2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 /* \summary: UDP printer */
28 #include "netdissect-stdinc.h"
30 #include "netdissect.h"
31 #include "addrtoname.h"
33 #include "appletalk.h"
47 nd_uint16_t rh_flags; /* T:2 P:1 CNT:5 PT:8 */
48 nd_uint16_t rh_len; /* length of message (in words) */
49 nd_uint32_t rh_ssrc; /* synchronization src id */
53 nd_uint32_t upper; /* more significant 32 bits */
54 nd_uint32_t lower; /* less significant 32 bits */
61 ntp64 sr_ntp; /* 64-bit ntp timestamp */
62 nd_uint32_t sr_ts; /* reference media timestamp */
63 nd_uint32_t sr_np; /* no. packets sent */
64 nd_uint32_t sr_nb; /* no. bytes sent */
69 * Time stamps are middle 32-bits of ntp timestamp.
72 nd_uint32_t rr_srcid; /* sender being reported */
73 nd_uint32_t rr_nl; /* no. packets lost */
74 nd_uint32_t rr_ls; /* extended last seq number received */
75 nd_uint32_t rr_dv; /* jitter (delay variance) */
76 nd_uint32_t rr_lsr; /* orig. ts from last rr from this src */
77 nd_uint32_t rr_dlsr; /* time from recpt of last rr to xmit time */
81 #define RTCP_PT_SR 200
82 #define RTCP_PT_RR 201
83 #define RTCP_PT_SDES 202
84 #define RTCP_SDES_CNAME 1
85 #define RTCP_SDES_NAME 2
86 #define RTCP_SDES_EMAIL 3
87 #define RTCP_SDES_PHONE 4
88 #define RTCP_SDES_LOC 5
89 #define RTCP_SDES_TOOL 6
90 #define RTCP_SDES_NOTE 7
91 #define RTCP_SDES_PRIV 8
92 #define RTCP_PT_BYE 203
93 #define RTCP_PT_APP 204
96 vat_print(netdissect_options *ndo, const u_char *hdr, u_int length)
101 ndo->ndo_protocol = "vat";
103 ND_PRINT("udp/va/vat, length %u < 2", length);
106 ts = GET_BE_U_2(hdr);
107 if ((ts & 0xf060) != 0) {
109 ND_PRINT("udp/vt %u %u / %u",
111 ts & 0x3ff, ts >> 10);
117 ND_PRINT("udp/vat, length %u < 8", length);
120 i0 = GET_BE_U_4(&((const u_int *)hdr)[0]);
121 i1 = GET_BE_U_4(&((const u_int *)hdr)[1]);
122 ND_PRINT("udp/vat %u c%u %u%s",
125 i1, i0 & 0x800000? "*" : "");
128 ND_PRINT(" f%u", (i0 >> 16) & 0x1f);
130 ND_PRINT(" s%u", (i0 >> 24) & 0x3f);
135 rtp_print(netdissect_options *ndo, const u_char *hdr, u_int len)
138 const u_int *ip = (const u_int *)hdr;
139 u_int hasopt, hasext, contype, hasmarker, dlen;
143 ndo->ndo_protocol = "rtp";
145 ND_PRINT("udp/rtp, length %u < 8", len);
148 i0 = GET_BE_U_4(&((const u_int *)hdr)[0]);
149 i1 = GET_BE_U_4(&((const u_int *)hdr)[1]);
156 if ((i0 >> 30) == 1) {
157 /* rtp v1 - draft-ietf-avt-rtp-04 */
158 hasopt = i0 & 0x800000;
159 contype = (i0 >> 16) & 0x3f;
160 hasmarker = i0 & 0x400000;
163 /* rtp v2 - RFC 3550 */
165 ND_PRINT("udp/rtp, length %u < 12", dlen + 8);
168 hasext = i0 & 0x10000000;
169 contype = (i0 >> 16) & 0x7f;
170 hasmarker = i0 & 0x800000;
176 ND_PRINT("udp/%s %u c%u %s%s %u %u",
