Ethereal-dev: [Ethereal-dev] [PATCH] Changes to PPP protocol
Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.
From: Burke Lau <burke_lau@xxxxxxxxxxx>
Date: Thu, 14 Dec 2000 12:10:36 +1100
I've made some changes to the ethereal PPP protocol decodes and thought they would be useful to include back in the main CVS source tree. Attached are the patch files to add/modify the PPP protocol to have the following features: * FCS 32 and FCS 16 Checking of the ppp packets, selectable in the Preferences dialog * PPP can handle the CISCO HDLC format * MPLS decode over PPP support has also been added. I'm behind a firewall so I've been working with the 0.8.14 version and had to do a diff with the version 0.8.14 Burke. -- Burke Lau Email: burke_lau@xxxxxxxxxxx Advanced Networks Division Voice: +61 3 9210-5533 Agilent Technologies Fax : +61 3 9210-5550 347 Burwood Hwy. WWW : http://www.agilent.com Forest Hill, Vic, 3131, Australia
--- packet-ppp.c Mon Nov 20 15:36:14 2000 +++ ../changed/packet-ppp.c Thu Dec 14 11:56:23 2000 @@ -33,6 +33,7 @@ #endif #include <glib.h> +#include "prefs.h" #include "packet.h" #include "packet-ppp.h" #include "ppptypes.h" @@ -72,6 +73,12 @@ static int ett_mp = -1; static int ett_mp_flags = -1; +/* options */ +static gint ppp_fcs_decode = 0; /* 0 = No FCS, 1 = 16 bit FCS, 2 = 32 bit FCS */ +#define NO_FCS 0 +#define FCS_16 1 +#define FCS_32 2 + /* PPP structs and definitions */ typedef struct _e_ppphdr { @@ -99,6 +106,10 @@ {PPP_LQR, "Link Quality Report protocol" }, {PPP_CHAP, "Cryptographic Handshake Auth. Protocol" }, {PPP_CBCP, "Callback Control Protocol" }, + {PPP_MPLS_UNI, "MPLS Uni-cast"}, + {PPP_MPLS_MULTI, "MPLS Multi-cast"}, + {CISCO_IP, "CISCO HDLC IP"}, + {CISCO_SLARP, "CISCO HDLC SLARP"}, {0, NULL } }; @@ -501,10 +512,161 @@ #define N_IPCP_OPTS (sizeof ipcp_opts / sizeof ipcp_opts[0]) +const unsigned int fcstab_32[256] = + { + 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, + 0x076dc419, 0x706af48f, 0xe963a535, 0x9e6495a3, + 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988, + 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, + 0x1db71064, 0x6ab020f2, 0xf3b97148, 0x84be41de, + 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7, + 0x136c9856, 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, + 0x14015c4f, 0x63066cd9, 0xfa0f3d63, 0x8d080df5, + 0x3b6e20c8, 0x4c69105e, 0xd56041e4, 0xa2677172, + 0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b, + 0x35b5a8fa, 0x42b2986c, 0xdbbbc9d6, 0xacbcf940, + 0x32d86ce3, 0x45df5c75, 0xdcd60dcf, 0xabd13d59, + 0x26d930ac, 0x51de003a, 0xc8d75180, 0xbfd06116, + 0x21b4f4b5, 0x56b3c423, 0xcfba9599, 0xb8bda50f, + 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924, + 0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, + 0x76dc4190, 0x01db7106, 0x98d220bc, 0xefd5102a, + 0x71b18589, 0x06b6b51f, 0x9fbfe4a5, 0xe8b8d433, + 0x7807c9a2, 0x0f00f934, 0x9609a88e, 0xe10e9818, + 0x7f6a0dbb, 0x086d3d2d, 0x91646c97, 0xe6635c01, + 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e, + 0x6c0695ed, 0x1b01a57b, 0x8208f4c1, 0xf50fc457, + 0x65b0d9c6, 0x12b7e950, 0x8bbeb8ea, 0xfcb9887c, + 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, 0xfbd44c65, + 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, + 0x4adfa541, 0x3dd895d7, 0xa4d1c46d, 0xd3d6f4fb, + 0x4369e96a, 0x346ed9fc, 0xad678846, 0xda60b8d0, + 0x44042d73, 0x33031de5, 0xaa0a4c5f, 0xdd0d7cc9, + 0x5005713c, 0x270241aa, 0xbe0b1010, 0xc90c2086, + 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f, + 0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, + 0x59b33d17, 0x2eb40d81, 0xb7bd5c3b, 0xc0ba6cad, + 0xedb88320, 0x9abfb3b6, 0x03b6e20c, 0x74b1d29a, + 0xead54739, 0x9dd277af, 0x04db2615, 0x73dc1683, + 0xe3630b12, 0x94643b84, 0x0d6d6a3e, 0x7a6a5aa8, + 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1, + 0xf00f9344, 0x8708a3d2, 0x1e01f268, 0x6906c2fe, + 0xf762575d, 0x806567cb, 0x196c3671, 0x6e6b06e7, + 0xfed41b76, 0x89d32be0, 0x10da7a5a, 0x67dd4acc, + 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, + 0xd6d6a3e8, 0xa1d1937e, 0x38d8c2c4, 0x4fdff252, + 0xd1bb67f1, 0xa6bc5767, 0x3fb506dd, 0x48b2364b, + 0xd80d2bda, 0xaf0a1b4c, 0x36034af6, 0x41047a60, + 0xdf60efc3, 0xa867df55, 0x316e8eef, 0x4669be79, + 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236, + 0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, + 0xc5ba3bbe, 0xb2bd0b28, 0x2bb45a92, 0x5cb36a04, + 0xc2d7ffa7, 0xb5d0cf31, 0x2cd99e8b, 0x5bdeae1d, + 0x9b64c2b0, 0xec63f226, 0x756aa39c, 0x026d930a, + 0x9c0906a9, 0xeb0e363f, 0x72076785, 0x05005713, + 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38, + 0x92d28e9b, 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, + 0x86d3d2d4, 0xf1d4e242, 0x68ddb3f8, 0x1fda836e, + 0x81be16cd, 0xf6b9265b, 0x6fb077e1, 0x18b74777, + 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, + 0x8f659eff, 0xf862ae69, 0x616bffd3, 0x166ccf45, + 0xa00ae278, 0xd70dd2ee, 0x4e048354, 0x3903b3c2, + 0xa7672661, 0xd06016f7, 0x4969474d, 0x3e6e77db, + 0xaed16a4a, 0xd9d65adc, 0x40df0b66, 0x37d83bf0, + 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9, + 0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, + 0xbad03605, 0xcdd70693, 0x54de5729, 0x23d967bf, + 0xb3667a2e, 0xc4614ab8, 0x5d681b02, 0x2a6f2b94, + 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d + }; + +const unsigned short fcstab_16[256] = { + 0x0000, 0x1189, 0x2312, 0x329b, 0x4624, 0x57ad, 0x6536, 0x74bf, + 0x8c48, 0x9dc1, 0xaf5a, 0xbed3, 0xca6c, 0xdbe5, 0xe97e, 0xf8f7, + 0x1081, 0x0108, 0x3393, 0x221a, 0x56a5, 0x472c, 0x75b7, 0x643e, + 0x9cc9, 0x8d40, 0xbfdb, 0xae52, 0xdaed, 0xcb64, 0xf9ff, 0xe876, + 0x2102, 0x308b, 0x0210, 0x1399, 0x6726, 0x76af, 0x4434, 0x55bd, + 0xad4a, 0xbcc3, 0x8e58, 0x9fd1, 0xeb6e, 0xfae7, 0xc87c, 0xd9f5, + 0x3183, 0x200a, 0x1291, 0x0318, 0x77a7, 0x662e, 0x54b5, 0x453c, + 0xbdcb, 0xac42, 0x9ed9, 0x8f50, 0xfbef, 0xea66, 0xd8fd, 0xc974, + 0x4204, 0x538d, 0x6116, 0x709f, 0x0420, 0x15a9, 0x2732, 0x36bb, + 0xce4c, 0xdfc5, 0xed5e, 0xfcd7, 0x8868, 0x99e1, 0xab7a, 0xbaf3, + 0x5285, 0x430c, 0x7197, 0x601e, 0x14a1, 0x0528, 0x37b3, 0x263a, + 0xdecd, 0xcf44, 0xfddf, 0xec56, 0x98e9, 0x8960, 0xbbfb, 0xaa72, + 0x6306, 0x728f, 0x4014, 0x519d, 0x2522, 0x34ab, 0x0630, 0x17b9, + 0xef4e, 0xfec7, 0xcc5c, 0xddd5, 0xa96a, 0xb8e3, 0x8a78, 0x9bf1, + 0x7387, 0x620e, 0x5095, 0x411c, 0x35a3, 0x242a, 0x16b1, 0x0738, + 0xffcf, 0xee46, 0xdcdd, 0xcd54, 0xb9eb, 0xa862, 0x9af9, 0x8b70, + 0x8408, 0x9581, 0xa71a, 0xb693, 0xc22c, 0xd3a5, 0xe13e, 0xf0b7, + 0x0840, 0x19c9, 0x2b52, 0x3adb, 0x4e64, 0x5fed, 0x6d76, 0x7cff, + 0x9489, 0x8500, 0xb79b, 0xa612, 0xd2ad, 0xc324, 0xf1bf, 0xe036, + 0x18c1, 0x0948, 0x3bd3, 0x2a5a, 0x5ee5, 0x4f6c, 0x7df7, 0x6c7e, + 0xa50a, 0xb483, 0x8618, 0x9791, 0xe32e, 0xf2a7, 0xc03c, 0xd1b5, + 0x2942, 0x38cb, 0x0a50, 0x1bd9, 0x6f66, 0x7eef, 0x4c74, 0x5dfd, + 0xb58b, 0xa402, 0x9699, 0x8710, 0xf3af, 0xe226, 0xd0bd, 0xc134, + 0x39c3, 0x284a, 0x1ad1, 0x0b58, 0x7fe7, 0x6e6e, 0x5cf5, 0x4d7c, + 0xc60c, 0xd785, 0xe51e, 0xf497, 0x8028, 0x91a1, 0xa33a, 0xb2b3, + 0x4a44, 0x5bcd, 0x6956, 0x78df, 0x0c60, 0x1de9, 0x2f72, 0x3efb, + 0xd68d, 0xc704, 0xf59f, 0xe416, 0x90a9, 0x8120, 0xb3bb, 0xa232, + 0x5ac5, 0x4b4c, 0x79d7, 0x685e, 0x1ce1, 0x0d68, 0x3ff3, 0x2e7a, + 0xe70e, 0xf687, 0xc41c, 0xd595, 0xa12a, 0xb0a3, 0x8238, 0x93b1, + 0x6b46, 0x7acf, 0x4854, 0x59dd, 0x2d62, 0x3ceb, 0x0e70, 0x1ff9, + 0xf78f, 0xe606, 0xd49d, 0xc514, 0xb1ab, 0xa022, 0x92b9, 0x8330, + 0x7bc7, 0x6a4e, 0x58d5, 0x495c, 0x3de3, 0x2c6a, 0x1ef1, 0x0f78 + }; + +/* +******************************************************************************* +* DETAILS : Calculate a new FCS-16 given the current FCS-16 and the new data. +******************************************************************************* +*/ +guint16 +fcs16(register guint16 fcs, + tvbuff_t * tvbuff, + guint32 offset, + guint32 len) +{ + guint8 val; + /* Check for Invalid Length */ + if(len == 0) + return(0x0000); + while (len--) { + val = tvb_get_guint8(tvbuff, offset++); + fcs = (guint16)((fcs >> 8) & 0x00ff) ^ + fcstab_16[((guint16)(fcs ^ (guint16)((val) & 0x00ff)) & 0x00ff)]; + } + + return (fcs ^ 0xffff); +} + +/* +******************************************************************************* +* DETAILS : Calculate a new FCS-32 given the current FCS-32 and the new data. +******************************************************************************* +*/ +guint32 +fcs32(guint32 fcs, + tvbuff_t * tvbuff, + guint32 offset, + guint32 len) +{ + guint8 val; + /* Check for invalid Length */ + if(len <= 0) + return(0x00000000); + + while (len--) { + val = tvb_get_guint8(tvbuff, offset++); + fcs = (((fcs) >> 8) ^ fcstab_32[((fcs) ^ (val)) & 0xff]); + } + return (fcs ^ 0xffffffff); +} + void capture_ppp( const u_char *pd, int offset, packet_counts *ld ) { switch (pntohs(&pd[offset + 2])) { case PPP_IP: + case CISCO_IP: capture_ip(pd, offset + 4, ld); break; case PPP_IPX: @@ -1116,6 +1278,8 @@ int proto_offset; tvbuff_t *next_tvb; guint8 byte0; + guint32 rx_fcs_exp; + guint32 rx_fcs_got; CHECK_DISPLAY_AS_DATA(proto_ppp, tvb, pinfo, tree); @@ -1128,6 +1292,13 @@ ph.ppp_prot = tvb_get_ntohs(tvb, 2); proto_offset = 2; } + /* Cisco HDLC format */ + else if (byte0 == 0x0f) { + ph.ppp_addr = tvb_get_guint8(tvb, 0); + ph.ppp_ctl = tvb_get_guint8(tvb, 1); + ph.ppp_prot = tvb_get_ntohs(tvb, 2); + proto_offset = 2; + } else { /* address and control are compressed (NULL) */ ph.ppp_prot = tvb_get_ntohs(tvb, 0); @@ -1151,6 +1322,10 @@ proto_tree_add_text(fh_tree, tvb, 0, 1, "Address: %02x", ph.ppp_addr); proto_tree_add_text(fh_tree, tvb, 1, 1, "Control: %02x", ph.ppp_ctl); } + else if (byte0 == 0x0f) { + proto_tree_add_text(fh_tree, tvb, 0, 1, "Address: %02x", ph.ppp_addr); + proto_tree_add_text(fh_tree, tvb, 1, 1, "Control: %02x", ph.ppp_ctl); + } } next_tvb = tvb_new_subset(tvb, proto_offset, -1, -1); @@ -1159,6 +1334,35 @@ if (check_col(pinfo->fd, COL_PROTOCOL)) col_add_fstr(pinfo->fd, COL_PROTOCOL, "0x%04x", ph.ppp_prot); } + + /* Calculate the FCS check */ + if (ppp_fcs_decode == FCS_16) { + rx_fcs_got = 0; + rx_fcs_exp = fcs16(0xFFFF, tvb, 0, tvb_length(tvb) - 2); + rx_fcs_got = tvb_get_guint8(tvb, tvb_length(tvb) - 2) | + (tvb_get_guint8(tvb, tvb_length(tvb) - 1) << 8); + if (rx_fcs_got != rx_fcs_exp) { + proto_tree_add_text(fh_tree, tvb, tvb_length(tvb) - 2, 2, "FCS 16: %04x (incorrect, expect %04x)", rx_fcs_got, rx_fcs_exp); + } + else { + proto_tree_add_text(fh_tree, tvb, tvb_length(tvb) - 2, 2, "FCS 16: %04x (correct)", rx_fcs_got); + } + } + else if(ppp_fcs_decode == FCS_32) { + rx_fcs_got = 0; + rx_fcs_exp = fcs32(0xFFFFFFFF, tvb, 0, tvb_length(tvb) - 4); + rx_fcs_got = tvb_get_guint8(tvb, tvb_length(tvb) - 4) | + (tvb_get_guint8(tvb, tvb_length(tvb) - 3) << 8) | + (tvb_get_guint8(tvb, tvb_length(tvb) - 2) << 16) | + (tvb_get_guint8(tvb, tvb_length(tvb) - 1) << 24); + if (rx_fcs_got != rx_fcs_exp) { + proto_tree_add_text(fh_tree, tvb, tvb_length(tvb) - 4, 4, "FCS 32: %08x (incorrect, expect %08x) ", rx_fcs_got, rx_fcs_exp); + } + else { + proto_tree_add_text(fh_tree, tvb, tvb_length(tvb) - 4, 4, "FCS 32: %08x (correct)", rx_fcs_got); + } + } + } void @@ -1188,6 +1392,15 @@ &ett_lcp_internationalization_opt, }; + static enum_val_t ppp_options[] = { + {"None", 0}, + {"16-Bit", 1}, + {"32-Bit", 2}, + {NULL, -1} + }; + + module_t *ppp_module; + proto_ppp = proto_register_protocol("Point-to-Point Protocol", "ppp"); /* proto_register_field_array(proto_ppp, hf, array_length(hf));*/ proto_register_subtree_array(ett, array_length(ett)); @@ -1197,6 +1410,16 @@ register_dissector("ppp", dissect_ppp); register_dissector("payload_ppp", dissect_payload_ppp); + + /* Register the preferences for the ppp protocol */ + ppp_module = prefs_register_module("ppp", "PPP", NULL); + + prefs_register_enum_preference(ppp_module, + "ppp_fcs", + "PPP Frame Checksum", + "PPP Frame Checksum", + &ppp_fcs_decode, + ppp_options, FALSE); } void
--- packet-mpls.c Mon Nov 20 15:36:12 2000 +++ ../changed/packet-mpls.c Wed Dec 13 21:02:48 2000 @@ -45,6 +45,9 @@ #include <glib.h> #include "etypes.h" #include "packet.h" +#include "packet-ip.h" +#include "ppptypes.h" +#include "packet-ppp.h" static gint proto_mpls = -1; @@ -197,6 +200,7 @@ proto_reg_handoff_mpls(void) { old_dissector_add("ethertype", ETHERTYPE_MPLS, dissect_mpls); + old_dissector_add("ppp.protocol", PPP_MPLS_UNI, dissect_mpls); /* * Get a handle for the IP dissector.
--- packet-mpls.c Mon Nov 20 15:36:12 2000 +++ ../changed/packet-ip.c Thu Dec 14 11:56:00 2000 @@ -1,9 +1,7 @@ -/* packet-mpls.c - * Routines for MPLS data packet disassembly - * - * (c) Copyright Ashok Narayanan <ashokn@xxxxxxxxx> +/* packet-ip.c + * Routines for IP and miscellaneous IP protocol packet disassembly * - * $Id: packet-mpls.c,v 1.11 2000/11/19 08:54:00 guy Exp $ + * $Id: packet-ip.c,v 1.107 2000/11/19 08:53:58 guy Exp $ * * Ethereal - Network traffic analyzer * By Gerald Combs <gerald@xxxxxxxx> @@ -25,15 +23,6 @@ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ -/* - * NOTES - * - * This module defines routines to handle Ethernet-encapsulated MPLS IP packets. - * It should implement all the functionality in <draft-ietf-mpls-label-encaps-07.txt> - * Multicast MPLS support is not tested yet - */ - - #ifdef HAVE_CONFIG_H # include "config.h" #endif @@ -42,164 +31,1488 @@ # include <sys/types.h> #endif +#ifdef HAVE_NETINET_IN_H +# include <netinet/in.h> +#endif + +#include <stdio.h> +#include <string.h> #include <glib.h> -#include "etypes.h" + +#ifdef NEED_SNPRINTF_H +# include "snprintf.h" +#endif + #include "packet.h" +#include "resolv.h" +#include "prefs.h" +#include "etypes.h" +#include "ppptypes.h" +#include "llcsaps.h" +#include "aftypes.h" +#include "packet-ip.h" +#include "packet-ipsec.h" + +static void dissect_icmp(tvbuff_t *, packet_info *, proto_tree *); +static void dissect_igmp(tvbuff_t *, packet_info *, proto_tree *); + +/* Decode the old IPv4 TOS field as the DiffServ DS Field */ +gboolean g_ip_dscp_actif = TRUE; + +static int proto_ip = -1; +static int hf_ip_version = -1; +static int hf_ip_hdr_len = -1; +static int hf_ip_dsfield = -1; +static int hf_ip_dsfield_dscp = -1; +static int hf_ip_dsfield_ect = -1; +static int hf_ip_dsfield_ce = -1; +static int hf_ip_tos = -1; +static int hf_ip_tos_precedence = -1; +static int hf_ip_tos_delay = -1; +static int hf_ip_tos_throughput = -1; +static int hf_ip_tos_reliability = -1; +static int hf_ip_tos_cost = -1; +static int hf_ip_len = -1; +static int hf_ip_id = -1; +static int hf_ip_dst = -1; +static int hf_ip_src = -1; +static int hf_ip_addr = -1; +static int hf_ip_flags = -1; +static int hf_ip_flags_df = -1; +static int hf_ip_flags_mf = -1; +static int hf_ip_frag_offset = -1; +static int hf_ip_ttl = -1; +static int hf_ip_proto = -1; +static int hf_ip_checksum = -1; + +static gint ett_ip = -1; +static gint ett_ip_dsfield = -1; +static gint ett_ip_tos = -1; +static gint ett_ip_off = -1; +static gint ett_ip_options = -1; +static gint ett_ip_option_sec = -1; +static gint ett_ip_option_route = -1; +static gint ett_ip_option_timestamp = -1; + +/* Used by IPv6 as well, so not static */ +dissector_table_t ip_dissector_table; + +static int proto_igmp = -1; +static int hf_igmp_version = -1; +static int hf_igmp_type = -1; +static int hf_igmp_unused = -1; +static int hf_igmp_checksum = -1; +static int hf_igmp_group = -1; + +static gint ett_igmp = -1; + +static int proto_icmp = -1; +static int hf_icmp_type = -1; +static int hf_icmp_code = -1; +static