2 * Routines for RTSP packet disassembly (RFC 2326)
4 * Jason Lango <jal@netapp.com>
5 * Liberally copied from packet-http.c, by Guy Harris <guy@alum.mit.edu>
7 * $Id: packet-rtsp.c,v 1.67 2004/07/09 23:37:40 guy Exp $
9 * Ethereal - Network traffic analyzer
10 * By Gerald Combs <gerald@ethereal.com>
11 * Copyright 1998 Gerald Combs
13 * This program is free software; you can redistribute it and/or
14 * modify it under the terms of the GNU General Public License
15 * as published by the Free Software Foundation; either version 2
16 * of the License, or (at your option) any later version.
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
23 * You should have received a copy of the GNU General Public License
24 * along with this program; if not, write to the Free Software
25 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
28 * RTSP is defined in RFC 2326, http://www.ietf.org/rfc/rfc2326.txt?number=2326
29 * http://www.iana.org/assignments/rsvp-parameters
41 #include <epan/packet.h>
42 #include "req_resp_hdrs.h"
43 #include "packet-rtp.h"
44 #include "packet-rtcp.h"
45 #include <epan/conversation.h>
46 #include <epan/strutil.h>
47 #include "packet-e164.h"
49 static int proto_rtsp = -1;
51 static gint ett_rtsp = -1;
52 static gint ett_rtspframe = -1;
53 static gint ett_rtsp_method = -1;
55 static int hf_rtsp_method = -1;
56 static int hf_rtsp_url = -1;
57 static int hf_rtsp_status = -1;
58 static int hf_rtsp_session = -1;
59 static int hf_rtsp_X_Vig_Msisdn = -1;
61 static dissector_handle_t sdp_handle;
62 static dissector_handle_t rtp_handle;
63 static dissector_handle_t rtcp_handle;
65 void proto_reg_handoff_rtsp(void);
67 static GMemChunk *rtsp_vals = NULL;
68 #define rtsp_hash_init_count 20
71 * desegmentation of RTSP headers
72 * (when we are over TCP or another protocol providing the desegmentation API)
74 static gboolean rtsp_desegment_headers = FALSE;
77 * desegmentation of RTSP bodies
78 * (when we are over TCP or another protocol providing the desegmentation API)
79 * TODO let the user filter on content-type the bodies he wants desegmented
81 static gboolean rtsp_desegment_body = FALSE;
83 /* http://www.iana.org/assignments/port-numberslists two rtsp ports */
84 #define TCP_PORT_RTSP 554
85 #define TCP_ALTERNATE_PORT_RTSP 8554
86 static guint global_rtsp_tcp_port = TCP_PORT_RTSP;
87 static guint global_rtsp_tcp_alternate_port = TCP_ALTERNATE_PORT_RTSP;
89 * Variables to allow for proper deletion of dissector registration when
90 * the user changes port from the gui.
92 static guint tcp_port = 0;
93 static guint tcp_alternate_port = 0;
96 * Takes an array of bytes, assumed to contain a null-terminated
97 * string, as an argument, and returns the length of the string -
98 * i.e., the size of the array, minus 1 for the null terminator.
100 #define STRLEN_CONST(str) (sizeof (str) - 1)
102 #define RTSP_FRAMEHDR ('$')
105 dissector_handle_t dissector;
106 } rtsp_interleaved_t;
108 #define RTSP_MAX_INTERLEAVED (8)
111 * Careful about dynamically allocating memory in this structure (say
112 * for dynamically increasing the size of the 'interleaved' array) -
113 * the containing structure is garbage collected and contained
114 * pointers will not be freed.
117 rtsp_interleaved_t interleaved[RTSP_MAX_INTERLEAVED];
118 } rtsp_conversation_data_t;
121 dissect_rtspinterleaved(tvbuff_t *tvb, int offset, packet_info *pinfo,
124 guint length_remaining;
126 proto_tree *rtspframe_tree = NULL;
128 guint8 rf_start; /* always RTSP_FRAMEHDR */
129 guint8 rf_chan; /* interleaved channel id */
130 guint16 rf_len; /* packet length */
132 conversation_t *conv;
133 rtsp_conversation_data_t *data;
134 dissector_handle_t dissector;
137 * This will throw an exception if we don't have any data left.
