2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
13 * Copyright (c) 2009 Mojatatu Networks, Inc
17 /* \summary: Forwarding and Control Element Separation (ForCES) Protocol printer */
19 /* specification: RFC 5810 */
25 #include "netdissect-stdinc.h"
27 #include "netdissect.h"
32 #define ForCES_HDRL 24
33 #define ForCES_ALNL 4U
38 #define TOM_ASSNSETUP 0x1
39 #define TOM_ASSNTEARD 0x2
40 #define TOM_CONFIG 0x3
42 #define TOM_EVENTNOT 0x5
43 #define TOM_PKTREDIR 0x6
44 #define TOM_HEARTBT 0x0F
45 #define TOM_ASSNSETREP 0x11
46 #define TOM_CONFIGREP 0x13
47 #define TOM_QUERYREP 0x14
50 * tom_h Flags: resv1(8b):maxtlvs(4b):resv2(2b):mintlv(2b)
52 #define ZERO_TTLV 0x01
53 #define ZERO_MORE_TTLV 0x02
54 #define ONE_MORE_TTLV 0x04
60 #define TTLV_T1 (ONE_MORE_TTLV|ONE_TLV)
61 #define TTLV_T2 (ONE_MORE_TTLV|MAX_TLV)
68 int (*print) (netdissect_options *ndo, const u_char * pptr, u_int len,
69 uint16_t op_msk, int indent);
86 #define TOM_MAX_IND (_TOM_RSV_MAX - 1)
89 tom_valid(uint8_t tom)
92 if (tom >= 0x7 && tom <= 0xe)
104 ForCES_node(uint32_t node)
106 if (node <= 0x3FFFFFFF)
108 if (node >= 0x40000000 && node <= 0x7FFFFFFF)
110 if (node >= 0xC0000000 && node <= 0xFFFFFFEF)
111 return "AllMulticast";
112 if (node == 0xFFFFFFFD)
113 return "AllCEsBroadcast";
114 if (node == 0xFFFFFFFE)
115 return "AllFEsBroadcast";
116 if (node == 0xFFFFFFFF)
117 return "AllBroadcast";
119 return "ForCESreserved";
123 static const struct tok ForCES_ACKs[] = {
131 static const struct tok ForCES_EMs[] = {
133 {0x1, "execute-all-or-none"},
134 {0x2, "execute-until-failure"},
135 {0x3, "continue-execute-on-failure"},
139 static const struct tok ForCES_ATs[] = {
141 {0x1, "2PCtransaction"},
145 static const struct tok ForCES_TPs[] = {
146 {0x0, "StartofTransaction"},
147 {0x1, "MiddleofTransaction"},
148 {0x2, "EndofTransaction"},
154 * Structure of forces header, naked of TLVs.
157 nd_uint8_t fm_vrsvd; /* version and reserved */
158 #define ForCES_V(forcesh) (GET_U_1((forcesh)->fm_vrsvd) >> 4)
159 nd_uint8_t fm_tom; /* type of message */
160 nd_uint16_t fm_len; /* total length * 4 bytes */
161 #define ForCES_BLN(forcesh) ((uint32_t)(GET_BE_U_2((forcesh)->fm_len) << 2))
162 nd_uint32_t fm_sid; /* Source ID */
163 #define ForCES_SID(forcesh) GET_BE_U_4((forcesh)->fm_sid)
164 nd_uint32_t fm_did; /* Destination ID */
165 #define ForCES_DID(forcesh) GET_BE_U_4((forcesh)->fm_did)
166 nd_uint8_t fm_cor[8]; /* correlator */
167 nd_uint32_t fm_flags; /* flags */
168 #define ForCES_ACK(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0xC0000000) >> 30)
169 #define ForCES_PRI(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x38000000) >> 27)
170 #define ForCES_RS1(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x07000000) >> 24)
171 #define ForCES_EM(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x00C00000) >> 22)
172 #define ForCES_AT(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x00200000) >> 21)
173 #define ForCES_TP(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x00180000) >> 19)
174 #define ForCES_RS2(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x0007FFFF) >> 0)
177 #define ForCES_HLN_VALID(fhl,tlen) ((tlen) >= ForCES_HDRL && \
178 (fhl) >= ForCES_HDRL && \
181 #define F_LFB_RSVD 0x0
182 #define F_LFB_FEO 0x1
183 #define F_LFB_FEPO 0x2
184 static const struct tok ForCES_LFBs[] = {
185 {F_LFB_RSVD, "Invalid TLV"},
186 {F_LFB_FEO, "FEObj LFB"},
187 {F_LFB_FEPO, "FEProtoObj LFB"},
191 /* this is defined in RFC5810 section A.2 */
192 /* https://www.iana.org/assignments/forces/forces.xhtml#oper-tlv-types */
211 #define F_OP_MAX (_F_OP_MAX - 1)
214 B_OP_SET = 1 << (F_OP_SET - 1),
215 B_OP_SETPROP = 1 << (F_OP_SETPROP - 1),
216 B_OP_SETRESP = 1 << (F_OP_SETRESP - 1),
217 B_OP_SETPRESP = 1 << (F_OP_SETPRESP - 1),
218 B_OP_DEL = 1 << (F_OP_DEL - 1),
219 B_OP_DELRESP = 1 << (F_OP_DELRESP - 1),
220 B_OP_GET = 1 << (F_OP_GET - 1),
221 B_OP_GETPROP = 1 << (F_OP_GETPROP - 1),
222 B_OP_GETRESP = 1 << (F_OP_GETRESP - 1),
223 B_OP_GETPRESP = 1 << (F_OP_GETPRESP - 1),
224 B_OP_REPORT = 1 << (F_OP_REPORT - 1),
225 B_OP_COMMIT = 1 << (F_OP_COMMIT - 1),
226 B_OP_RCOMMIT = 1 << (F_OP_RCOMMIT - 1),
227 B_OP_RTRCOMP = 1 << (F_OP_RTRCOMP - 1)
234 int (*print) (netdissect_options *ndo, const u_char * pptr, u_int len,
235 uint16_t op_msk, int indent);