int hf_icmp_checksum = -1; + +static gint ett_icmp = -1; + +/* ICMP definitions */ + +#define ICMP_ECHOREPLY 0 +#define ICMP_UNREACH 3 +#define ICMP_SOURCEQUENCH 4 +#define ICMP_REDIRECT 5 +#define ICMP_ECHO 8 +#define ICMP_RTRADVERT 9 +#define ICMP_RTRSOLICIT 10 +#define ICMP_TIMXCEED 11 +#define ICMP_PARAMPROB 12 +#define ICMP_TSTAMP 13 +#define ICMP_TSTAMPREPLY 14 +#define ICMP_IREQ 15 +#define ICMP_IREQREPLY 16 +#define ICMP_MASKREQ 17 +#define ICMP_MASKREPLY 18 + +/* ICMP UNREACHABLE */ + +#define ICMP_NET_UNREACH 0 /* Network Unreachable */ +#define ICMP_HOST_UNREACH 1 /* Host Unreachable */ +#define ICMP_PROT_UNREACH 2 /* Protocol Unreachable */ +#define ICMP_PORT_UNREACH 3 /* Port Unreachable */ +#define ICMP_FRAG_NEEDED 4 /* Fragmentation Needed/DF set */ +#define ICMP_SR_FAILED 5 /* Source Route failed */ +#define ICMP_NET_UNKNOWN 6 +#define ICMP_HOST_UNKNOWN 7 +#define ICMP_HOST_ISOLATED 8 +#define ICMP_NET_ANO 9 +#define ICMP_HOST_ANO 10 +#define ICMP_NET_UNR_TOS 11 +#define ICMP_HOST_UNR_TOS 12 +#define ICMP_PKT_FILTERED 13 /* Packet filtered */ +#define ICMP_PREC_VIOLATION 14 /* Precedence violation */ +#define ICMP_PREC_CUTOFF 15 /* Precedence cut off */ + + +/* IGMP structs and definitions */ +typedef struct _e_igmp { + guint8 igmp_v_t; /* combines igmp_v and igmp_t */ + guint8 igmp_unused; + guint16 igmp_cksum; + guint32 igmp_gaddr; +} e_igmp; + +#define IGMP_M_QRY 0x01 +#define IGMP_V1_M_RPT 0x02 +#define IGMP_V2_LV_GRP 0x07 +#define IGMP_DVMRP 0x03 +#define IGMP_PIM 0x04 +#define IGMP_V2_M_RPT 0x06 +#define IGMP_MTRC_RESP 0x1e +#define IGMP_MTRC 0x1f + +/* IP structs and definitions */ + +typedef struct _e_ip + { + guint8 ip_v_hl; /* combines ip_v and ip_hl */ + guint8 ip_tos; + guint16 ip_len; + guint16 ip_id; + guint16 ip_off; + guint8 ip_ttl; + guint8 ip_p; + guint16 ip_sum; + guint32 ip_src; + guint32 ip_dst; + } e_ip; + +/* Offsets of fields within an IP header. */ +#define IPH_V_HL 0 +#define IPH_TOS 1 +#define IPH_LEN 2 +#define IPH_ID 4 +#define IPH_TTL 6 +#define IPH_OFF 8 +#define IPH_P 9 +#define IPH_SUM 10 +#define IPH_SRC 12 +#define IPH_DST 16 + +/* Minimum IP header length. */ +#define IPH_MIN_LEN 20 + +/* IP flags. */ +#define IP_CE 0x8000 /* Flag: "Congestion" */ +#define IP_DF 0x4000 /* Flag: "Don't Fragment" */ +#define IP_MF 0x2000 /* Flag: "More Fragments" */ +#define IP_OFFSET 0x1FFF /* "Fragment Offset" part */ + +/* Differentiated Services Field. See RFCs 2474, 2597 and 2598. */ +#define IPDSFIELD_DSCP_MASK 0xFC +#define IPDSFIELD_ECN_MASK 0x03 +#define IPDSFIELD_DSCP_SHIFT 2 +#define IPDSFIELD_DSCP(dsfield) (((dsfield)&IPDSFIELD_DSCP_MASK)>>IPDSFIELD_DSCP_SHIFT) +#define IPDSFIELD_ECN(dsfield) ((dsfield)&IPDSFIELD_ECN_MASK) +#define IPDSFIELD_DSCP_DEFAULT 0x00 +#define IPDSFIELD_DSCP_CS1 0x08 +#define IPDSFIELD_DSCP_CS2 0x10 +#define IPDSFIELD_DSCP_CS3 0x18 +#define IPDSFIELD_DSCP_CS4 0x20 +#define IPDSFIELD_DSCP_CS5 0x28 +#define IPDSFIELD_DSCP_CS6 0x30 +#define IPDSFIELD_DSCP_CS7 0x38 +#define IPDSFIELD_DSCP_AF11 0x0A +#define IPDSFIELD_DSCP_AF12 0x0C +#define IPDSFIELD_DSCP_AF13 0x0E +#define IPDSFIELD_DSCP_AF21 0x12 +#define IPDSFIELD_DSCP_AF22 0x14 +#define IPDSFIELD_DSCP_AF23 0x16 +#define IPDSFIELD_DSCP_AF31 0x1A +#define IPDSFIELD_DSCP_AF32 0x1C +#define IPDSFIELD_DSCP_AF33 0x1E +#define IPDSFIELD_DSCP_AF41 0x22 +#define IPDSFIELD_DSCP_AF42 0x24 +#define IPDSFIELD_DSCP_AF43 0x26 +#define IPDSFIELD_DSCP_EF 0x2E +#define IPDSFIELD_ECT_MASK 0x02 +#define IPDSFIELD_CE_MASK 0x01 + +/* IP TOS, superseded by the DS Field, RFC 2474. */ +#define IPTOS_TOS_MASK 0x1E +#define IPTOS_TOS(tos) ((tos) & IPTOS_TOS_MASK) +#define IPTOS_NONE 0x00 +#define IPTOS_LOWCOST 0x02 +#define IPTOS_RELIABILITY 0x04 +#define IPTOS_THROUGHPUT 0x08 +#define IPTOS_LOWDELAY 0x10 +#define IPTOS_SECURITY 0x1E + +#define IPTOS_PREC_MASK 0xE0 +#define IPTOS_PREC_SHIFT 5 +#define IPTOS_PREC(tos) (((tos)&IPTOS_PREC_MASK)>>IPTOS_PREC_SHIFT) +#define IPTOS_PREC_NETCONTROL 7 +#define IPTOS_PREC_INTERNETCONTROL 6 +#define IPTOS_PREC_CRITIC_ECP 5 +#define IPTOS_PREC_FLASHOVERRIDE 4 +#define IPTOS_PREC_FLASH 3 +#define IPTOS_PREC_IMMEDIATE 2 +#define IPTOS_PREC_PRIORITY 1 +#define IPTOS_PREC_ROUTINE 0 + +/* IP options */ +#define IPOPT_COPY 0x80 + +#define IPOPT_CONTROL 0x00 +#define IPOPT_RESERVED1 0x20 +#define IPOPT_MEASUREMENT 0x40 +#define IPOPT_RESERVED2 0x60 + +#define IPOPT_END (0 |IPOPT_CONTROL) +#define IPOPT_NOOP (1 |IPOPT_CONTROL) +#define IPOPT_SEC (2 |IPOPT_CONTROL|IPOPT_COPY) +#define IPOPT_LSRR (3 |IPOPT_CONTROL|IPOPT_COPY) +#define IPOPT_TIMESTAMP (4 |IPOPT_MEASUREMENT) +#define IPOPT_RR (7 |IPOPT_CONTROL) +#define IPOPT_SID (8 |IPOPT_CONTROL|IPOPT_COPY) +#define IPOPT_SSRR (9 |IPOPT_CONTROL|IPOPT_COPY) +#define IPOPT_RA (20|IPOPT_CONTROL|IPOPT_COPY) + +/* IP option lengths */ +#define IPOLEN_SEC 11 +#define IPOLEN_LSRR_MIN 3 +#define IPOLEN_TIMESTAMP_MIN 5 +#define IPOLEN_RR_MIN 3 +#define IPOLEN_SID 4 +#define IPOLEN_SSRR_MIN 3 + +#define IPSEC_UNCLASSIFIED 0x0000 +#define IPSEC_CONFIDENTIAL 0xF135 +#define IPSEC_EFTO 0x789A +#define IPSEC_MMMM 0xBC4D +#define IPSEC_RESTRICTED 0xAF13 +#define IPSEC_SECRET 0xD788 +#define IPSEC_TOPSECRET 0x6BC5 +#define IPSEC_RESERVED1 0x35E2 +#define IPSEC_RESERVED2 0x9AF1 +#define IPSEC_RESERVED3 0x4D78 +#define IPSEC_RESERVED4 0x24BD +#define IPSEC_RESERVED5 0x135E +#define IPSEC_RESERVED6 0x89AF +#define IPSEC_RESERVED7 0xC4D6 +#define IPSEC_RESERVED8 0xE26B + +#define IPOPT_TS_TSONLY 0 /* timestamps only */ +#define IPOPT_TS_TSANDADDR 1 /* timestamps and addresses */ +#define IPOPT_TS_PRESPEC 3 /* specified modules only */ -static gint proto_mpls = -1; -static gint ett_mpls = -1; +void +capture_ip(const u_char *pd, int offset, packet_counts *ld) { + if (!BYTES_ARE_IN_FRAME(offset, IPH_MIN_LEN)) { + ld->other++; + return; + } + switch (pd[offset + 9]) { + case IP_PROTO_SCTP: + ld->sctp++; + break; + case IP_PROTO_TCP: + ld->tcp++; + break; + case IP_PROTO_UDP: + ld->udp++; + break; + case IP_PROTO_ICMP: + ld->icmp++; + break; + case IP_PROTO_OSPF: + ld->ospf++; + break; + case IP_PROTO_GRE: + ld->gre++; + break; + case IP_PROTO_VINES: + ld->vines++; + break; + default: + ld->other++; + } +} -/* Special labels in MPLS */ -enum { - IP4_EXPLICIT_NULL = 0, - ROUTER_ALERT, - IP6_EXPLICIT_NULL, - IMPLICIT_NULL, +static void +dissect_ipopt_security(const ip_tcp_opt *optp, tvbuff_t *tvb, int offset, + guint optlen, proto_tree *opt_tree) +{ + proto_tree *field_tree = NULL; + proto_item *tf; + guint val; + static const value_string secl_vals[] = { + {IPSEC_UNCLASSIFIED, "Unclassified"}, + {IPSEC_CONFIDENTIAL, "Confidential"}, + {IPSEC_EFTO, "EFTO" }, + {IPSEC_MMMM, "MMMM" }, + {IPSEC_RESTRICTED, "Restricted" }, + {IPSEC_SECRET, "Secret" }, + {IPSEC_TOPSECRET, "Top secret" }, + {IPSEC_RESERVED1, "Reserved" }, + {IPSEC_RESERVED2, "Reserved" }, + {IPSEC_RESERVED3, "Reserved" }, + {IPSEC_RESERVED4, "Reserved" }, + {IPSEC_RESERVED5, "Reserved" }, + {IPSEC_RESERVED6, "Reserved" }, + {IPSEC_RESERVED7, "Reserved" }, + {IPSEC_RESERVED8, "Reserved" }, + {0, NULL } }; + + tf = proto_tree_add_text(opt_tree, tvb, offset, optlen, "%s:", optp->name); + field_tree = proto_item_add_subtree(tf, *optp->subtree_index); + offset += 2; + + val = tvb_get_ntohs(tvb, offset); + proto_tree_add_text(field_tree, tvb, offset, 2, + "Security: %s", val_to_str(val, secl_vals, "Unknown (0x%x)")); + offset += 2; + + val = tvb_get_ntohs(tvb, offset); + proto_tree_add_text(field_tree, tvb, offset, 2, + "Compartments: %u", val); + offset += 2; + + proto_tree_add_text(field_tree, tvb, offset, 2, + "Handling restrictions: %c%c", + tvb_get_guint8(tvb, offset), + tvb_get_guint8(tvb, offset + 1)); + offset += 2; + + proto_tree_add_text(field_tree, tvb, offset, 