, "LFB NOT FOUND"},
619 {E_LFB_INSTANCE_ID_NOT_FOUND, "LFB INSTANCE ID NOT FOUND"},
620 {E_INVALID_PATH, "INVALID PATH"},
621 {E_COMPONENT_DOES_NOT_EXIST, "COMPONENT DOES NOT EXIST"},
622 {E_EXISTS, "EXISTS ALREADY"},
623 {E_NOT_FOUND, "NOT FOUND"},
624 {E_READ_ONLY, "READ ONLY"},
625 {E_INVALID_ARRAY_CREATION, "INVALID ARRAY CREATION"},
626 {E_VALUE_OUT_OF_RANGE, "VALUE OUT OF RANGE"},
627 {E_CONTENTS_TOO_LONG, "CONTENTS TOO LONG"},
628 {E_INVALID_PARAMETERS, "INVALID PARAMETERS"},
629 {E_INVALID_MESSAGE_TYPE, "INVALID MESSAGE TYPE"},
630 {E_INVALID_FLAGS, "INVALID FLAGS"},
631 {E_INVALID_TLV, "INVALID TLV"},
632 {E_EVENT_ERROR, "EVENT ERROR"},
633 {E_NOT_SUPPORTED, "NOT SUPPORTED"},
634 {E_MEMORY_ERROR, "MEMORY ERROR"},
635 {E_INTERNAL_ERROR, "INTERNAL ERROR"},
636 {E_UNSPECIFIED_ERROR, "UNSPECIFIED ERROR"},
643 prestlv_print(netdissect_options *ndo,
644 register const u_char * pptr, register u_int len,
645 uint16_t op_msk _U_, int indent)
647 const struct forces_tlv *tlv = (struct forces_tlv *)pptr;
648 register const u_char *tdp = (u_char *) TLV_DATA(tlv);
649 struct res_val *r = (struct res_val *)tdp;
653 * pdatacnt_print() has ensured that len (the TLV length)
656 dlen = len - TLV_HDRL;
657 if (dlen != RESLEN) {
658 ND_PRINT((ndo, "illegal RESULT-TLV: %d bytes!\n", dlen));
663 if (r->result >= 0x18 && r->result <= 0xFE) {
664 ND_PRINT((ndo, "illegal reserved result code: 0x%x!\n", r->result));
668 if (ndo->ndo_vflag >= 3) {
669 char *ib = indent_pr(indent, 0);
670 ND_PRINT((ndo, "%s Result: %s (code 0x%x)\n", ib,
671 tok2str(ForCES_errs, NULL, r->result), r->result));
676 ND_PRINT((ndo, "%s", tstr));
681 fdatatlv_print(netdissect_options *ndo,
682 register const u_char * pptr, register u_int len,
683 uint16_t op_msk _U_, int indent)
685 const struct forces_tlv *tlv = (struct forces_tlv *)pptr;
687 register const u_char *tdp = (u_char *) TLV_DATA(tlv);
691 * pdatacnt_print() or pkeyitlv_print() has ensured that len
692 * (the TLV length) >= TLV_HDRL.
694 rlen = len - TLV_HDRL;
696 type = EXTRACT_16BITS(&tlv->type);
697 if (type != F_TLV_FULD) {
698 ND_PRINT((ndo, "Error: expecting FULLDATA!\n"));
702 if (ndo->ndo_vflag >= 3) {
703 char *ib = indent_pr(indent + 2, 1);
704 ND_PRINT((ndo, "%s[", &ib[1]));
705 hex_print_with_offset(ndo, ib, tdp, rlen, 0);
706 ND_PRINT((ndo, "\n%s]\n", &ib[1]));
711 ND_PRINT((ndo, "%s", tstr));
716 sdatailv_print(netdissect_options *ndo,
717 register const u_char * pptr, register u_int len,
718 uint16_t op_msk _U_, int indent)
721 const struct forces_ilv *ilv = (struct forces_ilv *)pptr;
724 if (len < ILV_HDRL) {
725 ND_PRINT((ndo, "Error: BAD SPARSEDATA-TLV!\n"));
732 ND_PRINT((ndo, "Jamal - outstanding length <%d>\n", rlen));
734 char *ib = indent_pr(indent, 1);
735 register const u_char *tdp = (u_char *) ILV_DATA(ilv);
737 invilv = ilv_valid(ilv, rlen);
739 ND_PRINT((ndo, "%s[", &ib[1]));
740 hex_print_with_offset(ndo, ib, tdp, rlen, 0);
741 ND_PRINT((ndo, "\n%s]\n", &ib[1]));
744 if (ndo->ndo_vflag >= 3) {
745 int ilvl = EXTRACT_32BITS(&ilv->length);
746 ND_PRINT((ndo, "\n%s ILV: type %x length %d\n", &ib[1],
747 EXTRACT_32BITS(&ilv->type), ilvl));
748 hex_print_with_offset(ndo, "\t\t[", tdp, ilvl-ILV_HDRL, 0);
751 ilv = GO_NXT_ILV(ilv, rlen);
757 ND_PRINT((ndo, "%s", tstr));
762 sdatatlv_print(netdissect_options *ndo,
763 register const u_char * pptr, register u_int len,
