2017-03-17 16:59:23 +00:00
|
|
|
/* packet-mle.c
|
|
|
|
* Routines for MLE packet dissection
|
|
|
|
*
|
|
|
|
* Colin O'Flynn <coflynn@newae.com>
|
|
|
|
*
|
|
|
|
* The entire security section of this is lifted from the IEEE 802.15.4
|
|
|
|
* dissectory, as this is done the same way. Should eventually make the
|
|
|
|
* two use some common functions or something. But that section is:
|
|
|
|
* By Owen Kirby <osk@exegin.com>
|
|
|
|
* Copyright 2007 Exegin Technologies Limited
|
|
|
|
*
|
|
|
|
* Thread parts added by Robert Cragie <robert.cragie@arm.com>
|
|
|
|
*
|
|
|
|
* Wireshark - Network traffic analyzer
|
|
|
|
* By Gerald Combs <gerald@wireshark.org>
|
|
|
|
* Copyright 1998 Gerald Combs
|
|
|
|
*
|
2018-02-12 11:23:27 +00:00
|
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
2017-03-17 16:59:23 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
#include <glib.h>
|
|
|
|
#include <math.h>
|
|
|
|
#include <epan/packet.h>
|
|
|
|
#include <epan/conversation.h>
|
|
|
|
#include <epan/proto_data.h>
|
|
|
|
#include <epan/wmem/wmem.h>
|
|
|
|
#include <epan/expert.h>
|
|
|
|
#include <epan/prefs.h>
|
|
|
|
#include <epan/strutil.h>
|
|
|
|
#include <epan/to_str.h>
|
|
|
|
#include "packet-ieee802154.h"
|
|
|
|
#include "packet-mle.h"
|
|
|
|
|
|
|
|
#define MLE_32768_TO_NSEC_FACTOR ((double)30517.578125)
|
|
|
|
|
|
|
|
/* Forward declarations */
|
|
|
|
void proto_register_mle(void);
|
|
|
|
void proto_reg_handoff_mle(void);
|
|
|
|
|
|
|
|
static int proto_mle = -1;
|
|
|
|
static int proto_ieee802154 = -1; /* cache 802.15.4 protocol ID */
|
|
|
|
|
|
|
|
/* Registered fields for Auxiliary Security Header */
|
|
|
|
static int hf_mle_security_suite = -1;
|
|
|
|
static int hf_mle_mic = -1;
|
|
|
|
|
|
|
|
static int hf_mle_command = -1;
|
|
|
|
static int hf_mle_tlv = -1;
|
|
|
|
static int hf_mle_tlv_type = -1;
|
|
|
|
static int hf_mle_tlv_length = -1;
|
|
|
|
static int hf_mle_tlv_source_addr = -1;
|
|
|
|
static int hf_mle_tlv_mode_device_type = -1;
|
|
|
|
static int hf_mle_tlv_mode_idle_rx = -1;
|
|
|
|
static int hf_mle_tlv_mode_sec_data_req = -1;
|
|
|
|
static int hf_mle_tlv_mode_nwk_data = -1;
|
|
|
|
static int hf_mle_tlv_timeout = -1;
|
|
|
|
static int hf_mle_tlv_challenge = -1;
|
|
|
|
static int hf_mle_tlv_response = -1;
|
|
|
|
static int hf_mle_tlv_ll_frm_cntr = -1;
|
|
|
|
static int hf_mle_tlv_lqi_c = -1;
|
|
|
|
static int hf_mle_tlv_lqi_size = -1;
|
|
|
|
static int hf_mle_tlv_neighbor = -1;
|
|
|
|
static int hf_mle_tlv_neighbor_flagI = -1;
|
|
|
|
static int hf_mle_tlv_neighbor_flagO = -1;
|
|
|
|
static int hf_mle_tlv_neighbor_flagP = -1;
|
|
|
|
static int hf_mle_tlv_neighbor_idr = -1;
|
|
|
|
static int hf_mle_tlv_neighbor_addr = -1;
|
|
|
|
static int hf_mle_tlv_network_param_id = -1;
|
|
|
|
static int hf_mle_tlv_network_delay = -1;
|
|
|
|
static int hf_mle_tlv_network_channel = -1;
|
|
|
|
static int hf_mle_tlv_network_pan_id = -1;
|
|
|
|
static int hf_mle_tlv_network_pmt_join = -1;
|
|
|
|
static int hf_mle_tlv_network_bcn_payload = -1;
|
|
|
|
static int hf_mle_tlv_network_unknown = -1;
|
|
|
|
static int hf_mle_tlv_mle_frm_cntr = -1;
|
|
|
|
static int hf_mle_tlv_unknown = -1;
|
|
|
|
static int hf_mle_tlv_route64_id_seq = -1;
|
|
|
|
static int hf_mle_tlv_route64_id_mask = -1;
|
|
|
|
static int hf_mle_tlv_route64_entry = -1;
|
|
|
|
static int hf_mle_tlv_route64_nbr_out = -1;
|
|
|
|
static int hf_mle_tlv_route64_nbr_in = -1;
|
|
|
|
static int hf_mle_tlv_route64_cost = -1;
|
|
|
|
#if 0
|
|
|
|
static int hf_mle_tlv_route64_unknown = -1;
|
|
|
|
#endif
|
|
|
|
static int hf_mle_tlv_addr16 = -1;
|
|
|
|
static int hf_mle_tlv_leader_data_partition_id = -1;
|
|
|
|
static int hf_mle_tlv_leader_data_weighting = -1;
|
|
|
|
static int hf_mle_tlv_leader_data_version = -1;
|
|
|
|
static int hf_mle_tlv_leader_data_stable_version = -1;
|
|
|
|
static int hf_mle_tlv_leader_data_router_id = -1;
|
|
|
|
#if 0
|
|
|
|
static int hf_mle_tlv_network_data = -1;
|
|
|
|
#endif
|
|
|
|
static int hf_mle_tlv_scan_mask_r = -1;
|
|
|
|
static int hf_mle_tlv_scan_mask_e = -1;
|
|
|
|
static int hf_mle_tlv_conn_flags = -1;
|
|
|
|
static int hf_mle_tlv_conn_flags_pp = -1;
|
|
|
|
static int hf_mle_tlv_conn_lq3 = -1;
|
|
|
|
static int hf_mle_tlv_conn_lq2 = -1;
|
|
|
|
static int hf_mle_tlv_conn_lq1 = -1;
|
|
|
|
static int hf_mle_tlv_conn_leader_cost = -1;
|
|
|
|
static int hf_mle_tlv_conn_id_seq = -1;
|
|
|
|
static int hf_mle_tlv_conn_active_rtrs = -1;
|
|
|
|
static int hf_mle_tlv_conn_sed_buf_size = -1;
|
|
|
|
static int hf_mle_tlv_conn_sed_dgram_cnt = -1;
|
|
|
|
static int hf_mle_tlv_link_margin = -1;
|
|
|
|
static int hf_mle_tlv_status = -1;
|
|
|
|
static int hf_mle_tlv_version = -1;
|
|
|
|
static int hf_mle_tlv_addr_reg_entry = -1;
|
|
|
|
static int hf_mle_tlv_addr_reg_iid_type = -1;
|
|
|
|
static int hf_mle_tlv_addr_reg_cid = -1;
|
|
|
|
static int hf_mle_tlv_addr_reg_iid = -1;
|
|
|
|
static int hf_mle_tlv_addr_reg_ipv6 = -1;
|
|
|
|
#if 0
|
|
|
|
static int hf_mle_tlv_hold_time = -1;
|
|
|
|
#endif
|
|
|
|
static int hf_mle_tlv_channel_page = -1; /* v1.1-draft-2 */
|
|
|
|
static int hf_mle_tlv_channel = -1; /* v1.1-draft-2 */
|
|
|
|
static int hf_mle_tlv_pan_id = -1; /* v1.1-draft-2 */
|
|
|
|
static int hf_mle_tlv_active_tstamp = -1; /* SPEC-472 */
|
|
|
|
static int hf_mle_tlv_pending_tstamp = -1; /* SPEC-472 */
|
|
|
|
#if 0
|
|
|
|
static int hf_mle_tlv_active_op_dataset = -1; /* SPEC-472 */
|
|
|
|
static int hf_mle_tlv_pending_op_dataset = -1; /* SPEC-472 */
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static gint ett_mle = -1;
|
|
|
|
static gint ett_mle_tlv = -1;
|
|
|
|
static gint ett_mle_neighbor = -1;
|
|
|
|
static gint ett_mle_router = -1;
|
|
|
|
static gint ett_mle_addr_reg = -1;
|
|
|
|
static gint ett_mle_conn_flg = -1;
|
|
|
|
static gint ett_mle_thread_nwd = -1;
|
|
|
|
static gint ett_mle_auxiliary_security = -1;
|
|
|
|
static gint ett_mle_aux_sec_control = -1;
|
|
|
|
static gint ett_mle_aux_sec_key_id = -1;
|
|
|
|
|
|
|
|
static expert_field ei_mle_cbc_mac_failed = EI_INIT;
|
|
|
|
static expert_field ei_mle_packet_too_small = EI_INIT;
|
|
|
|
static expert_field ei_mle_no_key = EI_INIT;
|
|
|
|
static expert_field ei_mle_decrypt_failed = EI_INIT;
|
|
|
|
static expert_field ei_mle_mic_check_failed = EI_INIT;
|
|
|
|
static expert_field ei_mle_tlv_length_failed = EI_INIT;
|
|
|
|
static expert_field ei_mle_len_size_mismatch = EI_INIT;
|
|
|
|
|
|
|
|
static dissector_handle_t mle_handle;
|
|
|
|
static dissector_handle_t thread_nwd_handle;
|
|
|
|
static dissector_handle_t thread_mc_handle;
|
|
|
|
|
|
|
|
#define UDP_PORT_MLE_RANGE "19788" /* IANA registered */
|
|
|
|
|
|
|
|
/* boolean value set if the MIC must be ok before payload is dissected */
|
|
|
|
static gboolean mle_mic_ok = FALSE;
|
|
|
|
|
|
|
|
static wmem_tree_t* mle_key_hash_handlers;
|
|
|
|
|
|
|
|
static const value_string mle_sec_suite_names[] = {
|
|
|
|
{ 0, "802.15.4 Security" },
|
|
|
|
{ 255, "No Security" },
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
