wireshark/epan/dissectors/packet-icmp.c
Michael Mann 1e60d63c8c Create call_data_dissector() to call data dissector.
This saves many dissectors the need to find the data dissector and store a handle to it.

There were also some that were finding it, but not using it.
For others this was the only reason for their handoff function, so it could be eliminated.

Change-Id: I5d3f951ee1daa3d30c060d21bd12bbc881a8027b
Reviewed-on: https://code.wireshark.org/review/14530
Petri-Dish: Michael Mann <mmann78@netscape.net>
Reviewed-by: Michael Mann <mmann78@netscape.net>
2016-03-20 17:38:03 +00:00

2064 lines
60 KiB
C

/* packet-icmp.c
* Routines for ICMP - Internet Control Message Protocol
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* Monday, June 27, 2005
* Support for the ICMP extensions for MPLS
* (http://www.ietf.org/proceedings/01aug/I-D/draft-ietf-mpls-icmp-02.txt
* which has been replaced by rfcs 4884 and 4950)
* by Maria-Luiza Crivat <luizacri@gmail.com>
* & Brice Augustin <bricecotte@gmail.com>
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Added support for ICMP extensions RFC 4884 and RFC 5837
* (c) 2011 Gaurav Tungatkar <gstungat@ncsu.edu>
*/
#include "config.h"
#include <epan/packet.h>
#include <epan/prefs.h>
#include <epan/expert.h>
#include <epan/in_cksum.h>
#include <epan/to_str.h>
#include <epan/conversation.h>
#include <epan/tap.h>
#include <epan/ipproto.h>
#include <epan/capture_dissectors.h>
#include <epan/proto_data.h>
#include "packet-ip.h"
#include "packet-icmp.h"
void proto_register_icmp(void);
void proto_reg_handoff_icmp(void);
static int icmp_tap = -1;
/* Conversation related data */
static int hf_icmp_resp_in = -1;
static int hf_icmp_resp_to = -1;
static int hf_icmp_no_resp = -1;
static int hf_icmp_resptime = -1;
static int hf_icmp_data_time = -1;
static int hf_icmp_data_time_relative = -1;
typedef struct _icmp_conv_info_t {
wmem_tree_t *unmatched_pdus;
wmem_tree_t *matched_pdus;
} icmp_conv_info_t;
static icmp_transaction_t *transaction_start(packet_info * pinfo,
proto_tree * tree,
guint32 * key);
static icmp_transaction_t *transaction_end(packet_info * pinfo,
proto_tree * tree,
guint32 * key);
/* Decode the end of the ICMP payload as ICMP MPLS extensions
if the packet in the payload has more than 128 bytes */
static gboolean favor_icmp_mpls_ext = FALSE;
int proto_icmp = -1;
static int hf_icmp_type = -1;
static int hf_icmp_code = -1;
static int hf_icmp_checksum = -1;
static int hf_icmp_checksum_bad = -1;
static int hf_icmp_unused = -1;
static int hf_icmp_reserved = -1;
static int hf_icmp_ident = -1;
static int hf_icmp_ident_le = -1;
static int hf_icmp_seq_num = -1;
static int hf_icmp_seq_num_le = -1;
static int hf_icmp_mtu = -1;
static int hf_icmp_num_addrs = -1;
static int hf_icmp_addr_entry_size = -1;
static int hf_icmp_lifetime = -1;
static int hf_icmp_pointer = -1;
static int hf_icmp_router_address = -1;
static int hf_icmp_pref_level = -1;
static int hf_icmp_redir_gw = -1;
static int hf_icmp_originate_timestamp = -1;
static int hf_icmp_receive_timestamp = -1;
static int hf_icmp_transmit_timestamp = -1;
static int hf_icmp_address_mask = -1;
static int hf_icmp_length = -1;
static int hf_icmp_length_original_datagram = -1;
/* Mobile ip */
static int hf_icmp_mip_type = -1;
static int hf_icmp_mip_length = -1;
static int hf_icmp_mip_prefix_length = -1;
static int hf_icmp_mip_seq = -1;
static int hf_icmp_mip_life = -1;
static int hf_icmp_mip_flags = -1;
static int hf_icmp_mip_r = -1;
static int hf_icmp_mip_b = -1;
static int hf_icmp_mip_h = -1;
static int hf_icmp_mip_f = -1;
static int hf_icmp_mip_m = -1;
static int hf_icmp_mip_g = -1;
static int hf_icmp_mip_v = -1;
static int hf_icmp_mip_rt = -1;
static int hf_icmp_mip_u = -1;
static int hf_icmp_mip_x = -1;
static int hf_icmp_mip_reserved = -1;
static int hf_icmp_mip_coa = -1;
static int hf_icmp_mip_challenge = -1;
static int hf_icmp_mip_content = -1;
/* extensions RFC 4884*/
static int hf_icmp_ext = -1;
static int hf_icmp_ext_version = -1;
static int hf_icmp_ext_reserved = -1;
static int hf_icmp_ext_checksum = -1;
static int hf_icmp_ext_checksum_bad = -1;
static int hf_icmp_ext_length = -1;
static int hf_icmp_ext_class = -1;
static int hf_icmp_ext_c_type = -1;
static int hf_icmp_ext_data = -1;
/* Interface information extension RFC 5837 */
static int hf_icmp_int_info_ifindex = -1;
static int hf_icmp_int_info_ipaddr = -1;
static int hf_icmp_int_info_name = -1;
static int hf_icmp_int_info_mtu = -1;
static int hf_icmp_int_info_index = -1;
static int hf_icmp_int_info_afi = -1;
static int hf_icmp_int_info_ipv4 = -1;
static int hf_icmp_int_info_ipv6 = -1;
static int hf_icmp_int_info_ipunknown = -1;
static int hf_icmp_int_info_name_length = -1;
static int hf_icmp_int_info_name_string = -1;
static int hf_icmp_int_info_role = -1;
static int hf_icmp_int_info_reserved = -1;
static gint ett_icmp_interface_info_object = -1;
static gint ett_icmp_interface_ipaddr = -1;
static gint ett_icmp_interface_name = -1;
/* MPLS extension object*/
static int hf_icmp_mpls_label = -1;
static int hf_icmp_mpls_exp = -1;
static int hf_icmp_mpls_s = -1;
static int hf_icmp_mpls_ttl = -1;
static int hf_icmp_mpls_data = -1;
static gint ett_icmp = -1;
static gint ett_icmp_mip = -1;
static gint ett_icmp_mip_flags = -1;
/* extensions */
static gint ett_icmp_ext = -1;
static gint ett_icmp_ext_object = -1;
/* MPLS extensions */
static gint ett_icmp_mpls_stack_object = -1;
static expert_field ei_icmp_resp_not_found = EI_INIT;
static expert_field ei_icmp_checksum = EI_INIT;
/* ICMP definitions */
#define ICMP_ECHOREPLY 0
#define ICMP_UNREACH 3
#define ICMP_SOURCEQUENCH 4
#define ICMP_REDIRECT 5
#define ICMP_ALTHOST 6
#define ICMP_ECHO 8
#define ICMP_RTRADVERT 9
#define ICMP_RTRSOLICIT 10
#define ICMP_TIMXCEED 11
#define ICMP_PARAMPROB 12
#define ICMP_TSTAMP 13
#define ICMP_TSTAMPREPLY 14
#define ICMP_IREQ 15
#define ICMP_IREQREPLY 16
#define ICMP_MASKREQ 17
#define ICMP_MASKREPLY 18
#define ICMP_PHOTURIS 40
/* ICMP UNREACHABLE */
#define ICMP_NET_UNREACH 0 /* Network Unreachable */
#define ICMP_HOST_UNREACH 1 /* Host Unreachable */
#define ICMP_PROT_UNREACH 2 /* Protocol Unreachable */
#define ICMP_PORT_UNREACH 3 /* Port Unreachable */
#define ICMP_FRAG_NEEDED 4 /* Fragmentation Needed/DF set */
#define ICMP_SR_FAILED 5 /* Source Route failed */
#define ICMP_NET_UNKNOWN 6
#define ICMP_HOST_UNKNOWN 7
#define ICMP_HOST_ISOLATED 8
#define ICMP_NET_ANO 9
#define ICMP_HOST_ANO 10
#define ICMP_NET_UNR_TOS 11
#define ICMP_HOST_UNR_TOS 12
#define ICMP_PKT_FILTERED 13 /* Packet filtered */
#define ICMP_PREC_VIOLATION 14 /* Precedence violation */
#define ICMP_PREC_CUTOFF 15 /* Precedence cut off */
#define ICMP_MIP_EXTENSION_PAD 0
#define ICMP_MIP_MOB_AGENT_ADV 16
#define ICMP_MIP_PREFIX_LENGTHS 19
#define ICMP_MIP_CHALLENGE 24
static dissector_handle_t ip_handle;
static const value_string icmp_type_str[] = {
{ICMP_ECHOREPLY, "Echo (ping) reply"},
{1, "Reserved"},
{2, "Reserved"},
{ICMP_UNREACH, "Destination unreachable"},
{ICMP_SOURCEQUENCH, "Source quench (flow control)"},
{ICMP_REDIRECT, "Redirect"},
{ICMP_ALTHOST, "Alternate host address"},
{ICMP_ECHO, "Echo (ping) request"},
{ICMP_RTRADVERT, "Router advertisement"},
{ICMP_RTRSOLICIT, "Router solicitation"},
{ICMP_TIMXCEED, "Time-to-live exceeded"},
{ICMP_PARAMPROB, "Parameter problem"},
{ICMP_TSTAMP, "Timestamp request"},
{ICMP_TSTAMPREPLY, "Timestamp reply"},
{ICMP_IREQ, "Information request"},
