]> The Tcpdump Group git mirrors - tcpdump/blob - print-udp.c
Autosar SOME/IP protocol support
[tcpdump] / print-udp.c
1 /*
2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /* \summary: UDP printer */
23
24 #ifdef HAVE_CONFIG_H
25 #include <config.h>
26 #endif
27
28 #include "netdissect-stdinc.h"
29
30 #include "netdissect.h"
31 #include "addrtoname.h"
32 #include "extract.h"
33 #include "appletalk.h"
34
35 #include "udp.h"
36
37 #include "ip.h"
38 #include "ip6.h"
39 #include "ipproto.h"
40 #include "rpc_auth.h"
41 #include "rpc_msg.h"
42
43 #include "nfs.h"
44
45
46 struct rtcphdr {
47 nd_uint16_t rh_flags; /* T:2 P:1 CNT:5 PT:8 */
48 nd_uint16_t rh_len; /* length of message (in words) */
49 nd_uint32_t rh_ssrc; /* synchronization src id */
50 };
51
52 typedef struct {
53 nd_uint32_t upper; /* more significant 32 bits */
54 nd_uint32_t lower; /* less significant 32 bits */
55 } ntp64;
56
57 /*
58 * Sender report.
59 */
60 struct rtcp_sr {
61 ntp64 sr_ntp; /* 64-bit ntp timestamp */
62 nd_uint32_t sr_ts; /* reference media timestamp */
63 nd_uint32_t sr_np; /* no. packets sent */
64 nd_uint32_t sr_nb; /* no. bytes sent */
65 };
66
67 /*
68 * Receiver report.
69 * Time stamps are middle 32-bits of ntp timestamp.
70 */
71 struct rtcp_rr {
72 nd_uint32_t rr_srcid; /* sender being reported */
73 nd_uint32_t rr_nl; /* no. packets lost */
74 nd_uint32_t rr_ls; /* extended last seq number received */
75 nd_uint32_t rr_dv; /* jitter (delay variance) */
76 nd_uint32_t rr_lsr; /* orig. ts from last rr from this src */
77 nd_uint32_t rr_dlsr; /* time from recpt of last rr to xmit time */
78 };
79
80 /*XXX*/
81 #define RTCP_PT_SR 200
82 #define RTCP_PT_RR 201
83 #define RTCP_PT_SDES 202
84 #define RTCP_SDES_CNAME 1
85 #define RTCP_SDES_NAME 2
86 #define RTCP_SDES_EMAIL 3
87 #define RTCP_SDES_PHONE 4
88 #define RTCP_SDES_LOC 5
89 #define RTCP_SDES_TOOL 6
90 #define RTCP_SDES_NOTE 7
91 #define RTCP_SDES_PRIV 8
92 #define RTCP_PT_BYE 203
93 #define RTCP_PT_APP 204
94
95 static void
96 vat_print(netdissect_options *ndo, const void *hdr, u_int length)
97 {
98 /* vat/vt audio */
99 u_int ts;
100
101 ndo->ndo_protocol = "vat";
102 if (length < 2) {
103 ND_PRINT("udp/va/vat, length %u < 2", length);
104 return;
105 }
106 ND_TCHECK_2((const u_int *)hdr);
107 ts = GET_BE_U_2(hdr);
108 if ((ts & 0xf060) != 0) {
109 /* probably vt */
110 ND_PRINT("udp/vt %u %u / %u",
111 length,
112 ts & 0x3ff, ts >> 10);
113 } else {
114 /* probably vat */
115 uint32_t i0, i1;
116
117 if (length < 8) {
118 ND_PRINT("udp/vat, length %u < 8", length);
119 return;
120 }
121 ND_TCHECK_4(&((const u_int *)hdr)[0]);