static const value_string mle_status_tlv_enums[] = {
|
|
|
|
{ 1, "Error" },
|
|
|
|
{ 2, "Duplicate Address Detected" },
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
static const value_string mle_conn_tlv_flags_pp_enums[] = {
|
|
|
|
{ 1, "High" },
|
|
|
|
{ 0, "Medium" },
|
|
|
|
{ -1, "Low" },
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
#define MLE_CMD_REQUEST 0
|
|
|
|
#define MLE_CMD_ACCEPT 1
|
|
|
|
#define MLE_CMD_ACCEPTREQ 2
|
|
|
|
#define MLE_CMD_REJECT 3
|
|
|
|
#define MLE_CMD_ADVERTISE 4
|
|
|
|
#define MLE_CMD_UPDATE 5
|
|
|
|
#define MLE_CMD_UPDATE_REQUEST 6
|
|
|
|
#define MLE_CMD_DATA_REQUEST 7
|
|
|
|
#define MLE_CMD_DATA_RESPONSE 8
|
|
|
|
#define MLE_CMD_PARENT_REQUEST 9
|
|
|
|
#define MLE_CMD_PARENT_RESPONSE 10
|
|
|
|
#define MLE_CMD_CHILD_ID_REQUEST 11
|
|
|
|
#define MLE_CMD_CHILD_ID_RESPONSE 12
|
|
|
|
#define MLE_CMD_CHILD_UPDATE_REQUEST 13
|
|
|
|
#define MLE_CMD_CHILD_UPDATE_RESPONSE 14
|
|
|
|
#define MLE_CMD_ANNOUNCE 15
|
|
|
|
#define MLE_CMD_DISCOVERY_REQUEST 16
|
|
|
|
#define MLE_CMD_DISCOVERY_RESPONSE 17
|
|
|
|
|
|
|
|
static const value_string mle_command_vals[] = {
|
|
|
|
{ MLE_CMD_REQUEST, "Link Request" },
|
|
|
|
{ MLE_CMD_ACCEPT, "Link Accept" },
|
|
|
|
{ MLE_CMD_ACCEPTREQ, "Link Accept and Request" },
|
|
|
|
{ MLE_CMD_REJECT, "Link Reject" },
|
|
|
|
{ MLE_CMD_ADVERTISE, "Advertisement" },
|
|
|
|
{ MLE_CMD_UPDATE, "Update" },
|
|
|
|
{ MLE_CMD_UPDATE_REQUEST, "Update Request" },
|
|
|
|
{ MLE_CMD_DATA_REQUEST, "Data Request" },
|
|
|
|
{ MLE_CMD_DATA_RESPONSE, "Data Response" },
|
|
|
|
{ MLE_CMD_PARENT_REQUEST, "Parent Request" },
|
|
|
|
{ MLE_CMD_PARENT_RESPONSE, "Parent Response" },
|
|
|
|
{ MLE_CMD_CHILD_ID_REQUEST, "Child ID Request" },
|
|
|
|
{ MLE_CMD_CHILD_ID_RESPONSE, "Child ID Response" },
|
|
|
|
{ MLE_CMD_CHILD_UPDATE_REQUEST, "Child Update Request" },
|
|
|
|
{ MLE_CMD_CHILD_UPDATE_RESPONSE, "Child Update Response" },
|
|
|
|
{ MLE_CMD_ANNOUNCE, "Announce" },
|
|
|
|
{ MLE_CMD_DISCOVERY_REQUEST, "Discovery Request" },
|
|
|
|
{ MLE_CMD_DISCOVERY_RESPONSE, "Discovery Response" },
|
|
|
|
{ 0, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
#define MLE_TLV_SOURCE_ADDRESS 0
|
|
|
|
#define MLE_TLV_MODE 1 /* Modified in Ch04_Mesh Link Establishment */
|
|
|
|
#define MLE_TLV_TIMEOUT 2
|
|
|
|
#define MLE_TLV_CHALLENGE 3
|
|
|
|
#define MLE_TLV_RESPONSE 4
|
|
|
|
#define MLE_TLV_LINK_LAYER_FRAME_COUNTER 5
|
|
|
|
#define MLE_TLV_LINK_QUALITY 6
|
|
|
|
#define MLE_TLV_NETWORK_PARAMETER 7
|
|
|
|
#define MLE_TLV_MLE_FRAME_COUNTER 8
|
|
|
|
#define MLE_TLV_ROUTE64 9 /* Defined in Ch05_Network Layer v1.1-rc1 */
|
|
|
|
#define MLE_TLV_ADDRESS16 10 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_LEADER_DATA 11 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_NETWORK_DATA 12 /* Defined in Ch05_Network Layer v1.1-rc1 */
|
|
|
|
#define MLE_TLV_TLV_REQUEST 13 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_SCAN_MASK 14 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_CONNECTIVITY 15 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_LINK_MARGIN 16 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_STATUS 17 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_VERSION 18 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_ADDRESS_REGISTRATION 19 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_CHANNEL 20 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_PAN_ID 21 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_ACTIVE_TSTAMP 22 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_PENDING_TSTAMP 23 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_ACTIVE_OP_DATASET 24 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_PENDING_OP_DATASET 25 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
#define MLE_TLV_THREAD_DISCOVERY 26 /* Defined in Ch04_Mesh Link Establishment v1.1-rc1 */
|
|
|
|
|
|
|
|
static const value_string mle_tlv_vals[] = {
|
|
|
|
{ MLE_TLV_SOURCE_ADDRESS, "Source Address" },
|
|
|
|
{ MLE_TLV_MODE, "Mode" },
|
|
|
|
{ MLE_TLV_TIMEOUT, "Timeout" },
|
|
|
|
{ MLE_TLV_CHALLENGE, "Challenge" },
|
|
|
|
{ MLE_TLV_RESPONSE, "Response" },
|
|
|
|
{ MLE_TLV_LINK_LAYER_FRAME_COUNTER, "Link Layer Frame Counter"},
|
|
|
|
{ MLE_TLV_LINK_QUALITY, "Link Quality"},
|
|
|
|
{ MLE_TLV_NETWORK_PARAMETER, "Network Parameter"},
|
|
|
|
{ MLE_TLV_MLE_FRAME_COUNTER, "MLE Frame Counter"},
|
|
|
|
{ MLE_TLV_ROUTE64, "Route64"},
|
|
|
|
{ MLE_TLV_ADDRESS16, "Address16"},
|
|
|
|
{ MLE_TLV_LEADER_DATA, "Leader Data"},
|
|
|
|
{ MLE_TLV_NETWORK_DATA, "Network Data"},
|
|
|
|
{ MLE_TLV_TLV_REQUEST, "TLV Request"},
|
|
|
|
{ MLE_TLV_SCAN_MASK, "Scan Mask"},
|
|
|
|
{ MLE_TLV_CONNECTIVITY, "Connectivity"},
|
|
|
|
{ MLE_TLV_LINK_MARGIN, "Link Margin"},
|
|
|
|
{ MLE_TLV_STATUS, "Status"},
|
|
|
|
{ MLE_TLV_VERSION, "Version"},
|
|
|
|
{ MLE_TLV_ADDRESS_REGISTRATION, "Address Registration"},
|
|
|
|
{ MLE_TLV_CHANNEL, "Channel"},
|
|
|
|
{ MLE_TLV_PAN_ID, "PAN ID"},
|
|
|
|
{ MLE_TLV_ACTIVE_TSTAMP, "Active Timestamp"},
|
|
|
|
{ MLE_TLV_PENDING_TSTAMP, "Pending Timestamp"},
|
|
|
|
{ MLE_TLV_ACTIVE_OP_DATASET, "Active Operational Dataset"},
|
|
|
|
{ MLE_TLV_PENDING_OP_DATASET, "Pending Operational Dataset"},
|
|
|
|
{ MLE_TLV_THREAD_DISCOVERY, "Thread Discovery"},
|
|
|
|
{ 0, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
#define LQI_FLAGS_C 0x80
|
|
|
|
#define LQI_FLAGS_SIZE 0x0F
|
|
|
|
|
|
|
|
#define NEIGHBOR_FLAG_I 0x80
|
|
|
|
#define NEIGHBOR_FLAG_O 0x40
|
|
|
|
#define NEIGHBOR_FLAG_P 0x20
|
|
|
|
|
|
|
|
#define NETWORK_PARAM_ID_CHANNEL 0
|
|
|
|
#define NETWORK_PARAM_ID_PAN_ID 1
|
|
|
|
#define NETWORK_PARAM_ID_PERMIT_JOIN 2
|
|
|
|
#define NETWORK_PARAM_ID_BCN_PAYLOAD 3
|
|
|
|
|
|
|
|
static const value_string mle_tlv_nwk_param_vals[] = {
|
|
|
|
{ NETWORK_PARAM_ID_CHANNEL, "Channel" },
|
|
|
|
{ NETWORK_PARAM_ID_PAN_ID, "PAN ID" },
|
|
|
|
{ NETWORK_PARAM_ID_PERMIT_JOIN, "Permit Join" },
|
|
|
|
{ NETWORK_PARAM_ID_BCN_PAYLOAD, "Beacon Payload" },
|
|
|
|
{ 0, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
static const true_false_string mle_tlv_mode_device_type = {
|
|
|
|
"FFD",
|
|
|
|
"RFD"
|
|
|
|
};
|
|
|
|
static const true_false_string mle_tlv_mode_nwk_data = {
|
|
|
|
"Full",
|
|
|
|
"Stable"
|
|
|
|
};
|
|
|
|
static const true_false_string mle_tlv_addr_reg_iid_type = {
|
|
|
|
"Compressed",
|
|
|
|
"Full"
|
|
|
|
};
|
|
|
|
|
|
|
|
#define ROUTE_TBL_OUT_MASK 0xC0
|
|
|
|
#define ROUTE_TBL_IN_MASK 0x30
|
|
|
|
#define ROUTE_TBL_COST_MASK 0x0F
|
|
|
|
|
|
|
|
#define SCAN_MASK_R_MASK 0x80
|
|
|
|
#define SCAN_MASK_D_MASK 0x40
|
|
|
|
|
|
|
|
#define CONN_MASK_FLAGS_PP_MASK 0xC0
|
|
|
|
|
|
|
|
#define ADDR_REG_MASK_IID_TYPE_MASK 0x80
|
|
|
|
#define ADDR_REG_MASK_CID_MASK 0x0F
|
|
|
|
|
|
|
|
#define MLE_CMD_CINFO_SEC_DATA_REQ 0x04
|
|
|
|
#define MLE_CMD_CINFO_NWK_DATA 0x01
|
|
|
|
|
|
|
|
/*FUNCTION:------------------------------------------------------
|
|
|
|
* NAME
|
|
|
|
* dissect_mle_decrypt
|
|
|
|
* DESCRIPTION
|
|
|
|
* MLE dissector.
