2003-03-25 22:30:19 +00:00
|
|
|
/* packet-acap.c
|
|
|
|
* Routines for ACAP packet dissection
|
2016-03-16 08:05:25 +00:00
|
|
|
* RFC 2244
|
2003-03-25 22:30:19 +00:00
|
|
|
* Copyright 2003, Brad Hards <bradh@frogmouth.net>
|
|
|
|
* Heavily based in packet-imap.c, Copyright 1999, Richard Sharpe <rsharpe@ns.aus.com>
|
|
|
|
*
|
2006-05-21 04:49:01 +00:00
|
|
|
* Wireshark - Network traffic analyzer
|
|
|
|
* By Gerald Combs <gerald@wireshark.org>
|
2003-03-25 22:30:19 +00:00
|
|
|
* Copyright 1998 Gerald Combs
|
|
|
|
*
|
|
|
|
* Copied from packet-imap.c
|
|
|
|
*
|
2018-02-12 11:23:27 +00:00
|
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
2003-03-25 22:30:19 +00:00
|
|
|
*/
|
|
|
|
|
2013-08-22 20:54:50 +00:00
|
|
|
#define NEW_PROTO_TREE_API
|
|
|
|
|
2012-09-20 02:03:38 +00:00
|
|
|
#include "config.h"
|
2003-03-25 22:30:19 +00:00
|
|
|
|
|
|
|
#include <epan/packet.h>
|
|
|
|
#include <epan/strutil.h>
|
|
|
|
|
2013-03-12 20:00:50 +00:00
|
|
|
/* Forward declarations */
|
2013-03-12 21:58:04 +00:00
|
|
|
void proto_register_acap(void);
|
|
|
|
void proto_reg_handoff_acap(void);
|
2013-03-12 20:00:50 +00:00
|
|
|
|
2013-08-22 20:54:50 +00:00
|
|
|
static dissector_handle_t acap_handle;
|
|
|
|
|
|
|
|
static header_field_info *hfi_acap = NULL;
|
|
|
|
|
|
|
|
#define HFI_ACAP HFI_INIT(proto_acap)
|
|
|
|
|
2014-10-05 19:54:49 +00:00
|
|
|
static header_field_info hfi_acap_response HFI_ACAP = {
|
|
|
|
"Response", "acap.response",
|
|
|
|
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
|
|
|
|
"TRUE if ACAP response", HFILL };
|
|
|
|
|
|
|
|
static header_field_info hfi_acap_request HFI_ACAP = {
|
|
|
|
"Request", "acap.request",
|
|
|
|
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
|
|
|
|
"TRUE if ACAP request", HFILL };
|
|
|
|
|
|
|
|
static header_field_info hfi_acap_request_tag HFI_ACAP = {
|
|
|
|
"Request Tag", "acap.request_tag",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL, HFILL };
|
|
|
|
|
|
|
|
static header_field_info hfi_acap_response_tag HFI_ACAP = {
|
|
|
|
"Response Tag", "acap.response_tag",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL, HFILL };
|
|
|
|
|
|
|
|
static header_field_info hfi_acap_request_data HFI_ACAP = {
|
|
|
|
"Request", "acap.request_data",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL, HFILL };
|
|
|
|
|
|
|
|
static header_field_info hfi_acap_response_data HFI_ACAP = {
|
|
|
|
"Response", "acap.response_data",
|
|
|
|
FT_STRING, BASE_NONE, NULL, 0x0,
|
|
|
|
NULL, HFILL };
|
2003-03-25 22:30:19 +00:00
|
|
|
|
|
|
|
static gint ett_acap = -1;
|
2003-06-11 20:04:13 +00:00
|
|
|
static gint ett_acap_reqresp = -1;
|
2003-03-25 22:30:19 +00:00
|
|
|
|
2014-10-05 19:54:49 +00:00
|
|
|
#define TCP_PORT_ACAP 674
|
2003-03-25 22:30:19 +00:00
|
|
|
|
2015-11-15 13:00:10 +00:00
|
|
|
static int
|
|
|
|
dissect_acap(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
|
2003-03-25 22:30:19 +00:00
|
|
|
{
|
2014-10-05 19:54:49 +00:00
|
|
|
gboolean is_request;
|
|
|
|
proto_tree *acap_tree, *reqresp_tree;
|
|
|
|
proto_item *ti, *hidden_item;
|
|
|
|
gint offset = 0;
|
|
|
|
const guchar *line;
|
|
|
|
gint next_offset;
|
|
|
|
int linelen;
|
|
|
|
int tokenlen;
|
|
|
|
const guchar *next_token;
|
|
|
|
|
2016-03-19 02:31:33 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If this should be a request or response, do this quick check to see if
|
|
|
|
* it begins with a string...
