/* * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that: (1) source code distributions * retain the above copyright notice and this paragraph in its entirety, (2) * distributions including binary code include the above copyright notice and * this paragraph in its entirety in the documentation or other materials * provided with the distribution, and (3) all advertising materials mentioning * features or use of this software display the following acknowledgement: * ``This product includes software developed by the University of California, * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of * the University nor the names of its contributors may be used to endorse * or promote products derived from this software without specific prior * written permission. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. */ /* \summary: UDP printer */ #include #include "netdissect-stdinc.h" #include "netdissect.h" #include "addrtoname.h" #include "extract.h" #include "appletalk.h" #include "udp.h" #include "ip.h" #include "ip6.h" #include "ipproto.h" #include "rpc_auth.h" #include "rpc_msg.h" #include "nfs.h" struct rtcphdr { nd_uint16_t rh_flags; /* T:2 P:1 CNT:5 PT:8 */ nd_uint16_t rh_len; /* length of message (in words) */ nd_uint32_t rh_ssrc; /* synchronization src id */ }; typedef struct { nd_uint32_t upper; /* more significant 32 bits */ nd_uint32_t lower; /* less significant 32 bits */ } ntp64; /* * Sender report. */ struct rtcp_sr { ntp64 sr_ntp; /* 64-bit ntp timestamp */ nd_uint32_t sr_ts; /* reference media timestamp */ nd_uint32_t sr_np; /* no. packets sent */ nd_uint32_t sr_nb; /* no. bytes sent */ }; /* * Receiver report. * Time stamps are middle 32-bits of ntp timestamp. */ struct rtcp_rr { nd_uint32_t rr_srcid; /* sender being reported */ nd_uint32_t rr_nl; /* no. packets lost */ nd_uint32_t rr_ls; /* extended last seq number received */ nd_uint32_t rr_dv; /* jitter (delay variance) */ nd_uint32_t rr_lsr; /* orig. ts from last rr from this src */ nd_uint32_t rr_dlsr; /* time from recpt of last rr to xmit time */ }; /*XXX*/ #define RTCP_PT_SR 200 #define RTCP_PT_RR 201 #define RTCP_PT_SDES 202 #define RTCP_SDES_CNAME 1 #define RTCP_SDES_NAME 2 #define RTCP_SDES_EMAIL 3 #define RTCP_SDES_PHONE 4 #define RTCP_SDES_LOC 5 #define RTCP_SDES_TOOL 6 #define RTCP_SDES_NOTE 7 #define RTCP_SDES_PRIV 8 #define RTCP_PT_BYE 203 #define RTCP_PT_APP 204 static void vat_print(netdissect_options *ndo, const u_char *hdr, u_int length) { /* vat/vt audio */ u_int ts; ndo->ndo_protocol = "vat"; if (length < 2) { ND_PRINT("udp/va/vat, length %u < 2", length); return; } ts = GET_BE_U_2(hdr); if ((ts & 0xf060) != 0) { /* probably vt */ ND_PRINT("udp/vt %u %u / %u", length, ts & 0x3ff, ts >> 10); } else { /* probably vat */ uint32_t i0, i1; if (length < 8) { ND_PRINT("udp/vat, length %u < 8", length); return; } i0 = GET_BE_U_4(&((const u_int *)hdr)[0]); i1 = GET_BE_U_4(&((const u_int *)hdr)[1]); ND_PRINT("udp/vat %u c%u %u%s", length - 8, i0 & 0xffff, i1, i0 & 0x800000? "*" : ""); /* audio format */ if (i0 & 0x1f0000) ND_PRINT(" f%u", (i0 >> 16) & 0x1f); if (i0 & 0x3f000000) ND_PRINT(" s%u", (i0 >> 24) & 0x3f); } } static void rtp_print(netdissect_options *ndo, const u_char *hdr, u_int len) { /* rtp v1 or v2 */ const u_int *ip = (const u_int *)hdr; u_int hasopt, hasext, contype, hasmarker, dlen; uint32_t i0, i1; const char * ptype; ndo->ndo_protocol = "rtp"; if (len < 8) { ND_PRINT("udp/rtp, length %u < 8", len); return; } i0 = GET_BE_U_4(&((const u_int *)hdr)[0]); i1 = GET_BE_U_4(&((const u_int *)hdr)[1]); dlen = len - 8; ip += 2; len >>= 2; len -= 2; hasopt = 0; hasext = 0; if ((i0 >> 30) == 1) { /* rtp v1 - draft-ietf-avt-rtp-04 */ hasopt = i0 & 0x800000; contype = (i0 >> 16) & 0x3f; hasmarker = i0 & 0x400000; ptype = "rtpv1"; } else { /* rtp v2 - RFC 3550 */ if (dlen < 4) { ND_PRINT("udp/rtp, length %u < 12", dlen + 8); return; } hasext = i0 & 0x10000000; contype = (i0 >> 16) & 0x7f; hasmarker = i0 & 0x800000; dlen -= 4; ptype = "rtp"; ip += 1; len -= 1; } ND_PRINT("udp/%s %u c%u %s%s %u %u", ptype, dlen, contype, (hasopt || hasext)? "+" : "", hasmarker? "*" : "", i0 & 0xffff, i1); if (ndo->ndo_vflag) { ND_PRINT(" %u", GET_BE_U_4(&((const u_int *)hdr)[2])); if (hasopt) { u_int i2, optlen; do { i2 = GET_BE_U_4(ip); optlen = (i2 >> 16) & 0xff; if (optlen == 0 || optlen > len) { ND_PRINT(" !opt"); return; } ip += optlen; len -= optlen; } while ((int)i2 >= 0); } if (hasext) { u_int i2, extlen; i2 = GET_BE_U_4(ip); extlen = (i2 & 0xffff) + 1; if (extlen > len) { ND_PRINT(" !ext"); return; } ip += extlen; } if (contype == 0x1f) /*XXX H.261 */ ND_PRINT(" 0x%04x", GET_BE_U_4(ip) >> 16); } } static const u_char * rtcp_print(netdissect_options *ndo, const u_char *hdr) { /* rtp v2 control (rtcp) */ const struct rtcp_rr *rr = 0; const struct rtcp_sr *sr; const struct rtcphdr *rh = (const struct rtcphdr *)hdr; u_int len; uint16_t flags; uint32_t ssrc; u_int cnt; double ts, dts; ndo->ndo_protocol = "rtcp"; len = (GET_BE_U_2(rh->rh_len) + 1) * 4; flags = GET_BE_U_2(rh->rh_flags); cnt = (flags >> 8) & 0x1f; ssrc = GET_BE_U_4(rh->rh_ssrc); switch (flags & 0xff) { case RTCP_PT_SR: sr = (const struct rtcp_sr *)(rh + 1); ND_PRINT(" sr"); if (len != cnt * sizeof(*rr) + sizeof(*sr) + sizeof(*rh)) ND_PRINT(" [%u]", len); if (ndo->ndo_vflag) ND_PRINT(" %u", ssrc); ts = (double)(GET_BE_U_4(sr->sr_ntp.upper)) + ((double)(GET_BE_U_4(sr->sr_ntp.lower)) / FMAXINT); ND_PRINT(" @%.2f %u %up %ub", ts, GET_BE_U_4(sr->sr_ts), GET_BE_U_4(sr->sr_np), GET_BE_U_4(sr->sr_nb)); rr = (const struct rtcp_rr *)(sr + 1); break; case RTCP_PT_RR: ND_PRINT(" rr"); if (len != cnt * sizeof(*rr) + sizeof(*rh)) ND_PRINT(" [%u]", len); rr = (const struct rtcp_rr *)(rh + 1); if (ndo->ndo_vflag) ND_PRINT(" %u", ssrc); break; case RTCP_PT_SDES: ND_PRINT(" sdes %u", len); if (ndo->ndo_vflag) ND_PRINT(" %u", ssrc); cnt = 0; break; case RTCP_PT_BYE: ND_PRINT(" bye %u", len); if (ndo->ndo_vflag) ND_PRINT(" %u", ssrc); cnt = 0; break; default: ND_PRINT(" type-0x%x %u", flags & 0xff, len); cnt = 0; break; } if (cnt > 1) ND_PRINT(" c%u", cnt); while (cnt != 0) { if (ndo->ndo_vflag) ND_PRINT(" %u", GET_BE_U_4(rr->rr_srcid)); ts = (double)(GET_BE_U_4(rr->rr_lsr)) / 65536.; dts = (double)(GET_BE_U_4(rr->rr_dlsr)) / 65536.; ND_PRINT(" %ul %us %uj @%.2f+%.2f", GET_BE_U_4(rr->rr_nl) & 0x00ffffff, GET_BE_U_4(rr->rr_ls), GET_BE_U_4(rr->rr_dv), ts, dts); cnt--; } return (hdr + len); } static uint16_t udp_cksum(netdissect_options *ndo, const struct ip *ip, const struct udphdr *up, u_int len) { return nextproto4_cksum(ndo, ip, (const uint8_t *)(const void *)up, len, len, IPPROTO_UDP); } static uint16_t udp6_cksum(netdissect_options *ndo, const struct ip6_hdr *ip6, const struct udphdr *up, u_int len) { return nextproto6_cksum(ndo, ip6, (const uint8_t *)(const void *)up, len, len, IPPROTO_UDP); } static void udpipaddr_print(netdissect_options *ndo, const struct ip *ip, const uint16_t sport, const uint16_t dport) { const struct ip6_hdr *ip6 = (const struct ip6_hdr *)ip; if (IP_V(ip) == 4 && GET_U_1(ip->ip_p) == IPPROTO_UDP) { ND_PRINT("%s.%s > %s.%s: ", GET_IPADDR_STRING(ip->ip_src), udpport_string(ndo, sport), GET_IPADDR_STRING(ip->ip_dst), udpport_string(ndo, dport)); } else if (IP_V(ip) == 6 && GET_U_1(ip6->ip6_nxt) == IPPROTO_UDP) { ND_PRINT("%s.%s > %s.%s: ", GET_IP6ADDR_STRING(ip6->ip6_src), udpport_string(ndo, sport), GET_IP6ADDR_STRING(ip6->ip6_dst), udpport_string(ndo, dport)); } else ND_PRINT("%s > %s: ", udpport_string(ndo, sport), udpport_string(ndo, dport)); } static void udpipaddr_noport_print(netdissect_options *ndo, const struct ip *ip) { const struct ip6_hdr *ip6 = (const struct ip6_hdr *)ip; if (IP_V(ip) == 4 && GET_U_1(ip->ip_p) == IPPROTO_UDP) { ND_PRINT("%s > %s: ", GET_IPADDR_STRING(ip->ip_src), GET_IPADDR_STRING(ip->ip_dst)); } else if (IP_V(ip) == 6 && GET_U_1(ip6->ip6_nxt) == IPPROTO_UDP) { ND_PRINT("%s > %s: ", GET_IP6ADDR_STRING(ip6->ip6_src), GET_IP6ADDR_STRING(ip6->ip6_dst)); } } void udp_print(netdissect_options *ndo, const u_char *bp, u_int length, const u_char *bp2, int fragmented, u_int ttl_hl) { const struct udphdr *up; const struct ip *ip; const u_char *cp; const u_char *ep = ndo->ndo_snapend; uint16_t sport, dport; u_int ulen; uint16_t udp_sum; const struct ip6_hdr *ip6; ndo->ndo_protocol = "udp"; up = (const struct udphdr *)bp; ip = (const struct ip *)bp2; if (IP_V(ip) == 6) ip6 = (const struct ip6_hdr *)bp2; else ip6 = NULL; if (!ND_TTEST_2(up->uh_dport)) { udpipaddr_noport_print(ndo, ip); nd_trunc_longjmp(ndo); } sport = GET_BE_U_2(up->uh_sport); dport = GET_BE_U_2(up->uh_dport); if (ndo->ndo_packettype != PT_RPC) udpipaddr_print(ndo, ip, sport, dport); ND_ICHECKMSG_ZU("undersized-udp", length, <, sizeof(struct udphdr)); ulen = GET_BE_U_2(up->uh_ulen); udp_sum = GET_BE_U_2(up->uh_sum); /* * IPv6 Jumbo Datagrams; see RFC 