diff --git a/docbook/release-notes.asciidoc b/docbook/release-notes.asciidoc index 86051b4b71..f972ec16d2 100644 --- a/docbook/release-notes.asciidoc +++ b/docbook/release-notes.asciidoc @@ -65,6 +65,8 @@ CP ``Cooper'' 2179 S7 Communication KNXnetIP Dynamic Source Routing (RFC 4728) +MCPE (Minecraft Pocket Edition) +RakNet games library (LISP) TCP Control Message --sort-and-group-- diff --git a/epan/CMakeLists.txt b/epan/CMakeLists.txt index 5ef63ec334..59aa102939 100644 --- a/epan/CMakeLists.txt +++ b/epan/CMakeLists.txt @@ -939,6 +939,7 @@ set(DISSECTOR_SRC dissectors/packet-mausb.c dissectors/packet-mbim.c dissectors/packet-mbtcp.c + dissectors/packet-mcpe.c dissectors/packet-mdshdr.c dissectors/packet-media.c dissectors/packet-megaco.c @@ -1131,6 +1132,7 @@ set(DISSECTOR_SRC dissectors/packet-quic.c dissectors/packet-radius.c dissectors/packet-radius_packetcable.c + dissectors/packet-raknet.c dissectors/packet-raw.c dissectors/packet-rdm.c dissectors/packet-rdp.c diff --git a/epan/dissectors/Makefile.common b/epan/dissectors/Makefile.common index 8430605b55..3735f22eff 100644 --- a/epan/dissectors/Makefile.common +++ b/epan/dissectors/Makefile.common @@ -140,6 +140,7 @@ ASN1_DISSECTOR_SRC = \ packet-lppa.c \ packet-lppe.c \ packet-lte-rrc.c \ + packet-mcpe.c \ packet-mms.c \ packet-mpeg-audio.c \ packet-mpeg-pes.c \ @@ -164,6 +165,7 @@ ASN1_DISSECTOR_SRC = \ packet-q932.c \ packet-q932-ros.c \ packet-qsig.c \ + packet-raknet.c \ packet-ranap.c \ packet-ros.c \ packet-rrc.c \ diff --git a/epan/dissectors/packet-mcpe.c b/epan/dissectors/packet-mcpe.c new file mode 100644 index 0000000000..495f529877 --- /dev/null +++ b/epan/dissectors/packet-mcpe.c @@ -0,0 +1,402 @@ +/* + * packet-mcpe.c + * + * Routines for Minecraft Pocket Edition protocol packet disassembly. + * + * Nick Carter + * Copyright 2014 Nick Carter + * + * Using info found at: + * http://wiki.vg/Pocket_Minecraft_Protocol#Packet_Encapsulation + * + * Wireshark - Network traffic analyzer + * By Gerald Combs + * Copyright 1998 Gerald Combs + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + */ +#include "config.h" +#include +#include + +#define MCPE_UDP_PORT_DEFAULT 19132 +static guint mcpe_udp_port_requested = MCPE_UDP_PORT_DEFAULT; + +static int proto_mcpe = -1; +static gint ett_mcpe = -1; /* Should this node be expanded */ +static dissector_handle_t raknet_dissector = NULL; + + +/* + * First byte gives us the packet id + */ +static int hf_mcpe_packet_id = -1; + +/* + * Custom payload encoding header. + */ +static int hf_mcpe_payload_encoding = -1; +static int hf_mcpe_general_packet_number = -1; +static int hf_mcpe_general_packet_payload = -1; +static int hf_mcpe_general_packet_payload_length = -1; +static int hf_mcpe_general_packet_payload_count = -1; + +/* + * Fields specific to a packet id type. + */ +static int hf_mcpe_0xC0_unknown = -1; +static int hf_mcpe_0xC0_single_packet = -1; + +/* + * Forward declarations. + */ +void proto_register_mcpe(void); +void proto_reg_handoff_mcpe(void); + +static void +mcpe_dissect_detail_0xA0(tvbuff_t *tvb, proto_tree *raknet_tree, gint offset) +{ + gboolean single_packet; + gint item_size; + + item_size = 2; + proto_tree_add_item(raknet_tree, hf_mcpe_0xC0_unknown, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + single_packet = (tvb_get_guint8(tvb, offset) != 0); + item_size = 1; + proto_tree_add_item(raknet_tree, hf_mcpe_0xC0_single_packet, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 3; + proto_tree_add_item(raknet_tree, hf_mcpe_general_packet_number, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + if (!single_packet) { + item_size = 3; + proto_tree_add_item(raknet_tree, hf_mcpe_general_packet_number, tvb, + offset, item_size, ENC_BIG_ENDIAN); + offset += item_size; + } +} + +/* + * offset is updated for use