138 * That's what we want. (See "tcp_dissect_pdus()", which is
141 length_remaining = tvb_ensure_length_remaining(tvb, offset);
144 * Can we do reassembly?
146 if (rtsp_desegment_headers && pinfo->can_desegment) {
148 * Yes - would an RTSP multiplexed header starting at
149 * this offset be split across segment boundaries?
151 if (length_remaining < 4) {
153 * Yes. Tell the TCP dissector where the data
154 * for this message starts in the data it handed
155 * us, and how many more bytes we need, and return.
157 pinfo->desegment_offset = offset;
158 pinfo->desegment_len = 4 - length_remaining;
164 * Get the "$", channel, and length from the header.
166 orig_offset = offset;
167 rf_start = tvb_get_guint8(tvb, offset);
168 rf_chan = tvb_get_guint8(tvb, offset+1);
169 rf_len = tvb_get_ntohs(tvb, offset+2);
172 * Can we do reassembly?
174 if (rtsp_desegment_body && pinfo->can_desegment) {
176 * Yes - is the header + encapsulated packet split
177 * across segment boundaries?
179 if (length_remaining < 4U + rf_len) {
181 * Yes. Tell the TCP dissector where the data
182 * for this message starts in the data it handed
183 * us, and how many more bytes we need, and return.
185 pinfo->desegment_offset = offset;
186 pinfo->desegment_len = 4U + rf_len - length_remaining;
191 if (check_col(pinfo->cinfo, COL_INFO))
192 col_add_fstr(pinfo->cinfo, COL_INFO,
193 "Interleaved channel 0x%02x, %u bytes",
197 ti = proto_tree_add_protocol_format(tree, proto_rtsp, tvb,
199 "RTSP Interleaved Frame, Channel: 0x%02x, %u bytes",
201 rtspframe_tree = proto_item_add_subtree(ti, ett_rtspframe);
203 proto_tree_add_text(rtspframe_tree, tvb, offset, 1,
210 proto_tree_add_text(rtspframe_tree, tvb, offset, 1,
217 proto_tree_add_text(rtspframe_tree, tvb, offset, 2,
224 * We set the actual length of the tvbuff for the interleaved
225 * stuff to the minimum of what's left in the tvbuff and the
226 * length in the header.
228 * XXX - what if there's nothing left in the tvbuff?
229 * We'd want a BoundsError exception to be thrown, so
230 * that a Short Frame would be reported.
232 if (length_remaining > rf_len)
233 length_remaining = rf_len;
234 next_tvb = tvb_new_subset(tvb, offset, length_remaining, rf_len);
236 conv = find_conversation(&pinfo->src, &pinfo->dst, pinfo->ptype,
237 pinfo->srcport, pinfo->destport, 0);
240 (data = conversation_get_proto_data(conv, proto_rtsp)) &&
241 rf_chan < RTSP_MAX_INTERLEAVED &&
242 (dissector = data->interleaved[rf_chan].dissector)) {
243 call_dissector(dissector, next_tvb, pinfo, tree);
245 proto_tree_add_text(rtspframe_tree, tvb, offset, rf_len,
246 "Data (%u bytes)", rf_len);
251 return offset - orig_offset;
254 static void process_rtsp_request(tvbuff_t *tvb, int offset, const guchar *data,
255 size_t linelen, proto_tree *tree);
257 static void process_rtsp_reply(tvbuff_t *tvb, int offset, const guchar *data,
258 size_t linelen, proto_tree *tree);
266 static const char *rtsp_methods[] = {
280 #define RTSP_NMETHODS (sizeof rtsp_methods / sizeof rtsp_methods[0])
283 is_rtsp_request_or_reply(const guchar *line, size_t linelen, rtsp_type_t *type)
287 /* Is this an RTSP reply? */
288 if (linelen >= 5 && strncasecmp("RTSP/", line, 5) == 0) {
297 * Is this an RTSP request?
