Lines Matching +full:0 +full:x8005
69 { 0, NULL}
113 (((flags) & 0x10) ? 2U : 1U)
115 (((flags) & 0x10) ? GET_BE_U_2(p) : GET_U_1(p))
176 { 0, NULL}
192 { 0, NULL}
200 { 0, NULL}
209 { 0, NULL}
242 { 0, NULL}
261 { 0, NULL}
276 { 0, NULL}
283 { 0, NULL}
294 { 0, NULL}
309 { 0, NULL}
313 { 0, "Unspecified Error"},
317 { 0, NULL }
325 { 0, NULL }
329 { 0, "IGP"},
332 { 0, NULL}
351 { 0, NULL}
355 { 0x01, "Leaf Information required"},
356 { 0, NULL}
363 { 0, NULL}
367 #define SAFNUM_RES 0
408 { 0, NULL }
412 #define BGP_COMMUNITY_NO_EXPORT 0xffffff01
413 #define BGP_COMMUNITY_NO_ADVERT 0xffffff02
414 #define BGP_COMMUNITY_NO_EXPORT_SUBCONFED 0xffffff03
417 #define BGP_EXT_COM_RT_0 0x0002 /* Route Target,Format AS(2bytes):AN(4bytes) */
418 #define BGP_EXT_COM_RT_1 0x0102 /* Route Target,Format IP address:AN(2bytes) */
419 #define BGP_EXT_COM_RT_2 0x0202 /* Route Target,Format AN(4bytes):local(2bytes) */
420 #define BGP_EXT_COM_RO_0 0x0003 /* Route Origin,Format AS(2bytes):AN(4bytes) */
421 #define BGP_EXT_COM_RO_1 0x0103 /* Route Origin,Format IP address:AN(2bytes) */
422 #define BGP_EXT_COM_RO_2 0x0203 /* Route Origin,Format AN(4bytes):local(2bytes) */
423 #define BGP_EXT_COM_LINKBAND 0x4004 /* Link Bandwidth,Format AS(2B):Bandwidth(4B) */
425 #define BGP_EXT_COM_VPN_ORIGIN 0x0005 /* OSPF Domain ID / VPN of Origin - draft-rosen-vpns-ospf-…
426 #define BGP_EXT_COM_VPN_ORIGIN2 0x0105 /* duplicate - keep for backwards compatibility */
427 #define BGP_EXT_COM_VPN_ORIGIN3 0x0205 /* duplicate - keep for backwards compatibility */
428 #define BGP_EXT_COM_VPN_ORIGIN4 0x8005 /* duplicate - keep for backwards compatibility */
430 #define BGP_EXT_COM_OSPF_RTYPE 0x0306 /* OSPF Route Type,Format Area(4B):RouteType(1B):Options(1B…
431 #define BGP_EXT_COM_OSPF_RTYPE2 0x8000 /* duplicate - keep for backwards compatibility */
432 #define BGP_EXT_COM_ENCAP 0x030c /* rfc5512 */
434 #define BGP_EXT_COM_OSPF_RID 0x0107 /* OSPF Router ID,Format RouterID(4B):Unused(2B) */
435 #define BGP_EXT_COM_OSPF_RID2 0x8001 /* duplicate - keep for backwards compatibility */
437 #define BGP_EXT_COM_L2INFO 0x800a /* draft-kompella-ppvpn-l2vpn */
439 #define BGP_EXT_COM_SOURCE_AS 0x0009 /* RFC-ietf-l3vpn-2547bis-mcast-bgp-08.txt */
440 #define BGP_EXT_COM_VRF_RT_IMP 0x010b /* RFC-ietf-l3vpn-2547bis-mcast-bgp-08.txt */
441 #define BGP_EXT_COM_L2VPN_RT_0 0x000a /* L2VPN Identifier,Format AS(2bytes):AN(4bytes) */
442 #define BGP_EXT_COM_L2VPN_RT_1 0xF10a /* L2VPN Identifier,Format IP address:AN(2bytes) */
445 #define BGP_EXT_COM_EIGRP_GEN 0x8800
446 #define BGP_EXT_COM_EIGRP_METRIC_AS_DELAY 0x8801
447 #define BGP_EXT_COM_EIGRP_METRIC_REL_NH_BW 0x8802
448 #define BGP_EXT_COM_EIGRP_METRIC_LOAD_MTU 0x8803
449 #define BGP_EXT_COM_EIGRP_EXT_REMAS_REMID 0x8804
450 #define BGP_EXT_COM_EIGRP_EXT_REMPROTO_REMMETRIC 0x8805
