Lines Matching +full:tlv +full:- +full:layout

39 #include "netdissect-stdinc.h"
127 #define BGPTYPE_DPA 11 /* deprecated, draft-ietf-idr-bgp-dpa */
142 #define BGPTYPE_LARGE_COMMUNITY 32 /* draft-ietf-idr-large-community-05 */
163 { BGPTYPE_MP_REACH_NLRI, "Multi-Protocol Reach NLRI"},
164 { BGPTYPE_MP_UNREACH_NLRI, "Multi-Protocol Unreach NLRI"},
181 #define BGP_CONFED_AS_SEQUENCE 3 /* draft-ietf-idr-rfc3065bis-01 */
182 #define BGP_CONFED_AS_SET 4 /* draft-ietf-idr-rfc3065bis-01 */
220 #define BGP_CAPCODE_DYN_CAP 67 /* draft-ietf-idr-dynamic-cap */
221 #define BGP_CAPCODE_MULTISESS 68 /* draft-ietf-idr-bgp-multisession */
223 #define BGP_CAPCODE_ENH_RR 70 /* draft-keyur-bgp-enhanced-route-refresh */
224 #define BGP_CAPCODE_LLGR 71 /* draft-uttaro-idr-bgp-persistence-05 */
235 { BGP_CAPCODE_AS_NEW, "32-Bit AS Number"},
240 { BGP_CAPCODE_LLGR, "Long-lived Graceful Restart"},
299 { 2, "Unrecognized Well-known Attribute"},
300 { 3, "Missing Well-known Attribute"},
344 { BGP_PMSI_TUNNEL_RSVP_P2MP, "RSVP-TE P2MP LSP"},
346 { BGP_PMSI_TUNNEL_PIM_SSM, "PIM-SSM Tree"},
347 { BGP_PMSI_TUNNEL_PIM_SM, "PIM-SM Tree"},
348 { BGP_PMSI_TUNNEL_PIM_BIDIR, "PIM-Bidir Tree"},
375 /* draft-nalawade-kapoor-tunnel-safi */
411 /* well-known community */
416 /* Extended community type - RFC 4360 */
424 /* rfc2547 bgp-mpls-vpns */
425 …_EXT_COM_VPN_ORIGIN 0x0005 /* OSPF Domain ID / VPN of Origin - draft-rosen-vpns-ospf-bgp-mpls */
426 #define BGP_EXT_COM_VPN_ORIGIN2 0x0105 /* duplicate - keep for backwards compatibility */
427 #define BGP_EXT_COM_VPN_ORIGIN3 0x0205 /* duplicate - keep for backwards compatibility */
428 #define BGP_EXT_COM_VPN_ORIGIN4 0x8005 /* duplicate - keep for backwards compatibility */
431 #define BGP_EXT_COM_OSPF_RTYPE2 0x8000 /* duplicate - keep for backwards compatibility */
435 #define BGP_EXT_COM_OSPF_RID2 0x8001 /* duplicate - keep for backwards compatibility */
437 #define BGP_EXT_COM_L2INFO 0x800a /* draft-kompella-ppvpn-l2vpn */
439 #define BGP_EXT_COM_SOURCE_AS 0x0009 /* RFC-ietf-l3vpn-2547bis-mcast-bgp-08.txt */
440 #define BGP_EXT_COM_VRF_RT_IMP 0x010b /* RFC-ietf-l3vpn-2547bis-mcast-bgp-08.txt */
453 { 0x8000, "vendor-specific"},
454 { 0x4000, "non-transitive"},
465 { BGP_EXT_COM_LINKBAND, "link-BW"},
466 { BGP_EXT_COM_VPN_ORIGIN, "ospf-domain"},
467 { BGP_EXT_COM_VPN_ORIGIN2, "ospf-domain"},
468 { BGP_EXT_COM_VPN_ORIGIN3, "ospf-domain"},
469 { BGP_EXT_COM_VPN_ORIGIN4, "ospf-domain"},
470 { BGP_EXT_COM_OSPF_RTYPE, "ospf-route-type"},
471 { BGP_EXT_COM_OSPF_RTYPE2, "ospf-route-type"},
473 { BGP_EXT_COM_OSPF_RID, "ospf-router-id"},
474 { BGP_EXT_COM_OSPF_RID2, "ospf-router-id"},
475 { BGP_EXT_COM_L2INFO, "layer2-info"},
476 { BGP_EXT_COM_EIGRP_GEN, "eigrp-general-route (flag, tag)" },
