if (ndo->ndo_packettype != PT_RPC)
udpipaddr_print(ndo, ip, sport, dport);
- ND_LCHECKMSG_ZU(length, sizeof(struct udphdr), "undersized-udp");
+ ND_ICHECKMSG_ZU("undersized-udp", length, <, sizeof(struct udphdr));
ulen = GET_BE_U_2(up->uh_ulen);
udp_sum = GET_BE_U_2(up->uh_sum);
/*
*/
if (ulen == 0 && length > 65535)
ulen = length;
- ND_LCHECKMSG_ZU(ulen, sizeof(struct udphdr), "undersized-udplength");
+ ND_ICHECKMSG_ZU("undersized-udplength", ulen, <,
+ sizeof(struct udphdr));
ulen -= sizeof(struct udphdr);
length -= sizeof(struct udphdr);
if (ulen < length)
/* over_tcp: FALSE, is_mdns: FALSE */
domain_print(ndo, cp, length, FALSE, FALSE);
break;
+ case PT_QUIC:
+ quic_print(ndo, cp, length);
+ break;
}
return;
}
ptp_print(ndo, cp, length);
} else if (IS_SRC_OR_DST_PORT(SOMEIP_PORT))
someip_print(ndo, cp, length);
+ else if (IS_SRC_OR_DST_PORT(HTTPS_PORT) &&
+ quic_detect(ndo, cp, length))
+ quic_print(ndo, cp, length);
else {
if (ulen > length && !fragmented)
ND_PRINT("UDP, bad length %u > %u",