xref: /dragonfly/contrib/tcpdump/print-udp.c (revision ed775ee7)
1 /*
2  * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that: (1) source code distributions
7  * retain the above copyright notice and this paragraph in its entirety, (2)
8  * distributions including binary code include the above copyright notice and
9  * this paragraph in its entirety in the documentation or other materials
10  * provided with the distribution, and (3) all advertising materials mentioning
11  * features or use of this software display the following acknowledgement:
12  * ``This product includes software developed by the University of California,
13  * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14  * the University nor the names of its contributors may be used to endorse
15  * or promote products derived from this software without specific prior
16  * written permission.
17  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18  * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20  */
21 
22 /* \summary: UDP printer */
23 
24 #ifdef HAVE_CONFIG_H
25 #include <config.h>
26 #endif
27 
28 #include "netdissect-stdinc.h"
29 
30 #include "netdissect.h"
31 #include "addrtoname.h"
32 #include "extract.h"
33 #include "appletalk.h"
34 
35 #include "udp.h"
36 
37 #include "ip.h"
38 #include "ip6.h"
39 #include "ipproto.h"
40 #include "rpc_auth.h"
41 #include "rpc_msg.h"
42 
43 #include "nfs.h"
44 
45 
46 struct rtcphdr {
47 	nd_uint16_t rh_flags;	/* T:2 P:1 CNT:5 PT:8 */
48 	nd_uint16_t rh_len;	/* length of message (in words) */
49 	nd_uint32_t rh_ssrc;	/* synchronization src id */
50 };
51 
52 typedef struct {
53 	nd_uint32_t upper;	/* more significant 32 bits */
54 	nd_uint32_t lower;	/* less significant 32 bits */
55 } ntp64;
56 
57 /*
58  * Sender report.
59  */
60 struct rtcp_sr {
61 	ntp64       sr_ntp;	/* 64-bit ntp timestamp */
62 	nd_uint32_t sr_ts;	/* reference media timestamp */
63 	nd_uint32_t sr_np;	/* no. packets sent */
64 	nd_uint32_t sr_nb;	/* no. bytes sent */
65 };
66 
67 /*
68  * Receiver report.
69  * Time stamps are middle 32-bits of ntp timestamp.
70  */
71 struct rtcp_rr {
72 	nd_uint32_t rr_srcid;	/* sender being reported */
73 	nd_uint32_t rr_nl;	/* no. packets lost */
74 	nd_uint32_t rr_ls;	/* extended last seq number received */
75 	nd_uint32_t rr_dv;	/* jitter (delay variance) */
76 	nd_uint32_t rr_lsr;	/* orig. ts from last rr from this src  */
77 	nd_uint32_t rr_dlsr;	/* time from recpt of last rr to xmit time */
78 };
79 
80 /*XXX*/
81 #define RTCP_PT_SR	200
82 #define RTCP_PT_RR	201
83 #define RTCP_PT_SDES	202
84 #define 	RTCP_SDES_CNAME	1
85 #define 	RTCP_SDES_NAME	2
86 #define 	RTCP_SDES_EMAIL	3
87 #define 	RTCP_SDES_PHONE	4
88 #define 	RTCP_SDES_LOC	5
89 #define 	RTCP_SDES_TOOL	6
90 #define 	RTCP_SDES_NOTE	7
91 #define 	RTCP_SDES_PRIV	8
92 #define RTCP_PT_BYE	203
93 #define RTCP_PT_APP	204
94 
95 static void
vat_print(netdissect_options * ndo,const u_char * hdr,u_int length)96 vat_print(netdissect_options *ndo, const u_char *hdr, u_int length)
97 {
