2 * Routines for IPv6 packet disassembly
4 * $Id: packet-ipv6.c,v 1.93 2003/02/04 20:16:57 guy Exp $
6 * Ethereal - Network traffic analyzer
7 * By Gerald Combs <gerald@ethereal.com>
8 * Copyright 1998 Gerald Combs
10 * MobileIPv6 support added by Tomislav Borosa <tomislav.borosa@siemens.hr>
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version 2
15 * of the License, or (at your option) any later version.
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software
24 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
34 #include <epan/packet.h>
35 #include "packet-ip.h"
36 #include "packet-ipsec.h"
37 #include "packet-ipv6.h"
38 #include <epan/resolv.h>
40 #include "reassemble.h"
46 #include "arcnet_pids.h"
49 * NOTE: ipv6.nxt is not very useful as we will have chained header.
50 * now testing ipv6.final, but it raises SEGV.
54 static int proto_ipv6 = -1;
55 static int hf_ipv6_version = -1;
56 static int hf_ipv6_class = -1;
57 static int hf_ipv6_flow = -1;
58 static int hf_ipv6_plen = -1;
59 static int hf_ipv6_nxt = -1;
60 static int hf_ipv6_hlim = -1;
61 static int hf_ipv6_src = -1;
62 static int hf_ipv6_dst = -1;
63 static int hf_ipv6_addr = -1;
65 static int hf_ipv6_final = -1;
67 static int hf_ipv6_fragments = -1;
68 static int hf_ipv6_fragment = -1;
69 static int hf_ipv6_fragment_overlap = -1;
70 static int hf_ipv6_fragment_overlap_conflict = -1;
71 static int hf_ipv6_fragment_multiple_tails = -1;
72 static int hf_ipv6_fragment_too_long_fragment = -1;
73 static int hf_ipv6_fragment_error = -1;
75 static int hf_ipv6_mipv6_type = -1;
76 static int hf_ipv6_mipv6_length = -1;
77 static int hf_ipv6_mipv6_home_address = -1;
79 static gint ett_ipv6 = -1;
80 static gint ett_ipv6_fragments = -1;
81 static gint ett_ipv6_fragment = -1;
83 static const fragment_items ipv6_frag_items = {
88 &hf_ipv6_fragment_overlap,
89 &hf_ipv6_fragment_overlap_conflict,
90 &hf_ipv6_fragment_multiple_tails,
91 &hf_ipv6_fragment_too_long_fragment,
92 &hf_ipv6_fragment_error,
96 static dissector_handle_t data_handle;
98 /* Reassemble fragmented datagrams */
99 static gboolean ipv6_reassemble = FALSE;
102 #define offsetof(type, member) ((size_t)(&((type *)0)->member))
106 * defragmentation of IPv6
108 static GHashTable *ipv6_fragment_table = NULL;
111 capture_ipv6(const guchar *pd, int offset, int len, packet_counts *ld)
116 if (!BYTES_ARE_IN_FRAME(offset, len, 4+4+16+16)) {
120 nxt = pd[offset+6]; /* get the "next header" value */
121 offset += 4+4+16+16; /* skip past the IPv6 header */
126 case IP_PROTO_HOPOPTS:
127 case IP_PROTO_ROUTING:
128 case IP_PROTO_DSTOPTS:
129 if (!BYTES_ARE_IN_FRAME(offset, len, 2)) {
134 advance = (pd[offset+1] + 1) << 3;
135 if (!BYTES_ARE_IN_FRAME(offset, len, advance)) {
142 case IP_PROTO_FRAGMENT:
143 if (!BYTES_ARE_IN_FRAME(offset, len, 2)) {
149 if (!BYTES_ARE_IN_FRAME(offset, len, advance)) {
157 if (!BYTES_ARE_IN_FRAME(offset, len, 2)) {
162 advance = 8 + ((pd[offset+1] - 1) << 2);
163 if (!BYTES_ARE_IN_FRAME(offset, len, advance)) {
183 case IP_PROTO_ICMPV6: /* XXX - separate counters? */
