RTPS: Added new Security PIDs in Participant and Endpoint Discovery

Added dissections for the following PIDs:
- PID_PARTICIPANT_SECURITY_DIGITAL_SIGNATURE_ALGO
- PID_PARTICIPANT_SECURITY_KEY_ESTABLISHMENT_ALGO
- PID_PARTICIPANT_SECURITY_SYMMETRIC_CIPHER_ALGO
- PID_ENDPOINT_SECURITY_SYMMETRIC_CIPHER_ALGO
This commit is contained in:
ismaelrti 2022-07-12 12:45:12 +02:00 committed by A Wireshark GitLab Utility
parent 7b56170979
commit 066e80cb33
1 changed files with 296 additions and 3 deletions

View File

@ -430,6 +430,11 @@ static dissector_table_t rtps_type_name_table;
#define PID_DATA_TAGS (0x1003)
#define PID_ENDPOINT_SECURITY_INFO (0x1004)
#define PID_PARTICIPANT_SECURITY_INFO (0x1005)
#define PID_PARTICIPANT_SECURITY_DIGITAL_SIGNATURE_ALGO (0x1006)
#define PID_PARTICIPANT_SECURITY_KEY_ESTABLISHMENT_ALGO (0x1007)
#define PID_PARTICIPANT_SECURITY_SYMMETRIC_CIPHER_ALGO (0x1008)
#define PID_ENDPOINT_SECURITY_SYMMETRIC_CIPHER_ALGO (0x1009)
#define PID_TYPE_OBJECT_LB (0x8021)
/* Vendor-specific: ADLink */
@ -716,6 +721,22 @@ static dissector_table_t rtps_type_name_table;
#define CRYPTO_TRANSFORMATION_KIND_AES256_GMAC (3)
#define CRYPTO_TRANSFORMATION_KIND_AES256_GCM (4)
#define SECURITY_SYMMETRIC_CIPHER_BIT_AES128_GCM 0x00000001
#define SECURITY_SYMMETRIC_CIPHER_BIT_AES256_GCM 0x00000002
#define SECURITY_SYMMETRIC_CIPHER_BIT_CUSTOM_ALGORITHM 0x80000000
#define SECURITY_DIGITAL_SIGNATURE_BIT_RSASSAPSSMGF1SHA256_2048_SHA256 0x00000001
#define SECURITY_DIGITAL_SIGNATURE_BIT_RSASSAPKCS1V15_2048_SHA256 0x00000002
#define SECURITY_DIGITAL_SIGNATURE_BIT_ECDSA_P256_SHA256 0x00000004
#define SECURITY_DIGITAL_SIGNATURE_BIT_ECDSA_P384_SHA384 0x00000008
#define SECURITY_DIGITAL_SIGNATURE_BIT_CUSTOM_ALGORITHM 0x80000000
#define SECURITY_KEY_ESTABLISHMENT_BIT_DHE_MODP2048256 0x00000001
#define SECURITY_KEY_ESTABLISHMENT_BIT_ECDHECEUM_P256 0x00000002
#define SECURITY_KEY_ESTABLISHMENT_BIT_ECDHECEUM_P384 0x00000004
#define SECURITY_KEY_ESTABLISHMENT_BIT_CUSTOM_ALGORITHM 0x80000000
#define TOPIC_INFO_ADD_GUID (0x01)
#define TOPIC_INFO_ADD_TYPE_NAME (0x02)
#define TOPIC_INFO_ADD_TOPIC_NAME (0x04)
@ -1081,6 +1102,7 @@ static int hf_rtps_flag_reserved0200 = -1;
static int hf_rtps_flag_reserved0100 = -1;
static int hf_rtps_flag_reserved0080 = -1;
static int hf_rtps_flag_reserved0040 = -1;
static int hf_rtps_flag_builtin_endpoint_set_reserved = -1;
static int hf_rtps_flag_unregister = -1;
static int hf_rtps_flag_inline_qos_v1 = -1;
@ -1153,7 +1175,29 @@ static int hf_rtps_flag_secure_service_request_reader = -1;
static int hf_rtps_flag_security_access_protected = -1;
static int hf_rtps_flag_security_discovery_protected = -1;
static int hf_rtps_flag_security_submessage_protected = -1;
static int hf_rtps_flag_security_payload_protected = -1;
static int hf_rtps_param_endpoint_security_symmetric_cipher_algorithms_used_bit = -1;
static int hf_rtps_param_participant_security_symmetric_cipher_algorithms_builtin_endpoints_used_bit = -1;
static int hf_rtps_param_participant_security_symmetric_cipher_algorithms_builtin_endpoints_key_exchange_used_bit = -1;