98 	/* vat/vt audio */
99 	u_int ts;
100 
101 	ndo->ndo_protocol = "vat";
102 	if (length < 2) {
103 		ND_PRINT("udp/va/vat, length %u < 2", length);
104 		return;
105 	}
106 	ts = GET_BE_U_2(hdr);
107 	if ((ts & 0xf060) != 0) {
108 		/* probably vt */
109 		ND_PRINT("udp/vt %u %u / %u",
110 			     length,
111 			     ts & 0x3ff, ts >> 10);
112 	} else {
113 		/* probably vat */
114 		uint32_t i0, i1;
115 
116 		if (length < 8) {
117 			ND_PRINT("udp/vat, length %u < 8", length);
118 			return;
119 		}
120 		i0 = GET_BE_U_4(&((const u_int *)hdr)[0]);
121 		i1 = GET_BE_U_4(&((const u_int *)hdr)[1]);
122 		ND_PRINT("udp/vat %u c%u %u%s",
123 			length - 8,
124 			i0 & 0xffff,
125 			i1, i0 & 0x800000? "*" : "");
126 		/* audio format */
127 		if (i0 & 0x1f0000)
128 			ND_PRINT(" f%u", (i0 >> 16) & 0x1f);
129 		if (i0 & 0x3f000000)
130 			ND_PRINT(" s%u", (i0 >> 24) & 0x3f);
131 	}
132 }
133 
134 static void
rtp_print(netdissect_options * ndo,const u_char * hdr,u_int len)135 rtp_print(netdissect_options *ndo, const u_char *hdr, u_int len)
136 {
137 	/* rtp v1 or v2 */
138 	const u_int *ip = (const u_int *)hdr;
139 	u_int hasopt, hasext, contype, hasmarker, dlen;
140 	uint32_t i0, i1;
141 	const char * ptype;
142 
143 	ndo->ndo_protocol = "rtp";
144 	if (len < 8) {
145 		ND_PRINT("udp/rtp, length %u < 8", len);
146 		return;
147 	}
148 	i0 = GET_BE_U_4(&((const u_int *)hdr)[0]);
149 	i1 = GET_BE_U_4(&((const u_int *)hdr)[1]);
150 	dlen = len - 8;
151 	ip += 2;
152 	len >>= 2;
153 	len -= 2;
154 	hasopt = 0;
155 	hasext = 0;
156 	if ((i0 >> 30) == 1) {
157 		/* rtp v1 - draft-ietf-avt-rtp-04 */
158 		hasopt = i0 & 0x800000;
159 		contype = (i0 >> 16) & 0x3f;
160 		hasmarker = i0 & 0x400000;
161 		ptype = "rtpv1";
162 	} else {
163 		/* rtp v2 - RFC 3550 */
164 		if (dlen < 4) {
165 			ND_PRINT("udp/rtp, length %u < 12", dlen + 8);
166 			return;
167 		}
168 		hasext = i0 & 0x10000000;
169 		contype = (i0 >> 16) & 0x7f;
170 		hasmarker = i0 & 0x800000;
171 		dlen -= 4;
172 		ptype = "rtp";
173 		ip += 1;
174 		len -= 1;
175 	}
176 	ND_PRINT("udp/%s %u c%u %s%s %u %u",
177 		ptype,
178 		dlen,
179 		contype,
180 		(hasopt || hasext)? "+" : "",
181 		hasmarker? "*" : "",
182 		i0 & 0xffff,
183 		i1);
184 	if (ndo->ndo_vflag) {
185 		ND_PRINT(" %u", GET_BE_U_4(&((const u_int *)hdr)[2]));
186 		if (hasopt) {
187 			u_int i2, optlen;
188 			do {
189 				i2 = GET_BE_U_4(ip);
190 				optlen = (i2 >> 16) & 0xff;
191 				if (optlen == 0 || optlen > len) {
192 					ND_PRINT(" !opt");
193 					return;
194 				}
195 				ip += optlen;
196 				len -= optlen;
197 			} while ((int)i2 >= 0);
198 		}
199 		if (hasext) {
200 			u_int i2, extlen;
201 			i2 = GET_BE_U_4(ip);
202 			extlen = (i2 & 0xffff) + 1;
203 			if (extlen > len) {
204 				ND_PRINT(" !ext");
205 				return;
206 			}
207 			ip += extlen;
208 		}
209 		if (contype == 0x1f) /*XXX H.261 */
210 			ND_PRINT(" 0x%04x", GET_BE_U_4(ip) >> 16);
211 	}
212 }
213 
214 static const u_char *
