tcpdump/print-udp.c

698 lines
19 KiB
C
Raw Normal View History

1999-10-08 07:47:09 +08:00
/*
* Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that: (1) source code distributions
* retain the above copyright notice and this paragraph in its entirety, (2)
* distributions including binary code include the above copyright notice and
* this paragraph in its entirety in the documentation or other materials
* provided with the distribution, and (3) all advertising materials mentioning
* features or use of this software display the following acknowledgement:
* ``This product includes software developed by the University of California,
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
* the University nor the names of its contributors may be used to endorse
* or promote products derived from this software without specific prior
* written permission.
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
*/
/* \summary: UDP printer */
#ifdef HAVE_CONFIG_H
#include <config.h>
1999-10-08 07:47:09 +08:00
#endif
#include "netdissect-stdinc.h"
1999-10-08 07:47:09 +08:00
#include "netdissect.h"
1999-10-08 07:47:09 +08:00
#include "addrtoname.h"
#include "extract.h"
1999-10-08 07:47:09 +08:00
#include "appletalk.h"
#include "udp.h"
#include "ip.h"
#include "ip6.h"
#include "ipproto.h"
#include "rpc_auth.h"
#include "rpc_msg.h"
#include "nfs.h"
1999-10-08 07:47:09 +08:00
1999-10-08 07:47:09 +08:00
struct rtcphdr {
nd_uint16_t rh_flags; /* T:2 P:1 CNT:5 PT:8 */
nd_uint16_t rh_len; /* length of message (in words) */
nd_uint32_t rh_ssrc; /* synchronization src id */
};
1999-10-08 07:47:09 +08:00
typedef struct {
nd_uint32_t upper; /* more significant 32 bits */
nd_uint32_t lower; /* less significant 32 bits */
} ntp64;
1999-10-08 07:47:09 +08:00
/*
* Sender report.
*/
struct rtcp_sr {
2017-12-12 02:11:16 +08:00
ntp64 sr_ntp; /* 64-bit ntp timestamp */
nd_uint32_t sr_ts; /* reference media timestamp */
nd_uint32_t sr_np; /* no. packets sent */
nd_uint32_t sr_nb; /* no. bytes sent */
};
1999-10-08 07:47:09 +08:00
/*
* Receiver report.
* Time stamps are middle 32-bits of ntp timestamp.
*/
struct rtcp_rr {
nd_uint32_t rr_srcid; /* sender being reported */
nd_uint32_t rr_nl; /* no. packets lost */
nd_uint32_t rr_ls; /* extended last seq number received */
nd_uint32_t rr_dv; /* jitter (delay variance) */
nd_uint32_t rr_lsr; /* orig. ts from last rr from this src */
nd_uint32_t rr_dlsr; /* time from recpt of last rr to xmit time */
};
1999-10-08 07:47:09 +08:00
/*XXX*/
#define RTCP_PT_SR 200
#define RTCP_PT_RR 201
#define RTCP_PT_SDES 202
#define RTCP_SDES_CNAME 1
#define RTCP_SDES_NAME 2
#define RTCP_SDES_EMAIL 3
#define RTCP_SDES_PHONE 4
#define RTCP_SDES_LOC 5
#define RTCP_SDES_TOOL 6