122 i0 = GET_BE_U_4(&((const u_int *)hdr)[0]);
123 ND_TCHECK_4(&((const u_int *)hdr)[1]);
124 i1 = GET_BE_U_4(&((const u_int *)hdr)[1]);
125 ND_PRINT("udp/vat %u c%u %u%s",
126 length - 8,
127 i0 & 0xffff,
128 i1, i0 & 0x800000? "*" : "");
129 /* audio format */
130 if (i0 & 0x1f0000)
131 ND_PRINT(" f%u", (i0 >> 16) & 0x1f);
132 if (i0 & 0x3f000000)
133 ND_PRINT(" s%u", (i0 >> 24) & 0x3f);
134 }
135 return;
136
137 trunc:
138 nd_print_trunc(ndo);
139 }
140
141 static void
142 rtp_print(netdissect_options *ndo, const void *hdr, u_int len)
143 {
144 /* rtp v1 or v2 */
145 const u_int *ip = (const u_int *)hdr;
146 u_int hasopt, hasext, contype, hasmarker, dlen;
147 uint32_t i0, i1;
148 const char * ptype;
149
150 ndo->ndo_protocol = "rtp";
151 if (len < 8) {
152 ND_PRINT("udp/rtp, length %u < 8", len);
153 return;
154 }
155 ND_TCHECK_4(&((const u_int *)hdr)[0]);
156 i0 = GET_BE_U_4(&((const u_int *)hdr)[0]);
157 ND_TCHECK_4(&((const u_int *)hdr)[1]);
158 i1 = GET_BE_U_4(&((const u_int *)hdr)[1]);
159 dlen = len - 8;
160 ip += 2;
161 len >>= 2;
162 len -= 2;
163 hasopt = 0;
164 hasext = 0;
165 if ((i0 >> 30) == 1) {
166 /* rtp v1 - draft-ietf-avt-rtp-04 */
167 hasopt = i0 & 0x800000;
168 contype = (i0 >> 16) & 0x3f;
169 hasmarker = i0 & 0x400000;
170 ptype = "rtpv1";
171 } else {
172 /* rtp v2 - RFC 3550 */
173 if (dlen < 4) {
174 ND_PRINT("udp/rtp, length %u < 12", dlen + 8);
175 return;
176 }
177 hasext = i0 & 0x10000000;
178 contype = (i0 >> 16) & 0x7f;
179 hasmarker = i0 & 0x800000;
180 dlen -= 4;
181 ptype = "rtp";
182 ip += 1;
183 len -= 1;
184 }
185 ND_PRINT("udp/%s %u c%u %s%s %u %u",
186 ptype,
187 dlen,
188 contype,
189 (hasopt || hasext)? "+" : "",
190 hasmarker? "*" : "",
191 i0 & 0xffff,
192 i1);
193 if (ndo->ndo_vflag) {
194 ND_TCHECK_4(&((const u_int *)hdr)[2]);
195 ND_PRINT(" %u", GET_BE_U_4(&((const u_int *)hdr)[2]));
196 if (hasopt) {
197 u_int i2, optlen;
198 do {
199 ND_TCHECK_4(ip);
200 i2 = GET_BE_U_4(ip);
201 optlen = (i2 >> 16) & 0xff;
202 if (optlen == 0 || optlen > len) {
203 ND_PRINT(" !opt");
204 return;
205 }
206 ip += optlen;
207 len -= optlen;
208 } while ((int)i2 >= 0);
209 }
210 if (hasext) {
211 u_int i2, extlen;
212 ND_TCHECK_4(ip);
213 i2 = GET_BE_U_4(ip);
214 extlen = (i2 & 0xffff) + 1;
215 if (extlen > len) {
216 ND_PRINT(" !ext");
217 return;
218 }
219 ip += extlen;
220 }
221 ND_TCHECK_4(ip);
222 if (contype == 0x1f) /*XXX H.261 */
223 ND_PRINT(" 0x%04x", GET_BE_U_4(ip) >> 16);
224 }
225 return;
226
227 trunc:
228 nd_print_trunc(ndo);
229 }
230
231 static const u_char *
232 rtcp_print(netdissect_options *ndo, const u_char *hdr, const u_char *ep)
233 {
234 /* rtp v2 control (rtcp) */
