]> The Tcpdump Group git mirrors - tcpdump/blob - print-ether.c
AppleTalk: Update the link-layer dissector to a void function
[tcpdump] / print-ether.c
1 /*
2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997, 2000
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /* \summary: Ethernet printer */
23
24 #ifdef HAVE_CONFIG_H
25 #include <config.h>
26 #endif
27
28 #include "netdissect-stdinc.h"
29
30 #include "netdissect.h"
31 #include "extract.h"
32 #include "addrtoname.h"
33 #include "ethertype.h"
34
35 /*
36 * Structure of an Ethernet header.
37 */
38 struct ether_header {
39 nd_mac_addr ether_dhost;
40 nd_mac_addr ether_shost;
41 nd_uint16_t ether_length_type;
42 };
43
44 /*
45 * Length of an Ethernet header; note that some compilers may pad
46 * "struct ether_header" to a multiple of 4 bytes, for example, so
47 * "sizeof (struct ether_header)" may not give the right answer.
48 */
49 #define ETHER_HDRLEN 14
50
51 const struct tok ethertype_values[] = {
52 { ETHERTYPE_IP, "IPv4" },
53 { ETHERTYPE_MPLS, "MPLS unicast" },
54 { ETHERTYPE_MPLS_MULTI, "MPLS multicast" },
55 { ETHERTYPE_IPV6, "IPv6" },
56 { ETHERTYPE_8021Q, "802.1Q" },
57 { ETHERTYPE_8021Q9100, "802.1Q-9100" },
58 { ETHERTYPE_8021QinQ, "802.1Q-QinQ" },
59 { ETHERTYPE_8021Q9200, "802.1Q-9200" },
60 { ETHERTYPE_MACSEC, "802.1AE MACsec" },
61 { ETHERTYPE_VMAN, "VMAN" },
62 { ETHERTYPE_PUP, "PUP" },
63 { ETHERTYPE_ARP, "ARP"},
64 { ETHERTYPE_REVARP, "Reverse ARP"},
65 { ETHERTYPE_NS, "NS" },
66 { ETHERTYPE_SPRITE, "Sprite" },
67 { ETHERTYPE_TRAIL, "Trail" },
68 { ETHERTYPE_MOPDL, "MOP DL" },
69 { ETHERTYPE_MOPRC, "MOP RC" },
70 { ETHERTYPE_DN, "DN" },
71 { ETHERTYPE_LAT, "LAT" },
72 { ETHERTYPE_SCA, "SCA" },
73 { ETHERTYPE_TEB, "TEB" },
74 { ETHERTYPE_LANBRIDGE, "Lanbridge" },
75 { ETHERTYPE_DECDNS, "DEC DNS" },
76 { ETHERTYPE_DECDTS, "DEC DTS" },
77 { ETHERTYPE_VEXP, "VEXP" },
78 { ETHERTYPE_VPROD, "VPROD" },
79 { ETHERTYPE_ATALK, "Appletalk" },
80 { ETHERTYPE_AARP, "Appletalk ARP" },
81 { ETHERTYPE_IPX, "IPX" },
82 { ETHERTYPE_PPP, "PPP" },
83 { ETHERTYPE_MPCP, "MPCP" },
84 { ETHERTYPE_SLOW, "Slow Protocols" },
85 { ETHERTYPE_PPPOED, "PPPoE D" },
86 { ETHERTYPE_PPPOES, "PPPoE S" },
87 { ETHERTYPE_EAPOL, "EAPOL" },
88 { ETHERTYPE_RRCP, "RRCP" },
89 { ETHERTYPE_MS_NLB_HB, "MS NLB heartbeat" },
90 { ETHERTYPE_JUMBO, "Jumbo" },
91 { ETHERTYPE_NSH, "NSH" },
92 { ETHERTYPE_LOOPBACK, "Loopback" },
93 { ETHERTYPE_ISO, "OSI" },
94 { ETHERTYPE_GRE_ISO, "GRE-OSI" },
95 { ETHERTYPE_CFM_OLD, "CFM (old)" },
96 { ETHERTYPE_CFM, "CFM" },
97 { ETHERTYPE_IEEE1905_1, "IEEE1905.1" },
98 { ETHERTYPE_LLDP, "LLDP" },
99 { ETHERTYPE_TIPC, "TIPC"},
100 { ETHERTYPE_GEONET_OLD, "GeoNet (old)"},
101 { ETHERTYPE_GEONET, "GeoNet"},
102 { ETHERTYPE_CALM_FAST, "CALM FAST"},
103 { ETHERTYPE_AOE, "AoE" },
104 { ETHERTYPE_PTP, "PTP" },