rtcp_print(netdissect_options * ndo,const u_char * hdr,const u_char * ep)215 rtcp_print(netdissect_options *ndo, const u_char *hdr, const u_char *ep)
216 {
217 	/* rtp v2 control (rtcp) */
218 	const struct rtcp_rr *rr = 0;
219 	const struct rtcp_sr *sr;
220 	const struct rtcphdr *rh = (const struct rtcphdr *)hdr;
221 	u_int len;
222 	uint16_t flags;
223 	u_int cnt;
224 	double ts, dts;
225 
226 	ndo->ndo_protocol = "rtcp";
227 	if ((const u_char *)(rh + 1) > ep)
228 		goto trunc;
229 	ND_TCHECK_SIZE(rh);
230 	len = (GET_BE_U_2(rh->rh_len) + 1) * 4;
231 	flags = GET_BE_U_2(rh->rh_flags);
232 	cnt = (flags >> 8) & 0x1f;
233 	switch (flags & 0xff) {
234 	case RTCP_PT_SR:
235 		sr = (const struct rtcp_sr *)(rh + 1);
236 		ND_PRINT(" sr");
237 		if (len != cnt * sizeof(*rr) + sizeof(*sr) + sizeof(*rh))
238 			ND_PRINT(" [%u]", len);
239 		if (ndo->ndo_vflag)
240 			ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
241 		if ((const u_char *)(sr + 1) > ep)
242 			goto trunc;
243 		ND_TCHECK_SIZE(sr);
244 		ts = (double)(GET_BE_U_4(sr->sr_ntp.upper)) +
245 		    ((double)(GET_BE_U_4(sr->sr_ntp.lower)) /
246 		     FMAXINT);
247 		ND_PRINT(" @%.2f %u %up %ub", ts, GET_BE_U_4(sr->sr_ts),
248 			  GET_BE_U_4(sr->sr_np), GET_BE_U_4(sr->sr_nb));
249 		rr = (const struct rtcp_rr *)(sr + 1);
250 		break;
251 	case RTCP_PT_RR:
252 		ND_PRINT(" rr");
253 		if (len != cnt * sizeof(*rr) + sizeof(*rh))
254 			ND_PRINT(" [%u]", len);
255 		rr = (const struct rtcp_rr *)(rh + 1);
256 		if (ndo->ndo_vflag)
257 			ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
258 		break;
259 	case RTCP_PT_SDES:
260 		ND_PRINT(" sdes %u", len);
261 		if (ndo->ndo_vflag)
262 			ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
263 		cnt = 0;
264 		break;
265 	case RTCP_PT_BYE:
266 		ND_PRINT(" bye %u", len);
267 		if (ndo->ndo_vflag)
268 			ND_PRINT(" %u", GET_BE_U_4(rh->rh_ssrc));
269 		cnt = 0;
270 		break;
271 	default:
272 		ND_PRINT(" type-0x%x %u", flags & 0xff, len);
273 		cnt = 0;
274 		break;
275 	}
276 	if (cnt > 1)
277 		ND_PRINT(" c%u", cnt);
278 	while (cnt != 0) {
279 		if ((const u_char *)(rr + 1) > ep)
280 			goto trunc;
281 		ND_TCHECK_SIZE(rr);
282 		if (ndo->ndo_vflag)
283 			ND_PRINT(" %u", GET_BE_U_4(rr->rr_srcid));
284 		ts = (double)(GET_BE_U_4(rr->rr_lsr)) / 65536.;
285 		dts = (double)(GET_BE_U_4(rr->rr_dlsr)) / 65536.;
286 		ND_PRINT(" %ul %us %uj @%.2f+%.2f",
287 		    GET_BE_U_4(rr->rr_nl) & 0x00ffffff,
288 		    GET_BE_U_4(rr->rr_ls),
289 		    GET_BE_U_4(rr->rr_dv), ts, dts);
290 		cnt--;
291 	}
292 	return (hdr + len);
293 
294 trunc:
295 	nd_print_trunc(ndo);
296 	return ep;
297 }
298 
udp_cksum(netdissect_options * ndo,const struct ip * ip,const struct udphdr * up,u_int len)299 static uint16_t udp_cksum(netdissect_options *ndo, const struct ip *ip,
300 		     const struct udphdr *up,
301 		     u_int len)
302 {
303 	return nextproto4_cksum(ndo, ip, (const uint8_t *)(const void *)up, len, len,
304 				IPPROTO_UDP);
305 }
306 
udp6_cksum(netdissect_options * ndo,const struct ip6_hdr * ip6,const struct udphdr * up,u_int len)307 static uint16_t udp6_cksum(netdissect_options *ndo, const struct ip6_hdr *ip6,