477 { BGP_EXT_COM_EIGRP_METRIC_AS_DELAY, "eigrp-route-metric (AS, delay)" },
478 { BGP_EXT_COM_EIGRP_METRIC_REL_NH_BW, "eigrp-route-metric (reliability, nexthop, bandwidth)" },
479 { BGP_EXT_COM_EIGRP_METRIC_LOAD_MTU, "eigrp-route-metric (load, MTU)" },
480 { BGP_EXT_COM_EIGRP_EXT_REMAS_REMID, "eigrp-external-route (remote-AS, remote-ID)" },
481 …{ BGP_EXT_COM_EIGRP_EXT_REMPROTO_REMMETRIC, "eigrp-external-route (remote-proto, remote-metric)" },
482 { BGP_EXT_COM_SOURCE_AS, "source-AS" },
483 { BGP_EXT_COM_VRF_RT_IMP, "vrf-route-import"},
484 { BGP_EXT_COM_L2VPN_RT_0, "l2vpn-id"},
485 { BGP_EXT_COM_L2VPN_RT_1, "l2vpn-id"},
529 /* OSPF codes for BGP_EXT_COM_OSPF_RTYPE draft-rosen-vpns-ospf-bgp-mpls */
533 #define BGP_OSPF_RTYPE_EXT 5 /* OSPF External LSA, note that ASBR doesn't apply to MPLS-VPN */
535 #define BGP_OSPF_RTYPE_SHAM 129 /* OSPF-MPLS-VPN Sham link */
544 { BGP_OSPF_RTYPE_SHAM,"MPLS-VPN Sham" },
548 /* ADD-PATH Send/Receive field values */
571 if (!ndo->ndo_bflag || asnum <= 0xFFFF) { in as_printf()
591 return -1; in decode_prefix4()
592 itemlen -= 1; in decode_prefix4()
599 ((u_char *)&addr)[plenbytes - 1] &= ((0xff00 >> (plen % 8)) & 0xff); in decode_prefix4()
605 return -2; in decode_prefix4()
624 we also do only read out just one label - in decode_labeled_prefix4()
630 return -1; in decode_labeled_prefix4()
632 plen-=24; /* adjust prefixlen - labellength */ in decode_labeled_prefix4()
635 return -1; in decode_labeled_prefix4()
636 itemlen -= 4; in decode_labeled_prefix4()
643 ((u_char *)&addr)[plenbytes - 1] &= ((0xff00 >> (plen % 8)) & 0xff); in decode_labeled_prefix4()
655 return -2; in decode_labeled_prefix4()
658 return -3; in decode_labeled_prefix4()
698 * +-----------------------------------+
700 * +-----------------------------------+
702 * +-----------------------------------+
704 * +-----------------------------------+
706 * +-----------------------------------+
728 snprintf(buf + offset, buflen - offset, ", Source %s", in bgp_vpn_sg_print()
742 snprintf(buf + offset, buflen - offset, ", Group %s", in bgp_vpn_sg_print()
766 /* 2-byte-AS:number fmt */ in bgp_vpn_rd_print()
767 snprintf(pos, sizeof(rd) - (pos - rd), "%u:%u (= %u.%u.%u.%u)", in bgp_vpn_rd_print()
775 /* IP-address:AS fmt */ in bgp_vpn_rd_print()
776 snprintf(pos, sizeof(rd) - (pos - rd), "%u.%u.%u.%u:%u", in bgp_vpn_rd_print()
783 /* 4-byte-AS:number fmt */ in bgp_vpn_rd_print()
784 snprintf(pos, sizeof(rd) - (pos - rd), "%s:%u (%u.%u.%u.%u:%u)", in bgp_vpn_rd_print()
791 snprintf(pos, sizeof(rd) - (pos - rd), "unknown RD format"); in bgp_vpn_rd_print()
857 ND_PRINT("area:%s, router-type:%s, metric-type:%s%s", in bgp_extended_community_print()
900 * [prefix-len] [origin-as] [route-target]
901 * The route-target is encoded as RT ext-comms.