453 { 0x8000, "vendor-specific"},
454 { 0x4000, "non-transitive"},
455 { 0, NULL},
486 { 0, NULL},
526 { 0, NULL},
536 #define BGP_OSPF_RTYPE_METRIC_TYPE 0x1 /* LSB of RTYPE Options Field */
545 { 0, NULL },
553 { 0, NULL },
571 if (!ndo->ndo_bflag || asnum <= 0xFFFF) { in as_printf()
574 snprintf(str, size, "%u.%u", asnum >> 16, asnum & 0xFFFF); in as_printf()
594 memset(&addr, 0, sizeof(addr)); in decode_prefix4()
599 ((u_char *)&addr)[plenbytes - 1] &= ((0xff00 >> (plen % 8)) & 0xff); in decode_prefix4()
638 memset(&addr, 0, sizeof(addr)); in decode_labeled_prefix4()
643 ((u_char *)&addr)[plenbytes - 1] &= ((0xff00 >> (plen % 8)) & 0xff); in decode_labeled_prefix4()
650 ((GET_U_1(pptr + 3) & 1) == 0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" ); in decode_labeled_prefix4()
688 *(pos) = '\0'; in bgp_vpn_ip_print()
717 total_length = 0; in bgp_vpn_sg_print()
765 case 0: in bgp_vpn_rd_print()
795 *(pos) = '\0'; in bgp_vpn_rd_print()
860 "unknown (0x%02x)", in bgp_extended_community_print()
867 ND_PRINT("%s Control Flags [0x%02x]:MTU %u", in bgp_extended_community_print()
902 * Prefix-len may be 0, 32..96
915 u_int rtc_prefix_in_hex_len = 0; in bgp_rt_prefix_print()
919 uint16_t ec_type = 0; in bgp_rt_prefix_print()
923 if (plen == 0) { in bgp_rt_prefix_print()
924 snprintf(output, sizeof(output), "route-target: 0:0/0"); in bgp_rt_prefix_print()
930 for (i=0; i<octet_count; i++) { in bgp_rt_prefix_print()
949 * Note: pptr references a static 8 octet buffer with unused bits set to 0, in bgp_rt_prefix_print()
999 /* NLRI "prefix" (ibid), valid lengths are { 0, 32, 33, ..., 96 } bits. in decode_rt_routing_info()
1003 if (0 == plen) { in decode_rt_routing_info()
1024 /* From now on (plen + 7) / 8 evaluates to { 0, 1, 2, ..., 8 } in decode_rt_routing_info()
1028 memset(&route_target, 0, sizeof(route_target)); in decode_rt_routing_info()
1031 /* If mask-len is not on octet boundary, ensure all extra bits are 0 */ in decode_rt_routing_info()
1034 ((0xff00 >> (plen % 8)) & 0xff); in decode_rt_routing_info()
1060 memset(&addr, 0, sizeof(addr)); in decode_labeled_vpn_prefix4()
1064 ((0xff00 >> (plen % 8)) & 0xff); in decode_labeled_vpn_prefix4()
1072 ((GET_U_1(pptr + 3) & 1) == 0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" ); in decode_labeled_vpn_prefix4()
1136 { 0, NULL}
1235 * value is negative, set buflen to 0, to indicate that we've filled
1239 * the buffer would have overflowed; again, set buflen to 0 in
1243 if (stringlen<0) \
1244 buflen=0; \
1246 buflen=0; \
1269 buf[0] = '\0'; in decode_labeled_vpn_l2()
1282 buf[0] = '\0'; in decode_labeled_vpn_l2()
1293 while (tlen != 0) { in decode_labeled_vpn_l2()
1295 if (buflen != 0) { in decode_labeled_vpn_l2()
1309 if (buflen != 0) { in decode_labeled_vpn_l2()
