2003-04-23 00:24:38 +00:00
|
|
|
/* packet-asf.c
|
|
|
|
* Routines for ASF packet dissection
|
|
|
|
*
|
|
|
|
* Duncan Laurie <duncan@sun.com>
|
|
|
|
*
|
2004-07-18 00:24:25 +00:00
|
|
|
* $Id$
|
2003-04-23 00:24:38 +00:00
|
|
|
*
|
2006-05-21 04:49:01 +00:00
|
|
|
* Wireshark - Network traffic analyzer
|
|
|
|
* By Gerald Combs <gerald@wireshark.org>
|
2003-04-23 00:24:38 +00:00
|
|
|
* Copyright 1998 Gerald Combs
|
|
|
|
*
|
|
|
|
* Copied from packet-rmcp.c
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version 2
|
|
|
|
* of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
2010-10-30 15:10:30 +00:00
|
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
|
2003-04-23 00:24:38 +00:00
|
|
|
* 02111-1307, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
2006-06-22 00:07:46 +00:00
|
|
|
#include "config.h"
|
2003-04-23 00:24:38 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <glib.h>
|
|
|
|
#include <epan/packet.h>
|
2012-04-17 22:36:50 +00:00
|
|
|
#include <epan/expert.h>
|
2010-10-29 22:37:31 +00:00
|
|
|
#include <epan/sminmpec.h>
|
2003-04-23 00:24:38 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* See
|
|
|
|
* http://www.dmtf.org/standards/standard_alert.php
|
2006-06-22 00:07:46 +00:00
|
|
|
* http://www.dmtf.org/standards/documents/ASF/DSP0136.pdf
|
2003-04-23 00:24:38 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#define RMCP_CLASS_ASF 0x06
|
|
|
|
|
|
|
|
static int proto_asf = -1;
|
|
|
|
static int hf_asf_iana = -1;
|
|
|
|
static int hf_asf_type = -1;
|
|
|
|
static int hf_asf_tag = -1;
|
|
|
|
static int hf_asf_len = -1;
|
2010-10-29 22:37:31 +00:00
|
|
|
static int hf_asf_rssp_status_code = -1;
|
|
|
|
static int hf_asf_mgt_console_id = -1;
|
|
|
|
static int hf_asf_client_id = -1;
|
|
|
|
static int hf_asf_payload = -1;
|
|
|
|
static int hf_asf_payload_type = -1;
|
|
|
|
static int hf_asf_payload_len = -1;
|
|
|
|
static int hf_asf_payload_data = -1;
|
|
|
|
static int hf_asf_auth_alg = -1;
|
|
|
|
static int hf_asf_integrity_alg = -1;
|
|
|
|
static int hf_asf_reserved = -1;
|
2003-04-23 00:24:38 +00:00
|
|
|
|
|
|
|
static dissector_handle_t data_handle;
|
|
|
|
static gint ett_asf = -1;
|
2010-10-29 22:37:31 +00:00
|
|
|
static gint ett_asf_payload = -1;
|
|
|
|
static gint ett_asf_alg_payload = -1;
|
|
|
|
|
2010-10-30 15:10:30 +00:00
|
|
|
#define ASF_TYPE_RESET 0x10
|
|
|
|
#define ASF_TYPE_PWR_UP 0x11
|
|
|
|
#define ASF_TYPE_PWR_DOWN 0x12
|
|
|
|
#define ASF_TYPE_PWR_CYCLE 0x13
|
|
|
|
#define ASF_TYPE_PRES_PONG 0x40
|
|
|
|
#define ASF_TYPE_CAP_RESP 0x41
|
|
|
|
#define ASF_TYPE_SYS_STATE_RESP 0x42
|
|
|
|
#define ASF_TYPE_OPEN_SESS_RESP 0x43
|
|
|
|
#define ASF_TYPE_CLOSE_SESS_RESP 0x44
|
|
|
|
#define ASF_TYPE_PRES_PING 0x80
|
|
|
|
#define ASF_TYPE_CAP_RQST 0x81
|
|
|
|
#define ASF_TYPE_SYS_STATE_RQST 0x82
|
|
|
|
#define ASF_TYPE_OPEN_SESS_RQST 0x83
|
|
|
|
