3 * Routines for RTP dissection
4 * RTP = Real time Transport Protocol
6 * Copyright 2000, Philips Electronics N.V.
7 * Written by Andreas Sikkema <h323@ramdyne.nl>
11 * Wireshark - Network traffic analyzer
12 * By Gerald Combs <gerald@wireshark.org>
13 * Copyright 1998 Gerald Combs
15 * This program is free software; you can redistribute it and/or
16 * modify it under the terms of the GNU General Public License
17 * as published by the Free Software Foundation; either version 2
18 * of the License, or (at your option) any later version.
20 * This program is distributed in the hope that it will be useful,
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
23 * GNU General Public License for more details.
25 * You should have received a copy of the GNU General Public License
26 * along with this program; if not, write to the Free Software
27 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
31 * This dissector tries to dissect the RTP protocol according to Annex A
32 * of ITU-T Recommendation H.225.0 (02/98) or RFC 1889
34 * RTP traffic is handled by an even UDP portnumber. This can be any
35 * port number, but there is a registered port available, port 5004
36 * See Annex B of ITU-T Recommendation H.225.0, section B.7
38 * This doesn't dissect older versions of RTP, such as:
40 * the vat protocol ("version 0") - see
42 * ftp://ftp.ee.lbl.gov/conferencing/vat/alpha-test/vatsrc-4.0b2.tar.gz
44 * and look in "session-vat.cc" if you want to write a dissector
45 * (have fun - there aren't any nice header files showing the packet
48 * version 1, as documented in
50 * ftp://gaia.cs.umass.edu/pub/hgschulz/rtp/draft-ietf-avt-rtp-04.txt
52 * It also dissects PacketCable CCC-encapsulated RTP data, as described in
53 * chapter 5 of the PacketCable Electronic Surveillance Specification:
55 * http://www.packetcable.com/downloads/specs/PKT-SP-ESP1.5-I01-050128.pdf
64 #include <epan/packet.h>
69 #include "packet-rtp.h"
70 #include <epan/rtp_pt.h>
71 #include "packet-ntp.h"
72 #include <epan/conversation.h>
73 #include <epan/reassemble.h>
76 #include <epan/prefs.h>
77 #include <epan/emem.h>
78 #include <epan/strutil.h>
82 /* uncomment this to enable debugging of fragment reassembly */
83 /* #define DEBUG_FRAGMENTS 1 */
85 typedef struct _rfc2198_hdr {
89 struct _rfc2198_hdr *next;
92 /* we have one of these for each pdu which spans more than one segment
94 typedef struct _rtp_multisegment_pdu {
95 /* the seqno of the segment where the pdu starts */
98 /* the seqno of the segment where the pdu ends */
100 } rtp_multisegment_pdu;
102 typedef struct _rtp_private_conv_info {
103 /* This tree is indexed by sequence number and keeps track of all
104 * all pdus spanning multiple segments for this flow.
106 emem_tree_t *multisegment_pdus;
107 } rtp_private_conv_info;
109 static GHashTable *fragment_table = NULL;
110 static GHashTable * fid_table = NULL;
112 static int hf_rtp_fragments = -1;
113 static int hf_rtp_fragment = -1;
114 static int hf_rtp_fragment_overlap = -1;
115 static int hf_rtp_fragment_overlap_conflict = -1;
116 static int hf_rtp_fragment_multiple_tails = -1;
117 static int hf_rtp_fragment_too_long_fragment = -1;
118 static int hf_rtp_fragment_error = -1;
119 static int hf_rtp_reassembled_in = -1;
121 static gint ett_rtp_fragment = -1;
122 static gint ett_rtp_fragments = -1;
124 static const fragment_items rtp_fragment_items = {
129 &hf_rtp_fragment_overlap,
130 &hf_rtp_fragment_overlap_conflict,
131 &hf_rtp_fragment_multiple_tails,
132 &hf_rtp_fragment_too_long_fragment,
133 &hf_rtp_fragment_error,
134 &hf_rtp_reassembled_in,
138 static dissector_handle_t rtp_handle;
139 static dissector_handle_t rtp_rfc2198_handle;
140 static dissector_handle_t stun_handle;
141 static dissector_handle_t t38_handle;
143 static dissector_handle_t pkt_ccc_handle;
145 static int rtp_tap = -1;
147 static dissector_table_t rtp_pt_dissector_table;
148 static dissector_table_t rtp_dyn_pt_dissector_table;
150 static dissector_table_t rtp_hdr_ext_dissector_table;
152 /* RTP header fields */
153 static int proto_rtp = -1;
154 static int hf_rtp_version = -1;
155 static int hf_rtp_padding = -1;
156 static int hf_rtp_extension = -1;
157 static int hf_rtp_csrc_count = -1;
158 static int hf_rtp_marker = -1;
159 static int hf_rtp_payload_type = -1;
160 static int hf_rtp_seq_nr = -1;
161 static int hf_rtp_ext_seq_nr = -1;
162 static int hf_rtp_timestamp = -1;
163 static int hf_rtp_ssrc = -1;
164 static int hf_rtp_csrc_items = -1;
165 static int hf_rtp_csrc_item = -1;
166 static int hf_rtp_data = -1;
167 static int hf_rtp_padding_data = -1;
168 static int hf_rtp_padding_count= -1;
169 static int hf_rtp_rfc2198_follow= -1;
170 static int hf_rtp_rfc2198_tm_off= -1;
171 static int hf_rtp_rfc2198_bl_len= -1;
173 /* RTP header extension fields */
174 static int hf_rtp_prof_define = -1;
175 static int hf_rtp_length = -1;
176 static int hf_rtp_hdr_exts = -1;
177 static int hf_rtp_hdr_ext = -1;
179 /* RTP setup fields */
180 static int hf_rtp_setup = -1;
181 static int hf_rtp_setup_frame = -1;
182 static int hf_rtp_setup_method = -1;
184 /* RTP fields defining a sub tree */
185 static gint ett_rtp = -1;
186 static gint ett_csrc_list = -1;
187 static gint ett_hdr_ext = -1;
188 static gint ett_rtp_setup = -1;
189 static gint ett_rtp_rfc2198 = -1;
190 static gint ett_rtp_rfc2198_hdr = -1;
193 static int hf_srtp_encrypted_payload = -1;
194 static int hf_srtp_mki = -1;
195 static int hf_srtp_auth_tag = -1;
197 /* PacketCable CCC header fields */
198 static int proto_pkt_ccc = -1;
199 static int hf_pkt_ccc_id = -1;
200 static int hf_pkt_ccc_ts = -1;
202 /* PacketCable CCC field defining a sub tree */
203 static gint ett_pkt_ccc = -1;
205 /* PacketCable CCC port preference */
206 static gboolean global_pkt_ccc_udp_port = 0;
209 #define RTP0_INVALID 0
213 static enum_val_t rtp_version0_types[] = {
214 { "invalid", "Invalid RTP packets", RTP0_INVALID },
215 { "stun", "STUN packets", RTP0_STUN },
216 { "t38", "T.38 packets", RTP0_T38 },
219 static guint global_rtp_version0_type = 0;
221 static dissector_handle_t data_handle;
223 /* Forward declaration we need below */
224 void proto_reg_handoff_rtp(void);
226 static gboolean dissect_rtp_heur( tvbuff_t *tvb, packet_info *pinfo,
228 static void dissect_rtp( tvbuff_t *tvb, packet_info *pinfo,
230 static void show_setup_info(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree);
231 static void get_conv_info(packet_info *pinfo, struct _rtp_info *rtp_info);
233 /* Preferences bool to control whether or not setup info should be shown */
234 static gboolean global_rtp_show_setup_info = TRUE;
236 /* Try heuristic RTP decode */
237 static gboolean global_rtp_heur = FALSE;
239 /* desegment RTP streams */
240 static gboolean desegment_rtp = TRUE;
242 /* RFC2198 Redundant Audio Data */
243 static guint rtp_rfc2198_pt = 99;
244 static guint rtp_saved_rfc2198_pt = 0;
247 * Fields in the first octet of the RTP header.