|
|
|
|
* Otherwise, looking for the end of line in a binary file can take a long time
|
|
|
|
* and this probably isn't ACAP
|
|
|
|
*/
|
|
|
|
if (!g_ascii_isprint(tvb_get_guint8(tvb, offset))) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-10-05 19:54:49 +00:00
|
|
|
col_set_str(pinfo->cinfo, COL_PROTOCOL, "ACAP");
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the end of the first line.
|
|
|
|
*
|
|
|
|
* Note that "tvb_find_line_end()" will return a value that is
|
|
|
|
* not longer than what's in the buffer, so the "tvb_get_ptr()"
|
|
|
|
* call won't throw an exception.
|
|
|
|
*/
|
|
|
|
linelen = tvb_find_line_end(tvb, offset, -1, &next_offset, FALSE);
|
|
|
|
line = tvb_get_ptr(tvb, offset, linelen);
|
|
|
|
|
|
|
|
if (pinfo->match_uint == pinfo->destport)
|
|
|
|
is_request = TRUE;
|
|
|
|
else
|
|
|
|
is_request = FALSE;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Put the first line from the buffer into the summary
|
|
|
|
* (but leave out the line terminator).
|
|
|
|
*/
|
|
|
|
col_add_fstr(pinfo->cinfo, COL_INFO, "%s: %s",
|
|
|
|
is_request ? "Request" : "Response",
|
2017-01-31 12:51:19 +00:00
|
|
|
format_text(wmem_packet_scope(), line, linelen));
|
2014-10-05 19:54:49 +00:00
|
|
|
|
|
|
|
if (tree) {
|
|
|
|
ti = proto_tree_add_item(tree, hfi_acap, tvb, offset, -1,
|
|
|
|
ENC_NA);
|
|
|
|
acap_tree = proto_item_add_subtree(ti, ett_acap);
|
|
|
|
|
|
|
|
if (is_request) {
|
|
|
|
hidden_item = proto_tree_add_boolean(acap_tree,
|
|
|
|
&hfi_acap_request, tvb, 0, 0, TRUE);
|
|
|
|
PROTO_ITEM_SET_HIDDEN(hidden_item);
|
|
|
|
} else {
|
|
|
|
hidden_item = proto_tree_add_boolean(acap_tree,
|
|
|
|
&hfi_acap_response, tvb, 0, 0, TRUE);
|
|
|
|
PROTO_ITEM_SET_HIDDEN(hidden_item);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Put the line into the protocol tree.
|
|
|
|
*/
|
|
|
|
ti = proto_tree_add_format_text(acap_tree, tvb, offset, next_offset - offset);
|
|
|
|
reqresp_tree = proto_item_add_subtree(ti, ett_acap_reqresp);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Show the first line as tags + requests or replies.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Extract the first token, and, if there is a first
|
|
|
|
* token, add it as the request or reply tag.
|
|
|
|
*/
|
|
|
|
tokenlen = get_token_len(line, line + linelen, &next_token);
|
|
|
|
if (tokenlen != 0) {
|
|
|
|
if (is_request) {
|
|
|
|
proto_tree_add_string(reqresp_tree, &hfi_acap_request_tag, tvb, offset,
|
2017-01-31 12:51:19 +00:00
|
|
|
tokenlen, format_text(wmem_packet_scope(), line, tokenlen));
|
2014-10-05 19:54:49 +00:00
|
|
|
} else {
|
|
|
|
proto_tree_add_string(reqresp_tree, &hfi_acap_response_tag, tvb, offset,
|
2017-01-31 12:51:19 +00:00
|
|
|
tokenlen, format_text(wmem_packet_scope(), line, tokenlen));
|
2014-10-05 19:54:49 +00:00
|
|
|
}
|
|
|
|
offset += (int)(next_token - line);
|
|
|
|
linelen -= (int)(next_token - line);
|
|
|
|
line = next_token;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Add the rest of the line as request or reply data.
