wireshark/epan/dissectors/packet-ipx.c
Michael Mann ad6fc87d64 Add proto_tree_add_checksum.
This is an attempt to standardize display/handling of checksum fields for all dissectors.
The main target is for dissectors that do validation, but dissectors that just report the
checksum were also included just to make them easier to find in the future.

Bug: 10620
Bug: 12058
Ping-Bug: 8859
Change-Id: Ia8abd86e42eaf8ed50de6b173409e914b17993bf
Reviewed-on: https://code.wireshark.org/review/16380
Petri-Dish: Michael Mann <mmann78@netscape.net>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Jeff Morriss <jeff.morriss.ws@gmail.com>
Reviewed-by: Michael Mann <mmann78@netscape.net>
2016-07-21 12:35:22 +00:00

1646 lines
55 KiB
C

/* packet-ipx.c
* Routines for NetWare's IPX
* Gilbert Ramirez <gram@alumni.rice.edu>
* NDPS support added by Greg Morris (gmorris@novell.com)
*
* Portions Copyright (c) 2000-2002 by Gilbert Ramirez.
* Portions Copyright (c) Novell, Inc. 2002-2003
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include "config.h"
#include <epan/packet.h>
#include <epan/capture_dissectors.h>
#include "packet-ipx.h"
#include "packet-sll.h"
#include <epan/addr_resolv.h>
#include <epan/etypes.h>
#include <epan/ppptypes.h>
#include <epan/llcsaps.h>
#include <epan/aftypes.h>
#include <epan/arcnet_pids.h>
#include <epan/conversation.h>
#include <epan/conversation_table.h>
#include <epan/proto_data.h>
void proto_register_ipx(void);
void proto_reg_handoff_ipx(void);
static int ipx_tap = -1;
/* The information in this module (IPX, SPX, NCP) comes from:
NetWare LAN Analysis, Second Edition
Laura A. Chappell and Dan E. Hakes
(c) 1994 Novell, Inc.
Novell Press, San Jose.
ISBN: 0-7821-1362-1
And from the ncpfs source code by Volker Lendecke
*/
static int proto_ipx = -1;
static int hf_ipx_checksum = -1;
static int hf_ipx_len = -1;
static int hf_ipx_src = -1;
static int hf_ipx_dst = -1;
static int hf_ipx_addr = -1;
static int hf_ipx_hops = -1;
static int hf_ipx_packet_type = -1;
static int hf_ipx_dnet = -1;
static int hf_ipx_dnode = -1;
static int hf_ipx_dsocket = -1;
static int hf_ipx_snet = -1;
static int hf_ipx_snode = -1;
static int hf_ipx_ssocket = -1;
static int hf_ipx_net = -1;
static int hf_ipx_node = -1;
static int hf_ipx_socket = -1;
static gint ett_ipx = -1;
static dissector_table_t ipx_type_dissector_table;
static dissector_table_t ipx_socket_dissector_table;
static dissector_table_t spx_socket_dissector_table;
static int proto_spx = -1;
static int hf_spx_connection_control = -1;
static int hf_spx_connection_control_sys = -1;
static int hf_spx_connection_control_send_ack = -1;
static int hf_spx_connection_control_attn = -1;
static int hf_spx_connection_control_eom = -1;
static int hf_spx_connection_control_v2 = -1;
static int hf_spx_connection_control_neg_size = -1;
static int hf_spx_connection_control_reserved = -1;
static int hf_spx_connection_control_ext_header = -1;
static int hf_spx_datastream_type = -1;
static int hf_spx_src_id = -1;
static int hf_spx_dst_id = -1;
static int hf_spx_seq_nr = -1;
static int hf_spx_ack_nr = -1;
static int hf_spx_all_nr = -1;
static int hf_spx_neg_size = -1;
static int hf_spx_rexmt_frame = -1;
static int hf_spx_rexmt_data = -1;
static gint ett_spx = -1;
static gint ett_spx_connctrl = -1;
static int proto_ipxrip = -1;
static int hf_ipxrip_request = -1;
static int hf_ipxrip_response = -1;
static int hf_ipxrip_packet_type = -1;
static int hf_ipxrip_route_vector = -1;
static int hf_ipxrip_hops = -1;
static int hf_ipxrip_ticks = -1;
static gint ett_ipxrip = -1;
static int proto_serialization = -1;
static int hf_serial_number = -1;
static gint ett_serialization = -1;
static int proto_sap = -1;
static int hf_sap_request = -1;
static int hf_sap_response = -1;
/* Generated from convert_proto_tree_add_text.pl */
static int hf_sap_intermediate_networks = -1;
static int hf_sap_server_type = -1;
static int hf_sap_packet_type = -1;
static int hf_sap_node = -1;
static int hf_sap_network = -1;
static int hf_sap_server_name = -1;
static int hf_sap_socket = -1;
static gint ett_ipxsap = -1;
static gint ett_ipxsap_server = -1;
static gint ett_ipxmsg = -1;
static int proto_ipxmsg = -1;
static int hf_msg_conn = -1;
static int hf_msg_sigchar = -1;
#define UDP_PORT_IPX 213 /* RFC 1234 */
#define IPX_HEADER_LEN 30 /* It's *always* 30 bytes */
static const char* ipx_conv_get_filter_type(conv_item_t* conv, conv_filter_type_e filter)
{
if ((filter == CONV_FT_SRC_ADDRESS) && (conv->src_address.type == AT_IPX))
return "ipx.src";
if ((filter == CONV_FT_DST_ADDRESS) && (conv->dst_address.type == AT_IPX))
return "ipx.dst";
if ((filter == CONV_FT_ANY_ADDRESS) && (conv->src_address.type == AT_IPX))
return "ipx.addr";
return CONV_FILTER_INVALID;
}
static ct_dissector_info_t ipx_ct_dissector_info = {&ipx_conv_get_filter_type};
static int
ipx_conversation_packet(void *pct, packet_info *pinfo, epan_dissect_t *edt _U_, const void *vip)
{
conv_hash_t *hash = (conv_hash_t*) pct;
const ipxhdr_t *ipxh=(const ipxhdr_t *)vip;
add_conversation_table_data(hash, &ipxh->ipx_src, &ipxh->ipx_dst, 0, 0, 1, pinfo->fd->pkt_len, &pinfo->rel_ts, &pinfo->abs_ts, &ipx_ct_dissector_info, PT_NONE);
return 1;
}
static const char* ipx_host_get_filter_type(hostlist_talker_t* host, conv_filter_type_e filter)
{
if ((filter == CONV_FT_ANY_ADDRESS) && (host->myaddress.type == AT_IPX))
return "ipx.addr";
return CONV_FILTER_INVALID;
}
static hostlist_dissector_info_t ipx_host_dissector_info = {&ipx_host_get_filter_type};
static int
ipx_hostlist_packet(void *pit, packet_info *pinfo, epan_dissect_t *edt _U_, const void *vip)
{
conv_hash_t *hash = (conv_hash_t*) pit;
const ipxhdr_t *ipxh=(const ipxhdr_t *)vip;
/* Take two "add" passes per packet, adding for each direction, ensures that all
packets are counted properly (even if address is sending to itself)
XXX - this could probably be done more efficiently inside hostlist_table */
add_hostlist_table_data(hash, &ipxh->ipx_src, 0, TRUE, 1, pinfo->fd->pkt_len, &ipx_host_dissector_info, PT_NONE);
add_hostlist_table_data(hash, &ipxh->ipx_dst, 0, FALSE, 1, pinfo->fd->pkt_len, &ipx_host_dissector_info, PT_NONE);
return 1;
}
/* ================================================================= */
/* IPX */
/* ================================================================= */
static const value_string ipx_socket_vals[] = {
{ IPX_SOCKET_PING_CISCO, "CISCO PING" },
{ IPX_SOCKET_NCP, "NCP" },
{ IPX_SOCKET_SAP, "SAP" },
{ IPX_SOCKET_IPXRIP, "RIP" },
{ IPX_SOCKET_NETBIOS, "NetBIOS" },
{ IPX_SOCKET_DIAGNOSTIC, "Diagnostic" },
{ IPX_SOCKET_SERIALIZATION, "Serialization" },
{ IPX_SOCKET_NWLINK_SMB_SERVER, "NWLink SMB Server" },
{ IPX_SOCKET_NWLINK_SMB_NAMEQUERY, "NWLink SMB Name Query" },