201 ipv6_reassemble_init(void)
203 fragment_table_init(&ipv6_fragment_table);
207 dissect_routing6(tvbuff_t *tvb, int offset, proto_tree *tree) {
210 proto_tree *rthdr_tree;
212 char buf[sizeof(struct ip6_rthdr0) + sizeof(struct e_in6_addr) * 23];
214 tvb_memcpy(tvb, (guint8 *)&rt, offset, sizeof(rt));
215 len = (rt.ip6r_len + 1) << 3;
218 /* !!! specify length */
219 ti = proto_tree_add_text(tree, tvb, offset, len,
220 "Routing Header, Type %u", rt.ip6r_type);
221 rthdr_tree = proto_item_add_subtree(ti, ett_ipv6);
223 proto_tree_add_text(rthdr_tree, tvb,
224 offset + offsetof(struct ip6_rthdr, ip6r_nxt), 1,
225 "Next header: %s (0x%02x)", ipprotostr(rt.ip6r_nxt), rt.ip6r_nxt);
226 proto_tree_add_text(rthdr_tree, tvb,
227 offset + offsetof(struct ip6_rthdr, ip6r_len), 1,
228 "Length: %u (%d bytes)", rt.ip6r_len, len);
229 proto_tree_add_text(rthdr_tree, tvb,
230 offset + offsetof(struct ip6_rthdr, ip6r_type), 1,
231 "Type: %u", rt.ip6r_type);
232 proto_tree_add_text(rthdr_tree, tvb,
233 offset + offsetof(struct ip6_rthdr, ip6r_segleft), 1,
234 "Segments left: %u", rt.ip6r_segleft);
236 if (rt.ip6r_type == 0 && len <= sizeof(buf)) {
237 struct e_in6_addr *a;
239 struct ip6_rthdr0 *rt0;
241 tvb_memcpy(tvb, buf, offset, len);
242 rt0 = (struct ip6_rthdr0 *)buf;
243 for (a = rt0->ip6r0_addr, n = 0;
244 a < (struct e_in6_addr *)(buf + len);
246 proto_tree_add_text(rthdr_tree, tvb,
247 offset + offsetof(struct ip6_rthdr0, ip6r0_addr) + n * sizeof(struct e_in6_addr),
248 sizeof(struct e_in6_addr),
250 "address %d: %s (%s)",
251 n, get_hostname6(a), ip6_to_str(a)
253 "address %d: %s", n, ip6_to_str(a)
258 if (rt.ip6r_type == 2) {
259 proto_tree_add_ipv6(rthdr_tree, hf_ipv6_mipv6_home_address,
261 tvb_get_ptr(tvb, offset + 8, 16));
269 dissect_frag6(tvbuff_t *tvb, int offset, packet_info *pinfo, proto_tree *tree,
270 guint16 *offlg, guint32 *ident) {
271 struct ip6_frag frag;
274 proto_tree *rthdr_tree;
276 tvb_memcpy(tvb, (guint8 *)&frag, offset, sizeof(frag));
278 frag.ip6f_offlg = g_ntohs(frag.ip6f_offlg);
279 *offlg = frag.ip6f_offlg;
280 *ident = frag.ip6f_ident;
281 if (check_col(pinfo->cinfo, COL_INFO)) {
282 col_add_fstr(pinfo->cinfo, COL_INFO,
283 "IPv6 fragment (nxt=%s (0x%02x) off=%u id=0x%x)",
284 ipprotostr(frag.ip6f_nxt), frag.ip6f_nxt,
285 frag.ip6f_offlg & IP6F_OFF_MASK, frag.ip6f_ident);
288 ti = proto_tree_add_text(tree, tvb, offset, len,
289 "Fragmentation Header");
290 rthdr_tree = proto_item_add_subtree(ti, ett_ipv6);
292 proto_tree_add_text(rthdr_tree, tvb,
293 offset + offsetof(struct ip6_frag, ip6f_nxt), 1,
294 "Next header: %s (0x%02x)",
295 ipprotostr(frag.ip6f_nxt), frag.ip6f_nxt);
298 proto_tree_add_text(rthdr_tree, tvb,
299 offset + offsetof(struct ip6_frag, ip6f_reserved), 1,
304 proto_tree_add_text(rthdr_tree, tvb,
305 offset + offsetof(struct ip6_frag, ip6f_offlg), 2,
307 frag.ip6f_offlg & IP6F_OFF_MASK);
309 proto_tree_add_text(rthdr_tree, tvb,
310 offset + offsetof(struct ip6_frag, ip6f_offlg), 2,
311 "More fragments: %s",
312 frag.ip6f_offlg & IP6F_MORE_FRAG ?