1310 … stringlen=snprintf(buf,buflen, "\n\t\tcircuit status vector (%u) length: %u: 0x", in decode_labeled_vpn_l2()
1315 while (ttlv_len != 0) { in decode_labeled_vpn_l2()
1317 if (buflen != 0) { in decode_labeled_vpn_l2()
1324 if (buflen != 0) { in decode_labeled_vpn_l2()
1335 if (buflen != 0) { in decode_labeled_vpn_l2()
1342 if (buflen != 0) { in decode_labeled_vpn_l2()
1376 memset(&addr, 0, sizeof(addr)); in decode_prefix6()
1382 ((0xff00 >> (plen % 8)) & 0xff); in decode_prefix6()
1412 memset(&addr, 0, sizeof(addr)); in decode_labeled_prefix6()
1417 ((0xff00 >> (plen % 8)) & 0xff); in decode_labeled_prefix6()
1424 ((GET_U_1(pptr + 3) & 1) == 0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" ); in decode_labeled_prefix6()
1452 memset(&addr, 0, sizeof(addr)); in decode_labeled_vpn_prefix6()
1456 ((0xff00 >> (plen % 8)) & 0xff); in decode_labeled_vpn_prefix6()
1464 ((GET_U_1(pptr + 3) & 1) == 0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" ); in decode_labeled_vpn_prefix6()
1481 memset(&addr, 0, sizeof(addr)); in decode_clnp_prefix()
1485 ((0xff00 >> (plen % 8)) & 0xff); in decode_clnp_prefix()
1512 memset(&addr, 0, sizeof(addr)); in decode_labeled_vpn_clnp_prefix()
1515 addr[(plen + 7) / 8 - 1] &= ((0xff00 >> (plen % 8)) & 0xff); in decode_labeled_vpn_clnp_prefix()
1524 ((GET_U_1(pptr + 3) & 1) == 0) ? "(BOGUS: Bottom of Stack NOT set!)" : "(bottom)" ); in decode_labeled_vpn_clnp_prefix()
1534 * support, exchange AS-Path with the same path-attribute type value 0x02.
1597 return 0; in check_add_path()
1604 for (offset = 0; offset < length;) { in check_add_path()
1616 return 0; in check_add_path()
1623 return 0; in check_add_path()
1627 for (offset = 0; offset < length; ) { in check_add_path()
1634 * If the prefix_length is zero (0.0.0.0/0) in check_add_path()
1648 return 0; in check_add_path()
1707 return 0; in bgp_mp_af_print()
1719 u_int path_id = 0; in bgp_nlri_print()
1926 for (i = 0; i < GET_U_1(tptr + 1) * as_size; i += as_size) { in bgp_attr_print()
1955 if (len != 0) in bgp_attr_print()
1993 while (tlen != 0) { in bgp_attr_print()
2011 (comm >> 16) & 0xffff, in bgp_attr_print()
2012 comm & 0xffff, in bgp_attr_print()
2032 while (tlen != 0) { in bgp_attr_print()
2049 if (ret < 0) in bgp_attr_print()
2063 u_int nnh = 0; in bgp_attr_print()
2068 while (tnhlen != 0) { in bgp_attr_print()
2069 if (nnh++ > 0) { in bgp_attr_print()
2084 tnhlen = 0; in bgp_attr_print()
2099 tnhlen = 0; in bgp_attr_print()
2117 tnhlen = 0; in bgp_attr_print()
2132 tnhlen = 0; in bgp_attr_print()
2150 tnhlen = 0; in bgp_attr_print()
2164 tnhlen = 0; in bgp_attr_print()
2174 tnhlen = 0; in bgp_attr_print()
2181 if (GET_BE_U_4(tptr + BGP_VPN_RD_LEN) == 0x47000601) in bgp_attr_print()
2184 else if (GET_BE_U_3(tptr + BGP_VPN_RD_LEN) == 0x350000) in bgp_attr_print()