180 (hasopt || hasext)? "+" : "",
184 if (ndo->ndo_vflag) {
185 ND_PRINT(" %u", GET_BE_U_4(&((const u_int *)hdr)[2]));
190 optlen = (i2 >> 16) & 0xff;
191 if (optlen == 0 || optlen > len) {
197 } while ((int)i2 >= 0);
202 extlen = (i2 & 0xffff) + 1;
209 if (contype == 0x1f) /*XXX H.261 */
210 ND_PRINT(" 0x%04x", GET_BE_U_4(ip) >> 16);
214 static const u_char *
215 rtcp_print(netdissect_options *ndo, const u_char *hdr, const u_char *ep)
217 /* rtp v2 control (rtcp) */
218 const struct rtcp_rr *rr = 0;
219 const struct rtcp_sr *sr;
220 const struct rtcphdr *rh = (const struct rtcphdr *)hdr;
226 ndo->ndo_protocol = "rtcp";
227 if ((const u_char *)(rh + 1) > ep)
230 len = (GET_BE_U_2(rh->rh_len) + 1) * 4;
231 flags = GET_BE_U_2(rh->rh_flags);
232 cnt = (flags >> 8) & 0x1f;
233 switch (flags & 0xff) {
235 sr = (const struct rtcp_sr *)(rh + 1);
237 if (len != cnt * sizeof(*rr) + sizeof(*sr) + sizeof(*rh))
238 ND_PRINT(" [%u]", len);
240 ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
241 if ((const u_char *)(sr + 1) > ep)
244 ts = (double)(GET_BE_U_4(sr->sr_ntp.upper)) +
245 ((double)(GET_BE_U_4(sr->sr_ntp.lower)) /
247 ND_PRINT(" @%.2f %u %up %ub", ts, GET_BE_U_4(sr->sr_ts),
248 GET_BE_U_4(sr->sr_np), GET_BE_U_4(sr->sr_nb));
249 rr = (const struct rtcp_rr *)(sr + 1);
253 if (len != cnt * sizeof(*rr) + sizeof(*rh))
254 ND_PRINT(" [%u]", len);
255 rr = (const struct rtcp_rr *)(rh + 1);
257 ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
260 ND_PRINT(" sdes %u", len);
262 ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
266 ND_PRINT(" bye %u", len);
268 ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
272 ND_PRINT(" type-0x%x %u", flags & 0xff, len);
277 ND_PRINT(" c%u", cnt);
279 if ((const u_char *)(rr + 1) > ep)
283 ND_PRINT(" %u", GET_BE_U_4(rr->rr_srcid));
284 ts = (double)(GET_BE_U_4(rr->rr_lsr)) / 65536.;
285 dts = (double)(GET_BE_U_4(rr->rr_dlsr)) / 65536.;
286 ND_PRINT(" %ul %us %uj @%.2f+%.2f",
287 GET_BE_U_4(rr->rr_nl) & 0x00ffffff,
288 GET_BE_U_4(rr->rr_ls),
289 GET_BE_U_4(rr->rr_dv), ts, dts);
299 static uint16_t udp_cksum(netdissect_options *ndo, const struct ip *ip,
300 const struct udphdr *up,
303 return nextproto4_cksum(ndo, ip, (const uint8_t *)(const void *)up, len, len,
307 static uint16_t udp6_cksum(netdissect_options *ndo, const struct ip6_hdr *ip6,
308 const struct udphdr *up, u_int len)
310 return nextproto6_cksum(ndo, ip6, (const uint8_t *)(const void *)up, len, len,
315 udpipaddr_print(netdissect_options *ndo, const struct ip *ip, int sport, int dport)
317 const struct ip6_hdr *ip6;
320 ip6 = (const struct ip6_hdr *)ip;
325 if (GET_U_1(ip6->ip6_nxt) == IPPROTO_UDP) {
327 ND_PRINT("%s > %s: ",
328 GET_IP6ADDR_STRING(ip6->ip6_src),