#define RTCP_SDES_NOTE 7
#define RTCP_SDES_PRIV 8
#define RTCP_PT_BYE 203
#define RTCP_PT_APP 204
static void
vat_print(netdissect_options *ndo, const u_char *hdr, u_int length)
1999-10-08 07:47:09 +08:00
{
/* vat/vt audio */
u_int ts;
ndo->ndo_protocol = "vat";
if (length < 2) {
ND_PRINT("udp/va/vat, length %u < 2", length);
return;
}
ts = GET_BE_U_2(hdr);
1999-10-08 07:47:09 +08:00
if ((ts & 0xf060) != 0) {
/* probably vt */
ND_PRINT("udp/vt %u %u / %u",
length,
2018-01-07 18:47:30 +08:00
ts & 0x3ff, ts >> 10);
1999-10-08 07:47:09 +08:00
} else {
/* probably vat */
uint32_t i0, i1;
if (length < 8) {
ND_PRINT("udp/vat, length %u < 8", length);
return;
}
i0 = GET_BE_U_4(&((const u_int *)hdr)[0]);
i1 = GET_BE_U_4(&((const u_int *)hdr)[1]);
ND_PRINT("udp/vat %u c%u %u%s",
length - 8,
1999-10-08 07:47:09 +08:00
i0 & 0xffff,
2018-01-07 18:47:30 +08:00
i1, i0 & 0x800000? "*" : "");
1999-10-08 07:47:09 +08:00
/* audio format */
if (i0 & 0x1f0000)
ND_PRINT(" f%u", (i0 >> 16) & 0x1f);
1999-10-08 07:47:09 +08:00
if (i0 & 0x3f000000)
ND_PRINT(" s%u", (i0 >> 24) & 0x3f);
1999-10-08 07:47:09 +08:00
}
}
static void
rtp_print(netdissect_options *ndo, const u_char *hdr, u_int len)
1999-10-08 07:47:09 +08:00
{
/* rtp v1 or v2 */
2015-04-27 08:24:42 +08:00
const u_int *ip = (const u_int *)hdr;
u_int hasopt, hasext, contype, hasmarker, dlen;
uint32_t i0, i1;
1999-10-08 07:47:09 +08:00
const char * ptype;
ndo->ndo_protocol = "rtp";
if (len < 8) {
ND_PRINT("udp/rtp, length %u < 8", len);
return;
}
i0 = GET_BE_U_4(&((const u_int *)hdr)[0]);
i1 = GET_BE_U_4(&((const u_int *)hdr)[1]);
dlen = len - 8;
1999-10-08 07:47:09 +08:00
ip += 2;
len >>= 2;
len -= 2;
hasopt = 0;
hasext = 0;
if ((i0 >> 30) == 1) {
/* rtp v1 - draft-ietf-avt-rtp-04 */
1999-10-08 07:47:09 +08:00
hasopt = i0 & 0x800000;
contype = (i0 >> 16) & 0x3f;
hasmarker = i0 & 0x400000;
ptype = "rtpv1";
} else {
/* rtp v2 - RFC 3550 */
if (dlen < 4) {
ND_PRINT("udp/rtp, length %u < 12", dlen + 8);
return;
}
1999-10-08 07:47:09 +08:00
hasext = i0 & 0x10000000;
contype = (i0 >> 16) & 0x7f;
hasmarker = i0 & 0x800000;
dlen -= 4;
ptype = "rtp";
ip += 1;
len -= 1;
}
ND_PRINT("udp/%s %u c%u %s%s %u %u",
1999-10-08 07:47:09 +08:00
ptype,
dlen,
contype,
(hasopt || hasext)? "+" : "",
hasmarker? "*" : "",
i0 & 0xffff,
2018-01-07 18:47:30 +08:00
i1);
if (ndo->ndo_vflag) {
ND_PRINT(" %u", GET_BE_U_4(&((const u_int *)hdr)[2]));
1999-10-08 07:47:09 +08:00
if (hasopt) {
u_int i2, optlen;
do {
i2 = GET_BE_U_4(ip);
1999-10-08 07:47:09 +08:00
optlen = (i2 >> 16) & 0xff;
if (optlen == 0 || optlen > len) {
2018-01-07 18:47:30 +08:00
ND_PRINT(" !opt");
1999-10-08 07:47:09 +08:00
return;
}
ip += optlen;
len -= optlen;
} while ((int)i2 >= 0);
}
if (hasext) {
u_int i2, extlen;