315 proto_tree_add_text(rthdr_tree, tvb,
316 offset + offsetof(struct ip6_frag, ip6f_ident), 4,
317 "Identification: 0x%08x",
324 dissect_mipv6_hoa(tvbuff_t *tvb, proto_tree *dstopt_tree, int offset)
328 proto_tree_add_uint_format(dstopt_tree, hf_ipv6_mipv6_type, tvb,
330 tvb_get_guint8(tvb, offset + len),
331 "Option Type: %u (0x%02x) - Home Address Option",
332 tvb_get_guint8(tvb, offset + len),
333 tvb_get_guint8(tvb, offset + len));
336 proto_tree_add_uint(dstopt_tree, hf_ipv6_mipv6_length, tvb, offset + len,
337 1, tvb_get_guint8(tvb, offset + len));
340 proto_tree_add_ipv6(dstopt_tree, hf_ipv6_mipv6_home_address, tvb,
341 offset + len, 16, tvb_get_ptr(tvb, offset + len, 16));
346 static const value_string rtalertvals[] = {
347 { IP6OPT_RTALERT_MLD, "MLD" },
348 { IP6OPT_RTALERT_RSVP, "RSVP" },
353 dissect_opts(tvbuff_t *tvb, int offset, proto_tree *tree, char *optname)
357 proto_tree *dstopt_tree;
361 int mip_offset = 0, delta = 0;
363 tvb_memcpy(tvb, (guint8 *)&ext, offset, sizeof(ext));
364 len = (ext.ip6e_len + 1) << 3;
367 /* !!! specify length */
368 ti = proto_tree_add_text(tree, tvb, offset, len, "%s Header ", optname);
370 dstopt_tree = proto_item_add_subtree(ti, ett_ipv6);
372 proto_tree_add_text(dstopt_tree, tvb,
373 offset + offsetof(struct ip6_ext, ip6e_nxt), 1,
374 "Next header: %s (0x%02x)", ipprotostr(ext.ip6e_nxt), ext.ip6e_nxt);
375 proto_tree_add_text(dstopt_tree, tvb,
376 offset + offsetof(struct ip6_ext, ip6e_len), 1,
377 "Length: %u (%d bytes)", ext.ip6e_len, len);
384 while (p < offset + len) {
385 switch (tvb_get_guint8(tvb, p)) {
387 proto_tree_add_text(dstopt_tree, tvb, p, 1, "Pad1");
392 tmp = tvb_get_guint8(tvb, p + 1);
393 proto_tree_add_text(dstopt_tree, tvb, p, tmp + 2,
394 "PadN: %u bytes", tmp + 2);
397 mip_offset += tvb_get_guint8(tvb, mip_offset + 1) + 2;
400 tmp = tvb_get_guint8(tvb, p + 1);
402 proto_tree_add_text(dstopt_tree, tvb, p, tmp + 2,
403 "Jumbo payload: %u (%u bytes)",
404 tvb_get_ntohl(tvb, p + 2), tmp + 2);
406 proto_tree_add_text(dstopt_tree, tvb, p, tmp + 2,
407 "Jumbo payload: Invalid length (%u bytes)",
412 mip_offset += tvb_get_guint8(tvb, mip_offset+1)+2;
418 tmp = tvb_get_guint8(tvb, p + 1);
420 rta = val_to_str(tvb_get_ntohs(tvb, p + 2), rtalertvals,
423 rta = "Invalid length";
424 ti = proto_tree_add_text(dstopt_tree, tvb, p , tmp + 2,
425 "Router alert: %s (%u bytes)", rta, tmp + 2);
428 mip_offset += tvb_get_guint8(tvb, mip_offset + 1) + 2;
431 case IP6OPT_HOME_ADDRESS:
432 delta = dissect_mipv6_hoa(tvb, dstopt_tree, mip_offset);
448 dissect_hopopts(tvbuff_t *tvb, int offset, proto_tree *tree)
450 return dissect_opts(tvb, offset, tree, "Hop-by-hop Option");
454 dissect_dstopts(tvbuff_t *tvb, int offset, proto_tree *tree)
