|
Wireshark 4.7.0
The Wireshark network protocol analyzer
|
| nstime_t _packet_info::abs_ts |
Packet absolute timestamp
| uint32_t _packet_info::bytes_until_next_pdu |
Number of bytes until the next PDU starts beyond the next segment
| uint16_t _packet_info::can_desegment |
>0 if this segment could be desegmented. A dissector that can offer this API (e.g. TCP) sets can_desegment=2, then can_desegment is decremented by 1 each time we pass to the next subdissector. Thus only the dissector immediately above the protocol which sets the flag can use it
| struct epan_column_info* _packet_info::cinfo |
Column formatting information
| uint16_t _packet_info::clnp_dstref |
CLNP/COTP destination reference (cannot use dstport to avoid confusion with TPKT)
| uint16_t _packet_info::clnp_srcref |
CLNP/COTP source reference (cannot use srcport to avoid confusion with TPKT)
| struct conversation_addr_port_endpoints* _packet_info::conv_addr_port_endpoints |
Address+port conversation data, including wildcarding
| struct conversation_element* _packet_info::conv_elements |
Arbitrary conversation identifier (cannot be wildcarded)
| uint8_t _packet_info::curr_layer_num |
Current "depth" or layer number in the current frame
| uint8_t _packet_info::curr_proto_layer_num |
Current "depth" or layer number for this dissector in the current frame
| const char* _packet_info::current_proto |
Name of protocol currently being dissected
| GSList* _packet_info::data_src |
Frame data sources
| uint32_t _packet_info::desegment_len |
requested desegmentation additional length or DESEGMENT_ONE_MORE_SEGMENT: Desegment one more full segment (warning! only partially implemented) DESEGMENT_UNTIL_FIN: Desegment all data for this tcp session until the FIN segment.
| int _packet_info::desegment_offset |
Offset to data needing desegmentation
| uint32_t _packet_info::destport |
Destination port
| int _packet_info::dissection_depth |
Current "depth" or layer number in the current frame
| address _packet_info::dl_dst |
Link-layer destination address
| address _packet_info::dl_src |
Link-layer source address
| address _packet_info::dst |
Destination address (network if present, else DL)
| int16_t _packet_info::dst_win_scale |
Rcv.Wind.Shift dst applies when sending segments; -1 unknown; -2 disabled
| struct epan_session* _packet_info::epan |
Pointer to the current epan session context
| uint32_t _packet_info::expert_severity |
Highest expert severity level
| frame_data* _packet_info::fd |
Frame metadata and indexing information
| bool _packet_info::fragmented |
True if the protocol is a fragment
| GSList* _packet_info::frame_end_routines |
List of routines to execute after frame dissection
| const char* _packet_info::heur_list_name |
Name of heuristic list if packet is being heuristically dissected
| uint32_t _packet_info::in_error_pkt |
True if inside an error packet (e.g., ICMP, CLNP)
| uint32_t _packet_info::in_gre_pkt |
True if encapsulated inside a GRE packet
| wmem_list_t* _packet_info::layers |
List of protocol layers
| int _packet_info::link_dir |
Link direction (e.g., 3GPP uplink or downlink)
| uint16_t _packet_info::link_number |
Link-layer interface index
| const char* _packet_info::match_string |
Matched string for calling subdissector from a table
| uint32_t _packet_info::match_uint |
Matched uint for calling subdissector from a table
| address _packet_info::net_dst |
Network-layer destination address
| address _packet_info::net_src |
Network-layer source address
| const char* _packet_info::noreassembly_reason |
Reason why reassembly was not performed, if any
| uint32_t _packet_info::num |
Frame number
| int _packet_info::p2p_dir |
Packet was captured as an outbound (P2P_DIR_SENT) inbound (P2P_DIR_RECV) unknown (P2P_DIR_UNKNOWN)
| wmem_allocator_t* _packet_info::pool |
Memory pool scoped to this pinfo
| uint32_t _packet_info::presence_flags |
Presence flags for some items
| GHashTable* _packet_info::private_table |
Hash table passed between dissectors
| GSList* _packet_info::proto_data |
Per-packet protocol data
| wmem_map_t* _packet_info::proto_layers |
Map from proto_id to curr_proto_layer_num
| union wtap_pseudo_header* _packet_info::pseudo_header |
Capture-specific pseudo header (e.g., Ethernet, 802.11)
| port_type _packet_info::ptype |
Type of the srcport and destport
| wtap_rec* _packet_info::rec |
Record metadata
| nstime_t _packet_info::rel_cap_ts |
Relative timestamp from capture start (may be negative for broken files)
| bool _packet_info::rel_cap_ts_present |
True if relative capture timestamp is valid
| nstime_t _packet_info::rel_ts |
Relative timestamp (can be negative)
| uint16_t _packet_info::saved_can_desegment |
Value of can_desegment before current dissector was called. Supplied so that dissectors for proxy protocols such as SOCKS can restore it, allowing the dissectors that they call to use the TCP dissector's desegmentation (SOCKS just retransmits TCP segments once it's finished setting things up, so the TCP desegmentor can desegment its payload).
| address _packet_info::src |
Source address (network if present, else DL)
| int16_t _packet_info::src_win_scale |
Rcv.Wind.Shift src applies when sending segments; -1 unknown; -2 disabled
| uint32_t _packet_info::srcport |
Source port
| uint32_t _packet_info::stream_id |
Conversation stream ID of the highest protocol
| uint32_t _packet_info::track_ctype |
Tracks the conversation type for these protocols subscribing to an error packet follow-up. Typically transport protocols such as UDP or TCP are likely to be followed up by ICMP.
| bool _packet_info::use_conv_addr_port_endpoints |
True if address/port endpoints should be used for conversations
| uint32_t _packet_info::vlan_id |
First encountered VLAN ID if present, else 0
| uint16_t _packet_info::want_pdu_tracking |
>0 if the subdissector has specified a value in 'bytes_until_next_pdu'. When a dissector detects that the next PDU will start beyond the start of the next segment, it can set this value to 2 and 'bytes_until_next_pdu' to the number of bytes beyond the next segment where the next PDU starts.
If the protocol dissector below this one is capable of PDU tracking it can use this hint to detect PDUs that starts unaligned to the segment boundaries. The TCP dissector is using this hint from (some) protocols to detect when a new PDU starts in the middle of a tcp segment.
There is intelligence in the glue between dissector layers to make sure that this request is only passed down to the protocol immediately below the current one and not any further.