i2 = GET_BE_U_4(ip);
1999-10-08 07:47:09 +08:00
extlen = (i2 & 0xffff) + 1;
if (extlen > len) {
2018-01-07 18:47:30 +08:00
ND_PRINT(" !ext");
1999-10-08 07:47:09 +08:00
return;
}
ip += extlen;
}
if (contype == 0x1f) /*XXX H.261 */
ND_PRINT(" 0x%04x", GET_BE_U_4(ip) >> 16);
1999-10-08 07:47:09 +08:00
}
}
static const u_char *
rtcp_print(netdissect_options *ndo, const u_char *hdr)
1999-10-08 07:47:09 +08:00
{
/* rtp v2 control (rtcp) */
2015-04-27 08:24:42 +08:00
const struct rtcp_rr *rr = 0;
const struct rtcp_sr *sr;
const struct rtcphdr *rh = (const struct rtcphdr *)hdr;
1999-10-08 07:47:09 +08:00
u_int len;
uint16_t flags;
uint32_t ssrc;
u_int cnt;
1999-10-08 07:47:09 +08:00
double ts, dts;
ndo->ndo_protocol = "rtcp";
len = (GET_BE_U_2(rh->rh_len) + 1) * 4;
flags = GET_BE_U_2(rh->rh_flags);
1999-10-08 07:47:09 +08:00
cnt = (flags >> 8) & 0x1f;
ssrc = GET_BE_U_4(rh->rh_ssrc);
1999-10-08 07:47:09 +08:00
switch (flags & 0xff) {
case RTCP_PT_SR:
2015-04-27 08:24:42 +08:00
sr = (const struct rtcp_sr *)(rh + 1);
2018-01-07 18:47:30 +08:00
ND_PRINT(" sr");
1999-10-08 07:47:09 +08:00
if (len != cnt * sizeof(*rr) + sizeof(*sr) + sizeof(*rh))
ND_PRINT(" [%u]", len);
if (ndo->ndo_vflag)
ND_PRINT(" %u", ssrc);
ts = (double)(GET_BE_U_4(sr->sr_ntp.upper)) +
((double)(GET_BE_U_4(sr->sr_ntp.lower)) /
FMAXINT);
ND_PRINT(" @%.2f %u %up %ub", ts, GET_BE_U_4(sr->sr_ts),
GET_BE_U_4(sr->sr_np), GET_BE_U_4(sr->sr_nb));
2015-04-27 08:24:42 +08:00
rr = (const struct rtcp_rr *)(sr + 1);
1999-10-08 07:47:09 +08:00
break;
case RTCP_PT_RR:
2018-01-07 18:47:30 +08:00
ND_PRINT(" rr");
1999-10-08 07:47:09 +08:00
if (len != cnt * sizeof(*rr) + sizeof(*rh))
ND_PRINT(" [%u]", len);
2015-04-27 08:24:42 +08:00
rr = (const struct rtcp_rr *)(rh + 1);
if (ndo->ndo_vflag)
ND_PRINT(" %u", ssrc);
1999-10-08 07:47:09 +08:00
break;
case RTCP_PT_SDES:
ND_PRINT(" sdes %u", len);
if (ndo->ndo_vflag)
ND_PRINT(" %u", ssrc);
1999-10-08 07:47:09 +08:00
cnt = 0;
break;
case RTCP_PT_BYE:
ND_PRINT(" bye %u", len);
if (ndo->ndo_vflag)
ND_PRINT(" %u", ssrc);
1999-10-08 07:47:09 +08:00
cnt = 0;
break;
default:
ND_PRINT(" type-0x%x %u", flags & 0xff, len);
1999-10-08 07:47:09 +08:00
cnt = 0;
break;
}
if (cnt > 1)
ND_PRINT(" c%u", cnt);
while (cnt != 0) {
if (ndo->ndo_vflag)
ND_PRINT(" %u", GET_BE_U_4(rr->rr_srcid));
ts = (double)(GET_BE_U_4(rr->rr_lsr)) / 65536.;
dts = (double)(GET_BE_U_4(rr->rr_dlsr)) / 65536.;
2018-01-07 18:47:30 +08:00
ND_PRINT(" %ul %us %uj @%.2f+%.2f",
GET_BE_U_4(rr->rr_nl) & 0x00ffffff,
GET_BE_U_4(rr->rr_ls),
GET_BE_U_4(rr->rr_dv), ts, dts);
cnt--;
1999-10-08 07:47:09 +08:00
}
return (hdr + len);
}
static uint16_t udp_cksum(netdissect_options *ndo, const struct ip *ip,
const struct udphdr *up,
u_int len)