|
|
|
|
* PARAMETERS
|
|
|
|
* tvbuff_t *tvb - IEEE 802.15.4 packet.
|
|
|
|
* packet_info * pinfo - Packet info structure.
|
|
|
|
* guint offset - Offset where the ciphertext 'c' starts.
|
|
|
|
* ieee802154_packet *packet - IEEE 802.15.4 packet information.
|
|
|
|
* ws_decrypt_status *status - status of decryption returned through here on failure.
|
|
|
|
* RETURNS
|
|
|
|
* tvbuff_t * - Decrypted payload.
|
|
|
|
*---------------------------------------------------------------
|
|
|
|
*/
|
|
|
|
static tvbuff_t *
|
|
|
|
dissect_mle_decrypt(tvbuff_t * tvb,
|
|
|
|
guint offset,
|
|
|
|
packet_info * pinfo,
|
|
|
|
ieee802154_packet * packet,
|
2018-02-19 13:33:11 +00:00
|
|
|
ieee802154_decrypt_info_t* decrypt_info)
|
2017-03-17 16:59:23 +00:00
|
|
|
{
|
|
|
|
tvbuff_t * ptext_tvb;
|
|
|
|
gboolean have_mic = FALSE;
|
|
|
|
guint64 srcAddr;
|
|
|
|
unsigned char tmp[16];
|
|
|
|
guint M;
|
|
|
|
gint captured_len;
|
|
|
|
gint reported_len;
|
|
|
|
|
2018-02-19 13:33:11 +00:00
|
|
|
*decrypt_info->rx_mic_length = 0;
|
|
|
|
memset(decrypt_info->rx_mic, 0, 16);
|
2017-03-17 16:59:23 +00:00
|
|
|
|
|
|
|
/* Get the captured and on-the-wire length of the payload. */
|
|
|
|
if (packet->security_level > 0) {
|
|
|
|
M = IEEE802154_MIC_LENGTH(packet->security_level);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
M = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
reported_len = tvb_reported_length_remaining(tvb, offset) - M;
|
|
|
|
if (reported_len < 0) {
|
2018-02-19 13:33:11 +00:00
|
|
|
*decrypt_info->status = DECRYPT_PACKET_TOO_SMALL;
|
2017-03-17 16:59:23 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
/* Check if the payload is truncated. */
|
|
|
|
if (tvb_bytes_exist(tvb, offset, reported_len)) {
|
|
|
|
captured_len = reported_len;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
captured_len = tvb_captured_length_remaining(tvb, offset);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (packet->security_level > 0) {
|
|
|
|
/* Check if the MIC is present in the captured data. */
|
|
|
|
have_mic = tvb_bytes_exist(tvb, offset + reported_len, M);
|
|
|
|
if (have_mic) {
|
2018-02-19 13:33:11 +00:00
|
|
|
tvb_memcpy(tvb, decrypt_info->rx_mic, offset + reported_len, M);
|
2017-03-17 16:59:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*=====================================================
|
|
|
|
* Key Lookup - Need to find the appropriate key.
|
|
|
|
*=====================================================
|
|
|
|
*/
|
|
|
|
if (packet->src_addr_mode == IEEE802154_FCF_ADDR_EXT) {
|
|
|
|
/* The source EUI-64 is included in the headers. */
|
|
|
|
srcAddr = packet->src64; /* GUINT64_SWAP_LE_BE(packet->src64); */
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* Lookup failed. */
|
2018-02-19 13:33:11 +00:00
|
|
|
*decrypt_info->status = DECRYPT_PACKET_NO_EXT_SRC_ADDR;
|
2017-03-17 16:59:23 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*=====================================================
|
|
|
|
* CCM* - CTR mode payload encryption
|
|
|
|
*=====================================================
|
|
|
|
*/
|
|
|
|
/* Create the CCM* initial block for decryption (Adata=0, M=0, counter=0). */
|
2017-12-26 15:35:55 +00:00
|
|
|
ccm_init_block(tmp, FALSE, 0, srcAddr, packet->frame_counter, packet->security_level, 0, NULL);
|
2017-03-17 16:59:23 +00:00
|
|
|
|
|
|
|
/* Decrypt the ciphertext, and place the plaintext in a new tvb. */
|
|
|
|
if (IEEE802154_IS_ENCRYPTED(packet->security_level) && captured_len) {
|
|
|
|
gchar *text;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Make a copy of the ciphertext in heap memory.
|
|
|
|
*
|
|
|
|
* We will decrypt the message in-place and then use the buffer as the
|
|
|
|
* real data for the new tvb.
|
|
|
|
*/
|
|
|
|
text = (gchar *)tvb_memdup(pinfo->pool, tvb, offset, captured_len);
|
|
|
|
|
|
|
|
/* Perform CTR-mode transformation. Try both the likely key and the alternate key */
|
2018-02-19 13:33:11 +00:00
|
|
|
if (!ccm_ctr_encrypt(decrypt_info->key, tmp, decrypt_info->rx_mic, text, captured_len)) {
|
|
|
|
*decrypt_info->status = DECRYPT_PACKET_DECRYPT_FAILED;
|
2017-03-17 16:59:23 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create a tvbuff for the plaintext. */
|
|
|
|
ptext_tvb = tvb_new_real_data((const guint8 *)text, captured_len, reported_len);
|
|
|
|
tvb_set_child_real_data_tvbuff(tvb, ptext_tvb);
|
|
|
|
add_new_data_source(pinfo, ptext_tvb, "Decrypted MLE payload");
|
2018-02-19 13:33:11 +00:00
|
|
|
*decrypt_info->status = DECRYPT_PACKET_SUCCEEDED;
|
2017-03-17 16:59:23 +00:00
|
|
|
}
|
|
|
|
/* There is no ciphertext. Wrap the plaintext in a new tvb. */
|
|
|
|
else {
|
|
|
|
/* Decrypt the MIC (if present). */
|
|
|
|
if (have_mic) {
|
2018-02-19 13:33:11 +00:00
|
|
|
if (!ccm_ctr_encrypt(decrypt_info->key, tmp, decrypt_info->rx_mic, NULL, 0)) {
|
|
|
|
*decrypt_info->status = DECRYPT_PACKET_DECRYPT_FAILED;
|
2017-03-17 16:59:23 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create a tvbuff for the plaintext. This might result in a zero-length tvbuff. */
|
|
|
|
ptext_tvb = tvb_new_subset_length_caplen(tvb, offset, captured_len, reported_len);
|
2018-02-19 13:33:11 +00:00
|
|
|
*decrypt_info->status = DECRYPT_PACKET_SUCCEEDED;
|
2017-03-17 16:59:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*=====================================================
|
|
|
|
* CCM* - CBC-mode message authentication
|
|
|
|
*=====================================================
|
|
|
|
*/
|
|
|
|
/* We can only verify the message if the MIC wasn't truncated. */
|
|
|
|
if (have_mic) {
|
|
|
|
unsigned char dec_mic[16];
|
|
|
|
guint l_m = captured_len;
|
|
|
|
guint l_a;
|
|
|
|
guint8 d_a[256];
|
|
|
|
|
|
|
|
DISSECTOR_ASSERT(pinfo->src.len == 16);
|
|
|
|
DISSECTOR_ASSERT(pinfo->dst.len == 16);
|
2018-02-18 03:33:20 +00:00
|
|
|
memcpy(d_a, pinfo->src.data, pinfo->src.len);
|
|
|
|
memcpy(d_a+16, pinfo->dst.data, pinfo->dst.len);
|
2017-03-17 16:59:23 +00:00
|
|
|
|
2018-02-19 13:33:11 +00:00
|
|
|
tvb_memcpy(tvb, d_a+32, decrypt_info->aux_offset, decrypt_info->aux_length);
|
|
|
|
l_a = 32 + decrypt_info->aux_length;
|
2017-03-17 16:59:23 +00:00
|
|
|
|
|
|
|
/* Adjust the lengths of the plantext and additional data if unencrypted. */
|
|
|
|
if (!IEEE802154_IS_ENCRYPTED(packet->security_level)) {
|
|
|
|
l_a += l_m;
|
|
|
|
l_m = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create the CCM* initial block for authentication (Adata!=0, M!=0, counter=l(m)). */
|
2017-12-26 15:35:55 +00:00
|
|
|
ccm_init_block(tmp, TRUE, M, srcAddr, packet->frame_counter, packet->security_level, l_m, NULL);
|
2017-03-17 16:59:23 +00:00
|
|
|
|
|
|
|
/* Compute CBC-MAC authentication tag. */
|
|
|
|
/*
|
|
|
|
* And yes, despite the warning in tvbuff.h, I think tvb_get_ptr is the
|
|
|
|
* right function here since either A) the payload wasn't encrypted, in
|
|
|
|
* which case l_m is zero, or B) the payload was encrypted, and the tvb
|
|
|
|
* already points to contiguous memory, since we just allocated it in
|
|
|
|
* decryption phase.