298 * Check whether the line begins with one of the RTSP request
301 for (ii = 0; ii < RTSP_NMETHODS; ii++) {
302 size_t len = strlen(rtsp_methods[ii]);
303 if (linelen >= len &&
304 strncasecmp(rtsp_methods[ii], line, len) == 0 &&
305 (len == linelen || isspace(line[len]))) {
306 *type = RTSP_REQUEST;
314 static const char rtsp_content_type[] = "Content-Type:";
317 is_content_sdp(const guchar *line, size_t linelen)
319 static const char type[] = "application/sdp";
320 size_t typelen = STRLEN_CONST(type);
322 line += STRLEN_CONST(rtsp_content_type);
323 linelen -= STRLEN_CONST(rtsp_content_type);
324 while (linelen > 0 && (*line == ' ' || *line == '\t')) {
329 if (linelen < typelen || strncasecmp(type, line, typelen))
334 if (linelen > 0 && !isspace(*line))
340 static const char rtsp_transport[] = "Transport:";
341 static const char rtsp_sps[] = "server_port=";
342 static const char rtsp_cps[] = "client_port=";
343 static const char rtsp_rtp[] = "rtp/";
344 static const char rtsp_inter[] = "interleaved=";
347 rtsp_create_conversation(packet_info *pinfo, const guchar *line_begin,
350 conversation_t *conv;
353 guint c_data_port, c_mon_port;
354 guint s_data_port, s_mon_port;
357 if (line_len > sizeof(buf) - 1) {
359 * Don't overflow the buffer.
361 line_len = sizeof(buf) - 1;
363 memcpy(buf, line_begin, line_len);
364 buf[line_len] = '\0';
366 tmp = buf + STRLEN_CONST(rtsp_transport);
367 while (*tmp && isspace(*tmp))
369 if (strncasecmp(tmp, rtsp_rtp, strlen(rtsp_rtp)) != 0) {
370 g_warning("Frame %u: rtsp: unknown transport", pinfo->fd->num);
374 c_data_port = c_mon_port = 0;
375 s_data_port = s_mon_port = 0;
376 if ((tmp = strstr(buf, rtsp_sps))) {
377 tmp += strlen(rtsp_sps);
378 if (sscanf(tmp, "%u-%u", &s_data_port, &s_mon_port) < 1) {
379 g_warning("Frame %u: rtsp: bad server_port",
384 if ((tmp = strstr(buf, rtsp_cps))) {
385 tmp += strlen(rtsp_cps);
386 if (sscanf(tmp, "%u-%u", &c_data_port, &c_mon_port) < 1) {
387 g_warning("Frame %u: rtsp: bad client_port",
393 rtsp_conversation_data_t *data;
394 guint s_data_chan, s_mon_chan;
398 * Deal with RTSP TCP-interleaved conversations.
400 if ((tmp = strstr(buf, rtsp_inter)) == NULL) {
402 * No interleaved or server_port - probably a
403 * SETUP request, rather than reply.
407 tmp += strlen(rtsp_inter);
408 i = sscanf(tmp, "%u-%u", &s_data_chan, &s_mon_chan);
410 g_warning("Frame %u: rtsp: bad interleaved",
414 conv = find_conversation(&pinfo->src, &pinfo->dst, pinfo->ptype,
415 pinfo->srcport, pinfo->destport, 0);
417 conv = conversation_new(&pinfo->src, &pinfo->dst,
418 pinfo->ptype, pinfo->srcport, pinfo->destport,
421 data = conversation_get_proto_data(conv, proto_rtsp);
423 data = g_mem_chunk_alloc(rtsp_vals);
424 conversation_add_proto_data(conv, proto_rtsp, data);
426 if (s_data_chan < RTSP_MAX_INTERLEAVED) {
427 data->interleaved[s_data_chan].dissector =
430 if (i > 1 && s_mon_chan < RTSP_MAX_INTERLEAVED) {
431 data->interleaved[s_mon_chan].dissector =
438 * We only want to match on the destination address, not the
439 * source address, because the server might send back a packet
440 * from an address other than the address to which its client
441 * sent the packet, so we construct a conversation with no
444 SET_ADDRESS(&null_addr, pinfo->src.type, 0, NULL);
446 rtp_add_address(pinfo, (char *)pinfo->dst.data, c_data_port, s_data_port,
447 "RTSP", pinfo->fd->num);
452 rtcp_add_address(pinfo, (char *)pinfo->dst.data, c_mon_port, s_mon_port,
453 "RTSP", pinfo->fd->num);
456 static const char rtsp_content_length[] = "Content-Length:";
459 rtsp_get_content_length(const guchar *line_begin, size_t line_len)
467 if (line_len > sizeof(buf) - 1) {
469 * Don't overflow the buffer.