#define ASF_TYPE_CLOSE_SESS_RQST 0x84
|
|
|
|
#define ASF_TYPE_RAKP_MSG_1 0xC0
|
|
|
|
#define ASF_TYPE_RAKP_MSG_2 0xC1
|
|
|
|
#define ASF_TYPE_RAKP_MSG_3 0xC2
|
2003-04-23 00:24:38 +00:00
|
|
|
|
|
|
|
static const value_string asf_type_vals[] = {
|
2010-10-30 15:10:30 +00:00
|
|
|
{ ASF_TYPE_RESET, "Reset" },
|
|
|
|
{ ASF_TYPE_PWR_UP, "Power-up" },
|
|
|
|
{ ASF_TYPE_PWR_DOWN, "Unconditional Power-down" },
|
|
|
|
{ ASF_TYPE_PWR_CYCLE, "Power Cycle" },
|
|
|
|
{ ASF_TYPE_PRES_PONG, "Presence Pong" },
|
|
|
|
{ ASF_TYPE_CAP_RESP, "Capabilities Response" },
|
|
|
|
{ ASF_TYPE_SYS_STATE_RESP, "System State Response" },
|
|
|
|
{ ASF_TYPE_OPEN_SESS_RESP, "Open Session Response" },
|
2010-10-29 22:37:31 +00:00
|
|
|
{ ASF_TYPE_CLOSE_SESS_RESP, "Close Session Response" },
|
2010-10-30 15:10:30 +00:00
|
|
|
{ ASF_TYPE_PRES_PING, "Presence Ping" },
|
|
|
|
{ ASF_TYPE_CAP_RQST, "Capabilities Request" },
|
|
|
|
{ ASF_TYPE_SYS_STATE_RQST, "System State Request" },
|
|
|
|
{ ASF_TYPE_OPEN_SESS_RQST, "Open Session Request" },
|
2010-10-29 22:37:31 +00:00
|
|
|
{ ASF_TYPE_CLOSE_SESS_RQST, "Close Session Request" },
|
2010-10-30 15:10:30 +00:00
|
|
|
{ ASF_TYPE_RAKP_MSG_1, "RAKP Message 1" },
|
|
|
|
{ ASF_TYPE_RAKP_MSG_2, "RAKP Message 2" },
|
|
|
|
{ ASF_TYPE_RAKP_MSG_3, "RAKP Message 3" },
|
2003-04-23 00:24:38 +00:00
|
|
|
{ 0x00, NULL }
|
|
|
|
};
|
|
|
|
|
2010-10-29 22:37:31 +00:00
|
|
|
static const value_string asf_rssp_status_code_vals[] = {
|
|
|
|
{ 0x00, "No errors" },
|
|
|
|
{ 0x01, "Insufficient resources to create a session" },
|
|
|
|
{ 0x02, "Invalid session ID" },
|
|
|
|
{ 0x03, "Invalid payload type" },
|
|
|
|
{ 0x04, "Invalid authentication algorithm" },
|
|
|
|
{ 0x05, "Invalid integrity algorithm" },
|
|
|
|
{ 0x06, "No matching authentication payload" },
|
|
|
|
{ 0x07, "No matching integrity payload" },
|
|
|
|
{ 0x00, NULL }
|
|
|
|
};
|
|
|
|
|
2010-10-30 15:10:30 +00:00
|
|
|
#define ASF_PAYLOAD_TYPE_NONE 0x00
|
|
|
|
#define ASF_PAYLOAD_TYPE_AUTHENTICATION 0x01
|
|
|
|
#define ASF_PAYLOAD_TYPE_INTEGRITY 0x02
|
2010-10-29 22:37:31 +00:00
|
|
|
|
|
|
|
static const value_string asf_payload_type_vals[] = {
|
2010-10-30 15:10:30 +00:00
|
|
|
{ ASF_PAYLOAD_TYPE_NONE, "No payload present (end of list)" },
|
2010-10-29 22:37:31 +00:00
|
|
|
{ ASF_PAYLOAD_TYPE_AUTHENTICATION, "Authentication algorithm payload" },
|
2010-10-30 15:10:30 +00:00
|
|
|
{ ASF_PAYLOAD_TYPE_INTEGRITY, "Integrity algorithm payload" },
|
2010-10-29 22:37:31 +00:00
|
|
|
{ 0x00, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
static const value_string asf_authentication_type_vals[] = {
|
|
|
|
{ 0x01, "RAKP-HMAC-SHA1" },
|
|
|
|
{ 0x00, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
static const value_string asf_integrity_type_vals[] = {
|
|
|
|
{ 0x01, "HMAC-SHA1-96" },
|
|
|
|
{ 0x00, NULL }
|
|
|
|
};
|
|
|
|
|
2012-04-17 22:36:50 +00:00
|
|
|