|
|
|
|
*/
|
2018-02-19 13:33:11 +00:00
|
|
|
if (!ccm_cbc_mac(decrypt_info->key, tmp, d_a, l_a, tvb_get_ptr(ptext_tvb, 0, l_m), l_m, dec_mic)) {
|
|
|
|
*decrypt_info->status = DECRYPT_PACKET_MIC_CHECK_FAILED;
|
2017-03-17 16:59:23 +00:00
|
|
|
}
|
|
|
|
/* Compare the received MIC with the one we generated. */
|
2018-02-19 13:33:11 +00:00
|
|
|
else if (memcmp(decrypt_info->rx_mic, dec_mic, M) != 0) {
|
|
|
|
*decrypt_info->status = DECRYPT_PACKET_MIC_CHECK_FAILED;
|
2017-03-17 16:59:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-19 13:33:11 +00:00
|
|
|
*decrypt_info->rx_mic_length = M;
|
2017-03-17 16:59:23 +00:00
|
|
|
|
|
|
|
/* Done! */
|
|
|
|
return ptext_tvb;
|
|
|
|
} /* dissect_mle_decrypt */
|
|
|
|
|
2018-03-28 20:49:58 +00:00
|
|
|
void register_mle_key_hash_handler(guint hash_identifier, ieee802154_set_key_func key_func)
|
2017-03-17 16:59:23 +00:00
|
|
|
{
|
|
|
|
/* Ensure no duplication */
|
|
|
|
DISSECTOR_ASSERT(wmem_tree_lookup32(mle_key_hash_handlers, hash_identifier) == NULL);
|
|
|
|
|
|
|
|
wmem_tree_insert32(mle_key_hash_handlers, hash_identifier, (void*)key_func);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set MLE key function. */
|
2018-03-28 20:49:58 +00:00
|
|
|
static guint ieee802154_set_mle_key(ieee802154_packet *packet, unsigned char *key, unsigned char *alt_key, ieee802154_key_t *uat_key)
|
2017-03-17 16:59:23 +00:00
|
|
|
{
|
2018-03-28 20:49:58 +00:00
|
|
|
ieee802154_set_key_func func = (ieee802154_set_key_func)wmem_tree_lookup32(mle_key_hash_handlers, uat_key->hash_type);
|
2017-03-17 16:59:23 +00:00
|
|
|
|
|
|
|
if (func != NULL)
|
|
|
|
return func(packet, key, alt_key, uat_key);
|
|
|
|
|
|
|
|
/* Right now, KEY_HASH_NONE and KEY_HASH_ZIP are not registered because they
|
|
|
|
work with this "default" behavior */
|
|
|
|
if (packet->key_index == uat_key->key_index)
|
|
|
|
{
|
|
|
|
memcpy(key, uat_key->key, IEEE802154_CIPHER_SIZE);
|
2018-03-28 20:49:58 +00:00
|
|
|
return 1;
|
2017-03-17 16:59:23 +00:00
|
|
|
}
|
|
|
|
|
2018-03-28 20:49:58 +00:00
|
|
|
return 0;
|
2017-03-17 16:59:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
dissect_mle(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
|
|
|
|
{
|
|
|
|
tvbuff_t *volatile payload_tvb = NULL;
|
|
|
|
proto_tree *volatile mle_tree = NULL;
|
|
|
|
proto_item *volatile proto_root = NULL;
|
|
|
|
|
|
|
|
guint offset = 0;
|
|
|
|
guint aux_header_offset = 0;
|
2018-02-19 13:33:11 +00:00
|
|
|
ieee802154_decrypt_status status;
|
2017-03-17 16:59:23 +00:00
|
|
|
|
|
|
|
proto_item *ti;
|
|
|
|
proto_item *mic_item = NULL;
|
|
|
|
proto_tree *header_tree = NULL;
|
|
|
|
guint8 security_suite;
|
|
|
|
guint aux_length = 0;
|
2017-04-12 15:15:08 +00:00
|
|
|
ieee802154_packet *packet;
|
2017-03-17 16:59:23 +00:00
|
|
|
ieee802154_packet *original_packet;
|
2018-02-19 13:33:11 +00:00
|
|
|
ieee802154_decrypt_info_t decrypt_info;
|
2017-03-17 16:59:23 +00:00
|
|
|
ieee802154_hints_t *ieee_hints;
|
|
|
|
gboolean mic_ok=TRUE;
|
|
|
|
|
|
|
|
unsigned char rx_mic[16];
|
|
|
|
unsigned int rx_mic_len = 0;
|
|
|
|
|
|
|
|
guint8 cmd;
|
|
|
|
guint8 tlv_type, tlv_len;
|
|
|
|
proto_tree *tlv_tree;
|
|
|
|
|
|
|
|
ieee_hints = (ieee802154_hints_t *)p_get_proto_data(wmem_file_scope(), pinfo, proto_ieee802154, 0);
|
2017-04-12 15:15:08 +00:00
|
|
|
if (ieee_hints == NULL) {
|
|
|
|
/* For now, MLE only supported with IEEE802.15.4 as an underlying layer */
|
|
|
|
return 0;
|
|
|
|
}
|
2017-03-17 16:59:23 +00:00
|
|
|
original_packet = (ieee802154_packet *)ieee_hints->packet;
|
|
|
|
|
2017-04-12 15:15:08 +00:00
|
|
|
packet = wmem_new0(wmem_packet_scope(), ieee802154_packet);
|
|
|
|
|
2017-03-17 16:59:23 +00:00
|
|
|
/* Copy IEEE 802.15.4 Source Address */
|
|
|
|
packet->src_addr_mode = original_packet->src_addr_mode;
|
|
|
|
if (packet->src_addr_mode == IEEE802154_FCF_ADDR_EXT) {
|
|
|
|
packet->src64 = original_packet->src64;
|
|
|
|
} else {
|
|
|
|
packet->src16 = original_packet->src16;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy IEEE 802.15.4 Source PAN ID */
|
|
|
|
packet->src_pan = original_packet->src_pan;
|
|
|
|
|
2017-04-12 15:15:08 +00:00
|
|
|
col_set_str(pinfo->cinfo, COL_PROTOCOL, "MLE");
|
|
|
|
col_clear(pinfo->cinfo, COL_INFO);
|
|
|
|
|
2017-03-17 16:59:23 +00:00
|
|
|
/* Create the protocol tree. */
|
|
|
|
proto_root = proto_tree_add_item(tree, proto_mle, tvb, 0, tvb_reported_length(tvb), ENC_NA);
|
|
|
|
mle_tree = proto_item_add_subtree(proto_root, ett_mle);
|
|
|
|
|
|
|
|
/* Parse the security suite field. */
|
|
|
|
/* Security Suite Field */
|
|
|
|
security_suite = tvb_get_guint8(tvb, offset);
|
2018-11-19 13:53:43 +00:00
|
|
|
proto_tree_add_item(mle_tree, hf_mle_security_suite, tvb, offset, 1, ENC_NA);
|
2017-03-17 16:59:23 +00:00
|
|
|
offset++;
|
|
|
|
|
|
|
|
aux_header_offset = offset;
|
|
|
|
|
|
|
|
/* Security material present if security suite = 0 */
|
|
|
|
if (security_suite == 0) {
|
|
|
|
dissect_ieee802154_aux_sec_header_and_key(tvb, pinfo, mle_tree, packet, &offset);
|
|
|
|
aux_length = offset-aux_header_offset;
|
|
|
|
} else {
|
|
|
|
packet->security_level = SECURITY_LEVEL_NONE;
|
|
|
|
}
|
|
|
|
|
2018-02-19 13:33:11 +00:00
|
|
|
decrypt_info.key_number = 0;
|
2017-03-17 16:59:23 +00:00
|
|
|
|
|
|
|
/* Add additional fields for security level > SECURITY_LEVEL_NONE */
|
|
|
|
if (packet->security_level > SECURITY_LEVEL_NONE) {
|
|
|
|
|
|
|
|
/* Pass to decryption process */
|
2018-02-19 13:33:11 +00:00
|
|
|
decrypt_info.rx_mic = rx_mic;
|
|
|
|
decrypt_info.rx_mic_length = &rx_mic_len;
|
|
|
|
decrypt_info.aux_offset = aux_header_offset;
|
|
|
|
decrypt_info.aux_length = aux_length;
|
|
|
|
decrypt_info.status = &status;
|
|
|
|
decrypt_info.key = NULL; /* payload function will fill that in */
|
|
|
|
|
|
|
|
payload_tvb = decrypt_ieee802154_payload(tvb, offset, pinfo, header_tree, packet, &decrypt_info,
|
2017-03-17 16:59:23 +00:00
|
|
|
ieee802154_set_mle_key, dissect_mle_decrypt);
|
|
|
|
if (status == DECRYPT_PACKET_MIC_CHECK_FAILED)
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_cbc_mac_failed);
|
|
|
|
|
|
|
|
/* MIC */
|
|
|
|
if (rx_mic_len) {
|
|
|
|
mic_item = proto_tree_add_bytes(header_tree, hf_mle_mic, tvb, 0, rx_mic_len, rx_mic);
|
2019-04-03 21:32:30 +00:00
|
|
|
proto_item_set_generated(mic_item);
|
2017-03-17 16:59:23 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
status = DECRYPT_NOT_ENCRYPTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get the unencrypted data if decryption failed. */
|
|
|
|
if (!payload_tvb) {
|
|
|
|
/* Deal with possible truncation and the FCS field at the end. */
|
|
|
|
gint reported_len = tvb_reported_length_remaining(tvb, offset);
|
|
|
|
gint captured_len = tvb_captured_length_remaining(tvb, offset);
|
|
|
|
if (reported_len < captured_len) captured_len = reported_len;
|
|
|
|
payload_tvb = tvb_new_subset_length_caplen(tvb, offset, captured_len, reported_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Display the reason for failure, and abort if the error was fatal. */
|
|
|
|
switch (status) {
|
|
|
|
case DECRYPT_PACKET_SUCCEEDED:
|
|
|
|
/* No problem. */
|
2018-02-19 13:33:11 +00:00
|
|
|
proto_item_append_text(mic_item, " [correct (key no. %d)]", decrypt_info.key_number);
|
2017-03-17 16:59:23 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case DECRYPT_PACKET_TOO_SMALL:
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_packet_too_small);
|
|
|
|
call_data_dissector(payload_tvb, pinfo, tree);
|
|
|
|
return tvb_captured_length(tvb);
|
|
|
|
|
|
|
|
case DECRYPT_PACKET_NO_KEY:
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_no_key);
|
|
|
|
call_data_dissector(payload_tvb, pinfo, tree);
|
|
|
|
return tvb_captured_length(tvb);
|
|
|
|
|
|
|
|
case DECRYPT_PACKET_DECRYPT_FAILED:
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_decrypt_failed);
|
|
|
|
call_data_dissector(payload_tvb, pinfo, tree);
|
|
|
|
return tvb_captured_length(tvb);
|
|
|
|
|
|
|
|
case DECRYPT_PACKET_MIC_CHECK_FAILED:
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_mic_check_failed);
|
|
|
|
proto_item_append_text(mic_item, " [incorrect]");
|
|
|
|
/*
|
|
|
|
* Abort only if the payload was encrypted, in which case we
|
|
|
|
* probably didn't decrypt the packet right (eg: wrong key).