238 static int genoptlv_print(netdissect_options *, const u_char * pptr, u_int len,
239 uint16_t op_msk, int indent);
240 static int recpdoptlv_print(netdissect_options *, const u_char * pptr, u_int len,
241 uint16_t op_msk, int indent);
242 static int invoptlv_print(netdissect_options *, const u_char * pptr, u_int len,
243 uint16_t op_msk, int indent);
258 static const struct optlv_h OPTLV_msg[F_OP_MAX + 1] = {
259 /* F_OP_RSV */ {ZERO_TTLV, 0, "Invalid OPTLV", invoptlv_print},
260 /* F_OP_SET */ {TTLV_T2, B_FULLD | B_SPARD, " Set", recpdoptlv_print},
262 {TTLV_T2, B_FULLD | B_SPARD, " SetProp", recpdoptlv_print},
263 /* F_OP_SETRESP */ {TTLV_T2, B_RESTV, " SetResp", recpdoptlv_print},
264 /* F_OP_SETPRESP */ {TTLV_T2, B_RESTV, " SetPropResp", recpdoptlv_print},
265 /* F_OP_DEL */ {ZERO_TTLV, 0, " Del", recpdoptlv_print},
266 /* F_OP_DELRESP */ {TTLV_T2, B_RESTV, " DelResp", recpdoptlv_print},
267 /* F_OP_GET */ {ZERO_TTLV, 0, " Get", recpdoptlv_print},
268 /* F_OP_GETPROP */ {ZERO_TTLV, 0, " GetProp", recpdoptlv_print},
270 {TTLV_T2, B_FULLD | B_SPARD | B_RESTV, " GetResp", recpdoptlv_print},
272 {TTLV_T2, B_FULLD | B_RESTV, " GetPropResp", recpdoptlv_print},
274 {TTLV_T2, B_FULLD | B_SPARD, " Report", recpdoptlv_print},
275 /* F_OP_COMMIT */ {ZERO_TTLV, 0, " Commit", NULL},
276 /* F_OP_RCOMMIT */ {TTLV_T1, B_RESTV, " RCommit", genoptlv_print},
277 /* F_OP_RTRCOMP */ {ZERO_TTLV, 0, " RTRCOMP", NULL},
280 static const struct optlv_h *
281 get_forces_optlv_h(uint16_t opt)
283 if (opt > F_OP_MAX || opt == F_OP_RSV)
284 return &OPTLV_msg[F_OP_RSV];
286 return &OPTLV_msg[opt];
291 #define IND_PREF '\n'
293 static char ind_buf[IND_SIZE];
296 indent_pr(int indent, int nlpref)
301 if (indent > (IND_SIZE - 1))
302 indent = IND_SIZE - 1;
310 while (--indent >= 0)
318 op_valid(uint16_t op, uint16_t mask)
323 return (1 << (op - 1)) & mask; /* works only for 0x0001 through 0x0010 */
324 /* I guess we should allow vendor operations? */
330 #define F_TLV_RSVD 0x0000
331 #define F_TLV_REDR 0x0001
332 #define F_TLV_ASRS 0x0010
333 #define F_TLV_ASRT 0x0011
334 #define F_TLV_LFBS 0x1000
335 #define F_TLV_PDAT 0x0110
336 #define F_TLV_KEYI 0x0111
337 #define F_TLV_FULD 0x0112
338 #define F_TLV_SPAD 0x0113
339 #define F_TLV_REST 0x0114
340 #define F_TLV_METD 0x0115
341 #define F_TLV_REDD 0x0116
342 #define F_TLV_TRNG 0x0117
345 #define F_TLV_VNST 0x8000
347 static const struct tok ForCES_TLV[] = {
348 {F_TLV_RSVD, "Invalid TLV"},
349 {F_TLV_REDR, "REDIRECT TLV"},
350 {F_TLV_ASRS, "ASResult TLV"},
351 {F_TLV_ASRT, "ASTreason TLV"},
352 {F_TLV_LFBS, "LFBselect TLV"},
353 {F_TLV_PDAT, "PATH-DATA TLV"},
354 {F_TLV_KEYI, "KEYINFO TLV"},
355 {F_TLV_FULD, "FULLDATA TLV"},
356 {F_TLV_SPAD, "SPARSEDATA TLV"},
357 {F_TLV_REST, "RESULT TLV"},
358 {F_TLV_METD, "METADATA TLV"},
359 {F_TLV_REDD, "REDIRECTDATA TLV"},
365 ttlv_valid(uint16_t ttlv)
368 if (ttlv == 1 || ttlv == 0x1000)
370 if (ttlv >= 0x10 && ttlv <= 0x11)
372 if (ttlv >= 0x110 && ttlv <= 0x116)
391 #define F_ALN_LEN(len) roundup2(len, ForCES_ALNL)
392 #define GET_TOP_TLV(fhdr) ((const struct forces_tlv *)((fhdr) + sizeof (struct forcesh)))
393 #define TLV_SET_LEN(len) (F_ALN_LEN(TLV_HDRL) + (len))
394 #define TLV_DATA(tlvp) ((const void*)(((const char*)(tlvp)) + TLV_SET_LEN(0)))
395 #define GO_NXT_TLV(tlv,rlen) ((rlen) -= F_ALN_LEN(GET_BE_U_2((tlv)->length)), \
396 (const struct forces_tlv*)(((const char*)(tlv)) \
397 + F_ALN_LEN(GET_BE_U_2((tlv)->length))))
398 #define ILV_SET_LEN(len) (F_ALN_LEN(ILV_HDRL) + (len))
399 #define ILV_DATA(ilvp) ((const void*)(((const char*)(ilvp)) + ILV_SET_LEN(0)))
400 #define GO_NXT_ILV(ilv,rlen) ((rlen) -= F_ALN_LEN(GET_BE_U_4((ilv)->length)), \
401 (const struct forces_ilv *)(((const char*)(ilv)) \
402 + F_ALN_LEN(GET_BE_U_4((ilv)->length))))
403 #define INVALID_RLEN 1
404 #define INVALID_STLN 2
405 #define INVALID_LTLN 3
406 #define INVALID_ALEN 4
408 static const struct tok ForCES_TLV_err[] = {
409 {INVALID_RLEN, "Invalid total length"},
410 {INVALID_STLN, "xLV too short"},
411 {INVALID_LTLN, "xLV too long"},
412 {INVALID_ALEN, "data padding missing"},
417 tlv_valid(u_int tlvl, u_int rlen)
425 if (rlen < F_ALN_LEN(tlvl))
432 ilv_valid(netdissect_options *ndo, const struct forces_ilv *ilv, u_int rlen)
436 if (GET_BE_U_4(ilv->length) < ILV_HDRL)