105 { ETHERTYPE_ARISTA, "Arista Vendor Specific Protocol" },
106 { 0, NULL}
107 };
108
109 static void
110 ether_addresses_print(netdissect_options *ndo, const u_char *src,
111 const u_char *dst)
112 {
113 ND_PRINT("%s > %s, ",
114 GET_ETHERADDR_STRING(src), GET_ETHERADDR_STRING(dst));
115 }
116
117 static void
118 ether_type_print(netdissect_options *ndo, uint16_t type)
119 {
120 if (!ndo->ndo_qflag)
121 ND_PRINT("ethertype %s (0x%04x)",
122 tok2str(ethertype_values, "Unknown", type), type);
123 else
124 ND_PRINT("%s",
125 tok2str(ethertype_values, "Unknown Ethertype (0x%04x)", type));
126 }
127
128 /*
129 * Common code for printing Ethernet frames.
130 *
131 * It can handle Ethernet headers with extra tag information inserted
132 * after the destination and source addresses, as is inserted by some
133 * switch chips, and extra encapsulation header information before
134 * printing Ethernet header information (such as a LANE ID for ATM LANE).
135 */
136 static void
137 ether_common_print(netdissect_options *ndo, const u_char *p, u_int length,
138 u_int caplen,
139 void (*print_switch_tag)(netdissect_options *ndo, const u_char *),
140 u_int switch_tag_len,
141 void (*print_encap_header)(netdissect_options *ndo, const u_char *),
142 const u_char *encap_header_arg, u_int do_incr_ll_hdr_len)
143 {
144 const struct ether_header *ehp;
145 u_int orig_length;
146 u_int hdrlen;
147 u_short length_type;
148 int printed_length;
149 int llc_hdrlen;
150 struct lladdr_info src, dst;
151
152 if (caplen < ETHER_HDRLEN + switch_tag_len) {
153 nd_print_trunc(ndo);
154 if (do_incr_ll_hdr_len)
155 ndo->ndo_ll_hdr_len += caplen;
156 return;
157 }
158 if (length < ETHER_HDRLEN + switch_tag_len) {
159 nd_print_trunc(ndo);
160 if (do_incr_ll_hdr_len)
161 ndo->ndo_ll_hdr_len += length;
162 return;
163 }
164
165 if (print_encap_header != NULL)
166 (*print_encap_header)(ndo, encap_header_arg);
167
168 orig_length = length;
169
170 /*
171 * Get the source and destination addresses, skip past them,
172 * and print them if we're printing the link-layer header.
173 */
174 ehp = (const struct ether_header *)p;
175 src.addr = ehp->ether_shost;
176 src.addr_string = etheraddr_string;
177 dst.addr = ehp->ether_dhost;
178 dst.addr_string = etheraddr_string;
179
180 length -= 2*MAC_ADDR_LEN;
181 caplen -= 2*MAC_ADDR_LEN;
182 p += 2*MAC_ADDR_LEN;
183 hdrlen = 2*MAC_ADDR_LEN;
184
185 if (ndo->ndo_eflag)
186 ether_addresses_print(ndo, src.addr, dst.addr);
187
188 /*
189 * Print the switch tag, if we have one, and skip past it.
190 */
191 if (print_switch_tag != NULL)
192 (*print_switch_tag)(ndo, p);
193
194 length -= switch_tag_len;
195 caplen -= switch_tag_len;
196 p += switch_tag_len;
197 hdrlen += switch_tag_len;
198
199 /*
200 * Get the length/type field, skip past it, and print it
201 * if we're printing the link-layer header.