764 uint16_t op_msk, int indent)
766 const struct forces_tlv *tlv = (struct forces_tlv *)pptr;
768 register const u_char *tdp = (u_char *) TLV_DATA(tlv);
772 * pdatacnt_print() has ensured that len (the TLV length)
775 rlen = len - TLV_HDRL;
777 type = EXTRACT_16BITS(&tlv->type);
778 if (type != F_TLV_SPAD) {
779 ND_PRINT((ndo, "Error: expecting SPARSEDATA!\n"));
783 return sdatailv_print(ndo, tdp, rlen, op_msk, indent);
786 ND_PRINT((ndo, "%s", tstr));
791 pkeyitlv_print(netdissect_options *ndo,
792 register const u_char * pptr, register u_int len,
793 uint16_t op_msk, int indent)
795 const struct forces_tlv *tlv = (struct forces_tlv *)pptr;
796 register const u_char *tdp = (u_char *) TLV_DATA(tlv);
797 register const u_char *dp = tdp + 4;
798 const struct forces_tlv *kdtlv = (struct forces_tlv *)dp;
800 char *ib = indent_pr(indent, 0);
805 id = EXTRACT_32BITS(tdp);
806 ND_PRINT((ndo, "%sKeyinfo: Key 0x%x\n", ib, id));
808 type = EXTRACT_16BITS(&kdtlv->type);
809 invtlv = tlv_valid(kdtlv, len);
812 ND_PRINT((ndo, "%s TLV type 0x%x len %d\n",
813 tok2str(ForCES_TLV_err, NULL, invtlv), type,
814 EXTRACT_16BITS(&kdtlv->length)));
818 * At this point, tlv_valid() has ensured that the TLV
819 * length is large enough but not too large (it doesn't
820 * go past the end of the containing TLV).
822 tll = EXTRACT_16BITS(&kdtlv->length);
823 dp = (u_char *) TLV_DATA(kdtlv);
824 return fdatatlv_print(ndo, dp, tll, op_msk, indent);
827 ND_PRINT((ndo, "%s", tstr));
831 #define PTH_DESC_SIZE 12
834 pdatacnt_print(netdissect_options *ndo,
835 register const u_char * pptr, register u_int len,
836 uint16_t IDcnt, uint16_t op_msk, int indent)
840 char *ib = indent_pr(indent, 0);
842 if ((op_msk & B_APPND) && ndo->ndo_vflag >= 3) {
843 ND_PRINT((ndo, "%sTABLE APPEND\n", ib));
845 for (i = 0; i < IDcnt; i++) {
846 ND_TCHECK2(*pptr, 4);
849 id = EXTRACT_32BITS(pptr);
850 if (ndo->ndo_vflag >= 3)
851 ND_PRINT((ndo, "%sID#%02u: %d\n", ib, i + 1, id));
856 if ((op_msk & B_TRNG) || (op_msk & B_KEYIN)) {
857 if (op_msk & B_TRNG) {
858 uint32_t starti, endi;
860 if (len < PTH_DESC_SIZE) {
861 ND_PRINT((ndo, "pathlength %d with key/range too short %d\n",
862 len, PTH_DESC_SIZE));
866 pptr += sizeof(struct forces_tlv);
867 len -= sizeof(struct forces_tlv);
869 starti = EXTRACT_32BITS(pptr);
873 endi = EXTRACT_32BITS(pptr);
877 if (ndo->ndo_vflag >= 3)
878 ND_PRINT((ndo, "%sTable range: [%d,%d]\n", ib, starti, endi));
881 if (op_msk & B_KEYIN) {
882 struct forces_tlv *keytlv;
885 if (len < PTH_DESC_SIZE) {
886 ND_PRINT((ndo, "pathlength %d with key/range too short %d\n",
887 len, PTH_DESC_SIZE));
894 keytlv = (struct forces_tlv *)pptr;
896 pptr += sizeof(struct forces_tlv);
897 len -= sizeof(struct forces_tlv);
898 /* skip key content */
899 tll = EXTRACT_16BITS(&keytlv->length);
900 if (tll < TLV_HDRL) {
901 ND_PRINT((ndo, "key content length %u < %u\n",
907 ND_PRINT((ndo, "key content too short\n"));
917 const struct forces_tlv *pdtlv = (struct forces_tlv *)pptr;
925 type = EXTRACT_16BITS(&pdtlv->type);
926 invtlv = tlv_valid(pdtlv, len);
928 ND_PRINT((ndo, "%s Outstanding bytes %d for TLV type 0x%x TLV len %d\n",
929 tok2str(ForCES_TLV_err, NULL, invtlv), len, type,
930 EXTRACT_16BITS(&pdtlv->length)));
934 * At this point, tlv_valid() has ensured that the TLV
935 * length is large enough but not too large (it doesn't
936 * go past the end of the containing TLV).