static int hf_rtps_param_participant_security_symmetric_cipher_algorithms_supported_mask = -1;
static int hf_rtps_flag_security_symmetric_cipher_mask_aes128_gcm = -1;
static int hf_rtps_flag_security_symmetric_cipher_mask_aes256_gcm = -1;
static int hf_rtps_flag_security_symmetric_cipher_mask_custom_algorithm = -1;
static int hf_rtps_param_participant_security_digital_signature_algorithms_trust_chain_supported_mask = -1;
static int hf_rtps_param_participant_security_digital_signature_algorithms_trust_chain_used_mask = -1;
static int hf_rtps_param_participant_security_digital_signature_algorithms_auth_supported_mask = -1;
static int hf_rtps_flag_security_digital_signature_mask_rsassapssmgf1sha256_2048_sha256 = -1;
static int hf_rtps_flag_security_digital_signature_mask_rsassapkcs1v15_2048_sha256 = -1;
static int hf_rtps_flag_security_digital_signature_mask_ecdsa_p256_sha256 = -1;
static int hf_rtps_flag_security_digital_signature_mask_ecdsa_p384_sha384 = -1;
static int hf_rtps_flag_security_digital_signature_mask_custom_algorithm = -1;
static int hf_rtps_param_participant_security_key_establishment_algorithms_supported_mask = -1;
static int hf_rtps_param_participant_security_key_establishment_algorithms_preferred_bit = -1;
static int hf_rtps_param_participant_security_digital_signature_algorithms_auth_used_bit = -1;
static int hf_rtps_flag_security_key_establishment_mask_dhe_modp2048256 = -1;
static int hf_rtps_flag_security_key_establishment_mask_ecdheceum_p256 = -1;
static int hf_rtps_flag_security_key_establishment_mask_ecdheceum_p384 = -1;
static int hf_rtps_flag_security_key_establishment_mask_custom_algorithm = -1;
static int hf_rtps_flag_security_payload_protected = -1;
static int hf_rtps_flag_endpoint_security_attribute_flag_is_read_protected = -1;
static int hf_rtps_flag_endpoint_security_attribute_flag_is_write_protected = -1;
static int hf_rtps_flag_endpoint_security_attribute_flag_is_discovery_protected = -1;
@ -1661,6 +1705,10 @@ static const value_string parameter_id_v2_vals[] = {
{ PID_DATA_TAGS, "PID_DATA_TAGS" },
{ PID_ENDPOINT_SECURITY_INFO, "PID_ENDPOINT_SECURITY_INFO" },
{ PID_PARTICIPANT_SECURITY_INFO, "PID_PARTICIPANT_SECURITY_INFO" },
{ PID_PARTICIPANT_SECURITY_DIGITAL_SIGNATURE_ALGO, "PID_PARTICIPANT_SECURITY_DIGITAL_SIGNATURE_ALGO" },
{ PID_PARTICIPANT_SECURITY_KEY_ESTABLISHMENT_ALGO, "PID_PARTICIPANT_SECURITY_KEY_ESTABLISHMENT_ALGO" },
{ PID_PARTICIPANT_SECURITY_SYMMETRIC_CIPHER_ALGO, "PID_PARTICIPANT_SECURITY_SYMMETRIC_CIPHER_ALGO" },
{ PID_ENDPOINT_SECURITY_SYMMETRIC_CIPHER_ALGO, "PID_ENDPOINT_SECURITY_SYMMETRIC_CIPHER_ALGO" },
{ PID_DOMAIN_ID, "PID_DOMAIN_ID" },
{ PID_DOMAIN_TAG, "PID_DOMAIN_TAG" },
{ PID_GROUP_COHERENT_SET, "PID_GROUP_COHERENT_SET" },
@ -1871,6 +1919,31 @@ static const value_string acknowledgement_kind_vals[] = {
{ 0, NULL }
};
static const value_string security_symmetric_cipher_bit_vals[] = {
{ SECURITY_SYMMETRIC_CIPHER_BIT_AES128_GCM, "AES128_GCM"},
{ SECURITY_SYMMETRIC_CIPHER_BIT_AES256_GCM, "AES256_GCM"},