202 */
203 recurse:
204 length_type = GET_BE_U_2(p);
205
206 length -= 2;
207 caplen -= 2;
208 p += 2;
209 hdrlen += 2;
210
211 /*
212 * Process 802.1AE MACsec headers.
213 */
214 printed_length = 0;
215 if (length_type == ETHERTYPE_MACSEC) {
216 /*
217 * MACsec, aka IEEE 802.1AE-2006
218 * Print the header, and try to print the payload if it's not encrypted
219 */
220 if (ndo->ndo_eflag) {
221 ether_type_print(ndo, length_type);
222 ND_PRINT(", length %u: ", orig_length);
223 printed_length = 1;
224 }
225
226 int ret = macsec_print(ndo, &p, &length, &caplen, &hdrlen,
227 &src, &dst);
228
229 if (ret == 0) {
230 /* Payload is encrypted; print it as raw data. */
231 if (!ndo->ndo_suppress_default_print)
232 ND_DEFAULTPRINT(p, caplen);
233 if (do_incr_ll_hdr_len)
234 ndo->ndo_ll_hdr_len += hdrlen;
235 return;
236 } else if (ret > 0) {
237 /* Problem printing the header; just quit. */
238 if (do_incr_ll_hdr_len)
239 ndo->ndo_ll_hdr_len += ret;
240 return;
241 } else {
242 /*
243 * Keep processing type/length fields.
244 */
245 length_type = GET_BE_U_2(p);
246
247 length -= 2;
248 caplen -= 2;
249 p += 2;
250 hdrlen += 2;
251 }
252 }
253
254 /*
255 * Process VLAN tag types.
256 */
257 while (length_type == ETHERTYPE_8021Q ||
258 length_type == ETHERTYPE_8021Q9100 ||
259 length_type == ETHERTYPE_8021Q9200 ||
260 length_type == ETHERTYPE_8021QinQ) {
261 /*
262 * It has a VLAN tag.
263 * Print VLAN information, and then go back and process
264 * the enclosed type field.
265 */
266 if (caplen < 4) {
267 ndo->ndo_protocol = "vlan";
268 nd_print_trunc(ndo);
269 if (do_incr_ll_hdr_len)
270 ndo->ndo_ll_hdr_len += hdrlen + caplen;
271 return;
272 }
273 if (length < 4) {
274 ndo->ndo_protocol = "vlan";
275 nd_print_trunc(ndo);
276 if (do_incr_ll_hdr_len)
277 ndo->ndo_ll_hdr_len += hdrlen + length;
278 return;
279 }
280 if (ndo->ndo_eflag) {
281 uint16_t tag = GET_BE_U_2(p);
282
283 ether_type_print(ndo, length_type);
284 if (!printed_length) {
285 ND_PRINT(", length %u: ", orig_length);
286 printed_length = 1;
287 } else
288 ND_PRINT(", ");
289 ND_PRINT("%s, ", ieee8021q_tci_string(tag));
290 }
291
292 length_type = GET_BE_U_2(p + 2);
293 p += 4;
294 length -= 4;
295 caplen -= 4;
296 hdrlen += 4;
297 }
298
299 /*
300 * We now have the final length/type field.
301 */
302 if (length_type <= MAX_ETHERNET_LENGTH_VAL) {
303 /*
304 * It's a length field, containing the length of the
305 * remaining payload; use it as such, as long as
306 * it's not too large (bigger than the actual payload).
307 */
308 if (length_type < length) {
309 length = length_type;
310 if (caplen > length)
311 caplen = length;
312 }
313
314 /*
315 * Cut off the snapshot length to the end of the
316 * payload.
317 */
318 nd_push_snapend(ndo, p + length);
319
320 if (ndo->ndo_eflag) {
321 ND_PRINT("802.3");
322 if (!printed_length)
323 ND_PRINT(", length %u: ", length);
324 }
325
326 /*
327 * An LLC header follows the length. Print that and
328 * higher layers.