2000-08-02 01:36:49 +08:00
{
2015-04-27 08:24:42 +08:00
return nextproto4_cksum(ndo, ip, (const uint8_t *)(const void *)up, len, len,
IPPROTO_UDP);
2000-08-02 01:36:49 +08:00
}
static uint16_t udp6_cksum(netdissect_options *ndo, const struct ip6_hdr *ip6,
const struct udphdr *up, u_int len)
2000-08-02 01:36:49 +08:00
{
return nextproto6_cksum(ndo, ip6, (const uint8_t *)(const void *)up, len, len,
IPPROTO_UDP);
2000-08-02 01:36:49 +08:00
}
static void
udpipaddr_print(netdissect_options *ndo,
const struct ip *ip, const uint16_t sport, const uint16_t dport)
{
const struct ip6_hdr *ip6 = (const struct ip6_hdr *)ip;
if (IP_V(ip) == 4 && GET_U_1(ip->ip_p) == IPPROTO_UDP) {
ND_PRINT("%s.%s > %s.%s: ",
GET_IPADDR_STRING(ip->ip_src),
udpport_string(ndo, sport),
GET_IPADDR_STRING(ip->ip_dst),
udpport_string(ndo, dport));
} else if (IP_V(ip) == 6 && GET_U_1(ip6->ip6_nxt) == IPPROTO_UDP) {
ND_PRINT("%s.%s > %s.%s: ",
GET_IP6ADDR_STRING(ip6->ip6_src),
udpport_string(ndo, sport),
GET_IP6ADDR_STRING(ip6->ip6_dst),
udpport_string(ndo, dport));
} else
ND_PRINT("%s > %s: ",
udpport_string(ndo, sport), udpport_string(ndo, dport));
}
static void
udpipaddr_noport_print(netdissect_options *ndo, const struct ip *ip)
{
const struct ip6_hdr *ip6 = (const struct ip6_hdr *)ip;
if (IP_V(ip) == 4 && GET_U_1(ip->ip_p) == IPPROTO_UDP) {
ND_PRINT("%s > %s: ",
GET_IPADDR_STRING(ip->ip_src),
GET_IPADDR_STRING(ip->ip_dst));
} else if (IP_V(ip) == 6 && GET_U_1(ip6->ip6_nxt) == IPPROTO_UDP) {
ND_PRINT("%s > %s: ",
GET_IP6ADDR_STRING(ip6->ip6_src),
GET_IP6ADDR_STRING(ip6->ip6_dst));
}
}
1999-10-08 07:47:09 +08:00
void
udp_print(netdissect_options *ndo, const u_char *bp, u_int length,
const u_char *bp2, int fragmented, u_int ttl_hl)
1999-10-08 07:47:09 +08:00
{
const struct udphdr *up;
const struct ip *ip;
const u_char *cp;
const u_char *ep = ndo->ndo_snapend;
uint16_t sport, dport;
u_int ulen;
uint16_t udp_sum;
const struct ip6_hdr *ip6;
1999-10-08 07:47:09 +08:00
ndo->ndo_protocol = "udp";
2015-04-27 08:24:42 +08:00
up = (const struct udphdr *)bp;
ip = (const struct ip *)bp2;
if (IP_V(ip) == 6)
2015-04-27 08:24:42 +08:00
ip6 = (const struct ip6_hdr *)bp2;
else
ip6 = NULL;
if (!ND_TTEST_2(up->uh_dport)) {
udpipaddr_noport_print(ndo, ip);
nd_trunc_longjmp(ndo);
1999-10-08 07:47:09 +08:00
}
sport = GET_BE_U_2(up->uh_sport);
dport = GET_BE_U_2(up->uh_dport);
if (ndo->ndo_packettype != PT_RPC)
udpipaddr_print(ndo, ip, sport, dport);
ND_ICHECKMSG_ZU("undersized-udp", length, <, sizeof(struct udphdr));
ulen = GET_BE_U_2(up->uh_ulen);
udp_sum = GET_BE_U_2(up->uh_sum);
/*
* IPv6 Jumbo Datagrams; see RFC 2675.
* If the length is zero, and the length provided to us is
* > 65535, use the provided length as the length.
