aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-ipsec.c
diff options
context:
space:
mode:
authorGerald Combs <gerald@wireshark.org>2007-04-13 05:44:57 +0000
committerGerald Combs <gerald@wireshark.org>2007-04-13 05:44:57 +0000
commit536dd665a4135ddc72511ad22bc196cfbcfed0b8 (patch)
tree54f373fc7e80299f09b7fdc590a6f57d802f50cc /epan/dissectors/packet-ipsec.c
parente6a1e670179145882e9763575228cb3259ba3998 (diff)
Fix a mis-labeled field reported in Ethereal bug 1101. Update all
of the short descriptions and fill in all of the long descriptions. Fix up whitespace. svn path=/trunk/; revision=21401
Diffstat (limited to 'epan/dissectors/packet-ipsec.c')
-rw-r--r--epan/dissectors/packet-ipsec.c94
1 files changed, 47 insertions, 47 deletions
diff --git a/epan/dissectors/packet-ipsec.c b/epan/dissectors/packet-ipsec.c
index dbf7e1642f..1b1b8fc98f 100644
--- a/epan/dissectors/packet-ipsec.c
+++ b/epan/dissectors/packet-ipsec.c
@@ -538,7 +538,7 @@ esp_sa_parse_ipv6addr(const gchar *sa, guint index_start, gchar **pt_ipv6addr, g
char addr_string[IPSEC_IPV6_ADDR_MAX + 1];
gboolean done_flag = FALSE;
- if((sa == NULL) || (strcmp(sa, "") == 0))
+ if((sa == NULL) || (strcmp(sa, "") == 0))
return FALSE;
/* Get Address */
@@ -554,7 +554,7 @@ esp_sa_parse_ipv6addr(const gchar *sa, guint index_start, gchar **pt_ipv6addr, g
else
{
- if((cpt >= IPSEC_IPV6_ADDR_MAX - 1) && ((cpt + index_start) < strlen(sa)) && (sa[cpt + index_start + 1] != IPSEC_SA_ADDR_LEN_SEPARATOR) && (sa[cpt + index_start + 1] != IPSEC_SA_SEPARATOR))
+ if((cpt >= IPSEC_IPV6_ADDR_MAX - 1) && ((cpt + index_start) < strlen(sa)) && (sa[cpt + index_start + 1] != IPSEC_SA_ADDR_LEN_SEPARATOR) && (sa[cpt + index_start + 1] != IPSEC_SA_SEPARATOR))
return FALSE;
addr_string[cpt] = toupper(sa[cpt + index_start]);
cpt ++;
@@ -607,7 +607,7 @@ esp_sa_parse_ipv4addr(const gchar *sa, guint index_start, gchar **pt_ipv4addr, g
else
{
- if((cpt == IPSEC_IPV4_ADDR_MAX - 1) && ((cpt + index_start) < strlen(sa)) && (sa[cpt + index_start + 1] != IPSEC_SA_ADDR_LEN_SEPARATOR) && (sa[cpt + index_start + 1] != IPSEC_SA_SEPARATOR))
+ if((cpt == IPSEC_IPV4_ADDR_MAX - 1) && ((cpt + index_start) < strlen(sa)) && (sa[cpt + index_start + 1] != IPSEC_SA_ADDR_LEN_SEPARATOR) && (sa[cpt + index_start + 1] != IPSEC_SA_SEPARATOR))
return FALSE;
addr_string[cpt] = toupper(sa[cpt + index_start]);
cpt ++;
@@ -780,7 +780,7 @@ esp_sa_parse_addr_len(const gchar *sa, guint index_start, gint *len, guint *inde
else
{
- if((cpt == IPSEC_ADDR_LEN_MAX) && ((cpt + index_start) < strlen(sa)) && (sa[cpt + index_start + 1] != IPSEC_SA_ADDR_LEN_SEPARATOR) && (sa[cpt + index_start + 1] != IPSEC_SA_SEPARATOR))
+ if((cpt == IPSEC_ADDR_LEN_MAX) && ((cpt + index_start) < strlen(sa)) && (sa[cpt + index_start + 1] != IPSEC_SA_ADDR_LEN_SEPARATOR) && (sa[cpt + index_start + 1] != IPSEC_SA_SEPARATOR))
return FALSE;
len_string[cpt -1] = sa[cpt + index_start];
cpt ++;
@@ -1133,7 +1133,7 @@ filter_spi_match(gchar *spi, gchar *filter)
/*
Name : static gint compute_ascii_key(gchar **ascii_key, gchar *key)
Description : Allocate memory for the key and transform the key if it is hexadecimal
- Return : Return the key length
+ Return : Return the key length
Params:
- gchar **ascii_key : the resulting ascii key allocated here
- gchar *key : the key to compute
@@ -1153,44 +1153,44 @@ compute_ascii_key(gchar **ascii_key, gchar *key)
if(strlen(key) %2 == 0)
{
key_len = (strlen(key) - 2) / 2;