{ IPX_SOCKET_NWLINK_SMB_REDIR, "NWLink SMB Redirector" },
{ IPX_SOCKET_NWLINK_SMB_MAILSLOT, "NWLink SMB Mailslot Datagram" },
{ IPX_SOCKET_NWLINK_SMB_MESSENGER, "NWLink SMB Messenger" },
{ IPX_SOCKET_NWLINK_SMB_BROWSE, "NWLink SMB Browse" },
{ IPX_SOCKET_ATTACHMATE_GW, "Attachmate Gateway" },
{ IPX_SOCKET_IPX_MESSAGE, "IPX Message" },
{ IPX_SOCKET_IPX_MESSAGE1, "IPX Message" },
{ 0x4006, "NetWare Directory Server" },
{ 0x400C, "HP LaserJet/QuickSilver" },
{ 0x8104, "NetWare 386" },
{ IPX_SOCKET_ADSM, "ADSM" },
{ IPX_SOCKET_EIGRP, "Cisco EIGRP for IPX" },
{ 0x8F83, "Powerchute UPS Monitoring" },
{ IPX_SOCKET_NLSP, "NetWare Link Services Protocol" },
{ IPX_SOCKET_IPXWAN, "IPX WAN" },
{ IPX_SOCKET_SNMP_AGENT, "SNMP Agent" },
{ IPX_SOCKET_SNMP_SINK, "SNMP Sink" },
{ 0x907B, "SMS Testing and Development" },
{ IPX_SOCKET_PING_NOVELL, "Novell PING" },
{ IPX_SOCKET_TCP_TUNNEL, "TCP Tunnel" },
{ IPX_SOCKET_UDP_TUNNEL, "UDP Tunnel" },
{ SPX_SOCKET_PA, "NDPS Printer Agent/PSM" },
{ SPX_SOCKET_BROKER, "NDPS Broker" },
{ SPX_SOCKET_SRS, "NDPS Service Registry Service" },
{ SPX_SOCKET_ENS, "NDPS Event Notification Service" },
{ SPX_SOCKET_RMS, "NDPS Remote Management Service" },
{ SPX_SOCKET_NOTIFY_LISTENER, "NDPS Notify Listener" },
{ 0xE885, "NT Server-RPC/GW" },
{ 0x0000, NULL }
};
value_string_ext ipx_socket_vals_ext = VALUE_STRING_EXT_INIT(ipx_socket_vals);
static const value_string ipx_packet_type_vals[] = {
{ IPX_PACKET_TYPE_IPX, "IPX" },
{ IPX_PACKET_TYPE_RIP, "RIP" },
{ IPX_PACKET_TYPE_ECHO, "Echo" },
{ IPX_PACKET_TYPE_ERROR, "Error" },
{ IPX_PACKET_TYPE_PEP, "PEP" }, /* Packet Exchange Packet */
{ IPX_PACKET_TYPE_SPX, "SPX" },
{ 16, "Experimental Protocol" },
{ IPX_PACKET_TYPE_NCP, "NCP" },
{ 18, "Experimental Protocol" },
{ 19, "Experimental Protocol" },
{ IPX_PACKET_TYPE_WANBCAST, "NetBIOS Broadcast" },
{ 21, "Experimental Protocol" },
{ 22, "Experimental Protocol" },
{ 23, "Experimental Protocol" },
{ 24, "Experimental Protocol" },
{ 25, "Experimental Protocol" },
{ 26, "Experimental Protocol" },
{ 27, "Experimental Protocol" },
{ 28, "Experimental Protocol" },
{ 29, "Experimental Protocol" },
{ 30, "Experimental Protocol" },
{ 31, "Experimental Protocol" },
{ 0, NULL }
};
static const value_string ipxmsg_sigchar_vals[] = {
{ '?', "Poll inactive station" },
{ 'Y', "Station is still using the connection" },
{ '!', "Broadcast message waiting" },
{ 0, NULL }
};
gboolean
capture_ipx(const guchar *pd _U_, int offset _U_, int len _U_, capture_packet_info_t *cpinfo, const union wtap_pseudo_header *pseudo_header _U_)
{
capture_dissector_increment_count(cpinfo, proto_ipx);
return TRUE;
}
static int
dissect_ipx(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
{
tvbuff_t *next_tvb;
proto_tree *ipx_tree = NULL;
proto_item *ti = NULL, *hidden_item;
guint8 ipx_hops;
char *str;
guint16 first_socket, second_socket;
guint32 ipx_snet, ipx_dnet;
static ipxhdr_t ipxh_arr[4];
static int ipx_current=0;
ipxhdr_t *ipxh;
ipx_current++;
if(ipx_current==4){
ipx_current=0;
}
ipxh=&ipxh_arr[ipx_current];
col_set_str(pinfo->cinfo, COL_PROTOCOL, "IPX");
col_clear(pinfo->cinfo, COL_INFO);
/* Calculate here for use in pinfo and in tree */
ipxh->ipx_dsocket = tvb_get_ntohs(tvb, 16);
ipxh->ipx_ssocket = tvb_get_ntohs(tvb, 28);
ipxh->ipx_type = tvb_get_guint8(tvb, 5);
ipxh->ipx_length = tvb_get_ntohs(tvb, 2);
pinfo->ptype = PT_IPX;
pinfo->srcport = ipxh->ipx_ssocket;
pinfo->destport = ipxh->ipx_dsocket;
/* Adjust the tvbuff length to include only the IPX datagram. */
set_actual_length(tvb, ipxh->ipx_length);
set_address_tvb(&pinfo->net_src, AT_IPX, 10, tvb, 18);
copy_address_shallow(&pinfo->src, &pinfo->net_src);
copy_address_shallow(&ipxh->ipx_src, &pinfo->net_src);
set_address_tvb(&pinfo->net_dst, AT_IPX, 10, tvb, 6);
copy_address_shallow(&pinfo->dst, &pinfo->net_dst);
copy_address_shallow(&ipxh->ipx_dst, &pinfo->net_dst);
col_add_str(pinfo->cinfo, COL_INFO, val_to_str_ext(ipxh->ipx_dsocket, &ipx_socket_vals_ext, "Unknown (0x%04x)"));
if (tree) {
ti = proto_tree_add_item(tree, proto_ipx, tvb, 0, IPX_HEADER_LEN, ENC_NA);
ipx_tree = proto_item_add_subtree(ti, ett_ipx);
}
str=address_to_str(wmem_packet_scope(), &pinfo->net_src);
hidden_item = proto_tree_add_string(ipx_tree, hf_ipx_src, tvb, 0, 0, str);
PROTO_ITEM_SET_HIDDEN(hidden_item);
hidden_item = proto_tree_add_string(ipx_tree, hf_ipx_addr, tvb, 0, 0, str);
PROTO_ITEM_SET_HIDDEN(hidden_item);
str=address_to_str(wmem_packet_scope(), &pinfo->net_dst);
hidden_item = proto_tree_add_string(ipx_tree, hf_ipx_dst, tvb, 0, 0, str);
PROTO_ITEM_SET_HIDDEN(hidden_item);
hidden_item = proto_tree_add_string(ipx_tree, hf_ipx_addr, tvb, 0, 0, str);
PROTO_ITEM_SET_HIDDEN(hidden_item);
proto_tree_add_checksum(ipx_tree, tvb, 0, hf_ipx_checksum, -1, NULL, pinfo, 0, ENC_BIG_ENDIAN, PROTO_CHECKSUM_NO_FLAGS);
proto_tree_add_uint_format_value(ipx_tree, hf_ipx_len, tvb, 2, 2, ipxh->ipx_length,
"%d bytes", ipxh->ipx_length);
ipx_hops = tvb_get_guint8(tvb, 4);
proto_tree_add_uint_format(ipx_tree, hf_ipx_hops, tvb, 4, 1, ipx_hops,
"Transport Control: %d hops", ipx_hops);
proto_tree_add_uint(ipx_tree, hf_ipx_packet_type, tvb, 5, 1, ipxh->ipx_type);
/* Destination */
ipx_dnet = tvb_get_ntohl(tvb, 6);
proto_tree_add_ipxnet(ipx_tree, hf_ipx_dnet, tvb, 6, 4,
ipx_dnet);
hidden_item = proto_tree_add_ipxnet(ipx_tree, hf_ipx_net, tvb, 6, 4,
ipx_dnet);
PROTO_ITEM_SET_HIDDEN(hidden_item);
proto_tree_add_item(ipx_tree, hf_ipx_dnode, tvb, 10, 6, ENC_NA);
hidden_item = proto_tree_add_item(ipx_tree, hf_ipx_node, tvb, 10, 6, ENC_NA);
PROTO_ITEM_SET_HIDDEN(hidden_item);
proto_tree_add_uint(ipx_tree, hf_ipx_dsocket, tvb, 16, 2,
ipxh->ipx_dsocket);
hidden_item = proto_tree_add_uint(ipx_tree, hf_ipx_socket, tvb, 16, 2,
ipxh->ipx_dsocket);
PROTO_ITEM_SET_HIDDEN(hidden_item);
/* Source */
ipx_snet = tvb_get_ntohl(tvb, 18);
proto_tree_add_ipxnet(ipx_tree, hf_ipx_snet, tvb, 18, 4,
ipx_snet);
hidden_item = proto_tree_add_ipxnet(ipx_tree, hf_ipx_net, tvb, 18, 4,
ipx_snet);
PROTO_ITEM_SET_HIDDEN(hidden_item);
proto_tree_add_item(ipx_tree, hf_ipx_snode, tvb, 22, 6, ENC_NA);
hidden_item = proto_tree_add_item(ipx_tree, hf_ipx_node, tvb, 22, 6, ENC_NA);
PROTO_ITEM_SET_HIDDEN(hidden_item);
proto_tree_add_uint(ipx_tree, hf_ipx_ssocket, tvb, 28, 2,
ipxh->ipx_ssocket);
hidden_item = proto_tree_add_uint(ipx_tree, hf_ipx_socket, tvb, 28, 2,
ipxh->ipx_ssocket);
PROTO_ITEM_SET_HIDDEN(hidden_item);
/* Make the next tvbuff */
next_tvb = tvb_new_subset_remaining(tvb, IPX_HEADER_LEN);
/*
* Check the socket numbers before we check the packet type;
* we've seen non-NCP packets with a type of NCP and a
* destination socket of IPX_SOCKET_IPX_MESSAGE, and SAP
* packets with a type of NCP and a destination socket of
* IPX_SOCKET_SAP.