235 const struct rtcp_rr *rr = 0;
236 const struct rtcp_sr *sr;
237 const struct rtcphdr *rh = (const struct rtcphdr *)hdr;
238 u_int len;
239 uint16_t flags;
240 u_int cnt;
241 double ts, dts;
242
243 ndo->ndo_protocol = "rtcp";
244 if ((const u_char *)(rh + 1) > ep)
245 goto trunc;
246 ND_TCHECK_SIZE(rh);
247 len = (GET_BE_U_2(rh->rh_len) + 1) * 4;
248 flags = GET_BE_U_2(rh->rh_flags);
249 cnt = (flags >> 8) & 0x1f;
250 switch (flags & 0xff) {
251 case RTCP_PT_SR:
252 sr = (const struct rtcp_sr *)(rh + 1);
253 ND_PRINT(" sr");
254 if (len != cnt * sizeof(*rr) + sizeof(*sr) + sizeof(*rh))
255 ND_PRINT(" [%u]", len);
256 if (ndo->ndo_vflag)
257 ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
258 if ((const u_char *)(sr + 1) > ep)
259 goto trunc;
260 ND_TCHECK_SIZE(sr);
261 ts = (double)(GET_BE_U_4(sr->sr_ntp.upper)) +
262 ((double)(GET_BE_U_4(sr->sr_ntp.lower)) /
263 4294967296.0);
264 ND_PRINT(" @%.2f %u %up %ub", ts, GET_BE_U_4(sr->sr_ts),
265 GET_BE_U_4(sr->sr_np), GET_BE_U_4(sr->sr_nb));
266 rr = (const struct rtcp_rr *)(sr + 1);
267 break;
268 case RTCP_PT_RR:
269 ND_PRINT(" rr");
270 if (len != cnt * sizeof(*rr) + sizeof(*rh))
271 ND_PRINT(" [%u]", len);
272 rr = (const struct rtcp_rr *)(rh + 1);
273 if (ndo->ndo_vflag)
274 ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
275 break;
276 case RTCP_PT_SDES:
277 ND_PRINT(" sdes %u", len);
278 if (ndo->ndo_vflag)
279 ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
280 cnt = 0;
281 break;
282 case RTCP_PT_BYE:
283 ND_PRINT(" bye %u", len);
284 if (ndo->ndo_vflag)
285 ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
286 cnt = 0;
287 break;
288 default:
289 ND_PRINT(" type-0x%x %u", flags & 0xff, len);
290 cnt = 0;
291 break;
292 }
293 if (cnt > 1)
294 ND_PRINT(" c%u", cnt);
295 while (cnt != 0) {
296 if ((const u_char *)(rr + 1) > ep)
297 goto trunc;
298 ND_TCHECK_SIZE(rr);
299 if (ndo->ndo_vflag)
300 ND_PRINT(" %u", GET_BE_U_4(rr->rr_srcid));
301 ts = (double)(GET_BE_U_4(rr->rr_lsr)) / 65536.;
302 dts = (double)(GET_BE_U_4(rr->rr_dlsr)) / 65536.;
303 ND_PRINT(" %ul %us %uj @%.2f+%.2f",
304 GET_BE_U_4(rr->rr_nl) & 0x00ffffff,
305 GET_BE_U_4(rr->rr_ls),
306 GET_BE_U_4(rr->rr_dv), ts, dts);
307 cnt--;
308 }
309 return (hdr + len);
310
311 trunc:
312 nd_print_trunc(ndo);
313 return ep;
314 }
315
316 static uint16_t udp_cksum(netdissect_options *ndo, const struct ip *ip,
317 const struct udphdr *up,
318 u_int len)
319 {
320 return nextproto4_cksum(ndo, ip, (const uint8_t *)(const void *)up, len, len,
321 IPPROTO_UDP);
322 }
323
324 static uint16_t udp6_cksum(netdissect_options *ndo, const struct ip6_hdr *ip6,
325 const struct udphdr *up, u_int len)