{ SECURITY_SYMMETRIC_CIPHER_BIT_CUSTOM_ALGORITHM, "Custom Algorithm"},
{0, NULL}
};
static const value_string security_digital_signature_bit_vals[] = {
{ SECURITY_DIGITAL_SIGNATURE_BIT_RSASSAPSSMGF1SHA256_2048_SHA256, "RSASSAPSSMGF1SHA256_2048_SHA256"},
{ SECURITY_DIGITAL_SIGNATURE_BIT_RSASSAPKCS1V15_2048_SHA256, "RSASSAPKCS1V15_2048_SHA256"},
{ SECURITY_DIGITAL_SIGNATURE_BIT_ECDSA_P256_SHA256, "ECDSA_P256_SHA256"},
{ SECURITY_DIGITAL_SIGNATURE_BIT_ECDSA_P384_SHA384, "ECDSA_P384_SHA384"},
{ SECURITY_DIGITAL_SIGNATURE_BIT_CUSTOM_ALGORITHM, "Custom Algorithm"},
{ 0, NULL}
};
static const value_string security_key_establishment_bit_vals[] = {
{ SECURITY_KEY_ESTABLISHMENT_BIT_DHE_MODP2048256, "DHE_MODP2048256" },
{ SECURITY_KEY_ESTABLISHMENT_BIT_ECDHECEUM_P256, "ECDHECEUM_P256" },
{ SECURITY_KEY_ESTABLISHMENT_BIT_ECDHECEUM_P384, "ECDHECEUM_P384" },
{ SECURITY_KEY_ESTABLISHMENT_BIT_CUSTOM_ALGORITHM, "Custom Algorithm" },
{ 0, NULL}
};
static int* const TYPE_FLAG_FLAGS[] = {
&hf_rtps_flag_typeflag_nested, /* Bit 2 */
&hf_rtps_flag_typeflag_mutable, /* Bit 1 */
@ -2394,6 +2467,32 @@ static int* const ENDPOINT_SECURITY_ATTRIBUTES[] = {
NULL
};
static int* const SECURITY_SIMMETRIC_CIPHER_MASK_FLAGS[] = {
&hf_rtps_flag_security_symmetric_cipher_mask_custom_algorithm,
&hf_rtps_flag_security_symmetric_cipher_mask_aes256_gcm,
&hf_rtps_flag_security_symmetric_cipher_mask_aes128_gcm,
NULL
};
static int* const SECURITY_KEY_ESTABLISHMENT_MASK_FLAGS[] = {
&hf_rtps_flag_security_key_establishment_mask_custom_algorithm,
&hf_rtps_flag_security_key_establishment_mask_ecdheceum_p384,
&hf_rtps_flag_security_key_establishment_mask_ecdheceum_p256,
&hf_rtps_flag_security_key_establishment_mask_dhe_modp2048256,
NULL
};
static int* const SECURITY_DIGITAL_SIGNATURE_MASK_FLAGS[] = {
&hf_rtps_flag_security_digital_signature_mask_custom_algorithm,
&hf_rtps_flag_security_digital_signature_mask_ecdsa_p384_sha384,
&hf_rtps_flag_security_digital_signature_mask_ecdsa_p256_sha256,
&hf_rtps_flag_security_digital_signature_mask_rsassapkcs1v15_2048_sha256,
&hf_rtps_flag_security_digital_signature_mask_rsassapssmgf1sha256_2048_sha256,
NULL
};
/**TCP get DomainId feature constants**/
#define RTPS_UNKNOWN_DOMAIN_ID_VAL -1
#define RTPS_UNKNOWN_DOMAIN_ID_STR "Unknown"
@ -7118,6 +7217,102 @@ static gboolean dissect_parameter_sequence_rti_dds(proto_tree *rtps_parameter_tr
break;
}
case PID_ENDPOINT_SECURITY_SYMMETRIC_CIPHER_ALGO: {
ENSURE_LENGTH(4);
proto_tree_add_item(
rtps_parameter_tree,
hf_rtps_param_endpoint_security_symmetric_cipher_algorithms_used_bit,
tvb,
offset,
4,
encoding);
break;
}
case PID_PARTICIPANT_SECURITY_SYMMETRIC_CIPHER_ALGO: {
ENSURE_LENGTH(12);
proto_tree_add_bitmask(
rtps_parameter_tree,
tvb,
offset,
hf_rtps_param_participant_security_symmetric_cipher_algorithms_supported_mask,
ett_rtps_flags,
SECURITY_SIMMETRIC_CIPHER_MASK_FLAGS,
encoding);
offset += 4;
proto_tree_add_item(
rtps_parameter_tree,
hf_rtps_param_participant_security_symmetric_cipher_algorithms_builtin_endpoints_used_bit,
tvb,
offset,
4,
encoding);
offset += 4;
