Home | History | Annotate | Line # | Download | only in dist
print-lspping.c revision 1.3.14.1
      1 /*
      2  * Redistribution and use in source and binary forms, with or without
      3  * modification, are permitted provided that: (1) source code
      4  * distributions retain the above copyright notice and this paragraph
      5  * in its entirety, and (2) distributions including binary code include
      6  * the above copyright notice and this paragraph in its entirety in
      7  * the documentation or other materials provided with the distribution.
      8  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
      9  * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
     10  * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
     11  * FOR A PARTICULAR PURPOSE.
     12  *
     13  * Original code by Hannes Gredler (hannes (at) juniper.net)
     14  */
     15 
     16 #include <sys/cdefs.h>
     17 #ifndef lint
     18 __RCSID("$NetBSD: print-lspping.c,v 1.3.14.1 2017/02/19 07:36:19 snj Exp $");
     19 #endif
     20 
     21 /* \summary: MPLS LSP PING printer */
     22 
     23 #ifdef HAVE_CONFIG_H
     24 #include "config.h"
     25 #endif
     26 
     27 #include <netdissect-stdinc.h>
     28 
     29 #include "netdissect.h"
     30 #include "extract.h"
     31 #include "addrtoname.h"
     32 
     33 #include "l2vpn.h"
     34 #include "oui.h"
     35 
     36 /* RFC 4349 */
     37 
     38 /*
     39  * LSPPING common header
     40  *
     41  *  0                   1                   2                   3
     42  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     43  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     44  * |         Version Number        |         Must Be Zero          |
     45  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     46  * |  Message Type |   Reply mode  |  Return Code  | Return Subcode|
     47  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     48  * |                        Sender's Handle                        |
     49  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     50  * |                        Sequence Number                        |
     51  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     52  * |                    TimeStamp Sent (seconds)                   |
     53  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     54  * |                  TimeStamp Sent (microseconds)                |
     55  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     56  * |                  TimeStamp Received (seconds)                 |
     57  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     58  * |                TimeStamp Received (microseconds)              |
     59  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     60  * |                            TLVs ...                           |
     61  * .                                                               .
     62  * .                                                               .
     63  * .                                                               .
     64  */
     65 
     66 struct lspping_common_header {
     67     uint8_t version[2];
     68     uint8_t global_flags[2];
     69     uint8_t msg_type;
     70     uint8_t reply_mode;
     71     uint8_t return_code;
     72     uint8_t return_subcode;
     73     uint8_t sender_handle[4];
     74     uint8_t seq_number[4];
     75     uint8_t ts_sent_sec[4];
     76     uint8_t ts_sent_usec[4];
     77     uint8_t ts_rcvd_sec[4];
     78     uint8_t ts_rcvd_usec[4];
     79 };
     80 
     81 #define LSPPING_VERSION            1
     82 
     83 static const struct tok lspping_msg_type_values[] = {
     84     { 1, "MPLS Echo Request"},
     85     { 2, "MPLS Echo Reply"},
     86     { 0, NULL}
     87 };
     88 
     89 static const struct tok lspping_reply_mode_values[] = {
     90     { 1, "Do not reply"},
     91     { 2, "Reply via an IPv4/IPv6 UDP packet"},
     92     { 3, "Reply via an IPv4/IPv6 UDP packet with Router Alert"},
     93     { 4, "Reply via application level control channel"},
     94     { 0, NULL}
     95 };
     96 
     97 static const struct tok lspping_return_code_values[] = {
     98     {  0, "No return code or return code contained in the Error Code TLV"},
     99     {  1, "Malformed echo request received"},
    100     {  2, "One or more of the TLVs was not understood"},
    101     {  3, "Replying router is an egress for the FEC at stack depth"},
    102     {  4, "Replying router has no mapping for the FEC at stack depth"},
    103     {  5, "Reserved"},
    104     {  6, "Reserved"},
    105     {  7, "Reserved"},
    106     {  8, "Label switched at stack-depth"},
    107     {  9, "Label switched but no MPLS forwarding at stack-depth"},
    108     { 10, "Mapping for this FEC is not the given label at stack depth"},
    109     { 11, "No label entry at stack-depth"},
    110     { 12, "Protocol not associated with interface at FEC stack depth"},
    111     { 13, "Premature termination of ping due to label stack shrinking to a single label"},
    112 };
    113 
    114 
    115 /*
    116  * LSPPING TLV header
    117  *  0                   1                   2                   3
    118  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    119  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    120  * |             Type              |            Length             |
    121  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    122  * |                             Value                             |
    123  * .                                                               .
    124  * .                                                               .
    125  * .                                                               .
    126  * |                                                               |
    127  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    128  */
    129 
    130 struct lspping_tlv_header {
    131     uint8_t type[2];
    132     uint8_t length[2];
    133 };
    134 
    135 #define	LSPPING_TLV_TARGET_FEC_STACK      1
    136 #define	LSPPING_TLV_DOWNSTREAM_MAPPING    2
    137 #define	LSPPING_TLV_PAD                   3
    138 /* not assigned                           4 */
    139 #define LSPPING_TLV_VENDOR_ENTERPRISE     5
    140 #define LSPPING_TLV_VENDOR_ENTERPRISE_LEN 4
    141 /* not assigned                           6 */
    142 #define LSPPING_TLV_INTERFACE_LABEL_STACK 7
    143 /* not assigned                           8 */
    144 #define	LSPPING_TLV_ERROR_CODE            9
    145 #define LSPPING_TLV_REPLY_TOS_BYTE        10
    146 #define	LSPPING_TLV_BFD_DISCRIMINATOR     15 /* draft-ietf-bfd-mpls-02 */
    147 #define LSPPING_TLV_BFD_DISCRIMINATOR_LEN 4
    148 #define	LSPPING_TLV_VENDOR_PRIVATE        0xfc00
    149 
    150 static const struct tok lspping_tlv_values[] = {
    151     { LSPPING_TLV_TARGET_FEC_STACK, "Target FEC Stack" },
    152     { LSPPING_TLV_DOWNSTREAM_MAPPING, "Downstream Mapping" },
    153     { LSPPING_TLV_PAD, "Pad" },
    154     { LSPPING_TLV_ERROR_CODE, "Error Code" },
    155     { LSPPING_TLV_VENDOR_ENTERPRISE, "Vendor Enterprise Code" },
    156     { LSPPING_TLV_INTERFACE_LABEL_STACK, "Interface Label Stack" },
    157     { LSPPING_TLV_REPLY_TOS_BYTE, "Reply TOS Byte" },
    158     { LSPPING_TLV_BFD_DISCRIMINATOR, "BFD Discriminator" },
    159     { LSPPING_TLV_VENDOR_PRIVATE, "Vendor Private Code" },