{ICMP_IREQREPLY, "Information reply"},
{ICMP_MASKREQ, "Address mask request"},
{ICMP_MASKREPLY, "Address mask reply"},
{19, "Reserved (for security)"},
{30, "Traceroute"},
{31, "Datagram Conversion Error"},
{32, "Mobile Host Redirect"},
{33, "IPv6 Where-Are-You"},
{34, "IPv6 I-Am-Here"},
{35, "Mobile Registration Request"},
{36, "Mobile Registration Reply"},
{37, "Domain Name Request"},
{38, "Domain Name Reply"},
{39, "SKIP"},
{ICMP_PHOTURIS, "Photuris"},
{41, "Experimental mobility protocols"},
{0, NULL}
};
static const value_string unreach_code_str[] = {
{ICMP_NET_UNREACH, "Network unreachable"},
{ICMP_HOST_UNREACH, "Host unreachable"},
{ICMP_PROT_UNREACH, "Protocol unreachable"},
{ICMP_PORT_UNREACH, "Port unreachable"},
{ICMP_FRAG_NEEDED, "Fragmentation needed"},
{ICMP_SR_FAILED, "Source route failed"},
{ICMP_NET_UNKNOWN, "Destination network unknown"},
{ICMP_HOST_UNKNOWN, "Destination host unknown"},
{ICMP_HOST_ISOLATED, "Source host isolated"},
{ICMP_NET_ANO, "Network administratively prohibited"},
{ICMP_HOST_ANO, "Host administratively prohibited"},
{ICMP_NET_UNR_TOS, "Network unreachable for TOS"},
{ICMP_HOST_UNR_TOS, "Host unreachable for TOS"},
{ICMP_PKT_FILTERED, "Communication administratively filtered"},
{ICMP_PREC_VIOLATION, "Host precedence violation"},
{ICMP_PREC_CUTOFF, "Precedence cutoff in effect"},
{0, NULL}
};
static const value_string redir_code_str[] = {
{0, "Redirect for network"},
{1, "Redirect for host"},
{2, "Redirect for TOS and network"},
{3, "Redirect for TOS and host"},
{0, NULL}
};
static const value_string alt_host_code_str[] = {
{0, "Alternate address for host"},
{0, NULL}
};
static const value_string rtradvert_code_str[] = {
{ 0, "Normal router advertisement"},
{16, "Does not route common traffic"},
{0, NULL}
};
static const value_string ttl_code_str[] = {
{0, "Time to live exceeded in transit"},
{1, "Fragment reassembly time exceeded"},
{0, NULL}
};
static const value_string par_code_str[] = {
{0, "Pointer indicates the error"},
{1, "Required option missing"},
{2, "Bad length"},
{0, NULL}
};
static const value_string photuris_code_str[] = {
{0, "Bad SPI"},
{1, "Authentication Failed"},
{2, "Decompression Failed"},
{3, "Decryption Failed"},
{4, "Need Authentication"},
{5, "Need Authorization"},
{0, NULL}
};
static const value_string mip_extensions[] = {
{ICMP_MIP_EXTENSION_PAD, "One byte padding extension"}, /* RFC 2002 */
{ICMP_MIP_MOB_AGENT_ADV, "Mobility Agent Advertisement Extension"},
/* RFC 2002 */
{ICMP_MIP_PREFIX_LENGTHS, "Prefix Lengths Extension"}, /* RFC 2002 */
{ICMP_MIP_CHALLENGE, "Challenge Extension"}, /* RFC 3012 */
{0, NULL}
};
/* RFC 5837 ICMP extension - Interface Information Object
* Interface Role
*/
static const value_string interface_role_str[] = {
{0, "IP interface upon which datagram arrived"},
{1, "sub-IP component of an IP interface upon which datagram arrived"},
{2, "IP interface through which datagram would be forwarded"},
{3, "IP next-hop to which datagram would be forwarded"},
{0, NULL}
};
#define INT_INFO_INTERFACE_ROLE 0xc0
#define INT_INFO_RESERVED 0x30
#define INT_INFO_IFINDEX 0x08
#define INT_INFO_IPADDR 0x04
#define INT_INFO_NAME 0x02
#define INT_INFO_MTU 0x01
#define INTERFACE_INFORMATION_OBJECT_CLASS 2
#define MPLS_STACK_ENTRY_OBJECT_CLASS 1
#define MPLS_EXTENDED_PAYLOAD_OBJECT_CLASS 0
#define MPLS_STACK_ENTRY_C_TYPE 1
#define MPLS_EXTENDED_PAYLOAD_C_TYPE 1
static conversation_t *_find_or_create_conversation(packet_info * pinfo)
{
conversation_t *conv = NULL;
/* Have we seen this conversation before? */
conv =
find_conversation(pinfo->num, &pinfo->src, &pinfo->dst,
pinfo->ptype, 0, 0, 0);
if (conv == NULL) {
/* No, this is a new conversation. */
conv =
conversation_new(pinfo->num, &pinfo->src,
&pinfo->dst, pinfo->ptype, 0, 0, 0);
}
return conv;
}
/*
* Dissect the mobile ip advertisement extensions.
*/
static void
dissect_mip_extensions(tvbuff_t * tvb, int offset, proto_tree * tree)
{
guint8 type;
guint8 length;
proto_item *ti;
proto_tree *mip_tree = NULL;
gint numCOAs;
gint i;
static const int * flags[] = {
&hf_icmp_mip_r,
&hf_icmp_mip_b,
&hf_icmp_mip_h,
&hf_icmp_mip_f,
&hf_icmp_mip_m,
&hf_icmp_mip_g,
&hf_icmp_mip_v,
&hf_icmp_mip_rt,
&hf_icmp_mip_u,
&hf_icmp_mip_x,
&hf_icmp_mip_reserved,
NULL
};
/* Not much to do if we're not parsing everything */
if (!tree)
return;
while (tvb_reported_length_remaining(tvb, offset) > 0) {
type = tvb_get_guint8(tvb, offset + 0);
if (type) {
length = tvb_get_guint8(tvb, offset + 1);
} else {
length = 0;
}
mip_tree = proto_tree_add_subtree_format(tree, tvb, offset,
1, ett_icmp_mip, &ti,
"Ext: %s", val_to_str(type,
mip_extensions,
"Unknown ext %u"));
proto_tree_add_item(mip_tree, hf_icmp_mip_type,
tvb, offset, 1,
ENC_BIG_ENDIAN);
offset++;
if (type != ICMP_MIP_EXTENSION_PAD)
{
proto_item_set_len(ti, length + 2);
/* length */
proto_tree_add_item(mip_tree, hf_icmp_mip_length,
tvb, offset, 1,
ENC_BIG_ENDIAN);
offset++;
}
switch (type) {
case ICMP_MIP_EXTENSION_PAD:
/* One byte padding extension */
break;
case ICMP_MIP_MOB_AGENT_ADV:
/* Mobility Agent Advertisement Extension (RFC 2002) */
/* Add our fields */
/* sequence number */
proto_tree_add_item(mip_tree, hf_icmp_mip_seq, tvb,
offset, 2, ENC_BIG_ENDIAN);
offset += 2;
/* Registration Lifetime */
proto_tree_add_item(mip_tree, hf_icmp_mip_life,
tvb, offset, 2,
ENC_BIG_ENDIAN);
offset += 2;
/* flags */
proto_tree_add_bitmask(mip_tree, tvb, offset, hf_icmp_mip_flags, ett_icmp_mip_flags, flags, ENC_BIG_ENDIAN);
offset += 2;
/* COAs */
numCOAs = (length - 6) / 4;
for (i = 0; i < numCOAs; i++) {
proto_tree_add_item(mip_tree,
hf_icmp_mip_coa, tvb,
offset, 4,
ENC_BIG_ENDIAN);
offset += 4;
}
break;
case ICMP_MIP_PREFIX_LENGTHS:
/* Prefix-Lengths Extension (RFC 2002) */
/* Add our fields */
/* prefix lengths */
for (i = 0; i < length; i++) {
proto_tree_add_item(mip_tree,
hf_icmp_mip_prefix_length,
tvb, offset, 1,
ENC_BIG_ENDIAN);
offset++;
}
break;
case ICMP_MIP_CHALLENGE:
/* Challenge Extension (RFC 3012) */
/* challenge */
proto_tree_add_item(mip_tree,
hf_icmp_mip_challenge, tvb,
offset, length, ENC_NA);
offset += length;
break;
default:
/* data, if any */
if (length != 0) {
proto_tree_add_item(mip_tree, hf_icmp_mip_content, tvb, offset, length - 4, ENC_NA);
offset += length;
}
break;
}
}
} /* dissect_mip_extensions */
static gboolean
dissect_mpls_extended_payload_object(tvbuff_t * tvb, gint offset,
proto_tree * ext_object_tree,
proto_item * tf_object)
{
guint16 obj_length, obj_trunc_length;
gboolean unknown_object;
guint8 c_type;
unknown_object = FALSE;
/* Object length */
obj_length = tvb_get_ntohs(tvb, offset);
obj_trunc_length =
MIN(obj_length, tvb_reported_length_remaining(tvb, offset));
/* C-Type */
c_type = tvb_get_guint8(tvb, offset + 3);
proto_tree_add_uint(ext_object_tree, hf_icmp_ext_c_type, tvb,
offset + 3, 1, c_type);
/* skip the object header */
offset += 4;
switch (c_type) {
case MPLS_EXTENDED_PAYLOAD_C_TYPE:
proto_item_set_text(tf_object, "Extended Payload");
/* This object contains some portion of the original packet
that could not fit in the 128 bytes of the ICMP payload */
if (obj_trunc_length > 4) {
proto_tree_add_item(ext_object_tree, hf_icmp_ext_data, tvb, offset, obj_trunc_length - 4, ENC_NA);
}
break;
default:
unknown_object = TRUE;
} /* end switch c_type */
return unknown_object;
}
static gboolean
dissect_mpls_stack_entry_object(tvbuff_t * tvb, gint offset,
proto_tree * ext_object_tree,
proto_item * tf_object)
{
proto_item *tf_entry;