456 return dissect_opts(tvb, offset, tree, "Destination Option");
460 dissect_ipv6(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
462 proto_tree *ipv6_tree = NULL;
468 gboolean hopopts, routing, frag, ah, dstopts;
472 fragment_data *ipfd_head;
474 gboolean update_col_info = TRUE;
475 gboolean save_fragmented;
479 if (check_col(pinfo->cinfo, COL_PROTOCOL))
480 col_set_str(pinfo->cinfo, COL_PROTOCOL, "IPv6");
481 if (check_col(pinfo->cinfo, COL_INFO))
482 col_clear(pinfo->cinfo, COL_INFO);
485 tvb_memcpy(tvb, (guint8 *)&ipv6, offset, sizeof(ipv6));
487 pinfo->ipproto = ipv6.ip6_nxt; /* XXX make work TCP follow (ipproto = 6) */
489 /* Get the payload length */
490 plen = g_ntohs(ipv6.ip6_plen);
492 /* Adjust the length of this tvbuff to include only the IPv6 datagram. */
493 set_actual_length(tvb, plen + sizeof (struct ip6_hdr));
495 SET_ADDRESS(&pinfo->net_src, AT_IPv6, 16, tvb_get_ptr(tvb, offset + IP6H_SRC, 16));
496 SET_ADDRESS(&pinfo->src, AT_IPv6, 16, tvb_get_ptr(tvb, offset + IP6H_SRC, 16));
497 SET_ADDRESS(&pinfo->net_dst, AT_IPv6, 16, tvb_get_ptr(tvb, offset + IP6H_DST, 16));
498 SET_ADDRESS(&pinfo->dst, AT_IPv6, 16, tvb_get_ptr(tvb, offset + IP6H_DST, 16));
501 /* !!! specify length */
502 ti = proto_tree_add_item(tree, proto_ipv6, tvb, offset, 40, FALSE);
503 ipv6_tree = proto_item_add_subtree(ti, ett_ipv6);
505 /* !!! warning: version also contains 4 Bit priority */
506 proto_tree_add_uint(ipv6_tree, hf_ipv6_version, tvb,
507 offset + offsetof(struct ip6_hdr, ip6_vfc), 1,
508 (ipv6.ip6_vfc >> 4) & 0x0f);
510 proto_tree_add_uint(ipv6_tree, hf_ipv6_class, tvb,
511 offset + offsetof(struct ip6_hdr, ip6_flow), 4,
512 (guint8)((g_ntohl(ipv6.ip6_flow) >> 20) & 0xff));
515 * there should be no alignment problems for ip6_flow, since it's the first
516 * guint32 in the ipv6 struct
518 proto_tree_add_uint_format(ipv6_tree, hf_ipv6_flow, tvb,
519 offset + offsetof(struct ip6_hdr, ip6_flow), 4,
520 (unsigned long)(g_ntohl(ipv6.ip6_flow) & IPV6_FLOWLABEL_MASK),
521 "Flowlabel: 0x%05lx",
522 (unsigned long)(g_ntohl(ipv6.ip6_flow) & IPV6_FLOWLABEL_MASK));
524 proto_tree_add_uint(ipv6_tree, hf_ipv6_plen, tvb,
525 offset + offsetof(struct ip6_hdr, ip6_plen), 2,
528 proto_tree_add_uint_format(ipv6_tree, hf_ipv6_nxt, tvb,
529 offset + offsetof(struct ip6_hdr, ip6_nxt), 1,
531 "Next header: %s (0x%02x)",
532 ipprotostr(ipv6.ip6_nxt), ipv6.ip6_nxt);
534 proto_tree_add_uint(ipv6_tree, hf_ipv6_hlim, tvb,
535 offset + offsetof(struct ip6_hdr, ip6_hlim), 1,
538 proto_tree_add_ipv6_hidden(ipv6_tree, hf_ipv6_addr, tvb,
539 offset + offsetof(struct ip6_hdr, ip6_src), 16,
540 ipv6.ip6_src.s6_addr8);
541 proto_tree_add_ipv6_hidden(ipv6_tree, hf_ipv6_addr, tvb,
542 offset + offsetof(struct ip6_hdr, ip6_dst), 16,