static void dissect_asf_open_session_request(tvbuff_t *tvb, packet_info *pinfo,
|
|
|
|
proto_tree *tree, gint offset, gint len);
|
|
|
|
static void dissect_asf_open_session_response(tvbuff_t *tvb, packet_info *pinfo,
|
|
|
|
proto_tree *tree, gint offset, gint len);
|
|
|
|
static void dissect_asf_payloads(tvbuff_t *tvb, packet_info *pinfo,
|
|
|
|
proto_tree *tree, gint offset, gint len);
|
2010-10-29 22:37:31 +00:00
|
|
|
static void dissect_asf_payload_authentication(tvbuff_t *tvb, proto_tree *tree,
|
|
|
|
gint offset, gint len);
|
|
|
|
static void dissect_asf_payload_integrity(tvbuff_t *tvb, proto_tree *tree,
|
|
|
|
gint offset, gint len);
|
|
|
|
|
2010-10-30 03:34:29 +00:00
|
|
|
static int
|
2003-04-23 00:24:38 +00:00
|
|
|
dissect_asf(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
|
|
|
|
{
|
2010-10-30 15:10:30 +00:00
|
|
|
proto_tree *asf_tree = NULL;
|
|
|
|
proto_item *ti;
|
|
|
|
guint8 type;
|
|
|
|
guint8 len;
|
|
|
|
tvbuff_t *next_tvb;
|
2003-04-23 00:24:38 +00:00
|
|
|
|
2009-08-09 06:26:46 +00:00
|
|
|
col_set_str(pinfo->cinfo, COL_PROTOCOL, "ASF");
|
2003-04-23 00:24:38 +00:00
|
|
|
|
2009-08-09 07:36:13 +00:00
|
|
|
col_clear(pinfo->cinfo, COL_INFO);
|
2003-04-23 00:24:38 +00:00
|
|
|
|
|
|
|
type = tvb_get_guint8(tvb, 4);
|
|
|
|
len = tvb_get_guint8(tvb, 7);
|
|
|
|
|
2011-09-26 05:52:58 +00:00
|
|
|
col_add_str(pinfo->cinfo, COL_INFO,
|
|
|
|
val_to_str(type, asf_type_vals, "Unknown (0x%02x)"));
|
2003-04-23 00:24:38 +00:00
|
|
|
|
|
|
|
if (tree) {
|
2011-10-21 02:10:19 +00:00
|
|
|
ti = proto_tree_add_item(tree, proto_asf, tvb, 0, 8,ENC_NA);
|
2003-04-23 00:24:38 +00:00
|
|
|
asf_tree = proto_item_add_subtree(ti, ett_asf);
|
2011-09-26 05:52:58 +00:00
|
|
|
proto_tree_add_item(asf_tree, hf_asf_iana, tvb, 0, 4,ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(asf_tree, hf_asf_type, tvb, 4, 1,ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(asf_tree, hf_asf_tag, tvb, 5, 1,ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(asf_tree, hf_asf_len, tvb, 7, 1,ENC_BIG_ENDIAN);
|
2003-04-23 00:24:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (len) {
|
2010-10-29 22:37:31 +00:00
|
|
|
switch(type) {
|
|
|
|
case ASF_TYPE_OPEN_SESS_RQST:
|
2012-04-17 22:36:50 +00:00
|
|
|
dissect_asf_open_session_request(tvb, pinfo, asf_tree, 8, len);
|
2010-10-29 22:37:31 +00:00
|
|
|
break;
|
|
|
|
case ASF_TYPE_OPEN_SESS_RESP:
|
2012-04-17 22:36:50 +00:00
|
|
|
dissect_asf_open_session_response(tvb, pinfo, asf_tree, 8, len);
|
2010-10-29 22:37:31 +00:00
|
|
|
break;
|
2010-10-30 15:10:30 +00:00
|
|
|
|
2010-10-29 22:37:31 +00:00
|
|
|
/* TODO: Add the rest as captures become available to test. */
|
2010-10-30 15:10:30 +00:00
|
|
|
|
2010-10-29 22:37:31 +00:00
|
|
|
default:
|
|
|
|
next_tvb = tvb_new_subset(tvb, 8, len, len);
|
|
|
|
call_dissector(data_handle, next_tvb, pinfo, tree);
|
|
|
|
break;
|
|
|
|
}
|
