wireshark/epan/dissectors/packet-nordic_ble.c

706 lines
26 KiB
C

/* packet-nordic_ble.c
* Routines for Nordic BLE sniffer dissection
*
* Copyright (c) 2016-2018 Nordic Semiconductor.
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
/* Nordic BLE Sniffer packet format: BoardID + Header + Payload
*
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | BoardID (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
*
* Header version 0 (legacy):
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Packet ID (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Packet counter (LSB) |
* | (2 bytes) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Unused |
* | (2 bytes) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Length of payload (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
*
* Header version 1:
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Length of header (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Length of payload (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Protocol version (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Packet counter (LSB) |
* | (2 bytes) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Packet ID (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
*
* Header version 2:
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Length of payload (little endian) |
* | (2 bytes) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Protocol version (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Packet counter (little endian) |
* | (2 bytes) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Packet ID (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
*
* Packet ID:
* 0x00 = REQ_FOLLOW
* Host tells the Sniffer to only send packets received from a specific
* address.
* 0x01 = EVENT_FOLLOW
* Sniffer tells the Host that it has entered the FOLLOW state.
* 0x05 = EVENT_CONNECT
* Sniffer tells the Host that someone has connected to the unit we
* are following.
* 0x06 = EVENT_PACKET
* Sniffer tells the Host that it has received a packet.
* 0x07 = REQ_SCAN_CONT
* Host tells the Sniffer to scan continuously and hand over the
* packets ASAP.
* 0x09 = EVENT_DISCONNECT
* Sniffer tells the Host that the connected address we were following
* has received a disconnect packet.
* 0x0C = SET_TEMPORARY_KEY
* Specify a temporary key to use on encryption (for OOB and passkey).
* 0x0D = PING_REQ
* 0x0E = PING_RESP
* 0x13 = SWITCH_BAUD_RATE_REQ
* 0x14 = SWITCH_BAUD_RATE_RESP
* 0x17 = SET_ADV_CHANNEL_HOP_SEQ
* Host tells the Sniffer which order to cycle through the channels
* when following an advertiser.
* 0xFE = GO_IDLE
* Host tell the Sniffer to stop sending UART traffic and listen for
* new commands.
*
* Payloads:
*
* EVENT_PACKET (ID 0x06):
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Length of payload data (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Flags (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Channel (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | RSSISample (dBm) (1 byte) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | Event counter |
* | (2 bytes) |
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | |
* | Delta time (us end to start) |
* | (4 bytes) |
* | |
* +--------+--------+--------+--------+--------+--------+--------+--------+
*
* +--------+--------+--------+--------+--------+--------+--------+--------+
* | |
* | Bluetooth Low Energy Link Layer Packet (excluding preamble) |
* | ... |
* | |
* +--------+--------+--------+--------+--------+--------+--------+--------+
*
* Flags:
* 0000000x = CRC (0 = Incorrect, 1 = OK)
* 000000x0 = Direction (0 = Slave -> Master, 1 = Master -> Slave)
* 00000x00 = Encrypted (0 = No, 1 = Yes)
* 0000x000 = MIC (0 = Incorrect, 1 = OK)
* 0xxx0000 = PHY (0 = 1M, 1 = 2M, 2 = Coded, rest unused)
* x0000000 = RFU
*
* Channel:
* The channel index being used.
*
* RSSIsample:
* RSSI sample raw value. The value of this register is read as a
* positive value while the actual received signal strength is a
* negative value. Actual received signal strength is therefore
* as follows: rssi = -RSSISAMPLE dBm
*
* Delta time:
* This is the time in micro seconds from the end of the previous received
* packet to the beginning of this packet.
