2 * Routines for Van Jacobson header decompression. (See RFC 1144.)
6 * Wireshark - Network traffic analyzer
7 * By Gerald Combs <gerald@wireshark.org>
9 * This file created by Irfan Khan <ikhan@qualcomm.com>
10 * Copyright (c) 2001 by QUALCOMM, Incorporated.
11 * All Rights reserved.
13 * Routines to compress and uncompress TCP packets (for transmission
14 * over low speed serial lines).
16 * Copyright (c) 1989 Regents of the University of California.
17 * All rights reserved.
19 * Redistribution and use in source and binary forms are permitted
20 * provided that the above copyright notice and this paragraph are
21 * duplicated in all such forms and that any documentation,
22 * advertising materials, and other materials related to such
23 * distribution and use acknowledge that the software was developed
24 * by the University of California, Berkeley. The name of the
25 * University may not be used to endorse or promote products derived
26 * from this software without specific prior written permission.
27 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
28 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
29 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
31 * Van Jacobson (van@helios.ee.lbl.gov), Dec 31, 1989:
32 * - Initial distribution.
35 * modified for KA9Q Internet Software Package by
36 * Katie Stevens (dkstevens@ucdavis.edu)
37 * University of California, Davis
39 * - 01-31-90 initial adaptation (from 1.19)
40 * PPP.05 02-15-90 [ks]
41 * PPP.08 05-02-90 [ks] use PPP protocol field to signal compression
42 * PPP.15 09-90 [ks] improve mbuf handling
43 * PPP.16 11-02 [karn] substantially rewritten to use NOS facilities
45 * - Feb 1991 Bill_Simpson@um.cc.umich.edu
46 * variable number of conversation slots
47 * allow zero or one slots
50 * - Jul 1994 Dmitry Gorodchanin
51 * Fixes for memory leaks.
52 * - Oct 1994 Dmitry Gorodchanin
54 * - Jan 1995 Bjorn Ekwall
55 * Use ip_fast_csum from ip.h
56 * - July 1995 Christos A. Polyzols
57 * Spotted bug in tcp option checking
58 * - Sep 2001 Irfan Khan
59 * Rewrite to make the code work for wireshark.
68 #include <epan/packet.h>
69 #include <epan/prefs.h>
70 #include "packet-ppp.h"
71 #include <epan/ppptypes.h>
72 #include <epan/ipproto.h>
73 #include <epan/in_cksum.h>
74 #include <epan/emem.h>
76 /* Define relevant IP/TCP parameters */
77 #define IP_FIELD_TOT_LEN 2 /* Total length field in IP hdr */
78 #define IP_FIELD_PROTOCOL 9 /* Protocol field byte in IP hdr */
79 #define IP_ADDR_SIZE 4 /* Size in bytes of IPv4 address */
80 #define IP_FIELD_SRC 12 /* Byte 12 in IP hdr - src address */
81 #define IP_FIELD_DST 16 /* Byte 16 in IP hdr - dst address */
82 #define IP_HDR_LEN 20 /* Minimum IP header length */
83 #define IP_HDR_LEN_MASK 0x0f /* Mask for header length field */
84 #define IP_MAX_OPT_LEN 44 /* Max length of IP options */
85 #define TCP_FIELD_HDR_LEN 12 /* Data offset field in TCP hdr */
86 #define TCP_HDR_LEN 20 /* Minimum TCP header length */
87 #define TCP_MAX_OPT_LEN 44 /* Max length of TCP options */
88 #define TCP_SIMUL_CONV_MAX 256 /* Max number of simul. TCP conversations */
89 #define TCP_PUSH_BIT 0x08 /* TCP push bit */
90 #define TCP_URG_BIT 0x20 /* TCP urgent bit */
92 /* Bits in first octet of compressed packet */
93 /* flag bits for what changed in a packet */
94 #define NEW_C 0x40 /* Connection number changed */
95 #define NEW_I 0x20 /* IP sequence number change by value != 1 */
96 #define CHANGE_PUSH_BIT 0x10 /* TCP push bit set */