938 tll = EXTRACT_16BITS(&pdtlv->length) - TLV_HDRL;
939 aln = F_ALN_LEN(EXTRACT_16BITS(&pdtlv->length));
940 if (aln > EXTRACT_16BITS(&pdtlv->length)) {
943 "Invalid padded pathdata TLV type 0x%x len %d missing %d pad bytes\n",
944 type, EXTRACT_16BITS(&pdtlv->length), aln - len));
946 pad = aln - EXTRACT_16BITS(&pdtlv->length);
949 if (pd_valid(type)) {
950 const struct pdata_ops *ops = get_forces_pd(type);
952 if (ndo->ndo_vflag >= 3 && ops->v != F_TLV_PDAT) {
954 ND_PRINT((ndo, "%s %s (Length %d DataLen %d pad %d Bytes)\n",
955 ib, ops->s, EXTRACT_16BITS(&pdtlv->length), tll, pad));
957 ND_PRINT((ndo, "%s %s (Length %d DataLen %d Bytes)\n",
958 ib, ops->s, EXTRACT_16BITS(&pdtlv->length), tll));
961 chk_op_type(ndo, type, op_msk, ops->op_msk);
963 if (ops->print(ndo, (const u_char *)pdtlv,
964 tll + pad + TLV_HDRL, op_msk,
967 len -= (TLV_HDRL + pad + tll);
969 ND_PRINT((ndo, "Invalid path data content type 0x%x len %d\n",
970 type, EXTRACT_16BITS(&pdtlv->length)));
972 if (EXTRACT_16BITS(&pdtlv->length)) {
973 hex_print_with_offset(ndo, "Bad Data val\n\t [",
975 ND_PRINT((ndo, "]\n"));
984 ND_PRINT((ndo, "%s", tstr));
989 pdata_print(netdissect_options *ndo,
990 register const u_char * pptr, register u_int len,
991 uint16_t op_msk, int indent)
993 const struct pathdata_h *pdh = (struct pathdata_h *)pptr;
994 char *ib = indent_pr(indent, 0);
1000 if (len < sizeof(struct pathdata_h))
1002 if (ndo->ndo_vflag >= 3) {
1003 ND_PRINT((ndo, "\n%sPathdata: Flags 0x%x ID count %d\n",
1004 ib, EXTRACT_16BITS(&pdh->pflags), EXTRACT_16BITS(&pdh->pIDcnt)));
1007 if (EXTRACT_16BITS(&pdh->pflags) & F_SELKEY) {
1011 /* Table GET Range operation */
1012 if (EXTRACT_16BITS(&pdh->pflags) & F_SELTABRANGE) {
1015 /* Table SET append operation */
1016 if (EXTRACT_16BITS(&pdh->pflags) & F_TABAPPEND) {
1020 pptr += sizeof(struct pathdata_h);
1021 len -= sizeof(struct pathdata_h);
1022 idcnt = EXTRACT_16BITS(&pdh->pIDcnt);
1023 minsize = idcnt * 4;
1024 if (len < minsize) {
1025 ND_PRINT((ndo, "\t\t\ttruncated IDs expected %uB got %uB\n", minsize,
1027 hex_print_with_offset(ndo, "\t\t\tID Data[", pptr, len, 0);
1028 ND_PRINT((ndo, "]\n"));
1032 if ((op_msk & B_TRNG) && (op_msk & B_KEYIN)) {
1033 ND_PRINT((ndo, "\t\t\tIllegal to have both Table ranges and keys\n"));
1037 more_pd = pdatacnt_print(ndo, pptr, len, idcnt, op_msk, indent);
1039 int consumed = len - more_pd;
1042 /* XXX: Argh, recurse some more */
1043 return recpdoptlv_print(ndo, pptr, len, op_msk, indent+1);
1048 ND_PRINT((ndo, "%s", tstr));
1053 genoptlv_print(netdissect_options *ndo,
1054 register const u_char * pptr, register u_int len,
1055 uint16_t op_msk, int indent)
1057 const struct forces_tlv *pdtlv = (struct forces_tlv *)pptr;
1061 char *ib = indent_pr(indent, 0);