438 if (GET_BE_U_4(ilv->length) > rlen)
440 if (rlen < F_ALN_LEN(GET_BE_U_4(ilv->length)))
446 static int lfbselect_print(netdissect_options *, const u_char * pptr, u_int len,
447 uint16_t op_msk, int indent);
448 static int redirect_print(netdissect_options *, const u_char * pptr, u_int len,
449 uint16_t op_msk, int indent);
450 static int asrtlv_print(netdissect_options *, const u_char * pptr, u_int len,
451 uint16_t op_msk, int indent);
452 static int asttlv_print(netdissect_options *, const u_char * pptr, u_int len,
453 uint16_t op_msk, int indent);
455 struct forces_lfbsh {
457 nd_uint32_t instance;
460 #define ASSNS_OPS (B_OP_REPORT)
461 #define CFG_OPS (B_OP_SET|B_OP_SETPROP|B_OP_DEL|B_OP_COMMIT|B_OP_RTRCOMP)
462 #define CFG_ROPS (B_OP_SETRESP|B_OP_SETPRESP|B_OP_DELRESP|B_OP_RCOMMIT)
463 #define CFG_QY (B_OP_GET|B_OP_GETPROP)
464 #define CFG_QYR (B_OP_GETRESP|B_OP_GETPRESP)
465 #define CFG_EVN (B_OP_REPORT)
467 static const struct tom_h ForCES_msg[TOM_MAX_IND + 1] = {
468 /* TOM_RSV_I */ {TOM_RSVD, ZERO_TTLV, 0, "Invalid message", NULL},
469 /* TOM_ASS_I */ {TOM_ASSNSETUP, ZERO_MORE_TTLV | TWO_TLV, ASSNS_OPS,
470 "Association Setup", lfbselect_print},
472 {TOM_ASSNTEARD, TTLV_T1, 0, "Association TearDown", asttlv_print},
473 /* TOM_CFG_I */ {TOM_CONFIG, TTLV_T2, CFG_OPS, "Config", lfbselect_print},
474 /* TOM_QRY_I */ {TOM_QUERY, TTLV_T2, CFG_QY, "Query", lfbselect_print},
475 /* TOM_EVN_I */ {TOM_EVENTNOT, TTLV_T1, CFG_EVN, "Event Notification",
478 {TOM_PKTREDIR, TTLV_T2, 0, "Packet Redirect", redirect_print},
479 /* TOM_HBT_I */ {TOM_HEARTBT, ZERO_TTLV, 0, "HeartBeat", NULL},
481 {TOM_ASSNSETREP, TTLV_T1, 0, "Association Response", asrtlv_print},
482 /* TOM_CNR_I */ {TOM_CONFIGREP, TTLV_T2, CFG_ROPS, "Config Response",
485 {TOM_QUERYREP, TTLV_T2, CFG_QYR, "Query Response", lfbselect_print},
488 static const struct tom_h *
489 get_forces_tom(uint8_t tom)
492 for (i = TOM_RSV_I; i <= TOM_MAX_IND; i++) {
493 const struct tom_h *th = &ForCES_msg[i];
497 return &ForCES_msg[TOM_RSV_I];
505 int (*print) (netdissect_options *, const u_char * pptr, u_int len,
506 uint16_t op_msk, int indent);
518 #define PD_MAX_IND (_TOM_RSV_MAX - 1)
521 pd_valid(uint16_t pd)
523 if (pd >= F_TLV_PDAT && pd <= F_TLV_REST)
529 chk_op_type(netdissect_options *ndo,
530 uint16_t type, uint16_t msk, uint16_t omsk)
532 if (type != F_TLV_PDAT) {
534 if (type != F_TLV_KEYI) {
535 ND_PRINT("Based on flags expected KEYINFO TLV!\n");
539 ND_PRINT("Illegal DATA encoding for type 0x%x programmed %x got %x\n",
548 #define F_SELTABRANGE 2
549 #define F_TABAPPEND 4
557 static int prestlv_print(netdissect_options *, const u_char * pptr, u_int len,
558 uint16_t op_msk, int indent);
559 static int pkeyitlv_print(netdissect_options *, const u_char * pptr, u_int len,
560 uint16_t op_msk, int indent);
561 static int fdatatlv_print(netdissect_options *, const u_char * pptr, u_int len,
562 uint16_t op_msk, int indent);
563 static int sdatatlv_print(netdissect_options *, const u_char * pptr, u_int len,
564 uint16_t op_msk, int indent);
566 static const struct pdata_ops ForCES_pdata[PD_MAX_IND + 1] = {
567 /* PD_RSV_I */ {0, 0, 0, "Invalid message", NULL},
568 /* PD_SEL_I */ {F_TLV_KEYI, 0, 0, "KEYINFO TLV", pkeyitlv_print},
569 /* PD_FDT_I */ {F_TLV_FULD, 0, B_FULLD, "FULLDATA TLV", fdatatlv_print},
570 /* PD_SDT_I */ {F_TLV_SPAD, 0, B_SPARD, "SPARSEDATA TLV", sdatatlv_print},
571 /* PD_RES_I */ {F_TLV_REST, 0, B_RESTV, "RESULT TLV", prestlv_print},
573 {F_TLV_PDAT, 0, 0, "Inner PATH-DATA TLV", recpdoptlv_print},
576 static const struct pdata_ops *
577 get_forces_pd(uint16_t pd)
580 for (i = PD_RSV_I + 1; i <= PD_MAX_IND; i++) {
581 const struct pdata_ops *pdo = &ForCES_pdata[i];
585 return &ForCES_pdata[TOM_RSV_I];
593 E_INVALID_DESTINATION_PID,
596 E_LFB_INSTANCE_ID_NOT_FOUND,
598 E_COMPONENT_DOES_NOT_EXIST,
602 E_INVALID_ARRAY_CREATION,
603 E_VALUE_OUT_OF_RANGE,
605 E_INVALID_PARAMETERS,
606 E_INVALID_MESSAGE_TYPE,
613 /* 0x18-0xFE are reserved .. */
614 E_UNSPECIFIED_ERROR = 0XFF
617 static const struct tok ForCES_errs[] = {
618 {E_SUCCESS, "SUCCESS"},
619 {E_INVALID_HEADER, "INVALID HEADER"},
620 {E_LENGTH_MISMATCH, "LENGTH MISMATCH"},
621 {E_VERSION_MISMATCH, "VERSION MISMATCH"},
622 {E_INVALID_DESTINATION_PID, "INVALID DESTINATION PID"},
623 {E_LFB_UNKNOWN, "LFB UNKNOWN"},