2188 tnhlen = 0; in bgp_attr_print()
2199 tnhlen = 0; in bgp_attr_print()
2216 for (/*nothing*/; snpa != 0; snpa--) { in bgp_attr_print()
2244 if (advance < 0) in bgp_attr_print()
2255 if (ret < 0) in bgp_attr_print()
2273 if (advance < 0) in bgp_attr_print()
2283 while (tlen != 0) { in bgp_attr_print()
2291 ND_PRINT("\n\t %s (0x%04x), Flags [%s]", in bgp_attr_print()
2346 ND_PRINT("\n\t Root-Node %s, LSP-ID 0x%08x", in bgp_attr_print()
2351 ND_PRINT("\n\t Extended-Tunnel-ID %s, P2MP-ID 0x%08x", in bgp_attr_print()
2448 aflags & 0x80 ? "O" : "", in bgp_attr_print()
2449 aflags & 0x40 ? "T" : "", in bgp_attr_print()
2450 aflags & 0x20 ? "P" : "", in bgp_attr_print()
2451 aflags & 0x10 ? "E" : ""); in bgp_attr_print()
2452 if (aflags & 0xf) in bgp_attr_print()
2453 ND_PRINT("+%x", aflags & 0xf); in bgp_attr_print()
2474 return 0; in bgp_attr_print()
2481 if (len == 0 || len % 12) { in bgp_attr_print()
2486 while (len != 0) { in bgp_attr_print()
2515 return 0; in bgp_attr_print()
2525 u_int i = 0; in bgp_capabilities_print()
2573 ((GET_U_1(opt + i + 2))&0x80) ? "R" : "none", in bgp_capabilities_print()
2574 GET_BE_U_2(opt + i + 2)&0xfff); in bgp_capabilities_print()
2585 ((GET_U_1(opt + (i + cap_offset + 3)))&0x80) ? "yes" : "no" ); in bgp_capabilities_print()
2607 if (cap_len == 0) { in bgp_capabilities_print()
2613 while (tcap_len != 0) { in bgp_capabilities_print()
2623 … tok2str(bgp_add_path_recvsend,"Bogus (0x%02x)",GET_U_1(opt + i + cap_offset + 3)) in bgp_capabilities_print()
2637 if (ndo->ndo_vflag > 1 && cap_len != 0) { in bgp_capabilities_print()
2679 i = 0; in bgp_open_print()
2732 u_int path_id = 0; in bgp_update_print()
2758 while (withdrawn_routes_len != 0) { in bgp_update_print()
2801 if (withdrawn_routes_len == 0 && len == 0 && length == 0) { in bgp_update_print()
2852 aflags & 0x80 ? "O" : "", in bgp_update_print()
2853 aflags & 0x40 ? "T" : "", in bgp_update_print()
2854 aflags & 0x20 ? "P" : "", in bgp_update_print()
2855 aflags & 0x10 ? "E" : ""); in bgp_update_print()
2856 if (aflags & 0xf) in bgp_update_print()
2857 ND_PRINT("+%x", aflags & 0xf); in bgp_update_print()
2868 if (!bgp_attr_print(ndo, atype, p, alen, 0)) in bgp_update_print()
2879 while (length != 0) { in bgp_update_print()
2989 uint8_t remainder_offset = 0; in bgp_notification_print()
2993 } else if (shutdown_comm_length == 0) { in bgp_notification_print()
3005 if(length - (remainder_offset + BGP_NOTIFICATION_SIZE) > 0) { in bgp_notification_print()
3093 return 0; in bgp_pdu_print()
3104 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, in bgp_print()
3105 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, in bgp_print()
3121 if (GET_U_1(p) != 0xff) { in bgp_print()
3128 if (memcmp(p, marker, sizeof(marker)) != 0) { in bgp_print()