471 line_len = sizeof(buf) - 1;
473 memcpy(buf, line_begin, line_len);
474 buf[line_len] = '\0';
476 tmp = buf + STRLEN_CONST(rtsp_content_length);
477 while (*tmp && isspace(*tmp))
479 content_length = strtol(tmp, &p, 10);
481 if (up == tmp || (*up != '\0' && !isspace(*up)))
482 return -1; /* not a valid number */
483 return content_length;
486 static const char rtsp_Session[] = "Session:";
487 static const char rtsp_X_Vig_Msisdn[] = "X-Vig-Msisdn";
490 dissect_rtspmessage(tvbuff_t *tvb, int offset, packet_info *pinfo,
493 proto_tree *rtsp_tree = NULL;
494 proto_tree *sub_tree = NULL;
495 proto_item *ti = NULL;
498 const guchar *linep, *lineend;
500 int first_linelen, linelen;
503 gboolean is_request_or_reply;
504 gboolean body_requires_content_len;
505 gboolean saw_req_resp_or_header;
507 rtsp_type_t rtsp_type;
512 int reported_datalen;
515 e164_info_t e164_info;
517 * Is this a request or response?
519 * Note that "tvb_find_line_end()" will return a value that
520 * is not longer than what's in the buffer, so the
521 * "tvb_get_ptr()" call won't throw an exception.
523 first_linelen = tvb_find_line_end(tvb, offset,
524 tvb_ensure_length_remaining(tvb, offset), &next_offset,
527 * Is the first line a request or response?
529 line = tvb_get_ptr(tvb, offset, first_linelen);
530 is_request_or_reply = is_rtsp_request_or_reply(line, first_linelen,
532 if (is_request_or_reply) {
534 * Yes, it's a request or response.
535 * Do header desegmentation if we've been told to,
536 * and do body desegmentation if we've been told to and
537 * we find a Content-Length header.
539 if (!req_resp_hdrs_do_reassembly(tvb, pinfo,
540 rtsp_desegment_headers, rtsp_desegment_body)) {
542 * More data needed for desegmentation.
549 * RFC 2326 says that a content length must be specified
550 * in requests that have a body, although section 4.4 speaks
551 * of a server closing the connection indicating the end of
554 * We assume that an absent content length in a request means
555 * that we don't have a body, and that an absent content length
556 * in a reply means that the reply body runs to the end of
557 * the connection. If the first line is neither, we assume
558 * that whatever follows a blank line should be treated as a
559 * body; there's not much else we can do, as we're jumping
560 * into the message in the middle.
562 * XXX - if there was no Content-Length entity header, we should
563 * accumulate all data until the end of the connection.
564 * That'd require that the TCP dissector call subdissectors
565 * for all frames with FIN, even if they contain no data,
566 * which would require subdissectors to deal intelligently
567 * with empty segments.
569 if (rtsp_type == RTSP_REQUEST)
570 body_requires_content_len = TRUE;
572 body_requires_content_len = FALSE;
574 if (check_col(pinfo->cinfo, COL_PROTOCOL))
575 col_set_str(pinfo->cinfo, COL_PROTOCOL, "RTSP");
576 if (check_col(pinfo->cinfo, COL_INFO)) {
578 * Put the first line from the buffer into the summary
579 * if it's an RTSP request or reply (but leave out the
581 * Otherwise, just call it a continuation.