329 GET_IP6ADDR_STRING(ip6->ip6_dst));
331 ND_PRINT("%s.%s > %s.%s: ",
332 GET_IP6ADDR_STRING(ip6->ip6_src),
333 udpport_string(ndo, (uint16_t)sport),
334 GET_IP6ADDR_STRING(ip6->ip6_dst),
335 udpport_string(ndo, (uint16_t)dport));
339 ND_PRINT("%s > %s: ",
340 udpport_string(ndo, (uint16_t)sport),
341 udpport_string(ndo, (uint16_t)dport));
345 if (GET_U_1(ip->ip_p) == IPPROTO_UDP) {
347 ND_PRINT("%s > %s: ",
348 GET_IPADDR_STRING(ip->ip_src),
349 GET_IPADDR_STRING(ip->ip_dst));
351 ND_PRINT("%s.%s > %s.%s: ",
352 GET_IPADDR_STRING(ip->ip_src),
353 udpport_string(ndo, (uint16_t)sport),
354 GET_IPADDR_STRING(ip->ip_dst),
355 udpport_string(ndo, (uint16_t)dport));
359 ND_PRINT("%s > %s: ",
360 udpport_string(ndo, (uint16_t)sport),
361 udpport_string(ndo, (uint16_t)dport));
368 udp_print(netdissect_options *ndo, const u_char *bp, u_int length,
369 const u_char *bp2, int fragmented, u_int ttl_hl)
371 const struct udphdr *up;
374 const u_char *ep = ndo->ndo_snapend;
375 uint16_t sport, dport;
377 const struct ip6_hdr *ip6;
379 ndo->ndo_protocol = "udp";
380 up = (const struct udphdr *)bp;
381 ip = (const struct ip *)bp2;
383 ip6 = (const struct ip6_hdr *)bp2;
386 if (!ND_TTEST_2(up->uh_dport)) {
387 udpipaddr_print(ndo, ip, -1, -1);
391 sport = GET_BE_U_2(up->uh_sport);
392 dport = GET_BE_U_2(up->uh_dport);
394 if (length < sizeof(struct udphdr)) {
395 udpipaddr_print(ndo, ip, sport, dport);
396 ND_PRINT("truncated-udp %u", length);
399 if (!ND_TTEST_2(up->uh_ulen)) {
400 udpipaddr_print(ndo, ip, sport, dport);
403 ulen = GET_BE_U_2(up->uh_ulen);
405 * IPv6 Jumbo Datagrams; see RFC 2675.
406 * If the length is zero, and the length provided to us is
407 * > 65535, use the provided length as the length.
409 if (ulen == 0 && length > 65535)
411 if (ulen < sizeof(struct udphdr)) {
412 udpipaddr_print(ndo, ip, sport, dport);
413 ND_PRINT("truncated-udplength %u", ulen);
416 ulen -= sizeof(struct udphdr);
417 length -= sizeof(struct udphdr);
421 cp = (const u_char *)(up + 1);
422 if (cp > ndo->ndo_snapend) {
423 udpipaddr_print(ndo, ip, sport, dport);
427 if (ndo->ndo_packettype) {
428 const struct sunrpc_msg *rp;
429 enum sunrpc_msg_type direction;
431 switch (ndo->ndo_packettype) {
434 udpipaddr_print(ndo, ip, sport, dport);
435 vat_print(ndo, cp, length);
439 udpipaddr_print(ndo, ip, sport, dport);
440 wb_print(ndo, cp, length);
444 rp = (const struct sunrpc_msg *)cp;
445 direction = (enum sunrpc_msg_type) GET_BE_U_4(rp->rm_direction);
446 if (direction == SUNRPC_CALL)
447 sunrpc_print(ndo, (const u_char *)rp, length,
450 nfsreply_print(ndo, (const u_char *)rp, length,
451 (const u_char *)ip); /*XXX*/
455 udpipaddr_print(ndo, ip, sport, dport);