250 /* Version is the first 2 bits of the first octet*/
251 #define RTP_VERSION(octet) ((octet) >> 6)
253 /* Padding is the third bit; No need to shift, because true is any value
255 #define RTP_PADDING(octet) ((octet) & 0x20)
257 /* Extension bit is the fourth bit */
258 #define RTP_EXTENSION(octet) ((octet) & 0x10)
260 /* CSRC count is the last four bits */
261 #define RTP_CSRC_COUNT(octet) ((octet) & 0xF)
263 static const value_string rtp_version_vals[] =
265 { 0, "Old VAT Version" },
266 { 1, "First Draft Version" },
267 { 2, "RFC 1889 Version" },
272 * Fields in the second octet of the RTP header.
275 /* Marker is the first bit of the second octet */
276 #define RTP_MARKER(octet) ((octet) & 0x80)
278 /* Payload type is the last 7 bits */
279 #define RTP_PAYLOAD_TYPE(octet) ((octet) & 0x7F)
281 const value_string rtp_payload_type_vals[] =
283 { PT_PCMU, "ITU-T G.711 PCMU" },
284 { PT_1016, "USA Federal Standard FS-1016" },
285 { PT_G721, "ITU-T G.721" },
286 { PT_GSM, "GSM 06.10" },
287 { PT_G723, "ITU-T G.723" },
288 { PT_DVI4_8000, "DVI4 8000 samples/s" },
289 { PT_DVI4_16000, "DVI4 16000 samples/s" },
290 { PT_LPC, "Experimental linear predictive encoding from Xerox PARC" },
291 { PT_PCMA, "ITU-T G.711 PCMA" },
292 { PT_G722, "ITU-T G.722" },
293 { PT_L16_STEREO, "16-bit uncompressed audio, stereo" },
294 { PT_L16_MONO, "16-bit uncompressed audio, monaural" },
295 { PT_QCELP, "Qualcomm Code Excited Linear Predictive coding" },
296 { PT_CN, "Comfort noise" },
297 { PT_MPA, "MPEG-I/II Audio"},
298 { PT_G728, "ITU-T G.728" },
299 { PT_DVI4_11025, "DVI4 11025 samples/s" },
300 { PT_DVI4_22050, "DVI4 22050 samples/s" },
301 { PT_G729, "ITU-T G.729" },
302 { PT_CN_OLD, "Comfort noise (old)" },
303 { PT_CELB, "Sun CellB video encoding" },
304 { PT_JPEG, "JPEG-compressed video" },
305 { PT_NV, "'nv' program" },
306 { PT_H261, "ITU-T H.261" },
307 { PT_MPV, "MPEG-I/II Video"},
308 { PT_MP2T, "MPEG-II transport streams"},
309 { PT_H263, "ITU-T H.263" },
313 const value_string rtp_payload_type_short_vals[] =
315 { PT_PCMU, "g711U" },
316 { PT_1016, "fs-1016" },
320 { PT_DVI4_8000, "DVI4 8k" },
321 { PT_DVI4_16000, "DVI4 16k" },
322 { PT_LPC, "Exp. from Xerox PARC" },
323 { PT_PCMA, "g711A" },
325 { PT_L16_STEREO, "16-bit audio, stereo" },
326 { PT_L16_MONO, "16-bit audio, monaural" },
327 { PT_QCELP, "Qualcomm" },
329 { PT_MPA, "MPEG-I/II Audio"},
331 { PT_DVI4_11025, "DVI4 11k" },
332 { PT_DVI4_22050, "DVI4 22k" },
334 { PT_CN_OLD, "CN(old)" },
335 { PT_CELB, "CellB" },
339 { PT_MPV, "MPEG-I/II Video"},
340 { PT_MP2T, "MPEG-II streams"},
345 static const value_string srtp_encryption_alg_vals[] =
347 { SRTP_ENC_ALG_NULL, "Null Encryption" },
348 { SRTP_ENC_ALG_AES_CM, "AES-128 Counter Mode" },
349 { SRTP_ENC_ALG_AES_F8, "AES-128 F8 Mode" },
353 static const value_string srtp_auth_alg_vals[] =
355 { SRTP_AUTH_ALG_NONE, "No Authentication" },
356 { SRTP_AUTH_ALG_HMAC_SHA1, "HMAC-SHA1" },
361 /* initialisation routine */
362 static void rtp_fragment_init(void)
364 fragment_table_init(&fragment_table);
365 fid_table = g_hash_table_new(g_direct_hash, g_direct_equal);
369 rtp_free_hash_dyn_payload(GHashTable *rtp_dyn_payload)
371 if (rtp_dyn_payload == NULL) return;
372 g_hash_table_destroy(rtp_dyn_payload);
373 rtp_dyn_payload = NULL;
376 /* Set up an SRTP conversation */
377 void srtp_add_address(packet_info *pinfo,
378 address *addr, int port,
380 const gchar *setup_method, guint32 setup_frame_number, GHashTable *rtp_dyn_payload,
381 struct srtp_info *srtp_info)
384 conversation_t* p_conv;
385 struct _rtp_conversation_info *p_conv_data = NULL;
388 * If this isn't the first time this packet has been processed,
389 * we've already done this work, so we don't need to do it
392 if (pinfo->fd->flags.visited)
398 printf("#%u: %srtp_add_address(%s, %u, %u, %s, %u\n", pinfo->fd->num, (srtp_info)?"s":"", address_to_str(addr), port, other_port, setup_method, setup_frame_number);
401 SET_ADDRESS(&null_addr, AT_NONE, 0, NULL);
404 * Check if the ip address and port combination is not
405 * already registered as a conversation.
407 p_conv = find_conversation( setup_frame_number, addr, &null_addr, PT_UDP, port, other_port,
408 NO_ADDR_B | (!other_port ? NO_PORT_B : 0));
411 * If not, create a new conversation.
413 if ( !p_conv || p_conv->setup_frame != setup_frame_number) {
414 p_conv = conversation_new( setup_frame_number, addr, &null_addr, PT_UDP,
415 (guint32)port, (guint32)other_port,
416 NO_ADDR2 | (!other_port ? NO_PORT2 : 0));
420 conversation_set_dissector(p_conv, rtp_handle);
423 * Check if the conversation has data associated with it.
425 p_conv_data = conversation_get_proto_data(p_conv, proto_rtp);
428 * If not, add a new data item.