583 * Note that "tvb_find_line_end()" will return a value that
584 * is not longer than what's in the buffer, so the
585 * "tvb_get_ptr()" call won't throw an exception.
587 line = tvb_get_ptr(tvb, offset, first_linelen);
588 if (is_request_or_reply)
589 if ( rtsp_type == RTSP_REPLY ) {
590 col_add_str(pinfo->cinfo, COL_INFO, "Reply: ");
591 col_append_str(pinfo->cinfo, COL_INFO,
592 format_text(line, first_linelen));
595 col_add_str(pinfo->cinfo, COL_INFO,
596 format_text(line, first_linelen));
599 col_set_str(pinfo->cinfo, COL_INFO, "Continuation");
603 orig_offset = offset;
605 ti = proto_tree_add_item(tree, proto_rtsp, tvb, offset, -1,
607 rtsp_tree = proto_item_add_subtree(ti, ett_rtsp);
611 * We haven't yet seen a Content-Length header.
616 * Process the packet data, a line at a time.
618 saw_req_resp_or_header = FALSE; /* haven't seen anything yet */
619 while (tvb_reported_length_remaining(tvb, offset) != 0) {
621 * We haven't yet concluded that this is a header.
626 * Find the end of the line.
628 linelen = tvb_find_line_end(tvb, offset,
629 tvb_ensure_length_remaining(tvb, offset), &next_offset,
633 line_end_offset = offset + linelen;
635 * colon_offset may be -1
637 colon_offset = tvb_find_guint8(tvb, offset, linelen, ':');
641 * Get a buffer that refers to the line.
643 line = tvb_get_ptr(tvb, offset, linelen);
644 lineend = line + linelen;
647 * OK, does it look like an RTSP request or response?
649 is_request_or_reply = is_rtsp_request_or_reply(line, linelen,
651 if (is_request_or_reply)
655 * No. Does it look like a blank line (as would appear
656 * at the end of an RTSP request)?
659 goto is_rtsp; /* Yes. */
662 * No. Does it look like a header?
665 while (linep < lineend) {
669 * This must be a CHAR to be part of a token; that
670 * means it must be ASCII.
673 break; /* not ASCII, thus not a CHAR */
676 * This mustn't be a CTL to be part of a token.
678 * XXX - what about leading LWS on continuation
682 break; /* CTL, not part of a header */
703 * It's a tspecial, so it's not
704 * part of a token, so it's not
705 * a field name for the beginning
712 * This ends the token; we consider
713 * this to be a header.
721 * LWS (RFC-2616, 4.2); continue the previous
729 * We haven't seen the colon, but everything else looks
730 * OK for a header line.
732 * If we've already seen an RTSP request or response
733 * line, or a header line, and we're at the end of
734 * the tvbuff, we assume this is an incomplete header
735 * line. (We quit this loop after seeing a blank line,
736 * so if we've seen a request or response line, or a
737 * header line, this is probably more of the request
738 * or response we're presumably seeing. There is some
739 * risk of false positives, but the same applies for
740 * full request or response lines or header lines,
741 * although that's less likely.)
743 * We throw an exception in that case, by checking for
744 * the existence of the next byte after the last one
745 * in the line. If it exists, "tvb_ensure_bytes_exist()"
746 * throws no exception, and we fall through to the
747 * "not RTSP" case. If it doesn't exist,
748 * "tvb_ensure_bytes_exist()" will throw the appropriate
751 if (saw_req_resp_or_header)
752 tvb_ensure_bytes_exist(tvb, offset, linelen + 1);
756 * We don't consider this part of an RTSP request or
757 * reply, so we don't display it.
767 * This is a blank line, which means that
768 * whatever follows it isn't part of this
771 proto_tree_add_text(rtsp_tree, tvb, offset,
772 next_offset - offset, "%s",
773 tvb_format_text(tvb, offset, next_offset - offset));
774 offset = next_offset;
779 * Not a blank line - either a request, a reply, or a header
782 saw_req_resp_or_header = TRUE;
784 ti = proto_tree_add_text(rtsp_tree, tvb, offset,
785 next_offset - offset, "%s",
786 tvb_format_text(tvb, offset, next_offset - offset));
788 sub_tree = proto_item_add_subtree(ti, ett_rtsp_method);
793 process_rtsp_request(tvb, offset, line, linelen,
798 process_rtsp_reply(tvb, offset, line, linelen,
808 * Process some headers specially.