1064 type = EXTRACT_16BITS(&pdtlv->type);
1065 tll = EXTRACT_16BITS(&pdtlv->length) - TLV_HDRL;
1066 invtlv = tlv_valid(pdtlv, len);
1067 ND_PRINT((ndo, "genoptlvprint - %s TLV type 0x%x len %d\n",
1068 tok2str(ForCES_TLV, NULL, type), type, EXTRACT_16BITS(&pdtlv->length)));
1071 * At this point, tlv_valid() has ensured that the TLV
1072 * length is large enough but not too large (it doesn't
1073 * go past the end of the containing TLV).
1075 register const u_char *dp = (u_char *) TLV_DATA(pdtlv);
1076 if (!ttlv_valid(type)) {
1077 ND_PRINT((ndo, "%s TLV type 0x%x len %d\n",
1078 tok2str(ForCES_TLV_err, NULL, invtlv), type,
1079 EXTRACT_16BITS(&pdtlv->length)));
1082 if (ndo->ndo_vflag >= 3)
1083 ND_PRINT((ndo, "%s%s, length %d (data length %d Bytes)",
1084 ib, tok2str(ForCES_TLV, NULL, type),
1085 EXTRACT_16BITS(&pdtlv->length), tll));
1087 return pdata_print(ndo, dp, tll, op_msk, indent + 1);
1089 ND_PRINT((ndo, "\t\t\tInvalid ForCES TLV type=%x", type));
1094 ND_PRINT((ndo, "%s", tstr));
1099 recpdoptlv_print(netdissect_options *ndo,
1100 register const u_char * pptr, register u_int len,
1101 uint16_t op_msk, int indent)
1103 const struct forces_tlv *pdtlv = (struct forces_tlv *)pptr;
1107 register const u_char *dp;
1112 invtlv = tlv_valid(pdtlv, len);
1118 * At this point, tlv_valid() has ensured that the TLV
1119 * length is large enough but not too large (it doesn't
1120 * go past the end of the containing TLV).
1122 ib = indent_pr(indent, 0);
1123 type = EXTRACT_16BITS(&pdtlv->type);
1124 dp = (u_char *) TLV_DATA(pdtlv);
1125 tll = EXTRACT_16BITS(&pdtlv->length) - TLV_HDRL;
1127 if (ndo->ndo_vflag >= 3)
1128 ND_PRINT((ndo, "%s%s, length %d (data encapsulated %d Bytes)",
1129 ib, tok2str(ForCES_TLV, NULL, type),
1130 EXTRACT_16BITS(&pdtlv->length),
1131 EXTRACT_16BITS(&pdtlv->length) - TLV_HDRL));
1133 if (pdata_print(ndo, dp, tll, op_msk, indent + 1) == -1)
1135 pdtlv = GO_NXT_TLV(pdtlv, len);
1140 "\n\t\tMessy PATHDATA TLV header, type (0x%x)\n\t\texcess of %d Bytes ",
1141 EXTRACT_16BITS(&pdtlv->type), len - EXTRACT_16BITS(&pdtlv->length)));
1148 ND_PRINT((ndo, "%s", tstr));
1153 invoptlv_print(netdissect_options *ndo,
1154 register const u_char * pptr, register u_int len,
1155 uint16_t op_msk _U_, int indent)
1157 char *ib = indent_pr(indent, 1);
1159 if (ndo->ndo_vflag >= 3) {
1160 ND_PRINT((ndo, "%sData[", &ib[1]));
1161 hex_print_with_offset(ndo, ib, pptr, len, 0);
1162 ND_PRINT((ndo, "%s]\n", ib));
1168 otlv_print(netdissect_options *ndo,
1169 const struct forces_tlv *otlv, uint16_t op_msk _U_, int indent)
1172 register const u_char *dp = (u_char *) TLV_DATA(otlv);
1175 char *ib = indent_pr(indent, 0);
1176 const struct optlv_h *ops;
1179 * lfbselect_print() has ensured that EXTRACT_16BITS(&otlv->length)