*/
#include "config.h"
#include <epan/packet.h>
#include <epan/expert.h>
#include <epan/proto_data.h>
#include <wsutil/utf8_entities.h>
#include <wiretap/wtap.h>
#include "packet-btle.h"
/* Size of various UART Packet header fields */
#define UART_HEADER_LEN 6
#define EVENT_PACKET_LEN 10
#define US_PER_BYTE_1M_PHY 8
#define US_PER_BYTE_2M_PHY 4
#define PREAMBLE_LEN_1M_PHY 1
#define PREAMBLE_LEN_2M_PHY 2
void proto_reg_handoff_nordic_ble(void);
void proto_register_nordic_ble(void);
/* Initialize the protocol and registered fields */
static int proto_nordic_ble = -1;
/* Initialize the subtree pointers */
static gint ett_nordic_ble = -1;
static gint ett_packet_header = -1;
static gint ett_flags = -1;
static int hf_nordic_ble_board_id = -1;
static int hf_nordic_ble_legacy_marker = -1;
static int hf_nordic_ble_header = -1;
static int hf_nordic_ble_header_length = -1;
static int hf_nordic_ble_payload_length = -1;
static int hf_nordic_ble_protover = -1;
static int hf_nordic_ble_packet_counter = -1;
static int hf_nordic_ble_packet_id = -1;
static int hf_nordic_ble_packet_length = -1;
static int hf_nordic_ble_flags = -1;
static int hf_nordic_ble_crcok = -1;
static int hf_nordic_ble_encrypted = -1;
static int hf_nordic_ble_micok = -1;
static int hf_nordic_ble_mic_not_relevant = -1;
static int hf_nordic_ble_le_phy = -1;
static int hf_nordic_ble_rfu = -1;
static int hf_nordic_ble_direction = -1;
static int hf_nordic_ble_channel = -1;
static int hf_nordic_ble_rssi = -1;
static int hf_nordic_ble_event_counter = -1;
static int hf_nordic_ble_delta_time = -1;
static int hf_nordic_ble_delta_time_ss = -1;
static expert_field ei_nordic_ble_bad_crc = EI_INIT;
static expert_field ei_nordic_ble_bad_mic = EI_INIT;
static expert_field ei_nordic_ble_bad_length = EI_INIT;
static expert_field ei_nordic_ble_unknown_version = EI_INIT;
static const true_false_string direction_tfs =
{
"Master -> Slave",
"Slave -> Master"
};
static const true_false_string ok_incorrect =
{
"OK",
"Incorrect"
};
static const true_false_string not_relevant =
{
"Only relevant when encrypted",
"Only relevant when encrypted"
};
static const value_string le_phys[] =
{
{ 0, "LE 1M" },
{ 1, "LE 2M" },
{ 2, "LE Coded" },
{ 3, "Reserved" },
{ 4, "Reserved" },
{ 5, "Reserved" },
{ 6, "Reserved" },
{ 7, "Reserved" },
{ 0, NULL }
};
#define LE_1M_PHY 0
#define LE_2M_PHY 1
#define LE_CODED_PHY 2
typedef struct {
guint8 protover;
guint8 phy;
gboolean bad_length;
guint16 payload_length;
guint16 event_packet_length;
} nordic_ble_context_t;
/* next dissector */
static dissector_handle_t btle_dissector_handle = NULL;
static dissector_handle_t debug_handle = NULL;
static gint
dissect_lengths(tvbuff_t *tvb, gint offset, packet_info *pinfo, proto_tree *tree, nordic_ble_context_t *nordic_ble_context)
{
guint32 hlen, plen;
proto_item* item;
switch (nordic_ble_context->protover) {
case 0: /* Legacy version */
hlen = 2 + UART_HEADER_LEN; /* 2 bytes legacy marker + UART header */
item = proto_tree_add_item_ret_uint(tree, hf_nordic_ble_payload_length, tvb, offset, 1, ENC_NA, &plen);
offset += 1;
break;
case 1:
proto_tree_add_item_ret_uint(tree, hf_nordic_ble_header_length, tvb, offset, 1, ENC_NA, &hlen);
hlen += 1; /* Add one byte for board id */
offset += 1;
item = proto_tree_add_item_ret_uint(tree, hf_nordic_ble_payload_length, tvb, offset, 1, ENC_NA, &plen);
offset += 1;
break;
case 2:
hlen = 1 + UART_HEADER_LEN; /* Board ID + UART header */
item = proto_tree_add_item_ret_uint(tree, hf_nordic_ble_payload_length, tvb, offset, 2, ENC_LITTLE_ENDIAN, &plen);
offset += 2;
break;
default:
return offset;
}
if ((hlen + plen) != tvb_captured_length(tvb)) {
expert_add_info(pinfo, item, &ei_nordic_ble_bad_length);
nordic_ble_context->bad_length = TRUE;
}
nordic_ble_context->payload_length = plen;
return offset;
}
static gint
dissect_flags(tvbuff_t *tvb, gint offset, packet_info *pinfo, proto_tree *tree, nordic_ble_context_t *nordic_ble_context, btle_context_t *context)
{
guint8 flags;
gboolean dir, encrypted;
proto_item *flags_item, *item;
proto_tree *flags_tree;
context->crc_checked_at_capture = 1;
context->pdu_type = BTLE_PDU_TYPE_UNKNOWN;
flags = tvb_get_guint8(tvb, offset);
context->crc_valid_at_capture = !!(flags & 1);
dir = !!(flags & 2);
encrypted = !!(flags & 4);
context->mic_valid_at_capture = !!(flags & 8);
nordic_ble_context->phy = (flags >> 4) & 7;
if (dir) {
set_address(&pinfo->src, AT_STRINGZ, 7, "Master");
set_address(&pinfo->dst, AT_STRINGZ, 6, "Slave");
context->direction = BTLE_DIR_MASTER_SLAVE;
pinfo->p2p_dir = P2P_DIR_SENT;
} else {
set_address(&pinfo->src, AT_STRINGZ, 6, "Slave");
set_address(&pinfo->dst, AT_STRINGZ, 7, "Master");
context->direction = BTLE_DIR_SLAVE_MASTER;
pinfo->p2p_dir = P2P_DIR_RECV;
}
flags_item = proto_tree_add_item(tree, hf_nordic_ble_flags, tvb, offset, 1, ENC_NA);
flags_tree = proto_item_add_subtree(flags_item, ett_flags);
item = proto_tree_add_item(flags_tree, hf_nordic_ble_crcok, tvb, offset, 1, ENC_NA);
if (!context->crc_valid_at_capture) {
/* CRC is bad */
expert_add_info(pinfo, item, &ei_nordic_ble_bad_crc);
}
proto_tree_add_item(flags_tree, hf_nordic_ble_direction, tvb, offset, 1, ENC_NA);
proto_tree_add_item(flags_tree, hf_nordic_ble_encrypted, tvb, offset, 1, ENC_NA);
if (encrypted) /* if encrypted, add MIC status */
{
context->mic_checked_at_capture = 1;
item = proto_tree_add_item(flags_tree, hf_nordic_ble_micok, tvb, offset, 1, ENC_NA);
if (!context->mic_valid_at_capture) {
/* MIC is bad */
expert_add_info(pinfo, item, &ei_nordic_ble_bad_mic);
}
} else {
proto_tree_add_item(flags_tree, hf_nordic_ble_mic_not_relevant, tvb, offset, 1, ENC_NA);
}
proto_tree_add_item(flags_tree, hf_nordic_ble_le_phy, tvb, offset, 1, ENC_NA);
proto_tree_add_item(flags_tree, hf_nordic_ble_rfu, tvb, offset, 1, ENC_NA);
offset++;
return offset;
}
static gint
dissect_ble_delta_time(tvbuff_t *tvb, gint offset, packet_info *pinfo, proto_tree *tree, nordic_ble_context_t *nordic_ble_context)
{
static guint32 previous_ble_packet_time;
guint32 delta_time, delta_time_ss, prev_packet_time;
proto_item *pi;
/* end-to-start */
proto_tree_add_item_ret_uint(tree, hf_nordic_ble_delta_time, tvb, offset, 4, ENC_LITTLE_ENDIAN, &delta_time);
if (!pinfo->fd->visited) {
/* First time visiting this packet, store previous BLE packet time */
p_add_proto_data(wmem_file_scope(), pinfo, proto_nordic_ble, 0, GUINT_TO_POINTER(previous_ble_packet_time));
prev_packet_time = previous_ble_packet_time;
} else {
prev_packet_time = GPOINTER_TO_UINT(p_get_proto_data(wmem_file_scope(), pinfo, proto_nordic_ble, 0));
}
if (pinfo->num > 1) {
/* Calculated start-to-start is not valid for the first packet because we don't have the previous packet */
delta_time_ss = prev_packet_time + delta_time;