*/
if (ulen == 0 && length > 65535)
ulen = length;
ND_ICHECKMSG_ZU("undersized-udplength", ulen, <,
sizeof(struct udphdr));
ulen -= sizeof(struct udphdr);
1999-10-08 07:47:09 +08:00
length -= sizeof(struct udphdr);
if (ulen < length)
length = ulen;
1999-10-08 07:47:09 +08:00
2015-04-27 08:24:42 +08:00
cp = (const u_char *)(up + 1);
if (ndo->ndo_packettype) {
const struct sunrpc_msg *rp;
enum sunrpc_msg_type direction;
1999-10-08 07:47:09 +08:00
switch (ndo->ndo_packettype) {
1999-10-08 07:47:09 +08:00
case PT_VAT:
vat_print(ndo, cp, length);
1999-10-08 07:47:09 +08:00
break;
case PT_WB:
wb_print(ndo, cp, length);
1999-10-08 07:47:09 +08:00
break;
case PT_RPC:
rp = (const struct sunrpc_msg *)cp;
direction = (enum sunrpc_msg_type) GET_BE_U_4(rp->rm_direction);
if (direction == SUNRPC_CALL)
sunrpc_print(ndo, (const u_char *)rp, length,
2015-04-27 08:24:42 +08:00
(const u_char *)ip);
1999-10-08 07:47:09 +08:00
else
2015-04-27 08:24:42 +08:00
nfsreply_print(ndo, (const u_char *)rp, length,
(const u_char *)ip); /*XXX*/
1999-10-08 07:47:09 +08:00
break;
case PT_RTP:
rtp_print(ndo, cp, length);
1999-10-08 07:47:09 +08:00
break;
case PT_RTCP:
while (cp < ep)
cp = rtcp_print(ndo, cp);
1999-10-08 07:47:09 +08:00
break;
1999-10-18 05:37:10 +08:00
case PT_SNMP:
snmp_print(ndo, cp, length);
1999-10-18 05:37:10 +08:00
break;
case PT_CNFP:
cnfp_print(ndo, cp);
break;
case PT_TFTP:
tftp_print(ndo, cp, length);
break;
case PT_AODV:
aodv_print(ndo, cp, length,
ip6 != NULL);
break;
case PT_RADIUS:
radius_print(ndo, cp, length);
break;
case PT_VXLAN:
vxlan_print(ndo, cp, length);
break;
case PT_PGM:
case PT_PGM_ZMTP1:
pgm_print(ndo, cp, length, bp2);
break;
case PT_LMP:
lmp_print(ndo, cp, length);
break;
case PT_PTP:
ptp_print(ndo, cp, length);
break;
2020-02-18 23:38:16 +08:00
case PT_SOMEIP:
someip_print(ndo, cp, length);
break;
case PT_DOMAIN:
/* over_tcp: FALSE, is_mdns: FALSE */
domain_print(ndo, cp, length, FALSE, FALSE);
break;
2021-10-01 09:34:46 +08:00
case PT_QUIC:
quic_print(ndo, cp, length);
break;
1999-10-08 07:47:09 +08:00
}
return;
}
if (!ndo->ndo_qflag) {
const struct sunrpc_msg *rp;
enum sunrpc_msg_type direction;
1999-10-08 07:47:09 +08:00
rp = (const struct sunrpc_msg *)cp;
if (ND_TTEST_4(rp->rm_direction)) {
direction = (enum sunrpc_msg_type) GET_BE_U_4(rp->rm_direction);
if (dport == NFS_PORT && direction == SUNRPC_CALL) {
ND_PRINT("NFS request xid %u ",
GET_BE_U_4(rp->rm_xid));
nfsreq_noaddr_print(ndo, (const u_char *)rp, length,
2015-04-27 08:24:42 +08:00
(const u_char *)ip);
1999-10-08 07:47:09 +08:00
return;
}
if (sport == NFS_PORT && direction == SUNRPC_REPLY) {
ND_PRINT("NFS reply xid %u ",
GET_BE_U_4(rp->rm_xid));
nfsreply_noaddr_print(ndo, (const u_char *)rp, length,
2015-04-27 08:24:42 +08:00
(const u_char *)ip);
1999-10-08 07:47:09 +08:00
return;
}
#ifdef notdef
if (dport == SUNRPC_PORT && direction == SUNRPC_CALL) {
sunrpc_print((const u_char *)rp, length, (const u_char *)ip);
1999-10-08 07:47:09 +08:00
return;
}
#endif
}
}
if (ndo->ndo_vflag && !ndo->ndo_Kflag && !fragmented) {
/* Check the checksum, if possible. */
uint16_t sum;
/*
* XXX - do this even if vflag == 1?
* TCP does, and we do so for UDP-over-IPv6.