97 #define NEW_S 0x08 /* Sequence number changed */
98 #define NEW_A 0x04 /* Ack sequence number changed */
99 #define NEW_W 0x02 /* Window changed */
100 #define NEW_U 0x01 /* Urgent pointer present */
102 /* reserved, special-case values of above */
103 #define SPECIAL_I (NEW_S|NEW_W|NEW_U) /* echoed interactive traffic */
104 #define SPECIAL_D (NEW_S|NEW_A|NEW_W|NEW_U)/* unidirectional data */
105 #define SPECIALS_MASK (NEW_S|NEW_A|NEW_W|NEW_U)
107 /* Function return values */
114 /* VJ Mem Chunk defines */
115 #define VJ_DATA_SIZE 128 /* Max IP hdr(64)+Max TCP hdr(64) */
117 /* IP and TCP header types */
143 #define TCP_OFFSET(th) (((th)->off_x2 & 0xf0) >> 4)
145 /* State per active tcp conversation */
146 typedef struct cstate {
149 guint8 cs_ipopt[IP_MAX_OPT_LEN];
150 guint8 cs_tcpopt[TCP_MAX_OPT_LEN];
152 #define SLF_TOSS 0x00000001 /* tossing rcvd frames until id received */
155 /* All the state data for one serial line */
157 cstate rstate[TCP_SIMUL_CONV_MAX]; /* receive connection states (array) */
158 guint8 recv_current; /* most recent rcvd id */
161 /* Initialize the protocol and registered fields */
162 static int proto_vj = -1;
164 static int hf_vj_change_mask = -1;
165 static int hf_vj_change_mask_c = -1;
166 static int hf_vj_change_mask_i = -1;
167 static int hf_vj_change_mask_p = -1;
168 static int hf_vj_change_mask_s = -1;
169 static int hf_vj_change_mask_a = -1;
170 static int hf_vj_change_mask_w = -1;
171 static int hf_vj_change_mask_u = -1;
172 static int hf_vj_connection_number = -1;
173 static int hf_vj_tcp_cksum = -1;
174 static int hf_vj_urp = -1;
175 static int hf_vj_win_delta = -1;
176 static int hf_vj_ack_delta = -1;
177 static int hf_vj_seq_delta = -1;
178 static int hf_vj_ip_id_delta = -1;
180 static gint ett_vj = -1;
181 static gint ett_vj_changes = -1;
183 /* Protocol handles */
184 static dissector_handle_t ip_handle;
185 static dissector_handle_t data_handle;
187 /* State repository (Full Duplex) */
188 #define RX_TX_STATE_COUNT 2
189 static slcompress *rx_tx_state[RX_TX_STATE_COUNT] = {NULL, NULL};
191 /* Mem Chunks for storing decompressed headers */
193 int offset; /* uppermost bit is "can't dissect" flag */
194 guint8 data[VJ_DATA_SIZE];
197 /* Function prototypes */
198 static int get_unsigned_delta(tvbuff_t *tvb, int *offsetp, int hf,
200 static int get_signed_delta(tvbuff_t *tvb, int *offsetp, int hf,
202 static guint16 ip_csum(const guint8 *ptr, guint32 len);
203 static slcompress *slhc_init(void);
204 static gint vjc_process(tvbuff_t *src_tvb, packet_info *pinfo, proto_tree *tree,
206 static gint vjc_tvb_setup(tvbuff_t *src_tvb, tvbuff_t **dst_tvb,
209 /* Dissector for VJ Uncompressed packets */
211 dissect_vjuc(tvbuff_t *tvb, packet_info *pinfo, proto_tree * tree)
214 proto_tree *vj_tree = NULL;
223 gint isize = tvb_length(tvb);
226 col_set_str(pinfo->cinfo, COL_PROTOCOL, "PPP VJ");
229 ti = proto_tree_add_protocol_format(tree, proto_vj, tvb, 0, -1,
230 "PPP VJ Compression: Uncompressed data");
231 vj_tree = proto_item_add_subtree(ti, ett_vj);
234 if(pinfo->p2p_dir == P2P_DIR_UNKNOWN) {
235 /* Direction of the traffic unknown - can't update state */
238 /* Get state for that direction */
239 comp = rx_tx_state[pinfo->p2p_dir];
243 * Check to make sure we can fetch the connection index.
245 if(!tvb_bytes_exist(tvb, IP_FIELD_PROTOCOL, 1)) {
247 * We don't. We can't even mark a connection as non-decompressable,
248 * as we don't know which connection this is. Mark them all as
249 * non-decompressable.
