2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 /* \summary: UDP printer */
26 #include "netdissect-stdinc.h"
28 #include "netdissect.h"
29 #include "addrtoname.h"
31 #include "appletalk.h"
45 nd_uint16_t rh_flags
; /* T:2 P:1 CNT:5 PT:8 */
46 nd_uint16_t rh_len
; /* length of message (in words) */
47 nd_uint32_t rh_ssrc
; /* synchronization src id */
51 nd_uint32_t upper
; /* more significant 32 bits */
52 nd_uint32_t lower
; /* less significant 32 bits */
59 ntp64 sr_ntp
; /* 64-bit ntp timestamp */
60 nd_uint32_t sr_ts
; /* reference media timestamp */
61 nd_uint32_t sr_np
; /* no. packets sent */
62 nd_uint32_t sr_nb
; /* no. bytes sent */
67 * Time stamps are middle 32-bits of ntp timestamp.
70 nd_uint32_t rr_srcid
; /* sender being reported */
71 nd_uint32_t rr_nl
; /* no. packets lost */
72 nd_uint32_t rr_ls
; /* extended last seq number received */
73 nd_uint32_t rr_dv
; /* jitter (delay variance) */
74 nd_uint32_t rr_lsr
; /* orig. ts from last rr from this src */
75 nd_uint32_t rr_dlsr
; /* time from recpt of last rr to xmit time */
79 #define RTCP_PT_SR 200
80 #define RTCP_PT_RR 201
81 #define RTCP_PT_SDES 202
82 #define RTCP_SDES_CNAME 1
83 #define RTCP_SDES_NAME 2
84 #define RTCP_SDES_EMAIL 3
85 #define RTCP_SDES_PHONE 4
86 #define RTCP_SDES_LOC 5
87 #define RTCP_SDES_TOOL 6
88 #define RTCP_SDES_NOTE 7
89 #define RTCP_SDES_PRIV 8
90 #define RTCP_PT_BYE 203
91 #define RTCP_PT_APP 204
94 vat_print(netdissect_options
*ndo
, const u_char
*hdr
, u_int length
)
99 ndo
->ndo_protocol
= "vat";
101 ND_PRINT("udp/va/vat, length %u < 2", length
);
104 ts
= GET_BE_U_2(hdr
);
105 if ((ts
& 0xf060) != 0) {
107 ND_PRINT("udp/vt %u %u / %u",
109 ts
& 0x3ff, ts
>> 10);
115 ND_PRINT("udp/vat, length %u < 8", length
);
118 i0
= GET_BE_U_4(&((const u_int
*)hdr
)[0]);
119 i1
= GET_BE_U_4(&((const u_int
*)hdr
)[1]);
120 ND_PRINT("udp/vat %u c%u %u%s",
123 i1
, i0
& 0x800000? "*" : "");
126 ND_PRINT(" f%u", (i0
>> 16) & 0x1f);
128 ND_PRINT(" s%u", (i0
>> 24) & 0x3f);
133 rtp_print(netdissect_options
*ndo
, const u_char
*hdr
, u_int len
)
136 const u_int
*ip
= (const u_int
*)hdr
;
137 u_int hasopt
, hasext
, contype
, hasmarker
, dlen
;
141 ndo
->ndo_protocol
= "rtp";
143 ND_PRINT("udp/rtp, length %u < 8", len
);
146 i0
= GET_BE_U_4(&((const u_int
*)hdr
)[0]);
147 i1
= GET_BE_U_4(&((const u_int
*)hdr
)[1]);
154 if ((i0
>> 30) == 1) {
155 /* rtp v1 - draft-ietf-avt-rtp-04 */
156 hasopt
= i0
& 0x800000;
157 contype
= (i0
>> 16) & 0x3f;
158 hasmarker
= i0
& 0x400000;
161 /* rtp v2 - RFC 3550 */
163 ND_PRINT("udp/rtp, length %u < 12", dlen
+ 8);
166 hasext
= i0
& 0x10000000;
167 contype
= (i0
>> 16) & 0x7f;
168 hasmarker
= i0
& 0x800000;
174 ND_PRINT("udp/%s %u c%u %s%s %u %u",
178 (hasopt
|| hasext
)? "+" : "",
182 if (ndo
->ndo_vflag
) {
183 ND_PRINT(" %u", GET_BE_U_4(&((const u_int
*)hdr
)[2]));
188 optlen
= (i2
>> 16) & 0xff;
189 if (optlen
== 0 || optlen
> len
) {
195 } while ((int)i2
>= 0);