    160     { 0, NULL}
    161 };
    162 
    163 #define	LSPPING_TLV_TARGETFEC_SUBTLV_LDP_IPV4       1
    164 #define	LSPPING_TLV_TARGETFEC_SUBTLV_LDP_IPV6       2
    165 #define	LSPPING_TLV_TARGETFEC_SUBTLV_RSVP_IPV4      3
    166 #define	LSPPING_TLV_TARGETFEC_SUBTLV_RSVP_IPV6      4
    167 /* not assigned                                     5 */
    168 #define	LSPPING_TLV_TARGETFEC_SUBTLV_L3VPN_IPV4     6
    169 #define	LSPPING_TLV_TARGETFEC_SUBTLV_L3VPN_IPV6     7
    170 #define	LSPPING_TLV_TARGETFEC_SUBTLV_L2VPN_ENDPT    8
    171 #define	LSPPING_TLV_TARGETFEC_SUBTLV_FEC_128_PW_OLD 9
    172 #define	LSPPING_TLV_TARGETFEC_SUBTLV_FEC_128_PW     10
    173 #define	LSPPING_TLV_TARGETFEC_SUBTLV_FEC_129_PW     11
    174 #define	LSPPING_TLV_TARGETFEC_SUBTLV_BGP_IPV4       12
    175 #define	LSPPING_TLV_TARGETFEC_SUBTLV_BGP_IPV6       13
    176 #define	LSPPING_TLV_TARGETFEC_SUBTLV_GENERIC_IPV4   14
    177 #define	LSPPING_TLV_TARGETFEC_SUBTLV_GENERIC_IPV6   15
    178 #define	LSPPING_TLV_TARGETFEC_SUBTLV_NIL_FEC        16
    179 
    180 static const struct tok lspping_tlvtargetfec_subtlv_values[] = {
    181     { LSPPING_TLV_TARGETFEC_SUBTLV_LDP_IPV4, "LDP IPv4 prefix"},
    182     { LSPPING_TLV_TARGETFEC_SUBTLV_LDP_IPV6, "LDP IPv6 prefix"},
    183     { LSPPING_TLV_TARGETFEC_SUBTLV_RSVP_IPV4, "RSVP IPv4 Session Query"},
    184     { LSPPING_TLV_TARGETFEC_SUBTLV_RSVP_IPV6, "RSVP IPv6 Session Query"},
    185     { 5, "Reserved"},
    186     { LSPPING_TLV_TARGETFEC_SUBTLV_L3VPN_IPV4, "VPN IPv4 prefix"},
    187     { LSPPING_TLV_TARGETFEC_SUBTLV_L3VPN_IPV6, "VPN IPv6 prefix"},
    188     { LSPPING_TLV_TARGETFEC_SUBTLV_L2VPN_ENDPT, "L2 VPN endpoint"},
    189     { LSPPING_TLV_TARGETFEC_SUBTLV_FEC_128_PW_OLD, "FEC 128 pseudowire (old)"},
    190     { LSPPING_TLV_TARGETFEC_SUBTLV_FEC_128_PW, "FEC 128 pseudowire"},
    191     { LSPPING_TLV_TARGETFEC_SUBTLV_BGP_IPV4, "BGP labeled IPv4 prefix"},
    192     { LSPPING_TLV_TARGETFEC_SUBTLV_BGP_IPV6, "BGP labeled IPv6 prefix"},
    193     { 0, NULL}
    194 };
    195 
    196 /*
    197  *  0                   1                   2                   3
    198  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    199  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    200  * |                          IPv4 prefix                          |
    201  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    202  * | Prefix Length |         Must Be Zero                          |
    203  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    204  */
    205 struct lspping_tlv_targetfec_subtlv_ldp_ipv4_t {
    206     uint8_t prefix [4];
    207     uint8_t prefix_len;
    208 };
    209 
    210 /*
    211  *  0                   1                   2                   3
    212  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    213  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    214  * |                          IPv6 prefix                          |
    215  * |                          (16 octets)                          |
    216  * |                                                               |
    217  * |                                                               |
    218  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    219  * | Prefix Length |         Must Be Zero                          |
    220  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    221  */
    222 struct lspping_tlv_targetfec_subtlv_ldp_ipv6_t {
    223     uint8_t prefix [16];
    224     uint8_t prefix_len;
    225 };
    226 
    227 /*
    228  *  0                   1                   2                   3
    229  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    230  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    231  * |                 IPv4 tunnel end point address                 |
    232  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    233  * |          Must Be Zero         |     Tunnel ID                 |
    234  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    235  * |                       Extended Tunnel ID                      |
    236  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    237  * |                   IPv4 tunnel sender address                  |
    238  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    239  * |          Must Be Zero         |            LSP ID             |
    240  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    241  */
    242 struct lspping_tlv_targetfec_subtlv_rsvp_ipv4_t {
    243     uint8_t tunnel_endpoint [4];
    244     uint8_t res[2];
    245     uint8_t tunnel_id[2];
    246     uint8_t extended_tunnel_id[4];
    247     uint8_t tunnel_sender [4];
    248     uint8_t res2[2];
    249     uint8_t lsp_id [2];
    250 };
    251 
    252 /*
    253  *  0                   1                   2                   3
    254  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    255  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    256  * |                 IPv6 tunnel end point address                 |
    257  * |                                                               |
    258  * |                                                               |
    259  * |                                                               |
    260  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    261  * |          Must Be Zero         |          Tunnel ID            |
    262  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    263  * |                       Extended Tunnel ID                      |
    264  * |                                                               |
    265  * |                                                               |
    266  * |                                                               |
    267  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    268  * |                   IPv6 tunnel sender address                  |
    269  * |                                                               |
    270  * |                                                               |
    271  * |                                                               |
    272  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    273  * |          Must Be Zero         |            LSP ID             |
    274  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    275  */
    276 struct lspping_tlv_targetfec_subtlv_rsvp_ipv6_t {
    277     uint8_t tunnel_endpoint [16];
    278     uint8_t res[2];
    279     uint8_t tunnel_id[2];
    280     uint8_t extended_tunnel_id[16];
    281     uint8_t tunnel_sender [16];
    282     uint8_t res2[2];
    283     uint8_t lsp_id [2];
    284 };
    285 
    286 /*
    287  *  0                   1                   2                   3
    288  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    289  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    290  * |                      Route Distinguisher                      |
    291  * |                          (8 octets)                           |
    292  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    293  * |                         IPv4 prefix                           |
    294  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    295  * | Prefix Length |                 Must Be Zero                  |
    296  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    297  */
    298 struct lspping_tlv_targetfec_subtlv_l3vpn_ipv4_t {