proto_tree *mpls_stack_object_tree;
guint16 obj_length, obj_trunc_length;
gint obj_end_offset;
guint label;
guint8 ttl;
guint8 tmp;
gboolean unknown_object;
guint8 c_type;
unknown_object = FALSE;
/* Object length */
obj_length = tvb_get_ntohs(tvb, offset);
obj_trunc_length =
MIN(obj_length, tvb_reported_length_remaining(tvb, offset));
obj_end_offset = offset + obj_trunc_length;
/* C-Type */
c_type = tvb_get_guint8(tvb, offset + 3);
proto_tree_add_uint(ext_object_tree, hf_icmp_ext_c_type, tvb,
offset + 3, 1, c_type);
/* skip the object header */
offset += 4;
switch (c_type) {
case MPLS_STACK_ENTRY_C_TYPE:
proto_item_set_text(tf_object, "MPLS Stack Entry");
/* For each entry */
while (offset + 4 <= obj_end_offset) {
if (tvb_reported_length_remaining(tvb, offset) < 4) {
/* Not enough room in the packet ! */
break;
}
/* Create a subtree for each entry (the text will be set later) */
mpls_stack_object_tree = proto_tree_add_subtree(ext_object_tree,
tvb, offset, 4,
ett_icmp_mpls_stack_object, &tf_entry, " ");
/* Label */
label = (guint) tvb_get_ntohs(tvb, offset);
tmp = tvb_get_guint8(tvb, offset + 2);
label = (label << 4) + (tmp >> 4);
proto_tree_add_uint(mpls_stack_object_tree,
hf_icmp_mpls_label, tvb,
offset, 3, label << 4);
proto_item_set_text(tf_entry, "Label: %u", label);
/* Experimental field (also called "CoS") */
proto_tree_add_uint(mpls_stack_object_tree,
hf_icmp_mpls_exp, tvb,
offset + 2, 1, tmp);
proto_item_append_text(tf_entry, ", Exp: %u",
(tmp >> 1) & 0x07);
/* Stack bit */
proto_tree_add_boolean(mpls_stack_object_tree,
hf_icmp_mpls_s, tvb,
offset + 2, 1, tmp);
proto_item_append_text(tf_entry, ", S: %u",
tmp & 0x01);
/* TTL */
ttl = tvb_get_guint8(tvb, offset + 3);
proto_tree_add_item(mpls_stack_object_tree,
hf_icmp_mpls_ttl, tvb,
offset + 3, 1, ENC_BIG_ENDIAN);
proto_item_append_text(tf_entry, ", TTL: %u", ttl);
/* Skip the entry */
offset += 4;
}
if (offset < obj_end_offset) {
proto_tree_add_item(ext_object_tree, hf_icmp_mpls_data, tvb, offset, obj_end_offset - offset, ENC_NA);
}
break;
default:
unknown_object = TRUE;
break;
} /* end switch c_type */
return unknown_object;
} /* end dissect_mpls_stack_entry_object */
/* Dissect Interface Information Object RFC 5837*/
static gboolean
dissect_interface_information_object(tvbuff_t * tvb, gint offset,
proto_tree * ext_object_tree,
proto_item * tf_object)
{
proto_tree *int_name_object_tree = NULL;
proto_tree *int_ipaddr_object_tree;
guint16 obj_length, obj_trunc_length;
gint obj_end_offset;
guint8 c_type;
gboolean unknown_object;
guint8 if_index_flag;
guint8 ipaddr_flag;
guint8 name_flag;
guint16 afi;
guint8 int_name_length = 0;
unknown_object = FALSE;
/* Object length */
obj_length = tvb_get_ntohs(tvb, offset);
obj_trunc_length =
MIN(obj_length, tvb_reported_length_remaining(tvb, offset));
obj_end_offset = offset + obj_trunc_length;
/* C-Type */
c_type = tvb_get_guint8(tvb, offset + 3);
proto_item_set_text(tf_object, "Interface Information Object");
if (tvb_reported_length_remaining(tvb, offset) < 4) {
/* Not enough room in the packet ! return unknown_object = TRUE */
return TRUE;
}
if_index_flag = (c_type & INT_INFO_IFINDEX) >> 3;
ipaddr_flag = (c_type & INT_INFO_IPADDR) >> 2;
name_flag = (c_type & INT_INFO_NAME) >> 1;
{
static const gint *c_type_fields[] = {
&hf_icmp_int_info_role,
&hf_icmp_int_info_reserved,
&hf_icmp_int_info_ifindex,
&hf_icmp_int_info_ipaddr,
&hf_icmp_int_info_name,
&hf_icmp_int_info_mtu,
NULL
};
proto_tree_add_bitmask(ext_object_tree, tvb, offset + 3,
hf_icmp_ext_c_type,
ett_icmp_interface_info_object,
c_type_fields, ENC_BIG_ENDIAN);
}
/* skip header */
offset += 4;
/*if ifIndex is set, next 32 bits are ifIndex */
if (if_index_flag) {
proto_tree_add_item(ext_object_tree, hf_icmp_int_info_index, tvb, offset, 4, ENC_NA);
offset += 4;
}
/* IP Address Sub Object */
if (ipaddr_flag && (obj_end_offset >= offset + 2)) {
/* Address Family Identifier */
afi = tvb_get_ntohs(tvb, offset);
/*
* if afi = 1, IPv4 address, 2 bytes afi, 2 bytes rsvd, 4 bytes IP addr
* if afi = 2, IPv6 address, 2 bytes afi, 2 bytes rsvd, 16 bytes IP addr
*/
int_ipaddr_object_tree = proto_tree_add_subtree(ext_object_tree, tvb, offset,
afi == 1 ? 8 : 10, ett_icmp_interface_ipaddr, NULL,
"IP Address Sub-Object");
proto_tree_add_uint(int_ipaddr_object_tree,
hf_icmp_int_info_afi, tvb, offset, 2,
afi);
offset += 2;
proto_tree_add_item(int_ipaddr_object_tree, hf_icmp_reserved, tvb, offset, 2, ENC_NA);
offset += 2;
switch(afi){
case 1: /* IPv4 */
proto_tree_add_item(int_ipaddr_object_tree, hf_icmp_int_info_ipv4, tvb, offset, 4, ENC_BIG_ENDIAN);
break;
case 2: /* IPv6 */
proto_tree_add_item(int_ipaddr_object_tree, hf_icmp_int_info_ipv6, tvb, offset, 16, ENC_NA);
break;
default: /* Unknown ?! */
proto_tree_add_item(int_ipaddr_object_tree, hf_icmp_int_info_ipunknown, tvb, offset, offset - obj_end_offset, ENC_NA);
return FALSE;
}
}
/* Interface Name Sub Object */
if (name_flag) {
if (obj_end_offset >= offset + 1) {
int_name_length = tvb_get_guint8(tvb, offset);
int_name_object_tree = proto_tree_add_subtree(ext_object_tree, tvb,
offset, int_name_length, ett_icmp_interface_name, NULL,
"Interface Name Sub-Object");
proto_tree_add_item(int_name_object_tree, hf_icmp_int_info_name_length, tvb, offset, 1, ENC_BIG_ENDIAN);
}
if (obj_end_offset >= offset + 1 + int_name_length) {
proto_tree_add_item(int_name_object_tree, hf_icmp_int_info_name_string, tvb, offset + 1, int_name_length, ENC_ASCII|ENC_NA);
}
}
return unknown_object;
} /*end dissect_interface_information_object */
static void
dissect_extensions(tvbuff_t * tvb, gint offset, proto_tree * tree)
{
guint8 version;
guint8 class_num;
guint8 c_type;
guint16 cksum, computed_cksum;
guint16 obj_length, obj_trunc_length;
proto_item *ti, *tf_object, *hidden_item;
proto_tree *ext_tree, *ext_object_tree;
gint obj_end_offset;
guint reported_length;
gboolean unknown_object;
guint8 int_info_obj_count;
if (!tree)
return;
ext_tree = NULL;
int_info_obj_count = 0;
reported_length = tvb_reported_length_remaining(tvb, offset);
/* Add a tree for multi-part extensions RFC 4884 */
ti = proto_tree_add_none_format(tree, hf_icmp_ext, tvb,
offset, reported_length,
"ICMP Multi-Part Extensions");
if (reported_length < 4 /* Common header */ ) {
return;
}
ext_tree = proto_item_add_subtree(ti, ett_icmp_ext);
/* Version */
version = hi_nibble(tvb_get_guint8(tvb, offset));
proto_tree_add_uint(ext_tree, hf_icmp_ext_version, tvb, offset, 1,
version);
/* Reserved */
proto_tree_add_item(ext_tree, hf_icmp_ext_reserved,
tvb, offset, 2, ENC_BIG_ENDIAN);
/* Checksum */
cksum = tvb_get_ntohs(tvb, offset + 2);
computed_cksum = ip_checksum_tvb(tvb, offset, reported_length);
if (computed_cksum == 0) {
proto_tree_add_uint_format_value(ext_tree, hf_icmp_ext_checksum,
tvb, offset + 2, 2, cksum,
"0x%04x [correct]",
cksum);
hidden_item =
proto_tree_add_boolean(ext_tree,
hf_icmp_ext_checksum_bad, tvb,
offset + 2, 2, FALSE);
} else {
proto_tree_add_uint_format_value(ext_tree, hf_icmp_ext_checksum,
tvb, offset + 2, 2, cksum,
"0x%04x [incorrect, should be 0x%04x]",
cksum, in_cksum_shouldbe(cksum,
computed_cksum));
hidden_item =
proto_tree_add_boolean(ext_tree,
hf_icmp_ext_checksum_bad, tvb,
offset + 2, 2, TRUE);
}
PROTO_ITEM_SET_HIDDEN(hidden_item);
if (version != 1 && version != 2) {
/* Unsupported version */
proto_item_append_text(ti, " (unsupported version)");
return;
}
/* Skip the common header */
offset += 4;
/* While there is enough room to read an object */