200 extlen
= (i2
& 0xffff) + 1;
207 if (contype
== 0x1f) /*XXX H.261 */
208 ND_PRINT(" 0x%04x", GET_BE_U_4(ip
) >> 16);
212 static const u_char
*
213 rtcp_print(netdissect_options
*ndo
, const u_char
*hdr
, const u_char
*ep
)
215 /* rtp v2 control (rtcp) */
216 const struct rtcp_rr
*rr
= 0;
217 const struct rtcp_sr
*sr
;
218 const struct rtcphdr
*rh
= (const struct rtcphdr
*)hdr
;
224 ndo
->ndo_protocol
= "rtcp";
225 if ((const u_char
*)(rh
+ 1) > ep
)
228 len
= (GET_BE_U_2(rh
->rh_len
) + 1) * 4;
229 flags
= GET_BE_U_2(rh
->rh_flags
);
230 cnt
= (flags
>> 8) & 0x1f;
231 switch (flags
& 0xff) {
233 sr
= (const struct rtcp_sr
*)(rh
+ 1);
235 if (len
!= cnt
* sizeof(*rr
) + sizeof(*sr
) + sizeof(*rh
))
236 ND_PRINT(" [%u]", len
);
238 ND_PRINT(" %u", GET_BE_U_4(rh
->rh_ssrc
));
239 if ((const u_char
*)(sr
+ 1) > ep
)
242 ts
= (double)(GET_BE_U_4(sr
->sr_ntp
.upper
)) +
243 ((double)(GET_BE_U_4(sr
->sr_ntp
.lower
)) /
245 ND_PRINT(" @%.2f %u %up %ub", ts
, GET_BE_U_4(sr
->sr_ts
),
246 GET_BE_U_4(sr
->sr_np
), GET_BE_U_4(sr
->sr_nb
));
247 rr
= (const struct rtcp_rr
*)(sr
+ 1);
251 if (len
!= cnt
* sizeof(*rr
) + sizeof(*rh
))
252 ND_PRINT(" [%u]", len
);
253 rr
= (const struct rtcp_rr
*)(rh
+ 1);
255 ND_PRINT(" %u", GET_BE_U_4(rh
->rh_ssrc
));
258 ND_PRINT(" sdes %u", len
);
260 ND_PRINT(" %u", GET_BE_U_4(rh
->rh_ssrc
));
264 ND_PRINT(" bye %u", len
);
266 ND_PRINT(" %u", GET_BE_U_4(rh
->rh_ssrc
));
270 ND_PRINT(" type-0x%x %u", flags
& 0xff, len
);
275 ND_PRINT(" c%u", cnt
);
277 if ((const u_char
*)(rr
+ 1) > ep
)
281 ND_PRINT(" %u", GET_BE_U_4(rr
->rr_srcid
));
282 ts
= (double)(GET_BE_U_4(rr
->rr_lsr
)) / 65536.;
283 dts
= (double)(GET_BE_U_4(rr
->rr_dlsr
)) / 65536.;
284 ND_PRINT(" %ul %us %uj @%.2f+%.2f",
285 GET_BE_U_4(rr
->rr_nl
) & 0x00ffffff,
286 GET_BE_U_4(rr
->rr_ls
),
287 GET_BE_U_4(rr
->rr_dv
), ts
, dts
);
297 static uint16_t udp_cksum(netdissect_options
*ndo
, const struct ip
*ip
,
298 const struct udphdr
*up
,
301 return nextproto4_cksum(ndo
, ip
, (const uint8_t *)(const void *)up
, len
, len
,
305 static uint16_t udp6_cksum(netdissect_options
*ndo
, const struct ip6_hdr
*ip6
,
306 const struct udphdr
*up
, u_int len
)
308 return nextproto6_cksum(ndo
, ip6
, (const uint8_t *)(const void *)up
, len
, len
,
313 udpipaddr_print(netdissect_options
*ndo
, const struct ip
*ip
, int sport
, int dport
)
315 const struct ip6_hdr
*ip6
;
318 ip6
= (const struct ip6_hdr
*)ip
;
323 if (GET_U_1(ip6
->ip6_nxt
) == IPPROTO_UDP
) {
325 ND_PRINT("%s > %s: ",
326 GET_IP6ADDR_STRING(ip6
->ip6_src
),
327 GET_IP6ADDR_STRING(ip6
->ip6_dst
));
329 ND_PRINT("%s.%s > %s.%s: ",
330 GET_IP6ADDR_STRING(ip6
->ip6_src
),
331 udpport_string(ndo
, (uint16_t)sport
),
332 GET_IP6ADDR_STRING(ip6
->ip6_dst
),
333 udpport_string(ndo
, (uint16_t)dport
));
337 ND_PRINT("%s > %s: ",
338 udpport_string(ndo
, (uint16_t)sport
),
339 udpport_string(ndo
, (uint16_t)dport
));
343 if (GET_U_1(ip
->ip_p
) == IPPROTO_UDP