    299     uint8_t rd [8];
    300     uint8_t prefix [4];
    301     uint8_t prefix_len;
    302 };
    303 
    304 /*
    305  *  0                   1                   2                   3
    306  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    307  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    308  * |                      Route Distinguisher                      |
    309  * |                          (8 octets)                           |
    310  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    311  * |                          IPv6 prefix                          |
    312  * |                          (16 octets)                          |
    313  * |                                                               |
    314  * |                                                               |
    315  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    316  * | Prefix Length |                 Must Be Zero                  |
    317  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    318  */
    319 struct lspping_tlv_targetfec_subtlv_l3vpn_ipv6_t {
    320     uint8_t rd [8];
    321     uint8_t prefix [16];
    322     uint8_t prefix_len;
    323 };
    324 
    325 /*
    326  *  0                   1                   2                   3
    327  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    328  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    329  * |                      Route Distinguisher                      |
    330  * |                          (8 octets)                           |
    331  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    332  * |         Sender's VE ID        |       Receiver's VE ID        |
    333  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    334  * |      Encapsulation Type       |         Must Be Zero          |
    335  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    336  *  0                   1                   2                   3
    337  */
    338 struct lspping_tlv_targetfec_subtlv_l2vpn_endpt_t {
    339     uint8_t rd [8];
    340     uint8_t sender_ve_id [2];
    341     uint8_t receiver_ve_id [2];
    342     uint8_t encapsulation[2];
    343 };
    344 
    345 /*
    346  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    347  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    348  * |                      Remote PE Address                        |
    349  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    350  * |                             PW ID                             |
    351  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    352  * |            PW Type            |          Must Be Zero         |
    353  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    354  */
    355 struct lspping_tlv_targetfec_subtlv_fec_128_pw_old {
    356     uint8_t remote_pe_address [4];
    357     uint8_t pw_id [4];
    358     uint8_t pw_type[2];
    359 };
    360 
    361 /*
    362  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    363  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    364  * |                     Sender's PE Address                       |
    365  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    366  * |                      Remote PE Address                        |
    367  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    368  * |                             PW ID                             |
    369  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    370  * |            PW Type            |          Must Be Zero         |
    371  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    372  */
    373 struct lspping_tlv_targetfec_subtlv_fec_128_pw {
    374     uint8_t sender_pe_address [4];
    375     uint8_t remote_pe_address [4];
    376     uint8_t pw_id [4];
    377     uint8_t pw_type[2];
    378 };
    379 
    380 /*
    381  * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    382  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    383  * |                         IPv4 prefix                           |
    384  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    385  * | Prefix Length |                 Must Be Zero                  |
    386  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    387  */
    388 struct lspping_tlv_targetfec_subtlv_bgp_ipv4_t {
    389     uint8_t prefix [4];
    390     uint8_t prefix_len;
    391 };
    392 
    393 /*
    394  * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    395  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    396  * |                          IPv6 prefix                          |
    397  * |                          (16 octets)                          |
    398  * |                                                               |
    399  * |                                                               |
    400  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    401  * | Prefix Length |                 Must Be Zero                  |
    402  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    403  */
    404 struct lspping_tlv_targetfec_subtlv_bgp_ipv6_t {
    405     uint8_t prefix [16];
    406     uint8_t prefix_len;
    407 };
    408 
    409 /*
    410  *  0                   1                   2                   3
    411  *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
    412  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    413  * |               MTU             | Address Type  |  Resvd (SBZ)  |
    414  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    415  * |             Downstream IP Address (4 or 16 octets)            |
    416  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    417  * |         Downstream Interface Address (4 or 16 octets)         |
    418  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    419  * | Multipath Type| Depth Limit   |        Multipath Length       |
    420  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    421  * .                                                               .
    422  * .                     (Multipath Information)                   .
    423  * .                                                               .
    424  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    425  * |               Downstream Label                |    Protocol   |
    426  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    427  * .                                                               .
    428  * .                                                               .
    429  * .                                                               .
    430  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    431  * |               Downstream Label                |    Protocol   |
    432  * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    433  */
    434 /* Enough to get the address type */
    435 struct lspping_tlv_downstream_map_t {
    436     uint8_t mtu [2];
    437     uint8_t address_type;
    438     uint8_t ds_flags;
    439 };
    440 
    441 struct lspping_tlv_downstream_map_ipv4_t {
    442     uint8_t mtu [2];
    443     uint8_t address_type;
    444     uint8_t ds_flags;
    445     uint8_t downstream_ip[4];
    446     uint8_t downstream_interface[4];
    447 };
    448 
    449 struct lspping_tlv_downstream_map_ipv4_unmb_t {
    450     uint8_t mtu [2];
    451     uint8_t address_type;
    452     uint8_t ds_flags;