3, + "Transmission control code: %c%c%c", + tvb_get_guint8(tvb, offset), + tvb_get_guint8(tvb, offset + 1), + tvb_get_guint8(tvb, offset + 2)); +} - MAX_RESERVED = 15 -}; +static void +dissect_ipopt_route(const ip_tcp_opt *optp, tvbuff_t *tvb, int offset, + guint optlen, proto_tree *opt_tree) +{ + proto_tree *field_tree = NULL; + proto_item *tf; + int ptr; + int optoffset = 0; + struct in_addr addr; + + tf = proto_tree_add_text(opt_tree, tvb, offset, optlen, "%s (%u bytes)", + optp->name, optlen); + field_tree = proto_item_add_subtree(tf, *optp->subtree_index); + + optoffset += 2; /* skip past type and length */ + optlen -= 2; /* subtract size of type and length */ + + ptr = tvb_get_guint8(tvb, offset + optoffset); + proto_tree_add_text(field_tree, tvb, offset + optoffset, 1, + "Pointer: %d%s", ptr, + ((ptr < 4) ? " (points before first address)" : + ((ptr & 3) ? " (points to middle of address)" : ""))); + optoffset++; + optlen--; + ptr--; /* ptr is 1-origin */ + + while (optlen > 0) { + if (optlen < 4) { + proto_tree_add_text(field_tree, tvb, offset, optlen, + "(suboption would go past end of option)"); + break; + } -static const value_string special_labels[] = { - {IP4_EXPLICIT_NULL, "IPv4 Explicit-Null"}, - {ROUTER_ALERT, "Router Alert"}, - {IP6_EXPLICIT_NULL, "IPv6 Explicit-Null"}, - {IMPLICIT_NULL, "Implicit-Null"}, - {0, NULL } -}; + /* Avoids alignment problems on many architectures. */ + tvb_memcpy(tvb, (guint8 *)&addr, offset + optoffset, sizeof(addr)); -/* MPLS filter values */ -enum mpls_filter_keys { + proto_tree_add_text(field_tree, tvb, offset + optoffset, 4, + "%s%s", + ((addr.s_addr == 0) ? "-" : (char *)get_hostname(addr.s_addr)), + ((optoffset == ptr) ? " <- (current)" : "")); + optoffset += 4; + optlen -= 4; + } +} - /* Is the packet MPLS-encapsulated? */ -/* MPLSF_PACKET,*/ +static void +dissect_ipopt_sid(const ip_tcp_opt *optp, tvbuff_t *tvb, int offset, + guint optlen, proto_tree *opt_tree) +{ + proto_tree_add_text(opt_tree, tvb, offset, optlen, + "%s: %u", optp->name, tvb_get_ntohs(tvb, offset + 2)); + return; +} - /* MPLS encap properties */ - MPLSF_LABEL, - MPLSF_EXP, - MPLSF_BOTTOM_OF_STACK, - MPLSF_TTL, +static void +dissect_ipopt_timestamp(const ip_tcp_opt *optp, tvbuff_t *tvb, + int offset, guint optlen, proto_tree *opt_tree) +{ + proto_tree *field_tree = NULL; + proto_item *tf; + int ptr; + int optoffset = 0; + int flg; + static const value_string flag_vals[] = { + {IPOPT_TS_TSONLY, "Time stamps only" }, + {IPOPT_TS_TSANDADDR, "Time stamp and address" }, + {IPOPT_TS_PRESPEC, "Time stamps for prespecified addresses"}, + {0, NULL } }; + struct in_addr addr; + guint ts; + + tf = proto_tree_add_text(opt_tree, tvb, offset, optlen, "%s:", optp->name); + field_tree = proto_item_add_subtree(tf, *optp->subtree_index); + + optoffset += 2; /* skip past type and length */ + optlen -= 2; /* subtract size of type and length */ + + ptr = tvb_get_guint8(tvb, offset + optoffset); + proto_tree_add_text(field_tree, tvb, offset + optoffset, 1, + "Pointer: %d%s", ptr, + ((ptr < 5) ? " (points before first address)" : + (((ptr - 1) & 3) ? " (points to middle of address)" : ""))); + optoffset++; + optlen--; + ptr--; /* ptr is 1-origin */ + + flg = tvb_get_guint8(tvb, offset + optoffset); + proto_tree_add_text(field_tree, tvb, offset + optoffset, 1, + "Overflow: %u", flg >> 4); + flg &= 0xF; + proto_tree_add_text(field_tree, tvb, offset + optoffset, 1, + "Flag: %s", val_to_str(flg, flag_vals, "Unknown (0x%x)")); + optoffset++; + optlen--; + + while (optlen > 0) { + if (flg == IPOPT_TS_TSANDADDR) { + if (optlen < 8) { + proto_tree_add_text(field_tree, tvb, offset + optoffset, optlen, + "(suboption would go past end of option)"); + break; + } + tvb_memcpy(tvb, (char *)&addr, offset + optoffset, sizeof(addr)); + ts = tvb_get_ntohl(tvb, offset + optoffset + 4); + optlen -= 8; + proto_tree_add_text(field_tree, tvb, offset + optoffset, 8, + "Address = %s, time stamp = %u", + ((addr.s_addr == 0) ? "-" : (char *)get_hostname(addr.s_addr)), + ts); + optoffset += 8; + } else { + if (optlen < 4) { + proto_tree_add_text(field_tree, tvb, offset + optoffset, optlen, + "(suboption would go past end of option)"); + break; + } + ts = tvb_get_ntohl(tvb, offset + optoffset); + optlen -= 4; + proto_tree_add_text(field_tree, tvb, offset + optoffset, 4, + "Time stamp = %u", ts); + optoffset += 4; + } + } +} - MPLSF_MAX +static const ip_tcp_opt ipopts[] = { + { + IPOPT_END, + "EOL", + NULL, + NO_LENGTH, + 0, + NULL, + }, + { + IPOPT_NOOP, + "NOP", + NULL, + NO_LENGTH, + 0, + NULL, + }, + { + IPOPT_SEC, + "Security", + &ett_ip_option_sec, + FIXED_LENGTH, + IPOLEN_SEC, + dissect_ipopt_security + }, + { + IPOPT_SSRR, + "Strict source route", + &ett_ip_option_route, + VARIABLE_LENGTH, + IPOLEN_SSRR_MIN, + dissect_ipopt_route + }, + { + IPOPT_LSRR, + "Loose source route", + &ett_ip_option_route, + VARIABLE_LENGTH, + IPOLEN_LSRR_MIN, + dissect_ipopt_route + }, + { + IPOPT_RR, + "Record route", + &ett_ip_option_route, + VARIABLE_LENGTH, + IPOLEN_RR_MIN, + dissect_ipopt_route + }, + { + IPOPT_SID, + "Stream identifier", + NULL, + FIXED_LENGTH, + IPOLEN_SID, + dissect_ipopt_sid + }, + { + IPOPT_TIMESTAMP, + "Time stamp", + &ett_ip_option_timestamp, + VARIABLE_LENGTH, + IPOLEN_TIMESTAMP_MIN, + dissect_ipopt_timestamp + } }; -static int mpls_filter[MPLSF_MAX]; -static hf_register_info mplsf_info[] = { +#define N_IP_OPTS (sizeof ipopts / sizeof ipopts[0]) -/* {&mpls_filter[MPLSF_PACKET], - {"MPLS Label Switched Packet", "mpls", FT_UINT8, BASE_NONE, NULL, 0x0, - "" }},*/ - - {&mpls_filter[MPLSF_LABEL], - {"MPLS Label", "mpls.label", FT_UINT32, BASE_DEC, VALS(special_labels), 0x0, - "" }}, - - {&mpls_filter[MPLSF_EXP], - {"MPLS Experimental Bits", "mpls.exp", FT_UINT8, BASE_DEC, NULL, 0x0, - "" }}, - - {&mpls_filter[MPLSF_BOTTOM_OF_STACK], - {"MPLS Bottom Of Label Stack", "mpls.bottom", FT_UINT8, BASE_DEC, NULL, 0x0, - "" }}, - - {&mpls_filter[MPLSF_TTL], - {"MPLS TTL", "mpls.ttl", FT_UINT8, BASE_DEC, NULL, 0x0, - "" }}, +/* Dissect the IP or TCP options in a packet. */ +void +dissect_ip_tcp_options(tvbuff_t *tvb, int offset, guint length, + const ip_tcp_opt *opttab, int nopts, int eol, + proto_tree *opt_tree) +{ + u_char opt; + const ip_tcp_opt *optp; + opt_len_type len_type; + int optlen; + char *name; + char name_str[7+1+1+2+2+1+1]; /* "Unknown (0x%02x)" */ + void (*dissect)(const struct ip_tcp_opt *, tvbuff_t *, + int, guint, proto_tree *); + guint len; + + while (length > 0) { + opt = tvb_get_guint8(tvb, offset); + for (optp = &opttab[0]; optp < &opttab[nopts]; optp++) { + if (optp->optcode == opt) + break; + } + if (optp == &opttab[nopts]) { + /* We assume that the only NO_LENGTH options are EOL and NOP options, + so that we can treat unknown options as VARIABLE_LENGTH with a + minimum of 2, and at least be able to move on to the next option + by using the length in the option. */ + optp = NULL; /* indicate that we don't know this option */ + len_type = VARIABLE_LENGTH; + optlen = 2; + snprintf(name_str, sizeof name_str, "Unknown (0x%02x)", opt); + name = name_str; + dissect = NULL; + } else { + len_type = optp->len_type; + optlen = optp->optlen; + name = optp->name; + dissect = optp->dissect; + } + --length; /* account for type byte */ + if (len_type != NO_LENGTH) { + /* Option has a length. Is it in the packet? */ + if (length == 0) { + /* Bogus - packet must at least include option code byte and + length byte! */ + proto_tree_add_text(opt_tree, tvb, offset, 1, + "%s (length byte past end of options)", name); + return; + } + len = tvb_get_guint8(tvb, offset + 1); /* total including type, len */ + --length; /* account for length byte */ + if (len < 2) { + /* Bogus - option