251 if(check_col(pinfo->cinfo, COL_INFO))
252 col_set_str(pinfo->cinfo, COL_INFO, "VJ uncompressed TCP (not enough data available)");
254 call_dissector(data_handle, tvb, pinfo, tree);
256 for(i = 0; i < TCP_SIMUL_CONV_MAX; i++)
257 comp->rstate[i].flags |= SLF_TOSS;
262 /* Get connection index */
263 conn_index = tvb_get_guint8(tvb, IP_FIELD_PROTOCOL);
265 proto_tree_add_uint(vj_tree, hf_vj_connection_number, tvb,
266 IP_FIELD_PROTOCOL, 1, conn_index);
269 * Update the current connection, and get a pointer to its state.
272 comp->recv_current = conn_index;
273 cs = &comp->rstate[conn_index];
276 /* Get the IP header length */
277 ihl = tvb_get_guint8(tvb, 0) & IP_HDR_LEN_MASK;
280 /* Check IP header length */
281 if(ihl < IP_HDR_LEN) {
282 if(check_col(pinfo->cinfo, COL_INFO)) {
283 col_add_fstr(pinfo->cinfo, COL_INFO, "VJ uncompressed TCP (IP header length (%u) < %u)",
287 cs->flags |= SLF_TOSS;
291 /* Make sure we have the full IP header */
293 if(check_col(pinfo->cinfo, COL_INFO))
294 col_set_str(pinfo->cinfo, COL_INFO, "VJ uncompressed TCP (not enough data available)");
296 call_dissector(data_handle, tvb, pinfo, tree);
298 cs->flags |= SLF_TOSS;
302 if(check_col(pinfo->cinfo, COL_INFO))
303 col_set_str(pinfo->cinfo, COL_INFO, "VJ uncompressed TCP");
306 * Copy packet data to a buffer, and replace the connection index with
307 * the protocol type (which is always TCP), to give the actual IP header.
309 buffer = tvb_memdup(tvb, 0, isize);
310 buffer[IP_FIELD_PROTOCOL] = IP_PROTO_TCP;
312 /* Check IP checksum */
313 if(ip_csum(buffer, ihl) != ZERO) {
315 * Checksum invalid - don't update state, and don't decompress
316 * any subsequent compressed packets in this direction.
319 cs->flags |= SLF_TOSS;
320 cs = NULL; /* disable state updates */
322 /* Do we have the TCP header length in the tvbuff? */
323 if(!tvb_bytes_exist(tvb, ihl + TCP_FIELD_HDR_LEN, 1)) {
324 /* We don't, so we can't provide enough data for decompression */
325 if(check_col(pinfo->cinfo, COL_INFO))
326 col_set_str(pinfo->cinfo, COL_INFO, "VJ uncompressed TCP (not enough data available)");
328 cs->flags |= SLF_TOSS;
329 cs = NULL; /* disable state updates */
331 /* Get the TCP header length */
332 thl = tvb_get_guint8(tvb, ihl + TCP_FIELD_HDR_LEN);
333 thl = ((thl & 0xf0) >> 4) * 4;
335 /* Check TCP header length */
336 if(thl < TCP_HDR_LEN) {
337 if(check_col(pinfo->cinfo, COL_INFO)) {
338 col_add_fstr(pinfo->cinfo, COL_INFO, "VJ uncompressed TCP (TCP header length (%u) < %u)",
342 cs->flags |= SLF_TOSS;
343 cs = NULL; /* disable state updates */
345 /* Make sure we have the full TCP header */
347 if(check_col(pinfo->cinfo, COL_INFO))
348 col_set_str(pinfo->cinfo, COL_INFO, "VJ uncompressed TCP (not enough data available)");
350 cs->flags |= SLF_TOSS;
351 cs = NULL; /* disable state updates */
358 * If packet seen for first time, update state if we have state and can
361 if(!pinfo->fd->flags.visited) {
363 cs->flags &= ~SLF_TOSS;
364 memcpy(&cs->cs_ip, &buffer[0], IP_HDR_LEN);
365 memcpy(&cs->cs_tcp, &buffer[ihl], TCP_HDR_LEN);
367 memcpy(cs->cs_ipopt, &buffer[sizeof(iphdr_type)], ihl - IP_HDR_LEN);
368 if(TCP_OFFSET(&(cs->cs_tcp)) > 5)
369 memcpy(cs->cs_tcpopt, &buffer[ihl + sizeof(tcphdr_type)],
370 (TCP_OFFSET(&(cs->cs_tcp)) - 5) * 4);
375 * Set up tvbuff containing packet with protocol type.