2675. * If the length is zero, and the length provided to us is * > 65535, use the provided length as the length. */ if (ulen == 0 && length > 65535) ulen = length; ND_ICHECKMSG_ZU("undersized-udplength", ulen, <, sizeof(struct udphdr)); ulen -= sizeof(struct udphdr); length -= sizeof(struct udphdr); if (ulen < length) length = ulen; cp = (const u_char *)(up + 1); if (ndo->ndo_packettype) { const struct sunrpc_msg *rp; enum sunrpc_msg_type direction; switch (ndo->ndo_packettype) { case PT_VAT: vat_print(ndo, cp, length); break; case PT_WB: wb_print(ndo, cp, length); break; case PT_RPC: rp = (const struct sunrpc_msg *)cp; direction = (enum sunrpc_msg_type) GET_BE_U_4(rp->rm_direction); if (direction == SUNRPC_CALL) sunrpc_print(ndo, (const u_char *)rp, length, (const u_char *)ip); else nfsreply_print(ndo, (const u_char *)rp, length, (const u_char *)ip); /*XXX*/ break; case PT_RTP: rtp_print(ndo, cp, length); break; case PT_RTCP: while (cp < ep) cp = rtcp_print(ndo, cp); break; case PT_SNMP: snmp_print(ndo, cp, length); break; case PT_CNFP: cnfp_print(ndo, cp); break; case PT_TFTP: tftp_print(ndo, cp, length); break; case PT_AODV: aodv_print(ndo, cp, length, IP_V(ip) == 6); break; case PT_RADIUS: radius_print(ndo, cp, length); break; case PT_VXLAN: vxlan_print(ndo, cp, length); break; case PT_PGM: case PT_PGM_ZMTP1: pgm_print(ndo, cp, length, bp2); break; case PT_LMP: lmp_print(ndo, cp, length); break; case PT_PTP: ptp_print(ndo, cp, length); break; case PT_SOMEIP: someip_print(ndo, cp, length); break; case PT_DOMAIN: /* over_tcp: FALSE, is_mdns: FALSE */ domain_print(ndo, cp, length, FALSE, FALSE); break; case PT_QUIC: quic_print(ndo, cp); break; } return; } if (!ndo->ndo_qflag) { const struct sunrpc_msg *rp; enum sunrpc_msg_type direction; rp = (const struct sunrpc_msg *)cp; if (ND_TTEST_4(rp->rm_direction)) { direction = (enum sunrpc_msg_type) GET_BE_U_4(rp->rm_direction); if (dport == NFS_PORT && direction == SUNRPC_CALL) { ND_PRINT("NFS request xid %u ", GET_BE_U_4(rp->rm_xid)); nfsreq_noaddr_print(ndo, (const u_char *)rp, length, (const u_char *)ip); return; } if (sport == NFS_PORT && direction == SUNRPC_REPLY) { ND_PRINT("NFS reply xid %u ", GET_BE_U_4(rp->rm_xid)); nfsreply_noaddr_print(ndo, (const u_char *)rp, length, (const u_char *)ip); return; } #ifdef notdef if (dport == SUNRPC_PORT && direction == SUNRPC_CALL) { sunrpc_print((const u_char *)rp, length, (const u_char *)ip); return; } #endif } } if (ndo->ndo_vflag && !ndo->ndo_Kflag && !fragmented) { /* Check the checksum, if possible. */ uint16_t sum; /* * XXX - do this even if vflag == 1? * TCP does, and we do so for UDP-over-IPv6. */ if (IP_V(ip) == 4 && (ndo->ndo_vflag > 1)) { if (udp_sum == 0) { ND_PRINT("[no cksum] "); } else if (ND_TTEST_LEN(cp, length)) { sum = udp_cksum(ndo, ip, up, length + sizeof(struct udphdr)); if (sum != 0) { ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ", udp_sum, in_cksum_shouldbe(udp_sum, sum)); } else