2003-04-23 00:24:38 +00:00
|
|
|
}
|
2010-10-30 03:34:29 +00:00
|
|
|
return 8 + len;
|
2010-10-29 22:37:31 +00:00
|
|
|
}
|
|
|
|
|
2010-10-30 15:10:30 +00:00
|
|
|
static void
|
2012-04-17 22:36:50 +00:00
|
|
|
dissect_asf_open_session_request(tvbuff_t *tvb, packet_info *pinfo,
|
|
|
|
proto_tree *tree, gint offset, gint len)
|
2010-10-29 22:37:31 +00:00
|
|
|
{
|
2011-09-26 05:52:58 +00:00
|
|
|
proto_tree_add_item(tree, hf_asf_mgt_console_id, tvb, offset, 4,ENC_BIG_ENDIAN);
|
2010-10-29 22:37:31 +00:00
|
|
|
offset += 4;
|
2010-10-30 15:10:30 +00:00
|
|
|
len -= 4;
|
2012-04-17 22:36:50 +00:00
|
|
|
dissect_asf_payloads(tvb, pinfo, tree, offset, len);
|
2010-10-29 22:37:31 +00:00
|
|
|
}
|
|
|
|
|
2010-10-30 15:10:30 +00:00
|
|
|
static void
|
2012-04-17 22:36:50 +00:00
|
|
|
dissect_asf_open_session_response(tvbuff_t *tvb, packet_info *pinfo,
|
|
|
|
proto_tree *tree, gint offset, gint len)
|
2010-10-29 22:37:31 +00:00
|
|
|
{
|
2011-09-26 05:52:58 +00:00
|
|
|
proto_tree_add_item(tree, hf_asf_rssp_status_code, tvb, offset, 1,ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(tree, hf_asf_mgt_console_id, tvb, offset + 4, 4,ENC_BIG_ENDIAN);
|
|
|
|
proto_tree_add_item(tree, hf_asf_client_id, tvb, offset + 8, 4,ENC_BIG_ENDIAN);
|
2010-10-29 22:37:31 +00:00
|
|
|
offset += 12;
|
2010-10-30 15:10:30 +00:00
|
|
|
len -= 12;
|
2012-04-17 22:36:50 +00:00
|
|
|
dissect_asf_payloads(tvb, pinfo, tree, offset, len);
|
2010-10-30 15:10:30 +00:00
|
|
|
}
|
2010-10-29 22:37:31 +00:00
|
|
|
|
2010-10-30 15:10:30 +00:00
|
|
|
static void
|
2012-04-17 22:36:50 +00:00
|
|
|
dissect_asf_payloads(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree,
|
2010-10-29 22:37:31 +00:00
|
|
|
gint offset, gint len)
|
|
|
|
{
|
2010-10-30 15:10:30 +00:00
|
|
|
guint8 ptype;
|
|
|
|
guint16 plen;
|
2010-10-29 22:37:31 +00:00
|
|
|
proto_item *ti;
|
|
|
|
proto_tree *ptree;
|
|
|
|
|
|
|
|
while ( len >= 4 )
|
|
|
|
{
|
|
|
|
ptype = tvb_get_guint8(tvb, offset);
|
|
|
|
plen = tvb_get_ntohs(tvb, offset + 2);
|
2010-10-30 15:10:30 +00:00
|
|
|
|
2010-10-29 22:37:31 +00:00
|
|
|
ti = proto_tree_add_none_format(tree, hf_asf_payload, tvb, offset,
|
|
|
|
plen, "%s: %u bytes",
|
|
|
|
val_to_str(ptype, asf_payload_type_vals, "Unknown (%u)"), plen);
|
|
|
|
ptree = proto_item_add_subtree(ti, ett_asf_payload);
|
2011-09-26 05:52:58 +00:00
|
|
|
proto_tree_add_item(ptree, hf_asf_payload_type, tvb, offset, 1,ENC_BIG_ENDIAN);
|
2012-04-17 22:36:50 +00:00
|
|
|
ti = proto_tree_add_item(ptree, hf_asf_payload_len, tvb, offset + 2, 2,ENC_BIG_ENDIAN);
|
|
|
|
if (plen < 4)
|
|
|
|
{
|
|
|
|
expert_add_info_format(pinfo, ti, PI_MALFORMED,
|
|
|
|
PI_ERROR,
|
|
|
|
"Payload length too short to include the type and length");
|
|
|
|
break;
|
|
|
|
}
|
2010-10-29 22:37:31 +00:00
|
|
|
if ( ptype && (plen > 4) )
|
|
|
|
{
|
|
|
|
switch ( ptype )
|
|
|
|
{
|
|
|
|
case ASF_PAYLOAD_TYPE_AUTHENTICATION:
