Home | History | Annotate | Download | only in tcpdump

Lines Matching refs:tptr

805             const u_int8_t *tptr;
821 tptr = pptr;
835 tok2str(clnp_option_sr_rr_values,"Unknown",*tptr),
837 nsap_offset=*(tptr+1);
847 tptr+=nsap_offset;
850 source_address_length=*tptr;
856 source_address=(tptr+1);
867 printf("0x%1x", *tptr&0x0f);
872 tok2str(clnp_option_scope_values,"Reserved",*tptr&CLNP_OPTION_SCOPE_MASK));
874 if ((*tptr&CLNP_OPTION_SCOPE_MASK) == CLNP_OPTION_SCOPE_GLOBAL)
878 *tptr&CLNP_OPTION_OPTION_QOS_MASK));
883 tok2str(clnp_option_scope_values,"Reserved",*tptr&CLNP_OPTION_SCOPE_MASK),
884 *(tptr+1));
888 rfd_error_major = (*tptr&0xf0) >> 4;
889 rfd_error_minor = *tptr&0x0f;
907 print_unknown_data(tptr,"\n\t ",opli);
1179 const u_int8_t *tptr;
1194 tptr = pptr;
1205 printf("%us", EXTRACT_16BITS(tptr));
1214 *tptr),
1215 *tptr);
1218 tptr++;
1235 print_unknown_data(tptr,"\n\t ",opli);
1359 isis_print_ip_reach_subtlv (const u_int8_t *tptr,int subt,int subl,const char *ident) {
1370 if (!TTEST2(*tptr,subl))
1378 EXTRACT_32BITS(tptr),
1379 EXTRACT_32BITS(tptr));
1380 tptr+=4;
1387 EXTRACT_32BITS(tptr),
1388 EXTRACT_32BITS(tptr+4));
1389 tptr+=8;
1394 if(!print_unknown_data(tptr,"\n\t\t ",
1412 isis_print_is_reach_subtlv (const u_int8_t *tptr,u_int subt,u_int subl,const char *ident) {
1429 if (!TTEST2(*tptr,subl))
1437 printf(", 0x%08x", EXTRACT_32BITS(tptr));
1439 printf(", 0x%08x", EXTRACT_32BITS(tptr+4));
1445 printf(", %s", ipaddr_string(tptr));
1450 bw.i = EXTRACT_32BITS(tptr);
1457 bw.i = EXTRACT_32BITS(tptr);
1462 tptr+=4;
1470 tok2str(diffserv_te_bc_values, "unknown", *tptr),
1471 *tptr);
1472 tptr++;
1475 bw.i = EXTRACT_32BITS(tptr);
1480 tptr+=4;
1485 printf(", %u", EXTRACT_24BITS(tptr));
1490 bittok2str(gmpls_link_prot_values, "none", *tptr),
1491 *(tptr+1));
1498 tok2str(gmpls_switch_cap_values, "Unknown", *(tptr)));
1500 tok2str(gmpls_encoding_values, "Unknown", *(tptr+1)));
1501 tptr+=4;
1504 bw.i = EXTRACT_32BITS(tptr);
1509 tptr+=4;
1515 if(!print_unknown_data(tptr,"\n\t\t ",
1522 if(!print_unknown_data(tptr,"\n\t\t ",
1541 isis_print_ext_is_reach (const u_int8_t *tptr,const char *ident, int tlv_type) {
1547 if (!TTEST2(*tptr, NODE_ID_LEN))
1550 printf("%sIS Neighbor: %s", ident, isis_print_id(tptr, NODE_ID_LEN));
1551 tptr+=(NODE_ID_LEN);
1554 if (!TTEST2(*tptr, 3)) /* and is therefore skipped */
1556 printf(", Metric: %d",EXTRACT_24BITS(tptr));
1557 tptr+=3;
1560 if (!TTEST2(*tptr, 1))
1562 subtlv_sum_len=*(tptr++); /* read out subTLV length */
1568 if (!TTEST2(*tptr,2))
1570 subtlv_type=*(tptr++);
1571 subtlv_len=*(tptr++);
1574 if(!isis_print_is_reach_subtlv(tptr,subtlv_type,subtlv_len,ident_buffer))
1576 tptr+=subtlv_len;
1590 isis_print_mtid (const u_int8_t *tptr,const char *ident) {
1592 if (!TTEST2(*tptr, 2))
1599 ISIS_MASK_MTID(EXTRACT_16BITS(tptr))));
1602 ISIS_MASK_MTID(EXTRACT_16BITS(tptr)),
1603 bittok2str(isis_mt_flag_values, "none",ISIS_MASK_MTFLAGS(EXTRACT_16BITS(tptr))));