by the caller. + */ +static void +mcpe_dissect_detail_payload_0x00(tvbuff_t *tvb, proto_tree *mcpe_tree, + gint *offset) +{ + gint item_size; + + item_size = 2; + proto_tree_add_item(mcpe_tree, hf_mcpe_general_packet_payload_length, tvb, + *offset, item_size, ENC_BIG_ENDIAN); + *offset += item_size; +} + +/* + * offset is updated for use by the caller. + */ +static void +mcpe_dissect_detail_payload_0x40(tvbuff_t *tvb, proto_tree *mcpe_tree, + gint *offset) +{ + gint item_size; + + item_size = 2; + proto_tree_add_item(mcpe_tree, hf_mcpe_general_packet_payload_length, tvb, + *offset, item_size, ENC_BIG_ENDIAN); + *offset += item_size; + + item_size = 3; + proto_tree_add_item(mcpe_tree, hf_mcpe_general_packet_payload_count, tvb, + *offset, item_size, ENC_BIG_ENDIAN); + *offset += item_size; +} + +static void +mcpe_dissect_detail_payload(tvbuff_t *tvb, proto_tree *mcpe_tree, gint offset) +{ + gint payload_encoding; + gint item_size; + + item_size = 3; + proto_tree_add_item(mcpe_tree, hf_mcpe_general_packet_number, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + payload_encoding = tvb_get_guint8(tvb, offset); + + item_size = 1; + proto_tree_add_item(mcpe_tree, hf_mcpe_payload_encoding, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + switch (payload_encoding) { + case 0x00: + mcpe_dissect_detail_payload_0x00(tvb, mcpe_tree, &offset); + break; + case 0x40: + case 0x50: + case 0x60: + /* + * 0x50 and 0x60 contain extra fields before the payload. These fields + * are currently unknown, so just use 0x40 for a correct partial + * dissection. + */ + mcpe_dissect_detail_payload_0x40(tvb, mcpe_tree, &offset); + break; + default: + break; + } + + item_size = -1; /* Read to end of buffer */ + proto_tree_add_item(mcpe_tree, hf_mcpe_general_packet_payload, tvb, offset, + item_size, ENC_NA); +} + +/* + * Common MCPE packet data + */ +static proto_tree * +mcpe_info(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gint *offset) +{ + const char *packet_desc; + guint8 packet_id; + proto_tree *sub_tree; + proto_item *ti; + + col_set_str(pinfo->cinfo, COL_PROTOCOL, "MCPE"); + col_clear(pinfo->cinfo, COL_INFO); + + /* + * Take buffer start 0 to end -1 as single mcpe item. + */ + ti = proto_tree_add_item(tree, proto_mcpe, tvb, 0, -1, ENC_NA); + sub_tree = proto_item_add_subtree(ti, ett_mcpe); + + packet_id = tvb_get_guint8(tvb, *offset); + proto_tree_add_item(sub_tree, hf_mcpe_packet_id, tvb, *offset, + 1, ENC_BIG_ENDIAN); + *offset += 1; + + switch (packet_id) { + case 0xA0: + packet_desc = " (NACK)"; + break; + case 0xC0: + packet_desc = " (ACK)"; + break; + default: + packet_desc = ""; + break; + } + col_add_fstr(pinfo->cinfo, COL_INFO, "Type %#x%s", packet_id, packet_desc); + + proto_item_append_text(ti, ", Packet id %#x", packet_id); + + return sub_tree; +} + +static int +mcpe_dissect(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint offset; + + offset = 0; + sub_tree = mcpe_info(tvb, pinfo, tree, &offset); + if (sub_tree != NULL) { + mcpe_dissect_detail_payload(tvb, sub_tree, offset); + } + return tvb_reported_length(tvb); +} + +static int +mcpe_dissect_0xA0(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint offset; + + offset = 0; + sub_tree = mcpe_info(tvb, pinfo, tree, &offset); + if (sub_tree != NULL) { + mcpe_dissect_detail_0xA0(tvb, sub_tree, offset); + } + return tvb_reported_length(tvb); +} + +static int +mcpe_dissect_0xC0(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint offset; + + offset = 0; + sub_tree = mcpe_info(tvb, pinfo, tree, &offset); + if (sub_tree != NULL) { + mcpe_dissect_detail_0xA0(tvb, sub_tree, offset); /* 0xA0 */ + } + return tvb_reported_length(tvb); +} + +void +proto_register_mcpe(void) +{ + /* + * Arrays for detailed dissection, controls output formatting. + */ + static hf_register_info