430 if ( ! p_conv_data ) {
431 /* Create conversation data */
432 p_conv_data = se_alloc(sizeof(struct _rtp_conversation_info));
433 p_conv_data->rtp_dyn_payload = NULL;
435 /* start this at 0x10000 so that we cope gracefully with the
436 * first few packets being out of order (hence 0,65535,1,2,...)
438 p_conv_data->extended_seqno = 0x10000;
439 p_conv_data->rtp_conv_info = se_alloc(sizeof(rtp_private_conv_info));
440 p_conv_data->rtp_conv_info->multisegment_pdus = se_tree_create(EMEM_TREE_TYPE_RED_BLACK,"rtp_ms_pdus");
441 conversation_add_proto_data(p_conv, proto_rtp, p_conv_data);
445 * Update the conversation data.
447 /* Free the hash if already exists */
448 rtp_free_hash_dyn_payload(p_conv_data->rtp_dyn_payload);
450 g_strlcpy(p_conv_data->method, setup_method, MAX_RTP_SETUP_METHOD_SIZE);
451 p_conv_data->frame_number = setup_frame_number;
452 p_conv_data->rtp_dyn_payload = rtp_dyn_payload;
453 p_conv_data->srtp_info = srtp_info;
456 /* Set up an RTP conversation */
457 void rtp_add_address(packet_info *pinfo,
458 address *addr, int port,
460 const gchar *setup_method, guint32 setup_frame_number, GHashTable *rtp_dyn_payload)
462 srtp_add_address(pinfo, addr, port, other_port, setup_method, setup_frame_number, rtp_dyn_payload, NULL);
466 dissect_rtp_heur( tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree )
468 guint8 octet1, octet2;
469 unsigned int version;
470 unsigned int payload_type;
471 unsigned int offset = 0;
473 /* This is a heuristic dissector, which means we get all the UDP
474 * traffic not sent to a known dissector and not claimed by
475 * a heuristic dissector called before us!
478 if (! global_rtp_heur)
481 /* Get the fields in the first octet */
482 octet1 = tvb_get_guint8( tvb, offset );
483 version = RTP_VERSION( octet1 );
486 switch (global_rtp_version0_type) {
488 call_dissector(stun_handle, tvb, pinfo, tree);
492 call_dissector(t38_handle, tvb, pinfo, tree);
498 return FALSE; /* Unknown or unsupported version */
500 } else if (version != 2) {
501 /* Unknown or unsupported version */
505 /* Was it sent between 2 even-numbered ports? */
506 if ((pinfo->srcport % 2) || (pinfo->destport % 2)) {
510 /* Get the fields in the second octet */
511 octet2 = tvb_get_guint8( tvb, offset + 1 );
512 payload_type = RTP_PAYLOAD_TYPE( octet2 );
514 /* Check for a sensible payload type
515 (recognised static and preferred dynamic ranges) */
516 if ((payload_type <= PT_H263) ||
517 (payload_type >= 96 && payload_type <= 127)) {
518 dissect_rtp( tvb, pinfo, tree );
527 * Process the payload of the RTP packet, hand it to the subdissector
530 process_rtp_payload(tvbuff_t *newtvb, packet_info *pinfo, proto_tree *tree,
531 proto_tree *rtp_tree,
532 unsigned int payload_type)
534 struct _rtp_conversation_info *p_conv_data = NULL;
535 gboolean found_match = FALSE;
537 struct srtp_info *srtp_info;
540 payload_len = tvb_length_remaining(newtvb, offset);
542 /* first check if this is added as an SRTP stream - if so, don't try to dissector the payload data for now */
543 p_conv_data = p_get_proto_data(pinfo->fd, proto_rtp);
544 if (p_conv_data && p_conv_data->srtp_info) {
545 srtp_info = p_conv_data->srtp_info;
546 payload_len -= srtp_info->mki_len + srtp_info->auth_tag_len;
548 #error Currently the srtp_info structure contains no cypher data, see packet-sdp.c adding dummy_srtp_info structure
549 if (p_conv_data->srtp_info->encryption_algorithm==SRTP_ENC_ALG_NULL) {
551 proto_tree_add_text(rtp_tree, newtvb, offset, payload_len, "SRTP Payload with NULL encryption");
557 proto_tree_add_item(rtp_tree, hf_srtp_encrypted_payload, newtvb, offset, payload_len, FALSE);
558 found_match = TRUE; /* use this flag to prevent dissection below */
560 offset += payload_len;
562 if (srtp_info->mki_len) {
563 proto_tree_add_item(rtp_tree, hf_srtp_mki, newtvb, offset, srtp_info->mki_len, FALSE);
564 offset += srtp_info->mki_len;
567 if (srtp_info->auth_tag_len) {
568 proto_tree_add_item(rtp_tree, hf_srtp_auth_tag, newtvb, offset, srtp_info->auth_tag_len, FALSE);
569 offset += srtp_info->auth_tag_len;
573 /* if the payload type is dynamic (96 to 127), we check if the conv is set and we look for the pt definition */
574 else if ( (payload_type >=96) && (payload_type <=127) ) {
575 if (p_conv_data && p_conv_data->rtp_dyn_payload) {
576 gchar *payload_type_str = NULL;
577 payload_type_str = g_hash_table_lookup(p_conv_data->rtp_dyn_payload, &payload_type);
578 if (payload_type_str){
579 found_match = dissector_try_string(rtp_dyn_pt_dissector_table,
580 payload_type_str, newtvb, pinfo, tree);
581 /* If payload type string set from conversation and
582 * no matching dissector found it's probably because no subdissector
583 * exists. Don't call the dissectors based on payload number
584 * as that'd probably be the wrong dissector in this case.
585 * Just add it as data.
587 if(found_match==FALSE)
588 proto_tree_add_item( rtp_tree, hf_rtp_data, newtvb, 0, -1, FALSE );
595 /* if we don't found, it is static OR could be set static from the preferences */
596 if (!found_match && !dissector_try_port(rtp_pt_dissector_table, payload_type, newtvb, pinfo, tree))
597 proto_tree_add_item( rtp_tree, hf_rtp_data, newtvb, 0, -1, FALSE );
601 /* Rtp payload reassembly
603 * This handles the reassembly of PDUs for higher-level protocols.
605 * We're a bit limited on how we can cope with out-of-order packets, because
606 * we don't have any idea of where the datagram boundaries are. So if we see
607 * packets A, C, B (all of which comprise a single datagram), we cannot know
608 * that C should be added to the same datagram as A, until we come to B (which
609 * may or may not actually be present...).
611 * What we end up doing in this case is passing A+B to the subdissector as one
612 * datagram, and make out that a new one starts on C.