|
|
|
|
*/
|
|
|
|
if (IEEE802154_IS_ENCRYPTED(packet->security_level)) {
|
|
|
|
mic_ok = FALSE;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case DECRYPT_NOT_ENCRYPTED:
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* This can cause a lot of problems so remove it by default */
|
|
|
|
if (!mic_ok && mle_mic_ok) {
|
|
|
|
call_data_dissector(payload_tvb, pinfo, tree);
|
|
|
|
col_add_fstr(pinfo->cinfo, COL_INFO, "MIC Failed");
|
|
|
|
return tvb_captured_length(tvb);
|
|
|
|
}
|
|
|
|
|
|
|
|
/***** NEW CODE HERE ****/
|
|
|
|
/* If we're good, carry on and display the MLE payload */
|
|
|
|
offset = 0;
|
|
|
|
|
|
|
|
/* MLE Command */
|
|
|
|
proto_tree_add_item(mle_tree, hf_mle_command, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
|
|
|
|
cmd = tvb_get_guint8(payload_tvb, offset);
|
|
|
|
col_add_str(pinfo->cinfo, COL_INFO, val_to_str(cmd, mle_command_vals, "Unknown (%x)"));
|
|
|
|
|
|
|
|
offset++;
|
|
|
|
|
|
|
|
/* MLE TLVs */
|
|
|
|
while (tvb_offset_exists(payload_tvb, offset)) {
|
|
|
|
|
|
|
|
/* Get the length ahead of time to pass to next function so we can highlight
|
|
|
|
proper amount of bytes */
|
|
|
|
tlv_len = tvb_get_guint8(payload_tvb, offset+1);
|
|
|
|
|
|
|
|
ti = proto_tree_add_item(mle_tree, hf_mle_tlv, payload_tvb, offset, tlv_len+2, ENC_NA);
|
|
|
|
tlv_tree = proto_item_add_subtree(ti, ett_mle_tlv);
|
|
|
|
|
|
|
|
/* Type */
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_type, payload_tvb, offset, 1, ENC_NA);
|
|
|
|
tlv_type = tvb_get_guint8(payload_tvb, offset);
|
|
|
|
offset++;
|
|
|
|
|
|
|
|
/* Add value name to value root label */
|
|
|
|
proto_item_append_text(ti, " (%s", val_to_str(tlv_type, mle_tlv_vals, "Unknown (%d)"));
|
|
|
|
|
|
|
|
/* Length */
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_length, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
|
|
|
|
switch(tlv_type){
|
|
|
|
case MLE_TLV_SOURCE_ADDRESS:
|
|
|
|
{
|
|
|
|
gboolean haveShortTLV = FALSE;
|
|
|
|
guint16 shortAddr = 0;
|
|
|
|
|
|
|
|
if (!((tlv_len == 2) || (tlv_len == 8))) {
|
|
|
|
/* TLV Length must be 2 or 8 */
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
offset += tlv_len;
|
|
|
|
} else {
|
|
|
|
if (tlv_len == 2) {
|
|
|
|
haveShortTLV = TRUE;
|
|
|
|
shortAddr = tvb_get_ntohs(payload_tvb, offset);
|
|
|
|
}
|
|
|
|
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_source_addr, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
proto_item_append_text(ti, " = ");
|
|
|
|
while (tlv_len) {
|
|
|
|
guint8 addr;
|
|
|
|
addr = tvb_get_guint8(payload_tvb, offset);
|
|
|
|
proto_item_append_text(ti, "%02x", addr);
|
|
|
|
if (--tlv_len) {
|
|
|
|
proto_item_append_text(ti, ":");
|
|
|
|
}
|
|
|
|
offset++;
|
|
|
|
}
|
|
|
|
if ((original_packet->src_addr_mode == IEEE802154_FCF_ADDR_EXT) && haveShortTLV) {
|
|
|
|
/* Source TLV: use this to update src/long mapping */
|
|
|
|
ieee802154_addr_update(&ieee802154_map, shortAddr, original_packet->src_pan, original_packet->src64, pinfo->current_proto, pinfo->fd->num);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_MODE:
|
|
|
|
if (tlv_len == 1) {
|
|
|
|
guint8 capability;
|
|
|
|
|
|
|
|
capability = tvb_get_guint8(payload_tvb, offset);
|
|
|
|
proto_item_append_text(ti, " = %02x)", capability);
|
|
|
|
/* Get and display capability info. (blatantly plagiarised from packet-ieee802154.c */
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_nwk_data, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_device_type, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_sec_data_req, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_mode_idle_rx, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* TLV Length must be 1 */
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
}
|
|
|
|
offset += tlv_len;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_TIMEOUT:
|
|
|
|
if (tlv_len != 4) {
|
|
|
|
/* TLV Length must be 4 */
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
} else {
|
|
|
|
guint32 to_data = 0;
|
|
|
|
proto_tree_add_item_ret_uint(tlv_tree, hf_mle_tlv_timeout, payload_tvb, offset, 4, ENC_BIG_ENDIAN, &to_data);
|
|
|
|
proto_item_append_text(ti, " = %d", (guint16)to_data);
|
|
|
|
}
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
offset += tlv_len;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_CHALLENGE:
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_challenge, payload_tvb, offset, tlv_len, ENC_NA);
|
2017-04-12 12:17:31 +00:00
|
|
|
proto_item_append_text(ti, " = %s)", tvb_bytes_to_str(wmem_packet_scope(), payload_tvb, offset, tlv_len));
|
2017-03-17 16:59:23 +00:00
|
|
|
offset += tlv_len;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_RESPONSE:
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_response, payload_tvb, offset, tlv_len, ENC_NA);
|
2017-04-12 12:17:31 +00:00
|
|
|
proto_item_append_text(ti, " = %s)", tvb_bytes_to_str(wmem_packet_scope(), payload_tvb, offset, tlv_len));
|
2017-03-17 16:59:23 +00:00
|
|
|
offset += tlv_len;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_LINK_LAYER_FRAME_COUNTER:
|
|
|
|
case MLE_TLV_MLE_FRAME_COUNTER:
|
|
|
|
if (tlv_len != 4) {
|
|
|
|
/* TLV Length must be 4 */
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
} else {
|
|
|
|
guint32 cntr;
|
|
|
|
|
|
|
|
if (tlv_type == MLE_TLV_LINK_LAYER_FRAME_COUNTER) {
|
|
|
|
proto_tree_add_item_ret_uint(tlv_tree, hf_mle_tlv_ll_frm_cntr, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN, &cntr);
|
|
|
|
} else {
|
|
|
|
proto_tree_add_item_ret_uint(tlv_tree, hf_mle_tlv_mle_frm_cntr, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN, &cntr);
|
|
|
|
}
|
|
|
|
proto_item_append_text(ti, " = %u", cntr);
|
|
|
|
}
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
offset += tlv_len;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_LINK_QUALITY:
|
|
|
|
{
|
|
|
|
guint numNeighbors;
|
|
|
|
guint8 size = tvb_get_guint8(payload_tvb, offset) & LQI_FLAGS_SIZE;
|
|
|
|
proto_tree *neig_tree;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_lqi_c, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_lqi_size, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
|
|
|
|
if ((tlv_len - 1) % (size + 3)) {
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_len_size_mismatch);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
numNeighbors = 0;
|
|
|
|
} else {
|
|
|
|
numNeighbors = (tlv_len - 1) / (size + 3);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (numNeighbors == 0) {
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
} else if (numNeighbors == 1) {
|
|
|
|
proto_item_append_text(ti, ": 1 Neighbor)");
|
|
|
|
} else {
|
|
|
|
proto_item_append_text(ti, ": %d Neighbors)", numNeighbors);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Add subtrees */
|
|
|
|
|
|
|
|
//Size is off by 1
|
|
|
|
size++;
|
|
|
|
|
|
|
|
while (numNeighbors) {
|
|
|
|
ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_neighbor, payload_tvb, offset, size+2, ENC_NA);
|
|
|
|
neig_tree = proto_item_add_subtree(ti, ett_mle_neighbor);
|
|
|
|
|
|
|
|
proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_flagI, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_flagO, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_flagP, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
|
|
|
|
proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_idr, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
|
|
|
|
proto_tree_add_item(neig_tree, hf_mle_tlv_neighbor_addr, payload_tvb, offset,size, ENC_NA);
|
|
|
|
offset += size;
|
|
|
|
|
|
|
|
numNeighbors--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_NETWORK_PARAMETER:
|
|
|
|
{
|
|
|
|
guint8 param_id = tvb_get_guint8(payload_tvb, offset);
|
|
|
|
|
|
|
|
proto_item_append_text(ti, " = %s)", val_to_str(param_id, mle_tlv_nwk_param_vals, "Unknown (%d)"));
|
|
|
|
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_network_param_id, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_network_delay, payload_tvb, offset, 4, ENC_BIG_ENDIAN);
|
|
|
|
offset += 4;
|
|
|
|
|
|
|
|
switch (param_id) {
|
|
|
|
case NETWORK_PARAM_ID_CHANNEL:
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_network_channel, payload_tvb, offset, 2, ENC_BIG_ENDIAN);
|
|
|
|
offset += 2;
|
|
|
|
break;
|
|
|
|
case NETWORK_PARAM_ID_PAN_ID:
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_network_pan_id, payload_tvb, offset, 2, ENC_BIG_ENDIAN);
|
|
|
|
offset += 2;
|
|
|
|
break;
|
|
|
|
case NETWORK_PARAM_ID_PERMIT_JOIN:
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_network_pmt_join, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
break;
|
|
|
|
case NETWORK_PARAM_ID_BCN_PAYLOAD:
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_network_bcn_payload, payload_tvb, offset, tlv_len-5, ENC_NA);
|
|
|
|
offset += tlv_len-5;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_network_unknown, payload_tvb, offset, tlv_len-5, ENC_NA);
|
|
|
|
offset += tlv_len-5;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_ROUTE64:
|
|
|
|
{
|
|
|
|
proto_tree *rtr_tree;
|
|
|
|
guint i, j;
|
|
|
|
guint8 count;
|
|
|
|
guint64 id_mask, test_mask;
|
|
|
|
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_route64_id_seq, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
|
|
|
|
/* Count number of table entries */
|
|
|
|
count = 0;
|
|
|
|
for (i = 0; i < 8; i++) { /* TODO magic - number of routers/8 */
|
|
|
|
guint8 id_mask_octet = tvb_get_guint8(payload_tvb, offset + i);
|
|
|
|
for (j = 0; j < 8; j++) {
|
|
|
|
if (id_mask_octet & (1 << j)) {
|
|
|
|
count++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* | | | | | | | | | | |1|1|1|1|1|1|...|6|
|
|
|
|
* |0|1|2|3|4|5|6|7|8|9|0|1|2|3|4|5|...|3|
|
|
|
|
* ---------------------------------------
|
|
|
|
* |1|0|1|1|1|0|0|0|1|1|0|0|0|1|0|1|...
|
|
|
|
*
|
|
|
|
* is sent as 0xb8, 0xc5
|
|
|
|
* and represents table entry for routers 0, 2, 3, 4, 8, 9, 13, 15...