*/
if (IP_V(ip) == 4 && (ndo->ndo_vflag > 1)) {
if (udp_sum == 0) {
2018-01-07 18:47:30 +08:00
ND_PRINT("[no cksum] ");
} else if (ND_TTEST_LEN(cp, length)) {
2014-03-26 19:47:29 +08:00
sum = udp_cksum(ndo, ip, up, length + sizeof(struct udphdr));
if (sum != 0) {
2018-01-07 18:47:30 +08:00
ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ",
udp_sum,
2018-01-07 18:47:30 +08:00
in_cksum_shouldbe(udp_sum, sum));
} else
2018-01-07 18:47:30 +08:00
ND_PRINT("[udp sum ok] ");
}
2000-08-02 01:36:49 +08:00
}
else if (IP_V(ip) == 6) {
/* for IPv6, UDP checksum is mandatory */
if (ND_TTEST_LEN(cp, length)) {
sum = udp6_cksum(ndo, ip6, up, length + sizeof(struct udphdr));
if (sum != 0) {
2018-01-07 18:47:30 +08:00
ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ",
udp_sum,
2018-01-07 18:47:30 +08:00
in_cksum_shouldbe(udp_sum, sum));
} else
2018-01-07 18:47:30 +08:00
ND_PRINT("[udp sum ok] ");
}
2000-08-02 01:36:49 +08:00
}
}
2000-08-02 01:36:49 +08:00
if (!ndo->ndo_qflag) {
if (IS_SRC_OR_DST_PORT(NAMESERVER_PORT))
/* over_tcp: FALSE, is_mdns: FALSE */
domain_print(ndo, cp, length, FALSE, FALSE);
else if (IS_SRC_OR_DST_PORT(MULTICASTDNS_PORT))
/* over_tcp: FALSE, is_mdns: TRUE */
domain_print(ndo, cp, length, FALSE, TRUE);
else if (IS_SRC_OR_DST_PORT(TIMED_PORT))
timed_print(ndo, (const u_char *)cp);
else if (IS_SRC_OR_DST_PORT(TFTP_PORT))
tftp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(BOOTPC_PORT) || IS_SRC_OR_DST_PORT(BOOTPS_PORT))
bootp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(RIP_PORT))
rip_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(AODV_PORT))
aodv_print(ndo, cp, length,
ip6 != NULL);
else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT))
isakmp_print(ndo, cp, length, bp2);
else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_NATT))
isakmp_rfc3948_print(ndo, cp, length, bp2, IP_V(ip), fragmented, ttl_hl);
else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER1) || IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER2))
isakmp_print(ndo, cp, length, bp2);
else if (IS_SRC_OR_DST_PORT(SNMP_PORT) || IS_SRC_OR_DST_PORT(SNMPTRAP_PORT))
snmp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(NTP_PORT))
ntp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(KERBEROS_PORT) || IS_SRC_OR_DST_PORT(KERBEROS_SEC_PORT))
krb_print(ndo, (const u_char *)cp);
else if (IS_SRC_OR_DST_PORT(L2TP_PORT))
l2tp_print(ndo, cp, length);
#ifdef ENABLE_SMB
else if (IS_SRC_OR_DST_PORT(NETBIOS_NS_PORT))
nbt_udp137_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(NETBIOS_DGRAM_PORT))
nbt_udp138_print(ndo, cp, length);
#endif
2013-04-03 19:08:17 +08:00
else if (dport == VAT_PORT)
vat_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(ZEPHYR_SRV_PORT) || IS_SRC_OR_DST_PORT(ZEPHYR_CLT_PORT))
zephyr_print(ndo, cp, length);
2002-06-12 01:08:37 +08:00
/*
* Since there are 10 possible ports to check, I think
* a <> test would be more efficient
*/
else if ((sport >= RX_PORT_LOW && sport <= RX_PORT_HIGH) ||
(dport >= RX_PORT_LOW && dport <= RX_PORT_HIGH))
rx_print(ndo, cp, length, sport, dport,
2015-04-27 08:24:42 +08:00
(const u_char *) ip);
else if (IS_SRC_OR_DST_PORT(RIPNG_PORT))
ripng_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(DHCP6_SERV_PORT) || IS_SRC_OR_DST_PORT(DHCP6_CLI_PORT))
dhcp6_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(AHCP_PORT))
ahcp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(BABEL_PORT) || IS_SRC_OR_DST_PORT(BABEL_PORT_OLD))
babel_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(HNCP_PORT))
hncp_print(ndo, cp, length);
1999-10-08 07:47:09 +08:00
/*
* Kludge in test for whiteboard packets.