length is too short to include option code and + option length. */ + proto_tree_add_text(opt_tree, tvb, offset, 2, + "%s (with too-short option length = %u byte%s)", name, + len, plurality(len, "", "s")); + return; + } else if (len - 2 > length) { + /* Bogus - option goes past the end of the header. */ + proto_tree_add_text(opt_tree, tvb, offset, length, + "%s (option length = %u byte%s says option goes past end of options)", + name, len, plurality(len, "", "s")); + return; + } else if (len_type == FIXED_LENGTH && len != optlen) { + /* Bogus - option length isn't what it's supposed to be for this + option. */ + proto_tree_add_text(opt_tree, tvb, offset, len, + "%s (with option length = %u byte%s; should be %u)", name, + len, plurality(len, "", "s"), optlen); + return; + } else if (len_type == VARIABLE_LENGTH && len < optlen) { + /* Bogus - option length is less than what it's supposed to be for + this option. */ + proto_tree_add_text(opt_tree, tvb, offset, len, + "%s (with option length = %u byte%s; should be >= %u)", name, + len, plurality(len, "", "s"), optlen); + return; + } else { + if (optp == NULL) { + proto_tree_add_text(opt_tree, tvb, offset, len, "%s (%u byte%s)", + name, len, plurality(len, "", "s")); + } else { + if (dissect != NULL) { + /* Option has a dissector. */ + (*dissect)(optp, tvb, offset, len, opt_tree); + } else { + /* Option has no data, hence no dissector. */ + proto_tree_add_text(opt_tree, tvb, offset, len, "%s", name); + } + } + len -= 2; /* subtract size of type and length */ + offset += 2 + len; + } + length -= len; + } else { + proto_tree_add_text(opt_tree, tvb, offset, 1, "%s", name); + offset += 1; + } + if (opt == eol) + break; + } +} + +static const value_string dscp_vals[] = { + { IPDSFIELD_DSCP_DEFAULT, "Default" }, + { IPDSFIELD_DSCP_CS1, "Class Selector 1" }, + { IPDSFIELD_DSCP_CS2, "Class Selector 2" }, + { IPDSFIELD_DSCP_CS3, "Class Selector 3" }, + { IPDSFIELD_DSCP_CS4, "Class Selector 4" }, + { IPDSFIELD_DSCP_CS5, "Class Selector 5" }, + { IPDSFIELD_DSCP_CS6, "Class Selector 6" }, + { IPDSFIELD_DSCP_CS7, "Class Selector 7" }, + { IPDSFIELD_DSCP_AF11, "Assured Forwarding 11" }, + { IPDSFIELD_DSCP_AF12, "Assured Forwarding 12" }, + { IPDSFIELD_DSCP_AF13, "Assured Forwarding 13" }, + { IPDSFIELD_DSCP_AF21, "Assured Forwarding 21" }, + { IPDSFIELD_DSCP_AF22, "Assured Forwarding 22" }, + { IPDSFIELD_DSCP_AF23, "Assured Forwarding 23" }, + { IPDSFIELD_DSCP_AF31, "Assured Forwarding 31" }, + { IPDSFIELD_DSCP_AF32, "Assured Forwarding 32" }, + { IPDSFIELD_DSCP_AF33, "Assured Forwarding 33" }, + { IPDSFIELD_DSCP_AF41, "Assured Forwarding 41" }, + { IPDSFIELD_DSCP_AF42, "Assured Forwarding 42" }, + { IPDSFIELD_DSCP_AF43, "Assured Forwarding 43" }, + { IPDSFIELD_DSCP_EF, "Expedited Forwarding" }, + { 0, NULL } }; + +static const value_string precedence_vals[] = { + { IPTOS_PREC_ROUTINE, "routine" }, + { IPTOS_PREC_PRIORITY, "priority" }, + { IPTOS_PREC_IMMEDIATE, "immediate" }, + { IPTOS_PREC_FLASH, "flash" }, + { IPTOS_PREC_FLASHOVERRIDE, "flash override" }, + { IPTOS_PREC_CRITIC_ECP, "CRITIC/ECP" }, + { IPTOS_PREC_INTERNETCONTROL, "internetwork control" }, + { IPTOS_PREC_NETCONTROL, "network control" }, + { 0, NULL } }; + +static const value_string iptos_vals[] = { + { IPTOS_NONE, "None" }, + { IPTOS_LOWCOST, "Minimize cost" }, + { IPTOS_RELIABILITY, "Maximize reliability" }, + { IPTOS_THROUGHPUT, "Maximize throughput" }, + { IPTOS_LOWDELAY, "Minimize delay" }, + { IPTOS_SECURITY, "Maximize security" }, + { 0, NULL } }; -static dissector_handle_t ip_handle; +static const true_false_string tos_set_low = { + "Low", + "Normal" +}; -/* - * Given a 4-byte MPLS label starting at "start", decode this. - * Return the label in "label", EXP bits in "exp", - * bottom_of_stack in "bos", and TTL in "ttl" - */ -void decode_mpls_label(const unsigned char *start, - guint32 *label, guint8 *exp, - guint8 *bos, guint8 *ttl) +static const true_false_string tos_set_high = { + "High", + "Normal" +}; + +static const true_false_string flags_set_truth = { + "Set", + "Not set" +}; + +static guint16 ip_checksum(const guint8 *ptr, int len) { - *label = (start[0] << 12) + (start[1] << 4) + ((start[2] >> 4) & 0xff); - *exp = (start[2] >> 1) & 0x7; - *bos = (start[2] & 0x1); - *ttl = start[3]; + unsigned long Sum; + const unsigned char *Ptr, *PtrEnd; + + Sum = 0; + PtrEnd = ptr + len; + for (Ptr = ptr; Ptr < PtrEnd; Ptr += 2) { + Sum += pntohs(Ptr); + } + Sum = (Sum & 0xFFFF) + (Sum >> 16); + Sum = (Sum & 0xFFFF) + (Sum >> 16); + + return (guint16)~Sum; } -static void -dissect_mpls(const u_char *pd, int offset, frame_data *fd, proto_tree *tree) +static guint16 ip_checksum_shouldbe(guint16 sum, guint16 computed_sum) { - guint32 label; - guint8 exp; - guint8 bos; - guint8 ttl; + guint32 shouldbe; - proto_tree *mpls_tree; - proto_item *ti; + /* + * The value that should have gone into the checksum field + * is the negative of the value gotten by summing up everything + * *but* the checksum field. + * + * We can compute that by subtracting the value of the checksum + * field from the sum of all the data in the packet, and then + * computing the negative of that value. + * + * "sum" is the value of the checksum field, and "computed_sum" + * is the negative of the sum of all the data in the packets, + * so that's -(-computed_sum - sum), or (sum + computed_sum). + * + * All the arithmetic in question is one's complement, so the + * addition must include an end-around carry; we do this by + * doing the arithmetic in 32 bits (with no sign-extension), + * and then adding the upper 16 bits of the sum, which contain + * the carry, to the lower 16 bits of the sum, and then do it + * again in case *that* sum produced a carry. + */ + shouldbe = sum; + shouldbe += computed_sum; + shouldbe = (shouldbe & 0xFFFF) + (shouldbe >> 16); + shouldbe = (shouldbe & 0xFFFF) + (shouldbe >> 16); + return shouldbe; +} - OLD_CHECK_DISPLAY_AS_DATA(proto_mpls, pd, offset, fd, tree); +void +dissect_ip(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) +{ + e_ip iph; + proto_tree *ip_tree, *field_tree; + proto_item *ti, *tf; + int offset = 0; + guint hlen, optlen, len, payload_len, reported_payload_len, padding; + guint16 flags; + guint8 nxt; + guint16 ipsum; + tvbuff_t *next_tvb; + + CHECK_DISPLAY_AS_DATA(proto_ip, tvb, pinfo, tree); + + pinfo->current_proto = "IP"; + + /* Avoids alignment problems on many architectures. */ + tvb_memcpy(tvb, (guint8 *)&iph, offset, sizeof(e_ip)); + iph.ip_len = ntohs(iph.ip_len); + iph.ip_id = ntohs(iph.ip_id); + iph.ip_off = ntohs(iph.ip_off); + iph.ip_sum = ntohs(iph.ip_sum); + + /* Length of payload handed to us. */ + reported_payload_len = tvb_reported_length(tvb); + payload_len = tvb_length(tvb); + + /* Length of IP datagram. */ + len = iph.ip_len; + + if (len < reported_payload_len) { + /* Adjust the length of this tvbuff to include only the IP datagram. + Our caller may use that to determine how much of its packet + was padding. */ + tvb_set_reported_length(tvb, len); + + /* Shrink the total payload by the amount of padding. */ + padding = reported_payload_len - len; + if (pinfo->len >= padding) + pinfo->len -= padding; + + /* Shrink the captured payload by the amount of padding in the + captured payload (which may be less than the amount of padding, + as the padding may not have been captured). */ + if (len < payload_len) { + padding = payload_len - len; + if (pinfo->captured_len >= padding) + pinfo->captured_len -= padding; + } + } - if (check_col(fd, COL_PROTOCOL)) { - col_set_str(fd,COL_PROTOCOL, "MPLS"); + /* XXX - check to make sure this is at least IPH_MIN_LEN. */ + hlen = lo_nibble(iph.ip_v_hl) * 4; /* IP header length, in bytes */ + + if (tree) { + ti = proto_tree_add_item(tree, proto_ip, tvb, offset, hlen, FALSE); + ip_tree = proto_item_add_subtree(ti, ett_ip); + + proto_tree_add_uint(ip_tree, hf_ip_version, tvb, offset, 1, hi_nibble(iph.ip_v_hl)); + proto_tree_add_uint_format(ip_tree, hf_ip_hdr_len, tvb, offset, 1, hlen, + "Header length: %u bytes", hlen); + + if (g_ip_dscp_actif) { + tf = proto_tree_add_uint_format(ip_tree, hf_ip_dsfield, tvb, offset + 1, 1, iph.ip_tos, + "Differentiated Services Field: 0x%02x (DSCP 0x%02x: %s; ECN: 0x%02x)", iph.ip_tos, + IPDSFIELD_DSCP(iph.ip_tos), val_to_str(IPDSFIELD_DSCP(iph.ip_tos), dscp_vals, + "Unknown DSCP"),IPDSFIELD_ECN(iph.ip_tos)); + + field_tree = proto_item_add_subtree(tf, ett_ip_dsfield); + proto_tree_add_uint(field_tree, hf_ip_dsfield_dscp, tvb, offset + 1, 1, iph.ip_tos); + proto_tree_add_uint(field_tree, hf_ip_dsfield_ect, tvb, offset + 1, 1, iph.ip_tos); + proto_tree_add_uint(field_tree, hf_ip_dsfield_ce, tvb, offset + 1, 1, iph.ip_tos); + } else { + tf = proto_tree_add_uint_format(ip_tree, hf_ip_tos, tvb, offset + 1, 1, iph.ip_tos, + "Type of service: 0x%02x (%s)", iph.ip_tos, + val_to_str( IPTOS_TOS(iph.ip_tos), iptos_vals, "Unknown") ); + + field_tree = proto_item_add_subtree(tf, ett_ip_tos); + proto_tree_add_uint(field_tree, hf_ip_tos_precedence, tvb, offset + 1, 1, iph.ip_tos); + proto_tree_add_boolean(field_tree, hf_ip_tos_delay, tvb, offset + 1, 1, iph.ip_tos); + proto_tree_add_boolean(field_tree, hf_ip_tos_throughput, tvb, offset + 1, 1, iph.ip_tos); + proto_tree_add_boolean(field_tree, hf_ip_tos_reliability, tvb, offset + 1, 1, iph.ip_tos); + proto_tree_add_boolean(field_tree, hf_ip_tos_cost, tvb, offset + 1, 1, iph.ip_tos); } - - if (check_col(fd,COL_INFO)) { - col_add_fstr(fd,COL_INFO,"MPLS Label Switched Packet"); + proto_tree_add_uint(ip_tree, hf_ip_len, tvb, offset + 2, 2, iph.ip_len); + proto_tree_add_uint(ip_tree, hf_ip_id, tvb, offset + 4, 2, iph.ip_id); + + flags = (iph.ip_off & (IP_DF|IP_MF)) >> 12; + tf = proto_tree_add_uint(ip_tree, hf_ip_flags, tvb, offset + 6, 1, flags); + field_tree = proto_item_add_subtree(tf, ett_ip_off); + proto_tree_add_boolean(field_tree, hf_ip_flags_df, tvb, offset + 6, 1, flags), + proto_tree_add_boolean(field_tree, hf_ip_flags_mf, tvb, offset + 6, 1, flags), + + proto_tree_add_uint(ip_tree, hf_ip_frag_offset, tvb, offset + 6, 2, + (iph.ip_off & IP_OFFSET)*8); + proto_tree_add_uint(ip_tree, hf_ip_ttl, tvb, offset + 8, 1, iph.ip_ttl); + proto_tree_add_uint_format(ip_tree, hf_ip_proto, tvb, offset + 9, 1, iph.ip_p, + "Protocol: %s (0x%02x)", ipprotostr(iph.ip_p), iph.ip_p); + + ipsum = ip_checksum(tvb_get_ptr(tvb, offset, hlen), hlen); + if (ipsum == 0) { + proto_tree_add_uint_format(ip_tree, hf_ip_checksum, tvb, offset + 10, 2, iph.ip_sum, + "Header checksum: 0x%04x (correct)", iph.ip_sum); + } + else { + proto_tree_add_uint_format(ip_tree, hf_ip_checksum, tvb, offset + 10, 2, iph.ip_sum, + "Header checksum: 0x%04x (incorrect, should be 0x%04x)", iph.ip_sum, + ip_checksum_shouldbe(iph.ip_sum, ipsum)); } - /* Start Decoding Here. */ - while (1) { - if (!BYTES_ARE_IN_FRAME(offset, 4)) { - old_dissect_data(pd, offset, fd, tree); - return; - } + proto_tree_add_ipv4(ip_tree, hf_ip_src, tvb, offset + 12, 4, iph.ip_src); + proto_tree_add_ipv4(ip_tree, hf_ip_dst, tvb, offset + 16, 4, iph.ip_dst); + proto_tree_add_ipv4_hidden(ip_tree, hf_ip_addr, tvb, offset + 12, 4, iph.ip_src); + proto_tree_add_ipv4_hidden(ip_tree, hf_ip_addr, tvb, offset + 16, 4, iph.ip_dst); + + /* Decode IP options, if any. */ + if (hlen > sizeof (e_ip)) { + /* There's more than just the fixed-length header. Decode the + options. */ + optlen = hlen - sizeof (e_ip); /* length of options, in bytes */ + tf = proto_tree_add_text(ip_tree, tvb, offset + 20, optlen, + "Options: (%u bytes)", optlen); + field_tree = proto_item_add_subtree(tf, ett_ip_options); + dissect_ip_tcp_options(tvb, offset + 20, optlen, + ipopts, N_IP_OPTS, IPOPT_END, field_tree); + } + } - decode_mpls_label(pd+offset, &label, &exp, &bos, &ttl); + pinfo->ipproto = iph.ip_p; + pinfo->iplen = iph.ip_len; + pinfo->iphdrlen = lo_nibble(iph.ip_v_hl); + SET_ADDRESS(&pinfo->net_src, AT_IPv4, 4, tvb_get_ptr(tvb, offset + IPH_SRC, 4)); + SET_ADDRESS(&pinfo->src, AT_IPv4, 4, tvb_get_ptr(tvb, offset + IPH_SRC, 4)); + SET_ADDRESS(&pinfo->net_dst, AT_IPv4, 4, tvb_get_ptr(tvb, offset + IPH_DST, 4)); + SET_ADDRESS(&pinfo->dst, AT_IPv4, 4, tvb_get_ptr(tvb, offset + IPH_DST, 4)); + + /* Skip over header + options */ + offset += hlen; + nxt = iph.ip_p; + if (iph.ip_off & IP_OFFSET) { + /* fragmented */ + if (check_col(pinfo->fd, COL_PROTOCOL)) + col_set_str(pinfo->fd, COL_PROTOCOL, "IP"); + if (check_col(pinfo->fd, COL_INFO)) + col_add_fstr(pinfo->fd, COL_INFO, "Fragmented IP protocol (proto=%s 0x%02x, off=%u)", + ipprotostr(iph.ip_p), iph.ip_p, (iph.ip_off & IP_OFFSET) * 8); + dissect_data(tvb, offset, pinfo, tree); + return; + } + + /* Hand off to the next protocol. + + XXX - setting the columns only after trying various dissectors means + that if one of those dissectors throws an exception, the frame won't + even be labelled as an IP frame; ideally, if a frame being dissected + throws an exception, it'll be labelled as a mangled frame of the + type in question. */ + next_tvb = tvb_new_subset(tvb, offset, -1, -1); + if (!dissector_try_port(ip_dissector_table, nxt, next_tvb, pinfo, tree)) { + /* Unknown protocol */ + if (check_col(pinfo->fd, COL_PROTOCOL)) + col_set_str(pinfo->fd, COL_PROTOCOL, "IP"); + if (check_col(pinfo->fd, COL_INFO)) + col_add_fstr(pinfo->fd, COL_INFO, "%s (0x%02x)", ipprotostr(iph.ip_p), iph.ip_p); + dissect_data(next_tvb, 0, pinfo, tree); + } +} - if (tree) { - ti = proto_tree_add_item(tree, proto_mpls, NullTVB, offset, 4, FALSE); - mpls_tree = proto_item_add_subtree(ti, ett_mpls); +static const gchar *unreach_str[] = {"Network unreachable", + "Host unreachable", + "Protocol unreachable", + "Port unreachable", + "Fragmentation needed", + "Source route failed", + "Destination network unknown", + "Destination host unknown", + "Source host isolated", + "Network administratively prohibited", + "Host administratively prohibited", + "Network unreachable for TOS", + "Host unreachable for TOS", + "Communication administratively filtered", + "Host precedence violation", + "Precedence cutoff in effect"}; + +#define N_UNREACH (sizeof unreach_str / sizeof unreach_str[0]) + +static const gchar *redir_str[] = {"Redirect for network", + "Redirect for host", + "Redirect for TOS and network", + "Redirect for TOS and host"}; + +#define N_REDIRECT (sizeof redir_str / sizeof redir_str[0]) + +static const gchar *ttl_str[] = {"TTL equals 0 during transit", + "TTL equals 0 during reassembly"}; + +#define N_TIMXCEED (sizeof ttl_str / sizeof ttl_str[0]) - if (label <= MAX_RESERVED) - proto_tree_add_uint_format(mpls_tree, mpls_filter[MPLSF_LABEL], NullTVB, - offset, 3, label, "Label: %d (%s)", - label, val_to_str(label, special_labels, - "Reserved - Unknown")); - else - proto_tree_add_uint(mpls_tree, mpls_filter[MPLSF_LABEL], NullTVB, - offset, 3, label); - - proto_tree_add_uint(mpls_tree,mpls_filter[MPLSF_EXP], NullTVB, - offset+2,1, exp); - proto_tree_add_uint(mpls_tree,mpls_filter[MPLSF_BOTTOM_OF_STACK], NullTVB, - offset+2,1, bos); - proto_tree_add_uint(mpls_tree,mpls_filter[MPLSF_TTL], NullTVB, - offset+3,1, ttl); - } - offset += 4; - if (bos) break; +static const gchar *par_str[] = {"IP header bad", "Required option missing"}; + +#define N_PARAMPROB (sizeof par_str / sizeof par_str[0]) + +static void +dissect_icmp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) +{ + proto_tree *icmp_tree; + proto_item *ti; + guint8 icmp_type; + guint8 icmp_code; + guint length, reported_length; + guint16 