624 {E_LFB_NOT_FOUND, "LFB NOT FOUND"},
625 {E_LFB_INSTANCE_ID_NOT_FOUND, "LFB INSTANCE ID NOT FOUND"},
626 {E_INVALID_PATH, "INVALID PATH"},
627 {E_COMPONENT_DOES_NOT_EXIST, "COMPONENT DOES NOT EXIST"},
628 {E_EXISTS, "EXISTS ALREADY"},
629 {E_NOT_FOUND, "NOT FOUND"},
630 {E_READ_ONLY, "READ ONLY"},
631 {E_INVALID_ARRAY_CREATION, "INVALID ARRAY CREATION"},
632 {E_VALUE_OUT_OF_RANGE, "VALUE OUT OF RANGE"},
633 {E_CONTENTS_TOO_LONG, "CONTENTS TOO LONG"},
634 {E_INVALID_PARAMETERS, "INVALID PARAMETERS"},
635 {E_INVALID_MESSAGE_TYPE, "INVALID MESSAGE TYPE"},
636 {E_INVALID_FLAGS, "INVALID FLAGS"},
637 {E_INVALID_TLV, "INVALID TLV"},
638 {E_EVENT_ERROR, "EVENT ERROR"},
639 {E_NOT_SUPPORTED, "NOT SUPPORTED"},
640 {E_MEMORY_ERROR, "MEMORY ERROR"},
641 {E_INTERNAL_ERROR, "INTERNAL ERROR"},
642 {E_UNSPECIFIED_ERROR, "UNSPECIFIED ERROR"},
649 prestlv_print(netdissect_options *ndo,
650 const u_char * pptr, u_int len,
651 uint16_t op_msk _U_, int indent)
653 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr;
654 const u_char *tdp = (const u_char *) TLV_DATA(tlv);
655 const struct res_val *r = (const struct res_val *)tdp;
660 * pdatacnt_print() has ensured that len (the TLV length)
663 dlen = len - TLV_HDRL;
664 if (dlen != RESLEN) {
665 ND_PRINT("illegal RESULT-TLV: %u bytes!\n", dlen);
670 result = GET_U_1(r->result);
671 if (result >= 0x18 && result <= 0xFE) {
672 ND_PRINT("illegal reserved result code: 0x%x!\n", result);
676 if (ndo->ndo_vflag >= 3) {
677 char *ib = indent_pr(indent, 0);
678 ND_PRINT("%s Result: %s (code 0x%x)\n", ib,
679 tok2str(ForCES_errs, NULL, result), result);
689 fdatatlv_print(netdissect_options *ndo,
690 const u_char * pptr, u_int len,
691 uint16_t op_msk _U_, int indent)
693 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr;
695 const u_char *tdp = (const u_char *) TLV_DATA(tlv);
699 * pdatacnt_print() or pkeyitlv_print() has ensured that len
700 * (the TLV length) >= TLV_HDRL.
702 rlen = len - TLV_HDRL;
704 type = GET_BE_U_2(tlv->type);
705 if (type != F_TLV_FULD) {
706 ND_PRINT("Error: expecting FULLDATA!\n");
710 if (ndo->ndo_vflag >= 3) {
711 char *ib = indent_pr(indent + 2, 1);
712 ND_PRINT("%s[", ib + 1);
713 hex_print(ndo, ib, tdp, rlen);
714 ND_PRINT("\n%s]", ib + 1);
724 sdatailv_print(netdissect_options *ndo,
725 const u_char * pptr, u_int len,
726 uint16_t op_msk _U_, int indent)
729 const struct forces_ilv *ilv = (const struct forces_ilv *)pptr;
732 if (len < ILV_HDRL) {
733 ND_PRINT("Error: BAD SPARSEDATA-TLV!\n");
740 ND_PRINT("Jamal - outstanding length <%u>\n", rlen);
742 char *ib = indent_pr(indent, 1);
743 const u_char *tdp = (const u_char *) ILV_DATA(ilv);
744 invilv = ilv_valid(ndo, ilv, rlen);
746 ND_PRINT("Error: %s, rlen %u\n",
747 tok2str(ForCES_TLV_err, NULL, invilv), rlen);
750 if (ndo->ndo_vflag >= 3) {
751 u_int ilvl = GET_BE_U_4(ilv->length);
752 ND_PRINT("\n%s ILV: type %x length %u\n", ib + 1,
753 GET_BE_U_4(ilv->type), ilvl);
754 hex_print(ndo, "\t\t[", tdp, ilvl-ILV_HDRL);
757 ilv = GO_NXT_ILV(ilv, rlen);
764 sdatatlv_print(netdissect_options *ndo,
765 const u_char * pptr, u_int len,
766 uint16_t op_msk, int indent)
768 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr;
770 const u_char *tdp = (const u_char *) TLV_DATA(tlv);
774 * pdatacnt_print() has ensured that len (the TLV length)
777 rlen = len - TLV_HDRL;
779 type = GET_BE_U_2(tlv->type);
780 if (type != F_TLV_SPAD) {
781 ND_PRINT("Error: expecting SPARSEDATA!\n");
785 return sdatailv_print(ndo, tdp, rlen, op_msk, indent);
793 pkeyitlv_print(netdissect_options *ndo,
794 const u_char * pptr, u_int len,
795 uint16_t op_msk, int indent)
797 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr;
798 const u_char *tdp = (const u_char *) TLV_DATA(tlv);
799 const u_char *dp = tdp + 4;
800 const struct forces_tlv *kdtlv = (const struct forces_tlv *)dp;
802 char *ib = indent_pr(indent, 0);
806 id = GET_BE_U_4(tdp);
807 ND_PRINT("%sKeyinfo: Key 0x%x\n", ib, id);
808 type = GET_BE_U_2(kdtlv->type);
809 tll = GET_BE_U_2(kdtlv->length);
810 invtlv = tlv_valid(tll, len);
813 ND_PRINT("%s TLV type 0x%x len %u\n",
814 tok2str(ForCES_TLV_err, NULL, invtlv), type,
819 * At this point, tlv_valid() has ensured that the TLV
820 * length is large enough but not too large (it doesn't
821 * go past the end of the containing TLV).