1183 type = EXTRACT_16BITS(&otlv->type);
1184 tll = EXTRACT_16BITS(&otlv->length) - TLV_HDRL;
1185 ops = get_forces_optlv_h(type);
1186 if (ndo->ndo_vflag >= 3) {
1187 ND_PRINT((ndo, "%sOper TLV %s(0x%x) length %d\n", ib, ops->s, type,
1188 EXTRACT_16BITS(&otlv->length)));
1190 /* empty TLVs like COMMIT and TRCOMMIT are empty, we stop here .. */
1191 if (!ops->flags & ZERO_TTLV) {
1192 if (tll != 0) /* instead of "if (tll)" - for readability .. */
1193 ND_PRINT((ndo, "%s: Illegal - MUST be empty\n", ops->s));
1196 /* rest of ops must at least have 12B {pathinfo} */
1197 if (tll < OP_MIN_SIZ) {
1198 ND_PRINT((ndo, "\t\tOper TLV %s(0x%x) length %d\n", ops->s, type,
1199 EXTRACT_16BITS(&otlv->length)));
1200 ND_PRINT((ndo, "\t\tTruncated data size %d minimum required %d\n", tll,
1202 return invoptlv_print(ndo, dp, tll, ops->op_msk, indent);
1206 rc = ops->print(ndo, dp, tll, ops->op_msk, indent + 1);
1210 ND_PRINT((ndo, "%s", tstr));
1217 asttlv_print(netdissect_options *ndo,
1218 register const u_char * pptr, register u_int len,
1219 uint16_t op_msk _U_, int indent)
1223 char *ib = indent_pr(indent, 0);
1226 * forces_type_print() has ensured that len (the TLV length)
1229 dlen = len - TLV_HDRL;
1230 if (dlen != ASTDLN) {
1231 ND_PRINT((ndo, "illegal ASTresult-TLV: %d bytes!\n", dlen));
1234 ND_TCHECK2(*pptr, 4);
1235 rescode = EXTRACT_32BITS(pptr);
1236 if (rescode > ASTMCD) {
1237 ND_PRINT((ndo, "illegal ASTresult result code: %d!\n", rescode));
1241 if (ndo->ndo_vflag >= 3) {
1242 ND_PRINT((ndo, "Teardown reason:\n%s", ib));
1245 ND_PRINT((ndo, "Normal Teardown"));
1248 ND_PRINT((ndo, "Loss of Heartbeats"));
1251 ND_PRINT((ndo, "Out of bandwidth"));
1254 ND_PRINT((ndo, "Out of Memory"));
1257 ND_PRINT((ndo, "Application Crash"));
1260 ND_PRINT((ndo, "Unknown Teardown reason"));
1263 ND_PRINT((ndo, "(%x)\n%s", rescode, ib));
1268 ND_PRINT((ndo, "%s", tstr));
1275 asrtlv_print(netdissect_options *ndo,
1276 register const u_char * pptr, register u_int len,
1277 uint16_t op_msk _U_, int indent)
1281 char *ib = indent_pr(indent, 0);
1284 * forces_type_print() has ensured that len (the TLV length)
1287 dlen = len - TLV_HDRL;
1288 if (dlen != ASRDLN) { /* id, instance, oper tlv */
1289 ND_PRINT((ndo, "illegal ASRresult-TLV: %d bytes!\n", dlen));
1292 ND_TCHECK2(*pptr, 4);
1293 rescode = EXTRACT_32BITS(pptr);
1295 if (rescode > ASRMCD) {
1296 ND_PRINT((ndo, "illegal ASRresult result code: %d!\n", rescode));
1300 if (ndo->ndo_vflag >= 3) {
1301 ND_PRINT((ndo, "\n%s", ib));
1304 ND_PRINT((ndo, "Success "));
1307 ND_PRINT((ndo, "FE ID invalid "));
1310 ND_PRINT((ndo, "permission denied "));
1313 ND_PRINT((ndo, "Unknown "));
1316 ND_PRINT((ndo, "(%x)\n%s", rescode, ib));
1321 ND_PRINT((ndo, "%s", tstr));