376 * Neither header checksum is recalculated.
378 * Use the length field from the IP header as the reported length;
379 * use the minimum of that and the number of bytes we got from
380 * the tvbuff as the actual length, just in case the tvbuff we were
381 * handed includes part or all of the FCS (because the FCS preference
382 * for the PPP dissector doesn't match the FCS size in this session).
384 ipsize = pntohs(&buffer[IP_FIELD_TOT_LEN]);
387 next_tvb = tvb_new_child_real_data(tvb, buffer, isize, ipsize);
388 add_new_data_source(pinfo, next_tvb, "VJ Uncompressed");
393 call_dissector(ip_handle, next_tvb, pinfo, tree);
396 /* Dissector for VJ Compressed packets */
398 dissect_vjc(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
401 proto_tree *vj_tree = NULL;
402 tvbuff_t *next_tvb = NULL;
403 slcompress *comp = NULL;
406 col_set_str(pinfo->cinfo, COL_PROTOCOL, "PPP VJ");
409 ti = proto_tree_add_protocol_format(tree, proto_vj, tvb, 0, -1,
410 "PPP VJ Compression: Compressed data");
411 vj_tree = proto_item_add_subtree(ti, ett_vj);
414 if(!ppp_vj_decomp || pinfo->p2p_dir == P2P_DIR_UNKNOWN) {
416 * VJ decompression turned off, so we shouldn't decompress, or
417 * direction of the traffic unknown, so we can't decompress.
421 /* Get state for that direction */
422 comp = rx_tx_state[pinfo->p2p_dir];
425 /* Process the compressed data header */
426 if(vjc_process(tvb, pinfo, vj_tree, comp) == VJ_ERROR)
429 /* Decompression possible - set up tvb containing decompressed packet */
430 err = vjc_tvb_setup(tvb, &next_tvb, pinfo);
431 if(err == VJ_ERROR) {
433 call_dissector(data_handle, tvb, pinfo, vj_tree);
437 /* No errors, so call IP dissector */
438 call_dissector(ip_handle, next_tvb, pinfo, tree);
441 /* Initialization function */
447 for(i = 0; i < RX_TX_STATE_COUNT; i++) {
448 rx_tx_state[i] = slhc_init();
453 /* Initialization routine for VJ decompression */
457 slcompress *comp = se_alloc(sizeof(slcompress));
460 memset(comp, ZERO, sizeof(slcompress));
463 * Initialize the state; there is no current connection, and
464 * we have no header data for any of the connections, as we
465 * haven't yet seen an uncompressed frame.
467 comp->recv_current = TCP_SIMUL_CONV_MAX - 1;
468 for (i = 0; i < TCP_SIMUL_CONV_MAX; i++)
469 comp->rstate[i].flags |= SLF_TOSS;
473 /* Setup the decompressed packet tvb for VJ compressed packets */
475 vjc_tvb_setup(tvbuff_t *src_tvb,
479 vj_header_t *hdr_buf;
487 DISSECTOR_ASSERT(src_tvb);
489 /* Get decompressed header stored in fd protocol area */
490 hdr_buf = p_get_proto_data(pinfo->fd, proto_vj);
491 if(hdr_buf == NULL) {
492 if(check_col(pinfo->cinfo, COL_INFO))
493 col_set_str(pinfo->cinfo, COL_INFO, "VJ compressed TCP (previous data bad or missing)");
497 if(check_col(pinfo->cinfo, COL_INFO))
498 col_set_str(pinfo->cinfo, COL_INFO, "VJ compressed TCP");
500 /* Get the data offset in the tvbuff */
501 offset = hdr_buf->offset;
503 /* Copy header and form tvb */
504 data_ptr = hdr_buf->data;
505 hdr_len = lo_nibble(data_ptr[0]) * 4;
506 hdr_len += hi_nibble(data_ptr[hdr_len + 12]) * 4;
507 buf_len = tvb_length(src_tvb) + hdr_len - offset;
508 pbuf = g_malloc(buf_len);
509 memcpy(pbuf, data_ptr, hdr_len);
510 tvb_memcpy(src_tvb, pbuf + hdr_len, offset, buf_len - hdr_len);
511 memcpy(&tot_len, data_ptr + 2, 2);
512 *dst_tvb = tvb_new_child_real_data(src_tvb, pbuf, buf_len, g_ntohs(tot_len));
513 add_new_data_source(pinfo, *dst_tvb, "VJ Decompressed");
518 * For VJ compressed packet:
520 * check if it is malformed;
521 * dissect the relevant fields;
522 * update the decompressor state on the first pass.