) {
345 ND_PRINT("%s > %s: ",
346 GET_IPADDR_STRING(ip
->ip_src
),
347 GET_IPADDR_STRING(ip
->ip_dst
));
349 ND_PRINT("%s.%s > %s.%s: ",
350 GET_IPADDR_STRING(ip
->ip_src
),
351 udpport_string(ndo
, (uint16_t)sport
),
352 GET_IPADDR_STRING(ip
->ip_dst
),
353 udpport_string(ndo
, (uint16_t)dport
));
357 ND_PRINT("%s > %s: ",
358 udpport_string(ndo
, (uint16_t)sport
),
359 udpport_string(ndo
, (uint16_t)dport
));
366 udp_print(netdissect_options
*ndo
, const u_char
*bp
, u_int length
,
367 const u_char
*bp2
, int fragmented
, u_int ttl_hl
)
369 const struct udphdr
*up
;
372 const u_char
*ep
= ndo
->ndo_snapend
;
373 uint16_t sport
, dport
;
375 const struct ip6_hdr
*ip6
;
377 ndo
->ndo_protocol
= "udp";
378 up
= (const struct udphdr
*)bp
;
379 ip
= (const struct ip
*)bp2
;
381 ip6
= (const struct ip6_hdr
*)bp2
;
384 if (!ND_TTEST_2(up
->uh_dport
)) {
385 udpipaddr_print(ndo
, ip
, -1, -1);
389 sport
= GET_BE_U_2(up
->uh_sport
);
390 dport
= GET_BE_U_2(up
->uh_dport
);
392 if (length
< sizeof(struct udphdr
)) {
393 udpipaddr_print(ndo
, ip
, sport
, dport
);
394 ND_PRINT("truncated-udp %u", length
);
397 if (!ND_TTEST_2(up
->uh_ulen
)) {
398 udpipaddr_print(ndo
, ip
, sport
, dport
);
401 ulen
= GET_BE_U_2(up
->uh_ulen
);
403 * IPv6 Jumbo Datagrams; see RFC 2675.
404 * If the length is zero, and the length provided to us is
405 * > 65535, use the provided length as the length.
407 if (ulen
== 0 && length
> 65535)
409 if (ulen
< sizeof(struct udphdr
)) {
410 udpipaddr_print(ndo
, ip
, sport
, dport
);
411 ND_PRINT("truncated-udplength %u", ulen
);
414 ulen
-= sizeof(struct udphdr
);
415 length
-= sizeof(struct udphdr
);
419 cp
= (const u_char
*)(up
+ 1);
420 if (cp
> ndo
->ndo_snapend
) {
421 udpipaddr_print(ndo
, ip
, sport
, dport
);
425 if (ndo
->ndo_packettype
) {
426 const struct sunrpc_msg
*rp
;
427 enum sunrpc_msg_type direction
;
429 switch (ndo
->ndo_packettype
) {
432 udpipaddr_print(ndo
, ip
, sport
, dport
);
433 vat_print(ndo
, cp
, length
);
437 udpipaddr_print(ndo
, ip
, sport
, dport
);
438 wb_print(ndo
, cp
, length
);
442 rp
= (const struct sunrpc_msg
*)cp
;
443 direction
= (enum sunrpc_msg_type
) GET_BE_U_4(rp
->rm_direction
);
444 if (direction
== SUNRPC_CALL
)
445 sunrpc_print(ndo
, (const u_char
*)rp
, length
,
448 nfsreply_print(ndo
, (const u_char
*)rp
, length
,
449 (const u_char
*)ip
); /*XXX*/
453 udpipaddr_print(ndo
, ip
, sport
, dport
);
454 rtp_print(ndo
, cp
, length
);
458 udpipaddr_print(ndo
, ip
, sport
, dport
);
460 cp
= rtcp_print(ndo
, cp
, ep
);
464 udpipaddr_print(ndo
, ip
, sport
, dport
);
465 snmp_print(ndo
, cp
, length
);
469 udpipaddr_print(ndo
, ip
, sport
, dport
);
474 udpipaddr_print(ndo
, ip
, sport
, dport
);
475 tftp_print(ndo
, cp
, length
);
479 udpipaddr_print(ndo
, ip
, sport
, dport
);
480 aodv_print(ndo
, cp
, length
, IP_V(ip
) == 6);
484 udpipaddr_print(ndo
, ip
, sport
, dport
);
485 radius_print(ndo
, cp
, length
);