|
|
|
|
*/
|
|
|
|
/* Get the ID mask as a 64-bit number (BE) */
|
|
|
|
id_mask = tvb_get_ntoh64(payload_tvb, offset);
|
|
|
|
|
|
|
|
/* Just show the string of octets - best representation for a bit mask */
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_route64_id_mask, payload_tvb, offset, 8, ENC_NA);
|
|
|
|
offset += 8;
|
|
|
|
|
|
|
|
if (count != (tlv_len - 9))
|
|
|
|
{
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
offset += (tlv_len - 9);
|
|
|
|
} else {
|
|
|
|
/* Add subtrees */
|
|
|
|
for (i = 0; i < count; i++) {
|
|
|
|
/* Find first bit set */
|
|
|
|
for (j = 0, test_mask = (G_GUINT64_CONSTANT(1) << 63); test_mask != 1; test_mask >>= 1, j++) {
|
|
|
|
if (test_mask & id_mask) {
|
|
|
|
id_mask &= ~test_mask;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_route64_entry, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_item_append_text(ti, " (%d)", j);
|
|
|
|
rtr_tree = proto_item_add_subtree(ti, ett_mle_router);
|
|
|
|
|
|
|
|
proto_tree_add_item(rtr_tree, hf_mle_tlv_route64_nbr_out, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(rtr_tree, hf_mle_tlv_route64_nbr_in, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(rtr_tree, hf_mle_tlv_route64_cost, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_ADDRESS16:
|
|
|
|
if (tlv_len != 2) {
|
|
|
|
/* TLV Length must be 2 */
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
} else {
|
|
|
|
guint16 addr16 = tvb_get_ntohs(payload_tvb, offset);
|
|
|
|
proto_item_append_text(ti, " = ");
|
|
|
|
{
|
|
|
|
guint8 a16_len = 2; /* Fix it at 2 */
|
|
|
|
guint stroffset = offset;
|
|
|
|
|
|
|
|
while (a16_len) {
|
|
|
|
guint8 a16_data;
|
|
|
|
a16_data = tvb_get_guint8(payload_tvb, stroffset);
|
|
|
|
proto_item_append_text(ti, "%02x", a16_data);
|
|
|
|
if (--a16_len) {
|
|
|
|
proto_item_append_text(ti, ":");
|
|
|
|
}
|
|
|
|
stroffset++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_addr16, payload_tvb, offset, 2, ENC_NA);
|
|
|
|
if (original_packet->dst_addr_mode == IEEE802154_FCF_ADDR_EXT) {
|
|
|
|
/* Allocated Address16 TLV: use this to update dst/long mapping */
|
|
|
|
ieee802154_addr_update(&ieee802154_map, addr16, original_packet->dst_pan, original_packet->dst64, pinfo->current_proto, pinfo->fd->num);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
offset += tlv_len;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_LEADER_DATA:
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
if (tlv_len != 8) {
|
|
|
|
/* TLV Length must be 8 */
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
offset += tlv_len;
|
|
|
|
} else {
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_partition_id, payload_tvb, offset, 4, ENC_BIG_ENDIAN);
|
|
|
|
offset += 4;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_weighting, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_version, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_stable_version, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_leader_data_router_id, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_NETWORK_DATA:
|
|
|
|
{
|
|
|
|
tvbuff_t *sub_tvb;
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
if (tlv_len > 0) {
|
|
|
|
sub_tvb = tvb_new_subset_length(payload_tvb, offset, tlv_len);
|
|
|
|
call_dissector(thread_nwd_handle, sub_tvb, pinfo, tlv_tree);
|
|
|
|
}
|
|
|
|
offset += tlv_len;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_ACTIVE_OP_DATASET:
|
|
|
|
case MLE_TLV_PENDING_OP_DATASET:
|
|
|
|
case MLE_TLV_THREAD_DISCOVERY:
|
|
|
|
{
|
|
|
|
tvbuff_t *sub_tvb;
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
if (tlv_len > 0) {
|
|
|
|
sub_tvb = tvb_new_subset_length(payload_tvb, offset, tlv_len);
|
|
|
|
call_dissector(thread_mc_handle, sub_tvb, pinfo, tlv_tree);
|
|
|
|
}
|
|
|
|
offset += tlv_len;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_TLV_REQUEST:
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
while (tlv_len) {
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_type, payload_tvb, offset, 1, ENC_NA);
|
|
|
|
offset++;
|
|
|
|
tlv_len--;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_SCAN_MASK:
|
|
|
|
if (tlv_len != 1) {
|
|
|
|
/* TLV Length must be 1 */
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
} else {
|
|
|
|
guint8 mask;
|
|
|
|
|
|
|
|
mask = tvb_get_guint8(payload_tvb, offset);
|
|
|
|
proto_item_append_text(ti, " = %02x)", mask);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_scan_mask_r, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_scan_mask_e, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
}
|
|
|
|
offset += tlv_len;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_CONNECTIVITY:
|
2017-04-12 12:17:31 +00:00
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
if ((tlv_len == 7) || (tlv_len == 10)) {
|
2017-03-17 16:59:23 +00:00
|
|
|
proto_tree *fl_tree;
|
|
|
|
|
|
|
|
ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_flags, payload_tvb, offset, 1, ENC_NA);
|
|
|
|
fl_tree = proto_item_add_subtree(ti, ett_mle_conn_flg);
|
|
|
|
proto_tree_add_item(fl_tree, hf_mle_tlv_conn_flags_pp, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_lq3, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_lq2, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_lq1, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_leader_cost, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_id_seq, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_active_rtrs, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
2017-04-12 12:17:31 +00:00
|
|
|
if (tlv_len == 10) {
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_sed_buf_size, payload_tvb, offset, 2, ENC_BIG_ENDIAN);
|
|
|
|
offset += 2;
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_conn_sed_dgram_cnt, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
}
|
2017-03-17 16:59:23 +00:00
|
|
|
} else {
|
|
|
|
/* TLV Length must be 7 (old style) or 10 */
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
offset += tlv_len;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_LINK_MARGIN:
|
|
|
|
if (tlv_len != 1) {
|
|
|
|
/* TLV Length must be 1 */
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
} else {
|
|
|
|
guint8 link_margin;
|
|
|
|
|
|
|
|
link_margin = tvb_get_guint8(payload_tvb, offset);
|
|
|
|
proto_item_append_text(ti, " = %udB)", link_margin);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_link_margin, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN);
|
|
|
|
}
|
|
|
|
offset += tlv_len;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_STATUS:
|
|
|
|
if (tlv_len != 1) {
|
|
|
|
/* TLV Length must be 1 */
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
} else {
|
|
|
|
guint8 stat;
|
|
|
|
|
|
|
|
stat = tvb_get_guint8(payload_tvb, offset);
|
|
|
|
proto_item_append_text(ti, " = %d)", stat);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_status, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN);
|
|
|
|
}
|
|
|
|
offset += tlv_len;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_VERSION:
|
|
|
|
if (tlv_len != 2) {
|
|
|
|
/* TLV Length must be 2 */
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
} else {
|
|
|
|
guint16 version;
|
|
|
|
|
|
|
|
version = tvb_get_ntohs(payload_tvb, offset);
|
|
|
|
proto_item_append_text(ti, " = %d)", version);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_version, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN);
|
|
|
|
}
|
|
|
|
offset += tlv_len;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_ADDRESS_REGISTRATION:
|
|
|
|
{
|
|
|
|
guint8 iid_type, i;
|
|
|
|
guint8 entries = 0;
|
2017-05-05 20:22:01 +00:00
|
|
|
gint16 check_len = tlv_len;
|
|
|
|
guint check_offset = offset;
|
2017-03-17 16:59:23 +00:00
|
|
|
|
|
|
|
/* Check consistency of entries */
|
|
|
|
while (check_len > 0) {
|
|
|
|
guint8 ar_len;
|
|
|
|
|
|
|
|
iid_type = tvb_get_guint8(payload_tvb, check_offset);
|
|
|
|
if (iid_type & ADDR_REG_MASK_IID_TYPE_MASK) {
|
|
|
|
ar_len = 9;
|
|
|
|
} else {
|
|
|
|
ar_len = 17;
|
|
|
|
}
|
|
|
|
check_offset += ar_len;
|
|
|
|
check_len -= ar_len;
|
|
|
|
entries++;
|
|
|
|
}
|
|
|
|
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
if (check_len != 0) {
|
|
|
|
/* Not an integer number of entries */
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
offset += tlv_len;
|
|
|
|
} else {
|
|
|
|
for (i = 0; i < entries; i++) {
|
|
|
|
proto_tree *ar_tree;
|
|
|
|
|
|
|
|
ti = proto_tree_add_item(tlv_tree, hf_mle_tlv_addr_reg_entry, payload_tvb, offset, 1, ENC_NA);
|
|
|
|
ar_tree = proto_item_add_subtree(ti, ett_mle_addr_reg);
|
|
|
|
iid_type = tvb_get_guint8(payload_tvb, offset);
|
|
|
|
if (iid_type & ADDR_REG_MASK_IID_TYPE_MASK) {
|
|
|
|
proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_iid_type, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_cid, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_iid, payload_tvb, offset, 8, ENC_NA);
|
|
|
|
offset += 8;
|
|
|
|
} else {
|
|
|
|
proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_iid_type, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
offset++;
|
|
|
|
proto_tree_add_item(ar_tree, hf_mle_tlv_addr_reg_ipv6, payload_tvb, offset, 16, ENC_NA);
|
|
|
|
offset += 16;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_CHANNEL:
|
|
|
|
{
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
|
|
|
|
/* Check length is consistent */