543 ipv6.ip6_dst.s6_addr8);
545 proto_tree_add_ipv6_format(ipv6_tree, hf_ipv6_src, tvb,
546 offset + offsetof(struct ip6_hdr, ip6_src), 16,
547 (guint8 *)&ipv6.ip6_src,
549 "Source address: %s (%s)",
550 get_hostname6(&ipv6.ip6_src),
552 "Source address: %s",
554 ip6_to_str(&ipv6.ip6_src));
556 proto_tree_add_ipv6_format(ipv6_tree, hf_ipv6_dst, tvb,
557 offset + offsetof(struct ip6_hdr, ip6_dst), 16,
558 (guint8 *)&ipv6.ip6_dst,
560 "Destination address: %s (%s)",
561 get_hostname6(&ipv6.ip6_dst),
563 "Destination address: %s",
565 ip6_to_str(&ipv6.ip6_dst));
568 /* start of the new header (could be a extension header) */
569 poffset = offset + offsetof(struct ip6_hdr, ip6_nxt);
570 nxt = tvb_get_guint8(tvb, poffset);
571 offset += sizeof(struct ip6_hdr);
575 /* start out assuming this isn't fragmented, and has none of the other
585 case IP_PROTO_HOPOPTS:
587 advance = dissect_hopopts(tvb, offset, tree);
588 nxt = tvb_get_guint8(tvb, offset);
593 case IP_PROTO_ROUTING:
595 advance = dissect_routing6(tvb, offset, tree);
596 nxt = tvb_get_guint8(tvb, offset);
601 case IP_PROTO_FRAGMENT:
603 advance = dissect_frag6(tvb, offset, pinfo, tree,
605 nxt = tvb_get_guint8(tvb, offset);
612 advance = dissect_ah_header(
613 tvb_new_subset(tvb, offset, -1, -1),
614 pinfo, tree, NULL, NULL);
615 nxt = tvb_get_guint8(tvb, offset);
620 case IP_PROTO_DSTOPTS:
622 advance = dissect_dstopts(tvb, offset, tree);
623 nxt = tvb_get_guint8(tvb, offset);
631 proto_tree_add_uint_hidden(ipv6_tree, hf_ipv6_final, tvb, poffset, 1, nxt);
634 /* If ipv6_reassemble is on, this is a fragment, and we have all the data
635 * in the fragment, then just add the fragment to the hashtable.
637 save_fragmented = pinfo->fragmented;
638 if (ipv6_reassemble && frag && tvb_reported_length(tvb) <= tvb_length(tvb)) {
639 ipfd_head = fragment_add(tvb, offset, pinfo, ident,
641 offlg & IP6F_OFF_MASK,
643 offlg & IP6F_MORE_FRAG);
645 if (ipfd_head != NULL) {
646 /* OK, we have the complete reassembled payload.
647 Allocate a new tvbuff, referring to the reassembled payload. */
648 next_tvb = tvb_new_real_data(ipfd_head->data, ipfd_head->datalen,
651 /* Add the tvbuff to the list of tvbuffs to which the tvbuff we
652 were handed refers, so it'll get cleaned up when that tvbuff
654 tvb_set_child_real_data_tvbuff(tvb, next_tvb);
656 /* Add the defragmented data to the data source list. */
657 add_new_data_source(pinfo, next_tvb, "Reassembled IPv6");
659 /* show all fragments */
660 update_col_info = !show_fragment_tree(ipfd_head, &ipv6_frag_items,
661 ipv6_tree, pinfo, next_tvb);
663 /* We don't have the complete reassembled payload. */
667 /* If this is the first fragment, dissect its contents, otherwise
668 just show it as a fragment.