329 */
330 llc_hdrlen = llc_print(ndo, p, length, caplen, &src, &dst);
331 if (llc_hdrlen < 0) {
332 /* packet type not known, print raw packet */
333 if (!ndo->ndo_suppress_default_print)
334 ND_DEFAULTPRINT(p, caplen);
335 llc_hdrlen = -llc_hdrlen;
336 }
337 hdrlen += llc_hdrlen;
338 nd_pop_packet_info(ndo);
339 } else if (length_type == ETHERTYPE_JUMBO) {
340 /*
341 * It's a type field, with the type for Alteon jumbo frames.
342 * See
343 *
344 * https://tools.ietf.org/html/draft-ietf-isis-ext-eth-01
345 *
346 * which indicates that, following the type field,
347 * there's an LLC header and payload.
348 */
349 /* Try to print the LLC-layer header & higher layers */
350 llc_hdrlen = llc_print(ndo, p, length, caplen, &src, &dst);
351 if (llc_hdrlen < 0) {
352 /* packet type not known, print raw packet */
353 if (!ndo->ndo_suppress_default_print)
354 ND_DEFAULTPRINT(p, caplen);
355 llc_hdrlen = -llc_hdrlen;
356 }
357 hdrlen += llc_hdrlen;
358 } else if (length_type == ETHERTYPE_ARISTA) {
359 if (caplen < 2) {
360 ND_PRINT("[|arista]");
361 if (do_incr_ll_hdr_len)
362 ndo->ndo_ll_hdr_len += hdrlen + caplen;
363 return;
364 }
365 if (length < 2) {
366 ND_PRINT("[|arista]");
367 if (do_incr_ll_hdr_len)
368 ndo->ndo_ll_hdr_len += hdrlen + length;
369 return;
370 }
371 ether_type_print(ndo, length_type);
372 ND_PRINT(", length %u: ", orig_length);
373 int bytesConsumed = arista_ethertype_print(ndo, p, length);
374 if (bytesConsumed > 0) {
375 p += bytesConsumed;
376 length -= bytesConsumed;
377 caplen -= bytesConsumed;
378 hdrlen += bytesConsumed;
379 goto recurse;
380 } else {
381 /* subtype/version not known, print raw packet */
382 if (!ndo->ndo_eflag && length_type > MAX_ETHERNET_LENGTH_VAL) {
383 ether_addresses_print(ndo, src.addr, dst.addr);
384 ether_type_print(ndo, length_type);
385 ND_PRINT(", length %u: ", orig_length);
386 }
387 if (!ndo->ndo_suppress_default_print)
388 ND_DEFAULTPRINT(p, caplen);
389 }
390 } else {
391 /*
392 * It's a type field with some other value.
393 */
394 if (ndo->ndo_eflag) {
395 ether_type_print(ndo, length_type);
396 if (!printed_length)
397 ND_PRINT(", length %u: ", orig_length);
398 else
399 ND_PRINT(", ");
400 }
401 if (ethertype_print(ndo, length_type, p, length, caplen, &src, &dst) == 0) {
402 /* type not known, print raw packet */
403 if (!ndo->ndo_eflag) {
404 /*
405 * We didn't print the full link-layer
406 * header, as -e wasn't specified, so
407 * print only the source and destination
408 * MAC addresses and the final Ethernet
409 * type.
410 */
411 ether_addresses_print(ndo, src.addr, dst.addr);
412 ether_type_print(ndo, length_type);
413 ND_PRINT(", length %u: ", orig_length);
414 }
415
416 if (!ndo->ndo_suppress_default_print)
417 ND_DEFAULTPRINT(p, caplen);
418 }
419 }
420 if (do_incr_ll_hdr_len)
421 ndo->ndo_ll_hdr_len += hdrlen;
422 return;
423 }
424
425 /*
426 * Print an Ethernet frame while specyfing a non-standard Ethernet header
427 * length.
428 * This might be encapsulated within another frame; we might be passed
429 * a pointer to a function that can print header information for that
430 * frame's protocol, and an argument to pass to that function.
431 *
432 * FIXME: caplen can and should be derived from ndo->ndo_snapend and p.