*
* We've seen NCP packets with a type of NCP, a source socket of
* IPX_SOCKET_NCP, and a destination socket of IPX_SOCKET_IPX_MESSAGE,
* and we've seen NCP packets with a type of NCP, a source socket of
* IPX_SOCKET_IPX_MESSAGE, and a destination socket of
* IPX_SOCKET_NCP, so testing the destination socket first doesn't
* always give the right answer. We've also seen SAP packets with
* a source socket of IPX_SOCKET_SAP and a destination socket of
* IPX_SOCKET_IPX_MESSAGE.
*
* Unfortunately, we've also seen packets with a source socket
* of IPX_SOCKET_NWLINK_SMB_SERVER and a destination socket
* of IPX_SOCKET_NWLINK_SMB_NAMEQUERY that were NMPI packets,
* not SMB packets, so testing the lower-valued socket first
* also doesn't always give the right answer.
*
* So we start out assuming we should test the lower-numbered
* socket number first, but, if the higher-numbered socket is
* IPX_SOCKET_NWLINK_SMB_NAMEQUERY, we assume that it's a
* NMPI query, and test only that socket.
*/
if (ipxh->ipx_ssocket > ipxh->ipx_dsocket) {
first_socket = ipxh->ipx_dsocket;
second_socket = ipxh->ipx_ssocket;
} else {
first_socket = ipxh->ipx_ssocket;
second_socket = ipxh->ipx_dsocket;
}
tap_queue_packet(ipx_tap, pinfo, ipxh);
if (second_socket != IPX_SOCKET_NWLINK_SMB_NAMEQUERY) {
if (dissector_try_uint_new(ipx_socket_dissector_table, first_socket,
next_tvb, pinfo, tree, FALSE, ipxh))
return tvb_captured_length(tvb);
}
if (dissector_try_uint_new(ipx_socket_dissector_table, second_socket,
next_tvb, pinfo, tree, FALSE, ipxh))
return tvb_captured_length(tvb);
/*
* Neither of them are known; try the packet type, which will
* at least let us, for example, dissect SPX packets as SPX.
*/
if (dissector_try_uint_new(ipx_type_dissector_table, ipxh->ipx_type, next_tvb,
pinfo, tree, FALSE, ipxh))
return tvb_captured_length(tvb);
call_data_dissector(next_tvb, pinfo, tree);
return tvb_captured_length(tvb);
}
/* ================================================================= */
/* SPX Hash Functions */
/* ================================================================= */
typedef struct {
conversation_t *conversation;
guint32 spx_src;
guint16 spx_seq;
} spx_hash_key;
typedef struct {
guint16 spx_ack;
guint16 spx_all;
guint32 num;
} spx_hash_value;
/*
* Structure attached to retransmitted SPX frames; it contains the
* frame number of the original transmission.
*/
typedef struct {
guint32 num;
} spx_rexmit_info;
static GHashTable *spx_hash = NULL;
/* Hash Functions */
static gint
spx_equal(gconstpointer v, gconstpointer v2)
{
const spx_hash_key *val1 = (const spx_hash_key*)v;
const spx_hash_key *val2 = (const spx_hash_key*)v2;
if (val1->conversation == val2->conversation &&
val1->spx_src == val2->spx_src &&
val1->spx_seq == val2->spx_seq) {
return 1;
}
return 0;
}
static guint
spx_hash_func(gconstpointer v)
{
const spx_hash_key *spx_key = (const spx_hash_key*)v;
return GPOINTER_TO_UINT(spx_key->conversation) + spx_key->spx_src;
}
/* Initializes the hash table each time a new
* file is loaded or re-loaded in wireshark */
static void
spx_init_protocol(void)
{
/* no need for register_cleanup_routine that destroys spx_hash,
* spx_postseq_cleanup should clear this. */
spx_hash = g_hash_table_new(spx_hash_func, spx_equal);
}
/* After the sequential run, we don't need the spx hash table, or
* the keys and values, anymore; the lookups have already been done
* and the relevant info saved as SPX private data with the frame
* if the frame was a retransmission. */
static void
spx_postseq_cleanup(void)
{
if (spx_hash) {
/* Destroy the hash, but don't clean up request_condition data. */
g_hash_table_destroy(spx_hash);
spx_hash = NULL;
}
}
static spx_hash_value*
spx_hash_insert(conversation_t *conversation, guint32 spx_src, guint16 spx_seq)
{
spx_hash_key *key;
spx_hash_value *value;
/* Now remember the packet, so we can find it if we later. */
key = wmem_new(wmem_file_scope(), spx_hash_key);
key->conversation = conversation;
key->spx_src = spx_src;
key->spx_seq = spx_seq;
value = wmem_new0(wmem_file_scope(), spx_hash_value);
g_hash_table_insert(spx_hash, key, value);
return value;
}
/* Returns the spx_hash_value*, or NULL if not found. */
static spx_hash_value*
spx_hash_lookup(conversation_t *conversation, guint32 spx_src, guint32 spx_seq)
{
spx_hash_key key;
key.conversation = conversation;
key.spx_src = spx_src;
key.spx_seq = spx_seq;
return (spx_hash_value *)g_hash_table_lookup(spx_hash, &key);
}
/* ================================================================= */
/* SPX */
/* ================================================================= */
#define SPX_SYS_PACKET 0x80
#define SPX_SEND_ACK 0x40
#define SPX_ATTN 0x20
#define SPX_EOM 0x10
#define SPX_VII_PACKET 0x08
#define SPX_NEG_SIZE 0x04
#define SPX_RESERVED 0x02
#define SPX_EXT_HEADER 0x01
static const value_string conn_vals[] = {
{ 0x00, "Data, No Ack Required" },
{ SPX_EOM, "End-of-Message" },
{ SPX_ATTN, "Attention" },
{ SPX_SEND_ACK, "Acknowledgment Required"},
{ SPX_SEND_ACK|SPX_EOM, "Send Ack: End Message"},
{ SPX_SYS_PACKET, "System Packet"},
{ SPX_SYS_PACKET|SPX_SEND_ACK, "System Packet: Send Ack"},
{ 0x00, NULL }
};
static const char*
spx_datastream(guint8 type)
{
switch (type) {
case 0xfe:
return "End-of-Connection";
case 0xff:
return "End-of-Connection Acknowledgment";
default:
return NULL;
}
}
#define SPX_HEADER_LEN 12
#define SPX2_HEADER_LEN 14
static int
dissect_spx(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
{
proto_tree *spx_tree;
proto_item *ti;
tvbuff_t *next_tvb;
guint8 conn_ctrl;
guint8 hdr_len = SPX_HEADER_LEN;
guint8 datastream_type;
const char *datastream_type_string;
guint16 spx_seq;
const char *spx_msg_string;
guint16 low_socket, high_socket;
guint32 src;
conversation_t *conversation;
spx_hash_value *pkt_value;
spx_rexmit_info *spx_rexmit_info_p;
spx_info spx_infox;
col_set_str(pinfo->cinfo, COL_PROTOCOL, "SPX");
col_set_str(pinfo->cinfo, COL_INFO, "SPX");
conn_ctrl = tvb_get_guint8(tvb, 0);
if ((conn_ctrl & SPX_VII_PACKET) && tvb_get_ntohs(tvb, 4) != 0xffff) {
/* SPX2 packets have an extra two-byte field, unless they have
* a dest-ID of 0xffff... */
hdr_len = SPX2_HEADER_LEN;
}
ti = proto_tree_add_item(tree, proto_spx, tvb, 0, hdr_len, ENC_NA);
spx_tree = proto_item_add_subtree(ti, ett_spx);
spx_msg_string = val_to_str_const((conn_ctrl & 0xf0), conn_vals, "Unknown" );
col_append_fstr(pinfo->cinfo, COL_INFO, " %s", spx_msg_string);
if (tree) {
const int * spx_flags[] = {
&hf_spx_connection_control_sys,
&hf_spx_connection_control_send_ack,
&hf_spx_connection_control_attn,
&hf_spx_connection_control_eom,
NULL
};
const int * spx_vii_flags[] = {
&hf_spx_connection_control_sys,
&hf_spx_connection_control_send_ack,