while (tvb_reported_length_remaining(tvb, offset) >=
4 /* Object header */ ) {
/* Object length */
obj_length = tvb_get_ntohs(tvb, offset);
obj_trunc_length =
MIN(obj_length,
tvb_reported_length_remaining(tvb, offset));
obj_end_offset = offset + obj_trunc_length;
/* Add a subtree for this object (the text will be reset later) */
ext_object_tree = proto_tree_add_subtree(ext_tree, tvb, offset,
MAX(obj_trunc_length, 4),
ett_icmp_ext_object, &tf_object, "Unknown object");
proto_tree_add_uint(ext_object_tree, hf_icmp_ext_length,
tvb, offset, 2, obj_length);
/* Class */
class_num = tvb_get_guint8(tvb, offset + 2);
proto_tree_add_uint(ext_object_tree, hf_icmp_ext_class,
tvb, offset + 2, 1, class_num);
/* C-Type */
c_type = tvb_get_guint8(tvb, offset + 3);
if (obj_length < 4 /* Object header */ ) {
/* Thanks doc/README.developer :)) */
proto_item_set_text(tf_object,
"Object with bad length");
break;
}
switch (class_num) {
case MPLS_STACK_ENTRY_OBJECT_CLASS:
unknown_object =
dissect_mpls_stack_entry_object(tvb, offset,
ext_object_tree,
tf_object);
break;
case INTERFACE_INFORMATION_OBJECT_CLASS:
unknown_object =
dissect_interface_information_object(tvb,
offset,
ext_object_tree,
tf_object);
int_info_obj_count++;
if (int_info_obj_count > 4) {
proto_item_set_text(tf_object,
"More than 4 Interface Information Objects");
}
break;
case MPLS_EXTENDED_PAYLOAD_OBJECT_CLASS:
unknown_object =
dissect_mpls_extended_payload_object(tvb,
offset,
ext_object_tree,
tf_object);
break;
default:
unknown_object = TRUE;
break;
} /* end switch class_num */
/* Skip the object header */
offset += 4;
/* The switches couldn't decode the object */
if (unknown_object == TRUE) {
proto_item_set_text(tf_object,
"Unknown object (%d/%d)",
class_num, c_type);
if (obj_trunc_length > 4) {
proto_tree_add_item(ext_object_tree, hf_icmp_ext_data, tvb, offset, obj_trunc_length - 4, ENC_NA);
}
}
/* */
if (obj_trunc_length < obj_length) {
proto_item_append_text(tf_object, " (truncated)");
}
/* Go to the end of the object */
offset = obj_end_offset;
}
}
/* ======================================================================= */
static icmp_transaction_t *transaction_start(packet_info * pinfo,
proto_tree * tree,
guint32 * key)
{
conversation_t *conversation;
icmp_conv_info_t *icmp_info;
icmp_transaction_t *icmp_trans;
wmem_tree_key_t icmp_key[3];
proto_item *it;
/* Handle the conversation tracking */
conversation = _find_or_create_conversation(pinfo);
icmp_info = (icmp_conv_info_t *)conversation_get_proto_data(conversation, proto_icmp);
if (icmp_info == NULL) {
icmp_info = wmem_new(wmem_file_scope(), icmp_conv_info_t);
icmp_info->unmatched_pdus = wmem_tree_new(wmem_file_scope());
icmp_info->matched_pdus = wmem_tree_new(wmem_file_scope());
conversation_add_proto_data(conversation, proto_icmp,
icmp_info);
}
if (!PINFO_FD_VISITED(pinfo)) {
/* this is a new request, create a new transaction structure and map it to the
unmatched table
*/
icmp_key[0].length = 2;
icmp_key[0].key = key;
icmp_key[1].length = 0;
icmp_key[1].key = NULL;
icmp_trans = wmem_new(wmem_file_scope(), icmp_transaction_t);
icmp_trans->rqst_frame = pinfo->num;
icmp_trans->resp_frame = 0;
icmp_trans->rqst_time = pinfo->abs_ts;
nstime_set_zero(&icmp_trans->resp_time);
wmem_tree_insert32_array(icmp_info->unmatched_pdus, icmp_key,
(void *) icmp_trans);
} else {
/* Already visited this frame */
guint32 frame_num = pinfo->num;
icmp_key[0].length = 2;
icmp_key[0].key = key;
icmp_key[1].length = 1;
icmp_key[1].key = &frame_num;
icmp_key[2].length = 0;
icmp_key[2].key = NULL;
icmp_trans =
(icmp_transaction_t *)wmem_tree_lookup32_array(icmp_info->matched_pdus,
icmp_key);
}
if (icmp_trans == NULL) {
if (PINFO_FD_VISITED(pinfo)) {
/* No response found - add field and expert info */
it = proto_tree_add_item(tree, hf_icmp_no_resp, NULL, 0, 0,
ENC_NA);
PROTO_ITEM_SET_GENERATED(it);
col_append_fstr(pinfo->cinfo, COL_INFO, " (no response found!)");
/* Expert info. TODO: add to _icmp_transaction_t type and sequence number
so can report here (and in taps) */
expert_add_info_format(pinfo, it, &ei_icmp_resp_not_found,
"No response seen to ICMP request");
}
return NULL;
}
/* Print state tracking in the tree */
if (icmp_trans->resp_frame) {
it = proto_tree_add_uint(tree, hf_icmp_resp_in, NULL, 0, 0,
icmp_trans->resp_frame);
PROTO_ITEM_SET_GENERATED(it);
col_append_fstr(pinfo->cinfo, COL_INFO, " (reply in %d)",
icmp_trans->resp_frame);
}
return icmp_trans;
} /* transaction_start() */
/* ======================================================================= */
static icmp_transaction_t *transaction_end(packet_info * pinfo,
proto_tree * tree,
guint32 * key)
{
conversation_t *conversation;
icmp_conv_info_t *icmp_info;
icmp_transaction_t *icmp_trans;
wmem_tree_key_t icmp_key[3];
proto_item *it;
nstime_t ns;
double resp_time;
conversation =
find_conversation(pinfo->num, &pinfo->src, &pinfo->dst,
pinfo->ptype, 0, 0, 0);
if (conversation == NULL) {
return NULL;
}
icmp_info = (icmp_conv_info_t *)conversation_get_proto_data(conversation, proto_icmp);
if (icmp_info == NULL) {
return NULL;
}
if (!PINFO_FD_VISITED(pinfo)) {
guint32 frame_num;
icmp_key[0].length = 2;
icmp_key[0].key = key;
icmp_key[1].length = 0;
icmp_key[1].key = NULL;
icmp_trans =
(icmp_transaction_t *)wmem_tree_lookup32_array(icmp_info->unmatched_pdus,
icmp_key);
if (icmp_trans == NULL) {
return NULL;
}
/* we have already seen this response, or an identical one */
if (icmp_trans->resp_frame != 0) {
return NULL;
}
icmp_trans->resp_frame = pinfo->num;
/* we found a match. Add entries to the matched table for both request and reply frames
*/
icmp_key[0].length = 2;
icmp_key[0].key = key;
icmp_key[1].length = 1;
icmp_key[1].key = &frame_num;
icmp_key[2].length = 0;
icmp_key[2].key = NULL;
frame_num = icmp_trans->rqst_frame;
wmem_tree_insert32_array(icmp_info->matched_pdus, icmp_key,
(void *) icmp_trans);
frame_num = icmp_trans->resp_frame;
wmem_tree_insert32_array(icmp_info->matched_pdus, icmp_key,
(void *) icmp_trans);
} else {
/* Already visited this frame */
guint32 frame_num = pinfo->num;
icmp_key[0].length = 2;
icmp_key[0].key = key;
icmp_key[1].length = 1;
icmp_key[1].key = &frame_num;
icmp_key[2].length = 0;
icmp_key[2].key = NULL;
icmp_trans =
(icmp_transaction_t *)wmem_tree_lookup32_array(icmp_info->matched_pdus,
icmp_key);
if (icmp_trans == NULL) {
return NULL;
}
}
it = proto_tree_add_uint(tree, hf_icmp_resp_to, NULL, 0, 0,
icmp_trans->rqst_frame);
PROTO_ITEM_SET_GENERATED(it);
nstime_delta(&ns, &pinfo->abs_ts, &icmp_trans->rqst_time);
icmp_trans->resp_time = ns;
resp_time = nstime_to_msec(&ns);
it = proto_tree_add_double_format_value(tree, hf_icmp_resptime,
NULL, 0, 0, resp_time,
"%.3f ms", resp_time);
PROTO_ITEM_SET_GENERATED(it);
col_append_fstr(pinfo->cinfo, COL_INFO, " (request in %d)",
icmp_trans->rqst_frame);
return icmp_trans;
} /* transaction_end() */
#define MSPERDAY 86400000
/* ======================================================================= */
static guint32
get_best_guess_mstimeofday(tvbuff_t * tvb, gint offset, guint32 comp_ts)
{
guint32 be_ts, le_ts;
/* Account for the special case from RFC 792 as best we can by clearing
* the msb. Ref: [Page 16] of http://tools.ietf.org/html/rfc792:
If the time is not available in milliseconds or cannot be provided
with respect to midnight UT then any time can be inserted in a
timestamp provided the high order bit of the timestamp is also set
to indicate this non-standard value.