hf[] = { + { &hf_mcpe_packet_id, + { "MCPE Packet ID", "mcpe.type", + FT_UINT8, BASE_HEX, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_mcpe_payload_encoding, + { "MCPE Payload encoding", "mcpe.payload_encoding", + FT_UINT8, BASE_HEX, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_mcpe_general_packet_number, + { "MCPE Packet number", "mcpe.packet_number", + FT_UINT24, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_mcpe_general_packet_payload, + { "MCPE Packet Payload", "mcpe.packet_payload", + FT_BYTES, BASE_NONE, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_mcpe_general_packet_payload_length, + { "MCPE Payload length in *bits*", "mcpe.payload_length_bits", + FT_UINT16, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_mcpe_general_packet_payload_count, + { "MCPE Packet payload count", "mcpe.payload_count", + FT_UINT24, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + /* + * Packet ID 0xC0 + */ + { &hf_mcpe_0xC0_unknown, + { "MCPE Unknown field", "mcpe.unknown", + FT_UINT8, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_mcpe_0xC0_single_packet, + { "MCPE single packet (boolean)", "mcpe.single_packet", + FT_UINT8, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + } + }; + + /* + * Setup protocol subtree array + */ + static gint *ett[] = { + &ett_mcpe, + }; + module_t *mcpe_module; + + /* + * Register the protocol with wireshark. + */ + proto_mcpe = proto_register_protocol ( + "Minecraft Pocket Edition", /* name */ + "MCPE", /* short name */ + "mcpe" /* abbrev */ + ); + + /* + * Register detailed diessection arrays. + */ + proto_register_field_array(proto_mcpe, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); + + /* Register a configuration option for UDP port */ + mcpe_module = prefs_register_protocol(proto_mcpe, + proto_reg_handoff_mcpe); + prefs_register_uint_preference(mcpe_module, "udp.port", + "MCPE Server UDP Port", + "Set the UDP port for the MCPE Server", + 10, &mcpe_udp_port_requested); +} + +void +proto_reg_handoff_mcpe(void) +{ + dissector_handle_t mcpe_gen_handle; + static guint last_server_port; + static gboolean init_done = FALSE; + + if (init_done) { + /* + * Just delete the dissector before the new add. + */ + dissector_delete_uint("udp.port", last_server_port, raknet_dissector); + } else { + /* + * First time, create dissector handle, and find raknet dissector. + */ + init_done = TRUE; + raknet_dissector = find_dissector("raknet"); + + mcpe_gen_handle = new_create_dissector_handle(mcpe_dissect, proto_mcpe); + dissector_add_uint("raknet.packet_id", 0x80, mcpe_gen_handle); + dissector_add_uint("raknet.packet_id", 0x84, mcpe_gen_handle); + dissector_add_uint("raknet.packet_id", 0x88, mcpe_gen_handle); + dissector_add_uint("raknet.packet_id", 0x8C, mcpe_gen_handle); + dissector_add_uint("raknet.packet_id", 0xA0, + new_create_dissector_handle(mcpe_dissect_0xA0, + proto_mcpe)); + dissector_add_uint("raknet.packet_id", 0xC0, + new_create_dissector_handle(mcpe_dissect_0xC0, + proto_mcpe)); + } + + last_server_port = mcpe_udp_port_requested; + + /* MCPE is the protocol that carries RakNet packets over UDP */ + dissector_add_uint("udp.port", mcpe_udp_port_requested, raknet_dissector); +} +/* + * Editor modelines + * + * Local Variables: + * c-basic-offset: 4 + * tab-width: 8 + * indent-tabs-mode: nil + * End: + * + * ex: set shiftwidth=4 tabstop=8 expandtab: + * :indentSize=4:tabSize=8:noTabs=true: + */ diff --git a/epan/dissectors/packet-raknet.c b/epan/dissectors/packet-raknet.c new file mode 100644 index 0000000000..7c97df1c26 --- /dev/null +++ b/epan/dissectors/packet-raknet.c @@ -0,0 +1,676 @@ +/* + * packet-raknet.c + * + * Routines for RakNet protocol packet disassembly. + * + * Ref: https://github.com/OculusVR/RakNet + * + * Nick Carter + * Copyright 2014 Nick Carter + * + * Wireshark - Network traffic analyzer + * By Gerald Combs + * Copyright 1998 Gerald Combs + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation; either version 2 + * of the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + */ +#include "config.h" +#include +#include + +/* + * RAKNET Protocol Constants. + */ +#define RAKNET_MAGIC 0x00ffff00fefefefefdfdfdfd12345678 +#define RAKNET_SECURITY_AND_COOKIE 0x043f57fefd + +static int proto_raknet = -1; +static gint ett_raknet = -1; /* Should this node be expanded */ + +/* + * Dissectors + */ +static dissector_table_t raknet_dissector_table; +static expert_field ei_raknet_uknown_id = EI_INIT; + +/* + * First byte gives us the packet id + */ +static int hf_raknet_packet_id = -1; + +/* + * General fields (fields that are in >1 packet types. + */ +static int hf_raknet_general_client_id = -1; +static int hf_raknet_general_elapsed_time = -1; +static int hf_raknet_general_magic = -1; +static int hf_raknet_general_mtu_size = -1; +static int hf_raknet_general_raknet_proto_ver = -1; +static int hf_raknet_general_security = -1; +static int hf_raknet_general_server_id = -1; +static int hf_raknet_general_udp_port = -1; +/* + * Fields specific to a packet id type + */ +static int hf_raknet_0x05_null_padding = -1; +static int hf_raknet_0x06_server_security = -1; +static int hf_raknet_0x07_cookie = -1; +static int hf_raknet_0x1C_server_id_str_len = -1; +static int hf_raknet_0x1C_server_id_str = -1; + +/* + * Forward declaration. + */ +void proto_register_raknet(void); +void proto_reg_handoff_raknet(void); +static proto_tree* init_raknet(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gint *offset); + + +struct raknet_handler_entry { + value_string vs; + new_dissector_t dissector_fp; +}; + +static int +raknet_dissect_0x00(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint item_size; + gint offset; + + sub_tree = init_raknet(tvb, pinfo, tree, &offset); + + if (sub_tree != NULL) { + + item_size = 8; + proto_tree_add_item(sub_tree, hf_raknet_general_elapsed_time, tvb, + offset, item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 16; + proto_tree_add_item(sub_tree, hf_raknet_general_magic, tvb, offset, + item_size, ENC_NA); + } + return tvb_reported_length(tvb); +} + +static int +raknet_dissect_0x01(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint item_size; + gint offset; + + sub_tree = init_raknet(tvb, pinfo, tree, &offset); + + if (sub_tree != NULL) { + + item_size = 8; + proto_tree_add_item(sub_tree, hf_raknet_general_elapsed_time, tvb, + offset, item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 16; + proto_tree_add_item(sub_tree, hf_raknet_general_magic, tvb, offset, + item_size, ENC_NA); + } + return tvb_reported_length(tvb); +} + +static int +raknet_dissect_0x02(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint item_size; + gint offset; + + sub_tree = init_raknet(tvb, pinfo, tree, &offset); + + if (sub_tree != NULL) { + + item_size = 8; + proto_tree_add_item(sub_tree, hf_raknet_general_elapsed_time, tvb, + offset, item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 16; + proto_tree_add_item(sub_tree, hf_raknet_general_magic, tvb, offset, + item_size, ENC_NA); + } + return tvb_reported_length(tvb); +} + +static int +raknet_dissect_0x05(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint item_size; + gint offset; + + sub_tree = init_raknet(tvb, pinfo, tree, &offset); + + if (sub_tree != NULL) { + + item_size = 16; + proto_tree_add_item(sub_tree, hf_raknet_general_magic, tvb, offset, + item_size, ENC_NA); + offset += item_size; + + item_size = 1; + proto_tree_add_item(sub_tree, hf_raknet_general_raknet_proto_ver, tvb, + offset, item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = -1; /* -1 read to end of tvb buffer */ + proto_tree_add_item(sub_tree, hf_raknet_0x05_null_padding, tvb, offset, + item_size, ENC_NA); + } + return tvb_reported_length(tvb); +} + +static int +raknet_dissect_0x06(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint item_size; + gint offset; + + sub_tree = init_raknet(tvb, pinfo, tree, &offset); + + if (sub_tree != NULL) { + + item_size = 16; + proto_tree_add_item(sub_tree, hf_raknet_general_magic, tvb, offset, + item_size, ENC_NA); + offset += item_size; + + item_size = 8; + proto_tree_add_item(sub_tree, hf_raknet_general_server_id, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 1; + proto_tree_add_item(sub_tree, hf_raknet_0x06_server_security, tvb, + offset, item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 2; + proto_tree_add_item(sub_tree, hf_raknet_general_mtu_size, tvb, offset, + item_size, ENC_BIG_ENDIAN); + } + return tvb_reported_length(tvb); +} + +static int +raknet_dissect_0x07(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint item_size; + gint offset; + + sub_tree = init_raknet(tvb, pinfo, tree, &offset); + + if (sub_tree != NULL) { + + item_size = 16; + proto_tree_add_item(sub_tree, hf_raknet_general_magic, tvb, offset, + item_size, ENC_NA); + offset += item_size; + + item_size = 1; + proto_tree_add_item(sub_tree, hf_raknet_general_security, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 4; + proto_tree_add_item(sub_tree, hf_raknet_0x07_cookie, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 2; + proto_tree_add_item(sub_tree, hf_raknet_general_udp_port, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 2; + proto_tree_add_item(sub_tree, hf_raknet_general_mtu_size, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 8; + proto_tree_add_item(sub_tree, hf_raknet_general_client_id, tvb, offset, + item_size, ENC_BIG_ENDIAN); + } + return tvb_reported_length(tvb); +} + +static int +raknet_dissect_0x08(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint item_size; + gint offset; + + sub_tree = init_raknet(tvb, pinfo, tree, &offset); + + if (sub_tree != NULL) { + + item_size = 16; + proto_tree_add_item(sub_tree, hf_raknet_general_magic, tvb, offset, + item_size, ENC_NA); + offset += item_size; + + item_size = 8; + proto_tree_add_item(sub_tree, hf_raknet_general_server_id, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 1; + proto_tree_add_item(sub_tree, hf_raknet_general_security, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 4; + proto_tree_add_item(sub_tree, hf_raknet_0x07_cookie, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 2; + proto_tree_add_item(sub_tree, hf_raknet_general_udp_port, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 2; + proto_tree_add_item(sub_tree, hf_raknet_general_mtu_size, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 1; + proto_tree_add_item(sub_tree, hf_raknet_general_security, tvb, offset, + item_size, ENC_BIG_ENDIAN); + } + return tvb_reported_length(tvb); +} + +static int +raknet_dissect_0x19(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint item_size; + gint offset; + + sub_tree = init_raknet(tvb, pinfo, tree, &offset); + + if (sub_tree != NULL) { + + item_size = 1; + proto_tree_add_item(sub_tree, hf_raknet_general_raknet_proto_ver, tvb, + offset, item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 16; + proto_tree_add_item(sub_tree, hf_raknet_general_magic, tvb, offset, + item_size, ENC_NA); + offset += item_size; + + item_size = 8; + proto_tree_add_item(sub_tree, hf_raknet_general_server_id, tvb, offset, + item_size, ENC_BIG_ENDIAN); + } + return tvb_reported_length(tvb); +} + +static int +raknet_dissect_0x1C(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, + void *data _U_) +{ + proto_tree *sub_tree; + gint item_size; + gint str_size; + gint offset; + + sub_tree = init_raknet(tvb, pinfo, tree, &offset); + + if (sub_tree != NULL) { + + item_size = 8; + proto_tree_add_item(sub_tree, hf_raknet_general_elapsed_time, tvb, + offset, item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 8; + proto_tree_add_item(sub_tree, hf_raknet_general_server_id, tvb, offset, + item_size, ENC_BIG_ENDIAN); + offset += item_size; + + item_size = 16; + proto_tree_add_item(sub_tree, hf_raknet_general_magic, tvb, offset, + item_size, ENC_NA); + offset += item_size; + + /* raknet precedes strings with a short (2 bytes) holding string length. */ + str_size = tvb_get_ntohs(tvb, offset); + item_size = 2; + proto_tree_add_item(sub_tree, hf_raknet_0x1C_server_id_str_len, tvb, + offset, item_size, ENC_BIG_ENDIAN); + offset += item_size; + + proto_tree_add_item(sub_tree, hf_raknet_0x1C_server_id_str, tvb, offset, + str_size, ENC_NA|ENC_ASCII); + } + return tvb_reported_length(tvb); +} + +/* + * Protocol definition and handlers. + */ +static const struct raknet_handler_entry raknet_handler[] = { + /* + * Ref: ..RakNet/Source/MessageIdentifiers.h + */ + { { 0x0, "ID_CONNECTED_PING" }, + raknet_dissect_0x00 }, + { { 0x1, "ID_UNCONNECTED_PING" }, + raknet_dissect_0x01 }, + { { 0x2, "ID_UNCONNECTED_PING_OPEN_CONNECTIONS" }, + raknet_dissect_0x02 }, + { { 0x5, "ID_OPEN_CONNECTION_REQUEST_1" }, + raknet_dissect_0x05 }, + { { 0x6, "ID_OPEN_CONNECTION_REPLY_1" }, + raknet_dissect_0x06 }, + { { 0x7, "ID_OPEN_CONNECTION_REQUEST_2" }, + raknet_dissect_0x07 }, + { { 0x8, "ID_OPEN_CONNECTION_REPLY_2" }, + raknet_dissect_0x08 }, + { { 0x19, "ID_INCOMPATIBLE_PROTOCOL_VERSION" }, + raknet_dissect_0x19 }, + { { 0x1C, "ID_UNCONNECTED_PONG" }, + raknet_dissect_0x1C }, +}; + +#define RAKNET_PACKET_ID_COUNT \ + (sizeof(raknet_handler) / sizeof(raknet_handler[0])) + +/* + * Look up packet id to packet name, value_string is wireshark type. + */ +static value_string packet_names[RAKNET_PACKET_ID_COUNT]; + +static void +raknet_init_packet_names(void) +{ + unsigned int i; + + for (i = 0; i < RAKNET_PACKET_ID_COUNT; i++) { + packet_names[i].value = raknet_handler[i].vs.value; + packet_names[i].strptr = raknet_handler[i].vs.strptr; + } +} + +/* + * Fill out the Info column and protocol subtree. + * + * Offset is updated for the caller. + */ +static proto_tree * +init_raknet(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, gint *offset) +{ + proto_tree *sub_tree; + proto_item *ti; + guint8 packet_id; + + *offset = 0; + + /* + * Take buffer start 0 to end -1 as single raknet item. + */ + ti = proto_tree_add_item(tree, proto_raknet, tvb, 0, -1, ENC_NA); + sub_tree = proto_item_add_subtree(ti, ett_raknet); + + packet_id = tvb_get_guint8(tvb, *offset); + proto_tree_add_item(sub_tree, hf_raknet_packet_id, tvb, *offset, + 1, ENC_BIG_ENDIAN); + *offset += 1; + + col_add_fstr(pinfo->cinfo, COL_INFO, "%s", + val_to_str(packet_id, packet_names, "Unknown (%#x)")); + + /* + * Append description to the raknet item. + */ + proto_item_append_text(ti, ", Packet id %#x", packet_id); + + + return sub_tree; +} + +/* + * Decode the tvb buffer. + * + * RakNet is just a dissector. It is invoked by protocols whose applications + * are built using the RakNet libs. + */ +void +dissect_raknet(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree) +{ + guint8 packet_id; + + col_set_str(pinfo->cinfo, COL_PROTOCOL, "RAKNET"); + col_clear(pinfo->cinfo, COL_INFO); + + packet_id = tvb_get_guint8(tvb, 0); + + if (!dissector_try_uint_new(raknet_dissector_table, packet_id, tvb, + pinfo, tree, TRUE, NULL)) { + proto_tree_add_expert(tree, pinfo, &ei_raknet_uknown_id, tvb, + 0, 1); + } +} + +void +proto_register_raknet(void) +{ + static hf_register_info hf[] = { + /* + * Packet ID field. + */ + { &hf_raknet_packet_id, + { "RAKNET Packet ID", "raknet.id", + FT_UINT8, BASE_HEX, + VALS(packet_names), 0x0, + NULL, HFILL } + }, + /* + * General