&hf_spx_connection_control_attn,
&hf_spx_connection_control_eom,
&hf_spx_connection_control_v2,
&hf_spx_connection_control_neg_size,
&hf_spx_connection_control_reserved,
&hf_spx_connection_control_ext_header,
NULL
};
if (conn_ctrl & SPX_VII_PACKET) {
proto_tree_add_bitmask_with_flags(spx_tree, tvb, 0, hf_spx_connection_control,
ett_spx_connctrl, spx_vii_flags, ENC_NA, BMT_NO_APPEND);
} else {
proto_tree_add_bitmask_with_flags(spx_tree, tvb, 0, hf_spx_connection_control,
ett_spx_connctrl, spx_flags, ENC_NA, BMT_NO_APPEND);
}
}
datastream_type = tvb_get_guint8(tvb, 1);
datastream_type_string = spx_datastream(datastream_type);
if (datastream_type_string != NULL) {
col_append_fstr(pinfo->cinfo, COL_INFO, " (%s)",
datastream_type_string);
}
if (tree) {
if (datastream_type_string != NULL) {
proto_tree_add_uint_format_value(spx_tree, hf_spx_datastream_type, tvb,
1, 1, datastream_type,
"%s (0x%02X)",
datastream_type_string,
datastream_type);
} else {
proto_tree_add_uint_format_value(spx_tree, hf_spx_datastream_type, tvb,
1, 1, datastream_type,
"0x%02X",
datastream_type);
}
proto_tree_add_item(spx_tree, hf_spx_src_id, tvb, 2, 2, ENC_BIG_ENDIAN);
proto_tree_add_item(spx_tree, hf_spx_dst_id, tvb, 4, 2, ENC_BIG_ENDIAN);
}
spx_seq = tvb_get_ntohs(tvb, 6);
if (tree) {
proto_tree_add_uint(spx_tree, hf_spx_seq_nr, tvb, 6, 2, spx_seq);
proto_tree_add_item(spx_tree, hf_spx_ack_nr, tvb, 8, 2, ENC_BIG_ENDIAN);
proto_tree_add_item(spx_tree, hf_spx_all_nr, tvb, 10, 2, ENC_BIG_ENDIAN);
/* field exists on ALL SPXII packets EXCEPT the first packet of
* the session. The first packet can be determined by checking
* the destination ID field for a value of 0xffff (65535) and
* that the SPXII bit is set in Connection Control.
*/
if ((conn_ctrl & SPX_VII_PACKET) && tvb_get_ntohs(tvb, 4) != 0xffff) {
proto_tree_add_item(spx_tree, hf_spx_neg_size, tvb, 12, 2, ENC_BIG_ENDIAN);
}
}
/*
* SPX is Connection Oriented and Delivery Guaranteed.
* On the first pass, we need to flag retransmissions by the SPX
* protocol, so that subdissectors know whether a packet was
* retransmitted.
*
* We start out by creating a conversation for this direction of the
* IPX session; we use "pinfo->srcport" twice, so that we have
* separate conversations for the two directions.
*
* XXX - that might not work correctly if there's more than one
* SPX session using that source port; can that happen? If so,
* we should probably use the direction, as well as the conversation,
* as part of the hash key; if we do that, we can probably just
* use PT_IPX as the port type, and possibly get rid of PT_NCP.
*
* According to
*
* http://developer.novell.com/research/appnotes/1995/december/03/apv.htm
*
* the sequence number is not incremented for system packets, so
* presumably that means there is no notion of a system packet
* being retransmitted; that document also says that system
* packets are used as "I'm still here" keepalives and as
* acknowledgements (presumably meaning ACK-only packets), which
* suggests that they might not be ACKed and thus might not
* be retransmitted.
*/
if (conn_ctrl & SPX_SYS_PACKET) {
/*
* It's a system packet, so it isn't a retransmission.
*/
spx_rexmit_info_p = NULL;
} else {
/*
* Not a system packet - check for retransmissions.
*/
if (!pinfo->fd->flags.visited) {
conversation = find_conversation(pinfo->num, &pinfo->src,
&pinfo->dst, PT_NCP, pinfo->srcport,
pinfo->srcport, 0);
if (conversation == NULL) {
/*
* It's not part of any conversation - create
* a new one.
*/
conversation = conversation_new(pinfo->num, &pinfo->src,
&pinfo->dst, PT_NCP, pinfo->srcport,
pinfo->srcport, 0);
}
/*
* Now we'll hash the SPX header and use the result
* of that, plus the conversation, as a hash key to
* identify this packet.
*
* If we don't find it in the hash table, it's not a
* retransmission, otherwise it is. If we don't find
* it, we enter it into the hash table, with the
* frame number.
* If we do, we attach to this frame a structure giving
* the frame number of the original transmission, so
* that we, and subdissectors, know it's a
* retransmission.
*/
src = tvb_get_ntohs(tvb, 0)+tvb_get_ntohs(tvb, 2)+tvb_get_ntohs(tvb, 4)+tvb_get_ntohs(tvb, 6)+tvb_get_ntohs(tvb, 8);
pkt_value = spx_hash_lookup(conversation, src, spx_seq);
if (pkt_value == NULL) {
/*
* Not found in the hash table.
* Enter it into the hash table.
*/
pkt_value = spx_hash_insert(conversation, src,
spx_seq);
pkt_value->spx_ack = tvb_get_ntohs(tvb, 8);
pkt_value->spx_all = tvb_get_ntohs(tvb, 10);
pkt_value->num = pinfo->num;
/*
* This is not a retransmission, so we shouldn't
* have any retransmission indicator.
*/
spx_rexmit_info_p = NULL;
} else {
/*
* Found in the hash table. Mark this frame as
* a retransmission.
*/
spx_rexmit_info_p = wmem_new(wmem_file_scope(), spx_rexmit_info);
spx_rexmit_info_p->num = pkt_value->num;
p_add_proto_data(wmem_file_scope(), pinfo, proto_spx, 0,
spx_rexmit_info_p);
}
} else {
/*
* Do we have per-packet SPX data for this frame?
* If so, it's a retransmission, and the per-packet
* data indicates which frame had the original
* transmission.
*/
spx_rexmit_info_p = (spx_rexmit_info *)p_get_proto_data(wmem_file_scope(), pinfo,
proto_spx, 0);
}
}
/*
* It's a retransmission if we have a retransmission indicator.
* Flag this as a retransmission, but don't pass it to the
* subdissector.
*/
if (spx_rexmit_info_p != NULL) {
col_add_fstr(pinfo->cinfo, COL_INFO,
"[Retransmission] Original Packet %u",
spx_rexmit_info_p->num);
if (tree) {
proto_tree_add_uint_format(spx_tree, hf_spx_rexmt_frame,
tvb, 0, 0, spx_rexmit_info_p->num,
"This is a retransmission of frame %u",
spx_rexmit_info_p->num);
if (tvb_reported_length_remaining(tvb, hdr_len) > 0) {
proto_tree_add_item(spx_tree, hf_spx_rexmt_data, tvb, hdr_len, -1, ENC_NA);
}
}
return tvb_captured_length(tvb);
}
if (tvb_reported_length_remaining(tvb, hdr_len) > 0) {
/*
* Call subdissectors based on the IPX socket numbers; a
* subdissector might have registered with our IPX socket
* dissector table rather than the IPX dissector's socket
* dissector table.
*
* Assume the lower-numbered socket number is more likely
* to be the right one, along the lines of what we do for
* TCP and UDP. We've seen NCP packets with a type of NCP,
* a source socket of IPX_SOCKET_NCP, and a destination
* socket of IPX_SOCKET_IPX_MESSAGE, and we've seen NCP
* packets with a type of NCP, a source socket of
* IPX_SOCKET_IPX_MESSAGE, and a destination socket of
* IPX_SOCKET_NCP.
*/
if (pinfo->srcport > pinfo->destport) {
low_socket = pinfo->destport;
high_socket = pinfo->srcport;
} else {
low_socket = pinfo->srcport;
high_socket = pinfo->destport;
}
/*
* Pass information to subdissectors.