    453     uint8_t downstream_ip[4];
    454     uint8_t downstream_interface[4];
    455 };
    456 
    457 struct lspping_tlv_downstream_map_ipv6_t {
    458     uint8_t mtu [2];
    459     uint8_t address_type;
    460     uint8_t ds_flags;
    461     uint8_t downstream_ip[16];
    462     uint8_t downstream_interface[16];
    463 };
    464 
    465 struct lspping_tlv_downstream_map_ipv6_unmb_t {
    466     uint8_t mtu [2];
    467     uint8_t address_type;
    468     uint8_t ds_flags;
    469     uint8_t downstream_ip[16];
    470     uint8_t downstream_interface[4];
    471 };
    472 
    473 struct lspping_tlv_downstream_map_info_t {
    474     uint8_t multipath_type;
    475     uint8_t depth_limit;
    476     uint8_t multipath_length [2];
    477 };
    478 
    479 #define LSPPING_AFI_IPV4      1
    480 #define LSPPING_AFI_IPV4_UNMB 2
    481 #define LSPPING_AFI_IPV6      3
    482 #define LSPPING_AFI_IPV6_UNMB 4
    483 
    484 static const struct tok lspping_tlv_downstream_addr_values[] = {
    485     { LSPPING_AFI_IPV4,      "IPv4"},
    486     { LSPPING_AFI_IPV4_UNMB, "Unnumbered IPv4"},
    487     { LSPPING_AFI_IPV6,      "IPv6"},
    488     { LSPPING_AFI_IPV6_UNMB, "IPv6"},
    489     { 0, NULL}
    490 };
    491 
    492 void
    493 lspping_print(netdissect_options *ndo,
    494               register const u_char *pptr, register u_int len)
    495 {
    496     const struct lspping_common_header *lspping_com_header;
    497     const struct lspping_tlv_header *lspping_tlv_header;
    498     const struct lspping_tlv_header *lspping_subtlv_header;
    499     const u_char *tptr,*tlv_tptr,*subtlv_tptr;
    500     u_int tlen,lspping_tlv_len,lspping_tlv_type,tlv_tlen;
    501     int tlv_hexdump,subtlv_hexdump;
    502     u_int lspping_subtlv_len,lspping_subtlv_type;
    503     struct timeval timestamp;
    504 
    505     union {
    506         const struct lspping_tlv_downstream_map_t *lspping_tlv_downstream_map;
    507         const struct lspping_tlv_downstream_map_ipv4_t *lspping_tlv_downstream_map_ipv4;
    508         const struct lspping_tlv_downstream_map_ipv4_unmb_t *lspping_tlv_downstream_map_ipv4_unmb;
    509         const struct lspping_tlv_downstream_map_ipv6_t *lspping_tlv_downstream_map_ipv6;
    510         const struct lspping_tlv_downstream_map_ipv6_unmb_t *lspping_tlv_downstream_map_ipv6_unmb;
    511         const struct lspping_tlv_downstream_map_info_t  *lspping_tlv_downstream_map_info;
    512     } tlv_ptr;
    513 
    514     union {
    515         const struct lspping_tlv_targetfec_subtlv_ldp_ipv4_t *lspping_tlv_targetfec_subtlv_ldp_ipv4;
    516         const struct lspping_tlv_targetfec_subtlv_ldp_ipv6_t *lspping_tlv_targetfec_subtlv_ldp_ipv6;
    517         const struct lspping_tlv_targetfec_subtlv_rsvp_ipv4_t *lspping_tlv_targetfec_subtlv_rsvp_ipv4;
    518         const struct lspping_tlv_targetfec_subtlv_rsvp_ipv6_t *lspping_tlv_targetfec_subtlv_rsvp_ipv6;
    519         const struct lspping_tlv_targetfec_subtlv_l3vpn_ipv4_t *lspping_tlv_targetfec_subtlv_l3vpn_ipv4;
    520         const struct lspping_tlv_targetfec_subtlv_l3vpn_ipv6_t *lspping_tlv_targetfec_subtlv_l3vpn_ipv6;
    521         const struct lspping_tlv_targetfec_subtlv_l2vpn_endpt_t *lspping_tlv_targetfec_subtlv_l2vpn_endpt;
    522         const struct lspping_tlv_targetfec_subtlv_fec_128_pw_old *lspping_tlv_targetfec_subtlv_l2vpn_vcid_old;
    523         const struct lspping_tlv_targetfec_subtlv_fec_128_pw *lspping_tlv_targetfec_subtlv_l2vpn_vcid;
    524         const struct lspping_tlv_targetfec_subtlv_bgp_ipv4_t *lspping_tlv_targetfec_subtlv_bgp_ipv4;
    525         const struct lspping_tlv_targetfec_subtlv_bgp_ipv6_t *lspping_tlv_targetfec_subtlv_bgp_ipv6;
    526     } subtlv_ptr;
    527 
    528     tptr=pptr;
    529     lspping_com_header = (const struct lspping_common_header *)pptr;
    530     if (len < sizeof(const struct lspping_common_header))
    531         goto tooshort;
    532     ND_TCHECK(*lspping_com_header);
    533 
    534     /*
    535      * Sanity checking of the header.
    536      */
    537     if (EXTRACT_16BITS(&lspping_com_header->version[0]) != LSPPING_VERSION) {
    538 	ND_PRINT((ndo, "LSP-PING version %u packet not supported",
    539                EXTRACT_16BITS(&lspping_com_header->version[0])));
    540 	return;
    541     }
    542 
    543     /* in non-verbose mode just lets print the basic Message Type*/
    544     if (ndo->ndo_vflag < 1) {
    545         ND_PRINT((ndo, "LSP-PINGv%u, %s, seq %u, length: %u",
    546                EXTRACT_16BITS(&lspping_com_header->version[0]),
    547                tok2str(lspping_msg_type_values, "unknown (%u)",lspping_com_header->msg_type),
    548                EXTRACT_32BITS(lspping_com_header->seq_number),
    549                len));
    550         return;
    551     }
    552 
    553     /* ok they seem to want to know everything - lets fully decode it */
    554 
    555     tlen=len;
    556 
    557     ND_PRINT((ndo, "\n\tLSP-PINGv%u, msg-type: %s (%u), length: %u\n\t  reply-mode: %s (%u)",
    558            EXTRACT_16BITS(&lspping_com_header->version[0]),
    559            tok2str(lspping_msg_type_values, "unknown",lspping_com_header->msg_type),
    560            lspping_com_header->msg_type,
    561            len,
    562            tok2str(lspping_reply_mode_values, "unknown",lspping_com_header->reply_mode),
    563            lspping_com_header->reply_mode));
    564 
    565     /*
    566      *  the following return codes require that the subcode is attached
    567      *  at the end of the translated token output
    568      */
    569     if (lspping_com_header->return_code == 3 ||
    570         lspping_com_header->return_code == 4 ||
    571         lspping_com_header->return_code == 8 ||
    572         lspping_com_header->return_code == 10 ||
    573         lspping_com_header->return_code == 11 ||
    574         lspping_com_header->return_code == 12 )
    575         ND_PRINT((ndo, "\n\t  Return Code: %s %u (%u)\n\t  Return Subcode: (%u)",
    576                tok2str(lspping_return_code_values, "unknown",lspping_com_header->return_code),
    577                lspping_com_header->return_subcode,
    578                lspping_com_header->return_code,
    579                lspping_com_header->return_subcode));
    580     else
    581         ND_PRINT((ndo, "\n\t  Return Code: %s (%u)\n\t  Return Subcode: (%u)",
    582                tok2str(lspping_return_code_values, "unknown",lspping_com_header->return_code),
    583                lspping_com_header->return_code,
    584                lspping_com_header->return_subcode));
    585 
    586     ND_PRINT((ndo, "\n\t  Sender Handle: 0x%08x, Sequence: %u",
    587            EXTRACT_32BITS(lspping_com_header->sender_handle),
    588            EXTRACT_32BITS(lspping_com_header->seq_number)));
    589 
    590     timestamp.tv_sec=EXTRACT_32BITS(lspping_com_header->ts_sent_sec);
    591     timestamp.tv_usec=EXTRACT_32BITS(lspping_com_header->ts_sent_usec);
    592     ND_PRINT((ndo, "\n\t  Sender Timestamp: "));
    593     ts_print(ndo, &timestamp);
    594 
    595     timestamp.tv_sec=EXTRACT_32BITS(lspping_com_header->ts_rcvd_sec);
    596     timestamp.tv_usec=EXTRACT_32BITS(lspping_com_header->ts_rcvd_usec);
    597     ND_PRINT((ndo, "Receiver Timestamp: "));
    598     if ((timestamp.tv_sec != 0) && (timestamp.tv_usec != 0))
    599         ts_print(ndo, &timestamp);
