(IP_V(ip) == 6) ? 1 : 0);
else if (IS_SRC_OR_DST_PORT(MPLS_LSP_PING_PORT))
lspping_print(ndo, cp, length);
- else if (sport == BCM_LI_PORT)
- bcm_li_print(ndo, cp, length);
else if (dport == BFD_CONTROL_PORT ||
dport == BFD_MULTIHOP_PORT ||
dport == BFD_LAG_PORT ||
else if (IS_SRC_OR_DST_PORT(HTTPS_PORT) &&
quic_detect(ndo, cp, length))
quic_print(ndo, cp, length);
+ else if (sport == BCM_LI_PORT)
+ bcm_li_print(ndo, cp, length);
else {
if (ulen > length && !fragmented)
ND_PRINT("UDP, bad length %u > %u",
bfd-lag-v bfd-lag.pcap bfd-lag-v.out -v
bfd-sbfd bfd-sbfd.pcap bfd-sbfd.out
bfd-sbfd-v bfd-sbfd.pcap bfd-sbfd-v.out -v
+# BFD with source port 49152
+bfd_source_port_49152 bfd_source_port_49152.pcap bfd_source_port_49152.out -v
# Arista Vendor Specific Tests
arista-ether arista_ether.pcap arista_ether.out
--- /dev/null
+ 1 09:58:19.559328 IP (tos 0xe0, ttl 255, id 40257, offset 0, flags [DF], proto UDP (17), length 52)
+ 11.11.11.2.49152 > 11.11.11.1.3784: BFDv1, length: 24
+ Control, State Up, Flags: [Control Plane Independent], Diagnostic: No Diagnostic (0x00)
+ Detection Timer Multiplier: 3 (300 ms Detection time), BFD Length: 24
+ My Discriminator: 0x80000001, Your Discriminator: 0x80000001
+ Desired min Tx Interval: 100 ms
+ Required min Rx Interval: 100 ms
+ Required min Echo Interval: 0 ms