615 dissect_rtp_data( tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
616 proto_tree *rtp_tree, int offset, unsigned int data_len,
617 unsigned int data_reported_len,
618 unsigned int payload_type )
621 struct _rtp_conversation_info *p_conv_data= NULL;
622 gboolean must_desegment = FALSE;
623 rtp_private_conv_info *finfo = NULL;
624 rtp_multisegment_pdu *msp = NULL;
627 /* Retrieve RTPs idea of a converation */
628 p_conv_data = p_get_proto_data(pinfo->fd, proto_rtp);
630 if(p_conv_data != NULL)
631 finfo = p_conv_data->rtp_conv_info;
633 if(finfo == NULL || !desegment_rtp) {
634 /* Hand the whole lot off to the subdissector */
635 newtvb=tvb_new_subset(tvb,offset,data_len,data_reported_len);
636 process_rtp_payload(newtvb, pinfo, tree, rtp_tree, payload_type);
640 seqno = p_conv_data->extended_seqno;
642 pinfo->can_desegment = 2;
643 pinfo->desegment_offset = 0;
644 pinfo->desegment_len = 0;
646 #ifdef DEBUG_FRAGMENTS
647 g_debug("%d: RTP Part of convo %d(%p); seqno %d",
649 p_conv_data->frame_number, p_conv_data,
654 /* look for a pdu which we might be extending */
655 msp = (rtp_multisegment_pdu *)se_tree_lookup32_le(finfo->multisegment_pdus,seqno-1);
657 if(msp && msp->startseq < seqno && msp->endseq >= seqno) {
658 guint32 fid = msp->startseq;
659 fragment_data *fd_head;
661 #ifdef DEBUG_FRAGMENTS
662 g_debug("\tContinues fragment %d", fid);
665 /* we always assume the datagram is complete; if this is the
666 * first pass, that's our best guess, and if it's not, what we
667 * say gets ignored anyway.
669 fd_head = fragment_add_seq(tvb, offset, pinfo, fid, fragment_table,
670 seqno-msp->startseq, data_len, FALSE);
672 newtvb = process_reassembled_data(tvb,offset, pinfo, "Reassembled RTP", fd_head,
673 &rtp_fragment_items, NULL, tree);
675 #ifdef DEBUG_FRAGMENTS
676 g_debug("\tFragment Coalesced; fd_head=%p, newtvb=%p (len %d)",fd_head, newtvb,
677 newtvb?tvb_reported_length(newtvb):0);
681 /* Hand off to the subdissector */
682 process_rtp_payload(newtvb, pinfo, tree, rtp_tree, payload_type);
685 * Check to see if there were any complete fragments within the chunk
687 if( pinfo->desegment_len && pinfo->desegment_offset == 0 )
689 #ifdef DEBUG_FRAGMENTS
690 g_debug("\tNo complete pdus in payload" );
692 /* Mark the fragments and not complete yet */
693 fragment_set_partial_reassembly(pinfo, fid, fragment_table);
695 /* we must need another segment */
696 msp->endseq = MIN(msp->endseq,seqno) + 1;
701 * Data was dissected so add the protocol tree to the display
703 proto_item *rtp_tree_item, *frag_tree_item;
704 /* this nargery is to insert the fragment tree into the main tree
705 * between the RTP protocol entry and the subdissector entry */
706 show_fragment_tree(fd_head, &rtp_fragment_items, tree, pinfo, newtvb, &frag_tree_item);
707 rtp_tree_item = proto_item_get_parent( proto_tree_get_parent( rtp_tree ));
708 if( frag_tree_item && rtp_tree_item )
709 proto_tree_move_item( tree, rtp_tree_item, frag_tree_item );
712 if(pinfo->desegment_len)
714 /* the higher-level dissector has asked for some more data - ie,
715 the end of this segment does not coincide with the end of a
717 must_desegment = TRUE;
727 * The segment is not the continuation of a fragmented segment
728 * so process it as normal
730 #ifdef DEBUG_FRAGMENTS
731 g_debug("\tRTP non-fragment payload");
733 newtvb = tvb_new_subset( tvb, offset, data_len, data_reported_len );
735 /* Hand off to the subdissector */
736 process_rtp_payload(newtvb, pinfo, tree, rtp_tree, payload_type);
738 if(pinfo->desegment_len) {
739 /* the higher-level dissector has asked for some more data - ie,
740 the end of this segment does not coincide with the end of a
742 must_desegment = TRUE;
747 * There were bytes left over that the higher protocol couldn't dissect so save them
751 guint32 deseg_offset = pinfo->desegment_offset;
752 guint32 frag_len = tvb_reported_length_remaining(newtvb, deseg_offset);
753 fragment_data *fd_head = NULL;
755 #ifdef DEBUG_FRAGMENTS
756 g_debug("\tRTP Must Desegment: tvb_len=%d ds_len=%d %d frag_len=%d ds_off=%d",
757 tvb_reported_length(newtvb),
758 pinfo->desegment_len,
759 pinfo->fd->flags.visited,
763 /* allocate a new msp for this pdu */
764 msp = se_alloc(sizeof(rtp_multisegment_pdu));
765 msp->startseq = seqno;
766 msp->endseq = seqno+1;
767 se_tree_insert32(finfo->multisegment_pdus,seqno,msp);
770 * Add the fragment to the fragment table
772 fd_head = fragment_add_seq(newtvb,deseg_offset, pinfo, seqno, fragment_table, 0, frag_len,
777 if( fd_head->reassembled_in != 0 && !(fd_head->flags & FD_PARTIAL_REASSEMBLY) )
779 proto_item *rtp_tree_item;
780 rtp_tree_item = proto_tree_add_uint( tree, hf_rtp_reassembled_in,
781 newtvb, deseg_offset, tvb_reported_length_remaining(newtvb,deseg_offset),
782 fd_head->reassembled_in);
783 PROTO_ITEM_SET_GENERATED(rtp_tree_item);
784 #ifdef DEBUG_FRAGMENTS
785 g_debug("\tReassembled in %d", fd_head->reassembled_in);
790 #ifdef DEBUG_FRAGMENTS
791 g_debug("\tUnfinished fragment");
793 /* this fragment is never reassembled */
794 proto_tree_add_text( tree, tvb, deseg_offset, -1,"RTP fragment, unfinished");
800 * This fragment was the first fragment in a new entry in the
801 * frag_table; we don't yet know where it is reassembled
803 #ifdef DEBUG_FRAGMENTS
804 g_debug("\tnew pdu");
808 if( pinfo->desegment_offset == 0 )
810 if (check_col(pinfo->cinfo, COL_PROTOCOL))
812 col_set_str(pinfo->cinfo, COL_PROTOCOL, "RTP");
814 if (check_col(pinfo->cinfo, COL_INFO))
816 col_set_str(pinfo->cinfo, COL_INFO, "[RTP segment of a reassembled PDU]");
823 pinfo->can_desegment = 0;
824 pinfo->desegment_offset = 0;
825 pinfo->desegment_len = 0;
831 dissect_rtp_rfc2198(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree )
836 gboolean hdr_follow = TRUE;
837 proto_item *ti = NULL;
838 proto_tree *rfc2198_tree = NULL;
839 proto_tree *rfc2198_hdr_tree = NULL;
840 rfc2198_hdr *hdr_last, *hdr_new;
841 rfc2198_hdr *hdr_chain = NULL;