902 * Prefix-len may be 0, 32..96
904 * Note that pptr is not packet data - it is
905 * a buffer owned by our caller - therefore GET_*
924 snprintf(output, sizeof(output), "route-target: 0:0/0"); in bgp_rt_prefix_print()
932 sizeof(rtc_prefix_in_hex)-rtc_prefix_in_hex_len, in bgp_rt_prefix_print()
934 ((i%2 == 1) && (i<octet_count-1)) ? " " : ""); in bgp_rt_prefix_print()
939 * The prefix is too short to include the full ext-comm type, in bgp_rt_prefix_print()
942 snprintf(output, sizeof(output), "route-target: partial-type: (%s/%d)", in bgp_rt_prefix_print()
948 * get the ext-comm type in bgp_rt_prefix_print()
955 /* 2-byte-AS:number fmt */ in bgp_rt_prefix_print()
956 snprintf(output, sizeof(output), "route-target: %u:%u/%d (%s)", in bgp_rt_prefix_print()
963 /* IP-address:AS fmt */ in bgp_rt_prefix_print()
964 snprintf(output, sizeof(output), "route-target: %u.%u.%u.%u:%u/%d (%s)", in bgp_rt_prefix_print()
970 /* 4-byte-AS:number fmt */ in bgp_rt_prefix_print()
971 snprintf(output, sizeof(output), "route-target: %s:%u/%d (%s)", in bgp_rt_prefix_print()
977 snprintf(output, sizeof(output), "route target: unknown-type(%04x) (%s/%d)", in bgp_rt_prefix_print()
1000 * RFC 4684 Section 4 defines the layout of "origin AS" and "route in decode_rt_routing_info()
1011 return -1; in decode_rt_routing_info()
1017 plen -= 32; /* adjust prefix length */ in decode_rt_routing_info()
1021 return -1; in decode_rt_routing_info()
1025 * and gives the number of octets in the variable-length "route in decode_rt_routing_info()
1031 /* If mask-len is not on octet boundary, ensure all extra bits are 0 */ in decode_rt_routing_info()
1033 ((u_char *)&route_target)[num_octets - 1] &= in decode_rt_routing_info()
1053 return -1; in decode_labeled_vpn_prefix4()
1055 plen -= (24+64); /* adjust prefixlen - labellength - RD len*/ in decode_labeled_vpn_prefix4()
1058 return -1; in decode_labeled_vpn_prefix4()
1063 ((u_char *)&addr)[(plen + 7) / 8 - 1] &= in decode_labeled_vpn_prefix4()
1078 * +-------------------------------+
1080 * | RD:IPv4-address (12 octets) |
1082 * +-------------------------------+
1083 * | MDT Group-address (4 octets) |
1084 * +-------------------------------+
1098 return -1; in decode_mdt_vpn_nlri()
1117 return -2; in decode_mdt_vpn_nlri()
1129 { BGP_MULTICAST_VPN_ROUTE_TYPE_INTRA_AS_I_PMSI, "Intra-AS I-PMSI"},
1130 { BGP_MULTICAST_VPN_ROUTE_TYPE_INTER_AS_I_PMSI, "Inter-AS I-PMSI"},
1131 { BGP_MULTICAST_VPN_ROUTE_TYPE_S_PMSI, "S-PMSI"},
1132 { BGP_MULTICAST_VPN_ROUTE_TYPE_INTRA_AS_SEG_LEAF, "Intra-AS Segment-Leaf"},
1133 { BGP_MULTICAST_VPN_ROUTE_TYPE_SOURCE_ACTIVE, "Source-Active"},
1154 snprintf(buf, buflen, "Route-Type: %s (%u), length: %u", in decode_multicast_vpn()
1165 snprintf(buf + offset, buflen - offset, ", RD: %s, Originator %s", in decode_multicast_vpn()