489 udpipaddr_print(ndo
, ip
, sport
, dport
);
490 vxlan_print(ndo
, cp
, length
);
495 udpipaddr_print(ndo
, ip
, sport
, dport
);
496 pgm_print(ndo
, cp
, length
, bp2
);
499 udpipaddr_print(ndo
, ip
, sport
, dport
);
500 lmp_print(ndo
, cp
, length
);
503 udpipaddr_print(ndo
, ip
, sport
, dport
);
504 ptp_print(ndo
, cp
, length
);
507 udpipaddr_print(ndo
, ip
, sport
, dport
);
508 someip_print(ndo
, cp
, length
);
511 udpipaddr_print(ndo
, ip
, sport
, dport
);
512 /* over_tcp: FALSE, is_mdns: FALSE */
513 domain_print(ndo
, cp
, length
, FALSE
, FALSE
);
519 udpipaddr_print(ndo
, ip
, sport
, dport
);
520 if (!ndo
->ndo_qflag
) {
521 const struct sunrpc_msg
*rp
;
522 enum sunrpc_msg_type direction
;
524 rp
= (const struct sunrpc_msg
*)cp
;
525 if (ND_TTEST_4(rp
->rm_direction
)) {
526 direction
= (enum sunrpc_msg_type
) GET_BE_U_4(rp
->rm_direction
);
527 if (dport
== NFS_PORT
&& direction
== SUNRPC_CALL
) {
528 ND_PRINT("NFS request xid %u ",
529 GET_BE_U_4(rp
->rm_xid
));
530 nfsreq_noaddr_print(ndo
, (const u_char
*)rp
, length
,
534 if (sport
== NFS_PORT
&& direction
== SUNRPC_REPLY
) {
535 ND_PRINT("NFS reply xid %u ",
536 GET_BE_U_4(rp
->rm_xid
));
537 nfsreply_noaddr_print(ndo
, (const u_char
*)rp
, length
,
542 if (dport
== SUNRPC_PORT
&& direction
== SUNRPC_CALL
) {
543 sunrpc_print((const u_char
*)rp
, length
, (const u_char
*)ip
);
550 if (ndo
->ndo_vflag
&& !ndo
->ndo_Kflag
&& !fragmented
) {
551 /* Check the checksum, if possible. */
552 uint16_t sum
, udp_sum
;
555 * XXX - do this even if vflag == 1?
556 * TCP does, and we do so for UDP-over-IPv6.
558 if (IP_V(ip
) == 4 && (ndo
->ndo_vflag
> 1)) {
559 udp_sum
= GET_BE_U_2(up
->uh_sum
);
561 ND_PRINT("[no cksum] ");
562 } else if (ND_TTEST_LEN(cp
, length
)) {
563 sum
= udp_cksum(ndo
, ip
, up
, length
+ sizeof(struct udphdr
));
566 ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ",
568 in_cksum_shouldbe(udp_sum
, sum
));
570 ND_PRINT("[udp sum ok] ");
572 } else if (IP_V(ip
) == 6) {
573 /* for IPv6, UDP checksum is mandatory */
574 if (ND_TTEST_LEN(cp
, length
)) {
575 sum
= udp6_cksum(ndo
, ip6
, up
, length
+ sizeof(struct udphdr
));
576 udp_sum
= GET_BE_U_2(up
->uh_sum
);
579 ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ",
581 in_cksum_shouldbe(udp_sum
, sum
));
583 ND_PRINT("[udp sum ok] ");
588 if (!ndo
->ndo_qflag
) {
589 if (IS_SRC_OR_DST_PORT(NAMESERVER_PORT
))
590 /* over_tcp: FALSE, is_mdns: FALSE */
591 domain_print(ndo
, cp
, length
, FALSE
, FALSE
);
592 else if (IS_SRC_OR_DST_PORT(BOOTPC_PORT
) ||
593 IS_SRC_OR_DST_PORT(BOOTPS_PORT
))
594 bootp_print(ndo
, cp
, length
);
595 else if (IS_SRC_OR_DST_PORT(TFTP_PORT
))
596 tftp_print(ndo
, cp
, length
);
597 else if (IS_SRC_OR_DST_PORT(KERBEROS_PORT
))
598 krb_print(ndo
, (const u_char
*)cp
);
599 else if (IS_SRC_OR_DST_PORT(NTP_PORT
))
600 ntp_print(ndo
, cp
, length
);
602 else if (IS_SRC_OR_DST_PORT(NETBIOS_NS_PORT
))
603 nbt_udp137_print(ndo
, cp