842 struct _rtp_conversation_info *p_conv_data= NULL;
843 gchar *payload_type_str;
845 /* Retrieve RTPs idea of a converation */
846 p_conv_data = p_get_proto_data(pinfo->fd, proto_rtp);
848 /* Add try to RFC 2198 data */
849 ti = proto_tree_add_text(tree, tvb, offset, -1, "RFC 2198: Redundant Audio Data");
850 rfc2198_tree = proto_item_add_subtree(ti, ett_rtp_rfc2198);
856 payload_type_str = NULL;
858 /* Allocate and fill in header */
859 hdr_new = ep_alloc(sizeof(rfc2198_hdr));
860 hdr_new->next = NULL;
861 octet1 = tvb_get_guint8(tvb, offset);
862 hdr_new->pt = RTP_PAYLOAD_TYPE(octet1);
863 hdr_follow = (octet1 & 0x80);
865 /* if it is dynamic payload, let use the conv data to see if it is defined */
866 if ((hdr_new->pt > 95) && (hdr_new->pt < 128)) {
867 if (p_conv_data && p_conv_data->rtp_dyn_payload){
868 payload_type_str = g_hash_table_lookup(p_conv_data->rtp_dyn_payload, &hdr_new->pt);
871 /* Add a subtree for this header and add items */
872 ti = proto_tree_add_text(rfc2198_tree, tvb, offset, (hdr_follow)?4:1, "Header %u", cnt);
873 rfc2198_hdr_tree = proto_item_add_subtree(ti, ett_rtp_rfc2198_hdr);
874 proto_tree_add_item(rfc2198_hdr_tree, hf_rtp_rfc2198_follow, tvb, offset, 1, FALSE );
875 proto_tree_add_uint_format(rfc2198_hdr_tree, hf_rtp_payload_type, tvb,
876 offset, 1, octet1, "Payload type: %s (%u)",
877 payload_type_str ? payload_type_str : val_to_str(hdr_new->pt, rtp_payload_type_vals, "Unknown"),
879 proto_item_append_text(ti, ": PT=%s", payload_type_str ? payload_type_str : val_to_str(hdr_new->pt, rtp_payload_type_vals, "Unknown (%u)"));
882 /* Timestamp offset and block length don't apply to last header */
884 proto_tree_add_item(rfc2198_hdr_tree, hf_rtp_rfc2198_tm_off, tvb, offset, 2, FALSE );
885 proto_tree_add_item(rfc2198_hdr_tree, hf_rtp_rfc2198_bl_len, tvb, offset + 1, 2, FALSE );
886 hdr_new->len = tvb_get_ntohs(tvb, offset + 1) & 0x03FF;
887 proto_item_append_text(ti, ", len=%u", hdr_new->len);
895 hdr_last->next = hdr_new;
902 /* Dissect each data block according to the header info */
903 hdr_last = hdr_chain;
905 hdr_last->offset = offset;
906 if (!hdr_last->next) {
907 hdr_last->len = tvb_reported_length_remaining(tvb, offset);
909 dissect_rtp_data(tvb, pinfo, tree, rfc2198_tree, hdr_last->offset, hdr_last->len, hdr_last->len, hdr_last->pt);
910 offset += hdr_last->len;
911 hdr_last = hdr_last->next;
916 dissect_rtp( tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree )
918 proto_item *ti = NULL;
919 proto_tree *rtp_tree = NULL;
920 proto_tree *rtp_csrc_tree = NULL;
921 proto_tree *rtp_hext_tree = NULL;
922 guint8 octet1, octet2;
923 unsigned int version;
924 gboolean padding_set;
925 gboolean extension_set;
926 unsigned int csrc_count;
928 unsigned int payload_type;
929 gchar *payload_type_str = NULL;
930 gboolean is_srtp = FALSE;
932 unsigned int hdr_extension= 0;
933 unsigned int padding_count;
934 gint length, reported_length;
936 unsigned int offset = 0;
941 struct _rtp_conversation_info *p_conv_data = NULL;
942 struct srtp_info *srtp_info = NULL;
943 unsigned int srtp_offset;
944 tvbuff_t *newtvb = NULL;
946 /* Can tap up to 4 RTP packets within same packet */
947 static struct _rtp_info rtp_info_arr[4];
948 static int rtp_info_current=0;
949 struct _rtp_info *rtp_info;
952 if (rtp_info_current==4) {
955 rtp_info = &rtp_info_arr[rtp_info_current];
957 /* Get the fields in the first octet */
958 octet1 = tvb_get_guint8( tvb, offset );
959 version = RTP_VERSION( octet1 );
962 switch (global_rtp_version0_type) {
964 call_dissector(stun_handle, tvb, pinfo, tree);
968 call_dissector(t38_handle, tvb, pinfo, tree);
973 ; /* Unknown or unsupported version (let it fall through */
977 /* fill in the rtp_info structure */
978 rtp_info->info_version = version;
981 * Unknown or unsupported version.
983 if ( check_col( pinfo->cinfo, COL_PROTOCOL ) ) {
984 col_set_str( pinfo->cinfo, COL_PROTOCOL, "RTP" );
987 if ( check_col( pinfo->cinfo, COL_INFO) ) {
988 col_add_fstr( pinfo->cinfo, COL_INFO,
989 "Unknown RTP version %u", version);
993 ti = proto_tree_add_item( tree, proto_rtp, tvb, offset, -1, FALSE );
994 rtp_tree = proto_item_add_subtree( ti, ett_rtp );
996 proto_tree_add_uint( rtp_tree, hf_rtp_version, tvb,
1002 padding_set = RTP_PADDING( octet1 );
1003 extension_set = RTP_EXTENSION( octet1 );
1004 csrc_count = RTP_CSRC_COUNT( octet1 );
1006 /* Get the fields in the second octet */
1007 octet2 = tvb_get_guint8( tvb, offset + 1 );
1008 marker_set = RTP_MARKER( octet2 );
1009 payload_type = RTP_PAYLOAD_TYPE( octet2 );
1011 /* Get the subsequent fields */
1012 seq_num = tvb_get_ntohs( tvb, offset + 2 );
1013 timestamp = tvb_get_ntohl( tvb, offset + 4 );
1014 sync_src = tvb_get_ntohl( tvb, offset + 8 );
1016 /* fill in the rtp_info structure */
1017 rtp_info->info_padding_set = padding_set;
1018 rtp_info->info_padding_count = 0;
1019 rtp_info->info_marker_set = marker_set;
1020 rtp_info->info_payload_type = payload_type;
1021 rtp_info->info_seq_num = seq_num;
1022 rtp_info->info_timestamp = timestamp;
1023 rtp_info->info_sync_src = sync_src;
1024 rtp_info->info_is_srtp = FALSE;
1025 rtp_info->info_setup_frame_num = 0;
1026 rtp_info->info_payload_type_str = NULL;
1029 * Do we have all the data?
1031 length = tvb_length_remaining(tvb, offset);
1032 reported_length = tvb_reported_length_remaining(tvb, offset);
1033 if (reported_length >= 0 && length >= reported_length) {
1037 rtp_info->info_all_data_present = TRUE;
1038 rtp_info->info_data_len = reported_length;
1041 * Save the pointer to raw rtp data (header + payload incl.
1043 * That should be safe because the "epan_dissect_t"
1044 * constructed for the packet has not yet been freed when
1045 * the taps are called.
1046 * (Destroying the "epan_dissect_t" will end up freeing
1047 * all the tvbuffs and hence invalidating pointers to
1049 * See "add_packet_to_packet_list()" for details.
1051 rtp_info->info_data = tvb_get_ptr(tvb, 0, -1);
1054 * No - packet was cut short at capture time.
