Home | History | Annotate | Download | only in tcpdump

Lines Matching refs:pptr

428 decode_prefix4(const u_char *pptr, char *buf, u_int buflen)
433 TCHECK(pptr[0]);
434 plen = pptr[0];
439 TCHECK2(pptr[1], (plen + 7) / 8);
440 memcpy(&addr, &pptr[1], (plen + 7) / 8);
453 decode_labeled_prefix4(const u_char *pptr, char *buf, u_int buflen)
458 TCHECK(pptr[0]);
459 plen = pptr[0]; /* get prefix length */
478 TCHECK2(pptr[4], (plen + 7) / 8);
479 memcpy(&addr, &pptr[4], (plen + 7) / 8);
488 EXTRACT_24BITS(pptr+1)>>4,
489 ((pptr[3]&1)==0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" );
501 bgp_vpn_rd_print (const u_char *pptr) {
508 switch (EXTRACT_16BITS(pptr)) {
513 EXTRACT_16BITS(pptr+2), *(pptr+4), *(pptr+5), *(pptr+6), *(pptr+7));
519 *(pptr+2), *(pptr+3), *(pptr+4), *(pptr+5), EXTRACT_16BITS(pptr+6));
525 EXTRACT_32BITS(pptr+2), EXTRACT_16BITS(pptr+6),
526 *(pptr+2), *(pptr+3), *(pptr+4), *(pptr+5), EXTRACT_16BITS(pptr+6));
538 decode_rt_routing_info(const u_char *pptr, char *buf, u_int buflen)
543 TCHECK(pptr[0]);
544 plen = pptr[0]; /* get prefix length */
558 TCHECK2(pptr[1], (plen + 7) / 8);
559 memcpy(&route_target, &pptr[1], (plen + 7) / 8);
565 EXTRACT_32BITS(pptr+1),
575 decode_labeled_vpn_prefix4(const u_char *pptr, char *buf, u_int buflen)
580 TCHECK(pptr[0]);
581 plen = pptr[0]; /* get prefix length */
592 TCHECK2(pptr[12], (plen + 7) / 8);
593 memcpy(&addr, &pptr[12], (plen + 7) / 8);
600 bgp_vpn_rd_print(pptr+4),
603 EXTRACT_24BITS(pptr+1)>>4,
604 ((pptr[3]&1)==0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" );
633 decode_labeled_vpn_l2(const u_char *pptr, char *buf, u_int buflen)
637 TCHECK2(pptr[0], 2);
638 plen=EXTRACT_16BITS(pptr);
640 pptr+=2;
641 TCHECK2(pptr[0],15);
644 bgp_vpn_rd_print(pptr),
645 EXTRACT_16BITS(pptr+8),
646 EXTRACT_16BITS(pptr+10),
647 EXTRACT_24BITS(pptr+12)>>4); /* the label is offsetted by 4 bits so lets shift it right */
649 pptr+=15;
656 TCHECK2(pptr[0], 3);
657 tlv_type=*pptr++;
658 tlv_len=EXTRACT_16BITS(pptr);
660 pptr+=2;
672 TCHECK(pptr[0]);
674 strlen=snprintf(buf,buflen, "%02x",*pptr++);
724 decode_labeled_prefix6(const u_char *pptr, char *buf, u_int buflen)
729 TCHECK(pptr[0]);
730 plen = pptr[0]; /* get prefix length */
741 TCHECK2(pptr[4], (plen + 7) / 8);
742 memcpy(&addr, &pptr[4], (plen + 7) / 8);
751 EXTRACT_24BITS(pptr+1)>>4,
752 ((pptr[3]&1)==0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" );
761 decode_labeled_vpn_prefix6(const u_char *pptr, char *buf, u_int buflen)
766 TCHECK(pptr[0]);
767 plen = pptr[0]; /* get prefix length */
778 TCHECK2(pptr[12], (plen + 7) / 8);
779 memcpy(&addr, &pptr[12], (plen + 7) / 8);
786 bgp_vpn_rd_print(pptr+4),
789 EXTRACT_24BITS(pptr+1)>>4,
790 ((pptr[3]&1)==0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" );
800 decode_clnp_prefix(const u_char *pptr, char *buf, u_int buflen)
805 TCHECK(pptr[0]);
806 plen = pptr[0]; /* get prefix length */
812 TCHECK2(pptr[4], (plen + 7) / 8);
813 memcpy(&addr, &pptr[4], (plen + 7) / 8);
829 decode_labeled_vpn_clnp_prefix(const u_char *pptr, char *buf, u_int buflen)
834 TCHECK(pptr[0]);
835 plen = pptr[0]; /* get prefix length */
846 TCHECK2(pptr[12], (plen + 7) / 8);
847 memcpy(&addr, &pptr[12], (plen + 7) / 8);
854 bgp_vpn_rd_print(pptr+4),
857 EXTRACT_24BITS(pptr+1)>>4,
858 ((pptr[3]&1)==0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" );
867 bgp_attr_print(const struct bgp_attr *attr, const u_char *pptr, int len)
882 tptr = pptr;
908 while (tptr < pptr + len) {
1209 while (len - (tptr - pptr) > 0) {
1333 tptr = pptr + len;
1362 while (len - (tptr - pptr) > 0) {
1468 tptr = pptr + len;
1605 TCHECK2(*pptr,len);
1608 print_unknown_data(pptr,"\n\t ",len);
1612 TCHECK2(*pptr,len);
1613 print_unknown_data(pptr,"\n\t ",len);
1928 bgp_route_refresh_print(const u_char *pptr, int len) {
1934 TCHECK2(pptr[0], BGP_ROUTE_REFRESH_SIZE);
1940 bgp_route_refresh_header = (const struct bgp_route_refresh *)pptr;
1955 TCHECK2(*pptr, len);
1956 print_unknown_data(pptr,"\n\t ", len);