    600     else
    601         ND_PRINT((ndo, "no timestamp"));
    602 
    603     tptr+=sizeof(const struct lspping_common_header);
    604     tlen-=sizeof(const struct lspping_common_header);
    605 
    606     while (tlen != 0) {
    607         /* Does the TLV go past the end of the packet? */
    608         if (tlen < sizeof(struct lspping_tlv_header))
    609             goto tooshort;
    610 
    611         /* did we capture enough for fully decoding the tlv header ? */
    612         ND_TCHECK2(*tptr, sizeof(struct lspping_tlv_header));
    613 
    614         lspping_tlv_header = (const struct lspping_tlv_header *)tptr;
    615         lspping_tlv_type=EXTRACT_16BITS(lspping_tlv_header->type);
    616         lspping_tlv_len=EXTRACT_16BITS(lspping_tlv_header->length);
    617 
    618         ND_PRINT((ndo, "\n\t  %s TLV (%u), length: %u",
    619                tok2str(lspping_tlv_values,
    620                        "Unknown",
    621                        lspping_tlv_type),
    622                lspping_tlv_type,
    623                lspping_tlv_len));
    624 
    625         /* some little sanity checking */
    626         if (lspping_tlv_len == 0) {
    627             tptr+=sizeof(struct lspping_tlv_header);
    628             tlen-=sizeof(struct lspping_tlv_header);
    629             continue;    /* no value to dissect */
    630         }
    631 
    632         tlv_tptr=tptr+sizeof(struct lspping_tlv_header);
    633         tlv_tlen=lspping_tlv_len; /* header not included -> no adjustment */
    634 
    635         /* Does the TLV go past the end of the packet? */
    636         if (tlen < lspping_tlv_len+sizeof(struct lspping_tlv_header))
    637             goto tooshort;
    638         /* did we capture enough for fully decoding the tlv ? */
    639         ND_TCHECK2(*tlv_tptr, lspping_tlv_len);
    640         tlv_hexdump=FALSE;
    641 
    642         switch(lspping_tlv_type) {
    643         case LSPPING_TLV_TARGET_FEC_STACK:
    644             while (tlv_tlen != 0) {
    645                 /* Does the subTLV header go past the end of the TLV? */
    646                 if (tlv_tlen < sizeof(struct lspping_tlv_header)) {
    647                     ND_PRINT((ndo, "\n\t      TLV is too short"));
    648                     tlv_hexdump = TRUE;
    649                     goto tlv_tooshort;
    650                 }
    651                 /* did we capture enough for fully decoding the subtlv header ? */
    652                 ND_TCHECK2(*tlv_tptr, sizeof(struct lspping_tlv_header));
    653                 subtlv_hexdump=FALSE;
    654 
    655                 lspping_subtlv_header = (const struct lspping_tlv_header *)tlv_tptr;
    656                 lspping_subtlv_type=EXTRACT_16BITS(lspping_subtlv_header->type);
    657                 lspping_subtlv_len=EXTRACT_16BITS(lspping_subtlv_header->length);
    658                 subtlv_tptr=tlv_tptr+sizeof(struct lspping_tlv_header);
    659 
    660                 /* Does the subTLV go past the end of the TLV? */
    661                 if (tlv_tlen < lspping_subtlv_len+sizeof(struct lspping_tlv_header)) {
    662                     ND_PRINT((ndo, "\n\t      TLV is too short"));
    663                     tlv_hexdump = TRUE;
    664                     goto tlv_tooshort;
    665                 }
    666 
    667                 /* Did we capture enough for fully decoding the subTLV? */
    668                 ND_TCHECK2(*subtlv_tptr, lspping_subtlv_len);
    669 
    670                 ND_PRINT((ndo, "\n\t    %s subTLV (%u), length: %u",
    671                        tok2str(lspping_tlvtargetfec_subtlv_values,
    672                                "Unknown",
    673                                lspping_subtlv_type),
    674                        lspping_subtlv_type,
    675                        lspping_subtlv_len));
    676 
    677                 switch(lspping_subtlv_type) {
    678 
    679                 case LSPPING_TLV_TARGETFEC_SUBTLV_LDP_IPV4:
    680                     /* Is the subTLV length correct? */
    681                     if (lspping_subtlv_len != 5) {
    682                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 5"));
    683                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    684                     } else {
    685                         subtlv_ptr.lspping_tlv_targetfec_subtlv_ldp_ipv4 = \
    686                             (const struct lspping_tlv_targetfec_subtlv_ldp_ipv4_t *)subtlv_tptr;
    687                         ND_PRINT((ndo, "\n\t      %s/%u",
    688                                ipaddr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_ldp_ipv4->prefix),
    689                                subtlv_ptr.lspping_tlv_targetfec_subtlv_ldp_ipv4->prefix_len));
    690                     }
    691                     break;
    692 
    693                 case LSPPING_TLV_TARGETFEC_SUBTLV_LDP_IPV6:
    694                     /* Is the subTLV length correct? */
    695                     if (lspping_subtlv_len != 17) {
    696                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 17"));
    697                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    698                     } else {
    699                         subtlv_ptr.lspping_tlv_targetfec_subtlv_ldp_ipv6 = \
    700                             (const struct lspping_tlv_targetfec_subtlv_ldp_ipv6_t *)subtlv_tptr;
    701                         ND_PRINT((ndo, "\n\t      %s/%u",
    702                                ip6addr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_ldp_ipv6->prefix),
    703                                subtlv_ptr.lspping_tlv_targetfec_subtlv_ldp_ipv6->prefix_len));
    704                     }
    705                     break;
    706 
    707                 case LSPPING_TLV_TARGETFEC_SUBTLV_BGP_IPV4:
    708                     /* Is the subTLV length correct? */
    709                     if (lspping_subtlv_len != 5) {
    710                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 5"));
    711                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    712                     } else {
    713                         subtlv_ptr.lspping_tlv_targetfec_subtlv_bgp_ipv4 = \
    714                             (const struct lspping_tlv_targetfec_subtlv_bgp_ipv4_t *)subtlv_tptr;
    715                         ND_PRINT((ndo, "\n\t      %s/%u",
    716                                ipaddr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_bgp_ipv4->prefix),
    717                                subtlv_ptr.lspping_tlv_targetfec_subtlv_bgp_ipv4->prefix_len));
    718                     }
    719                     break;
    720 
    721                 case LSPPING_TLV_TARGETFEC_SUBTLV_BGP_IPV6:
    722                     /* Is the subTLV length correct? */
    723                     if (lspping_subtlv_len != 17) {
    724                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 17"));
    725                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    726                     } else {
    727                         subtlv_ptr.lspping_tlv_targetfec_subtlv_bgp_ipv6 = \
    728                             (const struct lspping_tlv_targetfec_subtlv_bgp_ipv6_t *)subtlv_tptr;
    729                         ND_PRINT((ndo, "\n\t      %s/%u",
    730                                ip6addr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_bgp_ipv6->prefix),