456 rtp_print(ndo, cp, length);
460 udpipaddr_print(ndo, ip, sport, dport);
462 cp = rtcp_print(ndo, cp, ep);
466 udpipaddr_print(ndo, ip, sport, dport);
467 snmp_print(ndo, cp, length);
471 udpipaddr_print(ndo, ip, sport, dport);
476 udpipaddr_print(ndo, ip, sport, dport);
477 tftp_print(ndo, cp, length);
481 udpipaddr_print(ndo, ip, sport, dport);
482 aodv_print(ndo, cp, length,
487 udpipaddr_print(ndo, ip, sport, dport);
488 radius_print(ndo, cp, length);
492 udpipaddr_print(ndo, ip, sport, dport);
493 vxlan_print(ndo, cp, length);
498 udpipaddr_print(ndo, ip, sport, dport);
499 pgm_print(ndo, cp, length, bp2);
502 udpipaddr_print(ndo, ip, sport, dport);
503 lmp_print(ndo, cp, length);
506 udpipaddr_print(ndo, ip, sport, dport);
507 ptp_print(ndo, cp, length);
510 udpipaddr_print(ndo, ip, sport, dport);
511 someip_print(ndo, cp, length);
514 udpipaddr_print(ndo, ip, sport, dport);
515 /* over_tcp: FALSE, is_mdns: FALSE */
516 domain_print(ndo, cp, length, FALSE, FALSE);
522 udpipaddr_print(ndo, ip, sport, dport);
523 if (!ndo->ndo_qflag) {
524 const struct sunrpc_msg *rp;
525 enum sunrpc_msg_type direction;
527 rp = (const struct sunrpc_msg *)cp;
528 if (ND_TTEST_4(rp->rm_direction)) {
529 direction = (enum sunrpc_msg_type) GET_BE_U_4(rp->rm_direction);
530 if (dport == NFS_PORT && direction == SUNRPC_CALL) {
531 ND_PRINT("NFS request xid %u ",
532 GET_BE_U_4(rp->rm_xid));
533 nfsreq_noaddr_print(ndo, (const u_char *)rp, length,
537 if (sport == NFS_PORT && direction == SUNRPC_REPLY) {
538 ND_PRINT("NFS reply xid %u ",
539 GET_BE_U_4(rp->rm_xid));
540 nfsreply_noaddr_print(ndo, (const u_char *)rp, length,
545 if (dport == SUNRPC_PORT && direction == SUNRPC_CALL) {
546 sunrpc_print((const u_char *)rp, length, (const u_char *)ip);
553 if (ndo->ndo_vflag && !ndo->ndo_Kflag && !fragmented) {
554 /* Check the checksum, if possible. */
555 uint16_t sum, udp_sum;
558 * XXX - do this even if vflag == 1?
559 * TCP does, and we do so for UDP-over-IPv6.
561 if (IP_V(ip) == 4 && (ndo->ndo_vflag > 1)) {
562 udp_sum = GET_BE_U_2(up->uh_sum);
564 ND_PRINT("[no cksum] ");
565 } else if (ND_TTEST_LEN(cp, length)) {
566 sum = udp_cksum(ndo, ip, up, length + sizeof(struct udphdr));
569 ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ",
571 in_cksum_shouldbe(udp_sum, sum));
573 ND_PRINT("[udp sum ok] ");
576 else if (IP_V(ip) == 6) {
577 /* for IPv6, UDP checksum is mandatory */
578 if (ND_TTEST_LEN(cp, length)) {
579 sum = udp6_cksum(ndo, ip6, up, length + sizeof(struct udphdr));
580 udp_sum = GET_BE_U_2(up->uh_sum);
583 ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ",
585 in_cksum_shouldbe(udp_sum, sum));
587 ND_PRINT("[udp sum ok] ");
592 if (!ndo->ndo_qflag) {