|
|
|
|
if (tlv_len != 3) {
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
} else {
|
|
|
|
/* Channel page */
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_channel_page, payload_tvb, offset, 1, ENC_BIG_ENDIAN);
|
|
|
|
/* Channel */
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_channel, payload_tvb, offset+1, 2, ENC_BIG_ENDIAN);
|
|
|
|
}
|
|
|
|
offset += tlv_len;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_PAN_ID:
|
|
|
|
{
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
|
|
|
|
/* Check length is consistent */
|
|
|
|
if (tlv_len != 2) {
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
} else {
|
|
|
|
/* PAN ID */
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_pan_id, payload_tvb, offset, tlv_len, ENC_BIG_ENDIAN);
|
|
|
|
}
|
|
|
|
offset += tlv_len;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MLE_TLV_ACTIVE_TSTAMP:
|
|
|
|
case MLE_TLV_PENDING_TSTAMP:
|
|
|
|
{
|
|
|
|
nstime_t timestamp;
|
|
|
|
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
|
|
|
|
if (tlv_len != 8) {
|
|
|
|
expert_add_info(pinfo, proto_root, &ei_mle_tlv_length_failed);
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
} else {
|
|
|
|
/* Fill in the nstime_t structure */
|
|
|
|
timestamp.secs = (time_t)tvb_get_ntoh48(payload_tvb, offset);
|
|
|
|
timestamp.nsecs = (int)lround((double)(tvb_get_ntohs(payload_tvb, offset + 6) >> 1) * MLE_32768_TO_NSEC_FACTOR);
|
|
|
|
if (tlv_type == MLE_TLV_ACTIVE_TSTAMP) {
|
|
|
|
proto_tree_add_time(tlv_tree, hf_mle_tlv_active_tstamp, payload_tvb, offset, 8, ×tamp);
|
|
|
|
} else {
|
|
|
|
proto_tree_add_time(tlv_tree, hf_mle_tlv_pending_tstamp, payload_tvb, offset, 8, ×tamp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
offset += tlv_len;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
proto_item_append_text(ti, ")");
|
|
|
|
proto_tree_add_item(tlv_tree, hf_mle_tlv_unknown, payload_tvb, offset, tlv_len, ENC_NA);
|
|
|
|
offset += tlv_len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return tvb_captured_length(tvb);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
proto_register_mle(void)
|
|
|
|
{
|
|
|
|
static hf_register_info hf[] = {
|
|
|
|
|
|
|
|
/* Auxiliary Security Header Fields */
|
|
|
|
/*----------------------------------*/
|
|
|
|
{ &hf_mle_security_suite,
|
|
|
|
{ "Security Suite",
|
2018-11-19 13:53:43 +00:00
|
|
|
"mle.sec_suite",
|
2017-03-17 16:59:23 +00:00
|
|
|
FT_UINT8, BASE_HEX, VALS(mle_sec_suite_names), 0x0,
|
|
|
|
"The Security Suite of the frame",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_mic,
|
|
|
|
{ "Decrypted MIC",
|
|
|
|
"mle.mic",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
"The decrypted MIC",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
/*MLE Command*/
|
|
|
|
{ &hf_mle_command,
|
|
|
|
{ "Command",
|
|
|
|
"mle.cmd",
|
|
|
|
FT_UINT8, BASE_DEC, VALS(mle_command_vals), 0x0,
|
|
|
|
"MLE command type",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Generic TLV */
|
|
|
|
{ &hf_mle_tlv,
|
|
|
|
{ "TLV",
|
|
|
|
"mle.tlv",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0x0,
|
|
|
|
"Type-Length-Value",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_type,
|
|
|
|
{ "Type",
|
|
|
|
"mle.tlv.type",
|
|
|
|
FT_UINT8, BASE_DEC, VALS(mle_tlv_vals), 0x0,
|
|
|
|
"Type of value",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_length,
|
|
|
|
{ "Length",
|
|
|
|
"mle.tlv.len",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
"Length of value",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Type-Specific TLV Fields */
|
|
|
|
{ &hf_mle_tlv_source_addr,
|
|
|
|
{ "Address",
|
|
|
|
"mle.tlv.source_addr",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
"Source address",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Capability Information Fields */
|
|
|
|
{ &hf_mle_tlv_mode_nwk_data,
|
|
|
|
{ "Network Data",
|
|
|
|
"mle.tlv.mode.nwk_data",
|
|
|
|
FT_BOOLEAN, 8, TFS(&mle_tlv_mode_nwk_data), MLE_CMD_CINFO_NWK_DATA,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_mode_device_type,
|
|
|
|
{ "Device Type",
|
|
|
|
"mle.tlv.mode.device_type",
|
|
|
|
FT_BOOLEAN, 8, TFS(&mle_tlv_mode_device_type), IEEE802154_CMD_CINFO_DEVICE_TYPE,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_mode_sec_data_req,
|
|
|
|
{ "Secure Data Requests",
|
|
|
|
"mle.tlv.mode.sec_data_req",
|
|
|
|
FT_BOOLEAN, 8, NULL, MLE_CMD_CINFO_SEC_DATA_REQ,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_mode_idle_rx,
|
|
|
|
{ "Receive On When Idle",
|
|
|
|
"mle.tlv.mode.idle_rx",
|
|
|
|
FT_BOOLEAN, 8, NULL, IEEE802154_CMD_CINFO_IDLE_RX,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_timeout,
|
|
|
|
{ "Timeout",
|
|
|
|
"mle.tlv.timeout",
|
|
|
|
FT_UINT32, BASE_DEC, NULL, 0x0,
|
|
|
|
"Expected interval between transmissions in seconds",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_challenge,
|
|
|
|
{ "Challenge",
|
|
|
|
"mle.tlv.challenge",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
"Challenge to be echoed back",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_response,
|
|
|
|
{ "Response",
|
|
|
|
"mle.tlv.response",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
"Response to a challenge",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_ll_frm_cntr,
|
|
|
|
{ "Link Layer Frame Counter",
|
|
|
|
"mle.tlv.ll_frm_cntr",
|
|
|
|
FT_UINT32, BASE_DEC, NULL, 0x0,
|
|
|
|
"The Link layer frame counter",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_mle_frm_cntr,
|
|
|
|
{ "MLE Frame Counter",
|
|
|
|
"mle.tlv.mle_frm_cntr",
|
|
|
|
FT_UINT32, BASE_DEC, NULL, 0x0,
|
|
|
|
"The MLE frame counter",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_unknown,
|
|
|
|
{ "Unknown",
|
|
|
|
"mle.tlv.unknown",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
"Unknown TLV, raw value",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_lqi_c,
|
|
|
|
{ "Complete Flag",
|
|
|
|
"mle.tlv.lqi.complete",
|
|
|
|
FT_BOOLEAN, 8, NULL, LQI_FLAGS_C,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_lqi_size,
|
|
|
|
{ "Address Size",
|
|
|
|
"mle.tlv.lqi.size",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, LQI_FLAGS_SIZE,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_neighbor,
|
|
|
|
{ "Neighbor Record",
|
|
|
|
"mle.tlv.neighbor",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_neighbor_flagI,
|
|
|
|
{ "Incoming",
|
|
|
|
"mle.tlv.neighbor.flagI",
|
|
|
|
FT_BOOLEAN, 8, NULL, NEIGHBOR_FLAG_I,
|
|
|
|
"Set if the sender has configured its link with this neighbor and will accept incoming messages from them.",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_neighbor_flagO,
|
|
|
|
{ "Outgoing",
|
|
|
|
"mle.tlv.neighbor.flagO",
|
|
|
|
FT_BOOLEAN, 8, NULL, NEIGHBOR_FLAG_O,
|
|
|
|
"Set if the sender believes that the neighbor has configured its link with the sender and will accept incoming messages from the sender.",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_neighbor_flagP,
|
|
|
|
{ "Priority",
|
|
|
|
"mle.tlv.neighbor.flagP",
|
|
|
|
FT_BOOLEAN, 8, NULL, NEIGHBOR_FLAG_P,
|
|
|
|
"Set if the sender expects to use this link for sending messages to this neighbor.",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_neighbor_idr,
|
|
|
|
{ "Inverse Delivery Ratio",
|
|
|
|
"mle.tlv.neighbor.idr",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_neighbor_addr,
|
|
|
|
{ "Address",
|
|
|
|
"mle.tlv.neighbor.addr",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_network_param_id,
|
|
|
|
{ "Parameter ID",
|
|
|
|
"mle.tlv.network.param_id",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_network_delay,
|
|
|
|
{ "Delay",
|
|
|
|
"mle.tlv.network.delay",
|
|
|
|
FT_UINT32, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_network_channel,
|
|
|
|
{ "Channel",
|
|
|
|
"mle.tlv.network.channel",
|
|
|
|
FT_UINT16, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_network_pan_id,
|
|
|
|
{ "PAN ID",
|
|
|
|
"mle.tlv.network.pan_id",
|
|
|
|
FT_UINT16, BASE_HEX, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_network_pmt_join,
|
|
|
|
{ "Permit Join",
|
|
|
|
"mle.tlv.network.pmt_join",
|
|
|
|
FT_BOOLEAN, 8, NULL, 0x1,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_network_bcn_payload,
|
|
|
|
{ "Beacon Payload",
|
|
|
|
"mle.tlv.network.bcn_payload",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_route64_id_seq,
|
|
|
|
{ "ID Sequence",
|
|
|
|
"mle.tlv.route64.id_seq",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_route64_id_mask,
|
|
|
|
{ "Assigned Router ID Mask",
|
|
|
|
"mle.tlv.route64.id_mask",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_route64_entry,
|
|
|
|
{ "Routing Table Entry",
|
|
|
|
"mle.tlv.route64",
|
|
|
|
FT_UINT8, BASE_HEX, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_route64_nbr_out,
|
|
|
|
{ "Neighbor Out Link Quality",
|
|
|
|
"mle.tlv.route64.nbr_out",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, ROUTE_TBL_OUT_MASK,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_route64_nbr_in,
|
|
|
|
{ "Neighbor In Link Quality",
|
|
|
|
"mle.tlv.route64.nbr_in",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, ROUTE_TBL_IN_MASK,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_route64_cost,
|
|
|
|
{ "Router Cost",
|
|
|
|
"mle.tlv.route64.cost",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, ROUTE_TBL_COST_MASK,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