823 tll = GET_BE_U_2(kdtlv->length);
824 dp = (const u_char *) TLV_DATA(kdtlv);
825 return fdatatlv_print(ndo, dp, tll, op_msk, indent);
828 #define PTH_DESC_SIZE 12
831 pdatacnt_print(netdissect_options *ndo,
832 const u_char * pptr, u_int len,
833 uint16_t IDcnt, uint16_t op_msk, int indent)
837 char *ib = indent_pr(indent, 0);
839 if ((op_msk & B_APPND) && ndo->ndo_vflag >= 3) {
840 ND_PRINT("%sTABLE APPEND\n", ib);
842 for (i = 0; i < IDcnt; i++) {
846 id = GET_BE_U_4(pptr);
847 if (ndo->ndo_vflag >= 3)
848 ND_PRINT("%sID#%02u: %u\n", ib, i + 1, id);
853 if ((op_msk & B_TRNG) || (op_msk & B_KEYIN)) {
854 if (op_msk & B_TRNG) {
855 uint32_t starti, endi;
857 if (len < PTH_DESC_SIZE) {
858 ND_PRINT("pathlength %u with key/range too short %u\n",
863 pptr += sizeof(struct forces_tlv);
864 len -= sizeof(struct forces_tlv);
866 starti = GET_BE_U_4(pptr);
870 endi = GET_BE_U_4(pptr);
874 if (ndo->ndo_vflag >= 3)
875 ND_PRINT("%sTable range: [%u,%u]\n", ib, starti, endi);
878 if (op_msk & B_KEYIN) {
879 const struct forces_tlv *keytlv;
882 if (len < PTH_DESC_SIZE) {
883 ND_PRINT("pathlength %u with key/range too short %u\n",
891 keytlv = (const struct forces_tlv *)pptr;
893 pptr += sizeof(struct forces_tlv);
894 len -= sizeof(struct forces_tlv);
895 /* skip key content */
896 tll = GET_BE_U_2(keytlv->length);
897 if (tll < TLV_HDRL) {
898 ND_PRINT("key content length %u < %u\n",
904 ND_PRINT("key content too short\n");
914 const struct forces_tlv *pdtlv = (const struct forces_tlv *)pptr;
921 type = GET_BE_U_2(pdtlv->type);
922 tlvl = GET_BE_U_2(pdtlv->length);
923 invtlv = tlv_valid(tlvl, len);
925 ND_PRINT("%s Outstanding bytes %u for TLV type 0x%x TLV len %u\n",
926 tok2str(ForCES_TLV_err, NULL, invtlv), len, type,
931 * At this point, tlv_valid() has ensured that the TLV
932 * length is large enough but not too large (it doesn't
933 * go past the end of the containing TLV).
935 tll = tlvl - TLV_HDRL;
936 aln = F_ALN_LEN(tlvl);
939 ND_PRINT("Invalid padded pathdata TLV type 0x%x len %u missing %u pad bytes\n",
940 type, tlvl, aln - len);
945 if (pd_valid(type)) {
946 const struct pdata_ops *ops = get_forces_pd(type);
948 if (ndo->ndo_vflag >= 3 && ops->v != F_TLV_PDAT) {
950 ND_PRINT("%s %s (Length %u DataLen %u pad %u Bytes)\n",
951 ib, ops->s, tlvl, tll, pad);
953 ND_PRINT("%s %s (Length %u DataLen %u Bytes)\n",
954 ib, ops->s, tlvl, tll);
957 chk_op_type(ndo, type, op_msk, ops->op_msk);
959 if (ops->print(ndo, (const u_char *)pdtlv,
960 tll + pad + TLV_HDRL, op_msk,
963 len -= (TLV_HDRL + pad + tll);
965 ND_PRINT("Invalid path data content type 0x%x len %u\n",
969 hex_print(ndo, "Bad Data val\n\t [",
985 pdata_print(netdissect_options *ndo,
986 const u_char * pptr, u_int len,
987 uint16_t op_msk, int indent)
989 const struct pathdata_h *pdh = (const struct pathdata_h *)pptr;
990 char *ib = indent_pr(indent, 0);
996 if (len < sizeof(struct pathdata_h))
998 if (ndo->ndo_vflag >= 3) {
999 ND_PRINT("\n%sPathdata: Flags 0x%x ID count %u\n",
1000 ib, GET_BE_U_2(pdh->pflags),
1001 GET_BE_U_2(pdh->pIDcnt));
1004 if (GET_BE_U_2(pdh->pflags) & F_SELKEY) {
1008 /* Table GET Range operation */
1009 if (GET_BE_U_2(pdh->pflags) & F_SELTABRANGE) {
1012 /* Table SET append operation */
1013 if (GET_BE_U_2(pdh->pflags) & F_TABAPPEND) {
1017 pptr += sizeof(struct pathdata_h);
1018 len -= sizeof(struct pathdata_h);
1019 idcnt = GET_BE_U_2(pdh->pIDcnt);
1020 minsize = idcnt * 4;
1021 if (len < minsize) {
1022 ND_PRINT("\t\t\ttruncated IDs expected %uB got %uB\n", minsize,
1024 hex_print(ndo, "\t\t\tID Data[", pptr, len);
1029 if ((op_msk & B_TRNG) && (op_msk & B_KEYIN)) {
1030 ND_PRINT("\t\t\tIllegal to have both Table ranges and keys\n");
1034 more_pd = pdatacnt_print(ndo, pptr, len, idcnt, op_msk, indent);
1036 int consumed = len - more_pd;
1039 /* XXX: Argh, recurse some more */
1040 return recpdoptlv_print(ndo, pptr, len, op_msk, indent+1);
1045 nd_print_trunc(ndo);
1050 genoptlv_print(netdissect_options *ndo,
1051 const u_char * pptr, u_int len,
1052 uint16_t op_msk, int indent)
1054 const struct forces_tlv *pdtlv = (const struct forces_tlv *)pptr;
1058 char *ib = indent_pr(indent, 0);
1060 type = GET_BE_U_2(pdtlv->type);
1061 tlvl = GET_BE_U_2(pdtlv->length);
1062 invtlv = tlv_valid(tlvl, len);
1063 ND_PRINT("genoptlvprint - %s TLV type 0x%x len %u\n",
1064 tok2str(ForCES_TLV, NULL, type), type, tlvl);
1067 * At this point, tlv_valid() has ensured that the TLV
1068 * length is large enough but not too large (it doesn't
1069 * go past the end of the containing TLV).