|
|
|
|
dissect_asf_payload_authentication(tvb, ptree,
|
|
|
|
offset + 4, plen - 4);
|
|
|
|
break;
|
|
|
|
case ASF_PAYLOAD_TYPE_INTEGRITY:
|
|
|
|
dissect_asf_payload_integrity(tvb, ptree,
|
|
|
|
offset + 4, plen - 4);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
proto_tree_add_item(ptree, hf_asf_payload_data, tvb,
|
2011-10-04 22:44:31 +00:00
|
|
|
offset + 4, plen - 4,ENC_NA);
|
2010-10-29 22:37:31 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
offset += plen;
|
2010-10-30 15:10:30 +00:00
|
|
|
len -= plen;
|
2010-10-29 22:37:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-10-30 15:10:30 +00:00
|
|
|
static void
|
|
|
|
dissect_asf_payload_authentication(tvbuff_t *tvb, proto_tree *tree,
|
2010-10-29 22:37:31 +00:00
|
|
|
gint offset, gint len)
|
|
|
|
{
|
2010-10-30 15:10:30 +00:00
|
|
|
guint8 alg;
|
2010-10-29 22:37:31 +00:00
|
|
|
proto_item *ti;
|
|
|
|
proto_tree *atree;
|
|
|
|
|
|
|
|
alg = tvb_get_guint8(tvb, offset);
|
|
|
|
ti = proto_tree_add_none_format(tree, hf_asf_payload_data, tvb, offset,
|
|
|
|
len, "Authentication Algorithm: %s",
|
|
|
|
val_to_str(alg, asf_authentication_type_vals, "Unknown (%u)"));
|
|
|
|
atree = proto_item_add_subtree(ti, ett_asf_alg_payload);
|
2011-09-26 05:52:58 +00:00
|
|
|
proto_tree_add_item(atree, hf_asf_auth_alg, tvb, offset, 1,ENC_BIG_ENDIAN);
|
2011-10-04 22:44:31 +00:00
|
|
|
proto_tree_add_item(atree, hf_asf_reserved, tvb, offset + 1, len - 1,ENC_NA);
|
2010-10-29 22:37:31 +00:00
|
|
|
}
|
|
|
|
|
2010-10-30 15:10:30 +00:00
|
|
|
static void
|
|
|
|
dissect_asf_payload_integrity(tvbuff_t *tvb, proto_tree *tree,
|
2010-10-29 22:37:31 +00:00
|
|
|
gint offset, gint len)
|
|
|
|
{
|
2010-10-30 15:10:30 +00:00
|
|
|
guint8 alg;
|
2010-10-29 22:37:31 +00:00
|
|
|
proto_item *ti;
|
|
|
|
proto_tree *atree;
|
|
|
|
|
|
|
|
alg = tvb_get_guint8(tvb, offset);
|
|
|
|
ti = proto_tree_add_none_format(tree, hf_asf_payload_data, tvb, offset,
|
|
|
|
len, "Integrity Algorithm: %s",
|
|
|
|
val_to_str(alg, asf_integrity_type_vals, "Unknown (%u)"));
|
|
|
|
atree = proto_item_add_subtree(ti, ett_asf_alg_payload);
|
2011-09-26 05:52:58 +00:00
|
|
|
proto_tree_add_item(atree, hf_asf_integrity_alg, tvb, offset, 1,ENC_BIG_ENDIAN);
|
2011-10-04 22:44:31 +00:00
|
|
|
proto_tree_add_item(atree, hf_asf_reserved, tvb, offset + 1, len - 1,ENC_NA);
|
2003-04-23 00:24:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
proto_register_asf(void)
|
|
|
|
{
|
|
|
|
static hf_register_info hf[] = {
|
|
|
|
{ &hf_asf_iana, {
|
|
|
|
"IANA Enterprise Number", "asf.iana",
|
2010-10-29 22:37:31 +00:00
|
|
|
FT_UINT32, BASE_DEC|BASE_EXT_STRING, &sminmpec_values_ext, 0,
|
2010-10-30 01:09:17 +00:00
|
|
|
NULL, HFILL }},
|
2003-04-23 00:24:38 +00:00
|
|
|
{ &hf_asf_type, {
|
|
|
|
"Message Type", "asf.type",
|
|
|
|
FT_UINT8, BASE_HEX, VALS(asf_type_vals), 0,
|
|
|
|
"ASF Message Type", HFILL }},