pi = proto_tree_add_uint(tree, hf_nordic_ble_delta_time_ss, tvb, offset, 4, delta_time_ss);
proto_item_set_generated(pi);
}
offset += 4;
if (!pinfo->fd->visited) {
/* Calculate packet time according to this packets PHY */
guint16 ble_payload_length = nordic_ble_context->payload_length - nordic_ble_context->event_packet_length;
if (nordic_ble_context->phy == LE_1M_PHY) {
previous_ble_packet_time = US_PER_BYTE_1M_PHY * (PREAMBLE_LEN_1M_PHY + ble_payload_length);
} else if (nordic_ble_context->phy == LE_2M_PHY) {
previous_ble_packet_time = US_PER_BYTE_2M_PHY * (PREAMBLE_LEN_2M_PHY + ble_payload_length);
} else {
previous_ble_packet_time = 0; /* Unknown */
}
}
return offset;
}
static gint
dissect_packet_counter(tvbuff_t *tvb, gint offset, proto_item *item, proto_tree *tree)
{
proto_item_append_text(item, ", Packet counter: %u", tvb_get_guint16(tvb, offset, ENC_LITTLE_ENDIAN));
proto_tree_add_item(tree, hf_nordic_ble_packet_counter, tvb, offset, 2, ENC_LITTLE_ENDIAN);
offset += 2;
return offset;
}
static gint
dissect_packet_header(tvbuff_t *tvb, gint offset, packet_info *pinfo, proto_tree *tree, nordic_ble_context_t *nordic_ble_context)
{
proto_item *ti;
proto_tree *header_tree;
gint start_offset = offset;
ti = proto_tree_add_item(tree, hf_nordic_ble_header, tvb, offset, -1, ENC_NA);
header_tree = proto_item_add_subtree(ti, ett_packet_header);
proto_item_append_text(ti, " Version: %u", nordic_ble_context->protover);
if (nordic_ble_context->protover == 0) {
proto_item *item = proto_tree_add_uint(header_tree, hf_nordic_ble_protover, tvb, 0, 0, 0);
proto_item_set_generated(item);
proto_tree_add_item(header_tree, hf_nordic_ble_packet_id, tvb, offset, 1, ENC_NA);
offset += 1;
offset = dissect_packet_counter(tvb, offset, ti, header_tree);
offset += 2; // Two unused bytes
}
offset = dissect_lengths(tvb, offset, pinfo, header_tree, nordic_ble_context);
if (nordic_ble_context->protover != 0) {
proto_item *item = proto_tree_add_item(header_tree, hf_nordic_ble_protover, tvb, offset, 1, ENC_NA);
offset += 1;
if (nordic_ble_context->protover > 2) {
expert_add_info(pinfo, item, &ei_nordic_ble_unknown_version);
}
offset = dissect_packet_counter(tvb, offset, ti, header_tree);
proto_tree_add_item(header_tree, hf_nordic_ble_packet_id, tvb, offset, 1, ENC_NA);
offset += 1;
}
proto_item_set_len(ti, offset - start_offset);
return offset;
}
static gint
dissect_packet(tvbuff_t *tvb, gint offset, packet_info *pinfo, proto_tree *tree, nordic_ble_context_t *nordic_ble_context, btle_context_t *context)
{
gint32 rssi;
guint32 channel;
if (nordic_ble_context->protover == 0) {
// Event packet length is fixed for the legacy version
nordic_ble_context->event_packet_length = EVENT_PACKET_LEN;
} else {
guint32 plen;
proto_tree_add_item_ret_uint(tree, hf_nordic_ble_packet_length, tvb, offset, 1, ENC_NA, &plen);
nordic_ble_context->event_packet_length = plen;
offset += 1;
}
offset = dissect_flags(tvb, offset, pinfo, tree, nordic_ble_context, context);
proto_tree_add_item_ret_uint(tree, hf_nordic_ble_channel, tvb, offset, 1, ENC_NA, &channel);
offset += 1;
context->channel = channel;
rssi = (-1)*((gint32)tvb_get_guint8(tvb, offset));
proto_tree_add_int(tree, hf_nordic_ble_rssi, tvb, offset, 1, rssi);
offset += 1;
proto_tree_add_item(tree, hf_nordic_ble_event_counter, tvb, offset, 2, ENC_LITTLE_ENDIAN);
offset += 2;
offset = dissect_ble_delta_time(tvb, offset, pinfo, tree, nordic_ble_context);