326 {
327 return nextproto6_cksum(ndo, ip6, (const uint8_t *)(const void *)up, len, len,
328 IPPROTO_UDP);
329 }
330
331 static void
332 udpipaddr_print(netdissect_options *ndo, const struct ip *ip, int sport, int dport)
333 {
334 const struct ip6_hdr *ip6;
335
336 if (IP_V(ip) == 6)
337 ip6 = (const struct ip6_hdr *)ip;
338 else
339 ip6 = NULL;
340
341 if (ip6) {
342 if (GET_U_1(ip6->ip6_nxt) == IPPROTO_UDP) {
343 if (sport == -1) {
344 ND_PRINT("%s > %s: ",
345 ip6addr_string(ndo, ip6->ip6_src),
346 ip6addr_string(ndo, ip6->ip6_dst));
347 } else {
348 ND_PRINT("%s.%s > %s.%s: ",
349 ip6addr_string(ndo, ip6->ip6_src),
350 udpport_string(ndo, (uint16_t)sport),
351 ip6addr_string(ndo, ip6->ip6_dst),
352 udpport_string(ndo, (uint16_t)dport));
353 }
354 } else {
355 if (sport != -1) {
356 ND_PRINT("%s > %s: ",
357 udpport_string(ndo, (uint16_t)sport),
358 udpport_string(ndo, (uint16_t)dport));
359 }
360 }
361 } else {
362 if (GET_U_1(ip->ip_p) == IPPROTO_UDP) {
363 if (sport == -1) {
364 ND_PRINT("%s > %s: ",
365 ipaddr_string(ndo, ip->ip_src),
366 ipaddr_string(ndo, ip->ip_dst));
367 } else {
368 ND_PRINT("%s.%s > %s.%s: ",
369 ipaddr_string(ndo, ip->ip_src),
370 udpport_string(ndo, (uint16_t)sport),
371 ipaddr_string(ndo, ip->ip_dst),
372 udpport_string(ndo, (uint16_t)dport));
373 }
374 } else {
375 if (sport != -1) {
376 ND_PRINT("%s > %s: ",
377 udpport_string(ndo, (uint16_t)sport),
378 udpport_string(ndo, (uint16_t)dport));
379 }
380 }
381 }
382 }
383
384 void
385 udp_print(netdissect_options *ndo, const u_char *bp, u_int length,
386 const u_char *bp2, int fragmented, u_int ttl_hl)
387 {
388 const struct udphdr *up;
389 const struct ip *ip;
390 const u_char *cp;
391 const u_char *ep = ndo->ndo_snapend;
392 uint16_t sport, dport;
393 u_int ulen;
394 const struct ip6_hdr *ip6;
395
396 ndo->ndo_protocol = "udp";
397 up = (const struct udphdr *)bp;
398 ip = (const struct ip *)bp2;
399 if (IP_V(ip) == 6)
400 ip6 = (const struct ip6_hdr *)bp2;
401 else
402 ip6 = NULL;
403 if (!ND_TTEST_2(up->uh_dport)) {
404 udpipaddr_print(ndo, ip, -1, -1);
405 goto trunc;
406 }
407
408 sport = GET_BE_U_2(up->uh_sport);
409 dport = GET_BE_U_2(up->uh_dport);
410
411 if (length < sizeof(struct udphdr)) {
412 udpipaddr_print(ndo, ip, sport, dport);
413 ND_PRINT("truncated-udp %u", length);
414 return;
415 }
416 if (!ND_TTEST_2(up->uh_ulen)) {
417 udpipaddr_print(ndo, ip, sport, dport);
418 goto trunc;
419 }
420 ulen = GET_BE_U_2(up->uh_ulen);
421 /*
422 * IPv6 Jumbo Datagrams; see RFC 2675.
423 * If the length is zero, and the length provided to us is
424 * > 65535, use the provided length as the length.