1071 const u_char *dp = (const u_char *) TLV_DATA(pdtlv);
1073 if (!ttlv_valid(type)) {
1074 ND_PRINT("%s TLV type 0x%x len %u\n",
1075 tok2str(ForCES_TLV_err, NULL, invtlv), type,
1079 if (ndo->ndo_vflag >= 3)
1080 ND_PRINT("%s%s, length %u (data length %u Bytes)",
1081 ib, tok2str(ForCES_TLV, NULL, type),
1082 tlvl, tlvl - TLV_HDRL);
1084 return pdata_print(ndo, dp, tlvl - TLV_HDRL, op_msk, indent + 1);
1086 ND_PRINT("\t\t\tInvalid ForCES TLV type=%x", type);
1092 recpdoptlv_print(netdissect_options *ndo,
1093 const u_char * pptr, u_int len,
1094 uint16_t op_msk, int indent)
1096 const struct forces_tlv *pdtlv = (const struct forces_tlv *)pptr;
1099 uint16_t type, tlvl;
1104 tlvl = GET_BE_U_2(pdtlv->length);
1105 invtlv = tlv_valid(tlvl, len);
1111 * At this point, tlv_valid() has ensured that the TLV
1112 * length is large enough but not too large (it doesn't
1113 * go past the end of the containing TLV).
1115 ib = indent_pr(indent, 0);
1116 type = GET_BE_U_2(pdtlv->type);
1117 dp = (const u_char *) TLV_DATA(pdtlv);
1119 if (ndo->ndo_vflag >= 3)
1120 ND_PRINT("%s%s, length %u (data encapsulated %u Bytes)",
1121 ib, tok2str(ForCES_TLV, NULL, type),
1125 if (pdata_print(ndo, dp, tlvl - TLV_HDRL, op_msk, indent + 1) == -1)
1127 pdtlv = GO_NXT_TLV(pdtlv, len);
1131 ND_PRINT("\n\t\tMessy PATHDATA TLV header, type (0x%x)\n\t\texcess of %u Bytes ",
1132 GET_BE_U_2(pdtlv->type),
1133 len - GET_BE_U_2(pdtlv->length));
1141 invoptlv_print(netdissect_options *ndo,
1142 const u_char * pptr, u_int len,
1143 uint16_t op_msk _U_, int indent)
1145 char *ib = indent_pr(indent, 1);
1147 if (ndo->ndo_vflag >= 3) {
1148 ND_PRINT("%sData[", ib + 1);
1149 hex_print(ndo, ib, pptr, len);
1150 ND_PRINT("%s]\n", ib);
1156 otlv_print(netdissect_options *ndo,
1157 const struct forces_tlv *otlv, uint16_t op_msk _U_, int indent)
1160 const u_char *dp = (const u_char *) TLV_DATA(otlv);
1163 char *ib = indent_pr(indent, 0);
1164 const struct optlv_h *ops;
1167 * lfbselect_print() has ensured that GET_BE_U_2(otlv->length)
1170 type = GET_BE_U_2(otlv->type);
1171 tll = GET_BE_U_2(otlv->length) - TLV_HDRL;
1172 ops = get_forces_optlv_h(type);
1173 if (ndo->ndo_vflag >= 3) {
1174 ND_PRINT("%sOper TLV %s(0x%x) length %u\n", ib, ops->s, type,
1175 GET_BE_U_2(otlv->length));
1177 /* rest of ops must at least have 12B {pathinfo} */
1178 if (tll < OP_MIN_SIZ) {
1179 ND_PRINT("\t\tOper TLV %s(0x%x) length %u\n", ops->s, type,
1180 GET_BE_U_2(otlv->length));
1181 ND_PRINT("\t\tTruncated data size %u minimum required %u\n", tll,
1183 return invoptlv_print(ndo, dp, tll, ops->op_msk, indent);
1187 /* XXX - do anything with ops->flags? */
1189 rc = ops->print(ndo, dp, tll, ops->op_msk, indent + 1);
1197 asttlv_print(netdissect_options *ndo,
1198 const u_char * pptr, u_int len,
1199 uint16_t op_msk _U_, int indent)
1203 char *ib = indent_pr(indent, 0);
1206 * forces_type_print() has ensured that len (the TLV length)
1209 dlen = len - TLV_HDRL;
1210 if (dlen != ASTDLN) {
1211 ND_PRINT("illegal ASTresult-TLV: %u bytes!\n", dlen);
1214 rescode = GET_BE_U_4(pptr);
1215 if (rescode > ASTMCD) {
1216 ND_PRINT("illegal ASTresult result code: %u!\n", rescode);
1220 if (ndo->ndo_vflag >= 3) {
1221 ND_PRINT("Teardown reason:\n%s", ib);
1224 ND_PRINT("Normal Teardown");
1227 ND_PRINT("Loss of Heartbeats");
1230 ND_PRINT("Out of bandwidth");
1233 ND_PRINT("Out of Memory");
1236 ND_PRINT("Application Crash");
1239 ND_PRINT("Unknown Teardown reason");
1242 ND_PRINT("(%x)\n%s", rescode, ib);
1250 asrtlv_print(netdissect_options *ndo,
1251 const u_char * pptr, u_int len,
1252 uint16_t op_msk _U_, int indent)
1256 char *ib = indent_pr(indent, 0);
1259 * forces_type_print() has ensured that len (the TLV length)
1262 dlen = len - TLV_HDRL;
1263 if (dlen != ASRDLN) { /* id, instance, oper tlv */
1264 ND_PRINT("illegal ASRresult-TLV: %u bytes!\n", dlen);
1267 rescode = GET_BE_U_4(pptr);
1269 if (rescode > ASRMCD) {
1270 ND_PRINT("illegal ASRresult result code: %u!\n", rescode);
1274 if (ndo->ndo_vflag >= 3) {
1275 ND_PRINT("\n%s", ib);
1278 ND_PRINT("Success ");
1281 ND_PRINT("FE ID invalid ");
1284 ND_PRINT("permission denied ");
1287 ND_PRINT("Unknown ");
1290 ND_PRINT("(%x)\n%s", rescode, ib);