1168 (route_length - BGP_VPN_RD_LEN) << 3)); in decode_multicast_vpn()
1173 snprintf(buf + offset, buflen - offset, ", RD: %s, Source-AS %s", in decode_multicast_vpn()
1182 snprintf(buf + offset, buflen - offset, ", RD: %s", in decode_multicast_vpn()
1187 addr_length = route_length - sg_length; in decode_multicast_vpn()
1191 snprintf(buf + offset, buflen - offset, ", Originator %s", in decode_multicast_vpn()
1198 snprintf(buf + offset, buflen - offset, ", RD: %s", in decode_multicast_vpn()
1209 snprintf(buf + offset, buflen - offset, ", RD: %s, Source-AS %s", in decode_multicast_vpn()
1219 * no per route-type printing yet. in decode_multicast_vpn()
1229 return -2; in decode_multicast_vpn()
1234 * returns -1 if the buffer would have overflowed. If the return
1248 buflen-=stringlen; \
1263 * -> Assume a 12 Byte-length NLRI is auto-discovery-only in decode_labeled_vpn_l2()
1267 /* assume AD-only with RD, BGPNH */ in decode_labeled_vpn_l2()
1275 tlen -= 12; in decode_labeled_vpn_l2()
1283 … stringlen = snprintf(buf, buflen, "RD: %s, CE-ID: %u, Label-Block Offset: %u, Label Base %u", in decode_labeled_vpn_l2()
1290 tlen -= 15; in decode_labeled_vpn_l2()
1292 /* ok now the variable part - lets read out TLVs*/ in decode_labeled_vpn_l2()
1330 ttlv_len--; in decode_labeled_vpn_l2()
1331 tlen--; in decode_labeled_vpn_l2()
1336 stringlen=snprintf(buf,buflen, "\n\t\tunknown TLV #%u, length: %u", in decode_labeled_vpn_l2()
1348 tlen -= ttlv_len; in decode_labeled_vpn_l2()
1360 return -2; in decode_labeled_vpn_l2()
1373 return -1; in decode_prefix6()
1374 itemlen -= 1; in decode_prefix6()
1381 addr[plenbytes - 1] &= in decode_prefix6()
1388 return -2; in decode_prefix6()
1404 return -1; in decode_labeled_prefix6()
1406 plen -= 24; /* adjust prefixlen - labellength */ in decode_labeled_prefix6()
1409 return -1; in decode_labeled_prefix6()
1410 itemlen -= 4; in decode_labeled_prefix6()
1416 addr[plenbytes - 1] &= in decode_labeled_prefix6()
1429 return -2; in decode_labeled_prefix6()
1432 return -3; in decode_labeled_prefix6()
1445 return -1; in decode_labeled_vpn_prefix6()
1447 plen -= (24+64); /* adjust prefixlen - labellength - RD len*/ in decode_labeled_vpn_prefix6()
1450 return -1; in decode_labeled_vpn_prefix6()
1455 addr[(plen + 7) / 8 - 1] &= in decode_labeled_vpn_prefix6()
1479 return -1; in decode_clnp_prefix()
1484 addr[(plen + 7) / 8 - 1] &= in decode_clnp_prefix()
1505 return -1; in decode_labeled_vpn_clnp_prefix()
1507 plen -= (24+64); /* adjust prefixlen - labellength - RD len*/ in decode_labeled_vpn_clnp_prefix()
1510 return -1; in decode_labeled_vpn_clnp_prefix()
1515 addr[(plen + 7) / 8 - 1] &= ((0xff00 >> (plen % 8)) & 0xff); in decode_labeled_vpn_clnp_prefix()
1532 * Try to find the size of the ASs encoded in an as-path. It is not obvious, as
1534 * support, exchange AS-Path with the same path-attribute type value 0x02.