|
|
|
|
*/
|
|
|
|
if (linelen != 0) {
|
|
|
|
if (is_request) {
|
|
|
|
proto_tree_add_string(reqresp_tree, &hfi_acap_request_data, tvb, offset,
|
2017-01-31 12:51:19 +00:00
|
|
|
linelen, format_text(wmem_packet_scope(), line, linelen));
|
2014-10-05 19:54:49 +00:00
|
|
|
} else {
|
|
|
|
proto_tree_add_string(reqresp_tree, &hfi_acap_response_data, tvb, offset,
|
2017-01-31 12:51:19 +00:00
|
|
|
linelen, format_text(wmem_packet_scope(), line, linelen));
|
2014-10-05 19:54:49 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX - show the rest of the frame; this requires that
|
|
|
|
* we handle literals, quoted strings, continuation
|
|
|
|
* responses, etc..
|
|
|
|
*
|
|
|
|
* This involves a state machine, and attaching
|
|
|
|
* state information to the packets.
|
|
|
|
*/
|
|
|
|
}
|
2015-11-15 13:00:10 +00:00
|
|
|
return tvb_captured_length(tvb);
|
2003-03-25 22:30:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
proto_register_acap(void)
|
|
|
|
{
|
2013-11-07 20:14:18 +00:00
|
|
|
#ifndef HAVE_HFI_SECTION_INIT
|
2014-10-05 19:54:49 +00:00
|
|
|
static header_field_info *hfi[] = {
|
|
|
|
&hfi_acap_response,
|
|
|
|
&hfi_acap_request,
|
|
|
|
&hfi_acap_request_tag,
|
|
|
|
&hfi_acap_response_tag,
|
|
|
|
&hfi_acap_request_data,
|
|
|
|
&hfi_acap_response_data,
|
|
|
|
};
|
2013-11-07 20:14:18 +00:00
|
|
|
#endif
|
2013-08-22 20:54:50 +00:00
|
|
|
|
2014-10-05 19:54:49 +00:00
|
|
|
static gint *ett[] = {
|
|
|
|
&ett_acap,
|
|
|
|
&ett_acap_reqresp,
|
|
|
|
};
|
2010-05-10 15:54:57 +00:00
|
|
|
|
2014-10-05 19:54:49 +00:00
|
|
|
int proto_acap;
|
2013-08-22 20:54:50 +00:00
|
|
|
|
2014-10-05 19:54:49 +00:00
|
|
|
proto_acap = proto_register_protocol("Application Configuration Access Protocol",
|
|
|
|
"ACAP", "acap");
|
|
|
|
hfi_acap = proto_registrar_get_nth(proto_acap);
|
2013-08-22 20:54:50 +00:00
|
|
|
|
2014-10-05 19:54:49 +00:00
|
|
|
proto_register_fields(proto_acap, hfi, array_length(hfi));
|
|
|
|
proto_register_subtree_array(ett, array_length(ett));
|
2013-08-22 20:54:50 +00:00
|
|
|
|
2015-12-09 03:49:44 +00:00
|
|
|
acap_handle = create_dissector_handle(dissect_acap, proto_acap);
|
2003-03-25 22:30:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
proto_reg_handoff_acap(void)
|
|
|
|
{
|
2016-10-07 20:25:01 +00:00
|
|
|
dissector_add_uint_with_preference("tcp.port", TCP_PORT_ACAP, acap_handle);
|
2003-03-25 22:30:19 +00:00
|
|
|
}
|
2014-10-05 19:54:49 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Editor modelines - http://www.wireshark.org/tools/modelines.html
|
|
|
|
*
|
|
|
|
* Local variables:
|
|
|
|
* c-basic-offset: 4
|
|
|
|
* tab-width: 8
|
|
|
|
* indent-tabs-mode: nil
|
|
|
|
* End:
|
|
|
|
*
|
|
|
|
* vi: set shiftwidth=4 tabstop=8 expandtab:
|
|
|
|
* :indentSize=4:tabSize=8:noTabs=true:
|
|
|
|
*/
|