308 		      const struct udphdr *up, u_int len)
309 {
310 	return nextproto6_cksum(ndo, ip6, (const uint8_t *)(const void *)up, len, len,
311 				IPPROTO_UDP);
312 }
313 
314 static void
udpipaddr_print(netdissect_options * ndo,const struct ip * ip,int sport,int dport)315 udpipaddr_print(netdissect_options *ndo, const struct ip *ip, int sport, int dport)
316 {
317 	const struct ip6_hdr *ip6;
318 
319 	if (IP_V(ip) == 6)
320 		ip6 = (const struct ip6_hdr *)ip;
321 	else
322 		ip6 = NULL;
323 
324 	if (ip6) {
325 		if (GET_U_1(ip6->ip6_nxt) == IPPROTO_UDP) {
326 			if (sport == -1) {
327 				ND_PRINT("%s > %s: ",
328 					GET_IP6ADDR_STRING(ip6->ip6_src),
329 					GET_IP6ADDR_STRING(ip6->ip6_dst));
330 			} else {
331 				ND_PRINT("%s.%s > %s.%s: ",
332 					GET_IP6ADDR_STRING(ip6->ip6_src),
333 					udpport_string(ndo, (uint16_t)sport),
334 					GET_IP6ADDR_STRING(ip6->ip6_dst),
335 					udpport_string(ndo, (uint16_t)dport));
336 			}
337 		} else {
338 			if (sport != -1) {
339 				ND_PRINT("%s > %s: ",
340 					udpport_string(ndo, (uint16_t)sport),
341 					udpport_string(ndo, (uint16_t)dport));
342 			}
343 		}
344 	} else {
345 		if (GET_U_1(ip->ip_p) == IPPROTO_UDP) {
346 			if (sport == -1) {
347 				ND_PRINT("%s > %s: ",
348 					GET_IPADDR_STRING(ip->ip_src),
349 					GET_IPADDR_STRING(ip->ip_dst));
350 			} else {
351 				ND_PRINT("%s.%s > %s.%s: ",
352 					GET_IPADDR_STRING(ip->ip_src),
353 					udpport_string(ndo, (uint16_t)sport),
354 					GET_IPADDR_STRING(ip->ip_dst),
355 					udpport_string(ndo, (uint16_t)dport));
356 			}
357 		} else {
358 			if (sport != -1) {
359 				ND_PRINT("%s > %s: ",
360 					udpport_string(ndo, (uint16_t)sport),
361 					udpport_string(ndo, (uint16_t)dport));
362 			}
363 		}
364 	}
365 }
366 
367 void
udp_print(netdissect_options * ndo,const u_char * bp,u_int length,const u_char * bp2,int fragmented,u_int ttl_hl)368 udp_print(netdissect_options *ndo, const u_char *bp, u_int length,
369 	  const u_char *bp2, int fragmented, u_int ttl_hl)
370 {
371 	const struct udphdr *up;
372 	const struct ip *ip;
373 	const u_char *cp;
374 	const u_char *ep = ndo->ndo_snapend;
375 	uint16_t sport, dport;
376 	u_int ulen;
377 	const struct ip6_hdr *ip6;
378 
379 	ndo->ndo_protocol = "udp";
380 	up = (const struct udphdr *)bp;
381 	ip = (const struct ip *)bp2;
382 	if (IP_V(ip) == 6)
383 		ip6 = (const struct ip6_hdr *)bp2;
384 	else
385 		ip6 = NULL;
386 	if (!ND_TTEST_2(up->uh_dport)) {
387 		udpipaddr_print(ndo, ip, -1, -1);
388 		goto trunc;
389 	}
390 
391 	sport = GET_BE_U_2(up->uh_sport);
392 	dport = GET_BE_U_2(up->uh_dport);
393 
394 	if (length < sizeof(struct udphdr)) {
395 		udpipaddr_print(ndo, ip, sport, dport);
396 		ND_PRINT("truncated-udp %u", length);
397 		return;
398 	}
399 	if (!ND_TTEST_2(up->uh_ulen)) {
400 		udpipaddr_print(ndo, ip, sport, dport);
401 		goto trunc;
402 	}
403 	ulen = GET_BE_U_2(up->uh_ulen);
404 	/*
405 	 * IPv6 Jumbo Datagrams; see RFC 2675.