return offset;
}
static gint
dissect_header(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, btle_context_t *context, gboolean *bad_length)
{
proto_item *ti;
proto_tree *nordic_ble_tree;
gint offset = 0;
nordic_ble_context_t nordic_ble_context;
memset(&nordic_ble_context, 0, sizeof(nordic_ble_context));
ti = proto_tree_add_item(tree, proto_nordic_ble, tvb, 0, -1, ENC_NA);
nordic_ble_tree = proto_item_add_subtree(ti, ett_nordic_ble);
if (tvb_get_guint16(tvb, 0, ENC_BIG_ENDIAN) == 0xBEEF) {
proto_tree_add_item(nordic_ble_tree, hf_nordic_ble_legacy_marker, tvb, 0, 2, ENC_BIG_ENDIAN);
offset += 2;
nordic_ble_context.protover = 0; /* Legacy Version */
} else {
proto_tree_add_item(nordic_ble_tree, hf_nordic_ble_board_id, tvb, 0, 1, ENC_NA);
offset += 1;
nordic_ble_context.protover = tvb_get_guint8(tvb, offset + 2);
}
offset = dissect_packet_header(tvb, offset, pinfo, nordic_ble_tree, &nordic_ble_context);
offset = dissect_packet(tvb, offset, pinfo, nordic_ble_tree, &nordic_ble_context, context);
proto_item_set_len(ti, offset);
*bad_length = nordic_ble_context.bad_length;
return offset;
}
/* Main entry point for sniffer */
static int
dissect_nordic_ble(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void *data _U_)
{
tvbuff_t *payload_tvb;
btle_context_t *context;
gint offset;
gboolean bad_length = FALSE;
context = wmem_new0(wmem_packet_scope(), btle_context_t);
offset = dissect_header(tvb, pinfo, tree, context, &bad_length);
payload_tvb = tvb_new_subset_length_caplen(tvb, offset, -1, tvb_captured_length(tvb) - offset);
if (!bad_length) {
call_dissector_with_data(btle_dissector_handle, payload_tvb, pinfo, tree, context);
}
if ((context->mic_checked_at_capture) && (!context->mic_valid_at_capture)) {
col_add_str(pinfo->cinfo, COL_INFO, "Encrypted packet decrypted incorrectly (bad MIC)");
}
if (debug_handle) {
call_dissector(debug_handle, payload_tvb, pinfo, tree);
}
return offset;
}
void
proto_register_nordic_ble(void)
{
static hf_register_info hf[] = {
{ &hf_nordic_ble_board_id,
{ "Board", "nordic_ble.board_id",
FT_UINT8, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
{ &hf_nordic_ble_legacy_marker,
{ "Legacy marker", "nordic_ble.legacy_marker",
FT_UINT16, BASE_HEX, NULL, 0x0,
NULL, HFILL }
},
{ &hf_nordic_ble_header,
{ "Header", "nordic_ble.header",
FT_NONE, BASE_NONE, NULL, 0x0,
NULL, HFILL }
},
{ &hf_nordic_ble_header_length,
{ "Length of header", "nordic_ble.hlen",
FT_UINT8, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
{ &hf_nordic_ble_payload_length,
{ "Length of payload", "nordic_ble.plen",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Payload length", HFILL }
},
{ &hf_nordic_ble_protover,
{ "Protocol version", "nordic_ble.protover",
FT_UINT8, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
{ &hf_nordic_ble_packet_counter,
{ "Packet counter", "nordic_ble.packet_counter",
FT_UINT16, BASE_DEC, NULL, 0x0,
"Global packet counter for packets sent on UART", HFILL }
},
{ &hf_nordic_ble_packet_id,
{ "Packet ID", "nordic_ble.packet_id",
FT_UINT8, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
{ &hf_nordic_ble_packet_length,
{ "Length of packet", "nordic_ble.len",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
{ &hf_nordic_ble_flags,
{ "Flags", "nordic_ble.flags",
FT_UINT8, BASE_HEX, NULL, 0x0,
NULL, HFILL }
},
{ &hf_nordic_ble_crcok,
{ "CRC", "nordic_ble.crcok",