433 */
434 void
435 ether_switch_tag_print(netdissect_options *ndo, const u_char *p, u_int length,
436 u_int caplen,
437 void (*print_switch_tag)(netdissect_options *, const u_char *),
438 u_int switch_tag_len, u_int do_incr_ll_hdr_len)
439 {
440 ether_common_print(ndo, p, length, caplen, print_switch_tag,
441 switch_tag_len, NULL, NULL, do_incr_ll_hdr_len);
442 }
443
444 /*
445 * Print an Ethernet frame.
446 * This might be encapsulated within another frame; we might be passed
447 * a pointer to a function that can print header information for that
448 * frame's protocol, and an argument to pass to that function.
449 *
450 * FIXME: caplen can and should be derived from ndo->ndo_snapend and p.
451 */
452 void
453 ether_print(netdissect_options *ndo,
454 const u_char *p, u_int length, u_int caplen,
455 void (*print_encap_header)(netdissect_options *ndo, const u_char *),
456 const u_char *encap_header_arg, u_int do_incr_ll_hdr_len)
457 {
458 ndo->ndo_protocol = "ether";
459 ether_common_print(ndo, p, length, caplen, NULL, 0,
460 print_encap_header, encap_header_arg, do_incr_ll_hdr_len);
461 }
462
463 /*
464 * This is the top level routine of the printer. 'p' points
465 * to the ether header of the packet, 'h->len' is the length
466 * of the packet off the wire, and 'h->caplen' is the number
467 * of bytes actually captured.
468 */
469 void
470 ether_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h,
471 const u_char *p)
472 {
473 ndo->ndo_protocol = "ether";
474 ndo->ndo_ll_hdr_len += 0;
475
476 ether_print(ndo, p, h->len, h->caplen, NULL, NULL, TRUE);
477 }
478
479 /*
480 * This is the top level routine of the printer. 'p' points
481 * to the ether header of the packet, 'h->len' is the length
482 * of the packet off the wire, and 'h->caplen' is the number
483 * of bytes actually captured.
484 *
485 * This is for DLT_NETANALYZER, which has a 4-byte pseudo-header
486 * before the Ethernet header.
487 */
488 void
489 netanalyzer_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h,
490 const u_char *p)
491 {
492 /*
493 * Fail if we don't have enough data for the Hilscher pseudo-header.
494 */
495 ndo->ndo_protocol = "netanalyzer";
496 if (h->caplen < 4) {
497 ndo->ndo_ll_hdr_len += h->caplen;
498 nd_print_trunc(ndo);
499 return;
500 }
501 ndo->ndo_ll_hdr_len += 4;
502
503 /* Skip the pseudo-header. */
504 ether_print(ndo, p + 4, h->len - 4, h->caplen - 4, NULL, NULL, TRUE);
505 }
506
507 /*
508 * This is the top level routine of the printer. 'p' points
509 * to the ether header of the packet, 'h->len' is the length
510 * of the packet off the wire, and 'h->caplen' is the number
511 * of bytes actually captured.
512 *
513 * This is for DLT_NETANALYZER_TRANSPARENT, which has a 4-byte
514 * pseudo-header, a 7-byte Ethernet preamble, and a 1-byte Ethernet SOF
515 * before the Ethernet header.
516 */
517 void
518 netanalyzer_transparent_if_print(netdissect_options *ndo,
519 const struct pcap_pkthdr *h,
520 const u_char *p)
521 {
522 /*
523 * Fail if we don't have enough data for the Hilscher pseudo-header,
524 * preamble, and SOF.
525 */
526 ndo->ndo_protocol = "netanalyzer_transparent";
527 if (h->caplen < 12) {
528 ndo->ndo_ll_hdr_len += h->caplen;
529 nd_print_trunc(ndo);
530 return;
531 }
532 ndo->ndo_ll_hdr_len += 12;
533
534 /* Skip the pseudo-header, preamble, and SOF. */
535 ether_print(ndo, p + 12, h->len - 12, h->caplen - 12, NULL, NULL, TRUE);
536 }
537
538 /*
539 * Prints the packet payload, given an Ethernet type code for the payload's
540 * protocol.
541 *
542 * Returns non-zero if it can do so, zero if the ethertype is unknown.