525 vjc_process(tvbuff_t *src_tvb, packet_info *pinfo, proto_tree *tree,
532 proto_tree *changes_tree;
535 iphdr_type *ip = NULL;
536 tcphdr_type *thp = NULL;
542 vj_header_t *buf_hdr;
545 if(tvb_length(src_tvb) < 3){
547 * We don't even have enough data for the change byte, so we can't
548 * determine which connection this is; mark all connections as
549 * non-decompressible.
551 if(check_col(pinfo->cinfo, COL_INFO))
552 col_set_str(pinfo->cinfo, COL_INFO, "VJ compressed TCP (not enough data available)");
554 call_dissector(data_handle, src_tvb, pinfo, tree);
556 for(i = 0; i < TCP_SIMUL_CONV_MAX; i++)
557 comp->rstate[i].flags |= SLF_TOSS;
562 /* Read the change byte */
563 changes = tvb_get_guint8(src_tvb, offset);
565 switch (changes & SPECIALS_MASK) {
568 ti = proto_tree_add_uint_format(tree, hf_vj_change_mask, src_tvb,
570 "Change mask: 0x%02x (echoed interactive traffic)",
575 ti = proto_tree_add_uint_format(tree, hf_vj_change_mask, src_tvb,
577 "Change mask: 0x%02x (unidirectional data)",
583 * XXX - summarize bits?
585 ti = proto_tree_add_uint_format(tree, hf_vj_change_mask, src_tvb,
587 "Change mask: 0x%02x", changes);
590 changes_tree = proto_item_add_subtree(ti, ett_vj_changes);
591 proto_tree_add_boolean(changes_tree, hf_vj_change_mask_c, src_tvb,
593 proto_tree_add_boolean(changes_tree, hf_vj_change_mask_i, src_tvb,
595 proto_tree_add_boolean(changes_tree, hf_vj_change_mask_p, src_tvb,
597 proto_tree_add_boolean(changes_tree, hf_vj_change_mask_s, src_tvb,
599 proto_tree_add_boolean(changes_tree, hf_vj_change_mask_a, src_tvb,
601 proto_tree_add_boolean(changes_tree, hf_vj_change_mask_w, src_tvb,
603 proto_tree_add_boolean(changes_tree, hf_vj_change_mask_u, src_tvb,
608 if(changes & NEW_C){ /* Read conn index */
609 conn_index = tvb_get_guint8(src_tvb, offset);
611 proto_tree_add_uint(tree, hf_vj_connection_number, src_tvb, offset, 1,
615 comp->recv_current = conn_index;
618 if(!pinfo->fd->flags.visited) {
620 * This is the first time this frame has been seen, so we need
621 * state information to decompress it. If that information isn't
622 * available, don't use the state information, and don't update it,
625 if(comp != NULL && !(comp->rstate[comp->recv_current].flags & SLF_TOSS)) {
626 cs = &comp->rstate[comp->recv_current];
632 /* Build TCP and IP headers */
633 tcp_cksum = tvb_get_ntohs(src_tvb, offset);
635 proto_tree_add_uint(tree, hf_vj_tcp_cksum, src_tvb, offset, 2, tcp_cksum);
637 hdrlen = lo_nibble(ip->ihl_version) * 4 + TCP_OFFSET(thp) * 4;
638 thp->cksum = g_htons(tcp_cksum);
642 if(changes & CHANGE_PUSH_BIT)
643 thp->flags |= TCP_PUSH_BIT;
645 thp->flags &= ~TCP_PUSH_BIT;
648 /* Deal with special cases and normal deltas */
649 switch(changes & SPECIALS_MASK){
650 case SPECIAL_I: /* Echoed terminal traffic */
652 word = g_ntohs(ip->tot_len) - hdrlen;
653 thp->ack_seq = g_htonl(g_ntohl(thp->ack_seq) + word);
654 thp->seq = g_htonl(g_ntohl(thp->seq) + word);