*/
be_ts = tvb_get_ntohl(tvb, offset) & 0x7fffffff;
le_ts = tvb_get_letohl(tvb, offset) & 0x7fffffff;
if (be_ts < MSPERDAY && le_ts >= MSPERDAY) {
return be_ts;
}
if (le_ts < MSPERDAY && be_ts >= MSPERDAY) {
return le_ts;
}
if (be_ts < MSPERDAY && le_ts < MSPERDAY) {
guint32 saved_be_ts = be_ts;
guint32 saved_le_ts = le_ts;
/* Is this a rollover to a new day, clocks not synchronized, different
* timezones between originate and receive/transmit, .. what??? */
if (be_ts < comp_ts && be_ts <= (MSPERDAY / 4)
&& comp_ts >= (MSPERDAY - (MSPERDAY / 4)))
be_ts += MSPERDAY; /* Assume a rollover to a new day */
if (le_ts < comp_ts && le_ts <= (MSPERDAY / 4)
&& comp_ts >= (MSPERDAY - (MSPERDAY / 4)))
le_ts += MSPERDAY; /* Assume a rollover to a new day */
if ((be_ts - comp_ts) < (le_ts - comp_ts))
return saved_be_ts;
return saved_le_ts;
}
/* Both are bigger than MSPERDAY, but neither one's msb's are set. This
* is clearly invalid, but now what TODO? For now, take the one closest to
* the comparative timestamp, which is another way of saying, "let's
* return a deterministic wild guess. */
if ((be_ts - comp_ts) < (le_ts - comp_ts)) {
return be_ts;
}
return le_ts;
} /* get_best_guess_mstimeofday() */
static gboolean
capture_icmp(const guchar *pd _U_, int offset _U_, int len _U_, capture_packet_info_t *cpinfo, const union wtap_pseudo_header *pseudo_header _U_)
{
capture_dissector_increment_count(cpinfo, proto_icmp);
return TRUE;
}
/*
* RFC 792 for basic ICMP.
* RFC 1191 for ICMP_FRAG_NEEDED (with MTU of next hop).
* RFC 1256 for router discovery messages.
* RFC 2002 and 3012 for Mobile IP stuff.
*/
static int
dissect_icmp(tvbuff_t * tvb, packet_info * pinfo, proto_tree * tree, void* data)
{
proto_tree *icmp_tree = NULL;
proto_item *ti, *checksum_item;
guint8 icmp_type;
guint8 icmp_code;
guint8 icmp_original_dgram_length;
guint captured_length, reported_length;
guint16 cksum, computed_cksum;
const gchar *type_str, *code_str;
guint32 num_addrs = 0;
guint32 addr_entry_size = 0;
guint32 i;
gboolean save_in_error_pkt;
tvbuff_t *next_tvb;
proto_item *item;
guint32 conv_key[2];
icmp_transaction_t *trans = NULL;
nstime_t ts, time_relative;
ws_ip *iph = (ws_ip*)data;
col_set_str(pinfo->cinfo, COL_PROTOCOL, "ICMP");
col_clear(pinfo->cinfo, COL_INFO);
/* To do: check for runts, errs, etc. */
icmp_type = tvb_get_guint8(tvb, 0);
icmp_code = tvb_get_guint8(tvb, 1);
cksum = tvb_get_ntohs(tvb, 2);
/*length of original datagram carried in the ICMP payload. In terms of 32 bit
* words.*/
icmp_original_dgram_length = tvb_get_guint8(tvb, 5);
type_str =
val_to_str_const(icmp_type, icmp_type_str,
"Unknown ICMP (obsolete or malformed?)");
switch (icmp_type) {
case ICMP_UNREACH:
code_str =
val_to_str(icmp_code, unreach_code_str,
"Unknown code: %u");
break;
case ICMP_REDIRECT:
code_str =
val_to_str(icmp_code, redir_code_str,
"Unknown code: %u");
break;
case ICMP_ALTHOST:
code_str =
val_to_str(icmp_code, alt_host_code_str,
"Unknown code: %u");
icmp_original_dgram_length = 0;
break;
case ICMP_RTRADVERT:
switch (icmp_code) {
case 0: /* Mobile-Ip */
case 16: /* Mobile-Ip */
type_str = "Mobile IP Advertisement";
break;
} /* switch icmp_code */
code_str =
val_to_str(icmp_code, rtradvert_code_str,
"Unknown code: %u");
break;
case ICMP_TIMXCEED:
code_str =
val_to_str(icmp_code, ttl_code_str,
"Unknown code: %u");
break;
case ICMP_PARAMPROB:
code_str =
val_to_str(icmp_code, par_code_str,
"Unknown code: %u");
break;
case ICMP_PHOTURIS:
code_str =
val_to_str(icmp_code, photuris_code_str,
"Unknown code: %u");
break;
default:
code_str = NULL;
break;
}
col_add_fstr(pinfo->cinfo, COL_INFO, "%-20s", type_str);
if (code_str) {
col_append_fstr(pinfo->cinfo, COL_INFO, " (%s)", code_str);
}
captured_length = tvb_captured_length(tvb);
reported_length = tvb_reported_length(tvb);
ti = proto_tree_add_item(tree, proto_icmp, tvb, 0, captured_length, ENC_NA);
icmp_tree = proto_item_add_subtree(ti, ett_icmp);
ti = proto_tree_add_item(icmp_tree, hf_icmp_type, tvb, 0, 1,
ENC_BIG_ENDIAN);
proto_item_append_text(ti, " (%s)", type_str);
ti = proto_tree_add_item(icmp_tree, hf_icmp_code, tvb, 1, 1,
ENC_BIG_ENDIAN);
if (code_str) {
proto_item_append_text(ti, " (%s)", code_str);
}
checksum_item = proto_tree_add_item(icmp_tree, hf_icmp_checksum, tvb, 2, 2, ENC_BIG_ENDIAN);
if (!pinfo->fragmented && captured_length >= reported_length
&& !pinfo->flags.in_error_pkt) {
/* The packet isn't part of a fragmented datagram, isn't
truncated, and isn't the payload of an error packet, so we can checksum
it. */
computed_cksum = ip_checksum_tvb(tvb, 0, reported_length);
if (computed_cksum == 0) {
item = proto_tree_add_boolean(icmp_tree, hf_icmp_checksum_bad, tvb, 2, 2, FALSE);
PROTO_ITEM_SET_HIDDEN(item);
proto_item_append_text(checksum_item, " [correct]");
} else {
item = proto_tree_add_boolean(icmp_tree, hf_icmp_checksum_bad, tvb, 2, 2, TRUE);
PROTO_ITEM_SET_HIDDEN(item);
proto_item_append_text(checksum_item, " [incorrect, should be 0x%04x]", in_cksum_shouldbe(cksum, computed_cksum));
expert_add_info_format(pinfo, checksum_item, &ei_icmp_checksum,
"ICMPv4 Checksum Incorrect, should be 0x%04x", in_cksum_shouldbe(cksum, computed_cksum));
}
} else {
proto_item_append_text(checksum_item, " [%s]",
pinfo->flags.in_error_pkt ? "in ICMP error packet" : "fragmented datagram");
}
/* Decode the second 4 bytes of the packet. */
switch (icmp_type) {
case ICMP_ECHOREPLY:
case ICMP_ECHO:
case ICMP_TSTAMP:
case ICMP_TSTAMPREPLY:
case ICMP_IREQ:
case ICMP_IREQREPLY:
case ICMP_MASKREQ:
case ICMP_MASKREPLY:
proto_tree_add_item(icmp_tree, hf_icmp_ident, tvb, 4, 2,
ENC_BIG_ENDIAN);
proto_tree_add_item(icmp_tree, hf_icmp_ident_le, tvb, 4, 2,
ENC_LITTLE_ENDIAN);
proto_tree_add_item(icmp_tree, hf_icmp_seq_num, tvb, 6, 2,
ENC_BIG_ENDIAN);
proto_tree_add_item(icmp_tree, hf_icmp_seq_num_le, tvb, 6,
2, ENC_LITTLE_ENDIAN);
