Home | History | Annotate | Download | only in tcpdump

Lines Matching defs:tlv

203 	{F_LFB_RSVD, "Invalid TLV"},
363 {F_TLV_RSVD, "Invalid TLV"},
364 {F_TLV_REDR, "REDIRECT TLV"},
365 {F_TLV_ASRS, "ASResult TLV"},
366 {F_TLV_ASRT, "ASTreason TLV"},
367 {F_TLV_LFBS, "LFBselect TLV"},
368 {F_TLV_PDAT, "PATH-DATA TLV"},
369 {F_TLV_KEYI, "KEYINFO TLV"},
370 {F_TLV_FULD, "FULLDATA TLV"},
371 {F_TLV_SPAD, "SPARSEDATA TLV"},
372 {F_TLV_REST, "RESULT TLV"},
373 {F_TLV_METD, "METADATA TLV"},
374 {F_TLV_REDD, "REDIRECTDATA TLV"},
409 #define TLV_RDAT_LEN(tlv) ((int)(EXTRACT_16BITS(&(tlv)->length) - TLV_SET_LEN(0))
411 #define GO_NXT_TLV(tlv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_16BITS(&(tlv)->length)), \
412 (struct forces_tlv*)(((char*)(tlv)) \
413 + F_ALN_LEN(EXTRACT_16BITS(&(tlv)->length))))
434 static inline int tlv_valid(const struct forces_tlv *tlv, u_int rlen)
438 if (EXTRACT_16BITS(&tlv->length) < TLV_HDRL)
440 if (EXTRACT_16BITS(&tlv->length) > rlen)
442 if (rlen < F_ALN_LEN(EXTRACT_16BITS(&tlv->length)))
548 ("Based on flags expected KEYINFO TLV!\n");
582 /* PD_SEL_I */ {F_TLV_KEYI, 0, 0, "KEYINFO TLV", pkeyitlv_print},
583 /* PD_FDT_I */ {F_TLV_FULD, 0, B_FULLD, "FULLDATA TLV", fdatatlv_print},
584 /* PD_SDT_I */ {F_TLV_SPAD, 0, B_SPARD, "SPARSEDATA TLV", sdatatlv_print},
585 /* PD_RES_I */ {F_TLV_REST, 0, B_RESTV, "RESULT TLV", prestlv_print},
587 {F_TLV_PDAT, 0, 0, "Inner PATH-DATA TLV", recpdoptlv_print},
650 {E_INVALID_TLV, "INVALID TLV"},
665 const struct forces_tlv *tlv = (struct forces_tlv *)pptr;
666 register const u_char *tdp = (u_char *) TLV_DATA(tlv);
671 * pdatacnt_print() has ensured that len (the TLV length)
676 printf("illegal RESULT-TLV: %d bytes!\n", dlen);
702 const struct forces_tlv *tlv = (struct forces_tlv *)pptr;
704 register const u_char *tdp = (u_char *) TLV_DATA(tlv);
709 * (the TLV length) >= TLV_HDRL.
712 TCHECK(*tlv);
713 type = EXTRACT_16BITS(&tlv->type);
741 printf("Error: BAD SPARSEDATA-TLV!\n");
781 const struct forces_tlv *tlv = (struct forces_tlv *)pptr;
783 register const u_char *tdp = (u_char *) TLV_DATA(tlv);
787 * pdatacnt_print() has ensured that len (the TLV length)
791 TCHECK(*tlv);
792 type = EXTRACT_16BITS(&tlv->type);
809 const struct forces_tlv *tlv = (struct forces_tlv *)pptr;
810 register const u_char *tdp = (u_char *) TLV_DATA(tlv);
826 printf("%s TLV type 0x%x len %d\n",
832 * At this point, tlv_valid() has ensured that the TLV
834 * go past the end of the containing TLV).
942 ("%s Outstanding bytes %d for TLV type 0x%x TLV len %d\n",
948 * At this point, tlv_valid() has ensured that the TLV
950 * go past the end of the containing TLV).
957 ("Invalid padded pathdata TLV type 0x%x len %d missing %d pad bytes\n",
1083 printf("genoptlvprint - %s TLV type 0x%x len %d\n",
1087 * At this point, tlv_valid() has ensured that the TLV
1089 * go past the end of the containing TLV).
1093 printf("%s TLV type 0x%x len %d\n",
1105 printf("\t\t\tInvalid ForCES TLV type=%x", type);
1133 * At this point, tlv_valid() has ensured that the TLV
1135 * go past the end of the containing TLV).
1156 ("\n\t\tMessy PATHDATA TLV header, type (0x%x)\n\t\texcess of %d Bytes ",
1201 printf("%sOper TLV %s(0x%x) length %d\n", ib, ops->s, type,
1212 printf("\t\tOper TLV %s(0x%x) length %d\n", ops->s, type,
1239 * forces_type_print() has ensured that len (the TLV length)
1244 printf("illegal ASTresult-TLV: %d bytes!\n", dlen);
1296 * forces_type_print() has ensured that len (the TLV length)
1300 if (dlen != ASRDLN) { /* id, instance, oper tlv */
1301 printf("illegal ASRresult-TLV: %d bytes!\n", dlen);
1348 printf("truncated TLV: %d bytes missing! ", 4 - dlen);
1398 * TLV) >= TLV_HDRL.
1413 * go past the end of the containing TLV).
1452 const struct forces_tlv *tlv = (struct forces_tlv *)pptr;
1458 * forces_type_print() has ensured that len (the TLV length)
1463 printf("\n\t\ttruncated Redirect TLV: %d bytes missing! ",
1471 TCHECK(*tlv);
1472 invtlv = tlv_valid(tlv, rlen);
1479 * At this point, tlv_valid() has ensured that the TLV
1481 * go past the end of the containing TLV).
1483 if (EXTRACT_16BITS(&tlv->type) == F_TLV_METD) {
1484 print_metatlv((u_char *) TLV_DATA(tlv),
1485 EXTRACT_16BITS(&tlv->length), 0, indent);
1486 } else if ((EXTRACT_16BITS(&tlv->type) == F_TLV_REDD)) {
1487 print_reddata((u_char *) TLV_DATA(tlv),
1488 EXTRACT_16BITS(&tlv->length), 0, indent);
1490 printf("Unknown REDIRECT TLV 0x%x len %d\n",
1491 EXTRACT_16BITS(&tlv->type),
1492 EXTRACT_16BITS(&tlv->length));
1495 tlv = GO_NXT_TLV(tlv, rlen);
1500 ("\n\t\tMessy Redirect TLV header, type (0x%x)\n\t\texcess of %d Bytes ",
1501 EXTRACT_16BITS(&tlv->type),
1502 rlen - EXTRACT_16BITS(&tlv->length));
1528 * forces_type_print() has ensured that len (the TLV length)
1532 if (dlen <= OP_MIN) { /* id, instance, oper tlv header .. */
1563 * At this point, tlv_valid() has ensured that the TLV
1565 * go past the end of the containing TLV).
1573 ("\t\tINValid oper-TLV type 0x%x length %d for this ForCES message\n",
1582 ("\n\t\tMessy oper TLV header, type (0x%x)\n\t\texcess of %d Bytes ",
1612 printf("<0x%x>Illegal Top level TLV!\n", tops->flags);
1619 printf("\tTop level TLV Data missing!\n");
1640 * At this point, tlv_valid() has ensured that the TLV
1645 printf("\n\tInvalid ForCES Top TLV type=0x%x",