*/
spx_infox.eom = conn_ctrl & SPX_EOM;
spx_infox.datastream_type = datastream_type;
next_tvb = tvb_new_subset_remaining(tvb, hdr_len);
if (dissector_try_uint_new(spx_socket_dissector_table, low_socket,
next_tvb, pinfo, tree, FALSE, &spx_infox))
{
return tvb_captured_length(tvb);
}
if (dissector_try_uint_new(spx_socket_dissector_table, high_socket,
next_tvb, pinfo, tree, FALSE, &spx_infox))
{
return tvb_captured_length(tvb);
}
call_data_dissector(next_tvb, pinfo, tree);
}
return tvb_captured_length(tvb);
}
/* ================================================================= */
/* IPX Message */
/* ================================================================= */
static int
dissect_ipxmsg(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
{
proto_tree *msg_tree;
proto_item *ti;
guint8 conn_number, sig_char;
col_set_str(pinfo->cinfo, COL_PROTOCOL, "IPX MSG");
col_clear(pinfo->cinfo, COL_INFO);
conn_number = tvb_get_guint8(tvb, 0);
sig_char = tvb_get_guint8(tvb, 1);
col_add_fstr(pinfo->cinfo, COL_INFO,
"%s, Connection %d",
val_to_str_const(sig_char, ipxmsg_sigchar_vals, "Unknown Signature Char"), conn_number);
if (tree) {
ti = proto_tree_add_item(tree, proto_ipxmsg, tvb, 0, -1, ENC_NA);
msg_tree = proto_item_add_subtree(ti, ett_ipxmsg);
proto_tree_add_uint(msg_tree, hf_msg_conn, tvb, 0, 1, conn_number);
proto_tree_add_uint(msg_tree, hf_msg_sigchar, tvb, 1, 1, sig_char);
}
return tvb_captured_length(tvb);
}
/* ================================================================= */
/* IPX RIP */
/* ================================================================= */
static const value_string ipxrip_packet_vals[] = {
{ IPX_RIP_REQUEST, "Request"},
{ IPX_RIP_RESPONSE, "Response"},
{ 0, NULL}
};
static int
dissect_ipxrip(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
{
proto_tree *rip_tree;
proto_item *ti, *hidden_item;
guint16 operation, ticks;
int cursor;
int available_length;
col_set_str(pinfo->cinfo, COL_PROTOCOL, "IPX RIP");
col_clear(pinfo->cinfo, COL_INFO);
operation = tvb_get_ntohs(tvb, 0);
/* rip_types 0 and 1 are valid, anything else becomes 2 or "Unknown" */
col_set_str(pinfo->cinfo, COL_INFO, val_to_str_const(operation, ipxrip_packet_vals, "Unknown"));
if (tree) {
ti = proto_tree_add_item(tree, proto_ipxrip, tvb, 0, -1, ENC_NA);
rip_tree = proto_item_add_subtree(ti, ett_ipxrip);
proto_tree_add_item(rip_tree, hf_ipxrip_packet_type, tvb, 0, 2, ENC_BIG_ENDIAN);
switch(operation)
{
case IPX_RIP_REQUEST:
hidden_item = proto_tree_add_boolean(rip_tree,
hf_ipxrip_request,
tvb, 0, 2, 1);
PROTO_ITEM_SET_HIDDEN(hidden_item);
break;
case IPX_RIP_RESPONSE:
hidden_item = proto_tree_add_boolean(rip_tree,
hf_ipxrip_response,
tvb, 0, 2, 1);
PROTO_ITEM_SET_HIDDEN(hidden_item);
break;
}
available_length = tvb_reported_length(tvb);
for (cursor = 2; cursor < available_length; cursor += 8) {
ticks = tvb_get_ntohs(tvb, cursor+6);
proto_tree_add_item(rip_tree, hf_ipxrip_route_vector, tvb, cursor, 4, ENC_NA);
proto_tree_add_item(rip_tree, hf_ipxrip_hops, tvb, cursor+4, 2, ENC_BIG_ENDIAN);
if (operation == IPX_RIP_REQUEST - 1) {
proto_tree_add_item(rip_tree, hf_ipxrip_ticks, tvb, cursor+6, 2, ENC_BIG_ENDIAN);
}
else {
proto_tree_add_uint_format_value(rip_tree, hf_ipxrip_ticks, tvb, cursor+6, 2, ticks,
"%d ms", ticks * 1000 / 18);
}
}
}
return tvb_captured_length(tvb);
}
/* ================================================================= */
/* IPX Serialization */
/* ================================================================= */
static int
dissect_serialization(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
{
proto_tree *ser_tree = NULL;
proto_item *ti;
col_set_str(pinfo->cinfo, COL_PROTOCOL, "NW_SERIAL");
col_clear(pinfo->cinfo, COL_INFO);
if (tree) {
ti = proto_tree_add_item(tree, proto_serialization, tvb, 0, -1,
ENC_NA);
ser_tree = proto_item_add_subtree(ti, ett_serialization);
}
col_add_fstr(pinfo->cinfo, COL_INFO, "Serial number %s",
tvb_bytes_to_str(wmem_packet_scope(), tvb, 0, 6));
proto_tree_add_item(ser_tree, hf_serial_number, tvb, 0, 6, ENC_NA);
return tvb_captured_length(tvb);
}
/*
* Some of these are from ncpfs, others are from the book,
* others are from the page at
*
* http://www.iana.org/assignments/novell-sap-numbers
*
* and some from the page at
*
* http://www.rware.demon.co.uk/ipxsap.htm
*
* (see also the page at
*
* http://developer.novell.com/research/appnotes/1998/february/03/06.htm
*
* which has a huge list - but many of the entries list only the
* organization owning the SAP type, not what the type is for).
*/
static const value_string novell_server_vals[] = {
{ 0x0000, "Unknown" },
{ 0x0001, "User" },
{ 0x0002, "User Group" },
{ 0x0003, "Print Queue or Print Group" },
{ 0x0004, "File Server (SLIST source)" },
{ 0x0005, "Job Server" },
{ 0x0006, "Gateway" },
{ 0x0007, "Print Server or Silent Print Server" },
{ 0x0008, "Archive Queue" },
{ 0x0009, "Archive Server" },
{ 0x000a, "Job Queue" },
{ 0x000b, "Administration" },
{ 0x000F, "Novell TI-RPC" },
{ 0x0017, "Diagnostics" },
{ 0x0020, "NetBIOS" },
{ 0x0021, "NAS SNA Gateway" },
{ 0x0023, "NACS Async Gateway or Asynchronous Gateway" },
{ 0x0024, "Remote Bridge or Routing Service" },
{ 0x0026, "Bridge Server or Asynchronous Bridge Server" },
{ 0x0027, "TCP/IP Gateway Server" },
{ 0x0028, "Point to Point (Eicon) X.25 Bridge Server" },
{ 0x0029, "Eicon 3270 Gateway" },
{ 0x002a, "CHI Corp" },
{ 0x002c, "PC Chalkboard" },
{ 0x002d, "Time Synchronization Server or Asynchronous Timer" },
{ 0x002e, "ARCserve 5.0 / Palindrome Backup Director 4.x (PDB4)" },
{ 0x0045, "DI3270 Gateway" },
{ 0x0047, "Advertising Print Server" },
{ 0x004a, "NetBlazer Modems" },
{ 0x004b, "Btrieve VAP/NLM 5.0" },
{ 0x004c, "NetWare SQL VAP/NLM Server" },
{ 0x004d, "Xtree Network Version/NetWare XTree" },
{ 0x0050, "Btrieve VAP 4.11" },
{ 0x0052, "QuickLink (Cubix)" },
{ 0x0053, "Print Queue User" },
{ 0x0058, "Multipoint X.25 Eicon Router" },
{ 0x0060, "STLB/NLM" },
{ 0x0064, "ARCserve" },
{ 0x0066, "ARCserve 3.0" },
{ 0x0072, "WAN Copy Utility" },
{ 0x007a, "TES-NetWare for VMS" },
{ 0x0092, "WATCOM Debugger or Emerald Tape Backup Server" },
{ 0x0095, "DDA OBGYN" },
{ 0x0098, "NetWare Access Server (Asynchronous gateway)" },
{ 0x009a, "NetWare for VMS II or Named Pipe Server" },
{ 0x009b, "NetWare Access Server" },
{ 0x009e, "Portable NetWare Server or SunLink NVT" },
{ 0x00a1, "Powerchute APC UPS NLM" },
{ 0x00aa, "LAWserve" },
{ 0x00ac, "Compaq IDA Status Monitor" },
{ 0x0100, "PIPE STAIL" },
{ 0x0102, "LAN Protect Bindery" },
{ 0x0103, "Oracle DataBase Server" },
{ 0x0107, "NetWare 386 or RSPX Remote Console" },