425 */
426 if (ulen == 0 && length > 65535)
427 ulen = length;
428 if (ulen < sizeof(struct udphdr)) {
429 udpipaddr_print(ndo, ip, sport, dport);
430 ND_PRINT("truncated-udplength %u", ulen);
431 return;
432 }
433 ulen -= sizeof(struct udphdr);
434 length -= sizeof(struct udphdr);
435 if (ulen < length)
436 length = ulen;
437
438 cp = (const u_char *)(up + 1);
439 if (cp > ndo->ndo_snapend) {
440 udpipaddr_print(ndo, ip, sport, dport);
441 goto trunc;
442 }
443
444 if (ndo->ndo_packettype) {
445 const struct sunrpc_msg *rp;
446 enum sunrpc_msg_type direction;
447
448 switch (ndo->ndo_packettype) {
449
450 case PT_VAT:
451 udpipaddr_print(ndo, ip, sport, dport);
452 vat_print(ndo, (const void *)(up + 1), length);
453 break;
454
455 case PT_WB:
456 udpipaddr_print(ndo, ip, sport, dport);
457 wb_print(ndo, (const u_char *)(up + 1), length);
458 break;
459
460 case PT_RPC:
461 rp = (const struct sunrpc_msg *)(up + 1);
462 ND_TCHECK_4(rp->rm_direction);
463 direction = (enum sunrpc_msg_type) GET_BE_U_4(rp->rm_direction);
464 if (direction == SUNRPC_CALL)
465 sunrpc_print(ndo, (const u_char *)rp, length,
466 (const u_char *)ip);
467 else
468 nfsreply_print(ndo, (const u_char *)rp, length,
469 (const u_char *)ip); /*XXX*/
470 break;
471
472 case PT_RTP:
473 udpipaddr_print(ndo, ip, sport, dport);
474 rtp_print(ndo, (const void *)(up + 1), length);
475 break;
476
477 case PT_RTCP:
478 udpipaddr_print(ndo, ip, sport, dport);
479 while (cp < ep)
480 cp = rtcp_print(ndo, cp, ep);
481 break;
482
483 case PT_SNMP:
484 udpipaddr_print(ndo, ip, sport, dport);
485 snmp_print(ndo, (const u_char *)(up + 1), length);
486 break;
487
488 case PT_CNFP:
489 udpipaddr_print(ndo, ip, sport, dport);
490 cnfp_print(ndo, cp);
491 break;
492
493 case PT_TFTP:
494 udpipaddr_print(ndo, ip, sport, dport);
495 tftp_print(ndo, cp, length);
496 break;
497
498 case PT_AODV:
499 udpipaddr_print(ndo, ip, sport, dport);
500 aodv_print(ndo, (const u_char *)(up + 1), length,
501 ip6 != NULL);
502 break;
503
504 case PT_RADIUS:
505 udpipaddr_print(ndo, ip, sport, dport);
506 radius_print(ndo, cp, length);
507 break;
508
509 case PT_VXLAN:
510 udpipaddr_print(ndo, ip, sport, dport);
511 vxlan_print(ndo, (const u_char *)(up + 1), length);
512 break;
513
514 case PT_PGM:
515 case PT_PGM_ZMTP1:
516 udpipaddr_print(ndo, ip, sport, dport);
517 pgm_print(ndo, cp, length, bp2);
518 break;
519 case PT_LMP:
520 udpipaddr_print(ndo, ip, sport, dport);
521 lmp_print(ndo, cp, length);
522 break;
523 case PT_PTP:
524 udpipaddr_print(ndo, ip, sport, dport);
525 ptp_print(ndo, cp, length);
526 break;
527 case PT_SOMEIP:
528 udpipaddr_print(ndo, ip, sport, dport);
529 someip_print(ndo, cp, length);
530 break;
531 }
532 return;
533 }
534
535 udpipaddr_print(ndo, ip, sport, dport);
536 if (!ndo->ndo_qflag) {
537 const struct sunrpc_msg *rp;
538 enum sunrpc_msg_type direction;
539
540 rp = (const struct sunrpc_msg *)(up + 1);
541 if (ND_TTEST_4(rp->rm_direction)) {
542 direction = (enum sunrpc_msg_type) GET_BE_U_4(rp->rm_direction);
543 if (dport == NFS_PORT && direction == SUNRPC_CALL) {
544 ND_PRINT("NFS request xid %u ",
545 GET_BE_U_4(rp->rm_xid));
546 nfsreq_noaddr_print(ndo, (const u_char *)rp, length,
547 (const u_char *)ip);
548 return;
549 }
550 if (sport == NFS_PORT && direction == SUNRPC_REPLY) {
551 ND_PRINT("NFS reply xid %u ",
552 GET_BE_U_4(rp->rm_xid));
553 nfsreply_noaddr_print(ndo, (const u_char *)rp, length,
554 (const u_char *)ip);
555 return;
556 }
557 #ifdef notdef
558 if (dport == SUNRPC_PORT && direction == SUNRPC_CALL) {
559 sunrpc_print((const u_char *)rp, length, (const u_char *)ip);
560 return;
561 }
562 #endif
563 }
564 }
565
566 if (ndo->ndo_vflag && !ndo->ndo_Kflag && !fragmented) {
567 /* Check the checksum, if possible. */
568 uint16_t sum, udp_sum;
569
570 /*
571 * XXX - do this even if vflag == 1?