1330 gentltlv_print(netdissect_options *ndo,
1331 register const u_char * pptr _U_, register u_int len,
1332 uint16_t op_msk _U_, int indent _U_)
1334 u_int dlen = len - TLV_HDRL;
1336 if (dlen < 4) { /* at least 32 bits must exist */
1337 ND_PRINT((ndo, "truncated TLV: %d bytes missing! ", 4 - dlen));
1347 print_metailv(netdissect_options *ndo,
1348 register const u_char * pptr, uint16_t op_msk _U_, int indent)
1351 char *ib = indent_pr(indent, 0);
1352 /* XXX: check header length */
1353 const struct forces_ilv *ilv = (struct forces_ilv *)pptr;
1356 * print_metatlv() has ensured that len (what remains in the
1359 rlen = EXTRACT_32BITS(&ilv->length) - ILV_HDRL;
1361 ND_PRINT((ndo, "%sMetaID 0x%x length %d\n", ib, EXTRACT_32BITS(&ilv->type),
1362 EXTRACT_32BITS(&ilv->length)));
1363 if (ndo->ndo_vflag >= 3) {
1364 hex_print_with_offset(ndo, "\t\t[", ILV_DATA(ilv), rlen, 0);
1365 ND_PRINT((ndo, " ]\n"));
1370 ND_PRINT((ndo, "%s", tstr));
1375 print_metatlv(netdissect_options *ndo,
1376 register const u_char * pptr, register u_int len,
1377 uint16_t op_msk _U_, int indent)
1380 char *ib = indent_pr(indent, 0);
1382 const struct forces_ilv *ilv = (struct forces_ilv *)pptr;
1386 * redirect_print() has ensured that len (what remains in the
1389 dlen = len - TLV_HDRL;
1391 ND_PRINT((ndo, "\n%s METADATA length %d \n", ib, rlen));
1394 invilv = ilv_valid(ilv, rlen);
1400 * At this point, ilv_valid() has ensured that the ILV
1401 * length is large enough but not too large (it doesn't
1402 * go past the end of the containing TLV).
1404 print_metailv(ndo, (u_char *) ilv, 0, indent + 1);
1405 ilv = GO_NXT_ILV(ilv, rlen);
1411 ND_PRINT((ndo, "%s", tstr));
1417 print_reddata(netdissect_options *ndo,
1418 register const u_char * pptr, register u_int len,
1419 uint16_t op_msk _U_, int indent _U_)
1422 char *ib = indent_pr(indent, 0);
1425 dlen = len - TLV_HDRL;
1427 ND_PRINT((ndo, "\n%s Redirect Data length %d \n", ib, rlen));
1429 if (ndo->ndo_vflag >= 3) {
1430 ND_PRINT((ndo, "\t\t["));
1431 hex_print_with_offset(ndo, "\n\t\t", pptr, rlen, 0);
1432 ND_PRINT((ndo, "\n\t\t]"));
1439 redirect_print(netdissect_options *ndo,
1440 register const u_char * pptr, register u_int len,
1441 uint16_t op_msk _U_, int indent)
1443 const struct forces_tlv *tlv = (struct forces_tlv *)pptr;
1449 * forces_type_print() has ensured that len (the TLV length)
1452 dlen = len - TLV_HDRL;
1453 if (dlen <= RD_MIN) {
1454 ND_PRINT((ndo, "\n\t\ttruncated Redirect TLV: %d bytes missing! ",
1463 invtlv = tlv_valid(tlv, rlen);
1465 ND_PRINT((ndo, "Bad Redirect data\n"));
1470 * At this point, tlv_valid() has ensured that the TLV
1471 * length is large enough but not too large (it doesn't
1472 * go past the end of the containing TLV).