810 #define HDR_MATCHES(header) \
811 (linelen > STRLEN_CONST(header) && \
812 strncasecmp(line, (header), STRLEN_CONST(header)) == 0)
814 if (HDR_MATCHES(rtsp_transport)) {
816 * Based on the port numbers specified
817 * in the Transport: header, set up
818 * a conversation that will be dissected
819 * with the appropriate dissector.
821 rtsp_create_conversation(pinfo, line, linelen);
822 } else if (HDR_MATCHES(rtsp_content_type)) {
824 * If the Content-Type: header says this
825 * is SDP, dissect the payload as SDP.
827 * XXX - we should just do the same
828 * sort of header processing
829 * that HTTP does, and use the
830 * "media_type" dissector table on
833 * We should use those for Transport:
834 * and Content-Length: as well (and
835 * should process Content-Length: in
838 if (is_content_sdp(line, linelen))
840 } else if (HDR_MATCHES(rtsp_content_length)) {
842 * Only the amount specified by the
843 * Content-Length: header should be treated
846 content_length = rtsp_get_content_length(line,
849 } else if (HDR_MATCHES(rtsp_Session)) {
851 * Extract the session string
855 if ( colon_offset != -1 ){
857 * Skip whitespace after the colon.
858 * (Code from SIP dissector )
860 value_offset = colon_offset + 1;
861 while (value_offset < line_end_offset
862 && ((c = tvb_get_guint8(tvb,
863 value_offset)) == ' '
867 * Put the value into the protocol tree
869 value_len = line_end_offset - value_offset;
870 proto_tree_add_string(sub_tree, hf_rtsp_session,tvb,
871 value_offset, value_len ,
872 tvb_format_text(tvb, value_offset, value_len));
875 } else if (HDR_MATCHES(rtsp_X_Vig_Msisdn)) {
877 * Extract the X_Vig_Msisdn string
879 if ( colon_offset != -1 ){
881 * Skip whitespace after the colon.
882 * (Code from SIP dissector )
884 value_offset = colon_offset + 1;
885 while (value_offset < line_end_offset
886 && ((c = tvb_get_guint8(tvb,
887 value_offset)) == ' '
891 * Put the value into the protocol tree
893 value_len = line_end_offset - value_offset;
894 proto_tree_add_string(sub_tree, hf_rtsp_X_Vig_Msisdn,tvb,
895 value_offset, value_len ,
896 tvb_format_text(tvb, value_offset, value_len));
898 e164_info.e164_number_type = CALLING_PARTY_NUMBER;
899 e164_info.nature_of_address = 0;
901 e164_info.E164_number_str = tvb_get_string(tvb, value_offset,
903 e164_info.E164_number_length = value_len;
904 dissect_e164_number(tvb, sub_tree, value_offset,
905 value_len, e164_info);
906 g_free(e164_info.E164_number_str);
913 offset = next_offset;
917 * If a content length was supplied, the amount of data to be
918 * processed as RTSP payload is the minimum of the content
919 * length and the amount of data remaining in the frame.
921 * If no content length was supplied (or if a bad content length
922 * was supplied), the amount of data to be processed is the amount
923 * of data remaining in the frame.
925 datalen = tvb_length_remaining(tvb, offset);
926 reported_datalen = tvb_reported_length_remaining(tvb, offset);
927 if (content_length != -1) {
929 * Content length specified; display only that amount
932 if (datalen > content_length)
933 datalen = content_length;
936 * XXX - limit the reported length in the tvbuff we'll
937 * hand to a subdissector to be no greater than the
940 * We really need both unreassembled and "how long it'd
941 * be if it were reassembled" lengths for tvbuffs, so
942 * that we throw the appropriate exceptions for
943 * "not enough data captured" (running past the length),
944 * "packet needed reassembly" (within the length but
945 * running past the unreassembled length), and
946 * "packet is malformed" (running past the reassembled
949 if (reported_datalen > content_length)
950 reported_datalen = content_length;
953 * No content length specified; if this message doesn't
954 * have a body if no content length is specified, process
955 * nothing as payload.