572 * TCP does, and we do so for UDP-over-IPv6.
573 */
574 if (IP_V(ip) == 4 && (ndo->ndo_vflag > 1)) {
575 ND_TCHECK_2(up->uh_sum);
576 udp_sum = GET_BE_U_2(up->uh_sum);
577 if (udp_sum == 0) {
578 ND_PRINT("[no cksum] ");
579 } else if (ND_TTEST_LEN(cp, length)) {
580 sum = udp_cksum(ndo, ip, up, length + sizeof(struct udphdr));
581
582 if (sum != 0) {
583 ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ",
584 udp_sum,
585 in_cksum_shouldbe(udp_sum, sum));
586 } else
587 ND_PRINT("[udp sum ok] ");
588 }
589 }
590 else if (IP_V(ip) == 6) {
591 /* for IPv6, UDP checksum is mandatory */
592 if (ND_TTEST_LEN(cp, length)) {
593 sum = udp6_cksum(ndo, ip6, up, length + sizeof(struct udphdr));
594 ND_TCHECK_2(up->uh_sum);
595 udp_sum = GET_BE_U_2(up->uh_sum);
596
597 if (sum != 0) {
598 ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ",
599 udp_sum,
600 in_cksum_shouldbe(udp_sum, sum));
601 } else
602 ND_PRINT("[udp sum ok] ");
603 }
604 }
605 }
606
607 if (!ndo->ndo_qflag) {
608 if (IS_SRC_OR_DST_PORT(NAMESERVER_PORT))
609 domain_print(ndo, (const u_char *)(up + 1), length, 0);
610 else if (IS_SRC_OR_DST_PORT(MULTICASTDNS_PORT))
611 domain_print(ndo, (const u_char *)(up + 1), length, 1);
612 else if (IS_SRC_OR_DST_PORT(TIMED_PORT))
613 timed_print(ndo, (const u_char *)(up + 1));
614 else if (IS_SRC_OR_DST_PORT(TFTP_PORT))
615 tftp_print(ndo, (const u_char *)(up + 1), length);
616 else if (IS_SRC_OR_DST_PORT(BOOTPC_PORT) || IS_SRC_OR_DST_PORT(BOOTPS_PORT))
617 bootp_print(ndo, (const u_char *)(up + 1), length);
618 else if (IS_SRC_OR_DST_PORT(RIP_PORT))
619 rip_print(ndo, (const u_char *)(up + 1), length);
620 else if (IS_SRC_OR_DST_PORT(AODV_PORT))
621 aodv_print(ndo, (const u_char *)(up + 1), length,
622 ip6 != NULL);
623 else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT))
624 isakmp_print(ndo, (const u_char *)(up + 1), length, bp2);
625 else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_NATT))
626 isakmp_rfc3948_print(ndo, (const u_char *)(up + 1), length, bp2, IP_V(ip), fragmented, ttl_hl);
627 else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER1) || IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER2))
628 isakmp_print(ndo, (const u_char *)(up + 1), length, bp2);
629 else if (IS_SRC_OR_DST_PORT(SNMP_PORT) || IS_SRC_OR_DST_PORT(SNMPTRAP_PORT))
630 snmp_print(ndo, (const u_char *)(up + 1), length);
631 else if (IS_SRC_OR_DST_PORT(NTP_PORT))
632 ntp_print(ndo, (const u_char *)(up + 1), length);
633 else if (IS_SRC_OR_DST_PORT(KERBEROS_PORT) || IS_SRC_OR_DST_PORT(KERBEROS_SEC_PORT))
634 krb_print(ndo, (const u_char *)(up + 1));