- *ascii_key = (gchar *) g_malloc ((key_len + 1)* sizeof(gchar));
+ *ascii_key = (gchar *) g_malloc ((key_len + 1)* sizeof(gchar));
for(i = 2; i < (strlen(key) -1) ; i+=2)
{
key_char[0] = key[i];
key_char[1] = key[i+1];
key_char[2] = '\0';
- sprintf(*ascii_key + (i - 2)/2, "%c", (int)strtoul(key_char,(char **)NULL,16));
- }
+ sprintf(*ascii_key + (i - 2)/2, "%c", (int)strtoul(key_char,(char **)NULL,16));
+ }
}
else
- /* give a chance to omit the first 0, in order to have a key in 8-bit unit */
+ /* give a chance to omit the first 0, in order to have a key in 8-bit unit */
{
key_len = (strlen(key) - 2) / 2 + 1;
- *ascii_key = (gchar *) g_malloc ((key_len + 1)* sizeof(gchar));
+ *ascii_key = (gchar *) g_malloc ((key_len + 1)* sizeof(gchar));
key_char[0] = '0';
key_char[1] = key[2];
key_char[2] = '\0';
- sprintf(*ascii_key, "%c", (int)strtoul(key_char,(char **)NULL,16));
+ sprintf(*ascii_key, "%c", (int)strtoul(key_char,(char **)NULL,16));
for(i = 3; i < (strlen(key) -1) ; i+=2)
{
key_char[0] = key[i];
key_char[1] = key[i+1];
key_char[2] = '\0';
- sprintf(*ascii_key + 1 + (i - 2)/2, "%c", (int)strtoul(key_char,(char **)NULL,16));
- }
- }
+ sprintf(*ascii_key + 1 + (i - 2)/2, "%c", (int)strtoul(key_char,(char **)NULL,16));
+ }
+ }
}
-
+
else if((strlen(key) == 2) && (key[0] == '0') && ((key[1] == 'x') || (key[1] == 'X')))
{
return 0;
}
-
+
else
{
key_len = strlen(key);
- *ascii_key = (gchar *) g_malloc ((key_len + 1)* sizeof(gchar));
+ *ascii_key = (gchar *) g_malloc ((key_len + 1)* sizeof(gchar));
memcpy(*ascii_key, key, key_len + 1);
}
}
@@ -1206,7 +1206,7 @@ compute_ascii_key(gchar **ascii_key, gchar *key)
gint *encryption_algo,
gint *authentication_algo,
gchar **encryption_key,
- guint *encryption_key_len,
+ guint *encryption_key_len,
gchar **authentication_key,
guint *authentication_key_len
@@ -1222,7 +1222,7 @@ compute_ascii_key(gchar **ascii_key, gchar *key)
- gint *encryption_algo : the Encryption Algorithm to apply the packet
- gint *authentication_algo : the Authentication Algorithm to apply to the packet
- gchar **encryption_key : the Encryption Key to apply to the packet
- - guint *encryption_key_len : the Encryption Key length to apply to the packet
+ - guint *encryption_key_len : the Encryption Key length to apply to the packet
- gchar **authentication_key : the Authentication Key to apply to the packet
- guint *authentication_key_len : the Authentication Key len to apply to the packet
@@ -1233,7 +1233,7 @@ get_esp_sa(g_esp_sa_database *sad, gint protocol_typ, gchar *src, gchar *dst,
gint *encryption_algo,
gint *authentication_algo,
gchar **encryption_key,
- guint *encryption_key_len,
+ guint *encryption_key_len,
gchar **authentication_key,
guint *authentication_key_len
)
@@ -1268,7 +1268,7 @@ get_esp_sa(g_esp_sa_database *sad, gint protocol_typ, gchar *src, gchar *dst,
*encryption_algo = sad -> table[i].encryption_algo;
*authentication_algo = sad -> table[i].authentication_algo;
*authentication_key_len = compute_ascii_key(authentication_key, (gchar *)sad -> table[i].authentication_key);
- *encryption_key_len = compute_ascii_key(encryption_key, (gchar *)sad -> table[i].encryption_key);
+ *encryption_key_len = compute_ascii_key(encryption_key, (gchar *)sad -> table[i].encryption_key);
found = TRUE;
@@ -1668,14 +1668,14 @@ dissect_esp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
be called every times an ESP Payload is found.