1056 rtp_info->info_all_data_present = FALSE;
1057 rtp_info->info_data_len = 0;
1058 rtp_info->info_data = NULL;
1061 /* Look for conv and add to the frame if found */
1062 get_conv_info(pinfo, rtp_info);
1063 p_conv_data = p_get_proto_data(pinfo->fd, proto_rtp);
1065 if (p_conv_data && p_conv_data->srtp_info) is_srtp = TRUE;
1066 rtp_info->info_is_srtp = is_srtp;
1068 if ( check_col( pinfo->cinfo, COL_PROTOCOL ) ) {
1069 col_set_str( pinfo->cinfo, COL_PROTOCOL, (is_srtp) ? "SRTP" : "RTP" );
1072 /* check if this is added as an SRTP stream - if so, don't try to dissector the payload data for now */
1073 p_conv_data = p_get_proto_data(pinfo->fd, proto_rtp);
1074 if (p_conv_data && p_conv_data->srtp_info) {
1075 srtp_info = p_conv_data->srtp_info;
1076 if (rtp_info->info_all_data_present) {
1077 srtp_offset = rtp_info->info_data_len - srtp_info->mki_len - srtp_info->auth_tag_len;
1081 /* if it is dynamic payload, let use the conv data to see if it is defined */
1082 if ( (payload_type>95) && (payload_type<128) ) {
1083 if (p_conv_data && p_conv_data->rtp_dyn_payload){
1084 payload_type_str = g_hash_table_lookup(p_conv_data->rtp_dyn_payload, &payload_type);
1085 rtp_info->info_payload_type_str = payload_type_str;
1089 if ( check_col( pinfo->cinfo, COL_INFO) ) {
1090 col_add_fstr( pinfo->cinfo, COL_INFO,
1091 "PT=%s, SSRC=0x%X, Seq=%u, Time=%u%s",
1092 payload_type_str ? payload_type_str : val_to_str( payload_type, rtp_payload_type_vals,"Unknown (%u)" ),
1096 marker_set ? ", Mark " : " ");
1102 /* Create RTP protocol tree */
1103 ti = proto_tree_add_item(tree, proto_rtp, tvb, offset, -1, FALSE );
1104 rtp_tree = proto_item_add_subtree(ti, ett_rtp );
1106 /* Conversation setup info */
1107 if (global_rtp_show_setup_info)
1109 show_setup_info(tvb, pinfo, rtp_tree);
1112 proto_tree_add_uint( rtp_tree, hf_rtp_version, tvb,
1113 offset, 1, octet1 );
1114 proto_tree_add_boolean( rtp_tree, hf_rtp_padding, tvb,
1115 offset, 1, octet1 );
1116 proto_tree_add_boolean( rtp_tree, hf_rtp_extension, tvb,
1117 offset, 1, octet1 );
1118 proto_tree_add_uint( rtp_tree, hf_rtp_csrc_count, tvb,
1119 offset, 1, octet1 );
1122 proto_tree_add_boolean( rtp_tree, hf_rtp_marker, tvb, offset,
1125 item = proto_tree_add_uint_format( rtp_tree, hf_rtp_payload_type, tvb,
1126 offset, 1, octet2, "Payload type: %s (%u)",
1127 payload_type_str ? payload_type_str : val_to_str( payload_type, rtp_payload_type_vals,"Unknown"),
1132 /* Sequence number 16 bits (2 octets) */
1133 proto_tree_add_uint( rtp_tree, hf_rtp_seq_nr, tvb, offset, 2, seq_num );
1134 if(p_conv_data != NULL) {
1135 item = proto_tree_add_uint( rtp_tree, hf_rtp_ext_seq_nr, tvb, offset, 2, p_conv_data->extended_seqno );
1136 PROTO_ITEM_SET_GENERATED(item);
1140 /* Timestamp 32 bits (4 octets) */
1141 proto_tree_add_uint( rtp_tree, hf_rtp_timestamp, tvb, offset, 4, timestamp );
1144 /* Synchronization source identifier 32 bits (4 octets) */
1145 proto_tree_add_uint( rtp_tree, hf_rtp_ssrc, tvb, offset, 4, sync_src );
1151 if ( csrc_count > 0 ) {
1153 ti = proto_tree_add_item(rtp_tree, hf_rtp_csrc_items, tvb, offset,
1154 csrc_count * 4, FALSE);
1155 proto_item_append_text(ti, " (%u items)", csrc_count);
1156 rtp_csrc_tree = proto_item_add_subtree( ti, ett_csrc_list );
1158 for (i = 0; i < csrc_count; i++ ) {
1159 csrc_item = tvb_get_ntohl( tvb, offset );
1160 if ( tree ) proto_tree_add_uint_format( rtp_csrc_tree,
1161 hf_rtp_csrc_item, tvb, offset, 4,
1163 "CSRC item %d: 0x%X",
1169 /* Optional RTP header extension */
1170 if ( extension_set ) {
1171 /* Defined by profile field is 16 bits (2 octets) */
1172 if ( tree ) proto_tree_add_uint( rtp_tree, hf_rtp_prof_define, tvb, offset, 2, tvb_get_ntohs( tvb, offset ) );
1175 hdr_extension = tvb_get_ntohs( tvb, offset );
1176 if ( tree ) proto_tree_add_uint( rtp_tree, hf_rtp_length, tvb, offset, 2, hdr_extension);
1178 if ( hdr_extension > 0 ) {
1180 ti = proto_tree_add_item(rtp_tree, hf_rtp_hdr_exts, tvb, offset, hdr_extension * 4, FALSE);
1181 rtp_hext_tree = proto_item_add_subtree( ti, ett_hdr_ext );
1184 /* pass interpretation of header extension to a registered subdissector */
1185 newtvb = tvb_new_subset(tvb, offset, hdr_extension * 4, hdr_extension * 4);
1186 if ( !(rtp_info->info_payload_type_str && dissector_try_string(rtp_hdr_ext_dissector_table,
1187 rtp_info->info_payload_type_str, newtvb, pinfo, rtp_hext_tree)) ) {
1188 for ( i = 0; i < hdr_extension; i++ ) {
1189 if ( tree ) proto_tree_add_uint( rtp_hext_tree, hf_rtp_hdr_ext, tvb, offset, 4, tvb_get_ntohl( tvb, offset ) );
1192 offset += hdr_extension * 4;
1196 if ( padding_set ) {
1198 * This RTP frame has padding - find it.
1200 * The padding count is found in the LAST octet of
1201 * the packet; it contains the number of octets
1202 * that can be ignored at the end of the packet.
1204 if (tvb_length(tvb) < tvb_reported_length(tvb)) {
1206 * We don't *have* the last octet of the
1207 * packet, so we can't get the padding
1210 * Put an indication of that into the
1211 * tree, and just put in a raw data
1214 if ( tree ) proto_tree_add_text(rtp_tree, tvb, 0, 0,
1215 "Frame has padding, but not all the frame data was captured");
1216 call_dissector(data_handle,
1217 tvb_new_subset(tvb, offset, -1, -1),
1222 padding_count = tvb_get_guint8( tvb,
1223 tvb_reported_length( tvb ) - 1 );
1225 tvb_reported_length_remaining( tvb, offset ) - padding_count;
1227 rtp_info->info_payload_offset = offset;
1228 rtp_info->info_payload_len = tvb_length_remaining(tvb, offset);
1229 rtp_info->info_padding_count = padding_count;
1233 * There's data left over when you take out
1234 * the padding; dissect it.
1236 dissect_rtp_data( tvb, pinfo, tree, rtp_tree,
1242 } else if (data_len < 0) {
1244 * The padding count is bigger than the
1245 * amount of RTP payload in the packet!