406 	 * If the length is zero, and the length provided to us is
407 	 * > 65535, use the provided length as the length.
408 	 */
409 	if (ulen == 0 && length > 65535)
410 		ulen = length;
411 	if (ulen < sizeof(struct udphdr)) {
412 		udpipaddr_print(ndo, ip, sport, dport);
413 		ND_PRINT("truncated-udplength %u", ulen);
414 		return;
415 	}
416 	ulen -= sizeof(struct udphdr);
417 	length -= sizeof(struct udphdr);
418 	if (ulen < length)
419 		length = ulen;
420 
421 	cp = (const u_char *)(up + 1);
422 	if (cp > ndo->ndo_snapend) {
423 		udpipaddr_print(ndo, ip, sport, dport);
424 		goto trunc;
425 	}
426 
427 	if (ndo->ndo_packettype) {
428 		const struct sunrpc_msg *rp;
429 		enum sunrpc_msg_type direction;
430 
431 		switch (ndo->ndo_packettype) {
432 
433 		case PT_VAT:
434 			udpipaddr_print(ndo, ip, sport, dport);
435 			vat_print(ndo, cp, length);
436 			break;
437 
438 		case PT_WB:
439 			udpipaddr_print(ndo, ip, sport, dport);
440 			wb_print(ndo, cp, length);
441 			break;
442 
443 		case PT_RPC:
444 			rp = (const struct sunrpc_msg *)cp;
445 			direction = (enum sunrpc_msg_type) GET_BE_U_4(rp->rm_direction);
446 			if (direction == SUNRPC_CALL)
447 				sunrpc_print(ndo, (const u_char *)rp, length,
448 				    (const u_char *)ip);
449 			else
450 				nfsreply_print(ndo, (const u_char *)rp, length,
451 				    (const u_char *)ip);			/*XXX*/
452 			break;
453 
454 		case PT_RTP:
455 			udpipaddr_print(ndo, ip, sport, dport);
456 			rtp_print(ndo, cp, length);
457 			break;
458 
459 		case PT_RTCP:
460 			udpipaddr_print(ndo, ip, sport, dport);
461 			while (cp < ep)
462 				cp = rtcp_print(ndo, cp, ep);
463 			break;
464 
465 		case PT_SNMP:
466 			udpipaddr_print(ndo, ip, sport, dport);
467 			snmp_print(ndo, cp, length);
468 			break;
469 
470 		case PT_CNFP:
471 			udpipaddr_print(ndo, ip, sport, dport);
472 			cnfp_print(ndo, cp);
473 			break;
474 
475 		case PT_TFTP:
476 			udpipaddr_print(ndo, ip, sport, dport);
477 			tftp_print(ndo, cp, length);
478 			break;
479 
480 		case PT_AODV:
481 			udpipaddr_print(ndo, ip, sport, dport);
482 			aodv_print(ndo, cp, length,
483 			    ip6 != NULL);
484 			break;
485 
486 		case PT_RADIUS:
487 			udpipaddr_print(ndo, ip, sport, dport);
488 			radius_print(ndo, cp, length);
489 			break;
490 
491 		case PT_VXLAN:
492 			udpipaddr_print(ndo, ip, sport, dport);
493 			vxlan_print(ndo, cp, length);
494 			break;
495 
496 		case PT_PGM:
497 		case PT_PGM_ZMTP1:
498 			udpipaddr_print(ndo, ip, sport, dport);
499 			pgm_print(ndo, cp, length, bp2);
500 			break;
501 		case PT_LMP:
502 			udpipaddr_print(ndo, ip, sport, dport);
503 			lmp_print(ndo, cp, length);
504 			break;
505 		case PT_PTP:
506 			udpipaddr_print(ndo, ip, sport, dport);
507 			ptp_print(ndo, cp, length);