cksum, computed_cksum; + gchar type_str[64], code_str[64] = ""; + guint8 num_addrs = 0; + guint8 addr_entry_size = 0; + int i; + + CHECK_DISPLAY_AS_DATA(proto_icmp, tvb, pinfo, tree); + + pinfo->current_proto = "ICMP"; + + /* To do: check for runts, errs, etc. */ + icmp_type = tvb_get_guint8(tvb, 0); + icmp_code = tvb_get_guint8(tvb, 1); + cksum = tvb_get_ntohs(tvb, 2); + + switch (icmp_type) { + case ICMP_ECHOREPLY: + strcpy(type_str, "Echo (ping) reply"); + break; + case ICMP_UNREACH: + strcpy(type_str, "Destination unreachable"); + if (icmp_code < N_UNREACH) { + sprintf(code_str, "(%s)", unreach_str[icmp_code]); + } else { + strcpy(code_str, "(Unknown - error?)"); + } + break; + case ICMP_SOURCEQUENCH: + strcpy(type_str, "Source quench (flow control)"); + break; + case ICMP_REDIRECT: + strcpy(type_str, "Redirect"); + if (icmp_code < N_REDIRECT) { + sprintf(code_str, "(%s)", redir_str[icmp_code]); + } else { + strcpy(code_str, "(Unknown - error?)"); + } + break; + case ICMP_ECHO: + strcpy(type_str, "Echo (ping) request"); + break; + case ICMP_RTRADVERT: + strcpy(type_str, "Router advertisement"); + break; + case ICMP_RTRSOLICIT: + strcpy(type_str, "Router solicitation"); + break; + case ICMP_TIMXCEED: + strcpy(type_str, "Time-to-live exceeded"); + if (icmp_code < N_TIMXCEED) { + sprintf(code_str, "(%s)", ttl_str[icmp_code]); + } else { + strcpy(code_str, "(Unknown - error?)"); + } + break; + case ICMP_PARAMPROB: + strcpy(type_str, "Parameter problem"); + if (icmp_code < N_PARAMPROB) { + sprintf(code_str, "(%s)", par_str[icmp_code]); + } else { + strcpy(code_str, "(Unknown - error?)"); + } + break; + case ICMP_TSTAMP: + strcpy(type_str, "Timestamp request"); + break; + case ICMP_TSTAMPREPLY: + strcpy(type_str, "Timestamp reply"); + break; + case ICMP_IREQ: + strcpy(type_str, "Information request"); + break; + case ICMP_IREQREPLY: + strcpy(type_str, "Information reply"); + break; + case ICMP_MASKREQ: + strcpy(type_str, "Address mask request"); + break; + case ICMP_MASKREPLY: + strcpy(type_str, "Address mask reply"); + break; + default: + strcpy(type_str, "Unknown ICMP (obsolete or malformed?)"); + } + + if (check_col(pinfo->fd, COL_PROTOCOL)) + col_set_str(pinfo->fd, COL_PROTOCOL, "ICMP"); + if (check_col(pinfo->fd, COL_INFO)) + col_add_str(pinfo->fd, COL_INFO, type_str); + + if (tree) { + length = tvb_length(tvb); + reported_length = tvb_reported_length(tvb); + ti = proto_tree_add_item(tree, proto_icmp, tvb, 0, length, FALSE); + icmp_tree = proto_item_add_subtree(ti, ett_icmp); + proto_tree_add_uint_format(icmp_tree, hf_icmp_type, tvb, 0, 1, + icmp_type, + "Type: %u (%s)", + icmp_type, type_str); + proto_tree_add_uint_format(icmp_tree, hf_icmp_code, tvb, 1, 1, + icmp_code, + "Code: %u %s", + icmp_code, code_str); + + if (length >= reported_length) { + /* The packet isn't truncated, so we can checksum it. + XXX - we have to check whether this is part of a fragmented + IP datagram, too.... */ + + computed_cksum = ip_checksum(tvb_get_ptr(tvb, 0, reported_length), + reported_length); + if (computed_cksum == 0) { + proto_tree_add_uint_format(icmp_tree, hf_icmp_checksum, tvb, 2, 2, + cksum, + "Checksum: 0x%04x (correct)", cksum); + } else { + proto_tree_add_uint_format(icmp_tree, hf_icmp_checksum, tvb, 2, 2, + cksum, + "Checksum: 0x%04x (incorrect, should be 0x%04x)", + cksum, ip_checksum_shouldbe(cksum, computed_cksum)); + } + } else { + proto_tree_add_uint(icmp_tree, hf_icmp_checksum, tvb, 2, 2, cksum); } - old_call_dissector(ip_handle, pd, offset, fd, tree); + + /* Decode the second 4 bytes of the packet. */ + switch (icmp_type) { + case ICMP_ECHOREPLY: + case ICMP_ECHO: + case ICMP_TSTAMP: + case ICMP_TSTAMPREPLY: + case ICMP_IREQ: + case ICMP_IREQREPLY: + case ICMP_MASKREQ: + case ICMP_MASKREPLY: + proto_tree_add_text(icmp_tree, tvb, 4, 2, "Identifier: 0x%04x", + tvb_get_ntohs(tvb, 4)); + proto_tree_add_text(icmp_tree, tvb, 6, 2, "Sequence number: %02x:%02x", + tvb_get_guint8(tvb, 6), tvb_get_guint8(tvb, 7)); + break; + + case ICMP_UNREACH: + switch (icmp_code) { + case ICMP_FRAG_NEEDED: + proto_tree_add_text(icmp_tree, tvb, 6, 2, "MTU of next hop: %u", + tvb_get_ntohs(tvb, 6)); + break; + } + break; + + case ICMP_RTRADVERT: + num_addrs = tvb_get_guint8(tvb, 4); + proto_tree_add_text(icmp_tree, tvb, 4, 1, "Number of addresses: %u", + num_addrs); + addr_entry_size = tvb_get_guint8(tvb, 5); + proto_tree_add_text(icmp_tree, tvb, 5, 1, "Address entry size: %u", + addr_entry_size); + proto_tree_add_text(icmp_tree, tvb, 6, 2, "Lifetime: %s", + time_secs_to_str(tvb_get_ntohs(tvb, 6))); + break; + + case ICMP_PARAMPROB: + proto_tree_add_text(icmp_tree, tvb, 4, 1, "Pointer: %u", + tvb_get_guint8(tvb, 4)); + break; + + case ICMP_REDIRECT: + proto_tree_add_text(icmp_tree, tvb, 4, 4, "Gateway address: %s", + ip_to_str(tvb_get_ptr(tvb, 4, 4))); + break; + } + + /* Decode the additional information in the packet. */ + switch (icmp_type) { + case ICMP_UNREACH: + case ICMP_TIMXCEED: + case ICMP_PARAMPROB: + case ICMP_SOURCEQUENCH: + case ICMP_REDIRECT: + /* Decode the IP header and first 64 bits of data from the + original datagram. + + XXX - for now, just display it as data; not all dissection + routines can handle a short packet without exploding. */ + dissect_data(tvb, 8, pinfo, icmp_tree); + break; + + case ICMP_ECHOREPLY: + case ICMP_ECHO: + dissect_data(tvb, 8, pinfo, icmp_tree); + break; + + case ICMP_RTRADVERT: + if (addr_entry_size == 2) { + for (i = 0; i < num_addrs; i++) { + proto_tree_add_text(icmp_tree, tvb, 8 + (i*8), 4, + "Router address: %s", + ip_to_str(tvb_get_ptr(tvb, 8 + (i*8), 4))); + proto_tree_add_text(icmp_tree, tvb, 12 + (i*8), 4, + "Preference level: %u", tvb_get_ntohl(tvb, 12 + (i*8))); + } + } else + dissect_data(tvb, 8, pinfo, icmp_tree); + break; + + case ICMP_TSTAMP: + case ICMP_TSTAMPREPLY: + proto_tree_add_text(icmp_tree, tvb, 8, 4, "Originate timestamp: %u", + tvb_get_ntohl(tvb, 8)); + proto_tree_add_text(icmp_tree, tvb, 12, 4, "Receive timestamp: %u", + tvb_get_ntohl(tvb, 12)); + proto_tree_add_text(icmp_tree, tvb, 16, 4, "Transmit timestamp: %u", + tvb_get_ntohl(tvb, 16)); + break; + + case ICMP_MASKREQ: + case ICMP_MASKREPLY: + proto_tree_add_text(icmp_tree, tvb, 8, 4, "Address mask: %s (0x%8x)", + ip_to_str(tvb_get_ptr(tvb, 8, 4)), tvb_get_ntohl(tvb, 8)); + break; + } + } +} + +static void +dissect_igmp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) +{ + e_igmp ih; + proto_tree *igmp_tree; + proto_item *ti; + gchar *type_str; + + CHECK_DISPLAY_AS_DATA(proto_igmp, tvb, pinfo, tree); + + pinfo->current_proto = "IGMP"; + if (check_col(pinfo->fd, COL_PROTOCOL)) + col_set_str(pinfo->fd, COL_PROTOCOL, "IGMP"); + + /* Avoids alignment problems on many architectures. */ + memcpy(&ih, tvb_get_ptr(tvb, 0, sizeof(e_igmp)), sizeof(e_igmp)); + + switch (lo_nibble(ih.igmp_v_t)) { + case IGMP_M_QRY: + type_str = "Router query"; + break; + case IGMP_V1_M_RPT: + type_str = "Host response (v1)"; + break; + case IGMP_V2_LV_GRP: + type_str = "Leave group (v2)"; + break; + case IGMP_DVMRP: + type_str = "DVMRP"; + break; + case IGMP_PIM: + type_str = "PIM"; + break; + case IGMP_V2_M_RPT: + type_str = "Host response (v2)"; + break; + case IGMP_MTRC_RESP: + type_str = "Traceroute response"; + break; + case IGMP_MTRC: + type_str = "Traceroute message"; + break; + default: + type_str = "Unknown IGMP"; + } + + if (check_col(pinfo->fd, COL_INFO)) + col_add_str(pinfo->fd, COL_INFO, type_str); + if (tree) { + ti = proto_tree_add_item(tree, proto_igmp, tvb, 0, 8, FALSE); + igmp_tree = proto_item_add_subtree(ti, ett_igmp); + proto_tree_add_uint(igmp_tree, hf_igmp_version, tvb, 0, 1, + hi_nibble(ih.igmp_v_t)); + proto_tree_add_uint_format(igmp_tree, hf_igmp_type, tvb, 