1474 if (EXTRACT_16BITS(&tlv->type) == F_TLV_METD) {
1475 print_metatlv(ndo, (u_char *) TLV_DATA(tlv),
1476 EXTRACT_16BITS(&tlv->length), 0, indent);
1477 } else if ((EXTRACT_16BITS(&tlv->type) == F_TLV_REDD)) {
1478 print_reddata(ndo, (u_char *) TLV_DATA(tlv),
1479 EXTRACT_16BITS(&tlv->length), 0, indent);
1481 ND_PRINT((ndo, "Unknown REDIRECT TLV 0x%x len %d\n",
1482 EXTRACT_16BITS(&tlv->type),
1483 EXTRACT_16BITS(&tlv->length)));
1486 tlv = GO_NXT_TLV(tlv, rlen);
1491 "\n\t\tMessy Redirect TLV header, type (0x%x)\n\t\texcess of %d Bytes ",
1492 EXTRACT_16BITS(&tlv->type),
1493 rlen - EXTRACT_16BITS(&tlv->length)));
1500 ND_PRINT((ndo, "%s", tstr));
1508 lfbselect_print(netdissect_options *ndo,
1509 register const u_char * pptr, register u_int len,
1510 uint16_t op_msk, int indent)
1512 const struct forces_lfbsh *lfbs;
1513 const struct forces_tlv *otlv;
1514 char *ib = indent_pr(indent, 0);
1520 * forces_type_print() has ensured that len (the TLV length)
1523 dlen = len - TLV_HDRL;
1524 if (dlen <= OP_MIN) { /* id, instance, oper tlv header .. */
1525 ND_PRINT((ndo, "\n\t\ttruncated lfb selector: %d bytes missing! ",
1531 * At this point, we know that dlen > OP_MIN; OP_OFF < OP_MIN, so
1532 * we also know that it's > OP_OFF.
1534 rlen = dlen - OP_OFF;
1536 lfbs = (const struct forces_lfbsh *)pptr;
1538 if (ndo->ndo_vflag >= 3) {
1539 ND_PRINT((ndo, "\n%s%s(Classid %x) instance %x\n",
1540 ib, tok2str(ForCES_LFBs, NULL, EXTRACT_32BITS(&lfbs->class)),
1541 EXTRACT_32BITS(&lfbs->class),
1542 EXTRACT_32BITS(&lfbs->instance)));
1545 otlv = (struct forces_tlv *)(lfbs + 1);
1550 invtlv = tlv_valid(otlv, rlen);
1555 * At this point, tlv_valid() has ensured that the TLV
1556 * length is large enough but not too large (it doesn't
1557 * go past the end of the containing TLV).
1559 if (op_valid(EXTRACT_16BITS(&otlv->type), op_msk)) {
1560 otlv_print(ndo, otlv, 0, indent);
1562 if (ndo->ndo_vflag < 3)
1563 ND_PRINT((ndo, "\n"));
1565 "\t\tINValid oper-TLV type 0x%x length %d for this ForCES message\n",
1566 EXTRACT_16BITS(&otlv->type), EXTRACT_16BITS(&otlv->length)));
1567 invoptlv_print(ndo, (u_char *)otlv, rlen, 0, indent);
1569 otlv = GO_NXT_TLV(otlv, rlen);
1574 "\n\t\tMessy oper TLV header, type (0x%x)\n\t\texcess of %d Bytes ",
1575 EXTRACT_16BITS(&otlv->type), rlen - EXTRACT_16BITS(&otlv->length)));
1582 ND_PRINT((ndo, "%s", tstr));
1587 forces_type_print(netdissect_options *ndo,
1588 register const u_char * pptr, const struct forcesh *fhdr _U_,
1589 register u_int mlen, const struct tom_h *tops)
1591 const struct forces_tlv *tltlv;
1598 * forces_print() has already checked that mlen >= ForCES_HDRL
1599 * by calling ForCES_HLN_VALID().
1601 rlen = mlen - ForCES_HDRL;
1603 if (rlen > TLV_HLN) {
1604 if (tops->flags & ZERO_TTLV) {
1605 ND_PRINT((ndo, "<0x%x>Illegal Top level TLV!\n", tops->flags));
1609 if (tops->flags & ZERO_MORE_TTLV)
1611 if (tops->flags & ONE_MORE_TTLV) {
1612 ND_PRINT((ndo, "\tTop level TLV Data missing!\n"));
1617 if (tops->flags & ZERO_TTLV) {
1621 ttlv = tops->flags >> 4;
1622 tltlv = GET_TOP_TLV(pptr);
1624 /*XXX: 15 top level tlvs will probably be fine
1625 You are nuts if you send more ;-> */
1628 invtlv = tlv_valid(tltlv, rlen);
1633 * At this point, tlv_valid() has ensured that the TLV
1634 * length is large enough but not too large (it doesn't
1635 * go past the end of the packet).