508 			break;
509 		case PT_SOMEIP:
510 			udpipaddr_print(ndo, ip, sport, dport);
511 			someip_print(ndo, cp, length);
512 			break;
513 		case PT_DOMAIN:
514 			udpipaddr_print(ndo, ip, sport, dport);
515 			/* over_tcp: FALSE, is_mdns: FALSE */
516 			domain_print(ndo, cp, length, FALSE, FALSE);
517 			break;
518 		}
519 		return;
520 	}
521 
522 	udpipaddr_print(ndo, ip, sport, dport);
523 	if (!ndo->ndo_qflag) {
524 		const struct sunrpc_msg *rp;
525 		enum sunrpc_msg_type direction;
526 
527 		rp = (const struct sunrpc_msg *)cp;
528 		if (ND_TTEST_4(rp->rm_direction)) {
529 			direction = (enum sunrpc_msg_type) GET_BE_U_4(rp->rm_direction);
530 			if (dport == NFS_PORT && direction == SUNRPC_CALL) {
531 				ND_PRINT("NFS request xid %u ",
532 					 GET_BE_U_4(rp->rm_xid));
533 				nfsreq_noaddr_print(ndo, (const u_char *)rp, length,
534 				    (const u_char *)ip);
535 				return;
536 			}
537 			if (sport == NFS_PORT && direction == SUNRPC_REPLY) {
538 				ND_PRINT("NFS reply xid %u ",
539 					 GET_BE_U_4(rp->rm_xid));
540 				nfsreply_noaddr_print(ndo, (const u_char *)rp, length,
541 				    (const u_char *)ip);
542 				return;
543 			}
544 #ifdef notdef
545 			if (dport == SUNRPC_PORT && direction == SUNRPC_CALL) {
546 				sunrpc_print((const u_char *)rp, length, (const u_char *)ip);
547 				return;
548 			}
549 #endif
550 		}
551 	}
552 
553 	if (ndo->ndo_vflag && !ndo->ndo_Kflag && !fragmented) {
554 		/* Check the checksum, if possible. */
555 		uint16_t sum, udp_sum;
556 
557 		/*
558 		 * XXX - do this even if vflag == 1?
559 		 * TCP does, and we do so for UDP-over-IPv6.
560 		 */
561 		if (IP_V(ip) == 4 && (ndo->ndo_vflag > 1)) {
562 			udp_sum = GET_BE_U_2(up->uh_sum);
563 			if (udp_sum == 0) {
564 				ND_PRINT("[no cksum] ");
565 			} else if (ND_TTEST_LEN(cp, length)) {
566 				sum = udp_cksum(ndo, ip, up, length + sizeof(struct udphdr));
567 
568 				if (sum != 0) {
569 					ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ",
570 					    udp_sum,
571 					    in_cksum_shouldbe(udp_sum, sum));
572 				} else
573 					ND_PRINT("[udp sum ok] ");
574 			}
575 		}
576 		else if (IP_V(ip) == 6) {
577 			/* for IPv6, UDP checksum is mandatory */
578 			if (ND_TTEST_LEN(cp, length)) {
579 				sum = udp6_cksum(ndo, ip6, up, length + sizeof(struct udphdr));
580 				udp_sum = GET_BE_U_2(up->uh_sum);
581 
582 				if (sum != 0) {
583 					ND_PRINT("[bad udp cksum 0x%04x -> 0x%04x!] ",
584 					    udp_sum,
585 					    in_cksum_shouldbe(udp_sum, sum));
586 				} else
587 					ND_PRINT("[udp sum ok] ");
588 			}
589 		}
590 	}
591 
592 	if (!ndo->ndo_qflag) {
593 		if (IS_SRC_OR_DST_PORT(NAMESERVER_PORT))
594 			/* over_tcp: FALSE, is_mdns: FALSE */
595 			domain_print(ndo, cp, length, FALSE, FALSE);