col_append_fstr(pinfo->cinfo, COL_INFO,
" id=0x%04x, seq=%u/%u, ttl=%u",
tvb_get_ntohs(tvb, 4), tvb_get_ntohs(tvb,
6),
tvb_get_letohs(tvb, 6), (iph != NULL) ? iph->ip_ttl : 0);
break;
case ICMP_UNREACH:
/* If icmp_original_dgram_length > 0, then this packet is compliant with RFC 4884 and
* interpret the 6th octet as length of the original datagram
*/
if (icmp_original_dgram_length > 0) {
proto_tree_add_item(icmp_tree, hf_icmp_length,
tvb, 5, 1,
ENC_BIG_ENDIAN);
ti = proto_tree_add_uint(icmp_tree, hf_icmp_length_original_datagram,
tvb, 5, 1,
icmp_original_dgram_length * 4);
PROTO_ITEM_SET_GENERATED(ti);
}
switch (icmp_code) {
case ICMP_FRAG_NEEDED:
proto_tree_add_item(icmp_tree, hf_icmp_unused, tvb, 4,
2, ENC_NA);
proto_tree_add_item(icmp_tree, hf_icmp_mtu, tvb, 6,
2, ENC_BIG_ENDIAN);
break;
default:
proto_tree_add_item(icmp_tree, hf_icmp_unused, tvb, 4,
4, ENC_NA);
}
break;
case ICMP_RTRADVERT:
proto_tree_add_item_ret_uint(icmp_tree, hf_icmp_num_addrs, tvb, 4, 1, ENC_BIG_ENDIAN, &num_addrs);
proto_tree_add_item_ret_uint(icmp_tree, hf_icmp_addr_entry_size, tvb, 5, 1, ENC_BIG_ENDIAN, &addr_entry_size);
ti = proto_tree_add_item(icmp_tree, hf_icmp_lifetime, tvb, 6, 2, ENC_BIG_ENDIAN);
proto_item_append_text(ti, " (%s)", time_secs_to_str(wmem_packet_scope(), tvb_get_ntohs(tvb, 6)));
break;
case ICMP_PARAMPROB:
proto_tree_add_item(icmp_tree, hf_icmp_pointer, tvb, 4, 1, ENC_BIG_ENDIAN);
if (icmp_original_dgram_length > 0) {
proto_tree_add_item(icmp_tree, hf_icmp_length,
tvb, 5, 1,
ENC_BIG_ENDIAN);
ti = proto_tree_add_uint(icmp_tree, hf_icmp_length_original_datagram,
tvb, 5, 1,
icmp_original_dgram_length * 4);
PROTO_ITEM_SET_GENERATED(ti);
}
break;
case ICMP_REDIRECT:
proto_tree_add_item(icmp_tree, hf_icmp_redir_gw, tvb, 4, 4,
ENC_BIG_ENDIAN);
break;
case ICMP_TIMXCEED:
if (icmp_original_dgram_length > 0) {
proto_tree_add_item(icmp_tree, hf_icmp_length,
tvb, 5, 1,
ENC_BIG_ENDIAN);
ti = proto_tree_add_uint(icmp_tree, hf_icmp_length_original_datagram,
tvb, 5, 1,
icmp_original_dgram_length * 4);
PROTO_ITEM_SET_GENERATED(ti);
}
}
/* Decode the additional information in the packet. */
switch (icmp_type) {
case ICMP_UNREACH:
case ICMP_TIMXCEED:
case ICMP_PARAMPROB:
case ICMP_SOURCEQUENCH:
case ICMP_REDIRECT:
/* Save the current value of the "we're inside an error packet"
flag, and set that flag; subdissectors may treat packets
that are the payload of error packets differently from
"real" packets. */
save_in_error_pkt = pinfo->flags.in_error_pkt;
pinfo->flags.in_error_pkt = TRUE;
/* Decode the IP header and first 64 bits of data from the
original datagram. */
next_tvb = tvb_new_subset_remaining(tvb, 8);
/* If the packet is compliant with RFC 4884, then it has
* icmp_original_dgram_length*4 bytes of original IP packet that needs
* to be decoded, followed by extension objects.
*/
if (icmp_type == ICMP_REDIRECT) {
/* No icmp_original_dgram_length is available for redirect message,
* we expect a max of Internet Header + 64 bits of Original Data Datagram */
set_actual_length(next_tvb, ((tvb_get_guint8(tvb, 8) & 0x0f) * 4) + 8);
} else if (icmp_original_dgram_length
&& (tvb_reported_length(tvb) >
(guint) (8 + icmp_original_dgram_length * 4))
&& (tvb_get_ntohs(tvb, 8 + 2) >
(guint) icmp_original_dgram_length * 4)) {
set_actual_length(next_tvb,
((tvb_get_guint8(tvb, 8) & 0x0f) + icmp_original_dgram_length) * 4);
} else {
/* There is a collision between RFC 1812 and draft-ietf-mpls-icmp-02.
We don't know how to decode the 128th and following bytes of the ICMP payload.
According to draft-ietf-mpls-icmp-02, these bytes should be decoded as MPLS extensios
whereas RFC 1812 tells us to decode them as a portion of the original packet.
Let the user decide.
Here the user decided to favor MPLS extensions.
Force the IP dissector to decode only the first 128 bytes. */
if ((tvb_reported_length(tvb) > 8 + 128) &&
favor_icmp_mpls_ext
&& (tvb_get_ntohs(tvb, 8 + 2) > 128)) {
set_actual_length(next_tvb, 128);
}
}
call_dissector(ip_handle, next_tvb, pinfo, icmp_tree);
/* Restore the "we're inside an error packet" flag. */
pinfo->flags.in_error_pkt = save_in_error_pkt;
/* Decode MPLS extensions if the payload has at least 128 bytes, and
- the original packet in the ICMP payload has less than 128 bytes, or
- the user favors the MPLS extensions analysis */
if ((tvb_reported_length(tvb) > 8 + 128)
&& (tvb_get_ntohs(tvb, 8 + 2) <= 128
|| favor_icmp_mpls_ext)) {
dissect_extensions(tvb, 8 + 128, icmp_tree);
}
break;
case ICMP_ECHOREPLY:
case ICMP_ECHO:
if (icmp_type == ICMP_ECHOREPLY) {
if (!pinfo->flags.in_error_pkt) {
conv_key[0] =
(guint32) tvb_get_ntohs(tvb, 2);
if (pinfo->flags.in_gre_pkt)
conv_key[0] |= 0x00010000; /* set a bit for "in GRE" */
conv_key[1] =
((guint32) tvb_get_ntohs(tvb, 4) << 16) |
tvb_get_ntohs(tvb, 6);
trans =
transaction_end(pinfo, icmp_tree,
conv_key);
}
} else {
if (!pinfo->flags.in_error_pkt) {
guint16 tmp[2];
tmp[0] = ~tvb_get_ntohs(tvb, 2);
tmp[1] = ~0x0800; /* The difference between echo request & reply */
conv_key[0] =
ip_checksum((guint8 *) & tmp,
sizeof(tmp));
if (conv_key[0] == 0) {
conv_key[0] = 0xffff;
}
if (pinfo->flags.in_gre_pkt) {
conv_key[0] |= 0x00010000; /* set a bit for "in GRE" */
}
conv_key[1] =
((guint32) tvb_get_ntohs(tvb, 4) << 16) |
tvb_get_ntohs(tvb, 6);
trans =
transaction_start(pinfo, icmp_tree,
conv_key);
}
}
/* Make sure we have enough bytes in the payload before trying to
* see if the data looks like a timestamp; otherwise we'll get
* malformed packets as we try to access data that isn't there. */
if (tvb_captured_length_remaining(tvb, 8) < 8) {
if (tvb_captured_length_remaining(tvb, 8) > 0) {
call_data_dissector(tvb_new_subset_remaining
(tvb, 8), pinfo, icmp_tree);
}
break;
}
/* Interpret the first 8 bytes of the icmp data as a timestamp
* But only if it does look like it's a timestamp.