{ 0x010f, "Novell SNA Gateway" },
{ 0x0111, "Test Server" },
{ 0x0112, "Print Server (HP)" },
{ 0x0114, "CSA MUX (f/Communications Executive)" },
{ 0x0115, "CSA LCA (f/Communications Executive)" },
{ 0x0116, "CSA CM (f/Communications Executive)" },
{ 0x0117, "CSA SMA (f/Communications Executive)" },
{ 0x0118, "CSA DBA (f/Communications Executive)" },
{ 0x0119, "CSA NMA (f/Communications Executive)" },
{ 0x011a, "CSA SSA (f/Communications Executive)" },
{ 0x011b, "CSA STATUS (f/Communications Executive)" },
{ 0x011e, "CSA APPC (f/Communications Executive)" },
{ 0x0126, "SNA TEST SSA Profile" },
{ 0x012a, "CSA TRACE (f/Communications Executive)" },
{ 0x012b, "NetWare for SAA" },
{ 0x012e, "IKARUS virus scan utility" },
{ 0x0130, "Communications Executive" },
{ 0x0133, "NNS Domain Server or NetWare Naming Services Domain" },
{ 0x0135, "NetWare Naming Services Profile" },
{ 0x0137, "NetWare 386 Print Queue or NNS Print Queue" },
{ 0x0141, "LAN Spool Server (Vap, Intel)" },
{ 0x0152, "IRMALAN Gateway" },
{ 0x0154, "Named Pipe Server" },
{ 0x0166, "NetWare Management" },
{ 0x0168, "Intel PICKIT Comm Server or Intel CAS Talk Server" },
{ 0x0173, "Compaq" },
{ 0x0174, "Compaq SNMP Agent" },
{ 0x0175, "Compaq" },
{ 0x0180, "XTree Server or XTree Tools" },
{ 0x018A, "NASI services broadcast server (Novell)" },
{ 0x01b0, "GARP Gateway (net research)" },
{ 0x01b1, "Binfview (Lan Support Group)" },
{ 0x01bf, "Intel LanDesk Manager" },
{ 0x01ca, "AXTEC" },
{ 0x01cb, "Shiva NetModem/E" },
{ 0x01cc, "Shiva LanRover/E" },
{ 0x01cd, "Shiva LanRover/T" },
{ 0x01ce, "Shiva Universal" },
{ 0x01d8, "Castelle FAXPress Server" },
{ 0x01da, "Castelle LANPress Print Server" },
{ 0x01dc, "Castelle FAX/Xerox 7033 Fax Server/Excel Lan Fax" },
{ 0x01f0, "LEGATO" },
{ 0x01f5, "LEGATO" },
{ 0x0233, "NMS Agent or NetWare Management Agent" },
{ 0x0237, "NMS IPX Discovery or LANtern Read/Write Channel" },
{ 0x0238, "NMS IP Discovery or LANtern Trap/Alarm Channel" },
{ 0x023a, "LANtern" },
{ 0x023c, "MAVERICK" },
{ 0x023f, "SMS Testing and Development" },
{ 0x024e, "NetWare Connect" },
{ 0x024f, "NASI server broadcast (Cisco)" },
{ 0x026a, "Network Management (NMS) Service Console" },
{ 0x026b, "Time Synchronization Server (NetWare 4.x)" },
{ 0x0278, "Directory Server (NetWare 4.x)" },
{ 0x027b, "NetWare Management Agent" },
{ 0x0280, "Novell File and Printer Sharing Service for PC" },
{ 0x0304, "Novell SAA Gateway" },
{ 0x0308, "COM or VERMED 1" },
{ 0x030a, "Galacticomm's Worldgroup Server" },
{ 0x030c, "Intel Netport 2 or HP JetDirect or HP Quicksilver" },
{ 0x0320, "Attachmate Gateway" },
{ 0x0327, "Microsoft Diagnostics" },
{ 0x0328, "WATCOM SQL server" },
{ 0x0335, "MultiTech Systems Multisynch Comm Server" },
{ 0x0343, "Xylogics Remote Access Server or LAN Modem" },
{ 0x0355, "Arcada Backup Exec" },
{ 0x0358, "MSLCD1" },
{ 0x0361, "NETINELO" },
{ 0x037e, "Powerchute UPS Monitoring" },
{ 0x037f, "ViruSafe Notify" },
{ 0x0386, "HP Bridge" },
{ 0x0387, "HP Hub" },
{ 0x0394, "NetWare SAA Gateway" },
{ 0x039b, "Lotus Notes" },
{ 0x03b7, "Certus Anti Virus NLM" },
{ 0x03c4, "ARCserve 4.0 (Cheyenne)" },
{ 0x03c7, "LANspool 3.5 (Intel)" },
{ 0x03d7, "Lexmark printer server (type 4033-011)" },
{ 0x03d8, "Lexmark XLE printer server (type 4033-301)" },
{ 0x03dd, "Banyan ENS for NetWare Client NLM" },
{ 0x03de, "Gupta Sequel Base Server or NetWare SQL" },
{ 0x03e1, "Univel Unixware" },
{ 0x03e4, "Univel Unixware" },
{ 0x03fc, "Intel Netport" },
{ 0x03fd, "Intel Print Server Queue" },
{ 0x040A, "ipnServer" },
{ 0x040D, "LVERRMAN" },
{ 0x040E, "LVLIC" },
{ 0x0414, "NET Silicon (DPI)/Kyocera" },
{ 0x0429, "Site Lock Virus (Brightworks)" },
{ 0x0432, "UFHELP R" },
{ 0x0433, "Synoptics 281x Advanced SNMP Agent" },
{ 0x0444, "Microsoft NT SNA Server" },
{ 0x0448, "Oracle" },
{ 0x044c, "ARCserve 5.01" },
{ 0x0457, "Canon GP55 Running on a Canon GP55 network printer" },
{ 0x045a, "QMS Printers" },
{ 0x045b, "Dell SCSI Array (DSA) Monitor" },
{ 0x0491, "NetBlazer Modems" },
{ 0x04ac, "On-Time Scheduler NLM" },
{ 0x04b0, "CD-Net (Meridian)" },
{ 0x0513, "Emulex NQA" },
{ 0x0520, "Site Lock Checks" },
{ 0x0529, "Site Lock Checks (Brightworks)" },
{ 0x052d, "Citrix OS/2 App Server" },
{ 0x0535, "Tektronix" },
{ 0x0536, "Milan" },
{ 0x055d, "Attachmate SNA gateway" },
{ 0x056b, "IBM 8235 modem server" },
{ 0x056c, "Shiva LanRover/E PLUS" },
{ 0x056d, "Shiva LanRover/T PLUS" },
{ 0x0580, "McAfee's NetShield anti-virus" },
{ 0x05B8, "NLM to workstation communication (Revelation Software)" },
{ 0x05BA, "Compatible Systems Routers" },
{ 0x05BE, "Cheyenne Hierarchical Storage Manager" },
{ 0x0606, "JCWatermark Imaging" },
{ 0x060c, "AXIS Network Printer" },
{ 0x0610, "Adaptec SCSI Management" },
{ 0x0621, "IBM AntiVirus NLM" },
{ 0x0640, "Microsoft Gateway Services for NetWare" },
/* { 0x0640, "NT Server-RPC/GW for NW/Win95 User Level Sec" }, */
{ 0x064e, "Microsoft Internet Information Server" },
{ 0x067b, "Microsoft Win95/98 File and Print Sharing for NetWare" },
{ 0x067c, "Microsoft Win95/98 File and Print Sharing for NetWare" },
{ 0x076C, "Xerox" },
{ 0x079b, "Shiva LanRover/E 115" },
{ 0x079c, "Shiva LanRover/T 115" },
{ 0x07B4, "Cubix WorldDesk" },
{ 0x07c1, "Quarterdeck IWare Connect V3.x NLM" },
{ 0x07c2, "Quarterdeck IWare Connect V2.x NLM" },
{ 0x0810, "ELAN License Server Demo" },
{ 0x0824, "Shiva LanRover Access Switch/E" },
{ 0x086a, "ISSC collector NLMs" },
{ 0x087f, "ISSC DAS agent for AIX" },
{ 0x0880, "Intel Netport PRO" },
{ 0x0881, "Intel Netport PRO" },
{ 0x0b29, "Site Lock" },
{ 0x0c29, "Site Lock Applications" },
{ 0x0c2c, "Licensing Server" },
{ 0x2101, "Performance Technology Instant Internet" },
{ 0x2380, "LAI Site Lock" },
{ 0x238c, "Meeting Maker" },
{ 0x4808, "Site Lock Server or Site Lock Metering VAP/NLM" },
{ 0x5555, "Site Lock User" },
{ 0x6312, "Tapeware" },
{ 0x6f00, "Rabbit Gateway (3270)" },
{ 0x7703, "MODEM" },
{ 0x8002, "NetPort Printers (Intel) or LANport" },
{ 0x8003, "SEH InterCon Printserver" },
{ 0x8008, "WordPerfect Network Version" },
{ 0x85BE, "Cisco Enhanced Interior Routing Protocol (EIGRP)" },
{ 0x8888, "WordPerfect Network Version or Quick Network Management" },
{ 0x9000, "McAfee's NetShield anti-virus" },
{ 0x9604, "CSA-NT_MON" },
{ 0xb6a8, "Ocean Isle Reachout Remote Control" },
{ 0xf11f, "Site Lock Metering VAP/NLM" },
{ 0xf1ff, "Site Lock" },
{ 0xf503, "Microsoft SQL Server" },
{ 0xf905, "IBM Time and Place/2 application" },
{ 0xfbfb, "TopCall III fax server" },
{ 0xffff, "Any Service or Wildcard" },
{ 0x0000, NULL }
};