1637 if (!ttlv_valid(EXTRACT_16BITS(&tltlv->type))) {
1638 ND_PRINT((ndo, "\n\tInvalid ForCES Top TLV type=0x%x",
1639 EXTRACT_16BITS(&tltlv->type)));
1643 if (ndo->ndo_vflag >= 3)
1644 ND_PRINT((ndo, "\t%s, length %d (data length %d Bytes)",
1645 tok2str(ForCES_TLV, NULL, EXTRACT_16BITS(&tltlv->type)),
1646 EXTRACT_16BITS(&tltlv->length),
1647 EXTRACT_16BITS(&tltlv->length) - TLV_HDRL));
1649 rc = tops->print(ndo, (u_char *) TLV_DATA(tltlv),
1650 EXTRACT_16BITS(&tltlv->length), tops->op_msk, 9);
1654 tltlv = GO_NXT_TLV(tltlv, rlen);
1660 * XXX - if ttlv != 0, does that mean that the packet was too
1661 * short, and didn't have *enough* TLVs in it?
1664 ND_PRINT((ndo, "\tMess TopTLV header: min %u, total %d advertised %d ",
1665 TLV_HDRL, rlen, EXTRACT_16BITS(&tltlv->length)));
1672 ND_PRINT((ndo, "%s", tstr));
1677 forces_print(netdissect_options *ndo,
1678 register const u_char * pptr, register u_int len)
1680 const struct forcesh *fhdr;
1683 const struct tom_h *tops;
1686 fhdr = (const struct forcesh *)pptr;
1688 if (!tom_valid(fhdr->fm_tom)) {
1689 ND_PRINT((ndo, "Invalid ForCES message type %d\n", fhdr->fm_tom));
1693 mlen = ForCES_BLN(fhdr);
1695 tops = get_forces_tom(fhdr->fm_tom);
1696 if (tops->v == TOM_RSVD) {
1697 ND_PRINT((ndo, "\n\tUnknown ForCES message type=0x%x", fhdr->fm_tom));
1701 ND_PRINT((ndo, "\n\tForCES %s ", tops->s));
1702 if (!ForCES_HLN_VALID(mlen, len)) {
1704 "Illegal ForCES pkt len - min %u, total recvd %d, advertised %d ",
1705 ForCES_HDRL, len, ForCES_BLN(fhdr)));
1709 ND_TCHECK2(*(pptr + 20), 4);
1710 flg_raw = EXTRACT_32BITS(pptr + 20);
1711 if (ndo->ndo_vflag >= 1) {
1712 ND_PRINT((ndo, "\n\tForCES Version %d len %uB flags 0x%08x ",
1713 ForCES_V(fhdr), mlen, flg_raw));
1715 "\n\tSrcID 0x%x(%s) DstID 0x%x(%s) Correlator 0x%" PRIx64,
1716 ForCES_SID(fhdr), ForCES_node(ForCES_SID(fhdr)),
1717 ForCES_DID(fhdr), ForCES_node(ForCES_DID(fhdr)),
1718 EXTRACT_64BITS(fhdr->fm_cor)));
1721 if (ndo->ndo_vflag >= 2) {
1723 "\n\tForCES flags:\n\t %s(0x%x), prio=%d, %s(0x%x),\n\t %s(0x%x), %s(0x%x)\n",
1724 tok2str(ForCES_ACKs, "ACKUnknown", ForCES_ACK(fhdr)),
1727 tok2str(ForCES_EMs, "EMUnknown", ForCES_EM(fhdr)),
1729 tok2str(ForCES_ATs, "ATUnknown", ForCES_AT(fhdr)),
1731 tok2str(ForCES_TPs, "TPUnknown", ForCES_TP(fhdr)),
1734 "\t Extra flags: rsv(b5-7) 0x%x rsv(b13-31) 0x%x\n",
1735 ForCES_RS1(fhdr), ForCES_RS2(fhdr)));
1737 rc = forces_type_print(ndo, pptr, fhdr, mlen, tops);
1740 hex_print_with_offset(ndo, "\n\t[", pptr, len, 0);
1741 ND_PRINT((ndo, "\n\t]"));
1745 if (ndo->ndo_vflag >= 4) {
1746 ND_PRINT((ndo, "\n\t Raw ForCES message\n\t ["));
1747 hex_print_with_offset(ndo, "\n\t ", pptr, len, 0);
1748 ND_PRINT((ndo, "\n\t ]"));
1750 ND_PRINT((ndo, "\n"));
1754 ND_PRINT((ndo, "%s", tstr));
1758 * c-style: whitesmith