0 , 1, + lo_nibble(ih.igmp_v_t), + "Type: %u (%s)", + lo_nibble(ih.igmp_v_t), type_str); + proto_tree_add_item(igmp_tree, hf_igmp_unused, tvb, 1, 1, FALSE); + proto_tree_add_item(igmp_tree, hf_igmp_checksum, tvb, 2, 2, FALSE); + proto_tree_add_ipv4(igmp_tree, hf_igmp_group, tvb, 4, 4, ih.igmp_gaddr); + } } void -proto_register_mpls(void) +proto_register_igmp(void) { + static hf_register_info hf[] = { + + { &hf_igmp_version, + { "Version", "igmp.version", FT_UINT8, BASE_DEC, NULL, 0x0, + "" }}, + + { &hf_igmp_type, + { "Type", "igmp.type", FT_UINT8, BASE_DEC, NULL, 0x0, + "" }}, + + { &hf_igmp_unused, + { "Unused", "igmp.unused", FT_UINT8, BASE_HEX, NULL, 0x0, + "" }}, + + { &hf_igmp_checksum, + { "Checksum", "igmp.checksum", FT_UINT16, BASE_HEX, NULL, 0x0, + "" }}, + + { &hf_igmp_group, + { "Group address", "igmp.group", FT_IPv4, BASE_NONE, NULL, 0x0, + "" }}, + }; static gint *ett[] = { - &ett_mpls, + &ett_igmp, }; - proto_mpls = proto_register_protocol("MultiProtocol Label Switching Header", "mpls"); - proto_register_field_array(proto_mpls, mplsf_info, array_length(mplsf_info)); + proto_igmp = proto_register_protocol ("Internet Group Management Protocol", "igmp"); + proto_register_field_array(proto_igmp, hf, array_length(hf)); proto_register_subtree_array(ett, array_length(ett)); } void -proto_reg_handoff_mpls(void) +proto_reg_handoff_igmp(void) { - old_dissector_add("ethertype", ETHERTYPE_MPLS, dissect_mpls); + dissector_add("ip.proto", IP_PROTO_IGMP, dissect_igmp); +} - /* - * Get a handle for the IP dissector. - */ - ip_handle = find_dissector("ip"); +void +proto_register_ip(void) +{ + static hf_register_info hf[] = { + + { &hf_ip_version, + { "Version", "ip.version", FT_UINT8, BASE_DEC, NULL, 0x0, + "" }}, + + { &hf_ip_hdr_len, + { "Header Length", "ip.hdr_len", FT_UINT8, BASE_DEC, NULL, 0x0, + "" }}, + + { &hf_ip_dsfield, + { "Differentiated Services field", "ip.dsfield", FT_UINT8, BASE_DEC, NULL, 0x0, + "" }}, + + { &hf_ip_dsfield_dscp, + { "Differentiated Services Codepoint", "ip.dsfield.dscp", FT_UINT8, BASE_HEX, + VALS(dscp_vals), IPDSFIELD_DSCP_MASK, + "" }}, + + { &hf_ip_dsfield_ect, + { "ECN-Capable Transport (ECT)", "ip.dsfield.ect", FT_UINT8, BASE_DEC, NULL, + IPDSFIELD_ECT_MASK, + "" }}, + + { &hf_ip_dsfield_ce, + { "ECN-CE", "ip.dsfield.ce", FT_UINT8, BASE_DEC, NULL, + IPDSFIELD_CE_MASK, + "" }}, + + { &hf_ip_tos, + { "Type of Service", "ip.tos", FT_UINT8, BASE_DEC, NULL, 0x0, + "" }}, + + { &hf_ip_tos_precedence, + { "Precedence", "ip.tos.precedence", FT_UINT8, BASE_DEC, VALS(precedence_vals), + IPTOS_PREC_MASK, + "" }}, + + { &hf_ip_tos_delay, + { "Delay", "ip.tos.delay", FT_BOOLEAN, 8, TFS(&tos_set_low), + IPTOS_LOWDELAY, + "" }}, + + { &hf_ip_tos_throughput, + { "Throughput", "ip.tos.throughput", FT_BOOLEAN, 8, TFS(&tos_set_high), + IPTOS_THROUGHPUT, + "" }}, + + { &hf_ip_tos_reliability, + { "Reliability", "ip.tos.reliability", FT_BOOLEAN, 8, TFS(&tos_set_high), + IPTOS_RELIABILITY, + "" }}, + + { &hf_ip_tos_cost, + { "Cost", "ip.tos.cost", FT_BOOLEAN, 8, TFS(&tos_set_low), + IPTOS_LOWCOST, + "" }}, + + { &hf_ip_len, + { "Total Length", "ip.len", FT_UINT16, BASE_DEC, NULL, 0x0, + "" }}, + + { &hf_ip_id, + { "Identification", "ip.id", FT_UINT16, BASE_HEX, NULL, 0x0, + "" }}, + + { &hf_ip_dst, + { "Destination", "ip.dst", FT_IPv4, BASE_NONE, NULL, 0x0, + "" }}, + + { &hf_ip_src, + { "Source", "ip.src", FT_IPv4, BASE_NONE, NULL, 0x0, + "" }}, + + { &hf_ip_addr, + { "Source or Destination Address", "ip.addr", FT_IPv4, BASE_NONE, NULL, 0x0, + "" }}, + + { &hf_ip_flags, + { "Flags", "ip.flags", FT_UINT8, BASE_HEX, NULL, 0x0, + "" }}, + + { &hf_ip_flags_df, + { "Don't fragment", "ip.flags.df", FT_BOOLEAN, 4, TFS(&flags_set_truth), IP_DF>>12, + "" }}, + + { &hf_ip_flags_mf, + { "More fragments", "ip.flags.mf", FT_BOOLEAN, 4, TFS(&flags_set_truth), IP_MF>>12, + "" }}, + + { &hf_ip_frag_offset, + { "Fragment offset", "ip.frag_offset", FT_UINT16, BASE_DEC, NULL, 0x0, + "" }}, + + { &hf_ip_ttl, + { "Time to live", "ip.ttl", FT_UINT8, BASE_DEC, NULL, 0x0, + "" }}, + + { &hf_ip_proto, + { "Protocol", "ip.proto", FT_UINT8, BASE_HEX, NULL, 0x0, + "" }}, + + { &hf_ip_checksum, + { "Header checksum", "ip.checksum", FT_UINT16, BASE_HEX, NULL, 0x0, + "" }}, + }; + static gint *ett[] = { + &ett_ip, + &ett_ip_dsfield, + &ett_ip_tos, + &ett_ip_off, + &ett_ip_options, + &ett_ip_option_sec, + &ett_ip_option_route, + &ett_ip_option_timestamp, + }; + module_t *ip_module; + + proto_ip = proto_register_protocol ("Internet Protocol", "ip"); + proto_register_field_array(proto_ip, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); + + /* subdissector code */ + ip_dissector_table = register_dissector_table("ip.proto"); + + /* Register a configuration option for decoding TOS as DSCP */ + ip_module = prefs_register_module("ip", "IP", NULL); + prefs_register_bool_preference(ip_module, "decode_tos_as_diffserv", + "Decode IPv4 TOS field as DiffServ field", +"Whether the IPv4 type-of-service field should be decoded as a Differentiated Services field", + &g_ip_dscp_actif); + + register_dissector("ip", dissect_ip); +} + +void +proto_reg_handoff_ip(void) +{ + dissector_add("ethertype", ETHERTYPE_IP, dissect_ip); + dissector_add("ppp.protocol", PPP_IP, dissect_ip); + dissector_add("ppp.protocol", CISCO_IP, dissect_ip); + dissector_add("llc.dsap", SAP_IP, dissect_ip); + dissector_add("ip.proto", IP_PROTO_IPV4, dissect_ip); + dissector_add("ip.proto", IP_PROTO_IPIP, dissect_ip); + dissector_add("null.type", BSD_AF_INET, dissect_ip); +} + +void +proto_register_icmp(void) +{ + static hf_register_info hf[] = { + + { &hf_icmp_type, + { "Type", "icmp.type", FT_UINT8, BASE_DEC, NULL, 0x0, + "" }}, + + { &hf_icmp_code, + { "Code", "icmp.code", FT_UINT8, BASE_HEX, NULL, 0x0, + "" }}, + + { &hf_icmp_checksum, + { "Checksum", "icmp.checksum", FT_UINT16, BASE_HEX, NULL, 0x0, + "" }}, + }; + static gint *ett[] = { + &ett_icmp, + }; + + proto_icmp = proto_register_protocol ("Internet Control Message Protocol", + "icmp"); + proto_register_field_array(proto_icmp, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); +} + +void +proto_reg_handoff_icmp(void) +{ + dissector_add("ip.proto", IP_PROTO_ICMP, dissect_icmp); }
--- ppptypes.h Mon Apr 17 06:37:08 2000 +++ ../changed/ppptypes.h Thu Dec 14 11:43:41 2000 @@ -40,6 +40,8 @@ #define PPP_MP 0x3d /* Multilink PPP */ #define PPP_IPV6 0x57 /* Internet Protocol Version 6 */ #define PPP_COMP 0xfd /* compressed packet */ +#define PPP_MPLS_UNI 0x281 /* MPLS Unicast */ +#define PPP_MPLS_MULTI 0x281 /* MPLS Multicast */ #define PPP_IPCP 0x8021 /* IP Control Protocol */ #define PPP_ATCP 0x8029 /* AppleTalk Control Protocol */ #define PPP_IPXCP 0x802b /* IPX Control Protocol */ @@ -49,5 +51,13 @@ #define PPP_LQR 0xc025 /* Link Quality Report protocol */ #define PPP_CHAP 0xc223 /* Cryptographic Handshake Auth. Protocol */ #define PPP_CBCP 0xc029 /* Callback Control Protocol */ + +/* Protocol types for the CISCO HDLC Format */ +#define CISCO_IP 0x0800 /* Internet Protocol */ +#define CISCO_SLARP 0x8035 /* CISCO SLARP protocol */ + +/* Address and control field for CISCO HDLC */ +#define CISCO_HDLC_ADDR_CTRL 0x0F00 /* Internet Protocol */ + #endif /* ppptypes.h */
- Follow-Ups:
- [Ethereal-dev] Re: [PATCH] Changes to PPP protocol
- From: Burke Lau
- Re: [Ethereal-dev] [PATCH] Changes to PPP protocol
- From: Guy Harris
- [Ethereal-dev] Re: [PATCH] Changes to PPP protocol
- Prev by Date: Re: [Ethereal-dev] Re: format string in ssl dump
- Next by Date: [Ethereal-dev] Re: [PATCH] Changes to PPP protocol
- Previous by thread: Re: [Ethereal-dev] Re: format string in ssl dump
- Next by thread: [Ethereal-dev] Re: [PATCH] Changes to PPP protocol
- Index(es):