    731                                subtlv_ptr.lspping_tlv_targetfec_subtlv_bgp_ipv6->prefix_len));
    732                     }
    733                     break;
    734 
    735                 case LSPPING_TLV_TARGETFEC_SUBTLV_RSVP_IPV4:
    736                     /* Is the subTLV length correct? */
    737                     if (lspping_subtlv_len != 20) {
    738                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 20"));
    739                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    740                     } else {
    741                         subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv4 = \
    742                             (const struct lspping_tlv_targetfec_subtlv_rsvp_ipv4_t *)subtlv_tptr;
    743                         ND_PRINT((ndo, "\n\t      tunnel end-point %s, tunnel sender %s, lsp-id 0x%04x" \
    744                                "\n\t      tunnel-id 0x%04x, extended tunnel-id %s",
    745                                ipaddr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv4->tunnel_endpoint),
    746                                ipaddr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv4->tunnel_sender),
    747                                EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv4->lsp_id),
    748                                EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv4->tunnel_id),
    749                                ipaddr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv4->extended_tunnel_id)));
    750                     }
    751                     break;
    752 
    753                 case LSPPING_TLV_TARGETFEC_SUBTLV_RSVP_IPV6:
    754                     /* Is the subTLV length correct? */
    755                     if (lspping_subtlv_len != 56) {
    756                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 56"));
    757                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    758                     } else {
    759                         subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv6 = \
    760                             (const struct lspping_tlv_targetfec_subtlv_rsvp_ipv6_t *)subtlv_tptr;
    761                         ND_PRINT((ndo, "\n\t      tunnel end-point %s, tunnel sender %s, lsp-id 0x%04x" \
    762                                "\n\t      tunnel-id 0x%04x, extended tunnel-id %s",
    763                                ip6addr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv6->tunnel_endpoint),
    764                                ip6addr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv6->tunnel_sender),
    765                                EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv6->lsp_id),
    766                                EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv6->tunnel_id),
    767                                ip6addr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_rsvp_ipv6->extended_tunnel_id)));
    768                     }
    769                     break;
    770 
    771                 case LSPPING_TLV_TARGETFEC_SUBTLV_L3VPN_IPV4:
    772                     /* Is the subTLV length correct? */
    773                     if (lspping_subtlv_len != 13) {
    774                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 13"));
    775                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    776                     } else {
    777                         subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv4 = \
    778                             (const struct lspping_tlv_targetfec_subtlv_l3vpn_ipv4_t *)subtlv_tptr;
    779                         ND_PRINT((ndo, "\n\t      RD: %s, %s/%u",
    780                                bgp_vpn_rd_print(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv4->rd),
    781                                ipaddr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv4->prefix),
    782                                subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv4->prefix_len));
    783                     }
    784                     break;
    785 
    786                 case LSPPING_TLV_TARGETFEC_SUBTLV_L3VPN_IPV6:
    787                     /* Is the subTLV length correct? */
    788                     if (lspping_subtlv_len != 25) {
    789                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 25"));
    790                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    791                     } else {
    792                         subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv6 = \
    793                             (const struct lspping_tlv_targetfec_subtlv_l3vpn_ipv6_t *)subtlv_tptr;
    794                         ND_PRINT((ndo, "\n\t      RD: %s, %s/%u",
    795                                bgp_vpn_rd_print(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv6->rd),
    796                                ip6addr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv6->prefix),
    797                                subtlv_ptr.lspping_tlv_targetfec_subtlv_l3vpn_ipv6->prefix_len));
    798                     }
    799                     break;
    800 
    801                 case LSPPING_TLV_TARGETFEC_SUBTLV_L2VPN_ENDPT:
    802                     /* Is the subTLV length correct? */
    803                     if (lspping_subtlv_len != 14) {
    804                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 14"));
    805                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    806                     } else {
    807                         subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_endpt = \
    808                             (const struct lspping_tlv_targetfec_subtlv_l2vpn_endpt_t *)subtlv_tptr;
    809                         ND_PRINT((ndo, "\n\t      RD: %s, Sender VE ID: %u, Receiver VE ID: %u" \
    810                                "\n\t      Encapsulation Type: %s (%u)",
    811                                bgp_vpn_rd_print(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_endpt->rd),
    812                                EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_endpt->sender_ve_id),
    813                                EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_endpt->receiver_ve_id),
    814                                tok2str(mpls_pw_types_values,
    815                                        "unknown",
    816                                        EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_endpt->encapsulation)),
    817                                EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_endpt->encapsulation)));
    818                     }
    819                     break;
    820 
    821                     /* the old L2VPN VCID subTLV does not have support for the sender field */
    822                 case LSPPING_TLV_TARGETFEC_SUBTLV_FEC_128_PW_OLD:
    823                     /* Is the subTLV length correct? */
    824                     if (lspping_subtlv_len != 10) {
    825                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 10"));
    826                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    827                     } else {
    828                         subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid_old = \
    829                             (const struct lspping_tlv_targetfec_subtlv_fec_128_pw_old *)subtlv_tptr;