543 */
544
545 int
546 ethertype_print(netdissect_options *ndo,
547 u_short ether_type, const u_char *p,
548 u_int length, u_int caplen,
549 const struct lladdr_info *src, const struct lladdr_info *dst)
550 {
551 switch (ether_type) {
552
553 case ETHERTYPE_IP:
554 ip_print(ndo, p, length);
555 return (1);
556
557 case ETHERTYPE_IPV6:
558 ip6_print(ndo, p, length);
559 return (1);
560
561 case ETHERTYPE_ARP:
562 case ETHERTYPE_REVARP:
563 arp_print(ndo, p, length, caplen);
564 return (1);
565
566 case ETHERTYPE_DN:
567 decnet_print(ndo, p, length, caplen);
568 return (1);
569
570 case ETHERTYPE_ATALK:
571 if (ndo->ndo_vflag)
572 ND_PRINT("et1 ");
573 atalk_print(ndo, p, length);
574 return (1);
575
576 case ETHERTYPE_AARP:
577 aarp_print(ndo, p, length);
578 return (1);
579
580 case ETHERTYPE_IPX:
581 ND_PRINT("(NOV-ETHII) ");
582 ipx_print(ndo, p, length);
583 return (1);
584
585 case ETHERTYPE_ISO:
586 if (length == 0 || caplen == 0) {
587 ndo->ndo_protocol = "isoclns";
588 nd_print_trunc(ndo);
589 return (1);
590 }
591 isoclns_print(ndo, p + 1, length - 1);
592 return(1);
593
594 case ETHERTYPE_PPPOED:
595 case ETHERTYPE_PPPOES:
596 case ETHERTYPE_PPPOED2:
597 case ETHERTYPE_PPPOES2:
598 pppoe_print(ndo, p, length);
599 return (1);
600
601 case ETHERTYPE_EAPOL:
602 eapol_print(ndo, p);
603 return (1);
604
605 case ETHERTYPE_RRCP:
606 rrcp_print(ndo, p, length, src, dst);
607 return (1);
608
609 case ETHERTYPE_PPP:
610 if (length) {
611 ND_PRINT(": ");
612 ppp_print(ndo, p, length);
613 }
614 return (1);
615
616 case ETHERTYPE_MPCP:
617 mpcp_print(ndo, p, length);
618 return (1);
619
620 case ETHERTYPE_SLOW:
621 slow_print(ndo, p, length);
622 return (1);
623
624 case ETHERTYPE_CFM:
625 case ETHERTYPE_CFM_OLD:
626 cfm_print(ndo, p, length);
627 return (1);
628
629 case ETHERTYPE_LLDP:
630 lldp_print(ndo, p, length);
631 return (1);
632
633 case ETHERTYPE_NSH:
634 nsh_print(ndo, p, length);
635 return (1);
636
637 case ETHERTYPE_LOOPBACK:
638 loopback_print(ndo, p, length);
639 return (1);
640
641 case ETHERTYPE_MPLS:
642 case ETHERTYPE_MPLS_MULTI:
643 mpls_print(ndo, p, length);
644 return (1);
645
646 case ETHERTYPE_TIPC:
647 tipc_print(ndo, p, length, caplen);
648 return (1);
649
650 case ETHERTYPE_MS_NLB_HB:
651 msnlb_print(ndo, p);
652 return (1);
653
654 case ETHERTYPE_GEONET_OLD:
655 case ETHERTYPE_GEONET:
656 geonet_print(ndo, p, length, src);
657 return (1);
658
659 case ETHERTYPE_CALM_FAST:
660 calm_fast_print(ndo, p, length, src);
661 return (1);
662
663 case ETHERTYPE_AOE:
664 aoe_print(ndo, p, length);
665 return (1);
666
667 case ETHERTYPE_PTP:
668 ptp_print(ndo, p, length);
669 return (1);
670
671 case ETHERTYPE_LAT:
672 case ETHERTYPE_SCA:
673 case ETHERTYPE_MOPRC:
674 case ETHERTYPE_MOPDL:
675 case ETHERTYPE_IEEE1905_1:
676 /* default_print for now */
677 default:
678 return (0);
679 }
680 }