596 		else if (IS_SRC_OR_DST_PORT(MULTICASTDNS_PORT))
597 			/* over_tcp: FALSE, is_mdns: TRUE */
598 			domain_print(ndo, cp, length, FALSE, TRUE);
599 		else if (IS_SRC_OR_DST_PORT(TIMED_PORT))
600 			timed_print(ndo, (const u_char *)cp);
601 		else if (IS_SRC_OR_DST_PORT(TFTP_PORT))
602 			tftp_print(ndo, cp, length);
603 		else if (IS_SRC_OR_DST_PORT(BOOTPC_PORT) || IS_SRC_OR_DST_PORT(BOOTPS_PORT))
604 			bootp_print(ndo, cp, length);
605 		else if (IS_SRC_OR_DST_PORT(RIP_PORT))
606 			rip_print(ndo, cp, length);
607 		else if (IS_SRC_OR_DST_PORT(AODV_PORT))
608 			aodv_print(ndo, cp, length,
609 			    ip6 != NULL);
610 		else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT))
611 			 isakmp_print(ndo, cp, length, bp2);
612 		else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_NATT))
613 			 isakmp_rfc3948_print(ndo, cp, length, bp2, IP_V(ip), fragmented, ttl_hl);
614 		else if (IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER1) || IS_SRC_OR_DST_PORT(ISAKMP_PORT_USER2))
615 			isakmp_print(ndo, cp, length, bp2);
616 		else if (IS_SRC_OR_DST_PORT(SNMP_PORT) || IS_SRC_OR_DST_PORT(SNMPTRAP_PORT))
617 			snmp_print(ndo, cp, length);
618 		else if (IS_SRC_OR_DST_PORT(NTP_PORT))
619 			ntp_print(ndo, cp, length);
620 		else if (IS_SRC_OR_DST_PORT(KERBEROS_PORT) || IS_SRC_OR_DST_PORT(KERBEROS_SEC_PORT))
621 			krb_print(ndo, (const u_char *)cp);
622 		else if (IS_SRC_OR_DST_PORT(L2TP_PORT))
623 			l2tp_print(ndo, cp, length);
624 #ifdef ENABLE_SMB
625 		else if (IS_SRC_OR_DST_PORT(NETBIOS_NS_PORT))
626 			nbt_udp137_print(ndo, cp, length);
627 		else if (IS_SRC_OR_DST_PORT(NETBIOS_DGRAM_PORT))
628 			nbt_udp138_print(ndo, cp, length);
629 #endif
630 		else if (dport == VAT_PORT)
631 			vat_print(ndo, cp, length);
632 		else if (IS_SRC_OR_DST_PORT(ZEPHYR_SRV_PORT) || IS_SRC_OR_DST_PORT(ZEPHYR_CLT_PORT))
633 			zephyr_print(ndo, cp, length);
634 		/*
635 		 * Since there are 10 possible ports to check, I think
636 		 * a <> test would be more efficient
637 		 */
638 		else if ((sport >= RX_PORT_LOW && sport <= RX_PORT_HIGH) ||
639 			 (dport >= RX_PORT_LOW && dport <= RX_PORT_HIGH))
640 			rx_print(ndo, cp, length, sport, dport,
641 				 (const u_char *) ip);
642 		else if (IS_SRC_OR_DST_PORT(RIPNG_PORT))
643 			ripng_print(ndo, cp, length);
644 		else if (IS_SRC_OR_DST_PORT(DHCP6_SERV_PORT) || IS_SRC_OR_DST_PORT(DHCP6_CLI_PORT))
645 			dhcp6_print(ndo, cp, length);
646 		else if (IS_SRC_OR_DST_PORT(AHCP_PORT))
647 			ahcp_print(ndo, cp, length);
648 		else if (IS_SRC_OR_DST_PORT(BABEL_PORT) || IS_SRC_OR_DST_PORT(BABEL_PORT_OLD))
649 			babel_print(ndo, cp, length);
650 		else if (IS_SRC_OR_DST_PORT(HNCP_PORT))
651 			hncp_print(ndo, cp, length);
652 		/*
653 		 * Kludge in test for whiteboard packets.
