return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_services]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_services]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_services]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_services]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_pppoe_atm]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_atm1]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
return l2info.header_len;
trunc:
- ND_PRINT("[|juniper_atm2]");
+ nd_print_trunc(ndo);
return l2info.header_len;
}
#endif
ND_PRINT("hlen %u, proto 0x%04x, ", l2info->header_len, l2info->proto);
return 1; /* everything went ok so far. continue parsing */
- trunc:
- ND_PRINT("[|juniper_hdr], length %u", h->len);
+trunc:
+ nd_print_trunc(ndo);
return 0;
}
Out
- Juniper PCAP Flags [none]ATM1-PIC, cookie-len 4, cookie 0x30303030: [|juniper_hdr], length 262144
+ Juniper PCAP Flags [none]ATM1-PIC, cookie-len 4, cookie 0x30303030: [|juniper_atm1_if]