, length
);
604 else if (IS_SRC_OR_DST_PORT(NETBIOS_DGRAM_PORT
))
605 nbt_udp138_print(ndo
, cp
, length
);
607 else if (IS_SRC_OR_DST_PORT(SNMP_PORT
) ||
608 IS_SRC_OR_DST_PORT(SNMPTRAP_PORT
))
609 snmp_print(ndo
, cp
, length
);
610 else if (IS_SRC_OR_DST_PORT(PTP_EVENT_PORT
) ||
611 IS_SRC_OR_DST_PORT(PTP_GENERAL_PORT
))
612 ptp_print(ndo
, cp
, length
);
613 else if (IS_SRC_OR_DST_PORT(CISCO_AUTORP_PORT
))
614 cisco_autorp_print(ndo
, cp
, length
);
615 else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT
))
616 isakmp_print(ndo
, cp
, length
, bp2
);
617 else if (IS_SRC_OR_DST_PORT(SYSLOG_PORT
))
618 syslog_print(ndo
, cp
, length
);
619 else if (IS_SRC_OR_DST_PORT(RIP_PORT
))
620 rip_print(ndo
, cp
, length
);
621 else if (IS_SRC_OR_DST_PORT(RIPNG_PORT
))
622 ripng_print(ndo
, cp
, length
);
623 else if (IS_SRC_OR_DST_PORT(TIMED_PORT
))
624 timed_print(ndo
, (const u_char
*)cp
);
625 else if (IS_SRC_OR_DST_PORT(DHCP6_SERV_PORT
) ||
626 IS_SRC_OR_DST_PORT(DHCP6_CLI_PORT
))
627 dhcp6_print(ndo
, cp
, length
);
628 else if (IS_SRC_OR_DST_PORT(LDP_PORT
))
629 ldp_print(ndo
, cp
, length
);
630 else if (IS_SRC_OR_DST_PORT(AODV_PORT
))
631 aodv_print(ndo
, cp
, length
, IP_V(ip
) == 6);
632 else if (IS_SRC_OR_DST_PORT(OLSR_PORT
))
633 olsr_print(ndo
, cp
, length
, IP_V(ip
) == 6);
634 else if (IS_SRC_OR_DST_PORT(LMP_PORT
))
635 lmp_print(ndo
, cp
, length
);
636 else if (IS_SRC_OR_DST_PORT(KERBEROS_SEC_PORT
))
637 krb_print(ndo
, (const u_char
*)cp
);
638 else if (IS_SRC_OR_DST_PORT(LWRES_PORT
))
639 lwres_print(ndo
, cp
, length
);
640 else if (IS_SRC_OR_DST_PORT(MULTICASTDNS_PORT
))
641 /* over_tcp: FALSE, is_mdns: TRUE */
642 domain_print(ndo
, cp
, length
, FALSE
, TRUE
);
643 else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_NATT
))
644 isakmp_rfc3948_print(ndo
, cp
, length
, bp2
, IP_V(ip
), fragmented
, ttl_hl
);
645 else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER1
) || IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER2
))
646 isakmp_print(ndo
, cp
, length
, bp2
);
647 else if (IS_SRC_OR_DST_PORT(L2TP_PORT
))
648 l2tp_print(ndo
, cp
, length
);
649 else if (dport
== VAT_PORT
)
650 vat_print(ndo
, cp
, length
);
651 else if (IS_SRC_OR_DST_PORT(ZEPHYR_SRV_PORT
) || IS_SRC_OR_DST_PORT(ZEPHYR_CLT_PORT
))
652 zephyr_print(ndo
, cp
, length
);
654 * Since there are 10 possible ports to check, I think
655 * a <> test would be more efficient
657 else if ((sport
>= RX_PORT_LOW
&& sport
<= RX_PORT_HIGH
) ||
658 (dport
>= RX_PORT_LOW
&& dport
<= RX_PORT_HIGH
))
659 rx_print(ndo
, cp
, length
, sport
, dport
,
660 (const u_char
*) ip
);
661 else if (IS_SRC_OR_DST_PORT(AHCP_PORT
))
662 ahcp_print(ndo
, cp
, length
);
663 else if (IS_SRC_OR_DST_PORT(BABEL_PORT
) || IS_SRC_OR_DST_PORT(BABEL_PORT_OLD
))
664 babel_print(ndo
, cp
, length
);
665 else if (IS_SRC_OR_DST_PORT(HNCP_PORT
))
666 hncp_print(ndo
, cp
, length
);
668 * Kludge in test for whiteboard packets.