ND_PRINT("[udp sum ok] "); } } else if (IP_V(ip) == 6) { /* for IPv6, UDP checksum is mandatory */ if (ND_TTEST_LEN(cp, length)) { sum = udp6_cksum(ndo, ip6, up, length + sizeof(struct udphdr)); if (sum != 0) { ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ", udp_sum, in_cksum_shouldbe(udp_sum, sum)); } else ND_PRINT("[udp sum ok] "); } } } if (!ndo->ndo_qflag) { if (IS_SRC_OR_DST_PORT(NAMESERVER_PORT)) /* over_tcp: FALSE, is_mdns: FALSE */ domain_print(ndo, cp, length, FALSE, FALSE); else if (IS_SRC_OR_DST_PORT(BOOTPC_PORT) || IS_SRC_OR_DST_PORT(BOOTPS_PORT)) bootp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(TFTP_PORT)) tftp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(KERBEROS_PORT)) krb_print(ndo, (const u_char *)cp); else if (IS_SRC_OR_DST_PORT(NTP_PORT)) ntp_print(ndo, cp, length); #ifdef ENABLE_SMB else if (IS_SRC_OR_DST_PORT(NETBIOS_NS_PORT)) nbt_udp137_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(NETBIOS_DGRAM_PORT)) nbt_udp138_print(ndo, cp, length); #endif else if (IS_SRC_OR_DST_PORT(SNMP_PORT) || IS_SRC_OR_DST_PORT(SNMPTRAP_PORT)) snmp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(PTP_EVENT_PORT) || IS_SRC_OR_DST_PORT(PTP_GENERAL_PORT)) ptp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(CISCO_AUTORP_PORT)) cisco_autorp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT)) isakmp_print(ndo, cp, length, bp2); else if (IS_SRC_OR_DST_PORT(SYSLOG_PORT)) syslog_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(RIP_PORT)) rip_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(RIPNG_PORT)) ripng_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(TIMED_PORT)) timed_print(ndo, (const u_char *)cp); else if (IS_SRC_OR_DST_PORT(DHCP6_SERV_PORT) || IS_SRC_OR_DST_PORT(DHCP6_CLI_PORT)) dhcp6_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(LDP_PORT)) ldp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(AODV_PORT)) aodv_print(ndo, cp, length, IP_V(ip) == 6); else if (IS_SRC_OR_DST_PORT(OLSR_PORT)) olsr_print(ndo, cp, length, IP_V(ip) == 6); else if (IS_SRC_OR_DST_PORT(LMP_PORT)) lmp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(KERBEROS_SEC_PORT)) krb_print(ndo, (const u_char *)cp); else if (IS_SRC_OR_DST_PORT(LWRES_PORT)) lwres_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(MULTICASTDNS_PORT)) /* over_tcp: FALSE, is_mdns: TRUE */ domain_print(ndo, cp, length, FALSE, TRUE); else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_NATT)) isakmp_rfc3948_print(ndo, cp, length, bp2, IP_V(ip), fragmented, ttl_hl); else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER1) || IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER2)) isakmp_print(ndo, cp, length, bp2); else if (IS_SRC_OR_DST_PORT(L2TP_PORT)) l2tp_print(ndo, cp, length); else if (dport == VAT_PORT) vat_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(ZEPHYR_SRV_PORT) || IS_SRC_OR_DST_PORT(ZEPHYR_CLT_PORT)) zephyr_print(ndo, cp, length); /* * Since