957 if (body_requires_content_len)
963 * There's stuff left over; process it.
969 * Fix up the top-level item so that it doesn't
970 * include the SDP stuff.
973 proto_item_set_len(ti, offset);
976 * Now create a tvbuff for the SDP stuff and
979 * The amount of data to be processed that's
980 * available in the tvbuff is "datalen", which
981 * is the minimum of the amount of data left in
982 * the tvbuff and any specified content length.
984 * The amount of data to be processed that's in
985 * this frame, regardless of whether it was
986 * captured or not, is "reported_datalen",
987 * which, if no content length was specified,
988 * is -1, i.e. "to the end of the frame.
990 new_tvb = tvb_new_subset(tvb, offset, datalen,
992 call_dissector(sdp_handle, new_tvb, pinfo, tree);
994 if (tvb_get_guint8(tvb, offset) == RTSP_FRAMEHDR) {
996 * This is interleaved stuff; don't
997 * treat it as raw data - set "datalen"
998 * to 0, so we won't skip the offset
999 * past it, which will cause our
1000 * caller to process that stuff itself.
1004 proto_tree_add_text(rtsp_tree, tvb, offset,
1005 datalen, "Data (%d bytes)",
1011 * We've processed "datalen" bytes worth of data
1012 * (which may be no data at all); advance the
1013 * offset past whatever data we've processed.
1017 return offset - orig_offset;
1021 process_rtsp_request(tvbuff_t *tvb, int offset, const guchar *data,
1022 size_t linelen, proto_tree *tree)
1024 const guchar *lineend = data + linelen;
1027 const guchar *url_start;
1030 /* Request Methods */
1031 for (ii = 0; ii < RTSP_NMETHODS; ii++) {
1032 size_t len = strlen(rtsp_methods[ii]);
1033 if (linelen >= len &&
1034 strncasecmp(rtsp_methods[ii], data, len) == 0 &&
1035 (len == linelen || isspace(data[len])))
1038 if (ii == RTSP_NMETHODS) {
1040 * We got here because "is_rtsp_request_or_reply()" returned
1041 * RTSP_REQUEST, so we know one of the request methods
1042 * matched, so we "can't get here".
1044 g_assert_not_reached();
1048 proto_tree_add_string(tree, hf_rtsp_method, tvb, offset,
1049 strlen(rtsp_methods[ii]), rtsp_methods[ii]);
1054 while (url < lineend && !isspace(*url))
1056 while (url < lineend && isspace(*url))
1059 while (url < lineend && !isspace(*url))
1061 tmp_url = g_malloc(url - url_start + 1);
1062 memcpy(tmp_url, url_start, url - url_start);
1063 tmp_url[url - url_start] = 0;
1064 proto_tree_add_string(tree, hf_rtsp_url, tvb,
1065 offset + (url_start - data), url - url_start, tmp_url);
1070 process_rtsp_reply(tvbuff_t *tvb, int offset, const guchar *data,
1071 size_t linelen, proto_tree *tree)
1073 const guchar *lineend = data + linelen;
1074 const guchar *status = data;
1075 const guchar *status_start;
1076 unsigned int status_i;
1079 while (status < lineend && !isspace(*status))
1081 while (status < lineend && isspace(*status))
1083 status_start = status;
1085 while (status < lineend && isdigit(*status))
1086 status_i = status_i * 10 + *status++ - '0';
1087 proto_tree_add_uint(tree, hf_rtsp_status, tvb,
1088 offset + (status_start - data),
1089 status - status_start, status_i);
1093 dissect_rtsp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
1098 while (tvb_reported_length_remaining(tvb, offset) != 0) {
1099 len = (tvb_get_guint8(tvb, offset) == RTSP_FRAMEHDR)
1100 ? dissect_rtspinterleaved(tvb, offset, pinfo, tree)
1101 : dissect_rtspmessage(tvb, offset, pinfo, tree);
1107 * OK, we've set the Protocol and Info columns for the
1108 * first RTSP message; make the columns non-writable,
1109 * so that we don't change it for subsequent RTSP messages.