1616 isis_print_extd_ip_reach (const u_int8_t *tptr, const char *ident, u_int16_t afi) {
1626 if (!TTEST2(*tptr, 4))
1628 metric = EXTRACT_32BITS(tptr);
1630 tptr+=4;
1633 if (!TTEST2(*tptr, 1)) /* fetch status byte */
1635 status_byte=*(tptr++);
1646 if (!TTEST2(*tptr, 1)) /* fetch status & prefix_len byte */
1648 status_byte=*(tptr++);
1649 bit_length=*(tptr++);
1663 if (!TTEST2(*tptr, byte_length))
1666 memcpy(prefix,tptr,byte_length); /* copy as much as is stored in the TLV */
1667 tptr+=byte_length;
1702 if (!TTEST2(*tptr, 1))
1704 sublen=*(tptr++);
1709 if (!TTEST2(*tptr,2))
1711 subtlvtype=*(tptr++);
1712 subtlvlen=*(tptr++);
1715 if(!isis_print_ip_reach_subtlv(tptr,subtlvtype,subtlvlen,ident_buffer))
1717 tptr+=subtlvlen;
1746 const u_int8_t *optr, *pptr, *tptr;
2096 tptr = pptr;
2116 if (!TTEST2(*tptr, 1))
2118 alen = *tptr++;
2122 isonsap_string(tptr,alen));
2123 tptr += alen;
2127 if (!TTEST2(*tptr, 1))
2129 alen = *tptr++;
2134 if (!TTEST2(*tptr, ETHER_ADDR_LEN))
2136 printf("\n\t SNPA: %s",isis_print_id(tptr,ETHER_ADDR_LEN));
2138 tptr += ETHER_ADDR_LEN;
2143 if (!TTEST2(*tptr, 1) || tmp < 3) /* min. TLV length */
2145 lan_alen = *tptr++; /* LAN address length */
2153 if (!TTEST2(*tptr, lan_alen))
2155 printf("\n\t\tIS Neighbor: %s",isis_print_id(tptr,lan_alen));
2157 tptr +=lan_alen;
2166 mt_len = isis_print_mtid(tptr, "\n\t ");
2169 tptr+=mt_len;
2172 ext_is_len = isis_print_ext_is_reach(tptr,"\n\t ",tlv_type);
2177 tptr+=ext_is_len;
2183 ext_is_len = isis_print_ext_is_reach(tptr,"\n\t ",tlv_type);
2187 tptr+=ext_is_len;
2193 ext_is_len = isis_print_ext_is_reach(tptr,"\n\t ",tlv_type);
2197 tptr+=ext_is_len;
2201 if (!TTEST2(*tptr,1)) /* check if there is one byte left to read out the virtual flag */
2206 *tptr++));
2207 tlv_is_reach = (const struct isis_tlv_is_reach *)tptr;
2220 tlv_es_reach = (const struct isis_tlv_es_reach *)tptr;
2241 ext_ip_len = isis_print_extd_ip_reach(tptr, "\n\t ", IPV4);
2244 tptr+=ext_ip_len;
2250 mt_len = isis_print_mtid(tptr, "\n\t ");
2254 tptr+=mt_len;
2258 ext_ip_len = isis_print_extd_ip_reach(tptr, "\n\t ", IPV4);
2261 tptr+=ext_ip_len;
2269 ext_ip_len = isis_print_extd_ip_reach(tptr, "\n\t ", IPV6);
2272 tptr+=ext_ip_len;
2278 mt_len = isis_print_mtid(tptr, "\n\t ");
2282 tptr+=mt_len;
2286 ext_ip_len = isis_print_extd_ip_reach(tptr, "\n\t ", IPV6);
2289 tptr+=ext_ip_len;
2296 if (!TTEST2(*tptr, sizeof(struct in6_addr)))
2300 ip6addr_string(tptr));
2302 tptr += sizeof(struct in6_addr);
2308 if (!TTEST2(*tptr, 1))
2314 *tptr));
2316 switch (*tptr) {
2319 if (!TTEST2(*(tptr+i), 1))
2321 printf("%c",*(tptr+i));
2326 if (!TTEST2(*(tptr+i), 1))
2328 printf("%02x",*(tptr+i));
2335 if(!print_unknown_data(tptr+1,"\n\t\t ",tlv_len-1))
2342 tlv_ptp_adj = (const struct isis_tlv_ptp_adj *)tptr;
2344 if (!TTEST2(*tptr, 1))
2347 tok2str(isis_ptp_adjancey_values, "unknown", *tptr),
2348 *tptr);