value_string_ext novell_server_vals_ext = VALUE_STRING_EXT_INIT(novell_server_vals);
static const value_string ipxsap_packet_vals[] = {
{ IPX_SAP_GENERAL_QUERY, "General Query"},
{ IPX_SAP_GENERAL_RESPONSE, "General Response"},
{ IPX_SAP_NEAREST_QUERY, "Nearest Query"},
{ IPX_SAP_NEAREST_RESPONSE, "Nearest Response"},
{ 0, NULL}
};
static int
dissect_ipxsap(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
{
proto_tree *sap_tree, *s_tree;
proto_item *ti, *hidden_item;
int cursor;
struct sap_query query;
col_set_str(pinfo->cinfo, COL_PROTOCOL, "IPX SAP");
col_clear(pinfo->cinfo, COL_INFO);
query.query_type = tvb_get_ntohs(tvb, 0);
query.server_type = tvb_get_ntohs(tvb, 2);
col_set_str(pinfo->cinfo, COL_INFO, val_to_str_const(query.query_type, ipxsap_packet_vals, "Unknown Packet Type"));
if (tree) {
ti = proto_tree_add_item(tree, proto_sap, tvb, 0, -1, ENC_NA);
sap_tree = proto_item_add_subtree(ti, ett_ipxsap);
proto_tree_add_item(sap_tree, hf_sap_packet_type, tvb, 0, 2, ENC_BIG_ENDIAN);
switch(query.query_type)
{
case IPX_SAP_GENERAL_QUERY:
case IPX_SAP_NEAREST_QUERY:
hidden_item = proto_tree_add_boolean(sap_tree,
hf_sap_response,
tvb, 0, 2, 1);
PROTO_ITEM_SET_HIDDEN(hidden_item);
break;
case IPX_SAP_GENERAL_RESPONSE:
case IPX_SAP_NEAREST_RESPONSE:
hidden_item = proto_tree_add_boolean(sap_tree,
hf_sap_request,
tvb, 0, 2, 1);
PROTO_ITEM_SET_HIDDEN(hidden_item);
break;
}
if (query.query_type == IPX_SAP_GENERAL_RESPONSE ||
query.query_type == IPX_SAP_NEAREST_RESPONSE) { /* responses */
int available_length = tvb_reported_length(tvb);
for (cursor = 2; (cursor + 64) <= available_length; cursor += 64) {
ti = proto_tree_add_item(sap_tree, hf_sap_server_name, tvb, cursor+2, 48, ENC_ASCII|ENC_NA);
s_tree = proto_item_add_subtree(ti, ett_ipxsap_server);
proto_tree_add_item(s_tree, hf_sap_server_type, tvb, cursor, 2, ENC_BIG_ENDIAN);
proto_tree_add_item(s_tree, hf_sap_network, tvb, cursor+50, 4, ENC_NA);
proto_tree_add_item(s_tree, hf_sap_node, tvb, cursor+54, 6, ENC_NA);
proto_tree_add_item(s_tree, hf_sap_socket, tvb, cursor+60, 2, ENC_BIG_ENDIAN);
proto_tree_add_item(s_tree, hf_sap_intermediate_networks, tvb, cursor+62, 2, ENC_BIG_ENDIAN);
}
}
else { /* queries */
proto_tree_add_item(sap_tree, hf_sap_server_type, tvb, 2, 2, ENC_BIG_ENDIAN);
}
}
return tvb_captured_length(tvb);
}
void
proto_register_ipx(void)
{
static hf_register_info hf_ipx[] = {
{ &hf_ipx_checksum,
{ "Checksum", "ipx.checksum", FT_UINT16, BASE_HEX, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipx_src,
{ "Source Address", "ipx.src", FT_STRING, BASE_NONE, NULL, 0x0,
"Source IPX Address \"network.node\"", HFILL }},
{ &hf_ipx_dst,
{ "Destination Address", "ipx.dst", FT_STRING, BASE_NONE, NULL, 0x0,
"Destination IPX Address \"network.node\"", HFILL }},
{ &hf_ipx_addr,
{ "Src/Dst Address", "ipx.addr", FT_STRING, BASE_NONE, NULL, 0x0,
"Source or Destination IPX Address \"network.node\"", HFILL }},
{ &hf_ipx_len,
{ "Length", "ipx.len", FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipx_hops,
{ "Transport Control (Hops)", "ipx.hops", FT_UINT8, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipx_packet_type,
{ "Packet Type", "ipx.packet_type", FT_UINT8, BASE_HEX, VALS(ipx_packet_type_vals),
0x0,
NULL, HFILL }},
{ &hf_ipx_dnet,
{ "Destination Network","ipx.dst.net", FT_IPXNET, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipx_dnode,
{ "Destination Node", "ipx.dst.node", FT_ETHER, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipx_dsocket,
{ "Destination Socket", "ipx.dst.socket", FT_UINT16, BASE_HEX|BASE_EXT_STRING,
&ipx_socket_vals_ext, 0x0,
NULL, HFILL }},
{ &hf_ipx_snet,
{ "Source Network","ipx.src.net", FT_IPXNET, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipx_snode,
{ "Source Node", "ipx.src.node", FT_ETHER, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipx_ssocket,
{ "Source Socket", "ipx.src.socket", FT_UINT16, BASE_HEX|BASE_EXT_STRING,
&ipx_socket_vals_ext, 0x0,
NULL, HFILL }},
{ &hf_ipx_net,
{ "Source or Destination Network","ipx.net", FT_IPXNET, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipx_node,
{ "Source or Destination Node", "ipx.node", FT_ETHER, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipx_socket,
{ "Source or Destination Socket", "ipx.socket", FT_UINT16, BASE_HEX|BASE_EXT_STRING,
&ipx_socket_vals_ext, 0x0,
NULL, HFILL }},
};
static hf_register_info hf_spx[] = {
{ &hf_spx_connection_control,
{ "Connection Control", "spx.ctl",
FT_UINT8, BASE_HEX, VALS(conn_vals), 0xF0,
NULL, HFILL }},
{ &hf_spx_connection_control_sys,
{ "System Packet", "spx.ctl.sys",
FT_BOOLEAN, 8, NULL, SPX_SYS_PACKET,
NULL, HFILL }},
{ &hf_spx_connection_control_send_ack,
{ "Send Ack", "spx.ctl.send_ack",
FT_BOOLEAN, 8, NULL, SPX_SEND_ACK,
NULL, HFILL }},
{ &hf_spx_connection_control_attn,
{ "Attention", "spx.ctl.attn",
FT_BOOLEAN, 8, NULL, SPX_ATTN,
NULL, HFILL }},
{ &hf_spx_connection_control_eom,
{ "End of Message", "spx.ctl.eom",
FT_BOOLEAN, 8, NULL, SPX_EOM,
NULL, HFILL }},
{ &hf_spx_connection_control_v2,
{ "SPXII Packet", "spx.ctl.v2",
FT_BOOLEAN, 8, NULL, SPX_VII_PACKET,
NULL, HFILL }},
{ &hf_spx_connection_control_neg_size,
{ "Negotiate Size", "spx.ctl.neg_size",
FT_BOOLEAN, 8, NULL, SPX_NEG_SIZE,
NULL, HFILL }},
{ &hf_spx_connection_control_reserved,
{ "Reserved", "spx.ctl.reserved",
FT_BOOLEAN, 8, NULL, SPX_RESERVED,
NULL, HFILL }},
{ &hf_spx_connection_control_ext_header,
{ "Extended Header", "spx.ctl.ext_header",
FT_BOOLEAN, 8, NULL, SPX_EXT_HEADER,
NULL, HFILL }},
{ &hf_spx_datastream_type,
{ "Datastream Type", "spx.type",
FT_UINT8, BASE_HEX, NULL, 0x0,
NULL, HFILL }},
{ &hf_spx_src_id,
{ "Source Connection ID", "spx.src",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_spx_dst_id,
{ "Destination Connection ID", "spx.dst",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_spx_seq_nr,
{ "Sequence Number", "spx.seq",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_spx_ack_nr,
{ "Acknowledgment Number", "spx.ack",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_spx_all_nr,
{ "Allocation Number", "spx.alloc",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_spx_neg_size,
{ "Negotiation Size", "spx.neg_size",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_spx_rexmt_frame,
{ "Retransmitted Frame Number", "spx.rexmt_frame",
FT_FRAMENUM, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
{ &hf_spx_rexmt_data,
{ "Retransmitted data", "spx.rexmt_data",
FT_BYTES, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
};
static hf_register_info hf_ipxrip[] = {
{ &hf_ipxrip_request,
{ "Request", "ipxrip.request",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"TRUE if IPX RIP request", HFILL }},