654 		 */
655 		else if (dport == WB_PORT)
656 			wb_print(ndo, cp, length);
657 		else if (IS_SRC_OR_DST_PORT(CISCO_AUTORP_PORT))
658 			cisco_autorp_print(ndo, cp, length);
659 		else if (IS_SRC_OR_DST_PORT(RADIUS_PORT) ||
660 			 IS_SRC_OR_DST_PORT(RADIUS_NEW_PORT) ||
661 			 IS_SRC_OR_DST_PORT(RADIUS_ACCOUNTING_PORT) ||
662 			 IS_SRC_OR_DST_PORT(RADIUS_NEW_ACCOUNTING_PORT) ||
663 			 IS_SRC_OR_DST_PORT(RADIUS_CISCO_COA_PORT) ||
664 			 IS_SRC_OR_DST_PORT(RADIUS_COA_PORT) )
665 			radius_print(ndo, cp, length);
666 		else if (dport == HSRP_PORT)
667 			hsrp_print(ndo, cp, length);
668 		else if (IS_SRC_OR_DST_PORT(LWRES_PORT))
669 			lwres_print(ndo, cp, length);
670 		else if (IS_SRC_OR_DST_PORT(LDP_PORT))
671 			ldp_print(ndo, cp, length);
672 		else if (IS_SRC_OR_DST_PORT(OLSR_PORT))
673 			olsr_print(ndo, cp, length,
674 					(IP_V(ip) == 6) ? 1 : 0);
675 		else if (IS_SRC_OR_DST_PORT(MPLS_LSP_PING_PORT))
676 			lspping_print(ndo, cp, length);
677 		else if (sport == BCM_LI_PORT)
678 			bcm_li_print(ndo, cp, length);
679 		else if (dport == BFD_CONTROL_PORT ||
680 			 dport == BFD_MULTIHOP_PORT ||
681 			 dport == BFD_LAG_PORT ||
682 			 dport == BFD_ECHO_PORT )
683 			bfd_print(ndo, cp, length, dport);
684 		else if (IS_SRC_OR_DST_PORT(LMP_PORT))
685 			lmp_print(ndo, cp, length);
686 		else if (IS_SRC_OR_DST_PORT(VQP_PORT))
687 			vqp_print(ndo, cp, length);
688 		else if (IS_SRC_OR_DST_PORT(SFLOW_PORT))
689 			sflow_print(ndo, cp, length);
690 		else if (dport == LWAPP_CONTROL_PORT)
691 			lwapp_control_print(ndo, cp, length, 1);
692 		else if (sport == LWAPP_CONTROL_PORT)
693 			lwapp_control_print(ndo, cp, length, 0);
694 		else if (IS_SRC_OR_DST_PORT(LWAPP_DATA_PORT))
695 			lwapp_data_print(ndo, cp, length);
696 		else if (IS_SRC_OR_DST_PORT(SIP_PORT))
697 			sip_print(ndo, cp, length);
698 		else if (IS_SRC_OR_DST_PORT(SYSLOG_PORT))
699 			syslog_print(ndo, cp, length);
700 		else if (IS_SRC_OR_DST_PORT(OTV_PORT))
701 			otv_print(ndo, cp, length);
702 		else if (IS_SRC_OR_DST_PORT(VXLAN_PORT))
703 			vxlan_print(ndo, cp, length);
704 		else if (IS_SRC_OR_DST_PORT(GENEVE_PORT))
705 			geneve_print(ndo, cp, length);
706 		else if (IS_SRC_OR_DST_PORT(LISP_CONTROL_PORT))
707 			lisp_print(ndo, cp, length);
708 		else if (IS_SRC_OR_DST_PORT(VXLAN_GPE_PORT))
709 			vxlan_gpe_print(ndo, cp, length);
710 		else if (IS_SRC_OR_DST_PORT(ZEP_PORT))
711 			zep_print(ndo, cp, length);
712 		else if (IS_SRC_OR_DST_PORT(MPLS_PORT))
713 			mpls_print(ndo, cp, length);
714 		else if (ND_TTEST_1(((const struct LAP *)cp)->type) &&
715 			 GET_U_1(((const struct LAP *)cp)->type) == lapDDP &&
716 			 (atalk_port(sport) || atalk_port(dport))) {
717 			if (ndo->ndo_vflag)
718 				ND_PRINT("kip ");
719 			llap_print(ndo, cp, length);
720 		} else if (IS_SRC_OR_DST_PORT(PTP_EVENT_PORT) ||
721 			IS_SRC_OR_DST_PORT(PTP_GENERAL_PORT)) {
722 			ptp_print(ndo, cp, length);
723 		} else if (IS_SRC_OR_DST_PORT(SOMEIP_PORT))
724 			someip_print(ndo, cp, length);
725 		else {
726 			if (ulen > length && !fragmented)
727 				ND_PRINT("UDP, bad length %u > %u",
728 				    ulen, length);
729 			else
730 				ND_PRINT("UDP, length %u", ulen);
731 		}
732 	} else {
733 		if (ulen > length && !fragmented)
734 			ND_PRINT("UDP, bad length %u > %u",
735 			    ulen, length);
736 		else
737 			ND_PRINT("UDP, length %u", ulen);
738 	}
739 	return;
740 
741 trunc:
742 	nd_print_trunc(ndo);
743 }
744