*
* FIXME:
* Timestamps could be in different formats depending on the OS
*/
ts.secs = tvb_get_ntohl(tvb, 8);
ts.nsecs = tvb_get_ntohl(tvb, 8 + 4); /* Leave at microsec resolution for now */
if ((guint32) (ts.secs - pinfo->abs_ts.secs) >=
3600 * 24 || ts.nsecs >= 1000000) {
/* Timestamp does not look right in BE, try LE representation */
ts.secs = tvb_get_letohl(tvb, 8);
ts.nsecs = tvb_get_letohl(tvb, 8 + 4); /* Leave at microsec resolution for now */
}
if ((guint32) (ts.secs - pinfo->abs_ts.secs) <
3600 * 24 && ts.nsecs < 1000000) {
ts.nsecs *= 1000; /* Convert to nanosec resolution */
proto_tree_add_time(icmp_tree, hf_icmp_data_time,
tvb, 8, 8, &ts);
nstime_delta(&time_relative, &pinfo->abs_ts,
&ts);
ti = proto_tree_add_time(icmp_tree,
hf_icmp_data_time_relative,
tvb, 8, 8,
&time_relative);
PROTO_ITEM_SET_GENERATED(ti);
call_data_dissector(tvb_new_subset_remaining(tvb,
8 + 8),
pinfo, icmp_tree);
} else {
call_data_dissector(tvb_new_subset_remaining(tvb, 8),
pinfo, icmp_tree);
}
break;
case ICMP_RTRADVERT:
if (addr_entry_size == 2) {
for (i = 0; i < num_addrs; i++) {
proto_tree_add_item(icmp_tree, hf_icmp_router_address, tvb, 8 + (i * 8), 4, ENC_NA);
proto_tree_add_item(icmp_tree, hf_icmp_pref_level, tvb, 12 + (i * 8), 4, ENC_NA);
}
if ((icmp_code == 0) || (icmp_code == 16)) {
/* Mobile-Ip */
dissect_mip_extensions(tvb, 8 + i * 8,
icmp_tree);
}
} else {
call_data_dissector(tvb_new_subset_remaining(tvb, 8),
pinfo, icmp_tree);
}
break;
case ICMP_TSTAMP:
case ICMP_TSTAMPREPLY:
{
guint32 frame_ts, orig_ts;
frame_ts = (guint32)(((pinfo->abs_ts.secs * 1000) +
(pinfo->abs_ts.nsecs / 1000000)) %
86400000);
orig_ts = get_best_guess_mstimeofday(tvb, 8, frame_ts);
ti = proto_tree_add_item(icmp_tree, hf_icmp_originate_timestamp, tvb, 8, 4, ENC_BIG_ENDIAN);
proto_item_append_text(ti, " (%s after midnight UTC)", time_msecs_to_str(wmem_packet_scope(), orig_ts));
ti = proto_tree_add_item(icmp_tree, hf_icmp_receive_timestamp, tvb, 12, 4, ENC_BIG_ENDIAN);
proto_item_append_text(ti, " (%s after midnight UTC)", time_msecs_to_str(wmem_packet_scope(), get_best_guess_mstimeofday(tvb, 12, frame_ts)));
ti = proto_tree_add_item(icmp_tree, hf_icmp_transmit_timestamp, tvb, 16, 4, ENC_BIG_ENDIAN);
proto_item_append_text(ti, " (%s after midnight UTC)", time_msecs_to_str(wmem_packet_scope(), get_best_guess_mstimeofday(tvb, 16, frame_ts)));
}
break;
case ICMP_MASKREQ:
case ICMP_MASKREPLY:
proto_tree_add_item(icmp_tree, hf_icmp_address_mask, tvb, 8, 4, ENC_BIG_ENDIAN);
break;
}
if (!PINFO_FD_VISITED(pinfo)) {
icmp_info_t *p_icmp_info = wmem_new(wmem_file_scope(), icmp_info_t);
p_icmp_info->type = icmp_type;
p_icmp_info->code = icmp_code;
p_add_proto_data(wmem_file_scope(), pinfo, proto_icmp, 0, p_icmp_info);
}
if (trans) {
tap_queue_packet(icmp_tap, pinfo, trans);
}
return tvb_reported_length(tvb);
}
void proto_register_icmp(void)
{
static hf_register_info hf[] = {
{&hf_icmp_type,
{"Type", "icmp.type", FT_UINT8, BASE_DEC, NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_code,
{"Code", "icmp.code", FT_UINT8, BASE_DEC, NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_checksum,
{"Checksum", "icmp.checksum", FT_UINT16, BASE_HEX, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_checksum_bad,
{"Bad Checksum", "icmp.checksum_bad", FT_BOOLEAN,
BASE_NONE, NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_unused,
{"Unused", "icmp.unused", FT_BYTES,
BASE_NONE, NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_reserved,
{"Reserved", "icmp.reserved", FT_BYTES,
BASE_NONE, NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_ident,
{"Identifier (BE)", "icmp.ident", FT_UINT16, BASE_DEC_HEX,
NULL, 0x0,
"Identifier (big endian representation)", HFILL}},
{&hf_icmp_ident_le,
{"Identifier (LE)", "icmp.ident", FT_UINT16, BASE_DEC_HEX,
NULL, 0x0,
"Identifier (little endian representation)", HFILL}},
{&hf_icmp_seq_num,
{"Sequence number (BE)", "icmp.seq", FT_UINT16,
BASE_DEC_HEX, NULL, 0x0,
"Sequence number (big endian representation)", HFILL}},
{&hf_icmp_seq_num_le,
{"Sequence number (LE)", "icmp.seq_le", FT_UINT16,
BASE_DEC_HEX, NULL,
0x0, "Sequence number (little endian representation)",
HFILL}},
{&hf_icmp_mtu,
{"MTU of next hop", "icmp.mtu", FT_UINT16, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_num_addrs,
{"Number of addresses", "icmp.num_addrs", FT_UINT8, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_addr_entry_size,
{"Number of addresses", "icmp.addr_entry_size", FT_UINT8, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_lifetime,
{"Lifetime", "icmp.lifetime", FT_UINT16, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_pointer,
{"Pointer", "icmp.pointer", FT_UINT32, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_router_address,
{"Router address", "icmp.router_address", FT_IPv4, BASE_NONE, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_pref_level,
{"Preference level", "icmp.pref_level", FT_INT32, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_originate_timestamp,
{"Originate timestamp", "icmp.originate_timestamp", FT_UINT32, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_receive_timestamp,
{"Receive timestamp", "icmp.receive_timestamp", FT_UINT32, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_transmit_timestamp,
{"Transmit timestamp", "icmp.transmit_timestamp", FT_UINT32, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_address_mask,
{"Address Mask", "icmp.address_mask", FT_IPv4, BASE_NONE, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_redir_gw,
{"Gateway address", "icmp.redir_gw", FT_IPv4, BASE_NONE,
NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_mip_type,
{"Extension Type", "icmp.mip.type", FT_UINT8, BASE_DEC,
VALS(mip_extensions), 0x0, NULL, HFILL}},
{&hf_icmp_mip_length,
{"Length", "icmp.mip.length", FT_UINT8, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_mip_prefix_length,
{"Prefix Length", "icmp.mip.prefixlength", FT_UINT8,
BASE_DEC, NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_mip_seq,
{"Sequence Number", "icmp.mip.seq", FT_UINT16, BASE_DEC,
NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_mip_life,
{"Registration Lifetime", "icmp.mip.life", FT_UINT16,
BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_mip_flags,
{"Flags", "icmp.mip.flags", FT_UINT16, BASE_HEX, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_mip_r,
{"Registration Required", "icmp.mip.r", FT_BOOLEAN, 16,
NULL, 0x8000,
"Registration with this FA is required", HFILL}},
{&hf_icmp_mip_b,
{"Busy", "icmp.mip.b", FT_BOOLEAN, 16, NULL, 0x4000,
"This FA will not accept requests at this time", HFILL}},
{&hf_icmp_mip_h,
{"Home Agent", "icmp.mip.h", FT_BOOLEAN, 16, NULL, 0x2000,
"Home Agent Services Offered", HFILL}},
{&hf_icmp_mip_f,
{"Foreign Agent", "icmp.mip.f", FT_BOOLEAN, 16, NULL,
0x1000,
"Foreign Agent Services Offered", HFILL}},
{&hf_icmp_mip_m,
{"Minimal Encapsulation", "icmp.mip.m", FT_BOOLEAN, 16,
NULL, 0x0800,
"Minimal encapsulation tunneled datagram support",
HFILL}},
{&hf_icmp_mip_g,
{"GRE", "icmp.mip.g", FT_BOOLEAN, 16, NULL, 0x0400,
"GRE encapsulated tunneled datagram support", HFILL}},
{&hf_icmp_mip_v,
{"VJ Comp", "icmp.mip.v", FT_BOOLEAN, 16, NULL, 0x0200,
"Van Jacobson Header Compression Support", HFILL}},
{&hf_icmp_mip_rt,
{"Reverse tunneling", "icmp.mip.rt", FT_BOOLEAN, 16, NULL,
0x0100,
"Reverse tunneling support", HFILL}},
{&hf_icmp_mip_u,
{"UDP tunneling", "icmp.mip.u", FT_BOOLEAN, 16, NULL,