635 else if (IS_SRC_OR_DST_PORT(L2TP_PORT))
636 l2tp_print(ndo, (const u_char *)(up + 1), length);
637 #ifdef ENABLE_SMB
638 else if (IS_SRC_OR_DST_PORT(NETBIOS_NS_PORT))
639 nbt_udp137_print(ndo, (const u_char *)(up + 1), length);
640 else if (IS_SRC_OR_DST_PORT(NETBIOS_DGRAM_PORT))
641 nbt_udp138_print(ndo, (const u_char *)(up + 1), length);
642 #endif
643 else if (dport == VAT_PORT)
644 vat_print(ndo, (const void *)(up + 1), length);
645 else if (IS_SRC_OR_DST_PORT(ZEPHYR_SRV_PORT) || IS_SRC_OR_DST_PORT(ZEPHYR_CLT_PORT))
646 zephyr_print(ndo, (const u_char *)(up + 1), length);
647 /*
648 * Since there are 10 possible ports to check, I think
649 * a <> test would be more efficient
650 */
651 else if ((sport >= RX_PORT_LOW && sport <= RX_PORT_HIGH) ||
652 (dport >= RX_PORT_LOW && dport <= RX_PORT_HIGH))
653 rx_print(ndo, (const u_char *)(up + 1), length, sport, dport,
654 (const u_char *) ip);
655 else if (IS_SRC_OR_DST_PORT(RIPNG_PORT))
656 ripng_print(ndo, (const u_char *)(up + 1), length);
657 else if (IS_SRC_OR_DST_PORT(DHCP6_SERV_PORT) || IS_SRC_OR_DST_PORT(DHCP6_CLI_PORT))
658 dhcp6_print(ndo, (const u_char *)(up + 1), length);
659 else if (IS_SRC_OR_DST_PORT(AHCP_PORT))
660 ahcp_print(ndo, (const u_char *)(up + 1), length);
661 else if (IS_SRC_OR_DST_PORT(BABEL_PORT) || IS_SRC_OR_DST_PORT(BABEL_PORT_OLD))
662 babel_print(ndo, (const u_char *)(up + 1), length);
663 else if (IS_SRC_OR_DST_PORT(HNCP_PORT))
664 hncp_print(ndo, (const u_char *)(up + 1), length);
665 /*
666 * Kludge in test for whiteboard packets.
667 */
668 else if (dport == WB_PORT)
669 wb_print(ndo, (const u_char *)(up + 1), length);
670 else if (IS_SRC_OR_DST_PORT(CISCO_AUTORP_PORT))
671 cisco_autorp_print(ndo, (const u_char *)(up + 1), length);
672 else if (IS_SRC_OR_DST_PORT(RADIUS_PORT) ||
673 IS_SRC_OR_DST_PORT(RADIUS_NEW_PORT) ||
674 IS_SRC_OR_DST_PORT(RADIUS_ACCOUNTING_PORT) ||
675 IS_SRC_OR_DST_PORT(RADIUS_NEW_ACCOUNTING_PORT) ||
676 IS_SRC_OR_DST_PORT(RADIUS_CISCO_COA_PORT) ||
677 IS_SRC_OR_DST_PORT(RADIUS_COA_PORT) )
678 radius_print(ndo, (const u_char *)(up+1), length);
679 else if (dport == HSRP_PORT)
680 hsrp_print(ndo, (const u_char *)(up + 1), length);
681 else if (IS_SRC_OR_DST_PORT(LWRES_PORT))
682 lwres_print(ndo, (const u_char *)(up + 1), length);
683 else if (IS_SRC_OR_DST_PORT(LDP_PORT))
684 ldp_print(ndo, (const u_char *)(up + 1), length);
685 else if (IS_SRC_OR_DST_PORT(OLSR_PORT))
686 olsr_print(ndo, (const u_char *)(up + 1), length,
687 (IP_V(ip) == 6) ? 1 : 0);
688 else if (IS_SRC_OR_DST_PORT(MPLS_LSP_PING_PORT))