670 XXX - if we eventually don't save the reassembled contents of all
671 fragmented datagrams, we may want to always reassemble. */
672 if (offlg & IP6F_OFF_MASK) {
673 /* Not the first fragment - don't dissect it. */
676 /* First fragment, or not fragmented. Dissect what we have here. */
678 /* Get a tvbuff for the payload. */
679 next_tvb = tvb_new_subset(tvb, offset, -1, -1);
682 * If this is the first fragment, but not the only fragment,
683 * tell the next protocol that.
685 if (offlg & IP6F_MORE_FRAG)
686 pinfo->fragmented = TRUE;
688 pinfo->fragmented = FALSE;
692 if (next_tvb == NULL) {
693 /* Just show this as a fragment. */
694 /* COL_INFO was filled in by "dissect_frag6()" */
695 call_dissector(data_handle, tvb_new_subset(tvb, offset, -1, -1), pinfo, tree);
697 /* As we haven't reassembled anything, we haven't changed "pi", so
698 we don't have to restore it. */
699 pinfo->fragmented = save_fragmented;
703 /* do lookup with the subdissector table */
704 if (!dissector_try_port(ip_dissector_table, nxt, next_tvb, pinfo, tree)) {
706 Handle "no next header" specially. */
707 if (nxt == IP_PROTO_NONE) {
708 if (check_col(pinfo->cinfo, COL_INFO)) {
709 /* If we had an Authentication Header, the AH dissector already
710 put something in the Info column; leave it there. */
712 if (hopopts || routing || dstopts) {
715 col_append_fstr(pinfo->cinfo, COL_INFO, "%shop-by-hop options",
720 col_append_fstr(pinfo->cinfo, COL_INFO, "%srouting", sep);
724 col_append_fstr(pinfo->cinfo, COL_INFO, "%sdestination options",
728 col_set_str(pinfo->cinfo, COL_INFO, "IPv6 no next header");
732 if (check_col(pinfo->cinfo, COL_INFO))
733 col_add_fstr(pinfo->cinfo, COL_INFO, "%s (0x%02x)", ipprotostr(nxt),nxt);
735 call_dissector(data_handle, next_tvb, pinfo, tree);
737 pinfo->fragmented = save_fragmented;
741 proto_register_ipv6(void)
743 static hf_register_info hf[] = {
745 { "Version", "ipv6.version",
746 FT_UINT8, BASE_DEC, NULL, 0x0, "", HFILL }},
748 { "Traffic class", "ipv6.class",
749 FT_UINT8, BASE_HEX, NULL, 0x0, "", HFILL }},
751 { "Flowlabel", "ipv6.flow",
752 FT_UINT32, BASE_HEX, NULL, 0x0, "", HFILL }},
754 { "Payload length", "ipv6.plen",
755 FT_UINT16, BASE_DEC, NULL, 0x0, "", HFILL }},
757 { "Next header", "ipv6.nxt",
758 FT_UINT8, BASE_HEX, NULL, 0x0, "", HFILL }},
760 { "Hop limit", "ipv6.hlim",
761 FT_UINT8, BASE_DEC, NULL, 0x0, "", HFILL }},
763 { "Source", "ipv6.src",
764 FT_IPv6, BASE_NONE, NULL, 0x0,
765 "Source IPv6 Address", HFILL }},
767 { "Destination", "ipv6.dst",
768 FT_IPv6, BASE_NONE, NULL, 0x0,
769 "Destination IPv6 Address", HFILL }},
771 { "Address", "ipv6.addr",
772 FT_IPv6, BASE_NONE, NULL, 0x0,
773 "Source or Destination IPv6 Address", HFILL }},
775 { &hf_ipv6_fragment_overlap,
776 { "Fragment overlap", "ipv6.fragment.overlap",
777 FT_BOOLEAN, BASE_NONE, NULL, 0x0,
778 "Fragment overlaps with other fragments", HFILL }},
780 { &hf_ipv6_fragment_overlap_conflict,