fields (fields in >1 packet). + */ + { &hf_raknet_general_client_id, + { "RAKNET Client ID", "raknet.client_id", + FT_UINT64, BASE_HEX, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_raknet_general_elapsed_time, + { "RAKNET time since start (ms)", "raknet.elapsed_time", + FT_UINT64, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_raknet_general_magic, + { "RAKNET magic", "raknet.con_pingopen_magic", + FT_BYTES, BASE_NONE, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_raknet_general_mtu_size, + { "RAKNET MTU size", "raknet.MTU_size", + FT_UINT16, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_raknet_general_raknet_proto_ver, + { "RAKNET RakNet protocol version", "raknet.raknet_proto_ver", + FT_UINT8, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_raknet_general_server_id, + { "RAKNET Server ID", "raknet.server_id", + FT_UINT64, BASE_HEX, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_raknet_general_security, + { "RAKNET security", "raknet.security", + FT_UINT8, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_raknet_general_udp_port, + { "RAKNET UDP port", "raknet.UDP_port", + FT_UINT16, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + /* + * Packet ID 0x05 + */ + { &hf_raknet_0x05_null_padding, + { "RAKNET Null padding", "raknet.raknet_proto_ver", + FT_BYTES, BASE_NONE, + NULL, 0x0, + NULL, HFILL } + }, + /* + * Packet ID 0x06 + */ + { &hf_raknet_0x06_server_security, + { "RAKNET Server security", "raknet.server_security", + FT_UINT8, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + /* + * Packet ID 0x07 + */ + { &hf_raknet_0x07_cookie, + { "RAKNET cookie", "raknet.cookie", + FT_UINT32, BASE_HEX, + NULL, 0x0, + NULL, HFILL } + }, + /* + * Packet ID 0x1C + */ + { &hf_raknet_0x1C_server_id_str_len, + { "RAKNET Server ID string len", "raknet.server_id_str_len", + FT_UINT16, BASE_DEC, + NULL, 0x0, + NULL, HFILL } + }, + { &hf_raknet_0x1C_server_id_str, + { "RAKNET Server ID string", "raknet.server_id_str", + FT_STRING, BASE_NONE, + NULL, 0x0, + NULL, HFILL } + } + }; + + /* + * Setup protocol subtree array + */ + static gint *ett[] = { + &ett_raknet, + }; + + /* + * Set up expert info. + */ + static ei_register_info ei[] = { + { &ei_raknet_uknown_id, { "raknet.unknown.id", PI_UNDECODED, PI_ERROR, + "RakNet unknown or not implemented packet id", + EXPFILL } + } + }; + expert_module_t* expert_raknet; + + /* + * Init data structs. + */ + raknet_init_packet_names(); + + /* + * Register expert support. + */ + expert_raknet = expert_register_protocol(proto_raknet); + expert_register_field_array(expert_raknet, ei, array_length(ei)); + + /* + * Register the protocol with wireshark. + */ + proto_raknet = proto_register_protocol ( + "RAKNET game libs", /* name */ + "RAKNET", /* short name */ + "raknet" /* abbrev */ + ); + + /* + * Register detailed dissection arrays. + */ + proto_register_field_array(proto_raknet, hf, array_length(hf)); + proto_register_subtree_array(ett, array_length(ett)); + + raknet_dissector_table = + register_dissector_table("raknet.packet_id", "RakNet libs packet ids", + FT_UINT8, BASE_HEX); + /* + * Raknet subdissector for use by external protocols. + */ + register_dissector("raknet", dissect_raknet, proto_raknet); +} + +void +proto_reg_handoff_raknet(void) +{ + dissector_handle_t raknet_handle_tmp; + unsigned int i; + + for (i = 0; i < RAKNET_PACKET_ID_COUNT; i++) { + raknet_handle_tmp = + new_create_dissector_handle(raknet_handler[i].dissector_fp, + proto_raknet); + dissector_add_uint("raknet.packet_id", raknet_handler[i].vs.value, + raknet_handle_tmp); + } +} +/* + * Editor modelines + * + * Local Variables: + * c-basic-offset: 4 + * tab-width: 8 + * indent-tabs-mode: nil + * End: + * + * ex: set shiftwidth=4 tabstop=8 expandtab: + * :indentSize=4:tabSize=8:noTabs=true: + */