593 if (IS_SRC_OR_DST_PORT(NAMESERVER_PORT))
594 /* over_tcp: FALSE, is_mdns: FALSE */
595 domain_print(ndo, cp, length, FALSE, FALSE);
596 else if (IS_SRC_OR_DST_PORT(MULTICASTDNS_PORT))
597 /* over_tcp: FALSE, is_mdns: TRUE */
598 domain_print(ndo, cp, length, FALSE, TRUE);
599 else if (IS_SRC_OR_DST_PORT(TIMED_PORT))
600 timed_print(ndo, (const u_char *)cp);
601 else if (IS_SRC_OR_DST_PORT(TFTP_PORT))
602 tftp_print(ndo, cp, length);
603 else if (IS_SRC_OR_DST_PORT(BOOTPC_PORT) || IS_SRC_OR_DST_PORT(BOOTPS_PORT))
604 bootp_print(ndo, cp, length);
605 else if (IS_SRC_OR_DST_PORT(RIP_PORT))
606 rip_print(ndo, cp, length);
607 else if (IS_SRC_OR_DST_PORT(AODV_PORT))
608 aodv_print(ndo, cp, length,
610 else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT))
611 isakmp_print(ndo, cp, length, bp2);
612 else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_NATT))
613 isakmp_rfc3948_print(ndo, cp, length, bp2, IP_V(ip), fragmented, ttl_hl);
614 else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER1) || IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER2))
615 isakmp_print(ndo, cp, length, bp2);
616 else if (IS_SRC_OR_DST_PORT(SNMP_PORT) || IS_SRC_OR_DST_PORT(SNMPTRAP_PORT))
617 snmp_print(ndo, cp, length);
618 else if (IS_SRC_OR_DST_PORT(NTP_PORT))
619 ntp_print(ndo, cp, length);
620 else if (IS_SRC_OR_DST_PORT(KERBEROS_PORT) || IS_SRC_OR_DST_PORT(KERBEROS_SEC_PORT))
621 krb_print(ndo, (const u_char *)cp);
622 else if (IS_SRC_OR_DST_PORT(L2TP_PORT))
623 l2tp_print(ndo, cp, length);
625 else if (IS_SRC_OR_DST_PORT(NETBIOS_NS_PORT))
626 nbt_udp137_print(ndo, cp, length);
627 else if (IS_SRC_OR_DST_PORT(NETBIOS_DGRAM_PORT))
628 nbt_udp138_print(ndo, cp, length);
630 else if (dport == VAT_PORT)
631 vat_print(ndo, cp, length);
632 else if (IS_SRC_OR_DST_PORT(ZEPHYR_SRV_PORT) || IS_SRC_OR_DST_PORT(ZEPHYR_CLT_PORT))
633 zephyr_print(ndo, cp, length);
635 * Since there are 10 possible ports to check, I think
636 * a <> test would be more efficient
638 else if ((sport >= RX_PORT_LOW && sport <= RX_PORT_HIGH) ||
639 (dport >= RX_PORT_LOW && dport <= RX_PORT_HIGH))
640 rx_print(ndo, cp, length, sport, dport,
641 (const u_char *) ip);
642 else if (IS_SRC_OR_DST_PORT(RIPNG_PORT))
643 ripng_print(ndo, cp, length);
644 else if (IS_SRC_OR_DST_PORT(DHCP6_SERV_PORT) || IS_SRC_OR_DST_PORT(DHCP6_CLI_PORT))
645 dhcp6_print(ndo, cp, length);
646 else if (IS_SRC_OR_DST_PORT(AHCP_PORT))
647 ahcp_print(ndo, cp, length);
648 else if (IS_SRC_OR_DST_PORT(BABEL_PORT) || IS_SRC_OR_DST_PORT(BABEL_PORT_OLD))
649 babel_print(ndo, cp, length);
650 else if (IS_SRC_OR_DST_PORT(HNCP_PORT))
651 hncp_print(ndo, cp, length);
653 * Kludge in test for whiteboard packets.