1246 * Clip the padding count.
1248 * XXX - put an item in the tree to indicate
1249 * that the padding count is bogus?
1252 tvb_reported_length_remaining(tvb, offset);
1254 if (padding_count > 1) {
1256 * There's more than one byte of padding;
1257 * show all but the last byte as padding
1260 if ( tree ) proto_tree_add_item( rtp_tree, hf_rtp_padding_data,
1261 tvb, offset, padding_count - 1, FALSE );
1262 offset += padding_count - 1;
1265 * Show the last byte in the PDU as the padding
1268 if ( tree ) proto_tree_add_item( rtp_tree, hf_rtp_padding_count,
1269 tvb, offset, 1, FALSE );
1275 dissect_rtp_data( tvb, pinfo, tree, rtp_tree, offset,
1276 tvb_length_remaining( tvb, offset ),
1277 tvb_reported_length_remaining( tvb, offset ),
1279 rtp_info->info_payload_offset = offset;
1280 rtp_info->info_payload_len = tvb_length_remaining(tvb, offset);
1282 if (!pinfo->in_error_pkt)
1283 tap_queue_packet(rtp_tap, pinfo, rtp_info);
1287 /* calculate the extended sequence number - top 16 bits of the previous sequence number,
1288 * plus our own; then correct for wrapping */
1289 static guint32 calculate_extended_seqno(guint32 previous_seqno, guint16 raw_seqno)
1291 guint32 seqno = (previous_seqno & 0xffff0000) | raw_seqno;
1292 if(seqno + 0x8000 < previous_seqno) {
1294 } else if(previous_seqno + 0x8000 < seqno) {
1295 /* we got an out-of-order packet which happened to go backwards over the
1302 /* Look for conversation info */
1303 static void get_conv_info(packet_info *pinfo, struct _rtp_info *rtp_info)
1305 /* Conversation and current data */
1306 conversation_t *p_conv = NULL;
1307 struct _rtp_conversation_info *p_conv_data = NULL;
1309 /* Use existing packet info if available */
1310 p_conv_data = p_get_proto_data(pinfo->fd, proto_rtp);
1314 /* First time, get info from conversation */
1315 p_conv = find_conversation(pinfo->fd->num, &pinfo->net_dst, &pinfo->net_src,
1317 pinfo->destport, pinfo->srcport, NO_ADDR_B);
1320 /* Create space for packet info */
1321 struct _rtp_conversation_info *p_conv_packet_data;
1322 p_conv_data = conversation_get_proto_data(p_conv, proto_rtp);
1327 /* Save this conversation info into packet info */
1328 p_conv_packet_data = se_alloc(sizeof(struct _rtp_conversation_info));
1329 g_snprintf(p_conv_packet_data->method, MAX_RTP_SETUP_METHOD_SIZE+1, "%s", p_conv_data->method);
1330 p_conv_packet_data->method[MAX_RTP_SETUP_METHOD_SIZE]='\0';
1331 p_conv_packet_data->frame_number = p_conv_data->frame_number;
1332 p_conv_packet_data->rtp_dyn_payload = p_conv_data->rtp_dyn_payload;
1333 p_conv_packet_data->rtp_conv_info = p_conv_data->rtp_conv_info;
1334 p_conv_packet_data->srtp_info = p_conv_data->srtp_info;
1335 p_add_proto_data(pinfo->fd, proto_rtp, p_conv_packet_data);
1337 /* calculate extended sequence number */
1338 seqno = calculate_extended_seqno(p_conv_data->extended_seqno,
1339 rtp_info->info_seq_num);
1341 p_conv_packet_data->extended_seqno = seqno;
1342 p_conv_data->extended_seqno = seqno;
1346 if (p_conv_data) rtp_info->info_setup_frame_num = p_conv_data->frame_number;
1350 /* Display setup info */
1351 static void show_setup_info(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
1353 /* Conversation and current data */
1354 struct _rtp_conversation_info *p_conv_data = NULL;
1355 proto_tree *rtp_setup_tree;
1358 /* Use existing packet info if available */
1359 p_conv_data = p_get_proto_data(pinfo->fd, proto_rtp);
1361 if (!p_conv_data) return;
1363 /* Create setup info subtree with summary info. */
1364 ti = proto_tree_add_string_format(tree, hf_rtp_setup, tvb, 0, 0,
1366 "Stream setup by %s (frame %u)",
1367 p_conv_data->method,
1368 p_conv_data->frame_number);
1369 PROTO_ITEM_SET_GENERATED(ti);
1370 rtp_setup_tree = proto_item_add_subtree(ti, ett_rtp_setup);
1373 /* Add details into subtree */
1374 proto_item* item = proto_tree_add_uint(rtp_setup_tree, hf_rtp_setup_frame,
1375 tvb, 0, 0, p_conv_data->frame_number);
1376 PROTO_ITEM_SET_GENERATED(item);
1377 item = proto_tree_add_string(rtp_setup_tree, hf_rtp_setup_method,
1378 tvb, 0, 0, p_conv_data->method);
1379 PROTO_ITEM_SET_GENERATED(item);
1383 /* Dissect PacketCable CCC header */
1386 dissect_pkt_ccc(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
1388 proto_item *ti = NULL;
1389 proto_tree *pkt_ccc_tree = NULL;
1390 const guint8 *ptime = tvb_get_ptr(tvb, 4, 8);
1393 ti = proto_tree_add_item(tree, proto_pkt_ccc, tvb, 0, 12, FALSE);
1394 pkt_ccc_tree = proto_item_add_subtree(ti, ett_pkt_ccc);
1396 proto_tree_add_item(pkt_ccc_tree, hf_pkt_ccc_id, tvb, 0, 4, FALSE);
1397 proto_tree_add_bytes_format(pkt_ccc_tree, hf_pkt_ccc_ts, tvb,
1398 4, 8, "NTP timestamp: %s", ntp_fmt_ts(ptime));
1401 dissect_rtp(tvb, pinfo, tree);
1405 /* Register PacketCable CCC */
1408 proto_register_pkt_ccc(void)
1410 static hf_register_info hf[] =
1415 "PacketCable CCC Identifier",
1427 "PacketCable CCC Timestamp",
1439 static gint *ett[] =
1444 module_t *pkt_ccc_module;
1447 proto_pkt_ccc = proto_register_protocol("PacketCable Call Content Connection",
1448 "PKT CCC", "pkt_ccc");
1449 proto_register_field_array(proto_pkt_ccc, hf, array_length(hf));
1450 proto_register_subtree_array(ett, array_length(ett));
1452 register_dissector("pkt_ccc", dissect_pkt_ccc, proto_pkt_ccc);
1454 pkt_ccc_module = prefs_register_protocol(proto_pkt_ccc, NULL);
1456 prefs_register_uint_preference(pkt_ccc_module, "udp_port",
1458 "Decode packets on this UDP port as PacketCable CCC",
1459 10, &global_pkt_ccc_udp_port);
1463 proto_reg_handoff_pkt_ccc(void)
1466 * Register this dissector as one that can be selected by a
1469 pkt_ccc_handle = find_dissector("pkt_ccc");