670 else if (dport
== WB_PORT
)
671 wb_print(ndo
, cp
, length
);
672 else if (IS_SRC_OR_DST_PORT(RADIUS_PORT
) ||
673 IS_SRC_OR_DST_PORT(RADIUS_NEW_PORT
) ||
674 IS_SRC_OR_DST_PORT(RADIUS_ACCOUNTING_PORT
) ||
675 IS_SRC_OR_DST_PORT(RADIUS_NEW_ACCOUNTING_PORT
) ||
676 IS_SRC_OR_DST_PORT(RADIUS_CISCO_COA_PORT
) ||
677 IS_SRC_OR_DST_PORT(RADIUS_COA_PORT
) )
678 radius_print(ndo
, cp
, length
);
679 else if (dport
== HSRP_PORT
)
680 hsrp_print(ndo
, cp
, length
);
681 else if (IS_SRC_OR_DST_PORT(MPLS_LSP_PING_PORT
))
682 lspping_print(ndo
, cp
, length
);
683 else if (dport
== BFD_CONTROL_PORT
||
684 dport
== BFD_MULTIHOP_PORT
||
685 dport
== BFD_LAG_PORT
||
686 dport
== BFD_ECHO_PORT
)
687 bfd_print(ndo
, cp
, length
, dport
);
688 else if (IS_SRC_OR_DST_PORT(VQP_PORT
))
689 vqp_print(ndo
, cp
, length
);
690 else if (IS_SRC_OR_DST_PORT(SFLOW_PORT
))
691 sflow_print(ndo
, cp
, length
);
692 else if (dport
== LWAPP_CONTROL_PORT
)
693 lwapp_control_print(ndo
, cp
, length
, 1);
694 else if (sport
== LWAPP_CONTROL_PORT
)
695 lwapp_control_print(ndo
, cp
, length
, 0);
696 else if (IS_SRC_OR_DST_PORT(LWAPP_DATA_PORT
))
697 lwapp_data_print(ndo
, cp
, length
);
698 else if (IS_SRC_OR_DST_PORT(SIP_PORT
))
699 sip_print(ndo
, cp
, length
);
700 else if (IS_SRC_OR_DST_PORT(OTV_PORT
))
701 otv_print(ndo
, cp
, length
);
702 else if (IS_SRC_OR_DST_PORT(VXLAN_PORT
))
703 vxlan_print(ndo
, cp
, length
);
704 else if (dport
== GENEVE_PORT
)
705 geneve_print(ndo
, cp
, length
);
706 else if (IS_SRC_OR_DST_PORT(LISP_CONTROL_PORT
))
707 lisp_print(ndo
, cp
, length
);
708 else if (IS_SRC_OR_DST_PORT(VXLAN_GPE_PORT
))
709 vxlan_gpe_print(ndo
, cp
, length
);
710 else if (IS_SRC_OR_DST_PORT(ZEP_PORT
))
711 zep_print(ndo
, cp
, length
);
712 else if (IS_SRC_OR_DST_PORT(MPLS_PORT
))
713 mpls_print(ndo
, cp
, length
);
714 else if (ND_TTEST_1(((const struct LAP
*)cp
)->type
) &&
715 GET_U_1(((const struct LAP
*)cp
)->type
) == lapDDP
&&
716 (atalk_port(sport
) || atalk_port(dport
))) {
719 llap_print(ndo
, cp
, length
);
720 } else if (IS_SRC_OR_DST_PORT(SOMEIP_PORT
))
721 someip_print(ndo
, cp
, length
);
722 else if (sport
== BCM_LI_PORT
)
723 bcm_li_print(ndo
, cp
, length
);
725 if (ulen
> length
&& !fragmented
)
726 ND_PRINT("UDP, bad length %u > %u",
729 ND_PRINT("UDP, length %u", ulen
);
732 if (ulen
> length
&& !fragmented
)
733 ND_PRINT("UDP, bad length %u > %u",
736 ND_PRINT("UDP, length %u", ulen
);