wireshark/epan/dissectors/packet-tcap.h

250 lines
7.4 KiB
C

/* Do not modify this file. Changes will be overwritten. */
/* Generated automatically by the ASN.1 to Wireshark dissector compiler */
/* packet-tcap.h */
/* asn2wrs.py -b -p tcap -c ./tcap.cnf -s ./packet-tcap-template -D . -O ../.. tcap.asn UnidialoguePDUs.asn DialoguePDUs.asn */
/* Input file: packet-tcap-template.h */
#line 1 "./asn1/tcap/packet-tcap-template.h"
/* packet-tcap.h
*
* Copyright 2004, Tim Endean <endeant@hotmail.com>
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#ifndef PACKET_tcap_H
#define PACKET_tcap_H
#include "ws_symbol_export.h"
/* TCAP component type */
#define TCAP_COMP_INVOKE 0xa1
#define TCAP_COMP_RRL 0xa2
#define TCAP_COMP_RE 0xa3
#define TCAP_COMP_REJECT 0xa4
#define TCAP_COMP_RRN 0xa7
#define ANSI_TC_INVOKE_L 0xe9
#define ANSI_TC_RRL 0xea
#define ANSI_TC_RE 0xeb
#define ANSI_TC_REJECT 0xec
#define ANSI_TC_INVOKE_N 0xed
#define ANSI_TC_RRN 0xee
#define TCAP_SEQ_TAG 0x30
#define TCAP_SET_TAG 0x31
#define TCAP_INVOKE_ID_TAG 0x02
#define TCAP_LINKED_ID_TAG 0x80
#define TCAP_EOC_LEN 2
#define TCAP_CONSTRUCTOR(TCtag) (TCtag & 0x20)
#define TC_BEGIN 1
#define TC_CONT 2
#define TC_END 3
#define TC_ABORT 4
#define TC_ANSI_ABORT 5
#define TC_ANSI_ALL 6
struct tcap_private_t {
gboolean acv; /* Is the Application Context Version present */
const void * oid;
guint32 session_id;
void * context;
gchar *TransactionID_str;
guint32 src_tid;
guint32 dst_tid;
};
/** @file
* lists and hash tables used in wireshark's tcap dissector
* for calculation of delays in tcap-calls
*/
#define LENGTH_OID 23
struct tcaphash_context_t {
struct tcaphash_context_key_t * key;
guint32 session_id;
guint32 first_frame;
guint32 last_frame;
nstime_t begin_time; /**< time of arrival of TC_BEGIN */
nstime_t end_time; /**< time of closing message */
gboolean responded; /**< true, if request has been responded */
gboolean closed;
gboolean upper_dissector;
gboolean oid_present;
gchar oid[LENGTH_OID+1];
gboolean subdissector_present;
dissector_handle_t subdissector_handle;
void (* callback) (tvbuff_t *,packet_info *, proto_tree *, struct tcaphash_context_t *);
struct tcaphash_begincall_t * begincall;
struct tcaphash_contcall_t * contcall;
struct tcaphash_endcall_t * endcall;
struct tcaphash_ansicall_t * ansicall;
};
struct tcaphash_begincall_t {
struct tcaphash_begin_info_key_t * beginkey;
struct tcaphash_context_t * context;
gboolean father;
struct tcaphash_begincall_t * next_begincall;
struct tcaphash_begincall_t * previous_begincall;
};
struct tcaphash_contcall_t {
struct tcaphash_cont_info_key_t * contkey;
struct tcaphash_context_t * context;
gboolean father;
struct tcaphash_contcall_t * next_contcall;
struct tcaphash_contcall_t * previous_contcall;
};
struct tcaphash_endcall_t {
struct tcaphash_end_info_key_t * endkey;
struct tcaphash_context_t * context;
gboolean father;
struct tcaphash_endcall_t * next_endcall;
struct tcaphash_endcall_t * previous_endcall;
};
struct tcaphash_ansicall_t {
struct tcaphash_ansi_info_key_t * ansikey;
struct tcaphash_context_t * context;
gboolean father;
struct tcaphash_ansicall_t * next_ansicall;
struct tcaphash_ansicall_t * previous_ansicall;
};
