#include "ethertype.h"
#include "atm.h"
+/*
+ * If none of the Juniper DLT_s are defined, there's nothing to do.
+ */
+#if defined(DLT_JUNIPER_GGSN) || defined(DLT_JUNIPER_ES) || \
+ defined(DLT_JUNIPER_MONITOR) || defined(DLT_JUNIPER_SERVICES) || \
+ defined(DLT_JUNIPER_PPPOE) || defined(DLT_JUNIPER_ETHER) || \
+ defined(DLT_JUNIPER_PPP) || defined(DLT_JUNIPER_FRELAY) || \
+ defined(DLT_JUNIPER_CHDLC) || defined(DLT_JUNIPER_PPPOE_ATM) || \
+ defined(DLT_JUNIPER_MLPPP) || defined(DLT_JUNIPER_MFR) || \
+ defined(DLT_JUNIPER_MLFR) || defined(DLT_JUNIPER_ATM1) || \
+ defined(DLT_JUNIPER_ATM2)
#define JUNIPER_BPF_OUT 0 /* Outgoing packet */
#define JUNIPER_BPF_IN 1 /* Incoming packet */
#define JUNIPER_BPF_PKT_IN 0x1 /* Incoming packet */
#define JUNIPER_IPSEC_O_AH_AUTHENTICATION_TYPE 4
#define JUNIPER_IPSEC_O_ESP_ENCRYPTION_TYPE 5
+#ifdef DLT_JUNIPER_ES
static const struct tok juniper_ipsec_type_values[] = {
{ JUNIPER_IPSEC_O_ESP_ENCRYPT_ESP_AUTHEN_TYPE, "ESP ENCR-AUTH" },
{ JUNIPER_IPSEC_O_ESP_ENCRYPT_AH_AUTHEN_TYPE, "ESP ENCR-AH AUTH" },
{ JUNIPER_IPSEC_O_ESP_ENCRYPTION_TYPE, "ESP ENCR" },
{ 0, NULL}
};
+#endif
static const struct tok juniper_direction_values[] = {
{ JUNIPER_BPF_IN, "In"},
#define MFR_BE_MASK 0xc0
+#ifdef DLT_JUNIPER_GGSN
static const struct tok juniper_protocol_values[] = {
{ JUNIPER_PROTO_NULL, "Null" },
{ JUNIPER_PROTO_IPV4, "IPv4" },
{ JUNIPER_PROTO_IPV6, "IPv6" },
{ 0, NULL}
};
+#endif
static int ip_heuristic_guess(netdissect_options *, const u_char *, u_int);
+#ifdef DLT_JUNIPER_ATM2
static int juniper_ppp_heuristic_guess(netdissect_options *, const u_char *, u_int);
+#endif
static int juniper_parse_header(netdissect_options *, const u_char *, const struct pcap_pkthdr *, struct juniper_l2info_t *);
#ifdef DLT_JUNIPER_GGSN
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_services]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_services]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_services]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_services]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_pppoe_atm]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_atm1]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_atm2]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
-#endif
-
/* try to guess, based on all PPP protos that are supported in
* a juniper router if the payload data is encapsulated using PPP */
}
return 1; /* we printed a ppp packet */
}
+#endif
static int
ip_heuristic_guess(netdissect_options *ndo,
const struct juniper_cookie_table_t *lp = juniper_cookie_table;
u_int idx, jnx_ext_len, jnx_header_len = 0;
uint8_t tlv_type,tlv_len;
+#ifdef DLT_JUNIPER_ATM2
uint32_t control_word;
+#endif
int tlv_value;
const u_char *tptr;
ND_PRINT("hlen %u, proto 0x%04x, ", l2info->header_len, l2info->proto);
return 1; /* everything went ok so far. continue parsing */
- trunc:
- ND_PRINT("[|juniper_hdr], length %u", h->len);
+trunc:
+ nd_print_trunc(ndo);
return 0;
}
-
-
-/*
- * Local Variables:
- * c-style: whitesmith
- * c-basic-offset: 4
- * End:
- */
+#endif /* defined(DLT_JUNIPER_GGSN) || defined(DLT_JUNIPER_ES) || \
+ defined(DLT_JUNIPER_MONITOR) || defined(DLT_JUNIPER_SERVICES) || \
+ defined(DLT_JUNIPER_PPPOE) || defined(DLT_JUNIPER_ETHER) || \
+ defined(DLT_JUNIPER_PPP) || defined(DLT_JUNIPER_FRELAY) || \
+ defined(DLT_JUNIPER_CHDLC) || defined(DLT_JUNIPER_PPPOE_ATM) || \
+ defined(DLT_JUNIPER_MLPPP) || defined(DLT_JUNIPER_MFR) || \
+ defined(DLT_JUNIPER_MLFR) || defined(DLT_JUNIPER_ATM1) || \
+ defined(DLT_JUNIPER_ATM2) */