    830                         ND_PRINT((ndo, "\n\t      Remote PE: %s" \
    831                                "\n\t      PW ID: 0x%08x, PW Type: %s (%u)",
    832                                ipaddr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid_old->remote_pe_address),
    833                                EXTRACT_32BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid_old->pw_id),
    834                                tok2str(mpls_pw_types_values,
    835                                        "unknown",
    836                                        EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid_old->pw_type)),
    837                                EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid_old->pw_type)));
    838                     }
    839                     break;
    840 
    841                 case LSPPING_TLV_TARGETFEC_SUBTLV_FEC_128_PW:
    842                     /* Is the subTLV length correct? */
    843                     if (lspping_subtlv_len != 14) {
    844                         ND_PRINT((ndo, "\n\t      invalid subTLV length, should be 14"));
    845                         subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    846                     } else {
    847                         subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid = \
    848                             (const struct lspping_tlv_targetfec_subtlv_fec_128_pw *)subtlv_tptr;
    849                         ND_PRINT((ndo, "\n\t      Sender PE: %s, Remote PE: %s" \
    850                                "\n\t      PW ID: 0x%08x, PW Type: %s (%u)",
    851                                ipaddr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid->sender_pe_address),
    852                                ipaddr_string(ndo, subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid->remote_pe_address),
    853                                EXTRACT_32BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid->pw_id),
    854                                tok2str(mpls_pw_types_values,
    855                                        "unknown",
    856                                        EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid->pw_type)),
    857                                EXTRACT_16BITS(subtlv_ptr.lspping_tlv_targetfec_subtlv_l2vpn_vcid->pw_type)));
    858                     }
    859                     break;
    860 
    861                 default:
    862                     subtlv_hexdump=TRUE; /* unknown subTLV just hexdump it */
    863                     break;
    864                 }
    865                 /* do we want to see an additionally subtlv hexdump ? */
    866                 if (ndo->ndo_vflag > 1 || subtlv_hexdump==TRUE)
    867                     print_unknown_data(ndo, tlv_tptr+sizeof(struct lspping_tlv_header), \
    868                                        "\n\t      ",
    869                                        lspping_subtlv_len);
    870 
    871                 /* All subTLVs are aligned to four octet boundary */
    872                 if (lspping_subtlv_len % 4) {
    873                     lspping_subtlv_len += 4 - (lspping_subtlv_len % 4);
    874                     /* Does the subTLV, including padding, go past the end of the TLV? */
    875                     if (tlv_tlen < lspping_subtlv_len+sizeof(struct lspping_tlv_header)) {
    876                         ND_PRINT((ndo, "\n\t\t TLV is too short"));
    877                         return;
    878                     }
    879                 }
    880                 tlv_tptr+=lspping_subtlv_len;
    881                 tlv_tlen-=lspping_subtlv_len+sizeof(struct lspping_tlv_header);
    882             }
    883             break;
    884 
    885         case LSPPING_TLV_DOWNSTREAM_MAPPING:
    886             /* Does the header go past the end of the TLV? */
    887             if (tlv_tlen < sizeof(struct lspping_tlv_downstream_map_t)) {
    888                 ND_PRINT((ndo, "\n\t      TLV is too short"));
    889                 tlv_hexdump = TRUE;
    890                 goto tlv_tooshort;
    891             }
    892             /* Did we capture enough to get the address family? */
    893             ND_TCHECK2(*tlv_tptr, sizeof(struct lspping_tlv_downstream_map_t));
    894 
    895             tlv_ptr.lspping_tlv_downstream_map= \
    896                 (const struct lspping_tlv_downstream_map_t *)tlv_tptr;
    897 
    898             /* that strange thing with the downstream map TLV is that until now
    899              * we do not know if its IPv4 or IPv6 or is unnumbered; after
    900              * we find the address-type, we recast the tlv_tptr and move on. */
    901 
    902             ND_PRINT((ndo, "\n\t    MTU: %u, Address-Type: %s (%u)",
    903                    EXTRACT_16BITS(tlv_ptr.lspping_tlv_downstream_map->mtu),
    904                    tok2str(lspping_tlv_downstream_addr_values,
    905                            "unknown",
    906                            tlv_ptr.lspping_tlv_downstream_map->address_type),
    907                    tlv_ptr.lspping_tlv_downstream_map->address_type));
    908 
    909             switch(tlv_ptr.lspping_tlv_downstream_map->address_type) {
    910 
    911             case LSPPING_AFI_IPV4:
    912                 /* Does the data go past the end of the TLV? */
    913                 if (tlv_tlen < sizeof(struct lspping_tlv_downstream_map_ipv4_t)) {
    914                     ND_PRINT((ndo, "\n\t      TLV is too short"));
    915                     tlv_hexdump = TRUE;
    916                     goto tlv_tooshort;
    917                 }
    918                 /* Did we capture enough for this part of the TLV? */
    919                 ND_TCHECK2(*tlv_tptr, sizeof(struct lspping_tlv_downstream_map_ipv4_t));
    920 
    921                 tlv_ptr.lspping_tlv_downstream_map_ipv4= \
    922                     (const struct lspping_tlv_downstream_map_ipv4_t *)tlv_tptr;
    923                 ND_PRINT((ndo, "\n\t    Downstream IP: %s" \
    924                        "\n\t    Downstream Interface IP: %s",
    925                        ipaddr_string(ndo, tlv_ptr.lspping_tlv_downstream_map_ipv4->downstream_ip),
    926                        ipaddr_string(ndo, tlv_ptr.lspping_tlv_downstream_map_ipv4->downstream_interface)));
    927                 tlv_tptr+=sizeof(struct lspping_tlv_downstream_map_ipv4_t);
    928                 tlv_tlen-=sizeof(struct lspping_tlv_downstream_map_ipv4_t);
    929                 break;
    930             case LSPPING_AFI_IPV4_UNMB:
    931                 /* Does the data go past the end of the TLV? */
    932                 if (tlv_tlen < sizeof(struct lspping_tlv_downstream_map_ipv4_unmb_t)) {
    933                     ND_PRINT((ndo, "\n\t      TLV is too short"));
    934                     tlv_hexdump = TRUE;
    935                     goto tlv_tooshort;
    936                 }
    937                 /* Did we capture enough for this part of the TLV? */
    938                 ND_TCHECK2(*tlv_tptr, sizeof(struct lspping_tlv_downstream_map_ipv4_unmb_t));
    939 
    940                 tlv_ptr.lspping_tlv_downstream_map_ipv4_unmb= \
    941                     (const struct lspping_tlv_downstream_map_ipv4_unmb_t *)tlv_tptr;
    942                 ND_PRINT((ndo, "\n\t    Downstream IP: %s" \
    943                        "\n\t    Downstream Interface Index: 0x%08x",