proto_tree_add_item(
rtps_parameter_tree,
hf_rtps_param_participant_security_symmetric_cipher_algorithms_builtin_endpoints_key_exchange_used_bit,
tvb,
offset,
4,
encoding);
break;
}
case PID_PARTICIPANT_SECURITY_KEY_ESTABLISHMENT_ALGO: {
ENSURE_LENGTH(8);
proto_tree_add_bitmask(
rtps_parameter_tree,
tvb,
offset,
hf_rtps_param_participant_security_key_establishment_algorithms_supported_mask,
ett_rtps_flags, SECURITY_KEY_ESTABLISHMENT_MASK_FLAGS,
encoding);
offset += 4;
proto_tree_add_item(
rtps_parameter_tree,
hf_rtps_param_participant_security_key_establishment_algorithms_preferred_bit,
tvb, offset,
4,
encoding);
break;
}
case PID_PARTICIPANT_SECURITY_DIGITAL_SIGNATURE_ALGO: {
ENSURE_LENGTH(16);
proto_tree_add_bitmask(
rtps_parameter_tree,
tvb,
offset,
hf_rtps_param_participant_security_digital_signature_algorithms_trust_chain_supported_mask,
ett_rtps_flags, SECURITY_DIGITAL_SIGNATURE_MASK_FLAGS,
encoding);
offset += 4;
proto_tree_add_bitmask(
rtps_parameter_tree,
tvb,
offset,
hf_rtps_param_participant_security_digital_signature_algorithms_trust_chain_used_mask,
ett_rtps_flags, SECURITY_DIGITAL_SIGNATURE_MASK_FLAGS,
encoding);
offset += 4;
proto_tree_add_bitmask(
rtps_parameter_tree,
tvb,
offset,
hf_rtps_param_participant_security_digital_signature_algorithms_auth_supported_mask,
ett_rtps_flags, SECURITY_DIGITAL_SIGNATURE_MASK_FLAGS,
encoding);
offset += 4;
proto_tree_add_item(
rtps_parameter_tree,
hf_rtps_param_participant_security_digital_signature_algorithms_auth_used_bit,
tvb,
offset,
4,
encoding);
break;
}
default: {
return FALSE;
}
@ -15124,13 +15319,111 @@ void proto_register_rtps(void) {
{ &hf_rtps_param_endpoint_security_attributes_mask,{
"EndpointSecurityAttributesMask", "rtps.param.endpoint_security_attributes",
FT_UINT32, BASE_HEX, NULL, 0,
"bitmask representing the EndpointSecurityAttributes flags in PID_ENDPOINT_SECURITY_INFO",
"Bitmask representing the EndpointSecurityAttributes flags in PID_ENDPOINT_SECURITY_INFO",
HFILL }
},
{ &hf_rtps_flag_plugin_endpoint_security_attribute_flag_is_payload_encrypted,{
{ &hf_rtps_param_participant_security_symmetric_cipher_algorithms_builtin_endpoints_used_bit, {
"Builtin Endpoints Used Bit", "rtps.param.participant_security_symmetric_cipher_algorithms.builtin_endpoints_used_bit",
FT_UINT32, BASE_HEX, VALS(security_symmetric_cipher_bit_vals), 0,
"Enum representing the Symmetric Cipher algorithm the builtin endpoints use",
HFILL }
},
{ &hf_rtps_param_endpoint_security_symmetric_cipher_algorithms_used_bit, {
"Used Bit", "rtps.param.endpoint_security_symmetric_cipher_algorithm.used_bit",
FT_UINT32, BASE_HEX, VALS(security_symmetric_cipher_bit_vals), 0,
"Enum representing the Symmetric Cipher algorithm the endpoint uses",
HFILL }
},
{ &hf_rtps_param_participant_security_symmetric_cipher_algorithms_builtin_endpoints_key_exchange_used_bit, {
"Key Exchange Builtin Endpoints Used Bit", "rtps.param.participant_security_symmetric_cipher_algorithms.builtin_endpoints_key_exchange_used_bit",
FT_UINT32, BASE_HEX, VALS(security_symmetric_cipher_bit_vals), 0,
