wireshark/epan/dissectors/packet-mpls-psc.c

248 lines
7.1 KiB
C

/* packet-mpls-psc.c
*
* Routines for MPLS[-TP] Protection State Coordination (PSC) Protocol: it
* should conform to RFC 6378.
*
* Copyright 2012 _FF_
*
* Francesco Fondelli <francesco dot fondelli, gmail dot com>
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#include "config.h"
#include <epan/packet.h>
#include "packet-mpls.h"
void proto_register_mpls_psc(void);
void proto_reg_handoff_mpls_psc(void);
static gint proto_mpls_psc = -1;
static gint ett_mpls_psc = -1;
static int hf_mpls_psc_ver = -1;
static int hf_mpls_psc_req = -1;
static int hf_mpls_psc_pt = -1;
static int hf_mpls_psc_rev = -1;
static int hf_mpls_psc_fpath = -1;
static int hf_mpls_psc_dpath = -1;
static int hf_mpls_psc_tlvlen = -1;
/*
* FF: please keep this list in sync with
* http://www.iana.org/assignments/mpls-oam-parameters/mpls-oam-parameters.xml
* Registry Name: 'MPLS PSC Request'
*/
const range_string mpls_psc_req_rvals[] = {
{ 0, 0, "No Request" },
{ 1, 1, "Do Not Revert" },
{ 2, 3, "Unassigned" },
{ 4, 4, "Wait to Restore" },
{ 5, 5, "Manual Switch" },
{ 6, 6, "Unassigned" },
{ 7, 7, "Signal Degrade" },
{ 8, 9, "Unassigned" },
{ 10, 10, "Signal Fail" },
{ 11, 11, "Unassigned" },
{ 12, 12, "Forced Switch" },
{ 13, 13, "Unassigned" },
{ 14, 14, "Lockout of protection" },
{ 15, 15, "Unassigned" },
{ 0, 0, NULL }
};
const value_string mpls_psc_req_short_vals[] = {
{ 0, "NR" },
{ 1, "DNR" },
{ 4, "WTR" },
{ 5, "MS" },
{ 7, "SD" },
{ 10, "SF" },
{ 12, "FS" },
{ 14, "LO" },
{ 0, NULL }
};
const range_string mpls_psc_pt_rvals[] = {
{ 0, 0, "for future extensions" },
{ 1, 1, "unidirectional switching using a permanent bridge" },
{ 2, 2, "bidirectional switching using a selector bridge" },
{ 3, 3, "bidirectional switching using a permanent bridge" },
{ 0, 0, NULL }
};
const range_string mpls_psc_rev_rvals[] = {
{ 0, 0, "non-revertive mode" },
{ 1, 1, "revertive mode" },
{ 0, 0, NULL }
};
const range_string mpls_psc_fpath_rvals[] = {
{ 0, 0, "protection" },
{ 1, 1, "working" },
{ 2, 255, "for future extensions" },
{ 0, 0, NULL }
};
const range_string mpls_psc_dpath_rvals[] = {
{ 0, 0, "protection is not in use" },
{ 1, 1, "protection is in use" },
{ 2, 255, "for future extensions" },
{ 0, 0, NULL }
};
static int
dissect_mpls_psc(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree, void* data _U_)
{
proto_item *ti;
proto_tree *psc_tree;
guint32 offset = 0;
guint8 req;
guint8 fpath;
guint8 path;
col_set_str(pinfo->cinfo, COL_PROTOCOL, "PSC");
col_clear(pinfo->cinfo, COL_INFO);
/* build cinfo */
req = (tvb_get_guint8(tvb, offset) & 0x3C) >> 2;
fpath = tvb_get_guint8(tvb, offset + 2);
path = tvb_get_guint8(tvb, offset + 3);
col_add_fstr(pinfo->cinfo, COL_INFO,
"%s(%u,%u)",