1470 dissector_add_handle("udp.port", pkt_ccc_handle);
1476 proto_register_rtp(void)
1478 static hf_register_info hf[] =
1487 VALS(rtp_version_vals),
1519 "Contributing source identifiers count",
1541 &hf_rtp_payload_type,
1567 "Extended sequence number",
1591 "Synchronization Source identifier",
1601 &hf_rtp_prof_define,
1603 "Defined by profile",
1627 "Contributing Source identifiers",
1651 "Header extensions",
1685 &hf_rtp_padding_data,
1697 &hf_rtp_padding_count,
1700 "rtp.padding.count",
1717 "Stream setup, method and frame number", HFILL
1721 &hf_rtp_setup_frame,
1729 "Frame that set up this stream", HFILL
1733 &hf_rtp_setup_method,
1741 "Method used to set up this stream", HFILL
1745 &hf_rtp_rfc2198_follow,
1751 TFS(&flags_set_truth),
1753 "Next header follows", HFILL
1757 &hf_rtp_rfc2198_tm_off,
1760 "rtp.timestamp-offset",
1765 "Timestamp Offset", HFILL
1769 &hf_rtp_rfc2198_bl_len,
1777 "Block Length", HFILL
1781 /* reassembly stuff */
1783 {"RTP Fragments", "rtp.fragments", FT_NONE, BASE_NONE, NULL, 0x0,
1784 "RTP Fragments", HFILL }
1788 {"RTP Fragment data", "rtp.fragment", FT_FRAMENUM, BASE_NONE, NULL, 0x0,
1789 "RTP Fragment data", HFILL }
1792 {&hf_rtp_fragment_overlap,
1793 {"Fragment overlap", "rtp.fragment.overlap", FT_BOOLEAN, BASE_NONE,
1794 NULL, 0x0, "Fragment overlaps with other fragments", HFILL }
1797 {&hf_rtp_fragment_overlap_conflict,
1798 {"Conflicting data in fragment overlap", "rtp.fragment.overlap.conflict",
1799 FT_BOOLEAN, BASE_NONE, NULL, 0x0,
1800 "Overlapping fragments contained conflicting data", HFILL }
1803 {&hf_rtp_fragment_multiple_tails,
1804 {"Multiple tail fragments found", "rtp.fragment.multipletails",
1805 FT_BOOLEAN, BASE_NONE, NULL, 0x0,
1806 "Several tails were found when defragmenting the packet", HFILL }
1809 {&hf_rtp_fragment_too_long_fragment,
1810 {"Fragment too long", "rtp.fragment.toolongfragment",
1811 FT_BOOLEAN, BASE_NONE, NULL, 0x0,
1812 "Fragment contained data past end of packet", HFILL }
1815 {&hf_rtp_fragment_error,
1816 {"Defragmentation error", "rtp.fragment.error",
1817 FT_FRAMENUM, BASE_NONE, NULL, 0x0,
1818 "Defragmentation error due to illegal fragments", HFILL }
1821 {&hf_rtp_reassembled_in,
1822 {"RTP fragment, reassembled in frame", "rtp.reassembled_in",
1823 FT_FRAMENUM, BASE_NONE, NULL, 0x0,
1824 "This RTP packet is reassembled in this frame", HFILL }
1826 {&hf_srtp_encrypted_payload,
1827 {"SRTP Encrypted Payload", "srtp.enc_payload",
1828 FT_BYTES, BASE_NONE, NULL, 0x0,
1829 "SRTP Encrypted Payload", HFILL }
1832 {"SRTP MKI", "srtp.mki",
1833 FT_BYTES, BASE_NONE, NULL, 0x0,
1834 "SRTP Master Key Index", HFILL }
1837 {"SRTP Auth Tag", "srtp.auth_tag",
1838 FT_BYTES, BASE_NONE, NULL, 0x0,
1839 "SRTP Authentication Tag", HFILL }
1844 static gint *ett[] =
1851 &ett_rtp_rfc2198_hdr,
1856 module_t *rtp_module;
1859 proto_rtp = proto_register_protocol("Real-Time Transport Protocol",
1861 proto_register_field_array(proto_rtp, hf, array_length(hf));
1862 proto_register_subtree_array(ett, array_length(ett));
1864 register_dissector("rtp", dissect_rtp, proto_rtp);
1865 register_dissector("rtp.rfc2198", dissect_rtp_rfc2198, proto_rtp);
1867 rtp_tap = register_tap("rtp");
1869 rtp_pt_dissector_table = register_dissector_table("rtp.pt",
1870 "RTP payload type", FT_UINT8, BASE_DEC);
1871 rtp_dyn_pt_dissector_table = register_dissector_table("rtp_dyn_payload_type",
1872 "Dynamic RTP payload type", FT_STRING, BASE_NONE);
1875 rtp_hdr_ext_dissector_table = register_dissector_table("rtp_hdr_ext",
1876 "RTP header extension", FT_STRING, BASE_NONE);
1878 rtp_module = prefs_register_protocol(proto_rtp, proto_reg_handoff_rtp);
1880 prefs_register_bool_preference(rtp_module, "show_setup_info",
1881 "Show stream setup information",
1882 "Where available, show which protocol and frame caused "
1883 "this RTP stream to be created",
1884 &global_rtp_show_setup_info);
1886 prefs_register_bool_preference(rtp_module, "heuristic_rtp",
1887 "Try to decode RTP outside of conversations",
1888 "If call control SIP/H323/RTSP/.. messages are missing in the trace, "
1889 "RTP isn't decoded without this",
1892 prefs_register_bool_preference(rtp_module, "desegment_rtp_streams",
1893 "Allow subdissector to reassemble RTP streams",
1894 "Whether subdissector can request RTP streams to be reassembled",
1897 prefs_register_enum_preference(rtp_module, "version0_type",
1898 "Treat RTP version 0 packets as",
1899 "If an RTP version 0 packet is encountered, it can be treated as an invalid packet, a STUN packet, or a T.38 packet",
1900 &global_rtp_version0_type,
1901 rtp_version0_types, FALSE);
1902 prefs_register_uint_preference(rtp_module,
1903 "rfc2198_payload_type", "Payload Type for RFC2198",
1904 "Payload Type for RFC2198 Redundant Audio Data",
1908 register_init_routine(rtp_fragment_init);
1912 proto_reg_handoff_rtp(void)
1914 static gboolean rtp_prefs_initialized = FALSE;
1916 data_handle = find_dissector("data");
1917 stun_handle = find_dissector("stun");
1918 t38_handle = find_dissector("t38");
1920 * Register this dissector as one that can be selected by a
1923 rtp_handle = find_dissector("rtp");
1924 rtp_rfc2198_handle = find_dissector("rtp.rfc2198");
1926 dissector_add_handle("udp.port", rtp_handle);
1928 dissector_add_string("rtp_dyn_payload_type", "red", rtp_rfc2198_handle);
1930 if (rtp_prefs_initialized) {
1931 dissector_delete("rtp.pt", rtp_saved_rfc2198_pt, rtp_rfc2198_handle);
1933 rtp_prefs_initialized = TRUE;
1935 rtp_saved_rfc2198_pt = rtp_rfc2198_pt;
1936 dissector_add("rtp.pt", rtp_saved_rfc2198_pt, rtp_rfc2198_handle);
1938 heur_dissector_add( "udp", dissect_rtp_heur, proto_rtp);
1944 * indent-tabs-mode: t