FT_BOOLEAN, 8, TFS(&ok_incorrect), 0x01,
"Cyclic Redundancy Check state", HFILL }
},
{ &hf_nordic_ble_direction,
{ "Direction", "nordic_ble.direction",
FT_BOOLEAN, 8, TFS(&direction_tfs), 0x02,
NULL, HFILL }
},
{ &hf_nordic_ble_encrypted,
{ "Encrypted", "nordic_ble.encrypted",
FT_BOOLEAN, 8, TFS(&tfs_yes_no), 0x04,
"Was the packet encrypted", HFILL }
},
{ &hf_nordic_ble_micok,
{ "MIC", "nordic_ble.micok",
FT_BOOLEAN, 8, TFS(&ok_incorrect), 0x08,
"Message Integrity Check state", HFILL }
},
{ &hf_nordic_ble_mic_not_relevant,
{ "MIC", "nordic_ble.mic_not_relevant",
FT_BOOLEAN, 8, TFS(&not_relevant), 0x08,
"Message Integrity Check state", HFILL }
},
{ &hf_nordic_ble_le_phy,
{ "PHY", "nordic_ble.phy",
FT_UINT8, BASE_DEC, VALS(le_phys), 0x70,
"Physical Layer", HFILL }
},
{ &hf_nordic_ble_rfu,
{ "RFU", "nordic_ble.rfu",
FT_UINT8, BASE_DEC, NULL, 0x80,
"Reserved for Future Use", HFILL }
},
{ &hf_nordic_ble_channel,
{ "Channel", "nordic_ble.channel",
FT_UINT8, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
{ &hf_nordic_ble_rssi,
{ "RSSI", "nordic_ble.rssi",
FT_INT8, BASE_DEC | BASE_UNIT_STRING, &units_dbm, 0x0,
"Received Signal Strength Indicator", HFILL }
},
{ &hf_nordic_ble_event_counter,
{ "Event counter", "nordic_ble.event_counter",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }
},
{ &hf_nordic_ble_delta_time,
{ "Delta time (" UTF8_MICRO_SIGN "s end to start)", "nordic_ble.delta_time",
FT_UINT32, BASE_DEC, NULL, 0x0,
UTF8_MICRO_SIGN "s since end of last reported packet", HFILL }
},
{ &hf_nordic_ble_delta_time_ss,
{ "Delta time (" UTF8_MICRO_SIGN "s start to start)", "nordic_ble.delta_time_ss",
FT_UINT32, BASE_DEC, NULL, 0x0,
UTF8_MICRO_SIGN "s since start of last reported packet", HFILL }
}
};
static gint *ett[] = {
&ett_nordic_ble,
&ett_packet_header,
&ett_flags
};
static ei_register_info ei[] = {
{ &ei_nordic_ble_bad_crc, { "nordic_ble.crc.bad", PI_CHECKSUM, PI_ERROR, "CRC is bad", EXPFILL }},
{ &ei_nordic_ble_bad_mic, { "nordic_ble.mic.bad", PI_CHECKSUM, PI_ERROR, "MIC is bad", EXPFILL }},
{ &ei_nordic_ble_bad_length, { "nordic_ble.length.bad", PI_MALFORMED, PI_ERROR, "Length is incorrect", EXPFILL }},
{ &ei_nordic_ble_unknown_version, { "nordic_ble.protover.bad", PI_PROTOCOL, PI_ERROR, "Unknown version", EXPFILL }},
};
expert_module_t *expert_nordic_ble;
proto_nordic_ble = proto_register_protocol("Nordic BLE Sniffer", "NORDIC_BLE", "nordic_ble");
register_dissector("nordic_ble", dissect_nordic_ble, proto_nordic_ble);
expert_nordic_ble = expert_register_protocol(proto_nordic_ble);
expert_register_field_array(expert_nordic_ble, ei, array_length(ei));
proto_register_field_array(proto_nordic_ble, hf, array_length(hf));
proto_register_subtree_array(ett, array_length(ett));
}
void
proto_reg_handoff_nordic_ble(void)
{
dissector_handle_t nordic_ble_handle;
nordic_ble_handle = create_dissector_handle(dissect_nordic_ble, proto_nordic_ble);
btle_dissector_handle = find_dissector("btle");
debug_handle = find_dissector("nordic_debug");
dissector_add_for_decode_as_with_preference("udp.port", nordic_ble_handle);
dissector_add_uint("wtap_encap", WTAP_ENCAP_NORDIC_BLE, nordic_ble_handle);
}
/*
* Editor modelines - https://www.wireshark.org/tools/modelines.html
*
* Local variables:
* c-basic-offset: 4
* tab-width: 8
* indent-tabs-mode: nil
* End:
*
* vi: set shiftwidth =4 tabstop =8 expandtab:
* :indentSize =4:tabSize =8:noTabs =true:
*/