val_to_str_const(req, mpls_psc_req_short_vals, "Unknown-Request"),
fpath, path);
if (!tree) {
return tvb_captured_length(tvb);
}
/* create display subtree for the protocol */
ti = proto_tree_add_item(tree, proto_mpls_psc, tvb, 0, -1, ENC_NA);
psc_tree = proto_item_add_subtree(ti, ett_mpls_psc);
/* version */
proto_tree_add_item(psc_tree, hf_mpls_psc_ver, tvb, offset, 1, ENC_BIG_ENDIAN);
/* request */
proto_tree_add_item(psc_tree, hf_mpls_psc_req, tvb, offset, 1, ENC_BIG_ENDIAN);
/* prot type */
proto_tree_add_item(psc_tree, hf_mpls_psc_pt, tvb, offset, 1, ENC_BIG_ENDIAN);
offset += 1;
/* prot type */
proto_tree_add_item(psc_tree, hf_mpls_psc_rev, tvb, offset, 1, ENC_BIG_ENDIAN);
/* skip reserved1 */
offset += 1;
/* fpath */
proto_tree_add_item(psc_tree, hf_mpls_psc_fpath, tvb, offset, 1, ENC_BIG_ENDIAN);
offset += 1;
/* path */
proto_tree_add_item(psc_tree, hf_mpls_psc_dpath, tvb, offset, 1, ENC_BIG_ENDIAN);
offset += 1;
/* tlv len */
proto_tree_add_item(psc_tree, hf_mpls_psc_tlvlen, tvb, offset, 1, ENC_BIG_ENDIAN);
return tvb_captured_length(tvb);
}
void
proto_register_mpls_psc(void)
{
static hf_register_info hf[] = {
{
&hf_mpls_psc_ver,
{
"Version", "mpls_psc.ver",
FT_UINT8, BASE_DEC, NULL, 0xC0,
NULL, HFILL
}
},
{
&hf_mpls_psc_req,
{
"Request", "mpls_psc.req",
FT_UINT8, BASE_RANGE_STRING | BASE_DEC, RVALS(mpls_psc_req_rvals), 0x3C,
NULL, HFILL
}
},
{
&hf_mpls_psc_pt,
{
"Protection Type", "mpls_psc.pt",
FT_UINT8, BASE_RANGE_STRING | BASE_DEC, RVALS(mpls_psc_pt_rvals), 0x03,
NULL, HFILL
}
},
{
&hf_mpls_psc_rev,
{
"R", "mpls_psc.rev",
FT_UINT8, BASE_RANGE_STRING | BASE_DEC, RVALS(mpls_psc_rev_rvals), 0x80,
NULL, HFILL
}
},
{
&hf_mpls_psc_fpath,
{
"Fault Path", "mpls_psc.fpath",
FT_UINT8, BASE_RANGE_STRING | BASE_DEC, RVALS(mpls_psc_fpath_rvals), 0x0,
NULL, HFILL
}
},
{
&hf_mpls_psc_dpath,
{
"Data Path", "mpls_psc.dpath",
FT_UINT8, BASE_RANGE_STRING | BASE_DEC, RVALS(mpls_psc_dpath_rvals), 0x0,
NULL, HFILL
}
},
{
&hf_mpls_psc_tlvlen,
{
"TLV Length", "mpls_psc.tlvlen",
FT_UINT16, BASE_DEC, NULL, 0x0,
NULL, HFILL
}
},
};
static gint *ett[] = {
&ett_mpls_psc,
};
proto_mpls_psc =
proto_register_protocol("PSC", "MPLS[-TP] Protection State "
"Coordination (PSC) Protocol",
"mpls_psc");
proto_register_field_array(proto_mpls_psc, hf, array_length(hf));
proto_register_subtree_array(ett, array_length(ett));
}
void
proto_reg_handoff_mpls_psc(void)
{
dissector_handle_t mpls_psc_handle;
mpls_psc_handle = create_dissector_handle( dissect_mpls_psc, proto_mpls_psc );
dissector_add_uint("pwach.channel_type", PW_ACH_TYPE_PSC, mpls_psc_handle);
}
/*
* Editor modelines - https://www.wireshark.org/tools/modelines.html
*
* Local variables:
* c-basic-offset: 4
* tab-width: 8
* indent-tabs-mode: nil
* End:
*
* vi: set shiftwidth=4 tabstop=8 expandtab:
* :indentSize=4:tabSize=8:noTabs=true:
*/