1300 gentltlv_print(netdissect_options *ndo,
1301 const u_char * pptr _U_, u_int len,
1302 uint16_t op_msk _U_, int indent _U_)
1304 u_int dlen = len - TLV_HDRL;
1306 if (dlen < 4) { /* at least 32 bits must exist */
1307 ND_PRINT("truncated TLV: %u bytes missing! ", 4 - dlen);
1317 print_metailv(netdissect_options *ndo,
1318 const u_char * pptr, uint16_t op_msk _U_, int indent)
1321 char *ib = indent_pr(indent, 0);
1322 /* XXX: check header length */
1323 const struct forces_ilv *ilv = (const struct forces_ilv *)pptr;
1326 * print_metatlv() has ensured that len (what remains in the
1329 rlen = GET_BE_U_4(ilv->length) - ILV_HDRL;
1330 ND_PRINT("%sMetaID 0x%x length %u\n", ib, GET_BE_U_4(ilv->type),
1331 GET_BE_U_4(ilv->length));
1332 if (ndo->ndo_vflag >= 3) {
1333 hex_print(ndo, "\t\t[", ILV_DATA(ilv), rlen);
1340 print_metatlv(netdissect_options *ndo,
1341 const u_char * pptr, u_int len,
1342 uint16_t op_msk _U_, int indent)
1345 char *ib = indent_pr(indent, 0);
1347 const struct forces_ilv *ilv = (const struct forces_ilv *)pptr;
1351 * redirect_print() has ensured that len (what remains in the
1354 dlen = len - TLV_HDRL;
1356 ND_PRINT("\n%s METADATA length %u\n", ib, rlen);
1358 invilv = ilv_valid(ndo, ilv, rlen);
1364 * At this point, ilv_valid() has ensured that the ILV
1365 * length is large enough but not too large (it doesn't
1366 * go past the end of the containing TLV).
1368 print_metailv(ndo, (const u_char *) ilv, 0, indent + 1);
1369 ilv = GO_NXT_ILV(ilv, rlen);
1377 print_reddata(netdissect_options *ndo,
1378 const u_char * pptr, u_int len,
1379 uint16_t op_msk _U_, int indent)
1382 char *ib = indent_pr(indent, 0);
1385 dlen = len - TLV_HDRL;
1387 ND_PRINT("\n%s Redirect Data length %u\n", ib, rlen);
1389 if (ndo->ndo_vflag >= 3) {
1391 hex_print(ndo, "\n\t\t", pptr, rlen);
1392 ND_PRINT("\n\t\t]");
1399 redirect_print(netdissect_options *ndo,
1400 const u_char * pptr, u_int len,
1401 uint16_t op_msk _U_, int indent)
1403 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr;
1409 * forces_type_print() has ensured that len (the TLV length)
1412 dlen = len - TLV_HDRL;
1413 if (dlen <= RD_MIN) {
1414 ND_PRINT("\n\t\ttruncated Redirect TLV: %u bytes missing! ",
1422 uint16_t type, tlvl;
1424 type = GET_BE_U_2(tlv->type);
1425 tlvl = GET_BE_U_2(tlv->length);
1426 invtlv = tlv_valid(tlvl, rlen);
1428 ND_PRINT("Bad Redirect data\n");
1433 * At this point, tlv_valid() has ensured that the TLV
1434 * length is large enough but not too large (it doesn't
1435 * go past the end of the containing TLV).
1437 if (type == F_TLV_METD) {
1438 print_metatlv(ndo, (const u_char *) TLV_DATA(tlv),
1441 } else if (type == F_TLV_REDD) {
1442 print_reddata(ndo, (const u_char *) TLV_DATA(tlv),
1446 ND_PRINT("Unknown REDIRECT TLV 0x%x len %u\n",
1451 tlv = GO_NXT_TLV(tlv, rlen);
1455 ND_PRINT("\n\t\tMessy Redirect TLV header, type (0x%x)\n\t\texcess of %u Bytes ",
1456 GET_BE_U_2(tlv->type),
1457 rlen - GET_BE_U_2(tlv->length));
1468 lfbselect_print(netdissect_options *ndo,
1469 const u_char * pptr, u_int len,
1470 uint16_t op_msk, int indent)
1472 const struct forces_lfbsh *lfbs;
1473 const struct forces_tlv *otlv;
1474 char *ib = indent_pr(indent, 0);
1480 * forces_type_print() has ensured that len (the TLV length)
1483 dlen = len - TLV_HDRL;
1484 if (dlen <= OP_MIN) { /* id, instance, oper tlv header .. */
1485 ND_PRINT("\n\t\ttruncated lfb selector: %u bytes missing! ",
1491 * At this point, we know that dlen > OP_MIN; OP_OFF < OP_MIN, so
1492 * we also know that it's > OP_OFF.
1494 rlen = dlen - OP_OFF;
1496 lfbs = (const struct forces_lfbsh *)pptr;
1497 ND_TCHECK_SIZE(lfbs);
1498 if (ndo->ndo_vflag >= 3) {
1499 ND_PRINT("\n%s%s(Classid %x) instance %x\n",
1501 tok2str(ForCES_LFBs, NULL, GET_BE_U_4(lfbs->class)),
1502 GET_BE_U_4(lfbs->class),
1503 GET_BE_U_4(lfbs->instance));
1506 otlv = (const struct forces_tlv *)(lfbs + 1);
1510 uint16_t type, tlvl;
1512 type = GET_BE_U_2(otlv->type);
1513 tlvl = GET_BE_U_2(otlv->length);
1514 invtlv = tlv_valid(tlvl, rlen);
1519 * At this point, tlv_valid() has ensured that the TLV
1520 * length is large enough but not too large (it doesn't
1521 * go past the end of the containing TLV).