|
|
|
|
{ &hf_asf_tag, {
|
|
|
|
"Message Tag", "asf.tag",
|
|
|
|
FT_UINT8, BASE_HEX, NULL, 0,
|
|
|
|
"ASF Message Tag", HFILL }},
|
|
|
|
{ &hf_asf_len, {
|
|
|
|
"Data Length", "asf.len",
|
|
|
|
FT_UINT8, BASE_DEC, NULL, 0,
|
|
|
|
"ASF Data Length", HFILL }},
|
2010-10-29 22:37:31 +00:00
|
|
|
{ &hf_asf_rssp_status_code, {
|
|
|
|
"Status Code", "asf.rssp_status_code",
|
|
|
|
FT_UINT8, BASE_DEC, VALS(asf_rssp_status_code_vals), 0,
|
|
|
|
"Identifies the status of the previous message", HFILL }},
|
|
|
|
{ &hf_asf_mgt_console_id, {
|
|
|
|
"Mgt Console Session ID", "asf.mgt_console_id",
|
|
|
|
FT_UINT32, BASE_DEC, NULL, 0,
|
|
|
|
NULL, HFILL }},
|
|
|
|
{ &hf_asf_client_id, {
|
|
|
|
"Managed Client Session ID", "asf.client_id",
|
|
|
|
FT_UINT32, BASE_DEC, NULL, 0,
|
|
|
|
NULL, HFILL }},
|
|
|
|
{ &hf_asf_payload, {
|
|
|
|
"Payload", "asf.payload",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
NULL, HFILL }},
|
|
|
|
{ &hf_asf_payload_type, {
|
|
|
|
"Payload Type", "asf.payload.type",
|
|
|
|
FT_UINT8, BASE_DEC, VALS(asf_payload_type_vals), 0,
|
|
|
|
"Identifies the type of payload that follows", HFILL }},
|
|
|
|
{ &hf_asf_payload_len, {
|
|
|
|
"Payload Length", "asf.payload.len",
|
|
|
|
FT_UINT16, BASE_DEC, NULL, 0,
|
|
|
|
"The total length in bytes of the payload including the header",
|
|
|
|
HFILL }},
|
|
|
|
{ &hf_asf_payload_data, {
|
|
|
|
"Data", "asf.payload.data",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
NULL, HFILL }},
|
|
|
|
{ &hf_asf_auth_alg, {
|
|
|
|
"Authentication Algorithm", "asf.auth_alg",
|
|
|
|
FT_UINT8, BASE_DEC, VALS(asf_authentication_type_vals), 0,
|
|
|
|
NULL, HFILL }},
|
|
|
|
{ &hf_asf_integrity_alg, {
|
|
|
|
"Integrity Algorithm", "asf.integrity_alg",
|
|
|
|
FT_UINT8, BASE_DEC, VALS(asf_integrity_type_vals), 0,
|
|
|
|
NULL, HFILL }},
|
|
|
|
{ &hf_asf_reserved, {
|
|
|
|
"Reserved", "asf.reserved",
|
|
|
|
FT_NONE, BASE_NONE, NULL, 0,
|
|
|
|
NULL, HFILL }},
|
2003-04-23 00:24:38 +00:00
|
|
|
};
|
|
|
|
static gint *ett[] = {
|
|
|
|
&ett_asf,
|
2010-10-29 22:37:31 +00:00
|
|
|
&ett_asf_payload,
|
|
|
|
&ett_asf_alg_payload
|
2003-04-23 00:24:38 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
proto_asf = proto_register_protocol(
|
|
|
|
"Alert Standard Forum", "ASF", "asf");
|
|
|
|
|
|
|
|
proto_register_field_array(proto_asf, hf, array_length(hf));
|
|
|
|
proto_register_subtree_array(ett, array_length(ett));
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
proto_reg_handoff_asf(void)
|
|
|
|
{
|
|
|
|
dissector_handle_t asf_handle;
|
|
|
|
|
|
|
|
data_handle = find_dissector("data");
|
2003-06-04 08:51:36 +00:00
|
|
|
|
2010-10-30 15:10:30 +00:00
|
|
|
asf_handle = new_create_dissector_handle(dissect_asf, proto_asf);
|
2010-12-20 05:35:29 +00:00
|
|
|
dissector_add_uint("rmcp.class", RMCP_CLASS_ASF, asf_handle);
|
2003-04-23 00:24:38 +00:00
|
|
|
}
|