"Enum representing the Symmetric Cipher algorithm the key exchange builtin endpoints use",
HFILL }
},
{ &hf_rtps_param_participant_security_symmetric_cipher_algorithms_supported_mask, {
"Supported Mask", "rtps.param.participant_security_symmetric_cipher_algorithms.supported_mask",
FT_UINT32, BASE_HEX, 0, 0, "Bitmask representing Symmetric Cipher algorithms the participant supports",
HFILL }
},
{ &hf_rtps_flag_security_symmetric_cipher_mask_aes128_gcm, {
"AES128 GCM", "rtps.flag.security_symmetric_cipher_mask.aes128_gcm",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_SYMMETRIC_CIPHER_BIT_AES128_GCM, NULL, HFILL }
},
{ &hf_rtps_flag_security_symmetric_cipher_mask_aes256_gcm, {
"AES256 GCM", "rtps.flag.security_symmetric_cipher_mask.aes256_gcm",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_SYMMETRIC_CIPHER_BIT_AES256_GCM, NULL, HFILL }
},
{ &hf_rtps_flag_security_symmetric_cipher_mask_custom_algorithm, {
"Custom Algorithm", "rtps.flag.security_symmetric_cipher_mask.custom_algorithm",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_SYMMETRIC_CIPHER_BIT_CUSTOM_ALGORITHM, NULL, HFILL }
},
{ &hf_rtps_param_participant_security_key_establishment_algorithms_preferred_bit, {
"Preferred Bit", "rtps.param.participant_security_key_establishment_algorithms.preferred_bit",
FT_UINT32, BASE_HEX, VALS(security_key_establishment_bit_vals), 0,
"Enum representing the Key Establishment algorithm the participant will use if it is the authentication initiator", HFILL }
},
{ &hf_rtps_param_participant_security_digital_signature_algorithms_auth_used_bit, {
"Authentication Used Bit", "rtps.articipant_security_digital_signature_algorithms.auth_used_bit",
FT_UINT32, BASE_HEX, VALS(security_digital_signature_bit_vals), 0,
"Enum representing the Digital Signature algorithm the participant will use during Authentication", HFILL }
},
{ &hf_rtps_param_participant_security_key_establishment_algorithms_supported_mask, {
"Supported Mask", "rtps.param.participant_security_key_establishment_algorithms.supported_mask",
FT_UINT32, BASE_HEX, 0, 0, "Bitmask representing the Key Establishment algorithms the participant supports",
HFILL }
},
{ &hf_rtps_flag_security_key_establishment_mask_dhe_modp2048256, {
"DHE_MODP2048256", "rtps.flag.security_key_establishment_mask.dhe_modp2048256",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_KEY_ESTABLISHMENT_BIT_DHE_MODP2048256, NULL, HFILL }
},
{ &hf_rtps_flag_security_key_establishment_mask_ecdheceum_p256, {
"ECDHECEUM_P256", "rtps.flag.security_key_establishment_mask.ecdheceum_p256",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_KEY_ESTABLISHMENT_BIT_ECDHECEUM_P256, NULL, HFILL }
},
{ &hf_rtps_flag_security_key_establishment_mask_ecdheceum_p384, {
"ECDHECEUM_P384", "rtps.flag.security_key_establishment_mask.ecdheceum_p384",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_KEY_ESTABLISHMENT_BIT_ECDHECEUM_P384, NULL, HFILL }
},
{ &hf_rtps_flag_security_key_establishment_mask_custom_algorithm, {