1551 * Let us assume that ASs are of 2 bytes in size, and check if the AS-Path in bgp_attr_get_as_size()
1552 * TLV is good. If not, ask the caller to try with AS encoded as 4 bytes in bgp_attr_get_as_size()
1636 * then it is add-path in check_add_path()
1647 /* assume not add-path by default */ in check_add_path()
1703 if (ndo->ndo_vflag <= 1) in bgp_mp_af_print()
1705 return -1; in bgp_mp_af_print()
1709 return -2; in bgp_mp_af_print()
1730 if (advance == -1) in bgp_nlri_print()
1732 else if (advance == -2) in bgp_nlri_print()
1743 if (advance == -1) in bgp_nlri_print()
1745 else if (advance == -2) in bgp_nlri_print()
1747 else if (advance == -3) in bgp_nlri_print()
1756 if (advance == -1) in bgp_nlri_print()
1767 if (advance == -1) in bgp_nlri_print()
1769 else if (advance == -2) in bgp_nlri_print()
1777 if (advance == -1) in bgp_nlri_print()
1779 else if (advance == -2) in bgp_nlri_print()
1792 if (advance == -1) in bgp_nlri_print()
1794 else if (advance == -2) in bgp_nlri_print()
1805 if (advance == -1) in bgp_nlri_print()
1807 else if (advance == -2) in bgp_nlri_print()
1809 else if (advance == -3) in bgp_nlri_print()
1818 if (advance == -1) in bgp_nlri_print()
1828 if (advance == -1) in bgp_nlri_print()
1830 else if (advance == -2) in bgp_nlri_print()
1839 if (advance == -1) in bgp_nlri_print()
1848 if (advance == -1) in bgp_nlri_print()
1859 advance = -4; in bgp_nlri_print()
1863 trunc: /* we rely on the caller to recognize -2 return value */ in bgp_nlri_print()
1864 return -2; in bgp_nlri_print()
1917 * contents. So, check for packet's TLV's sanity assuming in bgp_attr_print()
2016 tlen -=4; in bgp_attr_print()
2038 tlen -=4; in bgp_attr_print()
2047 if (ret == -2) in bgp_attr_print()
2053 tlen -= 3; in bgp_attr_print()
2060 tlen--; in bgp_attr_print()
2083 tlen -= tnhlen; in bgp_attr_print()
2088 tnhlen -= sizeof(nd_ipv4); in bgp_attr_print()
2089 tlen -= sizeof(nd_ipv4); in bgp_attr_print()
2098 tlen -= tnhlen; in bgp_attr_print()
2105 tlen -= (sizeof(nd_ipv4)+BGP_VPN_RD_LEN); in bgp_attr_print()
2106 tnhlen -= (sizeof(nd_ipv4)+BGP_VPN_RD_LEN); in bgp_attr_print()
2116 tlen -= tnhlen; in bgp_attr_print()
2121 tlen -= sizeof(nd_ipv6); in bgp_attr_print()
2122 tnhlen -= sizeof(nd_ipv6); in bgp_attr_print()
2131 tlen -= tnhlen; in bgp_attr_print()
2138 tlen -= (sizeof(nd_ipv6)+BGP_VPN_RD_LEN); in bgp_attr_print()
2139 tnhlen -= (sizeof(nd_ipv6)+BGP_VPN_RD_LEN); in bgp_attr_print()
2149 tlen -= tnhlen; in bgp_attr_print()
2154 tlen -= (sizeof(nd_ipv4)); in bgp_attr_print()
2155 tnhlen -= (sizeof(nd_ipv4)); in bgp_attr_print()
2163 tlen -= tnhlen; in bgp_attr_print()
2173 tlen -= tnhlen; in bgp_attr_print()
2179 GET_ISONSAP_STRING(tptr+BGP_VPN_RD_LEN,tnhlen-BGP_VPN_RD_LEN)); in bgp_attr_print()