1523 if (op_valid(type, op_msk)) {
1524 otlv_print(ndo, otlv, 0, indent);
1526 if (ndo->ndo_vflag < 3)
1528 ND_PRINT("\t\tINValid oper-TLV type 0x%x length %u for this ForCES message\n",
1530 invoptlv_print(ndo, (const u_char *)otlv, rlen, 0, indent);
1532 otlv = GO_NXT_TLV(otlv, rlen);
1536 ND_PRINT("\n\t\tMessy oper TLV header, type (0x%x)\n\t\texcess of %u Bytes ",
1537 GET_BE_U_2(otlv->type),
1538 rlen - GET_BE_U_2(otlv->length));
1545 nd_print_trunc(ndo);
1550 forces_type_print(netdissect_options *ndo,
1551 const u_char * pptr, const struct forcesh *fhdr _U_,
1552 u_int mlen, const struct tom_h *tops)
1554 const struct forces_tlv *tltlv;
1561 * forces_print() has already checked that mlen >= ForCES_HDRL
1562 * by calling ForCES_HLN_VALID().
1564 rlen = mlen - ForCES_HDRL;
1566 if (rlen > TLV_HLN) {
1567 if (tops->flags & ZERO_TTLV) {
1568 ND_PRINT("<0x%x>Illegal Top level TLV!\n", tops->flags);
1572 if (tops->flags & ZERO_MORE_TTLV)
1574 if (tops->flags & ONE_MORE_TTLV) {
1575 ND_PRINT("\tTop level TLV Data missing!\n");
1580 if (tops->flags & ZERO_TTLV) {
1584 ttlv = tops->flags >> 4;
1585 tltlv = GET_TOP_TLV(pptr);
1587 /*XXX: 15 top level tlvs will probably be fine
1588 You are nuts if you send more ;-> */
1590 uint16_t type, tlvl;
1592 type = GET_BE_U_2(tltlv->type);
1593 tlvl = GET_BE_U_2(tltlv->length);
1594 invtlv = tlv_valid(tlvl, rlen);
1599 * At this point, tlv_valid() has ensured that the TLV
1600 * length is large enough but not too large (it doesn't
1601 * go past the end of the packet).
1603 if (!ttlv_valid(type)) {
1604 ND_PRINT("\n\tInvalid ForCES Top TLV type=0x%x",
1609 if (ndo->ndo_vflag >= 3)
1610 ND_PRINT("\t%s, length %u (data length %u Bytes)",
1611 tok2str(ForCES_TLV, NULL, type),
1615 rc = tops->print(ndo, (const u_char *) TLV_DATA(tltlv),
1621 tltlv = GO_NXT_TLV(tltlv, rlen);
1627 * XXX - if ttlv != 0, does that mean that the packet was too
1628 * short, and didn't have *enough* TLVs in it?
1631 ND_PRINT("\tMess TopTLV header: min %u, total %u advertised %u ",
1632 TLV_HDRL, rlen, GET_BE_U_2(tltlv->length));
1640 forces_print(netdissect_options *ndo,
1641 const u_char * pptr, u_int len)
1643 const struct forcesh *fhdr;
1647 const struct tom_h *tops;
1650 ndo->ndo_protocol = "forces";
1651 fhdr = (const struct forcesh *)pptr;
1652 ND_TCHECK_SIZE(fhdr);
1653 tom = GET_U_1(fhdr->fm_tom);
1654 if (!tom_valid(tom)) {
1655 ND_PRINT("Invalid ForCES message type %u\n", tom);
1659 mlen = ForCES_BLN(fhdr);
1661 tops = get_forces_tom(tom);
1662 if (tops->v == TOM_RSVD) {
1663 ND_PRINT("\n\tUnknown ForCES message type=0x%x", tom);
1667 ND_PRINT("\n\tForCES %s ", tops->s);
1668 if (!ForCES_HLN_VALID(mlen, len)) {
1669 ND_PRINT("Illegal ForCES pkt len - min %u, total recvd %u, advertised %u ",
1670 ForCES_HDRL, len, ForCES_BLN(fhdr));
1674 flg_raw = GET_BE_U_4(pptr + 20);
1675 if (ndo->ndo_vflag >= 1) {
1676 ND_PRINT("\n\tForCES Version %u len %uB flags 0x%08x ",
1677 ForCES_V(fhdr), mlen, flg_raw);
1678 ND_PRINT("\n\tSrcID 0x%x(%s) DstID 0x%x(%s) Correlator 0x%" PRIx64,
1679 ForCES_SID(fhdr), ForCES_node(ForCES_SID(fhdr)),
1680 ForCES_DID(fhdr), ForCES_node(ForCES_DID(fhdr)),
1681 GET_BE_U_8(fhdr->fm_cor));
1684 if (ndo->ndo_vflag >= 2) {
1685 ND_PRINT("\n\tForCES flags:\n\t %s(0x%x), prio=%u, %s(0x%x),\n\t %s(0x%x), %s(0x%x)\n",
1686 tok2str(ForCES_ACKs, "ACKUnknown", ForCES_ACK(fhdr)),
1689 tok2str(ForCES_EMs, "EMUnknown", ForCES_EM(fhdr)),
1691 tok2str(ForCES_ATs, "ATUnknown", ForCES_AT(fhdr)),
1693 tok2str(ForCES_TPs, "TPUnknown", ForCES_TP(fhdr)),
1695 ND_PRINT("\t Extra flags: rsv(b5-7) 0x%x rsv(b13-31) 0x%x\n",
1696 ForCES_RS1(fhdr), ForCES_RS2(fhdr));
1698 rc = forces_type_print(ndo, pptr, fhdr, mlen, tops);
1701 hex_print(ndo, "\n\t[", pptr, len);
1706 if (ndo->ndo_vflag >= 4) {
1707 ND_PRINT("\n\t Raw ForCES message\n\t [");
1708 hex_print(ndo, "\n\t ", pptr, len);
1714 nd_print_trunc(ndo);