0x0080,
"UDP tunneling support", HFILL}},
{&hf_icmp_mip_x,
{"Revocation support", "icmp.mip.x", FT_BOOLEAN, 16, NULL,
0x0040,
"Registration revocation support", HFILL}},
{&hf_icmp_mip_reserved,
{"Reserved", "icmp.mip.reserved", FT_UINT16, BASE_HEX,
NULL, 0x003f,
NULL, HFILL}},
{&hf_icmp_mip_coa,
{"Care-Of-Address", "icmp.mip.coa", FT_IPv4, BASE_NONE,
NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_mip_challenge,
{"Challenge", "icmp.mip.challenge", FT_BYTES, BASE_NONE,
NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_mip_content,
{"Content", "icmp.mip.content", FT_BYTES, BASE_NONE,
NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_ext,
{"ICMP Extensions", "icmp.ext", FT_NONE, BASE_NONE, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_ext_version,
{"Version", "icmp.ext.version", FT_UINT8, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_ext_reserved,
{"Reserved", "icmp.ext.res", FT_UINT16, BASE_HEX, NULL,
0x0fff,
NULL, HFILL}},
{&hf_icmp_ext_checksum,
{"Checksum", "icmp.ext.checksum", FT_UINT16, BASE_HEX,
NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_ext_checksum_bad,
{"Bad Checksum", "icmp.ext.checksum_bad", FT_BOOLEAN,
BASE_NONE, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_ext_length,
{"Length", "icmp.ext.length", FT_UINT16, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_ext_class,
{"Class", "icmp.ext.class", FT_UINT8, BASE_DEC, NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_ext_c_type,
{"C-Type", "icmp.ext.ctype", FT_UINT8, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_ext_data,
{"Data", "icmp.ext.data", FT_BYTES, BASE_NONE, NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_mpls_label,
{"Label", "icmp.mpls.label", FT_UINT24, BASE_DEC, NULL,
0x00fffff0,
NULL, HFILL}},
{&hf_icmp_mpls_exp,
{"Experimental", "icmp.mpls.exp", FT_UINT24, BASE_DEC,
NULL, 0x0e,
NULL, HFILL}},
{&hf_icmp_mpls_s,
{"Stack bit", "icmp.mpls.s", FT_BOOLEAN, 24,
TFS(&tfs_set_notset), 0x01,
NULL, HFILL}},
{&hf_icmp_mpls_ttl,
{"Time to live", "icmp.mpls.ttl", FT_UINT8, BASE_DEC,
NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_mpls_data,
{"Data", "icmp.mpls.data", FT_BYTES, BASE_NONE ,
NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_resp_in,
{"Response frame", "icmp.resp_in", FT_FRAMENUM, BASE_NONE,
FRAMENUM_TYPE(FT_FRAMENUM_RESPONSE), 0x0,
"The frame number of the corresponding response",
HFILL}},
{&hf_icmp_no_resp,
{"No response seen", "icmp.no_resp", FT_NONE, BASE_NONE,
NULL, 0x0,
"No corresponding response frame was seen",
HFILL}},
{&hf_icmp_resp_to,
{"Request frame", "icmp.resp_to", FT_FRAMENUM, BASE_NONE,
FRAMENUM_TYPE(FT_FRAMENUM_REQUEST), 0x0,
"The frame number of the corresponding request", HFILL}},
{&hf_icmp_resptime,
{"Response time", "icmp.resptime", FT_DOUBLE, BASE_NONE,
NULL, 0x0,
"The time between the request and the response, in ms.",
HFILL}},
{&hf_icmp_data_time,
{"Timestamp from icmp data", "icmp.data_time",
FT_ABSOLUTE_TIME,
ABSOLUTE_TIME_LOCAL, NULL, 0x0,
"The timestamp in the first 8 bytes of the icmp data",
HFILL}},
{&hf_icmp_data_time_relative,
{"Timestamp from icmp data (relative)",
"icmp.data_time_relative",
FT_RELATIVE_TIME, BASE_NONE, NULL, 0x0,
"The timestamp of the packet, relative to the timestamp in the first 8 bytes of the icmp data",
HFILL}},
{&hf_icmp_length,
{"Length", "icmp.length", FT_UINT8,
BASE_DEC, NULL,
0x0,
"The length of the original datagram", HFILL}},
{&hf_icmp_length_original_datagram,
{"Length of original datagram", "icmp.length.original_datagram", FT_UINT8,
BASE_DEC, NULL,
0x0,
"The length of the original datagram (length * 4)", HFILL}},
{&hf_icmp_int_info_role,
{"Interface Role", "icmp.int_info.role",
FT_UINT8, BASE_DEC, VALS(interface_role_str),
INT_INFO_INTERFACE_ROLE,
NULL, HFILL}},
{&hf_icmp_int_info_reserved,
{"Reserved", "icmp.int_info.reserved",
FT_UINT8, BASE_DEC, NULL, INT_INFO_RESERVED,
NULL, HFILL}},
{&hf_icmp_int_info_ifindex,
{"ifIndex", "icmp.int_info.ifindex", FT_BOOLEAN, 8, NULL,
INT_INFO_IFINDEX,
"True: ifIndex of the interface included; False: ifIndex of the interface not included ",
HFILL}},
{&hf_icmp_int_info_ipaddr,
{"IP Address", "icmp.int_info.ipaddr", FT_BOOLEAN, 8,
TFS(&tfs_present_not_present),
INT_INFO_IPADDR,
NULL, HFILL}},
{&hf_icmp_int_info_name,
{"Interface Name", "icmp.int_info.name_present", FT_BOOLEAN, 8,
TFS(&tfs_present_not_present),
INT_INFO_NAME,
NULL,
HFILL}},
{&hf_icmp_int_info_mtu,
{"MTU", "icmp.int_info.mtu", FT_BOOLEAN, 8, TFS(&tfs_present_not_present),
INT_INFO_MTU,
NULL, HFILL}},
{&hf_icmp_int_info_index,
{"Interface Index", "icmp.int_info.index",
FT_UINT32, BASE_DEC,
NULL, 0x0,
NULL, HFILL}},
{&hf_icmp_int_info_afi,
{"Address Family Identifier", "icmp.int_info.afi",
FT_UINT16, BASE_DEC,
NULL, 0x0,
"Address Family of the interface address", HFILL}},
{&hf_icmp_int_info_ipv4,
{"Source", "icmp.int_info.ipv4", FT_IPv4, BASE_NONE, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_int_info_ipv6,
{"Source", "icmp.int_info.ipv6", FT_IPv6, BASE_NONE, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_int_info_ipunknown,
{"Source", "icmp.int_info.ipunknown", FT_BYTES, BASE_NONE, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_int_info_name_length,
{"Name Length", "icmp.int_info.name_length", FT_UINT8, BASE_DEC, NULL,
0x0,
NULL, HFILL}},
{&hf_icmp_int_info_name_string,
{"Name", "icmp.int_info.name", FT_STRING, BASE_NONE, NULL,
0x0,
NULL, HFILL}},
};
static gint *ett[] = {
&ett_icmp,
&ett_icmp_mip,
&ett_icmp_mip_flags,
/* MPLS extensions */
&ett_icmp_ext,
&ett_icmp_ext_object,
&ett_icmp_mpls_stack_object,
/* Interface Information Object RFC 5837 */
&ett_icmp_interface_info_object,
&ett_icmp_interface_ipaddr,
&ett_icmp_interface_name
};
static ei_register_info ei[] = {
{ &ei_icmp_resp_not_found, { "icmp.resp_not_found", PI_SEQUENCE, PI_WARN, "Response not found", EXPFILL }},
{ &ei_icmp_checksum, { "icmp.checksum_bad.expert", PI_CHECKSUM, PI_WARN, "Bad checksum", EXPFILL }},
};
module_t *icmp_module;
expert_module_t* expert_icmp;
proto_icmp =
proto_register_protocol("Internet Control Message Protocol",
"ICMP", "icmp");
proto_register_field_array(proto_icmp, hf, array_length(hf));
expert_icmp = expert_register_protocol(proto_icmp);
expert_register_field_array(expert_icmp, ei, array_length(ei));
proto_register_subtree_array(ett, array_length(ett));
icmp_module = prefs_register_protocol(proto_icmp, NULL);
prefs_register_bool_preference(icmp_module, "favor_icmp_mpls",
"Favor ICMP extensions for MPLS",
"Whether the 128th and following bytes of the ICMP payload should be decoded as MPLS extensions or as a portion of the original packet",
&favor_icmp_mpls_ext);
register_dissector("icmp", dissect_icmp, proto_icmp);
icmp_tap = register_tap("icmp");
}
void proto_reg_handoff_icmp(void)
{
dissector_handle_t icmp_handle;
/*
* Get handle for the IP dissector.
*/
ip_handle = find_dissector_add_dependency("ip", proto_icmp);
icmp_handle = find_dissector("icmp");
dissector_add_uint("ip.proto", IP_PROTO_ICMP, icmp_handle);
register_capture_dissector("ip.proto", IP_PROTO_ICMP, capture_icmp, proto_icmp);
register_capture_dissector("ipv6.nxt", IP_PROTO_ICMP, capture_icmp, proto_icmp);
}
/*
* Editor modelines - http://www.wireshark.org/tools/modelines.html
*
* Local variables:
* c-basic-offset: 8
* tab-width: 8
* indent-tabs-mode: t
* End:
*
* vi: set shiftwidth=8 tabstop=8 noexpandtab:
* :indentSize=8:tabSize=8:noTabs=false:
*/