/** The Key for the hash table is the TCAP origine transaction identifier
of the TC_BEGIN containing the InitialDP */
struct tcaphash_context_key_t {
guint32 session_id;
};
struct tcaphash_begin_info_key_t {
guint32 hashKey;
guint32 tid;
guint32 pc_hash;
};
struct tcaphash_cont_info_key_t {
guint32 hashKey;
guint32 src_tid;
guint32 dst_tid;
guint32 opc_hash;
guint32 dpc_hash;
};
struct tcaphash_end_info_key_t {
guint32 hashKey;
guint32 tid;
guint32 opc_hash;
guint32 dpc_hash;
};
struct tcaphash_ansi_info_key_t {
guint32 hashKey;
guint32 tid;
guint32 opc_hash;
guint32 dpc_hash;
};
/** List of infos to store for the analyse */
struct tcapsrt_info_t {
guint32 tcap_session_id;
guint32 src_tid;
guint32 dst_tid;
guint8 ope;
};
/**
* Routine called when the TAP is initialized.
* so hash table are (re)created
*/
void tcapsrt_init_routine(void);
/**
* Initialize the Message Info used by the main dissector
* Data are linked to a TCAP transaction
*/
struct tcapsrt_info_t * tcapsrt_razinfo(void);
void tcapsrt_close(struct tcaphash_context_t * p_tcaphash_context,
packet_info * pinfo _U_);
/**
* Service Response Time analyze
* Called just after dissector call
* Associate a TCAP context to a tcap session and display session related infomations
* like the first frame, the last, the session duration,
* and a uniq session identifier for the filtering
*
* For ETSI tcap, the TCAP context can be reached through three keys
* - a key (BEGIN) identifying the session according to the tcap source identifier
* - a key (CONT) identifying the established session (src_id and dst_id)
* - a key (END) identifying the session according to the tcap destination identifier
*
* For ANSI tcap, the TCAP context is reached through a uniq key
* - a key (ANSI) identifying the session according to the tcap identifier
*/
struct tcaphash_context_t * tcapsrt_call_matching(tvbuff_t *tvb,
packet_info * pinfo _U_,
proto_tree *tree,
struct tcapsrt_info_t * p_tcap_info);
WS_DLL_PUBLIC gboolean gtcap_StatSRT;
extern gint tcap_standard;
extern const value_string tcap_component_type_str[];
void proto_reg_handoff_tcap(void);
void proto_register_tcap(void);
extern dissector_handle_t get_itu_tcap_subdissector(guint32 ssn);
dissector_handle_t get_ansi_tcap_subdissector(guint32 ssn);
extern void add_ansi_tcap_subdissector(guint32 ssn, dissector_handle_t dissector);
WS_DLL_PUBLIC void add_itu_tcap_subdissector(guint32 ssn, dissector_handle_t dissector);
extern void delete_ansi_tcap_subdissector(guint32 ssn, dissector_handle_t dissector);
WS_DLL_PUBLIC void delete_itu_tcap_subdissector(guint32 ssn, dissector_handle_t dissector);
extern void call_tcap_dissector(dissector_handle_t, tvbuff_t*, packet_info*, proto_tree*);
/*--- Included file: packet-tcap-exp.h ---*/
#line 1 "./asn1/tcap/packet-tcap-exp.h"
extern const value_string tcap_UniDialoguePDU_vals[];
extern const value_string tcap_DialoguePDU_vals[];
int dissect_tcap_UniDialoguePDU(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_);
int dissect_tcap_DialoguePDU(gboolean implicit_tag _U_, tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_);
/*--- End of included file: packet-tcap-exp.h ---*/
#line 231 "./asn1/tcap/packet-tcap-template.h"
#endif /* PACKET_tcap_H */