*/
2013-04-03 19:08:17 +08:00
else if (dport == WB_PORT)
wb_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(CISCO_AUTORP_PORT))
cisco_autorp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(RADIUS_PORT) ||
IS_SRC_OR_DST_PORT(RADIUS_NEW_PORT) ||
IS_SRC_OR_DST_PORT(RADIUS_ACCOUNTING_PORT) ||
IS_SRC_OR_DST_PORT(RADIUS_NEW_ACCOUNTING_PORT) ||
IS_SRC_OR_DST_PORT(RADIUS_CISCO_COA_PORT) ||
IS_SRC_OR_DST_PORT(RADIUS_COA_PORT) )
radius_print(ndo, cp, length);
else if (dport == HSRP_PORT)
hsrp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(LWRES_PORT))
lwres_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(LDP_PORT))
ldp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(OLSR_PORT))
olsr_print(ndo, cp, length,
(IP_V(ip) == 6) ? 1 : 0);
else if (IS_SRC_OR_DST_PORT(MPLS_LSP_PING_PORT))
lspping_print(ndo, cp, length);
else if (sport == BCM_LI_PORT)
bcm_li_print(ndo, cp, length);
else if (dport == BFD_CONTROL_PORT ||
dport == BFD_MULTIHOP_PORT ||
dport == BFD_LAG_PORT ||
dport == SBFD_PORT ||
dport == BFD_ECHO_PORT )
bfd_print(ndo, cp, length, dport);
else if (sport == SBFD_PORT)
bfd_print(ndo, cp, length, sport);
else if (IS_SRC_OR_DST_PORT(LMP_PORT))
lmp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(VQP_PORT))
vqp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(SFLOW_PORT))
sflow_print(ndo, cp, length);
else if (dport == LWAPP_CONTROL_PORT)
lwapp_control_print(ndo, cp, length, 1);
else if (sport == LWAPP_CONTROL_PORT)
lwapp_control_print(ndo, cp, length, 0);
else if (IS_SRC_OR_DST_PORT(LWAPP_DATA_PORT))
lwapp_data_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(SIP_PORT))
sip_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(SYSLOG_PORT))
syslog_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(OTV_PORT))
otv_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(VXLAN_PORT))
vxlan_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(GENEVE_PORT))
geneve_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(LISP_CONTROL_PORT))
lisp_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(VXLAN_GPE_PORT))
vxlan_gpe_print(ndo, cp, length);
else if (IS_SRC_OR_DST_PORT(ZEP_PORT))
zep_print(ndo, cp, length);
2020-02-09 03:25:38 +08:00
else if (IS_SRC_OR_DST_PORT(MPLS_PORT))
mpls_print(ndo, cp, length);
else if ((atalk_port(sport) || atalk_port(dport)) &&
GET_U_1(((const struct LAP *)cp)->type) == lapDDP) {
if (ndo->ndo_vflag)
2018-01-07 18:47:30 +08:00
ND_PRINT("kip ");
llap_print(ndo, cp, length);
} else if (IS_SRC_OR_DST_PORT(PTP_EVENT_PORT) ||
IS_SRC_OR_DST_PORT(PTP_GENERAL_PORT)) {
ptp_print(ndo, cp, length);
} else if (IS_SRC_OR_DST_PORT(SOMEIP_PORT))
someip_print(ndo, cp, length);
2021-10-01 09:34:46 +08:00
else if (IS_SRC_OR_DST_PORT(HTTPS_PORT) &&
quic_detect(ndo, cp, length))
quic_print(ndo, cp, length);
else {
if (ulen > length && !fragmented)
2018-01-07 18:47:30 +08:00
ND_PRINT("UDP, bad length %u > %u",
ulen, length);
else
2018-01-07 18:47:30 +08:00
ND_PRINT("UDP, length %u", ulen);
}
} else {
if (ulen > length && !fragmented)
2018-01-07 18:47:30 +08:00
ND_PRINT("UDP, bad length %u > %u",
ulen, length);
1999-10-08 07:47:09 +08:00
else
2018-01-07 18:47:30 +08:00
ND_PRINT("UDP, length %u", ulen);
}
return;
invalid:
nd_print_invalid(ndo);
1999-10-08 07:47:09 +08:00
}