"Custom Algorithm", "rtps.flag.security_key_establishment_mask.custom_algorithm",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_KEY_ESTABLISHMENT_BIT_CUSTOM_ALGORITHM, NULL, HFILL }
},
{ &hf_rtps_flag_plugin_endpoint_security_attribute_flag_is_payload_encrypted, {
"Submessage Encrypted", "rtps.flag.security.info.plugin_submessage_encrypted",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), 0x00000001, NULL, HFILL }
},
{ &hf_rtps_param_participant_security_digital_signature_algorithms_trust_chain_supported_mask, {
"Trust Chain Supported Mask", "rtps.param.participant_security_digital_signature_algorithms.trust_chain_supported_mask",
FT_UINT32, BASE_HEX, 0, 0, "Bitmask representing the Trust Chain Digital Signature algorithms the participant supports", HFILL }
},
{ &hf_rtps_param_participant_security_digital_signature_algorithms_trust_chain_used_mask, {
"Trust Chain Used Mask", "rtps.param.participant_security_digital_signature_algorithms.trust_chain_used_mask",
FT_UINT32, BASE_HEX, 0, 0, "Bitmask representing the Digital Signature algorithms the participant will use to build its Trust Chain", HFILL }
},
{ &hf_rtps_param_participant_security_digital_signature_algorithms_auth_supported_mask, {
"Authentication Supported Mask", "rtps.param.participant_security_digital_signature_algorithms.auth_supported_mask",
FT_UINT32, BASE_HEX, 0, 0, "Bitmask representing the Authentication Digital Signature algorithms the participant supports", HFILL }
},
{ &hf_rtps_flag_security_digital_signature_mask_rsassapssmgf1sha256_2048_sha256, {
"RSASSAPSSMGF1SHA256_2048_SHA256", "rtps.flag.security_digital_signature_mask.rsassapssmgf1sha256_2048_sha256",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_DIGITAL_SIGNATURE_BIT_RSASSAPSSMGF1SHA256_2048_SHA256, NULL, HFILL }
},
{ &hf_rtps_flag_security_digital_signature_mask_rsassapkcs1v15_2048_sha256, {
"RSASSAPKCS1V15_2048_SHA256", "rtps.flag.security_digital_signature_mask.rsassapkcs1v15_2048_sha256",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_DIGITAL_SIGNATURE_BIT_RSASSAPKCS1V15_2048_SHA256, NULL, HFILL }
},
{ &hf_rtps_flag_security_digital_signature_mask_ecdsa_p256_sha256, {
"ECDSA_P256_SHA256", "rtps.flag.security_digital_signature_mask.ecdsa_p256_sha256",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_DIGITAL_SIGNATURE_BIT_ECDSA_P256_SHA256, NULL, HFILL }
},
{ &hf_rtps_flag_security_digital_signature_mask_ecdsa_p384_sha384, {
"ECDSA_P384_SHA384", "rtps.flag.security_digital_signature_mask.ecdsa_p384_sha384",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_DIGITAL_SIGNATURE_BIT_ECDSA_P384_SHA384, NULL, HFILL }
},
{ &hf_rtps_flag_security_digital_signature_mask_custom_algorithm, {
"Custom Algorithm", "rtps.flag.security_digital_signature_mask.custom_algorithm",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), SECURITY_DIGITAL_SIGNATURE_BIT_CUSTOM_ALGORITHM, NULL, HFILL }
},
{ &hf_rtps_flag_plugin_endpoint_security_attribute_flag_is_key_encrypted,{
"Payload Encrypted", "rtps.flag.security.info.plugin_payload_encrypted",
FT_BOOLEAN, 32, TFS(&tfs_set_notset), 0x00000002, NULL, HFILL }