    944                        ipaddr_string(ndo, tlv_ptr.lspping_tlv_downstream_map_ipv4_unmb->downstream_ip),
    945                        EXTRACT_32BITS(tlv_ptr.lspping_tlv_downstream_map_ipv4_unmb->downstream_interface)));
    946                 tlv_tptr+=sizeof(struct lspping_tlv_downstream_map_ipv4_unmb_t);
    947                 tlv_tlen-=sizeof(struct lspping_tlv_downstream_map_ipv4_unmb_t);
    948                 break;
    949             case LSPPING_AFI_IPV6:
    950                 /* Does the data go past the end of the TLV? */
    951                 if (tlv_tlen < sizeof(struct lspping_tlv_downstream_map_ipv6_t)) {
    952                     ND_PRINT((ndo, "\n\t      TLV is too short"));
    953                     tlv_hexdump = TRUE;
    954                     goto tlv_tooshort;
    955                 }
    956                 /* Did we capture enough for this part of the TLV? */
    957                 ND_TCHECK2(*tlv_tptr, sizeof(struct lspping_tlv_downstream_map_ipv6_t));
    958 
    959                 tlv_ptr.lspping_tlv_downstream_map_ipv6= \
    960                     (const struct lspping_tlv_downstream_map_ipv6_t *)tlv_tptr;
    961                 ND_PRINT((ndo, "\n\t    Downstream IP: %s" \
    962                        "\n\t    Downstream Interface IP: %s",
    963                        ip6addr_string(ndo, tlv_ptr.lspping_tlv_downstream_map_ipv6->downstream_ip),
    964                        ip6addr_string(ndo, tlv_ptr.lspping_tlv_downstream_map_ipv6->downstream_interface)));
    965                 tlv_tptr+=sizeof(struct lspping_tlv_downstream_map_ipv6_t);
    966                 tlv_tlen-=sizeof(struct lspping_tlv_downstream_map_ipv6_t);
    967                 break;
    968              case LSPPING_AFI_IPV6_UNMB:
    969                 /* Does the data go past the end of the TLV? */
    970                 if (tlv_tlen < sizeof(struct lspping_tlv_downstream_map_ipv6_unmb_t)) {
    971                     ND_PRINT((ndo, "\n\t      TLV is too short"));
    972                     tlv_hexdump = TRUE;
    973                     goto tlv_tooshort;
    974                 }
    975                 /* Did we capture enough for this part of the TLV? */
    976                 ND_TCHECK2(*tlv_tptr, sizeof(struct lspping_tlv_downstream_map_ipv6_unmb_t));
    977 
    978                 tlv_ptr.lspping_tlv_downstream_map_ipv6_unmb= \
    979                    (const struct lspping_tlv_downstream_map_ipv6_unmb_t *)tlv_tptr;
    980                 ND_PRINT((ndo, "\n\t    Downstream IP: %s" \
    981                        "\n\t    Downstream Interface Index: 0x%08x",
    982                        ip6addr_string(ndo, tlv_ptr.lspping_tlv_downstream_map_ipv6_unmb->downstream_ip),
    983                        EXTRACT_32BITS(tlv_ptr.lspping_tlv_downstream_map_ipv6_unmb->downstream_interface)));
    984                 tlv_tptr+=sizeof(struct lspping_tlv_downstream_map_ipv6_unmb_t);
    985                 tlv_tlen-=sizeof(struct lspping_tlv_downstream_map_ipv6_unmb_t);
    986                 break;
    987 
    988             default:
    989                 /* should not happen ! - no error message - tok2str() has barked already */
    990                 break;
    991             }
    992 
    993             /* Does the data go past the end of the TLV? */
    994             if (tlv_tlen < sizeof(struct lspping_tlv_downstream_map_info_t)) {
    995                 ND_PRINT((ndo, "\n\t      TLV is too short"));
    996                 tlv_hexdump = TRUE;
    997                 goto tlv_tooshort;
    998             }
    999             /* Did we capture enough for this part of the TLV? */
   1000             ND_TCHECK2(*tlv_tptr, sizeof(struct lspping_tlv_downstream_map_info_t));
   1001 
   1002             tlv_ptr.lspping_tlv_downstream_map_info= \
   1003                 (const struct lspping_tlv_downstream_map_info_t *)tlv_tptr;
   1004 
   1005             /* FIXME add hash-key type, depth limit, multipath processing */
   1006 
   1007             tlv_tptr+=sizeof(struct lspping_tlv_downstream_map_info_t);
   1008             tlv_tlen-=sizeof(struct lspping_tlv_downstream_map_info_t);
   1009 
   1010             /* FIXME print downstream labels */
   1011 
   1012             tlv_hexdump=TRUE; /* dump the TLV until code complete */
   1013 
   1014             break;
   1015 
   1016         case LSPPING_TLV_BFD_DISCRIMINATOR:
   1017             if (tlv_tlen < LSPPING_TLV_BFD_DISCRIMINATOR_LEN) {
   1018                 ND_PRINT((ndo, "\n\t      TLV is too short"));
   1019                 tlv_hexdump = TRUE;
   1020                 goto tlv_tooshort;
   1021             } else {
   1022                 ND_TCHECK2(*tptr, LSPPING_TLV_BFD_DISCRIMINATOR_LEN);
   1023                 ND_PRINT((ndo, "\n\t    BFD Discriminator 0x%08x", EXTRACT_32BITS(tptr)));
   1024             }
   1025             break;
   1026 
   1027         case  LSPPING_TLV_VENDOR_ENTERPRISE:
   1028         {
   1029             uint32_t vendor_id;
   1030 
   1031             if (tlv_tlen < LSPPING_TLV_VENDOR_ENTERPRISE_LEN) {
   1032                 ND_PRINT((ndo, "\n\t      TLV is too short"));
   1033                 tlv_hexdump = TRUE;
   1034                 goto tlv_tooshort;
   1035             } else {
   1036                 ND_TCHECK2(*tptr, LSPPING_TLV_VENDOR_ENTERPRISE_LEN);
   1037                 vendor_id = EXTRACT_32BITS(tlv_tptr);
   1038                 ND_PRINT((ndo, "\n\t    Vendor: %s (0x%04x)",
   1039                        tok2str(smi_values, "Unknown", vendor_id),
   1040                        vendor_id));
   1041             }
   1042         }
   1043             break;
   1044 
   1045             /*
   1046              *  FIXME those are the defined TLVs that lack a decoder
   1047              *  you are welcome to contribute code ;-)
   1048              */
   1049         case LSPPING_TLV_PAD:
   1050         case LSPPING_TLV_ERROR_CODE:
   1051         case LSPPING_TLV_VENDOR_PRIVATE:
   1052 
   1053         default:
   1054             if (ndo->ndo_vflag <= 1)
   1055                 print_unknown_data(ndo, tlv_tptr, "\n\t    ", tlv_tlen);
   1056             break;
   1057         }
   1058         /* do we want to see an additionally tlv hexdump ? */
   1059     tlv_tooshort:
   1060         if (ndo->ndo_vflag > 1 || tlv_hexdump==TRUE)
   1061             print_unknown_data(ndo, tptr+sizeof(struct lspping_tlv_header), "\n\t    ",
   1062                                lspping_tlv_len);
   1063 
   1064 
   1065         /* All TLVs are aligned to four octet boundary */
   1066         if (lspping_tlv_len % 4) {
   1067             lspping_tlv_len += (4 - lspping_tlv_len % 4);
   1068             /* Does the TLV, including padding, go past the end of the packet? */
   1069             if (tlen < lspping_tlv_len+sizeof(struct lspping_tlv_header))
   1070                 goto tooshort;
   1071         }
   1072 
   1073         tptr+=lspping_tlv_len+sizeof(struct lspping_tlv_header);
   1074         tlen-=lspping_tlv_len+sizeof(struct lspping_tlv_header);
   1075     }
   1076     return;
   1077 tooshort:
   1078     ND_PRINT((ndo, "\n\t\t packet is too short"));
   1079     return;
   1080 trunc:
   1081     ND_PRINT((ndo, "\n\t\t packet exceeded snapshot"));
   1082     return;
   1083 }
   1084 /*
   1085  * Local Variables:
   1086  * c-style: whitesmith
   1087  * c-basic-offset: 8
   1088  * End:
   1089  */
   1090