*/
- if((sad_is_present = get_esp_sa(&g_esp_sad, protocol_typ, ip_src, ip_dst, spi, &entry_index,
- &esp_crypt_algo, &esp_auth_algo,
+ if((sad_is_present = get_esp_sa(&g_esp_sad, protocol_typ, ip_src, ip_dst, spi, &entry_index,
+ &esp_crypt_algo, &esp_auth_algo,
&esp_crypt_key, &esp_crypt_key_len, &esp_auth_key, &esp_auth_key_len)))
{
/* Get length of whole ESP packet. */
len = tvb_reported_length(tvb);
-
+
switch(esp_auth_algo)
{
@@ -2266,7 +2266,7 @@ dissect_esp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
if(tvb_bytes_exist(tvb_decrypted, 0, esp_iv_len))
{
if(esp_iv_len > 0)
- proto_tree_add_item(esp_tree, hf_esp_iv,
+ proto_tree_add_item(esp_tree, hf_esp_iv,
tvb_decrypted,
0, esp_iv_len,
FALSE);
@@ -2346,8 +2346,8 @@ dissect_esp(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)
g_free(ip_src);
g_free(ip_dst);
if(esp_auth_key_len != 0) g_free(esp_auth_key);
- if(esp_crypt_key_len != 0) g_free(esp_crypt_key);
-
+ if(esp_crypt_key_len != 0) g_free(esp_crypt_key);
+
}
}
}
@@ -2496,41 +2496,41 @@ proto_register_ipsec(void)
static hf_register_info hf_ah[] = {
{ &hf_ah_spi,
- { "SPI", "ah.spi", FT_UINT32, BASE_HEX, NULL, 0x0,
- "", HFILL }},
+ { "AH SPI", "ah.spi", FT_UINT32, BASE_HEX, NULL, 0x0,
+ "IP Authentication Header Security Parameters Index", HFILL }},
{ &hf_ah_iv,
- { "IV", "ah.iv", FT_BYTES, BASE_HEX, NULL, 0x0,
- "", HFILL }},
+ { "AH ICV", "ah.icv", FT_BYTES, BASE_HEX, NULL, 0x0,
+ "IP Authentication Header Integrity Check Value", HFILL }},
{ &hf_ah_sequence,
- { "Sequence", "ah.sequence", FT_UINT32, BASE_DEC, NULL, 0x0,
- "", HFILL }}
+ { "AH Sequence", "ah.sequence", FT_UINT32, BASE_DEC, NULL, 0x0,
+ "IP Authentication Header Sequence Number", HFILL }}
};
static hf_register_info hf_esp[] = {
{ &hf_esp_spi,
- { "SPI", "esp.spi", FT_UINT32, BASE_HEX, NULL, 0x0,
- "", HFILL }},
+ { "ESP SPI", "esp.spi", FT_UINT32, BASE_HEX, NULL, 0x0,
+ "IP Encapsulating Security Payload Security Parameters Index", HFILL }},
{ &hf_esp_sequence,
- { "Sequence", "esp.sequence", FT_UINT32, BASE_DEC, NULL, 0x0,
- "", HFILL }},
+ { "ESP Sequence", "esp.sequence", FT_UINT32, BASE_DEC, NULL, 0x0,
+ "IP Encapsulating Security Payload Sequence Number", HFILL }},
{ &hf_esp_pad_len,
- { "Pad Length", "esp.pad_len", FT_UINT8, BASE_DEC, NULL, 0x0,
- "", HFILL }},
+ { "ESP Pad Length", "esp.pad_len", FT_UINT8, BASE_DEC, NULL, 0x0,
+ "IP Encapsulating Security Payload Pad Length", HFILL }},
{ &hf_esp_protocol,
- { "Next Header", "esp.protocol", FT_UINT8, BASE_HEX, NULL, 0x0,
- "", HFILL }},
+ { "ESP Next Header", "esp.protocol", FT_UINT8, BASE_HEX, NULL, 0x0,
+ "IP Encapsulating Security Payload Next Header", HFILL }},
{ &hf_esp_iv,
- { "IV", "esp.iv", FT_BYTES, BASE_HEX, NULL, 0x0,
- "", HFILL }}
+ { "ESP IV", "esp.iv", FT_BYTES, BASE_HEX, NULL, 0x0,
+ "IP Encapsulating Security Payload ", HFILL }}
};
static hf_register_info hf_ipcomp[] = {
{ &hf_ipcomp_flags,
- { "Flags", "ipcomp.flags", FT_UINT8, BASE_HEX, NULL, 0x0,
- "", HFILL }},
+ { "IPComp Flags", "ipcomp.flags", FT_UINT8, BASE_HEX, NULL, 0x0,
+ "IP Payload Compression Protocol Flags", HFILL }},
{ &hf_ipcomp_cpi,
- { "CPI", "ipcomp.cpi", FT_UINT16, BASE_HEX,
- VALS(cpi2val), 0x0, "", HFILL }},
+ { "IPComp CPI", "ipcomp.cpi", FT_UINT16, BASE_HEX, VALS(cpi2val), 0x0,
+ "IP Payload Compression Protocol Compression Parameter Index", HFILL }},
};
static gint *ett[] = {
&ett_ah,