657 case SPECIAL_D: /* Unidirectional data */
659 thp->seq = g_htonl(g_ntohl(thp->seq) + g_ntohs(ip->tot_len) - hdrlen);
663 delta = get_unsigned_delta(src_tvb, &offset, hf_vj_urp, tree);
665 thp->urg_ptr = delta;
666 thp->flags |= TCP_URG_BIT;
670 thp->flags &= ~TCP_URG_BIT;
672 if(changes & NEW_W) {
673 delta = get_signed_delta(src_tvb, &offset, hf_vj_win_delta, tree);
675 thp->window = g_htons(g_ntohs(thp->window) + delta);
677 if(changes & NEW_A) {
678 delta = get_unsigned_delta(src_tvb, &offset, hf_vj_ack_delta, tree);
680 thp->ack_seq = g_htonl(g_ntohl(thp->ack_seq) + delta);
682 if(changes & NEW_S) {
683 delta = get_unsigned_delta(src_tvb, &offset, hf_vj_seq_delta, tree);
685 thp->seq = g_htonl(g_ntohl(thp->seq) + delta);
690 delta = get_unsigned_delta(src_tvb, &offset, hf_vj_ip_id_delta, tree);
694 ip->id = g_htons(g_ntohs(ip->id) + delta);
696 /* Compute IP packet length and the buffer length needed */
697 len = tvb_reported_length_remaining(src_tvb, offset);
700 * This shouldn't happen, as we *were* able to fetch stuff right before
703 if(check_col(pinfo->cinfo, COL_INFO))
704 col_set_str(pinfo->cinfo, COL_INFO, "VJ compressed TCP (not enough data available)");
706 cs->flags |= SLF_TOSS;
710 /* Show the TCP payload */
711 if(tree != NULL && tvb_offset_exists(src_tvb, offset))
712 proto_tree_add_text(tree, src_tvb, offset, -1, "TCP payload");
714 /* Nothing more to do if we don't have any compression state */
716 /* Direction of the traffic unknown - can't decompress */
717 if(check_col(pinfo->cinfo, COL_INFO))
718 col_set_str(pinfo->cinfo, COL_INFO, "VJ compressed TCP (direction unknown)");
722 if((cs != NULL) && (!pinfo->fd->flags.visited)) {
724 ip->tot_len = g_htons(len);
725 /* Compute IP check sum */
727 ip->cksum = ip_csum((guint8 *)ip, lo_nibble(ip->ihl_version) * 4);
729 /* Store the reconstructed header in frame data area */
730 buf_hdr = se_alloc(sizeof (vj_header_t));
731 buf_hdr->offset = offset; /* Offset in tvbuff is also stored */
732 data_ptr = buf_hdr->data;
733 memcpy(data_ptr, ip, IP_HDR_LEN);
734 data_ptr += IP_HDR_LEN;
735 if(lo_nibble(ip->ihl_version) > 5) {
736 memcpy(data_ptr, cs->cs_ipopt, (lo_nibble(ip->ihl_version) - 5) * 4);
737 data_ptr += (lo_nibble(ip->ihl_version) - 5) * 4;
739 memcpy(data_ptr, thp, TCP_HDR_LEN);
740 data_ptr += TCP_HDR_LEN;
741 if(TCP_OFFSET(thp) > 5)
742 memcpy(data_ptr, cs->cs_tcpopt, (TCP_OFFSET(thp) - 5) * 4);
743 p_add_proto_data(pinfo->fd, proto_vj, buf_hdr);
750 * Get an unsigned delta for a field, and put it into the protocol tree if
751 * we're building a protocol tree.
754 get_unsigned_delta(tvbuff_t *tvb, int *offsetp, int hf, proto_tree *tree)
756 int offset = *offsetp;
761 del = tvb_get_guint8(tvb, offset++);
763 del = tvb_get_ntohs(tvb, offset);
768 proto_tree_add_uint(tree, hf, tvb, *offsetp, len, del);
774 * Get a signed delta for a field, and put it into the protocol tree if
775 * we're building a protocol tree.