2187 tlen -= tnhlen; in bgp_attr_print()
2198 tlen -= tnhlen; in bgp_attr_print()
2205 ND_PRINT(", nh-length: %u", nhlen); in bgp_attr_print()
2212 tlen--; in bgp_attr_print()
2216 for (/*nothing*/; snpa != 0; snpa--) { in bgp_attr_print()
2223 tlen--; in bgp_attr_print()
2228 tlen -= snpalen; in bgp_attr_print()
2235 (len-ND_BYTES_BETWEEN(pptr, tptr)), 32); in bgp_attr_print()
2237 (len-ND_BYTES_BETWEEN(pptr, tptr)), 128); in bgp_attr_print()
2242 if (advance == -2) in bgp_attr_print()
2253 if (ret == -2) in bgp_attr_print()
2259 ND_PRINT("\n\t End-of-Rib Marker (empty NLRI)"); in bgp_attr_print()
2264 (len-ND_BYTES_BETWEEN(pptr, tptr)), 32); in bgp_attr_print()
2266 (len-ND_BYTES_BETWEEN(pptr, tptr)), 128); in bgp_attr_print()
2271 if (advance == -2) in bgp_attr_print()
2303 tlen -= 8; in bgp_attr_print()
2318 ND_PRINT("\n\t Tunnel-type %s (%u), Flags [%s], MPLS Label %u", in bgp_attr_print()
2325 tlen -= 5; in bgp_attr_print()
2330 ND_PRINT("\n\t Sender %s, P-Group %s", in bgp_attr_print()
2336 ND_PRINT("\n\t Root-Node %s, P-Group %s", in bgp_attr_print()
2341 ND_PRINT("\n\t Tunnel-Endpoint %s", in bgp_attr_print()
2346 ND_PRINT("\n\t Root-Node %s, LSP-ID 0x%08x", in bgp_attr_print()
2351 ND_PRINT("\n\t Extended-Tunnel-ID %s, P2MP-ID 0x%08x", in bgp_attr_print()
2356 if (ndo->ndo_vflag <= 1) { in bgp_attr_print()
2371 tlen -= 3; in bgp_attr_print()
2373 ND_PRINT("\n\t %s TLV (%u), length %u", in bgp_attr_print()
2379 length -= 3; in bgp_attr_print()
2382 * Check if we can read the TLV data. in bgp_attr_print()
2397 if (ndo->ndo_vflag <= 1) { in bgp_attr_print()
2403 tlen -= length; in bgp_attr_print()
2414 len -= 4; in bgp_attr_print()
2428 len -= 2; in bgp_attr_print()
2438 len -= alenlen; in bgp_attr_print()
2476 len -= alen; in bgp_attr_print()
2497 len -= 12; in bgp_attr_print()
2503 if (ndo->ndo_vflag <= 1) in bgp_attr_print()
2508 if (ndo->ndo_vflag > 1 && len) { /* omit zero length attributes*/ in bgp_attr_print()
2561 tcap_len -= 4; in bgp_capabilities_print()
2575 tcap_len-=2; in bgp_capabilities_print()
2586 tcap_len -= 4; in bgp_capabilities_print()
2625 tcap_len -= 4; in bgp_capabilities_print()
2632 if (ndo->ndo_vflag <= 1) in bgp_capabilities_print()
2637 if (ndo->ndo_vflag > 1 && cap_len != 0) { in bgp_capabilities_print()
2667 GET_U_1(bgp_open_header->bgpo_version)); in bgp_open_print()
2669 as_printf(ndo, astostr, sizeof(astostr), GET_BE_U_2(bgp_open_header->bgpo_myas))); in bgp_open_print()
2671 GET_BE_U_2(bgp_open_header->bgpo_holdtime)); in bgp_open_print()
2672 ND_PRINT("ID %s", GET_IPADDR_STRING(bgp_open_header->bgpo_id)); in bgp_open_print()
2673 optslen = GET_U_1(bgp_open_header->bgpo_optlen); in bgp_open_print()