781 { "Conflicting data in fragment overlap", "ipv6.fragment.overlap.conflict",
782 FT_BOOLEAN, BASE_NONE, NULL, 0x0,
783 "Overlapping fragments contained conflicting data", HFILL }},
785 { &hf_ipv6_fragment_multiple_tails,
786 { "Multiple tail fragments found", "ipv6.fragment.multipletails",
787 FT_BOOLEAN, BASE_NONE, NULL, 0x0,
788 "Several tails were found when defragmenting the packet", HFILL }},
790 { &hf_ipv6_fragment_too_long_fragment,
791 { "Fragment too long", "ipv6.fragment.toolongfragment",
792 FT_BOOLEAN, BASE_NONE, NULL, 0x0,
793 "Fragment contained data past end of packet", HFILL }},
795 { &hf_ipv6_fragment_error,
796 { "Defragmentation error", "ipv6.fragment.error",
797 FT_FRAMENUM, BASE_NONE, NULL, 0x0,
798 "Defragmentation error due to illegal fragments", HFILL }},
801 { "IPv6 Fragment", "ipv6.fragment",
802 FT_FRAMENUM, BASE_NONE, NULL, 0x0,
803 "IPv6 Fragment", HFILL }},
805 { &hf_ipv6_fragments,
806 { "IPv6 Fragments", "ipv6.fragments",
807 FT_NONE, BASE_NONE, NULL, 0x0,
808 "IPv6 Fragments", HFILL }},
811 { &hf_ipv6_mipv6_type,
812 { "Option Type ", "ipv6.mipv6_type",
813 FT_UINT8, BASE_DEC, NULL, 0x0,
815 { &hf_ipv6_mipv6_length,
816 { "Option Length ", "ipv6.mipv6_length",
817 FT_UINT8, BASE_DEC, NULL, 0x0,
819 { &hf_ipv6_mipv6_home_address,
820 { "Home Address ", "ipv6.mipv6_home_address",
821 FT_IPv6, BASE_HEX, NULL, 0x0,
826 { "Final next header", "ipv6.final",
827 FT_UINT8, BASE_HEX, NULL, 0x0, "", HFILL }},
830 static gint *ett[] = {
835 module_t *ipv6_module;
837 proto_ipv6 = proto_register_protocol("Internet Protocol Version 6", "IPv6", "ipv6");
838 proto_register_field_array(proto_ipv6, hf, array_length(hf));
839 proto_register_subtree_array(ett, array_length(ett));
841 /* Register configuration options */
842 ipv6_module = prefs_register_protocol(proto_ipv6, NULL);
843 prefs_register_bool_preference(ipv6_module, "defragment",
844 "Reassemble fragmented IPv6 datagrams",
845 "Whether fragmented IPv6 datagrams should be reassembled",
848 register_dissector("ipv6", dissect_ipv6, proto_ipv6);
849 register_init_routine(ipv6_reassemble_init);
853 proto_reg_handoff_ipv6(void)
855 dissector_handle_t ipv6_handle;
857 data_handle = find_dissector("data");
858 ipv6_handle = find_dissector("ipv6");
859 dissector_add("ethertype", ETHERTYPE_IPv6, ipv6_handle);
860 dissector_add("ppp.protocol", PPP_IPV6, ipv6_handle);
861 dissector_add("ppp.protocol", ETHERTYPE_IPv6, ipv6_handle);
862 dissector_add("gre.proto", ETHERTYPE_IPv6, ipv6_handle);
863 dissector_add("ip.proto", IP_PROTO_IPV6, ipv6_handle);
864 dissector_add("null.type", BSD_AF_INET6_BSD, ipv6_handle);
865 dissector_add("null.type", BSD_AF_INET6_FREEBSD, ipv6_handle);
866 dissector_add("null.type", BSD_AF_INET6_DARWIN, ipv6_handle);
867 dissector_add("chdlctype", ETHERTYPE_IPv6, ipv6_handle);
868 dissector_add("fr.ietf", NLPID_IP6, ipv6_handle);
869 dissector_add("x.25.spi", NLPID_IP6, ipv6_handle);
870 dissector_add("arcnet.protocol_id", ARCNET_PROTO_IPv6, ipv6_handle);