there are 10 possible ports to check, I think * a <> test would be more efficient */ else if ((sport >= RX_PORT_LOW && sport <= RX_PORT_HIGH) || (dport >= RX_PORT_LOW && dport <= RX_PORT_HIGH)) rx_print(ndo, cp, length, sport, dport, (const u_char *) ip); else if (IS_SRC_OR_DST_PORT(AHCP_PORT)) ahcp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(BABEL_PORT) || IS_SRC_OR_DST_PORT(BABEL_PORT_OLD)) babel_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(HNCP_PORT)) hncp_print(ndo, cp, length); /* * Kludge in test for whiteboard packets. */ else if (dport == WB_PORT) wb_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(RADIUS_PORT) || IS_SRC_OR_DST_PORT(RADIUS_NEW_PORT) || IS_SRC_OR_DST_PORT(RADIUS_ACCOUNTING_PORT) || IS_SRC_OR_DST_PORT(RADIUS_NEW_ACCOUNTING_PORT) || IS_SRC_OR_DST_PORT(RADIUS_CISCO_COA_PORT) || IS_SRC_OR_DST_PORT(RADIUS_COA_PORT) ) radius_print(ndo, cp, length); else if (dport == HSRP_PORT) hsrp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(MPLS_LSP_PING_PORT)) lspping_print(ndo, cp, length); else if (dport == BFD_CONTROL_PORT || dport == BFD_MULTIHOP_PORT || dport == BFD_LAG_PORT || dport == SBFD_PORT || dport == BFD_ECHO_PORT ) bfd_print(ndo, cp, length, dport); else if (sport == SBFD_PORT) bfd_print(ndo, cp, length, sport); else if (IS_SRC_OR_DST_PORT(VQP_PORT)) vqp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(SFLOW_PORT)) sflow_print(ndo, cp, length); else if (dport == LWAPP_CONTROL_PORT) lwapp_control_print(ndo, cp, length, 1); else if (sport == LWAPP_CONTROL_PORT) lwapp_control_print(ndo, cp, length, 0); else if (IS_SRC_OR_DST_PORT(LWAPP_DATA_PORT)) lwapp_data_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(SIP_PORT)) sip_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(OTV_PORT)) otv_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(VXLAN_PORT)) vxlan_print(ndo, cp, length); else if (dport == GENEVE_PORT) geneve_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(LISP_CONTROL_PORT)) lisp_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(VXLAN_GPE_PORT)) vxlan_gpe_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(ZEP_PORT)) zep_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(MPLS_PORT)) mpls_print(ndo, cp, length); else if ((atalk_port(sport) || atalk_port(dport)) && GET_U_1(((const struct LAP *)cp)->type) == lapDDP) { if (ndo->ndo_vflag) ND_PRINT("kip "); llap_print(ndo, cp, length); } else if (IS_SRC_OR_DST_PORT(SOMEIP_PORT)) someip_print(ndo, cp, length); else if (IS_SRC_OR_DST_PORT(HTTPS_PORT) && quic_detect(ndo, cp, length)) quic_print(ndo, cp); else if (sport == BCM_LI_PORT) bcm_li_print(ndo, cp, length); else { if (ulen > length && !fragmented) ND_PRINT("UDP, bad length %u > %u", ulen, length); else ND_PRINT("UDP, length %u", ulen); } } else { if (ulen > length && !fragmented) ND_PRINT("UDP, bad length %u > %u", ulen, length); else ND_PRINT("UDP, length %u", ulen); } return; invalid: nd_print_invalid(ndo); }