{ &hf_ipxrip_response,
{ "Response", "ipxrip.response",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"TRUE if IPX RIP response", HFILL }},
{ &hf_ipxrip_packet_type,
{ "RIP packet type", "ipxrip.packet_type",
FT_UINT16, BASE_DEC, VALS(ipxrip_packet_vals), 0x0,
NULL, HFILL }},
{ &hf_ipxrip_route_vector,
{ "Route Vector", "ipxrip.route_vector",
FT_IPXNET, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipxrip_hops,
{ "Hops", "ipxrip.hops",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_ipxrip_ticks,
{ "Ticks", "ipxrip.ticks",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
};
static hf_register_info hf_sap[] = {
{ &hf_sap_request,
{ "Request", "ipxsap.request",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"TRUE if SAP request", HFILL }},
{ &hf_sap_response,
{ "Response", "ipxsap.response",
FT_BOOLEAN, BASE_NONE, NULL, 0x0,
"TRUE if SAP response", HFILL }},
/* Generated from convert_proto_tree_add_text.pl */
{ &hf_sap_packet_type, { "SAP packet type", "ipxsap.packet_type", FT_UINT16, BASE_DEC, VALS(ipxsap_packet_vals), 0x0, NULL, HFILL }},
{ &hf_sap_server_name, { "Server Name", "ipxsap.server_name", FT_STRINGZ, BASE_NONE, NULL, 0x0, NULL, HFILL }},
{ &hf_sap_server_type, { "Server Type", "ipxsap.server_type", FT_UINT16, BASE_HEX|BASE_EXT_STRING, &novell_server_vals_ext, 0x0, NULL, HFILL }},
{ &hf_sap_network, { "Network", "ipxsap.network", FT_IPXNET, BASE_NONE, NULL, 0x0, NULL, HFILL }},
{ &hf_sap_node, { "Node", "ipxsap.node", FT_ETHER, BASE_NONE, NULL, 0x0, NULL, HFILL }},
{ &hf_sap_socket, { "Socket", "ipxsap.socket", FT_UINT16, BASE_HEX|BASE_EXT_STRING, &ipx_socket_vals_ext, 0x0, NULL, HFILL }},
{ &hf_sap_intermediate_networks, { "Intermediate Networks", "ipxsap.intermediate_networks", FT_UINT16, BASE_DEC, NULL, 0x0, NULL, HFILL }},
};
static hf_register_info hf_ipxmsg[] = {
{ &hf_msg_conn,
{ "Connection Number", "ipxmsg.conn",
FT_UINT8, BASE_DEC, NULL, 0x0,
NULL, HFILL }},
{ &hf_msg_sigchar,
{ "Signature Char", "ipxmsg.sigchar",
FT_UINT8, BASE_DEC, VALS(ipxmsg_sigchar_vals), 0x0,
NULL, HFILL }}
};
static hf_register_info hf_serial[] = {
{ &hf_serial_number,
{ "Serial number", "nw_serial.serial_number",
FT_BYTES, BASE_NONE, NULL, 0x0,
NULL, HFILL }},
};
static gint *ett[] = {
&ett_ipx,
&ett_spx,
&ett_spx_connctrl,
&ett_ipxmsg,
&ett_ipxrip,
&ett_serialization,
&ett_ipxsap,
&ett_ipxsap_server,
};
proto_ipx = proto_register_protocol("Internetwork Packet eXchange",
"IPX", "ipx");
proto_register_field_array(proto_ipx, hf_ipx, array_length(hf_ipx));
register_dissector("ipx", dissect_ipx, proto_ipx);
proto_spx = proto_register_protocol("Sequenced Packet eXchange",
"SPX", "spx");
proto_register_field_array(proto_spx, hf_spx, array_length(hf_spx));
proto_ipxrip = proto_register_protocol("IPX Routing Information Protocol",
"IPX RIP", "ipxrip");
proto_register_field_array(proto_ipxrip, hf_ipxrip, array_length(hf_ipxrip));
proto_serialization = proto_register_protocol("NetWare Serialization Protocol",
"NW_SERIAL", "nw_serial");
proto_register_field_array(proto_serialization, hf_serial, array_length(hf_serial));
proto_ipxmsg = proto_register_protocol("IPX Message", "IPX MSG",
"ipxmsg");
proto_register_field_array(proto_ipxmsg, hf_ipxmsg, array_length(hf_ipxmsg));
proto_sap = proto_register_protocol("Service Advertisement Protocol",
"IPX SAP", "ipxsap");
register_dissector("ipxsap", dissect_ipxsap, proto_sap);
proto_register_field_array(proto_sap, hf_sap, array_length(hf_sap));
proto_register_subtree_array(ett, array_length(ett));
ipx_type_dissector_table = register_dissector_table("ipx.packet_type",
"IPX packet type", proto_ipx, FT_UINT8, BASE_HEX, DISSECTOR_TABLE_NOT_ALLOW_DUPLICATE);
ipx_socket_dissector_table = register_dissector_table("ipx.socket",
"IPX socket", proto_ipx, FT_UINT16, BASE_HEX, DISSECTOR_TABLE_NOT_ALLOW_DUPLICATE);
spx_socket_dissector_table = register_dissector_table("spx.socket",
"SPX socket", proto_spx, FT_UINT16, BASE_HEX, DISSECTOR_TABLE_NOT_ALLOW_DUPLICATE);
register_init_routine(&spx_init_protocol);
register_postseq_cleanup_routine(&spx_postseq_cleanup);
ipx_tap=register_tap("ipx");
register_conversation_table(proto_ipx, TRUE, ipx_conversation_packet, ipx_hostlist_packet);
}
void
proto_reg_handoff_ipx(void)
{
dissector_handle_t ipx_handle, spx_handle;
dissector_handle_t ipxsap_handle, ipxrip_handle;
dissector_handle_t serialization_handle, ipxmsg_handle;
ipx_handle = find_dissector("ipx");
dissector_add_uint("udp.port", UDP_PORT_IPX, ipx_handle);
dissector_add_uint("ethertype", ETHERTYPE_IPX, ipx_handle);
dissector_add_uint("chdlc.protocol", ETHERTYPE_IPX, ipx_handle);
dissector_add_uint("ppp.protocol", PPP_IPX, ipx_handle);
dissector_add_uint("llc.dsap", SAP_NETWARE1, ipx_handle);
dissector_add_uint("llc.dsap", SAP_NETWARE2, ipx_handle);
dissector_add_uint("sll.ltype", LINUX_SLL_P_802_3, ipx_handle);
dissector_add_uint("null.type", BSD_AF_IPX, ipx_handle);
dissector_add_uint("gre.proto", ETHERTYPE_IPX, ipx_handle);
dissector_add_uint("arcnet.protocol_id", ARCNET_PROTO_IPX, ipx_handle);
dissector_add_uint("arcnet.protocol_id", ARCNET_PROTO_NOVELL_EC, ipx_handle);
spx_handle = create_dissector_handle(dissect_spx, proto_spx);
dissector_add_uint("ipx.packet_type", IPX_PACKET_TYPE_SPX, spx_handle);
ipxsap_handle = find_dissector("ipxsap");
dissector_add_uint("ipx.socket", IPX_SOCKET_SAP, ipxsap_handle);
ipxrip_handle = create_dissector_handle(dissect_ipxrip, proto_ipxrip);
dissector_add_uint("ipx.socket", IPX_SOCKET_IPXRIP, ipxrip_handle);
serialization_handle = create_dissector_handle(dissect_serialization,
proto_serialization);
dissector_add_uint("ipx.socket", IPX_SOCKET_SERIALIZATION,
serialization_handle);
ipxmsg_handle = create_dissector_handle(dissect_ipxmsg, proto_ipxmsg);
dissector_add_uint("ipx.socket", IPX_SOCKET_IPX_MESSAGE, ipxmsg_handle);
dissector_add_uint("ipx.socket", IPX_SOCKET_IPX_MESSAGE1, ipxmsg_handle);
register_capture_dissector("ethertype", ETHERTYPE_IPX, capture_ipx, proto_ipx);
register_capture_dissector("ppp_hdlc", PPP_IPX, capture_ipx, proto_ipx);
register_capture_dissector("sll.ltype", LINUX_SLL_P_802_3, capture_ipx, proto_ipx);
register_capture_dissector("llc.dsap", SAP_NETWARE1, capture_ipx, proto_ipx);
register_capture_dissector("llc.dsap", SAP_NETWARE2, capture_ipx, proto_ipx);
}
/*
* Editor modelines - http://www.wireshark.org/tools/modelines.html
*
* Local variables:
* c-basic-offset: 8
* tab-width: 8
* indent-tabs-mode: t
* End:
*
* vi: set shiftwidth=8 tabstop=8 noexpandtab:
* :indentSize=8:tabSize=8:noTabs=false:
*/