778 get_signed_delta(tvbuff_t *tvb, int *offsetp, int hf, proto_tree *tree)
780 int offset = *offsetp;
785 del = tvb_get_guint8(tvb, offset++);
787 del = tvb_get_ntohs(tvb, offset);
792 proto_tree_add_int(tree, hf, tvb, *offsetp, len, del);
797 /* Wrapper for in_cksum function */
799 ip_csum(const guint8 * ptr, guint32 len)
803 cksum_vec[0].ptr = ptr;
804 cksum_vec[0].len = len;
805 return in_cksum(&cksum_vec[0], 1);
808 /* Registration functions for dissectors */
810 proto_register_vj(void)
812 static hf_register_info hf[] = {
813 { &hf_vj_change_mask,
814 { "Change mask", "vj.change_mask", FT_UINT8, BASE_HEX,
815 NULL, 0x0, NULL, HFILL }},
816 { &hf_vj_change_mask_c,
817 { "Connection changed", "vj.change_mask_c", FT_BOOLEAN, 8,
818 NULL, NEW_C, "Connection number changed", HFILL }},
819 { &hf_vj_change_mask_i,
820 { "IP ID change != 1", "vj.change_mask_i", FT_BOOLEAN, 8,
821 NULL, NEW_I, "IP ID changed by a value other than 1", HFILL }},
822 { &hf_vj_change_mask_p,
823 { "Push bit set", "vj.change_mask_p", FT_BOOLEAN, 8,
824 NULL, CHANGE_PUSH_BIT, "TCP PSH flag set", HFILL }},
825 { &hf_vj_change_mask_s,
826 { "Sequence number changed", "vj.change_mask_s", FT_BOOLEAN, 8,
827 NULL, NEW_S, NULL, HFILL }},
828 { &hf_vj_change_mask_a,
829 { "Ack number changed", "vj.change_mask_a", FT_BOOLEAN, 8,
830 NULL, NEW_A, "Acknowledgement sequence number changed", HFILL }},
831 { &hf_vj_change_mask_w,
832 { "Window changed", "vj.change_mask_w", FT_BOOLEAN, 8,
833 NULL, NEW_W, "TCP window changed", HFILL }},
834 { &hf_vj_change_mask_u,
835 { "Urgent pointer set", "vj.change_mask_u", FT_BOOLEAN, 8,
836 NULL, NEW_U, NULL, HFILL }},
837 { &hf_vj_connection_number,
838 { "Connection number", "vj.connection_number", FT_UINT8, BASE_DEC,
839 NULL, 0x0, NULL, HFILL }},
841 { "TCP checksum", "vj.tcp_cksum", FT_UINT16, BASE_HEX,
842 NULL, 0x0, NULL, HFILL }},
844 { "Urgent pointer", "vj.urp", FT_UINT16, BASE_DEC,
845 NULL, 0x0, NULL, HFILL }},
847 { "Window delta", "vj.win_delta", FT_INT16, BASE_DEC,
848 NULL, 0x0, "Delta for window", HFILL }},
850 { "Ack delta", "vj.ack_delta", FT_UINT16, BASE_DEC,
851 NULL, 0x0, "Delta for acknowledgment sequence number", HFILL }},
853 { "Sequence delta", "vj.seq_delta", FT_UINT16, BASE_DEC,
854 NULL, 0x0, "Delta for sequence number", HFILL }},
855 { &hf_vj_ip_id_delta,
856 { "IP ID delta", "vj.ip_id_delta", FT_UINT16, BASE_DEC,
857 NULL, 0x0, "Delta for IP ID", HFILL }},
859 static gint *ett[] = {
864 proto_vj = proto_register_protocol("PPP VJ Compression", "PPP VJ", "vj");
865 proto_register_field_array(proto_vj, hf, array_length(hf));
866 proto_register_subtree_array(ett, array_length(ett));
867 register_init_routine(&vj_init);
871 proto_reg_handoff_vj(void)
873 dissector_handle_t vjc_handle;
874 dissector_handle_t vjuc_handle;
876 vjc_handle = create_dissector_handle(dissect_vjc, proto_vj);
877 dissector_add("ppp.protocol", PPP_VJC_COMP, vjc_handle);
879 vjuc_handle = create_dissector_handle(dissect_vjuc, proto_vj);
880 dissector_add("ppp.protocol", PPP_VJC_UNCOMP, vjuc_handle);
882 ip_handle = find_dissector("ip");
883 data_handle = find_dissector("data");