689 lspping_print(ndo, (const u_char *)(up + 1), length);
690 else if (dport == BFD_CONTROL_PORT ||
691 dport == BFD_MULTIHOP_PORT ||
692 dport == BFD_LAG_PORT ||
693 dport == BFD_ECHO_PORT )
694 bfd_print(ndo, (const u_char *)(up+1), length, dport);
695 else if (IS_SRC_OR_DST_PORT(LMP_PORT))
696 lmp_print(ndo, (const u_char *)(up + 1), length);
697 else if (IS_SRC_OR_DST_PORT(VQP_PORT))
698 vqp_print(ndo, (const u_char *)(up + 1), length);
699 else if (IS_SRC_OR_DST_PORT(SFLOW_PORT))
700 sflow_print(ndo, (const u_char *)(up + 1), length);
701 else if (dport == LWAPP_CONTROL_PORT)
702 lwapp_control_print(ndo, (const u_char *)(up + 1), length, 1);
703 else if (sport == LWAPP_CONTROL_PORT)
704 lwapp_control_print(ndo, (const u_char *)(up + 1), length, 0);
705 else if (IS_SRC_OR_DST_PORT(LWAPP_DATA_PORT))
706 lwapp_data_print(ndo, (const u_char *)(up + 1), length);
707 else if (IS_SRC_OR_DST_PORT(SIP_PORT))
708 sip_print(ndo, (const u_char *)(up + 1), length);
709 else if (IS_SRC_OR_DST_PORT(SYSLOG_PORT))
710 syslog_print(ndo, (const u_char *)(up + 1), length);
711 else if (IS_SRC_OR_DST_PORT(OTV_PORT))
712 otv_print(ndo, (const u_char *)(up + 1), length);
713 else if (IS_SRC_OR_DST_PORT(VXLAN_PORT))
714 vxlan_print(ndo, (const u_char *)(up + 1), length);
715 else if (IS_SRC_OR_DST_PORT(GENEVE_PORT))
716 geneve_print(ndo, (const u_char *)(up + 1), length);
717 else if (IS_SRC_OR_DST_PORT(LISP_CONTROL_PORT))
718 lisp_print(ndo, (const u_char *)(up + 1), length);
719 else if (IS_SRC_OR_DST_PORT(VXLAN_GPE_PORT))
720 vxlan_gpe_print(ndo, (const u_char *)(up + 1), length);
721 else if (IS_SRC_OR_DST_PORT(ZEP_PORT))
722 zep_print(ndo, (const u_char *)(up + 1), length);
723 else if (IS_SRC_OR_DST_PORT(MPLS_PORT))
724 mpls_print(ndo, (const u_char *)(up + 1), length);
725 else if (ND_TTEST_1(((const struct LAP *)cp)->type) &&
726 GET_U_1(((const struct LAP *)cp)->type) == lapDDP &&
727 (atalk_port(sport) || atalk_port(dport))) {
728 if (ndo->ndo_vflag)
729 ND_PRINT("kip ");
730 llap_print(ndo, cp, length);
731 } else if (IS_SRC_OR_DST_PORT(PTP_EVENT_PORT) ||
732 IS_SRC_OR_DST_PORT(PTP_GENERAL_PORT)) {
733 ptp_print(ndo, cp, length);
734 } else if (IS_SRC_OR_DST_PORT(SOMEIP_PORT))
735 someip_print(ndo, (const u_char *)(up + 1), length);
736 else {
737 if (ulen > length)
738 ND_PRINT("UDP, bad length %u > %u",
739 ulen, length);
740 else
741 ND_PRINT("UDP, length %u", ulen);
742 }
743 } else {
744 if (ulen > length)
745 ND_PRINT("UDP, bad length %u > %u",
746 ulen, length);
747 else
748 ND_PRINT("UDP, length %u", ulen);
749 }
750 return;
751
752 trunc:
753 nd_print_trunc(ndo);
754 }