2378 if (!TTEST2(*(tptr), 1))
2383 *tptr),
2384 *tptr);
2387 tptr++;
2400 if (!TTEST2(*tptr, sizeof(struct in_addr)))
2402 printf("\n\t IPv4 interface address: %s", ipaddr_string(tptr));
2403 tptr += sizeof(struct in_addr);
2411 if (!TTEST2(*tptr, 1))
2413 printf("%c",*tptr++);
2421 if (!TTEST2(*tptr, NODE_ID_LEN))
2423 printf("\n\t IS Neighbor: %s", isis_print_id(tptr, NODE_ID_LEN));
2424 tptr+=(NODE_ID_LEN);
2429 if (!TTEST2(*tptr, 1))
2431 printf(", Flags: [%s]", ISIS_MASK_TLV_SHARED_RISK_GROUP(*tptr++) ? "numbered" : "unnumbered");
2436 if (!TTEST2(*tptr,sizeof(struct in_addr)))
2438 printf("\n\t IPv4 interface address: %s", ipaddr_string(tptr));
2439 tptr+=sizeof(struct in_addr);
2444 if (!TTEST2(*tptr,sizeof(struct in_addr)))
2446 printf("\n\t IPv4 neighbor address: %s", ipaddr_string(tptr));
2447 tptr+=sizeof(struct in_addr);
2451 if (!TTEST2(*tptr, 4))
2453 printf("\n\t Link-ID: 0x%08x", EXTRACT_32BITS(tptr));
2454 tptr+=4;
2460 tlv_lsp = (const struct isis_tlv_lsp *)tptr;
2483 if (!TTEST2(*tptr, ISIS_TLV_CHECKSUM_MINLEN))
2485 printf("\n\t checksum: 0x%04x ", EXTRACT_16BITS(tptr));
2491 if (EXTRACT_16BITS(tptr) == 0)
2503 mt_len = isis_print_mtid(tptr, "\n\t ");
2506 tptr+=mt_len;
2519 if (!TTEST2(*tptr, ISIS_TLV_RESTART_SIGNALING_FLAGLEN))
2522 bittok2str(isis_restart_flag_values, "none", *tptr));
2523 tptr+=ISIS_TLV_RESTART_SIGNALING_FLAGLEN;
2532 if (!TTEST2(*tptr, ISIS_TLV_RESTART_SIGNALING_HOLDTIMELEN))
2535 printf(", Remaining holding time %us", EXTRACT_16BITS(tptr));
2536 tptr+=ISIS_TLV_RESTART_SIGNALING_HOLDTIMELEN;
2541 if (!TTEST2(*tptr, SYSTEM_ID_LEN))
2543 printf(", for %s",isis_print_id(tptr,SYSTEM_ID_LEN));
2550 if (!TTEST2(*tptr, ISIS_TLV_IDRP_INFO_MINLEN))
2555 *tptr));
2556 switch (*tptr++) {
2558 if (!TTEST2(*tptr, 2)) /* fetch AS number */
2560 printf("AS Number: %u",EXTRACT_16BITS(tptr));
2565 if(!print_unknown_data(tptr,"\n\t ",tlv_len-1))
2574 if (!TTEST2(*tptr, ISIS_TLV_LSP_BUFFERSIZE_MINLEN))
2576 printf("\n\t LSP Buffersize: %u",EXTRACT_16BITS(tptr));
2581 if (!TTEST2(*tptr, SYSTEM_ID_LEN))
2583 printf("\n\t %s",isis_print_id(tptr,SYSTEM_ID_LEN));
2584 tptr+=SYSTEM_ID_LEN;
2592 if (!TTEST2(*tptr, sizeof(struct isis_metric_block)))
2595 isis_print_metric_block((const struct isis_metric_block *)tptr);
2596 tptr+=sizeof(struct isis_metric_block);
2600 if (!TTEST2(*tptr, 1))
2602 prefix_len=*tptr++; /* read out prefix length in semioctets*/
2610 if (!TTEST2(*tptr, prefix_len/2))
2613 isonsap_string(tptr,prefix_len/2),
2615 tptr+=prefix_len/2;
2623 if (!TTEST2(*tptr, ISIS_TLV_IIH_SEQNR_MINLEN)) /* check if four bytes are on the wire */
2625 printf("\n\t Sequence number: %u", EXTRACT_32BITS(tptr) );
2631 if (!TTEST2(*tptr, ISIS_TLV_VENDOR_PRIVATE_MINLEN)) /* check if enough byte for a full oui */
2633 vendor_id = EXTRACT_24BITS(tptr);
2637 tptr+=3;
2640 if(!print_unknown_data(tptr,"\n\t\t",tmp))
2690 osi_cksum(const u_int8_t *tptr, u_int len)
2695 c0 += *tptr++;