1111 col_set_writable(pinfo->cinfo, FALSE);
1118 /* Routine to initialize rtsp protocol before each capture or filter pass. */
1119 /* Release any memory if needed. Then setup the memory chunks. */
1122 g_mem_chunk_destroy(rtsp_vals);
1124 rtsp_vals = g_mem_chunk_new("rtsp_vals",
1125 sizeof(rtsp_conversation_data_t),
1126 rtsp_hash_init_count * sizeof(rtsp_conversation_data_t),
1131 proto_register_rtsp(void)
1133 static gint *ett[] = {
1138 static hf_register_info hf[] = {
1140 { "Method", "rtsp.method", FT_STRING, BASE_NONE, NULL, 0,
1143 { "URL", "rtsp.url", FT_STRING, BASE_NONE, NULL, 0,
1146 { "Status", "rtsp.status", FT_UINT32, BASE_DEC, NULL, 0,
1149 { "Session", "rtsp.session", FT_STRING, BASE_NONE, NULL, 0,
1151 { &hf_rtsp_X_Vig_Msisdn,
1152 { "X-Vig-Msisdn", "X_Vig_Msisdn", FT_STRING, BASE_NONE, NULL, 0,
1157 module_t *rtsp_module;
1159 proto_rtsp = proto_register_protocol("Real Time Streaming Protocol",
1161 proto_register_field_array(proto_rtsp, hf, array_length(hf));
1162 proto_register_subtree_array(ett, array_length(ett));
1164 /* Register our configuration options, particularly our ports */
1166 rtsp_module = prefs_register_protocol(proto_rtsp, proto_reg_handoff_rtsp);
1167 prefs_register_uint_preference(rtsp_module, "tcp.port",
1169 "Set the TCP port for RTSP messages",
1170 10, &global_rtsp_tcp_port);
1171 prefs_register_uint_preference(rtsp_module, "tcp.alternate_port",
1172 "Alternate RTSP TCP Port",
1173 "Set the alternate TCP port for RTSP messages",
1174 10, &global_rtsp_tcp_alternate_port);
1175 prefs_register_bool_preference(rtsp_module, "desegment_headers",
1176 "Desegment all RTSP headers\nspanning multiple TCP segments",
1177 "Whether the RTSP dissector should desegment all headers "
1178 "of a request spanning multiple TCP segments",
1179 &rtsp_desegment_headers);
1180 prefs_register_bool_preference(rtsp_module, "desegment_body",
1181 "Trust the \"Content-length:\" header and\ndesegment RTSP "
1182 "bodies\nspanning multiple TCP segments",
1183 "Whether the RTSP dissector should use the "
1184 "\"Content-length:\" value to desegment the body "
1185 "of a request spanning multiple TCP segments",
1186 &rtsp_desegment_body);
1188 register_init_routine(rtsp_init); /* register re-init routine */
1192 proto_reg_handoff_rtsp(void)
1194 dissector_handle_t rtsp_handle;
1195 static int rtsp_prefs_initialized = FALSE;
1197 rtsp_handle = create_dissector_handle(dissect_rtsp, proto_rtsp);
1199 if (!rtsp_prefs_initialized) {
1200 rtsp_prefs_initialized = TRUE;
1203 dissector_delete("tcp.port", tcp_port, rtsp_handle);
1204 dissector_delete("tcp.port", tcp_alternate_port, rtsp_handle);
1206 /* Set our port number for future use */
1208 tcp_port = global_rtsp_tcp_port;
1209 tcp_alternate_port = global_rtsp_tcp_alternate_port;
1211 dissector_add("tcp.port", tcp_port, rtsp_handle);
1212 dissector_add("tcp.port", tcp_alternate_port, rtsp_handle);
1214 sdp_handle = find_dissector("sdp");
1215 rtp_handle = find_dissector("rtp");
1216 rtcp_handle = find_dissector("rtcp");