#if 0
|
|
|
|
{ &hf_mle_tlv_route64_unknown,
|
|
|
|
{ "(unknown)",
|
|
|
|
"mle.tlv.route64.unknown",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
#endif
|
|
|
|
{ &hf_mle_tlv_addr16,
|
|
|
|
{ "Address16",
|
|
|
|
"mle.tlv.addr16",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_leader_data_partition_id,
|
|
|
|
{ "Partition ID",
|
|
|
|
"mle.tlv.leader_data.partition_id",
|
|
|
|
FT_UINT32, BASE_HEX, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_leader_data_weighting,
|
|
|
|
{ "Weighting",
|
|
|
|
"mle.tlv.leader_data.weighting",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_leader_data_version,
|
|
|
|
{ "Data Version",
|
|
|
|
"mle.tlv.leader_data.data_version",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_leader_data_stable_version,
|
|
|
|
{ "Stable Data Version",
|
|
|
|
"mle.tlv.leader_data.stable_data_version",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_leader_data_router_id,
|
|
|
|
{ "Leader Router ID",
|
|
|
|
"mle.tlv.leader_data.router_id",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
#if 0
|
|
|
|
{ &hf_mle_tlv_network_data,
|
|
|
|
{ "Network Data",
|
|
|
|
"mle.tlv.network_data",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
"Network data (opaque data)",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
#endif
|
|
|
|
{ &hf_mle_tlv_scan_mask_r,
|
|
|
|
{ "Router",
|
|
|
|
"mle.tlv.scan_mask.r",
|
|
|
|
FT_BOOLEAN, 8, NULL, SCAN_MASK_R_MASK,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_scan_mask_e,
|
|
|
|
{ "End Device",
|
|
|
|
"mle.tlv.scan_mask.e",
|
|
|
|
FT_BOOLEAN, 8, NULL, SCAN_MASK_D_MASK,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_conn_flags,
|
|
|
|
{ "Flags",
|
|
|
|
"mle.tlv.conn.flags",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_conn_flags_pp,
|
|
|
|
{ "Parent Priority",
|
|
|
|
"mle.tlv.conn.flags.pp",
|
|
|
|
FT_INT8, BASE_DEC, VALS(mle_conn_tlv_flags_pp_enums), CONN_MASK_FLAGS_PP_MASK,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_conn_lq3,
|
|
|
|
{ "Link Quality 3",
|
|
|
|
"mle.tlv.conn.lq3",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_conn_lq2,
|
|
|
|
{ "Link Quality 2",
|
|
|
|
"mle.tlv.conn.lq2",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_conn_lq1,
|
|
|
|
{ "Link Quality 1",
|
|
|
|
"mle.tlv.conn.lq1",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_conn_leader_cost,
|
|
|
|
{ "Leader Cost",
|
|
|
|
"mle.tlv.conn.leader_cost",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_conn_id_seq,
|
|
|
|
{ "ID Sequence",
|
|
|
|
"mle.tlv.conn.id_seq",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_conn_active_rtrs,
|
|
|
|
{ "Active Routers",
|
|
|
|
"mle.tlv.conn.active_rtrs",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_conn_sed_buf_size,
|
|
|
|
{ "SED Buffer Size",
|
|
|
|
"mle.tlv.conn.sed_buf_size",
|
|
|
|
FT_UINT16, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_conn_sed_dgram_cnt,
|
|
|
|
{ "SED Datagram Count",
|
|
|
|
"mle.tlv.conn.sed_dgram_cnt",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_link_margin,
|
|
|
|
{ "Link Margin",
|
|
|
|
"mle.tlv.link_margin",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0,
|
|
|
|
"Link margin in dB",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_status,
|
|
|
|
{ "Status",
|
|
|
|
"mle.tlv.status",
|
|
|
|
FT_UINT8, BASE_DEC, VALS(mle_status_tlv_enums), 0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_version,
|
|
|
|
{ "Version",
|
|
|
|
"mle.tlv.version",
|
|
|
|
FT_UINT16, BASE_DEC, NULL, 0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_addr_reg_entry,
|
|
|
|
{ "Address Registration Entry",
|
|
|
|
"mle.tlv.addr_reg",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_addr_reg_iid_type,
|
|
|
|
{ "IID type",
|
|
|
|
"mle.tlv.addr_reg_iid_type",
|
|
|
|
FT_BOOLEAN, 8, TFS(&mle_tlv_addr_reg_iid_type), ADDR_REG_MASK_IID_TYPE_MASK,
|
|
|
|
"Context ID",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_addr_reg_cid,
|
|
|
|
{ "Context ID",
|
|
|
|
"mle.tlv.addr_reg_cid",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, ADDR_REG_MASK_CID_MASK,
|
|
|
|
"6LoWPAN Context ID",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_addr_reg_iid,
|
|
|
|
{ "IID",
|
|
|
|
"mle.tlv.addr_reg_iid",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
"Interface identifier",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_addr_reg_ipv6,
|
|
|
|
{ "IPv6 Address",
|
|
|
|
"mle.tlv.addr_reg_ipv6",
|
|
|
|
FT_IPv6, BASE_NONE, NULL, 0x0,
|
|
|
|
"IID",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
#if 0
|
|
|
|
{ &hf_mle_tlv_hold_time,
|
|
|
|
{ "Hold Time",
|
|
|
|
"mle.tlv.hold_time",
|
|
|
|
FT_UINT16, BASE_DEC, NULL, 0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
#endif
|
|
|
|
{ &hf_mle_tlv_network_unknown,
|
|
|
|
{ "(unknown)",
|
|
|
|
"mle.tlv.network.unknown",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_channel_page,
|
|
|
|
{ "Channel Page",
|
|
|
|
"mle.tlv.channel_page",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_channel,
|
|
|
|
{ "Channel",
|
|
|
|
"mle.tlv.channel",
|
|
|
|
FT_UINT16, BASE_DEC, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_pan_id,
|
|
|
|
{ "PAN ID",
|
|
|
|
"mle.tlv.pan_id",
|
|
|
|
FT_UINT16, BASE_HEX, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_active_tstamp,
|
|
|
|
{ "Active Timestamp",
|
|
|
|
"mle.tlv.active_tstamp",
|
|
|
|
FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
{ &hf_mle_tlv_pending_tstamp,
|
|
|
|
{ "Pending Timestamp",
|
|
|
|
"mle.tlv.pending_tstamp",
|
|
|
|
FT_ABSOLUTE_TIME, ABSOLUTE_TIME_LOCAL, NULL, 0x0,
|
|
|
|
NULL,
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
#if 0
|
|
|
|
{ &hf_mle_tlv_active_op_dataset,
|
|
|
|
{ "Active Operational Dataset",
|
|
|
|
"mle.tlv.active_op_dataset",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
"Thread Active Operational Dataset",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
{ &hf_mle_tlv_pending_op_dataset,
|
|
|
|
{ "Pending Operational Dataset",
|
|
|
|
"mle.tlv.active_op_dataset",
|
|
|
|
FT_BYTES, BASE_NONE, NULL, 0x0,
|
|
|
|
"Thread Pending Operational Dataset",
|
|
|
|
HFILL
|
|
|
|
}
|
|
|
|
},
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
static gint *ett[] = {
|
|
|
|
&ett_mle,
|
|
|
|
&ett_mle_auxiliary_security,
|
|
|
|
&ett_mle_aux_sec_control,
|
|
|
|
&ett_mle_aux_sec_key_id,
|
|
|
|
&ett_mle_tlv,
|
|
|
|
&ett_mle_neighbor,
|
|
|
|
&ett_mle_router,
|
|
|
|
&ett_mle_addr_reg,
|
|
|
|
&ett_mle_conn_flg,
|
|
|
|
&ett_mle_thread_nwd
|
|
|
|
};
|
|
|
|
|
|
|
|
static ei_register_info ei[] = {
|
|
|
|
{ &ei_mle_cbc_mac_failed, { "mle.cbc_mac_failed", PI_UNDECODED, PI_WARN, "Call to ccm_cbc_mac() failed", EXPFILL }},
|
|
|
|
{ &ei_mle_packet_too_small, { "mle.packet_too_small", PI_UNDECODED, PI_WARN, "Packet was too small to include the CRC and MIC", EXPFILL }},
|
|
|
|
{ &ei_mle_no_key, { "mle.no_key", PI_UNDECODED, PI_WARN, "No encryption key set - can't decrypt", EXPFILL }},
|
|
|
|
{ &ei_mle_decrypt_failed, { "mle.decrypt_failed", PI_UNDECODED, PI_WARN, "Decrypt failed", EXPFILL }},
|
|
|
|
{ &ei_mle_mic_check_failed, { "mle.mic_check_failed", PI_UNDECODED, PI_WARN, "MIC check failed", EXPFILL }},
|
|
|
|
{ &ei_mle_tlv_length_failed, { "mle.tlv_length_failed", PI_UNDECODED, PI_WARN, "TLV Length inconsistent", EXPFILL }},
|
|
|
|
{ &ei_mle_len_size_mismatch, { "mle.len_size_mismatch", PI_UNDECODED, PI_WARN, "TLV Length & Size field disagree", EXPFILL }},
|
|
|
|
};
|
|
|
|
|
|
|
|
module_t *mle_module;
|
|
|
|
expert_module_t* expert_mle;
|
|
|
|
|
|
|
|
proto_mle = proto_register_protocol("Mesh Link Establishment", "MLE", "mle");
|
|
|
|
proto_register_field_array(proto_mle, hf, array_length(hf));
|
|
|
|
proto_register_subtree_array(ett, array_length(ett));
|
|
|
|
expert_mle = expert_register_protocol(proto_mle);
|
|
|
|
expert_register_field_array(expert_mle, ei, array_length(ei));
|
|
|
|
|
|
|
|
mle_handle = register_dissector("mle", dissect_mle, proto_mle);
|
|
|
|
|
|
|
|
mle_module = prefs_register_protocol(proto_mle, NULL);
|
|
|
|
|
|
|
|
prefs_register_bool_preference(mle_module, "meshlink_mic_ok",
|
|
|
|
"Dissect only good MIC",
|
|
|
|
"Dissect payload only if MIC is valid.",
|
|
|
|
&mle_mic_ok);
|
|
|
|
|
|
|
|
/* setup registration for other dissectors to provide mle key hash algorithms */
|
|
|
|
mle_key_hash_handlers = wmem_tree_new(wmem_epan_scope());
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
proto_reg_handoff_mle(void)
|
|
|
|
{
|
|
|
|
thread_nwd_handle = find_dissector_add_dependency("thread_nwd", proto_mle);
|
|
|
|
thread_mc_handle = find_dissector_add_dependency("thread_meshcop", proto_mle);
|
|
|
|
|
|
|
|
//heur_dissector_add("stun", dissect_embeddedmle_heur, proto_mle);
|
|
|
|
|
|
|
|
dissector_add_uint_range_with_preference("udp.port", UDP_PORT_MLE_RANGE, mle_handle);
|
|
|
|
|
|
|
|
proto_ieee802154 = proto_get_id_by_filter_name(IEEE802154_PROTOABBREV_WPAN);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2019-07-26 18:43:17 +00:00
|
|
|
* Editor modelines - https://www.wireshark.org/tools/modelines.html
|
2017-03-17 16:59:23 +00:00
|
|
|
*
|
|
|
|
* Local variables:
|
|
|
|
* c-basic-offset: 2
|
|
|
|
* tab-width: 8
|
|
|
|
* indent-tabs-mode: nil
|
|
|
|
* End:
|
|
|
|
*
|
|
|
|
* vi: set shiftwidth=2 tabstop=8 expandtab
|
|
|
|
* :indentSize=2:tabSize=8:noTabs=true:
|
|
|
|
*/
|