2677 length -= BGP_OPEN_SIZE; in bgp_open_print()
2687 opt_type = GET_U_1(bgpopt->bgpopt_type); in bgp_open_print()
2688 opt_len = GET_U_1(bgpopt->bgpopt_len); in bgp_open_print()
2738 length -= BGP_SIZE; in bgp_update_print()
2746 length -= 2; in bgp_update_print()
2762 length -= withdrawn_routes_len; in bgp_update_print()
2767 length -= 4; in bgp_update_print()
2768 withdrawn_routes_len -= 4; in bgp_update_print()
2771 if (wpfx == -1) { in bgp_update_print()
2774 } else if (wpfx == -2) in bgp_update_print()
2782 length -= wpfx; in bgp_update_print()
2783 withdrawn_routes_len -= wpfx; in bgp_update_print()
2791 length -= withdrawn_routes_len; in bgp_update_print()
2799 length -= 2; in bgp_update_print()
2803 ND_PRINT("\n\t End-of-Rib Marker (empty NLRI)"); in bgp_update_print()
2822 length -= len; in bgp_update_print()
2828 len -= 2; in bgp_update_print()
2829 length -= 2; in bgp_update_print()
2837 length -= len; in bgp_update_print()
2842 len -= alenlen; in bgp_update_print()
2843 length -= alenlen; in bgp_update_print()
2863 length -= len; in bgp_update_print()
2871 len -= alen; in bgp_update_print()
2872 length -= alen; in bgp_update_print()
2886 length -= 4; in bgp_update_print()
2889 if (i == -1) { in bgp_update_print()
2892 } else if (i == -2) in bgp_update_print()
2900 length -= i; in bgp_update_print()
2922 bgpn_major = GET_U_1(bgp_notification_header->bgpn_major); in bgp_notification_print()
2923 bgpn_minor = GET_U_1(bgp_notification_header->bgpn_minor); in bgp_notification_print()
2991 if (shutdown_comm_length > length - (BGP_NOTIFICATION_SIZE + 1)) { in bgp_notification_print()
3005 if(length - (remainder_offset + BGP_NOTIFICATION_SIZE) > 0) { in bgp_notification_print()
3006 … ND_PRINT(", Data: (length: %u)", length - (remainder_offset + BGP_NOTIFICATION_SIZE)); in bgp_notification_print()
3007 …hex_print(ndo, "\n\t\t", tptr + remainder_offset, length - (remainder_offset + BGP_NOTIFICATION_SI… in bgp_notification_print()
3036 GET_BE_U_2(bgp_route_refresh_header->afi)), in bgp_route_refresh_print()
3037 GET_BE_U_2(bgp_route_refresh_header->afi), in bgp_route_refresh_print()
3039 GET_U_1(bgp_route_refresh_header->safi)), in bgp_route_refresh_print()
3040 GET_U_1(bgp_route_refresh_header->safi)); in bgp_route_refresh_print()
3042 if (ndo->ndo_vflag > 1) { in bgp_route_refresh_print()
3061 bgp_type = GET_U_1(bgp_header->bgp_type); in bgp_pdu_print()
3101 const u_char *ep = ndo->ndo_snapend; in bgp_print()
3110 ndo->ndo_protocol = "bgp"; in bgp_print()
3113 if (ndo->ndo_vflag < 1) /* lets be less chatty */ in bgp_print()
3140 hlen = GET_BE_U_2(bgp_header->bgp_len); in bgp_print()
3156 GET_U_1(bgp_header->bgp_type))); in bgp_print()