655 else if (dport == WB_PORT)
656 wb_print(ndo, cp, length);
657 else if (IS_SRC_OR_DST_PORT(CISCO_AUTORP_PORT))
658 cisco_autorp_print(ndo, cp, length);
659 else if (IS_SRC_OR_DST_PORT(RADIUS_PORT) ||
660 IS_SRC_OR_DST_PORT(RADIUS_NEW_PORT) ||
661 IS_SRC_OR_DST_PORT(RADIUS_ACCOUNTING_PORT) ||
662 IS_SRC_OR_DST_PORT(RADIUS_NEW_ACCOUNTING_PORT) ||
663 IS_SRC_OR_DST_PORT(RADIUS_CISCO_COA_PORT) ||
664 IS_SRC_OR_DST_PORT(RADIUS_COA_PORT) )
665 radius_print(ndo, cp, length);
666 else if (dport == HSRP_PORT)
667 hsrp_print(ndo, cp, length);
668 else if (IS_SRC_OR_DST_PORT(LWRES_PORT))
669 lwres_print(ndo, cp, length);
670 else if (IS_SRC_OR_DST_PORT(LDP_PORT))
671 ldp_print(ndo, cp, length);
672 else if (IS_SRC_OR_DST_PORT(OLSR_PORT))
673 olsr_print(ndo, cp, length,
674 (IP_V(ip) == 6) ? 1 : 0);
675 else if (IS_SRC_OR_DST_PORT(MPLS_LSP_PING_PORT))
676 lspping_print(ndo, cp, length);
677 else if (sport == BCM_LI_PORT)
678 bcm_li_print(ndo, cp, length);
679 else if (dport == BFD_CONTROL_PORT ||
680 dport == BFD_MULTIHOP_PORT ||
681 dport == BFD_LAG_PORT ||
682 dport == BFD_ECHO_PORT )
683 bfd_print(ndo, cp, length, dport);
684 else if (IS_SRC_OR_DST_PORT(LMP_PORT))
685 lmp_print(ndo, cp, length);
686 else if (IS_SRC_OR_DST_PORT(VQP_PORT))
687 vqp_print(ndo, cp, length);
688 else if (IS_SRC_OR_DST_PORT(SFLOW_PORT))
689 sflow_print(ndo, cp, length);
690 else if (dport == LWAPP_CONTROL_PORT)
691 lwapp_control_print(ndo, cp, length, 1);
692 else if (sport == LWAPP_CONTROL_PORT)
693 lwapp_control_print(ndo, cp, length, 0);
694 else if (IS_SRC_OR_DST_PORT(LWAPP_DATA_PORT))
695 lwapp_data_print(ndo, cp, length);
696 else if (IS_SRC_OR_DST_PORT(SIP_PORT))
697 sip_print(ndo, cp, length);
698 else if (IS_SRC_OR_DST_PORT(SYSLOG_PORT))
699 syslog_print(ndo, cp, length);
700 else if (IS_SRC_OR_DST_PORT(OTV_PORT))
701 otv_print(ndo, cp, length);
702 else if (IS_SRC_OR_DST_PORT(VXLAN_PORT))
703 vxlan_print(ndo, cp, length);
704 else if (IS_SRC_OR_DST_PORT(GENEVE_PORT))
705 geneve_print(ndo, cp, length);
706 else if (IS_SRC_OR_DST_PORT(LISP_CONTROL_PORT))
707 lisp_print(ndo, cp, length);
708 else if (IS_SRC_OR_DST_PORT(VXLAN_GPE_PORT))
709 vxlan_gpe_print(ndo, cp, length);
710 else if (IS_SRC_OR_DST_PORT(ZEP_PORT))
711 zep_print(ndo, cp, length);
712 else if (IS_SRC_OR_DST_PORT(MPLS_PORT))
713 mpls_print(ndo, cp, length);
714 else if (ND_TTEST_1(((const struct LAP *)cp)->type) &&
715 GET_U_1(((const struct LAP *)cp)->type) == lapDDP &&
716 (atalk_port(sport) || atalk_port(dport))) {
719 llap_print(ndo, cp, length);
720 } else if (IS_SRC_OR_DST_PORT(PTP_EVENT_PORT) ||
721 IS_SRC_OR_DST_PORT(PTP_GENERAL_PORT)) {
722 ptp_print(ndo, cp, length);
723 } else if (IS_SRC_OR_DST_PORT(SOMEIP_PORT))
724 someip_print(ndo, cp, length);
726 if (ulen > length && !fragmented)
727 ND_PRINT("UDP, bad length %u > %u",
730 ND_PRINT("UDP, length %u", ulen);
733 if (ulen > length && !fragmented)
734 ND_PRINT("UDP, bad length %u > %u",
737 ND_PRINT("UDP, length %u", ulen);